WO2020032638A1 - Method for performing access control and device supporting the same - Google Patents

Method for performing access control and device supporting the same Download PDF

Info

Publication number
WO2020032638A1
WO2020032638A1 PCT/KR2019/009999 KR2019009999W WO2020032638A1 WO 2020032638 A1 WO2020032638 A1 WO 2020032638A1 KR 2019009999 W KR2019009999 W KR 2019009999W WO 2020032638 A1 WO2020032638 A1 WO 2020032638A1
Authority
WO
WIPO (PCT)
Prior art keywords
node
access
rrc
failure
connection
Prior art date
Application number
PCT/KR2019/009999
Other languages
French (fr)
Inventor
Youngdae Lee
Taehun Kim
Original Assignee
Lg Electronics Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lg Electronics Inc. filed Critical Lg Electronics Inc.
Publication of WO2020032638A1 publication Critical patent/WO2020032638A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/18Management of setup rejection or failure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/19Connection re-establishment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/20Manipulation of established connections
    • H04W76/27Transitions between radio resource control [RRC] states
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • H04W48/12Access restriction or access information delivery, e.g. discovery data delivery using downlink control channel
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/30Connection release
    • H04W76/32Release of transport tunnels

Definitions

  • the present invention relates to a wireless communication system, and more particularly, to a method for access control and a device supporting the same.
  • an upper layer protocol defines a protocol state to consistently manage an operational state of a user equipment (UE), and indicates a function and procedure of the UE in detail.
  • UE user equipment
  • an RRC state is discussed such that an RRC_CONNECTED state and an RRC_IDLE state are basically defined, and an RRC_INACTIVE state is additionally introduced.
  • An IAB node may follow the same initial access procedure as an UE, including cell search, SI acquisition, and random access, in order to initially set up a connection to a parent IAB-node or an IAB-donor. Since the IAB node will perform RRC Connection Establishment towards a certain gNB as an UE, the IAB node may perform the Unified Access Control in the RRC Connection Establishment procedure.
  • network may not prioritize or de-prioritize initial access from IAB node over other accesses from normal UEs in congestion. For example, the network may not prioritize initial access from IAB nodes over other accesses even when the IAB nodes are part of network coverage. If the access from IAB nodes is not allowed, the network may have a hole in their coverage. On the other hand, the network may not de-prioritize initial access from a certain IAB node even when the IAB node may consume huge resources. Compared to the amount of resources consumed by normal UEs, IAB nodes may consume much more radio/network resources.
  • a method performed by a wireless device in a wireless communication system may comprise: detecting a failure of connection on a wireless back haul link; leaving connected state; selecting a parameter related to the failure; and performing connection establishment based on the parameter.
  • the parameter may be a cause value for the connection establishment.
  • the detecting the failure of the connection may comprise: performing a radio resource control (RRC) re-establishment procedure; and detecting that the RRC re-establishment procedure fails.
  • RRC radio resource control
  • the parameter may inform that the RRC re-establishment procedure fails.
  • the parameter may be an access category.
  • the method may further comprise: performing access barring check based on the access category; and determining that an access by the node is allowed as a result of the access barring check.
  • the node may be an integrated access and backhaul (IAB) node.
  • IAB integrated access and backhaul
  • the node may be configured to operate both as a user equipment and as a base station.
  • the method may further comprise: transmitting a RRC connection complete message including information on type of the failure.
  • the type of the failure may be at least one of radio link failure, handover failure, beam failure, backhaul link failure, access barring, reception of reject message, network congestion or radio congestion.
  • the node may communicate with at least one of a mobile terminal, a network or autonomous vehicles other than the wireless device.
  • a wireless device in a wireless communication system may comprise: a memory; a transceiver; and a processor, operably coupled to the memory and the transceiver, and configured to: detect a failure of connection on a wireless back haul link; leave connected state; select a parameter related to the failure; and perform connection establishment based on the parameter.
  • the parameter may be a cause value for the connection establishment.
  • the processor may be configured to: performing a radio resource control (RRC) re-establishment procedure; and detecting that the RRC re-establishment procedure fails.
  • RRC radio resource control
  • the parameter may inform that the RRC re-establishment procedure fails.
  • the parameter may be an access category for an access barring check.
  • the network may efficiently determine whether an access needs to be prioritized or not, based on the connection request including cause value and/or access category mapped to the recovery of the connection failure. Further, the IAB node may inform implicitly that the access attempt is for IAB node, so that the access from IAB node may be prioritized.
  • FIG. 1 shows examples of 5G usage scenarios to which the technical features of the present invention can be applied.
  • FIG. 2 shows an example of a wireless communication system to which the technical features of the present invention can be applied.
  • FIG. 3 shows an example of a wireless communication system to which the technical features of the present invention can be applied.
  • FIG. 4 shows another example of a wireless communication system to which the technical features of the present invention can be applied.
  • FIG. 5 shows a block diagram of a user plane protocol stack to which the technical features of the present invention can be applied.
  • FIG. 6 shows a block diagram of a control plane protocol stack to which the technical features of the present invention can be applied.
  • FIG. 7 shows a reference diagram for IAB in standalone mode
  • FIG. 8 shows a method for access control according to an embodiment of the present invention.
  • FIG. 9 shows a method for access control performed by a user equipment (UE) according to an embodiment of the present invention.
  • FIG. 10 shows a method performed by a node according to an embodiment of the present invention.
  • FIG. 11 shows a method for access control according to an embodiment of the present invention.
  • FIG. 12 shows more detailed UE to implement an embodiment of the present invention.
  • FIG. 13 shows an example of an AI device to which the technical features of the present invention can be applied.
  • FIG. 14 shows an example of an AI system to which the technical features of the present invention can be applied.
  • the technical features described below may be used by a communication standard by the 3rd generation partnership project (3GPP) standardization organization, a communication standard by the institute of electrical and electronics engineers (IEEE), etc.
  • the communication standards by the 3GPP standardization organization include long-term evolution (LTE) and/or evolution of LTE systems.
  • LTE long-term evolution
  • LTE-A LTE-advanced
  • LTE-A Pro LTE-A Pro
  • NR 5G new radio
  • the communication standard by the IEEE standardization organization includes a wireless local area network (WLAN) system such as IEEE 802.11a/b/g/n/ac/ax.
  • WLAN wireless local area network
  • the above system uses various multiple access technologies such as orthogonal frequency division multiple access (OFDMA) and/or single carrier frequency division multiple access (SC-FDMA) for downlink (DL) and/or uplink (UL).
  • OFDMA orthogonal frequency division multiple access
  • SC-FDMA single carrier frequency division multiple access
  • OFDMA and SC-FDMA may be used for DL and/or UL.
  • the term “/” and “,” should be interpreted to indicate “and/or.”
  • the expression “A/B” may mean “A and/or B.”
  • A, B may mean “A and/or B.”
  • A/B/C may mean “at least one of A, B, and/or C.”
  • A, B, C may mean “at least one of A, B, and/or C.”
  • the term “or” should be interpreted to indicate “and/or.”
  • the expression “A or B” may comprise 1) only A, 2) only B, and/or 3) both A and B.
  • the term “or” in this document should be interpreted to indicate "additionally or alternatively.”
  • FIG. 1 shows examples of 5G usage scenarios to which the technical features of the present invention can be applied.
  • the 5G usage scenarios shown in FIG. 1 are only exemplary, and the technical features of the present invention can be applied to other 5G usage scenarios which are not shown in FIG. 1.
  • the three main requirements areas of 5G include (1) enhanced mobile broadband (eMBB) domain, (2) massive machine type communication (mMTC) area, and (3) ultra-reliable and low latency communications (URLLC) area.
  • eMBB enhanced mobile broadband
  • mMTC massive machine type communication
  • URLLC ultra-reliable and low latency communications
  • KPI key performance indicator
  • eMBB focuses on across-the-board enhancements to the data rate, latency, user density, capacity and coverage of mobile broadband access.
  • the eMBB aims ⁇ 10 Gbps of throughput.
  • eMBB far surpasses basic mobile Internet access and covers rich interactive work and media and entertainment applications in cloud and/or augmented reality.
  • Data is one of the key drivers of 5G and may not be able to see dedicated voice services for the first time in the 5G era.
  • the voice is expected to be processed as an application simply using the data connection provided by the communication system.
  • the main reason for the increased volume of traffic is an increase in the size of the content and an increase in the number of applications requiring high data rates.
  • Streaming services (audio and video), interactive video and mobile Internet connectivity will become more common as more devices connect to the Internet. Many of these applications require always-on connectivity to push real-time information and notifications to the user.
  • Cloud storage and applications are growing rapidly in mobile communication platforms, which can be applied to both work and entertainment.
  • Cloud storage is a special use case that drives growth of uplink data rate.
  • 5G is also used for remote tasks on the cloud and requires much lower end-to-end delay to maintain a good user experience when the tactile interface is used.
  • cloud games and video streaming are another key factor that increases the demand for mobile broadband capabilities. Entertainment is essential in smartphones and tablets anywhere, including high mobility environments such as trains, cars and airplanes.
  • Another use case is augmented reality and information retrieval for entertainment.
  • augmented reality requires very low latency and instantaneous data amount.
  • mMTC is designed to enable communication between devices that are low-cost, massive in number and battery-driven, intended to support applications such as smart metering, logistics, and field and body sensors.
  • mMTC aims ⁇ 10 years on battery and/or ⁇ 1 million devices/km2.
  • mMTC allows seamless integration of embedded sensors in all areas and is one of the most widely used 5G applications.
  • IoT internet-of-things
  • Industrial IoT is one of the areas where 5G plays a key role in enabling smart cities, asset tracking, smart utilities, agriculture and security infrastructures.
  • URLLC will make it possible for devices and machines to communicate with ultra-reliability, very low latency and high availability, making it ideal for vehicular communication, industrial control, factory automation, remote surgery, smart grids and public safety applications.
  • URLLC aims ⁇ 1ms of latency.
  • URLLC includes new services that will change the industry through links with ultra-reliability / low latency, such as remote control of key infrastructure and self-driving vehicles.
  • the level of reliability and latency is essential for smart grid control, industrial automation, robotics, drones control and coordination.
  • 5G can complement fiber-to-the-home (FTTH) and cable-based broadband (or DOCSIS) as a means of delivering streams rated from hundreds of megabits per second to gigabits per second.
  • This high speed can be required to deliver TVs with resolutions of 4K or more (6K, 8K and above) as well as virtual reality (VR) and augmented reality (AR).
  • VR and AR applications include mostly immersive sporting events. Certain applications may require special network settings. For example, in the case of a VR game, a game company may need to integrate a core server with an edge network server of a network operator to minimize delay.
  • Automotive is expected to become an important new driver for 5G, with many use cases for mobile communications to vehicles. For example, entertainment for passengers demands high capacity and high mobile broadband at the same time. This is because future users will continue to expect high-quality connections regardless of their location and speed.
  • Another use case in the automotive sector is an augmented reality dashboard.
  • the driver can identify an object in the dark on top of what is being viewed through the front window through the augmented reality dashboard.
  • the augmented reality dashboard displays information that will inform the driver about the object's distance and movement.
  • the wireless module enables communication between vehicles, information exchange between the vehicle and the supporting infrastructure, and information exchange between the vehicle and other connected devices (e.g. devices accompanied by a pedestrian).
  • the safety system allows the driver to guide the alternative course of action so that he can drive more safely, thereby reducing the risk of accidents.
  • the next step will be a remotely controlled vehicle or self-driving vehicle. This requires a very reliable and very fast communication between different self-driving vehicles and between vehicles and infrastructure. In the future, a self-driving vehicle will perform all driving activities, and the driver will focus only on traffic that the vehicle itself cannot identify.
  • the technical requirements of self-driving vehicles require ultra-low latency and high-speed reliability to increase traffic safety to a level not achievable by humans.
  • Smart cities and smart homes which are referred to as smart societies, will be embedded in high density wireless sensor networks.
  • the distributed network of intelligent sensors will identify conditions for cost and energy-efficient maintenance of a city or house. A similar setting can be performed for each home.
  • Temperature sensors, windows and heating controllers, burglar alarms and appliances are all wirelessly connected. Many of these sensors typically require low data rate, low power and low cost.
  • real-time high-definition (HD) video may be required for certain types of devices for monitoring.
  • the smart grid interconnects these sensors using digital information and communication technologies to collect and act on information. This information can include supplier and consumer behavior, allowing the smart grid to improve the distribution of fuel, such as electricity, in terms of efficiency, reliability, economy, production sustainability, and automated methods.
  • the smart grid can be viewed as another sensor network with low latency.
  • the health sector has many applications that can benefit from mobile communications.
  • Communication systems can support telemedicine to provide clinical care in remote locations. This can help to reduce barriers to distance and improve access to health services that are not continuously available in distant rural areas. It is also used to save lives in critical care and emergency situations.
  • Mobile communication based wireless sensor networks can provide remote monitoring and sensors for parameters such as heart rate and blood pressure.
  • Wireless and mobile communications are becoming increasingly important in industrial applications. Wiring costs are high for installation and maintenance. Thus, the possibility of replacing a cable with a wireless link that can be reconfigured is an attractive opportunity in many industries. However, achieving this requires that wireless connections operate with similar delay, reliability, and capacity as cables and that their management is simplified. Low latency and very low error probabilities are new requirements that need to be connected to 5G.
  • Logistics and freight tracking are important use cases of mobile communications that enable tracking of inventory and packages anywhere using location based information systems. Use cases of logistics and freight tracking typically require low data rates, but require a large range and reliable location information.
  • FIG. 2 shows an example of a wireless communication system to which the technical features of the present invention can be applied.
  • the wireless communication system may include a first device 210 and a second device 220.
  • the first device 210 includes a base station, a network node, a transmitting UE, a receiving UE, a wireless device, a wireless communication device, a vehicle, a vehicle equipped with an autonomous driving function, a connected car, a drone, an unmanned aerial vehicle (UAV), an artificial intelligence (AI) module, a robot, an AR device, a VR device, a mixed reality (MR) device, a hologram device, a public safety device, an MTC device, an IoT device, a medical device, a fin-tech device (or, a financial device), a security device, a climate/environmental device, a device related to 5G services, or a device related to the fourth industrial revolution.
  • UAV unmanned aerial vehicle
  • AI artificial intelligence
  • MR mixed reality
  • hologram device a public safety device
  • MTC device an IoT device
  • medical device a fin-tech device (or, a financial device)
  • a security device a climate/environmental device, a device
  • the second device 220 includes a base station, a network node, a transmitting UE, a receiving UE, a wireless device, a wireless communication device, a vehicle, a vehicle equipped with an autonomous driving function, a connected car, a drone, a UAV, an AI module, a robot, an AR device, a VR device, an MR device, a hologram device, a public safety device, an MTC device, an IoT device, a medical device, a fin-tech device (or, a financial device), a security device, a climate/environmental device, a device related to 5G services, or a device related to the fourth industrial revolution.
  • the UE may include a mobile phone, a smart phone, a laptop computer, a digital broadcasting terminal, a personal digital assistant (PDA), a portable multimedia player (PMP), a navigation device, a slate personal computer (PC), a tablet PC, an ultrabook, a wearable device (e.g. a smartwatch, a smart glass, a head mounted display (HMD)) .
  • the HMD may be a display device worn on the head.
  • the HMD may be used to implement AR, VR and/or MR.
  • the drone may be a flying object that is flying by a radio control signal without a person boarding it.
  • the VR device may include a device that implements an object or background in the virtual world.
  • the AR device may include a device that implements connection of an object and/or a background of a virtual world to an object and/or a background of the real world.
  • the MR device may include a device that implements fusion of an object and/or a background of a virtual world to an object and/or a background of the real world.
  • the hologram device may include a device that implements a 360-degree stereoscopic image by recording and playing stereoscopic information by utilizing a phenomenon of interference of light generated by the two laser lights meeting with each other, called holography.
  • the public safety device may include a video relay device or a video device that can be worn by the user's body.
  • the MTC device and the IoT device may be a device that do not require direct human intervention or manipulation.
  • the MTC device and the IoT device may include a smart meter, a vending machine, a thermometer, a smart bulb, a door lock and/or various sensors.
  • the medical device may be a device used for the purpose of diagnosing, treating, alleviating, handling, or preventing a disease.
  • the medical device may be a device used for the purpose of diagnosing, treating, alleviating, or correcting an injury or disorder.
  • the medical device may be a device used for the purpose of inspecting, replacing or modifying a structure or function.
  • the medical device may be a device used for the purpose of controlling pregnancy.
  • the medical device may include a treatment device, a surgical device, an (in vitro) diagnostic device, a hearing aid and/or a procedural device, etc.
  • a security device may be a device installed to prevent the risk that may occur and to maintain safety.
  • the security device may include a camera, a closed-circuit TV (CCTV), a recorder, or a black box.
  • the fin-tech device may be a device capable of providing financial services such as mobile payment.
  • the fin-tech device may include a payment device or a point of sales (POS).
  • the climate/environmental device may include a device for monitoring or predicting the climate/environment.
  • the first device 210 may include at least one or more processors, such as a processor 211, at least one memory, such as a memory 212, and at least one transceiver, such as a transceiver 213.
  • the processor 211 may perform the functions, procedures, and/or methods of the present invention described below.
  • the processor 211 may perform one or more protocols. For example, the processor 211 may perform one or more layers of the air interface protocol.
  • the memory 212 is connected to the processor 211 and may store various types of information and/or instructions.
  • the transceiver 213 is connected to the processor 211 and may be controlled to transmit and receive wireless signals.
  • the second device 220 may include at least one or more processors, such as a processor 221, at least one memory, such as a memory 222, and at least one transceiver, such as a transceiver 223.
  • the processor 221 may perform the functions, procedures, and/or methods of the present invention described below.
  • the processor 221 may perform one or more protocols. For example, the processor 221 may perform one or more layers of the air interface protocol.
  • the memory 222 is connected to the processor 221 and may store various types of information and/or instructions.
  • the transceiver 223 is connected to the processor 221 and may be controlled to transmit and receive wireless signals.
  • the memory 212, 222 may be connected internally or externally to the processor 211, 212, or may be connected to other processors via a variety of technologies such as wired or wireless connections.
  • the first device 210 and/or the second device 220 may have more than one antenna.
  • antenna 214 and/or antenna 224 may be configured to transmit and receive wireless signals.
  • FIG. 3 shows an example of a wireless communication system to which the technical features of the present invention can be applied.
  • FIG. 3 shows a system architecture based on an evolved-UMTS terrestrial radio access network (E-UTRAN).
  • E-UTRAN evolved-UMTS terrestrial radio access network
  • the aforementioned LTE is a part of an evolved-UTMS (e-UMTS) using the E-UTRAN.
  • e-UMTS evolved-UTMS
  • the wireless communication system includes one or more user equipment (UE) 310, an E-UTRAN and an evolved packet core (EPC).
  • the UE 310 refers to a communication equipment carried by a user.
  • the UE 310 may be fixed or mobile.
  • the UE 310 may be referred to as another terminology, such as a mobile station (MS), a user terminal (UT), a subscriber station (SS), a wireless device, etc.
  • MS mobile station
  • UT user terminal
  • SS subscriber station
  • wireless device etc.
  • the E-UTRAN consists of one or more evolved NodeB (eNB) 320.
  • the eNB 320 provides the E-UTRA user plane and control plane protocol terminations towards the UE 10.
  • the eNB 320 is generally a fixed station that communicates with the UE 310.
  • the eNB 320 hosts the functions, such as inter-cell radio resource management (RRM), radio bearer (RB) control, connection mobility control, radio admission control, measurement configuration/provision, dynamic resource allocation (scheduler), etc.
  • RRM inter-cell radio resource management
  • RB radio bearer
  • connection mobility control such as connection mobility control
  • radio admission control such as measurement configuration/provision
  • the eNB 320 may be referred to as another terminology, such as a base station (BS), a base transceiver system (BTS), an access point (AP), etc.
  • BS base station
  • BTS base transceiver system
  • AP access point
  • a downlink (DL) denotes communication from the eNB 320 to the UE 310.
  • An uplink (UL) denotes communication from the UE 310 to the eNB 320.
  • a sidelink (SL) denotes communication between the UEs 310.
  • a transmitter may be a part of the eNB 320, and a receiver may be a part of the UE 310.
  • the transmitter may be a part of the UE 310, and the receiver may be a part of the eNB 320.
  • the transmitter and receiver may be a part of the UE 310.
  • the EPC includes a mobility management entity (MME), a serving gateway (S-GW) and a packet data network (PDN) gateway (P-GW).
  • MME hosts the functions, such as non-access stratum (NAS) security, idle state mobility handling, evolved packet system (EPS) bearer control, etc.
  • NAS non-access stratum
  • EPS evolved packet system
  • the S-GW hosts the functions, such as mobility anchoring, etc.
  • the S-GW is a gateway having an E-UTRAN as an endpoint.
  • MME/S-GW 330 will be referred to herein simply as a "gateway," but it is understood that this entity includes both the MME and S-GW.
  • the P-GW hosts the functions, such as UE Internet protocol (IP) address allocation, packet filtering, etc.
  • IP Internet protocol
  • the P-GW is a gateway having a PDN as an endpoint.
  • the P-GW is connected to an external network.
  • the UE 310 is connected to the eNB 320 by means of the Uu interface.
  • the UEs 310 are interconnected with each other by means of the PC5 interface.
  • the eNBs 320 are interconnected with each other by means of the X2 interface.
  • the eNBs 320 are also connected by means of the S1 interface to the EPC, more specifically to the MME by means of the S1-MME interface and to the S-GW by means of the S1-U interface.
  • the S1 interface supports a many-to-many relation between MMEs / S-GWs and eNBs.
  • FIG. 4 shows another example of a wireless communication system to which the technical features of the present invention can be applied.
  • FIG. 4 shows a system architecture based on a 5G NR.
  • the entity used in the 5G NR (hereinafter, simply referred to as "NR") may absorb some or all of the functions of the entities introduced in FIG. 3 (e.g. eNB, MME, S-GW).
  • the entity used in the NR may be identified by the name "NG” for distinction from the LTE/LTE-A.
  • the wireless communication system includes one or more UE 410, a next-generation RAN (NG-RAN) and a 5th generation core network (5GC).
  • the NG-RAN consists of at least one NG-RAN node.
  • the NG-RAN node is an entity corresponding to the eNB 320 shown in FIG. 3.
  • the NG-RAN node consists of at least one gNB 421 and/or at least one ng-eNB 422.
  • the gNB 421 provides NR user plane and control plane protocol terminations towards the UE 410.
  • the ng-eNB 422 provides E-UTRA user plane and control plane protocol terminations towards the UE 410.
  • the 5GC includes an access and mobility management function (AMF), a user plane function (UPF) and a session management function (SMF).
  • AMF hosts the functions, such as NAS security, idle state mobility handling, etc.
  • the AMF is an entity including the functions of the conventional MME.
  • the UPF hosts the functions, such as mobility anchoring, protocol data unit (PDU) handling.
  • PDU protocol data unit
  • the UPF an entity including the functions of the conventional S-GW.
  • the SMF hosts the functions, such as UE IP address allocation, PDU session control.
  • the gNBs 421 and ng-eNBs 422 are interconnected with each other by means of the Xn interface.
  • the gNBs 421 and ng-eNBs 422 are also connected by means of the NG interfaces to the 5GC, more specifically to the AMF by means of the NG-C interface and to the UPF by means of the NG-U interface.
  • layers of a radio interface protocol between the UE and the network may be classified into a first layer (L1), a second layer (L2), and a third layer (L3) based on the lower three layers of the open system interconnection (OSI) model that is well-known in the communication system.
  • OSI open system interconnection
  • FIG. 5 shows a block diagram of a user plane protocol stack to which the technical features of the present invention can be applied.
  • FIG. 6 shows a block diagram of a control plane protocol stack to which the technical features of the present invention can be applied.
  • the user/control plane protocol stacks shown in FIG. 5 and FIG. 6 are used in NR. However, user/control plane protocol stacks shown in FIG. 5 and FIG. 6 may be used in LTE/LTE-A without loss of generality, by replacing gNB/AMF with eNB/MME.
  • the PHY layer offers information transfer services to media access control (MAC) sublayer and higher layers.
  • the PHY layer offers to the MAC sublayer transport channels. Data between the MAC sublayer and the PHY layer is transferred via the transport channels. Between different PHY layers, i.e., between a PHY layer of a transmission side and a PHY layer of a reception side, data is transferred via the physical channels.
  • the MAC sublayer belongs to L2.
  • the main services and functions of the MAC sublayer include mapping between logical channels and transport channels, multiplexing/de-multiplexing of MAC service data units (SDUs) belonging to one or different logical channels into/from transport blocks (TB) delivered to/from the physical layer on transport channels, scheduling information reporting, error correction through hybrid automatic repeat request (HARQ), priority handling between UEs by means of dynamic scheduling, priority handling between logical channels of one UE by means of logical channel prioritization (LCP), etc.
  • the MAC sublayer offers to the radio link control (RLC) sublayer logical channels.
  • RLC radio link control
  • the RLC sublayer belong to L2.
  • the RLC sublayer supports three transmission modes, i.e. transparent mode (TM), unacknowledged mode (UM), and acknowledged mode (AM), in order to guarantee various quality of services (QoS) required by radio bearers.
  • TM transparent mode
  • UM unacknowledged mode
  • AM acknowledged mode
  • the main services and functions of the RLC sublayer depend on the transmission mode.
  • the RLC sublayer provides transfer of upper layer PDUs for all three modes, but provides error correction through ARQ for AM only.
  • LTE/LTE-A the RLC sublayer provides concatenation, segmentation and reassembly of RLC SDUs (only for UM and AM data transfer) and re-segmentation of RLC data PDUs (only for AM data transfer).
  • the RLC sublayer provides segmentation (only for AM and UM) and re-segmentation (only for AM) of RLC SDUs and reassembly of SDU (only for AM and UM). That is, the NR does not support concatenation of RLC SDUs.
  • the RLC sublayer offers to the packet data convergence protocol (PDCP) sublayer RLC channels.
  • PDCP packet data convergence protocol
  • the PDCP sublayer belong to L2.
  • the main services and functions of the PDCP sublayer for the user plane include header compression and decompression, transfer of user data, duplicate detection, PDCP PDU routing, retransmission of PDCP SDUs, ciphering and deciphering, etc.
  • the main services and functions of the PDCP sublayer for the control plane include ciphering and integrity protection, transfer of control plane data, etc.
  • the service data adaptation protocol (SDAP) sublayer belong to L2.
  • the SDAP sublayer is only defined in the user plane.
  • the SDAP sublayer is only defined for NR.
  • the main services and functions of SDAP include, mapping between a QoS flow and a data radio bearer (DRB), and marking QoS flow ID (QFI) in both DL and UL packets.
  • the SDAP sublayer offers to 5GC QoS flows.
  • a radio resource control (RRC) layer belongs to L3.
  • the RRC layer is only defined in the control plane.
  • the RRC layer controls radio resources between the UE and the network.
  • the RRC layer exchanges RRC messages between the UE and the BS.
  • the main services and functions of the RRC layer include broadcast of system information related to AS and NAS, paging, establishment, maintenance and release of an RRC connection between the UE and the network, security functions including key management, establishment, configuration, maintenance and release of radio bearers, mobility functions, QoS management functions, UE measurement reporting and control of the reporting, NAS message transfer to/from NAS from/to UE.
  • the RRC layer controls logical channels, transport channels, and physical channels in relation to the configuration, reconfiguration, and release of radio bearers.
  • a radio bearer refers to a logical path provided by L1 (PHY layer) and L2 (MAC/RLC/PDCP/SDAP sublayer) for data transmission between a UE and a network.
  • Setting the radio bearer means defining the characteristics of the radio protocol layer and the channel for providing a specific service, and setting each specific parameter and operation method.
  • Radio bearer may be divided into signaling RB (SRB) and data RB (DRB).
  • SRB signaling RB
  • DRB data RB
  • An RRC state indicates whether an RRC layer of the UE is logically connected to an RRC layer of the E-UTRAN.
  • RRC_CONNECTED when the RRC connection is established between the RRC layer of the UE and the RRC layer of the E-UTRAN, the UE is in the RRC connected state (RRC_CONNECTED). Otherwise, the UE is in the RRC idle state (RRC_IDLE).
  • RRC_INACTIVE is additionally introduced.
  • RRC_INACTIVE may be used for various purposes. For example, the massive machine type communications (MMTC) UEs can be efficiently managed in RRC_INACTIVE. When a specific condition is satisfied, transition is made from one of the above three states to the other.
  • a predetermined operation may be performed according to the RRC state.
  • RRC_IDLE public land mobile network (PLMN) selection, broadcast of system information (SI), cell re-selection mobility, core network (CN) paging and discontinuous reception (DRX) configured by NAS may be performed.
  • PLMN public land mobile network
  • SI system information
  • CN core network
  • DRX discontinuous reception
  • the UE shall have been allocated an identifier (ID) which uniquely identifies the UE in a tracking area. No RRC context stored in the BS.
  • the UE has an RRC connection with the network (i.e. E-UTRAN/NG-RAN).
  • Network-CN connection (both C/U-planes) is also established for UE.
  • the UE AS context is stored in the network and the UE.
  • the RAN knows the cell which the UE belongs to.
  • the network can transmit and/or receive data to/from UE.
  • Network controlled mobility including measurement is also performed.
  • RRC_IDLE Most of operations performed in RRC_IDLE may be performed in RRC_INACTIVE. But, instead of CN paging in RRC_IDLE, RAN paging is performed in RRC_INACTIVE. In other words, in RRC_IDLE, paging for mobile terminated (MT) data is initiated by core network and paging area is managed by core network. In RRC_INACTIVE, paging is initiated by NG-RAN, and RAN-based notification area (RNA) is managed by NG-RAN. Further, instead of DRX for CN paging configured by NAS in RRC_IDLE, DRX for RAN paging is configured by NG-RAN in RRC_INACTIVE.
  • DRX for CN paging configured by NAS in RRC_IDLE
  • DRX for RAN paging is configured by NG-RAN in RRC_INACTIVE.
  • 5GC-NG-RAN connection (both C/U-planes) is established for UE, and the UE AS context is stored in NG-RAN and the UE.
  • NG-RAN knows the RNA which the UE belongs to.
  • the NAS layer is located at the top of the RRC layer.
  • the NAS control protocol performs the functions, such as authentication, mobility management, security control.
  • the physical channels may be modulated according to OFDM processing and utilizes time and frequency as radio resources.
  • the physical channels consist of a plurality of orthogonal frequency division multiplexing (OFDM) symbols in time domain and a plurality of subcarriers in frequency domain.
  • One subframe consists of a plurality of OFDM symbols in the time domain.
  • a resource block is a resource allocation unit, and consists of a plurality of OFDM symbols and a plurality of subcarriers.
  • each subframe may use specific subcarriers of specific OFDM symbols (e.g. first OFDM symbol) of the corresponding subframe for a physical downlink control channel (PDCCH), i.e. L1/L2 control channel.
  • a transmission time interval (TTI) is a basic unit of time used by a scheduler for resource allocation. The TTI may be defined in units of one or a plurality of slots, or may be defined in units of mini-slots.
  • DL transport channels include a broadcast channel (BCH) used for transmitting system information, a downlink shared channel (DL-SCH) used for transmitting user traffic or control signals, and a paging channel (PCH) used for paging a UE.
  • DL transport channels include an uplink shared channel (UL-SCH) for transmitting user traffic or control signals and a random access channel (RACH) normally used for initial access to a cell.
  • BCH broadcast channel
  • DL-SCH downlink shared channel
  • PCH paging channel
  • UL transport channels include an uplink shared channel (UL-SCH) for transmitting user traffic or control signals and a random access channel (RACH) normally used for initial access to a cell.
  • RACH random access channel
  • Each logical channel type is defined by what type of information is transferred.
  • Logical channels are classified into two groups: control channels and traffic channels.
  • Control channels are used for the transfer of control plane information only.
  • the control channels include a broadcast control channel (BCCH), a paging control channel (PCCH), a common control channel (CCCH) and a dedicated control channel (DCCH).
  • BCCH is a DL channel for broadcasting system control information.
  • PCCH is DL channel that transfers paging information, system information change notifications.
  • the CCCH is a channel for transmitting control information between UEs and network. This channel is used for UEs having no RRC connection with the network.
  • the DCCH is a point-to-point bi-directional channel that transmits dedicated control information between a UE and the network. This channel is used by UEs having an RRC connection.
  • Traffic channels are used for the transfer of user plane information only.
  • the traffic channels include a dedicated traffic channel (DTCH).
  • DTCH is a point-to-point channel, dedicated to one UE, for the transfer of user information.
  • the DTCH can exist in both UL and DL.
  • BCCH in DL, BCCH can be mapped to BCH, BCCH can be mapped to DL-SCH, PCCH can be mapped to PCH, CCCH can be mapped to DL-SCH, DCCH can be mapped to DL-SCH, and DTCH can be mapped to DL-SCH.
  • CCCH can be mapped to UL-SCH
  • DCCH can be mapped to UL-SCH
  • DTCH can be mapped to UL-SCH.
  • RRC connection establishment involves SRB1 establishment.
  • the procedure is also used to transfer the initial NAS dedicated information/ message from the UE to the network.
  • the UE initiates the procedure when upper layers request establishment of an RRC connection while the UE is in RRC_IDLE.
  • upper layers may request access barring check as specified in the unified acccess control procedure and only request the RRC establishment when the access attempt is considered allowed.
  • upper layers may instead provide an Access Category and one or more Access Identities upon requesting the RRC establishment so that RRC initiates the access barring check.
  • the UE Upon initiation of the procedure, the UE shall:
  • the UE shall set the contents of RRCSetupRequest message as follows:
  • Upper layers provide the 5G-S-TMSI if the UE is registered in the TA of the current cell.
  • the UE shall submit the RRCSetupRequest message to lower layers for transmission.
  • the UE shall continue cell re-selection related measurements as well as cell re-selection evaluation. If the conditions for cell re-selection are fulfilled, the UE shall perform cell re-selection.
  • the UE shall perform the following actions upon reception of the RRCSetup:
  • stop timer T320 if running
  • 3> include the uplinkTxDirectCurrentList
  • 5> include the plmnIdentity in the registeredAMF and set it to the value of the PLMN identity in the 'Registered AMF' received from upper layers;
  • 3> include and set the guami-Type to the value provided by the upper layers
  • 3> include the s-nssai-list and set the content to the values provided by the upper layers;
  • the purpose of this procedure is to resume a suspended RRC connection, including resuming SRB(s) and DRB(s) or perform an RNA update.
  • the UE initiates the procedure when upper layers or AS (when responding to NG-RAN paging or upon triggering RNA updates while the UE is in RRC_INACTIVE) requests the resume of a suspended RRC connection.
  • upper layers may request access barring check as specified in the unified acccess control procedure and only request the RRC resumption when the access attempt is considered allowed.
  • upper layers may instead provide an Access Category and one or more Access Identities upon requesting the RRC resumption so that RRC initiates the access barring check.
  • the UE Upon initiation of the procedure, the UE shall:
  • stop timer T380 if running
  • the UE shall set the contents of RRCResumeRequest or RRCResumeRequest1 message as follows:
  • the purpose of this procedure is to perform access barring check for an access attempt associated with a given Access Category and one or more Access Identities upon request from upper layers or the RRC layer.
  • the UE Upon initiation of the procedure, the UE shall:
  • SIB1 includes uac-BarringPerPLMN-List and the uac-BarringPerPLMN-List contains an UAC-BarringPerPLMN entry with the plmn-IdentityIndex corresponding to the PLMN selected by upper layers:
  • the UE shall:
  • IAB integrated access and backhaul
  • FIG. 7 shows a reference diagram for IAB in standalone mode.
  • reference diagram for IAB contains one IAB-donor and multiple IAB-nodes.
  • the IAB-donor is treated as a single logical node that comprises a set of functions such as gNB-DU, gNB-CU-CP, gNB-CU-UP and potentially other functions.
  • the IAB-donor can be split according to these functions, which can all be either collocated or non-collocated as allowed by 3GPP NG-RAN architecture. IAB-related aspects may arise when such split is exercised, which will be explored at a later stage of the study. Also, some of the functions presently associated with the IAB-donor may eventually be moved outside of the donor in case it becomes evident that they do not perform IAB-specific tasks.
  • IAB strives to reuse existing functions and interfaces defined for access.
  • Mobile-Termination MT
  • gNB-DU Mobile-Termination
  • gNB-CU Mobile-Termination-Controller
  • UPF Mobile-Termination-Controller
  • AMF Access Management Function
  • SMF Session Management Function
  • NR Uu between MT and gNB
  • F1, NG, X2 and N4 are used as baseline for the IAB architectures.
  • the Mobile-Termination (MT) function has been defined a component of the Mobile Equipment.
  • MT is referred to as a function residing on an IAB-node that terminates the radio interface layers of the backhaul Uu interface toward the IAB-donor or other IAB-nodes.
  • IAB-node is a RAN node that supports wireless access to UEs and wirelessly backhauls the access traffic.
  • IAB-donor is a RAN node which provides UE's interface to core network and wireless backhauling functionality to IAB nodes.
  • An IAB node may follow the same initial access procedure as an UE, including cell search, SI acquisition, and random access, in order to initially set up a connection to a parent IAB-node or an IAB-donor. Since the IAB node will perform RRC Connection Establishment towards a certain gNB as an UE, the IAB node may perform the Unified Access Control in the RRC Connection Establishment procedure. In addition, the gNB may perform overload control so that it would determine whether to accept or reject the RRC Setup Request e.g. based on the establishmentCause in the RRCSetupRequest message.
  • the network may need to differentiate initial access from IAB node and other accesses from normal UEs.
  • the network may prioritize or de-prioritize initial access from IAB node over other accesses from normal UEs in congestion due to some reasons.
  • the network may prioritize initial access from IAB nodes over other accesses because the IAB nodes are part of network coverage. If the access from IAB nodes is de-prioritized, the network may have a hole in their coverage. On the other hand, the network may de-prioritize initial access from a certain IAB node because the IAB node may consume huge resources. Compared to the amount of resources consumed by normal UEs, IAB nodes may consume much more radio/network resources. Thus, when a parent IAB-node or an IAB-donor is already serving other IAB nodes, it would be reluctant to accept additional connection with a new IAB node.
  • the IAB node connected to a parent/donor node may detect connection failure on wireless backhaul link.
  • connection failure occurs, the IAB node will perform RRC re-establishment.
  • the IAB node may fall into RRC_IDLE due to re-establishment failure sometimes.
  • RRC_IDLE due to re-establishment failure sometimes.
  • the IAB node would immediately re-access for recovering the wireless backhaul link.
  • the IAB node may be serving another IAB node and/or some normal UEs as part of the network.
  • the IAB node could redirect some UEs using delay-sensitive services to inter-frequency neighbouring cells, if reachable to those UEs.
  • the IAB node may be still serving other UEs having no alternative cells, staying in RRC_INACTIVE, or using delay-tolerant services only. Accordingly, when an IAB node goes to RRC_IDLE due to connection failure on the wireless backhaul link, the network should be able to prioritize re-access of the IAB node for fast backhaul recovery.
  • An IAB node may consist of MT part and DU part.
  • IAB node MT part When the IAB node operates as a terminal, IAB node MT part may perform access to network side.
  • the IAB node DU part When the IAB node operate as a base station, the IAB node DU part may serve other IAB node or other terminals.
  • FIG. 8 shows a method for access control according to an embodiment of the present invention.
  • the node may detect a failure of connection on a wireless back haul link.
  • the node may perform a radio resource control (RRC) re-establishment procedure, and detect that the RRC re-establishment procedure fails.
  • RRC radio resource control
  • the node may be an integrated access and backhaul (IAB) node.
  • the IAB node may be referred as a node, and may be configured to operate both as a user equipment and as a base station.
  • step S804 the node may leave connected state.
  • the node may select a parameter related to the failure.
  • the parameter may be a cause value for the connection establishment.
  • the parameter may be an access category.
  • the parameter may inform that the RRC re-establishment procedure fails.
  • the node may perform access barring check based on the access category.
  • the node may determine that an access by the node is allowed as a result of the access barring check.
  • the node may perform connection establishment based on the parameter.
  • the node may communicate with at least one of a mobile terminal, a network or autonomous vehicles other than the node.
  • the node may further transmit a RRC connection complete message including information on type of the failure.
  • the type of the failure may be at least one of radio link failure, handover failure, beam failure, backhaul link failure, access barring, reception of reject message, network congestion or radio congestion.
  • the node may efficiently determine whether an access needs to be prioritized or not, based on the connection request including cause value and/or access category mapped to the recovery of the connection failure.
  • FIG. 9 shows a method for access control performed by a user equipment (UE) according to an embodiment of the present invention.
  • the UE may be served by an IAB node.
  • the UE may detect connection failure with the base station and goes to RRC_IDLE or RRC_INACTIVE.
  • the connection failure may be one of radio link failure, handover failure, beam failure, backhaul link failure, access barring, reception of reject message, network congestion and radio congestion.
  • the UE may detect a problem on backhaul link, the UE may initiate RRC re-establishment procedure.
  • the UE may enter RRC_IDLE or RRC_INACTIVE. In other words, it may be assumed that RRC re-establishment procedure has been already performed and failed, when the UE enter RRC_IDLE or RRC_IDLE upon detecting connection failure.
  • the UE may set a parameter related to re-access.
  • the parameter may be at least one of cause value or access category.
  • the cause value may be used as an establishment cause for RRC connection request.
  • the UE may select a cause value and/or an access category which are/is mapped to recovery from the connection failure. That is, the cause value and/or access category may indicate the connection failure.
  • the cause value and/or access category may inform that the corresponding access is for recovery form the connection failure.
  • the cause value and/or access category may inform that the corresponding access needs to be prioritized.
  • the cause value and/or access category may configured as highly prioritized value.
  • the cause value and/or access category may inform that the corresponding access needs to be prioritized.
  • the cause value and/or access category may be newly defined other than access category 0-15.
  • the UE may perform access barring check based on the selected access category and barring information mapped to the access category.
  • the UE may determine whether access attempt is allowed or barred at a cell by the result of the access barring check.
  • the barring information may be received via system information from the cell.
  • the UE may transmit a connection request including the cause value in uplink, if the access attempt is allowed.
  • the connection request may be one of the RRCSetupRequest message and the RRCResumeRequest message.
  • the UE may transmit a connection complete message indicating a type of the connection failure, if the UE receives a positive response to the connection request.
  • the type of the connection failure indicates one of radio link failure, handover failure, beam failure, backhaul link failure, access barring, reception of reject message, network congestion and radio congestion.
  • the node may efficiently determine whether an access needs to be prioritized or not, based on the connection request including cause value and/or access category mapped to the recovery of the connection failure.
  • FIG. 10 shows a method performed by a node according to an embodiment of the present invention.
  • the node may be connected to a donor node on the radio via a base station.
  • the node may be one of a UE, gNB, eNB, a DU, a CU and IAB node.
  • the base station may be one of a cell, gNB, eNB, a DU, a CU, IAB node and IAB donor.
  • the node may relay information or a packet received from a device to the base station.
  • the node may detect connection failure with the base station. Then the node may go to RRC_IDLE or RRC_INACTIVE.
  • the connection failure may be one of radio link failure, handover failure, beam failure, backhaul link failure, access barring, reception of reject message, network congestion and radio congestion.
  • the node detect a problem on backhaul link, the node may initiate RRC re-establishment procedure. When even the RRC re-establishment procedure is failed, the node may enter RRC_IDLE or RRC_INACTIVE. In other words, it may be assumed that RRC re-establishment procedure has been already performed and failed, when the node enter RRC_IDLE or RRC_IDLE upon detecting connection failure.
  • the node may select a cause value and/or an access category which are/is mapped to recovery from the connection failure.
  • the cause value and/or access category may indicate the connection failure.
  • the cause value and/or access category may inform that the corresponding access is for recovery form the connection failure.
  • the cause value and/or access category may inform that the corresponding access needs to be prioritized.
  • the cause value and/or access category may configured as highly prioritized value.
  • the cause value and/or access category may inform that the corresponding access needs to be prioritized.
  • the cause value and/or access category may be newly defined other than access category 0-15.
  • the node alternatively may select an access category mapped to all F1AP messages or a F1AP message.
  • the node alternatively may select an access category mapped to all access attempts or some access attempts from an IAB node.
  • the cause may be establishmentCause or resumeCause.
  • the node may perform access barring check based on the selected access category.
  • the UE may determine whether access attempt is allowed or barred at a cell by using the selected access category and barring information mapped to the access category.
  • the barring information may be received via system information from the cell.
  • the node may transmit a connection request including the cause value in uplink, if the access attempt is allowed.
  • the connection request may be one of the F1AP initial UL RRC message, the RRCSetupRequest message and the RRCResumeRequest message.
  • the node may transmit a connection complete message indicating a type of the connection failure and/or relaying information, if the node receives a positive response to the connection request.
  • the type of the connection failure may indicate at least one of radio link failure, handover failure, beam failure, backhaul link failure, access barring, reception of reject message, network congestion and radio congestion.
  • the relaying information may include one or more of the number of UEs served by/connected to this node, the number of the other IAB node served by/connected to this node, QoS or priority information of services relayed/used by this node, the number of relay hop from the UE up to this node, the number of relaying IAB nodes from the UE up to this node, and radio capacity/throughput relayed/consumed by this node.
  • the node may efficiently determine whether an access needs to be prioritized or not, based on the connection request including cause value and/or access category mapped to the recovery of the connection failure. Further, the IAB node may inform implicitly that the access attempt is for IAB node, so that the access from IAB node may be prioritized.
  • IAB node mobile termination (MT) part may connect the network as a normal UE.
  • IAB node MT part may perform RRC connection setup procedure between donor-CU, authentication and PDU session establishment between OAM, IAB node MT part related context and bearer configuration in RAN side and etc.
  • the intermediate IAB node DU part may encapsulate the related RRC messages of the IAB node MT part in F1-AP messages.
  • the IAB node may be integrated into the network by performing routing update and IAB node DU part setup. Then, the IAB-node may provide service to UEs or to other integrated IAB-nodes.
  • FIG. 11 shows a method for access control according to an embodiment of the present invention.
  • a first node and a second node may be IAB nodes.
  • the first node may be served by a second node.
  • the second node may be served by a donor node.
  • the first node may serve at least one of UEs and other IAB nodes.
  • the first node is initially connected to the donor node via the second node.
  • the second node may perform normal cell discovery and cell selection.
  • the second node may initially perform RRC connection establishment to the network, e.g. donor node.
  • the second node may select an access category mapped to initial access from an IAB node or any access from IAB node.
  • the second node may transmit system information including barring information.
  • the first node may perform access barring check, after connection failure which led the first node to RRC_IDLE.
  • the connection failure may be occurred on wireless backhaul link between the first node and the second node.
  • the connection failure may be detected after performing RRC re-establishment.
  • the first node may perform a RRC connection re-establishment procedure, when a problem on the backhaul link is detected.
  • the first node may declare the connection failure, and go to RRC_IDLE or RRC_INACTIVE.
  • the first node may select an access category mapped to connection failure recovery from an IAB node.
  • the first node may perform the access barring check based on the selected access category and the received barring information in unified access control.
  • the first node may perform access attempts (e.g. for RRC Connection Establishment or Resume) to the second node, when the access attempt is allowed as a result of the access barring check.
  • the UE may select cause value mapped to the connection failure, and transmit connection request message including the cause value to the second node.
  • the second node may transmit connection request message to the donor node.
  • the second node may perform access attempt to the donor node.
  • the second node may transmit a connection request message (e.g. the RRCSetupRequest message or RRCResumeRequest message) to the donor node.
  • the connection request message may include the establishmentCause or the resumeCause set to the cause value mapped to connection failure recovery from an IAB node.
  • the second node may perform access attempts (e.g. for RRC Connection Establishment or Resume) to the network to send a F1AP message.
  • the second node may select an access category mapped to the F1AP message from an IAB node.
  • the first node may perform access barring check with the selected access category and the received barring information in the unified access control. Then, if access attempt is allowed as a result of the access barring check, the second node may set the establishmentCause or the resumeCause to the cause value mapped to the F1AP message from an IAB node in a RRC connection request message (e.g. the RRCSetupRequest message or RRCResumeRequest message).
  • a RRC connection request message e.g. the RRCSetupRequest message or RRCResumeRequest message.
  • the access category and/or the cause value may be different depending on the type of F1AP message. For example, access attempts for UE specific F1AP messages and access attempts for UE common F1AP messages may be mapped to different access categories and/or different cause values.
  • the access category and/or the cause value may be different depending on a role of IAB node.
  • the IAB node may use different Access Categories and/or different cause values for the case that the IAB node performs access attempts as an UE and the case that the IAB node performs access attempts as a IAB node (i.e. relay node),
  • the donor node may receive overload control message from core network (CN).
  • the overload control message may inform the donor node whether access from the IAB node should be rejected or not e.g. depending on the cause value or the access category mapped to the access.
  • the overload control message may be transmitted before performing admission control, but the time point that the donor node receives the overload control message is not restricted to this embodiment.
  • the donor node may perform admission control based on the cause value mapped to connection failure recovery.
  • the donor node may perform admission control based on the overload control message. For example, the donor node may set high priority for the admission control to the access from the IAB node, by distinguishing the cause value mapped to connection failure recovery from other cause values.
  • the donor node may determine whether to send connection setup message or connection reject message in response to the connection request message. Or, based on the Overload Control message, the donor node may determine whether to release the connection with the second node after the second node enters RRC_CONNECTED.
  • the donor node may transmit one of connection setup message or connection reject message from the second node.
  • the connection setup message or connection reject message may be F1AP message.
  • the donor node sends a RRC Release message to the second node, it may include redirection information in the message.
  • the redirection information may include which donor cell or frequency the second node should be redirected to.
  • the second node may transmit connection setup message or connection reject message to the first node.
  • the first node may transmit the connection complete message to the second node, when the first node receives the connection setup message in response to the connection request. Further, the first node may transmit a connection complete message indicating a type of the connection failure and/or relaying information.
  • the type of the connection failure may indicate one of radio link failure, handover failure, beam failure, backhaul link failure, access barring, reception of reject message, network congestion and radio congestion.
  • the connection complete message may be one of the RRCSetupComplete message or RRCResumeComplete message.
  • the second node may transmit the connection complete message to the second node, when the first node receives the connection setup message in response to the connection request. Further, the second node may transmit the connection complete message indicating a type of F1AP message and/or relaying information, e.g. RRC Connection Setup.
  • the type of F1AP message may be one of UE specific F1AP messages and UE common F1AP messages.
  • the connection complete message may be one of the RRCSetupComplete message or RRCResumeComplete message.
  • the donor node may perform overlaod control.
  • the donor node may determine whether to send connection release message to the second node.
  • the donor node may transmit the connection release message.
  • the connection release message may be a F1AP message.
  • the connection release message may include redirection information in the message. The redirection information may include which donor cell or frequency the second node should be redirected to.
  • the second node may transmit connection release message to the first node.
  • the connection release message may include redirection information in the message.
  • the redirection information may include which donor cell or frequency the second node should be redirected to.
  • the first node may perform cell selection or cell reselection procedure.
  • the network may efficiently determine whether an access needs to be prioritized or not, based on the connection request including cause value and/or access category mapped to the recovery of the connection failure. Further, the IAB node may inform implicitly that the access attempt is for IAB node, so that the access from IAB node may be prioritized.
  • FIG. 12 shows more detailed UE to implement an embodiment of the present invention.
  • the present invention described above for UE side may be applied to this embodiment.
  • the UE may be an example of IAB node, and the embodiments of the present invention may be implemented by the IAB node.
  • a UE includes a processor 1210, a power management module 1111, a battery 1212, a display 1213, a keypad 1214, a subscriber identification module (SIM) card 1215, a memory 1220, a transceiver 1230, one or more antennas 1231, a speaker 1240, and a microphone 1241.
  • SIM subscriber identification module
  • the processor 1210 may be configured to implement proposed functions, procedures and/or methods described in this description. Layers of the radio interface protocol may be implemented in the processor 1210.
  • the processor 1210 may include ASIC, other chipset, logic circuit and/or data processing device.
  • the processor 1210 may be an application processor (AP).
  • the processor 1210 may include at least one of a digital signal processor (DSP), a central processing unit (CPU), a graphics processing unit (GPU), a modem (modulator and demodulator).
  • DSP digital signal processor
  • CPU central processing unit
  • GPU graphics processing unit
  • modem modulator and demodulator
  • processor 1210 may be found in SNAPDRAGON TM series of processors made by Qualcomm ® , EXYNOS TM series of processors made by Samsung ® , A series of processors made by Apple ® , HELIO TM series of processors made by MediaTek ® , ATOM TM series of processors made by Intel ® or a corresponding next generation processor.
  • the processor 1210 may be configured to detect a failure of connection on a wireless back haul link.
  • the node may perform a radio resource control (RRC) re-establishment procedure, and detect that the RRC re-establishment procedure fails.
  • RRC radio resource control
  • the node may be an integrated access and backhaul (IAB) node.
  • IAB integrated access and backhaul
  • the node may be configured to operate both as a user equipment and as a base station.
  • the processor 1210 may be configured to leave connected state.
  • the processor 1210 may be configured to select a parameter related to the failure.
  • the parameter may be a cause value for the connection establishment.
  • the parameter may be an access category.
  • the parameter may inform that the RRC re-establishment procedure fails.
  • the node may perform access barring check based on the access category.
  • the node may determine that an access by the node is allowed as a result of the access barring check.
  • the processor 1210 may be configured to perform connection establishment based on the parameter.
  • the processor 1210 may be configured to communicate with at least one of a mobile terminal, a network or autonomous vehicles other than the node.
  • the base station may efficiently determine whether an access needs to be prioritized or not, based on the connection request including cause value and/or access category mapped to the recovery of the connection failure.
  • the power management module 1211 manages power for the processor 1210 and/or the transceiver 1230.
  • the battery 1212 supplies power to the power management module 1211.
  • the display 1213 outputs results processed by the processor 1210.
  • the keypad 1214 receives inputs to be used by the processor 1210.
  • the keypad 1214 may be shown on the display 1213.
  • the SIM card 1215 is an integrated circuit that is intended to securely store the international mobile subscriber identity (IMSI) number and its related key, which are used to identify and authenticate subscribers on mobile telephony devices (such as mobile phones and computers). It is also possible to store contact information on many SIM cards.
  • IMSI international mobile subscriber identity
  • the memory 1220 is operatively coupled with the processor 1210 and stores a variety of information to operate the processor 1210.
  • the memory 1220 may include ROM, RAM, flash memory, memory card, storage medium and/or other storage device.
  • modules e.g., procedures, functions, and so on
  • the modules can be stored in the memory 1220 and executed by the processor 1210.
  • the memory 1220 can be implemented within the processor 1210 or external to the processor 1210 in which case those can be communicatively coupled to the processor 1210 via various means as is known in the art.
  • the transceiver 1230 is operatively coupled with the processor 1210, and transmits and/or receives a radio signal.
  • the transceiver 1230 includes a transmitter and a receiver.
  • the transceiver 1230 may include baseband circuitry to process radio frequency signals.
  • the transceiver 1230 controls the one or more antennas 1231 to transmit and/or receive a radio signal.
  • the speaker 1240 outputs sound-related results processed by the processor 1210.
  • the microphone 1241 receives sound-related inputs to be used by the processor 1210.
  • the present invention may be applied to various future technologies, such as AI, robots, autonomous-driving/self-driving vehicles, and/or extended reality (XR).
  • future technologies such as AI, robots, autonomous-driving/self-driving vehicles, and/or extended reality (XR).
  • XR extended reality
  • AI refers to artificial intelligence and/or the field of studying methodology for making it.
  • Machine learning is a field of studying methodologies that define and solve various problems dealt with in AI.
  • Machine learning may be defined as an algorithm that enhances the performance of a task through a steady experience with any task.
  • An artificial neural network is a model used in machine learning. It can mean a whole model of problem-solving ability, consisting of artificial neurons (nodes) that form a network of synapses.
  • An ANN can be defined by a connection pattern between neurons in different layers, a learning process for updating model parameters, and/or an activation function for generating an output value.
  • An ANN may include an input layer, an output layer, and optionally one or more hidden layers. Each layer may contain one or more neurons, and an ANN may include a synapse that links neurons to neurons.
  • each neuron can output a summation of the activation function for input signals, weights, and deflections input through the synapse.
  • Model parameters are parameters determined through learning, including deflection of neurons and/or weights of synaptic connections.
  • the hyper-parameter means a parameter to be set in the machine learning algorithm before learning, and includes a learning rate, a repetition number, a mini batch size, an initialization function, etc.
  • the objective of the ANN learning can be seen as determining the model parameters that minimize the loss function.
  • the loss function can be used as an index to determine optimal model parameters in learning process of ANN.
  • Machine learning can be divided into supervised learning, unsupervised learning, and reinforcement learning, depending on the learning method.
  • Supervised learning is a method of learning ANN with labels given to learning data. Labels are the answers (or result values) that ANN must infer when learning data is input to ANN.
  • Unsupervised learning can mean a method of learning ANN without labels given to learning data.
  • Reinforcement learning can mean a learning method in which an agent defined in an environment learns to select a behavior and/or sequence of actions that maximizes cumulative compensation in each state.
  • Machine learning which is implemented as a deep neural network (DNN) that includes multiple hidden layers among ANN, is also called deep learning. Deep learning is part of machine learning. In the following, machine learning is used to mean deep learning.
  • DNN deep neural network
  • a robot can mean a machine that automatically processes or operates a given task by its own abilities.
  • a robot having a function of recognizing the environment and performing self-determination and operation can be referred to as an intelligent robot.
  • Robots can be classified into industrial, medical, household, military, etc., depending on the purpose and field of use.
  • the robot may include a driving unit including an actuator and/or a motor to perform various physical operations such as moving a robot joint.
  • the movable robot may include a wheel, a break, a propeller, etc., in a driving unit, and can travel on the ground or fly in the air through the driving unit.
  • the autonomous-driving refers to a technique of self-driving
  • an autonomous vehicle refers to a vehicle that travels without a user's operation or with a minimum operation of a user.
  • autonomous-driving may include techniques for maintaining a lane while driving, techniques for automatically controlling speed such as adaptive cruise control, techniques for automatically traveling along a predetermined route, and techniques for traveling by setting a route automatically when a destination is set.
  • the autonomous vehicle may include a vehicle having only an internal combustion engine, a hybrid vehicle having an internal combustion engine and an electric motor together, and an electric vehicle having only an electric motor, and may include not only an automobile but also a train, a motorcycle, etc.
  • the autonomous vehicle can be regarded as a robot having an autonomous driving function.
  • XR are collectively referred to as VR, AR, and MR.
  • VR technology provides real-world objects and/or backgrounds only as computer graphic (CG) images
  • AR technology provides CG images that is virtually created on real object images
  • MR technology is a computer graphics technology that mixes and combines virtual objects in the real world.
  • MR technology is similar to AR technology in that it shows real and virtual objects together.
  • the virtual object is used as a complement to the real object, whereas in the MR technology, the virtual object and the real object are used in an equal manner.
  • XR technology can be applied to HMD, head-up display (HUD), mobile phone, tablet PC, laptop, desktop, TV, digital signage.
  • a device to which the XR technology is applied may be referred to as an XR device.
  • FIG. 13 shows an example of an AI device to which the technical features of the present invention can be applied.
  • the AI device 1300 may be implemented as a stationary device or a mobile device, such as a TV, a projector, a mobile phone, a smartphone, a desktop computer, a notebook, a digital broadcasting terminal, a PDA, a PMP, a navigation device, a tablet PC, a wearable device, a set-top box (STB), a digital multimedia broadcasting (DMB) receiver, a radio, a washing machine, a refrigerator, a digital signage, a robot, a vehicle, etc.
  • a stationary device such as a TV, a projector, a mobile phone, a smartphone, a desktop computer, a notebook, a digital broadcasting terminal, a PDA, a PMP, a navigation device, a tablet PC, a wearable device, a set-top box (STB), a digital multimedia broadcasting (DMB) receiver, a radio, a washing machine, a refrigerator, a digital signage, a robot, a vehicle, etc.
  • DMB digital
  • the AI device 1300 may include a communication part 1310, an input part 1320, a learning processor 1330, a sensing part 1340, an output part 1350, a memory 1360, and a processor 1370.
  • the communication part 1310 can transmit and/or receive data to and/or from external devices such as the AI devices and the AI server using wire and/or wireless communication technology.
  • the communication part 1310 can transmit and/or receive sensor information, a user input, a learning model, and a control signal with external devices.
  • the communication technology used by the communication part 1310 may include a global system for mobile communication (GSM), a code division multiple access (CDMA), an LTE/LTE-A, a 5G, a WLAN, a Wi-Fi, Bluetooth TM , radio frequency identification (RFID), infrared data association (IrDA), ZigBee, and/or near field communication (NFC).
  • GSM global system for mobile communication
  • CDMA code division multiple access
  • LTE/LTE-A Long Term Evolution
  • 5G Fifth Generation
  • WLAN Fifth Generation
  • Wi-Fi Wireless Fidelity
  • Bluetooth TM Bluetooth TM
  • RFID radio frequency identification
  • IrDA infrared data association
  • ZigBee ZigBe
  • the input part 1320 can acquire various kinds of data.
  • the input part 1320 may include a camera for inputting a video signal, a microphone for receiving an audio signal, and a user input part for receiving information from a user.
  • a camera and/or a microphone may be treated as a sensor, and a signal obtained from a camera and/or a microphone may be referred to as sensing data and/or sensor information.
  • the input part 1320 can acquire input data to be used when acquiring an output using learning data and a learning model for model learning.
  • the input part 1320 may obtain raw input data, in which case the processor 1370 or the learning processor 1330 may extract input features by preprocessing the input data.
  • the learning processor 1330 may learn a model composed of an ANN using learning data.
  • the learned ANN can be referred to as a learning model.
  • the learning model can be used to infer result values for new input data rather than learning data, and the inferred values can be used as a basis for determining which actions to perform.
  • the learning processor 1330 may perform AI processing together with the learning processor of the AI server.
  • the learning processor 1330 may include a memory integrated and/or implemented in the AI device 1300. Alternatively, the learning processor 1330 may be implemented using the memory 1360, an external memory directly coupled to the AI device 1300, and/or a memory maintained in an external device.
  • the sensing part 1340 may acquire at least one of internal information of the AI device 1300, environment information of the AI device 1300, and/or the user information using various sensors.
  • the sensors included in the sensing part 1340 may include a proximity sensor, an illuminance sensor, an acceleration sensor, a magnetic sensor, a gyro sensor, an inertial sensor, an RGB sensor, an IR sensor, a fingerprint recognition sensor, an ultrasonic sensor, an optical sensor, a microphone, a light detection and ranging (LIDAR), and/or a radar.
  • the output part 1350 may generate an output related to visual, auditory, tactile, etc.
  • the output part 1350 may include a display unit for outputting visual information, a speaker for outputting auditory information, and/or a haptic module for outputting tactile information.
  • the memory 1360 may store data that supports various functions of the AI device 1300.
  • the memory 1360 may store input data acquired by the input part 1320, learning data, a learning model, a learning history, etc.
  • the processor 1370 may determine at least one executable operation of the AI device 1300 based on information determined and/or generated using a data analysis algorithm and/or a machine learning algorithm. The processor 1370 may then control the components of the AI device 1300 to perform the determined operation. The processor 1370 may request, retrieve, receive, and/or utilize data in the learning processor 1330 and/or the memory 1360, and may control the components of the AI device 1300 to execute the predicted operation and/or the operation determined to be desirable among the at least one executable operation. The processor 1370 may generate a control signal for controlling the external device, and may transmit the generated control signal to the external device, when the external device needs to be linked to perform the determined operation.
  • the processor 1370 may obtain the intention information for the user input and determine the user's requirements based on the obtained intention information.
  • the processor 1370 may use at least one of a speech-to-text (STT) engine for converting speech input into a text string and/or a natural language processing (NLP) engine for acquiring intention information of a natural language, to obtain the intention information corresponding to the user input.
  • STT speech-to-text
  • NLP natural language processing
  • At least one of the STT engine and/or the NLP engine may be configured as an ANN, at least a part of which is learned according to a machine learning algorithm.
  • At least one of the STT engine and/or the NLP engine may be learned by the learning processor 1330 and/or learned by the learning processor of the AI server, and/or learned by their distributed processing.
  • the processor 1370 may collect history information including the operation contents of the AI device 1300 and/or the user's feedback on the operation, etc.
  • the processor 1370 may store the collected history information in the memory 1360 and/or the learning processor 1330, and/or transmit to an external device such as the AI server.
  • the collected history information can be used to update the learning model.
  • the processor 1370 may control at least some of the components of AI device 1300 to drive an application program stored in memory 1360. Furthermore, the processor 1370 may operate two or more of the components included in the AI device 1300 in combination with each other for driving the application program.
  • FIG. 14 shows an example of an AI system to which the technical features of the present invention can be applied.
  • an AI server 1420 in the AI system, at least one of an AI server 1420, a robot 1410a, an autonomous vehicle 1410b, an XR device 1410c, a smartphone 1410d and/or a home appliance 1410e is connected to a cloud network 1400.
  • the robot 1410a, the autonomous vehicle 1410b, the XR device 1410c, the smartphone 1410d, and/or the home appliance 1410e to which the AI technology is applied may be referred to as AI devices 1410a to 1410e.
  • the cloud network 1400 may refer to a network that forms part of a cloud computing infrastructure and/or resides in a cloud computing infrastructure.
  • the cloud network 1400 may be configured using a 3G network, a 4G or LTE network, and/or a 5G network. That is, each of the devices 1410a to 1410e and 1420 consisting the AI system may be connected to each other through the cloud network 1400.
  • each of the devices 1410a to 1410e and 1420 may communicate with each other through a base station, but may directly communicate with each other without using a base station.
  • the AI server 1400 may include a server for performing AI processing and a server for performing operations on big data.
  • the AI server 1400 is connected to at least one or more of AI devices constituting the AI system, i.e. the robot 1410a, the autonomous vehicle 1410b, the XR device 1410c, the smartphone 1410d and/or the home appliance 1410e through the cloud network 1400, and may assist at least some AI processing of the connected AI devices 1410a to 1410e.
  • the AI server 1400 can learn the ANN according to the machine learning algorithm on behalf of the AI devices 1410a to 1410e, and can directly store the learning models and/or transmit them to the AI devices 1410a to 1410e.
  • the AI server 1400 may receive the input data from the AI devices 1410a to 1410e, infer the result value with respect to the received input data using the learning model, generate a response and/or a control command based on the inferred result value, and transmit the generated data to the AI devices 1410a to 1410e.
  • the AI devices 1410a to 1410e may directly infer a result value for the input data using a learning model, and generate a response and/or a control command based on the inferred result value.
  • the AI devices 1410a to 1410e to which the technical features of the present invention can be applied will be described.
  • the AI devices 1410a to 1410e shown in FIG. 14 can be seen as specific embodiments of the AI device 1300 shown in FIG 13.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Provided are a method of access control and a device supporting the method. According to one embodiment of the present invention, the method includes: detecting a failure of connection on a wireless back haul link; leaving connected state; selecting a parameter related to the failure; and performing connection establishment based on the parameter.

Description

METHOD FOR PERFORMING ACCESS CONTROL AND DEVICE SUPPORTING THE SAME
The present invention relates to a wireless communication system, and more particularly, to a method for access control and a device supporting the same.
Efforts have been made to develop an improved 5th-generation (5G) communication system or a pre-5G communication system in order to satisfy a growing demand on radio data traffic after commercialization of a 4th-generation (4G) communication system. A standardization act for a 5G mobile communication standard work has been formally started in 3GPP, and there is ongoing discussion in a standardization working group under a tentative name of a new radio access (NR).
Meanwhile, an upper layer protocol defines a protocol state to consistently manage an operational state of a user equipment (UE), and indicates a function and procedure of the UE in detail. In the discussion on the NR standardization, an RRC state is discussed such that an RRC_CONNECTED state and an RRC_IDLE state are basically defined, and an RRC_INACTIVE state is additionally introduced.
In NR, An IAB node may follow the same initial access procedure as an UE, including cell search, SI acquisition, and random access, in order to initially set up a connection to a parent IAB-node or an IAB-donor. Since the IAB node will perform RRC Connection Establishment towards a certain gNB as an UE, the IAB node may perform the Unified Access Control in the RRC Connection Establishment procedure.
According to a prior art, network may not prioritize or de-prioritize initial access from IAB node over other accesses from normal UEs in congestion. For example, the network may not prioritize initial access from IAB nodes over other accesses even when the IAB nodes are part of network coverage. If the access from IAB nodes is not allowed, the network may have a hole in their coverage. On the other hand, the network may not de-prioritize initial access from a certain IAB node even when the IAB node may consume huge resources. Compared to the amount of resources consumed by normal UEs, IAB nodes may consume much more radio/network resources.
According to an embodiment of the present invention, a method performed by a wireless device in a wireless communication system is provided. The method may comprise: detecting a failure of connection on a wireless back haul link; leaving connected state; selecting a parameter related to the failure; and performing connection establishment based on the parameter.
The parameter may be a cause value for the connection establishment.
The detecting the failure of the connection may comprise: performing a radio resource control (RRC) re-establishment procedure; and detecting that the RRC re-establishment procedure fails.
The parameter may inform that the RRC re-establishment procedure fails.
The parameter may be an access category.
The method may further comprise: performing access barring check based on the access category; and determining that an access by the node is allowed as a result of the access barring check.
The node may be an integrated access and backhaul (IAB) node.
The node may be configured to operate both as a user equipment and as a base station.
The method may further comprise: transmitting a RRC connection complete message including information on type of the failure.
The type of the failure may be at least one of radio link failure, handover failure, beam failure, backhaul link failure, access barring, reception of reject message, network congestion or radio congestion.
The node may communicate with at least one of a mobile terminal, a network or autonomous vehicles other than the wireless device.
According to another embodiment of the present invention, a wireless device in a wireless communication system is provided. The wireless device may comprise: a memory; a transceiver; and a processor, operably coupled to the memory and the transceiver, and configured to: detect a failure of connection on a wireless back haul link; leave connected state; select a parameter related to the failure; and perform connection establishment based on the parameter.
The parameter may be a cause value for the connection establishment.
The processor may be configured to: performing a radio resource control (RRC) re-establishment procedure; and detecting that the RRC re-establishment procedure fails.
The parameter may inform that the RRC re-establishment procedure fails.
The parameter may be an access category for an access barring check.
According to embodiments of the present invention, the network may efficiently determine whether an access needs to be prioritized or not, based on the connection request including cause value and/or access category mapped to the recovery of the connection failure. Further, the IAB node may inform implicitly that the access attempt is for IAB node, so that the access from IAB node may be prioritized.
FIG. 1 shows examples of 5G usage scenarios to which the technical features of the present invention can be applied.
FIG. 2 shows an example of a wireless communication system to which the technical features of the present invention can be applied.
FIG. 3 shows an example of a wireless communication system to which the technical features of the present invention can be applied.
FIG. 4 shows another example of a wireless communication system to which the technical features of the present invention can be applied.
FIG. 5 shows a block diagram of a user plane protocol stack to which the technical features of the present invention can be applied.
FIG. 6 shows a block diagram of a control plane protocol stack to which the technical features of the present invention can be applied.
FIG. 7 shows a reference diagram for IAB in standalone mode
FIG. 8 shows a method for access control according to an embodiment of the present invention.
FIG. 9 shows a method for access control performed by a user equipment (UE) according to an embodiment of the present invention.
FIG. 10 shows a method performed by a node according to an embodiment of the present invention.
FIG. 11 shows a method for access control according to an embodiment of the present invention.
FIG. 12 shows more detailed UE to implement an embodiment of the present invention.
FIG. 13 shows an example of an AI device to which the technical features of the present invention can be applied.
FIG. 14 shows an example of an AI system to which the technical features of the present invention can be applied.
The technical features described below may be used by a communication standard by the 3rd generation partnership project (3GPP) standardization organization, a communication standard by the institute of electrical and electronics engineers (IEEE), etc. For example, the communication standards by the 3GPP standardization organization include long-term evolution (LTE) and/or evolution of LTE systems. The evolution of LTE systems includes LTE-advanced (LTE-A), LTE-A Pro, and/or 5G new radio (NR). The communication standard by the IEEE standardization organization includes a wireless local area network (WLAN) system such as IEEE 802.11a/b/g/n/ac/ax. The above system uses various multiple access technologies such as orthogonal frequency division multiple access (OFDMA) and/or single carrier frequency division multiple access (SC-FDMA) for downlink (DL) and/or uplink (UL). For example, only OFDMA may be used for DL and only SC-FDMA may be used for UL. Alternatively, OFDMA and SC-FDMA may be used for DL and/or UL.
In this document, the term "/" and "," should be interpreted to indicate "and/or." For instance, the expression "A/B" may mean "A and/or B." Further, "A, B" may mean "A and/or B." Further, "A/B/C" may mean "at least one of A, B, and/or C." Also, "A, B, C" may mean "at least one of A, B, and/or C."
Further, in the document, the term "or" should be interpreted to indicate "and/or." For instance, the expression "A or B" may comprise 1) only A, 2) only B, and/or 3) both A and B. In other words, the term "or" in this document should be interpreted to indicate "additionally or alternatively."
FIG. 1 shows examples of 5G usage scenarios to which the technical features of the present invention can be applied.
The 5G usage scenarios shown in FIG. 1 are only exemplary, and the technical features of the present invention can be applied to other 5G usage scenarios which are not shown in FIG. 1.
Referring to FIG. 1, the three main requirements areas of 5G include (1) enhanced mobile broadband (eMBB) domain, (2) massive machine type communication (mMTC) area, and (3) ultra-reliable and low latency communications (URLLC) area. Some use cases may require multiple areas for optimization and, other use cases may only focus on only one key performance indicator (KPI). 5G is to support these various use cases in a flexible and reliable way.
eMBB focuses on across-the-board enhancements to the data rate, latency, user density, capacity and coverage of mobile broadband access. The eMBB aims ~10 Gbps of throughput. eMBB far surpasses basic mobile Internet access and covers rich interactive work and media and entertainment applications in cloud and/or augmented reality. Data is one of the key drivers of 5G and may not be able to see dedicated voice services for the first time in the 5G era. In 5G, the voice is expected to be processed as an application simply using the data connection provided by the communication system. The main reason for the increased volume of traffic is an increase in the size of the content and an increase in the number of applications requiring high data rates. Streaming services (audio and video), interactive video and mobile Internet connectivity will become more common as more devices connect to the Internet. Many of these applications require always-on connectivity to push real-time information and notifications to the user. Cloud storage and applications are growing rapidly in mobile communication platforms, which can be applied to both work and entertainment. Cloud storage is a special use case that drives growth of uplink data rate. 5G is also used for remote tasks on the cloud and requires much lower end-to-end delay to maintain a good user experience when the tactile interface is used. In entertainment, for example, cloud games and video streaming are another key factor that increases the demand for mobile broadband capabilities. Entertainment is essential in smartphones and tablets anywhere, including high mobility environments such as trains, cars and airplanes. Another use case is augmented reality and information retrieval for entertainment. Here, augmented reality requires very low latency and instantaneous data amount.
mMTC is designed to enable communication between devices that are low-cost, massive in number and battery-driven, intended to support applications such as smart metering, logistics, and field and body sensors. mMTC aims ~10 years on battery and/or ~1 million devices/km2. mMTC allows seamless integration of embedded sensors in all areas and is one of the most widely used 5G applications. Potentially by 2020, internet-of-things (IoT) devices are expected to reach 20.4 billion. Industrial IoT is one of the areas where 5G plays a key role in enabling smart cities, asset tracking, smart utilities, agriculture and security infrastructures.
URLLC will make it possible for devices and machines to communicate with ultra-reliability, very low latency and high availability, making it ideal for vehicular communication, industrial control, factory automation, remote surgery, smart grids and public safety applications. URLLC aims ~1ms of latency. URLLC includes new services that will change the industry through links with ultra-reliability / low latency, such as remote control of key infrastructure and self-driving vehicles. The level of reliability and latency is essential for smart grid control, industrial automation, robotics, drones control and coordination.
Next, a plurality of use cases included in the triangle of FIG. 1 will be described in more detail.
5G can complement fiber-to-the-home (FTTH) and cable-based broadband (or DOCSIS) as a means of delivering streams rated from hundreds of megabits per second to gigabits per second. This high speed can be required to deliver TVs with resolutions of 4K or more (6K, 8K and above) as well as virtual reality (VR) and augmented reality (AR). VR and AR applications include mostly immersive sporting events. Certain applications may require special network settings. For example, in the case of a VR game, a game company may need to integrate a core server with an edge network server of a network operator to minimize delay.
Automotive is expected to become an important new driver for 5G, with many use cases for mobile communications to vehicles. For example, entertainment for passengers demands high capacity and high mobile broadband at the same time. This is because future users will continue to expect high-quality connections regardless of their location and speed. Another use case in the automotive sector is an augmented reality dashboard. The driver can identify an object in the dark on top of what is being viewed through the front window through the augmented reality dashboard. The augmented reality dashboard displays information that will inform the driver about the object's distance and movement. In the future, the wireless module enables communication between vehicles, information exchange between the vehicle and the supporting infrastructure, and information exchange between the vehicle and other connected devices (e.g. devices accompanied by a pedestrian). The safety system allows the driver to guide the alternative course of action so that he can drive more safely, thereby reducing the risk of accidents. The next step will be a remotely controlled vehicle or self-driving vehicle. This requires a very reliable and very fast communication between different self-driving vehicles and between vehicles and infrastructure. In the future, a self-driving vehicle will perform all driving activities, and the driver will focus only on traffic that the vehicle itself cannot identify. The technical requirements of self-driving vehicles require ultra-low latency and high-speed reliability to increase traffic safety to a level not achievable by humans.
Smart cities and smart homes, which are referred to as smart societies, will be embedded in high density wireless sensor networks. The distributed network of intelligent sensors will identify conditions for cost and energy-efficient maintenance of a city or house. A similar setting can be performed for each home. Temperature sensors, windows and heating controllers, burglar alarms and appliances are all wirelessly connected. Many of these sensors typically require low data rate, low power and low cost. However, for example, real-time high-definition (HD) video may be required for certain types of devices for monitoring.
The consumption and distribution of energy, including heat or gas, is highly dispersed, requiring automated control of distributed sensor networks. The smart grid interconnects these sensors using digital information and communication technologies to collect and act on information. This information can include supplier and consumer behavior, allowing the smart grid to improve the distribution of fuel, such as electricity, in terms of efficiency, reliability, economy, production sustainability, and automated methods. The smart grid can be viewed as another sensor network with low latency.
The health sector has many applications that can benefit from mobile communications. Communication systems can support telemedicine to provide clinical care in remote locations. This can help to reduce barriers to distance and improve access to health services that are not continuously available in distant rural areas. It is also used to save lives in critical care and emergency situations. Mobile communication based wireless sensor networks can provide remote monitoring and sensors for parameters such as heart rate and blood pressure.
Wireless and mobile communications are becoming increasingly important in industrial applications. Wiring costs are high for installation and maintenance. Thus, the possibility of replacing a cable with a wireless link that can be reconfigured is an attractive opportunity in many industries. However, achieving this requires that wireless connections operate with similar delay, reliability, and capacity as cables and that their management is simplified. Low latency and very low error probabilities are new requirements that need to be connected to 5G.
Logistics and freight tracking are important use cases of mobile communications that enable tracking of inventory and packages anywhere using location based information systems. Use cases of logistics and freight tracking typically require low data rates, but require a large range and reliable location information.
FIG. 2 shows an example of a wireless communication system to which the technical features of the present invention can be applied.
Referring to FIG. 2, the wireless communication system may include a first device 210 and a second device 220.
The first device 210 includes a base station, a network node, a transmitting UE, a receiving UE, a wireless device, a wireless communication device, a vehicle, a vehicle equipped with an autonomous driving function, a connected car, a drone, an unmanned aerial vehicle (UAV), an artificial intelligence (AI) module, a robot, an AR device, a VR device, a mixed reality (MR) device, a hologram device, a public safety device, an MTC device, an IoT device, a medical device, a fin-tech device (or, a financial device), a security device, a climate/environmental device, a device related to 5G services, or a device related to the fourth industrial revolution.
The second device 220 includes a base station, a network node, a transmitting UE, a receiving UE, a wireless device, a wireless communication device, a vehicle, a vehicle equipped with an autonomous driving function, a connected car, a drone, a UAV, an AI module, a robot, an AR device, a VR device, an MR device, a hologram device, a public safety device, an MTC device, an IoT device, a medical device, a fin-tech device (or, a financial device), a security device, a climate/environmental device, a device related to 5G services, or a device related to the fourth industrial revolution.
For example, the UE may include a mobile phone, a smart phone, a laptop computer, a digital broadcasting terminal, a personal digital assistant (PDA), a portable multimedia player (PMP), a navigation device, a slate personal computer (PC), a tablet PC, an ultrabook, a wearable device (e.g. a smartwatch, a smart glass, a head mounted display (HMD)) . For example, the HMD may be a display device worn on the head. For example, the HMD may be used to implement AR, VR and/or MR.
For example, the drone may be a flying object that is flying by a radio control signal without a person boarding it. For example, the VR device may include a device that implements an object or background in the virtual world. For example, the AR device may include a device that implements connection of an object and/or a background of a virtual world to an object and/or a background of the real world. For example, the MR device may include a device that implements fusion of an object and/or a background of a virtual world to an object and/or a background of the real world. For example, the hologram device may include a device that implements a 360-degree stereoscopic image by recording and playing stereoscopic information by utilizing a phenomenon of interference of light generated by the two laser lights meeting with each other, called holography. For example, the public safety device may include a video relay device or a video device that can be worn by the user's body. For example, the MTC device and the IoT device may be a device that do not require direct human intervention or manipulation. For example, the MTC device and the IoT device may include a smart meter, a vending machine, a thermometer, a smart bulb, a door lock and/or various sensors. For example, the medical device may be a device used for the purpose of diagnosing, treating, alleviating, handling, or preventing a disease. For example, the medical device may be a device used for the purpose of diagnosing, treating, alleviating, or correcting an injury or disorder. For example, the medical device may be a device used for the purpose of inspecting, replacing or modifying a structure or function. For example, the medical device may be a device used for the purpose of controlling pregnancy. For example, the medical device may include a treatment device, a surgical device, an (in vitro) diagnostic device, a hearing aid and/or a procedural device, etc. For example, a security device may be a device installed to prevent the risk that may occur and to maintain safety. For example, the security device may include a camera, a closed-circuit TV (CCTV), a recorder, or a black box. For example, the fin-tech device may be a device capable of providing financial services such as mobile payment. For example, the fin-tech device may include a payment device or a point of sales (POS). For example, the climate/environmental device may include a device for monitoring or predicting the climate/environment.
The first device 210 may include at least one or more processors, such as a processor 211, at least one memory, such as a memory 212, and at least one transceiver, such as a transceiver 213. The processor 211 may perform the functions, procedures, and/or methods of the present invention described below. The processor 211 may perform one or more protocols. For example, the processor 211 may perform one or more layers of the air interface protocol. The memory 212 is connected to the processor 211 and may store various types of information and/or instructions. The transceiver 213 is connected to the processor 211 and may be controlled to transmit and receive wireless signals.
The second device 220 may include at least one or more processors, such as a processor 221, at least one memory, such as a memory 222, and at least one transceiver, such as a transceiver 223. The processor 221 may perform the functions, procedures, and/or methods of the present invention described below. The processor 221 may perform one or more protocols. For example, the processor 221 may perform one or more layers of the air interface protocol. The memory 222 is connected to the processor 221 and may store various types of information and/or instructions. The transceiver 223 is connected to the processor 221 and may be controlled to transmit and receive wireless signals.
The memory 212, 222 may be connected internally or externally to the processor 211, 212, or may be connected to other processors via a variety of technologies such as wired or wireless connections.
The first device 210 and/or the second device 220 may have more than one antenna. For example, antenna 214 and/or antenna 224 may be configured to transmit and receive wireless signals.
FIG. 3 shows an example of a wireless communication system to which the technical features of the present invention can be applied.
Specifically, FIG. 3 shows a system architecture based on an evolved-UMTS terrestrial radio access network (E-UTRAN). The aforementioned LTE is a part of an evolved-UTMS (e-UMTS) using the E-UTRAN.
Referring to FIG. 3, the wireless communication system includes one or more user equipment (UE) 310, an E-UTRAN and an evolved packet core (EPC). The UE 310 refers to a communication equipment carried by a user. The UE 310 may be fixed or mobile. The UE 310 may be referred to as another terminology, such as a mobile station (MS), a user terminal (UT), a subscriber station (SS), a wireless device, etc.
The E-UTRAN consists of one or more evolved NodeB (eNB) 320. The eNB 320 provides the E-UTRA user plane and control plane protocol terminations towards the UE 10. The eNB 320 is generally a fixed station that communicates with the UE 310. The eNB 320 hosts the functions, such as inter-cell radio resource management (RRM), radio bearer (RB) control, connection mobility control, radio admission control, measurement configuration/provision, dynamic resource allocation (scheduler), etc. The eNB 320 may be referred to as another terminology, such as a base station (BS), a base transceiver system (BTS), an access point (AP), etc.
A downlink (DL) denotes communication from the eNB 320 to the UE 310. An uplink (UL) denotes communication from the UE 310 to the eNB 320. A sidelink (SL) denotes communication between the UEs 310. In the DL, a transmitter may be a part of the eNB 320, and a receiver may be a part of the UE 310. In the UL, the transmitter may be a part of the UE 310, and the receiver may be a part of the eNB 320. In the SL, the transmitter and receiver may be a part of the UE 310.
The EPC includes a mobility management entity (MME), a serving gateway (S-GW) and a packet data network (PDN) gateway (P-GW). The MME hosts the functions, such as non-access stratum (NAS) security, idle state mobility handling, evolved packet system (EPS) bearer control, etc. The S-GW hosts the functions, such as mobility anchoring, etc. The S-GW is a gateway having an E-UTRAN as an endpoint. For convenience, MME/S-GW 330 will be referred to herein simply as a "gateway," but it is understood that this entity includes both the MME and S-GW. The P-GW hosts the functions, such as UE Internet protocol (IP) address allocation, packet filtering, etc. The P-GW is a gateway having a PDN as an endpoint. The P-GW is connected to an external network.
The UE 310 is connected to the eNB 320 by means of the Uu interface. The UEs 310 are interconnected with each other by means of the PC5 interface. The eNBs 320 are interconnected with each other by means of the X2 interface. The eNBs 320 are also connected by means of the S1 interface to the EPC, more specifically to the MME by means of the S1-MME interface and to the S-GW by means of the S1-U interface. The S1 interface supports a many-to-many relation between MMEs / S-GWs and eNBs.
FIG. 4 shows another example of a wireless communication system to which the technical features of the present invention can be applied.
Specifically, FIG. 4 shows a system architecture based on a 5G NR. The entity used in the 5G NR (hereinafter, simply referred to as "NR") may absorb some or all of the functions of the entities introduced in FIG. 3 (e.g. eNB, MME, S-GW). The entity used in the NR may be identified by the name "NG" for distinction from the LTE/LTE-A.
Referring to FIG. 4, the wireless communication system includes one or more UE 410, a next-generation RAN (NG-RAN) and a 5th generation core network (5GC). The NG-RAN consists of at least one NG-RAN node. The NG-RAN node is an entity corresponding to the eNB 320 shown in FIG. 3. The NG-RAN node consists of at least one gNB 421 and/or at least one ng-eNB 422. The gNB 421 provides NR user plane and control plane protocol terminations towards the UE 410. The ng-eNB 422 provides E-UTRA user plane and control plane protocol terminations towards the UE 410.
The 5GC includes an access and mobility management function (AMF), a user plane function (UPF) and a session management function (SMF). The AMF hosts the functions, such as NAS security, idle state mobility handling, etc. The AMF is an entity including the functions of the conventional MME. The UPF hosts the functions, such as mobility anchoring, protocol data unit (PDU) handling. The UPF an entity including the functions of the conventional S-GW. The SMF hosts the functions, such as UE IP address allocation, PDU session control.
The gNBs 421 and ng-eNBs 422 are interconnected with each other by means of the Xn interface. The gNBs 421 and ng-eNBs 422 are also connected by means of the NG interfaces to the 5GC, more specifically to the AMF by means of the NG-C interface and to the UPF by means of the NG-U interface.
A protocol structure between network entities described above is described. On the system of FIG. 3 and/or FIG. 4, layers of a radio interface protocol between the UE and the network (e.g. NG-RAN and/or E-UTRAN) may be classified into a first layer (L1), a second layer (L2), and a third layer (L3) based on the lower three layers of the open system interconnection (OSI) model that is well-known in the communication system.
FIG. 5 shows a block diagram of a user plane protocol stack to which the technical features of the present invention can be applied. FIG. 6 shows a block diagram of a control plane protocol stack to which the technical features of the present invention can be applied.
The user/control plane protocol stacks shown in FIG. 5 and FIG. 6 are used in NR. However, user/control plane protocol stacks shown in FIG. 5 and FIG. 6 may be used in LTE/LTE-A without loss of generality, by replacing gNB/AMF with eNB/MME.
Referring to FIG. 5 and FIG. 6, a physical (PHY) layer belonging to L1. The PHY layer offers information transfer services to media access control (MAC) sublayer and higher layers. The PHY layer offers to the MAC sublayer transport channels. Data between the MAC sublayer and the PHY layer is transferred via the transport channels. Between different PHY layers, i.e., between a PHY layer of a transmission side and a PHY layer of a reception side, data is transferred via the physical channels.
The MAC sublayer belongs to L2. The main services and functions of the MAC sublayer include mapping between logical channels and transport channels, multiplexing/de-multiplexing of MAC service data units (SDUs) belonging to one or different logical channels into/from transport blocks (TB) delivered to/from the physical layer on transport channels, scheduling information reporting, error correction through hybrid automatic repeat request (HARQ), priority handling between UEs by means of dynamic scheduling, priority handling between logical channels of one UE by means of logical channel prioritization (LCP), etc. The MAC sublayer offers to the radio link control (RLC) sublayer logical channels.
The RLC sublayer belong to L2. The RLC sublayer supports three transmission modes, i.e. transparent mode (TM), unacknowledged mode (UM), and acknowledged mode (AM), in order to guarantee various quality of services (QoS) required by radio bearers. The main services and functions of the RLC sublayer depend on the transmission mode. For example, the RLC sublayer provides transfer of upper layer PDUs for all three modes, but provides error correction through ARQ for AM only. In LTE/LTE-A, the RLC sublayer provides concatenation, segmentation and reassembly of RLC SDUs (only for UM and AM data transfer) and re-segmentation of RLC data PDUs (only for AM data transfer). In NR, the RLC sublayer provides segmentation (only for AM and UM) and re-segmentation (only for AM) of RLC SDUs and reassembly of SDU (only for AM and UM). That is, the NR does not support concatenation of RLC SDUs. The RLC sublayer offers to the packet data convergence protocol (PDCP) sublayer RLC channels.
The PDCP sublayer belong to L2. The main services and functions of the PDCP sublayer for the user plane include header compression and decompression, transfer of user data, duplicate detection, PDCP PDU routing, retransmission of PDCP SDUs, ciphering and deciphering, etc. The main services and functions of the PDCP sublayer for the control plane include ciphering and integrity protection, transfer of control plane data, etc.
The service data adaptation protocol (SDAP) sublayer belong to L2. The SDAP sublayer is only defined in the user plane. The SDAP sublayer is only defined for NR. The main services and functions of SDAP include, mapping between a QoS flow and a data radio bearer (DRB), and marking QoS flow ID (QFI) in both DL and UL packets. The SDAP sublayer offers to 5GC QoS flows.
A radio resource control (RRC) layer belongs to L3. The RRC layer is only defined in the control plane. The RRC layer controls radio resources between the UE and the network. To this end, the RRC layer exchanges RRC messages between the UE and the BS. The main services and functions of the RRC layer include broadcast of system information related to AS and NAS, paging, establishment, maintenance and release of an RRC connection between the UE and the network, security functions including key management, establishment, configuration, maintenance and release of radio bearers, mobility functions, QoS management functions, UE measurement reporting and control of the reporting, NAS message transfer to/from NAS from/to UE.
In other words, the RRC layer controls logical channels, transport channels, and physical channels in relation to the configuration, reconfiguration, and release of radio bearers. A radio bearer refers to a logical path provided by L1 (PHY layer) and L2 (MAC/RLC/PDCP/SDAP sublayer) for data transmission between a UE and a network. Setting the radio bearer means defining the characteristics of the radio protocol layer and the channel for providing a specific service, and setting each specific parameter and operation method. Radio bearer may be divided into signaling RB (SRB) and data RB (DRB). The SRB is used as a path for transmitting RRC messages in the control plane, and the DRB is used as a path for transmitting user data in the user plane.
An RRC state indicates whether an RRC layer of the UE is logically connected to an RRC layer of the E-UTRAN. In LTE/LTE-A, when the RRC connection is established between the RRC layer of the UE and the RRC layer of the E-UTRAN, the UE is in the RRC connected state (RRC_CONNECTED). Otherwise, the UE is in the RRC idle state (RRC_IDLE). In NR, the RRC inactive state (RRC_INACTIVE) is additionally introduced. RRC_INACTIVE may be used for various purposes. For example, the massive machine type communications (MMTC) UEs can be efficiently managed in RRC_INACTIVE. When a specific condition is satisfied, transition is made from one of the above three states to the other.
A predetermined operation may be performed according to the RRC state. In RRC_IDLE, public land mobile network (PLMN) selection, broadcast of system information (SI), cell re-selection mobility, core network (CN) paging and discontinuous reception (DRX) configured by NAS may be performed. The UE shall have been allocated an identifier (ID) which uniquely identifies the UE in a tracking area. No RRC context stored in the BS.
In RRC_CONNECTED, the UE has an RRC connection with the network (i.e. E-UTRAN/NG-RAN). Network-CN connection (both C/U-planes) is also established for UE. The UE AS context is stored in the network and the UE. The RAN knows the cell which the UE belongs to. The network can transmit and/or receive data to/from UE. Network controlled mobility including measurement is also performed.
Most of operations performed in RRC_IDLE may be performed in RRC_INACTIVE. But, instead of CN paging in RRC_IDLE, RAN paging is performed in RRC_INACTIVE. In other words, in RRC_IDLE, paging for mobile terminated (MT) data is initiated by core network and paging area is managed by core network. In RRC_INACTIVE, paging is initiated by NG-RAN, and RAN-based notification area (RNA) is managed by NG-RAN. Further, instead of DRX for CN paging configured by NAS in RRC_IDLE, DRX for RAN paging is configured by NG-RAN in RRC_INACTIVE. Meanwhile, in RRC_INACTIVE, 5GC-NG-RAN connection (both C/U-planes) is established for UE, and the UE AS context is stored in NG-RAN and the UE. NG-RAN knows the RNA which the UE belongs to.
NAS layer is located at the top of the RRC layer. The NAS control protocol performs the functions, such as authentication, mobility management, security control.
The physical channels may be modulated according to OFDM processing and utilizes time and frequency as radio resources. The physical channels consist of a plurality of orthogonal frequency division multiplexing (OFDM) symbols in time domain and a plurality of subcarriers in frequency domain. One subframe consists of a plurality of OFDM symbols in the time domain. A resource block is a resource allocation unit, and consists of a plurality of OFDM symbols and a plurality of subcarriers. In addition, each subframe may use specific subcarriers of specific OFDM symbols (e.g. first OFDM symbol) of the corresponding subframe for a physical downlink control channel (PDCCH), i.e. L1/L2 control channel. A transmission time interval (TTI) is a basic unit of time used by a scheduler for resource allocation. The TTI may be defined in units of one or a plurality of slots, or may be defined in units of mini-slots.
The transport channels are classified according to how and with what characteristics data are transferred over the radio interface. DL transport channels include a broadcast channel (BCH) used for transmitting system information, a downlink shared channel (DL-SCH) used for transmitting user traffic or control signals, and a paging channel (PCH) used for paging a UE. UL transport channels include an uplink shared channel (UL-SCH) for transmitting user traffic or control signals and a random access channel (RACH) normally used for initial access to a cell.
Different kinds of data transfer services are offered by MAC sublayer. Each logical channel type is defined by what type of information is transferred. Logical channels are classified into two groups: control channels and traffic channels.
Control channels are used for the transfer of control plane information only. The control channels include a broadcast control channel (BCCH), a paging control channel (PCCH), a common control channel (CCCH) and a dedicated control channel (DCCH). The BCCH is a DL channel for broadcasting system control information. The PCCH is DL channel that transfers paging information, system information change notifications. The CCCH is a channel for transmitting control information between UEs and network. This channel is used for UEs having no RRC connection with the network. The DCCH is a point-to-point bi-directional channel that transmits dedicated control information between a UE and the network. This channel is used by UEs having an RRC connection.
Traffic channels are used for the transfer of user plane information only. The traffic channels include a dedicated traffic channel (DTCH). The DTCH is a point-to-point channel, dedicated to one UE, for the transfer of user information. The DTCH can exist in both UL and DL.
Regarding mapping between the logical channels and transport channels, in DL, BCCH can be mapped to BCH, BCCH can be mapped to DL-SCH, PCCH can be mapped to PCH, CCCH can be mapped to DL-SCH, DCCH can be mapped to DL-SCH, and DTCH can be mapped to DL-SCH. In UL, CCCH can be mapped to UL-SCH, DCCH can be mapped to UL- SCH, and DTCH can be mapped to UL-SCH.
RRC connection establishment procedure is described.
The purpose of this procedure is to establish an RRC connection. RRC connection establishment involves SRB1 establishment. The procedure is also used to transfer the initial NAS dedicated information/ message from the UE to the network.
The UE initiates the procedure when upper layers request establishment of an RRC connection while the UE is in RRC_IDLE.
As one UE implementation option, upper layers may request access barring check as specified in the unified acccess control procedure and only request the RRC establishment when the access attempt is considered allowed. As another UE implementation option, upper layers may instead provide an Access Category and one or more Access Identities upon requesting the RRC establishment so that RRC initiates the access barring check.
Upon initiation of the procedure, the UE shall:
1> if the upper layers provide an Access Category and one or more Access Identities upon requesting establishment of an RRC connection:
2> perform the unified acccess control procedure using the Access Category and Access Identities provided by upper layers;
3> if the access attempt is barred, the procedure ends;
1> apply the default physical channel configuration;
1> apply the default semi-persistent scheduling configuration;
1> apply the default MAC main configuration;
1> apply the CCCH configuration;
1> start timer T300;
1> initiate transmission of the RRCSetupRequest message in accordance with 5.3.3.3;
The UE shall set the contents of RRCSetupRequest message as follows:
1> set the ue-Identity as follows:
2> if upper layers provide an 5G-S-TMSI:
3> set the ue-Identity to ng-5G-s-tmsi-part1;
2> else:
3> draw a 39 bit random value in the range 0 .. 239-1 and set the ue-Identity to this value;
Upper layers provide the 5G-S-TMSI if the UE is registered in the TA of the current cell.
1> set the establishmentCause in accordance with the information received from upper layers;
The UE shall submit the RRCSetupRequest message to lower layers for transmission.
The UE shall continue cell re-selection related measurements as well as cell re-selection evaluation. If the conditions for cell re-selection are fulfilled, the UE shall perform cell re-selection.
The UE shall perform the following actions upon reception of the RRCSetup:
1> if the RRCSetup is received in response to an RRCReestablishmentRequest; or
1> if the RRCSetup is received in response to an RRCResumeRequest:
2> discard the stored UE AS context, fullI-RNTI and shortI-RNTI, if stored;
2> indicate to upper layers fallback of the RRC connection;
1> perform the cell group configuration procedure in accordance with the received masterCellGroup;
1> perform the radio bearer configuration procedure in accordance with the received radioBearerConfig;
1> if stored, discard the cell reselection priority information provided by the cellReselectionPriorities or inherited from another RAT;
1> stop timer T300, T301 or T319 if running;
1> stop timer T320, if running;
1> if the RRCSetup is received in response to an RRCResumeRequest or RRCSetupRequest:
2> enter RRC_CONNECTED;
2> stop the cell re-selection procedure;
1> consider the current cell to be the PCell;
1> set the content of RRCSetupComplete message as follows:
2> if upper layers provide an 5G-S-TMSI:
3> if the RRCSetup is received in response to an RRCSetupRequest:
4>  set the ng-5G-S-TMSI-Value to ng-5G-s-tmsi-part2;
3> else:
4>  set the ng-5G-S-TMSI-Value to ng-5g-s-tmsi;
2> set the selectedPLMN-Identity to the PLMN selected by upper layers (TS 24.501 [23]) from the PLMN(s) included in the plmn-IdentityList in SIB1;
2> if the masterCellGroupConfig contains the reportUplinkTxDirectCurrent:
3> include the uplinkTxDirectCurrentList;
2> if upper layers provide the 'Registered AMF':
3> include and set the registeredAMF as follows:
4> if the PLMN identity of the 'Registered AMF' is different from the PLMN selected by the upper layers:
5> include the plmnIdentity in the registeredAMF and set it to the value of the PLMN identity in the 'Registered AMF' received from upper layers;
4> set the amf-Region, amf-SetId, amf-Pointer to the value received from upper layers;
3> include and set the guami-Type to the value provided by the upper layers;
2> if upper layers provide one or more S-NSSAI:
3> include the s-nssai-list and set the content to the values provided by the upper layers;
2> set the dedicatedInfoNAS to include the information received from upper layers;
1> submit the RRCSetupComplete message to lower layers for transmission, upon which the procedure ends
RRC connection resume procedure is described.
The purpose of this procedure is to resume a suspended RRC connection, including resuming SRB(s) and DRB(s) or perform an RNA update.
The UE initiates the procedure when upper layers or AS (when responding to NG-RAN paging or upon triggering RNA updates while the UE is in RRC_INACTIVE) requests the resume of a suspended RRC connection.
As one UE implementation option, upper layers may request access barring check as specified in the unified acccess control procedure and only request the RRC resumption when the access attempt is considered allowed. As another UE implementation option, upper layers may instead provide an Access Category and one or more Access Identities upon requesting the RRC resumption so that RRC initiates the access barring check.
Upon initiation of the procedure, the UE shall:
1> if the upper layers provide an Access Category and one or more Access Identities upon requesting the resumption of an RRC connection:
2> perform the unified acccess control procedure using the Access Category and Access Identities provided by upper layers;
3> if the access attempt is barred, the procedure ends;
1> if the resumption of the RRC connection is triggered due to an RNA update:
2> if an emergency service is ongoing:
How the RRC layer in the UE is aware of an ongoing emergency service is up to UE implementation.
3> select '2' as the Access Category;
2> else:
3> select [the Access Category corresponding to RNA update] as the Access Category;
2> perform the unified acccess control procedure as specified in 5.3.14 using the selected Access Category and one or more Access Identities provided by upper layers;
3> if the access attempt is barred:
4> set the variable pendingRnaUpdate to 'TRUE';
4> the procedure ends;
1> if the resumption of the RRC connection is triggered by response to NG-RAN paging:
2> select '0' as the Access Category;
2> perform the unified acccess control procedure as specified in 5.3.14 using the selected Access Category and one or more Access Identities provided by upper layers;
3> if the access attempt is barred, the procedure ends;
1> apply the default Serving Cell configuration;
1> apply the default physical Cell Group configuration;
1> apply the default MAC Cell Group configuration;
1> apply the CCCH configuration;
1> start timer T319;
1> stop timer T380, if running;
1> initiate transmission of the RRCResumeRequest message;
The UE shall set the contents of RRCResumeRequest or RRCResumeRequest1 message as follows:
1> if field useFullResumeID is signalled in SIB1:
2> select RRCResumeRequest1 as the message to use;
2> set the resumeIdentity to the stored fullI-RNTI value;
1> else:
2> select RRCResumeRequest as the message to use;
2> set the shortResumeIdentity to the stored shortI-RNTI value;
1> set the resumeCause in accordance with the information received from upper layers or from AS layer;
1> set the resumeMAC-I to the 16 least significant bits of the MAC-I calculated:
2> over the ASN.1 encoded as per section 8 (i.e., a multiple of 8 bits) VarResumeMAC-Input;
2> with the KRRCint key and the previously configured integrity protection algorithm; and
2> with all input bits for COUNT, BEARER and DIRECTION set to binary ones;
1> restore the RRC configuration and security context from the stored UE AS context except the cellGroupConfig;
1> update the KgNB key based on the current KgNB or the NH, using the stored nextHopChainingCount value;
1> derive the KRRCenc key, the KRRCint, the KUPint key and the KUPenc key;
1> configure lower layers to resume integrity protection for all radio bearers except SRB0 using the previously configured algorithm and the KRRCint key and KUPint key immediately, i.e., integrity protection shall be applied to all subsequent messages received and sent by the UE;
Only DRBs with previously configured UP integrity protection shall resume integrity protection.
1> configure lower layers to resume ciphering for all radio bearers except SRB0 and to apply the previously configured ciphering algorithm, the KRRCenc key and the KUPenc key, i.e. the ciphering configuration shall be applied to all subsequent messages received and sent by the UE;
1> restore the PDCP state and re-establish PDCP entities for SRB1;
1> resume SRB1;
1> submit the RRCResumeRequest message to lower layers for transmission;
Unified access control is described.
The purpose of this procedure is to perform access barring check for an access attempt associated with a given Access Category and one or more Access Identities upon request from upper layers or the RRC layer.
Upon initiation of the procedure, the UE shall:
1> if timer [T30x] is running for the Access Category:
2> consider the access attempt as barred;
1> if timer T302 is running and the Access Category is neither '2' nor '0':
2> consider the access attempt as barred;
1> else:
2> if the Access Category is '0':
3> consider the access attempt as allowed;
2> else:
3> if SIB1 includes uac-BarringPerPLMN-List and the uac-BarringPerPLMN-List contains an UAC-BarringPerPLMN entry with the plmn-IdentityIndex corresponding to the PLMN selected by upper layers:
4> select the UAC-BarringPerPLMN entry with the plmn-IdentityIndex corresponding to the PLMN selected by upper layers;
4> in the remainder of this procedure, use the selected UAC-BarringPerPLMN entry (i.e. presence or absence of access barring parameters in this entry) irrespective of the common access barring parameters included in SIB1;
3> else
4> in the remainder of this procedure use the common access barring parameters (i.e. presence or absence of these parameters) included in SIB1;
3> if the uac-ACBarringListType indicated that uac-ExplicitACBarringList is used:
4> if the corresponding UAC-BarringPerCatList contains a UAC-BarringPerCat entry corresponding to the Access Category:
5> select the UAC-BarringPerCat entry;
5> if the uac-BarringInfoSetList contain a UAC-BarringInfoSet entry corresponding to the uac-barringInfoSetIndex in the UAC-BarringPerCat:
6> select the UAC-BarringInfoSet entry;
6> perform access barring check for the Access Category, using the UAC-BarringInfoSet as "UAC barring parameter";
5> else:
6> consider the access attempt as allowed;
4> else:
5> consider the access attempt as allowed;
3> select the UAC-BarringInfoSetIndex entry from uac-ImplicitACBarringList entry corresponding to the Access Category;
4> perform access barring check for the Access Category as specified, using uac-BarringInfo corresponding to UAC-BarringInfoSetIndex as "UAC barring parameter";
1> if the access barring check was requested by RRC for an RRC establishment or for an RRC resumption requested by upper layers; or
1> if the access barring check was requested by upper layers:
2> if the access attempt is considered as barred:
3> inform upper layers that the access attempt for the Access Category is barred, upon which the procedure ends;
2> else:
3> inform upper layers that the access attempt for the Access Category is allowed, upon which the procedure ends;
1> else:
2> the procedure ends;
Access barring check is described.
The UE shall:
1> if one or more Access Identities are indicated by upper layers or obtained by the RRC layer, and
1> if for at least one of these Access Identities the corresponding bit in the uac-BarringForAccessIdentity contained in "UAC barring parameter" is set to zero:
2> consider the access attempt as allowed;
1> else:
2> draw a random number 'rand' uniformly distributed in the range: 0 ≤ rand < 1;
2> if 'rand' is lower than the value indicated by uac-BarringFactor included in "UAC barring parameter":
3> consider the access attempt as allowed;
2> else:
3> consider the access attempt as barred;
1> if the access attempt is considered as barred:
2> draw a random number 'rand' that is uniformly distributed in the range 0 ≤ rand < 1;
2> start timer [T30x] for the Access Category with the timer value calculated as follows, using the uac-BarringTime included in "AC barring parameter": "Tbarring" = (0.7+ 0.6 * rand) * uac-BarringTime;
Hereinafter, integrated access and backhaul (IAB) is described.
FIG. 7 shows a reference diagram for IAB in standalone mode. Referring to FIG. 7, reference diagram for IAB contains one IAB-donor and multiple IAB-nodes. The IAB-donor is treated as a single logical node that comprises a set of functions such as gNB-DU, gNB-CU-CP, gNB-CU-UP and potentially other functions. In a deployment, the IAB-donor can be split according to these functions, which can all be either collocated or non-collocated as allowed by 3GPP NG-RAN architecture. IAB-related aspects may arise when such split is exercised, which will be explored at a later stage of the study. Also, some of the functions presently associated with the IAB-donor may eventually be moved outside of the donor in case it becomes evident that they do not perform IAB-specific tasks.
IAB strives to reuse existing functions and interfaces defined for access. In particular, Mobile-Termination (MT), gNB-DU, gNB-CU, UPF, AMF and SMF as well as the corresponding interfaces NR Uu (between MT and gNB), F1, NG, X2 and N4 are used as baseline for the IAB architectures.
The Mobile-Termination (MT) function has been defined a component of the Mobile Equipment. In the context of this study, MT is referred to as a function residing on an IAB-node that terminates the radio interface layers of the backhaul Uu interface toward the IAB-donor or other IAB-nodes. IAB-node is a RAN node that supports wireless access to UEs and wirelessly backhauls the access traffic. IAB-donor is a RAN node which provides UE's interface to core network and wireless backhauling functionality to IAB nodes.
An IAB node may follow the same initial access procedure as an UE, including cell search, SI acquisition, and random access, in order to initially set up a connection to a parent IAB-node or an IAB-donor. Since the IAB node will perform RRC Connection Establishment towards a certain gNB as an UE, the IAB node may perform the Unified Access Control in the RRC Connection Establishment procedure. In addition, the gNB may perform overload control so that it would determine whether to accept or reject the RRC Setup Request e.g. based on the establishmentCause in the RRCSetupRequest message.
The network may need to differentiate initial access from IAB node and other accesses from normal UEs. The network may prioritize or de-prioritize initial access from IAB node over other accesses from normal UEs in congestion due to some reasons.
For example, the network may prioritize initial access from IAB nodes over other accesses because the IAB nodes are part of network coverage. If the access from IAB nodes is de-prioritized, the network may have a hole in their coverage. On the other hand, the network may de-prioritize initial access from a certain IAB node because the IAB node may consume huge resources. Compared to the amount of resources consumed by normal UEs, IAB nodes may consume much more radio/network resources. Thus, when a parent IAB-node or an IAB-donor is already serving other IAB nodes, it would be reluctant to accept additional connection with a new IAB node.
In addition, the IAB node connected to a parent/donor node may detect connection failure on wireless backhaul link. When connection failure occurs, the IAB node will perform RRC re-establishment. However, the IAB node may fall into RRC_IDLE due to re-establishment failure sometimes. Thus, after suddenly going to RRC_IDLE, the IAB node would immediately re-access for recovering the wireless backhaul link.
It is highly desirable to prioritize such re-access from an IAB node caused by connection failure of the wireless backhaul link, because the IAB node may be serving another IAB node and/or some normal UEs as part of the network. When connection failure occurs, the IAB node could redirect some UEs using delay-sensitive services to inter-frequency neighbouring cells, if reachable to those UEs. However, it is important for the IAB node to quickly recover from connection failure in order to maintain network coverage. The IAB node may be still serving other UEs having no alternative cells, staying in RRC_INACTIVE, or using delay-tolerant services only. Accordingly, when an IAB node goes to RRC_IDLE due to connection failure on the wireless backhaul link, the network should be able to prioritize re-access of the IAB node for fast backhaul recovery.
An IAB node may consist of MT part and DU part. When the IAB node operates as a terminal, IAB node MT part may perform access to network side. When the IAB node operate as a base station, the IAB node DU part may serve other IAB node or other terminals.
FIG. 8 shows a method for access control according to an embodiment of the present invention.
In step S802, the node may detect a failure of connection on a wireless back haul link. The node may perform a radio resource control (RRC) re-establishment procedure, and detect that the RRC re-establishment procedure fails. The node may be an integrated access and backhaul (IAB) node. The IAB node may be referred as a node, and may be configured to operate both as a user equipment and as a base station.
In step S804, the node may leave connected state.
In step S806, the node may select a parameter related to the failure. The parameter may be a cause value for the connection establishment. The parameter may be an access category. The parameter may inform that the RRC re-establishment procedure fails. The node may perform access barring check based on the access category. The node may determine that an access by the node is allowed as a result of the access barring check.
In step S808, the node may perform connection establishment based on the parameter.
The node may communicate with at least one of a mobile terminal, a network or autonomous vehicles other than the node. The node may further transmit a RRC connection complete message including information on type of the failure. The type of the failure may be at least one of radio link failure, handover failure, beam failure, backhaul link failure, access barring, reception of reject message, network congestion or radio congestion.
According to embodiments of the present invention, the node may efficiently determine whether an access needs to be prioritized or not, based on the connection request including cause value and/or access category mapped to the recovery of the connection failure.
FIG. 9 shows a method for access control performed by a user equipment (UE) according to an embodiment of the present invention. The UE may be served by an IAB node.
In step S902, the UE may detect connection failure with the base station and goes to RRC_IDLE or RRC_INACTIVE. The connection failure may be one of radio link failure, handover failure, beam failure, backhaul link failure, access barring, reception of reject message, network congestion and radio congestion. In this embodiment, the UE may detect a problem on backhaul link, the UE may initiate RRC re-establishment procedure. When the RRC re-establishment procedure is failed, the UE may enter RRC_IDLE or RRC_INACTIVE. In other words, it may be assumed that RRC re-establishment procedure has been already performed and failed, when the UE enter RRC_IDLE or RRC_IDLE upon detecting connection failure.
In step S904, the UE may set a parameter related to re-access. The parameter may be at least one of cause value or access category. The cause value may be used as an establishment cause for RRC connection request. The UE may select a cause value and/or an access category which are/is mapped to recovery from the connection failure. That is, the cause value and/or access category may indicate the connection failure. The cause value and/or access category may inform that the corresponding access is for recovery form the connection failure. The cause value and/or access category may inform that the corresponding access needs to be prioritized. The cause value and/or access category may configured as highly prioritized value. The cause value and/or access category may inform that the corresponding access needs to be prioritized. The cause value and/or access category may be newly defined other than access category 0-15.
In step S906, the UE may perform access barring check based on the selected access category and barring information mapped to the access category. The UE may determine whether access attempt is allowed or barred at a cell by the result of the access barring check. The barring information may be received via system information from the cell.
In step S908, the UE may transmit a connection request including the cause value in uplink, if the access attempt is allowed. The connection request may be one of the RRCSetupRequest message and the RRCResumeRequest message.
In step S910, the UE may transmit a connection complete message indicating a type of the connection failure, if the UE receives a positive response to the connection request. The type of the connection failure indicates one of radio link failure, handover failure, beam failure, backhaul link failure, access barring, reception of reject message, network congestion and radio congestion.
According to embodiments of the present invention, the node may efficiently determine whether an access needs to be prioritized or not, based on the connection request including cause value and/or access category mapped to the recovery of the connection failure.
FIG. 10 shows a method performed by a node according to an embodiment of the present invention.
In step S1002, the node may be connected to a donor node on the radio via a base station. In this embodiment, the node may be one of a UE, gNB, eNB, a DU, a CU and IAB node. The base station may be one of a cell, gNB, eNB, a DU, a CU, IAB node and IAB donor.
In step S1004, the node may relay information or a packet received from a device to the base station.
In step S1006, the node may detect connection failure with the base station. Then the node may go to RRC_IDLE or RRC_INACTIVE. The connection failure may be one of radio link failure, handover failure, beam failure, backhaul link failure, access barring, reception of reject message, network congestion and radio congestion. In this embodiment, the node detect a problem on backhaul link, the node may initiate RRC re-establishment procedure. When even the RRC re-establishment procedure is failed, the node may enter RRC_IDLE or RRC_INACTIVE. In other words, it may be assumed that RRC re-establishment procedure has been already performed and failed, when the node enter RRC_IDLE or RRC_IDLE upon detecting connection failure.
In step S1008, the node may select a cause value and/or an access category which are/is mapped to recovery from the connection failure. The cause value and/or access category may indicate the connection failure. The cause value and/or access category may inform that the corresponding access is for recovery form the connection failure. The cause value and/or access category may inform that the corresponding access needs to be prioritized. The cause value and/or access category may configured as highly prioritized value. The cause value and/or access category may inform that the corresponding access needs to be prioritized. The cause value and/or access category may be newly defined other than access category 0-15.
The node alternatively may select an access category mapped to all F1AP messages or a F1AP message. The node alternatively may select an access category mapped to all access attempts or some access attempts from an IAB node. The cause may be establishmentCause or resumeCause.
In step S1010, the node may perform access barring check based on the selected access category. The UE may determine whether access attempt is allowed or barred at a cell by using the selected access category and barring information mapped to the access category. The barring information may be received via system information from the cell.
In step S1012, the node may transmit a connection request including the cause value in uplink, if the access attempt is allowed. The connection request may be one of the F1AP initial UL RRC message, the RRCSetupRequest message and the RRCResumeRequest message.
In step S1014, the node may transmit a connection complete message indicating a type of the connection failure and/or relaying information, if the node receives a positive response to the connection request. The type of the connection failure may indicate at least one of radio link failure, handover failure, beam failure, backhaul link failure, access barring, reception of reject message, network congestion and radio congestion. The relaying information may include one or more of the number of UEs served by/connected to this node, the number of the other IAB node served by/connected to this node, QoS or priority information of services relayed/used by this node, the number of relay hop from the UE up to this node, the number of relaying IAB nodes from the UE up to this node, and radio capacity/throughput relayed/consumed by this node.
According to embodiments of the present invention, the node may efficiently determine whether an access needs to be prioritized or not, based on the connection request including cause value and/or access category mapped to the recovery of the connection failure. Further, the IAB node may inform implicitly that the access attempt is for IAB node, so that the access from IAB node may be prioritized.
IAB node mobile termination (MT) part may connect the network as a normal UE. In other words, IAB node MT part may perform RRC connection setup procedure between donor-CU, authentication and PDU session establishment between OAM, IAB node MT part related context and bearer configuration in RAN side and etc. For CP alternative 2 and alternative 4 for 1a and 1b, the intermediate IAB node DU part may encapsulate the related RRC messages of the IAB node MT part in F1-AP messages.
The IAB node may be integrated into the network by performing routing update and IAB node DU part setup. Then, the IAB-node may provide service to UEs or to other integrated IAB-nodes.
FIG. 11 shows a method for access control according to an embodiment of the present invention. In this embodiment, a first node and a second node may be IAB nodes. The first node may be served by a second node. The second node may be served by a donor node. The first node may serve at least one of UEs and other IAB nodes.
In FIG. 11, it may be assumed that the first node is initially connected to the donor node via the second node. In specific, the second node may perform normal cell discovery and cell selection. The second node may initially perform RRC connection establishment to the network, e.g. donor node. For example, the second node may select an access category mapped to initial access from an IAB node or any access from IAB node.
In step S1102, the second node may transmit system information including barring information.
In step S1104, the first node may perform access barring check, after connection failure which led the first node to RRC_IDLE. The connection failure may be occurred on wireless backhaul link between the first node and the second node. The connection failure may be detected after performing RRC re-establishment. In specific, the first node may perform a RRC connection re-establishment procedure, when a problem on the backhaul link is detected. When even the RRC connection re-establishment is failed, the first node may declare the connection failure, and go to RRC_IDLE or RRC_INACTIVE. The first node may select an access category mapped to connection failure recovery from an IAB node. The first node may perform the access barring check based on the selected access category and the received barring information in unified access control.
In step S1106, the first node may perform access attempts (e.g. for RRC Connection Establishment or Resume) to the second node, when the access attempt is allowed as a result of the access barring check. The UE may select cause value mapped to the connection failure, and transmit connection request message including the cause value to the second node.
In step S1108, the second node may transmit connection request message to the donor node. In other words, the second node may perform access attempt to the donor node. The second node may transmit a connection request message (e.g. the RRCSetupRequest message or RRCResumeRequest message) to the donor node. The connection request message may include the establishmentCause or the resumeCause set to the cause value mapped to connection failure recovery from an IAB node.Alternatively, the second node may perform access attempts (e.g. for RRC Connection Establishment or Resume) to the network to send a F1AP message. The second node may select an access category mapped to the F1AP message from an IAB node. The first node may perform access barring check with the selected access category and the received barring information in the unified access control. Then, if access attempt is allowed as a result of the access barring check, the second node may set the establishmentCause or the resumeCause to the cause value mapped to the F1AP message from an IAB node in a RRC connection request message (e.g. the RRCSetupRequest message or RRCResumeRequest message).
The access category and/or the cause value may be different depending on the type of F1AP message. For example, access attempts for UE specific F1AP messages and access attempts for UE common F1AP messages may be mapped to different access categories and/or different cause values.
The access category and/or the cause value may be different depending on a role of IAB node. For example, the IAB node may use different Access Categories and/or different cause values for the case that the IAB node performs access attempts as an UE and the case that the IAB node performs access attempts as a IAB node (i.e. relay node),
In step S1110, the donor node may receive overload control message from core network (CN). The overload control message may inform the donor node whether access from the IAB node should be rejected or not e.g. depending on the cause value or the access category mapped to the access. The overload control message may be transmitted before performing admission control, but the time point that the donor node receives the overload control message is not restricted to this embodiment.
In step S1112, the donor node may perform admission control based on the cause value mapped to connection failure recovery. The donor node may perform admission control based on the overload control message. For example, the donor node may set high priority for the admission control to the access from the IAB node, by distinguishing the cause value mapped to connection failure recovery from other cause values. In specific, based on the overload control message, the donor node may determine whether to send connection setup message or connection reject message in response to the connection request message. Or, based on the Overload Control message, the donor node may determine whether to release the connection with the second node after the second node enters RRC_CONNECTED.
In step S1114, the donor node may transmit one of connection setup message or connection reject message from the second node. The connection setup message or connection reject message may be F1AP message. When the donor node sends a RRC Release message to the second node, it may include redirection information in the message. The redirection information may include which donor cell or frequency the second node should be redirected to.
In step S1116, the second node may transmit connection setup message or connection reject message to the first node.
In step S1118, the first node may transmit the connection complete message to the second node, when the first node receives the connection setup message in response to the connection request. Further, the first node may transmit a connection complete message indicating a type of the connection failure and/or relaying information. The type of the connection failure may indicate one of radio link failure, handover failure, beam failure, backhaul link failure, access barring, reception of reject message, network congestion and radio congestion. The connection complete message may be one of the RRCSetupComplete message or RRCResumeComplete message.
In step S1120, the second node may transmit the connection complete message to the second node, when the first node receives the connection setup message in response to the connection request. Further, the second node may transmit the connection complete message indicating a type of F1AP message and/or relaying information, e.g. RRC Connection Setup. For example, the type of F1AP message may be one of UE specific F1AP messages and UE common F1AP messages. The connection complete message may be one of the RRCSetupComplete message or RRCResumeComplete message.
In step S1122, the donor node may perform overlaod control. The donor node may determine whether to send connection release message to the second node.
In step S1124, the donor node may transmit the connection release message. The connection release message may be a F1AP message. The connection release message may include redirection information in the message. The redirection information may include which donor cell or frequency the second node should be redirected to.
In step S1126, the second node may transmit connection release message to the first node. The connection release message may include redirection information in the message. The redirection information may include which donor cell or frequency the second node should be redirected to.
In step S1128, the first node may perform cell selection or cell reselection procedure.
According to embodiments of the present invention, the network may efficiently determine whether an access needs to be prioritized or not, based on the connection request including cause value and/or access category mapped to the recovery of the connection failure. Further, the IAB node may inform implicitly that the access attempt is for IAB node, so that the access from IAB node may be prioritized.
FIG. 12 shows more detailed UE to implement an embodiment of the present invention. The present invention described above for UE side may be applied to this embodiment. In this description, the UE may be an example of IAB node, and the embodiments of the present invention may be implemented by the IAB node.
A UE includes a processor 1210, a power management module 1111, a battery 1212, a display 1213, a keypad 1214, a subscriber identification module (SIM) card 1215, a memory 1220, a transceiver 1230, one or more antennas 1231, a speaker 1240, and a microphone 1241.
The processor 1210 may be configured to implement proposed functions, procedures and/or methods described in this description. Layers of the radio interface protocol may be implemented in the processor 1210. The processor 1210 may include ASIC, other chipset, logic circuit and/or data processing device. The processor 1210 may be an application processor (AP). The processor 1210 may include at least one of a digital signal processor (DSP), a central processing unit (CPU), a graphics processing unit (GPU), a modem (modulator and demodulator). An example of the processor 1210 may be found in SNAPDRAGONTM series of processors made by Qualcomm®, EXYNOSTM series of processors made by Samsung®, A series of processors made by Apple®, HELIOTM series of processors made by MediaTek®, ATOMTM series of processors made by Intel® or a corresponding next generation processor.
According to an embodiment of the present invention, the processor 1210 may be configured to detect a failure of connection on a wireless back haul link. The node may perform a radio resource control (RRC) re-establishment procedure, and detect that the RRC re-establishment procedure fails. The node may be an integrated access and backhaul (IAB) node. The node may be configured to operate both as a user equipment and as a base station.
The processor 1210 may be configured to leave connected state.
The processor 1210 may be configured to select a parameter related to the failure. The parameter may be a cause value for the connection establishment. The parameter may be an access category. The parameter may inform that the RRC re-establishment procedure fails. The node may perform access barring check based on the access category. The node may determine that an access by the node is allowed as a result of the access barring check.
The processor 1210 may be configured to perform connection establishment based on the parameter.
The processor 1210 may be configured to communicate with at least one of a mobile terminal, a network or autonomous vehicles other than the node.
According to embodiments of the present invention, the base station may efficiently determine whether an access needs to be prioritized or not, based on the connection request including cause value and/or access category mapped to the recovery of the connection failure.
The power management module 1211 manages power for the processor 1210 and/or the transceiver 1230. The battery 1212 supplies power to the power management module 1211. The display 1213 outputs results processed by the processor 1210. The keypad 1214 receives inputs to be used by the processor 1210. The keypad 1214 may be shown on the display 1213. The SIM card 1215 is an integrated circuit that is intended to securely store the international mobile subscriber identity (IMSI) number and its related key, which are used to identify and authenticate subscribers on mobile telephony devices (such as mobile phones and computers). It is also possible to store contact information on many SIM cards.
The memory 1220 is operatively coupled with the processor 1210 and stores a variety of information to operate the processor 1210. The memory 1220 may include ROM, RAM, flash memory, memory card, storage medium and/or other storage device. When the embodiments are implemented in software, the techniques described herein can be implemented with modules (e.g., procedures, functions, and so on) that perform the functions described herein. The modules can be stored in the memory 1220 and executed by the processor 1210. The memory 1220 can be implemented within the processor 1210 or external to the processor 1210 in which case those can be communicatively coupled to the processor 1210 via various means as is known in the art.
The transceiver 1230 is operatively coupled with the processor 1210, and transmits and/or receives a radio signal. The transceiver 1230 includes a transmitter and a receiver. The transceiver 1230 may include baseband circuitry to process radio frequency signals. The transceiver 1230 controls the one or more antennas 1231 to transmit and/or receive a radio signal.
The speaker 1240 outputs sound-related results processed by the processor 1210. The microphone 1241 receives sound-related inputs to be used by the processor 1210.
The present invention may be applied to various future technologies, such as AI, robots, autonomous-driving/self-driving vehicles, and/or extended reality (XR).
AI refers to artificial intelligence and/or the field of studying methodology for making it. Machine learning is a field of studying methodologies that define and solve various problems dealt with in AI. Machine learning may be defined as an algorithm that enhances the performance of a task through a steady experience with any task.
An artificial neural network (ANN) is a model used in machine learning. It can mean a whole model of problem-solving ability, consisting of artificial neurons (nodes) that form a network of synapses. An ANN can be defined by a connection pattern between neurons in different layers, a learning process for updating model parameters, and/or an activation function for generating an output value. An ANN may include an input layer, an output layer, and optionally one or more hidden layers. Each layer may contain one or more neurons, and an ANN may include a synapse that links neurons to neurons. In an ANN, each neuron can output a summation of the activation function for input signals, weights, and deflections input through the synapse. Model parameters are parameters determined through learning, including deflection of neurons and/or weights of synaptic connections. The hyper-parameter means a parameter to be set in the machine learning algorithm before learning, and includes a learning rate, a repetition number, a mini batch size, an initialization function, etc. The objective of the ANN learning can be seen as determining the model parameters that minimize the loss function. The loss function can be used as an index to determine optimal model parameters in learning process of ANN.
Machine learning can be divided into supervised learning, unsupervised learning, and reinforcement learning, depending on the learning method. Supervised learning is a method of learning ANN with labels given to learning data. Labels are the answers (or result values) that ANN must infer when learning data is input to ANN. Unsupervised learning can mean a method of learning ANN without labels given to learning data. Reinforcement learning can mean a learning method in which an agent defined in an environment learns to select a behavior and/or sequence of actions that maximizes cumulative compensation in each state.
Machine learning, which is implemented as a deep neural network (DNN) that includes multiple hidden layers among ANN, is also called deep learning. Deep learning is part of machine learning. In the following, machine learning is used to mean deep learning.
A robot can mean a machine that automatically processes or operates a given task by its own abilities. In particular, a robot having a function of recognizing the environment and performing self-determination and operation can be referred to as an intelligent robot. Robots can be classified into industrial, medical, household, military, etc., depending on the purpose and field of use. The robot may include a driving unit including an actuator and/or a motor to perform various physical operations such as moving a robot joint. In addition, the movable robot may include a wheel, a break, a propeller, etc., in a driving unit, and can travel on the ground or fly in the air through the driving unit.
The autonomous-driving refers to a technique of self-driving, and an autonomous vehicle refers to a vehicle that travels without a user's operation or with a minimum operation of a user. For example, autonomous-driving may include techniques for maintaining a lane while driving, techniques for automatically controlling speed such as adaptive cruise control, techniques for automatically traveling along a predetermined route, and techniques for traveling by setting a route automatically when a destination is set. The autonomous vehicle may include a vehicle having only an internal combustion engine, a hybrid vehicle having an internal combustion engine and an electric motor together, and an electric vehicle having only an electric motor, and may include not only an automobile but also a train, a motorcycle, etc. The autonomous vehicle can be regarded as a robot having an autonomous driving function.
XR are collectively referred to as VR, AR, and MR. VR technology provides real-world objects and/or backgrounds only as computer graphic (CG) images, AR technology provides CG images that is virtually created on real object images, and MR technology is a computer graphics technology that mixes and combines virtual objects in the real world. MR technology is similar to AR technology in that it shows real and virtual objects together. However, in the AR technology, the virtual object is used as a complement to the real object, whereas in the MR technology, the virtual object and the real object are used in an equal manner. XR technology can be applied to HMD, head-up display (HUD), mobile phone, tablet PC, laptop, desktop, TV, digital signage. A device to which the XR technology is applied may be referred to as an XR device.
FIG. 13 shows an example of an AI device to which the technical features of the present invention can be applied.
The AI device 1300 may be implemented as a stationary device or a mobile device, such as a TV, a projector, a mobile phone, a smartphone, a desktop computer, a notebook, a digital broadcasting terminal, a PDA, a PMP, a navigation device, a tablet PC, a wearable device, a set-top box (STB), a digital multimedia broadcasting (DMB) receiver, a radio, a washing machine, a refrigerator, a digital signage, a robot, a vehicle, etc.
Referring to FIG. 13, the AI device 1300 may include a communication part 1310, an input part 1320, a learning processor 1330, a sensing part 1340, an output part 1350, a memory 1360, and a processor 1370.
The communication part 1310 can transmit and/or receive data to and/or from external devices such as the AI devices and the AI server using wire and/or wireless communication technology. For example, the communication part 1310 can transmit and/or receive sensor information, a user input, a learning model, and a control signal with external devices. The communication technology used by the communication part 1310 may include a global system for mobile communication (GSM), a code division multiple access (CDMA), an LTE/LTE-A, a 5G, a WLAN, a Wi-Fi, BluetoothTM, radio frequency identification (RFID), infrared data association (IrDA), ZigBee, and/or near field communication (NFC).
The input part 1320 can acquire various kinds of data. The input part 1320 may include a camera for inputting a video signal, a microphone for receiving an audio signal, and a user input part for receiving information from a user. A camera and/or a microphone may be treated as a sensor, and a signal obtained from a camera and/or a microphone may be referred to as sensing data and/or sensor information. The input part 1320 can acquire input data to be used when acquiring an output using learning data and a learning model for model learning. The input part 1320 may obtain raw input data, in which case the processor 1370 or the learning processor 1330 may extract input features by preprocessing the input data.
The learning processor 1330 may learn a model composed of an ANN using learning data. The learned ANN can be referred to as a learning model. The learning model can be used to infer result values for new input data rather than learning data, and the inferred values can be used as a basis for determining which actions to perform. The learning processor 1330 may perform AI processing together with the learning processor of the AI server. The learning processor 1330 may include a memory integrated and/or implemented in the AI device 1300. Alternatively, the learning processor 1330 may be implemented using the memory 1360, an external memory directly coupled to the AI device 1300, and/or a memory maintained in an external device.
The sensing part 1340 may acquire at least one of internal information of the AI device 1300, environment information of the AI device 1300, and/or the user information using various sensors. The sensors included in the sensing part 1340 may include a proximity sensor, an illuminance sensor, an acceleration sensor, a magnetic sensor, a gyro sensor, an inertial sensor, an RGB sensor, an IR sensor, a fingerprint recognition sensor, an ultrasonic sensor, an optical sensor, a microphone, a light detection and ranging (LIDAR), and/or a radar.
The output part 1350 may generate an output related to visual, auditory, tactile, etc. The output part 1350 may include a display unit for outputting visual information, a speaker for outputting auditory information, and/or a haptic module for outputting tactile information.
The memory 1360 may store data that supports various functions of the AI device 1300. For example, the memory 1360 may store input data acquired by the input part 1320, learning data, a learning model, a learning history, etc.
The processor 1370 may determine at least one executable operation of the AI device 1300 based on information determined and/or generated using a data analysis algorithm and/or a machine learning algorithm. The processor 1370 may then control the components of the AI device 1300 to perform the determined operation. The processor 1370 may request, retrieve, receive, and/or utilize data in the learning processor 1330 and/or the memory 1360, and may control the components of the AI device 1300 to execute the predicted operation and/or the operation determined to be desirable among the at least one executable operation. The processor 1370 may generate a control signal for controlling the external device, and may transmit the generated control signal to the external device, when the external device needs to be linked to perform the determined operation. The processor 1370 may obtain the intention information for the user input and determine the user's requirements based on the obtained intention information. The processor 1370 may use at least one of a speech-to-text (STT) engine for converting speech input into a text string and/or a natural language processing (NLP) engine for acquiring intention information of a natural language, to obtain the intention information corresponding to the user input. At least one of the STT engine and/or the NLP engine may be configured as an ANN, at least a part of which is learned according to a machine learning algorithm. At least one of the STT engine and/or the NLP engine may be learned by the learning processor 1330 and/or learned by the learning processor of the AI server, and/or learned by their distributed processing. The processor 1370 may collect history information including the operation contents of the AI device 1300 and/or the user's feedback on the operation, etc. The processor 1370 may store the collected history information in the memory 1360 and/or the learning processor 1330, and/or transmit to an external device such as the AI server. The collected history information can be used to update the learning model. The processor 1370 may control at least some of the components of AI device 1300 to drive an application program stored in memory 1360. Furthermore, the processor 1370 may operate two or more of the components included in the AI device 1300 in combination with each other for driving the application program.
FIG. 14 shows an example of an AI system to which the technical features of the present invention can be applied.
Referring to FIG. 14, in the AI system, at least one of an AI server 1420, a robot 1410a, an autonomous vehicle 1410b, an XR device 1410c, a smartphone 1410d and/or a home appliance 1410e is connected to a cloud network 1400. The robot 1410a, the autonomous vehicle 1410b, the XR device 1410c, the smartphone 1410d, and/or the home appliance 1410e to which the AI technology is applied may be referred to as AI devices 1410a to 1410e.
The cloud network 1400 may refer to a network that forms part of a cloud computing infrastructure and/or resides in a cloud computing infrastructure. The cloud network 1400 may be configured using a 3G network, a 4G or LTE network, and/or a 5G network. That is, each of the devices 1410a to 1410e and 1420 consisting the AI system may be connected to each other through the cloud network 1400. In particular, each of the devices 1410a to 1410e and 1420 may communicate with each other through a base station, but may directly communicate with each other without using a base station.
The AI server 1400 may include a server for performing AI processing and a server for performing operations on big data. The AI server 1400 is connected to at least one or more of AI devices constituting the AI system, i.e. the robot 1410a, the autonomous vehicle 1410b, the XR device 1410c, the smartphone 1410d and/or the home appliance 1410e through the cloud network 1400, and may assist at least some AI processing of the connected AI devices 1410a to 1410e. The AI server 1400 can learn the ANN according to the machine learning algorithm on behalf of the AI devices 1410a to 1410e, and can directly store the learning models and/or transmit them to the AI devices 1410a to 1410e. The AI server 1400 may receive the input data from the AI devices 1410a to 1410e, infer the result value with respect to the received input data using the learning model, generate a response and/or a control command based on the inferred result value, and transmit the generated data to the AI devices 1410a to 1410e. Alternatively, the AI devices 1410a to 1410e may directly infer a result value for the input data using a learning model, and generate a response and/or a control command based on the inferred result value.
Various embodiments of the AI devices 1410a to 1410e to which the technical features of the present invention can be applied will be described. The AI devices 1410a to 1410e shown in FIG. 14 can be seen as specific embodiments of the AI device 1300 shown in FIG 13.
In view of the exemplary systems described herein, methodologies that may be implemented in accordance with the disclosed subject matter have been described with reference to several flow diagrams. While for purposed of simplicity, the methodologies are shown and described as a series of steps or blocks, it is to be understood and appreciated that the claimed subject matter is not limited by the order of the steps or blocks, as some steps may occur in different orders or concurrently with other steps from what is depicted and described herein. Moreover, one skilled in the art would understand that the steps illustrated in the flow diagram are not exclusive and other steps may be included or one or more of the steps in the example flow diagram may be deleted without affecting the scope of the present disclosure.
What has been described above includes examples of the various aspects. It is, of course, not possible to describe every conceivable combination of components or methodologies for purposes of describing the various aspects, but one of ordinary skill in the art may recognize that many further combinations and permutations are possible. Accordingly, the subject specification is intended to embrace all such alternations, modifications and variations that fall within the scope of the appended claims.
Claims in the present description can be combined in a various way. For instance, technical features in method claims of the present description can be combined to be implemented or performed in an apparatus, and technical features in apparatus claims can be combined to be implemented or performed in a method. Further, technical features in method claim(s) and apparatus claim(s) can be combined to be implemented or performed in an apparatus. Further, technical features in method claim(s) and apparatus claim(s) can be combined to be implemented or performed in a method.

Claims (15)

  1. A method performed by a wireless device in a wireless communication system, the method comprising:
    detecting a failure of connection on a wireless back haul link;
    leaving connected state;
    selecting a parameter related to the failure; and
    performing connection establishment based on the parameter.
  2. The method of claim 1, wherein the parameter is a cause value for the connection establishment.
  3. The method of claim 1, wherein the detecting the failure of the connection comprises:
    performing a radio resource control (RRC) re-establishment procedure; and
    detecting that the RRC re-establishment procedure fails.
  4. The method of claim 3, wherein the parameter informs that the RRC re-establishment procedure fails.
  5. The method of claim 1, wherein the parameter is an access category.
  6. The method of claim 5, further comprising:
    performing access barring check based on the access category; and.
    determining that an access by the node is allowed as a result of the access barring check.
  7. The method of claim 1, wherein the node is integrated access and backhaul (IAB) node.
  8. The method of claim 1, wherein the node is configured to operate both as a user equipment and as a base station.
  9. The method of claim 1, further comprising: transmitting a RRC connection complete message including information on type of the failure,
    wherein the type of the failure is at least one of radio link failure, handover failure, beam failure, backhaul link failure, access barring, reception of reject message, network congestion or radio congestion.
  10. The method of claim 1, wherein the node communicates with at least one of a mobile terminal, a network or autonomous vehicles other than the wireless device.
  11. A wireless device in a wireless communication system, the wireless device comprising:
    a memory;
    a transceiver; and
    a processor, operably coupled to the memory and the transceiver, and configured to:
    detect a failure of connection on a wireless back haul link;
    leave connected state;
    select a parameter related to the failure; and
    perform connection establishment based on the parameter.
  12. The wireless device of claim 11, wherein the parameter is a cause value for the connection establishment.
  13. The wireless device of claim 11, wherein the processor is configured to:
    performing a radio resource control (RRC) re-establishment procedure; and
    detecting that the RRC re-establishment procedure fails.
  14. The node of claim 13, wherein the parameter informs that the RRC re-establishment procedure fails.
  15. The node of claim 1, wherein the parameter is an access category for an access barring check.
PCT/KR2019/009999 2018-08-09 2019-08-08 Method for performing access control and device supporting the same WO2020032638A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR20180093392 2018-08-09
KR10-2018-0093392 2018-08-09

Publications (1)

Publication Number Publication Date
WO2020032638A1 true WO2020032638A1 (en) 2020-02-13

Family

ID=69413576

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2019/009999 WO2020032638A1 (en) 2018-08-09 2019-08-08 Method for performing access control and device supporting the same

Country Status (1)

Country Link
WO (1) WO2020032638A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021224223A1 (en) * 2020-05-06 2021-11-11 Telefonaktiebolaget Lm Ericsson (Publ) Network resource allocation for public safety communications
WO2022022734A1 (en) * 2020-07-31 2022-02-03 中兴通讯股份有限公司 Congestion processing method and apparatus, and device and storage medium
WO2023087924A1 (en) * 2021-11-17 2023-05-25 华为技术有限公司 Communication method, apparatus and system

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170230878A1 (en) * 2011-03-31 2017-08-10 Mediatek Inc. Failure Event Report Extension for Inter-RAT Radio Link Failure

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170230878A1 (en) * 2011-03-31 2017-08-10 Mediatek Inc. Failure Event Report Extension for Inter-RAT Radio Link Failure

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
"RRC service request", R2-1705811, 3GPP TSG-RAN WG2 MEETING #98, 7 May 2017 (2017-05-07), Hangzhou, China, XP051265179 *
ERICSSON: "[DRAFT] LS on Establishment Causes in NR", R2-1800322, 3GPP TSG RAN WG2 NR AH#3, 11 January 2018 (2018-01-11), Vancouver, Canada, XP051385657 *
ERICSSON: "LTE re-establishment when using NR PDCP (TP to 36.331 and 38.331)", R2-1713388, 3GPP TSG-RAN WG2 #100, 17 November 2017 (2017-11-17), Reno, Nevada, USA, XP051372123 *
ZTE: "Discussion on IAB topology adaptation", R3-183688, 3GPP TSG-RAN WG2 NR ADHOC 1807, 22 June 2018 (2018-06-22), Montreal, Canada, XP051529581 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021224223A1 (en) * 2020-05-06 2021-11-11 Telefonaktiebolaget Lm Ericsson (Publ) Network resource allocation for public safety communications
WO2022022734A1 (en) * 2020-07-31 2022-02-03 中兴通讯股份有限公司 Congestion processing method and apparatus, and device and storage medium
WO2023087924A1 (en) * 2021-11-17 2023-05-25 华为技术有限公司 Communication method, apparatus and system

Similar Documents

Publication Publication Date Title
WO2020166817A1 (en) Early data transmission in cu-du split
WO2020189958A1 (en) Small data transmission without path switch procedure
WO2020171369A1 (en) Uplink data fast transmission in cu-du split
WO2020166912A1 (en) Method and apparatus for lossless uplink data transmission of iab network in a wireless communication system
WO2020067749A1 (en) Access control for data transmission
WO2021172964A1 (en) Method and apparatus for failure recovery in wireless communication system
WO2021251625A1 (en) Method and apparatus for handling master cell group failure in wireless communication system
WO2020149653A1 (en) Method and apparatus for controlling radio resource for a redundant route for a dual-connecting iab-node in a wireless communication system
WO2021045339A1 (en) Method and apparatus for supporting up security for mo-edt in cu-du split in a wireless communication system
WO2021154032A1 (en) Method and apparatus for modifying configuration related to conditional mobility in wireless communication system
WO2022086082A1 (en) Method and apparatus for handling resource collision in wireless communication system
WO2020167036A1 (en) Method and apparatus for failure notification on backhaul link in wireless communication system
WO2020032628A1 (en) Method for performing access control and device supporting the same
WO2020167024A1 (en) Method and apparatus for backhaul status reporting in wireless communication system
WO2020067711A1 (en) Method and apparatus for entering a connected state with a network for continuing transmission in wireless communication system
WO2021162507A1 (en) Method and apparatus for transmitting response message in wireless communication system
WO2020226398A1 (en) Method and apparatus for mobility management in wireless communication system
WO2020076032A1 (en) Response to paging for data reception
WO2020067763A1 (en) Relaxed measurement based on data transmission
WO2020226392A1 (en) Method and apparatus for radio resource management in wireless communication system
WO2019245297A1 (en) Method for selecting bwp and device supporting the same
WO2021194134A1 (en) Method and apparatus for conditional mobility failure handling in wireless communication system
WO2019221530A1 (en) Method and apparatus for discarding data among associated transmission buffers in wireless communication system
WO2022186458A1 (en) Method and apparatus for performing handover based on ai model in a wireless communication system
WO2021075841A1 (en) Method and apparatus for performing communication after mobility in wireless communication system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19847170

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19847170

Country of ref document: EP

Kind code of ref document: A1