WO2021252443A1 - Enhancing ran ue id based ue identification in o-ran - Google Patents

Enhancing ran ue id based ue identification in o-ran Download PDF

Info

Publication number
WO2021252443A1
WO2021252443A1 PCT/US2021/036329 US2021036329W WO2021252443A1 WO 2021252443 A1 WO2021252443 A1 WO 2021252443A1 US 2021036329 W US2021036329 W US 2021036329W WO 2021252443 A1 WO2021252443 A1 WO 2021252443A1
Authority
WO
WIPO (PCT)
Prior art keywords
ran
interface
ric
information
network
Prior art date
Application number
PCT/US2021/036329
Other languages
French (fr)
Inventor
Jaemin HAN
Leifeng RUAN
Dawei YING
Original Assignee
Intel Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Intel Corporation filed Critical Intel Corporation
Priority to US17/921,296 priority Critical patent/US20230171592A1/en
Priority to EP21821189.4A priority patent/EP4162711A4/en
Publication of WO2021252443A1 publication Critical patent/WO2021252443A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/20Transfer of user or subscriber data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/26Network addressing or numbering for mobility support
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/08Access point devices
    • H04W88/085Access point devices with remote components
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/12Access point controller devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W92/00Interfaces specially adapted for wireless communication networks
    • H04W92/04Interfaces between hierarchically different network devices
    • H04W92/12Interfaces between hierarchically different network devices between access points and access point controllers

Definitions

  • Various embodiments generally may relate to the field of wireless communications.
  • the Open RAN (O-RAN) architecture currently being developed aims to optimize overall system performance and improve user experiences in 3GPP networks.
  • O-RAN Open RAN
  • two RAN intelligence controllers (RIC) - non real-time (non-RT) and near real-time (Near-RT) were introduced to provide optimized controls over RAN nodes, based on artificial intelligence (AI) and machine learning (ML).
  • AI artificial intelligence
  • ML machine learning
  • a UE of interest is identified, while connected to the 3GPP network, across SMO / non-RT RIC and Near-RT RIC, and also across 01, Al, and E2 interfaces.
  • a RAN UE ID (defined in TS 38.473, v. 16.1.0, 2020-03-31; and TS 38.463, v. 16.1.1, 2020-03-31) as a common identifier over 01, Al, and E2 interfaces.
  • Al policy from Non-RT RIC to Near-RT RIC
  • embodiments of the present disclosure may be directed to enhancements for this RAN UE ID based UE identification in existing O-RAN systems.
  • FIG. 1 illustrates an example of an O-RAN architecture in accordance with various embodiments.
  • Figure 2 illustrates a network in accordance with various embodiments.
  • Figure 3 schematically illustrates a wireless network in accordance with various embodiments.
  • Figure 4 is a block diagram illustrating components, according to some example embodiments, able to read instructions from a machine-readable or computer-readable medium (e.g., a non-transitory machine-readable storage medium) and perform any one or more of the methodologies discussed herein.
  • a machine-readable or computer-readable medium e.g., a non-transitory machine-readable storage medium
  • FIG. 5 illustrates an example of a high-level view of an Open RAN (O-RAN) architecture in accordance with various embodiments.
  • O-RAN Open RAN
  • Figure 6 illustrates an example of an O-RAN logical architecture corresponding to the O-RAN architecture of Figure 5.
  • Figure 7 depicts an example procedure for practicing the various embodiments discussed herein.
  • Figure 8 depicts another example procedure for practicing the various embodiments.
  • Figure 9 depicts another example procedure for practicing the various embodiments.
  • Subscription based UE observability from RAN nodes to Near-RT RIC A UE observability based on RAN UE ID (whenever (re/de)assigned) is currently proposed via 01 to SMO and via E2 to Near-RT RIC. While the observability over 01 is baseline, for e.g. - a performance monitoring (PM) perspective, not every UE currently served by a RAN node is always the subject of an optimization or RAN intent that the operator wants to achieve. It would not be desirable for Near-RT RIC to maintain, for every single RAN node, UE contexts of all the UEs and their RAN UE IDs connected to it.
  • PM performance monitoring
  • RAN UE ID update together with gNB-DU ID and gNB-CU-UP ID When a UE accesses a gNB, especially in case of CU-DU split or CP-UP separated, a RAN UE ID is assigned by the gNB-CU-CP and shared with gNB-DU and gNB-CU-UP when the UE context is created.
  • a RAN UE ID is updated from gNB-CU- CP, however, providing this ID alone lacks observability of which gNB-DU and which gNB-CU-UP are serving the same UE in case of CU-DU split or CP-UP separated.
  • a Near-RT RIC can know if all those entities (gNB-CU-CP, gNB-CU-UP, gNB-DU) updates the same RAN UE ID to the Near-RT RIC, but given that the same value is always shared between those entities while the UE is in connected, it would be more efficient if the gNB-CU-CP takes charge of the RAN UE ID update, together with the corresponding gNB-DU UE ID and gNB-CU-UP UE ID that may be changed during intra- gNB mobility.
  • the present disclosure proceeds by describing embodiments to enhance the RAN UE
  • Embodiment 1 Subscription based UE observability from RAN nodes to Near-RT RIC
  • O-RAN E2 interface SM Service Model
  • This RIC Event Trigger Definition IE style 1 is used to detect a specific interface message event in E2 Node RAN Function based on specified target Network Interface Type, Network Interface Identifier, Network Interface Direction, Network Interface Message Type, Message Protocol IE Identifier, Message Protocol IE Test Condition and Message Protocol IE Test Value.
  • This RIC Event Trigger Definition IE style 1 uses RIC Event Trigger Definition IE Format 1 (8.2.1.1.1) 7.3.3 RIC Event trigger definition IE style 2: RAN UE Group Event
  • This RIC Event Trigger Definition IE style 2 is used to detect a specific group of UEs that are currently being served by the E2 nodes based on the configured RAN UE group conditions.
  • This RIC Event Trigger Definition IE style uses RIC Event Trigger Definition IE Format 2 (8.2.1.1.2)
  • This REPORT Service style provides a copy of a complete network interface message with the network interface specific encoded message carried as a transparent container with an associated header providing information on the target Network Interface Type, Network Interface Identifier, Network Interface Direction and optional Network Interface Timestamp.
  • the addition of optional information time stamp in the Indication Header is controlled using the associated RIC Action Parameter
  • This REPORT Service style uses the following RAN parameters with RIC Action Definition IE Format 1 (8.2.1.2.1) where AddTimestamp is used to request the inclusion of optional Network Interface Timestamp information in RIC Indication header IE:
  • REPORT Service RIC Indication Header IE contains the Network Interface Type, Network Interface Identifier, Network Interface Direction and optional Network Interface Timestamp.
  • This REPORT Service style uses RIC Indication header IE Format 1 (8.2.1.3.1)
  • REPORT Service RIC Indication message IE contains contains a transparent container used to carry the complete message with contents defined by the specific network interface specification.
  • REPORT Service style uses RIC Indication message IE Format 1 (8.2.1.4.1) 7.4.3 REPORT Service Style 2: Partial message
  • REPORT Service Style description This REPORT Service style provides a copy of a specific information element extracted from a network interface message with the network interface specific encoded message carried as a transparent container associated with an indication header providing information on the target Network Interface Type, Network Interface Identifier, Network Interface Direction, Network Interface Message Type and optional Network Interface Timestamp.
  • the addition of optional Network Interface Timestamp in the Indication Header and the rules for extracting the part of the message are controlled using the associated RIC Action Parameter
  • REPORT Service RIC Action Definition IE contents This REPORT Service style uses the following RAN parameters with RIC Action Definition IE Format 1 (8.2.1.2.1) where AddTimestamp is used to request the inclusion of optional Timestamp information in RIC Indication header IE and Target Protocol IE Identifier is used to specify the required IE to be copied from the message.
  • REPORT Service RIC Indication Header IE contains the Network Interface Type, Network Interface Identifier, Network Interface Direction and optional Network Interface Timestamp.
  • This REPORT Service style uses RIC Indication header IE Format 1 (8.2.1.3.1)
  • REPORT Service RIC Indication message IE contains a transparent container used to carry the extracted part of the message with contents defined by the specific network interface specification.
  • This REPORT Service style uses RIC Indication message IE Format 1 (8.2.1.4.1)
  • This REPORT Service style provides RAN UE IDs of specific UEs currently served by the E2 node that match the configured RAN UE group conditions.
  • REPORT Service RIC Indication message IE contains a list of RAN UE IDs of the UEs that are currently being served by the E2 node, per each RAN UE group requested.
  • This REPORT Service style uses RIC Indication message IE Format 1 (8.2.1.4.2) /////////////////////some operations skipped///////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
  • Table 7.8-1 and 7.8-2 provide a summary of the E2SM IE Formats defined to support the set of RIC Event Triggers and RIC Service Styles defined in this E2SM specification.
  • Table 7.8-1 Summary of the E2SM IE encoding Formats defined to support the set of
  • This information element is part of the RIC SUBSCRIPTION REQUEST message sent by the Near-RT RIC to a E2 Node and is required for event triggers used to initiate REPORT, INSERT and POLICY actions.
  • This RIC Event Trigger Definition style allows to select a specific target using: Network Interface Type IE used to select a specific interface type,
  • Network Interface Identifier used to select a specific interface instance
  • Network Interface Direction used to select a specific interface direction (incoming or outgoing)
  • Network Interface Message Type used to select a specific message on the interface
  • Message Protocol IE Identifier used to select a specific protocol element in the selected message
  • Message Protocol IE Test Condition and Message Protocol IE Test Value are used to test if the selected protocol element meets a specific test condition where the trigger condition applies when and only if all of the test conditions are TRUE (e.g., logical ADD of each test condition).
  • the E2SM-NI Event Trigger Definition IE Format 2 supports a REPORT encoded as a list of RAN UE Groups, each with a group identifier, group definition described in terms of a list of RAN parameters with test conditions, in order to retrieve the RAN UE IDs of the UEs that are currently served by the E2 node which match the test conditions configured per each group.
  • This information element is part of the RIC INDICATION message sent by the E2 Node to a Near-RT RIC node and is required for REPORT and INSERT actions.
  • Network Interface Type IE in associated RIC Indication Header IE.
  • Embodiment 2 RAN UE ID update together with gNB-DU ID and gNB-CU-UP ID
  • O-RAN E2 interface AP Application Protocol
  • This information element indicates the RAN UE ID assigned by the gNB(-CU-CP) for a UE and optionally the ID(s) of an associated gNB-DU and/or gNB-CU-UP that the corresponding UE contexts are established.
  • FIGS 2-3 illustrate various systems, devices, and components that may implement aspects of disclosed embodiments.
  • FIG. 2 illustrates a network 200 in accordance with various embodiments.
  • the network 200 may operate in a manner consistent with 3GPP technical specifications for LTE or 5G/NR systems.
  • 3GPP technical specifications for LTE or 5G/NR systems 3GPP technical specifications for LTE or 5G/NR systems.
  • the example embodiments are not limited in this regard and the described embodiments may apply to other networks that benefit from the principles described herein, such as future 3GPP systems, or the like.
  • the network 200 may include a UE 202, which may include any mobile or non-mobile computing device designed to communicate with a RAN 204 via an over-the-air connection.
  • the UE 202 may be communicatively coupled with the RAN 204 by a Uu interface.
  • the UE 202 may be, but is not limited to, a smartphone, tablet computer, wearable computer device, desktop computer, laptop computer, in-vehicle infotainment, in-car entertainment device, instrument cluster, head-up display device, onboard diagnostic device, dashtop mobile equipment, mobile data terminal, electronic engine management system, electronic/engine control unit, electronic/engine control module, embedded system, sensor, microcontroller, control module, engine management system, networked appliance, machine-type communication device, M2M or D2D device, IoT device, etc.
  • the network 200 may include a plurality of UEs coupled directly with one another via a sidelink interface.
  • the UEs may be M2M/D2D devices that communicate using physical sidelink channels such as, but not limited to, PSBCH, PSDCH, PSSCH, PSCCH, PSFCH, etc.
  • the UE 202 may additionally communicate with an AP 206 via an over-the-air connection.
  • the AP 206 may manage a WLAN connection, which may serve to offload some/all network traffic from the RAN 204.
  • the connection between the UE 202 and the AP 206 may be consistent with any IEEE 802.11 protocol, wherein the AP 206 could be a wireless fidelity (Wi-Fi®) router.
  • the UE 202, RAN 204, and AP 206 may utilize cellular-WLAN aggregation (for example, LWA/LWIP).
  • Cellular-WLAN aggregation may involve the UE 202 being configured by the RAN 204 to utilize both cellular radio resources and WLAN resources.
  • the RAN 204 may include one or more access nodes, for example, AN 208.
  • AN 208 may terminate air-interface protocols for the UE 202 by providing access stratum protocols including RRC, PDCP, RLC, MAC, and LI protocols. In this manner, the AN 208 may enable data/voice connectivity between CN 220 and the UE 202.
  • the AN 208 may be implemented in a discrete device or as one or more software entities running on server computers as part of, for example, a virtual network, which may be referred to as a CRAN or virtual baseband unit pool.
  • the AN 208 be referred to as a BS, gNB, RAN node, eNB, ng-eNB, NodeB, RSU, TRxP, TRP, etc.
  • the AN 208 may be a macrocell base station or a low power base station for providing femtocells, picocells or other like cells having smaller coverage areas, smaller user capacity, or higher bandwidth compared to macrocells.
  • the RAN 204 may be coupled with one another via an X2 interface (if the RAN 204 is an LTE RAN) or an Xn interface (if the RAN 204 is a 5G RAN).
  • the X2/Xn interfaces which may be separated into control/user plane interfaces in some embodiments, may allow the ANs to communicate information related to handovers, data/context transfers, mobility, load management, interference coordination, etc.
  • the ANs of the RAN 204 may each manage one or more cells, cell groups, component carriers, etc. to provide the UE 202 with an air interface for network access.
  • the UE 202 may be simultaneously connected with a plurality of cells provided by the same or different ANs of the RAN 204.
  • the UE 202 and RAN 204 may use carrier aggregation to allow the UE 202 to connect with a plurality of component carriers, each corresponding to a Pcell or Scell.
  • a first AN may be a master node that provides an MCG and a second AN may be secondary node that provides an SCG.
  • the first/second ANs may be any combination of eNB, gNB, ng-eNB, etc.
  • the RAN 204 may provide the air interface over a licensed spectrum or an unlicensed spectrum.
  • the nodes may use LAA, eLAA, and/or feLAA mechanisms based on CA technology with PCells/Scells.
  • the nodes Prior to accessing the unlicensed spectrum, the nodes may perform medium/carrier-sensing operations based on, for example, a listen-before-talk (LBT) protocol.
  • LBT listen-before-talk
  • the UE 202 or AN 208 may be or act as a RSU, which may refer to any transportation infrastructure entity used for V2X communications.
  • An RSU may be implemented in or by a suitable AN or a stationary (or relatively stationary) UE.
  • An RSU implemented in or by: a UE may be referred to as a “UE-type RSU”; an eNB may be referred to as an “eNB-type RSU”; a gNB may be referred to as a “gNB-type RSU”; and the like.
  • an RSU is a computing device coupled with radio frequency circuitry located on a roadside that provides connectivity support to passing vehicle UEs.
  • the RSU may also include internal data storage circuitry to store intersection map geometry, traffic statistics, media, as well as applications/software to sense and control ongoing vehicular and pedestrian traffic.
  • the RSU may provide very low latency communications required for high speed events, such as crash avoidance, traffic warnings, and the like. Additionally or alternatively, the RSU may provide other cellular/WLAN communications services.
  • the components of the RSU may be packaged in a weatherproof enclosure suitable for outdoor installation, and may include a network interface controller to provide a wired connection (e.g., Ethernet) to a traffic signal controller or a backhaul network.
  • the RAN 204 may be an LTE RAN 210 with eNBs, for example, eNB 212.
  • the LTE RAN 210 may provide an LTE air interface with the following characteristics: SCS of 15 kHz; CP-OFDM waveform for DL and SC-FDMA waveform for UL; turbo codes for data and TBCC for control; etc.
  • the LTE air interface may rely on CSI- RS for CSI acquisition and beam management; PDSCH/PDCCH DMRS for PDSCH/PDCCH demodulation; and CRS for cell search and initial acquisition, channel quality measurements, and channel estimation for coherent demodulation/detection at the UE.
  • the LTE air interface may operating on sub-6 GHz bands.
  • the RAN 204 may be an NG-RAN 214 with gNBs, for example, gNB 216, or ng-eNBs, for example, ng-eNB 218.
  • the gNB 216 may connect with 5G-enabled UEs using a 5G NR interface.
  • the gNB 216 may connect with a 5G core through an NG interface, which may include an N2 interface or an N3 interface.
  • the ng-eNB 218 may also connect with the 5G core through an NG interface, but may connect with a UE via an LTE air interface.
  • the gNB 216 and the ng-eNB 218 may connect with each other over an Xn interface.
  • the NG interface may be split into two parts, an NG user plane (NG-U) interface, which carries traffic data between the nodes of the NG-RAN 214 and a UPF 248 (e.g., N3 interface), and an NG control plane (NG-C) interface, which is a signaling interface between the nodes of the NG-RAN214 and an AMF 244 (e.g., N2 interface).
  • NG-U NG user plane
  • N-C NG control plane
  • the NG-RAN 214 may provide a 5G-NR air interface with the following characteristics: variable SCS; CP-OFDM for DL, CP-OFDM and DFT-s-OFDM for UL; polar, repetition, simplex, and Reed-Muller codes for control and LDPC for data.
  • the 5G-NR air interface may rely on CSI-RS, PDSCH/PDCCH DMRS similar to the LTE air interface.
  • the 5G-NR air interface may not use a CRS, but may use PBCH DMRS for PBCH demodulation; PTRS for phase tracking for PDSCH; and tracking reference signal for time tracking.
  • the 5G- NR air interface may operating on FR1 bands that include sub-6 GHz bands or FR2 bands that include bands from 24.25 GHz to 52.6 GHz.
  • the 5G-NR air interface may include an SSB that is an area of a downlink resource grid that includes PSS/SSS/PBCH.
  • the 5G-NR air interface may utilize BWPs for various purposes.
  • BWP can be used for dynamic adaptation of the SCS.
  • the UE 202 can be configured with multiple BWPs where each BWP configuration has a different SCS. When a BWP change is indicated to the UE 202, the SCS of the transmission is changed as well.
  • Another use case example of BWP is related to power saving.
  • multiple BWPs can be configured for the UE 202 with different amount of frequency resources (for example, PRBs) to support data transmission under different traffic loading scenarios.
  • a BWP containing a smaller number of PRBs can be used for data transmission with small traffic load while allowing power saving at the UE 202 and in some cases at the gNB 216.
  • a BWP containing a larger number of PRBs can be used for scenarios with higher traffic load.
  • the RAN 204 is communicatively coupled to CN 220 that includes network elements to provide various functions to support data and telecommunications services to customers/subscribers (for example, users of UE 202).
  • the components of the CN 220 may be implemented in one physical node or separate physical nodes.
  • NFV may be utilized to virtualize any or all of the functions provided by the network elements of the CN 220 onto physical compute/storage resources in servers, switches, etc.
  • a logical instantiation of the CN 220 may be referred to as a network slice, and a logical instantiation of a portion of the CN 220 may be referred to as a network sub-slice.
  • the CN 220 may be an LTE CN 222, which may also be referred to as an EPC.
  • the LTE CN 222 may include MME 224, SGW 226, SGSN 228, HSS 230, PGW 232, and PCRF 234 coupled with one another over interfaces (or “reference points”) as shown. Functions of the elements of the LTE CN 222 may be briefly introduced as follows.
  • the MME 224 may implement mobility management functions to track a current location of the UE 202 to facilitate paging, bearer activation/deactivation, handovers, gateway selection, authentication, etc.
  • the SGW 226 may terminate an SI interface toward the RAN and route data packets between the RAN and the LTE CN 222.
  • the SGW 226 may be a local mobility anchor point for inter-RAN node handovers and also may provide an anchor for inter-3GPP mobility. Other responsibilities may include lawful intercept, charging, and some policy enforcement.
  • the SGSN 228 may track a location of the UE 202 and perform security functions and access control. In addition, the SGSN 228 may perform inter-EPC node signaling for mobility between different RAT networks; PDN and S-GW selection as specified by MME 224; MME selection for handovers; etc.
  • the S3 reference point between the MME 224 and the SGSN 228 may enable user and bearer information exchange for inter-3GPP access network mobility in idle/active states.
  • the HSS 230 may include a database for network users, including subscription-related information to support the network entities’ handling of communication sessions.
  • the HSS 230 can provide support for routing/roaming, authentication, authorization, naming/addressing resolution, location dependencies, etc.
  • An S6a reference point between the HSS 230 and the MME 224 may enable transfer of subscription and authentication data for authenti eating/ authorizing user access to the LTE CN 220.
  • the PGW 232 may terminate an SGi interface toward a data network (DN) 236 that may include an application/content server 238.
  • the PGW 232 may route data packets between the LTE CN 222 and the data network 236.
  • the PGW 232 may be coupled with the SGW 226 by an S5 reference point to facilitate user plane tunneling and tunnel management.
  • the PGW 232 may further include a node for policy enforcement and charging data collection (for example, PCEF).
  • the SGi reference point between the PGW 232 and the data network 2 36 may be an operator external public, a private PDN, or an intra-operator packet data network, for example, for provision of IMS services.
  • the PGW 232 may be coupled with a PCRF 234 via a Gx reference point.
  • the PCRF 234 is the policy and charging control element of the LTE CN 222.
  • the PCRF 234 may be communicatively coupled to the app/content server 238 to determine appropriate QoS and charging parameters for service flows.
  • the PCRF 232 may provision associated rules into a PCEF (via Gx reference point) with appropriate TFT and QCI.
  • the CN 220 may be a 5GC 240.
  • the 5GC 240 may include an AUSF 242, AMF 244, SMF 246, UPF 248, NSSF 250, NEF 252, NRF 254, PCF 256, UDM 258, and AF 260 coupled with one another over interfaces (or “reference points”) as shown.
  • Functions of the elements of the 5GC 240 may be briefly introduced as follows.
  • the AUSF 242 may store data for authentication of UE 202 and handle authentication- related functionality.
  • the AUSF 242 may facilitate a common authentication framework for various access types.
  • the AUSF 242 may exhibit an Nausf service-based interface.
  • the AMF 244 may allow other functions of the 5GC 240 to communicate with the UE 202 and the RAN 204 and to subscribe to notifications about mobility events with respect to the UE 202.
  • the AMF 244 may be responsible for registration management (for example, for registering UE 202), connection management, reachability management, mobility management, lawful interception of AMF-related events, and access authentication and authorization.
  • the AMF 244 may provide transport for SM messages between the UE 202 and the SMF 246, and act as a transparent proxy for routing SM messages.
  • AMF 244 may also provide transport for SMS messages between UE 202 and an SMSF.
  • AMF 244 may interact with the AUSF 242 and the UE 202 to perform various security anchor and context management functions.
  • AMF 244 may be a termination point of a RAN CP interface, which may include or be an N2 reference point between the RAN 204 and the AMF 244; and the AMF 244 may be a termination point of NAS (Nl) signaling, and perform NAS ciphering and integrity protection.
  • AMF 244 may also support NAS signaling with the UE 202 over an N3 IWF interface.
  • the SMF 246 may be responsible for SM (for example, session establishment, tunnel management between UPF 248 and AN 208); UE IP address allocation and management (including optional authorization); selection and control of UP function; configuring traffic steering at UPF 248 to route traffic to proper destination; termination of interfaces toward policy control functions; controlling part of policy enforcement, charging, and QoS; lawful intercept (for SM events and interface to LI system); termination of SM parts of NAS messages; downlink data notification; initiating AN specific SM information, sent via AMF 244 over N2 to AN 208; and determining SSC mode of a session.
  • SM for example, session establishment, tunnel management between UPF 248 and AN 208
  • UE IP address allocation and management including optional authorization
  • selection and control of UP function configuring traffic steering at UPF 248 to route traffic to proper destination
  • termination of interfaces toward policy control functions controlling part of policy enforcement, charging, and QoS
  • lawful intercept for SM events and interface to LI system
  • SM may refer to management of a PDU session
  • a PDU session or “session” may refer to a PDU connectivity service that provides or enables the exchange of PDUs between the UE 202 and the data network 236.
  • the UPF 248 may act as an anchor point for intra-RAT and inter-RAT mobility, an external PDU session point of interconnect to data network 236, and a branching point to support multi-homed PDU session.
  • the UPF 248 may also perform packet routing and forwarding, perform packet inspection, enforce the user plane part of policy rules, lawfully intercept packets (UP collection), perform traffic usage reporting, perform QoS handling for a user plane (e.g., packet filtering, gating, UL/DL rate enforcement), perform uplink traffic verification (e.g., SDF-to-QoS flow mapping), transport level packet marking in the uplink and downlink, and perform downlink packet buffering and downlink data notification triggering.
  • UPF 248 may include an uplink classifier to support routing traffic flows to a data network.
  • the NSSF 250 may select a set of network slice instances serving the UE 202.
  • the NSSF 250 may also determine allowed NSSAI and the mapping to the subscribed S-NSSAIs, if needed.
  • the NSSF 250 may also determine the AMF set to be used to serve the UE 202, or a list of candidate AMFs based on a suitable configuration and possibly by querying the NRF 254.
  • the selection of a set of network slice instances for the UE 202 may be triggered by the AMF 244 with which the UE 202 is registered by interacting with the NSSF 250, which may lead to a change of AMF.
  • the NSSF 250 may interact with the AMF 244 via an N22 reference point; and may communicate with another NSSF in a visited network via an N31 reference point (not shown). Additionally, the NSSF 250 may exhibit an Nnssf service-based interface.
  • the NEF 252 may securely expose services and capabilities provided by 3GPP network functions for third party, internal exposure/re-exposure, AFs (e.g., AF 260), edge computing or fog computing systems, etc.
  • the NEF 252 may authenticate, authorize, or throttle the AFs.
  • NEF 252 may also translate information exchanged with the AF 260 and information exchanged with internal network functions. For example, the NEF 252 may translate between an AF-Service-Identifier and an internal 5GC information.
  • NEF 252 may also receive information from other NFs based on exposed capabilities of other NFs. This information may be stored at the NEF 252 as structured data, or at a data storage NF using standardized interfaces. The stored information can then be re-exposed by the NEF 252 to other NFs and AFs, or used for other purposes such as analytics. Additionally, the NEF 252 may exhibit an Nnef service-based interface.
  • the NRF 254 may support service discovery functions, receive NF discovery requests from NF instances, and provide the information of the discovered NF instances to the NF instances. NRF 254 also maintains information of available NF instances and their supported services. As used herein, the terms “instantiate,” “instantiation,” and the like may refer to the creation of an instance, and an “instance” may refer to a concrete occurrence of an object, which may occur, for example, during execution of program code. Additionally, the NRF 254 may exhibit the Nnrf service-based interface.
  • the PCF 256 may provide policy rules to control plane functions to enforce them, and may also support unified policy framework to govern network behavior.
  • the PCF 256 may also implement a front end to access subscription information relevant for policy decisions in a UDR of the UDM 258.
  • the PCF 256 exhibit an Npcf service-based interface.
  • the UDM 258 may handle subscription-related information to support the network entities’ handling of communication sessions, and may store subscription data of UE 202.
  • subscription data may be communicated via an N8 reference point between the UDM 258 and the AMF 244.
  • the UDM 258 may include two parts, an application front end and a UDR.
  • the UDR may store subscription data and policy data for the UDM 258 and the PCF 256, and/or structured data for exposure and application data (including PFDs for application detection, application request information for multiple UEs 202) for the NEF 252.
  • the Nudr service-based interface may be exhibited by the UDR 221 to allow the UDM 258, PCF 256, and NEF 252 to access a particular set of the stored data, as well as to read, update (e.g., add, modify), delete, and subscribe to notification of relevant data changes in the UDR.
  • the UDM may include a UDM-FE, which is in charge of processing credentials, location management, subscription management and so on. Several different front ends may serve the same user in different transactions.
  • the UDM-FE accesses subscription information stored in the UDR and performs authentication credential processing, user identification handling, access authorization, registration/mobility management, and subscription management.
  • the UDM 258 may exhibit the Nudm service-based interface.
  • the AF 260 may provide application influence on traffic routing, provide access to NEF, and interact with the policy framework for policy control.
  • the 5GC 240 may enable edge computing by selecting operator/3 rd party services to be geographically close to a point that the UE 202 is attached to the network. This may reduce latency and load on the network.
  • the 5GC 240 may select a UPF 248 close to the UE 202 and execute traffic steering from the UPF 248 to data network 236 via the N6 interface. This may be based on the UE subscription data, UE location, and information provided by the AF 260. In this way, the AF 260 may influence UPF (re)selection and traffic routing.
  • the network operator may permit AF 260 to interact directly with relevant NFs. Additionally, the AF 260 may exhibit an Naf service-based interface.
  • the data network 236 may represent various network operator services, Internet access, or third party services that may be provided by one or more servers including, for example, application/content server 238.
  • FIG. 3 schematically illustrates a wireless network 300 in accordance with various embodiments.
  • the wireless network 300 may include a UE 302 in wireless communication with an AN 304.
  • the UE 302 and AN 304 may be similar to, and substantially interchangeable with, like-named components described elsewhere herein.
  • the UE 302 may be communicatively coupled with the AN 304 via connection 306.
  • the connection 306 is illustrated as an air interface to enable communicative coupling, and can be consistent with cellular communications protocols such as an LTE protocol or a 5G NR protocol operating at mmWave or sub-6GHz frequencies.
  • the UE 302 may include a host platform 308 coupled with a modem platform 310.
  • the host platform 308 may include application processing circuitry 312, which may be coupled with protocol processing circuitry 314 of the modem platform 310.
  • the application processing circuitry 312 may run various applications for the UE 302 that source/sink application data.
  • the application processing circuitry 312 may further implement one or more layer operations to transmit/receive application data to/from a data network. These layer operations may include transport (for example UDP) and Internet (for example, IP) operations
  • the protocol processing circuitry 314 may implement one or more of layer operations to facilitate transmission or reception of data over the connection 306.
  • the layer operations implemented by the protocol processing circuitry 314 may include, for example, MAC, RLC, PDCP, RRC and NAS operations.
  • the modem platform 310 may further include digital baseband circuitry 316 that may implement one or more layer operations that are “below” layer operations performed by the protocol processing circuitry 314 in a network protocol stack. These operations may include, for example, PHY operations including one or more of HARQ-ACK functions, scrambling/descrambling, encoding/decoding, layer mapping/de-mapping, modulation symbol mapping, received symbol/bit metric determination, multi-antenna port precoding/decoding, which may include one or more of space-time, space-frequency or spatial coding, reference signal generation/detection, preamble sequence generation and/or decoding, synchronization sequence generation/detection, control channel signal blind decoding, and other related functions.
  • PHY operations including one or more of HARQ-ACK functions, scrambling/descrambling, encoding/decoding, layer mapping/de-mapping, modulation symbol mapping, received symbol/bit metric determination, multi-antenna port precoding/decoding, which may
  • the modem platform 310 may further include transmit circuitry 318, receive circuitry 320, RF circuitry 322, and RF front end (RFFE) 324, which may include or connect to one or more antenna panels 326.
  • the transmit circuitry 318 may include a digital -to-analog converter, mixer, intermediate frequency (IF) components, etc.
  • the receive circuitry 320 may include an analog-to-digital converter, mixer, IF components, etc.
  • the RF circuitry 322 may include a low-noise amplifier, a power amplifier, power tracking components, etc.
  • RFFE 324 may include filters (for example, surface/bulk acoustic wave filters), switches, antenna tuners, beamforming components (for example, phase-array antenna components), etc.
  • transmit/receive components may be specific to details of a specific implementation such as, for example, whether communication is TDM or FDM, in mmWave or sub-6 gHz frequencies, etc.
  • the transmit/receive components may be arranged in multiple parallel transmit/receive chains, may be disposed in the same or different chips/modules, etc.
  • the protocol processing circuitry 314 may include one or more instances of control circuitry (not shown) to provide control functions for the transmit/receive components.
  • a UE reception may be established by and via the antenna panels 326, RFFE 324, RF circuitry 322, receive circuitry 320, digital baseband circuitry 316, and protocol processing circuitry 314.
  • the antenna panels 326 may receive a transmission from the AN 304 by receive-beamforming signals received by a plurality of antennas/antenna elements of the one or more antenna panels 326.
  • a UE transmission may be established by and via the protocol processing circuitry 314, digital baseband circuitry 316, transmit circuitry 318, RF circuitry 322, RFFE 324, and antenna panels 326.
  • the transmit components of the UE 304 may apply a spatial filter to the data to be transmitted to form a transmit beam emitted by the antenna elements of the antenna panels 326.
  • the AN 304 may include a host platform 328 coupled with a modem platform 330.
  • the host platform 328 may include application processing circuitry 332 coupled with protocol processing circuitry 334 of the modem platform 330.
  • the modem platform may further include digital baseband circuitry 336, transmit circuitry 338, receive circuitry 340, RF circuitry 342, RFFE circuitry 344, and antenna panels 346.
  • the components of the AN 304 may be similar to and substantially interchangeable with like-named components of the UE 302.
  • the components of the AN 308 may perform various logical functions that include, for example, RNC functions such as radio bearer management, uplink and downlink dynamic radio resource management, and data packet scheduling.
  • Figure 4 is a block diagram illustrating components, according to some example embodiments, able to read instructions from a machine-readable or computer-readable medium (e.g., a non-transitory machine-readable storage medium) and perform any one or more of the methodologies discussed herein.
  • Figure 4 shows a diagrammatic representation of hardware resources 400 including one or more processors (or processor cores) 410, one or more memory /storage devices 420, and one or more communication resources 430, each of which may be communicatively coupled via a bus 440 or other interface circuitry.
  • a hypervisor 402 may be executed to provide an execution environment for one or more network slices/sub-slices to utilize the hardware resources 400.
  • the processors 410 may include, for example, a processor 412 and a processor 414.
  • the processors 410 may be, for example, a central processing unit (CPU), a reduced instruction set computing (RISC) processor, a complex instruction set computing (CISC) processor, a graphics processing unit (GPU), a DSP such as a baseband processor, an ASIC, an FPGA, a radio-frequency integrated circuit (RFIC), another processor (including those discussed herein), or any suitable combination thereof.
  • CPU central processing unit
  • RISC reduced instruction set computing
  • CISC complex instruction set computing
  • GPU graphics processing unit
  • DSP such as a baseband processor, an ASIC, an FPGA, a radio-frequency integrated circuit (RFIC), another processor (including those discussed herein), or any suitable combination thereof.
  • the memory /storage devices 420 may include main memory, disk storage, or any suitable combination thereof.
  • the memory /storage devices 420 may include, but are not limited to, any type of volatile, non-volatile, or semi-volatile memory such as dynamic random access memory (DRAM), static random access memory (SRAM), erasable programmable read-only memory (EPROM), electrically erasable programmable read-only memory (EEPROM), Flash memory, solid-state storage, etc.
  • DRAM dynamic random access memory
  • SRAM static random access memory
  • EPROM erasable programmable read-only memory
  • EEPROM electrically erasable programmable read-only memory
  • Flash memory solid-state storage, etc.
  • the communication resources 430 may include interconnection or network interface controllers, components, or other suitable devices to communicate with one or more peripheral devices 404 or one or more databases 406 or other network elements via a network 408.
  • the communication resources 430 may include wired communication components (e.g., for coupling via USB, Ethernet, etc.), cellular communication components, NFC components, Bluetooth® (or Bluetooth® Low Energy) components, Wi-Fi® components, and other communication components.
  • Instructions 450 may comprise software, a program, an application, an applet, an app, or other executable code for causing at least any of the processors 410 to perform any one or more of the methodologies discussed herein.
  • the instructions 450 may reside, completely or partially, within at least one of the processors 410 (e.g., within the processor’s cache memory), the memory /storage devices 420, or any suitable combination thereof.
  • any portion of the instructions 450 may be transferred to the hardware resources 400 from any combination of the peripheral devices 404 or the databases 406.
  • the memory of processors 410, the memory /storage devices 420, the peripheral devices 404, and the databases 406 are examples of computer-readable and machine-readable media.
  • FIG. 5 provides a high-level view of an Open RAN (O-RAN) architecture 500.
  • the O-RAN architecture 500 includes four O-RAN defined interfaces - namely, the A1 interface, the 01 interface, the 02 interface, and the Open Fronthaul Management (M)-plane interface - which connect the Service Management and Orchestration (SMO) framework 502 to O-RAN network functions (NFs) 504 and the O-Cloud 506.
  • the SMO 502 (described in [013]) also connects with an external system 510, which provides enrighment data to the SMO 502.
  • FIG. 5 also illustrates that the A1 interface terminates at an O-RAN Non-Real Time (RT) RAN Intelligent Controller (RIC) 512 in or at the SMO 502 and at the O-RAN Near-RT RIC 514 in or at the O-RAN NFs 504.
  • the O-RAN NFs 504 can be VNFs such as VMs or containers, sitting above the O-Cloud 506 and/or Physical Network Functions (PNFs) utilizing customized hardware. All O-RAN NFs 504 are expected to support the 01 interface when interfacing the SMO framework 502.
  • the O-RAN NFs 504 connect to the NG-Core 508 via the NG interface (which is a 3GPP defined interface).
  • the Open Fronthaul M-plane interface between the SMO 502 and the O-RAN Radio Unit (O-RU) 516 supports the O-RU 516 management in the O- RAN hybrid model as specified in [016]
  • the Open Fronthaul M-plane interface is an optional interface to the SMO 502 that is included for backward compatibility purposes as per [016], and is intended for management of the O-RU 516 in hybrid mode only.
  • the management architecture of flat mode [012] and its relation to the 01 interface for the O-RU 516 is for future study.
  • the O-RU 516 termination of the 01 interface towards the SMO 502 as specified in [012]
  • Figure 6 shows an O-RAN logical architecture 600 corresponding to the O-RAN architecture 500 of Figure 5.
  • the SMO 602 corresponds to the SMO 502
  • O-Cloud 606 corresponds to the O-Cloud 506
  • the non-RT RIC 612 corresponds to the non-RT RIC 512
  • the near-RT RIC 614 corresponds to the near-RT RIC 514
  • the O-RU 616 corresponds to the O-RU 516 of Figure 6, respectively.
  • the O-RAN logical architecture 600 includes a radio portion and a management portion.
  • the management portion/side of the architectures 600 includes the SMO Framework 602 containing the non-RT RIC 612, and may include the O-Cloud 606.
  • the O-Cloud 606 is a cloud computing platform including a collection of physical infrastructure nodes to host the relevant O-RAN functions (e.g., the near-RT RIC 614, O-CU-CP 621, O-CU-UP 622, and the O-DU 615), supporting software components (e.g., OSs, VMMs, container runtime engines, ML engines, etc.), and appropriate management and orchestration functions.
  • the radio portion/side of the logical architecture 600 includes the near-RT RIC 614, the O-RAN Distributed Unit (O-DU) 615, the O-RU 616, the O-RAN Central Unit - Control Plane (O-CU-CP) 621, and the O-RAN Central Unit - User Plane (O-CU-UP) 622 functions.
  • the radio portion/side of the logical architecture 600 may also include the O-e/gNB 610.
  • the O-DU 615 is a logical node hosting RLC, MAC, and higher PHY layer entities/elements (High-PHY layers) based on a lower layer functional split.
  • the O-RU 616 is a logical node hosting lower PHY layer entities/elements (Low-PHY layer) (e.g., FFT/iFFT, PRACH extraction, etc.) and RF processing elements based on a lower layer functional split. Virtualization of O-RU 616 is FFS.
  • the O-CU-CP 621 is a logical node hosting the RRC and the control plane (CP) part of the PDCP protocol.
  • the O O-CU-UP 622 is a a logical node hosting the user plane part of the PDCP protocol and the SDAP protocol.
  • An E2 interface terminates at a plurality of E2 nodes.
  • the E2 nodes are logical nodes/entities that terminate the E2 interface.
  • the E2 nodes include the O- CU-CP 621, O-CU-UP 622, O-DU 615, or any combination of elements as defined in [015]
  • the E2 nodes include the O-e/gNB 610.
  • the E2 interface also connects the O-e/gNB 610 to the Near-RT RIC 614.
  • the protocols over E2 interface are based exclusively on Control Plane (CP) protocols.
  • CP Control Plane
  • the E2 functions are grouped into the following categories: (a) near-RT RIC 614 services (REPORT, INSERT, CONTROL and POLICY, as described in [015]); and (b) near-RT RIC 614 support functions, which include E2 Interface Management (E2 Setup, E2 Reset, Reporting of General Error Situations, etc.) and Near-RT RIC Service Update (e.g., capability exchange related to the list of E2 Node functions exposed over E2).
  • E2 Interface Management E2 Setup, E2 Reset, Reporting of General Error Situations, etc.
  • Near-RT RIC Service Update e.g., capability exchange related to the list of E2 Node functions exposed over E2.
  • FIG. 6 shows the Uu interface between a UE 601 and O-e/gNB 610 as well as between the UE 601 and O-RAN components.
  • the Uu interface is a 3GPP defined interface (see e.g., sections 5.2 and 5.3 of [007]), which includes a complete protocol stack from LI to L3 and terminates in the NG-RAN or E-UTRAN.
  • the O-e/gNB 610 is an LTE eNB [004], a 5G gNB or ng-eNB [006] that supports the E2 interface.
  • the O-e/gNB 610 may be the same or similar as other gNBs discussed previously.
  • the a UE 601 may correspond to UEs discussed previously.
  • the O-e/gNB 610 supports O-DU 615 and O-RU 616 functions with an Open Fronthaul interface between them.
  • the Open Fronthaul (OF) interface(s) is/are between O-DU 615 and O-RU 616 functions [016] [017]
  • the OF interface(s) includes the Control User Synchronization (CUS) Plane and Management (M) Plane.
  • CCS Control User Synchronization
  • M Management
  • Figures 5 and 6 also show that the O-RU 616 terminates the OF M-Plane interface towards the O-DU 615 and optionally towards the SMO 602 as specified in [016]
  • the O-RU 616 terminates the OF CUS-Plane interface towards the O-DU 615 and the SMO 602.
  • the Fl-c interface connects the O-CU-CP 621 with the O-DU 615.
  • the Fl-c interface is between the gNB-CU-CP and gNB-DU nodes [007] [OIO]
  • the Fl-c interface is adopted between the O-CU-CP 621 with the O-DU 615 functions while reusing the principles and protocol stack defined by 3 GPP and the definition of interoperability profile specifications.
  • the Fl-u interface connects the O-CU-UP 622 with the O-DU 615.
  • the Fl-u interface is between the gNB-CU-UP and gNB-DU nodes [007] [OIO]
  • the Fl-u interface is adopted between the O-CU-UP 622 with the O-DU 615 functions while reusing the principles and protocol stack defined by 3GPP and the definition of interoperability profile specifications.
  • the NG-c interface is defined by 3GPP as an interface between the gNB-CU-CP and the AMF in the 5GC [006]
  • the NG-c is also referred as the N2 interface (see [006]).
  • the NG-u interface is defined by 3GPP, as an interface between the gNB-CU-UP and the UPF in the 5GC [006]
  • the NG-u interface is referred as the N3 interface (see [006]).
  • NG- c and NG-u protocol stacks defined by 3GPP are reused and may be adapted for O-RAN purposes.
  • the X2-c interface is defined in 3GPP for transmitting control plane information between eNBs or between eNB and en-gNB in EN-DC.
  • the X2-u interface is defined in 3GPP for transmitting user plane information between eNBs or between eNB and en-gNB in EN-DC (see e.g., [005], [006]).
  • X2-c and X2-u protocol stacks defined by 3GPP are reused and may be adapted for O-RAN purposes
  • the Xn-c interface is defined in 3GPP for transmitting control plane information between gNBs, ng-eNBs, or between an ng-eNB and gNB.
  • the Xn-u interface is defined in 3GPP for transmiting user plane information between gNBs, ng-eNBs, or between ng-eNB and gNB (see e.g., [006], [008]).
  • Xn-c and Xn-u protocol stacks defined by 3GPP are reused and may be adapted for O-RAN purposes
  • the El interface is defined by 3GPP as being an interface between the gNB-CU-CP (e.g., gNB-CU-CP 3728) and gNB-CU-UP (see e.g., [007], [009]).
  • El protocol stacks defined by 3GPP are reused and adapted as being an interface between the O-CU-CP 621 and the O-CU-UP 622 functions.
  • the O-RAN Non-Real Time (RT) RAN Intelligent Controller (RIC) 612 is a logical function within the SMO framework 502, 602 that enables non-real-time control and optimization of RAN elements and resources; Al/machine learning (ML) workflow(s) including model training, inferences, and updates; and policy-based guidance of appbcations/features in the Near-RT RIC 614.
  • RT Non-Real Time
  • RIC RAN Intelligent Controller
  • the O-RAN near-RT RIC 614 is a logical function that enables near-real -time control and optimization of RAN elements and resources via fine-grained data collection and actions over the E2 interface.
  • the near-RT RIC 614 may include one or more AI/ML workflows including model training, inferences, and updates.
  • the non-RT RIC 612 can be an ML training host to host the training of one or more ML models. ML training can be performed offline using data collected from the RIC, O-DU 615 and O-RU 616.
  • non-RT RIC 612 is part of the SMO 602
  • the ML training host and/or ML model host/actor can be part of the non-RT RIC 612 and/or the near-RT RIC 614.
  • the ML training host and ML model host/actor can be part of the non-RT RIC 612 and/or the near-RT RIC 614.
  • the ML training host and ML model host/actor may be co-located as part of the non-RT RIC 612 and/or the near-RT RIC 614.
  • the non-RT RIC 612 may request or trigger ML model training in the training hosts regardless of where the model is deployed and executed.
  • ML models may be trained and not currently deployed.
  • the non-RT RIC 612 provides a query-able catalog for an ML designer/dev eloper to publish/install trained ML models (e.g., executable software components).
  • the non-RT RIC 612 may provide discovery mechanism if a particular ML model can be executed in a target ML inference host (MF), and what number and type of ML models can be executed in the MF.
  • MF target ML inference host
  • ML catalogs made disoverable by the non-RT RIC 612: a design-time catalog (e.g., residing outside the non-RT RIC 612 and hosted by some other ML platform(s)), a training/deployment-time catalog (e.g., residing inside the non-RT RIC 612), and a run-time catalog (e.g., residing inside the non-RT RIC 612).
  • the non-RT RIC 612 supports necessary capabilities for ML model inference in support of ML assisted solutions running in the non-RT RIC 612 or some other ML inference host. These capabilities enable executable software to be installed such as VMs, containers, etc.
  • the non-RT RIC 612 may also include and/or operate one or more ML engines, which are packaged software executable libraries that provide methods, routines, data types, etc., used to run ML models.
  • the non-RT RIC 612 may also implement policies to switch and activate ML model instances under different operating conditions.
  • the non-RT RIC 62 is be able to access feedback data (e.g., FM and PM statistics) over the 01 interface on ML model performance and perform necessary evaluations. If the ML model fails during runtime, an alarm can be generated as feedback to the non-RT RIC 612. How well the ML model is performing in terms of prediction accuracy or other operating statistics it produces can also be sent to the non-RT RIC 612 over 01.
  • the non-RT RIC 612 can also scale ML model instances running in a target MF over the 01 interface by observing resource utilization in MF.
  • the environment where the ML model instance is running (e.g., the MF) monitors resource utilization of the running ML model.
  • the scaling mechanism may include a scaling factor such as an number, percentage, and/or other like data used to scale up/down the number of ML instances.
  • ML model instances running in the target ML inference hosts may be automatically scaled by observing resource utilization in the MF. For example, the Kubemetes® (K8s) runtime environment typically provides an auto-scaling feature.
  • the A1 interface is between the non-RT RIC 612 (within or outside the SMO 602) and the near-RT RIC 614.
  • the A1 interface supports three types of services as defined in [014], including a Policy Management Service, an Enrichment Information Service, and ML Model Management Service.
  • A1 policies have the following characteristics compared to persistent configuration [014]: A1 policies are not critical to traffic; A1 policies have temporary validity; A1 policies may handle individual UE or dynamically defined groups of UEs; A1 policies act within and take precedence over the configuration; and A1 policies are non-persistent, e.g., do not survive a restart of the near-RT RIC. [OIO] 3 GPP TS 38.470 vl6.0.0 (2020-01-09).
  • O-RAN Alliance Working Group 2 O-RAN A1 interface: General Aspects and Principles Specification, version 1.0 (Oct 2019) (“ORAN-WG2.Al.GA&P-v01.00”).
  • O-RAN Alliance Working Group 3, Near-Real-time RAN Intelligent Controller Architecture & E2 General Aspects and Principles (‘ORAN-WG3.E2GAP.0-v0.1”).
  • O-RAN Alliance Working Group 4 O-RAN Fronthaul Management Plane Specification, version 2.0 (July 2019) (“ORAN-WG4.MP.0-v02.00.00”).
  • O-RAN Alliance Working Group 4 O-RAN Fronthaul Control, User and Synchronization Plane Specification, version 2.0 (July 2019) (“ORAN-WG4.CUS.0-v02.00”).
  • the electronic device(s), network(s), system(s), chip(s) or component(s), or portions or implementations thereof, of Figures 2-4, or some other figure herein may be configured to perform one or more processes, techniques, or methods as described herein, or portions thereof.
  • the process of Figure 7 may be performed by a gNB or a portion thereof.
  • the process may include, at 705, receiving, from a near-real time RAN intelligent controller (near-RT RIC), a subscription or request for the updated RAN UE ID information.
  • the process further includes, at 710, retrieving the updated RAN UE ID information from memory.
  • the process further includes, at 715, encoding a message for transmission to the near-RT RIC that includes the updated RAN UE ID information.
  • the process of Figure 8 may be performed by a gNB or a portion thereof.
  • the process may include, at 805, receiving, from a near-real time RAN intelligent controller (near-RT RIC), a subscription or request for the updated RAN UE ID information.
  • the process further includes, at 810, determining the updated RAN UE ID information in response to the subscription or request.
  • the process further includes, at 815, encoding a message for transmission to the near-RT RIC that includes the updated RAN UE ID information.
  • Figure 9 may be performed by a near-real time RAN intelligent controller (near-RT RIC) in some embodiments.
  • the process includes, at 905, encoding a message to a next-generation NodeB (gNB) that includes a subscription or request for updated radio access network (RAN) user equipment (UE) identification (ID) information.
  • the process further includes, at 910, receiving, over an E2 interface, a response that includes the updated RAN UE ID information.
  • gNB next-generation NodeB
  • RAN radio access network
  • UE user equipment
  • At least one of the components set forth in one or more of the preceding figures may be configured to perform one or more operations, techniques, processes, and/or methods as set forth in the example section below.
  • the baseband circuitry as described above in connection with one or more of the preceding figures may be configured to operate in accordance with one or more of the examples set forth below.
  • circuitry associated with a UE, base station, network element, etc. as described above in connection with one or more of the preceding figures may be configured to operate in accordance with one or more of the examples set forth below in the example section.
  • Example 1 may include an apparatus in O-RAN comprising:
  • RAN nodes employed as eNodeB or next generation NodeB in 5GS; or employed as a CU (centralized unit) and a DU (distributed unit) inter-connected via FI interface, for which CU may be further split into control plane (CU-CP) and user plane (CU- UP) inter-connected via El interface.
  • CU-CP control plane
  • CU- UP user plane
  • RIC near real-time RAN intelligence controller
  • Example 2 may include near-RT RIC subscribes or requests an update of a RAN UE ID (whenever (re/de)assigned) of the UEs from a RAN node over E2 interface, according to UE group/categories of interest.
  • a RAN UE ID whenever (re/de)assigned
  • Example 3 may include RAN UE ID of a UE updated to O-RAN includes node IDs of the corresponding DU and CU-UP that are serving the UE, in case of CU-DU split or CP-UP separated.
  • Example XI includes an apparatus comprising: memory to store updated radio access network (RAN) user equipment (UE) identification (ID) information; and processing circuitry, coupled with the memory, to: receive, from a near-real time RAN intelligent controller (near-RT RIC), a subscription or request for the updated RAN UE ID information; retrieve the updated RAN UE ID information from the memory; and encode a message for transmission to the near-RT RIC that includes the updated RAN UE ID information.
  • RAN radio access network
  • UE user equipment
  • ID information
  • processing circuitry coupled with the memory, to: receive, from a near-real time RAN intelligent controller (near-RT RIC), a subscription or request for the updated RAN UE ID information; retrieve the updated RAN UE ID information from the memory; and encode a message for transmission to the near-RT RIC that includes the updated RAN UE ID information.
  • near-RT RIC near-real time RAN intelligent controller
  • Example X2 includes the apparatus of example XI or some other example herein, wherein the updated RAN UE ID information is represented by an octet string.
  • Example X3 includes the apparatus of example X2 or some other example herein, wherein the octet string has a size of eight characters.
  • Example X4 includes the apparatus of any of examples XI -X3, wherein the message is encoded for transmission via an E2 interface.
  • Example X5 includes the apparatus of any of examples XI -X4, wherein the subscription or request is received via an E2 interface.
  • Example X6 includes the apparatus of any of examples XI -X5, wherein the apparatus comprises a next-generation NodeB (gNB) implementing a control unit-control plane (CU- CP).
  • gNB next-generation NodeB
  • CU- CP control unit-control plane
  • Example X7 includes the apparatus of example X6, wherein the gNB further implements a distributed unit (DU) and a control unit-user plane (CU-UP).
  • DU distributed unit
  • CU-UP control unit-user plane
  • Example X8 includes one or more computer-readable media storing instructions that, when executed by one or more processors, cause a next-generation NodeB (gNB) to: receive, from a near-real time RAN intelligent controller (near-RT RIC), a subscription or request for updated radio access network (RAN) user equipment (UE) identification (ID) information; determine the updated RAN UE ID information in response to the subscription or request; and encode a message for transmission to the near-RT RIC that includes the updated RAN UE ID information.
  • gNB next-generation NodeB
  • Example X9 includes the one or more computer-readable media of example X8 or some other example herein, wherein the updated RAN UE ID information is represented by an octet string.
  • Example XI 0 includes the one or more computer-readable media of example X9 or some other example herein, wherein the octet string has a size of eight characters.
  • Example XI 1 includes the one or more computer-readable media of any of examples X8-X10, wherein the message is encoded for transmission via an E2 interface.
  • Example XI 2 includes the one or more computer-readable media of any of examples X8-X11, wherein the subscription or request is received via an E2 interface.
  • Example XI 3 includes the one or more computer-readable media of any of examples X8-X12, wherein the gNB implements a control unit-control plane (CU-CP).
  • CU-CP control unit-control plane
  • Example XI 4 includes the one or more computer-readable media of XI 3 or some other example herein, wherein the gNB further implements a distributed unit (DU) and a control unit-user plane (CU-UP).
  • DU distributed unit
  • CU-UP control unit-user plane
  • Example XI 5 includes one or more computer-readable media storing instructions that, when executed by one or more processors, cause a near-real time RAN intelligent controller (near-RT RIC) to: encode a message to a next-generation NodeB (gNB) that includes a subscription or request for updated radio access network (RAN) user equipment (UE) identification (ID) information; and receive, over an E2 interface, a response that includes the updated RAN UE ID information.
  • gNB next-generation NodeB
  • UE user equipment
  • ID updated radio access network
  • Example XI 6 includes the one or more computer-readable media of example XI 5 or some other example herein, wherein the updated RAN UE ID information is represented by an octet string.
  • Example XI 7 includes the one or more computer-readable media of example XI 6 or some other example herein, wherein the octet string has a size of eight characters.
  • Example XI 8 includes the one or more computer-readable media of any of examples X15-X17, wherein the message is encoded for transmission via an E2 interface.
  • Example XI 9 includes the one or more computer-readable media of any of examples X15-X18, wherein the message is directed to a control unit-control plane (CU-CP) implemented by the gNB.
  • CU-CP control unit-control plane
  • Example Z01 may include an apparatus comprising means to perform one or more elements of a method described in or related to any of examples 1-X19, or any other method or process described herein.
  • Example Z02 may include one or more non-transitory computer-readable media comprising instructions to cause an electronic device, upon execution of the instructions by one or more processors of the electronic device, to perform one or more elements of a method described in or related to any of examples 1- XI 9, or any other method or process described herein.
  • Example Z03 may include an apparatus comprising logic, modules, or circuitry to perform one or more elements of a method described in or related to any of examples 1- XI 9, or any other method or process described herein.
  • Example Z04 may include a method, technique, or process as described in or related to any of examples 1- XI 9, or portions or parts thereof.
  • Example Z05 may include an apparatus comprising: one or more processors and one or more computer-readable media comprising instructions that, when executed by the one or more processors, cause the one or more processors to perform the method, techniques, or process as described in or related to any of examples 1- XI 9, or portions thereof.
  • Example Z06 may include a signal as described in or related to any of examples 1- XI 9, or portions or parts thereof.
  • Example Z07 may include a datagram, packet, frame, segment, protocol data unit (PDU), or message as described in or related to any of examples 1- XI 9, or portions or parts thereof, or otherwise described in the present disclosure.
  • PDU protocol data unit
  • Example Z08 may include a signal encoded with data as described in or related to any of examples 1- XI 9, or portions or parts thereof, or otherwise described in the present disclosure.
  • Example Z09 may include a signal encoded with a datagram, packet, frame, segment, protocol data unit (PDU), or message as described in or related to any of examples 1- XI 9, or portions or parts thereof, or otherwise described in the present disclosure.
  • PDU protocol data unit
  • Example Z10 may include an electromagnetic signal carrying computer-readable instructions, wherein execution of the computer-readable instructions by one or more processors is to cause the one or more processors to perform the method, techniques, or process as described in or related to any of examples 1- XI 9, or portions thereof.
  • Example Zll may include a computer program comprising instructions, wherein execution of the program by a processing element is to cause the processing element to carry out the method, techniques, or process as described in or related to any of examples 1- XI 9, or portions thereof.
  • Example Z12 may include a signal in a wireless network as shown and described herein.
  • Example Z13 may include a method of communicating in a wireless network as shown and described herein.
  • Example Z14 may include a system for providing wireless communication as shown and described herein.
  • Example Z15 may include a device for providing wireless communication as shown and described herein.
  • Access Point Report Cl Cell Identity API Application 60 BW Bandwidth CID Cell-ID (e g., Programming Interface BWP Bandwidth Part 95 positioning method)
  • BW Bandwidth CID Cell-ID e g., Programming Interface BWP Bandwidth Part 95 positioning method
  • Connection Point 50 Information DL Downlink CPD Connection Point CSI-IM CSI 85 DMTF Distributed Descriptor Interference Management Task Force
  • E2E End-to-End Connectivity interface ECCA extended clear EPC Evolved Packet 75 Fl-U FI User plane channel Core interface assessment, EPDCCH enhanced FACCH Fast extended CCA 45 PDCCH, enhanced Associated Control ECCE Enhanced Control Physical CHannel Channel Element, Downlink Control 80 FACCH/F Fast
  • GSM System 85 Channel/Half rate Evolution EREG enhanced REG, FACH Forward Access
  • E-UTRA Evolved FDD Frequency eMBB Enhanced Mobile UTRA 100 Division Duplex Broadband FDM Frequency 35 Sputnikovaya GUTI Globally Unique Division Multiplex Septa (Engl.: Temporary UE
  • GSM EDGE 60 GTP-U GPRS Tunnelling Server RAN, GSM EDGE Protocol for User HSUPA High Radio Access Plane 95 Speed Uplink Packet Network GTS Go To Sleep Access
  • GGSN Gateway GPRS Signal (related to HTTP Hyper Text Support Node 65 WUS) Transfer Protocol
  • LI Layer 1 physical LWA LTE-WLAN Broadcast multicast layer
  • aggregation 70 service Single Frequency
  • Ll-RSRP Layer 1 LWIP LTE/WLAN Network reference signal Radio Level Integration MCC Mobile Country received power 40 with IPsec Tunnel Code L2 Layer 2 (data link LTE Long Term MCG Master Cell Group layer) Evolution 75 MCOT Maximum
  • MSC Mobile Switching NCT Network NMIB, N-MIB Centre Connectivity Topology Narrowband MIB NPBCH 35 NS Network Service OSI Other System
  • Narrowband Narrowband WUS PCI Physical Cell ID Physical Uplink NZP Non-Zero Power Physical Cell
  • PDCP Packet Data PP PTP Point-to- PSCell Primary SCell Convergence Protocol Point PSS Primary PDN Packet Data 40 PPP Point-to-Point Synchronization Network, Public Protocol Signal
  • PDU Protocol Data PRG Physical resource PTT Push-to-Talk Unit block group 80 PUCCH Physical
  • PNF Physical Network 65 PSFCH Physical QZSS Quasi-Zenith Function Sidelink Feedback Satellite System
  • PNFD Physical Network Channel 100 RA-RNTI Random Function Descriptor Access RNTI RAB Radio Access RLC Radio Link RRM Radio Resource Bearer, Random Control, Radio Management
  • Radio Link Control Radio Station Identifier
  • Resource Control SA Standalone layer 100 operation mode SAE System 35 SDP Session SiP System in Architecture Evolution Description Protocol 70 Package SAP Service Access SDSF Structured Data SL Sidelink Point Storage Function SLA Service Level
  • SAPD Service Access SDU Service Data Unit Agreement Point Descriptor 40 SEAF Security Anchor SM Session SAPI Service Access Function 75 Management Point Identifier SeNB secondary eNB SMF Session SCC Secondary SEPP Security Edge Management Function Component Carrier, Protection Proxy SMS Short Message Secondary CC 45 SFI Slot format Service SCell Secondary Cell indication 80 SMSF SMS Function SC-FDMA Single SFTD Space-Frequency SMTC SSB-based Carrier Frequency Time Diversity, SFN Measurement Timing
  • SCM Security Context Single Frequency SON Self-Organizing Management Network Network SCS Subcarrier 55 SgNB Secondary gNB SpCell Special Cell Spacing SGSN Serving GPRS 90 SP-CSI-RNTISemi-
  • SDNF Structured Data Identity Module 100 Reference Signal Storage Network SIP Session Initiated SS Synchronization Function Protocol Signal SSB SS Block TA Timing Advance, TPC Transmit Power SSBRI SSB Resource 35 Tracking Area Control Indicator TAC Tracking Area 70 TP MI Transmitted
  • Synchronization 40 TAU Tracking Area TRP, TRxP Signal based Reference Update 75 Transmission Signal Received TB Transport Block Reception Point Power TBS Transport Block TRS Tracking SS-RSRQ Size Reference Signal
  • Synchronization 45 TBD To Be Defined TRx Transceiver Signal based Reference TCI Transmission 80 TS Technical Signal Received Configuration Indicator Specifications, Quality TCP Transmission Technical SS-SINR Communication Standard
  • UDSF Unstructured Data UTRAN Universal 70 Public Land Mobile Storage Network Terrestrial Radio Network Function 40 Access Network VPN Virtual Private UICC Universal UwPTS Uplink Network Integrated Circuit Pilot Time Slot VRB Virtual Resource Card V2I Vehicle-to- 75 Block
  • circuitry refers to, is part of, or includes hardware components such as an electronic circuit, a logic circuit, a processor (shared, dedicated, or group) and/or memory (shared, dedicated, or group), an Application Specific Integrated Circuit (ASIC), a field-programmable device (FPD) (e.g., a field-programmable gate array (FPGA), a programmable logic device (PLD), a complex PLD (CPLD), a high-capacity PLD (HCPLD), a structured ASIC, or a programmable SoC), digital signal processors (DSPs), etc., that are configured to provide the described functionality.
  • FPD field-programmable device
  • FPGA field-programmable gate array
  • PLD programmable logic device
  • CPLD complex PLD
  • HPLD high-capacity PLD
  • DSPs digital signal processors
  • the circuitry may execute one or more software or firmware programs to provide at least some of the described functionality.
  • the term “circuitry” may also refer to a combination of one or more hardware elements (or a combination of circuits used in an electrical or electronic system) with the program code used to carry out the functionality of that program code. In these embodiments, the combination of hardware elements and program code may be referred to as a particular type of circuitry.
  • processor circuitry refers to, is part of, or includes circuitry capable of sequentially and automatically carrying out a sequence of arithmetic or logical operations, or recording, storing, and/or transferring digital data.
  • Processing circuitry may include one or more processing cores to execute instructions and one or more memory structures to store program and data information.
  • processor circuitry may refer to one or more application processors, one or more baseband processors, a physical central processing unit (CPU), a single-core processor, a dual-core processor, a triple-core processor, a quad-core processor, and/or any other device capable of executing or otherwise operating computer-executable instructions, such as program code, software modules, and/or functional processes.
  • Processing circuitry may include more hardware accelerators, which may be microprocessors, programmable processing devices, or the like.
  • the one or more hardware accelerators may include, for example, computer vision (CV) and/or deep learning (DL) accelerators.
  • CV computer vision
  • DL deep learning
  • application circuitry and/or “baseband circuitry” may be considered synonymous to, and may be referred to as, “processor circuitry.”
  • interface circuitry refers to, is part of, or includes circuitry that enables the exchange of information between two or more components or devices.
  • interface circuitry may refer to one or more hardware interfaces, for example, buses, I/O interfaces, peripheral component interfaces, network interface cards, and/or the like.
  • user equipment refers to a device with radio communication capabilities and may describe a remote user of network resources in a communications network.
  • the term “user equipment” or “UE” may be considered synonymous to, and may be referred to as, client, mobile, mobile device, mobile terminal, user terminal, mobile unit, mobile station, mobile user, subscriber, user, remote station, access agent, user agent, receiver, radio equipment, reconfigurable radio equipment, reconfigurable mobile device, etc.
  • the term “user equipment” or “UE” may include any type of wireless/wired device or any computing device including a wireless communications interface.
  • network element refers to physical or virtualized equipment and/or infrastructure used to provide wired or wireless communication network services.
  • network element may be considered synonymous to and/or referred to as a networked computer, networking hardware, network equipment, network node, router, switch, hub, bridge, radio network controller, RAN device, RAN node, gateway, server, virtualized VNF, NFVI, and/or the like.
  • computer system refers to any type interconnected electronic devices, computer devices, or components thereof. Additionally, the term “computer system” and/or “system” may refer to various components of a computer that are communicatively coupled with one another. Furthermore, the term “computer system” and/or “system” may refer to multiple computer devices and/or multiple computing systems that are communicatively coupled with one another and configured to share computing and/or networking resources.
  • appliance refers to a computer device or computer system with program code (e.g., software or firmware) that is specifically designed to provide a specific computing resource.
  • program code e.g., software or firmware
  • a “virtual appliance” is a virtual machine image to be implemented by a hypervisor-equipped device that virtualizes or emulates a computer appliance or otherwise is dedicated to provide a specific computing resource.
  • resource refers to a physical or virtual device, a physical or virtual component within a computing environment, and/or a physical or virtual component within a particular device, such as computer devices, mechanical devices, memory space, processor/CPU time, processor/CPU usage, processor and accelerator loads, hardware time or usage, electrical power, input/output operations, ports or network sockets, channel/link allocation, throughput, memory usage, storage, network, database and applications, workload units, and/or the like.
  • a “hardware resource” may refer to compute, storage, and/or network resources provided by physical hardware element(s).
  • a “virtualized resource” may refer to compute, storage, and/or network resources provided by virtualization infrastructure to an application, device, system, etc.
  • network resource or “communication resource” may refer to resources that are accessible by computer devices/systems via a communications network.
  • system resources may refer to any kind of shared entities to provide services, and may include computing and/or network resources. System resources may be considered as a set of coherent functions, network data objects or services, accessible through a server where such system resources reside on a single host or multiple hosts and are clearly identifiable.
  • channel refers to any transmission medium, either tangible or intangible, which is used to communicate data or a data stream.
  • channel may be synonymous with and/or equivalent to “communications channel,” “data communications channel,” “transmission channel,” “data transmission channel,” “access channel,” “data access channel,” “link,” “data link,” “carrier,” “radiofrequency carrier,” and/or any other like term denoting a pathway or medium through which data is communicated.
  • link refers to a connection between two devices through a RAT for the purpose of transmitting and receiving information.
  • instantiate refers to the creation of an instance.
  • An “instance” also refers to a concrete occurrence of an object, which may occur, for example, during execution of program code.
  • Coupled may mean two or more elements are in direct physical or electrical contact with one another, may mean that two or more elements indirectly contact each other but still cooperate or interact with each other, and/or may mean that one or more other elements are coupled or connected between the elements that are said to be coupled with each other.
  • directly coupled may mean that two or more elements are in direct contact with one another.
  • communicatively coupled may mean that two or more elements may be in contact with one another by a means of communication including through a wire or other interconnect connection, through a wireless communication channel or link, and/or the like.
  • information element refers to a structural element containing one or more fields.
  • field refers to individual contents of an information element, or a data element that contains content.
  • SMTC refers to an SSB-based measurement timing configuration configured by SSB-MeasurementTimingConfiguration.
  • SSB refers to an SS/PBCH block.
  • a “Primary Cell” refers to the MCG cell, operating on the primary frequency, in which the UE either performs the initial connection establishment procedure or initiates the connection re-establishment procedure.
  • Primary SCG Cell refers to the SCG cell in which the UE performs random access when performing the Reconfiguration with Sync procedure for DC operation.
  • Secondary Cell refers to a cell providing additional radio resources on top of a Special Cell for a UE configured with CA.
  • Secondary Cell Group refers to the subset of serving cells comprising the PSCell and zero or more secondary cells for a UE configured with DC.
  • the term “Serving Cell” refers to the primary cell for a UE in RRC CONNECTED not configured with CA/DC there is only one serving cell comprising of the primary cell.
  • serving cell refers to the set of cells comprising the Special Cell(s) and all secondary cells for a UE in RRC_CONNECTED configured with CA/.
  • Special Cell refers to the PCell of the MCG or the PSCell of the SCG for DC operation; otherwise, the term “Special Cell” refers to the Pcell.
  • AI/ML application may refer to a complete and deployable package, environment to achieve a certain function in an operational environment.
  • AI/ML application or the like may be an application that contains some AI/ML models and application-level descriptions.
  • machine learning refers to the use of computer systems implementing algorithms and/or statistical models to perform specific task(s) without using explicit instructions, but instead relying on patterns and inferences.
  • ML algorithms build or estimate mathematical model(s) (referred to as “ML models” or the like) based on sample data (referred to as “training data,” “model training information,” or the like) in order to make predictions or decisions without being explicitly programmed to perform such tasks.
  • training data referred to as “training data,” “model training information,” or the like
  • an ML algorithm is a computer program that learns from experience with respect to some task and some performance measure, and an ML model may be any object or data structure created after an ML algorithm is trained with one or more training datasets. After training, an ML model may be used to make predictions on new datasets.
  • ML algorithm refers to different concepts than the term “ML model,” these terms as discussed herein may be used interchangeably for the purposes of the present disclosure.
  • machine learning model may also refer to ML methods and concepts used by an ML-assisted solution.
  • An “ML-assisted solution” is a solution that addresses a specific use case using ML algorithms during operation.
  • ML models include supervised learning (e.g., linear regression, k-nearest neighbor (KNN), descision tree algorithms, support machine vectors, Bayesian algorithm, ensemble algorithms, etc.) unsupervised learning (e.g., K-means clustering, principle component analysis (PC A), etc.), reinforcement learning (e.g., Q-leaming, multi-armed bandit learning, deep RL, etc.), neural networks, and the like.
  • An “ML pipeline” is a set of functionalities, functions, or functional entities specific for an ML-assisted solution; an ML pipeline may include one or several data sources in a data pipeline, a model training pipeline, a model evaluation pipeline, and an actor.
  • the “actor” is an entity that hosts an ML assisted solution using the output of the ML model inference).
  • ML training host refers to an entity, such as a network function, that hosts the training of the model.
  • ML inference host refers to an entity, such as a network function, that hosts model during inference mode (which includes both the model execution as well as any online learning if applicable).
  • the ML-host informs the actor about the output of the ML algorithm, and the actor takes a decision for an action (an “action” is performed by an actor as a result of the output of an ML assisted solution).
  • model inference information refers to information used as an input to the ML model for determining inference(s); the data used to train an ML model and the data used to determine inferences may overlap, however, “training data” and “inference data” refer to different concepts.

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

This invention related to an apparatus comprising memory to store updated radio access network (RAN) user equipment (UE) identification (ID) information, and processing circuitry, coupled with the memory, to: receive, from a near-real time RAN intelligent controller (near-RT RIC), a subscription or request for the updated RAN UE ID information; retrieve the updated RAN UE ID information from the memory; and encode a message for transmission to the near-RT RIC that includes the updated RAN UE ID information.

Description

ENHANCING RAN UE ID BASED UE IDENTIFICATION IN O-RAN
CROSS REFERENCE TO RELATED APPLICATION
The present application claims priority to U.S. Provisional Patent Application No. 63/036,882, which was filed June 9, 2020.
FIELD
Various embodiments generally may relate to the field of wireless communications.
BACKGROUND
The Open RAN (O-RAN) architecture currently being developed aims to optimize overall system performance and improve user experiences in 3GPP networks. As illustrated in Figure 1 below, two RAN intelligence controllers (RIC) - non real-time (non-RT) and near real-time (Near-RT), were introduced to provide optimized controls over RAN nodes, based on artificial intelligence (AI) and machine learning (ML).
In order to improve experience of a UE, it is important that a UE of interest is identified, while connected to the 3GPP network, across SMO / non-RT RIC and Near-RT RIC, and also across 01, Al, and E2 interfaces.
Among many UE identifiers within 3GPP network, it was proposed to use a RAN UE ID (defined in TS 38.473, v. 16.1.0, 2020-03-31; and TS 38.463, v. 16.1.1, 2020-03-31) as a common identifier over 01, Al, and E2 interfaces. Currently, Al policy (from Non-RT RIC to Near-RT RIC) for a UE is specified to be identified by the RAN UE ID. Based on that, it was proposed to fill the gap, by making RAN nodes update the RAN UE ID of a UE to SMO via 01 and to Near-RT RIC via E2, whenever assigned (or re-assigned) or de-assigned.
While this framework works for the purpose of UE identification, we see some inefficiencies observed that can be further optimized. Among other things, embodiments of the present disclosure may be directed to enhancements for this RAN UE ID based UE identification in existing O-RAN systems.
BRIEF DESCRIPTION OF THE DRAWINGS
Embodiments will be readily understood by the following detailed description in conjunction with the accompanying drawings. To facilitate this description, like reference numerals designate like structural elements. Embodiments are illustrated by way of example and not by way of limitation in the figures of the accompanying drawings.
Figure 1 illustrates an example of an O-RAN architecture in accordance with various embodiments.
Figure 2 illustrates a network in accordance with various embodiments. Figure 3 schematically illustrates a wireless network in accordance with various embodiments.
Figure 4 is a block diagram illustrating components, according to some example embodiments, able to read instructions from a machine-readable or computer-readable medium (e.g., a non-transitory machine-readable storage medium) and perform any one or more of the methodologies discussed herein.
Figure 5 illustrates an example of a high-level view of an Open RAN (O-RAN) architecture in accordance with various embodiments.
Figure 6 illustrates an example of an O-RAN logical architecture corresponding to the O-RAN architecture of Figure 5.
Figure 7 depicts an example procedure for practicing the various embodiments discussed herein.
Figure 8 depicts another example procedure for practicing the various embodiments.
Figure 9 depicts another example procedure for practicing the various embodiments.
DETAILED DESCRIPTION
The following detailed description refers to the accompanying drawings. The same reference numbers may be used in different drawings to identify the same or similar elements. In the following description, for purposes of explanation and not limitation, specific details are set forth such as particular structures, architectures, interfaces, techniques, etc. in order to provide a thorough understanding of the various aspects of various embodiments. However, it will be apparent to those skilled in the art having the benefit of the present disclosure that the various aspects of the various embodiments may be practiced in other examples that depart from these specific details. In certain instances, descriptions of well-known devices, circuits, and methods are omitted so as not to obscure the description of the various embodiments with unnecessary detail. For the purposes of the present document, the phrases “A or B” and “A/B” mean (A), (B), or (A and B).
1. Subscription based UE observability from RAN nodes to Near-RT RIC: A UE observability based on RAN UE ID (whenever (re/de)assigned) is currently proposed via 01 to SMO and via E2 to Near-RT RIC. While the observability over 01 is baseline, for e.g. - a performance monitoring (PM) perspective, not every UE currently served by a RAN node is always the subject of an optimization or RAN intent that the operator wants to achieve. It would not be desirable for Near-RT RIC to maintain, for every single RAN node, UE contexts of all the UEs and their RAN UE IDs connected to it. In fact, based on xApps or A1 polices, only a subset of UEs may be subject to. Therefore, there should be some mechanisms for Near-RT RIC to subscribe or request an update of a RAN UE ID (whenever (re/de)as signed) based on UE group/categories of interest over E2 interface.
2. RAN UE ID update together with gNB-DU ID and gNB-CU-UP ID: When a UE accesses a gNB, especially in case of CU-DU split or CP-UP separated, a RAN UE ID is assigned by the gNB-CU-CP and shared with gNB-DU and gNB-CU-UP when the UE context is created. Currently, it is assumed that a RAN UE ID is updated from gNB-CU- CP, however, providing this ID alone lacks observability of which gNB-DU and which gNB-CU-UP are serving the same UE in case of CU-DU split or CP-UP separated. One may argue that a Near-RT RIC can know if all those entities (gNB-CU-CP, gNB-CU-UP, gNB-DU) updates the same RAN UE ID to the Near-RT RIC, but given that the same value is always shared between those entities while the UE is in connected, it would be more efficient if the gNB-CU-CP takes charge of the RAN UE ID update, together with the corresponding gNB-DU UE ID and gNB-CU-UP UE ID that may be changed during intra- gNB mobility. The present disclosure proceeds by describing embodiments to enhance the RAN UE
ID based UE identification method proposed for existing O-RAN systems.
Embodiment 1: Subscription based UE observability from RAN nodes to Near-RT RIC
Some examples of implementations for O-RAN E2 interface SM (Service Model) specifications are as follows:
///////////////some operations skipped//////////////////////
7.3 Event trigger definition styles
7.3.1 RIC Event trigger definition IE style list
Figure imgf000005_0001
Figure imgf000006_0001
7.3.2 RIC Event trigger definition IE style 1: Interface Message Event
This RIC Event Trigger Definition IE style 1 is used to detect a specific interface message event in E2 Node RAN Function based on specified target Network Interface Type, Network Interface Identifier, Network Interface Direction, Network Interface Message Type, Message Protocol IE Identifier, Message Protocol IE Test Condition and Message Protocol IE Test Value.
This RIC Event Trigger Definition IE style 1 uses RIC Event Trigger Definition IE Format 1 (8.2.1.1.1) 7.3.3 RIC Event trigger definition IE style 2: RAN UE Group Event
This RIC Event Trigger Definition IE style 2 is used to detect a specific group of UEs that are currently being served by the E2 nodes based on the configured RAN UE group conditions.
This RIC Event Trigger Definition IE style uses RIC Event Trigger Definition IE Format 2 (8.2.1.1.2)
7.4 Supported RIC REPORT Service styles 7.4.1 REPORT Service style list
Figure imgf000006_0002
7.4.2 REPORT Service Style 1: Complete message 7.4.2.1 REPORT Service Style description
This REPORT Service style provides a copy of a complete network interface message with the network interface specific encoded message carried as a transparent container with an associated header providing information on the target Network Interface Type, Network Interface Identifier, Network Interface Direction and optional Network Interface Timestamp. The addition of optional information time stamp in the Indication Header is controlled using the associated RIC Action Parameter
7.4.2.2 REPORT Service RIC Action Definition IE contents
This REPORT Service style uses the following RAN parameters with RIC Action Definition IE Format 1 (8.2.1.2.1) where AddTimestamp is used to request the inclusion of optional Network Interface Timestamp information in RIC Indication header IE:
Figure imgf000007_0001
7.4.2.3 REPORT Service RIC Indication header IE contents
REPORT Service RIC Indication Header IE contains the Network Interface Type, Network Interface Identifier, Network Interface Direction and optional Network Interface Timestamp.
This REPORT Service style uses RIC Indication header IE Format 1 (8.2.1.3.1)
7.4.2.4 REPORT Service RIC Indication message IE contents
REPORT Service RIC Indication message IE contains contains a transparent container used to carry the complete message with contents defined by the specific network interface specification.
This REPORT Service style uses RIC Indication message IE Format 1 (8.2.1.4.1) 7.4.3 REPORT Service Style 2: Partial message
7.4.3.1 REPORT Service Style description This REPORT Service style provides a copy of a specific information element extracted from a network interface message with the network interface specific encoded message carried as a transparent container associated with an indication header providing information on the target Network Interface Type, Network Interface Identifier, Network Interface Direction, Network Interface Message Type and optional Network Interface Timestamp. The addition of optional Network Interface Timestamp in the Indication Header and the rules for extracting the part of the message are controlled using the associated RIC Action Parameter
7.4.3.2 REPORT Service RIC Action Definition IE contents This REPORT Service style uses the following RAN parameters with RIC Action Definition IE Format 1 (8.2.1.2.1) where AddTimestamp is used to request the inclusion of optional Timestamp information in RIC Indication header IE and Target Protocol IE Identifier is used to specify the required IE to be copied from the message.
Figure imgf000008_0001
7.4.3.3 REPORT Service RIC Indication header IE contents
REPORT Service RIC Indication Header IE contains the Network Interface Type, Network Interface Identifier, Network Interface Direction and optional Network Interface Timestamp.
This REPORT Service style uses RIC Indication header IE Format 1 (8.2.1.3.1)
7.4.3.4 REPORT Service RIC Indication message IE contents
REPORT Service RIC Indication message IE contains a transparent container used to carry the extracted part of the message with contents defined by the specific network interface specification.
This REPORT Service style uses RIC Indication message IE Format 1 (8.2.1.4.1)
7.4.4 REPORT Service Style 3: RAN UE ID
7.4.4.1 REPORT Service Style description
This REPORT Service style provides RAN UE IDs of specific UEs currently served by the E2 node that match the configured RAN UE group conditions.
7.4.3.2 REPORT Service RIC Indication message IE contents
REPORT Service RIC Indication message IE contains a list of RAN UE IDs of the UEs that are currently being served by the E2 node, per each RAN UE group requested. This REPORT Service style uses RIC Indication message IE Format 1 (8.2.1.4.2) ////////////////////////some operations skipped//////////////////////////
7.8 Supported RIC Service Styles and E2SM IE Formats
Table 7.8-1 and 7.8-2 provide a summary of the E2SM IE Formats defined to support the set of RIC Event Triggers and RIC Service Styles defined in this E2SM specification.
Table 7.8-1: Summary of the E2SM IE encoding Formats defined to support the set of
RIC Event Trigger styles
Figure imgf000009_0001
Table 7.8-1: Summary of the E2SM IE encoding Formats defined to support the set of
RIC Service Styles
Figure imgf000009_0002
Figure imgf000010_0001
//////////////////////some operations skipped///////////////////////////
8.2 Message Functional Definition and Content
8.2.1 Messages for RIC Functional procedures ////////////////////////some operations skipped/////////////////////////////
8.2.1.1 RIC Event Trigger Definition IE
This information element is part of the RIC SUBSCRIPTION REQUEST message sent by the Near-RT RIC to a E2 Node and is required for event triggers used to initiate REPORT, INSERT and POLICY actions. Direction: Near-RT RIC — » E2 Node.
Figure imgf000010_0002
8.2.1.1.1 E2SM-NI Event Trigger Definition Format 1
This RIC Event Trigger Definition style allows to select a specific target using: Network Interface Type IE used to select a specific interface type,
Network Interface Identifier used to select a specific interface instance, Network Interface Direction used to select a specific interface direction (incoming or outgoing),
Network Interface Message Type used to select a specific message on the interface, Message Protocol IE Identifier used to select a specific protocol element in the selected message,
Message Protocol IE Test Condition and Message Protocol IE Test Value are used to test if the selected protocol element meets a specific test condition where the trigger condition applies when and only if all of the test conditions are TRUE (e.g., logical ADD of each test condition).
Figure imgf000011_0001
Figure imgf000011_0002
Figure imgf000012_0004
8.2.1.1.2 E2SM-NI Event Trigger Definition Format 2
The E2SM-NI Event Trigger Definition IE Format 2 supports a REPORT encoded as a list of RAN UE Groups, each with a group identifier, group definition described in terms of a list of RAN parameters with test conditions, in order to retrieve the RAN UE IDs of the UEs that are currently served by the E2 node which match the test conditions configured per each group.
Figure imgf000012_0001
Figure imgf000012_0002
///////////////////////some operations skipped////////////////////////
8.2.1.4 RIC Indication Message IE
This information element is part of the RIC INDICATION message sent by the E2 Node to a Near-RT RIC node and is required for REPORT and INSERT actions.
Direction: E2 Node — » Near-RT RIC.
Figure imgf000012_0003
Figure imgf000013_0004
8.2.1.4.1 E2SM-NI Indication Message Format 1
Content is encoded as per definition of network interface type indicated in the Network Interface Type IE in associated RIC Indication Header IE.
Figure imgf000013_0001
8.2.1.4.2 E2SM-NI Indication Message Format 2
Content is encoded as a list of RAN UE IDs of the UEs that are currently being served by the E2 node, per each RAN UE group requested.
Figure imgf000013_0002
Figure imgf000013_0003
Embodiment 2: RAN UE ID update together with gNB-DU ID and gNB-CU-UP ID
Some examples of implementations for O-RAN E2 interface AP (Application Protocol) specification are as follows:
9.2.XXRAN UE ID
This information element indicates the RAN UE ID assigned by the gNB(-CU-CP) for a UE and optionally the ID(s) of an associated gNB-DU and/or gNB-CU-UP that the corresponding UE contexts are established.
Figure imgf000014_0001
SYSTEMS AND IMPLEMENTATIONS
Figures 2-3 illustrate various systems, devices, and components that may implement aspects of disclosed embodiments.
Figure 2 illustrates a network 200 in accordance with various embodiments. The network 200 may operate in a manner consistent with 3GPP technical specifications for LTE or 5G/NR systems. However, the example embodiments are not limited in this regard and the described embodiments may apply to other networks that benefit from the principles described herein, such as future 3GPP systems, or the like.
The network 200 may include a UE 202, which may include any mobile or non-mobile computing device designed to communicate with a RAN 204 via an over-the-air connection. The UE 202 may be communicatively coupled with the RAN 204 by a Uu interface. The UE 202 may be, but is not limited to, a smartphone, tablet computer, wearable computer device, desktop computer, laptop computer, in-vehicle infotainment, in-car entertainment device, instrument cluster, head-up display device, onboard diagnostic device, dashtop mobile equipment, mobile data terminal, electronic engine management system, electronic/engine control unit, electronic/engine control module, embedded system, sensor, microcontroller, control module, engine management system, networked appliance, machine-type communication device, M2M or D2D device, IoT device, etc.
In some embodiments, the network 200 may include a plurality of UEs coupled directly with one another via a sidelink interface. The UEs may be M2M/D2D devices that communicate using physical sidelink channels such as, but not limited to, PSBCH, PSDCH, PSSCH, PSCCH, PSFCH, etc.
In some embodiments, the UE 202 may additionally communicate with an AP 206 via an over-the-air connection. The AP 206 may manage a WLAN connection, which may serve to offload some/all network traffic from the RAN 204. The connection between the UE 202 and the AP 206 may be consistent with any IEEE 802.11 protocol, wherein the AP 206 could be a wireless fidelity (Wi-Fi®) router. In some embodiments, the UE 202, RAN 204, and AP 206 may utilize cellular-WLAN aggregation (for example, LWA/LWIP). Cellular-WLAN aggregation may involve the UE 202 being configured by the RAN 204 to utilize both cellular radio resources and WLAN resources.
The RAN 204 may include one or more access nodes, for example, AN 208. AN 208 may terminate air-interface protocols for the UE 202 by providing access stratum protocols including RRC, PDCP, RLC, MAC, and LI protocols. In this manner, the AN 208 may enable data/voice connectivity between CN 220 and the UE 202. In some embodiments, the AN 208 may be implemented in a discrete device or as one or more software entities running on server computers as part of, for example, a virtual network, which may be referred to as a CRAN or virtual baseband unit pool. The AN 208 be referred to as a BS, gNB, RAN node, eNB, ng-eNB, NodeB, RSU, TRxP, TRP, etc. The AN 208 may be a macrocell base station or a low power base station for providing femtocells, picocells or other like cells having smaller coverage areas, smaller user capacity, or higher bandwidth compared to macrocells.
In embodiments in which the RAN 204 includes a plurality of ANs, they may be coupled with one another via an X2 interface (if the RAN 204 is an LTE RAN) or an Xn interface (if the RAN 204 is a 5G RAN). The X2/Xn interfaces, which may be separated into control/user plane interfaces in some embodiments, may allow the ANs to communicate information related to handovers, data/context transfers, mobility, load management, interference coordination, etc.
The ANs of the RAN 204 may each manage one or more cells, cell groups, component carriers, etc. to provide the UE 202 with an air interface for network access. The UE 202 may be simultaneously connected with a plurality of cells provided by the same or different ANs of the RAN 204. For example, the UE 202 and RAN 204 may use carrier aggregation to allow the UE 202 to connect with a plurality of component carriers, each corresponding to a Pcell or Scell. In dual connectivity scenarios, a first AN may be a master node that provides an MCG and a second AN may be secondary node that provides an SCG. The first/second ANs may be any combination of eNB, gNB, ng-eNB, etc.
The RAN 204 may provide the air interface over a licensed spectrum or an unlicensed spectrum. To operate in the unlicensed spectrum, the nodes may use LAA, eLAA, and/or feLAA mechanisms based on CA technology with PCells/Scells. Prior to accessing the unlicensed spectrum, the nodes may perform medium/carrier-sensing operations based on, for example, a listen-before-talk (LBT) protocol.
In V2X scenarios the UE 202 or AN 208 may be or act as a RSU, which may refer to any transportation infrastructure entity used for V2X communications. An RSU may be implemented in or by a suitable AN or a stationary (or relatively stationary) UE. An RSU implemented in or by: a UE may be referred to as a “UE-type RSU”; an eNB may be referred to as an “eNB-type RSU”; a gNB may be referred to as a “gNB-type RSU”; and the like. In one example, an RSU is a computing device coupled with radio frequency circuitry located on a roadside that provides connectivity support to passing vehicle UEs. The RSU may also include internal data storage circuitry to store intersection map geometry, traffic statistics, media, as well as applications/software to sense and control ongoing vehicular and pedestrian traffic. The RSU may provide very low latency communications required for high speed events, such as crash avoidance, traffic warnings, and the like. Additionally or alternatively, the RSU may provide other cellular/WLAN communications services. The components of the RSU may be packaged in a weatherproof enclosure suitable for outdoor installation, and may include a network interface controller to provide a wired connection (e.g., Ethernet) to a traffic signal controller or a backhaul network.
In some embodiments, the RAN 204 may be an LTE RAN 210 with eNBs, for example, eNB 212. The LTE RAN 210 may provide an LTE air interface with the following characteristics: SCS of 15 kHz; CP-OFDM waveform for DL and SC-FDMA waveform for UL; turbo codes for data and TBCC for control; etc. The LTE air interface may rely on CSI- RS for CSI acquisition and beam management; PDSCH/PDCCH DMRS for PDSCH/PDCCH demodulation; and CRS for cell search and initial acquisition, channel quality measurements, and channel estimation for coherent demodulation/detection at the UE. The LTE air interface may operating on sub-6 GHz bands.
In some embodiments, the RAN 204 may be an NG-RAN 214 with gNBs, for example, gNB 216, or ng-eNBs, for example, ng-eNB 218. The gNB 216 may connect with 5G-enabled UEs using a 5G NR interface. The gNB 216 may connect with a 5G core through an NG interface, which may include an N2 interface or an N3 interface. The ng-eNB 218 may also connect with the 5G core through an NG interface, but may connect with a UE via an LTE air interface. The gNB 216 and the ng-eNB 218 may connect with each other over an Xn interface.
In some embodiments, the NG interface may be split into two parts, an NG user plane (NG-U) interface, which carries traffic data between the nodes of the NG-RAN 214 and a UPF 248 (e.g., N3 interface), and an NG control plane (NG-C) interface, which is a signaling interface between the nodes of the NG-RAN214 and an AMF 244 (e.g., N2 interface).
The NG-RAN 214 may provide a 5G-NR air interface with the following characteristics: variable SCS; CP-OFDM for DL, CP-OFDM and DFT-s-OFDM for UL; polar, repetition, simplex, and Reed-Muller codes for control and LDPC for data. The 5G-NR air interface may rely on CSI-RS, PDSCH/PDCCH DMRS similar to the LTE air interface. The 5G-NR air interface may not use a CRS, but may use PBCH DMRS for PBCH demodulation; PTRS for phase tracking for PDSCH; and tracking reference signal for time tracking. The 5G- NR air interface may operating on FR1 bands that include sub-6 GHz bands or FR2 bands that include bands from 24.25 GHz to 52.6 GHz. The 5G-NR air interface may include an SSB that is an area of a downlink resource grid that includes PSS/SSS/PBCH.
In some embodiments, the 5G-NR air interface may utilize BWPs for various purposes. For example, BWP can be used for dynamic adaptation of the SCS. For example, the UE 202 can be configured with multiple BWPs where each BWP configuration has a different SCS. When a BWP change is indicated to the UE 202, the SCS of the transmission is changed as well. Another use case example of BWP is related to power saving. In particular, multiple BWPs can be configured for the UE 202 with different amount of frequency resources (for example, PRBs) to support data transmission under different traffic loading scenarios. A BWP containing a smaller number of PRBs can be used for data transmission with small traffic load while allowing power saving at the UE 202 and in some cases at the gNB 216. A BWP containing a larger number of PRBs can be used for scenarios with higher traffic load.
The RAN 204 is communicatively coupled to CN 220 that includes network elements to provide various functions to support data and telecommunications services to customers/subscribers (for example, users of UE 202). The components of the CN 220 may be implemented in one physical node or separate physical nodes. In some embodiments, NFV may be utilized to virtualize any or all of the functions provided by the network elements of the CN 220 onto physical compute/storage resources in servers, switches, etc. A logical instantiation of the CN 220 may be referred to as a network slice, and a logical instantiation of a portion of the CN 220 may be referred to as a network sub-slice. In some embodiments, the CN 220 may be an LTE CN 222, which may also be referred to as an EPC. The LTE CN 222 may include MME 224, SGW 226, SGSN 228, HSS 230, PGW 232, and PCRF 234 coupled with one another over interfaces (or “reference points”) as shown. Functions of the elements of the LTE CN 222 may be briefly introduced as follows.
The MME 224 may implement mobility management functions to track a current location of the UE 202 to facilitate paging, bearer activation/deactivation, handovers, gateway selection, authentication, etc.
The SGW 226 may terminate an SI interface toward the RAN and route data packets between the RAN and the LTE CN 222. The SGW 226 may be a local mobility anchor point for inter-RAN node handovers and also may provide an anchor for inter-3GPP mobility. Other responsibilities may include lawful intercept, charging, and some policy enforcement.
The SGSN 228 may track a location of the UE 202 and perform security functions and access control. In addition, the SGSN 228 may perform inter-EPC node signaling for mobility between different RAT networks; PDN and S-GW selection as specified by MME 224; MME selection for handovers; etc. The S3 reference point between the MME 224 and the SGSN 228 may enable user and bearer information exchange for inter-3GPP access network mobility in idle/active states.
The HSS 230 may include a database for network users, including subscription-related information to support the network entities’ handling of communication sessions. The HSS 230 can provide support for routing/roaming, authentication, authorization, naming/addressing resolution, location dependencies, etc. An S6a reference point between the HSS 230 and the MME 224 may enable transfer of subscription and authentication data for authenti eating/ authorizing user access to the LTE CN 220.
The PGW 232 may terminate an SGi interface toward a data network (DN) 236 that may include an application/content server 238. The PGW 232 may route data packets between the LTE CN 222 and the data network 236. The PGW 232 may be coupled with the SGW 226 by an S5 reference point to facilitate user plane tunneling and tunnel management. The PGW 232 may further include a node for policy enforcement and charging data collection (for example, PCEF). Additionally, the SGi reference point between the PGW 232 and the data network 2 36 may be an operator external public, a private PDN, or an intra-operator packet data network, for example, for provision of IMS services. The PGW 232 may be coupled with a PCRF 234 via a Gx reference point.
The PCRF 234 is the policy and charging control element of the LTE CN 222. The PCRF 234 may be communicatively coupled to the app/content server 238 to determine appropriate QoS and charging parameters for service flows. The PCRF 232 may provision associated rules into a PCEF (via Gx reference point) with appropriate TFT and QCI.
In some embodiments, the CN 220 may be a 5GC 240. The 5GC 240 may include an AUSF 242, AMF 244, SMF 246, UPF 248, NSSF 250, NEF 252, NRF 254, PCF 256, UDM 258, and AF 260 coupled with one another over interfaces (or “reference points”) as shown. Functions of the elements of the 5GC 240 may be briefly introduced as follows.
The AUSF 242 may store data for authentication of UE 202 and handle authentication- related functionality. The AUSF 242 may facilitate a common authentication framework for various access types. In addition to communicating with other elements of the 5GC 240 over reference points as shown, the AUSF 242 may exhibit an Nausf service-based interface.
The AMF 244 may allow other functions of the 5GC 240 to communicate with the UE 202 and the RAN 204 and to subscribe to notifications about mobility events with respect to the UE 202. The AMF 244 may be responsible for registration management (for example, for registering UE 202), connection management, reachability management, mobility management, lawful interception of AMF-related events, and access authentication and authorization. The AMF 244 may provide transport for SM messages between the UE 202 and the SMF 246, and act as a transparent proxy for routing SM messages. AMF 244 may also provide transport for SMS messages between UE 202 and an SMSF. AMF 244 may interact with the AUSF 242 and the UE 202 to perform various security anchor and context management functions. Furthermore, AMF 244 may be a termination point of a RAN CP interface, which may include or be an N2 reference point between the RAN 204 and the AMF 244; and the AMF 244 may be a termination point of NAS (Nl) signaling, and perform NAS ciphering and integrity protection. AMF 244 may also support NAS signaling with the UE 202 over an N3 IWF interface.
The SMF 246 may be responsible for SM (for example, session establishment, tunnel management between UPF 248 and AN 208); UE IP address allocation and management (including optional authorization); selection and control of UP function; configuring traffic steering at UPF 248 to route traffic to proper destination; termination of interfaces toward policy control functions; controlling part of policy enforcement, charging, and QoS; lawful intercept (for SM events and interface to LI system); termination of SM parts of NAS messages; downlink data notification; initiating AN specific SM information, sent via AMF 244 over N2 to AN 208; and determining SSC mode of a session. SM may refer to management of a PDU session, and a PDU session or “session” may refer to a PDU connectivity service that provides or enables the exchange of PDUs between the UE 202 and the data network 236. The UPF 248 may act as an anchor point for intra-RAT and inter-RAT mobility, an external PDU session point of interconnect to data network 236, and a branching point to support multi-homed PDU session. The UPF 248 may also perform packet routing and forwarding, perform packet inspection, enforce the user plane part of policy rules, lawfully intercept packets (UP collection), perform traffic usage reporting, perform QoS handling for a user plane (e.g., packet filtering, gating, UL/DL rate enforcement), perform uplink traffic verification (e.g., SDF-to-QoS flow mapping), transport level packet marking in the uplink and downlink, and perform downlink packet buffering and downlink data notification triggering. UPF 248 may include an uplink classifier to support routing traffic flows to a data network.
The NSSF 250 may select a set of network slice instances serving the UE 202. The NSSF 250 may also determine allowed NSSAI and the mapping to the subscribed S-NSSAIs, if needed. The NSSF 250 may also determine the AMF set to be used to serve the UE 202, or a list of candidate AMFs based on a suitable configuration and possibly by querying the NRF 254. The selection of a set of network slice instances for the UE 202 may be triggered by the AMF 244 with which the UE 202 is registered by interacting with the NSSF 250, which may lead to a change of AMF. The NSSF 250 may interact with the AMF 244 via an N22 reference point; and may communicate with another NSSF in a visited network via an N31 reference point (not shown). Additionally, the NSSF 250 may exhibit an Nnssf service-based interface.
The NEF 252 may securely expose services and capabilities provided by 3GPP network functions for third party, internal exposure/re-exposure, AFs (e.g., AF 260), edge computing or fog computing systems, etc. In such embodiments, the NEF 252 may authenticate, authorize, or throttle the AFs. NEF 252 may also translate information exchanged with the AF 260 and information exchanged with internal network functions. For example, the NEF 252 may translate between an AF-Service-Identifier and an internal 5GC information. NEF 252 may also receive information from other NFs based on exposed capabilities of other NFs. This information may be stored at the NEF 252 as structured data, or at a data storage NF using standardized interfaces. The stored information can then be re-exposed by the NEF 252 to other NFs and AFs, or used for other purposes such as analytics. Additionally, the NEF 252 may exhibit an Nnef service-based interface.
The NRF 254 may support service discovery functions, receive NF discovery requests from NF instances, and provide the information of the discovered NF instances to the NF instances. NRF 254 also maintains information of available NF instances and their supported services. As used herein, the terms “instantiate,” “instantiation,” and the like may refer to the creation of an instance, and an “instance” may refer to a concrete occurrence of an object, which may occur, for example, during execution of program code. Additionally, the NRF 254 may exhibit the Nnrf service-based interface.
The PCF 256 may provide policy rules to control plane functions to enforce them, and may also support unified policy framework to govern network behavior. The PCF 256 may also implement a front end to access subscription information relevant for policy decisions in a UDR of the UDM 258. In addition to communicating with functions over reference points as shown, the PCF 256 exhibit an Npcf service-based interface.
The UDM 258 may handle subscription-related information to support the network entities’ handling of communication sessions, and may store subscription data of UE 202. For example, subscription data may be communicated via an N8 reference point between the UDM 258 and the AMF 244. The UDM 258 may include two parts, an application front end and a UDR. The UDR may store subscription data and policy data for the UDM 258 and the PCF 256, and/or structured data for exposure and application data (including PFDs for application detection, application request information for multiple UEs 202) for the NEF 252. The Nudr service-based interface may be exhibited by the UDR 221 to allow the UDM 258, PCF 256, and NEF 252 to access a particular set of the stored data, as well as to read, update (e.g., add, modify), delete, and subscribe to notification of relevant data changes in the UDR. The UDM may include a UDM-FE, which is in charge of processing credentials, location management, subscription management and so on. Several different front ends may serve the same user in different transactions. The UDM-FE accesses subscription information stored in the UDR and performs authentication credential processing, user identification handling, access authorization, registration/mobility management, and subscription management. In addition to communicating with other NFs over reference points as shown, the UDM 258 may exhibit the Nudm service-based interface.
The AF 260 may provide application influence on traffic routing, provide access to NEF, and interact with the policy framework for policy control.
In some embodiments, the 5GC 240 may enable edge computing by selecting operator/3rd party services to be geographically close to a point that the UE 202 is attached to the network. This may reduce latency and load on the network. To provide edge-computing implementations, the 5GC 240 may select a UPF 248 close to the UE 202 and execute traffic steering from the UPF 248 to data network 236 via the N6 interface. This may be based on the UE subscription data, UE location, and information provided by the AF 260. In this way, the AF 260 may influence UPF (re)selection and traffic routing. Based on operator deployment, when AF 260 is considered to be a trusted entity, the network operator may permit AF 260 to interact directly with relevant NFs. Additionally, the AF 260 may exhibit an Naf service-based interface.
The data network 236 may represent various network operator services, Internet access, or third party services that may be provided by one or more servers including, for example, application/content server 238.
Figure 3 schematically illustrates a wireless network 300 in accordance with various embodiments. The wireless network 300 may include a UE 302 in wireless communication with an AN 304. The UE 302 and AN 304 may be similar to, and substantially interchangeable with, like-named components described elsewhere herein.
The UE 302 may be communicatively coupled with the AN 304 via connection 306. The connection 306 is illustrated as an air interface to enable communicative coupling, and can be consistent with cellular communications protocols such as an LTE protocol or a 5G NR protocol operating at mmWave or sub-6GHz frequencies.
The UE 302 may include a host platform 308 coupled with a modem platform 310. The host platform 308 may include application processing circuitry 312, which may be coupled with protocol processing circuitry 314 of the modem platform 310. The application processing circuitry 312 may run various applications for the UE 302 that source/sink application data. The application processing circuitry 312 may further implement one or more layer operations to transmit/receive application data to/from a data network. These layer operations may include transport (for example UDP) and Internet (for example, IP) operations
The protocol processing circuitry 314 may implement one or more of layer operations to facilitate transmission or reception of data over the connection 306. The layer operations implemented by the protocol processing circuitry 314 may include, for example, MAC, RLC, PDCP, RRC and NAS operations.
The modem platform 310 may further include digital baseband circuitry 316 that may implement one or more layer operations that are “below” layer operations performed by the protocol processing circuitry 314 in a network protocol stack. These operations may include, for example, PHY operations including one or more of HARQ-ACK functions, scrambling/descrambling, encoding/decoding, layer mapping/de-mapping, modulation symbol mapping, received symbol/bit metric determination, multi-antenna port precoding/decoding, which may include one or more of space-time, space-frequency or spatial coding, reference signal generation/detection, preamble sequence generation and/or decoding, synchronization sequence generation/detection, control channel signal blind decoding, and other related functions.
The modem platform 310 may further include transmit circuitry 318, receive circuitry 320, RF circuitry 322, and RF front end (RFFE) 324, which may include or connect to one or more antenna panels 326. Briefly, the transmit circuitry 318 may include a digital -to-analog converter, mixer, intermediate frequency (IF) components, etc.; the receive circuitry 320 may include an analog-to-digital converter, mixer, IF components, etc.; the RF circuitry 322 may include a low-noise amplifier, a power amplifier, power tracking components, etc.; RFFE 324 may include filters (for example, surface/bulk acoustic wave filters), switches, antenna tuners, beamforming components (for example, phase-array antenna components), etc. The selection and arrangement of the components of the transmit circuitry 318, receive circuitry 320, RF circuitry 322, RFFE 324, and antenna panels 326 (referred generically as “transmit/receive components”) may be specific to details of a specific implementation such as, for example, whether communication is TDM or FDM, in mmWave or sub-6 gHz frequencies, etc. In some embodiments, the transmit/receive components may be arranged in multiple parallel transmit/receive chains, may be disposed in the same or different chips/modules, etc.
In some embodiments, the protocol processing circuitry 314 may include one or more instances of control circuitry (not shown) to provide control functions for the transmit/receive components.
A UE reception may be established by and via the antenna panels 326, RFFE 324, RF circuitry 322, receive circuitry 320, digital baseband circuitry 316, and protocol processing circuitry 314. In some embodiments, the antenna panels 326 may receive a transmission from the AN 304 by receive-beamforming signals received by a plurality of antennas/antenna elements of the one or more antenna panels 326.
A UE transmission may be established by and via the protocol processing circuitry 314, digital baseband circuitry 316, transmit circuitry 318, RF circuitry 322, RFFE 324, and antenna panels 326. In some embodiments, the transmit components of the UE 304 may apply a spatial filter to the data to be transmitted to form a transmit beam emitted by the antenna elements of the antenna panels 326.
Similar to the UE 302, the AN 304 may include a host platform 328 coupled with a modem platform 330. The host platform 328 may include application processing circuitry 332 coupled with protocol processing circuitry 334 of the modem platform 330. The modem platform may further include digital baseband circuitry 336, transmit circuitry 338, receive circuitry 340, RF circuitry 342, RFFE circuitry 344, and antenna panels 346. The components of the AN 304 may be similar to and substantially interchangeable with like-named components of the UE 302. In addition to performing data transmission/reception as described above, the components of the AN 308 may perform various logical functions that include, for example, RNC functions such as radio bearer management, uplink and downlink dynamic radio resource management, and data packet scheduling.
Figure 4 is a block diagram illustrating components, according to some example embodiments, able to read instructions from a machine-readable or computer-readable medium (e.g., a non-transitory machine-readable storage medium) and perform any one or more of the methodologies discussed herein. Specifically, Figure 4 shows a diagrammatic representation of hardware resources 400 including one or more processors (or processor cores) 410, one or more memory /storage devices 420, and one or more communication resources 430, each of which may be communicatively coupled via a bus 440 or other interface circuitry. For embodiments where node virtualization (e.g., NFV) is utilized, a hypervisor 402 may be executed to provide an execution environment for one or more network slices/sub-slices to utilize the hardware resources 400.
The processors 410 may include, for example, a processor 412 and a processor 414. The processors 410 may be, for example, a central processing unit (CPU), a reduced instruction set computing (RISC) processor, a complex instruction set computing (CISC) processor, a graphics processing unit (GPU), a DSP such as a baseband processor, an ASIC, an FPGA, a radio-frequency integrated circuit (RFIC), another processor (including those discussed herein), or any suitable combination thereof.
The memory /storage devices 420 may include main memory, disk storage, or any suitable combination thereof. The memory /storage devices 420 may include, but are not limited to, any type of volatile, non-volatile, or semi-volatile memory such as dynamic random access memory (DRAM), static random access memory (SRAM), erasable programmable read-only memory (EPROM), electrically erasable programmable read-only memory (EEPROM), Flash memory, solid-state storage, etc.
The communication resources 430 may include interconnection or network interface controllers, components, or other suitable devices to communicate with one or more peripheral devices 404 or one or more databases 406 or other network elements via a network 408. For example, the communication resources 430 may include wired communication components (e.g., for coupling via USB, Ethernet, etc.), cellular communication components, NFC components, Bluetooth® (or Bluetooth® Low Energy) components, Wi-Fi® components, and other communication components.
Instructions 450 may comprise software, a program, an application, an applet, an app, or other executable code for causing at least any of the processors 410 to perform any one or more of the methodologies discussed herein. The instructions 450 may reside, completely or partially, within at least one of the processors 410 (e.g., within the processor’s cache memory), the memory /storage devices 420, or any suitable combination thereof. Furthermore, any portion of the instructions 450 may be transferred to the hardware resources 400 from any combination of the peripheral devices 404 or the databases 406. Accordingly, the memory of processors 410, the memory /storage devices 420, the peripheral devices 404, and the databases 406 are examples of computer-readable and machine-readable media.
Figure 5 provides a high-level view of an Open RAN (O-RAN) architecture 500. The O-RAN architecture 500 includes four O-RAN defined interfaces - namely, the A1 interface, the 01 interface, the 02 interface, and the Open Fronthaul Management (M)-plane interface - which connect the Service Management and Orchestration (SMO) framework 502 to O-RAN network functions (NFs) 504 and the O-Cloud 506. The SMO 502 (described in [013]) also connects with an external system 510, which provides enrighment data to the SMO 502. Figure 5 also illustrates that the A1 interface terminates at an O-RAN Non-Real Time (RT) RAN Intelligent Controller (RIC) 512 in or at the SMO 502 and at the O-RAN Near-RT RIC 514 in or at the O-RAN NFs 504. The O-RAN NFs 504 can be VNFs such as VMs or containers, sitting above the O-Cloud 506 and/or Physical Network Functions (PNFs) utilizing customized hardware. All O-RAN NFs 504 are expected to support the 01 interface when interfacing the SMO framework 502. The O-RAN NFs 504 connect to the NG-Core 508 via the NG interface (which is a 3GPP defined interface). The Open Fronthaul M-plane interface between the SMO 502 and the O-RAN Radio Unit (O-RU) 516 supports the O-RU 516 management in the O- RAN hybrid model as specified in [016] The Open Fronthaul M-plane interface is an optional interface to the SMO 502 that is included for backward compatibility purposes as per [016], and is intended for management of the O-RU 516 in hybrid mode only. The management architecture of flat mode [012] and its relation to the 01 interface for the O-RU 516 is for future study. The O-RU 516 termination of the 01 interface towards the SMO 502 as specified in [012]
Figure 6 shows an O-RAN logical architecture 600 corresponding to the O-RAN architecture 500 of Figure 5. In Figure 6, the SMO 602 corresponds to the SMO 502, O-Cloud 606 corresponds to the O-Cloud 506, the non-RT RIC 612 corresponds to the non-RT RIC 512, the near-RT RIC 614 corresponds to the near-RT RIC 514, and the O-RU 616 corresponds to the O-RU 516 of Figure 6, respectively. The O-RAN logical architecture 600 includes a radio portion and a management portion.
The management portion/side of the architectures 600 includes the SMO Framework 602 containing the non-RT RIC 612, and may include the O-Cloud 606. The O-Cloud 606 is a cloud computing platform including a collection of physical infrastructure nodes to host the relevant O-RAN functions (e.g., the near-RT RIC 614, O-CU-CP 621, O-CU-UP 622, and the O-DU 615), supporting software components (e.g., OSs, VMMs, container runtime engines, ML engines, etc.), and appropriate management and orchestration functions.
The radio portion/side of the logical architecture 600 includes the near-RT RIC 614, the O-RAN Distributed Unit (O-DU) 615, the O-RU 616, the O-RAN Central Unit - Control Plane (O-CU-CP) 621, and the O-RAN Central Unit - User Plane (O-CU-UP) 622 functions. The radio portion/side of the logical architecture 600 may also include the O-e/gNB 610.
The O-DU 615 is a logical node hosting RLC, MAC, and higher PHY layer entities/elements (High-PHY layers) based on a lower layer functional split. The O-RU 616 is a logical node hosting lower PHY layer entities/elements (Low-PHY layer) (e.g., FFT/iFFT, PRACH extraction, etc.) and RF processing elements based on a lower layer functional split. Virtualization of O-RU 616 is FFS. The O-CU-CP 621 is a logical node hosting the RRC and the control plane (CP) part of the PDCP protocol. The O O-CU-UP 622 is a a logical node hosting the user plane part of the PDCP protocol and the SDAP protocol.
An E2 interface terminates at a plurality of E2 nodes. The E2 nodes are logical nodes/entities that terminate the E2 interface. For NR/5G access, the E2 nodes include the O- CU-CP 621, O-CU-UP 622, O-DU 615, or any combination of elements as defined in [015] For E-UTRA access the E2 nodes include the O-e/gNB 610. As shown in Figure 6, the E2 interface also connects the O-e/gNB 610 to the Near-RT RIC 614. The protocols over E2 interface are based exclusively on Control Plane (CP) protocols. The E2 functions are grouped into the following categories: (a) near-RT RIC 614 services (REPORT, INSERT, CONTROL and POLICY, as described in [015]); and (b) near-RT RIC 614 support functions, which include E2 Interface Management (E2 Setup, E2 Reset, Reporting of General Error Situations, etc.) and Near-RT RIC Service Update (e.g., capability exchange related to the list of E2 Node functions exposed over E2).
Figure 6 shows the Uu interface between a UE 601 and O-e/gNB 610 as well as between the UE 601 and O-RAN components. The Uu interface is a 3GPP defined interface (see e.g., sections 5.2 and 5.3 of [007]), which includes a complete protocol stack from LI to L3 and terminates in the NG-RAN or E-UTRAN. The O-e/gNB 610 is an LTE eNB [004], a 5G gNB or ng-eNB [006] that supports the E2 interface. The O-e/gNB 610 may be the same or similar as other gNBs discussed previously. The a UE 601 may correspond to UEs discussed previously. There may be multiple UEs 601 and/or multiple O-e/gNB 610, each of which may be connected to one another the via respective Uu interfaces. Although not shown in Figure 6, the O-e/gNB 610 supports O-DU 615 and O-RU 616 functions with an Open Fronthaul interface between them.
The Open Fronthaul (OF) interface(s) is/are between O-DU 615 and O-RU 616 functions [016] [017] The OF interface(s) includes the Control User Synchronization (CUS) Plane and Management (M) Plane. Figures 5 and 6 also show that the O-RU 616 terminates the OF M-Plane interface towards the O-DU 615 and optionally towards the SMO 602 as specified in [016] The O-RU 616 terminates the OF CUS-Plane interface towards the O-DU 615 and the SMO 602.
The Fl-c interface connects the O-CU-CP 621 with the O-DU 615. As defined by 3GPP, the Fl-c interface is between the gNB-CU-CP and gNB-DU nodes [007] [OIO] However, for purposes of O-RAN, the Fl-c interface is adopted between the O-CU-CP 621 with the O-DU 615 functions while reusing the principles and protocol stack defined by 3 GPP and the definition of interoperability profile specifications.
The Fl-u interface connects the O-CU-UP 622 with the O-DU 615. As defined by 3GPP, the Fl-u interface is between the gNB-CU-UP and gNB-DU nodes [007] [OIO] However, for purposes of O-RAN, the Fl-u interface is adopted between the O-CU-UP 622 with the O-DU 615 functions while reusing the principles and protocol stack defined by 3GPP and the definition of interoperability profile specifications.
The NG-c interface is defined by 3GPP as an interface between the gNB-CU-CP and the AMF in the 5GC [006] The NG-c is also referred as the N2 interface (see [006]). The NG-u interface is defined by 3GPP, as an interface between the gNB-CU-UP and the UPF in the 5GC [006] The NG-u interface is referred as the N3 interface (see [006]). In O-RAN, NG- c and NG-u protocol stacks defined by 3GPP are reused and may be adapted for O-RAN purposes.
The X2-c interface is defined in 3GPP for transmitting control plane information between eNBs or between eNB and en-gNB in EN-DC. The X2-u interface is defined in 3GPP for transmitting user plane information between eNBs or between eNB and en-gNB in EN-DC (see e.g., [005], [006]). In O-RAN, X2-c and X2-u protocol stacks defined by 3GPP are reused and may be adapted for O-RAN purposes The Xn-c interface is defined in 3GPP for transmitting control plane information between gNBs, ng-eNBs, or between an ng-eNB and gNB. The Xn-u interface is defined in 3GPP for transmiting user plane information between gNBs, ng-eNBs, or between ng-eNB and gNB (see e.g., [006], [008]). In O-RAN, Xn-c and Xn-u protocol stacks defined by 3GPP are reused and may be adapted for O-RAN purposes
The El interface is defined by 3GPP as being an interface between the gNB-CU-CP (e.g., gNB-CU-CP 3728) and gNB-CU-UP (see e.g., [007], [009]). In O-RAN, El protocol stacks defined by 3GPP are reused and adapted as being an interface between the O-CU-CP 621 and the O-CU-UP 622 functions.
The O-RAN Non-Real Time (RT) RAN Intelligent Controller (RIC) 612 is a logical function within the SMO framework 502, 602 that enables non-real-time control and optimization of RAN elements and resources; Al/machine learning (ML) workflow(s) including model training, inferences, and updates; and policy-based guidance of appbcations/features in the Near-RT RIC 614.
The O-RAN near-RT RIC 614 is a logical function that enables near-real -time control and optimization of RAN elements and resources via fine-grained data collection and actions over the E2 interface. The near-RT RIC 614 may include one or more AI/ML workflows including model training, inferences, and updates.
The non-RT RIC 612 can be an ML training host to host the training of one or more ML models. ML training can be performed offline using data collected from the RIC, O-DU 615 and O-RU 616. For supervised learning, non-RT RIC 612 is part of the SMO 602, and the ML training host and/or ML model host/actor can be part of the non-RT RIC 612 and/or the near-RT RIC 614. For unsupervised learning, the ML training host and ML model host/actor can be part of the non-RT RIC 612 and/or the near-RT RIC 614. For reinforcement learning, the ML training host and ML model host/actor may be co-located as part of the non-RT RIC 612 and/or the near-RT RIC 614. In some implementations, the non-RT RIC 612 may request or trigger ML model training in the training hosts regardless of where the model is deployed and executed. ML models may be trained and not currently deployed.
In some implementations, the non-RT RIC 612 provides a query-able catalog for an ML designer/dev eloper to publish/install trained ML models (e.g., executable software components). In these implementations, the non-RT RIC 612 may provide discovery mechanism if a particular ML model can be executed in a target ML inference host (MF), and what number and type of ML models can be executed in the MF. For example, there may be three types of ML catalogs made disoverable by the non-RT RIC 612: a design-time catalog (e.g., residing outside the non-RT RIC 612 and hosted by some other ML platform(s)), a training/deployment-time catalog (e.g., residing inside the non-RT RIC 612), and a run-time catalog (e.g., residing inside the non-RT RIC 612). The non-RT RIC 612 supports necessary capabilities for ML model inference in support of ML assisted solutions running in the non-RT RIC 612 or some other ML inference host. These capabilities enable executable software to be installed such as VMs, containers, etc. The non-RT RIC 612 may also include and/or operate one or more ML engines, which are packaged software executable libraries that provide methods, routines, data types, etc., used to run ML models. The non-RT RIC 612 may also implement policies to switch and activate ML model instances under different operating conditions.
The non-RT RIC 62 is be able to access feedback data (e.g., FM and PM statistics) over the 01 interface on ML model performance and perform necessary evaluations. If the ML model fails during runtime, an alarm can be generated as feedback to the non-RT RIC 612. How well the ML model is performing in terms of prediction accuracy or other operating statistics it produces can also be sent to the non-RT RIC 612 over 01. The non-RT RIC 612 can also scale ML model instances running in a target MF over the 01 interface by observing resource utilization in MF. The environment where the ML model instance is running (e.g., the MF) monitors resource utilization of the running ML model. This can be done, for example, using an ORAN-SC component called ResourceMonitor in the near-RT RIC 614 and/or in the non-RT RIC 612, which continuously monitors resource utilization. If resources are low or fall below a certain threshold, the runtime environment in the near-RT RIC 614 and/or the non-RT RIC 612 provides a scaling mechanism to add more ML instances. The scaling mechanism may include a scaling factor such as an number, percentage, and/or other like data used to scale up/down the number of ML instances. ML model instances running in the target ML inference hosts may be automatically scaled by observing resource utilization in the MF. For example, the Kubemetes® (K8s) runtime environment typically provides an auto-scaling feature.
The A1 interface is between the non-RT RIC 612 (within or outside the SMO 602) and the near-RT RIC 614. The A1 interface supports three types of services as defined in [014], including a Policy Management Service, an Enrichment Information Service, and ML Model Management Service. A1 policies have the following characteristics compared to persistent configuration [014]: A1 policies are not critical to traffic; A1 policies have temporary validity; A1 policies may handle individual UE or dynamically defined groups of UEs; A1 policies act within and take precedence over the configuration; and A1 policies are non-persistent, e.g., do not survive a restart of the near-RT RIC. [OIO] 3 GPP TS 38.470 vl6.0.0 (2020-01-09).
[012] O-RAN Alliance Working Group 1, O-RAN Operations and Maintenance Architecture Specification, version 2.0 (Dec 2019) (“O-RAN-WGl.OAM-Architecture- v02.00”).
[013] O-RAN Alliance Working Group 1, O-RAN Operations and Maintenance Interface Specification, version 2.0 (Dec 2019) (“0-RAN-WG1.01-Interface-v02.00”).
[014] O-RAN Alliance Working Group 2, O-RAN A1 interface: General Aspects and Principles Specification, version 1.0 (Oct 2019) (“ORAN-WG2.Al.GA&P-v01.00”).
[015] O-RAN Alliance Working Group 3, Near-Real-time RAN Intelligent Controller Architecture & E2 General Aspects and Principles (‘ORAN-WG3.E2GAP.0-v0.1”).
[016] O-RAN Alliance Working Group 4, O-RAN Fronthaul Management Plane Specification, version 2.0 (July 2019) (“ORAN-WG4.MP.0-v02.00.00”).
[017] O-RAN Alliance Working Group 4, O-RAN Fronthaul Control, User and Synchronization Plane Specification, version 2.0 (July 2019) (“ORAN-WG4.CUS.0-v02.00”).
EXAMPLE PROCEDURES
In some embodiments, the electronic device(s), network(s), system(s), chip(s) or component(s), or portions or implementations thereof, of Figures 2-4, or some other figure herein, may be configured to perform one or more processes, techniques, or methods as described herein, or portions thereof.
One such process is depicted in Figure 7. In some embodiments, the process of Figure 7 may be performed by a gNB or a portion thereof. For example, the process may include, at 705, receiving, from a near-real time RAN intelligent controller (near-RT RIC), a subscription or request for the updated RAN UE ID information. The process further includes, at 710, retrieving the updated RAN UE ID information from memory. The process further includes, at 715, encoding a message for transmission to the near-RT RIC that includes the updated RAN UE ID information.
Another such process is depicted in Figure 8. In some embodiments, the process of Figure 8 may be performed by a gNB or a portion thereof. For example, the process may include, at 805, receiving, from a near-real time RAN intelligent controller (near-RT RIC), a subscription or request for the updated RAN UE ID information. The process further includes, at 810, determining the updated RAN UE ID information in response to the subscription or request. The process further includes, at 815, encoding a message for transmission to the near-RT RIC that includes the updated RAN UE ID information. Another such process is depicted in Figure 9, which may be performed by a near-real time RAN intelligent controller (near-RT RIC) in some embodiments. In this example, the process includes, at 905, encoding a message to a next-generation NodeB (gNB) that includes a subscription or request for updated radio access network (RAN) user equipment (UE) identification (ID) information. The process further includes, at 910, receiving, over an E2 interface, a response that includes the updated RAN UE ID information.
For one or more embodiments, at least one of the components set forth in one or more of the preceding figures may be configured to perform one or more operations, techniques, processes, and/or methods as set forth in the example section below. For example, the baseband circuitry as described above in connection with one or more of the preceding figures may be configured to operate in accordance with one or more of the examples set forth below. For another example, circuitry associated with a UE, base station, network element, etc. as described above in connection with one or more of the preceding figures may be configured to operate in accordance with one or more of the examples set forth below in the example section.
EXAMPLES
Example 1 may include an apparatus in O-RAN comprising:
• RAN nodes, employed as eNodeB or next generation NodeB in 5GS; or employed as a CU (centralized unit) and a DU (distributed unit) inter-connected via FI interface, for which CU may be further split into control plane (CU-CP) and user plane (CU- UP) inter-connected via El interface.
• The near real-time (Near-RT) RAN intelligence controller (RIC) for the optimized controls over RAN nodes over E2 interface.
• Means to support the RAN UE ID based UE identification across 01/A1/E2 interfaces
Example 2 may include near-RT RIC subscribes or requests an update of a RAN UE ID (whenever (re/de)assigned) of the UEs from a RAN node over E2 interface, according to UE group/categories of interest.
Example 3 may include RAN UE ID of a UE updated to O-RAN includes node IDs of the corresponding DU and CU-UP that are serving the UE, in case of CU-DU split or CP-UP separated.
Example XI includes an apparatus comprising: memory to store updated radio access network (RAN) user equipment (UE) identification (ID) information; and processing circuitry, coupled with the memory, to: receive, from a near-real time RAN intelligent controller (near-RT RIC), a subscription or request for the updated RAN UE ID information; retrieve the updated RAN UE ID information from the memory; and encode a message for transmission to the near-RT RIC that includes the updated RAN UE ID information.
Example X2 includes the apparatus of example XI or some other example herein, wherein the updated RAN UE ID information is represented by an octet string.
Example X3 includes the apparatus of example X2 or some other example herein, wherein the octet string has a size of eight characters.
Example X4 includes the apparatus of any of examples XI -X3, wherein the message is encoded for transmission via an E2 interface.
Example X5 includes the apparatus of any of examples XI -X4, wherein the subscription or request is received via an E2 interface.
Example X6 includes the apparatus of any of examples XI -X5, wherein the apparatus comprises a next-generation NodeB (gNB) implementing a control unit-control plane (CU- CP).
Example X7 includes the apparatus of example X6, wherein the gNB further implements a distributed unit (DU) and a control unit-user plane (CU-UP).
Example X8 includes one or more computer-readable media storing instructions that, when executed by one or more processors, cause a next-generation NodeB (gNB) to: receive, from a near-real time RAN intelligent controller (near-RT RIC), a subscription or request for updated radio access network (RAN) user equipment (UE) identification (ID) information; determine the updated RAN UE ID information in response to the subscription or request; and encode a message for transmission to the near-RT RIC that includes the updated RAN UE ID information.
Example X9 includes the one or more computer-readable media of example X8 or some other example herein, wherein the updated RAN UE ID information is represented by an octet string.
Example XI 0 includes the one or more computer-readable media of example X9 or some other example herein, wherein the octet string has a size of eight characters.
Example XI 1 includes the one or more computer-readable media of any of examples X8-X10, wherein the message is encoded for transmission via an E2 interface.
Example XI 2 includes the one or more computer-readable media of any of examples X8-X11, wherein the subscription or request is received via an E2 interface. Example XI 3 includes the one or more computer-readable media of any of examples X8-X12, wherein the gNB implements a control unit-control plane (CU-CP).
Example XI 4 includes the one or more computer-readable media of XI 3 or some other example herein, wherein the gNB further implements a distributed unit (DU) and a control unit-user plane (CU-UP).
Example XI 5 includes one or more computer-readable media storing instructions that, when executed by one or more processors, cause a near-real time RAN intelligent controller (near-RT RIC) to: encode a message to a next-generation NodeB (gNB) that includes a subscription or request for updated radio access network (RAN) user equipment (UE) identification (ID) information; and receive, over an E2 interface, a response that includes the updated RAN UE ID information.
Example XI 6 includes the one or more computer-readable media of example XI 5 or some other example herein, wherein the updated RAN UE ID information is represented by an octet string.
Example XI 7 includes the one or more computer-readable media of example XI 6 or some other example herein, wherein the octet string has a size of eight characters.
Example XI 8 includes the one or more computer-readable media of any of examples X15-X17, wherein the message is encoded for transmission via an E2 interface.
Example XI 9 includes the one or more computer-readable media of any of examples X15-X18, wherein the message is directed to a control unit-control plane (CU-CP) implemented by the gNB.
Example Z01 may include an apparatus comprising means to perform one or more elements of a method described in or related to any of examples 1-X19, or any other method or process described herein.
Example Z02 may include one or more non-transitory computer-readable media comprising instructions to cause an electronic device, upon execution of the instructions by one or more processors of the electronic device, to perform one or more elements of a method described in or related to any of examples 1- XI 9, or any other method or process described herein.
Example Z03 may include an apparatus comprising logic, modules, or circuitry to perform one or more elements of a method described in or related to any of examples 1- XI 9, or any other method or process described herein.
Example Z04 may include a method, technique, or process as described in or related to any of examples 1- XI 9, or portions or parts thereof. Example Z05 may include an apparatus comprising: one or more processors and one or more computer-readable media comprising instructions that, when executed by the one or more processors, cause the one or more processors to perform the method, techniques, or process as described in or related to any of examples 1- XI 9, or portions thereof.
Example Z06 may include a signal as described in or related to any of examples 1- XI 9, or portions or parts thereof.
Example Z07 may include a datagram, packet, frame, segment, protocol data unit (PDU), or message as described in or related to any of examples 1- XI 9, or portions or parts thereof, or otherwise described in the present disclosure.
Example Z08 may include a signal encoded with data as described in or related to any of examples 1- XI 9, or portions or parts thereof, or otherwise described in the present disclosure.
Example Z09 may include a signal encoded with a datagram, packet, frame, segment, protocol data unit (PDU), or message as described in or related to any of examples 1- XI 9, or portions or parts thereof, or otherwise described in the present disclosure.
Example Z10 may include an electromagnetic signal carrying computer-readable instructions, wherein execution of the computer-readable instructions by one or more processors is to cause the one or more processors to perform the method, techniques, or process as described in or related to any of examples 1- XI 9, or portions thereof.
Example Zll may include a computer program comprising instructions, wherein execution of the program by a processing element is to cause the processing element to carry out the method, techniques, or process as described in or related to any of examples 1- XI 9, or portions thereof.
Example Z12 may include a signal in a wireless network as shown and described herein.
Example Z13 may include a method of communicating in a wireless network as shown and described herein.
Example Z14 may include a system for providing wireless communication as shown and described herein.
Example Z15 may include a device for providing wireless communication as shown and described herein.
Any of the above-described examples may be combined with any other example (or combination of examples), unless explicitly stated otherwise. The foregoing description of one or more implementations provides illustration and description, but is not intended to be exhaustive or to limit the scope of embodiments to the precise form disclosed. Modifications and variations are possible in light of the above teachings or may be acquired from practice of various embodiments.
Abbreviations Unless used differently herein, terms, definitions, and abbreviations may be consistent with terms, definitions, and abbreviations defined in 3GPP TR 21.905 vl6.0.0 (2019-06). For the purposes of the present document, the following abbreviations may apply to the examples and embodiments discussed herein.
3GPP Third Generation 35 ASN.1 Abstract Syntax CAPEX CAPital Partnership Notation One 70 Expenditure
Project AUSF Authentication CBRA Contention Based
4G Fourth Generation Server Function Random Access 5G Fifth Generation AWGN Additive CC Component 5GC 5G Core network 40 White Gaussian Carrier, Country ACK Noise 75 Code, Cryptographic
Acknowledgemen BAP Backhaul Checksum t Adaptation Protocol CCA Clear Channel
AF Application BCH Broadcast Assessment Function 45 Channel CCE Control Channel
AM Acknowledged BER Bit Error Ratio 80 Element Mode BFD Beam Failure CCCH Common Control
AMBRAggregate Detection Channel Maximum Bit Rate BLER Block Error Rate CE Coverage AMF Access and 50 BPSK Binary Phase Shift Enhancement Mobility Keying 85 CDM Content Delivery
Management BRAS Broadband Network
Function Remote Access CDMA Code-
AN Access Network Server Division Multiple ANR Automatic 55 BSS Business Support Access Neighbour Relation System 90 CFRA Contention Free AP Application BS Base Station Random Access Protocol, Antenna BSR Buffer Status CG Cell Group
Port, Access Point Report Cl Cell Identity API Application 60 BW Bandwidth CID Cell-ID (e g., Programming Interface BWP Bandwidth Part 95 positioning method) APN Access Point C-RNTI Cell Radio CIM Common Name Network Temporary Information Model
ARP Allocation and Identity CIR Carrier to Retention Priority 65 CA Carrier Interference Ratio
ARQ Automatic Repeat Aggregation, 100 CK Cipher Key Request Certification CM Connection
AS Access Stratum Authority Management, Conditional CRAN Cloud Radio CSMA/CA CSMA Mandatory Access Network, with collision avoidance CM AS Commercial 35 Cloud RAN CSS Common Search Mobile Alert Service CRB Common 70 Space, Cell- specific CMD Command Resource Block Search Space CMS Cloud CRC Cyclic CTS Clear-to-Send Management System Redundancy Check CW Codeword CO Conditional 40 CRI Channel-State CWS Contention Optional Information Resource 75 Window Size
CoMP Coordinated Indicator, CSI-RS D2D Device-to-Device
Multi-Point Resource DC Dual
CORESET Control Indicator Connectivity, Direct
Resource Set 45 C-RNTI Cell RNTI Current
COTS Commercial Off- CS Circuit Switched 80 DCI Downlink Control
The-Shelf CSAR Cloud Service Information
CP Control Plane, Archive DF Deployment Cyclic Prefix, CSI Channel-State Flavour
Connection Point 50 Information DL Downlink CPD Connection Point CSI-IM CSI 85 DMTF Distributed Descriptor Interference Management Task Force
CPE Customer Premise Measurement DPDK Data Plane Equipment CSI-RS CSI Development Kit
CPICHCommon Pilot 55 Reference Signal DM-RS, DMRS Channel CSI-RS RP CSI 90 Demodulation
CQI Channel Quality reference signal Reference Signal Indicator received power DN Data network
CPU CSI processing CSI-RSRQ CSI DRB Data Radio Bearer unit, Central Processing 60 reference signal DRS Discovery Unit received quality 95 Reference Signal C/R CSI-SINR CSI signal- DRX Discontinuous
Command/Respon to-noise and Reception se field bit interference ratio DSL Domain Specific 65 CSMA Carrier Sense Language. Digital Multiple Access 100 Subscriber Line DSLAM DSL 35 EMS Element E-UTRAN Evolved
Access Multiplexer Management System UTRAN DwPTS Downlink eNB evolved NodeB, 70 EV2X Enhanced V2X
Pilot Time Slot E-UTRAN Node B F1AP FI Application E-LAN Ethernet EN-DC E-UTRA- Protocol
Local Area Network 40 NR Dual Fl-C FI Control plane
E2E End-to-End Connectivity interface ECCA extended clear EPC Evolved Packet 75 Fl-U FI User plane channel Core interface assessment, EPDCCH enhanced FACCH Fast extended CCA 45 PDCCH, enhanced Associated Control ECCE Enhanced Control Physical CHannel Channel Element, Downlink Control 80 FACCH/F Fast
Enhanced CCE Cannel Associated Control ED Energy Detection EPRE Energy per Channel/Full rate EDGE Enhanced 50 resource element FACCH/H Fast Datarates for GSM EPS Evolved Packet Associated Control
Evolution (GSM System 85 Channel/Half rate Evolution) EREG enhanced REG, FACH Forward Access
EGMF Exposure enhanced resource Channel Governance 55 element groups FAUSCH Fast
Management ETSI European Uplink Signalling
Function Telecommunicatio 90 Channel
EGPRS Enhanced ns Standards Institute FB Functional Block
GPRS ETWS Earthquake and FBI Feedback
EIR Equipment 60 Tsunami Warning Information Identity Register System FCC Federal eLAA enhanced eUICC embedded UICC, 95 Communications Licensed Assisted embedded Universal Commission
Access, enhanced Integrated Circuit FCCH Frequency
LAA 65 Card Correction CHannel
EM Element Manager E-UTRA Evolved FDD Frequency eMBB Enhanced Mobile UTRA 100 Division Duplex Broadband FDM Frequency 35 Sputnikovaya GUTI Globally Unique Division Multiplex Sistema (Engl.: Temporary UE
FDM A F requency Global Navigation 70 Identity Division Multiple Satellite System) HARQ Hybrid ARQ,
Access gNB Next Generation Hybrid Automatic
FE Front End 40 NodeB Repeat Request FEC Forward Error gNB-CU gNB- HANDO Handover Correction centralized unit, Next 75 HFN HyperFrame
FFS For Further Study Generation NodeB Number FFT Fast Fourier centralized unit HHO Hard Handover
Transformation 45 gNB -DU gNB- HLR Home Location feLAA further enhanced distributed unit, Next Register Licensed Assisted Generation NodeB 80 HN Home Network
Access, further distributed unit HO Handover enhanced LAA GNSS Global Navigation HPLMN Home FN Frame Number 50 Satellite System Public Land Mobile FPGA Field- GPRS General Packet Network Programmable Gate Radio Service 85 HSDPA High Array GSM Global System for Speed Downlink
FR Frequency Range Mobile Packet Access G-RNTI GERAN 55 Communications, HSN Hopping
Radio Network Groupe Special Sequence Number
Temporary Mobile 90 HSPA High Speed
Identity GTP GPRS Tunneling Packet Access
GERAN Protocol HSS Home Subscriber
GSM EDGE 60 GTP-U GPRS Tunnelling Server RAN, GSM EDGE Protocol for User HSUPA High Radio Access Plane 95 Speed Uplink Packet Network GTS Go To Sleep Access
GGSN Gateway GPRS Signal (related to HTTP Hyper Text Support Node 65 WUS) Transfer Protocol
GLONASS GUMMEI Globally HTTPS Hyper
GLObal'naya Unique MME Identifier 100 Text Transfer Protocol
NAvigatsionnaya Secure (https is http/ 1.1 over SSL, 35 IMC IMS Credentials ISDN Integrated i.e. port 443) IMEI International Services Digital
I-Block Mobile Equipment Network
Information Block Identity 70 ISIM IM Services ICCID Integrated Circuit IMGI International Identity Module Card Identification 40 mobile group identity ISO International IAB Integrated Access IMPI IP Multimedia Organisation for and Backhaul Private Identity Standardisation ICIC Inter-Cell IMPU IP Multimedia 75 ISP Internet Service Interference PUblic identity Provider
Coordination 45 IMS IP Multimedia IWF Interworking- ID Identity, identifier Subsystem Function IDFT Inverse Discrete IMSI International I-WLAN Fourier Transform Mobile Subscriber 80 Interworking
IE Information Identity WLAN element 50 IoT Internet of Things Constraint length
IBE In-Band Emission IP Internet Protocol of the convolutional Ipsec IP Security, code, USIM Individual
IEEE Institute of Internet Protocol 85 key Electrical and Electronics Security kB Kilobyte (1000 Engineers 55 IP-CAN IP- bytes) IEI Information Connectivity Access kbps kilo-bits per
Element Identifier Network second
IEIDL Information IP-M IP Multicast 90 Kc Ciphering key Element Identifier IPv4 Internet Protocol Ki Individual
Data Length 60 Version 4 subscriber IETF Internet IPv6 Internet Protocol authentication key
Engineering Task Version 6 KPI Key Performance Force IR Infrared 95 Indicator
IF Infrastructure IS In Sync KQI Key Quality
IM Interference 65 IRP Integration Indicator
Measurement, Reference Point KSI Key Set Identifier
Intermodulation, ksps kilo-symbols per IP Multimedia 100 second KVM Kernel Virtual LTE Long Term MBSFN Machine 35 Evolution Multimedia
LI Layer 1 (physical LWA LTE-WLAN Broadcast multicast layer) aggregation 70 service Single Frequency
Ll-RSRP Layer 1 LWIP LTE/WLAN Network reference signal Radio Level Integration MCC Mobile Country received power 40 with IPsec Tunnel Code L2 Layer 2 (data link LTE Long Term MCG Master Cell Group layer) Evolution 75 MCOT Maximum
L3 Layer 3 (network M2M Machine-to- Channel Occupancy layer) Machine Time
LAA Licensed Assisted 45 MAC Medium Access MCS Modulation and Access Control (protocol coding scheme
LAN Local Area layering context) 80 MDAF Management Data Network MAC Message Analytics Function
LBT Listen Before authentication code MD AS Management Data Talk 50 (security/encryption Analytics Service
LCM LifeCycle context) MDT Minimization of Management MAC-A MAC used 85 Drive Tests LCR Low Chip Rate for authentication and ME Mobile Equipment LCS Location Services key agreement (TSG T MeNB master eNB LCID Logical 55 WG3 context) MER Message Error
Channel ID MAC-IMAC used for Ratio
LI Layer Indicator data integrity of 90 MGL Measurement Gap LLC Logical Link signalling messages (TSG Length Control, Low Layer T WG3 context) MGRP Measurement Gap Compatibility 60 MANO Repetition Period LPLMN Local Management and MIB Master PLMN Orchestration 95 Information Block,
LPP LTE Positioning MBMS Management Protocol Multimedia Information Base LSB Least Significant 65 Broadcast and Multicast MIMO Multiple Input Bit Service Multiple Output MLC Mobile Location 35 MSI Minimum System NC-JT Non- Centre Information, 70 Coherent Joint
MM Mobility MCH Scheduling Transmission Management Information NEC Network MME Mobility MSID Mobile Station Capability Exposure Management Entity 40 Identifier NE-DC NR-E- MN Master Node MSIN Mobile Station 75 UTRA Dual MnS Management Identification Connectivity Service Number NEF Network Exposure
MO Measurement MSISDN Mobile Function Object, Mobile 45 Subscriber ISDN NF Network Function
Originated Number 80 NFP Network MPBCH MTC MT Mobile Forwarding Path
Physical Broadcast Terminated, Mobile NFPD Network CHannel Termination Forwarding Path
MPDCCH MTC 50 MTC Machine-Type Descriptor
Physical Downlink Communications 85 NFV Network
Control CHannel mMTCmassive MTC, Functions MPDSCH MTC massive Machine- Virtualization
Physical Downlink Type Communications NFVI NFV
Shared CHannel 55 MU-MIMO Multi User Infrastructure MPRACH MTC MIMO 90 NFVO NFV Orchestrator
Physical Random MWUS MTC NG Next Generation,
Access CHannel wake-up signal, MTC Next Gen MPUSCH MTC wus NGEN-DC NG-RAN
Physical Uplink Shared 60 NACKNegative E-UTRA-NR Dual Channel Acknowledgement 95 Connectivity
MPLS Multiprotocol NAI Network Access NM Network Manager Label Switching Identifier NMS Network MS Mobile Station NAS Non-Access Management System MSB Most Significant 65 Stratum, Non- Access N-PoP Network Point of Bit Stratum layer 100 Presence
MSC Mobile Switching NCT Network NMIB, N-MIB Centre Connectivity Topology Narrowband MIB NPBCH 35 NS Network Service OSI Other System
Narrowband NSA Non-Standalone 70 Information Physical Broadcast operation mode OSS Operations
CHannel NSD Network Service Support System NPDCCH Descriptor OTA over-the-air
Narrowband 40 NSR Network Service PAPR Peak-to-Average Physical Downlink Record 75 Power Ratio
Control CHannel NSSAINetwork Slice PAR Peak to Average NPDSCH Selection Assistance Ratio
Narrowband Information PBCH Physical Physical Downlink 45 S-NNSAI Single- Broadcast Channel
Shared CHannel NSSAI 80 PC Power Control, NPRACH NSSF Network Slice Personal Computer
Narrowband Selection Function PCC Primary Physical Random NW Network Component Carrier,
Access CHannel 50 NWUS Narrowband Primary CC NPUSCH wake-up signal, 85 PCell Primary Cell
Narrowband Narrowband WUS PCI Physical Cell ID, Physical Uplink NZP Non-Zero Power Physical Cell
Shared CHannel O&M Operation and Identity NPSS Narrowband 55 Maintenance PCEF Policy and Primary ODU2 Optical channel 90 Charging
Synchronization Data Unit - type 2 Enforcement
Signal OFDM Orthogonal Function
NSSS Narrowband Frequency Division PCF Policy Control Secondary 60 Multiplexing Function
Synchronization OFDMA 95 PCRF Policy Control
Signal Orthogonal and Charging Rules
NR New Radio, Frequency Division Function Neighbour Relation Multiple Access PDCP Packet Data NRF NF Repository 65 OOB Out-of-band Convergence Protocol, Function OOS Out of Sync 100 Packet Data
NRS Narrowband OPEX OPerating Convergence Reference Signal EXpense Protocol layer PDCCH Physical 35 PNFR Physical Network PSSCH Physical
Downlink Control Function Record Sidelink Shared Channel POC PTT over Cellular 70 Channel
PDCP Packet Data PP, PTP Point-to- PSCell Primary SCell Convergence Protocol Point PSS Primary PDN Packet Data 40 PPP Point-to-Point Synchronization Network, Public Protocol Signal
Data Network PRACH Physical 75 PSTN Public Switched PDSCH Physical RACH Telephone Network
Downlink Shared PRB Physical resource PT-RS Phase-tracking Channel 45 block reference signal
PDU Protocol Data PRG Physical resource PTT Push-to-Talk Unit block group 80 PUCCH Physical
PEI Permanent ProSe Proximity Uplink Control Equipment Identifiers Services, Proximity- Channel PFD Packet Flow 50 Based Service PUSCH Physical Description PRS Positioning Uplink Shared P-GW PDN Gateway Reference Signal 85 Channel PHICH Physical PRR Packet Reception QAM Quadrature hybrid-ARQ indicator Radio Amplitude channel 55 PS Packet Services Modulation
PHY Physical layer PSBCH Physical QCI QoS class of PLMN Public Land Sidelink Broadcast 90 identifier Mobile Network Channel QCL Quasi co-location
PIN Personal PSDCH Physical QFI QoS Flow ID, Identification Number 60 Sidelink Downlink QoS Flow Identifier PM Performance Channel QoS Quality of Service Measurement PSCCH Physical 95 QPSK Quadrature PMI Precoding Matrix Sidelink Control (Quaternary) Phase Shift Indicator Channel Keying
PNF Physical Network 65 PSFCH Physical QZSS Quasi-Zenith Function Sidelink Feedback Satellite System
PNFD Physical Network Channel 100 RA-RNTI Random Function Descriptor Access RNTI RAB Radio Access RLC Radio Link RRM Radio Resource Bearer, Random Control, Radio Management
Access Burst 35 Link Control layer RS Reference Signal RACH Random Access RLC AM RLC 70 RSRP Reference Signal Channel Acknowledged Mode Received Power
RADIUS Remote RLC UM RLC RSRQ Reference Signal
Authentication Dial In Unacknowledged Mode Received Quality User Service 40 RLF Radio Link RSSI Received Signal RAN Radio Access Failure 75 Strength Indicator Network RLM Radio Link RSU Road Side Unit
RAND RANDom number Monitoring RSTD Reference Signal (used for RLM-RS Reference Time difference authentication) 45 Signal for RLM RTP Real Time RAR Random Access RM Registration 80 Protocol Response Management RTS Ready-To-Send
RAT Radio Access RMC Reference RTT Round Trip Time Technology Measurement Channel Rx Reception, RAU Routing Area 50 RMSI Remaining MSI, Receiving, Receiver Update Remaining Minimum 85 S1AP SI Application
RB Resource block, System Protocol Radio Bearer Information Sl-MME SI for the RBG Resource block RN Relay Node control plane group 55 RNC Radio Network Sl-U SI for the user
REG Resource Element Controller 90 plane Group RNL Radio Network S-GW Serving Gateway
Rel Release Layer S-RNTI SRNC REQ REQuest RNTI Radio Network Radio Network RF Radio Frequency 60 Temporary Identifier Temporary RI Rank Indicator ROHC RObust Header 95 Identity RIV Resource indicator Compression S-TMSI SAE value RRC Radio Resource Temporary Mobile
RL Radio Link Control, Radio Station Identifier 65 Resource Control SA Standalone layer 100 operation mode SAE System 35 SDP Session SiP System in Architecture Evolution Description Protocol 70 Package SAP Service Access SDSF Structured Data SL Sidelink Point Storage Function SLA Service Level
SAPD Service Access SDU Service Data Unit Agreement Point Descriptor 40 SEAF Security Anchor SM Session SAPI Service Access Function 75 Management Point Identifier SeNB secondary eNB SMF Session SCC Secondary SEPP Security Edge Management Function Component Carrier, Protection Proxy SMS Short Message Secondary CC 45 SFI Slot format Service SCell Secondary Cell indication 80 SMSF SMS Function SC-FDMA Single SFTD Space-Frequency SMTC SSB-based Carrier Frequency Time Diversity, SFN Measurement Timing
Division Multiple and frame timing Configuration
Access 50 difference SN Secondary Node,
SCG Secondary Cell SFN System Frame 85 Sequence Number Group Number or SoC System on Chip
SCM Security Context Single Frequency SON Self-Organizing Management Network Network SCS Subcarrier 55 SgNB Secondary gNB SpCell Special Cell Spacing SGSN Serving GPRS 90 SP-CSI-RNTISemi-
SCTP Stream Control Support Node Persistent CSI RNTI Transmission S-GW Serving Gateway SPS Semi-Persistent Protocol SI System Scheduling
SDAP Service Data 60 Information SQN Sequence number Adaptation Protocol, SI-RNTI System 95 SR Scheduling Service Data Adaptation Information RNTI Request Protocol layer SIB System SRB Signalling Radio SDL Supplementary Information Block Bearer Downlink 65 SIM Subscriber SRS Sounding
SDNF Structured Data Identity Module 100 Reference Signal Storage Network SIP Session Initiated SS Synchronization Function Protocol Signal SSB SS Block TA Timing Advance, TPC Transmit Power SSBRI SSB Resource 35 Tracking Area Control Indicator TAC Tracking Area 70 TP MI Transmitted
SSC Session and Code Precoding Matrix Service Continuity TAG Timing Advance Indicator SS-RSRP Group TR Technical Report
Synchronization 40 TAU Tracking Area TRP, TRxP Signal based Reference Update 75 Transmission Signal Received TB Transport Block Reception Point Power TBS Transport Block TRS Tracking SS-RSRQ Size Reference Signal
Synchronization 45 TBD To Be Defined TRx Transceiver Signal based Reference TCI Transmission 80 TS Technical Signal Received Configuration Indicator Specifications, Quality TCP Transmission Technical SS-SINR Communication Standard
Synchronization 50 Protocol TTI Transmission Signal based Signal to TDD Time Division 85 Time Interval Noise and Interference Duplex Tx Transmission, Ratio TDM Time Division Transmitting,
SSS Secondary Multiplexing Transmitter Synchronization 55 TDMATime Division U-RNTI UTRAN Signal Multiple Access 90 Radio Network
SSSG Search Space Set TE Terminal Temporary Group Equipment Identity
SSSIF Search Space Set TEID Tunnel End Point UART Universal Indicator 60 Identifier Asynchronous
SST Slice/Service TFT Traffic Flow 95 Receiver and Types Template Transmitter
SU-MIMO Single TMSI Temporary UCI Uplink Control User MIMO Mobile Subscriber Information SUL Supplementary 65 Identity UE User Equipment Uplink TNL Transport 100 UDM Unified Data Network Layer Management UDP User Datagram USS UE-specific VoIP Voice-over-IP, Protocol 35 search space Voice-over- Internet
UDR Unified Data UTRA UMTS Terrestrial Protocol Repository Radio Access VPLMN Visited
UDSF Unstructured Data UTRAN Universal 70 Public Land Mobile Storage Network Terrestrial Radio Network Function 40 Access Network VPN Virtual Private UICC Universal UwPTS Uplink Network Integrated Circuit Pilot Time Slot VRB Virtual Resource Card V2I Vehicle-to- 75 Block
UL Uplink Infrastruction WiMAX Worldwide
UM Unacknowledged 45 V2P Vehicle-to- Interoperability for
Mode Pedestrian Microwave Access
UML Unified Modelling V2V Vehicle-to- WLANWireless Local Language Vehicle 80 Area Network
UMTS Universal Mobile V2X Vehicle-to- WMAN Wireless Telecommunicatio 50 everything Metropolitan Area ns System VIM Virtualized Network UP User Plane Infrastructure Manager WPANWireless Personal
UPF User Plane VL Virtual Link, 85 Area Network Function VLAN Virtual LAN, X2-C X2-Control plane
URI Uniform Resource 55 Virtual Local Area X2-U X2-User plane Identifier Network XML extensible
URL Uniform Resource VM Virtual Machine Markup Language Locator VNF Virtualized 90 XRES EXpected user
URLLC Ultra- Network Function RESponse Reliable and Low 60 VNFFG VNF XOR exclusive OR Latency Forwarding Graph ZC Zadoff-Chu
USB Universal Serial VNFFGD VNF ZP Zero Power Bus Forwarding Graph
USIM Universal Descriptor Subscriber Identity 65 VNFM VNF Manager Module Terminology
For the purposes of the present document, the following terms and definitions are applicable to the examples and embodiments discussed herein.
The term “circuitry” as used herein refers to, is part of, or includes hardware components such as an electronic circuit, a logic circuit, a processor (shared, dedicated, or group) and/or memory (shared, dedicated, or group), an Application Specific Integrated Circuit (ASIC), a field-programmable device (FPD) (e.g., a field-programmable gate array (FPGA), a programmable logic device (PLD), a complex PLD (CPLD), a high-capacity PLD (HCPLD), a structured ASIC, or a programmable SoC), digital signal processors (DSPs), etc., that are configured to provide the described functionality. In some embodiments, the circuitry may execute one or more software or firmware programs to provide at least some of the described functionality. The term “circuitry” may also refer to a combination of one or more hardware elements (or a combination of circuits used in an electrical or electronic system) with the program code used to carry out the functionality of that program code. In these embodiments, the combination of hardware elements and program code may be referred to as a particular type of circuitry.
The term “processor circuitry” as used herein refers to, is part of, or includes circuitry capable of sequentially and automatically carrying out a sequence of arithmetic or logical operations, or recording, storing, and/or transferring digital data. Processing circuitry may include one or more processing cores to execute instructions and one or more memory structures to store program and data information. The term “processor circuitry” may refer to one or more application processors, one or more baseband processors, a physical central processing unit (CPU), a single-core processor, a dual-core processor, a triple-core processor, a quad-core processor, and/or any other device capable of executing or otherwise operating computer-executable instructions, such as program code, software modules, and/or functional processes. Processing circuitry may include more hardware accelerators, which may be microprocessors, programmable processing devices, or the like. The one or more hardware accelerators may include, for example, computer vision (CV) and/or deep learning (DL) accelerators. The terms “application circuitry” and/or “baseband circuitry” may be considered synonymous to, and may be referred to as, “processor circuitry.”
The term “interface circuitry” as used herein refers to, is part of, or includes circuitry that enables the exchange of information between two or more components or devices. The term “interface circuitry” may refer to one or more hardware interfaces, for example, buses, I/O interfaces, peripheral component interfaces, network interface cards, and/or the like.
The term “user equipment” or “UE” as used herein refers to a device with radio communication capabilities and may describe a remote user of network resources in a communications network. The term “user equipment” or “UE” may be considered synonymous to, and may be referred to as, client, mobile, mobile device, mobile terminal, user terminal, mobile unit, mobile station, mobile user, subscriber, user, remote station, access agent, user agent, receiver, radio equipment, reconfigurable radio equipment, reconfigurable mobile device, etc. Furthermore, the term “user equipment” or “UE” may include any type of wireless/wired device or any computing device including a wireless communications interface.
The term “network element” as used herein refers to physical or virtualized equipment and/or infrastructure used to provide wired or wireless communication network services. The term “network element” may be considered synonymous to and/or referred to as a networked computer, networking hardware, network equipment, network node, router, switch, hub, bridge, radio network controller, RAN device, RAN node, gateway, server, virtualized VNF, NFVI, and/or the like.
The term “computer system” as used herein refers to any type interconnected electronic devices, computer devices, or components thereof. Additionally, the term “computer system” and/or “system” may refer to various components of a computer that are communicatively coupled with one another. Furthermore, the term “computer system” and/or “system” may refer to multiple computer devices and/or multiple computing systems that are communicatively coupled with one another and configured to share computing and/or networking resources.
The term “appliance,” “computer appliance,” or the like, as used herein refers to a computer device or computer system with program code (e.g., software or firmware) that is specifically designed to provide a specific computing resource. A “virtual appliance” is a virtual machine image to be implemented by a hypervisor-equipped device that virtualizes or emulates a computer appliance or otherwise is dedicated to provide a specific computing resource.
The term “resource” as used herein refers to a physical or virtual device, a physical or virtual component within a computing environment, and/or a physical or virtual component within a particular device, such as computer devices, mechanical devices, memory space, processor/CPU time, processor/CPU usage, processor and accelerator loads, hardware time or usage, electrical power, input/output operations, ports or network sockets, channel/link allocation, throughput, memory usage, storage, network, database and applications, workload units, and/or the like. A “hardware resource” may refer to compute, storage, and/or network resources provided by physical hardware element(s). A “virtualized resource” may refer to compute, storage, and/or network resources provided by virtualization infrastructure to an application, device, system, etc. The term “network resource” or “communication resource” may refer to resources that are accessible by computer devices/systems via a communications network. The term “system resources” may refer to any kind of shared entities to provide services, and may include computing and/or network resources. System resources may be considered as a set of coherent functions, network data objects or services, accessible through a server where such system resources reside on a single host or multiple hosts and are clearly identifiable.
The term “channel” as used herein refers to any transmission medium, either tangible or intangible, which is used to communicate data or a data stream. The term “channel” may be synonymous with and/or equivalent to “communications channel,” “data communications channel,” “transmission channel,” “data transmission channel,” “access channel,” “data access channel,” “link,” “data link,” “carrier,” “radiofrequency carrier,” and/or any other like term denoting a pathway or medium through which data is communicated. Additionally, the term “link” as used herein refers to a connection between two devices through a RAT for the purpose of transmitting and receiving information.
The terms “instantiate,” “instantiation,” and the like as used herein refers to the creation of an instance. An “instance” also refers to a concrete occurrence of an object, which may occur, for example, during execution of program code.
The terms “coupled,” “communicatively coupled,” along with derivatives thereof are used herein. The term “coupled” may mean two or more elements are in direct physical or electrical contact with one another, may mean that two or more elements indirectly contact each other but still cooperate or interact with each other, and/or may mean that one or more other elements are coupled or connected between the elements that are said to be coupled with each other. The term “directly coupled” may mean that two or more elements are in direct contact with one another. The term “communicatively coupled” may mean that two or more elements may be in contact with one another by a means of communication including through a wire or other interconnect connection, through a wireless communication channel or link, and/or the like. The term “information element” refers to a structural element containing one or more fields. The term “field” refers to individual contents of an information element, or a data element that contains content.
The term “SMTC” refers to an SSB-based measurement timing configuration configured by SSB-MeasurementTimingConfiguration.
The term “SSB” refers to an SS/PBCH block.
The term “a “Primary Cell” refers to the MCG cell, operating on the primary frequency, in which the UE either performs the initial connection establishment procedure or initiates the connection re-establishment procedure.
The term “Primary SCG Cell” refers to the SCG cell in which the UE performs random access when performing the Reconfiguration with Sync procedure for DC operation.
The term “Secondary Cell” refers to a cell providing additional radio resources on top of a Special Cell for a UE configured with CA.
The term “Secondary Cell Group” refers to the subset of serving cells comprising the PSCell and zero or more secondary cells for a UE configured with DC.
The term “Serving Cell” refers to the primary cell for a UE in RRC CONNECTED not configured with CA/DC there is only one serving cell comprising of the primary cell.
The term “serving cell” or “serving cells” refers to the set of cells comprising the Special Cell(s) and all secondary cells for a UE in RRC_CONNECTED configured with CA/.
The term “Special Cell” refers to the PCell of the MCG or the PSCell of the SCG for DC operation; otherwise, the term “Special Cell” refers to the Pcell.
The term “application” may refer to a complete and deployable package, environment to achieve a certain function in an operational environment. The term “AI/ML application” or the like may be an application that contains some AI/ML models and application-level descriptions.
The term “machine learning” or “ML” refers to the use of computer systems implementing algorithms and/or statistical models to perform specific task(s) without using explicit instructions, but instead relying on patterns and inferences. ML algorithms build or estimate mathematical model(s) (referred to as “ML models” or the like) based on sample data (referred to as “training data,” “model training information,” or the like) in order to make predictions or decisions without being explicitly programmed to perform such tasks. Generally, an ML algorithm is a computer program that learns from experience with respect to some task and some performance measure, and an ML model may be any object or data structure created after an ML algorithm is trained with one or more training datasets. After training, an ML model may be used to make predictions on new datasets. Although the term “ML algorithm” refers to different concepts than the term “ML model,” these terms as discussed herein may be used interchangeably for the purposes of the present disclosure.
The term “machine learning model,” “ML model,” or the like may also refer to ML methods and concepts used by an ML-assisted solution. An “ML-assisted solution” is a solution that addresses a specific use case using ML algorithms during operation. ML models include supervised learning (e.g., linear regression, k-nearest neighbor (KNN), descision tree algorithms, support machine vectors, Bayesian algorithm, ensemble algorithms, etc.) unsupervised learning (e.g., K-means clustering, principle component analysis (PC A), etc.), reinforcement learning (e.g., Q-leaming, multi-armed bandit learning, deep RL, etc.), neural networks, and the like. Depending on the implementation a specific ML model could have many sub-models as components and the ML model may train all sub-models together. Separately trained ML models can also be chained together in an ML pipeline during inference. An “ML pipeline” is a set of functionalities, functions, or functional entities specific for an ML-assisted solution; an ML pipeline may include one or several data sources in a data pipeline, a model training pipeline, a model evaluation pipeline, and an actor. The “actor” is an entity that hosts an ML assisted solution using the output of the ML model inference). The term “ML training host” refers to an entity, such as a network function, that hosts the training of the model. The term “ML inference host” refers to an entity, such as a network function, that hosts model during inference mode (which includes both the model execution as well as any online learning if applicable). The ML-host informs the actor about the output of the ML algorithm, and the actor takes a decision for an action (an “action” is performed by an actor as a result of the output of an ML assisted solution). The term “model inference information” refers to information used as an input to the ML model for determining inference(s); the data used to train an ML model and the data used to determine inferences may overlap, however, “training data” and “inference data” refer to different concepts.

Claims

CLAIMS What is claimed is:
1. An apparatus comprising: memory to store updated radio access network (RAN) user equipment (UE) identification (ID) information; and processing circuitry, coupled with the memory, to: receive, from a near-real time RAN intelligent controller (near-RT RIC), a subscription or request for the updated RAN UE ID information; retrieve the updated RAN UE ID information from the memory; and encode a message for transmission to the near-RT RIC that includes the updated RAN UE ID information.
2. The apparatus of claim 1, wherein the updated RAN UE ID information is represented by an octet string.
3. The apparatus of claim 2, wherein the octet string has a size of eight characters.
4. The apparatus of any of claims 1-3, wherein the message is encoded for transmission via an E2 interface.
5. The apparatus of any of claims 1-4, wherein the subscription or request is received via an E2 interface.
6. The apparatus of any of claims 1-5, wherein the apparatus comprises a next- generation NodeB (gNB) implementing a control unit-control plane (CU-CP).
7. The apparatus of claim 6, wherein the gNB further implements a distributed unit (DU) and a control unit-user plane (CU-UP).
8. One or more computer-readable media storing instructions that, when executed by one or more processors, cause a next-generation NodeB (gNB) to: receive, from a near-real time RAN intelligent controller (near-RT RIC), a subscription or request for updated radio access network (RAN) user equipment (UE) identification (ID) information; determine the updated RAN UE ID information in response to the subscription or request; and encode a message for transmission to the near-RT RIC that includes the updated RAN UE ID information.
9. The one or more computer-readable media of claim 8, wherein the updated RAN UE ID information is represented by an octet string.
10. The one or more computer-readable media of claim 9, wherein the octet string has a size of eight characters.
11. The one or more computer-readable media of any of claims 8-10, wherein the message is encoded for transmission via an E2 interface.
12. The one or more computer-readable media of any of claims 8-11, wherein the subscription or request is received via an E2 interface.
13. The one or more computer-readable media of any of claims 8-12, wherein the gNB implements a control unit-control plane (CU-CP).
14. The one or more computer-readable media of claim 13, wherein the gNB further implements a distributed unit (DU) and a control unit-user plane (CU-UP).
15. One or more computer-readable media storing instructions that, when executed by one or more processors, cause a near-real time RAN intelligent controller (near-RT RIC) to: encode a message to a next-generation NodeB (gNB) that includes a subscription or request for updated radio access network (RAN) user equipment (UE) identification (ID) information; and receive, over an E2 interface, a response that includes the updated RAN UE ID information.
16. The one or more computer-readable media of claim 15, wherein the updated RAN UE ID information is represented by an octet string.
17. The one or more computer-readable media of claim 16, wherein the octet string has a size of eight characters.
18. The one or more computer-readable media of any of claims 15-17, wherein the message is encoded for transmission via an E2 interface.
19. The one or more computer-readable media of any of claims 15-18, wherein the message is directed to a control unit-control plane (CU-CP) implemented by the gNB.
PCT/US2021/036329 2020-06-09 2021-06-08 Enhancing ran ue id based ue identification in o-ran WO2021252443A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US17/921,296 US20230171592A1 (en) 2020-06-09 2021-06-08 Enhancing ran ue id based ue identification in o-ran
EP21821189.4A EP4162711A4 (en) 2020-06-09 2021-06-08 Enhancing ran ue id based ue identification in o-ran

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US202063036882P 2020-06-09 2020-06-09
US63/036,882 2020-06-09

Publications (1)

Publication Number Publication Date
WO2021252443A1 true WO2021252443A1 (en) 2021-12-16

Family

ID=78846520

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2021/036329 WO2021252443A1 (en) 2020-06-09 2021-06-08 Enhancing ran ue id based ue identification in o-ran

Country Status (3)

Country Link
US (1) US20230171592A1 (en)
EP (1) EP4162711A4 (en)
WO (1) WO2021252443A1 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115883278A (en) * 2022-09-30 2023-03-31 成都赛力斯科技有限公司 Software architecture based on whole vehicle domain control, signal processing method, vehicle and equipment
WO2023116332A1 (en) * 2021-12-21 2023-06-29 大唐移动通信设备有限公司 Positioning method and apparatus
WO2023196702A1 (en) * 2022-04-06 2023-10-12 Qualcomm Incorporated Service discovery and session establishment for machine-learning-based beam prediction in wireless communications
WO2023226622A1 (en) * 2022-05-23 2023-11-30 大唐移动通信设备有限公司 O-ran-based communication method and apparatus
WO2024015738A1 (en) * 2022-07-12 2024-01-18 Qualcomm Incorporated Techniques for application and accelerator communications of a distributed unit
WO2024053880A1 (en) * 2022-09-06 2024-03-14 삼성전자주식회사 Electrode device and method for subscription procedure
WO2024149162A1 (en) * 2023-01-10 2024-07-18 中国移动通信有限公司研究院 Information subscription method and apparatus, and communication device

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11464056B2 (en) * 2019-07-12 2022-10-04 Samsung Electronics Co., Ltd. Method and apparatus for identifying user in radio access network communication system
WO2022151144A1 (en) * 2021-01-14 2022-07-21 Apple Inc. 5g new radio (nr) network controlled small gap (ncsg)
GB2608268A (en) * 2021-06-10 2022-12-28 Samsung Electronics Co Ltd Improvements in and relating to cell configuration in a telecommunication system
US11871416B2 (en) * 2021-09-16 2024-01-09 Qualcomm Incorporated Multiplexing forward and reverse sidelink resource allocation for bidirectional communications
EP4175370A3 (en) * 2021-10-28 2023-08-30 Nokia Solutions and Networks Oy Power saving in radio access network

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018009340A1 (en) * 2016-07-05 2018-01-11 Intel Corporation Systems, methods and devices for control-user plane separation for 5g radio access networks
US20190239136A1 (en) * 2017-05-13 2019-08-01 Qualcomm Incorporated Enable a network-trigger change of network slices
US20190380037A1 (en) * 2017-06-27 2019-12-12 Allot Communications Ltd. System, Device, and Method of Detecting, Mitigating and Isolating a Signaling Storm

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018009340A1 (en) * 2016-07-05 2018-01-11 Intel Corporation Systems, methods and devices for control-user plane separation for 5g radio access networks
US20190239136A1 (en) * 2017-05-13 2019-08-01 Qualcomm Incorporated Enable a network-trigger change of network slices
US20190380037A1 (en) * 2017-06-27 2019-12-12 Allot Communications Ltd. System, Device, and Method of Detecting, Mitigating and Isolating a Signaling Storm

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
"3rd Generation Partnership Project; Technical Specification Group Radio Access Network; NG-RAN; E1 Application Protocol (E1AP) (Release 16)", 3GPP STANDARD; TECHNICAL SPECIFICATION; 3GPP TS 38.463, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. RAN WG3, no. V16.1.1, 9 April 2020 (2020-04-09), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France , pages 1 - 191, XP051893927 *
O-RAN SOFTWARE COMMUNITY: "OSC Use Case: Traffic Steering QoE OSC Use Cases", TRAFFIC STEERING QOE, O-RAN SOFTWARE COMMUNITY, 12 March 2019 (2019-03-12), pages 1 - 13, XP055882094, Retrieved from the Internet <URL:https://wiki.o-ran-sc.org/download/attachments/3604609/RSAC_Bronze_Use%20Case-Traffic%20Steering%20QoE.doc?api=v2> [retrieved on 20220120] *
See also references of EP4162711A4 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023116332A1 (en) * 2021-12-21 2023-06-29 大唐移动通信设备有限公司 Positioning method and apparatus
WO2023196702A1 (en) * 2022-04-06 2023-10-12 Qualcomm Incorporated Service discovery and session establishment for machine-learning-based beam prediction in wireless communications
WO2023226622A1 (en) * 2022-05-23 2023-11-30 大唐移动通信设备有限公司 O-ran-based communication method and apparatus
WO2024015738A1 (en) * 2022-07-12 2024-01-18 Qualcomm Incorporated Techniques for application and accelerator communications of a distributed unit
WO2024053880A1 (en) * 2022-09-06 2024-03-14 삼성전자주식회사 Electrode device and method for subscription procedure
CN115883278A (en) * 2022-09-30 2023-03-31 成都赛力斯科技有限公司 Software architecture based on whole vehicle domain control, signal processing method, vehicle and equipment
CN115883278B (en) * 2022-09-30 2024-05-24 重庆赛力斯凤凰智创科技有限公司 Software architecture product based on whole vehicle domain control, signal processing method, automobile and equipment
WO2024149162A1 (en) * 2023-01-10 2024-07-18 中国移动通信有限公司研究院 Information subscription method and apparatus, and communication device

Also Published As

Publication number Publication date
US20230171592A1 (en) 2023-06-01
EP4162711A1 (en) 2023-04-12
EP4162711A4 (en) 2024-07-03

Similar Documents

Publication Publication Date Title
US20230171592A1 (en) Enhancing ran ue id based ue identification in o-ran
US20230164598A1 (en) Self-organizing network coordination and energy saving assisted by management data analytics
US20230163984A1 (en) User equipment (ue) route selection policy (usrp) ue in an evolved packet system (eps)
WO2022165373A1 (en) Data policy admin function in non-real time (rt) radio access network intelligent controller (ric)
US20240007314A1 (en) Converged charging for edge enabling resource usage and application context transfer
US20230171168A1 (en) Supporting multiple application function sessions with required group quality of service (qos) provided by machine learning model provider application function
US20240251366A1 (en) Scaling factor design for layer 1 reference signal received power (l1-rsrp) measurement period
US20240235775A1 (en) Configuration and collision handling for simultaneous uplink transmission using multiple antenna panels
US20240214272A1 (en) A1 policy functions for open radio access network (o-ran) systems
US20240162955A1 (en) Beamforming for multiple-input multiple-output (mimo) modes in open radio access network (o-ran) systems
US20240187340A1 (en) Enhanced service classification for service function chaining in next generation cellular networks
WO2022094039A1 (en) Computing offloading for next generation cellular networks
EP4201004A1 (en) Ue identification using its source ip address
WO2022031382A1 (en) Random access channel (rach) performance measurements to support rach optimization for 5g networks
US20230319773A1 (en) A1 enrichment information for user equipment (ue) physical positioning information
US20240275552A1 (en) Positioning bandwidth aggregation of positioning reference signal (prs) and sounding reference signal (srs)
US20240259277A1 (en) Edge computing network deployment for fifth-generation (5g) systems
US20240022616A1 (en) Webrtc signaling and data channel in fifth generation (5g) media streaming
US20230422038A1 (en) Cyber attack detection function
US20240251274A1 (en) Pre-configured measurement gap status indication to a user equipment (ue)
US20240223393A1 (en) System and information for charging for edge application server (eas) deployment
WO2024064534A1 (en) Non-grid of beams (gob) beamforming control and policy over e2 interface
WO2024211510A1 (en) Measurement delay for multi-receive chain simultaneous reception
WO2024186539A1 (en) User equipment (ue) route selection policy provisioning in evolved packet system and fifth generation system interworking
WO2024173074A1 (en) Time tracking for uplink (ul) transmission configuration indicator (tci) state switch for cell with different physical cell identifier (pci)

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21821189

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2021821189

Country of ref document: EP

Effective date: 20230109