Identification of 5G Non-Standalone Architecture traffic on the S1 interface

ABSTRACT

Systems and methods include obtaining monitored traffic from an S1 interface; detecting a Secondary Radio Access Technology (RAT) Data Usage Report (DUR) in the monitored traffic; determining whether the Secondary RAT DUR relates to a 5G Non-Standard Architecture (NSA), and, if so, determining an address of a gNodeB in the Secondary RAT DUR; and storing the address of the gNodeB in a database. The systems and methods can include, for a call, updating a Call Detail Record (CDR) to reflect one of 5G NSA and 4G based on whether an address in the CDR is in the database.

CROSS-REFERENCE TO RELATED APPLICATION(S)

The present disclosure claims priority to U.S. Provisional PatentApplication No. 63/017,342, filed Apr. 29, 2020, and entitled“IDENTIFICATION OF 5G NSA TRAFFIC ON S1,” the contents of which areincorporated by reference in their entirety.

The present disclosure claims priority to U.S. Provisional PatentApplication No. 63/070,338, filed Aug. 26, 2020, and entitled“Identification of 5G Non-Standalone Architecture traffic on the S1interface,” the contents of which are incorporated by reference in theirentirety.

FIELD OF THE DISCLOSURE

The present disclosure generally relates to wireless networking. Moreparticularly, the present disclosure relates to systems and methods foridentifying 5G Non-Standalone Architecture (NSA) traffic on the S1interface.

BACKGROUND OF THE DISCLOSURE

The initial deployments of 5G (fifth-generation cellular networktechnology) will be classified as Non-Standalone (NS), meaning that the5G networks will be supported by existing 4G (LTE) infrastructure. In anNSA mode, 5G-enabled devices connect to 5G frequencies fordata-throughput improvements but will still use 4G for non-datafunctions such as communication to the cell towers and servers. That is,the NSA mode depends on the control plane of the existing 4G (LTE)network for control functions, while the 5G NR (New Radio) utilizes 5Gfeatures on the user plane. The advantage of this approach is to speedup 5G adoption. The user plane (sometimes known as the data plane,forwarding plane, carrier plane or bearer plane) carries the networkuser traffic, whereas the control plane carries signaling traffic. The5G NR is a Radio Access Technology (RAT) for the 5G network, i.e., theglobal standard for the air interface of 5G networks.

With the introduction of 5G NSA, new procedures are needed formonitoring the S1 interface. Statistics per gNodeB and Serving Gateway(SGW) are monitored, and the capability to identify 4G activity and 5GNSA activity on S1 is needed. 5G NSA activity needs to be identifiedbased only on monitoring the S1 interface. Conventionally, it is notpossible to identify all the 5G NSA activity that is managed by the S1interface. It is, therefore, impossible to generate complete dashboardsand statistics. For monitoring, there is a need to split statisticsbetween 4G and 5G NSA and identify the type of mobility by thesubscriber. There is also a need to create a dashboard per gNodeB basedon monitoring the S1 interface.

BRIEF SUMMARY OF THE DISCLOSURE

The present disclosure relates to systems and methods for identifying 5GNon-Standalone Architecture (NSA) traffic on the S1 interface.Specifically, the present disclosure analyzes Secondary Radio AccessTechnology (RAT) Data Usage Report (DUR) messages on the S1 interface todetermine the bearer type. The present disclosure includes obtainingmonitored traffic from an S1 interface; detecting a Secondary RadioAccess Technology (RAT) Data Usage Report (DUR) in the monitoredtraffic; determining whether the Secondary RAT DUR relates to a 5GNon-Standard Architecture (NSA), and, if so, determining an address of agNodeB in the Secondary RAT DUR; and storing the address of the gNodeBin a database. The systems and methods can include, for a call, updatinga Call Detail Record (CDR) to reflect one of 5G NSA and 4G based onwhether an address in the CDR is in the database.

BRIEF DESCRIPTION OF THE DRAWINGS

The present disclosure is illustrated and described herein withreference to the various drawings, in which like reference numbers areused to denote like system components/method steps, as appropriate, andin which:

FIG. 1 is a block diagram of select interfaces in a 5G NSA system 10.

FIG. 2 is a flowchart of a process for analyzing a Secondary RAT DataUsage Report on the S1 interface to determine the type of mobility,namely 5G NSA or 4G.

FIG. 3 is a flowchart of a summarized process for identifying 5GNon-Standalone Architecture (NSA) traffic on the S1 interface.

FIG. 4 is a screenshot of a user interface illustrating monitoredstatistics based on the Secondary RAT.

FIG. 5 is a screenshot of a user interface illustrating monitoredstatistics based on 5G monitoring.

FIG. 6 is a block diagram of a processing device.

FIG. 7 is a flowchart of a method for identifying 5G Non-StandaloneArchitecture (NSA) traffic on the S1 interface.

DETAILED DESCRIPTION OF THE DISCLOSURE

In various embodiments, the present disclosure relates to systems andmethods for identifying 5G Non-Standalone Architecture (NSA) traffic onthe S1 interface. Specifically, the present disclosure analyzesSecondary Radio Access Technology (RAT) Data Usage Report (DUR) messageson the S1 interface to determine the bearer type. The present disclosureincludes obtaining monitored traffic from an S1 interface; detecting aSecondary Radio Access Technology (RAT) Data Usage Report (DUR) in themonitored traffic; determining whether the Secondary RAT DUR relates toa 5G Non-Standard Architecture (NSA), and, if so, determining an addressof a gNodeB in the Secondary RAT DUR; and storing the address of thegNodeB in a database. The systems and methods can include, for a call,updating a Call Detail Record (CDR) to reflect one of 5G NSA and 4Gbased on whether an address in the CDR is in the database.

The following acronyms are utilized herein:

Term Definition 3GPP 3^(rd) Generation Partnership Project CDR CallDetail Record DL Downlink eNodeB Evolved Node B (4G base station) EN-DCE-UTRA-NR Dual Connectivity EPC Evolved Packet Core (EPC) which is aframework for converging voice and data in LTE (4G) and includes theMME, SGW, etc. ERAB E-UTRAN Radio Access Bearer EUTRAN Evolved UniversalMobile Telecommunications System Terrestrial Radio Access Network whichis the Radio Access Technology (RAT) for the 4G gNodeB 5G base stationIP Internet Protocol LTE Long Term Evolution (4G) MME MobilityManagement Entity which is the control node in the LTE (4G) accessnetwork. It is involved in the bearer activation/deactivation processand is also responsible for choosing the SGW for a UE at the initialattach and at time of intra-LTE handover involving Core Network (CN)node relocation. NR New Radio which is the Radio Access Technology (RAT)for the 5G NSA Non-Standalone Architecture PGW Packet Data NetworkGateway which provides from the UE to external packet data networks bybeing the point of exit and entry of traffic for the UE RAT Radio AccessTechnology SGW Serving Gateway which routes and forwards user datapackets, while also acting as the mobility anchor for the UP duringinter-eNodeB handovers and as the anchor for mobility between LTE andother 3GPP technologies (terminating S4 interface and relaying thetraffic between 2G/3G systems and PGW) TEID Tunnel Endpoint IdentifierUE User Equipment which is a user device connecting to the mobilenetwork. UL Uplink ULI User Location Info UP User Plane

FIG. 1 is a block diagram of select interfaces in a 5G NSA system 10.The 5G NSA system 10 includes an eNodeB 12, a gNodeB 14, an MME 16, andan SGW 18. Of course, there are additional interfaces and elements inthe 5G NSA system 10, which are omitted for illustration purposes. In anembodiment, there is a monitoring system 20 which can be a physicalsystem interacting with the SGW 18 and/or MME 16, a method implementedon or with the SGW 18 and/or the MME 16, computer-readable code executedon or with the SGW 18, MME 16, etc. The monitoring system 20 isconfigured to capture data associated with the operation of the S1interface in the 5G NSA system 10. Such captured data is utilized by anetwork operator for various network operations and management purposes.

In a 4G core network, the capture of user plane information is performedat or on the SGW 18, with the monitoring system 20. The monitoringsystem 20 can also capture control plane information for use with theuser plane information. For example, the control plane information caninclude RAT type, the network element, etc. Again, the control planeinformation and the user plane information are captured and monitored bythe monitoring system 20 for use by the network operator of the 5G NSAsystem 10 for various network management purposes.

In a 4G architecture, a control plane S11 interface allows a correlationbetween the control plane and the user plane. The RAT type (EUTRAN for4G) and the 4G radio network element (eNodeB) are provided over thecontrol plane S11 interface and can be included in user plane datarecords, such as in the monitoring system 20.

As described herein, for the monitoring system 20, a data record is alisting of data of user plane activity between a UE and an applicationserver. The data record can provide subscriber information, networkinformation, user plane information as the application, the exchangeddata volumes, and the throughput in the downlink and uplink directions.The information of the RAT is important to capture for the networkoperator. The present disclosure relates, in part, to data records and5G NR UP bearer identification.

With the 5G NSA system 10, the core network and the protocols around theSGW 18 remain the same. A bearer refers to a path that user traffictakes in a network, such as between UE and a Packet Data Network Gateway(PGW). With the 5G NSA system 10, the S1-U (S1 user plane) bearer can beeither 4G or 5G, and the present disclosure relates to theidentification of an S1-U bearer between the SGW and the eNodeB 12 (4Gradio equipment), or the gNodeB 14 (5G radio equipment). That is, thepresent disclosure provides a technique for how to identify the eNodeB12 (4G radio equipment) and the gNodeB 14 (5G radio equipment) on the S1interface.

Secondary RAT Data Usage Report

The purpose of the Secondary RAT Data Usage Report procedure is toprovides information on the used resources of the secondary RAT (e.g.,NR resources during EN-DC operation) as specified in TS 23.401. Themessage is sent from the eNodeB 12 to the MME 16 to report Secondary RATdata usage.

FIG. 2 is a flowchart of a process 50 for analyzing a Secondary RAT DataUsage Report on the S1 interface to determine the type of mobility,namely 5G NSA or 4G.

The Secondary RAT Data Usage Report (DUR) is generated on differenttriggers (step 52), including periodic reporting (step 54), an S1release (step 58), and a mobility trigger (step 60). The presentdisclosure includes analyzing the Secondary RAT DUR to determine thebearer type. Specifically, the following differentiation can be used todeclare whether the traffic is on a gNodeB (5G NSA) or an eNodeB (4G):

If the Secondary RAT DUR was due to a periodic trigger (step 54), the“IP Address DL UP” in the Secondary RAT DUR is saved as a gNodeB (step56); or

If the Secondary RAT DUR was due to an S1 release (step 58), the “IPAddress DL UP” in the Secondary RAT DUR is saved as a gNodeB (step 56).Specifically, in step 56, a database can be maintained which includesaddress, i.e., IP Address DL UP, and an address in the databaseindicates a gNodeB.

If the Secondary RAT DUR was due to a mobility trigger (step 60), thiscan mean that the subscriber moved from 5G NSA to another 5G NSA or from5G NSA to 4G. In this case, it can be checked if there is an ERABModification Indication in the Secondary RAT DUR (step 62). If there isnot an ERAB Modification Indication (step 62), the process 50 returns tostep 52. If there is an ERAB Modification Indication (step 62), theprocess 50 includes checking if the next IP address UP DL is known as agNodeB (step 64). The checking is based of determining whether the nextIP address UP DL is in the database.

If the next IP address UP DL is in the database (step 64), the mobilityis 5G NSA (step 66). Otherwise, the mobility is 4G (step 68). In thecase of Secondary RAT DUR, the type of mobility the subscriber can beidentified with the following algorithm that analyzes a Secondary RATDUR with an ERAB Modification Indication:

Previous Next “IP Address “IP Address Type of DL UP” DL UP” mobilitygNodeB ??? mobility from 5G NSA to 4G gNodeB gNodeB mobility from 5G NSAto 5G NSA

Where ??? means the IP address is not in the database of known gNodeB.

Thereafter steps 66, 68, a CDR can have its mobility determined aseither 4G or 5G NSA, based on the Next IP Address DL UP.

In the process 50, the IP addresses can be saved in a database to notegNodeBs for future CDRs. That is, the bearer type for a call can bebased on analyzing the IP address in a CDR to see if it is a gNodeB inthe database. Otherwise, the bearer type for a call is 4G, if the IPaddress is not in the gNodeB database. That is, the system 20 learnsmultiples gNodeB IP addresses and flags the subsequent CDRs which usethese IP addresses as 5G NSA activity.

FIG. 3 is a flowchart of a summarized process 80 for identifying 5GNon-Standalone Architecture (NSA) traffic on the S1 interface. Theprocess 80 includes analyzing Secondary RAT DUR messages to maintain adatabase of gNodeB addresses (step 82). Next, the process 80 includesanalyzing Secondary RAT DUR messages for a specific call to detect itsmobility type, using the database of GNB IP addresses (step 84), i.e.,all Secondary RAT DUR CDRs can be analyzed and the mobility is flaggedthanks to the gNobeB IPs learn before. Finally, all S1 and/or S11 CDRswith an address IP UP DL corresponding to a gNobeB previously learnt areflagged as 5G NSA, otherwise as 4G (step 86).

FIG. 4 is a screenshot of a user interface 100, illustrating monitoredstatistics based on the Secondary RAT. Monitored statistics based on thesecondary RAT include, in this example: throughput, total volume, A/Gvolume per subscriber, Session NB, Session Efficiency, NG Session persubscriber, Attach, Dropped Sessions, PDP Connect

FIG. 5 is a screenshot of a user interface 200 illustrating monitoredstatistics based on 5G monitoring. Monitored statistics based on 5Gmonitoring include, in this example: session setup efficiency, E-RABmodification, session completion rate, throughput, latency,retransmission, mobility number, EPS fallback, TAU from 5G NSAEfficiency, KPI trend, failure causes distribution.

Example Processing Device Architecture

FIG. 6 is a block diagram of a processing device 300. The processingdevice 300 may be a digital computer that, in terms of hardwarearchitecture, generally includes a processor 302, input/output (I/O)interfaces 304, a network interface 306, a data store 308, and memory310. It should be appreciated by those of ordinary skill in the art thatFIG. 6 depicts the processing device 300 in an oversimplified manner,and a practical embodiment may include additional components andsuitably configured processing logic to support known or conventionaloperating features that are not described in detail herein. Thecomponents (302, 304, 306, 308, and 310) are communicatively coupled viaa local interface 312. The local interface 312 may be, for example, butnot limited to, one or more buses or other wired or wirelessconnections, as is known in the art. The local interface 312 may haveadditional elements, which are omitted for simplicity, such ascontrollers, buffers (caches), drivers, repeaters, and receivers, amongmany others, to enable communications. Further, the local interface 312may include address, control, and/or data connections to enableappropriate communications among the aforementioned components.

The processor 302 is a hardware device for executing softwareinstructions. The processor 302 may be any custom made or commerciallyavailable processor, a central processing unit (CPU), an auxiliaryprocessor among several processors associated with the processing device300, a semiconductor-based microprocessor (in the form of a microchip orchipset), or generally any device for executing software instructions.When the processing device 300 is in operation, the processor 302 isconfigured to execute software stored within the memory 310, tocommunicate data to and from the memory 310, and to generally controloperations of the processing device 300 pursuant to the softwareinstructions. The I/O interfaces 304 may be used to receive user inputfrom and/or for providing system output to one or more devices orcomponents. The user input may be provided via, for example, a keyboard,touchpad, and/or a mouse. System output may be provided via a displaydevice and a printer (not shown). I/O interfaces 304 may include, forexample, a serial port, a parallel port, a Small Computer SystemInterface (SCSI), a Serial ATA (SATA), a fiber channel, InfiniBand,iSCSI, a PCI Express interface (PCI-x), an Infrared (IR) interface, aRadio Frequency (RF) interface, a Universal Serial Bus (USB) interface,or the like.

The network interface 306 may be used to enable the processing device300 to communicate over the network 120, etc. The network interface 306may include, for example, an Ethernet card or adapter or a WirelessLocal Area Network (WLAN) card or adapter. The network interface 306 mayinclude address, control, and/or data connections to enable appropriatecommunications on the network. A data store 308 may be used to storedata. The data store 308 may include any of volatile memory elements(e.g., random access memory (RAM, such as DRAM, SRAM, SDRAM, and thelike)), nonvolatile memory elements (e.g., ROM, hard drive, tape, CDROM,and the like), and combinations thereof. Moreover, the data store 308may incorporate electronic, magnetic, optical, and/or other types ofstorage media. In one example, the data store 308 may be locatedinternal to the processing device 300, such as, for example, an internalhard drive connected to the local interface 312 in the processing device300. Additionally, in another embodiment, the data store 308 may belocated external to the processing device 300, such as, for example, anexternal hard drive connected to the I/O interfaces 304 (e.g., SCSI orUSB connection). In a further embodiment, the data store 308 may beconnected to the processing device 300 through a network, such as, forexample, a network-attached file server.

The memory 310 may include any of volatile memory elements (e.g., randomaccess memory (RAM, such as DRAM, SRAM, SDRAM, etc.)), nonvolatilememory elements (e.g., ROM, hard drive, tape, CDROM, etc.), andcombinations thereof. Moreover, the memory 310 may incorporateelectronic, magnetic, optical, and/or other types of storage media. Notethat the memory 310 may have a distributed architecture, where variouscomponents are situated remotely from one another, but can be accessedby the processor 302. The software in memory 310 may include one or moresoftware programs, each of which includes an ordered listing ofexecutable instructions for implementing logical functions. The softwarein the memory 310 includes a suitable operating system (O/S) 314 and oneor more programs 316. The operating system 314 essentially controls theexecution of other computer programs, such as the one or more programs316, and provides scheduling, input-output control, file and datamanagement, memory management, and communication control and relatedservices.

The one or more programs 316 may be configured to implement the variousprocesses, algorithms, methods, techniques, etc. described herein, suchas with respect call direction detection. Generally, the processingdevice 300 is configured to analyze the Secondary RAT DUR messages onthe S1 interface, to determine the IP addresses of gNodeBs based on theprocess 50, and to update CDR records based thereon. Specifically, if anIP address in a CDR is in a database of gNodeB addresses, then the CDRcan be marked as 5G NSA, otherwise as 4G.

Method

FIG. 7 is a flowchart of a method 400 for identifying 5G Non-StandaloneArchitecture (NSA) traffic on the S1 interface. The method 400 includesobtaining monitored traffic from an S1 interface (step 402); detecting aSecondary Radio Access Technology (RAT) Data Usage Report (DUR) in themonitored traffic (step 404); determining whether the Secondary RAT DURrelates to a 5G Non-Standard Architecture (NSA), and, if so, determiningan address of a gNodeB in the Secondary RAT DUR (step 406); and storingthe address of the gNodeB in a database (step 408).

The method 400 can further include, for a call, updating a Call DetailRecord (CDR) to reflect one of 5G NSA and 4G based on whether an addressis in the database (step 410). The address can be in a Secondary RAT DURfor the call.

The method 400 can further include determining a trigger for theSecondary RAT DUR, wherein whether the Secondary RAT DUR relates to 5GNSA is based on the trigger (step 412). The trigger can be one ofperiodic and an 51 release and the Secondary RAT DUR relates to 5G NSAbased thereon. The trigger can be a mobility trigger, wherein theSecondary RAT DUR includes an E-UTRAN Radio Access Bearer (ERAB)Modification Indication, and wherein, if an address in the ERABModification Indication is in the database, a mobility type is 5G NSA,and, if the address in the ERAB Modification Indication is not in thedatabase, a mobility type is 4G.

The method 400 can further include displaying statistics for a pluralityof calls including statistics of mobility type, utilizing the databasefor classification thereof (step 414).

A processing device can include one or more processors and memorycomprising instructions that, when executed, cause the one or moreprocessors to implement the method 400.

A computer program can include instructions which, when executed on atleast one processor, cause the at least one processor to carry out themethod 400. A carrier can include the computer program, wherein thecarrier is one of an electronic signal, optical signal, radio signal, orcomputer readable storage medium.

Conclusion

It will be appreciated that some embodiments described herein mayinclude or utilize one or more generic or specialized processors (“oneor more processors”) such as microprocessors; Central Processing Units(CPUs); Digital Signal Processors (DSPs): customized processors such asNetwork Processors (NPs) or Network Processing Units (NPUs), GraphicsProcessing Units (GPUs), or the like; Field-Programmable Gate Arrays(FPGAs); and the like along with unique stored program instructions(including both software and firmware) for control thereof to implement,in conjunction with certain non-processor circuits, some, most, or allof the functions of the methods and/or systems described herein.Alternatively, some or all functions may be implemented by a statemachine that has no stored program instructions, or in one or moreApplication-Specific Integrated Circuits (ASICs), in which each functionor some combinations of certain of the functions are implemented ascustom logic or circuitry. Of course, a combination of theaforementioned approaches may be used. For some of the embodimentsdescribed herein, a corresponding device in hardware and optionally withsoftware, firmware, and a combination thereof can be referred to as“circuitry configured to,” “logic configured to,” etc. perform a set ofoperations, steps, methods, processes, algorithms, functions,techniques, etc. on digital and/or analog signals as described hereinfor the various embodiments.

Moreover, some embodiments may include a non-transitorycomputer-readable medium having instructions stored thereon forprogramming a computer, server, appliance, device, processor, circuit,etc. to perform functions as described and claimed herein. Examples ofsuch non-transitory computer-readable medium include, but are notlimited to, a hard disk, an optical storage device, a magnetic storagedevice, a Read-Only Memory (ROM), a Programmable ROM (PROM), an ErasablePROM (EPROM), an Electrically EPROM (EEPROM), Flash memory, and thelike. When stored in the non-transitory computer-readable medium,software can include instructions executable by a processor or device(e.g., any type of programmable circuitry or logic) that, in response tosuch execution, cause a processor or the device to perform a set ofoperations, steps, methods, processes, algorithms, functions,techniques, etc. as described herein for the various embodiments.

Although the present disclosure has been illustrated and describedherein with reference to preferred embodiments and specific examplesthereof, it will be readily apparent to those of ordinary skill in theart that other embodiments and examples may perform similar functionsand/or achieve like results. All such equivalent embodiments andexamples are within the spirit and scope of the present disclosure, arecontemplated thereby, and are intended to be covered by the followingclaims.

What is claimed is:
 1. A non-transitory computer-readable medium havinginstructions stored thereon for programming a processing device toperform steps of: obtaining monitored traffic from an S1 interface;detecting a Secondary Radio Access Technology (RAT) Data Usage Report(DUR) in the monitored traffic; determining whether the Secondary RATDUR relates to a 5G Non-Standard Architecture (NSA), and, if so,determining an address of a gNodeB in the Secondary RAT DUR; and storingthe address of the gNodeB in a database.
 2. The non-transitorycomputer-readable medium of claim 1, wherein the steps further includefor a call, updating a Call Detail Record (CDR) to reflect one of 5G NSAand 4G based on whether an address is in the database.
 3. Thenon-transitory computer-readable medium of claim 2, wherein the addressis in a Secondary RAT DUR for the call.
 4. The non-transitorycomputer-readable medium of claim 1, wherein the steps further includedetermining a trigger for the Secondary RAT DUR, wherein whether theSecondary RAT DUR relates to 5G NSA is based on the trigger.
 5. Thenon-transitory computer-readable medium of claim 4, wherein the triggeris one of periodic and an S1 release and the Secondary RAT DUR relatesto 5G NSA based thereon.
 6. The non-transitory computer-readable mediumof claim 4, wherein the trigger is a mobility trigger, wherein theSecondary RAT DUR includes an E-UTRAN Radio Access Bearer (ERAB)Modification Indication, and wherein, if an address in the ERABModification Indication is in the database, a mobility type is 5G NSA,and, if the address in the ERAB Modification Indication is not in thedatabase, a mobility type is 4G.
 7. The non-transitory computer-readablemedium of claim 1, wherein the steps further include displayingstatistics for a plurality of calls including statistics of mobilitytype, utilizing the database for classification thereof.
 8. A methodcomprising: obtaining monitored traffic from an S1 interface; detectinga Secondary Radio Access Technology (RAT) Data Usage Report (DUR) in themonitored traffic; determining whether the Secondary RAT DUR relates toa 5G Non-Standard Architecture (NSA), and, if so, determining an addressof a gNodeB in the Secondary RAT DUR; and storing the address of thegNodeB in a database.
 9. The method of claim 8, further comprising for acall, updating a Call Detail Record (CDR) to reflect one of 5G NSA and4G based on whether an address is in the database.
 10. The method ofclaim 9, wherein the address is in a Secondary RAT DUR for the call. 11.The method of claim 8, further comprising determining a trigger for theSecondary RAT DUR, wherein whether the Secondary RAT DUR relates to 5GNSA is based on the trigger.
 12. The method of claim 11, wherein thetrigger is one of periodic and an S1 release and the Secondary RAT DURrelates to 5G NSA based thereon.
 13. The method of claim 11, wherein thetrigger is a mobility trigger, wherein the Secondary RAT DUR includes anE-UTRAN Radio Access Bearer (ERAB) Modification Indication, and wherein,if an address in the ERAB Modification Indication is in the database, amobility type is 5G NSA, and, if the address in the ERAB ModificationIndication is not in the database, a mobility type is 4G.
 14. The methodof claim 8, further comprising displaying statistics for a plurality ofcalls including statistics of mobility type, utilizing the database forclassification thereof.
 15. A processing device comprising: one or moreprocessors and memory comprising instructions that, when executed, causethe one or more processors to obtain monitored traffic from an S1interface; detect a Secondary Radio Access Technology (RAT) Data UsageReport (DUR) in the monitored traffic; determine whether the SecondaryRAT DUR relates to a 5G Non-Standard Architecture (NSA), and, if so,determining an address of a gNodeB in the Secondary RAT DUR; and storethe address of the gNodeB in a database.
 16. The processing device ofclaim 15, wherein the instructions that, when executed, cause the one ormore processors to for a call, update a Call Detail Record (CDR) toreflect one of 5G NSA and 4G based on whether an address is in thedatabase.
 17. The processing device of claim 16, wherein the address isin a Secondary RAT DUR for the call.
 18. The processing device of claim15, wherein the instructions that, when executed, cause the one or moreprocessors to determining a trigger for the Secondary RAT DUR, whereinwhether the Secondary RAT DUR relates to 5G NSA is based on the trigger.19. The processing device of claim 18, wherein the trigger is one ofperiodic and an S1 release and the Secondary RAT DUR relates to 5G NSAbased thereon.
 20. The processing device of claim 18, wherein thetrigger is a mobility trigger, wherein the Secondary RAT DUR includes anE-UTRAN Radio Access Bearer (ERAB) Modification Indication, and wherein,if an address in the ERAB Modification Indication is in the database, amobility type is 5G NSA, and, if the address in the ERAB ModificationIndication is not in the database, a mobility type is 4G.