Network node and method in a wireless communications network

ABSTRACT

A method performed by a method performed by a network node for performing admission control in a wireless communications network is provided. The network node serves a first and one or more second UEs. The network node receives ( 201 ) from the first UE, an access request for a radio resource for communication between the first UE and the network node. The network node further estimates ( 203 ) a first prediction of a requirement of the radio resource related to the access request, based on a measured initial data traffic between the network node and the first UE. The network node determines ( 205 ) a first threshold related to the first prediction, as a function of a measured data traffic load between the network node and the one or more second UEs. The network node then performs ( 206 ) admission control by deciding whether or not to admit the radio resource to the first UE, based on whether or not the first prediction exceeds the first threshold.

CROSS REFERENCE TO RELATED APPLICATION(S)

This application is a 35 U.S.C. § 371 National Stage of International Patent Application No. PCT/SE2017/051316, filed Dec. 20, 2017, designating the United States.

TECHNICAL FIELD

Embodiments herein relate to a network node and methods therein. In particular, they relate to admission control in a wireless communications network.

BACKGROUND

In a typical wireless communication network, wireless devices, also known as wireless communication devices, mobile stations, stations (STA) and/or User Equipments (UE), communicate via a Local Area Network such as a WiFi network or a Radio Access Network (RAN) to one or more core networks (CN). The RAN covers a geographical area which is divided into service areas or cell areas, which may also be referred to as a beam or a beam group, with each service area or cell area being served by a radio network node such as a radio access node e.g., a W-Fi access point or a radio base station (RBS), which in some networks may also be denoted, for example, a NodeB, eNodeB (eNB), or gNB as denoted in 5G. A service area or cell area is a geographical area where radio coverage is provided by the radio network node. The radio network node communicates over an air interface operating on radio frequencies with the wireless device within range of the radio network node.

Specifications for the Evolved Packet System (EPS), also called a Fourth Generation (4G) network, have been completed within the 3rd Generation Partnership Project (3GPP) and this work continues in the coming 3GPP releases, for example to specify a Fifth Generation (5G) network also referred to as 5G New Radio (NR). The EPS comprises the Evolved Universal Terrestrial Radio Access Network (E-UTRAN), also known as the Long Term Evolution (LTE) radio access network, and the Evolved Packet Core (EPC), also known as System Architecture Evolution (SAE) core network. E-UTRAN/LTE is a variant of a 3GPP radio access network wherein the radio network nodes are directly connected to the EPC core network rather than to RNCs used in 3G networks. In general, in E-UTRAN/LTE the functions of a 3G RNC are distributed between the radio network nodes, e.g. eNodeBs in LTE, and the core network. As such, the RAN of an EPS has an essentially “flat” architecture comprising radio network nodes connected directly to one or more core networks, i.e. they are not connected to RNCs. To compensate for that, the E-UTRAN specification defines a direct interface between the radio network nodes, this interface being denoted the X2 interface.

Multi-antenna techniques can significantly increase the data rates and reliability of a wireless communication system. The performance is in particular improved if both the transmitter and the receiver are equipped with multiple antennas, which results in a Multiple-Input Multiple-Output (MIMO) communication channel. Such systems and/or related techniques are commonly referred to as MIMO.

In addition to faster peak Internet connection speeds, 5G planning aims at higher capacity than current 4G, allowing higher number of mobile broadband users per area unit, and allowing consumption of higher or unlimited data quantities in gigabyte per month and user. This would make it feasible for a large portion of the population to stream high-definition media many hours per day with their mobile devices, when out of reach of Wi-Fi hotspots. 5G research and development also aims at improved support of machine to machine communication, also known as the Internet of things, aiming at lower cost, lower battery consumption and lower latency than 4G equipment.

Machine Learning (ML) is a field in computer science where a computer through algorithms and methods can be trained to learn certain patterns and their representation, so when confronted with similar data patterns the computer can take decisions related to the data, e g predictions, classifications, and actions.

Admission Control (AC) is a control function in a closed system such as e.g. used in a wireless communications system, where access or resources are made available to requesting candidates such as UEs, which may be straight forward if resources are abundant, and more selective when resources get scarce.

Congestion Control (CC) is a control function in a closed system such as e.g. used in a wireless communications system, to avoid overloading by reducing the allocated resources. CC may be quite tolerant if resources are abundant, and more aggressive when resources get scarce.

How the admission and congestion of a system or resources are controlled is a major factor for determining the efficiency of the resource utilization, and hence a large part of the performance of the system.

Traditional methods to handle out radio resources are at best using hysteresis to even out variations in regulated stimuli levels. All users are treated equally in terms of usage, and additional resource will in many cases be handed out to wrong UEs, such as e.g. to UEs with low capacity demand resulting in that they never utilize the full capacity of the additional resource. In a loaded scenario users that requires more resources will instead be terminated or moved to less powerful resource levels. In these cases the resources are not utilized efficiently and the total system performance will be suffering.

SUMMARY

An object of embodiments herein is to improve the performance of a wireless communications network.

According to a first aspect of embodiments herein, the object is achieved by a method performed by a network node for performing admission control in a wireless communications network. The network node serves a first and one or more second UEs. The network node receives from the first UE, an access request for a radio resource for communication between the first UE and the network node. The network node further estimates a first prediction of a requirement of the radio resource related to the access request, based on a measured initial data traffic between the network node and the first UE. The network node determines a first threshold related to the first prediction, as a function of a measured data traffic load between the network node and the one or more second UEs. The network node then performs admission control by deciding whether or not to admit the radio resource to the first UE, based on whether or not the first prediction exceeds the first threshold.

According to a second aspect of embodiments herein, the object is achieved by a network node for performing admission control in a wireless communications network. The network node is configured to serve a first UE and one or more second UEs. The network node is further configured to:

-   -   Receive from the first UE, an access request for a radio         resource for communication between the first UE and the network         node,     -   estimate a first prediction of a requirement of the radio         resource related to the access request, based on a measured         initial data traffic between the network node and the first UE,     -   determine a first threshold related to the first prediction, as         a function of a measured data traffic load between the network         node and the one or more second UEs, and     -   perform admission control by deciding whether or not to admit         the radio resource to the first UE, based on whether or not the         first prediction exceeds the first threshold.

Since the network node estimates the first prediction based on initial data traffic between the network node and the first UE, and determines the first threshold based on the data traffic load at the network node and the one or more second UEs, and then performs admission control based on whether or not the first prediction exceeds the first threshold, the admission control is performed dynamically based on a current condition instead of being static. This will in turn improve the performance of a wireless communications network.

An advantage with embodiments herein is that they improve the utilization rate of the resources, leading to better system performance. Less resources will be wasted by more demanding users will be prioritized to the resources.

BRIEF DESCRIPTION OF THE DRAWINGS

Examples of embodiments herein are described in more detail with reference to attached drawings in which:

FIG. 1 is a schematic block diagram illustrating embodiments of a wireless communications network.

FIGS. 2 a and b are a flowchart depicting embodiments of a method in a network node.

FIG. 3 is a schematic block diagram illustrating embodiments implemented in a network node.

FIG. 4 is a schematic block diagram illustrating embodiments implemented in a network node.

FIG. 5 is a schematic block diagram illustrating embodiments implemented in a network node.

FIG. 6 is a schematic block diagram illustrating embodiments implemented in a network node.

FIG. 7 is a signaling diagram illustrating embodiments herein.

FIG. 8 is a diagram illustrating embodiments herein.

FIG. 9 is a schematic block diagram illustrating embodiments implemented in a network node.

FIG. 10 is a schematic block diagram illustrating embodiments implemented in a network node.

FIG. 11 is a schematic block diagram illustrating embodiments of a network node.

FIG. 12 schematically illustrates a telecommunication network connected via an intermediate network to a host computer.

FIG. 13 is a generalized block diagram of a host computer communicating via a base station with a user equipment over a partially wireless connection.

FIGS. 14 to 17 are flowcharts illustrating methods implemented in a communication system including a host computer, a base station and a user equipment.

DETAILED DESCRIPTION

As a part of developing embodiments herein a problem will first be identified and discussed.

As mentioned above, UEs are treated equally in terms of usage and no adaptation to e. g. different traffic patterns is included. This means that a UE is not granted resources based on the predicted requirement, so additional resource will in many cases be handed out to the wrong users. This results in that the resources are not utilized efficiently and the total system performance will be suffering. When using ML for controlling admission to a system or resources, the accuracy of the decisions is a highly vital characteristic, and traditional ML models do not include methods for improving accuracy during fluctuating conditions. In a dynamic environment, this is not sufficient, and more situation adapted schemes are needed to utilize the full potential of admission control. Further, when used for over time in a dynamic environment more situation adapted schemes are needed to utilize the full potential of the method.

Embodiments herein provide inherent characteristics of individual UE predictions are utilized to improve performance for a measure e.g. over time with the highest momentary importance, and thereby attain a dynamic and in some embodiments timely behavior automatically adapting to various conditions of the execution environment. This is to avoid arbitrariness in how the resources are distributed a mechanism of prediction of resource usage needs per individual UE or connected UE. This mechanism may both be supporting the AC by predicting users with high demands, and the CC by predicting users with low demands for the remainder of the connection.

Example embodiments herein provide a method such as e.g. an ML model based AC to adapt to changing conditions and optimize its performance in a dynamic way, e.g. over time. The adaptation handles varying conditions in an efficient way without any tuning or complex remodeling schemes involved. The solution is applicable for different models, various targets, and condition alterations of any kind.

In some embodiments of the method e.g. by means of an ML model, AC is performed combined with CC that will improve the utilization rate of the resources, leading to better system performance. Less resources will be wasted—in the AC part by more demanding users are prioritized to the resources, and in the CC part by removing resources from users with low demands during the remainder of the connection.

Another important advantage is the reduction of configuration required for the AC and the CC parts of the method. The resources are automatically distributed to the users that will use them most efficiently.

Embodiments herein relate to wireless communication networks in general. FIG. 1 is a schematic overview depicting a wireless communications network 100. The wireless communications network 100 comprises one or more RANs and one or more CNs. The wireless communications network 100 may use NR but may further use a number of other different technologies, such as, 5G, NB-IoT, CAT-M, Wi-Fi, eMTC, Long Term Evolution (LTE), LTE-Advanced Wideband Code Division Multiple Access (WCDMA), Global System for Mobile communications/enhanced Data rate for GSM Evolution (GSM/EDGE), Worldwide Interoperability for Microwave Access (WiMax), or Ultra Mobile Broadband (UMB), just to mention a few possible implementations.

Network nodes operate in the wireless communications network 100, such as a network node 110, providing radio coverage over a geographical area, a cell 11. The cell 11 may also be referred to as a service area, beam or a group of beams.

The network node 110 may be a transmission and reception point e.g. a radio access network node such as a base station, e.g. a radio base station such as a NodeB, an evolved Node B (eNB, eNode B), an NR Node B (gNB), a base transceiver station, a radio remote unit, an Access Point Base Station, a base station router, a transmission arrangement of a radio base station, a stand-alone access point, a Wireless Local Area Network (WLAN) access point or an Access Point Station (AP STA), an access controller, or any other network unit capable of communicating with a UE within the cell 11 served by the network node 110 depending e.g. on the radio access technology and terminology used. The network node 110 may be referred to as a serving radio network node and communicates with a UE 121, 122 with Downlink (DL) transmissions to the UE 121, 122 and Uplink (UL) transmissions from the UE 121, 122.

UEs such as e.g. a first UE 121 and one or more second UEs 122 operate in the wireless communications network 100. The UEs 121, 122 may e.g. be a mobile station, a wireless terminal, an NB-IoT device, an eMTC device, a CAT-M device, a WiFi device, an LTE device and an a non-access point (non-AP) STA, a STA, that communicates via a base station such as e.g. the network node 110, one or more Access Networks (AN), e.g. RAN, to one or more core networks (CN). It should be understood by the skilled in the art that “UE” is a non-limiting term which means any terminal, wireless communication terminal, user equipment, Device to Device (D2D) terminal, or node e.g. smart phone, laptop, mobile phone, sensor, relay, mobile tablets or even a small base station communicating within a cell.

Further network nodes operate in the wireless communications network 100, such as a network node 130. The network node 130 may be an MME which is a control node for an LTE access network and an NR network, an Serving Gateway (SGW), and a Packet Data Network Gateway (PGW).

Methods according to embodiments herein may be performed by the network node 110. As an alternative, a Distributed Node DN and functionality, e.g. comprised in a cloud 140 as shown in FIG. 4 may be used for performing or partly performing the methods.

Example embodiments of a method performed by a network node 110 for performing admission control in a wireless communications network 100, will now be described with reference to a flowchart depicted in FIGS. 2 a and b . Whereof Actions 201-208 are shown in page 2 a, and Actions 209-211 are shown in FIG. 2 b . The network node 110 serves a first UE 121 and one or more second UEs 122. The network node may comprise an ML model e.g. an ML model module.

The method comprises the following actions, which actions may be taken in any suitable order. Actions that are optional are presented in dashed boxes in FIG. 2 .

Action 201

In an example scenario the first UE 121 has data to send or receive and therefore needs radio resources from the network node 110 to access the wireless communications network 100. Therefore in some embodiments, the first UE 121 sends an access request to the network node 110. Thus, the network node 110 receives an access request from the first UE 121. The access request is for a radio resource for communication between the first UE 121 and the network node 110.

Action 202

In order to handle the admission control efficiently according to embodiments herein, the network node 110 needs to form an opinion about the requested radio resources of first UE 121. This will be used later on to predict the requirement of the radio resource that is requested by the first UE 121. The network node 110 e.g. measures the initial data traffic between the network node 110 and the and the first UE 121. As a respond to the access request, a default radio resource may be set up, sufficient to meet the requirements for UEs with low demands but may not include full user satisfaction for UEs with higher requirements. In order to measure the initial data traffic a first e.g. normal, connection must be set up, then over that first connection the initial data traffic is measured and resource requirements are assessed.

This may not be performed, be performed or partly be performed by the ML model, depending on how the ML model is defined.

The measure may e.g. comprise initial service layer signalling, but also data traffic for the connected service. The initial data traffic may be measured by collecting characteristics of the transmitted data traffic, e.g. directions, volumes, timing information and statistics for the transmitted data entities.

Action 203

The network node 110 then predicts the requirement of the radio resource that is requested by the first UE 121. The network node 110 estimates a first prediction of a requirement of the radio resource related to the access request, based on a measured initial data traffic between the network node 110 and the first UE 121. This will be used later on as an input when deciding whether or not to admit an additional radio resource to the first UE 121. In this way the network node 110 may e.g. predict such as e.g. learn whether it is probable that UE 121 is demanding a high Band Width (BW) and therefore e.g. demands additional resources e.g. in the form of high BW for the communication. A high BW demanding UE when used herein means a UE that e.g. uses a service that requires fast data communication for large data volumes in order to provide a good user experience. A result of this estimated first prediction may be a value e.g. the probability value that the first UE 121 demands high BW is 90%, or 50% or 30%, or as an alternative the probability that the first UE 121 does not require high BW is 90%, or 50% or 30%. A further alternative of a result of this estimated first prediction may be a value e.g. of total data volume in either direction, the total service time for the connection, or the time to the next data burst, either as a direct value or the probability that the level will be over or under a certain limit. This action may be performed by the ML model e.g. in the module residing in the network node 110.

Action 204

In order to handle the admission control even more efficiently according to embodiments herein, the network node 110 needs to form an opinion about the available resources provided by the network node 110. It may be assumed that the network node 110 provides a limited radio resource pool. A large number of second UEs 122 communicating with the network node 110 means a high data traffic load demanding a lot of the radio resources provided by the network node 110 and only a few, if any, radio resources available for additional UEs requesting access to the wireless communications network 100. Vice versa, a small number of second UEs 122 communicating with the network node 110 means a low data traffic load demanding only a little of the radio resources provided by the network node 110 and a lot of radio resources are available for additional UEs requesting access to the wireless communications network 100.

The network node 110 may therefore measure the data traffic load between the network node 110 and the one or more second UEs 122. This may not be performed, be performed or partly be performed by the ML model, depending on how the ML model is defined.

The wording data traffic load when used herein may e.g. comprise: Available radio resources in the network node 110 i.e. radio resources not used at the moment, quantity of used radio resources in the network node 110 i.e. radio resources that are used at the moment, data traffic pattern of the one or more second UEs 122, the number of connected UEs, the mobility activity i.e. the intensity of handovers, and the total data traffic transmitted.

The data traffic load may be measured by keeping track of the connected devices such as one or more second UEs 122, and their activities, continuously collecting characteristics of the individually and aggregated transmitted traffic, e.g. directions, pattern, volumes, timing information and statistics for the transmitted data entities.

Action 205

In order to handle the admission control dynamically according to embodiments herein, the network node 110 decides a first threshold, e.g. a limit, based on the current data traffic load which is to be used for the admission control of the first UE 121. Thus the network node 110 determines a first threshold related to the first prediction, as a function of a measured data traffic load between the network node 110 and the one or more second UEs 122. This action may be performed by the ML model e.g. in the module residing in the network node 110.

In some embodiments, the first threshold comprises a probability, e.g. a probability value, that the prediction of the requirement of the resource is above a first limit. In some alternative embodiments, the first threshold comprises any other statistical measure e.g. a standard deviation, a statistical distribution, median value, etc.

According to embodiments herein, a first threshold may be determined for each new UE requesting resources from the radio network node 110 and each time a UE that was not admitted resources again requests resources from the radio network node 110. This means that the first threshold is dynamically determined and therefore may be changed dynamically. E.g. at a certain data traffic load the first threshold such as the probability limit, for predicting high BW demand may be determined to 60%. Further, in a really demanding data traffic load situation the first threshold for predicting high BW demand may be determined to be 90%. According to embodiments herein the dynamically determined first threshold allows for a much better accuracy when performing admission control leading to that almost all scarce radio resources are assigned to the UEs that really need them, i.e. the UEs with the highest BW demands. In an example scenario the UEs with the highest BW demands are prioritized since this will yield the highest positive impact on user experience.

This action of determining the first threshold related to the first prediction, as a function of a measured data traffic load between the network node 110 and the one or more second UEs 122 may comprise to determining the first threshold related to the first prediction as a function of the measured data traffic load between the network node 110 and the one or more second UEs 122. This e.g. means that when the traffic load increases, also the first threshold increases.

Action 206

According to embodiments herein, the network node 110 now uses the estimated first prediction, and the determined first threshold as input to perform the admission control. Thus the network node 110 performs admission control by deciding whether or not to admit the radio resource to the first UE 121, based on whether or not the first prediction exceeds the first threshold. This may not be performed, be performed or partly be performed by the ML model, depending on how the ML model is defined.

According to an example scenario the first threshold is decided to be 70%. If the result of the estimated first prediction is a probability value that the first UE 121 demands high BW is 90%, this means that the first prediction of 90% exceeds the first threshold that is 70%. The first UE 121 is therefore decided to be admitted access to the radio resources such as the additional resources. If the result of the estimated first prediction results in that the probability value that the first UE 121 demands high BW is 50%, this means that the first prediction of 50% do not exceed the first threshold that is 70%. The first UE 121 is therefore decided to not be admitted access to the radio resources such as the additional resources. Further, if the result of the estimated first prediction results in that the probability value that the first UE 121 demands high BW is 30%, this means that the first prediction of 30% do not exceed the first threshold that is 70% either. The first UE 121 is therefore decided to not be admitted. According to an example scenario the first threshold is decided to be e.g. estimated total connection data volume. If a larger volume is expected than the threshold volume, decide to admit radio resources such as additional radio resources, and vice versa.

Action 207

Since the data traffic load changes from time to time, the admission control procedure which according to embodiments herein is dynamic, may be updated from time to time. This may be performed in fixed intermediate time intervals or in intermediate time intervals dynamically determined based on a current the data traffic load.

Therefore, in some embodiments, one or more updates are performed with an intermediate time interval. In these embodiments, the network node 110, may determine the intermediate time interval for performing the respective updates dynamically as a function of the measured data traffic load between the network node 110 and the one or more second UEs 122.

Action 208

When network node 110 has decided to not admit the radio resource to the first UE 121, the first UE 121 may send a new access request at a later point in time. The network node 110 may accordingly perform one or more updates by repeating the following actions respective one or more times:

receiving 201 from the first UE 121, an access request for a radio resource for communication between the first UE 121 and the network node 110,

estimating 203 a first prediction of a requirement of the radio resource related to the access request, based on a measured initial data traffic between the network node 110 and the first UE 121,

determining 205 a first threshold related to the first prediction, as a function of a measured data traffic load between the network node 110 and the one or more second UEs 122, and

performing 206 admission control by deciding whether or not to admit the radio resource to the first UE 121, based on whether or not the first prediction exceeds the first threshold.

When network node 110 has decided to admit the radio resource to the first UE 121, it may perform congestion control according to Actions 209-211 below and shown in FIG. 2 b , to further improve the usage of the radio resources.

Action 209

The network node 110 may estimate a second prediction of a forthcoming usage of the admitted radio resource, as a function of a measured data traffic load between the network node 110 and the first UE 121.

Action 210

The network node 110 may further determine a second threshold related to the second prediction, as a function of a measured data traffic load between the network node 110 and the one or more second UEs 122.

Action 211

The network node 110 may then perform congestion control by deciding whether or not to initiate a removal of the radio resource admitted to the first UE 121, based on whether or not the second prediction is below the second threshold. This may not be performed, be performed or partly be performed by the ML model, depending on how the ML model is defined.

Embodiments herein such as mentioned above will now be further described and exemplified. The text below is applicable to and may be combined with any suitable embodiment described above.

As an example of how the solution may be used, a use case is considered with the network node 110 which e.g. is a Radio Base Station (RBS), mobile end users such as the first UE 121 and the second UEs 122, and a limited resource pool of additional radio resources in the RBS. The pooled resources may be utilized by a limited number of UEs to enhance their individual performance, e g the bandwidth (BW), but each resource may only be utilized by a single UE such as e.g. the first UE 121. As a varying execution environment condition, the data traffic load in the network node 110 is used. To determine how the resources are best distributed, i e how to find the UEs with for example, but not limited to, the highest BW requirements, also referred to as the UE with the highest BW demands, two ML models executing in the network node 110 may be implemented to handle the Admission Control (AC) and in some embodiments the Congestion Control (CC), respectively. It is assumed that the individual cost for the first UE 121 to utilize the resource is low, i e no tangible cost on battery or any other UE associated resource. In the example the non-granted users may still have access but at a lower capability level.

The ML model in the AC part of the system may predict which UEs that will generate the highest demands on the resources, for example the highest BW. E.g. whether or not the estimated first prediction of the requirement of the radio resource related to the access request of the first UE 121 exceeds the first threshold This means that the network node 110 performs admission control by deciding to admit the radio resource to the first UE 121, when the first prediction exceeds the first threshold. E.g. other words, if the predicted BW for a UE is above the admission limit, the UE is granted, also referred to as admitted, additional capacity from the limited resource pool, as long as there are any available resources left. This means that the pool of radio resources may not always be fully utilized, but that the radio resource utilization from the granted UEs will be high.

In some embodiments CC is performed after the AC. The ML model in the CC part may supervise the utilization of the granted radio resources, and e.g. continuously monitor and predict near time utilization rate per UE such as for the first UE 121. This means that the network node 110 performs congestion control by deciding whether or not to initiate a removal of the radio resource admitted to the first UE 121, based on whether or not the second prediction is below the second threshold. So the network node 110 decides to initiate a removal of the radio resource admitted to the first UE 121 when the second prediction is below the second threshold. Further, the network node 110 decides to not initiate a removal of the radio resource admitted to the first UE 121 when the second prediction is above or equal the second threshold. E.g. in other words, if any UE is predicted to have BW, for example, below the CC grant limit, the resource is seen as forfeited and is no longer granted to the UE. This mechanism also can lead to the resource pool not being fully utilized at all times, but also that the individual resource utilization is high.

The AC grant limit and the CC forfeit limit may be of the same or different levels, depending on a desired hysteresis scheme.

The mechanism of give and remove grants to a user depending on the predicted forthcoming resource utilization allows for a flexible granting scheme that follows a UE's varying traffic pattern, for example throughput burstiness.

Some first embodiments relate to the admission control based on whether or not the first prediction exceeds the first threshold. Some second embodiments relate to one or more updates that are performed e.g. with an intermediate time interval. Some third embodiments herein relate to an added congestion control procedure.

In a situation with low traffic load in the network node 110, a possible strategy for allocation of the resources in the resource pool may be that each new UE such as the first UE 121, gets a resource to achieve high bandwidth. The requirements on any prediction of the demanded BW per user are low, since the cost for a false prediction is low.

As the load in the network node 110 increases, the pooled resources in the network node 110 start to get scarce, and thereby the importance of a correct BW prediction by the AC increases. In embodiments herein the first threshold, which is referred to as the limit in the example, in the ML model to predict high or low BW for a UE is dynamic. As mentioned above an example of a the first threshold is the probability of the prediction. In one prior art example, if the probability is higher than e g 50%, high BW is always predicted since the limit is fixed. However, according to embodiments herein, these limits are determined dynamically, and may therefore be dynamically changed, e g at a certain data traffic load at network node 110, the first threshold, e.g. the probability limit, for predicting high BW may be decided to and/or be changed to e.g. 60%. And in a really demanding load situation the probability limit for high BW may be increased to 90%, allowing for a much better accuracy of the prediction leading to almost all scarce resources assigned to the UEs that really need them.

As the load decreases, the limits such as the first threshold, may be relaxed, and these changes to the limits may be gradually following the steering characteristic without any hard steps, allowing for optimal performance in any data traffic load situation. In some embodiments the network node 110 determines the first threshold related to the first prediction, as a function of the measured data traffic load between the network node 110 and the one or more second UEs 122. This may be performed by aggregating or collecting characteristics of the transmitted data traffic.

It is noteworthy that the environmental condition that steers the AC such as the RBS load in the example, the ML model indicator such as the prediction probability in the example, the resulting ML target such as the prediction accuracy in the example, and the controlled artifact such as the assigning of pooled BW resources in the example, are all examples and not limited to these given herein. The embodiments herein includes using one or more external characteristic measures to alter the ML model result used by AC, in order to achieve improved performance in a dynamic environment.

According to some embodiments herein, the AC algorithm e.g. comprising the actions 201-206 as described above, may be repeated per UE such as the first UE 121. The AC algorithm may in some of these embodiments be repeated with statically intermediate time intervals, i.e. the same fixed intermediate time interval between the AC algorithms all the time without consider the load situation in the network node 110. As an alternative, the AC algorithm may as an advantageous alternative be repeated with dynamically determined intermediate time intervals, i.e. deciding the intermediate time intervals between the AC algorithms from time to time and for each time of deciding taking the load situation in the network node 110 into consideration. In this way, the AC algorithm may be repeated with intermediate time intervals which are dynamically changed. In a really demanding traffic load situation at the network node 110, intermediate time intervals between the AC algorithms may be shortened allowing for a much more frequent AC process and leading to almost all scarce resources allocated to the UEs that really need them. The UEs that are really need the resources may e.g. be UEs that uses a service that requires fast data communication for large data volumes in order to provide a good user experience.

As the load decreases the intermediate time intervals between AC algorithms may be extended, and these changes to the intermediate time intervals may be gradually following the steering characteristic without any hard steps, allowing for optimal performance in any situation. The network node 110 may e.g. determine an intermediate time interval for performing the respective updates dynamically as a function of the measured data flow between the network node 110 and the one or more second UEs 122.

FIG. 3 is a block diagram that in a schematic way shows how the AC works in a system such as the wireless communications network 100. UEs, referred to as Users in FIG. 3 , such as the first UE 121, send requests requesting access to radio resources referred to as resources in FIG. 3 . The network node 110 performs AC and either grants or denies the requests. I.e. the network node 110 performs admission control by deciding whether or not to admit the radio resource to the first UE 120, based on whether or not the first prediction exceeds the first threshold. The admitted UEs 121 which is referred to as granted users in FIG. 3 are included in a pool of resource usage. Denied users may send a request again, wait or give up.

According to some embodiments mentioned above, the dynamic intermediate interval timing may be provided for the renewed requests depending on the environmental situation such as the data traffic load, as well as dynamic levels for granting the access such the second thresholds, also based on the environmental situation such as the data traffic load.

FIG. 4 is a block diagram that in a schematic way shows how one or more Environmental Conditions such as the data traffic load is used as input to a ML Model and thereby impacts an output to the AC in the network node 110. As an example the AC performed by the network node 110, may control the usage of a limited resource pool in the network node 110, and the network node 110 may by means of the ML model decide which UEs that is to be given radio resources. The decision may be based on an initial observation period of each user's behavior, referred to as measuring the initial data traffic between the network node 110 and the and the first UE 121 in Action 202 above.

FIG. 5 is a block diagram that in a schematic way shows in more detail how Environmental Condition signals such as data traffic load signals are used by a regulation addition to the ML Model, by producing a Model Indicator that e.g. the core of the ML Model may use to alter its decision of admitting access to any type of resources in the network node 110. The decision is then sent to the Admission Control to be used when deciding whether or not resources should be granted. The ML Model performance such as accuracy or any other model performance statistic may be constantly monitored.

The wording regulation addition when used herein means a complementary function that uses input from the environment, traffic, network node or any other related artifact that can assist in providing additional input or conditions to the regulation.

The wording Model Indicator when used herein means a complementary condition or input parameter to the regulation.

The wording core of the ML Model when used herein means the actual prediction function that, by being pre-trained on similar input data, from a set of input data may give an accurate prediction of the requested resource quantity.

The wording ML Model performance when used herein means a valid statistic of how well the ML model performs, e.g. how accurate the prediction is or how fast the prediction is determined.

FIG. 6 is a block diagram that in a schematic way shows how embodiments herein may be implemented and used, in the example scenario as described above, such that e.g. the radio resources are allocated to the UEs that can make best use of them. The initial data traffic load of the first UE 121 is measured in an initial Session Measurement. The network node 110 may then by means of the ML Model estimating the first prediction of the requirement of the radio resource related to the access request, based on the measured initial data traffic between the network node 110 and the first UE 121, as referred to in Action 203 above. This is the first input to the AC in FIG. 6 . The regulation such as e.g. the first threshold is determined based on measured data traffic load of the second UEs 122, as referred to in Action 204 above. This is the second input to the AC in FIG. 6 . The ML Model may thus predict whether the first UE 121 will benefit from additional resources, which then would be admitted by and allocated in the network node 110.

The data traffic load between the network node 110 and the one or more second UEs 122 and the initial data traffic between the network node 110 and the and the first UE 121 are measured again at intermediate time intervals dependent on environmental conditions such as the data traffic load, and the ML Model may then predict again whether the first UE 121 will benefit from additional resources and grants or rejects the access to these radio resources. The decision is taking the environmental conditions such as the data traffic load into account, thereby enabling a dynamic access scheme dependent on the current situation.

FIG. 7 is a sequence diagram that in a schematic way illustrates a signaling flow within the ML model module residing in the network node 110 according to an example embodiment. The environmental condition is presented to the Regulation part of the solution, this means that the regulation such as e.g. the first threshold is determined based on measured data traffic load of the second UEs 122, as referred to in Action 204. The regulation then sends an updated model indicator which in this example is the determined first threshold, to the prediction part of the ML Model for estimation of the first prediction of the requirement of the radio resource related to the access request, based on a measured initial data traffic between the network node 110 and the first UE 121 as described in Action 203. This results in an Admission Control signal that defines the decision from the ML Model such as when the network node 110 performs admission control by deciding whether or not to admit the radio resource to the first UE 121, based on whether or not the first prediction exceeds the first threshold as described in Action 206.

This process is repeated with dynamic time intervals.

FIG. 8 illustrates an example how embodiments herein may working as a diagram of a Precision-at-Top distribution for the network node 110 such as its ML model for prediction of the first and/or second threshold. The diagram shows relationship between accuracy and probability. The accuracy axis of the diagram refers to the accuracy of the part of the predictions above the breaking point in the graph, the breaking point meaning the point where the dashed lines meet. The probability of the diagram refers to the estimated first prediction which may be a probability that the conditions for granting data resources such as additional resources are fulfilled. The default value for prior art decisions is the probability 0.5, this is shown in the diagram for comparison with embodiments herein. The wording Precision-at-Top when used herein means the resulting precision distribution when prediction outcomes are sorted in falling probability and the resulting precision for the share of the samples from the top to any given point are calculated. By using the Environmental Condition as a trigger, the first and/or second threshold e.g. the probability limit, for the classification may be different from 0.5 when the data traffic load is taken into consideration, such as e g 0.8 which would yield a much higher percentage of correctly predicted targets. The wording correctly predicted targets when used herein means the share of predictions that are shown to be correct, meaning that when the outcome of the predicted activity or entity is revealed whether or not this outcome corresponds with the predicted value. Both the Probability and the Accuracy may be changed to other characteristics for other applications of embodiments herein. Further, both the Probability and the Accuracy may be changed over time to other characteristics for other applications of embodiments herein.

Embodiments herein work well in a distributed computing environment, and any of the building blocks may be implemented on a separate Hard Ware (HW) unit or server, or as a separate thread or process in any operating system environment, or as a virtual block executing in a cloud configuration. FIG. 9 shows an example scenario of how the included parts may be configured to operate over separate HW/Soft Ware (SW)/Virtual units.

FIG. 10 is a block diagram that in a schematic way shows how the AC in combination with CC work in a system such as the wireless communications network 100. UEs, referred to as Users in FIG. 11 , such as the first UE 121, send requests requesting access to radio resources referred to as resources in FIG. 11 . The network node 110 performs AC and either grants or denies the requests. I.e. the network node 110 performs admission control by deciding whether or not to admit the radio resource to the first UE 120, based on whether or not the first prediction exceeds the first threshold. The admitted UEs 121 which is referred to as granted users in FIG. 11 are included in a pool of resource usage. Denied users may send a request again, wait or give up.

According to some embodiments, after users are being admitted, also referred to as granted, to resource usage, the UEs forthcoming resource utilization are predicted. This means that the network node 110 may estimate a second prediction of a forthcoming usage of the allocated radio resource, based on a measured data traffic between the network node 110 and the first UE 121 as described above in action 209, and determine a second threshold related to the first prediction, as a function of a measured data traffic load as described above in action 210.

The network node 110 then performs congestion control by deciding whether or not to initiate a removal of the radio resource admitted to the first UE 120, based on whether or not the second prediction is below the second threshold as described above in action 211.

This means that the grant may be removed if utilization is predicted to be below a certain level.

In some embodiments, the traffic is continuously monitored by the network node 110 and will predict whether the UE will benefit from additional resources or not e.g. by means of ML Models in the AC and CC parts. The AC part may request resources in the network node 110 to be allocated to a specific UE such as the first UE 121, and the CC part may request resource removal for this UE.

In an example scenario, User Data such as a measure of an initial data traffic, is presented in an AC part in the network node 110, which in case it predicts high resource utilization sends a Resource Grant to a Resource Handler in the network node 110. The Resource Handler may then give resource access to the specific user such as the first UE 121. At that point the CC part in the network node 110 starts predicting the forthcoming resource utilization, and in case a too low utilization is predicted a Grant Removal indication is sent to the Resource Handler in the network node 110, which then may remove the resource from the this UE. The AC part may then start predicting resource demands again, and so on.

Embodiments herein provide a way of dealing with varying conditions e.g. by means of an ML model, to dynamically adjust its behavior depending on the loaded cell conditions, in some embodiments also over time, and improve the performance in the Admission Control when it matters the most. Modern traffic patterns are bursty and vary significantly over long and short usage terms. According to embodiments herein, both an individual UE's demands may be met, as well as the system's demand such as wireless communications network's 100 demand for efficient usage of the resources. Embodiments herein provide UE differentiation.

An example use case is a situation when loaded cell conditions require higher precision when predicting UEs with high bandwidth demands. Another example use case is a situation when rerunning the AC with a dynamic time interval depending on the loaded cell conditions. A further example use case relating to some embodiments herein is a situation where cell resources may be taken away if the demand of the first UE 121 is predicted to decrease.

However, embodiments herein may be applied in a much broader perspective and may include any AC applications for any different environment condition, various prediction targets, any model characteristics, and any model performance metrics. The dynamic connection between the environmental conditions, the ML model bi-products like probability, and the ML model performance metrics is a fundamental part, and that this connection will produce better results when needed the most.

To perform the method actions for performing admission control in a wireless communications network 100, the network node 110 may comprise the arrangement depicted in FIG. 11 . As mentioned above, the network node 110 is configured to serve the first UE 121 and one or more second UEs 122.

The network node 110 may comprise an input and output interface 1100 configured to communicate e.g. with the network node 110. The input and output interface 1100 may comprise a wireless receiver (not shown) and a wireless transmitter not (shown).

The network node 110 is further configured to, e.g. by means of a receiving unit 1110 comprised in the network node 110, receive from the first UE 121, an access request for a radio resource for communication between the first UE 121 and the network node 110.

The network node 110 is further configured to, e.g. by means of an estimating unit 1120 comprised in the network node 110, estimate a first prediction of a requirement of the radio resource related to the access request, based on a measured initial data traffic between the network node 110 and the first UE 121.

The network node 110 is further configured to, e.g. by means of a determining unit 1130 comprised in the network node 110, determine a first threshold related to the first prediction, as a function of a measured data traffic load between the network node 110 and the one or more second UEs 122. The first threshold may be adapted to comprise a probability that the prediction of the requirement of the resource is above a first limit.

The network node 110 may further be configured to, e.g. by means of the determining unit 1130 comprised in the network node 110, determine the first threshold related to the first prediction, as a function of a measured data traffic load between the network node 110 and the one or more second UEs 122 by determining the first threshold related to the first prediction, as a function of the measured data traffic load between the network node 110 and the one or more second UEs 122.

The network node 110 is further configured to, e.g. by means of a performing unit 1140 comprised in the network node 110, perform admission control by deciding whether or not to admit the radio resource to the first UE 121, based on whether or not the first prediction exceeds the first threshold.

The network node 110 may further be configured to, e.g. by means of the performing unit 1140 comprised in the network node 110, when decided to not admit the radio resource to the first UE 121, perform one or more updates by repeating the following actions respective one or more times: Receive from the first UE 121, an access request for a radio resource for communication between the first UE 121 and the network node 110, estimate a first prediction of a requirement of the radio resource related to the access request, based on a measured initial data traffic between the network node 110 and the first UE 121, determine a first threshold related to the first prediction, as a function of a measured data traffic load between the network node 110 and the one or more second UEs 122, and perform admission control by deciding whether or not to admit the radio resource to the first UE 121, based on whether or not the first prediction exceeds the first threshold.

In some embodiments, the respective updates are adapted to be performed with an intermediate time interval. In these embodiments, the network node 110 may further be configured to, e.g. by means of the determining unit 1130 comprised in the network node 110, determine an intermediate time interval for performing the respective updates dynamically as a function of the measured data traffic load between the network node 110 and the one or more second UEs 122.

The network node 110 may further be configured to, e.g. by means of a measuring unit 1150 comprised in the network node 110, to any one or more out of: Measure the initial data traffic between the network node 110 and the and the first UE 121, and measure a data traffic load between the network node 110 and the one or more second UEs 122.

In an example scenario, when it is decided to admit the radio resource to the first UE 121, the network node 110 may further being configured to the following:

E.g. by means of the estimating unit 1120 comprised in the network node 110, estimate a second prediction of a forthcoming usage of the admitted radio resource, as a function of a measured data traffic load between the network node 110 and the first UE 121,

e.g. by means of the determining unit 1130 comprised in the network node 110, determine a second threshold related to the second prediction, as a function of a measured data traffic load between the network node 110 and the one or more second UEs 122, and

e.g. by means of the performing unit 1140 comprised in the network node 110, perform congestion control by deciding whether or not to initiate a removal of the radio resource admitted to the first UE 121, based on whether or not the second prediction is below the second threshold.

The embodiments herein may be implemented through a respective processor or one or more processors, such as a processor 1160 of a processing circuitry in the network node 110 depicted in FIG. 11 , together with respective computer program code for performing the functions and actions of the embodiments herein. The program code mentioned above may also be provided as a computer program product, for instance in the form of a data carrier carrying computer program code for performing the embodiments herein when being loaded into the network node 110. One such carrier may be in the form of a CD ROM disc. It is however feasible with other data carriers such as a memory stick. The computer program code may furthermore be provided as pure program code on a server and downloaded to the network node 110.

The network node 110 may further comprise a memory 1170 comprising one or more memory units. The memory comprises instructions executable by the processor in the network node 110. The memory 1170 is arranged to be used to store e.g. data, configurations, thresholds, predictions, determined intermediate time intervals, measurements, and applications to perform the methods herein when being executed in the network node 110.

In some embodiments, a respective computer program 1180 comprises instructions, which when executed by the respective at least one processor 1180, cause the at least one processor 1160 of the network node 110 to perform the actions above.

In some embodiments, a respective carrier 1190 comprises the respective computer program 1180, wherein the carrier is one of an electronic signal, an optical signal, an electromagnetic signal, a magnetic signal, an electric signal, a radio signal, a microwave signal, or a computer-readable storage medium.

Those skilled in the art will also appreciate that the units in the network node 110 mentioned above may refer to a combination of analog and digital circuits, and/or one or more processor configured with software and/or firmware, e.g. stored in the network node 110 that when executed by the respective one or more processors such as the processors described above. One or more of these processors, as well as the other digital hardware, may be included in a single Application-Specific Integrated Circuitry (ASIC), or several processors and various digital hardware may be distributed among several separate components, whether individually packaged or assembled into a system-on-a-chip (SoC).

Further Extensions and Variations

With reference to FIG. 12 , in accordance with an embodiment, a communication system includes a telecommunication network 3210 such as the wireless communications network 100, e.g. a NR network, such as a 3GPP-type cellular network, which comprises an access network 3211, such as a radio access network, and a core network 3214. The access network 3211 comprises a plurality of base stations 3212 a, 3212 b, 3212 c, such as the network node 110, access nodes, AP STAs NBs, eNBs, gNBs or other types of wireless access points, each defining a corresponding coverage area 3213 a, 3213 b, 3213 c. Each base station 3212 a, 3212 b, 3212 c is connectable to the core network 3214 over a wired or wireless connection 3215. A first user equipment (UE) e.g. the first UE 121 such as a Non-AP STA 3291 located in coverage area 3213 c is configured to wirelessly connect to, or be paged by, the corresponding base station 3212 c. A second UE 3292 e.g. the wireless device 122 such as a Non-AP STA in coverage area 3213 a is wirelessly connectable to the corresponding base station 3212 a. While a plurality of UEs 3291, 3292 are illustrated in this example, the disclosed embodiments are equally applicable to a situation where a sole UE is in the coverage area or where a sole UE is connecting to the corresponding base station 3212.

The telecommunication network 3210 is itself connected to a host computer 3230, which may be embodied in the hardware and/or software of a standalone server, a cloud-implemented server, a distributed server or as processing resources in a server farm. The host computer 3230 may be under the ownership or control of a service provider, or may be operated by the service provider or on behalf of the service provider. The connections 3221, 3222 between the telecommunication network 3210 and the host computer 3230 may extend directly from the core network 3214 to the host computer 3230 or may go via an optional intermediate network 3220. The intermediate network 3220 may be one of, or a combination of more than one of, a public, private or hosted network; the intermediate network 3220, if any, may be a backbone network or the Internet; in particular, the intermediate network 3220 may comprise two or more sub-networks (not shown).

The communication system of FIG. 12 as a whole enables connectivity between one of the connected UEs 3291, 3292 and the host computer 3230. The connectivity may be described as an over-the-top (OTT) connection 3250. The host computer 3230 and the connected UEs 3291, 3292 are configured to communicate data and/or signaling via the OTT connection 3250, using the access network 3211, the core network 3214, any intermediate network 3220 and possible further infrastructure (not shown) as intermediaries. The OTT connection 3250 may be transparent in the sense that the participating communication devices through which the OTT connection 3250 passes are unaware of routing of uplink and downlink communications. For example, a base station 3212 may not or need not be informed about the past routing of an incoming downlink communication with data originating from a host computer 3230 to be forwarded (e.g., handed over) to a connected UE 3291. Similarly, the base station 3212 need not be aware of the future routing of an outgoing uplink communication originating from the UE 3291 towards the host computer 3230.

Example implementations, in accordance with an embodiment, of the UE, base station and host computer discussed in the preceding paragraphs will now be described with reference to FIG. 13 . In a communication system 3300, a host computer 3310 comprises hardware 3315 including a communication interface 3316 configured to set up and maintain a wired or wireless connection with an interface of a different communication device of the communication system 3300. The host computer 3310 further comprises processing circuitry 3318, which may have storage and/or processing capabilities. In particular, the processing circuitry 3318 may comprise one or more programmable processors, application-specific integrated circuits, field programmable gate arrays or combinations of these (not shown) adapted to execute instructions. The host computer 3310 further comprises software 3311, which is stored in or accessible by the host computer 3310 and executable by the processing circuitry 3318. The software 3311 includes a host application 3312. The host application 3312 may be operable to provide a service to a remote user, such as a UE 3330 connecting via an OTT connection 3350 terminating at the UE 3330 and the host computer 3310. In providing the service to the remote user, the host application 3312 may provide user data which is transmitted using the OTT connection 3350.

The communication system 3300 further includes a base station 3320 provided in a telecommunication system and comprising hardware 3325 enabling it to communicate with the host computer 3310 and with the UE 3330. The hardware 3325 may include a communication interface 3326 for setting up and maintaining a wired or wireless connection with an interface of a different communication device of the communication system 3300, as well as a radio interface 3327 for setting up and maintaining at least a wireless connection 3370 with a UE 3330 located in a coverage area (not shown in FIG. 13 ) served by the base station 3320. The communication interface 3326 may be configured to facilitate a connection 3360 to the host computer 3310. The connection 3360 may be direct or it may pass through a core network (not shown in FIG. 13 ) of the telecommunication system and/or through one or more intermediate networks outside the telecommunication system. In the embodiment shown, the hardware 3325 of the base station 3320 further includes processing circuitry 3328, which may comprise one or more programmable processors, application-specific integrated circuits, field programmable gate arrays or combinations of these (not shown) adapted to execute instructions. The base station 3320 further has software 3321 stored internally or accessible via an external connection.

The communication system 3300 further includes the UE 3330 already referred to. Its hardware 3335 may include a radio interface 3337 configured to set up and maintain a wireless connection 3370 with a base station serving a coverage area in which the UE 3330 is currently located. The hardware 3335 of the UE 3330 further includes processing circuitry 3338, which may comprise one or more programmable processors, application-specific integrated circuits, field programmable gate arrays or combinations of these (not shown) adapted to execute instructions. The UE 3330 further comprises software 3331, which is stored in or accessible by the UE 3330 and executable by the processing circuitry 3338. The software 3331 includes a client application 3332. The client application 3332 may be operable to provide a service to a human or non-human user via the UE 3330, with the support of the host computer 3310. In the host computer 3310, an executing host application 3312 may communicate with the executing client application 3332 via the OTT connection 3350 terminating at the UE 3330 and the host computer 3310. In providing the service to the user, the client application 3332 may receive request data from the host application 3312 and provide user data in response to the request data. The OTT connection 3350 may transfer both the request data and the user data. The client application 3332 may interact with the user to generate the user data that it provides. It is noted that the host computer 3310, base station 3320 and UE 3330 illustrated in FIG. 13 may be identical to the host computer 3230, one of the base stations 3212 a, 3212 b, 3212 c and one of the UEs 3291, 3292 of FIG. 12 , respectively. This is to say, the inner workings of these entities may be as shown in FIG. 13 and independently, the surrounding network topology may be that of FIG. 12 .

In FIG. 13 , the OTT connection 3350 has been drawn abstractly to illustrate the communication between the host computer 3310 and the use equipment 3330 via the base station 3320, without explicit reference to any intermediary devices and the precise routing of messages via these devices. Network infrastructure may determine the routing, which it may be configured to hide from the UE 3330 or from the service provider operating the host computer 3310, or both. While the OTT connection 3350 is active, the network infrastructure may further take decisions by which it dynamically changes the routing (e.g., on the basis of load balancing consideration or reconfiguration of the network).

The wireless connection 3370 between the UE 3330 and the base station 3320 is in accordance with the teachings of the embodiments described throughout this disclosure. One or more of the various embodiments improve the performance of OTT services provided to the UE 3330 using the OTT connection 3350, in which the wireless connection 3370 forms the last segment. More precisely, the teachings of these embodiments may improve the data rate, latency, power consumption and thereby provide benefits such as user waiting time, relaxed restriction on file size, better responsiveness, extended battery lifetime.

A measurement procedure may be provided for the purpose of monitoring data rate, latency and other factors on which the one or more embodiments improve. There may further be an optional network functionality for reconfiguring the OTT connection 3350 between the host computer 3310 and UE 3330, in response to variations in the measurement results. The measurement procedure and/or the network functionality for reconfiguring the OTT connection 3350 may be implemented in the software 3311 of the host computer 3310 or in the software 3331 of the UE 3330, or both. In embodiments, sensors (not shown) may be deployed in or in association with communication devices through which the OTT connection 3350 passes; the sensors may participate in the measurement procedure by supplying values of the monitored quantities exemplified above, or supplying values of other physical quantities from which software 3311, 3331 may compute or estimate the monitored quantities. The reconfiguring of the OTT connection 3350 may include message format, retransmission settings, preferred routing etc.; the reconfiguring need not affect the base station 3320, and it may be unknown or imperceptible to the base station 3320. Such procedures and functionalities may be known and practiced in the art. In certain embodiments, measurements may involve proprietary UE signaling facilitating the host computer's 3310 measurements of throughput, propagation times, latency and the like. The measurements may be implemented in that the software 3311, 3331 causes messages to be transmitted, in particular empty or ‘dummy’ messages, using the OTT connection 3350 while it monitors propagation times, errors etc.

FIG. 14 is a flowchart illustrating a method implemented in a communication system, in accordance with one embodiment. The communication system includes a host computer, a base station such as a AP STA, and a UE such as a Non-AP STA which may be those described with reference to FIGS. 32 and 33 . For simplicity of the present disclosure, only drawing references to FIG. 14 will be included in this section. In a first action 3410 of the method, the host computer provides user data. In an optional subaction 3411 of the first action 3410, the host computer provides the user data by executing a host application. In a second action 3420, the host computer initiates a transmission carrying the user data to the UE. In an optional third action 3430, the base station transmits to the UE the user data which was carried in the transmission that the host computer initiated, in accordance with the teachings of the embodiments described throughout this disclosure. In an optional fourth action 3440, the UE executes a client application associated with the host application executed by the host computer.

FIG. 15 is a flowchart illustrating a method implemented in a communication system, in accordance with one embodiment. The communication system includes a host computer, a base station such as a AP STA, and a UE such as a Non-AP STA which may be those described with reference to FIGS. 32 and 33 . For simplicity of the present disclosure, only drawing references to FIG. 15 will be included in this section. In a first action 3510 of the method, the host computer provides user data. In an optional subaction (not shown) the host computer provides the user data by executing a host application. In a second action 3520, the host computer initiates a transmission carrying the user data to the UE. The transmission may pass via the base station, in accordance with the teachings of the embodiments described throughout this disclosure. In an optional third action 3530, the UE receives the user data carried in the transmission.

FIG. 16 is a flowchart illustrating a method implemented in a communication system, in accordance with one embodiment. The communication system includes a host computer, a base station such as a AP STA, and a UE such as a Non-AP STA which may be those described with reference to FIGS. 32 and 33 . For simplicity of the present disclosure, only drawing references to FIG. 16 will be included in this section. In an optional first action 3610 of the method, the UE receives input data provided by the host computer. Additionally or alternatively, in an optional second action 3620, the UE provides user data. In an optional subaction 3621 of the second action 3620, the UE provides the user data by executing a client application. In a further optional subaction 3611 of the first action 3610, the UE executes a client application which provides the user data in reaction to the received input data provided by the host computer. In providing the user data, the executed client application may further consider user input received from the user. Regardless of the specific manner in which the user data was provided, the UE initiates, in an optional third subaction 3630, transmission of the user data to the host computer. In a fourth action 3640 of the method, the host computer receives the user data transmitted from the UE, in accordance with the teachings of the embodiments described throughout this disclosure.

FIG. 17 is a flowchart illustrating a method implemented in a communication system, in accordance with one embodiment. The communication system includes a host computer, a base station such as a AP STA, and a UE such as a Non-AP STA which may be those described with reference to FIGS. 32 and 33 . For simplicity of the present disclosure, only drawing references to FIG. 17 will be included in this section. In an optional first action 3710 of the method, in accordance with the teachings of the embodiments described throughout this disclosure, the base station receives user data from the UE. In an optional second action 3720, the base station initiates transmission of the received user data to the host computer. In a third action 3730, the host computer receives the user data carried in the transmission initiated by the base station.

When using the word “comprise” or “comprising” it shall be interpreted as non-limiting, i.e. meaning “consist at least of”.

The embodiments herein are not limited to the above described preferred embodiments. Various alternatives, modifications and equivalents may be used. 

The invention claimed is:
 1. A method performed by a network node for performing admission control in a wireless communications network, which network node serves a first user equipment (UE) and one or more second UEs, the method comprising: after the network node receives from the first UE an access request, the network node admitting the UE to the wireless communication network, wherein the admitting comprises allocating initial communication resources to the first UE to enable the first UE to transmit data and/or receive data from the network node; measuring initial data traffic between the network node and the first UE, wherein the measured amount of the initial data traffic is not zero; estimating a first prediction of a requirement of further radio resource related to the access request based on the measured amount of the initial data traffic between the network node and the first UE; determining a first threshold related to the first prediction as a function of a measured data traffic load between the network node and the one or more second UEs; and performing admission control by deciding whether or not to admit additional radio resources to the first UE based on whether or not the first prediction exceeds the first threshold.
 2. The method of claim 1, wherein the first threshold comprises a probability that the first prediction is above a first limit.
 3. The method of claim 1, further comprising measuring a data traffic load between the network node and the one or more second UEs.
 4. The method of claim 1, further comprising: receiving from the first UE a second access request; after receiving the second access request, allocating second communication resources to the first UE to enable the first UE to transmit data and/or receive data; after allocating the second communication resources, determining an amount of data traffic between the network node and the first UE; estimating a second prediction of a requirement of further radio resource related to the second access request based on the determined amount of data traffic; and performing admission control by deciding whether or not to admit additional radio resources to the first UE based on whether or not the second prediction exceeds the first threshold.
 5. The method of claim 4, further comprising: determining an intermediate time interval based on the measured data traffic load between the network node and the one or more second UEs.
 6. The method of claim 1, wherein determining the first threshold comprises: determining the first threshold using a machine learning (ML) model.
 7. The method of claim 1, further comprising: granting the additional radio resources to the first UE; estimating a second prediction of a forthcoming usage of the additional radio resources, as a function of a measured data traffic load between the network node and the first UE; determining a second threshold related to the second prediction; and performing congestion control by deciding whether or not to initiate a removal of the additional radio resources granted to the first UE, based on whether or not the second prediction is below the second threshold.
 8. A non-transitory computer readable medium storing a computer program comprising instructions, which when executed by a processor, causes the processor to perform the method of claim
 1. 9. The method of claim 1, further comprising: based on the measured amount of the initial data traffic to and/or from the first UE, determining a probability value indicating a probability that the first UE is of a first type of UE; and based on the probability value and a threshold value, determining whether to allocate additional communication resources to the first UE.
 10. A network node for performing admission control in a wireless communications network, which network node is configured to serve a first user equipment (UE) and one or more second UEs, the network node comprising: a receiver for receiving from the first UE an access request; and processing circuitry coupled to the receiver, the processing circuitry being configured to: after receiving the access request, admit the UE to the wireless communication network by allocating initial communication resources to the first UE to enable the first UE to transmit data and/or receive data from the network node; measure initial data traffic between the network node and the first UE, wherein the measured amount of the initial data traffic is not zero; estimate a first prediction of a requirement of further radio resource related to the access request based on the measured amount of the initial data traffic between the network node and the first UE; determine a first threshold related to the first prediction as a function of a measured data traffic load between the network node and the one or more second UEs; and perform admission control by deciding whether or not to admit additional radio resources to the first UE based on whether or not the first prediction exceeds the first threshold.
 11. The network node of claim 10, wherein the first threshold comprises a probability that the first prediction is above a first limit.
 12. The network node of claim 10, further being configured to: measure a data traffic load between the network node and the one or more second UEs.
 13. The network node of claim 10, further being configured to: after receiving a second access request from the first UE, allocate second communication resources to the first UE to enable the first UE to transmit data and/or receive data; after allocating the second communication resources, determine an amount of data traffic between the network node and the first UE; estimate a second prediction of a requirement of further radio resource related to the second access request based on the determined amount of data traffic; and perform admission control by deciding whether or not to admit additional radio resources to the first UE based on whether or not the second prediction exceeds the first threshold.
 14. The network node of claim 13, further being configured to: determine an intermediate time interval based on the measured data traffic load between the network node and the one or more second UEs.
 15. The network node of claim 10, wherein the network node further being configured to determine the first threshold by using a machine learning (ML) model to determine the first threshold.
 16. The network node of claim 10, further being configured to: grant the additional radio resources to the first UE; estimate a second prediction of a forthcoming usage of the additional radio resources, as a function of a measured data traffic load between the network node and the first UE; determine a second threshold related to the second prediction; and perform congestion control by deciding whether or not to initiate a removal of the additional radio resources granted to the first UE, based on whether or not the second prediction is below the second threshold.
 17. The network node of claim 10, wherein the network node is configured to determine whether to allocate the additional communication resources to the first UE by comparing the probability value to the threshold value. 