Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
CONDITIONAL ACCESS
Document Type and Number:
WIPO Patent Application WO/2024/078872
Kind Code:
A1
Abstract:
An apparatus comprising means for: receiving secondary radio link failure information, wherein the secondary radio link failure information is indicative of circumstances of a failure in a secondary radio link between a user equipment and at least one source secondary node while the user equipment was configured to conditionally access a target secondary node, and the user equipment is having dual connectivity with a source master node and a source secondary node; determining based, at least in part, on the received secondary radio link failure information at least one target primary cell of a secondary cell group, of the target secondary node, wherein the determined at least one target primary cell of a secondary cell group is to be included in information indicating at least one suggested target primary cell of a secondary cell group to be prepared by the target secondary node for conditional access by a user equipment; and transmitting information indicative of the determined at least one target primary cell of a secondary cell group, of the target secondary node.

Inventors:
AWADA AHMAD (DE)
BALAN IRINA-MIHAELA (DE)
ELMALI UGUR BARAN (DE)
DECARREAU GUILLAUME (DE)
WEGMANN BERNHARD (DE)
Application Number:
PCT/EP2023/076677
Publication Date:
April 18, 2024
Filing Date:
September 27, 2023
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
NOKIA TECHNOLOGIES OY (FI)
International Classes:
H04W76/15; H04W76/18; H04W76/19
Domestic Patent References:
WO2021162870A12021-08-19
Foreign References:
US20180278357A12018-09-27
Other References:
"3rd Generation Partnership Project; Technical Specification Group Radio Access Network; Evolved Universal Terrestrial Radio Access (E-UTRA) and Evolved Universal Terrestrial Radio Access Network (E-UTRAN); Overall description; Stage 2 (Release 17)", vol. RAN WG2, no. V17.2.0, 30 September 2022 (2022-09-30), pages 1 - 401, XP052211347, Retrieved from the Internet [retrieved on 20220930]
Attorney, Agent or Firm:
NOKIA EPO REPRESENTATIVES (FI)
Download PDF:
Claims:
CLAIMS

1. An apparatus comprising means for: receiving secondary radio link failure information, wherein the secondary radio link failure information is indicative of circumstances of a failure in a secondary radio link between a user equipment and at least one source secondary node while the user equipment was configured to conditionally access a target secondary node, and the user equipment is having dual connectivity with a source master node and a source secondary node; determining based, at least in part, on the received secondary radio link failure information at least one target primary cell of a secondary cell group, of the target secondary node, wherein the determined at least one target primary cell of a secondary cell group is to be included in information indicating at least one suggested target primary cell of a secondary cell group to be prepared by the target secondary node for conditional access by a user equipment; and transmitting information indicative of the determined at least one target primary cell of a secondary cell group, of the target secondary node.

2. An apparatus as claimed in claim 1 , wherein transmitting information comprises transmitting information to the source master node or the source secondary node.

3. An apparatus as claimed in claim 1 , wherein transmitting information comprises transmitting at least one SgNB Addition Request Acknowledge message.

4. An apparatus as claimed in any of claims 1 to 3, comprising means for: determining, based, at least in part, on the received secondary radio link failure information, a number of times that the determined at least one target primary cell of a secondary cell group was the correct choice for conditional access by a user equipment; and transmitting information indicative of the determined number of times that the determined at least one target primary cell of a secondary cell group was the correct choice for conditional access by a user equipment.

5. An apparatus as claimed in any of claims 1 to 4, wherein the information indicative of the determined at least one target primary cell of a secondary cell group comprises at least one cell identity.

6. An apparatus as claimed in any of claims 1 to 5, wherein the determined at least one target primary cell of a secondary cell group was excluded from the information indicating at least one suggested target primary cell of a secondary cell group to be prepared by the target secondary node for conditional access by a user equipment.

7. A method comprising: receiving secondary radio link failure information, wherein the secondary radio link failure information is indicative of circumstances of a failure in a secondary radio link between a user equipment and at least one source secondary node while the user equipment was configured to conditionally access a target secondary node, and the user equipment is having dual connectivity with a source master node and a source secondary node; determining based, at least in part, on the received secondary radio link failure information at least one target primary cell of a secondary cell group, of the target secondary node, wherein the determined at least one target primary cell of a secondary cell group is to be included in information indicating at least one suggested target primary cell of a secondary cell group to be prepared by the target secondary node for conditional access by a user equipment; and transmitting information indicative of the determined at least one target primary cell of a secondary cell group, of the target secondary node.

8. A method as claimed in claim 7, wherein transmitting information comprises transmitting information to the source master node or the source secondary node.

9. A method as claimed in claim 7, wherein transmitting information comprises transmitting at least one SgNB Addition Request Acknowledge message.

10. A method as claimed in any of claims 7 to 9, comprising: determining, based, at least in part, on the received secondary radio link failure information, a number of times that the determined at least one target primary cell of a secondary cell group was the correct choice for conditional access by a user equipment; and transmitting information indicative of the determined number of times that the determined at least one target primary cell of a secondary cell group was the correct choice for conditional access by a user equipment.

11. A method as claimed in any of claims 7 to 10, wherein the information indicative of the determined at least one target primary cell of a secondary cell group comprises at least one cell identity.

12. A method as claimed in any of claims 7 to 11 , wherein the determined at least one target primary cell of a secondary cell group was excluded from the information indicating at least one suggested target primary cell of a secondary cell group to be prepared by the target secondary node for conditional access by a user equipment.

13. A computer program comprising instructions for causing an apparatus to perform at least the following: receiving secondary radio link failure information, wherein the secondary radio link failure information is indicative of circumstances of a failure in a secondary radio link between a user equipment and at least one source secondary node while the user equipment was configured to conditionally access a target secondary node, and the user equipment is having dual connectivity with a source master node and a source secondary node; determining based, at least in part, on the received secondary radio link failure information at least one target primary cell of a secondary cell group, of the target secondary node, wherein the determined at least one target primary cell of a secondary cell group is to be included in information indicating at least one suggested target primary cell of a secondary cell group to be prepared by the target secondary node for conditional access by a user equipment; and transmitting information indicative of the determined at least one target primary cell of a secondary cell group, of the target secondary node.

14. A computer program as claimed in claim 13, wherein transmitting information comprises transmitting information to the source master node or the source secondary node.

15. A computer program as claimed in claim 13, wherein transmitting information comprises transmitting at least one SgNB Addition Request Acknowledge message.

16. A computer program as claimed in any of claims 13 to 15, comprising instructions for causing an apparatus to perform at least: determining, based, at least in part, on the received secondary radio link failure information, a number of times that the determined at least one target primary cell of a secondary cell group was the correct choice for conditional access by a user equipment; and transmitting information indicative of the determined number of times that the determined at least one target primary cell of a secondary cell group was the correct choice for conditional access by a user equipment.

17. A computer program as claimed in any of claims 13 to 16, wherein the information indicative of the determined at least one target primary cell of a secondary cell group comprises at least one cell identity.

18. A method as claimed in any of claims 13 to 17, wherein the determined at least one target primary cell of a secondary cell group was excluded from the information indicating at least one suggested target primary cell of a secondary cell group to be prepared by the target secondary node for conditional access by a user equipment.

19. An apparatus comprising means for: receiving information indicative of at least one target primary cell of a secondary cell group, of a target secondary node, wherein the at least one target primary cell of a secondary cell group is to be included in information indicating at least one suggested target primary cell of a secondary cell group to be prepared by the target secondary node for conditional access by a user equipment; and determining based, at least in part, on the received information, at least one suggested target primary cell of a secondary cell group to be prepared by the target secondary node for conditional access by a user equipment.

20. An apparatus as claimed in claim 19, wherein receiving information comprises receiving at least one SgNB Addition Request Acknowledge message.

21. An apparatus as claimed in claim 19 or 20, comprising means for: receiving information indicative of the determined number of times that the at least one target primary cell of a secondary cell group, of a target secondary node, was the correct choice for conditional access by a user equipment.

22. An apparatus as claimed in any of claims 19 to 21, wherein the information indicative of at least one target primary cell of a secondary cell group comprises at least one cell identity.

23. A method comprising: receiving information indicative of at least one target primary cell of a secondary cell group, of a target secondary node, wherein the at least one target primary cell of a secondary cell group is to be included in information indicating at least one suggested target primary cell of a secondary cell group to be prepared by the target secondary node for conditional access by a user equipment; and determining based, at least in part, on the received information, at least one suggested target primary cell of a secondary cell group to be prepared by the target secondary node for conditional access by a user equipment.

24. A method as claimed in claim 23, wherein receiving information comprises receiving at least one SgNB Addition Request Acknowledge message.

25. A method as claimed in claim 23 or 24, comprising: receiving information indicative of the determined number of times that the at least one target primary cell of a secondary cell group, of a target secondary node, was the correct choice for conditional access by a user equipment.

26. A method as claimed in any of claims 23 to 25, wherein the information indicative of at least one target primary cell of a secondary cell group comprises at least one cell identity.

27. A computer program comprising instructions for causing an apparatus to perform at least the following: receiving information indicative of at least one target primary cell of a secondary cell group, of a target secondary node, wherein the at least one target primary cell of a secondary cell group is to be included in information indicating at least one suggested target primary cell of a secondary cell group to be prepared by the target secondary node for conditional access by a user equipment; and determining based, at least in part, on the received information, at least one suggested target primary cell of a secondary cell group to be prepared by the target secondary node for conditional access by a user equipment.

28. A computer program as claimed in claim 27, wherein receiving information comprises receiving at least one SgNB Addition Request Acknowledge message.

29. A computer program as claimed in claim 27 or 28, comprising instructions for causing an apparatus to perform at least the following: receiving information indicative of the determined number of times that the at least one target primary cell of a secondary cell group, of a target secondary node, was the correct choice for conditional access by a user equipment. 30. A computer program as claimed in any of claims 27 to 29, wherein the information indicative of at least one target primary cell of a secondary cell group comprises at least one cell identity.

Description:
TITLE

CONDITIONAL ACCESS

TECHNOLOGICAL FIELD

Examples of the disclosure relate to conditional access. Some relate to conditional access of a target secondary node.

BACKGROUND

A wireless network comprises a plurality of network nodes including terminal nodes and access nodes. Communication between the terminal nodes and access nodes is wireless.

In some circumstances it may be desirable to improve or enhance conditional access, by a terminal node, of a target secondary node.

BRIEF SUMMARY

According to various, but not necessarily all, embodiments there is provided an apparatus comprising means for: receiving secondary radio link failure information, wherein the secondary radio link failure information is indicative of circumstances of a failure in a secondary radio link between a user equipment and at least one source secondary node while the user equipment was configured to conditionally access a target secondary node, and the user equipment is having dual connectivity with a source master node and a source secondary node; determining based, at least in part, on the received secondary radio link failure information at least one target primary cell of a secondary cell group, of the target secondary node, wherein the determined at least one target primary cell of a secondary cell group is to be included in information indicating at least one suggested target primary cell of a secondary cell group to be prepared by the target secondary node for conditional access by a user equipment; and transmitting information indicative of the determined at least one target primary cell of a secondary cell group, of the target secondary node. In some examples, transmitting information comprises transmitting information to the source master node or the source secondary node.

In some examples, transmitting information comprises transmitting at least one SgNB Addition Request Acknowledge message.

In some examples, the apparatus comprises means for: determining, based, at least in part, on the received secondary radio link failure information, a number of times that the determined at least one target primary cell of a secondary cell group was the correct choice for conditional access by a user equipment; and transmitting information indicative of the determined number of times that the determined at least one target primary cell of a secondary cell group was the correct choice for conditional access by a user equipment.

In some examples, the information indicative of the determined at least one target primary cell of a secondary cell group comprises at least one cell identity.

In some examples, the determined at least one target primary cell of a secondary cell group was excluded from the information indicating at least one suggested target primary cell of a secondary cell group to be prepared by the target secondary node for conditional access by a user equipment.

According to various, but not necessarily all, embodiments there is provided a method comprising: receiving secondary radio link failure information, wherein the secondary radio link failure information is indicative of circumstances of a failure in a secondary radio link between a user equipment and at least one source secondary node while the user equipment was configured to conditionally access a target secondary node, and the user equipment is having dual connectivity with a source master node and a source secondary node; determining based, at least in part, on the received secondary radio link failure information at least one target primary cell of a secondary cell group, of the target secondary node, wherein the determined at least one target primary cell of a secondary cell group is to be included in information indicating at least one suggested target primary cell of a secondary cell group to be prepared by the target secondary node for conditional access by a user equipment; and transmitting information indicative of the determined at least one target primary cell of a secondary cell group, of the target secondary node.

In some examples, transmitting information comprises transmitting information to the source master node or the source secondary node.

In some examples, transmitting information comprises transmitting at least one SgNB Addition Request Acknowledge message.

In some examples, the method comprises: determining, based, at least in part, on the received secondary radio link failure information, a number of times that the determined at least one target primary cell of a secondary cell group was the correct choice for conditional access by a user equipment; and transmitting information indicative of the determined number of times that the determined at least one target primary cell of a secondary cell group was the correct choice for conditional access by a user equipment.

In some examples, the information indicative of the determined at least one target primary cell of a secondary cell group comprises at least one cell identity.

In some examples, the determined at least one target primary cell of a secondary cell group was excluded from the information indicating at least one suggested target primary cell of a secondary cell group to be prepared by the target secondary node for conditional access by a user equipment.

According to various, but not necessarily all, embodiments there is provided a computer program comprising instructions for causing an apparatus to perform at least the following: receiving secondary radio link failure information, wherein the secondary radio link failure information is indicative of circumstances of a failure in a secondary radio link between a user equipment and at least one source secondary node while the user equipment was configured to conditionally access a target secondary node, and the user equipment is having dual connectivity with a source master node and a source secondary node; determining based, at least in part, on the received secondary radio link failure information at least one target primary cell of a secondary cell group, of the target secondary node, wherein the determined at least one target primary cell of a secondary cell group is to be included in information indicating at least one suggested target primary cell of a secondary cell group to be prepared by the target secondary node for conditional access by a user equipment; and transmitting information indicative of the determined at least one target primary cell of a secondary cell group, of the target secondary node.

In some examples, transmitting information comprises transmitting information to the source master node or the source secondary node.

In some examples, transmitting information comprises transmitting at least one SgNB Addition Request Acknowledge message.

In some examples, the computer program comprises instructions for causing an apparatus to perform at least: determining, based, at least in part, on the received secondary radio link failure information, a number of times that the determined at least one target primary cell of a secondary cell group was the correct choice for conditional access by a user equipment; and transmitting information indicative of the determined number of times that the determined at least one target primary cell of a secondary cell group was the correct choice for conditional access by a user equipment.

In some examples, the information indicative of the determined at least one target primary cell of a secondary cell group comprises at least one cell identity.

In some examples, the determined at least one target primary cell of a secondary cell group was excluded from the information indicating at least one suggested target primary cell of a secondary cell group to be prepared by the target secondary node for conditional access by a user equipment.

According to various, but not necessarily, all embodiments there is provided an apparatus comprising means for: receiving information indicative of at least one target primary cell of a secondary cell group, of a target secondary node, wherein the at least one target primary cell of a secondary cell group is to be included in information indicating at least one suggested target primary cell of a secondary cell group to be prepared by the target secondary node for conditional access by a user equipment; and determining based, at least in part, on the received information, at least one suggested target primary cell of a secondary cell group to be prepared by the target secondary node for conditional access by a user equipment.

In some examples, receiving information comprises receiving at least one SgNB Addition Request Acknowledge message.

In some examples, the apparatus comprises means for: receiving information indicative of the determined number of times that the at least one target primary cell of a secondary cell group, of a target secondary node, was the correct choice for conditional access by a user equipment.

In some examples, the information indicative of at least one target primary cell of a secondary cell group comprises at least one cell identity.

According to various, but not necessarily all, embodiments there is provided a method comprising: receiving information indicative of at least one target primary cell of a secondary cell group, of a target secondary node, wherein the at least one target primary cell of a secondary cell group is to be included in information indicating at least one suggested target primary cell of a secondary cell group to be prepared by the target secondary node for conditional access by a user equipment; and determining based, at least in part, on the received information, at least one suggested target primary cell of a secondary cell group to be prepared by the target secondary node for conditional access by a user equipment.

In some examples, receiving information comprises receiving at least one SgNB Addition Request Acknowledge message.

In some examples, the method comprises: receiving information indicative of the determined number of times that the at least one target primary cell of a secondary cell group, of a target secondary node, was the correct choice for conditional access by a user equipment.

In some examples, the information indicative of at least one target primary cell of a secondary cell group comprises at least one cell identity. According to various, but not necessarily all, embodiments there is provided a computer program comprising instructions for causing an apparatus to perform at least the following: receiving information indicative of at least one target primary cell of a secondary cell group, of a target secondary node, wherein the at least one target primary cell of a secondary cell group is to be included in information indicating at least one suggested target primary cell of a secondary cell group to be prepared by the target secondary node for conditional access by a user equipment; and determining based, at least in part, on the received information, at least one suggested target primary cell of a secondary cell group to be prepared by the target secondary node for conditional access by a user equipment.

In some examples, receiving information comprises receiving at least one SgNB Addition Request Acknowledge message.

In some examples, the computer program comprises instructions for causing an apparatus to perform at least the following: receiving information indicative of the determined number of times that the at least one target primary cell of a secondary cell group, of a target secondary node, was the correct choice for conditional access by a user equipment.

In some examples, the information indicative of at least one target primary cell of a secondary cell group comprises at least one cell identity.

According to various, but not necessarily all, embodiments there is provided an apparatus comprising; at least one processor; and at least one memory storing instructions that, when executed by the at least one processor, cause an apparatus at least to perform at least a part of one or more methods disclosed herein.

According to various, but not necessarily all, embodiments there is provided an apparatus comprising means for performing at least part of one or more methods disclosed herein.

According to various examples, but not necessarily all examples, there is provided examples as claimed in the appended claims. While the above examples of the disclosure and optional features are described separately, it is to be understood that their provision in all possible combinations and permutations is contained within the disclosure. It is to be understood that various examples of the disclosure can comprise any or all of the features described in respect of other examples of the disclosure, and vice versa. Also, it is to be appreciated that any one or more or all of the features, in any combination, may be implemented by/comprised in/performable by an apparatus, a method, and/or computer program instructions as desired, and as appropriate.

The description of a function should additionally be considered to also disclose any means suitable for performing that function.

BRIEF DESCRIPTION

Some examples will now be described with reference to the accompanying drawings in which: FIG. 1 shows an example of the subject matter described herein;

FIG. 2 shows another example of the subject matter described herein;

FIG. 3A shows another example of the subject matter described herein;

FIG. 3B shows another example of the subject matter described herein;

FIG. 4 shows another example of the subject matter described herein;

FIG. 5 shows another example of the subject matter described herein;

FIG. 6A shows another example of the subject matter described herein;

FIG. 6B shows another example of the subject matter described herein;

FIG. 7A shows another example of the subject matter described herein; and FIG. 7B shows another example of the subject matter described herein.

The figures are not necessarily to scale. Certain features and views of the figures can be shown schematically or exaggerated in scale in the interest of clarity and conciseness. For example, the dimensions of some elements in the figures can be exaggerated relative to other elements to aid explication. Similar reference numerals are used in the figures to designate similar features. For clarity, all reference numerals are not necessarily displayed in all figures. DEFINITIONS

Master Node : Network node that provides control plane connectivity towards the core network.

: Group of cells associated with the MN, includes PCell and etwork node that is providing additional radio resources for the UE but is not the MN. Group of cells associated with the SN, includes PSCell and

SCell(s).

PCell The cell for uplink/downlink connection to MN. Cell of MCG used to initiate initial access to the MN.

PSCell the cell for uplink/downlink connection to SN Cell of SCG used to initiate initial access to the SN.

Conditional Handover - a handover procedure that is triggered by the UE only when the configured execution condition(s) are met for a prepared candidate cell. Condition(s) are pre-configured by network. In 3GPP, a conditional handover execution condition is specified by condExecutionCond within the CondReconfigToAddModList information element within the ConditionalReconfiguration information element within an RRCReconfiguration message.

Dual

UE has contemporaneous connection to an MN and an SN. This is a mode of operation of a UE in RRC_CONNECTED, configured with a Master Cell Group and a Secondary Cell Group. Information:

Information used to configure operation of a UE. In 3GPP, the configuration information can, for example, be provided in an RRCReconfiguration message.

The term “configuration information comprising” an entity (for example handover execution condition for a primary cell; SN addition condition for dual connectivity with the primary cell and so on) can mean that the configuration information comprises information sufficient to obtain the entity. It may or may not comprise all parameters of the entity, it may instead comprise pointer to the entity or parameters of the entity or can mean that configuration includes the entity.

In 3GPP, a RRCReconfiguration message specifies a ConditionalReconfiguration information element which provides addition conditions for the DC. The ConditionalReconfiguration information element comprises a CondReconfigToAddModList information element. The CondReconfigToAddModList information element comprises condExecutionCond and condRRCReconfig. Addition condition(s) for a primary secondary cell (PSCell) are specified by condExecutionCond. The RRCReconfiguration message to be applied when the specified conditions are met is provided by condRRCReconfig.

Measurement configuration

Configuration information used to configure a UE to perform measurement(s). In 3GPP, the measurement configuration can, for example, be provided in an RRCReconfiguration message. The term “[entity] measurement configuration” (for example source primary cell measurement configuration) can mean a measurement configuration prepared by the entity.

Can comprise one or more measurement objects and one or more reporting configurations associated by one or more measurement identities.

Can comprise a MeasConfig information element as defined in TS 38.331.

DETAILED DESCRIPTION

FIG 1 illustrates an example of a network 100 comprising a plurality of network nodes including terminal nodes 110, access nodes 120 and one or more core nodes 129. The terminal nodes 110 and access nodes 120 communicate with each other. The one or more core nodes 129 communicate with the access nodes 120.

The network 100 is in this example a radio telecommunications network, in which at least some of the terminal nodes 110 and access nodes 120 communicate with each other using transmission/reception of radio waves/signals. The one or more core nodes 129 may, in some examples, communicate with each other. The one or more access nodes 120 may, in some examples, communicate with each other.

The network 100 may be a cellular network comprising a plurality of cells 122 each served by an access node 120. In this example, the interface between the terminal nodes 110 and an access node 120 defining a cell 122 is a wireless interface 124.

The access node 120 is a cellular radio transceiver. The terminal nodes 110 are cellular radio transceivers.

In the example illustrated the cellular network 100 is a third generation Partnership Project (3GPP) network in which the terminal nodes 110 are user equipment (UE) and the access nodes 120 are base stations.

In examples the network 100 is an Evolved Universal Terrestrial Radio Access network (E- UTRAN). The E-UTRAN consists of E-UTRAN NodeBs (eNBs) 120, providing the E-UTRA user plane and control plane (RRC) protocol terminations towards the UE 110. The eNBs 120 are interconnected with each other by means of an X2 interface 126. The eNBs are also connected by means of the S1 interface 128 to the Mobility Management Entity (MME) 129.

In other examples the network 100 is a Next Generation (or New Radio, NR) Radio Access network (NG-RAN). The NG-RAN consists of gNodeBs (gNBs) 120, providing the user plane and control plane (RRC) protocol terminations towards the UE 110. The gNBs 120 are interconnected with each other by means of an Xn interface 126. The gNBs are also connected by means of the N2 interface 128 to the Access and Mobility management Function (AMF).

In examples, the network 100 can comprise a combination of E-UTRAN and NG-RAN.

A user equipment can comprise a mobile equipment. Where reference is made to user equipment that reference includes and encompasses, wherever possible, a reference to mobile equipment.

A UE 168 can perform a handover procedure to change the serving cell of the UE 168. In examples, a handover procedure can be a conditional handover procedure. A conditional handover (CHO) procedure can be considered a handover that is triggered by the UE 168 when one or more handover execution conditions are met. The handover execution condition or conditions can be pre-configured by the network 100.

In examples, a UE 168 can be provided with additional radio resources using dual connectivity (DC).

In DC, the configured set of serving cells for a UE 168 has two subsets: the Master Cell Group (MCG) containing the serving cells of a Master Node (MN) 172, and the Secondary Cell Group (SCG) containing the serving cells of a Secondary Node (SN) 170.

In examples, a change of primary cell of a secondary cell group (PSCell) can be configured. A UE 168 can be configured with execution condition(s) for performing an SN change to one or more target SN 166. Accordingly, a UE 168 can be configured to conditionally access one or more target SN 166.

In examples, an initiating node, for example a source MN 172 or source SN 170, can be configured to effectively and/or intelligently determine at least one target PSCell to be included in information indicating at least one suggested target PSCell to be prepared by a target SN 166 for conditional access by a UE 168.

FIG. 2 illustrates an example of a method 200.

In examples, FIG. 2 can be considered to illustrate a plurality of methods. For example, FIG. 2 illustrates one or more actions at a plurality of actors/entities. In examples, FIG. 2 can be considered to illustrate a plurality of methods performed by the individual actors/entities.

One or more of the features discussed in relation to FIG. 2 can be found in one or more of the other FIGs.

In the example of FIG. 2, a plurality of apparatuses transmit and/or receive one or more signals and/or one or more messages across and/or via and/or using a network. In examples, any suitable form of communication in any suitable network can be used. For example, at least a portion of the network 100 of FIG. 1 can be used. Accordingly, in examples, the plurality of apparatuses in FIG. 2 form at least a portion of a network 100 as described in relation to FIG. 1.

In the illustrated example, a terminal node 110, and three access nodes 120 transmit and/or receive one or more signals and/or one or more messages. In the example of FIG. 2 the terminal node 110 is a UE 168 and the three access nodes 120 are a source MN 172, a Source SN 170, and a target SN 166.

In the example of FIG. 2, the UE 168 has dual connectivity with the source MN 172 and source SN 170.

In examples, communications and/or transmissions between elements illustrated in FIG. 2 can proceed via any number of intervening elements, including no intervening elements.

Although one UE 168 is illustrated in the example of FIG. 2, in examples any suitable number of UEs 168 can be included.

Similarly, in examples, any suitable number of network nodes can be included.

In examples, method 200 and/or at least part of method 200 can be considered a method of enhancing conditional access of a target SN.

In examples, method 200 and/or at least part of method 200 can be considered a method of enhancing selection of at least one target PSCell for conditional access by a UE.

In examples, method 200 and/or at least part of method 200 can be considered a method of providing information to an initiating network node, for example a source MN 172 or source SN 170, to assist in determination of at least one target PSCell to be included in information indicating at least one suggested target PSCell to be prepared by a target SN 166 for conditional access by a UE 168.

In the illustrated example, the location of the blocks indicates the entity performing the action(s). For example, block 202 is performed at/by the target SN 166.

In examples, method 200 is part of a method to configure, and/or allow, and/or enable a UE 168 to conditionally access at least one target SN 166. In some examples, method 200 is part of a conditional PSCell addition and Change (CPAC) method/process/procedure. For example, method 200 can be part of a conditional PSCell Change (CPC) method/process/procedure or a conditional PSCell Addition (CPA) method/process.

In some examples, method 200 can be considered to be SN initiated. That is, in some examples, method 200 can be initiated by a source SN 170. For example, method 200 can be part of an SN initiated CPAC method/process/procedure.

In the illustrated example, method 200 is SN initiated and blocks 202, and 206 involve the target SN 166, and block 208 is performed at/by the source SN 170.

In some examples, method 200 can be considered to be MN initiated. That is, in some examples, method 200 can be initiated by a source MN 172. For example, method 200 can be part of an MN initiated CPAC method/process/procedure.

In such MN initiated examples, blocks 202, and 206 involve the target SN 166, and block 208 is performed at/by the source MN 172.

At block 202, method 200 comprises receiving secondary link failure (S-RLF) information 164, wherein the S-RLF information is indicative of circumstances of a failure in a secondary radio link between a UE 168 and at least one source SN 170 while the UE 168 was configured to conditionally access a target SN 166, and the UE 168 is having dual connectivity with a source MN 172 and a source SN 170.

In some examples, method 200 comprises receiving secondary link failure (S-RLF) information 164 associated with a target secondary node 166, wherein the S-RLF information is indicative of circumstances of a failure in a secondary radio link between a UE 168 and at least one source SN 170 while the UE 168 was configured to conditionally access the target SN 166, and the UE 168 is having dual connectivity with a source MN 172 and a source SN 170.

As FIG. 2 illustrates one or more actions of receiving, for example, of one or more signals, FIG. 2 also illustrates the corresponding transmitting/causing transmission feature(s)/action(s).

Similarly, for any transmitting/causing transmission feature(s)/action(s), FIG. 2 also illustrates the corresponding receiving/causing receiving feature(s)/action(s). For example, from the point of view of the UE 168, block 202 can be considered to illustrate transmitting S-RLF information 164.

In some examples, S-RLF information 164 can be considered secondary cell group (SCG) failure information.

Receiving S-RLF failure information 164 can be performed in any suitable way, using any suitable method. In examples, receiving S-RLF information 164 comprises receiving one or more signals and/or messages.

In examples, the S-RLF information 164 can be received from any suitable number of different UEs 168. Accordingly, in examples, the S-RLF information 164 is indicative of circumstances of failures in a secondary radio link experienced by a plurality of different UEs.

In some examples, at block 202, method 200 comprises receiving secondary link failure (S- RLF) information 164, wherein the S-RLF information is indicative of circumstances of a failure in a secondary radio link between a plurality of UEs 168 and at least one source SN 170 while the UEs 168 were configured to conditionally access a target SN 166, and the UEs 168 having dual connectivity with a source MN 172 and a source SN 170.

The S-RLF information 164 can be received, and/or collected, over any suitable time period. For example, the S-RLF information 164 can be received from a plurality of UEs 168 over a time period long enough to allow sufficient S-RLF information 164 to be received to allow method 200 to be performed. For example, the S-RLF information 164 can be received over a time period long enough to allow sufficient S-RLF information 164 to be received to allow at least one target PScell to be determined at block 204.

In examples, the time period can be 2 to 3 hours, half a day, a day, 2 to 3 days, a week, 2 to 3 weeks, a month and so on.

In examples, the S-RLF information 164 can be received over a Key Performance Indicator (KPI) collection period.

S-RLF information 164 can comprise any suitable information. For example, S-RLF information 164 can comprise any suitable information indicative of circumstances of a failure in a secondary radio link between a UE 168 and at least one source SN 170 while the UE 168 was configured to conditionally access at least one target SN 166, and the UE 168 having dual connectivity with a source MN 172 and a source SN 170.

For example, S-RLF information 164 can comprise any suitable information to allow at least one target PSCell to be determined at block 204.

In examples, S-RLF information 164 comprises SCG failure report information transmitted by a UE 168 when the UE 168 detects a radio link failure for the connection with the PSCell of a source SN 170.

S-RLF information 164 can comprise failure type (for example due to downlink or uplink radio problem), and/or location information of the UE 168, and/or received signal power information, and/or time information, and/or information regarding configuration of the UE 168 and so on.

In the example of FIG. 2, method 200 is SN initiated and the S-RLF information 164 is transmitted from the UE 168 to the source MN 172, forwarded by the source MN 172 to the source SN 170, and forwarded by the source SN 170 to the target SN 166.

However, in MN initiated examples, the S-RLF information 164 can be transmitted from the UE 168 to the source MN 172, and forwarded from the source MN 172 to the target SN 166 without forwarding of the S-RLF information 164 to the source SN 170.

Accordingly, in examples, the S-RLF information 164 is transmitted from the UE 168 to the source MN 172 and forwarded by the source MN 172 to the target SN 166.

In examples, the S-RLF information 164 is associated with a target SN 166 and is indicative of circumstances of a failure in a secondary radio link between a UE 168 and at least one source secondary node 170 while the UE 168 was configured to conditionally access the target SN 166.

S-RLF information 164 can be considered to be associated with a target SN 166 because the S-RLF information 164 resulted from a secondary radio link failure occurring while a UE 168 was configured to conditionally access the target SN 166.

Circumstances of a failure in a secondary radio link can be considered conditions of a failure in a secondary radio link. Circumstances of a failure in a secondary radio link can be considered to be a setting, and/or situation of a failure in a secondary radio link.

Circumstances of a failure in a secondary radio link can be considered physical circumstances, and/or radio circumstances that the UE 168 experienced for a period of time prior to the S- RLF.

Any suitable period of time can be used. For example, any suitable period of time that adequately covers the circumstances of an S-RLF can be used.

For example, a period of time in the range 5 seconds to 30 minutes can be used.

For example, a period of time in the range 30 seconds to 20 minutes can be used.

For example, a period of time in the range 1 minute to 15 minutes can be used.

For example, a period of time in the range 5 minutes to 10 minutes can be used.

In examples, the period of time can be at least M seconds, wherein M is a positive integer.

In examples, the period of time can be at least X minutes, wherein X is a positive integer.

By way of example, reference is made to the example of FIG. 3A.

FIG. 3A illustrates an example scenario. In the example of FIG. 3 a UE 168 is located within and is being served by a source PSCell 188.

In the illustrated example, the UE 168 moves along the trajectory 196 and as the UE 168 moves along the trajectory 196 the UE detects two PSCells, PSCell 1 190 and PSCell2 192.

FIG. 3B illustrates a plot of reference signal received power (RSRP) for the source PSCell 188, PSCell 1 190, and PSCell2 192 as the UE 168 moves along the trajectory 196 shown in the example of FIG. 3A. With regard to the plot shown in the example of FIG. 3B, at time t1 PSCelU 190 reaches a measurable signal strength that fulfills the RSRP offset 194 configured at the UE 168 and triggers a preparation of PSCelU 190 as candidate cell for conditional access by the UE 168, such as CPC.

At time t2 PSCell2 192 also fulfils the RSRP offset 194 preparation criterion configured at the UE 168 and a measurement event report is sent from the UE 168 to the source PSCell 188, which in turn triggers, for example, a SgNB (Conditional) Change Required message to MN and, for example, a SgNB (Conditional) Addition Request message from MN to target SN including measurement results of the target PSCelU 190 and PSCell2 192.

In the illustrated example, the target SN may decide on the preparation of target PSCelU 190, as target PSCelU 190 has the best received measurement.

However, later on in the example of FIG. 3B, at time instance t3, the UE 168 experiences a secondary radio link failure on the currently serving PSCell and sends S-RLF Failure Information to MN.

In the illustrated example, the target SN misses the preparation of target PSCell2 192 which results in an S-RLF in the source PSCell 188, because the conditional access execution criterion for the prepared PSCelU 190 was not reached.

FIG. 3A and FIG. 3B can be considered to illustrate the circumstances of the S-RLF experienced by the UE 168. In the example of FIG. 3 the S-RLF information 164 comprises information indicative of the circumstances, for example the UE trajectory 196, and/or RSRP measurements, and/or timing, and/or UE configuration and so on.

In the example of FIG. 3A and 3B, the information included in the S-RLF information 164 may show that target PSCell2 192 should have been prepared in this case (as it has the best measurements when the S-RLF occurred).

However, in this example, the target SN 166 decided about the cell(s) to be prepared as candidates for conditional access by a UE 196, for example candidates for CPAC, based on the information available at the time. Furthermore, the number of cells that can be prepared may be limited. In addition, in examples, the target SN 166 cannot prepare a PSCell that is not included in information indicating at least one suggested target PSCell, provided by an initiating node. For example, in the example of FIG. 3A, if the plurality of suggested target PSCells did not include target PSCell2 192, the target SN 166 could not prepare target PSCell 192 for conditional access by a UE 168.

Returning to the example of FIG. 2, in examples, the S-RLF information 164 is indicative of circumstances of a failure in a secondary radio link between a UE 168 and at least one source secondary node 170 while the UE 168 was configured to conditionally access the target SN 166.

The UE 168 can be configured to conditionally access the target SN 166 in any suitable way, using any suitable method. For example, the UE 168 can receive any suitable configuration information to configure the UE 168 to access the target SN 166 upon fulfillment of at least one criterion.

In examples, the UE 168 is configured with at least one CPAC configuration. For example, the UE 168 can be configured with at least one CPC or CPA configuration.

In examples, accessing a PSCell, or any other suitable cell, comprises performing a random access procedure with the cell.

In examples, accessing a PSCell, or any other suitable cell, comprises establishing a connection with the cell.

In examples, the target SN 166 can determine statistics based, at least in part, on the received S-RLF information 164. For example, the target SN 166 can determine statistics based on a significant amount of wrong target PSCell preparations observed via S-RLF information 164, see, for example, FIGs 3A and 3B.

In examples, this can be done until statistical convergence is achieved.

At block 204, method 200 comprises determining, based, at least in part, on the received S- RLF information 164 at least one target PSCell 220, of the target SN 166, wherein the determined at least one target PSCell 220 is to be included in information indicating at least one suggested target PSCell 174 to be prepared by the target SN 166 for conditional access by a UE 168.

In some examples, at block 204, method 200 comprises determining, based, at least in part, on the received S-RLF information 164 at least one target PSCell 220, of the target SN 166, wherein the determined at least one target PSCell 220 is to be considered for inclusion in information indicating at least one suggested target PSCell 174 to be prepared by the target SN 166 for conditional access by a UE 168.

In examples, the determined at least one target PSCell 220 is to be included in information indicating at least one suggested target PSCell 174 to possibly be prepared by the target SN 166 for conditional access by a UE 168.

Block 204 can be performed in any suitable way using any suitable method. In examples, received S-RLF information 164 can be used in any suitable way to determine at least one target PSCell 220, of the target SN 166, wherein the determined at least one target PSCell 220 is to be included in information indicating at least one suggested target PSCell 174 to be prepared by the target SN 166 for conditional access by a UE 168.

For example, S-RLF information 164 can be processed and/or analyzed in any suitable way to allow at least one target PSCell 220, of the target SN 166 to be determined, wherein the determined at least one target PSCell 220 is to be included in information indicating at least one suggested target PSCell 174 to be prepared by the target SN 166 for conditional access by a UE 168. For example, statistics determined from the S-RLF information 164 can be used in determining the at least one target PSCell 220.

Accordingly, in examples, determining, based at least in part on the received S-RLF information 164, at least one target PSCell 220 at block 204 comprises determining, based at least in part on analysis of and/or statistics determined from the received S-RLF information 164, at least one target PSCell 220 at block 204.

In examples, the target SN 166 cannot prepare a target PSCell for conditional access by a UE 168 if the target PSCell is not indicated in information indicating at least one suggested target PSCell 174 to be prepared by the target SN 166 for conditional access by a UE 168. Accordingly, in examples, at block 204 the target SN 166 determines at least one target PSCell 220 that is to be included in information indicating at least one suggested target PSCell 174 to be prepared by the target SN 166 for conditional access by a UE 168, to ensure that the determined at least one target PSCell 220 is available to the target SN 166 to be prepared by the target SN 166 for conditional access by a UE 168.

In examples, determining at least one target PSCell 220 at block 204 comprises determining at least one target PSCell 220 that, based at least in part on the received S-RLF information 164, is a good and/or relevant choice for preparation by the target SN 166 for conditional access by a UE 168.

In some examples, determining at least one target PSCell 220 at block 204 comprises determining at least one target PSCell 220 that, if that at least one target PSCell 220 had been included in information indicating at least one suggested target PSCell 174 to be prepared by the target SN 166 for conditional access by a UE 168, would have prevented an S-RLF occurring.

For example, with regard to the example of FIG. 3, the target SN 166 can determine that target PSCell 192 is to be included in information indicating at least one suggested target PSCell to be prepared by the target SN 166 for conditional access by a UE 168, so the target PSCell 192 is available to the target SN 166 to be prepared by the target SN 166 for conditional access by a UE 168.

In some examples, determining at least one target PSCell 220 at block 204 comprises using a mobility robustness optimization algorithm, and/or artificial intelligence, and/or machine learning technique(s).

Information indicating at least one suggested target PSCell to be prepared by the target SN 166 for conditional access by a UE 168 can comprise any suitable information. In examples, the information indicating at least on suggested target PSCell comprises at least one cell identity, for example at least one physical cell identity (PCI), and/or at least one global cell identity and so on.

In some examples, method 200 comprises, determining, based, at least in part, on the received S-RLF information 164, a number of times that the determined at least one target PSCell 220 was the correct choice for conditional access by a UE 168. This can be performed by any suitable network node, for example, this can be performed by the target SN 166.

Determining, based, at least in part, on the received S-RLF information 164, a number of times that the determined at least one target PSCell 220 was the correct choice for conditional access by a UE 168 can be performed in any suitable way using any suitable method.

In examples, a target PSCell can be considered a correct choice for conditional access by a UE 168 if, under the circumstances of an S-RLF, conditional access of the target PSCell by a UE 168 would have prevented the S-RLF.

Accordingly, in examples, determining, based, at least in part, on the received S-RLF information 164, a number of times that the determined at least one target PSCell 220 was the correct choice for conditional access by a UE 168 can comprise determining, based, at least in part, on the received S-RLF information 164, a number of times that, under the circumstances of an S-RLF, conditional access of the target PSCell by a UE 168 would have prevented the S-RLF.

For example, in the example of FIG. 3A, PSCell2 192 can be considered the correct choice for conditional access by a UE 168 because, under the circumstances of the S-RLF failure in the example of FIG. 3A, the S-RLF would have been prevented if the UE 168 was configured to conditionally access PSCell2 192.

In some examples, the determined at least one PSCell 220 was excluded from the information indicating at least one suggested target PSCell 174 to be prepared by the target SN 166 for conditional access by a UE 168.

That is, in examples, a target SN 166 can receive from a source SN 170, or a source MN 172, information indicating at least one suggested target PSCell 174 to be prepared by the target SN 166 for conditional access by a UE 168 and can determine that the determined at least one PSCell 220 was not included in the received information and therefore cannot be prepared for conditional access by a UE 168.

In some examples, block 204 comprises determining if the at least one determined target PSCell 220 is excluded from information indicating at least one suggested target PSCell to be prepared by the target SN 166 for conditional access by a UE 168. For example, in the example of FIG. 3A, the target SN 166 can determine if target PSCell2 192 is missing from information indicating at least one suggested target PSCell to be prepared by the target SN 166 for conditional access by a UE 168.

At block 206, method 200 comprises transmitting information 222 indicative of the determined at least one PSCell 220, of the target SN 166.

Consequently, FIG. 2 illustrates a method 200 comprising: receiving secondary radio link failure information 164, wherein the secondary radio link failure information 164 is indicative of circumstances of a failure in a secondary radio link between a user equipment 168 and at least one source secondary node 170 while the user equipment 168 was configured to conditionally access a target secondary node 166, and the user equipment 168 is having dual connectivity with a source master node 172 and a source secondary node 170; determining based, at least in part, on the received secondary radio link failure information 164 at least one target primary cell of a secondary cell group 220, of the target secondary node 166, wherein the determined at least one target primary cell of a secondary cell group 220 is to be included in information indicating at least one suggested target primary cell of a secondary cell group to be prepared by the target secondary node 166 for conditional access by a user equipment 168; and transmitting information 222 indicative of the determined at least one target primary cell of a secondary cell group 220, of the target secondary node 166.

Information 220 indicative of the determined at least one target PSCell 220, of the target SN 166, can comprise any suitable information.

In some examples, the information 220 indicative of the determined at least one target PSCell 220, of the target SN 166, comprises at least one cell identity, for example at least one PCI, and/or global cell identity and so on.

Block 206 can be performed in any suitable way using any suitable method. In examples, transmitting information 220 at block 206 comprises transmitting at least one signal and/or message. In some examples, transmitting information 220 comprises transmitting information 220 to the source MN 172 or the source SN 170.

In some examples, transmitting information 220 comprises transmitting information 220 to the source MN, which then forwards the information to the source SN 170.

In some examples, transmitting information 220 comprises transmitting at least one SgNB Addition Request Acknowledge message.

As discussed above, in examples, method 200 comprises, by the target SN 166 for example, determining, based, at least in part, on the received S-RLF information 164, a number of times that the determined at least one PSCell 220 was the correct choice for conditional access by a UE 168.

In some examples, method 200 comprises transmitting, by the target SN 166 for example, information indicative of the determined number of times that the determined at least one target PSCell 220 was the correct choice for conditional access by a UE 168.

Consequently, in examples, method 200 comprises determining, for example by a target SN 166, based, at least in part, on the received S-RLF information 164, a number of times that the determined at least one PSCell 220 was the correct choice for conditional access by a UE 168; and transmitting, for example by a target SN 166, information indicative of the determined number of times that the determined at least one target PSCell was the correct choice for conditional access by a UE 168.

In examples, information indicative of a number of times that the at least one determined target PSCells 220 was the correct choice for conditional access by a UE 168 can comprise any suitable information having any suitable form. For example, the information indicative of a number of times that the determined at least one target PSCell 220 was the correct choice for conditional access by a UE 168 can indicate the number of times in absolute or relative terms.

For example, the information can indicate a number of times that each of the at least one determined target PSCell 220 was the correct choice and/or can indicate a percentage of times that each of the at least one determined target PSCell 220 was the correct choice. Transmitting information indicative of the determined number of times that the determined at least one target PSCell was the correct choice for conditional access by a UE 168 can be performed in any suitable way using any suitable method.

In examples, transmitting information indicative of the determined number of times that the determined at least one target PSCell was the correct choice for conditional access by a UE 168 comprises transmitting at least one signal and/or messge.

In some examples, information indicative of the determined number of times that the determined at least one target PSCell was the correct choice for conditional access by a UE 168 can be transmitted with the information indicative of the determined at least one target PSCell 220 at block 206.

In examples, from the point of view of the source SN 170, or source MN 172 in at least some MN initiated examples, block 206 comprises receiving information 222 indicative of at least one target PSCell, of a target SN 166, wherein the at least one target PSCell is to be included in information indicating at least one suggested target PSCell to be prepared by the target SN 166 for conditional access by a UE 168.

In examples, from the point of view of the source SN 170, or source MN 172 in at least some MN initiated examples, receiving information 222 comprises receiving at least one SgNB Addition Request Acknowledge Message.

In examples, from the point of view of the source SN 170, or source MN 172 in at least some MN initiated examples, method 200, for example block 206, comprises receiving information indicative of the determined number of times that the at least one target PSCell 220, of a target SN 166, was the correct choice for conditional access by a UE 168.

The information indicative of the determined number of times that the at least one target PSCell 220, of a target SN 166, was the correct choice for conditional access by a UE 168 can be received with and/or as a part of information 222.

At block 208, method 200 comprises determining, based, at least in part, on the received information 222, at least one suggested target PSCell 174 to be prepared by the target SN 166 for conditional access by a UE 168. Consequently, FIG. 2 illustrates a method 200 comprising: receiving information 222 indicative of at least one target PSCell, of a target SN 166, wherein the at least one target PSCell is to be included in information indicating at least one suggested target PSCell 174 to be prepared by the target SN 166 for conditional access by a UE 168; and determining, based, at least in part, on the received information, at least one suggested target PSCell 174 to be prepared by the target SN 166 for conditional access by a UE 166.

Block 208 can be performed in any suitable way using any suitable method.

For example, determining a plurality of suggested target PSCells 174 at block 208 can be performed as part of a CPAC method/process/procedure, for example as part of a CPC method/process/procedure or CPA method/process/procedure.

In examples, the received information 222 can be used in any suitable way in determining at least one suggested target PSCell 174 to be prepared by the target SN 166 for conditional access by a UE 168.

In examples, at least one of the at least one target PSCell, indicated in the received information 222, is determined as a suggested target PSCell 174 to be prepared by the target SN 166 for conditional access by a UE 168.

In examples, the at least one target PSCell, indicated in the received information 222, is determined as a suggested target PSCell 174 to be prepared by the target SN 166 for conditional access by a UE 168.

In at least some examples where the source SN 170 (or source MN 172) receives information indicative of a number of times that the at least one target PSCell, indicated in received information 222, was the correct choice for conditional access by a UE 168, the target SN 166 (or source MN 172) can determine which at least one or ones of the indicated at least one target PSCell has the N highest associated number of times, and include that or those determined target PSCell(s) in the determined at least one suggested target PSCells 174, where N is a positive integer.

In examples, the target SN 166 cannot prepare PSCells for conditional access by a UE 168 that are not included in the suggested target PSCells 174. In examples, the source SN 170, or in MN initiated examples the source MN 172, can determine that a change in PSCell may be needed for the UE 168 and perform block 208 based, at least in part, on that determination. For example, the source SN 170 (or source MN 172) can receive at least one measurement report from the UE 168 and determine that a change in PSCell may be needed for the UE 168 based, at least in part, on the received at least one measurement report.

The UE 168 can be a UE 168 from which S-RLF information 164 has been received or can be a UE 168 from which S-RLF information 164 has not been received.

In some examples, the source SN 170 (or source MN 172) determines conditional access execution condition(s) for each of the at least one suggested target PSCells 174. For example, the source SN 170 (or source MN 172) can determine CPAC execution conditions, for example CPC or CPA execution conditions, for each of the at least one suggested target PSCell 174.

In some examples, the source SN 170 (or source MN) determines a maximum amount of target PSCells that can be prepared by the target SN 166. Accordingly, in examples, the target SN is to prepare a limited number of target PSCells from the at least one suggested target PSCell 174.

In examples, method 200 can then proceed according to a conditional access method/process/procedure to cause the target SN 166 to prepare at least one target PSCell for conditional access by a UE 168, using the determined at least one suggested PSCell 174, and to configure the UE 168 to conditionally access the target SN 165 based, at least in part, on the information transmitted at block 212.

For example, method 200 can then proceed according to a CPAC method/process/procedure, such as a CPA or CPC method/process/procedure. See, for example, FIG. 6A and 6B.

In examples, method 200 can be repeated any suitable number of times.

As previously noted, examples can make use of mobility robustness optimization algorithm(s). In this regard, Self-Organizing Networks (SONs) are networks that are able to automatically adjust the radio network parameters based on the collected statistics from the network. Mobility Robustness Optimization (MRO) is an example of SON which, in examples, deals with the adjustment of the parameters controlling the cell change (for example the change of PSCell).

In MRO, the network collects, in examples, statistics for a certain period of time (failure report can be one of them), denoted by, for example, KPI collection period. In each KPI collection period, for example, the KPI statistics are processed by the network and decisions are taken to make changes. The network applies the changes, for example to assistance information, and collects new statistics with the changes in, for example, a new KPI collection period.

This process can be repeated by the network until it reaches a KPI collection period where it decides that nothing needs to be done (for example, the problem is solved or tuning the threshold/offset is no longer possible).

At this case, it can be considered that MRO has converged. In examples, the values of performance metrics, collected in each of KPI collection period, should be statistically significant (high number of statistics) to have reliable network decisions when making changes.

Examples of the disclosure are advantageous and provide technical benefits.

For example, examples of the disclosure allow a target SN to select the proper target PSCells among the suggested ones.

For example, examples of the disclosure reduce radio link failures caused by preparing the wrong candidate PSCells.

Fig. 4 illustrates an example of a method 400.

In examples, method 400 can be performed by any suitable apparatus comprising any suitable means for performing method 400. For example, an apparatus as described in relation to FIG. 7A and/or 7B.

In examples, method 400 can be performed by a target SN 166, such as a target SN 166 of FIG. 2.

At block 402, method 400 comprises receiving secondary radio link failure information 164, wherein the secondary radio link failure information 164 is indicative of circumstances of a failure in a secondary radio link between a user equipment 168 and at least one source secondary node 170 while the user equipment 168 was configured to conditionally access a target secondary node 166, and the user equipment 168 is having dual connectivity with a source master node 172 and a source secondary node 170.

At block 404, method 400 comprises determining based, at least in part, on the received secondary radio link failure information 164 at least one target primary cell of a secondary cell group 220, of the target secondary node 166, wherein the determined at least one target primary cell of a secondary cell group 220 is to be included in information indicating at least one suggested target primary cell of a secondary cell group to be prepared by the target secondary node 166 for conditional access by a user equipment 168.

At block 406, method 400 comprises transmitting information 222 indicative of the determined at least one target primary cell of a secondary cell group 220, of the target secondary node 166.

Consequently, FIG. 4 illustrates a method 400 comprising: receiving secondary radio link failure information 164, wherein the secondary radio link failure information 164 is indicative of circumstances of a failure in a secondary radio link between a user equipment 168 and at least one source secondary node 170 while the user equipment 168 was configured to conditionally access a target secondary node 166, and the user equipment 168 is having dual connectivity with a source master node 172 and a source secondary node 170; determining based, at least in part, on the received secondary radio link failure information 164 at least one target primary cell of a secondary cell group 220, of the target secondary node 166, wherein the determined at least one target primary cell of a secondary cell group 220 is to be included in information indicating at least one suggested target primary cell of a secondary cell group to be prepared by the target secondary node 166 for conditional access by a user equipment 168; and transmitting information 222 indicative of the determined at least one target primary cell of a secondary cell group 220, of the target secondary node 166.

Fig. 5 illustrates an example of a method 500. In examples, method 500 can be performed by any suitable apparatus comprising any suitable means for performing method 500. For example, an apparatus as described in relation to FIG. 7A and/or 7B.

In examples, method 500 can be performed by a source SN 170, such as a source SN 170 of FIG. 2.

In examples, method 500 can be performed by a source MN 172, such as a source MN 172 of FIG. 2.

At block 502, method 500 comprises receiving information 222 indicative of at least one target PSCell, of a target SN 166, wherein the at least one target PSCell is to be included in information indicating at least one suggested target PSCell 174 to be prepared by the target SN 166 for conditional access by a UE 168.

At block 504, method 500 comprises determining, based, at least in part, on the received information, at least one suggested target PSCell 174 to be prepared by the target SN 166 for conditional access by a UE 168.

Consequently, FIG. 5 illustrates a method comprising: receiving information 222 indicative of at least one target PSCell, of a target SN 166, wherein the at least one target PSCell is to be included in information indicating at least one suggested target PSCell 174 to be prepared by the target SN 166 for conditional access by a UE 168; and determining, based, at least in part, on the received information, at least one suggested target PSCell 174 to be prepared by the target SN 166 for conditional access by a UE 168.

FIGs 6A and 6B illustrate examples of a method 600.

Some examples relate to third generation Partnership Project (3GPP) network. FIG. 6A and 6B can be considered to illustrate some such examples.

The following description can be considered to illustrate some such examples.

In the example of FIG. 6A and 6B, a plurality of apparatuses transmit and/or receive one or more signals and/or one or more messages across and/or via and/or using a network. In examples, any suitable form of communication in any suitable network can be used. For example, at least a portion of the network 100 of FIG. 1 can be used.

Accordingly, in examples, the plurality of apparatuses in FIG. 6A and 6B form at least a portion of a network 100 as described in relation to FIG. 1.

In the illustrated example, a terminal node 110, and four or more access nodes 120 transmit and/or receive one or more signals and/or one or more messages. In the example of FIG. 2 the terminal node 110 is a UE 168 and the four or more access nodes 120 are a source MN 172, a Source SN 170, a target SN 166 and other potential target node(s) 166n.

In the example of FIG. 6A and 6B, the UE 168 has dual connectivity with the source MN 172 and source SN 170.

In examples, communications and/or transmissions between elements illustrated in FIG. 6A and 6B can proceed via any number of intervening elements, including no intervening elements.

Although one UE 168 is illustrated in the example of FIG. 6A and 6B, in examples any suitable number of UEs 168 can be included.

Similarly, in examples, any suitable number of network nodes can be included.

A high-level flow chart is shown in FIG. 6A and 6B.

The difference between the two alternatives in the examples of FIG. 6A and FIG. 6B is that, in alternative 2, new lEs are included as part of an SN Addition Request Acknowledge message.

Fig 7A illustrates an example of an apparatus 130. The apparatus 130 may be a controller of an apparatus of device such as a terminal node 110, for example a UE 168, or network element 172, 170, and/or 166, such as an eNB or gNB. The apparatus 130 may be considered a controller.

Implementation of a 130 may be as controller circuitry. The controller 130 may be implemented in hardware alone, have certain aspects in software including firmware alone or can be a combination of hardware and software (including firmware). As illustrated in Fig 7A the controller 130 may be implemented using instructions that enable hardware functionality, for example, by using executable instructions of a computer program 136 in a general-purpose or special-purpose processor 132 that may be stored on a computer readable storage medium (disk, memory etc) to be executed by such a processor 132.

The processor 132 is configured to read from and write to the memory 134. The processor 132 may also comprise an output interface via which data and/or commands are output by the processor 132 and an input interface via which data and/or commands are input to the processor 132.

The memory 134 stores a computer program 136 comprising computer program instructions (computer program code) that controls the operation of the apparatus 130 when loaded into the processor 132. The computer program instructions, of the computer program 136, provide the logic and routines that enables the apparatus to perform the methods illustrated in the accompanying Figs. The processor 132 by reading the memory 134 is able to load and execute the computer program 136.

In examples, the apparatus 130 comprises: at least one processor 132; and at least one memory 134 including computer program code the at least one memory 134 and the computer program code configured to, with the at least one processor 132, cause the apparatus 130 at least to perform: receiving secondary radio link failure information 164, wherein the secondary radio link failure information 164 is indicative of circumstances of a failure in a secondary radio link between a user equipment 168 and at least one source secondary node 170 while the user equipment 168 was configured to conditionally access a target secondary node 166, and the user equipment 168 is having dual connectivity with a source master node 172 and a source secondary node 170; determining based, at least in part, on the received secondary radio link failure information 164 at least one target primary cell of a secondary cell group 220, of the target secondary node 166, wherein the determined at least one target primary cell of a secondary cell group 220 is to be included in information indicating at least one suggested target primary cell of a secondary cell group to be prepared by the target secondary node 166 for conditional access by a user equipment 168; and transmitting information 222 indicative of the determined at least one target primary cell of a secondary cell group 220, of the target secondary node 166.

In examples, the apparatus 130 comprises: at least one processor 132; and at least one memory 134 including computer program code the at least one memory 134 and the computer program code configured to, with the at least one processor 132, cause the apparatus 130 at least to perform: receiving information 222 indicative of at least one target PSCell, of a target SN 166, wherein the at least one target PSCell is to be included in information indicating at least one suggested target PSCell 174 to be prepared by the target SN 166 for conditional access by a UE 168; and determining, based, at least in part, on the received information, at least one suggested target PSCell 174 to be prepared by the target SN 166 for conditional access by a UE 166.

In examples, the apparatus 130 comprises: at least one processor 132; and at least one memory 134 including computer program code, the at least one memory storing instructions that, when executed by the at least one processor 132, cause the apparatus at least to: receiving secondary radio link failure information 164, wherein the secondary radio link failure information 164 is indicative of circumstances of a failure in a secondary radio link between a user equipment 168 and at least one source secondary node 170 while the user equipment 168 was configured to conditionally access a target secondary node 166, and the user equipment 168 is having dual connectivity with a source master node 172 and a source secondary node 170; determining based, at least in part, on the received secondary radio link failure information 164 at least one target primary cell of a secondary cell group 220, of the target secondary node 166, wherein the determined at least one target primary cell of a secondary cell group 220 is to be included in information indicating at least one suggested target primary cell of a secondary cell group to be prepared by the target secondary node 166 for conditional access by a user equipment 168; and transmitting information 222 indicative of the determined at least one target primary cell of a secondary cell group 220, of the target secondary node 166.

In examples, the apparatus 130 comprises: at least one processor 132; and at least one memory 134 including computer program code, the at least one memory storing instructions that, when executed by the at least one processor 132, cause the apparatus at least to: receiving information 222 indicative of at least one target PSCell, of a target SN 166, wherein the at least one target PSCell is to be included in information indicating at least one suggested target PSCell 174 to be prepared by the target SN 166 for conditional access by a UE 168; and determining, based, at least in part, on the received information, at least one suggested target PSCell 174 to be prepared by the target SN 166 for conditional access by a UE 166.

As illustrated in Fig 7A, the computer program 136 may arrive at the apparatus 130 via any suitable delivery mechanism 162. The delivery mechanism 162 may be, for example, a machine readable medium, a computer-readable medium, a non-transitory computer- readable storage medium, a computer program product, a memory device, a record medium such as a Compact Disc Read-Only Memory (CD-ROM) or a Digital Versatile Disc (DVD) or a solid-state memory, an article of manufacture that comprises or tangibly embodies the computer program 136. The delivery mechanism may be a signal configured to reliably transfer the computer program 136. The apparatus 130 may propagate or transmit the computer program 136 as a computer data signal.

Computer program instructions for causing an apparatus to perform at least the following or for performing at least the following: receiving secondary radio link failure information 164, wherein the secondary radio link failure information 164 is indicative of circumstances of a failure in a secondary radio link between a user equipment 168 and at least one source secondary node 170 while the user equipment 168 was configured to conditionally access a target secondary node 166, and the user equipment 168 is having dual connectivity with a source master node 172 and a source secondary node 170; determining based, at least in part, on the received secondary radio link failure information 164 at least one target primary cell of a secondary cell group 220, of the target secondary node 166, wherein the determined at least one target primary cell of a secondary cell group 220 is to be included in information indicating at least one suggested target primary cell of a secondary cell group to be prepared by the target secondary node 166 for conditional access by a user equipment 168; and transmitting information 222 indicative of the determined at least one target primary cell of a secondary cell group 220, of the target secondary node 166.

Computer program instructions for causing an apparatus to perform at least the following or for performing at least the following: receiving information 222 indicative of at least one target PSCell, of a target SN 166, wherein the at least one target PSCell is to be included in information indicating at least one suggested target PSCell 174 to be prepared by the target SN 166 for conditional access by a UE 168; and determining, based, at least in part, on the received information, at least one suggested target PSCell 174 to be prepared by the target SN 166 for conditional access by a UE 166.

The computer program instructions may be comprised in a computer program, a non-transitory computer readable medium, a computer program product, a machine readable medium. In some but not necessarily all examples, the computer program instructions may be distributed over more than one computer program.

Although the memory 134 is illustrated as a single component/circuitry it may be implemented as one or more separate components/circuitry some or all of which may be integrated/removable and/or may provide permanent/semi-permanent/ dynamic/cached storage.

In examples the memory 134 comprises a random access memory 158 and a read only memory 160. In examples the computer program 136 can be stored in the read only memory 158. See, for example, Fig. 7B

Although the processor 132 is illustrated as a single component/circuitry it may be implemented as one or more separate components/circuitry some or all of which may be integrated/removable. The processor 132 may be a single core or multi-core processor.

References to ‘computer-readable storage medium’, ‘computer program product’, ‘tangibly embodied computer program’ etc. or a ‘controller’, ‘computer’, ‘processor’ etc. should be understood to encompass not only computers having different architectures such as single /multi- processor architectures and sequential (Von Neumann)/parallel architectures but also specialized circuits such as field-programmable gate arrays (FPGA), application specific circuits (ASIC), signal processing devices and other processing circuitry. References to computer program, instructions, code etc. should be understood to encompass software for a programmable processor or firmware such as, for example, the programmable content of a hardware device whether instructions for a processor, or configuration settings for a fixed- function device, gate array or programmable logic device etc.

As used in this application, the term ‘circuitry’ may refer to one or more or all of the following:

(a) hardware-only circuitry implementations (such as implementations in only analog and/or digital circuitry) and

(b) combinations of hardware circuits and software, such as (as applicable):

(i) a combination of analog and/or digital hardware circuit(s) with software/firmware and

(ii) any portions of hardware processor(s) with software (including digital signal processor(s)), software, and memory or memories that work together to cause an apparatus, such as a mobile phone or server, to perform various functions and

(c) hardware circuit(s) and or processor(s), such as a microprocessor(s) or a portion of a microprocessor(s), that requires software (for example, firmware) for operation, but the software may not be present when it is not needed for operation.

This definition of circuitry applies to all uses of this term in this application, including in any claims. As a further example, as used in this application, the term circuitry also covers an implementation of merely a hardware circuit or processor and its (or their) accompanying software and/or firmware. The term circuitry also covers, for example and if applicable to the particular claim element, a baseband integrated circuit for a mobile device or a similar integrated circuit in a server, a cellular network device, or other computing or network device.

The blocks illustrated in the accompanying Figs may represent steps in a method and/or sections of code in the computer program 136. The illustration of a particular order to the blocks does not necessarily imply that there is a required or preferred order for the blocks and the order and arrangement of the block may be varied. Furthermore, it may be possible for some blocks to be omitted.

Where a structural feature has been described, it may be replaced by means for performing one or more of the functions of the structural feature whether that function or those functions are explicitly or implicitly described.

Thus, the apparatus 130 can, in examples, comprise means for: receiving secondary radio link failure information 164, wherein the secondary radio link failure information 164 is indicative of circumstances of a failure in a secondary radio link between a user equipment 168 and at least one source secondary node 170 while the user equipment 168 was configured to conditionally access a target secondary node 166, and the user equipment 168 is having dual connectivity with a source master node 172 and a source secondary node 170; determining based, at least in part, on the received secondary radio link failure information 164 at least one target primary cell of a secondary cell group 220, of the target secondary node 166, wherein the determined at least one target primary cell of a secondary cell group 220 is to be included in information indicating at least one suggested target primary cell of a secondary cell group to be prepared by the target secondary node 166 for conditional access by a user equipment 168; and transmitting information 222 indicative of the determined at least one target primary cell of a secondary cell group 220, of the target secondary node 166.

Thus, the apparatus 130 can, in examples, comprise means for: receiving information 222 indicative of at least one target PSCell, of a target SN 166, wherein the at least one target PSCell is to be included in information indicating at least one suggested target PSCell 174 to be prepared by the target SN 166 for conditional access by a UE 168; and determining, based, at least in part, on the received information, at least one suggested target PSCell 174 to be prepared by the target SN 166 for conditional access by a UE 166.

In examples, an apparatus 130 can comprise means for performing one or more methods, or at least part of one or more methods, as disclosed herein.

In examples, an apparatus 130 can be configured to perform one or more methods, or at least a part of one or more methods, as disclosed herein.

The systems, apparatus, methods and computer programs may use machine learning which can include statistical learning. Machine learning is a field of computer science that gives computers the ability to learn without being explicitly programmed. The computer learns from experience E with respect to some class of tasks T and performance measure P if its performance at tasks in T, as measured by P, improves with experience E. The computer can often learn from prior training data to make predictions on future data. Machine learning includes wholly or partially supervised learning and wholly or partially unsupervised learning. It may enable discrete outputs (for example classification, clustering) and continuous outputs (for example regression). Machine learning may for example be implemented using different approaches such as cost function minimization, artificial neural networks, support vector machines and Bayesian networks for example. Cost function minimization may, for example, be used in linear and polynomial regression and K-means clustering. Artificial neural networks, for example with one or more hidden layers, model complex relationship between input vectors and output vectors. Support vector machines may be used for supervised learning. A Bayesian network is a directed acyclic graph that represents the conditional independence of a number of random variables.

The above-described examples find application as enabling components of: automotive systems; telecommunication systems; electronic systems including consumer electronic products; distributed computing systems; media systems for generating or rendering media content including audio, visual and audio visual content and mixed, mediated, virtual and/or augmented reality; personal systems including personal health systems or personal fitness systems; navigation systems; user interfaces also known as human machine interfaces; networks including cellular, non-cellular, and optical networks; ad-hoc networks; the internet; the internet of things; virtualized networks; and related software and services.

The apparatus can be provided in an electronic device, for example, a mobile terminal, according to an example of the present disclosure. It should be understood, however, that a mobile terminal is merely illustrative of an electronic device that would benefit from examples of implementations of the present disclosure and, therefore, should not be taken to limit the scope of the present disclosure to the same. While in certain implementation examples, the apparatus can be provided in a mobile terminal, other types of electronic devices, such as, but not limited to: mobile communication devices, hand portable electronic devices, wearable computing devices, portable digital assistants (PDAs), pagers, mobile computers, desktop computers, televisions, gaming devices, laptop computers, cameras, video recorders, GPS devices and other types of electronic systems, can readily employ examples of the present disclosure. Furthermore, devices can readily employ examples of the present disclosure regardless of their intent to provide mobility.

The term ‘comprise’ is used in this document with an inclusive not an exclusive meaning. That is any reference to X comprising Y indicates that X may comprise only one Y or may comprise more than one Y. If it is intended to use ‘comprise’ with an exclusive meaning then it will be made clear in the context by referring to “comprising only one...” or by using “consisting”. In this description, the wording ‘connect’, ‘couple’ and ‘communication’ and their derivatives mean operationally connected/coupled/in communication. It should be appreciated that any number or combination of intervening components can exist (including no intervening components), i.e. , so as to provide direct or indirect connection/coupling/communication. Any such intervening components can include hardware and/or software components.

As used herein, the term "determine/determining" (and grammatical variants thereof) can include, not least: calculating, computing, processing, deriving, measuring, investigating, identifying, looking up (for example, looking up in a table, a database or another data structure), ascertaining and the like. Also, "determining" can include receiving (for example, receiving information), accessing (for example, accessing data in a memory), obtaining and the like. Also, " determine/determining" can include resolving, selecting, choosing, establishing, and the like.

In this description, reference has been made to various examples. The description of features or functions in relation to an example indicates that those features or functions are present in that example. The use of the term ‘example’ or ‘for example’ or ‘can’ or ‘may’ in the text denotes, whether explicitly stated or not, that such features or functions are present in at least the described example, whether described as an example or not, and that they can be, but are not necessarily, present in some of or all other examples. Thus ‘example’, ‘for example’, ‘can’ or ‘may’ refers to a particular instance in a class of examples. A property of the instance can be a property of only that instance or a property of the class or a property of a sub-class of the class that includes some but not all of the instances in the class. It is therefore implicitly disclosed that a feature described with reference to one example but not with reference to another example, can where possible be used in that other example as part of a working combination but does not necessarily have to be used in that other example.

Although examples have been described in the preceding paragraphs with reference to various examples, it should be appreciated that modifications to the examples given can be made without departing from the scope of the claims.

Features described in the preceding description may be used in combinations other than the combinations explicitly described above. Although functions have been described with reference to certain features, those functions may be performable by other features whether described or not.

Although features have been described with reference to certain examples, those features may also be present in other examples whether described or not.

The term ‘a’, ‘an’ or ‘the’ is used in this document with an inclusive not an exclusive meaning. That is any reference to X comprising a/an/the Y indicates that X may comprise only one Y or may comprise more than one Y unless the context clearly indicates the contrary. If it is intended to use ‘a’, ‘an’ or ‘the’ with an exclusive meaning then it will be made clear in the context. In some circumstances the use of ‘at least one’ or ‘one or more’ may be used to emphasis an inclusive meaning but the absence of these terms should not be taken to infer any exclusive meaning.

The presence of a feature (or combination of features) in a claim is a reference to that feature or (combination of features) itself and also to features that achieve substantially the same technical effect (equivalent features). The equivalent features include, for example, features that are variants and achieve substantially the same result in substantially the same way. The equivalent features include, for example, features that perform substantially the same function, in substantially the same way to achieve substantially the same result.

In this description, reference has been made to various examples using adjectives or adjectival phrases to describe characteristics of the examples. Such a description of a characteristic in relation to an example indicates that the characteristic is present in some examples exactly as described and is present in other examples substantially as described.

The above description describes some examples of the present disclosure however those of ordinary skill in the art will be aware of possible alternative structures and method features which offer equivalent functionality to the specific examples of such structures and features described herein above and which for the sake of brevity and clarity have been omitted from the above description. Nonetheless, the above description should be read as implicitly including reference to such alternative structures and method features which provide equivalent functionality unless such alternative structures or method features are explicitly excluded in the above description of the examples of the present disclosure. Whilst endeavoring in the foregoing specification to draw attention to those features believed to be of importance it should be understood that the Applicant may seek protection via the claims in respect of any patentable feature or combination of features hereinbefore referred to and/or shown in the drawings whether or not emphasis has been placed thereon. l/we claim: