Method and device for non-IP data delivery in communication system
11617066 · 2023-03-28
Assignee
Inventors
- Yun Zhang (Guangzhou, CN)
- Jingrui Tao (Guangzhou Guangdong, CN)
- Fengpei Zhang (Guangzhou Guangdong, CN)
- Minyi Wang (Guangzhou Guangdong, CN)
Cpc classification
H04L67/568
ELECTRICITY
Y02D30/70
GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
H04W4/70
ELECTRICITY
International classification
H04W4/70
ELECTRICITY
H04W8/18
ELECTRICITY
Abstract
The present disclosure provides a method and a device for non-IP data delivery in a communication system. The method for operating data by a network exposure node includes: receiving a request for operating the data; operating the data according to the request. The data includes a plurality of pieces of non-internet protocol data delivery (NIDD) data, which are buffered in a network and not delivered. The plurality of pieces of data already sent to the network exposure node may still be operated, for example cancelled or replaced, thus undesired actions of the UE may be better avoided.
Claims
1. A method for operating data by a network exposure node in a communication system, comprising: receiving a request for operating the data for a user equipment (UE), wherein the data is sent to the UE while sleeping in power saving mode; as long as the UE is in the power saving mode, operating the data according to the request; wherein the data comprises a plurality of pieces of non-internet protocol data delivery (NIDD) data, which are buffered in a network and not delivered to the UE, wherein the plurality of pieces of NIDD data to be operated are identified based at least on a UE identifier included in the request; and after operating the data comprising the plurality of pieces of NIDD data already buffered in the network, delivering the rest of NIDD data that is not buffered to the UE after it is determined that the UE has recovered from the power saving mode.
2. The method according to claim 1, wherein the plurality of pieces of NIDD data comprises all pieces of NIDD data corresponding to a transaction identifier included in the request.
3. The method according to claim 2, wherein operating the data according to the request comprising: deleting all the pieces of NIDD data corresponding to the transaction identifier.
4. The method according to claim 2, wherein operating the data according to the request comprising: replacing all the pieces of NIDD data corresponding to the transaction identifier with another piece of NIDD data.
5. The method according to claim 2, wherein the request is received via a T8 interface; and wherein the transaction identifier is a configuration identifier (configurationID).
6. The method according to claim 1 further comprising: sending a response to the request to a server node.
7. The method according to claim 1, wherein the network exposure node is one of: a service capability exposure function (SCEF) node, and a network exposure function (NEF) node.
8. The method according to claim 1, wherein an originator of the plurality of pieces of NIDD data is one of: an application server (AS) node, a service capability server (SCS) node, and an application function (AF) node.
9. The method according to claim 1, wherein a terminator of the plurality of pieces of NIDD data is the user equipment.
10. The method according to claim 1, wherein a terminator of the plurality of pieces of NIDD data is a group of user equipment.
11. A method for operating data by a server node in a communication system, comprising: sending a request for operating the data to a network exposure node; wherein the request for operating the data is for a user equipment (UE), the data is sent to the UE while sleeping in power saving mode, such that the data is operated according to the request as long as the UE is in the power saving mode, wherein the data comprises a plurality of pieces of non-internet protocol data delivery (NIDD) data, which are buffered in a network and not delivered to the UE, wherein the plurality of pieces of NIDD data to be operated are identified based at least on a UE identifier included in the request, wherein after the data comprising the plurality of pieces of NIDD data already buffered in the network is operated, the rest of NIDD data that is not buffered is delivered to the UE after it is determined that the UE has recovered from the power saving mode.
12. The method according to claim 11, wherein the plurality of pieces of NIDD data comprises all pieces of NIDD data corresponding to a transaction identifier included in the request.
13. The method according to claim 12, wherein operating the data comprising: deleting all the pieces of NIDD data corresponding to the transaction identifier.
14. The method according to claim 12, wherein operating the data according to the request comprising: replacing all the pieces of NIDD data corresponding to the transaction identifier with another piece of NIDD data.
15. The method according to claim 12, wherein the request is sent via a T8 interface; and wherein the transaction identifier is a configuration identifier.
16. A network exposure node device comprising: a processor; and a memory, containing instructions executable by the processor; wherein the network exposure node device is operative to the method according to claim 1.
17. The network exposure node device according to claim 16, wherein the network exposure node device is one of: a service capability exposure function (SCEF) node device, and a network exposure function (NEF) node device.
18. A server node device comprising: a processor; and a memory, containing instructions executable by the processor; wherein the server node device is operative to the method according to claim 11.
19. The server node device according to claim 18, wherein the server node device is one of: an application server (AS) node device, a service capability server (SCS) node device, and an application function (AF) node device.
20. A non-transitory computer readable storage medium having a computer program stored thereon, the computer program executable by a device to cause the device to carry out the method according to claim 1.
21. A non-transitory computer readable storage medium having a computer program stored thereon, the computer program executable by a device to cause the device to carry out the method according to claim 11.
Description
BRIEF DESCRIPTION OF DRAWINGS
(1) Through the more detailed description of some embodiments of the present disclosure in the accompanying drawings, the above and other objects, features and advantages of the present disclosure will become more apparent, wherein the same reference generally refers to the same components in the embodiments of the present disclosure.
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
DETAILED DESCRIPTION
(10) Some preferable embodiments will be described in more detail with reference to the accompanying drawings, in which the preferable embodiments of the present disclosure have been illustrated. However, the present disclosure can be implemented in various manners, and thus should not be construed to be limited to the embodiments disclosed herein. On the contrary, those embodiments are provided for the thorough and complete understanding of the present disclosure, and completely conveying the scope of the present disclosure to those skilled in the art.
(11)
(12) In step 1, when an SCS/AS has already activated the NIDD service for a given UE, and has downlink non-IP data to send to the UE, the SCS/AS sends an NIDD MT submit request (including: external identifier or MSISDN for the UE, downlink data delivery identifier, non-IP data, etc.) message to the SCEF. The UE in
(13) In step 5, if the UE is not reachable (e.g. the UE is in power saving mode), the SCEF buffers the NIDD MT data. Alternatively, if the UE is reachable, the procedure goes to step 9 directly, and the NIDD MT data is delivered.
(14) In step 6, the UE recovers from power saving mode, to be reachable. In step 7, the MME notifies the SCEF that the UE is on reachability for data. In step 8, the SCEF sends the NIDD MT data to the UE via the MME. In step 9, the MME delivers NIDD data over non-access stratum (NAS). In step 10, the MME notifies the SCEF about the result of the delivery of the NIDD MT data. In step 11, the SCEF responses to the AS/SCS that the delivery of the NIDD MT data is successful via T8 APIs.
(15) In steps 1, 4, 11, the communications between the SCEF and AS/SCS are accomplished via 3GPP T8 NIDD APIs, so as to improve unity and security.
(16) In a low power wide area network (LPWAN), at most of cases, a UE (e.g. an Internet of Things (IoT) device) will be in power saving mode (PSM) for keeping a long battery lifetime. NIDD MT data will be buffered in the network, and only delivered to the UE when the UE is active from PSM.
(17) AS/SCS will probably send a number of MT data when UE sleeps in PSM. However, sometimes AS may expect only the last message to be effective in UE, and want to cancel all previous non-delivery message(s). For example, a water meter AS may send the remote closure command to the meter when the household has not enough balance for water supply. Since the water meter is set to be active in 1 day or several days, the closure command will not be delivered on time, the AS will continuously send a couple of closure commands to the meter, and these commands are buffered in the network. Later, the household may fill in money before the water meter is active from PSM. The water meter should remain open to supply water to the household. However, all the buffered commands including open command and several closure commands are sent to the water meter as soon as the water meter is active. Unexpected actions will then happen. The water meter may be closed, or may be repeatedly closed and open. The final state of the water meter will be unexpectable. The water meter AS will expect to cancel all non-delivered messages such as the closure commands, or just replace all non-delivered messages by the continuously supplying water command. However, in a conventional network, there is no way to delete or replace all these non-delivered messages at one time.
(18) Such improved methods and devices for operating buffered data including non-IP data delivery in communication system will be described below in detail.
(19)
(20) As shown in
(21) The method of the present disclosure provides functions about how to operate data including a plurality of pieces of NIDD data, which are buffered in the network and not delivered. Particularly, the NIDD data may be buffered in the network exposure node, or a specific storage node associated with the network exposure node, which could be separate from or integrated into the network exposure node. The plurality of pieces of NIDD data already sent to the network exposure node may still be cancelled or replaced, thus undesired actions of the UE may be better avoided. Referring to the example about water meter again, only the last open command is received by the water meter, since the previous closure commands are cancelled explicitly. The state of the water meter will thus be predictable.
(22)
(23) As shown in
(24) Steps 32-33 show a specific example of implementing steps 210-220 in
(25) In step 32, the SCEF receives a request for operating the buffered data. Operating the buffered data may include: deleting a plurality of pieces of NIDD data. The plurality of pieces of NIDD data may comprise all pieces of NIDD data corresponding to a transaction identifier included in the request. Namely, operating the data according to the request comprising: deleting all the pieces of NIDD data corresponding to the transaction identifier.
(26) For example, all the pieces of NIDD data from the given AS/SCS to the given UE may be associated with the same configurationID. The usage of the configurationID may indicate deleting all these pieces of NIDD data explicitly. The configurationID may facilitate the efficiency to determine the pieces of NIDD data to be deleted.
(27) Alternatively, the AS/SCS ID, and the UE ID may be used to determine the pieces of NIDD data to be deleted. The SCEF may directly search all the buffered pieces of NIDD data with the AS/SCS ID, and the UE ID, to determine the pieces of NIDD data to be deleted.
(28) The request may have several parameters including: operation: HTTP Delete, resource: NIDD downlink data delivery, UE ID: MSISDN or External ID, option: delete all, transaction ID: configurationID. HTTP is hypertext transfer protocol. Such parameter definitions may be compatible with the existing request message defined in 3GPP standard specifications, thus no new message format is needed for the present disclosure.
(29) More specifically, table 1 is the proposed HTTP Delete method for the plurality of pieces of NIDD MT data, on the basis of 3GPP TS 29.122 V2.0.0 NIDD API, wherein URI is a uniform resource identifier.
(30) TABLE-US-00001 TABLE 1 Description of HTTP Delete method HTTP Resource method HTTP name Resource URI name initiator Meaning NIDD 3gpp-nidd/v1/{scsAsId}/ DELETE SCS/AS Delete all pending NIDD downlink configurations/ downlink data delivery data {configurationId}/ resources related to a deliveries downlink- particular NIDD data-deliveries configuration resource.
(31) With the similar API definition, the proposed HTTP Delete method may be accessed via the same way as the existing methods about NIDD. The efficiency is thus improved.
(32) In step 33, the SCEF operates the buffered data. For example, according to the request received in step 32, the SCEF may determine the pieces of NIDD data to be deleted from the buffer sequence of the non delivered (pending) pieces of NIDD data, based on configurationID. Then the SCEF deletes all the pieces of NIDD data related to the same configurationID. Then, in step 34, the SCEF sends a response to the request for operating the buffered data, to the AS/SCS. The response may include a result of deleting the plurality of pieces of NIDD data.
(33) In step 35, the UE recovers from the power saving mode, and receives the rest of NIDD MT data. The specific procedures for each piece of NIDD MT data may be the same as the steps 6-11 as in
(34) After deleting undesired data which is already buffered in the SCEF, the UE will only receive the desired message and acts predictably.
(35)
(36) In step 42, the SCEF receives a request for operating the buffered data. The operating the buffered data may include: replacing all the pieces of NIDD data corresponding to the transaction identifier with another piece of NIDD data.
(37) When replacing the plurality of pieces of NIDD data, one transaction identifier related to all of the plurality of pieces of NIDD data may be used. Such transaction identifier may be a configurationID. For example, all the pieces of NIDD data from the given AS/SCS to the given UE may be associated with the same configurationID. The usage of the configurationID may indicate replacing all these pieces of NIDD data explicitly. The configurationID may facilitate the efficiency to determine the pieces of NIDD data to be replaced.
(38) The request may have several parameters including: operation: HTTP PUT, resource: NIDD downlink data delivery, UE ID: MSISDN or External ID, option: replace all, transaction ID: configurationID, new transaction ID: downlinkDataDeliveryId, new message. Such parameter definitions may be compatible with the existing request message defined in 3GPP standard specifications, thus no new message format is needed for the present disclosure. Further, as an example, the existing method named “HTTP PUT” may be used compatibly with the existing request message. However, a new name such as “HTTP Replace” may be used alternatively.
(39) More specifically, table 2 is the proposed HTTP Replace method for the plurality of pieces of NIDD MT data, on the basis of 3GPP TS 29.122 V2.0.0 NIDD API.
(40) TABLE-US-00002 TABLE 2 Description of HTTP Replace method HTTP Resource method HTTP name Resource URI name initiator Meaning NIDD 3gpp-nidd/v1/ PUT SCS/ Replace all pending downlink {scsAsId}/ AS NIDD downlink data data configurations/ delivery resources deliveries {configurationId}/ related to a particular downlink- NIDD configuration data-deliveries resource.
(41) With the similar API definition, the proposed HTTP Replace method may be accessed via the same way as existing methods about NIDD. The efficiency is thus improved.
(42) In step 43, the SCEF operates the buffered data. For example, according to the request received in step 42, the SCEF may determine the pieces of NIDD data to be replaced from the buffer sequence of the non-delivered (pending) pieces of NIDD data, based on the same configurationID. The SCEF replaces these pieces of NIDD data with a new piece of NIDD data. Then, in step 44, the SCEF sends the response to the request for operating the buffered data, to the AS/SCS. The response may include a result of replacing the plurality of pieces of NIDD data.
(43) In step 45, the UE recovers from the power saving mode, and receives the replaced new message. Therefore, after replacing the undesired data which is already buffered in the SCEF, the UE will only receive the desired message and acts predictably.
(44)
(45) This method may be implemented by the AS/SCS to cooperate with the method in
(46) With above described methods, it is an obvious advantage that the disclosure proposes a method for an application server with an easier way to delete or replace all non-delivered pieces of NIDD MT data to a given UE, which sleeps in power saving mode, such that the application server can deliver the latest expected message to the UE. Meanwhile, this disclosure offload SCEF's buffer, since undesired NIDD MT data can be deleted or replaced timely, thus, unnecessary messages to a radio base station and UE are avoided, and the energy in network and UE is saved. 3GPP T8 interface APIs defined in 3GPP TS 29.122 V2.0.0, etc. may be extended accordingly.
(47)
(48) As shown in
(49) The embodiments of the present disclosure further provides a computer readable storage medium having a computer program stored thereon. The computer program is executable by a device to cause the device to carry out the method described above, such as the method shown in
(50) In
(51)
(52) A virtual apparatus 700 may perform the methods as shown in the
(53)
(54) A virtual apparatus 800 may performs the method as shown in
(55) With virtual apparatuses 700 and 800, the network exposure node and server node may not need a fixed processor or memory, any computing resource and storage resource may be arranged from at least one node device in the network. The introduction of virtualization technology and network computing technology may improve the usage efficiency of the network resources and the flexibility of the network.
(56) In general, the various exemplary embodiments of the present disclosure may be implemented in hardware or special purpose circuits, software, logic or any combination thereof. For example, some aspects may be implemented in hardware, while other aspects may be implemented in firmware or software that may be executed by a controller, microprocessor or other computing device, although the disclosure is not limited thereto. While various aspects of the exemplary embodiments of this disclosure may be illustrated and described as block diagrams, flow charts, or using some other pictorial representation, it is well understood that these blocks, apparatus, systems, techniques or methods described herein may be implemented in, as non-limiting examples, hardware, software, firmware, special purpose circuits or logic, general purpose hardware or controller or other computing devices, or some combination thereof.
(57) As such, it should be appreciated that at least some aspects of the exemplary embodiments of the disclosure may be practiced in various components such as integrated circuit chips and modules. It should thus be appreciated that the exemplary embodiments of this disclosure may be realized in an apparatus that is embodied as an integrated circuit, where the integrated circuit may include circuitry (as well as possibly firmware) for embodying at least one or more of a data processor, a digital signal processor, baseband circuitry and radio frequency circuitry that are configurable so as to operate in accordance with the exemplary embodiments of this disclosure.
(58) It should be appreciated that at least some aspects of the exemplary embodiments of the disclosure may be embodied in computer-executable instructions, such as in one or more program modules, executed by one or more computers or other devices. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types when executed by a processor in a computer or other device. The computer executable instructions may be stored on a computer readable medium such as a hard disk, optical disk, removable storage media, solid state memory, RAM, etc. As will be appreciated by those skilled in the art, the functionality of the program modules may be combined or distributed as desired in various embodiments. In addition, the functionality may be embodied in whole or in part in firmware or hardware equivalents such as integrated circuits, field programmable gate arrays (FPGA), and the like.
(59) The present disclosure includes any novel feature or combination of features disclosed herein either explicitly or any generalization thereof. Various modifications and adaptations to the foregoing exemplary embodiments of this disclosure may become apparent to those skilled in the relevant arts in view of the foregoing description, when read in conjunction with the accompanying drawings. However, any and all modifications will still fall within the scope of the non-limiting and exemplary embodiments of this disclosure.