WO2022083880A1 - Classes de priorité pour des procédures d'accès aléatoire en fonction de la tranche de réseau et de la catégorie d'accès - Google Patents
Classes de priorité pour des procédures d'accès aléatoire en fonction de la tranche de réseau et de la catégorie d'accès Download PDFInfo
- Publication number
- WO2022083880A1 WO2022083880A1 PCT/EP2020/079940 EP2020079940W WO2022083880A1 WO 2022083880 A1 WO2022083880 A1 WO 2022083880A1 EP 2020079940 W EP2020079940 W EP 2020079940W WO 2022083880 A1 WO2022083880 A1 WO 2022083880A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- priority class
- access
- random
- class information
- priority
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 191
- 238000004590 computer program Methods 0.000 claims description 67
- 230000015654 memory Effects 0.000 claims description 47
- 230000011664 signaling Effects 0.000 claims description 27
- 238000012913 prioritisation Methods 0.000 claims description 25
- 230000005540 biological transmission Effects 0.000 claims description 16
- 230000000977 initiatory effect Effects 0.000 claims description 7
- 230000001960 triggered effect Effects 0.000 claims description 7
- 230000006870 function Effects 0.000 description 29
- 238000004891 communication Methods 0.000 description 14
- 230000004044 response Effects 0.000 description 11
- 238000007726 management method Methods 0.000 description 10
- 238000010586 diagram Methods 0.000 description 8
- 102100039292 Cbp/p300-interacting transactivator 1 Human genes 0.000 description 6
- 101000888413 Homo sapiens Cbp/p300-interacting transactivator 1 Proteins 0.000 description 6
- 230000007246 mechanism Effects 0.000 description 5
- 101150096310 SIB1 gene Proteins 0.000 description 4
- 238000013459 approach Methods 0.000 description 4
- 230000008901 benefit Effects 0.000 description 3
- 238000001514 detection method Methods 0.000 description 3
- 239000000835 fiber Substances 0.000 description 3
- GVVPGTZRZFNKDS-JXMROGBWSA-N geranyl diphosphate Chemical compound CC(C)=CCC\C(C)=C\CO[P@](O)(=O)OP(O)(O)=O GVVPGTZRZFNKDS-JXMROGBWSA-N 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 102100022734 Acyl carrier protein, mitochondrial Human genes 0.000 description 2
- 101000678845 Homo sapiens Acyl carrier protein, mitochondrial Proteins 0.000 description 2
- 239000000969 carrier Substances 0.000 description 2
- 230000001413 cellular effect Effects 0.000 description 2
- 230000001419 dependent effect Effects 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000002955 isolation Methods 0.000 description 2
- 230000007774 longterm Effects 0.000 description 2
- 230000004913 activation Effects 0.000 description 1
- 230000006978 adaptation Effects 0.000 description 1
- 230000001143 conditioned effect Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 230000001902 propagating effect Effects 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/08—Non-scheduled access, e.g. ALOHA
- H04W74/0833—Random access procedures, e.g. with 4-step access
Definitions
- Exemplary embodiments herein relate generally to wireless communications and, more specifically, relates to random access procedures for user equipment to attempt to access wireless networks.
- a wireless network has a certain amount of network resources available for use to support user equipment (UEs) access to and communication with the network.
- UEs user equipment
- One relatively recent topic of exploration in this area has been to “slice” these resources into slices, where the slices can have different resources and be assigned for different reasons.
- the slices could be customer based, e.g., customers require guaranteed resources.
- the slices could be services based, e.g., different services require different quality of services.
- the slices can, however, create issues when UEs perform random access procedures, which are performed for the UEs to access and connect to the network.
- a method in an exemplary embodiment, includes determining by a user equipment priority class information for performing a random-access procedure. The method also includes performing by the user equipment at least a part of the random-access procedure based on the priority class information.
- An additional exemplary embodiment includes a computer program, comprising code for performing the method of the previous paragraph, when the computer program is run on a processor.
- the computer program according to this paragraph wherein the computer program is a computer program product comprising a computer-readable medium bearing computer program code embodied therein for use with a computer.
- Another example is the computer program according to this paragraph, wherein the program is directly loadable into an internal memory of the computer.
- An exemplary apparatus includes one or more processors and one or more memories including computer program code.
- the one or more memories and the computer program code are configured to, with the one or more processors, cause the apparatus to perform operations comprising: determining by a user equipment priority class information for performing a random-access procedure; and performing by the user equipment at least a part of the random-access procedure based on the priority class information.
- An exemplary computer program product includes a computer-readable storage medium bearing computer program code embodied therein for use with a computer.
- the computer program code includes: code for determining by a user equipment priority class information for performing a random-access procedure; and code for performing by the user equipment at least a part of the random-access procedure based on the priority class information.
- an apparatus comprises means for performing: determining by a user equipment priority class information for performing a random-access procedure; and performing by the user equipment at least a part of the randomaccess procedure based on the priority class information.
- a method in an exemplary embodiment, includes generating, by a network node in a wireless network, priority class information for a user equipment to use for a random-access procedure. The method further includes sending, by the network node, the priority class information toward the user equipment.
- An additional exemplary embodiment includes a computer program, comprising code for performing the method of the previous paragraph, when the computer program is run on a processor.
- the computer program according to this paragraph wherein the computer program is a computer program product comprising a computer-readable medium bearing computer program code embodied therein for use with a computer.
- Another example is the computer program according to this paragraph, wherein the program is directly loadable into an internal memory of the computer.
- An exemplary apparatus includes one or more processors and one or more memories including computer program code.
- the one or more memories and the computer program code are configured to, with the one or more processors, cause the apparatus to perform operations comprising: generating, by a network node in a wireless network, priority class information for a user equipment to use for a random-access procedure; and sending, by the network node, the priority class information toward the user equipment.
- An exemplary computer program product includes a computer-readable storage medium bearing computer program code embodied therein for use with a computer.
- the computer program code includes: code for generating, by a network node in a wireless network, priority class information for a user equipment to use for a random-access procedure; and code for sending, by the network node, the priority class information toward the user equipment.
- an apparatus comprises means for performing: generating, by a network node in a wireless network, priority class information for a user equipment to use for a random-access procedure; and sending, by the network node, the priority class information toward the user equipment.
- FIG. 1 is a block diagram of one possible and non-limiting exemplary system in which the exemplary embodiments may be practiced;
- FIGS. 2A-2D illustrate various RA procedures, where FIG. 2A illustrates a CBRA with 4-step RA type, FIG. 2B illustrates CBRA with 2-step RA type, FIG. 2C illustrates CFRA with 4-step RA type, and FIG. 2D illustrates CFRA with 2-step RA type;
- FIG. 3 is a signaling diagram illustrating a procedure for slice-specific RA priority classes initiation and use for an MO access attempt, in accordance with an exemplary embodiment
- FIG. 4A illustrates an exemplary IE carrying a field used for implementing an exemplary embodiment
- FIG. 4B is a table defining the field from FIG. 4A;
- FIG. 5 is a logic flow diagram performed by a user equipment for using priority classes for random access procedures, and illustrates the operation of an exemplary method or methods, a result of execution of computer program instructions embodied on a computer readable memory, functions performed by logic implemented in hardware, and/or interconnected means for performing functions in accordance with exemplary embodiments; and
- FIG. 6 is a logic flow diagram performed by a network node for using priority classes for random access procedures, and illustrates the operation of an exemplary method or methods, a result of execution of computer program instructions embodied on a computer readable memory, functions performed by logic implemented in hardware, and/or interconnected means for performing functions in accordance with exemplary embodiments.
- the exemplary embodiments herein describe techniques for priority classes for random access procedures. Additional description of these techniques is presented after a system into which the exemplary embodiments may be used is described.
- FIG. 1 shows a block diagram of one possible and nonlimiting exemplary system in which the exemplary embodiments may be practiced.
- a user equipment (UE) 110 radio access network (RAN) node 170, and network element(s) 190 are illustrated.
- a user equipment (UE) 110 is in wireless communication with a wireless network 100.
- a UE is a wireless, typically mobile device that can access a wireless network.
- the UE 110 includes one or more processors 120, one or more memories 125, and one or more transceivers 130 interconnected through one or more buses 127. Each of the one or more transceivers 130 includes a receiver, Rx, 132 and a transmitter, Tx, 133.
- the one or more buses 127 may be address, data, or control buses, and may include any interconnection mechanism, such as a series of lines on a motherboard or integrated circuit, fiber optics or other optical communication equipment, and the like.
- the one or more transceivers 130 are connected to one or more antennas 128.
- the one or more memories 125 include computer program code 123.
- the UE 110 includes a control module 140, comprising one of or both parts 140-1 and/or 140-2, which may be implemented in a number of ways.
- the control module 140 may be implemented in hardware as control module 140-1, such as being implemented as part of the one or more processors 120.
- the control module 140-1 may be implemented also as an integrated circuit or through other hardware such as a programmable gate array.
- control module 140 may be implemented as control module 140-2, which is implemented as computer program code 123 and is executed by the one or more processors 120.
- the one or more memories 125 and the computer program code 123 may be configured to, with the one or more processors 120, cause the user equipment 110 to perform one or more of the operations as described herein.
- the UE 110 communicates with RAN node 170 via a wireless link 111.
- the RAN node 170 is a base station that provides access by wireless devices such as the UE 110 to the wireless network 100.
- the RAN node 170 may be, for instance, a base station for 5G, also called New Radio (NR).
- the RAN node 170 may be a NG-RAN node, which is defined as either a gNB or an ng-eNB.
- the RAN node 170 is assumed to be gNB 170, though this is merely exemplary.
- a gNB is a node providing NR user plane and control plane protocol terminations towards the UE, and connected via the NG interface to a 5GC (e.g., the network element(s) 190).
- priority classes may be determined by the network 100, such as the gNB 170 (and/or other network element(s) 190). It is the network 100 that decides to allocate priorities for slices/access categories. That is, since the network provides (e.g., NR) user plane and control plane protocol terminations towards the UE, the network can decide to assign a (higher) priority for random access, e.g., only for the terminations associated with slicing/access categories. Any configuration that is designed for slices or access categories (e.g., assigned as values 32-63 in certain examples below) may be assigned higher priority compared to other access attempts. Additional details are provided below.
- the ng- eNB is a node providing E-UTRA user plane and control plane protocol terminations towards the UE, and connected via the NG interface to the 5GC.
- the NG-RAN node may include multiple gNBs, which may also include a central unit (CU) (gNB-CU) 196 and distributed unit(s) (DUs) (gNB-DUs), of which DU 195 is shown.
- CU central unit
- DUs distributed unit
- the DU may include or be coupled to and control a radio unit (RU).
- the gNB-CU is a logical node hosting RRC, SDAP and PDCP protocols of the gNB or RRC and PDCP protocols of the en-gNB that controls the operation of one or more gNB-DUs.
- the gNB-CU terminates the Fl interface connected with the gNB-DU.
- the Fl interface is illustrated as reference 198, although reference 198 also illustrates a link between remote elements of the RAN node 170 and centralized elements of the RAN node 170, such as between the gNB-CU 196 and the gNB-DU 195.
- the gNB-DU is a logical node hosting RLC, MAC and PHY layers of the gNB or en-gNB, and its operation is partly controlled by gNB-CU.
- One gNB-CU supports one or multiple cells.
- One cell is supported by one gNB-DU.
- the gNB-DU terminates the Fl interface 198 connected with the gNB-CU.
- the DU 195 is considered to include the transceiver 160, e.g., as part of an RU, but some examples of this may have the transceiver 160 as part of a separate RU, e.g., under control of and connected to the DU 195.
- the RAN node 170 may also be an eNB (evolved NodeB) base station, for LTE (long term evolution), or any other suitable base station.
- eNB evolved NodeB
- the RAN node 170 includes one or more processors 152, one or more memories 155, one or more network interfaces (N/W I/F(s)) 161, and one or more transceivers 160 interconnected through one or more buses 157.
- Each of the one or more transceivers 160 includes a receiver, Rx, 162 and a transmitter, Tx, 163.
- the one or more transceivers 160 are connected to one or more antennas 158.
- the one or more memories 155 include computer program code 153.
- the CU 196 may include the processor(s) 152, memories 155, and network interfaces 161. Note that the DU 195 may also contain its own memory/memories and processor(s), and/or other hardware, but these are not shown.
- the RAN node 170 includes a control module 150, comprising one of or both parts 150-1 and/or 150-2, which may be implemented in a number of ways.
- the control module 150 may be implemented in hardware as control module 150-1, such as being implemented as part of the one or more processors 152.
- the control module 150-1 may be implemented also as an integrated circuit or through other hardware such as a programmable gate array.
- the control module 150 may be implemented as control module 150-2, which is implemented as computer program code 153 and is executed by the one or more processors 152.
- the one or more memories 155 and the computer program code 153 are configured to, with the one or more processors 152, cause the RAN node 170 to perform one or more of the operations as described herein.
- the functionality of the control module 150 may be distributed, such as being distributed between the DU 195 and the CU 196, or be implemented solely in the DU 195.
- the one or more network interfaces 161 communicate over a network such as via the links 176 and 131.
- Two or more RAN nodes 170 communicate using, e.g., link 176.
- the link 176 may be wired or wireless or both and may implement, e.g., an Xn interface for 5G, an X2 interface for LTE, or other suitable interface for other standards.
- the one or more buses 157 may be address, data, or control buses, and may include any interconnection mechanism, such as a series of lines on a motherboard or integrated circuit, fiber optics or other optical communication equipment, wireless channels, and the like.
- the one or more transceivers 160 may be implemented as a remote radio head (RRH) 195 for LTE or a distributed unit (DU) 195 for gNB implementation for 5G, with the other elements of the RAN node 170 possibly being physically in a different location from the RRH/DU, and the one or more buses 157 could be implemented in part as, e.g., fiber optic cable or other suitable network connection to connect the other elements (e.g., a central unit (CU), gNB-CU) of the RAN node 170 to the RRH/DU 195.
- Reference 198 also indicates those suitable network link(s).
- each cell performs functions, but it should be clear that the base station that forms the cell will perform the functions.
- the cell makes up part of a base station. That is, there can be multiple cells per base station. For instance, there could be three cells for a single carrier frequency and associated bandwidth, each cell covering one-third of a 360 degree area so that the single base station’s coverage area covers an approximate oval or circle.
- each cell can correspond to a single carrier and a base station may use multiple carriers. So if there are three 120 degree cells per carrier and two carriers, then the base station has a total of 6 cells.
- the wireless network 100 may include a network element or elements 190 that may include core network functionality, and which provides connectivity via a link or links 181 with a data network 191, such as a telephone network and/or a data communications network (e.g., the Internet).
- a data network 191 such as a telephone network and/or a data communications network (e.g., the Internet).
- core network functionality for 5G may include access and mobility management function(s) (AMF(s)) and/or user plane functions (UPF(s)) and/or session management function(s) (SMF(s)).
- AMF(s) access and mobility management function(s)
- UPF(s) user plane functions
- SMF(s) session management function
- Such core network functionality for LTE may include MME (Mobility Management Entity)/SGW (Serving Gateway) functionality. These are merely exemplary functions that may be supported by the network element(s) 190, and note that both 5G and LTE functions might be supported.
- the RAN node 170 is coupled via a link 131 to a network element 190.
- the link 131 may be implemented as, e.g., an NG interface for 5G, or an SI interface for LTE, or other suitable interface for other standards.
- the network element 190 includes one or more processors 175, one or more memories 171, and one or more network interfaces (N/W I/F(s)) 180, interconnected through one or more buses 185.
- the one or more memories 171 include computer program code 173.
- the one or more memories 171 and the computer program code 173 are configured to, with the one or more processors 175, cause the network element 190 to perform one or more operations.
- the wireless network 100 may implement network virtualization, which is the process of combining hardware and software network resources and network functionality into a single, software-based administrative entity, a virtual network.
- Network virtualization involves platform virtualization, often combined with resource virtualization.
- Network virtualization is categorized as either external, combining many networks, or parts of networks, into a virtual unit, or internal, providing network-like functionality to software containers on a single system. Note that the virtualized entities that result from the network virtualization are still implemented, at some level, using hardware such as processors 152 or 175 and memories 155 and 171, and also such virtualized entities create technical effects.
- the computer readable memories 125, 155, and 171 may be of any type suitable to the local technical environment and may be implemented using any suitable data storage technology, such as semiconductor based memory devices, flash memory, magnetic memory devices and systems, optical memory devices and systems, fixed memory and removable memory.
- the computer readable memories 125, 155, and 171 may be means for performing storage functions.
- the processors 120, 152, and 175 may be of any type suitable to the local technical environment, and may include one or more of general purpose computers, special purpose computers, microprocessors, digital signal processors (DSPs) and processors based on a multi-core processor architecture, as non-limiting examples.
- the processors 120, 152, and 175 may be means for performing functions, such as controlling the UE 110, RAN node 170, and other functions as described herein.
- the various embodiments of the user equipment 110 can include, but are not limited to, cellular telephones such as smart phones, tablets, personal digital assistants (PDAs) having wireless communication capabilities, portable computers having wireless communication capabilities, vehicles with a modem device for wireless V2X (vehicle-to- everything) communication, image capture devices such as digital cameras having wireless communication capabilities, gaming devices having wireless communication capabilities, music storage and playback appliances having wireless communication capabilities, Internet appliances (including Internet of Things, loT, devices) permitting wireless Internet access and possibly browsing, loT devices with sensors and/or actuators for automation applications with wireless communication tablets with wireless communication capabilities, as well as portable units or terminals that incorporate combinations of such functions.
- cellular telephones such as smart phones, tablets, personal digital assistants (PDAs) having wireless communication capabilities, portable computers having wireless communication capabilities, vehicles with a modem device for wireless V2X (vehicle-to- everything) communication
- image capture devices such as digital cameras having wireless communication capabilities
- gaming devices having wireless communication capabilities
- music storage and playback appliances having wireless communication capabilities
- NR supports Network Slicing.
- General requirements, as per TS 38.300 see, e.g., 3GPP TS 38.300 V16.3.0 (2020-09)), state the following: _
- access-barring control To enable fast access to a cell, two access control mechanisms are considered: (1) access-barring control; or (2) random-access control.
- TS 24.501 (see, e.g., 3GPP TS 24.501 VI 7.0.0 (2020-09)) specifies how each UE’s access attempt is categorized in a Non- Access Stratum (NAS) layer. There are 32 access category values that are reserved for operator use and can be associated with a slice identifier (e.g., S-NSSAI), see TS 24.501, subclause 4.5.3.
- NAS Non- Access Stratum
- the UE can determine whether an access attempt for a given slice is authorized based on the broadcasted barring information, since a slice, for which access attempt is issued, corresponds to an access category. Once the barring check succeeds, the UE initiates a random-access procedure.
- FIGS. 2A-2D illustrate various RA procedures (reference: Figure 9.2.6-1 in 3GPP TS 38.300), where FIG. 2A illustrates a CBRA with 4-step RA type, FIG. 2B illustrates CBRA with 2-step RA type, FIG. 2C illustrates CFRA with 4-step RA type, and FIG. 2D illustrates CFRA with 2-step RA type.
- the UE selects the type of random access at initiation of the random-access procedure based on network configuration, which can be realized either by common or dedicated signaling.
- the MSG1 of the 4-step RA type includes a preamble on PRACH, see step 1. After MSG1 transmission, the UE monitors for a response from the network within a configured window. The gNB 170 responds in step 2 with an RA response, and the UE 110 in step 3 sends a scheduled transmission. In step 4, the gNB 170 responds with a contention resolution.
- a dedicated preamble for MSG1 transmission is assigned by the network (see step 0 of FIG. 2C) and upon receiving random access response from the network, the UE ends the random-access procedure as shown in FIG. 2C.
- the UE upon reception of the random-access response, the UE sends (step 3 in FIG. 2A) MSG3 using the UL grant scheduled in the response and monitors contention resolution as shown in FIG. 2A. If contention resolution (step 4 in FIG. 2A) is not successful after MSG3 (re)transmission(s), the UE goes back to MSG1 transmission.
- the MS GA of the 2-step RA type includes a preamble on PRACH and a payload on PUSCH.
- the UE 110 monitors for a response from the network within a configured window.
- CFRA a dedicated preamble and PUSCH resource are configured for MSGA transmission and, upon receiving the network response (see step B of FIG. 2D), the UE ends the random-access procedure as shown in FIG. 4D.
- CBRA if contention resolution (see step B of FIG. 2B) is successful upon receiving the network response, the UE 110 ends the random-access procedure as shown in FIG. 2B.
- a UE supporting and requesting a certain slice does not distinguish different RACH configurations for different slices, since the random-access procedure and gNB resources management is slice information agnostic.
- Network slicing mechanisms defined since Rel-15 assume resource isolation support: it should be possible to fully dedicate gNB resources to a certain slice, however how gNB supports resource isolation are implementation-dependent.
- RA priority classes can be assigned to access categories, for instance, to enable special priorities for certain access categories.
- the RA priority classes may also be assigned to slices to enable slice-specific access during an RA procedure.
- the RA priority classes may also be assigned to slices to enable slice-specific access before RA procedure and applied during RA procedure.
- Access category assignment to slices is also proposed in some exemplary embodiments to perform slice-specific access control, and assigning RA priority classes to access categories may also be used to assign RA priority classes to slices.
- an RA access priority class may be introduced by via one or more of the following examples:
- RA resources e.g., a set of preambles and/or set of ROs and/or set of RACH configurations
- RA prioritization parameters e.g., backoff scaling factor, power ramping step, message power offset for group B preambles, maximum transmission attempts, and the like.
- the gNB 170 broadcasts the parameters for the RA priority classes. It is possible that gNB starts broadcasting RA priority class-specific parameters upon load detection on a (e.g., set of) operator-defined access category(ies).
- the NW can provide, for the UE for a set of cells (e.g., within UE’s RAN area), the parameters for the RA priority classes over dedicated signaling.
- the RA priority can be applied to certain types of RA procedures. These procedures include handover or beam failure recovery procedures. The priority for RA triggered by these procedures could be higher than priority for RA triggered by other procedures.
- the gNB 170 can provide the parameters over Random Access Response (RAR), e.g., in response to a sudden increase in RACH load.
- RAR Random Access Response
- Such a configuration could be limited, e.g., to indication to ignore a backoff indication (BI) contained in the RAR for certain RA priority class(es).
- BI backoff indication
- Concerning backoff in general, if the UE attempts to access the RACH and experiences a collision, the backoff is a time period the UE uses to back off from performing another access. If, by contrast, the backoff set to zero or ignored, this would mean the UE does not have to wait. Instead, after failing the first attempt of the initial access, the UE tries again immediately to access the RACH.
- RA priority class there can be a configuration in the UEs as to which RA priority class is to be used for which access category(ies) (or slices).
- the configuration could be pre-provisioned to the UEs, e.g., through dedicated signaling, broadcast signaling, pre-configured, or via other options.
- Pre-configured means, e.g., set in standard or, e.g., pre-provisioned into the SIM by an MNO or the like.
- the configuration could be signaled, e.g., in the system information broadcast by the gNB, for a specific access category(ies) or slice(s).
- the RA is triggered for certain access category (or slice)
- the UE uses the RA priority class according to this configuration.
- a UE may use the RA resources in the following ways after selecting the RA priority class for an RA procedure (this could be also configurable by the NW):
- the UE may only use the RA resources assigned for that RA priority class; or
- the UE may use the RA resources assigned for that RA priority class or RA resources assigned to any lower priority RA class(es).
- One exemplary advantage of approach (a) is that this approach enables use of totally separate RA resources for RA priority classes.
- One exemplary advantage of approach (b) is that this approach enables more efficient of use of RA resources as well as lowers the chances of collision for the UE using higher priority RA class.
- FIG. 3 is a signaling diagram illustrating a procedure for slice-specific RA priority classes initiation and use for an MO access attempt.
- FIG. 3 also illustrates the operation of an exemplary method or methods, a result of execution of computer program instructions embodied on a computer readable memory, functions performed by logic implemented in hardware, and/or interconnected means for performing functions in accordance with exemplary embodiments. For the operations in FIG. 3,
- the UE 110 is assumed to be under control of the control module 140
- the gNB 170 is assumed to be under control of the control module 150
- the corresponding control modules 140/150 contain the circuitry (and possibly computer-readable code executed on the circuitry) and at least some of the means for performing the functions described herein.
- the gNB 170 broadcasts common RACH configuration parameters. See signaling 310, where the gNB sends SIB1 in RRC signaling, with common RA parameters but without RA priority classes.
- the gNB detects overload on a (e.g., set of) operator-defined access category(ies) that correspond to slices (e.g., access categories having values in the 32-63 range have been associated with a S-NSSAI). This occurs in block 320, via a resource management function on the gNB 170.
- the condition is overload detection for access categories 32-26 in this example.
- Each access category can get own configuration, depending on gNB configuration and potential decision to prioritize this access category.
- Block 320 also includes a configuration validation, where the gNB 170 performs generating configuration with random access priority classes. This is part of reference 330, where the gNB 170 configures (config) activation for slice-specific RA priority classes.
- the gNB 170 Based at least on the condition occurring, the gNB 170 triggers slice-based configuration with RA priority classes.
- the gNB broadcasts (see signaling 340) SIB1 with serving cell common configuration, the contents of which facilitate resource management for slices as the examples below indicate.
- the gNB prioritizes one or more access categories from set of operator-defined access categories.
- the configuration is signaled by, e.g., extending cell-specific common RACH configuration parameters for access categories that had been associated with a S-NSSAIs (e.g., from access categories range: 32-64), or RACH configuration parameters explicitly for slices (e.g., S-NSSAIs), see FIG. 3.
- the cell specific configuration may be signaled as access categories-specific RACH configuration or slice-specific RACH configuration (e.g., distinguished from a common set of parameters).
- the parameters within the configuration may reuse existing randomaccess methodology. That is, configuration contents enable scaling the power ramping and periodicity and/or offsetting the time domain position of the RACH occasions.
- the UE acquires and stores slice-based configuration with RA priority classes. This is illustrated in FIG 3 in block 350, where the UE acquires and maintains the information.
- the UE detects an access attempt (e.g., a MO call) and a corresponding random-access procedure is initiated (see reference 380) for an operator-defined access category (e.g., access category from 32-63) or slice identifier (e.g., S-NSSAI).
- an access attempt e.g., a MO call
- a corresponding random-access procedure is initiated (see reference 380) for an operator-defined access category (e.g., access category from 32-63) or slice identifier (e.g., S-NSSAI).
- an operator-defined access category e.g., access category from 32-63
- slice identifier e.g., S-NSSAI
- the UE applies slice-based configuration with RA priority classes random access operation as per the following:
- the UE may decide to apply 2-step RA type upon detection the randomaccess procedure is initiated for an operator-defined access category (e.g., access category from 32-63); or
- the UE proceeds with RA procedure, applying RA parameters from slicespecific RA priority class configuration.
- option (a) above was selected by the UE 110.
- UE sends MSG1 or MSG3, see FIG. 2A or 2C and signaling 370, toward the gNB.
- FIG. 4A this figure illustrates an exemplary IE (BWP-
- the BWP-UplinkCommon IE has a field rach-Config for an Access Category from range 32-63, conditioned by ‘LoadedACOnly’, which defines network circumstance(s) to send the field and is described in FIG. 4B.
- FIG. 4B is a table defining the field from FIG. 4 A.
- the presence of the LoadedACOnly field is conditional (Cond in FIG. 4A) and is optionally present.
- the field is optionally present in a cell that detected an overload on one or more Access Categories 32-64. It is absent otherwise.
- FIG. 5 is a logic flow diagram performed by a user equipment for using priority classes for random access procedures. This figure illustrates the operation of an exemplary method or methods, a result of execution of computer program instructions embodied on a computer readable memory, functions performed by logic implemented in hardware, and/or interconnected means for performing functions in accordance with exemplary embodiments.
- the blocks in FIG. 5 and the examples below for this figure are assumed to be performed by a UE 110, e.g., under control of the control module 140.
- the UE 110 determines priority class information for performing a random-access procedure.
- the UE 110 performs, in block 520, at least a part of the randomaccess procedure based on the priority class information.
- Example 2 The method of example 1 , wherein the priority class information corresponds to a priority class, and the priority class corresponds to one or more access categories.
- Example 3 The method of example 2, wherein:
- the priority class information corresponds to a plurality of priority classes, and the priority classes correspond to one or more access categories;
- determining by a user equipment priority class information comprises selecting one of the plurality of priority classes based on an available access category
- performing by the user equipment the at least part of the randomaccess procedure comprises performing the at least part of the random-access procedure based on the selected priority class.
- Example 4 The method of example 1, wherein the priority class information corresponds to a priority class, and the priority class corresponds to one or more slice identifiers.
- Example 5 The method of example 4, wherein:
- the priority class information corresponds to a plurality of slices and corresponding slice identifiers, and the slices correspond to one or more access categories;
- determining by a user equipment priority class information comprises selecting one of the plurality of slices based on an available access category
- performing by the user equipment the at least part of the randomaccess procedure comprises performing the at least part of the random-access procedure based on the selected slice and its corresponding slice identifier.
- Example 6 The method of example 1 , wherein:
- the priority class information corresponds to a plurality of priority classes, and the priority classes correspond to one or more slices;
- determining by a user equipment priority class information comprises selecting one of the plurality of priority classes based on an available slice and
- performing by the user equipment the at least part of the randomaccess procedure comprises performing the at least part of the random-access procedure based on the selected priority class.
- Example 7 The method of any one of examples 1 to 6, wherein:
- the priority classes are configured with separate random-access resources for specific priority classes.
- the performing the at least part of a random-access procedure uses the random-access resources corresponding to the selected priority class used for the random-access procedure.
- Example 8 The method of example 7, wherein the separate random-access resources comprise a set of random-access preambles and/or a set of random-access channel occasions and/or a set of random-access channel configurations.
- Example 9 The method of any one of examples 1 to 6, wherein:
- the priority classes are configured with separate random-access prioritization parameters for specific priority classes; and [00106] the performing the at least part of a random-access procedure uses the random-access prioritization parameters corresponding to a selected priority class used for the random-access procedure.
- Example 10 The method of example 9, wherein the separate random-access prioritization parameters comprise one or more of the following: a backoff scaling factor; a power ramping step; a message power offset for group B preambles; or a maximum number of transmission attempts.
- Example 11 The method of any one of examples 1 to 10, wherein the determining the priority class information comprises one or more of the following:
- Example 12 The method of any one of examples 1 to 11, wherein the one or more access categories have been defined by an operator.
- Example 13 The method of any one of examples 1 to 12, wherein:
- performing by the user equipment at least a part of the random-access procedure is performed by the user equipment based on determining by the user equipment initiation of a random-access procedure is triggered for an access category.
- this figure is a logic flow diagram performed by a network node for using priority classes for random access procedures.
- This figure illustrates the operation of an exemplary method or methods, a result of execution of computer program instructions embodied on a computer readable memory, functions performed by logic implemented in hardware, and/or interconnected means for performing functions in accordance with exemplary embodiments.
- the blocks in FIG. 6 and the examples below for this figure are assumed to be performed by a network node such as gNB 170, e.g., under control of the control module 150.
- the network node in block 610 generates priority class information for a user equipment to use for a random-access procedure.
- the network node sends the priority class information toward the user equipment. This occurs in block 620.
- the following include additional examples for FIG. 6. In these examples, the method of FIG. 6 is referred to as example 14.
- Example 15 The method of example 14, wherein the priority class information corresponds to a priority class, and the priority class corresponds to one or more access categories.
- Example 16 The method of example 15, wherein:
- the priority class information corresponds to a plurality of priority classes, and the priority classes correspond to one or more access categories;
- the sending the priority class information toward the user equipment further comprises sending by the network node the priority class information for at least one of the plurality of priority classes toward the user equipment.
- Example 17 The method of example 14, wherein the priority class information corresponds to a priority class, and the priority class corresponds to one or more slice identifiers.
- Example 18 The method of example 17, wherein:
- the priority class information corresponds to a plurality of slices and corresponding slice identifiers, and the slices correspond to one or more access categories;
- the sending the priority class information toward the user equipment further comprises sending by the network node the priority class information for at least one of the plurality of slices and corresponding at least one slice identifier toward the user equipment.
- Example 19 The method of example 14, wherein:
- the priority class information corresponds to a plurality of priority classes, and the priority classes correspond to one or more slices;
- the sending the priority class information toward the user equipment further comprises sending by the network node the priority class information for at least one of the plurality of priority classes toward the user equipment.
- Example 20 The method of any one of examples 14 to 19, wherein:
- the priority classes have defined separate random-access resources for specific priority classes; and [00131] the sending the priority class information toward the user equipment further comprises sending the separate random-access resources for any of the specific priority classes corresponding to the priority class information.
- Example 21 The method of example 20, wherein the separate random-access resources comprise a set of random-access preambles and/or a set of random-access channel occasions and/or a set of random-access channel configurations.
- Example 22 The method of any one of examples 14 to 21, wherein:
- the priority classes have defined separate random-access prioritization parameters for specific priority classes.
- the sending the priority class information toward the user equipment further comprises sending the separate random-access prioritization parameters for any of the specific priority classes corresponding to the priority class information.
- Example 23 The method of example 22, wherein the separate random-access prioritization parameters comprise one or more of the following: a backoff scaling factor; a power ramping step; a message power offset for group B preambles; or a maximum number of transmission attempts.
- Example 24 The method of any one of examples 14 to 23, wherein the sending the priority class information toward the user equipment is performed via one or more of the following: dedicated signaling; or broadcast signaling.
- Example 25 The method of any one of examples 14 to 24, wherein the one or more access categories have been defined by an operator.
- Example 26 A computer program, comprising code for performing the methods of any of examples 1 to 25, when the computer program is run on a computer.
- Example 27 The computer program according to example 26, wherein the computer program is a computer program product comprising a computer-readable medium bearing computer program code embodied therein for use with the computer.
- Example 28 The computer program according to example 26, wherein the computer program is directly loadable into an internal memory of the computer.
- Example 29 An apparatus, comprising means for performing: [00144] determining by a user equipment priority class information for performing a random-access procedure; and
- Example 30 The apparatus of example 29, wherein the priority class information corresponds to a priority class, and the priority class corresponds to one or more access categories.
- Example 31 The apparatus of example 30, wherein:
- the priority class information corresponds to a plurality of priority classes, and the priority classes correspond to one or more access categories;
- determining by a user equipment priority class information comprises selecting one of the plurality of priority classes based on an available access category
- performing by the user equipment the at least part of the randomaccess procedure comprises performing the at least part of the random-access procedure based on the selected priority class.
- Example 32 The apparatus of example 29, wherein the priority class information corresponds to a priority class, and the priority class corresponds to one or more slice identifiers.
- Example 33 The apparatus of example 32, wherein:
- the priority class information corresponds to a plurality of slices and corresponding slice identifiers, and the slices correspond to one or more access categories;
- determining by a user equipment priority class information comprises selecting one of the plurality of slices based on an available access category
- performing by the user equipment the at least part of the randomaccess procedure comprises performing the at least part of the random-access procedure based on the selected slice and its corresponding slice identifier.
- Example 34 The apparatus of example 29, wherein:
- the priority class information corresponds to a plurality of priority classes, and the priority classes correspond to one or more slices; [00158] determining by a user equipment priority class information comprises selecting one of the plurality of priority classes based on an available slice and
- performing by the user equipment the at least part of the randomaccess procedure comprises performing the at least part of the random-access procedure based on the selected priority class.
- Example 35 The apparatus of any one of examples 29 to 34, wherein:
- the priority classes are configured with separate random-access resources for specific priority classes.
- the performing the at least part of a random-access procedure uses the random-access resources corresponding to the selected priority class used for the random-access procedure.
- Example 36 The apparatus of example 35, wherein the separate randomaccess resources comprise a set of random-access preambles and/or a set of random-access channel occasions and/or a set of random-access channel configurations.
- Example 37 The apparatus of any one of examples 29 to 34, wherein:
- the priority classes are configured with separate random-access prioritization parameters for specific priority classes.
- the performing the at least part of a random-access procedure uses the random-access prioritization parameters corresponding to a selected priority class used for the random-access procedure.
- Example 38 The apparatus of example 37, wherein the separate randomaccess prioritization parameters comprise one or more of the following: a backoff scaling factor; a power ramping step; a message power offset for group B preambles; or a maximum number of transmission attempts.
- Example 39 The apparatus of any one of examples 29 to 38, wherein the determining the priority class information comprises one or more of the following:
- Example 40 The apparatus of any one of examples 29 to 39, wherein the one or more access categories have been defined by an operator.
- Example 41 The apparatus of example 29, wherein:
- performing by the user equipment at least a part of the random-access procedure is performed by the user equipment based on determining by the user equipment initiation of a random-access procedure is triggered for an access category.
- Example 42 An apparatus, comprising means for performing:
- Example 43 The apparatus of example 42, wherein the priority class information corresponds to a priority class, and the priority class corresponds to one or more access categories.
- Example 44 The apparatus of example 43, wherein:
- the priority class information corresponds to a plurality of priority classes, and the priority classes correspond to one or more access categories;
- the sending the priority class information toward the user equipment further comprises sending by the network node the priority class information for at least one of the plurality of priority classes toward the user equipment.
- Example 45 The apparatus of example 42, wherein the priority class information corresponds to a priority class, and the priority class corresponds to one or more slice identifiers.
- Example 46 The apparatus of example 45, wherein:
- the priority class information corresponds to a plurality of slices and corresponding slice identifiers, and the slices correspond to one or more access categories;
- the sending the priority class information toward the user equipment further comprises sending by the network node the priority class information for at least one of the plurality of slices and corresponding at least one slice identifier toward the user equipment.
- Example 47 The apparatus of example 42, wherein: [00187] the priority class information corresponds to a plurality of priority classes, and the priority classes correspond to one or more slices;
- the sending the priority class information toward the user equipment further comprises sending by the network node the priority class information for at least one of the plurality of priority classes toward the user equipment.
- Example 48 The apparatus of any one of examples 42 to 47, wherein:
- the priority classes have defined separate random-access resources for specific priority classes.
- the sending the priority class information toward the user equipment further comprises sending the separate random-access resources for any of the specific priority classes corresponding to the priority class information.
- Example 49 The apparatus of example 48, wherein the separate randomaccess resources comprise a set of random-access preambles and/or a set of random-access channel occasions and/or a set of random-access channel configurations.
- Example 50 The apparatus of any one of examples 42 to 48, wherein:
- the priority classes have defined separate random-access prioritization parameters for specific priority classes.
- the sending the priority class information toward the user equipment further comprises sending the separate random-access prioritization parameters for any of the specific priority classes corresponding to the priority class information.
- Example 51 The apparatus of example 50, wherein the separate randomaccess prioritization parameters comprise one or more of the following: a backoff scaling factor; a power ramping step; a message power offset for group B preambles; or a maximum number of transmission attempts.
- Example 52 The apparatus of any one of examples 42 to 51, wherein the sending the priority class information toward the user equipment is performed via one or more of the following: dedicated signaling; or broadcast signaling.
- Example 53 The apparatus of any one of examples 42 to 52, wherein the one or more access categories have been defined by an operator.
- Example 54 The apparatus of any of examples 29 to 53 wherein the means comprises:
- At least one memory including computer program code, the at least one memory and computer program code configured to, with the at least one processor, cause the performance of the apparatus.
- Example 55 An apparatus, comprising:
- one or more memories including computer program code
- Another exemplary embodiment is the apparatus of example 55, wherein the one or more memories and the computer program code are further configured, with the one or more processors, to cause the apparatus to perform operations in the methods of any of examples 2 to 13.
- Example 56 An apparatus, comprising:
- one or more memories including computer program code
- Another exemplary embodiment is the apparatus of example 55, wherein the one or more memories and the computer program code are further configured, with the one or more processors, to cause the apparatus to perform operations in the methods of any of examples 15 to 25.
- circuitry may refer to one or more or all of the following:
- circuitry also covers an implementation of merely a hardware circuit or processor (or multiple processors) or portion of a hardware circuit or processor and its (or their) accompanying software and/or firmware.
- circuitry also covers, for example and if applicable to the particular claim element, a baseband integrated circuit or processor integrated circuit for a mobile device or a similar integrated circuit in server, a cellular network device, or other computing or network device.
- Embodiments herein may be implemented in software (executed by one or more processors), hardware (e.g., an application specific integrated circuit), or a combination of software and hardware.
- the software (e.g., application logic, an instruction set) is maintained on any one of various conventional computer-readable media.
- a “computer-readable medium” may be any media or means that can contain, store, communicate, propagate or transport the instructions for use by or in connection with an instruction execution system, apparatus, or device, such as a computer, with one example of a computer described and depicted, e.g., in FIG. 1.
- a computer-readable medium may comprise a computer-readable storage medium (e.g., memories 125, 155, 171 or other device) that may be any media or means that can contain, store, and/or transport the instructions for use by or in connection with an instruction execution system, apparatus, or device, such as a computer.
- a computer-readable storage medium does not comprise propagating signals.
- AMF access and mobility management function [00231] CBRA contention-based random access
- eNB or eNodeB evolved Node B (e.g., an LTE base station)
- En-gNB or En-gNB node providing NR user plane and control plane protocol terminations towards the UE, and acting as secondary node in EN-DC
- E-UTRA evolved universal terrestrial radio access i.e., the LTE radio access technology
- gNB or gNodeB base station for 5G/NR, i.e., a node providing NR user plane and control plane protocol terminations towards the UE, and connected via the NG interface to the 5GC
- ng-eNB or NG-eNB next generation eNB [00249]
- UE user equipment e.g., a wireless, typically mobile device
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
UE déterminant des informations de classe de priorité pour effectuer une procédure d'accès aléatoire. L'UE effectue au moins une partie de la procédure d'accès aléatoire sur la base des informations de classe de priorité. Un nœud de réseau dans un réseau sans fil génère des informations de classe de priorité qu'un équipement utilisateur doit utiliser pour une procédure d'accès aléatoire. Le nœud de réseau envoie les informations de classe de priorité vers l'équipement utilisateur.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/EP2020/079940 WO2022083880A1 (fr) | 2020-10-23 | 2020-10-23 | Classes de priorité pour des procédures d'accès aléatoire en fonction de la tranche de réseau et de la catégorie d'accès |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/EP2020/079940 WO2022083880A1 (fr) | 2020-10-23 | 2020-10-23 | Classes de priorité pour des procédures d'accès aléatoire en fonction de la tranche de réseau et de la catégorie d'accès |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2022083880A1 true WO2022083880A1 (fr) | 2022-04-28 |
Family
ID=73040040
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2020/079940 WO2022083880A1 (fr) | 2020-10-23 | 2020-10-23 | Classes de priorité pour des procédures d'accès aléatoire en fonction de la tranche de réseau et de la catégorie d'accès |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2022083880A1 (fr) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20230180287A1 (en) * | 2020-06-03 | 2023-06-08 | Industry-Academic Cooperation Foundation, Dankook University | Apparatus and method for performing random access |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180368179A1 (en) * | 2017-06-16 | 2018-12-20 | Qualcomm Incorporated | Differentiated random access in new radio |
US20200128456A1 (en) * | 2017-03-22 | 2020-04-23 | Lg Electronics Inc. | Method and device for adjusting random access backoff parameter |
-
2020
- 2020-10-23 WO PCT/EP2020/079940 patent/WO2022083880A1/fr active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20200128456A1 (en) * | 2017-03-22 | 2020-04-23 | Lg Electronics Inc. | Method and device for adjusting random access backoff parameter |
US20180368179A1 (en) * | 2017-06-16 | 2018-12-20 | Qualcomm Incorporated | Differentiated random access in new radio |
Non-Patent Citations (5)
Title |
---|
"Study on enhancement of RAN Slicing", RP-193254, 3GPP TSG-RAN MEETING #86, SITGES, BARCELONA, 9 December 2019 (2019-12-09) |
3GPP TS 38.300 |
3GPP TS 38.300, September 2020 (2020-09-01) |
NOKIA ET AL: "RACH prioritisation for slices", vol. RAN WG2, no. Electronic; 20201102 - 20201113, 22 October 2020 (2020-10-22), XP051942378, Retrieved from the Internet <URL:https://ftp.3gpp.org/tsg_ran/WG2_RL2/TSGR2_112-e/Docs/R2-2009422.zip R2-2009422 RACH prioritisation for slices.docx> [retrieved on 20201022] * |
ZTE CORPORATION ET AL: "Consideration on the slice specific RACH configuration", vol. RAN WG2, no. Electronic; 20201102 - 20201113, 22 October 2020 (2020-10-22), XP051941434, Retrieved from the Internet <URL:https://ftp.3gpp.org/tsg_ran/WG2_RL2/TSGR2_112-e/Docs/R2-2009806.zip R2-2009806_Consideration on the slice specific RACH configuration.docx> [retrieved on 20201022] * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20230180287A1 (en) * | 2020-06-03 | 2023-06-08 | Industry-Academic Cooperation Foundation, Dankook University | Apparatus and method for performing random access |
US11985696B2 (en) * | 2020-06-03 | 2024-05-14 | Uucom Co., Ltd | Apparatus and method for performing random access |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11889403B2 (en) | Access control for network slices of a wireless communication system | |
US10701619B2 (en) | Method and apparatus for controlling an access of a terminal in a wireless communication system | |
CN110235472B (zh) | 一种用于接入禁止的系统和方法 | |
EP3706473B1 (fr) | Interdiction d'accès étendu | |
CN112203336B (zh) | 无线接入控制方法、装置及系统 | |
CN113630848A (zh) | 网络切片的选择方法、无线接入设备和终端 | |
US10028114B2 (en) | Method and apparatus for adaptive barring control for MO-SMS in wireless access system | |
US11683849B2 (en) | Redcap UE identification | |
CN108271213B (zh) | 通信控制方法、非授权传输方法及装置 | |
US20230094040A1 (en) | Communication method, and associated communication apparatus, medium, and chip | |
US20200329505A1 (en) | Random Access Method Of Communications Apparatus, Apparatus, And Storage Medium | |
WO2022083880A1 (fr) | Classes de priorité pour des procédures d'accès aléatoire en fonction de la tranche de réseau et de la catégorie d'accès | |
US20230403745A1 (en) | Prioritizing Random Access Procedures for Mobile Terminated Access Attempts in Paging Message | |
US11388653B2 (en) | Method and apparatus providing access control | |
US11304239B2 (en) | Random access procedure | |
EP4109975A1 (fr) | Communication relative à une tranche de réseau | |
EP3791686A1 (fr) | Concept de gestion d'accès en liaison montante | |
US20230189331A1 (en) | Dynamic random access occasion configuration after a contention | |
WO2024011424A1 (fr) | Procédé, dispositif et produit-programme d'ordinateur destinés aux communications sans fil | |
CN116801385A (zh) | 数据传输方法及装置、存储介质、终端设备、网络设备 | |
CN117813869A (zh) | 在无线通信系统中用于操作终端的方法和设备 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20800042 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20800042 Country of ref document: EP Kind code of ref document: A1 |