Session Packet Duplication Control

ABSTRACT

A wireless device receives configuration parameters from a base station. The configuration parameters are for a first session and a second session. The second session is for a packet duplication of the first session. The wireless device receives an activation indication of the packet duplication. Based on the activation indication of the packet duplication, the wireless device sends packets of the first session to a user plane function and a duplication of the packets to the user plane function via the second session.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims the benefit of U.S. Provisional Application No.62/730,206, filed Sep. 12, 2018, and U.S. Provisional Application No.62/733,843, filed Sep. 20, 2018, which are hereby incorporated byreference in their entirety.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS

Examples of several of the various embodiments of the present inventionare described herein with reference to the drawings.

FIG. 1 is a diagram of an example 5G system architecture as per anaspect of an embodiment of the present disclosure.

FIG. 2 is a diagram of an example 5G System architecture as per anaspect of an embodiment of the present disclosure.

FIG. 3 is a system diagram of an example wireless device and a networknode in a 5G system as per an aspect of an embodiment of the presentdisclosure.

FIG. 4 is a system diagram of an example wireless device as per anaspect of an embodiment of the present disclosure.

FIG. 5A and FIG. 5B depict two registration management state models inUE 100 and AMF 155 as per an aspect of embodiments of the presentdisclosure.

FIG. 6A and FIG. 6B depict two connection management state models in UE100 and AMF 155 as per an aspect of embodiments of the presentdisclosure.

FIG. 7 is diagram for classification and marking traffic as per anaspect of an embodiment of the present disclosure.

FIG. 8 is an example call flow as per an aspect of an embodiment of thepresent disclosure.

FIG. 9 is an example call flow as per an aspect of an embodiment of thepresent disclosure.

FIG. 10 is an example call flow as per an aspect of an embodiment of thepresent disclosure.

FIG. 11 is an example call flow as per an aspect of an embodiment of thepresent disclosure.

FIG. 12 is an example call flow as per an aspect of an embodiment of thepresent disclosure.

FIG. 13 is an example call flow as per an aspect of an embodiment of thepresent disclosure.

FIG. 14 is an example representing peer entities where duplication ofpackets and duplication elimination of packets may be handled for uplinkpackets and downlink packets as per an aspect of an embodiment of thepresent disclosure.

FIG. 15 illustrates an example of duplication of an original session asper an aspect of an embodiment of the present disclosure.

FIG. 16 illustrates an example of duplication of an original sessiondone at an application layer as per an aspect of an embodiment of thepresent disclosure.

FIG. 17 illustrates an example of network configuration where theduplicated packets may be transmitted via the same path as originalpackets as per an aspect of an embodiment of the present disclosure.

FIG. 18 illustrates an example of network configuration where theduplicated packets may be transmitted via different paths of a same UPFas original packets as per an aspect of an embodiment of the presentdisclosure.

FIG. 19 illustrates an example of network configuration where theduplicated packets may be transmitted via different paths usingdifferent UPFs for duplicated and original packets as per an aspect ofan embodiment of the present disclosure.

FIG. 20 illustrates an example of network configuration where theduplicated packets may be transmitted using dual connectivity mode ofthe wireless device via different paths of a same UPF as originalpackets as per an aspect of an embodiment of the present disclosure.

FIG. 21 illustrates an example of network configuration where theduplicated packets may be transmitted using dual connectivity mode (MCGbearer and split bearer) of the wireless device via different pathsusing different UPFs for duplicated and original packets as per anaspect of an embodiment of the present disclosure.

FIG. 22 illustrates an example of network configuration where theduplicated packets may be transmitted using dual connectivity mode (SCGbearer) of the wireless device via different paths using different UPFsfor duplicated and original packets as per an aspect of an embodiment ofthe present disclosure.

FIG. 23 illustrates an example call flow of the network configuration.

FIG. 24 illustrates an example call flow of the network configuration.

FIG. 25 illustrates an example call flow of the network configuration.

FIG. 26 illustrates an example call flow of the network configuration.

FIG. 27 illustrates an example flow chart where communication may besupported using an N2 protocol and RRC protocol as per an aspect of anembodiment of the present disclosure.

FIG. 28 illustrates an example flow chart where communication may besupported using the N2 protocol and an NAS protocol as per an aspect ofan embodiment of the present disclosure.

FIG. 29 illustrates an example flow chart where communication may besupported using the NAS protocol and the RRC protocol as per an aspectof an embodiment of the present disclosure.

FIG. 30 illustrates an example for a redundant user plane paths based ondual connectivity.

FIG. 31 illustrates an example for a multiple UEs used per device for auser plane redundancy.

FIG. 32 illustrates an example for supporting redundant datatransmission via single access node.

FIG. 33 illustrates an example for a use of forwarding tunnel betweensource and target UL CL during handover.

FIG. 34 illustrates an example for a replication framework.

FIG. 35 illustrates an example for supporting redundant datatransmission via single access node.

FIG. 36 illustrates an example where the packet duplication may besupported over an N3 interface and an N9 interface.

FIG. 37 is an example representing peer entities where duplication ofpackets and duplication elimination of packets may be handled for uplink(UL) packets and downlink (DL) packets as per an aspect of an embodimentof the present disclosure.

FIG. 38 illustrates an example of duplication of an original session byan access network as per an aspect of an embodiment of the presentdisclosure.

FIG. 39 illustrates an example of network configuration where theduplicated packets may be transmitted via the same path as originalpackets as per an aspect of an embodiment of the present disclosure.

FIG. 40 illustrates an example of network configuration where theduplicated packets may be transmitted via different paths of a same UPFas original packets as per an aspect of an embodiment of the presentdisclosure.

FIG. 41 illustrates an example of network configuration where theduplicated packets may be transmitted via different paths usingdifferent UPFs for duplicated and original packets as per an aspect ofan embodiment of the present disclosure.

FIG. 42 illustrates an example of network configuration where theduplicated packets may be transmitted using dual connectivity mode viadifferent paths of a same UPF as original packets as per an aspect of anembodiment of the present disclosure.

FIG. 43 illustrates an example of network configuration where theduplicated packets may be transmitted using dual connectivity mode (MCGbearer and split bearer) via different paths using different UPFs forduplicated and original packets as per an aspect of an embodiment of thepresent disclosure.

FIG. 44 illustrates an example of network configuration where theduplicated packets may be transmitted using dual connectivity mode (SCGbearer) via different paths using different UPFs for duplicated andoriginal packets as per an aspect of an embodiment of the presentdisclosure.

FIG. 45 illustrate call flows of different network configurations as peran aspect of an embodiment of the present disclosure.

FIG. 46 illustrate call flows of different network configurations as peran aspect of an embodiment of the present disclosure.

FIG. 47 illustrate call flows of different network configurations as peran aspect of an embodiment of the present disclosure.

FIG. 48 illustrate call flows of different network configurations as peran aspect of an embodiment of the present disclosure.

FIG. 49 illustrate call flows of different network configurations as peran aspect of an embodiment of the present disclosure.

FIG. 50 illustrates an example flow chart as per an aspect of anembodiment of the present disclosure.

FIG. 51 is a flow diagram of an aspect of an example embodiment of thepresent disclosure.

DETAILED DESCRIPTION OF EXAMPLES

Example embodiments of the present invention enable implementation ofenhanced features and functionalities in 5G systems. Embodiments of thetechnology disclosed herein may be employed in the technical field of 5Gsystems and network slicing for communication systems. Moreparticularly, the embodiments of the technology disclosed herein mayrelate to 5G core network and 5G systems for network slicing incommunication systems. Throughout the present disclosure, UE, wirelessdevice, and mobile device are used interchangeably.

The following acronyms are used throughout the present disclosure:

5G 5th generation mobile networks

5GC 5G Core Network

5GS 5G System

5G-AN 5G Access Network

5QI 5G QoS Indicator

ACK Acknowledgement

AF Application Function

AMF Access and Mobility Management Function

AN Access Network

CDR Charging Data Record

CCNF Common Control Network Functions

CIoT Cellular IoT

CN Core Network

CP Control Plane

DDN Downlink Data Notification

DL Downlink

DN Data Network

DNN Data Network Name

F-TEID Fully Qualified TEID

GPSI Generic Public Subscription Identifier

GTP GPRS Tunneling Protocol

GUTI Globally Unique Temporary Identifier

IMSI International Mobile Subscriber Identity

LADN Local Area Data Network

LI Lawful Intercept

MEI Mobile Equipment Identifier

MICO Mobile Initiated Connection Only

MME Mobility Management Entity

MO Mobile Originated

MSISDN Mobile Subscriber ISDN

MT Mobile Terminating

N3IWF Non-3GPP InterWorking Function

NAI Network Access Identifier

NAS Non-Access Stratum

NB-IoT Narrow Band IoT

NEF Network Exposure Function

NF Network Function

NGAP Next Generation Application Protocol

NR New Radio

NRF Network Repository Function

NSI Network Slice Instance

NSSAI Network Slice Selection Assistance Information

NSSF Network Slice Selection Function

OCS Online Charging System

OFCS Offline Charging System

PCF Policy Control Function

PDU Packet/Protocol Data Unit

PEI Permanent Equipment Identifier

PLMN Public Land Mobile Network

RAN Radio Access Network

QFI QoS Flow Identity

RM Registration Management

S1-AP Application Protocol

SBA Service Based Architecture

SEA Security Anchor Function

SCM Security Context Management

SMF Session Management Function

SMSF SMS Function

S-NSSAI Single Network Slice Selection Assistance information

SUCI Served User Correlation ID

SUPI Subscriber Permanent Identifier

TEID Tunnel Endpoint Identifier

UE User Equipment

UL Uplink

UL CL Uplink Classifier

UPF User Plane Function

Example FIG. 1 and FIG. 2 depict a 5G system comprising of accessnetworks and 5G core network. An example 5G access network may comprisean access network connecting to a 5G core network. An access network maycomprise an NG-RAN 105 and/or non-3GPP AN 165. An example 5G corenetwork may connect to one or more 5G access networks 5G-AN and/orNG-RANs. 5G core network may comprise functional elements or networkfunctions as in example FIG. 1 and example FIG. 2 where interfaces maybe employed for communication among the functional elements and/ornetwork elements.

In an example, a network function may be a processing function in anetwork, which may have a functional behavior and/or interfaces. Anetwork function may be implemented either as a network element on adedicated hardware, and/or a network node as depicted in FIG. 3 and FIG.4, or as a software instance running on a dedicated hardware and/orshared hardware, or as a virtualized function instantiated on anappropriate platform.

In an example, access and mobility management function, AMF 155, mayinclude the following functionalities (some of the AMF 155functionalities may be supported in a single instance of an AMF 155):termination of RAN 105 CP interface (N2), termination of NAS (N1), NASciphering and integrity protection, registration management, connectionmanagement, reachability management, mobility management, lawfulintercept (for AMF 155 events and interface to LI system), providetransport for session management, SM messages between UE 100 and SMF160, transparent proxy for routing SM messages, access authentication,access authorization, provide transport for SMS messages between UE 100and SMSF, security anchor function, SEA, interaction with the AUSF 150and the UE 100, receiving the intermediate key established as a resultof the UE 100 authentication process, security context management, SCM,that receives a key from the SEA that it uses to derive access networkspecific keys, and/or the like.

In an example, the AMF 155 may support non-3GPP access networks throughN2 interface with N3IWF 170, NAS signaling with a UE 100 over N3IWF 170,authentication of UEs connected over N3IWF 170, management of mobility,authentication, and separate security context state(s) of a UE 100connected via non-3GPP access 165 or connected via 3GPP access 105 andnon-3GPP access 165 simultaneously, support of a coordinated RM contextvalid over 3GPP access 105 and non 3GPP access 165, support of CMmanagement contexts for the UE 100 for connectivity over non-3GPPaccess, and/or the like.

In an example, an AMF 155 region may comprise one or multiple AMF 155sets. The AMF 155 set may comprise some AMF 155 that serve a given areaand/or network slice(s). In an example, multiple AMF 155 sets may be perAMF 155 region and/or network slice(s). Application identifier may be anidentifier that may be mapped to a specific application trafficdetection rule. Configured NSSAI may be an NSSAI that may be provisionedin a UE 100. DN 115 access identifier (DNAI), for a DNN, may be anidentifier of a user plane access to a DN 115. Initial registration maybe related to a UE 100 registration in RM-DEREGISTERED 500, 520 states.N2AP UE 100 association may be a logical per UE 100 association betweena 5G AN node and an AMF 155. N2AP UE-TNLA-binding may be a bindingbetween a N2AP UE 100 association and a specific transport networklayer, TNL association for a given UE 100.

In an example, session management function, SMF 160, may include one ormore of the following functionalities (one or more of the SMF 160functionalities may be supported in a single instance of a SMF 160):session management (e.g. session establishment, modify and release,including tunnel maintain between UPF 110 and AN 105 node), UE 100 IPaddress allocation & management (including optional authorization),selection and control of UP function(s), configuration of trafficsteering at UPF 110 to route traffic to proper destination, terminationof interfaces towards policy control functions, control part of policyenforcement and QoS. lawful intercept (for SM events and interface to LISystem), termination of SM parts of NAS messages, downlink datanotification, initiation of AN specific SM information, sent via AMF 155over N2 to (R)AN 105, determination of SSC mode of a session, roamingfunctionality, handling local enforcement to apply QoS SLAs (VPLMN),charging data collection and charging interface (VPLMN), lawfulintercept (in VPLMN for SM events and interface to LI System), supportfor interaction with external DN 115 for transport of signaling for PDUsession authorization/authentication by external DN 115, and/or thelike.

In an example, a user plane function, UPF 110, may include one or moreof the following functionalities (some of the UPF 110 functionalitiesmay be supported in a single instance of a UPF 110): anchor point forIntra-/Inter-RAT mobility (when applicable), external PDU session pointof interconnect to DN 115, packet routing & forwarding, packetinspection and user plane part of policy rule enforcement, lawfulintercept (UP collection), traffic usage reporting, uplink classifier tosupport routing traffic flows to a data network, branching point tosupport multi-homed PDU session(s), QoS handling for user plane, uplinktraffic verification (SDF to QoS flow mapping), transport level packetmarking in the uplink and downlink, downlink packet buffering, downlinkdata notification triggering, and/or the like.

In an example, the UE 100 IP address management may include allocationand release of the UE 100 IP address and/or renewal of the allocated IPaddress. The UE 100 may set a requested PDU type during a PDU sessionestablishment procedure based on its IP stack capabilities and/orconfiguration. In an example, the SMF 160 may select PDU type of a PDUsession. In an example, if the SMF 160 receives a request with PDU typeset to IP, the SMF 160 may select PDU type IPv4 or IPv6 based on DNNconfiguration and/or operator policies. In an example, the SMF 160 mayprovide a cause value to the UE 100 to indicate whether the other IPversion is supported on the DNN. In an example, if the SMF 160 receivesa request for PDU type IPv4 or IPv6 and the requested IP version issupported by the DNN the SMF 160 may select the requested PDU type.

In an example embodiment, the 5GC elements and UE 100 may support thefollowing mechanisms: during a PDU session establishment procedure, theSMF 160 may send the IP address to the UE 100 via SM NAS signaling. TheIPv4 address allocation and/or IPv4 parameter configuration via DHCPv4may be employed once PDU session may be established. IPv6 prefixallocation may be supported via IPv6 stateless autoconfiguration, ifIPv6 is supported. In an example, 5GC network elements may support IPv6parameter configuration via stateless DHCPv6.

The 5GC may support the allocation of a static IPv4 address and/or astatic IPv6 prefix based on subscription information in a UDM 140 and/orbased on the configuration on a per-subscriber, per-DNN basis.

User plane function(s) (UPF 110) may handle the user plane path of PDUsessions. A UPF 110 that provides the interface to a data network maysupport functionality of a PDU session anchor.

In an example, a policy control function, PCF 135, may support unifiedpolicy framework to govern network behavior, provide policy rules tocontrol plane function(s) to enforce policy rules, implement a front endto access subscription information relevant for policy decisions in auser data repository (UDR), and/or the like.

A network exposure function, NEF 125, may provide means to securelyexpose the services and capabilities provided by the 3GPP networkfunctions, translate between information exchanged with the AF 145 andinformation exchanged with the internal network functions, receiveinformation from other network functions, and/or the like.

In an example, an network repository function, NRF 130 may supportservice discovery function that may receive NF discovery request from NFinstance, provide information about the discovered NF instances (bediscovered) to the NF instance, and maintain information about availableNF instances and their supported services, and/or the like.

In an example, an NSSF 120 may select a set of network slice instancesserving the UE 100, may determine allowed NSSAI. In an example, the NSSF120 may determine the AMF 155 set to be employed to serve the UE 100,and/or, based on configuration, determine a list of candidate AMF 155(s)155 by querying the NRF 130.

In an example, stored data in a UDR may include at least usersubscription data, including at least subscription identifiers, securitycredentials, access and mobility related subscription data, sessionrelated subscription data, policy data, and/or the like.

In an example, an AUSF 150 may support authentication server function(AUSF 150).

In an example, an application function, AF 145, may interact with the3GPP core network to provide services. In an example, based on operatordeployment, application functions may be trusted by the operator tointeract directly with relevant network functions. Application functionsnot allowed by the operator to access directly the network functions mayuse an external exposure framework (e.g., via the NEF 125) to interactwith relevant network functions.

In an example, control plane interface between the (R)AN 105 and the 5Gcore may support connection of multiple different kinds of AN(s) (e.g.3GPP RAN 105, N3IWF 170 for Un-trusted access 165) to the 5GC via acontrol plane protocol. In an example, an N2 AP protocol may be employedfor both the 3GPP access 105 and non-3GPP access 165. In an example,control plane interface between the (R)AN 105 and the 5G core maysupport decoupling between AMF 155 and other functions such as SMF 160that may need to control the services supported by AN(s) (e.g. controlof the UP resources in the AN 105 for a PDU session).

In an example, the 5GC may provide policy information from the PCF 135to the UE 100. In an example, the policy information may comprise:access network discovery and selection policy, UE 100 route selectionpolicy (URSP), SSC mode selection policy (SSCMSP), network sliceselection policy (NSSP), DNN selection policy, non-seamless offloadpolicy, and/or the like.

In an example, as depicted in example FIG. 5A and FIG. 5B, theregistration management, RM may be employed to register or de-register aUE/user 100 with the network, and establish the user context in thenetwork. Connection management may be employed to establish and releasethe signaling connection between the UE 100 and the AMF 155.

In an example, a UE 100 may register with the network to receiveservices that require registration. In an example, the UE 100 may updateits registration with the network periodically in order to remainreachable (periodic registration update), or upon mobility (e.g.,mobility registration update), or to update its capabilities or tore-negotiate protocol parameters.

In an example, an initial registration procedure as depicted in exampleFIG. 8 and FIG. 9 may involve execution of network access controlfunctions (e.g. user authentication and access authorization based onsubscription profiles in UDM 140). Example FIG. 9 is a continuation ofthe initial registration procedure depicted in FIG. 8. As a result ofthe initial registration procedure, the identity of the serving AMF 155may be registered in a UDM 140.

In an example, the registration management, RM procedures may beapplicable over both 3GPP access 105 and non 3GPP access 165.

An example FIG. 5A may depict the RM states of a UE 100 as observed bythe UE 100 and AMF 155. In an example embodiment, two RM states may beemployed in the UE 100 and the AMF 155 that may reflect the registrationstatus of the UE 100 in the selected PLMN: RM-DEREGISTERED 500, andRM-REGISTERED 510. In an example, in the RM DEREGISTERED state 500, theUE 100 may not be registered with the network. The UE 100 context in theAMF 155 may not hold valid location or routing information for the UE100 so the UE 100 may not be reachable by the AMF 155. In an example,the UE 100 context may be stored in the UE 100 and the AMF 155. In anexample, in the RM REGISTERED state 510, the UE 100 may be registeredwith the network. In the RM-REGISTERED 510 state, the UE 100 may receiveservices that may require registration with the network.

In an example embodiment, two RM states may be employed in AMF 155 forthe UE 100 that may reflect the registration status of the UE 100 in theselected PLMN: RM-DEREGISTERED 520, and RM-REGISTERED 530.

As depicted in example FIG. 6A and FIG. 6B, connection management, CM,may comprise establishing and releasing a signaling connection between aUE 100 and an AMF 155 over N1 interface. The signaling connection may beemployed to enable NAS signaling exchange between the UE 100 and thecore network. The signaling connection between the UE 100 and the AMF155 may comprise both the AN signaling connection between the UE 100 andthe (R)AN 105 (e.g. RRC connection over 3GPP access) and the N2connection for the UE 100 between the AN and the AMF 155.

As depicted in example FIG. 6A and FIG. 6B, two CM states may beemployed for the NAS signaling connectivity of the UE 100 with the AMF155, CM-IDLE 600, 620 and CM-CONNECTED 610, 630. A UE 100 in CM-IDLE 600state may be in RM-REGISTERED 510 state and may have no NAS signalingconnection established with the AMF 155 over N1. The UE 100 may performcell selection, cell reselection, PLMN selection, and/or the like. A UE100 in CM-CONNECTED 610 state may have a NAS signaling connection withthe AMF 155 over N1.

In an example embodiment two CM states may be employed for the UE 100 atthe AMF 155, CM-IDLE 620 and CM-CONNECTED 630.

In an example, an RRC inactive state may apply to NG-RAN (e.g. it mayapply to NR and E-UTRA connected to 5G CN). The AMF 155, based onnetwork configuration, may provide assistance information to the NG RAN105, to assist the NG RAN's 105 decision whether the UE 100 may be sentto RRC inactive state. When a UE 100 is CM-CONNECTED 610 with RRCinactive state, the UE 100 may resume the RRC connection due to uplinkdata pending, mobile initiated signaling procedure, as a response to RAN105 paging, to notify the network that it has left the RAN 105notification area, and/or the like.

In an example, a NAS signaling connection management may includeestablishing and releasing a NAS signaling connection. A NAS signalingconnection establishment function may be provided by the UE 100 and theAMF 155 to establish the NAS signaling connection for the UE 100 inCM-IDLE 600 state. The procedure of releasing the NAS signalingconnection may be initiated by the 5G (R)AN 105 node or the AMF 155.

In an example, reachability management of a UE 100 may detect whetherthe UE 100 is reachable and may provide the UE 100 location (e.g. accessnode) to the network to reach the UE 100. Reachability management may bedone by paging the UE 100 and the UE 100 location tracking. The UE 100location tracking may include both UE 100 registration area tracking andUE 100 reachability tracking. The UE 100 and the AMF 155 may negotiateUE 100 reachability characteristics in CM-IDLE 600, 620 state duringregistration and registration update procedures.

In an example, two UE 100 reachability categories may be negotiatedbetween a UE 100 and an AMF 155 for CM-IDLE 600, 620 state. 1) UE 100reachability allowing mobile device terminated data while the UE 100 isCM-IDLE 600 mode. 2) Mobile initiated connection only (MICO) mode. The5GC may support a PDU connectivity service that provides exchange ofPDUs between the UE 100 and a data network identified by a DNN. The PDUconnectivity service may be supported via PDU sessions that areestablished upon request from the UE 100.

In an example, a PDU session may support one or more PDU session types.PDU sessions may be established (e.g. upon UE 100 request), modified(e.g. upon UE 100 and 5GC request) and/or released (e.g. upon UE 100 and5GC request) using NAS SM signaling exchanged over N1 between the UE 100and the SMF 160. Upon request from an application server, the 5GC may beable to trigger a specific application in the UE 100. When receiving thetrigger, the UE 100 may send it to the identified application in the UE100. The identified application in the UE 100 may establish a PDUsession to a specific DNN.

In an example, the 5G QoS model may support a QoS flow based frameworkas depicted in example FIG. 7. The 5G QoS model may support both QoSflows that require a guaranteed flow bit rate and QoS flows that may notrequire a guaranteed flow bit rate. In an example, the 5G QoS model maysupport reflective QoS. The QoS model may comprise flow mapping orpacket marking at the UPF 110 (CN_UP) 110, AN 105 and/or the UE 100. Inan example, packets may arrive from and/or destined to theapplication/service layer 730 of UE 100, UPF 110 (CN_UP) 110, and/or theAF 145.

In an example, the QoS flow may be a granularity of QoS differentiationin a PDU session. A QoS flow ID, QFI, may be employed to identify theQoS flow in the 5G system. In an example, user plane traffic with thesame QFI within a PDU session may receive the same traffic forwardingtreatment. The QFI may be carried in an encapsulation header on N3and/or N9 (e.g. without any changes to the end-to-end packet header). Inan example, the QFI may be applied to PDUs with different types ofpayload. The QFI may be unique within a PDU session.

In an example, the QoS parameters of a QoS flow may be provided to the(R)AN 105 as a QoS profile over N2 at PDU session establishment, QoSflow establishment, or when NG-RAN is used at every time the user planeis activated. In an example, a default QoS rule may be required forevery PDU session. The SMF 160 may allocate the QFI for a QoS flow andmay derive QoS parameters from the information provided by the PCF 135.In an example, the SMF 160 may provide the QFI together with the QoSprofile containing the QoS parameters of a QoS flow to the (R)AN 105.

In an example, 5G QoS flow may be a granularity for QoS forwardingtreatment in the 5G system. Traffic mapped to the same 5G QoS flow mayreceive the same forwarding treatment (e.g. scheduling policy, queuemanagement policy, rate shaping policy, RLC configuration, and/or thelike). In an example, providing different QoS forwarding treatment mayrequire separate 5G QoS flows.

In an example, a 5G QoS indicator may be a scalar that may be employedas a reference to a specific QoS forwarding behavior (e.g. packet lossrate, packet delay budget) to be provided to a 5G QoS flow. In anexample, the 5G QoS indicator may be implemented in the access networkby the 5QI referencing node specific parameters that may control the QoSforwarding treatment (e.g. scheduling weights, admission thresholds,queue management thresholds, link layer protocol configuration, and/orthe like.).

In an example, 5GC may support edge computing and may enable operator(s)and 3rd party services to be hosted close to the UE's access point ofattachment. The 5G core network may select a UPF 110 close to the UE 100and may execute the traffic steering from the UPF 110 to the local datanetwork via a N6 interface. In an example, the selection and trafficsteering may be based on the UE's 100 subscription data, UE 100location, the information from application function AF 145, policy,other related traffic rules, and/or the like. In an example, the 5G corenetwork may expose network information and capabilities to an edgecomputing application function. The functionality support for edgecomputing may include local routing where the 5G core network may selecta UPF 110 to route the user traffic to the local data network, trafficsteering where the 5G core network may select the traffic to be routedto the applications in the local data network, session and servicecontinuity to enable UE 100 and application mobility, user planeselection and reselection, e.g. based on input from applicationfunction, network capability exposure where 5G core network andapplication function may provide information to each other via NEf 125,QoS and charging where PCF 135 may provide rules for QoS control andcharging for the traffic routed to the local data network, support oflocal area data network where 5G core network may provide support toconnect to the LADN in a certain area where the applications aredeployed, and/or the like.

An example 5G system may be a 3GPP system comprising of 5G accessnetwork 105, 5G core network and a UE 100, and/or the like. AllowedNSSAI may be an NSSAI provided by a serving PLMN during e.g. aregistration procedure, indicating the NSSAI allowed by the network forthe UE 100 in the serving PLMN for the current registration area.

In an example, a PDU connectivity service may provide exchange of PDUsbetween a UE 100 and a data network. A PDU session may be an associationbetween the UE 100 and the data network, DN 115, that may provide thePDU connectivity service. The type of association may be IP, Ethernetand/or unstructured.

Establishment of user plane connectivity to a data network via networkslice instance(s) may comprise the following: performing a RM procedureto select an AMF 155 that supports the required network slices, andestablishing one or more PDU session(s) to the required data network viathe network slice instance(s).

In an example, the set of network slices for a UE 100 may be changed atany time while the UE 100 may be registered with the network, and may beinitiated by the network, or the UE 100.

In an example, a periodic registration update may be UE 100re-registration at expiry of a periodic registration timer. A requestedNSSAI may be a NSSAI that the UE 100 may provide to the network.

In an example, a service based interface may represent how a set ofservices may be provided/exposed by a given NF.

In an example, a service continuity may be an uninterrupted userexperience of a service, including the cases where the IP address and/oranchoring point may change. In an example, a session continuity mayrefer to continuity of a PDU session. For PDU session of IP type sessioncontinuity may imply that the IP address is preserved for the lifetimeof the PDU session. An uplink classifier may be a UPF 110 functionalitythat aims at diverting uplink traffic, based on filter rules provided bythe SMF 160, towards data network, DN 115.

In an example, the 5G system architecture may support data connectivityand services enabling deployments to use techniques such as e.g. networkfunction virtualization and/or software defined networking. The 5Gsystem architecture may leverage service-based interactions betweencontrol plane (CP) network functions where identified. In 5G systemarchitecture, separation of the user plane (UP) functions from thecontrol plane functions may be considered. A 5G system may enable anetwork function to interact with other NF(s) directly if required.

In an example, the 5G system may reduce dependencies between the accessnetwork (AN) and the core network (CN). The architecture may comprise aconverged access-agnostic core network with a common AN-CN interfacewhich may integrate different 3GPP and non-3GPP access types.

In an example, the 5G system may support a unified authenticationframework, stateless NFs, where the compute resource is decoupled fromthe storage resource, capability exposure, and concurrent access tolocal and centralized services. To support low latency services andaccess to local data networks, UP functions may be deployed close to theaccess network.

In an example, the 5G system may support roaming with home routedtraffic and/or local breakout traffic in the visited PLMN. An example 5Garchitecture may be service-based and the interaction between networkfunctions may be represented in two ways. (1) As service-basedrepresentation (depicted in example FIG. 1), where network functionswithin the control plane, may enable other authorized network functionsto access their services. This representation may also includepoint-to-point reference points where necessary. (2) Reference pointrepresentation, showing the interaction between the NF services in thenetwork functions described by point-to-point reference point (e.g. N11)between any two network functions.

In an example, a network slice may comprise the core network controlplane and user plane network functions, the 5G Radio Access Network; theN3IWF functions to the non-3GPP Access Network, and/or the like. Networkslices may differ for supported features and network functionimplementation. The operator may deploy multiple network slice instancesdelivering the same features but for different groups of UEs, e.g. asthey deliver a different committed service and/or because they may bededicated to a customer. The NSSF 120 may store the mapping informationbetween slice instance ID and NF ID (or NF address).

In an example, a UE 100 may simultaneously be served by one or morenetwork slice instances via a 5G-AN. In an example, the UE 100 may beserved by k network slices (e.g. k=8, 16, etc.) at a time. An AMF 155instance serving the UE 100 logically may belong to a network sliceinstance serving the UE 100.

In an example, a PDU session may belong to one specific network sliceinstance per PLMN. In an example, different network slice instances maynot share a PDU session. Different slices may have slice-specific PDUsessions using the same DNN.

An S-NSSAI (Single Network Slice Selection Assistance information) mayidentify a network slice. An S-NSSAI may comprise a slice/service type(SST), which may refer to the expected network slice behavior in termsof features and services; and/or a slice differentiator (SD). A slicedifferentiator may be optional information that may complement theslice/service type(s) to allow further differentiation for selecting anetwork slice instance from potentially multiple network slice instancesthat comply with the indicated slice/service type. In an example, thesame network slice instance may be selected employing differentS-NSSAIs. The CN part of a network slice instance(s) serving a UE 100may be selected by CN.

In an example, subscription data may include the S-NSSAI(s) of thenetwork slices that the UE 100 subscribes to. One or more S-NSSAIs maybe marked as default S-NSSAI. In an example, k S-NSSAI may be markeddefault S-NSSAI (e.g. k=8, 16, etc.). In an example, the UE 100 maysubscribe to more than 8 S-NSSAIs.

In an example, a UE 100 may be configured by the HPLMN with a configuredNSSAI per PLMN. Upon successful completion of a UE's registrationprocedure, the UE 100 may obtain from the AMF 155 an Allowed NSSAI forthis PLMN, which may include one or more S-NSSAIs.

In an example, the Allowed NSSAI may take precedence over the configuredNSSAI for a PLMN. The UE 100 may use the S-NSSAIs in the allowed NSSAIcorresponding to a network slice for the subsequent network sliceselection related procedures in the serving PLMN.

In an example, the establishment of user plane connectivity to a datanetwork via a network slice instance(s) may comprise: performing a RMprocedure to select an AMF 155 that may support the required networkslices, establishing one or more PDU sessions to the required datanetwork via the network slice instance(s), and/or the like.

In an example, when a UE 100 registers with a PLMN, if the UE 100 forthe PLMN has a configured NSSAI or an allowed NSSAI, the UE 100 mayprovide to the network in RRC and NAS layer a requested NSSAI comprisingthe S-NSSAI(s) corresponding to the slice(s) to which the UE 100attempts to register, a temporary user ID if one was assigned to the UE,and/or the like. The requested NSSAI may be configured-NSSAI,allowed-NSSAI, and/or the like.

In an example, when a UE 100 registers with a PLMN, if for the PLMN theUE 100 has no configured NSSAI or allowed NSSAI, the RAN 105 may routeNAS signaling from/to the UE 100 to/from a default AMF 155.

In an example, the network, based on local policies, subscriptionchanges and/or UE 100 mobility, may change the set of permitted networkslice(s) to which the UE 100 is registered. In an example, the networkmay perform the change during a registration procedure or trigger anotification towards the UE 100 of the change of the supported networkslices using an RM procedure (which may trigger a registrationprocedure). The network may provide the UE 100 with a new allowed NSSAIand tracking area list.

In an example, during a registration procedure in a PLMN, in case thenetwork decides that the UE 100 should be served by a different AMF 155based on network slice(s) aspects, the AMF 155 that first received theregistration request may redirect the registration request to anotherAMF 155 via the RAN 105 or via direct signaling between the initial AMF155 and the target AMF 155.

In an example, the network operator may provision the UE 100 withnetwork slice selection policy (NSSP). The NSSP may comprise one or moreNSSP rules.

In an example, if a UE 100 has one or more PDU sessions establishedcorresponding to a specific S-NSSAI, the UE 100 may route the user dataof the application in one of the PDU sessions, unless other conditionsin the UE 100 may prohibit the use of the PDU sessions. If theapplication provides a DNN, then the UE 100 may consider the DNN todetermine which PDU session to use. In an example, if the UE 100 doesnot have a PDU session established with the specific S-NSSAI, the UE 100may request a new PDU session corresponding to the S-NSSAI and with theDNN that may be provided by the application. In an example, in order forthe RAN 105 to select a proper resource for supporting network slicingin the RAN 105, the RAN 105 may be aware of the network slices used bythe UE 100.

In an example, an AMF 155 may select an SMF 160 in a network sliceinstance based on S-NSSAI, DNN and/or other information e.g. UE 100subscription and local operator policies, and/or the like, when the UE100 triggers the establishment of a PDU session. The selected SMF 160may establish the PDU session based on S-NSSAI and DNN.

In an example, in order to support network-controlled privacy of sliceinformation for the slices the UE 100 may access, when the UE 100 isaware or configured that privacy considerations may apply to NSSAI, theUE 100 may not include NSSAI in NAS signaling unless the UE 100 has aNAS security context and the UE 100 may not include NSSAI in unprotectedRRC signaling.

In an example, for roaming scenarios, the network slice specific networkfunctions in VPLMN and HPLMN may be selected based on the S-NSSAIprovided by the UE 100 during PDU connection establishment. If astandardized S-NSSAI is used, selection of slice specific NF instancesmay be done by each PLMN based on the provided S-NSSAI. In an example,the VPLMN may map the S-NSSAI of HPLMN to a S-NSSAI of VPLMN based onroaming agreement (e.g., including mapping to a default S-NSSAI ofVPLMN). In an example, the selection of slice specific NF instance inVPLMN may be done based on the S-NSSAI of VPLMN. In an example, theselection of any slice specific NF instance in HPLMN may be based on theS-NSSAI of HPLMN.

As depicted in example FIG. 8 and FIG. 9, a registration procedure maybe performed by the UE 100 to get authorized to receive services, toenable mobility tracking, to enable reachability, and/or the like.

In an example, the UE 100 may send to the (R)AN 105 an AN message 805(comprising AN parameters, RM-NAS registration request (registrationtype, SUCI or SUPI or 5G-GUTI, last visited TAI (if available), securityparameters, requested NSSAI, mapping of requested NSSAI, UE 100 5GCcapability, PDU session status, PDU session(s) to be re-activated,Follow on request, MICO mode preference, and/or the like), and/or thelike). In an example, in case of NG-RAN, the AN parameters may includee.g. SUCI or SUPI or the 5G-GUTI, the Selected PLMN ID and requestedNSSAI, and/or the like. In an example, the AN parameters may compriseestablishment cause. The establishment cause may provide the reason forrequesting the establishment of an RRC connection. In an example, theregistration type may indicate if the UE 100 wants to perform an initialregistration (i.e. the UE 100 is in RM-DEREGISTERED state), a mobilityregistration update (e.g., the UE 100 is in RM-REGISTERED state andinitiates a registration procedure due to mobility), a periodicregistration update (e.g., the UE 100 is in RM-REGISTERED state and mayinitiate a registration procedure due to the periodic registrationupdate timer expiry) or an emergency registration (e.g., the UE 100 isin limited service state). In an example, if the UE 100 performing aninitial registration (i.e., the UE 100 is in RM-DEREGISTERED state) to aPLMN for which the UE 100 does not already have a 5G-GUTI, the UE 100may include its SUCI or SUPI in the registration request. The SUCI maybe included if the home network has provisioned the public key toprotect SUPI in the UE. If the UE 100 received a UE 100 configurationupdate command indicating that the UE 100 needs to re-register and the5G-GUTI is invalid, the UE 100 may perform an initial registration andmay include the SUPI in the registration request message. For anemergency registration, the SUPI may be included if the UE 100 does nothave a valid 5G-GUTI available; the PEI may be included when the UE 100has no SUPI and no valid 5G-GUTI. In other cases, the 5G-GUTI may beincluded and it may indicate the last serving AMF 155. If the UE 100 isalready registered via a non-3GPP access in a PLMN different from thenew PLMN (e.g., not the registered PLMN or an equivalent PLMN of theregistered PLMN) of the 3GPP access, the UE 100 may not provide over the3GPP access the 5G-GUTI allocated by the AMF 155 during the registrationprocedure over the non-3GPP access. If the UE 100 is already registeredvia a 3GPP access in a PLMN (e.g., the registered PLMN), different fromthe new PLMN (i.e. not the registered PLMN or an equivalent PLMN of theregistered PLMN) of the non-3GPP access, the UE 100 may not provide overthe non-3GPP access the 5G-GUTI allocated by the AMF 155 during theregistration procedure over the 3GPP access. The UE 100 may provide theUE's usage setting based on its configuration. In case of initialregistration or mobility registration update, the UE 100 may include themapping of requested NSSAI, which may be the mapping of each S-NSSAI ofthe requested NSSAI to the S-NSSAIs of the configured NSSAI for theHPLMN, to ensure that the network is able to verify whether theS-NSSAI(s) in the requested NSSAI are permitted based on the subscribedS-NSSAIs. If available, the last visited TAI may be included in order tohelp the AMF 155 produce registration area for the UE. In an example,the security parameters may be used for authentication and integrityprotection. requested NSSAI may indicate the network slice selectionassistance information. The PDU session status may indicates thepreviously established PDU sessions in the UE. When the UE 100 isconnected to the two AMF 155 belonging to different PLMN via 3GPP accessand non-3GPP access then the PDU session status may indicate theestablished PDU session of the current PLMN in the UE. The PDUsession(s) to be re-activated may be included to indicate the PDUsession(s) for which the UE 100 may intend to activate UP connections. APDU session corresponding to a LADN may not be included in the PDUsession(s) to be re-activated when the UE 100 is outside the area ofavailability of the LADN. The follow on request may be included when theUE 100 may have pending uplink signaling and the UE 100 may not includePDU session(s) to be re-activated, or the registration type may indicatethe UE 100 may want to perform an emergency registration.

In an example, if a SUPI is included or the 5G-GUTI does not indicate avalid AMF 155, the (R)AN 105, based on (R)AT and requested NSSAI, ifavailable, may selects 808 an AMF 155. If UE 100 is in CM-CONNECTEDstate, the (R)AN 105 may forward the registration request message to theAMF 155 based on the N2 connection of the UE. If the (R)AN 105 may notselect an appropriate AMF 155, it may forward the registration requestto an AMF 155 which has been configured, in (R)AN 105, to perform AMF155 selection 808.

In an example, the (R)AN 105 may send to the new AMF 155 an N2 message810 (comprising: N2 parameters, RM-NAS registration request(registration type, SUPI or 5G-GUTI, last visited TAI (if available),security parameters, requested NSSAI, mapping of requested NSSAI, UE 1005GC capability, PDU session status, PDU session(s) to be re-activated,follow on request, and MICO mode preference), and/or the like). In anexample, when NG-RAN is used, the N2 parameters may comprise theselected PLMN ID, location information, cell identity and the RAT typerelated to the cell in which the UE 100 is camping. In an example, whenNG-RAN is used, the N2 parameters may include the establishment cause.

In an example, the new AMF 155 may send to the old AMF 155 anNamf_Communication_UEContextTransfer (complete registration request)815. In an example, if the UE's 5G-GUTI was included in the registrationrequest and the serving AMF 155 has changed since last registrationprocedure, the new AMF 155 may invoke theNamf_Communication_UEContextTransfer service operation 815 on the oldAMF 155 including the complete registration request IE, which may beintegrity protected, to request the UE's SUPI and MM Context. The oldAMF 155 may use the integrity protected complete registration request IEto verify if the context transfer service operation invocationcorresponds to the UE 100 requested. In an example, the old AMF 155 maytransfer the event subscriptions information by each NF consumer, forthe UE, to the new AMF 155. In an example, if the UE 100 identifiesitself with PEI, the SUPI request may be skipped.

In an example, the old AMF 155 may send to new AMF 155 a response 815 toNamf_Communication_UEContextTransfer (SUPI, MM context, SMF 160information, PCF ID). In an example, the old AMF 155 may respond to thenew AMF 155 for the Namf_Communication_UEContextTransfer invocation byincluding the UE's SUPI and MM context. In an example, if old AMF 155holds information about established PDU sessions, the old AMF 155 mayinclude SMF 160 information including S-NSSAI(s), SMF 160 identities andPDU session ID. In an example, if old AMF 155 holds information aboutactive NGAP UE-TNLA bindings to N3IWF, the old AMF 155 may includeinformation about the NGAP UE-TNLA bindings.

In an example, if the SUPI is not provided by the UE 100 nor retrievedfrom the old AMF 155 the identity request procedure 820 may be initiatedby the AMF 155 sending an identity request message to the UE 100requesting the SUCI.

In an example, the UE 100 may respond with an identity response message820 including the SUCI. The UE 100 may derive the SUCI by using theprovisioned public key of the HPLMN.

In an example, the AMF 155 may decide to initiate UE 100 authentication825 by invoking an AUSF 150. The AMF 155 may select an AUSF 150 based onSUPI or SUCI. In an example, if the AMF 155 is configured to supportemergency registration for unauthenticated SUPIs and the UE 100indicated registration type emergency registration the AMF 155 may skipthe authentication and security setup or the AMF 155 may accept that theauthentication may fail and may continue the registration procedure.

In an example, the authentication 830 may be performed byNudm_UEAuthenticate_Get operation. The AUSF 150 may discover a UDM 140.In case the AMF 155 provided a SUCI to AUSF 150, the AUSF 150 may returnthe SUPI to AMF 155 after the authentication is successful. In anexample, if network slicing is used, the AMF 155 may decide if theregistration request needs to be rerouted where the initial AMF 155refers to the AMF 155. In an example, the AMF 155 may initiate NASsecurity functions. In an example, upon completion of NAS securityfunction setup, the AMF 155 may initiate NGAP procedure to enable 5G-ANuse it for securing procedures with the UE. In an example, the 5G-AN maystore the security context and may acknowledge to the AMF 155. The 5G-ANmay use the security context to protect the messages exchanged with theUE.

In an example, new AMF 155 may send to the old AMF 155Namf_Communication_RegistrationCompleteNotify 835. If the AMF 155 haschanged, the new AMF 155 may notify the old AMF 155 that theregistration of the UE 100 in the new AMF 155 may be completed byinvoking the Namf_Communication_RegistrationCompleteNotify serviceoperation. If the authentication/security procedure fails, then theregistration may be rejected, and the new AMF 155 may invoke theNamf_Communication_RegistrationCompleteNotify service operation with areject indication reason code towards the old AMF 155. The old AMF 155may continue as if the UE 100 context transfer service operation wasnever received. If one or more of the S-NSSAIs used in the oldregistration area may not be served in the target registration area, thenew AMF 155 may determine which PDU session may not be supported in thenew registration area. The new AMF 155 may invoke theNamf_Communication_RegistrationCompleteNotify service operationincluding the rejected PDU session ID and a reject cause (e.g. theS-NSSAI becomes no longer available) towards the old AMF 155. The newAMF 155 may modify the PDU session status correspondingly. The old AMF155 may inform the corresponding SMF 160(s) to locally release the UE'sSM context by invoking the Nsmf_PDUSession_ReleaseSMContext serviceoperation.

In an example, the new AMF 155 may send to the UE 100 an identityrequest/response 840 (e.g., PEI). If the PEI was not provided by the UE100 nor retrieved from the old AMF 155, the identity request proceduremay be initiated by AMF 155 sending an identity request message to theUE 100 to retrieve the PEI. The PEI may be transferred encrypted unlessthe UE 100 performs emergency registration and may not be authenticated.For an emergency registration, the UE 100 may have included the PEI inthe registration request.

In an example, the new AMF 155 may initiate ME identity check 845 byinvoking the N5g-eir_EquipmentIdentityCheck_Get service operation 845.

In an example, the new AMF 155, based on the SUPI, may select 905 a UDM140. The UDM 140 may select a UDR instance. In an example, the AMF 155may selects a UDM 140.

In an example, if the AMF 155 has changed since the last registrationprocedure, or if the UE 100 provides a SUPI which may not refer to avalid context in the AMF 155, or if the UE 100 registers to the same AMF155 it has already registered to a non-3GPP access (e.g., the UE 100 isregistered over a non-3GPP access and may initiate the registrationprocedure to add a 3GPP access), the new AMF 155 may register with theUDM 140 using Nudm_UECM_Registration 910 and may subscribe to benotified when the UDM 140 may deregister the AMF 155. The UDM 140 maystore the AMF 155 identity associated to the access type and may notremove the AMF 155 identity associated to the other access type. The UDM140 may store information provided at registration in UDR, byNudr_UDM_Update. In an example, the AMF 155 may retrieve the access andmobility subscription data and SMF 160 selection subscription data usingNudm_SDM_Get 915. The UDM 140 may retrieve this information from UDR byNudr_UDM_Query (access and mobility subscription data). After asuccessful response is received, the AMF 155 may subscribe to benotified using Nudm_SDM_Subscribe 920 when the data requested may bemodified. The UDM 140 may subscribe to UDR by Nudr_UDM_Subscribe. TheGPSI may be provided to the AMF 155 in the subscription data from theUDM 140 if the GPSI is available in the UE 100 subscription data. In anexample, the new AMF 155 may provide the access type it serves for theUE 100 to the UDM 140 and the access type may be set to 3GPP access. TheUDM 140 may store the associated access type together with the servingAMF 155 in UDR by Nudr_UDM_Update. The new AMF 155 may create an MMcontext for the UE 100 after getting the mobility subscription data fromthe UDM 140. In an example, when the UDM 140 stores the associatedaccess type together with the serving AMF 155, the UDM 140 may initiatea Nudm_UECM_DeregistrationNotification 921 to the old AMF 155corresponding to 3GPP access. The old AMF 155 may remove the MM contextof the UE. If the serving NF removal reason indicated by the UDM 140 isinitial registration, then the old AMF 155 may invoke theNamf_EventExposure_Notify service operation towards all the associatedSMF 160 s of the UE 100 to notify that the UE 100 is deregistered fromold AMF 155. The SMF 160 may release the PDU session(s) on getting thisnotification. In an example, the old AMF 155 may unsubscribe with theUDM 140 for subscription data using Nudm_SDM_unsubscribe 922.

In an example, if the AMF 155 decides to initiate PCF 135 communication,e.g. the AMF 155 has not yet obtained access and mobility policy for theUE 100 or if the access and mobility policy in the AMF 155 are no longervalid, the AMF 155 may select 925 a PCF 135. If the new AMF 155 receivesa PCF ID from the old AMF 155 and successfully contacts the PCF 135identified by the PCF ID, the AMF 155 may select the (V-)PCF identifiedby the PCF ID. If the PCF 135 identified by the PCF ID may not be used(e.g. no response from the PCF 135) or if there is no PCF ID receivedfrom the old AMF 155, the AMF 155 may select 925 a PCF 135.

In an example, the new AMF 155 may perform a policy associationestablishment 930 during registration procedure. If the new AMF 155contacts the PCF 135 identified by the (V-)PCF ID received duringinter-AMF 155 mobility, the new AMF 155 may include the PCF-ID in theNpcf_AMPolicyControl Get operation. If the AMF 155 notifies the mobilityrestrictions (e.g. UE 100 location) to the PCF 135 for adjustment, or ifthe PCF 135 updates the mobility restrictions itself due to someconditions (e.g. application in use, time and date), the PCF 135 mayprovide the updated mobility restrictions to the AMF 155.

In an example, the PCF 135 may invoke Namf_EventExposure_Subscribeservice operation 935 for UE 100 event subscription.

In an example, the AMF 155 may send to the SMF 160 anNsmf_PDUSession_UpdateSMContext 936. In an example, the AMF 155 mayinvoke the Nsmf_PDUSession_UpdateSMContext if the PDU session(s) to bere-activated is included in the registration request. The AMF 155 maysend Nsmf_PDUSession_UpdateSMContext request to SMF 160(s) associatedwith the PDU session(s) to activate user plane connections of the PDUsession(s). The SMF 160 may decide to trigger e.g. the intermediate UPF110 insertion, removal or change of PSA. In the case that theintermediate UPF 110 insertion, removal, or relocation is performed forthe PDU session(s) not included in PDU session(s) to be re-activated,the procedure may be performed without N11 and N2 interactions to updatethe N3 user plane between (R)AN 105 and 5GC. The AMF 155 may invoke theNsmf_PDUSession_ReleaseSMContext service operation towards the SMF 160if any PDU session status indicates that it is released at the UE 100.The AMF 155 may invoke the Nsmf_PDUSession_ReleaseSMContext serviceoperation towards the SMF 160 in order to release any network resourcesrelated to the PDU session.

In an example, the new AMF 155155 may send to a N3IWF an N2 AMF 155mobility request 940. If the AMF 155 has changed, the new AMF 155 maycreate an NGAP UE 100 association towards the N3IWF to which the UE 100is connected. In an example, the N3IWF may respond to the new AMF 155with an N2 AMF 155 mobility response 940.

In an example, the new AMF 155 may send to the UE 100 a registrationaccept 955 (comprising: 5G-GUTI, registration area, mobilityrestrictions, PDU session status, allowed NSSAI, [mapping of allowedNSSAI], periodic registration update timer, LADN information andaccepted MICO mode, IMS voice over PS session supported indication,emergency service support indicator, and/or the like). In an example,the AMF 155 may send the registration accept message to the UE 100indicating that the registration request has been accepted. 5G-GUTI maybe included if the AMF 155 allocates a new 5G-GUTI. If the AMF 155allocates a new registration area, it may send the registration area tothe UE 100 via registration accept message 955. If there is noregistration area included in the registration accept message, the UE100 may consider the old registration area as valid. In an example,mobility restrictions may be included in case mobility restrictions mayapply for the UE 100 and registration type may not be emergencyregistration. The AMF 155 may indicate the established PDU sessions tothe UE 100 in the PDU session status. The UE 100 may remove locally anyinternal resources related to PDU sessions that are not marked asestablished in the received PDU session status. In an example, when theUE 100 is connected to the two AMF 155 belonging to different PLMN via3GPP access and non-3GPP access then the UE 100 may remove locally anyinternal resources related to the PDU session of the current PLMN thatare not marked as established in received PDU session status. If the PDUsession status information was in the registration request, the AMF 155may indicate the PDU session status to the UE. The mapping of allowedNSSAI may be the mapping of each S-NSSAI of the allowed NSSAI to theS-NSSAIs of the configured NSSAI for the HPLMN. The AMF 155 may includein the registration accept message 955 the LADN information for LADNsthat are available within the registration area determined by the AMF155 for the UE. If the UE 100 included MICO mode in the request, thenAMF 155 may respond whether MICO mode may be used. The AMF 155 may setthe IMS voice over PS session supported Indication. In an example, inorder to set the IMS voice over PS session supported indication, the AMF155 may perform a UE/RAN radio information and compatibility requestprocedure to check the compatibility of the UE 100 and RAN radiocapabilities related to IMS voice over PS. In an example, the emergencyservice support indicator may inform the UE 100 that emergency servicesare supported, e.g., the UE 100 may request PDU session for emergencyservices. In an example, the handover restriction list and UE-AMBR maybe provided to NG-RAN by the AMF 155.

In an example, the UE 100 may send to the new AMF 155 a registrationcomplete 960 message. In an example, the UE 100 may send theregistration complete message 960 to the AMF 155 to acknowledge that anew 5G-GUTI may be assigned. In an example, when information about thePDU session(s) to be re-activated is not included in the registrationrequest, the AMF 155 may release the signaling connection with the UE100. In an example, when the follow-on request is included in theregistration request, the AMF 155 may not release the signalingconnection after the completion of the registration procedure. In anexample, if the AMF 155 is aware that some signaling is pending in theAMF 155 or between the UE 100 and the 5GC, the AMF 155 may not releasethe signaling connection after the completion of the registrationprocedure.

As depicted in example FIG. 10 and FIG. 11, a service request proceduree.g., a UE 100 triggered service request procedure may be used by a UE100 in CM-IDLE state to request the establishment of a secure connectionto an AMF 155. FIG. 11 is continuation of FIG. 10 depicting the servicerequest procedure. The service request procedure may be used to activatea user plane connection for an established PDU session. The servicerequest procedure may be triggered by the UE 100 or the 5GC, and may beused when the UE 100 is in CM-IDLE and/or in CM-CONNECTED and may allowselectively to activate user plane connections for some of theestablished PDU sessions.

In an example, a UE 100 in CM IDLE state may initiate the servicerequest procedure to send uplink signaling messages, user data, and/orthe like, as a response to a network paging request, and/or the like. Inan example, after receiving the service request message, the AMF 155 mayperform authentication. In an example, after the establishment ofsignaling connection to the AMF 155, the UE 100 or network may sendsignaling messages, e.g. PDU session establishment from the UE 100 to aSMF 160, via the AMF 155.

In an example, for any service request, the AMF 155 may respond with aservice accept message to synchronize PDU session status between the UE100 and network. The AMF 155 may respond with a service reject messageto the UE 100, if the service request may not be accepted by thenetwork. The service reject message may include an indication or causecode requesting the UE 100 to perform a registration update procedure.In an example, for service request due to user data, network may takefurther actions if user plane connection activation may not besuccessful. In an example FIG. 10 and FIG. 11, more than one UPF, e.g.,old UPF 110-2 and PDU session Anchor PSA UPF 110-3 may be involved.

In an example, the UE 100 may send to a (R)AN 105 an AN messagecomprising AN parameters, mobility management, MM NAS service request1005 (e.g., list of PDU sessions to be activated, list of allowed PDUsessions, security parameters, PDU session status, and/or the like),and/or the like. In an example, the UE 100 may provide the list of PDUsessions to be activated when the UE 100 may re-activate the PDUsession(s). The list of allowed PDU sessions may be provided by the UE100 when the service request may be a response of a paging or a NASnotification, and may identify the PDU sessions that may be transferredor associated to the access on which the service request may be sent. Inan example, for the case of NG-RAN, the AN parameters may includeselected PLMN ID, and an establishment cause. The establishment causemay provide the reason for requesting the establishment of an RRCconnection. The UE 100 may send NAS service request message towards theAMF 155 encapsulated in an RRC message to the RAN 105.

In an example, if the service request may be triggered for user data,the UE 100 may identify, using the list of PDU sessions to be activated,the PDU session(s) for which the UP connections are to be activated inthe NAS service request message. If the service request may be triggeredfor signaling, the UE 100 may not identify any PDU session(s). If thisprocedure may be triggered for paging response, and/or the UE 100 mayhave at the same time user data to be transferred, the UE 100 mayidentify the PDU session(s) whose UP connections may be activated in MMNAS service request message, by the list of PDU sessions to beactivated.

In an example, if the service request over 3GPP access may be triggeredin response to a paging indicating non-3GPP access, the NAS servicerequest message may identify in the list of allowed PDU sessions thelist of PDU sessions associated with the non-3GPP access that may bere-activated over 3GPP. In an example, the PDU session status mayindicate the PDU sessions available in the UE 100. In an example, the UE100 may not trigger the service request procedure for a PDU sessioncorresponding to a LADN when the UE 100 may be outside the area ofavailability of the LADN. The UE 100 may not identify such PDUsession(s) in the list of PDU sessions to be activated, if the servicerequest may be triggered for other reasons.

In an example, the (R)AN 105 may send to AMF 155 an N2 Message 1010(e.g., a service request) comprising N2 parameters, MM NAS servicerequest, and/or the like. The AMF 155 may reject the N2 message if itmay not be able to handle the service request. In an example, if NG-RANmay be used, the N2 parameters may include the 5G-GUTI, selected PLMNID, location information, RAT type, establishment cause, and/or thelike. In an example, the 5G-GUTI may be obtained in RRC procedure andthe (R)AN 105 may select the AMF 155 according to the 5G-GUTI. In anexample, the location information and RAT type may relate to the cell inwhich the UE 100 may be camping. In an example, based on the PDU sessionstatus, the AMF 155 may initiate PDU session release procedure in thenetwork for the PDU sessions whose PDU session ID(s) may be indicated bythe UE 100 as not available.

In an example, if the service request was not sent integrity protectedor integrity protection verification failed, the AMF 155 may initiate aNAS authentication/security procedure 1015.

In an example, if the UE 100 triggers the service request to establish asignaling connection, upon successful establishment of the signalingconnection, the UE 100 and the network may exchange NAS signaling.

In an example the AMF 155 may send to the SMF 160 a PDU session updatecontext request 1020 e.g., Nsmf_PDUSession_UpdateSMContext requestcomprising PDU session ID(s), Cause(s), UE 100 location information,access type, and/or the like.

In an example, the Nsmf_PDUSession_UpdateSMContext request may beinvoked by the AMF 155 if the UE 100 may identify PDU session(s) to beactivated in the NAS service request message. In an example, theNsmf_PDUSession_UpdateSMContext request may be triggered by the SMF 160wherein the PDU session(s) identified by the UE 100 may correlate toother PDU session ID(s) than the one triggering the procedure. In anexample, the Nsmf_PDUSession_UpdateSMContext request may be triggered bythe SMF 160 wherein the current UE 100 location may be outside the areaof validity for the N2 information provided by the SMF 160 during anetwork triggered service request procedure. The AMF 155 may not sendthe N2 information provided by the SMF 160 during the network triggeredservice request procedure.

In an example, the AMF 155 may determine the PDU session(s) to beactivated and may send an Nsmf_PDUSession_UpdateSMContext request to SMF160(s) associated with the PDU session(s) with cause set to indicateestablishment of user plane resources for the PDU session(s).

In an example, if the procedure may be triggered in response to pagingindicating non-3GPP access, and the list of allowed PDU sessionsprovided by the UE 100 may not include the PDU session for which the UE100 was paged, the AMF 155 may notify the SMF 160 that the user planefor the PDU session may not be re-activated. The service requestprocedure may succeed without re-activating the user plane of any PDUsessions, and the AMF 155 may notify the UE 100.

In an example, if the PDU session ID may correspond to a LADN and theSMF 160 may determine that the UE 100 may be outside the area ofavailability of the LADN based on the UE 100 location reporting from theAMF 155, the SMF 160 may decide to (based on local policies) keep thePDU session, may reject the activation of user plane connection for thePDU session and may inform the AMF 155. In an example, if the proceduremay be triggered by a network triggered service request, the SMF 160 maynotify the UPF 110 that originated the data notification to discarddownlink data for the PDU sessions and/or to not provide further datanotification messages. The SMF 160 may respond to the AMF 155 with anappropriate reject cause and the user plane activation of PDU sessionmay be stopped.

In an example, if the PDU session ID may correspond to a LADN and theSMF 160 may determine that the UE 100 may be outside the area ofavailability of the LADN based on the UE 100 location reporting from theAMF 155, the SMF 160 may decide to (based on local policies) release thePDU session. The SMF 160 may locally release the PDU session and mayinform the AMF 155 that the PDU session may be released. The SMF 160 mayrespond to the AMF 155 with an appropriate reject cause and the userplane Activation of PDU session may be stopped.

In an example, if the UP activation of the PDU session may be acceptedby the SMF 160, based on the location info received from the AMF 155,the SMF 160 may check the UPF 110 Selection 1025 Criteria (e.g., sliceisolation requirements, slice coexistence requirements, UPF's 110dynamic load, UPF's 110 relative static capacity among UPFs supportingthe same DNN, UPF 110 location available at the SMF 160, UE 100 locationinformation, Capability of the UPF 110 and the functionality requiredfor the particular UE 100 session. In an example, an appropriate UPF 110may be selected by matching the functionality and features required fora UE 100, DNN, PDU session type (i.e. IPv4, IPv6, ethernet type orunstructured type) and if applicable, the static IP address/prefix, SSCmode selected for the PDU session, UE 100 subscription profile in UDM140, DNAI as included in the PCC rules, local operator policies,S-NSSAI, access technology being used by the UE 100, UPF 110 logicaltopology, and/or the like), and may determine to perform one or more ofthe following: continue using the current UPF(s); may select a newintermediate UPF 110 (or add/remove an intermediate UPF 110), if the UE100 has moved out of the service area of the UPF 110 that was previouslyconnecting to the (R)AN 105, while maintaining the UPF(s) acting as PDUsession anchor; may trigger re-establishment of the PDU session toperform relocation/reallocation of the UPF 110 acting as PDU sessionanchor, e.g. the UE 100 has moved out of the service area of the anchorUPF 110 which is connecting to RAN 105.

In an example, the SMF 160 may send to the UPF 110 (e.g., newintermediate UPF 110) an N4 session establishment request 1030. In anexample, if the SMF 160 may select a new UPF 110 to act as intermediateUPF 110-2 for the PDU session, or if the SMF 160 may select to insert anintermediate UPF 110 for a PDU session which may not have anintermediate UPF 110-2, an N4 session establishment request 1030 messagemay be sent to the new UPF 110, providing packet detection, dataforwarding, enforcement and reporting rules to be installed on the newintermediate UPF. The PDU session anchor addressing information (on N9)for this PDU session may be provided to the intermediate UPF 110-2.

In an example, if a new UPF 110 is selected by the SMF 160 to replacethe old (intermediate) UPF 110-2, the SMF 160 may include a dataforwarding indication. The data forwarding indication may indicate tothe UPF 110 that a second tunnel endpoint may be reserved for bufferedDL data from the old I-UPF.

In an example, the new UPF 110 (intermediate) may send to SMF 160 an N4session establishment response message 1030. In case the UPF 110 mayallocate CN tunnel info, the UPF 110 may provide DL CN tunnel info forthe UPF 110 acting as PDU session anchor and UL CN tunnel info (e.g., CNN3 tunnel info) to the SMF 160. If the data forwarding indication may bereceived, the new (intermediate) UPF 110 acting as N3 terminating pointmay send DL CN tunnel info for the old (intermediate) UPF 110-2 to theSMF 160. The SMF 160 may start a timer, to release the resource in theold intermediate UPF 110-2.

In an example, if the SMF 160 may selects a new intermediate UPF 110 forthe PDU session or may remove the old I-UPF 110-2, the SMF 160 may sendN4 session modification request message 1035 to PDU session anchor, PSAUPF 110-3, providing the data forwarding indication and DL tunnelinformation from new intermediate UPF 110.

In an example, if the new intermediate UPF 110 may be added for the PDUsession, the (PSA) UPF 110-3 may begin to send the DL data to the newI-UPF 110 as indicated in the DL tunnel information.

In an example, if the service request may be triggered by the network,and the SMF 160 may remove the old I-UPF 110-2 and may not replace theold I-UPF 110-2 with the new I-UPF 110, the SMF 160 may include the dataforwarding indication in the request. The data forwarding indication mayindicate to the (PSA) UPF 110-3 that a second tunnel endpoint may bereserved for buffered DL data from the old I-UPF 110-2. In this case,the PSA UPF 110-3 may begin to buffer the DL data it may receive at thesame time from the N6 interface.

In an example, the PSA UPF 110-3 (PSA) may send to the SMF 160 an N4session modification response 1035. In an example, if the dataforwarding indication may be received, the PSA UPF 110-3 may become asN3 terminating point and may send CN DL tunnel info for the old(intermediate) UPF 110-2 to the SMF 160. The SMF 160 may start a timer,to release the resource in old intermediate UPF 110-2 if there is one.

In an example, the SMF 160 may send to the old UPF 110-2 an N4 sessionmodification request 1045 (e.g., may comprise new UPF 110 address, newUPF 110 DL tunnel ID, and/or the like). In an example, if the servicerequest may be triggered by the network, and/or the SMF 160 may removethe old (intermediate) UPF 110-2, the SMF 160 may send the N4 sessionmodification request message to the old (intermediate) UPF 110-2, andmay provide the DL tunnel information for the buffered DL data. If theSMF 160 may allocate new I-UPF 110, the DL tunnel information is fromthe new (intermediate) UPF 110 may act as N3 terminating point. If theSMF 160 may not allocate a new I-UPF 110, the DL tunnel information maybe from the new UPF 110 (PSA) 110-3 acting as N3 terminating point. TheSMF 160 may start a timer to monitor the forwarding tunnel. In anexample, the old (intermediate) UPF 110-2 may send N4 sessionmodification response message to the SMF 160.

In an example, if the I-UPF 110-2 may be relocated and forwarding tunnelwas established to the new I-UPF 110, the old (intermediate) UPF 110-2may forward its buffered data to the new (intermediate) UPF 110 actingas N3 terminating point. In an example, if the old I-UPF 110-2 may beremoved and the new I-UPF 110 may not be assigned for the PDU sessionand forwarding tunnel may be established to the UPF 110 (PSA) 110-3, theold (intermediate) UPF 110-2 may forward its buffered data to the UPF110 (PSA) 110-3 acting as N3 terminating point.

In an example, the SMF 160 may send to the AMF 155 an N11 message 1060e.g., a Nsmf_PDUSession_UpdateSMContext response (comprising: N1 SMcontainer (PDU session ID, PDU session re-establishment indication), N2SM information (PDU session ID, QoS profile, CN N3 tunnel info,S-NSSAI), Cause), upon reception of the Nsmf_PDUSession_UpdateSMContextrequest with a cause including e.g., establishment of user planeresources. The SMF 160 may determine whether UPF 110 reallocation may beperformed, based on the UE 100 location information, UPF 110 servicearea and operator policies. In an example, for a PDU session that theSMF 160 may determine to be served by the current UPF 110, e.g., PDUsession anchor or intermediate UPF, the SMF 160 may generate N2 SMinformation and may send an Nsmf_PDUSession_UpdateSMContext response1060 to the AMF 155 to establish the user plane(s). The N2 SMinformation may contain information that the AMF 155 may provide to theRAN 105. In an example, for a PDU session that the SMF 160 may determineas requiring a UPF 110 relocation for PDU session anchor UPF, the SMF160 may reject the activation of UP of the PDU session by sendingNsmf_PDUSession_UpdateSMContext response that may contain N1 SMcontainer to the UE 100 via the AMF 155. The N1 SM container may includethe corresponding PDU session ID and PDU session re-establishmentindication.

Upon reception of the Namf_EventExposure_Notify from the AMF 155 to theSMF 160, with an indication that the UE 100 is reachable, if the SMF 160may have pending DL data, the SMF 160 may invoke theNamf_Communication_N1N2MessageTransfer service operation to the AMF 155to establish the user plane(s) for the PDU sessions. In an example, theSMF 160 may resume sending DL data notifications to the AMF 155 in caseof DL data.

In an example, the SMF 160 may send a message to the AMF 155 to rejectthe activation of UP of the PDU session by including a cause in theNsmf_PDUSession_UpdateSMContext response if the PDU session maycorrespond to a LADN and the UE 100 may be outside the area ofavailability of the LADN, or if the AMF 155 may notify the SMF 160 thatthe UE 100 may be reachable for regulatory prioritized service, and thePDU session to be activated may not for a regulatory prioritizedservice; or if the SMF 160 may decide to perform PSA UPF 110-3relocation for the requested PDU session.

In an example, the AMF 155 may send to the (R)AN 105 an N2 requestmessage 1065 (e.g., N2 SM information received from SMF 160, securitycontext, AMF 155 signaling connection ID, handover restriction list, MMNAS service accept, list of recommended cells/TAs/NG-RAN nodeidentifiers). In an example, the RAN 105 may store the security context,AMF 155 signaling connection Id, QoS information for the QoS flows ofthe PDU sessions that may be activated and N3 tunnel IDs in the UE 100RAN 105 context. In an example, the MM NAS service accept may includePDU session status in the AMF 155. If the activation of UP of a PDUsession may be rejected by the SMF 160, the MM NAS service accept mayinclude the PDU session ID and the reason why the user plane resourcesmay not be activated (e.g. LADN not available). Local PDU sessionrelease during the session request procedure may be indicated to the UE100 via the session Status.

In an example, if there are multiple PDU sessions that may involvemultiple SMF 160 s, the AMF 155 may not wait for responses from all SMF160 s before it may send N2 SM information to the UE 100. The AMF 155may wait for all responses from the SMF 160 s before it may send MM NASservice accept message to the UE 100.

In an example, the AMF 155 may include at least one N2 SM informationfrom the SMF 160 if the procedure may be triggered for PDU session userplane activation. AMF 155 may send additional N2 SM information from SMF160 s in separate N2 message(s) (e.g. N2 tunnel setup request), if thereis any. Alternatively, if multiple SMF 160 s may be involved, the AMF155 may send one N2 request message to (R)AN 105 after all theNsmf_PDUSession_UpdateSMContext response service operations from all theSMF 160 s associated with the UE 100 may be received. In such case, theN2 request message may include the N2 SM information received in each ofthe Nsmf_PDUSession_UpdateSMContext response and PDU session ID toenable AMF 155 to associate responses to relevant SMF 160.

In an example, if the RAN 105 (e.g., NG RAN) node may provide the listof recommended cells/TAs/NG-RAN node identifiers during the AN releaseprocedure, the AMF 155 may include the information from the list in theN2 request. The RAN 105 may use this information to allocate the RAN 105notification area when the RAN 105 may decide to enable RRC inactivestate for the UE 100.

If the AMF 155 may receive an indication, from the SMF 160 during a PDUsession establishment procedure that the UE 100 may be using a PDUsession related to latency sensitive services, for any of the PDUsessions established for the UE 100 and the AMF 155 has received anindication from the UE 100 that may support the CM-CONNECTED with RRCinactive state, then the AMF 155 may include the UE's RRC inactiveassistance information. In an example, the AMF 155 based on networkconfiguration, may include the UE's RRC inactive assistance information.

In an example, the (R)AN 105 may send to the UE 100 a message to performRRC connection reconfiguration 1070 with the UE 100 depending on the QoSinformation for all the QoS flows of the PDU sessions whose UPconnections may be activated and data radio bearers. In an example, theuser plane security may be established.

In an example, if the N2 request may include a MM NAS service acceptmessage, the RAN 105 may forward the MM NAS service accept to the UE100. The UE 100 may locally delete context of PDU sessions that may notbe available in 5GC.

In an example, if the N1 SM information may be transmitted to the UE 100and may indicate that some PDU session(s) may be re-established, the UE100 may initiate PDU session re-establishment for the PDU session(s)that may be re-established after the service request procedure may becomplete.

In an example, after the user plane radio resources may be setup, theuplink data from the UE 100 may be forwarded to the RAN 105. The RAN 105(e.g., NG-RAN) may send the uplink data to the UPF 110 address andtunnel ID provided.

In an example, the (R)AN 105 may send to the AMF 155 an N2 request Ack1105 (e.g., N2 SM information (comprising: AN tunnel info, list ofaccepted QoS flows for the PDU sessions whose UP connections areactivated, list of rejected QoS flows for the PDU sessions whose UPconnections are activated)). In an example, the N2 request message mayinclude N2 SM information(s), e.g. AN tunnel info. RAN 105 may respondN2 SM information with separate N2 message (e.g. N2 tunnel setupresponse). In an example, if multiple N2 SM information are included inthe N2 request message, the N2 request Ack may include multiple N2 SMinformation and information to enable the AMF 155 to associate theresponses to relevant SMF 160.

In an example, the AMF 155 may send to the SMF 160 aNsmf_PDUSession_UpdateSMContext request 1110 (N2 SM information (ANtunnel info), RAT type) per PDU session. If the AMF 155 may receive N2SM information (one or multiple) from the RAN 105, then the AMF 155 mayforward the N2 SM information to the relevant SMF 160. If the UE 100time zone may change compared to the last reported UE 100 Time Zone thenthe AMF 155 may include the UE 100 time zone IE in theNsmf_PDUSession_UpdateSMContext request message.

In an example, if dynamic PCC is deployed, the SMF 160 may initiatenotification about new location information to the PCF 135 (ifsubscribed) by invoking an event exposure notification operation (e.g.,a Nsmf_EventExposure_Notify service operation). The PCF 135 may provideupdated policies by invoking a policy control update notificationmessage 1115 (e.g., a Npcf_SMPolicyControl_UpdateNotify operation).

In an example, if the SMF 160 may select a new UPF 110 to act asintermediate UPF 110 for the PDU session, the SMF 160 may initiates anN4 session modification procedure 1120 to the new I-UPF 110 and mayprovide AN tunnel info. The downlink data from the new I-UPF 110 may beforwarded to RAN 105 and UE 100. In an example, the UPF 110 may send tothe SMF 160, an N4 session modification response 1120. In an example,the SMF 160 may send to the AMF 155, an Nsmf_PDUSession_UpdateSMContextresponse 1140.

In an example, if forwarding tunnel may be established to the new I-UPF110 and if the timer SMF 160 set for forwarding tunnel may be expired,the SMF 160 may sends N4 session modification request 1145 to new(intermediate) UPF 110 acting as N3 terminating point to release theforwarding tunnel. In an example, the new (intermediate) UPF 110 maysend to the SMF 160 an N4 session modification response 1145. In anexample, the SMF 160 may send to the PSA UPF 110-3 an N4 sessionmodification request 1150, or N4 session release request. In an example,if the SMF 160 may continue using the old UPF 110-2, the SMF 160 maysend an N4 session modification request 1155, providing AN tunnel info.In an example, if the SMF 160 may select a new UPF 110 to act asintermediate UPF 110, and the old UPF 110-2 may not be PSA UPF 110-3,the SMF 160 may initiate resource release, after timer expires, bysending an N4 session release request (release cause) to the oldintermediate UPF 110-2.

In an example, the old intermediate UPF 110-2 may send to the SMF 160 anN4 session modification response or N4 session release response 1155.The old UPF 110-2 may acknowledge with the N4 session modificationresponse or N4 session release response message to confirm themodification or release of resources. The AMF 155 may invoke theNamf_EventExposure_Notify service operation to notify the mobilityrelated events, after this procedure may complete, towards the NFs thatmay have subscribed for the events. In an example, the AMF 155 mayinvoke the Namf_EventExposure_Notify towards the SMF 160 if the SMF 160had subscribed for UE 100 moving into or out of area of interest and ifthe UE's current location may indicate that it may be moving into ormoving outside of the area of interest subscribed, or if the SMF 160 hadsubscribed for LADN DNN and if the UE 100 may be moving into or outsideof an area where the LADN is available, or if the UE 100 may be in MICOmode and the AMF 155 had notified an SMF 160 of the UE 100 beingunreachable and that SMF 160 may not send DL data notifications to theAMF 155, and the AMF 155 may informs the SMF 160 that the UE 100 isreachable, or if the SMF 160 had subscribed for UE 100 reachabilitystatus, then the AMF 155 may notify the UE 100 reachability.

An example PDU session establishment procedure depicted in FIG. 12 andFIG. 13. In an example embodiment, when the PDU session establishmentprocedure may be employed, the UE 100 may send to the AMF 155 a NASMessage 1205 (or a SM NAS message) comprising NSSAI, S-NSSAI (e.g.,requested S-NSSAI, allowed S-NSSAI, subscribed S-NSSAI, and/or thelike), DNN, PDU session ID, request type, old PDU session ID, N1 SMcontainer (PDU session establishment request), and/or the like. In anexample, the UE 100, in order to establish a new PDU session, maygenerate a new PDU session ID. In an example, when emergency service maybe required and an emergency PDU session may not already be established,the UE 100 may initiate the UE 100 requested PDU session establishmentprocedure with a request type indicating emergency request. In anexample, the UE 100 may initiate the UE 100 requested PDU sessionestablishment procedure by the transmission of the NAS messagecontaining a PDU session establishment request within the N1 SMcontainer. The PDU session establishment request may include a PDU type,SSC mode, protocol configuration options, and/or the like. In anexample, the request type may indicate initial request if the PDUsession establishment is a request to establish the new PDU session andmay indicate existing PDU session if the request refers to an existingPDU session between 3GPP access and non-3GPP access or to an existingPDN connection in EPC. In an example, the request type may indicateemergency request if the PDU session establishment may be a request toestablish a PDU session for emergency services. The request type mayindicate existing emergency PDU session if the request refers to anexisting PDU session for emergency services between 3GPP access andnon-3GPP access. In an example, the NAS message sent by the UE 100 maybe encapsulated by the AN in a N2 message towards the AMF 155 that mayinclude user location information and access technology typeinformation. In an example, the PDU session establishment requestmessage may contain SM PDU DN request container containing informationfor the PDU session authorization by the external DN. In an example, ifthe procedure may be triggered for SSC mode 3 operation, the UE 100 mayinclude the old PDU session ID which may indicate the PDU session ID ofthe ongoing PDU session to be released, in the NAS message. The old PDUsession ID may be an optional parameter which may be included in thiscase. In an example, the AMF 155 may receive from the AN the NAS message(e.g., NAS SM message) together with user location information (e.g.cell ID in case of the RAN 105). In an example, the UE 100 may nottrigger a PDU session establishment for a PDU session corresponding to aLADN when the UE 100 is outside the area of availability of the LADN.

In an example, the AMF 155 may determine that the NAS message or the SMNAS message may correspond to the request for the new PDU session basedon that request type indicates initial request and that the PDU sessionID may not be used for any existing PDU session(s) of the UE 100. If theNAS message does not contain an S-NSSAI, the AMF 155 may determine adefault S-NSSAI for the requested PDU session either according to the UE100 subscription, if it may contain only one default S-NSSAI, or basedon operator policy. In an example, the AMF 155 may perform SMF 160selection 1210 and select an SMF 160. If the request type may indicateinitial request or the request may be due to handover from EPS, the AMF155 may store an association of the S-NSSAI, the PDU session ID and aSMF 160 ID. In an example, if the request type is initial request and ifthe old PDU session ID indicating the existing PDU session may becontained in the message, the AMF 155 may select the SMF 160 and maystore an association of the new PDU session ID and the selected SMF 160ID.

In an example, the AMF 155 may send to the SMF 160, an N11 message 1215,e.g., Nsmf_PDUSession_CreateSMContext request (comprising: SUPI or PEI,DNN, S-NSSAI, PDU session ID, AMF 155 ID, request type, N1 SM container(PDU session establishment request), user location information, accesstype, PEI, GPSI), or Nsmf_PDUSession_UpdateSMContext request (SUPI, DNN,S-NSSAI, PDU session ID, AMF 155 ID, request type, N1 SM container (PDUsession establishment request), user location information, access type,RAT type, PEI). In an example, if the AMF 155 may not have anassociation with the SMF 160 for the PDU session ID provided by the UE100 (e.g. when request type indicates initial request), the AMF 155 mayinvoke the Nsmf_PDUSession_CreateSMContext request, but if the AMF 155already has an association with an SMF 160 for the PDU session IDprovided by the UE 100 (e.g. when request type indicates existing PDUsession), the AMF 155 may invoke the Nsmf_PDUSession_UpdateSMContextrequest. In an example, the AMF 155 ID may be the UE's GUAMI whichuniquely identifies the AMF 155 serving the UE 100. The AMF 155 mayforward the PDU session ID together with the N1 SM container containingthe PDU session establishment request received from the UE 100. The AMF155 may provide the PEI instead of the SUPI when the UE 100 hasregistered for emergency services without providing the SUPI. In casethe UE 100 has registered for emergency services but has not beenauthenticated, the AMF 155 may indicate that the SUPI has not beenauthenticated.

In an example, if the request type may indicate neither emergencyrequest nor existing emergency PDU session and, if the SMF 160 has notyet registered and subscription data may not be available, the SMF 160may register with the UDM 140, and may retrieve subscription data 1225and subscribes to be notified when subscription data may be modified. Inan example, if the request type may indicate existing PDU session orexisting emergency PDU session, the SMF 160 may determine that therequest may be due to handover between 3GPP access and non-3GPP accessor due to handover from EPS. The SMF 160 may identify the existing PDUsession based on the PDU session ID. The SMF 160 may not create a new SMcontext but instead may update the existing SM context and may providethe representation of the updated SM context to the AMF 155 in theresponse. if the request type may be initial request and if the old PDUsession ID may be included in Nsmf_PDUSession_CreateSMContext request,the SMF 160 may identify the existing PDU session to be released basedon the old PDU session ID.

In an example, the SMF 160 may send to the AMF 155, the N11 messageresponse 1220, e.g., either a PDU session create/update response,Nsmf_PDUSession_CreateSMContext response 1220 (cause, SM context ID orN1 SM container (PDU session reject(cause))) or anNsmf_PDUSession_UpdateSMContext response.

In an example, if the SMF 160 may perform secondaryauthorization/authentication 1230 during the establishment of the PDUsession by a DN-AAA server, the SMF 160 may select a UPF 110 and maytrigger a PDU session establishment authentication/authorization.

In an example, if the request type may indicate initial request, the SMF160 may select an SSC mode for the PDU session. The SMF 160 may selectone or more UPFs as needed. In case of PDU type IPv4 or IPv6, the SMF160 may allocate an IP address/prefix for the PDU session. In case ofPDU type IPv6, the SMF 160 may allocate an interface identifier to theUE 100 for the UE 100 to build its link-local address. For UnstructuredPDU type the SMF 160 may allocate an IPv6 prefix for the PDU session andN6 point-to-point tunneling (based on UDP/IPv6).

In an example, if dynamic PCC is deployed, the may SMF 160 performs PCF135 selection 1235. If the request type indicates existing PDU sessionor existing emergency PDU session, the SMF 160 may use the PCF 135already selected for the PDU session. If dynamic PCC is not deployed,the SMF 160 may apply local policy.

In an example, the SMF 160 may perform a session management policyestablishment procedure 1240 to establish a PDU session with the PCF 135and may get the default PCC Rules for the PDU session. The GPSI may beincluded if available at the SMF 160. If the request type in 1215indicates existing PDU session, the SMF 160 may notify an eventpreviously subscribed by the PCF 135 by a session management policymodification procedure and the PCF 135 may update policy information inthe SMF 160. The PCF 135 may provide authorized session-AMBR and theauthorized 5QI and ARP to SMF 160. The PCF 135 may subscribe to the IPallocation/release event in the SMF 160 (and may subscribe otherevents).

In an example, the PCF 135, based on the emergency DNN, may set the ARPof the PCC rules to a value that may be reserved for emergency services.

In an example, if the request type in 1215 indicates initial request,the SMF 160 may select an SSC mode for the PDU session. The SMF 160 mayselect 1245 one or more UPFs as needed. In case of PDU type IPv4 orIPv6, the SMF 160 may allocate an IP address/prefix for the PDU session.In case of PDU type IPv6, the SMF 160 may allocate an interfaceidentifier to the UE 100 for the UE 100 to build its link-local address.For unstructured PDU type the SMF 160 may allocate an IPv6 prefix forthe PDU session and N6 point-to-point tunneling (e.g., based onUDP/IPv6). In an example, for Ethernet PDU type PDU session, neither aMAC nor an IP address may be allocated by the SMF 160 to the UE 100 forthis PDU session.

In an example, if the request type in 1215 is existing PDU session, theSMF 160 may maintain the same IP address/prefix that may be allocated tothe UE 100 in the source network.

In an example, if the request type in 1215 indicates existing PDUsession referring to an existing PDU session moved between 3GPP accessand non-3GPP access, the SMF 160 may maintain the SSC mode of the PDUsession, e.g., the current PDU session Anchor and IP address. In anexample, the SMF 160 may trigger e.g. new intermediate UPF 110 insertionor allocation of a new UPF 110. In an example, if the request typeindicates emergency request, the SMF 160 may select 1245 the UPF 110 andmay select SSC mode 1.

In an example, the SMF 160 may perform a session management policymodification 1250 procedure to report some event to the PCF 135 that haspreviously subscribed. If request type is initial request and dynamicPCC is deployed and PDU type is IPv4 or IPv6, the SMF 160 may notify thePCF 135 (that has previously subscribed) with the allocated UE 100 IPaddress/prefix.

In an example, the PCF 135 may provide updated policies to the SMF 160.The PCF 135 may provide authorized session-AMBR and the authorized 5QIand ARP to the SMF 160.

In an example, if request type indicates initial request, the SMF 160may initiate an N4 session establishment procedure 1255 with theselected UPF 110. The SMF 160 may initiate an N4 session modificationprocedure with the selected UPF 110. In an example, the SMF 160 may sendan N4 session establishment/modification request 1255 to the UPF 110 andmay provide packet detection, enforcement, reporting rules, and/or thelike to be installed on the UPF 110 for this PDU session. If CN tunnelinfo is allocated by the SMF 160, the CN tunnel info may be provided tothe UPF 110. If the selective user plane deactivation is required forthis PDU session, the SMF 160 may determine the Inactivity Timer and mayprovide it to the UPF 110. In an example, the UPF 110 may acknowledgesby sending an N4 session establishment/modification response 1255. If CNtunnel info is allocated by the UPF, the CN tunnel info may be providedto SMF 160. In an example, if multiple UPFs are selected for the PDUsession, the SMF 160 may initiate N4 session establishment/modificationprocedure 1255 with each UPF 110 of the PDU session.

In an example, the SMF 160 may send to the AMF 155 anNamf_Communication_N1N2MessageTransfer 1305 message (comprising PDUsession ID, access type, N2 SM information (PDU session ID, QFI(s), QoSprofile(s), CN tunnel info, S-NSSAI, session-AMBR, PDU session type,and/or the like), N1 SM container (PDU session establishment accept (QoSRule(s), selected SSC mode, S-NSSAI, allocated IPv4 address, interfaceidentifier, session-AMBR, selected PDU session type, and/or the like))).In case of multiple UPFs are used for the PDU session, the CN tunnelinfo may comprise tunnel information related with the UPF 110 thatterminates N3. In an example, the N2 SM information may carryinformation that the AMF 155 may forward to the (R)AN 105 (e.g., the CNtunnel info corresponding to the core network address of the N3 tunnelcorresponding to the PDU session, one or multiple QoS profiles and thecorresponding QFIs may be provided to the (R)AN 105, the PDU session IDmay be used by AN signaling with the UE 100 to indicate to the UE 100the association between AN resources and a PDU session for the UE 100,and/or the like). In an example, a PDU session may be associated to anS-NSSAI and a DNN. In an example, the N1 SM container may contain thePDU session establishment accept that the AMF 155 may provide to the UE100. In an example, multiple QoS rules and QoS profiles may be includedin the PDU session establishment accept within the N1 SM and in the N2SM information. In an example, theNamf_Communication_N1N2MessageTransfer 1305 may further comprise the PDUsession ID and information allowing the AMF 155 to know which accesstowards the UE 100 to use.

In an example, the AMF 155 may send to the (R)AN 105 an N2 PDU sessionrequest 1310 (comprising N2 SM information, NAS message (PDU session ID,N1 SM container (PDU session establishment accept, and/or the like))).In an example, the AMF 155 may send the NAS message 1310 that maycomprise PDU session ID and PDU session establishment accept targeted tothe UE 100 and the N2 SM information received from the SMF 160 withinthe N2 PDU session request 1310 to the (R)AN 105.

In an example, the (R)AN 105 may issue AN specific signaling exchange1315 with the UE 100 that may be related with the information receivedfrom SMF 160. In an example, in case of a 3GPP RAN 105, an RRCconnection reconfiguration procedure may take place with the UE 100 toestablish the necessary RAN 105 resources related to the QoS Rules forthe PDU session request 1310. In an example, (R)AN 105 may allocate(R)AN 105 N3 tunnel information for the PDU session. In case of dualconnectivity, the master RAN 105 node may assign some (zero or more)QFIs to be setup to a master RAN 105 node and others to the secondaryRAN 105 node. The AN tunnel info may comprise a tunnel endpoint for eachinvolved RAN 105 node, and the QFIs assigned to each tunnel endpoint. AQFI may be assigned to either the master RAN 105 node or the secondaryRAN 105 node. In an example, (R)AN 105 may forward the NAS message 1310(PDU session ID, N1 SM container (PDU session establishment accept)) tothe UE 100. The (R)AN 105 may provide the NAS message to the UE 100 ifthe necessary RAN 105 resources are established and the allocation of(R)AN 105 tunnel information are successful.

In an example, the N2 PDU session response 1320 may comprise a PDUsession ID, cause, N2 SM information (PDU session ID, AN tunnel info,list of accepted/rejected QFI(s)), and/or the like. In an example, theAN tunnel info may correspond to the access network address of the N3tunnel corresponding to the PDU session.

In an example, the AMF 155 may forward the N2 SM information receivedfrom (R)AN 105 to the SMF 160 via a Nsmf_PDUSession_UpdateSMContextrequest 1330 (comprising: N2 SM information, request type, and/or thelike). In an example, if the list of rejected QFI(s) is included in N2SM information, the SMF 160 may release the rejected QFI(s) associatedQoS profiles.

In an example, the SMF 160 may initiate an N4 session modificationprocedure 1335 with the UPF 110. The SMF 160 may provide AN tunnel infoto the UPF 110 as well as the corresponding forwarding rules. In anexample, the UPF 110 may provide an N4 session modification response1335 to the SMF 160160.

In an example, the SMF 160 may send to the AMF 155 anNsmf_PDUSession_UpdateSMContext response 1340 (Cause). In an example,the SMF 160 may subscribe to the UE 100 mobility event notification fromthe AMF 155 (e.g. location reporting, UE 100 moving into or out of areaof interest), after this step by invoking Namf_EventExposure_Subscribeservice operation. For LADN, the SMF 160 may subscribe to the UE 100moving into or out of LADN service area event notification by providingthe LADN DNN as an indicator for the area of interest. The AMF 155 mayforward relevant events subscribed by the SMF 160.

In an example, the SMF 160 may send to the AMF 155, aNsmf_PDUSession_SMContextStatusNotify (release) 1345. In an example, ifduring the procedure, any time the PDU session establishment is notsuccessful, the SMF 160 may inform the AMF 155 by invokingNsmf_PDUSession_SMContextStatusNotify(release) 1345. The SMF 160 mayreleases any N4 session(s) created, any PDU session address if allocated(e.g. IP address) and may release the association with the PCF 135.

In an example, in case of PDU type IPv6, the SMF 160 may generate anIPv6 Router Advertisement 1350 and may send it to the UE 100 via N4 andthe UPF 110.

In an example, if the PDU session may not be established, the SMF 160may unsubscribe 1360 to the modifications of session managementsubscription data for the corresponding (SUPI, DNN, S-NSSAI), usingNudm_SDM_Unsubscribe (SUPI, DNN, S-NSSAI), if the SMF 160 is no morehandling a PDU session of the UE 100 for this (DNN, S-NSSAI). In anexample, if the PDU session may not be established, the SMF 160 mayderegister 1360 for the given PDU session using Nudm_UECM_Deregistration(SUPI, DNN, PDU session ID).

High reliability may hardly be achieved by single path on user plane. Aredundant transmission for services requiring low latency and highreliability may be essential. Depending on the condition of networkdeployment, e.g. which network function or network segments cannot meetthe requirements of reliability, the redundant transmission may beapplied on the user plane path between the UE and the network.

Existing technologies may require low latency, low jitter and highreliability in existing or next generation wireless system (4G, 5G,fifth generation, NR, LTE, EPC, next generation core, and/or the like).Existing solutions offered in 3GPP technical report 23.725 providesprocedures for establishing, modifying or releasing multiple tunnels forredundant packet transmission on N3 interface for communication betweenan access node and user plane function and N9 interface forcommunication between user plane functions.

Existing solutions focus on the transmission of duplicated packets. Inan example, session duplication (and/or packet duplication) may benecessary or inefficient depending on network congestion status, networklink reliability status, and/or radio link conditions. Configuring orreleasing a duplicate session of an original session may requiresignaling messages among a wireless device, access nodes (gNBs, eNBs),and/or core network nodes (e.g. AMF, SMF, UPF, UDM, PCF, and/or thelike). In an existing technology, configuration or release of sessionduplication in response to dynamically changing network status and radioconditions may increase signaling overhead among network nodes and/ormay increase adaptation delay to current network status (e.g.enabling/disabling delay for session (packet) duplication). An existingtechnology may decrease packet transmission reliability and servicequality of wireless devices. Instead of configuring or releasing packet(session) duplication setup, an implementation of example embodimentsprovides dynamic activation and/or deactivation mechanisms of aconfigured duplication of the packets (e.g. sessions), based on networkstatus and radio conditions. An implementation of example embodimentsprovides how duplication activation/deactivation is achieved at thewireless device and at the entity in the core network. An implementationof example embodiments may decrease signaling overhead and/or decreaseconfiguration latency for session duplication configuration/release byactivating/deactivating configured packet duplication depending onnetwork status and/or radio condition changes. An implementation ofexample embodiments may increase packet transmission reliability andservice quality of wireless devices.

An example embodiment may provide solution for duplication of a sessionin the wireless device and mechanism to dynamically activate anddeactivate duplication of the packets of the session. An exampleembodiment may provide mechanism to configure a core network when theactivation is triggered by the access node. Various transmissionmechanisms may be used to handle original and duplicated packets of thesession between the entities handling packet duplication and duplicationelimination using same or separate paths. In an example, separate pathsmay be disjoint paths.

There may be multiple options for achieving redundancy depending onwhich path is exposed to possibility of a frequent failure. In anexample, there may be a mechanism to ensure duplication over an airinterface between a wireless device and one or more access nodes (basestations). An activation of duplication procedure or mechanism mayprovide duplicating packets of an original session in to copy of one ormore sessions (second session) and transmitting packets of the firstsession and the second session over one or more user plane pathsinvolving N3 interface, N9 interface and/or the like. An exampleembodiment may provide mechanism for duplication of a PDU session (firstsession) for uplink packets of the application at the wireless deviceand duplication elimination of the received downlink packets receivedfrom a wireless core network at the wireless device. This exampleembodiment may provide mechanism for duplication of the first sessionfor downlink packets received from a data network and duplicationelimination of the received uplink packets from the wireless device at apacket data unit session anchor (PSA) user plane function (UPF). Adetermination of the activation of duplication of the original PDUsession may be done by a first access node serving the first session. Amechanism to ensure transmission of duplicated packets between these twoentities (wireless device and PSA UPF) may include the activation ofduplication and/or an establishment of multiple tunnels between thefirst access node and the PSA UPF.

In an example, a wireless device may set up one or more redundant PDUsessions (e.g., two redundant PDU sessions) over the 5G network, so thatthe network may attempt to make the paths of the two redundant PDUsessions independent whenever that is possible. In an example, upperlayer protocols, such as the IEEE TSN (Time Sensitive Networking) FRER(Frame Replication and Elimination for Reliability), to manage thereplication and elimination of redundant packets/frames over theduplicate paths which may span both the 3GPP segments and possibly fixednetwork segments as well. Other upper layer protocols, including IPbased ones such as a DetNet based solution may also be employed forredundant packet transmission over multiple paths or for managing abackup path in addition to the active path.

In an example as illustrated in FIG. 30, a wireless network may providetwo paths from the device: the first (packet data unit) PDU sessionspans from the UE via a first access node to a first UPF (UPF1) actingas the PSA UPF, and a second PDU session spans from the UE via thesecond access node to UPF2 acting as the PSA UPF. Based on these twoindependent PDU sessions, two independent paths are set up, which mayspan even beyond the 3GPP network. There are two paths set up betweenHost A in the device and Host B, with one or more intermediate nodes.The redundancy handling function (RHF) entities that may reside in HostA and Host B make use of the independent paths. The IEEE TSN FRER may bean example for an RHF. For Host A within the device, the two PDUsessions appear as different networking interfaces, making the hostmulti-homed. In an example, other solutions may be employed, whereredundancy spans up to an intermediate node.

This example may be based on the dual connectivity feature that issupported both by LTE and NR. A single UE may have user planeconnectivity with both the first access node (MgNB or first access node)and the second access node (SgNB or second access node). The radioaccess network (RAN) control plane and N1 may be handled via the MgNB.The MgNB may control the selection of SgNB and the setup of the dualconnectivity feature via the Xn interface. The UE may set up (e.g.,configure or establish) two PDU sessions, one via MgNB to UPF1 acting asa first PSAUPF, and another one via SgNB to UPF2 acting as a second PSAUPF. UPF1 and a second UPF (UPF2) may connect to the same Data Network(DN), even though the traffic via UPF1 and UPF2 might be routed viadifferent user plane nodes within the DN. UPF1 and UPF2 are controlledby SMF1 and SMF2, respectively, where SMF1 and SMF2 may coincidedepending on operator configuration of the SMF selection.

This example may differ from the RAN based Packet Data ConvergenceProtocol (PDCP) packet duplication function which may be internal toRAN, and the packet duplication takes place between the UE and the MgNB.The redundant paths may span the whole system including RAN and corenetwork.

Two options may be provided for the selection of the UPFs and the gNBs.In an example, a static approach for UPF selection that may take placebefore the SgNB may be selected in RAN; this may be applicable to IPbased PDU sessions, Ethernet based PDU sessions, non-IP based PDUsessions, unstructured PDU sessions, and/or the like. In an example, adynamic approach for UPF selection, which enhances the Static approachwhich may take into considerations the SgNB selected in RAN. This may beapplicable to Ethernet PDU sessions.

The solution may comprise one or more SMFs. In an example embodiment,two SMFs may be employed. In an example, a single SMF may be employed.If two SMFs are employed, the SMFs may be aware that the sessions areredundant (e.g., one or more, or two distinct/disjoint sessions). Incase of multiple SMFs are used, the SMFs may be configured to havedifferent UPF pool for avoiding reuse of same UPF by different SMFs.

SMF(s) may be aware of redundant sessions using, e.g. UE providingindication regarding redundant PDU session and proper provisioningduring UPF selection.

In an example, a wireless device may set up multiple redundant PDUsessions (e.g., request establishment/configuration) over the 5Gnetwork, so that the network may establish/configure separate,independent, and/or disjoint paths for the multiple redundant PDUsessions. It may be possible to rely on upper layer protocols, such asthe IEEE TSN (Time Sensitive Networking), to manage the replication andelimination of redundant packets/frames over the multiple paths whichmay span both the 3GPP segments and possibly fixed network segments.Other upper layer protocols, including IP based ones such as a DetNetbased solution may be possible for redundant packet transmission overmultiple paths or for managing a backup path in addition to the activepath.

In an example as illustrated in FIG. 31, when the terminal device may beequipped with two UEs. The first PDU session may span from a firstwireless device (UE1) via gNB1 to UPF1, while the second PDU session mayspan from a second wireless device (UE2) via gNB2 to UPF2. Based onthese two independent PDU sessions, two independent paths are set up,which may span even beyond the 3GPP network. In an example, there may betwo paths set up between Host A in the wireless device and Host B, withsome (optional) fixed intermediate nodes. The redundancy handlingfunction (RHF) entities (out of 3GPP scope) that reside in Host A andHost B make use of the independent paths. The IEEE TSN FRER may be anexample for a RHF. For Host A within the device, the two UEs may providedifferent networking interfaces, making the host redundantly connected.In an example, other solutions are also possible, where redundancy spansonly up to an intermediate node and not to the end host.

In an example, an integration of multiple UEs into a device may be usedand may assume a RAN deployment where redundant coverage by multiplegNBs may be available. Multiple PDU sessions may be set up from the UEs,which use independent RAN (gNB) and CN (UPF) entities. As illustrated inFIG. 31, UE1 and UE2 may be connected to gNB1 and gNB2, respectively andUE1 sets up a PDU session via gNB1 to UPF1, and UE2 sets up a PDUsession via gNB2 to UPF2. UPF1 and UPF2 connect to the same DN, eventhough the traffic via UPF1 and UPF2 might be routed via different userplane nodes within the DN. UPF1 and UPF2 may be controlled by SMF1 andSMF2, respectively.

For handling the reliability grouping of a UE, a new system parameter UEreliability group (UE RG) may be defined. This parameter may beconfigured explicitly to the UE and sent in a registration requestmessage to the network, it may be a part of the subscription or it maybe derived from other system parameters (e.g., SUPI, PEI, NSSAI, RFSP)based on operator configuration. The UE RG parameter of one or more UEmay be sent from AMF to RAN when the RAN context is established, andmaintained as part of the RAN context, so each gNB may acquire knowledgeabout the reliability group of the connected UEs.

The reliability group of the RAN (cells of gNBs) entities may bepre-configured by the O&M system in RAN. It may be possible for gNBs tolearn the reliability group neighboring cells as the Xn connectivitybetween the gNBs may be set up.

For connected mode mobility, the serving gNB may down-prioritizecandidate target cells that belong to different reliability group thanthe UE. The UE may hand over only to cells in the same reliabilitygroup. If cells in the same reliability group are not available (UE isout of the coverage of cells of its own reliability group or linkquality is below a given threshold) the UE may be handed over to a cellin another reliability group.

In case the UE connects to a cell in the wrong reliability group, thegNB may initiate a handover to a cell in the appropriate reliabilitygroup whenever such a suitable cell is available.

If redundant RAN coverage is available at a certain location, then UEsthat belong to the same terminal device may connect to different gNBsbased on the reliability group classification using the connected modemobility.

In an example, redundant transmission may be used over differentphysical transport paths in a core wireless network and RAN to enhancethe reliability of upper layer service. Whether redundant transmissionneed to be activated for a QoS Flow may be decided by the SMF based onlocal policies for the DNN or S-NSSAI, or by the PCF based on its QoSrequirement, UE's subscription and condition of network deployment.

In an example illustrated in FIG. 20, it is assumed that the reliabilityof UPF and control plane functions may be high enough to fulfill thereliability requirement of URLLC services served by these networkfunctions (NFs), and the UE may be under overlapping coverage of the twoRAN nodes. A single RAN node may not provide enough reliability in airinterface for the QoS flow, so the redundant packets may be transferredbetween UPF and UE via two independent N3 tunnel and two RAN nodes toenhance the reliability of service.

To ensure the two N3 tunnels can be transferred via disjointed transportlayer paths, the M-RAN (Master RAN or the first access) node, SMF or UPFmay provide different routing information in the tunnel information(e.g. different IP addresses or different Network Instances), and thisrouting information may be mapped to disjoint transport layer pathsaccording to network deployment configuration.

The redundant transmission may be based on the dual connectivityarchitecture, except that same PDU is transferred via both M-RAN andS-RAN (Secondary RAN or the second access node) nodes. With twodifferent NG-RAN nodes (first and second access nodes), separatetransport layer paths are used for redundant data transmission in userplane. A high reliability protocol layer is implemented on the UE andUPF to support packet replication and elimination function.

In an example illustrated in FIG. 18, it is assumed that the reliabilityof NG-RAN node, UPF and control plane NFs may be high enough to fulfilthe reliability requirement of ultra-reliable low latency servicesserved by these NFs. The reliability of single N3 tunnel may notconsidered high enough, e.g. due to the deployment environment ofbackhaul network, so the redundant packets may be transferred betweenUPF and RAN via two independent N3 tunnels, which may be associated witha single PDU session, over different transport layer path to enhance thereliability of service.

To ensure the two N3 tunnels may be set via disjointed transport layerpaths, the M-RAN node, SMF or UPF may provide different routinginformation in the tunnel information (e.g. different IP addresses ordifferent Network Instances), and this routing information may be mappedto disjoint transport layer paths according to network deploymentconfiguration.

In an example, the redundant transmission may be set based on two N3tunnels between a gNB and the UPF. The RAN node and UPF may support thepacket replication and elimination function.

Packet replication and elimination may be realized by modifying theGTP-U protocol. In case of downlink traffic, the UPF replicates thepacket from the DN and assigns the same GTP-U sequence number to themfor the redundant transmission. These packets are transmitted to theNG-RAN via the N3 Tunnel 1 and the N3 Tunnel 2 separately. Foreliminating the duplicated packet, the NG-RAN may forward the packetreceived first from either tunnel to the UE and may drop the replicatedpacket which has the same GTP-U sequence number as the forwarded packet.

In case of uplink traffic, the NG-RAN may replicate the packet and mayassign the same GTP-U sequence number to them and the UPF may eliminatethe duplicated packet based on the GTP-U sequence number.

In an example illustrated in FIG. 32, two separate paths may be extendedby inserting two Intermediate UPFs (I-UPFs) between the UPF acting asthe PDU session Anchor and the NG-RAN to support the redundanttransmission based on two N3 and N9 tunnels between a single NG-RAN modeand the UPF. The RAN node and UPF may support the packet replication andelimination function.

In an example illustrated in FIG. 32, there may be two N3 and N9 tunnelsbetween NG-RAN and UPF for redundant transmission. The UPF interfacingthe DN and may act as the traffic distributor for downlink traffic mayduplicates the packet of the URLLC service from the DN and may assignthe same GTP-U sequence number to them. These duplicated packets may betransmitted to I-UPF1 and I-UPF2 via N9 Tunnel 1 and N9 Tunnel 2separately. Each I-UPF may forward the packet with the same GTP-Usequence number which may be received from the UPF to NG-RAN via N3Tunnel 1 and N3 Tunnel 2 respectively. The NG-RAN may eliminate theduplicated packet based on the GTP-U sequence number. In case of ULtraffic, the NG-RAN acting as the Traffic Distributer for UL trafficduplicates the packet of the URLLC service for the UE and the UPF mayeliminate the duplicated packet.

An example solution may reduce latency and jitter caused by the dataforwarding and/or data path switch in a core network due to handover. Auser plane tunnel may be established and employed to transmit data ifthe DRB is established. This procedure may be referred to as enhancedhandover.

The enhanced handover may be dynamically provisioned at the SMF from UDMor PCF during PDU session establishment procedure. The enhanced handovermay be statically preconfigured in SMF. The SMF may retain theinformation (e.g., PDU session identifiers, type, and/or the like)essential for supporting enhanced handover for PDU sessions it maycontrol.

When handover is triggered by source RAN node, the SMF may duplicate thetunnel for the PDU session which may be associated to enhanced handover.The SMF may send the downlink data to source RAN and target RAN nodeuntil the handover may be completed.

In an example depicted in FIG. 33, a UE may be connected to Source RAN(S-RAN) and has a PDU session established with a remote PDU sessionanchor (PSA1). The network may have inserted a source uplink classifier(S-ULCL) that directs selected traffic to a local PDU session anchor(PSA2). The traffic flows exchanged via PSA-2 may be terminated in asource application server (S-AS) which is a user plane entity (e.g.content distribution server) that may be controlled by an AF.

At some point UE may be handed over to the Target RAN (T-RAN). In anexample, upon instantiation of the target uplink classifier (T-ULCL) aN9 forwarding tunnel may be created between the source uplink classifier(S-ULCL) and the T-ULCL.

The N9 forwarding tunnel may be maintained until all active trafficflowing on it ceases to exist for a configurable duration. T-ULCL may beconfigured with packet filters that may force uplink traffic fromexisting sessions (between UE and Source AS) on the path involvingT-RAN-T-ULCL-S-ULCL-PSA2. The S-ULCL may be configured to forward alldownlink traffic for this UE coming from S-AS into the N9 forwardingtunnel towards T-ULCL.

In an example, T-ULCL may be configured with packet filters that forceany new DNS requests (relating to the local DN) to go to the new localDN (via PSA3).

In an example, T-ULCL may be configured with packet filters that forceany traffic related to the Target Application Server (T-AS) in the newlocal DN (e.g. identified by a match between the destination IP addressof uplink packets and the IP address of T-AS) to go to the new local DN(via PSA3).

In an example, T-ULCL may be configured with packet filters that may letany remaining traffic go to the remote PDU session Anchor (PSA1).

SMF may send a late notification to AF to inform it about the DNAIchange (i.e. change of local PSA). Based on this notification the AF maytrigger the S-AS to use upper layer (e.g. IP level or HTTP level)mechanisms to redirect the ongoing traffic sessions towards a server inthe new local DN (i.e. towards Target AS).

In an example, a replicator may be defined that allows the wirelesssystem to be aware (e.g. detect or have explicit information) that twoor more “streams” of replicated packets belong together, and may guidethe lower layers to ensure these packets get an optimized treatment inthe 3GPP system depending on whether the streams are terminated in asingle UE or by two different UEs that belong together within the samehub-solution (e.g. TSN hub with two or more redundant 5G modems). Thisis to specifically ensure that 3GPP features are used optimally toensure that latency/availability/reliability requirements andexpectations of external duplication methods are fulfilled (e.g.including hybrid access solutions, IEEE 802.1CB, and/or the like.). Thereplicator may be applicable to any external multi-path mechanism evenif the multiple paths are not used in a redundancy fashion (i.e.,duplicating each packet on all paths) but for partly or fully disjointdata transmission.

An entity/functionality in the 3GPP system, refer as replicatorfunctionality, may be able to detect multiple related flows, and whetherthey are utilized for redundant packets, of incoming IP/Ethernet flowsat the transmitter side. Control plane aspects necessary for thereplicator functionality may reside in the SMF and the User planeaspects necessary for the replicator functionality may reside in theUPF.

The replicator may guide the lower layers to ensure their correspondinglatency/availability/reliability requirements are fulfilled. Thereplicator may forward the received replicas to the lower layers, byadding a header or other type of indication that tells the lower-layersto treat the packets as uncorrelated as possible. In an example, thereplicator may include manipulation of the incoming data, e.g.combining, excluding, or further replicating (among other operations)the incoming packets. For instance, create 3 packets based on the twoincoming replicas and make sure they are scheduled correctly. It mayonly forward a single or a subset of the packets to the lower-layer butscaling appropriately the QoS constraint to be fulfilled by the lowerlayers.

To ensure the two N3 tunnels can be transferred via disjointed transportlayer paths, the RAN node, SMF or UPF may provide different routinginformation in the tunnel information (e.g. different IP addresses ordifferent Network Instances), and the routing information may be mappedto disjoint transport layer paths according to network deploymentconfiguration.

At the receiver side, the receiver may translate and forward theinternal streams to the corresponding external network(s). To make ittransparent to the external network(s), further combine/remove/replicateoperations may be applied. The replicator at the receiver may use theheader information (or share explicit information with the replicatorentity at the other end) to translate/re-build packets according to theexternal network(s) requirements. In an example, for redundanttransmissions, all the duplicated packets may be forwarded to thereceiver host to ensure correct performance of the protocol, even ifonly a single packet was transmitted over the radio network. In anexample, for TSN applications, where the 5GS acts as a TSN ethernetbridge, the 5GS may need to forward a lower/equal/larger number ofpackets to the receiver host as specified in the 802.1CB standard.

An example FIG. 34 shows the user-plane system architecture. Thereplicator functionality may be a part of the UPF (or collocated withthe UPF) for user plane functionality and SMF for control planefunctionality. Multi-UE transceiver may be considered that encompassesvarious UEs with independent hardware and protocol stacks. Each gNB mayconsist of multiple distributed units (DU) attached to a central unit(CU).

In an example, the first access node may determine a need of havingpacket duplication of one or more sessions supported by the wirelessdevice based on one or more criteria. In an example, the one or morecriteria may comprise at least one CSI report received from the wirelessdevice. In an example, the one or more criteria may comprise ameasurement report (e.g. RRC layer message) received from the wirelessdevice, one or more received signal (e.g. sounding reference signal(SRS)) from the wireless device, and/or the like.

In an example, the wireless device may send a channel state information(CSI) report to the first access node. The CSI may be referred aschannel measurement information in an example embodiment. The CSI mayconstitute one or more parameters comprising a rank indicator (RI), aprecoding matrix index (PMI), a channel quality indicator (CQI), and/orprecoding type indicator (PTI). The wireless device may represent UE,wireless equipment, IAB-node, and/or like. The first access node and asecond access node mentioned in an example embodiment may represent basestation, gNB, gNodeB, eNB, eNodeB, RAN, NR, microcell, Integrated Accessand Backhaul (IAB) donor, IAB-node, master base station, MgNB, MeNB,secondary base station, SgNB, SeNB, and/or like.

The wireless device may perform CQI, PMI, RI measurements and may reportthem to the first access node. The RI may include information on achannel rank and indicate the number of streams that may be received viathe same time-frequency resource. Since RI may be determined bylong-term fading of a channel, it may be generally fed back at a cyclelonger than that of PMI or CQI. The PMI may represent a value reflectinga spatial characteristic of a channel and indicate a precoding matrixindex of the first access node preferred by the wireless device based ona metric of signal to interference plus noise ratio (SINR). The CQI mayrepresent information indicating strength of a channel and/or mayindicate a reception SINR that may be obtainable when the first accessnode uses PMI. The CQI may represent the CSI for sub-band and/orwide-band. The UE (the wireless device) may measure the reference signalin downlink and/or may map it to the CQI indexes that may have multiplevalues.

According to transmission mode of the wireless device, one or more CQI,PMI, and/or RI may be transmitted. Periodic transmission of CSI mayrefer to as periodic reporting and transmission of CSI at the request ofthe first access node may refer to as aperiodic reporting.

In aperiodic reporting, the first access node may transmit a request bitincluded in uplink scheduling information to the wireless device. Thewireless device may transmit CSI considering transmission mode thereofto the first access node, e.g. through a physical uplink shared channel(PUSCH). In periodic reporting, a period of CSI and/or an offset (e.g.timing offset) at the period may be signaled in a unit of subframes by asemi-static scheme through a higher-layer signal (e.g. an RRC message, aMAC CE, and/or a DCI) per wireless device. Precoding type (PTI) value inCSI report indicates type of CSI reporting provided by the wirelessdevice.

In an example, the determination of the need of having packetduplication of the one or more sessions may be based on at least one ofa quality of service (QoS) requirement of the one or more session,traffic load at the first access node and/or the second access node,service type of the session, a network operator policy, and/or the like.

In an example, the measurement report may comprise reference signalreceived power (RSRP) and/or reference signal received quality (RSRQ) ofone or more cells of the first access node (and/or the second accessnode), RSRP and/or RSRQ of one or more beams (e.g. synchronizationsignal (SS)/PBCH beam, CSI-RS beam, and/or the like) of one or morecells of the first access node (and/or the second access node). In anexample, if the RSRP and/or the RSRQ is equal to or lower than athreshold value (e.g. RSRP<α dB and/or RSRQ<β dB), the first access nodemay determine the need of packet duplication of the one or more session.

In an example, if received power and/or received quality of one or moresounding reference signals (SRS) of the wireless device is equal to orlower than a threshold value (e.g. received power of SRS(s)<γ dB and/orreceived quality of SRS(s)<δ dB) the first access node may determine theneed of packet duplication of the one or more sessions.

In an example embodiment, terms of packet duplication, packetreplication, packets copy, copy of packets may be used interchangeably.The terms may refer to one or more copies of packets of the firstsession. In an example, packet duplication may mean session duplication(e.g. duplication of packets may be interpreted as duplication of asession of the packets).

In an example, the wireless device may support packet duplication byduplicating packets at upper layer (e.g. application layer, PDU sessioncontrol layer, QoS flow control layer) of SDAP sublayer. The SDAPsublayer may receive a duplicated session (e.g. duplicated packets) ofan original session (e.g. original packets) and may map the duplicatedsession to one or more bearers (e.g. data radio bearer (DRB) and/orsignaling radio bearer (SRB)). In an example, the wireless device maysupport packet duplication by duplicating packets at the service dataadaptation protocol (SDAP) sublayer. The SDAP is responsible for QoSflow handling across an air interface of a wireless system. The SDAP maymap a specific QoS flow within the first session to a corresponding dataradio bearer (DRB) established with an appropriate level of QoS. TheSDAP may mark the transmitted packets with the correct QoS flowidentifier (QFI), ensuring that the packet receives the correctforwarding treatment as it traverses the wireless System. For a PDUsession, a single protocol entity of SDAP may be configured when single(first) access node is serving the wireless device. A separate SDAPconfiguration on the wireless device may be essential when the wirelessdevice may have dual connectivity having master cell group (MCG) bearer,split bearer or secondary cell group (SCG).

An example call flow illustrated in FIG. 14 may represent location oflogical function of duplication of packets and duplication elimination(DPDE) for duplicating and removing (e.g. discarding, deleting, gettingrid of) duplication of packets by the wireless device and in a proxythat may reside in a wireless system. In an example embodiment, DPDEfunction (DPDEF) may represent functionality provided for packetduplication and/or packet elimination (e.g. removal, discard, delete).This DPDEF in wireless device may be responsible for duplicating uplinkpackets and removing duplication of downlink packets. The proxy may be alogical entity responsible for duplicating downlink packets and removingduplication of uplink packets. In an example, the proxy may collocatewith the PDU session anchor (PSA) UPF. In an example, the proxy mayreside on an N6 interface between the PSA UPF and a data network as aseparate function.

An example call flow illustrated in FIG. 15 illustrates DPDEF in thewireless device. A SDAP session handling the first session may beduplicated to another SDAP session. In an example, the wireless devicemay use same session identifier as the first session for a duplicatedsession. In case of same session identifier being used for an originalsession and a duplicated session, session information of the duplicatedsession may comprise an indication field indicating that a correspondingsession is the duplicated session of the original session (e.g. thefirst session). In an example, the wireless device may decide to usedifferent session identifier from the first session for a duplicatedsession. Information of session identifier of duplicated session (e.g.whether a duplicated session employs same or different sessionidentifier with the first session (e.g. original session)) may bereferred as a duplication information in an example embodiment. Theduplication information may be exchanged with the peer handling DPDEF inthe network to facilitate duplicate elimination (e.g. discardingduplicated packets and/or packets of a duplicated session). In anexample, the wireless device may use separate message to exchangeinformation with the core network. In an example, the information may bepiggybacked with initial duplication activation related exchangehandling DPDEF in the peer DPDEF entity. In an example, the informationmay be exchanged with the peer DPDEF entity at the time of a sessionestablishment of the first session.

In an example, the wireless device may modify transport header ofpackets of the first session and/or the second session to define a fieldsuch as path id, connection id, list of intermediate nodes (e.g. accessnode and/or UPF via which the packets are transmitted), and/or the like.Use of the field of the transport header of packets may be communicatedwith the peer DPDEF entity in the core network prior to packetduplication activation.

In an example, the wireless device may reuse existing transport headerfield of the packets of first session and/or second session forduplication such as type of service, and/or the like. The reuse ofheader field may be communicated with the peer DPDEF entity in the corenetwork prior to packet duplication activation.

In an example, protocols such as NAS, combination of RRC and N2,combination of RRC and NAS, application protocol over HTTP, and/or thelike may be used between the wireless device and the SMF forcommunicating the duplication information with the peer duplicatingentity. The duplication information may be also forwarded to the firstUPF (PSA UPF) for identifying and discarding duplicate uplink packetsthat arrive at the later time for the first session and the secondsession from the wireless device. The duplication information may bealso forwarded to the first UPF (PSA UPF) for duplicating downlinkpackets and transmitting duplicate downlink packets for the firstsession and the second session to the wireless device. In an example,the duplication information may be provided to the first UPF at the timeof the core network configuration if the core network configuration isdone at the time of session establishment or session modification of thefirst session prior to the activation of duplication of the firstsession.

In an example, transmission of packets of the first session and thesecond (duplicated) session may be realized using a frame (packet)replication and elimination (e.g. discarding, deleting) for reliability(FRER) mechanism standardized in IEEE 802.1. The FRER mechanism may beapplicable at end devices (e.g. UE(s), UPF, PSA UPF) or collocated withentities within a network. Uplink packets of the first session may beduplicated, and sequence numbers may be added to the packet headers. Adifferent copy of the packets may be forwarded via disjoint paths (e.g.different access nodes, different UPFs, and/or different tunnels) in thenetwork. At proxy in the core network, the duplicate packets may beidentified based on the sequence numbers, and one copy (e.g. one oforiginal packet and duplicated packet) may be forwarded toward a datanetwork. In an example, a duplicate copy (e.g. duplicated packets) ofthe first session may be eliminated. The ordering of the packets mayalso be maintained at proxy in the core network based on the sequencenumbering. An FRER entity (e.g. wireless device, proxy, PSA UPF, and/orthe like) may play a replication role and/or an elimination role for thetwo different directions (e.g. downlink and/or uplink packettransmission). The FRER functionality and/or information of paths may besetup between the FRER entities (e.g. wireless device, proxy, PSA UPF,and/or the like) using protocols such as FRER handshake protocol, NAS,combination of RRC and N2, combination of RRC and NAS, applicationprotocol over HTTP, combination of DRB and GTP, and/or the like.

In an example, transmission of original and the second sessions may berealized by using a multipath transport control protocol (MP-TCP,multipath TCP, MP TCP and/or the like) mechanism standardized in IETF.The multipath transport control protocol may allow TCP connection to usemultiple paths using inverse multiplexer enabling a data stream to bebroken into multiple lower data rate communication links. In an example,MP TCP functionality may be present in the wireless device and in thenetwork (e.g. in PSA UPF, proxy over an N6 interface, and/or the like).An information for paths for transmitting packets of the first sessionand packets of the second session between two MP TCP entities (e.g.wireless device, proxy, MP TCP, proxy, and/or the like) may becommunicated prior to packet duplication activation using TCP three-wayhandshake. In an example, other protocols (NAS, combination of RRC andN2, combination of RRC and NAS, application protocol over HTTP,combination of DRB and GTP, and/or the like) may be used for paths andpath set up.

In an example, transmission of the first session and/or the secondsession may be realized by using a multipath quick user datagramprotocol internet connections (QUIC) (e.g. MP-QUIC, MP QUIC, multipleQUIC, and/or the like) mechanism standardized in IETF. This protocol mayallow user datagram protocol (UDP) connection to use multiple pathsusing multiplexes data streams having reduce or compress redundant datatransmissions. In an example, MP QUIC functionality may be present inthe wireless device and in the network (e.g. in PSA UPF, proxy over anN6 interface, and/or the like). An information of paths for transmittingpackets of the first session and packets of the second session betweentwo MP QUIC entities (e.g. wireless device, proxy, MP QUIC proxy, and/orthe like) may be communicated prior to packet duplication activationusing cryptographic handshake. In an example, other protocols (NAS,combination of RRC and N2, combination of RRC and NAS, applicationprotocol over HTTP, combination of DRB and GTP, and/or the like) may beused for paths and path set up. Lost packets carrying data for anindividual stream may impact only that specific stream.

In an example, transmission of the first session and the second sessionmay be realized by using multipath protocols such as concurrentmultipath routing, capillary routing, and/or the like.

In an example, transmission of the first session and the second sessionmay be realized by using combination of wireless protocols between thewireless device and entity in the wireless network (e.g. PSA UPF, proxywithin or co-located with the PSA UPF, standalone proxy resided on N6interface, and/or the like). Example of these protocols includecombination of RRC protocol and N2 protocol (mobility managementprotocol, S1-MME, and/or the like), combination of RRC protocol and NASprotocol, combination of NAS protocol and N2 (mobility managementprotocol, S1-MME, and/or the like) protocol, variation of HTTP-basedprotocol, and/or the like. The UE may be pre-configured to supporttransmission of duplicated packets. In an example, protocols (NAS,combination of RRC and N2, combination of RRC and NAS, applicationprotocol over HTTP, combination of DRB and GTP, and/or the like) may beused for paths and path set up.

In an example, the first session and/or the second session may beestablished via different network nodes (e.g. different access nodesand/or different UPFs). In an example, the first session may beestablished through the wireless device, the first access node, a firstUPF, and the second session may be established through the wirelessdevice, the second access node, a second UPF (and/or the first UPF). Anetwork node may forward/transmit original packets of the first sessionto a next network node where the first session is established. A networknode may forward/transmit duplicated packets of the duplicated session(e.g. the second session) to a next network node where the duplicatedsession (e.g. the second session) is established.

In an example, in response to determining the need of having packetduplication of one or more sessions of the wireless device, the firstaccess node may send an indication to an access and mobility managementfunction (AMF) requesting to activate packet duplication of the one ormore sessions (e.g. the first session).

In an example, the first access node may piggyback request (anindication) to activate packet duplication in a message (e.g. NGmessage, S1 message, PDU session resource modification indicationmessage, PDU session resource modification response message, PDU sessionresource notify message, E-RAB modification indication message, E-RABmodify response message, and/or the like) sent to the AMF.

In an example, the AMF may forward the received request to activatepacket duplication to a session management function (SMF). The SMF maydetermine support (e.g. allowance, acceptance, enabling, activation) ofduplication (e.g. duplication activation) based on information in aunified data management (UDM) for a user, a type of service supported bythe first session, a current traffic condition at the first UPFcontrolled by the SMF, traffic conditions of one or more UPFs (e.g. viawhich the first session and/or the duplicated session (the secondsession) is established), a core network configuration, a currentresource availability, one or more policy rules received from a policycontrol function (PCF), one or more operator policies configured at theSMF and/or the like. The result of the activation of packet duplicationis sent to the AMF using N2 (mobility management protocol, S1-MME,and/or the like) protocol. In an example, the SMF may receive trafficcondition information from the first UPF and/or the one or more UPFs,periodically and/or aperiodically (e.g. by requesting trafficinformation in response to receiving the packet duplication activationrequest).

In an example, in response to determining the support (e.g. allowance,acceptance, enabling, activation) of duplication (e.g. duplicationactivation), the SMF may send request to the first UPF for activatingpacket duplication of the first session (e.g. the one or more sessions).The SMF may check a status of the core network configuration. The corenetwork configuration for supporting packet duplication may beestablished at the time of the first session establishment. In anexample, if the core network configuration for supporting packetduplication was not established, the SMF may initiate core networkconfiguration. In an example, the type of core network configuration(e.g. no separate tunneling, separate tunneling with the first UPF,separate tunneling with the second UPF, and/or the like) for supportingduplicated packets may be pre-defined at the SMF. Based on the type ofcore network configuration set in the SMF, the SMF may initiate sessionmodification procedure with the first UPF for transmitting and receivingthe duplicated packets from the first access node or the second accessnode. The SMF may initiate session establishment procedure with thesecond UPF for transmitting and receiving the duplicated packets. Tunnelendpoints at the first access node or the second access node may also bemodified.

In an example, in response to determining the support of duplication(e.g. duplication activation), the SMF may send a response messageindicating the activation of packet duplication (e.g. sessionduplication) of the first session (e.g. the one or more sessions). TheAMF may forward/send/transmit response of the activation of packetduplication received from the SMF to the first access node. In anexample, the AMF may send the response of the activation of packetduplication to the first access node via an NG interface message (e.g.PDU session resource modify request message, PDU session resource modifyconfirm message, E-RAB modification confirm message, E-RAB modifyrequest message). In an example, the first access node may send amessage (e.g. an RRC message, an RRC connection reconfigurationmessage), e.g., using a radio resource control (RRC) protocol to thewireless device, the message informing the wireless device toinitiate/activate packet duplication. The first access node may send themessage (e.g. the RRC message) to the wireless device in response toreceiving the AMF response comprising acceptance of the activation ofpackets duplication. In an example, the first access node may piggybackrequest to activate packet duplication in an RRC message sent to thewireless device. In an example, the first access node may transmitrequest to activate packet duplication in a MAC layer control element(e.g. MAC CE) and/or a physical layer indication (e.g. a DCI) sent tothe wireless device. If the AMF response sent to the first access nodeindicates rejection of activation of packet duplication, the firstaccess node terminates packet duplication attempt.

In an example, in response to receiving the AMF response comprisingacceptance of the activation of packets duplication, the first accessnode may send/transmit an activation indication of packet duplication ofthe first session to the second access node. The activation indicationmay be transmitted via an Xn message (e.g. S-NODE modification requestmessage, S-NODE reconfiguration complete message, S-NODE modificationconfirm message, X2 message). In an example, based on the activationindication, the second access node may receive/transmit duplicatedpackets of the second session (e.g. the duplicate session).

In an example, the wireless device may respond to the first access nodeusing RRC protocol with the rejection of the activation of packetduplication. In this case, the first access node may send a message(e.g. PDU session release message, PDU session resource release message,PDU session modification request, PDU session resource modificationrequest, and/or the like) to the AMF indicating termination of thepacket duplication activation. The AMF may forward the messageindicating termination of the packet duplication to the SMF.

In an example, when the message indicating termination of the packetduplication activation (e.g. PDU session resource modify requestmessage, PDU session modification request message, PDU session resourcerelease request message, PDU session release request message, PDUsession update request message, PDU session modify request message,Nsmf_PDUSession_UpdateSMContext request operation,Nsmf_PDUSession_ReleaseSMContext request operation and/or the like)message is received at the SMF from the AMF, the SMF may send indicationof cancellation of packet duplication activation to the first UPF (e.g.N4 session modification request, N4 session deactivation request, and/orthe like). The first UPF may respond to the SMF with the response of thecancellation of packet duplication activation. In an example, if thecore network configuration is not pre-defined, the SMF may initiaterelease of resources established for supporting transmission of packetsof the second session, for example, by sending N4 session releaserequest, N4 session modification request, and/or the like. The SMF mayrespond to the AMF for the message indicating termination of the packetduplication activation (PDU session resource modify response message,PDU session modification response message, PDU session resource releaseresponse message, PDU session release response message, PDU sessionupdate response message, PDU session modify response message,Nsmf_PDUSession_UpdateSMContext response operation,Nsmf_PDUSession_ReleaseSMContext response operation and/or the like).The first access node may terminate packet duplication attempt.

In an example, the wireless device may respond to the first access nodeusing RRC protocol with the acceptance of the activation of packetduplication. In response to the acceptance of the activation, thewireless device may start sending packets and/or duplicated packets forthe first session and the second session using mechanism communicatedwith the peer DPDEF entity in the core network.

In an example, the core network configuration required for supportingduplication of packets may be established at the time of sessionestablishment procedure. In an example, the core network configurationmay be the same as transmitting packets for the first session. In anexample, the core network configuration may be established dynamicallywhen activation of the packet is triggered is received from the AMF. Thecore network configuration may be for supporting one path or may be forsupporting separate paths for transmitting the packets of the firstsession and second session. This example embodiment may supportactivation of duplicated packets with or without prior core networkconfiguration.

In an example as illustrated in FIG. 17, packets for the first sessionand second session may be transmitted and received using the same pathbetween the first access node and the first UPF where the first UPF isthe UPF currently supporting transmission of packets of the firstsession. The first UPF may be the PSA UPF. In another example asillustrated in FIG. 18, two separate independent routing paths may beused between the first access node and the first UPF to transmit packetsfor the first session and second session. In an example as illustratedin FIG. 18, separate paths may be used between a first UPF and theaccess network using two separate paths for transmission of the packetsfrom the first session and the second session. In an example asillustrated in FIG. 19, separate paths may be established between thefirst access node and the first UPF and between the first access nodeand a new intermediate UPF (second UPF) to transmit packets for thefirst session and second session. A separate tunnel may be establishedbetween the first UPF and the second UPF where the first UPF may be thePSA UPF. Uplink packets may be transmitted from the second UPF to thefirst UPF. The DPDEF in the core network (located at the PSA UPF, proxyover N6 interface and/or the like) may reorder uplink packets andeliminate duplicated packets based on the duplication information whichmay be exchanged prior to packet duplication activation. Duplicateduplink packets may be eliminated by DPDEF of the core network. The DPDEFin the wireless device may reorder downlink packets and eliminateduplicated packets based on the duplication information which may beexchanged prior to packet duplication activation. Duplicated downlinkpackets may be eliminated by DPDEF of the wireless device.

In an example where the wireless device may be having dual connectivity,separate paths for packets of the first session and second session maybe transmitted via master next generation nodeB (first access node) andsecondary next generation nodeB (second access node). Depending on thebearer mode (MCG bearer, SCG bearer or split bearer, and/or the like).In an example as illustrated in FIG. 20, these paths may be connected tothe first UPF where the packets of the first session from the firstaccess node may be transmitted via first tunnel between the first accessnode and the first UPF and the packets of the second session from thefirst access node may be transmitted via second tunnel between the firstaccess node and the second UPF. In another example as illustrated inFIG. 21, the first access node may be connected to the first UPF and thesecond access node may be connected to the second UPF. FIG. 22illustrates an example where the first access node may be connected tothe second UPF and the second access node may be connected to the firstUPF.

In an example, the first UPF may receive uplink packets of the firstsession and uplink packets of the second sessions. The first UPF may bethe PSA UPF. Based on the duplication information previously exchangedwith the wireless device, the SMF may identify packets of the secondsession as duplicate packets. The first UPF may reorder packets of firstsession and second session, identify and discard uplink packets of thefirst session or uplink packets of the second session arriving at thelater time to remove duplication.

In an example, the first access node may determine a need of removingpacket duplication of one or more sessions supported by the wirelessdevice based on at least one CSI report received from the wirelessdevice. In an example, this determination may be based on at least oneor more of a quality of service requirement of the session, traffic loadat the first access node, service type of the session, and/or the like.

In an example, the first access node may send an indication to the AMFrequesting it to deactivate packet duplication over N2 (mobilitymanagement protocol, S1-MME, and/or the like) protocol (e.g. PDU sessionresource modify request message, PDU session modification requestmessage, PDU session resource release request message, PDU sessionrelease request message, PDU session update request message, PDU sessionmodify request message, and/or the like). In an example, the firstaccess node may piggyback request (an indication) to deactivate packetduplication in a message sent to an AMF.

In an example, the AMF may forward the received request to deactivatepacket duplication to the SMF (e.g. PDU session resource modify requestmessage, PDU session modification request message, PDU session resourcerelease request message, PDU session release request message, PDUsession update request message, PDU session modify request message,Nsmf_PDUSession_UpdateSMContext request operation,Nsmf_PDUSession_ReleaseSMContext request operation and/or the like). TheSMF may send a message to the first UPF to deactivate packet duplication(e.g. N4 session modification request, N4 session deactivation request,and/or the like). If the core network configuration is supporteddynamically, the SMF may request the first UPF to deallocate a TNLaddress and/or may request the second UPF to release TNL address if thesecond UPF was requested earlier for transmitting packets of the firstsession or the second session. The SMF may send the result of thedeactivation of packet duplication to the AMF (e.g. PDU session resourcemodify response message, PDU session modification response message, PDUsession resource release response message, PDU session release responsemessage, PDU session update response message, PDU session modifyresponse message, Nsmf_PDUSession_UpdateSMContext response operation,Nsmf_PDUSession_ReleaseSMContext response operation and/or the like).

The AMF may forward response of the deactivation of packet duplicationreceived from the SMF to the first access node using N2 (mobilitymanagement protocol, S1-MME, and/or the like) protocol. In an example,the first access node may send a message (e.g. an RRC message, an RRCconnection reconfiguration message, and/or the like) using the RRCprotocol to the wireless device informing it to stop packet duplication.In an example, the first access node may piggyback request to deactivatepacket duplication in the RRC message sent to the wireless device. Thewireless device may deactivate packet duplication and send a result ofthe deactivation request to the first access node.

In an example when the core network configuration is not pre-defined atthe time of a session establishment of the first session, the SMF mayinitiate the core network configuration when it receives a message (PDUsession establishment request message, PDU session modification requestmessage, PDUSession_CreateSMContext request operation,PDUSession_UpdateSMContext request operation and/or the like) from theAMF requesting the activation of the duplication. In one example, theSMF may receive an indication requesting the activation of duplicationpiggybacked in a message. In another example, the SMF may receive aseparate message requesting the activation of the duplication. The firstaccess node may include at least one or more uplink transport networklayer (TNL) address (e.g. IP address, MAC address of correspondingtunnel (the first tunnel and/or the second tunnel)) of a first UPF inthe response to the first access node. In an example, if the packets ofthe second sessions are transmitted using a tunnel between the firstaccess node and the second UPF, the first access node may include atleast one or more uplink transport network layer (TNL) address of thesecond UPF.

In an example, the SMF may request the session modification of the firstUPF at the time of requesting the activation of the duplication. Inanother example, the SMF may request the session modification of thefirst UPF after requesting the activation of the duplication. Therequest for session modification may include at least one or moredownlink TNL address of a second UPF. In an example, the first UPF mayresponds to the SMF with at least one or more uplink TNL address of afirst UPF.

In an example, the SMF may request the session establishment of thesecond UPF. The request for session establishment may include at leastone or more uplink TNL address of a the first UPF. In an example, thefirst UPF may responds to the SMF with at least one or more uplink TNLaddress and/or the downlink TNL address of the second UPF.

In an example, the SMF may send a message (e.g. PDU session modificationrequest and/or the like) to the AMF including at least one or moreuplink TNL address of a the first UPF. In an example, the SMF may send amessage (e.g. PDU session modification request, PDU session updaterequest and/or the like) to the AMF including at least one or moreuplink TNL address of a the second UPF. The AMF may forward the messagereceived from the SMF to the first access node. The first access nodemay respond to the AMF with the downlink TNL address of the first UPF(e.g. PDU session modification response, session update response and/orthe like). In an example, the first access node may respond to the AMFwith the address of the downlink TNL address of the second UPF if thepath to transmit the packets of the second session includes the tunnelbetween the second UPF and the second access network. The AMF may sendthe response received from the first access node to the SMF.

In an example, the SMF may send a message (e.g. N4 session modificationrequest, and/or the like) including at least one or more the uplink TNLaddress of the first UPF, the downlink TNL address of the first accessnode or the downlink TNL address of the second access node to the secondUPF. The second UPF may send the response of the message to the SMF.

In an example, when the dual connectivity is supported by the wirelessdevice for the first session, the first access node may send anactivation of the duplication message to the second access node. In anexample, the activation of duplication may be piggybacked in a messagesent to the second UPF. The activation of duplication message mayinclude at least one or more an uplink TNL address of the first accessnode. The second access node may respond to the first UPF comprising atleast one or more of downlink uplink TNL address of the second accessnode.

If the wireless device is supporting SCG bearer for the first session,the duplication of uplink packets of the first session may be handled bythe second access node. The uplink packets of the first session from thewireless device may be transmitted by the second access node to thefirst UPF. The uplink packets of the second session may be received atthe first access node from the wireless device. These packets may besent to the second access node from the first access node after theduplication of packets at the second access node. The first access nodemay send these uplink packets received from the second access node tothe second UPF or to the first UPF based on the core networkconfiguration used.

The downlink packets received by the second access node from the firstUPF or the second UPF may be sent to the wireless device. The downlinkpacket of the second session received by the first access node may besent to the wireless device.

If the wireless device is supporting MCG bearer or split bearer for thefirst session, the duplication of uplink packets of the first sessionmay be handled by the first access node. The uplink packets of the firstsession from the wireless device may be transmitted by the first accessnode to the first UPF. The uplink packets of the second session may bereceived at the second access node from the wireless device. Thesepackets may be sent to the first access node from the second access nodeafter the duplication of packets at the first access node. The firstaccess node may send these uplink packets received from the secondaccess node to the second UPF or to the first UPF based on the corenetwork configuration used.

The downlink packets received by the first access node from the firstUPF may be sent to the wireless device. The downlink packet of thesecond session received by the second access node may be sent to thewireless device.

Based on the duplication information previously exchanged with the SMF,the wireless device may identify downlink packets of the second sessionas duplicate packets. The wireless device may re-order packets of firstsession and second session, identify and discard downlink packets of thefirst session or uplink packets of the second session arriving at thelater time to remove duplication.

Based on the duplication information previously exchanged with thewireless device, the first UPF may identify uplink packets of the secondsession as duplicate packets. The first UPF may re-order packets offirst session and second session, identify and discard uplink packets ofthe first session or uplink packets of the second session arriving atthe later time to remove duplication.

In an example, as illustrated in FIG. 23, the first access node mayreceive at least one channel measurement information from the wirelessdevice. The first access node may determine a need of a duplicationactivation of packets of the first session. The first access node maysend a first message indicating a packet duplication activationindication to the AMF. The AMF may forward the packet duplicationactivation indication to the SMF. The SMF may determine support ofduplication based on information in a unified data management (UDM) fora user, a type of service supported by the first session, a currenttraffic condition at the first UPF controlled by the SMF, a core networkconfiguration, a current resource availability, one or more policy rulesreceived from a policy control function (PCF), one or more operatorpolicies configured at the SMF and/or the like. The SMF may send a thirdmessage indicating the packet activation with the first UPF. Thedownlink packets of the first session may be duplicated by the firstUPF. The SMF may respond to the AMF with the result of the packetduplication activation by sending the second message once it receives aresponse of the packet duplication activation, a fourth message from thefirst UPF. If the result indicates acceptance of the packet duplicationactivation, the first access node may send a first RRC message to thewireless device. The wireless device may send the result of the packetduplication activation, a second RRC message to the first access node.The uplink packets of the first session may be duplicated by thewireless device. In an example, the packets from the first session andsecond sessions are transmitted between the first access node and thefirst UPF via the same path (tunnel).

In an example, as illustrated in FIG. 24, the first access node mayreceive at least one channel measurement information from the wirelessdevice. The first access node may determine a need of a duplicationactivation of packets of the first session. The first access node maysend a first message indicating a packet duplication activationindication to the AMF. The AMF may forward the packet duplicationactivation indication to the SMF. The SMF may determine support ofduplication based on information in a unified data management (UDM) fora user, a type of service supported by the first session, a currenttraffic condition at the first UPF controlled by the SMF, a core networkconfiguration, a current resource availability, one or more policy rulesreceived from a policy control function (PCF), one or more operatorpolicies configured at the SMF and/or the like. The SMF may send a thirdmessage indicating the packet activation with the first UPF. The SMF mayrespond to the AMF with the result of the packet duplication activationby sending the second message once it receives a response of the packetduplication activation, a fourth message from the first UPF. The fourthmessage from the first UPF sent to the SMF may comprise an uplink TNLaddress of the first UPF.

In an example, the SMF may send the uplink TNL address of the first UPFin a fifth message using N2 protocol to the AMF. The AMF may respond tothe SMF with a sixth message, comprising a downlink TNL address of thefirst access node. The AMF may forward the fifth message as a seventhmessage to the first access node. The response of the seventh messagemay be sent by the first access node to the AMF as an eighth message.

In an example, the access node may send the downlink TNL address of thefirst access node in a fifth message using N2 protocol to the AMF. TheAMF may respond to the first access node with a sixth message,comprising an uplink TNL address of the first UPF. The AMF may forwardthe fifth message as a seventh message to the SMF. The response of theseventh message may be sent by the SMF to the AMF as an eighth message.

If the seventh message indicates acceptance of the packet duplicationactivation, the first access node may send the first RRC message to thewireless device. The wireless device may send the result of the packetduplication activation, a second RRC message to the first access node.The uplink packets of the first session may be duplicated by thewireless device. In an example, the packets from the first session andsecond sessions are transmitted between the first access node and thefirst UPF via two different paths (tunnels).

In an example, as illustrated in FIG. 25, the first access node mayreceive at least one channel measurement information from the wirelessdevice. The first access node may determine a need of a duplicationactivation of packets of the first session. The first access node maysend a first message indicating a packet duplication activationindication to the AMF. The AMF may forward the packet duplicationactivation indication to the SMF. The SMF may determine support ofduplication based on information in a unified data management (UDM) fora user, a type of service supported by the first session, a currenttraffic condition at the first UPF controlled by the SMF, a core networkconfiguration, a current resource availability, one or more policy rulesreceived from a policy control function (PCF), one or more operatorpolicies configured at the SMF and/or the like. The SMF may send a thirdmessage indicating the packet activation with the first UPF. The SMF mayrespond to the AMF with the result of the packet duplication activationby sending the second message once it receives a response of the packetduplication activation, a fourth message from the first UPF. The fourthmessage from the first UPF sent to the SMF may comprise an uplink TNLaddress of the first UPF.

The SMF may send a request to the second UPF for an establishment of oneor more TNL addresses. The second UPF may respond to the SMF comprisinga downlink TNL address or an uplink TNL address. The SMF may forward theuplink TNL address of the first UPF to the second UPF and the downlinkTNL address of the second UPF. This path between the first UPF and thesecond UPF may be used to transmit uplink packets received at the secondUPF to the first UPF, where the first UPF may be the PSA UPF.

In an example, the SMF may send the uplink TNL address of the second UPFin a fifth message using N2 protocol to the AMF. The AMF may respond tothe SMF with a sixth message, comprising a downlink TNL address of thefirst or second access node. The AMF may forward the fifth message as aseventh message to the first access node. The response of the seventhmessage may be sent by the first access node to the AMF as an eighthmessage.

In an example, the access node may send the downlink TNL address of thefirst access node or the second access node in a fifth message using N2protocol to the AMF. The AMF may respond to the first access node with asixth message, comprising an uplink TNL address of the second UPF. TheAMF may forward the fifth message as a seventh message to the SMF. Theresponse of the seventh message may be sent by the SMF to the AMF as aneighth message.

If the seventh message indicates acceptance of the packet duplicationactivation, the first access node may send the first RRC message to thewireless device. The wireless device may send the result of the packetduplication activation, a second RRC message to the first access node.The uplink packets of the first session may be duplicated by thewireless device. The downlink packets of the first session may beduplicated by the first UPF, where the first UPF is also the PSA UPF. Inan example, the packets from the first session and second sessions aretransmitted between the first access node and the first UPF, between thefirst access node and the second UPF or between first access node andthe first UPF and between the second access node and the second UPF viatwo different paths (tunnels).

In an example, as illustrated in FIG. 24, the first access node mayreceive at least one channel measurement information from the wirelessdevice. The first access node may determine a need of a duplicationactivation of packets of the first session. The first access node maysend a first message indicating a packet duplication activationindication to the AMF. The AMF may forward the packet duplicationactivation indication to the SMF. The SMF may determine support ofduplication based on information in a unified data management (UDM) fora user, a type of service supported by the first session, a currenttraffic condition at the first UPF controlled by the SMF, a core networkconfiguration, a current resource availability, one or more policy rulesreceived from a policy control function (PCF), one or more operatorpolicies configured at the SMF and/or the like. The SMF may send a thirdmessage indicating the packet activation with the first UPF. The SMF mayrespond to the AMF with the result of the packet duplication activationby sending the second message once it receives a response of the packetduplication activation, a fourth message from the first UPF. The fourthmessage from the first UPF sent to the SMF may comprise an uplink TNLaddress of the first UPF.

The SMF may send a request to the second UPF for an establishment of oneor more TNL addresses. The second UPF may respond to the SMF comprisinga downlink TNL address or an uplink TNL address. The SMF may forward theuplink TNL address of the first UPF to the second UPF and the downlinkTNL address of the second UPF. This path between the first UPF and thesecond UPF may be used to transmit uplink packets received at the secondUPF to the first UPF, where the first UPF may be the PSA UPF.

In an example, the SMF may send the uplink TNL address of the second UPFin a fifth message using N2 protocol to the AMF. The AMF may respond tothe SMF with a sixth message, comprising a downlink TNL address of thefirst or second access node. The AMF may forward the fifth message as aseventh message to the first access node. The response of the seventhmessage may be sent by the first access node to the AMF as an eighthmessage.

In an example, the access node may send the downlink TNL address of thefirst access node or the second access node in a fifth message using N2protocol to the AMF. The AMF may respond to the first access node with asixth message, comprising an uplink TNL address of the second UPF. TheAMF may forward the fifth message as a seventh message to the SMF. Theresponse of the seventh message may be sent by the SMF to the AMF as aneighth message.

If the seventh message indicates acceptance of the packet duplicationactivation, the first access node may send the first RRC message to thewireless device. The wireless device may send the result of the packetduplication activation, a second RRC message to the first access node.The uplink packets of the first session may be duplicated by thewireless device. The downlink packets of the first session may beduplicated by the first UPF, where the first UPF is also the PSA UPF. Inan example, the packets from the first session and second sessions aretransmitted between the first access node and the first UPF, between thefirst access node and the second UPF or between first access node andthe first UPF and between the second access node and the second UPF viatwo different paths (tunnels).

In an example, as illustrated in FIG. 25, the first access node mayreceive at least one channel measurement information from the wirelessdevice. The wireless device may be using dual mode connectivity (SCGbearer, MCG bearer or split mode) for transmitting packets of the firstsession. The first access node may determine a need of a duplicationactivation of packets of the first session. The first access node maysend a first message indicating a packet duplication activationindication to the AMF. The AMF may forward the packet duplicationactivation indication to the SMF. The SMF may determine support ofduplication based on information in a unified data management (UDM) fora user, a type of service supported by the first session, a currenttraffic condition at the first UPF controlled by the SMF, a core networkconfiguration, a current resource availability, one or more policy rulesreceived from a policy control function (PCF), one or more operatorpolicies configured at the SMF and/or the like. The SMF may send a thirdmessage indicating the packet activation with the first UPF. The SMF mayrespond to the AMF with the result of the packet duplication activationby sending the second message once it receives a response of the packetduplication activation, a fourth message from the first UPF. The fourthmessage from the first UPF sent to the SMF may comprise an uplink TNLaddress of the first UPF.

In an example, the SMF may send the uplink TNL address of the first UPFin a fifth message using N2 protocol to the AMF. The AMF may respond tothe SMF with a sixth message, comprising a downlink TNL the secondaccess node. The AMF may forward the fifth message as a seventh messageto the first access node. The response of the seventh message may besent by the first access node to the AMF as an eighth message.

In an example, the access node may send the downlink TNL address of thesecond access node in a fifth message using N2 protocol to the AMF. TheAMF may respond to the first access node with a sixth message,comprising an uplink TNL address of the first UPF. The AMF may forwardthe fifth message as a seventh message to the SMF. The response of theseventh message may be sent by the SMF to the AMF as an eighth message.

If the seventh message indicates acceptance of the packet duplicationactivation, the first access node may send the first RRC message to thewireless device. The wireless device may send the result of the packetduplication activation, a second RRC message to the first access node.

In the wireless device is using MCG or split bearer mode, the wirelessdevice may transmit the packets of the first session to the first accessnode and transmit the packets of the second session to the second accessnode. The second access node may forward the received packets from thewireless device, of the second session to the first UPF and the firstaccess node may forward the received packets from the wireless device ofthe first session to the first UPF.

In the wireless device is using SCG bearer mode, the wireless device maytransmit the packets of the first session to the second access node andtransmit the packets of the second session to the first access node. Thesecond access node may forward the received packets from the wirelessdevice, of the first session to the first UPF and the first access nodemay forward the received packets from the wireless device of the secondsession to the first UPF.

The uplink packets of the first session may be duplicated by thewireless device. The downlink packets of the first session may beduplicated by the first UPF, where the first UPF is also the PSA UPF. Inan example, the packets from the first session and second sessions aretransmitted between the first access node and the first UPF, between thesecond access node and the first UPF via two different paths (tunnels).

In an example, as illustrated in FIG. 26, the first access node mayreceive at least one channel measurement information from the wirelessdevice. The wireless device may be using dual mode connectivity (SCGbearer, MCG bearer or split mode) for transmitting packets of the firstsession. The first access node may determine a need of a duplicationactivation of packets of the first session. The first access node maysend a first message indicating a packet duplication activationindication to the AMF. The AMF may forward the packet duplicationactivation indication to the SMF. The SMF may determine support ofduplication based on information in a unified data management (UDM) fora user, a type of service supported by the first session, a currenttraffic condition at the first UPF controlled by the SMF, a core networkconfiguration, a current resource availability, one or more policy rulesreceived from a policy control function (PCF), one or more operatorpolicies configured at the SMF and/or the like. The SMF may send a thirdmessage indicating the packet activation with the first UPF. The SMF mayrespond to the AMF with the result of the packet duplication activationby sending the second message once it receives a response of the packetduplication activation, a fourth message from the first UPF. The fourthmessage from the first UPF sent to the SMF may comprise an uplink TNLaddress of the first UPF.

The SMF may send a request to the second UPF for an establishment of oneor more TNL addresses. The second UPF may respond to the SMF comprisinga downlink TNL address or an uplink TNL address. The SMF may forward theuplink TNL address of the first UPF to the second UPF and the downlinkTNL address of the second UPF. This path between the first UPF and thesecond UPF may be used to transmit uplink packets received at the secondUPF to the first UPF, where the first UPF may be the PSA UPF.

In an example, the SMF may send the uplink TNL address of the second UPFin a fifth message using N2 protocol to the AMF. The AMF may respond tothe SMF with a sixth message, comprising a downlink TNL the secondaccess node. The AMF may forward the fifth message as a seventh messageto the first access node. The response of the seventh message may besent by the first access node to the AMF as an eighth message.

In an example, the access node may send the downlink TNL address of thesecond access node in a fifth message using N2 protocol to the AMF. TheAMF may respond to the first access node with a sixth message,comprising an uplink TNL address of the second UPF. The AMF may forwardthe fifth message as a seventh message to the SMF. The response of theseventh message may be sent by the SMF to the AMF as an eighth message.

If the seventh message indicates acceptance of the packet duplicationactivation, the first access node may send the first RRC message to thewireless device. The wireless device may send the result of the packetduplication activation, a second RRC message to the first access node.

In the wireless device is using MCG or split bearer mode, the wirelessdevice may transmit the packets of the first session to the first accessnode and transmit the packets of the second session to the second accessnode. The second access node may forward the received packets from thewireless device, of the second session to the first UPF and the firstaccess node may forward the received packets from the wireless device ofthe first session to the first UPF.

In the wireless device is using SCG bearer mode, the wireless device maytransmit the packets of the first session to the second access node andtransmit the packets of the second session to the first access node. Thesecond access node may forward the received packets from the wirelessdevice, of the first session to the first UPF and the first access nodemay forward the received packets from the wireless device of the secondsession to the first UPF.

The uplink packets of the first session may be duplicated by thewireless device. The downlink packets of the first session may beduplicated by the first UPF, where the first UPF is also the PSA UPF. Inan example, the packets from the first session and second sessions aretransmitted between the first access node and the first UPF and betweenthe second access node and the second UPF or between the first accessnode and the second UPF and between the second access node and the firstUPF via two different paths (tunnels).

In an example, as illustrated in FIG. 27, the first access node mayreceive at least one channel measurement information from the wirelessdevice. The first node may determine packet duplication. The firstaccess node may send the packet duplication indication to the SMF viathe AMF using N2 protocol. The SMF may decide to accept the packetduplication. The SMF may send a result of the decision to the firstaccess node via the AMF.

If the SMF accepts the session duplication request, the first accessnode may send a message (e.g. an RRC connection reconfiguration message,and/or the like) using RRC protocol indicating the packet duplication tothe wireless device. If the wireless device accepts the packetduplication message, it may respond to the first access node using theRRC protocol and start duplication of the packets of the first session.

If the SMF does not accept the session duplication request, the firstaccess node may terminate the packet duplication attempt.

If the wireless device does not accept the packet duplication requestfrom the first access node, the first access node indicates terminationof the packet duplication attempt to the SMF via the AMF. The SMF mayindicate the termination of the packet duplication to the first UPF. Thefirst UPF release uplink TNL address if it was allocated by the firstUPF after receiving the packet duplication request from the SMF. The SMFmay also indicate release of TNL addresses to the second UPF.

In an example, as illustrated in FIG. 28, the first access node mayreceive at least one channel measurement information from the wirelessdevice. The first node may determine packet duplication. The firstaccess node may send the packet duplication indication to the SMF viathe AMF using N2 protocol. The SMF may decide to accept the packetduplication. The SMF may send a result of the decision to the firstaccess node via the AMF.

If the SMF accepts the session duplication request, the SMF may send amessage (PDU session establishment request message, PDU sessionmodification request message, PDU session activation request messageand/or the like) using NAS protocol (e.g. SM-NAS and/or NAS message viathe AMF) indicating the packet duplication to the wireless device. Ifthe wireless device accepts the packet duplication message, it mayrespond to the SMF using the NAS protocol and start duplication of thepackets of the first session. Messages sent using NAS protocol may betransmitted via the first access node and the AMF. In an example, themessage using NAS protocol may be transmitted via an RRC message (e.g.DL information transfer message, RRC connection reconfiguration message,and/or the like) from the first access node to the wireless device. Thefirst access node may receive the message using NAS protocol from theAMF via an NG interface message and/or S1 interface message (e.g.downlink NAS transport message, PDU session resource setup requestmessage, PDU session resource release command, PDU session resourcemodify request, PDU session resource modify confirm message, initialcontext setup request message, handover request message, and/or thelike).

In an example, the wireless device may respond to the AMF (and/or SMF)via the first access node using NAS protocol with the rejection of theactivation of packet duplication. In an example, the AMF may forward themessage (PDU session release request message, PDU session modificationrequest and/or the like) indicating termination of the packetduplication to the SMF. In an example, the message (e.g. responsemessage) using NAS protocol may be transmitted via an RRC message (e.g.UL information transfer message, RRC connection resume complete message,RRC connection setup complete message, and/or the like) from thewireless device to the first access node. The first access node maytransmit/forward the message (e.g. response message) using NAS protocolto the AMF and/or the SMF via an NG interface message and/or S1interface message (e.g. uplink NAS transport message, initial UEmessage, PDU session resource setup response message, PDU sessionresource release response message, PDU session resource modify responsemessage, PDU session resource modify indication message, and/or thelike).

In an example, when the message indicating termination of the packetduplication activation is received at the SMF, the SMF may sendindication of cancellation of packet duplication activation to the firstUPF. The first UPF may respond to the SMF. In an example, if the corenetwork configuration is not pre-defined, the SMF may initiate releaseof resources established for supporting transmission of packets of thesecond session. The SMF may respond to the first access node. The firstaccess node may terminate packet duplication attempt.

In an example, the wireless device may respond to the AMF (and/or SMF)using NAS protocol with the acceptance of the activation of packetduplication. In response to the acceptance of the activation, thewireless device may start sending packets and duplicated packets for thefirst session and the second session using mechanism communicated withthe peer DPDEF entity in the core network.

If the SMF does not accept the session duplication request, the firstaccess node may terminate the packet duplication attempt.

If the wireless device does not accept the packet duplication requestfrom the SMF, the SMF indicates termination of the packet duplicationattempt to the first access node via the AMF. The SMF may indicate thetermination of the packet duplication to the first UPF. The first UPFrelease uplink TNL address if it was allocated by the first UPF afterreceiving the packet duplication request from the SMF. The SMF may alsoindicate release of TNL addresses to the second UPF.

In an example, as illustrated in FIG. 29, the first access node mayreceive at least one channel measurement information from the wirelessdevice. The first node may determine packet duplication. The firstaccess node may send the packet duplication indication to the wirelessdevice using the RRC protocol. The wireless device may send a result ofthe activation duplication to the first access node and may startduplication of the packets of the first session

If the wireless device accepts the session duplication request from thefirst access node, the wireless device may send a message (PDU sessionestablishment request message, PDU session modification request message,PDU session activation request message and/or the like) using NASprotocol indicating the packet duplication to the SMF via AMF. If theSMF accepts the packet duplication message, it may respond to thewireless device using the NAS protocol. Messages sent using NAS protocolare transmitted via the first access node and the AMF.

If the wireless device does not accept the packet duplication requestfrom the first access node, the first access node may terminate thepacket duplication attempt.

If the SMF does not accept the packet duplication request from thewireless device, the wireless device may indicate failure to the firstaccess node. The first access node and the wireless device may terminatethe packet duplication attempt.

In an example embodiment, a first access node may receive a channelmeasurement information from a wireless device. The first access nodemay determine an activation of a packet duplication of a session of thewireless device based on the channel measurement information. The firstaccess node may send a first message indicating an activation of thepacket duplication of the session to an AMF. The first access node mayreceive the response of the first message, a second message indicatingacceptance of the activation from the AMF. The first access node maysend a first RRC message indicating the activation of the packetduplication of the session to the wireless device. The first access nodemay receive a second RRC message indicating a completion of theactivation from the wireless device.

In an example, the first a access node may receive first (original)packets of a first (original) session from the wireless device. Thefirst access node may send to a UPF second (duplicated) packets, whereinthe second packets are a duplication of the first packets.

In an example, the first access node may receive first packets of thefirst session from the wireless device. The first access node may sendto a UPF the first packets and second packets via a tunnel between thefirst access node and the UPF, wherein the second packets are aduplication of the first packets.

In an example, the first access node may receive first packets of thefirst session from the wireless device. The first access node may sendto a UPF the first packets via a first tunnel between the first accessnode and the first UPF. The first access node may send second packets toa second UPF via a second tunnel between the first access node and thesecond UPF, wherein the second packets are a duplication of the firstpackets.

In an example, the first UPF may be the second UPF.

In an example, the first UPF may be a PSA UPF.

In an example, the first access node may receive from the wirelessdevice first packets of the first session. The first access node maysend to a first UPF, the first packets of the session via a first tunnelbetween the first access node and the first UPF. The first access nodemay receive second packets from the wireless device. The first accessnode may send to a first UPF, the second packets of the session via afourth tunnel between the second access node and the first UPF.

In an example, the first UPF may be the second UPF.

In an example, the first access node may receive from the wirelessdevice first packets of the first session. The first access node maysend to a first UPF, the first packets of the session via a first tunnelbetween the first access node and the first UPF. A second access nodemay receive second packets from the wireless device. The second accessnode may send to a second UPF, the second packets of the session via afifth tunnel between the second access node and the second UPF.

In an example, the first UPF may be the second UPF.

In an example, the first UPF may be a PSA UPF.

In an example, the channel measurement information may comprise at leastone of a channel quality indicator (CQI), a precoding matrix indicator(PMI), a precoding type indicator (PTI); or rank indication (RI).

In an example, the first access node may determine the packetduplication of the session based on at least one of a quality-of-servicerequirements of the session, traffic load of the first access node, anetwork slice selection assistance information, a subscriptioninformation or a session/slice type.

In an example, the AMF may send a third message indicating an activationof the packet duplication of the session to an SMF. The AMF may receivea fourth message indicating acceptance of the activation.

In an example, the second message may comprise at least one of an uplinktransport network layer (TNL) address of a first UPF.

In an example, the fourth message may comprise at least one of an uplinkTNL address of the first UPF.

In an example, the second message may comprise at least one of an uplinkTNL address of the second UPF.

In an example, the fourth message further comprises at least one of anuplink TNL address of the second UPF.

In an example, the AMF may receive from an SMF a fifth message as arequest for session modification comprising at least one of an uplinkTNL address of a first UPF or a duplication information. The AMF maysend a sixth message indicating a result of session modification,comprising at least one of a downlink TNL address of the first accessnode.

In an example, the first access node may receive from the AMF, a seventhmessage for session modification, in response to receiving a fifthmessage, comprising at least one of an uplink TNL address of a firstUPF. The first access node may send to the AMF an eighth messageindicating a result of session modification, comprising at least one ofa downlink TNL address of the first access node.

In an example, the first access node may send to a second access node, aninth message indicating an activation of the packet duplication of thesession. The first access node may receive from the second access node atenth message comprising at least one of a downlink TNL address of thesecond access node.

In an example, the first access node may send to a second access node, aninth message indicating an activation of the packet duplication of thesession. The first access node may send to a first UPF, a second packetsin response to receiving the ninth message.

In an example, the second access node may send to a second UPF, secondpackets in response to receiving the ninth message.

In an example, the AMF may receive from the SMF, a fifth message as arequest for session modification, comprising at least one of an uplinkTNL address of a second UPF. The AMF may send the SMF, a sixth messageindicating a result of session modification, comprising at least one ofa downlink TNL address of a second access node. In an example, thesecond UPF may be the first UPF. In an example, the second access nodemay be the first access node.

In an example, the first access node may receive from the AMF, a seventhmessage in response to receiving a fifth message, comprising at leastone of an uplink TNL address of a second UPF. The first access node maysend an eighth message indicating a result of session modification,comprising at least one of a downlink TNL address of the second accessnode. In an example, the second UPF may be the first UPF. In an example,the second access node may be the first access node.

In an example, the SMF may send to the first UPF, a ninth messageindicating an activation of the packet duplication of the session,comprising a duplication indicator or a duplication information. The SMFmay receive from the first UPF, a tenth message indicating acceptance ofthe activation.

In an example, am SMF may send the AMF, a fifth message as a request forsession modification, comprising at least one of a downlink TNL addressof a second access node. The AMF may receive from the SMF, a sixthmessage indicating a result of session modification, comprising at leastone of an uplink TNL address of a second UPF.

In an example, the first access node may send to the AMF a seventhmessage, comprising at least one of an uplink TNL address of a secondaccess node. The first access node may receive from the AMF, an eighthmessage indicating a result of session modification, comprising at leastone of an uplink TNL address of a second UPF.

In an example, the first access node may receive a channel measurementinformation from a wireless device. The first access node may determinea deactivation of the packet duplication of the session of the wirelessdevice based on the channel measurement information. The first accessnode may send an eleventh message indicating the deactivation of thepacket duplication of the session to the AMF. The first access node mayreceive a twelfth message indicating acceptance of the deactivation fromthe AMF. The first access node may send a third RRC message indicatingthe deactivation of the packet duplication of the session to thewireless device. The first access node may receive a fourth RRC messageindicating a completion of the deactivation from the wireless device.

In an example, the AMF may send to an SMF, a thirteenth message inresponse to receiving eleventh message. The AMF may receive a fourteenthmessage indicating acceptance of the deactivation from the SMF.

In an example, the first access node may send a fifteenth messageindicating the deactivation of the packet duplication of the session toa second access node. The first access node may receive a sixteenthmessage indicating a completion of the deactivation from the secondaccess node.

In an example, the first access node may receive an eighteenth messagefor a duplication configuration supporting the session and a secondsession from the wireless device where the second session is duplicationof the first session.

In an example, the first access node may send a nineteenth message for aduplication configuration supporting the session and a second session tothe AMF, where the second session is duplication of the first session.The first access node may receive a twentieth message in response to thenineteenth message from the AMF.

In an example, the AMF may send a twenty first message for a duplicationconfiguration supporting the session and a second session where thesecond session is duplication of the first session to an AMF. The AMFmay receive a twenty second message in response to the nineteenthmessage from the AMF.

A first access node may receive a channel measurement information from awireless device. The first access node may determine an activation of apacket duplication of a session of the wireless device based on thechannel measurement information. The first access node may send a firstmessage indicating an activation of the packet duplication of thesession to an AMF. The first access node may receive a first non-accessstratum (NAS) message indicating the activation of the packetduplication of the session from the AMF. The first access node may senda second NAS message indicating the activation of the packet duplicationof the session to the wireless device.

In an example, the AMF may send a second message indicating theactivation of the packet duplication of the session to an SMF. The AMFmay receive a third message indicating an acceptance of the activationfrom the SMF.

In an example, the first access node may receive a fourth messageindicating acceptance of the activation from the AMF.

In an example, the first access node may receive a third NAS messageindicating an acceptance of the activation from the wireless device. Thefirst access node may send a fourth NAS message indicating an acceptanceof the activation.

In an example, the AMF may receive a fifth NAS message indicating theactivation of the packet duplication of the session from an SMF. The AMFmay send a sixth NAS message indicating an acceptance of the activationto the SMF.

In an example, a first access node may receive a channel measurementinformation from a wireless device. The first access node may determinea deactivation of a packet duplication of a session of the wirelessdevice based on the channel measurement information. The first accessnode may send a fifth message indicating the deactivation of the packetduplication of the session to the AMF. The first access node may receivea seventh non-access stratum (NAS) message indicating the deactivationof the packet duplication of the session from AMF. The first access nodemay send an eighth NAS message indicating the deactivation of the packetduplication of the session to the wireless device.

In an example, the AMF may send a sixth message indicating thedeactivation of the packet duplication of the session to an SMF. The AMFmay receive a seventh message indicating an acceptance of thedeactivation from the SMF.

In an example, the first access node may receive an eighth messageindicating acceptance of the deactivation from the AMF.

In an example, the first access node may receive a ninth NAS messageindicating an acceptance of the deactivation from the wireless device.The first access node may send a tenth NAS message indicating anacceptance of the deactivation to the AMF.

In an example, the AMF may receive an eleventh NAS message indicatingthe deactivation of the packet duplication of the session from an SMFThe AMF may send a twelfth NAS message indicating an acceptance of thedeactivation to the SMF.

In an example, a first access node may receive a channel measurementinformation from a wireless device. The first access node may determinean activation of a packet duplication of a session of the wirelessdevice based on the channel measurement information. The first accessnode may send a first radio resource control (RRC) message indicating anactivation of the packet duplication of the session to the wirelessdevice. The first access node may receive a first non-access stratum(NAS) message indicating the activation of the packet duplication of thesession from the wireless device. The first access node may send asecond NAS message indicating the activation of the packet duplicationof the session to an AMF.

In an example, the first access node may receive a second RRC messageindicating acceptance of the activation from the wireless device.

In an example, the first access node may receive a third NAS messageindicating acceptance of the activation from the AMF.

In an example, the first access node may send a fourth NAS messageindicating acceptance of the activation from the wireless device.

In an example, the AMF may send a fifth NAS message indicating theactivation of the packet duplication of the session to an SMF. The AMFmay receive a sixth NAS message indicating an acceptance of theactivation from the SMF.

In an example, a first access node may receive a channel measurementinformation from a wireless device. The first access node may determinea deactivation of a packet duplication of a session of the wirelessdevice based on the channel measurement information. The first accessnode may send a third radio resource control (RRC) message indicating adeactivation of the packet duplication of the session to a wirelessdevice. The first access node may receive a seventh non-access stratum(NAS) message indicating the deactivation of the packet duplication ofthe session from the wireless device. The first access node may send aneighth NAS message indicating the deactivation of the packet duplicationof the session to the AMF.

In an example, the first access node may receive from the wirelessdevice, a fourth RRC message indicating acceptance of the deactivation.

In an example, the first access node may receive from the AMF, a ninthNAS message indicating acceptance of the deactivation.

In an example, the first access node may send to the wireless device, atenth NAS message indicating acceptance of the deactivation.

In an example, the AMF may send an eleventh NAS message indicating thedeactivation of the packet duplication of the session to an SMF. The AMFmay receive a twelfth NAS message indicating an acceptance of thedeactivation from the SMF.

High reliability may be difficult to achieve by single path on userplane. A redundant transmission for services requiring low latency andhigh reliability may be essential. Depending on the condition of networkdeployment, e.g. which network function or network segments cannot meetthe requirements of reliability, the redundant transmission may beapplied on the user plane path between the UE and the network.

Existing or next generation wireless system (4G, 5G, fifth generation,NR, LTE, EPC, next generation core, and/or the like) may require lowlatency, low jitter and high reliability. Existing solutions may provideprocedures for establishing, modifying or releasing one or more tunnelsfor redundant packet transmission on N3 interface for communicationbetween an access node and user plane function and N9 interface forcommunication between user plane functions.

In an example, session duplication (and/or packet duplication) may benecessary or inefficient depending on network congestion status, networklink reliability status, and/or radio link conditions. Configuring orreleasing a duplicate session of an original session (a session) mayrequire signaling messages among a wireless device, access nodes (gNBs,eNBs), and/or core network nodes (e.g. AMF, SMF, UPF, UDM, PCF, and/orthe like). In an existing technology, configuration or release ofsession duplication in response to dynamically changing network statusand radio conditions may increase signaling overhead among network nodesand/or may increase adaptation delay to current network status (e.g.enabling/disabling delay for session (packet) duplication). An existingtechnology may decrease packet transmission reliability and servicequality of wireless devices. Instead of configuring or releasing packets(session) duplication setup, an implementation of example embodimentsprovides dynamic activation and/or deactivation mechanisms of aconfigured duplication of the packets (e.g. sessions), based on networkstatus and radio conditions. An implementation of example embodimentsprovides how duplication activation/deactivation is achieved at theaccess node and at the entity in the core network (e.g. packet data unitsession anchor (PSA) user plane function (UPF), user plane function,UPF). An implementation of example embodiments may decrease signalingoverhead and/or decrease configuration latency for session duplicationconfiguration/release by activating/deactivating configured packetduplication depending on network status and/or radio condition changes.An implementation of example embodiments may increase packettransmission reliability and service quality in the wireless network. Animplementation of example embodiments may allow efficient use of networkresources.

An example embodiment may provide solution for determining a need of aduplication of packets by the access node and mechanism to dynamicallyactivate and deactivate duplication of the packets of the session at theaccess node. The duplication of uplink packets may be provided by theaccess node and the duplication of downlink packets may be provided by auser plane entity in the network (e.g. PSA UPF, UPF). An exampleembodiment may provide mechanism to configure a core network when theactivation is triggered by the access node. Various transmissionmechanisms may be employed to handle original and duplicated packets ofthe session between the entities (e.g. access node and PSA UPF) handlingpacket duplication and duplication elimination using same or separatepaths. In an example, separate paths may be disjoint paths.

There may be one or more options for achieving redundancy depending onwhich path is exposed to possibility of a frequent failure. In anexample, there may be a mechanism to ensure duplication over an airinterface between a wireless device and one or more access nodes (e.g.base stations, gNBs, eNBs). An activation of duplication procedure ormechanism may provide duplicating packets of an original session in tocopy of one or more sessions (second session) and transmitting packetsof the first session and the second session over one or more user planepaths involving N3 interface, N9 interface and/or the like. An exampleembodiment may provide mechanism for duplication of a PDU session (firstsession) for uplink packets of the application at the access node andduplication elimination of the received downlink packets received from awireless core network at the wireless device. An example embodiment mayprovide mechanism for duplication of the first session for downlinkpackets received from a data network and duplication elimination of thereceived uplink packets from the access node at a PSA UPF. Adetermination of the activation of duplication of the original PDUsession may be done by the access node serving the original session. Amechanism to ensure transmission of duplicated packets between these twoentities (access node and PSA UPF) may include the activation ofduplication and/or an establishment of one or more tunnels between theaccess node and the PSA UPF.

In an example, a wireless device may set up one or more redundant PDUsessions (e.g., two redundant PDU sessions) over the 5G network, so thatthe network may attempt to make the paths of the two redundant PDUsessions independent whenever that is possible. In an example, upperlayer protocols, such as the IEEE TSN (Time Sensitive Networking) FRER(Frame Replication and Elimination for Reliability), to manage thereplication and elimination of redundant packets/frames over theduplicate paths which may span both the wireless network and possiblyfixed network segments. Other upper layer protocols, including IP basedones such as a DetNet based solution may also be employed for redundantpacket transmission over one or more paths or for managing a backup pathin addition to the active path.

In an example as illustrated in FIG. 46, a wireless network may providetwo paths from the device: the first (packet data unit) PDU sessionspans from the UE via a first access node to a first UPF (UPF1) actingas the PSA UPF, and a second PDU session spans from the UE via a secondaccess node to UPF2 acting as the PSA UPF. Based on these twoindependent PDU sessions, two independent paths are set up, which mayspan beyond wireless network. There are two paths set up between Host Ain the device and Host B, with one or more intermediate nodes. Theredundancy handling function (RHF) entities that may reside in Host Aand Host B make use of the independent paths. The IEEE TSN FRER may bean example for an RHF. For Host A within the device, the two PDUsessions appear as different networking interfaces, making the hostmulti-homed. In an example, other solutions may be employed, whereredundancy spans up to an intermediate node.

An example may be based on the dual connectivity feature that issupported both by LTE and NR. A single UE may have user planeconnectivity with both the first access node (MgNB or first access node)and the second access node (SgNB or second access node). The radioaccess network (RAN) control plane and N1 interface may be handled viathe MgNB. The MgNB may control the selection of SgNB and the setup ofthe dual connectivity feature via the Xn interface. The UE may set up(e.g., configure or establish) two PDU sessions, one via MgNB to UPF1acting as a first PSAUPF, and another one via SgNB to UPF2 acting as asecond PSA UPF. UPF1 and a second UPF (UPF2) may connect to the sameData Network (DN), even though the traffic via UPF1 and UPF2 might berouted via different user plane nodes within the DN. UPF1 and UPF2 arecontrolled by SMF1 and SMF2, respectively, where SMF1 and SMF2 maycoincide depending on operator configuration of the SMF selection.

An example may differ from the RAN based Packet Data ConvergenceProtocol (PDCP) packet duplication function which may be internal toRAN, and the packet duplication takes place between the UE and the MgNB.The redundant paths may span the whole system including RAN and corenetwork.

Two options may be provided for the selection of the UPFs and the gNBs.In an example, a static approach for UPF selection that may take placebefore the SgNB may be selected in RAN; this may be applicable to IPbased PDU sessions, Ethernet based PDU sessions, non-IP based PDUsessions, unstructured PDU sessions, and/or the like. In an example, adynamic approach for UPF selection, which enhances the static approachwhich may take into considerations the SgNB selected in RAN. This may beapplicable to Ethernet PDU sessions.

The solution may comprise one or more SMFs. In an example embodiment,two SMFs may be employed. In an example, a single SMF may be employed.If two SMFs are employed, the SMFs may be aware that the sessions areredundant (e.g., one or more, or two distinct/disjoint sessions). Incase of more than one SMFs are used, the SMFs may be configured to havedifferent UPF pool for avoiding reuse of same UPF by different SMFs.

SMF(s) may be aware of redundant sessions using, e.g. UE providingindication regarding redundant PDU session and proper provisioningduring UPF selection.

In an example, a wireless device may set up one or more redundant PDUsessions (e.g., request establishment/configuration) over the 5Gnetwork, so that the network may establish/configure separate,independent, and/or disjoint paths for one or more redundant PDUsessions. It may be possible to rely on upper layer protocols, such asthe IEEE TSN (Time Sensitive Networking), to manage the replication andelimination of redundant packets/frames over one or more paths which mayspan both the wireless network and possibly fixed network segments.Other upper layer protocols, including IP based (e.g. DetNet) may bepossible for redundant packet transmission over one or more paths or formanaging a backup path in addition to the active path.

In an example, a terminal device may be equipped with more than one UEs(wireless devices). In an example as illustrated in FIG. 47, when theterminal device may be equipped with two UEs, the first PDU session mayspan from a first wireless device (UE1) via gNB1 to UPF1, while thesecond PDU session may span from a second wireless device (UE2) via gNB2to UPF2. Based on these two independent PDU sessions, two independentpaths are set up, which may span even beyond the wireless network. In anexample, there may be two paths set up between Host A and Host B, withsome (optional) fixed intermediate nodes. The redundancy handlingfunction (RHF) entities that reside in Host A and Host B make use of theindependent paths. The IEEE TSN FRER may be an example of a RHF. ForHost A within the terminal device, the two UEs may provide differentnetworking interfaces, making the host redundantly connected. In anexample, other solutions are also possible, where redundancy spans onlyup to an intermediate node and not to the end host.

In an example, an integration of one or more UEs into a device may beemployed and may assume a RAN deployment where redundant coverage by oneor more gNBs may be available. One or more PDU sessions may be set upfrom the UEs, which use independent RAN (gNB) and CN (UPF) entities. Asillustrated in FIG. 47, UE1 and UE2 may be connected to gNB1 and gNB2,respectively and UE1 sets up a PDU session via gNB1 to UPF1, and UE2sets up a PDU session via gNB2 to UPF2. UPF1 and UPF2 connect to thesame DN, even though the traffic via UPF1 and UPF2 might be routed viadifferent user plane nodes within the DN. UPF1 and UPF2 may becontrolled by SMF1 and SMF2, respectively.

For handling the reliability grouping of UEs, a new system parameter UEreliability group (UE RG) may be defined. This parameter may beconfigured explicitly to the UE and sent in a registration requestmessage to the network, it may be a part of the subscription or it maybe derived from other system parameters (e.g., SUPI, PEI, NSSAI, RFSP)based on operator configuration. The UE RG parameter of one or more UEmay be sent from AMF to a RAN (access node) when the RAN context isestablished, and maintained as part of the RAN context, so one or moregNBs may acquire knowledge about the reliability group of the connectedUEs.

The reliability group of the RAN (cells of gNBs) entities may bepre-configured by an O&M system in RAN. It may be possible for gNBs tolearn the reliability group neighboring cells as the Xn connectivitybetween the gNBs may be set up.

For connected mode mobility, the serving gNB may down-prioritizecandidate target cells that belong to different reliability group thanthe UE. The UE may hand over only to cells in the same reliabilitygroup. If cells in the same reliability group are not available (UE isout of the coverage of cells of its own reliability group or linkquality is below a given threshold) the UE may be handed over to a cellin another reliability group.

In case the UE connects to a cell in the wrong reliability group, thegNB may initiate a handover to a cell in the appropriate reliabilitygroup whenever such a suitable cell is available.

If redundant RAN coverage is available at a certain location, then UEsthat belong to the same terminal device may connect to different gNBsbased on the reliability group classification using the connected modemobility.

In an example, redundant transmission may be employed over differentphysical transport paths in a core wireless network and RAN to enhancethe reliability of upper layer service. Whether redundant transmissionneed to be activated for a QoS Flow may be decided by the SMF based onlocal policies for the DNN or S-NSSAI, or by the PCF based on its QoSrequirement, UE's subscription and condition of network deployment.

In an example illustrated in FIG. 35, it is assumed that the reliabilityof UPF and control plane functions may be high enough to fulfill thereliability requirement of ultra-reliable and low latency communication(URLLC) services served by these network functions (NFs), and the UE maybe under overlapping coverage of the two RAN nodes. A single RAN nodemay not provide enough reliability in air interface for the QoS flow, sothe redundant packets may be transferred between UPF and UE via twoindependent N3 tunnels and two RAN nodes to enhance the reliability ofservice.

To ensure the two N3 tunnels can be transferred via disjointed transportlayer paths, the M-RAN (Master RAN) node, SMF or UPF may providedifferent routing information in the tunnel information (e.g. differentIP addresses or different Network Instances), and this routinginformation may be mapped to disjoint transport layer paths according tonetwork deployment configuration.

The redundant transmission may be based on the dual connectivityarchitecture, except that same packet is transferred via both M-RAN andS-RAN (Secondary RAN) nodes. With two different NG-RAN nodes (M-RAN andS-RAN), separate transport layer paths are employed for redundant datatransmission in user plane. A high reliability protocol layer isimplemented on the UE and UPF to support packet replication andelimination function.

In an example illustrated in FIG. 49, it is assumed that the reliabilityof NG-RAN node, UPF and control plane NFs may be high enough to fulfilthe reliability requirement of ultra-reliable low latency servicesserved by these NFs. The reliability of single N3 tunnel may notconsidered high enough, e.g. due to the deployment environment ofbackhaul network, so the redundant packets may be transferred betweenUPF and RAN via two independent N3 tunnels, which may be associated witha single PDU session, over different transport layer path to enhance thereliability of service.

To ensure the two N3 tunnels may be set via disjointed transport layerpaths, the M-RAN node, SMF or UPF may provide different routinginformation in the tunnel information (e.g. different IP addresses ordifferent Network Instances), and this routing information may be mappedto disjoint transport layer paths according to network deploymentconfiguration.

In an example, the redundant transmission may be set based on two N3tunnels between a gNB and the UPF. The RAN node and UPF may support thepacket replication and elimination function.

Packet replication and elimination may be realized by modifying theGTP-U protocol. In case of downlink traffic, the UPF replicates thepacket from the DN and assigns the same GTP-U sequence number to themfor the redundant transmission. These packets are transmitted to theNG-RAN via the N3 Tunnel 1 and the N3 Tunnel 2 separately. Foreliminating the duplicated packet, the NG-RAN may forward the packetreceived first from either tunnel to the UE and may drop the replicatedpacket which has the same GTP-U sequence number as the forwarded packet.

In case of uplink traffic, the NG-RAN may replicate the packet and mayassign the same GTP-U sequence number to them and the UPF may eliminatethe duplicated packet based on the GTP-U sequence number.

In an example illustrated in FIG. 48, two separate paths may be extendedby inserting two Intermediate UPFs (I-UPFs) between the UPF acting asthe PDU session Anchor and the NG-RAN to support the redundanttransmission based on two N3 and N9 tunnels between a single NG-RAN modeand the UPF. The RAN node and UPF may support the packet replication andelimination function.

In an example illustrated in FIG. 36, there may be two N3 and N9 tunnelsbetween NG-RAN and UPF for redundant transmission. In an example, theUPF interfacing the DN, may act as the traffic distributor for downlinktraffic and this UPF may duplicates the packet of the URLLC service fromthe DN and may assign the same GTP-U sequence number to them. Theseduplicated packets may be transmitted to I-UPF1 and I-UPF2 via N9 Tunnel1 and N9 Tunnel 2 separately. One or more I-UPFs may forward the packetwith the same GTP-U sequence number which may be received from the UPFto NG-RAN via N3 Tunnel 1 and N3 Tunnel 2 respectively. The NG-RAN mayeliminate the duplicated packet based on the GTP-U sequence number. Inan example, for uplink traffic, the NG-RAN may act as the trafficdistributor. The NG-RAN may duplicate uplink packets of the URLLCservice for the UE and the UPF may eliminate the duplicated packet.

An example solution may reduce latency and jitter caused by the dataforwarding and/or data path switch in a core network due to handover. Auser plane tunnel may be established and employed to transmit data ifthe DRB is established. This procedure may be referred to as enhancedhandover.

In an example, the enhanced handover may be dynamically provisioned atthe SMF from an UDM or PCF during PDU session establishment procedure.In an example, the enhanced handover may be statically preconfigured inSMF. The SMF may retain the information (e.g., PDU session identifiers,type, and/or the like) essential for supporting enhanced handover forPDU sessions it may control.

When a handover is triggered by source RAN node, the SMF may duplicatethe tunnel for the PDU session which may be associated to enhancedhandover. The SMF may send the downlink data to source RAN and targetRAN node until the handover may be completed.

In an example depicted in FIG. 49, a UE may be connected to source RAN(S-RAN) and has a PDU session established with a remote PDU sessionanchor (PSA1). The network may have inserted a source uplink classifier(S-ULCL) that directs selected traffic to a local PDU session anchor(PSA2). The traffic flows exchanged via PSA-2 may be terminated in asource application server (S-AS) which is a user plane entity (e.g.content distribution server) that may be controlled by an AF.

At some point, a UE may be handed over to the target RAN (T-RAN). In anexample, upon instantiation of the target uplink classifier (T-ULCL) aN9 forwarding tunnel may be created between the source uplink classifier(S-ULCL) and the T-ULCL.

The N9 forwarding tunnel may be maintained until all active trafficflowing on it ceases to exist for a configurable duration. T-ULCL may beconfigured with packet filters that may force uplink traffic fromexisting sessions (between UE and Source AS) on the path involvingT-RAN-T-ULCL-S-ULCL-PSA2. The S-ULCL may be configured to forward alldownlink traffic for this UE coming from S-AS into the N9 forwardingtunnel towards T-ULCL.

In an example, T-ULCL may be configured with packet filters that forceany new DNS requests (relating to the local DN) to go to the new localDN (via PSA3).

In an example, T-ULCL may be configured with packet filters that forceany traffic related to the target application server (T-AS) in the newlocal DN (e.g. identified by a match between the destination IP addressof uplink packets and the IP address of T-AS) to go to the new local DN(via PSA3).

In an example, T-ULCL may be configured with packet filters that may letany remaining traffic go to the remote PDU session anchor (PSA1).

SMF may send a late notification to AF to inform it about the DN accessidentifier change (i.e. change of local PSA). Based on this notificationthe AF may trigger the S-AS to use upper layer (e.g. IP level orHyperText Transfer Protocol (HTTP) level) mechanisms to redirect theongoing traffic sessions towards a server in the new local DN (i.e.towards Target AS).

In an example, a replicator may be defined that allows a wireless systemto be aware (e.g. detect or have explicit information) that two or more“streams” of replicated packets belong together, and may guide the lowerlayers to ensure these packets get an optimized treatment in thewireless system depending on whether the streams are terminated in asingle UE or by two different UEs that belong together within the samehub-solution (e.g. TSN hub with two or more redundant 5G modems). In anexample, the replicator may be applicable to any external multi-pathmechanism even if one or more paths may not be employed for duplicatingone or more packet on all paths but for partly or fully disjoint datatransmission.

In an example, an entity/functionality referred as a replicatorfunctionality, may be able to detect one or more related flows, andwhether they are utilized for redundant packets, of incoming IP/Ethernetflows at the transmitter side. Control plane aspects necessary for thereplicator functionality may reside in the SMF and the user planeaspects necessary for the replicator functionality may reside in theUPF.

In an example, the replicator may guide the lower layers to ensure theircorresponding latency/availability/reliability requirements arefulfilled. The replicator may forward the received replicas to the lowerlayers, by adding a header or other type of indication that tells thelower-layers to treat the packets as uncorrelated as possible. In anexample, the replicator may include manipulation of the incoming data,e.g. combining, excluding, or further replicating (among otheroperations) the incoming packets. For instance, create 3 packets basedon the two incoming replicas and make sure they are scheduled correctly.It may only forward a single or a subset of the packets to thelower-layer but scaling appropriately the QoS constraint to be fulfilledby the lower layers.

To ensure the two N3 tunnels can be transferred via disjointed transportlayer paths, the RAN node, SMF or UPF may provide different routinginformation in the tunnel information (e.g. different IP addresses ordifferent network instances), and the routing information may be mappedto disjoint transport layer paths according to network deploymentconfiguration.

At the receiver side, the receiver may translate and forward theinternal streams to the corresponding external network(s). To make ittransparent to the external network(s), further combine, remove orreplicate operations may be applied. The replicator at the receiver mayuse the header information (or share explicit information with thereplicator entity at the other end) to translate or re-build packetsaccording to the external network(s) requirements. In an example, forredundant transmissions, all the duplicated packets may be forwarded tothe receiver host to ensure correct performance of the protocol, even ifonly a single packet was transmitted over the radio network. In anexample, for TSN applications, where the wireless system acts as a TSNethernet bridge, the wireless system may need to forward a lower, equalor larger number of packets to the receiver host.

An example FIG. 50 shows the user-plane system architecture. In anexample, the replicator functionality may be a part of the UPF (orcollocated with the UPF) for user plane functionality and SMF forcontrol plane functionality. Multi-UE transceiver may be considered thatencompasses various UEs with independent hardware and protocol stacks.One or more gNBs may consist of one or more distributed units attachedto a central unit.

In an example embodiment, terms of packet duplication, duplication ofpackets, packet replication, packets copy, copy of packets may be usedinterchangeably. The terms may refer to one or more copies of packets ofthe first session. In an example, packet duplication may mean sessionduplication (e.g. duplication of packets may be interpreted asduplication of a session of the packets).

In an example, the first access node may determine that packetduplication of one or more sessions (e.g., PDU sessions) supported bythe wireless device may be required. The determining may be based on oneor more criteria. The first access node may be the access nodecontrolling an original session (first session). In an example, one ormore criteria may comprise at least one CSI report received from thewireless device. In an example, the one or more criteria may comprise ameasurement report (e.g. RRC layer message) received from the wirelessdevice, the one or more received signal (e.g. sounding reference signal(SRS)) from the wireless device, and/or the like.

In an example, the first access node may comprise a wireless networknode, e.g., an integrated access and backhaul (IAB) node as a basestation (gNB, eNB) (e.g. comprising at least one of RRC, SDAP, PDCP,RLC, MAC, PHY sublayer functions and/or adaptive layer functions) and/oras a base station distributed unit (gNB-DU) (e.g. comprising at leastone of RLC, MAC, PHY and/or adaptive layer functions). The first accessnode may determine the packet duplication (e.g. activation/deactivationof the packet duplication) based on wireless backhaul link conditions.In an example, N3 interface and/or N9 interface may comprise wirelessbackhaul link of the first access node. In an example, N3 interface maycomprise the wireless backhaul link if the first access node comprises abase station and/or a base station distributed unit. In an example, N9interface may comprise the wireless backhaul link if the first accessnode comprises UPF functions of one or more child nodes. The child nodesare IAB-nodes in the lower hierarchy of IAB architecture, directlycommunicating with wireless devices via wireless access links. The childnodes may communicate with other IAB-nodes via wireless backhaul links.

The wireless backhaul link condition of the first access node maycomprise at least one of reference signal received power (RSRP) and/orreference signal received quality (RSRQ) of reference signals (e.g.synchronization signal, CSI-RS, DMRS, and/or the like) received from oneor more donor nodes (e.g. IAB-donor node, base station central unit,gNB-CU, base station). The donor node is an access node which mayprovide wireless device's interface to wireless core network andwireless backhauling functionality to IAB nodes. The first access nodemay receive information of the wireless backhaul condition from the oneor more donor nodes (e.g. IAB-donor node). The information received fromthe one or more donor nodes may comprise one or more elements of a CSIreport and/or a measurement report of the first access node and/orRSRP/RSRQ of uplink reference signal (e.g. sounding reference signal,SRS) from the first access node. The first access node may receive anindication requesting activation/deactivation of the packet duplicationfrom the one or more donor nodes (e.g. IAB-donor node). The one or moredonor nodes may determine the packet duplication based on a CSI reportof the first access node and/or RSRP/RSRQ of uplink reference signal(e.g. sounding reference signal, SRS) from the first access node.

In an example, the second access node may comprise a wireless networknode, e.g., an IAB-node. The first access node may receive backhaul linkradio condition of the second access node from the second access node.The backhaul link radio condition may comprise at least one ofRSRP/RSRQ, CSI report, measurement report, and/or radio conditioninformation of the second access node. In an example, the first accessnode may determine the packet duplication (e.g. activation/deactivationof the packet duplication) based on the backhaul link radio condition.

In an example, the wireless device may send a channel state information(CSI) report to the first access node. In an example embodiment, the CSImay be a channel measurement information. The CSI may comprise one ormore parameters comprising a rank indicator (RI), a precoding matrixindex (PMI), a channel quality indicator (CQI), a precoding typeindicator (PTI), and/or the like. The wireless device may represent UE,wireless equipment, Integrated Access and Backhaul (IAB)-node, and/orlike. The first access node and a second access node mentioned in anexample embodiment may represent base station, gNB, gNodeB, eNB, eNodeB,RAN, NR, microcell, IAB donor, IAB-node, master base station, MgNB,MeNB, secondary base station, SgNB, SeNB, and/or like.

The wireless device may perform CQI, PMI, RI measurements and may reportthe measurements to the first access node. The RI may compriseinformation on a channel rank and indicate the number of streams thatmay be received via a time-frequency resource (e.g., the sametime-frequency resource). The RI may be determined by long-term fadingof a channel, and may be fed back at a cycle e.g., longer than that ofPMI or CQI. The PMI may represent a value reflecting a spatialcharacteristic of a channel and may indicate a precoding matrix index ofthe first access node preferred by the wireless device based on a metricof signal to interference plus noise ratio (SINR). The CQI may representinformation indicating strength of a channel and/or may indicate areception SINR that may be obtainable when the first access node employsa PMI. The CQI may represent the CSI for sub-band and/or wide-band. TheUE (the wireless device) may measure the reference signal in downlinkand/or may map it to the CQI indices that may have one or more values.

According to transmission mode of the wireless device, one or more CQI,PMI, and/or RI may be transmitted. Periodic transmission of CSI mayrefer to as periodic reporting and transmission of CSI at the request ofthe first access node may refer to as aperiodic reporting.

In aperiodic reporting, the first access node may transmit a request bitincluded in uplink scheduling information to the wireless device. Thewireless device may transmit CSI considering transmission mode thereofto the first access node, e.g. through a physical uplink shared channel(PUSCH). In periodic reporting, a period of CSI and/or an offset (e.g.timing offset) at the period may be signaled in a unit of subframes by asemi-static scheme through a higher-layer signal (e.g. an RRC message, aMAC CE, and/or a DCI) per wireless device. Precoding type (PTI) value inCSI report indicates type of CSI reporting provided by the wirelessdevice.

In an example, determining that a packet duplication for one or moresessions is required, may be based on at least one of a quality ofservice (QoS) requirement of the one or more session, traffic load atthe first access node and/or the traffic load of the second access node,service type of the session, a network operator policy, and/or the like.

In an example, the measurement report may comprise reference signalreceived power (RSRP) and/or reference signal received quality (RSRQ) ofone or more cells of the first access node (and/or the second accessnode), RSRP and/or RSRQ of one or more beams (e.g. synchronizationsignal (SS)/PBCH beam, CSI-RS beam, and/or the like) of one or morecells of the first access node (and/or the second access node). In anexample, if the RSRP and/or the RSRQ is equal to or lower than athreshold value (e.g. RSRP<α dB and/or RSRQ<β dB), the first access nodemay determine that packet duplication of the one or more session may berequired.

In an example, if received power and/or received quality of one or moresounding reference signals (SRS) of the wireless device is equal to orlower than a threshold value (e.g. received power of SRS(s)<γ dB and/orreceived quality of SRS(s)<δ dB) the first access node may determine theneed of packet duplication of the one or more sessions.

In an example, packets of first session may be transmitted via N3interface using GTP-U tunnel (e.g. N3 interface, S1 interface, N9interface, GTP tunnel, GTP-U interface, GTP-U protocol, GTP protocol,GTP interface) between the first access node and the PSA UPF. A controlprotocol (GTP-C) may be employed to manage the GTP-U tunnel. In theexample, function of duplication of packets and duplication elimination(DPDE) for duplicating and removing (e.g. discarding, deleting, gettingrid of) duplication of packets by the first node and the PSA UPF thatmay reside in the wireless system.

In an example embodiment, DPDE function (DPDEF) may representfunctionality provided for packet duplication and/or packet elimination(e.g. removal, discard, delete). This DPDEF in the first node may beresponsible for duplicating uplink packets and removing duplication ofdownlink packets. The PSA UPF may be responsible for duplicatingdownlink packets and removing duplication of uplink packets.

In the example, the packet duplication may be supported by the firstaccess node and the PSA UPF by duplicating packets of the first sessionsent via a GTP-U tunnel (e.g. N3 interface, S1 interface, N9 interface,GTP tunnel, GTP-U interface, GTP-U protocol, GTP protocol, GTPinterface) between the first access node and the PSA UPF. Duplicatedpackets (second packets) of the first session may have same sequencenumber as corresponding packets of the first session. As shown in anexample FIG. 38, the GTP layer of the first node and GTP layer of thePSA UPF may be responsible for including GTP header to the packet (PDUor data) transmitted over the GTP tunnel and removing GTP header fromthe packet received over the GTP tunnel. The GTP-U layer of the firstaccess node may include a sequence number to the uplink packet (PDU ordata) for in sequence transmission. The GTP-U layer of the first accessnode may include a sequence number to the downlink packet (PDU or data)for in sequence transmission. The sequence number may be handled on aper GTP-U tunnel basis by the first access node for uplink packets. Thesequence number may be handled on a per GTP-U Tunnel basis by the PSAUPF for downlink packets. In an example, the first node and the PSA UPFmay generate the sequence number autonomously per GTP-U tunnel. In anexample, the first node and the PSA UPF may use sequence number providedby external entities (e.g. control functions, higher protocol layerand/or lower protocol layer). The sequence number may be unique perGTP-U tunnel. One or more packets transmitted via the GTP-U tunnelbetween one or more node of the wireless system (e.g. intermediate UPFs,fixed nodes, relays) may relay same received sequence number of packetsto a destination entity (e.g., the first access node, an UPF, one ormore intermediate UPFs, the PSA UPF, fixed nodes, relays, and/or thelike).

A duplication information comprising guidelines, parameters, filed,rules and/or the like may require for elimination of redundant packetsof duplicated packets. The duplication information may be exchangedbetween the first access node and the PSA UPF handling DPDEF in thenetwork to facilitate duplicate elimination (e.g. discarding duplicatedpackets and/or redundant packet(s) of a duplicated session). In anexample, the first access node may employ separate message to exchange(e.g. N2 session activation request, N2 session modification request, N2session update message, and/or the like) the duplication informationwith the SMF and the SMF may transmit the duplication information to thePSA UPF. In an example, the duplication information may be piggybackedwith initial duplication activation related exchange handling DPDEF inthe peer DPDEF entity. In an example, the duplication information may beexchanged with the peer DPDEF entity at the time of a sessionestablishment of the first session. In an example, if the SMF receivesthe duplication information from the first access node via a controlprotocol (e.g. N2 interface, mobility management interface, sessionmanagement interface, N11 interface, session management protocol, SMcontext information, and/or the like), the SMF may transmit the receivedduplication information to the PSA UPF. In an example, the duplicationinformation may be transmitted using GTP control protocol (e.g. GTP-C).

In an example, the first access node may modify transport header ofpackets of the first session and/or the second session to define a fieldsuch as path id, connection id, list of intermediate nodes (e.g. accessnode and/or UPF via which the packets are transmitted), and/or the like.In an example, the first access node may determine how the field(s) ofthe transport header of packets of the first session may be employed andnotify the peer DPDEF prior to packet duplication activation.

In an example, the first access node may employ existing transportheader field of the packets of the first session and/or the secondsession for duplication such as type of service, and/or the like. Thefirst access node may notify the peer DPDEF about how the transportheader fields of the first session are employed.

In an example, transmission of packets of the first session and thesecond (duplicated) session may be realized using a frame (packet)replication and elimination (e.g. discarding, deleting) for reliability(FRER) mechanism standardized in IEEE 802.1. The FRER mechanism may beapplicable at end devices (e.g. UE(s), peer FRER host, FRER client, FRERserver) or collocated with entities within a network (e.g. access nodes,PSA UPF, first UPF, second UPF). Uplink packets of the first session maybe duplicated, and sequence numbers may be added to the packet headers.A duplicate/copy/replica of the packets may be forwarded via disjointpaths (e.g. different access nodes, different UPFs, and/or differenttunnels) in the network. At PSA UPF in the core network, the duplicatepackets may be identified based on the sequence numbers, and one copy(e.g. one of original packet and duplicated packet) may be forwardedtoward a data network. In an example, a duplicate copy (e.g. duplicatedpackets) of the first session may be eliminated. The ordering of thepackets may be maintained at the PSA UPF in the core network based on asequence numbering rule/algorithm. An FRER entity (e.g. first accessnode, second access node, PSA UPF, first UPF, second UPF, and/or thelike) may be employed to replicate and/or eliminate packets for downlinkand/or uplink transmission. The FRER functionality and/or information ofpaths may be setup or configured between the FRER entities (e.g. firstaccess node, second access node, PSA UPF, first UPF, second UPF, and/orthe like) using protocols such as FRER handshake protocol, combinationof N2 and N4 protocols, GTP-C protocol, user plane protocol, applicationprotocol over HTTP, in-band signaling, and/or the like.

In an example, transmission of original and the second sessions may berealized by using a multipath transport control protocol (MP-TCP,multipath TCP, MP TCP and/or the like) mechanism standardized in IETF.The multipath transport control protocol may allow TCP connection toemploy one or more (multiple) paths using an inverse multiplexerenabling a data stream to be broken into one or more (multiple) lowerdata rate communication links. In an example, MP TCP functionality maybe present in the first access node and in the network (e.g. in PSA UPF,proxy over an N6 interface, and/or the like). An information for pathsfor transmitting packets of the first session and packets of the secondsession between two MP TCP entities (e.g. wireless device, proxy, MPTCP, proxy, and/or the like) may be communicated prior to packetduplication activation using TCP three-way handshake. In an example,protocols such as FRER handshake protocol, combination of N2 and N4protocols, GTP-C protocol, user plane protocol, application protocolover HTTP, in-band signaling, and/or the like may be used for paths andpath set up.

In an example, transmission of the first session and/or the secondsession may be realized by using a multipath quick user datagramprotocol internet connections (QUIC) (e.g. MP-QUIC, MP QUIC, multipleQUIC, and/or the like) mechanism standardized in IETF. This protocol mayallow user datagram protocol (UDP) connection to use one or more pathsusing multiplexes data streams having reduce or compress redundant datatransmissions. In an example, MP QUIC functionality may be present inthe first access node and in the network (e.g. in PSA UPF, proxy over anN6 interface, and/or the like). An information of paths for transmittingpackets of the first session and packets of the second session betweentwo MP QUIC entities (e.g. wireless device, proxy, MP QUIC proxy, and/orthe like) may be communicated prior to packet duplication activationusing cryptographic handshake. In an example, other protocols such asFRER handshake protocol, combination of N2 and N4 protocols, GTP-Cprotocol, user plane protocol, application protocol over HTTP, in-bandsignaling, and/or the like may be used for paths and path set up. Lostpackets carrying data for an individual stream may impact only thatspecific stream.

In an example, transmission of the first session and the second sessionmay be realized by using multipath protocols such as concurrentmultipath routing, capillary routing, and/or the like between the firstaccess node and the PSA UPF.

In an example, transmission of the first session and the second sessionmay be realized by using combination of protocols between the firstaccess node and entity in the wireless network. Example of theseprotocols include combination of N2 protocol (mobility managementprotocol, S1-MME, and/or the like) and N4 interface (Sx interface,openflow interface, and/or the like), GTP-C protocol, GTP-U protocoland/or the like.

In an example, the first session and/or the second session may beestablished via different network nodes (e.g. different access nodesand/or different UPFs). In an example, the first session may beestablished for the wireless device, via the first access node, and afirst UPF, and the second session may be established for the wirelessdevice, via the second access node, and a second UPF (and/or the firstUPF). A network node may forward/transmit/send original packets of thefirst session to a next network node where the first session isestablished. A network node may forward/transmit duplicated packets ofthe duplicated session (e.g. the second session) to a next network nodewhere the duplicated session (e.g. the second session) is established.

As illustrated in example FIG. 45, in response to determining the needof having packet duplication of one or more sessions of the wirelessdevice, the first access node may send an indication to an access andmobility management function (AMF) requesting to activate packetduplication of the one or more sessions (e.g. the first session).

In an example, the first access node may piggyback request (anindication) to activate packet duplication in a message (e.g. NGmessage, S1 message, PDU session resource modification indicationmessage, PDU session resource modification response message, PDU sessionresource notify message, E-RAB modification indication message, E-RABmodify response message, and/or the like) sent from the first accessnode to the AMF.

In an example, the AMF may forward the received request to activatepacket duplication to a session management function (SMF). The SMF maydetermine support (e.g. allowance, acceptance, enabling, activation) ofduplication (e.g. duplication activation) based on information in aunified data management (UDM) for a user, a type of service supported bythe first session, a current traffic condition at the first UPFcontrolled by the SMF, a load information of the UPF, static/dynamiccapacity information of the UPF, traffic conditions of one or more UPFs(e.g. via which the first session and/or the duplicated session (thesecond session) is established), a core network configuration, a currentresource availability, one or more policy rules received from a policycontrol function (PCF), one or more operator policies configured at theSMF and/or the like. The result of the activation of packet duplicationis sent to the AMF using N2 (mobility management protocol, S1-MME,and/or the like) protocol. In an example, the SMF may receive trafficcondition information from the first UPF and/or the one or more UPFs,periodically and/or aperiodically (e.g. by requesting trafficinformation in response to receiving the packet duplication activationrequest).

In an example, in response to determining the support (e.g. allowance,acceptance, enabling, activation) of duplication (e.g. duplicationactivation), the SMF may send a request to the first UPF indicating arequest for activating packet duplication of the first session (e.g. theone or more sessions). The SMF may check a status of the core networkconfiguration. The core network configuration for supporting packetduplication may be established at the time of the first sessionestablishment. In an example, if the core network configuration forsupporting packet duplication was not established, the SMF may initiatecore network configuration. In an example, the type of core networkconfiguration (e.g. no separate tunneling, separate tunneling with thefirst UPF, separate tunneling with the second UPF, and/or the like) forsupporting duplicated packets may be pre-defined at the SMF. Based onthe type of core network configuration set in the SMF, the SMF mayinitiate session modification procedure with the first UPF fortransmitting and receiving the duplicated packets from the first accessnode or the second access node. The SMF may initiate sessionestablishment procedure with the second UPF for transmitting andreceiving the duplicated packets. Tunnel endpoints at the first accessnode or the second access node may be modified.

In an example, in response to determining the support of duplication(e.g. duplication activation), the SMF may send a response messageindicating the activation of packet duplication (e.g. sessionduplication) of the first session (e.g. the one or more sessions). TheAMF may forward/send/transmit response of the activation of packetduplication received from the SMF to the first access node. In anexample, the AMF may send the response of the activation of packetduplication to the first access node via an NG interface message (e.g.PDU session resource modify request message, PDU session resource modifyconfirm message, E-RAB modification confirm message, E-RAB modifyrequest message). If the AMF response sent to the first access nodeindicates rejection of activation of packet duplication, the firstaccess node may terminate packet duplication. In an example, theresponse of the activation of packet duplication may indicate anacceptance of the activation of packet duplication.

In an example, in response to receiving the AMF response comprisingacceptance of the activation of packets duplication, the first accessnode may send/transmit an activation indication of packet duplication ofthe first session to the second access node. The activation indicationmay be transmitted via an Xn message (e.g. S-NODE modification requestmessage, S-NODE reconfiguration complete message, S-NODE modificationconfirm message, X2 message). In an example, based on the activationindication, the second access node may receive/transmit packets of thesecond session (e.g. the duplicate session).

In an example, in response to the acceptance of the activation from theAMF, the first access node may start sending packets of the firstsession (e.g. the original session) and the second session (e.g. theduplicate session) by employing a mechanism communicated with the peerDPDEF entity (PSA UPF, UPF, and/or the like) in the core network.

In an example, the core network configuration required for supportingduplication of packets may be established at the time of sessionestablishment procedure. In an example, the core network configurationfor transmitting packets of the second session may be the same astransmitting packets for the first session. In an example, the corenetwork configuration may be established dynamically when activation ofthe packet is triggered, and an activation indication is received fromthe AMF by the SMF. The core network configuration may be for supportingone path or may be for supporting separate paths for transmitting thepackets of the first session and second session. An example embodimentmay support activation of duplicated packets with or without prior corenetwork configuration.

An example illustrated in FIG. 37 may convey information on the packetduplication and elimination functions resided at the first access nodeand the first UPF where the first UPF may be the PSA UPF.

A protocol stack illustrating GTP-U layer is in an example FIG. 38. Theduplication of the sequence number and elimination of the duplicatedsequence number may be provided by the GTP-U layer. In an example, theduplication of the sequence number and elimination of the duplicatedsequence number may be controlled or facilitated by the SMF.

In an example illustrated in FIG. 39, packets for the first session andsecond session may be transmitted and received using the same pathbetween the first access node and the first UPF where the first UPF isthe UPF currently supporting transmission of packets of the firstsession. The first UPF may be the PSA UPF.

In an example as illustrated in FIG. 40, one or more separateindependent routing paths may be employed between the first access nodeand the first UPF to transmit packets for the first session and secondsession.

In an example illustrated in FIG. 41, one or more separate paths(tunnels) may be established between the first access node and the firstUPF and between the first access node and a new intermediate UPF (secondUPF) to transmit packets for the first session and second session. Aseparate tunnel may be established between the first UPF and the secondUPF where the first UPF may be the PSA UPF. Duplicated uplink packetsmay be transmitted from the second UPF to the first UPF. Duplicateddownlink packets may be transmitted from the first UPF to the secondUPF. The DPDEF in the core network (located at the PSA UPF, first UPF,second UPF and/or the like) may reorder uplink packets and eliminateduplicated packets based on the duplication information which may beexchanged prior to packet duplication activation. Duplicated uplinkpackets may be eliminated by DPDEF of the core network. The DPDEF in thefirst access node may reorder downlink packets and eliminate duplicatedpackets based on the duplication information which may be exchangedprior to packet duplication activation. Duplicated downlink packets maybe eliminated by DPDEF of the wireless device.

In an example where the first access node (master next generation nodeB)is a part of dual connectivity, separate paths for packets of the firstsession and second session may be transmitted via the first access node(master next generation nodeB) and the second access node (secondarynext generation nodeB) depending on the bearer mode (MCG bearer, SCGbearer or split bearer, and/or the like).

In an example as illustrated in FIG. 42, one or more separate paths(tunnels) may be connected to the first UPF where the packets of thefirst session from the first access node may be transmitted via firsttunnel between the first access node and the first UPF. The packets ofthe second session from the first access node may be transmitted viasecond tunnel between the first access node and the second UPF.

In another example illustrated in FIG. 43, the first access node may beconnected to the first UPF and the second access node may be connectedto the second UPF for transmitting packets in MCG bearer mode or splitbearer mode.

FIG. 28 illustrates an example where the first access node may beconnected to the second UPF and the second access node may be connectedto the first UPF for transmitting the packets in SCG bearer mode.

In an example, the first UPF may receive uplink packets of the firstsession and uplink packets of the second sessions. The first UPF may bethe PSA UPF. Based on the duplication information previously exchangedwith the first access node, the SMF may identify packets of the secondsession as duplicate packets. The first UPF may reorder packets of firstsession and second session, identify and discard uplink packets of thefirst session or uplink packets of the second session arriving at thelater time to remove duplication.

In an example, the first access node may determine a need of removingpacket duplication of one or more sessions supported by the first accessnode based on at least one CSI report received from the wireless device.In an example, this determination may be based on at least one or moreof a quality of service requirement of the session, traffic load at thefirst access node, service type of the session, and/or the like.

In an example, the first access node may send an indication to the AMFrequesting it to deactivate packet duplication over N2 (mobilitymanagement protocol, S1-MME, and/or the like) protocol (e.g. N2 sessionresource modify request message, N2 session resource release requestmessage, N2 session modify request message, PDU session releasemessage). In an example, the first access node may piggyback request (anindication) to deactivate packet duplication in a message sent to anAMF.

In an example, the AMF may forward the received request to deactivatepacket duplication to the SMF (e.g. N2 session resource modify requestmessage, N2 session resource release request message, N2 session modifyrequest message, PDU session release message),Nsmf_PDUSession_UpdateSMContext request operation,Nsmf_PDUSession_ReleaseSMContext request operation and/or the like). TheSMF may send a message to the first UPF to deactivate packet duplication(e.g. N4 session modification request, N4 session deactivation request,and/or the like). If the core network configuration is supporteddynamically, the SMF may request the first UPF to deallocate a TNLaddress and/or may request the second UPF to release TNL address if thesecond UPF was requested earlier for transmitting packets of the firstsession or the second session. The SMF may send the result of thedeactivation of packet duplication to the AMF (e.g. N2 session resourcemodify response message, N2 session modification response message, N2session resource release response message, N2 session release responsemessage, N2 session update response message,Nsmf_PDUSession_UpdateSMContext response operation,Nsmf_PDUSession_ReleaseSMContext response operation and/or the like).

The AMF may forward response of the deactivation of packet duplicationreceived from the SMF to the first access node using N2 (mobilitymanagement protocol, S1-MME, and/or the like) protocol.

In an example when the core network configuration is not pre-defined atthe time of a session establishment of the first session, the SMF mayinitiate the core network configuration when it receives a message (PDUsession establishment request message, PDU session modification requestmessage, PDUSession_CreateSMContext request operation,PDUSession_UpdateSMContext request operation and/or the like) from theAMF requesting the activation of the duplication. In one example, theSMF may receive an indication requesting the activation of duplicationpiggybacked in a message. In another example, the SMF may receive aseparate message requesting the activation of the duplication. The firstaccess node may include at least one or more uplink transport networklayer (TNL) address (e.g. IP address, MAC address of correspondingtunnel (the first tunnel and/or the second tunnel)) of a first UPF inthe response to the first access node. In an example, if the packets ofthe second sessions are transmitted using a tunnel between the firstaccess node and the second UPF, the first access node may include atleast one or more uplink transport network layer (TNL) address of thesecond UPF.

In an example, the SMF may request the session modification of the firstUPF at the time of requesting the activation of the duplication. Inanother example, the SMF may request the session modification of thefirst UPF after requesting the activation of the duplication. Therequest for session modification may include at least one or moredownlink TNL address of a second UPF. In an example, the first UPF mayresponds to the SMF with at least one or more uplink TNL address of afirst UPF.

In an example, the SMF may request the session establishment of thesecond UPF. The request for session establishment may include at leastone or more uplink TNL address of a the first UPF. In an example, thefirst UPF may responds to the SMF with at least one or more uplink TNLaddress and/or the downlink TNL address of the second UPF.

In an example, the SMF may send a message (e.g.Nsmf_PDUSession_UpdateSMContext request operation and/or the like) tothe AMF including at least one or more uplink TNL address of a the firstUPF. In an example, the SMF may send a message (e.g.Nsmf_PDUSession_UpdateSMContext request operation and/or the like) tothe AMF including at least one or more uplink TNL address of a thesecond UPF. The AMF may forward the message received from the SMF to thefirst access node. The first access node may respond to the AMF with thedownlink TNL address of the first UPF (e.g. PDU session modificationresponse, session update response and/or the like). In an example, thefirst access node may respond to the AMF with the address of thedownlink TNL address of the second UPF if the path to transmit thepackets of the second session includes the tunnel between the second UPFand the second access network. The AMF may send the response receivedfrom the first access node to the SMF.

In an example, the SMF may send a message (e.g. N4 session modificationrequest, and/or the like) including at least one or more the uplink TNLaddress of the first UPF, the downlink TNL address of the first accessnode or the downlink TNL address of the second access node to the secondUPF. The second UPF may send the response of the message to the SMF.

In an example, when the first access node is a part of dual connectivityfor the first session supporting MCG bearer mode or split bearer mode,the first access node may send an activation of the duplication messageto the second access node. In an example, the activation of duplicationmay be piggybacked in a message sent to the second UPF. The activationof duplication message may include at least one or more an uplink TNLaddress of the first access node. The second access node may respond tothe first UPF comprising at least one or more of downlink uplink TNLaddress of the second access node.

In an example, when the first access node is a part of dual connectivityfor the first session supporting SCG bearer mode, the first access nodemay send an activation of the duplication message to the second accessnode. The duplication of uplink packets of the first session may behandled by the second access node. The uplink packets of the firstsession may be transmitted by the second access node to the first UPF.The uplink packets of the second session may be received at the firstaccess node from the second access node. The first access node maytransmit the second session packets to the first UPF or the second UPFbased on the core network configuration. Duplication of downlink packetsreceived from the first UPF or the second UPF may be eliminated by thesecond access node. The downlink packets of the second session may besent by the first access node to the second access node. Based on theduplication information previously exchanged with the SMF via the firstaccess node, the second access node may identify and discard duplicateddownlink packets of the first session or downlink packets of the secondsession arriving at the later time to remove duplication. The secondaccess node may send the re-ordered downlink packets to the wirelessdevice.

In an example, when the first access node is a part of dual connectivityfor the first session supporting MCG bearer mode or split bearer mode,the first access node may send an activation of the duplication messageto the second access node. The duplication of uplink packets of thefirst session may be handled by the first access node. The uplinkpackets of the first session may be transmitted by the first access nodeto the first UPF. The uplink packets of the second session may bereceived at the second access node from the first access node. Thesepackets may be sent to the second access node from the first access nodeafter the duplication of packets at the first access node. The secondaccess node may transmit the second session packets to the first UPF orthe second UPF based on the core network configuration. Duplication ofdownlink packets received from the first UPF or the second UPF may beeliminated by the first access node. The downlink packets of the secondsession may be sent by the second access node to the first access node.Based on the duplication information previously exchanged with the SMF,the first access node may re-order packets of first session and secondsession. The first access node may identify and discard duplicateddownlink packets of the first session or downlink packets of the secondsession arriving at the later time to remove duplication. The firstaccess node may send the re-ordered downlink packets to the wirelessdevice.

The SMF may provide the duplication information previously exchangedwith the first access node to the first UPF which may be the PSA UPF. Inan example, the SMF may provide the duplication information at the timeof receiving the packet duplication request from the AMF. In an example,the SMF may provide the duplication information when the duplicationinformation is received from the AMF. Based on the duplicationinformation, the first UPF may identify uplink packets of the secondsession as duplicate packets. The first UPF may re-order packets offirst session and second session, identify and discard uplink packets ofthe first session or uplink packets of the second session arriving atthe later time to remove duplication.

In an example, as illustrated in FIG. 45, the first access node mayreceive at least one channel measurement information from the wirelessdevice. The first access node may determine a need of a duplicationactivation of packets of the first session. Determination at the firstaccess node may be based on a traffic status of an N3 interface, anetwork slice type of the first session, a hardware load state in thefirst access node, or a status of a secondary access node for thewireless device, and/or the like.

The first access node may send a first message indicating a packetduplication activation indication to the AMF. The AMF may forward thepacket duplication activation indication, a third message to the SMF.The SMF may determine support of duplication based on information in aunified data management (UDM) for a user, a type of service supported bythe first session, a current traffic condition at the first UPFcontrolled by the SMF, a core network configuration, a current resourceavailability, one or more policy rules received from a policy controlfunction (PCF), one or more operator policies configured at the SMFand/or the like. The SMF may send a seventh message indicating thepacket activation to the first UPF. The first UPF may be the PSA UPF.The downlink packets of the first session may be duplicated by the firstUPF. The SMF may respond to the AMF with the result of the packetduplication activation by sending the fourth message once it receives aresponse of the packet duplication activation, an eighth message fromthe first UPF. The uplink packets of the first session may be duplicatedby the first access node when it receives a second message from the AMFindicating an acceptance of the packet duplication. In an example, thepackets from the first session and second sessions are transmittedbetween the first access node and the first UPF via the same path(tunnel).

In an example, as illustrated in FIG. 46, the first access node mayreceive at least one channel measurement information from the wirelessdevice. The first access node may determine a need of a duplicationactivation of packets of the first session. The first access node maysend a first message indicating a packet duplication activationindication to the AMF. The AMF may forward the packet duplicationactivation indication to the SMF in the third message (e.g.Nsmf_PDUSession_UpdateSMContext request operation,Nsmf_PDUSession_CreateSMContext request operation). The SMF maydetermine support of duplication based on information in a unified datamanagement (UDM) for a user, a type of service supported by the firstsession, a current traffic condition at the first UPF controlled by theSMF, a core network configuration, a current resource availability, oneor more policy rules received from a policy control function (PCF), oneor more operator policies configured at the SMF and/or the like. The SMFmay send a seventh message (e.g. N4 session modification request, N4session modification request, N4 session activation request, N4 sessionupdate request, N4 activate session request) indicating the packetactivation with the first UPF. The SMF may respond to the AMF with theresult of the packet duplication activation by sending the secondmessage once it receives a response of the packet duplicationactivation, the eighth message (e.g. N4 session modification response,N4 session modification response, N4 session activation response, N4session update response, N4 activate session response) from the firstUPF. The eighth message from the first UPF sent to the SMF may comprisean uplink TNL address of the first UPF.

In an example, the SMF may send the uplink TNL address of the first UPFin a fifth message using N2 protocol to the AMF. The AMF may respond tothe SMF with a sixth message (e.g. Nsmf_PDUSession_UpdateSMContextrequest operation, and/or the like), comprising a downlink TNL addressof the first access node. The AMF may forward the fifth message as aninth message to the first access node. The response of the forwardedfifth message, a tenth message may be sent by the first access node tothe AMF.

In an example, the access node may send the downlink TNL address of thefirst access node in a fifth message using N2 protocol to the AMF. TheAMF may respond to the first access node with a sixth message,comprising an uplink TNL address of the first UPF. The AMF may forwardthe fifth message to the SMF. The response of the forwarded fifthmessage may be sent by the SMF to the AMF.

If the fifth message forwarded by the AMF, indicates acceptance of thepacket duplication activation, the first access node may startduplicating uplink packets of the first session received from thewireless device. The first node may start removing duplication ofpackets of the first session and second sessions. In an example, thepackets from the first session and second sessions are transmitted bythe first access node and the first UPF via two different paths(tunnels).

In an example, as illustrated in FIG. 47, the first access node mayreceive at least one channel measurement information from the wirelessdevice. The first access node may determine a need of a duplicationactivation of packets of the first session. The first access node maysend a first message indicating a packet duplication activationindication to the AMF. The AMF may forward the packet duplicationactivation indication to the SMF in a third message (e.g. N11 message,N11 operation request, Nsmf_PDUSession_UpdateSMContext requestoperation, and/or the like). The SMF may determine support ofduplication based on information in a unified data management (UDM) fora user, a type of service supported by the first session, a currenttraffic condition at the first UPF controlled by the SMF, a core networkconfiguration, a current resource availability, one or more policy rulesreceived from a policy control function (PCF), one or more operatorpolicies configured at the SMF and/or the like. The SMF may send aseventh message (e.g. N4 session modification request, N4 sessionmodification request, N4 session activation request, N4 session updaterequest, N4 activate session request) indicating the packet activationwith the first UPF. The first UPF may initiate packet duplication andmay respond to the SMF by sending an eighth message (e.g. N4 sessionmodification response, N4 session modification response, N4 sessionactivation response, N4 session update response, N4 activate sessionresponse). The SMF may respond to the AMF with the result of the packetduplication activation by sending a second message once it receives aresponse of the packet duplication activation, the fourth message fromthe first UPF. The fourth message from the first UPF sent to the SMF maycomprise an uplink TNL address of the first UPF.

The SMF may send a request (e.g. N4 session establishment request, N4session modification request) to the second UPF for an establishment ofone or more TNL addresses. The second UPF may respond to the SMF (e.g.N4 session establishment response, N4 session modification response)comprising a downlink TNL address or an uplink TNL address. The SMF mayforward the uplink TNL address of the first UPF to the second UPF andthe downlink TNL address of the second UPF. This path between the firstUPF and the second UPF may be employed to transmit uplink packetsreceived at the second UPF to the first UPF, where the first UPF may bethe PSA UPF.

In an example, the SMF may send the uplink TNL address of the second UPFin a fifth message using N2 protocol to the AMF. The AMF may respond tothe SMF with a sixth message, comprising a downlink TNL address of thefirst or second access node. The AMF may forward the fifth message as aseventh message to the first access node. The response of the forwardedfifth message may be sent by the first access node to the AMF.

In an example, the access node may send the downlink TNL address of thefirst access node or the second access node in a fifth message using N2protocol to the AMF. The AMF may respond to the first access node with asixth message, comprising an uplink TNL address of the second UPF. TheAMF may forward the fifth message to the SMF. The response of theforwarded fifth message may be sent by the SMF to the AMF.

If the fifth message indicates acceptance of the packet duplicationactivation, the first access node may start duplicating uplink packetsof the first session received from the wireless device. The first nodemay start removing duplication of packets of the first session andsecond sessions. The downlink packets of the first session may beduplicated by the first UPF, where the first UPF is also the PSA UPF. Inan example, the packets from the first session and second session aretransmitted between the first access node and the first UPF, between thefirst access node and the second UPF or between first access node andthe first UPF and between the second access node and the second UPF viatwo different paths (tunnels).

In an example, as illustrated in FIG. 48, the first access node mayreceive at least one channel measurement information from the wirelessdevice. The first access node may determine a need of a duplicationactivation of packets of the first session. The first access node maysend a first message indicating a packet duplication activationindication to the AMF. The AMF may forward the packet duplicationactivation indication to the SMF. The SMF may determine support ofduplication based on information in a unified data management (UDM) fora user, a type of service supported by the first session, a currenttraffic condition at the first UPF controlled by the SMF, a core networkconfiguration, a current resource availability, one or more policy rulesreceived from a policy control function (PCF), one or more operatorpolicies configured at the SMF and/or the like. The SMF may send a thirdmessage indicating the packet activation with the first UPF. The SMF mayrespond to the AMF with the result of the packet duplication activationby sending the second message once it receives a response of the packetduplication activation, a fourth message from the first UPF. The fourthmessage from the first UPF sent to the SMF may comprise an uplink TNLaddress of the first UPF.

In an example, the SMF may send the uplink TNL address of the first UPFin a fifth message using N2 protocol to the AMF. The AMF may respond tothe SMF with a sixth message, comprising a downlink TNL address of thefirst or second access node. The AMF may forward the fifth message tothe first access node. The response message of the forwarded fifthmessage may be sent by the first access node to the AMF.

In an example, the access node may send the downlink TNL address of thefirst access node or the second access node in a fifth message using N2protocol to the AMF. The AMF may respond to the first access node with asixth message, comprising an uplink TNL address of the first UPF. TheAMF may forward the fifth message to the SMF. The response of theforwarded fifth message may be sent by the SMF to the AMF.

In an example, if the wireless device is using MCG or split bearer mode,the wireless device may transmit the packets of the first session to thefirst access node. The first access node duplicates packets of the firstsession. The first access node may transmit the packets of the firstsession to the first UPF and may transmit the packets of the secondsession to the second access node. The second access node may forwardthe received packets from the first access node to the first UPF.

In an example, if the wireless device is using SCG bearer mode, thewireless device may transmit the packets of the first session to thesecond access node. The second access node duplicates packets of thefirst session. The second access node may transmit the packets of thefirst session to the first UPF and may transmit the packets of thesecond session to the first access node. The first access node mayforward the received packets from the second access node to the firstUPF.

The downlink packets of the first session may be duplicated by the firstUPF, where the first UPF is also the PSA UPF. In an example, the packetsfrom the first session are transmitted between the first access node andthe first UPF. The packets from the second session are transmittedbetween the first access node and the second access node and between thesecond access node and the first UPF. In an example, the packets fromthe first session are transmitted between the second access node and thefirst UPF. The packets from the second session are transmitted betweenthe second access node and the first access node and between the secondaccess node and the first UPF.

In an example, as illustrated in FIG. 49, the first access node mayreceive at least one channel measurement information from the wirelessdevice. The wireless device may be using dual mode connectivity (SCGbearer, MCG bearer or split mode) for transmitting packets of the firstsession. The first access node may determine a need of a duplicationactivation of packets of the first session. The first access node maysend a first message indicating a packet duplication activationindication to the AMF. The AMF may forward the packet duplicationactivation indication to the SMF. The SMF may determine support ofduplication based on information in a unified data management (UDM) fora user, a type of service supported by the first session, a currenttraffic condition at the first UPF controlled by the SMF, a core networkconfiguration, a current resource availability, one or more policy rulesreceived from a policy control function (PCF), one or more operatorpolicies configured at the SMF and/or the like. The SMF may send a thirdmessage indicating the packet activation with the first UPF. The SMF mayrespond to the AMF with the result of the packet duplication activationby sending the second message once it receives a response of the packetduplication activation, a fourth message from the first UPF. The fourthmessage from the first UPF sent to the SMF may comprise an uplink TNLaddress of the first UPF.

The SMF may send a request to the second UPF for an establishment of oneor more TNL addresses. The second UPF may respond to the SMF comprisinga downlink TNL address or an uplink TNL address. The SMF may forward theuplink TNL address of the first UPF to the second UPF and the downlinkTNL address of the second UPF. This path between the first UPF and thesecond UPF may be employed to transmit uplink packets received at thesecond UPF to the first UPF, where the first UPF may be the PSA UPF. Inan example, the path between the first UPF and the second UPF may beemployed to transmit downlink packets from the first UPF to the secondUPF, where the first UPF may be the PSA UPF.

In an example, the SMF may send the uplink TNL address of the second UPFin a fifth message using N2 protocol to the AMF. The AMF may respond tothe SMF with a sixth message, comprising a downlink TNL the secondaccess node. The AMF may forward the fifth message to the first accessnode. The response of the forwarded fifth message may be sent by thefirst access node to the AMF.

In an example, the access node may send the downlink TNL address of thefirst access node or second access node in a fifth message using N2protocol to the AMF. The AMF may respond to the first access node with asixth message, comprising an uplink TNL address of the second UPF. TheAMF may forward the fifth message to the first access node. The responseof the forwarded fifth message may be sent by the first access node tothe AMF.

In an example, if the wireless device is using MCG or split bearer mode,the wireless device may transmit the packets of the first session to thefirst access node. The first access node duplicates packets of the firstsession. The first access node may transmit the packets of the firstsession to the first UPF and may transmit the packets of the secondsession to the second access node. The second access node may forwardthe received packets from the first access node to the second UPF.

In an example, if the wireless device is using SCG bearer mode, thewireless device may transmit the packets of the first session to thesecond access node. The second access node duplicates packets of thefirst session. The second access node may transmit the packets of thefirst session to the first UPF and may transmit the packets of thesecond session to the first access node. The first access node mayforward the received packets from the second access node to the secondUPF.

The downlink packets of the first session may be duplicated by the firstUPF, where the first UPF is also the PSA UPF. In an example, the packetsfrom the first session are transmitted between the first access node andthe first UPF and the packets from the second session are transmittedbetween the second access node and the second UPF via two differentpaths (tunnels). In an example, the packets from the first session aretransmitted between the second access node and the first UPF and thepackets from the second session are transmitted between the first accessnode and the second UPF via two different paths (tunnels).

In an example, as illustrated in FIG. 50, the first access node mayreceive at least one channel measurement information from the wirelessdevice. The first node may determine packet duplication. The firstaccess node may send the packet duplication indication to the SMF viathe AMF. The SMF may decide to accept the packet duplication. The SMFmay send a result of the decision to the first access node via the AMF.The SMF may request the first UPF to activate the duplication of thefirst session. The first UPF may start duplicating downlink packets ofthe first session and may start removing duplication of the uplinkpackets of the first session.

If the SMF accepts the session duplication request, the first accessnode may start packet duplication of the first session.

If the SMF does not accept the session duplication request, the firstaccess node may terminate the packet duplication attempt.

In an example, if the configuration of the duplication may not besupported at the time of activation request at the SMF, the SMF mayrequest the first UPF to allocate TNL for supporting packets of thesecond session. In an example, the SMF may request the second UPF toallocate TNL for supporting packets of the second session. The SMF maycommunicate with the first access node for providing uplink TNL of firstUPF or second UPF. The SMF may obtain the downlink TNL of the firstaccess node or the second access node from the first access node.

In an example embodiment, a first access node may determine anactivation of a packet duplication of a session. The first access nodemay send a first message indicating an activation of the packetduplication of the session to an AMF. The first access node may receivethe response of the first message, a second message indicatingacceptance of the activation from the AMF.

In an example, the first access node may receive first packets of thefirst session from a wireless device. The first access node may sendsecond packets to an UPF, wherein the second packets are a duplicationof the first packets.

In an example, the first access node may receive first packets of thefirst session from a wireless device. The first access node may send thefirst packets and second packets via a tunnel between the first accessnode and the UPF, wherein the second packets are a duplication of thefirst packets.

In an example, the first access node may receive first packets of thefirst session from a wireless device. The first access node may send thefirst packets via a first tunnel between the first access node and thefirst UPF. The first access node may send second packets via a secondtunnel between the first access node and the second UPF, wherein thesecond packets are a duplication of the first packets. The first UPF maybe the PSA UPF.

In an example, the first access node may receive first packets of thefirst session from a wireless device. The first access node may send thesecond packets via a first tunnel between the first access node and thefirst UPF, wherein the second packets are a duplication of the firstpackets. The first access node may send first packets via a secondtunnel between the first access node and the second UPF. The first UPFmay be the PSA UPF

In an example, the determination is based on at least one of a trafficstatus of an N3 interface, a network slice type of the first session, ahardware load state in the first access node or a status of a secondaryaccess node for the wireless device, and/or the like.

In an example, the first access node may send first packets of the firstsession to a first UPF via a first tunnel between the first access nodeand the first UPF. A second access node may receive second packets fromthe first access node wherein the second packets are a duplication ofthe first packets. A second access node may send the second packets to asecond UPF via a fourth tunnel between the second access node and thesecond UPF.

In an example, the second access node may receive first packets from thewireless device or from the first access node. The second access nodemay send first packets of the first session to a first UPF via a firsttunnel between the second access node and the first UPF. The firstaccess node may receive second packets from the second access nodewherein the second packets are a duplication of the first packets. Thefirst access node may send the second packets to a second UPF via afourth tunnel between the first access node and the second UPF. In anexample, the first access node may send the second packets to a secondUPF via a fourth tunnel between the first access node and the first UPF.

In an example, the AMF may send a third message indicating an activationof the packet duplication of the first session to an SMF. The AMF mayreceive a fourth message indicating a result of the activation of thepacket duplication of the first session from the SMF.

In an example, the SMF may send a seventh message indicating anactivation of the packet duplication of the first session to an UPF. TheSMF may receive an eighth message indicating a result of the activationof the packet duplication of the first session.

In an example, the second message may comprise at least one of an uplinktransport network layer (TNL) address of a first UPF.

In an example, the second message may comprise at least one of an uplinktransport network layer (TNL) address of a second UPF.

In an example, the fourth message may comprise at least one of an uplinkTNL address of the first UPF.

In an example, the fourth message may comprise at least one of an uplinkTNL address of the second UPF

In an example, the AMF may receive a fifth message from an SMF comprisesan uplink TNL address of a first UPF indicating a session modification.The AMF may send a sixth message from the SMF indicating a result of thesession modification, the sixth message comprising a downlink TNLaddress of the first access node.

In an example, the first access node may send a ninth message to asecond access node indicating an activation of the packet duplication ofthe session. The first access node may receive a tenth message from thesecond access node comprising at least one of a downlink TNL address ofthe second access node. In an example, the second access node may sendsecond packets I to the second UPF in response to receiving the ninthmessage.

In an example, the SMF may send an eleventh message to a first UPFindicating an activation of the packet duplication of the session,comprising a duplication indicator or a duplication information. The SMFmay receive a twelfth message from the first UPF indicating acceptanceof the activation.

In an example, the first access node may determine a deactivation of apacket duplication of a first session. The first access node may send atwenty first message to the AMF indicating a deactivation of the packetduplication of the session. The first access node may receive a twentysecond message from the AMF indicating acceptance of the deactivation.

In an example, the AMF may send a thirteenth message to an SMF inresponse to receiving eleventh message. The AMF may receive a fourteenthmessage from the SMF indicating acceptance of the deactivation.

In an example, the first access node may send a fifteenth message to asecond access node indicating the deactivation of the packet duplicationof the session. The first access node may receive a sixteenth messagefrom the second access node indicating a completion of the deactivation.

In an example, the first access node may send a seventeenth message tothe AMF for a duplication configuration supporting the session and asecond session where the second session is duplication of the firstsession. The first access node may receive an eighteenth message fromthe AMF in response to the seventeenth message.

In an example, the AMF may send, to an SMF, a nineteenth message for aduplication configuration supporting the session and a second session.The second session is duplication of the first session. In an example,the SMF may receive, from the AMF, a twentieth message in response tothe nineteenth message, the twentieth message confirming the duplicationconfiguration.

In an example, a wireless device may receive, from a base station, atleast one first radio resource control message comprising configurationparameters for: a first session between the wireless device and a userplane function; a second session, for packet duplication of the firstsession, between the wireless device and the user plane function; and/orthe like. The wireless device may receive at least one second radioresource control message indicating activation of the packetduplication. Based on the activation of the packet duplication, thewireless device may send original packets via the first session to theuser plane function and duplicated packets of the first session to theuser plane function via the second session.

In an example, the second session may be deactivated based on thereceiving the at least one radio resource control message. In anexample, the wireless device may receive at least one third radioresource message indicating deactivation of the packet duplication.Based on the deactivation of the packet duplication, the wireless devicemay keep sending original packets of the first session to the user planefunction and stop sending duplicated packets of the first session to theuser plane function via the second session. The wireless device maysend, to the base station, a response radio resource control messageindicating a completion of the activation. The base station may send, tothe user plane function, the duplicated packets of the first session.The base station may send, to the user plane function, the originalpackets via a first tunnel between the base station and the user planefunction and the duplicated packets via a second tunnel between the basestation and the user plane function.

In an example, the base station may send the original packets to a firstuser plane function and the duplicated packets to a second user planefunction. In an example, the wireless device may send the originalpackets via the base station and the duplicated packets via a secondbase station. The base station may receive, from the wireless device, achannel measurement information. The base station may determine, basedon the channel measurement information, the activation of the packetduplication. The channel measurement information may comprise at leastone of: a channel quality indicator (CQI), a precoding matrix indicator(PMI), a precoding type indicator (PTI), a rank indication (RI), and/orthe like. The base station may determine the packet duplication based onat least one of: a quality-of-service requirement of the first session,a traffic load of the base station, a session type of the first session,a network slice of the first session, and/or the like.

In an example, the base station may send, to an access and mobilitymanagement function (AMF), a first message indicating the activation ofthe packet duplication. The base station may receive, from the AMF, asecond message indicating acceptance of the activation. The at least onesecond radio resource control message may be based on the acceptance ofthe activation. The second message may comprise an uplink transportnetwork layer (TNL) address of the user plane function. The secondmessage may comprise at least one of: a first uplink TNL address of afirst user plane function for the original packets, a second uplink TNLaddress of a second user plane function for the duplicated packets,and/or the like.

In an example, the AMF may send, to a session management function (SMF),a third message indicating the activation of the packet duplication. TheAMF may receive, from the SMF, a fourth message indicating acceptance ofthe activation. The fourth message may comprise an uplink TNL address ofthe user plane function. The fourth message may comprise at least oneof: a first uplink TNL address of a first user plane function for theoriginal packets, a second uplink TNL address of a second user planefunction for the duplicated packets, and/or the like.

In an example, the AMF may send, to an SMF, an information messagecomprising at least one of: a first downlink TNL address for theoriginal packets, a second downlink TNL address for the duplicatedpackets, and/or the like. In an example, a second base station mayreceive, from the base station, a modification request messageindicating the activation of the packet duplication. The second basestation may start, based on the modification request message, sendingthe duplicated packets. The base station may receive, from a second basestation, resource status information of the second base station. Theactivation of the packet duplication may be based on the resource statusinformation. The second base station may be a secondary base station ofthe wireless device.

FIG. 51 is a flow diagram of an aspect of an example embodiment of thepresent disclosure. At 5110, a wireless device may receive, from a basestation, configuration parameters for a first session and a secondsession. The second session may be for a packet duplication of the firstsession. The wireless device may receive an activation indication of thepacket duplication at 5120. Based on the activation indication of thepacket duplication, the wireless device may send packets of the firstsession to a user plane function at 5130, and a duplication of thepackets to the user plane function via the second session at 5140.

In an example, a wireless device may receive, from a base station, atleast one first radio resource control message comprising configurationparameters for a first session and a second session. The second sessionmay be for a packet duplication of the first session. The wirelessdevice may receive at least one second radio resource message indicatingactivation of the packet duplication. Based on the activation of thepacket duplication, the wireless device may send: original packets ofthe first session to a user plane function; and duplicated packets ofthe first session to the user plane function via the second session.

In an example, the first access node may receive, from a wirelessdevice, channel measurement information. The first access node maydetermine to activate a packet duplication of a first session for thewireless device based on the channel measurement information. Based onactivating the packet duplication, original packets of the first sessionmay be transmitted between the wireless device and a user planefunction. In response to activating the packet duplication, duplicatedpackets of the first session may be transmitted via a second sessionbetween the wireless device and the user plane function. The firstaccess node may send, to an access and mobility management function(AMF), a first message indicating activation of the packet duplicationof the session based on the determining. The first access node mayreceive, from the AMF, a second message indicating acceptance of theactivation. The first access node may send, to the wireless device andbased on the acceptance of the activation, a first radio resourcecontrol message indicating the activation.

In an example, the first access node may transmit, to the user planefunction: first packets to the user plane function via the firstsession; and/or second packets, being duplication of the first packets,to the user plane function via the second session. The first access nodemay receive, from the wireless device, a second RRC message indicating acompletion of the activation.

In an example, the first access node may determine to activate a packetduplication of a first session for the wireless device. Based onactivating the packet duplication: original packets of the first sessionmay be transmitted between the wireless device and a user planefunction; and/or duplicated packets of the first session may betransmitted via a second session between the wireless device and theuser plane function. The first access node may send, to an access andmobility management function (AMF), a first message indicating requestfor activation of the packet duplication of the session based on thedetermining. The first access node may receive, from the AMF, a secondmessage indicating acceptance of the activation. The first access nodemay send, to the wireless device and based on the acceptance of theactivation, a first radio resource control message indicating theactivation.

In an example, the first access node may determine, to activate a packetduplication of a first session for the wireless device. Based onactivating the packet duplication: original packets of the first sessionmay be transmitted between the wireless device and a user planefunction; and/or duplicated packets of the first session may betransmitted via a second session between the wireless device and theuser plane function. The first access node may send, to an access andmobility management function (AMF), a first message indicating requestfor activation of the packet duplication of the session based on thedetermining. The first access node may receive, from the AMF, a secondmessage indicating acceptance of the activation. The first access nodemay send, to the wireless device and based on the acceptance of theactivation, a first radio resource control message indicating theactivation.

In an example, a first access node may receive, from a wireless device,a channel measurement information. The first access node may determinean activation of a packet duplication of a session of the wirelessdevice based on the channel measurement information. The first accessnode may send, to AMF, a first message indicating an activation of thepacket duplication of the session. The first access node may receive,from the AMF, a first non-access stratum (NAS) message indicating theactivation of the packet duplication of the session. The first accessnode may send, to the wireless device, a second NAS message indicatingthe activation of the packet duplication of the session.

In an example, the AMF may send, to a session management function (SMF),a second message indicating the activation of the packet duplication ofthe session. The AMF may receive, from the SMF, a third messageindicating an acceptance of the activation. In an example, the firstaccess node may receive, from the AMF, a fourth message indicatingacceptance of the activation. In an example, the first access node mayreceive, from the wireless device, a third NAS message indicating anacceptance of the activation. The first access node may send, to theAMF, a fourth NAS message indicating an acceptance of the activation.The AMF may receive, from an SMF, a fifth NAS message indicating theactivation of the packet duplication of the session. The AMF may send,to the SMF, a sixth NAS message indicating an acceptance of theactivation.

In an example, a first access node may receive, from a wireless device,a channel measurement information. The first access node may determine adeactivation of a packet duplication of a session of the wireless devicebased on the channel measurement information. The first access node maysend, to the AMF, a fifth message indicating the deactivation of thepacket duplication of the session. The first access node may receive,from the AMF, a seventh non-access stratum (NAS) message indicating thedeactivation of the packet duplication of the session. The first accessnode may send, to the wireless device, an eighth NAS message indicatingthe deactivation of the packet duplication of the session. The AMF maysend, to a session management function (SMF), a sixth message indicatingthe deactivation of the packet duplication of the session. The AMF mayreceive, from the SMF, a seventh message indicating an acceptance of thedeactivation. The first access node may receive, from the AMF, an eighthmessage indicating acceptance of the deactivation.

In an example, the first access node may receive, from the wirelessdevice, a ninth NAS message indicating an acceptance of thedeactivation. The first access node may send, to the AMF, a tenth NASmessage indicating an acceptance of the deactivation. The AMF mayreceive, from an SMF, an eleventh NAS message indicating thedeactivation of the packet duplication of the session. The AMF may send,to the SMF, a twelfth NAS message indicating an acceptance of thedeactivation.

In an example, a first access node may receive, from a wireless device,a channel measurement information. The first access node may determinean activation of a packet duplication of a session of the wirelessdevice based on the channel measurement information. The first accessnode may send, to the wireless device, a first radio resource control(RRC) message indicating an activation of the packet duplication of thesession. The first access node may receive, from the wireless device, afirst non-access stratum (NAS) message indicating the activation of thepacket duplication of the session. The first access node may send, to anaccess and mobility management function (AMF), a second NAS messageindicating the activation of the packet duplication of the session. Thefirst access node may receive, from the wireless device, a second RRCmessage indicating acceptance of the activation. The second RRC messagemay comprise a duplication information. The first access node mayreceive, from the AMF, a third NAS message indicating acceptance of theactivation. The first access node may send, to the wireless device, afourth NAS message indicating acceptance of the activation.

In an example, the AMF may send, to a session management function (SMF),a fifth NAS message indicating the activation of the packet duplicationof the session. The AMF may receive, from the SMF, a sixth NAS messageindicating an acceptance of the activation.

In an example, a first access node may receive, from a wireless device,a channel measurement information. The first access node may determine adeactivation of a packet duplication of a session of the wireless devicebased on the channel measurement information. The first access node maysend, to a wireless device, a third radio resource control (RRC) messageindicating a deactivation of the packet duplication of the session. Thefirst access node may receive, from the wireless device, a seventhnon-access stratum (NAS) message indicating the deactivation of thepacket duplication of the session. The first access node may send, tothe AMF, an eighth NAS message indicating the deactivation of the packetduplication of the session. The first access node may receive, from thewireless device, a fourth RRC message indicating acceptance of thedeactivation. The first access node may receive, from the AMF, a ninthNAS message indicating acceptance of the deactivation. The first accessnode may send, to the wireless device, a tenth NAS message indicatingacceptance of the deactivation. In an example, the AMF may send, to asession management function (SMF), an eleventh NAS message indicatingthe deactivation of the packet duplication of the session. The AMF mayreceive, from the SMF, a twelfth NAS message indicating an acceptance ofthe deactivation.

In this specification, a and an and similar phrases are to beinterpreted as at least one and one or more. In this specification, theterm may is to be interpreted as may, for example. In other words, theterm may is indicative that the phrase following the term may is anexample of one of a multitude of suitable possibilities that may, or maynot, be employed to one or more of the various embodiments. If A and Bare sets and every element of A is also an element of B, A is called asubset of B. In this specification, only non-empty sets and subsets areconsidered. For example, possible subsets of B={cell1, cell2} are:{cell1}, {cell2}, and {cell1, cell2}.

In this specification, parameters (Information elements: IEs) maycomprise one or more objects, and each of those objects may comprise oneor more other objects. For example, if parameter (IE) N comprisesparameter (IE) M, and parameter (IE) M comprises parameter (IE) K, andparameter (IE) K comprises parameter (information element) J, then, forexample, N comprises K, and N comprises J. In an example embodiment,when one or more messages comprise a plurality of parameters, it impliesthat a parameter in the plurality of parameters is in at least one ofthe one or more messages, but does not have to be in each of the one ormore messages.

Many of the elements described in the disclosed embodiments may beimplemented as modules. A module is defined here as an isolatableelement that performs a defined function and has a defined interface toother elements. The modules described in this disclosure may beimplemented in hardware, software in combination with hardware,firmware, wetware (i.e. hardware with a biological element) or acombination thereof, which may be behaviorally equivalent. For example,modules may be implemented as a software routine written in a computerlanguage configured to be executed by a hardware machine (such as C,C++, Fortran, Java, Basic, Matlab or the like) or a modeling/simulationprogram such as Simulink, Stateflow, GNU Octave, or LabVIEWMathScript.Additionally, it may be possible to implement modules using physicalhardware that incorporates discrete or programmable analog, digitaland/or quantum hardware. Examples of programmable hardware comprise:computers, microcontrollers, microprocessors, application-specificintegrated circuits (ASICs); field programmable gate arrays (FPGAs); andcomplex programmable logic devices (CPLDs). Computers, microcontrollersand microprocessors are programmed using languages such as assembly, C,C++ or the like. FPGAs, ASICs and CPLDs are often programmed usinghardware description languages (HDL) such as VHSIC hardware descriptionlanguage (VHDL) or Verilog that configure connections between internalhardware modules with lesser functionality on a programmable device.Finally, it needs to be emphasized that the above mentioned technologiesare often employed in combination to achieve the result of a functionalmodule.

Example embodiments of the invention may be implemented using variousphysical and/or virtual network elements, software defined networking,virtual network functions.

The disclosure of this patent document incorporates material which issubject to copyright protection. The copyright owner has no objection tothe facsimile reproduction by anyone of the patent document or thepatent disclosure, as it appears in the Patent and Trademark Officepatent file or records, for the limited purposes required by law, butotherwise reserves all copyright rights whatsoever.

While various embodiments have been described above, it should beunderstood that they have been presented by way of example, and notlimitation. It will be apparent to persons skilled in the relevantart(s) that various changes in form and detail can be made thereinwithout departing from the spirit and scope. In fact, after reading theabove description, it will be apparent to one skilled in the relevantart(s) how to implement alternative embodiments. Thus, the presentembodiments should not be limited by any of the above describedexemplary embodiments. In particular, it should be noted that, forexample purposes, the above explanation has focused on the example(s)using 5G AN. However, one skilled in the art will recognize thatembodiments of the invention may also be implemented in a systemcomprising one or more legacy systems or LTE. The disclosed methods andsystems may be implemented in wireless or wireline systems. The featuresof various embodiments presented in this invention may be combined. Oneor many features (method or system) of one embodiment may be implementedin other embodiments. A limited number of example combinations are shownto indicate to one skilled in the art the possibility of features thatmay be combined in various embodiments to create enhanced transmissionand reception systems and methods.

In addition, it should be understood that any figures which highlightthe functionality and advantages, are presented for example purposes.The disclosed architecture is sufficiently flexible and configurable,such that it may be utilized in ways other than that shown. For example,the actions listed in any flowchart may be re-ordered or optionally usedin some embodiments.

Further, the purpose of the Abstract of the Disclosure is to enable theU.S. Patent and Trademark Office and the public generally, andespecially the scientists, engineers and practitioners in the art whoare not familiar with patent or legal terms or phraseology, to determinequickly from a cursory inspection the nature and essence of thetechnical disclosure of the application. The Abstract of the Disclosureis not intended to be limiting as to the scope in any way.

Finally, it is the applicant's intent that only claims that include theexpress language means for or step for be interpreted under 35 U.S.C.112. Claims that do not expressly include the phrase means for or stepfor are not to be interpreted under 35 U.S.C. 112.

What is claimed is:
 1. A method comprising: receiving, by a wirelessdevice from a base station, at least one first radio resource controlmessage comprising configuration parameters for: a first session betweenthe wireless device and a user plane function; and a second session, forpacket duplication of the first session, between the wireless device andthe user plane function; receiving at least one second radio resourcecontrol message indicating activation of the packet duplication; andbased on the activation of the packet duplication, sending: originalpackets via the first session to the user plane function; and duplicatedpackets of the first session to the user plane function via the secondsession.
 2. The method of claim 1, wherein the second session isdeactivated based on the receiving the at least one radio resourcecontrol message.
 3. The method of claim 1, further comprising:receiving, by the wireless device, at least one third radio resourcemessage indicating deactivation of the packet duplication; and based onthe deactivation of the packet duplication, by the wireless device:keeping sending original packets of the first session to the user planefunction; and stopping sending duplicated packets of the first sessionto the user plane function via the second session.
 4. The method ofclaim 1, further comprising sending, by the wireless device to the basestation, a response radio resource control message indicating acompletion of the activation.
 5. The method of claim 1, furthercomprising sending, by the base station to the user plane function, theduplicated packets of the first session.
 6. The method of claim 1,further comprising sending, by the base station to the user planefunction: the original packets via a first tunnel between the basestation and the user plane function; and the duplicated packets via asecond tunnel between the base station and the user plane function. 7.The method of claim 1, further comprising sending by the base station:the original packets to a first user plane function; and the duplicatedpackets to a second user plane function.
 8. The method of claim 1,wherein the wireless device sends: the original packets via the basestation; and the duplicated packets via a second base station.
 9. Themethod of claim 1, further comprising: receiving, by the base stationfrom the wireless device, a channel measurement information; anddetermining, by the base station and based on the channel measurementinformation, the activation of the packet duplication.
 10. The method ofclaim 9, wherein the channel measurement information comprises at leastone of: a channel quality indicator (CQI); a precoding matrix indicator(PMI); a precoding type indicator (PTI); or a rank indication (RI). 11.The method of claim 1, further comprising determining, by the basestation, the packet duplication based on at least one of: aquality-of-service requirement of the first session; a traffic load ofthe base station; a session type of the first session; or a networkslice of the first session.
 12. The method of claim 1, furthercomprising: sending, by the base station to an access and mobilitymanagement function (AMF), a first message indicating the activation ofthe packet duplication; and receiving, by the base station from the AMF,a second message indicating acceptance of the activation, wherein the atleast one second radio resource control message is based on theacceptance of the activation.
 13. The method of claim 12, wherein thesecond message comprises an uplink transport network layer (TNL) addressof the user plane function.
 14. The method of claim 12, wherein thesecond message comprises at least one of: a first uplink transportnetwork layer (TNL) address of a first user plane function for theoriginal packets; or a second uplink TNL address of a second user planefunction for the duplicated packets.
 15. The method of claim 12, furthercomprising: sending, by the AMF to a session management function (SMF),a third message indicating the activation of the packet duplication; andreceiving, by the AMF from the SMF, a fourth message indicatingacceptance of the activation.
 16. The method of claim 15, wherein thefourth message comprises an uplink transport network layer (TNL) addressof the user plane function.
 17. The method of claim 15, wherein thefourth message comprises at least one of: a first uplink transportnetwork layer (TNL) address of a first user plane function for theoriginal packets; or a second uplink TNL address of a second user planefunction for the duplicated packets.
 18. The method of claim 1, furthercomprising sending, by an access and mobility management function (AMF)to a session management function (SMF), an information messagecomprising at least one of: a first downlink transport network layer(TNL) address for the original packets; or a second downlink TNL addressfor the duplicated packets.
 19. The method of claim 1, furthercomprising: receiving, by a second base station from the base station, amodification request message indicating the activation of the packetduplication; and starting, by the second base station and based on themodification request message, sending the duplicated packets.
 20. Themethod of claim 1, further comprising receiving, by the base stationfrom a second base station, resource status information of the secondbase station, wherein: the activation of the packet duplication is basedon the resource status information; and the second base station is asecondary base station of the wireless device.