Selecting non-3 GPP access nodes to support IMS services to a 5G core network

文档序号:1302472 发布日期:2020-08-07 浏览:24次 中文

阅读说明:本技术 选择非3gpp接入节点以支持到5g核心网的ims服务 (Selecting non-3 GPP access nodes to support IMS services to a 5G core network ) 是由 周星月 李振东 于 2018-04-11 设计创作,主要内容包括:公开了用于选择非3GPP接入节点以支持到5G核心网络的IMS服务的方法、系统和设备。一种用于在候选非3GPP节点或网络中实现IMS支持的识别的示例方法包括传送配置信息,该配置信息包括由第二网络中的接入节点支持的IMS(互联网协议(IP)多媒体子系统)语音服务的指示符,其中,该指示对应于第二网络中的接入节点支持IMS语音服务的能力。另一种方法包括接收配置信息,该配置信息包括由第二网络中的接入节点支持的IMS语音服务的指示符,以及基于该指示符,通过接入节点选择性地接入第二网络中的IMS语音服务。(Methods, systems, and devices are disclosed for selecting a non-3 GPP access node to support IMS services to a 5G core network. An example method for enabling identification of IMS support in a candidate non-3 GPP node or network includes communicating configuration information including an indicator of IMS (internet protocol (IP) multimedia subsystem) voice services supported by an access node in a second network, wherein the indication corresponds to an ability of the access node in the second network to support IMS voice services. Another method includes receiving configuration information including an indicator of IMS voice services supported by an access node in a second network, and selectively accessing, by the access node, IMS voice services in the second network based on the indicator.)

1. A method of wireless communication implemented at a network node in a first network, the method comprising:

transmitting configuration information comprising an indicator of IMS (Internet protocol (IP) multimedia subsystem) voice services supported by an access node in a second network,

wherein the indicator corresponds to a capability of an access node in the second network to support IMS voice services.

2. The method of claim 1, further comprising:

determining whether an access node in the second network includes a capability to support IMS voice services; and

setting a value of the indicator according to the determination.

3. A method of wireless communication for implementation at a wireless device of a first network, the method comprising:

receiving configuration information comprising an indicator of an IMS (Internet protocol (IP) multimedia subsystem) voice service supported by an access node in a second network; and

selectively accessing, by the access node, the IMS voice service in the second network based on the indicator, wherein the indicator corresponds to a capability of the access node in the second network to support IMS voice services.

4. The method of any of claims 1-3, wherein the first network is a core network, and wherein the second network is an access network.

5. The method of any of claims 1-4, wherein the configuration information comprises an evolved packet data gateway (ePDG) identifier configuration.

6. The method of any of claims 1-4, wherein the configuration information comprises a non-3 GPP interworking function (N3IWF) identifier configuration.

7. The method of any of claims 1 to 4, wherein the configuration information comprises non-3 GPP access node (N3AN) selection information.

8. The method of any of claims 5 to 7, wherein the configuration information further comprises a Fully Qualified Domain Name (FQDN) or an IP address.

9. The method according to any of claims 1-4, wherein the second network is a wireless local area network (W L AN), and wherein the configuration information comprises at least one of a Service Set Identifier (SSID), a Homogeneous Extended Service Set Identifier (HESSID), or a Basic Service Set Identifier (BSSID).

10. The method according to any of claims 1 to 9, wherein the first network is a 5G core network and wherein the second network is a non-3 GPP access network.

11. A wireless communication apparatus comprising a processor, wherein the processor is configured to implement the method of any of claims 1-10.

12. A computer program product comprising a computer readable program medium code stored thereon, which when executed by a processor causes the processor to implement the method according to any of claims 1 to 10.

Technical Field

This document relates to wireless communications.

Background

Wireless communication technology is pushing the world to an increasingly interconnected and networked society. The rapid growth and technological advances in wireless communications have resulted in greater demands for capacity and connectivity. Other aspects such as energy consumption, equipment cost, spectral efficiency and latency are also important to meet the needs of various communication scenarios. Next generation systems and wireless communication technologies need to ensure that services available in different types of networks are consistently correctly identified, as compared to existing wireless networks.

Disclosure of Invention

This document relates to methods, systems, and devices for selecting a non-3 GPP access node to support IMS (IP multimedia subsystem) services to a 5G core network. Using the disclosed techniques, embodiments can identify which non-3 GPP access nodes can support IMS voice when a UE transitions from a 5G (e.g., New Radio (NR)) implementation to a non-3 GPP network.

In one exemplary aspect, a method of wireless communication is disclosed. The method may be implemented at a network node (e.g., base station, eNB, gNB), and includes communicating configuration information including an indicator of IMS voice services supported by an access node in a second network, where the indicator corresponds to a capability of the access node in the second network to support IMS voice services.

In another exemplary aspect, a method of wireless communication is disclosed. The method may be implemented at a wireless terminal (e.g., User Equipment (UE)), including receiving configuration information including an indicator of IMS voice services supported by an access node in a second network, and selectively accessing the IMS voice services in the second network through the access node based on the indicator, wherein the indicator corresponds to a capability of the access node in the second network to support IMS voice services.

In yet another exemplary aspect, the above-described method is embodied in the form of processor executable code and stored in a computer readable program medium.

In yet another exemplary embodiment, an apparatus configured or operable to perform the above method is disclosed.

The above and other aspects and embodiments thereof are described in more detail in the accompanying drawings, the description and the claims.

Drawings

Fig. 1 shows an example of a 5G system (5GS) architecture.

Fig. 2 shows an example of a non-3 GPP network supporting 4G network access.

Fig. 3 shows an example of non-3 GPP and 5G network interworking.

Fig. 4 illustrates an example of a Base Station (BS) and a User Equipment (UE) in wireless communication, in accordance with some embodiments of the technology disclosed herein.

Fig. 5 shows an example of an evolved packet data gateway (ePDG) identifier configuration structure for selecting a non-3 GPP access node to support IMS services to 5 GS.

Fig. 6 shows an example of a non-3 GPP access node (N3AN) selection information structure for selecting a non-3 GPP access node to support IMS services to 5 GS.

Fig. 7 shows AN example of a trusted wireless local area network (W L AN) selection information structure for selecting a non-3 GPP access node to support IMS services to 5 GS.

Fig. 8 illustrates an example of a wireless communication method for selecting a non-3 GPP access node to support IMS services to a 5G core network.

Fig. 9 illustrates an example of another wireless communication method for selecting a non-3 GPP access node to support IMS services to a 5G core network.

Fig. 10 is a block diagram representation of a portion of an apparatus in accordance with some embodiments of the disclosed technology.

Detailed Description

In current systems and embodiments, when a UE wants to select a non-3 GPP access node/network for IMS voice (e.g., ePDG, N3IWF, trusted non-3 GPP access network), the UE cannot know whether the non-3 GPP access network supports IMS voice based on available selection or configuration information.

The UE may simply attempt to select another non-3 GPP access node/network and initiate an attach/registration procedure via that non-3 GPP access node/network. During this procedure, the UE learns whether the target network supports IMS voice by receiving an indicator from the network. If the network indicates that it cannot support IMS voice, the UE will typically detach from the network and make another non-3 GPP access network selection.

Fifth generation mobile networks or fifth generation wireless systems (abbreviated as 5G) are next generation telecommunication standards beyond the current 4G/IMT-Advanced standard. In some embodiments, a 5G system (5GS) architecture may support data connectivity and services, enabling deployment using technologies such as, for example, network function virtualization and software defined networking. The 5G system architecture may utilize service-based interaction between certain Control Plane (CP) network functions.

Fig. 1 illustrates an exemplary 5G system architecture, which may include the following primary Network Functions (NFs):

authentication Server function (AUSF)

Core access and mobility management function (AMF)

Data Network (DN), e.g. operator service, Internet access or third party service

Structured data storage network function (SDSF)

Unstructured data storage network function (UDSF)

Network capability openness (NEF)

Network Registration Function (NRF)

Policy Control Function (PCF)

Session Management Function (SMF)

Unified Data Management (UDM)

User Plane Function (UPF)

Application Function (AF)

User Equipment (UE)

(radio) Access network ((R) AN)

Non-3 GPP access (e.g., W L AN access) is AN important companion access infrastructure for mobile networks that can be used to help mobile operators cope with the explosive growth of network traffic such non-3 GPP access can relieve pressure on mobile networks and can provide fast indoor data connectivity.

As shown therein, a 3GPP serving gateway, which may be managed by an HP L MN, may access a non-3 GPP node either in a trusted or an untrusted manner.

In 5G, the core network also supports connectivity for UEs via independent non-3 GPP access networks (e.g., W L AN access, fixed wireline access networks). fig. 3 shows AN example of non-3 GPP and 5G network interworking.As shown in fig. 3, a non-3 GPP access network to a 5G core network may be trusted or untrusted and depends on relevant operator policies.for AN untrusted non-3 GPP access network, it may connect to the 5G core network via a non-3 GPP interworking function (N3 IWF). N2 and N3 are used to connect the trusted non-3 GPP access or N3IWF to the 5G core network as a control plane and user plane reference point, respectively.

In some embodiments, non-3 GPP access, particularly W L AN access, is typically used by operators to provide IMS voice services to UEs as a way to supplement services.e., in some areas (e.g., indoors), the 3GPP Radio Access Network (RAN) does not support IMS voice, or may not have 3GPP radio coverage.

In recent systems and implementations, the HP L MN may configure the UE with the following information for ePDG/N3IWF selection:

(1) an ePDG identifier configuration containing a Fully Qualified Domain Name (FQDN) or IP address of the ePDG in the HP L MN;

(2) n3IWF identifier configuration including FQDN or IP address of N3IWF in HP L MN, and

(3) non-3 GPP access node (N3AN) selection information including a prioritized list of P L MNs.

In some embodiments, each P L MN includes (i) a "preferences" parameter that indicates whether ePDG or N3IWF is preferred in that P L MN, and (ii) an FQDN parameter that indicates whether a tracking/positioning area identification FQDN or operator identification FQDN should be used when the address of ePDG or N3IWF is found in this P L MN.

In some embodiments, ePDG identifier configuration and N3IWF identifier configuration are optional parameters, while N3AN selection information is required and should include at least HP L MN and "any P L MN" entries.

Embodiments of the disclosed technology enable improved interworking between 5G and non-3 GPP nodes/networks by providing the ability to identify whether a non-3 GPP node (or network) supports IMS, which improves user experience and reduces the need to connect to non-3 GPP nodes that do not have the capabilities required by the UE. Section headings are used in this document to improve the readability of the description, and do not in any way limit the discussion or embodiments only to the corresponding sections.

Fig. 4 shows an example of a wireless communication system including a BS 420 and one or more User Equipments (UEs) 411, 412, and 413. In some embodiments, the BS 420 may transmit configuration information (441, 442, 443) including an indicator corresponding to a capability of a candidate non-3 GPP node to support IMS voice. The UE may then transmit control information (431, 432, 433) to the BS for subsequent connection with a non-3 GPP node (or network). The UE may be, for example, a smartphone, a tablet, a mobile computer, a machine-to-machine (M2M) device, an internet of things (IoT) device, and so on.

Example embodiment one: ePDG/N3IWF selection

For untrusted non-3 GPP accesses, the information configured by the network to the UE for untrusted non-3 GPP access node selection may include an indication as to whether the non-3 GPP access node supports IMS voice services.

Thus, if the UE determines that non-3 GPP access node selection is required for IMS voice services, the UE can select a non-3 GPP access node that supports IMS voice services based on this information (also referred to as "configuration information").

In some embodiments, the information may include:

(1) the ePDG identifier configuration includes an indication of ePDG IMS voice service support. Fig. 5 shows an example of an ePDG identifier configuration structure for selecting a non-3 GPP access node to support IMS services to a 5G core network;

(2) the configuration of the N3IWF identity includes an indication of N3IWF IMS voice service support; or

(3) The non-3 GPP access node (N3AN) selection information contains the P L MN, which includes a parameter indicating whether the ePDG or N3IWF in this P L MN supports IMS voice services FIG. 6 shows an example of an N3AN selection information structure for selecting a non-3 GPP access node to support IMS services to a 5G core network.

Example embodiment two selection of trusted W L AN Access network

For trusted non-3 GPP access, the information configured by the network to the UE for trusted non-3 GPP access node selection may include an indication of whether the trusted non-3 GPP access node supports IMS voice.

Thus, if the UE determines that trusted non-3 GPP access node selection is required for IMS voice services, the UE can select a trusted non-3 GPP access node that supports IMS voice services based on this information (also referred to as "configuration information").

In some embodiments, the information may include:

(1) AN indication of a W L AN access node identified by a Service Set Identifier (SSID), a Homogeneous Extended Service Set Identifier (HESSID), a Basic Service Set Identifier (BSSID), or any other identifier that supports or does not support IMS voice services FIG. 7 shows AN example of a trusted W L AN selection information structure for selecting a non-3 GPP access node to support IMS services to a 5G core network.

Example method for non-3 GPP node/network selection

Fig. 8 illustrates an example of a wireless communication method 800 that may be implemented at a network node for selecting a non-3 GPP access node to support IMS services to a 5G core network. The method 800 comprises, at step 810, transmitting configuration information from a network node in a first network, the configuration information comprising an indicator of IMS voice services supported by an access node in a second network. In some embodiments, the first network may be a 5G core network and the second network may be a non-3 GPP access network. For example, a non-3 GPP access network may be defined by an optional standardization group (e.g., IEEE, WiMax). In some embodiments, the indicator corresponds to a capability of an access node in the second network to support IMS voice services.

The method 800 may include determining whether an access node in the second network has a capability to support IMS voice services, and setting a value of the indicator based on the determination. In some embodiments, the indicator may be a single bit (e.g., "1" or "0") indicating whether the non-3 GPP network supports IMS voice. In other embodiments, the indicator may be part of a bit field that includes other parameters or indicators. In still other embodiments, the indicator may be implied by another parameter or bit field.

Fig. 9 illustrates an example of another wireless communication method 900 that may be implemented at a wireless device for selecting a non-3 GPP access node to support IMS services to a 5G core network. The method 900 includes, at step 910, receiving, by a wireless device in a first network, configuration information including an indicator of IMS voice services supported by an access node in a second network. In some embodiments, the first network may be a 5G core network and the second network may be a non-3 GPP access network.

The method 900 includes, at step 920, selectively accessing IMS voice services in the second network through the access node based on the indicator. In some embodiments, the indicator corresponds to a capability of an access node in the second network to support IMS voice services. For example, if the indicator can be "1" indicating that the non-3 GPP network supports IMS voice, and the wireless device can proceed to join the network via the access node. On the other hand, if the indicator is "0" indicating that IMS voice services are not supported in the selected non-3 GPP network, the wireless device may choose not to join that network and continue to select another network.

In methods 800 and 900, and as described in the context of embodiment one and embodiment two, the configuration information may include AN ePDG identifier configuration, AN N3IWF identifier configuration, or N3AN selection information in some embodiments, the exemplary configuration information may also include AN FQDN and/or AN IP address.

In some embodiments, the configuration information may include additional parameters and/or data structures, including additional parameters and/or data structures for other networks as shown by example in fig. 5-7, and may include an IMS voice indicator at any level of the data structure.

Fig. 10 is a block diagram representation of a portion of an apparatus in accordance with some embodiments of the technology disclosed herein. An apparatus 1005, such as a base station or wireless device (or UE), may include processor electronics 1010, such as a microprocessor, that implement one or more of the techniques presented in this document. Apparatus 1005 may include transceiver electronics 1015 to transmit and/or receive wireless signals over one or more communication interfaces, such as antenna 1020. The apparatus 1005 may include other communication interfaces for transmitting and receiving data. The apparatus 1005 may include one or more memories (not explicitly shown) configured to store information such as data and/or instructions. In some embodiments, processor electronics 1010 may include at least a portion of transceiver electronics 1015. In some embodiments, at least some of the disclosed techniques, modules, or functions (including methods 800 and 900) are implemented using an apparatus 1005.

It is intended that the specification, together with the drawings, be considered exemplary only, with the examples being meant to be exemplary and not indicative of the ideal or preferred embodiment, unless otherwise indicated. As used herein, "or" is intended to include "and/or" unless the context clearly indicates otherwise.

Some embodiments described herein are described in the general context of methods or processes, which may be implemented in one embodiment by a computer program product, embodied in a computer-readable medium, the computer program (e.g., program code) including computer-executable instructions, such as program code, executed by computers in network environments. The computer readable medium may include removable and non-removable storage devices including, but not limited to, Read Only Memory (ROM), Random Access Memory (RAM), Compact Discs (CDs), Digital Versatile Discs (DVDs), and the like. Thus, a computer-readable medium may include a non-transitory storage medium. Generally, program modules may include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. Computer (or processor) executable instructions, associated data structures, and program modules represent examples of program code for executing steps of the methods disclosed herein. The particular sequence of such executable instructions or associated data structures represents examples of corresponding acts for implementing the functions described in such steps or processes.

Some of the disclosed embodiments may be implemented as devices or modules using hardware circuitry, software, or a combination thereof. For example, a hardware circuit implementation may include discrete analog and/or digital components that are integrated as part of a printed circuit board, for example. Alternatively or additionally, the disclosed components or modules may be implemented as Application Specific Integrated Circuits (ASICs) and/or as Field Programmable Gate Array (FPGA) devices. Some embodiments may additionally or alternatively include a Digital Signal Processor (DSP), which is a special purpose microprocessor having an architecture optimized for the operational requirements of the digital signal processing associated with the disclosed functionality of the present application. Similarly, various components or sub-components within the various modules may be implemented in software, hardware, or firmware. Connections between modules and/or components within modules may be provided using any of a variety of connection methods and media known in the art, including, but not limited to, communications over the internet, wired, or wireless networks using suitable protocols.

While this document contains many specifics, these should not be construed as limitations on the scope of the claimed invention or of what may be claimed, but rather as descriptions of features specific to particular embodiments. Certain features that are described in this document in the context of separate embodiments can also be implemented in combination in a single embodiment. Conversely, various features that are described in the context of a single embodiment can also be implemented in multiple embodiments separately or in any suitable subcombination. Furthermore, although features may be described above as acting in certain combinations and even initially claimed as such, one or more features from a claimed combination can in some cases be excised from the combination, and the claimed combination may be directed to a subcombination or variation of a subcombination. Similarly, while operations are depicted in the drawings in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order, or that all illustrated operations be performed, to achieve desirable results.

Only some embodiments and examples are described and other embodiments, enhancements and variations are possible based on what is described and illustrated in this disclosure.

13页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:通信系统及基站

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!