WO2021102782A1 - Access control at a relay user equipment - Google Patents
Access control at a relay user equipment Download PDFInfo
- Publication number
- WO2021102782A1 WO2021102782A1 PCT/CN2019/121546 CN2019121546W WO2021102782A1 WO 2021102782 A1 WO2021102782 A1 WO 2021102782A1 CN 2019121546 W CN2019121546 W CN 2019121546W WO 2021102782 A1 WO2021102782 A1 WO 2021102782A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- relay
- remote
- access control
- network
- capability
- Prior art date
Links
- 238000000034 method Methods 0.000 claims abstract description 58
- 238000004891 communication Methods 0.000 claims description 48
- 230000004044 response Effects 0.000 claims description 25
- 230000008859 change Effects 0.000 claims description 3
- 230000011664 signaling Effects 0.000 description 31
- 238000010586 diagram Methods 0.000 description 26
- 230000001413 cellular effect Effects 0.000 description 12
- 230000006870 function Effects 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000008569 process Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 238000013475 authorization Methods 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/24—Connectivity information management, e.g. connectivity discovery or connectivity update
- H04W40/246—Connectivity information discovery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/08—Testing, supervising or monitoring using real traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/02—Communication route or path selection, e.g. power-based or shortest path routing
- H04W40/22—Communication route or path selection, e.g. power-based or shortest path routing using selective relaying for reaching a BTS [Base Transceiver Station] or an access point
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
- H04W88/04—Terminal devices adapted for relaying to or from another terminal or user
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Definitions
- a user equipment may establish a connection to at least one of multiple networks or types of networks.
- the UE may communicate with the network using a direct communication link to a base station of the corresponding network.
- the UE may communicate with the network using a UE to network relay.
- the UE may establish a direct communication link with a further UE that is camped on a base station of the corresponding network.
- data and information sent to the network by the UE may initially be transmitted to the further UE and then relayed to the base station by the further UE on behalf of the UE.
- data and information may initially be sent to the further UE and then relayed to the UE by the further UE on behalf of the network.
- the UE may communicate with the further UE via a sidelink.
- the term sidelink refers to a communication link that may be utilized for device-to-device communication (D2D) .
- the further UE may be configured with both an uplink and a sidelink simultaneously. From the further UE perspective, uplink and sidelink communications may utilize the same resources (e.g., frequency, hardware, etc. ) .
- the further UE e.g., the relay UE
- Some exemplary embodiments include a method performed by a relay user equipment (UE) configured to operate as a relay between a remote UE and a network component.
- the method includes determining at least one relay capability of the relay UE and performing a relay access control operation that indicates to the remote UE whether the remote UE is permitted to use the relay UE as the relay.
- UE relay user equipment
- exemplary embodiments include a relay user equipment (UE) having a transceiver configured to establish a first communication link between the relay UE and a wireless network and a second sidelink (SL) communication link between the relay UE and a remote UE, wherein the relay UE is further configured to operate as a relay between a remote UE and the wireless network.
- the relay UE also has a processor configured to determine at least one relay capability of the UE and perform a relay access control operation that indicates to the remote UE whether the remote UE is permitted to use the relay UE as the relay.
- Still further exemplary embodiments include an integrated circuit that includes first circuitry configured to determine the at least one relay capability of a user equipment (UE) comprising the integrated circuit, wherein the UE is configured to operate as a relay between a remote UE and a wireless network.
- the integrated circuit also includes second circuitry configured to perform a relay access control operation that indicates to the remote UE whether the remote UE is permitted to use the UE as the relay.
- Fig. 1 shows an exemplary network arrangement according to various exemplary embodiments.
- Fig. 2 shows an exemplary UE that may operate as a relay UE according to various exemplary embodiments.
- Fig. 3 shows a first exemplary signaling diagram showing a first method to implement access control at a relay UE comprising sending relay capabilities to the network according to various exemplary embodiments.
- Fig. 4 shows a second exemplary signaling diagram showing further details of the first method to implement access control at a relay UE according to various exemplary embodiments.
- Figs. 5a and 5b show exemplary signaling diagrams showing a second method to implement access control at a relay UE based on an establishment cause in an RRC Connection Request according to various exemplary embodiments.
- Figs. 6a and 6b show exemplary signaling diagrams showing a third method to implement access control at a relay UE during SL one-to-one communications according to various exemplary embodiments.
- Figs. 7a and 7b show exemplary signaling diagrams showing a fourth method to implement access control at a relay UE during an SL discovery procedure according to various exemplary embodiments.
- Figs. 8a and 8b show exemplary signaling diagrams showing a fifth method to implement access control at a relay UE based on the relay UE detecting an event according to various exemplary embodiments.
- Figs. 9a and 9b show exemplary signaling diagrams 900 and 950 showing a sixth method to implement access control at a relay UE 112 based on a link error between the relay UE 112 and the network according to various exemplary embodiments.
- the exemplary embodiments may be further understood with reference to the following description and the related appended drawings, wherein like elements are provided with the same reference numerals.
- the exemplary embodiments describe methods by which a relay UE may control access to the relay UE by remote UEs attempting to use the relay UE as a relay.
- the exemplary embodiments are described with regard to the UE. However, the use of a UE is merely provided for illustrative purposes.
- the exemplary embodiments may be utilized with any electronic component that is configured with the hardware, software, and/or firmware to exchange information (e.g., control information) and/or data with the network. Therefore, the UE as described herein is used to represent any suitable electronic device.
- a UE may communicate directly with a base station or indirectly with the base station using a UE to network relay.
- the term “remote UE” may be used to identify a UE that is to operate as a remote endpoint from the base station.
- the remote UE may connect directly to the base station or indirectly communicate with the base station using a UE to network relay.
- the terms UE and remote UE may be used interchangeably.
- the term “relay UE” may be used to identify a UE that may serve as a relay for the remote UE.
- relay UE is not intended to indicate that the relay UE is actively serving as a relay. Instead, the term relay UE indicates that the UE has the capability of operating as a relay for a remote UE. Further, the relay UE may also be configured as a remote UE simultaneously. Throughout this description, the terms UE, further UE and relay UE may be used interchangeably. However, any reference to a remote UE and a relay UE is merely for illustrative purposes, different networks may refer to similar concepts by a different name.
- reference to the network performing an operation may refer to an operation performed at a base station, at a RAN, at a core network, by a network function, at a network services backbone, a network server, any other type of network component or combination thereof.
- a relay UE and a remote UE. These communications may be performed via a sidelink (SL) communication link that is a direct device-to-device communication link between the UEs. However, these communications are not required to be via a SL link and may be communicated in a different direct device-to-device communication link.
- SL sidelink
- the relay UE When the relay UE is acting as a relay for the remote UE, the relay UE should be able to perform access control for the remote UEs, e.g., either permit or restrict the ability of the remote UEs to use the relay UE as a relay.
- the relay capabilities e.g., data forwarding
- the relay UE may degrade for a variety of different reasons. These reasons may include, for example, too many remote UEs using the relay UE as a relay causing congestion, bad channel quality between the relay UE and the network, capacity restriction on the communication link between the relay UE and the network (e.g., gNB) , etc.
- the use of the relay UE as a relay may degrade the performance of the relay UE itself, e.g., battery drain, deprioritizing traffic directed to the relay UE, etc.
- the relay UE could perform access control to permit or restrict one or more remote UEs from using the relay UE as a relay, the relay UE may be able to selectively support certain high priority relaying functions (e.g., voice forwarding, etc. ) .
- the exemplary embodiments provide various methods for the relay UE to perform access control.
- Fig. 1 shows an exemplary network arrangement 100 according to various exemplary embodiments.
- the exemplary network arrangement 100 includes UEs 110, 112.
- the UE 110 is the remote UE and the UE 112 is the relay UE.
- any UE may act as a remote UE, a relay UE or both.
- the UEs 110, 112 may be any type of electronic component that is configured to communicate via a network, e.g., a mobile phone, a tablet computer, a smartphone, a phablet, an embedded device, a wearable, an Internet of Things (IoT) device, a massive machine-type communication (mMTC) device, etc.
- IoT Internet of Things
- mMTC massive machine-type communication
- the UEs 110, 112 may communicate directly with one or more networks.
- the networks with which the UEs 110, 112 may wirelessly communicate are a 5G New Radio (NR) radio access network (5G NR-RAN) 120, a LTE radio access network (LTE-RAN) 122 and a wireless local access network (WLAN) 124.
- NR 5G New Radio
- LTE-RAN LTE radio access network
- WLAN wireless local access network
- the UEs 110, 112 may also communicate with other types of networks and the UEs 110, 112 may also communicate with networks over a wired connection.
- the UEs 110, 112 may include a 5G NR chipset to communicate with the 5G NR-RAN 120, an LTE chipset to communicate with the LTE-RAN 122 and an ISM chipset to communicate with the WLAN 124.
- the 5G NR-RAN 120 and the LTE-RAN 122 may be portions of cellular networks that may be deployed by cellular providers (e.g., Verizon, AT&T, Sprint, T-Mobile, etc. ) .
- These networks 120, 122 may include, for example, base stations (Node Bs, eNodeBs, HeNBs, eNBS, gNBs, gNodeBs, macrocells, microcells, small cells, femtocells, etc. ) that are configured to send and receive traffic from UEs that are equipped with the appropriate cellular chip set.
- the WLAN 124 may include any type of wireless local area network (WiFi, Hot Spot, IEEE 802.11x networks, etc. ) .
- the base stations may include one or more communication interfaces to exchange data and/or information with camped UEs, the corresponding RAN, the cellular core network 130, the internet 140, etc.
- the base stations may include a processor configured to perform various operations.
- the processor of the base station may be configured to perform operations related to link management.
- reference to a processor is merely for illustrative purposes.
- the operations of the base station may also be represented as a separate incorporated component of the base station or may be a modular component coupled to the base station, e.g., an integrated circuit with or without firmware.
- the integrated circuit may include input circuitry to receive signals and processing circuitry to process the signals and other information.
- the functionality of the processor is split among two or more processors such as a baseband processor and an applications processor.
- the exemplary embodiments may be implemented in any of these or other configurations of a base station.
- any association procedure may be performed for the UEs 110, 112 to connect to the 5G NR-RAN 120 and the LTE-RAN 122.
- the 5G NR-RAN 120 and the LTE-RAN 122 may be associated with a particular cellular provider where the UEs 110, 112 and/or the user thereof has a contract and credential information (e.g., stored on a SIM card) .
- the UEs 110, 112 may transmit the corresponding credential information to associate with the 5G NR-RAN 120. More specifically, the UEs 110, 112 may associate with a specific base station (e.g., the gNB 120A of the 5G NR-RAN 120, the eNB 122A of the LTE-RAN 122) .
- the UEs 110, 112 may also communicate indirectly with the one or more networks using a UE to network relay.
- the UE 110 may be a remote UE and the UE 112 may be a relay UE.
- the relay UE 112 may camp on the gNB 120A of the 5G NR-RAN 120 and the remote UE 110 may camp on the relay UE 112.
- Uplink communications from the remote UE 110 may initially be transmitted over a SL communication link to the relay UE 112.
- the relay UE 112 may relay the communication to the gNB 120A on behalf of the remote UE 110.
- Downlink communication from the gNB 120A to the remote UE 110 may initially be sent to the relay UE 112.
- the relay UE 112 may relay the communication to the remote UE 110 via the SL communication link.
- the network arrangement 100 also includes a cellular core network 130, the Internet 140, an IP Multimedia Subsystem (IMS) 150, and a network services backbone 160.
- the cellular core network 130 may be considered to be the interconnected set of components that manages the operation and traffic of the cellular network.
- the cellular core network 130 also manages the traffic that flows between the cellular network and the Internet 140.
- the IMS 150 may be generally described as an architecture for delivering multimedia services to the UE 110 using the IP protocol.
- the IMS 150 may communicate with the cellular core network 130 and the Internet 140 to provide the multimedia services to the UE 110.
- the network services backbone 160 is in communication either directly or indirectly with the Internet 140 and the cellular core network 130.
- the network services backbone 160 may be generally described as a set of components (e.g., servers, network storage arrangements, etc. ) that implement a suite of services that may be used to extend the functionalities of the UE 110 in communication with the various networks.
- Fig. 2 shows an exemplary UE 112 that may operate as a relay UE according to various exemplary embodiments.
- the UE 112 will be described with regard to the network arrangement 100 of Fig. 1. In this example, the UE 112 is being described because it is considered to be the relay UE in this example arrangement. However, the description may apply equally to the UE 110 or any other UE that is capable of acting as a relay.
- the UE 112 may include a processor 205, a memory arrangement 210, a display device 215, an input/output (I/O) device 220, a transceiver 225 and other components 230.
- I/O input/output
- the other components 230 may include, for example, a SIM card, an audio input device, an audio output device, a power supply, a data acquisition device, ports to electrically connect the UE 112 to other electronic devices, etc.
- a SIM card an audio input device
- an audio output device an audio output device
- a power supply a power supply
- a data acquisition device a data acquisition device
- ports to electrically connect the UE 112 to other electronic devices etc.
- the UE 112 may represent any electronic component that is capable of operating as a remote UE and/or a relay UE.
- the processor 205 may be configured to execute a plurality of engines of the UE 112.
- the engines may include an access control engine 235.
- the access control engine 235 may perform various operations related to allowing a remote UE to access the UE 112 as a relay UE. Examples of the various operations will be described in greater detail below.
- the above referenced engines each being an application (e.g., a program) executed by the processor 205 is only exemplary.
- the functionality associated with the engines may also be represented as a separate incorporated component of the UE 112 or may be a modular component coupled to the UE 112, e.g., an integrated circuit with or without firmware.
- the integrated circuit may include input circuitry to receive signals and processing circuitry to process the signals and other information.
- the engines may also be embodied as one application or separate applications.
- the functionality described for the processor 205 is split among two or more processors such as a baseband processor and an applications processor.
- the exemplary embodiments may be implemented in any of these or other configurations of a UE.
- the memory arrangement 210 may be a hardware component configured to store data related to operations performed by the UE 112.
- the display device 215 may be a hardware component configured to show data to a user while the I/O device 220 may be a hardware component that enables the user to enter inputs.
- the display device 215 and the I/O device 220 may be separate components or integrated together such as a touchscreen.
- the transceiver 225 may be a hardware component configured to establish a connection with the 5G NR-RAN 120, the LTE-RAN 122, the WLAN 124, the UE 112, etc. Accordingly, the transceiver 225 may operate on a variety of different frequencies or channels (e.g., set of consecutive frequencies) .
- Fig. 3 shows a first exemplary signaling diagram 300 showing a first method to implement access control at a relay UE 112 comprising sending relay capabilities to the network according to various exemplary embodiments.
- the exemplary signaling diagram 300 will be described with regard to the network arrangement 100 of Fig. 1 and the UE 112 of Fig. 2.
- the relay UE 112 may perform access control as a relay UE by sending relay capabilities to the network.
- the relay UE 112 may send a relay capability message 310 to the gNB 120A to indicate the relay capabilities of the relay UE 112.
- the operations described herein as performed by the gNB 120A may be performed by the gNB 120A or any other network component.
- the relay capability message 310 may be sent as a non-access stratum (NAS) or access stratum (AS) capability message.
- NAS non-access stratum
- AS access stratum
- the relay capabilities may be, for example, the minimum set of relay capabilities supported by the hardware of the relay UE 112. Some examples of the capabilities will be provided below.
- the capabilities of the relay UE 112 may be pre-programmed in the subscriber identity module (SIM) card of the relay UE 112. In another exemplary embodiment, the relay UE 112 may communicate with an application server (not shown) to receive the capabilities that may be stored in the SIM card.
- Some examples of the relay capabilities of the relay UE 112 may include the maximum number of remote UEs (including remote UEs in RRC-idle or RRC-connected states) , the maximum number of simultaneous RRC-connected remote UEs, the supported services (e.g., voice, high priority data, mission critical data, low latency data, etc. ) , the details of the supported services (e.g., number of simultaneous voice calls/dedicated bearers, etc. ) , Quality of Service (QoS) for remote UE Protocol Data Unit (PDU) session, etc.
- QoS Quality of Service
- the gNB 120A may return a relay capability response message 320.
- the gNB 120A may authorize the relay UE 112 to become a relay UE for a full set of the reported capabilities or a subset of the capabilities. If the relay UE 112 is authorized to act as a relay, the relay UE 112 will perform a relay discovery advertisement procedure 330 to advertise to any remote UEs that the relay UE 112 is available to act as a relay. For example, the remote UE 110 of Fig. 1 may detect the relay advertisement of the relay UE 112 and understand that the relay UE 112 is available to act as a relay.
- the advertisement procedure 330 may be based on the authorized capabilities received from the network in the relay capability response message 320.
- any association procedure may be used to connect the remote UE 110 to the relay UE 112 to use the relay UE 112 as a relay once the remote UE 110 discovers the relay UE 112 based on the relay discovery advertisement procedure 330.
- the gNB 120A is not required to authorize the relay UE 112 to act as a relay for remote UEs.
- the relay capability response message 320 may indicate that the relay UE 112 is not authorized to act as a relay. In such a case, the relay UE 112 will not perform the relay discovery advertisement procedure 330.
- the relay UE 112 may perform access control by informing the network of the relay capabilities of the relay UE 112.
- the example provided below will show how the relay UE 112 may restrict access based on the capability information that the relay UE 112 provides to the network.
- Fig. 4 shows a second exemplary signaling diagram 400 showing further details of the first method to implement access control at a relay UE 112 according to various exemplary embodiments.
- the exemplary signaling diagram 400 will be described with regard to the network arrangement 100 of Fig. 1 and the relay UE 112 of Fig. 2. Similar to the example shown in Fig. 3, the relay UE 112 may exhibit access control by sending relay capabilities to the gNB 120A.
- This exemplary signaling diagram 400 shows that the relay UE 112 may have the ability to renegotiate the relay capabilities with the network during operation.
- the relay capability message 410, the relay capability response message 420 and the relay discovery advertisement procedure 430 are similar to the corresponding operations described with respect to signaling diagram 300 of Fig. 3.
- the relay UE 112 was authorized to act as a relay and, in response to the relay discovery advertisement procedure 430, each of the UEs 110a and 110b have performed a connection procedure 440, 450, respectively, to connect to the relay UE 112.
- the connection between the relay UE 112 and the remote UEs 110a and 110b may be via a SL connection.
- the relay UE 112 is connected to both the UE 110a and the UE 110b via a SL connection and acts as a relay for the remote UEs 110a and 110b to communicate with the gNB 120A.
- the relay UE 112 may detect an event 460.
- the event 460 may include any event that the relay UE 112 determines to affect the currently authorized relay capabilities of the relay UE 112. Some examples of the event 460 may include the battery level of the relay UE 112 being less than a threshold, the temperature of the relay UE 112 being above a threshold, high priority traffic initiation for the relay UE 112 that is intended for the consumption of the relay UE 112, etc. Again, these are examples of events 460, other events may also cause the relay UE 112 to reconsider the current relay capabilities.
- the relay UE 112 may send another relay capability message 470 that includes revised relay capabilities of the relay UE 112.
- the revised capabilities may include any change to the relay capabilities that were sent in the previous relay capability message 410 or the authorized relay capabilities that were received in the relay capability response message 420.
- the relay UE 112 may indicate a lower maximum number of remote UEs for which the relay UE 112 may act as a relay. However, this is only one example and the relay UE 112 may revise any number of relay capabilities.
- the network 130 may send another relay capability response message 480 to authorize the relay capabilities of the relay UE 112 based on the revised relay capabilities sent by the relay UE 112.
- the authorized relay capabilities in the relay capability response message 480 may not include enough relay connections to accommodate both the remote UEs 110a and 110b.
- the relay UE 112 may perform a connection release procedure 490 to release the SL connection with the remote UE 110b.
- the connection release procedure 490 is merely an example of the actions that the relay UE 112 may take as a result of the newly authorized relay capabilities.
- the relay UE 112 detected the event 460.
- the network e.g., gNB 120A
- the network may detect the event and send an updated relay capability response message to the relay UE 112.
- the event detected by the network may include congestion at the relay UE 112, incoming high priority traffic for consumption by the relay UE 112, etc.
- the network may reevaluate the relay capabilities sent by the relay UE 112 in the relay capability message 410 and the authorized relay capabilities sent in the relay capability response message 420 and send a new relay capability response message with a new set of relay capabilities. The relay UE 112 may then take the appropriate actions based on the new set of relay capabilities.
- the relay UE 112 received a relay capability response message 480 in response to the relay capability message 470 that provided authorization for a reduced set of relay capabilities.
- the relay capability response message 480 may also indicate to the relay UE 112 that it is no longer authorized to act as a relay UE.
- the network may determine that the capabilities sent by the relay UE 112 are insufficient for the relay UE 112 to act as a relay UE. From the above examples, it may be seen how the relay UE 112 may perform relay access control by sending relay capabilities to the network.
- Figs. 5a and 5b show exemplary signaling diagrams 500 and 550 showing a second method to implement access control at a relay UE 112 based on an establishment cause in an RRC Connection Request according to various exemplary embodiments.
- the exemplary signaling diagrams 500 and 550 will be described with regard to the network arrangement 100 of Fig. 1 and the UE 112 of Fig. 2.
- the relay UE 112 may perform access control based on the establishment cause in the RRC Connection Request from the remote UE 110.
- a RRC Connection Request is sent by the UE.
- Included in the RRC Connection Request may be an establishment cause, e.g., the reason for attempting to establish the RRC-connected state. Examples of connection causes may include Emergency, High Priority Access, Mobile Terminating Access, Mobile Originating Signaling, Mobile Originating Data, etc.
- the relay UE 112 may categorize these causes as high priority or low priority and control access based on the categorization of the establishment cause as will be described below with respect to signaling diagrams 500 and 550. The categorizing of a specific establishment cause as high priority or low priority may be determined on a case-by-case basis.
- the relay UE 112 may detect an event 510.
- the event 510 may include, for example, the relay UE 120 is experiencing congestion, a battery level of the relay UE 112 is below a threshold, etc.
- the event 510 may be related to a condition for which the relay UE 112 may want to reevaluate the relay capabilities of the relay UE 112, e.g., perform access control based on the current capabilities of the relay UE 112.
- the relay UE 112 may receive a RRC Connection Request 520 from the remote UE 110.
- the RRC Connection Request will include, as described above, an establishment cause.
- the relay UE 112 may evaluate the establishment cause 530.
- the relay UE 112 may categorize the establishment cause as high priority or low priority. In this example, it may be considered that the establishment cause is categorized as high priority. Since the establishment cause is high priority, the relay UE 112 may forward the RRC Connection Request 540 to the gNB 130. In this example, it is considered that the high priority establishment cause means that even though the event 510 has been detected, it is important enough for the remote UE 110 to establish the RRC connection that the relay UE 112 should forward the request.
- the relay UE 112 may detect an event 560.
- the event 560 may be similar to the event 510 as described above with reference to Fig. 5a.
- the relay UE 112 may receive a RRC Connection Request 570 including the establishment cause from the remote UE 110.
- the relay UE 112 may evaluate the establishment cause 580 and categorize as high priority or low priority. In this example, it may be considered that the establishment cause is categorized as low priority. Since the establishment cause is low priority, the relay UE 112 may reject the RRC Connection Request by sending a rejection message 590 to the remote UE 110.
- the rejection message 590 may be, for example, a sidelink reject message. However, other types of rejection messages may also be used.
- the rejection message 590 may include information for the remote UE 110, such as, the reason for the rejection (e.g., access control) , a further candidate relay UE for the remote UE, etc.
- Another type of event that may be determined by the relay UE 112 is that a type of service is not allowed by the network.
- the network may not allow a voice call via the relay UE 112 for any of a variety of reasons.
- the relay UE 112 may determine that voice calls are not allowed.
- the relay UE 112 may reject the request because the service is not supported.
- the establishment cause is not categorized, but rather the type of the establishment cause is determined and then the relay UE 112 determines whether to forward or reject the RRC Connection Request.
- the above examples illustrate manners by which the relay UE 112 may perform access control based on information included in the RRC Connection Request that is received from the remote UE 110. Based on this information, the relay UE 112 may reject the RRC Connection Request or forward the RRC Connection Request to the network.
- Figs. 6a and 6b show exemplary signaling diagrams 600 and 650 showing a third method to implement access control at a relay UE 112 during SL one-to-one communications according to various exemplary embodiments.
- the exemplary signaling diagrams 600 and 650 will be described with regard to the network arrangement 100 of Fig. 1 and the UE 112 of Fig. 2.
- the relay UE 112 may perform access control during SL one-to-one communications for a relay procedure between the relay UE 112 and the remote UE 110.
- the remote UE 110 sends a relay request 610 to the relay UE 112.
- the relay request 610 may be sent via an SL communication link established between the remote UE 110 and the relay UE 112.
- the relay request 610 may include the service type for which the remote UE 110 is requesting the relay.
- the relay UE 112 may then determine whether to accept or reject the relay. The determination may be based on the service type or may be based on any other factor that the relay UE 112 uses to determine whether to accept the relay. The factors are not limited to the information provided in the relay request 610. For example, the relay UE 112 may determine that it already has a number of operating relays and therefore the relay UE 112 may not accept additional relay requests.
- the relay UE 112 may determine to accept or reject the relay request 610 based on any one or multiple factors. In this example, it may be considered that the relay UE 112 accepts the relay request 610 and sends a relay request accept message 620 via the SL communication link. The relay UE 112 may then act as a relay for the remote UE 110.
- the remote UE 110 sends a relay request 660 to the relay UE 112 via an SL communication link established between the remote UE 110 and the relay UE 112.
- the relay request 660 may include the service type for which the remote UE 110 is requesting the relay.
- the relay UE 112 may then detect an event 670.
- the event 670 may include any of the described exemplary events or any other type of event that the relay UE 112 determines to be relevant to the relay request 660 (e.g., battery level, congestion, etc. ) .
- the relay UE 112 will reject the request.
- the relay UE 112 will send a reject message 680 via the SL communication link.
- the rejection message 680 may include any type of information such as the reason for the rejection (e.g., access control) , other available relay UEs, etc.
- the relay UE 112 may determine whether to accept or reject a relay request from a remote UE 110 that is received via the SL communication link. The acceptance or rejection of the relay request may then also be communicated to the remote UE 110 using the SL communication link.
- the relay UE 112 may determine whether to accept or reject a relay request from a remote UE 110 that is received via the SL communication link. The acceptance or rejection of the relay request may then also be communicated to the remote UE 110 using the SL communication link.
- Figs. 7a and 7b show exemplary signaling diagrams 700 and 750 showing a fourth method to implement access control at a relay UE 112 during an SL discovery procedure according to various exemplary embodiments.
- the exemplary signaling diagrams 700 and 750 will be described with regard to the network arrangement 100 of Fig. 1 and the UE 112 of Fig. 2.
- the relay UE 112 may perform access control during an SL discovery procedure.
- the relay UE 112 may engage in a discovery procedure with any remote UEs 110 that desire to use the relay UE 112 as a relay.
- discovery procedures There may be different types of discovery procedures and two examples will be provided below including examples of how access control may be performed by the relay UE 112 during the respective discovery procedures.
- the relay UE 112 may send a discovery advertisement 710.
- the discovery advertisement 710 may include information that indicates the relay UE 112 is available to act as a relay UE.
- the discovery advertisement 710 may also include the conditions under which the relay UE 112 may operate as a relay UE.
- the discovery advertisement 710 may include information such as “Only high priority access is allowed. ”
- the relay UE 112 is available to act as a relay UE, there are conditions on the availability.
- the conditions may be determined by the relay UE 112 and may be based on any factor or combination of factors (e.g., battery level, congestion, relay UE 112 priority traffic, etc. ) .
- the network may determine the conditions with which the relay UE 112 should offer the relay service and signal the condition (s) to the relay UE 112.
- the remote UE 110 may receive the discovery advertisement 710 and determine whether the remote UE 110 satisfies the conditions to use the relay UE 112 as a relay.
- “high priority access” may be defined as including, for example, IMS voice/video, MT signaling, MO signaling, and emergency calls. It should be understood that this is only one possible definition for high priority access and the specific definition may be determined on a case-by-case basis.
- the remote UE 110 may determine whether the service for which the remote UE 110 would like to use the relay UE 112 as a relay satisfies the condition. If it does, the remote UE 110 may make the relay request to the relay UE 112 to act as a relay.
- the discovery advertisement 710 is typically a broadcast message that is available for all UEs within the area of the relay UE 112. That is, while signaling diagram 700 shows the discovery advertisement 710 as between the relay UE 112 and the remote UE 112, other UEs may also receive the same advertisement message 710.
- the remote UE 110 may send a discovery request 760 to the relay UE 112.
- the discovery request 760 may be in response to a discovery advertisement (not shown) that is broadcast by the relay UE 112.
- the discovery advertisement may not include any conditional information, e.g., the discovery advertisement is an indication that the relay UE 112 is available to act as a relay.
- the relay UE 112 may send a discovery response 770 to the remote UE 110.
- the discovery response 770 may include the conditions under which the relay UE 112 may operate as a relay UE.
- the discovery response 770 may include information such as “Only high priority access is allowed. ” Again, in this example, while the relay UE 112 is available to act as a relay UE, there are conditions on the availability.
- the remote UE 110 may determine whether to continue with the relay setup procedure.
- the remote UE 110 may continue to attempt to establish the relay UE 112 as a relay.
- the remote UE 110 may discontinue communications with the relay UE 112 and attempt to find a different relay UE or setup a direct communication link with the network.
- the exemplary condition is based on high priority access.
- the relay UE 112 may set any condition for which to grant access to a remote UE for purposes of acting as a relay.
- the above examples show a manner of controlling access based on a discovery procedure between the relay UE 112 and the remote UE 110.
- Figs. 8a and 8b show exemplary signaling diagrams 800 and 850 showing a fifth method to implement access control at a relay UE 112 based on the relay UE 112 detecting an event according to various exemplary embodiments.
- the exemplary signaling diagrams 800 and 850 will be described with regard to the network arrangement 100 of Fig. 1 and the UE 112 of Fig. 2.
- the relay UE 112 may perform access control by detecting an event and signaling an indication of the event to the network (e.g., gNB 120A) or the remote UE 110.
- the network e.g., gNB 120A
- the remote UE 110 e.gNB 120A
- the relay UE 112 may initially be considered that the relay UE 112 is currently acting as a relay UE for communications between the remote UE 110 and the gNB 120A. It may further be considered that the remote UE 110 is currently in an RRC connected state 810 that includes one or more dedicated radio bearers (DRBs) with the network. While this relay is active, the relay UE 112 may detect an event 820. Similar to the events described above, the event 820 may be any event for which the relay UE 112 determines that the relay capabilities of relay UE 112 should be reevaluated (e.g., battery level, congestion, etc. ) .
- DRBs dedicated radio bearers
- the relay UE 112 may send an event indicated message 830 to the gNB 120A.
- the event indicated message 830 may include a specific indication of the event 820 that was detected or may include information indicating reduced relay capabilities of the relay UE 112.
- the gNB 120A may determine, based on the information included in the event indicated message 830, that the relay UE 112 has reduced relay capabilities. Based on the determined reduced relay capabilities, the gNB 120A may send an RRC Reconfiguration message 840 to the remote UE 110.
- the RRC Reconfiguration message may modify the RRC connection, may drop some of the DRBs, may drop all of the DRBs, depending on the current relay capabilities of the relay UE 112.
- the relay UE 112 may initially be considered that the relay UE 112 is currently acting as a relay UE for communications between the remote UE 110 and the gNB 120A and the remote UE 110 is currently in an RRC connected state 860 that includes one or more DRBs with the network. While this relay is active, the relay UE 112 may detect an event 870. Similar to the events described above, the event 870 may be any event for which the relay UE 112 determines that the relay capabilities of relay UE 112 should be reevaluated (e.g., battery level, congestion, etc. ) .
- the relay UE 112 may send an SL access control message 880 to the remote UE 110.
- the SL access control message 880 may include a specific indication of the event 870 that was detected or may include information indicating reduced relay capabilities of the relay UE 112.
- the remote UE 110 may determine, based on the information included in the SL access control message 880, that the relay UE 112 has reduced relay capabilities. Based on the determined reduced relay capabilities, the remote UE 110 may trigger a NAS procedure 890 with the network to renegotiate the RRC connection. For example, via the NAS procedure 890, the remote UE 110 may request that modification of the service or some or all of the DRBs to be dropped.
- the relay UE 112 may control access based on signaling an event to either the remote UE 110 or the network (e.g., gNB 120A) which triggers these entities to adjust a connection based on the relay capabilities of the relay UE 112.
- the network e.g., gNB 120A
- Figs. 9a and 9b show exemplary signaling diagrams 900 and 950 showing a sixth method to implement access control at a relay UE 112 based on a link error between the relay UE 112 and the network according to various exemplary embodiments.
- the exemplary signaling diagrams 900 and 950 will be described with regard to the network arrangement 100 of Fig. 1 and the UE 112 of Fig. 2.
- the relay UE 112 may perform access control by detecting a link error between the relay UE 112 and the gNB 120A and performing operations to indicate the error to the remote UE 110 to indicate that the relay UE 112 is not available to act as a relay because of the error.
- Fig. 9a it may initially be considered that the relay UE 112 is currently in any one of an RRC connected, RRC Idle or RRC Inactive state 910 with the gNB 120A.
- RRC connected, RRC Idle or RRC Inactive state 910 with the gNB 120A.
- Those skilled in the art will understand the various states which the relay UE 112 may be in with respect to the gNB 112. While in this state, the communication link between the relay UE 112 and the gNB 120A may experience an error 920.
- a direct communication link between a UE and a base station of the 5G NR-RAN 120 may be referred to as a “Uu link. ”
- the error 920 on the Uu link may include any number of errors that cause the Uu link to work improperly.
- the relay UE 112 When the Uu link between the relay UE 112 and the gNB 120A is not working properly, the relay UE 112 cannot operate as a relay because the information that the relay UE 112 will be relaying (in either the UL or DL) will be communicated via the Uu link. Thus, the relay UE 112 must inform the remote UE 110 that the relay UE 112 is currently incapable of acting as a relay.
- the relay UE 112 indicates this information to the remote UE 110 via a SL Physical Broadcast Channel (PBCH) message 930. In this manner, the remote UE 110 is informed that the relay UE 112 is not available to act as a relay.
- PBCH Physical Broadcast Channel
- the relay UE 112 may initially be considered that the relay UE 112 is currently in any one of an RRC connected, RRC Idle or RRC Inactive state 960 with the gNB 120A. While in this state, the Uu link between the relay UE 112 and the gNB 120A may experience an error 970.
- the relay UE 112 indicates this information to the remote UE 110 (and any other remote UEs) by ceasing 980 to broadcast the discovery advertisement. It should be understood that the ceasing 980 does not inform the remote UE 110 of the specific problem, but rather the lack of a discovery advertisement indicates that the relay UE 112 is not available to act as a relay.
- the above examples show the relay UE 112 controlling access by informing (directly or indirectly) the remote UE 110 that the Uu link between the relay UE 110 and the gNB 120A is experiencing an error and therefore the relay UE 112 is not available to act as a relay.
- An exemplary hardware platform for implementing the exemplary embodiments may include, for example, an Intel x86 based platform with compatible operating system, a Windows OS, a Mac platform and MAC OS, a mobile device having an operating system such as iOS, Android, etc.
- the exemplary embodiments of the above described method may be embodied as a program containing lines of code stored on a non-transitory computer readable storage medium that, when compiled, may be executed on a processor or microprocessor.
- personally identifiable information should follow privacy policies and practices that are generally recognized as meeting or exceeding industry or governmental requirements for maintaining the privacy of users.
- personally identifiable information data should be managed and handled so as to minimize risks of unintentional or unauthorized access or use, and the nature of authorized use should be clearly indicated to users.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
A relay user equipment (UE) configured to operate as a relay between a remote UE and a network component performs a method. The method includes determining at least one relay capability of the relay UE and performing a relay access control operation that indicates to the remote UE whether the remote UE is permitted to use the relay UE as the relay.
Description
Inventors: Yuqin Chen, Dawei Zhang, Fangli Xu, Haijing Hu, Longda Xing, Murtaza A Shikari, Sethuraman Gurumoorthy, Sree Ram Kodali, Srinivasan Nimmala and Srirang A Lovlekar
A user equipment (UE) may establish a connection to at least one of multiple networks or types of networks. In some scenarios, the UE may communicate with the network using a direct communication link to a base station of the corresponding network. In other scenarios, the UE may communicate with the network using a UE to network relay. For example, the UE may establish a direct communication link with a further UE that is camped on a base station of the corresponding network. In this type of arrangement, data and information sent to the network by the UE may initially be transmitted to the further UE and then relayed to the base station by the further UE on behalf of the UE. For downlink communications intended for the UE, data and information may initially be sent to the further UE and then relayed to the UE by the further UE on behalf of the network.
The UE may communicate with the further UE via a sidelink. The term sidelink refers to a communication link that may be utilized for device-to-device communication (D2D) . The further UE may be configured with both an uplink and a sidelink simultaneously. From the further UE perspective, uplink and sidelink communications may utilize the same resources (e.g., frequency, hardware, etc. ) . During operation, there may be instances where the further UE (e.g., the relay UE) may not desire to operate as a relay UE for various reasons.
Summary
Some exemplary embodiments include a method performed by a relay user equipment (UE) configured to operate as a relay between a remote UE and a network component. The method includes determining at least one relay capability of the relay UE and performing a relay access control operation that indicates to the remote UE whether the remote UE is permitted to use the relay UE as the relay.
Further exemplary embodiments include a relay user equipment (UE) having a transceiver configured to establish a first communication link between the relay UE and a wireless network and a second sidelink (SL) communication link between the relay UE and a remote UE, wherein the relay UE is further configured to operate as a relay between a remote UE and the wireless network. The relay UE also has a processor configured to determine at least one relay capability of the UE and perform a relay access control operation that indicates to the remote UE whether the remote UE is permitted to use the relay UE as the relay.
Still further exemplary embodiments include an integrated circuit that includes first circuitry configured to determine the at least one relay capability of a user equipment (UE) comprising the integrated circuit, wherein the UE is configured to operate as a relay between a remote UE and a wireless network. The integrated circuit also includes second circuitry configured to perform a relay access control operation that indicates to the remote UE whether the remote UE is permitted to use the UE as the relay.
Fig. 1 shows an exemplary network arrangement according to various exemplary embodiments.
Fig. 2 shows an exemplary UE that may operate as a relay UE according to various exemplary embodiments.
Fig. 3 shows a first exemplary signaling diagram showing a first method to implement access control at a relay UE comprising sending relay capabilities to the network according to various exemplary embodiments.
Fig. 4 shows a second exemplary signaling diagram showing further details of the first method to implement access control at a relay UE according to various exemplary embodiments.
Figs. 5a and 5b show exemplary signaling diagrams showing a second method to implement access control at a relay UE based on an establishment cause in an RRC Connection Request according to various exemplary embodiments.
Figs. 6a and 6b show exemplary signaling diagrams showing a third method to implement access control at a relay UE during SL one-to-one communications according to various exemplary embodiments.
Figs. 7a and 7b show exemplary signaling diagrams showing a fourth method to implement access control at a relay UE during an SL discovery procedure according to various exemplary embodiments.
Figs. 8a and 8b show exemplary signaling diagrams showing a fifth method to implement access control at a relay UE based on the relay UE detecting an event according to various exemplary embodiments.
Figs. 9a and 9b show exemplary signaling diagrams 900 and 950 showing a sixth method to implement access control at a relay UE 112 based on a link error between the relay UE 112 and the network according to various exemplary embodiments.
The exemplary embodiments may be further understood with reference to the following description and the related appended drawings, wherein like elements are provided with the same reference numerals. The exemplary embodiments describe methods by which a relay UE may control access to the relay UE by remote UEs attempting to use the relay UE as a relay.
The exemplary embodiments are described with regard to the UE. However, the use of a UE is merely provided for illustrative purposes. The exemplary embodiments may be utilized with any electronic component that is configured with the hardware, software, and/or firmware to exchange information (e.g., control information) and/or data with the network. Therefore, the UE as described herein is used to represent any suitable electronic device.
As described above, a UE may communicate directly with a base station or indirectly with the base station using a UE to network relay. To differentiate between UEs, reference will be made to a “remote UE” and a “relay UE. ” The term “remote UE” may be used to identify a UE that is to operate as a remote endpoint from the base station. The remote UE may connect directly to the base station or indirectly communicate with the base station using a UE to network relay. Throughout this description, the terms UE and remote UE may be used interchangeably. The term “relay UE” may be used to identify a UE that may serve as a relay for the remote UE. The term relay UE is not intended to indicate that the relay UE is actively serving as a relay. Instead, the term relay UE indicates that the UE has the capability of operating as a relay for a remote UE. Further, the relay UE may also be configured as a remote UE simultaneously. Throughout this description, the terms UE, further UE and relay UE may be used interchangeably. However, any reference to a remote UE and a relay UE is merely for illustrative purposes, different networks may refer to similar concepts by a different name.
Throughout this description reference to the network performing an operation may refer to an operation performed at a base station, at a RAN, at a core network, by a network function, at a network services backbone, a network server, any other type of network component or combination thereof. In addition, throughout this description, there will be multiple examples of communications between a relay UE and a remote UE. These communications may be performed via a sidelink (SL) communication link that is a direct device-to-device communication link between the UEs. However, these communications are not required to be via a SL link and may be communicated in a different direct device-to-device communication link.
When the relay UE is acting as a relay for the remote UE, the relay UE should be able to perform access control for the remote UEs, e.g., either permit or restrict the ability of the remote UEs to use the relay UE as a relay. There may be many reasons for the relay UE to include this capability. For example, the relay capabilities (e.g., data forwarding) of the relay UE may degrade for a variety of different reasons. These reasons may include, for example, too many remote UEs using the relay UE as a relay causing congestion, bad channel quality between the relay UE and the network, capacity restriction on the communication link between the relay UE and the network (e.g., gNB) , etc. In addition, the use of the relay UE as a relay may degrade the performance of the relay UE itself, e.g., battery drain, deprioritizing traffic directed to the relay UE, etc. Thus, if the relay UE could perform access control to permit or restrict one or more remote UEs from using the relay UE as a relay, the relay UE may be able to selectively support certain high priority relaying functions (e.g., voice forwarding, etc. ) . The exemplary embodiments provide various methods for the relay UE to perform access control.
Fig. 1 shows an exemplary network arrangement 100 according to various exemplary embodiments. The exemplary network arrangement 100 includes UEs 110, 112. In this exemplary embodiment, it may be considered that the UE 110 is the remote UE and the UE 112 is the relay UE. However, as described above, any UE may act as a remote UE, a relay UE or both. Those skilled in the art will understand that the UEs 110, 112 may be any type of electronic component that is configured to communicate via a network, e.g., a mobile phone, a tablet computer, a smartphone, a phablet, an embedded device, a wearable, an Internet of Things (IoT) device, a massive machine-type communication (mMTC) device, etc. It should also be understood that an actual network arrangement may include any number of UEs being used by any number of users. Thus, the example of two UEs 110, 112 is merely provided for illustrative purposes.
The UEs 110, 112 may communicate directly with one or more networks. In the example of the network configuration 100, the networks with which the UEs 110, 112 may wirelessly communicate are a 5G New Radio (NR) radio access network (5G NR-RAN) 120, a LTE radio access network (LTE-RAN) 122 and a wireless local access network (WLAN) 124. However, the UEs 110, 112 may also communicate with other types of networks and the UEs 110, 112 may also communicate with networks over a wired connection. Therefore, the UEs 110, 112 may include a 5G NR chipset to communicate with the 5G NR-RAN 120, an LTE chipset to communicate with the LTE-RAN 122 and an ISM chipset to communicate with the WLAN 124.
The 5G NR-RAN 120 and the LTE-RAN 122 may be portions of cellular networks that may be deployed by cellular providers (e.g., Verizon, AT&T, Sprint, T-Mobile, etc. ) . These networks 120, 122 may include, for example, base stations (Node Bs, eNodeBs, HeNBs, eNBS, gNBs, gNodeBs, macrocells, microcells, small cells, femtocells, etc. ) that are configured to send and receive traffic from UEs that are equipped with the appropriate cellular chip set. The WLAN 124 may include any type of wireless local area network (WiFi, Hot Spot, IEEE 802.11x networks, etc. ) .
The base stations (e.g., the gNB 120A, the eNB 122A) may include one or more communication interfaces to exchange data and/or information with camped UEs, the corresponding RAN, the cellular core network 130, the internet 140, etc. Further, the base stations may include a processor configured to perform various operations. For example, the processor of the base station may be configured to perform operations related to link management. However, reference to a processor is merely for illustrative purposes. The operations of the base station may also be represented as a separate incorporated component of the base station or may be a modular component coupled to the base station, e.g., an integrated circuit with or without firmware. For example, the integrated circuit may include input circuitry to receive signals and processing circuitry to process the signals and other information. In addition, in some base stations, the functionality of the processor is split among two or more processors such as a baseband processor and an applications processor. The exemplary embodiments may be implemented in any of these or other configurations of a base station.
Those skilled in the art will understand that any association procedure may be performed for the UEs 110, 112 to connect to the 5G NR-RAN 120 and the LTE-RAN 122. For example, as discussed above, the 5G NR-RAN 120 and the LTE-RAN 122 may be associated with a particular cellular provider where the UEs 110, 112 and/or the user thereof has a contract and credential information (e.g., stored on a SIM card) . Upon detecting the presence of the 5G NR-RAN 120, the UEs 110, 112 may transmit the corresponding credential information to associate with the 5G NR-RAN 120. More specifically, the UEs 110, 112 may associate with a specific base station (e.g., the gNB 120A of the 5G NR-RAN 120, the eNB 122A of the LTE-RAN 122) .
The UEs 110, 112 may also communicate indirectly with the one or more networks using a UE to network relay. In this example, the UE 110 may be a remote UE and the UE 112 may be a relay UE. In this example, the relay UE 112 may camp on the gNB 120A of the 5G NR-RAN 120 and the remote UE 110 may camp on the relay UE 112. Uplink communications from the remote UE 110 may initially be transmitted over a SL communication link to the relay UE 112. Subsequently, the relay UE 112 may relay the communication to the gNB 120A on behalf of the remote UE 110. Downlink communication from the gNB 120A to the remote UE 110 may initially be sent to the relay UE 112. Subsequently, the relay UE 112 may relay the communication to the remote UE 110 via the SL communication link.
In addition to the networks 120, 122 and 124 the network arrangement 100 also includes a cellular core network 130, the Internet 140, an IP Multimedia Subsystem (IMS) 150, and a network services backbone 160. The cellular core network 130 may be considered to be the interconnected set of components that manages the operation and traffic of the cellular network. The cellular core network 130 also manages the traffic that flows between the cellular network and the Internet 140. The IMS 150 may be generally described as an architecture for delivering multimedia services to the UE 110 using the IP protocol. The IMS 150 may communicate with the cellular core network 130 and the Internet 140 to provide the multimedia services to the UE 110. The network services backbone 160 is in communication either directly or indirectly with the Internet 140 and the cellular core network 130. The network services backbone 160 may be generally described as a set of components (e.g., servers, network storage arrangements, etc. ) that implement a suite of services that may be used to extend the functionalities of the UE 110 in communication with the various networks.
Fig. 2 shows an exemplary UE 112 that may operate as a relay UE according to various exemplary embodiments. The UE 112 will be described with regard to the network arrangement 100 of Fig. 1. In this example, the UE 112 is being described because it is considered to be the relay UE in this example arrangement. However, the description may apply equally to the UE 110 or any other UE that is capable of acting as a relay. The UE 112 may include a processor 205, a memory arrangement 210, a display device 215, an input/output (I/O) device 220, a transceiver 225 and other components 230. The other components 230 may include, for example, a SIM card, an audio input device, an audio output device, a power supply, a data acquisition device, ports to electrically connect the UE 112 to other electronic devices, etc. Those skilled in the art will understand that the UE 112 may represent any electronic component that is capable of operating as a remote UE and/or a relay UE.
The processor 205 may be configured to execute a plurality of engines of the UE 112. For example, the engines may include an access control engine 235. The access control engine 235 may perform various operations related to allowing a remote UE to access the UE 112 as a relay UE. Examples of the various operations will be described in greater detail below.
The above referenced engines each being an application (e.g., a program) executed by the processor 205 is only exemplary. The functionality associated with the engines may also be represented as a separate incorporated component of the UE 112 or may be a modular component coupled to the UE 112, e.g., an integrated circuit with or without firmware. For example, the integrated circuit may include input circuitry to receive signals and processing circuitry to process the signals and other information. The engines may also be embodied as one application or separate applications. In addition, in some UEs, the functionality described for the processor 205 is split among two or more processors such as a baseband processor and an applications processor. The exemplary embodiments may be implemented in any of these or other configurations of a UE.
The memory arrangement 210 may be a hardware component configured to store data related to operations performed by the UE 112. The display device 215 may be a hardware component configured to show data to a user while the I/O device 220 may be a hardware component that enables the user to enter inputs. The display device 215 and the I/O device 220 may be separate components or integrated together such as a touchscreen. The transceiver 225 may be a hardware component configured to establish a connection with the 5G NR-RAN 120, the LTE-RAN 122, the WLAN 124, the UE 112, etc. Accordingly, the transceiver 225 may operate on a variety of different frequencies or channels (e.g., set of consecutive frequencies) .
Fig. 3 shows a first exemplary signaling diagram 300 showing a first method to implement access control at a relay UE 112 comprising sending relay capabilities to the network according to various exemplary embodiments. The exemplary signaling diagram 300 will be described with regard to the network arrangement 100 of Fig. 1 and the UE 112 of Fig. 2. In this example, the relay UE 112 may perform access control as a relay UE by sending relay capabilities to the network.
The relay UE 112 may send a relay capability message 310 to the gNB 120A to indicate the relay capabilities of the relay UE 112. As described above, the operations described herein as performed by the gNB 120A may be performed by the gNB 120A or any other network component. In one exemplary embodiment, the relay capability message 310 may be sent as a non-access stratum (NAS) or access stratum (AS) capability message. However, the exemplary embodiments are not limited to any specific manner of sending the relay capability message 310 to the network. The relay capabilities may be, for example, the minimum set of relay capabilities supported by the hardware of the relay UE 112. Some examples of the capabilities will be provided below.
The capabilities of the relay UE 112 may be pre-programmed in the subscriber identity module (SIM) card of the relay UE 112. In another exemplary embodiment, the relay UE 112 may communicate with an application server (not shown) to receive the capabilities that may be stored in the SIM card. Some examples of the relay capabilities of the relay UE 112 may include the maximum number of remote UEs (including remote UEs in RRC-idle or RRC-connected states) , the maximum number of simultaneous RRC-connected remote UEs, the supported services (e.g., voice, high priority data, mission critical data, low latency data, etc. ) , the details of the supported services (e.g., number of simultaneous voice calls/dedicated bearers, etc. ) , Quality of Service (QoS) for remote UE Protocol Data Unit (PDU) session, etc. Those skilled in the art will understand that this is not a complete list of all the relay capabilities that may be sent via the relay capability message 310.
In response to the relay capability message 310, the gNB 120A may return a relay capability response message 320. The gNB 120A may authorize the relay UE 112 to become a relay UE for a full set of the reported capabilities or a subset of the capabilities. If the relay UE 112 is authorized to act as a relay, the relay UE 112 will perform a relay discovery advertisement procedure 330 to advertise to any remote UEs that the relay UE 112 is available to act as a relay. For example, the remote UE 110 of Fig. 1 may detect the relay advertisement of the relay UE 112 and understand that the relay UE 112 is available to act as a relay. The advertisement procedure 330 may be based on the authorized capabilities received from the network in the relay capability response message 320. Those skilled in the art will understand that any association procedure may be used to connect the remote UE 110 to the relay UE 112 to use the relay UE 112 as a relay once the remote UE 110 discovers the relay UE 112 based on the relay discovery advertisement procedure 330.
The gNB 120A is not required to authorize the relay UE 112 to act as a relay for remote UEs. For example, the relay capability response message 320 may indicate that the relay UE 112 is not authorized to act as a relay. In such a case, the relay UE 112 will not perform the relay discovery advertisement procedure 330.
Thus, in this example, the relay UE 112 may perform access control by informing the network of the relay capabilities of the relay UE 112. The example provided below will show how the relay UE 112 may restrict access based on the capability information that the relay UE 112 provides to the network.
Fig. 4 shows a second exemplary signaling diagram 400 showing further details of the first method to implement access control at a relay UE 112 according to various exemplary embodiments. The exemplary signaling diagram 400 will be described with regard to the network arrangement 100 of Fig. 1 and the relay UE 112 of Fig. 2. Similar to the example shown in Fig. 3, the relay UE 112 may exhibit access control by sending relay capabilities to the gNB 120A. This exemplary signaling diagram 400 shows that the relay UE 112 may have the ability to renegotiate the relay capabilities with the network during operation.
The relay capability message 410, the relay capability response message 420 and the relay discovery advertisement procedure 430 are similar to the corresponding operations described with respect to signaling diagram 300 of Fig. 3. In this example, the relay UE 112 was authorized to act as a relay and, in response to the relay discovery advertisement procedure 430, each of the UEs 110a and 110b have performed a connection procedure 440, 450, respectively, to connect to the relay UE 112. As described above, the connection between the relay UE 112 and the remote UEs 110a and 110b may be via a SL connection. Thus, after the connection procedures 440 and 450, the relay UE 112 is connected to both the UE 110a and the UE 110b via a SL connection and acts as a relay for the remote UEs 110a and 110b to communicate with the gNB 120A.
The relay UE 112 may detect an event 460. The event 460 may include any event that the relay UE 112 determines to affect the currently authorized relay capabilities of the relay UE 112. Some examples of the event 460 may include the battery level of the relay UE 112 being less than a threshold, the temperature of the relay UE 112 being above a threshold, high priority traffic initiation for the relay UE 112 that is intended for the consumption of the relay UE 112, etc. Again, these are examples of events 460, other events may also cause the relay UE 112 to reconsider the current relay capabilities.
In response to detecting the event 460, the relay UE 112 may send another relay capability message 470 that includes revised relay capabilities of the relay UE 112. The revised capabilities may include any change to the relay capabilities that were sent in the previous relay capability message 410 or the authorized relay capabilities that were received in the relay capability response message 420. For example, the relay UE 112 may indicate a lower maximum number of remote UEs for which the relay UE 112 may act as a relay. However, this is only one example and the relay UE 112 may revise any number of relay capabilities.
In response to the relay capability message 470, the network 130 may send another relay capability response message 480 to authorize the relay capabilities of the relay UE 112 based on the revised relay capabilities sent by the relay UE 112. In this example, the authorized relay capabilities in the relay capability response message 480 may not include enough relay connections to accommodate both the remote UEs 110a and 110b. Thus, in this example, the relay UE 112 may perform a connection release procedure 490 to release the SL connection with the remote UE 110b. Those skilled in the art will understand that the connection release procedure 490 is merely an example of the actions that the relay UE 112 may take as a result of the newly authorized relay capabilities.
In the above example, it was considered that the relay UE 112 detected the event 460. In another example, the network (e.g., gNB 120A) may detect the event and send an updated relay capability response message to the relay UE 112. For example, the event detected by the network may include congestion at the relay UE 112, incoming high priority traffic for consumption by the relay UE 112, etc. In this example, the network may reevaluate the relay capabilities sent by the relay UE 112 in the relay capability message 410 and the authorized relay capabilities sent in the relay capability response message 420 and send a new relay capability response message with a new set of relay capabilities. The relay UE 112 may then take the appropriate actions based on the new set of relay capabilities.
In addition, in the above example, it was considered that the relay UE 112 received a relay capability response message 480 in response to the relay capability message 470 that provided authorization for a reduced set of relay capabilities. However, the relay capability response message 480 may also indicate to the relay UE 112 that it is no longer authorized to act as a relay UE. For example, the network may determine that the capabilities sent by the relay UE 112 are insufficient for the relay UE 112 to act as a relay UE. From the above examples, it may be seen how the relay UE 112 may perform relay access control by sending relay capabilities to the network.
Figs. 5a and 5b show exemplary signaling diagrams 500 and 550 showing a second method to implement access control at a relay UE 112 based on an establishment cause in an RRC Connection Request according to various exemplary embodiments. The exemplary signaling diagrams 500 and 550 will be described with regard to the network arrangement 100 of Fig. 1 and the UE 112 of Fig. 2. In this example, the relay UE 112 may perform access control based on the establishment cause in the RRC Connection Request from the remote UE 110.
Those skilled in the art will understand that when a UE attempts to establish an RRC connection with the network, a RRC Connection Request is sent by the UE. Included in the RRC Connection Request may be an establishment cause, e.g., the reason for attempting to establish the RRC-connected state. Examples of connection causes may include Emergency, High Priority Access, Mobile Terminating Access, Mobile Originating Signaling, Mobile Originating Data, etc. The relay UE 112 may categorize these causes as high priority or low priority and control access based on the categorization of the establishment cause as will be described below with respect to signaling diagrams 500 and 550. The categorizing of a specific establishment cause as high priority or low priority may be determined on a case-by-case basis.
Referring to Fig. 5a, the relay UE 112 may detect an event 510. The event 510 may include, for example, the relay UE 120 is experiencing congestion, a battery level of the relay UE 112 is below a threshold, etc. Again, as described above, the event 510 may be related to a condition for which the relay UE 112 may want to reevaluate the relay capabilities of the relay UE 112, e.g., perform access control based on the current capabilities of the relay UE 112.
The relay UE 112 may receive a RRC Connection Request 520 from the remote UE 110. The RRC Connection Request will include, as described above, an establishment cause. The relay UE 112 may evaluate the establishment cause 530. As described above, the relay UE 112 may categorize the establishment cause as high priority or low priority. In this example, it may be considered that the establishment cause is categorized as high priority. Since the establishment cause is high priority, the relay UE 112 may forward the RRC Connection Request 540 to the gNB 130. In this example, it is considered that the high priority establishment cause means that even though the event 510 has been detected, it is important enough for the remote UE 110 to establish the RRC connection that the relay UE 112 should forward the request.
Referring to Fig. 5b, the relay UE 112 may detect an event 560. The event 560 may be similar to the event 510 as described above with reference to Fig. 5a. The relay UE 112 may receive a RRC Connection Request 570 including the establishment cause from the remote UE 110. The relay UE 112 may evaluate the establishment cause 580 and categorize as high priority or low priority. In this example, it may be considered that the establishment cause is categorized as low priority. Since the establishment cause is low priority, the relay UE 112 may reject the RRC Connection Request by sending a rejection message 590 to the remote UE 110. The rejection message 590 may be, for example, a sidelink reject message. However, other types of rejection messages may also be used. The rejection message 590 may include information for the remote UE 110, such as, the reason for the rejection (e.g., access control) , a further candidate relay UE for the remote UE, etc.
In the above examples various events have been described. Another type of event that may be determined by the relay UE 112 is that a type of service is not allowed by the network. For example, the network may not allow a voice call via the relay UE 112 for any of a variety of reasons. The relay UE 112 may determine that voice calls are not allowed. Thus, when the relay UE 112 receives an establishment cause indicating that the reason for the RRC connection is for a voice call, the relay UE 112 may reject the request because the service is not supported. Thus, in this example, the establishment cause is not categorized, but rather the type of the establishment cause is determined and then the relay UE 112 determines whether to forward or reject the RRC Connection Request.
Thus, the above examples illustrate manners by which the relay UE 112 may perform access control based on information included in the RRC Connection Request that is received from the remote UE 110. Based on this information, the relay UE 112 may reject the RRC Connection Request or forward the RRC Connection Request to the network.
Figs. 6a and 6b show exemplary signaling diagrams 600 and 650 showing a third method to implement access control at a relay UE 112 during SL one-to-one communications according to various exemplary embodiments. The exemplary signaling diagrams 600 and 650 will be described with regard to the network arrangement 100 of Fig. 1 and the UE 112 of Fig. 2. In this example, the relay UE 112 may perform access control during SL one-to-one communications for a relay procedure between the relay UE 112 and the remote UE 110.
Referring to Fig. 6a, the remote UE 110 sends a relay request 610 to the relay UE 112. The relay request 610 may be sent via an SL communication link established between the remote UE 110 and the relay UE 112. The relay request 610 may include the service type for which the remote UE 110 is requesting the relay. The relay UE 112 may then determine whether to accept or reject the relay. The determination may be based on the service type or may be based on any other factor that the relay UE 112 uses to determine whether to accept the relay. The factors are not limited to the information provided in the relay request 610. For example, the relay UE 112 may determine that it already has a number of operating relays and therefore the relay UE 112 may not accept additional relay requests. From these examples it can be seen that the relay UE 112 may determine to accept or reject the relay request 610 based on any one or multiple factors. In this example, it may be considered that the relay UE 112 accepts the relay request 610 and sends a relay request accept message 620 via the SL communication link. The relay UE 112 may then act as a relay for the remote UE 110.
Referring to Fig. 6b, the remote UE 110 sends a relay request 660 to the relay UE 112 via an SL communication link established between the remote UE 110 and the relay UE 112. As described above, the relay request 660 may include the service type for which the remote UE 110 is requesting the relay. The relay UE 112 may then detect an event 670. Multiple examples of events have been described above and the event 670 may include any of the described exemplary events or any other type of event that the relay UE 112 determines to be relevant to the relay request 660 (e.g., battery level, congestion, etc. ) . In this example, it may be considered that based on the detected event 670 and the requested service type, the relay UE 112 will reject the request. Thus, the relay UE 112 will send a reject message 680 via the SL communication link. Again, the rejection message 680 may include any type of information such as the reason for the rejection (e.g., access control) , other available relay UEs, etc.
Thus, the above examples show that the relay UE 112 may determine whether to accept or reject a relay request from a remote UE 110 that is received via the SL communication link. The acceptance or rejection of the relay request may then also be communicated to the remote UE 110 using the SL communication link. In the above examples, there were various reasons provided for accepting or rejecting the relay requests. Those skilled in the art will understand that there may be a variety of reasons for the relay UE 112 to either accept or reject the relay request. The particular reason is irrelevant to this method of access control. That is, this exemplary method of access control is related to the relay UE 112 making a determination as to whether to accept or reject the request that is made during the SL one-to-one communication with the remote UE 110.
Figs. 7a and 7b show exemplary signaling diagrams 700 and 750 showing a fourth method to implement access control at a relay UE 112 during an SL discovery procedure according to various exemplary embodiments. The exemplary signaling diagrams 700 and 750 will be described with regard to the network arrangement 100 of Fig. 1 and the UE 112 of Fig. 2. In this example, the relay UE 112 may perform access control during an SL discovery procedure.
As described above, when the relay UE 112 is available to operate as a relay, the relay UE 112 may engage in a discovery procedure with any remote UEs 110 that desire to use the relay UE 112 as a relay. There may be different types of discovery procedures and two examples will be provided below including examples of how access control may be performed by the relay UE 112 during the respective discovery procedures.
Referring to Fig. 7a, the relay UE 112 may send a discovery advertisement 710. The discovery advertisement 710 may include information that indicates the relay UE 112 is available to act as a relay UE. The discovery advertisement 710 may also include the conditions under which the relay UE 112 may operate as a relay UE. For example, the discovery advertisement 710 may include information such as “Only high priority access is allowed. ” Thus, in this example, while the relay UE 112 is available to act as a relay UE, there are conditions on the availability. The conditions may be determined by the relay UE 112 and may be based on any factor or combination of factors (e.g., battery level, congestion, relay UE 112 priority traffic, etc. ) . In another example, the network may determine the conditions with which the relay UE 112 should offer the relay service and signal the condition (s) to the relay UE 112.
The remote UE 110 may receive the discovery advertisement 710 and determine whether the remote UE 110 satisfies the conditions to use the relay UE 112 as a relay. In this example, “high priority access” may be defined as including, for example, IMS voice/video, MT signaling, MO signaling, and emergency calls. It should be understood that this is only one possible definition for high priority access and the specific definition may be determined on a case-by-case basis. The remote UE 110 may determine whether the service for which the remote UE 110 would like to use the relay UE 112 as a relay satisfies the condition. If it does, the remote UE 110 may make the relay request to the relay UE 112 to act as a relay.
Those skilled in the art will understand that the discovery advertisement 710 is typically a broadcast message that is available for all UEs within the area of the relay UE 112. That is, while signaling diagram 700 shows the discovery advertisement 710 as between the relay UE 112 and the remote UE 112, other UEs may also receive the same advertisement message 710.
Referring to Fig. 7b, the remote UE 110 may send a discovery request 760 to the relay UE 112. The discovery request 760 may be in response to a discovery advertisement (not shown) that is broadcast by the relay UE 112. However, in this exemplary embodiment, as opposed to the exemplary embodiment shown in signaling diagram 700, the discovery advertisement may not include any conditional information, e.g., the discovery advertisement is an indication that the relay UE 112 is available to act as a relay.
In response to the discovery request, the relay UE 112 may send a discovery response 770 to the remote UE 110. The discovery response 770 may include the conditions under which the relay UE 112 may operate as a relay UE. For example, the discovery response 770 may include information such as “Only high priority access is allowed. ” Again, in this example, while the relay UE 112 is available to act as a relay UE, there are conditions on the availability. After receiving the discovery response 770 including the corresponding conditions, the remote UE 110 may determine whether to continue with the relay setup procedure. For example, if the remote UE 110 is attempting to use the relay UE 112 as a relay for a service that is considered to be high priority, the remote UE 110 may continue to attempt to establish the relay UE 112 as a relay. On the other hand, if the remote UE 110 determines that a low priority service is going to be requested, the remote UE 110 may discontinue communications with the relay UE 112 and attempt to find a different relay UE or setup a direct communication link with the network.
In the above examples, the exemplary condition is based on high priority access. However, it should be understood that the relay UE 112 may set any condition for which to grant access to a remote UE for purposes of acting as a relay. Thus, the above examples show a manner of controlling access based on a discovery procedure between the relay UE 112 and the remote UE 110.
Figs. 8a and 8b show exemplary signaling diagrams 800 and 850 showing a fifth method to implement access control at a relay UE 112 based on the relay UE 112 detecting an event according to various exemplary embodiments. The exemplary signaling diagrams 800 and 850 will be described with regard to the network arrangement 100 of Fig. 1 and the UE 112 of Fig. 2. In this example, the relay UE 112 may perform access control by detecting an event and signaling an indication of the event to the network (e.g., gNB 120A) or the remote UE 110. Each of these exemplary embodiments will be described below.
Referring to Fig. 8a, it may initially be considered that the relay UE 112 is currently acting as a relay UE for communications between the remote UE 110 and the gNB 120A. It may further be considered that the remote UE 110 is currently in an RRC connected state 810 that includes one or more dedicated radio bearers (DRBs) with the network. While this relay is active, the relay UE 112 may detect an event 820. Similar to the events described above, the event 820 may be any event for which the relay UE 112 determines that the relay capabilities of relay UE 112 should be reevaluated (e.g., battery level, congestion, etc. ) .
When the event 820 is detected, the relay UE 112 may send an event indicated message 830 to the gNB 120A. The event indicated message 830 may include a specific indication of the event 820 that was detected or may include information indicating reduced relay capabilities of the relay UE 112. The gNB 120A may determine, based on the information included in the event indicated message 830, that the relay UE 112 has reduced relay capabilities. Based on the determined reduced relay capabilities, the gNB 120A may send an RRC Reconfiguration message 840 to the remote UE 110. The RRC Reconfiguration message may modify the RRC connection, may drop some of the DRBs, may drop all of the DRBs, depending on the current relay capabilities of the relay UE 112.
Referring to Fig. 8b, similar to Fig. 8a, it may initially be considered that the relay UE 112 is currently acting as a relay UE for communications between the remote UE 110 and the gNB 120A and the remote UE 110 is currently in an RRC connected state 860 that includes one or more DRBs with the network. While this relay is active, the relay UE 112 may detect an event 870. Similar to the events described above, the event 870 may be any event for which the relay UE 112 determines that the relay capabilities of relay UE 112 should be reevaluated (e.g., battery level, congestion, etc. ) .
When the event 870 is detected, the relay UE 112 may send an SL access control message 880 to the remote UE 110. The SL access control message 880 may include a specific indication of the event 870 that was detected or may include information indicating reduced relay capabilities of the relay UE 112. The remote UE 110 may determine, based on the information included in the SL access control message 880, that the relay UE 112 has reduced relay capabilities. Based on the determined reduced relay capabilities, the remote UE 110 may trigger a NAS procedure 890 with the network to renegotiate the RRC connection. For example, via the NAS procedure 890, the remote UE 110 may request that modification of the service or some or all of the DRBs to be dropped.
Thus, in the above examples, the relay UE 112 may control access based on signaling an event to either the remote UE 110 or the network (e.g., gNB 120A) which triggers these entities to adjust a connection based on the relay capabilities of the relay UE 112.
Figs. 9a and 9b show exemplary signaling diagrams 900 and 950 showing a sixth method to implement access control at a relay UE 112 based on a link error between the relay UE 112 and the network according to various exemplary embodiments. The exemplary signaling diagrams 900 and 950 will be described with regard to the network arrangement 100 of Fig. 1 and the UE 112 of Fig. 2. In this example, the relay UE 112 may perform access control by detecting a link error between the relay UE 112 and the gNB 120A and performing operations to indicate the error to the remote UE 110 to indicate that the relay UE 112 is not available to act as a relay because of the error.
Referring to Fig. 9a, it may initially be considered that the relay UE 112 is currently in any one of an RRC connected, RRC Idle or RRC Inactive state 910 with the gNB 120A. Those skilled in the art will understand the various states which the relay UE 112 may be in with respect to the gNB 112. While in this state, the communication link between the relay UE 112 and the gNB 120A may experience an error 920. Throughout this description, a direct communication link between a UE and a base station of the 5G NR-RAN 120 may be referred to as a “Uu link. ” The error 920 on the Uu link may include any number of errors that cause the Uu link to work improperly. When the Uu link between the relay UE 112 and the gNB 120A is not working properly, the relay UE 112 cannot operate as a relay because the information that the relay UE 112 will be relaying (in either the UL or DL) will be communicated via the Uu link. Thus, the relay UE 112 must inform the remote UE 110 that the relay UE 112 is currently incapable of acting as a relay.
In this exemplary embodiment, the relay UE 112 indicates this information to the remote UE 110 via a SL Physical Broadcast Channel (PBCH) message 930. In this manner, the remote UE 110 is informed that the relay UE 112 is not available to act as a relay.
Referring to Fig. 9b, again, it may initially be considered that the relay UE 112 is currently in any one of an RRC connected, RRC Idle or RRC Inactive state 960 with the gNB 120A. While in this state, the Uu link between the relay UE 112 and the gNB 120A may experience an error 970. In this exemplary embodiment, the relay UE 112 indicates this information to the remote UE 110 (and any other remote UEs) by ceasing 980 to broadcast the discovery advertisement. It should be understood that the ceasing 980 does not inform the remote UE 110 of the specific problem, but rather the lack of a discovery advertisement indicates that the relay UE 112 is not available to act as a relay.
The above examples show the relay UE 112 controlling access by informing (directly or indirectly) the remote UE 110 that the Uu link between the relay UE 110 and the gNB 120A is experiencing an error and therefore the relay UE 112 is not available to act as a relay.
Those skilled in the art will understand that the above-described exemplary embodiments may be implemented in any suitable software or hardware configuration or combination thereof. An exemplary hardware platform for implementing the exemplary embodiments may include, for example, an Intel x86 based platform with compatible operating system, a Windows OS, a Mac platform and MAC OS, a mobile device having an operating system such as iOS, Android, etc. In a further example, the exemplary embodiments of the above described method may be embodied as a program containing lines of code stored on a non-transitory computer readable storage medium that, when compiled, may be executed on a processor or microprocessor.
Although this application described various embodiments each having different features in various combinations, those skilled in the art will understand that any of the features of one embodiment may be combined with the features of the other embodiments in any manner not specifically disclaimed or which is not functionally or logically inconsistent with the operation of the device or the stated functions of the disclosed embodiments.
It is well understood that the use of personally identifiable information should follow privacy policies and practices that are generally recognized as meeting or exceeding industry or governmental requirements for maintaining the privacy of users. In particular, personally identifiable information data should be managed and handled so as to minimize risks of unintentional or unauthorized access or use, and the nature of authorized use should be clearly indicated to users.
It will be apparent to those skilled in the art that various modifications may be made in the present disclosure, without departing from the spirit or the scope of the disclosure. Thus, it is intended that the present disclosure cover modifications and variations of this disclosure provided they come within the scope of the appended claims and their equivalent.
Claims (20)
- A method, comprising:at a relay user equipment (UE) configured to operate as a relay between a remote UE and a network component:determining at least one relay capability of the relay UE; andperforming a relay access control operation that indicates to the remote UE whether the remote UE is permitted to use the relay UE as the relay.
- The method of claim 1, wherein the at least one relay capability is based on an event detected by the relay UE.
- The method of claim 1, wherein the relay access control operation comprises:transmitting, to the network, a relay capability message including the at least one relay capability;receiving, from the network, an authorized relay capability message; andbroadcasting a relay discovery advertisement including information based on the authorized relay capability message.
- The method of claim 3, wherein the relay access control operation comprises:detecting an event that impacts the at least one relay capability, wherein the at least one relay capability is modified based on the event;transmitting, to the network, an updated relay capability message including the modified at least one relay capability;receiving, from the network, an updated authorized relay capability message; andperforming an operation with respect to a relay link between the relay UE and the remote UE, wherein the operation is based on the updated authorized relay capability message.
- The method of claim 1, wherein the relay access control operation comprises:determining an establishment cause received in a radio resource connection (RRC) request from the remote UE; andbased on the establishment cause, one of (i) forwarding the RRC connection request to the network or (ii) rejecting the RRC request, wherein the rejecting comprises sending a rejection message to the remote UE.
- The method of claim 1, further comprising:receiving a relay request from the remote UE, wherein the request is received via a SL communication link between the relay UE and the remote UE;determining whether to accept or reject the request based on the at least one relay capability of the relay UE.
- The method of claim 1, wherein the relay access control operation comprises:broadcasting a relay advertisement including conditions for the remote UE to access the relay UE as the relay.
- The method of claim 1, wherein the relay access control operation comprises:receiving a relay discovery request from the remote UE; andtransmitting, to the remote UE via a SL communication link, a discovery response message including conditions for the remote UE to access the relay UE as the relay.
- The method of claim 1, further comprising:detecting an event that impacts the at least one relay capability; andtransmitting an indication of the detected event to one of the network or the remote UE, wherein the indication causes a change in an RRC configuration between the remote UE and the network.
- The method of claim 1, further comprising:determining an error on a communication link between the relay UE and the network; andbased on determining the error, one of (i) transmitting, to the remote UE, an indication of the error or (ii) ceasing broadcasting of a relay discovery advertisement.
- A relay user equipment (UE) , comprising:a transceiver configured to establish a first communication link between the relay UE and a wireless network and a second sidelink (SL) communication link between the relay UE and a remote UE, wherein the relay UE is further configured to operate as a relay between a remote UE and the wireless network; anda processor configured to determine at least one relay capability of the UE and perform a relay access control operation that indicates to the remote UE whether the remote UE is permitted to use the relay UE as the relay.
- The relay UE of claim 11, wherein the processor performs the relay access control operation by transmitting, to the wireless network, a relay capability message including the at least one relay capability, receiving, from the wireless network, an authorized relay capability message and broadcasting a relay discovery advertisement including information based on the authorized relay capability message.
- The relay UE of claim 11, wherein the processor performs the relay access control operation by determining an establishment cause received in a radio resource connection (RRC) request from the remote UE and based on the establishment cause, one of (i) forwarding the RRC connection request to the wireless network or (ii) rejecting the RRC request, wherein the rejecting comprises sending a rejection message to the remote UE.
- The relay UE of claim 11, wherein the processor performs the relay access control operation by receiving a relay request from the remote UE and determining whether to accept or reject the request based on the at least one relay capability of the relay UE.
- The relay UE of claim 11, wherein the processor performs the relay access control operation by broadcasting a relay advertisement including conditions for the remote UE to access the relay UE as the relay.
- The relay UE of claim 11, wherein the processor performs the relay access control operation by receiving a relay discovery request from the remote UE and transmitting, to the remote UE via a SL communication link, a discovery response message including conditions for the remote UE to access the relay UE as the relay.
- The relay UE of claim 11, wherein the processor performs the relay access control operation by detecting an event that impacts the at least one relay capability and transmitting an indication of the detected event to one of the network or the remote UE, wherein the indication causes a change in an RRC configuration between the remote UE and the wireless network.
- The relay UE of claim 11, wherein the processor performs the relay access control operation by determining an error on the first communication link and based on determining the error, one of (i) transmitting, to the remote UE, an indication of the error or (ii) ceasing broadcasting of a relay discovery advertisement.
- An integrated circuit, comprising:first circuitry configured to determine at least one relay capability of a user equipment (UE) comprising the integrated circuit, wherein the UE is configured to operate as a relay between a remote UE and a wireless network; andsecond circuitry configured to perform a relay access control operation that indicates to the remote UE whether the remote UE is permitted to use the UE as the relay.
- The integrated circuit of claim 19, wherein the at least one relay capability is based on an event detected by the relay UE.
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2019/121546 WO2021102782A1 (en) | 2019-11-28 | 2019-11-28 | Access control at a relay user equipment |
US17/755,700 US20220394592A1 (en) | 2019-11-28 | 2019-11-28 | Access Control at a Relay User Equipment |
EP19954551.8A EP4066543A4 (en) | 2019-11-28 | 2019-11-28 | Access control at a relay user equipment |
CN201980102241.8A CN114731568A (en) | 2019-11-28 | 2019-11-28 | Access control at relay user equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2019/121546 WO2021102782A1 (en) | 2019-11-28 | 2019-11-28 | Access control at a relay user equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021102782A1 true WO2021102782A1 (en) | 2021-06-03 |
Family
ID=76129063
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2019/121546 WO2021102782A1 (en) | 2019-11-28 | 2019-11-28 | Access control at a relay user equipment |
Country Status (4)
Country | Link |
---|---|
US (1) | US20220394592A1 (en) |
EP (1) | EP4066543A4 (en) |
CN (1) | CN114731568A (en) |
WO (1) | WO2021102782A1 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2023123083A1 (en) * | 2021-12-29 | 2023-07-06 | Mediatek Singapore Pte. Ltd. | Route discovery in a mesh network |
WO2023206987A1 (en) * | 2022-04-29 | 2023-11-02 | 中国电信股份有限公司 | Emergency call method, network node and storage medium |
WO2024027636A1 (en) * | 2022-08-02 | 2024-02-08 | 华为技术有限公司 | Communication method, communication apparatus and communication system |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11895736B2 (en) * | 2020-04-08 | 2024-02-06 | Qualcomm Incorporated | Restricted access and use control for user equipment with reduced capabilities |
CN116349402A (en) * | 2021-02-05 | 2023-06-27 | Oppo广东移动通信有限公司 | State transition method, device, equipment and storage medium |
JP2024516683A (en) * | 2021-04-30 | 2024-04-16 | エルジー エレクトロニクス インコーポレイティド | METHOD FOR OPERATION OF RELAY UE IN SIDELINK IN WIRELESS COMMUNICATION SYSTEM - Patent application |
US12120664B2 (en) * | 2021-09-23 | 2024-10-15 | Qualcomm Incorporated | Configuration and signaling techniques for scheduled wireless communications |
US20230199466A1 (en) * | 2021-12-22 | 2023-06-22 | Qualcomm Incorporated | Repeater discovery in sidelink |
CN117460019A (en) * | 2022-07-19 | 2024-01-26 | 中国电信股份有限公司 | Method, device and system for determining relay terminal |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2014183619A1 (en) * | 2013-05-13 | 2014-11-20 | 电信科学技术研究院 | Method and apparatus for implementing adjacent communication |
CN106604341A (en) | 2015-10-16 | 2017-04-26 | 普天信息技术有限公司 | Relay UE reselection triggering method, device and terminal |
WO2017075921A1 (en) * | 2015-11-05 | 2017-05-11 | 宇龙计算机通信科技(深圳)有限公司 | Access control method and device for remote terminal, terminal, and base station |
US20180070400A1 (en) | 2015-05-14 | 2018-03-08 | Fujitsu Limited | Transmission Method and Device for Sidelink Information and Communication System |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2482716A (en) * | 2010-08-12 | 2012-02-15 | Nec Corp | Resolving MME overload in a LTE-advanced communication system having relay nodes |
WO2017030572A1 (en) * | 2015-08-19 | 2017-02-23 | Nokia Solutions And Networks Oy | Measurement control for ue relay selection in prose based ue-to-network relay |
EP3319393B1 (en) * | 2016-11-07 | 2019-08-07 | Koninklijke KPN N.V. | Establishing a connection between a remote user equipment, ue, and a telecommunication network via a relay capable ue |
-
2019
- 2019-11-28 CN CN201980102241.8A patent/CN114731568A/en active Pending
- 2019-11-28 US US17/755,700 patent/US20220394592A1/en active Pending
- 2019-11-28 EP EP19954551.8A patent/EP4066543A4/en active Pending
- 2019-11-28 WO PCT/CN2019/121546 patent/WO2021102782A1/en unknown
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2014183619A1 (en) * | 2013-05-13 | 2014-11-20 | 电信科学技术研究院 | Method and apparatus for implementing adjacent communication |
US20180070400A1 (en) | 2015-05-14 | 2018-03-08 | Fujitsu Limited | Transmission Method and Device for Sidelink Information and Communication System |
CN106604341A (en) | 2015-10-16 | 2017-04-26 | 普天信息技术有限公司 | Relay UE reselection triggering method, device and terminal |
WO2017075921A1 (en) * | 2015-11-05 | 2017-05-11 | 宇龙计算机通信科技(深圳)有限公司 | Access control method and device for remote terminal, terminal, and base station |
Non-Patent Citations (3)
Title |
---|
ALCATEL-LUCENT SHANGHAI BELL, ALCATEL-LUCENT: "D2D system design enhancement to support out-of-coverage and partial coverage discovery for UE-network relays", 3GPP DRAFT; R1-151328 - D2D SYSTEM DESIGN ENHANCEMENT TO SUPPORT OUT-OF-COVERAGE AND PARTIAL COVERAGE DISCOVERY_FINAL, vol. RAN WG1, 11 April 2015 (2015-04-11), Belgrade, Serbia, pages 1 - 4, XP050949882 * |
SAMSUNG: "Evaluation results of relay selection schemes", 3GPP DRAFT; R1-154127 EVALUATION RESULTS OF RELAY SELECTION SCHEMES_SAMSUNG, vol. RAN WG1, 14 August 2015 (2015-08-14), Beijing, China, pages 1 - 8, XP050992800 * |
See also references of EP4066543A4 |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2023123083A1 (en) * | 2021-12-29 | 2023-07-06 | Mediatek Singapore Pte. Ltd. | Route discovery in a mesh network |
WO2023206987A1 (en) * | 2022-04-29 | 2023-11-02 | 中国电信股份有限公司 | Emergency call method, network node and storage medium |
WO2024027636A1 (en) * | 2022-08-02 | 2024-02-08 | 华为技术有限公司 | Communication method, communication apparatus and communication system |
Also Published As
Publication number | Publication date |
---|---|
EP4066543A4 (en) | 2023-07-26 |
EP4066543A1 (en) | 2022-10-05 |
US20220394592A1 (en) | 2022-12-08 |
CN114731568A (en) | 2022-07-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2021102782A1 (en) | Access control at a relay user equipment | |
US11838747B2 (en) | Uplink congestion control based on sip messaging | |
US9877349B2 (en) | Method for performing proximity service, and user device | |
JP5449577B2 (en) | Method and deployment structure in a cellular communication network | |
CN110622565A (en) | Access class and establishment cause | |
US11546805B2 (en) | Time sensitive communications between user equipment | |
US11895548B2 (en) | Link management for a connected user equipment | |
US9974107B2 (en) | Radio node communicating with terminal in communication environment supporting plurality of radio networks, and radio communication method | |
US20220182872A1 (en) | Temporary priority elevation for non-high priority access users | |
US20240340834A1 (en) | Establishing a Multiple Access Connection | |
WO2022032472A1 (en) | Ue provisioning and charging for sidelink group communication | |
WO2021087853A1 (en) | Prioritization between uplink and sidelink communications | |
US20220361093A1 (en) | Network Slice Admission Control (NSAC) Discovery and Roaming Enhancements | |
US11812375B2 (en) | Simultaneous network slice usage via dual connectivity | |
WO2023060182A1 (en) | Local release mechanism for network slicing | |
WO2021102784A1 (en) | Link selection for an idle or inactive user equipment | |
EP4087316A1 (en) | Communication method and apparatus | |
EP4156791A2 (en) | Unified access control for a cellular network | |
US20230413169A1 (en) | Prioritizing a Private Enterprise Deployed Cellular Network over a Wi-Fi Network | |
WO2022220219A1 (en) | User device, base station, and communication control method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 19954551 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2019954551 Country of ref document: EP Effective date: 20220628 |