METHOD AND ENTITY FOR CHECKING PORT CONSISTENCY OF NIDD MESSAGE
20220295268 · 2022-09-15
Assignee
Inventors
Cpc classification
H04L45/306
ELECTRICITY
International classification
Abstract
Embodiments of the present disclosure provide a method and an entity for checking port consistency of NIDD message. A first aspect of the present disclosure provides a method performed at a first entity (100), comprising: receiving (S101), from a second entity, a non-internet protocol data delivery, NIDD, message including one or more RDS port numbers; and determining (S102) whether the one or more RDS port numbers are within a configured RDS port list. According to embodiments of the present disclosure, network resources for transmitting the invalid NIDD data may be saved, and undesired actions in the communication system may be avoided.
Claims
1. A method performed at a first entity, comprising: receiving, from a second entity, a non-internet protocol data delivery (NIDD) message including one or more Reliable Data Service (RDS) port numbers; and determining whether the one or more RDS port numbers are within a configured RDS port list.
2. The method of claim 1, wherein the one or more RDS port numbers comprise a source port number and a destination port number; and determining whether the one or more RDS port numbers are within a configured RDS port list comprises: determining whether the source port number in the NIDD message equals to a configured source port number in the configured RDS port list; and/or determining whether the destination port number in the NIDD message equals to a configured destination port number in the configured RDS port list.
3. The method of claim 1, further comprising: discarding the NIDD message as a result of determining that the one or more RDS port numbers are not within the configured RDS port list.
4. The method of claim 1, further comprising: transmitting a response message including an indication of that a port number is not consistent, if it is determined that the one or more RDS port numbers are not within the configured RDS port list, wherein the indication of that the port number is not consistent comprises an error code, and a value of the port number in the NIDD message.
5. (canceled)
6. The method 5 of claim 4, wherein the response message is transmitted to a Service Capability Server/Application Server (SCS/AS) or an Application Function (AF), and the response message comprises at least one of: a Mobile Terminated (MT) NIDD submit Response message; a Group MT NIDD submit Response message; a NIDD Authorization Notification Request message; or a Mobile Originated (MO) NIDD Indication message.
7. The method of claim 4, further comprising: receiving an updated configured RDS port list from the SCS/AS or the AF, after transmitting the response message including the indication of that the port number is not consistent; or receiving an updated NIDD message from the SCS/AS or the AF, after transmitting the response message including the indication of that the port number is not consistent.
8. The method of claim 1, wherein the first entity determines whether the one or more RDS port numbers are within a configured RDS port list, if an RDS port verification feature is supported.
9. The method of claim 1, wherein the first entity comprises a Service Capability Exposure Function (SCEF) or a Network Exposure Function (NEF), and the second entity comprises a SCS/AS, or an AF, or a terminal device.
10. A method performed at a second entity, comprising: transmitting, to a first entity, a non-internet protocol data delivery (NIDD) message including one or more Reliable Data Service (RDS) port numbers; wherein the first entity is configured to determine whether the one or more RDS port numbers are within a configured RDS port list.
11. The method claim 10, wherein the one or more RDS port numbers comprise a source port number and a destination port number, and when the first entity determines whether the one or more RDS port numbers are within a configured RDS port list, the first entity determines: whether the source port number in the NIDD message equals to a configured source port number in the configured RDS port list; and/or whether the destination port number in the NIDD message equals to a configured destination port number in the configured RDS port list.
12. The method of claim 10, wherein the NIDD message is discarded by the first entity, if it is determined that the one or more RDS port numbers are not within the configured RDS port list.
13. The method of claim 10, further comprising: receiving, from the first entity, a response message including an indication of that a port number is not consistent, if it is determined that the one or more RDS port numbers are not within the configured RDS port list, wherein the indication of that the port number is not consistent comprises an error code, and a value of the port number in the NIDD message.
14. (canceled)
15. The method of claim 13, wherein the second entity comprises a SCS/AS or an AF, and the response message comprises at least one of: a MT NIDD submit Response message; a Group MT NIDD submit Response message; a NIDD Authorization Notification Request message; or a MO NIDD Indication message.
16. The method of claim 13, further comprising: transmitting, to the first entity, an updated configured RDS port list, after receiving the response message including the indication of that the port number is not consistent; or transmitting, to the first entity, an updated NIDD message, after receiving the response message including the indication of that the port number is not consistent.
17. (canceled)
18. The method of claim 10, wherein the first entity determines whether the one or more RDS port numbers are within a configured RDS port list, if an RDS port verification feature is supported.
19. The method of claim 10, wherein the first entity comprises a SCEF or a NEF, and the second entity comprises a terminal device and.
20. An apparatus for a first entity, comprising: a processor; and a memory, containing instructions executable by the processor; wherein the first entity is operative to: receive, from a second entity, a NIDD message including one or more RDS port numbers; and determine whether the one or more RDS port numbers are within a configured RDS port list.
21. The apparatus according to claim 20, wherein the one or more RDS port numbers comprise a source port number and a destination port number; and the first entity is configured to determine whether the one or more RDS port numbers are within a configured RDS port list by performing a process that includes: determining whether the source port number in the NIDD message equals to a configured source port number in the configured RDS port list; and/or determining whether the destination port number in the NIDD message equals to a configured destination port number in the configured RDS port list.
22. An apparatus for a second entity, comprising: a processor; and a memory, containing instructions executable by the processor; wherein the second entity is operative to: transmit, to a first entity, a NIDD message including one or more RDS port numbers; wherein the first entity determines whether the one or more RDS port numbers are within a configured RDS port list.
23. The apparatus according to claim 22, wherein the one or more RDS port numbers comprise a source port number and a destination port number.
24-28. (canceled)
Description
BRIEF DESCRIPTION OF DRAWINGS
[0042] Through the more detailed description of some embodiments of the present disclosure in the accompanying drawings, the above and other objects, features and advantages of the present disclosure will become more apparent, wherein the same reference generally refers to the same components in the embodiments of the present disclosure.
[0043]
[0044]
[0045]
[0046]
[0047]
[0048]
[0049]
[0050]
[0051]
[0052]
[0053]
[0054]
[0055]
DETAILED DESCRIPTION
[0056] Some of the embodiments contemplated herein will now be described more fully with reference to the accompanying drawings. Other embodiments, however, are contained within the scope of the subject matter disclosed herein, the disclosed subject matter should not be construed as limited to only the embodiments set forth herein; rather, these embodiments are provided by way of example to convey the scope of the subject matter to those skilled in the art.
[0057] Generally, all terms used herein are to be interpreted according to their ordinary meaning in the relevant technical field, unless a different meaning is clearly given and/or is implied from the context in which it is used. All references to a/an/the element, apparatus, component, means, step, etc. are to be interpreted openly as referring to at least one instance of the element, apparatus, component, means, step, etc., unless explicitly stated otherwise. The steps of any methods disclosed herein do not have to be performed in the exact order disclosed, unless a step is explicitly described as following or preceding another step and/or where it is implicit that a step must follow or precede another step. Any feature of any of the embodiments disclosed herein may be applied to any other embodiment, wherever appropriate. Likewise, any advantage of any of the embodiments may apply to any other embodiments, and vice versa. Other objectives, features and advantages of the enclosed embodiments will be apparent from the following description.
[0058] Reference throughout this specification to features, advantages, or similar language does not imply that all of the features and advantages that may be realized with the present disclosure should be or are in any single embodiment of the disclosure. Rather, language referring to the features and advantages is understood to mean that a specific feature, advantage, or characteristic described in connection with an embodiment is included in at least one embodiment of the present disclosure. Furthermore, the described features, advantages, and characteristics of the disclosure may be combined in any suitable manner in one or more embodiments. One skilled in the relevant art will recognize that the disclosure may be practiced without one or more of the specific features or advantages of a particular embodiment. In other instances, additional features and advantages may be recognized in certain embodiments that may not be present in all embodiments of the disclosure.
[0059] As used herein, the term “network”, or “communication network/system” refers to a network/system following any suitable communication standards, such as new radio (NR), long term evolution (LTE), LTE-Advanced, wideband code division multiple access (WCDMA), high-speed packet access (HSPA), and so on. Furthermore, the communications between a terminal device and a network node in the communication network may be performed according to any suitable generation communication protocols, including, but not limited to, the first generation (1G), the second generation (2G), 2.5G, 2.75G, the third generation (3G), 4G, 4.5G, 5G communication protocols, and/or any other protocols either currently known or to be developed in the future.
[0060] The term “entity”, “network entity”, “network function” may refer to a network device/apparatus/node with accessing capability in a communication network via which a terminal device accesses to the network and receives services therefrom. The entity/function may include a base station (BS), an access point (AP), a multi-cell/multicast coordination entity (MCE), a server node/function (such as a service capability server/application server, SCS/AS, group communication service application server, GCS AS, application function, AF), an exposure node (such as a service capability exposure function, SCEF, network exposure function, NEF), a controller or any other suitable device in a wireless communication network. The BS may be, for example, a node B (NodeB or NB), an evolved NodeB (eNodeB or eNB), a next generation NodeB (gNodeB or gNB), a remote radio unit (RRU), a radio header (RH), a remote radio head (RRH), a relay, a low power node such as a femto node, a pico node, and so forth.
[0061] Yet further examples of the network function/entity comprise multi-standard radio (MSR) radio equipment such as MSR BSs, network controllers such as radio network controllers (RNCs) or base station controllers (BSCs), base transceiver stations (BTSs), transmission points, transmission nodes, positioning nodes and/or the like. More generally, however, the network node may represent any suitable device (or group of devices) capable, configured, arranged, and/or operable to enable and/or provide a terminal device access to a wireless communication network or to provide some service to a terminal device that has accessed to the wireless communication network.
[0062] The term terminal device encompasses a device which is able to communicate with a network function/node such as a base station, or with another wireless device by transmitting and/or receiving wireless signals. Thus, the term terminal device encompasses, but is not limited to: a mobile phone, a stationary or mobile wireless device for machine-to-machine communication, an integrated or embedded wireless card, an externally plugged in wireless card, a vehicle, etc.
[0063] As yet another specific example, in an Internet of things (IoT) scenario, a terminal device may also be called an IoT device and represent a machine or other device that performs monitoring, sensing and/or measurements etc., and transmits the results of such monitoring, sensing and/or measurements etc. to another terminal device and/or a network equipment. The terminal device may in this case be a machine-to-machine (M2M) device, which may in a 3rd generation partnership project (3GPP) context be referred to as a machine-type communication (MTC) device.
[0064] As one particular example, the terminal device may be a user equipment, UE, implementing the 3GPP narrow band Internet of things (NB-IoT) standard. Particular examples of such machines or devices are sensors, metering devices such as power meters, industrial machinery, or home or personal appliances, e.g. refrigerators, televisions, personal wearables such as watches etc. In other scenarios, a terminal device may represent a vehicle or other equipment, for example, a medical instrument that is capable of monitoring, sensing and/or reporting etc. on its operational status or other functions associated with its operation.
[0065] As used herein, the terms “first”, “second” and so forth refer to different elements. The singular forms “a” and “an” are intended to include the plural forms as well, unless the context clearly indicates otherwise. The terms “comprises”, “comprising”, “has”, “having”, “includes” and/or “including” as used herein, specify the presence of stated features, elements, and/or components and the like, but do not preclude the presence or addition of one or more other features, elements, components and/or combinations thereof. The term “based on” is to be read as “based at least in part on”. The term “one embodiment” and “an embodiment” are to be read as “at least one embodiment”. The term “another embodiment” is to be read as “at least one other embodiment”. Other definitions, explicit and implicit, may be included below.
[0066]
[0067]
[0068] In such a NIDD configuration procedure, the SCS/AS may send a list of RDS ports in the RDS configuration. These ports will be used in later non-IP data transmission.
[0069] The static RDS port information may be sent via NIDD configuration as shown in
[0070] However, the SCEF does not verify the RDS port received, i.e. whether it is aligned with subsequently received MO/MT non-IP data.
[0071] Then it is possible that the RDS port included in the MO/MT NIDD was not set/configured via the previous NIDD configuration. If there is a mismatch, for MO NIDD, the MO data may be silently discarded by the SCEF if received from the UE; for MT NIDD, the MT data may be transferred to UE but is silently discarded by the UE due to unknown RDS port (i.e. unknown application).
[0072] Therefore, the undesired data, such as the MT NIDD with mismatched port information, are still transferred, thereby wasting communication resource and causing undesired, unpredictable actions in the communication network.
[0073]
[0074] As shown in
[0075] In embodiments of the present disclosure, the first entity 100 may comprise any entity capable of receiving NIDD data during NIDD procedures in the communication system. For example, the first entity 100 may comprise a SCEF as shown in
[0076] A method performed at a second entity 200 may comprise: step S201, transmitting, to a first entity, a NIDD message including a port number (e.g. one or more RDS port numbers). The first entity determines whether the port number is consistent with a NIDD configuration (e.g., whether the one or more RDS port numbers are within a configured RDS port list).
[0077] In embodiments of the present disclosure, the second entity 200 may comprise any entity capable of transmitting NIDD data during NIDD procedures in the communication system. For example, the second entity 100 may comprise a SCS/AS shown in
[0078] According to embodiments of the present disclosure, the first entity 100 may check the port consistency between any received NIDD message and NIDD configuration. Thus, network resources for transmitting the invalid NIDD data may be saved, and undesired actions in the communication system may be avoided.
[0079]
[0080] As shown in
[0081] According to embodiments of the present disclosure, a strict policy may be applied for checking the port consistency. Namely, it will be determined that the port number is not consistent with the NIDD configuration, if any one of the source port or the destination port in the NIDD message does not equal to a configured one in the NIDD configuration.
[0082] Further, the first entity 100 may obtain the port number from the NIDD configuration and NIDD messages, based on applied standard or technical specification. For example, an exemplary table 1, as the same as the Table 5.6.2.2.2-1 in clause 5.6.2.2.2, 3GPP TS 29.122 V16.3.0, which is incorporated herein by reference in its entirety, shows a definition of the RdsPort, for the port configuration for Reliable Data Transfer.
TABLE-US-00001 TABLE 1 Definition of RdsPort data Type Attribute Data Cardi- name type nality Description portUE Port 1 Indicates the port number on UE that is used for reliable data transfer with a specific application on UE using RDS (as defined in clause 5.2.4 and 5.2.5 of 3GPP TS 24.250 [31]). portSCEF Port 1 Indicates the port number on SCEF that is used for reliable data transfer with a specific application on SCEF using RDS (as defined in clause 5.2.4 and 5.2.5 of 3GPP TS 24.250 [31]).
[0083] Further see clause 5.2.4 of 3GPP TS 24.250 V16.1.0, when a UE application starts to use the PDN connection or a PDU session to transmit RDS frames, the UE and the network establish which source port number will be used for the application on the UE side for MO traffic and which destination port number will be used for the application intended to receive the frames on the network side. Similarly for MT traffic when an application in the network starts to use the PDN connection or PDU session to transmit RDS frames, the UE and the network establish which source port number will be used for the application on the network side and which destination port number will be used for the application intended to receive the frames on the UE side.
[0084]
[0085] As shown in
[0086] For example, for MT NIDD, the SCEF, upon receiving the MT NIDD message, shall check whether the received RDS destination port equals with the configured RDS port on UE and whether the received RDS source port equals with the configured RDS port on SCEF. If there is any mismatch, SCEF shall report the error.
[0087] For MO NIDD, after decoding the RDS source port and destination port from RDS I Format frame or UI Format frame as shown in
[0088]
[0089] In embodiments of the present disclosure, the method performed at the first entity 100 further comprises: step S103, discarding the NIDD message, if it is determined that the port number is not consistent with the NIDD configuration.
[0090] Further, in embodiments of the present disclosure, the method performed at the first entity 100 further comprises: step S104, transmitting a response message including an indication of that the port number is not consistent (e.g., indicating that the port number is unknown), if it is determined that the port number is not consistent with the NIDD configuration.
[0091] In embodiments of the present disclosure, the method performed at the second entity 200 further comprises: step S204, receiving, from the first entity, a response message including an indication of that the port number is not consistent, if it is determined that the port number is not consistent with the NIDD configuration.
[0092] In embodiments of the present disclosure, the indication of that the port number is not consistent may comprise an error code, and a value of the port number in the NIDD message.
[0093] According to embodiments of the present disclosure, network resource for transmitting the invalid MT NIDD is saved. Further, improved NIDD service may be provided (i.e. the 3GPP network is able to notify abnormal situation to the second entity, such as a SCS/AS, or an AF).
[0094] In embodiments of the present disclosure, the response message for abnormal situation may be any kind of message/signalling, and the indication for the abnormal situation may be any kind of indicator/flag/information element.
[0095] For example, when the response message is transmitted to a Service Capability Server/Application Server, SCS/AS, or an Application Function, AF, the response message may comprise at least one of: a Mobile Terminated, MT, NIDD submit Response message; a Group MT NIDD submit Response message; a NIDD Authorisation Notification Request message; or a Mobile Originated, MO, NIDD Indication message.
[0096]
[0097] In embodiments of the present disclosure, the method performed at the first entity 100 further comprises: S105, receiving an updated NIDD configuration from the SCS/AS or the AF, after transmitting the response message including the indication of that the port number is not consistent; or S106, receiving an updated NIDD message from the SCS/AS or the AF, after transmitting the response message including the indication of that the port number is not consistent.
[0098] In embodiments of the present disclosure, the method performed at the second entity 200 further comprises: S205, transmitting, to the first entity, an updated NIDD configuration, after receiving the response message including the indication of that the port number is not consistent; or S206, transmitting, to the first entity, an updated NIDD message, after receiving the response message including the indication of that the port number is not consistent.
[0099] For example, the first entity 100, such as a SCEF, transmits a ‘RDS port unknown’ error message to the second entity 200, such as a SCS/AS, if it is determined the port number is not consistent with a NIDD configuration. Then, the second entity 200 will make as at least one of following corrective actions, after receiving the ‘RDS port unknown’ error message: [0100] Re-configure the NIDD with correct RDS port information (for static RDS port configuration) or re-configure with correct RDS port information in RDS port management (for dynamic RDS port configuration); [0101] Use correct port for further MT NIDD according to the RDS configuration; [0102] Re-configure UE with correct RDS port (e.g. via Over The Air (OTA)).
[0103]
[0104] According to embodiments of the present disclosure, the steps 2a and 2b in
[0105] For example, in 2a, if the new feature for checking port consistency is supported, the SCEF may check/verify whether the received RDS ports in the MT NIDD is recognized based on the NIDD configuration or not. If the above check fails, the SCEF shall reject the request in 2b (MT NIDD Submit Response message) with new error code, such as ‘RDS PORT UNKNOWN’.
[0106] Specifically, as an exemplary improvement (underlined part) for “4.4.5.3.1 Mobile Terminated NIDD for a single UE, 3GPP TS 29.122 V16.3.0”, upon receipt of a HTTP POST request from the SCS/AS for a downlink data delivery for a single UE, the SCEF shall: . . . if the Rds_port_check/verification feature is supported, check whether the RDS port numbers are configured (e.g. whether the RDS port numbers are within the configured RDS list). If the RDS port numbers are unknown in the SCEF, the SCEF shall respond a 403 Forbidden response with a cause value “RDS_PORT_UNKNOWN” in the “cause” attribute of the “ProblemDetails” structure (e.g. for indicating the RDS port is not properly configured).
[0107]
[0108] According to embodiments of the present disclosure, the step 2 in
[0109] For example, after checking the RDS ports in the Group MT NIDD submit request and if the SCEF doesn't know the RDS ports (if the new feature is supported), the SCEF needs to reject the request with new error code ‘RDS PORT UNKNOWN’ in step 2 (Group MT NIDD Submit Response message).
[0110] Specifically, as an exemplary improvement (underlined part) for “4.4.5.3.2 Mobile Terminated NIDD for a group of UEs, 3GPP TS 29.122 V16.3.0”, upon receipt of such an HTTP POST request from the SCS/AS requesting the group message delivery, the SCEF checks whether the SCS/AS is authorised to send NIDD requests, whether the non-IP packet size is larger than the Maximum Packet Size that was provided to the SCS/AS during NIDD Configuration and if the Rds_port_check feature is supported whether the RDS port numbers are recognized.
[0111]
[0112] According to embodiments of the present disclosure, the procedure between step 2 and step 3 in MO NIDD in
[0113] For example, if the new feature is supported, the SCEF shall check whether the RDS ports in the MO non-IP data is recognized or not.
[0114] If it is not recognized, the SCEF shall notify all SCS/AS in step 3 (MO NIDD message). Alternatively, the SCEF may trigger the NIDD authorization notification procedure described below to notify all SCS/AS.
[0115]
[0116] According to embodiments of the present disclosure, in step 1 in
[0117] Specifically, as an improvement (underlined part) for “4.4.5.5 NIDD Authorisation Update procedure, 3GPP TS 29.122 V16.3.0”, if the Rds_port_check feature is supported, before sending the MO NIDD to the SCS/AS as specified in subclause 4.4.5.4, the SCEF shall check RDS port numbers contained in (decoded from) the uplink non-IP data. If it is not within the configured RDS port list, the SCEF shall notify all SCS/AS with NIDD status set to “RDS_PORT_UNKNOWN” and the unknown (i.e. unrecognized) RDS port numbers. The SCS/AS shall acknowledge the request with an HTTP 200 OK or 204 No Content response.
[0118] Table 2 shows an exemplary improvement (underlined part) for “Table 5.6.2.1.6-1: Definition of type NiddConfigurationStatusNotification, in clause 5.6.2.1.6 in 3GPP TS 29.122 V16.3.0”, according to embodiments of the present disclosure.
TABLE-US-00002 TABLE 2 Definition of type NiddConfigurationStatusNotification Attribute Data Cardi- Applicability name type nality Description (NOTE 1) niddConfig- Link 1 Link to the NIDD configuration uration resource to which this notification is related. externalId Extern- 0..1 Each element uniquely identifies a alId user as defined in Clause 4.6.2 of 3GPP TS 23.682 [2]. (NOTE 2) msisdn Msisdn 0..1 Each element identifies the MS internal PSTN/ISDN number allocated for a UE. (NOTE 2) status Nidd- 1 Indicates the NIDD configuration Status status. rdsCapIndi- boo- 0..1 It indicates whether the network cation lean capability for the reliable data service is enabled or not. rdsPort Rds- 0..1 Indicates the port configuration that is Rds_port_ Port used for reliable data transfer between check (or specific applications using RDS (as Rds_port_ defined in clause 5.2.4 and 5.2.5 of verification) 3GPP TS 24.250 [31]). NOTE 1: Properties marked with a feature as defined in subclause 5.6.4 are applicable as described in subclause 5.2.7. If no feature are indicated, the related property applies for all the features. NOTE 2: One of the properties “externalld” or “msisdn” shall be included.
[0119] Table 3 shows an exemplary improvement (underlined part) for “Table 5.6.2.3.5-1: Enumeration NiddStatus, in clause 5.6.2.3.5 in 3GPP TS 29.122 V16.3.0”, according to embodiments of the present disclosure.
TABLE-US-00003 TABLE 3 Enumeration NiddStatus Enumeration Applicability value Description (NOTE) ACTIVE The NIDD configuration is active. TERMINATED_ The NIDD configuration was terminated UE_NOT_ because the UE's authorisation was AUTHORIZED revoked. TERMINATED The NIDD configuration was terminated. RDS_PORT_ The SCEF does not know the RDS port Rds_port_ UNKNOWN numbers in the NIDD, such port numbers check does not match with the configured port numbers. (or, the RDS port is unknown) NOTE: Properties marked with a feature as defined in subclause 5.6.4 are applicable as described in subclause 5.2.7. If no feature are indicated, the related property applies for all the features.
[0120] Table 4 shows an exemplary improvement (underlined part) for “Table 5.6.5.3-1: Application errors, in clause 5.6.5.3 in 3GPP TS 29.122 V16.3.0”, according to embodiments of the present disclosure.
TABLE-US-00004 TABLE 4 Application errors Application HTTP status Appli- Error code Description cability QUOTA_ 403 Not enough quota for the MT NIDD EXCEEDED Forbidden DATA_TOO_ 403 The non-IP data size is larger than LARGE Forbidden “maximumPacketSize” of the NIDD configuration. RDS_PORT_ 403 The SCEF does not know the RDS port Rds_ UNKNOWN Forbidden numbers in the MT NIDD, such port numbers port_ does not match with the configured port check numbers. OPERATION_ 403 Indicates the operation is prohibitted. PROHIBIT- Forbidden TED ALREADY_ 404 Not The SCEF has already delivered the buffered DELIVERED Found data. SENDING 409 Conflict The SCEF is ready in sending the buffered non-IP data. TRIGGERED 500 Internal The SCEF triggered the device but did not Server Error buffer the data. The SCS AS may resubmit the data TEMPOR- 500 Internal The SCEF has aborted the delivery because ARILY_ Server Error the UE is temporarily not reachable. The NOT_ SCEF may in addition indicate a requested re- REACHABLE submission time for the data. NEXT_HOP 500 Internal Unsuccessful delivery to the next hop. Server Error TIMEOUT 500 Internal Unsuccessful delivery due to timeout. Server Error
[0121] Further, an exemplary improvement (underlined part) to “A.6 NIDD API in 3GPP TS 29.122 V16.3.0” is also shown below.
( . . . text not shown for clarity . . . )
TABLE-US-00005 NiddConfigurationStatusNotification: type: object properties: niddConfiguration: $ref: ‘TS29122_CommonData.yaml#/components/schemas/Link’ externalId: $ref: ‘TS29122_CommonData.yaml#/components/schemas/ExternalId’ msisdn: $ref: ‘TS29122_CommonData.yaml#/components/schemas/Msisdn’ status: $ref: ‘#/components/schemas/NiddStatus’ rdsCapIndication: type: boolean description: It indicates whether the network capability for the reliable data service is enabled or not. rdsPort: $ref: ‘#/components/schemas/RdsPort’ required: - niddConfiguration - status oneOf: - required: [externalId] - required: [msisdn] (... text not shown for clarity ...) NiddStatus: anyOf: - type: string enum: - ACTIVE - TERMINATED_UE_NOT_AUTHORIZED - TERMINATED - RDS PORT UNKNOWN - type: string description: > This string provides forward-compatibility with future extensions to the enumeration but is not used to encode content defined in the present version of this API. description: > Possible values are - ACTIVE: The NIDD configuration is active. - TERMINATED_UE_NOT_AUTHORIZED: The NIDD configuration was terminated because the UE's authorisation was revoked. - TERMINATED: The NIDD configuration was terminated. - RDS PORT UNKNOWN: The SCEF does not know the RDS port numbers in the NIDD, such port numbers does not match with the configured port numbers. (The RDS port is unknown) readOnly: true NiddConfigurationPatch: type: object properties: duration: $ref: ‘TS29122_CommonData.yaml#/components/schemas/DateTimeRm’ reliableDataService: type: boolean description: The reliable data service (as defined in subclause 4.5.15.3 of 3GPP TS 23.682) to indicate if a reliable data service acknowledgment is enabled or not. nullable: true rdsPorts: type: array items: $ref: ‘#/components/schemas/RdsPort’ minItems: 1 description: Indicates the port configuration that is used for reliable data transfer between specific applications using RDS (as defined in subclause 5.2.4 and 5.2.5 of 3GPP TS 24.250). pdnEstablishmentOption: $ref: ‘#/components/schemas/PdnEstablishmentOptionsRm’
[0122]
[0123] As shown in
[0124] In embodiments of the present disclosure, the first entity is further operative to implement any of the methods above described, such as methods shown in
[0125] As shown in
[0126] In embodiments of the present disclosure, the second entity is further operative to implement any of the methods above described, such as methods shown in
[0127] The processor 110 and processor 210 may be any kind of processing component, such as one or more microprocessor or microcontrollers, as well as other digital hardware, which may include digital signal processors (DSPs), special-purpose digital logic, and the like. The memory 120 and memory 220 may be any kind of storage component, such as read-only memory (ROM), random-access memory, cache memory, flash memory devices, optical storage devices, etc.
[0128]
[0129] As shown in
[0130] The computer readable storage medium 1000 may be configured to include memory such as RAM, ROM, programmable read-only memory (PROM), erasable programmable read-only memory (EPROM), electrically erasable programmable read-only memory (EEPROM), magnetic disks, optical disks, floppy disks, hard disks, removable cartridges, or flash drives.
[0131]
[0132] As shown in
[0133] In embodiments of the present disclosure, the first entity 100 is further operative to implement any of the methods above described, such as methods shown in
[0134] As shown in
[0135] In embodiments of the present disclosure, the second entity 200 is further operative to implement any of the methods above described, such as methods shown in
[0136] The term unit/function unit may have conventional meaning in the field of electronics, electrical devices and/or electronic devices and may include, for example, electrical and/or electronic circuitry, devices, modules, processors, memories, logic solid state and/or discrete devices, computer programs or instructions for carrying out respective tasks, procedures, computations, outputs, and/or displaying functions, and so on, as such as those that are described herein.
[0137] With these units, the apparatus for the first entity 100 or second entity 200 may not need a fixed processor or memory, any computing resource and storage resource may be arranged from at least one network node/device/entity/apparatus in the communication system. The virtualization technology and network computing technology may be further introduced, so as to improve the usage efficiency of the network resources and the flexibility of the network. Particularly, these network entities, e.g. the first entity 100 or the second entity 200, may be implemented either as a network element on a dedicated hardware, as a software instance running on a dedicated hardware, or as a virtualized function instantiated on an appropriate platform, e.g. on a cloud infrastructure.
[0138] According to embodiments of the present disclosure, a new error code in the MT NIDD response indicating ‘RDS port unknown’ may be supported. A NIDD configuration notification to the SCS/AS notifying the ‘RDS port unknown’ may be supported. Such improvements are applicable for 4G with SCS/AS, SCEF, and also for 5G with the AF and NEF.
[0139] Therefore, NIDD service for the SCS/AS is improved (i.e. the 3GPP network is able to notify abnormal situation).
[0140] In general, the various exemplary embodiments of the present disclosure may be implemented in hardware or special purpose circuits, software, logic or any combination thereof. For example, some aspects may be implemented in hardware, while other aspects may be implemented in firmware or software that may be executed by a controller, microprocessor or other computing device, although the disclosure is not limited thereto. While various aspects of the exemplary embodiments of this disclosure may be illustrated and described as block diagrams, flow charts, or using some other pictorial representation, it is well understood that these blocks, apparatus, systems, techniques or methods described herein may be implemented in, as non-limiting examples, hardware, software, firmware, special purpose circuits or logic, general purpose hardware or controller or other computing devices, or some combination thereof.
[0141] As such, it should be appreciated that at least some aspects of the exemplary embodiments of the disclosure may be practiced in various components such as integrated circuit chips and modules. It should thus be appreciated that the exemplary embodiments of this disclosure may be realized in an apparatus that is embodied as an integrated circuit, where the integrated circuit may include circuitry (as well as possibly firmware) for embodying at least one or more of a data processor, a digital signal processor, baseband circuitry and radio frequency circuitry that are configurable so as to operate in accordance with the exemplary embodiments of this disclosure.
[0142] It should be appreciated that at least some aspects of the exemplary embodiments of the disclosure may be embodied in computer-executable instructions, such as in one or more program modules, executed by one or more computers or other devices. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types when executed by a processor in a computer or other device. The computer executable instructions may be stored on a computer readable medium such as a hard disk, optical disk, removable storage media, solid state memory, RAM, etc. As will be appreciated by those skilled in the art, the functionality of the program modules may be combined or distributed as desired in various embodiments. In addition, the functionality may be embodied in whole or in part in firmware or hardware equivalents such as integrated circuits, field programmable gate arrays (FPGA), and the like.
[0143] The present disclosure includes any novel feature or combination of features disclosed herein either explicitly or any generalization thereof. Various modifications and adaptations to the foregoing exemplary embodiments of this disclosure may become apparent to those skilled in the relevant arts in view of the foregoing description, when read in conjunction with the accompanying drawings. However, any and all modifications will still fall within the scope of the non-limiting and exemplary embodiments of this disclosure.