WO2020151668A1 - Methods and apparatuses for data communication between terminal device and application server - Google Patents

Methods and apparatuses for data communication between terminal device and application server Download PDF

Info

Publication number
WO2020151668A1
WO2020151668A1 PCT/CN2020/073263 CN2020073263W WO2020151668A1 WO 2020151668 A1 WO2020151668 A1 WO 2020151668A1 CN 2020073263 W CN2020073263 W CN 2020073263W WO 2020151668 A1 WO2020151668 A1 WO 2020151668A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
application server
terminal device
information
network exposure
Prior art date
Application number
PCT/CN2020/073263
Other languages
French (fr)
Inventor
Yun Zhang
Jingrui TAO
Fengpei Zhang
Original Assignee
Telefonaktiebolaget Lm Ericsson (Publ)
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Telefonaktiebolaget Lm Ericsson (Publ) filed Critical Telefonaktiebolaget Lm Ericsson (Publ)
Priority to EP20745503.1A priority Critical patent/EP3915225A4/en
Priority to US17/419,882 priority patent/US12052776B2/en
Publication of WO2020151668A1 publication Critical patent/WO2020151668A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/11Allocation or use of connection identifiers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0806Configuration setting for initial configuration or provisioning, e.g. plug-and-play
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/90Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]

Definitions

  • Embodiments of the disclosure generally relate to communication, and, more particularly, to methods and apparatuses for data communication between terminal device and application server.
  • SCEF Service capability exposure function
  • NEF network exposure function
  • 3GPP 3rd generation partnership project
  • SCEF or NEF provides small data delivery or network Internet of things (IoT) message function (especially non-Internet protocol (non-IP) data delivery) from user equipment (UE) to application server (AS) .
  • IoT Internet of things
  • non-IP non-Internet protocol
  • One of the objects of the disclosure is to provide an improved solution for data communication between terminal device and application server.
  • a method implemented at a network exposure node may comprise receiving, from a first application server in operator trust domain, configuration information that can be used for data delivery for a terminal device.
  • the method may further comprise receiving data from one of the terminal device and the first application server.
  • the method may further comprise forwarding the data to the other of the terminal device and the first application server based on the configuration information.
  • the first application server may be deployed in operator mobile edge.
  • the configuration information may comprise identity (ID) information of the terminal device, network address information of the first application server and an access point name (APN) .
  • the data may be received from the terminal device and forwarded to the first application server based on the network address information of the first application server corresponding to the ID information of the terminal device and the APN.
  • the configuration information may comprise ID information of the terminal device, ID information of the first application server and an APN.
  • the method may further comprise obtaining, from a packet gateway node, the ID information and corresponding current network address information of the first application server.
  • the data may be received from the terminal device and forwarded to the first application server based on the current address information of the first application server corresponding to the ID information of the terminal device and the APN.
  • the configuration information may comprise network address or ID information of at least one additional destination to which data is to be delivered from the terminal device.
  • the method may further comprise forwarding the data received from the terminal device to the at least one additional destination based on the configuration information.
  • one of the at least one additional destination may be a second application server in Internet domain.
  • the data may be received from the terminal device in a form of Internet protocol (IP) data or non-IP data.
  • IP Internet protocol
  • the IP data may be forwarded through a same interface as that used for the non-IP data.
  • the data may be received from the first application server in a form of non-IP data or IP data.
  • the IP data may be received from the first application server through a same interface as that used for the non-IP data.
  • the configuration information may comprise ID information of the terminal device, network address or ID information of the first application server and an APN.
  • the data may be received from the first application server in a form of IP data.
  • the method may further comprise obtaining, from a packet gateway node, the ID information and corresponding current network address information of the terminal device.
  • the IP data may be forwarded to the terminal device based on the current network address information of the terminal device corresponding to the ID information of the terminal device.
  • the network exposure node may be an SCEF or NEF and the same interface may be T8 non-IP data delivery (NIDD) interface.
  • NIDD non-IP data delivery
  • the ID information may be an external ID or a mobile subscriber international integrated service digital network (ISDN) number (MSISDN) and the network address information may be a uniform resource identifier (URI) .
  • ISDN mobile subscriber international integrated service digital network
  • URI uniform resource identifier
  • a method implemented at an application server in operator trust domain may comprise sending, to a network exposure node, configuration information that can be used for data delivery for a terminal device.
  • the method may further comprise receiving data from the terminal device via the network exposure node or sending data to the terminal device via the network exposure node.
  • the application server may be deployed in operator mobile edge.
  • the configuration information may comprise network address or ID information of the application server and at least one additional destination to which data is to be delivered from the terminal device via the network exposure node.
  • the data may be received via the network exposure node in a form of IP data or non-IP data.
  • the IP data is received through a same interface of the network exposure node as that used for the non-IP data.
  • the data may be sent via the network exposure node in a form of IP data or non-IP data.
  • the IP data may be sent through a same interface of the network exposure node as that used for the non-IP data.
  • the network exposure node may be an SCEF or NEF and the same interface is T8 NIDD interface.
  • the network exposure node may comprise at least one processor and at least one memory.
  • the at least one memory may contain instructions executable by the at least one processor, whereby the network exposure node may be operative to receive, from a first application server in operator trust domain, configuration information that can be used for data delivery for a terminal device.
  • the network exposure node may be further operative to receive data from one of the terminal device and the first application server.
  • the network exposure node may be further operative to forward the data to the other of the terminal device and the first application server based on the configuration information.
  • the network exposure node may be operative to perform the method according to the above first aspect.
  • an application server in operator trust domain may comprise at least one processor and at least one memory.
  • the at least one memory may contain instructions executable by the at least one processor, whereby the application server may be operative to send, to a network exposure node, configuration information that can be used for data delivery for a terminal device.
  • the application server may be further operative to receive data from the terminal device via the network exposure node or send data to the terminal device via the network exposure node.
  • the application server may be operative to perform the method according to the above second aspect.
  • the computer program product may comprise instructions which when executed by at least one processor, cause the at least one processor to perform the method according to the above first or second aspect.
  • the computer readable storage medium may comprise instructions which when executed by at least one processor, cause the at least one processor to perform the method according to the above first or second aspect.
  • a network exposure node may comprise a first reception module for receiving, from a first application server in operator trust domain, configuration information that can be used for data delivery for a terminal device.
  • the network exposure node may further comprise a second reception module for receiving data from one of the terminal device and the first application server.
  • the network exposure node may further comprise a forwarding module for forwarding the data to the other of the terminal device and the first application server based on the configuration information.
  • an application server in operator trust domain may comprise a sending module for sending, to a network exposure node, configuration information that can be used for data delivery for a terminal device.
  • the application server may further comprise a transceiving module for receiving data from the terminal device via the network exposure node or sending data to the terminal device via the network exposure node.
  • the data communication between a terminal device and an application server in operator trust domain can be facilitated.
  • FIG. 1 is a diagram showing an existing communication system for environment monitoring
  • FIG. 2 is a diagram showing an exemplary communication system according to an embodiment of the disclosure
  • FIG. 3 is a flowchart illustrating a method implemented at a network exposure node according to an embodiment of the disclosure
  • FIG. 4 is a flowchart illustrating a method implemented at a network exposure node according to another embodiment of the disclosure
  • FIG. 5 is a flowchart illustrating a method implemented at a network exposure node according to another embodiment of the disclosure
  • FIG. 6 is a flowchart illustrating a method implemented at a network exposure node according to another embodiment of the disclosure.
  • FIG. 7 is a flowchart illustrating a method implemented at an application server according to an embodiment of the disclosure.
  • FIG. 8 is a flowchart for explaining the method of FIG. 7;
  • FIG. 9 is a flowchart illustrating an exemplary process according to an embodiment of the disclosure.
  • FIG. 10 is a flowchart illustrating an exemplary process according to another embodiment of the disclosure.
  • FIG. 11 is a flowchart illustrating an exemplary process according to another embodiment of the disclosure.
  • FIG. 12 is a block diagram showing an apparatus suitable for use in practicing some embodiments of the disclosure.
  • FIG. 13 is a block diagram showing a network exposure node according to an embodiment of the disclosure.
  • FIG. 14 is a block diagram showing an application server according to an embodiment of the disclosure..
  • Cities can measure many parameters as part of an environmental monitoring deployment that utilizes connected IoT sensors, including air and water quality, weather, noise, smoke and other attributes that may affect quality of life in a city including those related to disaster management, such as the earthquake and flood sensors.
  • GSM global system for mobile communications
  • GSMA General Monitoring: A Guide to Ensuring a Successful Mobile IoT Deployment
  • the following table shows an example CIoT SCEF or NEF technology as the mobile data delivery for network IoT message function in environment monitoring business scenario to bridge among UEs, application sever on mobile edge and application server on the cloud.
  • FIG. 1 is a diagram showing an existing communication system for environment monitoring use case.
  • the communication system comprises an operator trust domain and an Internet domain.
  • the operator trust domain there are UEs (e.g. IoT sensors) supporting non-IP data delivery (NIDD) , UEs (e.g. IoT sensors) supporting IP data delivery (IPDD) , an application server on mobile edge (e.g. an environment monitoring local station) , radio access networks (RANs) , a home subscriber server (HSS) , a mobility management entity (MME) , a packet data network (PDN) gateway (PGW) , and a network exposure function (NEF) /service capability exposure function (SCEF) .
  • RANs radio access networks
  • HSS home subscriber server
  • MME mobility management entity
  • PGW packet data network gateway
  • NEF network exposure function
  • SCEF service capability exposure function
  • SCEF service capability exposure function
  • the term “on mobile edge” may refer to “at the edge of a cellular network
  • Small data communication includes infrequent and frequent small data transmission aiming to support efficient small data transmissions for CIoT, e.g. tracking devices for both mobile originated (MO) and mobile terminated (MT) use cases. It is expected that the number of such devices can increase exponentially, but the data size per device will remain small.
  • UE will always communicate with the application server first (especially the application server on the cloud) via the internet connection outside the operator trust domain before communicating with other UEs.
  • the application server on the cloud is the main routing node for UEs’ communications and all UEs communicate with the application server on the cloud. This is not efficient when massive UEs need to communicate with the application server on mobile edge which may be considered as a parent UE.
  • CIoT UE normally will go for sleep mode and thus need network IoT message function in the operator trust domain.
  • the present disclosure proposes improved solutions for data communication between terminal device and application server.
  • the solutions will be described in detail with reference to FIGs. 2-14.
  • FIG. 2 is a diagram showing an exemplary communication system according to an embodiment of the disclosure.
  • the SCEF or NEF is used to play as network IoT message function for routing UE to UE communication within the operator trust domain in this embodiment.
  • a child UE can send data to the application server on mobile edge via non-IP PDN.
  • the child UE’s non-IP data can be routed to the application server on mobile edge via the NEF/SCEF.
  • a child UE can send data to the application server on mobile edge via IP PDN.
  • the child UE’s IP data can be routed to the application server on mobile edge via the NEF/SCEF.
  • the application server on mobile edge can send child UEs’ aggregate data to the application server on the cloud.
  • RANs are omitted in FIG. 2 for brevity and the number of each entity shown in FIG. 2 may be more than one.
  • environment monitoring use case is shown in FIG. 2, it is merely an exemplary example for illustration purpose.
  • the principle of the present disclosure may also be applicable to any other case in which data communication between a terminal device and an application server in operator trust domain is required.
  • the HSS, the MME and the PGW are merely exemplary examples of the components in the communication system and may be replaced by components with similar functionalities.
  • the HSS may be replaced by a unified data management (UDM)
  • the MME may be replaced by an access and mobility management function (AMF)
  • the PGW may be replaced by a user plane function (UPF) . That is, the principle of the present disclosure may be reused for data delivery in both 5G and 4G networks.
  • the term UE may also be referred to as, for example, terminal device, access terminal, mobile station, mobile unit, subscriber station, or the like. It may refer to any end device that can access a wireless communication network and receive services therefrom.
  • the UE may include a portable computer, an image capture terminal device such as a digital camera, a gaming terminal device, a music storage and playback appliance, a mobile phone, a cellular phone, a smart phone, a tablet, a wearable device, a personal digital assistant (PDA) , or the like.
  • PDA personal digital assistant
  • a UE may represent a machine or other device that performs monitoring and/or measurements, and transmits the results of such monitoring and/or measurements to another UE and/or a network equipment.
  • the UE may be a machine-to-machine (M2M) device, which may, in a 3GPP context, be referred to as a machine-type communication (MTC) device.
  • M2M machine-to-machine
  • MTC machine-type communication
  • machines or devices may include sensors, metering devices such as power meters, industrial machineries, bikes, vehicles, or home or personal appliances, e.g. refrigerators, televisions, personal wearables such as watches, and so on.
  • FIG. 3 is a flowchart illustrating a method implemented at a network exposure node according to an embodiment of the disclosure.
  • the network exposure node may take the form of an SCEF, an NEF, or any other entity having similar functionality.
  • the network exposure node receives, from a first application server in operator trust domain, configuration information that can be used for data delivery for a terminal device.
  • the first application server may be deployed on operator mobile edge. In environment monitoring use case, it may act as an environment monitoring local station.
  • the configuration information may be received in an NIDD configuration request message.
  • the configuration information may be received in an IPDD configuration request message.
  • NIDD configuration interface e.g. API
  • the network exposure node is an SCEF or NEF
  • NIDD configuration interface such as that defined in 3GPP TS 29.122 may be reused for IPDD configuration.
  • the first application server has a static or dynamic IP address and the direction of data delivery between the terminal device and the first application server.
  • the first application server has a static IP address and data is delivered from the terminal device to the first application server.
  • the first application server has a dynamic IP address and data is delivered from the terminal device to the first application server.
  • the first application server has a static or dynamic IP address and data is delivered from the first application server to the terminal device.
  • block 302 may implemented as block 402 in the first option, as block 502 in the second option, and as block 602 in the third option, which will be described later.
  • the network exposure node receives data from one of the terminal device and the first application server.
  • block 304 may implemented as block 404 in the first option, as block 504 in the second option, and as block 604 in the third option, which will be described later.
  • the network exposure node forwards the data to the other of the terminal device and the first application server based on the configuration information.
  • block 306 may be implemented as block 406 in the first option, as block 506 in the second option, and as block 606 in the third option, which will be described later. In this way, since the network exposure node instead of the application server on the cloud is used as the routing node, a more easy way can be provided to route the communication between the terminal device and the application server within the operator trust domain.
  • FIG. 4 is a flowchart illustrating a method implemented at a network exposure node according to another embodiment of the disclosure.
  • the method corresponds to the first option described above.
  • the network exposure node receives, from a first application server in operator trust domain, configuration information that contains identity (ID) information of the terminal device, network address information of the first application server and an APN. Since the first application server has a static IP address in this option, the configuration information contains the network address information of the first application server. For example, this network address information may be a URI of the first application server, which may be translated to a corresponding IP address.
  • the ID information of the terminal device may be an external ID or an MSISDN of the terminal device.
  • the APN refers to an access point name via which the network address information of the first application server is reachable.
  • the network exposure node receives data from the terminal device.
  • the data may be received through NIDD procedure such as that defined in 3GPP TS 23.682.
  • the data may be received via a packet gateway node such as a PGW.
  • the network exposure node forwards the data to the first application server based on the network address information of the first application server corresponding to the ID information of the terminal device and the APN. For example, due to the reception of the data from the terminal device, the ID information of the terminal device and the APN may be known by the network exposure node.
  • the network address information of the first application server corresponding to this combination may be determined from the configuration information received at block 402. Then, the determined network address information may be used for forwarding the data to the first application server.
  • the data For the terminal device supporting NIDD, the data may be forwarded through T8 NIDD interface such as that defined in 3GPP TS 29.122.
  • the T8 NIDD interface may be reused for forwarding the data.
  • the configuration information received at block 402 may further contain network address information of at least one additional destination to which data is to be delivered from the terminal device. Accordingly, optionally, at block 408, the network exposure node may forward the data to the at least one additional destination based on the configuration information.
  • one of the at least one additional destination may be a second application server in Internet domain.
  • FIG. 5 is a flowchart illustrating a method implemented at a network exposure node according to another embodiment of the disclosure. The method corresponds to the second option described above.
  • the network exposure node receives, from a first application server in operator trust domain, configuration information that contains ID information of the terminal device, ID information of the first application server and an APN. Since the first application server has a dynamic IP address in this option, the configuration information contains ID information instead of network address information of the first application server.
  • the ID information of the first application server may be an external ID or an MSISDN of the first application server which may also be considered as a parent UE.
  • the network exposure node obtains, from a packet gateway node, the ID information and corresponding current network address information of the first application server.
  • the packet gateway node may be a PGW or any other entity having similar functionality.
  • the packet gateway node may send the information actively or the network exposure node may inquire the packet gateway node about the information.
  • the network exposure node receives data from the terminal device.
  • Block 504 may be the same as block 404 and its details are omitted here.
  • the network exposure node forwards the data to the first application server based on the current address information of the first application server corresponding to the ID information of the terminal device and the APN.
  • the ID information of the terminal device and the APN may be known by the network exposure node.
  • the ID information of the first application server corresponding to this combination may be determined from the configuration information received at block 502.
  • the current network address information of the first application server corresponding to its ID information may be determined from the information obtained at block 503.
  • the determined current network address information may be used for forwarding the data to the first application server.
  • the configuration information received at block 502 may further contain ID information of at least one additional destination to which data is to be delivered from the terminal device.
  • the network exposure node may forward the data to the at least one additional destination based at least on the configuration information.
  • the current network address information of the at least one additional destination may be determined in a way similar to blocks 503 and 506. Then, the data may be forwarded based on the determined current network address information.
  • FIG. 6 is a flowchart illustrating a method implemented at a network exposure node according to another embodiment of the disclosure. The method corresponds to the third option described above.
  • the network exposure node receives, from a first application server in operator trust domain, configuration information that contains ID information of the terminal device, network address or ID information of the first application server and an APN.
  • block 602 may be implemented as block 402 or 502.
  • the network exposure node obtains, from a packet gateway node, the ID information and corresponding current network address information of the terminal device.
  • the packet gateway node may send the information actively or the network exposure node may inquire the packet gateway node about the information.
  • the network exposure node receives data from the first application server.
  • the data may be received in the form of non-IP data or IP data.
  • the non-IP data it may be received through T8 NIDD interface such as that defined in 3GPP TS 29.122.
  • the T8 NIDD interface may be reused for receiving the data.
  • the network exposure node forwards the data to the terminal device based on the current network address information of the terminal device corresponding to the ID information of the terminal device. For example, due to the reception of the data from the terminal device, the ID information of the terminal device and the APN may be known by the network exposure node.
  • the current network address information of the terminal device corresponding to its ID information may be determined from the information obtained at block 603. Then, the determined network address information may be used for forwarding the data to the terminal device.
  • the non-IP data it may be forwarded through T8 NIDD procedure such as that defined in 3GPP TS 23.682.
  • the IP data it may be forwarded via a packet gateway node such as a PGW.
  • FIG. 7 is a flowchart illustrating a method implemented at an application server in operator trust domain according to an embodiment of the disclosure.
  • the application server may be deployed in operator mobile edge.
  • the application server sends, to a network exposure node, configuration information that can be used for data delivery for a terminal device.
  • Block 702 may correspond to block 402, 502 or 602 and its details are omitted here.
  • the configuration information may contain network address or ID information of the application server and at least one additional destination to which data is to be delivered from the terminal device via the network exposure node.
  • the application server receives data from the terminal device via the network exposure node or sends data to the terminal device via the network exposure node.
  • the data may be received via the network exposure node in the form of IP data or non-IP data.
  • the IP data may be received through a same interface of the network exposure node as that used for the non-IP data, as shown in block 704-1.
  • the data may be sent via the network exposure node in a form of IP data or non-IP data.
  • the IP data may be sent through a same interface of the network exposure node as that used for the non-IP data, as shown in block 704-2.
  • FIGs. 9 to 11 are flowcharts each illustrating an exemplary process according to an embodiment of the disclosure.
  • SCEF or NEF is used as network IoT message function for routing UE to UE communication within operator trust domain, instead of UE always communicating with AS on the cloud via 3GPP T8 APIs.
  • the process of FIG. 9 is about the small data delivery from UE to mobile edge when the parent UE has static IP allocation. It covers both NIDD and IPDD for UE to AS on mobile edge.
  • the AS on mobile edge attaches the network and requests packet data network (PDN) connection, thereby getting an static IP address. For example, details of this block may be obtained from 3GPP TS 23.401, chapter 5.3.2.1.
  • the AS on cloud provisions UE onboarding information (e.g. child UE external ID, etc. ) to the AS on mobile edge via an interface defined between the application servers.
  • the AS on mobile edge sends a request to the SCEF for NIDD Configuration.
  • the request includes External ID/MSISDN of Non-IP UE, AS on mobile edge Destination IP and APN.
  • the request may be sent via an interface such that defined in 3GPP T8 TS 29.122.
  • the cardinality of ‘notificationDestination’ in the NIDD Configuration request may be changed from 1 to 1.. N in order to support multiple notification destination, as shown below.
  • the AS on the cloud destination may also be also added as NIDD MO destination address.
  • the SCEF can support multiple destination data delivery in T8 Data Delivery API so that both the AS on mobile edge and the AS on the cloud can receive the child UE MO data.
  • the SCEF sends the NIDD configuration to the HSS in terms of TS 23.682, chapter 5.13.2.
  • the child Non-IP UE sends NIDD Mobile Originated data to the SCEF in terms of TS 23.682, chapter 5.13.4.
  • the SCEF sends NIDD MO data to the AS on mobile edge via 3GPP T8 TS 29.122 NIDD API.
  • the SCEF duplicates the child UE’s data payload and sends it to the AS on the cloud.
  • the AS on the cloud address used for sending the data is defined in block 903 for NIDD Configuration. Blocks 902 to 907 may be repeated for all child Non-IP UEs.
  • the AS on mobile edge sends IP Data Delivery Configuration Request (including External ID/MISDIN of UE IP, AS on mobile edge Destination IP, APN) via 3GPP T8 extension.
  • IP Data Delivery Configuration Request including External ID/MISDIN of UE IP, AS on mobile edge Destination IP, APN
  • the NIDD Configuration API (such as that defined in 3GPP TS 29.122) can be reused for IP Data Delivery Configuration.
  • the above ‘notificationUEDestination’ indicating multiple notification destinations may be used for the UE communication routing address.
  • the IPDD configuration may also be sent from the SCEF to the HSS.
  • the IP UE attaches the network and creates IP PDN connectivity.
  • the details of this block may be obtained from TS 23.401, chapter 5.3.2.1 and 5.10.2.
  • the UE on IP PDN sends data to the SCEF via PGW SGi interface and the UE traffic end point is the SCEF IP address.
  • the SCEF embeds IP UE MO data payload (typically is UDP based) in T8 NIDD MO API to the AS on mobile edge (based on the NIDD configuration notification destination) via 3GPP T8 extension.
  • IP UE MO data payload typically is UDP based
  • T8 NIDD MO API to the AS on mobile edge (based on the NIDD configuration notification destination) via 3GPP T8 extension.
  • the 3GPP T8 NIDD API can be reused for IP data delivery to make common APIs for small data delivery in both Non-IP and IP connection.
  • T8 interface is reused for IP based small data delivery that typically is UDP based data.
  • the SCEF duplicates the child UE’s data payload and sends it to the AS on the cloud.
  • the AS on the cloud address used for sending the data is defined in block 903 for NIDD Configuration. Blocks 908 to blocks 912 may be repeated for all Child IP UEs.
  • the process of FIG. 10 is about small data delivery from UE to mobile edge and the parent UE has dynamic IP allocation.
  • the AS on mobile edge attaches the network and requests PDN connection, thereby getting a dynamic IP address. For example, details of this block may be obtained from 3GPP TS 23.401, chapter 5.3.2.1 and 5.10.2.
  • the PGW sends IMSI, UE IP and APN to the SCEF via Radius or other pre-defined interface between the SCEF and the PGW. Alternatively, the SCEF may inquire the PGW about IMSI, UE IP and APN via Radius or other pre-defined interface.
  • the AS on cloud provisions the UE onboarding information (e.g. child UE external ID, etc. ) to the AS on mobile edge , which interface define by Application Server.
  • the AS on mobile edge sends NIDD Configuration Request to the SCEF (including External ID/MISDIN of Non-IP UE, AS on mobile edge Destination such as Parent UE External ID, APN) via 3GPP T8 API such as that defined in 3GPP TS 29.122.
  • SCEF including External ID/MISDIN of Non-IP UE, AS on mobile edge Destination such as Parent UE External ID, APN
  • 3GPP T8 API such as that defined in 3GPP TS 29.122.
  • the following attribute may be added in the definition of type ‘NiddConfiguration’ for UE communication route address, instead of the 3GPP defined ‘notificationDestination’ that is URI.
  • this NIDD Configuration may also reuse block 903 for changing the cardinality of ‘notificationDestination’ from 1 to 1.. N in order to support the multiple notification destination.
  • the SCEF sends NIDD Configuration to the HSS in terms of TS 23.682, chapter 5.13.2.
  • the Non-IP Child UE sends NIDD Mobile Originated data to the SCEF. The details of this block may be obtained from TS 23.682, chapter 5.13.4.
  • the SCEF uses NIDD configuration ‘notificationUEdestination’ to get the AS on mobile edge IP address, and send NIDD MO data to the AS on mobile edge via 3GPP T8 (see, for example, TS 29.122) .
  • the SCEF duplicates the child UE’s data payload and sends it to the AS on the cloud.
  • the AS on the cloud address used for sending the data is defined in block 1004 for NIDD Configuration. Blocks 1003 to 1008 may be repeated for all Child Non-IP UEs.
  • the AS on mobile edge sends IP Data Delivery Configuration Request (External ID/MISDIN of UE IP, AS on mobile edge Destination such as Parent UE External ID, APN) via 3GPP T8 extension.
  • IP Data Delivery Configuration Request External ID/MISDIN of UE IP, AS on mobile edge Destination such as Parent UE External ID, APN
  • NIDD Configuration API such as that defined in 3GPP TS 29.122 can be reused for IP Data Delivery Configuration.
  • this IPDD Configuration may also reuse block 903 for changing the cardinality of ‘notificationDestination’ from 1 to 1.. N in order to support the multiple notification destination.
  • the IP UE attaches the network and create IP PDN connectivity.
  • the details of this block may be obtained from TS 23.401, chapter 5.3.2.1 and 5.10.2.
  • the PGW sends IMSI, UE IP and APN to the SCEF via Radius or other pre-defined interface between SCEF and PGW.
  • the SCEF may inquire the PGW about IMSI, UE IP and APN via Radius or other pre-defined interface.
  • the UE on IP PDN sends data to the SCEF via PGW and the UE traffic end point is the SCEF IP address.
  • the SCEF sends MO data to the AS on mobile edge (based on the AS address mapped with the UE ID and APN) via 3GPP T8 extension.
  • the SCEF duplicates the child UE’s data payload and sends it to the AS on the cloud.
  • the AS on the cloud address used for sending the data is defined in ‘notificationDestination’ in the definition of ‘NiddConfiguration’A PI in 3GPP TS 29.122 T8 APIs (see, for example, chapter 5.6.2.1.2) .
  • Blocks 1009 to 1014 may be repeated for all Child IP UEs.
  • 3GPP T8 API NIDD Configuration is proposed to add Parent UE External ID or MSISDN, so that the SCEF can map the Parent UE External ID or MSISDN to Parent UE IP address (thus supporting dynamic IP allocation) for providing the way to route UE data towards AS on mobile edge.
  • the exemplary processes shown in FIGs. 9 and 10 can be applied to the communication from UE to AS on mobile edge so that a number of child UEs’ data can be aggregated in one parent UE that located in mobile edge in operator trust domain. Thereafter the mobile edge may send the aggregated data to the AS on the internet cloud.
  • the process of FIG. 11 is about small data delivery from mobile edge (Parent UE) to UE (Child UE) .
  • the AS on mobile edge attaches the network and creates PDN connection, thereby getting an IP address.
  • the details of this block may be obtained from 3GPP TS 23.401, chapter 5.3.2.1 and 5.10.2.
  • the AS on cloud provisions the UE onboarding information (e.g. Child UE external ID, etc. ) to the AS on mobile edge that interface defined by AS.
  • the AS on Mobile Edge sends NIDD Configuration Request (including External ID/MISDIN of Non-IP UE, AS on mobile edge Destination IP, APN) via 3GPP T8 (see, for example, TS 29.122) .
  • the SCEF sends the NIDD configuration to the HSS in terms of TS 23.682, chapter 5.13.2.
  • the AS on the cloud sends data to the AS on mobile edge.
  • the AS on mobile edge sends NIDD MT data to the SCEF via 3GPP T8 (see, for example, TS 29.122) .
  • the NIDD MT data is sent from the SCEF to the Non-IP Child UE (see, for example, TS 23.682, chapter 5.13.3) . Blocks 1102 to 1107 may be repeated for all Non-IP Child UEs.
  • the AS on mobile edge sends IP Data Delivery Configuration Request (including External ID/MISDIN of UE IP, AS on mobile edge Destination IP, APN) via 3GPP T8 extension.
  • IPDD configuration may also be sent from the SCEF to the HSS.
  • the IP UE attaches the network and creates IP PDN connection (see, for example, TS 23.401, chapter 5.3.2.1 and 5.10.2) .
  • the PGW sends IMSI, UE IP and APN to the SCEF via Radius or other pre-defined interface between SCEF and PGW.
  • the SCEF may inquire the PGW about IMSI, UE IP and APN via Radius or other pre-defined interface.
  • the AS on mobile edge sends MT data to the Child UE ID via SCEF 3GPP T8 API.
  • NIDD API of the SCEF may be reused for IP Data Delivery which is small data delivery typically based on UDP protocol.
  • the SCEF maps UE ID to UE IP, creates UDP packet and sends it to the Child UE via PGW SGi Interface.
  • the UE on IP PDN gets data from the SCEF via PGW. Blocks 1108 to 1112 may be repeated for all IP Child UEs. It should be noted that two blocks shown in succession in the above figures may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved.
  • FIG. 12 is a block diagram showing an apparatus suitable for use in practicing some embodiments of the disclosure.
  • the apparatus 1200 may include a processor 1210, a memory 1220 that stores a program, and a communication interface 1230 for communicating data with other external devices through wired and/or wireless communication.
  • the program includes program instructions that, when executed by the processor 1210, enable the apparatus 1200 to operate in accordance with the embodiments of the present disclosure, as discussed above. That is, the embodiments of the present disclosure may be implemented at least in part by computer software executable by the processor 1210, or by hardware, or by a combination of software and hardware.
  • the memory 1220 may be of any type suitable to the local technical environment and may be implemented using any suitable data storage technology, such as semiconductor based memory devices, flash memories, magnetic memory devices and systems, optical memory devices and systems, fixed memories and removable memories.
  • the processor 1210 may be of any type suitable to the local technical environment, and may include one or more of general purpose computers, special purpose computers, microprocessors, digital signal processors (DSPs) and processors based on multi-core processor architectures, as non-limiting examples.
  • FIG. 13 is a block diagram showing a network exposure node according to an embodiment of the disclosure.
  • the network exposure node 1300 comprises a first reception module 1302, a second reception module 1304 and a forwarding module 1306.
  • the first reception module 1302 may be configured to receive, from a first application server in operator trust domain, configuration information that can be used for data delivery for a terminal device, as described above with respect to block 302.
  • the second reception module 1304 may be configured to receive data from one of the terminal device and the first application server, as described above with respect to block 304.
  • the forwarding module 1306 may be configured to forward the data to the other of the terminal device and the first application server based on the configuration information, as described above with respect to block 306.
  • FIG. 14 is a block diagram showing an application server in operator trust domain according to an embodiment of the disclosure.
  • the application server 1400 comprises a sending module 1402 and a transceiving module 1404.
  • the sending module 1402 may be configured to send, to a network exposure node, configuration information that can be used for data delivery for a terminal device, as described above with respect to block 702.
  • the transceiving module 1404 may be configured to receive data from the terminal device via the network exposure node or send data to the terminal device via the network exposure node, as described above with respect to block 704.
  • the modules described above may be implemented by hardware, or software, or a combination of both.
  • the various exemplary embodiments may be implemented in hardware or special purpose circuits, software, logic or any combination thereof.
  • some aspects may be implemented in hardware, while other aspects may be implemented in firmware or software which may be executed by a controller, microprocessor or other computing device, although the disclosure is not limited thereto.
  • firmware or software which may be executed by a controller, microprocessor or other computing device, although the disclosure is not limited thereto.
  • While various aspects of the exemplary embodiments of this disclosure may be illustrated and described as block diagrams, flow charts, or using some other pictorial representation, it is well understood that these blocks, apparatus, systems, techniques or methods described herein may be implemented in, as non-limiting examples, hardware, software, firmware, special purpose circuits or logic, general purpose hardware or controller or other computing devices, or some combination thereof.
  • the exemplary embodiments of the disclosure may be practiced in various components such as integrated circuit chips and modules. It should thus be appreciated that the exemplary embodiments of this disclosure may be realized in an apparatus that is embodied as an integrated circuit, where the integrated circuit may comprise circuitry (as well as possibly firmware) for embodying at least one or more of a data processor, a digital signal processor, baseband circuitry and radio frequency circuitry that are configurable so as to operate in accordance with the exemplary embodiments of this disclosure.
  • exemplary embodiments of the disclosure may be embodied in computer-executable instructions, such as in one or more program modules, executed by one or more computers or other devices.
  • program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types when executed by a processor in a computer or other device.
  • the computer executable instructions may be stored on a computer readable medium such as a hard disk, optical disk, removable storage media, solid state memory, RAM, etc.
  • the function of the program modules may be combined or distributed as desired in various embodiments.
  • the function may be embodied in whole or in part in firmware or hardware equivalents such as integrated circuits, field programmable gate arrays (FPGA) , and the like.
  • FPGA field programmable gate arrays

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

Methods and apparatuses are disclosed for data communication between terminal device and application server. According to an embodiment, a network exposure node receives, from a first application server in operator trust domain, configuration information that can be used for data delivery for a terminal device. The network exposure node receives data from one of the terminal device and the first application server and forwards the data to the other of the terminal device and the first application server based on the configuration information.

Description

METHODS AND APPARATUSES FOR DATA COMMUNICATION BETWEEN TERMINAL DEVICE AND APPLICATION SERVER Technical Field
Embodiments of the disclosure generally relate to communication, and, more particularly, to methods and apparatuses for data communication between terminal device and application server.
Background
This section introduces aspects that may facilitate better understanding of the present disclosure. Accordingly, the statements of this section are to be read in this light and are not to be understood as admissions about what is in the prior art or what is not in the prior art.
Service capability exposure function (SCEF) or equivalent functional entity in the 5th generation (5G) core called as network exposure function (NEF) is the key entity within the 3rd generation partnership project (3GPP) architecture for service capability exposure that provides a means to securely expose the services and capabilities provided by 3GPP network interfaces through application programming interfaces (APIs) to application servers. SCEF or NEF provides small data delivery or network Internet of things (IoT) message function (especially non-Internet protocol (non-IP) data delivery) from user equipment (UE) to application server (AS) .
Summary
This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the detailed description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
One of the objects of the disclosure is to provide an improved solution for data communication between terminal device and application server.
According to a first aspect of the disclosure, there is provided a method implemented at a network exposure node. The method may comprise receiving, from a first application server in operator trust domain, configuration information that can be used for data delivery for a terminal device. The method may further comprise receiving data from one of the terminal device and the first application server. The method may further comprise forwarding the data to the other of the terminal device and the first application server based on the configuration information.
In an embodiment of the disclosure, the first application server may be deployed in operator mobile edge.
In an embodiment of the disclosure, the configuration information may comprise identity (ID) information of the terminal device, network address information of the first application server and an access point name (APN) . The data may be received from the terminal device and forwarded to the first application server based on the network address information of the first application server corresponding to the ID information of the terminal device and the APN.
In an embodiment of the disclosure, the configuration information may comprise ID information of the terminal device, ID information of the first application server and an APN. The method may further comprise obtaining, from a packet gateway node, the ID information and corresponding current network address information of the first application server. The data may be received from the terminal device and forwarded to the first application server based on the current address information of the first application server corresponding to the ID information of the terminal device and the APN.
In an embodiment of the disclosure, the configuration information may comprise network address or ID information of at least one additional destination to which data is to be delivered from the terminal device. The method may further comprise forwarding the data received from the terminal device to the at least one additional destination based on the configuration information.
In an embodiment of the disclosure, one of the at least one additional destination may be a second application server in Internet domain.
In an embodiment of the disclosure, the data may be received from the terminal device in a form of Internet protocol (IP) data or non-IP data. The IP data may be forwarded through a same interface as that used for the non-IP data.
In an embodiment of the disclosure, the data may be received from the first application server in a form of non-IP data or IP data. The IP data may be received from the first application server through a same interface as that used for the non-IP data.
In an embodiment of the disclosure, the configuration information may comprise ID information of the terminal device, network address or ID information of the first application server and an APN. The data may be received from the first application server in a form of IP data. The method may further comprise obtaining, from a packet gateway node, the ID information and corresponding current network address information of the terminal device. The IP data may be forwarded to the terminal device based on the current network address information of the terminal device corresponding to the ID information of the terminal device.
In an embodiment of the disclosure, the network exposure node may be an SCEF or NEF and the same interface may be T8 non-IP data delivery (NIDD) interface.
In an embodiment of the disclosure, the ID information may be an external ID or a mobile subscriber international integrated service digital network (ISDN) number (MSISDN) and the network address information may be a uniform resource identifier (URI) .
According to a second aspect of the disclosure, there is provided a method implemented at an application server in operator trust domain. The method may comprise sending, to a network exposure node, configuration information that can be  used for data delivery for a terminal device. The method may further comprise receiving data from the terminal device via the network exposure node or sending data to the terminal device via the network exposure node.
In an embodiment of the disclosure, the application server may be deployed in operator mobile edge.
In an embodiment of the disclosure, the configuration information may comprise network address or ID information of the application server and at least one additional destination to which data is to be delivered from the terminal device via the network exposure node.
In an embodiment of the disclosure, the data may be received via the network exposure node in a form of IP data or non-IP data. The IP data is received through a same interface of the network exposure node as that used for the non-IP data.
In an embodiment of the disclosure, the data may be sent via the network exposure node in a form of IP data or non-IP data. The IP data may be sent through a same interface of the network exposure node as that used for the non-IP data.
In an embodiment of the disclosure, the network exposure node may be an SCEF or NEF and the same interface is T8 NIDD interface.
According to a third aspect of the disclosure, there is provided a network exposure node. The network exposure node may comprise at least one processor and at least one memory. The at least one memory may contain instructions executable by the at least one processor, whereby the network exposure node may be operative to receive, from a first application server in operator trust domain, configuration information that can be used for data delivery for a terminal device. The network exposure node may be further operative to receive data from one of the terminal device and the first application server. The network exposure node may be further operative to forward the data to the other of the terminal device and the first application server based on the configuration information.
In an embodiment of the disclosure, the network exposure node may be operative to perform the method according to the above first aspect.
According to a fourth aspect of the disclosure, there is provided an application server in operator trust domain. The application server may comprise at least one processor and at least one memory. The at least one memory may contain instructions executable by the at least one processor, whereby the application server may be operative to send, to a network exposure node, configuration information that can be used for data delivery for a terminal device. The application server may be further operative to receive data from the terminal device via the network exposure node or send data to the terminal device via the network exposure node.
In an embodiment of the disclosure, the application server may be operative to perform the method according to the above second aspect.
According to a fifth aspect of the disclosure, there is provided a computer program product. The computer program product may comprise instructions which when executed by at least one processor, cause the at least one processor to perform the method according to the above first or second aspect.
According to a sixth aspect of the disclosure, there is provided a computer readable storage medium. The computer readable storage medium may comprise instructions which when executed by at least one processor, cause the at least one processor to perform the method according to the above first or second aspect.
According to a seventh aspect of the disclosure, there is provided a network exposure node. The network exposure node may comprise a first reception module for receiving, from a first application server in operator trust domain, configuration information that can be used for data delivery for a terminal device. The network exposure node may further comprise a second reception module for receiving data from one of the terminal device and the first application server. The network exposure node may further comprise a forwarding module for forwarding the data to the other  of the terminal device and the first application server based on the configuration information.
According to an eighth aspect of the disclosure, there is provided an application server in operator trust domain. The application server may comprise a sending module for sending, to a network exposure node, configuration information that can be used for data delivery for a terminal device. The application server may further comprise a transceiving module for receiving data from the terminal device via the network exposure node or sending data to the terminal device via the network exposure node.
According to some embodiment (s) of the disclosure, the data communication between a terminal device and an application server in operator trust domain can be facilitated.
Brief Description of the Drawings
These and other objects, features and advantages of the disclosure will become apparent from the following detailed description of illustrative embodiments thereof, which are to be read in connection with the accompanying drawings.
FIG. 1 is a diagram showing an existing communication system for environment monitoring;
FIG. 2 is a diagram showing an exemplary communication system according to an embodiment of the disclosure;
FIG. 3 is a flowchart illustrating a method implemented at a network exposure node according to an embodiment of the disclosure;
FIG. 4 is a flowchart illustrating a method implemented at a network exposure node according to another embodiment of the disclosure;
FIG. 5 is a flowchart illustrating a method implemented at a network exposure node according to another embodiment of the disclosure;
FIG. 6 is a flowchart illustrating a method implemented at a network exposure node according to another embodiment of the disclosure;
FIG. 7 is a flowchart illustrating a method implemented at an application server according to an embodiment of the disclosure;
FIG. 8 is a flowchart for explaining the method of FIG. 7;
FIG. 9 is a flowchart illustrating an exemplary process according to an embodiment of the disclosure;
FIG. 10 is a flowchart illustrating an exemplary process according to another embodiment of the disclosure;
FIG. 11 is a flowchart illustrating an exemplary process according to another embodiment of the disclosure;
FIG. 12 is a block diagram showing an apparatus suitable for use in practicing some embodiments of the disclosure;
FIG. 13 is a block diagram showing a network exposure node according to an embodiment of the disclosure; and
FIG. 14 is a block diagram showing an application server according to an embodiment of the disclosure..
Detailed Description
For the purpose of explanation, details are set forth in the following description in order to provide a thorough understanding of the embodiments disclosed. It is apparent, however, to those skilled in the art that the embodiments may be implemented without these specific details or with an equivalent arrangement.
There may be use cases that data communication from UE to application server (AS) on mobile edge communication and then to AS on the cloud is required. One example for such use cases may be environmental monitoring and management. It is becoming more important, as managing the environment and understanding its impacts drives increasing amounts of regulation and activities to reduce pollution.  Internet of things (IoT) sensors are able to give accurate real-time data on the environment around us to help us understand how we affect the environment and take actions to improve quality of life in cities.
Environmental sensors have been reduced in size and cost. They are now readily available and can be installed at many points across a city. Mobile technology has also advanced to provide a robust connectivity solution, cellular IoT (CIoT) , that enables these sensors to be deployed efficiently and effectively by city authorities and other bodies.
Cities can measure many parameters as part of an environmental monitoring deployment that utilizes connected IoT sensors, including air and water quality, weather, noise, smoke and other attributes that may affect quality of life in a city including those related to disaster management, such as the earthquake and flood sensors.
In order to control these emissions, the city first needs to know both where the pollution hotspots are and how the pollution is generated. With this information, cities can plan for cleaner air by incentivizing the drivers of polluting vehicles to stay away or changing road layouts to direct traffic away from sensitive area. More information related to environmental monitoring use case and solution may refer to global system for mobile communications (GSM) association (GSMA) “Environmental Monitoring: A Guide to Ensuring a Successful Mobile IoT Deployment” .
The following table shows an example CIoT SCEF or NEF technology as the mobile data delivery for network IoT message function in environment monitoring business scenario to bridge among UEs, application sever on mobile edge and application server on the cloud.
Figure PCTCN2020073263-appb-000001
Figure PCTCN2020073263-appb-000002
FIG. 1 is a diagram showing an existing communication system for environment monitoring use case. As shown, the communication system comprises an operator trust domain and an Internet domain. In the operator trust domain, there are UEs (e.g. IoT sensors) supporting non-IP data delivery (NIDD) , UEs (e.g. IoT sensors) supporting IP data delivery (IPDD) , an application server on mobile edge (e.g. an environment monitoring local station) , radio access networks (RANs) , a home  subscriber server (HSS) , a mobility management entity (MME) , a packet data network (PDN) gateway (PGW) , and a network exposure function (NEF) /service capability exposure function (SCEF) . The term “on mobile edge” may refer to “at the edge of a cellular network” . In the Internet domain, there is an application server such as an environment monitoring and management system on the cloud.
Small data communication includes infrequent and frequent small data transmission aiming to support efficient small data transmissions for CIoT, e.g. tracking devices for both mobile originated (MO) and mobile terminated (MT) use cases. It is expected that the number of such devices can increase exponentially, but the data size per device will remain small. For the small data communication, there is no UE to UE communication defined in 3GPP technical specification (TS) 23.682. UE will always communicate with the application server first (especially the application server on the cloud) via the internet connection outside the operator trust domain before communicating with other UEs. For example, in the existing system shown in FIG. 1, the application server on the cloud is the main routing node for UEs’ communications and all UEs communicate with the application server on the cloud. This is not efficient when massive UEs need to communicate with the application server on mobile edge which may be considered as a parent UE. In addition, CIoT UE normally will go for sleep mode and thus need network IoT message function in the operator trust domain.
The present disclosure proposes improved solutions for data communication between terminal device and application server. Hereinafter, the solutions will be described in detail with reference to FIGs. 2-14.
FIG. 2 is a diagram showing an exemplary communication system according to an embodiment of the disclosure. Compared with the existing system shown in FIG. 1, the SCEF or NEF is used to play as network IoT message function for routing UE to UE communication within the operator trust domain in this embodiment. For example, a child UE can send data to the application server on mobile edge via non-IP PDN. The child UE’s non-IP data can be routed to the application server on mobile  edge via the NEF/SCEF. Similarly, a child UE can send data to the application server on mobile edge via IP PDN. The child UE’s IP data can be routed to the application server on mobile edge via the NEF/SCEF. The application server on mobile edge can send child UEs’ aggregate data to the application server on the cloud.
It should be noted that RANs are omitted in FIG. 2 for brevity and the number of each entity shown in FIG. 2 may be more than one. Although environment monitoring use case is shown in FIG. 2, it is merely an exemplary example for illustration purpose. Those skilled in the art will understand that the principle of the present disclosure may also be applicable to any other case in which data communication between a terminal device and an application server in operator trust domain is required. It should also be noted that the HSS, the MME and the PGW are merely exemplary examples of the components in the communication system and may be replaced by components with similar functionalities. For example, in the fifth generation (5G) core network (CN) , the HSS may be replaced by a unified data management (UDM) , the MME may be replaced by an access and mobility management function (AMF) , and the PGW may be replaced by a user plane function (UPF) . That is, the principle of the present disclosure may be reused for data delivery in both 5G and 4G networks.
The term UE may also be referred to as, for example, terminal device, access terminal, mobile station, mobile unit, subscriber station, or the like. It may refer to any end device that can access a wireless communication network and receive services therefrom. By way of example and not limitation, the UE may include a portable computer, an image capture terminal device such as a digital camera, a gaming terminal device, a music storage and playback appliance, a mobile phone, a cellular phone, a smart phone, a tablet, a wearable device, a personal digital assistant (PDA) , or the like.
In an Internet of things (IoT) scenario, a UE may represent a machine or other device that performs monitoring and/or measurements, and transmits the results of such monitoring and/or measurements to another UE and/or a network equipment. In  this case, the UE may be a machine-to-machine (M2M) device, which may, in a 3GPP context, be referred to as a machine-type communication (MTC) device. Particular examples of such machines or devices may include sensors, metering devices such as power meters, industrial machineries, bikes, vehicles, or home or personal appliances, e.g. refrigerators, televisions, personal wearables such as watches, and so on.
FIG. 3 is a flowchart illustrating a method implemented at a network exposure node according to an embodiment of the disclosure. The network exposure node may take the form of an SCEF, an NEF, or any other entity having similar functionality. At block 302, the network exposure node receives, from a first application server in operator trust domain, configuration information that can be used for data delivery for a terminal device. For example, the first application server may be deployed on operator mobile edge. In environment monitoring use case, it may act as an environment monitoring local station. For a terminal device supporting NIDD, the configuration information may be received in an NIDD configuration request message. For a terminal device supporting IPDD, the configuration information may be received in an IPDD configuration request message. In a case that the network exposure node is an SCEF or NEF, NIDD configuration interface (e.g. API) such as that defined in 3GPP TS 29.122 may be reused for IPDD configuration.
Depending on whether the first application server has a static or dynamic IP address and the direction of data delivery between the terminal device and the first application server, there may be three options. In the first option, the first application server has a static IP address and data is delivered from the terminal device to the first application server. In the second option, the first application server has a dynamic IP address and data is delivered from the terminal device to the first application server. In the third option, the first application server has a static or dynamic IP address and data is delivered from the first application server to the terminal device. For example, block 302 may implemented as block 402 in the first option, as block 502 in the second option, and as block 602 in the third option, which will be described later.
At block 304, the network exposure node receives data from one of the terminal device and the first application server. For example, block 304 may implemented as block 404 in the first option, as block 504 in the second option, and as block 604 in the third option, which will be described later. At block 306, the network exposure node forwards the data to the other of the terminal device and the first application server based on the configuration information. For example, block 306 may be implemented as block 406 in the first option, as block 506 in the second option, and as block 606 in the third option, which will be described later. In this way, since the network exposure node instead of the application server on the cloud is used as the routing node, a more easy way can be provided to route the communication between the terminal device and the application server within the operator trust domain.
FIG. 4 is a flowchart illustrating a method implemented at a network exposure node according to another embodiment of the disclosure. The method corresponds to the first option described above. At block 402, the network exposure node receives, from a first application server in operator trust domain, configuration information that contains identity (ID) information of the terminal device, network address information of the first application server and an APN. Since the first application server has a static IP address in this option, the configuration information contains the network address information of the first application server. For example, this network address information may be a URI of the first application server, which may be translated to a corresponding IP address. The ID information of the terminal device may be an external ID or an MSISDN of the terminal device. The APN refers to an access point name via which the network address information of the first application server is reachable.
At block 404, the network exposure node receives data from the terminal device. For the terminal device supporting NIDD, the data may be received through NIDD procedure such as that defined in 3GPP TS 23.682. For the terminal device supporting IPDD, the data may be received via a packet gateway node such as a PGW.  At block 406, the network exposure node forwards the data to the first application server based on the network address information of the first application server corresponding to the ID information of the terminal device and the APN. For example, due to the reception of the data from the terminal device, the ID information of the terminal device and the APN may be known by the network exposure node. Based on this combination of the ID information and the APN, the network address information of the first application server corresponding to this combination may be determined from the configuration information received at block 402. Then, the determined network address information may be used for forwarding the data to the first application server. For the terminal device supporting NIDD, the data may be forwarded through T8 NIDD interface such as that defined in 3GPP TS 29.122. For the terminal device supporting IPDD, the T8 NIDD interface may be reused for forwarding the data.
Optionally, the configuration information received at block 402 may further contain network address information of at least one additional destination to which data is to be delivered from the terminal device. Accordingly, optionally, at block 408, the network exposure node may forward the data to the at least one additional destination based on the configuration information. For example, one of the at least one additional destination may be a second application server in Internet domain.
FIG. 5 is a flowchart illustrating a method implemented at a network exposure node according to another embodiment of the disclosure. The method corresponds to the second option described above. At block 502, the network exposure node receives, from a first application server in operator trust domain, configuration information that contains ID information of the terminal device, ID information of the first application server and an APN. Since the first application server has a dynamic IP address in this option, the configuration information contains ID information instead of network address information of the first application server. For example, the ID information of the first application server may be an external ID or an MSISDN of the first application server which may also be considered as a parent UE. At block 503, the  network exposure node obtains, from a packet gateway node, the ID information and corresponding current network address information of the first application server. The packet gateway node may be a PGW or any other entity having similar functionality. For example, the packet gateway node may send the information actively or the network exposure node may inquire the packet gateway node about the information.
At block 504, the network exposure node receives data from the terminal device. Block 504 may be the same as block 404 and its details are omitted here. At block 506, the network exposure node forwards the data to the first application server based on the current address information of the first application server corresponding to the ID information of the terminal device and the APN. For example, due to the reception of the data from the terminal device, the ID information of the terminal device and the APN may be known by the network exposure node. Based on this combination of the ID information and the APN, the ID information of the first application server corresponding to this combination may be determined from the configuration information received at block 502. Then, the current network address information of the first application server corresponding to its ID information may be determined from the information obtained at block 503. Then, the determined current network address information may be used for forwarding the data to the first application server.
Optionally, the configuration information received at block 502 may further contain ID information of at least one additional destination to which data is to be delivered from the terminal device. Accordingly, at block 508, the network exposure node may forward the data to the at least one additional destination based at least on the configuration information. Specifically, the current network address information of the at least one additional destination may be determined in a way similar to  blocks  503 and 506. Then, the data may be forwarded based on the determined current network address information.
FIG. 6 is a flowchart illustrating a method implemented at a network exposure node according to another embodiment of the disclosure. The method corresponds to  the third option described above. At block 602, the network exposure node receives, from a first application server in operator trust domain, configuration information that contains ID information of the terminal device, network address or ID information of the first application server and an APN. For example, block 602 may be implemented as  block  402 or 502. At block 603, the network exposure node obtains, from a packet gateway node, the ID information and corresponding current network address information of the terminal device. For example, the packet gateway node may send the information actively or the network exposure node may inquire the packet gateway node about the information.
At block 604, the network exposure node receives data from the first application server. The data may be received in the form of non-IP data or IP data. For the case of the non-IP data, it may be received through T8 NIDD interface such as that defined in 3GPP TS 29.122. For the case of the IP data, the T8 NIDD interface may be reused for receiving the data. At block 606, the network exposure node forwards the data to the terminal device based on the current network address information of the terminal device corresponding to the ID information of the terminal device. For example, due to the reception of the data from the terminal device, the ID information of the terminal device and the APN may be known by the network exposure node. The current network address information of the terminal device corresponding to its ID information may be determined from the information obtained at block 603. Then, the determined network address information may be used for forwarding the data to the terminal device. For the case of the non-IP data, it may be forwarded through T8 NIDD procedure such as that defined in 3GPP TS 23.682. For the case of the IP data, it may be forwarded via a packet gateway node such as a PGW.
FIG. 7 is a flowchart illustrating a method implemented at an application server in operator trust domain according to an embodiment of the disclosure. For example, the application server may be deployed in operator mobile edge. At block 702, the application server sends, to a network exposure node, configuration information that can be used for data delivery for a terminal device. Block 702 may  correspond to block 402, 502 or 602 and its details are omitted here. Optionally, the configuration information may contain network address or ID information of the application server and at least one additional destination to which data is to be delivered from the terminal device via the network exposure node.
At block 704, the application server receives data from the terminal device via the network exposure node or sends data to the terminal device via the network exposure node. Corresponding to block 406 and 506, in the first and second options described above, the data may be received via the network exposure node in the form of IP data or non-IP data. The IP data may be received through a same interface of the network exposure node as that used for the non-IP data, as shown in block 704-1. Corresponding to block 606, in the third option described above, the data may be sent via the network exposure node in a form of IP data or non-IP data. The IP data may be sent through a same interface of the network exposure node as that used for the non-IP data, as shown in block 704-2.
FIGs. 9 to 11 are flowcharts each illustrating an exemplary process according to an embodiment of the disclosure. In these exemplary processes, SCEF or NEF is used as network IoT message function for routing UE to UE communication within operator trust domain, instead of UE always communicating with AS on the cloud via 3GPP T8 APIs. Thus, a more easy way can be provided to route UE to AS on mobile edge communication within operator trust domain. The process of FIG. 9 is about the small data delivery from UE to mobile edge when the parent UE has static IP allocation. It covers both NIDD and IPDD for UE to AS on mobile edge.
At block 901, the AS on mobile edge attaches the network and requests packet data network (PDN) connection, thereby getting an static IP address. For example, details of this block may be obtained from 3GPP TS 23.401, chapter 5.3.2.1. At block 902, the AS on cloud provisions UE onboarding information (e.g. child UE external ID, etc. ) to the AS on mobile edge via an interface defined between the application servers. At block 903, the AS on mobile edge sends a request to the SCEF for NIDD Configuration. The request includes External ID/MSISDN of Non-IP UE, AS on  mobile edge Destination IP and APN. The request may be sent via an interface such that defined in 3GPP T8 TS 29.122.
Optionally, the cardinality of ‘notificationDestination’ in the NIDD Configuration request may be changed from 1 to 1.. N in order to support multiple notification destination, as shown below.
Figure PCTCN2020073263-appb-000003
At block 903, in additional to the AS on mobile edge destination, the AS on the cloud destination may also be also added as NIDD MO destination address. In this way, the SCEF can support multiple destination data delivery in T8 Data Delivery API so that both the AS on mobile edge and the AS on the cloud can receive the child UE MO data.
At block 904, the SCEF sends the NIDD configuration to the HSS in terms of TS 23.682, chapter 5.13.2. At block 905, the child Non-IP UE sends NIDD Mobile Originated data to the SCEF in terms of TS 23.682, chapter 5.13.4. At block 906, the SCEF sends NIDD MO data to the AS on mobile edge via 3GPP T8 TS 29.122 NIDD API. Optionally, at block 907, the SCEF duplicates the child UE’s data payload and sends it to the AS on the cloud. The AS on the cloud address used for sending the data is defined in block 903 for NIDD Configuration. Blocks 902 to 907 may be repeated for all child Non-IP UEs.
At block 908, the AS on mobile edge sends IP Data Delivery Configuration Request (including External ID/MISDIN of UE IP, AS on mobile edge Destination IP, APN) via 3GPP T8 extension. In this way, the NIDD Configuration API (such as that defined in 3GPP TS 29.122) can be reused for IP Data Delivery Configuration. Optionally, the above ‘notificationUEDestination’ indicating multiple notification  destinations may be used for the UE communication routing address. The IPDD configuration may also be sent from the SCEF to the HSS.
At block 909, the IP UE attaches the network and creates IP PDN connectivity. The details of this block may be obtained from TS 23.401, chapter 5.3.2.1 and 5.10.2. At block 910, the UE on IP PDN sends data to the SCEF via PGW SGi interface and the UE traffic end point is the SCEF IP address. At block 911, the SCEF embeds IP UE MO data payload (typically is UDP based) in T8 NIDD MO API to the AS on mobile edge (based on the NIDD configuration notification destination) via 3GPP T8 extension. In this way, the 3GPP T8 NIDD API can be reused for IP data delivery to make common APIs for small data delivery in both Non-IP and IP connection. That is, T8 interface is reused for IP based small data delivery that typically is UDP based data. Optionally, at block 912, the SCEF duplicates the child UE’s data payload and sends it to the AS on the cloud. The AS on the cloud address used for sending the data is defined in block 903 for NIDD Configuration. Blocks 908 to blocks 912 may be repeated for all Child IP UEs.
The process of FIG. 10 is about small data delivery from UE to mobile edge and the parent UE has dynamic IP allocation. At block 1001, the AS on mobile edge attaches the network and requests PDN connection, thereby getting a dynamic IP address. For example, details of this block may be obtained from 3GPP TS 23.401, chapter 5.3.2.1 and 5.10.2. At block 1002, the PGW sends IMSI, UE IP and APN to the SCEF via Radius or other pre-defined interface between the SCEF and the PGW. Alternatively, the SCEF may inquire the PGW about IMSI, UE IP and APN via Radius or other pre-defined interface. At block 1003, the AS on cloud provisions the UE onboarding information (e.g. child UE external ID, etc. ) to the AS on mobile edge , which interface define by Application Server.
At block 1004, the AS on mobile edge sends NIDD Configuration Request to the SCEF (including External ID/MISDIN of Non-IP UE, AS on mobile edge Destination such as Parent UE External ID, APN) via 3GPP T8 API such as that  defined in 3GPP TS 29.122. For example, the following attribute may be added in the definition of type ‘NiddConfiguration’ for UE communication route address, instead of the 3GPP defined ‘notificationDestination’ that is URI.
Figure PCTCN2020073263-appb-000004
Optionally, this NIDD Configuration may also reuse block 903 for changing the cardinality of ‘notificationDestination’ from 1 to 1.. N in order to support the multiple notification destination.
At block 1005, the SCEF sends NIDD Configuration to the HSS in terms of TS 23.682, chapter 5.13.2. At block 1006, the Non-IP Child UE sends NIDD Mobile Originated data to the SCEF. The details of this block may be obtained from TS 23.682, chapter 5.13.4. At block 1007, the SCEF uses NIDD configuration ‘notificationUEdestination’ to get the AS on mobile edge IP address, and send NIDD MO data to the AS on mobile edge via 3GPP T8 (see, for example, TS 29.122) . Optionally, at block 1008, the SCEF duplicates the child UE’s data payload and sends it to the AS on the cloud. The AS on the cloud address used for sending the data is defined in block 1004 for NIDD Configuration. Blocks 1003 to 1008 may be repeated for all Child Non-IP UEs.
At block 1009, the AS on mobile edge sends IP Data Delivery Configuration Request (External ID/MISDIN of UE IP, AS on mobile edge Destination such as Parent UE External ID, APN) via 3GPP T8 extension. In this way, NIDD Configuration API such as that defined in 3GPP TS 29.122 can be reused for IP Data Delivery Configuration. Optionally, this IPDD Configuration may also reuse block 903 for changing the cardinality of ‘notificationDestination’ from 1 to 1.. N in order to support the multiple notification destination.
At block 1010, the IP UE attaches the network and create IP PDN connectivity. The details of this block may be obtained from TS 23.401, chapter 5.3.2.1 and 5.10.2. At block 1011, the PGW sends IMSI, UE IP and APN to the SCEF via Radius or other pre-defined interface between SCEF and PGW. Alternatively, the SCEF may inquire the PGW about IMSI, UE IP and APN via Radius or other pre-defined interface. At block 1012, the UE on IP PDN sends data to the SCEF via PGW and the UE traffic end point is the SCEF IP address. At block 1013, the SCEF sends MO data to the AS on mobile edge (based on the AS address mapped with the UE ID and APN) via 3GPP T8 extension. Optionally, at block 1014, the SCEF duplicates the child UE’s data payload and sends it to the AS on the cloud. The AS on the cloud address used for sending the data is defined in ‘notificationDestination’ in the definition of ‘NiddConfiguration’A PI in 3GPP TS 29.122 T8 APIs (see, for example, chapter 5.6.2.1.2) . Blocks 1009 to 1014 may be repeated for all Child IP UEs.
In the process of FIG. 10, 3GPP T8 API NIDD Configuration is proposed to add Parent UE External ID or MSISDN, so that the SCEF can map the Parent UE External ID or MSISDN to Parent UE IP address (thus supporting dynamic IP allocation) for providing the way to route UE data towards AS on mobile edge. The exemplary processes shown in FIGs. 9 and 10 can be applied to the communication from UE to AS on mobile edge so that a number of child UEs’ data can be aggregated in one parent UE that located in mobile edge in operator trust domain. Thereafter the mobile edge may send the aggregated data to the AS on the internet cloud.
The process of FIG. 11 is about small data delivery from mobile edge (Parent UE) to UE (Child UE) . At block 1101, the AS on mobile edge attaches the network and creates PDN connection, thereby getting an IP address. The details of this block may be obtained from 3GPP TS 23.401, chapter 5.3.2.1 and 5.10.2. At block 1102, the AS on cloud provisions the UE onboarding information (e.g. Child UE external ID, etc. ) to the AS on mobile edge that interface defined by AS. At block 1103, the AS on Mobile Edge sends NIDD Configuration Request (including External ID/MISDIN of Non-IP UE, AS on mobile edge Destination IP, APN) via 3GPP T8 (see, for example,  TS 29.122) . At block 1104, the SCEF sends the NIDD configuration to the HSS in terms of TS 23.682, chapter 5.13.2.
At block 1105, the AS on the cloud sends data to the AS on mobile edge. At block 1106, the AS on mobile edge sends NIDD MT data to the SCEF via 3GPP T8 (see, for example, TS 29.122) . At block 1107, the NIDD MT data is sent from the SCEF to the Non-IP Child UE (see, for example, TS 23.682, chapter 5.13.3) . Blocks 1102 to 1107 may be repeated for all Non-IP Child UEs.
At block 1108, the AS on mobile edge sends IP Data Delivery Configuration Request (including External ID/MISDIN of UE IP, AS on mobile edge Destination IP, APN) via 3GPP T8 extension. Optionally, the above ‘notificationUEDestination’ indicating multiple notification destinations may be used for the UE communication routing address. The IPDD configuration may also be sent from the SCEF to the HSS. At block 1109, the IP UE attaches the network and creates IP PDN connection (see, for example, TS 23.401, chapter 5.3.2.1 and 5.10.2) . At block 1109, the PGW sends IMSI, UE IP and APN to the SCEF via Radius or other pre-defined interface between SCEF and PGW. Alternatively, the SCEF may inquire the PGW about IMSI, UE IP and APN via Radius or other pre-defined interface.
At block 1110, the AS on mobile edge sends MT data to the Child UE ID via SCEF 3GPP T8 API. In this way, NIDD API of the SCEF may be reused for IP Data Delivery which is small data delivery typically based on UDP protocol. At block 1111, the SCEF maps UE ID to UE IP, creates UDP packet and sends it to the Child UE via PGW SGi Interface. At block 1112, the UE on IP PDN gets data from the SCEF via PGW. Blocks 1108 to 1112 may be repeated for all IP Child UEs. It should be noted that two blocks shown in succession in the above figures may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved.
FIG. 12 is a block diagram showing an apparatus suitable for use in practicing some embodiments of the disclosure. For example, any one of the network exposure  node and the application server described above may be implemented through the apparatus 1200. As shown, the apparatus 1200 may include a processor 1210, a memory 1220 that stores a program, and a communication interface 1230 for communicating data with other external devices through wired and/or wireless communication.
The program includes program instructions that, when executed by the processor 1210, enable the apparatus 1200 to operate in accordance with the embodiments of the present disclosure, as discussed above. That is, the embodiments of the present disclosure may be implemented at least in part by computer software executable by the processor 1210, or by hardware, or by a combination of software and hardware.
The memory 1220 may be of any type suitable to the local technical environment and may be implemented using any suitable data storage technology, such as semiconductor based memory devices, flash memories, magnetic memory devices and systems, optical memory devices and systems, fixed memories and removable memories. The processor 1210 may be of any type suitable to the local technical environment, and may include one or more of general purpose computers, special purpose computers, microprocessors, digital signal processors (DSPs) and processors based on multi-core processor architectures, as non-limiting examples.
FIG. 13 is a block diagram showing a network exposure node according to an embodiment of the disclosure. As shown, the network exposure node 1300 comprises a first reception module 1302, a second reception module 1304 and a forwarding module 1306. The first reception module 1302 may be configured to receive, from a first application server in operator trust domain, configuration information that can be used for data delivery for a terminal device, as described above with respect to block 302. The second reception module 1304 may be configured to receive data from one of the terminal device and the first application server, as described above with respect to block 304. The forwarding module 1306 may be configured to forward the data to  the other of the terminal device and the first application server based on the configuration information, as described above with respect to block 306.
FIG. 14 is a block diagram showing an application server in operator trust domain according to an embodiment of the disclosure. As shown, the application server 1400 comprises a sending module 1402 and a transceiving module 1404. The sending module 1402 may be configured to send, to a network exposure node, configuration information that can be used for data delivery for a terminal device, as described above with respect to block 702. The transceiving module 1404 may be configured to receive data from the terminal device via the network exposure node or send data to the terminal device via the network exposure node, as described above with respect to block 704. The modules described above may be implemented by hardware, or software, or a combination of both.
In general, the various exemplary embodiments may be implemented in hardware or special purpose circuits, software, logic or any combination thereof. For example, some aspects may be implemented in hardware, while other aspects may be implemented in firmware or software which may be executed by a controller, microprocessor or other computing device, although the disclosure is not limited thereto. While various aspects of the exemplary embodiments of this disclosure may be illustrated and described as block diagrams, flow charts, or using some other pictorial representation, it is well understood that these blocks, apparatus, systems, techniques or methods described herein may be implemented in, as non-limiting examples, hardware, software, firmware, special purpose circuits or logic, general purpose hardware or controller or other computing devices, or some combination thereof.
As such, it should be appreciated that at least some aspects of the exemplary embodiments of the disclosure may be practiced in various components such as integrated circuit chips and modules. It should thus be appreciated that the exemplary embodiments of this disclosure may be realized in an apparatus that is embodied as an integrated circuit, where the integrated circuit may comprise circuitry (as well as  possibly firmware) for embodying at least one or more of a data processor, a digital signal processor, baseband circuitry and radio frequency circuitry that are configurable so as to operate in accordance with the exemplary embodiments of this disclosure.
It should be appreciated that at least some aspects of the exemplary embodiments of the disclosure may be embodied in computer-executable instructions, such as in one or more program modules, executed by one or more computers or other devices. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types when executed by a processor in a computer or other device. The computer executable instructions may be stored on a computer readable medium such as a hard disk, optical disk, removable storage media, solid state memory, RAM, etc. As will be appreciated by one of skill in the art, the function of the program modules may be combined or distributed as desired in various embodiments. In addition, the function may be embodied in whole or in part in firmware or hardware equivalents such as integrated circuits, field programmable gate arrays (FPGA) , and the like.
References in the present disclosure to “one embodiment” , “an embodiment” and so on, indicate that the embodiment described may include a particular feature, structure, or characteristic, but it is not necessary that every embodiment includes the particular feature, structure, or characteristic. Moreover, such phrases are not necessarily referring to the same embodiment. Further, when a particular feature, structure, or characteristic is described in connection with an embodiment, it is submitted that it is within the knowledge of one skilled in the art to implement such feature, structure, or characteristic in connection with other embodiments whether or not explicitly described.
It should be understood that, although the terms “first” , “second” and so on may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, a first element could be termed a second element, and similarly, a  second element could be termed a first element, without departing from the scope of the disclosure. As used herein, the term “and/or” includes any and all combinations of one or more of the associated listed terms.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to limit the present disclosure. As used herein, the singular forms “a” , “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises” , “comprising” , “has” , “having” , “includes” and/or “including” , when used herein, specify the presence of stated features, elements, and/or components, but do not preclude the presence or addition of one or more other features, elements, components and/or combinations thereof. The terms “connect” , “connects” , “connecting” and/or “connected” used herein cover the direct and/or indirect connection between two elements.
The present disclosure includes any novel feature or combination of features disclosed herein either explicitly or any generalization thereof. Various modifications and adaptations to the foregoing exemplary embodiments of this disclosure may become apparent to those skilled in the relevant arts in view of the foregoing description, when read in conjunction with the accompanying drawings. However, any and all modifications will still fall within the scope of the non-Limiting and exemplary embodiments of this disclosure.

Claims (22)

  1. A method implemented at a network exposure node, the method comprising:
    receiving (302) , from a first application server in operator trust domain, configuration information that can be used for data delivery for a terminal device;
    receiving (304) data from one of the terminal device and the first application server; and
    forwarding (306) the data to the other of the terminal device and the first application server based on the configuration information.
  2. The method according to claim 1, wherein the first application server is deplyoed in operator mobile edge.
  3. The method according to claim 1 or 2, wherein the configuration information comprises identity, ID, information of the terminal device, network address information of the first application server and an access point name, APN; and
    wherein the data is received (404) from the terminal device and forwarded (406) to the first application server based on the network address information of the first application server corresponding to the ID information of the terminal device and the APN.
  4. The method according to claim 1 or 2, wherein the configuration information comprises ID information of the terminal device, ID information of the first application server and an APN;
    wherein the method further comprises: obtaining (503) , from a packet gateway node, the ID information and corresponding current network address information of the first application server; and
    wherein the data is received (504) from the terminal device and forwarded (506) to the first application server based on the current address information of the first application server corresponding to the ID information of the terminal device and the APN.
  5. The method according to any of claims 1 to 4, the configuration information comprises network address or ID information of at least one additional destination to which data is to be delivered from the terminal device; and
    wherein the method further comprises: forwarding (408, 508) the data received from the terminal device to the at least one additional destination based on the configuration information.
  6. The method according to claim 5, wherein one of the at least one additional destination is a second application server in Internet domain.
  7. The method according to any of claims 1 to 6, wherein the data is received from the terminal device in a form of Internet protocol, IP, data or non-IP data; and
    wherin the IP data is forwarded through a same interface as that used for the non-IP data.
  8. The method according to claim 1, wherein the data is received from the first application server in a form of non-IP data or IP data; and
    wherein the IP data is received from the first application server through a same interface as that used for the non-IP data.
  9. The method according to claim 8, wherein the configuration information comprises ID information of the terminal device, network address or ID information of the first application server and an APN;
    wherein the data is received from the first application server in a form of IP data, and the method further comprises: obtaining (603) , from a packet gateway node, the ID information and corresponding current network address information of the terminal device; and
    wherein the IP data is forwarded (606) to the terminal device based on the current network address information of the terminal device corresponding to the ID information of the terminal device.
  10. The method according to claim 7 or 8, wherein the network exposure node is a service capability exposure function, SCEF, or network exposure function, NEF, and the same interface is T8 non-IP data delivery, NIDD, interface.
  11. The method according to any of claims 3 to 6 and 9, wherein the ID information is an external ID or a mobile subscriber international ISDN number, MSISDN, and the network address information is a uniform resource identifier, URI.
  12. A method implemented at an application server in operator trust domain, the method comprising:
    sending (702) , to a network exposure node, configuration information that can be used for data delivery for a terminal device; and
    receiving (704) data from the terminal device via the network exposure node or sending data to the terminal device via the network exposure node.
  13. The method according to claim 12, wherein the application server is deplyoed in operator mobile edge.
  14. The method according to claim 12 or 13, wherein the configuration information comprises network address or identity, ID, information of the application server and at least one additional destination to which data is to be delivered from the terminal device via the network exposure node.
  15. The method according to claim 12 or 13, wherein the data is received via the network exposure node in a form of Internet protocol, IP, data or non-IP data; and
    wherin the IP data is received (704-1) through a same interface of the network exposure node as that used for the non-IP data.
  16. The method according to claim 12 or 13, wherein the data is sent via the network exposure node in a form of IP data or non-IP data; and
    wherin the IP data is sent (704-2) through a same interface of the network exposure node as that used for the non-IP data.
  17. The method according to claim 15 or 16, wherein the network exposure node is a service capability exposure function, SCEF, or network exposure function, NEF, and the same interface is T8 non-IP data delivery, NIDD, interface.
  18. A network exposure node (1200) comprising:
    at least one processor (1210) ; and
    at least one memory (1220) , the at least one memory (1220) containing instructions executable by the at least one processor (1210) , whereby the network exposure node (1200) is operative to:
    receive, from a first application server in operator trust domain, configuration information that can be used for data delivery for a terminal device;
    receive data from one of the terminal device and the first application server; and
    forward the data to the other of the terminal device and the first application server based on the configuration information.
  19. The network exposure node (1200) according to claim 18, wherein the network exposure node (1200) is operative to perform the method according to any of claims 2 to 10.
  20. An application server (1200) in operator trust domain, the application server (1200) comprising:
    at least one processor (1210) ; and
    at least one memory (1220) , the at least one memory (1220) containing instructions executable by the at least one processor (1210) , whereby the application server (1200) is operative to:
    send, to a network exposure node, configuration information that can be used for data delivery for a terminal device; and
    receive data from the terminal device via the network exposure node or send data to the terminal device via the network exposure node.
  21. The application server (1200) according to claim 20, wherein the application server (1200) is operative to perform the method according to any of claims 12 to 15.
  22. A computer readable storage medium comprising instructions which when executed by at least one processor, cause the at least one processor to perform the method according to any of claims 1 to 17.
PCT/CN2020/073263 2019-01-25 2020-01-20 Methods and apparatuses for data communication between terminal device and application server WO2020151668A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP20745503.1A EP3915225A4 (en) 2019-01-25 2020-01-20 Methods and apparatuses for data communication between terminal device and application server
US17/419,882 US12052776B2 (en) 2019-01-25 2020-01-20 Methods and apparatuses for data communication between terminal device and application server

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2019073221 2019-01-25
CNPCT/CN2019/073221 2019-01-25

Publications (1)

Publication Number Publication Date
WO2020151668A1 true WO2020151668A1 (en) 2020-07-30

Family

ID=71736047

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/073263 WO2020151668A1 (en) 2019-01-25 2020-01-20 Methods and apparatuses for data communication between terminal device and application server

Country Status (3)

Country Link
US (1) US12052776B2 (en)
EP (1) EP3915225A4 (en)
WO (1) WO2020151668A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113923707A (en) * 2021-12-10 2022-01-11 中移(上海)信息通信科技有限公司 Terminal monitoring method, device, network equipment, control system and terminal
US12052316B2 (en) 2020-12-17 2024-07-30 Nokia Technologies Oy Efficient receiving of sensor measurements

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117408576B (en) * 2023-12-14 2024-03-26 鲁信科技股份有限公司 Product quality analysis method, device and medium based on industrial Internet

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107438290A (en) * 2016-05-25 2017-12-05 中兴通讯股份有限公司 Connection method for building up, SCEF entities, the MME of a kind of small data transmission
WO2018067956A1 (en) * 2016-10-06 2018-04-12 Convida Wireless, Llc Session management with relaying and charging for indirect connection for internet of things appplications in 3gpp network
CN108123783A (en) * 2016-11-29 2018-06-05 华为技术有限公司 Data transmission method, apparatus and system
CN108476394A (en) * 2016-01-18 2018-08-31 三星电子株式会社 The method and apparatus that terminal communicates in mobile communication system
WO2018166595A1 (en) * 2017-03-15 2018-09-20 Nokia Technologies Oy NEW GRANULARITY FOR IoT DATA TRANSFER FOR ANALYTICS
WO2018206101A1 (en) * 2017-05-10 2018-11-15 Nokia Solutions And Networks Oy Selection criteria for (non-ip) data destinations

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103430516B (en) 2013-02-21 2017-02-22 华为技术有限公司 Business providing system and method,mobile edge application server and support node thereof
WO2015144196A1 (en) * 2014-03-24 2015-10-01 Nokia Solutions And Networks Oy Solution for critical communication security based on mbms security
US11146985B2 (en) * 2015-10-28 2021-10-12 Apple Inc. Quality of service provisioning framework for a SDN-based cellular network architecture
EP3346753B1 (en) * 2015-11-06 2020-04-29 Samsung Electronics Co., Ltd. Method for transmitting data in ciot system and device therefor
WO2017113287A1 (en) * 2015-12-31 2017-07-06 华为技术有限公司 Method, base station, terminal and gateway for data transmission
US11444850B2 (en) * 2016-05-02 2022-09-13 Huawei Technologies Co., Ltd. Method and apparatus for communication network quality of service capability exposure
US10728739B2 (en) * 2017-09-18 2020-07-28 Qualcomm Incorporated Control plane based small data service
US10805401B2 (en) * 2018-11-29 2020-10-13 Cisco Technology, Inc. Method and apparatus for zero-touch bulk identity assignment, provisioning and network slice orchestration for massive IOT (MIOT) deployments

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108476394A (en) * 2016-01-18 2018-08-31 三星电子株式会社 The method and apparatus that terminal communicates in mobile communication system
CN107438290A (en) * 2016-05-25 2017-12-05 中兴通讯股份有限公司 Connection method for building up, SCEF entities, the MME of a kind of small data transmission
WO2018067956A1 (en) * 2016-10-06 2018-04-12 Convida Wireless, Llc Session management with relaying and charging for indirect connection for internet of things appplications in 3gpp network
CN108123783A (en) * 2016-11-29 2018-06-05 华为技术有限公司 Data transmission method, apparatus and system
WO2018166595A1 (en) * 2017-03-15 2018-09-20 Nokia Technologies Oy NEW GRANULARITY FOR IoT DATA TRANSFER FOR ANALYTICS
WO2018206101A1 (en) * 2017-05-10 2018-11-15 Nokia Solutions And Networks Oy Selection criteria for (non-ip) data destinations

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3915225A4 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US12052316B2 (en) 2020-12-17 2024-07-30 Nokia Technologies Oy Efficient receiving of sensor measurements
CN113923707A (en) * 2021-12-10 2022-01-11 中移(上海)信息通信科技有限公司 Terminal monitoring method, device, network equipment, control system and terminal
WO2023103669A1 (en) * 2021-12-10 2023-06-15 中移(上海)信息通信科技有限公司 Terminal monitoring method and apparatus, network device, control system and terminal

Also Published As

Publication number Publication date
EP3915225A1 (en) 2021-12-01
US12052776B2 (en) 2024-07-30
EP3915225A4 (en) 2022-08-24
US20220117014A1 (en) 2022-04-14

Similar Documents

Publication Publication Date Title
US11297660B2 (en) Session management with relaying and charging for indirect connection for internet of things applications in 3GPP network
US11706321B2 (en) System and method for using T8 API to deliver data over an IP path
WO2019144321A1 (en) Method and apparatus for improving service discovery
US10743278B2 (en) Method and a wireless device for collecting sensor data from a remote device having a limited range wireless communication capability
WO2020151668A1 (en) Methods and apparatuses for data communication between terminal device and application server
US20220240173A1 (en) Method and apparatus for managing network slice for terminal device
EP3984306B1 (en) Methods and apparatuses for logical tsn bridge
US20210160811A1 (en) Positioning Method and Communications Apparatus
US20230318942A1 (en) Network data analytic function node, network function node, and control method therefor
US20160234164A1 (en) Method and apparatus for providng push service in communication system
US11974199B2 (en) Methods and apparatuses for communication between LWM2M client and server
US20240121591A1 (en) Methods and apparatuses for event monitoring
US20220338156A1 (en) Methods and apparatuses for event exposure of location reporting for a terminal device
US11811886B2 (en) Methods and apparatuses for proxy deployment
WO2022027345A1 (en) Wireless communication method and device
US20230370834A1 (en) Method and apparatus for improved capability exposure at edge enabler server
US11930424B2 (en) Method and apparatus for location based group message delivery
US11363413B2 (en) Efficient UE location reporting in cellular networks
WO2020073199A1 (en) Methods and apparatuses for device triggering
US20210345090A1 (en) Methods and Apparatuses for Exposure of Monitoring Event
JP2024538744A (en) COMMUNICATION METHOD, COMMUNICATION DEVICE, AND COMMUNICATION SYSTEM

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20745503

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2020745503

Country of ref document: EP

Effective date: 20210825