WO2023146382A1 - Method and apparatus for network resource management in wireless communication system supporting dynamic spectrum sharing - Google Patents

Method and apparatus for network resource management in wireless communication system supporting dynamic spectrum sharing Download PDF

Info

Publication number
WO2023146382A1
WO2023146382A1 PCT/KR2023/001409 KR2023001409W WO2023146382A1 WO 2023146382 A1 WO2023146382 A1 WO 2023146382A1 KR 2023001409 W KR2023001409 W KR 2023001409W WO 2023146382 A1 WO2023146382 A1 WO 2023146382A1
Authority
WO
WIPO (PCT)
Prior art keywords
network
communication network
utilization
determining
tti
Prior art date
Application number
PCT/KR2023/001409
Other languages
French (fr)
Inventor
Gyanchandani Monty
Vimal Bastin Edwin JOSEPH
Surendra Pal Sharma
Original Assignee
Samsung Electronics Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Samsung Electronics Co., Ltd. filed Critical Samsung Electronics Co., Ltd.
Publication of WO2023146382A1 publication Critical patent/WO2023146382A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • H04W16/14Spectrum sharing arrangements between different networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition

Definitions

  • the present disclosure relates to method and apparatus for network resource management in a wireless communication system.
  • 5G mobile communication technologies define broad frequency bands such that high transmission rates and new services are possible, and can be implemented not only in “Sub 6GHz” bands such as 3.5GHz, but also in “Above 6GHz” bands referred to as mmWave including 28GHz and 39GHz.
  • 6G mobile communication technologies referred to as Beyond 5G systems
  • terahertz bands for example, 95GHz to 3THz bands
  • IIoT Industrial Internet of Things
  • IAB Integrated Access and Backhaul
  • DAPS Dual Active Protocol Stack
  • 5G baseline architecture for example, service based architecture or service based interface
  • NFV Network Functions Virtualization
  • SDN Software-Defined Networking
  • MEC Mobile Edge Computing
  • multi-antenna transmission technologies such as Full Dimensional MIMO (FD-MIMO), array antennas and large-scale antennas, metamaterial-based lenses and antennas for improving coverage of terahertz band signals, high-dimensional space multiplexing technology using OAM (Orbital Angular Momentum), and RIS (Reconfigurable Intelligent Surface), but also full-duplex technology for increasing frequency efficiency of 6G mobile communication technologies and improving system networks, AI-based communication technology for implementing system optimization by utilizing satellites and AI (Artificial Intelligence) from the design stage and internalizing end-to-end AI support functions, and next-generation distributed computing technology for implementing services at levels of complexity exceeding the limit of UE operation capability by utilizing ultra-high-performance communication and computing resources.
  • FD-MIMO Full Dimensional MIMO
  • OAM Organic Angular Momentum
  • RIS Reconfigurable Intelligent Surface
  • the present disclosure provides a method and apparatus for efficient network resource management in a wireless communication system supporting a dynamic spectrum sharing.
  • the present subject matter refers to a method for network resource management in a dynamic spectrum sharing (DSS) wireless communication system.
  • the method comprises determining a current CPU utilization for a virtualized network function (VNF) in a first communication network, wherein the first communication network is hosted in a first virtualized random access network (vRAN). Thereafter, a network utilization is determined for the virtualized network function (VNF) in the first communication network. Then, bandwidth utilization is monitored of each of plurality of cells connected in the first communication network.
  • the method further comprises determining if the current CPU utilization is above a first predefined threshold, determining if the network utilization is above a second predefined threshold and determining unused bandwidth out of the allocated bandwidth over a predetermined number of transmission time interval (TTI).
  • TTI transmission time interval
  • the method further comprises reallocating at least one air resource block to a second communication network for a predefined period of time based on the determination, wherein the second communication network is hosted in a second virtualized random access network (vRAN).
  • an apparatus for network resource management in a dynamic spectrum sharing (DSS) wireless communication system may comprise a memory, an interface and a processor coupled to the memory and the interface.
  • the processor is configured to: determine a current CPU utilization for a virtualized network function (VNF) a in first communication network, wherein the first communication network is hosted in a first virtualized random access network (vRAN), determine a network utilization for the virtualized network function (VNF) in the first communication network, monitor bandwidth utilization of each of plurality of cells connected in the first communication network, determine if the current CPU utilization is above a first predefined threshold, determine if the network utilization is above a second predefined threshold, determine unused bandwidth out of the allocated bandwidth over a predetermined number of transmission time interval (TTI) and reallocate at least one air resource blocks to a second communication network for a predefined period of time based on the determination, wherein the second communication network is hosted in a second virtualized random access network (vRAN).
  • VNF virtualized network function
  • vRAN virtualized random access network
  • the present subject matter provides techniques for offload some of air resource blocks to peer network for predefined time to utilize air resource blocks effectively using dynamic spectrum sharing platform, when system resources like CPU, memory or network interface are saturated.
  • the air resource blocks could be in time domain or frequency domain or mix of both time and frequency domain.
  • FIG. 1 illustrates sharing of spectrum between LTE and 5G, in accordance with existing art
  • FIG. 2 illustrates a graph illustrating increase in CPU utilization in relation to number of UE and air resources, in accordance with existing art
  • FIG. 3A illustrates TTI scheduling under normal CPU utilization, in accordance with existing art
  • FIG. 3B illustrates TTI scheduling under CPU saturation, in accordance with existing art
  • FIG. 4 illustrates a flow chart of a method for network resource management in a dynamic spectrum sharing (DSS) wireless communication system, in accordance with an embodiment of the present disclosure
  • FIG. 5 illustrates a block diagram of an ADPF, in accordance with an embodiment of the present disclosure
  • FIG. 6 illustrates flow chart illustrating sequence flow for reallocating air resource blocks, in accordance with an embodiment of the present disclosure
  • FIG. 7 represents the comparison between resource utilization using existing method and the proposed method.
  • FIG. 8 illustrates a block diagram of an apparatus for network resource management in a dynamic spectrum sharing (DSS) wireless communication system, in accordance with a first embodiment of the present disclosure.
  • DSS dynamic spectrum sharing
  • any terms used herein such as but not limited to “includes,” “comprises,” “has,” “consists,” and grammatical variants thereof do NOT specify an exact limitation or restriction and certainly do NOT exclude the possible addition of one or more features or elements, unless otherwise stated, and furthermore must NOT be taken to exclude the possible removal of one or more of the listed features and elements, unless otherwise stated with the limiting language “MUST comprise” or “NEEDS TO include.”
  • each of such phrases as “A or B,” “at least one of A and B,” “at least one of A or B,” “A, B, or C,” “at least one of A, B, and C,” and “at least one of A, B, or C,” may include all possible combinations of the items enumerated together in a corresponding one of the phrases.
  • such terms as “1st” and “2nd,” or “first” and “second” may be used to simply distinguish a corresponding component from another, and does not limit the components in other aspect (e.g., importance or order).
  • the user equipment may refer to a terminal, MS (mobile station), cellular phone, smartphone, computer, or various electronic devices capable of performing communication functions.
  • the base station may be an entity allocating a resource to the UE and may be at least one of a gNode B, gNB, eNode B, eNB, Node B, BS, radio access network (RAN), base station controller, or node on network.
  • DSS Dynamic Spectrum Sharing
  • LTE Medium Access Control
  • MAC Medium Access Control
  • MAC Medium Access Control
  • MAC Medium Access Control
  • MAC Medium Access Control
  • MAC Medium Access Control
  • MAC Medium Access Control
  • MAC Medium Access Control
  • MAC Medium Access Control
  • MAC Medium Access Control
  • MAC Medium Access Control
  • MAC Medium Access Control
  • MAC Medium Access Control
  • MAC Medium Access Control
  • MAC Medium Access Control
  • MAC Medium Access Control
  • MAC Medium Access Control
  • MAC Medium Access Control
  • MAC Medium Access Control
  • MAC Medium Access Control
  • a virtual radio access network is a type of RAN with its networking functions separated from the hardware it runs on. The control and data planes of the vRAN are also separated as part of the virtualization. This type of RAN is heavily associated with 5G networks because the networks need virtualization to support the use cases and performance requirements of 5G.
  • Access DU Processing Function (ADPF) server hosts pods and each pod runs with set of Access node software's required by vRAN.
  • ADPF Access DU Processing Function
  • VNF virtual network function
  • L2 has scheduled around n number of UE's per Transmission Time Interval (TTI) (1 mill second) out of all active users, where 'n' depends on capacity of modem
  • Scheduling involves candidate selection, Proportional Fair (PF) Metric calculation and sorting of all active UE's and resources allocation for first 'n' UE's (after sorting). Increase in number of UE results in increase bandwidth by nlogn times, where n is no of UE.
  • PF Proportional Fair
  • channel estimation and channel decoding has to perform per UE basics.
  • vRAN software's like Media Access Control (MAC) (L2) and Physical (PHY)(L1) require real time processing and works on hard time limit called Transmission Time Interval (TTI).
  • TTI Transmission Time Interval
  • Main function of MAC and PHY is to allocate air resource blocks in each TTI for set of UE's.
  • TTI can be 1, 0.5, 0.25 milliseconds depending on configuration.
  • MAC and PHY software's are divided with jobs (functions) which need to be executed in every TTI. The role of this jobs is to schedule/allocate resources and transmitted over the air to user equipment (UE). Execution time of these jobs are directly proportional to number of cells supported and number of UE (idle and active). As shown in FIG.
  • JM1, JM2, ... JMn are the predefined jobs of MAC(L2) which needs to be executed in every TTI
  • JP1, JP2, ... JPn are predefined jobs of PHY(L1) which need to executed in every TTI.
  • FIG. 3A illustrates TTI scheduling under normal CPU utilization, in accordance with existing art.
  • TTI N
  • MAC and PHY prepare/schedule the UE resource blocks of N+K, (let us assume K-2).
  • MAC and PHY make sure that's air resource blocks for (N+K) TTI is scheduled and completed within TTI (N).
  • VNF Saturation under load condition
  • MAC and PHY jobs may take more time than expected, as shown in FIG. 3B. This may affect the preparation time (N + K) TTI.
  • TTI overshooting will force MAC/PHY to reduce the resources allocation, for example instead of scheduling 16 UEs, 10 UEs will be scheduled or some non-time critical jobs like adding new UE or deleting UE will be not executed. Hence, in case of VNF saturation, TTI over shooting occurs and affect air resource blocks allocation.
  • the present disclosure provides solution to a problem of under utilization of air resources in DSS when CPU resources are saturated in VNFs. VNF saturation leads to underutilization of precious air resources thereby reducing system capabilities. With the proposed techniques, air resources if offloaded to the other peer entity may ensure effective utilization of air resources.
  • FIG. 4 illustrates a flow chart of a method for network resource management in a dynamic spectrum sharing (DSS) wireless communication system, in accordance with an embodiment of the present disclosure.
  • DSS dynamic spectrum sharing
  • the method 400 comprises, at step 401, determining a current CPU utilization for a virtualized network function (VNF) in a first communication network.
  • the first communication network is hosted in a first virtualized random access network (vRAN).
  • FIG. 5 illustrates a block diagram of an ADPF, in accordance with an embodiment of the present disclosure.
  • the ADPF 500 comprises a plurality of CPUs 510 which are connected to application layers 520 and middleware 530.
  • the middleware 530 and the application layers 520 may communicate via Tx/Rx DPDK based interface 540.
  • a clock cycle, or simply a "cycle” is a single electronic pulse of a CPU.
  • a CPU can perform a basic operation such as fetching an instruction, accessing memory or writing data.
  • capacity of CPU can be determined.
  • a CPU of 3.5 GHz have 3.5 x 109 cycles/second.
  • a CPU with 100% utilization refers to situation is where all the CPU cycles are being utilized by software or any other internal operation by CPU. External factors like thermal or internal CPU issues may affect these CPU cycles and may affect the overall performance in application layer.
  • An idle time in CPU refers to situation where CPU is not performing any job and is waiting for instruction to be executed.
  • MAC/PHY software requires real time processing and works on hard time limit i.e. TTI.
  • the TTI may be 1ms, 0.5ms or 0.25ms.
  • MAC/PHY layer defines jobs (function) such that it should be able to complete within the hard limit of TTI, i.e. within CPU cycles of 1ms, 0.5ms or 0.25ms.
  • MAC and PHY layers are pinned to certain fixed CPU set, each CPU is pinned to Linux thread. These threads utilize 100% CPU by running busy wait loop i.e. while(1) loop .
  • the current CPU utilization may be determined by determining an average processing time (Tp) taken to process a plurality of threads in the predetermined number of transmission time interval (TTI) based on a predetermined number of TTI and a processing time in a particular TTI of the predetermined number of TTI.
  • TTI transmission time interval
  • the average processing time (Tp) may be calculated as following Equation 1:
  • T K 1, Where in Kth TTI, Busy cycles (B) ⁇ Total Cycles in 1 TTI(Y)
  • Application layers can determine Y cycles in 1 TTI cycles as X cycles per second/800. Y Cycles in milli second can be divided into two parts i.e. busy cycles and idle cycles.
  • Busy Cycles(B) amount of cycles utilized by thread to execute the job
  • Idle Cycles(I) amount of cycles, thread is waiting for job or not executing any job
  • the average processing time (Tp) is compared with a predetermined processing time.
  • the current CPU utilization is determined based on a result of the comparison that is the average processing time (Tp) being greater than the predetermined processing time.
  • the predetermined processing time may vary from 1 to 10 seconds.
  • the method 400 comprises determining a network utilization ( ) for the virtualized network function (VNF) in the first communication network.
  • a number of uplink packets is calculated.
  • the number of uplink packets may comprise a number of packets transmitted and a number of upcoming packets to be transmitted, in an uplink transmission.
  • these number of uplink packets may be obtained by virtual network processing (VNP) unit which is responsible to receive and transmit network packets over physical network interface card (NIC). It should be noted that the number of uplink packets may be obtained using any other known method in the art.
  • VNP virtual network processing
  • NIC physical network interface card
  • a number of downlink packets is calculated.
  • the number of downlink packets may comprise a number of packets transmitted and a number of upcoming packets to be transmitted, in a downlink transmission.
  • these number of downlink packets may be obtained by the VNP unit which is responsible to receive and transmit network packets over physical network interface card (NIC). It should be noted that the number of downlink packets may be obtained using any other known method in the art.
  • the method 400 comprises monitoring bandwidth utilization ( ) of each of plurality of cells connected in the first communication network.
  • the method 400 comprises determining if the current CPU utilization is above a first predefined threshold.
  • the first predefined threshold may vary from 10% to 70%.
  • the method 400 comprises determining if the network utilization is above a second predefined threshold.
  • the method 400 comprises determining unused bandwidth out of the allocated bandwidth over a predetermined number of transmission time interval (TTI).
  • TTI transmission time interval
  • the unused bandwidth may be calculated based on current number of UEs attached.
  • the unused bandwidth may be calculated as difference between total bandwidth and used bandwidth.
  • the unused bandwidth may be determined based on at least one of a number of user equipment connected to the first communication network over a predetermined period of time, a number of user equipment in a process of connecting to the first communication network over the predetermined period of time, a number of used physical resource blocks (PRB) over the predetermined period of time, and a number of unused used physical resource blocks (PRB) over the predetermined period of time or a combination thereof.
  • PRB physical resource blocks
  • the predetermined processing time may vary from 1 to 10 seconds.
  • the method 400 comprises reallocating at least one air resource block to a second communication network for a predefined period of time based on the determination.
  • the predefined period time may vary from 1 to 10 seconds.
  • the second communication network is hosted in a second virtualized random-access network (vRAN).
  • the air resource block may be reallocated based upon determining that at least one of the current CPU utilization is above the first predefined threshold or the network utilization is above the second predefined threshold, or the unused bandwidth is less than a third threshold or a combination thereof. In an embodiment, more than one air resource block can be reallocated.
  • the first, second and third thresholds may be preconfigured in the VNP and the determined current CPU utilization, network utilization, unused bandwidth may be compared against the preconfigured thresholds. Based on the comparison, the air resource blocks may be reallocated.
  • Table 1 represents few conditions of reallocation the air resource blocks to the second communication network:
  • network utilization is > 70% and the current CPU utilization is > 80%, then air resource blocks as reallocated because overloading of network resources could lead to more CPU resources utilization.
  • network utilization is ⁇ 10% and the current CPU utilization is > 80%, then also air resource blocks as reallocated because overloading of CPU is due to more number of UE and small size traffic in most of UEs.
  • the determined current CPU utilization, network utilization, unused bandwidth may be used in a predetermined neural model to determine if the air resource blocks are to be reallocated. In an exemplary embodiment, if count of resource block is more than resource required to allocate data, then the air resource blocks may be allocated to the second communication network.
  • the predetermined neural model may be reinforcement model if the first vRAN is a centralized RAN (C-RAN). In an embodiment, the known reinforcement model may be used. Centralised RAN may have high capacity servers (with respect to CPUs and RAM) in large volumes. This helps to host very complex neural model. So, reinforcement learning models are used in C-RAN system. Cell which support area with high rise building may have high multipath and interference than cell in open area with less buildings. So, each cell needs to different action space. Computation resource availability is high in C-RAN site to use reinforcement learning based Q learning.
  • the predetermined neural model may be regression model if the first vRAN is a distributed RAN (DRAN).
  • DRAN distributed RAN
  • the known regression model may be used.
  • Distributed RAN may have vRAN that connect to serve a specific cell site. Therefore, supervised learning model may be better in D-RAN. Also, computation resource are scares in D-RAN site. So, neural model with lesser resource computation is used.
  • the first communication network is LTE and the second communication network is 5G/NR. In an alternate embodiment, the first communication network is 5G/NR and the second communication network is LTE. It may be noted that the proposed techniques may be implemented in any wireless communication network other than LTE and 5G/NR.
  • FIG. 6 illustrates flow chart illustrating sequence flow for reallocating air resource blocks, in accordance with an embodiment of the present disclosure.
  • both NR and LTE MAC exchanges Mac2Mac (M2M) message and start sharing predefined air resource blocks.
  • M2M Mac2Mac
  • these predefined air resources change as per known DSS protocol between NR and LTE MAC.
  • M2M message like coordination request/response are being used to share the NR/LTE air resources between NR and LTE MAC.
  • NR MAC/PHY has reached CPU threshold.
  • CPU saturations in MAC/PHY air resource blocks may not be utilized fully and results in wastage of resources.
  • fig. 6 it is shown that NR CPU has saturated but either way is also possible.
  • an air resource block reallocation request is transmitted from the first communication network i.e. NR to the second communication network i.e. LTE.
  • a response message is received from the second communication network.
  • the air resource blocks are reallocated to the second communication network.
  • the disclosed techniques propose new M2M DSS messages, offloaded request/response to handle/exchange resource block (RB's) during CPU saturation.
  • NR MAC may decide/calculate offloaded RB's. These RB's are notified to LTE MAC through M2M DSS Offload request.
  • LTE sends M2M DSS Offload response and start using Offloaded resources.
  • NR MAC starts using resources as per updated agreement between NR and LTE MAC.
  • NR MAC starts monitoring CPU condition and waits for normal CPU condition. Till CPU returns to normal condition, NR does not request more RB as part of existing M2M DSS protocol.
  • the method may further monitor the air resource blocks of the first communication network and the second communication network periodically.
  • the air resources may be monitored every 1 to 10 seconds. It should be noted that the monitoring period may be configured dynamically. Thereafter, it is determined if the air resource blocks are to be reallocated from the first communication network to the second communication network based on at least one of the current CPU utilization or the network utilization or the unused bandwidth or a combination thereof. Then, it is determined if the air resource blocks have been reallocated from the first communication network to the second communication network.
  • the proposed techniques allow better utilization of spectrum where air resources are under utilized under VNF saturation due to system resources.
  • existing DSS interface can be used.
  • FIG. 7 represents the comparison between resource utilization using existing method and the proposed method. Referring to FIG. 7, FIG. 7 shows under utilized air resources from network 1 are used by network 2 according to the proposed method.
  • Fig. 8 illustrates a block diagram of an apparatus 800 for network resource management in a dynamic spectrum sharing (DSS) wireless communication system, in accordance with an embodiment of the present disclosure.
  • the apparatus 800 may comprise a memory 801, a processor 803 and an interface 805.
  • the processor 803 is coupled to the memory 801 and the interface 805.
  • the processor 803 may be configured to perform the method as discussed in respect to FIGs. 4 to 7.
  • the processor 803 may be a single processing unit or a number of units, all of which could include multiple computing units.
  • the processor 803 may be implemented as one or more microprocessors, microcomputers, microcontrollers, digital signal processors, central processing units, state machines, logic circuitries, and/or any devices that manipulate signals based on operational instructions.
  • the processor 803 may be configured to fetch and execute computer-readable instructions and data stored in the memory 801.
  • the processor 803 may include one or a plurality of processors.
  • one or a plurality of processors may be a general-purpose processor, such as a central processing unit (CPU), an application processor (AP), or the like, a graphics-only processing unit such as a graphics processing unit (GPU), a visual processing unit (VPU), and/or an AI-dedicated processor such as a neural processing unit (NPU).
  • processors control the processing of the input data in accordance with a predefined operating rule or artificial intelligence (AI) model stored in the non-volatile memory and the volatile memory 801.
  • AI artificial intelligence
  • the predefined operating rule or artificial intelligence model is provided through training or learning.
  • the memory 801 may include, but is not limited to computer-readable storage media such as various types of volatile and non-volatile storage media, including but not limited to random access memory, read-only memory, programmable read-only memory, electrically programmable read-only memory, electrically erasable read-only memory, flash memory, magnetic tape or disk, optical media and the like.
  • memory 801 includes a cache or random access memory for the processor 803.
  • the memory 801 is separate from the processor 803, such as a cache memory of a processor, the system memory, or other memory.
  • the memory 801 may be an external storage device or database for storing data.
  • the memory 801 is operable to store instructions executable by the processor 803.
  • the interface 805 may include a communication interface such as a transceiver for transmitting/receiving a signal.
  • processing strategies may include multiprocessing, multitasking, parallel processing and the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present disclosure refers to a method and apparatus for network resource management in a dynamic spectrum sharing wireless communication system. The method comprises determining a current CPU utilization for a virtualized network function (VNF) in a first communication network, wherein the first communication network is hosted in a first virtualized random access network (vRAN) and determining a network utilization for the virtualized network function (VNF) in the first communication network. The method also monitors bandwidth utilization of each of plurality of cells connected in the first communication network. The method then determines if the current CPU utilization is above a first predefined threshold, if the network utilization is above a second predefined threshold and unused bandwidth out of the allocated bandwidth over a predetermined number of transmission time interval (TTI). Then, the method reallocates air resource block to a second communication network for a predefined period of time.

Description

METHOD AND APPARATUS FOR NETWORK RESOURCE MANAGEMENT IN WIRELESS COMMUNICATION SYSTEM SUPPORTING DYNAMIC SPECTRUM SHARING
The present disclosure relates to method and apparatus for network resource management in a wireless communication system.
5G mobile communication technologies define broad frequency bands such that high transmission rates and new services are possible, and can be implemented not only in "Sub 6GHz" bands such as 3.5GHz, but also in "Above 6GHz" bands referred to as mmWave including 28GHz and 39GHz. In addition, it has been considered to implement 6G mobile communication technologies (referred to as Beyond 5G systems) in terahertz bands (for example, 95GHz to 3THz bands) in order to accomplish transmission rates fifty times faster than 5G mobile communication technologies and ultra-low latencies one-tenth of 5G mobile communication technologies.
At the beginning of the development of 5G mobile communication technologies, in order to support services and to satisfy performance requirements in connection with enhanced Mobile BroadBand (eMBB), Ultra Reliable Low Latency Communications (URLLC), and massive Machine-Type Communications (mMTC), there has been ongoing standardization regarding beamforming and massive MIMO for mitigating radio-wave path loss and increasing radio-wave transmission distances in mmWave, supporting numerologies (for example, operating multiple subcarrier spacings) for efficiently utilizing mmWave resources and dynamic operation of slot formats, initial access technologies for supporting multi-beam transmission and broadbands, definition and operation of BWP (BandWidth Part), new channel coding methods such as a LDPC (Low Density Parity Check) code for large amount of data transmission and a polar code for highly reliable transmission of control information, L2 pre-processing, and network slicing for providing a dedicated network specialized to a specific service.
Currently, there are ongoing discussions regarding improvement and performance enhancement of initial 5G mobile communication technologies in view of services to be supported by 5G mobile communication technologies, and there has been physical layer standardization regarding technologies such as V2X (Vehicle-to-everything) for aiding driving determination by autonomous vehicles based on information regarding positions and states of vehicles transmitted by the vehicles and for enhancing user convenience, NR-U (New Radio Unlicensed) aimed at system operations conforming to various regulation-related requirements in unlicensed bands, NR UE Power Saving, Non-Terrestrial Network (NTN) which is UE-satellite direct communication for providing coverage in an area in which communication with terrestrial networks is unavailable, and positioning.
Moreover, there has been ongoing standardization in air interface architecture/protocol regarding technologies such as Industrial Internet of Things (IIoT) for supporting new services through interworking and convergence with other industries, IAB (Integrated Access and Backhaul) for providing a node for network service area expansion by supporting a wireless backhaul link and an access link in an integrated manner, mobility enhancement including conditional handover and DAPS (Dual Active Protocol Stack) handover, and two-step random access for simplifying random access procedures (2-step RACH for NR). There also has been ongoing standardization in system architecture/service regarding a 5G baseline architecture (for example, service based architecture or service based interface) for combining Network Functions Virtualization (NFV) and Software-Defined Networking (SDN) technologies, and Mobile Edge Computing (MEC) for receiving services based on UE positions.
As 5G mobile communication systems are commercialized, connected devices that have been exponentially increasing will be connected to communication networks, and it is accordingly expected that enhanced functions and performances of 5G mobile communication systems and integrated operations of connected devices will be necessary. To this end, new research is scheduled in connection with eXtended Reality (XR) for efficiently supporting AR (Augmented Reality), VR (Virtual Reality), MR (Mixed Reality) and the like, 5G performance improvement and complexity reduction by utilizing Artificial Intelligence (AI) and Machine Learning (ML), AI service support, metaverse service support, and drone communication.
Furthermore, such development of 5G mobile communication systems will serve as a basis for developing not only new waveforms for providing coverage in terahertz bands of 6G mobile communication technologies, multi-antenna transmission technologies such as Full Dimensional MIMO (FD-MIMO), array antennas and large-scale antennas, metamaterial-based lenses and antennas for improving coverage of terahertz band signals, high-dimensional space multiplexing technology using OAM (Orbital Angular Momentum), and RIS (Reconfigurable Intelligent Surface), but also full-duplex technology for increasing frequency efficiency of 6G mobile communication technologies and improving system networks, AI-based communication technology for implementing system optimization by utilizing satellites and AI (Artificial Intelligence) from the design stage and internalizing end-to-end AI support functions, and next-generation distributed computing technology for implementing services at levels of complexity exceeding the limit of UE operation capability by utilizing ultra-high-performance communication and computing resources.
This summary is provided to introduce a selection of concepts in a simplified format that are further described in the detailed description of the invention. This summary is not intended to identify key or essential inventive concepts of the invention, nor is it intended for determining the scope of the invention.
The present disclosure provides a method and apparatus for efficient network resource management in a wireless communication system supporting a dynamic spectrum sharing.
In an implementation, the present subject matter refers to a method for network resource management in a dynamic spectrum sharing (DSS) wireless communication system. The method comprises determining a current CPU utilization for a virtualized network function (VNF) in a first communication network, wherein the first communication network is hosted in a first virtualized random access network (vRAN). Thereafter, a network utilization is determined for the virtualized network function (VNF) in the first communication network. Then, bandwidth utilization is monitored of each of plurality of cells connected in the first communication network. The method further comprises determining if the current CPU utilization is above a first predefined threshold, determining if the network utilization is above a second predefined threshold and determining unused bandwidth out of the allocated bandwidth over a predetermined number of transmission time interval (TTI). The method further comprises reallocating at least one air resource block to a second communication network for a predefined period of time based on the determination, wherein the second communication network is hosted in a second virtualized random access network (vRAN).
In another embodiment of the present disclosure, an apparatus for network resource management in a dynamic spectrum sharing (DSS) wireless communication system, is disclosed. The apparatus may comprise a memory, an interface and a processor coupled to the memory and the interface. The processor is configured to: determine a current CPU utilization for a virtualized network function (VNF) a in first communication network, wherein the first communication network is hosted in a first virtualized random access network (vRAN), determine a network utilization for the virtualized network function (VNF) in the first communication network, monitor bandwidth utilization of each of plurality of cells connected in the first communication network, determine if the current CPU utilization is above a first predefined threshold, determine if the network utilization is above a second predefined threshold, determine unused bandwidth out of the allocated bandwidth over a predetermined number of transmission time interval (TTI) and reallocate at least one air resource blocks to a second communication network for a predefined period of time based on the determination,, wherein the second communication network is hosted in a second virtualized random access network (vRAN).
At least by virtue of aforesaid features, the present subject matter provides techniques for offload some of air resource blocks to peer network for predefined time to utilize air resource blocks effectively using dynamic spectrum sharing platform, when system resources like CPU, memory or network interface are saturated. The air resource blocks could be in time domain or frequency domain or mix of both time and frequency domain.
To further clarify the advantages and features of the present disclosure, a more particular description of the invention will be rendered by reference to specific embodiments thereof, which is illustrated in the appended drawing. It is appreciated that these drawings depict only typical embodiments of the invention and are therefore not to be considered limiting its scope. The invention will be described and explained with additional specificity and detail with the accompanying drawings.
These and other features, aspects, and advantages of the present invention will become better understood when the following detailed description is read with reference to the accompanying drawings in which like characters represent like parts throughout the drawings, wherein:
FIG. 1 illustrates sharing of spectrum between LTE and 5G, in accordance with existing art;
FIG. 2 illustrates a graph illustrating increase in CPU utilization in relation to number of UE and air resources, in accordance with existing art;
FIG. 3A illustrates TTI scheduling under normal CPU utilization, in accordance with existing art;
FIG. 3B illustrates TTI scheduling under CPU saturation, in accordance with existing art;
FIG. 4 illustrates a flow chart of a method for network resource management in a dynamic spectrum sharing (DSS) wireless communication system, in accordance with an embodiment of the present disclosure;
FIG. 5 illustrates a block diagram of an ADPF, in accordance with an embodiment of the present disclosure;
FIG. 6 illustrates flow chart illustrating sequence flow for reallocating air resource blocks, in accordance with an embodiment of the present disclosure;
FIG. 7 represents the comparison between resource utilization using existing method and the proposed method; and
FIG. 8 illustrates a block diagram of an apparatus for network resource management in a dynamic spectrum sharing (DSS) wireless communication system, in accordance with a first embodiment of the present disclosure.
Further, skilled artisans will appreciate that elements in the drawings are illustrated for simplicity and may not have been necessarily drawn to scale. For example, the flow charts illustrate the method in terms of the most prominent steps involved to help to improve understanding of aspects of the present invention. Furthermore, in terms of the construction of the device, one or more components of the device may have been represented in the drawings by conventional symbols, and the drawings may show only those specific details that are pertinent to understanding the embodiments of the present invention so as not to obscure the drawings with details that will be readily apparent to those of ordinary skill in the art having benefit of the description herein.
It should be understood at the outset that although illustrative implementations of the embodiments of the present disclosure are illustrated below, the present invention may be implemented using any number of techniques, whether currently known or in existence. The present disclosure should in no way be limited to the illustrative implementations, drawings, and techniques illustrated below, including the exemplary design and implementation illustrated and described herein, but may be modified within the scope of the appended claims along with their full scope of equivalents.
The term "some" as used herein is defined as "none, or one, or more than one, or all." Accordingly, the terms "none," "one," "more than one," "more than one, but not all" or "all" would all fall under the definition of "some." The term "some embodiments" may refer to no embodiments or to one embodiment or to several embodiments or to all embodiments. Accordingly, the term "some embodiments" is defined as meaning "no embodiment, or one embodiment, or more than one embodiment, or all embodiments."
The terminology and structure employed herein is for describing, teaching and illuminating some embodiments and their specific features and elements and does not limit, restrict or reduce the spirit and scope of the claims or their equivalents.
More specifically, any terms used herein such as but not limited to "includes," "comprises," "has," "consists," and grammatical variants thereof do NOT specify an exact limitation or restriction and certainly do NOT exclude the possible addition of one or more features or elements, unless otherwise stated, and furthermore must NOT be taken to exclude the possible removal of one or more of the listed features and elements, unless otherwise stated with the limiting language "MUST comprise" or "NEEDS TO include."
Whether or not a certain feature or element was limited to being used only once, either way it may still be referred to as "one or more features" or "one or more elements" or "at least one feature" or "at least one element." Furthermore, the use of the terms "one or more" or "at least one" feature or element do NOT preclude there being none of that feature or element, unless otherwise specified by limiting language such as "there NEEDS to be one or more . . . " or "one or more element is REQUIRED."
As used herein, each of such phrases as "A or B," "at least one of A and B," "at least one of A or B," "A, B, or C," "at least one of A, B, and C," and "at least one of A, B, or C," may include all possible combinations of the items enumerated together in a corresponding one of the phrases. As used herein, such terms as "1st" and "2nd," or "first" and "second" may be used to simply distinguish a corresponding component from another, and does not limit the components in other aspect (e.g., importance or order).
In the disclosure, the user equipment (UE) may refer to a terminal, MS (mobile station), cellular phone, smartphone, computer, or various electronic devices capable of performing communication functions. According to the disclosure, the base station may be an entity allocating a resource to the UE and may be at least one of a gNode B, gNB, eNode B, eNB, Node B, BS, radio access network (RAN), base station controller, or node on network.
Unless otherwise defined, all terms, and especially any technical and/or scientific terms, used herein may be taken to have the same meaning as commonly understood by one having an ordinary skill in the art.
Embodiments of the present invention will be described below in detail with reference to the accompanying drawings.
Dynamic Spectrum Sharing (DSS) is mechanism in which spectrum is shared between two radio technologies, such as between LTE and 5G. DSS algorithm may be designed to work between two entities (LTE Medium Access Control (MAC) and 5G Medium Access Control (MAC)) and air resource blocks are shared in time and frequency domain. DSS Patterns are predefined, and each pattern defines total number of slots used by new radio (NR or 5G) and LTE in one radio frame. Each radio frame may have 10 slots. A plurality of patterns may be supported for DSS and these patterns are exchanged between LTE MAC and NR MAC (M2M), as shown in FIG. 1.
A virtual radio access network (vRAN) is a type of RAN with its networking functions separated from the hardware it runs on. The control and data planes of the vRAN are also separated as part of the virtualization. This type of RAN is heavily associated with 5G networks because the networks need virtualization to support the use cases and performance requirements of 5G.
Access DU Processing Function (ADPF) server hosts pods and each pod runs with set of Access node software's required by vRAN.
In virtual network function (VNF) deployment, depending upon the configuration set of central processing units (CPU's) are allocated to software's, number of CPU are decided based on cell and UE to be supported, but under some circumstances the load of CPU increases and hence VNF will be saturated. CPU reaching threshold can be cause by many conditions, some of the main reasons are explained below:
On L2 side if number of users increases, CPU utilization also increases. due to one of the following reasons:
L2 has scheduled around n number of UE's per Transmission Time Interval (TTI) (1 mill second) out of all active users, where 'n' depends on capacity of modem
Scheduling involves candidate selection, Proportional Fair (PF) Metric calculation and sorting of all active UE's and resources allocation for first 'n' UE's (after sorting). Increase in number of UE results in increase bandwidth by nlogn times, where n is no of UE.
On L1 side if number of users increases, CPU utilization also increase due to one of the following reasons:
In downlink (DL), Low-Density Parity-Check (LDPC) encoding, Mapper algorithm which are CPU intensive has to done per UE (Protocol Data Unit (PDU))
In uplink (UL), channel estimation and channel decoding has to perform per UE basics.
L1 CPU utilization peaks specially when different PDU have different characteristics (Modulation and Coding Scheme (MCS), Quadrature Amplitude Modulation (QAM)). Whole encoding chain on DL (LDPC, mapper) and decoding chain on UL has to run for each UE. For smaller uplinks i.e. smaller Physical Uplink Shared Channel Resource Block (PUSCH RB, channel estimation for each has to perform for each UE, as each UE condition differs. All above condition increases the CPU utilization, when number of cell and UE increases per VNF, when CPU utilization reaches certain higher level, CPU saturates and can't perform efficiently. Fig. 2 shows a graph illustrating increase in CPU utilization in relation to number of UE and air resources. There may be below situations when the CPU saturates:
Case 1: Overload CPU when most of UE have small and frequent traffic: Application like WhatsApp, FCM notifications, IOT devices produces frequent and small size traffic which will internally load L1 and L2 VNFs because of above mentioned conditions, but will not achieve high spectral utilization of air resource blocks because inherent nature of data.
Case 2: Overload CPU due heavy traffic on one of cells: CPU can be overloaded due to high traffic on one of cell. This affects the performance of other cell which may lead to lesser spectral utilization of air resource blocks.
vRAN software's like Media Access Control (MAC) (L2) and Physical (PHY)(L1) require real time processing and works on hard time limit called Transmission Time Interval (TTI). Main function of MAC and PHY is to allocate air resource blocks in each TTI for set of UE's. In an example, TTI can be 1, 0.5, 0.25 milliseconds depending on configuration. In order to achieve this real time functionality, MAC and PHY software's are divided with jobs (functions) which need to be executed in every TTI. The role of this jobs is to schedule/allocate resources and transmitted over the air to user equipment (UE). Execution time of these jobs are directly proportional to number of cells supported and number of UE (idle and active). As shown in FIG. 3A, JM1, JM2, ... JMn are the predefined jobs of MAC(L2) which needs to be executed in every TTI, Similarly JP1, JP2, ... JPn are predefined jobs of PHY(L1) which need to executed in every TTI.
FIG. 3A illustrates TTI scheduling under normal CPU utilization, in accordance with existing art. As shown in FIG. 3A, in TTI (N), MAC and PHY prepare/schedule the UE resource blocks of N+K, (let us assume K-2). In the end of TTI, MAC and PHY make sure that's air resource blocks for (N+K) TTI is scheduled and completed within TTI (N). However, under load condition (VNF Saturation), MAC and PHY jobs may take more time than expected, as shown in FIG. 3B. This may affect the preparation time (N + K) TTI. This overshooting of TTI will force MAC/PHY to reduce the resources allocation, for example instead of scheduling 16 UEs, 10 UEs will be scheduled or some non-time critical jobs like adding new UE or deleting UE will be not executed. Hence, in case of VNF saturation, TTI over shooting occurs and affect air resource blocks allocation.
There exist few methods to allocate air resource blocks in VNF saturation. The existing methods allocate air resource blocks is based on users traffic load (on-demand) or minimum and maximum resources configured. However, in such scenario, there is still residual bandwidth left which has not been allocated. Hence, existing methods do not fully allocate air resource blocks and therefore, the air resource blocks are not fully utilized.
Hence, when CPU resources are saturated, this could lead situation where air resource blocks are not fully utilized. In virtual Radio Access Network (vRAN) environment if any of cell are overloaded it could lead a situation where air resource blocks of other cells are not fully utilized.
The present disclosure provides solution to a problem of under utilization of air resources in DSS when CPU resources are saturated in VNFs. VNF saturation leads to underutilization of precious air resources thereby reducing system capabilities. With the proposed techniques, air resources if offloaded to the other peer entity may ensure effective utilization of air resources.
Figure 4 illustrates a flow chart of a method for network resource management in a dynamic spectrum sharing (DSS) wireless communication system, in accordance with an embodiment of the present disclosure.
The method 400 comprises, at step 401, determining a current CPU utilization for a virtualized network function (VNF) in a first communication network. The first communication network is hosted in a first virtualized random access network (vRAN). FIG. 5 illustrates a block diagram of an ADPF, in accordance with an embodiment of the present disclosure. As shown in FIG. 5, the ADPF 500 comprises a plurality of CPUs 510 which are connected to application layers 520 and middleware 530. The middleware 530 and the application layers 520 may communicate via Tx/Rx DPDK based interface 540.
A clock cycle, or simply a "cycle" is a single electronic pulse of a CPU. During each cycle, a CPU can perform a basic operation such as fetching an instruction, accessing memory or writing data. Based on CPU Configuration, capacity of CPU can be determined. For Example: A CPU of 3.5 GHz have 3.5 x 109 cycles/second. A CPU with 100% utilization refers to situation is where all the CPU cycles are being utilized by software or any other internal operation by CPU. External factors like thermal or internal CPU issues may affect these CPU cycles and may affect the overall performance in application layer. An idle time in CPU refers to situation where CPU is not performing any job and is waiting for instruction to be executed.
MAC/PHY software requires real time processing and works on hard time limit i.e. TTI. In an exemplary embodiment, the TTI may be 1ms, 0.5ms or 0.25ms. MAC/PHY layer defines jobs (function) such that it should be able to complete within the hard limit of TTI, i.e. within CPU cycles of 1ms, 0.5ms or 0.25ms. MAC and PHY layers are pinned to certain fixed CPU set, each CPU is pinned to Linux thread. These threads utilize 100% CPU by running busy wait loop i.e. while(1) loop .
In vDU, as MAC and PHY runs on busy wait, in operating system (OS) level CPU utilization will be 100% as all the cycles are utilized by application threads, however from application point of view it may not be really utilization 100% CPU cycles. Hence, in the disclosed techniques, CPU saturation is calculated at application level but not by monitoring at OS level.
In an embodiment, the current CPU utilization may be determined by determining an average processing time (Tp) taken to process a plurality of threads in the predetermined number of transmission time interval (TTI) based on a predetermined number of TTI and a processing time in a particular TTI of the predetermined number of TTI. In an embodiment, the average processing time (Tp) may be calculated as following Equation 1:
[Equation 1]
Figure PCTKR2023001409-appb-img-000001
TK = 1, Where in Kth TTI, Busy cycles (B) ≥ Total Cycles in 1 TTI(Y)
TK = 0, Where in Kth TTI, Busy cycles (B) < Total Cycles in 1 TTI(Y)
n = 100
Application layers can determine Y cycles in 1 TTI cycles as X cycles per second/800. Y Cycles in milli second can be divided into two parts i.e. busy cycles and idle cycles.
Busy Cycles(B): amount of cycles utilized by thread to execute the job
Idle Cycles(I): amount of cycles, thread is waiting for job or not executing any job
Application layers like MAC and PHY can determine normal CPU condition where busy cycles in 1 TTI are less than total cycles in 1 TTI. CPU is saturated when busy cycles(B) is greater than Y cycles i.e. cycles in 1 TTI. Hence, it can be said that, CPU saturation is averagely calculated over period of time (Ex: 100 TTI's i.e. 0.1 sec).
After calculating the average processing time (Tp), the average processing time (Tp) is compared with a predetermined processing time. The current CPU utilization is determined based on a result of the comparison that is the average processing time (Tp) being greater than the predetermined processing time. In an exemplary embodiment, the predetermined processing time may vary from 1 to 10 seconds.
Then, at step 403, the method 400 comprises determining a network utilization (
Figure PCTKR2023001409-appb-img-000002
) for the virtualized network function (VNF) in the first communication network. In an embodiment, to calculate the network utilization (
Figure PCTKR2023001409-appb-img-000003
), firstly, a number of uplink packets is calculated. In an embodiment, the number of uplink packets may comprise a number of packets transmitted and a number of upcoming packets to be transmitted, in an uplink transmission. In an embodiment, these number of uplink packets may be obtained by virtual network processing (VNP) unit which is responsible to receive and transmit network packets over physical network interface card (NIC). It should be noted that the number of uplink packets may be obtained using any other known method in the art.
After calculating the number of uplink packets, a number of downlink packets is calculated. In an embodiment, the number of downlink packets may comprise a number of packets transmitted and a number of upcoming packets to be transmitted, in a downlink transmission. In an embodiment, these number of downlink packets may be obtained by the VNP unit which is responsible to receive and transmit network packets over physical network interface card (NIC). It should be noted that the number of downlink packets may be obtained using any other known method in the art.
Thereafter, average of the calculated uplink and downlink packets is determined as the network utilization.
Then, at step 405, the method 400 comprises monitoring bandwidth utilization (
Figure PCTKR2023001409-appb-img-000004
) of each of plurality of cells connected in the first communication network.
Thereafter, at step 407, the method 400 comprises determining if the current CPU utilization is above a first predefined threshold. In an embodiment, the first predefined threshold may vary from 10% to 70%.
Then, at step 409, the method 400 comprises determining if the network utilization is above a second predefined threshold.
Then, at step 411, the method 400 comprises determining unused bandwidth out of the allocated bandwidth over a predetermined number of transmission time interval (TTI). In an embodiment, the unused bandwidth may be calculated based on current number of UEs attached. In an embodiment, the unused bandwidth may be calculated as difference between total bandwidth and used bandwidth. In another embodiment, the unused bandwidth may be determined based on at least one of a number of user equipment connected to the first communication network over a predetermined period of time, a number of user equipment in a process of connecting to the first communication network over the predetermined period of time, a number of used physical resource blocks (PRB) over the predetermined period of time, and a number of unused used physical resource blocks (PRB) over the predetermined period of time or a combination thereof. For example, if the number of user equipment (UE) is increased over a period of time, let us say in 1-10 seconds, then it may be determined that the used bandwidth is also increased. Similarly, if the number of user equipment in a process of connecting to the first communication network increases, the used bandwidth may also be increased. In the same manner, if number of used physical resource blocks is increased over the predetermined period of time, then the used bandwidth may also be increased. On the other hand, the number of unused used physical resource blocks (PRB) over the predetermined period of time is increased, then the used bandwidth may also be decreased. In an exemplary embodiment, the predetermined processing time may vary from 1 to 10 seconds.
Then, at step 413, the method 400 comprises reallocating at least one air resource block to a second communication network for a predefined period of time based on the determination. In an exemplary embodiment, the predefined period time may vary from 1 to 10 seconds. In an embodiment, the second communication network is hosted in a second virtualized random-access network (vRAN). In an embodiment, the air resource block may be reallocated based upon determining that at least one of the current CPU utilization is above the first predefined threshold or the network utilization is above the second predefined threshold, or the unused bandwidth is less than a third threshold or a combination thereof. In an embodiment, more than one air resource block can be reallocated.
In an embodiment, few examples of the first, second and third thresholds are shown in below table 1.
In an embodiment, the first, second and third thresholds may be preconfigured in the VNP and the determined current CPU utilization, network utilization, unused bandwidth may be compared against the preconfigured thresholds. Based on the comparison, the air resource blocks may be reallocated. Below table 1 represents few conditions of reallocation the air resource blocks to the second communication network:
[Table 1]
Figure PCTKR2023001409-appb-img-000005
As shown in the table 1, in one example, network utilization is > 70% and the current CPU utilization is > 80%, then air resource blocks as reallocated because overloading of network resources could lead to more CPU resources utilization. In another example, network utilization is < 10% and the current CPU utilization is > 80%, then also air resource blocks as reallocated because overloading of CPU is due to more number of UE and small size traffic in most of UEs.
In another embodiment, the determined current CPU utilization, network utilization, unused bandwidth may be used in a predetermined neural model to determine if the air resource blocks are to be reallocated. In an exemplary embodiment, if count of resource block is more than resource required to allocate data, then the air resource blocks may be allocated to the second communication network. In an embodiment, the predetermined neural model may be reinforcement model if the first vRAN is a centralized RAN (C-RAN). In an embodiment, the known reinforcement model may be used. Centralised RAN may have high capacity servers (with respect to CPUs and RAM) in large volumes. This helps to host very complex neural model. So, reinforcement learning models are used in C-RAN system. Cell which support area with high rise building may have high multipath and interference than cell in open area with less buildings. So, each cell needs to different action space. Computation resource availability is high in C-RAN site to use reinforcement learning based Q learning.
In an embodiment, the predetermined neural model may be regression model if the first vRAN is a distributed RAN (DRAN). In an embodiment, the known regression model may be used. Distributed RAN may have vRAN that connect to serve a specific cell site. Therefore, supervised learning model may be better in D-RAN. Also, computation resource are scares in D-RAN site. So, neural model with lesser resource computation is used.
In an embodiment, the first communication network is LTE and the second communication network is 5G/NR. In an alternate embodiment, the first communication network is 5G/NR and the second communication network is LTE. It may be noted that the proposed techniques may be implemented in any wireless communication network other than LTE and 5G/NR.
FIG. 6 illustrates flow chart illustrating sequence flow for reallocating air resource blocks, in accordance with an embodiment of the present disclosure.
As shown in FIG. 6, at step 601, both NR and LTE MAC exchanges Mac2Mac (M2M) message and start sharing predefined air resource blocks. As per traffic on NR and LTE, these predefined air resources change as per known DSS protocol between NR and LTE MAC. In existing DSS method, M2M message like coordination request/response are being used to share the NR/LTE air resources between NR and LTE MAC.
At step 603, it is determined that NR MAC/PHY has reached CPU threshold. As explained, due to CPU saturations in MAC/PHY air resource blocks may not be utilized fully and results in wastage of resources. In fig. 6, it is shown that NR CPU has saturated but either way is also possible.
At step 605, an air resource block reallocation request is transmitted from the first communication network i.e. NR to the second communication network i.e. LTE.
At step 607, a response message is received from the second communication network.
At step 609, the air resource blocks are reallocated to the second communication network.
Hence, the disclosed techniques propose new M2M DSS messages, offloaded request/response to handle/exchange resource block (RB's) during CPU saturation. On CPU saturation, NR MAC may decide/calculate offloaded RB's. These RB's are notified to LTE MAC through M2M DSS Offload request. LTE sends M2M DSS Offload response and start using Offloaded resources. NR MAC starts using resources as per updated agreement between NR and LTE MAC. NR MAC starts monitoring CPU condition and waits for normal CPU condition. Till CPU returns to normal condition, NR does not request more RB as part of existing M2M DSS protocol.
In an embodiment, the method may further monitor the air resource blocks of the first communication network and the second communication network periodically. In an embodiment, the air resources may be monitored every 1 to 10 seconds. It should be noted that the monitoring period may be configured dynamically. Thereafter, it is determined if the air resource blocks are to be reallocated from the first communication network to the second communication network based on at least one of the current CPU utilization or the network utilization or the unused bandwidth or a combination thereof. Then, it is determined if the air resource blocks have been reallocated from the first communication network to the second communication network.
As explained above, the proposed techniques allow better utilization of spectrum where air resources are under utilized under VNF saturation due to system resources. Thus, improves DL and UL throughput of DSS Network. Further, there is no need to change or add interface in network, existing DSS interface can be used. Thus, it reduces complexity and time.
FIG. 7 represents the comparison between resource utilization using existing method and the proposed method. Referring to FIG. 7, FIG. 7 shows under utilized air resources from network 1 are used by network 2 according to the proposed method.
Fig. 8 illustrates a block diagram of an apparatus 800 for network resource management in a dynamic spectrum sharing (DSS) wireless communication system, in accordance with an embodiment of the present disclosure. In an embodiment, the apparatus 800 may comprise a memory 801, a processor 803 and an interface 805. The processor 803 is coupled to the memory 801 and the interface 805. In an embodiment, the processor 803 may be configured to perform the method as discussed in respect to FIGs. 4 to 7.
In an exemplary embodiment, the processor 803 may be a single processing unit or a number of units, all of which could include multiple computing units. The processor 803 may be implemented as one or more microprocessors, microcomputers, microcontrollers, digital signal processors, central processing units, state machines, logic circuitries, and/or any devices that manipulate signals based on operational instructions. Among other capabilities, the processor 803 may be configured to fetch and execute computer-readable instructions and data stored in the memory 801. The processor 803 may include one or a plurality of processors. At this time, one or a plurality of processors may be a general-purpose processor, such as a central processing unit (CPU), an application processor (AP), or the like, a graphics-only processing unit such as a graphics processing unit (GPU), a visual processing unit (VPU), and/or an AI-dedicated processor such as a neural processing unit (NPU). One or a plurality of processors control the processing of the input data in accordance with a predefined operating rule or artificial intelligence (AI) model stored in the non-volatile memory and the volatile memory 801. The predefined operating rule or artificial intelligence model is provided through training or learning.
In an embodiment, the memory 801 may include, but is not limited to computer-readable storage media such as various types of volatile and non-volatile storage media, including but not limited to random access memory, read-only memory, programmable read-only memory, electrically programmable read-only memory, electrically erasable read-only memory, flash memory, magnetic tape or disk, optical media and the like. In one example, memory 801 includes a cache or random access memory for the processor 803. In alternative examples, the memory 801 is separate from the processor 803, such as a cache memory of a processor, the system memory, or other memory. The memory 801 may be an external storage device or database for storing data. The memory 801 is operable to store instructions executable by the processor 803. The functions, acts or tasks illustrated in the figures or described may be performed by the programmed processor 803 for executing the instructions stored in the memory 801. In addition, the interface 805 may include a communication interface such as a transceiver for transmitting/receiving a signal.
The functions, acts or tasks are independent of the particular type of instructions set, storage media, processor or processing strategy and may be performed by software, hardware, integrated circuits, firmware, micro-code and the like, operating alone or in combination. Likewise, processing strategies may include multiprocessing, multitasking, parallel processing and the like.
While specific language has been used to describe the disclosure, any limitations arising on account of the same are not intended. As would be apparent to a person in the art, various working modifications may be made to the method in order to implement the inventive concept as taught herein.
The drawings and the forgoing description give examples of embodiments. Those skilled in the art will appreciate that one or more of the described elements may well be combined into a single functional element. Alternatively, certain elements may be split into multiple functional elements. Elements from one embodiment may be added to another embodiment. For example, orders of processes described herein may be changed and are not limited to the manner described herein.
Moreover, the actions of any flow diagram need not be implemented in the order shown; nor do all of the acts necessarily need to be performed. Also, those acts that are not dependent on other acts may be performed in parallel with the other acts. The scope of embodiments is by no means limited by these specific examples. Numerous variations, whether explicitly given in the specification or not, such as differences in structure, dimension, and use of material, are possible. The scope of embodiments is at least as broad as given by the following claims.
Benefits, other advantages, and solutions to problems have been described above with regard to specific embodiments. However, the benefits, advantages, solutions to problems, and any component(s) that may cause any benefit, advantage, or solution to occur or become more pronounced are not to be construed as a critical, required, or essential feature or component of any or all the claims.

Claims (15)

  1. A method (400) for network resource management in a dynamic spectrum sharing (DSS) wireless communication system, the method (400) comprising:
    determining (401) a current CPU utilization for a virtualized network function (VNF) in a first communication network, wherein the first communication network is hosted in a first virtualized random access network (vRAN);
    determining (403) a network utilization for the virtualized network function (VNF) in the first communication network;
    monitoring (405) bandwidth utilization of each of plurality of cells connected in the first communication network;
    determining (407) if the current CPU utilization is above a first predefined threshold;
    determining (409) if the network utilization is above a second predefined threshold;
    determining (411) unused bandwidth out of the allocated bandwidth over a predetermined number of transmission time interval (TTI); and
    reallocating (413) at least one air resource block to a second communication network for a predefined period of time based on the determination, wherein the second communication network is hosted in a second virtualized random access network (vRAN).
  2. The method (400) of any preceding claim, wherein the reallocating the at least one air resource block comprising:
    reallocating the at least one air resource block based upon determining that at least one of the current CPU utilization is above the first predefined threshold or the network utilization is above the second predefined threshold, or the unused bandwidth is less than a third threshold or a combination thereof.
  3. The method (400) of any preceding claim, wherein the determining the current CPU utilization comprising:
    determining an average processing time (Tp ) taken to process a plurality of threads in the predetermined number of transmission time interval (TTI) based on a predetermined number of TTI and a processing time in a particular TTI of the predetermined number of TTI;
    comparing the average processing time (Tp ) with a predetermined processing time; and
    determining the current CPU utilization based on a result of the comparison that is the average processing time (Tp ) being greater than the predetermined processing time.
  4. The method (400) of any preceding claim, wherein the determining network utilization comprising:
    calculating a number of uplink packets, wherein the number of uplink packets comprises a number of packets transmitted and a number of upcoming packets to be transmitted, in an uplink transmission;
    calculating a number of downlink packets, wherein the number of downlink packets comprises a number of packets transmitted and a number of upcoming packets to be transmitted, in a downlink transmission; and
    determining average of the calculated uplink and downlink packets as the network utilization.
  5. The method (400) of any preceding claim, wherein determining the unused bandwidth comprises determining the unused bandwidth based on at least one of a number of user equipment connected to the first communication network over a predetermined period of time, a number of user equipment in a process of connecting to the first communication network over the predetermined period of time, a number of used physical resource blocks (PRB) over a predetermined period of time, and a number of unused used physical resource blocks (PRB) over the predetermined period of time or a combination thereof.
  6. The method (400) of any preceding claim, wherein reallocating the at least one air resource block comprising:
    transmitting an air resource block reallocation request from the first communication network to the second communication network;
    receiving a response message from the second communication network; and
    reallocating the at least one air resource block to the second communication network.
  7. The method (400) of any preceding claim, further comprising:
    reallocating the at least one air resource block based on a reinforcement learning method, if the first virtualized random access network (vRAN) is a centralized random access network.
  8. The method (400) of any preceding claim, further comprising:
    reallocating the at least one air resource block based on a regression model, if the first virtualized random access network (vRAN) is a distributed random access network.
  9. The method (400) of any preceding claim, further comprising:
    monitoring the at least one air resource block of the first communication network and the second communication network periodically;
    determining if the at least one air resource block are to be reallocated from the first communication network to the second communication network based on at least one of the current CPU utilization or the network utilization or the unused bandwidth or a combination thereof; and
    determining if the at least one air resource block have been reallocated from the first communication network to the second communication network.
  10. An apparatus (800) for network resource management in a dynamic spectrum sharing (DSS) wireless communication system, the apparatus (800) comprising:
    a memory (801);
    an interface (805); and
    a processor (803) coupled to the memory (801) and the interface (805), the processor (803) is configured to:
    determine a current CPU utilization for a virtualized network function (VNF) a in first communication network, wherein the first communication network is hosted in a first virtualized random access network (vRAN);
    determine a network utilization for the virtualized network function (VNF) in the first communication network;
    monitor bandwidth utilization of each of plurality of cells connected in the first communication network;
    determine if the current CPU utilization is above a first predefined threshold;
    determine if the network utilization is above a second predefined threshold;
    determine unused bandwidth out of the allocated bandwidth over a predetermined number of transmission time interval (TTI); and
    reallocate at least one air resource block to a second communication network for a predefined period of time based on the determination, wherein the second communication network is hosted in a second virtualized random access network (vRAN).
  11. The apparatus (800) of any preceding claim, wherein the processor (803) reallocates at least one air resource block based upon determining that at least one of the current CPU utilization is above the first predefined threshold or the network utilization is above the second predefined threshold, or the unused bandwidth is less than a third threshold or a combination thereof.
  12. The apparatus (800) of any preceding claim, wherein the processor (803) determines the current CPU utilization by:
    determining an average processing time (Tp ) taken to process a plurality of threads in the predetermined number of transmission time interval (TTI) based on a predetermined number of TTI and a processing time in a particular TTI of the predetermined number of TTI;
    comparing the average processing time (Tp ) with a predetermined processing time; and
    determining the current CPU utilization based on a result of the comparison that is the average processing time (Tp ) being greater than the predetermined processing time.
  13. The apparatus (800) of any preceding claim, wherein the processor (803) determines the network utilization by:
    calculating a number of uplink packets, wherein the number of uplink packets comprises a number of packets transmitted and a number of upcoming packets to be transmitted, in an uplink transmission;
    calculating a number of downlink packets, wherein the number of downlink packets comprises a number of packets transmitted and a number of upcoming packets to be transmitted, in a downlink transmission; and
    determining average of the calculated uplink and downlink packets as the network utilization.
  14. The apparatus (800) of any preceding claim, wherein the processor (803) determines the unused bandwidth based on at least one of a number of user equipment connected to the first communication network over a predetermined period of time, a number of user equipment in a process of connecting to the first communication network over the predetermined period of time, a number of used physical resource blocks (PRB) over a predetermined period of time, and a number of unused used physical resource blocks (PRB) over the predetermined period of time or a combination thereof.
  15. The apparatus (800) of any preceding claim adapted to operate according to one of claim 6 to claim 9.
PCT/KR2023/001409 2022-01-31 2023-01-31 Method and apparatus for network resource management in wireless communication system supporting dynamic spectrum sharing WO2023146382A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IN202241005274 2022-01-31
IN202241005274 2022-01-31

Publications (1)

Publication Number Publication Date
WO2023146382A1 true WO2023146382A1 (en) 2023-08-03

Family

ID=87472338

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2023/001409 WO2023146382A1 (en) 2022-01-31 2023-01-31 Method and apparatus for network resource management in wireless communication system supporting dynamic spectrum sharing

Country Status (1)

Country Link
WO (1) WO2023146382A1 (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190334796A1 (en) * 2015-09-30 2019-10-31 Intel IP Corporation Devices and methods of using network function virtualization and virtualized resources performance data to improve performance
US20200213205A1 (en) * 2018-12-27 2020-07-02 At&T Intellectual Property I, L.P. Adjusting triggers for automatic scaling of virtual network functions
US20210204148A1 (en) * 2020-01-10 2021-07-01 Joey Chou Real-time intelligent ran controller to support self-driving open ran
US20210235323A1 (en) * 2020-01-27 2021-07-29 Sterlite Technologies Limited Method and apparatus for orthogonal resource allocation in a wireless communication system
US20210258866A1 (en) * 2020-05-05 2021-08-19 Intel Corporation Resource allocation and activation/deactivation configuration of open radio access network (o-ran) network slice subnets

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190334796A1 (en) * 2015-09-30 2019-10-31 Intel IP Corporation Devices and methods of using network function virtualization and virtualized resources performance data to improve performance
US20200213205A1 (en) * 2018-12-27 2020-07-02 At&T Intellectual Property I, L.P. Adjusting triggers for automatic scaling of virtual network functions
US20210204148A1 (en) * 2020-01-10 2021-07-01 Joey Chou Real-time intelligent ran controller to support self-driving open ran
US20210235323A1 (en) * 2020-01-27 2021-07-29 Sterlite Technologies Limited Method and apparatus for orthogonal resource allocation in a wireless communication system
US20210258866A1 (en) * 2020-05-05 2021-08-19 Intel Corporation Resource allocation and activation/deactivation configuration of open radio access network (o-ran) network slice subnets

Similar Documents

Publication Publication Date Title
US20210144198A1 (en) Technologies for cross-layer task distribution
Kan et al. Task offloading and resource allocation in mobile-edge computing system
CN112673593B (en) Improvements in and relating to telecommunications networks
Younis et al. Bandwidth and energy-aware resource allocation for cloud radio access networks
CN110913409B (en) Network configuration method, device and system
KR102185187B1 (en) Cloud based access network
US11172490B2 (en) Apparatus for constructing energy-efficient communication and computation resource allocation framework for multiple communication service and method thereof
US20210306281A1 (en) Combined Network and Computation Slicing for Latency Critical Edge Computing Applications
KR20180126401A (en) Method and apparatus for data processing based on multicore
US20180210765A1 (en) System and Method for Fair Resource Allocation
TW201316803A (en) Method and system for dynamic power control for base stations
CN114788403A (en) Communication method, device and system
WO2019085910A1 (en) Communication terminal, communication test method, and storage medium
CN116324723A (en) Method and apparatus for managing load of network node
Hajisami et al. Elastic resource provisioning for increased energy efficiency and resource utilization in Cloud-RANs
TWI676380B (en) Method and apparatus for transmitting signals
WO2022116014A1 (en) Tbs determining method
Kundu et al. Hardware acceleration for open radio access networks: A contemporary overview
WO2023146382A1 (en) Method and apparatus for network resource management in wireless communication system supporting dynamic spectrum sharing
CN112235387A (en) Multi-node cooperative computing unloading method based on energy consumption minimization
WO2023018229A1 (en) Methods and systems for network slice subnet capability management
CN111919472B (en) Random access response for BWP
WO2019213870A1 (en) Single-stage downlink control information design for scheduling multiple-active bandwidth parts
KR102389665B1 (en) Apparatus and method of constructing energy efficient communication and computation resource allocation framework for multiple communication service
CN112243296B (en) Auxiliary cell activation method and device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23747423

Country of ref document: EP

Kind code of ref document: A1