Background Data Transfer Handling
20210337419 · 2021-10-28
Inventors
Cpc classification
H04W28/0247
ELECTRICITY
H04W28/0215
ELECTRICITY
H04L67/60
ELECTRICITY
International classification
Abstract
There is provided a method of operating a server of a first network. The method comprises generating (100) an indication of an action to initiate for handling a transfer of background data from the server to a user equipment if the transfer fails to satisfy one or more conditions of an assigned background data transfer policy for the transfer. The method also comprises transmitting (102) the indication for a node of a second network to acquire the indication and initiate the action if the transfer fails to satisfy the one or more conditions of the assigned background data transfer policy.
Claims
1.-20. (canceled)
21. A method of operating a server of a first network, the method comprising: generating an indication of an action to initiate for handling a transfer of background data from the server to a user equipment if the transfer fails to satisfy one or more conditions of an assigned background data transfer policy for the transfer; and transmitting the indication for a node of a second network to acquire the indication and initiate the action if the transfer fails to satisfy the one or more conditions of the assigned background data transfer policy.
22. A method as claimed in claim 21, the method further comprising: if the transfer fails to satisfy the one or more conditions of the assigned background data transfer policy, receiving a notification from the node that the transfer fails to satisfy the one or more conditions of the assigned background data transfer policy.
23. A server of a first network, the server comprising processing circuitry, wherein the processing circuitry is configured to: generate an indication of an action to initiate for handling a transfer of background data from the server to a user equipment if the transfer fails to satisfy one or more conditions of an assigned background data transfer policy for the transfer; and transmit the indication for a node of a second network to acquire the indication and initiate the action if the transfer fails to satisfy the one or more conditions of the assigned background data transfer policy.
24. A method of operating a node of a second network, the method comprising: receiving, from a server of a first network, a request to transfer background data from the server to a user equipment; acquiring an assigned background data transfer policy for the transfer and an indication generated by the server of an action to initiate for handling the transfer if the transfer fails to satisfy one or more conditions of the assigned background data transfer policy; monitoring the transfer to check whether the transfer satisfies the one or more conditions of the assigned background data transfer policy; and if the transfer fails to satisfy the one or more conditions of the assigned background data transfer policy, initiating the action.
25. A method as claimed in claim 24, wherein the one or more conditions of the assigned background data transfer policy comprise any one or more of: a maximum volume of background data for the transfer; a maximum duration for the transfer; and a predefined area within the second network for the transfer.
26. A method as claimed in claim 25, wherein: the one or more conditions of the assigned background data transfer policy comprise a maximum volume of background data for the transfer; and the action is initiated if the volume of background data for the transfer exceeds the maximum volume.
27. A method as claimed in claim 25, wherein: the one or more conditions of the assigned background data transfer policy comprise a maximum duration for the transfer; and wherein the action is initiated if the duration of the transfer exceeds the maximum duration.
28. A method as claimed in claim 25, wherein: the one or more conditions of the assigned background data transfer policy comprise a predefined area within the second network for the transfer; and the action is initiated if the transfer occurs outside the predefined area within the second network.
29. A method as claimed in claim 24, wherein the action comprises: disallowing the transfer; allowing the transfer only according to one or more conditions of a default background data transfer policy of the node; or allowing the transfer only according to one or more revised conditions of the assigned background data transfer policy, wherein the one or more revised conditions are indicated by the server.
30. A method as claimed in claim 24, the method further comprising: if the transfer fails to satisfy the one or more conditions of the assigned background data transfer policy, transmitting a notification to the server of the first network that the transfer fails to satisfy the one or more conditions of the assigned background data transfer policy.
31. A method as claimed in claim 24, the method further comprising: A method of operating a repository of a second network, the method comprising: transmitting to a repository of the second network the assigned background data transfer policy for a transfer of background data from the server of the first network to the user equipment and the indication generated by the server of an action to initiate for handling the transfer if the transfer fails to satisfy one or more conditions of the assigned background data transfer policy; wherein the assigned background data transfer policy and the indication of the action for a node of the second network to acquire in order to initiate the action if the transfer fails to satisfy the one or more conditions of the assigned background data transfer policy are stored in the repository.
32. A node of a second network, the node comprising processing circuitry, wherein the processing circuitry is configured to: receive, from a server of a first network, a request to transfer background data from the server to a user equipment; acquire an assigned background data transfer policy for the transfer and an indication generated by the server of an action to initiate for handling a transfer if the transfer fails to satisfy one or more conditions of the assigned background data transfer policy; monitor the transfer to check whether the transfer satisfies the one or more conditions of the assigned background data transfer policy; and if the transfer fails to satisfy the one or more conditions of the assigned background data transfer policy, initiate the action.
33. A node as claimed in claim 32, wherein the one or more conditions of the assigned background data transfer policy comprise any one or more of: a maximum volume of background data for the transfer; a maximum duration for the transfer; and a predefined area within the second network (404) for the transfer.
34. A node as claimed in claim 33, wherein: the one or more conditions of the assigned background data transfer policy comprise a maximum volume of background data for the transfer; and the processing circuitry is configured to initiate the action if the volume of background data for the transfer exceeds the maximum volume.
35. A node as claimed in claim 33, wherein: the one or more conditions of the assigned background data transfer policy comprise a maximum duration for the transfer; and the processing circuitry is configured to initiate the action to the user equipment if the duration of the transfer to the user equipment exceeds the maximum duration.
36. A node as claimed in claim 33, wherein: the one or more conditions of the assigned background data transfer policy comprise a predefined area within the second network for the transfer; and the processing circuitry is configured to initiate the action if the transfer occurs outside the predefined area within the second network.
37. A node as claimed in claim 32, wherein the action comprises: disallowing the transfer; allowing the transfer only according to one or more conditions of a default background data transfer policy of the node; or allowing the transfer only according to one or more revised conditions of the assigned background data transfer policy, wherein the one or more revised conditions are indicated by the server.
38. A node as claimed in claim 32, wherein the processing circuitry is further configured to: if the transfer fails to satisfy the one or more conditions of the assigned background data transfer policy, transmit a notification to the server of the first network that the transfer fails to satisfy the one or more conditions of the assigned background data transfer policy.
39. A node as claimed in claim 32, wherein the processing circuitry is further configured to: transmit to a repository of the second network the background data transfer policy assigned for a transfer of background data from the server of the first network to the user equipment and the indication generated by the server of an action to initiate for handling the transfer if the transfer fails to satisfy one or more conditions of the assigned background data transfer policy; wherein the assigned background data transfer policy and the indication of the action for a node of the second network to acquire in order to initiate the action if the transfer fails to satisfy the one or more conditions of the assigned background data transfer policy are stored in the repository.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0031] For a better understanding of the idea, and to show how it may be put into effect, reference will now be made, by way of example, to the accompanying drawings, in which:
[0032]
[0033]
[0034]
[0035]
[0036]
[0037]
[0038]
[0039]
[0040]
[0041]
[0042]
DETAILED DESCRIPTION
[0043] As mentioned earlier, there is described herein an improved mechanism for handling a background data transfer. A background data transfer referred to herein is the transfer of any type of background data. A background data transfer can be defined as a transfer of data in the background. That is, a background data transfer can be any data transfer that occurs without, or irrespective of, user interaction. Background data may refer to non-time critical data that a server (e.g. a service or application of the server) needs to send to a user equipment (UE). The server may have knowledge of the timing for the transmission of background data and the amount of background data for transmission. Examples of background data include, but are not limited to, software upgrades or audio/video data for future use. The background data transfer described herein is from a server of a first network to a user equipment (UE).
[0044]
[0045] As illustrated in
[0046] Briefly, the processing circuitry 12 of the server 10 is configured to generate an indication of an action to initiate for handling a transfer of background data from the server 10 to a user equipment if the transfer fails to satisfy one or more conditions of an assigned background data transfer policy for the transfer. The processing circuitry 12 of the server 10 is also configured to transmit the indication for a node of a second network to acquire the indication and initiate the action if the transfer fails to satisfy the one or more conditions of the assigned background data transfer policy.
[0047] As illustrated in
[0048] The memory 14 of the server 10 can comprise a volatile memory or a non-volatile memory. In some embodiments, the memory 14 of the server 10 may comprise a non-transitory media. Examples of the memory 14 of the server 10 include, but are not limited to, a random access memory (RAM), a read only memory (ROM), a mass storage media such as a hard disk, a removable storage media such as a compact disk (CD) or a digital video disk (DVD), and/or any other memory.
[0049] In some embodiments, as illustrated in
[0050] The processing circuitry 12 of the server 10 may be configured to control the communications interface 16 of the server 10 to transmit to and/or receive from other nodes requests, policies, indications, information, data, notifications, signals, or similar, that are described herein.
[0051] It will be appreciated that
[0052]
[0053] With reference to
[0054] Although not illustrated in
[0055]
[0056] As illustrated in
[0057] Briefly, the processing circuitry 22 of the node 20 is configured to receive, from a server 10 of a first network, a request to transfer background data from the server to a user equipment. The processing circuitry 22 of the node 20 is also configured to acquire an assigned background data transfer policy for the transfer and an indication generated by the server of an action to initiate for handling a transfer if the transfer fails to satisfy one or more conditions of the assigned background data transfer policy. The processing circuitry 22 of the node 20 is further configured to monitor the transfer to check whether the transfer satisfies the one or more conditions of the assigned background data transfer policy and, if the transfer fails to satisfy the one or more conditions of the assigned background data transfer policy, initiate the action.
[0058] As illustrated in
[0059] The memory 24 of the node 20 can comprise a volatile memory or a non-volatile memory. In some embodiments, the memory 24 of the node 20 may comprise a non-transitory media. Examples of the memory 24 of the node 20 include, but are not limited to, a random access memory (RAM), a read only memory (ROM), a mass storage media such as a hard disk, a removable storage media such as a compact disk (CD) or a digital video disk (DVD), and/or any other memory.
[0060] In some embodiments, as illustrated in
[0061] It will be appreciated that
[0062]
[0063] With reference to
[0064] At block 202, an assigned background data transfer policy for the transfer and an indication is generated by the server 10 is acquired. More specifically, the processing circuitry 22 of the node 20 acquires the assigned background data transfer policy and the indication. The indication is of an action to initiate for handling the transfer if the transfer fails to satisfy one or more conditions of the assigned background data transfer policy. In some embodiments, acquiring the assigned background data transfer policy at block 202 can comprise the processing circuitry 22 of the node 20 assigning the background data transfer policy for the transfer. Thus, in some embodiments, the processing circuitry 22 of the node 20 can be configured to assign the background data transfer policy for the transfer. In this way, the node 20 itself may assign the background data transfer policy for the transfer according to some embodiments.
[0065] In other embodiments, another node (e.g. another PCRF or PCF) may assign the background data transfer policy for the transfer. In these embodiments, when the policy is assigned by another node, acquiring the assigned background data transfer policy at block 202 can comprise the processing circuitry 22 of the node 20 retrieving the assigned background data transfer policy from a repository of the second network. For example, the node that assigned the background data transfer policy can be configured to store the assigned background data transfer policy in the repository of the second network. Thus, in some embodiments, the processing circuitry 22 of the node 20 can be configured to retrieve the assigned background data transfer policy from the repository of the second network.
[0066] In some embodiments, the assigned background data transfer policy may be stored in the repository of the second network with a reference that identifies the assigned background data transfer policy (which is referred to as a “Reference ID”). Thus, in some embodiments, the assigned background data transfer policy can be retrieved using this reference. In some embodiments, the processing circuitry 22 of the node 20 can be configured to retrieve the assigned background data transfer policy from the repository of the second network via a network interface, such as the Nt interface where the first and second network are part of an EPC network or 4G network, or the N30 interface where the first and second network are part of a 5G network.
[0067] In some embodiments, acquiring the indication of the action may comprise the processing circuitry 22 of the node 20 retrieving the indication of the action from the repository of the second network. Thus, in some embodiments, the processing circuitry 22 of the node 20 can be configured to retrieve the indication of the action from the repository of the second network. In other embodiments, the request received from the server 10 may comprise the indication of the action.
[0068] Returning back to
[0069] Although not illustrated in
[0070]
[0071] The repository 30 can be configured to store any requests, policies, indications, information, data, notifications, signals, or similar, that are described herein. The processing circuitry 22 of the node 20 may be configured to control the repository 30 to store any requests, policies, indications, information, data, notifications, signals, or similar, that are described herein. The repository 30 can comprise a volatile repository or a non-volatile repository. In some embodiments, the repository 30 may comprise a non-transitory media. Examples of the repository 30 include, but are not limited to, a random access memory (RAM), a read only memory (ROM), a mass storage media such as a hard disk, a removable storage media such as a compact disk (CD) or a digital video disk (DVD), and/or any other memory.
[0072] Briefly, the repository 30 is configured to receive a background data transfer policy assigned for a transfer of background data from a server 10 of a first network to a user equipment and an indication generated by the server 10 of an action to initiate for handling the transfer if the transfer fails to satisfy one or more conditions of the assigned background data transfer policy. The repository 30 is also configured to store the assigned background data transfer policy and the indication of the action for a node 20 of a second network to acquire in order to initiate the action if the transfer fails to satisfy the one or more conditions of the assigned background data transfer policy.
[0073]
[0074] With reference to
[0075] At block 302, the assigned background data transfer policy and the indication of the action is stored for the node 20 of the second network to acquire in order to initiate the action if the transfer fails to satisfy the one or more conditions of the assigned background data transfer policy. More specifically, the repository 30 stores the assigned background data transfer policy and the indication. In some embodiments, the background data transfer policy may be assigned for the transfer by the same node as the node 20 that acquires the policy in order to initiate the action if the transfer fails to satisfy the one or more conditions of the assigned background data transfer policy. In other embodiments, the background data transfer policy may be assigned for the transfer by a different node to the node 20 that acquires the policy in order to initiate the action if the transfer fails to satisfy the one or more conditions of the assigned background data transfer policy.
[0076] The one or more conditions of the assigned background data transfer policy that are referred to herein may, for example, comprise any one or more of a maximum volume of background data for the transfer, a maximum duration (e.g. a set time window) for the transfer, and a predefined area within the second network for the transfer. In some embodiments where the one or more conditions of the assigned background data transfer policy comprise a maximum volume of background data for the transfer, the action may be initiated if the volume of background data for the transfer exceeds the maximum volume. In some embodiments where the one or more conditions of the assigned background data transfer policy comprise a maximum duration (e.g. a set time window) for the transfer, action may be initiated if the duration of the transfer exceeds the maximum duration (e.g. if the transfer continues beyond the set time window). In some embodiments where the one or more conditions of the assigned background data transfer policy comprise a predefined area within the second network 404 for the transfer, the action may initiated if the transfer occurs outside the predefined area within the second network 404. The transfer may, for example, occur outside the predefined area within the second network 404 due to the movement of the user equipment.
[0077] Although some examples have been provided for the one or more conditions of the assigned background data transfer policy and the actions that may be taken if such one or more conditions are not satisfied, it will be understood that the assigned background data transfer policy may comprise any other conditions, or any combination of conditions, and any other corresponding actions.
[0078] In some embodiments, the action referred to herein may comprise disallowing (or terminating) the transfer. In other embodiments, the action referred to herein may comprise allowing the transfer only according to one or more conditions of a default background data transfer policy of the node 20. In yet other embodiments, the action referred to herein may comprise allowing the transfer only according to one or more revised conditions of the assigned background data transfer policy. In some of these embodiments, the one or more revised conditions may be indicated by the server 10. In some embodiments where the server 10 indicates the one or more revised conditions, a default background data transfer policy may also be negotiated with the node 20.
[0079]
[0080] In some embodiments, as illustrated in
[0081] In some embodiments, as also illustrated in
[0082] As illustrated in
[0083] Although not illustrated in the figures, the background data transfer described herein can be via a network interface. In embodiments where the first and second networks 402, 404 are part of an evolved packet core (EPC) or a 4G network, the background data transfer can be via the Rx interface. In embodiments where the first and second networks are part of a 5G network, the background data transfer can be via the N5 interface.
[0084] Although it has been described herein that “an” assigned background data transfer policy is acquired by the node 20, it will be understood that, in some embodiments, a plurality of assigned background data transfer policies may be acquired by the node 20. In some of these embodiments, the processing circuitry 22 of the node 20 may be configured to select an assigned background data transfer policy of the plurality of assigned background data transfer policies. In some embodiments, the server 10 may indicate to the node 20 which assigned background data transfer policy of the plurality of assigned background data transfer policies the node 20 is to select. In other words, the server 10 can select an assigned background transfer policy from the plurality of background data transfer policies according to some embodiments. Thus, in these embodiments, the node 20 can be configured to select the assigned background data transfer policy that is indicated by the server 10.
[0085]
[0086] Firstly, the server 10 of the first network 402 generates an indication of an action to initiate for handling a transfer of background data from the server 10 to a user equipment if the transfer fails to satisfy one or more conditions of an assigned background data transfer policy for the transfer. The server 10 transmits the indication for the node 20 of the second network 404 to acquire the indication and initiate the action if the transfer fails to satisfy the one or more conditions of the assigned background data transfer policy.
[0087] With reference to
[0088] Following the transmission of the BDT request 800 comprising the indication, the BDT request 800 is received by the exposure node 40 and, at block 802, the exposure node 40 authorizes the BDT request 800. The exposure node 40 then contacts the node 20. Thus, in some embodiments, the node 20 receives the BDT request 800 from the server 10 via the exposure node 40. However, it will be understood that in other embodiments, the node 20 may receive the BDT request 800 directly from the server 10. As mentioned earlier, according to the example embodiment illustrated in
[0089] When the node 20 receives the BDT request 800, at block 804, the node 20 acquires an assigned background data transfer policy for the transfer. According to the example embodiment illustrated in
[0090] Also, at block 804, the node 20 transmits the assigned background data transfer policy to the server 10. In some embodiments, such as that illustrated in
[0091] In embodiments where a plurality of assigned background data transfer policies are transmitted to the server 10, as mentioned earlier, the server 10 can select an assigned background transfer policy from the plurality of background data transfer policies. In some of these embodiments, such as that illustrated in
[0092] At block 812, the exposure node 40 forwards the BDT request 800 (or the further BDT request 808 according to some embodiments) to the node 20. The BDT request 800 (or the further BDT request 808 according to some embodiments) can be forwarded to the node 20 according to current policy and charging control (PCC) procedures. In some embodiments, the node 20 can be configured to store, in the repository 30 of the second network 404, the assigned background data transfer policy (or the selected one of the plurality of assigned background transfer policies according to some embodiments) and the indication of the action.
[0093] At block 814, when the server 10 wishes to initiate the transfer of background data from the server 10 to the user equipment, the server 10 contacts the node 20, e.g. via the exposure node 40. The server 10 may contact the node 20 according to current policy and charging control (PCC) procedures. The server 10 may contact the node 20 via a network interface, e.g. the Rx interface where the first and second network 402, 404 are part of an evolved packet core (EPC) or a 4G network, or the N5 interface where the first and second network 402, 404 are part of a 5G network. In some embodiments, the server 10 may contact the node 20 with a reference that identifies the assigned background data transfer policy (or the selected one of the plurality of assigned background transfer policies according to some embodiments). The node 20 acquires the assigned background data transfer policy (or the selected one of the plurality of assigned background transfer policies according to some embodiments) and the indication of the action to initiate for handling the transfer if the transfer fails to satisfy one or more conditions of the assigned background data transfer policy in the manner described earlier. In some embodiments, the node 20 may install policy and charging control (PCC) rules according to the one or more conditions of the assigned background data transfer policy.
[0094] The node 20 starts the monitoring of the transfer at block 814 to check whether the transfer satisfies the one or more conditions of the assigned background data transfer policy. Thus, in effect, the node 20 monitors the one or more conditions of the background data transfer policy. In some embodiments, the node 20 may subscribe to events in the enforcement or management node 50 of the second network 404 to receive information from the enforcement or management node 50 for use in checking whether the transfer satisfies the one or more conditions of the assigned background data transfer policy. The information may, for example, comprise usage reports, user equipment location changes, of any other information, or any combination of information, that can be used to check whether the transfer satisfies the one or more conditions of the assigned background data transfer policy. If the transfer fails to satisfy the one or more conditions of the assigned background data transfer policy (e.g. if the node 20 identifies that the one or more conditions are not fulfilled), the node 20 checks the action to initiate and then initiates the action. The one or more conditions may be any of those described earlier.
[0095] In some embodiment, if the transfer fails to satisfy the one or more conditions of the assigned background data transfer policy, the action may comprise disallowing (or terminating) the transfer. Thus, the node 20 disallows (or terminates) the transfer in these embodiments, e.g. via the network interface mentioned earlier. The node 20 may also remove the installed policy and charging control (PCC) rules in these embodiments. In other embodiments, if the transfer fails to satisfy the one or more conditions of the assigned background data transfer policy, the action may comprise allowing the transfer only according to one or more conditions of a default background data transfer policy of the node 20. In these embodiments, the node 20 may check the default background data transfer policy and modify the installed PCC rules according to the one or more conditions of the default background data transfer policy. In yet other embodiments, if the transfer fails to satisfy the one or more conditions of the assigned background data transfer policy, the action may comprise allowing the transfer only according to one or more revised conditions of the assigned background data transfer policy. In these embodiments, the node 20 may modify the installed PCC rules according to the one or more revised conditions of the assigned background data transfer policy. In some embodiments where the PCC rules are modified, the node 20 may apply a different charging for the modified PCC rules.
[0096] In some embodiments, at block 814, the node 20 may transmit to the server 10 a notification that the transfer fails to satisfy the one or more conditions of the assigned background data transfer policy. In some embodiments, the node 20 may transmit the notification to the exposure node 40 and the exposure node 40 may then notify the server 10 that the transfer fails to satisfy the one or more conditions of the assigned background data transfer policy.
[0097]
[0098]
[0099]
[0100] The network functionality described herein can be performed by hardware. Thus, the network 400, 402, 404 can be a hardware network. For example, the server 10, 900 can be a hardware server, the node 20, 1000 can be a hardware node, the repository 30, 1100 can be a hardware repository, the exposure node 40 can be a hardware exposure node, and/or the enforcement or management node 50 can be a hardware enforcement or management node.
[0101] However, it will also be understood that at least part or all of the network functionality described herein can be virtualized. For example, the functions performed within the network 400, 402, 404 (e.g. by any one or more of the server 10, 900, the node 20, 1000, the repository 30, 1100, the exposure node 40, and enforcement or management node 50) can be implemented in software running on generic hardware that is configured to orchestrate the network functionality. Thus, in some embodiments, the network 400, 402, 404 can be a virtual network. In these embodiments, the server 10, 900 can be a virtual server, the node 20, 1000 can be a virtual node, the repository 30, 1100 can be a virtual repository, the exposure node 40 can be a virtual exposure node, and/or the enforcement or management node 50 can be a virtual enforcement or management node. In some embodiments, at least part or all of the network functionality described herein may be performed in a network enabled cloud.
[0102] There is also provided a computer program product comprising a carrier containing instructions for causing processing circuitry to perform at least part of the method described herein. In some embodiments, the carrier can be any one of an electronic signal, an optical signal, an electromagnetic signal, an electrical signal, a radio signal, a microwave signal, or a computer-readable storage medium.
[0103] Thus, in the manner described herein, it is possible to negotiate and make use of a transfer policy that allows a server to transfer background data to a user equipment under certain conditions. Moreover, appropriate action is taken when it is determined that one or more of these conditions are broken to advantageously enable an optimum background data transfer. There is thus advantageously provided herein an improved mechanism for handling a background data transfer.
[0104] It should be noted that the above-mentioned embodiments illustrate rather than limit the idea, and that those skilled in the art will be able to design many alternative embodiments without departing from the scope of the appended claims. The word “comprising” does not exclude the presence of elements or steps other than those listed in a claim, “a” or “an” does not exclude a plurality, and a single processor or other unit may fulfil the functions of several units recited in the claims. Any reference signs in the claims shall not be construed so as to limit their scope.