METHODS AND APPARATUSES FOR EVENT MONITORING
20210352464 · 2021-11-11
Assignee
Inventors
Cpc classification
International classification
Abstract
Method and apparatus in which a network exposure node receives, from a server, a first request for monitoring communication failure for at least one terminal device. The network exposure node obtains a connection identity (ID) for identifying a connection between the at least one terminal device and the server, based on the received first request. The network exposure node sends, to a subscriber management node or a policy decision node, a second request for monitoring communication failure for the at least one terminal device. The second request includes the obtained connection ID.
Claims
1. A method implemented at a network exposure node, the method comprising: receiving, from a server, a first request for monitoring communication failure for at least one terminal device; obtaining a connection identity (ID) for identifying a connection between the at least one terminal device and the server, based on the received first request; and sending, to a subscriber management node or a policy decision node, a second request for monitoring communication failure for the at least one terminal device, wherein the second request includes the obtained connection ID.
2. The method according to claim 1, wherein the first request includes an ID of the server and an ID of the at least one terminal device; and wherein obtaining the connection ID comprises determining the connection ID based on the ID of the server and the ID of the at least one terminal device.
3. The method according to claim 2, wherein the server is a service capability server (SCS) or an application server (AS); wherein the ID of the server is an SCS/AS ID, the ID of the at least one terminal device is an external ID or an external group ID, and the connection ID is an access point name (APN); and wherein each of the first and second requests is a Monitoring Request message.
4. The method according to claim 2, wherein the server is an application function AF; and wherein the ID of the server is an AF ID, the ID of the at least one terminal device is an external ID or an external group ID, and the connection ID is a combination of a data network name, (DNN) and single network slice selection assistance information (S-NSSAI).
5. The method according to claim 1, wherein the connection ID is an internet protocol (IP) domain of a terminal device that is included in the first request; wherein obtaining the connection ID comprises extracting the IP domain of the terminal device from the first request; and wherein each of the first and second requests is a Monitoring Request message.
6. A method implemented at a subscriber management node, the method comprising: receiving, from a network exposure node, a request for monitoring communication failure for at least one terminal device, wherein the request includes a connection identity (ID) for identifying a connection between the at least one terminal device and a server subscribing to the monitoring; and sending, to a mobility management node or a session management node, an instruction for monitoring communication failure for the at least one terminal device, wherein the instruction includes the connection ID or a second ID, wherein the second ID is associated with the connection ID and identifies the connection between the at least one terminal device and the server.
7. The method according to claim 6, wherein the connection ID is an access point name (APN); and wherein the request is a Monitoring Request message, and the instruction is an Insert Subscriber Data Request message or an Update Location Answer message.
8. The method according to claim 6, wherein the request includes an ID of the at least one terminal device; and wherein the second ID and the session management node are determined by the subscriber management node based on the connection ID and the ID of the at least one terminal device.
9. The method according to claim 6, wherein the connection ID is a combination of a data network name (DNN) and single network slice selection assistance information (S-NSSAI); and wherein the connection is a protocol data unit (PDU) session and the second ID is a PDU session ID.
10. A method implemented at a mobility management node, the method comprising: receiving, from a subscriber management node, an instruction for monitoring communication failure for a terminal device, wherein the instruction includes a connection identity (ID) for identifying a connection between the terminal device and a server subscribing to the monitoring; and performing a monitoring procedure for the connection identified by the connection ID such that a monitoring report associated with the connection ID is provided to a network exposure node.
11. The method according to claim 10, wherein performing the monitoring procedure comprises: monitoring communication failure for the terminal device based on the connection ID; and sending, to the network exposure node, the monitoring report indicating a result of the monitoring.
12. The method according to claim 10, wherein the connection ID is an access point name APN; and wherein the instruction is an Insert Subscriber Data Request message or an Update Location Answer message.
13. The method according to claim 10, wherein the instruction includes an ID of the terminal device; and wherein performing the monitoring procedure comprises: determining a second ID and a session management node based on the connection ID and the ID of the terminal device; and sending, to the session management node, a request for monitoring communication failure for the terminal device, wherein the request includes the second ID.
14. The method according to claim 10, wherein the connection ID is a combination of a data network name (DNN) and single network slice selection assistance information (S-NSSAI).
15. The method according to claim 13, wherein the connection is a protocol data unit (PDU) session and the second ID is a PDU session ID.
16. A method implemented at a session management node, the method comprising: receiving, from a mobility management node or a subscriber management node, a request for monitoring communication failure for a terminal device, wherein the request includes a second identity (ID) for identifying a connection between the terminal device and a server subscribing to the monitoring; and performing a monitoring procedure for the connection identified by the second ID such that a monitoring report associated with the second ID is provided to a network exposure node.
17. The method according to claim 16, wherein performing the monitoring procedure comprises: monitoring communication failure for the terminal device based on the second ID; and sending, to the network exposure node, the monitoring report indicating a result of the monitoring.
18. The method according to claim 16, wherein the monitoring report is sent to the network exposure node directly or via the mobility management node.
19. The method according to claim 16, wherein the monitoring report includes failure cause of the communication failure.
20. The method according to claim 16, wherein the connection is a protocol data unit (PDU) session and the second ID is a PDU session ID.
21. A method implemented at a policy decision node, the method comprising: receiving, from a network exposure node, a request for monitoring communication failure for multiple terminal devices, wherein the request includes a connection identity (ID) for identifying connections between the multiple terminal devices and a server subscribing to the monitoring; identifying, for a terminal device from the multiple terminal devices, a corresponding policy enforcement node and the connection between the terminal device and the server, based on the connection ID; and performing a monitoring procedure for the identified connection via the corresponding policy enforcement node such that a monitoring report associated with the connection ID is provided to the network exposure node.
22. The method according to claim 21, wherein performing the monitoring procedure comprises: initiating an internet protocol (IP)-connectivity access network (CAN) session modification for the identified connection via the corresponding policy enforcement node; and sending, to the network exposure node, the monitoring report indicating a result of the IP-CAN session modification.
23. The method according to claim 21, wherein the connection ID is an access point name, (APN); and wherein the request is a Monitoring Request message.
24. A network exposure node, comprising: at least one processor; and at least one memory, the at least one memory containing instructions which, when executed by the at least one processor, cause the network exposure node to: receive, from a server, a first request for monitoring communication failure for at least one terminal device; obtain a connection identity (ID) for identifying a connection between the at least one terminal device and the server, based on the received first request; and send, to a subscriber management node or a policy decision node, a second request for monitoring communication failure for the at least one terminal device, wherein the second request includes the obtained connection ID.
25. The network exposure node according to claim 24, wherein the first request includes an ID of the server and an ID of the at least one terminal device; and wherein to obtain the connection ID comprises to determine the connection ID based on the ID of the server and the ID of the at least one terminal device.
26-34. (canceled)
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0050] These and other objects, features and advantages of the disclosure will become apparent from the following detailed description of illustrative embodiments thereof, which are to be read in connection with the accompanying drawings.
[0051]
[0052]
[0053]
[0054]
[0055]
[0056]
[0057]
[0058]
[0059]
[0060]
[0061]
[0062]
[0063]
[0064]
[0065]
[0066]
[0067]
[0068]
[0069]
[0070]
[0071]
[0072]
[0073]
[0074]
DETAILED DESCRIPTION
[0075] For the purpose of explanation, details are set forth in the following description in order to provide a thorough understanding of the embodiments disclosed. It is apparent, however, to those skilled in the art that the embodiments may be implemented without these specific details or with an equivalent arrangement.
[0076] As mentioned above, the communication failure event will be reported by the 3GPP network when a bearer/session is terminated. However, such bearer/session termination may not be of interest at all to the third party SCS/AS. For example, a UE has two packet data network (PDN) connections, one to SCS/AS A and another to SCS/AS B. The SCS/AS A does not care the PDN connection (session/bearer) status for the SCS/AS B. However, currently, communication failure is reported for all UE PDN connections. The SCS/AS will take wrong decision upon receiving a failure notification of other non-related PDN connection(s). Besides, the monitoring via PCRF for a single UE only includes UE IP address. Such UE IP address may not be unique if IP version 4 (IPv4) address is widely deployed. Thus, there might be IP address overlapping among several PDN connections.
[0077] Currently, it is not specified how to accurately support the monitoring event of “communication failure” in the 3GPP network for the concerned IP-CAN session/bearer of the third party SCS/AS in the following cases: HSS event monitoring for an individual UE or a group of UEs, and PCRF event monitoring for an individual UE or a group of UEs.
[0078] The present disclosure proposes improved solutions for event monitoring. Hereinafter, the solutions will be described in detail with reference to
[0079]
[0080] The UE 102 can communicate through a radio access communication link with the RAN 104. The UE may also be referred to as, for example, terminal device, access terminal, mobile station, mobile unit, subscriber station, or the like. It may refer to any end device that can access a wireless communication network and receive services therefrom. By way of example and not limitation, the UE may include a portable computer, an image capture terminal device such as a digital camera, a gaming terminal device, a music storage and playback appliance, a mobile phone, a cellular phone, a smart phone, a tablet, a wearable device, a personal digital assistant (PDA), or the like.
[0081] In an Internet of things (IoT) scenario, a UE may represent a machine or other device that performs monitoring and/or measurements, and transmits the results of such monitoring and/or measurements to another UE and/or a network equipment. In this case, the UE may be a machine-to-machine (M2M) device, which may, in a 3GPP context, be referred to as a machine-type communication (MTC) device. Particular examples of such machines or devices may include sensors, metering devices such as power meters, industrial machineries, bikes, vehicles, or home or personal appliances, e.g. refrigerators, televisions, personal wearables such as watches, and so on.
[0082] The RAN 104 may include, for example, an universal mobile telecommunications system (UMTS) terrestrial RAN (UTRAN), a global system for mobile communication (GSM) enhanced data rate for GSM evolution (EDGE) RAN (GERAN), and/or an evolved universal terrestrial RAN (E-UTRAN). The UTRAN and the GERAN can each include radio network controller (RNC) nodes to control communications through radio base stations providing radio access communication links to UEs that are within their respective communication service cells. The E-UTRAN can include radio base station nodes (eNodeBs) that can provide the combined functionality of the RNC nodes and base stations of the UTRAN and the GERAN. The UE 102 may communicate with the GERAN via Um interface and communicate with the UTRAN and the E-UTRAN via Uu interface.
[0083] The SGSN 106 is a core network node in the UMTS and has a user-plane function and a control-plane function. The user-plane function of the SGSN 106 can transfer user data packets of the UE 102 between the RAN 104 and the GGSN/PGW 112. The control-plane function of the SGSN 106 can carry out mobility management of the UE 102, bearer management and the like. The MME 108 is a core network node in evolved packet system (EPS) and can carry out the mobility management of the UE 102, the bearer management, and the like. The SGW 110 is a packet transfer node in the core network of the EPS. The SGW 110 can transfers user data packets of the UE 102 between the RAN 104 and the GGSN/PGW 112.
[0084] The GGSN is a core network node in the UMTS. The PGW is a core network node in the EPS. The GGSN/PGW 112 means either the GGSN or the PGW or both. The GGSN/PGW 112 is a user-plane packet transfer node in the core network and can transfer user data packets of the UE 102. The GGSN/PGW 112 can serve as a gateway to an external PDN and provide the UE 102 with the connectivity to the external PDN.
[0085] The PCEF 114 included in the GGSN/PGW 112 can carry out quality of service (QoS) control and flow based bearer charging (FBC) per service data flow of the UE 102 in accordance with a policy and charging control (PCC) rule supplied from the PCRF 116. Correspondingly, the PCRF 116 is a control-plane entity in the core network of the EPS. The PCRF 116 can determine a PCC rule to be applied to a service data flow of the UE 102 and send the determined PCC rule to the GGSN/PGW 112 having the PCEF 114. The PCRF 116 may communicate with the PCEF 114 via Gx interface.
[0086] The SCEF 118 can securely expose the services and capabilities provided by 3GPP networks by providing access to the services and capabilities through homogenous network application programming interfaces (APIs) defined by open mobile alliance (OMA), GSM alliance (GSMA) and possibly other standardization bodies. The SCEF 118 may communicate with the PCRF 116 via Rx interface, with the MME 108 via T6a interface, and with the SGSN 106 via T6b interface.
[0087] The SCS 120 can make open service access (OSA) standard interfaces accessible by application and provide an abstraction of network protocol for application developers. As a gateway between applications and the network, the SCS 120 can accomplish mapping of OSA interfaces onto network protocols and vice versa. The SCS 120 may communicate with the GGSN/PGW 112 via Gi/SGi interface and with the SCEF 118 via T8 interface. The AS 122 may be a type of server designed to install, operate and host applications and associated services for users. The AS 122 may communicate with the GGSN/PGW 112 via Gi/SGi interface. The HSS 124 is a control-plane node in the core network of 3GPP public land mobile network (PLMN) and can manage subscriber information of the UE 102. The HSS 124 may communicate with the SCEF 118 via S6t interface.
[0088] As shown in
[0089]
[0090] At block 206, the network exposure node sends, to a subscriber management node or a policy decision node, a second request for monitoring communication failure for the at least one terminal device. The second request includes the obtained connection ID. The subscriber management node may take the form of an HSS, a UDM, or any other entity having similar functionality. The policy decision node may take the form of a PCRF, or any other entity having similar functionality. Note that in case the monitoring for multiple terminal devices is requested, the second request is sent to multiple policy decision nodes. Since the connection ID is sent to the subscriber management node or the policy decision node, the monitoring via such node can be performed based on the connection ID so that accurate event monitoring of communication failure can be achieved for the server. Block 206 may be implemented as block 306 of
[0091]
[0092] At block 304, the network exposure node determines the connection ID based on the ID of the server and the ID of the at least one terminal device which are contained in the received first request. The connection ID may be an access point name (APN) in LTE or a combination of a data network name (DNN) and single network slice selection assistance information (S-NSSAI) in 5G. As an exemplary example, there may be a predetermined correspondence between the connection ID and a combination of the IDs of the server and the at least one terminal device. The connection ID may be derived by a lookup operation on a table reflecting the correspondence. Note that depending on the actual application scenario, various other ways may be used instead to derive the connection ID. At block 306, the network exposure node sends, to a subscriber management node or a policy decision node, a second request for monitoring communication failure for the at least one terminal device. The second request includes the determined connection ID. The second request also indicates “communication failure” as monitoring type and contains the ID of the at least one terminal device from the first request. As an exemplary example, the second request may be a Monitoring Request message, and the ID of the at least one terminal device may be an external ID or an external group ID. Thus, current Monitoring Request message is enhanced by adding the connection ID. It is also possible that the network exposure node sends the ID of the server and the ID of the at least one terminal device to the subscriber management node or the policy decision node which then derives the connection ID based on the received IDs.
[0093]
[0094] At block 404, the network exposure node extracts the IP domain of the terminal device from the received first request. That is, the connection ID in this embodiment is the IP domain of the terminal device. At block 406, the network exposure node sends, to a policy decision node, a second request for monitoring communication failure for the terminal device. The second request includes the extracted IP domain of the terminal device. Since the IP domain of the terminal device is sent to the policy decision node, the monitoring via such node can be performed based on the combination of the IP address and the IP domain of the terminal device so that IP address overlapping issue can be avoided.
[0095]
[0096] At block 504, the subscriber management node sends, to a mobility management node or a session management node, an instruction for monitoring communication failure for the at least one terminal device. The instruction includes the connection ID or a second ID. The second ID is associated with the connection ID and identifies the connection between the at least one terminal device and the server. The mobility management node may take the form of an MME, an AMF, or any other entity having similar functionality. The session management node may be a session management function (SMF) or any other entity having similar functionality. The second ID may be a PDU session ID. In 5G system, a PDU session has a unique PDU session ID for the terminal device. The instruction may indicate “communication failure” as monitoring type. As an exemplar example, in the case of LTE, the instruction may be an Insert Subscriber Data Request message or an Update Location Answer message. Thus, current Insert Subscriber Data Request message or Update Location Answer message is enhanced by adding the connection ID. In the case of Update Location Answer message, this message is sent in response to an Update Location Request message indicating that the terminal device has moved to the serving area of another mobility management node.
[0097] In the case of 5G, as an option, the instruction including the connection ID (a combination of a DNN and S-NSSAI) may be sent to the mobility management node (an AMF). As another option, the subscriber management node (a UDM) may determine the second ID (a PDU session ID) and the session management node (an SMF) based on the connection ID and the ID of the at least one terminal device. For example, when the PDU session has been established for the at least one terminal device, the related information of the PDU session may be registered by the SMF to the UDM and maintained by the UDM. In this way, the PDU session ID and the SMF may be determined from the maintained information. Then, the instruction including the second ID (the PDU session ID) may be sent to the session management node (the SMF). Note that in case the monitoring for multiple terminal devices is requested, the instruction may be sent to multiple mobility management nodes or multiple session management nodes.
[0098]
[0099] For example, block 604 may be implemented as blocks 706-708 of
[0100] As another example, block 604 may be implemented as blocks 810-812 of
[0101]
[0102] At block 904, the session management node performs a monitoring procedure for the connection identified by the second ID such that a monitoring report associated with the second ID is provided to a network exposure node. The monitoring report may include failure cause of the communication failure. For example, block 904 may be implemented as blocks 1006-1008 of
[0103]
[0104] At block 1106, the policy decision node performs a monitoring procedure for the identified connection via the corresponding policy enforcement node such that a monitoring report associated with the connection ID is provided to the network exposure node. Since the monitoring is performed based on the connection ID, accurate event monitoring of communication failure can be achieved for the server. For example, block 1106 may be implemented as blocks 1208-1210 of
[0105]
[0106] At block 1304, the HSS either uses the received APN or derives the APN according to the SCS/AS ID and external UE ID or UE group ID. The HSS may store the received information, thereby setting the event associated with the APN. At block 1305, the HSS sends the APN together with the event in an Insert Subscriber Data Request to the MME/SGSN 1. Thus, the Insert Subscriber Data Request message is enhanced by adding the APN. At block 1306, the MME/SGSN 1 marks (or associates) the PDN connection that will report the corresponding event later, as indicated by the received APN. At block 1307, the event monitoring procedure via HSS as described in steps 6-9 of
[0107]
[0108] At block 1404, the UDM either uses the received (DNN and S-NSSAI) or derives the (DNN and S-NSSAI) according to the AF ID and external UE ID or UE group ID. The UDM stores the (DNN and S-NSSAI) as part of the event exposure data in a UDR by Nudr_DM service. At block 1405, the UDM sends the (DNN and S-NSSAI) to the AMF 1 in Namf_EventExposure service. At block 1406a, the AMF 1 determines the SMF and the PDU session ID, based on the (DNN and S-NSSAI). At block 1406b, the AMF 1 sends to the SMF a service subscription, Nsmf_EventExposure_Subscribe, including PDU session ID, with event type set to “Communication Failure”. At block 1406c, the SMF configures the event for the corresponding PDU session. At block 1407, the event monitoring procedure via UDM as described in steps 3b, 4 and 5 of
[0109]
[0110] Blocks 1501-1504 are the same as blocks 1401-1404 of
[0111]
[0112] Note that in block 106 lcalthough the AMF is the receiver for the Nsmf_EventExposure_Notify, it is also possible that the AMF, at Nsmf_EventExposure_Subscribe, sets the NEF as the receiver for the Nsmf_EventExposure_Notify. That is, block 1601c may be sent to the NEF directly so as to skip block 1602.
[0113]
[0114]
[0115] At block 1804, for each PCRF, it either uses the received APN or derives the APN according to the SCS/AS ID and external UE group ID. Based on the APN, the PCRF finds the Gx session associated with the UE. Note that if there is no such Gx session, the PCRF does not need to trigger any IP-CAN session modification procedure. At block 1805, the event monitoring procedure via PCRF as described in steps 4-8 of
[0116] Based on the above processes shown in
[0117]
[0118] The program includes program instructions that, when executed by the processor 1910, enable the apparatus 1900 to operate in accordance with the embodiments of the present disclosure, as discussed above. That is, the embodiments of the present disclosure may be implemented at least in part by computer software executable by the processor 1910, or by hardware, or by a combination of software and hardware.
[0119] The memory 1920 may be of any type suitable to the local technical environment and may be implemented using any suitable data storage technology, such as semiconductor based memory devices, flash memories, magnetic memory devices and systems, optical memory devices and systems, fixed memories and removable memories. The processor 1910 may be of any type suitable to the local technical environment, and may include one or more of general purpose computers, special purpose computers, microprocessors, digital signal processors (DSPs) and processors based on multi-core processor architectures, as non-limiting examples.
[0120]
[0121]
[0122]
[0123]
[0124]
[0125] In general, the various exemplary embodiments may be implemented in hardware or special purpose circuits, software, logic or any combination thereof. For example, some aspects may be implemented in hardware, while other aspects may be implemented in firmware or software which may be executed by a controller, microprocessor or other computing device, although the disclosure is not limited thereto. While various aspects of the exemplary embodiments of this disclosure may be illustrated and described as block diagrams, flow charts, or using some other pictorial representation, it is well understood that these blocks, apparatus, systems, techniques or methods described herein may be implemented in, as non-limiting examples, hardware, software, firmware, special purpose circuits or logic, general purpose hardware or controller or other computing devices, or some combination thereof.
[0126] As such, it should be appreciated that at least some aspects of the exemplary embodiments of the disclosure may be practiced in various components such as integrated circuit chips and modules. It should thus be appreciated that the exemplary embodiments of this disclosure may be realized in an apparatus that is embodied as an integrated circuit, where the integrated circuit may comprise circuitry (as well as possibly firmware) for embodying at least one or more of a data processor, a digital signal processor, baseband circuitry and radio frequency circuitry that are configurable so as to operate in accordance with the exemplary embodiments of this disclosure.
[0127] It should be appreciated that at least some aspects of the exemplary embodiments of the disclosure may be embodied in computer-executable instructions, such as in one or more program modules, executed by one or more computers or other devices. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types when executed by a processor in a computer or other device. The computer executable instructions may be stored on a computer readable medium such as a hard disk, optical disk, removable storage media, solid state memory, RAM, etc. As will be appreciated by one of skill in the art, the function of the program modules may be combined or distributed as desired in various embodiments. In addition, the function may be embodied in whole or in part in firmware or hardware equivalents such as integrated circuits, field programmable gate arrays (FPGA), and the like.
[0128] References in the present disclosure to “one embodiment”, “an embodiment” and so on, indicate that the embodiment described may include a particular feature, structure, or characteristic, but it is not necessary that every embodiment includes the particular feature, structure, or characteristic. Moreover, such phrases are not necessarily referring to the same embodiment. Further, when a particular feature, structure, or characteristic is described in connection with an embodiment, it is submitted that it is within the knowledge of one skilled in the art to implement such feature, structure, or characteristic in connection with other embodiments whether or not explicitly described.
[0129] It should be understood that, although the terms “first”, “second” and so on may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, a first element could be termed a second element, and similarly, a second element could be termed a first element, without departing from the scope of the disclosure. As used herein, the term “and/or” includes any and all combinations of one or more of the associated listed terms.
[0130] The terminology used herein is for the purpose of describing particular embodiments only and is not intended to limit the present disclosure. As used herein, the singular forms “a”, “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises”, “comprising”, “has”, “having”, “includes” and/or “including”, when used herein, specify the presence of stated features, elements, and/or components, but do not preclude the presence or addition of one or more other features, elements, components and/ or combinations thereof. The terms “connect”, “connects”, “connecting” and/or “connected” used herein cover the direct and/or indirect connection between two elements.
[0131] The present disclosure includes any novel feature or combination of features disclosed herein either explicitly or any generalization thereof. Various modifications and adaptations to the foregoing exemplary embodiments of this disclosure may become apparent to those skilled in the relevant arts in view of the foregoing description, when read in conjunction with the accompanying drawings. However, any and all modifications will still fall within the scope of the non-Limiting and exemplary embodiments of this disclosure.