Methods and Apparatuses for Event Reporting
20230016327 · 2023-01-19
Inventors
Cpc classification
H04W52/0216
ELECTRICITY
H04W68/005
ELECTRICITY
H04W76/28
ELECTRICITY
H04W92/14
ELECTRICITY
Y02D30/70
GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
International classification
Abstract
Methods and apparatuses for event reporting are disclosed. According to an embodiment, an access and mobility management function (AMF) entity detects a status of a terminal device changing from unreachable to reachable and sends, to a first entity, a report indicating that the terminal device is reachable. The report contains a maximum availability time until which the terminal device is expected to be reachable.
Claims
1-28. (canceled)
29. A method performed by a network node implementing an access and mobility management function (AMF) entity, the method comprising: detecting a status of a terminal device changing from unreachable to reachable; and sending, to a unified data management (UDM) entity, a report indicating that the terminal device is reachable, wherein the report contains a maximum availability time until which the terminal device is expected to be reachable, wherein the maximum availability time is derived based on a power saving configuration of the terminal device and wherein the power saving configuration of the terminal device comprises one or more of: at least one parameter about extended connected time for mobile initiated connection only (MICO) mode; at least one parameter about active time for MICO mode; and at least one parameter about periodic registration timer control for MICO mode.
30. The method of claim 29, wherein the maximum availability time indicates an absolute time point.
31. The method of claim 29, further comprising: receiving, from a second entity, a subscription request for event reporting about reachability of the terminal device; and wherein the report is sent based on the subscription request.
32. The method of claim 29, wherein the maximum availability time is derived by: determining a time period during which the terminal device is to keep reachable after the status of the terminal device changes from unreachable to reachable; and determining, as the maximum availability time, current time plus a length of the time period.
33. The method of claim 31, wherein the second entity is one of a unified data management (UDM) entity, a network exposure function (NEF) entity, a network data analytics function (NWDAF) entity, and a session management function (SMF) entity.
34. A method performed by a network node implementing a unified data management (UDM) entity, the method comprising: receiving, from an access and mobility management function (AMF) entity, a first report indicating that a terminal device is reachable, wherein the first report contains a maximum availability time until which the terminal device is expected to be reachable; and sending, to a network exposure function (NEF) entity, a second report indicating that the terminal device is reachable, wherein the second report contains the maximum availability time, wherein the maximum availability time is derived based on a power saving configuration of the terminal device and wherein the power saving configuration of the terminal device comprises one or more of: at least one parameter about extended connected time for mobile initiated connection only (MICO) mode; at least one parameter about active time for MICO mode; and at least one parameter about periodic registration timer control for MICO mode.
35. The method of claim 34, further comprising: sending, to the AMF entity, a first subscription request for event reporting about reachability of the terminal device, in response to a trigger event indicating that event reporting about reachability of the terminal device is required by the NEF entity.
36. The method of claim 35, wherein the trigger event is at least one of: receiving, from a short message service gateway mobile services switching center (SMS-GMSC), a message indicating that an SMS delivery for the terminal device fails; and receiving, from the NEF entity, a second subscription request for event reporting about reachability of the terminal device.
37. A method performed by a network node implementing a network exposure function (NEF) entity, the method comprising: receiving, from a unified data management (UDM) entity or an access and mobility management function (AMF) entity, a first report indicating that a terminal device is reachable, wherein the first report contains a maximum availability time until which the terminal device is expected to be reachable; and sending, to a service consumer, a second report indicating that the terminal device is reachable, wherein the second report contains the maximum availability time, wherein the maximum availability time is derived based on a power saving configuration of the terminal device and wherein the power saving configuration of the terminal device comprises one or more of: at least one parameter about extended connected time for mobile initiated connection only (MICO) mode; at least one parameter about active time for MICO mode; and at least one parameter about periodic registration timer control for MICO mode.
38. The method of claim 37, further comprising: receiving, from the service consumer, a first subscription request for event reporting about reachability of the terminal device; and sending, to the UDM entity, a second subscription request for event reporting about reachability of the terminal device.
39. A method performed by a network node implementing a service consumer, the method comprising: receiving, from a service provider, one or more reports indicating that one or more terminal devices are reachable, wherein each of the one or more reports contains a maximum availability time until which a terminal device is expected to be reachable; and sending one or more messages to the one or more terminal devices based on the maximum availability times of the one or more terminal devices, wherein the maximum availability time is derived based on a power saving configuration of the terminal device and wherein the power saving configuration of the terminal device comprises one or more of: at least one parameter about extended connected time for mobile initiated connection only (MICO) mode; at least one parameter about active time for MICO mode; and at least one parameter about periodic registration timer control for MICO mode.
40. The method of claim 39, wherein a plurality of reports indicating that a plurality of terminal devices are reachable are received; and wherein a plurality of messages are sent to the plurality of terminal devices by ordering the messages based on the maximum availability times of the plurality of terminal devices.
41. The method of claim 40, wherein the messages are ordered in an ascending order of the maximum availability times of the plurality of terminal devices; and wherein the messages are sent to the plurality of terminal devices in the ascending order of the maximum availability times.
42. The method of claim 39, wherein the one or more messages are short message service, SMS, messages or the one or more messages are used for non-Internet protocol (non-IP) data delivery (NIDD).
43. The method of claim 39, wherein the service provider is one of: a unified data management (UDM) entity, a network exposure function (NEF) entity, an access and mobility management function (AMF) entity and a session management function (SMF) entity; and/or wherein the service consumer is one of: a short message service (SMS) entity, an application function (AF) entity, a service capability server (SCS) entity, an application server (AS) entity, a network exposure function (NEF) entity, an SMF entity and a user plane function (UPF) entity.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0055] These and other objects, features and advantages of the disclosure will become apparent from the following detailed description of illustrative embodiments thereof, which are to be read in connection with the accompanying drawings.
[0056]
[0057]
[0058]
[0059]
[0060]
[0061]
[0062]
[0063]
[0064]
[0065]
[0066]
[0067]
[0068]
[0069]
[0070]
[0071]
[0072]
DETAILED DESCRIPTION
[0073] For the purpose of explanation, details are set forth in the following description in order to provide a thorough understanding of the embodiments disclosed. It is apparent, however, to those skilled in the art that the embodiments may be implemented without these specific details or with an equivalent arrangement.
[0074] The Subscribe service operation is invoked by a network function (NF) service consumer, e.g. NEF, towards the AMF, when it needs to create a subscription to monitor at least one event relevant to the AMF. The NF service consumer may subscribe to multiple events in a subscription. A subscription may be associated with one UE, a group of UEs or any UE. The NF service consumer shall request to create a new subscription by using hypertext transfer protocol (HTTP) method POST with uniform resource identifier (URI) of the subscriptions collection, see section 6.2.3.2 of 3GPP TS 29.518 V16.1.1. More details about the event subscription from AMF can be obtained from section 5.3.2.2.2 of TS 29.518.
[0075] The Notify service operation is invoked by the AMF, to send a notification, towards the notification URI, when certain event included in the subscription has taken place. The AMF shall use the HTTP method POST, using the notification URI received in the subscription creation as specified in section 5.3.2.2.2 of TS 29.518, including e.g. the subscription identifier (ID), Event ID(s) for which event has happened, notification correlation ID provided by the NF service consumer at the time of event subscription, to send a notification. Additionally, the Notify service operation shall also be invoked by the AMF, when there is a change of AMF during UE mobility procedures and if the subscription Id changes (i.e. Registration procedures and Handover procedures). Table 6.2.6.2.4-1 and Table 6.2.6.2.5-1 of TS 29.518 show the definitions of data structures AmfEventNotification and AmfEventReport used for AMF event notification. More details about the AMF event notification can be obtained from section 5.3.2.4 of TS 29.518.
[0076] FIG. 5.5.2.2.2-1 of 3GPP TS 29.503 V16.1.0 shows a scenario where the NF service consumer sends a request to the UDM to subscribe to notifications of event occurrence. The request contains a callback URI, the type of event that is monitored and additional information e.g. event filters and reporting options. More details can be obtained from section 5.5.2.2.2 of TS 29.503.
[0077] FIG. 5.5.2.4.2-1 of TS 29.503 shows a scenario where the UDM notifies the NF service consumer (that has subscribed to receive such notification) about occurrence of an event. The request contains the callbackReference URI as previously received in the EeSubscription (see section 6.4.6.2.2 of TS 29.503). Table 6.4.6.2.4-1 and Table 6.4.6.2.12-1 of TS 29.503 show the definitions of data structures MonitoringReport and ReachabilityForSmsReport used for UDM event notification. More details can be obtained from section 5.5.2.4.2 of TS 29.503.
[0078] High latency communication may be used to handle MT communication with UEs being unreachable while using power saving functions as described hereinbefore. “High latency” refers to the initial response time before normal exchange of packets is established. That is, the time it takes before a UE has woken up from its power saving state and responded to an initial downlink packet or signal.
[0079] High latency data communication is supported by extended buffering of downlink data in the AF or user plane function (UPF) or session management function (SMF) or NEF when a UE is using power saving function in CM-IDLE and not reachable. In addition, high latency SMS communication is supported by buffering of mobile terminated SMS (MT-SMS) in the SMS service center (SMS-SC) when a UE is using power saving function and not reachable.
[0080] UE reachability indicates when the UE becomes reachable for sending either SMS or downlink data to the UE, which is detected in response to the UE's transition to CM-CONNECTED mode (for a UE using power saving mode or extended idle mode DRX) or when the UE will become reachable for paging (for a UE using extended idle mode DRX). This monitoring event supports UE reachability for SMS and reachability for data. Only a one-time monitoring request for reachability for SMS is supported.
[0081] For high latency data communication, AF or UPF or SMF or NEF should serve multiple subscribers. So extended buffering of downlink data in the AF or UPF or SMF or NEF could be for multiple UEs. In addition, for high latency SMS communication, the SMS-SC should serve multiple subscribers, so the buffered SMS messages in SMS-SC could be for multiple UEs.
[0082] However, in the prior art, the UE reachability report described hereinbefore does not contain information about how long the UE could keep available after wakeup before entering into sleep mode again. As a result, if there are multiple SMS messages or extended data buffered for different UEs, it is not possible for the service entities (e.g. the SMS-SC for SMS communication, the AF or UPF or SMF or NEF for data delivery) to prioritize the SMS or data delivery for different UEs. The worst case would be that certain UEs will never get chance to receive the message from the service entities.
[0083] The present disclosure proposes an improved solution for event reporting. Hereinafter, the solution will be described in detail with reference to
[0084]
[0085] Note that within the context of this disclosure, the term terminal device (or UE) used herein may also be referred to as, for example, access terminal, mobile station, mobile unit, subscriber station, or the like. It may refer to any (a stationary or mobile) end device that can access a wireless communication network and receive services therefrom. By way of example and not limitation, the UE may include a portable computer, an image capture terminal device such as a digital camera, a gaming terminal device, a music storage and playback appliance, a mobile phone, a cellular phone, a smart phone, a tablet, a wearable device, a personal digital assistant (PDA), an integrated or embedded wireless card, an externally plugged in wireless card, or the like.
[0086] In an Internet of things (IoT) scenario, a terminal device (or UE) may represent a machine or other device that performs monitoring and/or measurements, and transmits the results of such monitoring and/or measurements to another terminal device (or UE) and/or a network equipment. In this case, the terminal device (or UE) may be a machine-to-machine (M2M) device, which may, in a 3GPP context, be referred to as a machine-type communication (MTC) device. Particular examples of such machines or devices may include sensors, metering devices such as power meters, industrial machineries, bikes, vehicles, or home or personal appliances, e.g. refrigerators, televisions, personal wearables such as watches, and so on.
[0087] As used herein, the term “communication system” refers to a system following any suitable communication standards, such as the first generation (1G), 2G, 2.5G, 2.75G, 3G, 4G, 4.5G, 5G communication protocols, and/or any other protocols either currently known or to be developed in the future. Furthermore, the communications between a terminal device and a network node in the communication system may be performed according to any suitable generation communication protocols, including, but not limited to, 1G, 2G, 2.5G, 2.75G, 3G, 4G, 4.5G, 5G communication protocols, and/or any other protocols either currently known or to be developed in the future. In addition, the specific terms used herein do not limit the present disclosure only to the communication system related to the specific terms, which however can be more generally applied to other communication systems.
[0088]
[0089] As an example, the first entity may be a UDM entity or an NEF entity, which may be indicated as a destination entity in a subscription request received from the UDM entity. As another example, the first entity may be an SMF entity, which may be indicated as a destination entity in a subscription request received from the SMF entity. In the above examples, the report may be directly sent to the UDM entity or the NEF entity or the SMF entity. Other examples of the first entity may include, but not limited to, an AF entity, an SMS entity (e.g. SMS-SC), an SCS entity, an AS entity and a UPF entity. In this case, the report may be sent to the AF entity or the SMS entity or the SCS/AS entity indirectly via the UDM entity or the NEF entity, or may be sent to the UPF entity indirectly via the SMF entity. As a result, the maximum availability time may be used by the first entity (e.g. the AF entity, the SMS entity, the SCS/AS entity, the SMF entity, the UPF entity, or the NEF entity) to prioritize delivering of messages.
[0090] For example, the AMF entity may derive the maximum availability time by performing blocks 408 and 410. At block 408, the AMF entity determines a time period during which the terminal device is to keep reachable after the status of the terminal device changes from unreachable to reachable. For example, the time period may be determined based on a power saving configuration of the terminal device. The power saving configuration of the terminal device may include, but not limited to, one or more of: at least one parameter about extended connected time for MICO mode; at least one parameter about active time for MICO mode; and at least one parameter about periodic registration timer control for MICO mode. At block 410, the AMF entity determines, as the maximum availability time, current time plus a length of the time period. The current time may refer to the time point at which the status of the terminal device is detected as having changed from unreachable to reachable. Thus, the determined maximum availability time may indicate an absolute time point. It is also possible that the maximum availability time may be represented in any other suitable form.
[0091]
[0092]
[0093] As an example, the third entity may be an SMS entity (e.g. SMS interworking mobile services switching center simply referred to as SMS-IWMSC) or an NEF entity. In this case, the second report may be directly sent to the SMS entity or the NEF entity. Other examples of the third entity may include, but not limited to, an AF entity, another SMS entity (e.g. SMS-SC), an SCS entity and an AS entity. In this case, the second report may be sent to such entity indirectly via the SMS entity or the NEF entity.
[0094]
[0095]
[0096]
[0097]
[0098] At block 904, the service consumer sends one or more messages to the one or more terminal devices based on the maximum availability times of the one or more terminal devices. For example, the one or more messages may be SMS messages or may be used for non-IP data delivery (NIDD). In the above first case, since the maximum availability time of the terminal device is known, as long as the time permits, the service consumer may send one or more messages to the terminal device as needed. In the above second case, the service consumer may send a plurality of messages to the plurality of terminal devices by ordering the messages based on the maximum availability times of the plurality of terminal devices. For example, the messages may be ordered in an ascending order of the maximum availability times of the plurality of terminal devices. Accordingly, the messages may be sent to the plurality of terminal devices in the ascending order of the maximum availability times.
[0099]
[0100] At step 1, a plurality of UEs, especially cellular IoT based, are working in power saving enhanced modes, for example, PSM mode. Suppose at this point, a series of UEs, UE1, UE2, . . . , UEn are in sleep state. Their subscription permanent identifiers (SUPIs) and generic public subscriber identifier (GPSIs) are denoted as SUPI1, SUPI2, . . . , SUPn and GPSI1, GPSI2, . . . , GPSIn respectively.
[0101] At step 2, a short message needs to be delivered to UE1 as the receiver. The SMS-SC initiates the MT-SMS delivery procedure to deliver the short message to UE1 through the SMSF and the AMF by SMS over 5G NAS. At step 3, the AMF detects that UE1 is sleeping, so a SMS delivery report is sent back to the SMS-SC through the SMSF and the SMS-GMSC, with a failure indication of failed SMS delivery and the failure reason is absent subscriber. At step 4, upon the receipt of the SMS delivery report with the failure and failure reason indication, the SMS-GMSC also reports the SMS delivery status to the UDM, with failure indication and the failure reason is absent subscriber.
[0102] At step 5, the UDM subscribes the UE reachability for SMS event report from the AMF through Namf_EventExposure_Subscribe request. The UE identity is also contained in the message, i.e. SUPI of UE1, denoted as SUPI1 in the figure. At step 6, the AMF accepts the event subscription request and responds to the UDM.
[0103] Steps 7-11 describe below are a repeating procedure of steps 2-6 but are for MT-SMS delivery to UE2/SUPI2. At step 7, a short message needs to be delivered to UE2 as the receiver. The SMS-SC initiates the MT-SMS delivery procedure to deliver the short message to UE2 through the SMSF and the AMF by SMS over 5G NAS. At step 8, the AMF detects that UE2 is sleeping, so a SMS delivery report is sent back to the SMS-SC through the SMSF and the SMS-GMSC, with a failure indication of failed SMS delivery and the reason is absent subscriber. At step 9, upon the receipt of the SMS delivery report with the failure and failure reason indication, the SMS-GMSC also reports the SMS delivery status to the UDM, with failure indication and the reason is absent subscriber. At step 10, the UDM subscribes the UE reachability for SMS event report from the AMF through Namf_EventExposure_Subscribe request. The UE identity is also contained in the message, i.e. SUPI of UE2, denoted as SUPI2 in the figure. At step 11, the AMF accepts the event subscription request and responds to the UDM.
[0104] Steps 12-16 describe below are a repeating procedure of steps 2-6 but are for MT-SMS delivery to UEn/SUPIn. At step 12, a short message needs to be delivered to UEn as the receiver. The SMS-SC initiates the MT-SMS delivery procedure to deliver the short message to UEn through the SMSF and the AMF by SMS over 5G NAS. At step 13, the AMF detects that UEn is sleeping, so a SMS deliver report is sent back to the SMS-SC through the SMSF and the SMS-GMSC, with a failure indication of failed SMS delivery and the failure reason is absent subscriber. At step 14, upon the receipt of the SMS delivery report with the failure and failure reason indication, the SMS-GMSC also reports the SMS delivery status to the UDM, with failure indication and the failure reason is absent subscriber. At step 15, the UDM subscribes the UE reachability for SMS event report from the AMF through Namf_EventExposure_Subscribe request. The UE identity is also contained in the message, i.e. SUPI of UEn, denoted as SUPIn in the figure. At step 16, the AMF accepts the event subscription request and responds to the UDM.
[0105] At step 17, UE1 wakes up from sleeping and contacts the network for pending messages. At step 18, the AMF notifies the UDM by the Namf_EventExposure_Notify interface that UE1 is reachable for SMS, and with the max availability time until that time point UE will keep active, for example after 30 seconds. In order to provide the max availability time, standardization update may be needed for the event reporting with max UE availability time. Table 1 below shows the updated message exchanged between the AMF and the UDM in order to provide the max availability time.
TABLE-US-00001 TABLE 1 Definition of type AmfEventReport (updates compared to Table 6.2.6.2.5-1 of TS 29.518 is underlined) Attribute name Data type P Cardinality Description type AmfEventType M 1 Describes the type of the event which triggers the report state AmfEventState M 1 Describes the state of the event which triggered the report. This IE shall be set to “TRUE” when subscriptionId IE is present. timeStamp DateTime M 1 This IE shall contain the time at which the event is generated. subscriptionId Uri C 0 . . . 1 This IE shall be included when the event notification is for informing the creation of a subscription Id at the AMF during mobility of a UE across AMFs. When present, this IE shall contain the URI of the created subscription resource at the AMF. The type IE shall be set to: SUBSCRIPTION_ID_CHANGE, when the AMFcreates a subscription Id for a UE specific event subscription during mobility registration and handover procedures involving an AMF change. SUBSCRIPTION_ID_ADDITION, when the AMF creates a subscription Id for a group Id specific event subscription during mobility registration and handover procedures involving an AMF change. anyUe boolean C 0 . . . 1 This IE shall be included and shall be set to “true”, if the event subscription is a bulk subscription for number of UEs and the event reported is for one of those UEs. supi Supi C 0 . . . 1 This IE shall be present if available. When present, this IE identifies the SUPI of the UE associated with the report (NOTE). areaList array(AmfEventArea) C 1 . . . N This IE shall be present when the AMF event type is “PRESENCE_IN_AOI_REPORT”. When present, this IE represents the specified Area(s) of Interest the UE is currently IN/OUT/UNKNOWN. refId ReferenceId C 0 . . . 1 This IE shall be present if a Reference Id has previously been associated with the event triggering the report. When present, this IE shall indicate the Reference Id associated with the event which triggers the report. gpsi Gpsi C 0 . . . 1 This IE shall be present if available. When present, this IE identifies the GPSI of the UE associated with the report (NOTE). pei Pei O 0 . . . 1 This IE may be included if the event reported is for a particular UE or any UE. This IE identifies the PEI of the UE associated with the report (NOTE). location UserLocation O 0 . . . 1 Represents the location information of the UE timezone TimeZone O 0 . . . 1 Describes the time zone of the UE accessTypeList array(AccessType) O 1 . . . N Describes the access type(s) of the UE rmInfoList array(RmInfo) O 1 . . . N Describes the registration management state of the UE cmInfoList array(CmInfo) O 1 . . . N Describes the connectivity state of the UE reachability UeReachability O 0 . . . 1 Describes the reachability of the UE maxAvail- DateTime O 0 . . . 1 Indicates the time (in UTC) until which the UE is abilityTime expected to be reachable. Only could be present for REACHABILITYREPORT and UeReachability is REACHABLE. This IE may be used by the SMS Center to prioritize the retransmission of Short Message to UEs using a power saving mechanism. commFailure CommunicationFailure O 0 . . . 1 Describes a communication failure for the UE. numberOfUes integer O 0 . . . 1 Represents the number of UEs in the specified area 5gsUserStateList array(5GsUserStateInfo) O 1 . . . N Represents the 5GS User State of the UE per access type NOTE: If the event report corresponds to an event subscription of a single UE, then the same UE identifier (i.e. SUPI and/or GPSI and/or PEI) received during subscription creation shall be included in the report. If the event report corresponds to an event subscription for group of UEs or any UE, then the SUPI and if available the GPSI shall be included in the event report. SUPI, PEI and GPSI shall not be present in report for UES_IN_AREA_REPORT event type.
[0106] At step 19, when receiving the reachability notification from the AMF, the UDM alerts the SMS-SC to deliver the pending SMS also with the max UE availability time. At step 20, the SMS-SC triggers the MT-SMS delivery. As the max UE availability time is available, the SMS-SC could have enhanced schedule mechanism, for example hold a bit of time instead of delivering it immediately.
[0107] At step 21, UE2 wakes up from sleeping and contacts the network for pending messages. At step 22, the AMF notifies the UDM by the Namf_EventExposure_Notify interface that UE2 is reachable for SMS, and also with the max availability time until that time point UE will keep active, for example after 10 seconds. The update as described in step 18 is used to provide the max availability time in the event report. At step 23, when receiving the reachability notification from the AMF, the UDM alerts the SMS-SC to deliver the pending SMS also with the max availability time. At step 24, the SMS-SC triggers the MT-SMS redelivery. As the max availability time is available, the SMS-SC could have enhanced schedule mechanism, for example hold a bit of time instead of delivering it immediately.
[0108] At step 25, UEn wakes up from sleeping and contacts the network for pending messages. At step 26, the AMF notifies the UDM by the Namf_EventExposure_Notify interface that UEn is reachable for SMS, and with the max UE availability time until that time point UE will keep active, for example after 1 minute. The update as described in step 18 is used to provide the max availability time in the event report. At step 27, when receiving the reachability notification from the AMF, the UDM alerts the SMS-SC to deliver the pending SMS also with the max availability time. At step 28, the SMS-SC triggers the MT-SMS redelivery. As the max availability time is available, the SMS-SC could have enhanced schedule mechanism, for example hold a bit of time instead of delivering it immediately.
[0109] At step 29, the SMS-SC based on the max availability time to prioritize the delivery of the SMS in the order of UE availability time to be expired. For example, suppose the alert messages were received almost the same time. Then, MT-SMS to UE2 is prioritized over MT-SMS to UE1 as UE2 will keep wakeup for a shorter time period than UE1. Similarly, MT-SMS to UE1 is prioritized over MT-SMS to UEn as UE1 will keep wakeup for a shorter time period than UEn. At step 30, MT-SMS deliver to UE2 succeeds. At step 31, MT-SMS deliver to UE1 succeeds. At step 32, MT-SMS deliver to UEn succeeds.
[0110] Steps 29-32 show the optimized MT-SMS delivery schedule to ensure the message deliver efficiency. Without the update described above, the SMS-SC cannot prioritize the MT-SMS delivery based on the max availability time. It is more prone that MT-SMS to UE2 could be failed again if UE2 enter into sleep mode again before the SMS-SC schedules the SMS delivery to UE2.
[0111]
[0112] At step 1, a plurality of UEs, especially cellular IoT based, are working in power saving enhanced modes, for example, PSM mode. Suppose at this point, a series of UEs, UE1, UE2, . . . , UEn are in sleep state. Their SUPIs and GPSIs are denoted as SUPI1, SUPI2, . . . , SUPn and GPSI1, GPSI2, . . . , GPSIn respectively.
[0113] At step 2, an application service that UE1 has subscribed has NIDD data to be delivered to UE1 as the receiver. The AF triggers the NIDD data delivery procedure to UE1 through the NEF, the SMF and the AMF by control plane (CP) optimized IoT NIDD data delivery. At step 3, the AMF detects that UE1 is in sleep mode and unreachable for data delivery and a failure report is sent back to the AF through the SMF and the NEF, with a failure indication of failed NIDD data delivery and the failure reason is absent subscriber.
[0114] At step 4, upon the receipt of the NIDD data delivery report with the failure indication and failure reason indication of absent subscriber, the AF subscribes the UE reachability for DATA event report from the NEF through Nudm_EventExposure_Subscribe request. The UE identity is also contained in the message, i.e. SUPI/GPSI of UE1, denoted as SUPI1/GPSI1 in the figure. The NEF subscribes the UE reachability for DATA report from the UDM through Nudm_EventExposure_Subscribe request. The UE identity is also contained in the message, i.e. SUPI/GPSI of UE1, denoted as SUPI1/GPSI1 in the figure. The UDM subscribes the UE reachability for DATA report from the AMF through Namf_EventExposure_Subscribe request. The UE identity is also contained in the message, i.e. SUPI/GPSI of UE1, denoted as SUPI1/GPSI1 in the figure. At step 5, the AMF/UDM/NEF accepts the event subscription request and responds to UDM/NEF/AF correspondingly.
[0115] Steps 6-9 described below are a repeating procedure of steps 2-5 but are for NIDD data delivery to UE2. At step 6, an application service that UE2 has subscribed has NIDD data to be delivered to UE2 as the receiver. The AF triggers the NIDD data delivery procedure to UE2 through the NEF, the SMF and the AMF by CP optimized IoT NIDD data delivery. At step 7, the AMF detects that UE2 is in sleep mode and unreachable for data delivery and a failure report is sent back to the AF through the SMF and the NEF, with a failure indication of failed NIDD data delivery and the failure reason is absent subscriber.
[0116] At step 8, upon the receipt of the NIDD data delivery report with the failure indication and failure reason indication of absent subscriber, the AF subscribes the UE reachability for DATA event report from the NEF through Nudm_EventExposure_Subscribe request. The UE identity is also contained in the message, i.e. SUPI/GPSI of UE2, denoted as SUPI2/GPSI2 in the figure. The NEF subscribes the UE reachability for DATA event report from the UDM through Nudm_EventExposure_Subscribe request. The UE identity is also contained in the message, i.e. SUPI/GPSI of UE2, denoted as SUPI2/GPSI2 in the figure. The UDM subscribes the UE reachability for DATA report from the AMF through Namf_EventExposure_Subscribe request. The UE identity is also contained in the message, i.e. SUPI/GPSI of UE2, denoted as SUPI2/GPSI2 in the figure. At step 9, the AMF/UDM/NEF accepts the event subscription request and responds to the UDM/NEF/AF correspondingly.
[0117] Steps 10-13 described below are a repeating procedure of steps 2-5 but are for NIDD data delivery to UEn. At step 10, an application service that UEn has subscribed has NIDD data to be delivered to UEn as the receiver. The AF triggers the NIDD data delivery procedure to UEn through the NEF, the SMF and the AMF by CP optimized IoT NIDD data delivery. At step 11, the AMF detects that UEn is in sleep mode and unreachable for data delivery and a failure report is sent back to the AF through the SMF and the NEF, with a failure indication of failed NIDD data delivery and the failure reason is absent subscriber.
[0118] At step 12, upon the receipt of the NIDD data delivery report with the failure indication and failure reason indication of absent subscriber, the AF subscribes the UE reachability for DATA event report from the NEF through Nudm_EventExposure Subscribe request. The UE identity is also contained in the message, i.e. SUPI/GPSI of UEn, denoted as SUPIn/GPSIn in the figure. The NEF subscribes the UE reachability for DATA event report from the UDM through Nudm_EventExposure_Subscribe request. The UE identity is also contained in the message, i.e. SUPI/GPSI of UEn, denoted as SUPIn/GPSIn in the figure. The UDM subscribes the UE reachability for DATA report from the AMF through Namf_EventExposure Subscribe request. The UE identity is also contained in the message, i.e. SUPI/GPSI of UEn, denoted as SUPIn/GPSIn in the figure. At step 13, the AMF/UDM/NEF accepts the event subscription request and responds to the UDM/NEF/AF correspondingly.
[0119] At step 14, UE1 wakes up from sleeping and contacts the network for pending messages. At step 15, the AMF notifies the NEF by the Namf_EventExposure_Notify interface and the NEF notifies the AF by the Nnef_EventExposure_Notify interface that UE1 is reachable for DATA, and with the max availability time until that time point UE will keep active, for example after 30 seconds. The update described in step 18 of
[0120] At step 17, UE2 wakes up from sleeping and contacts the network for pending messages. At step 18, the AMF notifies the NEF by the Namf_EventExposure_Notify interface, and the NEF notifies the AF by the Nnef_EventExposure_Notify interface that UE2 is reachable for DATA, and with the max availability time until that time point UE will keep active, for example after 10 seconds. The update described in step 18 of
[0121] At step 20, UEn wakes up from sleeping and contacts the network for pending messages. At step 21, the AMF notifies the NEF by the Namf_EventExposure_Notify interface, and NEF notifies the AF by the Nnef_EventExposure_Notify interface that UEn is reachable for DATA, and with the max availability time until that time point UE will keep active, for example after 1 minute. The update described in step 18 of
[0122] At step 23, the AF based on the max UE availability time to prioritize the delivery of the data in the order of the availability time to be expired. For example, suppose the reachability for data event reports were received almost the same time. Then, NIDD data to UE2 is prioritized over NIDD data to UE1 as UE2 will keep wakeup for a shorter time period than UE1. Similarly, NIDD data to UE1 is prioritized over NIDD data to UEn as UE1 will keep wakeup for a shorter time period than UEn. At step 24, NIDD data deliver to UE2 succeeds. At step 25, NIDD data deliver to UE1 succeeds. At step 26, NIDD data deliver to UEn succeeds.
[0123] Steps 23-26 show the optimized NIDD data delivery schedule to ensure the data deliver efficiency. Without the update described above, the AF cannot prioritize the NIDD data delivery based on the max availability time. It is more prone that NIDD data delivery to UE2 could be failed again if UE2 enters into sleep mode again before the AF schedules the NIDD data delivery to UE2.
[0124] In the above process, for high latency data communication, the AF (or UPF or SMF or NEF) prioritizes and optimizes the transmission of pending message or data to UEs using a power saving mechanism. Since UEs are known to have Maximum UE Availability Time, such parameter could be used as input to optimize the schedule mechanism at the service entities.
[0125]
[0126] At step 1, a plurality of UEs, especially cellular IoT based, are working in power saving enhanced modes, for example, PSM mode. Suppose at this point, a series of UEs, UE1, UE2, . . . , UEn are in sleep state. Their SUPIs and GPSIs are denoted as SUPI1, SUPI2, . . . , SUPn and GPSI1, GPSI2, . . . , GPSIn respectively.
[0127] At step 2, an application service that UE has been subscribed has an application trigger message to be delivered to UE1 as the receiver. The AF triggers the application trigger delivery procedure to UE1 through the NEF, the SMS-SC and the AMF by SMS over NAS. At step 3, the AMF detects that UE1 is in sleep mode and unreachable for message delivery and a failure report is sent back to the AF through the SMS-SC and the NEF, with a failure indication of failed application trigger delivery and the failure reason is absent subscriber.
[0128] At step 4, upon the receipt of the message delivery report with the failure indication and failure reason indication of absent subscriber, the AF subscribes the UE reachability for SMSevent report from the NEF through Nudm_EventExposure_Subscribe request. The UE identity is also contained in the message, i.e. SUPI/GPSI of UE1, denoted as SUPI1/GPSI1 in the figure. The NEF subscribes the UE reachability for SMSevent report from the UDM through Nudm_EventExposure_Subscribe request. The UE identity is also contained in the message, i.e. SUPI/GPSI of UE1, denoted as SUPI1/GPSI1 in the figure. The UDM subscribes the UE reachability for SMS event report from the AMF through Namf_EventExposure_Subscribe request. The UE identity is also contained in the message, i.e. SUPI/GPSI of UE1, denoted as SUPI1/GPSI1 in the figure. At step 5, the AMF/UDM/NEF accepts the event subscription request and responds to the UDM/NEF/AF correspondingly.
[0129] Steps 6-9 described below are a repeating procedure of steps 2-5 but are for application trigger delivery to UE2. At step 6, an application service that UE2 has subscribed has an application trigger message to be delivered to UE2 as the receiver. The AF triggers the application trigger delivery procedure to UE2 through the NEF, the SMS-SC and the AMF by SMS over NAS. At step 7, the AMF detects that UE2 is in sleep mode and unreachable for data delivery and a failure report is sent back to the AF through the SMS-SC and the NEF, with a failure indication of failed application trigger delivery and the failure reason is absent subscriber.
[0130] At step 8, upon the receipt of the message delivery report with the failure indication and failure reason indication of absent subscriber, the AF subscribes the UE reachability for SMSevent report from the NEF through Nudm_EventExposure_Subscribe request. The UE identity is also contained in the message, i.e. SUPI/GPSI of UE2, denoted as SUPI2/GPSI2 in the figure. The NEF subscribes the UE reachability for SMSevent report from the UDM through Nudm_EventExposure_Subscribe request. The UE identity is also contained in the message, i.e. SUPI/GPSI of UE2, denoted as SUPI2/GPSI2 in the figure. The UDM subscribes the UE reachability for SMSevent report from the AMF through Namf_EventExposure_Subscribe request. The UE identity is also contained in the message, i.e. SUPI/GPSI of UE2, denoted as SUPI2/GPSI2 in the figure. At step 9, the AMF/UDM/NEF accepts the event subscription request and responds to the UDM/NEF/AF correspondingly.
[0131] Steps 10-13 described below are a repeating procedure of steps 2-5 but are for application trigger delivery to UEn. At step 10, an application service that UEn has subscribed has an application trigger message to be delivered to UEn as the receiver. The AF triggers the application trigger delivery procedure to UEn through the NEF, the SMS-SC and the AMF by SMS over NAS. At step 11, the AMF detects that UEn is in sleep mode and unreachable for data delivery and a failure report is sent back to the AF through the SMS-SC and the NEF, with a failure indication of failed application trigger delivery and the failure reason is absent subscriber.
[0132] At step 12, upon the receipt of the message delivery report with the failure indication and failure reason indication of absent subscriber, the AF subscribes the UE reachability for SMS report from the NEF through Nudm_EventExposure_Subscribe request. The UE identity is also contained in the message, i.e. SUPI/GPSI of UEn, denoted as SUPIn/GPSIn in the figure. The NEF subscribes the UE reachability for SMS report from the UDM through Nudm_EventExposure_Subscribe request. The UE identity is also contained in the message, i.e. SUPI/GPSI of UEn, denoted as SUPIn/GPSIn in the figure. The UDM subscribes the UE reachability for SMS report from the AMF through Namf_EventExposure_Subscribe request. The UE identity is also contained in the message, i.e. SUPI/GPSI of UEn, denoted as SUPIn/GPSIn in the figure. At step 13, the AMF/UDM/NEF accepts the event subscription request and responds to UDM/NEF/AF correspondingly.
[0133] At step 14, UE1 wakes up from sleeping and contacts the network for pending messages. At step 15, the AMF notifies the UDM by the Namf_EventExposure_Notify interface, the UDM notifies the NEF by the Nudm_EventExposure_Notify interface, and the NEF notifies the AF by the Nnef_EventExposure_Notify interface that UE1 is reachable for SMS, and with the max availability time until that time point UE will keep active, for example after 30 seconds. The update described in step 18 of
[0134] Table 2 shows an alternative update for the event report from the UDM to the NEF to provide the max UE availability time.
TABLE-US-00002 TABLE 2 Definition of type ReachabilityForSmsReport (updates compared to Table 6.4.6.2.12-1 of TS 29.503 are underlined) Attribute name Data type P Cardinality Description smsfAccessType AccessType M 1 maxAvail- DateTime O 0 . . . 1 The maximum availability abilityTime time (in UTC)until which a UE using a power saving mechanism (such as extended idle mode DRX) is expected to be reachable ThisIE may be included to identify the timestamp until which a UE using a power saving mechanism is expected to be reachable for SM delivery.
[0135] Table 3 below shows another alternative update for the UDM to provide the max UE availability time to the NEF.
TABLE-US-00003 TABLE 3 Definition of type MonitoringReport (updates compared to Table 6.4.6.2.4-1 of TS 29.503 are underlined) Attribute name Data type P Cardinality Description referenceId ReferenceId M 1 eventType EventType M 1 String; see clause 6.4.6.3.3 only the following values are allowed: “UE_REACHABILITY_FOR_SMS” “CHANGE_OF_SUPI_PEI_ASSOCIATION” “ROAMING_STATUS” “CN_TYPE_CHANGE” report Report C 0 . . . 1 Shall be present if eventType is “CHANGE_OF_SUPI_PEI_ASSOCIATION” or “ROAMING_STATUS” “CN_TYPE_CHANGE” reachabilityForSmsReport ReachabilityFor C 0 . . . 1 Should be present if eventType is SmsReport “UE_REACHABILITY_FOR_SMS” maxAvail- Datetime O 0 . . . 1 The maximum availability time (in UTC)until abilityTime which a UE using a power saving mechanism (such as extended idle mode DRX) is expected to be reachable If “event-Type” is “UE REACHABILITY FOR SMS”, this IE may be included to identify the timestamp until which a UE using a power saving mechanism is expected to be reachable for SM delivery. gpsi Gpsi C 0 . . . 1 shall be present if the report is associated to exposure subscriptions for a group of UEs or any UE. timeStamp DateTime M 1 Point in time at which the event occured
[0136] At step 16, the AF triggers the NIDD data delivery. As the max availability time is available, the AF could have enhanced schedule mechanism, for example hold a bit of time instead of delivering it immediately. At step 17, UE2 wakes up from sleeping and contacts the network for pending messages. At step 18, the AMF notifies the UDM by the Namf_EventExposure_Notify interface, the UDM notifies the NEF by the Nudm_EventExposure_Notify interface, and the NEF notifies the AF by the Nnef_EventExposure_Notify interface that UE2 is reachable for DATA, and with the max availability time until that time point UE will keep active, for example after 10 seconds. The update described in step 18 of
[0137] At step 20, UEn wakes up from sleeping and contacts the network for pending messages. At step 21, the AMF notifies the UDM by the Namf_EventExposure_Notify interface, the UDM notifies the NEF by the Nudm_EventExposure_Notifyinterface, and the NEF notifies the AF by the Nnef_EventExposure_Notify interface that UEn is reachable for DATA, and with the max availability time until that time point UE will keep active, for example after 1 minute. The update described in step 18 of
[0138] At step 23, the AF based on the max availability time to prioritize the delivery of the application trigger in the order of the availability time to be expired. For example, suppose the reachability for SMS event reports were received almost the same time. Then, application trigger to UE2 is prioritized over application trigger to UE1 as UE2 will keep wakeup for a shorter time period than UE1. Similarly, application trigger to UE1 is prioritized over application trigger to UEn as UE1 will keep wakeup for a shorter time period than UEn. At step 24, application trigger deliver to UE2 succeeds. At step 25, application trigger deliver to UE1 succeeds. At step 26, application trigger deliver to UEn succeeds.
[0139] Steps 23-26 show the optimized application trigger delivery schedule to ensure the data deliver efficiency. Without the update described above, the AF cannot prioritize the application trigger delivery based on the max availability time. It is more prone that application trigger to UE2 could be failed again if UE2 enters into sleep mode again before the AF schedules the application trigger delivery to UE2.
[0140] In the above processes shown in
[0141]
[0142] The program includes program instructions that, when executed by the processor 1310, enable the apparatus 1300 to operate in accordance with the embodiments of the present disclosure, as discussed above. That is, the embodiments of the present disclosure may be implemented at least in part by computer software executable by the processor 1310, or by hardware, or by a combination of software and hardware.
[0143] The memory 1320 may be of any type suitable to the local technical environment and may be implemented using any suitable data storage technology, such as semiconductor based memory devices, flash memories, magnetic memory devices and systems, optical memory devices and systems, fixed memories and removable memories. The processor 1310 may be of any type suitable to the local technical environment, and may include one or more of general purpose computers, special purpose computers, microprocessors, digital signal processors (DSPs) and processors based on multi-core processor architectures, as non-limiting examples.
[0144]
[0145]
[0146]
[0147]
[0148] In general, the various exemplary embodiments may be implemented in hardware or special purpose circuits, software, logic or any combination thereof. For example, some aspects may be implemented in hardware, while other aspects may be implemented in firmware or software which may be executed by a controller, microprocessor or other computing device, although the disclosure is not limited thereto. While various aspects of the exemplary embodiments of this disclosure may be illustrated and described as block diagrams, flow charts, or using some other pictorial representation, it is well understood that these blocks, apparatus, systems, techniques or methods described herein may be implemented in, as non-limiting examples, hardware, software, firmware, special purpose circuits or logic, general purpose hardware or controller or other computing devices, or some combination thereof.
[0149] As such, it should be appreciated that at least some aspects of the exemplary embodiments of the disclosure may be practiced in various components such as integrated circuit chips and modules. It should thus be appreciated that the exemplary embodiments of this disclosure may be realized in an apparatus that is embodied as an integrated circuit, where the integrated circuit may comprise circuitry (as well as possibly firmware) for embodying at least one or more of a data processor, a digital signal processor, baseband circuitry and radio frequency circuitry that are configurable so as to operate in accordance with the exemplary embodiments of this disclosure.
[0150] It should be appreciated that at least some aspects of the exemplary embodiments of the disclosure may be embodied in computer-executable instructions, such as in one or more program modules, executed by one or more computers or other devices. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types when executed by a processor in a computer or other device. The computer executable instructions may be stored on a computer readable medium such as a hard disk, optical disk, removable storage media, solid state memory, RAM, etc. As will be appreciated by one of skill in the art, the function of the program modules may be combined or distributed as desired in various embodiments. In addition, the function may be embodied in whole or in part in firmware or hardware equivalents such as integrated circuits, field programmable gate arrays (FPGA), and the like.
[0151] References in the present disclosure to “one embodiment”, “an embodiment” and so on, indicate that the embodiment described may include a particular feature, structure, or characteristic, but it is not necessary that every embodiment includes the particular feature, structure, or characteristic. Moreover, such phrases are not necessarily referring to the same embodiment. Further, when a particular feature, structure, or characteristic is described in connection with an embodiment, it is submitted that it is within the knowledge of one skilled in the art to implement such feature, structure, or characteristic in connection with other embodiments whether or not explicitly described.
[0152] It should be understood that, although the terms “first”, “second” and so on may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, a first element could be termed a second element, and similarly, a second element could be termed a first element, without departing from the scope of the disclosure. As used herein, the term “and/or” includes any and all combinations of one or more of the associated listed terms.
[0153] The terminology used herein is for the purpose of describing particular embodiments only and is not intended to limit the present disclosure. As used herein, the singular forms “a”, “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises”, “comprising”, “has”, “having”, “includes” and/or “including”, when used herein, specify the presence of stated features, elements, and/or components, but do not preclude the presence or addition of one or more other features, elements, components and/or combinations thereof. The terms “connect”, “connects”, “connecting” and/or “connected” used herein cover the direct and/or indirect connection between two elements.
[0154] The present disclosure includes any novel feature or combination of features disclosed herein either explicitly or any generalization thereof. Various modifications and adaptations to the foregoing exemplary embodiments of this disclosure may become apparent to those skilled in the relevant arts in view of the foregoing description, when read in conjunction with the accompanying drawings. However, any and all modifications will still fall within the scope of the non-Limiting and exemplary embodiments of this disclosure.