WO2021208107A1 - An optimization method to recover ps service quickly - Google Patents
An optimization method to recover ps service quickly Download PDFInfo
- Publication number
- WO2021208107A1 WO2021208107A1 PCT/CN2020/085457 CN2020085457W WO2021208107A1 WO 2021208107 A1 WO2021208107 A1 WO 2021208107A1 CN 2020085457 W CN2020085457 W CN 2020085457W WO 2021208107 A1 WO2021208107 A1 WO 2021208107A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- base station
- wireless device
- network
- processor
- nsa network
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W60/00—Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration
- H04W60/06—De-registration or detaching
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/08—Testing, supervising or monitoring using real traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/22—Processing or transfer of terminal data, e.g. status or physical capabilities
- H04W8/24—Transfer of terminal data
Definitions
- LTE Long Term Evolution
- 5G-NR Fifth Generation new radio
- LTE Long Term Evolution
- 5G-NR Fifth Generation new radio
- other recently developed communication technologies allow user equipment to communicate information at data rates (e.g., in terms of Gigabits per second, etc. ) that are orders of magnitude greater than what was available just a few years ago.
- Today’s communication networks are also more secure, resilient to multipath fading, allow for lower network traffic latencies, provide better communication efficiencies (e.g., in terms of bits per second per unit of bandwidth used, etc. ) .
- IOT Internet of Things
- M2M Machine to Machine
- Various aspects include systems and methods for enabling quick recovery by a wireless device from packet switched (PS) service failure in a non-standalone (NSA) network, such as a fifth generation (5G) or later generation NSA network.
- NSA non-standalone
- Various aspects may be performed by a processor of a wireless device, such as a modem processor of a wireless device.
- Various aspects may include determining whether a total number of abnormal PS service failure events during a time period exceeds a maximum counter value, sending a detach request to a base station of the NSA network in response determining that the total number of abnormal PS service failure events during the time period exceeds the maximum counter value, and sending a new attach request to the base station of the NSA network in response to sending the detach request to the base station of the NSA network, the new attach request indicating that Evolved Universal Terrestrial Radio Access (E-UTRA) –new radio (NR) dual connectivity (EN-DC) is supported by the wireless device.
- E-UTRA Evolved Universal Terrestrial Radio Access
- NR new radio
- EN-DC dual connectivity
- the time period may be ten seconds and the maximum counter value may be five.
- the NSA network may be a 5G NSA network.
- Some aspects may further include sending an initial attach request to the base station of the NSA network prior to determining whether the total number of abnormal PS service failure events during the time period exceeds the maximum counter value, the initial attach request indicating that EN-DC is supported by the wireless device.
- Some aspects may further include receiving an initial attach acceptance from the base station of the NSA network in response to sending the initial attach request, and establishing an initial PS call with the base station of the 5G NSA network in response to receiving the initial attach acceptance.
- Some aspects may further include receiving a detach acceptance from the base station of the NSA network in response to sending the detach request. Some aspects may further include receiving a new attach acceptance from the base station of the NSA network in response to sending the new attach request, and establishing a new PS call with the base station of the NSA network in response to receiving the new attach acceptance.
- Further aspects may include a wireless device having a processor configured to perform one or more operations of any of the methods summarized above. Further aspects may include a non-transitory processor-readable storage medium having stored thereon processor-executable instructions configured to cause a processor of a wireless device to perform operations of any of the methods summarized above. Further aspects include a wireless device having means for performing functions of any of the methods summarized above. Further aspects include a system-on-chip for use in a wireless device that includes a processor configured to perform one or more operations of any of the methods summarized above. Further aspects include a system in a package that includes two systems on chip for use in a wireless device that includes a processor configured to perform one or more operations of any of the methods summarized above.
- FIG. 1 is a system block diagram illustrating an example communication system suitable for implementing any of the various embodiments.
- FIG. 2 is a component block diagram illustrating an example computing and wireless modem system suitable for implementing any of the various embodiments.
- FIG. 3 is a component block diagram illustrating a software architecture including a radio protocol stack for the user and control planes in wireless communications suitable for implementing any of the various embodiments.
- FIG. 4 is a component block diagram illustrating a system configured for wireless communication in accordance with various embodiments.
- FIG. 5 is a process flow diagram illustrating a method for recovering from packet switched (PS) service failure in a non-standalone (NSA) network in accordance with various embodiments.
- PS packet switched
- NSA non-standalone
- FIG. 6 is a call flow diagram illustrating example interactions between a wireless device and a base station of an NSA network in accordance with various embodiments.
- FIG. 7 is a component block diagram of a network computing device suitable for use with various embodiments.
- FIG. 8 is a component block diagram of a wireless device suitable for use with various embodiments.
- Various embodiments include systems and methods for recovering from packet switched (PS) service failure in a non-standalone (NSA) network, such as a fifth generation (5G) or later generation NSA network.
- NSA non-standalone
- Various embodiments may enable detachment from the NSA network in response to PS service failure followed by attachment again to the NSA network.
- Detachment and reattachment to the NSA network may re-synchronize wireless device with the NSA network and may support the reestablishment of PS service.
- Various embodiments may improve user experience by enabling recovery from PS service failure and thereby allowing data traffic communications between a wireless device and the NSA network.
- Various embodiments may improve user experience by making data services, such as Internet access, etc., available to a user after a PS service failure.
- wireless device is used herein to refer to any one or all of cellular telephones, smartphones, portable computing devices, personal or mobile multi-media players, laptop computers, tablet computers, smartbooks, ultrabooks, palmtop computers, wireless electronic mail receivers, multimedia Internet-enabled cellular telephones, wireless router devices, wireless appliances, medical devices and equipment, biometric sensors/devices, wearable devices including smart watches, smart clothing, smart glasses, smart wrist bands, smart jewelry (e.g., smart rings, smart bracelets, etc. ) , entertainment devices (e.g., wireless gaming controllers, music and video players, satellite radios, etc.
- wireless-network enabled Internet of Things (IoT) devices including smart meters/sensors, industrial manufacturing equipment, large and small machinery and appliances for home or enterprise use, wireless communication elements within autonomous and semiautonomous vehicles, wireless devices affixed to or incorporated into various mobile platforms, global positioning system devices, and similar electronic devices that include a memory, wireless communication components and a programmable processor.
- IoT Internet of Things
- SOC system-on-chip
- a single SOC may contain circuitry for digital, analog, mixed-signal, and radio-frequency functions.
- a single SOC may also include any number of general purpose and/or specialized processors (digital signal processors, modem processors, video processors, etc. ) , memory blocks (e.g., ROM, RAM, Flash, etc. ) , and resources (e.g., timers, voltage regulators, oscillators, etc. ) .
- SOCs may also include software for controlling the integrated resources and processors, as well as for controlling peripheral devices.
- SIP system in a package
- a SIP may include a single substrate on which multiple IC chips or semiconductor dies are stacked in a vertical configuration.
- the SIP may include one or more multi-chip modules (MCMs) on which multiple ICs or semiconductor dies are packaged into a unifying substrate.
- MCMs multi-chip modules
- a SIP may also include multiple independent SOCs coupled together via high speed communication circuitry and packaged in close proximity, such as on a single motherboard or in a single wireless device. The proximity of the SOCs facilitates high speed communications and the sharing of memory and resources.
- the terms “network, ” “system, ” “wireless network, ” “cellular network, ” and “wireless communication network” may interchangeably refer to a portion or all of a wireless network of a carrier associated with a wireless device and/or subscription on a wireless device.
- the techniques described herein may be used for various wireless communication networks, such as Code Division Multiple Access (CDMA) , time division multiple access (TDMA) , FDMA, orthogonal FDMA (OFDMA) , single carrier FDMA (SC-FDMA) and other networks.
- CDMA Code Division Multiple Access
- TDMA time division multiple access
- FDMA frequency division multiple access
- OFDMA orthogonal FDMA
- SC-FDMA single carrier FDMA
- any number of wireless networks may be deployed in a given geographic area.
- Each wireless network may support at least one radio access technology, which may operate on one or more frequency or range of frequencies.
- a CDMA network may implement Universal Terrestrial Radio Access (UTRA) (including Wideband Code Division Multiple Access (WCDMA) standards) , CDMA2000 (including IS-2000, IS-95 and/or IS-856 standards) , etc.
- UTRA Universal Terrestrial Radio Access
- CDMA2000 including IS-2000, IS-95 and/or IS-856 standards
- a TDMA network may implement GSM Enhanced Data rates for GSM Evolution (EDGE) .
- EDGE GSM Enhanced Data rates for GSM Evolution
- an OFDMA network may implement Evolved UTRA (E-UTRA) (including LTE standards) , IEEE 802.11 (WiFi) , IEEE 802.16 (WiMAX) , IEEE 802.20, etc.
- E-UTRA Evolved UTRA
- E-UTRAN Evolved Universal Terrestrial Radio Access
- eNodeB eNodeB
- LTE is a mobile network standard for 4G wireless communication of high-speed data developed by the 3GPP (3rd Generation Partnership Project) and specified in its Release 8 document series. In contrast to the circuit-switched (CS) model of cellular network standards, LTE has been designed to support only packet switched (PS) services. Data services in LTE may be provided over the Internet, while multimedia services may be supported by the Internet Multimedia Subsystem (IMS) framework.
- IMS Internet Multimedia Subsystem
- the LTE standard is based on the evolution of the Universal Mobile Telecommunications System (UMTS) radio access through the Evolved Universal Terrestrial Radio Access Network (E-UTRAN) .
- UMTS Universal Mobile Telecommunications System
- E-UTRAN Evolved Universal Terrestrial Radio Access Network
- EPC Evolved Packet Core
- EPS Evolved Packet System
- IP Internet Protocol
- the 5G system is an advanced technology from 4G LTE, and provides a new radio access technology (RAT) through the evolution of the existing mobile communication network structure.
- a 5G system may support, for example, extended LTE (eLTE) as well as non-3GPP access (e.g., WLAN) .
- eLTE extended LTE
- WLAN non-3GPP access
- a radio access network providing both LTE (also referred to as 4G) and new radio (NR) (also referred to a 5G) support
- a radio access network providing both LTE (also referred to as 4G) and new radio (NR) (also referred to a 5G) support
- LTE also referred to as 4G
- NR new radio
- a 5G support e.g., a RAN including both LTE base stations, such as LTE Evolved nodeBs (eNodeBs or eNBs) , and NR base stations, such as Next Generation NodeB (gNodeBs or gNBs)
- LTE core network e.g., an Evolved Packet Core (EPC) network
- EPC Evolved Packet Core
- Future generation systems e.g., sixth generation (6G) or higher systems
- 6G sixth generation
- 6G sixth generation
- a wireless device in such NSA networks that can support both LTE and NR communications can signal to the NSA that the wireless device supports Evolved Universal Terrestrial Radio Access (E-UTRA) –new radio (NR) dual connectivity (EN-DC) .
- E-UTRA Evolved Universal Terrestrial Radio Access
- NR new radio
- EN-DC dual connectivity
- a packet switched (PS) call failure on a wireless device indicating support for EN-DC can sometimes be unrecoverable and can sometimes result in all subsequent PS service setup attempts failing, thereby preventing data traffic communications.
- PS call failure on a wireless device indicating support for EN-DC can result in a negative user experience as data services, such as Internet access, etc., can be unavailable for a period of time.
- IP-oriented (i.e., “data-centric” ) applications e.g. web-browsers, games, e-mail applications, etc.
- LTE and/or 5G (or later generation) system data services over the public Internet.
- Real-time communication services e.g., voice calls, Short Message Service (SMS) communications, etc.
- SMS Short Message Service
- IMS Interoperability for Mobile communications
- IMS Internet multimedia subsystem
- OMA Open Mobile Alliance
- PDN Packet Data Network
- an abnormal PS service failure on a wireless device indicating support for EN-DC can sometimes be unrecoverable resulting in all subsequent PS service setup attempts failing, thereby preventing data traffic communications (also referred to as data-centric services) .
- data traffic communications also referred to as data-centric services
- Such PS service failures on a wireless device indicating support for EN-DC can result in a negative user experience as data services, such as Internet access, can be unavailable for a period of time.
- a 5G capable wireless device may register with the NSA network and initially indicate the wireless device has a dual 5G and LTE data capability.
- the wireless device may send an attach request (ATTACH_REQ) indicating that EN-DC is supported by the wireless device.
- ATTACH_REQ attach request
- the base station of the 5G NSA network such as an LTE cell (e.g., an eNB) may return an attachment acceptance (ATTACH_ACCEPT) to the wireless device.
- ATTACH_ACCEPT attachment acceptance
- the wireless device may send a service request for data traffic (e.g., data traffic associated with an Internet browser, social media application, etc. ) to the base station of the 5G NSA network, such as an LTE cell (e.g., an eNB) , after attaching to the base station and indicating EN-DC support.
- the wireless device can establish a data call (i.e., a PS call) with the base station of the 5G NSA network, such as an LTE cell (e.g., an eNB) , to send/receive the data traffic.
- an abnormal PS service failure can occur following the data service request by the wireless device indicating that EN-DC is supported, the base station of the 5G NSA network, such as an LTE cell (e.g., an eNB) .
- Abnormal PS service failure can be any PS service failure that was unexpected.
- One example indication of an abnormal PS service failure occurring may be a Transmission Control Protocol (TCP) /Internet Protocol (IP) (TCP/IP) connection used for a PS service ending while uplink (UL) data is still awaiting transmission in a pre-transmit queue on the wireless device.
- TCP Transmission Control Protocol
- IP Internet Protocol
- Another example indication of an abnormal PS service failure occurring may be a reachability test (e.g., a “Ping Test” ) failing, such as a network echo request being sent without receiving a network echo reply.
- the PS service failure may cause the data call (i.e., the PS call) to abnormally terminate.
- the wireless device in response to abnormal PS service failure and/or abnormal data call termination, may reattempt to establish PS service and a data call (i.e., a PS call) with the base station of the 5G NSA network, such as an LTE cell (e.g., an eNB) .
- a data call i.e., a PS call
- the wireless device may send further service requests to the base station of the NSA network, such as an LTE cell (e.g., an eNB) .
- PS service requests to the base station of the NSA network may continually fail and/or the PS service may continue to be abnormally terminated, thereby causing the wireless device to be unable to recover from the initial PS service failure.
- This repeated failure of the wireless device to establish a PS service, and resulting repeated failure to support data traffic causes a degraded user experience as users are unable to access the Internet, often for a long period of time.
- Various embodiments enable quick recovery by a wireless device from PS service failure in an NSA network.
- Various embodiments may provide an automatic recovery mechanism that may support 5G (or later generation) capable wireless devices to reestablish PS service in response to PS data transfer stopping abnormally.
- Various embodiments may resynchronize a 5G (or later generation) capable wireless device with the NSA network by triggering detachment and reattachment with base station of the NSA network, such as an LTE cell (e.g., an eNB) , in response to detecting that PS data transfer stopped abnormally.
- an LTE cell e.g., an eNB
- a processor of a wireless device may maintain a counter to record the number of abnormal PS service failure events that occur with the NSA network.
- the counter reaching a maximum counter value may indicate that the 5G NSA network is operating abnormally and PS service failure may be occurring.
- the counter may track the total number of abnormal PS service failure events during a time period. As one example, the time period may be ten seconds and the maximum counter value may be five abnormal PS service failure events.
- indications of the abnormal PS service failure events may be stored.
- the indications of the abnormal PS service failure events may include timestamps of when the abnormal PS service failures occurred or were detected.
- the time period such as ten seconds, may extend backward from the most recent abnormal PS service failure.
- the counter may track the number of abnormal PS service failure indications having timestamps falling in the time window corresponding to the time period, such as the total number of abnormal PS service failure events occurring or detected in the ten seconds prior to the most recent abnormal PS service failure.
- a counter and timer combination may be used to track the total number of abnormal PS service failure events in a time period.
- the counter may track a total number of abnormal PS service failures during a time period tracked by the timer, and the counter may be reset at each expiration of the timer.
- a processor of a wireless device in response to determining that the total number of abnormal PS service failure events during the time period exceeds the maximum counter value, may send a detach request (DETACH REQUEST) to the base station of the 5G NSA network, such as an LTE cell (e.g., an eNB) .
- the processor of a wireless device in response to sending the detach request (DETACH REQUEST) to the base station of the NSA network, such as an LTE cell (e.g., an eNB) , the processor of a wireless device (e.g., AP, modem processor, etc.
- the wireless device may receive a detach acceptance from the base station of the 5G NSA network, such as an LTE cell (e.g., an eNB) .
- the wireless device may be detached from the base station of the NSA network, such as an LTE cell (e.g., an eNB) .
- the processor of a wireless device in response to sending the detach request (DETACH REQUEST) to the base station of the NSA network, such as an LTE cell (e.g., an eNB) , the processor of a wireless device (e.g., AP, modem processor, etc. ) may send an attach request (ATTACH_REQ) to the base station of the 5G NSA network, such as an LTE cell (e.g., an eNB) , the attach request indicating that EN-DC is supported by the wireless device.
- DETACH REQUEST the detach request
- the base station of the NSA network such as an LTE cell (e.g., an eNB)
- the processor of a wireless device e.g., AP, modem processor, etc.
- ATTACH_REQ attach request
- the base station of the NSA network such as an LTE cell (e.g., an eNB)
- the wireless device may be reattached to the base station of the 5G NSA network, such as an LTE cell (e.g., an eNB) .
- the wireless device may send a service request for data traffic (e.g., data traffic associated with an Internet browser, social media application, etc. ) to the base station of the 5G NSA network, such as an LTE cell (e.g., an eNB) , and a PS call between the wireless device and the base station of the NSA network, such as an LTE cell (e.g., an eNB) may be established for the sending/receiving of data traffic.
- an LTE cell e.g., an eNB
- the wireless device may be considered to have recovered from the abnormal PS service failure.
- the user may be able to access the Internet, improving the user experience in comparison to repeated abnormal PS service failures.
- FIG. 1 is a system block diagram illustrating an example communication system 100 suitable for implementing any of the various embodiments.
- the communications system 100 may be a 5G New Radio (NR) network, or any other suitable NSA network such as an LTE network, 5G (or later generation) NSA network, etc. While FIG. 1 illustrates a 5G network, later generation networks may include the same or similar elements. Therefore, the reference to a 5G network and 5G network elements in the following descriptions is for illustrative purposes and is not intended to be limiting.
- NR 5G New Radio
- the communications system 100 may include a heterogeneous network architecture that includes a core network 140 and a variety of mobile devices (illustrated as user equipment (UE) 120a-120e in FIG. 1) .
- the communications system 100 may also include a number of base stations (illustrated as the BS 110a, the BS 110b, the BS 110c, and the BS 110d) and other network entities.
- a base station is an entity that communicates with wireless devices, and also may be referred to as a Node B, an LTE Evolved nodeB (eNodeB or eNB) , an access point (AP) , a Radio head, a transmit receive point (TRP) , a New Radio base station (NR BS) , a 5G NodeB (NB) , a Next Generation NodeB (gNodeB or gNB) , or the like.
- Each base station may provide communication coverage for a particular geographic area.
- the term “cell” can refer to a coverage area of a base station, a base station Subsystem serving this coverage area, or a combination thereof, depending on the context in which the term is used.
- the core network 140 may be any type core network, such as an LTE core network (e.g., an EPC network) , 5G core network, etc.
- a base station 110a-110d may provide communication coverage for a macro cell, a pico cell, a femto cell, another type of cell, or a combination thereof.
- a macro cell may cover a relatively large geographic area (for example, several kilometers in radius) and may allow unrestricted access by mobile devices with service subscription.
- a pico cell may cover a relatively small geographic area and may allow unrestricted access by mobile devices with service subscription.
- a femto cell may cover a relatively small geographic area (for example, a home) and may allow restricted access by mobile devices having association with the femto cell (for example, mobile devices in a closed subscriber group (CSG) ) .
- a base station for a macro cell may be referred to as a macro BS.
- a base station for a pico cell may be referred to as a pico BS.
- a base station for a femto cell may be referred to as a femto BS or a home BS.
- a base station 110a may be a macro BS for a macro cell 102a
- a base station 110b may be a pico BS for a pico cell 102b
- a base station 110c may be a femto BS for a femto cell 102c.
- a base station 110a-110d may support one or multiple (for example, three) cells.
- eNB base station
- NR BS NR BS
- gNB gNode B
- AP AP
- node B node B
- 5G NB 5G NB
- cell may be used interchangeably herein.
- a cell may not be stationary, and the geographic area of the cell may move according to the location of a mobile base station.
- the base stations 110a-110d may be interconnected to one another as well as to one or more other base stations or network nodes (not illustrated) in the communications system 100 through various types of backhaul interfaces, such as a direct physical connection, a virtual network, or a combination thereof using any suitable transport network
- the base station 110a-110d may communicate with the core network 140 over a wired or wireless communication link 126.
- the wireless device e.g., user equipment (UE)
- UE user equipment
- the wired communication link 126 may use a variety of wired networks (e.g., Ethernet, TV cable, telephony, fiber optic and other forms of physical network connections) that may use one or more wired communication protocols, such as Ethernet, Point-To-Point protocol, High-Level Data Link Control (HDLC) , Advanced Data Communication Control Protocol (ADCCP) , and Transmission Control Protocol/Internet Protocol (TCP/IP) .
- wired networks e.g., Ethernet, TV cable, telephony, fiber optic and other forms of physical network connections
- wired communication protocols such as Ethernet, Point-To-Point protocol, High-Level Data Link Control (HDLC) , Advanced Data Communication Control Protocol (ADCCP) , and Transmission Control Protocol/Internet Protocol (TCP/IP) .
- HDMI High-Level Data Link Control
- ADCCP Advanced Data Communication Control Protocol
- TCP/IP Transmission Control Protocol/Internet Protocol
- the communications system 100 also may include relay stations (e.g., relay BS 110d) .
- a relay station is an entity that can receive a transmission of data from an upstream station (for example, a base station or a mobile device) and transmit the data to a downstream station (for example, a wireless device (e.g., UE) or a base station) .
- a relay station also may be a mobile device that can relay transmissions for other wireless devices.
- a relay station 110d may communicate with macro the base station 110a and the wireless device 120d in order to facilitate communication between the base station 110a and the wireless device 120d.
- a relay station also may be referred to as a relay base station, a relay base station, a relay, etc.
- the communications system 100 may be a heterogeneous network that includes base stations of different types, for example, macro base stations, pico base stations, femto base stations, relay base stations, etc. These different types of base stations may have different transmit power levels, different coverage areas, and different impacts on interference in communications system 100. For example, macro base stations may have a high transmit power level (for example, 5 to 40 Watts) whereas pico base stations, femto base stations, and relay base stations may have lower transmit power levels (for example, 0.1 to 2 Watts) .
- macro base stations may have a high transmit power level (for example, 5 to 40 Watts) whereas pico base stations, femto base stations, and relay base stations may have lower transmit power levels (for example, 0.1 to 2 Watts) .
- a network controller 130 may couple to a set of base stations and may provide coordination and control for these base stations.
- the network controller 130 may communicate with the base stations via a backhaul.
- the base stations also may communicate with one another, for example, directly or indirectly via a wireless or wireline backhaul.
- the wireless devices 120a, 120b, 120c may be dispersed throughout communications system 100, and each wireless device may be stationary or mobile.
- a wireless device also may be referred to as an access terminal, a terminal, a mobile station, a subscriber unit, a station, user equipment (UE) , etc.
- a macro base station 110a may communicate with the communication network 140 over a wired or wireless communication link 126.
- the wireless devices 120a, 120b, 120c may communicate with a base station 110a-110d over a wireless communication link 122.
- the wireless communication links 122, 124 may include a plurality of carrier signals, frequencies, or frequency bands, each of which may include a plurality of logical channels.
- the wireless communication links 122 and 124 may utilize one or more Radio access technologies (RATs) .
- RATs Radio access technologies
- Examples of RATs that may be used in a wireless communication link include 3GPP LTE, 3G, 4G, 5G (e.g., NR) , GSM, CDMA, WCDMA, Worldwide Interoperability for Microwave Access (WiMAX) , Time Division Multiple Access (TDMA) , and other mobile telephony communication technologies cellular RATs.
- RATs that may be used in one or more of the various wireless communication links 122, 124 within the communication system 100 include medium range protocols such as Wi-Fi, LTE-U, LTE-Direct, LAA, MuLTEfire, and relatively short range RATs such as ZigBee, Bluetooth, and Bluetooth Low Energy (LE) .
- medium range protocols such as Wi-Fi, LTE-U, LTE-Direct, LAA, MuLTEfire
- relatively short range RATs such as ZigBee, Bluetooth, and Bluetooth Low Energy (LE) .
- Certain wireless networks utilize orthogonal frequency division multiplexing (OFDM) on the downlink and single-carrier frequency division multiplexing (SC-FDM) on the uplink.
- OFDM and SC-FDM partition the system bandwidth into multiple (K) orthogonal subcarriers, which are also commonly referred to as tones, bins, etc.
- K orthogonal subcarriers
- Each subcarrier may be modulated with data.
- modulation symbols are sent in the frequency domain with OFDM and in the time domain with SC-FDM.
- the spacing between adjacent subcarriers may be fixed, and the total number of subcarriers (K) may be dependent on the system bandwidth.
- the spacing of the subcarriers may be 15 kHz and the minimum Resource allocation (called a “resource block” ) may be 12 subcarriers (or 180 kHz) . Consequently, the nominal Fast File Transfer (FFT) size may be equal to 128, 256, 512, 1024 or 2048 for system bandwidth of 1.25, 2.5, 5, 10 or 20 megahertz (MHz) , respectively.
- the system bandwidth may also be partitioned into subbands. For example, a subband may cover 1.08 MHz (i.e., 6 Resource blocks) , and there may be 1, 2, 4, 8 or 16 subbands for system bandwidth of 1.25, 2.5, 5, 10 or 20 MHz, respectively.
- NR may utilize OFDM with a cyclic prefix (CP) on the uplink (UL) and downlink (DL) and include support for half-duplex operation using time division duplex (TDD) .
- CP cyclic prefix
- TDD time division duplex
- a single component carrier bandwidth of 100 MHz may be supported.
- NR Resource blocks may span 12 sub-carriers with a sub-carrier bandwidth of 75 kHz over a 0.1 millisecond (ms) duration.
- Each Radio frame may consist of 50 subframes with a length of 10 ms. Consequently, each subframe may have a length of 0.2 ms.
- Each subframe may indicate a link direction (i.e., DL or UL) for data transmission and the link direction for each subframe may be dynamically switched.
- Each subframe may include DL/UL data as well as DL/UL control data.
- Beamforming may be supported and beam direction may be dynamically configured.
- Multiple Input Multiple Output (MIMO) transmissions with precoding may also be supported.
- MIMO configurations in the DL may support up to eight transmit antennas with multi-layer DL transmissions up to eight streams and up to two streams per wireless device. Multi-layer transmissions with up to 2 streams per wireless device may be supported. Aggregation of multiple cells may be supported with up to eight serving cells.
- NR may support a different air interface, other than an OFDM-based air interface.
- MTC and eMTC mobile devices include, for example, robots, drones, remote devices, sensors, meters, monitors, location tags, etc., that may communicate with a base station, another device (for example, remote device) , or some other entity.
- a wireless node may provide, for example, connectivity for or to a network (for example, a wide area network such as Internet or a cellular network) via a wired or wireless communication link.
- Some mobile devices may be considered Internet-of-Things (IoT) devices or may be implemented as NB-IoT (narrowband internet of things) devices.
- a wireless device (e.g., UE) 120a-e may be included inside a housing that houses components of the wireless device, such as processor components, memory components, similar components, or a combination thereof.
- any number of communication systems and any number of wireless networks may be deployed in a given geographic area.
- Each communications system and wireless network may support a particular Radio access technology (RAT) and may operate on one or more frequencies.
- RAT also may be referred to as a Radio technology, an air interface, etc.
- a frequency also may be referred to as a carrier, a frequency channel, etc.
- Each frequency may support a single RAT in a given geographic area in order to avoid interference between communications systems of different RATs.
- 4G/LTE and/or 5G/NR RAT networks may be deployed.
- a 5G NSA network may utilize both 4G/LTE RAT in the 4G/LTE RAN side of the 5G NSA network and 5G/NR RAT in the 5G/NR RAN side of the 5G NSA network.
- the 4G/LTE RAN and the 5G/NR RAN may both connect to one another and a 4G/LTE core network (e.g., an EPC network) in a 5G NSA network.
- a 4G/LTE core network e.g., an EPC network
- two or more wireless devices 120a-e may communicate directly using one or more sidelink channels 124 (for example, without using a base station 110a-110d as an intermediary to communicate with one another) .
- wireless device 120a-e may communicate using peer-to-peer (P2P) communications, device-to-device (D2D) communications, a vehicle-to-everything (V2X) protocol (which may include a vehicle-to-vehicle (V2V) protocol, a vehicle-to-infrastructure (V2I) protocol, or similar protocol) , a mesh network, or similar networks, or combinations thereof.
- V2X vehicle-to-everything
- the wireless device 120a-e may perform scheduling operations, resource selection operations, as well as other operations described elsewhere herein as being performed by the base station 110a
- FIG. 2 is a component block diagram illustrating an example computing and wireless modem system 200 suitable for implementing any of the various embodiments.
- Various embodiments may be implemented on a number of single processor and multiprocessor computer systems, including a system-on-chip (SOC) or system in a package (SIP) .
- SOC system-on-chip
- SIP system in a package
- the illustrated example wireless device 200 (which may be a SIP in some embodiments) includes a two SOCs 202, 204 coupled to a clock 206, a voltage regulator 208, and a wireless transceiver 266 configured to send and receive wireless communications via an antenna (not shown) to/from network wireless devices, such as a base station 110a.
- the first SOC 202 operate as central processing unit (CPU) of the wireless device that carries out the instructions of software application programs by performing the arithmetic, logical, control and input/output (I/O) operations specified by the instructions.
- the second SOC 204 may operate as a specialized processing unit.
- the second SOC 204 may operate as a specialized 5G (or later generation) processing unit responsible for managing high volume, high speed (e.g., 5 Gbps, etc. ) , and/or very high frequency short wave length (e.g., 28 GHz mmWave spectrum, etc. ) communications.
- 5G or later generation
- the first SOC 202 may include a digital signal processor (DSP) 210, a modem processor 212, a graphics processor 214, an application processor (AP) 216, one or more coprocessors 218 (e.g., vector co-processor) connected to one or more of the processors, memory 220, custom circuity 222, system components and resources 224, an interconnection/bus module 226, one or more temperature sensors 230, a thermal management unit 232, and a thermal power envelope (TPE) component 234.
- DSP digital signal processor
- AP application processor
- coprocessors 218 e.g., vector co-processor
- the second SOC 204 may include a 5G modem processor 252, a power management unit 254, an interconnection/bus module 264, the plurality of mmWave transceivers 256, memory 258, and various additional processors 260, such as an applications processor, packet processor, etc.
- Each processor 210, 212, 214, 216, 218, 252, 260 may include one or more cores, and each processor/core may perform operations independent of the other processors/cores.
- the first SOC 202 may include a processor that executes a first type of operating system (e.g., FreeBSD, LINUX, OS X, etc. ) and a processor that executes a second type of operating system (e.g., MICROSOFT WINDOWS 10) .
- a first type of operating system e.g., FreeBSD, LINUX, OS X, etc.
- a second type of operating system e.g., MICROSOFT WINDOWS 10.
- processors 210, 212, 214, 216, 218, 252, 260 may be included as part of a processor cluster architecture (e.g., a synchronous processor cluster architecture, an asynchronous or heterogeneous processor cluster architecture, etc. ) .
- a processor cluster architecture e.g., a synchronous processor cluster architecture, an asynchronous or heterogeneous processor cluster architecture, etc.
- the first and second SOC 202, 204 may include various system components, resources and custom circuitry for managing sensor data, analog-to-digital conversions, wireless data transmissions, and for performing other specialized operations, such as decoding data packets and processing encoded audio and video signals for rendering in a web browser.
- the system components and resources 224 of the first SOC 202 may include power amplifiers, voltage regulators, oscillators, phase-locked loops, peripheral bridges, data controllers, memory controllers, system controllers, access ports, timers, and other similar components used to support the processors and software clients running on a wireless device.
- the system components and resources 224 and/or custom circuitry 222 may also include circuitry to interface with peripheral devices, such as cameras, electronic displays, wireless communication devices, external memory chips, etc.
- the first and second SOC 202, 204 may communicate via interconnection/bus module 250.
- the various processors 210, 212, 214, 216, 218, may be interconnected to one or more memory elements 220, system components and resources 224, and custom circuitry 222, and a thermal management unit 232 via an interconnection/bus module 226.
- the processor 252 may be interconnected to the power management unit 254, the mmWave transceivers 256, memory 258, and various additional processors 260 via the interconnection/bus module 264.
- the interconnection/bus module 226, 250, 264 may include an array of reconfigurable logic gates and/or implement a bus architecture (e.g., CoreConnect, AMBA, etc. ) . Communications may be provided by advanced interconnects, such as high-performance networks-on chip (NoCs) .
- NoCs high-performance networks-on chip
- the first and/or second SOCs 202, 204 may further include an input/output module (not illustrated) for communicating with resources external to the SOC, such as a clock 206 and a voltage regulator 208.
- resources external to the SOC e.g., clock 206, voltage regulator 208 may be shared by two or more of the internal SOC processors/cores.
- various embodiments may be implemented in a wide variety of computing systems, which may include a single processor, multiple processors, multicore processors, or any combination thereof.
- FIG. 3 is a component block diagram illustrating a software architecture 300 including a radio protocol stack for the user and control planes in wireless communications suitable for implementing any of the various embodiments.
- the wireless device 320 may implement the software architecture 300 to facilitate communication between a wireless device 320 (e.g., the wireless device 120a-120e, 200) and the base station 350 (e.g., the base station 110a) of a communication system (e.g., 100) .
- layers in software architecture 300 may form logical connections with corresponding layers in software of the base station 350.
- the software architecture 300 may be distributed among one or more processors (e.g., the processors 212, 214, 216, 218, 252, 260) .
- the software architecture 300 may include multiple protocol stacks, each of which may be associated with a different SIM (e.g., two protocol stacks associated with two SIMs, respectively, in a dual-SIM wireless communication device) . While described below with reference to LTE communication layers, the software architecture 300 may support any of variety of standards and protocols for wireless communications, and/or may include additional protocol stacks that support any of variety of standards and protocols wireless communications.
- the software architecture 300 may include a Non-Access Stratum (NAS) 302 and an Access Stratum (AS) 304.
- the NAS 302 may include functions and protocols to support Packet filtering, security management, mobility control, session management, and traffic and signaling between a SIM (s) of the wireless device and its core network 140.
- the AS 304 may include functions and protocols that support communication between a SIM (s) and entities of supported access networks (e.g., a base station) .
- the AS 304 may include at least three layers (Layer 1, Layer 2, and Layer 3) , each of which may contain various sub-layers.
- Layer 1 (L1) of the AS 304 may be a physical layer (PHY) 306, which may oversee functions that enable transmission and/or reception over the air interface.
- PHY physical layer
- Examples of such physical layer 306 functions may include cyclic redundancy check (CRC) attachment, coding blocks, scrambling and descrambling, modulation and demodulation, signal measurements, MIMO, etc.
- the physical layer may include various logical channels, including the Physical Downlink Control Channel (PDCCH) and the Physical Downlink Shared Channel (PDSCH) .
- PDCH Physical Downlink Control Channel
- PDSCH Physical Downlink Shared Channel
- Layer 2 (L2) of the AS 304 may be responsible for the link between the wireless device 320 and the base station 350 over the physical layer 306.
- Layer 2 may include a Media Access Control (MAC) sublayer 308, a Radio link Control (RLC) sublayer 310, and a Packet data convergence protocol (PDCP) 312 sublayer, each of which form logical connections terminating at the base station 350.
- MAC Media Access Control
- RLC Radio link Control
- PDCP Packet data convergence protocol
- Layer 3 (L3) of the AS 304 may include a Radio Resource Control (RRC) sublayer 3.
- RRC Radio Resource Control
- the software architecture 300 may include additional Layer 3 sublayers, as well as various upper layers above Layer 3.
- the RRC sublayer 313 may provide functions including broadcasting system information, paging, and establishing and releasing an RRC signaling connection between the wireless device 320 and the base station 350.
- the PDCP sublayer 312 may provide uplink functions including multiplexing between different Radio bearers and logical channels, sequence number addition, handover data handling, integrity protection, ciphering, and header compression.
- the PDCP sublayer 312 may provide functions that include in-sequence delivery of data packets, duplicate data Packet detection, integrity validation, deciphering, and header decompression.
- the RLC sublayer 310 may provide segmentation and concatenation of upper layer data packets, retransmission of lost data packets, and Automatic Repeat Request (ARQ) .
- ARQ Automatic Repeat Request
- the RLC sublayer 310 functions may include reordering of data packets to compensate for out-of-order reception, reassembly of upper layer data packets, and ARQ.
- MAC sublayer 308 may provide functions including multiplexing between logical and transport channels, random access procedure, logical channel priority, and hybrid-ARQ (HARQ) operations.
- the MAC layer functions may include channel mapping within a cell, de-multiplexing, discontinuous reception (DRX) , and HARQ operations.
- the software architecture 300 may provide functions to transmit data through physical media
- the software architecture 300 may further include at least one host layer 314 to provide data transfer services to various applications in the wireless device 320.
- application-specific functions provided by the at least one host layer 314 may provide an interface between the software architecture and the general purpose processor.
- the software architecture 300 may include one or more higher logical layer (e.g., transport, session, presentation, application, etc. ) that provide host layer functions.
- the software architecture 300 may include a network layer (e.g., IP layer) in which a logical connection terminates at a PDN gateway (PGW) .
- PGW PDN gateway
- the software architecture 300 may include an application layer in which a logical connection terminates at another device (e.g., end user device, server, etc. ) .
- the software architecture 300 may further include in the AS 304 a hardware interface 316 between the physical layer 306 and the communication hardware (e.g., one or more radio frequency (RF) transceivers) .
- RF radio frequency
- FIG. 4 is a component block diagram illustrating a communication system 400 configured for wireless communication in accordance with various embodiments.
- the communication system 400 may include a wireless device 120 and one or more base stations 110 forming a wireless communication network 424, which may provide connections to external resources 422.
- External resources 422 may include sources of information outside of system 400, external entities participating with the system 400, and/or other resources.
- a wireless device 120 may be configured by machine-readable instructions 406.
- Machine-readable instructions 406 may include one or more instruction modules.
- the instruction modules may include computer program modules.
- the instruction modules may include one or more of PS service monitoring module 408, attachment/detachment module 410, PS call module 412, and/or other instruction modules.
- the PS service monitoring module 408 may be configured to maintain a counter to record the number of abnormal PS service failure events that occur with the NSA network, such as a 5G or later generation NSA network.
- the PS service monitoring module 408 may be configured to determine whether a total number of abnormal PS service failure events during a time period exceeds a maximum counter value.
- the time period may be ten seconds and the maximum counter value may be five.
- the PS service monitoring module 408 may be configured to determine whether a PS service failure is an abnormal PS service failure, such as a termination of a PS service or PS call that is unexpected, or a normal PS service failure, such as a termination of a PS service or PS call that is expected.
- An abnormal PS service failure can be any PS service failure that is unexpected.
- An example indication of an abnormal PS service failure occurring may be a TCP/IP connection used for a PS service ending while UL data is still awaiting transmission in a pre-transmit queue on the wireless device.
- the PS service monitoring module 408 may monitor the state of a TCP/IP connection and a pre-transmit queue to determine whether UL data is still awaiting transmission in the pre-transmit queue when a TCP/IP connection ends.
- UL data awaiting transmission may indicate the TCP/IP connection ending is unexpected and the PS service failure is abnormal.
- Another example indication of an abnormal PS service failure occurring may be a reachability test (e.g., a “Ping Test” ) failing, such as a network echo request being sent without receiving a network echo reply.
- the PS service monitoring module 408 may monitor the state reachability tests, such as Ping Tests, and a reachability test failing (e.g., no echo reply being received) may indicate the PS service failure is unexpected and the PS service failure is abnormal.
- a PS service failure may cause a data call (e.g., a PS call) to abnormally terminate.
- the PS service monitoring module 408 may be configured to store indications of abnormal PS service failure events in a memory (e.g., electronic storage 424) .
- the PS service monitoring module 408 may be configured to include timestamps with the indications of the abnormal PS service failure events, such as timestamps of when the abnormal PS service failures occurred and/or were detected.
- the PS service monitoring module 408 may be configured to track the number of abnormal PS service failure event indications having timestamps falling in the time window corresponding to the time period, such as the total number of abnormal PS service failure events occurring in the ten seconds prior to the most recent abnormal PS service failure event.
- the PS service monitoring module 408 may be configured to operate as a counter and timer combination to track the total number of abnormal PS service failure events in a time period. For example, the PS service monitoring module 408 may track a total number of abnormal PS service failures during a time period tracked by the timer, and the counter may be reset at each expiration of the timer. The PS service monitoring module 408 may be configured to indicate to the attachment/detachment module 410 and/or the PS call module 412 that the total number of abnormal PS service failure events during the time period exceeds the maximum counter value.
- the attachment/detachment module 410 may be configured to attach and/or detach to/from a base station in the NSA network, such as an LTE cell (e.g., an eNB) in a 5G (or later generation) NSA network.
- the attachment/detachment module 410 may be configured to send a detach request (DETACH REQUEST) to a base station of an NSA network, such as an LTE cell (e.g., an eNB) .
- the attachment/detachment module 410 may be configured to receive a detach acceptance from a base station of an NSA network, such as an LTE cell (e.g., an eNB) , in response to sending a detach request.
- the attachment/detachment module 410 may be configured to send an attach request (ATTACH_REQ) to a base station of an NSA network, such as an LTE cell (e.g., an eNB) .
- the attach request may indicate EN-DC is supported by the wireless device.
- the attachment/detachment module 410 may be configured to receive an attachment acceptance (ATTACH_ACCEPT) from a base station of an NSA network, such as an LTE cell (e.g., an eNB) , in response to sending an attach request.
- ATTACH_ACCEPT attachment acceptance
- the attachment/detachment module 410 may be configured to receive an indication that the total number of abnormal PS service failure events during a time period exceeds a maximum counter value from the PS service monitoring module 408.
- the attachment/detachment module 410 may be configured to send a detach request to a base station of an NSA network, such as a LTE cell (e.g., an eNB) in a 5G (or later generation) NSA network, in response determining that the total number of abnormal PS service failure events during the time period exceeds the maximum counter value.
- an NSA network such as a LTE cell (e.g., an eNB) in a 5G (or later generation) NSA network
- the attachment/detachment module 410 may be configured to send an indication of an attachment and/or detachment to/from a base station in the NSA network, such as an LTE cell (e.g., an eNB) , to the PS call module 412.
- a base station in the NSA network such as an LTE cell (e.g., an eNB)
- LTE cell e.g., an eNB
- the PS call module 412 may be configured to support a PS service via a base station in the NSA network, such as an LTE cell (e.g., an eNB) in a 5G (or later generation) NSA network.
- the PS call module 412 may be configured to establish a PS call with a base station in the NSA network, such as an LTE cell (e.g., an eNB) .
- the PS call module 412 may be configured to receive an indication of an attachment and/or detachment to/from a base station in the 5G NSA network, such as a LTE cell (e.g., an eNB) , from the attachment/detachment module 410.
- the PS call module 412 may be configured to establish a PS call with a base station in the NSA network, such as an LTE cell (e.g., an eNB) , in response to receiving an attach acceptance.
- the wireless device 120, remote platform (s) 110, and/or external resources 422 may be operatively linked via one or more electronic communication links of the wireless communication network.
- the wireless communication network may establish links via a network such as the Internet and/or other networks.
- the wireless device 120 may include electronic storage 424, one or more processors 426 (e.g., an AP 216, modem processor 212, 252, etc. ) , one or more wireless transceivers 266, and/or other components.
- the wireless device 120a-120e may include communication lines, or ports to enable the exchange of information with a network and/or other wireless device.
- the illustration of the wireless device 120 is not intended to be limiting.
- the wireless device 120 may include a plurality of hardware, software, and/or firmware components operating together to provide the functionality attributed herein to wireless device 120.
- Electronic storage 424 may include non-transitory storage media that electronically stores information.
- the electronic storage media of electronic storage 424 may include one or both of system storage that is provided integrally (i.e., substantially non-removable) with the wireless device 120 and/or removable storage that is removably connectable to the wireless device 120 via, for example, a port (e.g., a universal serial bus (USB) port, a firewire port, etc. ) or a drive (e.g., a disk drive, etc. ) .
- Electronic storage 424 may include one or more of optically readable storage media (e.g., optical disks, etc. ) , magnetically readable storage media (e.g., magnetic tape, magnetic hard drive, floppy drive, etc.
- Electronic storage 424 may store software algorithms, information determined by processor (s) 426, information received from the wireless device 120, information received from remote platform (s) 110, and/or other information that enables the wireless device 120 to function as described herein.
- the processor (s) 426 may be configured to provide information processing capabilities in the wireless device 120.
- the processor (s) 426 may include one or more of a digital processor, an analog processor, a digital circuit designed to process information, an analog circuit designed to process information, a state machine, and/or other mechanisms for electronically processing information.
- the processor (s) 426 is illustrated as a single entity, this is for illustrative purposes only. In some embodiments, the processor (s) 426 may include a plurality of processing units and/or processor cores.
- the processor (s) 426 may be configured to execute modules 408, 410, and/or 412 and/or other modules by software; hardware; firmware; some combination of software, hardware, and/or firmware; and/or other mechanisms for configuring processing capabilities on processor (s) 426.
- the term “module” may refer to any component or set of components that perform the functionality attributed to the module. This may include one or more physical processors during execution of processor readable instructions, the processor readable instructions, circuitry, hardware, storage media, or any other components.
- modules 408, 410, and/or 412 are illustrated as being implemented within a single processing unit, in embodiments in which the processor (s) 426 includes multiple processing units and/or processor cores, one or more of modules 408, 410, and/or 412 may be implemented remotely from the other modules.
- the description of the functionality provided by the different modules 408, 410, and/or 412 described below is for illustrative purposes, and is not intended to be limiting, as any of modules 408, 410, and/or 412 may provide more or less functionality than is described.
- one or more of the modules 408, 410, and/or 412 may be eliminated, and some or all of its functionality may be provided by other modules 408, 410, and/or 412.
- the processor (s) 426 may be configured to execute one or more additional modules that may perform some or all of the functionality attributed below to one of the modules 408, 410, and/or 412.
- FIG. 5 is a process flow diagram illustrating a method 500 that may be performed by a processor of a wireless device for recovering from PS service failure in an NSA network, including a 5G (or later generation) NSA network.
- the method 500 may be implemented by one or more processors (e.g., 210, 212, 214, 216, 218, 252, 260, 426) of a wireless device (e.g., 120, 120a-120e, 200, 320) .
- the processor may send an attach request to a base station of an NSA network, the attach request indicating that EN-DC is supported by the wireless device.
- the processor may send an attach request (ATTACH_REQ) indicating EN-DC is supported by the wireless device to a base station of the NSA network, such as an LTE cell (e.g., an eNB) in a 5G (or later generation) NSA network.
- the processor may receive an attach acceptance from the base station of the 5G NSA network.
- the attach acceptance (ATTACH_ACCEPT) may be received from the base station of the 5G NSA network, such as an LTE cell (e.g., an eNB) , in response to sending the attach request (ATTACH_REQ) to the base station of the NSA network.
- LTE cell e.g., an eNB
- the processor may establish a PS call with the base station of the NSA network.
- Establishing a PS call with the base station of the NSA network may include sending a service request for data traffic (e.g., data traffic associated with an Internet browser, social media application, etc. ) to the base station of the NSA network, such as an LTE cell (e.g., an eNB) , after attaching to the base station and indicating EN-DC support.
- a service request for data traffic e.g., data traffic associated with an Internet browser, social media application, etc.
- the wireless device can establish a data call (i.e., a PS call) with the base station of the 5G NSA network, such as an LTE cell (e.g., an eNB) in a 5G (or later generation) NSA network, to send/receive the data traffic.
- a data call i.e., a PS call
- the base station of the 5G NSA network such as an LTE cell (e.g., an eNB) in a 5G (or later generation) NSA network
- the processor may determine whether an abnormal PS service failure is detected.
- An abnormal PS service failure can be any PS service failure that was unexpected.
- One example indication of an abnormal PS service failure occurring may be a Transmission Control Protocol (TCP) /Internet Protocol (IP) (TCP/IP) connection used for a PS service ending while uplink (UL) data is still awaiting transmission in a pre-transmit queue on the wireless device.
- Another example indication of an abnormal PS service failure occurring may be a reachability test (e.g., a “Ping Test” ) failing, such as a network echo request being sent without receiving a network echo reply.
- the PS service failure may cause the data call (i.e., the PS call) to abnormally terminate.
- the processor may continue to await an abnormal PS service failure and determine whether an abnormal PS service failure is detected in determination block 508.
- the processor may store an indication of an abnormal PS service failure event in block 510.
- indications of the abnormal PS service failure events may be stored.
- the indications of the abnormal PS service failure events may include timestamps of when the abnormal PS service failures occurred or were detected.
- the processor may determine whether a total number of abnormal PS service failure events during a time period exceeds a maximum counter value.
- a processor of a wireless device e.g., an application processor (AP) , modem processor, etc.
- AP application processor
- modem processor modem processor
- the counter may track the total number of abnormal PS service failure events during a time period.
- the time period may be ten seconds and the maximum counter value may be five abnormal PS service failure events.
- the time period such as ten seconds, may extend backward from the most recent abnormal PS service failure.
- the counter may track the number of abnormal PS service failure indications having timestamps falling in the time window corresponding to the time period, such as the total number of abnormal PS service failure events occurring or detected in the ten seconds prior to the most recent abnormal PS service failure.
- a counter and timer combination may be used to track the total number of abnormal PS service failure events during a time period and the operations of block 510 may be optional.
- the counter may track a total number of abnormal PS service failure events during a time period tracked by the timer, and the counter may be reset at each expiration of the timer.
- the processor may compare the counter value to the maximum counter value to determine whether a total number of abnormal PS service failure events during a time period exceeds a maximum counter value.
- the processor may establish a PS call with the base station of the NSA network in block 506. In this manner, the processor may attempt to reestablish the PS service by reestablishing a PS call with the base station of the NSA network.
- the processor may send a detach request to the base station of the NSA network in block 514.
- the detach request (DETACH REQUEST) may be sent to the base station of the 5G NSA network, such as an LTE cell (e.g., an eNB) in a 5G (or later generation) NSA network, to detach the wireless device from the base station and the NSA network.
- the processor may receive a detach acceptance from the base station of the NSA network.
- the detach acceptance may be received from the base station of the 5G NSA network, such as an LTE cell (e.g., an eNB) in a 5G (or later generation) NSA network, in response to sending the detach request (DETACH REQUEST) to the base station of the 5G NSA network.
- the receipt of the detach acceptance may confirm the wireless device is detached from the base station and the NSA network.
- the processor may send a new attach request to the base station of the NSA network, the new attach request indicating that EN-DC is supported by the wireless device.
- the processor may send a new attach request (ATTACH_REQ) indicating EN-DC is supported by the wireless device to the base station of the NSA network, such as an LTE cell (e.g., an eNB) in a 5G (or later generation) NSA network.
- the sending of a new attach request to the base station of the NSA network may be in response to sending the detach request (DETACH REQUEST) to the base station of the NSA network.
- the wireless device may attempt to reattach to the same base station of the 5G NSA network upon detaching from that base station of the wireless device in response to the total number of abnormal PS service failure events during the time period exceeding the maximum counter value.
- the processor may receive a new attach acceptance from the base station of the NSA network.
- the new attach acceptance (ATTACH_ACCEPT) may be received from the base station of the 5G NSA network, such as an LTE cell (e.g., an eNB) in a 5G (or later generation) NSA network, in response to sending the new attach request (ATTACH_REQ) to the base station of the 5G NSA network.
- LTE cell e.g., an eNB
- 5G (or later generation) NSA network in response to sending the new attach request (ATTACH_REQ) to the base station of the 5G NSA network.
- the processor may establish a new PS call with the base station of the NSA network.
- Establishing the new PS call with the base station of the NSA network such as an LTE cell (e.g., an eNB) in a 5G (or later generation) NSA network, may include sending a service request for data traffic (e.g., data traffic associated with an Internet browser, social media application, etc. ) to the base station of the NSA network after reattaching to the base station and indicating EN-DC support.
- a service request for data traffic e.g., data traffic associated with an Internet browser, social media application, etc.
- the wireless device can establish a new data call (i.e., a new PS call) with the base station of the NSA network, such as an LTE cell (e.g., an eNB) , to send/receive the data traffic.
- a new PS call may reestablish PS service on the wireless device upon the total number of abnormal PS service failure events during the time period exceeding the maximum counter value.
- FIG. 6 is a call flow diagram illustrating example interactions between one or more processors (such as 210, 212, 214, 216, 218, 252, 260, 426) of a wireless device (such as the wireless device 120a-120e, 200, 320, 120a-120e) and a base station (e.g., base station 110a, 350, 110) of an NSA network including a 5G (or later generation) NSA network (100) in accordance with various embodiments.
- the interactions illustrated in FIG. 6 reflect example implementations of the various embodiment methods for recovering from PS service failure in an NSA network, such as one or more operations of method 500.
- FIG. 1 the interactions illustrated in FIG. 6 reflect example implementations of the various embodiment methods for recovering from PS service failure in an NSA network, such as one or more operations of method 500.
- FIG. 6 illustrates an example implementation in which some operations are performed by an application processor (labeled DATA (UE) in FIG. 6) of the wireless device and some operations are performed by a modem processor (labeled NAS (UE) in FIG. 6) of the wireless device while the wireless device is communicating with a base station of the NSA network (labeled LTE anchor cell in FIG. 6) .
- an application processor labeled DATA (UE) in FIG. 6) of the wireless device
- NAS modem processor
- FIG. 6 illustrates that in response to determining a max counter for abnormal PS service failure events being reached, the application processor may indicate the PS service failure (e.g., via a DATASTOP indication) to the modem processor and the modem processor may detach and reattach to the base station of the NSA network via a sequence of detach requests, detach acceptances, attach requests indicating EN-DC is supported, attach acceptances, and service requests (e.g., PS call establishments) .
- the application processor may indicate the PS service failure (e.g., via a DATASTOP indication) to the modem processor and the modem processor may detach and reattach to the base station of the NSA network via a sequence of detach requests, detach acceptances, attach requests indicating EN-DC is supported, attach acceptances, and service requests (e.g., PS call establishments) .
- PS service requests e.g., PS call establishments
- FIG. 7 is a component block diagram of a network computing device 700 suitable for use with various embodiments.
- Such network computing devices may include at least the components illustrated in FIG. 7.
- the network computing device 700 may include a processor 701 coupled to volatile memory 702 and a large capacity nonvolatile memory, such as a disk drive 703.
- the network computing device 700 may also include a peripheral memory access device such as a floppy disc drive, compact disc (CD) or digital video disc (DVD) drive 706 coupled to the processor 701.
- the network computing device 700 may also include network access ports 704 (or interfaces) coupled to the processor 701 for establishing data connections with a network, such as the Internet and/or a local area network coupled to other system computers and servers.
- a network such as the Internet and/or a local area network coupled to other system computers and servers.
- the network computing device 700 may include one or more antennas 707 for sending and receiving electromagnetic radiation that may be connected to a wireless communication link.
- the network computing device 700 may include additional access ports, such as USB, Firewire, Thunderbolt, and the like for coupling to peripherals, external memory, or other devices.
- FIG. 8 is a component block diagram of a wireless device 800 suitable for use with various embodiments.
- various embodiments may be implemented on a variety of wireless device 800 (e.g., the wireless device 120a-120e, 200, 320, 120a-120e) , an example of which is illustrated in FIG. 8 in the form of a smartphone.
- the wireless device 800 may include a first SOC 202 (e.g., a SOC-CPU) coupled to a second SOC 204 (e.g., a 5G capable SOC) .
- the first and second SOCs 202, 204 may be coupled to internal memory 424, 816, a display 812, and to a speaker 814.
- the wireless device 800 may include an antenna 804 for sending and receiving electromagnetic radiation that may be connected to a wireless transceiver 266 coupled to one or more processors in the first and/or second SOCs 202, 204.
- the wireless device 800 may also include menu selection buttons or rocker switches 820 for receiving user inputs.
- the wireless device 800 also includes a sound encoding/decoding (CODEC) circuit 810, which digitizes sound received from a microphone into data packets suitable for wireless transmission and decodes received sound data packets to generate analog signals that are provided to the speaker to generate sound.
- CODEC sound encoding/decoding
- one or more of the processors in the first and second SOCs 202, 204, wireless transceiver 266 and CODEC 810 may include a digital signal processor (DSP) circuit (not shown separately) .
- DSP digital signal processor
- the processors of the wireless network computing device 700 and the wireless device 800 may be any programmable microprocessor, microcomputer or multiple processor chip or chips that can be configured by software instructions (applications) to perform a variety of functions, including the functions of the various embodiments described below.
- multiple processors may be provided, such as one processor within an SOC 204 dedicated to wireless communication functions and one processor within an SOC 202 dedicated to running other applications.
- Software applications may be stored in the memory 424, 816 before they are accessed and loaded into the processor.
- the processors may include internal memory sufficient to store the application software instructions.
- a component may be, but is not limited to, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer.
- a component may be, but is not limited to, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer.
- an application running on a wireless device and the wireless device may be referred to as a component.
- One or more components may reside within a process and/or thread of execution and a component may be localized on one processor or core and/or distributed between two or more processors or cores. In addition, these components may execute from various non-transitory computer readable media having various instructions and/or data structures stored thereon. Components may communicate by way of local and/or remote processes, function or procedure calls, electronic signals, data packets, memory read/writes, and other known network, computer, processor, and/or process related communication methodologies.
- Such services and standards include, e.g., third generation partnership project (3GPP) , LTE systems, third generation wireless mobile communication technology (3G) , fourth generation wireless mobile communication technology (4G) , fifth generation wireless mobile communication technology (5G) as well as later generation 3GPP technology, global system for mobile communications (GSM) , universal mobile telecommunications system (UMTS) , 3GSM, general Packet Radio service (GPRS) , code division multiple access (CDMA) systems (e.g., cdmaOne, CDMA1020TM) , enhanced data rates for GSM evolution (EDGE) , advanced mobile phone system (AMPS) , digital AMPS (IS-136/TDMA) , evolution-data optimized (EV-DO) , digital enhanced cordless telecommunications (DECT) , Worldwide Interoperability for Microwave Access (WiMAX) , wireless local area network
- 3GPP third generation partnership project
- 3G third generation wireless mobile communication technology
- 4G fourth generation wireless mobile communication technology
- 5G fifth
- DSP digital signal processor
- ASIC application specific integrated circuit
- FPGA field programmable gate array
- a general-purpose processor may be a microprocessor, but, in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine.
- a processor may also be implemented as a combination of receiver smart objects, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration. Alternatively, some operations or methods may be performed by circuitry that is specific to a given function.
- the functions described may be implemented in hardware, software, firmware, or any combination thereof. If implemented in software, the functions may be stored as one or more instructions or code on a non-transitory computer-readable storage medium or non-transitory processor-readable storage medium.
- the operations of a method or algorithm disclosed herein may be embodied in a processor-executable software module or processor-executable instructions, which may reside on a non-transitory computer-readable or processor-readable storage medium.
- Non-transitory computer-readable or processor-readable storage media may be any storage media that may be accessed by a computer or a processor.
- non-transitory computer-readable or processor-readable storage media may include RAM, ROM, EEPROM, FLASH memory, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage smart objects, or any other medium that may be used to store desired program code in the form of instructions or data structures and that may be accessed by a computer.
- Disk and disc includes compact disc (CD) , laser disc, optical disc, digital versatile disc (DVD) , floppy disk, and Blu-ray disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers. Combinations of the above are also included within the scope of non-transitory computer-readable and processor-readable media.
- the operations of a method or algorithm may reside as one or any combination or set of codes and/or instructions on a non-transitory processor-readable storage medium and/or computer-readable storage medium, which may be incorporated into a computer program product.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Embodiments include systems and methods for enabling quick recovery by from packet switched (PS) service failure in a non-standalone (NSA) network, such as a fifth or later generation NSA network. Various embodiments for recovering from PS service failure in an NSA network may include determining whether a total number of abnormal PS service failure events during a time period exceeds a maximum counter value, sending a detach request to a base station of the NSA network in response determining that the total number of abnormal PS service failure events during the time period exceeds the maximum counter value, and sending a new attach request to the base station of the NSA network in response to sending the detach request to the base station of the NSA network, the new attach request indicating that Evolved Universal Terrestrial Radio Access (E-UTRA) –new radio (NR) dual connectivity (EN-DC) is supported by the wireless device.
Description
Long Term Evolution (LTE) , Fifth Generation (5G) new radio (NR) (5G-NR) , and other recently developed communication technologies allow user equipment to communicate information at data rates (e.g., in terms of Gigabits per second, etc. ) that are orders of magnitude greater than what was available just a few years ago.
Today’s communication networks are also more secure, resilient to multipath fading, allow for lower network traffic latencies, provide better communication efficiencies (e.g., in terms of bits per second per unit of bandwidth used, etc. ) . These and other recent improvements have facilitated the emergence of the Internet of Things (IOT) , large scale Machine to Machine (M2M) communication systems, autonomous vehicles, and other technologies that rely on consistent and secure communications.
SUMMARY
Various aspects include systems and methods for enabling quick recovery by a wireless device from packet switched (PS) service failure in a non-standalone (NSA) network, such as a fifth generation (5G) or later generation NSA network. Various aspects may be performed by a processor of a wireless device, such as a modem processor of a wireless device. Various aspects may include determining whether a total number of abnormal PS service failure events during a time period exceeds a maximum counter value, sending a detach request to a base station of the NSA network in response determining that the total number of abnormal PS service failure events during the time period exceeds the maximum counter value, and sending a new attach request to the base station of the NSA network in response to sending the detach request to the base station of the NSA network, the new attach request indicating that Evolved Universal Terrestrial Radio Access (E-UTRA) –new radio (NR) dual connectivity (EN-DC) is supported by the wireless device. In some aspects, the time period may be ten seconds and the maximum counter value may be five. In some aspects the NSA network may be a 5G NSA network.
Some aspects may further include sending an initial attach request to the base station of the NSA network prior to determining whether the total number of abnormal PS service failure events during the time period exceeds the maximum counter value, the initial attach request indicating that EN-DC is supported by the wireless device.
Some aspects may further include receiving an initial attach acceptance from the base station of the NSA network in response to sending the initial attach request, and establishing an initial PS call with the base station of the 5G NSA network in response to receiving the initial attach acceptance.
Some aspects may further include receiving a detach acceptance from the base station of the NSA network in response to sending the detach request. Some aspects may further include receiving a new attach acceptance from the base station of the NSA network in response to sending the new attach request, and establishing a new PS call with the base station of the NSA network in response to receiving the new attach acceptance.
Further aspects may include a wireless device having a processor configured to perform one or more operations of any of the methods summarized above. Further aspects may include a non-transitory processor-readable storage medium having stored thereon processor-executable instructions configured to cause a processor of a wireless device to perform operations of any of the methods summarized above. Further aspects include a wireless device having means for performing functions of any of the methods summarized above. Further aspects include a system-on-chip for use in a wireless device that includes a processor configured to perform one or more operations of any of the methods summarized above. Further aspects include a system in a package that includes two systems on chip for use in a wireless device that includes a processor configured to perform one or more operations of any of the methods summarized above.
The accompanying drawings, which are incorporated herein and constitute part of this specification, illustrate exemplary embodiments of the claims, and together with the general description given above and the detailed description given below, serve to explain the features of the claims.
FIG. 1 is a system block diagram illustrating an example communication system suitable for implementing any of the various embodiments.
FIG. 2 is a component block diagram illustrating an example computing and wireless modem system suitable for implementing any of the various embodiments.
FIG. 3 is a component block diagram illustrating a software architecture including a radio protocol stack for the user and control planes in wireless communications suitable for implementing any of the various embodiments.
FIG. 4 is a component block diagram illustrating a system configured for wireless communication in accordance with various embodiments.
FIG. 5 is a process flow diagram illustrating a method for recovering from packet switched (PS) service failure in a non-standalone (NSA) network in accordance with various embodiments.
FIG. 6 is a call flow diagram illustrating example interactions between a wireless device and a base station of an NSA network in accordance with various embodiments.
FIG. 7 is a component block diagram of a network computing device suitable for use with various embodiments.
FIG. 8 is a component block diagram of a wireless device suitable for use with various embodiments.
Various embodiments will be described in detail with reference to the accompanying drawings. Wherever possible, the same reference numbers will be used throughout the drawings to refer to the same or like parts. References made to particular examples and embodiments are for illustrative purposes, and are not intended to limit the scope of the claims.
Various embodiments include systems and methods for recovering from packet switched (PS) service failure in a non-standalone (NSA) network, such as a fifth generation (5G) or later generation NSA network. Various embodiments may enable detachment from the NSA network in response to PS service failure followed by attachment again to the NSA network.
Detachment and reattachment to the NSA network may re-synchronize wireless device with the NSA network and may support the reestablishment of PS service. Various embodiments may improve user experience by enabling recovery from PS service failure and thereby allowing data traffic communications between a wireless device and the NSA network. Various embodiments may improve user experience by making data services, such as Internet access, etc., available to a user after a PS service failure.
The term “wireless device” is used herein to refer to any one or all of cellular telephones, smartphones, portable computing devices, personal or mobile multi-media players, laptop computers, tablet computers, smartbooks, ultrabooks, palmtop computers, wireless electronic mail receivers, multimedia Internet-enabled cellular telephones, wireless router devices, wireless appliances, medical devices and equipment, biometric sensors/devices, wearable devices including smart watches, smart clothing, smart glasses, smart wrist bands, smart jewelry (e.g., smart rings, smart bracelets, etc. ) , entertainment devices (e.g., wireless gaming controllers, music and video players, satellite radios, etc. ) , wireless-network enabled Internet of Things (IoT) devices including smart meters/sensors, industrial manufacturing equipment, large and small machinery and appliances for home or enterprise use, wireless communication elements within autonomous and semiautonomous vehicles, wireless devices affixed to or incorporated into various mobile platforms, global positioning system devices, and similar electronic devices that include a memory, wireless communication components and a programmable processor.
The term “system-on-chip” (SOC) is used herein to refer to a single integrated circuit (IC) chip that contains multiple resources and/or processors integrated on a single substrate. A single SOC may contain circuitry for digital, analog, mixed-signal, and radio-frequency functions. A single SOC may also include any number of general purpose and/or specialized processors (digital signal processors, modem processors, video processors, etc. ) , memory blocks (e.g., ROM, RAM, Flash, etc. ) , and resources (e.g., timers, voltage regulators, oscillators, etc. ) . SOCs may also include software for controlling the integrated resources and processors, as well as for controlling peripheral devices.
The term “system in a package” (SIP) may be used herein to refer to a single module or package that contains multiple resources, computational units, cores and/or processors on two or more IC chips, substrates, or SOCs. For example, a SIP may include a single substrate on which multiple IC chips or semiconductor dies are stacked in a vertical configuration. Similarly, the SIP may include one or more multi-chip modules (MCMs) on which multiple ICs or semiconductor dies are packaged into a unifying substrate. A SIP may also include multiple independent SOCs coupled together via high speed communication circuitry and packaged in close proximity, such as on a single motherboard or in a single wireless device. The proximity of the SOCs facilitates high speed communications and the sharing of memory and resources.
As used herein, the terms “network, ” “system, ” “wireless network, ” “cellular network, ” and “wireless communication network” may interchangeably refer to a portion or all of a wireless network of a carrier associated with a wireless device and/or subscription on a wireless device. The techniques described herein may be used for various wireless communication networks, such as Code Division Multiple Access (CDMA) , time division multiple access (TDMA) , FDMA, orthogonal FDMA (OFDMA) , single carrier FDMA (SC-FDMA) and other networks. In general, any number of wireless networks may be deployed in a given geographic area. Each wireless network may support at least one radio access technology, which may operate on one or more frequency or range of frequencies. For example, a CDMA network may implement Universal Terrestrial Radio Access (UTRA) (including Wideband Code Division Multiple Access (WCDMA) standards) , CDMA2000 (including IS-2000, IS-95 and/or IS-856 standards) , etc. In another example, a TDMA network may implement GSM Enhanced Data rates for GSM Evolution (EDGE) . In another example, an OFDMA network may implement Evolved UTRA (E-UTRA) (including LTE standards) , IEEE 802.11 (WiFi) , IEEE 802.16 (WiMAX) , IEEE 802.20,
etc. Reference may be made to wireless networks that use LTE standards, and therefore the terms “Evolved Universal Terrestrial Radio Access, ” “E-UTRAN” and “eNodeB” may also be used interchangeably herein to refer to a wireless network. However, such references are provided merely as examples, and are not intended to exclude wireless networks that use other communication standards.
LTE is a mobile network standard for 4G wireless communication of high-speed data developed by the 3GPP (3rd Generation Partnership Project) and specified in its Release 8 document series. In contrast to the circuit-switched (CS) model of cellular network standards, LTE has been designed to support only packet switched (PS) services. Data services in LTE may be provided over the Internet, while multimedia services may be supported by the Internet Multimedia Subsystem (IMS) framework. The LTE standard is based on the evolution of the Universal Mobile Telecommunications System (UMTS) radio access through the Evolved Universal Terrestrial Radio Access Network (E-UTRAN) . The E-UTRAN together with the Evolved Packet Core (EPC) network (core network accommodating LTE) make up an Evolved Packet System (EPS) . While the access network in UMTS emulates a circuit-switched connection for real time services and a packet-switched connection for datacom services, the Evolved Packet System (EPS) is purely Internet Protocol (IP) based, and both real time services and datacom services are carried by the IP protocol.
The 5G system is an advanced technology from 4G LTE, and provides a new radio access technology (RAT) through the evolution of the existing mobile communication network structure. A 5G system may support, for example, extended LTE (eLTE) as well as non-3GPP access (e.g., WLAN) .
One implementation option for 5G systems or networks currently being adopted is an NSA network in which a radio access network (RAN) providing both LTE (also referred to as 4G) and new radio (NR) (also referred to a 5G) support (e.g., a RAN including both LTE base stations, such as LTE Evolved nodeBs (eNodeBs or eNBs) , and NR base stations, such as Next Generation NodeB (gNodeBs or gNBs) ) is connected to an LTE core network (e.g., an Evolved Packet Core (EPC) network) . Future generation systems (e.g., sixth generation (6G) or higher systems) may provide the same or similar NSA network services. A wireless device, sometimes referred to as a user equipment (UE) , in such NSA networks that can support both LTE and NR communications can signal to the NSA that the wireless device supports Evolved Universal Terrestrial Radio Access (E-UTRA) –new radio (NR) dual connectivity (EN-DC) . In such 5G NSA networks, a packet switched (PS) call failure on a wireless device indicating support for EN-DC can sometimes be unrecoverable and can sometimes result in all subsequent PS service setup attempts failing, thereby preventing data traffic communications. Such a PS call failure on a wireless device indicating support for EN-DC can result in a negative user experience as data services, such as Internet access, etc., can be unavailable for a period of time.
In NSA networks, different data traffic may exist for different services. For example, conventional IP-oriented (i.e., “data-centric” ) applications (e.g. web-browsers, games, e-mail applications, etc. ) , may be provided in an LTE and/or 5G (or later generation) system as data services over the public Internet. Real-time communication services (e.g., voice calls, Short Message Service (SMS) communications, etc. ) may be provided in an LTE and/or 5G system as IMS services. The IMS architecture allows operators to offer carrier grade services to be offered on packet-switched networks. Examples of services that have been standardized on top of IMS include Open Mobile Alliance (OMA) presence and group list management, Push-to-Talk over Cellular (PoC) , Instant Messaging, and TISPAN/3GPP multimedia telephony for IMS (MMTel) . Other IMS services that have been developed for deployment as next-generation LTE services include Voice over LTE (VoLTE) and Video Telephony (VT) . Thus, although LTE and 5G data is IP-based, the multiple data types/services may be accessed through different packet data networks (PDN) in the 5G NSA network.
In current 5G NSA networks, an abnormal PS service failure on a wireless device indicating support for EN-DC can sometimes be unrecoverable resulting in all subsequent PS service setup attempts failing, thereby preventing data traffic communications (also referred to as data-centric services) . Such PS service failures on a wireless device indicating support for EN-DC can result in a negative user experience as data services, such as Internet access, can be unavailable for a period of time.
For example, in some current 5G NSA networks, a 5G capable wireless device may register with the NSA network and initially indicate the wireless device has a dual 5G and LTE data capability. As specific example, the wireless device may send an attach request (ATTACH_REQ) indicating that EN-DC is supported by the wireless device. For example, a dual connectivity with E-UTRA and NR support flag bit may be set (e.g., EN-DC = 1) in the attach request sent to a base station of the 5G NSA network, such as an LTE cell (e.g., an eNB) . The base station of the 5G NSA network, such as an LTE cell (e.g., an eNB) may return an attachment acceptance (ATTACH_ACCEPT) to the wireless device.
In some current 5G NSA networks, the wireless device may send a service request for data traffic (e.g., data traffic associated with an Internet browser, social media application, etc. ) to the base station of the 5G NSA network, such as an LTE cell (e.g., an eNB) , after attaching to the base station and indicating EN-DC support. In this manner, the wireless device can establish a data call (i.e., a PS call) with the base station of the 5G NSA network, such as an LTE cell (e.g., an eNB) , to send/receive the data traffic.
In some NSA networks, following the data service request by the wireless device indicating that EN-DC is supported, the base station of the 5G NSA network, such as an LTE cell (e.g., an eNB) , an abnormal PS service failure can occur. Abnormal PS service failure can be any PS service failure that was unexpected. One example indication of an abnormal PS service failure occurring may be a Transmission Control Protocol (TCP) /Internet Protocol (IP) (TCP/IP) connection used for a PS service ending while uplink (UL) data is still awaiting transmission in a pre-transmit queue on the wireless device. Another example indication of an abnormal PS service failure occurring may be a reachability test (e.g., a “Ping Test” ) failing, such as a network echo request being sent without receiving a network echo reply. The PS service failure may cause the data call (i.e., the PS call) to abnormally terminate.
In some NSA networks, in response to abnormal PS service failure and/or abnormal data call termination, the wireless device may reattempt to establish PS service and a data call (i.e., a PS call) with the base station of the 5G NSA network, such as an LTE cell (e.g., an eNB) . For example, the wireless device may send further service requests to the base station of the NSA network, such as an LTE cell (e.g., an eNB) . In some NSA networks, PS service requests to the base station of the NSA network, such as an LTE cell (e.g., an eNB) , may continually fail and/or the PS service may continue to be abnormally terminated, thereby causing the wireless device to be unable to recover from the initial PS service failure. This repeated failure of the wireless device to establish a PS service, and resulting repeated failure to support data traffic, causes a degraded user experience as users are unable to access the Internet, often for a long period of time.
Various embodiments enable quick recovery by a wireless device from PS service failure in an NSA network. Various embodiments may provide an automatic recovery mechanism that may support 5G (or later generation) capable wireless devices to reestablish PS service in response to PS data transfer stopping abnormally. Various embodiments may resynchronize a 5G (or later generation) capable wireless device with the NSA network by triggering detachment and reattachment with base station of the NSA network, such as an LTE cell (e.g., an eNB) , in response to detecting that PS data transfer stopped abnormally.
In various embodiments, a processor of a wireless device (e.g., an application processor (AP) , modem processor, etc. ) may maintain a counter to record the number of abnormal PS service failure events that occur with the NSA network. The counter reaching a maximum counter value may indicate that the 5G NSA network is operating abnormally and PS service failure may be occurring. In some embodiments, the counter may track the total number of abnormal PS service failure events during a time period. As one example, the time period may be ten seconds and the maximum counter value may be five abnormal PS service failure events.
In some embodiments, as abnormal PS service failures are determined to have occurred (e.g., abnormal PS service failure events are detected) , indications of the abnormal PS service failure events may be stored. The indications of the abnormal PS service failure events may include timestamps of when the abnormal PS service failures occurred or were detected. The time period, such as ten seconds, may extend backward from the most recent abnormal PS service failure. The counter may track the number of abnormal PS service failure indications having timestamps falling in the time window corresponding to the time period, such as the total number of abnormal PS service failure events occurring or detected in the ten seconds prior to the most recent abnormal PS service failure.
In some embodiments, a counter and timer combination may be used to track the total number of abnormal PS service failure events in a time period. For example, the counter may track a total number of abnormal PS service failures during a time period tracked by the timer, and the counter may be reset at each expiration of the timer.
In various embodiments, in response to determining that the total number of abnormal PS service failure events during the time period exceeds the maximum counter value, a processor of a wireless device (e.g., AP, modem processor, etc. ) may send a detach request (DETACH REQUEST) to the base station of the 5G NSA network, such as an LTE cell (e.g., an eNB) . In response to sending the detach request (DETACH REQUEST) to the base station of the NSA network, such as an LTE cell (e.g., an eNB) , the processor of a wireless device (e.g., AP, modem processor, etc. ) may receive a detach acceptance from the base station of the 5G NSA network, such as an LTE cell (e.g., an eNB) . In this manner, the wireless device may be detached from the base station of the NSA network, such as an LTE cell (e.g., an eNB) .
In various embodiments, in response to sending the detach request (DETACH REQUEST) to the base station of the NSA network, such as an LTE cell (e.g., an eNB) , the processor of a wireless device (e.g., AP, modem processor, etc. ) may send an attach request (ATTACH_REQ) to the base station of the 5G NSA network, such as an LTE cell (e.g., an eNB) , the attach request indicating that EN-DC is supported by the wireless device. For example, a dual connectivity with E-UTRA and NR support flag bit may be set (e.g., EN-DC = 1) in the attach request (ATTACH_REQ) sent to the base station of the 5G NSA network, such as an LTE cell (e.g., an eNB) . The base station of the NSA network, such as an LTE cell (e.g., an eNB) , may return an attachment acceptance (ATTACH_ACCEPT) to the wireless device. In this manner, the wireless device may be reattached to the base station of the 5G NSA network, such as an LTE cell (e.g., an eNB) . The wireless device may send a service request for data traffic (e.g., data traffic associated with an Internet browser, social media application, etc. ) to the base station of the 5G NSA network, such as an LTE cell (e.g., an eNB) , and a PS call between the wireless device and the base station of the NSA network, such as an LTE cell (e.g., an eNB) may be established for the sending/receiving of data traffic. As a PS call between the wireless device and the base station of the NSA network, such as an LTE cell (e.g., an eNB) may be successfully established, the wireless device may be considered to have recovered from the abnormal PS service failure. The user may be able to access the Internet, improving the user experience in comparison to repeated abnormal PS service failures.
FIG. 1 is a system block diagram illustrating an example communication system 100 suitable for implementing any of the various embodiments. The communications system 100 may be a 5G New Radio (NR) network, or any other suitable NSA network such as an LTE network, 5G (or later generation) NSA network, etc. While FIG. 1 illustrates a 5G network, later generation networks may include the same or similar elements. Therefore, the reference to a 5G network and 5G network elements in the following descriptions is for illustrative purposes and is not intended to be limiting.
The communications system 100 may include a heterogeneous network architecture that includes a core network 140 and a variety of mobile devices (illustrated as user equipment (UE) 120a-120e in FIG. 1) . The communications system 100 may also include a number of base stations (illustrated as the BS 110a, the BS 110b, the BS 110c, and the BS 110d) and other network entities. A base station is an entity that communicates with wireless devices, and also may be referred to as a Node B, an LTE Evolved nodeB (eNodeB or eNB) , an access point (AP) , a Radio head, a transmit receive point (TRP) , a New Radio base station (NR BS) , a 5G NodeB (NB) , a Next Generation NodeB (gNodeB or gNB) , or the like. Each base station may provide communication coverage for a particular geographic area. In 3GPP, the term “cell” can refer to a coverage area of a base station, a base station Subsystem serving this coverage area, or a combination thereof, depending on the context in which the term is used. The core network 140 may be any type core network, such as an LTE core network (e.g., an EPC network) , 5G core network, etc.
A base station 110a-110d may provide communication coverage for a macro cell, a pico cell, a femto cell, another type of cell, or a combination thereof. A macro cell may cover a relatively large geographic area (for example, several kilometers in radius) and may allow unrestricted access by mobile devices with service subscription. A pico cell may cover a relatively small geographic area and may allow unrestricted access by mobile devices with service subscription. A femto cell may cover a relatively small geographic area (for example, a home) and may allow restricted access by mobile devices having association with the femto cell (for example, mobile devices in a closed subscriber group (CSG) ) . A base station for a macro cell may be referred to as a macro BS. A base station for a pico cell may be referred to as a pico BS. A base station for a femto cell may be referred to as a femto BS or a home BS. In the example illustrated in FIG. 1, a base station 110a may be a macro BS for a macro cell 102a, a base station 110b may be a pico BS for a pico cell 102b, and a base station 110c may be a femto BS for a femto cell 102c. A base station 110a-110d may support one or multiple (for example, three) cells. The terms “eNB” , “base station” , “NR BS” , “gNB” , “TRP” , “AP” , “node B” , “5G NB” , and “cell” may be used interchangeably herein.
In some examples, a cell may not be stationary, and the geographic area of the cell may move according to the location of a mobile base station. In some examples, the base stations 110a-110d may be interconnected to one another as well as to one or more other base stations or network nodes (not illustrated) in the communications system 100 through various types of backhaul interfaces, such as a direct physical connection, a virtual network, or a combination thereof using any suitable transport network
The base station 110a-110d may communicate with the core network 140 over a wired or wireless communication link 126. The wireless device (e.g., user equipment (UE) ) 120a-120e may communicate with the base station 110a-110d over a wireless communication link 122.
The wired communication link 126 may use a variety of wired networks (e.g., Ethernet, TV cable, telephony, fiber optic and other forms of physical network connections) that may use one or more wired communication protocols, such as Ethernet, Point-To-Point protocol, High-Level Data Link Control (HDLC) , Advanced Data Communication Control Protocol (ADCCP) , and Transmission Control Protocol/Internet Protocol (TCP/IP) .
The communications system 100 also may include relay stations (e.g., relay BS 110d) . A relay station is an entity that can receive a transmission of data from an upstream station (for example, a base station or a mobile device) and transmit the data to a downstream station (for example, a wireless device (e.g., UE) or a base station) . A relay station also may be a mobile device that can relay transmissions for other wireless devices. In the example illustrated in FIG. 1, a relay station 110d may communicate with macro the base station 110a and the wireless device 120d in order to facilitate communication between the base station 110a and the wireless device 120d. A relay station also may be referred to as a relay base station, a relay base station, a relay, etc.
The communications system 100 may be a heterogeneous network that includes base stations of different types, for example, macro base stations, pico base stations, femto base stations, relay base stations, etc. These different types of base stations may have different transmit power levels, different coverage areas, and different impacts on interference in communications system 100. For example, macro base stations may have a high transmit power level (for example, 5 to 40 Watts) whereas pico base stations, femto base stations, and relay base stations may have lower transmit power levels (for example, 0.1 to 2 Watts) .
A network controller 130 may couple to a set of base stations and may provide coordination and control for these base stations. The network controller 130 may communicate with the base stations via a backhaul. The base stations also may communicate with one another, for example, directly or indirectly via a wireless or wireline backhaul.
The wireless devices (e.g., UEs) 120a, 120b, 120c may be dispersed throughout communications system 100, and each wireless device may be stationary or mobile. A wireless device also may be referred to as an access terminal, a terminal, a mobile station, a subscriber unit, a station, user equipment (UE) , etc.
A macro base station 110a may communicate with the communication network 140 over a wired or wireless communication link 126. The wireless devices 120a, 120b, 120c may communicate with a base station 110a-110d over a wireless communication link 122.
The wireless communication links 122, 124 may include a plurality of carrier signals, frequencies, or frequency bands, each of which may include a plurality of logical channels. The wireless communication links 122 and 124 may utilize one or more Radio access technologies (RATs) . Examples of RATs that may be used in a wireless communication link include 3GPP LTE, 3G, 4G, 5G (e.g., NR) , GSM, CDMA, WCDMA, Worldwide Interoperability for Microwave Access (WiMAX) , Time Division Multiple Access (TDMA) , and other mobile telephony communication technologies cellular RATs. Further examples of RATs that may be used in one or more of the various wireless communication links 122, 124 within the communication system 100 include medium range protocols such as Wi-Fi, LTE-U, LTE-Direct, LAA, MuLTEfire, and relatively short range RATs such as ZigBee, Bluetooth, and Bluetooth Low Energy (LE) .
Certain wireless networks (e.g., LTE) utilize orthogonal frequency division multiplexing (OFDM) on the downlink and single-carrier frequency division multiplexing (SC-FDM) on the uplink. OFDM and SC-FDM partition the system bandwidth into multiple (K) orthogonal subcarriers, which are also commonly referred to as tones, bins, etc. Each subcarrier may be modulated with data. In general, modulation symbols are sent in the frequency domain with OFDM and in the time domain with SC-FDM. The spacing between adjacent subcarriers may be fixed, and the total number of subcarriers (K) may be dependent on the system bandwidth. For example, the spacing of the subcarriers may be 15 kHz and the minimum Resource allocation (called a “resource block” ) may be 12 subcarriers (or 180 kHz) . Consequently, the nominal Fast File Transfer (FFT) size may be equal to 128, 256, 512, 1024 or 2048 for system bandwidth of 1.25, 2.5, 5, 10 or 20 megahertz (MHz) , respectively. The system bandwidth may also be partitioned into subbands. For example, a subband may cover 1.08 MHz (i.e., 6 Resource blocks) , and there may be 1, 2, 4, 8 or 16 subbands for system bandwidth of 1.25, 2.5, 5, 10 or 20 MHz, respectively.
While descriptions of some embodiments may use terminology and examples associated with LTE technologies, various embodiments may be applicable to other wireless communications systems, such as a new Radio (NR) or 5G network. NR may utilize OFDM with a cyclic prefix (CP) on the uplink (UL) and downlink (DL) and include support for half-duplex operation using time division duplex (TDD) . A single component carrier bandwidth of 100 MHz may be supported. NR Resource blocks may span 12 sub-carriers with a sub-carrier bandwidth of 75 kHz over a 0.1 millisecond (ms) duration. Each Radio frame may consist of 50 subframes with a length of 10 ms. Consequently, each subframe may have a length of 0.2 ms. Each subframe may indicate a link direction (i.e., DL or UL) for data transmission and the link direction for each subframe may be dynamically switched. Each subframe may include DL/UL data as well as DL/UL control data. Beamforming may be supported and beam direction may be dynamically configured. Multiple Input Multiple Output (MIMO) transmissions with precoding may also be supported. MIMO configurations in the DL may support up to eight transmit antennas with multi-layer DL transmissions up to eight streams and up to two streams per wireless device. Multi-layer transmissions with up to 2 streams per wireless device may be supported. Aggregation of multiple cells may be supported with up to eight serving cells. Alternatively, NR may support a different air interface, other than an OFDM-based air interface.
Some mobile devices may be considered machine-type communication (MTC) or Evolved or enhanced machine-type communication (eMTC) mobile devices. MTC and eMTC mobile devices include, for example, robots, drones, remote devices, sensors, meters, monitors, location tags, etc., that may communicate with a base station, another device (for example, remote device) , or some other entity. A wireless node may provide, for example, connectivity for or to a network (for example, a wide area network such as Internet or a cellular network) via a wired or wireless communication link. Some mobile devices may be considered Internet-of-Things (IoT) devices or may be implemented as NB-IoT (narrowband internet of things) devices. A wireless device (e.g., UE) 120a-e may be included inside a housing that houses components of the wireless device, such as processor components, memory components, similar components, or a combination thereof.
In general, any number of communication systems and any number of wireless networks may be deployed in a given geographic area. Each communications system and wireless network may support a particular Radio access technology (RAT) and may operate on one or more frequencies. A RAT also may be referred to as a Radio technology, an air interface, etc. A frequency also may be referred to as a carrier, a frequency channel, etc. Each frequency may support a single RAT in a given geographic area in order to avoid interference between communications systems of different RATs. In some cases, 4G/LTE and/or 5G/NR RAT networks may be deployed. For example, a 5G NSA network may utilize both 4G/LTE RAT in the 4G/LTE RAN side of the 5G NSA network and 5G/NR RAT in the 5G/NR RAN side of the 5G NSA network. The 4G/LTE RAN and the 5G/NR RAN may both connect to one another and a 4G/LTE core network (e.g., an EPC network) in a 5G NSA network.
In some embodiments, two or more wireless devices 120a-e (for example, illustrated as the wireless device 120a and the wireless device 120e) may communicate directly using one or more sidelink channels 124 (for example, without using a base station 110a-110d as an intermediary to communicate with one another) . For example, wireless device 120a-e may communicate using peer-to-peer (P2P) communications, device-to-device (D2D) communications, a vehicle-to-everything (V2X) protocol (which may include a vehicle-to-vehicle (V2V) protocol, a vehicle-to-infrastructure (V2I) protocol, or similar protocol) , a mesh network, or similar networks, or combinations thereof. In this case, the wireless device 120a-e may perform scheduling operations, resource selection operations, as well as other operations described elsewhere herein as being performed by the base station 110a
FIG. 2 is a component block diagram illustrating an example computing and wireless modem system 200 suitable for implementing any of the various embodiments. Various embodiments may be implemented on a number of single processor and multiprocessor computer systems, including a system-on-chip (SOC) or system in a package (SIP) .
With reference to FIGS. 1 and 2, the illustrated example wireless device 200 (which may be a SIP in some embodiments) includes a two SOCs 202, 204 coupled to a clock 206, a voltage regulator 208, and a wireless transceiver 266 configured to send and receive wireless communications via an antenna (not shown) to/from network wireless devices, such as a base station 110a. In some embodiments, the first SOC 202 operate as central processing unit (CPU) of the wireless device that carries out the instructions of software application programs by performing the arithmetic, logical, control and input/output (I/O) operations specified by the instructions. In some embodiments, the second SOC 204 may operate as a specialized processing unit. For example, the second SOC 204 may operate as a specialized 5G (or later generation) processing unit responsible for managing high volume, high speed (e.g., 5 Gbps, etc. ) , and/or very high frequency short wave length (e.g., 28 GHz mmWave spectrum, etc. ) communications.
The first SOC 202 may include a digital signal processor (DSP) 210, a modem processor 212, a graphics processor 214, an application processor (AP) 216, one or more coprocessors 218 (e.g., vector co-processor) connected to one or more of the processors, memory 220, custom circuity 222, system components and resources 224, an interconnection/bus module 226, one or more temperature sensors 230, a thermal management unit 232, and a thermal power envelope (TPE) component 234. The second SOC 204 may include a 5G modem processor 252, a power management unit 254, an interconnection/bus module 264, the plurality of mmWave transceivers 256, memory 258, and various additional processors 260, such as an applications processor, packet processor, etc.
Each processor 210, 212, 214, 216, 218, 252, 260 may include one or more cores, and each processor/core may perform operations independent of the other processors/cores. For example, the first SOC 202 may include a processor that executes a first type of operating system (e.g., FreeBSD, LINUX, OS X, etc. ) and a processor that executes a second type of operating system (e.g., MICROSOFT WINDOWS 10) . In addition, any or all of the processors 210, 212, 214, 216, 218, 252, 260 may be included as part of a processor cluster architecture (e.g., a synchronous processor cluster architecture, an asynchronous or heterogeneous processor cluster architecture, etc. ) .
The first and second SOC 202, 204 may include various system components, resources and custom circuitry for managing sensor data, analog-to-digital conversions, wireless data transmissions, and for performing other specialized operations, such as decoding data packets and processing encoded audio and video signals for rendering in a web browser. For example, the system components and resources 224 of the first SOC 202 may include power amplifiers, voltage regulators, oscillators, phase-locked loops, peripheral bridges, data controllers, memory controllers, system controllers, access ports, timers, and other similar components used to support the processors and software clients running on a wireless device. The system components and resources 224 and/or custom circuitry 222 may also include circuitry to interface with peripheral devices, such as cameras, electronic displays, wireless communication devices, external memory chips, etc.
The first and second SOC 202, 204 may communicate via interconnection/bus module 250. The various processors 210, 212, 214, 216, 218, may be interconnected to one or more memory elements 220, system components and resources 224, and custom circuitry 222, and a thermal management unit 232 via an interconnection/bus module 226. Similarly, the processor 252 may be interconnected to the power management unit 254, the mmWave transceivers 256, memory 258, and various additional processors 260 via the interconnection/bus module 264. The interconnection/ bus module 226, 250, 264 may include an array of reconfigurable logic gates and/or implement a bus architecture (e.g., CoreConnect, AMBA, etc. ) . Communications may be provided by advanced interconnects, such as high-performance networks-on chip (NoCs) .
The first and/or second SOCs 202, 204 may further include an input/output module (not illustrated) for communicating with resources external to the SOC, such as a clock 206 and a voltage regulator 208. Resources external to the SOC (e.g., clock 206, voltage regulator 208) may be shared by two or more of the internal SOC processors/cores.
In addition to the example SIP 200 discussed above, various embodiments may be implemented in a wide variety of computing systems, which may include a single processor, multiple processors, multicore processors, or any combination thereof.
FIG. 3 is a component block diagram illustrating a software architecture 300 including a radio protocol stack for the user and control planes in wireless communications suitable for implementing any of the various embodiments. With reference to FIGS. 1–3, the wireless device 320 may implement the software architecture 300 to facilitate communication between a wireless device 320 (e.g., the wireless device 120a-120e, 200) and the base station 350 (e.g., the base station 110a) of a communication system (e.g., 100) . In various embodiments, layers in software architecture 300 may form logical connections with corresponding layers in software of the base station 350. The software architecture 300 may be distributed among one or more processors (e.g., the processors 212, 214, 216, 218, 252, 260) . While illustrated with respect to one radio protocol stack, in a multi-SIM (subscriber identity module) wireless device, the software architecture 300 may include multiple protocol stacks, each of which may be associated with a different SIM (e.g., two protocol stacks associated with two SIMs, respectively, in a dual-SIM wireless communication device) . While described below with reference to LTE communication layers, the software architecture 300 may support any of variety of standards and protocols for wireless communications, and/or may include additional protocol stacks that support any of variety of standards and protocols wireless communications.
The software architecture 300 may include a Non-Access Stratum (NAS) 302 and an Access Stratum (AS) 304. The NAS 302 may include functions and protocols to support Packet filtering, security management, mobility control, session management, and traffic and signaling between a SIM (s) of the wireless device and its core network 140. The AS 304 may include functions and protocols that support communication between a SIM (s) and entities of supported access networks (e.g., a base station) . In particular, the AS 304 may include at least three layers (Layer 1, Layer 2, and Layer 3) , each of which may contain various sub-layers.
In the user and control planes, Layer 1 (L1) of the AS 304 may be a physical layer (PHY) 306, which may oversee functions that enable transmission and/or reception over the air interface. Examples of such physical layer 306 functions may include cyclic redundancy check (CRC) attachment, coding blocks, scrambling and descrambling, modulation and demodulation, signal measurements, MIMO, etc. The physical layer may include various logical channels, including the Physical Downlink Control Channel (PDCCH) and the Physical Downlink Shared Channel (PDSCH) .
In the user and control planes, Layer 2 (L2) of the AS 304 may be responsible for the link between the wireless device 320 and the base station 350 over the physical layer 306. In the various embodiments, Layer 2 may include a Media Access Control (MAC) sublayer 308, a Radio link Control (RLC) sublayer 310, and a Packet data convergence protocol (PDCP) 312 sublayer, each of which form logical connections terminating at the base station 350.
In the control plane, Layer 3 (L3) of the AS 304 may include a Radio Resource Control (RRC) sublayer 3. While not shown, the software architecture 300 may include additional Layer 3 sublayers, as well as various upper layers above Layer 3. In various embodiments, the RRC sublayer 313 may provide functions including broadcasting system information, paging, and establishing and releasing an RRC signaling connection between the wireless device 320 and the base station 350.
In various embodiments, the PDCP sublayer 312 may provide uplink functions including multiplexing between different Radio bearers and logical channels, sequence number addition, handover data handling, integrity protection, ciphering, and header compression. In the downlink, the PDCP sublayer 312 may provide functions that include in-sequence delivery of data packets, duplicate data Packet detection, integrity validation, deciphering, and header decompression.
In the uplink, the RLC sublayer 310 may provide segmentation and concatenation of upper layer data packets, retransmission of lost data packets, and Automatic Repeat Request (ARQ) . In the downlink, while the RLC sublayer 310 functions may include reordering of data packets to compensate for out-of-order reception, reassembly of upper layer data packets, and ARQ.
In the uplink, MAC sublayer 308 may provide functions including multiplexing between logical and transport channels, random access procedure, logical channel priority, and hybrid-ARQ (HARQ) operations. In the downlink, the MAC layer functions may include channel mapping within a cell, de-multiplexing, discontinuous reception (DRX) , and HARQ operations.
While the software architecture 300 may provide functions to transmit data through physical media, the software architecture 300 may further include at least one host layer 314 to provide data transfer services to various applications in the wireless device 320. In some embodiments, application-specific functions provided by the at least one host layer 314 may provide an interface between the software architecture and the general purpose processor.
In other embodiments, the software architecture 300 may include one or more higher logical layer (e.g., transport, session, presentation, application, etc. ) that provide host layer functions. For example, in some embodiments, the software architecture 300 may include a network layer (e.g., IP layer) in which a logical connection terminates at a PDN gateway (PGW) . In some embodiments, the software architecture 300 may include an application layer in which a logical connection terminates at another device (e.g., end user device, server, etc. ) . In some embodiments, the software architecture 300 may further include in the AS 304 a hardware interface 316 between the physical layer 306 and the communication hardware (e.g., one or more radio frequency (RF) transceivers) .
FIG. 4 is a component block diagram illustrating a communication system 400 configured for wireless communication in accordance with various embodiments. With reference to FIGS. 1–4, the communication system 400 may include a wireless device 120 and one or more base stations 110 forming a wireless communication network 424, which may provide connections to external resources 422. External resources 422 may include sources of information outside of system 400, external entities participating with the system 400, and/or other resources.
A wireless device 120 may be configured by machine-readable instructions 406. Machine-readable instructions 406 may include one or more instruction modules. The instruction modules may include computer program modules. The instruction modules may include one or more of PS service monitoring module 408, attachment/detachment module 410, PS call module 412, and/or other instruction modules.
The PS service monitoring module 408 may be configured to maintain a counter to record the number of abnormal PS service failure events that occur with the NSA network, such as a 5G or later generation NSA network. The PS service monitoring module 408 may be configured to determine whether a total number of abnormal PS service failure events during a time period exceeds a maximum counter value. As an example, the time period may be ten seconds and the maximum counter value may be five.
The PS service monitoring module 408 may be configured to determine whether a PS service failure is an abnormal PS service failure, such as a termination of a PS service or PS call that is unexpected, or a normal PS service failure, such as a termination of a PS service or PS call that is expected. An abnormal PS service failure can be any PS service failure that is unexpected. An example indication of an abnormal PS service failure occurring may be a TCP/IP connection used for a PS service ending while UL data is still awaiting transmission in a pre-transmit queue on the wireless device. As an example, the PS service monitoring module 408 may monitor the state of a TCP/IP connection and a pre-transmit queue to determine whether UL data is still awaiting transmission in the pre-transmit queue when a TCP/IP connection ends. UL data awaiting transmission may indicate the TCP/IP connection ending is unexpected and the PS service failure is abnormal.
Another example indication of an abnormal PS service failure occurring may be a reachability test (e.g., a “Ping Test” ) failing, such as a network echo request being sent without receiving a network echo reply. As an example, the PS service monitoring module 408 may monitor the state reachability tests, such as Ping Tests, and a reachability test failing (e.g., no echo reply being received) may indicate the PS service failure is unexpected and the PS service failure is abnormal. A PS service failure may cause a data call (e.g., a PS call) to abnormally terminate.
The PS service monitoring module 408 may be configured to store indications of abnormal PS service failure events in a memory (e.g., electronic storage 424) . The PS service monitoring module 408 may be configured to include timestamps with the indications of the abnormal PS service failure events, such as timestamps of when the abnormal PS service failures occurred and/or were detected. The PS service monitoring module 408 may be configured to track the number of abnormal PS service failure event indications having timestamps falling in the time window corresponding to the time period, such as the total number of abnormal PS service failure events occurring in the ten seconds prior to the most recent abnormal PS service failure event.
The PS service monitoring module 408 may be configured to operate as a counter and timer combination to track the total number of abnormal PS service failure events in a time period. For example, the PS service monitoring module 408 may track a total number of abnormal PS service failures during a time period tracked by the timer, and the counter may be reset at each expiration of the timer. The PS service monitoring module 408 may be configured to indicate to the attachment/detachment module 410 and/or the PS call module 412 that the total number of abnormal PS service failure events during the time period exceeds the maximum counter value.
The attachment/detachment module 410 may be configured to attach and/or detach to/from a base station in the NSA network, such as an LTE cell (e.g., an eNB) in a 5G (or later generation) NSA network. The attachment/detachment module 410 may be configured to send a detach request (DETACH REQUEST) to a base station of an NSA network, such as an LTE cell (e.g., an eNB) . The attachment/detachment module 410 may be configured to receive a detach acceptance from a base station of an NSA network, such as an LTE cell (e.g., an eNB) , in response to sending a detach request. The attachment/detachment module 410 may be configured to send an attach request (ATTACH_REQ) to a base station of an NSA network, such as an LTE cell (e.g., an eNB) . The attach request may indicate EN-DC is supported by the wireless device. For example, a dual connectivity with E-UTRA and NR support flag bit may be set (e.g., EN-DC = 1) in the attach request (ATTACH_REQ) sent to a base station of an NSA network, such as an LTE cell (e.g., an eNB) . The attachment/detachment module 410 may be configured to receive an attachment acceptance (ATTACH_ACCEPT) from a base station of an NSA network, such as an LTE cell (e.g., an eNB) , in response to sending an attach request.
The attachment/detachment module 410 may be configured to receive an indication that the total number of abnormal PS service failure events during a time period exceeds a maximum counter value from the PS service monitoring module 408. The attachment/detachment module 410 may be configured to send a detach request to a base station of an NSA network, such as a LTE cell (e.g., an eNB) in a 5G (or later generation) NSA network, in response determining that the total number of abnormal PS service failure events during the time period exceeds the maximum counter value. The attachment/detachment module 410 may be configured to send an indication of an attachment and/or detachment to/from a base station in the NSA network, such as an LTE cell (e.g., an eNB) , to the PS call module 412.
The PS call module 412 may be configured to support a PS service via a base station in the NSA network, such as an LTE cell (e.g., an eNB) in a 5G (or later generation) NSA network. The PS call module 412 may be configured to establish a PS call with a base station in the NSA network, such as an LTE cell (e.g., an eNB) . The PS call module 412 may be configured to receive an indication of an attachment and/or detachment to/from a base station in the 5G NSA network, such as a LTE cell (e.g., an eNB) , from the attachment/detachment module 410. The PS call module 412 may be configured to establish a PS call with a base station in the NSA network, such as an LTE cell (e.g., an eNB) , in response to receiving an attach acceptance.
The wireless device 120, remote platform (s) 110, and/or external resources 422 may be operatively linked via one or more electronic communication links of the wireless communication network. For example, the wireless communication network may establish links via a network such as the Internet and/or other networks.
The wireless device 120 may include electronic storage 424, one or more processors 426 (e.g., an AP 216, modem processor 212, 252, etc. ) , one or more wireless transceivers 266, and/or other components. The wireless device 120a-120e may include communication lines, or ports to enable the exchange of information with a network and/or other wireless device. The illustration of the wireless device 120 is not intended to be limiting. The wireless device 120 may include a plurality of hardware, software, and/or firmware components operating together to provide the functionality attributed herein to wireless device 120.
The processor (s) 426 may be configured to provide information processing capabilities in the wireless device 120. As such, the processor (s) 426 may include one or more of a digital processor, an analog processor, a digital circuit designed to process information, an analog circuit designed to process information, a state machine, and/or other mechanisms for electronically processing information. Although the processor (s) 426 is illustrated as a single entity, this is for illustrative purposes only. In some embodiments, the processor (s) 426 may include a plurality of processing units and/or processor cores. The processor (s) 426 may be configured to execute modules 408, 410, and/or 412 and/or other modules by software; hardware; firmware; some combination of software, hardware, and/or firmware; and/or other mechanisms for configuring processing capabilities on processor (s) 426. As used herein, the term “module” may refer to any component or set of components that perform the functionality attributed to the module. This may include one or more physical processors during execution of processor readable instructions, the processor readable instructions, circuitry, hardware, storage media, or any other components.
It should be appreciated that although modules 408, 410, and/or 412 are illustrated as being implemented within a single processing unit, in embodiments in which the processor (s) 426 includes multiple processing units and/or processor cores, one or more of modules 408, 410, and/or 412 may be implemented remotely from the other modules. The description of the functionality provided by the different modules 408, 410, and/or 412 described below is for illustrative purposes, and is not intended to be limiting, as any of modules 408, 410, and/or 412 may provide more or less functionality than is described. For example, one or more of the modules 408, 410, and/or 412 may be eliminated, and some or all of its functionality may be provided by other modules 408, 410, and/or 412. As another example, the processor (s) 426 may be configured to execute one or more additional modules that may perform some or all of the functionality attributed below to one of the modules 408, 410, and/or 412.
FIG. 5 is a process flow diagram illustrating a method 500 that may be performed by a processor of a wireless device for recovering from PS service failure in an NSA network, including a 5G (or later generation) NSA network. With reference to FIGS. 1-5, the method 500 may be implemented by one or more processors (e.g., 210, 212, 214, 216, 218, 252, 260, 426) of a wireless device (e.g., 120, 120a-120e, 200, 320) .
In block 502, the processor may send an attach request to a base station of an NSA network, the attach request indicating that EN-DC is supported by the wireless device. As specific example, the processor may send an attach request (ATTACH_REQ) indicating EN-DC is supported by the wireless device to a base station of the NSA network, such as an LTE cell (e.g., an eNB) in a 5G (or later generation) NSA network. For example, a dual connectivity with E-UTRA and NR support flag bit may be set (e.g., EN-DC = 1) in the attach request sent to a base station of the NSA network, such as an LTE cell (e.g., an eNB) in a 5G (or later generation) NSA network.
In block 504, the processor may receive an attach acceptance from the base station of the 5G NSA network. The attach acceptance (ATTACH_ACCEPT) may be received from the base station of the 5G NSA network, such as an LTE cell (e.g., an eNB) , in response to sending the attach request (ATTACH_REQ) to the base station of the NSA network.
In block 506, the processor may establish a PS call with the base station of the NSA network. Establishing a PS call with the base station of the NSA network, such as an LTE cell (e.g., an eNB) , may include sending a service request for data traffic (e.g., data traffic associated with an Internet browser, social media application, etc. ) to the base station of the NSA network, such as an LTE cell (e.g., an eNB) , after attaching to the base station and indicating EN-DC support. In this manner, the wireless device can establish a data call (i.e., a PS call) with the base station of the 5G NSA network, such as an LTE cell (e.g., an eNB) in a 5G (or later generation) NSA network, to send/receive the data traffic.
In determination block 508, the processor may determine whether an abnormal PS service failure is detected. An abnormal PS service failure can be any PS service failure that was unexpected. One example indication of an abnormal PS service failure occurring may be a Transmission Control Protocol (TCP) /Internet Protocol (IP) (TCP/IP) connection used for a PS service ending while uplink (UL) data is still awaiting transmission in a pre-transmit queue on the wireless device. Another example indication of an abnormal PS service failure occurring may be a reachability test (e.g., a “Ping Test” ) failing, such as a network echo request being sent without receiving a network echo reply. The PS service failure may cause the data call (i.e., the PS call) to abnormally terminate.
In response to determining that an abnormal PS service failure has not occurred (i.e., determination block 508 = “No” ) , the processor may continue to await an abnormal PS service failure and determine whether an abnormal PS service failure is detected in determination block 508.
In response to detecting an abnormal PS service failure (i.e., determination block 508 = “Yes” ) , the processor may store an indication of an abnormal PS service failure event in block 510. In some embodiments, as abnormal PS service failures are determined to have occurred (e.g., abnormal PS service failure events are detected) , indications of the abnormal PS service failure events may be stored. The indications of the abnormal PS service failure events may include timestamps of when the abnormal PS service failures occurred or were detected.
In determination block 512, the processor may determine whether a total number of abnormal PS service failure events during a time period exceeds a maximum counter value. In various embodiments, a processor of a wireless device (e.g., an application processor (AP) , modem processor, etc. ) may maintain a counter to record the number of abnormal PS service failure events that occur with the 5G NSA network. The counter reaching a maximum counter value may indicate that the 5G NSA network is operating abnormally and PS service failure may be occurring. In some embodiments, the counter may track the total number of abnormal PS service failure events during a time period. As one example, the time period may be ten seconds and the maximum counter value may be five abnormal PS service failure events. The time period, such as ten seconds, may extend backward from the most recent abnormal PS service failure. The counter may track the number of abnormal PS service failure indications having timestamps falling in the time window corresponding to the time period, such as the total number of abnormal PS service failure events occurring or detected in the ten seconds prior to the most recent abnormal PS service failure.
In some embodiments, a counter and timer combination may be used to track the total number of abnormal PS service failure events during a time period and the operations of block 510 may be optional. For example, the counter may track a total number of abnormal PS service failure events during a time period tracked by the timer, and the counter may be reset at each expiration of the timer. In such embodiments, the processor may compare the counter value to the maximum counter value to determine whether a total number of abnormal PS service failure events during a time period exceeds a maximum counter value.
In response to determining that the total number of abnormal PS service failure events during the time period does not exceed the maximum counter value (i.e., determination block 512 = “No” ) , the processor may establish a PS call with the base station of the NSA network in block 506. In this manner, the processor may attempt to reestablish the PS service by reestablishing a PS call with the base station of the NSA network.
In response to determining that the total number of abnormal PS service failure events during the time period exceeds the maximum counter value (i.e., determination block 512 = “Yes” ) , the processor may send a detach request to the base station of the NSA network in block 514. The detach request (DETACH REQUEST) may be sent to the base station of the 5G NSA network, such as an LTE cell (e.g., an eNB) in a 5G (or later generation) NSA network, to detach the wireless device from the base station and the NSA network.
In block 516, the processor may receive a detach acceptance from the base station of the NSA network. The detach acceptance may be received from the base station of the 5G NSA network, such as an LTE cell (e.g., an eNB) in a 5G (or later generation) NSA network, in response to sending the detach request (DETACH REQUEST) to the base station of the 5G NSA network. The receipt of the detach acceptance may confirm the wireless device is detached from the base station and the NSA network.
In block 518, the processor may send a new attach request to the base station of the NSA network, the new attach request indicating that EN-DC is supported by the wireless device. As specific example, the processor may send a new attach request (ATTACH_REQ) indicating EN-DC is supported by the wireless device to the base station of the NSA network, such as an LTE cell (e.g., an eNB) in a 5G (or later generation) NSA network. For example, a dual connectivity with E-UTRA and NR support flag bit may be set (e.g., EN-DC = 1) in the new attach request sent to the base station of the 5G NSA network, such as an LTE cell (e.g., an eNB) . The sending of a new attach request to the base station of the NSA network may be in response to sending the detach request (DETACH REQUEST) to the base station of the NSA network. As an example, the wireless device may attempt to reattach to the same base station of the 5G NSA network upon detaching from that base station of the wireless device in response to the total number of abnormal PS service failure events during the time period exceeding the maximum counter value.
In block 520, the processor may receive a new attach acceptance from the base station of the NSA network. The new attach acceptance (ATTACH_ACCEPT) may be received from the base station of the 5G NSA network, such as an LTE cell (e.g., an eNB) in a 5G (or later generation) NSA network, in response to sending the new attach request (ATTACH_REQ) to the base station of the 5G NSA network.
In block 522, the processor may establish a new PS call with the base station of the NSA network. Establishing the new PS call with the base station of the NSA network, such as an LTE cell (e.g., an eNB) in a 5G (or later generation) NSA network, may include sending a service request for data traffic (e.g., data traffic associated with an Internet browser, social media application, etc. ) to the base station of the NSA network after reattaching to the base station and indicating EN-DC support. In this manner, the wireless device can establish a new data call (i.e., a new PS call) with the base station of the NSA network, such as an LTE cell (e.g., an eNB) , to send/receive the data traffic. Establishing the new PS call may reestablish PS service on the wireless device upon the total number of abnormal PS service failure events during the time period exceeding the maximum counter value.
FIG. 6 is a call flow diagram illustrating example interactions between one or more processors (such as 210, 212, 214, 216, 218, 252, 260, 426) of a wireless device (such as the wireless device 120a-120e, 200, 320, 120a-120e) and a base station (e.g., base station 110a, 350, 110) of an NSA network including a 5G (or later generation) NSA network (100) in accordance with various embodiments. With reference to FIGS. 1-6, the interactions illustrated in FIG. 6 reflect example implementations of the various embodiment methods for recovering from PS service failure in an NSA network, such as one or more operations of method 500. FIG. 6 illustrates an example implementation in which some operations are performed by an application processor (labeled DATA (UE) in FIG. 6) of the wireless device and some operations are performed by a modem processor (labeled NAS (UE) in FIG. 6) of the wireless device while the wireless device is communicating with a base station of the NSA network (labeled LTE anchor cell in FIG. 6) .
FIG. 6 illustrates that in response to determining a max counter for abnormal PS service failure events being reached, the application processor may indicate the PS service failure (e.g., via a DATASTOP indication) to the modem processor and the modem processor may detach and reattach to the base station of the NSA network via a sequence of detach requests, detach acceptances, attach requests indicating EN-DC is supported, attach acceptances, and service requests (e.g., PS call establishments) .
FIG. 7 is a component block diagram of a network computing device 700 suitable for use with various embodiments. Such network computing devices may include at least the components illustrated in FIG. 7. With reference to FIGS. 1–7, the network computing device 700 may include a processor 701 coupled to volatile memory 702 and a large capacity nonvolatile memory, such as a disk drive 703. The network computing device 700 may also include a peripheral memory access device such as a floppy disc drive, compact disc (CD) or digital video disc (DVD) drive 706 coupled to the processor 701. The network computing device 700 may also include network access ports 704 (or interfaces) coupled to the processor 701 for establishing data connections with a network, such as the Internet and/or a local area network coupled to other system computers and servers. The network computing device 700 may include one or more antennas 707 for sending and receiving electromagnetic radiation that may be connected to a wireless communication link. The network computing device 700 may include additional access ports, such as USB, Firewire, Thunderbolt, and the like for coupling to peripherals, external memory, or other devices.
FIG. 8 is a component block diagram of a wireless device 800 suitable for use with various embodiments. With reference to FIGS. 1–8, various embodiments may be implemented on a variety of wireless device 800 (e.g., the wireless device 120a-120e, 200, 320, 120a-120e) , an example of which is illustrated in FIG. 8 in the form of a smartphone. The wireless device 800 may include a first SOC 202 (e.g., a SOC-CPU) coupled to a second SOC 204 (e.g., a 5G capable SOC) . The first and second SOCs 202, 204 may be coupled to internal memory 424, 816, a display 812, and to a speaker 814. Additionally, the wireless device 800 may include an antenna 804 for sending and receiving electromagnetic radiation that may be connected to a wireless transceiver 266 coupled to one or more processors in the first and/or second SOCs 202, 204. The wireless device 800 may also include menu selection buttons or rocker switches 820 for receiving user inputs.
The wireless device 800 also includes a sound encoding/decoding (CODEC) circuit 810, which digitizes sound received from a microphone into data packets suitable for wireless transmission and decodes received sound data packets to generate analog signals that are provided to the speaker to generate sound. Also, one or more of the processors in the first and second SOCs 202, 204, wireless transceiver 266 and CODEC 810 may include a digital signal processor (DSP) circuit (not shown separately) .
The processors of the wireless network computing device 700 and the wireless device 800 may be any programmable microprocessor, microcomputer or multiple processor chip or chips that can be configured by software instructions (applications) to perform a variety of functions, including the functions of the various embodiments described below. In some mobile devices, multiple processors may be provided, such as one processor within an SOC 204 dedicated to wireless communication functions and one processor within an SOC 202 dedicated to running other applications. Software applications may be stored in the memory 424, 816 before they are accessed and loaded into the processor. The processors may include internal memory sufficient to store the application software instructions.
As used in this application, the terms “component, ” “module, ” “system, ” and the like are intended to include a computer-related entity, such as, but not limited to, hardware, firmware, a combination of hardware and software, software, or software in execution, which are configured to perform particular operations or functions. For example, a component may be, but is not limited to, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer. By way of illustration, both an application running on a wireless device and the wireless device may be referred to as a component. One or more components may reside within a process and/or thread of execution and a component may be localized on one processor or core and/or distributed between two or more processors or cores. In addition, these components may execute from various non-transitory computer readable media having various instructions and/or data structures stored thereon. Components may communicate by way of local and/or remote processes, function or procedure calls, electronic signals, data packets, memory read/writes, and other known network, computer, processor, and/or process related communication methodologies.
A number of different cellular and mobile communication services and standards are available or contemplated in the future, all of which may implement and benefit from the various embodiments. Such services and standards include, e.g., third generation partnership project (3GPP) , LTE systems, third generation wireless mobile communication technology (3G) , fourth generation wireless mobile communication technology (4G) , fifth generation wireless mobile communication technology (5G) as well as later generation 3GPP technology, global system for mobile communications (GSM) , universal mobile telecommunications system (UMTS) , 3GSM, general Packet Radio service (GPRS) , code division multiple access (CDMA) systems (e.g., cdmaOne, CDMA1020TM) , enhanced data rates for GSM evolution (EDGE) , advanced mobile phone system (AMPS) , digital AMPS (IS-136/TDMA) , evolution-data optimized (EV-DO) , digital enhanced cordless telecommunications (DECT) , Worldwide Interoperability for Microwave Access (WiMAX) , wireless local area network (WLAN) , Wi-Fi Protected Access I &II (WPA, WPA2) , and integrated digital enhanced network (iDEN) . Each of these technologies involves, for example, the transmission and reception of voice, data, signaling, and/or content messages. It should be understood that any references to terminology and/or technical details related to an individual telecommunication standard or technology are for illustrative purposes only, and are not intended to limit the scope of the claims to a particular communication system or technology unless specifically recited in the claim language.
Various embodiments illustrated and described are provided merely as examples to illustrate various features of the claims. However, features shown and described with respect to any given embodiment are not necessarily limited to the associated embodiment and may be used or combined with other embodiments that are shown and described. Further, the claims are not intended to be limited by any one example embodiment.
The foregoing method descriptions and the process flow diagrams are provided merely as illustrative examples and are not intended to require or imply that the operations of various embodiments must be performed in the order presented. As will be appreciated by one of skill in the art the order of operations in the foregoing embodiments may be performed in any order. Words such as “thereafter, ” “then, ” “next, ” etc. are not intended to limit the order of the operations; these words are used to guide the reader through the description of the methods. Further, any reference to claim elements in the singular, for example, using the articles “a, ” “an, ” or “the” is not to be construed as limiting the element to the singular.
Various illustrative logical blocks, modules, components, circuits, and algorithm operations described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both. To clearly illustrate this interchangeability of hardware and software, various illustrative components, blocks, modules, circuits, and operations have been described above generally in terms of their functionality. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application, but such embodiment decisions should not be interpreted as causing a departure from the scope of the claims.
The hardware used to implement various illustrative logics, logical blocks, modules, and circuits described in connection with the embodiments disclosed herein may be implemented or performed with a general purpose processor, a digital signal processor (DSP) , an application specific integrated circuit (ASIC) , a field programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein. A general-purpose processor may be a microprocessor, but, in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of receiver smart objects, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration. Alternatively, some operations or methods may be performed by circuitry that is specific to a given function.
In one or more embodiments, the functions described may be implemented in hardware, software, firmware, or any combination thereof. If implemented in software, the functions may be stored as one or more instructions or code on a non-transitory computer-readable storage medium or non-transitory processor-readable storage medium. The operations of a method or algorithm disclosed herein may be embodied in a processor-executable software module or processor-executable instructions, which may reside on a non-transitory computer-readable or processor-readable storage medium. Non-transitory computer-readable or processor-readable storage media may be any storage media that may be accessed by a computer or a processor. By way of example but not limitation, such non-transitory computer-readable or processor-readable storage media may include RAM, ROM, EEPROM, FLASH memory, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage smart objects, or any other medium that may be used to store desired program code in the form of instructions or data structures and that may be accessed by a computer. Disk and disc, as used herein, includes compact disc (CD) , laser disc, optical disc, digital versatile disc (DVD) , floppy disk, and Blu-ray disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers. Combinations of the above are also included within the scope of non-transitory computer-readable and processor-readable media. Additionally, the operations of a method or algorithm may reside as one or any combination or set of codes and/or instructions on a non-transitory processor-readable storage medium and/or computer-readable storage medium, which may be incorporated into a computer program product.
The preceding description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the claims. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the scope of the claims. Thus, the present disclosure is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the following claims and the principles and novel features disclosed herein.
Claims (28)
- A method for recovering from packet switched (PS) service failure in a non-standalone (NSA) network, comprising:determining, by a processor of a wireless device, whether a total number of abnormal PS service failure events during a time period exceeds a maximum counter value;sending, by the processor, a detach request to a base station of the NSA network in response determining that the total number of abnormal PS service failure events during the time period exceeds the maximum counter value; andsending, by the processor, a new attach request to the base station of the NSA network in response to sending the detach request to the base station of the NSA network, the new attach request indicating that Evolved Universal Terrestrial Radio Access (E-UTRA) –new radio (NR) dual connectivity (EN-DC) is supported by the wireless device.
- The method of claim 1, further comprising:sending, by the processor, an initial attach request to the base station of the NSA network prior to determining whether the total number of abnormal PS service failure events during the time period exceeds the maximum counter value, the initial attach request indicating that EN-DC is supported by the wireless device.
- The method of claim 2, further comprising:receiving, by the processor, an initial attach acceptance from the base station of the NSA network in response to sending the initial attach request; andestablishing, by the processor, an initial PS call with the base station of the NSA network in response to receiving the initial attach acceptance.
- The method of claim 3, further comprising:receiving, by the processor, a detach acceptance from the base station of the NSA network in response to sending the detach request.
- The method of claim 4, further comprising:receiving, by the processor, a new attach acceptance from the base station of the NSA network in response to sending the new attach request; andestablishing, by the processor, a new PS call with the base station of the NSA network in response to receiving the new attach acceptance.
- The method of claim 1, wherein the time period is ten seconds and the maximum counter value is five.
- The method of claim 1, wherein the NSA network is a fifth generation (5G) NSA network.
- A wireless device, comprising:a processor configured to:determine whether a total number of abnormal packet switched (PS) service failure events during a time period exceeds a maximum counter value;send a detach request to a base station of a non-standalone (NSA) network in response determining that the total number of abnormal PS service failure events during the time period exceeds the maximum counter value; andsend a new attach request to the base station of the NSA network in response to sending the detach request to the base station of the NSA network, the new attach request indicating that Evolved Universal Terrestrial Radio Access (E-UTRA) –new radio (NR) dual connectivity (EN-DC) is supported by the wireless device.
- The wireless device of claim 8, wherein the processor is further configured to:send an initial attach request to the base station of the 5G NSA network prior to determining whether the total number of abnormal PS service failure events during the time period exceeds the maximum counter value, the initial attach request indicating that EN-DC is supported by the wireless device.
- The wireless device of claim 9, wherein the processor is further configured to:receive an initial attach acceptance from the base station of the NSA network in response to sending the initial attach request;establish an initial PS call with the base station of the NSA network in response to receiving the initial attach acceptance.
- The wireless device of claim 10, wherein the processor is further configured to:receive a detach acceptance from the base station of the NSA network in response to sending the detach request.
- The wireless device of claim 11, wherein the processor is further configured to:receive a new attach acceptance from the base station of the NSA network in response to sending the new attach request; andestablish a new PS call with the base station of the NSA network in response to receiving the new attach acceptance.
- The wireless device of claim 8, wherein the time period is ten seconds and the maximum counter value is five.
- The wireless device of claim 8, wherein the NSA network is a fifth generation (5G) NSA network.
- A wireless device, comprising:means for determining whether a total number of abnormal packet switched (PS) service failure events during a time period exceeds a maximum counter value;means for sending a detach request to a base station of a non-standalone (NSA) network in response determining that the total number of abnormal PS service failure events during the time period exceeds the maximum counter value; andmeans for sending a new attach request to the base station of the NSA network in response to sending the detach request to the base station of the NSA network, the new attach request indicating that Evolved Universal Terrestrial Radio Access (E-UTRA) –new radio (NR) dual connectivity (EN-DC) is supported by the wireless device.
- The wireless device of claim 15, further comprising:means for sending an initial attach request to the base station of the NSA network prior to determining whether the total number of abnormal PS service failure events during the time period exceeds the maximum counter value, the initial attach request indicating that EN-DC is supported by the wireless device.
- The wireless device of claim 16, further comprising:means for receiving an initial attach acceptance from the base station of the 5G NSA network in response to sending the initial attach request; andmeans for establishing an initial PS call with the base station of the NSA network in response to receiving the initial attach acceptance.
- The wireless device of claim 17, further comprising:means for receiving a detach acceptance from the base station of the NSA network in response to sending the detach request.
- The wireless device of claim 18, further comprising:means for receiving a new attach acceptance from the base station of the 5G NSA network in response to sending the new attach request; andmeans for establishing a new PS call with the base station of the NSA network in response to receiving the new attach acceptance.
- The wireless device of claim 15, wherein the time period is ten seconds and the maximum counter value is five.
- The wireless device of claim 15, wherein the NSA network is a fifth generation (5G) NSA network.
- A non-transitory processor readable medium having stored thereon processor-executable instructions configured to cause a processor of a wireless device to perform operations comprising:determining whether a total number of abnormal packet switched (PS) service failure events during a time period exceeds a maximum counter value;sending a detach request to a base station of a non-standalone (NSA) network in response determining that the total number of abnormal PS service failure events during the time period exceeds the maximum counter value; andsending a new attach request to the base station of the NSA network in response to sending the detach request to the base station of the NSA network, the new attach request indicating that Evolved Universal Terrestrial Radio Access (E-UTRA) –new radio (NR) dual connectivity (EN-DC) is supported by the wireless device.
- The non-transitory processor readable medium of claim 22, wherein the stored processor-executable instructions are further configured to cause a processor of a wireless device to perform operations further comprising:sending an initial attach request to the base station of the NSA network prior to determining whether the total number of abnormal PS service failure events during the time period exceeds the maximum counter value, the initial attach request indicating that EN-DC is supported by the wireless device.
- The non-transitory processor readable medium of claim 23, wherein the stored processor-executable instructions are further configured to cause a processor of a wireless device to perform operations further comprising:receiving an initial attach acceptance from the base station of the NSA network in response to sending the initial attach request; andestablishing an initial PS call with the base station of the NSA network in response to receiving the initial attach acceptance.
- The non-transitory processor readable medium of claim 24, wherein the stored processor-executable instructions are further configured to cause a processor of a wireless device to perform operations further comprising:receiving a detach acceptance from the base station of the NSA network in response to sending the detach request.
- The non-transitory processor readable medium of claim 25, wherein the stored processor-executable instructions are further configured to cause a processor of a wireless device to perform operations further comprising:receiving a new attach acceptance from the base station of the NSA network in response to sending the new attach request; andestablishing a new PS call with the base station of the NSA network in response to receiving the new attach acceptance.
- The non-transitory processor readable medium of claim 22, wherein the stored processor-executable instructions are further configured to cause a processor of a wireless device to perform operations such that the time period is ten seconds and the maximum counter value is five.
- The non-transitory processor readable medium of claim 22, wherein the NSA network is a fifth generation (5G) NSA network.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2020/085457 WO2021208107A1 (en) | 2020-04-18 | 2020-04-18 | An optimization method to recover ps service quickly |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2020/085457 WO2021208107A1 (en) | 2020-04-18 | 2020-04-18 | An optimization method to recover ps service quickly |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021208107A1 true WO2021208107A1 (en) | 2021-10-21 |
Family
ID=78083544
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2020/085457 WO2021208107A1 (en) | 2020-04-18 | 2020-04-18 | An optimization method to recover ps service quickly |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2021208107A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2024051627A1 (en) * | 2022-09-09 | 2024-03-14 | 维沃移动通信有限公司 | Communication establishment method and apparatus, terminal device, and network side device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018135861A1 (en) * | 2017-01-17 | 2018-07-26 | 삼성전자 주식회사 | Method and apparatus for interworking between networks in wireless communication system |
CN110267245A (en) * | 2019-06-14 | 2019-09-20 | Oppo广东移动通信有限公司 | Communication control method and electronic equipment |
WO2019195098A1 (en) * | 2018-04-02 | 2019-10-10 | T-Mobile Usa, Inc. | Optimizing new radio standalone and dual connectivity access |
CN110958684A (en) * | 2019-11-28 | 2020-04-03 | 维沃移动通信有限公司 | Network registration method and user equipment |
-
2020
- 2020-04-18 WO PCT/CN2020/085457 patent/WO2021208107A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018135861A1 (en) * | 2017-01-17 | 2018-07-26 | 삼성전자 주식회사 | Method and apparatus for interworking between networks in wireless communication system |
WO2019195098A1 (en) * | 2018-04-02 | 2019-10-10 | T-Mobile Usa, Inc. | Optimizing new radio standalone and dual connectivity access |
CN110267245A (en) * | 2019-06-14 | 2019-09-20 | Oppo广东移动通信有限公司 | Communication control method and electronic equipment |
CN110958684A (en) * | 2019-11-28 | 2020-04-03 | 维沃移动通信有限公司 | Network registration method and user equipment |
Non-Patent Citations (2)
Title |
---|
NEC: "pCR to TR 33.899: Proposal of key issue and solution for option 3", 3GPP TSG SA WG3 (SECURITY) MEETING #85,S3-161629, 11 November 2016 (2016-11-11), XP051170518 * |
QUALCOMM INCORPORATED: "Including UE additional security capability IE in Attach/TAU Request for UE supporting N1 mode", 3GPP TSG-CT WG1 MEETING #111BIS,C1-184258, 13 July 2018 (2018-07-13), XP051465759 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2024051627A1 (en) * | 2022-09-09 | 2024-03-14 | 维沃移动通信有限公司 | Communication establishment method and apparatus, terminal device, and network side device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12058581B2 (en) | Enhancements of VoWi-Fi handover from ePDG to LTE when VoNR is not supported | |
US11690081B2 (en) | Bandwidth part (BWP) for unicast/multicast and resource allocation for multicast | |
EP4046353A1 (en) | Uplink and downlink streaming bit rate assistance in 5g networks | |
US20220279399A1 (en) | User equipment (ue) mobility history information management | |
US11770772B2 (en) | Discontinuous reception for sidelink control signaling | |
US11930494B2 (en) | Managing transmit timing of data transmissions | |
WO2021208107A1 (en) | An optimization method to recover ps service quickly | |
WO2021203228A1 (en) | Method to fast recover ue from ps call failure in 5g nsa | |
WO2021212361A1 (en) | Method to fast recover 5g service from abnormal data stop | |
WO2021223220A1 (en) | Recovery from ps call failure caused by network release of rrc connections on dual 5gnr subscription wireless devices | |
US11523404B2 (en) | Radio link prioritization | |
US12126994B2 (en) | User plane integrity protection (UP IP) capability signaling in 5G/4G systems | |
WO2021174514A1 (en) | Apparatus and method to recover packet-switched (ps) service quickly after non-default data subscription (dds) call end | |
WO2021207933A1 (en) | A method to avoid irat ping-pong and save power | |
US11638321B2 (en) | User equipment signaling of temporary change in service availability | |
EP4038854B1 (en) | User plane integrity protection (up ip) capability signaling in 5g/4g systems | |
US20210105612A1 (en) | User plane integrity protection (up ip) capability signaling in 5g/4g systems | |
US20230403732A1 (en) | Managing Downlink Traffic Reception And Cross-Link Interference | |
WO2021258392A1 (en) | Dynamic srs configuration based on cqi in 5g network | |
WO2021253369A1 (en) | Methods for managing network communication | |
WO2022051985A1 (en) | Managing a communication link for transfer control protocol communications |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20931380 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20931380 Country of ref document: EP Kind code of ref document: A1 |