WO2024043620A1 - Method and apparatus for transmitting data in a wireless communication system - Google Patents
Method and apparatus for transmitting data in a wireless communication system Download PDFInfo
- Publication number
- WO2024043620A1 WO2024043620A1 PCT/KR2023/012233 KR2023012233W WO2024043620A1 WO 2024043620 A1 WO2024043620 A1 WO 2024043620A1 KR 2023012233 W KR2023012233 W KR 2023012233W WO 2024043620 A1 WO2024043620 A1 WO 2024043620A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- layer
- concatenated
- procedure
- sdus
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 57
- 238000004891 communication Methods 0.000 title claims abstract description 22
- 230000004224 protection Effects 0.000 claims abstract description 48
- 230000005540 biological transmission Effects 0.000 claims abstract description 21
- 238000012549 training Methods 0.000 claims description 16
- 230000006978 adaptation Effects 0.000 claims description 6
- 230000006870 function Effects 0.000 description 24
- 238000012545 processing Methods 0.000 description 22
- 238000005516 engineering process Methods 0.000 description 19
- 238000013473 artificial intelligence Methods 0.000 description 18
- 238000010295 mobile communication Methods 0.000 description 12
- 230000008569 process Effects 0.000 description 11
- 238000010801 machine learning Methods 0.000 description 8
- 230000008901 benefit Effects 0.000 description 7
- 230000006872 improvement Effects 0.000 description 5
- 230000001965 increasing effect Effects 0.000 description 5
- 238000010586 diagram Methods 0.000 description 4
- 238000011161 development Methods 0.000 description 3
- 230000018109 developmental process Effects 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 230000001413 cellular effect Effects 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 230000009977 dual effect Effects 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000007781 pre-processing Methods 0.000 description 2
- 230000009467 reduction Effects 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 230000002411 adverse Effects 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000003190 augmentative effect Effects 0.000 description 1
- 230000015556 catabolic process Effects 0.000 description 1
- 238000013480 data collection Methods 0.000 description 1
- 238000006731 degradation reaction Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 230000007717 exclusion Effects 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 230000000116 mitigating effect Effects 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 230000002085 persistent effect Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000001228 spectrum Methods 0.000 description 1
- 239000002699 waste material Substances 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/30—Definitions, standards or architectural aspects of layered protocol stacks
- H04L69/32—Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
- H04L69/321—Interlayer communication protocols or service data unit [SDU] definitions; Interfaces between layers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/10—Flow control; Congestion control
- H04L47/24—Traffic characterised by specific attributes, e.g. priority or QoS
- H04L47/2483—Traffic characterised by specific attributes, e.g. priority or QoS involving identification of individual flows
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/033—Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/10—Integrity
- H04W12/106—Packet or message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
- H04W28/06—Optimizing the usage of the radio link, e.g. header compression, information sizing, discarding information
- H04W28/065—Optimizing the usage of the radio link, e.g. header compression, information sizing, discarding information using assembly or disassembly of packets
Definitions
- the present disclosure relates to wireless communication systems and, more specifically, the present disclosure relates to method and apparatus for transmitting data in a telecommunication network, particularly, but not exclusively a wireless network, such as a cellular network.
- 5G mobile communication technologies define broad frequency bands such that high transmission rates and new services are possible, and can be implemented not only in “Sub 6GHz” bands such as 3.5GHz, but also in “Above 6GHz” bands referred to as mmWave including 28GHz and 39GHz.
- 6G mobile communication technologies referred to as Beyond 5G systems
- THz terahertz
- IIoT Industrial Internet of Things
- IAB Integrated Access and Backhaul
- DAPS Dual Active Protocol Stack
- 5G baseline architecture for example, service based architecture or service based interface
- NFV Network Functions Virtualization
- SDN Software-Defined Networking
- MEC Mobile Edge Computing
- multi-antenna transmission technologies such as Full Dimensional MIMO (FD-MIMO), array antennas and large-scale antennas, metamaterial-based lenses and antennas for improving coverage of terahertz band signals, high-dimensional space multiplexing technology using OAM (Orbital Angular Momentum), and RIS (Reconfigurable Intelligent Surface), but also full-duplex technology for increasing frequency efficiency of 6G mobile communication technologies and improving system networks, AI-based communication technology for implementing system optimization by utilizing satellites and AI (Artificial Intelligence) from the design stage and internalizing end-to-end AI support functions, and next-generation distributed computing technology for implementing services at levels of complexity exceeding the limit of UE operation capability by utilizing ultra-high-performance communication and computing resources.
- FD-MIMO Full Dimensional MIMO
- OAM Organic Angular Momentum
- RIS Reconfigurable Intelligent Surface
- the present disclosure relates to wireless communication systems and, more specifically, the present disclosure relates to method and apparatus for transmitting data in a telecommunication network, particularly, but not exclusively a wireless network, such as a cellular network.
- the present disclosure relates to a means to improve the rate of data processing, provide greater support for Artificial Intelligence/Machine Learning (AI/ML) tools and to enhance security protections applied to data in the network.
- AI/ML Artificial Intelligence/Machine Learning
- aspects of the present disclosure provide efficient communication methods in a wireless communication system.
- Figure 1 illustrates a prior art Control Plane Protocol Stack
- Figure 2 illustrates a prior art User Plane Protocol Stack
- Figure 3 illustrates an example of a User Plane protocol stack according to various embodiments of the present disclosure
- Figure 4 illustrates a prior art of data processing function in the User Plane
- Figure 5 illustrates an example of data processing function in the User Plane according to various embodiments of the present disclosure
- Figure 6 illustrates a prior art data classification function in the User Plane
- Figure 7 illustrates an example of a data classification function in the User Plane according to various embodiments of the present disclosure
- Figure 8 illustrates a prior art data security operation in the User Plane
- Figure 9 illustrates a selectively applied security protection operation in the User Plane according to various embodiments of the present disclosure
- Figure 10 illustrates an overview of a protocol stack in the User Plane according to various embodiments of the present disclosure
- Figures 11 illustrates a packetization process according to, respectively, the prior art and an embodiment of the present disclosure
- Figures 12 illustrates a block diagram of a terminal (or a user equipment (UE), according to embodiments of the present disclosure.
- Figures 13 illustrates a block diagram of a base station, according to embodiments of the present disclosure.
- a method for use by a transmission device in a wireless communication system includes receiving, from an upper layer, a plurality of service data units, SDUs, generating concatenated data by concatenating the plurality of SDUs before performing at least one procedure among an integrity protection procedure and a ciphering procedure for the concatenated data, and transmitting, to a reception device through a lower layer, data for which the at least one procedure has been performed, at a packet data convergence protocol, PDCP, layer. Further, the common security key information for performing the at least one procedure is applied to the SDUs included in the concatenated data.
- the generating of the concatenated data includes generating a field including information related to the concatenation of the SDUs, and including the field in a header with the concatenated SDUs in the generated concatenated data.
- the concatenated data is generated in a layer above a Service Data Adaptation Protocol, SDAP, layer or a PDCP layer, and the concatenation is performed based on a quality of service, QoS, flow identifier, QFI, corresponding to an SDU.
- SDAP Service Data Adaptation Protocol
- QoS quality of service
- QFI flow identifier
- data from a particular Quality of Service flow is categorised as either data to be used as training data for training an AI model or not.
- both the data categorised as training data and the data not so categorised forms part of User Plane, UP, data.
- data arriving at or departing from an SDAP layer, a Tx and Rx layer respectively, is only partially protected.
- security protection in a PDCP layer is de-configured or disabled.
- an apparatus arranged to perform the method of the first aspect.
- the apparatus comprises a base station, gNB, and a User Equipment, UE, communicatively connected.
- gNB base station
- UE User Equipment
- UE User Equipment
- gNB g Node B
- RRC Radio Resource Control layer
- Figures 1 and 2 illustrates the well-known prior art protocol stack model, each comprising several layers, for the CP and UP, respectively.
- Figure 1 additionally, illustrates the Non-Access Stratum (NAS) connection between the UE and the Access and Mobility Management Function (AMF) of the network.
- NAS Non-Access Stratum
- AMF Access and Mobility Management Function
- Figure 3 illustrates an example of a User Plane protocol stack according to various embodiments of the present disclosure.
- Figure 3 shows a modified version of the protocol stack model for UP, originally shown in Figure 2.
- a new layer is shown located above the Service Data Adaptation Protocol (SDAP) layer.
- SDAP Service Data Adaptation Protocol
- Such a layer is useful in connection with adaptations proposed or adopted in the Sixth Generation (6G) standard which supersedes 5G and, at the time of writing, is still being finalised.
- 6G Sixth Generation
- the SDAP layer is responsible for mapping between a quality-of-service (QoS) flow from the 5G core network and a data radio bearer (DRB), as well as marking the quality-of-service flow identifier (QFI) in uplink and downlink packets.
- QoS quality-of-service
- DRB data radio bearer
- Figure 3 also identifies SDAP, PDCP, RLC and MAC layers as possible candidates for optimisation as well as or instead of the new layer arranged above SDAP.
- AI/ML Artificial Intelligence/Machine Learning
- Possible areas which can benefit from AI/ML applications in 6G include Air interface and transmission technologies, e.g. new waveforms; Multiple access; Channel coding; Massive Multiple-input/multiple-out (MIMO); Spectrum sharing; and Network architecture.
- Air interface and transmission technologies e.g. new waveforms; Multiple access; Channel coding; Massive Multiple-input/multiple-out (MIMO); Spectrum sharing; and Network architecture.
- Figure 4 illustrates a prior art of data processing function in the User Plane.
- Figure 4 shows a data processing function in the UP, according to the prior art. Specifically, it shows the situation in a 5G system. It shows a number of QoS flows (QFI1, QFI2, QFI3) being processed by the SDAP layer, mapped to a single DRB (DRB2).
- security protection such as ciphering or integrity protection
- PDCP SDU packet of data
- This has a size of up to 1500 byte, since this is the maximum data size supported by Ethernet.
- security protection can be applied up to a size of 9000 byte. This means that the remaining 7500byte capacity is effectively “wasted”. This is indicated by the portion labelled “Resource Waste”.
- Figure 5 illustrates an example of data processing function in the User Plane according to various embodiments of the present disclosure.
- Figure 5 shows a modified version of the function shown in Figure 4 and is according to an embodiment of the present disclosure. It shows the introduction of a new layer RAP - Radio Analytics Protocol immediately above the SDAP. This is provided to concatenate data from the various QoS flows (QF1 - QFI3). The data from these is concatenated before security protection is applied. This has the effect of maximising the utilisation rate of capacity and reduces the processing time and burden of security protection. It also has the effect of reducing header overhead, since one header is generated per one set of concatenated data, compared to one header per QFI in the prior art shown in Figure 4.
- An AI model may, additionally or alternatively, be employed to decide an optimal amount of data to concatenate.
- Figure 6 illustrates a prior art data classification function in the UP.
- all data packets are inspected and used as possible training data for the AI model shown. This is burdensome and requires significant processing capacity and time.
- Figure 7 illustrates an example of a data classification function in the User Plane according to various embodiments of the present disclosure.
- FIG 7 shows a modified version of the function shown in Figure 6.
- the Radio Analytics Protocol (RAP) is positioned above the SDAP, in both the Tx and Rx chains.
- the RAP acts to classify data from a QoS flow into one of two types: data to be used for training purposes and data not to be used for training purposes. All data still forms part of the UP data and is handled according to known processes, but only some of the data is now used for AI training purposes, depending on the classification applied previously by the RAP layer.
- Figure 8 illustrates a prior art data security operation in the User Plane. This illustrates that all data included in the QoS flows is security protected, as illustrated by the protected data packets shown between PDCP and RLC layers.
- the security protection can be applied and removed as required at appropriate position in the data stream.
- security protection all the data can be burdensome and not all data necessarily requires security protection.
- Figure 9 illustrates a selectively applied security protection operation in the User Plane according to various embodiments of the present disclosure.
- Figure 9 shows a modified version of the security protection function of Figure 8.
- the RAP layer previously referred to, supports selective security protection by protecting only some data packets which require protection and not protecting other packets not requiring such protection.
- the data packets thus arriving at SDAP in the Tx chain are only partially protected.
- the PDCP layer disables security protection.
- the security protection in PDCP layer is de-configured or disabled by RRC reconfiguration to avoid duplicated security protection.
- the data packets are integrity protected or ciphered in RAP layer of Tx side and submitted to the lower layers (e.g., SDAP or PDCP or RLC or MAC or PHY layer).
- the lower layers e.g., SDAP or PDCP or RLC or MAC or PHY layer.
- PDCP layer does not perform security protection (i.e., integrity protection or ciphering) as it was de-configured or disabled.
- the lower layers process and deliver them to the RAP layer.
- the data packets are deciphered or integrity verified in the RAP of Rx side.
- PDCP layer does not perform security protection (i.e., deciphering or integrity verification) as it was de-configured or disabled.
- RAP layer performs security protection, then the data is protected all the way through the peer RAP layer of RX side, i.e., before deciphering or integrity verification at the peer RAP layer i.e., TX RAP -> TX SDAP -> TX PDCP -> TX RLC -> TX MAC -> TX PHY -> over the air -> RX PHY -> RX MAC -> RX RLC -> RX PDCP -> RX RAP.
- RAP protocol can support selective security protection based on RRC configuration and identifier, which significantly reduces the processing burden.
- a new security mechanism e.g., a new algorithm
- the network can de-configure/disable the security protection from PDCP to configure or perform the security protection (e.g., the security mechanism) in RAP, meaning there is no impact on the legacy data processing, which avoids duplicate security protection in both PDCP and RAP layers.
- header design and the corresponding data processing can be considered accordingly, e.g., header field indicating whether SDU is concatenated, or whether SDU is security-protected or the type of data (e.g., training data or normal user plane data).
- the order of functions can be Data classification, Data concatenation, and then selective security protection. If a few functions are introduced, they can follow the similar order.
- the functions can be extended to support mobility (i.e., handover) and split bearer (i.e., UE configured with dual connectivity)
- Figure 10 illustrates an overview of a protocol stack in the User Plane according to various embodiments of the present disclosure.
- Figure 10 illustrates the inter-relation between various QoS Flows and the interaction with SDAP, PDCP, RLC and MAC layers. It illustrates the need for improvements in the data processing function required by embodiments of the present disclosure.
- Release 16 supports integrity protection at any data rate (e.g., 20Gbps) as a mandatory feature. This is just one of the drivers for improved performance addressed by embodiments of the disclosure.
- HSP High Speed Packetisation
- the packetisation process is referred to in relation to Figures 4 and 5 and the so-called waster resource mentioned therein.
- Figures 11 illustrates a packetization process according to, respectively, the prior art and an embodiment of the present disclosure.
- Figure 11(a) shows the payload limited to 1500 bytes, as dictated by Ethernet, whereas Figure 11(b) shows a maximised payload incorporating several PDCP SDUs to optimise the available payload space (which may be up to 9000bytes).
- the User Plane Integrity Protection (UPIP) adopted from Release 16 onwards would result in significant performance degradation on data processing. Further, the data processing capacity of HWA is not fully utilized, i.e., only 1500byte is processed, where there is a capacity of 9000byte.
- UPIP User Plane Integrity Protection
- FIG 11(b) shows HSP according to an embodiment of the disclosure.
- the maximum SDU including multiple PDCP SDUs, as shown, can be processed with one-time initialization and key expansion, which reduces the UPIP processing time.
- the UPIP performance is enhanced as the size of maximum SDU increases.
- the data processing capacity of HWA is fully utilized, i.e., the efficiency thereof can be maximized by PDCP concatenation.
- PDCP concatenation is an add-on feature, to be configured on top of the legacy (or prior art) configuration and is configurable by the network.
- Concatenated SDUs in PDCP can be regarded as one large PDCP PDU, which has no impact on legacy (or prior art) RLC/MAC/PHY.
- a benefit associated with embodiments of the disclosure relates to the reduction of header overhead and processing burden.
- the number of L2 headers per concatenated SDUs i.e., the number of the existing L2 headers to be processed, is reduced by 1/n times where “n” is the number of SDUs to be concatenated.
- SO if e.g., 5 SDUs are concatenated, the number of L2 headers is reduced by 1/5.
- the resource efficiency increases as the number of concatenated SDUs increases, from the network’s perspective.
- a further benefit associated with embodiments of the disclosure concerns throughput enhancement with UPIP.
- the concatenated SDUs can be processed with one-time initialization and one security key expansion, which reduces the processing time required.
- the throughput increases as the size of concatenated SDUs increases.
- PDCP concatenation is applicable to the pending buffered data in a dynamic manner.
- HSP the improvement provided by HSP can be further improved by data collection and classification, security enhancement including selective security protection, and data reproduction.
- Figure 12 illustrates a block diagram of a terminal (or a user equipment (UE)), according to embodiments of the present disclosure.
- Figure. 12 corresponds to the example of the UE.
- the UE may include a transceiver 1210, a memory 1220, and a processor 1230.
- the transceiver 1210, the memory 1220, and the processor 1230 of the UE may operate according to a communication method of the UE described above.
- the components of the UE are not limited thereto.
- the UE may include more or fewer components than those described above.
- the processor 1230, the transceiver 1210, and the memory 1220 may be implemented as a single chip.
- the processor 1230 may include at least one processor.
- the transceiver 1210 collectively refers to a UE receiver and a UE transmitter, and may transmit/receive a signal to/from a base station or a network entity.
- the signal transmitted or received to or from the base station or a network entity may include control information and data.
- the transceiver 1210 may include a RF transmitter for up-converting and amplifying a frequency of a transmitted signal, and a RF receiver for amplifying low-noise and down-converting a frequency of a received signal.
- the transceiver 1210 may receive and output, to the processor 1230, a signal through a wireless channel, and transmit a signal output from the processor 1230 through the wireless channel.
- the memory 1220 may store a program and data required for operations of the UE. Also, the memory 1220 may store control information or data included in a signal obtained by the UE.
- the memory 1220 may be a storage medium, such as read-only memory (ROM), random access memory (RAM), a hard disk, a CD-ROM, and a DVD, or a combination of storage media.
- the processor 1230 may control a series of processes such that the UE operates as described above.
- the transceiver 1210 may receive a data signal including a control signal transmitted by the base station or the network entity, and the processor 1230 may determine a result of receiving the control signal and the data signal transmitted by the base station or the network entity.
- Figure. 13 illustrates a block diagram of a base station, according to embodiments of the present disclosure.
- Figure. 13 corresponds to the example of the gNB.
- the base station may include a transceiver 1310, a memory 1320, and a processor 1330.
- the transceiver 1310, the memory 1320, and the processor 1330 of the base station may operate according to a communication method of the base station described above.
- the components of the base station are not limited thereto.
- the base station may include more or fewer components than those described above.
- the processor 1330, the transceiver 1310, and the memory 1320 may be implemented as a single chip.
- the processor 1330 may include at least one processor.
- the transceiver 1310 collectively refers to a base station receiver and a base station transmitter, and may transmit/receive a signal to/from a terminal or a network entity.
- the signal transmitted or received to or from the terminal or a network entity may include control information and data.
- the transceiver 1310 may include a RF transmitter for up-converting and amplifying a frequency of a transmitted signal, and a RF receiver for amplifying low-noise and down-converting a frequency of a received signal.
- the transceiver 1310 may receive and output, to the processor 1330, a signal through a wireless channel, and transmit a signal output from the processor 1330 through the wireless channel.
- the memory 1320 may store a program and data required for operations of the base station. Also, the memory 1320 may store control information or data included in a signal obtained by the base station.
- the memory 1320 may be a storage medium, such as read-only memory (ROM), random access memory (RAM), a hard disk, a CD-ROM, and a DVD, or a combination of storage media.
- the processor 1330 may control a series of processes such that the base station operates as described above.
- the transceiver 1310 may receive a data signal including a control signal transmitted by the terminal, and the processor 1330 may determine a result of receiving the control signal and the data signal transmitted by the terminal.
- At least some of the example embodiments described herein may be constructed, partially or wholly, using dedicated special-purpose hardware.
- Terms such as ‘component’, ‘module’ or ‘unit’ used herein may include, but are not limited to, a hardware device, such as circuitry in the form of discrete or integrated components, a Field Programmable Gate Array (FPGA) or Application Specific Integrated Circuit (ASIC), which performs certain tasks or provides the associated functionality.
- FPGA Field Programmable Gate Array
- ASIC Application Specific Integrated Circuit
- the described elements may be configured to reside on a tangible, persistent, addressable storage medium and may be configured to execute on one or more processors.
- These functional elements may in some embodiments include, by way of example, components, such as software components, object-oriented software components, class components and task components, processes, functions, attributes, procedures, subroutines, segments of program code, drivers, firmware, microcode, circuitry, data, databases, data structures, tables, arrays, and variables.
- components such as software components, object-oriented software components, class components and task components, processes, functions, attributes, procedures, subroutines, segments of program code, drivers, firmware, microcode, circuitry, data, databases, data structures, tables, arrays, and variables.
- components such as software components, object-oriented software components, class components and task components, processes, functions, attributes, procedures, subroutines, segments of program code, drivers, firmware, microcode, circuitry, data, databases, data structures, tables, arrays, and variables.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Communication Control (AREA)
Abstract
The disclosure relates to a 5G or 6G communication system for supporting a higher data transmission rate. Specifically, the disclosure related to a method performed by a transmission device in a wireless communication system. The method includes receiving, from an upper layer, a plurality of service data units (SDU)s, generating concatenated data by concatenating the plurality of SDUs before performing at least one procedure among an integrity protection procedure and a ciphering procedure for the concatenated data, and transmitting, to a reception device through a lower layer, data for which the at least one procedure has been performed, at a packet data convergence protocol (PDCP) layer. Further, the common security key information for performing the at least one procedure is applied to the SDUs included in the concatenated data.
Description
The present disclosure relates to wireless communication systems and, more specifically, the present disclosure relates to method and apparatus for transmitting data in a telecommunication network, particularly, but not exclusively a wireless network, such as a cellular network.
5G mobile communication technologies define broad frequency bands such that high transmission rates and new services are possible, and can be implemented not only in “Sub 6GHz” bands such as 3.5GHz, but also in “Above 6GHz” bands referred to as mmWave including 28GHz and 39GHz. In addition, it has been considered to implement 6G mobile communication technologies (referred to as Beyond 5G systems) in terahertz (THz) bands (for example, 95GHz to 3THz bands) in order to accomplish transmission rates fifty times faster than 5G mobile communication technologies and ultra-low latencies one-tenth of 5G mobile communication technologies.
At the beginning of the development of 5G mobile communication technologies, in order to support services and to satisfy performance requirements in connection with enhanced Mobile BroadBand (eMBB), Ultra Reliable Low Latency Communications (URLLC), and massive Machine-Type Communications (mMTC), there has been ongoing standardization regarding beamforming and massive MIMO for mitigating radio-wave path loss and increasing radio-wave transmission distances in mmWave, supporting numerologies (for example, operating multiple subcarrier spacings) for efficiently utilizing mmWave resources and dynamic operation of slot formats, initial access technologies for supporting multi-beam transmission and broadbands, definition and operation of BWP (BandWidth Part), new channel coding methods such as a LDPC (Low Density Parity Check) code for large amount of data transmission and a polar code for highly reliable transmission of control information, L2 pre-processing, and network slicing for providing a dedicated network specialized to a specific service.
Currently, there are ongoing discussions regarding improvement and performance enhancement of initial 5G mobile communication technologies in view of services to be supported by 5G mobile communication technologies, and there has been physical layer standardization regarding technologies such as V2X (Vehicle-to-everything) for aiding driving determination by autonomous vehicles based on information regarding positions and states of vehicles transmitted by the vehicles and for enhancing user convenience, NR-U (New Radio Unlicensed) aimed at system operations conforming to various regulation-related requirements in unlicensed bands, NR UE Power Saving, Non-Terrestrial Network (NTN) which is UE-satellite direct communication for providing coverage in an area in which communication with terrestrial networks is unavailable, and positioning.
Moreover, there has been ongoing standardization in air interface architecture/protocol regarding technologies such as Industrial Internet of Things (IIoT) for supporting new services through interworking and convergence with other industries, IAB (Integrated Access and Backhaul) for providing a node for network service area expansion by supporting a wireless backhaul link and an access link in an integrated manner, mobility enhancement including conditional handover and DAPS (Dual Active Protocol Stack) handover, and two-step random access for simplifying random access procedures (2-step RACH for NR). There also has been ongoing standardization in system architecture/service regarding a 5G baseline architecture (for example, service based architecture or service based interface) for combining Network Functions Virtualization (NFV) and Software-Defined Networking (SDN) technologies, and Mobile Edge Computing (MEC) for receiving services based on UE positions.
As 5G mobile communication systems are commercialized, connected devices that have been exponentially increasing will be connected to communication networks, and it is accordingly expected that enhanced functions and performances of 5G mobile communication systems and integrated operations of connected devices will be necessary. To this end, new research is scheduled in connection with eXtended Reality (XR) for efficiently supporting AR (Augmented Reality), VR (Virtual Reality), MR (Mixed Reality) and the like, 5G performance improvement and complexity reduction by utilizing Artificial Intelligence (AI) and Machine Learning (ML), AI service support, metaverse service support, and drone communication.
Furthermore, such development of 5G mobile communication systems will serve as a basis for developing not only new waveforms for providing coverage in terahertz bands of 6G mobile communication technologies, multi-antenna transmission technologies such as Full Dimensional MIMO (FD-MIMO), array antennas and large-scale antennas, metamaterial-based lenses and antennas for improving coverage of terahertz band signals, high-dimensional space multiplexing technology using OAM (Orbital Angular Momentum), and RIS (Reconfigurable Intelligent Surface), but also full-duplex technology for increasing frequency efficiency of 6G mobile communication technologies and improving system networks, AI-based communication technology for implementing system optimization by utilizing satellites and AI (Artificial Intelligence) from the design stage and internalizing end-to-end AI support functions, and next-generation distributed computing technology for implementing services at levels of complexity exceeding the limit of UE operation capability by utilizing ultra-high-performance communication and computing resources.
The present disclosure relates to wireless communication systems and, more specifically, the present disclosure relates to method and apparatus for transmitting data in a telecommunication network, particularly, but not exclusively a wireless network, such as a cellular network.
The present disclosure relates to a means to improve the rate of data processing, provide greater support for Artificial Intelligence/Machine Learning (AI/ML) tools and to enhance security protections applied to data in the network.
Aspects of the present disclosure provide efficient communication methods in a wireless communication system.
For a more complete understanding of the present disclosure and its advantages, reference is now made to the following description taken in conjunction with the accompanying drawings, in which like reference numerals represent like parts:
Figure 1 illustrates a prior art Control Plane Protocol Stack;
Figure 2 illustrates a prior art User Plane Protocol Stack;
Figure 3 illustrates an example of a User Plane protocol stack according to various embodiments of the present disclosure;
Figure 4 illustrates a prior art of data processing function in the User Plane;
Figure 5 illustrates an example of data processing function in the User Plane according to various embodiments of the present disclosure;
Figure 6 illustrates a prior art data classification function in the User Plane;
Figure 7 illustrates an example of a data classification function in the User Plane according to various embodiments of the present disclosure;
Figure 8 illustrates a prior art data security operation in the User Plane;
Figure 9 illustrates a selectively applied security protection operation in the User Plane according to various embodiments of the present disclosure;
Figure 10 illustrates an overview of a protocol stack in the User Plane according to various embodiments of the present disclosure;
Figures 11 illustrates a packetization process according to, respectively, the prior art and an embodiment of the present disclosure;
Figures 12 illustrates a block diagram of a terminal (or a user equipment (UE), according to embodiments of the present disclosure; and
Figures 13 illustrates a block diagram of a base station, according to embodiments of the present disclosure.
According to the present disclosure there is provided an apparatus and method as set forth in the appended claims. Other features of the disclosure will be apparent from the dependent claims, and the description which follows.
According to a first aspect of the present disclosure, there is provided a method for use by a transmission device in a wireless communication system. The method includes receiving, from an upper layer, a plurality of service data units, SDUs, generating concatenated data by concatenating the plurality of SDUs before performing at least one procedure among an integrity protection procedure and a ciphering procedure for the concatenated data, and transmitting, to a reception device through a lower layer, data for which the at least one procedure has been performed, at a packet data convergence protocol, PDCP, layer. Further, the common security key information for performing the at least one procedure is applied to the SDUs included in the concatenated data.
In an embodiment, the generating of the concatenated data includes generating a field including information related to the concatenation of the SDUs, and including the field in a header with the concatenated SDUs in the generated concatenated data.
In an embodiment, the concatenated data is generated in a layer above a Service Data Adaptation Protocol, SDAP, layer or a PDCP layer, and the concatenation is performed based on a quality of service, QoS, flow identifier, QFI, corresponding to an SDU.
In an embodiment, data from a particular Quality of Service flow is categorised as either data to be used as training data for training an AI model or not.
In an embodiment, both the data categorised as training data and the data not so categorised forms part of User Plane, UP, data.
In an embodiment, data arriving at or departing from an SDAP layer, a Tx and Rx layer respectively, is only partially protected.
In an embodiment, security protection in a PDCP layer is de-configured or disabled.
According to a second aspect of the present disclosure, there is provided an apparatus arranged to perform the method of the first aspect.
In an embodiment, the apparatus comprises a base station, gNB, and a User Equipment, UE, communicatively connected.
Although a few preferred embodiments of the present disclosure have been shown and described, it will be appreciated by those skilled in the art that various changes and modifications might be made without departing from the scope of the disclosure, as defined in the appended claims.
In the Fifth Generation (5G) or New Radio (NR) telecommunication system, data flow between the User Equipment (UE), also known as a mobile station or terminal, and the g Node B (gNB) or base station, is split between a User Plane (UP) and a Control Plane (CP). The UP carries the network user traffic. The CP includes the Radio Resource Control layer (RRC) which is responsible for configuring the lower layers.
Figure 1 through Figure 13, discussed below, and the various embodiments used to describe the principles of the present disclosure in this patent document are by way of illustration only and should not be construed in any way to limit the scope of the present disclosure. Those skilled in the art will understand that the principles of the present disclosure may be implemented in any suitably arranged system or device.
Figures 1 and 2 illustrates the well-known prior art protocol stack model, each comprising several layers, for the CP and UP, respectively. Figure 1, additionally, illustrates the Non-Access Stratum (NAS) connection between the UE and the Access and Mobility Management Function (AMF) of the network.
A particular problem associated with prior art systems concerns the speed of data throughput. In particular, evolutions in telecommunications standards require a far greater throughput of data, which prior art systems are not generally able to offer. Combined with the need to improve security protection and support AI/ML, there is a need to greatly increase the speed of data throughput.
It is an aim of embodiments of the present disclosure to address one or more shortcomings in the prior art, whether mentioned herein or not.
Figure 3 illustrates an example of a User Plane protocol stack according to various embodiments of the present disclosure.
Figure 3 shows a modified version of the protocol stack model for UP, originally shown in Figure 2. Here, a new layer is shown located above the Service Data Adaptation Protocol (SDAP) layer. Such a layer is useful in connection with adaptations proposed or adopted in the Sixth Generation (6G) standard which supersedes 5G and, at the time of writing, is still being finalised.
The SDAP layer is responsible for mapping between a quality-of-service (QoS) flow from the 5G core network and a data radio bearer (DRB), as well as marking the quality-of-service flow identifier (QFI) in uplink and downlink packets.
Figure 3 also identifies SDAP, PDCP, RLC and MAC layers as possible candidates for optimisation as well as or instead of the new layer arranged above SDAP.
Amongst the requirements of the new 6G standard are a higher data rate than is possible in 5G, enhanced security of data and the ability to support increased usage of Artificial Intelligence/Machine Learning (AI/ML). Possible areas which can benefit from AI/ML applications in 6G include Air interface and transmission technologies, e.g. new waveforms; Multiple access; Channel coding; Massive Multiple-input/multiple-out (MIMO); Spectrum sharing; and Network architecture.
Figure 4 illustrates a prior art of data processing function in the User Plane.
Figure 4 shows a data processing function in the UP, according to the prior art. Specifically, it shows the situation in a 5G system. It shows a number of QoS flows (QFI1, QFI2, QFI3) being processed by the SDAP layer, mapped to a single DRB (DRB2). In the PDCP layer, security protection, such as ciphering or integrity protection, is applied to one packet of data, such as PDCP SDU. This has a size of up to 1500 byte, since this is the maximum data size supported by Ethernet. However, security protection can be applied up to a size of 9000 byte. This means that the remaining 7500byte capacity is effectively “wasted”. This is indicated by the portion labelled “Resource Waste”.
Figure 5 illustrates an example of data processing function in the User Plane according to various embodiments of the present disclosure.
Figure 5 shows a modified version of the function shown in Figure 4 and is according to an embodiment of the present disclosure. It shows the introduction of a new layer RAP - Radio Analytics Protocol immediately above the SDAP. This is provided to concatenate data from the various QoS flows (QF1 - QFI3). The data from these is concatenated before security protection is applied. This has the effect of maximising the utilisation rate of capacity and reduces the processing time and burden of security protection. It also has the effect of reducing header overhead, since one header is generated per one set of concatenated data, compared to one header per QFI in the prior art shown in Figure 4.
Precisely how much data can be concatenated is configured by the network by means of a pre-defined rule or specific configuration. An AI model may, additionally or alternatively, be employed to decide an optimal amount of data to concatenate.
In Figure 5, the maximised efficiency of the concatenation process is illustrated as “Maximise efficiency” in the PDCP layer.
Figure 6 illustrates a prior art data classification function in the UP. In the prior art shown, all data packets are inspected and used as possible training data for the AI model shown. This is burdensome and requires significant processing capacity and time.
All packets leaving SDAP layer are inspected by the AI model.
Figure 7 illustrates an example of a data classification function in the User Plane according to various embodiments of the present disclosure.
Figure 7 shows a modified version of the function shown in Figure 6. Here, the Radio Analytics Protocol (RAP) is positioned above the SDAP, in both the Tx and Rx chains. In the Tx chain, the RAP acts to classify data from a QoS flow into one of two types: data to be used for training purposes and data not to be used for training purposes. All data still forms part of the UP data and is handled according to known processes, but only some of the data is now used for AI training purposes, depending on the classification applied previously by the RAP layer.
The modification to the protocol stack, and the new functionality provided by RAP, as set out in relation to Figures 5 and 7 may be applied independently of each other, but maximum improvement is provided if the adaptations of both Figure 5 and Figure 7 are applied concurrently.
Figure 8 illustrates a prior art data security operation in the User Plane. This illustrates that all data included in the QoS flows is security protected, as illustrated by the protected data packets shown between PDCP and RLC layers. The security protection can be applied and removed as required at appropriate position in the data stream. However, security protection all the data can be burdensome and not all data necessarily requires security protection.
Figure 9 illustrates a selectively applied security protection operation in the User Plane according to various embodiments of the present disclosure.
Figure 9 shows a modified version of the security protection function of Figure 8. The RAP layer, previously referred to, supports selective security protection by protecting only some data packets which require protection and not protecting other packets not requiring such protection.
The data packets thus arriving at SDAP in the Tx chain are only partially protected. The PDCP layer disables security protection. As the RAP layer is configured with security protection, i.e. ciphering or integrity protection, and performs security protection, the security protection in PDCP layer is de-configured or disabled by RRC reconfiguration to avoid duplicated security protection. For example, the data packets are integrity protected or ciphered in RAP layer of Tx side and submitted to the lower layers (e.g., SDAP or PDCP or RLC or MAC or PHY layer). Note that PDCP layer does not perform security protection (i.e., integrity protection or ciphering) as it was de-configured or disabled. When the data packets are received at Rx side, the lower layers process and deliver them to the RAP layer. The data packets are deciphered or integrity verified in the RAP of Rx side. Note that PDCP layer does not perform security protection (i.e., deciphering or integrity verification) as it was de-configured or disabled.
Note that data communication is peer-to-peer in this instance. If RAP layer performs security protection, then the data is protected all the way through the peer RAP layer of RX side, i.e., before deciphering or integrity verification at the peer RAP layer i.e., TX RAP -> TX SDAP -> TX PDCP -> TX RLC -> TX MAC -> TX PHY -> over the air -> RX PHY -> RX MAC -> RX RLC -> RX PDCP -> RX RAP.
By selectively applying security protection, the AI model training is not adversely affected, since not all training data needs to be security protected. RAP protocol can support selective security protection based on RRC configuration and identifier, which significantly reduces the processing burden. In addition to this, a new security mechanism (e.g., a new algorithm) can be configured/used in RAP. In the prior art 5G system, the network can de-configure/disable the security protection from PDCP to configure or perform the security protection (e.g., the security mechanism) in RAP, meaning there is no impact on the legacy data processing, which avoids duplicate security protection in both PDCP and RAP layers.
To support data concatenation, selective security protection, or data classification as set out above, the header design and the corresponding data processing can be considered accordingly, e.g., header field indicating whether SDU is concatenated, or whether SDU is security-protected or the type of data (e.g., training data or normal user plane data).
The functions referred to above (i.e., data concatenation, selective security protection, or data classification) can be introduced in SDAP layer or PDCP layer to achieve the same purpose.
If all the functions are introduced in a layer, the order of functions can be Data classification, Data concatenation, and then selective security protection. If a few functions are introduced, they can follow the similar order.
The functions can be extended to support mobility (i.e., handover) and split bearer (i.e., UE configured with dual connectivity)
Figure 10 illustrates an overview of a protocol stack in the User Plane according to various embodiments of the present disclosure.
Figure 10 illustrates the inter-relation between various QoS Flows and the interaction with SDAP, PDCP, RLC and MAC layers. It illustrates the need for improvements in the data processing function required by embodiments of the present disclosure. 3GPP standardisation restricted, in Release 15, the use of integrity protection up to 64Kbps. However, Release 16 supports integrity protection at any data rate (e.g., 20Gbps) as a mandatory feature. This is just one of the drivers for improved performance addressed by embodiments of the disclosure.
One of the main processing burdens results from ciphering and integrity protection, both of which are processor-intensive activities. In addition, data may be waiting to be processed before these functions are performed. It has been found, empirically, that peak data rate can be reduced by more than half if integrity protection is applied.
In order to address this issue, High Speed Packetisation (HSP) is applied, this is illustrated in Figure 11 and Figure 12.
The packetisation process is referred to in relation to Figures 4 and 5 and the so-called waster resource mentioned therein.
Figures 11 illustrates a packetization process according to, respectively, the prior art and an embodiment of the present disclosure.
Figure 11(a) shows the payload limited to 1500 bytes, as dictated by Ethernet, whereas Figure 11(b) shows a maximised payload incorporating several PDCP SDUs to optimise the available payload space (which may be up to 9000bytes).
The prior art data structure of Figure 11(a) was designed to support fast data processing, which enables pre-processing before the reception of Uplink grant and the application of Hardware Accelerator (HWA) as shown. However, developments in the evolution of the standards means that L2 headers are added to each PDCP SDU, which incurs a large number of L2 headers to be processed at high data rate, e.g., 1.6 million L2 headers at 20Gbps.
The User Plane Integrity Protection (UPIP) adopted from Release 16 onwards would result in significant performance degradation on data processing. Further, the data processing capacity of HWA is not fully utilized, i.e., only 1500byte is processed, where there is a capacity of 9000byte.
Figure 11(b) shows HSP according to an embodiment of the disclosure. By concatenating data in this way, certain benefits are realised. These certain benefits include accelerating data processing for ciphering and integrity protection, maximizing the utilization rate of Hardware (HW) engine, reducing header overhead, since overall, fewer data headers are required for the same effective data, increasing data throughput.
By combining multiple PDCP SDUs into one pseudo SDU, as illustrated in Figure 11(b) several benefits follow. The number of L2 headers to be processed is significantly reduced, as the number of concatenated SDUs increases, especially for high data rates.
The maximum SDU, including multiple PDCP SDUs, as shown, can be processed with one-time initialization and key expansion, which reduces the UPIP processing time. The UPIP performance is enhanced as the size of maximum SDU increases. Further, the data processing capacity of HWA is fully utilized, i.e., the efficiency thereof can be maximized by PDCP concatenation.
Note that in an embodiment, PDCP concatenation is an add-on feature, to be configured on top of the legacy (or prior art) configuration and is configurable by the network. Concatenated SDUs in PDCP can be regarded as one large PDCP PDU, which has no impact on legacy (or prior art) RLC/MAC/PHY.
A benefit associated with embodiments of the disclosure relates to the reduction of header overhead and processing burden. The number of L2 headers per concatenated SDUs, i.e., the number of the existing L2 headers to be processed, is reduced by 1/n times where “n” is the number of SDUs to be concatenated. SO, if e.g., 5 SDUs are concatenated, the number of L2 headers is reduced by 1/5. The resource efficiency increases as the number of concatenated SDUs increases, from the network’s perspective.
A further benefit associated with embodiments of the disclosure concerns throughput enhancement with UPIP. The concatenated SDUs can be processed with one-time initialization and one security key expansion, which reduces the processing time required. The throughput increases as the size of concatenated SDUs increases.
Furthermore, unnecessary processing delay from PDCP concatenation can be avoided or at least minimised. PDCP concatenation is applicable to the pending buffered data in a dynamic manner.
As mentioned previously, the improvement provided by HSP can be further improved by data collection and classification, security enhancement including selective security protection, and data reproduction.
Figure 12 illustrates a block diagram of a terminal (or a user equipment (UE)), according to embodiments of the present disclosure. Figure. 12 corresponds to the example of the UE.
As shown in Figure. 12, the UE according to an embodiment may include a transceiver 1210, a memory 1220, and a processor 1230. The transceiver 1210, the memory 1220, and the processor 1230 of the UE may operate according to a communication method of the UE described above. However, the components of the UE are not limited thereto. For example, the UE may include more or fewer components than those described above. In addition, the processor 1230, the transceiver 1210, and the memory 1220 may be implemented as a single chip. Also, the processor 1230 may include at least one processor.
The transceiver 1210 collectively refers to a UE receiver and a UE transmitter, and may transmit/receive a signal to/from a base station or a network entity. The signal transmitted or received to or from the base station or a network entity may include control information and data. The transceiver 1210 may include a RF transmitter for up-converting and amplifying a frequency of a transmitted signal, and a RF receiver for amplifying low-noise and down-converting a frequency of a received signal. However, this is only an example of the transceiver 1210 and components of the transceiver 1210 are not limited to the RF transmitter and the RF receiver.
Also, the transceiver 1210 may receive and output, to the processor 1230, a signal through a wireless channel, and transmit a signal output from the processor 1230 through the wireless channel.
The memory 1220 may store a program and data required for operations of the UE. Also, the memory 1220 may store control information or data included in a signal obtained by the UE. The memory 1220 may be a storage medium, such as read-only memory (ROM), random access memory (RAM), a hard disk, a CD-ROM, and a DVD, or a combination of storage media.
The processor 1230 may control a series of processes such that the UE operates as described above. For example, the transceiver 1210 may receive a data signal including a control signal transmitted by the base station or the network entity, and the processor 1230 may determine a result of receiving the control signal and the data signal transmitted by the base station or the network entity.
Figure. 13 illustrates a block diagram of a base station, according to embodiments of the present disclosure. Figure. 13 corresponds to the example of the gNB.
As shown in Figure. 13, the base station according to an embodiment may include a transceiver 1310, a memory 1320, and a processor 1330. The transceiver 1310, the memory 1320, and the processor 1330 of the base station may operate according to a communication method of the base station described above. However, the components of the base station are not limited thereto. For example, the base station may include more or fewer components than those described above. In addition, the processor 1330, the transceiver 1310, and the memory 1320 may be implemented as a single chip. Also, the processor 1330 may include at least one processor.
The transceiver 1310 collectively refers to a base station receiver and a base station transmitter, and may transmit/receive a signal to/from a terminal or a network entity. The signal transmitted or received to or from the terminal or a network entity may include control information and data. The transceiver 1310 may include a RF transmitter for up-converting and amplifying a frequency of a transmitted signal, and a RF receiver for amplifying low-noise and down-converting a frequency of a received signal. However, this is only an example of the transceiver 1410 and components of the transceiver 1310 are not limited to the RF transmitter and the RF receiver.
Also, the transceiver 1310 may receive and output, to the processor 1330, a signal through a wireless channel, and transmit a signal output from the processor 1330 through the wireless channel.
The memory 1320 may store a program and data required for operations of the base station. Also, the memory 1320 may store control information or data included in a signal obtained by the base station. The memory 1320 may be a storage medium, such as read-only memory (ROM), random access memory (RAM), a hard disk, a CD-ROM, and a DVD, or a combination of storage media.
The processor 1330 may control a series of processes such that the base station operates as described above. For example, the transceiver 1310 may receive a data signal including a control signal transmitted by the terminal, and the processor 1330 may determine a result of receiving the control signal and the data signal transmitted by the terminal.
In the afore-described embodiments of the present disclosure, elements included in the present disclosure are expressed in a singular or plural form according to the embodiments. However, the singular or plural form is appropriately selected for convenience of explanation and the present disclosure is not limited thereto. As such, an element expressed in a plural form may also be configured as a single element, and an element expressed in a singular form may also be configured as plural elements.
At least some of the example embodiments described herein may be constructed, partially or wholly, using dedicated special-purpose hardware. Terms such as ‘component’, ‘module’ or ‘unit’ used herein may include, but are not limited to, a hardware device, such as circuitry in the form of discrete or integrated components, a Field Programmable Gate Array (FPGA) or Application Specific Integrated Circuit (ASIC), which performs certain tasks or provides the associated functionality. In some embodiments, the described elements may be configured to reside on a tangible, persistent, addressable storage medium and may be configured to execute on one or more processors. These functional elements may in some embodiments include, by way of example, components, such as software components, object-oriented software components, class components and task components, processes, functions, attributes, procedures, subroutines, segments of program code, drivers, firmware, microcode, circuitry, data, databases, data structures, tables, arrays, and variables. Although the example embodiments have been described with reference to the components, modules and units discussed herein, such functional elements may be combined into fewer elements or separated into additional elements. Various combinations of optional features have been described herein, and it will be appreciated that described features may be combined in any suitable combination. In particular, the features of any one example embodiment may be combined with features of any other embodiment, as appropriate, except where such combinations are mutually exclusive. Throughout this specification, the term “comprising” or “comprises” means including the component(s) specified but not to the exclusion of the presence of others.
Attention is directed to all papers and documents which are filed concurrently with or previous to this specification in connection with this application and which are open to public inspection with this specification, and the contents of all such papers and documents are incorporated herein by reference.
All of the features disclosed in this specification (including any accompanying claims, abstract and drawings), and/or all of the steps of any method or process so disclosed, may be combined in any combination, except combinations where at least some of such features and/or steps are mutually exclusive.
Each feature disclosed in this specification (including any accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise. Thus, unless expressly stated otherwise, each feature disclosed is one example only of a generic series of equivalent or similar features.
The disclosure is not restricted to the details of the foregoing embodiment(s). The disclosure extends to any novel one, or any novel combination, of the features disclosed in this specification (including any accompanying claims, abstract and drawings), or to any novel one, or any novel combination, of the steps of any method or process so disclosed.
Claims (15)
- A method performed by a transmission device in a wireless communication system, the method comprising:receiving, from an upper layer, a plurality of service data units (SDU)s;generating concatenated data by concatenating the plurality of SDUs before performing at least one procedure among an integrity protection procedure and a ciphering procedure for the concatenated data; andtransmitting, to a reception device through a lower layer, data for which the at least one procedure has been performed, at a packet data convergence protocol (PDCP) layer,wherein common security key information for performing the at least one procedure is applied to the SDUs included in the concatenated data.
- The method of claim 1, wherein the generating of the concatenated data comprises:generating a field including information related to the concatenation of the SDUs; andincluding the field in a header with the concatenated SDUs in the generated concatenated data.
- The method of claim 1, wherein the concatenated data is generated in a layer above a Service Data Adaptation Protocol (SDAP) layer or a PDCP layer, andwherein the concatenation is performed based on a quality of service (QoS) flow identifier (QFI) corresponding to an SDU.
- The method of claim 1, wherein data from a particular Quality of Service flow is categorised as either data to be used as training data for training an AI model or not.
- The method of claim 4, wherein both the data categorised as training data and the data not so categorised forms part of User Plane, UP, data.
- The method of claim 1, wherein data arriving at or departing from an SDAP layer, a Tx and Rx layer respectively, is only partially protected.
- The method of claim 6, wherein security protection in a PDCP layer is de-configured or disabled.
- A transmission device in wireless communication system, the transmission device comprising:a transceiver, anda controller coupled with the transceiver and configured to:receive, from an upper layer, a plurality of service data units (SDU)s;generate concatenated data by concatenating the plurality of SDUs before performing at least one procedure among an integrity protection procedure and a ciphering procedure for the concatenated data; andtransmit, to a reception device through a lower layer, data for which the at least one procedure has been performed, at a packet data convergence protocol (PDCP) layer,wherein common security key information for performing the at least one procedure is applied to the SDUs included in the concatenated data.
- The transmission device of claim 8, wherein the controller further configured to:generate a field including information related to the concatenation of the SDUs; andinclude the field in a header with the concatenated SDUs in the generated concatenated data.
- The transmission device of claim 8, wherein the concatenated data is generated in a layer above a Service Data Adaptation Protocol (SDAP) layer or a PDCP layer, andwherein the concatenation is performed based on a quality of service (QoS) flow identifier (QFI) corresponding to an SDU.
- The transmission device of claim 8, wherein data from a particular Quality of Service flow is categorised as either data to be used as training data for training an AI model or not.
- The transmission device of claim 11, wherein both the data categorised as training data and the data not so categorised forms part of User Plane, UP, data.
- The transmission device of claim 8, wherein data arriving at or departing from an SDAP layer, a Tx and Rx layer respectively, is only partially protected.
- The transmission device of claim 12, wherein security protection in a PDCP layer is de-configured or disabled.
- The transmission device of claim 8 further comprising a base station (BS) and a User Equipment (UE) communicatively connected.
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GBGB2212241.0A GB202212241D0 (en) | 2022-08-23 | 2022-08-23 | A transmission method in a wireless network |
GB2212241.0 | 2022-08-23 | ||
GB2311483.8A GB2622479A (en) | 2022-08-23 | 2023-07-26 | A method of transmission in a telecommunication network |
GB2311483.8 | 2023-07-26 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2024043620A1 true WO2024043620A1 (en) | 2024-02-29 |
Family
ID=83902159
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/KR2023/012233 WO2024043620A1 (en) | 2022-08-23 | 2023-08-18 | Method and apparatus for transmitting data in a wireless communication system |
Country Status (2)
Country | Link |
---|---|
GB (2) | GB202212241D0 (en) |
WO (1) | WO2024043620A1 (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20190075466A1 (en) * | 2017-03-17 | 2019-03-07 | Nokia Of America Corporation | System and method for dynamic activation and deactivation of user plane integrity in wireless networks |
US20200245401A1 (en) * | 2017-09-28 | 2020-07-30 | Samsung Electronics Co., Ltd. | Method and system for handling pdcp operation in wireless communication system |
US20210136637A1 (en) * | 2017-01-24 | 2021-05-06 | Zte Corporation | Data transmission method and apparatus |
US20210267003A1 (en) * | 2018-05-18 | 2021-08-26 | Lg Electronics Inc. | Method and apparatus for transmitting data units by user equipment in wireless communication system |
US20220150693A1 (en) * | 2020-11-10 | 2022-05-12 | Samsung Electronics Co., Ltd. | Method and apparatus for accelerating data processing in next-generation wireless communication system |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8743905B2 (en) * | 2008-12-22 | 2014-06-03 | Qualcomm Incorporated | Method and apparatus for bundling and ciphering data |
-
2022
- 2022-08-23 GB GBGB2212241.0A patent/GB202212241D0/en not_active Ceased
-
2023
- 2023-07-26 GB GB2311483.8A patent/GB2622479A/en active Pending
- 2023-08-18 WO PCT/KR2023/012233 patent/WO2024043620A1/en unknown
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20210136637A1 (en) * | 2017-01-24 | 2021-05-06 | Zte Corporation | Data transmission method and apparatus |
US20190075466A1 (en) * | 2017-03-17 | 2019-03-07 | Nokia Of America Corporation | System and method for dynamic activation and deactivation of user plane integrity in wireless networks |
US20200245401A1 (en) * | 2017-09-28 | 2020-07-30 | Samsung Electronics Co., Ltd. | Method and system for handling pdcp operation in wireless communication system |
US20210267003A1 (en) * | 2018-05-18 | 2021-08-26 | Lg Electronics Inc. | Method and apparatus for transmitting data units by user equipment in wireless communication system |
US20220150693A1 (en) * | 2020-11-10 | 2022-05-12 | Samsung Electronics Co., Ltd. | Method and apparatus for accelerating data processing in next-generation wireless communication system |
Also Published As
Publication number | Publication date |
---|---|
GB202311483D0 (en) | 2023-09-06 |
GB2622479A (en) | 2024-03-20 |
GB202212241D0 (en) | 2022-10-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2012148243A2 (en) | Method for improving communication performance using vehicle provided with antennas | |
US9426649B2 (en) | Apparatus, system and method of securing communications of a user equipment (UE) in a wireless local area network | |
US20160366707A1 (en) | Apparatus, system and method of securing communications of a user equipment (ue) in a wireless local area network | |
WO2023090820A1 (en) | Method and apparatus for ue authentication for remote provisioning | |
EP4014673A1 (en) | Apparatus and method for handling pdu session in wireless communication system | |
WO2024043620A1 (en) | Method and apparatus for transmitting data in a wireless communication system | |
WO2022235117A1 (en) | Method and apparatus for supporting system information acquisition by sidelink remote terminal over sidelink relay | |
WO2019074266A1 (en) | Method for transmitting and receiving srs and communication device therefor | |
WO2024091066A1 (en) | Method and apparatus for processing integrity of remote ue packet transmitted through ue relay in wireless communication system | |
EP4121873A1 (en) | Selective user plane protection in 5g virtual ran | |
WO2022154543A1 (en) | Method and device for configuring available harq process of logical channel | |
WO2023146311A1 (en) | Method and apparatus for supporting packet processing in network congestion situation | |
WO2023013936A1 (en) | Method and device for operating wireless-core converged control plane in wireless communication system | |
WO2023158269A1 (en) | Method and apparatus for ue communicating with telecommunication network via a satellite | |
WO2023243978A1 (en) | Device and method for processing random access report about random access configuration and random access processing for supporting specific function in wireless communication system | |
WO2024076184A1 (en) | Method and apparatus for message routing between different network nodes in 6g network architecture | |
WO2023243929A1 (en) | Method and device for nes mode operation of idle mode and inactive mode terminal in wireless communication system | |
WO2023214851A1 (en) | Method and device for real-time media transmission in mobile communication system | |
WO2023224381A1 (en) | Method and device for next-generation mobile communication system combined with computing in network equipment | |
WO2024049070A1 (en) | Method and device for transferring application layer information/transport layer information for application performance in cellular communication system | |
WO2024019573A1 (en) | Method and apparatus for providing network response information in wireless communication system | |
WO2024035122A1 (en) | Method and device for mbs sps reception in rrc inactive mode | |
WO2024054086A1 (en) | Message transfer method for supporting in-network computing in mobile communication network | |
WO2024039189A1 (en) | Method and apparatus for discarding pdcp sdu in wireless communication system | |
WO2024096687A1 (en) | Method and device for collecting and analyzing network data related to policy application of terminal in wireless communication system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 23857654 Country of ref document: EP Kind code of ref document: A1 |