Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
BASE STATION SELECTION FOR TIMING RESILIENCY SERVICE
Document Type and Number:
WIPO Patent Application WO/2023/043728
Kind Code:
A1
Abstract:
A first base station determines, based on a second time service capability information of a second base station, a handover of a wireless device to the second base station. The first base station sends, to the second base station, a handover request message.

Inventors:
QIAO WEIHUA (US)
DINAN ESMAEL HEJAZI (US)
RYU JINSOOK (US)
KIM TAEHUN (US)
PARK KYUNGMIN (US)
TALEBI FARD PEYMAN (US)
Application Number:
PCT/US2022/043340
Publication Date:
March 23, 2023
Filing Date:
September 13, 2022
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
QIAO WEIHUA (US)
DINAN ESMAEL HEJAZI (US)
RYU JINSOOK (US)
KIM TAEHUN (US)
PARK KYUNGMIN (US)
TALEBI FARD PEYMAN (US)
OFINNO LLC (US)
International Classes:
H04W36/08
Domestic Patent References:
WO2021032013A12021-02-25
Foreign References:
EP3528543A12019-08-21
US10932163B12021-02-23
Attorney, Agent or Firm:
KANDHARI, Sachin et al. (US)
Download PDF:
Claims:
CLAIMS

What is claimed is:

1. A method comprising: receiving, by a first base station from a network function, time service capability information of one or more base stations, wherein the time service capability information indicates whether the one or more base stations support a time service; receiving, by the first base station from a wireless device, a measurement report associated with a second base station of the one or more base stations; determining, by the first base station and based on the measurement report and the time service capability information, a handover of the wireless device to the second base station; and sending, by the first base station to the second base station, a handover request message.

2. A method comprising: determining, by a first base station and based on a second time service capability information of a second base station, a handover of a wireless device to the second base station; and sending, by the first base station to the second base station, a handover request message.

3. The method of claim 2, wherein the first base station receives the second time service capability information from a network function comprising at least one of: one or more base stations; an access and mobility management function (AMF); an operations administration and maintenance (0AM); or a Unified Data Management (UDM).

4. The method of claim 3, further comprising sending, by the first base station to the network function, a first message comprising a first time service capability information of the first base station, wherein the second time service capability information is received responsive to the first message.

5. The method of one of claims 2 to 4, further comprising receiving, by the first base station from a wireless device, a measurement report associated with the second base station, where the determining the handover is further based on the measurement report.

6. The method of one of claims 2 to 5, wherein the second time service capability information indicates whether the second base station provides the time service.

87 The method of one of claims 2 to 6, wherein the second time service capability information indicates a traceability to coordinated universal time (UTC) capability, and wherein the traceability to UTC capability indicates at least one of: that a received UTC timestamp is traceable from a receiver of a UTC time back to a source of the UTC time; or whether the second base station implements traceability to UTC. The method of claim 7, wherein implementing the traceability to UTC comprises at least one of: identifying and/or documenting a source of a UTC time; identifying and/or documenting a distribution chain of a UTC time from a source of the UTC time to a receiver of the UTC time; monitoring and/or documenting two or more sources of UTC time; calibrating and/or documenting UTC time; or documenting the implementing of the Traceability to UTC. The method of claim 8, further comprising selecting a more accurate source of UTC time from the two or more sources of UTC time. The method of one of claims 2 to 9, further comprising adjusting a coordinated universal time (UTC) time by offsetting the UTC time based on one or more of: a leap second; a residence time; or a transmission delay. The method of one of claims 2 to 10, wherein the second time service capability information indicates supported time key performance indicators (KPIs) of the second base station, and wherein the supported time KPIs comprise at least one of: a supported accuracy of time service; a supported interval of time service; or a supported coverage area of time service; or a supported time service type.

88 The method of one of claims 2 to 11 , wherein the time service capability information indicates a supported time service type from among one or more of: a supported premium timing service; a supported commercial timing service; a supported regular timing service; or a supported dedicated timing service. The method of one of claims 2 to 12, wherein the handover request message comprises at least one of: a first parameter indicating requesting (UTC) time service; a second parameter indicating a traceability capability of the wireless device; a third parameter indicating whether a source network provides traceability to UTC; a fourth parameter indicating a requested time key performance indicator (KPI); or a fifth parameter indicating a requested time service type. The method of one of claims 2 to 13, wherein the determining is further based on at least one of: the second base station supporting the time service; time service capability of the first base station is changed. A method comprising: sending, by a first base station to a network function, a first message comprising a first time service capability information of the first base station, wherein the first time service capability information indicates whether the first base station supports a time service; and receiving, by the first base station from the network function, a second message comprising a second time service capability information of a second base station, wherein the second time service capability information indicates whether the second base station supports a time service. The method of claim 15, wherein the first message comprises a parameter indicating requesting time service capability information of the at least one base station. The method of one of claims 15 to 16, wherein the network function comprises at least one of: the second base station; an access and mobility management function (AMF); an operations administration and maintenance (0AM); or a Unified Data Management (UDM).

89 The method of one of claims 15 to 17, wherein the first message comprises at least one of: a Xn Setup Request message; a NG-RAN node Configuration Update message; a Resource Status Request message; or a NG Setup Request message. The method of one of claims 15 to 19, further comprising: receiving, by the first base station from a wireless device, a measurement report associated with the second base station; determining, by the first base station and based on the measurement report and the second time service capability information, a handover of the wireless device to the second base station; and sending, by the first base station to the second base station, a handover request message. A base station comprising one or more processors and memory storing instructions that, when executed by the one or more processors, cause the base station to perform the method of any of claims 1 to 19. A non-transitory computer-readable medium comprising instructions that, when executed by one or more processors, cause the one or more processors to perform the method of any of claims 1 to 19. A method comprising: receiving, by a network function from a first base station, a first message comprising a first time service capability information of the first base station, wherein the first time service capability information indicates whether the first base station supports a time service; and sending, by the network function to the first base station, a second message comprising a second time service capability information of a second base station, wherein the second time service capability information indicates whether the second base station supports a time service. The method of claim 22, wherein the first message comprises a parameter indicating requesting time service capability information of the at least one base station. The method of one of claims 22 to 23, wherein the network function comprises at least one of: the second base station; an access and mobility management function (AMF); an operations administration and maintenance (0AM); or a Unified Data Management (UDM).

90 The method of one of claims 22 to 24, wherein the first message comprises at least one of: a Xn Setup Request message; a NG-RAN node Configuration Update message; a Resource Status Request message; or a NG Setup Request message. A network function comprising one or more processors and memory storing instructions that, when executed by the one or more processors, cause the network function to perform the method of any of claims 22 to 25. A non-transitory computer-readable medium comprising instructions that, when executed by one or more processors, cause the one or more processors to perform the method of any of claims 22 to 25. A system comprising: a first base station comprising: one or more processors and memory storing instructions that, when executed by the one or more processors, cause the first base station to perform operations comprising: sending, to a network function, a first message comprising a first time service capability information of the first base station, wherein the first time service capability information indicates whether the first base station supports a time service; and receiving, from the network function, a second message comprising a second time service capability information of a second base station, wherein the second time service capability information indicates whether the second base station supports a time service; and the network function, wherein the network function comprises: one or more processors and memory storing instructions that, when executed by the one or more processors, cause the network function to perform operations comprising: receiving, from the first base station, the first message; and sending, to the first base station, the second message.

91

Description:
TITLE

Base Station Selection for Timing Resiliency Service CROSS-REFERENCE TO RELATED APPLICATIONS

[0001] This application claims the benefit of U.S. Provisional Application No. 63/244,081, filed September 14, 2021, which is hereby incorporated by reference in its entirety.

BRIEF DESCRIPTION OF THE DRAWINGS

[0002] Examples of several of the various embodiments of the present disclosure are described herein with reference to the drawings.

[0003] FIG. 1 A and FIG. 1 B illustrate example communication networks including an access network and a core network.

[0004] FIG. 2A, FIG. 2B, FIG. 20, and FIG. 2D illustrate various examples of a framework for a service-based architecture within a core network.

[0005] FIG. 3 illustrates an example communication network including core network functions.

[0006] FIG. 4A and FIG. 4B illustrate example of core network architecture with multiple user plane functions and untrusted access

[0007] FIG. 5 illustrates an example of a core network architecture for a roaming scenario.

[0008] FIG. 6 illustrates an example of network slicing.

[0009] FIG. 7A, FIG. 7B, and FIG. 7C illustrate a user plane protocol stack, a control plane protocol stack, and services provided between protocol layers of the user plane protocol stack.

[0010] FIG. 8 illustrates an example of a quality of service model for data exchange.

[0011] FIG. 9A, FIG. 9B, FIG. 9C, and FIG. 9D illustrate example states and state transitions of a wireless device.

[0012] FIG. 10 illustrates an example of a registration procedure for a wireless device.

[0013] FIG. 11 illustrates an example of a service request procedure for a wireless device.

[0014] FIG. 12 illustrates an example of a protocol data unit session establishment procedure for a wireless device.

[0015] FIG. 13 illustrates examples of components of the elements in a communications network.

[0016] FIG. 14A, FIG. 14B, FIG. 14C, and FIG. 14D illustrate various examples of physical core network deployments, each having one or more network functions or portions thereof.

[0017] FIG. 15 illustrates an example of a traceability pyramid showing measurement steps linking a timestamp back to the reference time scale UTC, taking the NPLTime® service as an example.

[0018] FIG. 16 illustrates an example of chain of comparisons from UTC to the time-stamps generated by a GPS disciplined oscillator, and the use of bulletins of GPS monitoring results from a UTC(k) institute to demonstrate traceability to UTC.

[0019] FIG. 17 illustrates an example of time resilience use case for financial markets. [0020] FIG. 18 illustrates an example of UTC(k) time distribution with 5G system indicating the traceability chain.

[0021] FIG. 19 illustrates an example of multiple UTC time sources distributed to 5G system.

[0022] FIG. 20 is an example call flow illustrating problems of existing technologies.

[0023] FIG. 21 is an example call flow as per an aspect of an embodiment of the present disclosure.

[0024] FIG. 22 is an example diagram depicting a Xn Setup Request message as per an aspect of an embodiment of the present disclosure.

[0025] FIG. 23 is an example diagram depicting the procedures of a first base station (e.g., a source base station, S- (R)AN) as per an aspect of an embodiment of the present disclosure.

[0026]

[0027] FIG. 24 is an example call flow as per an aspect of an embodiment of the present disclosure.

[0028] FIG. 25 is an example call flow as per an aspect of an embodiment of the present disclosure.

[0029] FIG. 26 is an example call flow as per an aspect of an embodiment of the present disclosure.

[0030] FIG. 27 is an example call flow as per an aspect of an embodiment of the present disclosure.

[0031] FIG. 28 is an example call flow as per an aspect of an embodiment of the present disclosure.

[0032] FIG. 29 is an example call flow as per an aspect of an embodiment of the present disclosure.

DETAILED DESCRIPTION

[0033] In the present disclosure, various embodiments are presented as examples of how the disclosed techniques may be implemented and/or how the disclosed techniques may be practiced in environments and scenarios. It will be apparent to persons skilled in the relevant art that various changes in form and detail can be made therein without departing from the scope. In fact, after reading the description, it will be apparent to one skilled in the relevant art how to implement alternative embodiments. The present embodiments should not be limited by any of the described exemplary embodiments. The embodiments of the present disclosure will be described with reference to the accompanying drawings. Limitations, features, and/or elements from the disclosed example embodiments may be combined to create further embodiments within the scope of the disclosure. Any figures which highlight the functionality and advantages, are presented for example purposes only. The disclosed architecture is sufficiently flexible and configurable, such that it may be utilized in ways other than that shown. For example, the actions listed in any flowchart may be re-ordered or only optionally used in some embodiments.

[0034] Embodiments may be configured to operate as needed. The disclosed mechanism may be performed when certain criteria are met, for example, in a wireless device, a base station, a radio environment, a network, a combination of the above, and/or the like. Example criteria may be based, at least in part, on for example, wireless device or network node configurations, traffic load, initial system set up, packet sizes, traffic characteristics, a combination of the above, and/or the like. When the one or more criteria are met, various example embodiments may be applied. Therefore, it may be possible to implement example embodiments that selectively implement disclosed protocols.

[0035] A base station may communicate with a mix of wireless devices. Wireless devices and/or base stations may support multiple technologies, and/or multiple releases of the same technology. Wireless devices may have one or more specific capabilities. When this disclosure refers to a base station communicating with a plurality of wireless devices, this disclosure may refer to a subset of the total wireless devices in a coverage area. This disclosure may refer to, for example, a plurality of wireless devices of a given LTE or 5G release with a given capability and in a given sector of the base station. The plurality of wireless devices in this disclosure may refer to a selected plurality of wireless devices, and/or a subset of total wireless devices in a coverage area which perform according to disclosed methods, and/or the like. There may be a plurality of base stations or a plurality of wireless devices in a coverage area that may not comply with the disclosed methods, for example, those wireless devices or base stations may perform based on older releases of LTE or 5G technology.

[0036] In this disclosure, “a” and “an” and similar phrases refer to a single instance of a particular element, but should not be interpreted to exclude other instances of that element. For example, a bicycle with two wheels may be described as having “a wheel”. Any term that ends with the suffix “(s)” is to be interpreted as “at least one” and/or “one or more.” In this disclosure, the term “may” is to be interpreted as “may, for example.” In other words, the term “may” is indicative that the phrase following the term “may” is an example of one of a multitude of suitable possibilities that may, or may not, be employed by one or more of the various embodiments. The terms “comprises” and “consists of”, as used herein, enumerate one or more components of the element being described. The term “comprises” is interchangeable with “includes” and does not exclude unenumerated components from being included in the element being described. By contrast, “consists of” provides a complete enumeration of the one or more components of the element being described.

[0037] The phrases “based on”, “in response to”, “depending on”, “employing”, “using”, and similar phrases indicate the presence and/or influence of a particular factor and/or condition on an event and/or action, but do not exclude unenumerated factors and/or conditions from also being present and/or influencing the event and/or action. For example, if action X is performed “based on” condition Y, this is to be interpreted as the action being performed “based at least on” condition Y. For example, if the performance of action X is performed when conditions Y and Z are both satisfied, then the performing of action X may be described as being “based on Y”.

[0038] The term “configured” may relate to the capacity of a device whether the device is in an operational or non- operational state. Configured may refer to specific settings in a device that effect the operational characteristics of the device whether the device is in an operational or non-operational state. In other words, the hardware, software, firmware, registers, memory values, and/or the like may be “configured” within a device, whether the device is in an operational or nonoperational state, to provide the device with specific characteristics. Terms such as “a control message to cause in a device” may mean that a control message has parameters that may be used to configure specific characteristics or may be used to implement certain actions in the device, whether the device is in an operational or non-operational state. [0039] In this disclosure, a parameter may comprise one or more information objects, and an information object may comprise one or more other objects. For example, if parameter J comprises parameter K, and parameter K comprises parameter L, and parameter L comprises parameter M, then J comprises L, and J comprises M. A parameter may be referred to as a field or information element. In an example embodiment, when one or more messages comprise a plurality of parameters, it implies that a parameter in the plurality of parameters is in at least one of the one or more messages, but does not have to be in each of the one or more messages.

[0040] This disclosure may refer to possible combinations of enumerated elements. For the sake of brevity and legibility, the present disclosure does not explicitly recite each and every permutation that may be obtained by choosing from a set of optional features. The present disclosure is to be interpreted as explicitly disclosing all such permutations. For example, the seven possible combinations of enumerated elements A, B, C consist of: (1) “A”; (2) “B”; (3) “C”; (4) “A and B”; (5) “A and C”; (6) “B and C”; and (7) “A, B, and C”. For the sake of brevity and legibility, these seven possible combinations may be described using any of the following interchangeable formulations: “at least one of A, B, and C”; “at least one of A, B, or C”; “one or more of A, B, and C”; “one or more of A, B, or C”; “A, B, and/or C”. It will be understood that impossible combinations are excluded. For example, “X and/or not-X” should be interpreted as “X or not-X”. It will be further understood that these formulations may describe alternative phrasings of overlapping and/or synonymous concepts, for example, “identifier, identification, and/or ID number”.

[0041] This disclosure may refer to sets and/or subsets. As an example, set X may be a set of elements comprising one or more elements. If every element of X is also an element of Y, then X may be referred to as a subset of Y. In this disclosure, only non-empty sets and subsets are considered. For example, if Y consists of the elements Y1, Y2, and Y3, then the possible subsets of Y are {Y1, Y2, Y3}, {Y1, Y2}, {Y1, Y3}, {Y2, Y3}, {Y1}, {Y2}, and {Y3}.

[0042] FIG. 1A illustrates an example of a communication network 100 in which embodiments of the present disclosure may be implemented. The communication network 100 may comprise, for example, a public land mobile network (PLMN) run by a network operator. As illustrated in FIG. 1A, the communication network 100 includes a wireless device 101, an access network (AN) 102, a core network (CN) 105, and one or more data network (DNs) 108.

[0043] The wireless device 101 may communicate with DNs 108 via AN 102 and CN 105. In the present disclosure, the term wireless device may refer to and encompass any mobile device or fixed (non-mobile) device for which wireless communication is needed or usable. For example, a wireless device may be a telephone, smart phone, tablet, computer, laptop, sensor, meter, wearable device, Internet of Things (loT) device, vehicle road side unit (RSU), relay node, automobile, unmanned aerial vehicle, urban air mobility, and/or any combination thereof. The term wireless device encompasses other terminology, including user equipment (UE), user terminal (UT), access terminal (AT), mobile station, handset, wireless transmit and receive unit (WTRU), and/or wireless communication device.

[0044] The AN 102 may connect wireless device 101 to CN 105 in any suitable manner. The communication direction from the AN 102 to the wireless device 101 is known as the downlink and the communication direction from the wireless device 101 to AN 102 is known as the uplink. Downlink transmissions may be separated from uplink transmissions using frequency division duplexing (FDD), time-division duplexing (TDD), and/or some combination of the two duplexing techniques. The AN 102 may connect to wireless device 101 through radio communications over an air interface. An access network that at least partially operates over the air interface may be referred to as a radio access network (RAN). The ON 105 may set up one or more end-to-end connection between wireless device 101 and the one or more DNs 108. The ON 105 may authenticate wireless device 101 and provide charging functionality.

[0045] In the present disclosure, the term base station may refer to and encompass any element of AN 102 that facilitates communication between wireless device 101 and AN 102. Access networks and base stations have many different names and implementations. The base station may be a terrestrial base station fixed to the earth. The base station may be a mobile base station with a moving coverage area. The base station may be in space, for example, on board a satellite. For example, WiFi and other standards may use the term access point. As another example, the Third-Generation Partnership Project (3GPP) has produced specifications for three generations of mobile networks, each of which uses different terminology. Third Generation (3G) and/or Universal Mobile Telecommunications System (UMTS) standards may use the term Node B. 4G, Long Term Evolution (LTE), and/or Evolved Universal Terrestrial Radio Access (E-UTRA) standards may use the term Evolved Node B (eNB). 5G and/or New Radio (NR) standards may describe AN 102 as a next-generation radio access network (NG-RAN) and may refer to base stations as Next Generation eNB (ng-eNB) and/or Generation Node B (gNB). Future standards (for example, 6G, 7G, 8G) may use new terminology to refer to the elements which implement the methods described in the present disclosure (e.g., wireless devices, base stations, ANs, CNs, and/or components thereof). A base station may be implemented as a repeater or relay node used to extend the coverage area of a donor node. A repeater node may amplify and rebroadcast a radio signal received from a donor node. A relay node may perform the same/similar functions as a repeater node but may decode the radio signal received from the donor node to remove noise before amplifying and rebroadcasting the radio signal.

[0046] The AN 102 may include one or more base stations, each having one or more coverage areas. The geographical size and/or extent of a coverage area may be defined in terms of a range at which a receiver of AN 102 can successfully receive transmissions from a transmitter (e.g., wireless device 101) operating within the coverage area (and/or vice-versa). The coverage areas may be referred to as sectors or cells (although in some contexts, the term cell refers to the carrier frequency used in a particular coverage area, rather than the coverage area itself). Base stations with large coverage areas may be referred to as macrocell base stations. Other base stations cover smaller areas, for example, to provide coverage in areas with weak macrocell coverage, or to provide additional coverage in areas with high traffic (sometimes referred to as hotspots). Examples of small cell base stations include, in order of decreasing coverage area, microcell base stations, picocell base stations, and femtocell base stations or home base stations. Together, the coverage areas of the base stations may provide radio coverage to wireless device 101 over a wide geographic area to support wireless device mobility.

[0047] A base station may include one or more sets of antennas for communicating with the wireless device 101 over the air interface. Each set of antennas may be separately controlled by the base station. Each set of antennas may have a corresponding coverage area. As an example, a base station may include three sets of antennas to respectively control three coverage areas on three different sides of the base station. The entirety of the base station (and its corresponding antennas) may be deployed at a single location. Alternatively, a controller at a central location may control one or more sets of antennas at one or more distributed locations. The controller may be, for example, a baseband processing unit that is part of a centralized or cloud RAN architecture. The baseband processing unit may be either centralized in a pool of baseband processing units or virtualized. A set of antennas at a distributed location may be referred to as a remote radio head (RRH).

[0048] FIG. 1 B illustrates another example communication network 150 in which embodiments of the present disclosure may be implemented. The communication network 150 may comprise, for example, a PLMN run by a network operator. As illustrated in FIG. 1 B, communication network 150 includes UEs 151 , a next generation radio access network (NG-RAN) 152, a 5G core network (5G-CN) 155, and one or more DNs 158. The NG-RAN 152 includes one or more base stations, illustrated as generation node Bs (gNBs) 152A and next generation evolved Node Bs (ng eNBs) 152B. The 5G-CN 155 includes one or more network functions (NFs), including control plane functions 155A and user plane functions 155B. The one or more DNs 158 may comprise public DNs (e.g., the Internet), private DNs, and/or intra-operator DNs. Relative to corresponding components illustrated in FIG. 1A, these components may represent specific implementations and/or terminology.

[0049] The base stations of the NG-RAN 152 may be connected to the UEs 151 via Uu interfaces. The base stations of the NG-RAN 152 may be connected to each other via Xn interfaces. The base stations of the NG-RAN 152 may be connected to 5G CN 155 via NG interfaces. The Uu interface may include an air interface. The NG and Xn interfaces may include an air interface, or may consist of direct physical connections and/or indirect connections over an underlying transport network (e.g., an internet protocol (IP) transport network).

[0050] Each of the Uu, Xn, and NG interfaces may be associated with a protocol stack. The protocol stacks may include a user plane (UP) and a control plane (CP). Generally, user plane data may include data pertaining to users of the UEs 151 , for example, internet content downloaded via a web browser application, sensor data uploaded via a tracking application, or email data communicated to or from an email server. Control plane data, by contrast, may comprise signaling and messages that facilitate packaging and routing of user plane data so that it can be exchanged with the DN(s). The NG interface, for example, may be divided into an NG user plane interface (NG-U) and an NG control plane interface (NG-C). The NG-U interface may provide delivery of user plane data between the base stations and the one or more user plane network functions 155B. The NG-C interface may be used for control signaling between the base stations and the one or more control plane network functions 155A. The NG-C interface may provide, for example, NG interface management, UE context management, UE mobility management, transport of NAS messages, paging, PDU session management, and configuration transfer and/or warning message transmission. In some cases, the NG-C interface may support transmission of user data (for example, a small data transmission for an loT device).

[0051] One or more of the base stations of the NG-RAN 152 may be split into a central unit (OU) and one or more distributed units (DUs). A OU may be coupled to one or more DUs via an F1 interface. The OU may handle one or more upper layers in the protocol stack and the DU may handle one or more lower layers in the protocol stack. For example, the CU may handle RRC, PDCP, and SDAP, and the DU may handle RLC, MAC, and PHY. The one or more DUs may be in geographically diverse locations relative to the CU and/or each other. Accordingly, the CU/DU split architecture may permit increased coverage and/or better coordination.

[0052] The gNBs 152A and ng-eNBs 152B may provide different user plane and control plane protocol termination towards the UEs 151. For example, the gNB 154A may provide new radio (NR) protocol terminations over a Uu interface associated with a first protocol stack. The ng-eNBs 152B may provide Evolved UMTS Terrestrial Radio Access (E-UTRA) protocol terminations over a Uu interface associated with a second protocol stack.

[0053] The 5G-CN 155 may authenticate UEs 151, set up end-to-end connections between UEs 151 and the one or more DNs 158, and provide charging functionality. The 5G-CN 155 may be based on a service-based architecture, in which the NFs making up the 5G-CN 155 offer services to each other and to other elements of the communication network 150 via interfaces. The5G-CN 155 may include any number of other NFs and any number of instances of each NF.

[0054] FIG. 2A, FIG. 2B, FIG. 2C, and FIG. 2D illustrate various examples of a framework for a service-based architecture within a core network. In a service-based architecture, a service may be sought by a service consumer and provided by a service producer. Prior to obtaining a particular service, an NF may determine where such as service can be obtained. To discover a service, the NF may communicate with a network repository function (NRF). As an example, an NF that provides one or more services may register with a network repository function (NRF). The NRF may store data relating to the one or more services that the NF is prepared to provide to other NFs in the service-based architecture. A consumer NF may query the NRF to discover a producer NF (for example, by obtaining from the NRF a list of NF instances that provide a particular service).

[0055] In the example of FIG. 2A, an NF 211 (a consumer NF in this example) may send a request 221 to an NF 212 (a producer NF). The request 221 may be a request for a particular service and may be sent based on a discovery that NF 212 is a producer of that service. The request 221 may comprise data relating to NF 211 and/or the requested service. The NF 212 may receive request 221, perform one or more actions associated with the requested service (e.g., retrieving data), and provide a response 221. The one or more actions performed by the NF 212 may be based on request data included in the request 221, data stored by NF 212, and/or data retrieved by NF 212. The response 222 may notify NF 211 that the one or more actions have been completed. The response 222 may comprise response data relating to NF 212, the one or more actions, and/or the requested service.

[0056] In the example of FIG. 2B, an NF 231 sends a request 241 to an NF 232. In this example, part of the service produced by NF 232 is to send a request 242 to an NF 233. The NF 233 may perform one or more actions and provide a response 243 to NF 232. Based on response 243, NF 232 may send a response 244 to NF 231. It will be understood from FIG. 2B that a single NF may perform the role of producer of services, consumer of services, or both. A particular NF service may include any number of nested NF services produced by one or more other NFs.

[0057] FIG. 2C illustrates examples of subscribe-notify interactions between a consumer NF and a producer NF. In FIG. 20, an NF 251 sends a subscription 261 to an NF 252. An NF 253 sends a subscription 262 to the NF 252. Two NFs are shown in FIG. 2C for illustrative purposes (to demonstrate that the NF 252 may provide multiple subscription services to different NFs), but it will be understood that a subscribe-notify interaction only requires one subscriber. The NFs 251 , 253 may be independent from one another. For example, the NFs 251 , 253 may independently discover NF 252 and/or independently determine to subscribe to the service offered by NF 252. In response to receipt of a subscription, the NF 252 may provide a notification to the subscribing NF. For example, NF 252 may send a notification 263 to NF 251 based on subscription 261 and may send a notification 264 to NF 253 based on subscription 262.

[0058] As shown in the example illustration of FIG. 20, the sending of the notifications 263, 264 may be based on a determination that a condition has occurred. For example, the notifications 263, 264 may be based on a determination that a particular event has occurred, a determination that a particular condition is outstanding, and/or a determination that a duration of time associated with the subscription has elapsed (for example, a period associated with a subscription for periodic notifications). As shown in the example illustration of FIG. 20, NF 252 may send notifications 263, 264 to NFs 251, 253 simultaneously and/or in response to the same condition. However, it will be understood that the NF 252 may provide notifications at different times and/or in response to different notification conditions. In an example, the NF 251 may request a notification when a certain parameter, as measured by the NF 252, exceeds a first threshold, and the NF 252 may request a notification when the parameter exceeds a second threshold different from the first threshold. In an example, a parameter of interest and/or a corresponding threshold may be indicated in the subscriptions 261, 262.

[0059] FIG. 2D illustrates another example of a subscribe-notify interaction. In FIG. 2D, an NF 271 sends a subscription 281 to an NF 272. In response to receipt of subscription 281 and/or a determination that a notification condition has occurred, NF 272 may send a notification 284. The notification 284 may be sent to an NF 273. Unlike the example in FIG. 2C (in which a notification is sent to the subscribing NF), FIG. 2D demonstrates that a subscription and its corresponding notification may be associated with different NFs. For example, NF 271 may subscribe to the service provided by NF 272 on behalf of NF 273.

[0060] FIG. 3 illustrates another example communication network 300 in which embodiments of the present disclosure may be implemented. Communication network 300 includes a user equipment (UE) 301 , an access network (AN) 302, and a data network (DN) 308. The remaining elements depicted in FIG. 3 may be included in and/or associated with a core network. Each element of the core network may be referred to as a network function (NF).

[0061] The NFs depicted in FIG. 3 include a user plane function (UPF) 305, an access and mobility management function (AMF) 312, a session management function (SMF) 314, a policy control function (PCF) 320, a network repository function (NRF) 330, a network exposure function (NEF) 340, a unified data management (UDM) 350, an authentication server function (AUSF) 360, a network slice selection function (NSSF) 370, a charging function (CHF) 380, a network data analytics function (NWDAF) 390, and an application function (AF) 399. The UPF 305 may be a user-plane core network function, whereas the NFs 312, 314, and 320-390 may be control-plane core network functions. Although not shown in the example of FIG. 3, the core network may include additional instances of any of the NFs depicted and/or one or more different NF types that provide different services. Other examples of NF type include a gateway mobile location center (GMLC), a location management function (LMF), an operations, administration, and maintenance function (0AM), a public warning system (PWS), a short message service function (SMSF), a unified data repository (UDR), and an unstructured data storage function (UDSF).

[0062] Each element depicted in FIG. 3 has an interface with at least one other element. The interface may be a logical connection rather than, for example, a direct physical connection. Any interface may be identified using a reference point representation and/or a service-based representation. In a reference point representation, the letter ‘N’ is followed by a numeral, indicating an interface between two specific elements. For example, as shown in FIG. 3, AN 302 and UPF 305 interface via ‘N3’, whereas UPF 305 and DN 308 interface via ‘N6’. By contrast, in a service-based representation, the letter ‘N’ is followed by letters. The letters identify an NF that provides services to the core network. For example, PCF 320 may provide services via interface ‘Npcf . The PCF 320 may provide services to any NF in the core network via 'Npcf. Accordingly, a service-based representation may correspond to a bundle of reference point representations. For example, the Npcf interface between PCF 320 and the core network generally may correspond to an N7 interface between PCF 320 and SMF 314, an N30 interface between PCF 320 and NEF 340, etc.

[0063] The UPF 305 may serve as a gateway for user plane traffic between AN 302 and DN 308. The UE 301 may connect to UPF 305 via a Uu interface and an N3 interface (also described as NG-U interface). The UPF 305 may connect to DN 308 via an N6 interface. The UPF 305 may connect to one or more other UPFs (not shown) via an N9 interface. The UE 301 may be configured to receive services through a protocol data unit (PDU) session, which is a logical connection between UE 301 and DN 308. The UPF 305 (or a plurality of UPFs if desired) may be selected by SMF 314 to handle a particular PDU session between UE 301 and DN 308. The SMF 314 may control the functions of UPF 305 with respect to the PDU session. The SMF 314 may connect to UPF 305 via an N4 interface. The UPF 305 may handle any number of PDU sessions associated with any number of UEs (via any number of ANs). For purposes of handling the one or more PDU sessions, UPF 305 may be controlled by any number of SMFs via any number of corresponding N4 interfaces.

[0064] The AMF 312 depicted in FIG. 3 may control UE access to the core network. The UE 301 may register with the network via AMF 312. It may be necessary for UE 301 to register prior to establishing a PDU session. The AMF 312 may manage a registration area of UE 301, enabling the network to track the physical location of UE 301 within the network. Fora UE in connected mode, AMF 312 may manage UE mobility, for example, handovers from one AN or portion thereof to another. For a UE in idle mode, AMF 312 may perform registration updates and/or page the UE to transition the UE to connected mode.

[0065] The AMF 312 may receive, from UE 301, non-access stratum (NAS) messages transmitted in accordance with NAS protocol. NAS messages relate to communications between UE 301 and the core network. Although NAS messages may be relayed to AMF 312 via AN 302, they may be described as communications via the N1 interface. NAS messages may facilitate UE registration and mobility management, for example, by authenticating, identifying, configuring, and/or managing a connection of UE 301. NAS messages may support session management procedures for maintaining user plane connectivity and quality of service (QoS) of a session between UE 301 and DN 309. If the NAS message involves session management, AMF 312 may send the NAS message to SMF 314. NAS messages may be used to transport messages between UE 301 and other components of the core network (e.g., core network components other than AMF 312 and SMF 314). The AMF 312 may act on a particular NAS message itself, or alternatively, forward the NAS message to an appropriate core network function (e.g., SMF 314, etc.)

[0066] The SMF 314 depicted in FIG. 3 may establish, modify, and/or release a PDU session based on messaging received UE 301. The SMF 314 may allocate, manage, and/or assign an IP address to UE 301, for example, upon establishment of a PDU session. There may be multiple SMFs in the network, each of which may be associated with a respective group of wireless devices, base stations, and/or UPFs. A UE with multiple PDU sessions may be associated with a different SMF for each PDU session. As noted above, SMF 314 may select one or more UPFs to handle a PDU session and may control the handling of the PDU session by the selected UPF by providing rules for packet handling (PDR, FAR, QER, etc.). Rules relating to QoS and/or charging for a particular PDU session may be obtained from PCF 320 and provided to UPF 305.

[0067] The PCF 320 may provide, to other NFs, services relating to policy rules. The PCF 320 may use subscription data and information about network conditions to determine policy rules and then provide the policy rules to a particular NF which may be responsible for enforcement of those rules. Policy rules may relate to policy control for access and mobility, and may be enforced by the AMF. Policy rules may relate to session management, and may be enforced by the SMF 314. Policy rules may be, for example, network-specific, wireless device-specific, sessionspecific, or data flow-specific.

[0068] The NRF 330 may provide service discovery. The NRF 330 may belong to a particular PLMN. The NRF 330 may maintain NF profiles relating to other NFs in the communication network 300. The NF profile may include, for example, an address, PLMN, and/or type of the NF, a slice identifier, a list of the one or more services provided by the NF, and the authorization required to access the services.

[0069] The NEF 340 depicted in FIG. 3 may provide an interface to external domains, permitting external domains to selectively access the control plane of the communication network 300. The external domain may comprise, for example, third-party network functions, application functions, etc. The NEF 340 may act as a proxy between external elements and network functions such as AMF 312, SMF 314, PCF 320, UDM 350, etc. As an example, NEF 340 may determine a location or reachability status of UE 301 based on reports from AMF 312, and provide status information to an external element. As an example, an external element may provide, via NEF 340, information that facilitates the setting of parameters for establishment of a PDU session. The NEF 340 may determine which data and capabilities of the control plane are exposed to the external domain. The NEF 340 may provide secure exposure that authenticates and/or authorizes an external entity to which data or capabilities of the communication network 300 are exposed. The NEF 340 may selectively control the exposure such that the internal architecture of the core network is hidden from the external domain.

[0070] The UDM 350 may provide data storage for other NFs. The UDM 350 may permit a consolidated view of network information that may be used to ensure that the most relevant information can be made available to different NFs from a single resource. The UDM 350 may store and/or retrieve information from a unified data repository (UDR). For example, UDM 350 may obtain user subscription data relating to UE 301 from the UDR.

[0071] The AUSF 360 may support mutual authentication of UE 301 by the core network and authentication of the core network by UE 301. The AUSF 360 may perform key agreement procedures and provide keying material that can be used to improve security.

[0072] The NSSF 370 may select one or more network slices to be used by the UE 301. The NSSF 370 may select a slice based on slice selection information. For example, the NSSF 370 may receive Single Network Slice Selection Assistance Information (S-NSSAI) and map the S-NSSAI to a network slice instance identifier (NSI).

[0073] The CHF 380 may control billing-related tasks associated with UE 301. For example, UPF 305 may report traffic usage associated with UE 301 to SMF 314. The SMF 314 may collect usage data from UPF 305 and one or more other UPFs. The usage data may indicate how much data is exchanged, what DN the data is exchanged with, a network slice associated with the data, or any other information that may influence billing. The SMF 314 may share the collected usage data with the CHF. The CHF may use the collected usage data to perform billing- related tasks associated with UE 301. The CHF may, depending on the billing status of UE 301, instruct SMF 314 to limit or influence access of UE 301 and/or to provide billing-related notifications to UE 301.

[0074] The NWDAF 390 may collect and analyze data from other network functions and offer data analysis services to other network functions. As an example, NWDAF 390 may collect data relating to a load level for a particular network slice instance from UPF 305, AMF 312, and/or SMF 314. Based on the collected data, NWDAF 390 may provide load level data to the PCF 320 and/or NSSF 370, and/or notify the PC220 and/or NSSF 370 if load level for a slice reaches and/or exceeds a load level threshold.

[0075] The AF 399 may be outside the core network, but may interact with the core network to provide information relating to the QoS requirements or traffic routing preferences associated with a particular application. The AF 399 may access the core network based on the exposure constraints imposed by the NEF 340. However, an operator of the core network may consider the AF 399 to be a trusted domain that can access the network directly.

[0076] FIGS. 4A, 4B, and 5 illustrate other examples of core network architectures that are analogous in some respects to the core network architecture 300 depicted in FIG. 3. For conciseness, some of the core network elements depicted in FIG. 3 are omitted. Many of the elements depicted in FIGS. 4A, 4B, and 5 are analogous in some respects to elements depicted in FIG. 3. For conciseness, some of the details relating to their functions or operation are omitted.

[0077] FIG. 4A illustrates an example of a core network architecture 400A comprising an arrangement of multiple UPFs. Core network architecture 400A includes a UE 401, an AN 402, an AMF 412, and an SMF 414. Unlike previous examples of core network architectures described above, FIG. 4A depicts multiple UPFs, including a UPF 405, a UPF 406, and a UPF 407, and multiple DNs, including a DN 408 and a DN 409. Each of the multiple UPFs 405, 406, 407 may communicate with the SMF 414 via an N4 interface. The DNs 408, 409 communicate with the UPFs 405, 406, respectively, via N6 interfaces. As shown in FIG. 4A, the multiple UPFs 405, 406, 407 may communicate with one another via N9 interfaces.

[0078] The UPFs 405, 406, 407 may perform traffic detection, in which the UPFs identify and/or classify packets. Packet identification may be performed based on packet detection rules (PDR) provided by the SMF 414. A PDR may include packet detection information comprising one or more of: a source interface, a UE IP address, core network (CN) tunnel information (e.g., a CN address of an N3/N9 tunnel corresponding to a PDU session), a network instance identifier, a quality of service flow identifier (QFI), a filter set (for example, an IP packet filter set or an ethernet packet filter set), and/or an application identifier.

[0079] In addition to indicating how a particular packet is to be detected, a PDR may further indicate rules for handling the packet upon detection thereof. The rules may include, for example, forwarding action rules (FARs), multi-access rules (MARs), usage reporting rules (URRs), QoS enforcement rules (QERs), etc. For example, the PDR may comprise one or more FAR identifiers, MAR identifiers, URR identifiers, and/or QER identifiers. These identifiers may indicate the rules that are prescribed for the handling of a particular detected packet.

[0080] The UPF 405 may perform traffic forwarding in accordance with a FAR. For example, the FAR may indicate that a packet associated with a particular PDR is to be forwarded, duplicated, dropped, and/or buffered. The FAR may indicate a destination interface, for example, “access” for downlink or “core” for uplink. If a packet is to be buffered, the FAR may indicate a buffering action rule (BAR). As an example, UPF 405 may perform data buffering of a certain number downlink packets if a PDU session is deactivated.

[0081] The UPF 405 may perform QoS enforcement in accordance with a QER. For example, the QER may indicate a guaranteed bitrate that is authorized and/or a maximum bitrate to be enforced for a packet associated with a particular PDR. The QER may indicate that a particular guaranteed and/or maximum bitrate may be for uplink packets and/or downlink packets. The UPF 405 may mark packets belonging to a particular QoS flow with a corresponding QFI. The marking may enable a recipient of the packet to determine a QoS of the packet.

[0082] The UPF 405 may provide usage reports to the SMF 414 in accordance with a URR. The URR may indicate one or more triggering conditions for generation and reporting of the usage report, for example, immediate reporting, periodic reporting, a threshold for incoming uplink traffic, or any other suitable triggering condition. The URR may indicate a method for measuring usage of network resources, for example, data volume, duration, and/or event.

[0083] As noted above, the DNs 408, 409 may comprise public DNs (e.g., the Internet), private DNs (e.g., private, internal corporate-owned DNs), and/or intra-operator DNs. Each DN may provide an operator service and/or a third-party service. The service provided by a DN may be the Internet, an IP multimedia subsystem (IMS), an augmented or virtual reality network, an edge computing or mobile edge computing (MEO) network, etc. Each DN may be identified using a data network name (DNN). The UE 401 may be configured to establish a first logical connection with DN 408 (a first PDU session), a second logical connection with DN 409 (a second PDU session), or both simultaneously (first and second PDU sessions).

[0084] Each PDU session may be associated with at least one UPF configured to operate as a PDU session anchor (PSA, or “anchor”). The anchor may be a UPF that provides an N6 interface with a DN.

[0085] In the example of FIG. 4A, UPF 405 may be the anchor for the first PDU session between UE 401 and DN 408, whereas the UPF 406 may be the anchor for the second PDU session between UE 401 and DN 409. The core network may use the anchor to provide service continuity of a particular PDU session (for example, IP address continuity) as UE 401 moves from one access network to another. For example, suppose that UE 401 establishes a PDU session using a data path to the DN 408 using an access network other than AN 402. The data path may include UPF 405 acting as anchor. Suppose further that the UE 401 later moves into the coverage area of the AN 402. In such a scenario, SMF 414 may select a new UPF (UPF 407) to bridge the gap between the newly-entered access network (AN 402) and the anchor UPF (UPF 405). The continuity of the PDU session may be preserved as any number of UPFs are added or removed from the data path. When a UPF is added to a data path, as shown in FIG. 4A, it may be described as an intermediate UPF and/or a cascaded UPF.

[0086] As noted above, UPF 406 may be the anchor for the second PDU session between UE 401 and DN 409. Although the anchor for the first and second PDU sessions are associated with different UPFs in FIG. 4A, it will be understood that this is merely an example. It will also be understood that multiple PDU sessions with a single DN may correspond to any number of anchors. When there are multiple UPFs, a UPF at the branching point (UPF 407 in FIG. 4) may operate as an uplink classifier (UL-CL). The UL-CL may divert uplink user plane traffic to different UPFs.

[0087] The SMF 414 may allocate, manage, and/or assign an IP address to UE 401, for example, upon establishment of a PDU session. The SMF 414 may maintain an internal pool of IP addresses to be assigned. The SMF 414 may, if necessary, assign an IP address provided by a dynamic host configuration protocol (DHCP) server or an authentication, authorization, and accounting (AAA) server. IP address management may be performed in accordance with a session and service continuity (SSC) mode. In SSC mode 1, an IP address of UE 401 may be maintained (and the same anchor UPF may be used) as the wireless device moves within the network. In SSC mode 2, the IP address of UE 401 changes as UE 401 moves within the network (e.g., the old IP address and UPF may be abandoned and a new IP address and anchor UPF may be established). In SSC mode 3, it may be possible to maintain an old IP address (similar to SSC mode 1) temporarily while establishing a new IP address (similar to SSC mode 2), thus combining features of SSC modes 1 and 2. Applications that are sensitive to IP address changes may operate in accordance with SSC mode 1.

[0088] UPF selection may be controlled by SMF 414. For example, upon establishment and/or modification of a PDU session between UE 401 and DN 408, SMF 414 may select UPF 405 as the anchor for the PDU session and/or UPF 407 as an intermediate UPF. Criteria for UPF selection include path efficiency and/or speed between AN 402 and DN 408. The reliability, load status, location, slice support and/or other capabilities of candidate UPFs may also be considered.

[0089] FIG. 4B illustrates an example of a core network architecture 400B that accommodates untrusted access. Similar to FIG. 4A, UE 401 as depicted in FIG. 4B connects to DN 408 via AN 402 and UPF 405. The AN 402 and UPF 405 constitute trusted (e.g., 3GPP) access to the DN 408. By contrast, UE 401 may also access DN 408 using an untrusted access network, AN 403, and a non-3GPP interworking function (N3IWF) 404.

[0090] The AN 403 may be, for example, a wireless land area network (WLAN) operating in accordance with the IEEE 802.11 standard. The UE 401 may connect to AN 403, via an interface Y1, in whatever manner is prescribed for AN 403. The connection to AN 403 may or may not involve authentication. The UE 401 may obtain an IP address from AN 403. The UE 401 may determine to connect to core network 400B and select untrusted access for that purpose. The AN 403 may communicate with N3IWF 404 via a Y2 interface. After selecting untrusted access, the UE 401 may provide N3IWF 404 with sufficient information to select an AMF. The selected AMF may be, for example, the same AMF that is used by UE 401 for 3GPP access (AMF 412 in the present example). The N3IWF 404 may communicate with AMF 412 via an N2 interface. The UPF 405 may be selected and N3IWF 404 may communicate with UPF 405 via an N3 interface. The UPF 405 may be a PDU session anchor (PSA) and may remain the anchor for the PDU session even as UE 401 shifts between trusted access and untrusted access.

[0091] FIG. 5 illustrates an example of a core network architecture 500 in which a UE 501 is in a roaming scenario. In a roaming scenario, UE 501 is a subscriber of a first PLMN (a home PLMN, or HPLMN) but attaches to a second PLMN (a visited PLMN, or VPLMN). Core network architecture 500 includes UE 501 , an AN 502, a UPF 505, and a DN 508. The AN 502 and UPF 505 may be associated with a VPLMN. The VPLMN may manage the AN 502 and UPF 505 using core network elements associated with the VPLMN, including an AMF 512, an SMF 514, a POF 520, an NRF 530, an NEF 540, and an NSSF 570. An AF 599 may be adjacent the core network of the VPLMN.

[0092] The UE 501 may not be a subscriber of the VPLMN. The AMF 512 may authorize UE 501 to access the network based on, for example, roaming restrictions that apply to UE 501. In order to obtain network services provided by the VPLMN, it may be necessary for the core network of the VPLMN to interact with core network elements of a HPLMN of UE 501 , in particular, a POF 521 , an NRF 531 , an NEF 541 , a UDM 551 , and/or an AUSF 561. The VPLMN and HPLMN may communicate using an N32 interface connecting respective security edge protection proxies (SEPPs). In FIG. 5, the respective SEPPs are depicted as a VSEPP 590 and an HSEPP 591.

[0093] The VSEPP 590 and the HSEPP 591 communicate via an N32 interface for defined purposes while concealing information about each PLMN from the other. The SEPPs may apply roaming policies based on communications via the N32 interface. The PCF 520 and PCF 521 may communicate via the SEPPs to exchange policy-related signaling. The NRF 530 and NRF 531 may communicate via the SEPPs to enable service discovery of NFs in the respective PLMNs. The VPLMN and HPLMN may independently maintain NEF 540 and NEF 541. The NSSF 570 and NSSF 571 may communicate via the SEPPs to coordinate slice selection for UE 501. The HPLMN may handle all authentication and subscription related signaling. For example, when the UE 501 registers or requests service via the VPLMN, the VPLMN may authenticate UE 501 and/or obtain subscription data of UE 501 by accessing, via the SEPPs, the UDM 551 and AUSF 561 of the HPLMN.

[0094] The core network architecture 500 depicted in FIG. 5 may be referred to as a local breakout configuration, in which UE 501 accesses DN 508 using one or more UPFs of the VPLMN (i.e., UPF 505). However, other configurations are possible. For example, in a home-routed configuration (not shown in FIG. 5), UE 501 may access a DN using one or more UPFs of the HPLMN. In the home-routed configuration, an N9 interface may run parallel to the N32 interface, crossing the frontier between the VPLMN and the HPLMN to carry user plane data. One or more SMFs of the respective PLMNs may communicate via the N32 interface to coordinate session management for UE 501. The SMFs may control their respective UPFs on either side of the frontier.

[0095] FIG. 6 illustrates an example of network slicing. Network slicing may refer to division of shared infrastructure (e.g., physical infrastructure) into distinct logical networks. These distinct logical networks may be independently controlled, isolated from one another, and/or associated with dedicated resources.

[0096] Network architecture 600A illustrates an un-sliced physical network corresponding to a single logical network. The network architecture 600A comprises a user plane wherein UEs 601 A, 601 B, 601 C (collectively, UEs 601) have a physical and logical connection to a DN 608 via an AN 602 and a UPF 605. The network architecture 600A comprises a control plane wherein an AMF 612 and a SMF 614 control various aspects of the user plane.

[0097] The network architecture 600A may have a specific set of characteristics (e.g., relating to maximum bit rate, reliability, latency, bandwidth usage, power consumption, etc.). This set of characteristics may be affected by the nature of the network elements themselves (e.g., processing power, availability of free memory, proximity to other network elements, etc.) or the management thereof (e.g., optimized to maximize bit rate or reliability, reduce latency or power bandwidth usage, etc.). The characteristics of network architecture 600A may change over time, for example, by upgrading equipment or by modifying procedures to target a particular characteristic. However, at any given time, network architecture 600A will have a single set of characteristics that may or may not be optimized for a particular use case. For example, UEs 601 A, 601 B, 601 C may have different requirements, but network architecture 600A can only be optimized for one of the three.

[0098] Network architecture 600B is an example of a sliced physical network divided into multiple logical networks. In FIG. 6, the physical network is divided into three logical networks, referred to as slice A, slice B, and slice C. For example, UE 601 A may be served by AN 602A, UPF 605A, AMF 612, and SMF 614A. UE 601 B may be served by AN 602B, UPF 605B, AMF 612, and SMF 614B. UE 601C may be served by AN 602C, UPF 605C, AMF 612, and SMF 614C. Although the respective UEs 601 communicate with different network elements from a logical perspective, these network elements may be deployed by a network operator using the same physical network elements.

[0099] Each network slice may be tailored to network services having different sets of characteristics. For example, slice A may correspond to enhanced mobile broadband (eMBB) service. Mobile broadband may refer to internet access by mobile users, commonly associated with smartphones. Slice B may correspond to ultra-reliable low- latency communication (URLLC), which focuses on reliability and speed. Relative to eMBB, URLLO may improve the feasibility of use cases such as autonomous driving and telesurgery. Slice C may correspond to massive machine type communication (mMTC), which focuses on low-power services delivered to a large number of users. For example, slice C may be optimized for a dense network of battery-powered sensors that provide small amounts of data at regular intervals. Many mMTC use cases would be prohibitively expensive if they operated using an eMBB or URLLO network.

[0100] If the service requirements for one of the UEs 601 changes, then the network slice serving that UE can be updated to provide better service. Moreover, the set of network characteristics corresponding to eMBB, URLLO, and mMTC may be varied, such that differentiated species of eMBB, URLLC, and mMTC are provided. Alternatively, network operators may provide entirely new services in response to, for example, customer demand.

[0101] In FIG. 6, each of the UEs 601 has its own network slice. However, it will be understood that a single slice may serve any number of UEs and a single UE may operate using any number of slices. Moreover, in the example network architecture 600B, the AN 602, UPF 605 and SMF 614 are separated into three separate slices, whereas the AMF 612 is unsliced. However, it will be understood that a network operator may deploy any architecture that selectively utilizes any mix of sliced and unsliced network elements, with different network elements divided into different numbers of slices. Although FIG. 6 only depicts three core network functions, it will be understood that other core network functions may be sliced as well. A PLMN that supports multiple network slices may maintain a separate network repository function (NFR) for each slice, enabling other NFs to discover network services associated with that slice.

[0102] Network slice selection may be controlled by an AMF, or alternatively, by a separate network slice selection function (NSSF). For example, a network operator may define and implement distinct network slice instances (NSIs). Each NSI may be associated with single network slice selection assistance information (S-NSSAI). The S-NSSAI may include a particular slice/service type (SST) indicator (indicating eMBB, URLLC, mMTC, etc.), as an example, a particular tracking area may be associated with one or more configured S-NSSAIs. UEs may identify one or more requested and/or subscribed S-NSSAIs (e.g., during registration). The network may indicate to the UE one or more allowed and/or rejected S-NSSAIs.

[0103] The S-NSSAI may further include a slice differentiator (SD) to distinguish between different tenants of a particular slice and/or service type. For example, a tenant may be a customer (e.g., vehicle manufacture, service provider, etc.) of a network operator that obtains (for example, purchases) guaranteed network resources and/or specific policies for handling its subscribers. The network operator may configure different slices and/or slice types, and use the SD to determine which tenant is associated with a particular slice.

[0104] FIG. 7A, FIG. 7B, and FIG. 7C illustrate a user plane (UP) protocol stack, a control plane (CP) protocol stack, and services provided between protocol layers of the UP protocol stack.

[0105] The layers may be associated with an open system interconnection (OSI) model of computer networking functionality. In the OSI model, layer 1 may correspond to the bottom layer, with higher layers on top of the bottom layer. Layer 1 may correspond to a physical layer, which is concerned with the physical infrastructure used for transfer of signals (for example, cables, fiber optics, and/or radio frequency transceivers). In New Radio (NR), layer 1 may comprise a physical layer (PHY). Layer 2 may correspond to a data link layer. Layer 2 may be concerned with packaging of data (into, e.g., data frames) for transfer, between nodes of the network, using the physical infrastructure of layer 1. In NR, layer 2 may comprise a media access control layer (MAC), a radio link control layer (RLC), a packet data convergence layer (PDCP), and a service data application protocol layer (SDAP).

[0106] Layer 3 may correspond to a network layer. Layer 3 may be concerned with routing of the data which has been packaged in layer 2. Layer 3 may handle prioritization of data and traffic avoidance. In NR, layer 3 may comprise a radio resource control layer (RRC) and a non-access stratum layer (NAS). Layers 4 through 7 may correspond to a transport layer, a session layer, a presentation layer, and an application layer. The application layer interacts with an end user to provide data associated with an application. In an example, an end user implementing the application may generate data associated with the application and initiate sending of that information to a targeted data network (e.g., the Internet, an application server, etc.). Starting at the application layer, each layer in the OSI model may manipulate and/or repackage the information and deliver it to a lower layer. At the lowest layer, the manipulated and/or repackaged information may be exchanged via physical infrastructure (for example, electrically, optically, and/or electromagnetically). As it approaches the targeted data network, the information will be unpackaged and provided to higher and higher layers, until it once again reaches the application layer in a form that is usable by the targeted data network (e.g., the same form in which it was provided by the end user). To respond to the end user, the data network may perform this procedure in reverse.

[0107] FIG. 7A illustrates a user plane protocol stack. The user plane protocol stack may be a new radio (NR) protocol stack for a Uu interface between a UE 701 and a gNB 702. In layer 1 of the UP protocol stack, the UE 701 may implement PHY 731 and the gNB 702 may implement PHY 732. In layer 2 of the UP protocol stack, the UE 701 may implement MAC 741, RLC 751, PDCP 761, and SDAP 771. The gNB 702 may implement MAC 742, RLC 752, PDCP 762, and SDAP 772.

[0108] FIG. 7B illustrates a control plane protocol stack. The control plane protocol stack may be an NR protocol stack for the Uu interface between the UE 701 and the gNB 702 and/or an N1 interface between the UE 701 and an AMF 712. In layer 1 of the CP protocol stack, the UE 701 may implement PHY 731 and the gNB 702 may implement PHY 732. In layer 2 of the CP protocol stack, the UE 701 may implement MAC 741, RLC 751, PDCP 761, RRC 781, and NAS 791. The gNB 702 may implement MAC 742, RLC 752, PDCP 762, and RRC 782. The AMF 712 may implement NAS 792.

[0109] The NAS may be concerned with the non-access stratum, in particular, communication between the UE 701 and the core network (e.g., the AMF 712). Lower layers may be concerned with the access stratum, for example, communication between the UE 701 and the gNB 702. Messages sent between the UE 701 and the core network may be referred to as NAS messages. In an example, a NAS message may be relayed by the gNB 702, but the content of the NAS message (e.g., information elements of the NAS message) may not be visible to the gNB 702.

[0110] FIG. 70 illustrates an example of services provided between protocol layers of the NR user plane protocol stack illustrated in FIG. 7A. The UE 701 may receive services through a PDU session, which may be a logical connection between the UE 701 and a data network (DN). The UE 701 and the DN may exchange data packets associated with the PDU session. The PDU session may comprise one or more quality of service (QoS) flows. SDAP 771 and SDAP 772 may perform mapping and/or demapping between the one or more QoS flows of the PDU session and one or more radio bearers (e.g., data radio bearers). The mapping between the QoS flows and the data radio bearers may be determined in the SDAP 772 by the gNB 702, and the UE 701 may be notified of the mapping (e.g., based on control signaling and/or reflective mapping). For reflective mapping, the SDAP 772 of the gNB 220 may mark downlink packets with a QoS flow indicator (QFI) and deliver the downlink packets to the UE 701. The UE 701 may determine the mapping based on the QFI of the downlink packets.

[0111] PDCP 761 and PDCP 762 may perform header compression and/or decompression. Header compression may reduce the amount of data transmitted over the physical layer. The PDCP 761 and PDCP 762 may perform ciphering and/or deciphering. Ciphering may reduce unauthorized decoding of data transmitted over the physical layer (e.g., intercepted on an air interface), and protect data integrity (e.g., to ensure control messages originate from intended sources). The PDCP 761 and PDCP 762 may perform retransmissions of undelivered packets, insequence delivery and reordering of packets, duplication of packets, and/or identification and removal of duplicate packets. In a dual connectivity scenario, PDCP 761 and PDCP 762 may perform mapping between a split radio bearer and RLC channels.

[0112] RLC 751 and RLC 752 may perform segmentation, retransmission through Automatic Repeat Request (ARQ). The RLC 751 and RLC 752 may perform removal of duplicate data units received from MAC 741 and MAC 742, respectively. The RLCs 213 and 223 may provide RLC channels as a service to PDCPs 214 and 224, respectively.

[0113] MAC 741 and MAC 742 may perform multiplexing and/or demultiplexing of logical channels. MAC 741 and MAC 742 may map logical channels to transport channels. In an example, UE 701 may, in MAC 741 , multiplex data units of one or more logical channels into a transport block. The UE 701 may transmit the transport block to the gNB 702 using PHY 731. The gNB 702 may receive the transport block using PHY 732 and demultiplex data units of the transport blocks back into logical channels. MAC 741 and MAC 742 may perform error correction through Hybrid Automatic Repeat Request (HARQ), logical channel prioritization, and/or padding.

[0114] PHY 731 and PHY 732 may perform mapping of transport channels to physical channels. PHY 731 and PHY 732 may perform digital and analog signal processing functions (e.g., coding/decoding and modulation/demodulation) for sending and receiving information (e.g., transmission via an air interface). PHY 731 and PHY 732 may perform multi-antenna mapping.

[0115] FIG. 8 illustrates an example of a quality of service (QoS) model for differentiated data exchange. In the QoS model of FIG. 8, there are a UE 801, a AN 802, and a UPF 805. The QoS model facilitates prioritization of certain packet or protocol data units (PDUs), also referred to as packets. For example, higher-priority packets may be exchanged faster and/or more reliably than lower-priority packets. The network may devote more resources to exchange of high-QoS packets.

[0116] In the example of FIG. 8, a PDU session 810 is established between UE 801 and UPF 805. The PDU session 810 may be a logical connection enabling the UE 801 to exchange data with a particular data network (for example, the Internet). The UE 801 may request establishment of the PDU session 810. At the time that the PDU session 810 is established, the UE 801 may, for example, identify the targeted data network based on its data network name (DNN). The PDU session 810 may be managed, for example, by a session management function (SMF, not shown). In order to facilitate exchange of data associated with the PDU session 810, between the UE 801 and the data network, the SMF may select the UPF 805 (and optionally, one or more other UPFs, not shown).

[0117] One or more applications associated with UE 801 may generate uplink packets 812A-812E associated with the PDU session 810. In order to work within the QoS model, UE 801 may apply QoS rules 814 to uplink packets 812A-812E. The QoS rules 814 may be associated with PDU session 810 and may be determined and/or provided to the UE 801 when PDU session 810 is established and/or modified. Based on QoS rules 814, UE 801 may classify uplink packets 812A-812E, map each of the uplink packets 812A-812E to a QoS flow, and/or mark uplink packets 812A-812E with a QoS flow indicator (QFI). As a packet travels through the network, and potentially mixes with other packets from other UEs having potentially different priorities, the QFI indicates how the packet should be handled in accordance with the QoS model. In the present illustration, uplink packets 812A, 812B are mapped to QoS flow 816A, uplink packet 812C is mapped to QoS flow 816B, and the remaining packets are mapped to QoS flow 816C.

[0118] The QoS flows may be the finest granularity of QoS differentiation in a PDU session. In the figure, three QoS flows 816A-816C are illustrated. However, it will be understood that there may be any number of QoS flows. Some QoS flows may be associated with a guaranteed bit rate (GBR QoS flows) and others may have bit rates that are not guaranteed (non-GBR QoS flows). QoS flows may also be subject to per-UE and per-session aggregate bit rates. One of the QoS flows may be a default QoS flow. The QoS flows may have different priorities. For example, QoS flow 816A may have a higher priority than QoS flow 816B, which may have a higher priority than QoS flow 8160. Different priorities may be reflected by different QoS flow characteristics. For example, QoS flows may be associated with flow bit rates. A particular QoS flow may be associated with a guaranteed flow bit rate (GFBR) and/or a maximum flow bit rate (MFBR). QoS flows may be associated with specific packet delay budgets (PDBs), packet error rates (PERs), and/or maximum packet loss rates. QoS flows may also be subject to per-UE and per- session aggregate bit rates. [0119] In order to work within the QoS model, UE 801 may apply resource mapping rules 818 to the QoS flows 816A- 816C. The air interface between UE 801 and AN 802 may be associated with resources 820. In the present illustration, QoS flow 816A is mapped to resource 820A, whereas QoS flows 816B, 816C are mapped to resource 820B. The resource mapping rules 818 may be provided by the AN 802. In order to meet QoS requirements, the resource mapping rules 818 may designate more resources for relatively high-priority QoS flows. With more resources, a high-priority QoS flow such as QoS flow 816A may be more likely to obtain the high flow bit rate, low packet delay budget, or other characteristic associated with QoS rules 814. The resources 820 may comprise, for example, radio bearers. The radio bearers (e.g., data radio bearers) may be established between the UE 801 and the AN 802. The radio bearers in 5G, between the UE 801 and the AN 802, may be distinct from bearers in LTE, for example, Evolved Packet System (EPS) bearers between a UE and a packet data network gateway (PGW), S1 bearers between an eNB and a serving gateway (SGW), and/or an S5/S8 bearer between an SGW and a PGW.

[0120] Once a packet associated with a particular QoS flow is received at AN 802 via resource 820A or resource 820B, AN 802 may separate packets into respective QoS flows 856A-856O based on QoS profiles 828. The QoS profiles 828 may be received from an SMF. Each QoS profile may correspond to a QFI, for example, the QFI marked on the uplink packets 812A-812E. Each QoS profile may include QoS parameters such as 5G QoS identifier (5QI) and an allocation and retention priority (ARP). The QoS profile for non-GBR QoS flows may further include additional QoS parameters such as a reflective QoS attribute (RQA).The QoS profile for GBR QoS flows may further include additional QoS parameters such as a guaranteed flow bit rate (GFBR), a maximum flow bit rate (MFBR), and/or a maximum packet loss rate. The 5QI may be a standardized 5QI which have one-to-one mapping to a standardized combination of 5G QoS characteristics per well-known services. The 5QI may be a dynamically assigned 5QI which the standardized 5QI values are not defined. The 5QI may represent 5G QoS characteristics. The 5QI may comprise a resource type, a default priority level, a packet delay budget (PDB), a packet error rate (PER), a maximum data burst volume, and/or an averaging window. The resource type may indicate a non-GBR QoS flow, a GBR QoS flow or a delay-critical GBR QoS flow. The averaging window may represent a duration over which the GFBR and/or MFBR is calculated. ARP may be a priority level comprising pre-emption capability and a pre-emption vulnerability. Based on the ARP, the AN 802 may apply admission control for the QoS flows in a case of resource limitations.

[0121] The AN 802 may select one or more N3 tunnels 850 for transmission of the QoS flows 856A-856C. After the packets are divided into QoS flows 856A-856C, the packet may be sent to UPF 805 (e.g., towards a DN) via the selected one or more N3 tunnels 850. The UPF 805 may verify that the QFIs of the uplink packets 812A-812E are aligned with the QoS rules 814 provided to the UE 801. The UPF 805 may measure and/or count packets and/or provide packet metrics to, for example, a PCF.

[0122] The figure also illustrates a process for downlink. In particular, one or more applications may generate downlink packets 852A-852E. The UPF 805 may receive downlink packets 852A-852E from one or more DNs and/or one or more other UPFs. As per the QoS model, UPF 805 may apply packet detection rules (PDRs) 854 to downlink packets 852A-852E. Based on PDRs 854, UPF 805 may map packets 852A-852E into QoS flows. In the present illustration, downlink packets 852A, 852B are mapped to QoS flow 856A, downlink packet 852C is mapped to QoS flow 856B, and the remaining packets are mapped to QoS flow 856C.

[0123] The QoS flows 856A-856C may be sent to AN 802. The AN 802 may apply resource mapping rules to the QoS flows 856A-856C. In the present illustration, QoS flow 856A is mapped to resource 820A, whereas QoS flows 856B, 856C are mapped to resource 820B. In order to meet QoS requirements, the resource mapping rules may designate more resources to high-priority QoS flows.

[0124] FIGS. 9A- 9D illustrate example states and state transitions of a wireless device (e.g., a UE). At any given time, the wireless device may have a radio resource control (RRC) state, a registration management (RM) state, and a connection management (CM) state.

[0125] FIG. 9A is an example diagram showing RRC state transitions of a wireless device (e.g., a UE). The UE may be in one of three RRC states: RRC idle 910, (e.g., RRCJDLE), RRC inactive 920 (e.g., RRC -INACTIVE), or RRC connected 930 (e.g., RRC -CONNECTED). The UE may implement different RAN-related control-plane procedures depending on its RRC state. Other elements of the network, for example, a base station, may track the RRC state of one or more UEs and implement RAN-related control-plane procedures appropriate to the RRC state of each.

[0126] In RRC connected 930, it may be possible for the UE to exchange data with the network (for example, the base station). The parameters necessary for exchange of data may be established and known to both the UE and the network. The parameters may be referred to and/or included in an RRC context of the UE (sometimes referred to as a UE context). These parameters may include, for example: one or more AS contexts; one or more radio link configuration parameters; bearer configuration information (e.g., relating to a data radio bearer, signaling radio bearer, logical channel, QoS flow, and/or PDU session); security information; and/or PHY, MAC, RLC, PDCP, and/or SDAP layer configuration information. The base station with which the UE is connected may store the RRC context of the UE.

[0127] While in RRC connected 930, mobility of the UE may be managed by the access network, whereas the UE itself may manage mobility while in RRC idle 910 and/or RRC inactive 920. While in RRC connected 930, the UE may manage mobility by measuring signal levels (e.g., reference signal levels) from a serving cell and neighboring cells and reporting these measurements to the base station currently serving the UE. The network may initiate handover based on the reported measurements. The RRC state may transition from RRC connected 930 to RRC idle 910 through a connection release procedure 930 or to RRC inactive 920 through a connection inactivation procedure 932.

[0128] In RRC idle 910, an RRC context may not be established for the UE. In RRC idle 910, the UE may not have an RRC connection with a base station. While in RRC idle 910, the UE may be in a sleep state for a majority of the time (e.g., to conserve battery power). The UE may wake up periodically (e.g., once in every discontinuous reception cycle) to monitor for paging messages from the access network. Mobility of the UE may be managed by the UE through a procedure known as cell reselection. The RRC state may transition from RRC idle 910 to RRC connected 930 through a connection establishment procedure 913, which may involve a random access procedure, as discussed in greater detail below.

[0129] In RRC inactive 920, the RRC context previously established is maintained in the UE and the base station. This may allow for a fast transition to RRC connected 930 with reduced signaling overhead as compared to the transition from RRC idle 910 to RRC connected 930. The RRC state may transition to RRC connected 930 through a connection resume procedure 923. The RRC state may transition to RRC idle 910 though a connection release procedure 921 that may be the same as or similar to connection release procedure 931.

[0130] An RRC state may be associated with a mobility management mechanism. In RRC idle 910 and RRC inactive 920, mobility may be managed by the UE through cell reselection. The purpose of mobility management in RRC idle 910 and/or RRC inactive 920 is to allow the network to be able to notify the UE of an event via a paging message without having to broadcast the paging message over the entire mobile communications network. The mobility management mechanism used in RRC idle 910 and/or RRC inactive 920 may allow the network to track the UE on a cell-group level so that the paging message may be broadcast over the cells of the cell group that the UE currently resides within instead of the entire communication network. Tracking may be based on different granularities of grouping. For example, there may be three levels of cell-grouping granularity: individual cells; cells within a RAN area identified by a RAN area identifier (RAI); and cells within a group of RAN areas, referred to as a tracking area and identified by a tracking area identifier (TAI).

[0131] Tracking areas may be used to track the UE at the CN level. The CN may provide the UE with a list of TAIs associated with a UE registration area. If the UE moves, through cell reselection, to a cell associated with a TAI not included in the list of TAIs associated with the UE registration area, the UE may perform a registration update with the CN to allow the CN to update the UE’s location and provide the UE with a new the UE registration area.

[0132] RAN areas may be used to track the UE at the RAN level. For a UE in RRC inactive 920 state, the UE may be assigned a RAN notification area. A RAN notification area may comprise one or more cell identities, a list of RAIs, and/or a list of TAIs. In an example, a base station may belong to one or more RAN notification areas. In an example, a cell may belong to one or more RAN notification areas. If the UE moves, through cell reselection, to a cell not included in the RAN notification area assigned to the UE, the UE may perform a notification area update with the RAN to update the UE’s RAN notification area.

[0133] A base station storing an RRC context for a UE or a last serving base station of the UE may be referred to as an anchor base station. An anchor base station may maintain an RRC context for the UE at least during a period of time that the UE stays in a RAN notification area of the anchor base station and/or during a period of time that the UE stays in RRC inactive 920.

[0134] FIG. 9B is an example diagram showing registration management (RM) state transitions of a wireless device (e.g., a UE). The states are RM deregistered 940, (e.g., RM-DEREGISTERED) and RM registered 950 (e.g., RM- REGISTERED). [0135] In RM deregistered 940, the UE is not registered with the network, and the UE is not reachable by the network. In order to be reachable by the network, the UE must perform an initial registration. As an example, the UE may register with an AMF of the network. If registration is rejected (registration reject 944), then the UE remains in RM deregistered 940. If registration is accepted (registration accept 945), then the UE transitions to RM registered 950. While the UE is RM registered 950, the network may store, keep, and/or maintain a UE context for the UE. The UE context may be referred to as wireless device context. The UE context corresponding to network registration (maintained by the core network) may be different from the RRC context corresponding to RRC state (maintained by an access network, .e.g., a base station). The UE context may comprise a UE identifier and a record of various information relating to the UE, for example, UE capability information, policy information for access and mobility management of the UE, lists of allowed or established slices or PDU sessions, and/or a registration area of the UE (i.e., a list of tracking areas covering the geographical area where the wireless device is likely to be found).

[0136] While the UE is RM registered 950, the network may store the UE context of the UE, and if necessary use the UE context to reach the UE. Moreover, some services may not be provided by the network unless the UE is registered. The UE may update its UE context while remaining in RM registered 950 (registration update accept 955). For example, if the UE leaves one tracking area and enters another tracking area, the UE may provide a tracking area identifier to the network. The network may deregister the UE, or the UE may deregister itself (deregistration 954). For example, the network may automatically deregister the wireless device if the wireless device is inactive for a certain amount of time. Upon deregistration, the UE may transition to RM deregistered 940.

[0137] FIG. 90 is an example diagram showing connection management (CM) state transitions of a wireless device (e.g., a UE), shown from a perspective of the wireless device. The UE may be in CM idle 960 (e.g., CM-IDLE) or CM connected 970 (e.g., CM-CONNECTED).

[0138] In CM idle 960, the UE does not have a non access stratum (NAS) signaling connection with the network. As a result, the UE can not communicate with core network functions. The UE may transition to CM connected 970 by establishing an AN signaling connection (AN signaling connection establishment 967). This transition may be initiated by sending an initial NAS message. The initial NAS message may be a registration request (e.g., if the UE is RM deregistered 940) or a service request (e.g., if the UE is RM registered 950). If the UE is RM registered 950, then the UE may initiate the AN signaling connection establishment by sending a service request, or the network may send a page, thereby triggering the UE to send the service request.

[0139] In CM connected 970, the UE can communicate with core network functions using NAS signaling. As an example, the UE may exchange NAS signaling with an AMF for registration management purposes, service request procedures, and/or authentication procedures. As another example, the UE may exchange NAS signaling, with an SMF, to establish and/or modify a PDU session. The network may disconnect the UE, or the UE may disconnect itself (AN signaling connection release 976). For example, if the UE transitions to RM deregistered 940, then the UE may also transition to CM idle 960. When the UE transitions to CM idle 960, the network may deactivate a user plane connection of a PDU session of the UE.

[0140] FIG. 9D is an example diagram showing CM state transitions of the wireless device (e.g., a UE), shown from a network perspective (e.g., an AMF). The CM state of the UE, as tracked by the AMF, may be in CM idle 980 (e.g., CM-IDLE) or CM connected 990 (e.g., CM-CONNECTED). When the UE transitions from CM idle 980 to CM connected 990, the AMF many establish an N2 context of the UE (N2 context establishment 989). When the UE transitions from CM connected 990 to CM idle 980, the AMF many release the N2 context of the UE (N2 context release 998).

[0141] FIGS. 10 - 12 illustrate example procedures for registering, service request, and PDU session establishment of a UE.

[0142] FIG. 10 illustrates an example of a registration procedure for a wireless device (e.g., a UE). Based on the registration procedure, the UE may transition from, for example, RM deregistered 940 to RM registered 950.

[0143] Registration may be initiated by a UE for the purposes of obtaining authorization to receive services, enabling mobility tracking, enabling reachability, or other purposes. The UE may perform an initial registration as a first step toward connection to the network (for example, if the UE is powered on, airplane mode is turned off, etc.). Registration may also be performed periodically to keep the network informed of the UE’s presence (for example, while in CM-IDLE state), or in response to a change in UE capability or registration area. Deregistration (not shown in FIG. 10) may be performed to stop network access.

[0144] At 1010, the UE transmits a registration request to an AN. As an example, the UE may have moved from a coverage area of a previous AMF (illustrated as AMF#1 ) into a coverage area of a new AMF (illustrated as AMF#2). The registration request may be a NAS message. The registration request may include a UE identifier. The AN may select an AMF for registration of the UE. For example, the AN may select a default AMF. For example, the AN may select an AMF that is already mapped to the UE (e.g., a previous AMF). The NAS registration request may include a network slice identifier and the AN may select an AMF based on the requested slice. After the AMF is selected, the AN may send the registration request to the selected AMF.

[0145] At 1020, the AMF that receives the registration request (AMF#2) performs a context transfer. The context may be a UE context, for example, an RRC context for the UE. As an example, AMF#2 may send AM F#1 a message requesting a context of the UE. The message may include the UE identifier. The message may be a Namf_ Communication- UEContextTransfer message. AMF#1 may send to AMF#2 a message that includes the requested UE context. This message may be a Namf_ Communication- UEContextTransfer message. After the UE context is received, the AMF#2 may coordinate authentication of the UE. After authentication is complete, AMF#2 may send to AM F#1 a message indicating that the UE context transfer is complete. This message may be a Namf_ Communication- UEContextTransfer Response message.

[0146] Authentication may require participation of the UE, an AUSF, a UDM and/or a UDR (not shown). For example, the AMF may request that the AUSF authenticate the UE. For example, the AUSF may execute authentication of the UE. For example, the AUSF may get authentication data from UDM. For example, the AUSF may send a subscription permanent identifier (SUPI) to the AMF based on the authentication being successful. For example, the AUSF may provide an intermediate key to the AMF. The intermediate key may be used to derive an accessspecific security key for the UE, enabling the AMF to perform security context management (SOM). The AUSF may obtain subscription data from the UDM. The subscription data may be based on information obtained from the UDM (and/or the UDR). The subscription data may include subscription identifiers, security credentials, access and mobility related subscription data and/or session related data.

[0147] At 1030, the new AMF, AMF#2, registers and/or subscribes with the UDM. AMF#2 may perform registration using a UE context management service of the UDM (Nudm_ UECM). AMF#2 may obtain subscription information of the UE using a subscriber data management service of the UDM (Nudm_ SDM). AMF#2 may further request that the UDM notify AMF#2 if the subscription information of the UE changes. As the new AMF registers and subscribes, the old AMF, AM F#1 , may deregister and unsubscribe. After deregistration, AMF#1 is free of responsibility for mobility management of the UE.

[0148] At 1040, AMF#2 retrieves access and mobility (AM) policies from the POF. As an example, the AMF#2 may provide subscription data of the UE to the POF. The POF may determine access and mobility policies for the UE based on the subscription data, network operator data, current network conditions, and/or other suitable information. For example, the owner of a first UE may purchase a higher level of service than the owner of a second UE. The POF may provide the rules associated with the different levels of service. Based on the subscription data of the respective UEs, the network may apply different policies which facilitate different levels of service.

[0149] For example, access and mobility policies may relate to service area restrictions, RAT/ frequency selection priority (RFSP, where RAT stands for radio access technology), authorization and prioritization of access type (e.g., LTE versus NR), and/or selection of non-3GPP access (e.g., Access Network Discovery and Selection Policy (ANDSP)). The service area restrictions may comprise a list of tracking areas where the UE is allowed to be served (or forbidden from being served). The access and mobility policies may include a UE route selection policy (URSP)) that influences routing to an established PDU session or a new PDU session. As noted above, different policies may be obtained and/or enforced based on subscription data of the UE, location of the UE (i.e., location of the AN and/or AMF), or other suitable factors.

[0150] At 1050, AMF#2 may update a context of a PDU session. For example, if the UE has an existing PDU session, the AMF#2 may coordinate with an SMF to activate a user plane connection associated with the existing PDU session. The SMF may update and/or release a session management context of the PDU session (Nsmf_ PDUSession_ UpdateSMOontext, Nsmf_ PDUSession_ ReleaseSMOontext).

[0151] At 1060, AMF#2 sends a registration accept message to the AN, which forwards the registration accept message to the UE. The registration accept message may include a new UE identifier and/or a new configured slice identifier. The UE may transmit a registration complete message to the AN, which forwards the registration complete message to the AMF#2. The registration complete message may acknowledge receipt of the new UE identifier and/or new configured slice identifier.

[0152] At 1070, AMF#2 may obtain UE policy control information from the PCF. The PCF may provide an access network discovery and selection policy (ANDSP) to facilitate non-3GPP access. The PCF may provide a UE route selection policy (URSP) to facilitate mapping of particular data traffic to particular PDU session connectivity parameters. As an example, the URSP may indicate that data traffic associated with a particular application should be mapped to a particular SSC mode, network slice, PDU session type, or preferred access type (3GPP or non- 3GPP).

[0153] FIG. 11 illustrates an example of a service request procedure for a wireless device (e.g., a UE). The service request procedure depicted in FIG. 11 is a network-triggered service request procedure for a UE in a CM-IDLE state. However, other service request procedures (e.g., a UE-triggered service request procedure) may also be understood by reference to FIG. 11 , as will be discussed in greater detail below.

[0154] At 1110, a UPF receives data. The data may be downlink data for transmission to a UE. The data may be associated with an existing PDU session between the UE and a DN. The data may be received, for example, from a DN and/or another UPF. The UPF may buffer the received data. In response to the receiving of the data, the UPF may notify an SMF of the received data. The identity of the SMF to be notified may be determined based on the received data. The notification may be, for example, an N4 session report. The notification may indicate that the UPF has received data associated with the UE and/or a particular PDU session associated with the UE. In response to receiving the notification, the SMF may send PDU session information to an AMF. The PDU session information may be sent in an N1 N2 message transfer for forwarding to an AN. The PDU session information may include, for example, UPF tunnel endpoint information and/or QoS information.

[0155] At 1120, the AMF determines that the UE is in a CM-IDLE state. The determining at 1120 may be in response to the receiving of the PDU session information. Based on the determination that the UE is CM-IDLE, the service request procedure may proceed to 1130 and 1140, as depicted in FIG. 11. However, if the UE is not CM-IDLE (e.g., the UE is CM-CONNECTED), then 1130 and 1140 may be skipped, and the service request procedure may proceed directly to 1150.

[0156] At 1130, the AMF pages the UE. The paging at 1130 may be performed based on the UE being CM-IDLE. To perform the paging, the AMF may send a page to the AN. The page may be referred to as a paging or a paging message. The page may be an N2 request message. The AN may be one of a plurality of ANs in a RAN notification area of the UE. The AN may send a page to the UE. The UE may be in a coverage area of the AN and may receive the page.

[0157] At 1140, the UE may request service. The UE may transmit a service request to the AMF via the AN. As depicted in FIG. 11, the UE may request service at 1140 in response to receiving the paging at 1130. However, as noted above, this is for the specific case of a network-triggered service request procedure. In some scenarios (for example, if uplink data becomes available at the UE), then the UE may commence a UE-triggered service request procedure. The UE-triggered service request procedure may commence starting at 1140. [0158] At 1150, the network may authenticate the UE. Authentication may require participation of the UE, an AUSF, and/or a UDM, for example, similar to authentication described elsewhere in the present disclosure. In some cases (for example, if the UE has recently been authenticated), the authentication at 1150 may be skipped.

[0159] At 1160, the AMF and SMF may perform a PDU session update. As part of the PDU session update, the SMF may provide the AMF with one or more UPF tunnel endpoint identifiers. In some cases (not shown in FIG. 11 ), it may be necessary for the SMF to coordinate with one or more other SMFs and/or one or more other UPFs to set up a user plane.

[0160] At 1170, the AMF may send PDU session information to the AN. The PDU session information may be included in an N2 request message. Based on the PDU session information, the AN may configure a user plane resource for the UE. To configure the user plane resource, the AN may, for example, perform an RRC reconfiguration of the UE. The AN may acknowledge to the AMF that the PDU session information has been received. The AN may notify the AMF that the user plane resource has been configured, and/or provide information relating to the user plane resource configuration.

[0161] In the case of a UE-triggered service request procedure, the UE may receive, at 1170, a NAS service accept message from the AMF via the AN. After the user plane resource is configured, the UE may transmit uplink data (for example, the uplink data that caused the UE to trigger the service request procedure).

[0162] At 1180, the AMF may update a session management (SM) context of the PDU session. For example, the AMF may notify the SMF (and/or one or more other associated SMFs) that the user plane resource has been configured, and/or provide information relating to the user plane resource configuration. The AMF may provide the SMF (and/or one or more other associated SMFs) with one or more AN tunnel endpoint identifiers of the AN. After the SM context update is complete, the SMF may send an update SM context response message to the AMF.

[0163] Based on the update of the session management context, the SMF may update a POF for purposes of policy control. For example, if a location of the UE has changed, the SMF may notify the POF of the UE’s a new location.

[0164] Based on the update of the session management context, the SMF and UPF may perform a session modification. The session modification may be performed using N4 session modification messages. After the session modification is complete, the UPF may transmit downlink data (for example, the downlink data that caused the UPF to trigger the network-triggered service request procedure) to the UE. The transmitting of the downlink data may be based on the one or more AN tunnel endpoint identifiers of the AN.

[0165] FIG. 12 illustrates an example of a protocol data unit (PDU) session establishment procedure for a wireless device (e.g., a UE). The UE may determine to transmit the PDU session establishment request to create a new PDU session, to hand over an existing PDU session to a 3GPP network, or for any other suitable reason.

[0166] At 1210, the UE initiates PDU session establishment. The UE may transmit a PDU session establishment request to an AMF via an AN. The PDU session establishment request may be a NAS message. The PDU session establishment request may indicate: a PDU session ID; a requested PDU session type (new or existing); a requested DN (DNN); a requested network slice (S-NSSAI); a requested SSC mode; and/or any other suitable information. The PDU session ID may be generated by the UE. The PDU session type may be, for example, an Internet Protocol (IP)-based type (e.g., IPv4, IPv6, or dual stack IPv4/IPv6), an Ethernet type, or an unstructured type.

[0167] The AMF may select an SMF based on the PDU session establishment request. In some scenarios, the requested PDU session may already be associated with a particular SMF. For example, the AMF may store a UE context of the UE, and the UE context may indicate that the PDU session ID of the requested PDU session is already associated with the particular SMF. In some scenarios, the AMF may select the SMF based on a determination that the SMF is prepared to handle the requested PDU session. For example, the requested PDU session may be associated with a particular DNN and/or S-NSSAI, and the SMF may be selected based on a determination that the SMF can manage a PDU session associated with the particular DNN and/or S-NSSAI.

[0168] At 1220, the network manages a context of the PDU session. After selecting the SMF at 1210, the AMF sends a PDU session context request to the SMF. The PDU session context request may include the PDU session establishment request received from the UE at 1210. The PDU session context request may be a Nsmf_ PDUSession_CreateSMContext Request and/or a Nsmf_ PDUSession_ UpdateSMOontext Request. The PDU session context request may indicate identifiers of the UE; the requested DN; and/or the requested network slice. Based on the PDU session context request, the SMF may retrieve subscription data from a UDM. The subscription data may be session management subscription data of the UE. The SMF may subscribe for updates to the subscription data, so that the POF will send new information if the subscription data of the UE changes. After the subscription data of the UE is obtained, the SMF may transmit a PDU session context response to the AMG. The PDU session context response may be a Nsmf_ PDUSession_ CreateSMOontext Response and/or a Nsmf_ PDUSession_ UpdateSMOontext Response. The PDU session context response may include a session management context ID.

[0169] At 1230, secondary authorization/authentication may be performed, if necessary. The secondary authorization/authentication may involve the UE, the AMF, the SMF, and the DN. The SMF may access the DN via a Data Network Authentication, Authorization and Accounting (DN AAA) server.

[0170] At 1240, the network sets up a data path for uplink data associated with the PDU session. The SMF may select a POF and establish a session management policy association. Based on the association, the POF may provide an initial set of policy control and charging rules (POO rules) for the PDU session. When targeting a particular PDU session, the POF may indicate, to the SMF, a method for allocating an IP address to the PDU Session, a default charging method for the PDU session, an address of the corresponding charging entity, triggers for requesting new policies, etc. The POF may also target a service data flow (SDF) comprising one or more PDU sessions. When targeting an SDF, the POF may indicate, to the SMF, policies for applying QoS requirements, monitoring traffic (e.g., for charging purposes), and/or steering traffic (e.g., by using one or more particular N6 interfaces).

[0171] The SMF may determine and/or allocate an IP address for the PDU session. The SMF may select one or more UPFs (a single UPF in the example of FIG. 12) to handle the PDU session. The SMF may send an N4 session message to the selected UPF. The N4 session message may be an N4 Session Establishment Request and/or an N4 Session Modification Request. The N4 session message may include packet detection, enforcement, and reporting rules associated with the PDU session. In response, the UPF may acknowledge by sending an N4 session establishment response and/or an N4 session modification response.

[0172] The SMF may send PDU session management information to the AMF. The PDU session management information may be a Namf_ Communication- N1 N2MessageTransfer message. The PDU session management information may include the PDU session ID. The PDU session management information may be a NAS message. The PDU session management information may include N1 session management information and/or N2 session management information. The N1 session management information may include a PDU session establishment accept message. The PDU session establishment accept message may include tunneling endpoint information of the UPF and quality of service (QoS) information associated with the PDU session.

[0173] The AMF may send an N2 request to the AN. The N2 request may include the PDU session establishment accept message. Based on the N2 request, the AN may determine AN resources for the UE. The AN resources may be used by the UE to establish the PDU session, via the AN, with the DN. The AN may determine resources to be used for the PDU session and indicate the determined resources to the UE. The AN may send the PDU session establishment accept message to the UE. For example, the AN may perform an RRC reconfiguration of the UE. After the AN resources are set up, the AN may send an N2 request acknowledge to the AMF. The N2 request acknowledge may include N2 session management information, for example, the PDU session ID and tunneling endpoint information of the AN.

[0174] After the data path for uplink data is set up at 1240, the UE may optionally send uplink data associated with the PDU session. As shown in FIG. 12, the uplink data may be sent to a DN associated with the PDU session via the AN and the UPF.

[0175] At 1250, the network may update the PDU session context. The AMF may transmit a PDU session context update request to the SMF. The PDU session context update request may be a Nsmf_ PDUSession_ Updates MContext Request. The PDU session context update request may include the N2 session management information received from the AN. The SMF may acknowledge the PDU session context update. The acknowledgement may be a Nsmf_ PDUSession_ UpdateSMContext Response. The acknowledgement may include a subscription requesting that the SMF be notified of any UE mobility event. Based on the PDU session context update request, the SMF may send an N4 session message to the UPF. The N4 session message may be an N4 Session Modification Request. The N4 session message may include tunneling endpoint information of the AN. The N4 session message may include forwarding rules associated with the PDU session. In response, the UPF may acknowledge by sending an N4 session modification response.

[0176] After the UPF receives the tunneling endpoint information of the AN, the UPF may relay downlink data associated with the PDU session. As shown in FIG. 12, the downlink data may be received from a DN associated with the PDU session via the AN and the UPF.

[0177] FIG. 13 illustrates examples of components of the elements in a communications network. FIG. 13 includes a wireless device 1310, a base station 1320, and a physical deployment of one or more network functions 1330 (henceforth “deployment 1330”). Any wireless device described in the present disclosure may have similar components and may be implemented in a similar manner as the wireless device 1310. Any other base station described in the present disclosure (or any portion thereof, depending on the architecture of the base station) may have similar components and may be implemented in a similar manner as the base station 1320. Any physical core network deployment in the present disclosure (or any portion thereof, depending on the architecture of the base station) may have similar components and may be implemented in a similar manner as the deployment 1330.

[0178] The wireless device 1310 may communicate with base station 1320 over an air interface 1370. The communication direction from wireless device 1310 to base station 1320 over air interface 1370 is known as uplink, and the communication direction from base station 1320 to wireless device 1310 over air interface 1370 is known as downlink. Downlink transmissions may be separated from uplink transmissions using FDD, TDD, and/or some combination of duplexing techniques. FIG. 13 shows a single wireless device 1310 and a single base station 1320, but it will be understood that wireless device 1310 may communicate with any number of base stations or other access network components over air interface 1370, and that base station 1320 may communicate with any number of wireless devices over air interface 1370.

[0179] The wireless device 1310 may comprise a processing system 1311 and a memory 1312. The memory 1312 may comprise one or more computer-readable media, for example, one or more non-transitory computer readable media. The memory 1312 may include instructions 1313. The processing system 1311 may process and/or execute instructions 1313. Processing and/or execution of instructions 1313 may cause wireless device 1310 and/or processing system 1311 to perform one or more functions or activities. The memory 1312 may include data (not shown). One of the functions or activities performed by processing system 1311 may be to store data in memory 1312 and/or retrieve previously-stored data from memory 1312. In an example, downlink data received from base station 1320 may be stored in memory 1312, and uplink data for transmission to base station 1320 may be retrieved from memory 1312. As illustrated in FIG. 13, the wireless device 1310 may communicate with base station 1320 using a transmission processing system 1314 and/or a reception processing system 1315. Alternatively, transmission processing system 1314 and reception processing system 1315 may be implemented as a single processing system, or both may be omitted and all processing in the wireless device 1310 may be performed by the processing system 1311. Although not shown in FIG. 13, transmission processing system 1314 and/or reception processing system 1315 may be coupled to a dedicated memory that is analogous to but separate from memory 1312, and comprises instructions that may be processed and/or executed to carry out one or more of their respective functionalities. The wireless device 1310 may comprise one or more antennas 1316 to access air interface 1370.

[0180] The wireless device 1310 may comprise one or more other elements 1319. The one or more other elements 1319 may comprise software and/or hardware that provide features and/or functionalities, for example, a speaker, a microphone, a keypad, a display, a touchpad, a satellite transceiver, a universal serial bus (USB) port, a handsfree headset, a frequency modulated (FM) radio unit, a media player, an Internet browser, an electronic control unit (e.g., for a motor vehicle), and/or one or more sensors (e.g., an accelerometer, a gyroscope, a temperature sensor, a radar sensor, a lidar sensor, an ultrasonic sensor, a light sensor, a camera, a global positioning sensor (GPS) and/or the like). The wireless device 1310 may receive user input data from and/or provide user output data to the one or more one or more other elements 1319. The one or more other elements 1319 may comprise a power source. The wireless device 1310 may receive power from the power source and may be configured to distribute the power to the other components in wireless device 1310. The power source may comprise one or more sources of power, for example, a battery, a solar cell, a fuel cell, or any combination thereof.

[0181] The wireless device 1310 may transmit uplink data to and/or receive downlink data from base station 1320 via air interface 1370. To perform the transmission and/or reception, one or more of the processing system 1311, transmission processing system 1314, and/or reception system 1315 may implement open systems interconnection (OSI) functionality. As an example, transmission processing system 1314 and/or reception system 1315 may perform layer 1 OSI functionality, and processing system 1311 may perform higher layer functionality. The wireless device 1310 may transmit and/or receive data over air interface 1370 using one or more antennas 1316. For scenarios where the one or more antennas 1316 include multiple antennas, the multiple antennas may be used to perform one or more multi-antenna techniques, such as spatial multiplexing (e.g., single-user multipleinput multiple output (Ml MO) or multi-user Ml MO), transmit/receive diversity, and/or beamforming.

[0182] The base station 1320 may comprise a processing system 1321 and a memory 1322. The memory 1322 may comprise one or more computer-readable media, for example, one or more non-transitory computer readable media. The memory 1322 may include instructions 1323. The processing system 1321 may process and/or execute instructions 1323. Processing and/or execution of instructions 1323 may cause base station 1320 and/or processing system 1321 to perform one or more functions or activities. The memory 1322 may include data (not shown). One of the functions or activities performed by processing system 1321 may be to store data in memory 1322 and/or retrieve previously-stored data from memory 1322. The base station 1320 may communicate with wireless device 1310 using a transmission processing system 1324 and a reception processing system 1325. Although not shown in FIG. 13, transmission processing system 1324 and/or reception processing system 1325 may be coupled to a dedicated memory that is analogous to but separate from memory 1322, and comprises instructions that may be processed and/or executed to carry out one or more of their respective functionalities. The wireless device 1320 may comprise one or more antennas 1326 to access air interface 1370.

[0183] The base station 1320 may transmit downlink data to and/or receive uplink data from wireless device 1310 via air interface 1370. To perform the transmission and/or reception, one or more of the processing system 1321, transmission processing system 1324, and/or reception system 1325 may implement OSI functionality. As an example, transmission processing system 1324 and/or reception system 1325 may perform layer 1 OSI functionality, and processing system 1321 may perform higher layer functionality. The base station 1320 may transmit and/or receive data over air interface 1370 using one or more antennas 1326. For scenarios where the one or more antennas 1326 include multiple antennas, the multiple antennas may be used to perform one or more multi-antenna techniques, such as spatial multiplexing (e.g., single-user multiple-input multiple output (MIMO) or multi-user MIMO), transmit/receive diversity, and/or beamforming.

[0184] The base station 1320 may comprise an interface system 1327. The interface system 1327 may communicate with one or more base stations and/or one or more elements of the core network via an interface 1380. The interface 1380 may be wired and/or wireless and interface system 1327 may include one or more components suitable for communicating via interface 1380. In FIG. 13, interface 1380 connects base station 1320 to a single deployment 1330, but it will be understood that wireless device 1310 may communicate with any number of base stations and/or ON deployments over interface 1380, and that deployment 1330 may communicate with any number of base stations and/or other ON deployments over interface 1380. The base station 1320 may comprise one or more other elements 1329 analogous to one or more of the one or more other elements 1319.

[0185] The deployment 1330 may comprise any number of portions of any number of instances of one or more network functions (NFs). The deployment 1330 may comprise a processing system 1331 and a memory 1332. The memory 1332 may comprise one or more computer-readable media, for example, one or more non-transitory computer readable media. The memory 1332 may include instructions 1333. The processing system 1331 may process and/or execute instructions 1333. Processing and/or execution of instructions 1333 may cause the deployment 1330 and/or processing system 1331 to perform one or more functions or activities. The memory 1332 may include data (not shown). One of the functions or activities performed by processing system 1331 may be to store data in memory 1332 and/or retrieve previously-stored data from memory 1332. The deployment 1330 may access the interface 1380 using an interface system 1337. The deployment 1330 may comprise one or more other elements 1339 analogous to one or more of the one or more other elements 1319.

[0186] Oneor moreof the systems 1311, 1314, 1315, 1321, 1324, 1325, and/or 1331 may comprise one or more controllers and/or one or more processors. The one or more controllers and/or one or more processors may comprise, for example, a general-purpose processor, a digital signal processor (DSP), a microcontroller, an application specific integrated circuit (ASIC), a field programmable gate array (FPGA) and/or other programmable logic device, discrete gate and/or transistor logic, discrete hardware components, an on-board unit, or any combination thereof. One or more of the systems 1311, 1314, 1315, 1321, 1324, 1325, and/or 1331 may perform signal coding/processing, data processing, power control, inpu t/outpu t processing, and/or any other functionality that may enable wireless device 1310, base station 1320, and/or deployment 1330 to operate in a mobile communications system.

[0187] Many of the elements described in the disclosed embodiments may be implemented as modules. A module is defined here as an element that performs a defined function and has a defined interface to other elements. The modules described in this disclosure may be implemented in hardware, software in combination with hardware, firmware, wetware (e.g. hardware with a biological element) or a combination thereof, which may be behaviorally equivalent. For example, modules may be implemented as a software routine written in a computer language configured to be executed by a hardware machine (such as C, C++, Fortran, Java, Basic, Matlab or the like) or a modeling/simulation program such as Simulink, Stateflow, GNU Octave, or LabVI EWMathScript. It may be possible to implement modules using physical hardware that incorporates discrete or programmable analog, digital and/or quantum hardware. Examples of programmable hardware comprise computers, microcontrollers, microprocessors, DSPs, ASICs, FPGAs, and complex programmable logic devices (CPLDs). Computers, microcontrollers and microprocessors may be programmed using languages such as assembly, C, C++ or the like. FPGAs, ASICs and CPLDs are often programmed using hardware description languages (HDL) such as VHSIC hardware description language (VHDL) or Verilog that configure connections between internal hardware modules with lesser functionality on a programmable device. The mentioned technologies are often used in combination to achieve the result of a functional module.

[0188] The wireless device 1310, base station 1320, and/or deployment 1330 may implement timers and/or counters. A timer/counter may start at an initial value. As used herein, starting may comprise restarting. Once started, the timer/counter may run. Running of the timer/counter may be associated with an occurrence. When the occurrence occurs, the value of the timer/counter may change (for example, increment or decrement). The occurrence may be, for example, an exogenous event (for example, a reception of a signal, a measurement of a condition, etc.), an endogenous event (for example, a transmission of a signal, a calculation, a comparison, a performance of an action or a decision to so perform, etc.), or any combination thereof. In the case of a timer, the occurrence may be the passage of a particular amount of time. However, it will be understood that a timer may be described and/or implemented as a counter that counts the passage of a particular unit of time. A timer/counter may run in a direction of a final value until it reaches the final value. The reaching of the final value may be referred to as expiration of the timer/counter. The final value may be referred to as a threshold. A timer/counter may be paused, wherein the present value of the timer/counter is held, maintained, and/or carried over, even upon the occurrence of one or more occurrences that would otherwise cause the value of the timer/counter to change. The timer/counter may be un-paused or continued, wherein the value that was held, maintained, and/or carried over begins changing again when the one or more occurrence occur. A timer/counter may be set and/or reset. As used herein, setting may comprise resetting. When the timer/counter sets and/or resets, the value of the timer/counter may be set to the initial value. A timer/counter may be started and/or restarted. As used herein, starting may comprise restarting. In some embodiments, when the timer/counter restarts, the value of the timer/counter may be set to the initial value and the timer/counter may begin to run.

[0189] FIGS. 14A, 14B, 14C, and 14D illustrate various example arrangements of physical core network deployments, each having one or more network functions or portions thereof. The core network deployments comprise a deployment 1410, a deployment 1420, a deployment 1430, a deployment 1440, and/or a deployment 1450. Each deployment may be analogous to, for example, the deployment 1330 depicted in FIG. 13. In particular, each deployment may comprise a processing system for performing one or more functions or activities, memory for storing data and/or instructions, and an interface system for communicating with other network elements (for example, other core network deployments). Each deployment may comprise one or more network functions (NFs). The term NF may refer to a particular set of functionalities and/or one or more physical elements configured to perform those functionalities (e.g., a processing system and memory comprising instructions that, when executed by the processing system, cause the processing system to perform the functionalities). For example, in the present disclosure, when a network function is described as performing X, Y, and Z, it will be understood that this refers to the one or more physical elements configured to perform X, Y, and Z, no matter how or where the one or more physical elements are deployed. The term NF may refer to a network node, network element, and/or network device.

[0190] As will be discussed in greater detail below, there are many different types of NF and each type of NF may be associated with a different set of functionalities. A plurality of different NFs may be flexibly deployed at different locations (for example, in different physical core network deployments) or in a same location (for example, colocated in a same deployment). A single NF may be flexibly deployed at different locations (implemented using different physical core network deployments) or in a same location. Moreover, physical core network deployments may also implement one or more base stations, application functions (AFs), data networks (DNs), or any portions thereof. NFs may be implemented in many ways, including as network elements on dedicated or shared hardware, as software instances running on dedicated or shared hardware, or as virtualized functions instantiated on a platform (e.g., a cloud-based platform).

[0191] FIG. 14A illustrates an example arrangement of core network deployments in which each deployment comprises one network function. A deployment 1410 comprises an NF 1411, a deployment 1420 comprises an NF 1421, and a deployment 1430 comprises an NF 1431. The deployments 1410, 1420, 1430 communicate via an interface 1490. The deployments 1410, 1420, 1430 may have different physical locations with different signal propagation delays relative to other network elements. The diversity of physical locations of deployments 1410, 1420, 1430 may enable provision of services to a wide area with improved speed, coverage, security, and/or efficiency.

[0192] FIG. 14B illustrates an example arrangement wherein a single deployment comprises more than one NF. Unlike FIG. 14A, where each NF is deployed in a separate deployment, FIG. 14B illustrates multiple NFs in deployments 1410, 1420. In an example, deployments 1410, 1420 may implement a software-defined network (SDN) and/or a network function virtualization (NFV).

[0193] For example, deployment 1410 comprises an additional network function, NF 1411A. The NFs 1411, 1411 A may consist of multiple instances of the same NF type, co-located at a same physical location within the same deployment 1410. The NFs 1411, 1411A may be implemented independently from one another (e.g., isolated and/or independently controlled). For example, the NFs 1411, 1411 A may be associated with different network slices. A processing system and memory associated with the deployment 1410 may perform all of the functionalities associated with the NF 1411 in addition to all of the functionalities associated with the NF 1411A. In an example, NFs 1411, 1411 A may be associated with different PLMNs, but deployment 1410, which implements NFs 1411, 1411A, may be owned and/or operated by a single entity.

[0194] Elsewhere in FIG. 14B, deployment 1420 comprises NF 1421 and an additional network function, NF 1422. The NFs 1421, 1422 may be different NF types. Similar to NFs 1411, 1411 A, the NFs 1421, 1422 may be colocated within the same deployment 1420, but separately implemented. As an example, a first PLMN may own and/or operate deployment 1420 having NFs 1421 , 1422. As another example, the first PLMN may implement NF 1421 and a second PLMN may obtain from the first PLMN (e.g., rent, lease, procure, etc.) at least a portion of the capabilities of deployment 1420 (e.g., processing power, data storage, etc.) in order to implement NF 1422. As yet another example, the deployment may be owned and/or operated by one or more third parties, and the first PLMN and/or second PLMN may procure respective portions of the capabilities of the deployment 1420. When multiple NFs are provided at a single deployment, networks may operate with greater speed, coverage, security, and/or efficiency.

[0195] FIG. 14C illustrates an example arrangement of core network deployments in which a single instance of an NF is implemented using a plurality of different deployments. In particular, a single instance of NF 1422 is implemented at deployments 1420, 1440. As an example, the functionality provided by NF 1422 may be implemented as a bundle or sequence of subservices. Each subservice may be implemented independently, for example, at a different deployment. Each subservices may be implemented in a different physical location. By distributing implementation of subservices of a single NF across different physical locations, the mobile communications network may operate with greater speed, coverage, security, and/or efficiency.

[0196] FIG. 14D illustrates an example arrangement of core network deployments in which one or more network functions are implemented using a data processing service. In FIG. 14D, NFs 1411, 1411A, 1421, 1422 are included in a deployment 1450 that is implemented as a data processing service. The deployment 1450 may comprise, for example, a cloud network and/or data center. The deployment 1450 may be owned and/or operated by a PLMN or by a non-PLMN third party. The NFs 1411, 1411A, 1421, 1422 that are implemented using the deployment 1450 may belong to the same PLMN or to different PLMNs. The PLMN(s) may obtain (e.g., rent, lease, procure, etc.) at least a portion of the capabilities of the deployment 1450 (e.g., processing power, data storage, etc.). By providing one or more NFs using a data processing service, the mobile communications network may operate with greater speed, coverage, security, and/or efficiency.

[0197] As shown in the figures, different network elements (e.g., NFs) may be located in different physical deployments, or co-located in a single physical deployment. It will be understood that in the present disclosure, the sending and receiving of messages among different network elements is not limited to inter-deployment transmission or intra-deployment transmission, unless explicitly indicated.

[0198] In an example, a deployment may be a 'black box’ that is preconfigured with one or more NFs and preconfigured to communicate, in a prescribed manner, with other 'black box’ deployments (e.g., via the interface 1490). Additionally or alternatively, a deployment may be configured to operate in accordance with open-source instructions (e.g., software) designed to implement NFs and communicate with other deployments in a transparent manner. The deployment may operate in accordance with open RAN (0-RAN) standards.

[0199] In an example, a time service my comprise a service that provides time information (e.g., absolute time information, relative time information) to a wireless device. The time service may be provided by and/or via a communication network. The time service may determine and/or obtain time information from one or more time sources. The time service may be, for example, a coordinated universal time (UTC) service.

[0200] In an example, traceability may comprise tracing, authentication, verification, confirmation, and/or proof. In an example, traceability of a time service (e.g., traceability to UTC) may comprise an indication that time information is accurate (e.g., accurate to a particular degree of accuracy), precise (e.g., to a particular degree of precision) provided by and/or determined based on one or more particular (e.g., identified) sources of time, authentic, and/or calibrated. In an example, traceability may be associated with particular time information and/or a particular time service. In an example, a wireless device may require and/or request that a network provide traceability associated with particular time information and/or a particular time service. In an example, a network that provides a time service may or may not provide traceability and/or specific aspects of traceability.

[0201] FIG. 15 illustrates an example of a traceability pyramid showing measurement steps linking a timestamp back to the reference time scale UTC, taking the NPLTime® service as an example.

[0202] Accurate and trusted timing plays a critical role in many applications. For example, in financial markets, timing underpins the time stamping of trades, the synchronization of computer systems, and the measurement of network latency for process optimization. The rapid expansion of computer-based trading has increased the need for synchronization of trading systems and traceability to a common reference time scale, to help prevent trading irregularities and to aid forensics. To encourage this, a number of regulatory bodies now require high precision traceable time-stamping to help understand activity across trading venues, working toward a consolidated audit trail.

[0203] Time stamps created by different systems or networks can only be compared meaningfully if they are based on the same reference. For time, the global reference is Coordinated Universal Time (UTC): the time scale that underpins GPS, broadcast time signals and all other precise time services. UTC is generated by the International Bureau of Weights and Measures (BIPM) through an international collaboration involving around 75 timing institutes. Each of these institutes maintains a physical representation of UTC, called generically a UTC(k) time scale (where k is the abbreviation for the institute), which can act as the reference for national or regional time dissemination services.

[0204] A trusted time source and/or dissemination method may provide traceability back to UTC. Traceability may require a continuous chain of comparisons with known uncertainties, all of which must be documented. The GPS satellite signals alone do not readily provide traceability to UTC, but users can demonstrate traceability by obtaining GPS monitoring bulletins from one of the regional UTC(k) timing centers. [0205] traceability to UTC may include other timing aspects. For example, timing equipment may be calibrated, so that its unknown internal delays do not bias its time output. For example, equipment may be monitored continuously, so that any fault or anomalous behavior can be detected and the time output not used until the equipment is working correctly again. The calibration evidence and monitoring results may be archived so that the status of the timing equipment at any point in time can be verified at a later date.

[0206] Accurate timekeeping worldwide is based on a single reference time scale, known as Coordinated Universal Time and abbreviated in all languages as UTC. The International Bureau of Weights and Measures (BIPM), based in Paris, computes UTC in monthly blocks by combining data from around 400 continuously-operating atomic clocks located in national timing centers. The duration of the UTC second is fine-tuned using measurements from a small number of primary frequency standards to ensure that it remains as close as possible to the standard unit of time, the second, defined in the International System of Units (SI).

[0207] UTC is computed monthly, so does not exist in real-time. Each institute contributing clock data to the BIPM maintains its own physical realization of UTC, such as UTC (National Institute of Standards and Technology, NIST) in the USA and UTC(National Physical Laboratory, NPL) in the UK, which are known collectively as the UTC(k) time scales. These national time scales are adjusted so that they remain close to UTC, usually within 1 microsecond, and in some cases the difference is kept below 10 nanoseconds. They are traceable to UTC, and serve as the reference standards for all accurate time measurements globally.

[0208] UTC is based on atomic clocks, giving it great stability and accuracy. However, it slowly deviates from time based on the Earth’s rotation, which fluctuates unpredictably over time and experiences a long-term slowing due to friction caused by the tides. The increasing difference between UTC and Earth rotation time (UT1, which can be thought of as a more precisely-defined version of Greenwich Mean Time) is occasionally corrected by a 1 -second adjustment in UTC known as a leap second. A leap second may be inserted into, or removed from, the final UTC minute of either 31 December or 30 June, so occurs at the same instant world-wide. A decision on the need for the next leap second may be announced a little under 6 months in advance. Between the introduction of the leap second mechanism on 1 January 1972 and 1 January 2019 there have been 27 leap second insertions into UTC. They have so far all been positive, so the final minute of the day has 61 seconds rather than 60.

[0209] The concept of traceability for a measurement of time (sometimes referred to as epoch or time-of-day) may be supported by a continuous chain of comparisons extending from the generation of a time stamp or synchronization of a clock, back through the time distribution to one of the UTC(k) time scales, and so to the reference time scale UTC1.

[0210] In an example, commonly used sources of time may comprise a free-running clock. The most commonly encountered types of clocks may be quartz crystal oscillators, usually temperature-controlled (TOXO) or oven- controlled (OOXO), rubidium (Rb) oscillators, and caesium (Os) clocks. A clock on its own, even a caesium atomic clock, may be generally not a viable source of time-of-day. Even if synchronized against a reliable UTC reference, its time and frequency offsets from UTC may tend to increase over time due to the presence of a range of noise processes within the clock.

[0211] In an example, the commonly used sources of time may comprise a global navigation satellite system (GNSS)ZGPS. The Global Positioning System (GPS) and other GNSS may be great sources of accurate time. In a typical installation a GPS-disciplined oscillator may disseminate time across a local-area network using Network Time Protocol (NTP) or Precision Time Protocol (PTP). However, such solutions need to be implemented with care. Potential sources of error may comprise multipath reflections of the satellite signals, space weather events, RF interference at the antenna, and uncalibrated delays in antenna cables or receiver hardware. A particular concern is interference caused by GPS jammers, which are readily available at low cost and can block GPS signal reception over a radius of hundreds of meters. A GPS-disciplined oscillator feeding a network time distribution may be monitored or compared continuously with another, different time source (such as a free-running clock or a different model of GPS receiver) to verify that it remains locked correctly to the satellite signals.

[0212] In an example, the commonly used sources of time may comprise a NTP server. The Network Time Protocol (NTP) is widely used to disseminate time over the internet and large numbers of servers can be found online. Servers in unknown locations should be avoided as many are based on GPS-disciplined oscillators and their performance may be affected by local factors such as interference and multipath effects. Most institutes maintaining a UTC(k) time scale operate NTP servers that are monitored and synchronized to their time scales. These servers can in principle deliver traceability to UTC, particularly if an NTP authentication method is employed. However, the NTP protocol can only provide synchronization over wide-area networks with an accuracy of a few tens of milliseconds.

[0213] In an example, the commonly used sources of time may comprise a standard-frequency and time signals. A number of countries operate radio signals that provide access to time based on a UTC(k) time scale. These services, which may comprise MSF (60 kHz) in the UK and/or DCF77 (77.5 kHz) in Germany, are widely used to synchronize radio-controlled clocks. In general, though, the accuracy of the signals varies from tens of milliseconds down to tens of microseconds, depending on the form of the modulation and on variations in the signal propagation, and they may be rarely used for network synchronization.

[0214] In an example, the commonly used sources of time may comprise a time delivery over fiber. NPLTime® and similar services disseminate UTC-traceable time over managed fiber links using methods such as the Precision Time Protocol (PTP version 2, defined in the standard IEEE 1588-2008). PTP is a dissemination method originally developed for local area networks and can achieve accuracy better than 100 nanoseconds over stable and symmetric links. PTP can deliver synchronization over longer distances using telecoms fiber networks, employing dedicated channels or PTP-compatible switches to maintain accuracy and offering MiFID II compliance at the ingress point of the customer distribution system. As with NTP, the latency to each end point is continuously measured by the protocol (assuming out and back symmetry), enabling the end point time offset to be corrected. The major risk to this type of service may be of the fiber link being severed, due to roadworks for example, but local holdover mechanisms may be put in place to maintain service provision whilst the repair is in progress. [0215] FIG. 16 illustrates an example of a chain of comparisons from UTO to the time-stamps generated by a GPS disciplined oscillator, and the use of bulletins of GPS monitoring results from a UTC(k) institute to demonstrate traceability to UTC.

[0216] GPS receivers have become widely used as reference time standards, providing synchronization of devices across local area networks. Most of these devices may be GPS-disciplined oscillators (GPSDOs). Their ‘self- adjusting’ behavior and ease of use make them an attractive choice for many applications. However, it may be very difficult to demonstrate direct traceability to UTC using a GPSDO, and they should be installed and used with care.

[0217] A GPSDO may contain an internal oscillator, usually a quartz crystal oscillator or a rubidium atomic frequency standard, that generates signals with good short-term frequency stability. Long-term accuracy may be obtained by steering the oscillator to the time scale broadcast by the GPS satellites, known as GPS time, which may be derived from the realization of UTC at the United States Naval Observatory, UTC(USNO). GPS time does not implement leap seconds so has an integer-second offset from UTC(USNO), but the current offset and forthcoming changes may be broadcast within the GPS navigation message. A GPSDO applies the offset to its time output so that it may provide a representation of UTC rather than GPS time. This steering procedure enables a GPSDO to deliver a high level of performance, and to maintain that performance indefinitely.

[0218] FIG. 16 shows a chain of comparisons from UTC to the time-stamps generated by a GPS disciplined oscillator, and (on the right) the use of bulletins of GPS monitoring results from a UTC(k) institute to demonstrate traceability to UTC. The dashed lines may indicate links where it can be difficult or impossible to demonstrate traceability. Note that although the pulses of GPS time are aligned closely with those of UTC, there may be an integer-second difference between them which changes when a leap second is inserted into UTC (this difference may be broadcast in the satellite signals).

[0219] The distribution chain from UTC to the time output of a GPSDO may be shown on the left side of FIG. 16. The links represented by dashed lines cannot easily be evaluated and assigned an uncertainty by an external user, making direct traceability difficult to establish. For example, time obtained from satellite signals can be affected by a number of variables, including delays in the antenna and receiver, environmental effects such as propagation delays through the ionosphere and troposphere, and multipath signal reflections. A solution often adopted by calibration laboratories may be to subscribe to one of the GPS monitoring bulletins published daily, weekly or monthly by some national measurement institutes. These bulletins give a measured value for the time difference between that institute’s UTC(k) time scale and GPS time, providing traceability between the satellite signals observed in that region and UTC.

[0220] In an example, a time delivery service may be often combined with some form of clock or oscillator to maintain service provision for a period if synchronization to the delivery source is lost. The clock may be commonly referred to as a holdover clock, and the period after the loss of synchronization is called holdover.

[0221] A number of different sources of time and time dissemination methods may provide a traceable chain of measurements between a time stamp and UTC. The resilience of a time service against interruptions or other disruptions may be increased substantially by using two independent dissemination methods. For example, a GPSbased solution can be combined with fiber delivery of time, potentially enabling the two sources to be compared against each other to maintain time synchronization to UTO in the event of loss of one or other of them.

[0222] One approach to the effective use of two (or more) time sources may be a method to compare them, and to switch from one to the other if necessary. This may employ a specialized device able to monitor the difference between the two sources, for example by measuring the time offset between 1 pulse-per-second (1 PPS) signals derived from each. If one of the signals is lost, the comparison device will automatically switch to the other. More commonly, one of the time sources will develop a fault and begin to deviate from the correct time. An example of this would be a GPS receiver losing its lock to the satellite signals and free-running on its internal oscillator. An error of this type is harder to deal with if the comparison device has no means of detecting which source is correct.

[0223] FIG. 17 illustrates an example of time resilience use case for financial markets.

[0224] For financial markets, the ability to verify continuously when events take place, e.g., time traceability, may be fundamental to enable regulatory oversight and analyze the order in which trades are placed (e.g., accurate time stamps are used to settle disagreements and to prevent fraud). Market participants may execute orders on stocks in seconds or microseconds depending on the type of trading activity (e.g., high-frequency algorithmic, voice trading systems, human intervention, concluding negotiated transactions, etc.). Financial markets may be distributed systems; therefore, a common regulated timekeeping system can only be done if every market participant at each end point of the system involved in the transaction maintains an accurate clock.

[0225] There may be several means to access UTC time such as using an atomic clock, NTP servers, GNSS signal, and/or UTC(k) delivery over fiber, where UTC(k) is a realization of UTC maintained by the contributing institute (e.g., NPL, NIST) identified by k. The 5G system may be operate in collaboration with or as backup to other timing solutions used already by financial markets to comply with financial directives for timekeeping. As illustrated in FIG. 17, the 5G system may be integrated as another time source within the clock distribution infrastructure of the financial customer.

[0226] FIG. 18 illustrates an example of UTC(k) time distribution with 5G system indicating the traceability chain.

[0227] Financial regulations for time source and time dissemination may require that market participants must provide traceability back to UTC. This may require that the time information sent to financial exchanges should be measured and verified at every link in the chain, e.g., from UTC generated at the BIPM (global ‘paper’ time scale) up to the timestamping engine within the financial customer domain. Depending on the time source and distribution method the financial customer has, the traceability to UTC to comply with the regulations may be achieved in different ways.

[0228] In an example, if GNSS satellite signals are used, these signals alone do not readily provide traceability to UTC, but users can demonstrate traceability by obtaining GNSS monitoring bulletins from one of the regional UTC(k) timing centres. In this case, the end user will use these bulletins in addition to perform calibration and monitoring of the GNSS receiver equipment to demonstrate traceability to UTC. In an example, if services for time delivery over fibers are used (e.g., as delivered by a national metrology institutes), the UTC may be disseminated over managed fiber links. The traceability to UTC may be maintained using PTP to distribute the time and continuously monitoring and audit the provision point to ensure the agreed level of accuracy defined in the service SLA.

[0229] In an example, the 5G system may follow similar approaches when applied in this use case, and FIG. 18 illustrates two approaches. In an example approach, the 5G system may provide traceability to UTC. In this approach, the 5G system (e.g., g N B, U E/DS-TT) may continuously monitor and audit each link within the time distribution chain within the 5G system domain. For example, the UTC traceability may be certified at gNB. For example, the UTC traceability may be certified up to the provision point at the UE/DS-TT. Therefore, monitoring, calibration, and certification functionalities may be required at the gNB and/or UE/DS-TT. Two alternatives may be considered. In one example alternative, the 5G system supports these new functionalities including the required mechanisms in the standard. In one example alternative, proprietary solutions may be used in collaboration with the 5G system. For example, a client for the service of time delivery over fiber is installed within the UE/DS-TT to combine NPL service and 5G wireless time distribution to provide traceability to UTC.

[0230] In an example approach, the 5G system may not provide traceability to UTC. Similar to GNSS signal delivery described before, the 5G system may be not responsible of monitoring, calibrating or documenting evidence for traceability to UTC, the financial customer may be taking care of these functionalities.

[0231] FIG. 19 illustrates an example of multiple UTC time sources distributed to 5G system. In order to provide UTC time to a wireless device, the 5G system may connect to multiple UTC time sources, e.g., UTC(k), GNSS (e.g., GPS, Galileo), NTP server(s), standard-frequency and time signals (e.g., MSF60, DCF77), time delivery over fiber, Terrestrial Beacon System (TBS), Metropolitan Beacon System (MBS), and/or Free-running clock (e.g., atomic clock). In an example, the multiple UTC time sources may provide UTC time to the 5G system (e.g., (R)AN, UPF). In an example, the multiple UTC time sources may provide an offset of the UTC time to the 5G system. The offset of the UTC time may be used by the 5G system to adjust/calibrate the received UTC time from the multiple UTC time sources. In an example, the offset of the UTC time may be a leap second. In an example, the offset of the UTC time may be a nanosecond to UTC time. In an example, the offset of the UTC time may be a transmission delay between the source of the UTC and the 5G system. For example, the GNSS may be a UTC time source for the 5G system. For example, a (R)AN and/or a UPF may have a GNSS receiver to receive UTC time from the GNSS.

[0232] FIG. 20 is an example call flow illustrating problems of existing technologies. In existing technology, a problem may arise in which a wireless device hands over to a target base station which does not support time service. For example, a source system (e.g., source base station, S-(R)AN) may select a target system (e.g., target base station, T-(R)AN) for handover of the wireless device. The wireless device, source base station, and/or target base station may commence and/or complete a handover of the wireless device to the target base station. During and/or after handing over to the target base station, the wireless device may attempt to obtain time service from the target base station. However, the target base station may not support the time service. Consequently, the wireless device and/or time application is not able to receive time service during the handover and/or after the handover.

Accordingly, existing handover techniques may prevent the obtaining of time service (e.g., UTC timestamps) by the wireless device via the target system and/or interrupt the obtaining of time service if the time servicing was previously being provided by the source system.

[0233] Example embodiments of the present disclosure implement an enhanced mechanism to enable a first base station to receive time service capability information of one or more (second) base stations. Example embodiments of the present disclosure implement an enhanced mechanism to enable the first base station to determine/select a second base station of one or more (second) base stations based on the time service capability information of the one or more (second) base stations. In an example embodiment, a first base station may receive time service capability information of one or more base stations. In an example, the time service capability information may indicate whether the one or more base stations support time service or not. In an example, the first base station may receive a measurement report from a wireless device, wherein the measurement report may be associated with a second base station of the one or more base stations. In an example, based on the measurement report and the time service capability information of the second base station, the first base station may determine a handover to the second base station. In an example, the first base station may send a handover request message to the second base station. Consequently, the first base station may determine/select a second base station which supports time service, and the wireless device and/or time application may receive time service from the second base station during the handover and/or after the handover.

[0234] FIG. 21 is an example call flow which may comprise one or more actions. In an example, a first base station (e.g., a source bases station, S-(R)AN) may receive time service capability information of one or more base stations from a network function. In an example, the time service capability information may indicate whether the one or more base stations support time service or not. In an example, the network function may comprise at least one of: the one or more base stations; an access and mobility management function (AMF); an operations administration and maintenance (0AM); and/or a Unified Data Management (UDM). For example, as shown in FIG. 24 to FIG. 26, a first base station may receive time service capability information of a second base station from the second base station. For example, as shown in FIG. 27, a first base station may receive time service capability information of one or more base stations from an AMF/OAM/UDM. FIG. 22 is an example diagram depicting a Xn Setup Request message between a first base station and a second base station, wherein the Xn Setup Request message comprise the time service capability information of the first/second base station.

[0235] In an example, the time service capability information may comprise at least one of: traceability to UTC capability; Supported Time KPIs; and/or Supported Time Service Type. In an example, the time service capability information may indicate whether the one or more base stations provide time service to at least one wireless device or not. In an example, the time service may comprise time resiliency service. In an example, the time service may comprise UTC time service. In an example, the time service capability information may indicate traceability to UTC capability of the one or more base stations. In an example, the traceability to UTC capability may comprise at least one of: source of UTC time; distribution chain from the source of UTC time; UTC time monitoring; UTC time calibration; and/or documentation of the time traceability to UTC. In an example, the traceability to UTC capability may indicate a received UTC time/timestamp is traceable from a receiver of the UTC time back to a source of the UTC time.

[0236] In an example, the traceability to UTC capability of the one or more base stations may indicate whether the one or more base stations implements traceability to UTC or not. In an example, the implementing the traceability to UTC may comprise identifying and/or documenting a source of a UTC time. In an example, the implementing the traceability to UTC may comprise identifying and/or documenting a distribution chain of a UTC time from a source of the UTC time to a receiver of the UTC time. In an example, the implementing the traceability to UTC may comprise monitoring and/or documenting two or more sources of UTC time. In an example, the implementing the traceability to UTC may comprise selecting a “correct” (more accurate) source of UTC time from the two or more sources. In an example, the implementing the traceability to UTC may comprise calibrating and/or documenting UTC time. In an example, the implementing the traceability to UTC may comprise adjusting a UTC time by offsetting the UTC time based on one or more of: a leap second; a residence time; and/or a transmission delay. In an example, the implementing the traceability to UTC may comprise documenting the implementing of the traceability to UTC. In an example, the documenting may comprise creating/generating/storing/(providing to a regulator) traceability documentation, wherein the traceability documentation may indicate one or more of: an identity of the wireless device; an identity of the implementer of the traceability to UTC; a source of a UTC time; a distribution chain of the UTC time; monitoring of the UTC time; selection of a correct/more accurate UTC time; calibration of the UTC time; and/or an indication of one or more time stamps of the UTC time to which the traceability documentation corresponds.

[0237] In an example, the time service capability information may indicate Supported Time key performance indicators (KPIs) of the one or more base stations. In an example, the Supported Time KPIs of the one or more base stations may comprise at least one of: a supported accuracy of time service; a supported interval of time service; and/or a supported coverage area of time service. In an example, the time service capability information may indicate Supported Time Service Type of the one or more base stations. In an example, the Supported Time Service Type of the one or more base stations may comprise at least one of: a supported premium timing service; a supported commercial timing service; a supported regular timing service; and/or a supported dedicated timing service.

[0238] In an example, based on the capability of one or more base stations to support the time service, subscription information of the wireless device, and/or local configuration, the time service capability information may be applicable to per wireless device basis. In an example, based on the capability of one or more base stations to support the time service, subscription information of the wireless device, and/or local configuration, the time service capability information may be applicable to per PDU session basis (e.g., for a wireless device). In an example, based on the capability of one or more base stations to support the time service, subscription information of the wireless device, and/or local configuration, the time service capability information may be applicable to per bearer basis (e.g., for a wireless device). In an example, based on the capability of one or more base stations to support the time service and/or local configuration, the time service capability information may be applicable per base station basis. In an example, based on the capability of one or more base stations to support the time service and/or local configuration, the time service capability information may be applicable to per cell basis. In an example, based on the capability of one or more base stations to support the time service and/or local configuration, the time service capability information may be applicable to per Femtocells, picocells and/or microcells basis.

[0239] In an example, a control plane function (e.g., an AMF) of a network may receive a first message from a wireless device (e.g., UE) via a first base station (e.g., a source base station (S-(R)AN)). In an example, the network may be a communication system (e.g., 5G system), where the communication system may comprise base station(s), AMF(s), SMF(s) and/or UPF(s). In an example, the first message may comprise a RRC message (e.g., MSG 5, RRCSetupComplete). In an example, the first message may comprise a NAS message, wherein the NAS message may comprise a registration request message. In an example, the registration request message may comprise a 5GMM capability parameter/information element, wherein the of the 5GMM capability parameter/information element may comprise the first parameter/Request UTC time, the second parameter/ Traceability Capability of UE, the third parameter/ Requested Time KPI, and/or the fourth parameter/ Requested Time Service Type. In an example, the AMF may receive the first message from a UE, wherein the UE may connect to a time application. In an example, the AMF may receive the first message from a time application in the UE.

[0240] In an example, the first message may comprise a first parameter (e.g., Request UTC time) indicating a request of UTC time. In an example, the first message may comprise a second parameter (e.g., Traceability Capability of UE) indicating a (time) traceability to UTC capability of the wireless device. In an example, the first message may comprise a third parameter (e.g., Requested Time KPI) indicating a requested time KPI. In an example, the first message may comprise a fourth parameter (e.g., Requested Time Service Type) indicating a requested time service type.

[0241] In an example, the first parameter/Request UTC time may indicate that the wireless device requests a time service. In an example, the time service may comprise a UTC time service. For example, requesting time service may indicate requesting a timestamp (e.g., UTC timestamp). In an example, the time service may comprise a time resiliency service. In an example, the time resiliency service may indicate a reliable time service providing from a network (e.g., 5G system, a base station) to the UE and/or a time application. In an example, the time resiliency service may indicate that the provider of the time resiliency service (e.g., 5G system) has multiple sources of time, and the provider of the time resiliency service (e.g., 5G system) may monitor the accuracy and availability of timing signals from the multiple sources of time and may be able to provide an alternate source (e.g., 5G holdover capacity, atomic clock) in case of failure in the primary source of time. In an example, the multiple sources of time may comprise multiple time sources (e.g., UTC time sources). In an example, the source of time may be at least one of the multiple time sources as described in FIG. 19 (e.g., UTC(k), GNSS, NTP server, etc.). In an example, the time resiliency service may indicate a time service provided by a network (e.g., 5G system) to the wireless device, wherein the network may comprise the base station.

[0242] In an example, the second parameter/T raceability Capability of UE may indicate the capability of the wireless device to support (time) traceability to UTC. For example, the second parameter/T raceability Capability of UE may indicate the wireless device supports the (time) traceability to UTC. For example, the second parameter/T raceability Capability of UE may indicate the wireless device does not support the (time) traceability to UTC.

[0243] In an example, the (time) traceability to UTC may indicate a received UTC time/timestamp may be traceable from a receiver of the UTC time (e.g., UE, gNB) back to a source of the UTC time (e.g., GNSS, UTC(k)). The (time) traceability to UTC may comprise at least one of: source of UTC time; distribution chain from the source of UTC time; UTC time monitoring; UTC time calibration; and/or documentation of the time traceability to UTC. In an example, the source of UTC time may be at least one of the multiple UTC time sources as described in FIG. 19, e.g., UTC(k), GNSS, NTP server, etc. In an example, the distribution chain from the source of UTC time may indicate how the UTC time is distributed (e.g., via GPS, fiber, communication system). The UTC time monitoring may indicate whether and/or where the UTC time has been monitored in the distribution chain from the source of UTC time. For example, a network function (e.g., gNB) in the distribution chain may monitor time difference between two time sources, to make sure the correct time source is selected. The UTC time calibration may indicate whether and/or where the UTC time has been calibrated in the distribution chain from the source of UTC time. For example, a network function (e.g., gNB) in the distribution chain may calibrate the UTC time considering the leap second and/or transmission delay. In an example, the documentation of the time traceability to UTC may indicate that time traceability to UTC must be documented thoroughly and/or the document may be sent to a regulator.

[0244] In an example, the second parameter/T raceability Capability of UE may indicate the wireless device supports identifying and/or documenting a source of a UTC time. In an example, the second parameter/T raceability Capability of UE may indicate the wireless device supports identifying and/or documenting a distribution chain of a UTC time from a source of the UTC time to a receiver of the UTC time. In an example, the second parameter/T raceability Capability of UE may indicate the wireless device supports monitoring and/or documenting two or more sources of UTC time. In an example, the second parameter/T raceability Capability of UE may indicate the wireless device supports selecting a correct/more accurate source of UTC time from the two or more sources. In an example, the second parameter/T raceability Capability of UE may indicate the wireless device supports calibrating and/or documenting UTC time. In an example, the second parameter/T raceability Capability of UE may indicate the wireless device supports adjusting a UTC time by offsetting the UTC time based on one or more of: a leap second; a residence time and/or a transmission delay. In an example, the second parameter/T raceability Capability of UE may indicate the wireless device supports documenting the implementing of the traceability to UTC.

[0245] In an example, the third parameter/ Requested Time KPI may indicate a requested accuracy of time service for the wireless device/time application. In an example, the third parameter/ Requested Time KPI may indicate a requested interval of time service for the wireless device/time application. In an example, the third parameter/ Requested Time KPI may indicate a requested coverage area of time service for the wireless device/time application. In an example, the time KPI may indicate time service related KPI. For example, the time KPI may comprise at least one of: an accuracy of time service; an interval of time service; and/or a coverage area of time service. In an example, the accuracy of time service may indicate a granularity of the time service, e.g., nanosecond, millisecond. In an example, the interval of time service may indicate a transfer interval of (UTC) time information between a sender (e.g., 5G system) and a receiver (e.g., UE). In an example, the interval of time service may indicate a sending rate of (UTC) time package (e.g., a PTP package comprising UTC time information) between a sender (e.g., 5G system) and a receiver (e.g., UE). In an example, the coverage area of time service may indicate a coverage area (e.g., tracking area, routing area, PLMN, etc.) for the time service.

[0246] In an example, the fourth parameter/ Requested Time Service Type may indicate a requested premium timing service. In an example, the fourth parameter/ Requested Time Service Type may indicate a requested commercial timing service. In an example, the fourth parameter/ Requested Time Service Type may indicate a requested regular timing service. In an example, the fourth parameter/ Requested Time Service Type may indicate a requested dedicated timing service. In an example, the time service type may indicate a service type for the time service. For example, the time service type may comprise at least one of: a premium timing service; a commercial timing service; a regular timing service; and/or a dedicated timing service. In an example, the premium timing service may indicate a highly accurate time service, e.g., a nanosecond granularity time service and/or a microsecond granularity time service with redundancy. The redundancy may indicate the premium timing service may have one or more source of time, and a second source of time may be used if a first source of time is not available and/or is malfunctioning. In an example, an industrial control may be a premium timing service. In an example, the commercial timing service may indicate a medium accurate time service, e.g., a millisecond granularity time service. In an example, a commercial banking application may be a commercial timing service. In an example, the regular timing service may indicate a medium accurate time service, e.g., a second granularity time service. In an example, a regular time of the day may be a regular timing service. In an example, the dedicated timing service may indicate a time service with dedicated granularity and frequency. In an example, a clock signal with application specific format and frequency may be a dedicated timing service.

[0247] In an example, the UE may send the registration request message to the AMF via a base station (e.g., (R)AN). The registration request message may comprise the first parameter/Request UTC time, the second parameter/ Traceability Capability of UE, the third parameter/ Requested Time KPI, and/or the fourth parameter/ Requested Time Service Type. In an example, the registration request message may comprise at least one of: registration type, UE identity (e.g., SUCI, SUPI and/or 5G-GUTI), last visited TAI (if available), security parameters, requested NSSAI, mapping of requested NSSAI, UE 5GC capability, PDU session status, PDU session(s) to be re-activated, Follow on request, MICO mode preference, and/or the like.

[0248] In response to the message received, the AMF may take one or more actions. In an example action, the AMF may send a message (e.g., subscription request) to a unified data management (UDM). The subscription request message may comprise at least one of: UE location information, UE identity (SUCI, SUPI and/or 5G-GUTI), the first parameter/Request UTO time, the second parameter/ Traceability Capability of UE, the third parameter/ Requested Time KPI, and/or the fourth parameter/ Requested Time Service Type. In an example, the AMF may receive a response message (e.g., subscription response) from the UDM. In an example, the subscription response may comprise UTC time subscription information of the UE. In an example, the UTC time subscription information of the UE may indicate subscribed/allowed UTC time services for the wireless device.

[0249] For example, the UTC time subscription information of the UE may comprise subscribed one or more source(s) of UTC time, the UTC time subscription information of the UE may comprise subscribed/allowed one or more source(s) of UTC time, subscribed/allowed accuracy of the UTC time, subscribed time KPIs, and/or subscribed time service type. In an example, the subscribed time KPIs may indicate subscribed accuracy of time service for the wireless device. In an example, the subscribed time KPIs may indicate subscribed interval of time service for the wireless device. In an example, the subscribed time KPIs may indicate subscribed coverage area of time service for the wireless device. In an example, the subscribed time service type may indicate a subscribed premium timing service. In an example, the subscribed time service type may indicate a subscribed commercial timing service. In an example, the subscribed time service type may indicate a subscribed regular timing service. In an example, the subscribed time service type may indicate a subscribed dedicated timing service.

[0250] In an example action, based on the first message, the subscription response, capability of network for time service, and/or traceability capability of network, the AMF may determine whether the network to perform/implement/provide the (time) traceability to UTC.

[0251] In an example, the traceability capability of network may indicate the capability of the network (e.g., 5G system, the base station, the UPF) to support the (time) traceability to UTC. For example, the traceability capability of network may indicate the network supports the (time) traceability to UTC. For example, the traceability capability of network may indicate the network does not support the (time) traceability to UTC.

[0252] In an example, the performing/implementing/providing the (time) traceability to UTC may comprise identifying and/or documenting a source of a UTC time. In an example, the performing/implementing/providing the (time) traceability to UTC may comprise identifying and/or documenting a distribution chain of a UTC time from a source of the UTC time to a receiver of the UTC time. In an example, the performing/implementing/providing the (time) traceability to UTC may comprise monitoring and/or documenting two or more sources of UTC time. In an example, the performing/implementing/providing the (time) traceability to UTC may comprise selecting a correct/more accurate source of UTC time from the two or more sources. In an example, the performing/implementing/providing the (time) traceability to UTC may comprise calibrating and/or documenting UTC time. In an example, the performing/implementing/providing the (time) traceability to UTC may comprise adjusting a UTC time by offsetting the UTC time based on one or more of: a leap second; a residence time and/or a transmission delay. In an example, the performing/implementing/providing the (time) traceability to UTC may comprise documenting the implementing of the traceability to UTC. In an example, the documenting may comprise creating/generating/storing traceability document indicating one or more of: an identity of the wireless device; an identity of the implementer of the traceability to UTC; a source of a UTC time; a distribution chain of the UTC time; monitoring of the UTC time; selection of a correct/more accurate UTC time; calibration of the UTC time; and/or an indication of one or more time stamps of the UTC time to which the traceability documentation corresponds. In an example, the documenting may comprise providing the traceability documentation to a regulator.

[0253] In an example action, based on the first message, the subscription response, and/or capability of network for time service, the AMF may determine allowed time KPIs and/or allowed time service type.

[0254] In an example, the determining may be based on allowed time KPIs to meet the requested time KPI. In an example, the determining may be based on allowed time service type to meet the requested time service type. In an example, the capability of network for time service may indicate the capability of the network to support time KPIs and/or to support time service type. In an example, based on the first parameter/ Request UTC time, the third parameter/ Requested Time KPI, the fourth parameter/ Requested Time Service Type, the subscribed one or more source(s) of UTC time, the subscribed time KPIs, the subscribed time service type, and/or the capability of network for time service, the AMF may determine the allowed time KPIs and/or the allowed time service type.

[0255] In an example, the allowed time KPIs may indicate allowed accuracy of time service for the wireless device. In an example, the allowed time KPIs may indicate allowed interval of time service for the wireless device. In an example, the allowed time KPIs may indicate allowed coverage area of time service for the wireless device. In an example, the allowed time service type may indicate an allowed premium timing service. In an example, the allowed time service type may indicate an allowed commercial timing service. In an example, the allowed time service type may indicate an allowed regular timing service. In an example, the allowed time service type may indicate an allowed dedicated timing service.

[0256] In an example, the third parameter/ Requested Time KPI may indicate a requested accuracy of time service (e.g., nanosecond accuracy time service), the subscribed time KPIs may indicate a subscribed accuracy of time service (e.g., nanosecond accuracy time service and/or a subscribed microsecond accuracy time service), the capability of network for time service may support the nanosecond accuracy time service; based on the third parameter/ Requested Time KPI, the subscribed time KPIs and/or the capability of network for time service, the AMF may determine an allowed time KPI indicating an allowed accuracy of time service (e.g., nanosecond accuracy time service).

[0257] In an example, the fourth parameter/ Requested Time Service Type may indicate requesting a premium timing service, the subscribed time service type may indicate a subscribed premium timing service and/or a subscribed commercial timing service, the capability of network for time service may support premium timing service; based on the fourth parameter/ Requested Time Service Type, the subscribed time service type, and/or the capability of network for time service, the AMF may determine an allowed time service type indicating an allowed premium timing service.

[0258] In an example action, based on the AMF determining, the AMF may send a second message to the wireless device via the first base station (e.g., the S-(R)AN). In an example, the S-(R)AN may send a RRC message to the wireless device, wherein the RRC message may comprise the second message. In an example, the second message may be a NAS response message. For example, the second message may be a registration accept message. In an example, the second message may comprise a parameter (e.g., Network Provides traceability to UTC Indication) indicating whether the network to perform/implement/provide the (time) traceability to UTC. For example, the parameter/ Network Provides traceability to UTC Indication may indicate the network performs/implements/provides the (time) traceability to UTC. For example, the parameter/ Network Provides traceability to UTC Indication may indicate the network does not perform/implement/provide the (time) traceability to UTC.

[0259] In an example, the second message/registration accept message may comprise the allowed time KPIs and/or allowed time service type. In an example, the second message/registration accept message may comprise the UTC time information.

[0260] In an example, the UTC time information may comprise one or more timestamps of the UTC time. In an example, the UTC time information may comprise a parameter indicating correction to the UTC time. In an example, the parameter may be a UTC Offset. The UTC Offset may indicate an offset between International Atomic Time (TAI) and UTC specified in International Earth Rotation and Reference Systems Service (IERS) Bulletin C. In an example, the UTC Offset may be a leap second. In an example, the parameter may indicate an adjustment of the UTC time, for example, a nanosecond adjusting to the UTC time, a transmission delay adjusting to the UTC time.

[0261] In an example, the UTC time information may comprise a timescale Precision Time Protocol (PTP). The timescale PTP may indicate elapsed time since the PTP epoch measured using the second defined by TAI. In an example, the UTC time information may comprise a timescale arbitrary (ARB). The timescale ARB may indicate an epoch set by an administrative procedure. In an example, the UTC time information may comprise an oscillator frequency. The oscillator frequency may indicate oscillators used to establish or maintain the timescale of a PTP Instance. In an example, the PTP Instance may indicate a network function/entity implementing a PTP. In an example, PTP Instance may be a Boundary Clock, an Ordinary Clock, and/or a Transparent Clock. In an example, a PTP Instance may comprise a real-time clock that may be used by time applications associated with the PTP Instance for various purposes, such as generating timestamps for data or ordering events managed by a PTP Instance. In an example, the UTC time information may comprise an epoch. The epoch may indicate origin of the timescale of a domain, e.g., the PTP epoch is 1 January 197000:00:00 TAI. In an example, the UTC time information may comprise a UTC Offset, indicating an offset between TAI and UTO specified in IERS Bulletin 0.

[0262] In response to the message received from the AMF, the wireless device may take one or more actions. In an example action, based on the parameter/ Network Provides traceability to UTC Indication, the UE/time application may determine whether to perform/implement/provide (time) traceability to UTC or not. For example, the parameter/Network Provides traceability to UTC Indication may indicate the network (e.g., 5G system) performs/implements/provides (time) traceability to UTC, the UE/time application may determine not to perform/implement/provide (time) traceability to UTC. For example, the parameter/ Network Provides traceability to UTC Indication may indicate the network (e.g., 5G system) does not perform/implement/provide (time) traceability to UTC, the UE/time application may determine to perform/implement/provide (time) traceability to UTC.

[0263] In an example, based on the parameter/Network Provides traceability to UTC Indication, the network may perform/implement/provide the (time) traceability to UTC. In an example, the network may provide time service to the UE/time application based on the allowed time KPIs and/or allowed time service type. For example, the (R)AN may send UTC time information to the UE/time application based on the allowed time KPIs and/or allowed time service type. For example, the UTC time information sent to the UE/time application may match/meet the allowed time KPIs (e.g., accuracy) and/or allowed time service type.

[0264] In an example, a first base station (e.g., S-(R)AN) may determine to handover a wireless device (e.g., UE) to a second base station (e.g., T-(R)AN). In an example, the first base station may determine to handover to a second base station based on a measurement report, supported time service of the first base station, and/or time service capability information of the second base station. In an example, the first base station (e.g., S-(R)AN) may select/determine a second base station (e.g., T-(R)AN) for the handover based on a measurement report, supported time service of the first base station, and/or time service capability information of the second base station. In an example, the first base station may determine to handover to a second base station based on time service capability information of the second base station matches/meets to the supported time service of the first base station. For example, matching/meeting may indicate that the time service capability information of the second base station may be the same as the supported time service of the first base station. For example, matching/meeting may indicate that the time service capability information of the second base station may be close to (e.g., has few difference) the supported time service of the first base station. In an example, the supported time service of the first base station may indicate time services supported/provided by the first base station to the wireless device. For example, the supported time service of the first base station may indicate whether the first base station supports time service or not. For example, the supported time service of the first base station may indicate whether the first base station performs/implements/provides the (time) traceability to UTC. For example, the supported time service of the first base station may indicate supported time KPIs (e.g., the allowed time KPIs) of the first base station. For example, the supported time service of the first base station may indicate supported time service type (e.g., the allowed time service type) of the first base station.

[0265] For example, the S-(R)AN may receive a measurement report (e.g., MeasurementReport) message from the wireless device (e.g., UE), wherein the measurement report may be associated with one or more base stations (e.g., a second base station, a third base station). For example, the MeasurementReport message may indicate the third base station has a better signal than the second base station; the time service capability information of the second base station may indicate that the second base station supports time service; the time service capability information of the third base station may indicate that the third base station does not support time service. Based on the MeasurementReport message, the time service capability information of the second base station and/or the time service capability information of the third base station, the S-(R)AN may determine/select the second base station (e.g., T-(R)AN) for the handover, e.g., the S-(R)AN may determine to handover the wireless device to the second base station (e.g., T-(R)AN).

[0266] In an example, the MeasurementReport message may indicate the third base station and the second base station have similar signals, the time service capability information of the second base station may indicate that the second base station supports time service and/or a supported premium timing service; the time service capability information of the third base station may indicate that the third base station supports time service and/or a supported commercial timing service; the supported time service of the first base station may indicate the first base station supports time service and/or a supported premium timing service. Based on the MeasurementReport message, the supported time service of the first base station, the time service capability information of the second base station, and/or the time service capability information of the third base station, the first base station may determine/select the second base station (e.g., T-(R)AN) for the handover, e.g., the first base station may determine to handover the wireless device to the second base station (e.g., T-(R)AN).

[0267] In an example, the handover may be based on time service capability of the first base station is changed. For example, the time service capability of the S-(R)AN is changed, e.g., the S-(R)AN is not able to support the time service for the UE. The time service capability of the S-(R)AN is changed may be caused by load condition of the S-(R)AN, e.g., the S-(R)AN is overloaded. The time service capability of the S-(R)AN is changed may be caused by resource of the S-(R)AN, e.g., the resource of the S-(R)AN is limited.

[0268] In an example, the first base station may send to a second base station, a request for UTO time service for a wireless device. For example, the S-(R)AN may send a message (e.g., handover request) to the T-(R)AN to request a handover for the UE. In an example, the handover request message may comprise at least one of: the first parameter/Request UTO time, the second parameter/T raceability Capability of UE, a third parameter (e.g., Network Provides traceability to UTO Indication) indicating whether the source network (e.g., the S-(R)AN) to perform/implement/provide the (time) traceability to UTO, a fourth parameter (e.g., Requested Time KPI) indicating a requested time KPI, and/or a fifth parameter (e.g., Requested Time Service Type) indicating a requested time service type. In an example, the third parameter/Network Provides traceability to UTO Indication may indicate requesting the second base station (e.g., T-(R)AN) to provide the traceability to UTO for the wireless device. In an example, the fourth parameter/Requested Time KPI may be based on the parameter of the Requested Time KPI received from the UE. For example, the fourth parameter/Requested Time KPI may be the same as the Requested Time KPI received from the UE. For example, the fourth parameter/Requested Time KPI may comprise one or more parameters (e.g. , a requested accuracy of time service) as described above. In an example, the fourth parameter/Requested Time KPI may be based on the allowed time KPIs received from the AMF. For example, the fourth parameter/Requested Time KPI may be the same as the allowed time KPIs received from the AMF. For example, the fourth parameter/Requested Time KPI may be different from the allowed time KPIs received from the AMF. In an example, the fifth parameter/Requested Time Service Type may be based on the parameter of the Requested Time Service Type received from the UE. For example, the fifth parameter/Requested Time Service Type may be the same as the Requested Time Service Type received from the UE. For example, the fifth parameter/Requested Time Service Type may comprise one or more parameters (e.g., a requested premium timing service) as described above. In an example, the fifth parameter/Requested Time Service Type may be based on the allowed time service type received from the AMF. For example, the fifth parameter/Requested Time Service Type may be the same as the allowed time service type. For example, the fifth parameter/Requested Time Service Type may be different from the allowed time service type.

[0269] In an example, the handover request message may comprise a Time Service Information, wherein the Time Service Information comprises at least one of: the first parameter/Request UTO time, the second parameter/T raceability Capability of UE, the third parameter/Network Provides traceability to UTC Indication, the fourth parameter/Requested Time KPI, and/or the fifth parameter/Requested Time Service Type. In an example, the handover request message may comprise a QoS parameter, wherein the QoS parameter comprises at least one of: the first parameter/Request UTC time, the second parameter/T raceability Capability of UE, the third parameter/Network Provides traceability to UTC Indication, the fourth parameter/Requested Time KPI, and/or the fifth parameter/Requested Time Service Type.

[0270] In an example, the handover request message may comprise at least one of: a target cell ID, RRM- configuration including UE inactive time, current QoS flows to DRBs mapping rules applied to the UE, SIB1 from source gNB, and/or UE capabilities for different RATs.

[0271] In response to the message received, the second base station (e.g., T-(R)AN) may take one or more actions. In an example action, the second base station may determine that the (target) network provides time resiliency service based on at least one of: the handover request message, sources of time, capability of the (target) network (e.g., the second base station) for time service, and/or subscription information of the wireless device. For example, the T-(R)AN may determine (target) network (e.g., T-(R)AN) provides (UTC) time service based on at least one of: the first parameter/Request UTC time, the second parameter/T raceability Capability of UE, the third parameter/Network Provides traceability to UTC Indication, the fourth parameter/Requested Time KPI, the fifth parameter/Requested Time Service Type, sources of time (e.g., GPS), capability of the T-(R)AN indicates that the T-(R)AN supports (UTC) time service, and/or subscription information of the wireless device indicates that the UE has subscribed the time service from the operator, e.g., the UE is allowed to use one or more sources of UTC time.

[0272] In an example action, the second base station may determine whether the (target) network provides traceability to UTC or not based on at least one of: the handover request message, source of time, capability of the (target) network (e.g., the second base station) for time service, and/or subscription information of the wireless device. For example, the T-(R)AN may determine (target) network (e.g., T-(R)AN) provides traceability to UTC based on at least one of: the first parameter/Request UTC time, the second parameter/T raceability Capability of UE, the third parameter/Network Provides traceability to UTC Indication, the fourth parameter/Requested Time KPI, the fifth parameter/Requested Time Service Type, source of time (e.g., UTC(k)), capability of the T-(R)AN indicates that the T-(R)AN supports providing traceability to UTC, and/or subscription information of the wireless device indicates network providing time service to the UE.

[0273] For example, the T-(R)AN may determine (target) network (e.g., T-(R)AN) does not provide traceability to UTC based on at least one of: the first parameter/Request UTC time, the second parameter/T raceability Capability of UE, the third parameter/Network Provides traceability to UTC Indication, source of time (e.g., UTC(k)), capability of the T-(R)AN indicates that the T-(R)AN does not support providing traceability to UTC, and/or subscription information of the wireless device indicates network providing time service to the UE.

[0274] In an example action, based on the second base station determining whether the (target) network provides traceability to UTC or not, the second base station may determine a parameter (e.g., Network Provides traceability to UTC Indication) indicating whether the (target) network provides traceability to UTC or not. For example, the parameter/ Network Provides traceability to UTC Indication may indicate the (target) network provides traceability to UTC. For example, the parameter/ Network Provides traceability to UTC Indication may indicate the (target) network does not provide traceability to UTC. In an example, the parameter/ Network Provides traceability to UTC Indication may be applicable to per wireless device basis. In an example, the parameter/ Network Provides traceability to UTC Indication may be applicable to per PDU session basis. In an example, the parameter/ Network Provides traceability to UTC Indication may be applicable to per bearer basis. In an example, the parameter/ Network Provides traceability to UTC Indication may be applicable to per base station basis. In an example, the parameter/ Network Provides traceability to UTC Indication may be applicable to per cell basis. In an example, the parameter/ Network Provides traceability to UTC Indication may be applicable to per Femtocells, picocells and/or microcells basis.

[0275] For example, the T-(R)AN may determine (target) network (e.g., T-(R)AN) provides traceability to UTC based on at least one of: the first parameter/Request UTC time, the second parameter/T raceability Capability of UE, the third parameter/Network Provides traceability to UTC Indication, traceability capability of (target) network may indicate that the target network supports the (time) traceability to UTC, and/or subscription information of the wireless device indicates the UE is allowed to use one or more sources of UTC time.

[0276] For example, the T-(R)AN may determine (target) network (e.g., T-(R)AN) does not provides traceability to UTC based on at least one of: the first parameter/Request UTC time, the second parameter/T raceability Capability of UE indicates that the UE supports traceability to UTC, traceability capability of target network may indicate the target network does not support the (time) traceability to UTC, and/or subscription information of the wireless device indicates the UE is allowed to use one or more sources of UTC time.

[0277] In an example action, the second base station may determine supported time KPIs and/or supported time service type based on at least one of: the handover request message, source of time, resource of second base station, capability of the (target) network (e.g., the second base station) for time service, and/or subscription information of the wireless device.

[0278] In an example, the determining may be based on supported time KPIs to meet/match to the requested time KPI. In an example, meeting/matching may indicate that the supported time KPIs may be the same as the requested time KPI. In an example, meeting/matching may indicate that the supported time KPIs may be closed to (e.g., has few differences to) the requested time KPI.

[0279] In an example, the determining may be based on supported time service type to meet/match to the requested time service type. In an example, the capability of the target network for time service may indicate the capability of the target network to support time KPIs and/or to support time service type. In an example, meeting/matching may indicate that the supported time service type may be the same as the requested time service type. In an example, meeting/matching may indicate that the supported time service type may be closed to (e.g., has few differences to) the requested time service type.

[0280] In an example, the supported time KPIs and/or supported time service type may be applicable to per wireless device basis. In an example, the supported time KPIs and/or supported time service type may be applicable to per PDU session basis. In an example, the supported time KPIs and/or supported time service type may be applicable to per bearer basis. In an example, the supported time KPIs and/or supported time service type may be applicable to per base station basis. In an example, the supported time KPIs and/or supported time service type may be applicable to per cell basis. In an example, the supported time KPIs and/or supported time service type may be applicable to per Femtocells, picocells and/or microcells basis.

[0281] In an example, the supported time KPIs may indicate supported accuracy of time service for the wireless device. In an example, the supported time KPIs may indicate supported interval of time service for the wireless device. In an example, the supported time KPIs may indicate supported coverage area of time service for the wireless device. In an example, the supported time service type may indicate a supported premium timing service. In an example, the supported time service type may indicate a supported commercial timing service. In an example, the supported time service type may indicate a supported regular timing service. In an example, the supported time service type may indicate a supported dedicated timing service.

[0282] In an example, the T-(R)AN may determine the supported time KPIs and/or the supported time service type based on at least one of: the first parameter/Request UTC time, the second parameter/T raceability Capability of UE, the third parameter/Network Provides traceability to UTC Indication, the fourth parameter/Requested Time KPI, the fifth parameter/Requested Time Service Type, capability of the T-(R)AN indicates that the T-(R)AN supports the Requested Time KPI and/or the Requested Time Service Type, and/or subscription information of the wireless device indicates network providing time service to the UE. [0283] In an example, the T-(R)AN may determine the supported time KPIs and/or the supported time service type based on at least one of: the first parameter/Request UTC time, the fourth parameter/Requested Time KPI, the fifth parameter/Requested Time Service Type, capability of the T-(R)AN indicates that the T-(R)AN supports the Requested Time KPI and/or the Requested Time Service Type, and/or subscription information of the wireless device indicates the target network may be able to provide Requested Time KPI and/or Requested Time Service Type.

[0284] In an example, the first parameter/Request UTC time may indicate the UE requests UTC time service, the fourth parameter/ Requested Time KPI may indicate a requested accuracy of time service (e.g., nanosecond accuracy time service), the subscription information of the wireless device may indicate a subscribed accuracy of time service (e.g., nanosecond accuracy time service and/or a subscribed microsecond accuracy time service), the source of time may indicate supporting nanosecond accuracy time service; the capability of the target network for time service may support the nanosecond accuracy time service; based on the fourth parameter/ Requested Time KPI, the subscription information of the wireless device, the source of time, and/or the capability of the target network for time service, the T-(R)AN may determine a supported time KPI indicating an allowed accuracy of time service (e.g., nanosecond accuracy time service).

[0285] In an example, the first parameter/Request UTC time may indicate the UE requests UTC time service, fifth parameter/Requested Time Service Type may indicate requesting a premium timing service, the subscription information of the wireless device may indicate a subscribed premium timing service and/or a subscribed commercial timing service, the capability of the target network for time service may support premium timing service; the resource of the T-(R)AN may indicate supporting the premium timing service, based on the fifth parameter/ Requested Time Service Type, the subscription information of the wireless device, the capability of the target network for time service, and/or the resource of the T-(R)AN, the T-(R)AN may determine an supported time service type indicating a supported premium timing service.

[0286] In an example action, the second base station may determine resource for the time service of the wireless device based on at least one of: the handover request message, source of time, resource of second base station, capability of the (target) network (e.g., the second base station) for time service, and/or subscription information of the wireless device.

[0287] In an example action, the second base station may determine to accept the handover request message. In an example action, the second base station may determine to reject the handover request message.

[0288] In an example action, the second base station (e.g., T-(R)AN) may send a response (e.g., handover request acknowledgement) message to the first base station (e.g., S-(R)AN). The handover request acknowledgement message may comprise at least one of: the parameter/ Network Provides traceability to UTC Indication, the supported time KPIs and/or the supported time service type. In an example, the handover request acknowledgement message may comprise a cause value indicting the handover is accepted/success.

[0289] In an example, the second base station may send a handover reject/acknowledgement message to the first base station, and the handover reject/acknowledgement message may comprise a cause value indicating the second base station does not support the time service. In an example, the cause value may indicate that the second base station does not support traceability to UTC. In an example, the cause value may indicate that the second base station does not support requested time KPI. In an example, the cause value may indicate that the second base station does not support requested time service type.

[0290] In response to the message received from the second base station (e.g., T-(R)AN), the first base station (e.g., S-(R)AN) may take one or more actions. In an example action, the first base station (e.g., S-(R)AN) may trigger the air interface handover by sending a message (e.g., RRCReconfiguration) to the UE. The RRCReconfiguration message may comprise the information required to access the target cell. For example, the RRCReconfiguration message may comprise at least one of: a target cell ID, the new C-RNTI, T-(R)AN security algorithm identifiers for the selected security algorithms, a set of dedicated RACH resources, association between RACH resources and SSB(s), association between RACH resources and UE-specific CSI-RS configuration(s), common RACH resources, and/or system information of the target cell, etc. In an example, based on the handover request acknowledgement message, the RRCReconfiguration message may comprise at least one of: the parameter/ Network Provides traceability to UTC Indication, the supported time KPIs and/or the supported time service type. In an example, the RRCReconfiguration message may indicate the target network providing time service to the UE. In an example action, the S-(R)AN may send SN STATUS TRANSFER message to the T-(R)AN. In an example, the UE may synchronize to the target cell and may complete the RRC handover procedure by sending RRCReconfigurationComplete message to T-(R)AN. In an example, the T-(R)AN may initiate N2 path switch procedure by sending a PATH SWITCH REQUEST message to the AMF to switch the downlink data path towards the T-(R)AN. After completing N2 path switch procedure, the T-(AN) may send a UE CONTEXT RELEASE to inform the S-(R)AN about the success of the handover. The S-(R)AN may release radio and C-plane related resources associated to the UE context. During the handover and/or after the handover, the target network (e.g., T- (R)AN) may provide time service to the UE based on the parameter/ Network Provides traceability to UTC Indication, the supported time KPIs and/or the supported time service type. For example, the target network (e.g., T-(R)AN) may provide UTC timestamp to the UE. For example, the target network (e.g., T-(R)AN) may provide traceability to UTC for the UE. For example, the target network (e.g., T-(R)AN) may provide time service based on the supported time KPIs and/or the supported time service type.

[0291] In an example, the target network/communication system (e.g., 5G system, the T- (R)AN) may provide UTC time information to the wireless device, the wireless device may send/forward the UTC time information to time application.

[0292] In an example, the target network/communication system (e.g., 5G system, the T-(R)AN) may perform/implement/provide (time) traceability to UTC. For example, the 5G system connect to one or more sources of UTC time, the 5G system may identify and/or document at least one source of UTC time. In an example, the 5G system may identify and/or document a distribution chain of a UTC time from a source of UTC time to the 5G system (e.g., the T-(R)AN, the UPF). In an example, the 5G system may monitor and/or document two or more sources of UTO time. In an example, the 5G system may select a correct/more accurate source of UTC time from the two or more sources of the UTC time. In an example, the 5G system may calibrate and/or document UTC time. For example, the 5G system may adjust a UTC time by offsetting the UTC time based on one or more of: a leap second; a residence time, and/or a transmission delay. In an example, the 5G system may document the implementing of the traceability to UTC. In an example, the 5G system may create/generate traceability documentation. In an example, the 5G system may provide the traceability documentation to a regulator, the regulator may require one or more UTC timestamps to be associated with the traceability to UTC. In an example, the 5G system may provide the traceability documentation to a regulator via a network function (e.g., CAM).

[0293] In an example, after adjusting the (original) UTC time by offsetting the (original) UTC time based on the leap second, residence time, transmission delay, and/or other adjustment indicated by the source of UTC time, the 5G system may derive/determine an adjusted UTC time. In an example action, the 5G system may send a message (e.g., UTC time provision, a RRC message) to the wireless device. The UTC time provision message may comprise the adjusted UTC time and/or a parameter indicating the original UTC time has been adjusted based on the leap second, the residence time, the first mean transmission delay, the second mean transmission delay, and/or other adjustment indicated by the source of UTC time.

[0294] In an example, the wireless device (e.g., the UE) may perform/implement/provide (time) traceability to UTC. For example, the UE may connect to one or more sources of UTC time (e.g., one from a GNSS, and one from the target network/5G system), the UE may identify and/or document at least one source of UTC time. In an example, the UE may identify and/or document a distribution chain of a UTC time from a source of UTC time to the UE. In an example, the UE may monitor and/or document two or more sources of UTC time. In an example, the UE may select a correct/more accurate source of UTC time from the two or more sources of the UTC time. In an example, the UE may calibrate and/or document UTC time. For example, the UE may adjust a UTC time by offsetting the UTC time based on one or more of: a leap second; and/or a transmission delay. In an example, the UE may document the implementing of the traceability to UTC. In an example, the UE may create/generate traceability documentation. In an example, the UE may provide the traceability documentation to a regulator, the regulator may require one or more UTC timestamps to be associated with the traceability to UTC. For example, an application program in the UE may provide the traceability documentation to a regulator.

[0295] In an example, after adjusting the (original) UTC time by offsetting the (original) UTC time based on leap second, residence time, transmission delay, and/or other adjustment indicated by the source of UTC time, the wireless device may derive/determine an adjusted UTC time. In an example action, the wireless device may send a message (e.g., UTC time provision) to the time application. The UTC time provision message may comprise the adjusted UTC time and/or a parameter indicating the original UTC time has been adjusted based on the leap second, the residence time, the third mean transmission delay, the fourth mean transmission delay, and/or other adjustment indicated by the source of UTC time. [0296] FIG. 23 is an example diagram depicting the procedures of the first base station (e.g., S-(R)AN).

[0297] The existing technologies may have an issue that a first base station may not have time service capability information of a second base station, the first base station may select the second base station for a handover for a wireless device. Consequently, the wireless device is not able to receive time service during the handover and/or after the handover if the second base station does not support the time service.

[0298] Example embodiments of the present disclosure implement an enhanced mechanism to enable a first base station to receive time service capability information of a second base stations. Example embodiments of the present disclosure implement an enhanced mechanism to enable a first base station to send time service capability information to a second base stations. Example embodiments of the present disclosure implement an enhanced mechanism to enable the first base station to take actions (e.g., handover) based on the time service capability information of the second base station.

[0299] FIG. 24 is an example call flow which may comprise one or more actions. In an example, two base stations may use an Xn setup procedure to exchange application level configuration data to interoperate correctly over an Xn-C interface. In an example, the Xn-C interface may be between two base stations. In an example, the Xn-C interface may be between a first centralized unit (CU) of a first base station and a second CU of a second base station. In an example, a first base station may send a Xn setup request message to a second base station. In an example, the Xn setup request message may comprise a parameter (e.g., request time service capability indication) indicating requesting time service capability of the second base station. In an example, the Xn setup request message may comprise time service capability information of the first base station. The time service capability information of the first base station may indicate time service capability of the first base station. In an example, the time service capability information of the first base station may indicate whether the first base station supports time service or not, whether the first base station supports/provides traceability to UTC or not, supported time KPIs, and/or the supported time service type. The definition/content of the time service capability information may be similar to the definition/content of the time service capability information as described in FIG. 21. For brevity, further description will not be repeated here.

[0300] In an example, the Xn setup request message may comprise at least one information element (IE): AMF Region Information IE, List of Served Cells NR IE, the List of Served Cells E-UTRA IE, SUL Information IE, Supported Supplementary UpLink (SUL) band List IE, Protected E-UTRA Resource Indication IE, Intended TDD DL-UL Configuration NR IE, Transport Network Layer (TNL) Configuration Info IE, Partial List Indicator NR IE, Cell and Capacity Assistance Information NR IE, the Cell and Capacity Assistance Information E-UTRA IE, Channel State Information Reference Signal (CSI-RS) Transmission Indication IE, Physical Random Access Channel (PRACH) Configuration IE, NR Cell PRACH Configuration IE, NPRACH Configuration IE, NPN related broadcast information, and/or SFN Offset IE.

[0301] In an example, the AMF Region Information IE may comprise a complete list of Global AMF Region IDs to which the first base station belongs. In an example, the List of Served Cells NR IE and/or the List of Served Cells E-UTRA IE may comprise a complete list of cells served by the first base station. In an example, together with the Partial List Indicator IE, the List of Served Cells NR IE and/or the List of Served Cells E-UTRA IE may comprise a partial list of served cells. In an example, if Supplementary Uplink is configured at the first base station, the Xn setup request message may comprise the SUL Information IE and/or the Supported SUL band List IE for each served cell where supplementary uplink is configured. In an example, the Intended TDD DL-UL Configuration NR IE may be used by a receiver base station (e.g., the second base station) for cross-link interference management. In an example, the Intended TDD DL-UL Configuration NR IE may be used by a receiver base station (e.g., the second base station) for NR-DC power coordination with the sending base station (e.g., the first base station). In an example, the TNL Configuration Info IE may be used by the receiver base station (e.g., the second base station) for IPSec establishment. In an example, the Cell and Capacity Assistance Information NR IE and/or the Cell and Capacity Assistance Information E-UTRA IE may be used by the receiver base station (e.g., the second base station) when generating list of NG-RAN served cell information in Xn setup response message. In an example, the CSI-RS Transmission Indication IE may be used by the receiver base station (e.g., the second base station) for neighbour cell’s CSI-RS measurement. In an example, the PRACH Configuration IE (for served E- UTRA cells), the NR Cell PRACH Configuration IE (for served NR cells), and/or the NPRACH Configuration IE (for served NB-loT cells) may be used by the receiver base station (e.g., the second base station) for Random Access Channel (RACH) optimization. In an example, the SFN Offset IE may be used by the receiver base station (e.g., the second base station) to deduce SFNO time offset of the reported cell.

[0302] In response to the message received, based on the information of Xn setup request message, the second base station may take one or more actions. In an example action, the second base station may install/store the received information and may use the received information later. For example, the second base station may select the first base station for a handover based on the time service capability information of the first base station. In an example action, the second base station may send a response message (e.g., Xn setup response) to the first base station. In an example, based on the parameter/request time service capability indication, the Xn setup response message may comprise time service capability information of the second base station. The time service capability information of the second base station may indicate time service capability of the second base station. In an example, the time service capability information of the second base station may indicate whether the second base station supports time service or not, whether the second base station supports/provides traceability to UTO or not, supported time KPIs, and/or the supported time service type. The definition/content of the time service capability information may be similar to the definition/content of the time service capability information as described in FIG.

21. For brevity, further description will not be repeated here.

[0303] In an example, the Xn setup response message may comprise at least one information element: TAI Support List, List of Served Cells NR, List of Served Cells E-UTRA, AMF Region Information, TNL Configuration Info, Partial List Indicator NR, Partial List Indicator NR, and/or Cell and Capacity Assistance Information E-UTRA.

[0304] In response to the message received, the first base station may install/store the received information and may use the received information later. For example, the first base station may select the second base station for a handover based on the time service capability information of the second base station.

[0305] FIG. 25 is an example call flow which may comprise one or more actions. In an example, a first base station may send a NG-RAN node Configuration Update message to a second base station (e.g., a neighbor base station) to transfer updated information for an Xn-0 interface instance. In an example, a first base station may send a NG- RAN node Configuration Update message to a second base station.

[0306] In an example, the NG-RAN node Configuration Update message may comprise a parameter (e.g., request time service capability indication) indicating requesting time service capability of the second base station. In an example, the NG-RAN node Configuration Update message may comprise time service capability information of the first base station. The time service capability information of the first base station may indicate time service capability of the first base station. In an example, the time service capability information of the first base station may indicate whether the first base station supports time service or not, whether the first base station supports/provides traceability to UTC or not, supported time KPIs, and/or the supported time service type. The definition/content of the time service capability information may be similar to the definition/content of the time service capability information as described in FIG. 21. For brevity, further description will not be repeated here.

[0307] In an example, the NG-RAN node Configuration Update message may comprise at least one IE: CHOICE Initiating NodeType, Served Cells To Update NR, Cell Assistance Information NR, Cell Assistance Information E- UTRA, Served Cells to Update E-UTRA, Served Cells NR To Modify, Served Cells NR To Delete, Served Cell Information NR, Tracking Area Identity (TAI) Support List, Transport Network Layer Association (TNLA) To Add List, TNLA To Update List, TNLA To Remove List, Global NG-RAN Node ID, AMF Region Information To Add, AMF Region Information To Delete, and/or TNL Configuration Info.

[0308] In an example, if Supplementary Uplink is configured at the first base station, the NG-RAN node Configuration Update message may comprise SUL Information IE and the Supported SUL band List IE for each cell added in the Served NR Cells To Add IE and in the Served NR Cells To Modify IE. In an example, if Cell Assistance Information NR IE is comprised in the NG-RAN node Configuration Update message, it may be used by a receiver base station (e.g., second base station) to generate Served NR Cells IE for a NG-RAN node Configuration Update Acknowledge message. In an example, the TNL Configuration Info IE may be used by a receiver base station (e.g., second base station) for IPSec establishment. In an example, if CSI-RS Transmission Indication IE is comprised in the NG-RAN node Configuration Update message, it may be used by the receiver base station (e.g., the second base station) for neighbour cell’s CSI-RS measurement. In an example, if the Served Cells NR To Add IE is comprised in the NG-RAN node Configuration Update message, it may be used by the receiver base station (e.g., the second base station) to add cell information according to the information in the Served Cell Information NR IE.

[0309] In an example, if Served Cells NR To Modify IE is comprised in the NG-RAN node Configuration Update message, it may be used by the receiver base station (e.g., the second base station) to modify information of cell indicated by Old NR-CGI IE according to the information in the Served Cell Information NR IE. In an example, the Served Cells NR To Delete IE may be used by the receiver base station (e.g. , the second base station) to delete information of cell indicated by Old NR-OGI IE. In an example, if the NR Cell PRACH Configuration IE is contained in the Served Cell Information NR IE in the NG-RAN node Configuration Update message, the receiver base station (e.g., the second base station) may use this information for RACH optimization. In an example, if the SFN Offset IE is contained in the Served Cell Information NR IE in the NG-RAN node Configuration Update message, the receiver base station (e.g., the second base station) may use this information to update the SFNO time offset of the reported cell. In an example, the TNLA to Add List IE may be used by the receiver base station (e.g., the second base station) to establish TNL association(s) with the sender base station (e.g., the first base station). In an example, the AMF Region Information To Add IE may be used by the receiver base station (e.g., the second base station) to add the AMF Regions to its AMF Region List. In an example, the AMF Region Information To Delete IE may be used by the receiver base station (e.g., the second base station) to remove the AMF Regions from its AMF Region List.

[0310] In response to the message received, the second base station may take one or more actions. In an example action, the second base station may install/store the received information and may use the received information later. For example, the second base station may select the first base station for a handover based on the time service capability information of the first base station. In an example action, the second base station may send a response message (e.g., NG-RAN node Configuration Update Acknowledge) to the first base station. In an example, based on the parameter/request time service capability indication, the NG-RAN node Configuration Update Acknowledge message may comprise time service capability information of the second base station. The time service capability information of the second base station may indicate time service capability of the second base station. In an example, the time service capability information of the second base station may indicate whether the second base station supports time service or not, whether the second base station supports/provides traceability to UTC or not, supported time KPIs, and/or the supported time service type. The definition/content of the time service capability information may be similar to the definition/content of the time service capability information as described in FIG. 21. For brevity, further description will not be repeated here.

[0311] In an example, the NG-RAN node Configuration Update Acknowledge message may comprise at least one IE: CHOICE Responding NodeType, TNLA Setup List, TNLA Failed to Setup Lis, Criticality Diagnostics, and/or TNL Configuration Info.

[0312] In response to the message received, the first base station may install/store the received information and may use the received information later. For example, the first base station may select the second base station for a handover based on the time service capability information of the second base station.

[0313] FIG. 26 is an example call flow which may comprise one or more actions. In an example, a first base stations may use a resource status request message to initiate a requested measurement to a second base station, wherein the requested measurement may be based on parameters given in the resource status request message.

[0314] In an example, a first base station may send a resource status request message to a second base station. In an example, the resource status request message may comprise a parameter (e.g., request time service capability indication) indicating requesting time service capability of the second base station. In an example, the resource status request message may comprise time service capability information of the first base station. The time service capability information of the first base station may indicate time service capability of the first base station. In an example, the time service capability information of the first base station may indicate whether the first base station supports time service or not, whether the first base station supports/provides traceability to UTC or not, supported time KPIs, and/or the supported time service type. The definition/content of the time service capability information may be similar to the definition/content of the time service capability information as described in FIG. 21. For brevity, further description will not be repeated here.

[0315] In an example, the resource status request message may comprise at least one IE: NG-RAN nodel Measurement ID, NG-RAN node2 Measurement ID, Registration Request, Report Characteristics, Cell To Report List, and/or Reporting Periodicity.

[0316] In an example, the Registration Request may indicate type of request (start, stop, add) for which the resource status is required. In an example, the Report Characteristics may indicate measurement object that the NG-RAN node2 is requested to report. For example, each position of the Report Characteristics in the bitmap may indicate measurement object of the NG-RAN node2 is requested to report. For example, First Bit of the Report Characteristics may indicate measurement object of PRB Periodic. For example, Second Bit of the Report Characteristics may indicate measurement object of TNL Capacity Ind Periodic. For example, Third Bit of the Report Characteristics may indicate measurement object of Composite Available Capacity Periodic. For example, Fourth Bit of the Report Characteristics may indicate measurement object of Number of Active UEs. For example, Fifth Bit of Report Characteristics may indicate measurement object of RRC connections. In an example, Sixth Bit of Fifth Bit of Report Characteristics may indicate requesting time service capability of the second base station. In an example, the Cell To Report List may indicate Cell ID list to which the request applies. In an example, the Reporting Periodicity may indicate Periodicity that can be used for reporting of PRB Periodic, TNL Capacity Ind Periodic, and/or Composite Available Capacity Periodic. In an example, the Reporting Periodicity may be used as averaging window length for all measurement object if supported.

[0317] In response to the message received, based on the information of resource status request message, the second base station may take one or more actions. In an example action, the second base station may install/store the received information and may use the received information later. For example, the second base station may select the first base station for a handover based on the time service capability information of the first base station. In an example action, the second base station may send a response message (e.g., resource status response) to the first base station. In an example, based on the parameter/request time service capability indication, the resource status response message may comprise time service capability information of the second base station. The time service capability information of the second base station may indicate time service capability of the second base station. In an example, the time service capability information of the second base station may indicate whether the second base station supports time service or not, whether the second base station supports/provides traceability to UTC or not, supported time KPIs, and/or the supported time service type. The definition/content of the time service capability information may be similar to the definition/content of the time service capability information as described in FIG. 21. For brevity, further description will not be repeated here.

[0318] In an example, the resource status response message may comprise at least one IE: NG-RAN nodel Measurement ID, NG-RAN node2 Measurement ID and/or Criticality Diagnostics. In an example, the Criticality Diagnostics information element (IE) may be sent by a NG-RAN node (e.g., the second base station) when parts of a received message have not been comprehended or were missing, or if the message contained logical errors. When applicable, it may comprise information about which lEs were not comprehended or were missing.

[0319] In response to the message received, the first base station may install/store the received information and may use the received information later. For example, the first base station may select the second base station for a handover based on the time service capability information of the second base station.

[0320] FIG. 27 is an example call flow which may comprise one or more actions. In an example, a first base station may send a first message to a network function. The first message may indicate requesting time service capability information of one or more base stations. In an example, the first message may comprise a parameter (e.g., request time service capability indication) indicating requesting time service capability of the second base station. In an example, the first message may comprise time service capability information of the first base station. In an example, the network function may comprise at least one of: AMF, 0AM, UDM, and/or the like. For example, the first base station may send a NG setup request message to an AMF. The NG setup request message may comprise the parameter/ request time service capability indication and/or time service capability information of the first base station. The time service capability information of the first base station may indicate time service capability of the first base station. In an example, the time service capability information of the first base station may indicate whether the first base station supports time service or not, whether the first base station supports/provides traceability to UTC or not, supported time KPIs, and/or the supported time service type. The definition/content of the time service capability information may be similar to the definition/content of the time service capability information as described in FIG. 21. For brevity, further description will not be repeated here.

[0321] In an example, the NG setup request message may comprise at least one IE: Global RAN Node ID, RAN Node Name, Supported TA List, UE Retention Information, NB-loT Default Paging DRX, and/or Extended RAN Node Name.

[0322] In an example, the Supported TA List may indicate Supported (tracking area) TAs in the NG-RAN node. In an example, the UE Retention Information may allow the NG-RAN node (e.g., the first base station) and the AMF to indicate whether prior UE related contexts and related UE-associated logical NG-connections and RRC connections are intended to be retained.

[0323] In response to the message received, based on the information of resource status request message, the network function (e.g., the AMF) may take one or more actions. In an example action, the network function may install/store the received information (e.g., the time service capability information of the first base station) and may use the received information later. For example, the network function may send the time service capability information of the first base station to other base station (s). In an example action, the network function may send a response message (e.g., NG setup response) to the first base station. In an example, based on the parameter/request time service capability indication, the NG setup response message may comprise time service capability information of one or more base stations (e.g., second base station, third base station, etc.). The time service capability information of the one or more base stations may indicate time service capability of the one or more base stations. In an example, the time service capability information of the one or more base stations may indicate whether the one or more base stations supports time service or not. In an example, the time service capability information of the one or more base stations may indicate whether the one or more base stations support/provide traceability to UTC or not. In an example, the time service capability information of the one or more base stations may indicate supported time KPIs of the one or more base stations. In an example, the time service capability information of the one or more base stations may indicate the supported time service type of the one or more base stations. The definition/content of the time service capability information may be similar to the definition/content of the time service capability information as described in FIG. 21. For brevity, further description will not be repeated here.

[0324] In an example, the NG setup response message may comprise at least one of: AMF Name, Served GUAMI List, Relative AMF Capacity, PLMN Support List, Criticality Diagnostics, UE Retention Information, IAB Supported, and/or Extended AMF Name.

[0325] In an example, the Globally Unique AMF Identifier (GUAMI) may be used to uniquely identify an AMF within a 5G network. The GUAMI may comprise MCC (Mobile Country Code), MNC (Mobile Network Code), AMF Region ID, AMF Set ID and/or AMF Pointer. In an example, the IAB Supported may comprise an indication of support for IAB. In an example, the Criticality Diagnostics IE may be sent by the NG-RAN node (e.g., the first base station) or the AMF when parts of a received message have not been comprehended or were missing, or if the message comprises logical errors. When applicable, the Criticality Diagnostics IE may comprise information about which lEs were not comprehended or were missing.

[0326] In response to the message received, the first base station may install/store the received information and may use the received information later. For example, the first base station may select a second base station from the one or more base stations for a handover based on the time service capability information of the one or more base stations.

[0327] FIG. 28 is an example call flow which may comprise one or more actions.

[0328] In an example, a first base station (e.g., a source bases station, S-(R)AN) may receive time service capability information of one or more base stations from a network function. In an example, the network function may comprise at least one of: the one or more base stations; an access and mobility management function (AMF), e.g., a source AMF (S-AMF); an operations administration and maintenance (0AM); and/or a Unified Data Management (UDM). For example, as shown in FIG. 24 to FIG. 26, a first base station may receive time service capability information of a second base station from the second base station. For example, as shown in FIG. 27, a first base station may receive time service capability information of one or more base stations from an AMF/OAM/UDM.

[0329] In an example, the time service capability information may comprise at least one of: traceability to UTC capability; Supported Time KPIs; and/or Supported Time Service Type. In an example, the time service capability information of the one or more base stations may indicate whether the one or more base stations provide time service to at least one wireless device or not. In an example, the time service capability information of the one or more base stations may indicate whether the one or more base stations support/provide traceability to UTC or not. In an example, the time service capability information of the one or more base stations may indicate supported time KPIs, and/or the supported time service type of the one or more base stations. The definition/content of the time service capability information may be similar to the definition/content of the time service capability information as described in FIG. 21. For brevity, further description will not be repeated here.

[0330] In an example, a first AMF (e.g., source AMF(S-AMF)) of a network may receive a first message from a wireless device (e.g., UE) via a first base station (e.g., a source base station (S-(R)AN)). In an example, the first message may comprise a first parameter (e.g., Request UTC time) indicating a request of UTC time. In an example, the first message may comprise a second parameter (e.g., Traceability Capability of UE) indicating a (time) traceability to UTC capability of the wireless device. In an example, the first message may comprise a third parameter (e.g., Requested Time KPI) indicating a requested time KPI. In an example, the first message may comprise a fourth parameter (e.g., Requested Time Service Type) indicating a requested time service type. In an example, the network may be a communication system (e.g., 5G system), where the communication system may comprise base station(s), AMF(s), SMF(s) and/or UPF(s). In an example, the first message may comprise a RRC message (e.g., MSG 5, RRCSetupComplete). In an example, the first message may comprise a NAS message, wherein the NAS message may comprise a Registration Request message. In an example, the definition/content of the first message, the first parameter/Request UTC time, the second parameter/ Traceability Capability of UE, the third parameter/ Requested Time KPI, and/or the fourth parameter/ Requested Time Service Type may be similar to the definition/content of the first message, the first parameter/Request UTC time, the second parameter/ Traceability Capability of UE, the third parameter/ Requested Time KPI, and/or the fourth parameter/ Requested Time Service Type respectively as described in FIG. 21. For brevity, further description will not be repeated here.

[0331] In response to the message received, the S-AMF may take one or more actions. In an example action, the S- AMF may send a message (e.g., subscription request) to a unified data management (UDM). The subscription request message may comprise at least one of: UE location information, UE identity (SUCI, SUPI and/or 5G- GUTI), the first parameter/Request UTC time, the second parameter/ Traceability Capability of UE, the third parameter/ Requested Time KPI, and/or the fourth parameter/ Requested Time Service Type. In an example, the S-AMF may receive a response message (e.g., subscription response) from the UDM. In an example, the subscription response may comprise UTC time subscription information of the UE. The definition/content of the UTC time subscription information of the UE may be similar to the definition/content of the UTC time subscription information of the UE as described in FIG. 21. For brevity, further description will not be repeated here.

[0332] In an example action, based on the first message, the subscription response, capability of network for time service, and/or traceability capability of network, the S-AMF may determine whether the (source) network to perform/implement/provide the (time) traceability to UTC as described in FIG. 21 for AMF. For brevity, further description will not be repeated here.

[0333] In an example action, based on the first message, the subscription response, and/or capability of network for time service, the S-AMF may determine allowed time KPIs and/or allowed time service type as described in FIG. 21 for AMF. For brevity, further description will not be repeated here.

[0334] In an example action, based on the S-AMF determining, the S-AMF may send a second message to the wireless device via the first base station (e.g., the S-(R)AN). In an example, the S-(R)AN may send a RRC message to the wireless device, wherein the RRC message may comprise the second message. In an example, the second message may be a NAS response message. For example, the second message may be a registration accept message. In an example, the second message may comprise a parameter (e.g., Network Provides traceability to UTC Indication) indicating whether the network to perform/implement/provide the (time) traceability to UTC. For example, the parameter/ Network Provides traceability to UTC Indication may indicate the network performs/implements/provides the (time) traceability to UTC. For example, the parameter/ Network Provides traceability to UTC Indication may indicate the network does not perform/implement/provide the (time) traceability to UTC.

[0335] In an example, the second message/registration accept message may comprise the allowed time KPIs and/or allowed time service type. In an example, the second message/registration accept message may comprise the UTC time information. The definition/content of the UTC time information may be similar to the definition/content of the UTC time information as described in FIG. 21. For brevity, further description will not be repeated here.

[0336] In response to the message received from the S-AMF, the wireless device may take one or more actions. In an example action, based on the parameter/ Network Provides traceability to UTC Indication, the UE/time application may determine whether to perform/implement/provide (time) traceability to UTC or not.

[0337] In an example, based on the parameter/Network Provides traceability to UTC Indication, the network may perform/implement/provide the (time) traceability to UTC.

[0338] In an example, the first base station (e.g., S-(R)AN) may determine to handover a wireless device (e.g., UE) to a second base station (e.g., T-(R)AN). In an example, there may not be a direct interface between the first base station and the second base station. In an example, the handover may be a N2/X2 based handover.

[0339] In an example, the first base station may determine to handover to a second base station based on a measurement report, supported time service of the first base station, and/or time service capability information of the second base station. In an example, the first base station (e.g., S-(R)AN) may select/determine a second base station (e.g., T-(R)AN) for the handover based on a measurement report, supported time service of the first base station, and/or time service capability information of the second base station. In an example, the first base station may determine to handover to a second base station based on time service capability information of the second base station matches/meets to the supported time service of the first base station. For example, matching/meeting may indicate that the time service capability information of the second base station may be the same as the supported time service of the first base station. For example, matching/meeting may indicate that the time service capability information of the second base station may be close to (e.g., has few difference) the supported time service of the first base station. In an example, the supported time service of the first base station may indicate time services supported/provided by the first base station to the wireless device. For example, the supported time service of the first base station may indicate whether the first base station supports time service or not. For example, the supported time service of the first base station may indicate whether the first base station performs/implements/provides the (time) traceability to UTC. For example, the supported time service of the first base station may indicate supported time KPIs (e.g., the allowed time KPIs) of the first base station. For example, the supported time service of the first base station may indicate supported time service type (e.g., the allowed time service type) of the first base station.

[0340] In an example, the handover may be based on time service capability of the first base station is changed. For example, the time service capability of the S-(R)AN is changed, e.g., the S-(R)AN is not able to support the time service for the UE. The time service capability of the S-(R)AN is changed may be caused by load condition of the S-(R)AN, e.g., the S-(R)AN is overloaded. The time service capability of the S-(R)AN is changed may be caused by resource of the S-(R)AN, e.g., the resource of the S-(R)AN is limited.

[0341] In an example, the first base station may send to a second base station, a request for UTC time service for a wireless device. For example, the S-(R)AN may send a message (e.g., handover required) to the T-(R)AN to request a handover for the UE. In an example, the S-(R)AN may send the handover required message via the first AMF (e.g., S-AMF) and a second AMF (e.g., T-AMF). For example, the S-(R)AN may send the handover required message to the S-AMF. In an example, the handover required message may comprise at least one of: the first parameter/Request UTC time, the second parameter/T raceability Capability of UE, a third parameter (e.g., Network Provides traceability to UTC Indication) indicating whether the source network (e.g., the S-(R)AN) to perform/implement/provide the (time) traceability to UTC, a fourth parameter (e.g., Requested Time KPI) indicating a requested time KPI, and/or a fifth parameter (e.g., Requested Time Service Type) indicating a requested time service type. In an example, the third parameter/Network Provides traceability to UTC Indication may indicate requesting the second base station (e.g., T-(R)AN) to provide the traceability to UTC for the wireless device. In an example, the fourth parameter/Requested Time KPI may be based on the parameter of the Requested Time KPI received from the UE. For example, the fourth parameter/Requested Time KPI may be the same as the Requested Time KPI received from the UE. For example, the fourth parameter/Requested Time KPI may comprise one or more parameters (e.g., a requested accuracy of time service) as described above. In an example, the fourth parameter/Requested Time KPI may be based on the allowed time KPIs received from the S-AMF. For example, the fourth parameter/Requested Time KPI may be the same as the allowed time KPIs received from the S-AMF. For example, the fourth parameter/Requested Time KPI may be different from the allowed time KPIs received from the S-AMF. In an example, the fifth parameter/Requested Time Service Type may be based on the parameter of the Requested Time Service Type received from the UE. For example, the fifth parameter/Requested Time Service Type may be the same as the Requested Time Service Type received from the UE. For example, the fifth parameter/Requested Time Service Type may comprise one or more parameters (e.g., a requested premium timing service) as described above. In an example, the fifth parameter/Requested Time Service Type may be based on the allowed time service type received from the S-AMF. For example, the fifth parameter/Requested Time Service Type may be the same as the allowed time service type. For example, the fifth parameter/Requested Time Service Type may be different from the allowed time service type.

[0342] In an example, the handover required message may comprise a Time Service Information, wherein the Time Service Information comprises at least one of: the first parameter/Request UTO time, the second parameter/T raceability Capability of UE, the third parameter/Network Provides traceability to UTC Indication, the fourth parameter/Requested Time KPI, and/or the fifth parameter/Requested Time Service Type.

[0343] In an example, the handover required message may comprise a QoS parameter, wherein the QoS parameter comprises at least one of: the first parameter/Request UTC time, the second parameter/T raceability Capability of UE, the third parameter/Network Provides traceability to UTC Indication, the fourth parameter/Requested Time KPI, and/or the fifth parameter/Requested Time Service Type.

[0344] In an example, the handover required message may comprise at least one of: a target cell ID, RRM- configuration including UE inactive time, Header Compression Configuration, current QoS flows to DRBs mapping rules applied to the UE, SIB1 from source gNB, and/or UE capabilities for different RATs.

[0345] In an example, the handover required message may comprise at least one of: a PDU session identifier for a PDU session for the wireless device; UE IP address (e.g., IPv4 address and/or IPv6 prefix for the wireless device), QoS profile(s) for QoS flow (s)/service data flow (s) for the PDU session, the CN Tunnel Info, network slices information (e.g., S-NSSAI) associated with the PDU session, DNN associated with the PDU session.

[0346] In an example, in response to the handover required message received from the S-(R)AN, the S-AMF may send a message (e.g., create UE context request) to the T-AMF. The create UE context request message may comprise one or more information elements of the handover required message (e.g., the first parameter/Request UTC time, the second parameter/T raceability Capability of UE, the third parameter/Network Provides traceability to UTC Indication, the fourth parameter/Requested Time KPI, and/or the fifth parameter/Requested Time Service Type). In an example, in response to the message received from the S-AMF, the T-AMF may send a message (e.g., PDU session update) to an SMF, the PDU session update message may comprise one or more information elements of the create UE context request message (e.g., the first parameter/Request UTC time, the second parameter/T raceability Capability of UE, the third parameter/Network Provides traceability to UTC Indication, the fourth parameter/Requested Time KPI, and/or the fifth parameter/Requested Time Service Type). [0347] In an example, the SMF may send a message (N4 session establishment/modification request) to a UPF. The N4 session establishment/modification request message may comprise one or more information elements of the PDU session update message (e.g., the first parameter/Request UTC time, the second parameter/T raceability Capability of UE, the third parameter/Network Provides traceability to UTC Indication, the fourth parameter/Requested Time KPI, and/or the fifth parameter/Requested Time Service Type).

[0348] In an example, the UPF may determine to provide the time service to the wireless device based on the first parameter/Request UTC time, the second parameter/T raceability Capability of UE, the third parameter/Network Provides traceability to UTC Indication, the fourth parameter/Requested Time KPI, and/or the fifth parameter/Requested Time Service Type, the capability of the network (e.g., the UPF), subscription information of the wireless device. In an example, the UPF may send a response message (e.g., N4 session establishment/modification response) to the SMF confirming/indicating supporting the time service for the wireless device. In an example, The N4 session establishment/modification response message may comprise CN N3 Tunnel Info (e.g., user plane address of the UPF for uplink data).

[0349] In an example, the SMF may send a response message (e.g., PDU session update response) to the T-AMF confirming/indicating supporting the time service for the wireless device. In an example, the PDU session update response message may comprise the CN N3 Tunnel Info.

[0350] In an example, in response to the message received, the T-AMF may send a message (e.g., handover request) to the T-(R)AN. The handover request message may comprise one or more information elements of the create UE context request message (e.g., the first parameter/Request UTC time, the second parameter/T raceability Capability of UE, the third parameter/Network Provides traceability to UTC Indication, the fourth parameter/Requested Time KPI, and/or the fifth parameter/Requested Time Service Type). In an example, the handover request message may comprise the CN N3 Tunnel Info.

[0351] In response to the message received from the S-(R)AN (e.g., via the S-AMF and/or the T-AMF), the second base station (e.g., T-(R)AN) may take one or more actions. In an example action, the T-(R)AN may determine that the (target) network provides time resiliency service based on at least one of: the handover request message, sources of time, capability of the (target) network (e.g., the second base station, T-(R)AN) for time service, and/or subscription information of the wireless device. The T-(R)AN determining that the (target) network provides time resiliency service may be similar to the T-(R)AN determining that the (target) network provides time resiliency service as described in FIG. 21. For brevity, further description will not be repeated here.

[0352] In an example action, the second base station may determine whether the (target) network provides traceability to UTC or not based on at least one of: the handover request message, source of time, capability of the (target) network (e.g., the second base station) for time service, and/or subscription information of the wireless device. The second base station determining whether the (target) network provides traceability to UTC or not may be similar to second base station determining whether the (target) network provides traceability to UTC or not as described in FIG. 21. For brevity, further description will not be repeated here. [0353] In an example action, based on the second base station determining whether the (target) network provides traceability to UTC or not, the second base station may determine a parameter (e.g., Network Provides traceability to UTC Indication) indicating whether the (target) network provides traceability to UTC or not.

[0354] In an example action, the second base station may determine supported time KPIs and/or supported time service type based on at least one of: the handover request message, source of time, resource of second base station, capability of the (target) network (e.g., the second base station) for time service, and/or subscription information of the wireless device. The second base station determining supported time KPIs and/or supported time service type may be similar to the second base station determining supported time KPIs and/or supported time service type as described in FIG. 21. For brevity, further description will not be repeated here.

[0355] In an example action, the second base station may determine resource for the time service of the wireless device based on at least one of: the handover request message, source of time, resource of second base station, capability of the (target) network (e.g., the second base station) for time service, and/or subscription information of the wireless device.

[0356] In an example action, the second base station may determine to accept the handover request message. In an example action, the second base station may determine to reject the handover request message. In an example action, the second base station (e.g., T-(R)AN) may send a response (e.g., handover request acknowledgement) message to the first base station (e.g., S-(R)AN) via the T-AMF and/or the S-AMF. For example, the T-(R)AN may send the handover request acknowledgement to the T-AMF. The handover request acknowledgement message may comprise at least one of: AN Tunnel Info (e.g., user plane address of the T-(R)AN for downlink data), the parameter/ Network Provides traceability to UTC Indication, the supported time KPIs, and/or the supported time service type. In an example, the handover request acknowledgement message may comprise a cause value indicting the handover is accepted/success.

[0357] In an example, the second base station may send a handover reject/acknowledgement message to the first base station via the T-AMF and/or the S-AMF. For example, the T-(R)AN may send a handover reject/acknowledgement message to the T-AMF. The handover reject/acknowledgement message may comprise a cause value indicating the second base station does not support the time service, e.g., because of lack of resource. In an example, the handover reject/acknowledgement message may comprise a cause value indicating the second base station does not support traceability to UTC. In an example, the handover reject/acknowledgement message may comprise a cause value indicating the second base station does not support requested time KPI. In an example, the handover reject/acknowledgement message may comprise a cause value indicating the second base station does not support requested time service type.

[0358] In response to the message received from the T-(R)AN, the T-AMF may send a PDU session update request message to the SMF. The PDU session update request message may comprise one or more information elements received from the T-(R)AN (e.g., AN Tunnel Info, cause value, the parameter/ Network Provides traceability to UTC Indication, the supported time KPIs, and/or the supported time service type). The SMF may send a message (N4 session establishment/modification request) to the UPF. The N4 session establishment/modification request message may comprise the one or more information elements received from the T-AMF (e.g., AN Tunnel Info, cause value, the parameter/ Network Provides traceability to UTC Indication, the supported time KPIs, and/or the supported time service type).

[0359] In an example, the UPF may determine to provide the time service to the wireless device based on the parameter/ Network Provides traceability to UTC Indication, the supported time KPIs, and/or the supported time service type, the capability of the network (e.g., the UPF), subscription information of the wireless device. In an example, the UPF may send a response message (e.g., N4 session establishment/modification response) to the SMF confirming/indicating supporting the time service for the wireless device. In an example, The N4 session establishment/modification response message may comprise ON N3 Tunnel Info (e.g., user plane address of the UPF for uplink data).

[0360] In response to the message received from the UPF, the SMF may send a PDU session update response message to the T-AMF. The PDU session update response message may comprise the ON N3 Tunnel Info. In response to the message received from the SMF, the T-AMF may send a create UE context response message to the S-AMF. The create UE context response message may comprise one or more information of the handover request acknowledgement message (e.g., the parameter/ Network Provides traceability to UTC Indication, the supported time KPIs, and/or the supported time service type).

[0361] In response to the message received from the T-AMF, the S-AMF may send a handover command message to the S-(R)AN. The handover command message may comprise one or more information element of the create UE context response message (e.g., the parameter/ Network Provides traceability to UTC Indication, the supported time KPIs, and/or the supported time service type). In response to the message received from the S-AMF, the S- (R)AN may trigger the air interface handover by sending a message (e.g., handover command, RRCReconfiguration) to the UE. The handover command message may comprise the information required to access the target cell. For example, the handover command message may comprise at least one of: a target cell ID, the new C-RNTI, T-(R)AN security algorithm identifiers for the selected security algorithms, a set of dedicated RACH resources, association between RACH resources and SSB(s), association between RACH resources and UE-specific CSI-RS configuration(s), common RACH resources, and/or system information of the target cell, etc. In an example, based on the message received from the S-AMF, the handover command message may comprise at least one of: the parameter/ Network Provides traceability to UTC Indication, the supported time KPIs and/or the supported time service type. In an example, the handover command message may indicate the target network providing time service to the UE.

[0362] In an example, after the UE has successfully synchronized to the target cell, it may send a handover confirm message to the T-(R)AN. The handover confirm message may indicate that the handover is considered as successful by the UE. In response to the message received from the UE, the T-(R)AN may send a handover notify message to the T-AMF. The handover notify message may indicate that the handover is considered as successful by the T-(R)AN.

[0363] In response to the message received, the T-AMF may send a PDU session update request message to the SMF. The PDU session update request message may comprise one or more information elements received from the T-(R)AN (e.g., AN Tunnel Info, cause value, the parameter/ Network Provides traceability to UTO Indication, the supported time KPIs, and/or the supported time service type). The SMF may send a message (N4 session establishment/modification request) to the UPF. The N4 session establishment/modification request message may comprise the one or more information elements received from the T-AMF (e.g., AN Tunnel Info, cause value, the parameter/ Network Provides traceability to UTO Indication, the supported time KPIs, and/or the supported time service type).

[0364] In an example, the UPF may determine to provide the time service to the wireless device based on the parameter/ Network Provides traceability to UTO Indication, the supported time KPIs, and/or the supported time service type, the capability of the network (e.g., the UPF), subscription information of the wireless device. In an example, the UPF may send a response message (e.g., N4 session establishment/modification response) to the SMF confirming/indicating supporting the time service for the wireless device. In an example, the N4 session establishment/modification response message may comprise ON N3 Tunnel Info (e.g., user plane address of the UPF for uplink data).

[0365] In response to the message received from the UPF, the SMF may send a PDU session update response message to the T-AMF. The PDU session update response message may comprise the ON N3 Tunnel Info. There may be UE registration and other procedures for the wireless device.

[0366] In an example, the target network/communication system (e.g., 5G system, the T- (R)AN) may provide UTO time information to the wireless device, the wireless device may send/forward the UTO time information to time application.

[0367] In an example, the target network/communication system (e.g., 5G system, the T-(R)AN) may perform/implement/provide (time) traceability to UTC as described in FIG. 21. For brevity, further description will not be repeated here.

[0368] In an example, the wireless device (e.g., UE) may perform/implement/provide (time) traceability to UTC as described in FIG. 21. For brevity, further description will not be repeated here.

[0369] In existing technology, for a multi-connectivity scenario (e.g., there may be a MN and a SN for a wireless device (e.g., UE)), before a handover procedure, a source system (e.g., a source master node (S-MN) and/or a secondary node (SN)) may provide time service (e.g., UTC timestamp) to a wireless device (e.g., UE shown in FIG. 29) and/or a (time) application. The wireless device may still need the time service during the handover and/or after the handover. However, the existing technologies may have an issue that the source system may select a target base station (e.g., a target MN (T-MN)) which does not support the time service. Consequently, the wireless device and/or time application is not able to receive time service during the handover and/or after the handover.

[0370] Example embodiments of the present disclosure implement an enhanced mechanism to enable a source master node (S-MN) to receive time service capability information of one or more base stations. Example embodiments of the present disclosure implement an enhanced mechanism to enable the S-MN to determine/select a target master node (T-MN) from one or more base stations based on the time service capability information of the one or more base stations.

[0371] Example embodiments of the present disclosure implement an enhanced mechanism to enable a source MN to request a target MN to perform (time) traceability to UTO during the handover. Example embodiments of the present disclosure implement an enhanced mechanism to enable the target MN to indicate to the source MN whether the target network (e.g., target multi-connectivity system) can perform the traceability to UTO or not. Consequently, the UE and/or the time application may use the UTO time accurately.

[0372] During and/or after the handover, for a multi-connectivity scenario, the existing technology may have an issue to support a mechanism to provide timing service to UEs and/or time application (servers) based on specific key performance indicator (KPI)(s) (e.g., accuracy, interval, coverage area) and/or timing service type (e.g., a premium timing service). For example, during the handover, the target MN and/or target SN may not know whether to provide time service to the UE or not; and/or the target MN and/or target SN may not know how accurate time service should be provided to the UE/time application. Consequently, the UE/time application can’t receive the appropriate timing services from the target MN and/or target SN during the handover and/or after the handover.

[0373] Example embodiments of the present disclosure implement an enhanced mechanism to enable a source MN to indicate a requested time KPIs and/or a requested time service type to the target MN. Example embodiments of the present disclosure implement an enhanced mechanism to enable a target MN to indicate to the source MN supported time KPIs and/or supported time service type. Consequently, the target MN and/or target SN may provide timing service to UEs and/or time application based on supported time KPIs and/or supported time service type during the handover and/or after the handover.

[0374] FIG. 29 is an example call flow which may comprise one or more actions. In an example, a first base station (e.g., a source master node (S-MN)) may receive time service capability information of one or more base stations from a network function. In an example, the network function may comprise at least one of: the one or more base stations; an access and mobility management function (AMF); an operations administration and maintenance (CAM); and/or a Unified Data Management (UDM). For example, as shown in FIG. 24 to FIG. 26, a first base station may receive time service capability information of a second base station from the second base station. For example, as shown in FIG. 27, a first base station may receive time service capability information of one or more base stations from an AMF/OAM/UDM.

[0375] In an example, the time service capability information may comprise at least one of: traceability to UTC capability; Supported Time KPIs; and/or Supported Time Service Type. In an example, the time service capability information of the one or more base stations may indicate whether the one or more base stations provide time service to at least one wireless device or not. In an example, the time service capability information of the one or more base stations may indicate whether the one or more base stations support/provide traceability to UTC or not. In an example, the time service capability information of the one or more base stations may indicate supported time KPIs, and/or the supported time service type of the one or more base stations. The definition/content of the time service capability information may be similar to the definition/content of the time service capability information as described in FIG. 21. For brevity, further description will not be repeated here.

[0376] In an example, an AMF of a network may receive a first message from a wireless device (e.g., UE) via a first master base station (e.g., a source master node (S-MN)). The In an example, the first message may comprise a first parameter (e.g., Request UTO time) indicating a request of UTO time. In an example, the first message may comprise a second parameter (e.g., Traceability Capability of UE) indicating a (time) traceability to UTO capability of the wireless device. In an example, the first message may comprise a third parameter (e.g., Requested Time KPI) indicating a requested time KPI. In an example, the first message may comprise a fourth parameter (e.g., Requested Time Service Type) indicating a requested time service type. In an example, the network may be a communication system (e.g., 5G system), where the communication system may comprise base station(s), AMF(s), SMF(s) and/or UPF(s). In an example, the first message may comprise a RRC message (e.g., MSG 5, RRCSetupComplete). In an example, the first message may comprise a NAS message, wherein the NAS message may comprise a Registration Request message. In an example, the definition/content of the first message, the first parameter/Request UTO time, the second parameter/ Traceability Capability of UE, the third parameter/ Requested Time KPI, and/or the fourth parameter/ Requested Time Service Type may be similar to the definition/content of the first message, the first parameter/Request UTC time, the second parameter/ Traceability Capability of UE, the third parameter/ Requested Time KPI, and/or the fourth parameter/ Requested Time Service Type respectively as described in FIG. 21. For brevity, further description will not be repeated here.

[0377] In response to the message received, the AMF may take one or more actions. In an example action, the AMF may send a message (e.g., subscription request) to a unified data management (UDM). The subscription request message may comprise at least one of: UE location information, UE identity (SUCI, SUPI and/or 5G-GUTI), the first parameter/Request UTC time, the second parameter/ Traceability Capability of UE, the third parameter/ Requested Time KPI, and/or the fourth parameter/ Requested Time Service Type. In an example, the AMF may receive a response message (e.g., subscription response) from the UDM. In an example, the subscription response may comprise UTC time subscription information of the UE. The definition/content of the UTC time subscription information of the UE may be similar to the definition/content of the UTC time subscription information of the UE as described in FIG. 21. For brevity, further description will not be repeated here.

[0378] In an example action, based on the first message, the subscription response, capability of network for time service, and/or traceability capability of network, the AMF may determine whether the network to perform/implement/provide the (time) traceability to UTC as described in FIG. 21 for AMF. For brevity, further description will not be repeated here.

[0379] In an example action, based on the first message, the subscription response, and/or capability of network for time service, the AMF may determine allowed time KPIs and/or allowed time service type as described in FIG. 21. For brevity, further description will not be repeated here.

[0380] In an example action, based on the AMF determining, the AMF may send a second message to the wireless device via the first master base station (e.g., S-MN). In an example, the S-MN may send a RRC message to the wireless device, wherein the RRC message may comprise the second message. In an example, the second message may be a NAS response message. For example, the second message may be a registration accept message. In an example, the second message may comprise a parameter (e.g., Network Provides traceability to UTC Indication) indicating whether the network (e.g., S-MN) to perform/implement/provide the (time) traceability to UTC. For example, the parameter/ Network Provides traceability to UTC Indication may indicate the network performs/implements/provides the (time) traceability to UTC. For example, the parameter/ Network Provides traceability to UTC Indication may indicate the network does not perform/implement/provide the (time) traceability to UTC.

[0381] In an example, the second message/registration accept message may comprise the allowed time KPIs and/or allowed time service type. In an example, the second message/registration accept message may comprise the UTC time information. The definition/content of the UTC time information may be similar to the definition/content of the UTC time information as described in FIG. 21. For brevity, further description will not be repeated here.

[0382] In response to the message received from the AMF, the wireless device may take one or more actions. In an example action, based on the parameter/ Network Provides traceability to UTC Indication, the UE/time application may determine whether to perform/implement/provide (time) traceability to UTC or not.

[0383] In an example, based on the parameter/Network Provides traceability to UTC Indication, the source network may perform/implement/provide the (time) traceability to UTC.

[0384] In an example, the S-MN may determine to handover a wireless device (e.g., UE) to a target master base station (e.g., target master node (T-MN)). In an example, the handover may be a N2/X2 based handover. In an example, the S-MN may determine to handover to a T-MN based on a measurement report, supported time service of the S-MN, and/or time service capability information of the T-MN. In an example, the S-MN may select/determine a T-MN for the handover based on a measurement report, supported time service of the S-MN, and/or time service capability information of the T-MN. In an example, the S-MN may determine to handover to a T-MN based on time service capability information of the T-MN matches/meets to the supported time service of the S-MN. For example, matching/meeting may indicate that the time service capability information of the T-MN may be the same as the supported time service of the S-MN. For example, matching/meeting may indicate that the time service capability information of the T-MN may be close to (e.g., has few difference) the supported time service of the S-MN. In an example, the supported time service of the S-MN may indicate time services supported/provided by the S-MN to the wireless device. For example, the supported time service of the S-MN may indicate whether the S-MN supports time service or not. For example, the supported time service of the S-MN may indicate whether the S-MN performs/implements/provides the (time) traceability to UTC. For example, the supported time service of the S-MN may indicate supported time KPIs (e.g., the allowed time KPIs) of the S-MN. For example, the supported time service of the S-MN may indicate supported time service type (e.g. , the allowed time service type) of the S- MN.

[0385] In an example, the handover may be based on time service capability of the S-MN is changed. For example, the time service capability of the S-MN is changed, e.g., the S-MN is not able to support the time service for the UE. The time service capability of the S-MN is changed may be caused by load condition of the S-MN, e.g., the S- MN is overloaded. The time service capability of the S-MN is changed may be caused by resource of the S-MN, e.g., the resource of the S-MN is limited.

[0386] In an example, the S-MN may send to T-MN, a request for UTO time service for a wireless device. For example, the S-MN may send a message (e.g., handover request) to the T-MN to request a handover for the UE. In an example, the handover request message may comprise at least one of: the first parameter/Request UTO time, the second parameter/T raceability Capability of UE, a third parameter (e.g., Network Provides traceability to UTO Indication) indicating whether the source network (e.g., the S-MN) to perform/implement/provide the (time) traceability to UTO, a fourth parameter (e.g., Requested Time KPI) indicating a requested time KPI, and/or a fifth parameter (e.g., Requested Time Service Type) indicating a requested time service type. In an example, the third parameter/Network Provides traceability to UTO Indication may indicate requesting the T-MN to provide the traceability to UTO for the wireless device. In an example, the fourth parameter/Requested Time KPI may be based on the parameter of the Requested Time KPI received from the UE. For example, the fourth parameter/Requested Time KPI may be the same as the Requested Time KPI received from the UE. For example, the fourth parameter/Requested Time KPI may comprise one or more parameters (e.g., a requested accuracy of time service) as described above. In an example, the fourth parameter/Requested Time KPI may be based on the allowed time KPIs received from the AMF. For example, the fourth parameter/Requested Time KPI may be the same as the allowed time KPIs received from the AMF. For example, the fourth parameter/Requested Time KPI may be different from the allowed time KPIs received from the AMF. In an example, the fifth parameter/Requested Time Service Type may be based on the parameter of the Requested Time Service Type received from the UE. For example, the fifth parameter/Requested Time Service Type may be the same as the Requested Time Service Type received from the UE. For example, the fifth parameter/Requested Time Service Type may comprise one or more parameters (e.g., a requested premium timing service) as described above. In an example, the fifth parameter/Requested Time Service Type may be based on the allowed time service type received from the AMF. For example, the fifth parameter/Requested Time Service Type may be the same as the allowed time service type. For example, the fifth parameter/Requested Time Service Type may be different from the allowed time service type.

[0387] In an example, the handover request message may comprise a Time Service Information, wherein the Time Service Information comprises at least one of: the first parameter/Request UTO time, the second parameter/T raceability Capability of UE, the third parameter/Network Provides traceability to UTO Indication, the fourth parameter/Requested Time KPI, and/or the fifth parameter/Requested Time Service Type. [0388] In an example, the handover request message may comprise a QoS parameter, wherein the QoS parameter comprises at least one of: the first parameter/Request UTC time, the second parameter/T raceability Capability of UE, the third parameter/Network Provides traceability to UTC Indication, the fourth parameter/Requested Time KPI, and/or the fifth parameter/Requested Time Service Type.

[0389] In an example, the S-MN may trigger a MN-initiated SN Modification procedure to a source Secondary Node (S-SN) to retrieve the current SCG configuration. In an example, the handover request message may comprise at least one of: both MCG and SCG configuration, S-SN UE X2AP ID, S-SN ID and/or the UE context in the S-SN.

[0390] In an example, in response to the handover request message received from the S-MN, the T-MN take one or more actions. In an example action, if the T-MN decides to keep the S-SN, the T-MN may send a message (e.g., SN Addition Request) to the S-SN. The SN Addition Request message may comprise the SN UE XnAP ID as a reference to the UE context in the S-SN that was established by the S-MN. In an example, if the T-MN decides to change the S-SN to a different SN, the T-MN may select a target SN (e.g., T-SN). The T-MN may send the SN Addition Request message to the T-SN, wherein the SN Addition Request message may comprise UE context in the S-SN that was established by the S-MN.

[0391] In an example, the SN Addition Request message may comprise one or more information elements of the handover request message (e.g., the first parameter/Request UTC time, the second parameter/T raceability Capability of UE, the third parameter/Network Provides traceability to UTC Indication, the fourth parameter/Requested Time KPI, and/or the fifth parameter/Requested Time Service Type).

[0392] In response to the message received, the T-SN may take one or more actions. In an example action, the T-SN may determine that the T-SN provides time resiliency service based on at least one of: the SN Addition Request message, sources of time, capability of the T-SN for time service, and/or subscription information of the wireless device. For example, the T-SN may determine T-SN provides (UTC) time service based on at least one of: the first parameter/Request UTC time, the second parameter/T raceability Capability of UE, the third parameter/Network Provides traceability to UTC Indication, the fourth parameter/Requested Time KPI, the fifth parameter/Requested Time Service Type, sources of time (e.g., GPS), capability of the T-SN indicates that the T-SN supports (UTC) time service, and/or subscription information of the wireless device indicates that the UE has subscribed the time service from the operator, e.g., the UE is allowed to use one or more sources of UTC time.

[0393] In an example action, the T-SN may determine whether the T-SN provides traceability to UTC or not based on at least one of: the SN Addition Request message, source of time, capability of the T-SN for time service, and/or subscription information of the wireless device. For example, the T-SN may determine that the T-SN provides traceability to UTC based on at least one of: the first parameter/Request UTC time, the second parameter/T raceability Capability of UE, the third parameter/Network Provides traceability to UTC Indication, the fourth parameter/Requested Time KPI, the fifth parameter/Requested Time Service Type, source of time (e.g., UTC(k)), capability of the T-SN indicates that the T-SN supports providing traceability to UTC, and/or subscription information of the wireless device indicates network providing time service to the UE. [0394] For example, the T-SN may determine T-SN does not provide traceability to UTC based on at least one of: the first parameter/Request UTC time, the second parameter/T raceability Capability of UE, the third parameter/Network Provides traceability to UTC Indication, source of time (e.g., UTC(k)), capability of the T-SN indicates that the T-SN does not support providing traceability to UTC, and/or subscription information of the wireless device indicates network providing time service to the UE.

[0395] In an example action, based on the T-SN determining whether the T-SN provides traceability to UTC or not, the T-SN may determine a parameter (e.g., Network Provides traceability to UTC Indication) indicating whether the T-SN provides traceability to UTC or not. For example, the parameter/ Network Provides traceability to UTC Indication may indicate the T-SN provides traceability to UTC. For example, the parameter/ Network Provides traceability to UTC Indication may indicate the T-SN does not provide traceability to UTC. In an example, the parameter/ Network Provides traceability to UTC Indication may be applicable to per wireless device basis. In an example, the parameter/ Network Provides traceability to UTC Indication may be applicable to per PDU session basis. In an example, the parameter/ Network Provides traceability to UTC Indication may be applicable to per bearer basis. In an example, the parameter/ Network Provides traceability to UTC Indication may be applicable to per base station basis. In an example, the parameter/ Network Provides traceability to UTC Indication may be applicable to per cell basis. In an example, the parameter/ Network Provides traceability to UTC Indication may be applicable to per Femtocells, picocells and/or microcells basis.

[0396] In an example action, the T-SN may determine supported time KPIs and/or supported time service type based on at least one of: the SN Addition Request message, source of time, resource of second base station, capability of the SN for time service, and/or subscription information of the wireless device.

[0397] In an example, the determining may be based on supported time KPIs to meet the requested time KPI. In an example, the determining may be based on supported time service type to meet the requested time service type. In an example, the capability of the T-SN for time service may indicate the capability of the T-SN to support time KPIs and/or to support time service type.

[0398] In an example, the supported time KPIs and/or supported time service type may be applicable to per wireless device basis. In an example, the supported time KPIs and/or supported time service type may be applicable to per PDU session basis. In an example, the supported time KPIs and/or supported time service type may be applicable to per bearer basis. In an example, the supported time KPIs and/or supported time service type may be applicable to per base station basis. In an example, the supported time KPIs and/or supported time service type may be applicable to per cell basis. In an example, the supported time KPIs and/or supported time service type may be applicable to per Femtocells, picocells and/or microcells basis.

[0399] In an example, the supported time KPIs may indicate supported accuracy of time service for the wireless device. In an example, the supported time KPIs may indicate supported interval of time service for the wireless device. In an example, the supported time KPIs may indicate supported coverage area of time service for the wireless device. In an example, the supported time service type may indicate a supported premium timing service. In an example, the supported time service type may indicate a supported commercial timing service. In an example, the supported time service type may indicate a supported regular timing service. In an example, the supported time service type may indicate a supported dedicated timing service.

[0400] In an example, the T-SN may determine the supported time KPIs and/or the supported time service type based on at least one of: the first parameter/Request UTC time, the second parameter/T raceability Capability of UE, the third parameter/Network Provides traceability to UTC Indication, the fourth parameter/Requested Time KPI, the fifth parameter/Requested Time Service Type, capability of the T-SN indicates that the T-SN supports the Requested Time KPI and/or the Requested Time Service Type, and/or subscription information of the wireless device indicates network providing time service to the UE.

[0401] In an example, the T-SN may determine the supported time KPIs and/or the supported time service type based on at least one of: the first parameter/Request UTC time, the fourth parameter/Requested Time KPI, the fifth parameter/Requested Time Service Type, capability of the T-SN indicates that the T-SN supports the Requested Time KPI and/or the Requested Time Service Type, and/or subscription information of the wireless device indicates the target network may be able to provide Requested Time KPI and/or Requested Time Service Type.

[0402] In an example, the first parameter/Request UTC time may indicate the UE requests UTC time service, the fourth parameter/ Requested Time KPI may indicate a requested accuracy of time service (e.g., nanosecond accuracy time service), the subscription information of the wireless device may indicate a subscribed accuracy of time service (e.g., nanosecond accuracy time service and/or a subscribed microsecond accuracy time service), the source of time may indicate supporting nanosecond accuracy time service; the capability of the target network for time service may support the nanosecond accuracy time service; based on the fourth parameter/ Requested Time KPI, the subscription information of the wireless device, the source of time, and/or the capability of the T-SN for time service, the T-SN may determine a supported time KPI indicating an allowed accuracy of time service (e.g., nanosecond accuracy time service).

[0403] In an example action, the T-SN may determine resource for the time service of the wireless device based on at least one of: the SN Addition Request message, source of time, resource of T-SN, capability of the T-SN for time service, and/or subscription information of the wireless device. In an example action, the T-SN may determine to accept the SN Addition Request message. In an example action, the T-SN may determine to reject the SN Addition Request message.

[0404] In an example action, the T-SN may send a response (e.g., SN Addition Request Acknowledge) message to the T-MN. The SN Addition Request Acknowledge message may comprise at least one of: the parameter/ Network Provides traceability to UTC Indication, the supported time KPIs and/or the supported time service type. In an example, the SN Addition Request Acknowledge message may comprise a cause value indicting the addition of the T-SN is accepted/success.

[0405] In an example, the SN Addition Request Acknowledge message may comprise a cause value. In an example, the cause value may indicate the T-SN does not support the time service. In an example, the cause value may indicate the T-SN does not support traceability to UTC. In an example, the cause value may indicate the T-SN does not support requested time KPI. In an example, the cause value may indicate the T-SN does not support requested time service type.

[0406] In an example, SN Addition Request Acknowledge message may comprise a parameter indicating a full RRC configuration or a delta/part RRC configuration.

[0407] In an example, in response to the message received, the T-MN may take one or more actions. In an example action, the T-MN may determine that the target network (e.g., T-MN, T-SN) provides time resiliency service based on at least one of: the handover request message, the SN Addition Request Acknowledge message, sources of time, capability of the T-MN for time service, and/or subscription information of the wireless device. For example, the T-MN may determine target network (e.g., T-MN, T-SN) provides (UTC) time service based on at least one of: the first parameter/Request UTC time, the second parameter/T raceability Capability of UE, the third parameter/Network Provides traceability to UTC Indication, the fourth parameter/Requested Time KPI, the fifth parameter/Requested Time Service Type, sources of time (e.g., GPS), the parameter/ Network Provides traceability to UTC Indication, the supported time KPIs, the supported time service type, capability of the T-MN indicates that the T-SN supports (UTC) time service, and/or subscription information of the wireless device indicates that the UE has subscribed the time service from the operator, e.g., the UE is allowed to use one or more sources of UTC time.

[0408] In an example action, the T-MN may determine whether the target network (e.g., T-MN, T-SN) provides traceability to UTC or not based on at least one of: the handover request message, the SN Addition Request Acknowledge message, source of time, capability of the T-MN for time service, and/or subscription information of the wireless device. For example, the T-MN may determine that the T-MN provides traceability to UTC based on at least one of: the first parameter/Request UTC time, the second parameter/T raceability Capability of UE, the third parameter/Network Provides traceability to UTC Indication, the fourth parameter/Requested Time KPI, the fifth parameter/Requested Time Service Type, source of time (e.g., UTC(k)), the parameter/ Network Provides traceability to UTC Indication indicates the T-SN supports providing traceability to UTC, the supported time KPIs, the supported time service type, capability of the T-MN indicates that the T-MN supports providing traceability to UTC, and/or subscription information of the wireless device indicates network providing time service to the UE.

[0409] For example, the T-MN may determine the target network (e.g., T-MN, T-SN) does not provide traceability to UTC based on at least one of: the first parameter/Request UTC time, the second parameter/T raceability Capability of UE, the third parameter/Network Provides traceability to UTC Indication, source of time (e.g., UTC(k)), capability of the T-MN indicates that the T-MN does not support providing traceability to UTC, the parameter/ Network Provides traceability to UTC Indication indicates the T-SN does not support providing traceability to UTC, and/or subscription information of the wireless device indicates network providing time service to the UE.

[0410] In an example action, based on the T-MN determining whether the target network provides traceability to UTC or not, the T-MN may determine a parameter (e.g., Target Network Provides traceability to UTC Indication) indicating whether the target network provides traceability to UTC or not. For example, the parameter/ Target Network Provides traceability to UTC Indication may indicate the target network provides traceability to UTC. For example, the parameter/ Target Network Provides traceability to UTC Indication may indicate the target network does not provide traceability to UTC. In an example, the parameter/ Target Network Provides traceability to UTC Indication may be applicable to per wireless device basis. In an example, the parameter/ Target Network Provides traceability to UTC Indication may be applicable to per PDU session basis. In an example, the parameter/ Target Network Provides traceability to UTC Indication may be applicable to per bearer basis. In an example, the parameter/ Target Network Provides traceability to UTC Indication may be applicable to per base station basis. In an example, the parameter/ Target Network Provides traceability to UTC Indication may be applicable to per cell basis. In an example, the parameter/ Target Network Provides traceability to UTC Indication may be applicable to per Femtocells, picocells and/or microcells basis.

[0411] In an example action, the T-MN may determine (target) supported time KPIs and/or (target) supported time service type based on at least one of: the handover request message, the SN Addition Request Acknowledge message, source of time, resource of second base station, capability of the SN for time service, and/or subscription information of the wireless device.

[0412] In an example, the determining may be based on supported time KPIs to meet the requested time KPI. In an example, the determining may be based on supported time service type to meet the requested time service type.

[0413] In an example, the (target) supported time KPIs and/or (target) supported time service type may be applicable to per wireless device basis. In an example, the (target) supported time KPIs and/or (target) supported time service type may be applicable to per PDU session basis. In an example, the (target) supported time KPIs and/or (target) supported time service type may be applicable to per bearer basis. In an example, the (target) supported time KPIs and/or (target) supported time service type may be applicable to per base station basis. In an example, the (target) supported time KPIs and/or (target) supported time service type may be applicable to per cell basis. In an example, the (target) supported time KPIs and/or (target) supported time service type may be applicable to per Femtocells, picocells and/or microcells basis.

[0414] In an example, the (target) supported time KPIs may indicate the (target network) supported accuracy of time service for the wireless device. In an example, the (target) supported time KPIs may indicate the (target network) supported interval of time service for the wireless device. In an example, the (target) supported time KPIs may indicate the (target network) supported coverage area of time service for the wireless device. In an example, the (target) supported time service type may indicate the (target network) supported premium timing service. In an example, the (target) supported time service type may indicate the (target network) supported commercial timing service. In an example, the (target) supported time service type may indicate the (target network) supported regular timing service. In an example, the (target) supported time service type may indicate the (target network) supported dedicated timing service.

[0415] In an example, the T-MN may determine the (target) supported time KPIs and/or the (target) supported time service type based on at least one of: the first parameter/Request UTC time, the second parameter/T raceability Capability of UE, the third parameter/Network Provides traceability to UTC Indication, the fourth parameter/Requested Time KPI, the fifth parameter/Requested Time Service Type, the capability of the T-MN indicate the T-MN supports the Requested Time KPI and/or the Requested Time Service Type, the supported time KPIs and/or the supported time service type indicate the T-SN supports the Requested Time KPI and/or the Requested Time Service Type, and/or subscription information of the wireless device indicates network providing time service to the UE.

[0416] In an example action, the T-MN may determine resource for the time service of the wireless device based on at least one of: the handover request message, the SN Addition Request Acknowledge message, source of time, resource of T-MN, capability of the T-MN for time service, and/or subscription information of the wireless device.

[0417] In an example action, the T-MN may send a response message (e.g., handover request acknowledge) to the S-MN. The handover request acknowledge message may comprise at least one of: the parameter/ Target Network Provides traceability to UTC Indication, the (target) supported time KPIs and/or the (target) supported time service type.

[0418] In an example, the handover request acknowledge message may comprise a MN RRC reconfiguration message to be sent to the UE in order to perform the handover. In an example, the handover request acknowledge message may comprise a forwarding addresses to the S-MN. If PDU session split is performed in the target side during handover procedure, more than one data forwarding addresses corresponding to each node may be comprised in the handover request acknowledge message. In an example, the handover request acknowledge message may indicate that the UE context in the S-SN is kept if the T-MN and the S-SN decided to keep the UE context in the S-SN (e.g., the S-SN is kept and no T-SN is selected during the handover).

[0419] In response to the message received from the T-MN, the S-MN may take one or more actions. In an example action, the S-MN may send a SN Release Request message to the S-SN, the SN Release Request message may comprise a cause indicating MCG mobility. In an example, the S-SN may acknowledge the release request. In an example, the S-MN may indicate to the S-SN that the UE context in S-SN is kept, if it receives the indication from the T-MN. If the indication of the UE context kept in S-SN is included, the S-SN may keep the UE context.

[0420] In an example action, the S-MN may send Xn-U Address Indication message to the S-SN to transfer data forwarding information. More than one data forwarding addresses may be provided if the PDU session is split in the target side. In an example action, the S-MN may send the MN RRC reconfiguration message to the UE, wherein the MN RRC reconfiguration message may comprise the SN RRC configuration message.

[0421] In an example, the MN RRC reconfiguration message may comprise at least one of: the parameter/ Target Network Provides traceability to UTC Indication, the (target) supported time KPIs and/or the (target) supported time service type. In an example, the MN RRC reconfiguration message may indicate that the target network (e.g., T- MN, T-SN) providing time service to the UE.

[0422] In an example, in response to the message received, the UE may apply the new configuration. In an example, the UE may synchronize to the T-MN and may send a reply message (e.g., MN RRC reconfiguration complete) to the T-MN. In an example, if configured with bearers requiring SCG radio resources, the UE may synchronize to the T-SN. In an example, the T-MN may send a SN Reconfiguration Complete message to the T-SN indicating the RRC connection reconfiguration procedure was successful.

[0423] In an example, the T-MN may initiate the Path Switch procedure. In an example, if the T-MN comprises multiple DL TEIDs for one PDU session in the Path Switch Request message, multiple UL TEID of the UPF for the PDU session may be comprised in the Path Switch Ack message in case there is TEID update in UPF. In an example, the T-MN may initiate the UE Context Release procedure towards the S-MN.

[0424] Upon reception of the UE Context Release message from the S-MN, the S-SN may release control plane related resources associated to the UE context towards the S-MN. Any ongoing data forwarding may continue. The S-SN may not release the UE context associated with the T-MN if the UE contest kept indication was included in the SN Release Request message.

[0425] In an example, based on the parameter/ Network Provides traceability to UTC Indication, the supported time KPIs, the supported time service type, the parameter/ Target Network Provides traceability to UTC Indication, the (target) supported time KPIs and/or the (target) supported time service type, the target network (e.g., T-MN, T-SN) may provide UTC time information to the wireless device, the wireless device may send/forward the UTC time information to time application. In an example, based on the parameter/ Network Provides traceability to UTC Indication, the supported time KPIs, the supported time service type, the parameter/ Target Network Provides traceability to UTC Indication, the (target) supported time KPIs and/or the (target) supported time service type, the target network (e.g., T-MN, T-SN) may perform/implement/provide (time) traceability to UTC. In an example, based on the parameter/ Target Network Provides traceability to UTC Indication, the (target) supported time KPIs and/or the (target) supported time service type, the UE may perform/implement/provide (time) traceability to UTC.

[0426] In an example embodiment, a first base station may receive time service capability information of one or more base stations from a network function. In an example, the time service capability information may indicate whether the one or more base stations support time service or not. In an example, the first base station may receive a measurement report from a wireless device, wherein the measurement report may be associated with a second base station of the one or more base stations. In an example, based on the measurement report and the time service capability information of the second base station, the first base station may determine a handover to the second base station. In an example, the first base station may send a handover request message to the second base station.

[0427] In an example, the time service capability information may comprise at least one of: Traceability to UTC capability; Supported Time KPIs; and/or Supported Time Service Type. In an example, the time service capability information may indicate whether the one or more base stations provide time service to at least one wireless device or not. In an example, the time service may comprise time resiliency service. In an example, the time service may comprise UTC time service. In an example, the time service capability information may indicate Traceability to UTC capability of the one or more base stations. In an example, the Traceability to UTC capability may comprise at least one of: source of UTC time; distribution chain from the source of UTC time; UTC time monitoring; UTC time calibration; and/or documentation of the time traceability to UTC. In an example, the Traceability to UTC capability may indicate a received UTC time/timestamp is traceable from a receiver of the UTC time back to a source of the UTC time.

[0428] In an example, the Traceability to UTC capability of the one or more base stations may indicate whether the one or more base stations implements Traceability to UTC or not. In an example, the implementing the Traceability to UTC may comprise identifying and/or documenting a source of a UTC time. In an example, the implementing the Traceability to UTC may comprise identifying and/or documenting a distribution chain of a UTC time from a source of the UTC time to a receiver of the UTC time. In an example, the implementing the Traceability to UTC may comprise monitoring and/or documenting two or more sources of UTC time. In an example, the implementing the Traceability to UTC may comprise selecting a “correct” (more accurate) source of UTC time from the two or more sources. In an example, the implementing the Traceability to UTC may comprise calibrating and/or documenting UTC time. In an example, the implementing the Traceability to UTC may comprise adjusting a UTC time by offsetting the UTC time based on one or more of: a leap second; a residence time; and/or a transmission delay. In an example, the implementing the Traceability to UTC may comprise documenting the implementing of the Traceability to UTC. In an example, the documenting may comprise creating/generating/storing/(providing to a regulator) traceability documentation, wherein the traceability documentation may indicate one or more of: an identity of the wireless device; an identity of the implementer of the traceability to UTC; a source of a UTC time; a distribution chain of the UTC time; monitoring of the UTC time; selection of a correct/more accurate UTC time; calibration of the UTC time; and/or an indication of one or more time stamps of the UTC time to which the traceability documentation corresponds.

[0429] In an example, the time service capability information may indicate Supported Time key performance indicators (KPIs) of the one or more base stations. In an example, the Supported Time KPIs of the one or more base stations may comprise at least one of: a supported accuracy of time service; a supported interval of time service; and/or a supported coverage area of time service. In an example, the time service capability information may indicate Supported Time Service Type of the one or more base stations. In an example, the Supported Time Service Type of the one or more base stations may comprise at least one of: a supported premium timing service; a supported commercial timing service; a supported regular timing service; and/or a supported dedicated timing service.

[0430] In an example, the handover request message may comprise a first parameter indicating requesting (UTC) time service. In an example, the handover request message may comprise a second parameter indicating traceability capability of the wireless device. In an example, the handover request message may comprise a third parameter indicating whether source network provides traceability to UTC. In an example, the handover request message may comprise a fourth parameter indicating a requested time KPIs. In an example, the requested time KPIs may comprise at least one of: a requested accuracy of time service; a requested interval of time service; and/or a requested coverage area of time service. In an example, the handover request message may comprise a fifth parameter indicating a requested time service type. In an example, the requested time service type may comprise at least one of: a requested premium timing service; a requested commercial timing service; a requested regular timing service; and/or a requested dedicated timing service. In an example, the determining may be further based on the second base station support the time service. In an example, the determining may be further based on time service capability of the first base station is changed. In an example, the determining may be further based on resource of the first base station is changed.

[0431] In an example, the handover request message may comprise a QoS parameter, wherein the QoS parameter may comprise at least one of: a request UTC time; a traceability capability of UE; a network provides traceability to UTC Indication; a requested time KPIs; and/or a requested time service type. In an example, the second base station may determine to accept the handover request message. In an example, the second base station may determine to reject the handover request message. In an example, the second base station may send a handover reject message to the first base station. The handover reject message may comprise a cause value indicating the second base station does not support the time service.

[0432] In an example, the cause value may further indicate the second base station does not support traceability to UTC. In an example, the cause value may further indicate the second base station does not support the requested time KPIs. In an example, the cause value may further indicate the second base station does not support the requested time service type. In an example, the first base station may receive a handover acknowledgement message from the second base station. The handover acknowledgement message may comprise a network provides traceability to UTC indication indicating whether the second base station performs traceability to UTC. In an example, the handover acknowledgement message may comprise a supported time KPIs. In an example, the handover acknowledgement message may comprise a supported time service type. In an example, the first base station may send a RRC reconfiguration message to the wireless device. The RRC reconfiguration message may comprise at least one of: the network provides traceability to UTC indication; a supported time KPIs; and/or a supported time service type. In an example, the determining may be further based on a third base station has better signal but does not support the time service.

[0433] In an example, the time service may comprise a service that provides time information to the wireless device, wherein the time information may comprise at least one of: absolute time information; and/or relative time information. In an example, the time service may be provided by and/or via a communication network. In an example, the time service may determine and/or obtain time information from one or more time sources. In an example, the time service may be a coordinated universal time (UTC) service. In an example, the determining may be further based on supported time service of the first base station. In an example, the determining is further based on time service capability information of the second base station matches to the supported time service of the first base station. [0434] In an example embodiment, a first base station may receive time service capability information of one or more base stations from a network function, wherein the time service capability information may indicate whether the one or more base stations support time service for a wireless device or not. In an example, based on the time service capability information of a second base station of the one or more base stations, the first base station may determine a handover to the second base station. In an example, the first base station may send to the second base station, a handover request message for the wireless device. In an example, the first base station may receive from a wireless device, a measurement report associated with the second base station. In an example, based on the measurement report, the first base station may determine the handover to the second base station.

[0435] In an example embodiment, a first base station may send a first message to a network function. The first message may comprise a first time service capability information of the first base station, wherein the first time service capability information may indicate whether the first base station supports time service or not. In an example, the first base station may receive a second message from the network function. The second message may comprise a second time service capability information of at least one base station, wherein the second time service capability information may indicate whether the at least one base station support time service or not. In an example, the first message may comprise a parameter indicating requesting time service capability information of the at least one base station. In an example, the network function may comprise at least one of: the at least one base station; an access and mobility management function (AMF); an operations administration and maintenance (0AM); and/or a Unified Data Management (UDM). In an example, the first message may comprise a Xn Setup Request message. In an example, the first message may comprise a NG-RAN node Configuration Update message. In an example, the first message may comprise a Resource Status Request message. In an example, the first message may comprise a NG Setup Request message.

[0436] In an example embodiment, a first base station may send a first message to a network function. The first message may comprise a first time service capability information of the first base station, wherein the first time service capability information may indicate whether the first base station supports time service or not.

[0437] In an example embodiment, a first base station may receive a message from a network function. The message may comprise a second time service capability information of at least one base station, wherein the second time service capability information may indicate whether the at least one base station support time service or not. In an example embodiment, a first master node (MN) may receive time service capability information of at least one second MN from a network function, wherein the time service capability information may indicate whether the at least one second MN support time service or not. In an example, the first master MN may receive a measurement report from a wireless device. In an example, based on the time service capability information of the at least one second MN and/or the measurement report, the first master MN may determine a handover to a second MN of the at least one second MN. In an example, the first MN may send a handover request message to the second MN.