OA20434A - Wireless time-sensitive networking - Google Patents

Wireless time-sensitive networking Download PDF

Info

Publication number
OA20434A
OA20434A OA1202100296A OA1202100296A OA20434A OA 20434 A OA20434 A OA 20434A OA 1202100296 A OA1202100296 A OA 1202100296A OA 1202100296 A OA1202100296 A OA 1202100296A OA 20434 A OA20434 A OA 20434A
Authority
OA
OAPI
Prior art keywords
network
tsn
spectrum
rbs
data
Prior art date
Application number
OA1202100296A
Inventor
Sachs Joachim
Larmo Anna
ALABBASI Abdulrahman
Shapin Alexey
Höglund Anders
Singh Bikramjit
Roeland Dinand
Eric Wang Yi-Pin
CHERNOGOROV Fedor
SZABO Géza
Andreas MUNZ Hubertus
Ikram ASHRAF Muhammad
Lundsjö Johan
Walter Diachina John
Fröberg Olsson Jonas
Hiltunen Kimmo
Kittichokechai Kittipong
Luis Pradas Jose
Wang Kun
Sandgren Magnus
GERAMI Majid
Andersson Mattias
Lopez Miguel
Shi Nianshan
AMDGART Niklas
REIDER Norbert
Nuri Can YILMAZ Osman
Salmela Patrik
Ramachandra Pradeepa
RACZ Sándor
Sandberg Sara
Ruffini Stefano
Dudda Torsten
TONUTTI Wolfgang
Zou Zhenhua
Baldemair Robert
Schliwa-Bertling Paul
Kern András
Varga Balázs
Németh Gábor
Farkas János
Kenesi Zsolt
Blankenship Yufei
Sun Ying
HOLMBERG Torgny
FALAHAT Sorour
BERG Rodrigo
SKARIN Per
Persson Per
Angelsmark Ola
WAHLSTRÖM Marten
SVENSSON Malgorzata
ARAUJO José
NYGREN Johannes
Olsson Johan
Persson Joakim
Enbuske Henrik
Gustafsson Harald
Miklos György
Svensson Fredrik
Patel Dhruvin
Sundman Dennis
Smeets Bernard
PALAIOS Alexandros
Balachandran Kumar
Original Assignee
Telefonaktiebolaget Lm Ericsson
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Telefonaktiebolaget Lm Ericsson filed Critical Telefonaktiebolaget Lm Ericsson
Priority to OA1202100296A priority Critical patent/OA20434A/en
Publication of OA20434A publication Critical patent/OA20434A/en

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

Techniques for enhancing performance in Industrial Internet-of-Things (MoT) scenarios, including techniques for time-sensitive networking (TSN) and 5G wireless network integration. An example method performed by a wireless device associated with a wireless communications network comprises receiving a first timing signal from the wireless communications network and receiving a second timing signal from an external Time-Sensitive Networking, TSN, data network to which the wireless device is connected. The method further comprises establishing at least one TSN stream with the external TSN data network, through a radio base station, RBS, in the wireless communications network.

Description

WIRELESS TIME-SENSITIVE NETWORKING
TECHNICAL FIELD
[0001] The présent disclosure is related to wireless communications networks and describes network architecture, wireless devices, and wireless network nodes suitable for industrial applications, using a fifth-generation (5G) or other wireless communications network.
BACKGROUND
[0002] The fîfth génération of mobile technology (5G) will be able to provide wider range of services than the existing 3G/4G technologies. Three main use cases of 5G are: Enhanced Mobile Broadband (eMBB), Massive Machine Type of Communication (mMTC) and Ultra Reliable Low Latency Communication (URLLC). A key objective of the 5G System is to be able to support the stringent System requirements from vertical markets. Those requirements include simultaneously supporting multiple combinations of reiiability, latency, throughput, positioning, and availability, as weîl as, local deployments with local survivability, local data/routing, local managements, security, data integrity and privacy. [0003] An industrial network perspective of 5G System is illustrated in Figure 1. The service performance requirements are coming from the automation applications. 5G System is providing the communication service to the automation applications. In order to support automation in vertical domains, 5G Systems need to be reliable and flexible to meet service performance requirements to serve spécifie applications and use cases. They need to corne with the System properties of reiiability, availability, maintainability, safety, and integrity.
[0004] Spécifications for 5G are under development by members of the 3rdGeneration Partnership Project (3GPP). The document “Service Requirements for CyberPhysical Control Applications in Vertical Domains, Stage 1,” 3GPP TS 22.104, v. 16.0.0 (Jan 2019), spécifiés the requirements that provide various sets of performance criteria that need to be met to satisfactorily support different use cases of cyber-phystcal control applications used by various vertical markets.
[0005] In the industrial applications space, requirements include support for mixed services in factory and manufacturing environments, including support for different service levels, such as massive Machine-Type Communications (mMTC), enhanced Mobile Broadband (eMBB), and ultra-reliable low-latency communications (URLLC) traffic in the same deployment. Support for industrial deterministic service is needed. Intégration between the 5G System (5GS) and existing industrial networks is also requîred.
Interoperability, including support for non-public networks and interoperabiiity with the public land mobile network (PLMN) is required.
[0006] With respect to System availabîlity and rêliability, the 5G System as a communication service provider shall comply with the 3GPP définition of availabiliiy and rêliability. Communication service availabîlity is defined as the percentage value of the amount of time the end-to-end communication service is delivered according to an agreed quality of service (QoSk djyided by the amount of time the System is expected to deliver the end-to-end service according to the spécification in a spécifie area. Required availabîlity is to be determined by business aspects considering the trade-off between monetary loss at times the System is not available vs. complexity to increase the availabîlity, e.g. by increasing redundancy. It will be appreciated that availabîlity beyond 99.95 % usuaîly requires an extra power source to prevent the public energy grid (99.9 99.99 % availabîlity in Europe) from becoming the weakest component.
[0007] Communication service rêliability is defined as the abiüty of the communication service to perform as required for a given time interval, under given conditions. These conditions include aspects that affect rêliability, such as; mode of operation, stress levels, and environmental conditions. Rêliability may be quantified using appropriate measures such as mean time to failure, or the probability of no failure within a specified period of time.
[0008] The use of 5G in industrial applications most meet safety requirements, where safety is defined as the condition of being protected from or unlikely to cause danger, risk, or injury. Safe Systems thus shouid be designed to be functionally safe from the start. Automatic protection fu notions can be buiït into the System to en sure safety for the System while in operation. Safety aspects to be considered in system design to ensure automatic protection shouid, for example, include human srrors, hardware and software faiiures, and operational and environmental stress factors.
[0009] Many industries today are in full control of their local network. deployments, Thus, local deployment aspect regarding local survivability, local data/routing and local management become requirements for industrial networks. In short, the factory network shouid run normally even when the connection to the outside world is lost. Furthermore, there may be requirements around data not leaving the premises as well as local IT staff being able to manage and change the network deployment on demand.
[0010] Security, data integrity and privacy are important requirements for the industries as well. Business critical information on processes and data from the manufacturing process shouid not be leaked.
SUMMARY
[0011] Described herein in detail are various techniques for enhancing performance in Industrial Internet-of-Things (lloT) scénarios, including techniques for time-sensitive networking (TSN) and 5G wireless network intégration. Corresponding devices and nodes are also described in detail.
[0012] An example method, performed by a wireless device, comprises receiving system information (SI) from a radio base station (RBS) of a radio access network (RAN), the SI being indicative of support for TSN through the RBS, and establishing at least one TSN data stream with an extemal data network, through the RBS. The example method further includes receiving a first timing signal from the wireless communications network, via the RBS, receiving a second timing signal from the extemal TSN data network to which the wireless device is connected, comparing the first timing signal to the second timing signal to détermine an offset, and transmitting the offset to the wireless communications network.
[0013] Another example method, also performed by a wireless device, comprises receiving a first timing signal from the wireless communications network, receiving a second timing signal from an extema! TSN data network to which the wireless device is connected, and establishing at least one TSN data stream with the extemal TSN data network, through a radio base station, RBS, in the wireless communications network. [0014] Another example method is performed in one or more nodes of a core network associated with a radio access network (RAN) and is for handling a time-sensitive data stream associated with a user equipment (UE) and an extemal network. This example method comprises receiving, from the extemal network, a transmission schedule associated with a time-sensitive data stream and sending, to the RAN, a request to allccate radio resources for communication of the data stream between the RAN and a first UE, wherein the request further comprises information related to the transmission schedule. The melhod further comprises receiving, from the RAN, a response indicating whether radio resources can be allocated to meet the transmission schedule associated with the data stream. The method still further comprises obtaining configuration information for the data stream, the configuration information indicating respective values for one or more fields within a header of data packets associated with the data stream which are io remain static, initiating transmission of the configuration information to the first UE, receiving a data packet associated with the data stream from the external data network, removing the one or more fields from the data packet to generate a compressed data packet, and initiating transmission of the compressed data packet to the first UE.
[0015] Another example method îs performed by a wireless device associated with a wireless communications network and is for transport of data packets associated with a data stream in an external data network. This example method comprises receiving Si from an RBS of a RAN, the SI being indicative of support for TSN through the RBS, and establishing at least one TSN data stream with the external data network, through the RBS. This method further comprises obtaining configuration information for the TSN data stream, the configuration information indicating respective values for one or more fields within a header of data packets associated with the TSN data stream which are to remain static, receiving, from the RBS, a data packet associated with the TSN data stream, and adding the one or more fîeids to the data packet to generate a decompressed data packet.
[0016] Another example method is performed by a wireless device configured for communication with a RAN and is for scheduling resources in the RAN according to a transmission schedule associated with an external network. This example method comprises receiving SI from an RBS of the RAN, the SI being indicative of support for TSN through the RBS, and establishing at least one TSN data stream with the external data network, through the RBS. This exampie method further comprises receiving, from the external network, a transmission schedule associated with the TSN data stream, sending, to a network associated with the RBS, a request to allocate radio resources for communication of the TSN data stream between the wireless device and the RBS, wherein the request further comprises information reiated to the transmission schedule, and receiving, from the network, a response indicating whether radio resources can be allocated to meet the transmission schedule associated with the TSN data stream.
[0017] Another example method, also performed by a wireless device associated with a wireless communications network, comprises receiving a first timing signal from the wireless communications network, and receiving a second timing signal from an external Time-Sensitive Networking, TSN, data network to which the wireless device is connected. The method further comprises establishing at least one TSN data stream with the external TSN data network, through a radio base station, RBS, in the wireless communications network, and receiving, from the external network, a transmission schedule associated with the corresponding TSN data stream.
[0013] Still another exampie method, performed by a wireless device, comprises receiving Si from an RBS of a RAN, the SI being indicative of support for TSN through the RBS, and establishing at least one TSN data stream with an external data network, through the RBS. This method further comprises obtaining configuration information for the TSN data stream, the configuration information indicating respective values for one or more fields within a header of data packets associated with the TSN data stream which are to remain static. The method further comprises receiving, from the R BS, a data packet associated with the TSN data stream, and adding the one or more fields to the data packet to generate a decompressed data packet.
[0019] Another method, agaîn performed by a wireless device associated with a wireless communications network, comprises establishing at least one TSN data stream with the external TSN data network, through a radio base station, RBS, in the wireless communications network, and obtaining configuration information for the TSN data stream, the configuration information indicating respective values for one or more fields within a header of data packets associated with the TSN data stream which are to remain static. The method further comprises receiving, from the RBS, a data packet associated with the TSN data stream, and adding the one or more fields to the data packet to generate a decompressed data packet.
[0020] Stili another method performed by a wireless device associated with a wireless communications network comprises establishing at least one TSN data stream with the external TSN data network, through a radio base station, RBS, in the wireless communications network, and receiving, from the external network, a transmission schedule associated with the corresponding TSN data stream.
[0021] Yet another example method is performed by a first device, and is for assisting enrolîment of a second device to an Internet of Things (loT) environment and using the second device. This example method comprises obtaining a représentation of an enrolîment function associated with the second device, wherein the enrollmentfunction is associated with at least one serialized enrolîment application comprising enrolîment information associated with the first and second device, deserializing the enrolîment application such that enfournent information associated with the first device is separated from enrolîment information associated with the second device, and transmitting the enrolîment information associated with the second device to the second device for initiating execution by the second device of the enrolîment process of the second device by configuring the second device based on the enrolîment information associated with the second device. This method further comprises receiving, from the second device, configuration information associated with the second device, and using a first runtime environment executing on the first device to transfer a code module to a second runtime environment executing on the second device, where the code module is configured to execute within the second runtime environment and expose a function of the second device, supported by the second runtime environment, to the first device. The method further comprises executing an application within the first runtime environment, the application remotely invoking the fonction of the second device via the transferred code module and the second runtime environment,
[0022] A corresponding method is carried oui by a second device and is for executing an enroHment process to an ioT environment assisted by a first device and providing the first device with access to a fonction of the second device. This examp le method comprises receiving, from the first device, enrollment information associated with the second device, executing the enrollment process by configuring the second device based on the enrollment information, and transmitting configuration information associated with the second device to the first device. The method further comprises receiving a code module from a first runtime environment executing on the first device, to a second runtime environment executing on the second device, to expose a fonction of the second device supported by îhe second runtime environment to the first device, and using the second runtime environment to control performance of the fonction of the second device responsive to a remote invocation of the fonction received via the code module from an application executing within the first runtime environment.
[0023] The se and other methods are described in detail beîow and illustrated in the attached figures. Corresponding devices, network nodes, and the like are also described in detail, as are the network arrangements and environments in which these techniques may be advantageously used,
SRIEF DESCRIPTION OF THE DRAWINGS
[0024] Figure 1 illustrâtes a network perspective of the 5G system.
[0025] Figure 2 illustrâtes the concept of Industry 4.0.
[0026] Figure 3 shows a standalone 5G ηοπ-pubîic network integrated into an Operations Technology (OT) System.
[0027] Figure 4 shows a 5G non-public network interworking with a public wide-area network,
[0028] Figure 5 illustrâtes Une concept of network slices,
[0029] Figure 6 shows an example of four different slices throughout the network.
[0030] Figure 7 illustrâtes features of network slices.
[0031] Figure 8 shows mechanisms for slicing the network.
[0032] Figure 9 illustrâtes QoS in the 5G System.
[0033] Figure 10 shows resource partitioning between network siices.
[0034] Figure 11 shows an example logical fonction split in motion control applications.
[0035] Figure 12 shows control fonctions in a cloud.
[0036] Figure 13 illustrâtes an architecture for remote robot control over a modelled wireless link.
[0037] Figure 14 illustrâtes an example of a collaborative manufacturer-agnostic robot assembly.
[0038] Figure 15 shows principles of TDOA geolocation.
[0039] Figure 16 shows cumulative distributions for positioning in the 3GPP Indoor
Open Office (IOO) scénario, using different bandwidths, [0040] Figure 17 illustrâtes principles of hybrid positioning.
[0041] Figure 18 provides a regulatory view of spectrum leasing.
[0042] Figure 19 shows spectrum allocation possibilities for a frequency band allocated to mobile services.
[0043] Figure 20 illustrâtes a local network using licensed spectrum.
[0044] Figure 21 illustrâtes a local network using leasing from a license holder, such as a mobile network operator (MNO).
[0045] Figure 22 shows features of CBRS.
[0046] Figure 23 shows a high-leveî SAS architecture.
[0047] Figure 24 illustrâtes PAL protection areas.
[0048] Figure 25 shows an industrial cloud scénario.
[0049] Figure 26 illustrâtes information management in a simple factory situation.
[0050] Figure 27 illustrâtes a hierarchical network architecture in a factory.
[0051] Figure 28 shows different packet services and quality-of-service relations.
[0052] Figure 29 introduces concepts of time-sensitive networking (TSN).
[0053] Figure 30 illustrâtes an example TSN and 5G interworking architecture in an industrial scénario.
[0054] Figure 31 shows the use of Virtual endpoints to connect non-TSN devices to a TSN network using 5G.
[0055] Figure 32 illustrâtes TSN time synchronisation across a 5G network.
[0056] Figure 33 shows support of multiple time domains in a 5G System.
[0057] Figure 34 shows multiple time domains in a factory network.
[0058] Figure 35 illustrâtes time-gated queuing.
[0059] Figure 36 shows frame réplication and élimination for reiiability.
[0060] Figure 37 shows a fuliy distributed model for TSN.
[0061] Figure 38 illustrâtes a centralized network/distributed user model for TSN.
[0052] Figure 39 illustrâtes a fuliy centralized configuration model for TSN.
[0063] Figure 40 shows a configuration agent consisting of CUC and CNC.
[0064] Figure 41 shows interaction between CNC and CUC, (0065] Figure 42 is a signal flow diagram iflustrating TSN stream setup in a TSN centralized configuration model,
[0066] Figure 43 shows a potential 5G-TSN intégration architecture Setup.
[0067] Figure 44 illustrâtes TSN FRER setup.
[0068] Figure 45 shows interaction between AF, CUC, and CNC to setup FRER.
[0060] Figure 46 shows a 5G network.
[0070] Figure 47 illustrâtes the chain controller concept.
[0071] Figure 48 shows a hrgh-îevel functional view of a core network deployment at a factory site.
[0072] Figure 49 illustrâtes the control plane of the RAN, for multi-connectivity.
(0073] Figure 50 illustrâtes the user plane architecture of the RAN, for muîtîconnectivity.
[0074] Figure 51 illustrâtes different radio bearer types for NR.
[0075] Figure 52 shows latency performance when using mini-slots.
[0076] Figure 53 illustrâtes long alignment delay due to transmission across slot border restriction.
(0077] Figure 54 shows the use of mini-slot répétitions across a slot border.
[0078] Figure 55 shows the use of a beta-factor to ailow omission of UCÎ on PUSCH.
[0079] Figure 56 illustrâtes a short PUCCH that occupies 1 OFDM symbol, with a periodicity of 2 symbols.
[0080] Figure 57 shows examples of blocking probability per monitoring occasion as a function of DCl size, number of UEs, and CORESET sizes.
[0081] Figure 58 shows downlink data latency with one retransmission.
[0082] Figure 59 shows uplink data latency with a configured grant and one retransmission,
[0083] Figure 60 illustrâtes a comparison of downlink data latency.
[0084] Figure 61 illustrâtes a comparison of grant-based uplink data latency.
[0085] Figure 62 shows a comparison of configured grant uplink data latency.
[0086] Figure 63 shows uplink inter-UE pre-emption.
[0087] Figure 64 shows the performance of MCS14 in a power-controlled multiplexing scheme.
[0088] Figure 65 shows PDSCH BLER after one transmission, for several different modulation coding schemes,
[0089] Figure 66 shows uplink SI N R for different multi-antenna techniques, with and without coordînated multipoint and uplink precoding.
[0090] Figure 67 shows an example of scheduling request (SR) and buffer status report (BSR) operation.
[0091] Figure 68 illustrâtes multiple SR configurations mapped to different traffic.
[0092] Figure 69 shows delayed SR due to ongoing long UL-SCH transmission.
[0093] Figure 70 shows a delay in obtarning a dynamic grant via SR procedures.
[0094] Figure 71 illustrâtes configured grant Type 1 procedures.
[0095] Figure 72 illustrâtes configured grant Type 1 procedures.
[0096] Figure 73 shows industrial deterministic streams with different arrivais and payioad sizes.
[0097] Figure 74 shows industrial deterministic streams with different patterns, periodicities, latency, and reliability requirements.
[0098] Figure 75 illustrâtes overiapping configurations.
[0099] Figure 76 shows an example of logical channel prioritization (LCP) procedures.
[0100] Figure 77 shows a probiem with sending non-critical traffic over a robust grant.
[0101] Figure 78 illustrâtes a restriction to avoid the probiem of Figure 77.
[0102] Figure 79 shows the extra latency arising from sending criticai traffic over non-robust short grant.
[0103] Figure 80 illustrâtes a restriction to avoid the probiem of Figure 79.
[0104] Figure 81 illustrâtes a probiem with a dynamic grant overriding a configured grant.
[0105] Figure 82 shows the benefit of enabling configured grant to override dynamic grant conditionally.
[0106] Figure 83 shows overiapping grant with different PUSCH durations.
[0107] Figure 84 illustrâtes the enabling of intra-UE préemption to enhance network efficiency.
[0108] Figure 85 shows packet duplication in dual-carrier (DC) and carrier aggregation (CA) scénarios.
[0109] Figure 86 shows residual errors with and without duplication.
[0110] Figure 87 shows universal time domain and working clock domains.
[0111] Figure 88 illustrâtes SFN transmissions.
[0112] Figure 89 illustrâtes an industrial use case with three time domains.
[0113] Figure 90 shows a continuous PTP chain method.
[0114] Figure 91 shows an example of the IEEE 802.3 MAC frame format.
[0115] Figure 92 shows gains from Ethernet header compression.
[0116] Figure 93 shows possible Ethernet header compression anchor points.
[0117] Figure 94 shows radio iink failure (RLF) in the case of PDCP duplication.
[0113] Figure 95 illustrâtes an example mobility procedure.
[0119] Figure 96 shows possible realizations of the Industrial loT protocol stack mapped to the OSI model.
[0120] Figure 97 shows industrial Ethernet categorization.
[0121] Figure 98 illustrated time-scheduled transmissions as used in Profinet.
[0122] Figure 99 shows a frame structure for Profinet IRT.
[0123] Figure 100 illustrâtes estimated performance of different wireiess technologies with respect to reliabiiity with increasing load and increasing E2E latency requirements.
[0124] Figure 101 shows typical channel access and data exchange in Wi-Fi.
[0125] Figure 102 shows channel access in Wi-Fi.
[0126] Figure 103 illustrâtes a simulation of the Minstrel algorithm.
[0127] Figure 104 shows possible protocol stacks of OPC-UA.
[0123] Figure 105 illustrâtes OPC-UA over TSN.
[0129] Figure 106 is a block diagram illustrating a Distributed Time-Sensitive Networking (TSN) configuration model, as specified in IEEE Std. 802.1Qbv-2015.
[0130] Figure 107 is a block diagram illustrating a Centralized TSN configuration model, as specified in IEEE Std. 802.1Qbv-2015.
[0131] Figure 108 is a block diagram illustrating a Fulîy Centralized TSN configuration mode!, as specified in IEEE Std. 802.1Qbv-2015.
[0132] Figure 109 shows a sequence diagram of an exempîary TSN stream configuration procedure using the fulîy centralized configuration model shown in Figure 108.
[0133] Figure 110 is a block diagram illustrating a control plane (CP) and a data or user plane (UP) architecture of an exempîary 5G wireiess network,
[0134] Figure 111 is a block diagram illustrating an exempîary arrangement for interworking between the 5G network architecture shown in Figure 110 and an exempîary fulty centralized TSN network architecture.
[0135] Figure 112 is a block diagram illustrating transmission sélection among traffîc queues based on gates, as specified in IEEE Std. 802.1Qbv-2015.
[0136] Figure 113 is a block diagram illustrating an exempîary communication scénario between two TSN talker/îistener units via 5G and TSN networks, according to various exempîary embodiments of the présent disclosure.
[0137] Figure 114 shows a sequence diagram of an exemplary method and/or procedure for configuring timely delivery of TSN stream packets via the network configuration shown in Figure 113, according to various exemplary embodiments of the présent disclosure.
[0138] Figure 115 is a block diagram illustrating an exemplary communication scénario between a TSN talker/listener unit and a virtualized controller via a 5G network, according to various exemplary embodiments of the présent disclosure.
[0139] Figure 116 shows a sequence diagram of an exemplary method and/or procedure for configuring timely delivery of TSN stream packets via the network configuration shown in Figure 115, according to various exemplary embodiments of the présent disclosure.
[0140] Figure 117 is a flow diagram illustrating an exemplary method and/or procedure performed by a network node in a core network (e.g., a 5G core network), according to various exemplary embodiments of the présent disclosure.
[0141] Figure 118 is a flow diagram illustrating an exemplary method and/or procedure performed by a network node in a radio access network (e.g., N G-RA N), according to various exemplary embodiments of the présent disclosure.
[0142] Figure 119 is a flow diagram illustrating an exemplary method and/or procedure performed by user equipment (UE), according to various exemplary embodiments of the présent disclosure.
[0143] Figure 120 is a block diagram of an exemplary communications system, according to various exemplary embodiments of frie présent disclosure.
[0144] Figures 121,122, and 123 are block diagrams of exemplary radio access nodes confîgured in various ways according to various exemplary embodiments of the présent disclosure.
[0145] Figures 124 and 125 are block diagrams of exemplary wireless devices or UEs confîgured in various ways, according to various exemplary embodiments of the présent disclosure.
[0146] Figure 126 illustrâtes 5G Core Network (5GCN) fonctions and Radio Access Network (RAN).
[0147] Figure 127 shows protocol stacks for Ethernet PDU type data.1
[0148] Figure 128 illustrâtes the TSN Frame Structure.
[0149] Figure 129 is a signaling diagram for downlink signaling according to embodiments of the disclosure.
[0150] Figure 130 is a signaling diagram for uplink signaling according to embodiments of the disclosure,
[0151] Figure 131 illustrâtes a method in accordance with some embodiments.
[0152] Figure 132 illustrâtes another method in accordance with some embodiments.
[0153] Figure 133 illustrâtes another method in accordance with some embodiments.
[0154] Figure 134 illustrâtes another method in accordance with some embodiments.
[0155] Figure 135 shows a flowchart for implementing a method of handlrng TimeSensitive Networking over a radio access network.
[0156] Figure 136 shows a flowchart for implementing a method of announcing Time-Sensitive Networking over a radio access network.
[0157] Figure 137 shows a flowchart for implementing a method of distributing a configuration message for Time-Sensitive Networking over a radio access network.
[0158] Figure 138 shows a schematic block diagram of a first example of a communication system.
[0159] Figure 139 is a schematic block diagram of a second example of a communication system.
[0160] Figure 140 is a schematic block diagram of a third example of a communication system.
[0161] Figure 141 is a functional block diagram of a fourth example of a communication system.
[0162] Figure 142 shows a first schematic signaling diagram for a communication system.
[0163] Figure 143 is a second schematic signaling diagram for a communication system.
[0164] Figure 144 illustrâtes the inter-working of 5G and TSN.
[0165] Figure 145 shows multiple TSN gPTP time domains in a factory,
[0166] Figure 146 illustrâtes how a BS can synchronize a UE to a cellular reference time.
[0167] Figure 147 illustrâtes a scénario where a device is assumed to be connected overa cellular link to a TSN domain.
[0168] Figure 148 illustrâtes a shop fioor scénario assuming a TSN domain connected to a Virtual contrôler over a cellular link.
[0169] Figure 149 illustrâtes a scénario where two TSN networks are connected overa cellularlink.
[0170] Figure 150 illustrâtes an example synchronization procedure.
[0171] Figure 151 iilustrates another example synchronization procedure.
[0172] Figure 152 is a sequence flow for an example synchronization procedure.
[0173] Figure 153 is a sequence fiow for another example synchronization procedure.
[0174] Figure 154 illustrâtes PTP time transmission using methods disclosed herein.
[0175] Figure 155 illustrâtes an example method performed by a wireless device,
[0176] Figure 156 is a schemaiîc block diagram of a Virtual apparatus in a wireiess network.
[0177] Figure 157 illustrâtes an example method performed by a network node, such as a base station.
[0178] Figure 158 is a schematic block diagram of a Virtual apparatus in a wireless network.
[0179] Figure 159 illustrâtes an example method performed by a wireless device.
[0180] Figure 160 is a schematic block diagram of a Virtual apparatus in a wireless network.
[0181] Figure 161 illustrâtes an example method performed by a network node, such as a base station.
[0182] Figure 162 is a schematic block diagram of a Virtual apparatus in a wireless network.
[0183] Figure 163 is a combined flowchart and signaling scheme according to embodiments herein.
[0184] Figure 164 is a block diagram depicting a UE for handling configuration according to embodiments herein.
[0185] Figure 165 is a block diagram depicting a radio network node for handling configuration in a wireless communication network according to embodiments herein.
[0186] Figure 166 is a block diagram of an example wireless device, according to embodiments herein.
[0187] Figure 167 is a block diagram of an example radio network node, according to embodiments herein,
[0188] Figure 168 illustrâtes a method for assisting enrollment of a device in an internet of Things (loT) environment, according to some embodiments.
[0189] Figure 169 illustrâtes a method for enroliing in an Internet of Things (loT) environment, according to some embodiments.
[0190] Figure 170 is a schematic drawing iliustrating an enrollment process according to some embodiments.
[0191] Figure 171 is a flowchart illustrating example method steps according to some embodiments,
[0192] Figure 172 is a block diagram illustrating an exampîe arrangement according to some embodiments.
[0193] Figure 173 is a block diagram illustrating an example arrangement according to some embodiments.
[0194] Figure 174 is a block diagram illustrating an example network environment according to one or more embodiments.
[0195] Figure 175 is a call flow diagram illustrating example signaling between entities according to one or more embodiments.
[0196] Figure 176 is a flow diagram illustrating an example method implemented by a first device according to one or more embodiments.
[0197] Figure 177 is a flow diagram illustrating an example method implemented by a second device according to one or more embodiments.
[0198] Figure 178 is a block diagram illustrating example hardware according to one or more embodiments.
[0199] Figure 179 is a block diagram illustrating an example first device according to one or more embodiments.
[0200] Figure 180 is a block diagram illustrating an example second device according to one or more embodiments.
[0201] Figure 181 illustrâtes a flow diagram of one embodiment of a System for que ry in g a federated database in accordance with various aspects as described herein, [0202] Figure 182 illustrâtes a flow diagram of another embodiment of a System for querying a federated database in accordance with various aspects as described herein, [0203] Figure 183 illustrâtes one embodiment of a network node having a federated database in accordance with various aspects as described herein.
[0204] Figure 184 illustrâtes another embodiment of a network node having a federated database in accordance with various aspects as described herein.
[0205] Figure 185 and Figure 186 illustrate one embodiment of a method performed by a network node having a federated database representing one or more autonomous or sub-federated databases that are located in a same or different jurisdiction in accordance with various aspects as described herein.
[0206] Figure 187 illustrâtes one embodiment of a network node having an autonomous database in accordance with various aspects as described herein.
[0207] Figure 188 illustrâtes another embodiment of a network node having an autonomous database in accordance with various aspects as described herein.
[0208] Figure 189 and 190 illustrate embodiments of a method performed by a network node having an autonomous database, in a certain jurisdiction, that is represented by a federated or sub-federated database in accordance with various aspects as described herein.
[0209] Figure 191 iliustrates another embodiment of a System for querying a federated database in accordance with various aspects as described herein.
[0210] Figure 192 illustrâtes another embodiment of a System for querying a federated database in accordance with various aspects as described herein.
[0211] Figure 193 illustrâtes another embodiment of a System for querying a federated database in accordance with various aspects as described herein.
[0212] Figure 194 illustrâtes another embodiment of a System for querying a federated database in accordance with various aspects as described herein.
[0213] Figure 195 illustrâtes one embodiment of a network node in accordance with various aspects as described herein.
[0214] Figure 196 is a schematic block diagram iilustrating Ethernet frame handling at UPF from 3GPP TS 29,561.
[0215] Figure 197 is a schematic block diagram iilustrating 5G-TSN interworking in an industrial setup.
[0216] Figure 198 is a schematic block diagram iilustrating TSN control and data plane with Virtual endpoint.
[0217] Figure 199 is a schematic block diagram iilustrating VEP deployments as part of the UPF for different PDU session types.
[0213] Figure 200 is a schematic block diagram iilustrating VEP(s) as seen by the external TSN network configuration.
[0219] Figure 201 is a flowchart iilustrating exampie method steps according to some embodiments.
[0220] Figure 202 is a flowchart iilustrating example method steps according to some embodiments.
[0221] Figure 203 is a combined flowchart and signaling diagram iilustrating example method steps and signaling according to some embodiments.
[0222] Figure 204 is a combined flowchart and signaling diagram iilustrating exampie method steps and signaling according to some embodiments.
[0223] Figure 205 is a schematic block diagram iilustrating an example apparatus according to some embodiments.
[0224] Figure 206 shows transmission of TSN data streams using redundant paths.
[0225] Figure 207 shows a communication system according to embodiments of the disclosure.
[0226] Figure 208 is a signaling diagram according to embodiments of the disclosure.
[0227] Figure 209 is a schematic diagram showing redundant paths in a wireless network according to embodiments of the disclosure.
[0228] Figure 210 is a schematic diagram showing redundant paths in a wireless network according to further embodiments of the disclosure.
[0229] Figure 211 is a schematic diagram showing redundant paths in a wireless network according to further embodiments of the disclosure.
[0230] Figure 212 is a flow chart of a method in a core network node according to embodiments of the disclosure.
[0231] Figure 213 is a flow chart of a method in a configuring node according to embodiments of the disclosure.
[0232] Figure 214 is a table iîlustrating a PTP header format.
[0233] Figure 215 is a schematic block diagram iîlustrating embodiments of a wireless communications network.
[0234] Figure 216 is a flowchart depicting a method perfomned by a transmitting device according to embodiments herein.
[0235] Figure 217 is a flowchart depicting a method performed by a receiving device according to embodiments herein.
[0236] Figure 218 is a schematic block diagram iîlustrating embodiments of a multiple time domain support in the 5GS using broadcast according to some embodiments herein.
[0237] Figure 219 is a schematic block diagram iîlustrating embodiments of a multiple time domain support in the 5GS where only relevant gPTP frames according to some embodiments herein.
[0238] Figure 220 is a schematic block diagram iîlustrating embodiments of a multiple time domain support in the 5GS according to some embodiments herein.
[0239] Figure 221 is a flowchart depicting a method performed by a transmitting device according to embodiments herein.
[0240] Figure 222 is a flowchart depicting a method performed by a receiving device according to embodiments herein.
[0241] Figure 223 schematically illustrâtes a télécommunication network connected via an intermediate network to a host computer, according to some embodiments.
[0242] Figure 224 is a generalized block diagram of a host computer communicating via a base station with a user equipment over a partiaily wireless connection, according to some embodiments.
[0243] Figure 225, Figure 226, Figure 227, and Figure 228 are flowcharts illustrating example methods implemented in a communication system including a host computer, a base station and a user equipment.
DETAILED DESCRIPTION
[0244] Following are detailed descriptions of concepts, system/network architectures, and detailed designs for many aspects of a wireless communications network targeted to address the requirements and use cases for 5G. The terms requirement, “need,” or similar language are to be understood as describing a désirable feature orfunctionalîty of the System in the sense of an advantageous design of certain embodiments, and not as indicating a necessary or essentia! element of ail embodiments. As such, in the following each requirement and each capability described as required, important, needed, or described with similar language, is to be understood as optional. [0245] Operation Technology communication system and 5G
[0246] A variety of technologies are today used in industrial communication Systems. For manufacturing Systems in factories, a hierarchical communication structure is used (often referred to as frie automation pyramid), as depicted on the left side of Figure 2.
This design is based on the ISA95/99 modeL Industrial equipment is connected in small sub-systems which cover, for example, a production cell. These subsystems are separated by gateways and may use different communication technologies; each subsystem îs closely managed to be abîe to guarantee critical communication performance. On the next higher levels these subsystems are înterconnected e.g. for coordination among production cells and superviser/ control of the production system. This part related to manufacturing operations is called the operations technoiogy (OT) domain containing the critical communication, where the requirements become typically more demanding on the lower levels. Critical communication is today predominantly based on wired communication technologies like fieldbus or industrial Ethernet. The OT part of the network is securely separated from the IT part of the network containing the enterprise applications and services.
[0247] A broader digitalization of the manufacturing System is foreseen to provide increased flexibility and efficiency, by transforming manufacturing to a cyber-physical production system. Such a transition is also referred to as the fourth industrial révolution, or Industry 4.0. It is envisioned that the entire production system can be modeled, monitored, evaluated and steered with a digital twin. To that end, a fulî connectivity throughout the factory is desired, avoiding isolated conneciivity isiands on the shop floor level, as shown on the right side of Figure 2. The séparation of different domains of the network is thereby moved from physical séparation (via gateways) to a logical séparation. In this transition, IEEE 802.1 Time-Sensitive Networking (TSN) plays a central rôle, as it ailows to provide guaranteed high-performance conneciivity services for certain traffic flows on a common Ethernet infrastructure which is shared between critical and noncritica! communication. As a fully standardized solution, it ailows also convergence of the plurality of proprietary fieldbus technologies existing today to a global standard.
[0248] Wireless connectivity can bring great value to a manufacturing system. It can provide cost savings by avoiding extensive cabling, it can support new use cases that cannot be realized with wires (e.g. connecting mobile components). But in particular, it provides significant flexibiiity in redesigning the shop fïoor - which is a major trend towards Industry 4.0. Today the use of wireless technoiogy on the shop floor is very limited and fccused on non-critical communication provided via various different technologies. For critical communication services there is today no wireless technoiogy that can provide reliable and deterministic low latency.
[0249] 5G promises to provide reliable deterministic low latency services, while at the same time supporting eMBB and mMTC. (Note that 5G mMTC is based on LTE-M and NB-loT, which can be embedded into an NR carrier. Eventually an NR-based mMTC mode is expected.) To this end it may play a similar rôle on the wireless side to what TSN does for wired connectivity. It provides a universal, globally standardized technoiogy that converges ail service types and can spread wireless connectivity into much largerfields of the shop floor communication.
[0250] TSN has an additional raie to play for 5G. Industrial networks are long-îiving installations and the large majority of factories are already deployed. Introduction of new technoiogy is slow and cumbersome into existing brownfield installations. TSN is expected to trigger a redesign of building practices, which is expected to enter even industrial brownfield networks when feasible. By linking 5G to TSN as the wireless équivalent, TSN provides an opening market opportunity to help in transforming the brownfield market. This motivâtes a need for the 5G architecture solution to be largely aligned with TSN.
[0251] The intégration of 5G has to address a number of requirements:
• Local content: Production reiated data may not leave the industry/factory premises i.e. ail such data needs to be kept locally for e.g. security and trust reasons.
• Fui! control of critical connectivity: critical communication has to be in control of the industrial end user and linked to the operation System where interruption-less operation is managed.
• Local management: The management solution needs to be easy to integrate with the industry’s business and operational processes and inciude network observability.
• Local survivability: The connectivity solution is not to be dépendent on any external failures, i.e., it shall be self-contained when it cornes to survivability.
• Life Cycle Management (LCM): Several industries require LCM in the range of tens of years. This means that long-term availability of industrial devices and network infrastructure is needed, including ways for device configuration, firmware updates, application software updates, provisioning of identity credentiaîs, installation, provisioning and maintenance in field.
• Security: The connectivity network shali assure that only authorized traffic is allowed, and with the required level of confidentiality protection (e.g., encryption and/or integrity protection) applied. Functionaiities like protection against intrusion (hackers) from the Internet, maiware reaching devices and servers, tampering of data etc. shall also be supported. The support of different security zones should be enabled. And the network infrastructure îtself needs to be secure and protected from external attacks.
• Intégration with existing solutions: The connectivity solution needs to be integrated into existing wired OT system as well as to other wireless connected devices. One exemple is transport of Industrial Ethernet frames.
[0252] System Architecture
[0253] A 5G network integrated into an industrial system, as shown in Figure 3, needs the following fonctions:
• 5G radio access and core network for 5G connectivity, including radio connectivity, mobility support, service management and QoS including ail service categories URLLC, eMBB and mMTC with deterministic performance • High availability and redundancy • Network îdentities that enabie private network services (i.e. restricting network access and network services to a defined group of devices) • Security solutions based on secure credentials • Support for positioning and time synchronization • Network monitoring and QoS assurance mechanisms • A lightweight network management solution
A cloud computing infrastructure with deterministic performance and high avaiiability for industrial applications • Capability to integrate with existing industrials Systems (i.e. connectivity, cloud computing infrastructure, management System) • Capability to interwork with externat public networks for cases, where service continuity in and out of the factory is required
[0254] A 5G system can be deployed in different variants. In cases where local access to dedicated spectrum can be obtained by an industrial user, a standalone loca! 5G system can be deployed, as depicted in Figure 3. Such a standalone 5G network may ailow interworking with a public network, e.g. via roaming. Alternatively, federated network slicing can be applied, by creating a logical network siice, which is based on the physical infrastructure of two (or more) networks.
[0255] A local 5G system can also be reaîized as a non-public network service, that is provided by public mobile network operator at the industrial location, as depicted in Figure 4. An on-site local deployment of at least parts of the network infrastructure is typically needed. On-site data breakout ensures low latency and allows data privacy policies for information not leaving the site, TTte core controi functionality can be provided from the outside MNO sites, or it can be fuily or partially on-site, to support, for example, local survivability. While critical communication services are kept on-site via local breakout, some other funotions may also use outside termination of data sessions.
[0256] A combination of a standalone local network and a public MNO network can also be used as basis for providing a non-public network service across the two network domains. An industrial user might depioy a local network on-site, which togetherwith the public network infrastructure provides the non-public network service via federated network slicing. For example, the local deployment may be deployed to “harden” the public network, in terms of local coverage, avaiiability, capacity and computing resources. [0257] A local network can also provide neutral-host capabilities, by extending a public network on site in addition to providing a local standalone network. For this purpose, network sharing solutions such as multi-operator core network (MOCN) or multioperator radio access network (MORAN) can be applied. In shared network approaches, a resoufce management solution is needed that can provide guaranteed resources and performance for the different supported networks (or network slices). A network sharing solution may be well motîvated for both local and public network providers. The local provider can provide a free local site for the MNO, while the MNO may provide its spectrum resources for the network. Since the same base stations can support public and privaie services, some improved coexistence between the local and the public network should be possible. Further, a shared solution may be motivated by different services. For example, a public MNO may provide conventions! enterprise services on the industria! site, e.g., telephony, mobiie broadband and IT connectivity, while the private standalone local network is used for local industrial OT connectivity.
[0258] Network Slicinq for Industrial Înternet-of-Thinqs (loT)
[0259] Network slicing is considered as one approach to enable or realize Industrial loT network solutions. Network slicing can provide separate and isolated logical networks on a common shared infrastructure. It can e.g. be used, to • Separate different security zones in a factory, • Separate different service categories, e.g., to isolate critical communication from non-critical communication, • Provide a non-public HoT network on a public network infrastructure that is also used for public mobile communication.
[0260] Network slicing is a conceptuel way of viewing and realizing the provider network. Instead of the prevailing notion of a single and monolithic network serving multiple purposes, technology advancements such as Virtualization and SDN allows us to build logical networks on top of a common and shared infrastructure layer.
[0261] These “logical networks”, which may be called “network sîices” are established for a particular business purpose or even a particular customer (of the provider). They are end-to-end and complété in the context of the intended business purpose. They are and behave iike a network of its own, including ail the required capabilities and resources. This extends ail the way from the share of the infrastructure resources, through configured network functions to network management or even OSS/BSS capabilities. It encompasses both mobile and fixed network components. One expectation is that different slices are independent and isolated, even if they share common physicai resources, and thus provide a séparation of concems. Network slices may be defined to span across multiple physical network infrastructures, which is sometimes referred to a federated network slicing. This can provide even enable an alternative network realization to roaming.
[0262] Just as existing networks are built to reahze services, so are network slices, They are not services in themselves, but they are buiît to realize one or several services. As a spécial case, a service (or instance thereof) maps one-to-one with a network siice, allowing, for exemple, Wholesale type of services. Resources (physical or logical) can be dedicated to a slice, i.e. separate instances, or they could be shared across multiple slices. These resources are not necessarily ai! produced within the provider, some may in tact be services consumed from other providers, facilitating e.g. aggregation, roaming etc, [0263] Network slices may be defined as comprising a set of resources, as shown in Figure 5. This could be physical resources, either a share or profile allocated to a slice or even dedicated physical resources if motivated. Slices may also be defined as comprising logical entities such as configured network functions, management functions, VPNs etc. Resources (physical or logical) can be dedicated to a slice, i.e. separate instances, or they could be shared across multiple slices. These resources are not necessarily ail produced within the provider, some may in fact be services consumed from other providers, facilitating e.g. aggregation, roaming etc. Network slicing allows leasing of network capacity with assocîated service-level agreements (SLAs), for example.
[0264] As slices can be created to address a new business requirement or customer and may need to adapt to changes, they require a new type of life cycle management functions, which has the rôle of creating, changing (e.g., upgrading) or removing them. Network slicing allows for different network architectures which are optimized for the spécifie use case that the sîice is beîng used for, This optimisation for different network slices may include both optimizations in the functionai domain and in the geographical deployment of different functionality in the network, This can be seen in Figure 6, which illustrâtes an example of four different slices through the network. They also expect the service provider to support them with inclusion of industry spécifie services and or applications from other third parties or service providers in a cost efficient and timely manner.
[0265] The définition for network slicing is twofoid. For the general définition the one from GSMA is used: “From a mobile operator’s point of view, a network slice is an independent end-tc-end logical network that runs on a shared physical infrastructure, capable of providing a negotiated service quality”. Besides this general définition, several implémentations realîzîng the above exist and are often meant when network slicing” is mentioned. The most prominent one cornes from the 5G Core spécification, “System Architecture for the 5G System (5GS), Stage 2, 3GPP TS 23.501, v. 15,4.0 (December 2108): “Network Slice: A logical network that provides spécifie network capabilities and network characteristics [...] A Network Slice is defined within a PLMN and shall include: the Core Network Control Plane and User Plane Network Functions [...]”, Methods at least partly realizing above définition are not limited to 5G but also available in 4G networks.
[0266] With these définitions the basic network slice can be explained according to Figure 7;
• There is a shared physical infrastructure^ (see (1) in Figure 7).
One or more independent end-to-end iogicai networks (see (2) in Figure 7) are defined, which comprise:
a. A core network control plane,
b. User plane network fonctions, • These Iogicai networks can support negotiated service quality or specified service capabilities, or, in other words, a service ievel agréé ment (SLA) about the network slice capabilities (see (3) in Figure 7).
[0267] Once network slices hâve been defined, a first question is how a data traffic flow is assigned to or routed through the corresponding network slice. In many cases, a single device is making only use of a single slice, so the allocation can be made by assigning each UE to a spécifie network slice. However, in some cases a device may serve traffic for multiple siiees.
[0268] A baseline in mobile networks for service treatments to provide spécifie service performance and QoS are dedicated bearers; they are often a solution to futfdl the requirements of spécifie use cases or service, in the radio access network (RAN), the dedicated bearers map to radio bearers that can be used by the scheduler to deliver bearer-specific QoS. Spécifie resources may be reserved for certain dedicated bearers. At the network edges, bearers can be identified and treated individuaily based on filter on the packet headers. like the 5-tuple source IP address, destination IP address, source port number, destination port number, and protocol (UDP or TCP).
[0269] Figure 8 shows four available 4G methods to slice a network. For the first □ne, RAN sharing is applied, allowing eNBs to announce muttipie PLMN IDs. To utilise this approach, the RAN and Core need to support that feature, to assure the PLMN IDs are announced and traffic is appropriaieiy routed to/from the right Core network. The UE seîects the PLMN based on usual procedures of network sélection, including having preferred (home) networks. A UE can only be served by one PLMN (except for the cas© of muîti-SIM UEs). Currently, this solution is supported by every UE and by at least some network-sîde Systems.
[0270] The second solution relies on Access Point Names (APNs) configured in the UE. In this case, one PLMN ID is announced by the RAN but user plane traffic is routed to the right Core network based on the APN. A UE can even hâve multiple APNs configured resulting in multiple IP addresses (muiti-homing) when PDN sessions are established. Assuring the right source IP address is used when transmitting in the uplink is not straight forward. Setting more than one APN in the same UE for internet applications might not be supported by every device, This solution requires no changes to RAN but must be supported in the Core networks.
[0271] 3GPP had a study item named DECOR, now described in standards document as dedicated core network (DCN), which aüows for the sélection of a slice based on configuration in the network, ratherthan a preferred PLMN ID or APN settings, as done for the previous solutions. The feature must be supported in RAN and Core, and information from the home subscriber server (HSS) is used to détermine the “UE usage type” and, by this, attaching it to the right slice. There is no UE impact in this solution. [0272] A concept known as eDECOR further enhances this by allowing the UE to submit a DCN-ID to select the slice. To utilize this approach, the RAN, Core, and UE need to support the feature.
[0273] Both DECOR and eDECOR, only aliow one slice per UE but assure that UEs of different types are served by different slices. Within each dedicated core, multiple dedicated bearers and APNs can be used.
[0274] For Release 15 and beyond, 5G Slicing extends this feature to a theoreticaily unlimited number of siices, but implémentation and resource dépendent constraints in UE, RAN and Core will likely apply. As for 4G, several sub-options to realize slicing in 5G exist, but they will not be further drstinguished in this document.
[0275] Once traffic has been assigned to the corresponding slice, the next question is on how service performance can be provided. In many Industrial loT use cases, guaranteed service performance for prioriiized traffic is required. In a normal (Le., unsliced) 5G network, or within a single network slice, different traffic flows can be separated according to traffic flow séparation, as shown in Figure 9, which shows how QoS is applied in the 5G System. Dedicated resource allocations can be provided for critical traffic. Admission control is used to ensure that the number of admitted prioritized traffic flows with guaranteed transmission resources (i.e., guaranteed bitrate) do not exceed the a variable resources, with suffirent margin for resource variations, [0276] For resource partitioning between slices, the réservation of resources in the physicaî infrastructure is not per individual traffic flow, but instead based on the sum of critical traffic flows within a slice. This total requirement needs to be defined in the network slice SLA. The resource partitioning does not need to be static. Better efficiency can be achieved if unused resources of one slice can be used by another siice. This can be seen in Figure 10, which illustrâtes resource partitioning between example slices A and B. What is required is that each network slice can get access to the guaranteed service flows at any point in time (or at least to the availability level defined in the SLA).
[0277] Industrial Applications
[0278] Following is a discussion of several applications and activities that connect to industry technologies. This discussion includes a discussion of cloud robotics, which is a new technology that provtdes many addittonal benefits, compared to préviens technologies.
[0279] In Chapter 5.3.2 of '‘Study on Communication for Automation in Vertical Domains,” 3GPP TR 22.804, v. 16.2.0 (December2018), motion control is introduced as a use case for factories of the future. Motion control is essentiel for any automation application and, for example, is also fondamental for industrial robots. A robot’s motion or a printing machine's functionality is basically just a coordinated motion control of multiple actuators.
[0280] Motion control refers to the task of driving an actuator (or a group of actuators) in a way (and ensure that it is doing so) an application requires. Electronic motors are the most common actuators in industries. There are diverse ways to classify electrical motors (e.g. AC - DC (brushed/brush-less), stepper - servo - hybrid stepper). Nevertheless, the motion control principles are similar for each motor dass.
Communication technologies are used to coord in ate and synchronise multiple actuators and for higher layer control. Motion control applications with requirements on accuracy or précision are always implemented as a closed-loop control.
[0281] There is a common logical split in motion control Systems:
» Physical actuator (aka motor) & encoder (i.e. one or more sensors for speed, position etc.) • Driver (also calied inventer) • Motion controller • Programmable Logic Controller (PLC)
This logical split of motion control fonctions is ilîustrated in Figure 11.
[0282] Typical communication patterns in the motion control architecture (numbers as in Figure 11):
1) A PLC communicates higher level commands to the motion controller - this imposes less stringent communication requirements
2) The motion controller generates so called set points (might be speed, torque etc.) for the driver, by using, e.g.:
a. Pulse-width modulation, which is no communication technology
b. Protocole like EtherCat or Prof inet IRT or similar, with support of very fow cycle times, usually below 1 ms.
3) Currents fed from the driver to the motor - energy supply to the motors based on the set points, no communication technology.
4) Encoder (sensor) feedback to driver and/or the motion controiler; feedback dépends on type of motor and encoder. Feedback can be analogue or based on for example EtherCat or Profinet 1RT as in 2) with same requirements (cyclic closed loop set point transmission and feedback).
[0283] A single motion controiler might control multiple actuators, if for example several motors are used in the same machine. In the technical report mentioned above, the requirements for motion control applications (there the closed-loop is addressed:
motion controiler - driver - encoder) are listed - these requirements are reproduced in Table 1, below.
Application # of sensors 1 actuators Typical message size Cycle time Tcycre Service area
Printing Machine > 100 20 byte < 2 ms 100 mx 100 m x 30 m
Machine Tool ~ 20 50 byte < 0.5 ms 15 m x 15 m x 3 m
Packaging Machine - 50 40 byte < 1 ms 10mx5mx3m
Table 1 - Motion Control Requirements
[0284] In 3GPP TR 22.804, it is further mentioned that two consecutive packet losses are not acceptable and a very high synchronicity between ail devices involved (with a jitter below 1 usée) is required. The latter is mandatory to be able to take samples from distributed encoders and also apply new set points from the motion controiler to drivers at common sampling points. This is referred to as isochronous communication, which means that applications (so the motion control program as well an ail actuators and encoders) are in sync to the communication cycle timings given by the communication technology (for example, of Profinet). This also ensures minimal and deterministic latencies using timed channel access.
[0285] Several vendors of motion control equipment, such as motion control manufacturer Lenze, also combine functionaîities into single physical entities. On an upper “control level,” they use a combined PLC + motion controiler (Logic & Motion), next to a human-machine interface. This controiler takes input from IO-devices (3) and feeds its set points to e.g. the servo-in verte r (2) over EtherCat (Field Level”).
[0286] Another trend is to integrate encoder and/or driver and/or motion contrôler into the motor. This is also sometimes referred to as an integrated motor or a smart motor.
[0287] Furthermore, it is possible that multiple motion controllers are used for the sa me application; each motion contre lier Controls a subset of d ri vers. Coordinated motor movement requîtes communication between separated motion controllers. In 3GPP TR 22.804, this is referred to as 'Controller-to-Controller1 (C2C) communication. Cycle times between 4 to 10 ms are assumed. The requirements for synchronization are equaiiy strict, with a jitter below 1 usée also on the C2C level. Payload sizes may be up to 1kB. [0288] For safety reasons there may be an additional functional safety contro! depioyed in wireless motion control applications. Functional safety is impîemented as an additional closed-loop, next to the one used for motion control itself. This is done through additional hardware or integrated safety fonctions in the motion control components. Communication protocols like ProfiSafe are used. One safety restriction is, for example Safe Torque Off (STO) (from IEC 61800). STO defines, that in case any error/safety issue is detected by the PLC or an additional safety P LC, power delivery to the motor need to be stopped. An STO can for example be triggered by pressing an emergency button. In 3GPP TR 22.804, it is explained that for functional safety, a strictly cyclic data communication service is required between both ends. If connectivity is disturbed, an emergency stop is triggered, even if no real safety event has occurred. There are different requirements (4 ms to 12 ms cycle time, packet size 40 - 250 byte, toierable jitter in transmission according to 3GPP TR 22.804) for different use cases. Safety fonctions might be impîemented in different components of the motion control architecture.
[0289] To sum up, there are four different types of communication for motion control: 1) Lowest level closed-loop motion control (motion contrôler - driver - encoder) 2) Controller-to-controller communication
3) Functional safety communication
4) PLC to motion controller communication
The requirements for the communication System regarding latency are decreasing from 1 to 4. Whether it makes sense to establish links 1.- 4. over a wireless communication technoiogy is application dépendent. In most cases it might be most relevant to establish wireless links for 2), 3) and 4), but perhaps not for 1).
[0290] Cloud Robotics
[0291] In industrial robotics research and robotics in general, cloud robotics is a major topic, It describes how different cloud technologies can be used to provide additional benefits for various robotics tasks and thereby improving the flexibility and the capabilities of the whole System. Several studies hâve already shown the benefits of connecting robots to a cioud:
• Usage of more powerfuî computing resources in the cioud (e.g., for artificial intelligence, Aï, tasks).
• Use of almost unlimited data for analytics, decision making and learning (including digital shadows and real-time simulations).
• New types of use-cases are enabled (e.g., cooperative control in cioud).
• Lower cost per robot, as functionalities are offîoaded to a central cioud.
• A possibility to perform a failover in case one robot physically breaks from an upto-date backup in the cioud.
• Reliabiiity of functions can be improved by running multiple instances as hot standby in the cioud and the operation can immediately be taken overfrom faulty primary function without interruption.
• Makes the operation and maintenance easier (software updates, configuration change, monitoring, etc.).
• Saving energy, particuiarly for mobile, battery driven, robots, by offloading CPU energy consumption to the cioud.
[0292] High flexibility is indeed a key requirement for industry 4.0. It is needed to realize cost effective and customized production by supporting fast reconfiguration of production lines, as well as, easy application development. Typical industrial applications are tîme-sensitive and require highjy relia bîe communication end-to-end. The refore. 5G URLLC and edge cioud are necessary technologies to address the requirements, Although some cioud robotics applications don’t require real-time communication, still some do heavily, especially if the cloud’s processing is relevant for the immédiate motion □f the robot. In the following, some of the major challenges with industrial applications that can be addressed with cioud robotics are listed:
• Fast closed loop control (1-10 ms) between controller and device.
• Wireiess link between controller and device.
• Real-time industrial application in cioud execution environment (e.g., servo controller).
• tndustry-grade reliabiiity (e.g., the same as with cable based ProfiNet).
• Flexible production lines (easy rearrangement and reprogramming, low delay software updates, reconfiguration. Le., FaaS capability).
• Cooperative control and modular architecture.
• Adaptive aigorithms (e.g., for human-robot collaboration the control has to be adaptive to changing dynamic environments and need learning and cognitive capabilities).
• Shared data for different control applications.
[0293] In the following, briefly described are some cloud robotics scénarios that involve (real or emulated) 4G/5G connections and cloud technologies for industrial robotics applications.
[0294] One application of cloud robotics is to replace the hardware Programmable Logic Controîler (PLC) in a robot with a software version (soft-PLC) and run that in a virtualized environment/cloud on commodity HW components. A concept study of this involved a real robot cell with two large robot arms, a conveyor belt and some other industry devices. For the communication, ProfiNeiwas used.
[0295] One issue is what level of robot control can be shifted to the cloud over LTE. This is iîiustrated in Figure 12. The high-îevel control that is typically done by the PLC is not very delay critical, Le., it has a latency requirement of several tens of milliseconds (e.g., ~30 ms), depending on the configuration. However, the whole communication is very sensitive to delay variations (jitter) and packet losses. For instance, in the case of periodic traffic with 8 ms frequency, three consecutive packet losses or 3*8 (24) ms jitter can make the whole robot cell stop. Those requirements are straightforward to fulfih when using dedicated hardware components over a cable-based solution but can be challenging using virtualized execution over wireless technologies.
[0296] From the cloud platform perspective, one of the main challenges thaï virtualized control brings in is the execution of real-time applications. An application might use a soft-PLC that uses Windows 7 as a base OS, next to a real-time OS that is responsible for executing the PLC code. Both run in paralleî and communicate via inter· process communication (SPC). The control logic implémentation is always executed by the RTOS and Windows is often used as a user interface. The RTOS typically has some spécifie requirements to ensure the necessary performance such as précisé timers and spécifie network interface cards. A virtualized environment that can host the software PLC platform and execute the same control logic as the one that was running on the hardware PLC can be created.
[0297] In a real factory environment, placîng the PLC-level of control logic from dedicated HW into an edge-cloud platform is feasible, and works adequately even over LTE. However, if we investigate applications such as trajectory planning, inverse kinematics and control loops that accurately steer the speeds, accélérations or positions of the actuators, significantly lower latency in the range of 1-5 ms is required. To support those applications, the ultra-reliable and low-latency service of 5G is essential, as shown in Figure 12.
[02S8] One motivation behind moving motion control of robots to the cloud is again to increase flexibility. For instance, much easier to rearrange production Unes with cloudcontrolled devices, since only the devices need to be moved (no controller boxes), easier to manage, reprogram, do failover, or software updates in such an environment.
However, some functionalities should remain inside/close to the robot (using cables), for instance, some safety mechanisms in case of connectîvity problems. The requirements on the network are lowered if the robot could also perform its task without connectîvity. in case of temporarily connectîvity loss or reduced performance (due to for example extended robot mobility on the shop ftoor) the robot could reduce its working speed or activate other mechanisms to en sure safety or process targets winïîe being independent from the network. The robot controller as an additiona! entity next to the robot itself should be removed from the shop-floor. An architecture for this type of deployment is shown in Figure 13.
[0299] Another approach could be that the motion control is done inside the robot autonomously and the connectîvity is used only to enable new use-cases such as cooperative robot control. For cooperative control, one control entity may still need quick access to the actuai state of the other control processes. This option is valid in some scénarios when, for example, the motion control has 5 ms control loop inside the robot, but it needs to coordinate with another instance only in every -100 ms.
[0300] A robot controller including trajectory planning and execution, has been implemented, with the performance of a robot arm control application from a local cloud over a modelied wireiess channel being evaluated. The application under évaluation included the closed-loop contre) of a industrial robot arm, where control was connected to the robot arm through a modelled 5G link.
[0301] The effect of the link delay on the performance of the robot arm movement quality can be measured by spécifie key performance indicators (KPIs). The industrial robot arm has an extemally accessible velocity control interface that accepts velocity commands for each joint (servo) and publishes joint state information with 8 ms update time. KPIs may be response time and précision of trajectory execution, i.e., spatial and temporal déviations from the planed trajectory. Wieasuremet!ts hâve shown that network delays beîow 4 ms hâve no significant performance impact in this application. This is because (1) the internai operation of the robot ends in about 2 ms standard déviation in response time due to the internai sampling used in the robot, and (2) the ticks of the robot and the controller are unsynchronized. The impact of network delays beiow 4 ms is masked by the background noise of the measurement setup.
[0302] Several other conclusions can be reached:
• Reaction on extemal events: low network delay is desired, because the network delay between robot and controller directiy increases the reaction time, • Realtime trajectory refinement (i.e,, accu rate positioning of the end of the robot arm): Deadline on trajectory execution time leads to requirement on maximum tolerable network delay. In general, higher network delay makes the refinement time longer and, in this way, increases the total trajectory execution time.
• Trajectory Accuracy: Some tasks require accurate movement along the path such as weiding, and not only at the final position. Another example is the collaboration of more robot arms where the précisé and synchronized movements are crucial. For these tasks, low network delay ts desired if extemal information shall be respected in the trajectory planning.
[0303] The internai mechanisms of a robot arm can also put requirements on the network delay. In general, a System with low update time requires lower network delay. For instance, the controî of a robot arm with 20 ms update time, tolérâtes higher network delay than a more précisé and faster robot arm with 1 ms update time. In addition to this, providing ultra-low latency connection for a System with relatively high update time has limited performance advantage,
[0304] Performance requirements of trajectory execution can also put requirements on the network delay. Faster robot movements require lower network delay for accurate movement. On the other hand, if only a higher latency connection is available then using lower robot speed can compensate increased network delay to some extent. Performance optimization can also give guidelines for the required network delay. Choosing a proper required accuracy can improve the execution time. For example, if less accurate movement is enough, then relaxed accuracy can shorten the refinement time,
[0305] New robotic concepts and applications include massively collaborative robot control, as well as the use of digital twins in cyber-physical production Systems. These are briefly discussed in the beîow sections.
[0306] Hexapod
[0307] When introducing higher collaboration and adaptation capabilities into industrial applications such as robot arms and robot cell control, collaboration of a massive number of servos may be required, making the use case even more challenging. The hexapod robot is a useful application for evaluating a wide spectrum of challenges arising in an Industry 4.0 robot cell, e.g., servo control, collaboration, etc. Figure 14 illustrâtes a hexapod robot, which may be viewed as a collaborative, robot-vendoragnosiic system, coupled with a 5G slice for cîoud-based control.
[0308] The hexapod can be considered as six 3-degree of freedom robotic arms connected via a base link. For evaluating 5G requirements, the serves atthe 18 joints may be controlled separately from a computer residing a wireless network hop away from the hexapod. This way the hexapod proves to be an appropriate choice for visualizing the effect of synchronized collaboration. WeH-synchronized collaboration should resuit in a stable center position, while any glitch in the System results in jiggling of the platform. Results of an évaluation of wireless control of the hexapod hâve been reported in Geza Szabo, Sandor Racz, Norbert Reider, Jozsef Peto, “QoC-aware Remote Control of a Hexapod Platform,” ACM Sigcomm, Budapest, 2018.
[0309] Digital Twin
[0310] The Digital Twin (DT) concept is usefui for analyzing the effects of network on the control of a real robot, where its DT runs in a complex robot cell executing agile robot tasks. A realizable DT may be implemented in the Gazebo simulation environment and evaluated against a fully simutated scénario solving the Agile Robotics for Industrial Automation Compétition (ARIAC). Rnis évaluation deals with issues of the different command frequencies, control loops and handling of dynamics of the real and simulated robot. An évaluation of the architecture in a hardware agnostic Gazebo plugin shows that the simulation of the network controlling a simulated robot can be used in low-delay scénarios. In high-delay scénarios the simulated latency provides approximately ~10% more room regarding the delay size till the complété failure oceurs in the robot cell. These results are reported in Ben Kehoe, Sachin Patil, Pieter Abbeel, Ken Goldberg, “Survey of Research on Cloud Robotics and Automation, IEEE Transactions on Automation Science and Engineering (T-ASE): Spécial Issue on Cloud Robotics and Automation. Vol. 12, no. 2. Apr. 2015.
[0311] Positioninq
[0312] Positioning is recognized as an important functionality in industry and manufacturing scénarios, with use cases such as personnel tracking (e.g., in mines), safety (e.g., when working close to forkiifts), locating tools in manufactura ng/assembly floors, supply chain optimization, opération of automatic guided vehicles, etc. Most usëcases require only relative positioning, e.g., where ail positions are defîned relative to a common référencé point in a factory hall.
[0313] The required positioning accuracy, as weii as the environment and radio conditions where positioning is to be performed, vary signifîcantly between different use cases. However, most manufacturing use cases are indoor, like for example a factory hall or the tunnels in a mine. This implies that global navigation satellite System (GNSS) based solutions are difficult to use because of the very low signai sirengih levels received indoors from satellite transmissions, resulting in no or bad coverage.
[0314] The limitations of GNSS Systems indoors hâve opened for cellular based positioning solutions. Commoniy used positioning solutions in industries and factory floors today are based on Wi-Fi, radio-frequency identification (RFID), Bluetooth low energy (BLE), ultra-wide band (UWB) and LTE. Narrowband (NB)-loT and CAT-M are 3GPP LTE technologies to address low complexity, low power, low cost devices, and are therefore the only realistic 3GPP positioning solution for use cases where the asset to be positioned doesn’t already contain a 3GPP modem for communication needs. Radio solutions, such as RADAR, and non-radio solutions, like LIDAR and computer vision Systems, are also important especially when positioning with high (sub-meter) accuracy is required.
[0315] Multipath propagation is often a critical error source for positioning. In industry halls, the delay spread of the paths is typically relatively short, but these are stiü critical given the requirementsforaccurate positioning in such environments. Most positioning algorithms work under the assumption of availabiiity of line-ofsight measurements and there are no straightforward ways to distinguish between line-ofsight (LoS) and non-line-of-sight (nLoS). If an nLoS path is mistakenly used instead of a LoS path for positioning, both the time-of-f!ight and the angle of arrivai might be misleading. The time-of-flight of the nLoS path will be an upper bound of the time-of-flight of the LoS path, whiie the angle of arrivai can be completely wrong. Therefore, nLoS paths may greatly dégradé the performance of positioning algorithms. Future industrial positioning schemes need to tackle this issue satisfactorily.
[0316] Another obstacle to précisé positioning is network synchronization errors. Practical network synchronization algorithms can impiy network synchronization errors of up to 360 ns, which corresponds to ±110m of positioning error. A promising alternative to improve the positioning accuracy is radio-interface-based-monitoring (RIBM). This solution is based on base station timing measurements of positioning reference signais from neighboring base stations and estimâtes the synchronization offset between base stations so that virtuai synchronization” with much beiter accuracy can be providêd. Alternative^, positioning techniques that dont require network synchronization, e.g. techniques based on round-trip time and/or angle of arrivai measurements, can be considered. Note that any estimâtes of positioning accuracy stated herein assume that good network synchronization ha s been achieved, e.g. using RIBM.
[0317] Positioning accuracy, especially between time instants where measurements are performed, can be significantiy improved by considering the irajectory of movement. Furthermore, inertiai measurement units (IMUs) are becoming increasingly widely adopted in terminais as a means of updating position estimâtes. They use accelerometers and gyroscopes (and sometimes a!so magnetometers) to track movement of the terminal.
[0318] Deployment Aspects
[0319] To reduce cost and simplify deployment, solutions where one System is used both for communication and positioning are preferred. This is especially important in environments where deployment of a separate positioning System is difficult and cosily, for example in mines where the installation cost of each node is often high. However, if the communication depioyment, which may comprise one or a few micro base stations, for example, doesn’t provide sufficiently good positioning accuracy, a separate or complimentary positioning System added on top of the communication System may bo the best solution, since high-precision positioning typically requires a much denser deployment than communication.
[0320] The positioning accuracy that can be achieved dépends to great extent on how dense the deployment is and the characteristics of the radio environment. Densification of the communication network may thus be a means to achieve improved positioning accuracy. A dense deployment is especially important in environments with severe multipath propagation, especially if the multipath propagation is dynamically changing, since there may otherwîse not be sufficiently many LoS paths available to estimate the position. A dense deployment may also be necessary to ensure that hidden objects with high signal atténuation can be localized.
[0321] The density of the network is a key aspect for providing good enough positioning accuracy in manufacturing scénarios. Another deployment aspect to consider is how simple it is to install the anchor nodes. Installation may for example include manualîy providing the exact position of the anchor, which may be difficult, time consuming and enror prône. To avoid this, a simultaneous iocalization and mapping (SLAM) aigorithm may be used to estimate the position of each anchor in the initialisation phase.
[0322] To make dense deployments cost effective, the cost of each anchor must be kept low. However, the cost of each anchor/base station for technologies providing both communication and positioning is naturally higher than for technologies only providing positioning, e.g. RFID and UWB. One way to reduce the cost involved in densification of the communication network to achieve high-precision positioning may be to develop simple anchors, using the same technology as the costlier base stations, with reduced capability that only provides positioning. For example, only one or a few highîy capable NR base stations mounted in the ceiiing of a factory hall may be sufficient to provide communication coverage. Less capable NR positioning nodes/anchors can then be used for densification to achieve positioning with high accuracy.
[0323] Another way to reduce the need for a very dense deployment may be to combine the advanced beamforming capability of NR with reflectors. !n this way, every pair of transmit beam and reflector may act as a Virtual anchor, thereby achieving the benefits of a very dense deployment with only a few N R base stations. One challenge with such a solution is stability, since the reflectors should be stationary or at least only slowly changing to ensure a stable positioning accuracy.
[0324] Spectrum Aspects
[0325] It is well-known that positioning accuracy improves with increased bandwidth. Furthermore, higher signal bandwidth enables greater resolution of the LoS leading edge from the nLoS dominant received signal and ii is therefore easier to accurately detect the LoS paths. On the other hand, using higher carrier frequency may reduce the detectabiliiy of the LoS path due to increased signal atténuation.
[0326] Frequency bands for local usage are currently being defined, e.g., the 3.7-3.8 GHz band in Germany and Sweden. Nation-wide spectrum and/or unlicensed spectrum may be used for industries as weil. 100 MHz bandwidth should be sufficient to achieve sub-meter positioning accuracy. To improve performance further, different spectrum chunks may be combined.
[0327] Accuracy Requirements
[0328] Positioning accuracy requirements range from millimeter to several tenths-ofmeters level. For example, drilling and bîasting in mines as well as automated manufacturing (afignment, assembly) may benefit from miliimeter-to-centimeter accuracy. Other examples where centimeter-to-decimeter accuracy is desired include locating tools in manufacturing/assembly floors and tracking of automated guided vehicles. Decimeterto-meter accuracy is required for some safety solutions, for example tracking of personnel and real-tîme wamings for personnel working close to a forklift, but also when considering for example supply chain optimization and asset tracking (e.g. tools, machines).
[0329] 3GPP hâve documented positioning requirements for 5G positioning services in TS22.104, Section 5.7, Positioning performance requirements.” Table 2 excerpts some of these requirements. According to 3GPP, depending on the use case, the SG system should support the use of 3GPP and non-3GPP technologies to achieve higheraccuracy positioning.
Scénario Horizontal accuracy Availabilit y Heading Latency for position esti matio n of UE UE Speed
Mobile control panels with safety functions (non-danger zones) <5 m 90% N/A < 5s N/A
Process automation plant asset management < 1 m 90% N/A < 2 s < 30 km/h
Flexible, modular assembly area in smart factories (for tracking of tools at the work-place location) < 1 m (relative positioning) 99 % N/A 1 s < 30 km/h
Augmented reality in smart factories < 1 m 99 % < 0,17 ra d < 15 ms < 10 km/h
Mobile control panels with safety functions in smart factories (within factory danger zones) < 1 m 99,9 % < 0,54 ra d < 1 s N/A
Flexible, modular assembly area in smart factories (for autonomous vehicles, only for monitoring proposes) < 50 cm 99 % N/A 1 s < 30 km/h
Inbound logistics for manufacturing (for driving trajectories (if supported by further sensors like caméra, GNSS, IMU) of < 30 cm (if supported by further sensors like caméra, 99,9 % N/A 10 ms < 30 km/h
autonomous driving Systems)) GNSS, IMU)
Inbound iogistics for manufacturing (for storage of goods) < 20 cm 99 % N/A < 1 s < 30 km/h
Table 2 ~ Summary of Positionîng Requirements from 3GPP TS 22.104
[0330] OverView of Positionîng Technologies
[0331] Below, an overview of positionîng technologies that may be useful for manufacturing is given, with some focus on how they can be applied in a manufacturing scénario. The focus lies on 3GPP techniques, but a number of other techniques are considered here as well. Positionîng using RFID and BLE beacons has not been included in this overview, but it will be appreciated that many of the same principles apply there, and that the various technologies described herein may be combined with these and other positionîng technologies.
[0332] LTE OTDOA
[0333] Since Release 9, LTE supports observed time-difference of arrivai (OTDOA) positionîng, which is based on reference-signa! time différence (RSTD) measurements that are described in 3GPP TS 36.305. The UE receives positionîng reference signais (PRSs) from neighboring cells, estimâtes time of arrivai (TOA) for each cell using RSTD measurements, and reports back the TOA with respect to a reference cell. Afterwards, the evolved serving mobile location centre (E-SMLC) estimâtes the position of the UE based on known eNB positions, The time différence of arrivai (TDOA) is used with respect to a reference cell instead of TOA, because this removes requirement that the UE be time-synchronized, although the network needs to be synchronized. In principte, a minimum of 3 cells are needed for 2D positionîng and a minimum of 4 cells are needed for 3D positionîng.
[0334] Figure 15 illustrâtes how the UE position can be estimated from 3 eNBs, in accordance with the principles of OTDOA, and is a conceptuaî plot of 2D TDOA-based positionîng, assuming perfect TDOA measurements. Each TDOA (TOA of reference eNB minus TOA of eNB) translates into a différence in distance (e.g., in meters) when multiplied by the speed of light. Each TDOA retums a hyperbola on the 2D plane of possible UE positions. The intersection of such hyperbolas is then the UE position. In practice, the position is estimated by the E-SMLC using Gauss-Newton search or similar numerica! algorithme.
[0335] In LTE, RSTD can be estîmated based on cell-specific signais or based on optionalîy defined PRSs. However, the TDOA estimation procedure typically uses PRSs because other cell-specific reference signais cannot guarantee high enough probability of détection of neighbouring cells at low (sub -6 dB) signal to interférence and noise ratio (S1NR). The PRSs are defined from Gold sequences initiaüzed by time variables (slot number within a frame and OFDM symbol number within a Slot) and PRS ID, and allocated in a diagonal pattern that is shifted in subcarrier. Essentially, three main factors contribute to high PRS detectabiiity:
• The Gold sequences guarantee low cross-correlation properties.
• There are 2 PRS resource éléments per resource block and OFDM symbol with a distance (reuse factor) of 6 subcarriers. The spécifie location of each PRS diagonal is determined by PRS ID mod 6. The subcarriers not used for PRS are empty in order to creaie LIS (low interférence subframes), • The PRS can be muted on some transmission occasions to increase the SINR when receiving PRS from distant cells.
[0336] The RSTD is drawn from the power delay profile (P DP) generated by cross correlating the received downlink baseband signa! with the PRS. The challenge here is to detect the earliest peak in the PDP which is not a noise peak and then take the peak delays in terms of multiples of sampies. A major source of TOA erroris nLoS conditions where the LoS path is not detected due to blocking or shadowing.
[0337] The positioning accuracy that can be achieved with LTE OTDOA in practical deployments is in the order of 50-100mfor Release 9. in LTE Release 14, the report resolution to the E-SMLC was changed from Ts to Ts/2, where Ts is the basic time unit in LTE (32.55 ns), to improve the relative distance resolution from 9.8m to 4.9m. It is however stili unclear what accuracy can be achieved in practice. In addition, OTDOA requires network synchronization and any synchronization error reduces the positioning accuracy that can be achieved. For LTE, there are mobile broad band (MBB) UE chipsets available that cover most of the positioning methods standardized up to Release 14.
[0338] Figure 16 shows OTDOA positioning results for the 3GPP Indoor Open Office (!OO) scénario, using different bandwidths of 100MHz (30kHz SCS, 275 PRBs), 50MHz (15kHz SCS, 275 PRBs), 10MHz (15kHz SCS, 50 PRBs), 5MHz (15kHz, 25 PRBs). The plot is based on the use of the already existing tracking reference signal (TRS) for positioning as baseline in NR.
[0339] The scénario assumes 6 gNBs (a total of 12 gNBs) separated by 20 meters. (“g N B” is the 3GPP terminology for an NR base station.) The results show that the positioning accuracy is improved significantiy when increasing the bandwidth from 5MHz to 10MHz and as much when further increasing the bandwidth to 50 MHz. However, it can also be seen that the 100MHz and 50MHz results do not differ much, with around 8 meters accuracy at tne 80% percentile. The 100MHz case can be further improved by using a more advanced peak search algorithm for time-of-arrival (TOA) estimation. In the 5 cubent simulations, the earliest peak in the PDP that is at îeast half as high as the highest peak is taken as the LOS peak. If the signal-to-noise ratio (SNR) is increased, the probability of detecting a peak above the noise floor can be improved. Furthermore, errors larger than the inter-site distance (ISO) of 20m can in practice be compensated by combining with a simple cell-ID (CID) estimate if the OTDOA becomes unreasonable, 10 which is not done here.
[0340] Narra wband (NB)-loT and CAT-M are 3GPP LTE technologies to address low complexity, low power and low-cost devices. Tne availability of such low-cost devices makes this the only realistic 3GPP solution for use cases where the asset to be positicned doesn’t already contain a 3GPP modem for communication needs. However, 15 the positioning accuracy is significantly worse when using loT devices, mainly because of the narraw bandwidth used. A simulation study démonstrated 100m positioning error at the 70% percentile for NB-loT in an indoor deployment, while LTE using 50 PRBs for positioning gave ~23m at the 70% percentile in the same scénario.
[0341] The narrow bandwidth of NB-loT devices is compensated partly by enabling 20 longer PRS occasions in time. However, the corrélation properties are poor since the
PRS is repeated every frame (10ms). NB-loT devices also hâve lower sampling rates to reduce power consumption, which reduces the accuracy of RSTD measurements.
[0342] Chipsets for LTE ΙοΤ-devices are not as readily available as for LTE MBB. However, development is ongoing, and the availability is slowly improving.
[0343] loT positioning for NR is not defined as of December 2018, but one enabler for better loT positioning accuracy is to improve the time-correlation properties of the PRS, e.g. by increasing the PRS répétition interval. Carrier-aggregation for NB-loT has also been discussed and the increased bandwidth may in this case be another enabler for improved ioT positioning. Another alternative may be to modify the phase of the eNB
PRS, thereby ensuring that the NB-loT devices can sample at low rates and stiîl detect the phases of the PRSs.
[0344] LTE Enhanced Ceïl-ID Positioning
[0345] Enhanced Cell ID, or E-CID, was introduced in LTE Release 9. The UE reports to the network the serving cell ID, the timing advance and the IDs, est i mats d 35 timing and power of the detected neighbor cells. The eNB may report extra information to the positioning server, like the angle of arrivai, cell portion, round-trip time, etc. The positioning server estimâtes the UE position based on this information and its knowledge of the cell's locations.
[0346] The accuracy of E-CID dépends mainly on the deployment density. For outdoor deployments, the accuracy of E-CID may be in the order of 100m, for urban environments with ISD of less than a few hundred meters, or in the order of 3000m, for rural environments with ISD up to several kilometers. The accuracy of E-CID for manufacturing-like environments has not been studied, but the accuracy is expected to be in the order of the ISD, since the environment contains many multipaths and for example angle-of-arrival data may be misleading, due to reflections. On the other hand, even in such a chaiienging scénario, RF fingerprinting should be able to give an accuracy of a few meters if the radio propagation is stable and a calibration/training phase is feasible.
[0347] NR Positioning Features
[0348] As of December 2018, there is no defined concept for NR positioning. One can envision N R features which enable improved positioning accuracy over LTE OTDOA. Some of these features corne with new challenges as well;
• Better ranging and angle-of-arrival/departure (AoA/AoD) estimâtes in beam-based Systems.
• Higher carrier frequencies are supported in NR, meaning that signais are more susceptible to blocking/shadowing. This may in part be handled by beamforming. Furthermore, higher carrier frequencies typically corne with wider bandwidths, enabling better RSTD resolution.
• Denser deployments in terms of smailer inter-site distance and cell radius. This, combined with beamforming using beam IDs for spécifie beams, require more sophisticated Go'd sequence initializations te préserve code orthogonality for ali possible beam/ceil-ID combinations.
• Better time alignments are expected in NR, thereby reducing the time synchronization error.
• The basic time unit is reduced in NR compared to LTE. The maximum number of PRBs is 275 (compared to 110 in LTE), requiring an FFT length of 4096 which is double to that of LTE. Furthermore, the sub-carrier spacing ranges from 15kHz to 240kHz. Essentially, this implies shorter sampling intervals than in LTE, improving the TOA positioning resolution.
[0343] Expectations are that the solutions standardized for NR Rel-16 will provide the tools needed to achieve sub-meter accuracy. Link-level simulations showing the technology potential of N R indicate that sub-decimeter accuracy could be possible in theory. The Release 16 NR positioning 3GPP study item started in October2018.
[Û350] Positioning Using the Radio Dot System
[0351] Ericsson’s Radio Dot System (RDS) is well suîted for communication in indoor industry and manufacturing scénarios. However, with RDS products available as of December 2018, only cell-ID based positioning is available, since it is not possible to distinguish DOTs connected to the same IRU from each other. Furthermore, an RDS is often deployed with large cells since up to 8 DOTs can be connected to the same IRU. With the digital 5G DOT, up to 16 DOTs can be connected to the same IRU.
[0352] împrovement of the positioning accuracy, making per DOT positioning possible, has been proposed. UE position is calculated using an uplink time différence of arrivai (UTDOA) algorîthm combined with DOT level power. Simulations hâve shown that positioning errons of less than 1 meter can be achieved with good SNR and good DOT geometry iayout. However, positioning errors in the order of 1-5 meters are likely, when taking varions error sources, like the accuracy of DOT positions and DOT cable length delays, into account.
[0353] For typîcal manufacturing scénarios with severe muîtipaths, it appears that the radio dot System (RDS) is the most suitable solution for providing combined communication and positioning, due to dense deployment and low cost of the nodes. [0354] Wi-Fi Positioning
[0355] Wi-Fi is already commonly deployed in industries and is therefore often used for positioning as well. One commonly deployed Wi-Fi solution is the ARUBA solution, which can achieve, with access point received signal strength indicator (RSSl) alone, around 5-10m accuracy, depending on shadowing and antenna patterns. To achieve better positioning accuracy, the ARUBA solution can be combined with Bluetooth low energy (BLE) battery powered ARUMBA beacons. With this specialized positioning solution, very good accuracy of < 3m is likely to be achieved, and even accuracy of <1m can be possible when the device to be positioned is located close to a beacon.
[0356] The leading industrial Wi-Fi positioning solution achieves 1m to 3m average accuracy in office environments. This positioning solution includes an additional WiFi radio, with a specialized antenna array, that is included in the same unit as the WiFi radio used for communication. The positions are esiimated using a combination of RSSl and angle-of-arrival (AoA) measurements.
[0357] A différence between Wi-Fi positioning and 3GPP based OTDOA positioning is that Wi-Fi positioning (IEEE 802.11 me) may be based on round-trip time (RTT). In contrast to the OTDOA algorithm described above, the advantage of using RTT is that there is no need for network time synchronization.
[0358] UWB
[0359] Ultra-wide-band (UWB) techniques hâve become increasingly popular in positioning solutions, since the inhérent high time resolution in UWB signais enable précisé positioning. There are several UWB-based positioning products available. Many of them are based on Deçà Wave UWB technology, but there are also proprietary solutions (e.g., Zébra).
[0360] UWB can be used in multiple algorithms. It can support downlink or uplink TDOA, angle of arrivai using multiple antennas, as well as direct range measurements, where network time synchronization is not needed at ail.
[0361] Due to the nature of the very short transmission puises used in UWB techniques, UWB can detect and eliminate problems due to multipath propagation, since reflections are individually detected and can be fiîtered. This is a clear advantage compared to narrow band Systems, where such discrimination is not possible. The précision of time of flight is in the range of 2-5 cm. When applied in a real environment, the positioning accuracy with UWB is on the scale of 10 cm.
[0362] One advantage of UWB is the potential for cheap devices, compared to 3GPP modules. Commercial UWB transceivers are available for approximately 3-4 USD. This enables increased installation density, flexible choice of algorithms to support various use-cases and cloud platform to support a global ecosystem that can serve various segments globaîly.
[0363] Lidar
[0364] Some positioning techniques estimate the distance by measuring the roundtri p delay of an ultra sonie or eîectromagnetic wave to the object. Ultrasonic waves suffer large losses in air and cannot reach distances beyond a few meters. Radars and lidars use eîectromagnetic waves in radio and optical spectra, respectively. The shorter wavelengths of the optical waves compared to the radio frequency waves translates into better resolution and lidar solutions are therefore a favorable choice for high accuracy positioning. As in radar solutions, the main components of a typical lidar include a transmuter and a receiver and the distance is measured based on the round-trip delay of light to the target. This is achieved by moduîating the intensiiy, phase, and/or frequency of the waveform of the transmitted light and measuring the time required for that modulation pattern to appear back at the receiver.
[0365] Popular lidar architectures include pulsed and frequency-modulated continuous-wave (FMCW) schemes. Pulsed lidars rely on the particle properties of light and can provide modéra te précision over a wide window of ranges, while FMCW lidars rely on the wave properties of the light In these lidars, the modulation is applied to the frequency of the light field and the large frequency bandwidth in the optical domain becomes accessible and can be exploited to achieve very high précision localisation with accuracy in the nano-meter range.
[0366] Summary of Positioning Techniques
[0367] Important properties of the positioning techniques discussed in this section are summarized in Table 3. Note that the accuracy numbers stated are only for indicative purpose. The actual positioning accuracy dépends on various factors, including but not limited to the network deployment, cell planning, radio environment, etc.
Method Accuracy Devices and ! Intégration | Network - Deployment
a ne hors , with comm. i synchronisation : aspects
System required
LTE OTDOA Rel-9: ~50- Expensivé : Yes Yes : A few eNBs in
100m devices and the ceiling are
Rel-14: anchors often sufficient
Standard Can be used for
support for with NB-loT if j ; communication
~5 m cheap .---/.)--:47-: ‘ coverage in a
/-.'û devices are --r -TTA factory hall
required
NR OTDOA Sub-meter Expensive : Yes ‘ OTDOA: Yes A few gNBs in
AoA accuracy is devices and AoA: No , the ceiling are
expected anchors often sufficient
expected, at for
least in the communication
near future coverage in a
factory hall
Radio CID Today: Ceii- Medium cost Yes CID: No - Typically
Dot UTDOA ID only, peranchor UTODA: Yes deployed with
-30-200m ; 20m ISD
H2 2020: ' 7:-.-7-7.:/77/7::
• - · - . ’ - Per-dot
localisation
NB- : support, ~3- : Cheap ; Yes, for : Yes One eNB can be
otdoa i 5m . LTE
loT OTDOA: devices limited sufficient for
100m at throughput communication
70%- i and relaxed coverage, but
। percentile , latency denser
indoor requirements deployment is
RDS: In needed to
future, <5m perform
may be positioning
possible
Wi-Fi RSSI : Standard Relatively : Yes No Typical coverage
AoA x solution: 5- expensive · + · -.7 range is around
RTT 10m anchors 50m, but Aps are
Specialized when oftèn depioyed
solution: 1- ’ specialized /?//?. more densely
3m for ////· · -
^positioning
UWB OTDOA i Products on Cheap No OTDOA:Yes Often depioyed
UTDOA : the market devices and UTDOA: Yes very densely,
AoA claim 0.1m anchors AoA: No ? e.g. with 10m
RSSI accuracy Complexity RSSI: No ISO
and power Solutions for
consumption i simple
in anchor configuration are
ratherthan in available
device
Table 3 - Summary of Positioning techniques
[0368] Hvbrid Positioning
[0369] Many devices in the market today are equipped with sensors such as an
inertial measurement unit (IMU). The IMU may contain a 3-axis gyroscope and a 3-axis
accelerometer, for example. Data provided by the IMU can enable the location server to estimate the UE trajectory between, after, or during an OTDOA/E-CID positioning session, and can reduce the need for frequent OTDOA/E-CID measurements. A hybrid positioning solution using IMU may also be bénéficiai in scénarios where the device may move out of positioning coverage part of the time, thereby increasing the positioning reiiability. An exampie use of IMU data together with position estimâtes is illustrated in Figure 17. The same method may be applied even if IMU measurements are not available, by estimating the speed and direction from old position estimâtes and predicting the UE trajectory.
[0370] Note that a positioning System solely based on IM U is a relative positioning System, i.e,, it can estimate the position of a UE relative to a known coordinate, For example, the pressure différence over a period translates to an altitude change, and an accélération during a period indicates a change of speed.
[0371] !n order to fuse the radio measurements with IMU data, it is required that the data reported from the IMU equipped UE is aligned with a standardized earth bounded coordinate system. Or, that the UE reported IMU measurements can enable the location server to translate the measurements into an earth-bounded coordinate system. To get the UE position in earth-coordinates, the orientation of the device is nseded. A common method to détermine the orientation is to use gyroscope, magneiometer and accelerometer. After the orientation is estimated, one can use the orientation and accelerometer to estimate the accélération relative the coordinate system (accelerometer minus gravity). By having the relative accélération, it is possible to estimate the relative displacement of the device by, for example, double intégration.
[0372] LTE Rel-15 includes support for IMU positioning and spécification of the signaling and procedure to support IMU positioning over the Location Positioning Protocol (LPP), as weli as hybrid positioning that includes IMU reiated estimâtes.
[0373] Network Synchronization Accuracy
[0374] For OTDOA as well as uplink time-difference of arrivai (UTDOA), which is the positioning method supported in LTE, network synchronization errors leading to errors in the TDOA estimâtes may dominate the overall positioning error. It is therefore important to understand what network synchronization accuracy that can be achieved. The synchronization errors can in principle be directly translated to positioning errors by considering the distance light travels during the timing error caused by the synchronization error, that is, a synchronization error of 1 ns corresponds to a positioning error of 0.3m.
[0375] The synchronization error mainly consists of four additive parts:
1) Error in extemal synchronization reference delivered to the anchor (baseband unit for macro base station and DOT).
2) Synchronization error between anchor (baseband unit) and extemal synchronization reference.
3) Synchronization error within the radio base station (RBS).
4) Synchronisation error between the RBS antenna and the UE.
[0376] When con side ring manufacturing scénarios, we hâve the following situation for each of the four parts:
1) The external synchronisation reference typically cornes from a GNSS receiver. A GNSS receiver might hâve an accuracy of < 50 ns when it has LoS to a large portion of the sky, but when there is muiti-path, the accuracy decreases rapidly and the assumed accuracy from an indoor GNSS receiver is < 200ns. The external synchronisation can be improved by using a more expensive GNSS receiver with better muitipath filtering and better internai accuracy.
2) The baseband unit can synchronize to a GNSS receiver with an accuracy of around 150 ns. This number can only be improved by using better hardware, that is, a new baseband unit.
3) The budget for internai distribution is 130 ns. What it will be in practice dépends a lot of the hardware configuration of the RBS. The simplest is a single baseband unit connected directly with one hop to an antenna integrated radio (AIR) unit.
4) How large the synchronization error between the RBS antenna and the UE will be unclear. However, this error will not impact the OTDOA positionîng error since OTDOA builds on the phase of the PRS observed by the UE in the position it is, and synchronization between network and UE is not requîred.
[0377] The discussion above assumes the RBS is time locked to the reference. When the RBS goes to time hoidover, the accuracy may decrease.
[0378] The numbers above can be significantly improved by radio-interface based monitoring (RIBM), where the phase différence between an RBS antenna and a reference is measured and reported. The reported phase différence can then be accounted for when calculating the position of an object. The synchronization error remains, but the part of the error which is accounted for will not affect the OTDOA positionîng accuracy. This is a promising method, since RIBM may achieve a Virtual synchronization accuracy of about 20 ns between RBSs. Thereby, the external synchronization reference error 1) does not affect the OTDOA positionîng and can be ignored.
[0379] For RDS, the synchronization between the DOTs connected to the same indoor radio unit (IRU) is in the orderof 6 ns, under the assumption that the IRU contains common DOT hardware. This holds for both the îegacy DOT available today and the digital 5G DOT that will be available in 2019. RIBM may be a solution to achieve synchronisation between DOTs connected to different IR Us but may reçu ire a specialized feature to operate, since the standard RIBM algorithm require the node to be synchronized to receive when not transmitting, which DOTs do not.
[0380] in summary, practical network synchronization algorithme can impîy network synchronization errors of up ta 360 ns, when îocked to the GNSS reference, which corresponds to a positioning error of up to ±110m (3 sigma), if the RBS is in time holdover, the accuracy can be even worse. In the future, RIBM may provide virtual synchronization accuracy of about 20 ns, which corresponds to a positioning error of 6 m. For RDS, positioning using DOTs connected to the same IRU is affected by synchronization errors of about 6 ns, which corresponds to a positioning error of around 2 m. If DOTs connected to different IRUs are utiîized to estimate the position, RIBM may in the future be applied to provide virtual synchronization accuracy of about 20 ns.
[0381] Improvinq Accuracy in Severe Multipath Scénarios
[0382] LTE OTDOA, as well as other positioning algorithms, suffer severe penalties in ternis of positioning accuracy if there is no way to handle the problem of multipath. In essence, OTDOA assumes that the RSTD represents the LoS path, but it is in general hard to détermine whether or not the LoS-paih is blocked or very damped, At the very least, one can say that an nLoS path represents an upper bound on the distance between transmitter and receiver. The multipath problem is significant in typical industry environments, especiaily for high frequencies. Some approaches which address the multipath problem include:
• Design the network to hâve good LoS conditions by placing nodes at favorable locations, for exampie by using a planning tool which can estimate the positioning accuracy of a number of reference locations. This may impîy higher installation complexity and may not be feasible for industry environments with many moving objects, • Estimate nLoS using hypothesis testing, e.g,, feasibility tests using positions from subsets of TOA/TDOA estimâtes. If the estimate is incohérent, categorize it as nLoS. This method may hâve high computational complexity for dense networks.
• Another alternative is to consider position updates based on IMU measurements and dead-reckoning as a reference and categorize paths as nLoS if the measured TDOA doesn’t match the reference position well enough, • Use an environment model for ray tracking and associate distance estimâtes with rays. In this way, nLoS estimâtes may contribute in a better way to the positioning estimation. Such environmental models are often not available but may be usëd if a digital twin is developed.
· Estimation of nLoS using polarization. The polarization changes at the bounce events, so nLoS is detected if a reference polarization is erroneous.
• Compare individual distance estimations with a communication-independent velocity/position measurement (gyro/accelerometer) to détermine which estimations are feasibiy LoS, Of course, not ali U Es are equipped with such location sensors.
• Rel-14 introduced an important enhancement to LTE OTDOA called multipath reference-signal time différence (RSTD). The main idea was to include several possible peak candidates from the power delay profile (PDP) and estimate the position using maximum likelihood. In this way, positioning accuracy was improved significaniiy, srnce the aïgorithm made no hard decisions on the LoS paths,
[0383] !n summary, we can conclude that sélection of the most suitable positioning System for manufacturing must take several different aspects into account, including:
• Required accuracy « Required latency • Deployment aspects • Devices
[0384] When it cornes to accuracy, there are industry use cases with positioning requirements ranging from mm-level accuracy to several tenths of meters. In an environment with a high probability of LoS and few blocking obstacles, it may be possible to estimate position within ten meters to a few tenths of meters accuracy in deployments with only one or a few micro base stations mounted, for example, in the ceiling of a factory hall. However, in many manufacturing scénarios, the reality is an environment with multipaths, reflections and many blocking obstacles, in such scénarios, it seems like the radio dot system (RDS) is the most suitable solution for providing combined communication and positioning, due to dense deployment and low cost of the nodes.
[0385] The accuracy numbers stated for different positioning techniques often assume that network synchronization is sufficiently good. However, in many cases network synchronization errors in the order of 10-20 ns, corresponding to 3-6m positioning error, is very difficult to achieve. For positioning needs, Virtual network synchronization achieved through RIIBM is the most promising solution,
[0386] UWB solutions are becoming increasingly popular in industry and manufacturing use-cases due to the high accuracy and relatively cheap devices, However, one drawback is that the UWB solutions are not integrated with a communication System, which is the case for the 3GPP-based solutions, for example. In the future, NR may replace UWB, since NR will also use very wide bandwidth.
[0387] Positioning latency requirements in manufacturing are relaxed for most use cases. For example, keeping track of tools and assets don't require very frequent positioning updates. The most demanding manufacturing use cases in terms of positioning latency may be safety related. One example is a real-time al arm to wam workers when a forkiift is close. The trade-offs between high accuracy and positioning latency for such a use-case hâve not been thoroughly studied y et.
[0388] The relation between device and anchor is aiso important to consider. For LTE and NR, both devices and anchors are complex and costly, and solutions built on these techniques are therefore not suitable for use cases where many small objects should be tracked, since each object must hâve their own LTE or NR device. In this case, UWB or RF1D may be more suitable since most of the complexity lies in the anchor node and the device/tag is therefore cheap. 3GPP-based technology with cheap devices, such as NB-loT or CAT-M, can be also be considered for this type of use cases, but since these techniques are narrowband, the positioning accuracy that can be achieved is low.
[0389] Spectrum
[0390] For industrial applications, some particular issues relating to spectrum include:
• Spectrum suitable for local usage, • Regulatory means to enable local spectrum usage, e.g. leasing and local licensing, • Technical means to enable local spectrum usage, e.g., evolved Licensed Shared Access (eLSA) and Citizens Broadband Radio Service (CBRS).
• 5G NR will be used as an access technology over a variety of frequency bands, including many that are currently used for LTE. A few frequency ranges are likely to be more globally harmonized, such as 3400-3800 MHz and the upper part of the range 24-29 GHz, although variations in band plans will likely exist. The study process for WRC-19 (World Radio Conférence for 2019) leading up to the identification of bands for IMT2020 may yreld additional millimeter-wave (mmW) spectrum bands where a good potential for harmonization exists, e.g. 37- 43 GHz. [0391] Recent régulation has designated bands for local or régional use” (e.g., 3700-3800 MHz in Germany and Sweden, 3300 MHz in China). Such actions are not a global radio solution for Industrial loT. Still, the introduction of these bands is a good first step for private use licenses of spectrum. It is not anticipated that these regulatory actions wiil spread across ail markets immediately. Therefore, it is clear that additional access to globally harmonized spectrum will require opportunities derived from spectrum ticensed to mobile network operators (MNOs), essentially through business arrangements that allow leasing of spectrum, or of capacity under well-defined Service Level Agreements (SLA).
[0392] The availability of mmW spectrum does pose challenges for Industrial IoT, mainly due to the time needed to establish products in the market, and the complexity of semiconductor manufacturing at such high frequencies. Building practices for equipment are not established, with significant challenges remaining on cost effective solutions for devices. MiHimeter wave equipment may also offer some advantages: the propagation 10 characteristics of narrow-beam transmitters can enabie better reuse with transmit power control and beamforming, and coexistence can likewise be easier. The frequency bands are also suitable forwiderbandwidth signais, although uncertainties remain in the amount of spectrum that may be made available for industrial wireiess.
[0393] The fourth Industrial Révolution, known in literature as Industry 4.0, is an opportunity for 5G wireiess technologies in manufacturing, exploration and process control situations within factones mines, process industries etc. The exploitation of these opportunities will require access to spectrum, either unlicensed, shared or exclusively licensed. îndeed, there are clear indications from industry that lack of access to hîghquality licensed spectrum is a key roadblock that has to be overcome. Access to licensed spectrum for Industrial IoT can be provided in one of three ways.
1. Service Level Agreements (SLA): Agreements with an MNOs can fulfill these requirements, with MNO-provided orprovisioned service; e.g., • On-premise MNO depioyments on a turn-key basis or MNO permitting end-user depioyment of approved equipment that is optionally connected to public networks. This case is not dealt with further in this discussion.
• An alternative is to establish a private Virtual network that guarantees capacity on an MNO network through the use of network slicing.
2. Spectrum Leasing: MNO acting as a Lessor towards verticals.
3. Local Licensing: The regulator license spectrum directly to verticals over a lîmited geographical depioyment, typically associated with property rights for the covered area. [0394] The regulatory situation for spectrum leasing is summarized below. The régulation for spectrum leasing is of interest for possible business models for 5G usecases • The US is most mature regarding spectrum leasing; régulations for leasing date 35 back to 2003-2004. Spectrum leasing is used commercially. The public database
Universal Licensing System (ULS) records ail leasing agreements • In South America, a few countries allow leasing between MNOs • In EU, leasing of major mobile/cellular bands is allowed in régulation since 2012. !t is not necessarily implemented in régulation in member States. No commercial leasing examples for MNO-owned frequencies to non-MNOs found so far • In Asia, beauty contests generally prevent spectrum leasing in several important countries, and is thus not part of régulation • In Africa spectrum leasing is generally not allowed.
[0395] Regarding local licenses, such ticenses are presently non-existing for private/public use. Some 5G use cases, especially when associated with addressing industrial automation, would benefît from local licensing; 5G introduction effets an opportunity in this regard. Pianned auctions of the first 5G band in Europe (3.4-3.8 GHz) hâve triggered negulatory activity in two countries (Germany and Sweden) by defining a particular realization of local licensing. In China, industry has shown interest in dedicated spectrum.
[0396] in orderto give a complété view of possible solutions, unlicensed bands suitable for industrial applications are also mentioned. The unlicensed bands are generally unsuitable for URLLC due to the possibility of interférence due to contentionbased operation, the variation in access performance créâtes uncertainty in throughput and delay performance.
[0397] Evolved LSA (eLSA) is a solution, currently being specified, to support leasing and local licensing within régulations by the means of a database/controller architecture. The eLSA is supposed to support any band and be technology neutreI. Similarly, the Citizens Broadband Radio Service (CBRS) in US, to be first used in 3550 to 3700 MHz band, will use a Spectrum Access System (SAS) to handle the regulatory requirements for that band. This is also a database/controller architecture that provides leasing opportunités for local area use whiîe the actual licensing is covering larger areas as per FCC régulations, The SAS can be used for other bands as well given appropriate regulatory requirements. The eLSA and the CBRS would cater for co-existence between different deployments according to the required regulatory requirements in a country or région. However, the way in which coexistence is ensured differs between eLSA and CBRS.
[0398] Many different spectrum bands are identified for 5G. Here, only bands that are likely to use NR technology are discussed. For example, the 700 MHz band is identified as a 5G band 'within the European Conférence on Postal and Télécommunications Administrations (CEPT), but will likely implement 4G. The same appiies for APAC regarding the 700 MHz band. Also, the 2.3 GHz band has been discussed, for exampie in Sweden, but presently mainly in the context of 4G.
[03»»] There are currently no 5G 3GPP harmonized bands valid and ailocated in ail countries of the world, but harmonized spectrum ranges, like 3400-3800 MHz, 24.25-29.5 GHz, do exist. Several 3GPP bands will be defined within each range. Many mmW bands pending allocation are dépendent of the outcome from WRC-19.
[0400Ί Europe
[0401] The 3400-3800 MHz band is identified as a “pioneer band” for 5G in CEPT. The plans for different countries vary a lot, depending on incumbents with very different license expire dates, There are countries that plan to auction the full band and then usuaily 100 MHz blocks are proposed, like in Sweden. Others only hâve the upper or lower e.g. 200 MHz avaiiabie presently, due to incumbent usage. This results in more narrow band licenses like in the UK. When the remaining spectrum becomes available new auctions will take place. This will resuit in nomconsecutive spectrum holdings for the operators, if nothing is done, such as a re-allocation of the band. Re-allocation might not happen, since “carrier aggregation exists,
[0402] Most countries promote national licenses, except Germany and Sweden who propose to set aside 100 MHz (3700-3800 MHz) for local services according to existing plans. The block is generally available in Sweden 2023.
[0403] In the “5G action plan” from EC (European Commission) it is defined that ail countries shall hâve:
• A 5G network in service in at least 1 City in each country during 2020.
• Full buiid out ready 2025.
This will probabiy mean that most countries will focus on mid-band (3-8 GHz), since various national coverage requirements will exist, in order to fulfîii the EC ambitions. [0404] The 26 GHz band (24.25-27.5 GHz) is also identified for 5G. The exact définition is to large extent depending on the outcome of WRC-19. In most countries, the range 26.5-27.5 GHz is empty and can be auctioned now. In some countries auctions hâve already started.
[0405] United States
[0406] In the United States, there are several bands targeting 5G on mmW (24/28/37/39 GHz), and it is only recently that the Fédéral Communications Commission (FCC) has started to consider mid-band spectrum (e.g., the 3.7-4.2 band). Operators hâve identified portions of the existing bands fordepioying NR, e.g., T-Mobiie on 600 MHz and Sprint on 2600 MHz.
[0407] There are upcoming FCC auctions of mmW spectrum at 28/39 GHz which are not owned by existing licensees.
[0408] On mid band, 5G wiii be allowed in the CBRS band (3550-3700 MHz). The band has licensed (PAL) and general authorized (GAA) biocks, based upon 10 MHz blocks.
On 37-37.6 GHz it is proposed that licenses for local use is defined.
[0409] Asia-Pacific
[0410] Several of the major countries in the Asia-Pacific région are planning auctions during 2018/2019.
[0411] Korea auctioned 3.5 GHz (3420-3700 MHz) and 28 GHz (26.5-28.9 GHz) in June 2018 to operators.
[0412] China are planning to ailocate additional frequencies on 2,6 GHz (160 MHz in total) and 4.9 GHz (100 MHz) to CMCC during 2018. Auctions for 3.5 GHz (3300-3600 MHz) is planned for 2019, where 3300-3400 MHz is planned for indoor usage. Presently 2300 MHz is mainly 4G indoor, but so far, no indication of allowing 5G.
[0413] Japan is planning a contest for band 3.6-4.1 GHz, 4.5-4.8 GHz (200 MHz for private operation) and 27-29.5 GHz (900 MHz for private operation) during 2019, Note that parts of 3400-3600 MHz are already allocated to LTE and will eventually be converted to 5G, but in Japan the band allocation is defined by law and can take long time to change.
[0414] Australia is planning the 5G auction on 3400-3700 MHz during late 2018,
[0415] Other countries that are in the process to plan 5G auctions are India,
Indonesia, Pakistan, Thailand and Vietnam.
[0416] Middle East
[0417] Countries like UAE, Saudi Arabia and Qatar hâve concrets auction plans 2019-2021 for 3.5 GHz and 26 GHz. Other countries hâve also indicated upcoming auctions, but no detailed are known yet.
[0418] Summary of Spectrum
[0419] A summary of 4G/5G spectrum bands in different countries is shown in Table 4. The items that are shaded can be used can be used for local service and for industrial automation.
Spectrum band Region/Country Local usage
600 MHz (FDD) US
2300 MHz (TDD) China Presently mainly indoor using 4G, Potentialiy also will allow 5G.
2600 MHz (TDD) US, China
3300-3400 MHz (TDD) China, Africa Indoor in China. Likeiy assigned for5G.
3400-3600 MHz (TDD) CEPT, China, Korea,
3550-3700 MHz (TDD) US (CBRS) PALs are. based on régional ïiçenses. GAA does not qualify for interférence protection by the régulation. Only deployed ! Systems can be protected around coverage area.
3600-3800 MHz (TDD) CEPT, Korea 3.7-3.8 GHz in Germany and Sweden .
3600-4100 MHz (TDD) Japan
3700-4200 US Mid-band Notice of Proposed Rulemaking (NPRM)
4500-4800 MHz (TDD) Japan 200 MHz for private operations
4900-5000 MHz (TDD) China Suggested for local services
5925-6425 MHz US Unlicensed, possibly shared with FS
6425-7125 US Could be unlicensed or licensed, shared with FS
24.25-27.5 GHz (TDD) WRC-19 dépendent1 (US pian auction FDD in the 24 GHz band
27-29.5 GHz (TDD) Japan 900 MHz for private operations
27.5-29.5 GHz (TDD) US, Korea
37-38.6 GHz (TDD) US Local usage a possibility in 3737.6 GHz; FCC has proposed iicense by rule .
1 WRC-19 (World Radio Conférence 2019), Agenda Point 1.13: Additional allocations tothe mobile services between 24.25 and 86 GHz for IMT-2020 and beyond
37-43.5 G Hz (TDD) WRC-19 dépendent 37-40.5 GHz 40.5-42.5 GHz 42.5-43.5 GHz
38.6-40 GHz (TDD) US
42-42.5 GHz US Part of Fédérai Notice of Proposed Rulemaking (FNPRM)
47.2-48.2 GHz US Part of FNPRM
Table 4 - 4G/5G Spectrum Bands in Several Different Countries
[0420] Requlatory Methods ta Control Access to Laçai Spectrum
[0421] There are two other regulatory methods to get access to local spectrum:
• Spectrum lease, • Local licensing.
These methods are applicable if the operator accèdes to customer control over spectrum, or if reguiators establish local licensing as a viable policy.
[0422] Under the spectrum lease approach, a Licensee/Lessor lease parts of his license to a Lessee, with or without a fee. The Lessee can lease parts of the frequency band, a portion of the spectrum to a particuiar geographical area, or both. A sublease is when the Lessee leases out spectrum to a secondary lessee. A regulatory view of spectrum leasing is shown in Figure 18.
[0423] Régulations for leasing of spectrum differ from country to country. Numerous aspects can be regulated:
• The terminology • Differing or not differing between de jure (legal) and de facto (in principle the radio network owner) control over the spectrum • The process for application, for example the stipulated time to approval • Which bands are available for leasing, considering for example compétitive implications • The term of the lease, whiîe not exceeding the term of the license authorization • The possibility of subleasing » The area defined for the lease • And more...
Also, the reguiators can choose to make more or less of the leasing agreement public. [0424] The following is an overview of the regulatory situation regarding spectrum leasing:
• The US is most mature regarding spectrum leasing; régulations exist since 20032004. Spectrum leasing is implemented commercially. There are examples of spectrum leasing, spectrum aggregators, spectrum brokers. There is a public searchabie database (ULS), which contains ail leasing agreements · In South America, a few countries allow leasing between MNOs.
• In EU, leasing of major mobiîe/cellular bands is aliowed in régulation since 2012. It is not necessarily implemented in régulation in member States. It does not appear that there any commercial leasing examples for MNO-owned frequencies in Sweden, Finland, UK, Ireland, Germany, France or Itaiy.
· In the UK, leasing is not aliowed by Ofcom in the major cellular bands, due to compétition implications.
• In Ireland, leasing is aliowed in the major cellular bands, after ComReg review of compétition implications.
• In Sweden, spectrum lease is permitted. The regutator has so far only aliowed 15 short-temn leasing due to their auction planning (lack of stable long-temn plans).
Operators hâve so far not aliowed long-term leasing with protection guaranteed, due to uncertainties in their network pîanning/build-out.
• In Finland, spectrum lease is permitted, but leasing has never been addressed in relation to MNO licenses and thus this case has never been implemented by the 20 regulator.
• For Gemnany, spectrum leasing was for the first time addressed in a consultation on 3.7-3.8 GHz autumn 2018. The regulator defined property owners and users (tenants) as licensees.
• In Italy, spectrum lease is permitted, and used commercially.
· in Asia, contesis generally prevent spectrum leasing in several important countries, and thus spectrum leasing is not part of régulation, e.g., not aliowed in China, India, Japan, but there is growing interest in spectrum trading. Spectrum leasing is aliowed but not used in Korea.
• In Africa, spectrum leasing does not generally appear to be aliowed. However, 30 Nigeria recently published Spectrum Trading Guideiines including spectrum leasing.
• The commercial leasing of MNO spectrum in the US concems several cases.
• Nationwide operators lease spectrum among themselves to address markets where capacity/coverage/growth is needed.
• Nationwide operators lease spectrum to non-nationwide operators, for exampie Verizon's LTE in Rural America (LRA) program. Verizon has signed up 21 rural and smaller carriers to the program, and 19 hâve launched LTE networks via the program. The program allows Verizon to quickly build out rural areas.
· In • The MNO interest in leasing out spectrum for 5G verticals, for example in a factory automation use case, is yet to be seen.
[0425] Spectrum leasing of mobile bands from operators has primarily been done towards other operators in order to fulfill coverage and other requirements from the 10 regulator. Volume-wise, this is almost exclusively in the US.
[0426] In higher bands (> 10 GHz), fixed services are a use-case which involves leasing from operators by service providers. This is established in both US and Europe. [0427] With the arrivai of 5G, verticals provide use-cases in need of dedicated (mobile) spectrum. One question is which actor is going to be Lessee.
[0428] The operators’ reactions long term on the possibility of leasing out mobile spectrum to verticals are not known. There are opportunities and issues for both the Lessor and Lessee for such a leasing agreement to take place, for example:
• Interesting for MNOs for spectrum that îs not fully exploited • MNO may hesitate to lease out spectrum in areas with heavy demand, or where demand is anticipated within 5-10 years • The needed lease time of 30+ years, due to investments in processes and buildings, is far longer than the MNO’s license duration
[0429] The introduction of 5G will cause a widespread change in the ability of operators to provide SLAs through network slicing. While network slicing is supported to 25 vanous extents with ail 3GPP based networks, the 5G CN will provide operators with a framework that enables programming network slices to effect séparation between use cases, QoS classes as well as service providers. It would then be possible to hâve a deployment case where slicing can enable the leasing of network capacity. This would allow the local user to be in controi of end-to-end SLAs and even controi the behavior of 30 the RAN, including, for example, QoS, within limits. The MNO would depîoy and integrate the RAN with the CN according to the SLA of the leasing without îosing overall contrat over planning and administration
[ 0430] Bands possible for spectrum leasing must comply with certain requirements. Leasing of the band must be allowed in the régulation in the spécifie country/region.
Removing China, Africa and Japan from Table 4 above resuits in the following table:
Spectrum band Region/Country Comment
600 MHz (FDD) US
2600 MHz (TDD) US
3400-3600 MHz (TDD) CE PT except UK Korea unknown.
3550-3700 MHz (TDD) US (CBRS)
3600-3800 MHz (TDD) CEPT except UK Korea unknown.
24.25-27.5 GHz (TDD) WRC-19 dépendent (US plan auction FDD in the 24 GHz band
27.5-29.5 GHz (TDD) US Korea unknown.
37-38.6 GHz (TDD) US
38.6-40GHZ (TDD) US
42-42.5 GHz US
Table 5 - 4G/5G Spectrum Bands for Leasing
[0431] Local Licensinq
[0432] The majority of licenses use pre-defined administrative boundaries for defining the area for a license, such as:
• National borders • Régional borders, or other larger administrative structures • Communities/Municipals
[0433] The next ievel of granularity could be property. With this approach, property and land usage rights can be used the administrative définition to be used for local licenses. if local spectrum is needed from a larger area spectrum license, one solution to increase the granularity would be to use leasing of sub-areas. This solution can define areas bigger than property, if needed.
[0434] Presently when a regulator defines a local license for an area that is smaller than a region/municipal, the définition has been a coordinate and a radius, an event name, an address, coordinates defining an area, etc. This has not been a problem since the number of such licenses has been low. However, with the arrivai of 5G use-cases, this wü! change. It is work in progress for regulators.
[0435] If the number of local licenses grows with the 5G use-cases, the coordination needs also grow:
• Geographical data bases are needed to show the licensed areas, for example for new applicants.
• Interférence between the implémentations needs coordination through regulative requirements.
[0436] While national and régional licenses for commercial services exist, local licenses exist for non-commercial purposes, such as test labs and test plants. Possibly licenses for some program-makîng and spécial events (PMSE) services could be seen as local. The arrivai of 5G, with new types of use-cases, will require local licenses for factories, for example, and puts new requirements on the régulation.
[0437] The primary band for 5G services in Europe is 3.4-3.8 G Hz, and the auctions of this band triggers regulative activity regarding local licenses, Higher bands, for example 24.25-27.5 GHz (pioneer band for early implémentation in Europe), are suitable for local use in the sense that their propagation characteristics are less likely to cause coexistence problème, especially when being used indoor. Presently, regutatory discussions regarding local licenses for these bands are largely out of scope or may just be entering the realm of possibility, but this is expected to change with industry interest. [0438] Certain indoor environments are amenable to reuse of spectrum across multiple uses, especially if the networks are separated by fîoors in modem buildings. It is weîl known that the loss across multiple stories of a building can be many tens of dB, even at mid-band frequencies like 3,5 GHz.
[0439] Industry in China has shown interest in local licenses in standards fora, pointing to the proposai for 3.7-3.8 GHz in Germany.
[0440] An example of a license assigned to industry is the allocation from 1800-1830 20 MHz that was provided to the Canadien hydroelectric power industry in the 1990s.
[0441 ] Europe: 3.7-3.8 GHz (part of 3.4-3.8 GHz, primary band for 5G services) [0442] Several countries hâve auctioned the spectrum and more to follow. Two countries hâve had consultations including local licenses and are following each other.
• Germany promulgated auction rules in the third quarter of 2018 with an auciion scheduîed for 2019Q1-Q2. The rules distinguish between indoor and outdoor usage for “local property-related uses”, implyîng property as a définition of local. Note that there is property which is not private property, for example streets, parks, etc.
• Sweden, auction latest Q1 2020. Recent consultations define “local bîock allocations,” Local here is defined as referring to “small geographical areas, e.g.
mines, indoor facilities, and hot spots. It should be noted that also régional licenses, usually corresponding to a municipality, are mentioned in the consultations.
[0443] USA: 3.4-3.55 GHz (possible extension to CBRS)
[0444] In the US, the National Télécommunications and Information Administration (NTIA) is evatuating spectrum sharing between military radar and mobile broadband in this band. The incumbent Systems differ here in comparison to the existing CBRS range.
If CBRS rules apply, licensed operation would be across counties, and the third tier would be comprised by Générai Authorized Access. The large area sizes in the CBRS band make it unsuitable for industrial use as verticals are unlikely to participate in the auction market.
[0445] Bands for local licensing
[0446] Bands possible for local licensing must comply with certain requirements.
Local licensing must be allowed by the regulator
[0447] Keeping the local initiatives in Table 4 above results in the foliowing table:
Spectrum band Region/Country Comment
3300-3400 MHz (TDD) China indoor in China. Likely assigned for 5G.
3550-3700 MHz (TDD) US (CBRS) PALs are based on régional licenses. GAA does not quaîify for interférence protection by the régulation. Only deployed Systems can be protected around coverage area.
3600-3300 MHz (TDD) 3,7-3,8 GHz in Germany and Sweden Indoor and outdoor
4500-4800 MHz (TDD) Japan 200 MHz for private operations
27-29,5 GHz (TDD) Japan 900 MHz for private operations
37-38.6 GHz (TDD) 37-37,6 GHz is a possibility in US FCC has instead suggested license by rule and shared with Fédéral use.
Table 6 - 4G/5G Spectrum for Local Licenses
[0448] Technoloqical Support for Leasing and Local Licensing
[0449] In Europe, eLSA is a continuation of the ETSI specified System Licensed Shared Access fnât manages access to spectrum in 1MT bands where the incumbents cannot be evacuated within a reasonable foreseeable time. The access can be managed in time and geographical area. The system créâtes geographical protection and exclusion zones which incumbents does not allow others to use. In eLSA, allowance zones are introduced to enable also local licensee handling where the process of granting and managing the many local access licenses can be automated. It would also include the handling of leasing of frequencies to local area users from established licenses such as
MNOs. Figure 19 shows frie assumed spectrum allocation possibilities for a frequency band allocated to mobile services such as IMT.
[0450] The spécification work on the eLSA System has started in ETSI (Europe) and is based on the ETSI Technical Report “Feasibility study on temporary spectrum access for local high-quality wireless networks”. The technical spécification on System Requirements is assumed to be ready end of 2018 and to be followed by spécifications on Architecture & Procédural Flows, and then followed by a protocol spécification. In Asia-Pacific information related to “local area services hâve been shared and starting work on a technical report has been approved.
[0451] The eLSA system is based on a Database/Controller concept. It supports licensing and leasing but not unlicensed/license-exempt operation with e.g. granted access such as white space or licensed-by-rule access, as this will not provide the necessary interférence protection requirements.
[0452] The database is named eLSA Repository and assumed to be in the Regulatory domain, The controller is named eLSA controller and ensures that the eLSA licensee’s system would hâve the needed configurations to operate according to the licensing conditions, thereby readiiy supporting high quality needs to support the URLLC use cases. The controller wiH get the required regulatory sharing and co-existence requirements from the eLSA repository.
[0453] Figure 20 shows a possible architecture sketch for local licenses, wbiiie Figure 21 shows the possible architecture for leasing. In the latter case, the eLSA controller box also contains some of the eLSA Repository functionality because the MNO îs the one leasing out frequencies.
[0454] In the US, the Fédéral Communications Commission (FCC) has defined the Citizens Broadband Radio Service (CBRS) in the 3550-3700 MHz band, in régulations codified in the FCC rules. Figure 22 illustrâtes aspects of the CBRS.
[0455] The CBRS band is in use by naval radar and by the Fixed Satellite System (FSS) service, both services constituting Tier 1 incumbent primary use. Grandfathered Wireless Broadband Service U sers, such as Wireless Internet Service Providers (WISP), operating under the rules of 47 CFR Part 90, Subpart Z, are also protected from interférence from the CBRS until April 2O2O.The two remaining tiers respectîvely allow the issue of Priority Access Licenses (PAL) and General Authorized Access (GAA) in the band for wireless broadband use. PAL users benefit from licenses to spectrum based on the acquired licensed area and bandwidth. GAA users are aîlowed access any spectrum not utilized by higher tiers based on authorized access.
[0456] Radio devices are registered as Citizens Broadband Radio Service Devices (CBSD) based on their location and their operating parameters. Any eiigible radio device may request access to Priority Access License (PAL) and GAA spectrum. Since the FCC does not confer any regulatory protection for GAA spectrum users, it is left to industry agreements to croate solutions for GAA coexistence. While the Wireless innovation Forum (WlnnForum) is specifying technology agnostic protocole that are mostly geared towards regulatory compliance, the CBRS Alliance is seeking to improve the performance of LTE networks operating in the CBRS.
[0457] The CBRS Alliance was chartered as an industry trade organîzation seeking to promote and improve the operation of LTE in the band, for a variety of use cases, including operator-deployed small cell networks associated with public service, fixed wireless service for last mile replacement and Industrial Wireless. The Alliance is specifying changes to network architecture to allow both the traditional operator deployed operation and private network operation including neutral hosts and has provided a platform to establish the impetus for contributions in 3GPP for defining Bands 48 and 49 for LTE-TDD and LTE-eLAA operation in the band. The CBRS Alliance will also introduce 5G NR into the band in 2019, The focus of 5G on Industrial wireless applications fits with the mission of the CBRS Alliance.
[0458] The Spectrum Access System (SAS), a geolocation database and policy manager, auîhorizes access to CBRS spectrum by CBSDs. The SAS primarily protects higher tier users from lower tier operation in accordance with the FCC régulations. The logical relationships in the CBRS are described by the SAS-CBSD and the SAS-SAS interface, as shown in Figure 23, which illustrâtes the high-level SAS architecture, including coexistence manager (CxM) functionality for the GAA spectrum. Fédéral radar Systems are protected by the implémentation of a network of sensors forming the Environmental Sensing Component (ESC) that informs the SAS about Coastal radar activity. PAL users are awarded régional licenses over large geographical areas over 10 MHz blocks.
[0459] Each PAL is 10 MHz and is limited to a maximum of seven licenses confined within the first 100 MHz of the CBRS band, i.e., 3550-3650 MHz. New rules hâve based license areas on counties, which number 3142 in the United States. There are seven PALs in each license area, the license terms are ten years with a guarantee of renewa!, and licenses can be partitioned and disaggregated. Single operators are capped at a .maximum of four PAL licenses. The ability to lease spectrum under geographical constraints and the ability to disaggregate licenses will support a secondary market in spectrum use for industries. In this way, PAL licenses can likely support URLLC without significant encumbrance.
[0460] The WlnnForum is defining technology-neutral mechanisms for administering the band, including protection of incumbents, and PALs. Additional requirements for coexistence between GAA users is being developed, with much débats about whether coexistence should be engineered by the centrai authority of the SAS, or by local action by CBSDs arising from knowledge of the radio environment.
[0461] Figure 24 is an illustration of PAL spectrum management. PAL users are protected only within a coverage area with a contour drawn around an actual deployment of one or more CBSDs. These coverage areas are known as PAL protection areas (PPA) and are bounded by a signal level of -96 dBm from the transmitting station. PAL Protection Areas (PPA) represent deployed clusters of CBSDs with overlapping coverage areas that may be fused to register a polygonal région qualifying for interférence protection from other unassociated use of PAL or GAA. The figure shows several license tracts, each of which corresponds to a county. PAL users that span across multiple license tracts, i.e., having licenses in more than one tract, can combine their licenses to create a common channel assignment.
[0462] GAA users may use PAL spectrum so long as actual PAL deployments in PPAs are protected from aggregate interférence that exceeds -80 dBm within the PPA. This is illustrated for PPA C in the figure, where two GAA CBSDs are allowed to operate on the same channel as the PAL user so long as the aggregate interférence from their transmissions does not exceed -80 dBm over most of the PPA boundary. PPAs from different operators that overlap or are in close enough proximity will obviously use exclusive spectrum allocations. Thus, GAA users are guaranteed access to ail of the 150 MHz of spectrum if the band is unencumbered by higher tiers.
[0463] While GAA users are not protected from mutual interférence or interférence from higher tiers, the WlnnForum, and the CBRS Alliance hâve been engaged in attempting to specify methods of creating higher quality of expérience for GAA users. The CBRS Alliance procedure reallocates the spectrum assigned by the SAS to the CBRS Alliance Coexistence group, créâtes local interférence graphs based on environ mental modeiling, and optimizes spectrum allocation from a Coexistence Manager (CxM) that advises networks of CBSDs. In addition, the CxM manages Upiink-Downlink coordination for the TDD signal, LTE-TDD networks are ail expected to be cell-phase synchronized and the CBRS Alliance coexistence spécification details how this is to be achieved, independent of the SAS or CxM. The WlnnForum and CBRS Alliance will try to guarantee ai least 10 MHz of spectrum per CBSD. This is likely to be inconsiderate of eMBB service in congested areas.
[0464] Both PAL and GAA spectrum can address URLLC requirements, but URLLC quality cannot be guaranteed in ail GAA situations. An operator would therefore not be able to enter into SLAs that would promise a customer that capacity or latency performance would not dégradé, uniess the facility being covered were physically isolated from other interferers.
[0465] The CBRS has several disadvantages:
• The three-tier nature of the licensing régime, and especîally the rules allowing
GAA, create much uncertainty in the utilïty of the band. Some of this uncertainty arises out of a lack of understanding on whether GAA spectrum is like unlicensed spectrum or is akin to white space: it is not. Indeed. a strict interprétation of the FCC rules around GAA use would lead one to wrongiy beiieve the white space anaiogy.
· The WINNF spécifications hâve created an impression among some operators that they might solely use GAA spectrum in a manner that assures interférence protection. Such an impression would perhaps require division of spectrum among users to the extent where bandwidth is traded off for quality. This is not suitable for eMBB use.
» The WINNF and CBRS Alliance Coexistence spécifications are prone to dévalué outdoor deployments. High power base stations are counted towards incumbent protection to a greater extent than low power ones. Indoor deployments may be favored when assigning spectrum, and large networks of indoor nodes could grab more than their fair share of spectrum uniess the SAS introduces fairness measures. We expect there to be pragmatic approaches based on business guarantees.
• The interesting use cases for the CBRS are in urban small cells and micros for coverage and offloading. The reason for this is mainiy the large license areas, and operators are more likely to bid for licenses in lucrative markets. For the industrial automation use of the CBRS, operators must acquire licenses with an intention to either disaggregate or lease their spectrum.
• The CBRS has been defined in a band that is of prime interest for 5G. The terms under which the spectrum is being offered, especîally PAL, makes the band questionable for eMBB service and has mixed utility for industrial purposes, including URLLC modes of operation,
[0466] On the other hand, there are things to like about the CBRS:
• The use-it-or-lose-it approach used by the CBRS is a well thought out exercise in improving spectrum utility. The rules motivate operators to use their license with real deployments, and operators hâve an incentive to either depfoy their own radios or to lease out PPAs to realize revenue out of their spectrum.
• If most users in the CBRS are indoor small cell users, the success of the band would be guaranteed. A large number of industrial use cases qualify.
• The FCC cannot skew auction procedures to favor industry and enterprise use of spectrum. Industrial users are moreover not really interested in competing in the license market. Indeed, Ericsson’s local license concept dépends on the licenses being assrgned by rule to reai-estate owners, possibly for a small registration fee. By aüowing disaggregation of licenses, the FCC has provided industrial users with choices - leasing, buying, or operation with GAA rules.
• The CBRS is due to go into commercial deployment and will be proven in the field. The establishment ot industry organizations deveioping the standards, inciuding those for LTE use in the band assure actual deployment and success of the band in some form. The same cannot be said about LSA in 2.3 GHz, Indeed, there is noticeable interest around the CBRS among other regulators, e.g., Ofcom. The expériences in deploying the CBRS may encourage the telecom industry to accept the CBRS as a tolerable way of implementing spectrum sharing.
[0467] Coexistence
[0468] In general, coexistence problems will exist when industrial networks using cellular or RLAN technologies share spectrum with other services, e.g., satellite. It is possible for industries to gain access to spectrum that is globally designated for use by radio navigation, satellite services, or fixed services, provided there is sufficient isolation in geography or through path loss between such services. For example, indoor factory use of spectrum can easily occur in satellite bands. It is désirable that such bands be close to bands aîlocated for RLAN use or iMT so that there is an incentive for manufacturers to include such bands within radio equipment. The CBRS band is one such band having close association with bands already designated for mobile use in most markets around the world.
[0469] Another aspect of industrial use of spectrum is the problem of spectrum utility. While cellular technologies hâve the advantage of high spectrai efficiency, it is also necessary that régulation enable a high degree of reuse of spectrum. In many cases, this will involve understanding the extent to which spectrum can be reused in license areas that are in close proximity.
[0470] There are cases when co-existence in reality is not probiematic. Indoor spectrum for use-cases for industry can benefit from unusabie spectrum (including not mobile allocation) forothers, for example satellites, FS, FFS, radar (not indoor only). However, use-cases for outdoor spectrum for industry must also be considered
[0471] While if is true that indoor industrial use cases can benefit from secondary use spectrum that may be designated for other services, e.g., satellites, FS, FSS, radar etc., it is just as important to designate local spectrum for outdoor use by industries, [0472] Shared Spectrum - Market Considérations
[0473] The philosophy behind shared spectrum reguiations diffère between the USA and Europe. The FCC has been willing to define the CBRS in a manner that places high value on spectrum utility, while the EU has tended towards spectrum quality and stability. [0474] In Europe, the support of industrial loT is focused on licensed bands stnce the level of interférence from others can be contained to a certain level. It is expected that there will be many licenses and leasing contracts in a country.
is [0475] An evolved LSA System is being designed in ETS1 to handle depioyment and coexistence issues in an efficient manner, Depending on the country the co-existence scénarios with co-channel possibilities can be local indoor to local indoor, local indoor and overiapping régional coverage and local indoor to local outdoor. The regulatory sharing conditions needed to handle this in, for example, the frequency domain (and possible need of reuse pattern), guard distance (if needed), wall loss assumptions, and by setting a permissible maximum signal strength level at the border that would secure a predictability of interférence to neighbors. This would facilitate the depioyment of the network with known expected interférence levels to secure the wanted network quality levels.
[0476] Unlicensed & licensed exempt bands which has unpredictable interférence behaviorcan be used for services that does not require high QoS and can be simuitaneously be used together with the licensed network.
[0477] In the US, it is most likely that leasing and private use of spectrum will happen within the CBRS. The PAL reguiations are oriented towards protecting actual deployments. Areas within a license définition that are not covered by a licensee’s radios are available to GAA usera, provided established PPAs are not interfered with. The iicensee is however free to moneiize their license by allowing private PPAs to lease the license. This is likely to improve utility of the spectrum.
[0478] GAA use is open to private deployments and wîfl hâve mixed quality of expérience depending on a variety of factors: urbanization, population density, commercial interests, indoor vs outdoor deployments, outdoor deployments of small cells vs. large cells (low power vs. high power).
[0479] The WlnnForum and the CBRS Alliance are engaged in defïning coexistence principles for GAA that can reduce the interférence impact to GAA users from cochannel use of allocated spectrum. The development of the procedures for coexistence are contentious and generally involve orthogonalizing spectrum allocations between neighboring CBSDs that are deemed to interfère with one another. This has the disadvantage of reducing the individual spectrum allocations to CBSDs under some circumstances. This is particularly worrisome for NR use in the band, especially in cases where eMBB coverage is anticipated.
[0480] Unlicensed Spectrum
[0481] Industrial use of wireless can overlap either cellular or radio local-area network (RLAN) technologies. Indeed, it is not necessary to classify al! industrial use of spectrum as dérivative of highiy reliable or pertaining to critical communication. Certain characteristics of the industrial automation environment are a high level of importance to spectrum availabiliiy, ease of deployment and low régulation, and opportunitiesfor developing trustworthy and secure networking. However, many use cases, and perhaps the majority of use cases for industrial use may also avail of license-exempt spectrum. The development of Multefire and LAA as technologies for license-exempt operation provide an avenue for the cellular industry to enter into the RLAN domain.
[0482] The key disadvantages of unlicensed spectrum include the necessity to operate in the presence of interférence and the low reliability caused by shared use of spectrum based on distributed intelligence. This typically means that radio nodes use collision avoidance and listen-before-taik étiquette to access the channel instantaneously. This is not amenable for KPI guarantees. Therefore, unlicensed spectrum rs usually not suitable for mission critical applications.
[0483] Unlicensed spectrum bands of interest for industrial applications span a wide variety of spectrum bands. The FCC in the United States has been the most aggressive in recent years in expanding the availabiîity of unlicensed spectrum.
[0484] Table 7 lists unlicensed bands in various countries, where underlined text refers to bands that are under considération. The bands in the table are those listed for broadband use and do not include several bands designated to be short range device communication bands. The unlicensed bands are generally unsuitable for URLLC due to the possibility of interférence.
Spectrum band Region/Country Comment
600 MHz USA TVWS ru les allow unlicensed white space devices to operate in guard bands between wireless services and TV bands and in the duplex gap between wireless downlink and uplink bands. This includes unlicensed operation in UHF channel 37 which also hosts the Radio Astronomy Service (RAS).
902-928 MHz USA Part 15 frequency hopping or digital modulation
863-870 MHz Europe Short range device band for wireless microphones, LPWAN use viqa SigFox
2400-2483.5 MHz Worldwide ISM band, Part 15 rules.
5.150-5.250 GHz USA, Europe, Japan US: U-NII-1 band, indoot use only, integrated antenna Europe RLAN Band 1
5.250-5.350 GHz USA, Europe, Japan US: U-NH 2A, indoor and outdooruse Europe: RLAN Band 1 requîtes TPC
5.350-5.470 GHz Europe Europe: Available for RLAN use
5.470-5.725 GHz USA, Worldwide U-NII 2C/2E, DFS and radar détection, indoor and outdoor Europe: RLAN Band 2
5.725-5.850 GHz USA, Worldwide U-NII 3 band, overiaps with ISM band worldwide
5.725-5.875 Europe BRAN
5.925-6.425 GHz USA U-NII 5 band proposed, AFC required (database)
6.425-6.525 GHz USA U-NII 6 proposed, indoor only
6.525-6.875 GHz USA U-Nil 7 proposed, AFC required
6.875-7.125 GHz USA U-NII 8 proposed, indoor only
Spectrum band Region/Country Comment
57-64 G Hz USA, Canada, Korea Unlicensed mmW
59-66 GHz Japan Unlicensed mmW
59.4-62.9 Australia Unlicensed mmW
57-66 GHz Europe Unlicensed mmW
66-71 GHz USA Proposed for unlicensed by the FCC
Table 7 - Unlicensed Bands
[0485] Spectrum leasing in Europe and US is not a regulatory probiem, but the interest and business for the ope retors is to be seen. In Asia and Africa, spectrum leasing discussions has just begun.
[0486] Indoor spectrum for use-cases for industry can benefit from unusable spectrum (including not mobile allocation) for others, for exampie satellites, FS, FFS, radar (not indoor only). However, use-cases for outdoor spectrum for industry must also be considered
[0487] While it is true that indoor industrial use cases can benefit from secondary use spectrum that may be designated for other services, e.g., satellites, FS, FSS, radar etc., it is just as important to designate local spectrum for outdoor use by industries.
[0488] The eLSA is agnostic to bands and technology for spectrum leasing and local licensing. CBRS is going to be the best opportunity for industrial use of spectrum in the United States. CBRS is being specified in a spectrum range that is globally accessible by IMT, making economy of scale possible, and allows leasing as well as disaggregation of licenses. Allowîng disaggregation does not mean that CBRS will enabie local licensing. [0489] Global harmonization of IMT and MBB spectrum has been a desire that has never been adequately realized. The conséquence of diverse regulatory action on spectrum for mobile services over the years will make it difficult to achieve harmonization for industrial use cases. However, there is an interest in the télécommunications industry towards assigning portions of the spectrum ranges 3400-4200 MHz and 24.25-29.5 G Hz for industrial use.
[0490] The 3400-4200 MHz will likely be the first frequency range, outside China and US. where buildout of 5G will start. The limited regulatory support for local licensing in this range will create defays for non-MNO dépendent spectrum usage. For example, in Sweden, local licensing can at the earliest be available after 2023 for use by 5G, and in most other European countries regulatory action is notyet considered. Therefore, leasing will likely be the sole option for access to spectrum, except for an MNO-provided service, in that time frame. The mmW spectrum can be of interest to enabie availability of local licensing in a timelier manner, but that will to some degree dépend of the allocation of mobile bands in WRC-19.
[0491] Security
[0492] It is often said that security of a System is only as strong as the weakest link. However, dépending on which part of the system that is, breaking (or neglecting) it can hâve very different conséquences. When taiking about a System involving more than one entity, the secure identifies used, and the handling and protection of them, are building blocks that a big part of other security functionaiity relies on. The identifies are used for authenticating the entities, for granting access and authorizing actions, and for establishing secure sessions between the entities. This means that a device needs to hâve a secure identity and to provide hardware (HW) and software (SW) based mechanisms that protect and isolate the identity and the credentials of the device. It is also not only the identifies that need to be protected, but also the devices themselves should be secured, e.g. through propercontrol of what SW is being run on the device. AH the aforementioned things are enabled by having a HW root of trust (RoT) in the device, basically a trust anchor to base security on.
[0493] Identity
[0494] An identity of a device is used to identify the device to a communicating party, The identity typically consists of an identifier and credentials such as a key, key pair, or password that is used for the authentication of the device. An authenticated identity enables the communicating party (such as network, service or peer device) to make wellfounded security poiicy decisions for network/resource access control, service use, charging, quality of service settings, etc.
[0495] Identifies based on a shared secret rely on fhe faci that ail communicating endpoints, and only them, know a secret value. The randomness of the shared secret is one key characteristic. it is typically quite weak for a username-password pair, the most basic form of a shared-secret-based identity. In addition to randomness, the length of the secret and that the secret is handled securely, both at the device and the server side, are important.
[0496] With asymmetric keys, the identifier of an entity is the public key of the asymmetric key pair and the corresponding private key acts as the authentication credentiai. A signature generated using the private key can be verified by anyone having access to the corresponding public key. This is perhaps the main strength of asymmetric compared to symmetric (shared secret) keys.
[0497] To give additional value to the asymmetric key-based identity, it is possible to get the identity certifiée! by a Certificate Authority (CA). The CA vérifiés the identity of the ücensing in a timelier manner, but that will to some degree dépend of the allocation of mobile bands in WRC-19.
[0491] Security
[0492] ït is often said that security of a System is only as strong as the weakest link. However, depending on which part of the System that is, breaking (or neglecting) it can hâve very different conséquences. When talking about a System involving more than one entity, the secure identifies used, and the handling and protection of them, are building blocks that a big part of other security functionality relies on. The identifies are used for authenîicating the entities, for granting access and authorizing actions, and for establishing secure sessions between the entities. This means that a device needs to hâve a secure identity and to provide hardware (HW) and software (SW) based mechanisms that protect and isolate the identity and the credentials of the device. It is also not only the identifies that need to be protected, but also the devices themselves should be secured, e.g. through propercontrol of what SW is being run on the device. Ail the aforementioned things are enabled by having a HW root of trust (RoT) in the device, basically a trust anchor to base security on.
[0493] Identity
[0494] An identity of a device is used to identify the device to a communicating party. The identity typically consists of an identifier and credentials such as a key, key pair, or password that is used for the authentication of the device. An authenticated identity enables the communicating party (such as network, service or peer device) to make wellfounded security policy decisions for network/resource access control, service use, charging, quality of service settings, etc.
[0495] Identifies based on a shared secret rely on the fact that ail communicating endpoints, and only them, know a secret value. The randomness of the shared secret is one key characteristic. It is typically quite weak for a username-password pair, the most basic form of a shared-secret-based identity. In addition to randomness, the iength of the secret and that the secret is handled securely, both at the device and the server side, are important.
[0496] With asymmetric keys, the identifier of an entity is the public key of the asymmetric key pair and the corresponding private key acts as the authentication credentiai. A signature generated using the private key can be verified by anyone having access to the corresponding public key. This is perhaps the main strength of asymmetric compared to symmetric (shared secret) keys.
[0497] To give additional value to the asymmetric key-based identity, it is possible to get the identity certified by a Certificat© Authority (CA). The CA vérifiés the identity of the entity owning the key pair and issues a certificate certifying the link between owner and public key. The drawbacks with certifîcaies include the size of the certificate (or certifioate chain), which could be an issue in constrained environments, and the added cost of gettîng and maintaining (renewing) the certificate. To reduce costs, an enterprise can also set up its own CA.
[0498] Raw Public Key (RPK) mechanisms make a compromise between the simplicity of pre-shared keys and benefits of asymmetric cryptographie solutions. An RPK is a minimalistic certificate, significantly smaller than a typicaï certificate, containing only the public key in a spécifie format. An RPKis like self-signed certificates: there is no trusted entity that vouches for the provided identity, i.e., the peer receiving this identity needs to use an out-of-band mechanism to trust that it is the identity of the entity it wants to communicate with.
[0499] For ail Public Key Infrastructures (PKI), it is recommended to hâve a way of revoking compromised keys. A Certificate Révocation List (CRL) that can be fetched from a Certificate Authority (CA) or checking the certificate status online using the Online Certificate Status Protocol (OCSP) are common ways.
[0500] 3GPP cellular Systems are a prime example of where shared-secret-based identifies are used. A 3GPP identity consists of the IMSI, a 15-digit identifier, and its associated credential, a 128-bit shared secret. This information is stored in the subscriber database (e.g., HLR or HSS) in the 3GPP core network and on the UlCC or SIM card installed in the User Equipment (UE). The UlCC acts both as a secure storage and a TEE for the 3GPP credentials. For IoT devices, permanently integrated embedded UICCs (eUlCC) can be used instead. eUlCC has a smaller footprint and allows remote updates of the subscription data.
[0501] For 5G, 3GPP is also considering alternatives to traditional SIM credentials, namely so called “alternative credentials”. TR 33.899 looks at different identity solutions, including certificates. In spécifications, support for certificates is described e.g. in 33.501 where EAP-TLS is defined as an alternative to AKA. EAP-TLS implies certificates are being used for authentication. For identifying the network, the use of certificates is partly available through the définition of the concealed identifier (SUCI), which is the private identifier (S U PI) of the UE encrypted with the public key of its home network, i.e. the network already has an asymmetric key pair for which the public key is part of the subscriber profile. The SURI is defined in 3GPP TS 23.501; there, network address identifier (NAI) is given as one possible format of the identifier, which would support the use of certificates as well.
[0502] End-to-End (E2E) Security
[0503] In most cases, protecting the communication of a device is important. Both to protect against the information ieaking to some unauthorized third party and against having the third party modify the data on the path. This can be achieved by appiying confidentiaiity (encryption) and integrity (signing of data) protection. The exact security need for the data is very much use case dépendent and relates to the data, its use, sensitivity, value, and risk associated with misuse of the data, However, as a rule of thumb, integrity protection should aiways be applied, while the need for confidentiaiity protection should be evaluated case by case. In general, a single key shouid be used for only one purpose (encryption, authentication, etc.).
[0504] For protecting the data, there are many standardized protocols available, inciuding “regular” Internet security solutions such as TLS, iPsec and SSH. ioT optimized solutions include DTLS as a TLS variant for IoT and the ongoing work to profile IoT friendly IPsec. Also, application layer security solutions, such as OSCORE defined in JETF, are available and especially useful for constrained devices. The benefits compared to TLS inciude that end-to-end security can be provided even through transport layer proxies, e.g. for store-and-forward type of communication used with sleepy devices. The protocol overhead is also optimized.
[0505] 3GPP also provides tools for protecting traffic end-to-end to a service, even outside the 3GPP network. The Generic Bootstrapping Architecture (GBA), 3GPP TS 33.220, uses the SIM credentials for authenticatîng the UE/subscription to a network service, called Network Application Function (NAF) in GBA lingo. GBA requires that there is a trust relationship between the service/NAF and the operator. Using that trust, the NAF can request session keys from the network, which are based on the SIM credentials of the UE. Those session credentiais can be used for authentication and secure session establishment between the UE and the service.
[0506] Hardware Root of Trust
[0507] The concept of a hardware root of trust (HW RoT) inciudes the following aspects:
• Secure storage • Secure/measured boot • HW-enforced Trusted Execution Environment (TEE) • HW-protected crypto and key management (crypto accélération, HW-based random number generator, generating/storing/accessing keys securely)
[0508] HW security is also extended to the environment where devices are manufactured such as protection of interfaces and mechanisms used during manufacturing and development, the use of secure key provision ing, key génération, secure configurations of devices, code signing, etc.
[0509] The base for securing that a device behaves as intended is to be able to ensure that only authorized fi rmware/software is running on the device. This requires a secure boot mechanism that originales from a hardware Root of Trust. The secure boot mechanisrn vérifiés during device boot-up that ail loaded software is authorized to run. A HW RoT is an entity that is inherently trusted, meaning that its data, code and execution cannot be altered from the outside of its trust boundaries. It consists of fonctions that must operate as expected (according to its design), no matterwhat software is executing on the device.
[0510] A device must aiso hâve a secure storage mechanism to protect device sensitive data such as cryptographie keys while stored in (off-chip) non-volatile memory. Such a mechanism also relies on a HW RoT, e.g., a chip individual key stored in on-chip non-volatile memory or OTP memory.
[0511] in orderto be able to recover from malware infections, and to minimize the risk of loss of sensitive data or changed behavior of the device, the security related parts of the firmware and software shouîd be separated (and run in isolation) from other software. This is achieved using a Trusted Execution Environment (TEE) created using HW isolation mechanisms.
[0512] Device Hardening
[0513] A device typically contains interfaces and mechanisms for debugging and HW analysis with the goal to find issues of a given device discovered during ASIC production, device production, or in field. Joint Test Action Group (JTAG), IEEE standard 1149.1, is a common interface for debugging and various HW analyses. These mechanisms and interfaces must be protected such that they cannot be used by unauthorized pensons for retrieving or modifying FW/SW and/or device data. This can be achieved by permanently disabling the interface, only altowing authorized entities to use the interface, or limitlng what can be accessed with the interface. Also, for authorized access it must be guaranteed that sensitive data belonging to the owner/user of the device such as keys cannot be accessed by the person performing the debugging/fault analysis.
[0514] SW security is one of the mosi important building biocks of device security. Both HW and SW security complément each other. While it is not possible to build a sscur© device without HW security' as a foundation, same also applies to SW security. [0515] While loT GWs with application processors commonly run Linux based OS, MOU based loT devices mainly run light weight OSes such as mbed OS and Zéphyr OS,
There are also other highly security certified OSes being used on devices that hâve to meet high availability and security requirements. Choosing the right OS is important and security hardening of that OS is also equally important. Hardening entropy, user space components and network functionality can also be considered as a part of the OS security hardening process. Other aspects to consider relating to device hardening include • Using SW being deveioped according to the best secure software development practices.
• Sandboxing and isolation - running SW in a sandboxed environment.
• Least privilège concept - processes only get required privilèges.
• Crypto hardening - using secure crypto lîbraries with traceable and reviewed code.
• Use of cryptographically secure PRNG.
• Certification (when applicable).
• Secure SW update - signed updates applied in a timely manner.
[0516] Security for Safety
[0517] However, these security mechanism/tools (maybe excluding non-répudiation) should be impîemented in any secure system, regardless of whether ths aim is making a safe System or not. The safety requirement is maybe more of an indication of the level of security required and that the configuration of security needs to be double checked as any error might hâve larger conséquences than in a System without the safety requirement. The security configuration is also about choosing the right level of securîty/algorithms/keys used in the system. In addition to security, an (at least) equally relevant part for safety is e.g. the availability/reliabiiity of the System, relating to both communication channels and services making up the System, or the correct operation of the components (values that are reported are accu rate, time synchronization etc.).
[0518] Jamminq
[0519] Like safety, jamming is also a topic that has one foot in the security domain. Jamming is a form of Déniai of Service (DoS) attack. Some DoS countermeasures apply also for jamming, e.g. load balancing and rerouting traffic, which on the air interface would mean load balancing and rate limiting, backup base stations, and additional frequencies.
[0520] Industrial Devices
[0521] Industrial devices range from small simple one purpose sensors to large complex sets of devices such as robot cells and paper mills. Thus, one very relevant question we address here is what is a device? îoT devices are often categorized in two main ways: sensing devices and actuating devices. Sensing deviens are equipped with some sort of sensor that measures a spécifie aspect such as température, light ievel, numidity, switch, etc. Actuating devices are such that receive a command and change State accordingly, e.g., a light bulb that can be on or off or air conditioning fan speed. More compiex devices hâve a set of sensors and actuators combined but still only one communication interface. Even more compiex machines may consist of severai smaller devices made up of severai sensors and actuators. Typicaily, even for a small device, a microcontroller or small computer is in place to host the communication stack as well as processing capabilities, memory and so on. In essence, a very compiex device is in fact a small network in itself comprising of severai parts that may or may not need to interact with each other and that may or may not communicate through the same communication module.
[0522] The range of requirements put on the communication itself varies depending on the purpose and criticality of the task the device in question is aimed for. These requirements can include throughput, latency, reliability, battery life and extended coverage. For instance, a simple sensor reporting température changes can be seen having reiaxed communication requirements, whereas controlling robots wirelessly from the cloud requires an URLLC service. Networks need to be able to support a mix of devices and services in the same deployment., In case the device in question is in fact a compiex thing with different sets of sensors and actuators that communicate through the same interface, networks may also need to support a mix of services, Le., different types of traffic, from the same device. This could be for instance, a robot with a video caméra for monitoring purposes (mobile broadband traffic stream) and manipulation arm (URLLC traffic), or a harbour straddle crâne with remote control functionality.
[0523] In order to enter vertical industrial markets, it is necessary to address different use cases described above and answer a few crucial research questions regarding devices. How to combine devices with different URLLC requirements, how to combine different URLLC streams within a device and how to combine non-URLLC streams with URLLC streams within a device. How to monitor QoS metrics within the device and timely send this information to the BS or to the network controller? How to ensure redundancy within the device (UEs, carriers, etc)?
[0524] Finaiiy, the device is not an isoiated part of the network, especially if it has high processing capabilities. Rather, the device is part of the System and may host System functions, e.g., part of the edge cloud, or application of federated machine learning algorithme, what may be bénéficiai both from computational and privacy points of view.
[0525] Distributed Cloud
[0526] The foliowing discussion introduces the concept of a distributed cloud désignée! specifically to meet the requirements of industrial scénarios - the industrial cloud. Moreover, an information management System is described that is able to collect, store, and ma nage large amounts of data from the manufacturing site. Access to stored information is handled through a well-defined API that ailows developers to focus entirely on what to do with the data rather than trying to figure out how to get hold of spécifie data of inierest.
[0527] For traditional (IT) centralized computing in the cloud offers many benefits over local hosting. The technical merits include ubiquitous on-demand access to compute resources (CPU, storage, network, applications, services), elasticity (scaling in and out of resources), and metering (monitor and pay for actuai use). The service provideris re source s are pooled to service multiple consumers simuîtaneously. By utilizing remote hardware that is deployed, managed, and maintained by a service provider much work can be offloaded from the locai !T department. AH these properties translate into a lower overaîl cost for the individual consumers.
[0528] A centralized cloud model has many advantages but does not solve ail industrial requirements. There are two major problems to consider. First, signaling over large distances add to the overalî latency. For (hard) real time processes with strict timing constraints, the round-trip deiay to the cloud may be detrimental to the performance or even make certain use cases impossible to implement, Delayjitter may also become a big problem as the communication to and from the cloud can involve many external links over which littie control is possible. Second, the computational tasks related to industrial production tend to put quite strict requirements on availability, robustness, and security. Even though cloud-native applications and services can and should be designed and set up in redundanî and failsafe way, the communication is not easily guaranteed. For instance, fiber cables may break due to construction work, routing tables can become corrupted, and power outages happen. Regardless of the reason, any interruption of the network connectivity might become catastrophic for the production. !n particular, anything relying on a closed-loop contro! algorithm that is executed in a central cloud must be made such that communication losses are handled with great care. Whether that means on-site réplication of the contro! aigorithm, a graceful dégradation, or something else has to be decîded case by case.
[0529] To mitigate the problems described above while still retaining the benefits of cloud computing, a distributed approach is proposed. The principle is depicted in Figure 25. Basically, a central cloud (also known as a data center) is connected to several other compute instances at physicaily different locations. These peripheral instances might hâve quite different capabilities with respect to processing power, memory, storage, and bandwidth available for communication. Typically, the applications are also distributed to run different parts of them on separate hardware. Used in connection with manufacturing, 5 this System is caîled the industrial cloud. Another notion that is often used synonymousiy for distributed cloud is edge cloud. However, the temn “edge cloud” may also be used to refer specifically to cloud resources located in base stations. Clearly, as shown in Figure 25, an industrial cloud scénario is more general and also spans over locations other than base stations.
[0530] The functional requirements (Le., the specified behaviors and what to do) and non-functional requirements (quality attributes relating to the system’s operation) détermines where to deploy certain tasks. Keeping data close to where it is used is advantageous for time constrained tasks. In other use cases bandwidth restrictions might necessitate temporary storage where the data is produced. Consequently, there is need for local (on-site) compute and storage resources. However, there are also plentiful of less time critical tasks that are better handied in the central cloud. For instance, prédictive maintenance and anomaly détection often dépend on long and complété time sériés of log and sensor data. Sioring this information in the data center simplifies a posteriori analysis and training of deep leaming algorithms.
[0531] Real-time Manufacturing Software Platform
[0532] On-site edge cloud deployments are seen as enablers for new and improved applications thaï reduce cost of deployment and management, including the possibiiity of parts of equîpment to be replaced by software-only solutions. A typical exemple is the robot controlîer, which in existing legacy deployments is a hardware box, essentially an industry-grade PC, installed next to each manufacturing robot. This equîpment is responsible for real-time controi of the robot, like motion controi, requiring millisecondscale controi loops. The first step in cloudification of such brownfield technoiogy is the movement of the software from the controlîer to the on-site cloud, thus simplifying the installation by removing the extra hardware element.
[0533] The next step towards a fully software-defined factory is decomposing the functionality of today’s software controliers into more fine-grained fonctions to take advantage of per-function reüabiiity, scaling, siate data extemalization, and ease of management like updating and version controi that are the benefits of executing programs in the cloud. Each such function encapsulâtes a spécifie part of the overall domain-specific program that makes up the actual business logic controlling each manufacturing process, and idéallyf they are reusable across different such programs. în the 5G manufacturing context, the programs are envisioned to be developed in and run on top of the Manufacturing Software Platform (MSP) which provides commoniy used functionality, like object récognition, motion control, or real-time analytics in a function-asa-service (FaaS) way, reusing the concepts, too! set, and expérience of the web-scale IT industry. The provider of the MSP enabies high flexibility and prcgrammability of the physical devices via components that stack on top of each other and provide an increasing level of abstraction of reality. Such abstractions are both used on detection/sensing/input and when commanding/actuating/output.
[0534] Such high-level concepts are for example observations synthetized from low level sensory input, often combining information from several sources. For example, unit #32 has reached its destination” is a irigger that can be calculated from indoor localizatîon triangulation, a database of destinations and maybe caméra vérification. Each piece of raw input is likely to be processed first in an input device spécifie component, such as localizatîon system or image récognition system. Using the resuît of these higherlevel components may correlate the AGV location to end up with more précisé coordinates. Finally, even higher-level of components may correlate it with the target database and the overali goal of the system. Processing the input is thus done by the stack of components each raising the level of abstraction by a little and adding more context.
[0535] Simiîarly, high-level commanda are like ones that would be given to a human worker, such as “hand over this object to that robot, “paint it white,” or “drill 2 holes there.” The exact procedure to carry out such commands is then calculated by the stack of components going down, from task scheduiing, trajectory planning, motor control al! the way to raw commands to serves.
[0536] This approach eventually ailows programming of manufacturing processes using high-level concepts humans easily understand, simplifying orhiding the complexity the distributed nature of cloudified applications aitogether. It also supports re-use and saves on development time, as the low-level components are likely application agnostic and can be used in many contexts, whereas high-level components are easier to deveiop them working with high-level concepts.
[0537] Both the execution environment and the MSP platform can be added value provided by components in and connected to the 5G network, especiaiiy if they are bundled with connectivity solutions, both wired and wireless, to provide a strong concise industry control vision. For this to happen, an ecosystem of robotics vendors and manufacturing companies has to be on-board and use such components. Collaboration at an early stage is essential.
[0538] Data/lnformation Management
[0539] To take care of ail data produced within an industrial plant, an information management System is needed. Important characteristics for such a System is that it is disiributed (for robusiness and accessing data where it is needed), scalabîe (doing this for one or one hundred machines should hâve the same degree of complexity), and reusable (adding data management of yet another manufacturing site to an existing instance should be simple), and secure (honor confidentiaüty and privacy, ensure data integrity, provide means for data ownership and access control). The task of this System is to collect, manage, store, filter, extract and find data of interest. Clearly, the System must cater for different types of data (e.g., time sériés, streaming data, events of interest, alarms, !og files, et cetera) with quite different requirements on time to live, latency, storage and availability, bandwidth and so forth. Moreover, it must handle a mixture of both sensitive and open data. Storage requirements for data varies, but a solution based on the concept of a distributed cloud with saie storage is needed to cope with the wide range of different requirements that is anticipated. The safety aspect includes privacy concerns and implémentation of access rights, both in-flight (i.e., while data being in transfer) and in storage.
[0540] A rich set of production data is the basis for ail further processing and analysis. Collecting more data facilitâtes new use cases with respect to planning, flow control within the production, efficient logistics, prédictive maintenance, information sharing, control and actuation of individuai machines, anomaly détection, quick response to alarms, distribution of work orders, remote monitoring, daily operations, and much more. The more data being collected, the more challenging become the task of managing it. Fora large industrial site, the total numberof sensors and actuatorthat can be read, monitored and controlled can easily exœed 10 000. The sampling rate varies a lot, but over time the aggregated amount of collected data becomes substantial. Even finding the data of inierest tend to become problematic.
[0541] Production is often less static than it appears to be. Clearly, changes in settîngs or a slightly different set of work stages might be needed for product variations concerning shape, material, size, surface polish, placement of drill holes, et cetera. Moreover, the same set of tools and machines can be used for entirely different products in different production baiches. When a new product is to be manufactured it could even require a complétély new production line to be set up. Variations in production will hâve an impact on what data to look at with respect to operation and analysis. As new sensors and actuators are utilized, the data management must be able to adapt to changed conditions.
[0542] Often the same data can be useful for multiple purposes (e.g., both for the monitoring of productions and for quality assurance after the product is finished), and, as discussed above, entireiy new parameters become of interest when production changes. When sensor data is collected it is advantageous to annotate it with additional information (a.k.a. metadata) for future use. A simple example of this is adding a timestamp to every sensor reading, somethîng that not always exist from start. Other useful metadata are information about location, product id, spécifies about used tools, and/or batch numben |n general, this kind of metadata simplifies searching and improves on traceabiiity. Specifically, it can be used forfiltering and extracting particular information that is needed foranalytics and machine leaming purposes.
[0543] Some sensor data that is collected may be used for other things than the industrial process that is being run in the factory. For instance, it might be readings that relate to monitoring the condition or status of certain equipment that is used in production but is owned by someone else. The owner is interested in monitoring the equipment to plan maintenance and service, but also to collect statistics for improving future générations of the equipment. This data can be sensitive and shouid not be visible to the factory owner. On the other hand, the factory owner may not want to reveal data that relates to the quality or quantîty of the products leaving the production line. Consequently, there is a need to define ownership of and provide means to restrict access of data only to authorized parties. The information management System shouid cater for this while stili handling ail data in the same way regardless of its purpose or two whom ii belongs. [0544] Figure 26 illustrâtes a typical manufacturing scénario. On the left hand side, the factory is depicted, while the right hand side represents the data center (i.e., the central cloud). Connected tools, machines, and sensors produces data that are annotated and forwarded for processing and storage. A “global” device registry keeps track of ail available producers (sensors) and consumera (actuators). Applications obtain information on where to find needed data by asking the device registry. Storage is being taken care of both on-site and în the data center, as is provenance (more on that later). This design allows for both on-site (low-latency) and off-site based control applications. Clearly, this set-up can be replicated in case multiple production sites are to be included.
[0545] The set-up is an exampte of a distributed cloud where data is handled both in the factory and in the central cloud. With the obvious exception of available resource capacity, the local set-up and its functionality can be made very similar to the corresponding set-up and functionality of the data center. Doing so will greatly simplify deployment, operation, and life cycle management of the applications running at both locations.
[0546] in addition to annotating, storing, and processing data, an information management System must also handle data provenance. In short, this is the process of keeping track of data origin, where it moves over time, who uses it, for what purpose, and when it is used. Keeping records of these parameters facilitâtes auditing, forensic analysis, traceback off and recovery from use of erroneous data sériés. Provenance gives the administrator of the information management System a way to obtain a detailed view of data dependencies and derived results. For instance, a faulty or uncalibrated sensor might go unnoticed for some time if it does not cause immédiate havoc in production. Then, if iis sensor data is used for training purpose in a machine learning algorithm, the resulting model might become flawed which will negatively impact its usage. With proper provenance in place, it is possible to find oui where and when the potentially flawed mode! has been used and take appropriate actions to mitigate problems caused by this.
[0547] In order to simplify for developers, it is important that the information management platform provides a well-defined API to find and access ail data. This is true both for raw sensor data that is collected in real time, and for historical records of older data. In particuiar, it can be noted that the distributed cloud model implies that data of interest can be stored at geographically different locations and its placement can vary over time. This fact foilows from different needs (e.g., tolérance for variations in latency), overall robustness (e.g., handling link failure to the data center), and requirements on long term availability. Applications that use the data should not need to keep track of the storage location themselves; the underlying information management platform does this aiiowing dêvelopers to focus on rnore important things,
[0548] A prototype of an information-management System is now being deployed at one of SKF’s roi 1er bearing factories in Gothenburg. This work is part of the 5GEM II research project that is running June 2018 - September 2019. The software is based on both open source projects (e.g., Calvin for handling data flow from factory to data center, and Apache Pulsar and VemeMQ for pub-sub messaging handling) as well as internai proprietary code. The information management platform is for data what Kubernetes is for containers. Clearly, not ail functionality is in place yet, but we iterate and update frequently. The work is done using a modem continuous integration/continuous deployment development methodology. This means changes to the code will be automatically tested, and deployment to the distributed system can be made with a single command. The overall design is deliberately made such that most system updates can be done without interrupting the running applications. Thus, production does not bave to be stopped for deploying software updates to the platform. This property is particularly important at the factory site as updates can then be made also outside of the scheduled maintenance Windows for the production site. Usually a production stop is very expensive for the manufacturer which means planned maintenance Windows are very few and separated with in time as much as possible.
[0549] A distributed cloud retains ail properties of a central cloud such as elasticity, on-demand compute, resource pooling, measured services, and network access. In addition, the ability to place processing doser to where resu lis are used facilitâtes more robust solutions, decentralization, and implémentation of low-latency use cases.
[0550] With an adéquate information management system in place, deveiopers can build new applications and access data produced at the factory without physical access to the manufacturing site and without detaiied knowledge of how data is collected or where it is stored. Different types of data are handled and stored both on-site and within the data centre. A well-defined API exposes services and allows for efficient searching and filtering based on any parameters and metadata that is available. Access rights to data can be defined based on user and/or rôle of said user. Advanced îogging features facilitate audits and traceability of the usage of the collected data.
[0551] Operations and Management
[0552] The term operations and management (O&M) refers to the act of operating and managing the network and the devices in a factory depioyment. Operations Support System (OSS) refers to the software used to accomplish this task.
[0553] The factory floor consists of machiner/ used to produce and manufacture goods. The machines are organized often into an assembly line through which the goods flow with or without human intervention and depending on the level of automation. The different tools and machines used forthe production may or may not be connected. If connected, typically some kind of data is gathered from the machinery to either for prédictive maintenance of the tools and machinery itself or to aid in the quality assurance process of the goods being manufactured. This is called the operational technology (OT) part of the factory floor.
[0554] Most enterprises, factories inciuded, also hâve communication infrastructure in place for the work force comprising of wired and wireless communications (typically Ethernet and Wi-Fi), computers, mobile phones, etc. This equipment is used to access Intranet and internet, email, and other typical office applications. This is called the information technology (IT) part of the factory floor.
[0555] The merger of OT and IT has been identified as an emerging trend. In practice, this means a single interface to operate and manage both the devices, connectivity, the data generated by these devices, and the network infrastructure in a factory. Research questions related to the OT/IT merge in factories include:
• Whai kind of device management protocols are used for the OT and can those interface to the IT system?
• What kind of platform is needed to handle ail the different aspects?
[0556] Digital fwin concept is very popular in the industry settîng. Here the idea is to bring the data gathered to a digital data model of the physîcal asset or the whole factory and then apply analyses on the data to predict, describe and prescribe the past, current and future behavior of the asset or process. Research questions around the digital twin concept include:
• How to mode! the physîcal assets?
• What data is relevant to capture and for how long?
• What kind of latency is required for real time interaction and how to provide that?
• What kind of models are needed to predict possible futures?
• Where to compute and what kind of compute capabilities are needed to perform meaningful prédiction?
[0557] AU of this should be achieved with an easy to use system that can bring increased reliability and availability, reduce risks, lower maintenance costs and improve production. Solutions where an operator exposes/delegates only a small portion of its O&M to its customer may be désirable. The customer should get a simple interface. Solutions should be possible to scale down to just a handful of devices, such that even households can use it.
[0558] Finally, augmented reaiity and Virtual reality in conjonction with the digital twin ideas may hâve a large impact on future network management in the merge IT and OT space. Equipment management may be done remotely with the feel of being présent in the same space. Also, technical documentation and guidance on equipment use or repair can be provided remotely to a person on site through smart glasses, te blets, etc.
[0559] Time-Sensitive Networking
[0560] Following a general idea and initial overview of Time-Sensitive Networking (TSN), where the material presented will help to get a good starting point in TSN. Also provided are certain details of 5G-TSN intégration.
[0561] TSN is envisîoned to improve wired IEEE 802.3 Ethernet communication, to enable support for the very demanding domain of industrial applications (and others). TSN stands for Time-Sensitive Networks (or Networking). It is an ongoing IEEE stand ardization initiative by the TSN task group. They define TSN as a set of individual features. Most TSN features are extensions to the IEEE 802.1Q standard. A TSN network comprises Ethernet end stations (sometimes also called end points), Ethernet cables and bridges (also called swiiches). An Ethernet bridge becomes a TSN bridge if it supports a certain (not-defined) set of TSN features.
[0562] The different features in the TSN standard in general aim at • zéro packet loss due te buffer congestion (usual Ethernet bridges indeed drop packets if buffers are filled) • extremely low packet loss due to failures (equipment, bit errors, control plane etc.) • guaranteed upper bounds on end-to-end latency • low packet delay variation (jitter)
[0563] Communication in TSN happe ns in TSN streams, which may also be referred to as TSN data streams. One spécifie feature in TSN, to give an example, is that streams are subject to an agreement, as arranged between the transmitters (end stations called Talkers) and the network till the receivers (end stations called Usteners), that en sures low latency transmissions without unforeseen queueing.
[0564] In the following, TSN is introduced from a high-leveî perspective. Afterwards are technical details of what a TSN and 5G interworking will look like and how certain TSN features can be supported in 5G.
[0565] The TSN standardization a rose from a standardization initiative that was found to define an Ethernet-based communication standard for Audio and Video communication called Audio-Video Bridging (AVB). TSN is based on AVB and is enhanced with features to make it suitable for industrial usage. Up to now, the TSN community focuses on the following industrial use cases:
• Industrial communication for factory automation (major use case #1) o Shopfloor TSN links (horizontal) o Shopfloor to cloud TSN links (vertical) o Intra-machine communication o TSN for the factory backbone • Intra-vehicle communication (major use case #2) • Electrical power génération and distribution (Smart Grid use cases) • Building automation (no praciical examples on this found so far) • Fronthauling (according to IEEE P802.1CM)
In this document, the use in industrial communication for factory automation is addressed, although some of the detailed techniques and concepts may be applicable to other use cases.
[0566] Figure 27 illustrâtes a hterarchical network architecture in a factory. Shop floor TSN links (horizontal) appear within production cells, connecting devices or machines and controllers. The production line areas enable the connection between the Operational Technology (OT) domain and the Information Technology (IT) domain, but are as well used to connect production cells on the shop floor, if necessary. In the TSN categorization we introduced above, the first one (OT-IT) is obviously based on shop floor to cioud TSN links (vertical) and the latter again on shop floorTSN links (horizontal), TSN used for intra-machine communication is in so far different from horizontal shop floor TSN link, as this is probably a TSN network deployed by a single machine vendor inside for example a printing machine or any other machine tool - from a 5G perspective it is less likely that these horizontal links need to be addressed. TSN for the factory backbone is used in the factory/building/office network (light-orange area), if deterministic communication from virtualized controllers is desired, for example, TSN is necessary endto-end down to the shop floor.
[0567] TSN communication is another kind of packet service that is based on a best effort Ethernet packet network but enhanced though TSN features. An agreement is used between devices invoîved in communication, to achieve determinism. The agreement limits the transmitter of a TSN stream to a certain bandwidth and the network, in retum, reserves the needed bandwidth, reserving buffering mechanisms and scheduling resources. The resources can be exclusively used by the spécifie stream. Compared to other packet services such as CBR (Constant Bit Rate) and best effort type of packet services, certain observations can be made.
[0568] A best effort packet service is perhaps the most known one, where packets are being forwarded and delivered as soon as possible. There are no guarantees, however, on the timely delivery of the packets. The end-to-end latency and the variation of the latency is rather large, and thus a statistical language is preferred to express the overall performance (loss, end-end-tatency and jitter). The top part of Figure 28 shows the typical performance of a best effort packet service network. The typical tail in end-toend latency causes a problem for most industrial use cases.
[0569] On the contrary, there is also the CBR packet service that offers fixed latencies and jitter (latency variation) close to zéro as seen in the application layer. CBR is typically offered by multiplexing in the time domain with typical examples being SDH (synchronous digital hierarchy networks) or OTN (optical transport networks). Typical performance of CBR can be seen in the middle part of Figure 28. A drawback of CBR is that it is very inflexible in the way network resources are shared. So, it is hard to adapt to different application needs, for example in terms of latency or bandwidth - but of course ιπ mdustnal context the requirements are manifoid, and a single network to server ail is desired.
[0570] TSN aims at supporting ail type of traffic classes (Quality of Service (QoS) and non-QoS) over the same infrastructure, Therefore, the TSN network sits somewhere between a CBR and a best effort type of pack et service, where the latency is typically larger compared to a CBR network, but the latency variation and the jitter are bounded no tails. In other words, TSN offers a guarantee that the network wilî not perform worse than a spécifie agreed end-to-end latency and jitter, as seen in the bottom part of Figure 28. These guarantees can be flexibly adapted. This behavior is required by most industrial applications.
[0571] A core feature of TSN is the “stream concept,” where a stream comprises dedicated resources and API. A TSN stream can be seen as the unicast or multicasî from one end station (talker) to another end station or multiple end stations (listener(s)) in a TSN capable network. Each stream has a unique StreamID. The StreamID is created of talker source MAC address and a unique stream identifier. Bridges wili use the StreamID plus the priority code (PCP) field and VLAN ID (VID) that is incîuded inside an 802.1Q VLAN tag in the Ethernet header for internai frame handling. In that sense, TSN streams are standard 802.1 Q Ethernet trames that are given more privilèges than regular Ethernet ποη-TSN trames. Before a talker starts sending any packet in a TSN stream, the spécifie stream has to be registered in the network and certain TSN features to be configured. Next to TSN streams with guaranteed QoS, also best-effort traffic can be sent in a TSN network by peers - but of course without or just limited guarantees on QoS. TSN streams are sent in TSN domains. A TSN domain can be seen as a continuous domain, where ali devices are in sync and continuously connected through TSN capable ports, a TSN domain is defined as a quantity of common ly managed devices; the grouping is an administrative decision.
[0572] Stream management is defined in IEEE 802,1Qcc, Qat; Qcp and CS, It defines the network discovery and the management of network resources and TSN features in a network as for exampîe the création of the required protected channels for TSN streams, Moreover, stream management offers users and network administrators fonctions to monitor, report and configure the network conditions. In TSN, there are three configuration models: a distributed, a ceniralized and a fully centralized one. In the latter two models a Central Network Controller (CNC) is used similar to a Software Defined Networking (SDN) controller to manage TSN switches. In the fully centralized mode!, a Central User Controller (CUC) is used in advance as a central interface for end stations and users, In the distributed mode!, there is no central control, so bridges and end stations need to negotiate on TSN requirements; in this model some TSN features that require a central instance for coordination are not applicable. A lot of TSN features also aim at a common protocol and language standard for interactions between CNC/CUC, end stations and bridges (i.e. YANG, Netconf, Restconf, LLDP, SNMP etc.).
[0573] Time synchronization is used to establish a common time reference that is shared by ail TSN enabled network entities. The time synchronisation is based on the exchange of packets containing time information as defined in IEEE 802.1AS-rev; it defines some amendments to the Précision Time Protocol PTP, widely used in industrial context, that is then called gPTP (generalized PTP). gPTP is an advanced version of PTP in a sense that it supports also redundant grandmaster deployments as weîl as also the establishment of multiple time domains in a single PTP network and some other enhancements and also restrictions to the broader PTP. The ambition of gPTP is to achieve a sub-microsecond accuracy in synchronisation. The précisé time synchronisation is used for some TSN features (for example IEEE 802.1Qbv), as well as provided to applications relying on a common notion of time (like distributed motion control).
[0574] Stream control, which provides for bounded low latency, spécifiés how frames belonging to a prescribed TSN stream are handled within TSN enabled bridges. It enforces rules to efficiently forward and appropriately queue frames according to their associated traffic classes. AH existing stream Controls folîow similar princtples, nameiy, certain privilèges are associated with TSN streams while frames not from prioritized TSN streams might be queued and delayed. Relevant features for industrial networking are IEEE 802.1Qbv (introduces “time-gated queueing,” i.e. time-cooftiinated handling of frames) and IEEE 802.1 Qbu plus IEEE 802.3br for frame pre-emption. 802.1Qbv relies on précisé time synchronization and is only applicable if a CNC is used to schedule frame forwarding in bridges similar to a time-division multiplexing manner. Using Qbv, a CNC tells each bridge alongside a path in the network exactly when to forward frames. An alternative to Qbv is Credit-Based Shaping (802.1Qav) originating from AVB, likely not used for strict industrial use cases as it is not as deterministic. An additional feature called Asynchronous Traffic Shaping (802.1Qcr) is in an early stage of development. An argument against Qbv, which is maybe the best suited to achieve guaranteed latency bounds, is the complexity it requires in terms of scheduling and time synchronization. Qbv and frame préemption (Qbu and br) can might be used separateiy or also combined.
[0575] Stream integrity is important for providing ultra reliability. Apart from delivering packets with ultra-low latency and jitter, TSN streams need to deliver their frames regardless of the dynamic conditions of the network, including transmission errors, physical breakage and link failures. Stream integrity provides path redundancy, multipath sélection, as well as queue filtering and policing. One main feature therefore is IEEE 802.1 CB, including Frame Réplication and Elimination Redundancy (FRER).
[0576] A Visual summary of the TSN features described above is given in Figure 29. [0577] Interworking between 5G and TSN is discussed here. Since both Systems provide diverse ways for ensuing QoS and for network management, new solutions are required. The basic idea according to some of the techniques described here is that the 5G-System (5GS) adapts to the network settings of the TSN network. It should be noted that ongoing TSN standardizaiion defines a set of features. and not ail features need to be supported for every use case. Announcements about which set of TSN features are relevant for which use cases hâve not been done yet. An ongoing initiative to address this issue is the joint project IEC/IEEE 60802: IlTSN Profile for Industrial Automation. It is under development and updated frequently. Publication is planned for 2021.
[0578] Real-time Ethernet is one of the established wireline communication technologies for vertical applications. For wireless communication technologies, 3GPP TS 22.104 spécifiés 5G System requirements to support real-time Ethernet. When some sensors, actuators and motion coniroller are connected using a 5G system and others are connected using industrial (i.e. real-time) Ethernet, the interconnection between realtime Ethernet and 5G is realized using gateway UEs connected to Ethernet switches or a device is connected directly to a data network using an Ethernet adapter.
[0579] Potential baseline system requirements are:
• The 5G system shall support the basic Ethernet Layer-2 bridge functions as bridge learning and broadcast handling • The 5G system shall support and be aware of VLANs (IEEE 802.1 Q) • The 5G system shall support clock synchronization defined by IEEE 802.1AS across 5G-based Ethernet links with PDU-session type Ethernet.
« The 5G system shall support for TSN as defined by IEEE 802.1Q, e.g. IEEE 802.1Qbv (time-aware scheduling) • The 5G System shall support coexistence of critical real-time traffic following a time-aware schedule and ηοπ-TSN lower priority traffic.
[0580] A TSN network consists of four types of components: bridges, end stations, network controller(s) and cables (minor notice: it is common in industrial context that end stations are switches as well to enable daisy-chaining and ring topologies for example). A 5G network will in most cases need to act like one or more TSN bridges if a seamless intégration into a TSN network is envisioned. Therefore, in many cases the 5G network will take part in the TSN network configuration as a usual TSN bridge.
[0581] Figure 30 illustrâtes a baseline architecture in a factory network, where TSN components are used on the shop floor, as well as in the factory backbone TSN. 5G is used to replace the shop floor to cloud (vertical) connection (5G for vertical TSN links). In general, a shop floor TSN as illustrated in Figure 30 might be at least a single TSNcapable end station without any TSN switch. Talker and listener(s) might appear on both sides (UE and UPF) of the 5G network. The 5G network is used to connect or merge both TSN domains. Wireless Access Points or 5G Base Stations may be used to connect TSN domains. A CUC and CNC in Figure 30 are deployed on the factory backbone-side, although they might well be impiemented on the shop floor, for example as part of an intra-machine TSN network.
[0582] Connecting two TSN domains on the sa me shop floor (5G for horizontal TSN links) is one possible scénario. In this case, the 5GS replaces a single hop on the shopfloor. Because N R does not presently support a device-to-device (D2D) capability, this would be a two-hop (UE A - gNB/Core - UE B) connection in 5G.
[0583] For TSN used inside machines (intra-machine communication), an interworking with 5G is obviously of less relevance as introduced above. Two nodes inside a (possibly metailic) machine will likely not rely on a central connection to a 5G base station to communicate wirelessiy. A typical exampie, is a printing machine where different motors must be controlied very precisely to achieve an accurate resuit.
[0584] A further option is that a legacy 5G device (i.e., a device without TSN feature support, or maybe not even an Ethernet device) is connected to a 5GS that is connected to a factory backbone TSN network. As the 5G device is not aware of any TSN features or capable to support them itself, the 5GS might act as a Virtual end point that configures TSN features on behalf of the 5G device to be able to communicate to a TSN end point with seamiess QoS end-to-end. A, Virtual endpoint function could be part of a UPF in the 5GS. From a TSN network point of view it iooks like the Virtual endpoint is the actual endpoint - the 5G endpoint is covert. Figure 31 illustrâtes the conceptual way of working, showing how Virtual endpoints may be used to connect ποπ-TSN devices to a TSN network using 5G. In the figure, “UP refers to “user plane, while “CP refers to “control plane. This concept may be referred to as “Application Gateways.
[0585] Some TSN features introduce challenges to the 5GS. In the following, it is highlighted how some key TSN features might be supported by the 5GS, to enable a seamiess 5G TSN interworking.
[0586] Network-Wide reference time (!EEE 802.1AS-rev)
[0587] In TSN, reference time is provided by the IEEE 802.1AS-rev synchronization protocol that ailows local docks in the end stations and switches to synchronize to each other. More specifically, the so-cailed Generalized Précision Time Protocol (gPTP) described therein employs a hop-by-hop time transfer between the different TSN capable devices of the network. The protocol supports the establishment of multiple time domains in a TSN network and a redundant grandmaster setup as well as other features. A 5GS should be able to take part in the gPTP processes, allowing the same dock accuracy and synching capabilities as in TSN, The gPTP processes must aiways run periodically to compensât© clock drifts, The clock information received by the 5GS over cable from a grandmaster in the TSN network need to be carried over the air from a basestation (BS) to a UE or maybe as well the other way around. Different options are currently discussed how that could be done and it is an ongoing topic in standardization. In the following and in general, a grandmaster is a device that carries a source clock used for gPTP.
[0588] A simple example of TSN time synchronization across a 5G network is illustrated in Figure 32. A grandmaster's time signal is received in the 5GS at the side of the UPF and send over the air by a BS. The UE forwards the time signal it receives from the BS to Device 1 (“Dev 1, in the figure). Device 1 might need the time signal of the grandmaster to be able to communicate with Device 2 (“Dev 2, in the figure).
[0589] tnternally, the 5GS might use any stgnaling not related to gPTP to carry the grandmasters time signal, in that case the ingress points in the 5GS (at UE and User Plane Function (UPF)) need to act as gPTP slaves. They get synched themselves to the grandmaster from the gPTP signais arriving and forward that notion of time on the RAN. Of course, the requirements on time synchronization accuracy are defined by the application and need to be satisfîed. In LTE Release 15, a signaling mechanismfor accu rate time synchronization with sub-microsecond accuracy has been iniroduced and might been reused for NR.
[0590] Fer industrial use cases the support of multiple time domains might be relevant, as depicted in Figure 33 and Figure 34. One time domain might be a global one, such as the Coordinated Universal Time (UTC), This time domain might be used by applications to log certain events on a global time base. Furthermore, additionai time domains might be used based on local docks, i.e., docks that are based on an arbitrary timescale and don’t hâve a certain defined start-point epoch (e.g., a dock at a grandmaster that started at the boot up of the device instead of referring to a global clock timescale). This local clock might hâve a much higher précision than the global clock. It is distributed from a grandmaster to a few other devices and used on the application layer to coord in ate very accurately synchronized actions or for example for timed communication as defined in 802.1 Qbv. To support multiple time domains in the 5GS, one possible way of implémentation is to establish a common reference time between ail gNBs and UEs, for example using the UTC timescale, and then based on that, transfer individuai time domain signais in the 5GS only to end-stations requiring that spécifie time domain. For transmission of individuai local time signais it is possible to use timestamping from the common référencé time or transmit offsets periodically that are referenced to the common référencé time. In addition, it might also be possible that a forwarding of gPTP frames is done transparently through the RAN by using a similar timestamping mechanism.
[0591] The concept to use a common référencé time to support multiple other time domains in general is iilustrated in Figure 33. in this figure, the clock in the 5G time domain depicts the common référencé time, while the docks in the TSN work domains are local docks that need to be forwarded to some UEs over the 5GS. Based on the timestamps done using the common référencé time at UE and UPF, it would be possible to correct the times inside gPTP packets (belonging to a TSN work domain clock) to account for varying transmit times in the 5GS. Only a subset of ail gPTP frames arriving at the ingress might need to be transported across the 5GS, like for example Announce (config) frames and Folîow-Up (cany timestamps) frames, Other frames could be consumed at the 5GS ingress and not forwarded. Ai the egress the 5GS need to act like a gPTP master in any case. To detect and differentiate time domains, the domainNumber field in the gPTP header of each frame can be used. There are some efforts necessary to identity which UE needs to be synched to which time domain. A recent research activity has addressed this issue.
[0592] In Figure 33 the Application Function (AF) in the 5GS is used as an interface towards the CNC in the TSN network - in one possible way the CNC might provide information to the 5GS about howtime domains need to be established, i.e., which UE needs which time domain signal.
[0593] Timed Transmission Gates (IEEE 802.1Qbv)
[0594] The TSN feature IEEE 802,1 Qbv provides scheduled transmission of traffic controlled by transmission gates. Each egress port in an Ethernet bridge is equipped with up to eight queues and each queue with a separate gâte. This is illustrated in Figure 35. [0595] Ingress traffic is forwarded to the queue at the egress port it is destined to; the egress queue is for example identified by the priority code point (PCP) in a frame’s VLAN-header field. A regular cycle (“periodic window”) is established for each port, and at any particuiar time in that window, only certain gates are open and thus only certain traffic classes can be transmitted. The queue coordination is done by the CNC. The CNC gathers information about the topology, streams and also individuai delay information from ail switches and croates a Gâte Control List (GCL). The GCL Controls the timing of the opening and closing of queues at each switch, but not the order of frames in the queue. If the order of frames in the queue, i.e. the queue State, is not deterministic, the timely behavior of the two streams may osciliate and lead to jitter for the overail end-toend transmission. By opening and closing gates in a time-coordinated manner it is possible to achieve a deterministic latency across a TSN network, even if indeterministic best-effort type of traffic is présent on the same infrastructure. Best effort traffic is stmply held back by closing its queue and let priority traffic pass from another queue, It is important to mention that a timely delivery does not just mean to not sent a frame to late from one bridge to the next but also prohibits to send it too eariy as this might lead to a buffer congestion at the consecutive hop.
[0596] The 5GS should be able to transmit frames in a way that the 802.1 Qbv standard expects, i.e., according to a GCL created by a CNC in case the 5GS acts as one or multiple TSN switches from a TSN network perspective. This means keeping spécifie time Windows for ingress and egress TSN traffic at UE and UPF respectively. So, data transfer in the 5GS has to happen within a spécifie time budget, to make sure that the packets are forwarded at the configured point in time (not earlier or later) to the next TSN node in both uplink and downîink. As the biggest part of the latency in the 5GS is probably added in the RAN it seems reasonable to use the timing information from a CNC at gNBs to improve the scheduling of radio resources. It might be possible to exploit the information about transmission timings according the Qbv scheduling for an efficient scheduling of radio resources at a BS using mechanisms like configured grants and semipersistent scheduling. As a BS anyhow needs to be time aware to be able to forward the time signal to UE(s) it just might need to get awsre about the transmission scheduîes in advance. The Qbv mechanism ensures frames arrive at the 5GS from the TSN network with minimum jitter.
[0597] The Application Function (AF) in the 5GS might be an option to interface the CNC. There, a topoîogy could be announced, as well as latency figures could be provided to the CNC as if the 5GS would be a regular TSN switch or any TSN switch topoîogy. The AF then could also accept a time scheduie from the CNC and translate it into meaningfu! parameters for the 5GS to support the time gated queuing happening in the extemal TSN network. It is important to understand that in the current way the CNC is specified it wiil accept only fixed numbers to define the delay that is added through a typicaï TSN switch. Therefore, some new methods are required to allow also the 5GS to be a more flexible TSN switch regarding the latency numbers that need to be reported to the CNC.
[0598] One way of achieving a timely delivery of packets might involve the use of □layout-buffers at the egress points of the 5G network (i.e, at a UE and the UPF for downlink or upiink). Those playout buffers need to be time aware and also aware of the time schedule used for Qbv and specified by the TSN network’s CNC. The use of playout buffers is a common way to reduce jitter. In principle for downlink for example the UE or any function following the UE will hold back packets until a certain defined point in time has corne to forward it (“play it ouf). Same would be possible in upiink, probably in the UPF or after the UPF as an additional fonction for TSN traffic.
[0599] Frame Préemption (IEEE802.1Qbu)
[0600] The IEEE 802.1Qbu amendaient, “Frame Pre-emption”, and its companion IEEE 802.3br, “Spécification and Management parameters for Interspersing Express Traffic, add the capability of internapting a frame transmission to transmit a frame of higher pnority. Because they do not hâve to wait for the lower-pnority transmission to fully finish, any express frames hâve shorter latency. The eight pnority levels are split into two groups: express and preemptable. The queues assigned to pnority ieveis belonging to the express group are referred to as express queues. The transmission of the pre-empted frame résumés after the express traffic is finished, and the receiver is able to reassemble the pre-empted frame from the fragments.
[0601] The 5G network already supports pre-emption techniques with the exisiing mechanisms. Whether there is additional effort needed to fully support frame pre-emption is not clear yet. It shouîd be noted that there is an important différence between IEEE frame pre-emption and 5G pre-emption techniques. IEEE frame pre-emption is just interrupting transmission and after forwarding express frame(s) the pre-empted frame transmission is continued. There is no retransmission.
[0602] Frame Réplication and Elimination for Reliability - FRER (IEEE 802.1CB) [0603] The IEEE 802.1 CB standard introduces procedures, managed objects and protocols for bridges and end Systems that provide identification and réplication of packets for redundant transmission. One of these procedures is Frame Réplication and Elimination for Reliability (FRER), which is provided to increase the probability that a given packet will be delivered - in case one Ethernet plug is removed for any reason, or a cable is eut accidentally the communication should continue.
[0604] Figure 36 illustrâtes some of the basic features of FRER. Some of the important features of FRER are:
• Appending sequence numbers, to packets originating from a source, or from a particular stream.
• Based on the exact needs/configu ration the packets are replicated. These créâtes two (or more) identical packet streams that will traverse the network • At spécifie points in the network (typicaily dose to or at the receiver) the duplicate packets are eliminated.
• Compiex configurations are supporied so the mechanism can support failures at multiple points in the network.
[0605] A 5GS might need to support end-to-end redundancy as defined in FRER for TSN as well, for example by using dual connectivity to a single UE or also two PDU sessions to two UEs deployed in the same industrial device (can be cailed “Twin UEs”). Anyway, redundancy in the 5GS might not base on exact the same principles as a TSN network (which means complété physical end-to-end redundancy using separate equipment). The latter ones rely on fixed wired links, while 5G relies on a dynamic radio environment. Nevertheless, redundancy as defined by FRER is rather pointing at failures in the equipment (such as an error in a gNB that leads to a connection loss, etc.), but obviously also helps to overcome influences of changing radio conditions and connection losses due to handovers.
[0606] If “Twin UEs” are used they should be connected to two BSs anytime to supports fui! redundancy and in case of a handover, not perform it both at a time and not to the same BS.
[0607] It is an open discussion whether a physical redundancy needs to be implemented in the 5GS or whether traffic can be carried over for example a single User Plane Function (UPF) or server hardware respectively. If for example some 5GS fonctions are so reiiable that it is not required to be deployed in a redondant way, then it might be sufficient to just use physical redundancy for some parts of the 5GS.
[0608] Some inventions hâve been worked on describing how this FRER type of redundancy can be supported in the 5GS, both on the RAN and on the core. As a configuration point for redundancy we also suggest using the Application Function (AF). The 5GS couid announce different redundant paths to the TSN network and internally in the 5GS couid support the redundancy in a way it is sufficient with or without physical redundancy of certain components. So, the actual 5G interprétation of redundancy can be hîdden from the CNC/TSN définition of redundancy this way.
[0609] 5G and TSN - Network Configuration
[0610] in TSN, the IEEE 802.1Qcc extension supports the runtime configuration and reconfiguration of TSN. At first, it defines a user network interface (UNI). This interface enabies the user to specify stream requirements without knowledge of the network, thereby making the network configuration transparent te the user. This of course as weil relevant to achieve a plug-and-play behavior as it is common for home and office networking but especially not in today’s industrial Ethernet networks.
[0611] There are three models that enable this transparency. Specifically, the fully distributed model, where stream requirements propagate through the network originating from the talker till the iistener. Therein the UNi is between an end station and its access switch. The fully distributed model is illustrated in Figure 37, where the solid arrow represents UNI interfaces for exchange of user configuration information between talkers, lîsteners and bridges. The dashed arrow in the figure represents a protocol carrying TSN user/network configuration information, as well as additional network configuration information.
[0612] The centralized network/distributed user model introduces an entity, called the centralized network configurator (CNC), with complété knowledge of ail streams in the network. AH configuration messages originale in the CNC. The UNI is still between the end station and access switch, but in this architecture, the access switch commun ica tes directly with the CNC. Figure 38 depicts the centralized network/distributed user model. [0613] Finalîy, the fully centralized model allows a central user configurator (CUC) entity to retrieve end station capabilities and configure TSN features in end stations.
Here, the UNI is between the CUC and the CNC. This configuration model might be most suitable for the manufacturing use cases, where Iistener and talker require a significant number of parameters to be configured. The CUC interfaces and configures end stations, while the CNC still interfaces bridges. The fully centralized model is illustrated in Figure 39. The following discussion provides more details for the fully centralized mode!, since it is likely the most suitable for the manufacturing use cases.
[0614] CUC and CNC
[0615] The CUC and CNC, at the fully centralized model, are part of a configuration agent (e.g., a PLC in a factory automation context) that executes both tasks, as shown in Figure 40, which illustrâtes a configuration agent consisting of CUC and CNC. (in the figure, SW refers to a switch, “ES” refers to and end station, and UNI” refers to a user network interface.) The standard IEEE 802.1Qcc does not specify protocols to be used between CUC and CNC as shown in Figure 40. OPC UA (Open Platform Communications Unified Architecture) might be a possible sélection for the interface between CUC and end stations, Netconf between bridges and CNC. For TSN stream establishment, a CUC will raise a join request to the CNC, as depicted in Figure 41, which shows interaction between CNC and CUC.
[0616] The communication between talker and Iistener happens in streams as introduced above. A stream has certain requirements in terms of data rate and latency given by an application implemented at talker and Iistener. The TSN configuration and management features are used to setup the stream and guarantee the stream’s requirements across the network. The CUC coliects stream requirements and end station capabilities from the devices and communicates with the CNC directly. Figure 42 shows the sequence diagram between different entities to conduct a TSN stream setup.
[0617] The steps to setup a TSN stream in the TSN network in the fully centralized model are as follows:
1) CUC may take input from e.g. an industrial application/engineering tooi (e.g. a PLC) which spécifiés for exampie the devices which are supposed to exchange time-sensitive streams.
2) CUC reads the capabilities of end stations and applications in the TSN network which includes period/interva! of user iraffic and payload sizes.
3) CNC discovers the physical network topology using for example LLDP and any network management protocol.
4) CNC uses a network management protocol to read TSN capabilities of bridges (e.g. IEEE 802,1Q, 802.1 AS, 802.1 CB) in the TSN network.
5) CUC initiâtes a join requests towards the CNC to configure TSN streams. CNC will configure network resources at the bridges for a TSN stream from one talker to one or more listener(s).
6) CNC configures the TSN domain.
7) CNC checks physical topology and checks if required features are supported by bridges in the network.
8) CNC performs path and schedule (in case Qbv is applied) computation of streams.
9) CNC configures TSN features in bridges along frie path in the TSN network. 10) CNC retums status (success orfailure) for streams to CUC.
11) CUC further configures end stations (protocol used for this information exchange is not in the scope of the IEEE 802.1 Qcc spécification) to start the user plane traffic exchange as defined initially between listener(s) and talker.
[0618] The 5GS Application Function (AF) is seen as the potentia! interface for the 5GS to interact with TSN control plane functions (i.e., CNC and CUC). The AF, according to 3GPP TS 33.501, can influence traffic routing, interact with the policy framework for policy contro! for 5G links and also further interact with 3GPP core functions to provide services, which can be utilized to setup and configure TSN streams in the 5G TSN interworking scénario. Figure 43 illustrâtes the potential interfacing of the AF with the TSN control plane.
[0619] The F REP setup sequence stream in a TSN network is shown in Figure 44. A CUC sets the values of the parameters (NumSeamlessTrees greater than 1) in request to join message from CUC to CNC. A CNC then calculâtes disjoint trees based on this input in the path computation step. It uses management objects of IEEE 802.1CB (FRER) to configure redundant paths in the bridges.
[0620] As introduced in the FRER part above, the AF could implement the interface that signais redundancy support towards the CNC and accepts redundant path computations from it. This is iilustrated in Figure 45, which illustrâtes interaction between AF, CUC, and CNC to setup FRER. Furthemnore, the AF might also be used to interact with the CNC for other TSN features beyond FRER.
[0621] TSN is now in a research and development phase. Early products are available on the market that support only a subset of TSN features listed in here. Also, the TSN standardization is ongoing and some features are not yet finalized. Especially it is not clear which features will be relevant for industrial use cases and which not. IEC/IEEE 60802 is an ongoing effort to define a TSN profile for industrial usage. Nevertheless, it is a wide spread vision that TSN will be the major communication technoiogy for wired industrial automation in the next years.
[0622] In the preceding paragraphs, the concept of the Time Sensitive Networks (TSN) was introduced and the vision of improving Ethernet communication for industrial applications was explained. Then the technical introduction provided some of the performance goals of a TSN that needs to handle noi only best effort type of traffic but also critical priority streams. These critical streams require very low bounded latencies that TSN must support. This ailows TSN to enable new use-cases in the area of industrial automation.
[0623] T'nen, more details on the TSN operating principies were pirovidëd, to expiain how TSN can provide deterministic communication. The issue of integrating 5G with TSN core features, was also discussed. This intégration requires the support of a spécifie set of TSN features from a 5G network. This feature set was explained and also some inventive techniques were described, for enabling a smooth interworking between the two networks.
[0624] Core Network
[0625] The core network is the part of the System that résides between the Radio Access Network (RAN) and one or more Data Networks (DN). A data network could be Internet or a closed corporate network. We assume the core network to be fully virtualized, running on top of a cloud platform. Tasks of the core network include: subscriber management; subscriber authentication, authorization and accounting; mobility management; session management including policy control and traffic shaping; lawful interception; network exposure fonctions. The 5G core network is described jn the
3GPP document “System Architecture for the 5G System (5GS),” 3GPP TS 23.501, v. 15.4.0 (December2018). Figure 46 illustrâtes components of the 5G core network and its reiationship to the radio access network (RAN) and the (JE, as described in 3GPP TS 23.501.
[0626] In today’s Mobile Broadband (MBB) deployments, core network fonctions are often deployed on large nodes serving millions of subscribers. The nodes are often placed in few central ized data centers, giving an economy of scale.
[0627] in 5G, many other use cases will arise besides MBB. These new use cases may require different deployments and different functionalities. For example, in manufacturing, lawful intercept and many charging and accounting function may not be needed. Mobility can be simpltfied or, in case of small factory sites, may not be needed at ali. Instead new fonctions are needed including support for native Ethernet or TimeSensitive Networking (TSN). Preferably, newfonctions can be added quickly without having te go through a lengthy standardization process.
[0628] For reasons of latency, data locality and survivability, a core network for manufacturing shouid not necessarily need to run in a large centralized data center. It shouid instead be possible to deploy a small-scale core network at the factory site. What is needed for 5G, and for manufacturing, is a core network that is flexible in terms of deployment and in terms of functionality.
[0629] These issues can be addressed by decomposing the user plane of the core network into a small function called a micro user plane function (pUPFs). Depending on the use case, different sets of pUPFs are re-composed into a user plane service for a subscriber. The service may change overtime, and the pUPFs are hosîed on execution nodes, depending on service requirements like latency, The control plane of the core network requests a service by describing it on an abstract leveî. A Chain controller translates this high-level service description into a set of pUPFs and instantiates those pUPFs on the correct execution nodes. Figure 47 illustrâtes the Chain controller concept, [0630] This approach gives flexibility in terms of deployment and functionality and can be used as a basis for use cases like manufacturing. As an important aspect of flexibility, this approach allows implémentations that can scale down to very small footprints.
[0631] One core network deployment alternative for the core network in manufacturing is a local, possibly stand-alone, deployment at the factory. Another deployment alternative is to run parts of the core network at a more centralized cloud. Such cloud couid be at an operator site or at some corporate site. If the core network is provided by an operator, then such deployment couid give an economy-of-scale advantage. Processes for this manufacturing customer could be hosted on nodes that are also used for other customers. The same management Systems may be used to serve multiple customers.
[0632] In the latter deployment, spécial care needs to be taken for latency, data locality and local survivability. Parts of the user plane will always need to run on the local factory cloud for latency. But the controi plane may very well run remotely, since this device controi plane signaling is mainly for authentication (not frequent and not timecritical), session setup (typically only once for factory devices), and mobility across base stations (which may not happen at ail for small deployments).
[0633] Signaling is mainly for authentication (not frequent and not time-critical), session setup (typically only once for factory devices), and mobility across base stations (which may not happen at ail for small deployments). Figure 48 shows a high-level functional view of this deployment.
[0634] Some core network functions used for MBB are not needed in manufacturing. This imposes a requirement on a core network for industrial applications to scale down to a very minimum of features. Some new features will be needed. New features that will be required are basic Ethernet support (native Ethernet PDU sessions), and more advanced Ethernet features (for example, TSN).
[0635] It must be possible to differentiate traffic within a factory. For example, production-critica! devices require a different service then “office” devices. There are several techniques to achieve such différentiation; including PLMNs, slicing, APNs or pUPF chaining.
[0636] More features can be envisioned in the following areas:
• Resilience.
• Redundancy (multiple UEs).
• Data locality.
» Ability to access factory floor network from outside the factory.
[0637] New features for manufacturing will impact several interfaces to the core network. For example, running production-critical core network services requires a production-critica! cloud to run on. Or, a network deployment with some parts running locally under the responsibility of the factory owner, and some parts running centrally under the responsibility of the operator will require changes in management Systems. Furthermore, additional network exposure interfaces will be needed if the 5G (core) network system is modelled as a single logical TSN switch.
[0638] Radio Access Network
[0639] In recent years, the cellular radio access capabilities necessary for enabling support for Industrial loT hâve been greatly improved, resulting in both LTE and NR becoming suitable technologies for providing this support. Several architecture options supporting reliable delivery as well as new MAC and PHY features to enable URLLC hâve been added to the spécifications in LTE and NR Release 15. Additional URLLC enhancements are being studied for NR Release 16 with a goal to achieve 0.5-1ms latency and reliability up to 1 -10 e. Furthermore, improvements especialiy targeting support for Ethernet PDU transport and TSN by the N R RAN are envîsaged for Release 16.
[0640] The following describes the specified LTE and NR URLLC features introduced in 3GPP Release 15 as well as our proposed RAN concept for NR Release 16. First, how 5G RAN architecture options may be used to support data duplication for achieving higher reliability is discussed. Then, layer-1 and layer-2 features for URLLC are described, including features that are currently being considered in Rel-16 work on NRIndustrial JoT and enhanced URLLC (eURLLC). The following continues to describe how LTE and N R de live r précisé time référencés to U Es as well as how Ethernet compression works when Ethernet PDUs are delivered through the 5G RAN. For industrial loT use cases such as factory automation, reliability needs to be ensured for both data and central planes. Further, a description of how reliable contrai plane and reliable mobility can be achieved. A technology roadmap is described, highlighting the feature sets specified in Release 15 LTE and Release 15 NR as well as planned for Release 16 NR, and is concluded with a summary.
[0641] 5G RAN Architecture Options
[0642] This sub-section introduces the 5G RAN architecture on which the subséquent description of features to support Industrial loT is based on.
[0643] The 5G standardisation work in 3GPP concluded for Release 15 for NR, for LTE, and for Multi-Connectivity including both NR and LTE. Release 15 is the first release for the newly developed radio access technology 5G NR. In addition, several LTE features necessary to enable 5G use cases hâve been specified. These new Rel-15 N R and LTE standards support intégration of both technologies in multiple variants i.e. LTE base stations (eNBs) interworking with NR base stations (gNBs) with E-UTRA core network (EPC) and 5G core network (5GC), respectively. In such intégration solutions, the user-equipment (UE) connecte via different carriers with two radio base stations, of LTE or NR type, simultaneously, which is generaHy denoted Dual Connectivîty (DC) and
100 tn the case of LTE+NR denoted EN-DC/NE-DC. The network architectures aliowing for LTE and NR interworking are iIlustrated in Figures 49, 50, and 51.
[0644] Figure 49 shows the control plane of the RAN in case of Multi-Connectivity. In the EN-DC case, shown on the left of the figure, the LTE master eNB (MeNB) is the anchor point towards the MME of the EPC. In this case the NR node, gNB, is integrated into the LTE network (therefore denoted en-gNB). In the NR-NR DC case, shown on the right, both master and secondary node (MN and SN) are of NR gNB type, where MN terminâtes the control plane interface to the 5GC, i.e. to the AMF.
[0645] Figure 50 shows the user plane network architecture, again with fine EN-DC case on the left and the NR-NR DC case shown on the right. In the user plane, data can be directly routed to the secondary node (en-gNB in EN-DC, and SN in NR-NR DC) from the core network or routed via the MeNB/MN towards the secondary node. Transmission/Reception to/from the UE may then happen from both nodes.
[0646] The protocol architecture for the radio access in LTE and NR is largely the same and consists of the physical layer (PHY), medium access control (MAC), radio link control (RLC), packet data convergence protocol (PDCP), as well as (for QoS flow handling from 5GC for the N R) the service data adaption protocol (SDAP). To provide low îatency and high reliability for one transmission link, i.e. to transport data of one radio bearer via one carrier, several features hâve been introduced on the user plane protocois for PHY and MAC, as we wiH see further in the respective sections below. Furthermore, reliability can be improved by redundantly transmitting data over multiple transmission links. For this, multiple bearer type options exist.
[0647] In Figure 51, the different radio bearer types for NR, which both user plane and control plane bearers (DRB or SRB) can assume, are illustraied. In the Master cell group (MCG) or secondary cell group (SCG) bearer type transmissions happen solely via the cell group of the MeNB/MN or en-gNB as secondary node / SN respectively. Note that MCG and SCG are defined from viewpoint of the UE. However, from the network point of view, ihose bearers may be terminated in MN orSN, independently ofthe used cell group.
[0648] In the split bearer type operation, data is split or duplicated in PDCP and transmitted via RLC entities associated with both MCG and SCG cell groups. Also, the split bearer may be terminated in MN or SN. Data can be conveyed to the UE via one more multiple of those bearers. Duplication of data is possible for MCG or SCG bearer When additionally empîoying CA within a cell group, or by empîoying the split bearer for duplication among cell groups; which is further described below. Furthermore, redundancy can also be introduced by transmitting the same data over multiple bearers,
101
e.g. MCG temninated bearerand SCG terminated bearer, while handling ofthis duplication happens on higher layer, e.g. outside of RAN, [0649] URLLC Enablers in User Plane
[0650] For the operation of URLLC services, i.e. provisioning of low latency and high-reliability communication, several features hâve been introduced for both LTE and N R in Rel-15. This set of features constitutes the foundation of URLLC support, e.g. to support 1ms latency with a 1-10Λ-5 reliability.
[0651] In the RAN concept described, these URLLC features are taken as a baseline, with enhancements developed for both Layer 1 and Layer 2, These are on the one hand serving the purpose of fulfilling the more stringent latency and reliability target of 0.5ms with 1-10Λ-6 reliability, but on the other hand also allowing more efficient URLLC operation, i.e., to improve the system capacity. These enhancements are also particularly relevant in a TSN scénario, i.e. where multiple services of different (mostly periodic) traffic characteristics must be served with a detemninistic latency.
[0652] In this section, URLLC enablers for user plane data transport, i.e. the Layer 1 and Layer 2 features, are described. This is one part of the overall RAN concept only; to support the 5G TSN intégration from RAN, further aspects are considered, such as reliability in the control plane and mobility, as well as accurate time reference provisioning.
[0653] Note that in most cases, the main descriptions herein are based on NR, although in certain cases LTE descriptions are provided as baseline while the features are conceptually also applicable to NR. Further below, a table is provided identifying whether the features are specified for LTE/NR. Whether a feature is required dépends on the spécifie URLLC QoS demand in terms of latency and reliability, Furthermore, some of the features can be se en not as enablers for URLLC itself but enabiing more efficient realization of URLLC requirements by the System, i.e., features that enhance capacity will resuît in an increased number of URLLC services that can be served, Therefore, these features can be roughly grouped as essential features for low latency, essential features for high reliability, and others, asfollows.
[0654] Essential features for low latency:
• Scalable and flexible numerology • Mini-slots and short TTIs • Low-latency optimized dynamic TDD • Fast processing time and fasi HARQ • Pre-scheduling on uplink with configured grants (CG) (Layer 2);
[0655] Essential features for high reliability:
102 • Lower MCS and CQI for tower BLER target
[0656] Furthermore, the following features hâve been considered as well:
• Short PUCCH: e.g. forfast scheduling request (SR) and faster HARQ feedback • DL pre-emption: for fast transmission of critical traffic when other traffic is ongoing • DL control enhancements: for more efficient and robust transmission of downlink control « Multî-antenna techniques: improving the reliability • Scheduling request and BSR enhancements: for handling of multiple traffic types « PDCP duplication: for carrier-redundancy i.e. even more reliability
[0657] The following discussion will review these features as specified in Release 15, a description of enhancements suitable for Release 16, as well as new feature descriptions suitable for Release 16, starting with Layer 1 and continuing with Layer 2. [0658] URLLC Enablers in User Plane
[0659] In NR, a slot is defined to be 14 OFDM-symbols and a subframe is 1 ms. The length of a subframe is hence the same as in LTE but, depending on OFDM numerology, the number of slots per subframe varies. (The tenu “numerology” refers to the combination of carrier spacing, OFDM Symbol duration, and slot duration.) On carrier frequencies below 6 GHz (FR1 ) the numerologies 15 kHz and 30 kHz SCS (Sub-Carrier Spacing) are supported while 60 kHz SCS is optional for the UE. 15 kHz SCS equais the LTE numerology for normal cyclic prefix. For frequency range 2 (FR2) the numerologies 60 and 120 kHz SCS are supported. This can be summarized in Table 8.
A = 2+ 15 [kHz] Slot duration Frequency range Supported for synch
0 15 1 ms FR1 Yes
1 30 0.5 ms FRI Yes
2 60 0.25 ms FRI (optional) and FR2
3 120 0.125 ms FR2 Yes
Table 8 - Summary of supported numerologies for data transmission in NR
Release 15
[0660] The possibility of using different numerologies has the benefit of adapting NR to a wide range of different scénarios. The smallest 15 kHz subcarrier spacing simplifies co-existence with LTE and gives long symbol duration and also long cyclic prefix length, making it suitable for large cell sizes. Higher numerologies hâve the benefit of occupying a larger bandwidth, being more suitable for higher data rates and beamforming, having
103 better frequency diversity, and, important for URLLC, having a low latency thanks to the short symbol duration.
[0661] The numerology itself can thus be considered as a feature for URLLC, since transmission time is shorter for high SCS. However, one needs to consider signalling limitations per slot, such as PDCCH monitoring, UE capabilities, and PUCCH transmission occasions, which can be a lîmiting factor, since UE is less capable per slot basis ai high SCS.
[0662] NR provides support for mini-slots. There are two mapping types supported in NR, Type A and Type B, of PDSCH and PUSCH transmissions. Type A is usually referred to as slot-based while Type B transmissions may be referred to as non-slotbased or mini-siot-based.
Mini-slot transmissions can be dynamically scheduled and for Release 15:
• Can be of length 7, 4, or 2 symbols for DL, while it can be of any length for UL * Can start and end in any symbol within a slot.
Note that the last buîlet means that transmissions may not cross the slot-border which introduces complications for certain combinations of numerology and mini-slot length. [0663] Mini-slots and short TTI both reduce the maximum alignaient delay (waîting time for transmission opportunity) and transmission duration. Both the maximum alignaient delay and the transmission duration decrease lineariy with a decreased TTI and mini-slot length, as can be seen in Figure 52, which shows latency from the use of mini-slots, compared to the “normal” 14 OFDM symbol slots. The results in Figure 52 are based on downlink FDD one-shot, one-way latency, assuming capability-2 UE processing. In certain wide-area scénarios, higher numerology is not suitable (the CP length is shortened and may not be sufficient to cope with channel time dispersion) and use of mini-slots is the main method to reduce latency.
[0664] A drawback with mini-slot is that a more frequent PDCCH monitoring needs to be assigned. The frequent monitoring can be chatlenging for the UE, and also uses up resources that otherwise could be used for DL data. In NR Rel-15 the number of monitoring occasions that can be configured will be limited by the maximum number of blind décodés per slot and serving cell the UE can perform and the maximum number of non-overiapping control channel éléments (CCEs) per slot and serving cell.
[0665] To maintain efficiency for data symbois we can expect higher L1 overhead with mini-slots due to the higher fraction of resources used for DMRS. Even if only a fraction of the OFDM symbols is used for DMRS, it could be one symbol out of e.g. 4 instead of 2 symbols out of 14 for a slot.
104
[0666] Based on formulated drawbacks, the following challenges related to minislots are being addressed in NR Release 16:
• Mini-slot répétitions (including répétitions Crossing Slot border);
• Réduction of DMRS overhead;
• Enhanced UE monitoring capabiîities;
• Fast processing in UE and gNb.
Release 16 solutions for these challenges are described below.
[0667] With regards to min-slot repetitons, since URLLC traffic is very latency sensitive, the most relevant time allocation method is type B, where one can start transmission at any OFDM-symbol within a slot, At the same time the reliability requirements can lead to very conservative link adaptation settings, hence, lower MCSs may be selected which requires more RBs, Instead of having wider allocation in frequency, gNB can décidé to allocate longer transmission in time which can help to schedule more UEs at the same time. Unfortunately, due to restrictions in Release-15 NR, the transmission must be delayed in time if it overlaps with the slot border. The illustration of this issue is presented in Figure 53, which is an illustration of long alignment delay due to transmission across slot border restriction in NR Release 15. Here the alignment delay is a time between two events: when UE îs ready for transmission and when transmission is taking place in the beginning of the next slot.
[0668] To illustrate the latency gains possible by allowing scheduling of a transmission to cross the slot border using mini-slot répétition we look at the average latency gains compared to scheduling transmissions that are constrained to fit in one slot. One way of using mini-slot répétitions to achieve this is illustrated in Figure 54, but other ways give the same overall latency.
[0669] Given an assumption that data packets are equally likely to arrive at the UE at any symbol within a slot, Tables 9-11 show the worst case latency for different combinations of transmission durations and SCS for non-cross-border and cross-border scheduling respectively, considering UL configured grant with HARQ-based retransmissions. Since there are 14 symbols in a slot and we typicalîy target very low block errer probabilities, we need to ensure that the latency bound can be achieved when data arrives at the symbol that gives the worst-case latency. We evaluate the latency assuming capability 2 UE, and that the gNB processing time is the same as the processing time at the UE. We assume that the gNB uses ha If of the processing time for decoding, Le., if the transport block is decoded correctly it can be dêlivered to higher layers after half the processing time. Since allowing HARQ retransmissions can lower the amount of resources used consrderably by targeting a higher BLER in the first
105 transmission we evaluate the latency afterthe initia! transmission, 1 st, 2nd, and 3rd HARQ retransmission, taking into account the time needed to transmit PDCCH scheduling the retransmission and the time needed to préparé the PUSCH retransmission. We assume that any retransmissions use the same length as the initial 5 transmission.
[0670] In Tables 9-14 we show the worst case latency for HARQ-based retransmission achievable with Release 15 (transmission not Crossing the slot border) and the worst case latency when using mini-slot répétition to allow Crossing the slot border. We consider SCS = 15, 30, or 120 kHz, and a total PUSCH length of 2 to 14 symbols, counting any répétitions, i.e., a 2-symbol mini-slot repeated 4 times shows up in the tables as a length 8 transmission. To make the tables easier to interpret, they focus on target latencies of 0.5,1, 2, and 3 ms respectively. In the tables showing the worstcase latencies using mini-slot répétitions, the shaded cases show cases where one of these target latency bounds can be met using mini-slot répétitions but cannot be is achieved using Release 15.
Length 2 3 4 5 6 7 8 9 10 11 12 13 14
Init. tx 0.68 0.89 0.96 1.18 1.25 1.46 1.54 1.75 1.82 2.04 2.11 2.32 2.39
1 retx 1.68 1.89 1.96 2.18 2.54 2.68 2.82 2.96 3.82 4.04 4.11 4.32 4.39
2 retx 2.68 2.89 2.96 3.18 3.75 3.82 4.04 4.75 5.82 6.04 6.11 6.32 6.39
3 retx 3.68 3.89 3.96 4.18 4.75 5.46 5.54 5.96 7.82 8.04 8.11 8.32 8.39
Table 9 - Release 15 Worst-Case Latency for 15 kHz SCS
Length 2 3 4 5 6 7 8 9 10 11 12 13 14
Init. tx 0.68 0.75 0.82 0.89 0.96 1.04 1.11 1,18 1.25 (Î.32L 1.46 J,54
1 retx 1.61 1.68 1.89 1.96 2.18 2.25 2.46 2.54 ig» 2.82 3,04 3.11 3.32
2 retx 2.32 2.68 2.89 2.96 3.18 3.54 3.75 3.96 4.18 4.39 4.61 4.82 5.04
3 retx 3.18 3.68 3.89 3,96 4.18 4.82 5.04 5.25 5.46 5.82 6.04 6 54 6 75
Table 10- Latency for 15 kHz SCS with Mini-Slot Répétitions to Schedule Across Slot Border
Length 2 3 4 5 6 7 8 9 10 11 12 13 14
Init. tx 0.40 0.51 0.54 0.65 0,69 0.79 0.83 0.94 0.97 1.08 1.12 1.22 1.26
1 retx 0.90 1.01 1.04 1.29 1.33 1.44 1.47 1.94 1.97 2.08 2.12 2.22 2.26
2 retx 1.40 1.51 1.54 1.94 1.97 2.29 2.33 2.94 2.97 3.08 3.12 3,22 3.26
3 retx 1.90 2.01 2.04 2.65 2.69 2.94 2.97 3.94 3.97 4.08 4.12 4.22 4.26
Table 11 — Reiease 15 Worst-Case Latency for 30 kHz SCS
106
Length 2 3 4 5 6 7 8 9 10 11 12 13 14
Init. tx 0.40 0.44 0.47 0.51 0.54 0.58 0.62 0.65 Ο.β9 0.72 0.76 0.79 0.83
1 retx 0.90 1.01 1.04 1.15 1.19 1.29 1.33 1.44 1.47 1.62. 1,76
2 retx 1.40 1.51 1.54 1.79 1.83 2.01 2.04 2.22 2.26 2.44 2.47 2 58 2.62
3 retx 1.90 2.01 2.04 2.44 2.47 2.65 2.69 2.94 2.97 3.29 3.33 3.51 3.54
Table 12 - Latency for 30 kHz SCS with Mini-Stot Répétitions to Schedule Across Slot Border
Length 2 3 4 5 6 7 8 9 10 11 12 13 14
Init. tx 0.44 0.46 0.47 0.50 0.51 0.54 0.54 0.57 0.58 0.61 0.62 0.64 0.65
1 retx 0.97 1.02 1.03 1.05 1.06 1.16 1.17 1.20 1.21 1.23 1.24 1.39 1.40
2 retx 1.51 1.59 1.60 1.63 1.63 1.79 1.79 1.82 1.83 1.86 1.87 2.14 2.15
3 retx 2.04 2.14 2.15 2.18 2.19 2.41 2.42 2.45 2.46 2.48 2.49 2.89 2.90
Table 13 — Release 15 Worst-Case Latency for 120 kHz SCS
Length 2 3 4 5 6 7 8 9 10 11 12 13 14
Init tx 0.44 0.45 0.46 0.46 0.48 0.49 0.50 0.51 0.52 0.53 0.54 0.54
1 retx 0.97 1.00 1.01 1.04 1.04 1.07 1.08 1.11 1.12 1.14 1.15 1.18 1.19
2 retx 1.51 1.55 1.56 1.61 1.62 1.66 1.67 1.70 1.71 1.77 1.78 1-80 1.81
3 retx 2.04 2.09 2.10 2.16 2.17 2.25 2.26 2.30 2.31 2.39 2.40 2.43 2.44
Table 14 - Latency for 120 kHz SCS with Mini-Slot Répétitions to Schedule Across
Slot Border
[0671] In comparison to Release 15 scheduling, the following gains can be reached:
• For a latency bound of 0.5 ms, using mini-slot répétitions ailows an additional 5 cases. The gains occur for the initial transmission for 30 and 120 kHz SCS.
* For a iatency bound of 1 ms, using mini-slot répétitions ailows an additional 6 cases. The gains occur for the initial transmission for 15 and 30 kHz SCS.
« For a latency bound of 2 ms, using mini-slot répétitions aiîows an additional 11 cases. The gains occur for the initial transmission, the 1st, or 2nd retransmission for 15, 30, or 120 kHz SCS.
• For a latency bound of 3 ms, using mini-slot répétitions aîlows an additional 7 cases. The gains occur for the 2nd or 3rd retransmission for 15 or 30 kHz SCS. [0672] The mini-slot répétition in UL can be used together with other features, enabling higher reliabitity, such as frequency hopping according to certain pattern or precoder cycling across répétitions.
[0673] PUCCH enhancements include the use of Short PUCCH. For DL data transmission, the UE sends HARQ feedback to acknowiedge (ACK) the correct réception
107 of the data. If the DL data packet is not received correctly, the UE sends a NACKand expects a retransmission. Due to strict latency constraint of URLLC, short PUCCH format with 1-2 symbois (e.g., PUCCH format 0) are expected to be of high relevance. Short PUCCH can be configured to start at any OFDM symbol in a Slot and therefore enables fa si ACK/NACK feedback suitable for URLLC. However, there exists a trade-off between iow latency and high reliability of HARQ feedback. If more time resources are avaiîable, it is also bénéficiai to consider a long PUCCH format which can hâve a duration of 4 to 14 symbois. With the use of longer time resources, it is possible to enhance PUCCH reliability.
[0674] Another enhancement is UCI multiplexing with PUSCH. For a UE running mixed services with both eMBB and URLLC, the reliability requirements on UCI transmitted on PUSCH can differ significantly from the PUSCH data. The reliability requirement on the UCI can either be higher than the requirement on the PUSCH data, e.g., when transmitting HARQ-ACK for DL URLLC data at the same time as eMBB data, or lower, e.g., when transmitting CQt reports meant for eMBB at the same time as URLLC data. In the case where UCI has lower requirement than PUSCH data, it may be préférable to drop some or ail of the UCI.
[0675] The coding offset between UCI and PUSCH data is controlled through beta factors for different types (HARQ-ACK, CSl) of UCI. An offset largerthan 1.0 means that corresponding UCI is coded more reliable than data. The beta factors defined in Release 15 hâve a lowest value of 1.0. This value might not be Iow enough when considering URLLC data togetherwith eMBB UCI. The better solution would be an introduction of spécial beta-factor value allowing to omit UCI on PUSCH to ensure URLLC reliability. This approach is iiiustrated in Figure 55, which shows the use of a beta-factor in DCl signais to “omit” UCI transmission. A reîated issue is when a scheduling request (SR) for URLLC mini-slot transmission cornes during slot-based transmission. This issue is analyzed further below.
[0676] Other enhancements are in the area of power control. When UCI is transmitted on PUCCH the reliability requirement can differ significantly if UCI is related to eMBB or URLLC/eURLLC. For Format 0 and Format 1, the number of PRBs equals one and an attemptto increase reliability by using more PRBs makes PUCCH sensitive to time dispersion. Therefore, for Format 0 and Format 1, different reliability can be achieved by different number of symbois and/or power adjustment
[0677] The number of symbois can be dynamically indicated in downlink DCl using the field “PUCCH resource indicator,” wherein two PUCCH resources are defined with different number of symbois, Power adjustments are however limited to a single TPC
108 tabie and/or possibîy using the PUCCH spatial relation information wherein multiple power settings (such as Po different PUCCH power settings can only be selected using MAC CE signaling. This is clearly too slow in a mixed services scénario where the transmitted HARQ-ACK may be s changed from related to eMBB to related to URLLC/eURLLC between two consecutive
PUCCH transmission opportunities. As a solution for this issue, PUCCH power control enhancements can be introduced in NR Release 16 to enabîe larger power différence between PUCCH transmission related to eMBB and PUCCH transmission related to URLLC:
1° · New TPC table alîowing larger power adjustment steps, and/or • Dynamic indication of power setting (e.g., Po, ciosed-loop index) using DCI indication
[0678] Further enhancements regard HARQ-ACK transmission opportunities. For URLLC with tight latency requirements there is a need to hâve severai transmission opportunities within a slot when using mini-slot based PDSCH transmissions and hence also a need for severai opportunities for HARQ-ACK reporting on PUCCH within a slot. In Release 15, at most one PUCCH transmission including HARQ-ACK is supported per slot. This will increase the alignment time for sending the HARQ-ACK and therefore the DL data latency. To reduce the downlink data latency, it is necessary to increase the number of PUCCH opportunities for HARQ-ACK transmission in a slot, especially if multiplexing of eMBB and URLLC traffic is supported on the downlink. While a UE Processing capabiiity gives the minimum number of OFDM symbols from the end of a PDSCH transmission until the beginning of the corresponding HARQ-ACK transmission on a PUCCH, the actuai transmission time of HARQ-ACK is further limited by the ailowed number of PUCCHs within the slot.
[0679] In Release 15, a UE can be configured with maximum four PUCCH resource sets where each PUCCH resource set consisting of a number of PUCCH resources, can be used for a range of U Cl sizes provided by configuration, including HARQ-ACK bits. The first set is only applicable for 1-2 UCl bits including HARQ-ACK information and can hâve maximum 32 PUCCH resources, while the other sets, if configured, are used for more than 2 UCl bits including HARQ-ACK and can hâve maximum 8 PUCCH resources. When a UE reports HARQ-ACK on PUCCH it détermines a PUCCH resource set based on the number of HARQ-ACK information bits and the PUCCH resource indicator field in îast DC! formai 1_0 or DCI format 1_1 that hâve a value of PDSCH-to-HARQ feedback timing indicator indicating same slot for the PUCCH transmission. When the size of the PUCCH resource set is to at most 8, the PUCCH resource identity is explicitly indicated
109 by the PUCCH resource indicator field in the DCI. If the size of PUCCH resource set is more than 8, the PUCCH resource identity is determined by the index of first CCE for the PDCCH réception in addition to the PUCCH resource indicator field in the DCI, [0680] For URLLC with tight latency requirements, there is a need to hâve several transmission opportunities within a Slot for PDSCH transmission and hence also a need for several opportunités for HARQ-ACK reporting on PUCCH within a slot as mentioned earlier.
[0681] This means that a UE needs to be configured with several PUCCH resources to enable the possibility for multiple opportunités of HARQ-ACK transmissions within a slot although that only one of them may be used in each slot. For example, a UE running URLLC service may be configured with possibility of receiving PDCCH in every second OFDM Symbol e.g. Symbol 0,2, 4.....12 and PUCCH resources for HARQ-ACK transmission also in every second symbol, e.g. 1, 3, 13. This means that UE need to be configured with a set of 7 PUCCH resources just for HARQ-ACK reporting for URLLC for a given UCI size range. Since there may be a need to hâve other PUCCH resources for other needs the list of at most 8 PUCCH resources that can be explicitly indicated by PUCCH resource indicator in the DCI may likely be exceeded. If there are more than 8 PUCCH resources in the set in case of 1-2 HARQ-ACK bits the index of first CCE will control which PUCCH resource is indicated. Hence, the locations where the DCI can be transmitted may be limîted to be able to reference an intended PUCCH resource.
Consequently, this may impose scheduling restrictions where the DCI can be transmitted and may also cause “blocking” if the DCI cannot be sent on desired CCE (due to that it is already used for some other UE). Therefore, instead of configuring 7 PUCCH resources in the example above, one can assume one PUCCH resource with a periodicity for transmission opportunity of every 2 symbols within a lot. This approach is illustrated in Figure 56, which shows a short PUCHH that occupies one OFDM symbol (i.e., Ns=1), with a period (P) of two OFDM symbols. Here, a total of 7 periodic PUCCH resources are defined in a slot,
[0682] The solution and problem described above apply for FDD as well as TDD. However, for fixed “mini-slot” TDD pattern 8 PUCCH resources that can be explidtly indicated may be enough since only the UL part of the slot can comprise PUCCH
ΓΰΟ/Μ tr/’ar I VOVUI uco.
[0683] With regards to PDCCH enhancements, with high reliability requirement for URLLC, it is important that transmission of downlink control information (DCI) is sufficiently reliable. It can be achieved by several means including improved UE/gNB
110 hardware capabilities, enhanced gNB/UE implémentation, and good NR PDDCH design choices.
[0684] In terms of design choices, N R PDCCH includes several features which can enhance reliability. These include:
• Seing DMRS-based which allows the use of beamforming;
• Support of distributed transmission scheme in frequency;
« Aggregation level 16;
• Increased CRC length (24 bits).
[0685] NR supports two main DCI formats, namely the normal-sized DCI formats 0-1 and 1-1 and the smaHer-size fall-back DCI formats 0-0 and 1-0. Although scheduling flexrbiiity can be limited, it may still be reasonabie to consider fatt-back DCI for data scheduling to obtain PDCCH robustness due to lower coding rate for a given aggregation levei. Moreover, it can be noted that normal DCI contains several fields which are not relevant for URLLC such as bandwidth part indicator, CBG-related fields, and the second TB related fields.
[0686] One possible enhancement is a URLLC spécifie DCI format. Both aggregation level (AL) and DCI size can hâve impact on PDCCH performance. Aggregation levels hâve different channel coding rate and are used in link adaptation for PDCCH, while DCI payload size is rather fixed for configured connection. To make PDCCH transmission more robust, one can use high AL and/or small DCI payload size to lower PDCCH code rate. PDCCH performance comparison between different DCI sizes is summarized in Table 15. Here, DCI size 40 bits serves as a reference for the Reiease 15 fallback DCI size, while DCI sizes 30 and 24 may be referred to as compact DCI sizes. One can see that the gains of reducing DCI size from 40 to 24 bits are small especially at high AL, the gain is even smailer when reducing DCI size from 40 to 30 bits. The gain essentially dépends on the level of code rate réduction.
BLER target Payload size exciuding CRC bits (A->B) Total number of bits réduction Performance Benefit in SNR (dB)
ALI 6 AL8 AL4 AL2 ALI
1e-5 40->30 10 0.31 0.38 0.41 0.55 1,13
40->24 16 0.47 0.58 0.68 0.95 1.94
Table 15 - SNR Improvement (dB) at BLER target for TDL-C 300 nS, 4GHz, 4Rx, 1os [0687] Wrth high reliability requirement for URLLC, it is important that transmission of downlink control information (DCI) is sufficiently reliabie. It can be achieved by several
111 means including improved UE/gNB hardware capabilities, enhanced gNB/UE implémentation, and good NR PDDCH design choices.
[0688] In ternis of design choices, NR PDCCH includes several features which can enhance reliabiiity. These include:
• Being DMRS-based which allows the use of beamforming, • Support of distributed transmission scheme in frequency;
* Aggregation level 16;
• Increased CRC length (24 bits).
[0689] N R supports two main DCI formats namely the normal-sized DCI formats 0-1 and 1-1 and the smaller-size falî-back DCI formats 0-0 and 1-0. Although scheduling flexibility can be limited, it may still be reasonabie to consider fall-back DCI for data scheduling to obtain PDCCH robustness due to lower coding rate for a given aggregation level. Moreover, it can be noted that normal DCI contains several fields which are not relevant for URLLC such as bandwidth part indicator, CBG-related fields, and the second TB related fields.
[0690] When a URLLC UE opérâtes with good channel condition, it is reasonabie to use low AL for PDCCH. It was argued that compact DCI can hâve positive impact on PDCCH multiplexing capacity as more UEs with good channel conditions can use low AL, and thus reducing blocking probability, To check this, the impact of using compact DCI on PDCCH blocking probability is studied as a fonction of DCI size, number of UEs, and CORESET resources. Number of URLLC UEs in a cell is considered from 4 to 10. CORESET resources are determined based on CORESET duration and bandwidth.
CO RESETs are assumed to occupy 1 or 2 O F DM Symbol s with 40 MHz BW.
[0691] Figure 57 shows the blocking probability per monitoring occasion as a fonction of DCI size, average number of UEs, and CORESET sizes. The simulation assumption is for Release 15 enabled use case. It can be seen from Figure 57 that PDCCH blocking probability per monitoring occasion dépends on several parameters such as DCI size, number of UEs, and CORESET sizes. In terms of blocking probability improvement for a given number of UEs, it is évident that using small DC.l size provide much smaller gain compared to using larger control resources.
[0692] Additionally, due to démodulation and decoding complexity constraint at the UE, there exists a budget on the number of DCI sizes UE should monitor per Slot, i.e., 3 different sizes for DCI scrambled by C-RNTI and 1 additional for other RNTI as agreed in Rêiëâsê 15. So, iniroducing another DCI format with smaller size wili be even more challenging for satisfying the DCI size limitation.
112
[0693] An alternative to compact DCI for PDCCH enhancement in Release 16 may be considered. in N R Release 15, there are two main DCI formats for unicast data scheduling, namely the falî-back DCI formats 0-0/1-0, and the normal DCI formats 0-1/11. The fali-back DCI supports resource allocation type 1 where the DCI size dépends on the size of bandwidth part. It is intended fora single TB transmission with limited flexibility, e.g., without any multi-antenna related parameters. On the other hand, normal DCI can provide flexible scheduling with multi-layer transmission.
[0694] Due to high reliability requirement of URLLC, we see that it is bénéficiai to use a small size fallback DCI for good PDCCH performance. At the same time, it can be bénéficiai to hâve parameters such as multi-antenna related ones to support high reliabilîty transmission. This can motivate a new DCI format having the same size as the fallback DCI but improved from the fallback DCI to swap in some useful fields, e.g., some fields that exist in the normal DCI but are absent in fallback DCL By having the new DCI formats with the same size as existing DCI formats, blind decoding complexity can be kept the same, It can be noted that its use may not be limited to URLLC. Any use cases which require high PDCCH reliability with reasonable scheduling flexibility should be able to leverage the new DCI format as weiî.
[0695] Another area for improved performance regards timits on the number of blind décodés and CCE. As discussed above, PDSCH/PUSCH mapping type B (minî-slot with flexible starting position) is a key enablerfor URLLC use cases. To achieve the fuli latency benefits of type B scheduling, it is necessary to hâve multiple PDCCH monitoring occasions within a slot. For example, to get the fui! benefits of 2 OFDM symbol transmissions, it is préférable to hâve PDCCH monitoring every 2 OFDM symbols. The limits in Release 15 on the total number of blind décodés (BD) and non-overiapping CCEs for channel estimation in a Slot strongly restricts the scheduling options for these kinds of configurations, even when limiting the number of candidates in a search space. [0696] Current limits for 15 kHz SCS in NR coïncide with iimits for 1 ms TTI in LTE. while these iimits were extended after introduction of short TTI in LTE. These Release 15 limits as shown in the first row of Table 9 and 10 can be expected to be revised in NR Release 16 in scope of URLLC framework. For example, with the current number of CCE limits, there are only at most 3 transmission opportunités per slot if AL16 is used.
[0697] Rather than specifying multiple new UE capability lévels, it is proposéd to specify one additions! level of support for PDCCH blind décodés, for which the numbers are doublée! compared to Release 15. For this addrtional level of support, instead of simply defining it per slot basis, it makes more sense to take into account how the BDs/CCEs are distributed in a slot for mini-slot operation. One possible choice is to
113 define the BD/CCE limit for each ha If of the slot. For the first half of the slot, it is naturai to assume the same number as the other cases. For the second half of the slot, assuming that UE has finished processing PDCCH in the first half of the slot, the UE should hâve the same PDCCH processing capabiiity in the second half of the slot Therefore, it is reasonable to assume the same number as in the first slot.
[0698] Considering ail of the above, the corresponding increase in the BD Iimits can be summarized in Table 16
Max no. of PDCCH BDs per slot Sub-carrier spacing
15kHz 30kHz 60kHz 120kHz
NR Release 15 44 36 22 20
Proposed value for NR Release 16 1st half of the slot 44 36 22 20
2nd half ofthe slot 44 36 22 20
Table 16 — Number of Biind Décodés for Reiease 15 and Proposed Values for Release 16
[0699] Simiîarly, a corresponding increase in the CCE limits can be summarized in Table 17.
Max no. of PDCCH CCEs per slot Sub-carrier spacing
15kHz 30kHz 60kHz 120kHz
NR Release 15 56 56 48 32
Proposed value for NR Release 16 1si half of the slot 56 56 48 32
2^ half ofthe slot 56 56 48 32
Table 17 - CCE limit for Release 15 and proposed values for Release 16.
[0700] As an alternative solution to Tables 16 and 17, one can consider introducing a limitation per sliding window, where sliding window size and number of biind décodés or CCE per window can be further defined in spécification.
[0701] A conséquence of increases in numbers of biind décodés and CCE limits is more PDCCH occasions in a slot, and thus a UE has higher chance of eventually being scheduled. Table 18 shows the PDCCH blocking probability after certain number of PDCCH occasions for different number of UEs per cell. (DCI size = 40 bits, CORESET duration = 1 symboi.) It is évident that the PDCCH blocking probability within a slot can be reduced signifîcantly with more PDCCH occasions.
114
Blocking prob. SUE = 10 SUE - 20 SUE = 30 SUE = 40
After 1 PDCCH occasion 7.91% 39.03% 58.01% 68.46%
After 2 PDCCH occasions 0 1.42% 19.50% 37.75%
After 3 PDCCH occasions 0 0 0.17% 4.15%
Table 18 — PDCCH Blocking Probability Within a Slot with 1, 2, or 3 PDCCH Occasions for Different Numbers of UEs per Cell
[0702] While limits on PDCCH can improve alignaient delay, the processing delay réduction can additionalîy contribute to total latency decrease. Thus, UE processing s capabüities are addressed in the following.
[0703] The downlink data transmission timeline is iilustrated in Figure 58 with one retransmission. The UL data transmission timeline is iilustrated in Figure 59, for PUSCH via configured UL grant., with one retransmission. The delay components are:
• TuE.pr™: UE processing time for UL transmission. TuE.proc varies depending on DL data vs UL data, initial transmission vs retransmission, etc. In UE Capability #1 and Capability #2 discussion, variables Ni and N2 are used:
o Ni is the number of OFDM symbols required for UE processing from the end of PDSCH to the earliest possible start of the corresponding ACK/NACK transmission on PUSCH or PUCCH from UE perspective.
ο N2 is the number of OFDM symbols required for UE processing from the end of PDCCH containing the UL grant réception to the earliest possible start of the coaesponding the same PUSCH transmission from UE perspective.
• TuLt»: transmission time of UL data. This is roughly equal to PUSCH duration.
♦ TuLatign·' finie alignaient to wait for the next UL transmission opportunity.
• TgNBproc' gNB processing time for DL transmission. Tguapmc varies depending on DL data vs UL data, initial transmission vs retransmission, etc. For example, for PDSCH retransmission, this includes processing time of HARQ-ACK sent on UL. For PUSCH, this includes réception time of PUSCH.
· ToL.tx· transmission time of DL data. This is roughly equal to PDSCH duration.
115 • TDL.,a!ign: time alignment to wait for the next DL transmission opportunity.
[0704] Tue.ptoc is an important iatency component to improve. In Release 15, UE Processing time capability #1 and #2 hâve been defined, where capability #1 is defined for SCS of 15/30/60/120 kHz, and capability #2 defined for SCS of 15/30/60 kHz. The more aggressive capability #2 is still inadéquate for the 1ms Iatency constraint, Since the Iatency requirements for eURLLC are in orderof 1ms (e.g., 0.5 ms), a new UE capability #3 can be defined in Release 16 N R to fulfil the Iatency requirements. The proposed UE capability #3 is summarized in Table 19. The impact of the proposed capability can be seen in Figure 60, Figure 61, and Figure 62. Figure 60 shows downlink data Iatency comparison between Release 15 and the new UE capability #3 shown in Table 19. Figure 61 shows a comparison of grant-based upiink data Iatency for Release 15 versus the new UE capability #3. Figure 62 shows a comparison of configured grant upiink Iatency, between Release 15 and the new UE capability #3.
Configuration HARQ Timing 15 kHz SCS 30 kHz SCS 60 kHz SCS 120 kHz SCS
Front-loaded DMRS only N1 2.5os 2.5os 5os 10os
Frequencyfirst REmapping N2 2.5os 2.5os 5os 10os
Table 19 - UE Processing Time Capability # 3
[0705] Another delay component TDLialign is significantly influenced by PDCCH periodicity. The worst case Tol^ is equal to the PDCCH periodicity. In Release 15, PDCCH periodicity is affected by several constraints, including: (a) bîind decoding limits. (b) #CCE limits), (c) DCI sizes. To provide shorter PDCCH periodicity for eURLLC, it is 20 necessary that the number of blind decoding limits and CCE limits be relaxed in Release
16..
[0706] Another important UE capability is related to time of CSI report génération. The faster UE can provide the CSI report the more accu rate a scheduling decision will be from link adaptation perspective, in Release 15 spécification there are two key values 25 defined:
• Z corresponds to the timing requirement from triggering PDCCH to the start of the PUSCH carrying the CSI report and it should thus encompass DCI decoding time, possible CSI-RS measurement time, CSI calculation time, UCI encoding time, and possible UCI multiplexing and UL-SCH muitiplexing.
116 • Z on the other hand corresponds to the timing requirement from aperiodic CSI-RS (if used) to the start of the PUSCH carrying the report.
The différence between Z and Z’ is thus only the DCI decoding time.
[0707] In Release 15, there exists no “advanced CSI processing capability”, that is, there is only a baseline CSI processing capability defined that ail UEs must support. There was a discussion to include such an advanced CSI processing capability in Release 15, but it was not included due to lack of time.
[0708] Three “latency classes” for CS! content are defined in Release 15.
• Beam reporting class: L1-RSRP reporting with CRI/SSBRI • Low latency CSI: Defined as a single wideband CSI report with at most 4 CSI-RS ports (without CRI reporting), using either the Type I single panel codebook or non-PMl reporting mode • High Latency CSI: AU other types of CSI content
[0709] For each of these three classes, different requirements on (Z, Z') are defined (according to CSI computation delay requirement 2). There also exist a more stringent CS! requirement, CSI computation delay requirement 1, which is only applicable when the UE is triggered with a single Low Latency CSI report without UL-SCH or UCI multipïexing and when the UE hâve ail its CSI Processing Uniis unoccupied (i.e., it is not already calculating some other CSI report).
[0710] In NR Release 15, the mandatory UE CSI processing capability requires a UE to support calculation of 5 simultaneous CSI reports (which may be across different carriers, in the same carrier or as a single report with multiple CSI-RS resources).The values of (Z,Z’) is CSI processing requirement 2 where thus determined so that ali UEs shouid be able to calculate 5 CSI reports within this timeframe. As some UE implémentations calcuiate multiple CSI reports in a serial fashion, this implies that, roughly speaking, the CSI requirement 2 is about 5x longer than what it would be if the requirement were that only a single CSI report would need to be computed.
[0711] In a typical URLLC scénario, and indeed, in many typicai deployments and scénarios, the gNB is only interested in triggering a single CSI report at the time, It is thus a bit unfortunate that the timing requirement is 5x longer than it has to be for that case, This excessively long CSI calculation time puts additional implémentation constraints for the scheduler, as the N2 requirement for data triggering and data to HARQ-ACK delay (K1 ) requirement is much lower than the CSI processing requirement.
[0712] Further improvements are possible. For CSI processing timelinê enhancements for eURLLC, the introduction of a new CSI timing requirement (CSI computation delay requirement 3”) is bénéficiai for sporadic traffic for the purpose to
117 quickly get channel State at gNb. It may be sued when the UE is triggered with a single CSJ report. A starting position could be to take the values defined for CSI timing requirement 2 and divide by a factor 5.
Another possible CSI processing timeline enhancement is to introduce an advanced CSI processing capability. That is, to introduce a new set of tables for the two existing CSI timing requirements (as well as for the third one just proposed). A UE could then similarly to the advanced processing capabilities for PDSCH/PUSCH indicate in its capability that is supports the more aggressive CSI timeline.
[0713] Fast HARQ is another improvement. The faster processing and UE capabilities discussed in the previous sections enable faster HARQ re-transmissions. We assume that gNB can operate with similar processing speed as the UE. To operate with HARQ re-transmissions and keep latency low there need to be frequent PDCCH monitoring occasions but also PUCCH occasions where the HARQ-ACK can be transmitted. For simplicity reasons we will be assuming zéro timing advance although that cannot be assumed in reality. With non-zero timing advance the latency values may change.
[0714] Here one can focus on comparison between Release 15 and Release 16. The évaluation results ane shown below. For Release 15 capability #2 we assume a PDCCH periodicity of 5 OFDM symbole (os). Note that with the CCE limit per Slot of 56, it is allowed up to 3 PDCCH monitoring occasions per Slot where each occasion contains at least one AL16 candidate. For Release 16 we assume improved values of Ni and N2 (capability #3 which was discussed in previous sections) and PDCCH periodicity of 2 symbois as a conséquence of potential improvement on the limits of number of blind décodés and CCEs.
[0715] Inter-UE pre-emption is another improvement. Dynamic multiplexing of different services is highly désirable for efficient use of System resources and to maximize its capacity. In the downlink, the assignaient of resources can be instantaneous and is only limited by the scheduler implémentation, while in the uplink, standard spécifie solutions are required. Below, the existing solutions in Release 15 and additional solutions for Release 16 are discussed.
[0716] Dynamic multiplexing of different services is highly désirable for efficient use of system resources and to maximize its capacity. in the downlink, the assignaient of resources can be instantaneous and is only limited by the scheduler implémentation.
Once low-latency data appears in a buffer, a base station should choose the soonest moment of time when resources could be normally allocated (i.e. without colliding with the resources allocated for an already ongoing downlink transmission for that UE). This may
118 be either beginning of the slot or a mini-slot where the mini-siot can start at any OFDM symbol· Hence, downlink pre-emption may happen when long term allocation(s) (e.g. slot based) occupy resources (particularly wîdeband resources) and there is no room for critical data transmission which can by typically mini-slot. In this case a scheduler can send DCI to critical data UE and override ongoing transmission in downlink. When slot eMBB transmission is pre-empted, the pre-empted part of the original message poîlutes the soft buffer and should be flushed to give good performance in retransmissions, which will likely happen. NR Release 15 spécification allows to indicate about the pre-emption by explicit signalling, which is carried either:
• Option 1. By spécial DCI format 2_1 over group common PDCCH or;
• Option 2. By spécial flag in multi-CBG retransmission DCI “CBG flushing out information”.
[0717] Option 1 gives an indication as a 14-bits bitmap, which addresses to reference downlink resource domains in between two pre-emption indication messages. Highest resolution of this signaling in time is 1 OFDM symbol and in frequency % of BWP (BandWidth Part), but not at the same time. The longer periodicity of messages, the coarser resolution. Since this is a group common signaling, ail UEs within the BWP may read it.
[0718] Option 2 is a user spécifie way of signaling. The HARQ retransmission DCI, which contains a set of CB/CBGs, may hâve a spécial bit to indicate that the UE must first flush related parts of the soft-buffer and then store retransmitted CB/CBGs in the soft buffer.
[0719] During 3GPP discussions of Release 15 URLLC, the uplink pre-emption feature was down-scoped due to lack of time in 3GPP URLLC working item. However, the feature is under discussion of Release 16. UL pre-emption may happen where a longer eMBB UL transmission is interrupted with urgent URLLC UL transmission. Further, it can hâve two flavors:
• Intra-UE pre-emption, where both transmissions belong the same UE. The intraUE pre-emption is similar to DL pre-emption case where instead of gNB, UE prioritizes the transmission in the UL direction. For this some sort of indication is necessary to the gNB of incoming URLLC transmission instead of eMBB transmission.
• !nter-UE multiplexing, where based on the request from some UEs for urgent transmission of high priority UL traffic (URLLC traffic), the gNB needs to provide resources to accommodate transmissions as soon as possible to meet the delay requirements. it can happen that the gNB has already assigned the suitabïe UL
119 resources to one or multiple other UEs for UL transmissions with less stringent requirements in terms of delay (eMBB traffic). Hence, the gNB needs to reschedule those resources for the prioritized URLLC transmissions.
The Intra-UE pre-emption is discussed further, below, since it more implies MAC mechanisms, while the second option has clear physical layer scope.
[0720] Given two enabling mechanism based on power control and muting, the préemption would be achieved at the cost of 1) additional signalling and complexity both at UE and gNB due to changing ongoing or planned UL transmissions and 2) impact to the performance of eMBB traffic. For the cost to be worth investing, it is important to adopt a mechanism that ensures best the required quality of the URLLC transmissions. Both approaches can be iflustrated by Figure 63.
[0721] A drawback with power control-based schemes is that the URLLC transmissions would sufferfrom the interférence originating from transmissions controiled by the serving gNB where in fact those transmissions could hâve been de-prioritized. Moreover, power boosting of URLLC transmissions would not only increase the interférence for neighbouring cells, but also impact the performance of eMBB traffic, Hence, with pre-emption-based schemes, by cancelling the on-going or pre-scheduled eMBB UL transmissions on the suitable resources that the gNB intends to use for URLLC transmissions, the gNB ai least avoids possible dégradation of the URLLC traffic performance due to its self-inflicted interférence. It should be noted that the discussion here relates to PUSCH transmissions where other options are more suitable for controlling reliability. For PUCCH the options are more limited.
[0722] The performance of power control-based scheme is shown in Figure 64 for 4GHz, TDL-C with DS 100ns, 4x2 antenna configuration and MMSE-MRC receiver when slot based eMBB transmission interfères with mini-slot URLLC. Low SE MCS table is in use.
[0723] Based on above discussion, the indication-based scheme can ensure URLLC reliability, while power control-based scheme can be considered as backward compatible solution in Release 15/16 interworking scénario. However, the former cornes with an extensive signalling cost.
[0724] This implies that although the UL pre-emption indication is în fact effective in a UE-specific manner, it is a better design choice to consider a group common UL preemption indication with the flexibility to adjust the group size depending on the scénario, from a single UEto multiple UEs, as needed, This approach préserves the properties for the single UE case while reducing signalling overhead and blockîng probabiîity in case multiple UEs need to be pre-empted.
120
[0725] Aiming to reuse the already existing mechanism, when possible, the two following options are mainly considered for group common signalling of UL pre-emption:
• Option 1 : UL pre-emption indication based on DCi format 2_0 (dynamic S Fl) • Option 2: UL pre-emption indication design similar to DCI format 2_1 (DL preemption indication)
[0726] in option 1, it is proposed to use the existing dynamic SFI and define a new (or extended) UE behaviour as folfows. When a UE detects an assignmenf flexible (or DL) for the symbols that hâve already scheduled by UE spécifie signalling for UL transmissions, the UE completely cancels the UL transmissions. This design choice is based on two assumptions, i.e., for the purpose of UL pre-emption, 1) dynamic SFI overrides UE spécifie signalling and 2) the pre-empted UL transmission is not delayed and resumed but simply cancelled. This approach is simple and requires less processing time at the UE due to the need for only cancelling UL transmissions. However, it requires the defining of a new behavior, which is based on the assumption that a later SFI overriding a prior UE-specific DCI which by itself is contradictory with the design philosophy used in Release 15. Moreover, relying on the existing SFI régime for the simplicity reasons implies that the specified SFI table for Release 15 should be used. With carefui examining the entries of this table, one can observe limitations on where the UL transmission cancellation can occur as compared to a bit map pattern that provide full flexibility.
[0727] In option 2, the DL pre-emption mechanism can be adopted for the UL preemption indication. This approach enables a gNB to indicate to a UE with finer granularity which resources are needed to be pre-empted by using s bit rnap pattern. This mechanism is flexible in the sense that depending on how the UE behaviour is defined or iis capability, the bit map pattern can be used to indicate when the UL transmission should be stopped without resuming transmission afterwards. Or alternatively, it can be used to indicate to the UE when to stop and then résumé the UL transmission if the UE is capable of such operation in reasonable time.
[0728] Lower MCS and CQi for lower BLER target are additional issues. Based on the évaluation presented above, it can be observed that depending on a latency requîrement for URLLC there could be time only for one radio transmission. In this example an air interface must be able to guarantee very low BLER required for URLLC service. For this purpose, there were several enhancements in Release 15:
« New 64QAM CQI table has been introduced for reporting at target BLER 10Λ-5, The newtable contains lower spectral efficiency (SE) values.
121 • Low spectral efficiency 64QAM MCS table has been introduced to use without transform precoding.
• Low spectral efficiency 64QAM MCS table for DFT-spread OFDM waveform table has been introduced.
[0729] As an example, we consider TBS = 256 bits (=32 bytes), transmission duration of 4 OFDM symbols with 1 DMRS symbo! overhead. PDSCH BLER for different MCSs supported within 40 MHz BW are given in Figure 65, Here, the coding rate of MGS 6 corresponds to coding rate of MCS 0 in iegacy 64QAM table,
[0730] The network can configure highiighted MCS tables semi-statically by RRC. Moreover, dynamic signallrng for MCS table is also supported by configuring UE with MCS-C-RNTI in addition to regu la r C-RNTI where MCS-C-RNTI is aiways associated with Low SE MCS table. UE always applies Low SE MCS table when it deiects MCS-C-RNTI scrambled with PDCCH CRC and it applies semi-statically configured MCS table (64QAM or256QAM) otherwise. As an alternative, the MCS table can be configured semistatically when UE has only URLLC traffic, while frie dynamic way is preferable in case when UE is eMBB and URLLC capable at the same time. A drawback of dynamic MCStable signalling is higher PDCCH CRC false alarm rate due to new MCS-C-RNTI introduction.
[0731] It must be noted that CQI and MCS tables can be configured independently. e.g., Iegacy 64QAM MCS table can be used with new64QAM CQI table 10Λ-5 BLER reporting.
[0732] Multi-antenna techniques are another issue. There is a welî-known trade-off between increased data rates (multiplexing) and increased reliability (diversity). This means that increases in one necessarily corne at the cost of some dégradation of the other. In mobile broadband, ΜΙΜΟ techniques are typically used to increase the data rates and the spectrum efficiency of the network. On the other hand, for URLLC, it may be betterto spend the degrees of freedom afforded by ΜΙΜΟ to increase reliability. Thus, instead of using the throughput as a metric to be optimized, the network can optimize reliability metrics such as the outage probability. For example, UL performance can be improved by both UL pre-coding and intra-site UL CoMP (joint réception) as shown in Figure 66, which shows UL SINR for different multi-antenna techniques with and without UL CoMP (3-sector intra-site joint réception) and UL precoding (Rel-10 rank 1 4-port precoders). For “No precoding”, single-antenna transmission is used, while for “Precoding” 4 antenna éléments are used (1x2 X-pol, séparation = 0.5 lambda).
[0733] Cyclic-deîay diversity (CDD) or space-time codes can also be considered to provide additional frequency diversity in a spec-transparent manner. Multiple receive
122 antennas provide receive diversity and provide means to maximize the received signal-tointerference-noise-ratio (SINR) after réception combining at the receiver. Diversity schemes has the benefit that they require less channel knowledge than precoding does. [0734] Multiple antenna éléments can also be used to create directional antenna beams at the transmitter and/or receiver side to increase the received SINR and thus reliability. Cleariy, improved SINR is provided that the beam is pointing in correct direction and hence beamforming requires at least some channel knowledge to détermine the correct direction of the beam.
[0735] l 2 Features
[0736] in this section, Layer 2 features in the RAN are described to support the provisioning of URLLC. While multiple features for LTE and NR hâve been introduced for Release 15, providing the fundamental URLLC support, current studies for Release 16 standardization seek for enhancements to improve the system’s efficiency when providing URLLC and also in particular targeting the support of TSN intégration i.e. support of multiple traffic flows of different QoS requirements. Assumed here is that not only should non-critical traffic be efficiently transmitted, other critical trafficflows should be served with a deterministic latency. In a TSN scénario, these traffic flows are typically periodical but not necessarily. In general, we address scénario where full knowledge of when, which size and with which pattern/period traffic arrives at the gNB or UE is not available a-priori. We investigate the Release 15 baseline and enhancements in the foilowing sections on SR and BS R, Pre-scheduling for cyclic traffic, UE multiplexing, as well as PDCP duplication.
[0737] It shalî be noted that the L2 features are generally independent of whether FDD or TDD is used.
[0738] Buffer Status Reports (BSR) and Scheduling Requests (SR) are the two methods which the UE can use to indicate that data is available in the transmission buffer. These indications may resuit in that the network provides a grant, i.e., UL-SCH resources to the UE to allow data transmissions. This is commonly known as dynamic scheduling. An example of SR and BSR operation is shown in Figure 67.
[0739] In a nutshell, one of the major différences between SR and BSR is that the SR is a one-bit indication in PUCCH which signais that the UE has data for transmission, while the BSR expiicitiy provides an approximate value of the amount of data that the UE has in its buffer on a per logical channel group basis. The BSR is transmitted in a MAC Control Elément (CE) which is transmitted in the PUSCH.
[0740] In NR Release 15, one SR configuration can be configured per each logical channel, and several logical channels may be configured with the same SR configuration.
123
The SR is transmitted in the PUCCH. In one bandwidth part (BWP), an SR may be configured with, at most, one PUCCH resource. This means that, in NR, the network may configure multiple SR configurations which could, potentially, be used for different types of traffic.
The procedure can be summarized as follows:
• Data from a certain logical channel arrives.
• A Regular BSR is triggered due to the arrivai, given the triggering specified criteria are met.
• No PUSCH resources are avaîîable to transmit the BSR.
• An SR is triggered and transmitted in the SR resource associated to the logical channel which triggered the BSR.
[0741] Dynamic scheduling introduces a delay to the data transmissions, as shown in Figure 67. This delay dépends on the périodicity/offset of the SR configuration and the time the network takes to allocate resources and transmit a grant
[0742] Some Industrial loT services and traffic may need to meet tight delay requirements. “Multiple SR configurations” as specified in Release 15, is thus a feature which can play a key rôle to ensure traffic différentiation and to ensure that delay requirements are met. An example is depicted in Figure 68, which shows multiple SR configurations mapped to different traffic.
[0743] Buffer Status Report (BSR), as specified, is transmitted by the UE in the PUSCH. The BSR is transmitted as a MAC Control Element in the MAC PDU. The purpose of the BSR is to indicate the approximate amount of data in the buffers. This report is indicated per Logical Channel Group (LCG). Each logical channel wiîl be associated to a LCG. There are 8 LCG. In scénarios in which there is a need to differentiate among a limited set of traffic profiles (DRBs), the number of LCG may be sufficient to provide a 1 -to-1 mapping between logical channels and LCG.
[0744] There are 4 different BSR formats and depending on the selected format, the UE may be able to indicate the buffer status of one or more logical channels groups. [0745] The BSR can be triggered by one of the following mechanisms:
• Regular BSR: A regular BSR is triggered when a logical channel which belongs to a certain LCG receives new UL data for transmission. In addition, this new data must fulfill one of the following two conditions: the new-data belong to a logical channel with higher priority than any of the other logical channels which hâve data; or, there is no other data avaîîable for transmission in the LCG in any of the logical channels.
A regular BSR witl never be triggered if more data is received in another certain
124 logical channel and that logical channel has already data in the buffer. A regular BSR can only use the Short and Long BSR formats.
• Periodic BSR: A periodic BSR is triggered periodicaily following the configuration provided by the network.
A periodic BSR can only use the Short and Long BSR formats.
• Padding BSR: When the UE receives a larger grant than what it needs to transmit the data, the UE may be able to transmit a BSR instead of padding bits. Depending on the number of padding bits, the UE will transmit a different BSR format.
Padding BSR can use ail the BSR formats.
[0746] SR and BSR will play an important rôle to assist industrial loT traffic to meet the different requirements of each traffic, especiaîly when the traffic periodîcîty and size is unpredictable.
[0747] “Multiple SR configuration” may be a key feature to differentiate traffic which has strict delay requirements and dynamic scheduiing as the preferred method to altocate UL network resources. A spécifie SR configuration could be mapped to a spécifie Logical Channel (whlch could carry traffic with spécifie requirements e.g. very low latency requirement). When the network receives this spécifie SR (which can be identified by the spécifie re sources allocated to it), the network can identifÿ that there is traffic with low latency requirements waiting for transmission. Then, the network may prioritize the allocation of resources to this traffic.
[0748] One possibslity is that predictable Industrial loT traffic (known periodicity/packet sizes) is mapped to a spécifie SR configuration. The SR configuration would then identifÿ the traffic which would allow the network to allocate the appropriate resources for that spécifie traffic. On the other h and, LCHs with non-predictable traffic (packet sizes are unknown) would then be mapped to a generic SR configuration, a generic SR shared by a number of other LCH. In this case, the SR configuration cannot assis! the network to identifÿ the traffic and, therefore, the LCH needs to rely on the BSR indications to provide relevant information to the network which could assist to the scheduiing decisions. Thus, Buffer Status Reporting will also be a key feature especiaîly in scénarios in which non-predictable traffic is expected.
[0749] It is expected that Industrial loT is based on the SR procedure designed in Release 15, but minor enhancements might be introduced in Release 16. For example, it is up to the UE to décidé which SR configuration is used when there are several pending SRs. This UE behavior could be changed so that the SR configuration linked to the highest priority logical channel is selected by the UE. However, this was discussed during
125
Release 15 without reaching any possible agreement. Furthermore, currently even though a frequent PUCCH resource is ailocated for allowing quick SR transmissions when critical data arrives, when a long PUSCH transmission is ongoing, the SR can only be sent at the PUCCH resource afterthis long PUSCH duration, as PUCCH and PUSCH 5 cannot overlap according to current spécification. BSR might be transmitted in this case instead via PUSCH, but given the PUSCH is long (slot length, low OFDM numerology), it may also be associated with a long decoding/Processing delay. This is shown in Figure 69, which shows delayed SR due to ongoing long UL-SCH. Therefore, it is envisaged in Release 16 to allow parallel PUCCH transmission for SR on overiapping PUSCH resources, reducing the latency for the SR.
[0750] BSR for Industrial loT will also be based on Release 15 and mînor enhancements might be also introduced. During the development of Release 15, it was proposed that new data would always trigger a BSR. This behavior was not accepted and the LTE behavior was adopted. That means that new data coming to a logical channel 15 does not trigger a regular BSR if the logical channel group already had buffered data, or the new data belongs to a lower priority logical channel. Nevertheless, for Industrial loT Release 16, it has been discussed again whether new data would always trigger a BSR, which would hâve the advantage that otherwise required frequent periodical BSR transmissions can be avoided.
[0751] Another aspect not discussed in these SR/BSR sections is the priority of the
MAC CE for BSR in the logical channel prioritîzation procedure. MAC CE for BSR, with exception of padding BSR, has a higher priority than data from any DRB. In other words, MAC CE for BSR is transmitted before any user data per current operation. However, some optimizations targeted for NR Industrial loT are possible:
« The priority of the MAC CE for BSR is configurable, i.e., it can be modified (reduced) by the network.
• In this manner, certain DRBs e.g. DRBs carrying data with very low delay requirements can hâve a higher priority than MAC CE BSR.
[0752] In the following, we address pre-scheduling grants which is used in both
Release 15 and 16. Such grants removes the delay introduced by waiting for SR transmission occasions and the corresponding response (i.e. grant).
[0753] In Release 15, when a UE does not hâve UL resources allocated and data becomes available, the UE needs to undergo the scheduling request procedure, i.e., request UL resources from the gNB, which are then granted. This cornes with an additional UL access delay, unwanted for transmission of critical traffic, such as TSN
126 stream data. Pre-scheduling of grants is a technique to avoid the extra latency resulting from SR-to-grant procedures when using dynamic scheduling, as illustrated in Figure 70. [0754] Pre-scheduiing can be done by implémentation by the gNB pro-actively sending out multiple UL grants for potential UL transmissions. The standard in LTE and NR Release 15 supports this concept by allowing pre-scheduiing of multiple, periodically recurring UL grants. It buîlds on the semi-persistent scheduling concept (SPS) originaily introduced for LTE VOIP. In NR, such pre-scheduling scheme is called semi-persistent scheduling in the downlink (DL), whereas it is called configured grant (Type 1 and Type 2) in the uplink (UL).
[0755] The NR DL SPS assignaient is the same as in LTE, which is a configured assignment provided by PDCCH/L1 signal (can also be deactivated/activated).
[0756] The NR UL configured grant (CG) has been specified in two variants, configured grant type 1 and type 2. In both variants gNB pre-allocates the resources of the grants (via different signaling) including:
• Time-frequency resources (via RRC for Type 1 and DCI for Type 2) • Period (via RRC), offset (via RRC for Type 1 and implicitly at DCI réception for Type 2) • MCS, Power parameters (via RRC for Type 1 and DCI for Type 2) • DMRS, répétitions (via RRC for Type 1 and DCI for Type 2) • HARQ configuration; (via RRC) • Activate/Deactivate message (via DCI for Type 2).
[0757] Both configured grants type 1 and type 2 share severai commonalities, such as:
• “Configured Scheduling” CS RNTI used on PDCCH foractivation/deactivation and retransmissions.
• Retransmission for both Type 1 and Type 2 are based only on dynamic grant to CS RNT! (i.e. retransmissions are not sent using the periodically recurring UL grants).
• The dynamic grant with C-RNTI overrides a configured grant for initial transmission in case of overlap in time domain.
• There is at most one active Type 1 or Type 2 configuration per serving cell and BWP
[0758] One différence between Type 1 and Type 2 is the setting up procedures. The procedures of Type 1 CG are illustrated in Figure 71, whereas, the procedures of Type 2 CG are illustrated in Figure 72. It can be argued that since Type 1 CG is activated via
127
RRC, it is best suited for traffic with deterministic arrivai periodicity (on of TSN characteristics). On the other hand, Type 2 CG are suited to support streams with uncertain mis-alignment, where the grant can be reconfigured quickly with DCI (P H Y signal).
[0759] A disadvantage of configured grant is the low utilisation of grantsd resources when used to serve unpredictable yet critical traffic, because gNB will allocate resources without knowing if the traffic will arrive or not
[0760] TSN traffic handling will be an important issue in Reiease 16. Several approaches to support multiple traffic flows, i.e., TSN streams are discussed here, where each stream has spécifie characteristics, i.e., periodicity, time offset, target reliability, latency, etc., as illustrated in Figure 73 and Figure 74. Figure 73 illustrâtes industrial deterministic streams with different arrivai and payload sizes. Figure 74 illustrâtes industrial deterministic streams with different patterns and periodicity, and differing latency and reliability requirements.
[0761] Each of the TSN stream characteristics play s a major raie in scheduling the users. For instance, a TSN stream with periodicaî data yet ultra-low latency requîrement can be best accommodated (with minimum possible network resources) if the network knows exactly the periodicity and arriva! of such TSN stream data. However, if the network does not know such characteristics it will over dimension the grant to avoid vîolating the tight latency requîrement, thereby potentiaily resulting in inefficient radio resource management. Furthermore, it is assumed a target reliability of the UE’s TSN data stream can be reached with spécifie MCS index and number of répétitions. Only if the radio network accurately knows such requirements it will not over or under allocate the resources. !t is assumed in the following that these traffic characteristics are not necessarily known, especially when it cornes to multiple overlapping TSN streams and other non-critical traffic. Therefore, features are investigated rn the following, giving the gNB the possibiiity to still efficiently as well as robustly schedule the traffic mix.
[0762] In Reiease 15, a single CG configuration within a cell/BWP can support industrial streams/flows with similar période and other requirements (such as, latency, reliability, jitter, etc.), However, in industrial networks, as targeted in Reiease 16, multiple streams (data flows) generated at a node is a very common use-case, e.g., robot arm with several actuators, sensors and monitoring devices.
[0763] As a resuit, such multiple streams differ in its characteristics, e.g., arrivai time, and payload size as shown in Figure 73. One of the streams has a medium size payload (in comparison to the others. Also, the packet from this stream arrives at offset
128 zéro, followed by the packets from the other two streams, which arrive at T and 2T offsets, respective ly,
[0764] Furthermore, multiple streams can be characterized by different periodicity, latency and reliability requirements, as shown in Figure 74. Suppose the stream with the dashed outline requires not so critical reliability and latency, whereas both of the other streams require demanding reliability and latency performance. The grant’s configuration parameters, such as MCS and répétition, will differ for the former, compared to the latter. Also, some streams differ in their arrivai pattern and periodicity than others. Because of their different stream characteristics, ail of these streams cannot be supported with a single configuration (CG), even if the CG is supported using very short periodicity, because the CG will hâve a single set of configuration parameters, e.g., MCS index, latency, slot period, K-repetition.
[0765] Since gNB is responsible to allocate the CG’s configurations, any overlap among the configurations occurs with the knowledge of the radio network. gNB might allocate overlapping configurations to address several scénarios: 1) overcoming the misai ignment of critical data arrivai 2) accommodating multiple TSN streams with different characteristics.
Depending on the characteristics of the configurations, the overlaps can be divided into several cases:
• Case a) similar characteristics (e.g., MCS, period, K-Rep) exceptthe starting symbol (offset).
• Case b) similar starting time and same periodicity (compietely overlapping configurations) but different (MCS and K-Rep).
• Case c) different offsets and/or different priority and MCS/K-Rep.
[0766] A problem in overlapping configurations is the undefined UE decision basis for selecting which of the overlapping configurations. Assume a gNB allocates similar overlapping configuration with different offset in time to overcome the mis-alignment in critical data arriva!, as shown in Figure 75. In such case, the UE selects the closest (in time) configuration, upon arrivai of critical traffic.
[0767] Industrial applications raise additional considérations related to logical channel prioritization (LCP) restrictions and multiplexing. Following, the baseline LCP procedures are described. Then, techniques to enhance multiplexing for industrial mixed services scénarios are described.
[0768] Mixed services communication Systems should address both Inter-UE and Intra-UE scénarios, however, in this section we focus on the !ntra-UE one. In such Systems a UE is assumed to hâve several traffic types that are categorized as critical and
129 non-critical traffic, it is assumed that critical traffic is served betterwith configured grants, because this traffic requires very low latency high reliabiiity in the uplink. It is further anticipated that gNB would overprovision configured grant resources to serve such traffic, because of uncertainty about traffic pattern. On the other hand, non-critical traffic has loose latency and reliabiiity requirement and does not benefit from too robust transmissions; on the contrary: system resources might be wasted transmitting large volumes of non-critical traffic with robust grants in a capadty limited scénario, A common use-case that represents and motivâtes such mixed services case is an industrial robot arm that has actuators, sensors, and caméras inlegrated and connected to the same communication device/UE. Several RAN1/2 issues surface when such criticai traffic overiapswîth non-critical one,
[0769] The LCP procedures are applied whenever a new transmission is to be performed, and it is mainly used to specify how and what LCHs are going to fill the MAC PDU which is going io be sent over the PUSCH via PHY. There are mainly two parts in LCP procedures, one focuses on selecting the LCHs to be tncluded in the MAC PDU, the other one focuses on the prioritization and the amount of each LCH’s data (among the selected ones) to fil! the MAC PDU,
[0770] The sélection of LCHs is called LCP restriction procedures. Such procedure is controlled by several restrictions configured via RRC. Each of these restrictions aliow/forbid the LCH to be included in the constructed MAC PDU. The following are the existing LCP restrictions in Release 15:
• allowedSCS-List which sets the ailowed Subcarrier Spacing(s) for transmission;
• maxPUSCH-Duration which sets the maximum PUSCH duration ailowed for transmission;
• configuredGrantTypel Ailowed which sets whether a configured grant Type 1 can be used for transmission;
* allowedServingCells which sets the ailowed cellfs) for transmission. [0771] Logical channel priority is configured per MAC entity per logical channel. RRC configures the LCP parameters to control the multiplexing of the uplink LCH’s data within the MAC. Such LCP parameters are expressed as, • priority where an increasing priority value rndicates a lower priority level;
• prioritisedBitRate which sets the Prioritized Bit Rate (PBR);
• bucketSizeDu ration which sets the Bucket Size Duration (BSD).
[0772] An example of how LCP multiplexing occurs is illustrated in Figure 76. In this example, oniy the “maxPUSCHDuration restriction is considered. Higherto lower priority logical channeis are located from ieft to right in the figure. Higher priority LCHs are piaced
130 first in the MAC PDU, followed by iower priority ones. Also, Priority bit rate (PBR) control the number of bits to be included in the MAC PDU per LCH.
[0773] Below, several scénarios that resuit from intra-UE mixed-services assumption are addressed. In such scénario, we assume that a single UE has to serve both critical and non-critical traffic. The critical traffic may be a-periodic or periodic and require more robust coding with relatively small size grant, compared to the non-critical traffic grant requirement, A requirement of the critical data is that it be scheduled using a periodic, robustly coded configured grant to avoid the latency induced from SR and its response procedure.
[0774] We further assume that no perfect knowledge of critical data arrivai is present at the scheduler. This means that the critical traffic is a-periodic or not entirely periodic, i.e., the periodic arrivai of the traffic may be affected by some jitter, or some periodic transmission opportunités may simply be skipped (due to unavailable data). In such cases, the network/scheduler cannot ideally align scheduling of periodic configured grants to the packet arrivai occurrences, which results in the problème described in the next sub-sections.
[0775] Furthermore, if short périodicités of the configured grant are required to cater for very low latency-requirements of critical traffic, the short periodicity configured grant wiil resuit in imposing scheduling limitations on other non-critical traffic in the UE. Examples of such imposed scheduling limitations are 1) only short dynamic grant duration can be allocated in-between the configured grants, 2) dynamic grant has to be overlapping with the configured grant.
[0776] Problem 1 : Non-Critical traffic sent on robust configured grant
[0777] In this sub-section, we address the problem that anses when non-critical traffic is accommodated using a robust configured grant (i.e. intended for critical traffic). We assume the existence of non-critical traffic with sporadic available. Such traffic would be scheduled on robust configured grant resources that needed to be provided for sporadic critical traffic with short periodicity. As illustrated in Figure 77, if eMBB traffic (labeled 10KB) is accommodated in such configured grant (1KB per transmission occasion), the eMBB transmission takes too long (e.g. up to factor 10, or until BSR is received by network) and leads to unnecessary UL interférence, which is in particular harmful if the configured grant resources were shared among usées.
[0778] New LCH restrictions on the logical channel (LCH) holding non-critical traffic, as shown in Figure 78, can be introduced to mitigate this issue. For example, applying restrictions like “ConfiguredGrantType2Allowed” or “max Relia bilityAllowed’ to a LCH
131 supporting criticai traffic enabie the UE to avoid data from a non-critical LCH being sent using too robust resources.
[0779] Probiem 2: Criticai traffic on non-robust dynamic grants
[0780] Another anses when a gNB needs to schedule a spectrally efficient dynamic grant for non-critical traffic in addition to robust configured grants intended for sporadie criticai traffic. This is shown in Figure 79, which shows the extra latency when critica! traffic is sent over a non-robust short grant, Assuming the same PUSCH duration of configured and dynamic grant, the existing “maxPUSCHDuration” restriction is not effective/sufficient. The criticai traffic wil! be prioritized to be sent on a non-robust dynamic grant and hence the transmission might fail, leading to retransmission delays. [0781] To overcome such issue, a new LCH restriction, i.e., ‘DynamicGrantAllowed”* or “minimumReliabiiïtyRequif^ be introduced. Such restriction wil! block the criticai LCH from being sent on non-robust dynamic grant, as illustrated in Figure 80.
[0782] Probiem 3: issues on dynamic grant overriding configured grant
[0783] According to the current spécification a configured grant is always overridden if an overiapping dynamic grant was allocated. In some scénarios a non-robust dynamic grant might overlap with a robust configured grant, as iliustrated in Figure 81. A reason for such scénario is that gNB has to aliocate a short periodicity configured grant to accommodate sporadic low-latency criticai traffic.
[0784] To soîve this probiem, a configured grant may be conditionally prioritized, i.e. if criticai data is availabie for transmission over the robust configured grant when there is an overiapping dynamic grant, then then criticai data is always prioritized as illustrated in Figure 82, which shows the benefit of enabling configured grant to override dynamic grant conditionally on arrivai of criticai data. Otherwise, the dynamic grant may be prioritized. This way, overiapping large spectrally efficient resources can be scheduied for noncritical data without risking that criticai data may be transmitted on them. However, to employ this methodology, a gNB needs to décodé two potentiel transmisions; dynamic grant and configured grant. It is noteworthy that this issue could also be solved with the solution of probiem 2, i.e. providing the criticai traffic LCH with restriction to not transmit on dynamic grant. Without this solution there can be cases where frequent dynamic grants are scheduied and resuit in unavoîdable delays for the critica! traffic.
[0785] Probiem 4: intra-UE UL pre-emption between grants of different PUSCH durations
[0786] !n the industrial mixed traffic scénario, in order to enabie high spectral efficiency, gNB may want to allocate longer grants to accommodate non-critical traffic. This will incresse the delay of sending any sporadic critica! data, as illustrated in Figure
132
83, which shows an example of overiapping grants with different PUSCH durations, since in Release 15 the current transmission cannot be interrupted by another transmission. To solve this, the physical îayer (PHY) should allow stopping an ongoing (long) PUSCH and transmit new (short with higher pnority) PUSCH according to overiapping short grant, as iilustrated in Figure 84, which shows how enabling intra-UE pre-emption enhances network efficiency, depending on the scénario.
[0787] PDCP duplication is another issue to be discussed. As a method to improve reliability in LTE, NR and EN-DC, multi-connectivity within the RAN is considered. While these features previously focused on împroving the user throughput, by aggregating resources of the different carriers, the focus in 3 GP P has shifted recently and new features are developed for LTE (and likewise for NR) to improve the transmission reliability.
[0788] 3GPP introduced carrier aggregation (CA) in Release 10, as a method for the UE to connect via multiple carriers to a single base station. In CA, the aggregation point is the medium access control (MAC) entity, allowing a centralized schedulerto distribute packets and allocate resources e.g. according to the channel knowledge among ail carriers, but also requiring a tight intégration of the radio protocols involved. With DC or Multi-Connectivity resource aggregation happens at PDCP. This way, two MAC protocols with their separate scheduling entities can be executed in two distinct nodes, without strict requirements on their interconnection winîle still allowing for reatizing incneased user throughput.
[0789] in 3GPP Release 15 LTE and N R, both architecture concepts of CA and DC are reused to help improve reliability as a complément to the reliability enhancements provided by PHY features. This is achieved by packet duplication, which has been decided to be employed on PDCP Iayer. An incomin g data packet, e.g. of an URLLC service, is thereby duplicated on PDCP and each duplicate undergoes procedures on the lower layer protocols RLC, MAC, PHY, and hence individually benefits from e.g. their retransmission reliability schemes. Eventually the data packet will thus be transmitted via different frequency carriers to the UE, which en sures un-correlated transmission paths due to frequency diversity, and in case of DC transmissions from different sites thereby providing macro diversity. The method is iilustrated in Figure 85 for both CA and DC. [0790] Frequency diversity among carriers goes beyond diversity schemes offered by the physical layer on the same carrier. Compared to time-diversity, e.g. répétition schemes, it has the advantage of mitigating potential time-conrelations of the répétitions, which could e.g. occur on a carrier by temporary blocking situations. Furthermore, carrierdiversity ailows, as shown in Figure 85 for DC, the placement of transmission points in
133 different locations, thus further reducing potential corrélations of the transmission by the introduced spatial diversity.
[0791] Multi-connectiviiy with packet duplication on PDCP has the advantage of relying less on utîîizing lower layer retransmission schemes (hybrid automated repeat request (HARQ), and RLC-retransmission) to achieve the target reliabiîity metric, and by this lowering the latency to be guaranteed with a certain reliabiîity. For example, let us assume the PHY achieves for each HARQ transmission a résiduel error probability of 0.1%. In 0.1% of the cases a retransmission is required, increasing the transmission latency by an extra HARQ round trip time (RTT). With packet duplication, the probability that both un-correlated HARQ transmissions fail is 0.1 %*0.1 %. That means that in 1 -10Λ6 of the cases the low latency without the extra HARQ RTT is achieved, since simpiy the first decodable packet duplicate is accepted and delivered, while the second is discarded (at PDCP). An illustration of this relation can be found in Figure 86, which shows residual errors with and without duplication.
[0792] Packet duplication is considered to be applicable to both user plane and control plane, meaning that also RRC messages can be duplicated on PDCP layer. This way, latency/reliabiîity of the RRC message transférai can be improved, which is e.g. important for handover-related signaling to avoid radio link failures.
[0793] Furthermore, multi-connectivity has the potential to enable reliable handovers without handover interruptions for user plane data. Thereby, the handover can be done in two steps, i.e. one carrier is moved at a time from source to target node, and hence the UE maintains always at least one connection. During the procedure, packet duplication may be employed, so that packets are available at both nodes for interruption-free transmission to the UE.
[0794] To support PDCP duplication in CA, a second ary R LC entity is configured for the (non-split) radio bearerused in support of duplication. See Figure 85. To ensure the diversity gain, restrictions can be defined for the logical channels associated with these two RLC entities, so that transmission of each RLC entity are only allowed on a configured carrier (primary or secondary cells).
[0795] Furthermore, to ailow using PDCP duplication as a “scheduling toor i.e. allowîng to activa te and deactivate duplication only when necessary, i.e. dynamically be the scheduler, MAC control éléments had been specified.
[0796] In Release 16, within NR-Industrial loT, enhancements to PDCP duplication in NR are envisaged, which ailow duplication over more than two links, i.e. DC-based and CA-based duplication may be used together, or CA-based duplication with more than two carriers are considered. Furthermore, enhancements regarding the duplication efficiency
134 are investigated: instead of always duplicating, the transmitter may deferfrom sending the dupiicate if the original had been in flight already for a certain time. The reasoning is that a dupiicate serves its purpose of increasing the reliability of reaching a latency bound only if both original and dupiicate are received within this latency bound. One could envisage also a scénario where duplicates are only transmitted together with a retransmission, i.e., NACK-based. Le. retransmission reliability is improved, while initial transmission reliability remains the same.
[0797] Table 20 illustrâtes for which bearer options, UP, CP, etc., duplication is supported.
MCG SRB MCG DRB SCG SRB SCG DRB Split SRB Split DRB
CA duplication DC duplication
LTE/LTE Yes Yes Yes Yes Yes (only with dupl) Yes (with fallback)
NR/NR Yes Yes Yes Yes Yes Yes
EN-DC (with N R PDCP) No (would be LTE CA) No (would be LTE CA) Yes Yes Yes (not from S N) Yes
Table 20 - Support for Duplication
[0798] Reference Time Provisioninq
[0799] An NR-Jndustrial loT feature of interest is that of providing UE based applications (e.g. residing in Industrial loT devices connected to a UE via ethernet ports) with dock information derived from source docks residing in networks extemal to the 5G network. The external source docks can be provided in addition to the 5G system dock which is internai to the 5G system. The docks derived from extemal sources can be viewed as working docks corresponding to working domains that résidé within the context of a universal domain” as indicated by Figure 87.
[0800] The “universal domain” is based on the 5G system dock and is used to align operations and events chronologicalîy within a factory (the universal domain). The working docks are used for supporting local working domains within the universal domain wherein each local working domain consists of a set of machines. Different working domains may hâve different timescales and synchronisation accuracy thereby requiring support for more than one working dock within the universal domain.
[0801] Within the scope of Release 15 RAN2 has focused primarily on the method by which a single reference time value can be delivered over the radio interface from a
135 gNB to a UE and has not been concemed about or aware of any use cases wherein multiple référencé time vales would need to be conveyed to a UE. The ongoing discussion within SA2/RAN3 regarding the potential need for delivering multiple référencé time/working clock values to a UE continues to drive further enhancements in this area. [0802] A 5G system supports an internai 5G clock which can be based on a very accurate and stable clock source (e.g. a GPS time) and distributed throughout the 5G network as needed, including delivery to eNBs and UEs as référencé time information, It is also possible for a 5G System to acquire référencé time information from an extemal node (not further considered herein). LTE Release 15 supports a method for delivering a single instance of référencé time information (assumed to be availabie at an eNB) to UEs using both RRC message and SIB based methods as follows and as illustrated in Figure 88, which shows BS SFN transmissions:
• An eNB first acquires a référencé time value (e.g. from a GPS receiver internai to the 5G network) • The eNB modifies the acquired référencé time to the value it is projected to hâve when a spécifie référencé point in the system frame structure (e.g. at the end of SFNz) occurs at the BS Antenna Référencé Point (ARP) (see référencé point tR in Figure 88).
• A SIB/RRC message containing the projected référencé time value and the corresponding référencé point (the value of SFNz) is then transmitted during SFNx and received by a UE in advance of tR.
• The SIB/RRC message may indicate an uncertainty value regarding the value of référencé time applicable to the référencé point tR. The uncertainty value reflects (a) the accuracy with which an eNB implémentation can ensure that the référencé point tR (the end of SFNz) will actually occur at the ARP at the indicated référencé time and (b) the accuracy with which the référencé time can be acquired by the eNB.
o The uncertainty introduced by (a) is implémentation spécifie but is expected to be negligible and is therefore not further considered.
o When a TSN node is the source of référencé time information (i.e. the TSN node serves as a GrandMaster node) the use of hardware timestamping at the GrandMaster node and eNB is assumed to be used for (b) in which case a corresponding uncertainty is expected to be introduced when conveying the GrandMaster clock to an eNB.
[ 0803] For NR Release 16 a method sîmilar to LTE Release 15, as described above, is expected to be used forsourcing and delivering référencé time information from a gNB
136 to one or more UEs. However, NR Release 16 is also expected to introduce support for one or more working ciocks (sourced by external nodes in the TSN network) as supplémentai clock information (i.e. supplémentai to the reference time provided forthe universal time domain). Figure 89 shows an industrial use case with three time domains, where an internai 5G ciock serves as the reference time applicable to the universal time domain (in the 5G time domain) as well as two supplémentai working ciocks applicable to TSN working domain 1and TSN working domain 2.
[0804] The internai 5G clock (shown as a 5G Grand Master) is used for serving radio related functions and is therefore delivered to both the gNB and UE (but not made available to the UPF). Once the gNB acquires the internai 5G clock (implémentation spécifie) it can convey it to the UEs using either broadeasting (e.g. SIB) or RRC unicasting methods. The SFNs sent over the Uu interface wili be synchronized to 5G internai clock and in this sense the UE will always be synchronized to the 5G internai clock even if it is not explicitly conveyed to the UEs.
[080S] The gNB receives working clock information from different external TSN nodes (i.e. directiy from the TSN nodes controiling the TSN work domain ciocks), thereby requiring the gNB to support PTP signalling and multiple PTP domains (multiple PTP clock instances) for communicating with TSN network. The gNB then conveys the working ciocks (as stand a lo ne ciocks or as offsets relative to the main internai 5G ciock) to the corresponding UEs using one of two methods as foliows: a) Method 1: SFN Based Synchronization • This method of delivery is supported within the context of Figure 89 and is the sa me one used for deiivery of the internai 5G clock (black ciock) to UEs wherein clock information is synchronized to a spécifie point in the SFN frame structure.
* The gNB may not need to refresh the working ciocks in the UEs every time it receives PTP based signalling providing it with updated values for these working ciocks. This is because UEs may be able to manage the drift of these ciocks with enhanced accuracy (using the internai 5G clock) compared to the rate of clock drift that may be ongoing at the source TSN Node. The net resuit is that the radio interface bandwidth consumed for working clock maintenance can be lower as the gNB will not need to send working clock updates to the UEs every time such updates occur within the TSN network.
• In this method the gNB directiy adjusts the value of the working clock information it has received according to the location within the SFN structure the working clock is mapped and then sends the adjusted value within a SIB16 or RRC message.
137
b) Method 2: Timestamping • In this method (also supported within the context of Figure 80) the gNB supports a boundary dock fonction per 802.1 AS and therefore obtains a working dock from the TSN network (using PTP sync message exchange) whenever the working clock source node décidés to send it.
• The gNB then relays the PTP message containing working dock information (or a subset of the information therein) to the UEs as higher layer payload, • The relayed PTP message also includes a time stamp providing the value of the internai 5G dock at the point where the PTP message was received by the gNB.
• Upon receiving the relayed PTP message the UE adjusts the value of the working dock contained therein according to the différence between the current value of the internai 5G dock and the time stamped value also induded in the relayed PTP message, thereby obtaining the current value of the working clock.
• As per method 1, the gNB may not need to relay the PTP message containing the working dock to the UEs every time it receives it from the TSN network (because UEs may be able to manage the drift of these docks with enhanced accuracy).
• In this method the gNB does not adjust the value of the working clock information it has received but suppléments it with time stamp information inserted directly into the same PTP message used for sending working dock information. It can then send the modified PTP message within a SI B or RRC message or, to reduce the payload size in the interest of bandwidth efficiency, the gNB can instead only map the unmodified working dock information and the corresponding time stamp into a SIB16 or RRC message.
[0808] For methods 1 and 2 above, the frequency with which a UE distributes working docks to End Stations can be seen as implémentation spécifie. When performed it makes use of PTP sync message exchange as performed in the TSN network. In other words, the UE acts as master dock to the TSN end stations using the (g)PTP protocol and décidés when working dock values need to be refreshed in the End Stations. The UE forwards ali working docks it receives to ait end stations it manages (i.e,, the end stations détermine which working docks they are interested in).
[0807] For NR Release, a UPF Continuous PTP Chain Method may be used. For this method, which is illustrated in Figure 90, the TSN network interfaces with the UPF for the purpose of delivering working dock information wherein the UPF to UE path emulates a PTP link so that there is a Virtual continuous PTP chain between the TSN Working domains on the right of the 5G network and the End Stations on the left of the 5G network
138 (i.e. PTP sync message exchange is performed between the UE and the TSN Node supporting the working clock).
[0808] The UPF transparently relays the working docks (e.g. green clock on the right hand side of Figure 90) to each UE wherein the UPF time stamps these working docks with the value of the internai 5G clock applicable to the point where the PTP message is relayed.
• The 5G network will need some awareness of when it is relaying PTP messages containing working dock information since it will need to provide supplémentai time stamp information to these PTP messages.
• The transport layer PDUs used to relay PTP messages from the UPF to a gNB can potentiaily be enhanced to support an indication of when PTP messages comprise the upper layer payload carried by these PDUs. This opens up the possibility of a gNB using SIB based transmission of the PTP message payload in the interest of radio interface bandwidth efficiency (i.e. in addition to using a RRC based option fordelivering PTP messages).
• Upon receiving the relayed PTP message the UE adjusts the value of the working clock contained therein according to the différence between the current value of the internai 5G dock and the time stamped value included in the relayed PTP message, thereby obtaining the current value of the working dock.
• The UE acts as a master clock to the TSN end stations using the (g)PTP protocol and décidés when working clock values need to be refreshed in the End Stations. The UE forwards ail working docks it receives to ail end stations it manages (i.e. the end stations détermine which working docks they are interested in).
• This method does not require the use of equalized uplink and downlink delays which is an advantage (since symmetrical uplink and downlink delays impose additional complexîty).
• However, one potentiaî disadvantage is that the frequency with which the working docks are refreshed by their corresponding source node within the TSN network will détermine how often they are relayed through the 5G network to the UEs (e.g. this could hâve a significant impact on the radio interface bandwidth if each UE is individually sent user plane payload containing clock refresh information whenever any working dock is refreshed in the TSN network).
[0809] Ethernet Header Compression
[0810] For tradiiional IP transport over 3GPP Systems header compression has been specified, i.e. robust header compression (RoHC) to reduce the volume of data sent
139 over the radio interface, thereby RoHC is applied to the UDP/TCP/IP iayers, and RoHC compression/decompression is performed by PDCP layer at UE and gNB.
[0311] in the TSN, where Ethernet transport is envisaged, header compression could poientially also be applied. This would be the case for the Ethernet PDU session type, where Ethernet frame s should be conveyed between gNB and UE.
[0812] Generally, given that robust transmissions with a very low residual error rate are required for URLLC, used code rates are naturally very low, meaning that URLLC transport is resource-costly over the radio interface. Therefore, removal of unnecessary redundancy such as potentially Ethernet headers, is important to be studied as part of the Release 16 NR-Industrial loT 3GPP study. In the following, an analysis of the Ethernet/TSN header structure and gains from compressing them is done.
[0813] Forwarding in Layer 2 (L2) networks is usually based on information avaiiabiê in L2 frame headers. Each Ethernet frame starts with an Ethernet header, which contains destination and source MAC addresses as its first two fieids. Further header fieids of an Ethernet frame are constructed quite simply using tagging. Some of the header fieids are mandatory some are optionaî, and they dépend on network scénario.
[0814] There are multiple formats of Ethernet frames (e.g., 802.3, 802.2 LLC, 802.2 SNAP). They are identified based on the value of the EtherType vs. Length field. Figure 91 shows an example of the frame format.
[0815] Regarding Ethernet frame transmission over 3GPP networks, some parts of the Ethernet frame do not need transmission (e.g., Preambie, SFD (Start of Frame Délimiter), FCS (Frame Check Sum), see also existing spécification for PDU session type, TS 23,501). Fieids of the Ethernet header can be compressed but the gain achieved by compression are dépendent on the network scénario. The Ethernet link can be either an access link or a trunk link. For a trunk link, the number of sessions is significantly larger and can be affected by Ethernet topology change that results in temporary flooding. On the other hand, an access link is more stable from L2 session perspective, Ethernet header compression must be L2 link spécifie, i.e., covering a single L2 hop (a.k.a. link-by-link basis), as illustrated above.
[0816] We consider the following fieids for Ethernet header compression: MAC source and destination address (6 bytes each), tag control information (6 bytes), holding information such as VLAN-tag and Ethertype. Ethernet frame transmission over3GPP networks does not need forwarding of some parts of the Ethernet frame (i.e., Preambie, SFD, FCS), So, in total 18 bytes can be compressed.
[0817] Assuming the 5G system is used as an Ethernet access link, only a limited number of L2 sessions would exjst, and compression down to 3-5bytes (conservative
140 assumption) is possible, which ieads to significant gains for small packet sizes (as typical in URLLC) as shown in Figure 92.
[0818] Regarding how and where header compression for Ethernet can be supported, the following questions may be raised.
« Which protocol and standardization body: In 3GPP, RoHC as defined by IETF is used for IP header compression. There is no profile considering Ethernet. Furthermore, the standardization group dissolved. Static Context Header Compression (SCHC), also IETF is still active and considers Ethernet header compression, for the use case of iow-power WAN. Also a 3GPP-based solution can be thought of.
• Anchor point Current RoHC network anchor point is the gNB with PDCP. Another possibility would be the U PF, where the Ethernet P DU session is setup. Figure 93 illustrâtes possible Ethernet header compression anchor points.
• With and without IP: Whether Ethernet header compression shouîd be considered integrated or separate with IP header compression.
[0819] Reliabie Controi Plane
[0820] In this section, methods for reliabie controi plane provisioning i.e. for robustly maintaining the radio resource controi (RRC) connection between UE and gNB, are described.
[0821] First of ail, controi plane, i.e. RRC signalling (SRB) transmission is handled the radio protocols as user plane data transmission, i.e. RRC signalling robustness can be established with the same features as describe for Layer 1 and Layer2 above. Furthermore, also PDCP duplication, in the case of the split bearer in DC, as well as for CA, is also applicable to RRC signalling (SRB).
[0822] As we will see in the following, beside SRB signalling robustness, also resilience against node failures and handling of radio link failure (RRC) can be addressed: In case of a failure of the network node terminating RRC, the UE would lose its connection. Furthermore, in current Release 15 LTE and NR the radio link failure handling is not symmetrically handled, i.e. in case of failure related to the primary cell, radio link failure (RLF) is thggered, leading to a connection interruption, where the UE disconnects and searches fora new node to connectto. In case of failure related to the primary cell of the secondary cell group (SCG), however, only a failure indication is sent to RRC, while the connection continues. A similar procedure is also implemented for a secondary cell failure in case of CA duplication.
[0823] There are two failure cases that can be handled with RRC diversity today (Release 15). Specifically, fora DC architecture with PDCPduplication, both in case of
141 secondary radio link failure, as well as in case of entire SgNB outage, the connectîvity with the UE can be maintained. In case of primary cell failure or MgNB failure, this would however not be the case. These failure cases in Release 15 are iîlustrated in Figure 94. [0824] To enable “True RRC diversity”, therefore, further enhancements need to be considered, i.e. either a fast/pro-active handover or failover of the RRC context to another node, in case of node failure, and generally symmetrical handling of radio link failures independent of in which cell the failure happened. This symmetrical handling of RLF is considered within NR Wl DC in Release 16. The approach contemplated here is that instead of triggering a failure and UE interrupting data and control signaling when a failure associated with a primary cell occurs, the UE informs the network via a secondary cell, and continues its communication of data and control via this secondary cell, untiî reconfigured by the network,
[0825] An alternative, however costly, method would be an approach where multiple companion UEs are used for the same industrial device. Duplication and duplicate élimination would in this case happen on higher layers of the UEs. On the network side, the UEs would (as a configuration option) be connected to different eNBs/gNBs so that in case of link failure, UE failure or also node failure, the connection could be maintained via the independent companion UE.
[0826] Handover and Mobility Enhancements
[0827] For a UE in RRC-connected mode, the NR mobility mechanisms in Release follow its LTE baseline, which is iilustrated in Figure 95. The Source gNB décidés (e.g, based on UE measurement reports) to handover the UE to the Target gNB. If the Target gNB admits the UE, a handover acknowledgement indication is sent to the Source gNB, which thereupon sends the handover command to the UE. The UE then switches to the new cell, indicated in the handover command and sends a handover complété indication to the Target gNB. During the switch, the UE resets MAC, re-estab!ishes RLC and if needed re-establishes PDCP and changes security keys. The involved RACH procedure can be configured to be contention free, i.e. the RACH pre-amble to be used provided to the UE during the procedure.
[0828] For the handoverto be interruption-free, i.e., in order to achieve Oms handover interruption time, the switching time by the UE must be minimized, For this, in LTE Release 15 (not NR), it was agreed that a dual Tx-Rx UE shall be capable of performing an enhanced make-before-break solution to ensure 0 ms handover interruption time. In this solution the UE maintains the connection to the source gNB untH the UE starts to transmit/receive data from the target eNB. The details of how the dual protocol stacks are handled at the UE were left to UE implémentation,
142
[0829] For Release 16, both in LTE and NR, some further mobility enhancements are envisaged. For reducing the handover interruption time in NR, there are severai solutions under discussion for dual Tx-Rx UEs. One of which is the LTE-like enhanced make-before-break approach (described above). Other approaches, relying on the DC architecture consider a rôle switch operation between MN and SN and thus enabling 0 ms ‘handover’, i.e. maintaining always a connection to one of the nodes while undergoing handover. For scénarios where UEs do not hâve dua! Tx-Rx functionalities, other approaches are envisaged such as improved i.e. faster RACH-iess handover based on an improved TA calculation approach, or also faster falî-back possibilities to the source node. To improve the general handover robustness (applicable to various scénarios from URLLC or aerials domain), a solution is foreseen based on a conditional handover command (performing handover execution when a certain network configured condition is met) which reduces the handover failure/ping-pong possibiiity traded for higher network resource usage overhead.
[0830] One way to provide mobility without increasing latency due to handover and without requiring any capability enhancements at the UE is to deploy so-calied combined cells.
Combined cell is a feature that is commercially available in Ericsson’s LTE networks. In a combined cell, multiple remote radios are connected to the same baseband digital unit, and serve the same cell. It allows multiple sector carriers to belong to the same cell. Combined cell can be used to extend the coverage of a cell, and provides the following additionai advantages:
• Reduces or éliminâtes coverage holes, by enabling overiapping coverage areas from different antenna sites.
• Increases received signal strength at UE.
• Provides uplink macro-diversity.
• Eliminâtes the need for inter-cell handover within the combined cell
[0831] URLLC benefits from ait of the advantages listed above. Shadowing can be a problem in factory floors, due e.g. to the presence of large métal surfaces. Combined cell can help decrease or eîiminate this problem, by careful sélection of the antenna sites. Increasing the signal strength at the UE is clearly bénéficiai for increased reliability, as is macro diversity. Avoiding or reducing the need of handovers, is also greatly bénéficiai for moving UEs, as handovers typically resuit in sîgnificant latency increase. Furthermore, combined cell provides seamless coverage in transition areas between indoor-outdoor, or indoor-indoor (e.g. multi-story halls), which would otherwise require (more) handovers. It
143 provides a robust mechanism to grow the coverage area of the network, désirable e.g. when the factory fioor is expanded.
[0832] Finalîy, combined cell can be used together with carrier aggregation, which provides its own benefits.
[0833] URLLC feature introduction in 3GPP Release 15 and 16 is summarized in
Table 21 Table . The shading indicates features that are needed for supporting industrial loT use cases that hâve stringent URLLC requirements, and the ones without shading are considered as features for efficiency optimization or scheduling flexibiîity.
[0834] Release 15 establishes core URLLC features enabling LTE FDD and NR, both FDD and TDD, to fuifill the IMT-2020 URLLC requirements of 99.999% relîability with 1 ms latency. For LTE, essential features for industrial loT consist of short TTI, automatic répétitions without HARQ feedback, UL semi-persistent scheduling (SPS), reliabie PDCCH, RRC diversity forachieving control-plane relîability, as weli as highprecision time synchronization for allowing isochronous operation between multiple de vices in the network. Although LTE FDD achieves the IMT-2020 URLLC requirements, LTE TDD however does not due to the limitation of TDD configuration. The lowest oneway user-plane latency for data transmission is limited to 4 ms in LTE TDD.
[0835] Release 15 NR meets IMT-2020 URLLC requirements with higher efficiency than LTE. One key enhancement is the scalable OFDM numerology used in NR, which 20 combined with short TT! substantially shortens the transmission time. Another key enhancement in NR is dynamic TDD and faster DL and UL switching. NR TDD can achieve one-way user-plane latency as short as 0.51 ms.
[0836] The évolution of industrial loT support continues in NR Release 16. One major enhancement is TSN intégration, which enables NR to work with established industrial Ethernet protocole. NR Release 16 will also introduce URLLC enhancements to enable NR to meet even more stringent requirements, e.g. 99.9999% relîability with 0.5 ms latency.
Features Release 15 LTE Release 15 NR Release 16 NR (concept)
Scalable OFDM numerology Only 15 kHz SCS 14OS = 1 ms SCS={15. 30, 60, 120, 240} kHz 14OS={1, 0.5, 0.25, 0.125, 0.0625} ms Same as Release 15
Short TTI OS DL Short TT! ={2, 4, 7} OS Consider improvements such
144
UL Short TTI ={1,2, 3, . ,13} as mini-slot répétitions, DMRS overhead réduction
Low-latency optimized dynamic TDD Not included Included - Same as Release 15
Automatic répétition Up to 6 répétitions K répétitions · (without slot- . boundary Crossing) Propose K répétitions allowing slot-boundary Crossing
UL configured grant included (UL SPS) c /:\T Propose enhanced scheduling flexibiiity
Robust MCS table & CQI for low BLER reporting Not included Included :/7::£:¾½¾ Same as Release 15
Reliable PDCCH AL 8; SPDCCH . . répétitions included ·/Ji7/.-.½½.·/·:' · ·.·T.’T ·’· ; · · ;.:. 7y. z : .; -C : ·'. μ < ::! J ό ! J. v ' : Beamforming, AL 16, 24-bit CRC; - J .frequerK^Jfô^^ Release 15 + small enhancement (new DCI format proposed)
Number of PDCCH blind décodés 44 for 1 ms TTI 68 for 0.5 ms TT! 80 for {2 or 3} OS {44, 36, 22, 20} for {15, 30, 60, 120} kHz SCS per slot Propose {44, 36, 22, 20} for {15, 30, 60, 120} kHz SCS per half-slot
Number of PDCCH CCE {56, 56, 48, 32} for {15, 30, 60, 120} kHz SCS per slot Propose {56, 56, 48, 32} for {15, 30, 60, 120} kHz SCS per half-slot
Short PUCCH Included Included Same as Release 15
Faster UE processing capabiiity Not included Included (UE · Capabiiity 2) ' : Propose UE capabiiity 3
Scheduling flexibiiity across slot not borders allowed Propose across slot borders allowed
Multiplexing (LCH) restrictions E.g. hnk LCH to cell or to PUSCH duration E.g. link LCH to cell or to PUSCH duration Planned further restrictions regarding dynamic and configured
145
grant; possibly reiiability
SR and BSR for URLLC Not included Multiple SR configurations Planned certain minor enhancements
PDCP duplication Both DC and CA Both DC and CA Efficiency enhancements; Extension towards more than 2 copies.
Control plane reiiability RRC diversrty RRC diversity ' :' : ζ· ΐ % C r 1-¾ · : V.¾¾ # 1·' :¾¾ C Symmetrical RLF handling.
DL préemption Not included Included Same as Release 15
UL intra-UE multiplexing Not included Not included Planned
UE inter-UE préemption Not included Not included Planned
Ethernet transport & header compression Not included Ethernet PDU session for transport Header compression
Hig h-precision time synchronization Time reference with 0.25 Us granularity Not included Planned time reference with 0.25US granularity and multi-time domain support.
Mobility make-before-break handover, dual Tx/Rx UE Included Not included Proposed
Mobility condîtional handover Not included Not included Proposed
Table 21 - URLLC feature introduction in 3GPP Release 15 and 16.
[0837] în summary, NR has been designed with clear objectives of achieving low latency and ensuring high reiiability from the outset. An array of layer-1 and iayer-2 features in Release 15 enables URLLC:
· Scalable numerology and short TTL With scalable numeralogy, OFDM symbol and slot duration can be reduced by employing a larger subcarrier spacing. The transmission time interval can be further reduced by using mini-slot scheduling, which allows a packet to be transmitted in a time unit as small as 2 OFDM symbois.
146 • Scheduling design. NR supports frequent PDCCH momtonng, which increases scheduling opportunités for both DL and UL data. This helps reduce latency. For the UL, configured grant can be used to elimînate the delay incurred by UE having to first send a scheduling request and waiting for an uplink grant. In a mixed traffic scénario, N R allows URLLC traffic to be pricritized; and in events when the scheduler does not hâve sufficient radio resources to serve a URLLC UE, NR has a mechanism to pre-empt already allocated eMBB type resources for the use of serving DL URLLC traffic.
• Fast HARQ, A DL data transmission is compieted by a HARQ acknowledgement, and thus a fast HARQ tum-around time is needed for achieving low latency. In NR, this îs facilitated by defining a more stringeni UE receiver processing time requîrement (i.e. UE capability 2) and also making it possible for the UE to complété HARQ transmission in a short time interval through the use of short PUCCH. Not only does fast HARQ turn-around time contribute to low latency, it can also be used to improve the reliability or spectral efficiency of data transmissions by alîowing more HARQ retransmissions within a given latency budget. Furthermore, HARQ-less répétition (sender transmits K répétitions before expecting HARQ feedback) is also adopted in NR to improve reliability without delays introduced by HARQ tum-around time.
• Low-latency optimized dynamic TDD. NR supports very flexible TDD configuration alîowing DL and UL assignment switching at a symbol level.
• Robust NICS. Reliability is enhanced by including lower MCS and CQI options for lower BLER targets.
[0838] In addition, RAN architecture options are available to enhance reliability beyond the beforementioned features, i.e. by duplicaiing data through muiitpÎe gNBs and/or through multiple carriers.
[0839] Reiease 15 NR thus lays a solid foundation for supporting URLLC services. It has been also verified in the work of 3GPP ÎMT-2020 seif-evaluation that Reiease 15 NR fully fulfils the IMT-2020 URLLC requirements, 99.999% reliability with 1 ms latency.
[0840] Building on the solid URLLC foundation in Reiease 15, Industrial SoT is in focus now in Reiease 16. The prioritized use cases include factory automation, electrical power distribution, and transport. Although the requirements of these prioritized use cases vary, the most demanding use cases call for 99.9999% reliability with latency as small as 0.5 ms. Furthermore, a key aspect of NR Industrial loT is to enable NR to work with established industrial Ethernet protocols. As TSN emerges as the foundation of the industrial Ethernet protocols, a flagship Reiease 16 feature is “NR and TSN intégration”.
147 • N R in Release 16 wrll support accu rate time reference provision m g to the UE, in orderto synchronize TSN devices on the UE side wirelessly with the TSN working time domain on the network side.
• Configured grant scheduling and UE multiplexing and pre-emption are proposed to be enhanced to more efficiently cope with the mixed TSN traffic scénario.
• PDCP duplication is designed to handle reliability provisioning more efficiently.
• Ethernet header compression is being studied for overhead réduction in RAN.
• Layer-1 URLLC enhancements are also being considered in Release 16 to further reduce latency, improve reliability and spectral efficiency, and improve handling of multiplexing uplink control and data from different services types (e.g. control for URLLC multiplexed with data from eMBB, or vice versa).
[0841] With TSN intégration and further URLLC enhancements, NR Release 16 will make great strides toward enabiing smart wireless manufacturing and ushering in a new era in industry digitalization and transformation.
[0842] Industrial Communication Technologies and Protocols Alongside TSN and 5G
[0843] ft is a widely accepted thinking that TSN and 5G will be the fondamental connectivity technologies for future factories and other industrial use cases.
Nevertheless, most industrial players do not start their industrial loT story from scratch in a greenfield deployment. Rather, many industrial processes already involve connected devices using their own industry defined connectivity mechanisms. These deployments are commonly referred to as brownfield. While most brownfield deployments (94%) are wired, also many wireless solutions exist, especially for data collection. Industry is conservative and already made investments are guarded. Thus, many times a new technology needs to be introduced as a complementary solution to the already existing infrastructure at the industrial site unless significant added value can be shown.
[0844] The protocol stack for industrial loT can look very different depending on choices on different protocol layers. Figure 96 depicts some possible protocol alternatives on the different layers mapped to the Open Systems Interconnect (OSl) protocol stack layers.
[0845] To get a complété picture, this chapter introduces both wired and wireless communication technologies that are used today. Regarding the use of 4G and 5G for brownfield deployments, two aspects are important and covered:
• Interworking with legacy wired technologies (like e.g. Profinet) • Competing with other wireless technologies (like any IEEE 802.11 technology)
148
Furthermore, OPC-UA and SECS/GEM are introduced as two communication protocols being used in factory automation today and assumed to play a major rôle in the future. [0846] With regards to the physical and medium access layers, many wired communication technologies dedicated to industrial usage hâve been developed in the past. Initially so-called Fieldbus technologies hâve been used as e.g. standardized in iEC 61158. Nowadays a shift towards industrial Ethernet solutions has happened and Profinet is one example of such. A main trait of these technologies is that they are designed to deliver data under tight time constraints, 1 ms or less. A disadvantage of Fieldbuses and some industrial Ethernet variants is a general incompatibility with each other and the need for spécial hardware to run these technologies beyond standard office-Ethernet equipment. Time-sensitive networking (TSN) is a set of IEEE standards, which add reliability and deterministic low latency capabilities on top of standardized Ethernet (IEEE 802.3). It is the ambition to establish a common standard into the spirntered wired communication technology market for industries. A lof of industrial equipment vendors right now hâve started or at least indicated to move to TSN for their portfolio.
[0847] Industrial Ethernet has become quite popularand gains market share over iegacy fieldbus technologies as Ethernet has also become a major communication standard in other domains. One reason might be the cheap and common parts and cables etc. it was already mentioned that different industrial Ethernet technologies are incompatible and don’t allow an interworking without the use of spécial gateways or similar additional equipment, This is because they use different concepts to satisfy the requirements for industrial use cases. Nevertheless, there are some common facts for industrial Ethernet:
• Industrial Ethernet is almost always ‘switched Ethernet’ • 100 Mbit/s and full-duplex links • Different topologies possible (line, star, ring etc.) but might be strictïy defined by the technology • Redundancy methods (e.g. Parallel Redundancy Protocol (PRP)) • Master/controlier-siave architecture • Functions to detect communication errors (like timers and counters for packet losses)
[0848] Figure 97 shows the concept of industrial Ethernet and how it is built-up on standard Ethernet. On layer 2, some industrial Ethernet technologies are based on time scheduled transmissions (like Profinet RT) to achieve deterministic latencies in the network. The network cycle time is a metric that is widely used to promote and compare technologies - the lower the network cycle time that is supported, the better. Usually the
149 network cycle time is the minimum application cycle time that is supported (i.e. the application transmits a certain message in every network cycle). Very challenging use cases require incredible small application cycle times beîow 50 microseconds, to achieve a sufficient accuracy for e.g. motion control. EtherCat for example defines a new Ethernet layer 2 to achieve very low network cycle times.
[0849] As can be seen in Figure 97, Profinet has different flavors:
• Profinet CBA (component based automation) - only for process automation with less stringent transmission characteristics and requirements • Profinet-IO RT (realtime) • Profinet-IO IRT (isochronous realtime) - this variant supports application cycle times down to 31.25 microseconds (by using network cycle times of 31.25 microseconds)
[0850] Figure 98 shows an example of time scheduled transmissions in Profinet the figure depicts one network cycle that is repeated periodically. The rein the network access time is shared between a cyclic IRT phase and a cyclic RT phase both to provide strict QoS and a Non-RT phase, which is équivalent to a best effort phase without guarantees on QoS. Profinet uses a time synchronization protocol like IEEE1588 to establish a common notion of time between ail nodes. For very strict applications there might be no RT or Non-RT phase involved, IRT communication is always pure layer 2 communication, not using UDP/TCP/IP. A Profinet IRT frame is illustrated in Figure 99. [0851] The network management in case of Profinet (as well as for other technologies) is manually pre-confîgured and usually no devices can be added on-the-fly - so plug-and-p!ay is mostly not possible, but instead there is some expertise needed to set up these networks which is definiteiy a pain-point for industries.
[0852] Industrial Ethernet equipment differs from standard Ethernet as well:
• Spécifie switches - rugged, QoS optimized, highly available implémentation • Mos! technologies require spécifie ASICs, some are based on software, some vendons sell also muîti-technoiogy ASICs (e.g. HMS, Hilseher, AD) • Usually PLCs offer different communication modules to support multiple technologies « Devices (from sensors to robots) usually offer only a limited set of technology interfaces
[0853] Some of the industrial Ethernet technologies will probably disappear and being replaced sooner or iater by TSN products. Nevertheiess, the product life cycles are very long in industries. TSN adopts many features also used in existing industrial Ethernet technologies. Furthermore, organizations behind Profinet and EtherCat already
150 pubhshed whitepapers explaining how an operation alongside TSN wili work. They might see TSN as a common infrastructure where Profinet and other technologies might coexist on.
[0854] The way industrial Ethernet is nowadays deployed is similar to islands. High QoS can only be guaranteed within such an island. One island is deployed using one communication technology, e.g. Profinet. Usually a Programmable Logic Controller (PLC) is used as a master of an island (e.g, a Profinet master). An island usually consists of a few devices on the sa me shopfloor only, The interworking of e.g, Profinet and cellular ss especiaîty relevant if one of these devices (e.g, the PLC) is virtualized (central link) or if one device (device-to-island) or a group of devices using a gateway (inter-island link) is separated from the island on the shopfloor, The interworking of Profinet and for example LTE has been showed already in some research proof-of-concept studies - it is possible if the applications cycle time is above a certain limit (e.g. 32 ms as an example), depending upon the configuration of the LTE network.
[0855] Requirements for the cellular network in terms of Iatency and packet error rate (PER) are not set by the communication technology like e.g. Profinet but the applications using them, or the application cycle times used respectively. Usually the lowest supported network cycle time is a KPI for industrial communication technologies, Aithough Profinet IRT supports network cycle times down to 31,25 usée it is also being used for applications with mu ch lower requirements (i.e. application cycle times much higher that this). Profinet IRT can be used for application cycle times up to 4ms. In case of Profinet, the RT version that supports only higher network cycle times seems anyway more relevant, at least was always used in any triais with industrial partners.
[0856] Other wireiess solutions are trying to enter the field at the same time with 5G. One interesting technology is MulteFire, which is marketed heavily for industrial connectîvity. MulteFire as a technology is very similar to LTE but only runs on unlicensed spectrum, so the benefits of scheduling and mobility within the system are thene. Device availability is a challenge for MulteFire at current time. WiMAX has partly been used as wireiess technology in industrial but is chailenged due to the low economy of scaie.
[0857] Industriai grade Wi-Fi has a small footprint in connecting industrial devices. Reîiability and Iatency issues are addressed through implémentation. No global certification exîsts, but rather the solutions are vendor spécifie and do not interoperate. More commonly, regular Wi-Fi is deployed in industrial spaces to allow employée Internet access from laptops, tablets and mobile phones. This connectîvity is valuable and important for shop floor personnel.
151
[0858] Figure 100 depicts an estimated différence between Wi-Fi, MulteFîre, LTE and 5G NR with regards to increasing rêliability demands and increasing end to end (E2E) latency demands. Example use cases are placed on the figure to show what kind of requirements roughly need to be fulfilled for each.
[0859] Wireless sensor networks are used to collect sensor data and monitor machinery. industrial Bluetooth implémentations exist as vendor spécifie solutions. Typically, Bluetooth is used as a connectîvity for personnel to acquire reading from machinery when at close distance. There is increasing interest in deploying gateways for continuous connectîvity. Also, many different variants of the IEEE802.15.4 protocol exist for industrial use. Most well-known are WirelessHART and ISA100.11a, which are defined and certified by industry players. 6TÎSCH is being standardized by the JETF to bnng determinism and rêliability into the ΙΕΕΕΘ02.15.4 radio interface.
[0860] ΙΟ-Link Wireless standard might be interesting as well, as it is said to achieve a PER of 10A-9 and can support down to 5 ms cycle time . It has a limited scalabiiity, however, and is limited in communication range.
[0861] MulteFîre is LTE based technology which fully opérâtes in the unlicensed spectrum. The main goal of MulteFîre is to provide LTE-like performance with Wi-Fi-like ease of deployment in unlicensed spectrum. Compared to eLAA, the MulteFîre RA N was désignée! to hâve indépendant operation, in particular, MulteFîre performs ail the control signaling and data signaling in unlicensed spectrum. Today MulteFîre also includes eMTC-LI and NB-toT-U as Radio Access Technology (RAT) to support a wide range of applications from mobile broadband to machine type communication,
[0862] MulteFîre (MF) uses principles of carrier sélection, discontinuous transmission and listen before talk (LBT) that are based on 3GPP release 13 and 14 LAA. MulteFîre targets 5,0 GHZ global spectrum and utilizes the Release-13 LBT procedure with some additions. Compared io LTE protocol stack, MF is unique in UL, DL physical layer, DRS transmission, SIB-MF broadeasts and its content, RACH procedures and has additional S1, X2 information signaling.
[0863] MulteFîre 1.0 was further extended with additional features such as Grant Uplink Access, Wideband Coverage Extension (WCE), Autonomous Mobility (AUM), sXGP 1.9 GHZ support, eMTC-U and NB-ioT functionality. These features target more industrial deployments and support for machine type communications.
[0864] Grant Uplink Access further reduces UL control signaling overhead, which Works very well in low load scénarios. This feature is based on the 3GPP feature Autonomous UL as defined in 3GPP Release 15. The WCE feature aims to increase coverage with up to 8 dB compared to legacy MF MBB operations. Compared to licensed
152 spectrum, LBT and few measurements for RRM and RLF makes mobility very challenging, To address this, MF has specified AUM to deai with fast changing channel quaiity and handover, in which UE and potential eNBs can be pre-configured with handover related parameters. In particular, UEs may be configured with AUM related mobility assistance information for up to 8 AUM ceils. These cells are basically potential candidate target cells, which hâve been prepared with potential UE context. Parameters which are shared to the UE includes frequency and physical Cell ID (PCI) of the candidate target cells.
[0865] To support massive loT use cases, MF adapted the 3GPP Rel-13 eMTC technology based on 1.4 MHZ carrier bandwidth applied to the 2.4GHZ frequency band. However, in the 2.4GHZ frequency band, régulations are unique to USA, Europe, Japan and China. Among this, ETSÎ in Europe has strict ru les and to adhéré the régulations, frequency hopping mechanism was adopted. To enable eMTC-iike performance, a new time-frequency frame structure is defined which has two fixed time-periods, first timeperiod being anchor channel and second being a data channel dweil. The data channel usually contains UL/DL transmission which are preceded by LBT and it always starts with a DL transmission. The anchor channel always remains on the same channel, several anchor channels are defined out of which eNB can select one of them to transmit. Data channel dwells transmission using frequency hopping, it is done by splitting 82.5 MHZ into 56 channels, with spacing of 1.4 GHZ between hoping channels. Spécifications are currently being finaiized to further extend Rel-13 NB-loT support in unlicensed bands.
[0866] The IEEE 802.11 technology family, commonly referred to as Wi-Fi, is a popular technology to provide wireless Internet access in our homes. The industrial grade Wi-Fi solutions listed in the previous section are typicaîly modifications to the IEEE 802.11 Wi-Fi, Industrial grade Wi-Fi is usually based on IEEE 802.11 Wi-Fi certified chipsets, with primarily stripped-down MAC layer. in particular, the LBT mechanism in WiFi, albeit necessary for spectrum régulations, is often removed. The problem with the industrial grade Wi-Fi is interoperability as each industrial grade Wi-Fi is developed îndependently of the others. In contrast, ÎEEE 802.11 is a weli-known standard, and you can expect products from different vendors to operate well between each other. We will in this section briefly consider a few mechanisms: channel access (largely impacts latency), quaiity of service (impacts priorité s), and link adaptation (spectrum efficiency).
[0867] To understand the channel access of Wi-Fi, we must understand the background to some of the design principles in unlicensed bands. In unlicensed bands, as opposed to licensed bands, there is typicaîly no physical controlling entity. There are a set of spectrum rules, but anyone adhering to these rules hâve the same right and priorîty
153 to access the wireless medium. Therefore, a major design principle in uniicensed bands is the un coord inated, competition-based channei access. This is called CSMA/CA Carrier Sense Multiple Access with Collision Avoidance. The fondamental idea is that there is a random number associated with each channei access, the random number deciding a backoff time. For each failed channel access, this random number becomes larger. The resuit of this channel access is that round-trip latencies contain a random factor. When the wireless medium is to a large extent unused, the latency is very low, but when the wireless medium is very occupied, the latency can become very large. In industriai scénarios this uncertainty in latency is a concern. We show a typrcal channel access and data transmission in Figure 101 .The channel access in Wi-Fi is the main reason why guaranteed latency is not possible, and this is a feature necessary to comply with the régulations. The strength of celiular technologies is that they are designed for exclusive use of the spectrum, meanrng that guaranteed latency can be obtained.
[0868] In addition to the random backoff, there is in Wi-Fi an interframe spacing time (IFS). There are 3 main interframe spacing times: short IFS (SIFS), PCF (Point Coordination Function) IFS (PIFS), DCF (Distributed Coordination Function) IFS (DIFS), In summary, IFS < PCF < DIFS, where IFS are used for spécial response frames, i.e. ACK. PCF is used for certain priority frames, and DIFS for standard frames.
[0869] Wi-Fi has a quaiity of service (QoS) mechanism called Enhanced Distributed Channel Access (EDCA). EDCA is mainly based on adjusting the random backoff time when performing channei access, but it also introduces a new IFS, called arbitrafion IFS (AIFS). A higher priority will in average get priority access due to reduced backoff times. However, note that there is stiil randomness in each channei access, and no guarantees can be provided. There are 4 priority classes introduced in EDCA: voice, video, best effort, and background. An illustration of how the different priority classes may obtain channei access is shown in Figure 102. Note that each priority class has an individual IFS and that the random backoff is different.
[0870] The link adaptation in Wi-Fi is based on full data re-transmissions. If a packet fa ils to be decoded, the packet is sent again (possibly with another coding and modulation). Note that the data packets in Wi-Fi are self-contained, and if a packet fails ail information is typicaliy trashed. This is a main disadvantage compared to LTE or NR, where the soft information received during the initiai transmission is combined with the soft information received during the retransmission. The gain by soft combining is in the order of 3 - 6 dB, depending on if the retransmission is a répétition of the previous codsd bits (called Chase combining) or if additional parity bits are transmitted (called incrémental redundancy).
154
[0871] The coding and modulation chosen is typically selected by the Minstrel algorithm. The Minstrel algorithm works by keeping trial and error statistics over packets sent with different coding and modulations and attempts to maximize the throughput. The algorithm works well in static environments with iittle to no interférence but suffers when channel characteristics change fast. This results in that Minstrel is typically slow to adopt to an jmproved channel, as shown in Figure 103, which illustrâtes a simulation of the Minstrel algorithm in a single-link radio simulator.
[0872] Industrial services above the IP / Ethernet layer use a variety of protocols to accomplish the tasks at hand. The référencé introduces protocols such as Constraint Application Protocol (CoAP), Hypertext Transfer Protocol (HTTP) and HTTP/2, Message Queue Telemetry Transport (MQTT), Open Connectivity Foundation (OCF), Data Distribution Service (DDS) for real-time Systems, etc. In the following we give a short introduction to one of the main protocols in the industrial area that is OPC UA . Finally, we take a brief look at SECS/GEM used in the semiconductor industry.
[0873] As introduced above, usually an interworking between legacy industrial communication technologies is not possible. As a resuit, end customers and device manufacturera are faced with a multitude of technologies that need to be produced, run, diagnosed, maintained and kept in stock. While the availabiiity of products and services is îargely satisfactory, dealing with multiple solutions generates prohibitive costs and limits loT capabïlity. The OPC-UA (Open Piatform Communication-Unified Architecture) tries to address these problems. OPC-UA is the next génération of OPC technology. It should provide better security and a more complété information model than the original OPC, OPC Classic. OPC Classic is a well-established protocol for automation from (primarily) Microsoft. OPC-UA is said to be a very flexible and adaptable mechanism for moving data between ente rp ri se-type Systems and the kinds of Controls, monitoring devices and sensors that inféra et with reai-world data. OPC-UA is piatform indépendant and ensures the seamless flow of information among devices from multiple vendors. The OPC Foundation is responsible for the development and maintenance of this standard. Figure 104 illustrâtes the OPC-UA protocol stack.
[0874] For the use in TSN, the OPC-UA standard is adapted to be more deterministic and support certain TSN features. Figure 105 illustrâtes the use of OPC-UA over TSN. in general, a TSN network infrastructure is simuitaneously able to carry ail types of industrial traffic, from hard real-time to best effort, while maintaining the individual properties of each type. The OPC-UA TSN initiative uses a publisheG subscriber communication model and the use of OPC-UA without TCP/UDP/IP.
[0875] OPC-UA is also assumed to be used as a configuration-protocol in TSN.
155
[0876] Regarding the time line of OPC-UA and TSN; in Q4 2018 there was an announcement that most industrial automation suppiiers (incl. Siemens, Bosch, Cisco, A B B, Rockwell, B&R, TTTEch etc.) are supportîng the OPC UA including TSN down to field lever initiative. It is said that the work will be closely aligned to the work in IEC/IEEE 60802, which defines a common profile for TSN for industrial automation. It is currently planned to conclude the work in 60802 during 2021 which might be probably the same date to pubîish some final documents describing OPC-UA and TSN.
[0877] SEMI (previously known as Semiconductor Equipment and Materials International) standards define the SEMI Equipment Communications Standard ! Generic Equipment Model (SECS/GEM) that in tum provides a protocol interface for equipment to host data communications. SEMIs purpose is to serve the manufacturing supply chain for electronics production in semiconductor fabrication plants, aka, fabs.
[0878] SECS/GEM is an alternative to OPC UA used in the semiconductor industry. The spécification defined how equipment communicates with host in the factory.
[0879] Spécifie Applications to Industrial loT
[0880] Following are detailed discussions of several applications of the technology and techniques described above in the Industrial loT context. It will be appreciated, of course, that these applications are not limited to this context. Several different applications are described, including techniques for scheduling resources, handling timesensitive data streams in a 5G network, detecting System support for TSN, handling different timings from different networks, and data compression and décompression. Further, a few combinations of these techniques are described. it should be appreciated, however, that any of these techniques may be combined with any of the other techniques, as well, as with any one or more of the other techniques and technologies described above, to address the spécial needs of a factor or other industrial setting.
[0881] Scheduling Resources in the RAN
[0882] As discussed above, while 5G is based on wireless communications using Long-Term Evolution (LTE) and/or New Radio (NR) technologies, TSN is based on the IEEE 802.3 Ethernet standard, a wired communication standard that is designed for “best effort” quality of service (QoS). TSN describes a collection of features intended to make legacy Ethernet performance more deterministic, including time synchronisation, guaranteed low-latency transmissions, and improved reliability. The TSN features available today can be grouped into the following categories (shown belowwith associated IEEE spécifications);
• Time Synchronisation {e.g., IEEE 802,1 AS);
156 • Bounded Low Latency (e.g., IEEE 802.1Qav, IEEE 802.1Qbu, IEEE 802.1Qbv, IEEE 802.1Qch, IEEE 802.1Qcr);
• Ultra-Reliabiîity (e.g., IEEE 802.1 CB, IEEE 802.1Qca, IEEE 802.1Qci);
• Network Configuration and Management (e.g., IEEE 802.1Qat, IEEE 802.1Qcc, IEEE 802.1Qcp, IEEE 802.ICS).
[0883] The configuration and management of a TSN network can be implemented in different ways, as illustrated in Figures 106, 107, and 108. More specifically, Figures 106108 are block diagrams that respectively illustrate Distributed, Centralized, and Fully Centralized Time-Sensitive Networking (TSN) configuration modeis, as specified in IEEE Std. 802,1Qbv-2015. Within a TSN network, the communication endpoints are cailed “Talker” and Listener.” Ail the switches and/or bridges between a Talker and a Listener can support certain TSN features, such as IEEE 802.1 AS time synchronization. A “TSN domain” includes ail nodes that are synchronized in the network, and TSN communication is only possible within such a TSN domain.
[0884] The communication between Talker and Listener is in streams, Each stream is based on data rate and latency requirements of an application implemented at both Talker and Listener. The TSN configuration and management features are used to set up the stream and to guarantee the stream’s requirements across the network. In the distributed model from Figure 106, the Talker and Listener can, for example, use the Stream Réservation Protocol (S R P) to setup and configure a TSN stream in every switch along the path from Talker to Listener in the TSN network.
[0885] Nevertheless, some TSN features may require a central management entity cailed Centralized Network Configuration (CNC), as shown in Figure 107. The CNC can use, for example, Netconf and YANG modeis to configure the switches in the network for each TSN stream. This also facilitâtes the use of time-gated queueing (defined in IEEE 802.1Qbv) that enables data transport in a TSN network with deterministic latency. With time-gated queueing on each switch, queues are opened or closed according to a précisé scheduie thereby allowing high-priority packets to pass through with minimum latency and jitter. Of course, packets may arrive at a switch ingress port before the gâte is scheduled to be open. The fully centralized mode! shown in Figure 108 also includes a Centralized User Configuration (CUC) entity used as a point of contact for Listener and Talker. The CUC collects stream requirements and endpoint capabilities from the devices and communicates with the CNC directly. Further details about TSN configuration are giveninlEEE 802.1Qcc.
[0886] Figure 109 shows a sequence diagram of an exemplary TSN stream configuration procedure based on the fully centralized configuration model shown in
157
Figure 108. The numbered operations shown in Figure 109 correspond to the description below. Even so, the numerical labels are used for illustration rather than to specify an orderforthe operations. In other words, the operations shown in Figure 109 can be performed in different orders and can be combined and/or divided into other operations than shown in the figure.
CUC can receive input from, e.g., an industrial application and/or engineenng tooi (e.g., a programmable logic control, P LC) that spécifiés devices and/or end stations to exchange time-sensitive streams.
CUC reads the capabilities of end stations and applications in the TSN network, including a period/interval of user traffrc and payload sizes.
Based on this above information CUC créâtes StreamID as an identifierfor each TSN stream, a StreamRank, and UsertoNetwork Requirements. In the TSN network, the StreamID is used to unîqueîy identify stream configurations and to assign TSN resourcesto a useris stream. The StreamID consists of the two tuples: 1) MacAddress associated with the TSN Talker; and 2) UniquelD to distinguish between multiple streams within end stations identified by MacAddress.
CNC discovers the physica! network topology using for example Link Layer Discovery Protocol (LLDP) and any network management protocol.
CNC uses a network management protocol to read TSN capabilities of bridges (e.g., IEEE 802.1Q, 802.1AS, 802.1CB) in the TSN network.
CUC initiâtes join requests to configure network resources at the bridges for a TSN stream from one Talker to one Listener.
Talker and Listener groups (group of éléments specifying a TSN stream) are created by CUC, as specified in IEEE 802.1Qcc, 46.2.2). CNC configures the TSN domain, and checks physical topology and if the time sensitive streams are supported by bridges in the network. CNC also performs path and schedule computation of streams.
CNC configures TSN features in bridges along the computed path in the (e.g., configuration of the transmission schedule, as expiaïned further below).
CNC returns status (success or failure) for resulting resource assignment for streams to CUC.
CUC further configures end stations to start the user plane (UP) traffic exchange as defined initially between Listener and Talker.
[0887] In the distributed configuration model as illustrated in Figure 106, there is no CUC and no CNC. The Talker is therefore responsible for initiation of a TSN stream.
158
Since no CNC is présent, the bridges configure themselves, which does not allow use of time-gated queuing mentioned above. In contrast, in the centralized model shown in Figure 107, the Talker is responsible for stream initialization but the bridges are configured by CNC.
[0888] 3GPP-standardized 5G networks are one solution for connecting wireless devices and/or end stations to an 802.1 TSN network. In general, the 5G network architecture consists of a Next Génération radio access network (NG-RAN) and a 5G core network (5GC). The NG-RAN can comprise a set of gNodeB’s (g N B s, also referred to as base stations) connected to the 5GC via one or more NG interfaces, whereas the gNBs can be connected to each other via one or more Xn interfaces. Each of the gNBs can support frequency division duplexing (FDD), time division duplexing (TDD), or a combination thereof. Devices - also referred to as user equîpment (UE) - communicaîe wirelessly with the 5G network via the gNBs.
[0889] Figure 110 is a block diagram illustrating an exemplary division of the 5G network architecture into controi plane (CP) and data or user plane (UP) functionality. For example, a UE can communicate data packets to a device and/or application on an extemal network (e.g., the Internet) by sending them via a serving gNB to a user plane function (U P F), which provides an interface from the 5G network to other extemal networks. CP functionality can operate cooperative ly with the U P functionality and can include various fonctions shown in Figure 110, including an access management function (AMF) and a session management fonction (SMF).
[0890] Even so, there are several challenges and/or issues needing to be solved for the proper interworking of 5G and TSN networks. In particular, there are several challenges related to configuring a 5G network to handle data communications to/from an extemal network (e.g., a TSN network) that are subject to a time-critical schedule determined by the extemal network rather than the 5G network.
[0891] Figure 111 is a block diagram illustrating an exemplary arrangement for interworking between the 5G network architecture shown in Figure 110 and an exemplary folly centralized TSN network architecture. In the following discussion, a device connected to the 5G network is referred to as 5G endpoint, and a device connected to the TSN domain is referred to as TSN endpoint. The arrangement shown in Figure 111 includes a Talker TSN endpoint and a Lisiener 5G endpoint connected to a UE. In other arrangements, a UE can instead be connected to a TSN network comprising at least one TSN bridge and at least one TSN endpoint. Sn this configuration, the UE can be part of a TSN-5G gateway.
159
[0892] Both 5G and TSN networks utiiize spécifie procedures for network management and configuration, and spécifie mechanisms to achieve deterministic performance. To facilitate end-to-end deterministic networking for industrial networks, these different procedures and mechanisms mustwork together cooperatively.
[0893] As described in IEEE 802.1Qbv-2015, TSN provides spécifie time-aware traffic scheduling to facilitate deterministic low latency for industrial application, where cycle time is known in advance. This traffic scheduling is based on time-aware gates that enable transmissions from each queue according to a predefined time scale. Figure 112 is a block diagram iîlustrating gate-based transmission sélection among traffic queues based on gates, as specified in IEEE Std. 802.1Qbv-2015. Fora given queue, the transmission gates can be in two States: open ordosed.
[0894] Furthermore, each transmission gâte relates to a traffic class associated with a spécifie queue, with potentiaily multiple queues associated with a given port. At any instance of time, a gâte can be either tumed on or off. This mechanism is time-aware and 15 can be based on, e.g., a PTP application within a TSN bridge or a TSN end station. This mechanism allows execution of a gaie control list to be precisely coordinated across the network, facîlitatîng tightly-scheduled transmissions for a given class of traffic. Herein, a transmission schedule can be defined as a schedule that indicates when transmissions are to occur in time. Also, a time-critical transmission schedule can be defined as a schedule that indicates when transmissions of a Time-Sensitive Network (TSN) are to occur in time.
[0895] As described above in relation to Figure 109, the information about TSN stream scheduîes are is calculated by a CNC- entity in the fully-centralized TSN model, based on the userto network requirements (e.g., IEEE 802.1Qcc § 46.2.3.6 of) provided 25 by Talker and/or Listener (and/or via the CUC entity). In addition, standard management objects (e.g., defined in IEEE 802.1 Qvc) and a remote network management protocol are used by the CNC to configure transmission schedules on TSN bridges (operation 8 in Figure 109).
[0896] Nevertheless, these features are spécifie to TSN networks and do not take 30 into account interworking 5G network architecture, such as illustrated in Figure 111. For example, 5G networks do not provide any mechanism for éléments (e.g., UEs, gNBs, etc.) to take into account time-critical transmission schedules established by extemal networks (e.g., TSN networks) when scheduling transmissions over the wireless interface between UE and gNB. For ex.ample, even if such a time-critical transmission schedule is 35 known to a UE (e.g., connected to a TSN endpoint), there is no mechanism for the UE to
160 inform the gNB of such a schedule. Furthermore, there is no mechanism that enabies the gNB or UE to understand and process scheduling requests, coming from the 5G network. [0897] Exemplary embodiments of the présent disclosure address these and other probiems and/or shortcomîngs of prior solutions by providing novel techniques for predefined time scheduling for spécifie users and/or QoS flows based on time-aware transmission schedules (e.g., from extemal networks) to meet spécifie bounded latency requirements. For example, these techniques can provide mechanisms for a UE (or network node, e.g., gNB) to be informed of such a transmission time schedule and to inform the network node (or UE) of the schedule. In this manner, such novel techniques can provide various benefits including cooperative interworking between cellular (e.g., 5G) and TSN networks that utilize different schedulers and/or scheduling mechanisms, thereby facilitating bounded latency of time-criticaî transmissions between Talker/Listenêr end points via 5G networks.
[0898] Figure 113 is a block diagram illustrating an exemplary communication scénario between two TSN talker/listenerunits via 5G and TSN networks, according to some exemplary embodiments of the présent disclosure. In this scénario, a UE is connected to a TSN talker/lrstener, which in tum can be connected to plant equipment (e.g., a robot control) that is required to run an application according to a predefined cycle time. One challenge in this scénario is to facilitate timely transmission of the TSN stream packets from the gNB to the UE, according to the bounded latencies required by the equipment and/or application.
[0899] Figure 114 shows a sequence diagram of an exemplary method and/or procedure for configuring timely transmission of TSN stream packets via the network configuration shown in Figure 113, according to these exemplary embodiments. The numbered operations shown in Figure 114 correspond to the description below. Even so, the numerical labels are used for illustration rather than to specify an order for the operations. In other words, the operations shown in Figure 114 can be performed in different orders and can be combined and/or divided into other operations than shown in the figure.
[0900] In operation 11, the CUC sends to the CNC a join request for a user to join the TSN network. For example, this request can be based on and/or in response to a programmable logic control (PLC) application requesting to schedule a TSN stream between a sensor (Talker) and a PLC controller (Listener), In operation 12, the CNC computes a transmission schedule based on the spécifie requirements of the TSN stream identified în operation 11,
161
[0901] In operation 13, the CNC configures managed objects of TSN switches that are in the path between the sensor and PLC controlier. Exemplary managed object to be configured forenhanced time-aware scheduling are described in IEEE 802.1Qbv-2015 § 12. In exemplary embodiments, the CNC treats the 5G network as a TSN switch in the path, and therefore requests the 5G core network (5GC) to configure resources for this TSN stream. For example, this can be done by the CNC sending to an access management function (AMF, see Figures 110-111) the cycle times and gâte control lists for traffic classes within the TSN stream.
[0902] In operation 14, the receiving entity (e.g., AMF) in the 5GC can translate the requested TSN stream requirements (e.g., cycle time, gâte control list, etc.) to QoS requirements for the UE that is connected to the TSN Talker/Listener (e.g., sensor). In addition, the AMF can translate the requested TSN stream requirements into a time window and periodicity for the gNB(s) to which the UE will transmit and/or receive this TSN stream,
[0903] In some embodiments, operation 14 can involve various sub-operaiions. For example, the UE and a PDU session corresponding to the TSN stream can be identified, and a mapping between traffic classes within this TSN stream and QoS flows of the UE can be identified. For each QoS flow (which can correspond to one or multiple traffic classes), a certain QoS requirement can be indicated to the gNB. In some embodiments, this indication to the gNB can include an indicatorof a time-window during which a packet of the QoS flow should be guaranteed to be transmitted. This time window can be indicated, e.g., by providing an absolute time reference for the time window start together with a length of the window (e.g., as a latency bound). For example, the absolute time reference can be indicated as an offset to a certain absolute reference time such gNB subframe (SFN) timing or a universal time coordinate (UTC), such as provided by a global navigation satellite System (GNSS, e.g., GPS), in some embodiments, the indication to the gNB can also include a periodicity (or period) of the time window, This can be included, e.g., if the TSN stream comprises multiple transmission events that occur according to a periodic schedule.
[0904] By indicating this time-window information per QoS flow of the UE, multiple traffic classes of a TSN stream or multiple TSN streams can be independently served. In other words, this information facilitâtes the affecied gNB(s) to reserve radio resources for each of the QoS flows during the respective time Windows associated with those QoS flows. For example, finis can facilitais the gNB(s) to map the various QoS flows to different radio bearers and to apply the resource allocation/reservation per radio bearer.
162
Herein, a radio bearertakes the usual définition from the 3rd Génération Partnership Project (3GPP).
[0905] în operation 14, after determining the information as discussed above, the AMF sends an indication and/or request the gNB(s) to confirm that the QoS, time window, 5 and/or periodicity requirements can be met. In operation 15, after receiving the request/indication sent in operation 14, the gNB(or gNBs, as the case may be) détermines whether it can serve this additiona! QoS flow with the indicated time-window requîrement. For example, in making this détermination, the gNB can consider resources used for current and estimated traffic load, capabilities of the UE (e.g., spectral efficiency, 10 supported transmission/reception modes, etc.), channei quality between the RAN and the
UE, and whether (and/or how many) additions! guaranteed resources need to be allocated for the UE. After making this détermination, the gNB responds to the 5GC function (e.g., AMF) by acceptîng the request (“yes”) or deciining the request (“no). In some embodiments, when deciining the request, the gNB can indicate an alternative time 15 window (e.g., by an offset to the requested time window) during which the gNB could accept a corresponding request. !n situations where the gNB accepts the request, the gNB can also reserve any additional resources identîfied as required to meet the requested transmission schedule.
[0906] In operation 16, after receiving the response from the gNB(s), the 5GC function may then translate this response - which is based on per QoS flow mapping - to a traffic flow/TSN stream level of granularity, and provides a response to the TSN CNC. The response may be in a format that can be decoded by the TSN CNC. In operation 17, after receiving this response, the CNC provides to the CUC a corresponding response to the join request received in operation 11. In operation 18, after receiving the join response from the CNC, the CUC further configures ail Talker and Listenerend station associated with the original request. In some embodiments, the CUC can also request the 5GC to initiale a connection to the UE, whereas in other embodiments, the 5GC or it might use a default and/or already-existing PDU session.
[0907] Figure 115 is a block diagram illustrating another exemplary communication 30 scénario between a TSN talker/listener unit and a virtualized contrôler via a 5G network, according to other exemplary embodiments of the présent disclosure. in this scénario, a TSN network is connected to UE, which acis a gateway to connect a Taiker/Listener end station over a wireless link to the 5G network. One challenge in this scénario is to facilrtate timely transmission of the TSN stream packets from the UE to the gNB, according to the bounded latencies required by the schedule computed by a CNC in the TSN network.
163
[0908] Figure 116 shows a sequence diagram of an exemplary method and/or procedure for configuring timely delivery of TSN stream packets via the network configuration shown in Figure 115, according to these exemplary embodiments. The numbered operations shown in Figure 116 correspond to the description below. Even so, the numerical labels are used for illustration rather than to specify an orderfor the operations. In other words, the operations shown in Figure 116 can be performed in different orders and can be combined and/or divided into other operations than shown in the figure.
[0909] In operation 21, the CNC calculâtes the transmission scheduîe based on the requirements provided by CUC and sends it to the TSN interface of the 5G network, which is in this case the UE. In operation 22, the UE créâtes and sends a message requesting uplink (UL) radio resources according to the transmission scheduîe provided by the CNC, which can be included in the message. For example, the UE can send the message to the AMF in the 5GC. In operation 23, after receîving this message, the AMF retrieves the UE profile from a user data management (UDM) function in the 5GC and, based on this information, determines to which gNB(s) the UE is connected. In operation 24, the AMF sends a request to the gNB(s) to enable the TSN QoS feature towards the UE based on the transmission scheduîe, which can be included in the request. In some embodiments, the AMF can also send a modified time reference to the other Talker/Listener (e.g., a virtualized control 1er) connected to the 5G network (operation 24a).
[0910] In operation 25, the receiving gNB(s) can perform operations substantially similar to those described above with reference to operation 15 of Figure 114, but with respect to the uplink rather than the downlink. After receiving the response from the gNB(s) sent in operation 25, the AMF can respond (operation 26) to the request for resources received from the UE in operation 22. Similar to operation 16 shown in Figure 114, the AMF can translate the gNB response - which is based on per QoS flow mapping - to a traffic flow/TSN stream level of granularity and provides a response in this format to the UE. In operation 27, the UE can forward this information to the CNC, in response to the requested transmission scheduîe received in operation 21. As discussed above in relation to certain embodiments illustrated by Figure 114, if gNB déclinés the requested transmission scheduîe but offers an aiternate time window that it can accepi, the responses sent in operations 15-17 of Figure 114 and operations 25-27 of Figure 116 can include such an aiternate time window, formatted and/or translated according to the protocols and/or requirements of the respective récipients.
164
[0911 ] As can be understood from the above description, these and other exempiary embodiments faciiitate time-aware scheduling of transmissions in a cellular network (e.g., a 5G network) according to the time-sensitive (e.g., bounded latency) requirements of an extemal network, such as a TSN network. The exempiary embodiments faciiitate such features through novel techniques for collecting (either via the UE or a network function such as an AMF) information about timing and periodîcity associated with traffic provided an extemal network and forwarding such information to one or more base stations (e.g., gNBs) in the cellular network. In such case, the base station(s) can détermine whether the external time-sensitive requirements of the requested traffic can be supported and, if so, utilize such information for scheduling uplink or downlink transmissions between the UE and the base station(s).
[0912] Figure 117 is a flow diagram iliustrating an exempiary method and/or procedure for scheduling resources in a radio access network (RAN) according to a transmission schedule associated with an external network, according to various exempiary embodiments of the présent disclosure. The exempiary method and/or procedure shown in Figure 117 can be implemented in a core network (e.g.. 5GC) associated with the RAN (e.g., NG-RAN), such as by a core network node (e.g., AMF) shown in, or described in relation to, other figures herein. Furthermore, as explained below, the exempiary method and/or procedure shown in Figure 117 can be utilized cooperatively with the exempiary method and/or procedures shown in Figures 118 and/or 119 (described below), to provide various exempiary benefits described herein. Although Figure 117 shows blocks in a particular order, thisorder is merely exempiary, and the operations of the exempiary method and/or procedure can be performed in a different order than shown in Figure 117 and can be combined and/or divided into blocks having different functianality. Optional operations are represented by dashed fines.
[0913] The exempiary method and/or procedure illustrated in Figure 117 can include the operations of block 1210, in which the network node can receive, from the extemal network, a transmission schedule associated with a time-sensitive data stream, Herein, a time-sensitive data stream can be a data stream of a Time-Sensitive Network (TSN). Thus, in some embodiments, the external network comprises a Time-Sensitive Network (TSN) such as described in the IEEE standards discussed herein. In such embodiments. the data stream can comprise a TSN stream, e.g., associated with a Talker and/or Listener end station in the TSN. In such embodiments, the transmission schedule can comprise cycle times and gâte control lists for one or more traffic classes comprising the TSN stream.
165
[0914] The exemplary method and/or procedure can also include the operations of block 1220, in which the network node can send, to the RAN, a request to aliocate radio resources for communication of the data stream between the RAN and a user equipment (UE), wherein the request further comprises information related to the transmission schedule. In some embodiments, the information reiated to the transmission schedule includes one or more of the following: an identifier of the UE; identifiers of one or more quality-of-service (QoS) flows associated with the data stream; and a QoS requirement associated with each of the QoS flows, !n some embodiments, each QoS requirement can comprise one or more time Windows during which the data stream is required to be transmitted. In some embodiments, each QoS requirement comprises an initial time window and a periodicity that identifies subséquent time Windows.
[0915] The exemplary method and/or procedure can also include the operations of block 1230, in which the network node can recerve, from the RAN, a response indicating whether radio resources can be allocated to meet the transmission schedule associated with the data stream. In some embodiments, according to sub-block 1235, if the response indicates that radio resources cannot be allocated to meet the transmission schedule of the data stream, the response further comprises an indication of one or more further time Windows during which radio resources can be allocated, [0916] In some embodiments, the response can indicate whether the QoS requirement associated with each of the QoS flows can be met. In such embodiments, the exemplary method and/or procedure can also include the operations of block 1240, in which the network node can détermine whether the transmission schedule can be met based on the indication of whether the QoS requirement associated with each of the QoS flows can be met. In some embodiments, the exemplary method and/or procedure can aîso include the operations of block 1250, in which the network node can send, to the extemal network, an indication of whether the transmission schedule can be met.
[0917] In some embodiments, the method can be performed by an access management function (AMF) in a 5G core network (5GC). In some embodiments, the transmission schedule can be received from the externaî network] and the radio resources are for downlink communication from the RAN to the UE. In some embodiments, the transmission schedule is received from the UE; and the radio resources are for uplink communication from the UE to the RAN,
[0918] Figure 118 is a flow diagram illustrating an exemplary method and/or procedure for scheduling resources in a radio access network (RAN) according to a transmission schedule associated with an extemal network, according to various exemplary embodiments of the présent disclosure. The exemplary method and/or
166 procedure shown in Figure 118 can be implemented in a RAN (e.g., NG-RAN) associated with a core network (e.g., 5GC), such as by a RAN node (e.g., gNB) shown in, or described in relation to, other figures herein. Furthermore, as explained below, the exemplary method and/or procedure shown in Figure 118 can be utilized coopérait vely with the exemplary method and/or procedures shown in Figures 117 and/or 119 (described above and below), to provide various exemplary benefiis described herein. Although Figure 118 shows blocks in a particular order, this order is merely exemplary, and the operations of the exemplary method and/or procedure can be performed in a different order than shown in Figure 118 and can be combined and/or divided into blocks having different functionality. Optional operations are represented by dashed lines.
[0919] The exemplary method and/or procedure illustraied in Figure 118 can include the operations of block 1310, in which the network node can receive, from the core network, a request to allocate radio resources between the RAN and a user equipment (UE) for communication of a time-sensitive data stream, whereîn the request further comprises information related to a transmission schedule associated with the data stream. In some embodiments, the external network comprises a Time-Sensitive Network (TSN); and the data stream comprises a TSN stream.
[0920] In some embodiments, the information related to the transmission schedule indu des one or more of the following: an identifier of the UE, identifiers of one or more quaiity-of-service (QoS) flows associated with the data stream; and a QoS requirement associated with each of the QoS flows. in some embodiments, each QoS requirement can comprise one or more time Windows during which the data stream is required to be transmitted. In some embodiments, each QoS requirement comprises an initiai time window and a periodicity that identifies subséquent time Windows.
[0921] The exemplary method and/or procedure illustrated in Figure 118 can also include the operations of block 1320, in which the network node can, based on the information related to the transmission schedule, détermine whether radio resources can be ailocated to meet the transmission schedule. In some embodiments, determining whether radio resources can be ailocated to meet the transmission schedule can be further based on one or more of the following: resources needed for current or estimated traffic load, capabilities of the UE, channel quahty between the RAN and the UE, and need for additional guaranîeed resources to be ailocated for the UE.
[0922] In some embodiments, if it is determined in block 1320 that radio resources cannot be ailocated to meet the transmission schedule associated with the data stream, the exemplary method and/or procedure includes the operations of block 1330, where the network node can détermine one or more further time Windows during which radio
167 resources can be allocated. In some embodiments, if it is determined in block 1320 that radio resources can be allocated to meet the transmission schedule associated with the data stream, the exemplary method and/or procedure includes the operations of block 1340, where the network node can map the one or more QoS flows to at least one radio bearer between the RAN and the UE, and reserve transmission resources for the at least one radio bearer.
[0923] The exemplary method and/or procedure also includes the operations of block 1350, in which the network node can send, to the core network, a response indicating whether the radio resources can be allocated to meet the transmission schedule. In some embodiments, if it is determined in block 1320 that radio resources cannot be allocated to meet the transmission schedule, the response sent in block 1350 can aise include an indication of the one or more further time Windows determined in optional subblock 1330, This is iilustrated by optional subblock 1355.
[0924] Figure 119 is a flow diagram illustrating an exemplary method and/or
1S procedure for scheduling resources in a radio access network (RAN) according to a transmission schedule associated with an external network, according to various exemplary embodiments of the présent disclosure, The exemplary method and/or procedure shown in Figure 119 can be implemented, for example, by a user equipment (UE, e.g., wireless device, loT device, M2M device, etc.) in communication with a RAN (e.g., NG-RAN) that is associated with a core network (e.g., 5GC), such as shown in, or described in relation to, other figures herein. Furthermore, as explained below, the exemplary method and/or procedure shown in Figure 119 can be utilized cooperatively with the exemplary method and/or procedures shown in Figures 117 and/or 118 (described above), to provide various exemplary benefits described herein. Although
Figure 119 shows blocks in a particular order, this order is merely exemplary, and the operations of the exemplary method and/or procedure can be performed in a different order than shown in Figure 119 and can be combined and/or divided into blocks having different functionality. Optional operations are represented by dashed lines.
[0925] The exemplary method and/or procedure iilustrated in Figure 119 can include 30 the operations of block 1410, in which the UE can receive, from the external network, a transmission schedule associated with a time-sensitive data stream. In some embodiments, the external network comprises a Time-Sensitive Network (TSN) such as described in the IEEE standards discussed herein. In such embodiments, the data stream esn comprise a TSN stream, e.g., associated with a Talker and/or Listenerend station in the TSN. In such embodiments, the transmission schedule can comprise cycle times and gaie control lists for one or more traffic classes comprising the TSN stream.
168
[0926] The exemplary method and/or procedure can also include the operations of block 1420, in which the UE can send, to a core network associated with the RAN, a request to allocate radio resources for communication of the data stream between the UE and the RAN, wherein the request further comprises information related to the transmission schedule. In some embodiments, the information related to the transmission schedule comprises the transmission schedule,
[0927] The exemplary method and/or procedure can also include the operations of block 1430, in which the UE can receive, from the core network, a response indicating whether radio resources can be allocated to meet the transmission schedule associated with the data stream. in some embodiments, if the response from the core network indicates that radio resources cannot be allocated to meet the transmission schedule of the data stream, the response further comprises an indication of one or more further time Windows during which radio resources can be allocated. This is illustrated by optional subblock 1435. In some embodiments, the request (block 1420) can be sent to, and the response (block 1430) can be received from, an access management fonction (AMF) in a 5GC.
[0928] In some embodiments, the exemplary method and/or procedure can also include the operations of block 1440, in which the UE can send, to the extemal network, an indication of whether the transmission schedule can be met. In some embodiments, if the response received in block 1430 comprises an indication of one or more further time Windows during which radio resources can be allocated (subblock 1435), the indication sent to the external network further includes information related to the one or more further time Windows. This is illustrated by optional subblock 1445.
[0929] Figure 120 illustrâtes one example of a cellular communications System and/or network, comprising various devices and/or Systems usable to implement any of the exemplary methods described herein. In the embodiments described herein, the cellular communications network 1500 is a 5G NR network. In this example, the cellular communications network 1500 includes base stations 1502-1 and 1502-2, which in LTE are referred to as eNBs and in 5G NR are referred to as gNBs, controliing corresponding macro cells 1504-1 and 1504-2. The base stations 1502-1 and 1502-2 are generally referred to herein coîlectively as base stations 1502 and individually as base station 1502. Likewise, the macro cells 1504-1 and 1504-2 are generally referred to herein collectîveiy as macro cells 1504 and individually as macro cell 1504.
[0530] The cellular communications network 1500 can also include some number of low power nodes 1506-1 through 1506-4 that control corresponding small cells 1508-1 through 1508-4. The low power nodes 1506-1 through 1506-4 can be small base stations
169 (such as pico or femto base stations), Remote Radio Heads (RRHs), or the like. Notably, while not illustrated, one or more of the smail cells 1508-1 through 1508-4 may alternative^ be provided by the base stations 1502. The low power nodes 1508-1 through 1506-4 are generally referred to herein collectively as low power nodes 1506 and individually as low power node 1506. Likewise, the small cells 1508-1 through 1508-4 are generally referred to herein collectively as small cells 1508 and individually as smail cell 1508. The base stations 1502 (and optionally the low power nodes 1506) are connected to a core network 6150,
[0931] The base stations 1502 and the low power nodes 1506 provide service to wireless devices 1512-1 through 1512-5 in the corresponding cells 1504 and 1508. The wireless devices 1512-1 through 1512-5 are generally referred to herein collectively as wireless devices 1512 and individually as wireless device 1512. The wireless devices 1512 are also sometîmes referred to herein as UEs. Wireless devices 1512 can take on varions forms, including those compatible with MTC and/or NB-loT.
[0932] Figure 121 is a schematic block diagram of a radio access node 2200 according to some embodiments of the présent disclosure. The radio access node 2200 may be, for example, a base station (e.g., gNB oreNB) described herein in relation to one or more other figures. As illustrated, the radio access node 2200 includes a controi system 2202 that further includes one or more processors 2204 (e.g., Central Processing Units (CPUs), Application Spécifie Integrated Circuits (ASICs), Field Programmable Gaie Arrays (FPGAs), and/or the like), memory 2206, and a network interface 2208. In addition, the radio access node 2200 includes one or more radio units 2210 that each includes one or more transmitters 2212 and one or more receivers 2214 coupled to one or more antennas 2216. In some embodiments, the radio unit(s) 2210 is extemal to the controi system 2202 and connected to the controi system 2202 via, e.g., a wired connection (e.g., an optical cable). However, in some other embodiments, the radio unit(s) 2210 and potentially the antenna(s) 2216 are integrated together with the controi system 2202. The one or more processors 2204 operate to provide one or more fonctions of a radio access node 2200 as described herein. In some embodiments, the function(s) are implemented in software that is stored, e.g., in the memory 2206 and executed by the one or more processors 2204.
[0933] Figure 122 is a schematic block diagram that illustrâtes a virtuaiized embodiment of the radio access node 2200 according to some embodiments of the présent disclosure. This discussion is equally applicable to other types of network nodes. Further, other types of network nodes may hâve similar virtuaiized architectures.
170
[0934] As used herein. a “virtualized” radio access node is an implémentation of the radio access node 2200 in which at least a portion of the functionality of node 2200 is implemented as a Virtual component(s) (e.g., via a virtuai machine(s) executing on a physical processing ncdefs) in a network(s)). As iliustrated, in this exampie, the radio
S access node 2200 inciudes the control System 2202 thaï inciudes the one or more processors 2204 (e.g., CPUs, ASICs, FPGAs, and/or the like), the memory 2206, and the network interface 2208 and the one or more radio units 2210 that each inciudes the one or more transmitters 2212 and frie one or more receivers 2214 coupled to the one or more antennas 2223, as described above. The control System 2202 is connected to the radio unit(s) 2210 via, for example, an optîcai cable or the like. The control System 2202 can be connected to one or more processing nodes 2300 coupled to or included as part of a network(s) 2302 via the network interface 2308. Each processing node 2300 can include one or more processors 2310 (e.g., CPUs, ASiCs, FPGAs, and/or the like), memory 2306, and a network interface 2308.
[0935] In this exampie, fonctions 2310 of the radio access node 2200 described herein are implemented at the one or more processing nodes 2300 or distributed across the control System 2202 and ihe one or more processing nodes 2300 in any desired manner. In some particuiar embodiments, some or ali of the fonctions 2310 of the radio access node 2200 described herein are implemented as virtuai components executed by one or more virtuai machines implemented in a virtuai environment(s) hosted by the processing node(s) 2300. As will be appreciated by one of ordinary skill in the art, additional signaling or communication between the processing node(s) 2300 and the control System 2202 is used in oraër to carry out at least some of the de si red fonctions 2310. Notably, in some embodiments, the control System 2202 may not be included, in which case the radio unit(s) 2210 communicate directiy with the processing node(s) 2300 via an appropriate network interface(s).
[0936] In some embodiments, a computer program inciuding instructions which, when executed by at least one processor, causes the at least one processor to carry out the functionality of radio access node 2200 or a node (e.g., a processing node 2300) 30 implementing one or more of the fonctions 2310 of the radio access node 2200 in a
Virtual environment according to any of the embodiments described herein is provided. in some embodiments, a carrier comprising the aforementioned computer program product is provided. The carrier is one of an electronic signal, an opiical signal, a radio signal, or a computer readabte storage medium (e.g., a non-transitory computer readabie medium 35 such as memory).
171
[0937] Figure 122 is a schematic block diagram of the radio access node 2200 according to some other embodiments of the présent disclosure. The radio access node 2200 includes one or more modules 2400, each of which is implemented in software. The module(s) 2400 provide the functionality of the radio access node 2200 described herein.
s This discussion is equally applicable to the processing node 2300 of Figure 123, where the modules 2400 may be implemented and/or distributed across one or more processing nodes 2300 and/or control System 2202, [0938] Figure 124 is a schematic block diagram of a UE 2500 according to some embodiments of the présent disclosure. As illustrated, the UE 2500 includes one or more processors 2502 (e.g., CPUs, ASICs, FPGAs, and/or the like), memory 2504, and one or more transceivers 2506 each including one or more transmitters 2508 and one or more receivers 2510 coupied to one or more antennas 2512. In some embodiments, the functionality of the UE 2500 described above may be fuily or partially implemented in software that is, e.g., stored in the memory 2504 and executed by the processor(s) 2502.
[0939] In some embodiments, a computer program including instructions which, when executed by at least one processor, causes the at least one processor to carry out the functionality of the UE 2500 according to any of the embodiments described herein is provided. In some embodiments, a carrier comprising the aforementioned computer program product can be provided. The carrier can be one of an electronic signai, an optical signal, a radio signal, or a computer readable storage medium (e.g., a nontransitory computer readable medium such as a physical memory).
[0940] Figure 125 is a schematic block diagram of the UE 2500 according to some other embodiments of the présent disclosure. In these embodiments, UE 2500 can include one or more modules 2600, each of which is implemented in software. Module(s) 25 2600 can provide at least a portion of the functionality of UE 2500 described hereinabove.
[0941] Transport of Data Flows over Cellular Networks
[0942] Figure 126 illustrâtes the architecture of a 5G network and introduces relevant core network fonctions like the User Plane Function (UPF).
[0943] In NR PDCP, header compression is used. The protocol is based on the
Robust Header Compression (ROHC) framework defined in IETF RFC 5795: The Robust Header Compression (RoHC) Framework.” The basrc idea is to utilize the redundancy in protocol headers of new packets, i.e., use the fact that they are simiiar or the same as previously received packets. Therefore, subséquent packets do not need to include the full protocol header information since it is already known from previously received packets. A compression/decompression context is maintained to keep track of
172 that information. Severa! different RoHC profiles with different header compression algoriihms/vanants exist and are defined/referred to in the NR PDCP spécification. [0944] The UE undergoes a handover procedure when it changes its primary cell. The source and target cell may be belonging to different gNBs. Focusing on the user plane protocol stack invotved in this procedure: the UE resets MAC with HARQ processes, as well as re-establishes (flushes) the RLC entities. The PDCP protocol serves as the handover anchor, meaning that PDCP will in acknowledged mode do retransmissions of not yet acknowledged data, that might hâve been lost due to MAC/HARQ and RLC flushing at handover.
[0945] In dual connectivity, beside handover, a radio bearer might be changed from MCG type to/from SCG type or to/from Spht type. This can be realized with the handover procedure including PDCP re-establishment, or aiîêrnativëly with the PDCP data recovery procedure.
[0946] Support for Ethernet PDU sessions over 5G networks was introduced in 3GPP TS 23.501 and TS 23.502 (see, for example, versions 15.2.0 of both those spécifications),
[0947] Figure 127 shows the protocol stack for Ethernet PDU type data (user plane) as defined in release 15 of 3GPP TS 29.561, “Interworking between 5G Network and External Data Networks; Stage 3”. External data networks may include, for example, Ethernet LANs, Key characteristics for such interworking with external Data Networks (DNs) include:
• UPF shall store MAC addresses received from the DN or the UE; the 5G network does not assign MAC addresses io UEs • Ethernet preamble, Start Frame Délimiter (SFD) and Frame Check Sequence (FCS) are not sent over 5GS • The SMF provides Ethernet filter set and forwarding rules to the UPF based on the Ethernet Frame Structure and UE MAC addresses • Durtng PDU session establishment a DN-AAA (Data Network - Authentication, Authorization and Accounting) server can provide a Jist of MAC addresses alîowed for this particular PDU session (see release 15 of 3GPP TS 29.561).
• IP layer is considered as an application layer which is not part of the Ethernet PDU Session (see release 15 of 3GPP TS 29.561)
[0948] Time Sensitive Networking (TSN) is a set of features that allow deterministic networking in Ethernet based wired communication networks. Within a TSN network the communication endpoints are called Talkerand Listener. AI! the switches (e.g., bridges) in between Talker and Listener need to support certain TSN features, like e.g. IEEE
173
802.1AS time synchronization. AH nodes that are synchronized in the network belong to a so-calied TSN domain. TSN communication is only possible within such a TSN domain. To âilow for deterministic communication, TSN communication happens in streams, that are setup across the TSN domain before the data communication takes place. In the TSN network, there are different possibiiities as to how frames are identified and mapped to a TSN stream, as defined in IEEE 802.1CB. The identification might be based on MAC addresses and VLAN-headers and/or IP headers. But as the TSN standard is under development now, other aspects (e.g. the Ether-Type field) might also be introduced therein to identify frames. After a TSN stream has been established in the TSN network, frames are identified in the whole TSN network based on the spécifie stream identifiers, [0949] There is currently no header compression defined for Ethernet frames for a 5G network. This would lead to transmission of uncompressed Ethernet frames, which entails a significant overhead given the typically small payload sizes for certain types of traffic, such as industrial loT / URLLC traffic.
[0950] Du ring handover re-establishment and data recovery, RoHC performance cannot be guaranteed, which is problematic for services relying on guaranteed transmission success. Counteracting this issue by provisioning more resources for the service (e.g. not using RoHC) is iikely to lead to unacceptable resource wastage.
[0951] A protocol for Ethernet header compression aligned with RoHC may sometimes be able to lead to good compression ratios but not deterministically, e.g. in the above handover situation. This leads to the disadvantage of radio access nodes (e.g., gNB) also being unable to reserve minimum-needed resources deterministically, i.e. such nodes may need to reserve more resources for the case that header compression does not lead to full compression, coming with additional resource wastage.
[0952] A RoHC compression context loss (e.g., due to a handover) will lead to delays in packet forwarding at the receiver which may be unacceptable for URLLC traffic. [0953] Certain aspects of the présent disclosure and their embodiments may provide solutions to these or other challenges.
[0954] The présent disclosure is described within the context of 3GPP NR radio technology (e.g., 3GPP TS 38.300 V1.3.0). However, it will be understood by those skilled in the art that embodiments of the disclosure also apply to other cellular communication networks. Embodiments of the disclosure enable the efficient transport of data flows (e.g., time-sensitive data flows, such as those for time-sensitive networking (TSN)) over a cellular (e.g., 5G) network by compressing redondant information. This is achieved by making one or more core network nodes TSN-aware, supporting the handling of the TSN flows while reducing unnecessary overhead.
174
[0955] Methods are outlined in this disclosure for header compression of Ethernet l TSN stream-based transmissions in a 5G network. Compared to known methods like RoHC for IP header compression, the methods outlined herein reiy on spécifie properties of the Ethemet/TSN stream to enable a deterministic compression ratio.
[0956] There are, propesed herein, varions embodiments which address one or more of the issues disclosed herein.
[0957] Certain embodiments may provide one or more of the following technical advantage(s). Ethernet header compression in cellular networks generalîy lowers resource usage, increasing capacity. Embodiments of the disclosure may lead to a 10 deterministic compression ratio, i.e. enabling deterministic minimum-needed resource réservations for the flow/UE instead of needing to account for situations where this optimum compression ratio cannot be met. in this way, the capacity of the system is improved.
[0958] As described below, embodiments of the disclosure assume that values for one or more fieids in a data packet header (e.g., an Ethernet header) are static for an established data stream such as a TSN stream. In this context, a value may be considered “static” if it remains the same for multiple data packets in sequence within the data stream. Thus, this does not preclude embodiments in which the values for the fieids in the header are updated as necessary (i.e. semi-static). The values for the fieids may or 20 may not remain the same for the lifetime of the data stream.
[0959] TSN streams are established and a configuration is applied across ail nodes involved in the TSN stream before any data packet is transmitted. This includes also, that TSN stream identifiées are announced.
[0960] Figure 128 shows a frame structure for a TSN data packet. Within a TSN stream, header fieids are used to identify a stream. These fieids comprise of e.g. DST MAC address (6 byte), VLAN-header (4 bytes) and IP-Header fieids (various fieids). These fieids are not usually aitered after a TSN stream has been setup. Therefore, these fieids offerthe possibility of a static compression throughout the 5G network, e.g. UPF to UE, gNB to UE, etc.
[0961] According to one embodiment of the disclosure, one or more fieids within a headerfor the data packet are configured for the UE and/or the gNB or UPF before data transmission takes place. For exampîe, the one or more fieids may comprise the Ethernet header and maybe also other header fieids as for example parts of an IP-header in case they are used for TSN stream identification.
[0962] The values for the fieids in the header for packets received or transmitted in a
QoS flow may be configured per QoS flow. A.dditionally or altematively, the values for the
175 fields in the header for packets received or transmitted in a P DU session may be configured perPDU session.
[0963] The procedure for downlink is illustrated in Figure 129.
[0964] For TSN streams in the Downlink the 5G CN (e.g., a core network node, such as the AMF or UPF, or a combination of both) may use information from a TSN network regarding TSN stream identification and which fields can be treated as static or not, or it might use a pre-configuration for this,
[0965] An identifier might be added to data packets inside of PDU sessions or QoS Fiows to differentiate multiple TSN/Ethernet streams within the same session or flow (thus the identifier is for a particular TSN/Ethernet stream). For example, the identifier may be used instead of the Ethernet header fields removed statically for transmission; an 8-bit header might be sufficient to separate TSN streams inside sessions or flows.
[0966] For header compression between UPF and UE (initiated by 5G CN), NAS signaling is used. This comprises to signa! the header content that is statically mapped to the UE and optionally also a stream identifier that is used within a PDU session or within a QoS Flow to differentiate between different TSN streams. The 5G CN configures the UPF for the static mapping.
[0967] For Downlink transmissions for header compression between gNB and UE, RRC signaling can be used, i.e. when a new QoS flow is established for the UE, the UE is înstructed to utilize the configured header for packets received on this QoS flow. In an alternative embodiment, PDCP control signaling is employed to indicate updates to the otherwise static header context (i.e. providing the UE with a new header context), allowing a semi-static header configuration for the UE.
[0968] Furthermore, in ail cases above, when an update of the static header is indicated, or the new static header is indicated, a sequence number may be indicated alongside, identifying the packet from which onwards the new header should be used for décompression.
[0969] In a further embodiment, in the receiving entity (e.g., UE in DL), reordering of received packets according to a sequence number should be applied priorto header décompression. This way, when indicating new configured headers alongside with a sequence number, the first packet for which a new configured header is valid is identified. [0970] The procedure for upiink is illustrated in Figure 130.
[0971] For TSN streams in the Upiink the UE might get information from a TSN network regarding TSN stream identification and which fields can be treated as static or not and inform the 5G CN accordingly (e.g., by forwarding the request from the TSN network to the 5G CN).
176
[0972] An identifier might be added to data packets inside of PDU sessions or QoS Flows to differentiate multiple TSN/Ethemet streams within the same session or flow (thus the identifier is for a particular TSN/Ethemet stream). For examp 1e, the identifier may be used instead of the Ethernet header fields removed statîcally for transmission; an 8-bit header might be sufficient to separate TSN streams inside sessions or flows.
[0973] For header compression between UE and UPF (initiated by UE), again NAS signaling is used. The UE might request a static header compression from the 5GCN by signaling the request over NAS alongside any TSN configuration data it has received from a TSN network regarding the TSN stream packet headers. The 5GCN may then configure the static mapping in the UPF and possibly also assign a stream identifier that is used within a P DU session or within a QoS Flow to differentiate between multiple TSN streams. The 5GCN may use NAS signaling to inform the UE about the static mapping, as weii as a potential identifier to use. The 5GCN configures the UPF for the static mapping.
[0974] Furthermore, in aü cases above, when an update of the static header is indicated, or the new static header is indicated, a sequence number may be indicated alongside, identifying the packet from which onwards the new header should be used for décompression.
[0975] For Uplink transmissions, the UE is configured to remove the Ethernet header fields before transmission. The configuration may be indicated via RRC signaling or NAS signaling. The header removal function may be implemented in an SDAP or PDCP transmission algorithm. A sequence number may be indicated identifying the first packet from which onwards the removal of Ethernet header fields applies.
[0976] For Uplink transmissions, the UE indicates the (removed) header to the 5G network prior to any data transmission, so that the 5G network can consider the header when receiving packets from the UE. Also, in this case the header can be configured per QoS flow or per PDU session. Furthermore, a sequence number may be indicated identifying the first packet for which the header had been removed and the configured header should be applied to.
[0977] In a further embodiment, in the receiving entity (gNB or UPF in UL), reordering of received packets according to a sequence number should be applied prior to header décompression, Tnis way, when indicating new configured headers aiongsidê with a sequence number, the first packet for which a new configured header is valid for is identified.
[0978] To handle TSN streams over radio, radio resources may be pre-aliocated using e.g. semi-persistent scheduling (SPS) or instant-uplink access (IUA). Resource pre
177 allocation benefits from a known payload size for transmission. In the RoHC framework the worst-case payload size is still the whole packet including ail headers; as it cannot be determined when it is necessary to transmit the full context, it would be necessary to reserve resources for the worst-case. This is not the case for the static header compression method outlined above.
[0979] TSN is based on timely delivery of packets. Rackets that hâve to be retransmitted or buffered because of a context unawareness lead to packet latencies that are most likely unacceptable. It would be better to either discard the packet or reuse an old (or as introduced in this disclosure, statically configured) context instead.
[0980] Figure 131 depicts a method in accordance with particular embodiments. The method may be performed by one or more core network nodes. For example, the method may be performed by an AMF and/or a UPF (such as the AMF and UPF described above with respect to Figures 126. Further, the method may relate or correspond to the actions of the element “5G CN1’ in Figure 129 described above. The method enables transport of data packets associated with a data stream (such as a TSN or other time-critical data stream) in an external data network (such as an Ethernet network or LAN).
[0981] The method begins at step W102, in which the core network node(s) obtains configuration information for a data stream in an external data network. The configuration information indicates respective values for one or more fields within a header of data packets associated with the data stream which are to remain static. The core network node(s) may receive such configuration information from the extemal data network directly (e.g., in a request message to establish the data stream), or be pre-configured with the information. The one or more fields for which values may be static may comprise one or more Ethernet header fields, such as one or more (or ail) of: destination address field; source address field; Virtual LAN tag field, and type/îength field. The one or more fields may additionally or aliematively comprise one or more fields in the IP header.
[0982] In step W104, the core network node(s) initiâtes transmission of the configuration information to a wireless device which is to receive the data stream. For example, the configuration information may be transmitted via NAS signalling.
[0983] The core network node(s) may establish an identifier for the data stream to enable it to be distinguished from other data streams. In embodiments where data packets are transmitted to the wireless device as part of a PDU session or QoS flow, the identifier may be unique within the PDU session or QoS flow (and therefore in such embodiments an identifier value may be re-ussd for different data fîows outside the PDU session or QoS flow), The configuration information may additionally include the identifier for the associated data stream.
178
[0984] In step W106, the core network node(s) receives a data packet associated with the data stream from the extemal data network, The data packet may be identified as being associated with, or belonging to, the data stream via any suitable mechanism. The identification might be based on MAC addresses and VLAN-headers and/or IP headers, Alternatively or additionalîy, other aspects (e.g. the Ether-Type field) might also be introduced therein to identify data packets.
[0985] In step W108, the core network node(s) removes the one or more fields from the data packet to generate a compressed data packet. That is, the core network node(s) removes the one or more fields which were identified in the configuration information obtained in step W102. Optionally, the core network node(s) may add the identifier for the data stream to the compressed data packet. It will be understood that the identifier may be added to frie data packet before or after the one or more fields hâve been removed.
[0986] In step W110, the core network node(s) initiâtes transmission of the compressed data packet to the wireless device. For example, the core network node(s) may send the compressed data packet to a radio access node (such as a gNB or other base station) for onward transmission to the wireless device.
[0987] In further embodiments of the disclosure, the configuration information for the data stream may become updated after the configuration above has been established. In such embodiments, updated configuration information may be obtained for the data stream (e.g., from the external data network), comprising an indication of respective updated values for one or more fields within the header of data packets associated with the data stream which are to remain static. The one or more fields which hâve static values may be the same as or different to the one or more fields identified origînally. The updated configuration information can then be transmitted to the wireless device (e.g., via NAS signalling) to enable the wireless device to decompress data packets which hâve had header information removed according to the updated configuration. The updated configuration information may comprise a sequence number, indicating the data packet in the sequence of data packets associated with the data stream from which the updated configuration is to apply,
[0988] Figure 132 depicts a method in accordance with particular embodiments, The method may be performed by one or more core network nodes. For example, the method may be performed by an AMF and/or a UPF (such as the AMF and UPF described above with respect to Figures 126. Further, the method may relate or correspond to the actions of the element “5G CN” in Figure 130 described above, The method enables transport of
179 data packets associated with a data stream (such as a TSN or other time-critical data stream) in an externaî data network (such as an Ethernet network or LAN).
[0989] The method begins at step W202, in which the core network node(s) obtains configuration information fora data stream in an externaî data network. The configuration information indicates respective values for one or more fields with in a header of data packets associated with the data stream which are to remain static. The core network node(s) may receive such configuration information from the extemal data network directly (e.g., in a request message to establish the data stream), from a wireless device which is to transmit data packets associated with or belonging to the data stream (e.g., in a request message from the externaî data network forwarded by the wireless device over signalling such as NAS signalling) or be pre-configured with the information. The one or more fields for which values may be static may comprise one or more Ethernet header fields, such as one or more (or ail) of: destination address field; source address field; Virtual LAN tag field; and type/length field. The one or more fields may additionally or altemativeiy comprise one or more fields in the IP header.
[0990] An identifier for the data stream may be established to enable it to be distinguished from other data streams. In embodiments where data packets are transmitted by the wireless device as part of a PDU session or QoS flow, the identifier may be unique within the PDU session or QoS flow (and therefore in such embodiments an identifier value may be re-used for different data flows outside the PDU session or QoS flow). The configuration information may additionally include the identifier for the associated data stream. Altemativeiy, where the core network node(s) establish the identifier for the data stream, the identifier may be transmitted by the core network node(s) to the wireless device.
[0991] Optionally, the method may further comprise a step (not illustrated) of sending the configuration information to the wireless device which is to transmit data packets associated with or belonging to the data stream. This step may particularly apply when the configuration information in step W202 is not received from the wireless device, or when the wireless device is unabîe to process and obtain the configuration information itself (e.g., from a request message received from the extemal data network). The configuration information may be sent via NAS signalling, for example.
[0992] în step W204, the core network node(s) receives a data packet associated with the data stream from the wireless device. The data packet is compressed by the removal of one or more fields in the header (e.g., by the wireless device following the method set out below in Figure 133), according to the configuration information obtained in step W202.
180
[0993] In step W206, the core network node(s) adds the one or more fields from the data packet to généra te a decompressed data packet. That is, the core network node (s) adds the one or more fields which were identified in the configuration information obtained in step W202.
s [0994] In step W208, the core network node(s) initiâtes transmission of the decompressed data packet over the external data network.
[0995] In further embodiments of the disclosure, the configuration information for the data stream may become updated after the configuration above has been established. In such embodiments, updated configuration information may be obtained for the data stream (e.g., from the external data network or the wireless device), comprising an indication of respective updated values for one or more fields within the header of data packets associated with the data stream which are to remain static. The one or more fields which hâve static values may be the same as or different to the one or more fields identified originally. The updated configuration information transmitted to the wireless device (e.g., via NAS signalling), particularly if the updated configuration information is received from the extemal data network directly. Additionally oraltematively, the updated configuration information is utilized to decompress received data packets in future which hâve been compressed by the wireless device according to the updated configuration. The updated configuration information may comprise a sequence number, indicating the data packet in the sequence of data packets associated with the data stream from which the updated configuration is to apply. Thus the core network node(s) may add header fields according to the updated configuration for ail data packets which follow the sequence number indicated in the updated configuration information. Optlonally, the core network node(s) may re-order received data packets according to their respective sequence numbers to faciiitate this Processing.
[0996] Figure 133 depicts a method in accordance with particular embodiments. The method may be performed by a wireless device (such as the UE described above with respect to Figure 126). Further, the method may relate or correspond to the actions of the element “UE” in Figure 129 described above. The method enables transport of data packets associated with a data stream (such as a TSN or other time-criticai data stream) in an extemal data network (such as an Ethernet network or LAN).
[0997] The method begins at step XX102, in which the wireiess device obtains configuration information fora data stream in an external data network. The configuration information indicates respective values for one or more fields within a header of data packets associated with the data stream which are to remain static. The wireless device may receive such configuration information from the external data network directly (e.g.,
181 in a request message to esiablish the data stream), or from one or more core network nodes (e.g., via a transmission from a radio access network node, such as a gNB or other base station, via NAS signalling). The one or more fields for which values may be static may comprise one or more Ethernet header fields, such as one or more (oral!) of: destination address field; source address field; Virtual LAN tag field; and type/length field. The one or more fields may additionaily or alternatively comprise one or more fields in frie IP header.
[0998] An identifier for the data stream may be established to enable it to be distinguished from other data streams. In embodiments where data packets are received by the wireless device as part of a PDU session or QoS flow, the identifier may be unique within the PDU session or QoS flow (and therefore in such embodiments an identifier value may be re-used for different data flows outside the PDU session or QoS flow). The configuration information may additionaily include the identifier for the associated data stream.
[0999] !n step XX104, the wireless device receives a data packet associated with the data stream from the radio access network node. The data packet is compressed by the removai of one or more fields in the header (e.g., by the core network node(s) or the radio access network node itself following the method set out above), according to the configuration information obtained in step XX102,
[1000] In step XX106, the wireless device adds the one or more fields from the data packet to generate a decompressed data packet. That is, the wireless device adds the one or more fields which were identified in the configuration information obtained in step XX102. Optionally, the decompressed data packet may be transmitted onwards over the extemal data network.
[1001] In further embodiments of the disclosure, the configuration information for the data stream may become updated afterthe configuration above has been established. In such embodiments, updated configuration information may be obtained for the data stream (e.g., from the core network node), comprising an indication of respective updated values for one or more fields within the header of data packets associated with the data stream which are to remain static. The one or more fields which hâve static values may be the same as or different to the one or more fields identified originally. The updated configuration information is then utiiized to decompress received data packets in future which hâve been compressed by the core network node(s) or radio access network node according to the updated configuration. The updated configuration information may comprise a sequence number, indicating the data packet in the sequence of data packets associated with the data stream from whioh the updated configuration is to apply. Thus
182 the wireiess device may add header fields according to the updated configuration for ail data packets which follow the sequence number indicated in the updated configuration information. Optionaliy, the wireiess device may re-order received data packets according to their respective sequence numbers to facilitaîe this processing.
[1002] Figure 134 depicts a method in accordance with partîcular embodiments. The method may be performed by a wireiess device (such as the UE described above with respect to Figure 126). Further. the method may relate or correspond to the actions of the eiement “UE” in Figure 130 described above. The method enables transport of data packets associated with a data stream (such as a TSN or other time-criticaî data stream) in an extemai data network (such as an Ethernet network or LAN).
[1003] The method begins at step XX202, in which the wireiess device obtains configuration information for a data stream in an externai data network. The configuration information indicates respective values for one or more fields within a header of data packets associated with ths data stream which are to remain static. The wireiess device may receive such configuration information from the externai data network directly (e.g., in a request message to establish the data stream), or from one or more core network nodes (e.g., via NAS or RRC signalling). The one or more fields for which values may be static may comprise one or more Ethernet headerfields, such as one or more (oral!) of: destination address field; source address field; Virtual LAN tag field; and iype/length field. The one or more fields may additionally or alternative^ comprise one or more fields in the IP header.
[1004] An identifier for the data stream may be established (e.g., by the one or more core network nodes) to enable it to be distinguished from other data streams. In embodiments where data packets are received by the wireiess device as part of a PDU session or QoS flow, the identifier may be unique within ths PDU session or QoS flow (and therefore in such embodiments an identifier value may be re-used for different data fiows outside the PDU session or QoS flow). The configuration information may additionally include the identifier for the associated data stream.
[1005] in step XX204, the wireiess device obtains a data packet associated with or belonging to the data stream. For example, the data packet may be received from the externai data network, or generaled by the wireiess device (e.g., in response to some user interaction or by execution of an application on the wireiess device).
[1006] In step XX206, the wireiess device removes the one or more fields from the data packet to generate a compressed data packet. That ts, the wireiess device removes the one or more fields which were identified in the configuration information obtained in step XX202. Optionaliy, the wireiess device may add the identifier for the data stream to
183 the compressée! data packet. St will be understood that the identifier may be added to the data packet before or after the one or more fields hâve been removed. The header removai function may be implemented in an SDAP or PDCP transmission algorithm.
[1007] in step XX208, the wireless device initiâtes transmission of the compressed data packet over the external data network. For example, the wireless device may send the compressed data packet in a transmission to a radio access network node (such as a gNB or other base station) for onward transmission to one or more core network nodes and thereafter the external data network. The one or more core network nodes are enabled to decompress the compressed data packets priorto their transmission over the external data network, e.g., by following the methods set out above).
[1008] In further embodiments, the configuration information for the data stream may become updated after the configuration above has been established. In such embodiments, updated configuration information may be obtained for the data stream (e.g., from the extema! data network), comprising an indication of respective updated values for one or more fields within the header of data packets associated with the data stream which are to remain static. The one or more fields which hâve static values may be the same as or different to the one or more fields identified originaily. The updated configuration information can then be transmitted by the wireless device (e.g., via NAS signalling) to one or more core network nodes to enable those core network nodes to decompress data packets winch hâve had header information removed according to the updated configuration. The updated configuration information may comprise a sequence number, indicating the data packet in the sequence of data packets associated with the data stream from which the updated configuration is to appîy.
[1009] It will be appreciated that the methods shown in Figures 131-134 may be implemented in one or more of the nodes shown in Figures 120-125, es appropriate.
[1010] Combination of Resou rce-Schedulinq and Header-Compression Techniques
[1011] As indicated above, the various techniques described herein may be combined with each other, to provide advantages with respect to iatency, reliability, etc. For example, one particuiar combination that is advantageous is the combination of the techniques described above for scheduling resources and the techniques described for compressing headers of TSN frames,
[1012] Thus, for exampie, the method iilustrated in Figure 117 can be combined with the method shown in Figure 131, resulting in a method performed in one or more nodes of a core network associated with a radio access network (RAN) for handling a timesensitive data stream associated with a user equipment (UE) and an external network. This method comprises, as shown at block 1210 of Figure 117, the step of receiving, from
184 the extemal network, a transmission schedule associated with a time-sensitive data stream, and further comprises, as shown at block 1220 of that same figure, the step of sending, to the RAN, a request to allocate radio resources for communication of the data stream between the RAN and a first UE, wherein the request further comprises information related to the transmission schedule. As shown at block 1230 of Figure 117, the method further comprises receiving, from the RAN, a response indicating whether radio resources can be ailocated to meet the transmission schedule associated with the data stream.
[1013] The method further comprises the step of obtaining configuration information for the data stream, the configuration information indicating respective values for one or more fields within a header of data packets associated with the data stream which are to remain static; this step is shown at block W102 of Figure 131. The method still further comprises the steps of initiating transmission of the configuration information to the first UE, receiving a data pack et associated with the data stream from the extemal data network, removing the one or more fields from the data packet to generate a compressed data packet, and initiating transmission of the compressed data packet to the first UE, as shown at blocks W104, W106, VV108, and W110 of Figure 131.
[1014] It will be appreciated that any of the variations discussed above for these techniques may apply here, for the combined technique. Thus, for example, the extemal network comprises a Time-Sensitive Network (TSN), in some embodiments, and the data stream comprises a TSN stream. Here, the transmission schedule may comprise cycle times and gaie control lists for one or more traffic classes comprising the TSN stream.
[1015] In some embodiments, the information related to the transmission schedule includes one or more of the following: an identifier of the first UE; identifiera of one or more quality-of-service, QoS, flows associated with the data stream; and a QoS requirement associated with each of the QoS flows. In some of these embodiments, each QoS requirement comprises one or more time Windows during which the data stream is required to be transmitted and/or an initial time window and a periodicity that identifies subséquent time Windows. In some of these latter embodiments, if the response indicates that radio resources cannot be ailocated to meet the transmission schedule of the data stream, the response further comprises an indication of one or more further time Windows during which radio resources can be ailocated. In some embodiments, the response indicates whether the QoS requirement associated with each of the QoS flows can be met, and the method further comprises determining whether the transmission schedule can be met based on the indication of whether the QoS requirement associated with each of the QoS flows can be met.
185
[1016] In some embodiments, the method further comprises sending, to the external network, an indication of whether the transmission schedule can be met. In some of these and in other embodiments, the method is performed by an access management function (AMF) in a 5G core network (5GC). The transmission schedule may be received from the external network and the radio resources may be for downlink communication from the RAN to the first UE, in some embodiments, or the transmission schedule may be received from the first UE and the radio resources may be for uplink communication from the first UE to the RAN, in other embodiments or instances.
[1017] In some embodiments, the step of obtaining configuration information comprises receiving the configuration information from the external data network. In others, the configuration information is pre-configured in the one or more nodes of the core network.
[1018] In some embodiments, the compressed data packet comprises an identifier for the data stream. The identifier may be added by the one or more nodes of the core network node.
[1019] In. some embodiments, the compressed data packet is transmitted to the first UE as part of a protocol data unit (PDU) session or a quality of service (QoS) flow. In some of these embodiments, the identifier mentioned above may be unique within the PDU session or QoS flow.
[1020] In some embodiments, the configuration information is transmitted to the first UE using non-access stratum (NAS) signaling. In some, the configuration information comprises an identifier for the data stream.
[1021] In some embodiments, the method further comprises obtaining updated configuration information for the data stream, the updated configuration information comprising an indication of respective updated values for one or more fields within the header of data packets associated with the data stream which are to remain static, and initiating transmission of the updated configuration information to the first UE. This updated configuration information further may comprise an indication of a sequence number identifying a data packet associated with the data stream from which the respective updated values apply.
[1022] In any of the preceding embodiments, the data packet may comprise user data, and the step of initiating transmission of the compressed data packet to the first UE may comprise forwarding the user data to the first UE via a transmission to a base station.
[1023] The décompression techniques described above may also be combined with these techniques. Thus, some methods carried out by one or more nodes of the core
186 network may comprise receiving a data packet associated with the data stream from a second UE; adding the one or more fields to the data packet to generate a decompressed data packet; and initiating transmission of the decompressed data packet over the extemal data network, as shown at blocks W204, W206, and W208 of Figure 132.
[1024] In some embodiments, the method may further comprise initiating transmission, to the second UE, of an indication of the respective values for one or more fields within the header of data packets associated with the data stream which are to remain static. The data packet may comprise user data, and the step of initiating transmission of the decompressed data packet over the extemal data network may comprise forwartiing the user data to a host computer over the extemal data network.
[1025] TSN Over a RAN
[1026] At least some units of factory automation, such as autonomous, multifunctional, and/or mobile machinery and robots, require networking by means of wireless radio communication. However, a factory unit acting as a mobile terminal of the RAN, e.g., a 3GPP user equîpment (UE), would hâve to establish a radio connection with a radio base station of the RAN just to find out that this particular radio base station does not support TSN.
[1027] Accordingly, there is a need fora technique that enables TSN overwireless radio communication. An alternative or more spécifie object is to enabîe a mobile terminal to specifically select a radio base station that supports TSN, preferably prier to establishing a radio connection between the mobile terminal and the radio base station. [1028] Figure 135 shows a flowehart for a method 400 of handling TSN over a RAN. The method 400 comprises a step 402 of receiving SI from a RBS of the RAN. The SI is implicative or indicative as to support for TSN through the RBS. The SI may be RBSspécifie. The method 400 further comprises a step 404 of establishing or initiating to establish, depending on the received SI, at least one TSN stream of the TSN through the RBS. The method 400 may be performed by a UE radio-connected or radio-connectable to the RAN.
[1029] Figure 136 shows a flowehart fora method 500 of announcing TSN over a RAN. The method 500 comprises a step 502 of transmitting SI from a RBS of the RAN. The SI is implicative or indicative as to support for TSN through the RBS. The SI may be RBS-specific. The method 500 further comprises a step 504 of supporting, according to the transmitted SI, at least one TSN stream of the TSN through the RBS. The method 500 may be performed by the RBS of the RAN, for example.
[1030] Figure 137 shows a flowehart for a method 600 of distributing a configuration message for TSN over a RAN, The method 600 comprises a step 602 of determining at
187 least one configuration message indicative or impîicative as to support for the TSN through at least one RBS of the RAN. The method 600 further comprises a step 604 of sending the at least one configuration message from a CN to each of the at least one RBS of the RAN.
[1031] The method 600 may be performed by the CN and/or the using a network component of the CN, the AMF or MME, and/or using a TSN function. The TSN function may be a Centralized Network Configuration (CNC) or a Centralized User Configuration (CUC).
[1032] The step 404 of establishing or initiating to establish, depending on the received SI, the at least one TSN stream may comprise selectively (e.g., conditionally) establishing or selectively (e.g., conditionally) initiating to establish the at least one TSN stream. Tne seiectivity (e.g., conditionality) may be dépendent on the received SI. The UE may décidé, based on the SI from the RBS, whether to attempt establishing the TSN stream, e.g., prior to accessing or connecting with the base station, or not.
[1033] The step 404 of establishing or initiating to establish the at least one TSN stream may comprise selectively performing or selectively initiating to perform at least one of a random access procedure with the RBS of the RAN; a radio resource control (RRC) connection setup with the RBS of the RAN; and a network attach procedure with a CN connected to the RAN. The seiectivity may be dépendent on the received Si.
[1034] The establishing step 404 may comprise performing or initiating to perform a TSN application that uses the ai least one established TSN stream. The TSN application or a client of the TSN application may be performed at the UE. The seiectivity (e.g., the conditionality) in the step 404 may be fulfilled if the received SI is indicative of TSN features required by the TSN application.
[1035] The step 402 of receivîng the Si is performed with respect to each of a plurality of RBSs of the RAN. The step 404 of establishing or initiating to establish the at least one TSN stream may comprise selecting, among the plurality of RBSs, the RBS the SI of which is indicative of TSN features required by the TSN application.
[1036] The RBS which best fulfills the required TSN features according to the respective SI may be selected (e.g,, if none of the plurality of RBSs fulfills the required TSN features). Altematively or in addition, the RBS which SI is indicative of the most preferabiy TSN features may be selected (e.g., if more than one of the plurality of RBSs fulfills the required TSN features).
[1037] The method 400 may further comprise a step of sending a control message to the CN. The control message may be indicative of TSN features required by the TSN application. The control message may be a non-access stratum (NAS) message.
188
[1038] The control message may be indicative of a request for the TSN. The control message may be forwarded to the CUC.
[1û3S] The Si may be impiicative or indicative of at least one TSN feature supported by orthrough the RBS. The SI may be RBS-specific. The selectivity (e.g., the condition a lity) in the step 404 may be dépendent on the at least one supported TSN feature. Altematively or in addition, the TSN stream may be established over the RAN depending on the at least one supported TSN feature. For example, the establishîng of the at least one TSN stream may comprise performing or initiating to perform the random access with the RBS depending on the at least one supported TSN feature.
[1040] Herein, the TSN feature may encompass any feature or functionality available at the RBS for the TSN. The at least one TSN feature supported through the RBS may also be referred to as TSN capability of the RBS.
[1041] The at least one TSN feature may comprise at least one of a timesynchronization, a latency bound for the at least one TSN stream, and a reiiability measure for the at least one TSN stream. The time-synchronization may be a timesynchronization of RBSs and/or network components processing (e.g., transporting) the at least one TSN stream.
[1042] Altematively or in addition, the SI may be indicative of a TSN configuration (also, TSN configuration scheme) for the TSN through the RBS. For example, the establishîng 404 of the at least one TSN stream may comprise performing or initîating a TSN setup according to the TSN configuration. The TSN configuration may be indicative of an availability or unavaüability of at least one of a CNC and a CUC.
[1043] The SI may be broadcasted from the RBS in the step 502. The SI may be a broadcast message. The SI may be comprised in one or more System information blocks (SIBs).
[1044] The method 500 may further comprise a step of receiving a configuration message indicative of the support for TSN from the CN at the RBS. The SI transmitted by the RBS may be derived from the received configuration message.
[1045] The SI may be impiicative or indicative of at least one TSN feature supported by or through the RBS. The SI may be broadcasted in one or more SIBs. The method 500 may further comprise any feature and/or step disclosed in the context of the UE and the method 400, or any feature or step corresponding thereto.
[1046] The configuration message may be sent from the AMF of the CN. The configuration message may be impiicative or indicative of at least one TSN feature supported or supposed to be supported by or through the RBS.
189
[1047] The method 600 may further comprise any feature or step of the methods 400 and 500, or any feature or step corresponding thereto.
[1048] Embodiments of the technique maintain compatibiiity with the 3GPP document TS 23,501, version 15,1.0, specifying System Architecture for the 5G System S (Stage 2), or a successor thereof.
[1049] A network (e.g., a 5G network comprising the RAN providing NR access as defined by 3GPP) is configured to support TSN transmissions through at least some RBSs. For a UE to become attached to such a TSN network over the RAN (e.g., 5G radio or NR), there is no existing way to get information as to whether the network in general, 10 and the RBS (e.g., a gNB) specificalîy, supports TSN transmissions or not. In embodiments of the technique, the SI enables the UE to détermine if and/or how certain TSN features are supported, before getting into radio resource central (RRC) connected mode and further signaling with the 5G network. Thus, the technique enables the UE and, therefore, also a TSN application the UE is connected to, to be aware of whether, which and/or how TSN features are supported by the network, specificaliy the RAN and/or the RBS transmitting the Si,
[1050] The SI may be implicative or indicative as to the support of TSN features. The TSN features may comprise at least one of time synchronization, redundancy, reliabiîity, and latency (e.g., an estimated end-to-end latency).
[1051] Embodiments of the technique enable the UE to receive necessary TSNrelated information in the SI before getting attached to the 5G network, in this way, the UE is aware of which TSN features are supported by the 5G network. Furthermore, the 5G network may inform one or more UEs in the same way about configuration details of the TSN network and/or how to, for example, perform time synchronization and network management.
[1052] For example, not ail RBSs (e.g., gNBs) covering an area (e.g., deployed in a factory hall) support TSN traffic. The technique may be impiemented to block those UEs (also: TSN-UEs) that requireTSN trafficfrom certain RBSs (e.g., gNBs), e.g., from those RBSs that do not support TSN or not the TSN features required by the UE.
[1053] The SI may be impiemented by one or more System Information Blocks (SIBs).
[1054] An overall functionality and structure of a îvlasier information Biock (MIS) and SIBs for NR may be essentially the same as for LTE. A différence between NR and LTE ;s that in NR provides two different types of SIBs. A first type of SIBs is transmitted periodicaily, e.g., equal or simiiar to SIB transmissions in LTE. A second type of SIBs is transmitted only when there is the request from the UE.
190
[1055] The SIBs are broadcasted by the RBS (e.g., a gNB) and include the main part of the System information the UE requires to access a cell served by the R BS and other information on cell reselection. SIBs are transmitted over a Downlink Shared Channel (DL-SCH). The presence of the System information on the DL-SCH in a subframe is indicated by the transmission of a corresponding Physical Downlink Control Channel (PDCCH) marked with a spécial system-information Radio Network Tempo rary Identifier (SI-RNTI).
[1056] A number of the different SIBs are defined by 3GPP for LTE and N R, e.g., characterized by the type of the information rncluded in the SIBs. This system information informs the UE about the network capabilities. Not all SIBs are supposed to be présent. SIBs are broadcasted repeatedly by the RBS (e.g., the gNB).
[1057] Within a TSN network, i.e., a network supporting TSN, the communication endpoints are caHed TSN talker and TSN listener. At least one of the TSN talker and the TSN listener is an UE. For the support of TSN, ail RBSs and network components (e.g., switches, bridges, or routers) between the TSN talker and the TSN listener support certain TSN features, e.g. IEEE 802.1AS time synchronization. Ail nodes (e.g., RBSs and/or network components) that are synchronized in the network belong to a so-called TSN domain. TSN communication is only possible within such a TSN domain.
[1058] TSN for a RAN or a RAN configured for TSN may comprise features for deterministic networking, which are also referred to as TSN features. The TSN features may comprise at least one of time synchronization, guaranteed (e.g., low) latency transmissions (e.g., an upper bound on latency), and guaranteed (e.g., high) reliability (e.g., an upper bound on packet error rate). The time synchronization may comprise a time synchronization between components of the RAN (e.g., the RBSs) and/or network components (e.g., in a backhaul domain and/or the CN).
[1059] Optionally, the Si is indicative of the TSN features supported through the respective RBS.
[1060] The supported TSN features may comprise or be compatible with at least one of the following group of categories. A first category comprises time synchronization, e.g. according to the standard IEEE 802.1 AS. A second category comprises bounded low latency, e.g. according to at least one of the standards IEEE 802.1Qav, IEEE 802.1 Qbu, IEEE 802.1Qbv, IEEE 802.1Qch, and IEEE 802.1Qcr. A third category comprises uîtrâreliability, e.g. according to at least one of the standards IEEE 802.1 CB, IEEE 802.1 Qca, and IEEE 802.1Qci. A fourth category comprises network configuration and management, e.g. according to at least one of the standards IEEE 802.1Qat, IEEE 802.1 Qcc, IEEE 802.1Qcp and IEEE 802.ICS,
191
[1061] The configuration and/or management of a TSN network including the RAM can be implemented in different manners, e.g., in a centralized or in a distributed setup as defined by the standard IEEE 802.1Qcc. Examples of different configuration modeis are described with reference to Figures 138, 139, and 140.
[1062] Figure 138 schematically illustrâtes a block diagram for a first ex ample of a communications system 700 comprising embodiments of devices 100, 200 and 300, which may be configured to carry out the methods illustrated in Figures 135,136, and 137, respectively. The communication System 700 comprises the RAN 710 and the CN 730. The RAN 710 may comprise at least one embodiment of the device 200. The CN 730 may comprise at least one embodiment of the device 300, e.g., a network component 300-1. The network component 300-1 may be a switch, a bridge or a router. A backhaul domain 720 provides data links between the RBSs 200 of the RAN 710 and/or between the at least one RBS 200 and the CN 730. The data links may comprise at least one of microwave links, Ethernet links and fi ber optical links.
[1063] The S! 712 is broadcasted by the RBS 200 to the UE 100 according to the steps 402 and 502. The RBS 200 is configured to broadcast the Si 712 according to the step 502 and to support the TSN stream according to the step 504 responsive to the configuration message 722-1 received from or through the network component 300-1. [1064] In a scheme for distributed TSN configuration, which is illustrated by the first exampie in Figure 138, there is no CUC and no CNC for the TSN network. The TSN talker 100 is, therefore, responsible for initiation of a TSN stream in the step 404. As no CNC is présent, the network components 300-1 (e.g., switches or bridges) are configuring themselves, which may not ailow using, for example, time-gated queuing as defined in IEEE 802.1Qbv. The distributed TSN configuration may be compatible or consistent with the document IEEE P802.1Qcc/D2.3, Draft Standard for Local and metropolitan area networks— Bridges and Bridged Networks Amendment: Stream Réservation Protocol (SRP) Enhancements and Performance Improvements”, IEEE TSN Task Group, e.g., draft status 03-05-2018.
[1065] In a first scheme for centralized TSN configuration, which is schematically depicted in Figure 139 for a second example of the communication System 700, the TSN talker 100 is responsible for initialization of the TSN stream in the step 404, while the network components 300-1 are configured by a CNC 300-2. The centralized TSN configuration may be compatible or consistent with the document IEEE P802.1Qcc/D2.3. [1066] The SI 712 is broadcasted by the RBS 200 to the UE 100 according to the steps 402 and 502. Alternatively or additionally to the configuration message 722-1, the RBS 200 is configured to broadcast the Si 712 according to the step 502 and to support
192 the TSN stream according to the step 504 responsive to the configuration message 722-2 received from or through the CNC 300-2.
[1067] în a second scheme for centralized TSN configuration (also: fully centralized TSN configuration), which is schematically depicted in Figure 140 for a third example of the communication System 700, the network components 300-1 are configured by the CNC 300-2 and the CUC 300-3 with network configuration information and user configuration information, respectively. In one implémentation, the CUC 300-3 may configure the network components to establish the TSN stream as soon as the TSN talker 100 is radio-connected to the RBS 200. In another impiementation that is combinable with the one implémentation, the TSN talker 100 is responsable for initialization of the at least one TSN stream, whiie quality requirements of the TSN talker 100 for the at least one TSN stream and/or the number of TSN streams for the TSN talker 100 is configured by the CUC 300-3. The fully centralized TSN configuration may be compatible or consistent with the document IEEE P802.1Qcc/D2.3.
[1068] The SI 712 is broadcasted by the RBS 200 to the UE 100 according to the steps 402 and 502. Altematively or additionally to the configuration message 722-1 and/or the configuration message 722-2, the RBS 200 is configured to broadcast the SI 712 according to the step 502 and to support the TSN stream according to the step 504 responsive to the configuration message 722-3 received from the CUC 300-3.
[1069] Optionally, e.g. in any of the three examples for the communication System 700, the SI 712 is transmitted on a broadcast channel of the RAN 710. The St 712 may (e.g., positiveîy) indicate the support of the TSN, e.g., without user and/or network configuration information. The UE 100 may receive the user and/or network configuration information on a downlink control channel from the RBS 200, by TSN-specific protocoîs and/orfrom the CN 710 (e.g., the device 300-1) using a ποη-access stratum (NAS) protocol. Altematively or in combination, the SI 712 may comprise (at least partly) the user and/or network configuration information.
[1070] The TSN communication between TSN talker (as an embodiment of the device 100) and TSN listener (which may or may not be a further embodiment of the device 100) happens in TSN streams. A TSN stream is based on certain requirements in terms of data rate and latency given by an application (TSN application) implemented at the TSN talker and the TSN listener. The TSN configuration and management features are used to setup the TSN stream and to guarantee the requirements of the TSN stream across the network.
[1071] In the distributed scheme (e.g., according to the first example in Figure 138), the TSN talker 100 and the TSN listener 100 may use the Stream Réservation Protocol
193 (SRP) to setup and configure the at least one TSN stream in every RBS 200 and/or every network component 300-1 (e.g., every switch) along the path from the TSN talker 100 to the TSN listener 100 in the TSN network. Optionally, some TSN features require the CNC 300-2 as a central management entity (e.g., according to the second example in Figure 139). The CNC 300-2 uses for example a Network Configuration Protocol (Netconf) and/or Yet Another Next Génération (YANG) models to configure the RBS 200 and/or the network components 300-1 (e.g., switches) in the network for each TSN stream. This also aliows the use of time-gated queuing as defined in IEEE 802.1Qbv that enables data transport in a TSN network with deterministic latency. With time-gated queuing on each RBS 200 and/or each network component 300-1 (e.g., switch), queues are opened or closed following a précisé schedule that aliows high priority packets to pass through the RBS 200 or network component 300-1 with minimum latency and jitter if it arrives at ingress port within the time the gâte is scheduled to be open. In the fuiiy centralized scheme (e.g., according to the ihird exampie in Figure 140) the communication system 700 comprises a CUC 300-3 as a point of contact for the TSN listener 100 and/or the TSN talker 100. The CUC 300-3 coîlects stream requirements and/or endpoint capabilities from the TSN listener 100 and/or the TSN talker 100. The CUC 300-3 may communicate with the CNC 300-2 directly. The TSN configuration may be impîemented as explained in the standard IEEE 802.1Qcc in detail.
[1072] Figure 141 shows a functional block diagram for a fourth example of a communication system 700 comprising embodiments of the devices 100, 200 and 300. The fourth example may further comprise any of the feature described for the first, second and/or third exampie, wherein like référencé signs refer ta interchangeable or équivalent features. An optional interworking between the 5G network (e.g., comprising the RAN 710 and the CN 730) and the TSN network architecture (e.g., the CNC 300-2 and the CUC 300-3) may be based on at least one of the control messages 722-2 and 722-3 from the CNC 300-2 and the CUC 300-3, respectively, e.g., as illustrated in Figure 141. At least one of the control messages 722-2 and 722-3 may be forwarded to the AMF 300-4 (in the CN 730) and/or to the RBS 200 (in the RAN 710) using a control plane of the 5G network. Altematively or in addition, the CN 730, e.g., the AMF 300-4, may implement at least one of the CNC 300-2 and the CUC 300-3.
[1073] The technique enables connecting TSN listener 100 and TSN ialker 100 wireiessly to a TSN network, e.g., using a 5G network as defined by 3GPP. The 5G standard defined by 3GPP addresses factory use cases through a plurality of features, especially on the RAN (e.g., providing 5G NR) to make it more reliabie and reduce the
194 transmit latency compared to an evolved UMTS radio access network (E-UTRAN, i.e,, the radio access technology of 4G LTE),
[1074] The 5G network comprises the UE 100, the RAN 730 instantiated as the gNB 200 and nodes 300-4 within the core network (5G CN). An exampie for the 5G network architecture is iliustrated on the left-hand side in Figure 141. An exampie for the TSN network architecture is iliustrated on the right-hand side in Figure 141
[1075] Both technologies, the 5G network and the TSN network, define own methods for network management and/or configuration. Different mechanisms to achieve communication determinism are arranged to enable end-to-end deterministic networking to support TSN streams, e.g., for industrial networks. A study item for upcoming 3GPP release 16 has been initiated in the 3GPP document RP-181479 to support TSN, e.g., for factory automation use cases.
[1076] Here, the UE 100 being the radio device connected to the RAN 710 (and thus to the 5G network) may also be referred to as a 5G endpoint. A device connected to the TSN network (also, TSN domain) may be referred to as a TSN endpoint
[1077] Despite what is shown in Figure 141, is also possible that the UE 100 is not connected to a single endpoint but instead to a TSN network comprising ai least one TSN bridge and at least one endpoint. The UE 100 is then part of a TSN-5G gateway.
[1078] The control plane of the 5G network may comprise at least one of a Network Repository Function (NRF), the AMF 300-4, a Session Management Function (SMF), a Network Exposure Function (NEF), a Policy Control Function (PCF), and a Unified Data Management (UDM).
[1079] A data plane of the 5G network comprises a User Plane Function (UPF), at least one embodiment of the RBS 200, and/or ai least one embodiment of the UE 100.
[1080] A TSN listener 1002 may be embodied by or performed (e.g., as an application) atthe UE 100. While the UE 100 opérâtes as or is used by the TSN listener 1002 in the fourth example of the communication System 700 shown in Figure 141, the UE 100 may altematively or additionally operate as a TSN talker in any example. Opiionally, a TSN ialker 1004 is embodied by another UE 100 connected through the same or another RBS 200 to the communication System 700.
[1081] The step 604 of the method 600 may be implemented acconding to at least one of the foilowtng variants (e.g,, in the contexi of any of the four examples of the communication System 700 in Figures 138 to 141). In a first variant, the CNC 300-2 configures the gNB 200 by sending the configuration message 722-2. în a second variant, the CUC 300-3 sends the configuration message 722-3 to the AMF 300-4 and, thereby, configures the gNB 200. For exampie, the AMF 300-4 forwards the configuration
195 message 722-3 to the gNB 200 or dérivés the configuration message 722-4 from the configuration message 722-3. in a third variant (not shown), the CUC 300-3 sends the configuration message 722-3 to the gNB 200. In a fourth variant (not shown), the CNC 300-2 sends the configuration message 722-2 to the AMF 300-4. Optionaily, e.g., in any of the variants, the AMF 300-4 implements at ieast one of the CNC 300-2 and the CUC 300-3.
[1082] Alternative^ or in addition, the CNC 300-2 sends the configuration message 722-2 to the network component 300-1 (e.g., a switch or a router) and, thereby, configures the gNB 200. For example, the network component 300-1 forwards the configuration message 722-2 to the gNB 200 or dérivés the configuration message 722-1 from the configuration message 722-2.
[1083] While the technique is described herein with embodiments in the context manufacturing and factory automation for clarity and concreteness, the technique may further be applicable to automotive communication and home automation.
[1084] Figure 142 shows a signaling diagram 1100 for TSN Stream Configuration invoiving exemplary embodiments of the device 100 (e.g., a UE 100 as the TSN talker and/or a UE 100 as the TSN listener) and exemplary embodiments of the device 300 (namely 300-1,300-2 and 300-3). While these multiple embodiments of the devices 100 and 300 are shown and described in combination, any subcombination may be realized. For exampie, only one of the network component 300-1, the CNC 300-2 and the CUC 300-3 may embody the device 300. Aitematively or in addition, only one of the TSN talker and the TSN listener may be an embodiment of the device 100.
[1085] The steps for the TSN Stream Configuration (e.g,, according to the signaling diagram 1100) may be performed afterthe UE 100 has decided to access (e.g., radioconnect and/or attach to) the RBS 200 (not shown in Figure 141 for simplicity) based on the SI received in the step 402. The siep 404 may initiate at least one of the steps for the TSN Stream Configuration.
[1086] Each UE 100 implementing a TSN talker or a TSN listener is radio-connected through an embodiment of the RBS 200 to at least one of the network component 300-1, the CNC 300-2 and the CUC 300-3. The UEs 100 may be radio-connected through the same RBS 200 or different RBSs 200. The TSN Stream Configuration may be compatible or consistent with iEEE S02.1Qcc,
[1087] The TSN Stream Configuration (i.e., setting up the at least one TSN stream in the TSN network) according to the fully centralized configuration scheme comprises at least one of the following steps.
196
[1088] In a first step 1102, the CUC 300-3 may take input from e.g. an indu stria! application or engineering tool (e.g. a programmable logic controller, PLC), which spécifiés for example the devices, which are supposed to exchange time-sensitive streams (i.e., TSN streams). The PLC may be adapted to contro! manufacturing processes, such as assembly lines, or robotic devices, or any activité' that requires high reliability control and/or ease of programming and process fault diagnosis,
[1089] In a second step 1104, the CUC 300-2 reads the capabilities of end stations and applications in the TSN network, which includes period and/or interval of user traffic and payload sizes,
[1090] In a third step 1106, based on this above information, the CUC 300-3 créâtes at least one of a StreamID as an identifier for each TSN stream, a StreamRank, and UsertoNetwork Requirements.
[1091] In a fourth step 1108, the CNC 300-2 discovers the physîcal network topology using, for exampîe, a Link Layer Discovery Protocol (LLDP) and any network management protocol.
[1092] In a fifth step 1110, the CNC 300-2 uses a network management protocol to read TSN capabilities of bridges (e.g., IEEE 802.1Q, 802.1AS, 802.1CB) in the TSN network.
[1093] In a sixth step 1112, the CUC 300-3 initiâtes join requests to configure the at least one TSN stream in order to configure network resources at the bridges 300-1 for a TSN stream from one TSN talker 100 to one TSN listener 100.
[1094] In a seventh step, a group of the TSN talker 100 and the TSN listener 100 (i.e., a group of éléments specifying a TSN stream) is created by the CUC 300-3, e.g., as specified in the standard IEEE 802.1 Qcc, clause 46,2.2,
[1095] In an eighth step 1114, the CNC 300-2 configures the TSN domain, checks physîcal topology and checks if the time sensitive streams are supported by bridges in the network, and performs path and schedule computation of streams.
[1096] In a ninth step 1116, the CNC 300-2 configures TSN features in bridges along the path in the TSN network.
[1097] In a tenth step 1118, the CNC 300-2 returns status (e.g., success or failure) for resulting resource assignment for the at least one TSN stream to the CUC 300-3. [1098] In an eleventh step 1120, the CUC 300-3 further configures end stations (wherein a protocol used for this information exchange may be out of the scope of the IEEE 802,1 Qcc spécification) to start the user plane traffic ex.change, as defined inîtially between the TSN listener 100 and the TSN talker 100.
197
[1099] !n the TSN network, the streamID is used to uniquely identity stream configurations. It is used to assign TSN resources to the TSN stream of a TSN talker. The streamID comprises the two tuples MacAddress and UniquelD. The MacAddress is associated with the TSN talker 100. The UniquelD distinguishes between multiple streams within end stations identified by the same MacAddress.
[1100] Any embodiment and implémentation of the technique may encode the SI 712 in dedicated information éléments in one or more SIBs. According to the step 402 and 502, a UE 100 is enabled to detect TSN features that are supported by the RBS 200 of the network and/or how they are supported. The UE 100 receives the SI 712 before it attaches to the network, and can check first by listening to an SIB message comprising the SI 712. The received SI 712 may be forward to the TSN application 1002 or 1004 the UE 100 is serving, and/or the UE 100 uses the SI 712 to setup a connection to the 5G network.
[1101] Any embodiment of the RBS 200 may implement the technique by including one or more SIBs and/or information éléments in SIBs for indicating to the UE 100 the TSN features and/orTSN configuration details supported by the 5G network, e.g,, specifically be the RBS 200.
[1102] Any embodiment of the UE 100 may implement the step 402 by reading the one or more SIBs and/or the information element included therein. Optionally, the included information as to supported TSN features and/or TSN configuration are forwarded to the TSN applications it is serving. Conditîonally, Le., depending on the features indicated as supported in the Si 712, the information is used to establish a connection to the RBS (e.g., to the 5G network).
[1103] An (e.g., expandable) example of a SIB block structure for the SI 712 in the steps 402 and 502 is outiined below using Abstract Syntax Notation One (ASN.1). The same information may also be included in the configuration message 722 of the method 600.
198
- ASN1START
SystemlnformationBlockType16-r11 ::: TSNFeatures = SEQUENCE{ SEQUENCE{
Time synchronisation Time Synchornisation accuracy Need OR Boolean Integer OPTIONAL,
FRER Boolean
TSN configuration details Crédit based shaper Time aware shaper Integer boolean boolean
Max. Latency added by 5G network integer} }
[1104] Furthermore, the S1B blocks may be adapted to future versions of TSN features by, for example, introducing reserved fields to be defined in frie future.
[1105] For end-to-end time synchronization (e.g., provisioning of an absolute time reference) muitiple ways of implémentation are possible. The SI 712 may comprise information about howihe time synchronization is treated by the RAN (e.g., the 5G network).
[1106] The FRER parameter refers to the redundancy features that are supported by the 5G network. In case the network does not support redundancy, there is no need to establish, e.g., redondant protocol data unit (PDU) sessions.
[1107] The TSN configuration may include the presence of the CUC 300-3 and/or the CNC 300-2 in the TSN network and/or spécifie TSN configuration schemes that are supported.
[1108] The Max. Latency added by 5G network parameter may be used to signal a QoS level in terms of latency and/or reliability that can be supported by the 5G network to the UE 100. A field representing this parameter may comprise a latency value (e.g., in miliiseconds) that can be guaranteed with a sufficient reliability or a classification value (e.g., non-rea!-time, real-time, hard-real-time or similar). The value may be indicated by a predefined index value. This information may be used by the UE 100 (or the endpoint 1002 or 1004 of the TSN network behind the UE 100) to find out before connection establishment if a connection to the RBS 200 (or the 5G network) will be able to support the requirements of the TSN application 1002 or 1004, or not.
[1109] The RBS 200 (e.g., a gNB) may further include a current cell load and/or other metrics into the calculation of that field. Opiionally, the SI 712 is indicative of a
199 traffic shaper support, which refers to a quality of service (QoS) that may be guaranteed by the RBS (e.g., the 5G network). For exemple, the SI 712 may be indicative of whether the shaper is based on crédit (e.g., data volume per time and UE) or a time aware shaper (TAS) for TSN.
[1110] Figure 143 shows a signaling diagram 1200 resulting from implémentations of the methods 400, 500 and 600 being performed by embodiments of the devices 100, 200 and 300, respectively. More specifically, the technique enables an embodiment of the UE 100 to become aware of TSN features supported by the network over the SI 712 included in one or more SIBs. While the signaling diagram 1200 (and the corresponding flowchart) for TSN stream configuration uses the fuliy centralized configuration scheme (e.g., as shown in Figure 140), the technique is readily applicable to other configuration schemes (e.g., as shown in Figure 138 or 139).
[1111] The implémentations of the methods 400, 500 and 600 enable the UE 100 to get aware of TSN features supported by the network and/or specifically by the RBS 200 over the one or more SIBs including the SI 712.
[1112] In the step 604, a 5G core function (e.g., the AMF 300-4) indicates by sending the configuration message 722 to spécifie RBSs 200 (e.g., gNBs) which TSN features (e.g., according to above non-exhaustive list) are supported or supposed to be enabled (e.g., only a subset of ail gNBs might support TSN) and how these TSN features are supported.
[1113] Responsive to the réception of the configuration message 722 (e.g., any of the above implémentations 722-1 to 722-4), the RBS 200 (e.g., a gNB) generates the SI 712 (e.g., the SIB block information as outlined above) and starts broadeasting the SI 712, e.g. overthe DL-SCH, in the step 502.
[1114] The UE 100 receives and/or reads the SI 712 in the SIB in the step 402. Optionally, the UE 100 transfers at least some of the information in the SI 712 to the TSN application 1002 or 1004, e.g., a list of the TSN features supported by the RBS 200, The TSN application 1002 or 1004 may request a TSN connection towards the UE 100, if the supported list of TSN features is sufficient, as an exampte for the conditionality or selectivity in the step 404.
[1115] For initiating the TSN stream in the step 404, the UE 100 goes into RRC connected mode if not aiready in that mode and requests a PDU session, which may be of Ethernet type. UE may further provide information by means of NAS signaling on which TSN features are required.
200
[1116] A TSN controlier (e.g., the CNC 300-2) receives a confirmation from the CN 730 and performs path computation and time scheduling. TSN stream communication sfarts, wherein the RBS 200 supports the TSN stream according to the step 504.
[1117] In any embodiment, the UE 100 may defer or refrain from requesting the RRC connection setup in the step 404, if the TSN application requires certain TSN features and the UE 100 did not receive in the SI B broadcast 402 that one or more of these features are supported, as an example for the conditionality or selectivity in the step 404.
[1118] in same or another embodiment, the UE 100 reads the SI 712 (i.e., the TSN information included in the one or more SiBs) of multiple RBSs 200 (e.g., gNBs) and selects the RBS 200, which best fulfills the TSN requirements of the UE 100. If ail RBS 200 fulfill the requirements, the UE 100 may act according to a sélection rule, e.g. seiecting the RBS 200 indicating the lowest latency,
[1119] In any embodiment, the UE 100 may store the SI 712 received in the step 402. The technique may be implemented as described up until and including the step 402. When the TSN application 1002 or 1004 requests a TSN communication (i.e., one or more TSN streams), the UE 100 uses the stored SI 712 to either setup the at least one TSN stream in the supported way or déclinés the TSN request if it is not supported.
[1120] The UE 100 may further use the SI 712 from the SIB, e.g., to initialize packet filtering of packets coming in for TSN transmission. Furthermore, the received Si 712 may be used to establish a default PDU session with the 5G network
[1121] Combination of TSN Support Détection and Header-Compression Techniques
[1122] Once more, as indicated above, the various techniques described herein may be combined with each other, to provide advantages with respect to latency, reliability, etc. For example, one particular combination that is advantageous is the combination of the techniques described above for detecting support for TSN and the techniques described for compressing headers of TSN frames.
[1123] Thus, for example, the method illustrated in Figure 135 can be combined with the method shown in Figure 133, resulting in a method performed by a wireless device associated with a wireless communications network, for transport of data packets associated with a data stream in an external data network. This method includes the step of receiving System information (SI) from a radio base station (RBS) of a radio access network (RAN), the SI being indicative of support for time-sensîtive networking (TSN) through the RBS, as shown at block 402 of Figure 135, as well as the step of establishing at least one TSN stream with the external data network, through the RBS, as shown at
201 block 404 of Figure 135. The method further includes the steps of obtaining configuration information for the TSN stream, the configuration information indicating respective values for one or more fields within a header of data packets associated with the TSN stream which are to remain static, as shown at block XX102 of Figure 133, and receiving, from the RBS, a data packet associated with the TSN stream, as shown at block XX104 of Figure 133. The method still further includes the step of adding the one or more fields to the data packet to generate a decompressed data packet, as shown at block XX106 of Figure 133.
[1124] In some embodiments, the SI is comprised in one or more system information blocks (SIBs). In some embodiments, the step of obtaining configuration information comprises receiving the configuration information from a network node of the wireiess communications network. The data packet may comprise an identifier for the TSN stream; in some embodiments, this identifier is added by the core network node.
[1125] In some embodiments, the compressed data packet is received as part of a protocol data unit (PDU) session or a quality of service (QoS) flow. In some of these embodiments, the identifier for the TSN stream is unique within the PDU session or QoS flow.
[1126] In some embodiments, the configuration information is transmiited to the wireiess device using non-access stratum (NAS) signaling. The configuration information may comprise an identifier for the TSN stream.
[1127] The method may further comprise, in some embodiments, obtaining updated configuration information for the TSN stream, where the updated configuration information comprises an indication of respective updated values for one or more fields within the header of data packets associated with the TSN stream which are to remain static. In these embodiments, the method may further comprise the step of utiîizing the updated configuration information to add the respective updated values for one or more fields to data packets received from the RBS. In some of these embodiments, the updated configuration information further comprises an indication of a sequence number identifying a data packet associated with the TSN stream from which the respective updated values apply.
[1128] Some embodiments may further include steps of the method shown in Figure
134. Such embodiments may include the step of obtaining a data packet associated with the TSN stream, as shown at block XX204 of Figure 134, as weîl as the step of removing the one or more fields from the data packet to generate a compressed data packet, as shown at block XX206 of Figure 134. The method may further include initiating
202 transmission of the compressed data packet over the extemal data network via a transmission to the RBS, as shown at block XX206 of Figure 134.
[1129] The step of obtaining configuration information may comprise receiving the configuration information from a core network node of the wireless communications network, in some embodiments, or receiving the configuration information from the extemal data network, in others. In some embodiments, the method further comprises initiating transmission, to a core network node of the wireless communications network, of an indication of the respective values for one or more fields within the header of data packets associated with the TSN stream which are to remain static, to enable the core network node to decompress the compressed data packet prior to its transmission over the extemal data network.
[1130] In some of these embodiments, the data packet comprises user data, and wherein the step of initiating transmission of the compressed data packet over the externai data network comprises forwarding the user data to a host computer over the extemal data network.
[1131] Combination of TSN Support Détection and Resource Scheduling Techniques
[1132] Once more, as indicated above, the various techniques described herein may be combined with each other, to provide advantages with respect to latency, reliability, etc. For example, one particular combination that is advantageous is the combination of the techniques described above for detecting support for TSN and the techniques described for compressing headers of TSN frames.
[1133] Thus, for example, the method illustrated in Figure 135 can be combined with the method shown in Figure 119, resulting in a method performed by a wireless device configurée! for communication with a radio access network, RAN, for scheduling resources in the RAN according to a transmission schedule associated with an extemal network. This method includes the step of receiving System information (Si) from a radio base station (RBS) of a radio access network (RAN), the SI being indicative of support for time-sensitive networking (TSN) through the RBS, as shown at block 402 of Figure 135, as well as the step of establishing at least one TSN stream with the externai data network, through the RBS, as shown at block 404 of Figure 135. The method further includes the steps of receiving, from the externai network, a transmission schedule associated with the TSN stream, as shown at block 1410 of Figure 119, and sending, sending, to a network associated with the RBS, a request to allocate radio resources for communication of the TSN stream between the wireless device and the RAN, as shown at block 1420 of Figure 119, where the request further comprises information related to
203 the transmission schedule. As shown at block 1430 of Figure 119, the method further comprises receiving, from the network, a response indicating whether radio resources can be allocated to meet the transmission schedule associated with the TSN stream.
[1134] In some embodiments, the transmission schedule comprises cycle times and gâte control iists for one or more traffic classes comprising the TSN stream. In some embodiments, if the response from the network indicates that radio resources cannot be allocated to meet the transmission schedule of the data stream, the response further comprises an indication of one or more further time Windows during which radio resources can be allocated. In some embodiments, the method further comprises, based on the response from the network, sending, to the external network, an indication of whether the transmission schedule can be met. In some of these embodiments, if the response comprises the indication of one or more further time Windows, the indication sent to the external network further includes information related to the one or more further time Windows.
[1135] In some embodiments, the network comprises a 5G core network (5GC), and the request is sent to and the response is received from an access management function (AMF) of the 5GC.
[1136] Support for Multiple Time Domains in 5G to Support TSN Transmission [1137] The inter-working of 5G and TSN is iilustrated in Figure 144. Both technologies defîne own methods for network management and configuration and different mechanisms to achieve communication determinism that must somehow be arranged to enable end-to-end deterministic networking for industrial networks. In the following the device connected to the 5G network is referred to as 5G endpoint. A device connected to the TSN domain is referred to as TSN endpoint.
[1138] Despiie what is shown in Figure 144 it is also possible that the UE is not connected to a single endpoint but instead to a TSN network comprising of at least one TSN bridge and at least one endpoint, The UE is then part of a TSN-5G gateway, [1139] It should be noted that the UPF of Figure 144 is assumed to support Précision Time Protocol (PTP) and can therefore be synchronized to a GrandMaster clock in the TSN network using PTP messages transported using UDP/IP (e.g. per IEEE 1588-2008).
[1140] The method by which the UPF subsequently forwards clock information (derived from the GrandMaster clock) to a gNB is considered to be implémentation spécifie.
204
[1141] The gNB can, if needed, send multiple instances of clock information derived from multiple sources (e.g. GPS based, GrandMaster based) to UEs using 5G network based methods.
[1142] Further distribution of clock information from a UE to one or more endpoints is possible (e.g. a UE in possession of clock information can serre as a source clockfor one or more endpoints).
[1143] Figure 144 can support two basic scénarios for ethemet P DU Processing. A first scénario is Ethemet PDUs relayed overthe 5G Network. This scénario assumes the case where a single UE needs to support multiple endpoints, each having a distinct ethernet MAC layeraddress (i.e. a UE supports multiple ethemet ports).
[1144] The UPF that interfaces with the TSN switch is assumed to support the réception and transmission of ethernet PDUs that do not carry IP packets as higher layer payload. Upon receiving an ethernet PDU from the TSN switch the UPF must hâve a method for associating the destination MAC address with a spécifie !P address and then relay the ethemet PDU to the appropriate node (e.g. PDN-GW) in the 5G network.The appropriate 5G network node uses the )P address to identify a spécifie UE and its corresponding RNTI so that the ethemet PDU can then be forwarded to the appropriate gNB for delivery using the identified RNTI.
[1145] The gNB sends the ethernet PDU to the UE using a data radio bearer (DRB) with relîability and latency attributes appropriate for supporting ethemet PDU transmission. The UE recovers the ethemet PDU (e.g. from the PDCP layer) and sends it to the endpoint associated with the destination MAC address (i.e. a UE may support one or more ethemet connected endpoints).
[1146] !n summary, the original ethemet PDU received by the UPF from the TSN switch is delivered transparently ihrough the 5G network.
[1147] For the uplink direction the 5G network is expected to détermine when a RNTI is associated with ethemet operation thereby allowing uplink payload (i.e. an ethernet PDU) associated with such a RNTI to be routed to a UPF. The UPF then simply sends the received ethemet PDU to a TSN switch.
[1148] A second scénario is Ethernet PDUs terminated at the 5G network. This scénario assumes the case where a single UE supports a single endpoint in which case there is no need for the UE to support any ethemet ports. The UPF that interfaces with the TSN switch is assumed to support the réception and transmission of ethernet PDUs thaï cany IP packets as higher layer payload.
[1149] Upon receiving an ethernet PDU from the TSN switch the UPF extracts the IP packet from the ethemet PDU and sends it to the appropriate 5G network node for further
205 routing. The 5G network uses the destination IP address to identify a spécifie UE and its corresponding RNTI so that the IP packet can be forwarded to the appropriate gNB for delivery using the identified RNTI.
[1150] The gNB sends the IP packet to the UE using a data radio bearer (DRB) with reliability and latency attributes appropriate for supporting ethemet PDU transmission (i.e. even though the ethemet PDU terminâtes at the UPF the 5G network must support ethernet like QoS attributes when delivering the IP packets carried by ethernet PDUs). The UE recovers the IP packet (e.g. from the PDCP layer) and sends it to the IP layer application.
[1151] In summary, the ethernet protocol layer is terminated when the ethemet PDU is received by the UPF from the TSN switch but its IP packet payload is delivered transparently inrough the 5G network.
[1152] For the upünk direction the 5G network is expected to détermine when a RNTI is associated with ethemet operation thereby aîlowing uplink payload (i.e. an IP packet) associated with such a RNTI to be routed to a UPF. The UPF must then hâve a method by which it can map source and destination IP addresses to source and destination MAC addresses (e.g. using ARP) so that it can construct an ethernet PDU containing those MAC addresses and the IP packet as payload for transmission to the TSN switch.
[1153] Many TSN features are based on précisé time synchronization between ali peers. As introduced above this is achieved using e.g. IEEE 802.1 AS or IEEE 802.1 ASrev. Within the TSN network it is therefore possible to achieve a synchronization with submicrosecond error. To achieve this level of accuracy a hardware support is mandatory, e.g. for timestamping of packets.
[1154] In a network, a grandmaster (GM) is a node that transmits timing information to ail other nodes in a master-slave architecture. It might be elected out of several potential nodes, by certain criteria that makes the selected grandmaster superior, [1155] In a TSN-extension of 802.1AS, it has been defined that next to a main GM also a redundant backup GM can be configured. In case the first GM fails for any reason, devices in the TSN domain can be synched to the second GM. The redundant GM might work in a hot-standby configuration.
[1156] In TSN based on IEEE 802,1 AS-rev (also called gPTP, generalized Précisé Timing Protocol) there are multiple time domains supported in a TSN network. One time domain could be a global time domain based on for example the PTP epoch, and other might be local time domains with an arbitrary epoch. There are two timescales which are supported by gPTP,
206 • Timescale RTF: The epoch is the PTP epoch (details in IEEE 802.1 AS-rev section 8.2.2) and this timescale is continuous. The unit of measure of the time is the SI second as realized on the rotating period.
• Timescale ARB (arbitrary): the epoch for this timescale is domain startup time and can be Setup by administrative procedure (more details in IEEE 802.1AS-rev, section 3.2)
[1157] Devices in a TSN network can be synched to multiple time domains. A local arbitrary time domain is also referred to as a working dock. Working docks are used in industrial networks for TSN fonctions.
[1158] One ofthe initial steps for setting up the TSN stream is establishîng of a TSN domain by the CNC, by grouping endpoints (talkers and listeners) that are supposed to exchange time-sensîtive streams. This list is provided by CUC to the CNC. The CNC further configures the bridges connecting these endpoints such that each TSN domain (talkers, listeners and bridges) has its own working dock. Technically this can be done according to IEEE 802.1AS-rev, by configuring externa! port rôle configuration, mechanism.
[1159] Multiple time domains in industrial application scénario is now described. As introduced above, a TSN domain works with different docks (global and working docks). Furthermore, the docks of each TSN domain are not necessarily synchronized and a factory network might comprise of several TSN domains. Therefore, across a factory network it there might be several independent TSN domains with arbitrary timescales where different maybe overlapping subsets of devices need to be synchronized to. As shown in Figure 145, each TSN domain can hâve their own working dock.
[1160] To satisfy time synchronization requirements for TSN in manufacturing use cases, a cellular network is required to provide a time reference to which ail machines (sensor or actuators) can be synchronized.
[1161] Currentîy in 3GPP standardization, efforts are seen to realize a time synchronization over the LTE radio access in Release 15.
[1162] in one possible approach, two Information Eléments (IE) are added into SI B 16, Le., a time reference with 0.25ps granularity and uncertainty value, and thë DL RRC message U ETime Reference to inform GPS time to the UE with three lEs added in RRC message. The main purpose of this procedure is to transfer GPS based time reference information to UEs along with inaccuracy of that information.
[1163] LTE defines several System information blocks (SIBs), related to timing information in SIB 16, which contains information related to GPS time and coordinated universal time (UTC). SIBs are transmitted over Downlink shared channel (DL-SCH). The
207 presence of a SIB in the subframe is indicated by the transmission of a corresponding PDCCH marked with a spécial System-information RNTI (SI-RNTI). The IE SIB 16 contains information reiated to GPS time and UTC. The UE uses the parameter biocks to obtain the GPS and the local time.
[1164] This is the structure of a SIB 16 message:
- ASN1START \SystemlnformationBlockType16-r11 ::= SEQUENCE { timeînfo-r11 SEQUENCE { timeînfoUTC-r11 INTEGER (0..549755813887), dayLightSavingTime-r11 BIT STRING (SIZE (2)) OPTIONAL, - Need OR ieapSeconds-r11 INTEGER (15 127..128) OPTIONAL, - Need OR loca!TimeOffset-r11 INTEGER (-63..64)
OPTIONAL - Need OR } OPTIONAL, - Need OR 20 lateNonCriticalExtension OCTET STRING
OPTIONAL, [[ granuîarityOneQuarterUs-r15 INTEGER (0..36028797018963967) OPTIONAL, - Need OR 25 uncert-quarter-us-r15 INTEGER (0..3999)
OPTIONAL ]] } [1165] The information éléments are defined in Table 22
208
Γ SysteminformationBlockTypel 6 field descriptions i
I dayLightSavingTime j it indicates if and how daylight saving time (DST) is applied to obtain the local time. The semantics is the same as the semanticsof the Daylight Saving Time IE inTS 24.301 [35] and TS 24.008 [49], The firsi/leftmost bit of the bit string conta in s the b2 of octet 3, i.e. the value part of the Daylight Saving Time IE, and the second bit of the bit string contains b1 of octet 3.
leapSeconds
Number of leap seconds offset between GPS Time and UTC. UTC and GPS time are reiated i.e. GPS time -leapSeconds = UTC time. i locaiTimeOffset ï i Offset between UTC and local time in units of 15 minutes. Actua! value - field value * 15 j minutes. Local time of the day is calculated as UTC time + locaiTimeOffset.
granuiarityOneQuarterUs
Coordinated Universal Time corresponding to the SFN boundary at or immediately after the ending boundary of the Sl-window in which SystemlnformationBlockType16 is transmitted. This field counts the number of GPS time in 0.25 us units since 00:00:00 on j Gregorian calendardate 6 January, 1980 (start of GPS time). ί timelnfoUTC
Coordinated Universal Time corresponding to the SFN boundary at or immediately after the ending boundary of the Sl-window in which SysteminformationBlockTypel6 is transmifted. The fieid counts the number of UTC seconds in 10 ms units since 00:00:00 on Gregorian calendardate 1 January, 1900 (midnight between Sunday, December 31, 1899 and Monday, January 1, 1900). NOTE 1.
This field is excluded when estimating changes in system information, i.e. changes of timelnfoUTC should neither resuit in system information change notifications nor in a modification of systemlnfoValueTag in SIB1.
uncert-quarter-us
J
Indicates the uncertainty of the reference time, where a value of ‘k1 indicates an uncertainty of ± 0,25 (k+1) us, i.e., ‘0’ indicates an uncertainty of ±0.25us, a value of ‘T indicates an uncertainty of ± 0.5us, and so on. The UE uses the value of this field to détermine how to interpret the value of the granuiarityOneQuarterUs field. For example, if uncert-quarter-us = ‘3’ then the uncertainty is 2us and the UE will interpret the value of the granuiarityOneQuarterUs field to be within the range granuiarityOneQuarterUs ± 2us.
Table 22 - Proposed System Information Block Type 16
209
[1166] The time reference information message in RRC signating may also be used to transmit the GPS time to the UE.
[1167] Certain probiems exist. For example, as per the state-of-art, a UE can only be synchronized to one clock that is supported by the 8S (e.g. eNB) to which it is connected. The main issue here is, that the clock used to provide time reference over 3GPP radio can be differentthan working clock (arbitrary GM clock) used to provide a time reference to a TSN domain. Currently there is no such mechanism to provide a TSN domain time clock that is not synchronized with a clock being used for time reference transmission from BS to UE.
[1168] Also, another issue îs, if the UE is used as a TSN-Cellular gateway it might further be possible that an independent clock grandmaster is présent on the UE-side of the cellular network. The TSN application is then connected to the time-synchronization source instead of the BS for the TSN network to work. In this scénario also, currently there is no way the UE might transfer this timing information to other peers within the cellular network.
[1169] Certain aspects of the présent disclosure and their embodiments may provide solutions to these or other challenges. For exampie, according to certain embodiments, a method is provided to aîîow the establishment of multiple time domains on both, BS or UE sides based on a précisé cellular network synchronization. The cellular network is thereby able to support, for example, two or more different time domains (e.g. a global clock and a working clock) towards a TSN application residing in a UE i.e. an application which is based on the receiving time synchronization information from a BS. Furthermore, the current invention provides a method whereby, in a cellular network, the UE can signal a time to the BS if a working clock GM is présent on the UE-side and whereby the UE might be required to connect (i.e. provide précisé cellular network synchronization information to) other TSN equipment located in the same TSN domain.
[1170] Certain embodiments may provide one or more of the following technical advantages. For example, one technical advantage may be that certain embodiments allow end-to-end time synchronization with multiple time-domains based on a single précisé time reference signaiing over the air. The efforts to support the additional timedomains are reduced due to the methods proposed herein.
[1171] In some embodiments, a more general term network node may be used and may correspond to any type of radio network node or any network node, which communicaies with a UE (directly or via another node) and/or with another network node. Examples of network nodes are NodeB, MeNB, ENB, a network node belonging to MCG
210 or SCG, base station (BS), muiti-standard radio (MSR) radio node such as MSR BS, eNodeB, gNodeB, network controller, radio network controller (RNC), base station contrôler (BSC), reiay, donor node controliing relay, base transceiver station (BTS), access point (AP), transmission points, transmission nodes, RRU, RRH, nodes in distributed antenna System (DAS), core network node (e.g. MSG, MME, etc), O&M, OSS, SON, positioning node (e.g. E-SMLC), MDT, test equipment (physical node or software), etc.
[1172] In some embodiments, the non-limiting term user equipment (UE) or wireless device may be used and may refer to any type of wireless device communicating with a network node and/or with another UE in a cellular or mobile communication System. Examples of UE are target device, device to device (D2D) UE, machine type UE or UE capable of machine to machine (M2M) communication, PDA, PAD, Tablet, mobile terminais, smart phone, laptop embedded equipped (LEE), laptop mounted equipment (LME), USB dongles, UE category Ml, UE category M2, ProSe UE, V2V UE, V2X UE, etc.
[1173] Additionally, terminologies such as base station/gNodeB and UE should be considered non-limiting and do in particular not imply a certain hierarchical relation between the two; in general, gNodeB” could be considered as device 1 and “UE” could be considered as device 2 and these two devices communicate with each other over some radio channel. And in the following the transmitter or receiver could be erther gNB, or UE.
[1174] According to certain embodiments, a method is provided by which a UE can synchronise to one or multiple TSN domain working clocks based on a time synchronisation solution. Further, the solution is extended to support a device (which is connected to a TSN domain over a cellular link) getting synchronized with a working clock of the TSN domain running behind the UE (here UE acts as a TSN gateway). Also, in case a relevant GM clock is deployed on the UE side, the UE might be able to signal this clock signal to the cellular network such as, for example, a base station (BS). The cellular network might forward this info to a TSN endpoint or network it is connected to.
[1175] Herein, it is assumed that there is a mechanism to synchronize UEs to a BS in a cellular network with a sufficient précision. Fora TSN end-to-end synchronization that is required by TSN features (for e.g. time aware traffic scheduler) this error might be in the order of 1 microsecond. Usually, the synchronization in the cellular network based on a common global clock from a trusted source available such as a GPS signal.
211
[1176] It is assume herein that the errer for the 5G synchronisation signa! is sufficiently small to support the desired working clock accuracies for TSN communication. Figure 146 illustrâtes how a BS can synchronise a UE to a cellular reference time.
[1177] According to certain embodiments, the methods introduced are exemplified by three scénarios described below and shown in Figures 147-149. The Devices (Dev x) are assumed to be TSN endpoints, the GMs are TSN endpoints acting as a clock GM for the TSN network,
[1178] Specifically, Figure 147 illustrâtes a scénario where a Device (Dev 1) is assumed to be connected over a ceiiular link to a TSN domain. This TSN domain can hâve its working clock (GM). The cellular network is providing time reference information to UE over dedicated RRC signaiing or with enhanced SI B block (as explained in above sections), based on e.g. GPS. According to certain embodiments, a method is proposed by which Dev 1 gets information on a TSN working clock which is based on the time reference that is already provided by the cellular network and based en e.g. GPS.
[1179] Figure 148 is a shop floor scénario assuming a TSN domain which is connected to a v.irtual controller (Dev 2) over a cellular link. Here the challenge is, how Dev 2 can be synchronized to the working clock (GM) of the TSN domain connected via UE. We propose a method that enables the UE to be able to communicate this local working clock of the GM to the BS and Dev 2 respectively.
[1180] Figure 149 illustrâtes the thîrd scénario, where we assume two TSN networks connected over a Cellular link. The first part of the network considered as backbone of the cellular network and the other part assumed as a shop floor. The GM clock can be either on the backbone or on the shop floor side of the network. It is a generic combination of scénario a) and b).
[1181] To address the challenges exemplified in the three scénarios above, this invention defines two methods as embodiments:
[1182] Method 1; A method at BS to measure the timing offset and déviations between a common cellular reference timing signal (e.g. based on GPS) and various other timing signais (like e.g. working docks of a TSN GM). This offset might be mapped 30 to a TSN domain. The offset can be transmitted to a UE over dedicated RRC signaiing or can be broadeasted using SI B blocks information éléments (in case of broadeast over SIB, offset value need to be mapped with TSN domain identification parameter). A UE wiiî use this offset to re-establish the original time signai based on the common cellular reference time. The UE might then provide this time to a TSN application. Figure 150 35 illustrâtes the procedure of method 1.
212
[1183] Method 2: A UE method to measure the timing offset and déviations between a common cellular reference timing signal (e.g. based on GPS) it is receiving from a cellular network and various other timing signais like different working docks it is receiving from different TSN domains or from a single TSN domain that it is a part of, Here the UE acts as a gateway between a TSN network (including a TSN dock grandmaster) and the cellular network. The UE will transmit this offset to a BS e.g. over RRC signaling. The BS uses this offset to re-establish the original time signal (i.e, corresponding to the TSN network the UE is a part of) based on the common cellular reference time, The BS then might provide this additional time signal to applications operating with same TSN domain. Figure 151 illustrâtes the procedure of method 2, according to certain embodiments,
[1184] Both methods consider a periodic signaling of time-offsets to communicate to other side of the cellular network about the timing offsets to be abie to support multiple time domains,
[1185] Method one will now be described in more detail. The base assumption of the procedure of method 1 is that, the epoch of the working dock and 5G time reference are the same or negotiated between UE and BS beforehand or the epoch of the additional time signais are arbitrary. Furthermore, the docks used at UE and BS are of sufficient précision to support the time signais. Also, the UE is sufficiently synchronized to the BS to the common cellular reference time. Both, UE and BS might be equipped with multiple docks and relevant functionality to support different time signais in paralleî,
[1186] Figure 152 illustrâtes the sequence flow for method 1, according to certain embodiments. The sequence for method 1 is also provided as follows:
• A GM dock (from TSN network) provides a local time reference to a BS in the cellular network • The BS in the cellular network calculâtes the offset by comparing the received local time reference from GM. with the cellular reference time (e.g. a global GPS based cellular reference time) that is periodically transmitted to UEs • The calculated offset aîong with other necessary information (e.g. epoch, TSN domain number, time domain identifier) is delivered to one or multiple UE(s) over e.g, a dedicated RRC signal ♦ UE(s) décodé the offset and adjusts the local time reference per the indicated offset before providing it to e.g., a TSN device, a bridge or a TSN endpoint.
[1187] According to certain embodiments, the embodiment of method 1 ai'lows the définition of multiple time domains for the cellular UEs. As such, a cellular reference time (e.g, based on GPS) is broadcasted to ail UEs.
213
[1188] Additionally, TSN domain spécifie working times are estabüshed between BS and UEs by transmission of time offsets to individual UEs. The offsets will be calculated at the BS based on the common broadeasted cellular reference time.
[1189] According to a particuiar embodiment, the BS transmits by broadeasts or unicast the offsets aiong with TSN domain identifiers to the UEs in the given domain. The UEs identify their required TSN domain (or are configured to use a spécifie TSN domain) and, thus, considerthe time offset corresponding to that TSN domain to tune their ciocks to the spécifie TSN domain working time/local reference time i.e. considering the cellular reference time plus the spécifie time offset.
[1190] In Figure 150, method 1 is explained, assuming a 5G cellular network and one additional time signal from a TSN domain in the backbone. According to certain embodiments, the BS broadeasts the cellular reference time (10:00, 10:10,10:20 ...) at defined points in time to ail UEs; in addition, the BS wiil also transmit a TSN-domain spécifie working clock to UE1 by signaling the offset to the cellular reference time. Compared to the baseline cellular reference time synchronization method between BS and UE, the requirements for the transmission of the offsets is lowered as a calculation of the transmission and processing times is not necessary. Still, the offsets need to be communicated with sufficient periodicity and an indication of uncertainty/accuracy.
[1191] Figure 153 illustrâtes the sequence flow for method 2, according to certain embodiments. The steps for method 2 are also provided as follows:
• A UE receives a working clock time reference directiy from the TSN network it is connected to, then the UE compares this time reference with the cellular time reference received from BS in order to calculate an individual offset.
• UE further delivered the calculated offset to BS, e.g. by RRC signaling. The BS receive the offset message from UE and adjusts a time reference based on the received offset from UE. Subsequently, BS sends the modified time reference to a TSN device on the cellular network as described in the scénario 2. This way the TSN device on the network side is tuned to the TSN working time instead of the cellular reference time.
[1192] Method 2 is based on the same assumptions as method 1.
[1193] In Figure 151, method 2 is explained, assuming a 5G cellular network and one additionaï time signai from a TSN domain on the UE side. in a particuiar embodiment, method 2 might inciude the need to hâve multiple ciocks at the BS or a core network function that uses the offsets to calculais working ciocks for TSN networks based on the cellular reference time that supports multiple ciocks in parailei.
214
[1194] According ta certain other embodiments, receiver-side offset calculation using timestamps may be performed. Specifically, the described solution may be used, for example, to transmit a PTP time information from an external grand master between UE and gNB in a tîme-aware manner. Therefore, a common reference time is used to evaluate the variable time t_d it took to transmit the packet from one layer at one of both nodes, to another layer at the other node.
[1195] The common reference time between UE and gNB is used to estimate t_d. As already explained above PTP is often used in industrial context to synchronize Systems. This mechanism of course also works the other way around where the UE is synched to a PTP grandmaster. This transmission of ptp packets could be done transparently to the extemal PTP devices or by letting the UE and gNB jointly act like a boundary clock. Important to mention ts that the timestamping in this case is not required in a round-way fashion as done in PTP to calculate the roundtrip delay - it can happen at a higher layer and only the one way dslay t_d is required as both UE and gNB already hâve a sufficiently synchronization as a baseline
[1196] This is iüustrated in Figure 154 for a gNB to UE sync.
[1197] ln view of the detailed explanation just provided, it will be appreciated that Figure 155 depicts a method 2600 performed by a wireless device for reducing déviations between a common cellular reference timing signal, according to certain embodiments. The method begins at step 2602 when the wireless device receives a first timing signai from a cellular network. At step 2604, the wireless device receives a second timing signal from at least on TSN to which the wireless device is connected. The first timing signal is compared to the second timing signal to détermine an offset, at step 2606. At step 2608, the wireless device transmits the offset to a network node.
[1198] Figure 156 illustrâtes a schematic block diagram of a Virtual apparatus 2700 in a wireless network. The apparatus may be implemented in a wireless device or network node. Apparatus 2700 is opérable to cany out the example method described with reference to Figure 155 and possibly any other processes or methods disclosed herein. It is also to be understood that the method of Figure 155 is not necessarily carried out solely by apparatus 2700. At least some operations of the method can be performed by one or more other entities.
[1199] Virtual Apparatus 2700 may comprise processing cîrcuitry, which may include one or more microprocessor or microcontrollers, as well as other digital hardware, which may include digital signal processors (DSPs), special-purpose digital Iogic, and the like. The processing circuitry may be confîgured to execute program code stored in memory, which may include one or several types of memory such as read-only memory (ROM),
215 random-access memory, cache memory, flash memory devices, optical storage devices, etc. Program code stored in memory includes program instructions for executing one or more télécommunications and/or data communications protocols aswell as instructions for carrying out one or more of the techniques described herein, in several embodiments. In some implémentations, the processing circuitry may be used to cause first receiving module 2710, second receiving module 2720, comparing module 2730, transmitting module 2740, and any other suitable units of apparatus 2700 to perform corresponding functions according one or more embodiments of the présent disclosure.
[1200] According to certain embodiments, first receiving module 2710 may perform certain of the receiving functions of the apparatus 2700. For example, first receiving module 2710 may receive a first timing signal from a cellular network.
[1201] According to certain embodiments, second receiving module 2720 may perform certain other of the receiving functions of the apparatus 2700. For example, second receiving module 2720 may receive a second timing signal from at least on TSN to which the wireless device is connected.
[1202] According to certain embodiments, comparing module 2730 may perform certain of the comparing functions of the apparatus 2700. For example, comparing module 2730 may compare the first timing signal to the second timing signal to détermine an offset.
[1203] According to certain embodiments, transmitting module 2740 may perform certain of the transmitting functions of the apparatus 2700. For example, transmitting module 2740 may transmit the offset to a network node.
[1204] The term unit may hâve conventional meaning in the field of eîectronics, electrical devices and/or electronic devices and may include, for example, electrical and/or electronic circuitry, devices, modules, processors, memcries, logic solid state and/or discrète devices, computer programs or instructions for carrying out respective tasks, procedures, computations, outputs, and/or displaying functions, and so on, as such as those that are described herein.
[1205] Figure 157 depicts a method by a network node such as, for example, a base station for reducing déviations between a common cellular reference timing signal, according to certain embodiments. The method begins at step 2802 when the network node transmiis, to a wireless device, a first timing signai for a celiuîar neiwork. At 2804, the network node receives, from the wireless device, an offset measured by the wireless device, The offset is based on a différence between the first timing signal for the cellular network and a second timing signal associated with at least on time sensitive network (TSN) to which the wireless device is connected. Based on the offset received from the
216 wireless device, a third timing signal for the cellular network is determined at step 2806. The third timing signal is an adjusted time signal of the first timing signal. At step 2808, the network node transmits, to the wireless device, the third timing signai network node.
[1206] Figure 158 illustrâtes a schematic block diagram of a Virtual apparatus 2900 in a wireless network. The apparatus may be impîemented in a wireless device or network node. Apparatus 2900 is opérable to carry out the example method described with reference to Figure 157 and possibly any other processes or methods disclosed herein. It is also to be understood that the method of Figure 157 is not necessariîy carried out solely by apparatus 2900. At least some operations of the method can be performed by one or more other entities.
[1207] Virtual Apparatus 2900 may comprise processing circuitry, which may include one or more microprocessor or microconirollers, as well as other digital hardware, which may include digital signal processors (DSPs), special-purpose digital logic, and the iike. The processing circuitry may be configured to execute program code stored in memory, which may include one or several types of memory such as read-only memory (ROM), random-access memory, cache memory, flash memory devices, optical storage devices, etc. Program code stored in memory includes program instructions for executing one or more télécommunications and/or data communications protocols as well as instructions for carrying out one or more of the techniques described herein, in several embodiments. In some implémentations, the processing circuitry may be used to cause first transmitting module 2910, receiving module 2920, determining module 2930, and second transmitting module 2940, and any other suitable units of apparatus 2900 to perform corresponding fondions according one or more embodiments of the présent disclosure.
[1208] According to certain embodiments, first transmitting module 2910 may perform certain of the transmitting fonctions of the apparatus 2900. For example, first transmitting module 2910 may transmit, to a wireless device, a first timing signal for a cellular network.
[1209] According to certain embodiments, receiving module 2920 may perform certain of the receiving fonctions of the apparatus 2900. For example, receiving module 2920 may receive, from the wireless device, an offset measured by the wireless device. The offset is based on a différence between the first timing signal for the cellular network and a second timing signal associated with at least on time sensitive network (TSN) to which the wireless device is connected.
[1210] According to certain embodiments, determining module 2930 may perform certain of the determining fonctions of the apparatus 2900. For example, determining
217 module 2930 may détermine a third timing signal for the cellular network based on the offset received from the wireless device.
[1211] According to certain embodiments, second transmitting module 2940 may perform certain other of the transmitting functions of the apparatus 2900. For example, second transmitting module 2940 may transmit, to the wireless device, the third timing signal network node.
[1212] The term unit may hâve conventional meaning in the field of electronics, electrical devices and/or electronic devices and may include, for example, electrical and/or electronic circuitry, devices, modules, processors, memories, logic solid State and/or discrète devices, computer programs or instructions for carrying out respective tasks, procedures, computations, outputs, and/or dispiaying functions, and so on, as such as those that are described herein.
[1213] Figure 159 depicts a method 3000 performed by a wireless device for reducing déviations between a common cellular reference timing signal, according to certain embodiments. The method begins at step 3002 when the wireless device receives a first timing signal from a cellular network. At step 3004, the wireless device receives a second timing signal from at least one time sensitive network (TSN). At step 3006, the wireless device receives, from a network node associated with the cellular network, an offset measured by the network node. The offset is based on a différence between the first timing signal for the cellular network and the second timing signal from the at least one TSN. The offset is used to reduce a déviation between the first time signal and the second time signai, at step 3008.
[1214] Figure 160 illustrâtes a schematic block diagram of a Virtual apparatus 3170 in a wireless network. The apparatus may be implemented in a wireless device or network node. Apparatus 3100 is opérable to carry out the example method described with reference to Figure 159 and possibly any other processes or methods disclosed herein. It is also to be understood that the method of Figure 159 not necessariiy carried out solely by apparatus 3100. At least some operations of the method can be performed by one or more other entities.
[1215] Virtual Apparatus 3100 may comprise Processing circuitry, which may include one or more microprocessor or microcontroliers, as well as other digital hardware, which may include digital signal processors (DSPs), special-purpose digital logic, and the like. The Processing circuitry may be configured to execute program code stored in memory, which may include one or several types of memory such as read-only memory (ROM), random-access memory, cache memory, flash memory devices, optical storage devices, etc. Program code stored in memory includes program instructions for executing one or
218 more télécommunications and/or data communications protocols as well as instructions for canying out one or more of the techniques described herein, in severaî embodiments. In some implémentations, the processing circuitry may be used to cause first receiving module 3110, second receiving module 3120, third receiving module 3130, using module 3140, and any other suitable units of apparatus 3100 to perform corresponding fonctions according one or more embodiments of the présent disclosure.
[1216] According to certain embodiments, first receiving module 3110 may perform certain of the receiving functions of the apparatus 3100. For example, first receiving module 3110 may receive a first timing signal from a cellular network.
[1217] According to certain embodiments, second receiving module 3120 may perform certain other of the receiving functions of the apparatus 3100. For exampie, second receiving module 3120 may receive a second timing signal from at least on time sensitive network (TSN).
[1218] According to certain embodiments, third receiving module 3130 may perform certain other of the receiving functions of the apparatus 3100. For example, third receiving module 3130 may receive, from a network node associated with the cellular network, an offset measured by the network node. The offset is based on a différence between the first timing signal for the cellular network and the second timing signal from the TSN.
[1219] According to certain embodiments, using module 3140 may perform certain of the using functions of the apparatus 3100. For example, using module 3140 may use the offset to reduce a déviation between the first time signal and the second time signal. [1220] The term unit may hâve conventional meaning in the field of électronics, electrical devices and/or electronic devices and may include, for example, electrical and/or electronic circuitry, devices, modules, processors, memories, logic solid State and/or discrète devices, computer programs or instructions for canying out respective tasks, procedures, computations, outputs, and/or displaying functions, and so on, as such as those that are described herein.
[1221] Figure 161 depicts a method by a network node such as, for example, a base station for reducing déviations between a common cellular référencé timing signal, according to certain embodiments. The method begins at step 3202 when the network node receives a second timing signal from at least on time sensitive network (TSN). At step 3204, the network node performs a comparison the second timing signal to a first time signal fora cellular network. Based on the comparison, an offset comprising a différence between the first timing signal for the cellular network and a second timing
219 signal from the TSN is determined at step 3206. At step 3208, the offset is transmitted to a wireless device connected to the TSN.
[1222] Figure 162 illustrâtes a schematic block diagram of a Virtual apparatus 3300 in a wireless network. The apparatus may be implemented in a wireless device or network node. Apparatus 3300 is opérable to carry out the example method described with reference to Figure 161 and possibly any other processes or methods disclosed herein. It is also to be understood that the method of Figure 161 is not necessarily carried out solely by apparatus 3300. At least some operations of the method can be performed by one or more other entities.
[1223] Virtual Apparatus 3300 may comprise processing circuitry, which may include one or more microprocessor or microcontrollers, as well as other digital hardware, which may include digital signal processors (DSPs), special-purpose digital logic, and the like. The processing circuitry may be configured to execute program code stored in memory, which may include one or several types of memory such as read-only memory (ROM), random-access memory, cache memory, flash memory devices, optîcal storage devices, etc. Program code stored in memory includes program instructions for executing one or more télécommunications and/or data communications protocols as well as instructions for carrying out one or more of the techniques described herein, in several embodiments. In some implémentations, the processing circuitry may be used to cause receiving module 3310, performing module 3320, determining module 3330, and transmitting module 3340, and any other suitable units of apparatus 3300 to perform corresponding fonctions according one or more embodiments of the présent disclosure.
[1224] According to certain embodiments, receiving module 3310 may perform certain of the receiving fonctions of the apparatus 3300. For example, receiving module 3310 may receive a second timing signal from at least on time sensitive network (TSN). [1225] According to certain embodiments, performing module 3320 may perform certain of the performing fonctions of the apparatus 3300. For example, performing module 3320 may perform a comparison the second timing signal to a first time signal for a cellular network.
[1226] According to certain embodiments, determining module 3330 may perform certain of the determining fonctions of the apparatus 3300. For example, determining module 3330 may an offset comprising a différence between the first timing signai for the cellular network and a second timing signal from the TSN based on the comparison.
[1227] According to certain embodiments, transmitting module 3340 may perform certain of the transmitting fonctions of the apparatus 3300, For example, transmitting module 3340 may transmit the offset to a wireless device connected to the TSN.
220
[1228] Combination of TSN Détection and Support for Multiple Time Domains
[1229] Again, as indicated above, the various techniques described herein may be combined with each other, to provide advantages with respect to iatency, reliability, etc. For example, one particular combination that is advantageous is the combination of the techniques described above for detecting support for TSN and the techniques described just above for supporting multiple time domains.
[1230] Thus, forexample, the method iilustrated in Figure 135 can be combined with the method shown in Figure 155, resulting in a method performed by a wireless device associated with a wireless communications network. This method includes the step of receiving System information (SI) from a radio base station (RBS) of a radio access network (RAN), the SI being indicative of support for time-sensitive networking (TSN) through the RBS, as shown at block 402 of Figure 135, as well as the step of establishing at least one TSN stream with the external data network, through the RBS, as shown at block 404 of Figure 135. The method further includes the steps of receiving a first timing signal from the wireless communications network, via the RBS, as shown at block 2602 of Figure 155, and receiving a second timing signal from the external TSN data network to which the wireless device is connected, as shown at block 2604 of Figure 155. As shown at blocks 2606 and 2608 of Figure 155, the method still further comprises comparing the first timing signal to the second timing signal to détermine an offset and transmitting the offset to the wireless communications network.
[1231] In some of these embodiments, the SI is comprised in one or more System information blocks (SIBs). In some embodiments, the first timing signai comprises a cellulartime reference. In some embodiments, the second timing signal comprises a working clock time reference. !n some embodiments, the offset is a measurement of a différence in time between the first timing signal and the second timing signal. In some embodiments, the offset is transmitted to the wireless communications network via RRC signaling.
[1232] Some embodiments may further comprise the step of receiving, from the RBS, a third timing signal from the wireless communications network, the third timing signa! being an adjusted time signal of the first timing signal.
[1233] In some embodiments, the method further comprises adjusting a local time réference based on the offset. !n some embodiments, the method further comprises transmitting the offset to the external TSN data network. The method may further comprise transmitting at least one of an epoch, a TSN domain number, a time domain identifier to at least one of the RBS and the external TSN data network.
[1234] Prioritizing Grants
221
[1235] Uplink (UL) traffic can be scheduled with dynamic UL grants or configured UL grants. In case of dynamic grants, the gNB provides an UL grant to the UE for each UL transmission. Configured grants are pre-ailocated, i.e. provided once to the UE, thereafter the configured UL grant is valid for usage for UL transmissions according to a configured periodicity. The UE does not need to transmit padding on those UL resources if no UL data is available for transmission, i.e. may skip an UL transmission on such grants.
[1236] A typical NR-loT device would handle communication for multiple service types, e.g. periodic Ultra-reliable low latency communication (URLLC) type robot control messages, URLLC type of occasion al alarm signais, for which periodic resources would need to be configured, occasional sensor data transmission, other mobile broadband (MBB) type traffic such as occasional video transmissions or software updates. It would lead to a traffic mix to be mulîiplexed by the UE for UL transmissions, i.e. on media access control (MAC) multiple logical channels with different priorities would need to be configured.
[1237] Periodic URLLC traffic must be delivered within a deterministic latency, i.e., robust transmissions must be guaranteed which is costly in terms of resource usage. On the other hand, sensor/MBB type of traffic must be served as well, for which resources shouîd be used as efficient as possible, i.e. less robust. It is currently unciear how UE multiplexing of both traffic types with their different requirements can be efficiently handled in the N R system.
[1238] In particular, according to curreni standards, for example dynamic UL grants, e.g. less robust and large for MBB, or other UL grants, override configured UL grants, ë.g. very robust for URLLC transmissions, either destroying the determinism forthe URLLC transmissions or leading to a high complexîty for the gNB to avoid those overriding, i.e. by scheduling “around the configured UL grants, which in some resource situations may not be feasible. This may thus resuit in a reduced or limited performance of the wireless communication network.
[1239] According to embodiments herein a radio network node, such as a gNB or other radio base station (RBS) configures a UE with a configured grant and/or a dynamic grant for UL transmissions. The decision on whether dynamic or configurée! grant is used for an UL transmission by the UE is conditions! on whether UL data has been obtained to transmit on the configured grant UL resources according to ihe logical channel prioritization decision, i.e. in particular whether a MAC Protocol data unit (PDU) is obtainable from the MAC multiplexing/assembly entity, i.e. whether the uplink grant is skipped due to no data available on logical channels allowed to transmit on the configured UL grant.
222
[1240] Itisassumed that according to a logîcal channel restriction condition, which is configurable, data transmission of some logîcal channels is not pemnitted on a configured UL grant. i.e. for the MBB type non-critical logîcal channels. This way, valuable robust resources are not wasted by sending MBB type traffic that does not require robust resources, but could rather wait/be delayed some time more and be transmitted on more efficient, less robust dynamicaily scheduled Resources.
[1241] More specifically, according to embodiments herein, for a configured UL grant (with wanted frequent and robust but small allocation intended for reliably transmitted data such as URLLC data):
• Prioritize a received UL dynamic grant for a new transmission, received on physicaî downlink control channel (PDCCH) for cell radio network temporary identifier (C-RNTl), e.g. a larger grant with efficient (less robust) transmission parameters, under the condition that there would be no UL transmission on the configured grant, prevîously received configured grant on PDCCH for configured scheduîing (CS)-RNTI, in case it was prioritized, i.e. that no UL data is available for transmission on a configured grant, i.e. for URLLC type logîcal channel for which transmission on the configured grant is ailowed, that there is no UL data available. Note that according to current standard, the received dynamic UL grant would always be prioritized, independently of UL data availability.
• Prioritize the UL configured grant when there is UL data available for transmission on the UL configured grant for any logîcal channel for which transmission on the UL configured grant is permitted according to configured logîcal channel restrictions. E.g. URLLC logîcal channel (LCH) data.
• According to a further embodiment, the UL configured grant is only prioritized if according to the above conditions AND when for a logîcal channel transmission is ONLY permitted on the configured grant, i.e. this logical channel data had otherwise no possibility to be transmitted when dynamic grant were prioritized.
[1242] Note that requested retransmissions may always be prioritized, i.e. in another embodiment, the retransmission of a MAC PDU sent on a previous configured grant is prioritized over a later configured grant. In more detail, if the dynamic UL grant is for a retransmission of the configured grant, i.e., scrambled with CS-RNTI and a New Data indicator (NDI) in the received hybrid automatic repeat request (HARQ) information is 1, this dynamic grant overrides the configured UL grant, irrespective of whethera MAC PDU has obtained or not.
223
[1243] In another embodiment, when prioritizing the UL configured grant according to the above. the following exception is considered: do not pnoritize the UL configured grant if an LCH which is restricted to be transmitted only over the dynamic grant, is of higher priority than another LCH, for which restriction to transmit only on configured UL grant is configured.
[1244] In one embodiment, the gNB expecting transmission on either dynamic UL grant or configured UL grant, i.e, bündly decoding both possibilities,
[1245] The UE uses configured UL even if dynamic UL grant is received for overlapping resources, under the condition that UL data would be transmitted on the configured grant resources according to a logical channel prioritization procedure, [1246] Note that in a general scénario the term “radio network node” can be substituted with “transmission point. Distinction between the transmission points (TPs) may typically be based on CRSs or different synchronization signais transmitted, Several TPs may be logically connected to the same radio network node but if they are geographscally separated, or are pointing in different propagation directions, the TPs may be subject to the same mobility issues as different radio network nodes. In subséquent sections, the terms “radio network node and “TP can be thought of as interchangeable. [1247] Figure 163 is a combined flowchart and signalling scheme according to embodiments herein. The actions illustrated therein and described below may be performed in any suitable order.
[1248] Action 201: The radio network node 12 may configure the UE 10 to prioritize UL transmission of configured periodic UL grant over UL transmission of a dynamic UL grant under a condition that there is UL data to be transmitted on the configured grant according to a logical channel prioritization procedure. The configured periodic UL grant may be for a first type of transmissions e.g. critical data transmissions such as URLLC transmissions, and the dynamic UL grant may be for a second type of transmissions e.g. non-critical data transmissions such as MBB transmissions.
[1249] Action 202: The radio network node 12 may schedule the UE 10 with a dynamic grant for UL transmissions of the second type e.g. non-critical data transmissions such as non-latency sensitive transmissions e.g. for a broadband service or similar. This may mean that the radio network node transmits a dynamic UL grant to the UE 10. The UE 10 may thus send a scheduling request for an UL transmission and may subsequently receive a dynamic UL grant for the UL transmission.
[1250] Action 203: The UE 10 prioritizes UL transmission of the configured periodic UL grant over UL transmission of the dynamic UL grant under the condition that there is UL data to be transmitted on the configured periodic UL grant according to a logical
224 channel prioritization procedure. The configured periodic UL grant may be for the first type of transmissions such as URLLC transmission, and the dynamic UL grant may be for the second type of transmissions such as MBB transmission.
[1251] Action 204: When the UE 10 has prioritized periodic UL grant in action 203, the UE may transmit a transmission of the first type of transmissions such as URLLC transmission.
[1252] Action 205: When the UE 10 has prioritized dynamic UL grant in action 203, the UE may transmit a transmission of the second type of transmissions such as MBB transmission.
[1253] Figure 164 is a block diagram depicting the UE 10 for handling configuration e.g. handling or enabling communication to the radio network node in the wîreiess communication network 1 according to embodiments herein. The UE 10 may comprise processing circuitry 801, e.g. one or more processors, configured to perform the methods herein. The UE 10 may comprise a receiving unit 802, e.g. a recaiverora transceiver. The UE 10, the processing circuitry 801, and/or the receiving unit 802 may be configurée! to receive configuration data from the radio network node 12. The configuration data may define that the UE prioritizes UL transmission of the configured periodic UL grant over UL transmission of a dynamic UL grant under the condition that there is UL data to be transmitted on the configured grant according to a Iogicai channel prioritization procedure. The configured periodic UL grant may be for a first type of transmissions such as URLLC transmission, and the dynamic UL grant may be for a second type of transmissions such as MBB transmission. The UE 10, the processing circuitry 801, and/or the receiving unit 802 is configured to receive a dynamic UL grant for an UL transmission. [1254] The UE 10 may comprise a prioritizing unit 803. The UE 10, the processing circuitry 801, and/or the prioritizing unit 803 may be configured to prioritize UL transmission of the configured periodic UL grant over UL transmission of the dynamic UL grant under the condition that there is UL data to be transmitted on the configured periodic UL grant according to a Iogicai channel prioritization procedure. The UE 10 may comprise a transmitting unit 804, e.g. a transmitter or a transceiver. The UE 10, the Processing circuitry 801, and/or the transmitting unit 804 may be configured to prioritize UL transmission of the configured periodic UL grant over UL transmission of the dynamic UL grant under the condition that there is UL data io be transmitted on the configured periodic UL grant according to a Iogicai channel prioritization procedure. In some exemples, the prioritizing unit 803 performs the prioritization. Therefore, in these exemples, the UE 10, the processing circuitry 801, end/orthe transmitting unit 804 may
225 be configured to transmit transmission of the first type or transmission of the second type as prioritized by the UE 10, the processing circuitry 801, and/or the prioritizing unit 803.
[1255] The UE 10 further comprises a memory 807. The memory comprises one or more units to be used to store data on, such as RSs, strengths or quaüties, UL grants, indications, requests, commands, applications to perform the methods disclosed herein when being executed, and simiiar. The UE 10 comprises a communication interface comprising one or more antennas,
[1256] The methods according to the embodiments described herein forthe UE 10 are respectively implemented by means of e.g. a computer program product 805 or a computer program, comprising instructions, Le., software code portions, which, when executed on at least one processor, cause the at least one processor to carry out the actions described herein, as performed by the UE 10. The computer program product 805 may be stored on a computer-readable storage medium 806, e.g. a universal serial bus (USB) stick, a dise or simiiar. The computer-readable storage medium 806, having stored thereon the computer program product, may comprise the instructions which, when executed on at least one processor, cause the at least one processor to carry out the actions described herein, as performed by the UE 10. In some embodiments, the computer-readable storage medium may be a non-transitory or a transitory computerreadable storage medium.
[1257] Figure 165 is a block diagram depicting the radio network node 12 for handling, e.g. facilitating, configuration in the wireless communication network 1 according to embodiments herein. The radio network node 12 may comprise processing circuitry 1001, e.g. one or more processors, configured to perform the methods herein.
[1258] The radio network node 12 may comprise a configuring unit 1002. The radio network node 12, the processing circuitry 1001 and/or the configuring unit 1002 is configured to configure the UE 10 with an UL grant for UL transmission over a iogic channel. The radio network node 12 may comprise a scheduling unit 1003, such as a scheduier. The radio network node 12, the processing circuitry 1001 and/or the scheduling unit 1003 may further be configured to schedule the UE 10 with a dynamic grant for UL transmission of a broadband service or simiiar.
[1259] The radio network node 12 may comprise a receiving unit 1004, e.g. a receiver or transceiver. The radio network node 12, the processing cîrcuiiry 1001 and/or the receiving module 1004 is configured to receive from the UE 10 data on a radio resource. The radio network node 12 further comprises a memory 1005. The memory comprises one or more units to be used to store data on, such as strengths or quaüties, grants, scheduling information, applications to perform the methods disclosed herein
226 when being executed, and similar. The radio network node 12 comprises a communication interface comprising transmitter, receiver, transceiver and/or one or more antennas.
[1260] The methods according to the embodiments described herein for radio network node 12 are respectively implemented by means of e.g. a computer program product 1006 or a computer program product, comprising instructions, i.e., software code portions, which, when executed on at least one processor, cause the at least one processor to carry out the actions described herein, as performed by the first radio network node 12. The computer program product 1006 may be stored on a computerreadable storage medium 1007, e.g. a USB stick, a dise or similar. The computerreadable storage medium 1007, having stored thereon the computer program product, may comprise the instructions which, when executed on at least one processor, cause the at least one processor to carry out the actions described herein, as performed by the radio network node 12. In some embodiments, the compoter-readable storage medium may be a non-transitory or transitery computer-readable storage medium.
[1261] Combination of TSN Détection and Grant Prioritizaiion
[1262] Once more, as indicated above, the various techniques described herein may be combined with each other, to provide advantages with respect to latency, reiiability, etc. For example, one particular combination that is advantageous is the combination of the techniques described above for detecting support for TSN and the techniques described just above for prioritizing grants.
[1263] Thus, for example, the method illustrated in Figure 135 can be combined with the method shown in Figure 163, resulting in another method performed by a wireless device associated with a wireless communications network. This method includes the step of receiving System information (SI) from a radio base station (RBS) of a radio access network (RAN), the SI being indicative of support for time-sensitive networking (TSN) through the RBS, as shown at block 402 of Figure 135, as well as the step of establishîng at least one TSN stream with the external data network, through the RBS, as shown at block 404 of Figure 135. The method further includes the steps of configuration information configuring periodic uplink grants indicating uplink resources to use for uplink transmissions to the wireless communications network, as shown at step 201 of Figure 163, and receiving a dynamic uplink grant for an uplink transmission to the wireless communications network, as shown at step 202 of Figure 163. As shown at step 203 of Figure 163, this example method further includes the step of prioritizing uplink transmission using the configured periodic uplink grant over uplink transmission using the
227 dynamic uplink grant, on the condition that there is uplink data to be transmitted on the configured periodic uplink grant according to a logical channel prioritization procedure.
[1264] In some embodiments, the SI is comprised in one or more System information blocks (SI B s). In some embodiments, the logical channel prioritization procedure prevents transmission of some logical channeis on the configured periodic uplink grant. In some of these latter embodiments, the logical channel prioritization procedure may restrict transmission using the configured periodic uplink grant to ultra-reliable low latency communication (URLLC) messages. In some embodiments, the dynamic uplink grant is for a mobile broadband (MBB) transmission.
[1265] Device Enroliment in an loT Environment
[1266] The Internet of things (loT) is commonly known as a network of physical devices, vehicles, home appliances, and/or other items embedded with electronics, software, sensors, actuators, and connectîvity which typically enabte the devices to connect and exchange data. As discussed herein, the Industrial loT is simply the loT as applied to an industrial setting, such as in a factory.
[1267] Adding a new device to an loT System or loT environment (the terms may be used interchangeably in this disclosure), or deploying an entire loT System for the very first time typically includes: physically installing the devices, i.e. sensors, actuators, etc,, at their respective physical location; configuring the devices with identity and other attributes, such as e.g. geographical location, owner, purpose, etc,; setting up communication parameters, e.g. Wi-Fi access points and passwords, encryption keys and certificates; and enroliment of the devices, registering them with (cloud) services that will make use of them, and that they will make use of.
[1268] A typical example is installing a new surveillance System (either résidentiel or commercial). Each device is preconfigured with its functionality, but typically requires spécifie configuration which may vary based on situation, context and/or intended usage, such as location (e.g. the living room) and communication (e.g. howto contact the communications hub of the loT System). The communication hub shouid typically be configured with contact details to the owner, such as phone number (for GSM/GPRS communication) or network address (for IP-based communication), and password for services. Typically, some of the parameters can be configured en masse (e.g. during manufacture), and some of them shouid be configured after installment.
[1269] There exist various ways of handling the enroliment of the devices, Common ways typically include;
• configuring a device before/directly after installation, It is typically common to allow the devices to be “trust in g” when first started (known as TOFU, Trust On
228
First Use). This allows the installer or operator to easiiy configure the loT devices by means of either using no security at ali, or by using security credentiais set du ring manufacturing such as user or password combination that are common for al! of the devices and which often can be found on the Internet. A typical drawback with this approach is that its vulnérable to man-în-the-middle attacks, and that security is easiiy compromised since the default passwords often are left unchanged after configuration, enabling further tampering.
• bootstrapping the devices by typicaîly having them “phone home to a predetermined address in order to receive configuration parameters. However this approach requires Internet access, or access to at least one pre-determined address typicaîly using !P-based communication.
[1270] Hence, the conventional approaches for enrollment of devices to loT environments are typicaîly insecure and/or inflexible. Therefore, there is a need for providing secure and fîexïble means for device enroliment in loT Systems.
[1271] As just mentioned, adding a new device to a system, or deploying an loT system for the very first time, typicaîly includes • physically înstalling the devices, • configuring them with ideniity and other attributes, • setting up communication parameters, and • enrolîment of the devices.
[1272] A typical exemple is adding a new controller to a factory automation system. The conirolier typicaîly needs to know who is aliowed to configure/reoonfigure control loops, and where and how to send warnings/errors. It furthermore typicaîly requires private keys for encrypting communication, and it typicaîly requires knowing how to communicate with other devices and services (i.e., receive information on certificates, keys, etc.).
[1273] However, as previously mentioned, conventional enrollment processes may typicaîly lead to insecure Systems, since the configuration of the devices may be performed again by using the same defauit password, or enrollment is inhibited by the fact that Internet connection is required.
[1274] It is typicaîly known that any computer application can be serialized in some form. Computer serialization is typicaîly the process of translating data structures or object States into a format that can be stored or transmitted and reconstructed later (possibiy in a different computer environment). The opposite operation, extracting a data structure from a sériés of bytes, is typicaîly known as deserialization. The serialization, however, may hâve to be complex and detaiîed, and thus requiring more storage space,
229 unless the environment the application will be executing in has support for high-level abstractions of even quite complex functionality.
[1275] The seriaiization/deserialization described herein may be done according to any suitable method forserializing/deserializing data.
[1276] According to some embodiments herein, the application may be an enrollment application comprising enroliment information for assisting/enabling execution of enrollment of a device to the loT environment.
[1277] For exampie, encoding the enrollment application using a limited format such as QR codes or barcodes adds some restrictions on the available space (even a highdensity format such as HCCB is limited to approx. 300 bytes/cm2).
[1278] However, using a high-level description of the enrollment application, it is possible to encode the application, complété with internai state, parameters etc., as a string, barcode or QR Code using a limited amount of space by using serialization.
[1279] According to some embodiments, this fact may be utilized in order to provide a secure encoded enrollment process which does not require Internet connection.
[1280] For example according to some embodiments herein, an enrollment application may be distributed over several devices, or several enrollment applications may in some embodiments be running on different devices where one device may be used for assisting in enrollment of another device, and may retrieve information on geographica! & organizationai location, ownership, encryption keys, communication parameters (e.g. Wi-Fi access point, login credentials and address to gateway or web service, etc.) from the assisting device, storing it persistently on e.g. one or more of the devices being enrolled. Furthermore, it may in the state of the application (s) be included al! information necessary to assume ownership of the device from which information has been retrieved such as e.g. keys for communication and identity.
[1281] These enrollment applications are then serialized and supplied together with one or more loT devices e.g, by means of a note inside the package, or printed on the side of the device, or generated and printed on the receipt, or downloaded from the manufacturées website, or distributed in some other form.
[1282] Obtaining the code e.g. by means of an assisting device e.g. a mobile phone, or otherwise retrieving it, and then de-serializing by e.g. using an application or fonction in the mobile phone gives a digital représentation of the enroliment application, which can then be deployed on a system consisting of at least the ΙοΤ-device and (for example) the mobile phone used for enrollment.
230
[1283] !t should be noted that the assisting device does not necessarily hâve to be a mobile phone but could also in some embodiments be another IoT device, or other suitabie device for deserializing the enroilment information.
[1284] The enroilment application may be distributed over the at least two devices (the IoT device(s) to be enrolled, and the mobile phone assisting the enroilment) and starts executing an enroilment process by delivering ail relevant information to the IoT device as well as the mobile phone.
[1285] The enroilment application may also comprise enroilment information pertaining to steps of the enroilment that may in some embodiments need to be performed by either or both of the assisting device (e.g. the mobile phone) and the IoT device to be enrolled.
[1286] The IoT device stores the enroilment information persistently, terminâtes the application and then résumés its intended operation.
[1287] The IoT device could optionaliy burn a fuse or something similar to prevent tampering or changing the data, thus making ownership permanent. The mobile phone could optionaliy forward the resuit of the registration to a server.
[1288] In an IoT framework, using fairly high-îevei abstractions to describe functionatity, i.e. functionality is described on a semanticaîly hîgh level using high level descriptions such as “trigger alarm rather than detailed and low level commands such as “set_pin(18, 0)”, it is possible to encode even quite large and complex applications as bar codes or OR codes which can be interpreied by e.g. a mobile device. The application itself can be either a distributed application co vérin g several devices, or separate applications exchanging data.
[1289] The encoded application can then e.g. in some embodiments be either:
1) Printed on the IoT device
2) Incfuded on a note in the IoT device packaging
3) Downloaded in batch from a web-service using unique identifiées supplied with IoT device.
[1290] Other options for delivering the encoded application are of course possible.
[1291] The technician or operator installing the IoT device may then use a mobile device as an assisting device to obtain the barcode/barcodes (e.g. by scanning the code) and deploy the application or applications. The application (or parts of an application) executing on the mobile phone then fiUs in configuration data such as location, purpose, ownership, credentials and other important information, whereas the application (or parts of an application) on the device to be enrolled stores this information persistently.
231
[1292] After the configuration/enrollment has completed, the application is disposed of, and the loT device résumés normal operation, using the supplied configuration/enrollment data.
[1293] This approach allows for straightforward automated registration, configuration and enrollment of e.g. îoT devices without the devices requiring access to the Internet, or any other connectivity other than a means of communicating with a registration device (Bluetooth, NFC, Wi-Fi, etc.)
[1294] Figure 168 illustrâtes an example method 100 of a first device according to some embodiments for initiating an enrollment process of a second device to an Internet of Things (IoT) environment.
[1295] The first device may e.g. be wireless communication device such as a mobile phone. The first device may be any device capable of deserializing high ievel abstractions, such as a handheld computer, laptop, or surf pad. Alfhough a mobile device is préférable it is not excluded that the first device is a stationary device, such as e.g. a stationary computer.
[1296] The second device may e.g. be a robot, physical device, sensor, caméra or any other device suitable for an IoT system,
[1297] In some embodiments, the second device is an internet of Things (loT) device. In some embodiments the first device is a wireless communication device.
[1298] The method 100 starts in 110 with obtaining 110 a représentation of an enrollment function associated with the second device, wherein the enrollment function is associated with at least one serialized enrollment application comprising enrollment information associated with the first and second device.
[1299] The représentation of the enrollment function may e.g, be obtained by means of scanning the représentation or otherwiss capture the représentation using e.g. a caméra or other sensor.
[1300] The représentation of the enrollment function may be a QR code printed on the second device, or supplied in the packaging of the second device or similar. The représentation of the enrollment function could additionally or alternatively be e.g. a bar code or an RF-ID chip capable of analogue or digital storing of the serialized enrollment function. Other représentations are possible.
[1301] The enrollment information associated with the first and second device comprised in the serialized enrollment application may e.g. comprise one or more of instructions for setting up communication between the first and second dévies, an indication of that an enrollment process is to be carried out, steps of an enrollment process, information associated with one or more of geographical location, organizational
232 location, ownership, encryption keys, communication parameters, communication keys and identity, and information on what parameters should be exchanged between the devices such as credentials etc.
[1302] For example, the above parameters may represent a mix of information flowing between both devices. Additions! data, originating in the first device, such as e.g. geographical location, organizational location, and ownership may be data sent by the first device to the second device and stored by the îatter.
[1303] Encryption and communication keys/parameters may further be sent in either direction (e.g. during handshake, negotiation of means of communication etc.) during the deployment of the enrollment application, i.e. during the enrollment process.
[1304] Identity could be either sent from second device to first device (in the case of serial number or unique identifier set during manufacturing) or from first device to second device (in the case of human readable name, or identifier within organization
[1305] The method 100 then continues in step 120 with deseriaîizing the enrollment application such that enrollment information associated with the first device is separated from enrollment information associated with the second device.
[1306] Hence, the first and the second device may not necessarily receive the same enrollment information, The enrollment information associated with the first device may e.g. comprise instructions on which parameters the first device should supply to the second device. In the same manner, the enrollment information associated with the second device may comprise instructions that an enrollment is to take place, and directives on what parameters and/or information associated with the second device which the second device should supply the first device with.
[1307] it is to be noted that the parameters may comprise the same data as the information, i.e. the parameters may be the information or vice versa, hence in this disclosure the term parameter may be replaced by the term information if not explicitly stated otherwise.
[1308] In some embodiments, the method 100 may optionally comprise the step of connecting 130 to the second device in order to enable communication between the first and second device.
[1309] The connection may e.g. be established by means of e.g. BlueTooth, Wi-Fi, NFC, and physîcal connection or cable between the devices. However, this step may also be integrated into the next step of transmitting 140 the enrollment information associated with the second device to the second device for initiating execution by the second device of the enrollment process of the second device by configuration of the second device based on the enrollment information associated with the second device.
233
[1310] Hence, the deserialized enroliment information associated with the second device is transmitted from the first device to the second device, in order to initiate the enroliment process and enable the second device to execute the enroliment process as indicated by the (with the second device) associated enroliment information.
[1311] According to some embodiments, the enroliment information associated with the second device îs unknown to the second device. Hence, enroliment cannot take place unless the first device supplies the second device with the enroliment information comprised in the deserialized enroliment application associated with the second device.
[1312] Furthermore, in some embodiments, the enroliment information associated with the second device comprises at least one of public encryption keys for commun icating with the loT system, software Systems, capabilities and functions of the loT-environment.
[1313] The method then continues with receiving 150 from the second device configuration information associated with the second device.
[1314] As elaborated on above, the enroliment information associated with the second device may comprise instructions that the second device should supply the first device with certain configuration informationZparameters associated with the second device that is unknown to the first device.
[1315] Such configuration information associated with the second device may e.g. be physical identity of the second device, and public encryption keys for communication with the second device. The information associated with the second device may also in some embodiments comprise an acknowledgement of successful enroliment of the second device.
[1316] The first device may e.g. store the received configuration information and may in some embodiments relay it to the loT system in order to enable connection of the second device to the loT system.
[1317] For instance, according to some embodiments, for ΙοΤ-systems depending on a central cloud service, the necessary communication details (such as public keys, and identity) may to be forwarded to the cloud service in order to enable (secure) communication.
[1318] In some embodiments, the enroliment fonction may comprise or represent at least two serialized enroliment applications. In such case, one application may be intended for the first device, and one application may be intended for the second device.
[1319] The method may hence in some embodiments further comprise deserializing the at least two serialized enroliment applications into at least one enroliment application comprising enroliment information associated with the first device and at least one
234 enrollment application comprising enroilment information associated with the second device. The first device may then transmit the at least one enrollment application associated with the second device to the second device.
[1320] Hence, according to some embodiments, the enrollment function may contain one application (i.e. one split application for both devices, or just one for the second device) or two applications (one for the first device and one for second device) and may also in some embodiments comprise spécifie configuration data (address, etc,, that might not be part of any of the applications).
[1321] In some embodiments, the method may further comprise determining that the second device has successfuliy enrolted and terminating 160 the at least one enrollment application on the first device.
[1322] The détermination of that the second device has successfuliy enroiled may e.g. be based on an indication received from the second device of successfuî enrollment. In some embodiments, the indication of successfuî enrollment may be comprised in the information received from, and associated with, the second device.
[1323] Hence, the method 100 describes steps for initiating and assisting e.g, an loT device to enrolî to an loT System according to some embodiments.
[1324] Furthermore, Figure 169 illustrâtes an example method 200 of a second device for executing an enroilment process to an Internet of Things (loT) environment initiated and assisted by a first device.
[1325] The first and second device may e.g. be the first and second device as described in conjonction with Figure 168.
[1326] The method 200 starts in 210 with receiving 210, from the first device, enroilment information associated with the second device (compare with step 140 of the method 100). The enrollment information may originate from at least one deserialized enrollment application, which enroilment application may hâve been deserialized by the first device according to the method 100.
[1327] in some embodiments, the method 200 may further comprise determining 220 that the enrollment information is for executing the enrollment process.
[1328] The second device may e.g. comprise different fonctions and processes which may be initiated when spécifie instructions or signais are received. The second device may e.g. comprise a fonction for enrollment which is utilized only when the correct enrollment information for executing the enrollment process is received.
[1329] This step may howeveralso be performed automatically when the second device receives the enrollment information, i.e. the réception of the enrollment information
235 may automatically trigger the enrollment process, and the step 220 may hence be seen as implicit in the method 200.
[1330] The method 200 then continues with executing 230 the enrollment process by configuring the second device based on the enrollment information.
[1331] The second device may e.g. already at least in part hâve access te the enrollment process but may iack certain information or parameters which may be supplied by the first device, The second device may e.g. hâve, as mentioned above, been configured at manufacture with a function for enroilment, this function may comprise some steps that should be taken by the device during enrollment but may e.g. Iack information on certain necessary parameters or steps.
[1332] The enrollment information may hence comprise information which is unknown to the second device until the enrollment process is being depîoyed. Such information may e.g. pertain to information originating in the first device, such as e.g. geographical location, organizational location, gateway crsdentials, and (public) encryption keys for communication with the loT System and ownership which may sent from the first device to the second device and stored by the latter.
[1333] in some embodiments, the enrollment information associated with the second device comprises at least one of public encryption keys, software Systems, capabilities and functions of the loT-environment.
[1334] In some embodiments, the enrollment information associated with the second device is unknown to the second device. Hence enrollment cannot take place uniess initiated by the first device.
[1335] The method 200 may then continue with transmitting 240 configuration information associated with the second device to the first device (compare with step 150 of the method 100).
[1336] The configuration information associated with the second device transmitted to the first device may e.g, be one or more of physical identity of the second device and public encryption keys for communication with the second device. The configuration information associated with the second device may also in some embodiments comprise an acknowledgement of successful enroilment of the second device.
[1337] In some embodiments, the method 200 may further comprise determining that the enrollment is successful, and possibiy termînating 250 the enrollment application e.g. by deleting the enrollment information from the second device.
[1338] In orderto further strengthen security of th® enrollment process and hinder future tampering of the data, the second device may e.g. blow a fuse, or in other manners delete the possibility to reconfigure it.
236
[1339] Furthermore, the information associated with the second device transmitted to the first device may also in some embodiments comprise an acknowledgement of successful enroliment of the second device.
[1340] Figure 170 illustrâtes schematically the execution of the methods 100 and
200 according to some embodiments.
[1341] A représentation of an enroliment function 330 comprises at least one serialized enroliment application 300 which in tum comprises enroliment information 301, 302 associated with a first device 310 and a second device 320 respectively. The first and the second device may e.g. be the first and second device as described in conjunction with any of Figures 169 and 170.
[1342] In this example, the représentation of the enroliment function is a QR-code. But other représentations are possible, such as bar codes, numeric sequences, RF-ID chips, etc.
[1343] The first device obtains the représentation of the enroliment fonction, e.g. by 15 scanning using a scanner or caméra, or other means for detecting, acquiring or capturing the représentation,
[1344] The first device 310 may then deserialize the enroliment application such that enroliment information 301 associated with the first device 310 is separated from enroliment information 302 associated with the second device 320 (compare with step 20 1 20 of the method 100).
[1345] In some embodiments, the first device may further obtaîn additional configuration information pertaining to the second device from an externai data base 311, and may further in some embodiments be prompted by the enroliment application to obtain said additional configuration data from said externai storage data base 311.
[1346] The first device keeps the enroliment information 301 associated with the first device and transmits the enroliment information 302 associated with the second device 320 to the second device 320 (compare with steps 140 and 210 of the methods 100 and 200 respectively).
[1347] It should be noted that the enroliment fonction may comprise more than one 30 serialized application. In the case of more than one serialized applications, the first device and the second device may be associated with one application each, and the first device may deserialize the applications into one application for thé first device and one application for the second device.
[1345] In the case of a single serialized application, the first device may deserialize it 35 into information pertaining to the first device, and into information pertaining to the second device, i.e. split the application on the two devices. In some embodiments, in the case
237 with one serialized application, the single application may be intended for the second device only.
[1349] The second device may in tum comprise a number of fonctions which may be associated with different processes. In this example, the second device may comprise fonction #1- #4, 321, 322, 323, and 324 respectively. These fonctions may hâve been configured/added to the second device during manufacture.
[1350] in this particuiar example the représentation of the enroliment function information 330 corresponds to function #3, 223. Hence, when the second device receives the deserialized information it wiii détermine that fonction #3 is to be initiated. In this case, function #3 is the en ro II ment process (compare with step 220 of the method 200).
[1351] Function #3 may comprise some enroliment steps but may lack information which may be provided in the enroliment information obtained from the deserialized enroliment application and received by the second device 320, compare e.g. with the methods 100 and 200.
[1352] The second device may then perform the enroliment according to the received enroliment information. In some embodiments, also the first device may use the enroliment information associated with the first device as well as the information received from and associated with the second device in order to configure itself.
[1353] It should be noted that also the other fonctions of the second device may be used for enroliment. Hence, it should be understood that the enroliment function does not comprise of a single fonction {e.g. fonction #3) but may also be instructions invoiving one or more of the other fonctions on the second device. E.g., the enroliment information may e.g. comprise instructions telling the second device to execute fonction #1 using parameters a, b and execute function #4 using parameters x, y etc., with fonctions #1 and #4 being pre-existing fonctions.
[1354] It should be noted that the methods 100 and 200 are closely reiated as they are performed respectively by a first device and a second device in order to enable enroliment of the second device. Hence, the method 100 and 200 may in some embodiments be combined into one method 400 as iilustrated by Figure 171.
[1355] In Figure 171 a first device (DEV 1) 401, and a second device (DEV 2) 402 may communicate with each other. The first device 401 and the second device 402 may e.g. be the first and second device as respectively described in conjonction with any of the Figs, 1-3. In the same manner the method 400 may be a combination of the methods 100 and 200 as previously described.
238
[1356] The method 400 starts in 410 where the first device 401 obtains a représentation of an enrolîment function associated with the second device 402 (compare with step 11 □ of the method 100). The représentation may e.g. be one or more of a QRcode, barcode or similar. The représentation may e.g. be obtained through scanning or NFC reader other suitabîe means.
[1357] The représentation of the enrolîment fonction comprises or is associated with at least one serialized enrolîment application, which enrolîment application may comprise enrolîment information associated with the first device and with the second device respectively. The serialization enabîes large amounts of data to be stored in the représentation using limited space.
[1358] The représentation may in some embodiments be stored on the second device. The barcode may e.g. be printed onîo the housing of the second device, or it could be supplied on e.g. a piece of paper and be part of the packaging of the second device. It may aiso be possible in some embodiments to retrieve the représentation from e.g. the Internet.
[1359] When the first device has obtained the représentation of the enroilment fonction, the method continues in 411 where the first device deseriaiîzes the serialized enrolîment application in order to extract the digital représentation of the information as well as separate the enrolîment information which is associated with the first device from the enrolîment information which is associated with the second device (compare with step 120 of the method 100).
[1360] The enrolîment fonction may in some embodiments comprise a single sëriaîized enrolîment application which is deserialized into different blocks of Information pertaining to the first or second device. In some embodiments, the enrolîment fonction may comprise more than one serialized enrolîment applications, which may be deserialized into one or more applications intended for the first device and one or more applications intended for the second device.
[1361] tn some embodiments, in the case of a single application, the single application may be intended entirely for one of the devices.
[1362] After obtaining, the method 400 may comprise establishing a connection between the first device and the second device for communication (as indicated by the dashed arrow between the first and second device, compare with step 130 of the method 100). The connection may e.g. be established through a Biuetooth connection, NFC, WiFi, or by cable and does not necessarily require Internet or network access.
[1363] The connection may be initiated as a separate step of the method, or it may be automatically performed or triggered after having obtained the représentation. It may
239 hence be integrated as an implicit action into the next step 412 of transmitting the enrollment information associated with the second device extracted from the deserialized enrollment application to the second device (compare with step 140 of the method 100). [1364] The enrollment information comprised in the enrollment application may to some extent be unknown to the devices priorto deployment of the enrollment process. Hence, the représentation of the enrollment function may comprise enrollment information associated with e.g. the second device, which the second device is not aware of as it has not been previously configured with the information.
[1365] Such enrollment information may e.g. be credentials associated with e.g. the first device or the loT System into which the second device is to enroll. Such as e.g. credentials necessary for communicating with other devices or services in the loT system, as well as ownership, location (e.g. GPS coordinates or address), a human readable name of the second device, or other information that is not known before the time of the enrollment. Other such information may e.g. be geographical location of the second device, organizational location and ownership.
[1366] In step 420 of the method 400 the second device receives the enrollment information associated with the second device comprised in the deserialized enrollment application (compare with step 210 of the method 200). This réception may triggerthe second device to initiate an enrollment process (compare e.g. to Figure 169 and the steps 220-230 of the method 200).
[1367] Hence in step 421 of the method 400 the second device executes the enrollment process based on the received enrollment information (compare with step 230 of the method 200).
[1368] During the enrollment process additional data may be exchanged between the first and second device, such data may e.g. be encryption keys, credentials, identity ofthe devices etc.
[1369] The second device may e.g. transmit in step 422 information associated with the second device to the first device (compare with step 240 ofthe method 200). Such information may e.g. be public encryption keys, software versions, capabilities and fonctions associated with the second device, etc.
[1370] The second device may also transmit an indication or acknowledgement to the first device that enrollment has been successful.
[1371] In step 413 of the method 400, the first device receives from the second device the information associated with the second device (compare with step 150 of the method 100). The first device may e.g. store this information and relay it to the loT system in order to enable connection of the second device to the loT system.
240
[1372] Then, after successful enrollment, in step 414 and 423 the first and second device may terminale the enrôlement application at their own end respectively (compare with steps 160 and 250 of the methods 100 and 200 respectively). In order to further strengthen security once the enrollment has been completed, the second device may e.g. bum a fuse which hinders further tampering of data, or completely delete the enrollment functionality.
[1373] It is contemplated that the enrollment information may comprise instructions to the second device on what actions should be taken when the enrollment is complété, or the second device may already be preconfigured with these steps.
[1374] It is also contemplated that the first device may be configured during the enrollment process of frie second device. This may be the case when the first device is a part of the loT System and should main ta in knowledge of the second device. The first device may in such case configure itself based on the enrollment information comprised in the seriaüzed enrollment application and the information received from the second device during execution of the enrollment process. This would be the case when, for example, the first device acts as a gateway which the second device utilizes for communication with the loT System.
[1375] The first and second devices described herein are typically physica! devices, however in some embodiments the first device comprises more computing resources than the second device. It should however be noted that both the first and the second device may be loT devices.
[1376] Figure 172 illustrâtes an example arrangement 500 of a first device for initiating and assisting an enrollment process of a second device to an Internet of things (loT) environment according to some embodiments.
[1377] It is to be noted that in this disclosure, the term arrangement is to be interpreted as a System of aggregated components such as e.g. a circuit board with integrated or removably attached components. The term arrangement may e.g. be replaced by the term System.
[1378] The first device may e.g. be the first device as described in conjonction with any of the Figures 168-171. The second device may e.g. be the second device as described in conjunction with any of Figures 168-171.
[1379] The arrangement 500 may be further configured to carry out the methods as described in conjunction with any of Figures 168-171.
[1380] The arrangement 500 comprises a controîling circuitry (CNTR; e.g. a controîier) 520 and a transceiver circuitry (RX/TX; e.g. a transceiver) 510. In some embodiments, the controlling circuitry may further comprise an obtaining circuitry (OB;
241 obtaining module) 523, a deserializing circuitry (DESER; e.g. a deserializer) 522 and a détermination circuitry (DET; e.g. a déterminer) 521.
[1381] The transceiver circuitry 510 may in some embodiments be a separate transmitter and a separate receiver.
[1382] The controlling circuitry 520 may be configured to cause obtaining, e.g. by causing the obtaining circuitry 523, of a représentation of an enrollment function associated with the second device, wherein the enrôlement fonction is associated with at least one serialized enrollment application comprising enrollment information associated with the first and second device (compare with step 110 of the method 100).
[1383] The obtaining circuitry may e.g. comprise a caméra, supplied on a mobile phone. The obtaining circuitry 523 may in some embodiments be any suitable circuitry/means for obtaining or capturing information comprised in an image or on a chip or similar.
[1384] The controlling circuitry 520 may be further configured to cause deserializing, e.g. by causing the deserializing circuitry522, of the enrollment function information such that enrollment information associated with the first device is separated from enrollment information associated with the second device (compare with step 120 of the method 100),
[1385] The controlling circuitry 520 may be further configured to cause connection, e.g. by causing the transceiver circuitry to signal the second device, to the second device, such that communication between the first and second device is enabled (compare with step 130 of the method 100).
[1386] The controlling circuitry 520 may be further configurée! to cause transmission, e.g. by causing the transceiver circuitry 510 to signal the second device, of the enrollment information associated with the second device to the second device for initiating execution by the second device of the enrollment process of the second device by configuration of the second device based the enrollment information associated with the second device (compare with step 140 of the method 100).
[1387] During and/or after execution of the enrollment process, the controlling circuitry may be further configured to cause, e.g, by causing the transceiver circuitry to receive, réception from the second device of configuration information associated with the second device (compare with step 150 of the method 100).
[1388] In some embodiments, the controlling circuitry 520 may be further configured to cause détermination, e.g. by causing the détermination circuitry 521, that the enrollment process is being executed or has been completed e.g. based on the réception of the information from the second device, The controlling circuitry may then be
242 configured to cause the storage (e.g. in a memory not shown in Fig. 5) of the information received from the second device and the relay of the information to the loT System.
[1339] in some embodiments, the controlling circuitry 520 may further configured to cause the termination of the enrollment application e.g. when it has been determined that the enrollment of the second device has been completed and/or when the first device has performed a configuration of itself based on the deserialized enrollment application comprising enrollment information associated with the first device (compare with step 160 of the method 100).
[1390] The arrangement 500 may e.g. be comprised in a wireless communication device. A wireless communication device may e.g. be a mobile phone, smart phone, surf pad, laptop, handheld computer, or similar. The arrangement 500 may also in some embodiments be comprised in an loT device such as a caméra, robot, sensoretc.
[1391] Figure 173 illustrâtes an arrangement 600 of a second device for executing an enrollment process to an Internet of things (loT) environment and assisted by a first device.
[1392] The first and second devices may e.g. be the first and second device respectively described in conjunction with any of the Figures 168-172.
[1393] It shouid be noted that the arrangement 600 may further be combined with or comprise the same or similar features as those described in conjunction with Figure 172 and the arrangement 500.
[1394] The arrangement 600 may e.g. be configured to carry out the methods as described in conjunction with any of the Figures 168-171.
[1395] The arrangement 600 may comprise a controlling circuitry (CNTR; e.g. a controller) 620 and a transceiver circuitry (RX/TX; e.g. a transceiver) 610. The transceiver circuitry 610 may in some embodiments be a separate transmitter and a separate receiver and/or comprise multiple antennas.
[1396] The controlling circuitry 620 may in some embodiments further comprise a functionality circuitry (FUNC; e.g. a functionality module) 622 and a détermination circuitry (DET; e.g. a déterminer) 621.
[1397] The controlling circuitry 620 may in some embodiments be configured to cause réception, e.g. by causing the transceiver circuitry 610, from the first device, enrollment information associated with ihe second device (compare with step 210 of the method 200).
[1398] In some embodiments, the controlling circuitry 620 may be further configured to cause détermination, e.g. by causing the détermination circuitry 621, of that the
243 en roi I ment information is for executing the enrollment process (compare with step 220 of the method 200).
[1399] In some embodiments, the controlling circuitry 620 may further be configured to cause execution, e.g. by causing the functionalsty circuitry 622, of the enrollment process by configuring the second device based on the enrollment information (compare with step 230 of the method 200) and cause transmission of configuration information associated with the second device to the first device, e.g. by causing the transceiver circuitry 610 to transmit to the first device (compare with step 240 of the method 200).
(1400] In some embodiments, the controlling circuitry 620 may be further configured to terminale the enrollment application when enrollment/configu ration has been completed (compare with step 250 of the method 200).
[1401] The arrangement 600 may in some embodiments be comprised in an Internet of Things (ioT) device. Such a device may e.g. be a robot, kitchen appliance, caméra, sensor, traffic light, machine etc.
[1402] An advantage with the embodiments described herein is that an exécutable application is encoded e.g. as a QR-code and distributed togetherwith an ioT device, When registering the IoT device, the application is decoded and deployed as a distributed application on the IoT device as well as on another device, e.g. a mobile phone used for enrollment of the IoT device. The embodiments disclosed herein do hence not rely on central server/repository for software.
[1403] Furthermore, the embodiments herein allow for straight forward automated registration, configuration and enrollment of devices without requiring access to e.g. the Internet or any other connecta ity other than me ans of communicating with a registration device (such as e.g. Bluetooth, NFC, Wi-Fi, etc.).
[1404] Furthermore, since the device to be enrolled is not preconfigured with al! necessary information for the enrollment, security is enhanced.
[1405] The described embodiments and their équivalents may be realized in software or hardware or a combination thereof. They may be performed by generalpurpose circuits associated with or intégrai to a communication device, such as digital signal processors (DSP), central processing units (CPU), co-processor units, fieldprogrammabie gâte arrays (FPGA) or other programmable hardware, orby specialized circuits such as for exampie appiication-specific integrated circuits (ASIC). Ail such forms are contemplated to be within the scope of this disclosure.
[1406] Embodiments may appear within an electronic apparatus (such as a wireless communication device) comprising circuitry/logic or performing methods according to any of the embodiments. The electronic apparatus may, for example, be a portable or
244 handheld mobile radio communication equipment, a mobile radio terminai, a mobile téléphoné, a base station, a base station controller, a pager, a communicator, an electronic organizer, a smartphone, a computer, a notebook, a USB-stick, a plug-in card, an embedded drive, or a mobile gaming device.
[1407] Secure Device Operation Using Transferred Code Modules
[1408] To make use of the funotions of a device, whether locally or over the network, a user must typicaily authenticate with that device. Once authenticated, the user is then abie to use the device to perform one or more fonctions.
[1409] Authentication is often performed by providing certain credentials recognîzed by the device. For example, a user may provide a password, or an application may provide a digital key. If the password or key are stoien or forged, the security of the device may be compromised. Once such a device is compromised, any number of lis functions may be exploited. In general, the increasing sophistication of malicious users has created a continuing pressure on developers to devise new and better techniques for securing devices.
[1410] Embodiments of the présent disclosure invoke device functions differently than traditîonal approaches. As just one example, a smart lock executes a runtime environment that supports an unlocking function. To gain access to the unlocking function, another device (e.g., a users smart phone) obtains authorization to transfer a code module to the smart lock. The code module is configured to execute within the smart lock's runtime environment and expose the unlocking function to the useris smart phone (e.g., via wireless communication). Once the unlocking function is exposed to the useris device, an application running within the runtime environment on the users device can invoke the unlocking function via the code module.
[1411] According to particular embodiments, such a System is résilient against intrusion. For example, even if the above-discussed smart lock is compromised in some way; without the code module, there may be no way to readily invoke the unlocking function. Additionally or alternatively, malicious software agents downloaded to the useris device may be unable to intercept the credentials exchanged between the smart lock and user device runtime environments. Other advantages will discussed below, or will be apparent to those skilied in the relevant arts, along with other embodiments in which a first device makes use of a second device.
[1412] Embodiments of the présent disclosure include a code module that exposes a function of a device to another device. The code module is securely transferred via wireless communication between runtime environments so that the fonction may be remotely invoked. This transfer may be triggered by the devices coming within proximity
245 of one another. Authorization to transfer the code module is handied between the runtime environments, such that the remote application need not support any particular security scheme used by the devices. The function may be inaccessible via remote invocation without the code module, and the code module may be deleted or retumed after the function has been invoked and/or once the devices are no longer in proxîmity, e.g., to prevent other devices from invoking the function without authorization.
[1413] In some embodiments, the devices are part of a distributed Internet-of-Things (loT) system. An example of such a system may be based on the Calvin application environment. In such a Calvîn-based system, applications may be built from functional blocks (sometimes referred to as actors) that execute on runtimes that are tied to devices. According to embodiments, the actors may move between runtimes as needed in order to execute their functionality on particular devices.
[1414] Figure 174 illustrâtes an exampîe network environment 100 that includes a first device 110 and a second device 115. The first device 110 and the second device 115 are both communicatively connected to, and exchange signais with, each other (e.g., wirelessly, via a point-to-point connection). In some embodiments, the first device 110 and/or the second devices 115 are connected to a network 105 and confîgured to communicate via the network 105 with a remote device 145 and/or with each other. Accordingly, the first and second device 110, 115 may each support wired and/or wireless communication via one or more compatible technologies, e.g., near-fieid communication (NFC), Wi-Fi, BLUETOOTH, ZIGBEE, Long-Term Evolution (LTE), new radio (NR), Ethernet, and the like.
[1415] The first and second devices 110,115 execute first and second runtime environments 120, 125, respective!/. The first runtime environment 120 of the first device 110 is confîgured to transfer a code module 140 to the second runtime environment 125 of the second device 115, e.g., by controlling a wireiess transmitter of the first device 110. Correspondingly, the second device 115 is confîgured to transfer the code module 140 from the first runtime environment 120 to the second runtime environment 125, e.g., by actively controlling a wireless receiver of the second device 115, or by passively allowing a memory of the second device 115 to be written to by the first device 110 (e.g., using a circuit that converts RF transmissions from the first device 110 into memory Write instructions, such a circuit being powered, in some embodiments, by the RF energy of those transmissions).
[1416] The code module 140 is confîgured to execute within the second runtime environment 125 and expose a function of the second device 115, supported by the second runtime environment 125, to the first device 110. As will be discussed further
246 below, an application 130 executing within the first runtime environment 120 of the first device 110 invokes the function of the second device 115 via the iransfeued code module 140 and the second runtime environment 125.
[1417] Typical examples of the first device 110 include (but are not limited to) a mobile device, such as a smartphone, a user equipment, a laptop computer, a tablet computer, and/or a wearable computer. Typical examples of the second device 115 include (but are not limited to) a computer and/or a Smart appliance. Other examples of the first and second devices 110, 115 include other types of computing devices.
[1418] The network 105 includes one or more physical devices and/or signaling médiums capable of exchanging communication signais with the first and/or second devices 110, 115. Examples of such a network 105 include (but are not limited to) one or more of: the Internet (or a portion thereof); one or more local area networks; one or more wireless networks; one or more cellular networks; one or more Internet Protocol-based networks; cne or more Ethernet networks; one or more optical networks; and/or one or more circuit switched networks. Such a network 105 may comprise any number of networking devices such as routers, gateways, switches, hubs, firewalls, and the like (not shown) supporting the exchange of such communication signais.
[1419] The remote device 145 may be any computing device communicativeiy coupled to the first and/or second device 110, 115 via the network 105. The remote device 145 may, for example, act as a first device 110 except in a different capacity. For exampie, the remote device 145 may be an administratorworkstation that has secure access to the second device 115 via the network 105, e.g., via a physically secured or encrypted network connection to the second device 115. Accordingly, a user of the remote device 145 may be able to invoke the same and/or different fonctions ofthe second device 115 by also transferring a code module 140 to the second device and invoking particular funotions, e.g., to assist a user of the first device 110. A typical example of the remote device 145 includes (but is not limited to) a workstation, personal computer, laptop computer, and/or tablet computer.
[1420] Figure 175 illustrâtes an example calt flow between a mobile device 210 and a Smart lock 215, consistent with aspects discussed above. In the example of Figure 175, the mobile device 210 is an example of a first device 110, and the smart lock 215 is an example of a second device 115. Alihough Figure 175 illustrâtes a particular exampie in which a mobile device 210 and smart lock 215 interact, alternative embodiments may include other devices acting as the first and/or second device 110,115 to securely access other functions than those described below.
247
[1421] Consistent with the general discussion of Figure 174, the mobile device 210 illustrated in Figure 175 executes a mobile runtime environment 220. Lock controi software 230 executes within the mobile runtime environment 220, e.g., as a service or responsive to being launched by a user of the mobile device 210, The smail lock 215 executes a smart lock runtime 225. The Smart lock runtime 225 supports lock controi operations, e.g., locking and unlocking the smart lock 215. However, the smart lock runtime 225 does not permit remote invocation of these operations without code module 140, which in this example is provided by the mobile device 210.
[1422] According to the example illustrated in Figure 175, each of the mobile and smart lock runtime envîronments 220, 225 detect one another, e.g., by sensing radio frequency (RF) energy produced by the other device (step 250). In some embodiments, either or both of the devices 210, 215 may detect each other using additional or alternative proximity détection technology, e.g., optical and/or aurai détection via corresponding sensors and/or receivers.
[1423] In response to detecting each other, the mobile and smart lock runtime envîronments 220, 225 participate in an authentication procedure (step 252). This authentication procedure may include the exchange of one or more credentials by which the smart lock runtime environment 225 may détermine whether or not the mobile device 210 is permîtted to use certain protected fonctions of the smart lock 215 (e.g., the unlock function). In particular, by performance of this authentication procedure may establish a trust relationship between the mobile and smart lock runtime envîronments 220, 225.
[1424] After successful authentication, the mobile runtime environment 220 transfers a code module 140 to the smart lock runtime environment 225 (step 254), The code module 140 is configured to execute within the smart lock runtime environment 225 and expose the uniock function of the smart lock 215 to the mobile device 210.
[1425] The lock controi software 230 then invokes the uniock function of the smart lock 215 via the transferred code module 140, e.g., using an appropriate fonction caiî to an Application Programming Interface (AP!) of the code module 140, as represented in Figure 175 by the fonction call “module.unlockO” (step 256). Notably, the lock controi software 230 is able to take advantage of the trust relationship established between the mobile and smart lock runtime envîronments 220, 225 in order to invoke the uniock fonction, with requiring the credentials upon which the trust relationship was established. This may be advantageous, e.g., in avoiding providing sensitive credentials to certain applications, in particular, embodiments may ensble a user to freely download and use thind-party and/or untrusted applications to invoke fonctions without concern that the applications will be able to obtain the credentials of either device 210, 215.
248
[1426] The code module 140 executes within the smart lock runtime environment 225 to handle the module.unlockO function cal! by correspondingly invoking an API supported by the Smart lock runtime environment, represented in Figure 175 by the function calî “runtime. unlockO (step 258). Thus, according to the embodiment illustrated sn Figure 175, the code module 140 may, amen g other things, serve as a translation layer between the lock control software 230 on the mobile device 210 and the smart lock runtime environment 225 that Controls the unlocking function of the smart lock 215. In response to the unlock function caH from the code module 140, the smart lock runtime environment 225 responds by controlling the smart lock 215 accordingly, i.e., by unlocking the smart lock 215 (step 260).
[1427] Afterthe unlocking has been performed, the smart lock runtime environment 225 detects thaï one or more criteria fordeleting the code module 140 hâve been satisfied (step 266). in this particular example, the code module 140 is not permitted to remain loaded on the smart lock 215 indefinitely. Accordingly, the smart lock runtime environment has one or more criteria for determïning when the code module 140 is to be deleted. The criteria for deleting the code module 140 may include whether or not the mobile device 210 can be detected and/or whether or not a threshold period of time has passed since the code module 140 was transferred.
[1428] For example, while the code module 140 exists on the smart lock 215, the smart lock 215 may be vulnérable to some other device (not shown) invoking protected functions of the Smart lock 215 via the code module 140, e.g., without authenticating and/or by spoofing characteristics of the mobile device 210. Accordingly, after a threshold period of time has passed since the code module 140 was transferred and/or if the mobile device 210 is no longer in proxim'rty to the smart lock 215, the smart lock runtime environment 225 may détermine that the code module 140 should be deleted. In particular, the smart lock runtime environment 225 may détermine that the mobile device 210 has left the area around the smart lock 215 by farling to detect certain RF energy from the mobile device 210.
[1429] Having detected that certain module deietion criteria has been met, the smart lock runtime environment 225 deietes the code module 140 (step 268). In some embodiments, the smart lock runtime environment 225 also transfers the code module 140 back to the mobile device 210 (e.g., to the mobile runtime environment 220). Thus, in some embodiments, the code module 140 may act as a token that limits how the lock control software 230 is used, That is, whiie the code module 140 is transferred to the smart lock 215, the lock control software 230 may be prevented from sending a module.unlock() command to a different device, for example.
249
[1426] The code module 140 executes within the smart lock runtime environment 225 to handle the “moduie.unlockO” function cal! by correspondingîy invoking an API supported by the smart !ock runtime environment, represented in Figure 175 by the function cali “runtime.unlockO” (step 258). Thus, according to the embodiment illustrated in Figure 175, the code module 140 may, among other things, serve as a translation iayer between the iock control software 230 on the mobile device 210 and the smart lock runtime environment 225 that Controls the uniocking function of the smart lock 215. In response to the unlock function call from the code module 140, the smart iock runtime environment 225 responds by controlling the smart lock 215 accordingly, i.e., by uniocking the smart lock 215 (step 260).
[1427] After the uniocking has been performed, the smart !ock runtime environment 225 detects that one or more criteria for deîeting the code module 140 hâve been satisfied (step 266). in this particular example, the code module 140 is not permitted to remain loaded on the smart lock 215 indefinttely. Accordingly, the smart lock runtime environment has one or more criteria for determining when the code module 140 is to be deleted. The criteria for deîeting the code module 140 may include whether or not the mobile device 210 can be detected and/or whether or not a threshold period of time has passed since the code module 140 was transferred.
[1428] For exampie, while the code module 140 existe on the smart lock 215, the smart lock 215 may be vulnérable to some other device (not shown) invoking protected functions of the smart lock 215 via the code module 140, e.g., without authenticatîng and/or by spoofing characteristics of the mobile device 210. Accordingly, after a threshold period of time has passed since the code module 140 was transferred and/or if the mobile device 210 is no longer in proximity to the smart lock 215, the smart iock runtime environment 225 may détermine that the code module 140 should be deleted. In particular, the smart lock runtime environment 225 may détermine that the mobile device 210 has left the area around the smart lock 215 by failing to detect certain RF energy from the mobile device 210.
[1429] Having detected that certain module deîetion criteria has been met, the smart lock runtime environment 225 deîetes the code module 140 (step 268). In some embodiments, the smart Iock runtime environment 225 also transfers the code module 140 back to the mobile device 210 (e.g., te the mobile runtime environment 220). Thus, in some embodiments, the code module 140 may act as a token that limits how the lock control software 230 is used, That is, while the code module 140 is transferred to the smart lock 215, the lock control software 230 may be prevented from sending a module.unlock() command to a different device, for example.
249
[1430] In some embodiments, the smart lock runtime environment 225 supports other functions that do not require the code module 140. Such fonctions may, for example, be public and/or read only fonctions that may be invoked without the need for authorization. Accordingly, in some embodiments, the mobile runtime environment 220 and/or the lock control software 230 may invoke functions of the smart lock 215 by communicating directly with the smart lock runtime environment 225. In the example of Figure 175, this is illustrated by the mobile runtime environment 220 and lock control software 230 each invoking a “runtime.info()u function call of the smart lock runtime environment 225 (steps 262, 264). Such a function call may, for example, return device status information about the smart lock 215. Such information may include device identity, owner identity, contact information for an administrai or, whether the lock is locked or unlocked, and/or other information pertaining to the smart lock 215.
[1431] For example, a user of the mobile device 210 may encounter difficulty in attempting to unlock the smart lock 215. In such a scénario, the user may use the lock control software 230 to obtain information on howto contact an administratorwho can use a remote device 145 to transfer a code module 140 to the smart lock runtime environment 225 and unlock the smart lock 215 themselves, orenable the userof the mobile device 210 to do it using their lock control software 230. One example of such an administrator may be a hôtel manager, who can help guests having trouble using the system enter their rooms remotely, though there are myriad embodiments that may include other devices, contexte, and/or user rôles.
[1432] It should further be noted that aithough the actions performed in steps 254, 256, 258, 262, and 264, and 268 are illustrated as being unidirectional actions, one or more of these steps may trigger a corresponding response in which a value is retumed, e.g., to indicate a resuit of the illustrated action. For example, the smart lock runtime environment 225 may respond to the runtime.unlock() fonction call with a zéro or nonzero value based respectively on whether or not the smart lock has successfully unlocked.
[1433] Consistent with the above, embodiments of the présent disclosure include a method 300 of using a second device 115 impîemented by a first device 110, such as the method 300 illustrated in Figure 176. The method 300 comprises using a first runtime environment 120 executing on the first device 110 to transfer a code module 140 to a second runtime environment 125 executing on the second device 115 (block 310). The code module 140 is configured to execute within the second runtime environment 125 and expose a function of the second device 115, supported by the second runtime environment 125, to the first device 110. The method 300 further comprises executing an
250 application 130 within the first runtime environment 120 (block 320). The application remotely invokes the function of the second device 115 via the transferred code module 140 and the second runtime environment 125.
[1434] Other embodiments include a method 400 of providing a first device 110 with access to a function of the second device 115 implemented by the second device 115, as shown in Figure 177. The method 400 comprises transferring a code module 140, from a first runtime environment 120 executing on the first device 110, to a second runtime environment 125 executing on the second device 115 to expose a function of the second device 115 supported by the second runtime environment 125 to the first device 110 (block 410). The method 400 further comprises using the second runtime environment 125 to control performance of the function of the second device 115 responsive to a remote invocation of the function received via the code module 140 from an application 130 executing within the first runtime environment 120 (block 420),
[1435] Figure 178 illustrâtes hardware 500 suitable for implementing and/or supporting the first and/or second devices 110, 115, in accordance with one or more embodiments. As shown, the hardware 500 includes processing circuitry 510 and radio circuitry 520. The radio circuitry 520 may be configured to transmit and/or receive via one or more antennas (not shown) that are part of, or coupled to, the hardware 500. The processing circuitry 510 is configured to perform processing described above, e.g., in Figure 175 and/or 176, such as by executing instructions stored in memory 530. As will be discussed below, the processing circuitry 510 in this regard may comprise one or more physical units. Additionally or alternatively, the instructions stored in memory 530 may be comprised in one or more software modules.
[1436] Figure 179 in this regard illustrâtes additional details of a first device 110 in accordance with particular embodiments. Specifically, the first device 110 may include a transferring unit or module 605 and an executing unit or module 610. The transferring unit or module 605 may be configured to use a first runtime environment 120 executing on the first device 110 to transfer a code module 140 to a second runtime environment 125 executing on the second device 115. The code module 140 is configured to execute within the second runtime environment 125 and expose a function of the second device 115, supported by the second runtime environment 125, to the first device 110.
[1437] Figure 180 illustrâtes additional details of a second device 115 in accordance with particular embodiments. Specifically, the second device 115 may include a transfer unît or module 705 and a control unit or module 710. The transfer unit or module may bs configured to transfer a code module 140, from a first runtime environment 120 executing on the first device 110, to a second runtime environment 125 executing on the second
251 device 115 to expose a function of the second device 115 supported by the second runtime environment 125 to the first device 110. The control unit or module 710 may be configured to use the second runtime environment 125 to control performance of the function of the second device 115 responsive to a remote invocation of the function received via the code module 140 from an application 130 executing within the first runtime environment 120.
[1438] Combjnation of Device Enroliment and Secure Device Operation Using Transferred Code Modules
[1439] Once more, as indicated above, the various techniques described herein may be combined with each other, to provide advantages with rêliability, security, etc. For example, one particular combination that is advantageous is the combination of the techniques described above for device enroliment in an loT environment and secure device operation using transferred modules.
[1440] Thus, for example, the method iliustrated in Figure 168 can be combined with the method shown in Figure 176, to obtain a method of a first device for assisting enroliment of a second device to an Internet of Things (loT) environment and using the second device. This example method comprises, as shown at blocks 110, 120, and 140 of Figure 168, the steps of obtaining a représentation of an enroliment function associated with the second device, wherein the enroliment function is associated with at least one serialized enroliment application comprising enroliment information associated with the first and second device, deserializing the enroliment application such that enroliment information associated with the first device is separated from enroliment information associated with i’ne second device, and transmitting the enroliment information associated with the second device to the second device for initiating execution by the second device of the enroliment process of the second device by configuring the second device based on the enroliment information associated with the second device. The method further comprises, as shown at block 150 of Figure 168, receiving from the second device configuration information associated with the second device.
[1441] This example still further comprises, as shown at block 310 of Figure 176, the step of using a first runtime environment executing on the first device to transfer a code module to a second runtime environment executing on the second device, wherein the code module is configured to execute within the second runtime environment and expose a function of the second device, supported by the second runtime environment, to the first device. Finally, this example method comprises the step of executing an application
252 within the first runtime environment, the application remotely invoking the function of the second device via the transferred code module and the second runtime environment.
[1442] The second device may be an Internet of Things (IoT) device, in some embodiments, and the first device may be a wireless communication device. The représentation of the enroilment function may be one or more of a QR-code, a bar code and a RF-ID chip, for example. The enroliment information associated with the second device may comprise at least one of public encryption keys, software Systems, capabilities, steps pertaining to the enroliment process and functions of the ioTenvironment, in some embodiments. The enroliment information may comprise information associated with one or more of geographicai location, organizational location, ownership, encryption keys, communication parameters, communication keys and identify, in some embodiments.
[1443] In some embodiments, the enroliment function comprises at least two serialized enroliment applications, and the method further comprises deserializing the at ieast two serialized enroliment applications into at least one enroliment application comprising enroilment information associated with the first device and at least one enroliment application comprising enroliment information associated with the second device, and transmitting the at least one enroilment application associated with the second device to the second device.
[1444] In some embodiments, the method further comprises determining that the second device has successfully enrolied and terminating the at least one enroilment application on the first device.
[1445] In some embodiments, the method further comprises authentîcating the first runtime environment with the second runtime environment to obtain authorization to transfer the code module to the second runtime environment for execution within the second runtime environment, and/or communicating directiy with the second runtime environment to invoke a different function of the second device,
[1446] in some embodiments, the transfer of the code module to the second runtime environment is performed over a wireless point-to-point connection between the first device and the second device. The second device may be an electronic lock, for example, where the function supported by the second runtime environment locks or unlocks the electronic lock.
[1447] Similarly, the method shown in Figure 169 can be combined with the method shown in Figure 177, to obtain a method of a second device for executing an enroliment process to an Internet of Things (IoT) environment assisted by a first device and providing the first device with access to a function of the second device, This exampie
253 method, includes, as shown at blocks 210, 230, and 240 of Figure 169, the steps of receiving, from the first device, enrollment information associated with the second device, executing the enrollment process by configuring the second device based on the enrollment information, and transmitting configuration information associated with the second device to the first device. The method further includes, as shown at blocks 410 and 420 of Figure 177, the steps of receiving a code module from a first runtime environment executing on the first device, to a second runtime environment executing on the second device, to expose a function of the second device supported by the second runtime environment to the first device, and using the second runtime environment to control performance of the function of the second device responsive to a remote invocation of the function received via the code module from an application executing within the first runtime environment.
[1448] In some embodiments, the method further comprises determining that the enrollment is successful and deîeting the enrollment information from the second device. In some embodiments, the enrollment information associated with the second device comprises at least one of public encryption keys, software Systems, capabilities, steps pertaining to the enrollment process and functions of the loT-environment.
[1449] In some embodiments, the method further comprises authenticating the first runtime environment with the second runtime environment to authorize the transferring of the code module to the second runtime environment for execution within the second runtime environment. In some embodiments, the method further comprises using the second runtime environment to control performance of a different function of the second device responsive to a direct communication from the first device to the second runtime environment.
[1450] The transferring of the code module from the first runtime environment may be performed over a wireless point-to-point connection between the first device and the second device, in some embodiments. The second device may be an electronic lock, for example, where the function supported by the first runtime environment locks or unlocks the electronic lock.
[1451] Queryinq Federated Databases in Conformance with Jurisdictional Privacv Restrictions
[1452] Companies and organizations in many business sectors such as Healthcare, e-commerce, government, and retail are entra sied with identifiable information (e.g., Personal information, private information, confidentiaî information, or the like) that makes preserving the privacy of this information of utmost concem to these eniities. Most often, these entities specifÿ and define how the privacy of this information is to be preserved.
254
[1453] The authors of a white paper entitled “Hippocratic Database: A PrivacyAware Database” proposed a database architecture that uses metadata consisting of privacy poficies and privacy authorizations stored in a respective privacy-policies table and privacy authorization table. N. Ghani, Z. Sidek, Hippocratic Database: A PrivacyAware Database, Int’l J. Computer Info. Engineering, vol. 2, No. 6 (2008). The authors describe a framework in which the database performs privacy checking during query processing. For instance, the database checks whether the user who issued the query is authorized to access the database. It also checks whether the query accessed only attributes that are explicitly listed in the privacy-authorization table. Also, the database only allows access to information in the database whose purpose attribute includes the purpose of the query. Accordingly, only users that are authorized for an intended purpose can access information in the database. However, this privacy-aware database does not consider privacy restrictions of the jurisdiction that it is located. Further, this database does not protect identifiable information that can be inferred from responses to a query from multiple databases.
[1454] A federated database system is a meta-database management system thaï maps constituent databases inio a single federated database. As such, a federated database is a Virtual database this is a composite of the constituent databases that it represents. The federated database System is perceived to be one database system by sending a query to each constituent database and then combining the responses to the query received from each constituent database. Further, each constituent database may be an autonomous database with the ability to independently communicate with other databases, execute and control its operations, or associais (ογ dissociate) itself with other databases. However, current federated database Systems do not consider privacy restrictions of the jurisdiction(s) that it represents and do not protect identifiable information that can be inferred from responses to a query from multiple databases in the same or different jurisdiction.
[1455] As previously discussed, current privacy-aware databases and federated database Systems do not consider privacy restrictions of the jurisdiction(s) that they represent However, database users typically want to combine responses to a query from databases in the same or different jurisdictions. By doing so, identifiable information contained in or inferred by the responses may not be protected in conformance with the privacy laws of the jurisdiction of each accessed database. In one example, a query reiatsd to counting the number of persons that hâve an income in a spécifie range and a certain range of éducation from two different databases requires combining the responses to the query based on the Personal identifiable information (e.g,, name, social
255 security number, address, or the like), which may vioiate the privacy restrictions in the jurisdiction of each database. în another example, a query related to a list of persons (e.g., user identifier) in a first database and a log of visited webpages indexed by visitors (e.g., user identifier) may not be combined in violation of the privacy restrictions of the jurisdiction of each database (e.g., a EU citizen whose surfing habits are stored in a US database). In yet another example, a query related to linking like expectancy to food habits may be able to combine a first response from a database with grocery shopping receipts from grocery store chains, a second response from a database with restaurant receipts from crédit card companies, and a third response from a database with life duration from govemment tax offices based on the identifiable information in the responses in violation of the privacy restrictions of the jurisdiction of each database.
[1456j Accordingiy, there is a need for improved techniques for querying a federated database in conformance with jurisdictionai privacy restrictions. In addition, other désirable features and characteristics of the présent disclosure will become apparent fnom the subséquent detailed description and embodiments, taken in conjunction with the accompanying figures and the foregoing technical field and background.
[1457] This disclosure includes describing Systems and methods of querying a federated database in conformance with jurisdictionai privacy restrictions. Further, this disclosure describes novel techniques of composing or combining responses to a query received from databases iocated in the same or different jurisdictions while honoring the integrity of personal data stored in these databases. For example, Figure 181 is a flow diagram of one embodiment of a System 100 for querying a federated database in accordance with various aspects as described herein. In Figure 181, the System 100 includes a client node 101 (e.g., smartphone), a network node 121 (e.g., computer server) having a federated database, and a network node 141 (e.g., computer server) having an autonomous database (e.g., personal records at the Internai Revenue Service), The federated database re présents directly, or indirectly via a su b-federated database, one or more autonomous database that is iocated in a certain jurisdiction (e.g., United States).
[1458] In Figure 181, in one embodiment, the client device 101 sends a query (e.g., identifying the number of persons that hâve a certain income range) that is related to identifiable information stored in the autonomous database or that is determinabie from a combination of responses to the query 161 received from the autonomous database and another autonomous database that is Iocated in the same jurisdiction, as represented by reference 161. The federated network node 221 receives the query and adapts the query for the autonomous database based on one or more privacy restrictions for the
256 jurisdiction of that autonomous database, as represented by block 123. The federated network node 121 then sends the adapted query to the autonomous network node 141, as represented by reference 163. The autonomous network node 141 receives the adapted query and obtains a response 167 to the adapted query from the autonomous database, as represented by block 143. The autonomous network node 141 sends the response to the federated network node 221, as represented by reference 165. The federated network node 121 composes an adapted response to the query based on the received response, as represented by block 127. In addition, the federated network node 121 sends the adapted response to the client node 101, as represented by reference 171.
[1459] The client node 101 may be user equipment, a mobile station (MS), a terminal, a cellular phone, a cellular handset, a Personal digital assistant (PDA), a smartphone, a wireless phone, an organizer, a handheld computer, a desktop computer, a laptop computer, a tablet computer, a set-top box, a télévision, an appliance, a game device, a medical device, a display device, a metering device, or the like. Each network node 121, 141 may be a computer-implemented node that is a communication redistribution point or a communication endpoint in a network such as a computer server, a base station, a core network node, a handheld computer, a desktop computer, a laptop computer, a tablet computer, a set-top box, a télévision, an appliance, a medical device, or some other like terminology.
[1460] The identifiable information may be any information that is associated with a particular person, place, or thing. Further, the identifiable information may include Personal information asscciated with a person, business, organization, govemment entity, or the like. The identifiable information may also include secret or confidential information. Confidential information includes information that is shared with the expectation that it will not be disclosed to unauthorized third parties. A jurisdiction may represent the authority granted to a particular body to administer certain privacy restrictions within a defined field of responsibility (e.g., U.S. fédéral law, Michigan tax law, Interna! Review Service, Environmental Protection Agency, and the like). Further, a jurisdiction may be associated with a particular territory such as a fédération (e.g., EU), country, State, province, city, county, municipality, township, and the like). The privacy restrictions are associated with the laws, rules, or régulations of a jurisdiction. For instance, the privacy restrictions may restrict or limit the ability to share Personal information such as a name, address, phone number, financial record, medical record, location, personal attributs, or the like.
257
[1461] Figure 182 is a flow diagram of one embodiment of a System 200 for querying a federated database in accordance with various aspects as described herein. In Figure 182, the System 200 includes a client node 201, a network node 221 having a federated database, a network node 241a having a first autonomous database (e.g., Personal records at the Internai Revenue Service), and a network node 241b having a second autonomous database (e.g., Personal records at U.S. Census Bureau). The federated database represents directly, or indirectly via a sub-federated database, the first and second databases that are located in a same or different jurisdiction (e.g., United States). [1462] In Figure 182, in one embodiment, the client device 201 sends a query that is related to identifiable information stored in the first or second autonomous database or that is determinable from a combination of responses to the query received from the first and second databases, as represented by reference 261. The federated network node 221 receives the query and identifies one or more data fields of the query that correspond to the identifiable information based on one or more privacy restrictions for the jurisdiction of the corresponding autonomous database, as represented by block 223, In response to identifying that one or more fields of the query corresponds to identifiable information, the federated network node 221 détermines a randomized sait for the query, as represented by block 225. The federated network node 221 then sends the query and the sait to the autonomous network node 241a, as represented by reference 263a.
[1463] In this embodiment, the autonomous network node 241a receives the query and sait and obtains a response to the query from the first autonomous database, as represented by block 243a. The autonomous network node 241a then anonymizes the identifiable information of the response based on the sait, as represented by block 245a. In one example, the identifiable information and the sait are processed with a cryptographie hash function to obtain the anonymized information. The autonomous network node 241a sends the response having the anonymized information to the federated network node 221, as represented by reference 265a. The federated network node 221 composes an adapted response to the query based on the response and its anonymized information, as represented by block 227. In addition, the federated network node 221 sends the adapted response to the client node 201, as represented by reference 271.
[1464] In another embodiment, the federated network node 221 sends the same query and sait to each autonomous network node 241a, 241b, as represented by référencés 263a, 263b. The autonomous network nodes 241a, 241b may be in the same jurisdiction or in different jurisd jetions. Each autonomous network node 241a, 241b receives the query and sait and obtains a corresponding response to the query via its
258 autonomous database. Further, each autonomous network node 241a, 241b anonymizes the identifiable information of the corresponding response based on the sait. Each autonomous network node 241a, 241b sends the corresponding response having the anonymized information to the federated network node 221, as represented by respective reference 265a, 265b. The federated network node 221 then combines the responses to the queries from the first and second autonomous databases based on the anonymized information received in each response.
[1465] Note that the apparatuses described above may perform frie methods herein and any other processing by implementing any functional means, modules, units, or circuitry. In one embodiment, for example, the apparatuses comprise respective circuits or circuitry configured to perform the steps shown in the method figures. The circuits or circuitry in this regard may comprise circuits dedicated to performing certain functional processing and/or one or more microprocessors in conjunction with memory. For instance, the circuitry may include one or more mrcroprocessor or microcontrcllers, as well as other digital hardware, which may include digital signal processors (DSPs), special-purpose digital logic, and the like, The processing circuitry may be configured to execute program code stored in memory, which may include one or several types of memory such as read-only memory (ROM), random-access memory, cache memory, flash memory devices, optical storage devices, etc. Program code stored in memory may include program instructions for executing one or more télécommunications and/or data communications protocols as well as instructions for carrying oui one or more of the techniques described herein, in several embodiments. In embodiments that employ memory, the memory stores program code that, wtien executed by the one or rnore processors, carries out the techniques described herein.
[1466] Figure 183 illustrâtes one embodiment of a network node 300 having a federated database in accordance with various aspects as described herein. As shown, the network node 300 includes processing circuitry 310 and communication circuitry 330. The communication circuitry 330 is configured to transmit and/or receive information to and/orfrom one or more other nodes, e.g., via any communication technoîogy. The Processing circuitry 310 is configured to perform processing described above, such as by executing instructions stored in memory 320. The processing circuitry 310 in this regard may implement certain functional means, units, or modules.
[1467] Figure 184 illustrâtes another embodiment of a network node 400 having a federated database in accordance with various aspects as described herein. As shown, the network node 400 implements various functional means, units, or modules (e.g., via the processing circuitry 310 in Figure 183, via software code), or circuits. In one
259 embodiment, these functional means, units, modules, or circuits (e.g., for implementing the method(s) herein) may include for instance: an obtaining unit 413 for obtaining a query that is related to identifiable information stored in at least one autonomous database or that is detemninable from a combination of responses to the query received from at least two autonomous or sub-federated databases; an adapting unit 415 for adapting the query for each autonomous or sub-federated database based on one or more privacy restrictions 431 for the junsdiction of that autonomous or sub-federated database; a sending unit 421 forsending, to each autonomous or sub-federated database, the adapted query for that database; a receiving unit 411 for receiving, from each autonomous or sub-federated database, a response to the corresponding adapted query; and a composing unit 423 for composing an adapted response to the query based on the response to the corresponding adapted query received from each autonomous or sub-federated database so that the adapted response meets the one or more privacy restrictions 431 for the junsdiction of each autonomous or sub-federated database.
[1468] In another embodiment, these functional means, units, modules, or circuits may include for instance; the obtaining unit 413 for obtaining a query that is related to identifiable information stored in at least one autonomous database or that is determinable from a combination of responses to the query received from at least two autonomous or sub-federated databases; a sait determining unit 419 for determining a randomized sait for the query; a sending unit 421 for sending, to each autonomous or sub-federated database, the adapted query for that database; a receiving unit 411 for receiving, from each autonomous or sub-federated database, a response to the corresponding adapted query; and a combining unit 425 forcombining the responses to the adapted query from the autonomous or sub-federated databases based on the anonymized information received in each response.
[1469] In another embodiment, these functional means, units, modules, or circuits may include, for instance, an identifying unit 417 for identifying one or more data fields of the query that correspond to the identifiable information based on one or more privacy restrictions 431 for the junsdiction of that database.
[1470] In another embodiment, these functional means. units, modules, or circuits may include, for instance, the receiving unit 411 for receiving, from each autonomous or sub-federated database, an authorization key 433 from that database that authorizes the federated database to query that database in conformance with one or more privacy restrictions 431 for the junsdiction of that database.
[1471] In another embodiment, these functional means, units, modules, or circuits may include, for instance, the receiving unit 411 for receiving, from each autonomous or
260 sub-federated database, one or more privacy restrictions 431 for a corresponding jurisdiction of that database.
[1472] In another embodiment, these functionaî means, units, modules, or circuits may include, for instance, the sending unit 421 for sending, to a client device, the adapted response.
[1473] In another embodiment, these functionaî means, units, modules, or circuits may include, for instance, a deleting unit 427 for deleting the sait for the query responsive to combining the responses so that an abîlity to détermine the identifiable information from the anonymized information only occurs between receiving the anonymized information from each autonomous or sub-federated database and deleting the sait.
[1474] In another embodiment, these functionaî means, units, modules, or circuits may include, for instance, a restriction obtaining unit 431 forobtaining one or more privacy restrictions for a jurisdiction.
[1475] Figure 185 illustrâtes one embodiment of a method 500a performed by a network node having a federated database representing one or more autonomous or subfederated databases that are located in a same or different jurisdiction in accordance with various aspects as described herein. In Figure 185, the method 500a may start, for instance, at block 501a, where it may include receiving, from each autonomous or subfederated database, an authorization key from that database that authorizes the federated database to query that database in conformance with one or more privacy restrictions for the jurisdiction of that database, Further, the method 500a may include receiving, from each autonomous or sub-federated database, one or more privacy restrictions for a corresponding jurisdiction of that database, as referenced by block 503a. At block 505a, the method 500a includes obtaining (e.g., receiving from a client device) a query that is reiated to identifiable information stored in at least one autonomous database or that is determinable from a combination of responses to the query received from at least two autonomous or sub-federated databases, Also, the method 500a may include identifying one or more data fields of the query that correspond to the identifiable information based on the one or more privacy restrictions for the jurisdiction of that database, as referenced by block 507a.
[1476] In Figure 185, at block 509a, the method 500a includes adapting the query for each autonomous or sub-federated database based on one or more privacy restrictions for the jurisdiction of that autonomous or sub-federated database, which may be responsive to identifying the identifiable information. At block 511a, the method 500a includes sending, to each autonomous or sub-federated database, the adapted query for that database. At block 513a, the method 500a includes receiving, from each
261 autonomous or sub-federated database, a response to the corresponding adapted query. At block 515a, the method 500a includes composing an adapted response to the query based on the response to the corresponding adapted query received from each autonomous or sub-federated database so that the adapted response meets the one or more privacy restrictions for the jurisdiction of each autonomous or sub-federated database. In addition, the method 500a may include sending, to a client device, the adapted response, as represented by block 517a.
[1477] Figure 186 illustrâtes one embodiment of a method 500b performed by a network node having a federated database representing one or more autonomous or subfederated databases that are located in a same or different jurisdiction in accordance with various aspects as described herein. In Figure 186, the method 500b may start, for instance, at block 505b, where it may include obtaining a query that is related to identifiable information stored in at least one autonomous database or that is determinable from a combination of responses to the query received from at least two autonomous or sub-federated databases. Further, the method 500b may include ideniifying one or more data fields of the query that correspond to the identifiable information based on one or more privacy restrictions for the jurisdiction of that database, as represented by block 507b. An adapted query for each autonomous or sub-federated database includes the query and a randomized sait so that each autonomous or subfederated database is operable to anonymize the identifiable information in each response to the query based on the sait. Accordingly, at block 509b, the method 500b includes determining the sait for the query. At block 511 b, the method 500b includes sending, to each autonomous or sub-federated database, the query and the sait. At block 513b, the method 500b includes receiving, from each autonomous or sub-federated database, a response to the query' with the identifiable information in each response being anonymized based on the sait. At block 515b, the method 500b includes combining the responses to the adapted query from the autonomous or sub-federated databases based on the anonymized information received in each response. In addition, the method may include deleting the sait for the query responsive to combining the responses so that an ability to détermine the identifiable information fram the anonymized information only occurs between receiving the anonymized information from each autonomous or sub-federated database and deleting the sait, as represented by block 519b.
[1478] Figure 187 illustrâtes one embodiment of a network node 600 having an autonomous database 640 in accordance with various aspects as described herein. As shown, the network node 600 includes processing circuitry 610, communication circuitry
262
620, and the autonomous database 640. The communication circuitry 620 is configured to transmit and/or receive information to and/or from one or more other nodes, e.g,, via any communication technoiogy. The processing circuitry 610 is configured to perform processing such as by executing instructions stored in memory 630. Further, the processing circuitry 610 is configured to perform processing associated with the autonomous database 640. The processing circuitry 610 in this regard may implement certain functional means, units, or modules.
[1479] Figure 188 illustrâtes another embodiment of a network node 700 having an autonomous database 735 in accordance with various aspects as described herein. As shown, the network node 700 implements various functional means, units, or modules (e.g., via the processing circuitry 610 in Figure 187 and/or via software code), or circuits. In one embodiment, these functional means, units, modules, or circuits (e.g., for implementing the method(s) herein) may include for instance: a receiving unit 711 for receiving, from the federated or sub-federated database, a query and a randomized sait for the query; a response obtaining unit 713 for obtaining a response to the query from the autonomous database 735 with the response having the identifiable information; an anonymizing unit 715 for anonymizing the identifiable information of the response based on the received sait; and a sending unit 717 for sending, to the federated or subfederated database, the response having the anonymized information so that the response meets one or more privacy restrictions 731 for the jurisdiction of the autonomous database.
[1480] !n another embodiment, these functional means, units, modules, or circuits may include for instance: a key obtaining unit 721 for obtaining an authorîzation key 733 that authorizes the federated or sub-federated database to query the autonomous database 735 in conformance with the one or more privacy restrictions for the jurisdiction; the sending unit 717 for sending, to the federated or sub-federated database, the authorîzation key 733; the receiving unit 711 for receiving, from the federated or subfederated database, a query, a randomized sait for the query and a key; an authorîzation determining unit 719 for determinrng whether the federated or sub-federated database is authorized to query the autonomous database 735 based on the received key and the authorîzation key 733.
[1481] In another embodiment, these functional means, units, modules, or circuits may include for instance: a restriction obtaining unit 723 for obtaining one or more privacy restrictions 731 for the jurisdiction of the autonomous database 735; and the sending unit 717 for sending, to the federated or sub-federated database, the one or more privacy restrictions 731 for the jurisdiction.
263
[1482] Figure 189 illustrâtes one embodiment of a method 800a performed by a network node having an autonomous database, in a certain jurisdiction, that is represented by a Federated or sub-federated database in accordance with vartous aspects as described herein. In Figure 189, the method 800a may start, for instance, at block 801a where it includes receiving, from the Federated or sub-federated database, a query and a randomized sait for the query. Further, the query is related to identifiable information stored in the autonomous database or that is determinabie from a combination of responses to the query that are received by the federated or subFederated database from the autonomous database and one or more other autonomous or sub-Federated dafabases that are represented by the Federated or sub-Federated database. Further, the method 800a includes obtaining a response to the query From the autonomous database with the response having the identifiable information, as represented by block 803a, Also, the method 800a includes anonymizing the identifiable information of the response based on the received sait, as represented by block 805a. In addition, the method 800a includes sending, to the federated or sub-federated database, the response having the anonymized information so that the response meets one or more privacy restrictions for the jurisdiction of the autonomous database, as represented by block 807a,
[1483] Figure 190 illustrâtes one embodiment of a method 800b performed by a network node having an autonomous database, in a certain jurisdiction, that is represented by a federated or sub-federated database in accordance wiîn various aspects as described herein. In Figure 190, the method 800b may start, for instance, at block 801b where it includes obtaining an authorization key that authorizes the federated or sub-federated database to query the autonomous database in conformance with the one or more privacy restrictions for the jurisdiction. Further, the method 800b includes sending, to the federated or sub-federated database, the authorization key, as represented by block 803b. At block 805b, the method 800b may include obtaining one or more privacy restrictions for the jurisdiction of the autonomous database, Also, the method 800b may include sending, to the federated or sub-federated database, the one or more privacy restrictions for the jurisdiction, as represented by block 807b.
[1484] In Figure 190, at block 809b, the method 800b includes receiving, from the federated or sub-federated database, a query, a randomized sait for the query and a key. The query is related to identifiable information stored in the autonomous database or that is determinabie from a combination of responses to the query that are received by the federated or sub-federated database from the autonomous database and one or more other autonomous or sub-federated data bases that are represented by the federated or
264 sub-federated database. In addition, the method 800b includes determining whether the Federated or sub-federated database is authorized to query the autonomous database based on the received key and the authorization key, as represented by block 811b. in response to determining that the federated or sub-federated database is authorized to query the autonomous database, the method 800b includes obtaining a response to the query, anonymizing the identifiable information ofthe response based on the received sait, and sending the response having the anonymized information to the federated or sub-federated database, as represented by block 813b, [1485] Figure 191 illustrâtes another embodiment of a System 900 for queryîng a federated database in accordance with various aspects as described herein. in Figure 191, the System 900 inciudes a network node 901 having a federated database and a network node 941a having an autonomous database that is iocated in a certain jurisdiction. The federated network node 901 sends a query and an optional key to the autonomous network node 941a, as represented by block 903. Further, the key is used to authorize the federated or sub-federated database to query the autonomous database in conformance with privacy restrictions for the jurisdiction of that autonomous database, [1486] In Figure 191, the autonomous network node 941a receives the query and the optional key , as represented by biock 943a. The autonomous network node 941a may détermine whether the query is authorized based on the received key and an authorization key stored in the autonomous network node 941a, as represented by block 945a, The autonomous network node 941 a obtains a response to the query from its autonomous database, as represented by block 947a. Further, the autonomous network node 941a sends the response to the query to the federated network node 901, as represented by block 949a. The federated network code 901 receives the response, composes an adapted response to the query based on the received response, and sends the adapted response such as to a client device, as represented by respective blocks 905.909,
[1487] In another embodiment, the federated network node 901 sends the query and optional key to the autonomous network nodes 941a, 941b. The autonomous network nodes 941a, 941b may be Iocated in the same jurisdiction or different jurisdictions. Each autonomous network node 941a, 941b receives the query and optional key and may détermine whether the query is authorized based on the received key and an authorization key stored in that autonomous network node 941a, 941b. Each autonomous network node 941a, 941b obtains a response to the query from its autonomous database and sends the response to the federated network node 901. The federated network node 901 receives each response and combines the responses to the
265 query, as represented by respective biocks 905, 909. The federated network node 901 may then send the combined response such as to a client device, as represented by block 909.
[1488] Figure 192 illustrâtes another embodiment of a System 1000 for querying a s federated database in accordance with various aspects as described herein. In Figure
192, the System 1000 inciudes a network node 1001 having a federated database, a network node 1021 having a sub-federated database that is associated with a certain jurisdiction, and a network node 1041 having an autonomous database that is associated with that certain jurisdiction. The federated network node 1001 sends a query and an optional key to the sub-federated network node 1021, as represented by biock 1003. [1489] In Figure 192, the sub-federated network node 1021 receives the query and optional key 1061, as represented by biock 1023. The sub-federated network node 1021 may détermine to divide or adapt the query for each autonomous database based on the data fields of the query and the privacy restriction(s) of that database to obtain an adapted query for that database, as represented by biock 1025. The sub-federated network node 1021 sends the query, or the adapted query, and the optional key to the autonomous network node 1041, as represented by block 1025. The autonomous network node 1041 receives the query, or the adapted query, and the optional key, as represented by block 1043. Further, the autonomous network node 1041 may détermine whether the query, or the adapted query, is authorized based on the received key and an authorization key stored in the network node 1041, as represented by block 1045. The autonomous network node 1041 then obtains a response to the query, or the adapted query, from its autonomous database, as represented by block 1047. The autonomous network node 1041 sends the response to the sub-federated network node 1021, as represented by block 1049.
[1490] Furthermore, the sub-federated network node 1021 receives the response and composes a response based on the received response (or combines received responses if from more than one network node having an autonomous database), as represented by block 1029. The sub-federated network node 1021 may perform other fonctions that are allowed by the jurisdiction such as updating another database, applying a relational database model (e.g., ML model), sending an indication (e.g., text message, e-mail), or the like, as represented by block 1031, The sub-federated network node 1021 sends the response to the federated network node 1001, as represented by block 1033. The federated network node 1001 receives the response 1063 and then composes a response based on the received response 1063 (or combines received responses if from
266 more than one network node having an autonomous database). The federated network node 1001 may send the composed response (or the combined response).
[1491] Figure 193 iilustrates another embodiment of a system 1100 for querying a federated database in accordance with various aspects as described herein. In Figure 193, the system 1100 includes a network node 1101 having a federated or sub-federated database and a network node 1141a having an autonomous database that is located in a certain jurisdictîon, The sub/federated network node 1101 sends a query, a randomized sait for that query, and an optional key 1161a to the autonomous network node 1141a, as represented by block 1103.
[1492] In Figure 193, the autonomous network node 1141a receives the query, the randomized sait, and the optional key, as represented by block 1143a. The autonomous network node 1141a may détermine wheiher the query is authorized based on the received key and an authorization key stored in the autonomous network node 1141a, as represented by block 1145a. The autonomous network node 1141a obtains a response to the query from its autonomous database, as represented by block 1147a. Further, the autonomous network node 1141a anonymizes the identifiable information in the response based on the received sait, as represented by block 1149a. The autonomous network node 1141a then sends the response having the anonymîzed information to the sub/federated network node 1101, as represented by block 1151a. The sub/federated network node 1101 receives the response, as represented by block 1105. Also, the sub/federated network node 1101 composes a response based on the received response and the anonymized information, as represented by block 1109. The sub/federated network node 1101 may then send the composed response, as represented by block 1109.
[1493] In another embodiment, the federated network node 1101 sends the query, the randomized sait, and the optional key to the autonomous network nodes 1141a, 1141b. The autonomous network nodes 1141a, 1141b may be located in the same jurisdiction or different jurisdictions. Each autonomous network node 1141a, 1141b receives the query, the randomized sali, and the optional key and may détermine whether the query is authorized based on the received key and the authorization key stored in that autonomous network node 1141a, 1141b. Each autonomous network node 1141a, 1141b obtains the response to the query from its autonomous database. Further, each autonomous network node 1141a, 1141b anonymizes the identifiable information in its response based on the received sait. Each autonomous network node 1141a, 1141b then sends the response having the anonymized information to the federated network node 1101. The federated network node 1101 receives each response and combines the
267 responses to the query based on the anonymized information, as represented by respective blocks 1105, 1107. The federated network node 1101 may then send the combined response such as to a client device, as represented by block 1109.
[1494] Figure 194 illustrâtes another embodiment of a system 1200 for querying a federated database in accordance with various aspects as described herein. in Figure 194, a federated database 1201 is located in jurisdiction 1203. The federated database 1201 represents sub-federated databases 1211, 1221 located in respective jurisdictions 1213, 1223. Further, each sub-federated database 1211, 1221 represents respective autonomous databases 1215-1217, 1225-1227 located in respective jurisdictions 1211, 1221. The federated database 1201 also represents via the sub-federated databases 1211, 1211 these respective autonomous databases.
[1495] In one embodiment, the federated database 1201 represents a first subfederated database 1211 having one or more first autonomous databases 1215-1217 that are located in a first jurisdiction 1213 with one or more first privacy restrictions.
[1496] Additionally or altematively, the federated database 1201 represents a second sub-federated database 1223 having one or more second autonomous databases 1225-1227 that are located in a second jurisdiction 1223 with one or more second privacy restrictions.
[1497] in another embodiment, the federated database 1201 represents a single autonomous database 1215 that is located in a certain jurisdiction 1213 with one or more privacy restrictions.
[1498] In another embodiment, the federated database 1201 represents a plurality of autonomous databases 1215Ί217 that are located in a same jurisdiction 1213 with one or more privacy restrictions.
[1499] In another embodiment, the federated database 1201 represents a plurality of autonomous databases 1215-1217, 1225-1227 that are located in different jurisdictions 1213, 1223 with one or more different privacy restrictions.
[1500] Figure 195 illustrâtes another embodiment of a network node in accordance with various aspects as described herein. In some instances, the network node 1300 may be referred as a server, a base station, a core network node, a handheid computer, a desktop computer, a laptop computer, a tablet computer, a set-top box, a télévision, an appliance, a medical device, or some other like terminology. In other instances, the network node 1300 may be a set of hardware components. In Figure 195, the network node 1300 may be configured to include a processor 1301 that is operatively coupled to a radio frequency (RF) interface 1309, a network connection interface 1311, a memory 1315 including a random access memory (RAM) 1317, a read only memory (ROM) 1319,
268 a storage medium 1331 or the like, a communication subsystem 1351, a power source 1333, another component, or any combination thereof. The memory 1315 may be used to store one or more databases. The storage medium 1331 may include an operating System 1333, an application program 1335, data or database 1337, or the like. Spécifie devices may utilize ail of the components show, in FIG. 13, or only a subset of the components, and levels of intégration may vary from device to device. Further, spécifie devices may contain multiple instances of a component, such as multiple processors, memories, transceivers, transmitters, receivers, etc. For instance, a computing device may be configured to include a processor and a memory.
[1501] In Figure 195, the processor 1301 may be configured to process computer instructions and data. The processor 1301 may be configured as any sequentiai State machine operative to execute machine instructions stored as machine-readabie computer programs in the memory, such as one or more hardware-implemented state machines (e.g., in discrète logic, FPGA, ASIC, etc.); programmable logictogetherwith appropriais firmware; one or more stored-program, general-purpose processors, such as a microprocessor or Digital Signal Processor (DSP), together with appropriais software; or any combination of the above. For example, the processor 1301 may include two computer processors. In one définition, data is information in a form suitable for use by a computer. It is important to note that a person having ordinary skill in the art will recognize that the subject matter of this disclosure may be implemented using varions operating Systems or combinations of operating Systems.
[1502] In Figure 195, the RF interface 1309 may be configured to provide a communication interface to RF components such as a transmitter, a receiver, and an antenna. The network connection interface 1311 may be configured to provide a communication interface to a network 1343a. The network 1343a may encompass wired and wireless communication networks such as a local-area network (LAN), a wide-area network (WAN), a computer network, a wireless network., a télécommunications network. another like network or any combination thereof. For example, the network 1343a may be a Wi-Fi network. The network connection interface 1311 may be configured to include a receiver and a transmitter interface used to communicate with one or more other nodes over a communication network according to one or more communication protocols known in the art or that may be developed, such as Ethernet, TCP/IP, SONET, ATM, or the like. The network connection interface 1311 may implement receiver and transmitter functionality appropriate to the communication network links (e.g., optical, eleclricai, and the like). The transmitter and receiver fonctions may share circuit components, software or firmware, or attematively may be implemented separately.
269
[1503] In this embodiment, the RAM 1317 may be configured to interface via the bus 1303 to the processor 1301 to provide storage or caching of data or computer instructions during the execution of software programs such as the operating System, application programs, and device drivers. The ROM 1319 may be configured to provide computer instructions or data to the processor 1301. For example, the ROM 1319 may be configured to be invariant low-level system code or data for basic system fonctions such as basic input and output (I/O), startup, or réception of keystrokes from a keyboard that are stored in a non-volatile memory. The storage medium 1331 may be configured to include memory such as RAM, ROM, programmable read-only memory (PROM), erasabîe programmable read-only memory (EEROM), electrically erasable programmable read-only memory (EEPROM), magnetic disks, optical disks, floppy disks, hard disks, removabîe cartridges, flash drives. In one example, the storage medium 1331 may be configured to include an operating system 1333, an application program 1335 such as a web browser application, a widget or gadget engins or another application, and a data file
1337.
[1504] In Figure 195, the processor 1301 may be configured to communicate with a network 1343b using the communication subsystem 1351. The network 1343a and the network 1343b may be the same network or networks or different network or networks. The communication subsystem 1351 may be configured to include one or more transceivers used to communicate with the network 1343b. The one or more transceivers may be used to communicate with one or more remote transceivers of another network node or client device according to one or more communication protocols known in the art or that may be developed, such as IEEE 8O2.xx, CDMA, WCDMA, GSM, LTE, NR, NB loT, UTRAN, WiMax, or the îike.
[1505] In another example, the communication subsystem 1351 may be configured to include one or more transceivers used to communicate with one or more remote transceivers of another network node or client device according to one or more communication protocols known in the art or that may be developed, such as IEEE 802.XX, CDMA, WCDMA, GSM, LTE, NR, NB loT, UTRAN, WiMax, or the Iike. Each transceiver may include a transmitter 1353 or a receiver 1355 to implement transmitter or receiver functionality, respectively, appropriate to the RAN links (e.g., frequency allocations and the iike). Further, the transmitter 1353 and the receiver 1355 of each transceiver may share circuit components, software, or firmware, or alternative^ may be impîemented separately.
[1506] In the current embodiment, the communication fonctions of the communication subsystem 1351 may include data communication, voice communication;
270 multimedia communication, short-range communications such as Bluetooth, near-fietd communication, location-based communication such as the use of the global positioning system (GPS) to détermine a location, another like communication function, or any combination thereof. For example, the communication subsystem 1351 may include cellular communication, Wi-Fi communication, Bluetooth communication, and GPS communication. The network 1343b may encompass wired and wireless communication networks such as a local-area network (LAN), a wide-area network (WAN), a computer network, a wireless network, a télécommunications network, another like network or any combination thereof. For example, the network 1343b may be a cellular network, a Wi-Fi network, and a near-field network. The power source 1313 may be configured to provide an altemating current (AC) or direct current (DC) power to components of the network node 1300.
[1507] In Figure 195, the storage medium 1331 may be configured to include a number of physical drive units, such as a redundant array of independent disks (RAID), a floppy disk drive, a flash memory, a USB flash drive, an external hard disk drive, thumb drive, pen drive, key drive, a high-density digital versatile dise (HD-DVD) optical dise drive, an internai hard disk drive, a Blu-Ray optical dise drive, a holographie digital data storage (HDDS) optical dise drive, an external mini-duai in-line memory module (DIMM) synchronous dynamic random access memory (SDRAM), an external micro-DIMM SDRAM, a smartcard memory such as a subscriber identity module or a removable user identity (SIM/RUiM) module, other memory, or any combination thereof. The storage medium 1331 may allow the network node 1300 to access computer-executable instructions, application programs or the like, stored on transitory or non-transitory memory media, to off-load data, or to upload data. An article of manufacture, such as one utilizing a communication system may be tangibly embodied in storage medium 1331, which may comprise a computer-readable medium.
[1508] The functionality of the methods described herein may be implemented in one of the components of the network node 1300 or partitioned across multiple components of the network node 1300. Further, the functionality of the methods described herein may be implemented in any combination of hardware, software or firmware. In one example, the communication subsystem 1351 may be configured to include any of the components described herein. Further, the processor 1301 may be configured to communicate with any of such components over the bus 1303. In another exampîe, any of such components may be represented by program instructions stored in memory that when executed by the processor 1301 performs the corresponding functions described herein. In another example, the functionality of any of such components may
271 be partitioned between the processor 1301 and the communication subsystem 1351. !n another exampie, the non-computative-intensive functions of any of such components may be implemented in software orfirmware and the computative-intensive functions may be implemented in hardware.
[1509] Those skilled in the art will also appréciais that embodiments herein further include corresponding computer programs. A computer program comprises instructions which, when executed on at least one processor of an apparatus, cause the apparatus to carry out any of the respective processing described above. A computer program in this regard may comprise one or more code modules corresponding to the means or units described above. Embodiments further include a carrier containing such a computer program. This carrier may comprise one of an electronic signal, optical signal, radio signal, or computer readable storage medium.
[1510] In this regard, embodiments herein also include a computer program product stored on a non-transitory computer readable (storage or recording) medium and comprising instructions that, when executed by a processor of an apparatus, cause the apparatus to perform as described above. Embodiments further include a computer program product comprising program code portions for performing the steps of any of the embodiments herein when the computer program product is executed by a computing device. This computer program product may be stored on a computer readable recording medium.
[1511] Additional embodiments will now be described. At least some of these embodiments may be described as applicable in certain contexts and/or wireless network types for illustrative purposes, but the embodiments are simiîarly applicable in other contexts and/or wireless network types not explicitly described.
[1512] As previously mentioned, current federated, sub-federated, and autonomous databases do not consider jurisdictional laws when performing queries. Accordingly, this disciosure describes embodiments to this problem, including using different methods of performing statistical queries for when data needsto be combined based on personal identifiable information between database Systems within or between jurisdictions.
[1513] !n one exemplary embodiment, queries are sent to a modified federated database System that adapts the queries and responses based on formalized jurisdictional régulations, including any other adaption needed to combine the database Systems. The autonomous databases annotate the data with the type of information it contains such as with tags like “identifying information,” “sensitive information,” “general information, “export restriction to jurisdiction X,” “only non-commercial use,” “reduced résolution may be exported” (e.g,, location, images, numbers like income), and the like,
272
These tags formalize the processing/tra nsa étions by the federated or sub-federated databases for the associated data. Accordingiy, the federated or sub-federated database receives these tags from the autonomous databases to inform the federated or subfederated database how to adapt the queries.
[1514] !n another embodiment, for queries that requirë statistical operations within a database System having a federated or sub-federated database that represents one more autonomous databases that are located in the same or different jurisdictions and each identifying information is in one of the autonomous databases, the federated or subfederated database sends the query to each autonomous database. Further, the federated or sub-federated database receives the resuIts from each autonomous database and then combines the results based on one or more statistical operations. For instance, for a query associated with counting visits to a web-page based on data from several autonomous databases (e.g., with a log of identity, time, and web page), the federated or sub-federated database perforons the counting in each response to the query and then combine the counts. These statistical operations may be associated with médian, average, sum, advanced filtering utilizing several databases, or the like. Further, these statistical operations may be associated with vectors, tables, columns, orthe like. [1515] !n another embodiment, for a query that receives responses from different jurisdictions, including from a jurisdiction that requires combining responses from autonomous databases in that jurisdiction and that ailow such combining, a database hierarchy may be used comprising of a federated database having one or more subfederated databases in different jurisdictions, with each sub-federated database representing one or more autonomous databases in the same junsdiciion. Fer example, this hierarchy may be used to count visits to a web-page from pensons in different jurisdictions (e.g., different rural areas). Further, each sub-federated database combines the responses to the query received from each autonomous database that is in the same jurisdiction. The federated database then combines the responses from each subfederated database.
[1516] In another embodiment, the federated database sends the query to each sub30 federated database. Each sub-federated database divides the query to extract any identifying information. For instance, for a query associated with counting visits to a webpage from rural addresses based on data from a sub-federated database that represents a first autonomous database with webpage visits, a log of the identity of each webpage visiter and ths time of each webpage visit, and a second autonomous database, 35 in the same jurisdiction as the first autonomous database, with the identity of each webpage visiter, the address of each webpage visitor, and an indication of whether each
273 address is a rural address, the sub-federated database will divide the query to extract the identifying information from each count that has visited the webpage. As such, the subfederated database sends the divided query to the second database and receives the identifies of the rural addresses. Further, the sub-federated database adds the individuel counts from the rural addresses into a sub-total count, which is sent to the federated database. The federated database adds the sub-total counts from each sub-federated database to obtain a total count
[1517] Additionally or altematively, for a federated database that combines responses from autonomous or sub-federated databases in different jurisdictions, the autonomous or sub-federated databases may anonymize the responses to queries before the federated database combines the responses. A one-way cryptographie hash function that uses a random sait may be utilized, with a new sait used for each query to generate the anonymized information. Further, any and ail records of the sait may be destroyed at the completion of processing each query (one query may contain e.g. several SQL statements, not limited to only one statement) by the federated or sub-federated database. Accordingly, only during the processing of the query is it possible to dérivé the identifiable information from the anonymized information. Further, given the computation a lly complexity of deriving the identifiable information from the anonymized information, it is unlikely that the identifiable information could be derived during this brief query processing duration.
[1518] Furthermore, the federated database créâtes the random sait and sends it with each query or sub-query to the autonomous or sub-federated database. Further, the database hierarchy of federated, sub-federated, and autonomous databases uses the same one-way cryptographie hash function with the sait to anonymize the identifiable information that is sent with each response. Hence, the federated database receives responses from the autonomous or sub-federated databases that hâve the same anonymized information that corresponds to the same identifiable information, allowing. for instance, counting visits to a webpage for each rural address based on the anonymized information for that rural address.
[1519] In one example, a query related to counting the number of visits to a webpage that resuit in buying from that webpage is processed by a federated database. The federated database represenis a first autonomous database with webpage visit iogs, with the first database being in a jurisdiction where the identifying information is not aliowed to be exported from that jurisdiction. Further, a second autonomous database has crédit card information, with the second database being in a different jurisdiction from the first database, and the identifiable information is not aliowed to be exported from that
274 jurisdiction. Also, the first and second databases contain the same identifiable information. The federated database generates a randomized sait for a first query and sends the first query and the randomized sali to the first database. The first database receives the first query and sait, obtains a response to the first query associated with the webpage visit logs, anonymizes the identifiable information (e.g., visitor’s name) of the response based on the randomized sait and a one-way cryptographie hash function, and sends the response with the anonymized information to the federated database, [1520] In addition, the federated database sends a second query and the randomized sali to the second database. The second database receives the second query and sait, obtains a response to the query associated with the crédit card information, anonymizes the identifiable information (e.g., crédit card owner) of the response based on the randomized sait and a one-way cryptographie hash function, and sends the response with the anonymized information to the federated database. The federated database combines the received responses based on the anonymized information.
[1521] The one-way cryptographie hash function may be appiied to data categories other than identifiable information, which may also be combined by the federated database. Further, this combining process may be appiied to category-based data. For instance, category-based data may include medical diagnosis data, reduced-résolution location, City, or the like. In addition, the federated database System may cluster or combine the category-based data so that the particular diagnosis or city cannot be identified from the cluster or combination.
[1522] in another embodiment, homomorphic encryption schemes may be used for other one-way functions for sensitive scalar information. This aliows responses with this équivalent to, and the like) by the federated database. This requires the autonomous databases to use the same homomorphic encryption schemes and keys. A randomized sait may be provided by the federated database system to the autonomous or subfederated databases in the same manner as previously described.
[1523] A query should be understood to include a structured query language (SQL) query, non-SQL (NOSQL) query, graph database query, relational database query, analytic query (e.g., Spark or Hadoop), machine learning query, deep learning query, web-based front-end to information query, and the like.
[1524] The annotation could be done manualîy or automatically based on the actual data. One example of the latter is a name or an address may automatically be recognized as identifying information, medical records or location information could be
275 identified as sensitive information, images that show faces could be annotated only noncommercial use, etc.
[1525] Interworkinq Between Wireless and Wired Communication Networks [1526] As discussed above, an ongoing research challenge isthe inter-working of
5G and TSN. Both technologies define own methods for network management and configuration and different mechanisms to achieve communication determinism that must somehow be arranged to enable end-to-end deterministic networking for industrial networks.
[1527] One way of 5G-TSN interworking is to let the 5G System act as a TSN bridge.
The 5G network needs to offer some control interfaces towards the TSN network depending upon the TSN configuration model chosen as explained above. In the central configuration mode!, the central control entities CUC/CNC might occur on both sides of the 5G network. Furthermore, TSN networks of various topologies could be deployed on both sides in contrast to Figure 5 where only a single endpoint is depicted behind the UE.
If the 5G network acts as a TSN bridge, it is required that TSN-capable devices, e.g. bridges and endpoints, are deployed on both sides of the 5G network.
[1528] !n 3GPP TS 23.501 section 5.6.10.2, the support of Protocol Data Unit (PDU) sessions of type Ethernet in a 5G network is explained. On the N6 interface between PDU Session Anchor (PSA) UPF and a Data Network (DN), two potentiel options are explained for PDU sessions of type Ethernet. At first it is possible to hâve a one-to-one mapping between an N6 interface and a PDU session and as a second option a mapping based on MAC addresses of multiple PDU sessions to a N6 interface. The solution explained herein can be applied to any configuration option.
[1529] Figure 196 illustrâtes the protocol transition at PSA UPF for Ethernet type
PDU sessions as explained in 3GPP TS 29.561, i.e. Ethernet frame handling at UPF. [1530] There are no methods available to ailow a connection of devices using 5G, supporting no or jusf a limited set of TSN-features to a TSN network over a 5G network.
[1531] Any traffic bridged to a TSN network without being registered (as explained above) in the TSN domain as a TSN stream will be handled as best-effort traffic without guarantees on quality-of-service (QoS). This way, end-to-end QoS may not be guaranteed.
[1532] Therefore it is an object of embodiments herein to provtde a method for enabling end-to-end connectivity with guaranteed QoS between a wireless communication network, e.g. a 5G network and a wired communication network, e.g. a 35 TSN network.
276
[1533] According to embodiments herein, a solution defines a function in the 5G user plane, that handles certain TSN features for devices being connected over 5G to a TSN network. The solution therefore allows an interworking between the 5G and TSN network with end-to-end guaranteed QoS. This function may be called a Virtual Endpoint (VEP). The VEP may be realized as Virtual listener and/or Virtual talker depending upon the rôle of a 5G device, for example a UE or an application running on top respectively. [1534] The VEP may be used in any TSN configuration mode, so either distributed, centralized orfully centralized, as introduced above.
[1535] In the case of distributed TSN configuration model, the VEP may directîy communicate to the nearest switch in the TSN network. In the fully centralized model it may be a reference point to CUC.
[1536] Multiple VEP instances may be impie mented in the 5G network. In TSN, one endpoint is able to communicate using multiple TSN streams. A VEP from an TSN perspective is a single endpoint. In the most common scénario, a VEP also corresponds to one 5G device with one PDU session in the 5G network. Traffic from one TSN stream will be mapped at the VEP to one QoS Flow and vice-versa. Traffic from multiple TSN streams will be mapped to multiple QoS Flows within the same PDU session.
[1537] Multiple benefits may be achieved by introducing the Virtual Endpoint (VEP) function in the 5G user plane:
• It allows to connect non-TSN devices to a TSN network with guaranteed end-toend QoS.
• It allows to connect non-Ethernet devices to a TSN network with guaranteed endto-end QoS • TSN features may be impiemented in the 5G network centraliy, for exemple to avoid a configuration over the air interface or in case of a feature-lacking at endpoints or bridges.
* TSN and Ethernet control traffic, e.g. Link Layer Discovery Protocol (LLDP), time synchronization etc., does not need to be carried over the 5G radio interface but handled by VEP.
[1538] According to embodiments herein, a solution to connect 5G endpoints to a TSN network is to introduce a new 5G user plane feature. The new 5G user plane feature enables end-to-end QoS-guaranteed connectivity in a network comprising of a 5G and a TSN part. The function or feature introduced may be called Virtual Endpoint (VEP).
[1539] A generic exampie where an VEP may be used from the industrial domain is given in Figure 197, which shows 5G-TSN interworking in an industrial setup. The 5G endpoint therein may be an industrial robot wirelessly connected to the 5G network. The
277 robot may be on the factory shop fioor. The corresponding robot controller e.g. a Programmable Logic Controlier (PLC) is connected to a TSN network e.g. in the factory’s IT room. For a robot to be abie to communicate ίο the controlier in an end-to-end QoSenabied way, it is necessary that both belong to the same TSN domain, as explained above. A VEP implements a complété set or a part of the TSN features and corresponding mapping to 5G QoS fonctions required for TSN-5G interworking.
[1540] The VEP is implemented in the 5G user plane close to or as part of the User Plane Function (UPF). It is responsible to map QoS in the 5G network and in the TSN network and is involved in the configuration.
[1541] A VEP may be used for PDU sessions of Type Ethernet or IP. In the most common scénario a VEP may be used to map traffic from one QoS Flow to one TSN stream and vice versa. Nevertheless, it may also be possible to map traffic between one or more TSN streams and one or more QoS Flows using one VEP instance. This means using one VEP instance for one PDU session. In addition, it may also be possible to combine traffic from multiple PDU sessions in a single VEP.
[1542] Multiple VEP instances may be used within one UPF. If one VEP instance is used for one PDU session then multiple TSN streams may be connected to that VEP and for exampie one-to-one mapped to multiple QoS Flows within the PDU session as explained above.
[1543] Figure 198 illustrâtes the flow of control and user plane when introducing the VEP in case aO Ethemet and TSN control plane traffic is handled at the VEP, for example for an PDU session of type !P, e.g. a non-Ethernet non-TSN device behind the UE.
[1544] Figure 199 illustrâtes how a VEP may be implemented as part of the UPF for PDU sessions of type IP or of type Ethernet. Further functionalities of the UPF like packet filtering are not displayed in here but may also be used in conjunction with a VEP. A VEP for PDU sessions that are not fully supporting TSN may be used within a UPF in parallel to PDU sessions of type Ethernet whereTSN is supported end-to-end between two endpoints across the 5G network, as also illustrated in Figure 200.
[1545] The main functionalities of a VEP are:
♦ mapping of PDU session(s) to TSN stream(s) - only relevant if the PDU session is of type IP, otherwise it’s a standard action done at the UPF.
• establishing or modifying TSN streams or PDU sessions or QoS Flows and translating the different QoS domains correspondingly.
• impiementing and supporting certain user and control plane features used in TSN, like time-aware traffic shaping as defined in 802.1 Qbv and time synchronization as defined in 802.1AS-rev used for that purpose.
278 • interfacing with CUC and or the nearest TSN bridge in the TSN domain.
[1546] A VEP maps one or more TSN streams to one or more PDU sessions or QoS Flows as explained above. it therefore maintains a mapping table internally. For mapping purposes, the VEP may use the TSN stream ID or PDU session ID or QoS Flow IDs (QFIs) respectively. In case of one-to-one mapping of e.g. one QoS Flowto one TSN stream this mapping is of course much simpler,
[1547] In case a PDU session of type IP is used, the VEP will use a Medium Access Control (MAC) address from a local MAC address pool or from another source, like e.g. a manually assigned MAC address. Ethernet forwarding of the IP packets from an IP PDU session is then possible to an externai Ethernet DN network. This MAC address will be advertised towards the DN and also populated towards the TSN control instances.
[1548] For mapping purposes, ii is further necessary that the VEP may also support various TSN features like 802.1AS, 802,1Qbv, 802.1Qcc etc.
[1549] To be able to croate or modify PDU sessions, the VEP may need to interface the SMF in the 5G network. This interfacing may be done using the existing N4 interface if a VEP is implemented as part of the UPF. Furihermore, below are the two embodiment methods, describing the sequence of the communication between a VEP and the 5G endpoint acting as Talker i.e. transmitter of data, or Listener, i.e. receiver of data.
[1550] Procedure if 5G endpoint is a talker:
1. Application at the 5G endpoint will request a communication link from UE.
2. UE PDU session request or use existing one to VEP/UPF.
3. VEP estimâtes the required QoS for a TSN stream by either or a combination of:
s. Mapping of QoS Flow ID (QFI) selected by UE to TSN stream QoS;
b. Dedicated application QoS spécifie to TSN given by the UE or the application on top;
c. Pre-configured QoS settings within the VEP for the TSN network;
d. Check QoS settings with CUC in the TSN network for the TSN network;
4. Based on the QoS settings, the VEP will try to establish a TSN stream; or map it to an existing TSN stream or initiate a TSN stream setup towards the CNC or CUC dépends upon how the TSN network is configured, which the VEP shaii be aware of by using TSN features as defined in e.g. 802.1Qcc.
5. In case the TSN stream setup is successful the user plane communication starts; the VEP will then map user plane packets from the PDU session or the spécifie QoS Flow as explained above to the established TSN stream as well as performing required actions defined by the TSN features used in the TSN network.
279
[1551] According to one embodiment, when estimating the required QoS for the TSN stream in step 3), the VEP considers the internai communication performance parameters within the 5G network, i.e. between the VEP and the end-device. e.g. one way or round-trip latency, packet errer rate or reliability indicator, etc, When the VEP communicates QoS requirements to the TSN network, it considers those internai performance parameters, since the TSN network “thinks” that the VEP and the endpoint are the same. Therefore, when it cornes for example to a required end-to-end latency value to be communicated to the TSN network, instead of indicating the real requirement of X ms, a harder requirement of X ms-(VEP to end-device delay) is indicated. To find out the internai communication performance parameters, communication protocols within the 5G network may be used, such as:
• VEP communicates directly or via further 5G core fonction with the gNB to obtain measurements or estimâtes of the UE-gNB, i.e. 5G radio interface communication performance. For example, latency measurements or estimâtes. The gNB may use measurements to the UE itself, and may also consider its own traffic or load situation to further estimate how well or fast it can serve the spécifie UE.
• Probing packets may be used between the VEP and the UE, and back, e.g. in orderto obtain the latency between VEP and UE.
[1552] Procedure if 5G endpoint is a listener:
1. Application at the TSN endpoint will request a TSN stream or a TSN stream wii! be requested by the CUC depending upon the configuration model.
2. A TSN stream request wili be received at the VEP.
3. The VEP will also receive the QoS for the TSN stream and map it to 5G QoS. The mapping may be based on a fixed configuration setting. If the VEP analyzes that the QoS cannot be supported by the 5G network it might décliné the TSN stream request.
4. Based on the QoS settings the VEP will either establish a new PDU session or use an existing PDU session or modify an existing PDU session to meet the requested QoS,
5. In case the TSN stream and PDU session setup is successful the user plane communication starts, The VEP will then map user plane packets from the TSN stream to the corresponding PDU session and QoS Flow, as well as performing required actions defined by the TSN features used in the TSN network,
[1553] According to an embodiment, in step 3), in order to be able to décidé whether the QoS of the TSN stream can be folfilied, the VEP considers measurements or estimâtes of the 5G internai communication performance between the VEP and the end
280 device. Those measurements may be obtained as described above for step 3) for the talker procedure.
[1554] Spécifie features a VEP may support are for-exampîe time synchronisation to an external grandmaster clock as explained in IEEE 802.1 AS-rev to support for example time-aware scheduling as defined in IEEE 802.1Qbv. The VEP will be invelved in the setup of a time-aware TSN communication and forward packets to/from a 5G endpoint that is not time-aware accordingly.
[1555] In the future it is envisioned that 5G network will interwork with TSN enabling industrial use case. In such situation, impîementing complex TSN features on UE side will become a cumbersome task. The embodiments herein propose a new feature to the 5G user plane cailed Virtual Endpoint (VEP) which enables interworking of TSN and 5G network. It further allows also connection of non-TSN devices and also non-Ethernet devices to a TSN network using 5G.
[1556] Example Embodiments of methods for enabling end-to-end connectivity between a wireless communication network, e.g. 5G and a wired communication network, e.g. TSN network, will be described in the following,
[1557] Embodiment 1 : A method in a communication network for enabling end-toend connectivity between a wireless communication network, e.g. 5G and a wired communication network, e.g. TSN network. The method comprising:
• impîementing a Virtual Endpoint, VEP, in the wireless communication network;
• impîementing in the VEP certain user and control plane features used in the wired communication network;
• mapping data traffic, in the VEP, between a device in the wireless communication network and a device in the wired communication network based on Quaîity-ofServtce, QoS;
• performing required actions defined by the features used in the wired communication network.
[1558] According to some embodiments, the VEP may be implemented in the 5G network user plane close to or as a part of User Plane Function, UPF.
[1559] According to some embodiments, mapping data traffic between a device in the wireless communication network and a device in the wired communication network based on QoS may comprise establishing or modifying TSN streams or Protocol Data Unit, PDU sessions or QoS Flows and translating different QoS domains correspondingly. [1560] Embodiment 2: A method performed in a Virtual Endpoint, VEP implemented in a wireless communication network for enabling end-to-end connectivity to a wired communication network. The method comprising:
281 ♦ receiving a communication request from a device in either the wireless communication network or the wired communication network;
• estimating a required QoS;
• mapping data traffic between a device in the wireless communication network and a device in the wired communication network based on the required QoS;
• performing required actions defined by features used in the wired communication network,
[1561] The wireless communication network may be a 5th génération, 5G, network and the wired communication network may be a Time Sensitive Networking, TSN, network. The communication session is a Protocol Data Unit, PDU, session, the data stream is a TSN stream.
[1562] Embodiment 3: A method performed in a Virtual Endpoint, VEP implemented in a wireless communication network for enabling end-to-end connectivity to a wired communication network. The endpoint or device in the wireless communication network is a talker, the method comprising:
* receiving a communication session request from a device in the wireless communication network;
• estimating a required QoS for a data stream in the wired communication network;
• establishing a data stream in the wired communication network based on the required QoS:
• mapping user plane packets from the communication session or a spécifie QoS Flow to the established data stream;
• performing required actions defined by features used in the wired communication network.
[1563] The wireless communication network may be a 5th génération, 5G, network and the wired communication network may be a Time Sensitive Networking, TSN, network. The communication session may be a Protocol Data Unit, PDU, session, the data stream is may be a TSN stream.
[15641 According to some embodiments herein, establishing a data stream based on the required QoS comprising mapping to an existing data stream or initiating a data stream setup in the wired communication network.
[1565] According to some embodiments herein, estimating a required QoS may be performed by one or a combination of:
• mapping a QoS Flow iD, QFI, seiected by the device to a TSN stream QoS;
• choosing a dedicated appiication QoS spécifie to the TSN given by the device;
282 • choosing from pre-configured QoS settings within the VEP for the TSN network;
• checking QoS settings with CUC in the TSN network for a TSN stream.
[1566] Embodiment 4: A method performed in a Virtual Endpoint, VEP implemented in a wireless communication network for enabling end-to-end connectivity to a wired communication network. The endpoint or device in the wireless communication network is a iîstener, the method comprises:
• receiving a data stream request from a device in the wired communication network;
» receiving a QoS for the data stream;
• checking if QoS of the wireless communication network meets the QoS of the data stream;
• if the QoS of the wireless communication network meets the QoS of the data stream,
a. esiablishing a communication session in the wireless communication network based on the QoS for the data stream;
b. performing required actions defined by features used in the wired communication network.
[15671 According to some embodiments herein, establishing a communication session based on the QoS of the data stream comprising establishing a new communication session or using an existing communication session or modify an existing communication session to meet the QoS of the data stream.
[1568] Performing Operations Based on Distributed Stored Data
[1569] In data storage, data is often replicated to severai nodes, e.g., to obtain swift data availability and/or prevent data corruption/loss. Thus, severai représentations of the same data may be kept in different storage entities. For example, in cloud-based Systems and in edge compute Systems, storage is often distributed over severai nodes (e.g., computers, servers, storage units, etc.) and over severai tiers of performance (e.g., cache, dynamic random-access memory - DRAM, flash disk, spinning disk, etc.).
[1570] Performing a set of operations based on data stored as severai représentations kept in different storage entities may be time consuming, and the latency until a resuit of performing the operations is provrded may be unacceptably high in some situations.
[1571] Therefore, there is a need for alternative approaches for performing a set of operations based on data, wherein a plurality of représentations of the data are kept in respective ones of a plurality of storage entities. Preferably, such approaches provide a
283 réduction of the latency from sending of a data query until a resuit of performing the set of operations is provided.
[1572] It is an object of some embodiments to solve or mitigate, alleviate, or eliminate at least some of the above or other disadvantages.
[1573] A first aspect is a method of a controller for management of performing a set of operations based on data, wherein a plurality of représentations of the data are kept in respective ones of a plurality of storage entities.
[1574] The method comprises (for each of two or more storage entities of the plurality of storage entities) sending - to the storage entity - a respective query relating to the data, and receiving - from the storage entity - a response comprising the représentation of the data kept in the storage entity.
[1575] The method also comprises (for each of at least two of the two or more storage entities) initiating an activity of performing the set of operations based on the représentation of the data comprised in the response.
[1576] Furthermore, the method comprises determining (based on the représentations of the data comprised in the responses) one of the initiated activities - a conclusive activity - as being based on a conclusive représentation of the data, and causing provision of a resuit of the conclusive activity as resuît for performing the set of operations based on the data.
[1577] In some embodiments, activities of performing the set of operations are initiated only for storage entities for which the représentation of the data comprised in the response differs from représentations of the data comprised in previously received responses.
[1578] In some embodiments, the method further comprises determining the conclusive représentation of the data by taking a majority, or weighted majority, decision among the représentations of the data comprised in the responses.
[1579] In some embodiments, the détermination of the conclusive activity is performed before ail initiated activities are completed.
[1580] In some embodiments, the activities are initiated before the détermination of the conclusive activity.
[1581] !n some embodiments, the conclusive représentation coïncides with the représentation of the data kept in the storage entity for ai least one of the two or more storage entities.
[1582] In some embodiments, the method further comprises, in response to determining the conclusive activity, canceling initiated activities that are not based on the conclusive représentation.
284
[1583] In some embodiments, the method further comprises, in response to determining the conclusive activity, canceling ail initiated activities, except for one that is based on the conclusive représentation,
[1584] In some embodiments, the method further comprises, before determining the conclusive activity, canceiing or pausing initiated activities for which a probability of being based on the conclusive représentation of the data falls below a probability threshold value,
[1585] In some embodiments, at least two of the two or more storage entities hâve differing signaling delay between the controller and the storage entity.
[1586] Having differing signaling delay may be interpreted as having different signaling delay according to some embodiments.
[1587] In some embodiments, a storage client comprises the controller and one of the two or more storage entities, and the one storage entity keeps a représentation of the data which is a défaut représentation or a last known représentation.
[1588] A second aspect is a method of a controller for management of performing a set of operations based on data, wherein a plurality of représentations of the data are kept in respective ones of a plurality of storage entities.
[1589] The method comprises (for each of two or more storage entities of the plurality of storage entities) sending - to the storage entity - a respective query relating to the data, thereby causing initiation of an activity of performing the set of operations based on the représentation of the data kept in the storage entity, and receiving - from the storage entity - a response comprising an indicator of the représentation of the data kept in the storage entity.
[1590] The method also comprises determining (based on the indicators comprised in the responses) one of the initiated activities - a conclusive activity - as being based on représentation of the data corresponding to a conclusive indicator, and causing provision of a resuit of the conclusive activity as resuit for performing the set of operations based on the data.
[1591] In some embodiments, the method further comprises determining the conclusive indicator by taking a majority, or weighted majority, decision among the indicators comprised in the responses.
[1592] in some embodiments, ihe détermination of the conclusive activity is performed before ail initiated activities are completed.
[1593] In some embodiments, the activities are initiated before the détermination of the conclusive activity.
285
[1594] ln some embodiments, the représentation ofthe data corresponding to the conciusive indicator coïncides with the représentation of the data kept in the storage entity for ai least one of the two or more storage entities.
[1595] In some embodiments, the method further comprises, in response to determining the conclusive activity, canceiing initiated activities that are not based on the représentation ofthe data corresponding to the conclusive indicator.
[1596] In some embodiments, the method further comprises, in response to determining the conclusive activity, canceling ail initiated activities, except for one that is based on the représentation of the data corresponding to the conclusive indicator.
[1597] In some embodiments, the method further comprises, before determining the conclusive activity, canceling or pausing initiated activities for which a probability of being based on représentation of the data corresponding to the conclusive indicator falls below a probability threshold value.
[1598] In some embodiments, at least two of the two or more storage entities hâve differing signaling delay between the controller and the storage entity.
[1599] Having differing signaling delay may be interpreted as having different signaling delay according to some embodiments.
[1600] In some embodiments, a storage client comprises the controller and one of the two or more storage entities, and wherein the one storage entity keeps a représentation of the data which is a default représentation or a last known représentation.
[1601] The first and second aspects may be described as a method of a controller for management of performing a set of operations based on data, wherein a piurality of représentations of the data are kept in respective ones of a piurality of storage entities.
[1602] The method comprises (for each of two or more storage entities of the piurality of storage entities) sending - to the storage entity - a respective query relating to the data, and receiving - from îhe storage entity - a response comprising information relating to the représentation of the data kept in the storage entity (the information comprising, e.g., the représentation, or an indicator of the représentation).
[1603] The method also comprises (for each of at least two of the two or more storage entities) causing initiation of an activity of performing the set of operations based on the représentation ofthe data (wherein the initiation may be caused, e.g., by sending of the query or by performing the initiation).
[1604] Furthermore, the method comprises determining (based on the information relating to the représentations of the data comprised in the responses) one of the initiated activities - a conclusive activity - as being based on représentation of the data
286 corresponding to conclusive information relating to the représentation of the data (wherein the conciusive information may, e.g., be a conclusive représentation of the data or a conclusive indicator), and causing provision of a resuit of the conclusive activity as resuit for performing the set of operations based on the data.
[1605] Generally, the conciusive activity is one of the initiated activées of performing the set of operations. The initiated activities of performing the set of operations are also referred to as spéculative activities later herein. Thus, in that termlnology the conclusive activity is one of the spéculative activities. The conclusive activity is typîcally chosen among the initiated activities based on a data consistent^ decision.
[1606] The data consistency decision may, for example, détermine one of the représentations of the data as a conciusive représentation and the conclusive activity may be chosen as an activity that was initiated based on the conclusive représentation. For exampie, a majority decision among the représentations of the data comprised in the received responses may provide the conclusive représentation.
[1607] Altematively or additîonally, the data consistency decision may, for example, détermine one of the indicators of représentations of the data as a conclusive indicator and the conclusive activity may be chosen as an activity that was initiated based on a représentation of the data that corresponds to the conciusive indicator. For example, a majority decision among indicators comprised in frie received responses may provide the conclusive indicator.
[1608] A third aspect is a computer program product comprising a non-transitory computer readable medium, having thereon a computer program comprising program instructions. The computer program is loadabie into a data processing unit and configured to cause execution of the method according to any of the first and second aspects when the computer program is run by the data processing unit.
[1609] A fourth aspect is an apparatus for a contrôler and for management of performing a set of operations based on data, wherein a plurality of représentations of the data are kept in respective ones of a plurality of storage entities.
[1610] The apparatus comprises controilrng circuitry configured to cause (for each of two or more storage entities of the plurality of storage entities) sending - to the storage entity - of a respective query relating to the data, and réception - from the storage entity - of a response comprising the représentation of the data kept in the storage entity.
[1611] The controtîing circuitry is also configured to cause (for each of at least two of Îhe two or more storage entities) initiation of an activity of performing the set of operations based on the représentation of the data comprised in the response.
287
[1612] Furthermore, the controlling circuitry is confîgured to cause détermination (based on the représentations of the data comprised in the responses) of one of the initiated activities - a conclusive activity - as being based on a conclusive représentation of the data, and provision of a resuit of the conclusive activity as resuit for performing the set of operations based on the data.
[1613] A fifth aspect is an apparatus fora controller and for management of performing a set of operations based on data, wherein a plurality of représentations of the data are kept in respective on es of a plurality of storage entities.
[1614] The apparatus comprises controlling circuitry confîgured to cause (for each of two or more storage entities of ihe plurality of storage entities) sending - to the storage entity - of a respective query relating to the data, thereby causing initiation of an activity of performing the set of operations based on the représentation of the data kept in the storage entity, and réception - from the storage entity - of a response comprising an indicator of the représentation of the data kept in the storage entity.
[1615] Furthermore, the controlling circuitry is confîgured to cause détermination (based on the indicators comprised in the responses) of one of the initiated activities - a conclusive activity - as being based on représentation of the data corresponding to a conclusive indicator, and provision of a resuit of the conclusive activity as resuit for performing the set of operations based on the data.
[1616] The fourth and fifth aspects may be described as an apparatus for a controller and for management of performing a set of operations based on data, wherein a plurality of représentations of the data are kept in respective ones of a plurality of storage entities.
[1617] The apparatus comprises controlling circuitry confîgured to cause the method steps of any of the first and second aspects, or of the method combining the first and second aspects.
[1618] A sixth aspect is a storage client comprising the apparatus of any of the fourth and fifth aspects.
[1619] A seventh aspect is a client node comprising the apparatus of any of the fourth and fifth aspects and/or the storage client of the sixth aspect.
[1620] In some embodiments, any of the above aspects may additionaily hâve features identical with or corresponding to any of the various features as explained above for any of the other aspects.
[1621] An advantage of some embodiments is that alternative approaches are provided for performing a set of operations based on data, wherein a plurality of représentations of the data are kept in respective ones of a plurality of storage entities.
288
[1622] Another advantage of some embodiments is that a réduction of the latency from sending of a data query until a resuit of performing the set of operations is provided - may be achieved.
[1623] Yet an advantage of some embodiments is that reduced power consumption and/or reduced utilization of operaticn-performing resources may be achieved.
[1624] Yet a further advantage is that the resuit of the performing of the set of operations corresponds to the resuit achieved when data consistency is obtained before any activity of performing the set of operations is initiated.
[1625] As mentioned above, there may be latency issues when a set of operations are to be performed based on data stored in several représentations, each kept by a respective storage entity.
[1626] When a set of operations are to be performed based on data stored in several représentations, two or more of the représentations are typically obtained and a data consistency decision (e.g., a majority decision) is taken to détermine which représentation of the data to use when the set of operations is performed. The représentation of the data that is used for performing the set of operations may be termed a conclusive représentation of the data.
[1627] For example, if there are seven représentations of the data, wherein four of the représentations are identical (coincide), that représentation is selected as the conclusive représentation if a majority decision is applied. To further illustrate this example, assume that four of the seven représentations hâve a first value “a”, that two of the seven représentations hâve a second value b” and that one of the seven représentations has a third value “c”. Then, the conclusive représentation has the first value a” if a majority decision is applied since the représentations having the first value “a” are in majority among the seven représentations.
[1628] There is typically a delay, after sending a data query, before the représentations of the data can be obtained. The delay may be more prominent in some cases, e.g., when there is a relativeîy large geographical distance between the device sending the query and the storage entity keeping the représentation of the data, and/or when the storage entity keeping the représentation of the data is a sîow-access storage entity. Furthermore, the delay may be different for different storage entities.
[1629] For example, the first response (comprising a représentation of the data) may arrive relativeîy fast after the query has been sent; for example, if that représentation of the data is kept locally and maybe even in a memory/cache comprised in the same apparatus as the querying party. Other responses (comprising a représentation of the data) that are needed to obtain data consistency may arrive several orders of magnitude
289 later; e.g., approximately 100 miHiseconds or more after the query has been sent for geodisiributed Systems.
[1630] Thus, the représentations of the data may arrive with different delay; ai different points in time. These delay issues postpone the majority decision (and thereby the performing of the operations based on the conclusive représentation of the data and the provision of a resuit thereof) until ail représentations hâve been obtained, [1631] In the following, embodiments will be described for management of performing a set of operations based on data, wherein a plurality of représentations of the data are kept in respective ones of a plurality of storage entities.
[1632] A contrôler (e.g., controlling circuitry or a control entity/module) may be managing the performing of the set of operations. The controller may, for exampie, be comprised in a storage client.
[1633] The plurality of représentations of the data provide several sources of truth for the data. The plurality of représentations of the data may, for example, be for one or more of; consistency handling, redundancy, reliability, validity, error protection, error détection, error correction, etc.
[1634] One or more of the plurality of représentations of the data may differ from other représentations of the same data. For example, some représentations may hâve undergone an update via a Write operation while other représentations hâve not yet undergone the update (e.g., dueto signaling delay).
[1635] The data can hâve any suitable form, including (but not limited to) one or more scalar or complex values, one or more vectors, one or more matrices, one or more other data structures, one or more documents, one or more data file, one or more images, one or more videos, one or more audio tracks, etc.
[1636] The plurality of storage entities may, for example, comprise storage at different (physical or Virtual) nodes and/or storage in different tiers at the same (physical or Virtual) node. In some embodiments, different tiers may be comprised in the same storage arrangement (e.g., an arrangement of several computers in a same data center or a same rack of computers).
[1637] Generally, different tiers may refer to a lower numbered tier keeping some partial set of data stored in a higher numbered tier, wherein the lower numbered tier has iower latency than the higher numbered tier. For example, tier 0 may be a dynamic random-access memory (DRAM), tier 1 may be a solid-state drive (SSD) disk, and tier 2 may be spinning hard disk.
[1638] Furthermore, one or more of the storage entities may apply cloud-based storage. One or more - but not ail - of the storage entities may be a local storage entity
290 (e.g., a cache memory or a register) of the controller managing the performing of the set of operations. For example, a storage client may comprise the controller and one storage entity that keeps a représentation of the data which is a default représentation or a last known représentation.
[1639] Thus, the storing of the plurality of représentations of the data is distributed (e.g., over one or more of: different tiers, different nodes, different geographical locations, etc.)
[1640] According to some embodiments, activities of performing the set of operations is initiated before the data consistency decision has been made. Typically, this means that performing of the set of operations is initiated in several instances; each of which may be seen as a spéculative activity of performing the set of operations. For exampie, a spéculative activity of performing the set of operations may be initiated based on each of a number of représentations of the data (e.g., a number of unique représentations of the data).
[1641] When used herein, the term activity of performing the set of operations” may, for exampie, refer to an activity comprising (or consisting of) performing of the set of operations.
[1642] A spéculative activity of performing the set of operations may be defined as performing (at least part of) the set of operations before the data consistency decision has been made. Typically, ail initiated spéculative activities comprise performing of the same set of operations, while the représentation of the data that the set of operations are performed based on may differ between initiated spéculative activities of performing the set of operations.
[1643] Then, when a data consistency decision has been made, some embodiments comprise cancelling spéculative activities of performing the set of operations that are not based on a représentation of the data corresponding to the data consistency decision (and possibly cancelling duplicate spéculative activities of performing the set of operations that are based on a représentation of the data corresponding to the data consistency decision). Some embodiments may comprise Setting one or more of the spéculative activities continue after the data consistency decision has been made, even if they are duplicates and/or are not based on a représentation of the data corresponding to the data consistency decision.
[1644] Generally, cancelling activities of performing the set of operations may be seen as aborting, stopping, or prematurely ending the activities of performing the set of operations.
291
[1645] fn any case, when the data consistency decision has been made, a resuit of a spéculative activity of performing the set of operations that is based on a représentation of the data corresponding to the data consistency decision may be provided as resuit for performing the set of operations based on the data.
[1646] The data consistency decision will be referred te herein as providing a conclusive (consistent) représentation of the data and/or a conclusive (consistent) indicator of the représentation of the data. The conclusive représentation of the data may, for example, correspond to one of the représentations of the data. The data consistency decision may be a consensus-based decision; e.g., a majority, orweighted majority, decision among, e.g., obtained représentations of the data or obtained indicators of the représentation of the data.
[1647] Performing a set of operations in a spéculative activity may, for example, comprise executing a software code portion. The set of operations may comprise an exécutable, or a software artefact. Aîtemativeiy oradditionally, the set of operations may comprise execution in hardware. Examples of an exécutable, or a software artefact, include a software function, a method, a script, a binary exécutable module, an exécutable context, a software code portion, etc. Any of these, and/or other, examples of sets of operations may be performed in a spéculative activity. A spéculative activity of performing the set of operations may, in some scénarios, be termed a spéculative execution.
[1648] Figure 201 illustrâtes an example method 100 according to some embodiments. The method is for a controller, and for management of performing a set of operations based on data, wherein a plurality of représentations of the data are kept in respective ones of a plurality of storage entities.
[1649] In step 110, a respective query is sent to each storage entity of a collection of storage entities of the plurality of storage entities. How the collection of storage entities are selected from the plurality of storage entities may be in accordance with any suitable approach. Numerous such suitable approaches are known in the art.
[1650] The query is reîated to the data. For example, the query may comprise a request or prompt for the data (the représentation of the data kept in the storage entity). [1651] In steps 120, a response (e.g., a query response) is received from two or more storage entities of the collection of entities. The response comprises the représentation of the data kept in the storage entity from which the response is received. Typicaîly, the responses are received at different points in time due to different deiays, for the different storage entities, between storage entity and the controller. As mentioned
292 before, the different delays may, for example, be due to different signaling deiays (e.g., due to different geographical distances) and/or different storage access times.
1'652] in Figure 201, the two or more storage entities are represented by four storage entities denoted as a first storage entity, an n:th storage entity, a p:th storage entity, and an x:th storage entity.
[1653] In some embodiments, a response is received from ail storage entities in the collection of storage entities (i.e., the collection of storage entities consists of the two or more entities). In some embodiments, a response is received from less than ail storage entities in the collection of storage entities (i.e., the collection of storage entities consists of the two or more entities and one or more other storage entities). In any case, the collection of storage entities comprises the two or more entities, Thus, sending a respective query to each storage entity of the colîection of storage entities comprises sending a respective query to each ofthe two or more storage entities.
[1654] For example, a response may be received from seven storage entities; thus providing seven représentations of the data wherein, for example, four of the représentations hâve a value “a”, two of the représentations hâve a value “b” and one of the représentations has a value “c.
[1655] Activités of performing the set of operations is then initiated for at least two of the two or more storage entities as illustrated by steps 130. Typically, each initiation is performed directly responsive to the réception of the corresponding response. Then, if the responses are received at different points in time, the initiations will be performed at different point in time.
[1656] The set of operations may be performed in the controiler itself or in an apparatus connected to, or otherwise associated with, the controiler. For example, the set of operations may be performed in the storage client, or may be distributedly performed (e.g,, cloud-based execution),
[1657] The initiated activity is based on the représentation of the data comprised in the response.
[1658] Typically, activities of performing the set of operations are initiated only for storage entities for which the représentation of the data comprised in the response differs from représentations of the data comprised in previously received responses (reiated to the same request for performing the set of operations). Thus, activities of performing the set of operations are initiated only for unique représentations of the data. This has the advantage of not unnecessarily utilizing resources (processing hardware, power consumption, etc.) for performing of the set of operations.
293
[1659] For example, an activity of performing the set of operations is typically inîtiated for the first storage entity (iilustrated by a solid line for the corresponding step 130). Then, for each new response it is determined whether the représentation of the data comprised in the response coïncides with the représentation of the data comprised in an already received response.
[1660] if so, it may be decided to not initiate any activity of performing the set of operations for that storage entity (iilustrated for the nith and x;th storage entities by a dashed line for the corresponding steps 130).
[1661] If the représentation of the data comprised in the response does not coïncide with any of the représentations of the data comprised in already received responses (Le., if the représentation of the data comprised in the response is unique), an activity of performing the set of operations is inîtiated for that storage entity (iilustrated for the p:th storage entities by a solid line for the corresponding step 130).
[1662] For the example with seven received responses wherein four of the représentations hâve a value “a, two of the représentations hâve a value :‘b” and one of the représentations has a value “c“, three (spéculative) activities of performing the set of operations may be inîtiated - one based on the value “a”, one based on the value “b” and one based on the value “c”.
[1663] In step 150, one of the inîtiated activities of performing the set of operations is determined as being based on a conclusive représentation of the data. This activity is iermed the conclusive activity. Thus, the conclusive activity is one of the inîtiated activities of performing the set of operations. The détermination of the conclusive activity is based on the représentations of the data comprised in the responses. For exampie, step 150 may comprise determining the conclusive représentation of the data by taking a majority, orweighted majority, decision among the représentations of the data comprised in the responses, and selecting the conclusive activity as an inîtiated activity of performing the set of operations that is based on a représentation of the data that corresponds to (e.g., coïncides with) the conclusive représentation of the data.
[1664] Determining the conclusive représentation of the data and/or determining the conclusive activity may be seen as comprised in a data consistency decision.
[1665] Thus, the conclusive activity is chosen among the inîtiated activities based on a data consistency decision, wherein ths data consistency decision détermines one of the représentations of the data as a conclusive représentation and the conclusive activity is chosen as an activity that was inîtiated based on the conclusive représentation.
[1666] Step 150 may be performed when responses hâve been received from ali storage entities of the collection of storage entities. Altematively, step 150 may be
294 performed before responses hâve been received from ail storage entities of the collection of storage entities, e.g., when a certain number of responses hâve been received (e.g., the number exceeding a threshold value), or when a certain number of responses comprising the same représentation of the data hâve been received (e.g., the number exceeding a threshold value).
[1667] Typically, step 150 is performed before ali initiated activities of performing the set of operations are completed.
[1668] in response to determining the conclusive activity, initiated activities that are not based on the conclusive représentation may be canceiied as illustrated by optiona! step 160. Aitemativeiy or additionally, ail initiated activities, except for one that is based on the conclusive représentation, may be canceiied in response to determining the conclusive activity as also illustrated by optional step 160.
[1669] This may hâve the advantage of not unnecessarily utilizing resources (Processing hardware, power consumption, etc.) for performing the set of operations.
[1670] It should be noted that, in some embodiments, also initiated activities other than the conclusive activity (e.g., ail initiated activities) are allowed to be completed even after the conclusive activity is determined. This may be bénéficiai, for example, if it is computationally and/or sîgnai-wise cheaper to allow continued performance of operations than to cancel performance of operations.
[1671] In some embodiments, some initiated activities may be canceiied or paused even before the conclusive activity is determined as illustrated by optional step 140. For exemple, initiated activities may be canceiied or paused for which a probability of being based on the conclusive représentation of the data faits below a probability threshold value.
[1672] The threshold value may be equal to zéro (cancelling/pausing only for représentations that cannot become the conclusive représentation), or may be larger than zéro but less than one (cancelling/pausing for représentations that cannot become the conclusive représentation and for représentations that are unlikely to become the conclusive représentation).
[1673] The probability of being based on the conclusive représentation may be estimated via ïntermediate data consistency decisions. For example, if ten responses are needed for determining the conclusive représentation and if eight responses hâve been received which comprises a first représentation of the data once, a second représentation of the data thrice, and a third représentation of the data four fîmes, it is clear that the first représentation of the data cannot become the conclusive représentation. Then the
295 initiated activity of performing the set of operations based on the first représentation of the data may be cancelled.
[1674] This may hâve the advantage of not unnecessarily utilizing resources (processing hardware, power consumption, etc.) for performing the set of operations.
[1675] In step 170, a resuit of the conclusive activity is provided (or is caused to be provided) as resuit for performing the set of operations based on the data.
[1676] Since the conclusive activity is initiated (as one of the spéculative activities of performing the set of operations) before the data consistency decision, the overall latency may be decreased compared to when the data consistency decision is taken before performing the set of operations.
[1677] Continuing the example with seven received responses wherein four of the représentations hâve a value “a, two of the représentations hâve a value “b and one of the représentations has a value “c, the conclusive représentation has the value a if a majority decision is applied. The two (spéculative) activities that were initiated based on the value “b” and based on the value “c” may be cancelled when the conclusive représentation is determined, and the resuit of the (spéculative) activity that was initiated based on the value a” may be provided as resuit for performing the set of operations based on the data.
[1678] Figure 202 illustrâtes an exampie method 105 according to some embodiments. The method is for a controller, and for management of performing a set of operations based on data, wherein a piurality of représentations of the data are kept in respective ones of a piurality of storage entities.
[1679] For example, seven repres©Γϊΐβΐίons of the data may be kept in different storage entities wherein, for example, four of the représentations hâve a value “a, two of the représentations hâve a value “b” and one of the représentations has a value “c”, [1680] In step 110, a respective query is sent to each storage entity of a collection of storage entities of the plurality of storage entities. How the collection of storage entities are selected from the piurality of storage entities may be in accordance with any suitable approach. Numerous such suitable approaches are known in the art.
[1681] The query is reiated to the data. For exampie, the query may comprise a request or prompt for the data (the représentation of the data kept in the storage entity), or a request for an indicator of the représentation of the data. The indicator may be more easily conveyed than the data (e.g., it may be more compact). The indicator may be derived from the (représentation of the) data. For example, the indicator may be a compressed version of the data, a hash-function of the data, a checksum of the data, a data fingerprint, a cryptographie hash-function of the data, etc.
296
[1682] Furthermore, the query is configured to cause initiation of an activity of performing the set of operations based on the représentation of the data kept in the storage entity as illustrated by sub-steps 135 for four example storage entities denoted as a first storage entity, an n:th storage entity, a p:th storage entity, and an x:th storage entity. This may, for example, be achieved by including an operation request, a software function identifier, an exécutable, or similar in the query. The initiated activity is based on the représentation of the data kept in the storage entity. Typically, each initiation is performed directly responsive to the réception of the query.
[1683] The set of operations may be performed at the conesponding storage entity. The set of operations may be performed in the storage entity itself or in an apparatus connected to, or otherwise associated with, the storage entity. For example, the set of operations may be distributediy performed (e.g., cloud-based execution).
[1684] For example, an SQL (structured query language) query can cause activities of performing a set of operations to be initiated before returning a response. Examples of such activities includes simple processing (e.g., summing) and advanced processing (e.g., execution of registered software function).
[1685] For the example with seven représentations of which four représentations hâve a value “a”, two of the représentations hâve a value “b and one of the représentations has a value “c”, seven (spéculative) activities of performing the set of operations may be initiated - four based on the value :‘aH, two based on the value “b and one based on the value “c.
[1686] in steps 125, a response (e.g., a query response) is received from two or more storage entities of the collection of entities. Tne response comprises an indicator of the représentation of the data kept in the storage entity from which the response is received. Typically, the responses are received at different points in time due to different delays, for the different storage entities, between storage entity and the controlier. As mentioned before, the different delays may, for example, be due to different signaling delays (e.g., due to different geographical distances) and/or different storage access times.
[1687] !n some embodiments, a response is received from ail storage entities in the collection of storage entities (i.e., the collection of storage entities consists of the two or more entities). In some embodiments, a response is received from less than ail storage entities in the collection of storage entities (i.e., the collection of storage entities consists of the two or more entities and one or more other storage entities). In any case, the collection of storage entities comprises the two or more entities. Thus, sending a
297 respective query to each storage entity of the collection of storage entities comprises sending a respective query to each of the two or more storage entities.
[1688] Typicaily, the responses are received before the initiated activities of performing the set of operations are completed.
[1689] In step 150, one of the initiated activities of performing the set of operations is determined as being based on représentation of the data corresponding to a conclusive indicator. This activity of performing the set of operations is termed the conclusive activity. TTius, the conclusive activity is one of the initiated activities of performing the set of operations.
[1690] The détermination of the conclusive activity is based on the indicators of the représentations of the data comprised in the responses. For example, step 150 may comprise determining the conclusive indicator by taking a majority, or weighted majority, decision among the indicators comprised in the responses, and selecting the conclusive activity as an initiated activity of performing the set of operations that is based on a représentation of the data that corresponds to the conclusive indicator.
[1691] Determining the conclusive indicator and/or determining the conclusive activity may be seen as comprised in a data consistency decision.
[1692] Thus, the conclusive activity is chosen among the initiated activities based on a data consistency decision, wherein the data consistency decision determines one of the indicators of représentations of the data as a conclusive indicator and the conclusive activity is chosen as an activity that was initiated based on a représentation of the data that corresponds to the conclusive indicator.
[1693] Preferably, the conclusive activity is selected among the initiated activities that are based on représentations corresponding to the conclusive indicator, as the initist&cj activity that is sxpactsci to bs compistsd first
[1694] Step 150 may be performed when responses hâve been received from ail storage entities of the collection of storage entities. Altematively, step 150 may be performed before responses hâve been received from ail storage entities of the collection of storage entities, e.g., when a certain number of responses hâve been received (e.g,, the number exceeding a threshold value), or when a certain number of responses comprising the same indicator hâve been received (e.g., the number exceeding a threshold value).
[1695] Typicaily, step 150 is performed before ail initiated activities of performing the set of operations are completed.
[1696] In response to determining the conclusive activity, initiated activities of performing the set of operations that are ηοΐ based on a représentation corresponding to
298 the conclusive indicaior may be cancelled as illustrated by optional step 160. Alternatively or additionally, ail initiated activities of performing the set of operations, except for one that is based on a représentation corresponding to the conclusive indicaior, may be cancelled in response to determining the conclusive activity as also illustrated by optional step 160.
[1697] This may hâve the advantage of not unnecessarily utilizing resources (Processing hardware, power consomption, etc.) for performing the set of operations.
[1698] It should be noted that, in some embodiments, also initiated activities other than the conclusive activity (e.g, ail initiated activities) are allowed to be completed even after the conclusive activity is determined. This may be bénéficiai, for example, if it is computationally and/or signaî-wise cheaper to allow continued performance of operations than to cancei performance of operations.
[1699] In some embodiments, some initiated activities of performing the set of operations may be cancelled or paused even before the conclusive activity is determined as illustrated by optional step 140. For example, initiated activities may be cancelled or paused for which a probability of being based on the représentation corresponding to the conclusive indicaior of the data falls beîowa probability threshold value.
[1700] The probability threshold value may be equal to zéro (canceiling/pausing only for représentations that correspond to an indicator that cannot become the conclusive indicaior), or may be larger than zéro but less than one (canceiling/pausing représentations that correspond to an indicator that cannot become the conclusive indicator and for représentations that correspond to an indicator that is unlikely to become the conclusive indicator).
[1701] The probability of being based on a représentation that corresponds to the conclusive indicator may be estimated via intermediate data consistency decisions as explained above in connection to Figure 201.
[1702] This may hâve the advantage of not unnecessarily utilizing resources (Processing hardware, power consumption, etc,) for performing the set of operations, [1703] In step 170, a resuit of the conclusive activity is provided (or is caused to be provided) as resuit for performing the set of operations based on the data.
[1704] Since the conclusive activity is initiated (as one of the spéculative activities of performing the set of operations) before the data consistency decision, the overall iatency may be decreased compared to when the data consistency decision is taken before performing the set of operations.
[1705] Continuing the example with seven représentations of which four représentations hâve a value a, two of the représentations hâve a value “b and one of
299 the représentations has a value “c”, seven responses may be received wherein four comprise an indicator having the value “a1” (derivable from the représentation having value “a”), two comprise an indicator having the value “b1” (derivable from the représentation having value “b”) and one comprises an indicator having the value “cl” (derivable from the représentation having value “c”). Then, the conclusive indicator has the value “ai” (corresponding to the représentation having the value “a”) if a majority decision is appiied, The two (spéculative) activities that were initiated based on the value b” and the (spéculative) activity that was initiated based on the value “c” may be cancelled when the conclusive représentation is determined, as well as three of the four (spéculative) activities that were initiated based on the value “a. The resuit of the noncancelled (spéculative) activity that was initiated based on the value “a” may be provided as resuit for performing the set of operations based on the data.
[1706] Figure 203 illustrâtes method steps and signaiing to exemplify some embodiments implementing the method 100 of Figure 201.
[1707] Figure 203 schematically shows a client node (CN) 200 comprising an application (APP) 201 and a storage client (SC) 202, which in tum comprises a storage client library (SCL) 203 and a local storage entity (SE) 204. The local storage entity may, for example, be a cache memory. Figure 203 also schematically shows three storage nodes (SN) 291, 292, 293, wherein storage node 291 comprises a storage entity (SE) 294, storage node 292 comprises two storage entities (SE) 295, 296, and storage node 293 comprises a storage entity (SE) 297. The two storage entities 295, 296 may, for example, be a tier 0 storage entity 295 and a tier 1 storage entity 296.
[1708] The storage client and/or the storage client library may be interpreted as comprising the controller configured to perform the method 100 of Figure 201, for management of performing a set of operations based on data. A plurality of représentations of the data are kept in respective ones of the storage entities 204, 294, 295, 296, 297.
[1709] The process of Figure 203 starts by the application 201 sending a trigger signai 280 to the storage client 202. The trigger signal may typically comprise a query and a software function identifier, for example. The trigger signal 280 is received at the storage client library 203 as illustrated by 205.
[1710] In step 210 (compare with step 110 of Figure 201), a respective query 281 a-e is sent to each of the storage entities. The respective queries may typically be based on the trigger signai 280. For example, a query included in the trigger signal 280 may be used as, or may translate to, the queries 281a-e.
300
[1711] In steps 220a-e (compare with steps 120 of Figure 201), a response 282a-e is received from each of the storage entities, The response comprises the représentation of the data kept in the storage entity from which the response is received. The responses are received at different points in time due to different deiays, for the different storage entities, between storage entity and the storage client iibrary.
[1712] First, in step 220a, a response 282a is received from the local storage entity 204. An activity of performing the set of operations - based on the représentation of the data kept in the local storage entity 204 and comprised in the response 282a - is initiated responsive to the réception of the response 282a, as iliustrated by step 230a (compare with steps 130 of Figure 201) and initiation signal 283a. In this example, the set of operations for the local storage entity 204 are performed in the storage client as iliustrated by 231a.
[1713] Later, in step 220b, a response 282b is received from the storage entity 294. It is checked whether the représentation of the data comprised in response 282b differs from the représentation of the data comprised in response 282a. If so, an activity of performing the set of operations - based on the représentation of the data kept in the storage entity 294 and comprised in the response 282b - is initiated responsive to the réception of the response 282b, as iliustrated by step 230b (compare with steps 130 of Figure 201 ) and initiation signal 283b. In this exampie, the set of operations for the storage entity 294 are also performed in the storage client as iliustrated by 231b.
[1714] Even later, in steps 220c-e, responses 282c-e are received from the storage entities 295, 296, 297. For each response, it is checked whether the représentation of the data comprised in the response differs from the représentation of the data comprised in any previously received response. If so, an activity of performing the set of operations based on the représentation of the data kept in the storage entity and comprised in the response - is initiated responsive to the réception of the response (compare with steps 130 of Figure 201). If not, no new activity of performing the set of operations is initiated. The iatter is the case for the example of Figure 203 in relation to the responses 282c-e, [1715] For example, the responses 282c and 282e may comprise représentations of the data that coincide with the représentation of the data comprised in the response 282a, and the response 282d may comprise a représentation of the data thaï coïncides with the représentation of the data comprised in thé response 282b.
[1716] In step 250 (compare with step 150 of Figure 201), one of the initiated activities 231a, 231b of performing the set of operations is determined as being based on a conclusive représentation of the data. The détermination of the conclusive activity is based on the représentations of the data comprised in the responses. For exampie, step
301
250 may comprise determining the conclusive représentation of the data by taking a majority decision among the représentations of the data comprised in the responses, and seiecting the conclusive activity as an initiated activity of performing the set of operations that is based on a représentation of the data that coïncides with the conclusive représentation of the data.
[1717] In the example of Figure 203, the initiated activity 231a is determined as the conclusive activity, This may, for example be due to that it is based on a représentation of the data that was comprised in a majority 282a, 282c, 282e of the responses 282a-e.
[1718] In response to determining the conclusive activity 231a, the initiated activity
231b is cancelled as îllustrated by step 260 (compare with step 160 of Figure 201) and cancellation signal 284, because it is not based on the conclusive représentation.
[1719] When the conclusive activity is completed, the result 285 thereof is provided to the application 201 as resuit for performing the set of operations based on the data, as îllustrated by step 270 (compare with step 170 of Figure 201) and result signal 286.
[1720] Figure 204 illustrâtes method steps and signaling to exemplify some embodiments impîementing the method 105 of Figure 202.
[1721] Figure 204 schematically shows a client node (CN) 300 comprising an application (APP) 301 and a storage client (SC) 302, which in turn comprises a storage client library (SCL) 303. Figure 204 also schematically shows three storage nodes (SN)
391, 392, 393, wherein storage node 391 comprises a storage entity (SE) 394, storage node 392 comprises two storage entities (SE) 395, 396, and storage node 393 comprises a storage entity (SE) 397. The two storage entities 395, 396 may, for example, be a lier 0 storage entity 395 and a tier 1 storage entity 396.
[1722] The storage client and/or the storage client library may be interpreted as comprising the controiler configured to perform the method 105 of Figure 202, for management of performing a set of operations based on data. A plurality of représentations of the data are kept in respective ones of the storage entities 394, 395, 396, 397.
[1723] The process of Figure 204 starts by the application 301 sending a trigger signal 380 to the storage client 302. The trigger signal may typically comprise a query and a software function identifier, for exampie. The trigger signai 380 is received ai the storage client library 303 as iïlustrated by 305.
[1724] In step 310 (compare with step 110 of Figure 202), a respective query 381 b-e is sent to each of the storage entities. The respective que ries may typically be based on the trigger signai 380, For example, a query included in the trigger signal 380 may be used as, or may translate to, the quelles 381 b-e.
302
[1725] The queries 381b-e are related to the data. For example, the queries 381b-e may comprise a request fora hash-function of the data. Furthermore, the queries 381b-e are configured to cause initiation (compare with sub-steps 135 of Figure 202) of activities of performing the set of operations based on the représentation of the data kept in the storage entities, as illustrated by 331b-e.
[1726] !n steps 320b-e (compare with steps 125 of Figure 202), a response 382b-e is received from each of the storage entities. The response comprises an indicator (in this example, a hash-function) of the représentation of the data kept in the storage entity from which the response is received. The responses are received at different points in time due to different delays, for the different storage entities, between storage entity and the storage client library,
[1727] For example, the responses 382b, 382c and 382e may comprise the same indicator value (hash-value), and the response 382d may comprise another indicator (hash-value).
[1728] in step 350 (compare with step 150 of Figure 202), one of the initiated activities 331 b-e of performing the set of operations is determined as being based on représentation of data corresponding to a conclusive indicator. The détermination of the conclusive activity is based on the indicators comprised in the responses. For example, step 350 may comprise determining the conclusive indicator by taking a majority decision among the indicators comprised in the responses, and selecting the conclusive activity as an initiated activity of performing the set of operations that is based on a représentation of the data that correspond to the conclusive indicator.
[1729] In the exampîe of Figure 204, the initiated activity 331b is determined as the conclusive activity. This may, for example be due to that it is based on a représentation of the data that was comprised in a majority 382b, 382c, 382e of the responses 382b-e, and due to that it is expected to be completed before the initiated activities 331c and 331e.
[1730] In response to determining the conclusive activity 331b, the initiated activities 331 c-e are cancelled as illustrated by step 360 (compare with step 160 of Figure 202) and canceHation signais 384c-e, because they are either not based on a représentation corresponding to the conclusive indicator, or are presumed duplicates of the conclusive activity.
[1731] When the conclusive activity is completed, the resulî 385 thereof is provided to the application 301 as resuit for performing the set of operations based on the data, as illustrated by step 370 (compare with step 170 of Figure 202) and resuit signal 386.
303
[1732] Some examples of the triggering (compare with triggering signais 280, 380) of the above-described methods will now be given. Such triggering may, for example, be implemented in an application interface.
[1733] Typicaily, the application sends an instruction to the storage client for triggering spéculative performance of a set of operations (e.g., spéculative execution). The instruction typicaily includes an operation request, a software function identifier, an exécutable, or simiiar.
[1734] An exécutable couid be represented in many different ways, e.g., by reference to a symbol or position in the exécutable image (of the application), by a copy of an exécutable blob, by interprétable code or script, by a copy of - or reference to bytecode, etc.
[1735] The instruction may also comprise a scheduling policy for scheduling of the spéculative executions. An example scheduling policy might be to schedule initiations of spéculative executions on resources with successively lower processing speed (to allow the first-initiated execution(s) to finish as early as possible).
[1736] The instruction may also comprise context, e.g., data structures declared before any call to the exécutable, software functions or libraries declared elsewhere, etc.
[1737] The instruction may further comprise the query. The query couid be formuiated in many ways, e.g., as a key to value lookup, as an SQL query, as a graph query, etc.
[1738] An example of a direct application interface may be expressed in pseudo code as:
def myfunc(vaiue):
retum heavyprocessing.do(value) mykey = something” response = storagecüent.getkeyfmyfunc, mykey)
An example ofa more evolved application interface may be expressed in pseudo code as:
mykey = “something with StorageClient(key=mykey) as client:
response = spawn heavyprocessing.dofclient.value)
Here myfunc dénotés an exécutable, value dénotés représentation of data, and mykey dénotés a query. In the more evolved application interface, the exécutable is the expression after the spawn keyword.
[1739] Figure 205 schematicalty illustrâtes an example apparatus 410 according to some embodiments. The apparatus may, for example, be comprised in a client node (CN)
304
430. The client node may further comprise an application (APP) 440 and/or a local storage entity (LS) 450.
[1740] The apparatus comprises controiling circuitry (CNTR; e.g., a controller) 400 for management of performing a set of operations based on data, wherein a piurality of représentations of the data are kept in respective ones of a piurality of storage entities. The controiling circuitry may, for exampie, be configured to cause execution of (e.g., execute) one or more ofthe method steps as described above in relation to Figures 207, 208, 209, and 210.
[1741] The controiling circuitry is configured to cause (for each of two or more storage entities of the piurality of storage entities) sending, to the storage entity, of a respective query relating to the data (compare with 110, 210, 310).
[1742] The controiling circuitry is also configured to cause (for each of the two or more storage entities of the pluraiity of storage entities) réception, from the storage entity, of a response te the query (compare with 120, 125, 220a-e, 320b-e). The response may comprise the représentation of the data kept in the storage entity or an indicator of the représentation of the data kept in the storage entity.
[1743] To this end the controiling circuitry may be associated with (e.g., connected or connectable - to) a communication interface (I/O) 420. The communication interface may be configured to, for storage entities other than the local storage entity, send the respective query relating to the data and receive the response to the query.
[1744] Furthermore, the controiling circuitry is configured to cause (for each of at least two of the two or more storage entities) initiation of activities of performing the set of operations based on the représentation ofthe data (compare with 130,135, 230a-b, 310). [1745] To this and, the communication interface 420 may be configured to send initiation signais according to some embodiments. Altematively, the controiling circuitry may be configured to perform the set of operations itself.
[1746] The controiling circuitry is also configured to cause détermination, based on the représentations of the data or the indicators comprised in the responses, of one of the initiated activities of performing the set of operations (called the conclusive activity) as being based on a conclusive représentation of the data or on représentation of the data corresponding to a conclusive indicator (compare with 150, 250, 350).
[1747] To this end the controiling circuitry may comprise, or be otherwise associated with (e.g., connected - or connectable - to), a déterminer (DET; e.g., détermination circuitry) 401. The déterminer may be configured to détermine the conclusive activity.
[1748] The controiling circuitry is further configured to cause provision - e.g., to the application 440 - of a resuit of the conclusive activity as resuit for performing the set of
305 operations based on the data. To this and, the communication interface 420 may be configured to provide the resuit of the conclusive activity as resuit for performing the set of operations based on the data.
[1749] Generally, when an arrangement is referred to herein, it is to be understood as a physscal product; e.g., an apparatus. The physical product may comprise one or more parts, such as controiling circuitry in the form of one or more controllers, one or more processors, or the like.
[1750] The described embodiments and their équivalents may be realized in software or hardware or a combination thereof. The embodiments may be performed by general purpose circuitry. Examples of general purpose circuitry include digital signal processors (DSP), central processing units (CPU), co-processor units, field programmable gâte arrays (FPGA) and other programmable hardware. Altematively or additionally, the embodiments may be performed by specîalized circuitry, such as application spécifie integrated circuits (ASIC). The general purpose circuitry and/or the specîalized circuitry may, for example, be associated with or comprised in an apparatus such as a client node (e,g,f server, computer, etc.).
[1751] Embodiments may appear within an electronic apparatus (such as a client node) comprising arrangements, c-rcu-try, and/or îogic according to any of the embodiments described herein. Altematively or additionally, an electronic apparatus (such as a client node) may be configured to perform methods according to any of the embodiments described herein.
[1752] Configuration of Redondant Pâtes
[1753] As discussed in depte above, future mobile communication Systems aim to support communications in fields such as the industrial manufacturing domain. Compared to typical use cases of mobile communication traffic, such as phone caîls and internet data, industrial manufacturing applications?service require higher reliabiiity, availability, and low and deterministic latency. Other use cases may hâve similar requirements, suçh as remote surgery, autonomous vehicles, etc.
[1754] Such communication will typically travel via paths which traverse both wireiess networks (e.g., cellular networks, such as those standardized by 3GPP: LTE, NR, etc) and wired networks (e.g. Ethernet networks, etc). Various efforts hâve been made to achieve high reiiabilrty, availability and tow and deterministic in wired and wireiess communication networks.
[1755] IEEE 802.1 time-sensitive networking (TSN) is based on the IEEE 802.3 Ethernet standard, so it is a wired communications standard. TSN describes a collection of features for, e.g., time synchronization, guaranteed low latency transmissions and high
306 reliability to make Ethernet deterministic, which was used previously mostly for best-effort communications. The features can be grouped into the following categories:
• Time Synchronization (e.g., IEEE 802.1 AS) • Bounded Low Latency (e.g., IEEE 802.1Qav, IEEE 802.1Qbu, IEEE 802.1Qbv, IEEE 802.1Qch, IEEE 802.1 Qcr) • Ultra-Reliability (e.g., iEEE802.1CB, IEEE 802.1Qca, IEEE 802.1Qci) « Network Configuration and Management (e.g., IEEE 802.1Qat, IEEE 802.1Qcc, IEEE 802.1Qcp, IEEE 802.1 CS)
[1756] TSN uses the concept of streams (or flows) for exchange of data between one or more taikers and one or more listeners. The taîkers and listeners may also be called “end devices'', i.e., the source and destination devices of the TSM streams. To configure a TSN stream, the listeners and taikers provide requirements to the TSN network which are used for scheduling and configuration decisions, e.g., how bridges (also known as switches or Ethernet switches) should behave between a listener and a talker.
[1757] The IEEE 802.1Qcc standard spécifiés three TSN configuration modeîs: the fuily distributed model; the centralized network and distributed user model; and the fully centralized model. For the industrial manufacturing use case, the fully centralized configuration model might be the most suitable. However, embodiments of the disclosure may altematively use the fully distributed model or the centralized network and distributed user model.
[1758] For the fully centralized configuration mode!, the Central User Configuration (CUC) and Centrai Network Configuration (CNC) are logical fonctions rather than actual physical nodes in the network. The CUC is the entity which is responsible for configuration of the listeners and the taikers. The CNC is the entity that configures the TSN features in the bridges in the network.
[1759] The description of wireless communication networks is in the context of 5G networks, using Long Term Evolution (LTE) and/or New Radio (NR). Embodiments of the disclosure may altematively relate to other wireless communication networks, particularly cellular networks such asthose standardized by 3GPP.
[1760] The 5G system (5GS) architecture as described in TS 23.501, v 15.3.0 spécifiés the support of Ethernet protocol data unit (PDU) sessions. The medium access control (MAC) address for this PDU session is not provided by the 5G System.
[1761] For Ethernet PDU session setup, the session management function (SMF) and the user plane fonction (UPF) act as PDU session anchors. Also, based on the configuration, the SMF may request the UPF acting as the PDU session anchor to
307 redirect address resolution protocol (ARP) traffic from UPF to the SMF. Also, UPF is supposed to store MAC addresses received from UE, and associate those with the appropriate PDU session.
[1762] Moreover, for quality of service (QoS) provisioning, the SMF provides Ethernet Packet Filter Set and forwarding raies based on the Ethernet frame structure and user equîpment MAC address.
[1763] The Application Function (AF) In 3GPP system architecture is a functional node, which înteracts with the 3GPP core network to provide services as for example:
• Application influence on traffic routing (TS 23.501, v 15.3.0, clause 5.6.7).
• Accessing Network Exposure Function (TS 23.501, v 15.3.0, clause 5.20).
• Interacting with policy controi framework for policy controi (TS 23.501,v15.3.0, clause 5.14).
[1764] Further, the AF can trigger particular services towards UE, for example PDU session modification. Further detaiis on application triggering services is described in 3GPP TS 23.501, v 15.3.0, clause 4.4.5.
[1765] Currently there is no mechanism on how to configure redondant TSN streams over 5GS. The current 3GPP standards support different ways to increase reliability of transmissions, such as dual or multi connectivity (DC), carrier aggregation (CA) and packet duplication. However, there is no interfacing or communication defined between the 5GS and the TSN network about how to set up redundancy (which might use those methods of increasing transmission reliability).
[1766] As a use case example, interworking between 5GS and TSN networks is highfy relevant for an industrial network deployment. Unfortunately, this type of seamless intemetworking is not feasible with current networks.
[1767] Certain aspects of the présent disclosure and their embodiments may provide solutions to these or other challenges.
[1768] For example, in one aspect the disclosure provides a method in a core network node for a wireless communication network. The method comprises: receiving a configuration message via an interface with a configuring node associated with a wired communication network, the configuration message comprising settings for a plurality of paths between a first node cou pied to the wired communication network and a second node coupled to the wireless communication network, the plurality of paths canying a plurality of data streams between the first and second nodes, the plurality of data streams comprising at least one redondant data stream; and configuring the plurality of paths within the wireless communication network according to the settings.
308
[1769] In another aspect, the disclosure provides a method in a configuring node for a wired communication network. The method comprises: transmitting a request message via an interface with a core network node for a wireless communication network, the request message comprising a request for information related to a topology of the wireless communication network; and receiving an information message via the interface with the core network node, the information message comprising information related to ihe topology of the wireless communication network.
[1770] Certain embodiments may provide one or more of the following technical advantage(s): End-to-end deterministic packet transport over TSN and 5GSs; TSN stream redundancy features configuration over 5GS; and seamiess intégration into the architecture of the 5G core network
[1771] Figure 206 shows transmission of TSN data streams using redundant paths. [1772] In the future, it is envisioned, that 5G will support TSN features and will transport TSN streams, over 5G wireless links. This is highly relevant for industrial use cases, as TSN is expected to become a major communication technology in this sector. With the support of TSN traffic in the 5G network, wireless communication can be used, as a cable replacement, for industrial networks deployed with TSN. One of the important features of TSN is IEEE 802.1CB - Frame Réplication and Elimination for Reliability, which enables redundant transmissions to increase reliability in case of failures in one of the transmitted paths appear.
[1773] This scénario is illustrated in Figure 206. The grey arrows illustrate the duplicated frames across the network. Black arrows depict a single TSN stream. The Talker’s stream is shown at the left, and the data stream that is delivered at the Listener at the right part of the figure.
[1774] According to embodiments of the disclosure, an interface is proposed in the 5GS that enables such interactions with the TSN network. This interface at the 5G side can be part of the Application Function (AF) or another network entity (such as another core network node orfunction). One rôle of this new proposed interface is to internet with one or more nodes within a TSN network, such as for example the CNC, that configures the redundant paths offrames through the network, and to convert the requirements for the TSN streams into the relevant features over the 5GS.
[1775] Figure 207 shows an exampie of such intégration. The 5GS, by using the AF (or an alternative core network node or function as described above), acts as one or multiple TSN switches and is seen as one or more TSN switches by the CNC and other TSN switches in the TSN network.
309
[1776] The configuration of two independent data paths in TSN dépends on the requirements from the application software (e.g., a programmable logic controiler, PLC). The relevant configuration parameter may be “NumSeamlessTrees”, specified in IEEE 802.1Qcc 46.2.3.6.1. If the value of this parameter is greater than one, then CNC needs to caicuiate and set-up maximally disjoint trees (for a value of 2 there are two almost disjoint trees).
[1777] In one embodiment ofthe disclosure, a 5G core network function (interacting with AF) détermines if two independent paths (seamless trees) can be set up within the 5G network. To do this, a requesi might be sent to RAN, e.g. to a single gNB, or multiple gNBs. The 5G network can support redundancy of the transmitted packets (e.g., to increase reliabiîity) by using one or multiple techniques from the 5G network. Suitable examples may include dual connectivity, carrier aggregation and duplication. In order to use redundant paths or multiple paths for TSN streams in a 5GS, two or more UEs can be attached to the same Ethernet network or device and used as an alternative to or in combination with other features for redundancy. Figures 209 to 211 give various examples of redundant paths in a wireless network,
[1778] Figure 211 shows an architecture where two UEs are used for redundancy reasons. Figure 209 shows a 5GS simulating different TSN paths. Figure 210 provides more insights on how these multiple paths can be simuiated by showing some of the possible 5G permutations on enabling such increased redundancy.
[1779] For example, in the simplest case both incoming redundant streams are forwarded over the same UPF.gNBand UE. The UE might forward them to multiple redundant TSN nodes.
[1780] This scénario might be applicable if the 5GS is assumed to be reliable enough without using physical redundancy. Another option would be to use redundancy only in the radio network but using a single UPF in the core network - or a single UE but dual connectivity. Those skilled in the art will appreciate that there are multiple options, [1781] According to some embodiments of the disclosure, how redundancy is supported in the 5GS is not exposed to the extemal TSN network; in such embodiments, the only thing that is communicated through the AF may be whether and to what degree redundancy is supported (e.g., how many redundant paths or what the redundant topology looks like).
[1782] As noted above, embodiments of the disclosure provide a new interface that enables the functionality to set up and enable end-to-end redundancy between a wired communication network (such as a TSN network) and a wireless communication network (such as a 5G network).
310
[1783] Figure 207 shows a communication System according to embodiments of the disclosure, and particularly shows this interaction between the 5GS and TSN is depicted for the fully centralized approach to TSN networking discussed above with respect to Figure 206.
[1784] The scénario in Figure 207 assumes that the AF is part of the wireless network domain. An interface for communication between the wireless network and the wired network is proposed. In terms of improving clarity we provide an example between the AF and CNC although this type of interaction can also take place ai other parts/entities of both networks. A device in the TSN network might be a Talker and the device connected to the 5G network might be the Listener. In other embodiments this scénario might be different, e.g., the Talker might be in the wireless network (e.g.,5GS) and the Listener in the wired network (e.g., TSN)
[1785] Figure 208 is a signalling diagram according to embodiments of the disclosure, showing the interaction between the AF and the CNC. The sequence of the interaction to setup the TSN flow is as follows.
0. 5GS connects to a TSN network and might use link layer discovery protocol (LLDP) or another suitable management protocol (e.g, simple network management protocol, SNMP, Network Configuration Protocol, NETCONF, Representational State Transfer Configuration Protocol, RESTCONF) to discover TSN bridges in the TSN network and reply to LLDP requests by TSN bridges
1. PLC initiâtes the communication by providing device ID and possibly a public 3GPP identifier (e.g., mobile station international subscriber directory number, MSISDN) to CUC or other addresses, like MAC addresses. The message sent to the CUC or other addresses may include one or more of the following information content:
i. Payload size of the data being transferred between sensors and actuators with device ID ii. Time interval iii. 3GPP UE public identifier (MSISDN) (optionai)
2. CNC discovers the physical topology of the network (e.g., the network nodes and the links between them). To discover the physical links between end stations and Bridges, the CNC might use IEEE Std 802.1 AB (for example LLDP) and/or any remote management protocol.
• In one embodiment of the disclosure, the AF answers a topology request and advertises multiple paths across the 5GS to be able to satisfy any
311 redundancy needs. The multiple paths may comprise two or more paths. Redundant paths in the 5GS can be advertised with different topologies internally as well, for example as a single TSN switch or as multiple TSN switches per path, a This advertisement can be made by knowing ali the relevant 5G mechanisms that can support increased transmission reliability, such as PDGF duplication and/or multi UE connectivity, transport and core network and function redundancy - this may include complété physicaî redundancy in the 5GS end-to-end, • As a further embodiment the disclosure, the redundancy can also be simulated towands the TSN network. The 5GS can simulate multiple paths and then enabie the relevant mechanisms to support the needed reliability - the AF will announce these simulated disjoint paths as legal disjoint paths toward the CNC.
• If the AF has announced multiple paths to the CNC, they can be dynamically changed or modified internally but at the same time they may be static towards the CNC, For estabiished streams these paths should not change as long a spécifie stream agreement is valid.
3. The CNC, based on the information retrieved from the network (including the topology information from the AF) and from the CUC, and for a spécifie PLC application, generates TSN configuration parameters that may include one or more of:
• Traffic spécification: e.g. specifying how the Talker transmits frames for the stream • StreamID • User to Network Requirement: specifying one or more user requirements for the stream such as latency and redundancy
The above and additional parameters are being specîfied in IEEE 802,1 Qcc, clause 46.2.3. Such configuration information can also be collected and created within different TSN configuration models such as the centralized and the distributed user approach.
4. CUC croates Talker group and Listener group (information required) and créâtes a join request to CNC.
5. CNC receives the join request and perforais path computation of TSN stream (including paths through the 5GS from edge bridge to end stations). The computation aigorithm is not specîfied in the standard, and those skilled in the
312 art will appreciate that multiple methods and aîgorithms for computing paths exist. The présent disclosure is not limited in that respect. Such aîgorithms may seek to minimize or maximize one or more network performance metrics, for example, such as network throughput, overall network latency, path latency, etc.
o Path computation comprises computing paths used for transmitting frames from Talker to Listener including 5G paths.
o CUC also allocates for each stream a unique identifier (streamID) including destination MAC address, VLAN ID and PCP (pnority code point), and communicaies StreamID to CNC.
6. CNC provides output for the scheduling settings. This scheduling and path settings are retumed to CUC via status group (IEEE 802.1 Qcc, 46.2.5).
7. CNC configures path setting in bridges via management protocols as for example netconf or Yet Another Next Génération (YANG) managed objects in the bridges as specified in IEEE 802.1Q * These settings define how a switch forwards a packet • In one embodiment the AF gets this configuration information from the CNC and knows about the paths that hâve been set and is aware about the redundancy - it uses this information to enable and ensure redundancy features
8. If the status group does not contain any failure code, CNC provides configuration settings to AF.
9. AF converts the TSN configuration settings for the 5GS, triggers PDU session modification and further provides SMF with relevant forwarding rules and packet filter set which are further used by SMF to configure UPF forwarding rules and packet filter set. This may include knowledge about which paths hâve been selected by the CNC for forwarding stream traffic in the 5GS; this knowledge might be used by the 5GS to route streams accordingly.
[1786] The description above hasfocused on the interactions between the CNC, the CUC and the AF (or other core network node or function). In embodiments where the TSN network does not use central coordination (i.e., no CNC and no CUC are présent), the methods described in this disclosure can be applied in a similar manner, but the AF will talk to the switches (e.g., TSN switches) connected to the 5GS directly.
[1787] Figure 209 is a schematic diagram showing redundant paths in a wireless network according to embodiments of the disclosure. It can be seen that the redundant
313 paths may arrive at the 5GS from multiple switches in the wired network, and be directed to corresponding paths in the wireless network.
[1788] Figure 210 is a schematic diagram showing redundant paths in a wireless network according to further embodiments of the disclosure. The redundant paths are shown in more detail, and may comprise one or more éléments in common (e.g., a single element in the wireless network may be utilized in more than one path). In an extreme example of this, the paths may comprise two or more paths which are îdentical to each other (e.g., the same data is transmitted more than once via the same physîcal or virtual path). The paths may also comprise one or more éléments which are distinct from each other (e.g., two or more paths may be different in one or more respects). For example, the paths may comprise one or more of: a different core network node or function (such as the user plane function illustrated in Figure 210); a different radio access network node (such as the gNodeB shown in Figure 210); and a different terminal device (such as the UE shown in Figure 210). The paths may thus comprise two or more paths which are maximally disjoint, and/or entirely disjoint.
[1789] Figure 211 is a schematic diagram showing redundant paths in a wireless network according to further embodiments of the disclosure, and includes the most detail. In this embodiment, two redundant paths are shown, which are disjoint between the Talker and the Listener (i.e., between the Ethernet hosts in the PLC and the device which it contrais). Each Ethernet host comprises a frame réplication and élimination for reliability (F R ER) module which permits frame s to be replicated (i.e. at the Talker or transmitting device) and de-dupiicated or eliminated (e.g. at the Listener or receiving device).
[1790] Figure 212 is a flow chart of a method in a core network node or function according to embodiments of the disclosure. The core network node may perform the signailing and functions of the AF described above with respect to one or more of Figures 213,214 and 217, for example, and therefore may comprise or impîement an application function (AF). As noted above, however, this functionality may be impîemented in alternative core network nodes or functions. Further, the steps set out below and with respect to Figure 212 may be performed in more than one core network function.
[1791] In step 700, the core network node receives request message from a configuring node associated with a wired communication network (e.g., a CNC or a TSN switch as described above). The request message may be configured according to LLDP, SNMP, NETCONF, RESTCONF or any suitable network management protocol The request message may comprises a request for information related to a topology of the wireless communication network, e.g,, identities of one or more nodes in the wireless
314 communication network, the links between those nodes, the capabilities of those nodes to enable redondant paths, etc.
[1792] In step 702, the core network node transmits an information message to the configuring node comprising information related to the topology of the wireless communication network. For exampie, the information message may comprise an indication of the abiiity of the wireless network to provide redundant paths. The information message may comprise an indication of a number of paths which can be configured in the wireless communication network to a particular end point or device (which may hâve been identified in the request message). The information message may also be configured via LLDP, SNMP, NETCONF, RESTCONF or any suitable management protocol,
[1793] In step 704, the core network node receives a configuration message from the configuring node. The configuration message comprises settings for a plurality of paths between a first node coupîed to the wired communication network and a second node coupled to the wireless communication network. For example, the settings may include a set of associations between an input port and an output port for each of the plurality of paths, i.e, instructions for which output port data from respective input ports is to be forwarded to. See Figures 215 and 216, for example. The plurality of paths carry a plurality of data streams between the first and second nodes, comprising at least one redundant data stream.
[1794] In one embodiment, the plurality of paths comprise a first path and a second path which hâve at least one element in common with each other in the wireless communication network. For exampie, in one embodiment the first path and the second path are identical in the wireless communication network.
[1795] In another embodiment, the plurality of paths comprise a third path and a fourth path (which may be in addition to or as alternatives to the first and second paths disclosed above) which hâve at least one element not in common with each other in the wireless communication network. For example, the third path and the fourth path may be disjoint paths in the wireless communication network, or maximally disjoint paths in the wireless communication network, The at least one element not in common between the third and fourth paths may comprise one or more of: a user equipment; a radio access network node; and a core network node or function. The third and fourth paths may utilize a dual connectîvity mechanism between a user equipment and multiple radio access network nodes, and/or a carrier aggregation mechanism between a user equipment and one or more radio access network nodes.
315
[1796] The paths may comprise one or more physical paths and/or one or more Virtual paths.
[1737] in step 706, the core network node coverts the settings in the configuration message into one or more of: a packet filter set and one or more forwarding ru les. For example, the AF may perform this function or, altematively, it may forward the settings to another core network node or function, such as the policy control function (PCF) to perform this function, The AF or PCF may be configured with information as to how redundancy is to be supported in the wireless communication network (e.g., using any of the techniques described above). The PCF or AF may request this information (i.e. how those redundant paths are actually setup in the wireless communication network - from a CNC point of view this is irrelevant. Internaily some wireless network functions might only be virtually redundant, e.g. only one UPF is used).
[1798] In step 708, the core network node configures the plurality of paths within the wireless communication network according to the settings. Optionalîy, particularly where the settings hâve been converted into one or more of a packet filter set and forwarding raies in step 706, this may comprise forwarding the packet filter set and/or the forwarding rules to a second core network node (e.g., an SMF). For exampie, the AF (or PCF) may signal to the SMF to set up modify PDU sessions if that is required, to support the redundancy based on the AF input and the information about how redundancy is supported in the 5GS. The SMF will then modify PDU sessions in UPF(s) accordingly. [1799] In further embodiments, the AMF is informed how redundancy has to be setup in the RAN according to the input from AF and the 5GS internai information about how redundancy is supported.
[1800] Figure 213 is a flow chart of a method in a configuring node according to embodiments of the disclosure, the configuring node associated with a wired communication network such as an Ethernet network. The configuring node may perform the signalling and functions of the CNC and/or the CUC functions described above with respect to one or more of Figures 213, 214 and 217, for example, and therefore may comprise or implement a CNC and/or a CUC. In alternative embodiments, however, particularly where the wired network is not centrally configured (and thus no CNC or CUC is présent), the configuring node may comprise a switch of the wired network (e.g., a TSN switch). Further, the steps set out below and with respect to Figure 213 may be performed in more than one network node or function.
[1801] In step 800, the configuring node transmits a request message to a core network node associated with a wireless communication network (e.g,, an AF as described above). The request message may be configured according to LLDP, SNMP.
316
NETCONF, RESTCONF or any suitable network management protocol. The request message may comprise a request for information related to a topology of the wireless communication network, e.g., identifies of one or more nodes in the wireless communication network, the links between those nodes, the capabilities of those nodes to enable redundant paths, etc.
[1802] In step 802, the configuring node receives an information message from the core network node comprising information related to the topology of the wireless communication network. For example, the information message may comprise an indication of the ability of the wireless network to provide redundant paths. The information message may comprise an indication of a number of paths which can be configured in the wireless communication network to a particular end point or device (which may hâve been identified in the request message). The information message may also be configured via LLDP, SNMP, NETCONF, RESTCONF or any suitable management protocol.
[1803] In some embodiments, the redundant paths through the wireless communication network may not themselves be made known in the information message. That is, the configuring node may be unaware of how the redundant paths are established in the wireless communication network, or of the redundancy techniques which are employed in the wireless network to achieve that redundancy and increase in reliability (e.g., dual connectivity, packet duplication, carrier aggregation, etc). However, the information message may comprise an indication of the number of redundant paths which can be supported in the wireless communication network, for example.
[1804] In step 804, the configuring node détermines a plurality of paths for redundant data streams between a first node cou pied to the wired communication network and a second node coupled to the wireless communication network. The plurality of paths carry a plurality of data streams between the first and second nodes, comprising at least one redundant data stream,
[1805] In one embodiment, where the configuring node is unaware of the précisé paths within the wireless communication network, this step may assume that the entire wireless communication network is équivalent to one or more TSN bridges.
[1806] In step 806, the configuring node transmits a configuration message to the core network node, comprising settings for each of the pïuraiiiy of paths. For example, the settings may include a set of associations between an input port and an output port for each of the plurality of paths, i.e. instructions for which output port data from respective input ports is to be forwarded to. See Figures 215 and 216, for example.
317
[1807] Handling Précisé Timing Protocol Signaling from a Time Sensitive Network [1808] Time Sensitive Networking (TSN) is based on the IEEE 802.3 Ethernet standard. TSN provides deterministic services through IEEE 802.3 networks, such as e.g. time synchronization, guaranteed low latency transmissions and high reliability to make îegacy Ethernet, designed for best-effort communication, deterministic. The TSN features available today may be grouped into the following categories:
• Time Synchronization (e.g. IEEE 802.1AS) • Bounded Low Latency (e.g. IEEE 802.1Qav, IEEE 802.1 Qbu, IEEE 802.1Qbv, IEEE 802.1Qch, IEEE 802.1Qcr) • Uîtra-Reliability (e.g. IEEE802.1CB, IEEE 802.1Qca, IEEE 802.1Qci) • Network Configuration and Management (e.g. IEEE 802.1Qat, IEEE 802.1 Qcc, IEEE 802.1Qcp, IEEE 802.1CS)
[1809] The configuration and management of the TSN network may be implemented in different manners, either in a centralized or in a distributed setup as defined in IEEE 802.1 Qcc. The different configuration models are shown in Figures 106-108. Figure 106 shows a distributed TSN configuration model, Figure 107 shows a centralized TSN configuration model, and Figure 108 shows a fuliy centralized TSN Configuration Mode!, as defined in IEEE P802.1Qcc/D2.3.
[1810] The communication endpoints inside the TSN are referred to as Talker and Listener. A TSN network consist of multiple entities and features, AI! the switches, which are referred to as bridges in the Figures 106 to 108, in between the Talker and the Listener need to support certain TSN features, like e.g. IEEE 802.1AS time synchronization. A TSN domain enables synchronized communication among nodes. The communication between Talker and Listener is performed in streams. A stream is based on certain requirements in terms of data rate and latency given by an application implemented at the Talker and/or the Listener. The TSN configuration and management features are used to setup the stream and guarantee the stream’s requirements across the network. In the distributed model shown in Figure 106, the Talker and Listener might for exampie use a Stream Réservation Protocol (SRP) to setup and configure a TSN stream in every switch along the path from Talker to Listener in the TSN network. Nevertheless, some TSN features require a central management entity referred to as Centralized Network Configuration (CNC) tool as shown in Figure 107. The CNC may for example use Netconf and YANG models to configure the switches in the network for each TSN stream. finis also allows the use of time-gated queueing as defined in IEEE 802.1Qbv that enables data transport in a TSN network with deterministic latency. With time-gated queueing on each switch queues are opened or closed following a précisé
318 schedule that allows high priority packets to pass through the switch with minimum latency and jitter if it arrives at ingress port within the time the gâte is scheduled to be open. In the fully centralized model, as shown in Figure 108, a Centralized User Configuration (CUC) entity is further added that is used as a point of contact for Listener 5 and Talker. The CUC collecta stream requirements and endpoint capabilities from the devices and communicates with the CNC directly. The details about TSN configuration is explained in further detail in IEEE 802.1Qcc.
[1811] Figure 109 shows a sequence chant of the procedure of TSN stream configuration using the fully centralized configuration mode! as shown in Figure 108.
[1812] The steps performed to setup an TSN stream in the TSN network in fully centralized configuration mode are the following:
1. The CUC may receive input from e.g. an industrial applicaiion/engineering tool, such as e.g. a Programmable Logic Controller (PLC), which spécifiés the devices which are supposed to exchange time-sensitive streams.
2. The CUC reads the capabilities of end stations and applications in the TSN network that includes information about period/interval of user traffic and payload sizes.
3. Based on this above information the CUC créâtes:
- A StreamID as an identifier for each TSN stream,
- A StreamRank, and
- UsertoNetwork Requirements.
4. The CNC discovers a physical network topology using for example a Link Layer Discovery Protocol (LLDP) and any network management protocol
5. The CNC read TSN capabilities of the bridges (e.g. IEEE 802.1 Q, 802.1 AS,
802,1 CB) in the TSN network, e.g. by means of a network management protocol.
6. The CUC initiâtes join requests to configure the streams in order to configure network resources at the bridges for a TSN stream from one Talker to one Listener.
7. Talker and Listener groups (a group of éléments specifying a TSN stream) are created by CUC, as specified in IEEE 802.1 Qcc, 46.2.2.
8, The CNC configures the TSN domain
9. The CNC checks the physical topology and checks if the time sensitive streams are supported by the bridges in the network,
10, The CNC performs scheduling and path computation of the streams.
11. The CNC configures TSN features in the bridges along the path in the TSN network.
319
12. The CNC retu ms a status (success or fai jure) of resuiting resource assignment for streams to the CUC.
13. The CUC further configures end stations to start the user plane traffic exchange as defined initialiy between the Listener and the Talker.
[1813] In the TSN network, the streamID may be used to uniquely identify stream configurations. It is used to assign TSN resources to a useris stream. The streamîD consists oftwotuples, nameiy:
1. A MacAddress associated with the TSN Talker
2. A UniquelD to distinguish between multiple streams within end stations identified by MacAddress
[1814] In the distributed configuration mode! as illustrated in Figure 106, there is no CUC and no CNC. The Talker is therefore responsible for initiation of a TSN stream. As no CNC is présent, the bridges are configuring themseîves which does not ailow the use of for example time-gated queuing as defined in 802.1Qbv.
[1815] In the centraiized mode! as deprcted in Figure 107 the Talker is responsible for stream initialization but the bridges are configured by CNC.
[1816] To connect devices wirelessly to a TSN network, 5G is a promising solution. The 5G standard also addresses factory use cases through a lot of newfeatures, especially on the RAN to make it more reliable and reduce the transmit latency compared to 4G. The 5G network comprises three main components, which are the UE, the RAN instantiated as the gNB and nodes, such as a User Plane Function (UPF) within the 5G core network (5GCN). The 5G network architecture is illustrated in Figure 110. A control plane of the 5G network further comprises a Network Repository Function (NRF), an Access Management Function (AMF), a Session Management Function (SMF), a Network Exposure Function (NEF), a Policy Control Function (PCF) and a Unified Data Management (UDF).
[1817] An ongoing research challenge is the inter-working of 5G and TSN as illustrated in Figure 111. Both technologies define their own methods for network management and configuration and different mechanisms to achieve communication determinism that must somehowbe arranged to enable end-to-end deierministic networking for industriai networks. in the following the device connected to the 5G network is referred to as 5G endpoint. A device connected to the TSN domain is referred to as a TSN endpoint.
[1818] Despite what is shown in Figure 111 it is also possible that the UE is not connected to a single endpoint but instead to a TSN network comprising of at least one
320
TSN bridge and at least one endpoint. The UE is in such a situation part of a TSN-5G gateway, in which end stations communicate with U Es within the conte xt of a local TSN network that is isoiated from the primary TSN network by the 5G network.
[1819] In the following an example of how Ethernet transport in a 5G System (5GS) according to the scénario shown in Figure 111 could work shall be described.
• This scénario assumes the cases where a single UE needs to support one or multiple endpoints, each having a distinct Ethemet MAC layer address. In other words, the UE may support multiple Ethernet ports.
• The User Plane Function (UPF) that interfaces with the TSN switch is assumed to support the réception and transmission of Ethemet PDUs.
• Upon receiving an Ethemet PDU from the TSN switch, the UPF must be abie to associate the destination MAC address or addresses to, for example, a PDU session, e.g. based on the IP address of the UE associated with the destination MAC address, and then relay the Ethernet PDU to the appropriate node in the 5G network.
* The gNB sends the Ethernet PDU to the UE using a data radio bearer (DRB) with relîability and latency attributes appropriate for supporting the Ethernet PDU transmission.
• The UE recovers the Ethemet PDU, e.g. from the PDCP layer, and sends the Ethernet PDU to the endpoint associated with the destination MAC address, since the UE may support one or more Ethemet connected endpoints.
• In summary, the original Ethernet PDU received by the UPF from the TSN switch is delivered transparentiy through the 5G network.
» For the upîink direction the 5G network is expected to détermine when a Radio Network Temporary Identifier (RNTI) is associated with ihe Ethernet operation, thereby allowing uplink payload, such as e.g. an Ethemet PDU, associated with the RNTI to be routed to a UPF. The UPF then simply sends the received Ethernet PDU to a TSN switch.
[1820] Many TSN features are based on précisé time synchronization between ail peers. Also, a lot of industrial applications rely on a précisé synchronization. As introduced above this is achieved using e.g. IEEE 802.1AS or IEEE P802.1AS-rev. Within the TSN network it is therefore possible to achieve a synchronization with submicrosecond enror. In order to achieve this level of accuracy a hardware support might be required; e.g. for timestamping of packets.
[1821] In the network, a grandmaster (GM) is a node that transmits timing information to ail other no des in a master-slave architecture. The GM might be electêd
321 out of several potential nodes, by certain criteria that makes the selected grandmaster superior.
[1322j in a TSH-extension of 802.1AS (i.e. P802.1AS-rev), it has been defined that next to a main GM also a second redondant backup GM may be configured. In case the main GM faits for any reason, devices in the TSN domain may be synched to the second redundant GM. The redundant GM might work in a hot-standby configuration.
[1823] In TSN based on IEEE P802.1AS-rev, which is also referred to as generalized Précisé Timing Protocol (gPTP) there can be multiple time domains and associated gPTP domains supported in a TSN network. The gPTP supports two timescales:
• Timescale PTP: The epoch is the PTP epoch (details in IEEE 802.1 AS-rev section 8.2.2) and this timescale is continuous. The unit of measure of the time is the SI second as realized on the rotating period.
» Timescale ARB (arbitrary): The epoch for this timescale is domain startup time and can be setup by administrative procedure (more details in IEEE 802.1AS-rev, section 3.2).
[1824] Devices in the TSN network may be synched to multiple time domains. A local arbitrary time domain may also be referred to as a working clock,
[1825] One of the initial steps for setting up the TSN stream, as explained above, and shown in Figure 109, is the establishment of a TSN domain by the CNC, by grouping endpoints (talkers and listeners) that are supposed to exchange time-sensitive streams. This list is provided by the CUC to the CNC. The CNC further configures the bridges connecting these endpoints such that each TSN domain (talkers, listeners and bridges) has its own working clock. Technically this can be done according to IEEE P802.1 AS-rev, by configuring externai port rôle configuration, mechanism.
[1826] Figure 214 shows a PTP header used for every PTP packet (note, interprétation of some fields is being revised in the new édition of the IEEE1588 and correspondingly in the IEEE P802.1ASRev). The domainNumberdefines for each frame, which time domain the frame belongs to. PTP time domains allow using multiple independent PTP docks on a single network infrastructure. These numbers need to be configured at each end-station - so that each end-station is aware about which time domain it requires.
[1827] As per IEEE P802.1AS-Rev/D7.3, it is specified that the destination address of announce and signaling messages shaii be resen/ed a muliicast address 01-80-C2-0000-0E. Furtherrnore, also the destination MAC address of SYNC, Follow-Up, Pdelay_Request, Pdelay_Response and Pdelay_Response_Follow_Up which are al!
322 used for peer-to-peer synchronization shall be reserved the multicast address 01-80-C200-00-0E. It shall be noted that as per 1EEE802.1Q, frames with this address can never be forwarded (non-forwardable address) but must be terminated by the bridge. As Source address they shall use the MAC address of any egress physical port.
[1828] As introduced above, the TSN domain works with different ciocks, such as e.g. global and working ciocks. Furthermore, the ciocks of each TSN domain are not necessarily synchronized and a factory network might comprise of several TSN domains. Therefore, a cross a factory network there might be several independent TSN domains with arbitrary timescales where different maybe overlapping subsets of devices need to be synchronized. As shown in Figure 145, each TSN domain may hâve its own working clock.
[1829] To satisfy time synchronization requirements for TSN in manufacturing use cases, a cellular network is required to provide a time reference to which ail machines, such as e.g. sensors or actuators, can be synchronized.
[1830] Currently in 3GPP standardization release 15 for LTE radio, a mechanism has been developed that alîows time synchronization between Base Stations (BSs) and UEs with a sub-microseconds accuracy.
[1831] It has been proposed in 3GPP RAN 2, to add two Information Eléments (IE) into SIB 16, such as e.g. time reference with a certain granularity, e.g. 0.25ps, and an uncertainty value, and the DL Radio Resource Control (RRC) message U ETime Reference to transmit a GPS time to the UE with three lEs added in an RRC message.
[1832] The main purpose of this procedure is to transfer GPS based time reference information to UEs along with inaccuracy of that information.
[1833] LTE defines several System information blocks (SIBs), related to timing information in SIB 16, which contains information related to GPS time and coordinated universal time (UTC).
[1834] SIBs are transmitted over a Downlink Shared Channel (DL-SCH). The presence of a SIB in a subframe is indicated by the transmission of a corresponding Physical Downlink Control Channel (PDCCH) marked with a spécial system-information RNTI (SI-RNTI).
[1835] The information Element (iE) SiB 16 contains information reiated to GPS time and UTC. The UE may use the parameter blocks to obtain the GPS and the local time.
[1836] Another way of providing time synchronization may be to use a time reference information message in RRC signaling to transmit the GPS time to the UE.
323
[1837] The release 16 work is ongoing and different options are discussed to address the needs for time synchronization as required by TSN and industrial applications. Especially the support of multiple time domains in 5G is an open topic. [1838] For the purposes of this présent discussion, it is assumed that 5GS internai signaling js used to transport time information. In this case the 5GS may act as a gPTP time-aware device (which is defined to be compilant with an IEEE1588 boundary cfock) it may use ingress gPTP f rames to get time aware itseîf or may hâve sep a rate gPTP instances handling the 5G system clock and external TSN docks. An internai signaling in the RAN and Core may be used to transport the relevant gPTP information intemally and when received by the UE it may then act as a gPTP master at the UE egress. The 5GS in this case must support and participate in ail Best Master Clock Algorithms (BMCAs) (one gPTP instance per gPTP domain must operate in this case) or being configured to its gPTP rôle by an external entity. A simplified option is possible where a static BMCA is implemented. The actual operation of the BMCA is out of the scope of this disclosure, but the solutions identified herein support the transfer of the related information received via Announce messages. Génération of Announce messages may also be required at the 5GS interfaces or at the internai interfaces of the 5GS nodes, if cascaded time-aware Systems are implemented.
[1839] gPTP messages are sent to synchronize slaves to a master. In gPTP, for 20 example domain numbers are used to establish multiple time domains in parallel in a network. These numbers help a slave to synchronize its clock to a certain time domain master. Until now, there is no way a 5G System can efficiently support multiple time domains as required by industrial automation applications. This is partîcularly important in case a large number of domains need to be supported, such as e.g. 32 domains, and large number of UEs are connected.
[1840] Depending on how time signais are transported in the 5GS, and especially what transmission type (Broadcast, Multicast, Unicast) is chosen at the RAN, RAN knowledge about which UE needs which time domain signal may be very important. This is however not supported today.
[1841] Figure 215 depicts an example of a communications network 100 according to a first scénario in which embodiments herein may be implemented. The communications network 100 is a wireless communication network such as e.g. an LTE, E-Utran, WCDMA, GSM network, any 3GPP cellular network, Wimax, or any cellular network or system,
[1842] The communications network 100 comprises a Radio Access Network (RAN) and a Core Network (CN). The communication network 100 may use a number of
324 different technologies, such as Long Term Evolution (LTE), LTE-Advanced, 5G, Wideband Code Division Multiple Access (WCDMA), Global System for Mobile communications/Enhanced Data rate for GSM Evolution (GSM/EDGE), Worldwide Interoperability for Microwave Access (WiMax), Wi-Fi, or Ultra Mobile Broadband (UMB), just to mention a few possible implémentations. In the communication network 100, one □r more UEs 120 may communicate via one or more Access Networks (AN), e.g. RAN, to one or more CNs. The UE 120 may e.g, be a wireless device (WD), a mobile station, a non-access point (non-AP) STA, a STA, and/or a wireless terminal. It should be understood by those skilled in the art that “wireless device” is a non-limiting term which means any terminal, wiretess communication terminal, user equipment, Machine Type Communication (MTC) device, Device to Device (D2D) terminal, or node e.g. smart phone, îaptop, mobile phone, sensor, reîay, mobile tablets or even a base station communicating within a cell.
[1843] The RAN comprises a set of radio network nodes, such as radio network nodes 110, 111 each providing radio coverage over one or more geographical areas, such as a ceJî 130,131 ofa radio access technology (RAT), such as 5g, LTE, UMTS, WiFi or simiiar. The radio network node 110, 111 may be a radio access network node such as radio network controller or an access point such as a wireless local area network (WLAN) access point or an Access Point Station (AP STA), an access controller, a base station, e.g. a radio base station such as a gNB, a NodeB, an evolved Node B (eNB, eNodeB), a base transceiver station, Access Point Base Station, base station router, a transmission arrangement of a radio base station, a stand-alone access point or any other network unit capable of servie g a wireless device within the cell, which may also be referred to as a service area, served by the radio network node 110, 111 depending e.g. on the first radio access technology and terminology used.
[1844] The CN further comprises a core network node 140 which rs configured to communicate with the radio network nodes 110, 111, via e.g. an S1 interface. The core network node may e.g. be a Mobile Switching Centre (MSC), a Mobility Management Entity (MME), an Operations & Management (O&M) node, an Operation, Administration and Maintenance (OAM) node, an Operations Support Systems (OSS) node and/or a Self-Organizing Network (SON) node. The core network node 140 may further be a distributed node comprised in a cloud 141.
[1845] The UE 120 is located in the ceil 130 of the network node 110, which is referred to as the serving cell, whereas the cell 131 of the network nodes 111 are referred to as neighboring cells. Although, the network node 110 in Figure 215 is only depicted
325 providing a serving celi 130, the network node 110 may further provide one or more neighboring cells 131 to the serving ceil 130.
[1846] Note that although terminology from 3GPP 5G has been used in this disclosure to exemplify the embodiments herein, this should not be seen as limiting the scope of the embodiments herein to only the aforementioned System. Other wireless Systems, including WCDMA, WiMax, UMB, GSM network, any 3GPP cellular network or any cellular network or System, may also benefitfrom expioiting the ideas covered within this disclosure.
[1847] In the following, the embodiments herein will be described in further detail. [1848] According to the embodiments herein the 5GS may receive gPTP messages from an extemal network in which a grandmaster is deployed. The gPTP messages from the GM may be received either on a UE or UPF side of the 5GS. As multiple time domains are used in industrial networks as introduced above, there may be multiple signais arriving at the 5GS. One example of multiple time domain support in the 5GS for a scénario in which the grandmaster is iocated on the UPF-side of the 5GS is illustrated in Figure 89. In Figure 89 gPTP messages are directiy transported to a gNB, which is one possible implémentation. Any gPTP message comprises a domain number which defines the time domain which the gPTP message belongs to.
[1849] This embodiments herein assume a non-transparent transport of gPTP frames in the 5GS is used, in other words the information is extracted from gPTP frames and relayed through the 5GS using 3GPP signaliing. The information about the time domains and which UE belongs to which time domain is particularly important for cases where a large number of UEs are connected and a significant number of gPTP domains need to be supported, such as e.g. more than two gPTP domains.
[1850] One scénario is where the Grandmaster is on UPF side of the 5GS downlink: Either the UPF or the gNB may receive gPTP messages and may act as a slave to an external TSN network, Hence, one spécifie gPTP instance, such as e,g; an instantiation of a gPTP application, implemented in either the UPF or in a gNB may handle the gPTP messages belonging to that spécifie gPTP domain, as indicated by the domainNumber attribute, and, as a resuit of for example a BMCA for the spécifie gPTP domain, lock to the reiated GM. In case the UPF provides the instantiation, the UPF will forward the time information extracted from the gPTP message to one or more gNB(s) plus the information about the time domain it belongs to. The UPF may e.g. be configured with a set of ethemet MAC multicast addresses for which it will relay corresponding time information and time domain information to one or more gNBs. Note that when the UPF acquires the timing information, such as e.g. an extemal TSN working clock value and a
326 corresponding time domain, from gPTP messages it reiays it to the gNB for further distribution to the UE, the actuai gPTP messages are not reiayed Different options are available for transmitting timing information in RAN, in particular, not necessanly requiring involvement of the gNB. For example, in case a distributed time-aware approach is implemented, oniy the devices at the edges of the 5GS may need to handle and process the gPTP messages. However, the embodiments herein focus on the case where RAN is necessariiy involved and uses S(B based or RRC based methods for conveying timing information to UEs.
[1851] If a radio broadcast {forexample SIB messages) is used tn the RAN: The UEs need to know which broadcasted signal belongs to which time domain. Each time domain may be broadcasted individually, or one broadcast signa! might carry information for multiple time domains.
- In one embodiment this may for example be soived by adding an additional parameter sent in the SIB signais to UEs that indicate the domainNumber, such as e.g. an integer between for exampie 0-127; either in each broadcasted signal or multiple in one signal.
- in another embodiment, the broadcasted signal does not carry any additional parameter, but when broadcasted, it always cames a spécifie time domain signal such as of domain 0 or a iist of domain numbers such as domain 0, 1,2,..., N. Which domain number or which fist of the domain numbers that is sent in the broadcast message may be preconfigured or may be sent to the UE prior to sending the broadcast message with timing information
- According to yet another embodiment, the UE may learn which time domain(s) an end station or end stations which the UE is connected to require(s). The UE may e.g. îeam this by listening te the gPTP Announce messages delivered periodically by the end station(s). As a resuit of the BMCA, the UE will implement a PTP port operating in the master State forwarding time signais from the 5G network and wili only operate in the spécifie PTP domain that it needs to support. This means that the UE wiîl only select the time domains from the broadcasted time signai information that it requires.
In one way, *ne 5GS may obtain information from a TSN network controlîer about which time domain signai that needs to be directed to which UE, e.g, by means of an UE identifier, or a MAC address of an end station connected to the UE respectively. The information may for example be sent from the extemal TSN CNC towards an Application Function (AF) when the CNC sets up TSN domains in the TSN neiwork. The CNC may announce which time domain
327 signais that need to be forwarded to which port, such as e.g. to a UE or a MAC address. The AF may trigger SMF or AMF or another core network function to feil the UEs which time domain signal they should listen to. in detail:
The CUC may know exactly what clock domain an end station desires. The CUC may then tell the CNC to configure a 5G bridge” (i.e. the 5G System modeled as a bridge/time aware relay). The CNC may e.g. ask 5GS to setup a link between northbound of 5G bridge and southbound of the 5G bridge, so that the correct timing can be delivered to the corresponding end station.
- The 5GS may receive the AF information from the CNC and may translate the CNC command to 5GS signaling. This may be referred to as an externaî port configuration that may be performed by a CNC to define the gPTP rapid spanning tree inside a switch, or inside the 5GS according to the embodiments herein. If the extemal port configuration is available as information from the CNC then the BCMA is no longer required. Ports may be configured by the CNC to take different rôles, such as e.g. MasterPort, SlavePort, PassivePort, or DisabledPort, which may be interpreted into where each time domain signal needs to be routed in the 5GS according to the IEEE P802.1AS-rev standard. The 5GS internai signaling from the AF may be used e.g. to inform UEs about which time domain signal they should listen to in case a broadcast is used.
[1352] if a radio rnuiticast or unicast (using e.g. RRC signaling) is used: The gNB or gNBs in general needs to know which UE or UEs requires which time signal from which time domain.
According to one embodiment, this may be achieved by sending a signal from the UE to the gNB about which time domain the UE is interested in, or more precisely which time domain the end station or end stations connected to the UE are interested in. This information is available in the end station the UE is connected to, since each device knows which time signal it should listen to. Methods from BCMA may be used to obtain said information. This might be a single or multiple time domains depending on how the UE is connected, such as e.g. to a single end station or a switch followed by multiple end stations, and methods like the eues described in relation to the broadcasting case are valid to learn the interests of end-stations. The gNB may query the UE information about the time domain the UE requires or the UE may send the information about
328 which time domain it requires to the g NB after being connected to the network. This may e.g. be performed using RRC messaging between the UE and the gNB(s).
- According to another embodiment, the UE may be manualiy configured to a spécifie time domain or time domains and the information about the time domain the UE requires may be avaiiable at a core network function, A UE 5G internai identifier may be used to query a database. e.g, in the 5GS, wherein it is noted in the database which time domains the UE is to be synched to. The gNB may query a core network function. The core network function may teil the gNB which UE requires which time domain signal One solution may be that the SMF provides this information to the RAN when a PDU session is setup. As for the broadcast case this configuration or information about which time domain signal needs to be forwarded to which UE may be received from an extemal TSN CNC (extemal port configuration) during the TSN domain setup phase e.g. through the AF. This information may be intemally forwarded in the 5GS to the RAN, in order to letthe RAN know which UE needs which time domain signal. The UE will only receive a time signal or signais that it is required to forward to other devices since only these signais may be sent to the UE by the gNB. In order to separate different time signais that are sent to the UE, identifiers might be negotiated between the UE and the gNB or may be pre-configured to ailow the UE to distinguish between different time domains and forward gPTP frames accordingly, i.e. put the right domain N umbers into the gPTP frames. The préconfiguration may be such that the domain number is not signaled in the unicast RRC message but the UE is aware of which domain number the message refers to. if there is only one time domain supported by the UE, this is straightforward. If there are multiple time domains supported by the UE, the unicast message may include a list of time information ordered in, forexample, an ascending or descending order of the time domain number.
[1853j At the egress of the 5GS, i.e. when the message leaves the 5GS, the UE may act as a gPTP master to any device connected to it. This may involve a création or re-creation of various gPTP frames, such as e.g. Sync, Follow_up, Pdeiay_request, Pdelay_response, PDeiay_Response_Foiiow_up, Annôunce etc., based on the timing and other information, such as e.g. domain Nu mbers, from a gNB. This is similar to action 1202 described with regards to the method performed by the receiving device in Figure 217.
329
[1854] For ail the embodiments mentioned above it is not important how the time signais are transported in the RAN (i.e. which signais are used and how these signais are designed to achieve a sufficient accuracy), besides whether it is unicasted, multicasted or broadcasted.
[1855] For ail embodiments mentioned above it might further be relevant to also transmit other gPTP information to/from the UE, such as e.g. information related to the handling of BMCA and related information required to generate the outgoing PTP messages, such as e.g. a clock identifier. This may be the case in ail three cases described above, i.e. broadcast, multicast, and unicast, either as dedicated RRC or SIB signaling next to the time signal transmission or as part of the time signaling in RRC or SIB messages.
[1856] Furihermore, an internet Protocol (IP) may be used for transporting the gPTP frames. Ail methods in here might be applicable in a simiiar manner in this case where IP is used above Ethernet on Layer 3 (L3).
[1857] Another scénario is when the grandmaster on the UE side of the 5GS Uplink: When the grandmaster is on the UE side of the 5GS, then the UE needs to forward time information to the gNB. The UE may receive gPTP messages and is therefore time aware. The 5GS needs to be informed about which time domain a transmitted signal beiongs to. Only unicast, such as e.g. using RRC signaling, is possible in uplink.
[1858] In one embodiment, the 5G network may be informed about the time domain by means of a dedicated RRC signaling from the UE to the gNB that indicates the time domain number. When multiple time domains are présent the dedicated RRC signaling may comprise multiple time domain numbers. The gNB may receive this information and either forward it to the UPF or may use it itself in orderto forward the timing information from the UE to the correct time domain, in order to ultimately re-estabîish gPTP frames with the correct domaïnNumber. The RRC signaling may be performed as part of the time signaling or may be negotiated beforehand. If it is negotiated that the UE will signal time from multiple time domains an identifier might be used to distinguish the time domains within the time signais.
[1859] According to a further embodiment the time domains may also be preconfigured (UE #12345 may be configured to only uplink a time domain signal belongîng to time domain i). If it is pre-configured that the UE will signal time from multiple time domains, an identifier might be used to distinguish them. A pre-configuration may also be performed as described in the embodiments above, based on input from an external TSN CNC e.g. through the AF as explained for the downlink embodiments.
330
[1860] The embodiments herein hâve the benefit that they allow end-to-end time synchronization with multiple time-domains. Thereby the 5GS System is now able to forward time signais from multiple time domains effîcientîy.
[1861] Figure 216 illustrâtes the method actions performed by the transmitting device, such as e.g. the UE 120, the network node 110 and/or the UPF, in the wireless communication System (100), such as e.g. the 5G System, for handling gPTP signaling from the TSN.
- Action 1101 : The transmitting device may receive, from a TSN network, a gPTP message. The gPTP message comprises time information and a time domain related to the time information.
- Action 1102: The transmitting device may extract the time information and the time domain from the gPTP message.
- Action 1103: The transmitting device may obtain information regarding the time domain to which a receiving device is related. The information regarding the time domain to which a spécifie device is related may be obtained by receiving a signal from the receiving device indicating which time domain the receiving device is related to: The indication may e.g. be signaled by means of RRC signaling. In some embodiments the receiving device may be préconfigurée! with one or more spécifie time domains and the information regarding the time domain to which the receiving device is related may be obtained by the transmitting device by querying, i.e. by sending a query to, a database comprising the time domains that the spécifie receiving device is configured to support. The time domain comprised in the 3GPP message may be indicated using an identifier. The identifier may be used when querying the data base.
- Action 1104: The transmitting device may further transmit, to the receiving device, such as e.g. the radio network node 110, the UPF and/or the UE 120, a 3GPP message comprising the time information and the time domain related to the time information. The 3GPP message may e.g. be a Session Initiation Protocol (SIP) message used for broadeasting or a Radio Resource Control (RRC) message.
- Action 1104a: The transmitting device may transmit the 3GPP message comprising the time information and the time domain related to the time information to one or more receiving devices related to the time domain comprised in the 3GPP message using muiticast or unicast, based on the information received in action 1103.
- Action 1104b: When the transmitting device is a radio network node or a UPF, the transmitting device may transmit the 3GPP message to the receiving device using
331 broadcasting. The transmission device may transmit an additional parameter or a dedicated signaling in the 3GPP message. The additional parameter may indicates the time domain or a time domain number which the broadcasted 3GPP message relates to.
[1862] Figure 217 illustrâtes the method actions performed by the receiving device, such as e.g. the UE 120, the network node 110 and/or the UPF, in the 3GPP wireless communication System 100, such as e.g, the 5G System, for handling gPTP signaling from the TSN. The receiving device may herein also be referred to as a receiving entity.
- Action 1201: The receiving device may receîve, from a transmitting device, such as e.g. the radio network node 110, the UPF and/or the UE 120, a 3GPP message comprising a time information and a time domain related to the time information. The 3GPP message may be received using multicasting, unicasting or broadcasting.
- Action 1202: The receiving device may create and/or re-create, based on the time information and the time domain comprised in the 3GPP message, a gPTP message comprising the time information and the time domain related to the time information.
- Action 1203: When the 3GPP message is received as a broadcasted message, the receiving device may further obtain information regarding the time domain supported by the one or more end stations in the TSN network, which end stations are connected to the receiving device. The information regarding the time domain supported by the end stations in the TSN, may e.g. be obtained by receiving a gPTP message, such as e.g. a gPTP Announce message, delivered periodically by the end station. The information regarding the time domain supported by the end stations in the TSN, may in a further embodiment be obtained by receiving information from a TSN network controller, wherein the information comprises a receiving device identifier, such as e.g. a UE identifier, or a MAC address of an end station.
- Action 1204: The receiving device may transmit, to one or more end stations in the TSN network, a gPTP message, wherein the gPTP message comprises the time information and the time domain related to the time information extracted from the 3GPP message.
- Action 1204a: The receiving device may transmit, to the end station, the broadcasted time information reiating to the time domain supported by the end station of the TSN, based on the information obtained in action 1203. Hence, any broadcasted time information not reiating to the time domain supported by the end
332 station of the TSN which is connected to the receiving device wiil not be transmitted to the end station by the receiving device.
[1363] Additional embodiments of techniques for handling précisé timing protocol signaiing from a lime sensitive network are described beiow.
[1864] According to the embodiments herein the 5GS may receive gPTP messages from an externat network in which a grandmaster (GM) is deployed, The gPTP messages from the GM may be received either on a UE or UPF side of the 5GS. As multiple time domains are used in industrial networks as introduced above, there may be multiple signais arriving at the 5GS. In the embodiments below it is assumed that the gPTP frames are îransparentiy iransported in the 5GS. In this case it is particularly important to know about which nodes requtre which time domain signais, (i.e. gPTP frames carrying to a certain domainNumber), for cases where a large number of UEs are connected and a significani number of gPTP domains need to be supported, such as e.g. more than two gPTP domains. Solutions for both uplink and downîink transmission of time signais are introduced. The information about the time domains and which UE belongs to which time domain is particularly important for cases where a large number of UEs are connected and a significant number of gPTP domains need to be supported, such as e.g. more than two gPTP domains.
[1865] Grandmaster on UPF side of the 5GS - Downîink: The 5GS forwards gPTP frames end-to-end (i.e. TSN source node supporting a given working clock exchanges gPTP frames with a UE or with an end station associated with that UE) which gPTP frames carry time information. Each gPTP frame may comprise the domainNumber header field which indicates the time domain the gPTP frame belongs io. The gPTP frames may need to be iransported in PDU sessions to a UE or to a plurality of UEs. The details of the related solutions dépend on the spécifie mechanism that is impîemented in orderto “transparently” carry the PTP time information across the 5GS, such as e.g., acting as a distributed transparent dock, or equalizing the delays on both direction so as to create a symmetric channel. In this case there is no need for the 5GS to participate in the BMCA.
[1866] If a broadeast of gPTP frames is used in the 5GS: In case a broadeast of gPTP frames is performed in the 5GS instead, e.g. by means of the gNB, then the UE or UEs need to décidé whether they are iistening to a certain broadeast or not. This may be performed in a similar manner as in the first embodiment above by cnecking whether any device connected to the UE sends Announce messages belonging to a spécifie PTP domain. The UE may not listen to the spécifie gPTP time domain broadeast any longer or not forward any gPTP frames if the connected end stations or end stations is/are not
333 operating in this PTP domain. Unis is illustrated in Figure 218 for the case where the UE forwards al! broadcasted gPTP frames or Figure 219 where the UE only forwards reievant gPTP frames to the respective end stations. The UE may aiso send for example gPTP frames such as e.g, Announce messages to end stations to check for replies to certain domain numbers in order to leam which endstations needs which time domain signai.
[1867] If a unicast or multicast of gPTP frames is used in the 5GS: îngress frames to the 5GS will carry a multicast destination MAC address - the 5G network (for example the UPF) needs to décidé to which UE (i.e. PDU sessions) it will forward gPTP frames to; gPTP frames might be detected by the PTP-specific Ethertype fieid.
[1868] in one embodiment, an end station connected to a UE wil! generate Announce messages carrying information on the gPTP domain (domainNumber carried in the PTP header) it is operating or a 5GS node might use for example Announce messages to detect the interests of end stations. A node in the 5GS, like for exampie the UPF could leam which UE, respectively end stations behind a UE are interested in which gPTP messages and establish for example raies for routïng incomin g gPTP frames accordingly.
[1869] Any foiiow up / sync messages are only transmitted to UEs interested in these gPTP packets (which are these ones that operate in that spécifie gPTP domain); a UE will transparently forward gPTP messages from an end station or end stations it is connected to, to for example the UPF to learn about end-stations’ needs.
[1870] Example of this embdiment:
• gPTP frames (for exampie an announce message or sync message or other) arrive at the UPF from an exiernai TSN network; these frames carry the gPTP multicast Ethernet destination MAC address and a spécifie domainNumber that indicate the time domain they are referring to • UPF does not know at that point which UE is interested in frames from this time domain (domainNumber) as the MAC address indicates a multicast; therefore it sends ail or a subset of gPTP frames or a spécifie gPTP frame (like an Announce message) to ail UEs or any subset of relevant UEs (Option A). In addition or as another solution (Option B), end stations send any gPTP frames to the 5GS themselves that the UE will forward to the 5G network • (Option A) A UE that receives gPTP frames from the 5G network will forward them to an end station it is connected to. If the end station or any other peer connected to that end station is interested in gPTP frames from this time domain (by checking the domainNumber) it will reply to these gPTP frames in a way it is defined in the gPTP protocol (this is an approach that could be applicable in case
334 the 5GS emulates the behavior of a PTP link, where the pdelay messages are exchanged across the 5G System). These packets are forwarded by the UE back to the 5G network which allows the 5G network to detect which UE is interested in frames from which time domain • (Option B): A UE receives for example an Announce message or any other PTP message from an end station or multiple end stations; the UE forwards them to the 5G network; based on the domainNumber camed by the Announce messages the 5GS learns the correct domainNumber to be sent to the end station or stations or UE or UEs respectively
[1871] According to another embodiment it may be pre-confîgured in the 5G network, which UEs will receive frames from a spécifie time domain; the frames may be forwarded in UPF to PDU sessions based on the domaînNumber. The SMF may be an entity configuring filters in UPF at Setup or modification of PDU sessions. In one way, the 5GS wili obtain information from the TSN network about which time domain signal need to be directed to which UE i.e. UE identifier, or MAC address of an end station connected to the UE respectively. This may e.g. obtained from the extemal TSN CNC towards the Application Function (AF) when the CNC sets up TSN domains in the TSN network. The CNC may announce which time domain signais need to be forwarded to which port, i.e. UE or MAC address. AF might trigger any other core network function to set the right filter or rules in UPF to forward gPTP frames to the right PDU sessions using domainNumbers. [1872] This is illustrated in Figure 220. In detail:
1. The CUC may know exactly what clock domain an end station wants.
2. The CUC may then tell, which may also be referred to as instruct, the CNC to configure the 5G “bridge” (5G system modeled as a bridge/ time aware relay). e.g. CNC asks 5GS to setup a link between northbound of 5G bridge and southbound of the 5G bridge, so that the correct timing can be delivered to the corresponding end station (e.g. from which ingress port to which egress port).
3. The 5GS may receive, on the AF which may comprise the translater function, information from the CNC and may translate the CNC command to 5GS signaling, which may also be referred to as 3GPP signaling. In the IEEE P802.1AS-rev document it is referred to as an extemal port configuration that may be performed by a CNC to défi ne the g PTP rapid spanning tree inside a switch, or in our câsê inside the 5GS. If the external port configuration is available as information from a CNC than a BCMA is no longer required. Ports can be confîgured by the CNC to different rôles like MasterPort, SlavePort, PassivePort, or DisabledPort which can be interpreted into where each time domain signal need to be routed in the 5G$
335 according to the IEEE P802.1ASrev standard. The 5GS internai signaling from the AF is used to e.g. setup/update PDU sessions from the UPF to the UE, in this case only the seîected/filtered clock domain will be transfèresd to the corresponding UE/end station
[1873] For ail embodiments described above (such as e.g. unicast or broadeast) it is further not relevant how the gPTP are transported in the 5GS, besides whether the gPTP frame is unicasted, multicasted or broadeasted to the UE. This may comprise time stamping of gPTP frames in the 5GS ingress and egress to caiculate a correction time and compensate varying delays in the 5GS. This is shown in figures 224, 225, and 226 in which the time of the 5GS is added to the message when the message enters the 5GS. it is not specified whether the 5GS may need to transmit ail gPTP packets (Sync, Follow_up, Pdeîay_request Pdelay_response, PDelay_Response_Foiiow_up, Announce etc.) or just any subset of them over the RAN, like for exampie only Follow-Up messages conta in in g the actual time stamps and then any not transmitted packet could been created, e.g. on the UE side, to ensure a valid gPTP communication handling with any connected end station. According to one embodiment, at least one gPTP frame will be transmitted periodically carrying ail necessary information (domainNumber, timestamp, etc.). The gPTP frames may be transmitted as data packets.
[1874] Furthermore, it is also possible that an Internet Protocol (IP) is used as for transporting the gPTP frames. Ali embodiments described herein may be applicable in a similar manner in the case where IP is used above Ethemet on Layer 3 (L3). The translater function as illustrated in Figures 225 and 226 may be an individual entity or may be part of the UPF function. The translater function may send clock/time domains to UEs via Point-to-Point PDU sessions or may send multiple flows inside the PDU session. The translater function may also be a transmitting device according to the example embodiments described herein. Figure 220 shows an example of an embodiment in which the TSN CNC provides input to the UPF and/or the gNB on how to forward the time domain signais. In the scénario shown in Figure 220 the gPTP frames are forwarded to the receiving device, such as e.g. the UE, by the UPF using unicast and/or multicast.
[1875] Grandmaster on the UE side of the 5GS - Uplink: If the grandmaster is located on the UE side of the 5GS, then the UE needs to forward the time information to the gNB. In this case the UE may be the transmitting device, and the gNB and/or the UPF may be the receiving device. The UE may receive gPTP messages from the TSN and will therefore be time aware. The 5GS may require information rsgarding the time domains in order te be aware about to which time domain the time information forwarded from the UE belongs to.
336
[1876] The UE always uses unicast to forward gPTP trames to the 5G network. Based on the gPTP trame headers, the network is able to détermine the time domain. According to one embodiment herein it might not be necessary to transmit ail gPTP trames but only a subset and fiiter others at the UE side. The 5G network, for example at the UPF, may récréais any not transmitted gPTP trames.
[1877] According to a spécial case it may be necessary to forward the time signal to another UE instead of to an extemal TSN network, such as a Data Network. In this case the 5GS may use one of the methods introduced above in relation to the embodiments related to Downlink, obtaining the information regarding the time domain number from the frame headers it receives.
[1878] The embodiments herein hâve the benefit that they alîow end-to-end time synchronization with multiple time-domains. Thereby the 5GS system is now able to forward time signais from multiple time domains efficiently.
[1879] Figure 221 illustrâtes the method actions performed by the transmitting device, such as e.g. the UE 120, the network node 110, the UPF and/or the translater fonction, in a 3GPP wireless communication System 100, such as e.g. the 5G System, for handling gPTP signaling from the TSN.
• Action 1301: The transmitting device may receîve, from the TSN network, a gPTP frame, such as e.g. an Announce message or a sync message. The gPTP frame may comprise time information, an indication of a time domain related to the time information and/or a MAC address of a second end station connected to a receiving device.
• Action 1302: The transmitting device may détermine, based on the indication of the time domain and/or the MAC address, the receiving device which the gPTP frnrnQ ♦λ ilCIrriO I cid 3 ι,υ .
• Action 1302a: The transmitting device may détermine the receiving device which the gPTP frame relates to by obtaining information regarding the time domain to which the receiving device and/or one or more second end stations connected to the receiving device are related. The transmitting device may obtain the information by receiving the information from the receiving device. The transmitting device may obtain the information by receiving a pre-configuration indicating which receiving devices are related to a spécifie time domain. The transmitting device may further obtain the information regarding the time domain supported by the one or more second end stations in the TSN, by receiving information from a TSN network controller, wherein the information comprises a
337 recetving device identifier, such as e.g. a UE identifier, or a MAC address of the one or more second end stations.
• Action 1302b: The transmitting device may further détermine the receiving device which the g PT P frame relates to, by determining that the received gPTP frame s relates to a receiving device when the indication of the time domain or the MAC address comprised in the gPTP frame corresponds to the obtained information regarding the time domain to which the receiving device and/or the one or more second end stations connected to the receiving device are related.
• Action 1303: The transmitting device may further set a first time stamp on the gPTP frame when the gPTP frame is received and/or transmitted by the transmitting device, wherein the first time stamp may be used to calculate a correction time for compensating for varying delays in the 3GPP wireiess communication system 100.
• Action 1304: The transmitting device may transmit, to the determined receiving device, such as e.g. the radio network node 110 or the UPF in UL and/or the UE
120 in DL, the gPTP frame in a PDU session related to the determined receiving device. The transmitting device may be a radio network node or a UPF, and the gPTP frame may be transmitted using broadcasting. The transmitting device may further transmit the gPTP frame using multicasting or unicasting,
[1880] Figure 222 illustrâtes the method actions performed by the receiving device, such as e.g. the UE 120, the radio network node 110, the UPF and/or the translater function, in the 3GPP wireiess communication System 100, such as e.g. the 5G System, for handling gPTP signaiing from the TSN. The receiving device may herein also be referred to as a receiving entity.
· Action 1401: The receiving device may receive, from a transmitting device, such as e.g. the radio network node 110, the UPF and/or the UE 120, a PDU session comprising a gPTP frame which in tum comprises a time information an indication of a time domain related to the time information and/or a MAC address of one or more second end stations connected to the receiving device. The PDU session may be received using multicasting, unicasting or broadcasting.
• Action 1402: The receiving device may détermine, based on the indication of the time domain and/or the MAC address, one or more second end stations in the TSN network to transmit the received gPTP frame to.
• Action 1403: When the PDU session is received as a broadcasted message, the 35 receiving device may further obtain information regarding the time domain supported by the one or more second end stations in the TSN network, which end
338 stations are connected to the receiving device. The information regarding the time domain supported by the end stations in the TSN, may e.g. be obtained by receiving a gPTP message, such as e.g. a gPTP Announce message, delivered periodically by the one or more second end stations. The information regarding the time domain supported by the one or more end stations in the TSN, may in a further embodiment be obtained by receiving information from a TSN network contrôler, wherein the information comprises a receiving device identifier, such as e.g. a UE identifier, or a MAC address of the one or more second end stations.
• Action 1404: The receiving device may further set a second time stamp on the gPTP frame when the PDU session comprising the gPTP frame is received and/or the gPTP frame is transmitted by the receiving device. The second time stamp may be used in combination with the first time stamp received on the gPTP frame, to caiculate a correction time for compensating for varying delays in the 3GPP wireless communication System 100.
• Action 1405: The receiving device may transmit, to the one or more second end stations in the TSN network, the gPTP frame. The gPTP frame comprises the time information and the time domain related to the time information comprised in the PDU session.
• Action 1405a: The receiving device may transmit, to the one or more second end stations, the broadcasted time information when the broadcasted PDU session relates to a time domain supported by the one or more second end stations of the TSN, based on the information obtained in action 1403. Hence, any broadcasted time information not relating to the time domain supported by the end station of the TSN which is connected to the receiving device will not be transmitted to the end station by the receiving device.
[1881] It will be appreciated that the methods described above may be carried out by various ones of the nodes described elsewhere in this document. Likewise, any combinations of the above, as implemented by appropriate nodes, are possible and are contempiated by the présent disclosure,
[1882] Wireless Devices/UEs
[1883] Many of the techniques described above are carried out, in whole or in part, by a wireless device, or UE. As used herein, the terms “wireless device,” “user equipment,’’ and “UE” are used interchangeabiy, unless the context of a spécifie use clearly indicates otherwise, and refer to a device capable, configured, arranged and/or opérable to communicate wrelessly with network equipment and/or another wireless device. !n the présent context, communicating wireiessiy involves transmitting and/or
339 receiving wireless signais using electromagnetic signais, in particular embodiments, wireless devices may be configured to transmit and/or receive information without direct human interaction. For instance, a wireless device may be designed to transmit information to a network on a predetermined schedule, when triggered by an internai or extemal event, or in response te requests from the network. Generally, a wireless device may represent any device capable of, configured for, arranged for, and/or opérable for wireless communication, for example radio communication devices. Examples of wireless devices include, but are not limited to, user equipment (UE) such as smart phones. Further exampîes include wireiess caméras, wireless-enabled tablet computers, laptopembedded equipment (LEE), laptop-mounted equipment (LME), USB dongles, and/or wireless customer-premises equipment (CPE).
[1884] As one spécifie example, a wireless device may represent a UE configured for communication in accordance with one or more communication standards promulgated by the 3rd Génération Partnership Project (3GPP), such as 3GPP’s GSM, UMTS, LTE, and/or 5G standards. As used herein, a “user equipment” or “UE” may not necessarily hâve a “userf in the sense of a human user who owns and/or opérâtes the relevant device. Instead, a UE may represent a device that is intended for sale to, or operation by, a human user but that may not initially be associated with a spécifie human user. It should also be appreciated that in the previous detailed discussion, the term “UE” is used, for convenience, even more generally, so as to include, in the context of 5G, any type of wireiess device that accesses and/or is served by the 5G network, whether or not the UE is associated with a user” per se. Thus, the term “UE” as used in the above detailed discussion includes machine-type-communication (MTC) devices (sometimes referred to as machine-to-machine, or M2M devices), for example, as well as handsets or wireless devices that may be associated with a “user.”
[1885] Some wireless devices may support device-to-device (D2D) communication, for example by impîementing a 3GPP standard for sidelink communication, and may in this case be referred to as D2D communication devices.
[1886] As yet another spécifie example, in an Internet of Things (IOT) scénario, a wireless device may represent a machine or other device that performs monitoring and/or measurements, and transmits the results of such monitoring and/or measurements to another wireless device and/or a network equipment. A wireless device may in this case be a machine-to-machine (M2M) device, which may in a 3GPP context be referred to as a machine-type communication (MTC) device. As one particular exampie, a wireless device may be a UE impîementing the 3GPP narrow band internet of things (NB-loT) standard. Particular examples of such machines or devices are sensors, metering
340 devices such as power meters, industrial machinery, or home or personal appliances, e.g, refrigerators, télévisions, personal wearables such as watches etc. In other scénarios, a wireless device may represent a vehicle or other equipment that is capable of monitoring and/or reporting on its operational status or other functions associated with 5 its operation.
[1887] A wireless device as described above may represent the endpoint of a wireless connection, in which case the device may be refemed to as a wireless terminal, Furthermore, a wireless device as described above may be mobile, in which case it may also be referred to as a mobile device or a mobile terminal.
[1888] Although it wiîl be appreciated that spécifie embodiments of the wireless devices discussed herein may include any of various suitable combinations of hardware and/or software, a wireless device configured to operate in the wireless communications networks described herein and/or according to the various techniques described herein may, in particular embodiments, be represented by the example wireless device 1000 shown in Figure 166.
[1889] As shown in Figure 166, example wireless device 1000 includes an antenna 1005, radio front-end circuitry 1010, and processing circuitry 1020, which in the illustrated example includes a computer-readable storage medium 1025, e.g,, one or more memory devices. Antenna 1005 may include one or more antennas or antenna arrays, and is 20 configured to send and/or receive wireless signais, and is connected to radio front-end circuitry 1010. In certain alternative embodiments, wireless device 1000 may not include antenna 1005, and antenna 1005 may instead be separate from wireless device 1000 and be connectable to wireless device 1000 through an interface ôr port.
[1890] Radio front-end circuitry 1010, which may comprise various fiiters and amplifiera, for example, is connected to antenna 1005 and processing circuitry 1020 and is configured to condition signais communicated between antenna 1005 and processing circuitry 1020. In certain alternative embodiments, wireless device 1000 may not include radio front-end circuitry 1010, and processing circuitry 1020 may instead be connected to antenna 1005 without radio front-end circuitry 1010, In some embodiments, radio30 frequency circuitry 1010 is configured to handle signais in multiple frequency bands, in some cases simultaneously.
[1891] Processing circuitry 1020 may include one or more of radio-frequency (RF) transceiver circuitry 1021, baseband processing circuitry 1022, and application processing circuitry 1023. In some embodiments, the RF transceiver circuitry 1021, 35 baseband processing circuitry 1022, and application processing circuitry 1023 may be on separate chipsets, în alternative embodiments, part or aîl of the baseband processing
341 circuitry 1022 and application processing circuitry 1023 may be combined into one chipset, and the RF transceiver circuitry 1021 may be on a separate chipset. In still alternative embodiments, part or ail of the RF transceiver circuitry 1021 and baseband processing circuitry 1022 may be on the same chipset, and the application processing circuitry 1023 may be on a separate chipset. In yet other alternative embodiments, part or ail ofthe RF transceiver circuitry 1021, baseband processing circuitry 1022, and application processing circuitry 1023 may be combined in the same chipset. Processing circuitry 1020 may include, for example, one or more central processing units (CPUs), one or more microprocessors, one or more application spécifie integrated circuits (ASICs), and/or one or more field programmable gâte arrays (FPGAs).
[1892] In particular embodiments, some or ail of the functionality described herein as relevant to a user equipment, MTC device, or other wireless device may be embodied in a wireless device or, as an alternative, may be embodied by the processing circuitry 1020 executing instructions stored on a computer-readabîe storage medium 1025, as shown in Figure 166. In alternative embodiments, some or ail of the functionality may be provided by the processing circuitry 1020 without executing instructions stored on a computerreadable medium, such as in a hard-wired manner. In any of those particular embodiments, whether executing instructions stored on a computer-readable storage medium or not, the processing circuitry 1020 can be said to be configured to perform the described functionality. The benefits provided by such functionality are not limited to the processing circuitry 1020 alone or to other components of the wireless device, but are enjoyed by the wireless device as a whole, and/or by end users and the wireless network generally.
[1893] The processing circuitry 1020 may be configured to perform any determining operations described herein. Determining as performed by processing circuitry 1020 may include processing information obtained by the processing circuitry 1020 by, for exampie, converting the obtained information into other information, comparing the obtained information or converted information to information stored in the wireless device, and/or performing one or more operations based on the obtained information or converted information, and as a resuit of said processing making a détermination.
[1894] Antenna 1005, radio front-end circuitry 1010, and/or processing circuitry 1020 may be configured to perform any transmitting operations described herein. Any information, data and/or signais may be transmitted to a network equipment and/or another wireless device. Likewise, antenna 1005, radio front-end circuitry 1010, and/or processing circuitry 1020 may be configured to perform any receiving operations
342 described herein as being performed by a wireless device. Any information, data and/or signais may be received from a network equipment and/or another wireless device [1895] Computer-readable storage medium 1025 is generally opérable to store instructions, such as a computer program, software, an application including one or more of logic, raies, code, tables, etc. and/or other instructions capable of being executed by a processor. Examples of computer-readable storage medium 1025 include computer memory (for example, Random Access Memory (RAM) or Read Only Memory (ROM)), mass storage media (for example, a hard disk), removabie storage media (for example, a Compact Disk (CD) or a Digital Video Disk (DVD)), and/or any other volatile or nonvolatile, non-transitory computer-readable and/or computer-executabie memory devices that store information, data, and/or instructions that may be used by processing circuitry 1020. In some embodiments, processing circuitry 1020 and computer-readable storage medium 1025 may be considered to be integrated.
[1896] Alternative embodiments of the wireless device 1000 may include additional components beyond those shown in Figure 166 that may be responsible for providing certain aspects of the wireless device's functionality, including any of the functionality described herein and/or any functionality necessary to support the solution described above. As justone example, wireless device 1000 may include input interfaces, devices and circuits, and output interfaces, devices and circuits. Input interfaces, devices, and circuits are configured to allow input of information into wireless device 1000 and are connected to processing circuitry 1020 to allow processing circuitry 1020 to process the input information. For example, input interfaces, devices, and circuits may include a microphone, a proximity or other sensor, keys/buttons, a touch display, one or more caméras, a USB port, or other input éléments. Output interfaces, devices, and circuits are configured to allow output of information from wireless device 1000, and are connected to processing circuitry 1020 to allow processing circuitry 1020 to output information from wireless device 1000. For example, output interfaces, devices, or circuits may include a speaker, a display, vibrating circuitry, a USB port, a headphone interface, or other output éléments. Using one or more input and output interfaces, devices, and circuits, wireless device 1000 may communicate with end users and/or the wireless network, and allow them to benefit from the functionality described herein.
[1897] As another example, wireless device 1000 may include power supply circuitry 1030. The power supply circuitry 1030 may comprise power management circuitry. The power supply circuitry may receive power from a power source, which may either be comprised in, or be extemal to, power supply circuitry 1030. For example, wireless device 1000 may comprise a power source in the form of a battery or battery pack which is
343 connected to, or integrated in, power suppîy circuitry 1030. Other types of power sources, such as photovoltaic devices, may also be used. As a further example, wireless device 1000 may be connectable to an external power source (such as an eiectricity outlet) via an input circuitry or interface such as an electrical cable, whereby the external power source supplies power to power suppîy circuitry 1030.
[1898] Power suppîy circuitry 1030 may be connected to radio front-end circuitry 1010, processing circuitry 1020, and/or computer-readable storage medium 1025 and be configured to suppîy wireless device 1000, including processing circuitry 1020, with power for performing the functionality described herein.
[1899] Wireless device 1000 may also include multiple sets of processing circuitry 1020, computer-readable storage medium 1025, radio circuitry 1010, and/or antenna 1005 for different wireless technologies integrated into wireless device 1000, such as, for example, GSM, WCDMA, LTE, NR, WiFi, or Bluetooth wireless technologies. These wireless technologies may be integrated into the same cr different chipsets and other components within wireless device 1000.
[1900] Wireless device 1000, in various embodiments, is adapted to carry out any of a variety of combinations of the features and techniques described herein. Severai nonlimiting examples are described below.
[1901] In a first example, a wireless device comprises transceiver circuitry configured to communicate with a wireless communications network and processing circuitry operativeiy coupled to the transceiver circuitry. The processing circuitry is configured (e.g., using program code stored in a memory) to control the transceiver circuitry and to receive System information (SI) from a radio base station (RBS) of a radio access network (RAN), the SI being indicative of support for time-sensitive networking, TSN, through the RBS, establish ai least one TSN stream with the external TSN data network, through the RBS, and receive a first timing signal from the wireless communications network, via the RBS. The processing circuitry is further configured to receive a second timing signal from the external TSN data network to which the wireless device is connected, compare the first timing signal to the second timing signal to détermine an offset, and transmit the offset to the wireless communications network. AH of the variations described above for the methods that correspond to this wireless device embodiment may apply io this example wireless device, in various embodiments, and embodiments of this wireless device may be configured to carry out additionai techniques described herein.
[1902] Another example wireless device configured for use in a wireless communications network likewise comprises transceiver circuitry configured to
344 communicate with a wireless communications network and processing drcuitry operatively coupled to the transceiver drcuitry and configured to contre! the transceiver drcuitry. The processing drcuitry in this example wireless device is further configured io receive SI from an RBS of a RAN, the Si being indicative of support for TSN through the RBS, estabiish at least one TSN stream with the external data network, through the RBS, and obtain configuration information for the TSN stream, the configuration information indicating respective values for one or more fields within a header of data packets associated with the TSN stream which are to remain static. The processing drcuitry is further configured to receive, from the RBS, a data packet associated with the TSN stream, and add the one or more fields to the data packet to generate a decompressed data packet. Again, ail of the variations described above for the methods that correspond to this wireless device embodiment may apply to this example wireless device, in various embodiments, and embodiments of this wireless device may be configured to carry out additional techniques described herein.
[1903] Another example wireless device configured for communication with a RAN also comprises transceiver drcuitry configured to communicate with a wireless communications network and processing circuitry operatively coupled to the transceiver circuitry and configured to control the transceiver circuitry. The processing circuitry in this example is configured to receive Si from an RBS of the RAN, the SI being indicative of support for TSN through the RBS, estabiish at least one TSN stream with the external data network, through the RBS, and receive, from the external network, a transmission schedule associated with the TSN stream. The wireless device is further configured to send, to a network associated with the RBS, a request to alîocate radio resouroes for communication of the TSN stream between the wireless device and the RAN, wherein the request further comprises information related to the transmission schedule, and receive, from the network, a response indicating whether radio resources can be allocated to meet the transmission schedule associated with the TSN stream. Once more, ail of the variations described above for the methods that correspond to this wireless device embodiment may apply to this example wireless device, in various embodiments, and embodiments of this wireless device may be configured to carry out additional techniques described herein.
[1904] Stilï another example wireiess device configured for use in a wireless communications network comprises transceiver circuitry configured to communicate with a wireless communications network and processing circuitry operatively coupled to the transceiver circuitry and configured to control the transceiver circuitry. The processing circuitry is configured to receive SI from an RBS of a RAN, the SI being indicative of
345 support for TSN through the RBS, estabiish at least one TSN stream with the externai TSN data network, through the RBS, receive configuration information configuring periodic upiink grants indicating upiink resources to use for upiink transmissions to the wireiess communications network, and receive a dynamic upiink grant for an upiink transmission to the wireiess communications network. The processing circuitry is further configured to prioritize upiink transmission using the configured periodic upiink grant over upiink transmission usina the dynamic upiink grant, on the condition that there is upiink data to be transmitted on the configured periodic upiink grant, according to a logical channel prioriiization procedure. Again, ail of the variations described above for the methods that correspond to this wireiess device embodiment may apply to this example wireiess device, in various embodiments, and embodiments of this wireiess device may be configured to carry out additions! techniques described herein.
[1905] Other examples indude a first device configured to assist enroilment of a second device to an Internet of Things (IoT) environment, the first device comprising transceiver circuitry configured to communicate with the second device and processing circuitry operatively coupled to the transceiver circuitry and configured to control the transceiver circuitry. The processing circuitry is configured to obtain a représentation of an enroilment fonction associated with the second device, where the enroilment fonction is associated with at least one serialized enroilment application comprising enroilment information associated with the first and second device, deserialize the enroilment application such that enroilment information associated with the first device is separated from enroilment information associated with the second device, and transmit the enroilment information associated with the second device to the second device for initiating execution by the second device of the enroilment process of the second device by configuring the second device based on the enroilment information associated with the second device. The processing circuitry is further configured to receive, from the second device, configuration information associated with the second device, use a first runtime environment executing on the first device to transfer a code module to a second runtime environment executing on the second device, wherein the code module is configured to execute within the second runtime environment and expose a fonction of the second device, supported by the second runtime environment to the first device, and execute an application within the first runtime environment, the application remotely invoking the fonction of the second device via the transferred code module and the second runtime environment. Once more, ail of the variations described above for the methods that correspond to this wireiess device embodiment may apply to this example wireiess
346 device, in various embodiments, and embodiments of this wireiess device may be configured to carry out additional techniques described herein
[1906] Yet another example is a corresponding second device configured to execute an enroilment process to an loT environment assisted by a first device, the second device comprising transceiver circuitry configured to communicate with the first device and processing circuitry operatively coupled to the transceiver circuitry and configured to control the transceiver circuitry. The processing circuitry in this second device is configured to receive, from the first device, enrollment information associated with the second device, execute the enrollment process by configuring the second device based on the enrollment information, and transmit configuration information associated with the second device to the first device, The processing circuitry is further configured to receive a code module from a first runtime environment executing on the first device, to a second runtime environment executing on the second device, to expose a function of the second device supported by the second runtime environment to the first device, and use the second runtime environment to control performance of the function of the second device responsive to a remote invocation of the fonction received via the code module from an application executing within the first runtime environment. Yet again, ail of the variations described above for the methods that correspond to this wireiess device embodiment may apply to this example wireless device, in various embodiments, and embodiments of this wireless device may be configured to carry out additional techniques described herein
[1907] Network equipment and methods
[1908] As used herein, the term “network equipment” or “network node” refers to equipment capable, configured, arranged and/or opérable to communicate directiy or indirectly with a wireless device and/or with other equipment in the wireless communication network that enable and/or provide wireless access to the wireless device. Examples of network equipment include, but are not limited to, access points (APs), in particular radio access points, Network equipment may represent base stations (BSs), such as radio base stations, Particular examples of radio base stations include Node Bs, and evolved Node Bs (eNBs). Base stations may be categorized based on the amount of coverage they provide (or, stated differentiy, their transmit power levels) and may then âlso be referred to as femto base stations, pico base stations, micro base stations, or macro base stations, “Network equipment” also includes one or more (or ali) parts of a distributed radio base station such as centralized digital units and/or remote radio units (RRUs), sometimes referred to as Remote Radio Heads (RRHs). Such remote radio units may or may not be integrated with an antenna as an antenna integrated radio.
347
Parts of a distributed radio base stations may also be referred to as nodes in a distributed antenna System (DAS).
[1909] As a particuiar non-limiting example, a base station may be a reiay node or a reiay donor node controlling a reiay.
[1910] Yet further examples of network equipment include multi-standard radio (MSR) radio equipment such as MSR BSs, network controllers such as radio network controllers (RNCs) or base station controllers (BSÇs), base transceiver stations (BTSs), transmission points, transmission nodes, Multi-cell/muiticast Coordination Entities (MCEs), core network nodes (e.g., MSCs, MMEs), O&M nodes, OSS nodes, SON nodes, positioning nodes (e.g., E-SMLCs), and/or MDTs. More generaîly, however, network equipment may represent any suitable device (or group of devices) capable, configured, arranged, and/or opérable to enable and/or provide a wireless device access to the wireless communication network or to provide some service to a wireless device that has accessed the wireless communication network.
[1911] As used herein, the term “radio network equipment” is used to refer to network equipment that includes radio çapabilities, Thus, e.xamples of radio network equipment are the radio base stations and radio access points discussed above. it will be appreciated that some radio network equipment may comprise equipment that is distributed - such as the distributed radio base stations (with RRHs and/or RRUs) discussed above. It will be appreciated that the various référencés herein to eNBs, eNodeBs, Node Bs, and the like are referring to examples of radio network equipment. It should also be understood that the term “radio network equipment” as used herein may refer to a single base station or a single radio node, in some cases, or to multiple base stations or nodes, e.g., at different locations. In some cases, this document may refer to an “instance” of radio network equipment, to more cleariy describe certain scénarios where multiple distinct embodiments or installations of radio equipment are involved. However, the lack of reference to an “instance” in connection with a discussion of radio network equipment should not be understood to mean that only a single instance is being referred to. A given instance of radio network equipment may altemativeiy be referred to as a “radio network node,” where the use of the word “node” dénotés that the equipment referred to operate as a logîcal node in a network, but does not împîy that ail components are necessarily co-located.
[1912] While radio network equipment may include any suitable combination of hardware and/or software, an example of an instance of radio network equipment 1100 is illustrated in greater detail by Figure 167. As shown in Figure 167, example radio network equipment 1100 includes an antenna 1105, radio front-end circuitry 1110, and processing
348 circuitry 1120, which in the illustrated example includes a computer-readable storage medium 1025, e.g., one or more memory devices. Antenna 1105 may include one or more antennas or antenna arrays and is configured to send and/or receive wireless signais, and is connected to radio front-end circuitry 1110. In certain alternative embodiments, radio network equipment 1100 may not include antenna 1005, and antenna 1005 may instead be separate from radio network equipment 1100 and be connectable to radio network equipment 1100 through an interface or port. In some embodiments, ali or parts of radio front-end circuitry 1110 may be located at one or several locations apart from the processing circuitry 1120, e.g., in a RRH or RRU. Likewise, portions of processing circuitry 1120 may be physically separated from one another. Radio network equipment 1100 may also include communication interface circuitry 1140 for communîcating with other network nodes, e.g., with other radio network equipment and with nodes in a core network.
[1913] Radio front-end circuitry 1110, which may comprise various fiiters and amplifiers, for example, is connected to antenna 1105 and processing circuitry 1120 and is configured to condition signais communicated between antenna 1105 and processing circuitry 1120. In certain alternative embodiments, radio network equipment 1100 may not include radio front-end circuitry 1110, and processing circuitry 1120 may instead be connected to antenna 1105 without radîo front-end circuitry 1110, In some embodiments, radio-frequency circuitry 1110 is configured to handle signais in multiple frequency bands, in some cases simuitaneously.
[1914] Processing circuitry 1120 may include one or more of RF transceiver circuitry 1121, baseband processing circuitry 1122, and application processing circuitry 1123. In some embodiments, the RF transceiver circuitry 1121, baseband processing circuitry 1122, and application processing circuitry 1123 may be on separate chipsets. In alternative embodiments, part or ail of the baseband processing circuitry 1122 and application processing circuitry 1123 may be combined into one chipset, and the RF transceiver circuitry 1121 may be on a separate chipset, in still alternative embodiments, part or ail of the RF transceiver circuitry 1121 and baseband processing circuitry 1122 may be on the same chipset, and the application processing circuitry 1123 may be on a separate chipset. In yet other alternative embodiments, part or ail of the RF transceiver circuitry 1121, baseband processing circuitry 1122, and application processing circuitry 1123 may be combined in the same chipset. Processing circuitry 1120 may include, for example, one or more central CPUs, one or more microprocessors, one or more ASICs, and/or one or more field FPGAs.
349
[1915] !n particular embodiments, some or ail of the functionality described herein as being relevant to radio network equipment, radio base stations, eNBs, gNBs, etc., may be ëmbodied in radio network equipment or, as an alternative may be embodied by the processing circuitry 1120 executing instructions stored on a computer-readabie storage medium 1125, as shown in Figure 183. In alternative embodiments, some or al! of the functionality may be provided by the processing circuitry 1120 without executing instructions stored on a computer-readabie medium, such as in a hard-wired manner. In any of those particular embodiments, whether executing instructions stored on a computer-readabie storage medium or not, the processing circuitry can be said to be configured to perform the described functionality, The benefits provided by such functionality are not iimited to the processing circuitry 1120 alone or to other components of the radio network equipment, but are enjoyed by the radio network equipment 1100 as a whole, and/or by end users and the wireless network generally.
[1916] The processing circuitry 1120 may bs configured to perform any determining 15 operations described herein. Determining as performed by processing circuitry 1120 may include processing information obtained by the processing circuitry 1120 by, for example, converting the obtained information into other information, comparing the obtained information or converted information to information stored in the radio network equipment, and/or performing one or more operations based on the obtained information or converted information, and as a resuit of said processing making a détermination.
[1917] Antenna 1105, radio front-end circuitry 1110, and/or processing circuitry 1120 may be configured to perform any transmitting operations described herein. Any information, data and/or signais may be transmitted to any network equipment and/or a wireless device. Likewise, antenna 1105, radio front-end circuitry 1110, and/or processing 25 circuitry 1120 may be configured to perform any receiving operations described herein as being performed by a radio network equipment. Any information, data and/or signais may be received from any network equipment and/or a wireless device.
[1918] Computer-readabie storage medium 1125 is generally opérable to store instructions, such as a computer program, software, an application including one or more 30 of logic, rules, code, tables, etc. and/or other instructions capable of being executed by a processor. Examples of computer-readabie storage medium 1125 include computer memory (for example, RAM or ROM), mass storage media (for example, a hard disk), removable storage media (for example, a CD or a DVD), and/or any other volatile or nonvolatile, non-transitory computer-readabie and/or computer-executable memory devices 35 that store information, data, and/or instructions that may be used by processing circuitry
350
1120. In some embodiments, processing circuitry 1120 and computer-readable storage medium 1125 may be considered to be întegrated.
[1919] Alternative embodiments of the radio network equipment 1100 may include additional components beyond those shown in Figure 167 that may be responsable for providing certain aspects of the radio network equipment1 s functionality, including any of the functionality described herein and/or any functionality necessary to support the solution described above. As just one exampie, radio network equipment 1100 may include input interfaces, devices and circuits, and output interfaces, devices and circuits. In put interfaces, devices, and circuits are configured to allow input of information into radio network equipment 1100, and are connected to processing circuitry 1120 to allow processing circuitry 1120 to process the input information. For example, input interfaces, devices, and circuits may include a microphone, a proximity or other sensor, keys/buttons, a touch display, one or more caméras, a USB port, or other input éléments. Output interfaces, devices, and circuits are configured to allow output of information from radio network equipment 1100, and are connected to processing circuitry 1120 to allow Processing circuitry 1120 to output information from radio network equipment 1100. For exampie, output interfaces, devices, or circuits may include a speaker, a display, a USB port, a headphone interface, or other output éléments. Using one or more input and output interfaces, devices, and circuits, radio network equipment 1100 may communicate with end users and/or the wireiess network, and allow them to benefit from the functionality described herein.
[1920] As another exampie, radio network equipment 1100 may include power supply circuitry 1130. The power supply circuitry 1130 may comprise power management circuitry. The power supply circuitry 1130 may receive power from a power source, which may either be comprised in, or be externat to, power supply circuitry 1130. For example, radio network equipment 1100 may comprise a power source in the form of a battery or battery pack which is connected to, or întegrated in, power supply circuitry 1130. Other types of power sources, such as photovoltaic devices, may also be used. As a further example, radio network equipment 1100 may be connectable to an external power source (such as an electricity outlet) via an input circuitry or interface such as an electrical cable, whereby the external power source supplies power to power supply circuitry 1130.
[1921] Power supply circuitry 1130 may be connected to radio front-end circuitry 1110, processing circuitry 1120, and/or computer-readable storage medium 1125 and be configured to supply radio network equipment 1100, including processing circuitry 1120, with power for performing the functionality described herein.
351
[1922] Radio network equipment 1100 may also include multiple sets of processing circuitry 1120, computer-readable storage medium 1125, radio circuitry 1110, antenna 1105 and/or communication interface circuitry 1140 for different wireless technologies integrated into radio network equipment 1100, such as, for example, GSM, WCDMA, LTE, NR, WiFi, or Bluetooth wireless technologies. These wireless technologies may be integrated into the same or different chipsets and other components within radio network equipment 1100.
[1923] One or more instances of the radio network equipment 1100 may be adapted to carry out some or ali of the techniques described herein, in any of various combinations, including the methods and techniques described herein as carried out by a radio base station, a gNB, or the like. It will be appreciated that in a given network implémentation, multiple instances of radio network equipment 1100 will be in use. In some cases, several instances of radio network equipment 1100 at a time may be communicating with or transmitting signais to a given wireless device or group of wireless devices. Thus, it should be understood that while many of the techniques described herein may be carried out by a single instance of radio network equipment 1100, these techniques may be understood as carried out by a system of one or more instances of radio network equipment 1100, in some cases in a coordinated fashion. The radio network equipment 1100 shown in Figure 167 is thus the simplest example of this system,
[1924] Others of the network equipment or network nodes described herein are not radio network equipment, in that they lack radio transceivers for communicating with one or more wireless devices, but are instead configured to commun icate with one or more other network nodes in the communication system, typically via standardized interfaces. These other network nodes may be understood as comprising many of the same features shown in the example radio network equipment 1100 illustrated in Figure 167, but without the radio features. One or a combination of these other network nodes may be configured to carry out many of the methods and techniques described herein, e.g., with appropriate program code stored sn a computer-readable medium, for execution by processing circuitry.
[1925] Network nodes like those described above may be configured to carry out one or several of ihe methods described herein. In one non-iimiting example, a network node configured for use in a core network associated with a RAN, for handling a timesensitive data stream associated with a user equipment UE and an external network, comprises communication interface circuitry configured to communicate with one or more other network nodes and processing circuitry operatively coupled to the communication
352 interface circuitry. The processing circuitry is configured to receive, from the external network, a transmission schedule associated with a time-sensitive data stream, send, to the RAN, a request to ailocate radio resources for communication of the data stream between the RAN and a first UE, wherein the request further comprises information related te the transmission schedule, and receive, from the RAN, a response indicating whether radio resources can be aîîocated to meetthe transmission schedule associated with the data stream. The processing circuitry is further configured to obtain configuration information for the data stream, the configuration information indicating respective values for one or more fields within a header of data packets associated with the data stream which are to remain static, initiale transmission of the configuration information to the first UE, receive a data packet associated with the data stream from the external data network, remove the one or more fields from the data packet to generale a compressed data packet, and initiale transmission of the compressed data packet to the first UE. Al! of the variations described above for the methods that correspond to this network node embodiment may apply to this example network node, in varions embodiments, and embodiments of this network node may be configured to carry out additional techniques described herein.
[19261 Any appropriate steps, methods, features, functions, or benefits disclosed herein may be performed through one or more functional units or modules of one or more virtual apparatuses, Each virtual apparatus may comprise a number of these functional units. These functional units may be impîemented via processing circuitry, which may include one or more microprocessor or microcontrollers, as we!l as other digital hardware, which may include Digital Signal Processor (DSPs), special-purpose digital logic, and the
Iike. The processing circuitry may be configured to execute program code stored in memory, which may include one or severai types of memory such as Read Only Memory (ROM), Random Access Memory (RAM), cache memory, flash memory devices, optical storage devices, etc. Program code stored in memory includes program instructions for executing one or more télécommunications and/or data communications protocols as we!î as instructions for carrying out one or rnore of the techniques described herein. In some implémentations, the processing circuitry may be used to cause the respective functional unit to perform corresponding functions according one or more embodiments of the présent disclosure.
353
[1927] Application of the Presently Disclosed Techniques to a Network Comprising a Host Computer
[1928] in the detaiïed discussion and examples provided above, several techniques hâve been described with respect to operations carried out in a wireless device, a radio access network, or a wireless télécommunications core network node, for exampie. It will be appreciated, however, that these techniques may be understood as being carried out in a broader context of a communication System that encompasses, but is not limited to, these wireless network components. This communication System may thus further comprise fixed (wired) networks, application servers, server tarons, user computers accessing services related to a wireless network, etc. Likewise, the techniques described herein may encompass or be utilized by services and/or applications that transcend the wireless network itseïf. Consequently, the advantages described herein for many of the disclosed techniques, such as improved latency, reliability, security, etc., may accrue to these services and/or applications.
[1929] Figure 223, according to some embodiments, illustrâtes a communication System that inciudes a télécommunication network 610, such as a 3GPP4ype cellular network, which comprises an access network 611, such as a radio access network, and a core network 614. The access network 611 comprises a piurality of base stations 86a, 612b, 612c, such as NBs, eNBs, gNBs or other types of wireless access points, each defining a corresponding coverage area 613a, 613b, 613c. Each base station 612a, 612b, 612c is connectable to the core network 614 over a wired or wireless connection 615. A first user equipment (UE) 691 located in coverage area 613c is configured to wirelessly connect to, or be paged by, the corresponding base station 66c. A second UE 692 tn coverage area 613a is wirelessly connectable to the corresponding base station 612a. While a plurality of UEs 691,692 are illustrated in this example, the disclosed embodiments are equally applicable to a situation where a sole UE is in the coverage area or where a sole UE is connecting to the corresponding base station 612.
[1930] The télécommunication network 610 is itself connected to a host computer 630, which may be embodied in the hardware and/or software of a standalone server, a cloud-implemented server, a distributed server or as processing resources in a server farm. The host computer 630 may be under the ownership or control of a service pro vider, or may be operated by the service provider or on behaff of the service provider. The connections 621,622 between the télécommunication network 610 and the host computer 630 may extend directiy from the core network 614 to the host computer 630 or may go via an optional intermediate network 620. The intermediate network 620 may be one of, or a combination of more than one of, a public, private or hosted network; the
354 intermediate network 620, if any, may be a backbone network or the Internet; in particular, the intermediate network 620 may comprise two or more sub-networks (not shown).
[1931] The communication System of Figure 223 as a whoie enables connectivity between one of the connected UEs 691, 692 and the host computer 630. The connectivity may be described as an over-the-top (OTT) connection 650. The host computer 630 and the connected UEs 691, 692 are confîgured to communicate data and/or signaling via the OTT connection 650, using the access network 611, the core network 614, any intermediate network 620 and possible further infrastructure (not shown) as intermediaries. The OTT connection 650 may be transparent in the sense that the participating communication devices through which the OTT connection 650 passes are unaware of routing of uplink and downiink communications. For example, a base station 612 may not or need not be informed about the past routing of an incoming downlink communication with data originating from a host computer 630 to be forwarded (e.g., handed over) to a connected UE 691. Similarly, the base station 612 need not be aware of the future routing of an outgoing uplink communication originating from the UE 691 towards the host computer 630.
[1932] Example implémentations, in accordance with an embodiment, of the UE, base station and host computer discussed in the preceding paragraphe will now be described with reference to Figure 224. In a communication system 700, a host computer 710 comprises hardware 715 including a communication interface 716 confîgured to set up and main tain a wired or wireless connection with an interface of a different communication device of the communication System 700. The host computer 710 further comprises processing circuitry 718, which may hâve storage and/or processing capables. In particular, the processing circuitry 718 may comprise one or more programmable processors, application-specific integrated circuits, field programmable gâte arrays or combinations of these (not shown) adapted to execute instructions. The host computer 710 further comprises software 711, which is stored in or accessible by the host computer 710 and exécutable by the processing circuitry 718. The software 711 includes a host application 712. The host application 712 may be opérable to provide a service to a remote user, such as a UE 730 connecting via an OTT connection 750 terminating at the UE 730 and the host computer 710. in providing the service to the remote user, the host application 712 may provide user data which is transmitted using the OTT connection 750.
[1933] The communication system 700 further inciudes a base station 720 provided in a télécommunication System and comprising hardware 725 enabling it to communicate
355 with the host computer 710 and with the UE 730. The hardware 725 may include a communication interface 726 for setting up and maintaîning a wired or wireless connection with an interface of a different communication device of the communication system 700, as well as a radio interface 727 for setting up and maintaîning at least a wireless connection 770 with a UE 730 located in a coverage area (not shown in Figure 224) served by the base station 720. The communication interface 726 may be configured to facilitate a connection 760 to the host computer 710. The connection 760 may be direct or it may pass through a core network (not shown in Figure 224) of the télécommunication System and/or through one or more intermediate networks outside the télécommunication system. In the embodiment shown, the hardware 725 of the base station 720 further includes processing circuitry 728, which may comprise one or more programmable processors, application-specific integrated circuits, field programmable gâte arrays or combinations of these (not shown) adapted to execute instructions. The base station 720 further has software 721 stored intsmally or accessible via an extemal connection.
[1934] The communication system 700 further includes the UE 730 already referred to. Its hardware 735 may include a radio interface 737 configured to set up and maintain a wireless connection 770 with a base station serving a coverage area in which the UE 730 is currently located. The hardware 735 of the UE 730 further includes processing circuitry 738, which may comprise one or more programmable processors, applicationspecific integrated circuits, field programmable gâte arrays or combinations of these (not shown) adapted to execute instructions. The UE 730 further comprises software 731, which is stored in or accessible by the UE 730 and exécutable by the processing circuitry 738. The software 731 includes a client application 732. The client application 732 may be opérable to provide a service to a human or non=human user via the UE 730, with the support of the host computer 710. In the host computer 710, an executing host application 712 may communicate with the executing client application 732 via the OTT connection 750 terminating at the UE 730 and the host computer 710. In providing the service to the user, the client application 732 may receive request data from the host application 712 and provide user data in response to the request data. The OTT connection 750 may transfer both the request data and the user data. The client application 732 may internet with the user to generate the user data that it provides.
[1935] It is noted that the host computer 710, base station 720 and UE 730 illustrated in Figure 224 may be identical to the host computer 630, one of the base stations 612a, 612b, 612c and one of the UEs 691, 692 of Figure 223, respectively. This
356 is to say, the inner workings of these entities may be as shown in Figure 224 and independently, the surrounding network topology may be that of Figure 223.
[1936] In Figure 224, the OTT connection 750 has been drawn âbstractiy to illu strate the communication between the host computer 710 and the use equipment 730 via the base station 720, without explicit reference to any intermédiare' devices and the précisé routing of messages via these devices. Network infrastructure may détermine the routing, which it may be configured to hide from the UE 730 or from the service provider operating the host computer 710, or both. While the OTT connection 750 is active, the network infrastructure may further take decisions by which it dynamically changes the routing (e.g., on the basis of ioad balancing considération or reconfiguration of the network).
[1937] The wireless connection 770 between the UE 730 and the base station 720 is in accordance with the teachings of the embodiments described throughout this disclosure, The various techniques hâve the potential to improve data rate, capacity, latency, relîability, security, and/or power consumption for the network and UE 730 using the OTT connection 750, as described above in connection with each of the described techniques, and thereby provide benefits such as reduoed user waiting time, more capacity, better responsiveness, and better device battery time.
[1938] A measurement procedure may be provided for the purpose of monitoring data rate, latency and other factors which the one or more embodiments improve. There may further be an optional network functionality for reconfiguring the OTT connection 750 between the host computer 710 and UE 730, in response to variations in the measurement results. The measurement procedure and/or the network functionality for reconfiguring the OTT connection 750 may be implemented in the software 711 of the host computer 710 or in the software 731 of the UE 730, or both. tn embodiments, sensors (not shown) may be deployed in or in association with communication devices through which the OTT connection 750 passes; the sensors may participate in the measurement procedure by supplying values of the monitored quantifies exemplified above, or supplying values of other physical quantifies from which software 711,731 may compute or estimate the monitored quantifies. The reconfiguring of the OTT connection 750 may include message format, retransmission settings, preferred routing etc.; the reconfiguring need not affect the base station 720, and it may be unknown or imperceptible to the base station 720. Such procedures and functionaiities may be known and practiced in the art. In certain embodiments, measurements may involve proprietary UE signaling facilitating the host computer’s 710 measurements of throughput, propagation times, latency and the like. The measurements may be implemented in that
357 the software 711,731 causes messages to be transmitted, in particuiar empty or 'dummy1 messages, using the OTT connection 750 while it monitors propagation times, errors etc. [1939] Figure 226 is a fiowchart illustrating a method implemented in a communication System, in accordance with one embodiment. The communication system includes a host computer, a base station and a UE which may be those described with reference to Figures 229 and 230. For simplicity of the présent disclosure, only drawing référencés to Figure 226 will be included in this section. In a first step 810 of the method, the host computer provides user data. In an optiona! substep 811 of the first step 810, the host computer provides the user data by executing a host application. In a second step 820, the host computer initiâtes a transmission carrying the user data to the UE. în an optional third step 830, the base station transmits to the UE the user data which was carried in the transmission that the host computer initiated, in accordance with the teachings of the embodiments described throughout this disclosure. In an optional fourih step 840, the UE executes a client application associated with the host application executed by the host computer.
[1940] Figure 226 is a flowchart illustrating a method implemented in a communication system, in accordance with one embodiment. The communication system includes a host computer, a base station and a UE which may be those described with reference to Figures 223 and 224. For simplicity of the présent disclosure, only drawing référencés to Figure 226 will be included in this section. In a first step 910 of the method, the host computer provides user data. In an optional substep (not shown) the host computer provides the user data by executing a host application. In a second step 920, the host computer initiâtes a transmission carrying the user data to the UE. The transmission may pass via the base station, in accordance with the teachings of the embodiments described throughout this disclosure. In an optional third step 830, the UE receives the user data carried in the transmission.
[1941] Figure 227 is a flowchart illustrating a method implemented in a communication system, in accordance with one embodiment. The communication system includes a host computer, a base station and a UE which may be those described with reference to Figures 223 and 224. For simplicity of the présent disclosure, only drawing référencés to Figure 227 will be included in this section. In an optional first step 1010 of the method, the UE receives input data provided by the host computer. Additionally, or alternative^, în an optional second step 1020, the UE provides user data. In an optional substep 1021 of the second step 1020, the UE provîdes the user data by executing a client application. In a further optional substep 1011 of the first step 1010, the UE executes a client application which provides the user data in reaction to the received
358 input data provided by the host computer, In providing the user data, the executed ciient application may further consider user input received from the user. Regardless of the spécifie manner in which the user data was provided, the UE initiâtes, in an options! third substep 1030, transmission of the user data to the host computer. In a fourth step 1040 of the method, the host computer receives the user data transmitted from the UE, in accordance with the teachings of the embodiments described throughout this disclosure. [1942] Figure 228 is a flowchart iliustrating a method implemented in a communication System, in accordance with one embodiment. The communication System includes a host computer, a base station and a UE which may be those described with reference to Figures 223 and 224. For simplicity of the présent disclosure, only drawing référencés to Figure 228 will be included in this section. In an optional first step 1110 of the method, in accordance with the teachings of the embodiments described throughout this disclosure, the base station receives user data from the UE. In an optional second step 1120, the base station initiâtes transmission of the received user data to the host computer. In a third step 1130, the host computer receives the user data carried in the transmission initiated by the base station.
[1943] It will be appreciated that the methods illustrated in Figures 231 and 234 can be combined with any of the various other methods described herein and involving the same or overlapping devices or nodes.
[1944] Many variations and modifications can be made to the embodiments without substantially departing from the principles of the présent inventive concepts. AH such variations and modifications are intended to be included herein within the scope of présent inventive concepts. Accordingly, the above disclosed subject matter is to be considered illustrative, and not restrictive, and the exemptes of embodiments are intended to cover aîl such modifications, enhancements, and other embodiments, which fall within the spirit and scope of présent inventive concepts. Thus, to the maximum extent allowed by law, the scope of présent inventive concepts is to be determined by the broadest permissible interprétation of the présent disclosure including the examples of embodiments and their équivalents, and shall not be restricted or limited by the foregoing detailed description.

Claims (13)

1. A method performed by a wireless device associated with a wireless communications network, the method comprising:
receiving, from a radio base station, RBS, of the wireless communications network, system information, SL or a Radio Resource Control, RRC, message, wherein the SI or RRC message is indicative of support of at least one time-sensitive networking, TSN, feature through the RBS;
receiving a first timing signal from the wireless communications network, wherein the first timing signal comprises a time reference for a system clock internai to the wireless communications network;
receiving a second timing signal from an external TSN data network to which the wireless device is connected, wherein the second timing signal comprises a working clock time reference; and establishing, depending on the received SI or RRC message, at least one TSN stream with the external TSN data network, through the RBS.
2. The method of claim 1, wherein said receiving SI or a RRC message comprises receiving SI indicative of support of the at least one feature for TSN through the RBS.
3. The method of claim 2, wherein the SI is comprised in one or more system information blocks, SIBs.
4. The method of any of claims 1-3, wherein the first timing signai is received in S! received from the RBS.
5. The method of claim 1, wherein said receiving SI or a RRC message comprises receiving an RRC message indicative of support of the at least one feature for TSN through the RBS.
6. The method of claim 5, wherein the first timing signal is received in the RRC message.
7. The method of any of claims 1-6, wherein the wireless communications network is a cellular communications network, such es a New Radie wireless communications network.
8, A wireless device for use in a wireless communications network, the wireless device being adapted to:
receive, from a radio base station, RBS, of the wireless communications network, system information, SI, or a Radio Resource Control, RRC, message, wherein
360 the SI or RRC message is indicative of support of at least one time-sensitive networking, TSN, feature through the RBS;
receive a first timing signal from the wireless communications network, wherein the first timing signal comprises a time reference for a System dock internai to the wireless communications network;
receive a second timing signal from an external TSN data network to which the wireless device is connected, wherein the second timing signal comprises a working dock time reference; and establish, depending on the received SI or RRC message, at least one TSN stream with the external TSN data network, through the RBS.
9. The wireless device of daim 8, wherein the wireless device isadapted to receive SI indicative of support of the at least one feature for TSN through the RBS.
10. The wireless device of daim 8 or 9, wherein the wireless device is adapted to receive the first timing signal in S! received from the RBS.
11. The wireless device of daim 8, wherein the wireless device is adapted to receive an RRC message indicative of support of the at ieast one feature for TSN through the RBS
12. A computer program product comprising program instructions for execution by a wireless device, the program instructions being configured to cause the wireless device to carry out the method of any of daims 1-7.
13. A non-iransitory computer-readable medium comprising, stored thereupon, the computer program product of daim 12.
OA1202100296A 2019-02-13 2020-02-11 Wireless time-sensitive networking OA20434A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
OA1202100296A OA20434A (en) 2019-02-13 2020-02-11 Wireless time-sensitive networking

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US16/274,800 2019-02-13
OA1202100296A OA20434A (en) 2019-02-13 2020-02-11 Wireless time-sensitive networking

Publications (1)

Publication Number Publication Date
OA20434A true OA20434A (en) 2022-08-08

Family

ID=92300449

Family Applications (1)

Application Number Title Priority Date Filing Date
OA1202100296A OA20434A (en) 2019-02-13 2020-02-11 Wireless time-sensitive networking

Country Status (1)

Country Link
OA (1) OA20434A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024157228A1 (en) * 2023-01-27 2024-08-02 Jio Platforms Limited System and method for application specific scheduling in wireless networks

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024157228A1 (en) * 2023-01-27 2024-08-02 Jio Platforms Limited System and method for application specific scheduling in wireless networks

Similar Documents

Publication Publication Date Title
EP4109937B1 (en) Wireless time-sensitive networking
Ahmadi 5G NR: Architecture, technology, implementation, and operation of 3GPP new radio standards
TWI825148B (en) Signaling timing information for a time sensitive network in a wireless communications system
Ghosh et al. 5G evolution: A view on 5G cellular technology beyond 3GPP release 15
LEI. et al. 5G system design
JP7314140B2 (en) Time synchronization for wireless communication
RU2693848C1 (en) Network architecture, methods and devices for a wireless communication network
KR20230078676A (en) Establishing a secure communication link for relaying between UEs
CN105940741B (en) The method and node that system information during being related to flexible sub-frame operation obtains
US11019157B2 (en) Connectionless service and other services for devices using microservices in 5G or other next generation communication systems
TW202005454A (en) Supporting scheduling plan indications
CN115413413A (en) Relay sidelink communication for secure link establishment
JP2021514146A (en) Downlink transmission beam configuration technique for wireless communication
EA036666B1 (en) Multiplexing of subframes with different subcarrier spacings
JP2020529156A (en) Derivation of security key for handover
OA20434A (en) Wireless time-sensitive networking
US11641630B2 (en) Time-sensitive networking support over sidelink
WO2022067858A1 (en) Reporting channel state information for multi-trp operation
WO2022067859A1 (en) Receiving channel state information from a ue for multi-trp operation
JP2024534298A (en) Determining HARQ Process ID for Higher Carrier Frequencies
WO2024167589A1 (en) Cell discontinuous transmission (dtx)-discontinuous reception (drx) mechanism