Can the Internet provide personalized services? Learn more about IMEIsv's differentiated protection

Can the Internet provide personalized services? Learn more about IMEIsv's differentiated protection

In the current network, if the same RRM (Radio Resource Management) policy is applied to all UEs, the different requirements of different types of UEs cannot be met. In order to provide specific RRM policies for specified types of UEs, 3GPP introduced the concept of IMEIsv (International Mobile station Equipment Identity and Software Version Number), which is the international mobile equipment identity code and software version number.

AMF (Access and Mobility management Function) passes IMEIsv to gNodeB through the NG (Next generation) interface. After gNodeB maps it to the wireless configuration, it can provide specific RRM policies for the specified type of UE based on IMEIsv, thereby providing better targeted services according to the UE's business characteristics and load status.

Differentiated scheduling strategy based on IMEIsv

The core network sends the terminal ID to the gNodeB through the IMEIsv field, and identifies the designated brand terminal through IMEIsv. The gNodeB implements differentiated scheduling strategies for this type of terminal (the scheduling priority of this type of user can be appropriately increased).

picture

Differentiated power control strategy based on IMEIsv

gNodeB uses IMEIsv to identify designated brand terminals and implements differentiated uplink power control strategies for designated terminals. In sudden interference scenarios, it promptly increases power to meet uplink performance improvements and maximizes the perception of designated brand terminals.

picture

Differentiated frequency priority switching strategy based on IMEIsv

After identifying the designated brand of terminal through IMEIsv, gNodeB implements a specific frequency priority policy for the designated terminal, and can control the designated terminal to switch to the cell belonging to certain specific frequency points of NG-RAN (Next Generation Radio Access Network).

picture

Differentiated mobility strategy based on IMEIsv

The core network sends the terminal identification to the gNodeB through the IMEIsv field. The gNodeB takes effect on differentiated mobility thresholds for terminals of specified brands, and customizes intra-system and inter-system coverage migration thresholds based on terminal measurements and performance differences.

picture

After the deployment of the IMEIsv differentiated protection strategy, the big data platform indicator statistics show that the specified type of terminals have obvious improvements in RTT delay, HTTP download/upload rate, video/picture sending rate, and page/video download rate.

picture

picture

picture

picture

picture

picture

With the continuous development of the network, users' differentiated demands are increasing. Applying the same RRM strategy to all UEs under the same gNodeB can no longer meet the demands of different users.

The differentiated protection strategy based on IMEIsv can identify the specified type of terminal through IMEIsv, so that gNodeB can flexibly customize differentiated RRM strategies (such as connected/idle state residence, independent switching strategy, etc.) for different types of UEs, thereby improving the perceived experience of the specified type of UE.

<<:  I dare say 99.9% of network engineers don’t know the four major indicators for locating wireless network failures!

>>: 

Recommend

Understanding the Sliding Window Protocol in One Article

Yesterday we briefly talked about HTTP and HTTPS....

How can enterprises ensure that SDN deployment is effective?

[[177483]] In recent years, companies ranging fro...

Learn about HTTP proxy in five minutes

[[429696]] "If you have any questions or dis...

Will 5G mobile phones and package fees become cheaper and cheaper?

[[350564]] 1China has the largest 5G user group i...

China Mobile's July data shows sharp decline in users is still accelerating

Recently, China Mobile released its operating dat...

Ten Limitations of MU-MIMO in WiFi

MIMO technology has continued to evolve since its...