WO2019030429A1 - Network slice-specific access barring for wireless networks - Google Patents
Network slice-specific access barring for wireless networks Download PDFInfo
- Publication number
- WO2019030429A1 WO2019030429A1 PCT/FI2018/050570 FI2018050570W WO2019030429A1 WO 2019030429 A1 WO2019030429 A1 WO 2019030429A1 FI 2018050570 W FI2018050570 W FI 2018050570W WO 2019030429 A1 WO2019030429 A1 WO 2019030429A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- access
- barring
- network
- slice
- user device
- Prior art date
Links
- 238000000034 method Methods 0.000 claims abstract description 58
- 238000004590 computer program Methods 0.000 claims description 17
- 238000012545 processing Methods 0.000 claims description 13
- 230000001960 triggered effect Effects 0.000 claims description 6
- 238000012913 prioritisation Methods 0.000 claims description 3
- 238000004891 communication Methods 0.000 description 17
- 238000010586 diagram Methods 0.000 description 16
- 230000006870 function Effects 0.000 description 13
- 238000005516 engineering process Methods 0.000 description 8
- 238000007726 management method Methods 0.000 description 7
- 238000001228 spectrum Methods 0.000 description 6
- 230000005540 biological transmission Effects 0.000 description 4
- 239000000969 carrier Substances 0.000 description 4
- 230000008859 change Effects 0.000 description 4
- 230000003247 decreasing effect Effects 0.000 description 3
- 230000011664 signaling Effects 0.000 description 3
- 101100240462 Homo sapiens RASAL2 gene Proteins 0.000 description 2
- 102100035410 Ras GTPase-activating protein nGAP Human genes 0.000 description 2
- 230000010267 cellular communication Effects 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 230000018109 developmental process Effects 0.000 description 2
- 230000004069 differentiation Effects 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 238000010295 mobile communication Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 241001465754 Metazoa Species 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 230000000644 propagated effect Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 230000001953 sensory effect Effects 0.000 description 1
- 230000008054 signal transmission Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 230000007704 transition Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/02—Access restriction performed under specific conditions
- H04W48/06—Access restriction performed under specific conditions based on traffic conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/02—Access restriction performed under specific conditions
- H04W48/04—Access restriction performed under specific conditions based on user or terminal location or mobility data, e.g. moving direction, speed
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/08—Access restriction or access information delivery, e.g. discovery data delivery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/16—Discovering, processing access restriction or access information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/20—Manipulation of established connections
- H04W76/27—Transitions between radio resource control [RRC] states
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/18—Selecting a network or a communication service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
Definitions
- a communication system may be a facility that enables communication between two or more nodes or devices, such as fixed or mobile communication devices. Signals can be carried on wired or wireless carriers.
- LTE Long-term evolution
- UMTS Universal Mobile Telecommunications System
- E-UTRA evolved UMTS Terrestrial Radio Access
- LTE base stations or access points (APs), which are referred to as enhanced Node AP (eNBs)
- APs base stations or access points
- eNBs enhanced Node AP
- UE user equipments
- LTE has included a number of improvements or developments.
- mmWave or extremely high frequency
- GHz gigahertz
- Radio waves in this band may, for example, have wavelengths from ten to one millimeters, giving it the name millimeter band or millimeter wave.
- the amount of wireless data will likely significantly increase in the coming years.
- Various techniques have been used in attempt to address this challenge including obtaining more spectrum, having smaller cell sizes, and using improved technologies enabling more bits/s/Hz.
- One element that may be used to obtain more spectrum is to move to higher frequencies, e.g., above 6 GHz.
- 5G wireless networks may support network slicing, wherein a single physical network may be sliced into multiple virtual networks. Each network slice may include a set of logical network functions that may support the requirements of a particular use case.
- a method includes: detecting, by a user device, a network slice associated with an access attempt by the user device to access a wireless network; and, making, by the user device, a barring decision for the access attempt based on the network slice associated with the access attempt.
- an apparatus includes at least one processor and at least one memory including computer instructions that, when executed by the at least one processor, cause the apparatus to: detect, by a user device, a network slice associated with an access attempt by the user device to access a wireless network; and, make, by the user device, a barring decision for the access attempt based on the network slice associated with the access attempt.
- a computer program product includes a computer- readable storage medium and storing executable code that, when executed by at least one data processing apparatus, is configured to cause the at least one data processing apparatus to perform a method including: detecting, by a user device, a network slice associated with an access attempt by the user device to access a wireless network; and, making, by the user device, a barring decision for the access attempt based on the network slice associated with the access attempt.
- a method includes: receiving, by a base station from one or more core network entities within a wireless network, network slice-specific load information that indicates a load for each of one or more network slices; determining, by the base station based on the received network slice-specific load information, a barring configuration that indicates a set of barring parameters for one or more access categories; and sending, by the base station to a user device, the barring configuration to reduce a load on the wireless network.
- an apparatus includes at least one processor and at least one memory including computer instructions that, when executed by the at least one processor, cause the apparatus to: receive, by a base station from one or more core network entities within a wireless network, network slice-specific load information that indicates a load for each of one or more network slices; determine, by the base station based on the received network slice-specific load information, a barring configuration that indicates a set of barring parameters for one or more access categories; and send, by the base station to a user device, the barring configuration to reduce a load on the wireless network.
- a computer program product includes a computer- readable storage medium and storing executable code that, when executed by at least one data processing apparatus, is configured to cause the at least one data processing apparatus to perform a method including: receiving, by a base station from one or more core network entities within a wireless network, network slice-specific load information that indicates a load for each of one or more network slices; determining, by the base station based on the received network slice-specific load information, a barring configuration that indicates a set of barring parameters for one or more access categories; and sending, by the base station to a user device, the barring configuration to reduce a load on the wireless network.
- a method includes: determining, by a core network entity, network slice-specific load information that indicates a load for each of one or more network slices; and sending, by the core network entity to a base station, the network-slice specific load information.
- an apparatus includes at least one processor and at least one memory including computer instructions that, when executed by the at least one processor, cause the apparatus to: determine, by a core network entity, network slice-specific load information that indicates a load for each of one or more network slices; and send, by the core network entity to a base station, the network-slice specific load information.
- a computer program product includes a computer- readable storage medium and storing executable code that, when executed by at least one data processing apparatus, is configured to cause the at least one data processing apparatus to perform a method including: determining, by a core network entity, network slice-specific load information that indicates a load for each of one or more network slices; and sending, by the core network entity to a base station, the network-slice specific load information.
- FIG. 1 is a block diagram of a wireless network according to an example implementation.
- FIG. 2 is a diagram illustrating a network-specific access barring technique according to an example implementation.
- FIG. 3 is a flow chart illustrating operation of a user device according to an example implementation.
- FIG. 4 is a flow chart illustrating operation of a base station according to an example implementation.
- FIG. 5 is a flow chart illustrating operation of a core network entity according to an example implementation.
- FIG. 6 is a diagram illustrating a network according to an example implementation.
- FIG. 7 is a diagram illustrating an overall procedure for access barring for the access attempts caused by an upper layer according to an example implementation.
- FIG. 8 is a diagram illustrating an overall procedure for access barring for access attempts triggered by the RRC layer according to an example implementation.
- FIG. 9 is a diagram illustrating a procedure for a RAN node to set barring configuration to be broadcasted according to an example implementation.
- FIG. 10 diagram illustrating a network-specific access barring technique according to another example implementation.
- FIG. 1 1 is a block diagram of a node or wireless station (e.g., base station/access point, relay node, or mobile station/user device) according to an example implementation.
- a node or wireless station e.g., base station/access point, relay node, or mobile station/user device
- FIG. 1 is a block diagram of a wireless network 130 according to an example implementation.
- user devices 131 , 132, 133 and 135, which may also be referred to as mobile stations (MSs) or user equipment (UEs) may be connected (and in communication) with a base station (BS) 134, which may also be referred to as an access point (AP), an enhanced Node B (eNB), a gNB (which may be a 5G base station) or a network node.
- BS base station
- AP access point
- eNB enhanced Node B
- gNB which may be a 5G base station
- BS access point
- BS base station
- eNB Node B
- BS 134 provides wireless coverage within a cell 136, including to user devices 131 , 132, 133 and 135. Although only four user devices are shown as being connected or attached to BS 134, any number of user devices may be provided.
- BS 134 is also connected to a core network 150 via an interface 151. This is merely one simple example of a wireless network, and others may be used.
- a user device may refer to a portable computing device that includes wireless mobile communication devices operating with or without a subscriber identification module (SIM), including, but not limited to, the following types of devices: a mobile station (MS), a mobile phone, a cell phone, a smartphone, a personal digital assistant (PDA), a handset, a device using a wireless modem (alarm or measurement device, etc.), a laptop and/or touch screen computer, a tablet, a phablet, a game console, a notebook, and a multimedia device, as examples.
- SIM subscriber identification module
- MS mobile station
- PDA personal digital assistant
- a handset a device using a wireless modem (alarm or measurement device, etc.)
- laptop and/or touch screen computer a tablet, a phablet, a game console, a notebook, and a multimedia device, as examples.
- a user device may also be a nearly exclusive uplink only device, of which an example is a camera or video camera loading images or video clips to a
- core network 150 may be referred to as Evolved Packet Core (EPC), which may include a mobility management entity (MME) which may handle or assist with mobility/handover of user devices between BSs, one or more gateways that may forward data and control signals between the BSs and packet data networks or the Internet, and other control functions or blocks.
- EPC Evolved Packet Core
- MME mobility management entity
- gateways may forward data and control signals between the BSs and packet data networks or the Internet, and other control functions or blocks.
- the various example implementations may be applied to a wide variety of wireless technologies, wireless networks, such as LTE, LTE-A, 5G (New Radio, or NR), cmWave, and/or mm Wave band networks, or any other wireless network or use case.
- LTE, 5G, cmWave and mmWave band networks are provided only as illustrative examples, and the various example implementations may be applied to any wireless technology/wireless network.
- the various example implementations may also be applied to a variety of different applications, services or use cases, such as, for example, ultra- reliability low latency communications (URLLC), Internet of Things (IoT), enhanced mobile broadband, massive machine type communications (MMTC), vehicle-to-vehicle (V2V), vehicle-to-device, etc.
- URLLC ultra- reliability low latency communications
- IoT Internet of Things
- MMTC massive machine type communications
- V2V vehicle-to-vehicle
- vehicle-to-device etc.
- 5G wireless networks may support network slicing, wherein a single physical network may be sliced into multiple virtual networks. Each network slice may include, for example, a set of logical network functions that may support the requirements of a particular use case.
- Network Slicing may allow differentiated treatment depending on requirements of different UEs or groups of UEs. With slicing (network slicing), an operator can create networks for optimized solutions based on different service requirements, QoS (quality of service), functionality, performance, etc.
- a network slice may include, for example, a portion of one or more network resources at one or more network entities, such as a portion of, e.g., one or more of computational resources, memory resources, hardware resources, software or functional resources, and/or other network resources at a BS and/or at one or more core network entities, for example, that may support a group of UEs or support a particular use case.
- network entities such as a portion of, e.g., one or more of computational resources, memory resources, hardware resources, software or functional resources, and/or other network resources at a BS and/or at one or more core network entities, for example, that may support a group of UEs or support a particular use case.
- a UE and/or group of UEs may support a network slice or may be allocated or assigned to a network slice, e.g., where a network slice identifier (or slice identifier) may identify the network slice.
- a network slice identifier or slice identifier
- different UEs e.g., different type of UEs
- each different group of UEs which may be assigned to different network slices, may have different service requirements.
- different UEs and/or each of multiple groups of UEs may be assigned to a different network slice.
- a UE may have a number of different applications and/or data flows (e.g., protocol data unit sessions) that may generate and/or receive traffic or data. Therefore, a UE may be allocated to multiple network slices, e.g., based on different types of traffic that may be transmitted to or from the UE, different applications running on a UE, or different use cases that the UE may support. Therefore, a UE may be allocated to or allowed to use a plurality of network slices.
- applications and/or data flows e.g., protocol data unit sessions
- a slice may be identified by a slice identifier, which may include one or more of the following: a slice/service type (SST); a slice/service type (SST) and slice differentiator (SD); and a single Network Slice Selection Assistance Information (S-NSSAI).
- SST may indicate a service type, such as a specific 5G wireless service type, such as ultra-reliability low latency communications (URLLC), Internet of Things (IoT), enhanced mobile broadband (eMBB), massive machine type communications (MMTC), etc.
- a network slice may be allocated to or associated with a specific service type.
- a slice differentiator may further allow a differentiation between different slices of the same type (e.g., to allow differentiation between two URLLC network slices that may be assigned to different groups of URLLC UEs, for example).
- a S-NSSAI may be another type of slice identifier.
- a S-NSSAI SST+SD (e.g., S-NSSAI may include or may be a combination of or concatenation of a SST and a SD for a slice), for example.
- each of the different wireless service types may have different requirements in terms of, e.g., latency, QoS, minimum data rates, etc.
- different wireless services/service types e.g., URLLC, IoT, eMBB, mMTC
- URLLC, IoT, eMBB, mMTC may be prioritized for service differently by a wireless network.
- each network slice may be associated with or allocated to a specific wireless service type (e.g., URLLC, IoT, eMBB, mMTC)
- a user device in order to acquire a radio connection, may typically make an access attempt towards the RAN (radio access network, which includes a BS).
- the RAN radio access network
- the access attempt by the UE may be barred or prevented by the UE.
- the UE may send, for example, a RRC (radio resource control) connection request to a BS or radio access network entity, for example, in order to register and/or establish a connection (e.g., RRC connection) to the network.
- RRC radio resource control
- a network may impose access restrictions to UEs that are in an Idle mode (e.g., RRC Idle mode), e.g., to prevent UEs from registering and/or establishing a RRC connection to the network.
- a wireless network may broadcast (e.g., via system information) a barring configuration to one or more UEs.
- the barring configuration may, for example, indicate whether access barring is being performed for one or more access classes or access categories. For example, each UE may be assigned an access class. Also, each access attempt may be assigned an access category.
- the network may broadcast a barring configuration to one or more UEs that may include information indicating that access attempts associated with one or more access categories and/or access classes, for example, may be barred, and if so, provide a set of barring parameters for these one or more of the classes and/or access categories, for example.
- a set of barring parameters may include, for example, a barring rate (or barring factor) and a barring time (or barring timer value). If access barring is performed (e.g., for an access class or access category), then the UE may generate a random number. If the number is, e.g., less than the barring rate (also known as the barring factor), then the access attempt is not barred, and the UE may access the network by sending the RRC connection request.
- a barring rate or barring factor
- barring time or barring timer value
- the access attempt is barred (at least temporarily), and the UE is not allowed to send the RRC connection request at that time, and the UE may later again re-attempt the network access after the barring timer has expired (e.g., barring timer may be initialized and begin counting down upon or around when the UE random number is determined to be greater than or equal to the barring rate, for example).
- barring timer may be initialized and begin counting down upon or around when the UE random number is determined to be greater than or equal to the barring rate, for example.
- the UE may again attempt to access the network, by generating another (a second) random number, and determining whether this second random number is less than the barring rate or barring factor.
- the network may be able to adjust a network load by adjusting one or more of the barring parameters.
- the network may adjust, e.g., increase or decrease, the number or percentage of UEs successfully accessing the network by increasing the barring rate/barring factor or decreasing the barring rate/barring factor, for example.
- network load may be adjusted by varying or adjusting the barring time (e.g., an increased barring time may reduce network load).
- access barring typically does not account for different loads and/or priorities that may be applied to or associated with different network slices (e.g., associated with different service types).
- Different network slices may have different loads. For example, a first network slice associated with or allocated to URLLC UEs may have a 90% load, a second network slice associated with IoT UEs may have a 60% load.
- it may be desirable to allow the network to decrease the overall load on the network by decreasing load for the two network slices differently (e.g., based on different sets of barring parameters).
- the network may set a barring rate for IoT UEs (of the second network slice) at a barring rate (or barring factor) of 20% (e.g., to bar or prevent, on average, 80% of the access attempts from IoT UEs), and set a barring rate for the URLLC UEs (of the first network slice) to 70% (e.g., to bar or prevent, on average, only 30% of the URLLC access attempts), e.g., in order to prioritize URLLC access attempts over IoT access attempts, while decreasing network load, for example. Therefore, according to an example implementation, network-slice specific access barring may be performed.
- FIG. 2 is a diagram illustrating a network-specific access barring technique according to an example implementation.
- BS 134 and a core network entity 150 are in communication, as shown.
- the UE 132 detects a network slice associated with an access attempt by the UE.
- the UE may be assigned to or associated with one or more network slices, e.g., a different network slice for each of multiple 5G service types.
- the UE 132 may detect for which slice(s), e.g., for which application(s) or service type(s), is generating the access attempt for the UE, for example.
- the core network entity 150 may send to UE 132 one or more access category filters that indicate an access category associated with one or more network slices.
- the access category filters may indicate: access category X for network slice #1 (URLLC); and access category Y for network slice #2 (IoT).
- URLLC network slice #1
- IoT access category Y for network slice #2
- These are merely a couple of illustrative example access category filters, which may allow the UE 132 to determine an access category for an access attempt based on the slice associated with the access attempt.
- different access categories may be treated differently for access barring, e.g., in order to prioritize access attempts for certain slices over access attempts for other slices, for example.
- access category X (for URLLC) may be prioritized (e.g., a reduced amount of barring for access category X) over access category Y (e.g., a higher amount of barring of access attempts for access category Y).
- the UE 132 may determine an access category for the access attempt based on the slice for the access attempt and the access category filters.
- the core network entity 150 may determine a slice-specific network load(s) for each of one or more network slices. Load may be measured or determine as, e.g., number of UEs, amount of traffic, percentage or amount of resources for the network slice that are used or allocated, etc. Thus, the core network entity 150 may separately determine a load for each of one or more network slices.
- the core network entity 150 may send to the BS 134 the slice-specific load information for one or more network slices.
- the BS 134 may determine, based on the slice-specific load information, a barring configuration, e.g., which may indicate for one or more access categories: whether the access category is subject to barring, and providing a set of barring parameters for the access category (e.g., a barring rate or barring factor, and a barring time, as described above).
- a barring configuration may include a compensation factor to adjust (e.g., reduce) a barring of access attempts from Inactive UEs.
- a UE may be Connected (and active); Idle (not connected), or Connected (connected to the core network entity) but Inactive (Inactive Mode).
- Inactive mode the core network determines that the UE is connected, and thus does not page the Inactive UE, but rather, just sends any downlink data to the BS for delivery to the Inactive UE.
- the BS may then page the Inactive UE to cause the UE to establish a connection (if not barred from access) and receive the downlink data for the Inactive UE.
- a compensation factor may be used to adjust a barring rate for Inactive UEs.
- the compensation factor may be provided and used by the UE in making a barring decision that may provide fewer barred access attempts for Inactive mode UEs, as compared to Idle mode UEs (e.g., a lower rate of barring of access attempts for Inactive mode UEs, as compared to a higher rate of barring of access attempts from Idle mode UEs, for example).
- the barring configuration may be sent from the BS 134 to the UE 132.
- the UE 132 may make a barring decision for the UE access attempt based on the network slice associated with the access attempt. For example, the UE 132 may make a barring decision based on the access category for the UE access category (which is based on the slice for the access attempt) and the barring configuration (e.g., which may indicate whether access barring is being performed for such access category, and/or provide a set of barring parameters (e.g., a barring rate or barring factor, and a barring time, and possibly a compensation factor for Inactive mode UEs to adjust barring decision making if the UE is an Inactive mode) for the access category that may provide parameters for the UE to make the access barring decision for the UE access attempt.
- the barring configuration e.g., which may indicate whether access barring is being performed for such access category, and/or provide a set of barring parameters (e.g., a barring rate or barring factor, and a barring time, and possibly a compensation factor for
- UE 132 may generate a random number and compare it to the received barring rate or barring factor. If the random number is less than (or alternatively, greater than) the barring rate or barring factor, then the access attempt is not barred. If, on the other hand, the random number generated by the UE is greater than or equal to (or alternatively, less than or equal to) the barring rate or barring factor, then the UE access attempt is (at least temporarily) barred or prevented from occurring. At 226, if the UE access attempt is not barred, then the UE may perform the access attempt (to access the network), e.g., by sending a RRC connection request message to the BS 134.
- FIG. 3 is a flow chart illustrating operation of a user device according to an example implementation.
- Operation 310 includes detecting, by a user device, a network slice or an application associated with an access attempt by the user device to access a wireless network.
- Operation 320 includes determining, by the user device, an access category based on the detected network slice or detected application.
- Operation 330 includes making, by the user device, a barring decision for the access attempt based on the network slice associated with the access attempt.
- Example 2 According to an example implementation of example 1 , wherein the making a barring decision comprises: making, by the user device based on the network slice associated with the access attempt, a decision that the access attempt is not barred; and the method further comprising performing, by the user device based on the decision, the detected access attempt to the wireless network.
- Example 3 According to an example implementation of any of examples 1-2, wherein the performing the detected access attempt comprises: sending, by the user device, a radio resource control (RRC) connection request message to request a connection to the wireless network.
- RRC radio resource control
- Example 4 According to an example implementation of any of examples 1-3, and further comprising: receiving, by the user device, one or more access category filters that indicate an access category associated with one or more network slices or applications; determining, by the user device, an access category for the access attempt based on the network slice or application that is associated with the access attempt and the one or more access category filters; receiving, by the user device, a barring configuration that indicates a set of barring parameters for one or more of the access categories; and wherein the making a barring decision comprises making, by the user device, a barring decision for the access attempt based on the barring configuration and the access category for the access attempt.
- Example 5 According to an example implementation of any of examples 1-4, wherein the network slice associated with the access attempt comprises one or more of the following: a slice/service type (SST); a slice/service type (SST) and slice differentiator (SD); a single Network Slice Selection Assistance Information (S-NSSAI).
- SST slice/service type
- SST slice/service type
- SD slice differentiator
- S-NSSAI single Network Slice Selection Assistance Information
- Example 6 According to an example implementation of any of examples 1-5, wherein the barring configuration that indicates a set of barring parameters for one or more of the access categories comprises a barring configuration that indicates a set of barring parameters for one or more of the access categories and one or more applications.
- Example 7 The method of any of claims 1-6 wherein the application associated with the access attempt is identified by one or more of the following: operating system identity; and operating system application identity.
- Example 8 According to an example implementation of any of examples 1-7, wherein the barring configuration indicates a set of barring parameters, including at least a barring rate and a barring timer, for one or more of the access categories.
- Example 9 According to an example implementation of any of examples 1-8, and further comprising: receiving a compensation parameter for a user device in Inactive mode; determining, by the user device, that the user device is in Inactive mode; and wherein the making a barring decision comprises: applying, by the user device, the compensation parameter to the making a barring decision for the user device to adjust a barring rate of the access attempt of the user device that is in Inactive mode.
- Example 10 According to an example implementation of any of examples 1-9, wherein the barring configuration is based on a network slice-specific load information that indicates a network load for each of one or more network slices.
- Example 11 According to an example implementation of any of examples 1-10, wherein the barring configuration that indicates a set of barring parameters for one or more of the access categories provides or indicates a different prioritization of one or more access attempts based on access categories of the access attempts.
- FIG. 4 is a flow chart illustrating operation of a base station according to an example implementation.
- Operation 410 includes receiving, by a base station from one or more core network entities within a wireless network, network slice-specific load information that indicates a load for each of one or more network slices.
- Operation 420 includes determining, by the base station based on the received network slice-specific load information, a barring configuration that indicates a set of barring parameters for one or more access categories.
- Operation 430 includes sending, by the base station to a user device, the barring configuration to reduce a load on the wireless network.
- Example 13 According to an example implementation of example 12, wherein the sending comprises sending, by the base station to a user device, the barring configuration, to allow the user device to make a barring decision for an access attempt based on a network slice associated with the access attempt by the user device.
- Example 14 According to an example implementation of any of examples 12-13, and further comprising: forwarding, by the base station to the user device, one or more access category filters that indicate an access category associated with one or more network slices.
- Example 15 According to an example implementation of any of examples 12-14, wherein the barring configuration indicates a set of barring parameters, including at least a barring rate and a barring timer, for one or more of the access categories.
- Example 16 According to an example implementation of any of examples 12-15, wherein the one or more network slices are identified by or associated with one or more of the following: a slice/service type (SST); a slice/service type (SST) and slice differentiator (SD); and a single Network Slice Selection Assistance Information (S-NSSAI).
- FIG. 5 is a flow chart illustrating operation of a core network entity according to an example implementation. Operation 510 includes determining, by a core network entity, network slice-specific load information that indicates a load for each of one or more network slices. Operation 520 includes sending, by the core network entity to a base station, the network-slice specific load information.
- Example 18 According to an example implementation of example 17, wherein the core network entity comprises a first core network entity, and wherein the network slice-specific load information is determined by the first core network entity from one or more of the following: network slice-specific load information determined or gathered by the first core network entity; and network slice-specific load information received from a second core network entity.
- Example 19 According to an example implementation of any of examples 17-18, and further comprising: sending, by the core network entity to a user device via a base station, one or more access category filters that indicate an access category associated with one or more network slices.
- Example 20 According to an example implementation of any of examples 17-19, wherein the one or more network slices are identified by or associated with one or more of the following: a slice/service type (SST); a slice/service type (SST) and slice differentiator (SD); and a single Network Slice Selection Assistance Information (S-NSSAI).
- SST slice/service type
- SST slice/service type
- SD slice differentiator
- S-NSSAI single Network Slice Selection Assistance Information
- Example 21 An apparatus comprising means for performing a method of any of examples 1- 20.
- Example 22 An apparatus comprising at least one processor and at least one memory including computer instructions that, when executed by the at least one processor, cause the apparatus to perform a method of any of examples 1-20.
- Example 23 An apparatus comprising a computer program product including a non-transitory computer-readable storage medium and storing executable code that, when executed by at least one data processing apparatus, is configured to cause the at least one data processing apparatus to perform a method of any of examples 1 -20.
- FIG. 6 is a diagram illustrating a network according to an example implementation. The figure above shows a part of 5GS architecture in reference point representation.
- the UE is served by a RAN node (BS) in RAN and by an AMF and an SMF in the core network.
- BS RAN node
- the UE can communicate with a DN via a PDU session: a data path is established through RAN and UPF towards a DN.
- a UE's registration, mobility, and sessions are managed by core network control plane network functions: AMF and SMF.
- AMF and SMF core network control plane network functions
- a UE's subscription is stored in the UDM and the UE's policy (e.g. mobility restriction) is controlled by the PCF.
- the UE would like to be served by the network, the UE needs to acquire radio connection and register to the core network. In order to acquire radio connection, the UE makes an access attempt towards the RAN (but first the UE must confirm that the access attempt is not barred.
- the access attempt may be barred by the UE.
- the UE may bar an access attempt according to the characteristics of the access attempt and barring configuration broadcasted by the RAN node, and possibly other information.
- a traditional access barring does not take into account slices, slice-related information, or slice-specific load information.
- network-slice specific access barring may be performed.
- a UE may make a barring decision for an access attempt based on a network slice associated with the access attempt.
- a load report may be sent from the core network (e.g., AMF and/or SMF) to RAN/BS; barring configuration for RRC-inactive (and connected) UEs as opposed to connected and active UEs, and idle; connected mode UEs are not barred usually; idle mode UEs should be barred most, and inactive connected UEs should be barred less than Idle mode UEs, because CN believes these UEs are connected. So these inactive UEs receive some additional access barring configuration parameters (e.g., the compensation parameter).
- a barring configuration may be determined by BS based on load information, and sent to UE.
- a 5GMM entity of UE may collect one or more of the following information from other entities in the UE:
- the 5GMM of UE entity decides the access category of an access attempts by making use of information available to itself in addition to the above information and sends the access category to the RRC layer of UE.
- the RRC layer makes a barring decision for the access attempt taking into account the following factors:
- barring configuration is access category specific, which is slice-specific (this barring configuration takes into account the slice specific load information; and, barring configuration transmission may be triggered by updated load information), access category from the 5GMM entity;
- UE decides whether access attempt is barred or not barred based on information coming from BS - if barred, then UE goes into idle mode, and if not barred, then UE transitions from RRC Inactive to RRC Connected; in RRC, there are three different states - connected, inactive and idle (at RRC level).
- the slice (e.g., SST) may be taken into account for the access category decision: 5GMM entity collects information from other entities, and the 5GMM entity may collect which slice (e.g., SST) the 5GSM access request is related to from the 5GSM entity. Additionally, SST of an already established PDU session can be available in the 5GMM entity. Thus, the 5GMM may use the SST(s) of the PDU session(s) associated with the access attempt as well. In short, the 5GMM entity may obtain SST(s) related to the access attempt from the 5GSM entity and/or from itself.
- the network provides the UE (5GMM entity) with access category filter(s).
- the filter is associated with an operator-specific access category and has an associated precedence in relation to standard access categories.
- the NGAP may determine or populate barring configuration according to the slice- specific load information received from the core network.
- the core network may indicate the slice-specific load in the core network to the RAN node.
- the load can be indicated per PLMN, per SST, per SD, and/or per S-NSSAI.
- FIG. 7 is a diagram illustrating an overall procedure for access barring for the access attempts caused by an upper layer according to an example implementation.
- FIG. 8 is a diagram illustrating an overall procedure for access barring for access attempts triggered by the RRC layer according to an example implementation.
- the RRC layer of the UE in RRC -INACTIVE mode can trigger an access attempt.
- the RRC layer may or may not receive an access category for the access attempt.
- the NAS layer provides an access category for a NAS message irrespective of the RRC states.
- FIG. 9 is a diagram illustrating a procedure for a RAN node to set barring configuration to be broadcasted according to an example implementation.
- the load information of the AMF and/or SMF per network slice can be delivered to the RAN node.
- FIG. 10 diagram illustrating a network-specific access barring technique according to another example implementation.
- the operations of 1 - 7 are described below, by way of illustrative example. 1 a.
- the IMS client at UE may provide at least one of the following indications to the 5GMM entity at UE either directly from the IMS client to the 5GMM entity or via the 5GSM entity:
- the 5GMM entity can be aware of the start and end of mobile originated MMTel voice service, MMTel video service, and SMSoIP service.
- the SMS entity of UE may request the 5GMM entity to deliver an MO SMS message, lc.
- the 5GSM entity of UE may request 5GSM message delivery to the 5GMM entity at UE.
- the 5GSM entity may also provide PDU session information, e.g. PDU session ID, S-NSSAI, DNN.
- the 5GMM entity may store the information provided by the 5GSM entity in addition to 5GSM message, e.g. PDU session ID, S-NSSAI, D .
- the 5GMM entity may be requested to establish a 5G NAS signalling connection by the QoS flow controlling entity. In this case, the 5GMM entity may also receive PDU session ID of the PDU session.
- the network may provide operator-specific access category filter(s) to the 5GMM entity of the UE via e.g., a NAS message, OMA DM.
- a NAS message i.e. the AMF provides the filter(s) to the UE via a 5GMM message
- the filter(s) may be coming from the PCF.
- the NAS message may correspond to the Nl : CONFIGURATION UPDATE COMMAND message.
- Each of the access category filters is associated with an operator-specific access category and/or precedence value and may include at least one of the following criteria:
- an access category filter may indicate an access category for each of a plurality of slices (or for each slice ID or SST).
- This information informs the UE how the access attempt should be assigned to an access category; this access category may be used by the UE to perform access barring analysis:
- the access attempts categorized as access categories X and Y can be prioritized by setting small values of barring rates for these access categories in the broadcasted barring configuration.
- the operator-specific access category filter(s) can have a higher or lower priority than standardized access category decision rules.
- the network in order to give special treatment to access attempts related to proprietary traffic for the roaming UEs and even for the UEs in the home network (if the network wants to change the previous configuration), the network shall be able to configure the UE with operator-specific access categories. 3. Taking into account information obtained from step 1 and the following information available in the 5GMM entity:
- the UE decides a standard access category.
- standard access categories are:
- MO resulting from MT the access attempt is an answer to a mobile terminated message
- MO MMTel voice the access attempt is caused by an MO MMTel voice call
- MO SMSoIP the access attempt is caused by an MO SMSoIP
- MO SMSoNAS the access attempt is caused by an MO SMSoNAS
- MO delay tolerant service in EHPLMN the access attempt is relevant to the delay tolerant service or UE registered to the UE's EHPLMN
- MO delay tolerant service in most preferred VPLMN the access attempt is relevant to the delay tolerant service or UE registered to the UE's most preferred VPLMN
- MO delay tolerant service in other PLMN the access attempt is relevant to the delay tolerant service or UE registered to other PLMN
- MO signalling the access attempt is not for user plane radio resource request and is not relevant to other access category
- MO data the access attempt is for user plane radio resource request and is not relevant to other access category
- VoLTE fallback the access attempt is for initiating fallback from 5GS to voice over LTE in early 5GC network deployments
- priority order can be decided, e.g. URLLC > eMBB > massive IoT, that is, again for example, an access attempt associated with URLLC and massive IoT are treated the same as access attempt associated with: URLLC and eMBB; or URLLC alone.
- the UE may decide that the access attempt is subject to an operator- specific category taking into account the filter received in step 2.
- the 5GMM entity additionally takes into account the parameters that are not considered as input for standard access category decision, e.g. SD(s) related to the access attempt.
- the 5GMM entity of UE forwards the access category together with the NAS message to the RRC layer of UE.
- the AMF (example core network entity) may indicate the load (overall network load and slice-specific loads) in the core network to the RAN node/BS.
- the load can be indicated per
- PLMN, per SST, per SD, and/or per S-NSSAI Such information can be provided by the SMF to the RAN node.
- the load information can be expressed in a percentage scale per PLMN, per SST, per SD, and/or per S-NSSAI.
- the AMF may directly provide its load information per PLMN, per SST, per SD, and/or per S-NSSAI to the RAN node. Since the UEs served by the RAN node can be served by multiple AMFs, the RAN node may need to collect load information from all AMFs that serve the UEs served by the RAN node, in order to figure out the overall load in the core network (AMFs).
- AMFs core network
- the SMF may provide the load information per PLMN, per SST, per SD, and/or per S-NSSAI to the AMF, and the AMF may forward the load information to the RAN node. Since the UEs served by the RAN node can be served by multiple SMFs, the RAN node may need to collect load information from all SMFs that serve the UEs served by the RAN node, in order to figure out the overall load in the core network (SMFs). In the message from the AMF to the RAN node, the AMF may include the AMF load information per PLMN, per SST, per SD, and/or per S-NSSAI in addition to the SMF load information to be forwarded.
- SMFs core network
- the AMF can gather load information per PLMN, per SST, per SD, and/or per S- NSSAI from SMFs and provide the gathered load information to the RAN node.
- the gathered load information may be set so that the load of the AMF itself is also reflected in addition to the load of SMFs.
- the AMF forwards the load information (the SMF's massive IoT slice resources are 98% loaded), and in C) the AMF gathers load information of massive IoT slice of SMF(s) and decides the load of massive IoT slice also taking into account the AMF's load for the massive IoT slice (in this case, how the AMF calculates the overall load for the massive IoT slice can be left to implementation).
- the RAN node populates (determines) per-slice barring configuration (e.g., which may provide higher barring for some slices, and lower barring rates for other slices - prioritization of some traffic over others, e.g., may opt to have a lower barring rate for URLLC than for eMBB) to be broadcasted to the UE.
- the RAN node may be aware of the load status of the core network per PLMN, per SST, per SD and/or per S-NSSAI.
- the RAN node can populate or determine the barring configuration so that load for a particular PLMN/network slice can be reduced, e.g. the barring parameters for access categories related to specific network slices (e.g. eMBB, URLLC, massive IoT, IMS) can be set so that access attempt associated with such access categories are reduced.
- the massive IoT slice is mapped to delay tolerant service-series access categories.
- the barring configuration may indicate one or more of the following, by way of illustrative example:
- compensation parameter(s) e.g. for reducing barring rate for RRC-INACTIVE UEs.
- compensation parameter(s) e.g. for reducing barring rate
- the barring rate and barring timer for the IMS services may be delivered to the IMS client in the UE by the RRC layer in the UE and the IMS client can use the information for barring check for IMS services.
- a UE may selects a random number between 0 and 1 , and determines a barring factor, and compares it to barring rate (if less than barring rate, the access attempt is not barred.
- abc-Info-rl5 pertains to collective configuration of three Access Barring Configuration types:
- Some example advantages of various example implementations may include, or example, that air interface and UE's RRC layer becomes adaptable, extendable and to high degree transparent in terms of provision or barring of particular access attempts. While NW (network) has the means to control various services and terminal access attempts in the same unified manner. Assuming the Access Category List is defined in RRC layer in extendable manner, the technique allows adding potentially new services without the need to change service accessibility framework.
- the RRC layer of UE bars access attempts according to the broadcasted barring configuration, and the information on the access attempt, e.g., at least one of the following, for example:
- access class(es) of the UE and/or (do not cover use of access classes)
- the RRC layer of UE may obtain access class(es) of the UE from the USIM, but if this is not available, the upper layer can provide the RRC layer of UE with the access class(es) of the UE.
- the RRC layer should indicate the upper layer of the barring result with a specific cause.
- the cause should indicate that the UE is barred due to barring configuration of the RAN node so that this case can be distinguished from the radio link failure.
- the UE turns into the idle mode.
- the NAS layer shall operate as if the UE is barred in the idle mode.
- 3GPP third generation partnership project
- 4G fourth generation of mobile telecommunication technology
- 5G fifth generation of mobile telecommunication technology
- 5GMM 5GS mobility management
- 5GSM 5GS session management
- AMF access and mobility management function
- eMBB enhanced mobile broadband
- eNB evolved Node B
- EPS evolved packet system
- gNB next generation Node B (uncertain)
- IMS IP multimedia subsystem
- IP internet protocol
- MME mobility management entity
- MMTel IMS multimedia telephony service
- NSSAI network slice selection assistance information
- OAM operations, administration, and management
- PCF policy control function
- RAN radio access network
- RRC radio resource control
- FIG. 1 1 is a block diagram of a wireless station (e.g., AP, BS, eNB, UE or user device) 1100 according to an example implementation.
- the wireless station 1100 may include, for example, one or two RF (radio frequency) or wireless transceivers 1102A, 1 102B, where each wireless transceiver includes a transmitter to transmit signals and a receiver to receive signals.
- the wireless station also includes a processor or control unit/entity (controller) 1104 to execute instructions or software and control transmission and receptions of signals, and a memory 1 106 to store data and/or instructions.
- a processor or control unit/entity (controller) 1104 to execute instructions or software and control transmission and receptions of signals
- a memory 1 106 to store data and/or instructions.
- Processor 1 104 may also make decisions or determinations, generate frames, packets or messages for transmission, decode received frames or messages for further processing, and other tasks or functions described herein.
- Processor 1 104 which may be a baseband processor, for example, may generate messages, packets, frames or other signals for transmission via wireless transceiver 1 102 (1 102A or 1 102B).
- Processor 1 104 may control transmission of signals or messages over a wireless network, and may control the reception of signals or messages, etc., via a wireless network (e.g., after being down-converted by wireless transceiver 1 102, for example).
- Processor 1 104 may be programmable and capable of executing software or other instructions stored in memory or on other computer media to perform the various tasks and functions described above, such as one or more of the tasks or methods described above.
- Processor 1 104 may be (or may include), for example, hardware, programmable logic, a programmable processor that executes software or firmware, and/or any combination of these.
- processor 1 104 and transceiver 1 102 together may be considered as a wireless transmitter/receiver system, for example.
- a controller (or processor) 1108 may execute software and instructions, and may provide overall control for the station 1100, and may provide control for other systems not shown in FIG.
- wireless station 1 1 such as controlling input/output devices (e.g., display, keypad), and/or may execute software for one or more applications that may be provided on wireless station 1100, such as, for example, an email program, audio/video applications, a word processor, a Voice over IP application, or other application or software.
- applications such as, for example, an email program, audio/video applications, a word processor, a Voice over IP application, or other application or software.
- a storage medium may be provided that includes stored instructions, which when executed by a controller or processor may result in the processor 1 104, or other controller or processor, performing one or more of the functions or tasks described above.
- RF or wireless transceiver(s) 1 102 A/1 102B may receive signals or data and/or transmit or send signals or data.
- Processor 1 104 (and possibly transceivers 1 102A/1 102B) may control the RF or wireless transceiver 1 102 A or 1 102B to receive, send, broadcast or transmit signals or data.
- 5G Another example of a suitable communications system is the 5G concept. It is assumed that network architecture in 5G will be quite similar to that of the LTE-advanced. 5G is likely to use multiple input - multiple output (MIMO) antennas, many more base stations or nodes than the LTE (a so-called small cell concept), including macro sites operating in co-operation with smaller stations and perhaps also employing a variety of radio technologies for better coverage and enhanced data rates.
- MIMO multiple input - multiple output
- NFV network functions virtualization
- a virtualized network function may comprise one or more virtual machines running computer program codes using standard or general type servers instead of customized hardware. Cloud computing or data storage may also be utilized.
- radio communications this may mean node operations may be carried out, at least partly, in a server, host or node operationally coupled to a remote radio head. It is also possible that node operations will be distributed among a plurality of servers, nodes or hosts. It should also be understood that the distribution of labour between core network operations and base station operations may differ from that of the LTE or even be non-existent.
- Implementations of the various techniques described herein may be implemented in digital electronic circuitry, or in computer hardware, firmware, software, or in combinations of them. Implementations may be implemented as a computer program product, i.e., a computer program tangibly embodied in an information carrier, e.g., in a machine-readable storage device or in a propagated signal, for execution by, or to control the operation of, a data processing apparatus, e.g., a programmable processor, a computer, or multiple computers. Implementations may also be provided on a computer readable medium or computer readable storage medium, which may be a non-transitory medium.
- Implementations of the various techniques may also include implementations provided via transitory signals or media, and/or programs and/or software implementations that are downloadable via the Internet or other network(s), either wired networks and/or wireless networks.
- implementations may be provided via machine type communications (MTC), and also via an Internet of Things (IOT).
- MTC machine type communications
- IOT Internet of Things
- the computer program may be in source code form, object code form, or in some intermediate form, and it may be stored in some sort of carrier, distribution medium, or computer readable medium, which may be any entity or device capable of carrying the program.
- Such carriers include a record medium, computer memory, read-only memory, photoelectrical and/or electrical carrier signal, telecommunications signal, and software distribution package, for example.
- the computer program may be executed in a single electronic digital computer or it may be distributed amongst a number of computers.
- implementations of the various techniques described herein may use a cyber- physical system (CPS) (a system of collaborating computational elements controlling physical entities).
- CPS cyber- physical system
- CPS may enable the implementation and exploitation of massive amounts of interconnected ICT devices (sensors, actuators, processors microcontrollers, etc embedded in physical objects at different locations.
- ICT devices sensors, actuators, processors microcontrollers, etc.
- Mobile cyber physical systems in which the physical system in question has inherent mobility, are a subcategory of cyber-physical systems. Examples of mobile physical systems include mobile robotics and electronics transported by humans or animals. The rise in popularity of smartphones has increased interest in the area of mobile cyber-physical systems. Therefore, various implementations of techniques described herein may be provided via one or more of these technologies.
- a computer program such as the computer program(s) described above, can be written in any form of programming language, including compiled or interpreted languages, and can be deployed in any form, including as a stand-alone program or as a module, component, subroutine, or other unit or part of it suitable for use in a computing environment.
- a computer program can be deployed to be executed on one computer or on multiple computers at one site or distributed across multiple sites and interconnected by a communication network.
- Method steps may be performed by one or more programmable processors executing a computer program or computer program portions to perform functions by operating on input data and generating output. Method steps also may be performed by, and an apparatus may be implemented as, special purpose logic circuitry, e.g., an FPGA (field programmable gate array) or an ASIC (application-specific integrated circuit).
- FPGA field programmable gate array
- ASIC application-specific integrated circuit
- processors suitable for the execution of a computer program include, by way of example, both general and special purpose microprocessors, and any one or more processors of any kind of digital computer, chip or chipset.
- a processor will receive instructions and data from a read-only memory or a random access memory or both.
- Elements of a computer may include at least one processor for executing instructions and one or more memory devices for storing instructions and data.
- a computer also may include, or be operatively coupled to receive data from or transfer data to, or both, one or more mass storage devices for storing data, e.g., magnetic, magneto -optical disks, or optical disks.
- Information carriers suitable for embodying computer program instructions and data include all forms of non-volatile memory, including by way of example semiconductor memory devices, e.g., EPROM, EEPROM, and flash memory devices; magnetic disks, e.g., internal hard disks or removable disks; magneto -optical disks; and CD-ROM and DVD-ROM disks.
- semiconductor memory devices e.g., EPROM, EEPROM, and flash memory devices
- magnetic disks e.g., internal hard disks or removable disks
- magneto -optical disks e.g., CD-ROM and DVD-ROM disks.
- the processor and the memory may be supplemented by, or incorporated in, special purpose logic circuitry.
- implementations may be implemented on a computer having a display device, e.g., a cathode ray tube (CRT) or liquid crystal display (LCD) monitor, for displaying information to the user and a user interface, such as a keyboard and a pointing device, e.g., a mouse or a trackball, by which the user can provide input to the computer.
- a display device e.g., a cathode ray tube (CRT) or liquid crystal display (LCD) monitor
- a user interface such as a keyboard and a pointing device, e.g., a mouse or a trackball
- Other kinds of devices can be used to provide for interaction with a user as well; for example, feedback provided to the user can be any form of sensory feedback, e.g., visual feedback, auditory feedback, or tactile feedback; and input from the user can be received in any form, including acoustic, speech, or tactile input.
- Implementations may be implemented in a computing system that includes a back-end component, e.g., as a data server, or that includes a middleware component, e.g., an application server, or that includes a front-end component, e.g., a client computer having a graphical user interface or a Web browser through which a user can interact with an implementation, or any combination of such back-end, middleware, or front-end components.
- Components may be interconnected by any form or medium of digital data communication, e.g., a communication network. Examples of communication networks include a local area network (LAN) and a wide area network (WAN), e.g., the Internet.
- LAN local area network
- WAN wide area network
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
- Small-Scale Networks (AREA)
Abstract
Description
Claims
Priority Applications (19)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/638,267 US12108324B2 (en) | 2017-08-11 | 2018-08-02 | Network slice-specific access barring for wireless networks |
CN201880063423.4A CN111165021B (en) | 2017-08-11 | 2018-08-02 | Network slice-specific access restriction for wireless networks |
CN202310028888.9A CN116193537A (en) | 2017-08-11 | 2018-08-02 | Network slice specific access restriction for wireless networks |
KR1020207007136A KR20200036933A (en) | 2017-08-11 | 2018-08-02 | Block network slice specific access to wireless networks |
AU2018314932A AU2018314932B2 (en) | 2017-08-11 | 2018-08-02 | Network slice-specific access barring for wireless networks |
EP18844187.7A EP3665953A4 (en) | 2017-08-11 | 2018-08-02 | Network slice-specific access barring for wireless networks |
CA3072743A CA3072743A1 (en) | 2017-08-11 | 2018-08-02 | Network slice-specific access barring for wireless networks |
KR1020227002337A KR102612813B1 (en) | 2017-08-11 | 2018-08-02 | Network slice-specific access barring for wireless networks |
JP2020507627A JP2020530710A (en) | 2017-08-11 | 2018-08-02 | Network slice-specific access prohibition for wireless networks |
BR112020002801-0A BR112020002801A2 (en) | 2017-08-11 | 2018-08-02 | specific network slice access restriction for wireless networks |
MX2020001682A MX2020001682A (en) | 2017-08-11 | 2018-08-02 | Network slice-specific access barring for wireless networks. |
KR1020237042316A KR20230169488A (en) | 2017-08-11 | 2018-08-02 | Network slice-specific access barring for wireless networks |
RU2020105917A RU2020105917A (en) | 2017-08-11 | 2018-08-02 | Denying access to the network segment for wireless networks |
SG11202001072WA SG11202001072WA (en) | 2017-08-11 | 2018-08-02 | Network slice-specific access barring for wireless networks |
ZA2020/00750A ZA202000750B (en) | 2017-08-11 | 2020-02-05 | Network slice-specific access barring for wireless networks |
PH12020500273A PH12020500273A1 (en) | 2017-08-11 | 2020-02-06 | Network slice-specific access barring for wireless networks |
CONC2020/0001475A CO2020001475A2 (en) | 2017-08-11 | 2020-02-11 | Network segment specific access prohibition for wireless networks |
AU2021254647A AU2021254647B2 (en) | 2017-08-11 | 2021-10-22 | Network slice-specific access barring for wireless networks |
JP2022112317A JP7512327B2 (en) | 2017-08-11 | 2022-07-13 | Network slice specific access prohibition for wireless networks - Patents.com |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201762544519P | 2017-08-11 | 2017-08-11 | |
US62/544,519 | 2017-08-11 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2019030429A1 true WO2019030429A1 (en) | 2019-02-14 |
Family
ID=65270820
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/FI2018/050570 WO2019030429A1 (en) | 2017-08-11 | 2018-08-02 | Network slice-specific access barring for wireless networks |
Country Status (18)
Country | Link |
---|---|
US (1) | US12108324B2 (en) |
EP (1) | EP3665953A4 (en) |
JP (2) | JP2020530710A (en) |
KR (3) | KR20230169488A (en) |
CN (2) | CN116193537A (en) |
AU (2) | AU2018314932B2 (en) |
BR (1) | BR112020002801A2 (en) |
CA (1) | CA3072743A1 (en) |
CL (1) | CL2020000314A1 (en) |
CO (1) | CO2020001475A2 (en) |
MA (1) | MA49976A (en) |
MX (1) | MX2020001682A (en) |
PH (1) | PH12020500273A1 (en) |
RU (1) | RU2020105917A (en) |
SG (1) | SG11202001072WA (en) |
TW (1) | TWI695649B (en) |
WO (1) | WO2019030429A1 (en) |
ZA (1) | ZA202000750B (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2021020834A1 (en) * | 2019-07-26 | 2021-02-04 | 엘지전자 주식회사 | Method for accessing network by terminal |
WO2021054732A1 (en) * | 2019-09-17 | 2021-03-25 | Samsung Electronics Co., Ltd. | Methods, apparatus and systems for performing load distribution in network |
WO2021086126A1 (en) * | 2019-10-30 | 2021-05-06 | 삼성전자 주식회사 | Access management method and device for performing data communication service by using nas protocol in 5g environment |
WO2022027355A1 (en) * | 2020-08-05 | 2022-02-10 | Apple Inc. | Access barring for radio access network slicing |
CN114079906A (en) * | 2020-08-18 | 2022-02-22 | 联发科技(新加坡)私人有限公司 | UE behavior method and device for failed registration request or service request |
EP3965386A4 (en) * | 2019-06-25 | 2022-05-11 | Guangdong Oppo Mobile Telecommunications Corp., Ltd. | Cell access method and apparatus |
US11375374B1 (en) * | 2021-03-24 | 2022-06-28 | Verizon Patent And Licensing Inc. | Systems and methods for temporarily barring UE network slice usage |
US11405851B2 (en) | 2019-06-10 | 2022-08-02 | Ofinno, Llc | Closed access group overload and congestion control |
CN115176500A (en) * | 2020-03-31 | 2022-10-11 | Oppo广东移动通信有限公司 | Cell access method, electronic device and storage medium |
Families Citing this family (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR102325521B1 (en) * | 2017-08-14 | 2021-11-12 | 삼성전자 주식회사 | Method and apparatus for handling network congestion control to rrc-inactive or light-connection device |
CN109548042B (en) * | 2017-09-22 | 2023-11-17 | 中兴通讯股份有限公司 | Network slice configuration method and device |
JP7374139B2 (en) * | 2018-07-02 | 2023-11-06 | ノキア テクノロジーズ オサケユイチア | Access control of user equipment in connected mode |
US11064450B2 (en) * | 2018-11-12 | 2021-07-13 | Mediatek Inc. | Synchronization of QoS flows and rules in mobile communications |
JP2020088455A (en) * | 2018-11-16 | 2020-06-04 | シャープ株式会社 | User device, control device, and communication control method |
US10887825B2 (en) * | 2019-05-01 | 2021-01-05 | Verizon Patent And Licensing Inc. | Method and system for application-based access control using network slicing |
US11284288B2 (en) * | 2019-12-31 | 2022-03-22 | Celona, Inc. | Method and apparatus for microslicing wireless communication networks with device groups, service level objectives, and load/admission control |
KR102351935B1 (en) * | 2020-05-14 | 2022-01-14 | 주식회사 엘지유플러스 | Method for controlling wireless communication network connections and attaratus thereof |
CN113853004A (en) * | 2020-06-28 | 2021-12-28 | 中兴通讯股份有限公司 | Information sending method, NR cell access method, access network equipment and mobile terminal |
WO2022021155A1 (en) * | 2020-07-29 | 2022-02-03 | Lenovo (Beijing) Limited | Method and apparatus for managing access control information |
EP4189930A1 (en) * | 2020-08-03 | 2023-06-07 | Nokia Technologies Oy | Apparatus, method and computer program |
US12048066B2 (en) * | 2020-08-06 | 2024-07-23 | Apple Inc. | Network access by a reduced capability user equipment |
US20220060880A1 (en) * | 2020-08-18 | 2022-02-24 | Mediatek Singapore Pte. Ltd. | UE Behavior For Failed Registration Request Or Service Request For Emergency Services Fallback |
CN114079999A (en) * | 2020-08-21 | 2022-02-22 | 中兴通讯股份有限公司 | Communication control method, network element and storage medium |
US11864026B2 (en) * | 2020-09-18 | 2024-01-02 | Verizon Patent And Licensing Inc. | Systems and methods for access barring based on slice information |
WO2022081303A1 (en) * | 2020-10-16 | 2022-04-21 | Intel Corporation | Application inference for 5gs network slicing policies |
CN114390613A (en) * | 2020-10-19 | 2022-04-22 | 财团法人工业技术研究院 | Method for slice-based access barring and user equipment using the same |
CN114765806A (en) * | 2021-01-14 | 2022-07-19 | 中国移动通信有限公司研究院 | Information interaction method, device, equipment and readable storage medium |
CN114980258A (en) * | 2021-02-26 | 2022-08-30 | 上海大唐移动通信设备有限公司 | Access control method, device and storage medium |
KR102656991B1 (en) * | 2021-06-08 | 2024-04-11 | 미쓰비시덴키 가부시키가이샤 | Communication control system, control device, communication control method, and communication control program stored in computer-readable recording medium |
EP4349087A1 (en) * | 2021-06-29 | 2024-04-10 | Samsung Electronics Co., Ltd. | Method and apparatus for handling registration of user equipment to network slice |
US11758368B2 (en) * | 2021-09-29 | 2023-09-12 | Oracle International Corporation | Methods, systems, and computer readable media for supporting mobile originated data multicasting in a communications network |
EP4420426A1 (en) * | 2021-10-20 | 2024-08-28 | LG Electronics Inc. | Method and apparatus for slice aware cell selection and reselection in a wireless communication system |
EP4420415A1 (en) * | 2021-10-20 | 2024-08-28 | LG Electronics Inc. | Method and apparatus for a slice aware cell barring in a wireless communication system |
CN115460607A (en) * | 2022-08-22 | 2022-12-09 | 西安电子科技大学 | Wireless network access method of RAN slice in heterogeneous cellular network |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013112410A1 (en) * | 2012-01-23 | 2013-08-01 | Intel Corporation | Extended access barring (eab) signaling for a core network (cn) and node |
US20140248874A1 (en) | 2011-08-10 | 2014-09-04 | Nokia Siemens Networks Oy | Methods and Apparatus for Radio Resource Control |
US20150223146A1 (en) | 2014-01-31 | 2015-08-06 | Intel IP Corporation | Implementations of application specific access class barring skip functionality in a wireless network |
WO2016006948A1 (en) * | 2014-07-09 | 2016-01-14 | Lg Electronics Inc. | Method and apparatus for performing application specific access control in wireless communication system |
EP3096560A1 (en) | 2014-11-10 | 2016-11-23 | LG Electronics Inc. | Method and user equipment for blocking network access by acdc |
CN106572516A (en) | 2016-09-28 | 2017-04-19 | 华为技术有限公司 | Network slice selection method, terminal equipment and network equipment |
US20170141973A1 (en) * | 2015-11-13 | 2017-05-18 | Huawei Technologies Co., Ltd. | Systems and methods for network slice management |
WO2017119844A1 (en) | 2016-01-08 | 2017-07-13 | Telefonaktiebolaget Lm Ericsson (Publ) | Access control in a network comprising network slices |
Family Cites Families (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2067336A2 (en) | 2006-09-15 | 2009-06-10 | Koninklijke Philips Electronics N.V. | Automatic packet tagging |
JP4713670B2 (en) | 2009-10-05 | 2011-06-29 | 株式会社エヌ・ティ・ティ・ドコモ | Mobile station |
US9369944B2 (en) * | 2011-08-05 | 2016-06-14 | Telefonaktiebolaget Lm Ericsson (Publ) | Methods of modifying communication network access and related network nodes, and wireless terminals |
KR101967721B1 (en) | 2011-08-10 | 2019-04-10 | 삼성전자 주식회사 | Method and appratus of applying extended access barring in mobile communication system |
US9661525B2 (en) | 2012-03-21 | 2017-05-23 | Samsung Electronics Co., Ltd. | Granular network access control and methods thereof |
MX358438B (en) * | 2014-01-24 | 2018-08-21 | Ericsson Telefon Ab L M | Methods, network node, systems, and computer program products for controlling usage of multi path tcp. |
JP6318253B2 (en) | 2014-06-30 | 2018-04-25 | エルジー エレクトロニクス インコーポレイティド | Application-specific network access blocking method and user device |
US10149196B2 (en) | 2014-08-13 | 2018-12-04 | Lg Electronics Inc. | Method and user equipment for blocking network access according to application |
CN107113650B (en) | 2015-01-22 | 2021-08-13 | 苹果公司 | Transmission of congestion control information |
MX2018001875A (en) | 2015-08-14 | 2018-06-20 | Ericsson Telefon Ab L M | System and method for providing control information for application-specific congestion control for data communication. |
CA2996178C (en) | 2015-09-30 | 2019-12-31 | Guangdong Oppo Mobile Telecommunications Corp., Ltd. | Service bearer congestion control method and device |
CN108141412B (en) * | 2015-10-28 | 2022-03-04 | 苹果公司 | Slice-based operation in a wireless network with end-to-end network slices |
JP6757843B2 (en) | 2016-07-05 | 2020-09-23 | エルジー エレクトロニクス インコーポレイティド | Methods and user devices for performing access control in next-generation mobile communication networks |
EP3908045B1 (en) | 2016-07-13 | 2024-10-23 | Samsung Electronics Co., Ltd. | Access control method and apparatus for use in mobile communication |
US10798639B2 (en) * | 2016-08-02 | 2020-10-06 | Lg Electronics Inc. | Connection try method and user equipment, and connection control method and base station |
CN107734708B (en) * | 2016-08-12 | 2023-07-28 | 华为技术有限公司 | Access control method and device for wireless network |
KR102129977B1 (en) * | 2017-02-02 | 2020-07-06 | 주식회사 케이티 | Methods for access control amd Appratuses thereof |
EP3576466B1 (en) | 2017-03-01 | 2021-10-27 | Huawei Technologies Co., Ltd. | Service processing method and device |
CN109151906B (en) * | 2017-06-16 | 2021-02-12 | 华为技术有限公司 | Communication method, network equipment, terminal equipment and system |
WO2018229602A1 (en) | 2017-06-16 | 2018-12-20 | Telefonaktiebolaget Lm Ericsson (Publ) | Method for access barring |
EP3497980B1 (en) * | 2017-06-23 | 2020-10-28 | LG Electronics Inc. -1- | Method and apparatus for performing access barring check |
KR20240068060A (en) | 2017-08-09 | 2024-05-17 | 인터디지탈 패튼 홀딩스, 인크 | Access control in 5g nr |
-
2018
- 2018-08-02 MA MA049976A patent/MA49976A/en unknown
- 2018-08-02 SG SG11202001072WA patent/SG11202001072WA/en unknown
- 2018-08-02 KR KR1020237042316A patent/KR20230169488A/en active Application Filing
- 2018-08-02 JP JP2020507627A patent/JP2020530710A/en active Pending
- 2018-08-02 BR BR112020002801-0A patent/BR112020002801A2/en unknown
- 2018-08-02 KR KR1020207007136A patent/KR20200036933A/en active IP Right Grant
- 2018-08-02 CN CN202310028888.9A patent/CN116193537A/en active Pending
- 2018-08-02 MX MX2020001682A patent/MX2020001682A/en unknown
- 2018-08-02 EP EP18844187.7A patent/EP3665953A4/en active Pending
- 2018-08-02 RU RU2020105917A patent/RU2020105917A/en unknown
- 2018-08-02 AU AU2018314932A patent/AU2018314932B2/en active Active
- 2018-08-02 CA CA3072743A patent/CA3072743A1/en active Pending
- 2018-08-02 KR KR1020227002337A patent/KR102612813B1/en active Application Filing
- 2018-08-02 WO PCT/FI2018/050570 patent/WO2019030429A1/en unknown
- 2018-08-02 US US16/638,267 patent/US12108324B2/en active Active
- 2018-08-02 CN CN201880063423.4A patent/CN111165021B/en active Active
- 2018-08-10 TW TW107128003A patent/TWI695649B/en active
-
2020
- 2020-02-05 ZA ZA2020/00750A patent/ZA202000750B/en unknown
- 2020-02-05 CL CL2020000314A patent/CL2020000314A1/en unknown
- 2020-02-06 PH PH12020500273A patent/PH12020500273A1/en unknown
- 2020-02-11 CO CONC2020/0001475A patent/CO2020001475A2/en unknown
-
2021
- 2021-10-22 AU AU2021254647A patent/AU2021254647B2/en active Active
-
2022
- 2022-07-13 JP JP2022112317A patent/JP7512327B2/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140248874A1 (en) | 2011-08-10 | 2014-09-04 | Nokia Siemens Networks Oy | Methods and Apparatus for Radio Resource Control |
WO2013112410A1 (en) * | 2012-01-23 | 2013-08-01 | Intel Corporation | Extended access barring (eab) signaling for a core network (cn) and node |
US20150223146A1 (en) | 2014-01-31 | 2015-08-06 | Intel IP Corporation | Implementations of application specific access class barring skip functionality in a wireless network |
WO2016006948A1 (en) * | 2014-07-09 | 2016-01-14 | Lg Electronics Inc. | Method and apparatus for performing application specific access control in wireless communication system |
EP3167659A1 (en) | 2014-07-09 | 2017-05-17 | LG Electronics Inc. | Method and apparatus for performing application specific access control in wireless communication system |
EP3096560A1 (en) | 2014-11-10 | 2016-11-23 | LG Electronics Inc. | Method and user equipment for blocking network access by acdc |
US20170041854A1 (en) * | 2014-11-10 | 2017-02-09 | Lg Electronics Inc. | Method and user equipment for blocking network access by acdc |
US20170141973A1 (en) * | 2015-11-13 | 2017-05-18 | Huawei Technologies Co., Ltd. | Systems and methods for network slice management |
WO2017119844A1 (en) | 2016-01-08 | 2017-07-13 | Telefonaktiebolaget Lm Ericsson (Publ) | Access control in a network comprising network slices |
CN106572516A (en) | 2016-09-28 | 2017-04-19 | 华为技术有限公司 | Network slice selection method, terminal equipment and network equipment |
Non-Patent Citations (2)
Title |
---|
HUAWEI; HISILICON: "Update of Solution #1 for Key issue #1", 3GPP SA WG2 MEETING #114 S2-161503, 5 April 2016 (2016-04-05), XP051086496, [retrieved on 20181012] * |
See also references of EP3665953A4 |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11405851B2 (en) | 2019-06-10 | 2022-08-02 | Ofinno, Llc | Closed access group overload and congestion control |
EP3965386A4 (en) * | 2019-06-25 | 2022-05-11 | Guangdong Oppo Mobile Telecommunications Corp., Ltd. | Cell access method and apparatus |
WO2021020834A1 (en) * | 2019-07-26 | 2021-02-04 | 엘지전자 주식회사 | Method for accessing network by terminal |
WO2021054732A1 (en) * | 2019-09-17 | 2021-03-25 | Samsung Electronics Co., Ltd. | Methods, apparatus and systems for performing load distribution in network |
WO2021086126A1 (en) * | 2019-10-30 | 2021-05-06 | 삼성전자 주식회사 | Access management method and device for performing data communication service by using nas protocol in 5g environment |
US11943733B2 (en) | 2019-10-30 | 2024-03-26 | Samsung Electronics Co., Ltd. | Access management method and device for performing data communication service by using NAS protocol in 5G environment |
CN115176500A (en) * | 2020-03-31 | 2022-10-11 | Oppo广东移动通信有限公司 | Cell access method, electronic device and storage medium |
WO2022027355A1 (en) * | 2020-08-05 | 2022-02-10 | Apple Inc. | Access barring for radio access network slicing |
CN114079906A (en) * | 2020-08-18 | 2022-02-22 | 联发科技(新加坡)私人有限公司 | UE behavior method and device for failed registration request or service request |
CN114079906B (en) * | 2020-08-18 | 2024-06-04 | 联发科技(新加坡)私人有限公司 | UE behavior method and device for failed registration request or service request |
US20220312210A1 (en) * | 2021-03-24 | 2022-09-29 | Verizon Patent And Licensing Inc. | Systems and methods for temporarily barring ue network slice usage |
US11375374B1 (en) * | 2021-03-24 | 2022-06-28 | Verizon Patent And Licensing Inc. | Systems and methods for temporarily barring UE network slice usage |
US11849321B2 (en) | 2021-03-24 | 2023-12-19 | Verizon Patent And Licensing Inc. | Systems and methods for temporarily barring UE network slice usage |
Also Published As
Publication number | Publication date |
---|---|
CN111165021B (en) | 2023-01-13 |
EP3665953A1 (en) | 2020-06-17 |
CN116193537A (en) | 2023-05-30 |
AU2018314932A1 (en) | 2020-02-27 |
US12108324B2 (en) | 2024-10-01 |
SG11202001072WA (en) | 2020-03-30 |
PH12020500273A1 (en) | 2020-09-21 |
MX2020001682A (en) | 2020-03-20 |
KR102612813B1 (en) | 2023-12-13 |
MA49976A (en) | 2020-06-17 |
EP3665953A4 (en) | 2021-09-15 |
AU2021254647A1 (en) | 2021-11-18 |
CL2020000314A1 (en) | 2020-10-09 |
AU2021254647B2 (en) | 2024-07-25 |
ZA202000750B (en) | 2022-10-26 |
JP2022140488A (en) | 2022-09-26 |
RU2020105917A (en) | 2021-09-14 |
AU2018314932B2 (en) | 2021-07-22 |
KR20230169488A (en) | 2023-12-15 |
TWI695649B (en) | 2020-06-01 |
CA3072743A1 (en) | 2019-02-14 |
US20200178158A1 (en) | 2020-06-04 |
CO2020001475A2 (en) | 2020-06-19 |
TW201922045A (en) | 2019-06-01 |
CN111165021A (en) | 2020-05-15 |
JP7512327B2 (en) | 2024-07-08 |
RU2020105917A3 (en) | 2021-09-14 |
KR20220016294A (en) | 2022-02-08 |
KR20200036933A (en) | 2020-04-07 |
JP2020530710A (en) | 2020-10-22 |
BR112020002801A2 (en) | 2020-07-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2018314932B2 (en) | Network slice-specific access barring for wireless networks | |
US11805472B2 (en) | Access control in 5G NR | |
US10638356B2 (en) | Transmission of network slicing constraints in 5G wireless networks | |
US11317296B2 (en) | Apparatus and methods for interference handling and switching operating frequencies for devices being supported by a wireless access node | |
US11838747B2 (en) | Uplink congestion control based on sip messaging | |
US10701751B2 (en) | Signaling for multiple radio access technology dual connectivity in wireless network | |
US20160095046A1 (en) | Method and Apparatus for Use in Network Selection | |
KR102695176B1 (en) | Congestion Control in AMF and SMF | |
EP3824671A1 (en) | Reducing handover interruption with two transmitters and receivers | |
US11044640B2 (en) | Uplink bearer binding in handover | |
US20140073334A1 (en) | Interference coordination in heterogeneous networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18844187 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2020507627 Country of ref document: JP Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 3072743 Country of ref document: CA |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112020002801 Country of ref document: BR |
|
ENP | Entry into the national phase |
Ref document number: 2018314932 Country of ref document: AU Date of ref document: 20180802 Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 20207007136 Country of ref document: KR Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 2018844187 Country of ref document: EP Effective date: 20200311 |
|
ENP | Entry into the national phase |
Ref document number: 112020002801 Country of ref document: BR Kind code of ref document: A2 Effective date: 20200210 |