Aggregated handover in integrated small cell and WiFi networks
11228959 · 2022-01-18
Assignee
Inventors
- Qing Li (Princeton Junction, NJ)
- Michael F. Starsinic (Newtown, PA)
- Ahmed Mohamed (Miramar, FL, US)
- Rocco Di Girolamo (Laval, CA)
Cpc classification
H04W36/0009
ELECTRICITY
International classification
H04W8/18
ELECTRICITY
Abstract
Mechanisms for efficient inter-system or inter-RAT handover for the case when large numbers of devices need to perform a handover within a short time interval or even simultaneously are described. These mechanisms can include an aggregated Handover Procedure. An Aggregated Handover procedure can be enabled by a UE and can be indicated to the network entities by “Aggregated Handover Indication”. The detection of target (H)eNB or WLAN can be triggered by user, GPS location, boarding time, or a travel or eTicket application etc. The UEs requesting Aggregated Handover within a time interval, i.e. Handover Window, can be processed with aggregated messages by the core network entities.
Claims
1. An apparatus comprising a processor and a memory, the apparatus further comprising computer-executable instructions stored in the memory of the apparatus which, when executed by the processor of the apparatus, cause the apparatus to: receive a plurality of indications from a plurality of User Equipments (UEs) associated with a desired handover for the plurality of UEs between a first connection and a second connection, wherein the indications comprise handover window period values for the UEs; and initiate an aggregated handover for more than one of the plurality of UEs within one or more handover window periods of the more than one of the plurality of UEs.
2. The apparatus of claim 1 wherein the apparatus uses the handover window specified by each UE to decide a priority of grouping the UEs for aggregated handover.
3. The apparatus of claim 1, wherein the first connection corresponds to a non-cellular connection and the second connection corresponds to a cellular connection.
4. The apparatus of claim 3, wherein the first connection comprises a WiFi connection.
5. The apparatus of claim 4, wherein the apparatus comprises a Mobility Management Entity (MME) or a Network Function and the aggregate handover comprises a WiFi connection to cellular connection handover.
6. The apparatus of claim 1, wherein the aggregate handover is from the first connection to the second connection.
7. The apparatus of claim 1, wherein the aggregate handover comprises a seamless handover that uses an interface between a first access point and a second access point for the aggregate handover.
8. The apparatus of claim 1, wherein the aggregated handover comprises a plurality of messages that combine information for the more than one of the plurality of UEs.
9. A user equipment (UE) comprising a processor and a memory, the UE further comprising computer-executable instructions stored in the memory of the UE which, when executed by the processor of the UE, cause the UE to: send an indication of a desired handover between a first connection and a second connection for the UE, wherein the indication comprises a handover window period value for the UE; and undergo an aggregated handover along with another UE within a handover window period.
10. The apparatus of claim 9, wherein the first connection corresponds to a non-cellular connection and the second connection corresponds to a cellular connection.
11. The apparatus of claim 10, wherein the first connection comprises a WiFi connection.
12. The UE of claim 10 wherein the indication is sent to a Mobility Management Entity (MME) or a Network Function and the aggregated handover is from the first connection to the second connection.
13. The UE of claim 9, wherein the aggregate handover comprises a seamless handover that uses an interface between a first access point and a second access point for the aggregate handover.
14. The UE of claim 9, wherein the aggregated handover comprises a plurality of messages that combine information for the UE and the another UE.
15. An apparatus comprising a processor and a memory, the apparatus further comprising computer-executable instructions stored in the memory of the apparatus which, when executed by the processor of the apparatus, cause the apparatus to: receive a plurality of indications from an access point that is connected to a plurality of User Equipments (UEs) requesting an aggregated handover for the plurality of UEs along with a handover window period, wherein the indications comprise handover window period values for the UEs; and initiate an aggregated handover for the plurality of UEs within the handover window period.
16. The apparatus of claim 15, wherein the indications are received from the access point as a result of an upcoming shut down of the access point.
17. The apparatus of claim 15, wherein the first connection corresponds to a non-cellular connection and the second connection corresponds to a cellular connection.
18. The apparatus of claim 17, wherein the first connection comprises a WiFi connection.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1) A more detailed understanding may be had from the following description, given by way of example in conjunction with accompanying drawings wherein:
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(12)
(13)
(14)
(15)
(16)
(17)
(18)
DETAILED DESCRIPTION OF ILLUSTRATIVE EMBODIMENTS
(19) A “small cell” can be a localized geographic areas providing wireless network access via operator-licensed spectrum using 3GPP-defined cellular Radio Access Technologies (RATs).
(20) A Femtocell is a class of device used for small cells, and designed as “plug-and-play” customer premises equipment (CPE) that can be installed in residential and enterprise environments without the need for an experienced technician. Public femtocell “hotspot” deployments are also supported. 3GPP refers to UMTS femtocells as Home NodeBs (HNBs) and LTE femtocells as Home eNodeBs (HeNBs). H(e)NBs use a broadband Internet connection to access a remote H(e)NB Management System (H(e)MS) for automatic configuration, while also providing backhaul access to the Mobile Core Network (MCN) for cellular services.
(21) “WiFi hotspots” are defined as localized geographic areas providing wireless network access via unlicensed spectrum using RATs standardized by IEEE 802.11. In addition to direct access to local area networks and the Internet, WiFi access to the 3GPP EPC 106 network is also considered.
(22) User Equipment (UE) is any device used directly by an end-user to communicate. It can be a hand-held telephone, a laptop computer equipped with a mobile broadband adapter, or any other device.
(23) With respect to WiFi access to the EPC 106, the term “trusted WLAN access” applies to the MNO's belief that appropriate measures have been taken to safeguard the EPC 106 from access via the WLAN 103. Such measures are left to the discretion of the MNO and may, for example, include establishment of a tamper-proof fiber connection between the WLAN 103 and EPC 106, or establishment of an Internet Protocol Security (IPSec) security association between the WLAN 103 and a Security Gateway (SeGW) 122 at the EPC 106 edge. In contrast, if the WLAN access is deemed “untrusted” the WLAN 103 must interface with an evolved Packet Data Gateway (ePDG) at the EPC 106 edge, and the ePDG must establish an IPSec security association directly with each UE accessing the EPC 106 through the WLAN 103.
(24) An “Integrated Small Cell and WiFi Network” (ISWN) can be a joint access network deployed by mobile operators for both small cells and WLAN 103 access. Such networks may include enhancements to multi-RAT terminal capabilities, small cell and WiFi access capabilities, EPC 106 network elements, and configuration/policy/traffic management functions.
(25) A Handover Window can be a time interval (typically a very short time interval) that UEs are required to handover from source (H)eNB 202 or WLAN 103 to target WLAN 103 or (H)eNB 202. This time interval may be used: for aggregating the Handover (HO) messages for multiple UEs, or for forming a group of UEs for group based handover.
(26) Handover Window may be pre-configured with a default value, but may also be adjusted based on the quantity of handover requests, e.g. the Handover Window size may be reduced if more UEs request handover.
(27) Previously, multiple architectures for Small Cell and WLAN integration have been devised.
(28)
(29)
(30)
(31) As the IoT is becoming a reality, more and more devices are connected via different wireless access networks to support our modern daily life and due to the increasing mobility in our society, more and more devices are moved around within the massive transportation systems (e.g. international airports, central train stations, and major sea ports, etc.). Among them, some devices, such as health monitoring or object tracking devices, require continuous connected services. For example, while boarding a train, many devices move from a macro cell eNB 501 or HeNB/WLAN 502 at a train station to the WLAN/HeNB 504 on the train—as the Use Case I illustrates in
(32) Another example is shown in
(33) As described below each device (i.e. a UE) is individually attached to the EPC 106 core network either via LTE macro cell 501 or WLAN 103 and devices are also handled individually during inter-system or inter-RAT handover. For the Use Case I, II and III, the inter-system or inter-RAT handover may be delayed or even fail due to the congestion or overload in the core network or RAN caused by the massive number of devices requiring handover in a very short time or even simultaneously. This may cause discontinuity of services to those devices requiring continuous connections.
(34) The problem is: how to handle the inter-system or inter-RAT handover more efficiently and reliably, when large numbers of devices require the handover to a target (H)eNB/WLAN within a short time interval or even simultaneously?
(35) As exampled in Use Case I, II and III, the EPC 106 core network may be overloaded with handover signaling and messages if a large number of devices conduct handover to a targeted (H)eNB 202 or WLAN 103 during a short time interval or simultaneously. To reduce the handover overhead within the EPC 106 core network, we propose aggregated messaging among the network entities such as MME 108, SGW 110, PGW 112, and HSS 116/AAA server 118 within EPC 106 that can be particularly useful under certain conditions: there are a large number of devices requiring smooth or seamless handover from a source (H)eNB 202 or WLAN 103 to a known target WLAN 103 or (H)eNB 202; handover requests are sent within a very short time interval (i.e. Handover Window) or simultaneously; source (H)eNB 202 and target WLAN 103 are collocated; source WLAN 103 and target (H)eNB 202 are collocated.
(36) The mechanisms are illustrated as handover between (H)eNB 202 and WLAN 103 in the examples in this section, but they may also be applied to the handovers with large member of devices or UEs between collocated access networks.
(37) Aggregated Handovers
(38) We use mainly Use Case I or Use Case II as an example to explain the aggregated handover scheme for the architecture shown in
(39) Aggregated Handovers Initiated by UEs from WLAN to (H)eNB
(40) For the architecture shown in
(41) Step “a” and “b” may be sequential during a Handover Window or simultaneous. The steps below only refer to TWAN 102, not to specific functions internal to TWAN 102 (i.e. TWAG 124, TWAP 126 and WLAN AN 103). TWAN 102 and WLAN 103 are interchangeable in the descriptions.
(42) This call flow may also apply to PMIP based S5 between SGW 110 and PGW 112 with step 6 “Create Session Request” and step 8 “Create Session Response” replaced with “Proxy Binding Update” and “Proxy Binding Ack” respectively, and step 12 “Modify Bearer Request” and step 13 “Modify Bearer Response” replaced with “Proxy Binding Update” and “Proxy Binding Ack” respectively.
(43) In Step 0 of
(44) In Step 1 of
(45) The target (H)eNB 202 can be pre-known to UEs either via pre-configuration by the users (for instance it may be manually entered) or notification by a travel or e-ticket application.
(46) UE3 802 and UE4 804 decide to transfer their sessions (i.e. handover) from the source TWAN 102 to target (H)eNB 202. Alternatively, the Handover (HO) procedure may also be automatically triggered by the boarding or arriving process.
(47) For Use Case III, the handover procedure may also be triggered by a Cell (i.e. (H)eNB 202) or a WLAN 103 when it is scheduled or triggered to turn off so that the UEs may move over to the macro cell 104,
(48) In Step 2 of
(49) In Use Case III, a Cell (i.e. (H)eNB 202) or a WLAN 103 may indicate “Aggregated Handover” and the “Handover Window” in its handover request.
(50) When the MME 108 receives an Aggregated Handover request, it may set a timer to see if any other individual attach requests are received within a time window (i.e. the Handover Window used by MME for aggregating the handover). If other attach requests are received within the time window, they may be aggregated with the original request. This time window, i.e. the Handover Window, may also be requested by the user in UE's handover request. The UE's Handover Window may be either preconfigured via the GUI and then may be updated later with the handover requester (i.e. MME 108, Source or target (H)eNB 202/TWAN 102) based on the amount of UEs requesting handover.
(51) The MME may also use the Handover Window specified by each UE to decide the priority of grouping the UEs for aggregated handover, e.g. UEs with smaller Handover Window requested may be grouped first for aggregated handover than the other UEs with larger Handover Window requested (i.e. more tolerant to the delay caused by the aggregated handover).
(52) Letting the UE to indicate “Aggregation” with “Handover Window” configured will help the network know how much delay tolerance that the UE allows, e.g. some device requiring continuous service may define a tight “Handover Window” and therefore may get grouped first for aggregated handover by the core network.
(53) The core network may also make aggregated handover messaging transparent to UE—deciding to aggregate or not based on the network conditions with the aggregation schemes.
(54) In Step 3 of
(55) In Step 4 of
(56) In Step 5 of
(57) In Step 6 of
(58) In Step 7 of
(59) Since Aggregated Handover Indication is included in step 7, the PGW 112 defers any modification to UE3 802 and UE4 804's PCC Rules for charging and policy until step 12.
(60) Depending on the active UE3 802 and UE4 804's PCC rules, the dedicated bearers for UE3 802 and UE4 804 may be created as part of default bearer establishment or immediately afterwards.
(61) In Step 8 of
(62) In Step 9 of
(63) In Step 10 of
(64) In Step 11 of
(65) In Step 12 of
(66) In this step, the PGW 112 applies any modification to UE3 802 and UE4 804's PCC Rules received from the PCRF 114, if there is PCRF 114 interaction in step 8 for dynamic PCC. The Charging IDs previously in use for UE3 802 and UE4 804's default and dedicated bearers in source TWAN 102 on the S2a interface now may apply to UE3 802 and UE4 804's corresponding default bearers in target (H)eNB 202 with the same QCI and ARP in source TWAN 102. If dedicated bearers are created for UE3 802 and UE4 804, new Charging IDs may be assigned by the PGW 112 for each of them.
(67) In Step 13 of
(68) In Step 14 of
(69) In Step 15 of
(70) In Step 16 of
(71) In Step 17 of
(72) It is understood that the entities performing the steps illustrated in
(73) Aggregated Handovers Initiated by UEs from (H)eNB 202 to WLAN 103
(74) Another example of aggregated handovers initiated by UEs is shown in
(75) Step “a” and “b” may be sequential or simultaneous. The steps below only refer to TWAN 102, not to specific functions internal to TWAN 102 (i.e. TWAG 124, TWAP 126 and WLAN AN). TWAN 102 and WLAN 103 are interchangeable in the descriptions.
(76) This call flow may also apply to GTP on S2a between TWAN 102 and PGW 112 with step 3 and 6 as “Create Session Request” and “Create Session Response” respectively.
(77) In Step 0 of
(78) In Step 1 of
(79) In Step 2 of
(80) In Step 3 of
(81) Mobile Node Network Access Identifiers (MN NAIs) identify UE1 and UE2 respectively.
(82) APNs are default APNs for UE1 and UE2 respectively in target TWAN 102
(83) GRE keys are used for GRE encapsulation of the PDN connections for UE1 and UE2 respectively
(84) In Step 4 of
(85) In Step 5 of
(86) In Step 6 of
(87) In Step 7 of
(88) In Step 8 of
(89) In Step 9 of
(90) In Step 10 of
(91) In Step 11 of
(92) In Step 12 of
(93) It is understood that the entities performing the steps illustrated in
(94) Aggregated Seamless Handover
(95) As illustrated in Use Case I, II and III, many devices (e.g. devices for health or security monitoring) needing continuous communication require seamless handover (i.e. seamless handover) at a train station.
(96) We propose aggregated seamless handover schemes using the architecture shown in
(97) We use Use Case I and/or Use Case II as an example to explain the aggregated seamless handover schemes.
(98) Aggregated Seamless Handover Initiated by UE from WLAN 103 to (H)eNB 202
(99) As illustrated in Use Case I and Use Case II, there are many UEs requesting a seamless HO while they move from the source WLAN 103 at a train station to the target (H)eNB 202 on a train (i.e. Use Case I in
(100) The UE initiated seamless HO procedure may include the following steps, as shown by the call flow in
(101) In Step 0 of
(102) In Step 1 of
(103) In Step 2 of
(104) In Step 3 of
(105) In Step 4 of
(106) In Step 5 of
(107) In Step 6 of
(108) In Step 7 of
(109) In Step 8 of
(110) In Step 9 of
(111) In Step 10 of
(112) In Step 11 of
(113) In Step 12 of
(114) In Step 13 of
(115) In Step 14 of
(116) In Step 15 of
(117) In Step 16 of
(118) In Step 17 of
(119) In Step 18 of
(120) In Step 19 of
(121) In Step 20 of
(122) In Step 21 of
(123) In Step 22 of
(124) In Step 23 of
(125) For connectivity to multiple PDNs, UE3 802 or UE4 804 may establish connectivity to each PDN that is being transferred from source TWAN 102, besides the PDN connection established in above steps, by executing the UE requested PDN connectivity procedure herein.
(126) In Step 24 of
(127) In Step 25 of
(128) In Step 26 of
(129) In Step 27 of
(130) Another approach, using Attach with “handover” indication at step 10a and 10b, is illustrated in
(131) It is understood that the entities performing the steps illustrated in
(132) Aggregated Seamless Handover Initiated by (H)eNB 202 from (H)eNB 202 to WLAN 103
(133) For Use Case II shown in
(134) The source (H)eNB 202 initiated seamless HO procedure may include the following steps, which are also shown in the call flow in
(135) In Step 0 of
(136) In Step 1 of
(137) In Step 2 of
(138) In Step 3 of
(139) In Step 4 of
(140) In Step 5 of
(141) In Step 6 of
(142) In Step 7 of
(143) In Step 8 of
(144) In Step 9 of
(145) Steps 10-20 of
(146) It is understood that the entities performing the steps illustrated in
(147) Aggregated Handover Indication
(148) In the call flows above, it is described how a UE can include an “Aggregated Handover” indication in a message to the TWAN 102, MME 108, or AAA server 118. This indication can include multiple fields, such as those listed in Table 2-1.
(149) TABLE-US-00001 TABLE 2-1 Aggregated Handover Information from the UE Field Name Description Aggregated An indication that the UE supports and is willing to Handover take part in aggregated handover. Indication Aggregated This field gives the recipient (i.e. TWAN 102, MME 108, Handover or AAA server 118) guidance as to how much extra delay Delay Timer can be tolerated by the UE while it waits for the recipient to receive requests from other UE's to aggregate. External The UE may provide its external group ID to the recipient Group ID (i.e. TWAN 102, MME 108, or AAA server 118) in order to indicate to the recipient that the UE's requests can be aggregated with other group members External The UE may provide the size of its group (in terms of Group Size number of UE's) to the recipient (i.e. TWAN 102, MME 108, or AAA server 118) in order to give the recipient some guidance to know how many requests should be aggregated before the procedure (i.e. attach or handover) should proceed.
(150) Interfaces, such as Graphical User Interfaces (GUIs), can be used to assist user to control and/or configure functionalities related to the aggregated handover.
(151) Example M2M/IoT/WoT Communication System
(152) The various techniques described herein may be implemented in connection with hardware, firmware, software or, where appropriate, combinations thereof. Such hardware, firmware, and software may reside in apparatuses located at various nodes of a communication network. The apparatuses may operate singly or in combination with each other to effect the methods described herein. As used herein, the terms “apparatus,” “network apparatus,” “node,” “device,” and “network node” may be used interchangeably.
(153) The service layer may be a functional layer within a network service architecture. Service layers are typically situated above the application protocol layer such as HTTP, CoAP or MQTT and provide value added services to client applications. The service layer also provides an interface to core networks at a lower resource layer, such as for example, a control layer and transport/access layer. The service layer supports multiple categories of (service) capabilities or functionalities including a service definition, service runtime enablement, policy management, access control, and service clustering. Recently, several industry standards bodies, e.g., oneM2M, have been developing M2M service layers to address the challenges associated with the integration of M2M types of devices and applications into deployments such as the Internet/Web, cellular, enterprise, and home networks. A M2M service layer can provide applications and/or various devices with access to a collection of or a set of the above mentioned capabilities or functionalities, supported by the service layer, which can be referred to as a CSE or SCL. A few examples include but are not limited to security, charging, data management, device management, discovery, provisioning, and connectivity management which can be commonly used by various applications. These capabilities or functionalities are made available to such various applications via APIs which make use of message formats, resource structures and resource representations defined by the M2M service layer. The CSE or SCL is a functional entity that may be implemented by hardware and/or software and that provides (service) capabilities or functionalities exposed to various applications and/or devices (i.e., functional interfaces between such functional entities) in order for them to use such capabilities or functionalities.
(154)
(155) As shown in
(156) As shown in
(157) Exemplary M2M terminal devices 18 include, but are not limited to, tablets, smart phones, medical devices, temperature and weather monitors, connected cars, smart meters, game consoles, personal digital assistants, health and fitness monitors, lights, thermostats, appliances, garage doors and other actuator-based devices, security devices, and smart outlets.
(158) Referring to
(159) Similar to the illustrated M2M service layer 22, there is the M2M service layer 22′ in the Infrastructure Domain. M2M service layer 22′ provides services for the M2M application 20′ and the underlying communication network 12 in the infrastructure domain. M2M service layer 22′ also provides services for the M2M gateways 14 and M2M terminal devices 18 in the field domain. It will be understood that the M2M service layer 22′ may communicate with any number of M2M applications, M2M gateways and M2M devices. The M2M service layer 22′ may interact with a service layer by a different service provider. The M2M service layer 22′ by one or more nodes of the network, which may comprises servers, computers, devices, virtual machines (e.g., cloud computing/storage farms, etc.) or the like.
(160) Referring also to
(161) The methods of the present application may be implemented as part of a service layer 22 and 22′. The service layer 22 and 22′ is a software middleware layer that supports value-added service capabilities through a set of Application Programming Interfaces (APIs) and underlying networking interfaces. Both ETSI M2M and oneM2M use a service layer that may contain the connection methods of the present application. ETSI M2M's service layer is referred to as the Service Capability Layer (SCL). The SCL may be implemented within an M2M device (where it is referred to as a device SCL (DSCL)), a gateway (where it is referred to as a gateway SCL (GSCL)) and/or a network node (where it is referred to as a network SCL (NSCL)). The oneM2M service layer supports a set of Common Service Functions (CSFs) (i.e. service capabilities). An instantiation of a set of one or more particular types of CSFs is referred to as a Common Services Entity (CSE) which can be hosted on different types of network nodes (e.g. infrastructure node, middle node, application-specific node). Further, connection methods of the present application can implemented as part of an M2M network that uses a Service Oriented Architecture (SOA) and/or a resource-oriented architecture (ROA) to access services such as the connection methods of the present application.
(162) In some embodiments, M2M applications 20 and 20′ may be used in conjunction with the disclosed systems and methods. The M2M applications 20 and 20′ may include the applications that interact with the UE or gateway and may also be used in conjunction with other disclosed systems and methods.
(163) In one embodiment, the logical entities such as TWAN 102, TWAP 126, TWAG 124, WLAN 103, EPC 106, HSS 116 PGW 112 SGW 110, PCRF 114, 3GPP AAA Server 118, 3GGP LTE Access network 104, SeGW 122, (H)eNB 202, ISW GW 302, HeNB/WLAN 502, WLAN\HeNB 504, logical entities at UE 105, 107, 802, and 804 and logical entities to produce GUI 1302 may be hosted within a M2M service layer instance hosted by an M2M node, such as an M2M server, M2M gateway, or M2M device, as shown in
(164) The M2M applications 20 and 20′ may include applications in various industries such as, without limitation, transportation, health and wellness, connected home, energy management, asset tracking, and security and surveillance. As mentioned above, the M2M service layer, running across the devices, gateways, servers and other nodes of the system, supports functions such as, for example, data collection, device management, security, billing, location tracking/geofencing, device/service discovery, and legacy systems integration, and provides these functions as services to the M2M applications 20 and 20′.
(165) Generally, the service layers 22 and 22′ define a software middleware layer that supports value-added service capabilities through a set of Application Programming Interfaces (APIs) and underlying networking interfaces. Both the ETSI M2M and oneM2M architectures define a service layer. ETSI M2M's service layer is referred to as the Service Capability Layer (SCL). The SCL may be implemented in a variety of different nodes of the ETSI M2M architecture. For example, an instance of the service layer may be implemented within an M2M device (where it is referred to as a device SCL (DSCL)), a gateway (where it is referred to as a gateway SCL (GSCL)) and/or a network node (where it is referred to as a network SCL (NSCL)). The oneM2M service layer supports a set of Common Service Functions (CSFs) (i.e., service capabilities). An instantiation of a set of one or more particular types of CSFs is referred to as a Common Services Entity (CSE) which can be hosted on different types of network nodes (e.g. infrastructure node, middle node, application-specific node). The Third Generation Partnership Project (3GPP) has also defined an architecture for machine-type communications (MTC). In that architecture, the service layer, and the service capabilities it provides, are implemented as part of a Service Capability Server (SCS). Whether embodied in a DSCL, GSCL, or NSCL of the ETSI M2M architecture, in a Service Capability Server (SCS) of the 3GPP MTC architecture, in a CSF or CSE of the oneM2M architecture, or in some other node of a network, an instance of the service layer may be implemented as a logical entity (e.g., software, computer-executable instructions, and the like) executing either on one or more standalone nodes in the network, including servers, computers, and other computing devices or nodes, or as part of one or more existing nodes. As an example, an instance of a service layer or component thereof may be implemented in the form of software running on a network node (e.g., server, computer, gateway, device or the like) having the general architecture illustrated in
(166) Further, logical entities such as TWAN 102, TWAP 126, TWAG 124, WLAN 103, EPC 106, HSS 116 PGW 112 SGW 110, PCRF 114, 3GPP AAA Server 118, 3GGP LTE Access network 104, SeGW 122, (H)eNB 202, ISW GW 302, HeNB/WLAN 502, WLAN\HeNB 504, logical entities at UE 105, 107, 802, and 804 and logical entities to produce GUI 1302 can implemented as part of an M2M network that uses a Service Oriented Architecture (SOA) and/or a Resource-Oriented Architecture (ROA) to access services of the present application.
(167)
(168) The processor 32 may be a general purpose processor, a special purpose processor, a conventional processor, a digital signal processor (DSP), a plurality of microprocessors, one or more microprocessors in association with a DSP core, a controller, a microcontroller, Application Specific Integrated Circuits (ASICs), Field Programmable Gate Array (FPGAs) circuits, any other type of integrated circuit (IC), a state machine, and the like. In general, the processor 32 may execute computer-executable instructions stored in the memory (e.g., memory 44 and/or memory 46) of the node in order to perform the various required functions of the node. For example, the processor 32 may perform signal coding, data processing, power control, input/output processing, and/or any other functionality that enables the M2M node 30 to operate in a wireless or wired environment. The processor 32 may run application-layer programs (e.g., browsers) and/or radio access-layer (RAN) programs and/or other communications programs. The processor 32 may also perform security operations such as authentication, security key agreement, and/or cryptographic operations, such as at the access-layer and/or application layer for example.
(169) As shown in
(170) The transmit/receive element 36 may be configured to transmit signals to, or receive signals from, other M2M nodes, including M2M servers, gateways, device, and the like. For example, in an embodiment, the transmit/receive element 36 may be an antenna configured to transmit and/or receive RF signals. The transmit/receive element 36 may support various networks and air interfaces, such as WLAN, WPAN, cellular, and the like. In an embodiment, the transmit/receive element 36 may be an emitter/detector configured to transmit and/or receive IR, UV, or visible light signals, for example. In yet another embodiment, the transmit/receive element 36 may be configured to transmit and receive both RF and light signals. It will be appreciated that the transmit/receive element 36 may be configured to transmit and/or receive any combination of wireless or wired signals.
(171) In addition, although the transmit/receive element 36 is depicted in
(172) The transceiver 34 may be configured to modulate the signals that are to be transmitted by the transmit/receive element 36 and to demodulate the signals that are received by the transmit/receive element 36. As noted above, the M2M node 30 may have multi-mode capabilities. Thus, the transceiver 34 may include multiple transceivers for enabling the M2M node 30 to communicate via multiple RATs, such as UTRA and IEEE 802.11, for example.
(173) The processor 32 may access information from, and store data in, any type of suitable memory, such as the non-removable memory 44 and/or the removable memory 46. For example, the processor 32 may store session context in its memory, as described above. The non-removable memory 44 may include random-access memory (RAM), read-only memory (ROM), a hard disk, or any other type of memory storage device. The removable memory 46 may include a subscriber identity module (SIM) card, a memory stick, a secure digital (SD) memory card, and the like. In other embodiments, the processor 32 may access information from, and store data in, memory that is not physically located on the M2M node 30, such as on a server or a home computer. The processor 32 may be configured to control lighting patterns, images, or colors on the display or indicators 42 to reflect the status of an M2M service layer session migration or sharing or to obtain input from a user or display information to a user about the node's session migration or sharing capabilities or settings. In another example, the display may show information with regard to a session state. The current disclosure defines a RESTful user/application API in the oneM2M embodiment. A graphical user interface, which may be shown on the display, may be layered on top of the API to allow a user to interactively establish and manage an E2E session, or the migration or sharing thereof, via the underlying service layer session functionality described herein.
(174) The processor 32 may receive power from the power source 48, and may be configured to distribute and/or control the power to the other components in the M2M node 30. The power source 48 may be any suitable device for powering the M2M node 30. For example, the power source 48 may include one or more dry cell batteries (e.g., nickel-cadmium (NiCd), nickel-zinc (NiZn), nickel metal hydride (NiMH), lithium-ion (Li-ion), etc.), solar cells, fuel cells, and the like.
(175) The processor 32 may also be coupled to the GPS chipset 50, which is configured to provide location information (e.g., longitude and latitude) regarding the current location of the M2M node 30. It will be appreciated that the M2M node 30 may acquire location information by way of any suitable location-determination method while remaining consistent with an embodiment.
(176) The processor 32 may further be coupled to other peripherals 52, which may include one or more software and/or hardware modules that provide additional features, functionality and/or wired or wireless connectivity. For example, the peripherals 52 may include various sensors such as an accelerometer, biometrics (e.g., fingerprint) sensors, an e-compass, a satellite transceiver, a digital camera (for photographs or video), a universal serial bus (USB) port or other interconnect interfaces, a vibration device, a television transceiver, a hands free headset, a Bluetooth® module, a frequency modulated (FM) radio unit, a digital music player, a media player, a video game player module, an Internet browser, and the like.
(177) The node 30 may be embodied in other apparatuses or devices, such as a sensor, consumer electronics, a wearable device such as a smart watch or smart clothing, a medical or eHealth device, a robot, industrial equipment, a drone, a vehicle such as a car, truck, train, or airplane. The node 30 may connect to other components, modules, or systems of such apparatuses or devices via one or more interconnect interfaces, such as an interconnect interface that may comprise one of the peripherals 52. Alternately, the node 30 may comprise apparatuses or devices, such as a sensor, consumer electronics, a wearable device such as a smart watch or smart clothing, a medical or eHealth device, a robot, industrial equipment, a drone, a vehicle such as a car, truck, train, or airplane.
(178)
(179) In operation, CPU 91 fetches, decodes, and executes instructions, and transfers information to and from other resources via the computer's main data-transfer path, system bus 80. Such a system bus connects the components in computing system 90 and defines the medium for data exchange. System bus 80 typically includes data lines for sending data, address lines for sending addresses, and control lines for sending interrupts and for operating the system bus. An example of such a system bus 80 is the PCI (Peripheral Component Interconnect) bus.
(180) Memories coupled to system bus 80 include random access memory (RAM) 82 and read only memory (ROM) 93. Such memories include circuitry that allows information to be stored and retrieved. ROMs 93 generally contain stored data that cannot easily be modified. Data stored in RAM 82 can be read or changed by CPU 91 or other hardware devices. Access to RAM 82 and/or ROM 93 may be controlled by memory controller 92. Memory controller 92 may provide an address translation function that translates virtual addresses into physical addresses as instructions are executed. Memory controller 92 may also provide a memory protection function that isolates processes within the system and isolates system processes from user processes. Thus, a program running in a first mode can access only memory mapped by its own process virtual address space; it cannot access memory within another process's virtual address space unless memory sharing between the processes has been set up.
(181) In addition, computing system 90 may contain peripherals controller 83 responsible for communicating instructions from CPU 91 to peripherals, such as printer 94, keyboard 84, mouse 95, and disk drive 85.
(182) Display 86, which is controlled by display controller 96, is used to display visual output generated by computing system 90. Such visual output may include text, graphics, animated graphics, and video. Display 86 may be implemented with a CRT-based video display, an LCD-based flat-panel display, gas plasma-based flat-panel display, or a touch-panel. Display controller 96 includes electronic components required to generate a video signal that is sent to display 86.
(183) Further, computing system 90 may contain communication circuitry, such as for example a network adaptor 97, that may be used to connect computing system 90 to an external communications network, such as network 12 of
(184) User equipment (UE) can be any device used by an end-user to communicate. It can be a hand-held telephone, a laptop computer equipped with a mobile broadband adapter, or any other device. For example, the UE can be implemented as the M2M terminal device 18 of
(185) It is understood that any or all of the systems, methods, and processes described herein may be embodied in the form of computer executable instructions (i.e., program code) stored on a computer-readable storage medium which instructions, when executed by a machine, such as a node of an M2M network, including for example an M2M server, gateway, device or the like, perform and/or implement the systems, methods and processes described herein. Specifically, any of the steps, operations or functions described above, including the operations of the gateway, UE, UE/GW, or any of the nodes of the mobile core network, service layer or network application provider, may be implemented in the form of such computer executable instructions. Logical entities such as TWAN 102, TWAP 126, TWAG 124, WLAN 103, EPC 106, HSS 116 PGW 112 SGW 110, PCRF 114, 3GPP AAA Server 118, 3GGP LTE Access network 104, SeGW 122, (H)eNB 202, ISW GW 302, HeNB/WLAN 502, WLAN\HeNB 504, logical entities at UE 105, 107, 802, and 804 and logical entities to produce GUI 1302 may be embodied in the form of the computer executable instructions stored on a computer-readable storage medium. Computer readable storage media include both volatile and nonvolatile, removable and non-removable media implemented in any non-transitory (i.e., tangible or physical) method or technology for storage of information, but such computer readable storage media do not includes signals. Computer readable storage media include, but are not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other tangible or physical medium which can be used to store the desired information and which can be accessed by a computer.
(186) In describing preferred embodiments of the subject matter of the present disclosure, as illustrated in the Figures, specific terminology is employed for the sake of clarity. The claimed subject matter, however, is not intended to be limited to the specific terminology so selected, and it is to be understood that each specific element includes all technical equivalents that operate in a similar manner to accomplish a similar purpose.
(187) This written description uses examples to disclose the invention, including the best mode, and also to enable any person skilled in the art to practice the invention, including making and using any devices or systems and performing any incorporated methods. The patentable scope of the invention is defined by the claims, and may include other examples that occur to those skilled in the art. Such other examples are intended to be within the scope of the claims if they have elements that do not differ from the literal language of the claims, or if they include equivalent elements with insubstantial differences from the literal language of the claims.