OBTAINING INFORMATION RELATING TO TETHERING EVENTS
20250132938 · 2025-04-24
Inventors
- Antonio Iniesta Gonzalez (Madrid, ES)
- Miguel Angel Muñoz De La Torre Alonso (Madrid, ES)
- Irene MARTIN CABELLO (Madrid, ES)
Cpc classification
H04M15/8271
ELECTRICITY
International classification
H04L12/14
ELECTRICITY
Abstract
Embodiments described herein relate to methods and apparatuses for obtaining information relating to tethering events. A method performed at a first network function for obtaining information relating to tethering events includes receiving, from a second network function, a first request to report information either related to detected tethering events in a session or related to detected tethering events for one or more services in a session; detecting a first tethering event at a first device; and transmitting a first message to the second network function, the first message including tethering information related to the first tethering event.
Claims
1. A method performed at a first network function for obtaining information relating to tethering events, the method comprising: receiving, from a second network function, a first request to report information either related to detected tethering events in a session or related to detected tethering events for one or more services in a session; detecting a first tethering event at a first device; and transmitting a first message to the second network function, the first message comprising tethering information related to the first tethering event.
2. The method according to claim 1, wherein the first request comprises a request to report one or more of: a device identification of any device either performing tethering events in the session or performing tethering events for the one or more services in the session; and a device type of any device either performing tethering events in the session or performing tethering events for the one or more services in the session.
3. The method according to claim 1, wherein the first request comprises a request to establish or modify the session.
4. The method according to claim 3, wherein the request to establish or modify the session is based on a first rule, wherein the first rule is to be applied to traffic either in the session or for the one or more services in the session, and wherein the first rule is based at least in part on a first policy to be applied either to tethering traffic in the session or to tethering traffic for the one or more services in the session, wherein the first policy indicates that the second network function should report information relating either to detected tethering events in the session or to detected tethering events for the one or more services in the session.
5. The method as claimed in claim 3 wherein the first rule comprises a policy and charging control, PCC, rule or a session rule.
6. The method according to claim 1, wherein the tethering information comprises one or more of: an indication that tethering has either been detected in the session or been detected for one of the one or more services in the session; an identification of the first device; an identification of a device type of the first device.
7. The method according to claim 1, wherein the method further comprises: receiving, from the second network function, a second request to modify the session based on a second rule, wherein the second rule comprises at least one tethering policy to be applied to tethering traffic of the first tethering event, and at least one traffic policy to be applied to either other non-tethering traffic in the session or other non-tethering traffic for one or more services in the session.
8. The method according to claim 1, wherein the first network function comprises a User Plane function (UPF).
9. The method according to claim 1, wherein the second network function comprises a Session Management function (SMF).
10. A method performed at a third network function for obtaining information relating to tethering events, the method comprising: obtaining first information for use in determining policies to be applied to traffic; determining, based on the first information, a first policy to be applied to either tethering traffic in a session or tethering traffic for one or more services in the session, wherein the first policy indicates that a second network function should report information relating either to detected tethering events in the session or to detected tethering events for the one or more services in the session; and transmitting to a second network function a first request to report information related either to detected tethering events in the session or to detected tethering events for the one or more services in the session.
11. The method as claimed in claim 10 further comprising: transmitting a first rule to a second network function, wherein the first rule is to be applied to either traffic of the session or traffic for one or more services in the session, and wherein the first rule is based at least in part on the first policy.
12. The method as claimed in claim 11 wherein the first rule comprises a policy and charging control, PCC, rule or a session rule.
13. The method as claimed in claim 11 further comprising transmitting the first rule and the first request as part of a first message, wherein the first message comprises a response to a request to create or update the session.
14. The method as claimed in claim 10 wherein the first request comprises a request to report one or more of: a device identification of any device performing tethering events either in the session or for the one or more services in the session; and a device type of any device performing tethering events either in the session or for the one or more services in the session.
15. The method according to claim 10, wherein the method further comprises: receiving tethering information from the second network function related to a first tethering event at a first device, wherein the first tethering event is either in the session or for the one of the one or more services in the session; determining a second policy based on the tethering information and the first information; updating the first rule, based on the second policy, to form a second rule, wherein the second rule comprises at least one tethering policy to be applied to tethering traffic of the first tethering event, and at least one traffic policy to be applied to other non-tethering traffic in the session or other non-tethering traffic for the one or more services in the session; and transmitting the second rule to the second network function.
16. The method as claimed in claim 15 wherein at least part of the first information is received from a fourth network function.
17. The method as claimed in claim 16 wherein the at least part of the first information received from the fourth network function comprises one or more of: an identification of the one or more services to which the at least part of the first information applies; an indication as to whether tethering is allowed for the session or for the one or more services; a maximum number of devices allowed to tether for the session or for the one or more services; a list of device types allowed to tether for the session or for the one or more services.
18. The method according to claim 16, wherein the fourth network function comprises a Unified Data Repository (UDR).
19. The method as claimed in claim 15 wherein the tethering information comprises one or more of: an indication that tethering has been detected in the session or for the one of the one or more services in the session; an identification of the first device; an identification of a device type of the first device.
20. The method as claimed in claim 15 wherein each of the at least one tethering policy to be applied to the tethering traffic comprises one of more of: an identification of one or more devices to which the tethering policy is to be applied; an indication that the tethering policy is to be applied to all tethered traffic; a list of device types either allowed to tether for the session or allowed to tether for the one or more services in the session; a condition relating to a number of tethered devices, wherein the tethering policy is to be applied when the condition is fulfilled.
21.-81. (canceled)
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0033] For a better understanding of the embodiments of the present disclosure, and to show how it may be put into effect, reference will now be made, by way of example only, to the accompanying drawings, in which:
[0034]
[0035]
[0036]
[0037]
[0038]
[0039]
[0040]
[0041]
[0042]
[0043]
[0044]
[0045]
[0046]
[0047]
[0048]
DETAILED DESCRIPTION
[0049] The following sets forth specific details, such as particular embodiments or examples for purposes of explanation and not limitation. It will be appreciated by one skilled in the art that other examples may be employed apart from these specific details. In some instances, detailed descriptions of well-known methods, nodes, interfaces, circuits, and devices are omitted so as not obscure the description with unnecessary detail. Those skilled in the art will appreciate that the functions described may be implemented in one or more nodes using hardware circuitry (e.g., analog and/or discrete logic gates interconnected to perform a specialized function, ASICs, PLAs, etc.) and/or using software programs and data in conjunction with one or more digital microprocessors or general purpose computers. Nodes that communicate using the air interface also have suitable radio communications circuitry. Moreover, where appropriate the technology can additionally be considered to be embodied entirely within any form of computer-readable memory, such as solid-state memory, magnetic disk, or optical disk containing an appropriate set of computer instructions that would cause a processor to carry out the techniques described herein.
[0050] Hardware implementation may include or encompass, without limitation, digital signal processor (DSP) hardware, a reduced instruction set processor, hardware (e.g., digital or analogue) circuitry including but not limited to application specific integrated circuit(s) (ASIC) and/or field programmable gate array(s) (FPGA(s)), and (where appropriate) state machines capable of performing such functions.
[0051] Presently, it is not possible to take different decisions for a service (application), or in fact a PDU session, that is dependent on the number and type of different devices (for example, a laptop, a smart 4K TV) that are consuming tethering traffic behind a UE.
[0052] Furthermore, presently, multiple PCC rules need to be installed by the PCF when different enforcements (for example, QoS, blocking traffic, charging) need to be applied for a service depending on whether the service is directly consumed by the UE handling the PDU session, or being tethered to a different device behind the UE. That is, two different application identifications (appIds) have to be configured in order to provide two separate PCC rules for the same service depending on whether the service is tethered or not.
[0053] Additionally, multiple PCC rules are currently required to enable different enforcement actions to be applied to each tethered device (behind the UE). For example, a first PCC rule would be required for a first tethering device 1, and a second PCC rule would be required for a second tethering device.
[0054] Additionally, network operators will likely want to apply differentiated treatment (for example, different rating groups for Charging, different QoS handling, different access control) to traffic matching a certain service dependent on a subscriber profile. When the traffic is tethered, the network operators still will likely apply differentiated treatment in case the service traffic is tethered or not.
[0055] Presently (3GPP TS 29.244), in order to apply tethering policies both on a per subscriber and on a per service basis, there is a need to duplicate the number of PDRs that SMF provisions to UPF for each service (for example, one PDR for a first service without tethering and another PDR for the first service with tethering). This implies complex configuration for the network operator and high amounts of signaling in the N4 interface.
[0056] Additionally, the enforcement actions (for example, Access Control, Charging/Reporting, QoS) related to tethering policies may potentially result in multiple combinations. An example is shown below for a first service here, where the tethering policy could be either:
[0057] Differentiated Charging/Reporting for the service's tethered traffic. In this case, the SMF will need to install the following URRs/FARs/QERs:
TABLE-US-00001 Service URR FAR QER Tethering URR1 FAR1 QER1 No tethering URR2 FAR1 QER1
[0058] Differentiated Access Control (for example, drop tethered traffic) for the service's tethered traffic. In this case, the SMF will need to install the following URRs/FARs/QERs:
TABLE-US-00002 Service URR FAR QER Tethering URR1 FAR1 QER1 No tethering URR1 FAR2 QER1
[0059] Differentiated QoS for the service's tethered traffic. In this case, the SMF will need to install the following URRs/FARs/QERs:
TABLE-US-00003 Service URR FAR QER Tethering URR1 FAR1 QER1 No tethering URR1 FAR1 QER2
[0060] Differentiated Charging/Reporting and Access Control for the service's tethered traffic. In this case, the SMF will need to install the following URRs/FARs/QERs:
TABLE-US-00004 Service URR FAR QER Tethering URR1 FAR1 QER1 No tethering URR2 FAR2 QER2
[0061] Differentiated Charging/Reporting and QoS for the service's tethered traffic. In this case, the SMF will need to install the following URRs/FARs/QERs:
TABLE-US-00005 Service URR FAR QER Tethering URR1 FAR1 QER1 No tethering URR2 FAR1 QER2
[0062] Differentiated Access Control and QoS for the service's tethered traffic. In this case, the SMF will need to install the following URRs/FARs/QERs:
TABLE-US-00006 Service URR FAR QER Tethering URR1 FAR1 QER1 No tethering URR1 FAR2 QER2
[0063] Differentiated Charging/Reporting, Access Control and QoS for the service's tethered traffic. In this case, the SMF will need to install the following URRs/FARs/QERs:
TABLE-US-00007 Service URR FAR QER Tethering URR1 FAR1 QER1 No tethering URR2 FAR2 QER2
[0064] The above combinations result in complex provisioning for the network operator and high amounts of signaling in the N7/N4 interfaces. Additionally, the example above is just for a single service, and assumes that enforcement actions do not depend on the number of tethering devices. For example, for each service there could be different enforcement actions, for example blocking a first service tethered traffic while allowing a second service's tethered traffic but with a low bandwidth.
[0065] Embodiments described herein propose methods and apparatuses that solve the above problems, for example, by utilizing an extended rule (corresponding to one or more services, or corresponding to a session) in order to provide dynamic enforcement actions for both the case in which the traffic is consumed by the master UE (e.g. traffic that is not tethered), and the case in which any other device behind the master UE is performing tethering (e.g. tethering traffic).
[0066] The embodiments described herein may be implemented, for example, by extending the N7 and N4 interfaces to enable the application of different enforcements to traffic consumed by tethering devices.
[0067] For simplicity, herein the embodiments are described with reference to a 5G architecture. It will however be appreciated that, although the embodiments described herein relate to 5G network architecture, similar embodiments may be implemented in a 4G network architecture, by replacing, for example: PCF by PCRF, UDR by SPR, AMF by MME, SMF by PGW-C or TDF-C and UPF by PGW-U or TDF-U. Similarly, the embodiments described herein may equally be extended to any future network architectures such as a 6.sup.th Generation (6G) network architecture, for example, by implementing the functionality of the 5G network functions in appropriate nodes in any core network.
[0068]
[0069] At step 202, the first network function receives from a second network function, a first request to report information either related to detected tethering events in a session or related to detected tethering events for one or more services in a session. That is, the first network function may be requested to report information relating to any tethering traffic in a session (regardless of the service consumed), or to report information relating to tethering traffic that is consuming only specific services.
[0070] The second network function may be implemented in a second network node. The second network node may comprise a physical or virtual node, and may be implemented in a computing device or server apparatus and/or in a virtualized environment, for example in a cloud, edge cloud or fog deployment. The second network function may comprise an SMF.
[0071] In some embodiments, the first request may further comprise a request to establish or modify the session. For example, the first request may comprise a PCFP Session Establishment or Modification request (as will be described later with reference to
[0072] In some embodiments, the request to establish or modify the session may be based on a first rule, wherein the first rule is to be applied to traffic either in the session or for the one or more services in the session. The first rule may be based at least in part on a first policy to be applied either to tethering traffic in the session or to tethering traffic for the one or more services in the session. The first policy may indicate that the second network function should report information relating either to detected tethering events in the session or to detected tethering events for the one or more services in the session. For example, the first policy may indicate that the second network function should report to the first network function when tethering events for the first service start and/or stop.
[0073] However, in other embodiments, the first request may be transmitted separately from a request to establish or modify the session. For example, in some embodiments, the first request may be transmitted as part of a newly defined tethering event message.
[0074] In some embodiments, the first request may comprise a request to report one or more of: a device identification (for example, a deviceID) of any device either performing tethering events in the session or performing tethering events for the one or more services in the session; and a device type (for example, a laptop device, a smart 4K TV device) of any device either performing tethering events in the session or performing tethering events for the one or more services in the session.
[0075] At step 204, the first network function detects a first tethering event at a first device.
[0076] For example, it will be appreciated that an extension of the PFCP protocol (that is, an extension of the N4 interface) to create a new UPF capability related to tethering detection and enforcement may be negotiated between the SMF and the UPF.
[0077] For example, the UPF features presently defined in 3GPP TS 29.244 may be extended as follows:
TABLE-US-00008 Feature Octet/Bit Feature Interface Description 10/2 TDEU N4 UPF support of Tethering detection and enforcement.
[0078] At step 206, the first network function transmits a first message to the second network function, the first message comprising tethering information related to the first tethering event. In some embodiments, the tethering information may comprise one or more of: an indication that tethering has either been detected in the session or been detected for one of the one or more services in the session, an identification of the first device (for example, a deviceID); and an identification of a device type of the first device (for example, a laptop device, a smart 4K TV device). The tethering information reported by the second network function may be dictated by what was requested in the first request.
[0079] In some embodiments, the first rule may comprise a policy and charging control, PCC, rule or a session rule. It will be appreciated that a session rule may enable enforcements to be applied to traffic of a session independently of the service that is being consumed, whereas a PCC rule may specify enforcements that are to be applied to one or more services that are being consumed.
[0080] In some embodiments, the method 200 may further comprise receiving, from the second network function, a second request to modify the session based on a second rule. The second rule may comprise at least one tethering policy to be applied to tethering traffic of the first tethering event, and at least one traffic policy to be applied to either other non-tethering traffic in the session or other non-tethering traffic for one or more services in the session. Similarly to as for the first rule, it will be appreciated that the second rule may comprise a PCC rule or a session rule.
[0081] It will be appreciated that the provision of this second request enables the first network function to apply the at least one tethering policy to tethering traffic of the first tethering event, and to apply the at least one traffic policy to either other non-tethering traffic in the session or other non-tethering traffic for one or more services in the session. It should be noted that, contrary to existing solutions, only one rule (e.g. the second rule) is therefore required in order to enable different treatment of the tethering traffic and the non-tethering traffic.
[0082] It will be appreciated that the second rule may be formed based at least in part on the tethering information transmitted in step 206. How the second rule may be determined will now be described in greater detail with reference to the method 300 of
[0083]
[0084] At step 302, the third network function obtains first information for use in determining policies to be applied to traffic.
[0085] In some embodiments, at least part of the first information may be received from a fourth network function (for example, a UDR). For example, at least part of the first information may comprise extended subscription information received from the UDR.
[0086] In some embodiments, existing session management subscription information may be extended such that it comprises information relating to tethering support per S-NSSAI/DNN. In some embodiments, this new information may be indicated by extending the existing data type SmPolicyDnnData, as currently defined in 3GPP TS 29.519, with a new attribute.
[0087] For example, the data type SmPolicyDnnData presently defined in 3GPP TS 29.519 may be extended to define the following attribute:
TABLE-US-00009 Attribute Data name type P Cardinality Description Applicability tethering map(Teth- O 1 . . . N Information about eringInformation) Tethering
[0088] The new attribute TetheringInformation may be defined to comprise the following:
TABLE-US-00010 Attribute Data name type P Cardinality Description Applicability appId String M 1 Identifies the appId for which tethering tethering information is provided tetheringNotAllowed boolean O 0 . . . 1 Identifies whether Tethering tethering is allowed or not. Set to true if no Tethering is allowed; otherwise set to false. The default value is false. tetheringMaxDevices Integer O 0 . . . 1 Maximum number of allowed tethering tethering devices tetheringAllowedDeviceTypes array O 1 . . . N Includes the list of allowed tethering (string) device types for tethering for the service
[0089] In some embodiments, the at least part of the first information received from the fourth network function may comprise one or more of: an identification of the one or more services to which the at least part of the first information applies, an indication as to whether tethering is allowed for the session or for the one or more services, a maximum number of devices allowed to tether for the session or for the one or more services (for example, 3 devices), a list of device types allowed to tether for the session or for the one or more services (for example, a laptop device, a smart 4K device).
[0090] Additionally or alternatively, in some embodiments, least part of the first information may comprise network operator policies. For example, a network operator may define that tethering traffic is always to be blocked for a particular type of service.
[0091] At step 304, the third network function determines, based on the first information, a first policy to be applied to either tethering traffic in a session or tethering traffic for one or more services in the session. The first policy may indicate that a second network function should report information relating either to detected tethering events in the session or to detected tethering events for the one or more services in the session. For example, the first policy may indicate that the second network function should report to the third network function when tethering events for the first service start and/or stop.
[0092] For example, in some embodiments, a currently defined rule such as a PCC rule or a session rule, may be extended to create the first rule such that the first rule further comprises an attribute that defines that a second network function should report information relating either to detected tethering events in the session or to detected tethering events for the one or more services in the session.
[0093] For example, a PCC rule may be extended such that it comprises a tetheringReporting attribute. This tetheringReporting attribute may indicate that the SMF is to detect and report tethered traffic associated with the PCC rule. In some embodiments, the tetheringReporting attribute may further indicate that an identifier of the device and/or an identifier of the type of device that is performing the tethering is to additionally be reported by the SMF. In some embodiments, the tetheringReporting attribute.may be connected with the Application Detection and Control (ADC) feature.
[0094] For example, the type PCC rule presently defined in 3GPP TS 29.512 may be extended to define the following attribute:
TABLE-US-00011 Attribute Data name type Cardinality Description Applicability tether- Enum 0 means no Tethering ingReporting 0, 1, 2 tethering detection 1 means tethering is reported 2 means tethering is reported including deviceId
[0095] It will be appreciated that alongside this provision of an extended first rule, application detection may also be requested for the first service. This request for application detection may be implemented using standard 3GPP mechanisms (for example, comprising a PCT APP_STA/APP_STO).
[0096] In some embodiments, Application Detection Information IE within Usage Report IE presently defined in 3GPP TS 29.244 may be extended to define the following further information element (IE):
TABLE-US-00012 Information elements P Condition / Comment Appl. Tethering O When present, this IE shall contain the X X X Tethering Information tethering information for the detected Information application. It shall be present, when reporting the start of an application, if the Reduced Application Detection Information flag was not set in the Measurement Information and if the tethering reporting is enabled in the corresponding URR.
[0097] The Tethering Information IE within the Application Detection Information IE may be defined as follows:
TABLE-US-00013 Octet 1 and 2 Tethering Information IE Type = X (decimal) Octets 3 and 4 Length = n Information elements Appl. Sx Sx Sx P Condition / Comment a b c N4 IE Type Tethering C When present, this IE shall identify the X X X Tethering Device ID Tethering Device Identifier for which a start or Device ID stop of traffic is reported. It shall be present, when reporting the start of an application, if the Reduced Application Detection Information flag was not set in the Measurement Information, if the tethering reporting is enabled in the corresponding URR and if tethering reporting indicated the need to report the Tethering Device. Flow O When present, this IE shall contain the flow X X X Flow Information information for the tethering device. Information Device Type ID C When present, this IE shall identify the Device X X X Device Type Type for which a start or stop of traffic is ID reported. It shall be present, when reporting the start of an application, if the Reduced Application Detection Information flag was not set in the Measurement Information, if the tethering reporting is enabled in the corresponding URR and if tethering reporting indicated the need to report the Device Type.
[0098] At step 306, the third network function transmits to a second network function a first request to report information related either to detected tethering events in the session or to detected tethering events for the one or more services in the session. That is, the second network function may be requested to report information relating to any tethering traffic in the session (regardless of the service consumed), or to report information relating to tethering traffic consuming only specific services.
[0099] In some embodiments, the method 300 may further comprise the step of transmitting a first rule to a second network function, wherein the first rule is to be applied to either traffic of the session or traffic for one or more services in the session, and wherein the first rule is based at least in part on the first policy. It will be appreciated that the first rule may be a legacy rule, that is, to be applied to all traffic consumed by the UE, regardless whether the traffic is tethered or not tethered.
[0100] As described above with reference to
[0101] In some embodiments, the method 300 may further comprise the step of transmitting the first rule and the first request as part of a first message, wherein the first message comprises a response to a request to create or update the session. For example, the first request and first rule may be transmitted as part of a Ncpf_SMPolicyControl_Create response message.
[0102] As described above, the first request may comprise a request to report one or more of: a device identification (for example, a deviceID) of any device performing tethering events either in the session or for the one or more services in the session; and a device type of any device performing tethering events either in the session or for the one or more services in the session (for example, a laptop device, a smart 4K TV device).
[0103] In some embodiments, the method 300 may further comprise the step of receiving tethering information from the second network function related to a first tethering event at a first device, wherein the first tethering event is either in the session or for the one of the one or more services in the session. The tethering information may be defined as described above with reference to
[0104] It will be appreciated that, with reference to the method of
[0105] It will be appreciated that the format of the first request, the first rule and the tethering may be modified at the second network function. For example, the format of the first request may be different in step 202 of
[0106] In some embodiments, the method 300 may further comprise the step of determining a second policy based on the tethering information and the first information, and updating the first rule, based on the second policy, to form a second rule, wherein the second rule comprises at least one tethering policy to be applied to tethering traffic of the first tethering event, and at least one traffic policy to be applied to other non-tethering traffic in the session or other non-tethering traffic for the one or more services in the session.
[0107] For example, in embodiments in which the first rule comprises a PCC rule, the PCC rule may be extended such that it comprises one or more attributes that map to one of more policies to be applied to tethering traffic in the session.
[0108] For example, the PCC rule may comprise one or more of the following attributes, refQosTethData, refChgTethData, refUmTethData and refTcTethData.
[0109] The data type PccRule as presently defined in 3GPP TS 29.512 may be extended to define the attributes refQosTethData, refChgTethData, refUmTethData and refTcTethData as follows:
TABLE-US-00014 Attribute Data name type Cardinality Description Applicability refQosTethData map(QosData) A reference to the QosData Tethering policy decision type only applicable to tethered traffic. The key used in this map for each entry is the qosId attribute of the corresponding QosData. refTcTethData map(TrafficControlData) A reference to the 1 . . . N TrafficControlData policy decision type only applicable to the tethered traffic. The key used in this map for each entry is the tcId attribute of the corresponding TrafficControlData. refChgTethData map(ChargingData) A reference to the Tethering ChargingData policy decision type only applicable to tethered traffic. The key used in this map for each entry is the chgId attribute of the corresponding ChargingData refUmTethData map(UsageMonitoringData) A reference to the Tethering UsageMonitoringData policy decision type only applicable to tethered traffic. The key used in this map for each entry is the umId attribute of the corresponding UsageMonitoringData.
[0110] Each of the attributes refQosTethData, refChgTethData, refUmTethData and refTcTethData may map to one or more policies (e.g. defined by instances of QoSdata, ChgData, TethData and UsageMonitoringData respectively). That is, in some embodiments, the at least one tethering policy comprises one or more of: one or more traffic control policies to be applied to tethering traffic, one or more quality of service policies to be applied to tethering traffic, one or more charging policies to be applied to tethering traffic, and one or more usage monitoring policies to be applied to tethering traffic.
[0111] As an example, the at least one tethering policy may comprise a first traffic control policy, wherein the first traffic control policy comprises a policy to block at least some of the tethering traffic. For example, the tethering policy may indicate that the first service is to be blocked if the service is consumed for two or more devices behind the UE.
[0112] In some embodiments, the one or more attributes that define each of one of more policies to be applied to tethering traffic in the session may further comprise one or more conditions, wherein the one or more conditions indicate that the relevant policy should only be applied to tethering traffic when the one or more conditions have been fulfilled. For example, an instance of QosData (it will be appreciated that refQosTethData may map to a plurality of QosData instances) may comprise a condition that defines that the corresponding quality of service policy should only be applied to tethered traffic for devices that are of a certain device types. That is, the provision of a conditional attribute in such a manner may enable more granular enforcement to be applied to tethering traffic that is based on certain conditions.
[0113] For example, an instance of data type QosData as presently defined in 3GPP TS 29.512 may be extended to define the following attributes to indicate that the relevant policy (as otherwise defined in the instance of QoSData) should only be applied to tethering traffic when one or more conditions have been fulfilled:
TABLE-US-00015 Attribute Data name type P Cardinality Description Applicability deviceId String O 0 . . . 1 Device Identifier Tethering If deviceId is present the Tethering QoS policy decision is applied only to that deviceId (as previously reported by SMF) deviceType String O 0 . . . 1 Device Type Tethering If deviceType is present the Tethering QoS policy decision is applied only to that deviceType numberTethDevices ConditionType O 0 . . . 1 This policy decision applies Tethering when the condition about the number of ongoing devices is fulfilled. e.g. numberTethDevices >2 or <=3)
[0114] For example, the data type TrafficControlData as presently defined in 3GPP TS 29.512 may be extended to define the following attributes to indicate that the relevant policy (as otherwise defined in the instance of TrafficControlData) should only be applied to tethering traffic when one or more conditions have been fulfilled:
TABLE-US-00016 Attribute Data name type P Cardinality Description Applicability deviceId String O 0 . . . 1 Device Identifier Tethering If deviceId is present the Tethering TrafficControl policy decision is applied only to that deviceId (as previously reported by SMF) deviceType String O 0 . . . 1 Device Type Tethering If deviceType is present the Tethering Traffic policy decision is applied only to that deviceType numberTethDevices ConditionType O 0 . . . 1 This policy decision Tethering applies when the condition about the number of ongoing devices is fulfilled. Eg. numberTethDevices >2 or <=3)
[0115] For example, the data type ChargingData as presently defined in 3GPP TS 29.512 may define the following attributes to indicate that the relevant policy (as otherwise defined in the instance of Charging Data) should only be applied to tethering traffic when one or more conditions have been fulfilled:
TABLE-US-00017 Attribute Data name type P Cardinality Description Applicability deviceId String O 0 . . . 1 Device Identifier Tethering If deviceId is present the Tethering Charging policy decision is applied only to that deviceId (as previously reported by SMF) deviceType String O 0 . . . 1 Device Type Tethering If deviceType is present the Tethering Charging policy decision is applied only to that deviceType numberTethDevices ConditionType O 0 . . . 1 This policy decision Tethering applies when the condition about the number of ongoing devices is fulfilled. Eg. numberTethDevices >2 or <=3)
[0116] For example, the data type UsageMonitorData as presently defined in 3GPP TS 29.512 may define the following attributes to indicate that the relevant policy (as otherwise defined in the instance of UsageMonitoringData) should only be applied to tethering traffic when one or more conditions have been fulfilled:
TABLE-US-00018 Attribute Data name type P Cardinality Description Applicability deviceId String O 0 . . . 1 Device Identifier Tethering If deviceId is present the Tethering UsageMonitoring policy is applied only to that deviceId (as previously reported by SMF) deviceType String O 0 . . . 1 Device Type Tethering If deviceType is present the Tethering UsageMonitoring policy is applied only to that deviceType numberTethDevices ConditionType O 0 . . . 1 This policy decision applies Tethering when the condition about the number of ongoing devices is fulfilled. Eg. numberTethDevices >2 or <=3)
[0117] That is, in some embodiments, each of the at least one tethering policy to be applied to the tethering traffic may comprise one of more of: an identification of one or more devices to which the tethering policy is to be applied, an indication that the tethering policy is to be applied to all tethered traffic, a list of device types either allowed to tether for the session or allowed to tether for the one or more services in the session, and a condition relating to a number of tethered devices, wherein the tethering policy is to be applied when the condition is fulfilled.
[0118] The skilled person will appreciate that a session rule may be extended in a similar manner to as described above to define one of more policies to be applied (potentially conditionally) to tethering traffic in the session. It will be appreciated that support of PCC and Session rule extensions may be negotiated between SMF and PCF, for example, with a new supported feature Tethering.
[0119] In some embodiments, the method 300 may further comprise the step of transmitting the second rule to the second network function.
[0120] It will therefore be appreciated that the formation of the second rule comprising at least one tethering policy to be applied to tethering traffic of the first tethering event, and at least one traffic policy to be applied to other non-tethering traffic in the session or other non-tethering traffic for the one or more services in the session, enables different enforcements to be applied to non-tethering and tethering traffic of the first service via the provision of a single rule. For example, the third network function may install a single rule for a first service that defines a first quality of service policy to be applied to non-tethering traffic, and a second quality of service policy to be applied to tethering traffic.
[0121] It will also be appreciated that in embodiments in which the reporting of information related to detected tethering events in the session is requested, receipt of this information may enable the third network function (for example, the PCF) to request dynamically different enforcement to be applied to be applied to each different device performing tethering behind the UE. For example, on reception of a device identification and a device type for the first device, the PCF may request an enforcement to be applied to the first device that is based on network operator policies specifically relating to devices of the device type.
[0122] In general network operator policies may depend one or more of: a number of devices tethering behind the first device, the types of devices tethering behind the first device, the time at which tethering is being performed, the location of the first device, the access type of the first device, and the RAT-type being used by the first device.
[0123] Additionally, the provision of the tethering information and the first information to the third network function may enable the third network function to make dynamic policy decisions that are to be applied to tethering and non-tethering traffic in a session.
[0124]
[0125] At step 402, the second network function transmits, to a first network function, a first request to report information related to either detected tethering events in a session or detected tethering events for one or more services in the session. In some embodiments, the second network function first receives, from the third network function, the first request to report information related to either detected tethering events for the session or detected tethering events for the one or more services in the session. As previously described the format of the first request may be changed at the second network function. In particular, the first request may be transmitted to the first network function as part of a PFCP Session Modification Request. The first request may be received from the third network function as part of an Npcf_SMPolicyControl_Create response.
[0126] In some embodiments, the first request may be defined as described above with reference to
[0127] In some embodiments, in which a PCC rule is installed with a new attribute for reporting, and application detection is requested for a corresponding application identification (appId) following standard 3GPP mechanisms (for example, including a PCT APP_STA/APP_STO), the SMF may include, in an activation report of application traffic, extended information related to tethering. In some embodiments, the extended information may comprise information such as an identifier of the device performing the detected tethering and/or the type of the device performing the detected tethering. In some embodiments, the extended information be comprised in an AppDetectionInfo attribute.
[0128] For example, the data type AppDetectionInfo as presently defined in 3GPP TS 29.512 may be extended to define the following attributes:
TABLE-US-00019 Attribute Data name type P Cardinality Description Applicability tethering boolean O 0 . . . 1 Indicates if the detected Tethering application is using tethering or not. Set to true if tethering is detected; otherwise set to false. Default value false deviceId String O 0 . . . 1 Device Identifier Tethering deviceType String O 0 . . . 1 Device Type Tethering
[0129] In some embodiments, in order to transmit the first request from the second network function to the first network function, the update URR IE within a PFCP Session Modification Request as presently defined in 3GPP TS 29.244 may be extended as follows (extension indicated in bold type):
TABLE-US-00020 Measurement C This IE shall be included if any of the following Measurement Information flag is set to 1. Information Applicable flags are: X X X Measurement Before QoS Enforcement Flag: this flag shall be set to 1 if the traffic usage before any QoS Enforcement is requested to be measured. Inactive Measurement Flag: this flag shall X X be set to 1 if the measurement shall be paused (inactive). The measurement shall be performed (active) if the bit is set to 0 or if the Measurement Information IE is not present in the Create URR IE. Reduced Application Detection X X Information Flag: this flag may be set to 1, if the Reporting Triggers request to report the start or stop of application, to request the UP function to only report the Application ID in the Application Detection Information, e.g. for envelope reporting. Immediate Start Time Metering Flag: this X X X flag may be set to 1 if time-based measurement is used and the UP function is requested to start the time metering immediately at receiving the flag. . . Measurement of Number of Packets X X X X Flag: this flag may be set to 1 when the Volume-based measurement applies, to request the UP function to report the number of packets in UL/DL/Total in addition to the measurement in octet. Tethering Detection Information Flag: X X this flag may be set to 1, if the X Reporting Triggers request to report the start or stop of application, and specifically to request the UP function to report Tethering detection information in the Application Detection Information Tethering Device Identifier Flag: this X X flag may be set to 1, if the Reporting Triggers request to report the Tethering Device Identifier in the Application Detection Information Tethering Device Type Flag: this flag may X X be set to 1, if the Reporting Triggers request to report the Tethering Device Type in the Application Detection Information
[0130] In some embodiments, in order to transmit the first request from the second network function to the first network function, the Create URR IE within the PFCP Session Establishment Request as presently defined in 3GPP TS 29.244 may be extended as follows (extension indicated in bold type):
TABLE-US-00021 Measurement C This IE shall be included if any of the following Measurement Information flag is set to 1. Information Applicable flags are: X X X Measurement Before QoS Enforcement Flag: this flag shall be set to 1 if the traffic usage before any QoS Enforcement is requested to be measured. Inactive Measurement Flag: this flag shall X X be set to 1 if the measurement shall be paused (inactive). The measurement shall be performed (active) if the bit is set to 0 or if the Measurement Information IE is not present in the Create URR IE. Reduced Application Detection X X Information Flag: this flag may be set to 1, if the Reporting Triggers request to report the start or stop of application, to request the UP function to only report the Application ID in the Application Detection Information, e.g. for envelope reporting. Immediate Start Time Metering Flag: this X X X flag may be set to 1 if time-based measurement is used and the UP function is requested to start the time metering immediately at receiving the flag. . . Measurement of Number of Packets X X X X Flag: this flag may be set to 1 when the Volume-based measurement applies, to request the UP function to report the number of packets in UL/DL/Total in addition to the measurement in octet. Tethering Detection Information Flag: X X this flag may be set to 1, if the Reporting Triggers request to report the start or stop of application, and specifically to request the UP function to report Tethering detection information in the Application Detection Information Tethering Device Identifier Flag: this X X flag may be set to 1, if the Reporting Triggers request to report the Tethering Device Identifier in the Application Detection Information Tethering Device Type Flag: this flag X X may be set to 1, if the Reporting Triggers request to report the Tethering Device Type in the Application Detection Information
[0131] That is, as previously mentioned, the first request may further comprise a request to establish or modify the session. However, it will be appreciated that the first request may be transmitted separately from a request to establish or modify the session.
[0132] In some embodiments, the method 400 further comprises further comprises receiving, from the third network function a first rule. The first rule may be defined as described above with reference to
[0133] In some embodiments, for example those in which the first request comprises a request to establish or modify the session, the step of applying the first rule to traffic in the session or to traffic for the one or more services in the session may comprise basing the request to establish or modify the session on the first rule. For example, in some embodiments, the PFCP protocol may be extended with a new Tethering Rules IE in a Create/Modify PDR IE at the PFCP Session Establishment/Modification Request, in order to indicate the tethering policies on a per service basis.
[0134] At step 404, the second network function receives a first message from the first network function, the first message comprising tethering information related to either a first tethering event in the session at a first device or a first tethering event for one of the one or more services in the session at a first device. The tethering information may be defined as described above with reference to
[0135] In some embodiments, the method 400 further comprises transmitting the tethering information to a third network function. The third network function may comprise a PCF, for example. This enables the third network function to form a second rule that is based at least in part on the transmitted tethering information, as described in greater detail with reference to
[0136] In some embodiments, the method 400 further comprises further comprises receiving, from the third network function a second rule to apply to traffic for the session and applying the second rule either to traffic in the session or to traffic for the one or more services in the session. The second rule may be defined as described above with reference to
[0137] It will be appreciated that this application of the second rule enables different enforcements to be applied to non-tethering and tethering traffic of the first service. For example, the second rule may indicate that, for a first service, a first quality of service policy is to be applied to non-tethering traffic, and a second quality of service policy is to be applied to tethering traffic.
[0138] In some embodiments, the step of applying the second rule may comprise transmitting, to the first network function, a third request to modify the session based on the second rule.
[0139]
[0140] In step 502, the fourth network function transmits, to a third network function, policy information relating at least in part to tethering events, wherein the policy information comprises one or more of: an identification (for example, an appID) of one or more services to which a first part of the policy information applies, an indication as to whether tethering is allowed for the session or allowed for the one or more services, a maximum number of devices allowed to tether for the session or allowed to tether for the one or more services, and a list of device types (for example, a laptop device, a smart TV 4K device) allowed to tether for the session or allowed to tether for the one or more services.
Static Embodiments
[0141] It will be appreciated that in some embodiments, there may be no need to apply enforcements to the tethering traffic of a session that are dependent on dynamic conditions that may change during a PDU session lifecycle. That is, there may be no need to apply enforcements to the tethering traffic of a session that depend on factors such as, for example, time, location of the first device, access type of the first device or RAT-type associated with the first device. In these embodiments, there may therefore be no requirement to forward tethering information from the second network function to the third network function.
[0142] Therefore, in these embodiments, the method 400 as described with reference to
[0143] The at least one tethering policy in the second rule may be defined as described above with reference to
[0144] In these embodiments, the method 400 may further comprise receiving the second rule from a third network function. In these examples, the second network function may receive only the second rule from the third network function. Therefore the only rule transmitted to the second network function may comprise at least one tethering policy to be applied to the tethering traffic for the first tethering event, and at least one traffic policy to be applied to either other non-tethering traffic in the session or other non-tethering traffic for the one or more services in the session.
[0145] However, in some examples, the second network function may provide two different rules to the first network function. In other words, initially the second network function may assume that no tethering traffic is occurring, and may first transmit a first rule to the third network function, wherein the first rule is based on the traffic policy as defined in the second rule received from the third network function.
[0146] Then, responsive to receiving the tethering information from the first network function, the second network function may transmit a second rule to the first network function, where the second rule comprises the at least one tethering policy to be applied to the tethering traffic for the first tethering event as received in the second rule from the third network function.
[0147] An example of this implementation of the method of
[0148] As noted above, in some embodiments, there may be no need to apply enforcements to the tethering traffic of a session that are dependent on dynamic conditions that may change during a PDU session lifecycle. That is, there may be no need to apply enforcements to the tethering traffic of a session that depend on factors such as time, location of a UE, access type or RAT-type, for example. In these embodiments, there is no requirement to forward tethering information from the second network function to the third network function and/or to transmit tethering information from the first network function to the second network function.
[0149]
[0150] At step 602, the third network function obtains first information for use in determining policies to be applied to traffic. As noted above, in some embodiments, at least part of the first information may be received from a fourth network function.
[0151] At step 604, the third network function determines, based on the first information, a first policy to be applied to traffic of a session.
[0152] At step 606, the third network function transmits, to a second network function, a rule comprising at least one tethering policy to be applied to tethering traffic, and at least one traffic policy to be applied to other non-tethering traffic, wherein the rule is determined based on the first policy. The at least one tethering policy may be defined as described above with reference to
[0153] In some embodiments, the rule may comprise a policy and charging control, PCC, rule or a session rule.
[0154]
[0155] At step 702, the first network function receives, from a second network function, a request to create or update a session based on a rule, wherein the rule comprises at least one tethering policy to be applied to tethering traffic, and at least one traffic policy to be applied to other non-tethering traffic. Each of the at least one tethering policy to be applied to the tethering traffic comprises one of more of: an identification of one or more devices to which the tethering policy is to be applied; an indication that the tethering policy is to be applied to all tethered traffic; a list of device types either allowed to tether for the session or allowed to tether for the one or more services in the session; and a condition relating to a number of tethered devices, wherein the tethering policy is to be applied when the condition is fulfilled.
[0156] It will be appreciated that this step enables the first network function to apply the at least one tethering policy to tethering traffic, and to apply the at least one traffic policy to either other non-tethering traffic.
[0157] In some embodiments, the at least one tethering policy to be applied to tethering traffic may be applied to tethering traffic either in the session or for the one or more services in the session, and the at least one traffic policy to be applied to other non-tethering traffic may be applied to non-tethering traffic either in the session or for the one or more services in the session.
[0158] In some embodiments, the rule may comprise a policy and charging control, PCC, rule or a session rule.
[0159]
[0160] In step 802 the second network function transmits, to the first network function, a request to create or update a session based on a rule, wherein the rule comprises at least one tethering policy to be applied to tethering traffic, and at least one traffic policy to be applied to other non-tethering traffic. Each of the at least one tethering policy to be applied to the tethering traffic comprises one of more of: an identification of one or more devices to which the tethering policy is to be applied; an indication that the tethering policy is to be applied to all tethered traffic; a list of device types either allowed to tether for the session or allowed to tether for the one or more services in the session; and a condition relating to a number of tethered devices, wherein the tethering policy is to be applied when the condition is fulfilled.
[0161] To exemplify the embodiments described above in
[0162]
[0163] This sequence diagram illustrates how different charging may be dynamically applied by a PCF for traffic for a first service, depending on whether the traffic is consumed directly by a UE (in which case, RatingGroup1 is to be applied), by a laptop device tethering behind the UE (in which case, RatingGroup2 is to be applied), or by a 4K smart TV tethering behind the UE (in which case, RatingGroup3 is to be applied).
[0164] In this illustrated embodiment, it will be appreciated that the time and the location of the UE impacts the charging that is applied to the traffic of the devices that are tethering behind the UE.
[0165] In this illustrated embodiment, tethering policy data is provisioned in the UDR as subscriber policy data, and as network operator policies configured in PCF. Additionally, the PDU session establishment new supported feature tethering (as described above) may have been negotiated between PCF and SMF.
[0166] Additionally, in this illustrated embodiment, policies associated to the first service are configured in PCF. These policies select the charging to apply when tethering is detected are based on the time, the number of devices tethering behind the UE, and device type of the device performing the detected tethering.
[0167] Furthermore, at PFCP Association procedure between UPF and SMF entities, the existing mechanism may be extended to report UPF capabilities with a new capability (Tethering detection and enforcement). It will be appreciated that this would allow SMF to know which UPFs support this capability, and may influence UPF selection.
[0168] At step 901, the SMF transmits a request for the establishment of a PDU session for a UE for a given Single Network Slice Selection Assistance Information (S-NSSAI)/Data Network Name (DNN), to the PCF.
[0169] At step 902, the PCF transmits, to the UDR, a request to obtain policy information relating at least in part to tethering events. It will be appreciated that the obtained policy information may form at least part of obtained first information for use in determining policies to be applied to traffic.
[0170] In this illustrated embodiment, the policy information comprises session management policy data, and this session management policy data comprises tethering subscription data. It will be appreciated that the tethering subscription data may relate to the NSSAI/DNN combination and/or relate to one or more services. It will also be appreciated that the tethering subscription data may also comprise information relating to a maximum number of devices that are permitted to tether (behind the UE) and/or types of devices that are permitted to tether (behind the UE).
[0171] It will be appreciated that in some embodiments, at least part of the first information may be based on a network operator policy configured in the PCF. In this illustrated embodiment, a network operator policy has been configured in PCF to provide different rating groups for the first service that depends on the type of device executing the first service, and the time at which the execution occurs.
[0172] At step 903, the UDR transmits, to the PCF, the policy information relating at least in part to tethering events. In this illustrated embodiment, the UDR executes step 903 by transmitting a Nudr_DataRepository_Query response message to the PCF. The Nudr_DataRepository_Query response message may comprise the Tethering attribute as defined above.
[0173] That is, at step 903, the PCF obtains (part of) the first information for use in determining policies to be applied to traffic.
[0174] At step 904, based on the first information (e.g. the received tethering subscription data and the configured network operator policies), the PCF makes a policy decision and determines to install a first PCC rule. In this illustrated embodiment, the installed first PCC rule determines that a certain Rating Group (RG1) should be applied to the traffic that is consumed for the first service. In other words, this first PCC rule is a legacy rule that is to be applied to all traffic that is consumed by the UE for the first service, regardless of whether that traffic is tethered or not.
[0175] In other words, although the received tethering subscription data contains information which could be implemented as a policy by the PCF at this stage, the PCF may be considered to assume that, as there is not yet any indication of tethering occurring at the UE, the policy may be focused on tethering traffic, and may be updated as and when tethering traffic is detected.
[0176] Additionally, at step 904, the PCF activates an application traffic reporting notification, such that when tethering that is being performed at the UE for the first service, the tethering is reported. This may be executed extending the PCC rule to include the tetheringReporting attribute (as defined above). Additionally, the PCC rule may include the PCT event triggers APP_STA and APP_STO for the PDU session.
[0177] At step 905, the PCF transmits to the SMF a first request to report information related to detected tethering events for the first service in the session. Step 805 corresponds to step 306 of
[0178] In this illustrated embodiment, the PCF executes the first message by transmitting a Npcf_SMPolicyControl_Create response message to the SMF. As noted above, in this illustrated embodiment, the Npcf_SMPolicyControl_Create response message comprises the first PCC rule, wherein the first PCC rule comprises the tetheringReporting attribute (as defined above), and the appId identifying the first service. However, it will be appreciated that in some embodiments, the Npcf_SMPolicyControl_Create response message may additionally or alternatively comprise a session rule, which may indicate that the defined enforcements are to be applied to the traffic regardless of the service being consumed.
[0179] At step 906, based on the received first PCC rule, the SMF transmits a first request to report information related to detected tethering events for the first service in the session, to the UPF. Step 906 corresponds to step 402 in
[0180] It will be appreciated, in this illustrated embodiment, the PFCP Session Establishment/Modification Request message further comprises the first PCC rule. However, in this stage the first PCC rule is transmitted in the format of the relevant PDRs/FARs/QERs/URRs to be applied to the traffic.
[0181] In this example, the PFCP Session Establishment/Modification Request message comprises a PDR (e.g. PDR1) with PDI of type application with appId that identifies the first service, and a FAR, a QER and a URR that correspond to PDR1 (for example, FAR1, QER1 and URR1) that are based on the received first PCC rule.
[0182] That is, in this illustrated embodiment, the PFCP protocol has been extended by extending the application start event to include a request for the UPF to report to the SMF when tethering is detected.
[0183] It will be appreciated in some embodiments, rather extending an application start event to include a request for the UPF to report to the SMF when tethering is detected, a new tethering event message may be defined separately that comprises a request for the UPF to report to the SMF when tethering is detected. It will be appreciated that such a tethering event message may further comprise tethering related information as defined above for the application start event.
[0184] At step 907, the UPF, detects a first tethering event at a first device for the first service. Step 807 corresponds to step 204 of
[0185] In this illustrated embodiment, the device that is performing the tethering behind the UE is a laptop device.
[0186] At step 808, the UPF transmits a first message to the SMF, wherein the first message comprises tethering information related to the first tethering event. That is, the UPF reports information related to detected tethering events for the first service in the session to the SMF. Step 808 corresponds to step 206 of
[0187] In this illustrated embodiment, the UPF informs the SMF that a tethering event has been detected for the first service by transmitting a PFPC Session Report Request message to the SMF. This PFPC Session Report Request message comprises the appId of the first service, and tethering information relating to the detected tethering event, including an identifier of the device (device_1) performing the tethering and the type of detected device (a laptop device).
[0188] At step 909, the SMF transmits the tethering information to the PCF. That is, upon reception of a notification that a tethering event has been detected for the first service, SMF forwards this notification to the PCF. In this illustrated embodiment, the SMF executes this by transmitting a Npcf_SMPolicyControl_Update request to the PCF. The Npcf_SMPolicyControl_Update request comprises the appId of the first service, and tethering information relating to the detected tethering event, including an identifier of the device (device_1) performing the tethering and the type of detected device (a laptop device).
[0189] At step 810, the PCF determines a second policy based on the received tethering information and the first information, and updates the first PCC rule, based on the second policy, to form a second PCC rule, wherein the second PCC rule comprises at least one tethering policy to be applied to tethering traffic of the first tethering event, and at least one traffic policy to be applied to other non-tethering traffic in the session or other non-tethering traffic for the one or more services in the session.
[0190] In this illustrated embodiment, the PCF makes a policy decision based on the number of devices presently tethering (which may be determined based on the received tethering information), the device type of the first device and the time, and determines to apply a different rating group (RG2) to the first device. In this illustrated embodiment, this is achieved by adding a new attribute refChgTethData to the PCC rule, which points to the associated attribute ChargingData which identifies that ratingGroup=RG_2 (which identifies Rating Group 2) is to be applied to deviceId=device_1 (which identifies the first device).
[0191] At step 811, the PCF transmits the second PCC rule to the SMF. In this illustrated embodiment, this is executed by transmitting a Npcf_SMPolicyControl_Update response message to the SMF. In this example, the pcf_SMPolicyControl_Update response message comprises the second PCC rule comprising the refChgTethData attribute as defined above.
[0192] At step 912, the SMF reads the updated information in the second PCC rule, and determines to apply a different policy (in this case, applying Rating Group 2) for the tethered traffic of the first device based on the updated information.
[0193] At step 913, the SMF applies the second PCC rule to traffic for the session. In this illustrated embodiment, this is executed by transmitting a PFCP Session Modification Request message to the UPF. The PFCP Session Modification Request message comprises the deviceId of the first device, and the policy that is to be applied to the tethered traffic from the first device. In this illustrated embodiment, the PFCP Session Modification Request message comprises relevant PDRs/FARs/QERs/URRs to be applied to the tethered traffic of the first device that are based on the second rule.
[0194] At step 914, the UPF, detects a second tethering event at a second device for the first service. In some embodiments, the UPF may use TCP Options (for example, timestamp) to identify the second device.
[0195] In this illustrated embodiment, the second device that is performing the tethering behind the UE is a smart 4K TV device.
[0196] At step 915, the UPF transmits a second message to the SMF, wherein the second message comprises tethering information related to the second tethering event.
[0197] In this illustrated embodiment, the UPF informs the SMF that a second tethering event has been detected for the first service by transmitting a PFPC Session Report Request message to the SMF. This PFPC Session Report Request message comprises the appId of the first service, and tethering information relating to the second tethering event, including an identifier of the device (device_2) doing tethering and the type of detected device (a smart 4K TV device).
[0198] At step 916, the SMF transmits the tethering information to the PCF. That is, upon reception of a notification that a tethering event has been detected for the first service, SMF forwards this notification to the PCF. In this illustrated embodiment, the SMF executes this by transmitting a Npcf_SMPolicyControl_Update request to the PCF. The Npcf_SMPolicyControl_Update request comprises the appId of the first service, and tethering information relating to the detected second tethering event, including an identifier of the device (device_2) doing tethering and the type of detected device (a smart 4K tv device).
[0199] At step 917, the PCF determines a third policy based on the further received tethering information and the first information, and updates the second PCC rule, based on the third policy, to form a third PCC rule, wherein the third PCC rule comprises at least one tethering policy to be applied to tethering traffic of the first tethering event, and at least one traffic policy to be applied to other non-tethering traffic in the session or other non-tethering traffic for the one or more services in the session.
[0200] In this illustrated embodiment, the PCF makes a policy decision based on the number of devices presently tethering (as determined from the further received tethering information), the device type of the second device, and the time, and determines to apply a different rating group (RG3) to the second device. In this illustrated embodiment, this is achieved by updating the ChargingData attribute such that the attribute additionally specifies that ratingGroup=RG_3 (which identifies Rating Group 3) is to be applied to the tethering traffic for deviceId=device_2 (which identifies the second device).
[0201] At step 818, the PCF transmits the third PCC rule to the SMF. In this illustrated embodiment, this is executed by transmitting a Npcf_SMPolicyControl_Update response message to the SMF. In this example, the Npcf_SMPolicyControl_Update response message comprises the third PCC rule.
[0202] At step 819, the SMF reads the updated information in the third PCC rule, and determines to apply Rating Group 3 to the tethered traffic of the second device, for the first service.
[0203] At step 820, the SMF applies the third PCC rule to traffic for the session. In this illustrated embodiment, this is executed by transmitting a PFCP Session Modification Request message to the UPF. The PFCP Session Modification Request message comprises the deviceId of the second device, and the policy that is to be applied to the tethered traffic from the second device, for the first service. In this illustrated embodiment, the PFCP Session Modification Request message comprises relevant PDRs/FARs/QERs/URRs to be applied to the tethered traffic of the second device for the first service that are based on the third rule.
[0204]
[0205] It will be appreciated that in some embodiments, there may be no need to apply enforcements to the tethering traffic of a session that are dependent on dynamic conditions that may change during a PDU session lifecycle. That is, there may be no need to apply enforcements to the tethering traffic of a session that depend on factors such as time, location of a UE, access type or RAT-type, for example.
[0206] In such embodiments, the PCF will therefore not require (from the SMF) notifications relating to tethered traffic for a first service, which may include information relating to device type, or a device identifier, for example. In such embodiments, the PCF may decide at PDU session establishment (or when appropriate) to install the aforementioned tethering extensions in the PCC rules. These tethering extensions comprise the different enforcements that the SMF is to apply to tethered and non-tethered traffic. In some embodiments, the tethering extensions may additionally comprise conditions that are to be fulfilled in order for the enforcements to be applied (such as device type and a total number of devices tethering, for example).
[0207] In the illustrated example, the SMF then applies the tethering extension to the PCC rule dynamically (i.e. it requests to be notified of tethering events, and applies tetering policies based on the PCC rule received from the PCF dynamically). It will however, be appreciated that in some circumstances the SMF may also apply a PCC rule statically (i.e. without requiring any notification of tethering events from the UPF).
[0208] In the example of
[0209] In this illustrated embodiment, tethering policy data is provisioned in UDR as subscriber policy data, and as network operator policies configured in PCF. Additionally, the PDU session establishment new supported feature tethering (as described above) may have been negotiated between PCF and SMF.
[0210] Additionally, in this illustrated embodiment, policies associated to the first service are configured in PCF. These policies select the charging to apply when tethering is detected are based on the time, the number of devices tethering behind the UE, and device type of the device performing the detected tethering.
[0211] Furthermore, at PFCP Association procedure between UPF and SMF entities, the existing mechanism may be extended to report UPF capabilities with a new capability (Tethering detection and enforcement). It will be appreciated that this would allow SMF to know which UPFs support this capability, and may influence UPF selection.
[0212] At step 1001, the SMF transmits a request for the establishment of a PDU session for a UE for a given S-NSSAI/DNN to the PCF.
[0213] At step 1002, the PCF transmits, to the UDR, a request to obtain policy information relating at least in part to tethering events. It will be appreciated that the obtained policy information may form at least part of obtained first information for use in determining policies to be applied to traffic.
[0214] In this illustrated example, the policy information comprises session management policy data, wherein the session management policy data comprises tethering subscription data. It will be appreciated that the tethering subscription data may relate to the NSSAI/DNN combination and/or relate to one or more services. It will also be appreciated that the tethering subscription data may also comprise information relating to a maximum number of devices that are permitted to tether (behind the UE) and/or the types of devices that are permitted to tether (behind the UE).
[0215] It will be appreciated that in some embodiments, at least part of the first information may be based on a network operator policy configured in the PCF. In this illustrated embodiment, a network operator policy has been configured in PCF to provide different rating groups for the first service that depend on the type of device executing the first service, and the time at which this execution occurs.
[0216] At step 1003, the UDR transmits, to the PCF, policy information relating at least in part to tethering events. In this illustrated embodiment, the UDR executes step 1003 by transmitting a Nudr_DataRepository_Query response message to the PCF. The Nudr_DataRepository_Query response message may comprise the Tethering attribute as defined above.
[0217] That is, at step 1003, the PCF obtains (at least part of) the first information for use in determining policies to be applied to traffic. Step 1003 corresponds to step 603 of
[0218] At step 1004, based on received tethering subscription data and the configured operator policies, the PCF makes a policy decision and determines to install a single PCC rule. In this illustrated embodiment, the installed PCC rule indicates that a certain Rating Group (RG_10) should be applied to the traffic consumed by laptop devices tethering behind the UE, for the first service. The installed PCC rule also indicates that another Rating Group (RG_11) should be applied to the traffic consumed by smart TV devices tethering behind the UE, when less than 3 devices are tethering behind the UE.
[0219] In this illustrated embodiment, this is achieved by installing a PCC rule that comprises two different instances in the map in the attribute refChgTethData, which points to two different instances of ChargingData, that include: [0220] 1. ratingGroup=RG_10, deviceType=laptop and numberTethDevices=<3. [0221] 2. ratingGroup=RG_11, deviceType=SmartTv and nfumberTethDevices=<3
[0222] That is, at step 1004, the PCF determines, based on the first information, a first policy to be applied to traffic of a session. Step 1004 corresponds to step 604 of
[0223] At step 1005, the PCF transmits, to the SMF, a rule comprising at least one tethering policy to be applied to tethering traffic, and at least one traffic policy to be applied to other non-tethering traffic, wherein the rule is determined based on the first policy. Step 1005 corresponds to step 606 of
[0224] In this illustrated embodiment, the PCF executes this by transmitting a Npcf_SMPolicyControl_Create response message to the SMF. As noted above, in this illustrated embodiment, the Npcf_SMPolicyControl_Create response message comprises a PCC rule, wherein the PCC rule comprises the refChgTethData, which points to the two aforementioned different instances of ChargingData, and the appId identifying the first service. However, it will be appreciated that in some embodiments, the Npcf_SMPolicyControl_Create response message may additionally or alternatively comprise a session rule, which may indicate enforcements that are to be applied to the traffic regardless of the service being consumed.
[0225] At step 1006, based on the received extended PCC rule, the SMF transmits a first request to report information related to detected tethering events the first service in the session to the UPF. In this illustrated embodiment, the SMF executes this by transmitting a PFCP Session Establishment/Modification Request message to the UPF. Step 1006 corresponds to step 402 of
[0226] It will be appreciated, in this illustrated embodiment, the PFCP Session Establishment/Modification Request message comprises relevant PDRs/FARs/QERs/URRs to be applied to the traffic that are based on the rule. As mentioned above, these PDRs/FARs/QERs/URRs may be based on the traffic policy to be applied to other non-tethering traffic.
[0227] In this example, the PFCP Session Establishment/Modification Request message will comprises a PDR (e.g. PDR1) with PDI of type application with appId that identifies the first service, and a FAR, a QER and a URR that correspond to PDR1 (for example, FAR1, QER1 and URR1) that are based on the rule.
[0228] That is, in this illustrated embodiment, the PFCP protocol has been extended by extending the application start event to include a request for the UPF to report to the SMF when tethering is detected. In some embodiments, the UPF may report tethering related information to the SMF such as a number of devices that are performing tethering behind the UE, identifiers of these devices, and device type information for these devices, for example.
[0229] It will be appreciated in some embodiments, rather than extending an application start event to include a request for the UPF to report to the SMF when tethering is detected, a new tethering event message may be defined separately that comprises a request for the UPF to report to the SMF when tethering is detected. It will be appreciated that such a tethering event message may further comprise tethering related information as defined above for the application start event.
[0230] At step 1007, the UPF, detects a first tethering event at a first device for the first service. In some embodiments, the UPF may use TCP Options (for example, timestamp) to identify the first device. Step 1007 corresponds to step 204 in
[0231] In this illustrated embodiment, the first device that is performing the tethering behind the UE is a laptop device.
[0232] At step 1008, the UPF transmits a first message to the SMF, wherein the first message comprises tethering information related to the first tethering event. That is, the UPF reports information related to detected tethering events for the first service in the session to the SMF. Step 1008 corresponds to step 206 in
[0233] In this illustrated embodiment, the UPF informs the SMF that a tethering event has been detected for the first service by transmitting a PFPC Session Report Request message to the SMF. This PFPC Session Report Request message comprises the appId of the first service, and tethering information relating to the detected tethering event, including an identifier of the device (device_1) performing tethering and the type of detected device (a laptop device).
[0234] At step 1009, the SMF reads the information in the previously provisioned PCC rule, and determines to apply Rating Group 10 (RG_10) to the traffic of device_1 with deviceType=laptop for the first service, as less than 3 devices are tethering behind the UE.
[0235] At step 1010, the SMF applies the rule to traffic for the session, the rule comprising at least one tethering policy to be applied to tethering traffic, and at least one traffic policy to be applied to other non-tethering traffic, wherein the rule is determined based on the first policy. In other words, the SMF updates the PDRs/FARs/QERs/URRs such that they apply both the tethering policy that Rating Group 10 (RG_10) should apply to the traffic of device_1 with deviceType=laptop for the first service, and the at least one traffic policy.
[0236] At step 1011, the UPF, detects a second tethering event at a second device for the first service. In some embodiments, the UPF may use TCP Options (for example, timestamp) to identify the second device.
[0237] In this illustrated embodiment, the second device that is performing the tethering behind the UE is a smart 4K TV device.
[0238] At step 1012, the UPF transmits a second message to the SMF, wherein the second message comprises tethering information related to the second tethering event.
[0239] In this illustrated embodiment, the UPF informs the SMF that a second tethering event has been detected for the first service by transmitting a PFPC Session Report Request message to the SMF. This PFPC Session Report Request message comprises the appId of the first service, and tethering information relating to the detected second tethering event, including an identifier of the device (device_2) performing tethering and the type of detected device (a smart 4K TV device).
[0240] At step 1013, the SMF reads the information in the provisioned PCC rule, and determines to apply Rating Group 11 (RG11) for the traffic of device_2 with deviceType=SmartTV for the first service as less than 3 devices are tethering behind the UE.
[0241] At step 1014, the SMF applies the rule to traffic for the session, the rule comprising at least one tethering policy to be applied to tethering traffic, and at least one traffic policy to be applied to other non-tethering traffic, wherein the rule is determined based on the first policy. In other words, the SMF updates the PDRs/FARs/QERs/URRs such that they apply all of: the tethering policy that Rating Group 10 (RG_10) should apply to the traffic of device_1 with deviceType=laptop for the first service, the tethering policy that Rating Group 11 (RG_11) for the traffic of device_2 with deviceType=SmartTV for the first service, and the at least one traffic policy.
[0242]
[0243] Briefly, the processing circuitry 1101 of the first network function 1100 is configured to: [0244] receive, from a second network function, a first request to report information either related to detected tethering events in a session or related to detected tethering events for one or more services in a session; detect a first tethering event at a first device; and transmit a first message to the second network function, the first message comprising tethering information related to the first tethering event.
[0245] In some embodiments, the first network function 1100 may optionally comprise a communications interface 1102. The communications interface 1102 of the first network function 1100 can be for use in communicating with other nodes, such as other virtual nodes. For example, the communications interface 1102 of the first network function 1100 can be configured to transmit to and/or receive from other nodes requests, resources, information, data, signals, or similar. The processing circuitry 1101 of first network function 1100 may be configured to control the communications interface 1102 of the first network function 1100 to transmit to and/or receive from other nodes requests, resources, information, data, signals, or similar.
[0246] Optionally, the first network function 1100 may comprise a memory 1103. In some embodiments, the memory 1103 of the first network function 1100 can be configured to store program code that can be executed by the processing circuitry 1101 of the first network function 1100 to perform the method 200 described herein in relation to the first NF 1100. Alternatively, or in addition, the memory 1103 of the first network function 1100, can be configured to store any requests, resources, information, data, signals, or similar that are described herein. The processing circuitry 1101 of the first network function 1100 may be configured to control the memory 1103 of the first network function 1100 to store any requests, resources, information, data, signals, or similar that are described herein.
[0247]
[0248] Briefly, the processing circuitry 1201 of the third network function 1200 is configured to: [0249] obtain first information for use in determining policies to be applied to traffic; determining, based on the first information, a first policy to be applied to either tethering traffic in a session or tethering traffic for one or more services in the session, wherein the first policy indicates that a second network function should report information relating either to detected tethering events in the session or to detected tethering events for the one or more services in the session; and transmit to a second network function a first request to report information related either to detected tethering events in the session or to detected tethering events for the one or more services in the session.
[0250] In some embodiments, the third network function 1200 may optionally comprise a communications interface 1202. The communications interface 1202 of the third network function 1200 can be for use in communicating with other nodes, such as other virtual nodes. For example, the communications interface 1202 of the third network function 1200 can be configured to transmit to and/or receive from other nodes requests, resources, information, data, signals, or similar. The processing circuitry 1201 of third network function 1200 may be configured to control the communications interface 1202 of the third network function 1200 to transmit to and/or receive from other nodes requests, resources, information, data, signals, or similar.
[0251] Optionally, the third network function 1200 may comprise a memory 1203. In some embodiments, the memory 1203 of the third network function 1200 can be configured to store program code that can be executed by the processing circuitry 1201 of the third network function 1200 to perform the method 300 described herein in relation to the third network function 1200. Alternatively, or in addition, the memory 1203 of the third network function 1200, can be configured to store any requests, resources, information, data, signals, or similar that are described herein. The processing circuitry 1201 of the third network function 1200 may be configured to control the memory 1203 of the third network function 1200 to store any requests, resources, information, data, signals, or similar that are described herein.
[0252]
[0253] Briefly, the processing circuitry 1301 of the second network function 1300 is configured to: transmit, to a first network function, a first request to report information related to either detected tethering events in a session or detected tethering events for one or more services in the session; receive a first message from the first network function, the first message comprising tethering information related to either a first tethering event in the session at a first device or a first tethering event for one of the one or more services in the session at a first device.
[0254] In some embodiments, the second network function 1300 may optionally comprise a communications interface 1302. The communications interface 1302 of the second network function 1300 can be for use in communicating with other nodes, such as other virtual nodes. For example, the communications interface 1302 of the second network function 1300 can be configured to transmit to and/or receive from other nodes requests, resources, information, data, signals, or similar. The processing circuitry 1301 of second network function 1300 may be configured to control the communications interface 1302 of the second network function 1300 to transmit to and/or receive from other nodes requests, resources, information, data, signals, or similar.
[0255] Optionally, the second network function 1300 may comprise a memory 1303. In some embodiments, the memory 1303 of the second network function 1300 can be configured to store program code that can be executed by the processing circuitry 1301 of the second network function 1300 to perform the method 400 described herein in relation to the second network function 1300. Alternatively, or in addition, the memory 1303 of the second network function 1300, can be configured to store any requests, resources, information, data, signals, or similar that are described herein. The processing circuitry 1301 of the second network function 1300 may be configured to control the memory 1303 of the second network function 1300 to store any requests, resources, information, data, signals, or similar that are described herein.
[0256]
[0257] Briefly, the processing circuitry 1401 of the fourth network function 1400 is configured to: transmit, to a third network function, policy information relating at least in part to tethering events, wherein the policy information comprises one or more of: an identification of one or more services to which a first part of the policy information applies; an indication as to whether tethering is allowed for the session or allowed for the one or more services; a maximum number of devices allowed to tether for the session or allowed to tether for the one or more services; a list of device types allowed to tether for the session or allowed to tether for the one or more services.
[0258] In some embodiments, the fourth network function 1400 may optionally comprise a communications interface 1402. The communications interface 1402 of the fourth network function 1400 can be for use in communicating with other nodes, such as other virtual nodes. For example, the communications interface 1402 of the fourth network function 1400 can be configured to transmit to and/or receive from other nodes requests, resources, information, data, signals, or similar. The processing circuitry 1401 of fourth network function 1400 may be configured to control the communications interface 1402 of the fourth network function 1400 to transmit to and/or receive from other nodes requests, resources, information, data, signals, or similar.
[0259] Optionally, the fourth network function 1400 may comprise a memory 1403. In some embodiments, the memory 1403 of the fourth network function 1400 can be configured to store program code that can be executed by the processing circuitry 1401 of the fourth network function 1400 to perform the method 500 described herein in relation to the fourth network function 1400. Alternatively, or in addition, the memory 1403 of the fourth network function 1400, can be configured to store any requests, resources, information, data, signals, or similar that are described herein. The processing circuitry 1401 of the fourth network function 1400 may be configured to control the memory 1403 of the fourth network function 1400 to store any requests, resources, information, data, signals, or similar that are described herein.
[0260]
[0261] Briefly, the processing circuitry 1501 of the third network function 1500 is configured to: [0262] obtain first information for use in determining policies to be applied to traffic; determine, based on the first information, a first policy to be applied to traffic of a session; transmit, to a second network function, a rule comprising at least one tethering policy to be applied to tethering traffic, and at least one traffic policy to be applied to other non-tethering traffic, wherein the rule is determined based on the first policy.
[0263] In some embodiments, the third network function 1500 may optionally comprise a communications interface 1502. The communications interface 1502 of the third network function 1500 can be for use in communicating with other nodes, such as other virtual nodes. For example, the communications interface 1502 of the third network function 1500 can be configured to transmit to and/or receive from other nodes requests, resources, information, data, signals, or similar. The processing circuitry 1501 of third network function 1500 may be configured to control the communications interface 1502 of the third network function 1500 to transmit to and/or receive from other nodes requests, resources, information, data, signals, or similar.
[0264] Optionally, the third network function 1500 may comprise a memory 1503. In some embodiments, the memory 1503 of the third network function 1500 can be configured to store program code that can be executed by the processing circuitry 1501 of the third network function 1500 to perform the method 600 described herein in relation to the third network function 1500. Alternatively, or in addition, the memory 1503 of the third network function 1500, can be configured to store any requests, resources, information, data, signals, or similar that are described herein. The processing circuitry 1501 of the third network function 1500 may be configured to control the memory 1503 of the third network function 1500 to store any requests, resources, information, data, signals, or similar that are described herein.
[0265]
[0266] Briefly, the processing circuitry 1601 of the first network function 1600 is configured to: receive, from a second network function, a request to create or update a session based on a rule, wherein the rule comprises at least one tethering policy to be applied to tethering traffic, and at least one traffic policy to be applied to other non-tethering traffic, wherein each of the at least one tethering policy to be applied to the tethering traffic comprises one of more of: an identification of one or more devices to which the tethering policy is to be applied; an indication that the tethering policy is to be applied to all tethered traffic; a list of device types either allowed to tether for the session or allowed to tether for the one or more services in the session; a condition relating to a number of tethered devices, wherein the tethering policy is to be applied when the condition is fulfilled.
[0267] In some embodiments, the first network function 1600 may optionally comprise a communications interface 1602. The communications interface 1602 of the first network function 1600 can be for use in communicating with other nodes, such as other virtual nodes. For example, the communications interface 1602 of the first network function 1600 can be configured to transmit to and/or receive from other nodes requests, resources, information, data, signals, or similar. The processing circuitry 1601 of first network function 1600 may be configured to control the communications interface 1602 of the first network function 1600 to transmit to and/or receive from other nodes requests, resources, information, data, signals, or similar.
[0268] Optionally, the first network function 1600 may comprise a memory 1603. In some embodiments, the memory 1603 of the first network function 1600 can be configured to store program code that can be executed by the processing circuitry 1601 of the first network function 1600 to perform the method 700 described herein in relation to the first NF 1600. Alternatively, or in addition, the memory 1603 of the first network function 1600, can be configured to store any requests, resources, information, data, signals, or similar that are described herein. The processing circuitry 1601 of the first network function 1600 may be configured to control the memory 1603 of the first network function 1600 to store any requests, resources, information, data, signals, or similar that are described herein.
[0269]
[0270] Briefly, the processing circuitry 1701 of the second network function 1700 is configured to: transmit to a first network function a request to create or update a session based on a rule, wherein the rule comprises at least one tethering policy to be applied to tethering traffic, and at least one traffic policy to be applied to other non-tethering traffic, wherein each of the at least one tethering policy to be applied to the tethering traffic comprises one of more of: an identification of one or more devices to which the tethering policy is to be applied; an indication that the tethering policy is to be applied to all tethered traffic; a list of device types either allowed to tether for the session or allowed to tether for the one or more services in the session; a condition relating to a number of tethered devices, wherein the tethering policy is to be applied when the condition is fulfilled.
[0271] In some embodiments, the second network function 1700 may optionally comprise a communications interface 1702. The communications interface 1702 of the second network function 1700 can be for use in communicating with other nodes, such as other virtual nodes. For example, the communications interface 1702 of the second network function 1700 can be configured to transmit to and/or receive from other nodes requests, resources, information, data, signals, or similar. The processing circuitry 1701 of second network function 1700 may be configured to control the communications interface 1702 of the second network function 1700 to transmit to and/or receive from other nodes requests, resources, information, data, signals, or similar.
[0272] Optionally, the second network function 1700 may comprise a memory 1703. In some embodiments, the memory 1703 of the second network function 1700 can be configured to store program code that can be executed by the processing circuitry 1701 of the second network function 1700 to perform the method 700 described herein in relation to the first NF 1700. Alternatively, or in addition, the memory 1703 of the second network function 1700, can be configured to store any requests, resources, information, data, signals, or similar that are described herein. The processing circuitry 1701 of the second network function 1700 may be configured to control the memory 1703 of the second network function 1700 to store any requests, resources, information, data, signals, or similar that are described herein.
[0273] There is also provided a computer program comprising instructions which, when executed by processing circuitry cause the processing circuitry to perform at least part of the method described herein. There is provided a computer program product, embodied on a non-transitory machine-readable medium, comprising instructions which are executable by processing circuitry to cause the processing circuitry to perform at least part of the method described herein. There is provided a computer program product comprising a carrier containing instructions for causing processing circuitry to perform at least part of the method described herein. In some embodiments, the carrier can be any one of an electronic signal, an optical signal, an electromagnetic signal, an electrical signal, a radio signal, a microwave signal, or a computer-readable storage medium.
[0274] Embodiments described herein allow the network operator to control tethering, by enabling the PCF to providing different policies for a service (or PDU session), depending on the number of devices and types of devices that are tethering behind a UE.
[0275] Embodiments described herein also enable the PCF to provide dynamically different policies for every different device tethering behind the UE and consuming the service (or for the PDU session), by enabling the PCF to make policy decisions based on not only the number of devices and types of devices that are tethering behind a UE, but additionally dynamic conditions such as the access type or RAT-type used by the UE.
[0276] This enables the operator to provide a flexible configuration that enables different enforcements to be applied and/or restricts the usage of tethering depending on a number of dynamic conditions, for a large number of different tethering scenarios. Additionally, the provided configuration is simplified as there is no need to define different appIds for the same service (separately for tethering traffic and non-tethering traffic), reducing the number of PCC rules that need to be installed by the PCF.
[0277] Embodiments described herein also reduce the signaling required to apply different policies for a service (or PDU session), depending on the number of devices and types of devices that are tethering behind a UE.
[0278] It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design many alternative embodiments without departing from the scope of the appended claims. The word comprising does not exclude the presence of elements or steps other than those listed in a claim, a or an does not exclude a plurality, and a single processor or other unit may fulfil the functions of several units recited in the claims. Any reference signs in the claims shall not be construed so as to limit their scope.