Signalling framework for jamming detection and mitigation
20220303041 · 2022-09-22
Inventors
Cpc classification
International classification
Abstract
Provided are a method and apparatus for at least detecting that a radio communication of a distributed unit might be jammed with at least a predefined first jamming probability threshold; and informing a higher layer function of the radio communication that the radio communication might be jammed with at least the predefined first jamming probability threshold, wherein the radio communication comprises a lower layer function and the higher layer function controlling at least partly the lower layer function, the distributed unit provides the lower layer function, and the distributed unit does not provide the higher layer function.
Claims
1. An apparatus comprising: one or more processors, and memory storing instructions that, when executed by the one or more processors, cause the apparatus to: detect that a radio communication of a distributed unit might be jammed with at least a predefined first jamming probability threshold; inform a higher layer function of the radio communication that the radio communication might be jammed with at least the predefined first jamming probability threshold, wherein the radio communication comprises a lower layer function and the higher layer function controlling at least partly the lower layer function, the distributed unit provides the lower layer function, and the distributed unit does not provide the higher layer function.
2. The apparatus according to claim 1, wherein the instructions, when executed by the one or more processors, further cause the apparatus to: inform the higher layer function on at least one of a time when the radio communication might be jammed with at least the predefined first jamming probability threshold; one or more frequencies on which the radio communication might be jammed with at least the predefined first jamming probability threshold; or one or more directions from where the radio communication might be jammed with at least the predefined first jamming probability threshold.
3. The apparatus according to claim 1, wherein the instructions, when executed by the one or more processors, further cause the apparatus to: monitor if the higher layer function indicates that it wants to be informed if the radio communication might be jammed with at least the predefined first jamming probability threshold; inhibit the informing that the radio communication might be jammed with at least the predefined first jamming probability threshold if the higher layer function does not indicate that it wants to be informed if the radio communication might be jammed with at least the predefined first jamming probability threshold.
4. The apparatus according to claim 3, wherein the instructions, when executed by the one or more processors, further cause the apparatus to: inform the higher layer function on one or more resources available at the distributed unit for detecting that the radio communication of the distributed unit might be jammed with at least the predefined first jamming probability threshold if the higher layer function indicates that it wants to be informed if the radio communication might be jammed with at least the predefined first jamming probability threshold.
5. The apparatus according to claim 1, wherein the instructions, when executed by the one or more processors, further cause the apparatus to: receive a jamming report on the jamming of the radio communication from the higher layer function; apply one or more jamming mitigation techniques of the lower layer function based on the received jamming report.
6. The apparatus according to claim 1, wherein the jamming probability comprises at least one of a probability value in the interval [0; 1]; a function of probabilities, and a function of a probability density function.
7. An apparatus comprising: one or more processors, and memory storing instructions that, when executed by the one or more processors, cause the apparatus to: receive a first information that a first radio communication of a first central unit is jammed with at least a first predefined jamming probability threshold, wherein the first radio communication comprises a first lower layer function and a higher layer function controlling at least partly the first lower layer function, the first central unit provides the higher layer function, and the first central unit does not provide the first lower layer function; and generate combined information by at least one of: retrieve information of the higher layer function and combining the first information with the retrieved information; combine the first information with a received second information that a second radio communication of the first central unit is jammed with at least a second predefined jamming probability threshold, wherein the second radio communication is different from the first radio communication, the second radio communication comprises a second lower layer function and the higher layer function controlling at least partly the second lower layer function, and the central unit does not provide the second lower layer function; or combine the first information with a third information received from a second central unit that a third radio communication controlled by the second central unit is jammed with at least a third predefined jamming probability threshold, wherein the second central unit is different from the first central unit; evaluate the combined information to obtain a jamming report as a result of the evaluating; and at least one of: cause the first central unit to apply one or more jamming mitigation techniques of the higher layer function based on the jamming report; provide the jamming report to at least one of the first central unit, the second central unit and a third central unit different from each of the first central unit and the second central unit; provide the jamming report to at least one of the first lower layer function, the second lower layer function, and a third lower layer function different from each of the first lower layer function and the second lower layer function; or provide the jamming report to a central controller controlling the first central unit.
8. The apparatus according to claim 7, wherein the first information comprises at least one of: a time when the first radio communication might be jammed with at least the first predefined jamming probability threshold; one or more frequencies on which the first radio communication might be jammed with at least the first predefined jamming probability threshold; or one or more directions from where the first radio communication might be jammed with at least the first predefined jamming probability threshold.
9. The apparatus according to claim 7, wherein the higher layer function comprises a packet data convergence protocol layer at the first central unit related to the radio communication.
10. The apparatus according to claim 7, wherein the instructions, when executed by the one or more processors, further cause the apparatus to: negotiate with at least one of the second central unit, the third central unit, the first lower layer function, the second lower layer function, the third lower layer function, and the central controller if the respective one of the second central unit, the third central unit, the first lower layer function, the second lower layer function, the third lower layer function, and the central controller wants to receive the jamming report; inhibiting the providing of the jamming report to the respective one of the second central unit, the third central unit, the first lower layer function, the second lower layer function, the third lower layer function, and the central controller if the respective one of the second central unit, the third central unit, the first lower layer function, the second lower layer function, the third lower layer function, and the central controller does not want to receive the jamming report.
11. The apparatus according to claim 10, wherein the negotiating further comprises negotiating one or more resources on which the jamming report informs.
12. The apparatus according to claim 7, wherein the jamming probability comprises at least one of a probability value in the interval [0; 1]; a function of probabilities, or a function of a probability density function.
13. A method comprising: detecting that a radio communication of a distributed unit might be jammed with at least a predefined first jamming probability threshold; and informing a higher layer function of the radio communication that the radio communication might be jammed with at least the predefined first jamming probability threshold, wherein the radio communication comprises a lower layer function and the higher layer function controlling at least partly the lower layer function, the distributed unit provides the lower layer function, and the distributed unit does not provide the higher layer function.
14. The method according to claim 13, further comprising informing the higher layer function on at least one of: a time when the radio communication might be jammed with at least the predefined first jamming probability threshold; one or more frequencies on which the radio communication might be jammed with at least the predefined first jamming probability threshold; or one or more directions from where the radio communication might be jammed with at least the predefined first jamming probability threshold.
15. The method according to claim 13, further comprising: monitoring if the higher layer function indicates that it wants to be informed if the radio communication might be jammed with at least the predefined first jamming probability threshold; and inhibiting the informing that the radio communication might be jammed with at least the predefined first jamming probability threshold if the higher layer function does not indicate that it wants to be informed if the radio communication might be jammed with at least the predefined first jamming probability threshold.
16. The method according to claim 15, further comprising: informing the higher layer function on one or more resources available at the distributed unit for detecting that the radio communication of the distributed unit might be jammed with at least the predefined first jamming probability threshold if the higher layer function indicates that it wants to be informed if the radio communication might be jammed with at least the predefined first jamming probability threshold.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0049] Further details, features, objects, and advantages are apparent from the following detailed description of the preferred embodiments of the present invention which is to be taken in conjunction with the appended drawings, wherein:
[0050]
[0051]
[0052]
[0053]
[0054]
[0055]
[0056]
[0057]
[0058]
[0059]
[0060]
DETAILED DESCRIPTION OF CERTAIN EMBODIMENTS
[0061] Herein below, certain embodiments of the present invention are described in detail with reference to the accompanying drawings, wherein the features of the embodiments can be freely combined with each other unless otherwise described. However, it is to be expressly understood that the description of certain embodiments is given by way of example only, and that it is by no way intended to be understood as limiting the invention to the disclosed details.
[0062] Moreover, it is to be understood that the apparatus is configured to perform the corresponding method, although in some cases only the apparatus or only the method are described.
[0063] In the 5G RAN architecture, jamming detection can be implemented somehow everywhere: in the DU, in the CU, or somewhere else like in a master gNB (for example in private campus networks where the CU of a certain gNB can act as a sort of central controller (CC) of all the gNBs). However, because jamming introduces undesired/malicious interference, the essential PHY information for performing jamming detection is available only at the DU of a gNB, and there is no signalling that has been defined to allow: [0064] The DU to communicate jamming-relevant information to the CU; [0065] The CU to potentially forward this jamming-relevant information to the other CUs and, if that exists, to the CC; [0066] The unit responsible for deciding whether there is a jamming attack or not to inform about this decision the CU and DU of the gNBs affected by this attack, such that they can implement appropriate mitigation schemes. Thanks to this messages, different gNBs could collaborate to detect and mitigate jamming attacks, instead of adopting independent measures.
[0067] Conventional signalling does not allow for efficient jamming detection and mitigation procedures that include fast detection schemes relying on the baseband received symbols. In particular, a signalling allowing such jamming detection and mitigation procedures in the 5G RAN architecture has not been standardized. In fact, neither a new signalling nor any procedure have been defined for the different units (RU, DU, CU, CC (if any)) in the 5G RAN to support and allow any (known or novel) jamming detection and/or mitigation algorithm that uses PHY information. The PHY information is available in the DU and/or may be received from other gNBs.
[0068] Some example embodiments of the invention provide a novel signalling and procedures to improve current 5G RAN jamming detection and, consequently, jamming mitigation. In the architectural diagram of
[0073] Some example embodiments of the invention provide a procedure that allows to make use of the above-mentioned signalling to improve jamming detection in 5G RAN. With the provided procedure, properly processed information regarding the jamming detected behaviour is transferred from and to different network elements (DU, CU, other CUs). This allows for a faster and more sensitive jamming detection, thus mitigation, in 5G and beyond systems.
[0074]
[0081] CU performs the following actions: [0082] 7. Jamming detection is started at CU. [0083] 8. CU receives DCJD (typically aggregated information) from DU via F1 interface. In addition, or alternatively, DU may aggregate information from several DCJD reports from the DU (long-term aggregation). Correspondingly, CU may receive one or more DCJD from other DUs. [0084] 9. CU may receive one or more CCJD from other CUs and may receive CcCJD from CC (if any). CU may aggregate plural CCJDs and/or CcCJD. [0085] 10. Based on the aggregated information from one or more DCJDs from one or more DUs, and potentially one or more CCJDs from one or more other CUs, and potentially one or more CcCJDs from CC (if any), CU performs jamming detection based on an analysis of the PDCP-layer. For example, CU may perform jamming detection fusing the jamming probabilities reported by the DUs and CUs with some other metrics available at the PDCP layer, for instance the PDCP packet loss and delay. [0086] 11. CU decides if the jamming probability is above a predefined threshold. [0087] 12. If the jamming probability is not above the threshold, the routine ends. [0088] 13. If the jamming probability is above the threshold, CU triggers PDCP jamming mitigation techniques, for instance based on PDPC packet duplication. [0089] 14. In addition to deciding if the jamming probability is above the predefined threshold in action 11, CU may aggregate the results of one or more PDCP-based jamming detections and create a jamming report (CCJD) based thereon. It may send CCJD to other CUs via Xn interface. [0090] 15. Based on these aggregated data, CU may also update CDJD and send it to DU via F1 interface. Then, DU may take/adapt L2 mitigation actions.
[0091] Hereinafter, details are described of: [0092] a) The operations implemented at each unit (DU, CU, and CC); [0093] b) The content of each Jamming Detection report (DCJD, CCJD, CDJD, CcCJD). [0094] c) The procedures and messages exchanged among the different units (DU, CU, and CC) for configuring the Jamming Detection reports (DCJD, CCJD, CcCJD, CDJD).
[0095] In the present application, the term “jamming probability” has a broad meaning. It may mean a probability in the strict sense (i.e., with values between 0 and 1), or a function of probabilities, or a function of a probability density function, like for instance a likelihood.
[0096] The false alarm rate can be set by the network administrator or owner depending on the use cases for that network. Statistical hypothesis testing can be used to perform jamming detection and different types of test can be used for that purpose, for instance: likelihood ratio test, generalized likelihood ratio (GLRT) test, Kolmogorov-Smirnov test, Shapiro-Wilk test or others. Depending on the employed test, the test statistic under the assumption that no jamming is present can be characterized, and, based on its expression, the threshold can be computed as a function of the false alarm rate. A specific example on how to compute the threshold as a function of the false alarm rate for a jamming detection scheme implemented at the DU and using GLRT is disclosed in [FI20205440]. However, the signaling and procedures proposed in this patent application can be used even if other algorithms or tests are employed.
[0097] Operations at the DU
[0098] In each time slot, at the resource de-mapping in the DU, the received complex baseband samples can be used to measure/estimate interference power in time, frequency, and spatial/angular domain to implement jamming detection algorithms like [FI20205440, PCT/CN2020/098301] that exploit this PHY information. If the algorithm detects the presence of a jammer, then it:
[0099] applies specific L1/L2 jamming mitigation techniques that can be implemented already at the DU, for instance based on smart beamforming and robust link adaptation;
[0100] creates the DCJD signalling that is sent with a time slot granularity to the CU over the F1 interface.
[0101] DCJD Signalling
[0102] The DCJD signalling is set up and configured with an exchange of messages between the DU and the CU (see Section “CU-DU Jamming Detection Setup and Configuration” below). It contains two fields, that can be configured with different options:
[0103] Jamming presence J.sub.jm-pr.sup.(DU).
[0104] Mandatory field: sent in any case if jamming is detected and CU wants to receive DCJD, even if there is no jamming detection algorithms at the CU or at the CC; note that the operator or (in the IIoT example) the factory owner can use this information just to inform the authorities.
[0105] For this field, different options can be selected, depending mainly on the DU capabilities. [0106] Time presence, containing jamming signal j.sub.i,t.sup.(DU) detected by the DU of gNB i at time slot t; note that t can be encoded with current frame enumeration techniques used in 3GPP standards. [0107] Time/Frequency presence, containing jamming signal j.sub.i,t,f.sup.(DU) detected by the DU of gNB i at time slot t on sub-band f with f=0, 1, . . . , F−1; wherein F defines the number of sub-bands (with F=1 we end up in just the time description), each sub-band could be 1 PRB or a set of adjacent PRBs. [0108] Time/Frequency/Space presence, containing jamming signal j.sub.i,t,f,θ,φ.sup.(DU) detected by the DU of gNB i at time slot t on sub-band f with f=0, 1, . . . , F−1 at azimuth direction θ∈Θ and elevation direction φ∈Φ: wherein F defines again the number of sub-bands; Θ={θ.sub.0, θ.sub.1, . . . , θ.sub.|θ|−1} is the set of considered azimuth directions (granularity can be rather coarse); and ={(φ.sub.0, φ.sub.1, . . . , φ.sub.|Φ|−1} is the set of considered azimuth directions (granularity can be rather coarse).
[0109] While these are typical combinations of parameters, DU may provide each of the parameters (time (e.g. time slot), frequency (e.g. sub-band), and space (e.g. azimuth direction and/or elevation direction)) singly or an arbitrary combination of these parameters.
[0110] The jamming presence may be calculated based on the rate of false alarms (i.e., where the DU assumes that there is jamming although actually jamming does not occur). The system determines the false alarm rate because it describes the system and how it works and its expected performance without a malicious device like a jammer and compares this expected performance with the actual performance.
[0111] Depending on configuration or negotiation between DU and CU (see below), the jamming presence (j.sub.i,t.sup.(DU) or j.sub.i,t,f.sup.(DU) or j.sub.i,t,f,θ,φ.sup.(DU) in the above typical combinations) can be expressed in 2 different forms (that's why we have 6 options in total for the typical combinations): [0112] Soft detection value V (e.g., likelihood value): CU may compare this value with the N thresholds (computed from N false alarm rates configured in the setup phase as described in the following paragraph “CU-DU Jamming Detection Setup”) in order to derive a hard detection flag; the N thresholds are determined for different required levels of certainty that jamming is actually present. N may be 1 or an integer larger than 1. [0113] Hard detection flag: integer value derived from the comparison between the soft detection value V and N thresholds {τ.sub.0, τ.sub.1, . . . , θ.sub.N-1}, that are sorted in descending order. In particular, this value is equal to i if τ.sub.i≥V≥τ.sub.i-1, with τ.sub.−1 and τ.sub.N defined as the minimum and maximum value that V can assume, respectively. The hard detection flag may be a single bit only (“yes” or “no”). [0114] If the CU or the CC are capable to perform a fusion of the information coming from different DUs acting as jamming detectors (using one of the many available fusion techniques, e.g., Bayesian data fusion, the Kalman filtering method, Dempster-Shafer theory (DST), etc.), then former option is recommended.
[0115] Interference Power Descriptor I.sub.int-pw.sup.(DU).
[0116] Optional field: typically, it is sent only if the CU of the gNB or the CC have jamming detection capabilities (may be predefined or negotiated in CU-DU Jamming Detection Setup and Configuration).
[0117] The specific content of this field depends mainly on the DU capabilities, and we can select among different options (which are aligned with J.sub.jm-pr.sup.(DU)). For the typical combinations, there are: [0118] Time descriptor, containing interference power P.sub.i,t estimated by gNB i at time slot t. [0119] Time/Frequency descriptor, containing interference power P.sub.i,t,f estimated by gNB i at time slot t on sub-band f with f=0, 1, . . . , F−1. [0120] Time/Frequency/Space descriptor, containing interference power P.sub.i,t,f,θ,φ, estimated by gNB i at time slot t on sub-band f with f=0, 1, . . . , F−1 at azimuth direction θ∈Θ and elevation direction φ∈Φ.
[0121] Operations at the CU
[0122] While the DU can exploit a lot of physical layer information to perform fast per-slot (or per-transport block) operations for jamming detection, the CU is supposed to aggregate high level information coming from the DU and to run more complex long-term procedures.
[0123] In particular, the CU receives the DCJD from the DU (and potentially further DUs) and can use this information plus further information available at the PDCP, including previous CCJD from other CUs and, if available, CcCJD, to refine and change the jamming detection information, either in the form of hard or soft detection, performed at the DU. If a jammer is detected at the CU, then the CU: applies specific jamming mitigation techniques that can be implemented at the CU, for instance exploiting PDCP packet duplication;
[0124] creates the CCJD signalling that is sent periodically to the other CUs (or the CC) over the Xn interface;
[0125] creates and forwards the CDJD signalling to the DU.
[0126] CCJD Signalling
[0127] The CCJD signalling is set up and configured with an exchange of messages between two CUs or between a CU and the CC (see Sections “CU-CU Jamming Detection Setup and Configuration” and “CC-CU Jamming Detection Setup and Configuration” below). Similar to DCJD, it contains two fields, that can be configured with different options:
[0128] Jamming Presence J.sub.jm-pr.sup.(CU).
[0129] Mandatory if CU or one of its DUs detects jamming and other CU or CC wants to receive CCJD: even in case there is no jamming detection capability at the CC, this information can be used by the operator to take some measures, e.g., informing the authorities, about the presence of a jammer.
[0130] If the CU of gNBi has no jamming detection capability, then it just forwards the information collected from the DU, i.e., J.sub.jm-pr.sup.(CU)=J.sub.jm-pr.sup.(DU).
[0131] If the CU has some jamming detection capabilities, for instance by exploiting the PHY information coming from the DU and some more further metrics, then this field will take different values than what has been forwarded by the DU. In that case, we can define for the CU j.sub.i,t.sup.(CU), j.sub.i,t,f.sup.(CU), and j.sub.i,t,f,θ,φ.sup.(CU) in a same similar way as they were defined for the DU. Also, other parameter combinations are feasible, as described above.
[0132] Interference Power Descriptor I.sub.int-pw.sup.(DU).
[0133] Optional: sent only in the case there is a centralized jamming detection algorithm running in the CC. The CU just forwards this interference power descriptor received from the DU.
[0134] Operations at the CC
[0135] The CC collects the CCJD signalling from all the CUs and performs jamming detection with potentially a better accuracy than what a single gNB can do alone. CC may use any of the jamming detection algorithms that may be used at CU, too. CC may incorporate functions such as automatic warnings to law enforcement and dashboards for system administration. A CC may exist for instance in private campus networks, where a private operator deploys few gNBs to cover a limited geographical area, and the CC can be seen as the unit that connects the network to other non-communications functions, e.g., cameras or other sensors deployed in that area. This management function may be typically implemented as a proprietary solution, running in the same virtual location of a CU and communicating with it via proprietary interfaces. However, in some example embodiments, a CC function is implemented and deployed independently from a CU, for example if a network managing function resides in the Radio Intelligent Controller (RIC), defined for Open RAN standards. In this case, the CC function residing in the RIC would communicate with the RAN—i.e. its CUs—via the E2 interface. Other options could be adopted too, thus we mention how this signal can be specified for a generic case.
[0136] The output of this algorithm is the CcCJD, which is sent back to the CUs periodically and/or event driven.
[0137] CcCJD signalling
[0138] Differently from DCJD and CCJD, CcCJD contains just one field about the jamming detection decision.
[0139] Jamming Presence J.sub.jm-pr.sup.(CU).
[0140] Optional: sent only if there is a centralized jamming detection algorithm running at the CC. Typically, it is sent only if there is some jamming mitigation mechanism implemented at either the CU or at the DU (or at both levels). May be negotiated at setup and configuration or predefined.
[0141] Similar to J.sub.jm-pr.sup.(DU) and J.sub.jm-pr.sup.(CU), for the typical parameter combinations, there are similar 6 options by defining j.sub.i,t.sup.(CC), j.sub.i,t,f.sup.(CC), and j.sub.i,t,f,θ,φ.sup.(CC). Other parameter combinations and respective J.sub.jm-pr.sup.(CC) are feasible, too.
[0142] CDJD Signalling
[0143] The CU, after performing jamming detection can forward the output to the DU in the form of the CDJD signalling.
[0144] Jamming Presence J.sub.jm-pr.sup.(CU-updated). [0145] Optional: typically sent only if (may be negotiated at setup and configuration or predefined) there are some jamming mitigation mechanisms implemented at the DU and there is a jamming detection algorithm implemented either at the CU (such that J.sub.jm-pr.sup.(CU)≠J.sub.jm-pr.sup.(DU)) or at the CC (such that J.sub.jm-pr.sup.(CC)≠J.sub.jm-pr.sup.(CU)) [0146] If there is a centralized jamming detection algorithm running at the CC then J.sub.jm-pr.sup.(CU-updated)=J.sub.jm-pr.sup.(CC).
[0147] If there is no centralized jamming detection algorithm running at the CC then J.sub.jm-pr.sup.(CU-updated)=J.sub.jm-pr.sup.(CU).
[0148] Jamming Detection Setup and Configuration
[0149] The jamming detection signalling and operations defined in the previous paragraphs may be configured and initialized in a setup phase. Alternatively, at least some of the jamming detection signalling and operations may be predefined. Hereinafter, the procedures and messages are described that may be exchanged among the different units (DU, CU, and CC if that exists) for configuring those signalling (DCJD, CCJD, CcCJD, CDJD) and operations.
[0150] CU-DU Jamming Detection Setup and Configuration
[0151] The interaction between a CU and a DU comprises a series of messages with which the CU activates and configures the jamming detection at the DU.
[0157] After this setup, the DU starts its jamming detection routine.
[0158] CU-CU Jamming Detection Setup and Configuration
[0159] The interaction between two CUs comprises a series of messages with which one
[0160] CU (CU.sub.1) proposes to the other CU (CU.sub.2) its jamming detection report. The latter one can accept or reject the proposal based on its jamming detection needs.
CC-CU Jamming Detection Setup and Configuration
[0167] The interaction between the CC and a CU comprises a series of messages with which the CC asks the CU to share it jamming detection report, so that the CC can start its jamming detection procedures
[0172]
[0173] The apparatus comprises means for detecting 110 and means for informing 120. The means for detecting 110 and means for informing 120 may be a detecting means and informing means, respectively. The means for detecting 110 and means for informing 120 may be a detector and informer, respectively. The means for detecting 110 and means for informing 120 may be a detecting processor and informing processor, respectively.
[0174] The means for detecting 110 detects that a radio communication of a distributed unit might be jammed with at least a predefined first jamming probability threshold (S110).
[0175] The means for informing 120 informs a higher layer function of the radio communication that the radio communication might be jammed with at least the predefined first jamming probability threshold (S120). The radio communication comprises a lower layer function and the higher layer function controlling at least partly the lower layer function, the distributed unit provides the lower layer function, and the distributed unit does not provide the higher layer function.
[0176]
[0177] The apparatus comprises means for receiving 210, means for generating 220, means for evaluating 230, and at least one of means for causing 240 and means for providing 250. The means for receiving 210, means for generating 220, means for evaluating 230, means for causing 240 and means for providing 250 may be a receiving means, generating means, evaluating means, causing means, and providing means, respectively. The means for receiving 210, means for generating 220, means for evaluating 230, means for causing 240 and means for providing 250 may be a receiver, generator, evaluator, causer, and provider, respectively. The means for receiving 210, means for generating 220, means for evaluating 230, means for causing 240, and means for providing 250 may be a receiving processor, generating processor, evaluating processor, causing processor, and providing processor, respectively.
[0178] The means for receiving 210 receives a first information that a first radio communication of a first central unit is jammed with at least a first predefined jamming probability threshold (S210). The first radio communication comprises a first lower layer function and a higher layer function controlling at least partly the first lower layer function. The first central unit provides the higher layer function, and the first central unit does not provide the first lower layer function
[0179] The means for generating 220 generates combined information (S220). In detail, the means for generating 220 generates the combined information by at least one of [0180] retrieving information of the higher layer function (e.g. PDCP) and combining the first information with the retrieved information; [0181] combining the first information with a received second information that a second radio communication of the first central unit is jammed with at least a second predefined jamming probability threshold, wherein the second radio communication is different from the first radio communication, the second radio communication comprises a second lower layer function and the higher layer function controlling at least partly the second lower layer function, and the central unit does not provide the second lower layer function; and [0182] combining the first information with a third information received from a second central unit that a third radio communication controlled by the second central unit is jammed with at least a third predefined jamming probability threshold, wherein the second central unit is different from the first central unit.
[0183] If the apparatus is a central controller or an element thereof, the means for generating 220 typically combines the first information with the third information (third option).
[0184] The means for evaluating 230 evaluates the combined information to obtain a jamming report as a result of the evaluating (S230).
[0185] If the apparatus comprises the means for causing 240, the means for causing 240 causes the first central unit to apply one or more jamming mitigation techniques of the higher layer function based on the jamming report (S240).
[0186] If the apparatus comprises the means for providing 250, the means for providing 250 provides the jamming report (S250). In detail, the means for providing may provide the jamming report according to at least one of the following options: [0187] providing the jamming report to at least one of the first central unit, the second central unit, and a third central unit different from each of the first central unit and the second central unit; [0188] providing the jamming report to at least one of the first lower layer function, the second lower layer function, and a third lower layer function different from each of the first lower layer function and the second lower layer function; and [0189] providing the jamming report to a central controller controlling the first central unit.
[0190] If the apparatus is a central controller or an element thereof, the means for providing 250 typically provides the jamming report to at least one of the first to third central units (first option).
[0191] If the apparatus comprises both the means for causing 240 and the means for providing 250 (as shown in
[0192]
[0193] Some example embodiments are explained where jamming detection is made with a granularity of time slot and sub-band for time and frequency, respectively. However, some example embodiments may apply different granularities. E.g., they may combine plural time slots and/or plural sub-bands. Also, the period for reporting the jamming report (if the same is reported periodically) may be arbitrary in different configurations.
[0194] Some example embodiments are explained with respect to a 5G network. However, the invention is not limited to 5G. It may be used in other networks, too, e.g. in forthcoming generations of 3GPP networks such as 6G, 7G, etc. It may be applicable to other radio access technologies (e.g. WiFi), too, if one or more lower layer function(s) are separated from the higher layer function(s).
[0195] In the context of the present application, it is irrelevant whether DU and RU are combined (i.e., the DU comprises RU functionality, too) or separated.
[0196] One piece of information may be transmitted in one or plural messages from one entity to another entity. Each of these messages may comprise further (different) pieces of information.
[0197] Names of network elements, network functions, protocols, and methods are based on current standards. In other versions or other technologies, the names of these network elements and/or network functions and/or protocols and/or methods may be different, as long as they provide a corresponding functionality.
[0198] If not otherwise stated or otherwise made clear from the context, the statement that two entities are different means that they perform different functions. It does not necessarily mean that they are based on different hardware. That is, each of the entities described in the present description may be based on a different hardware, or some or all of the entities may be based on the same hardware. It does not necessarily mean that they are based on different software. That is, each of the entities described in the present description may be based on different software, or some or all of the entities may be based on the same software. Each of the entities described in the present description may be deployed in the cloud.
[0199] According to the above description, it should thus be apparent that example embodiments of the present invention provide, for example, a distributed unit or a component thereof, an apparatus embodying the same, a method for controlling and/or operating the same, and computer program(s) controlling and/or operating the same as well as mediums carrying such computer program(s) and forming computer program product(s). According to the above description, it should thus be apparent that example embodiments of the present invention provide, for example, a central unit or a component thereof, an apparatus embodying the same, a method for controlling and/or operating the same, and computer program(s) controlling and/or operating the same as well as mediums carrying such computer program(s) and forming computer program product(s). According to the above description, it should thus be apparent that example embodiments of the present invention provide, for example, a central controller or a component thereof, an apparatus embodying the same, a method for controlling and/or operating the same, and computer program(s) controlling and/or operating the same as well as mediums carrying such computer program(s) and forming computer program product(s).
[0200] Implementations of any of the above described blocks, apparatuses, systems, techniques or methods include, as non-limiting examples, implementations as hardware, software, firmware, special purpose circuits or logic, general purpose hardware or controller or other computing devices, or some combination thereof. Each of the entities described in the present description may be embodied in the cloud.
[0201] It is to be understood that what is described above is what is presently considered the preferred embodiments of the present invention. However, it should be noted that the description of the preferred embodiments is given by way of example only and that various modifications may be made without departing from the scope of the invention as defined by the appended claims.
Abbreviations
[0202] 3GPP 3.sup.rd Generation Partnership Project
[0203] 4G/5G/6G 4.sup.th/5.sup.th/6.sup.th Generation
[0204] ACK Acknowledgment
[0205] CC Central Controller
[0206] CcCJD CC-CU Jamming Detection Report
[0207] CCJD CU-CU Jamming Detection Report
[0208] CDJD CU-DU Jamming Detection Report
[0209] CSP Customer service provider
[0210] CU Central unit
[0211] DCJD DU-CU Jamming Detection Report
[0212] DoS Denial of Service
[0213] DU Distributed unit
[0214] eCPRI enhanced Common Public Radio Interface
[0215] gNB next generation NodeB
[0216] GPS Global Positioning System
[0217] IIot Industrial IoT
[0218] IoT Internet of Things
[0219] JD Jamming Detection
[0220] L2 Layer 2 (MAC)
[0221] LBT Listen-before-talk
[0222] LTE Long term evolution
[0223] MAC Medium Access Control
[0224] NACK Non-Acknowledgment
[0225] NR New radio
[0226] OLLA Outer Loop Link Adaptation
[0227] PDCP Packet data convergence protocol
[0228] PHY Physical (layer)
[0229] PRB Physical resource block
[0230] QAM Quadrature Amplitude Modulation
[0231] RAN Radio Access Network
[0232] RF Radio frequency
[0233] RIC Radio Intelligent Controller
[0234] RLC Radio Link Control
[0235] RRC Radio Resource control
[0236] RU Radio unit
[0237] SotA State of the Art
[0238] UE User equipment
[0239] URLLC Ultra-reliable low-latency communications
[0240] WiFi Wireless Fidelity