Abstract:
An example method performed at a first network device configured to operate as a small cell gateway anchoring both control and user plane for a Master Radio Access Point (MRAP) and a Secondary Radio Access Point (SRAP) is provided. The method includes receiving, from the MRAP, a first message comprising an indication that a first bearer is to be switched from the MRAP to the SRAP, the first message comprising a Tunnel Endpoint Identifier TEID of a general packet radio service (GPRS) tunneling communications protocol (GTP) tunnel of a long-term evolution (LTE) network associated with the first bearer in that the TEID identifies a GTP tunnel for the first bearer, and a first transport layer address (e.g. IP address) of the SRAP to which downlink data for the TEID associated with the first bearer is to be sent to reach user devices that utilize the first bearer. The method also includes, upon receiving downlink data for the first bearer, sending the received downlink data to the first transport layer address using the TEID provided in the first message.
Abstract:
In accordance with one example embodiment, there is provided a method that includes determining whether a received overload message includes a traffic load reduction indication element; determining a percentage of network elements to which to relay the received overload message if the received overload message includes the traffic load reduction indication element; and selecting ones of the network elements to which to send the received overload message based on the determined percentage. The method may further include modifying the received message to change a value of the traffic load reduction indication element; and sending the modified message to the selected ones of the network elements. In some embodiments, the received overload message includes a mobility management element (“MME”) START message.
Abstract:
In an example, a wireless communication system and apparatuses thereof are described. In an example long-term evolution (LTE) network, a first base station hands over a connection to a second base station. The first base station may be a (femto) home eNodeB (HeNB) or (macro) eNodeB. The second base station may also be a HeNB or eNodeB connected to a different gateway. The first base station may send “Handover Request” on an X2 connection, identifying the gateway that the second base station is connected to as the correct gateway. After sending a “Handover Request Acknowledgement,” the second base station correctly establishes a tunnel to a connected gateway device.
Abstract:
In one embodiment, a method includes receiving energy efficiency data from a plurality of nodes within a network. The method also includes determining an energy efficiency node quotient for each of the plurality of nodes within the network to generate a plurality of energy efficiency node quotients and determining an energy efficiency path quotient for each of a plurality of paths within the network to generate a plurality of energy efficiency path quotients. The method further includes determining one or more policies associated with the plurality of paths and selecting a path from the plurality of paths based at least on the plurality of energy efficient path quotients and the one or more policies.
Abstract:
Presented herein are techniques to facilitate fast roaming between a mobile network operator-public (MNO-public) wireless wide area (WWA) access network and an enterprise private WWA access network. In one example, a method is provided that may include generating, by an authentication node, authentication material for a user equipment (UE) based on the UE being connected to a public WWA access network, wherein the public WWA access network is associated with a mobile network operator, and the authentication node and the UE are associated with an enterprise entity; obtaining, by the authentication node, an indication that the UE is attempting to access a private WWA access network associated with the enterprise entity; and providing, by the authentication node, the authentication material for the UE, wherein the authentication material facilitates connection establishment between the UE and the private WWA access network.
Abstract:
Techniques for traffic steering are disclosed. A first signal characteristic of a first connection between an electronic device and a first wireless communications network is determined. A second signal characteristic of a second connection between the electronic device and a second wireless communications network is also determined. Based on the first signal characteristic and the second signal characteristic, the electronic device is prevented from attempting to establish the second connection until one or more establishment criteria are met.
Abstract:
A system and method for using 802.11v action report messages to enhance roaming. In one embodiment, a method includes transmitting, to a station, a transition management message that identifies a recommended access point for roaming for the station, receiving, from the station, an action report in response to the transition management message, where the action report indicates feedback to the recommended access point identified in the transition management message, and determining a roaming recommendation based on the action report.
Abstract:
Presented herein are techniques to facilitate fast roaming between a mobile network operator-public (MNO-public) wireless wide area (WWA) access network and an enterprise private WWA access network. In one example, a method is provided that may include generating, by an authentication node, authentication material for a user equipment (UE) based on the UE being connected to a public WWA access network, wherein the public WWA access network is associated with a mobile network operator, and the authentication node and the UE are associated with an enterprise entity; obtaining, by the authentication node, an indication that the UE is attempting to access a private WWA access network associated with the enterprise entity; and providing, by the authentication node, the authentication material for the UE, wherein the authentication material facilitates connection establishment between the UE and the private WWA access network.
Abstract:
The disclosed technology relates to a process of dynamically assigning operational parameters for access points within a CBRS (Citizen Broadband Radio Service) network. In particular, the disclosed technology monitors for and detects interference between nearby access points and user equipment devices that may belong to the same enterprise or to different enterprises. Machine learning processes are used to revise the operational parameters that were initially assigned by the Spectrum Access System (SAS). These processes are also used to suggest an updated set of operational parameters to the SAS for the access points. The dynamic assignment reduces interference experienced by the access point with respect to nearby other access points and/or nearby other user equipment. The dynamic assignment aims to improve a quality of communication between the access point and its associated user equipment.
Abstract:
A request for a virtual background is received from an endpoint of a participant who is participating in an online meeting. The request includes a description of the virtual background. One or more virtual backgrounds are generated using an image generator based on a command that includes the description of the virtual background. The one or more virtual backgrounds are transmitted to the endpoint. A selection of the virtual background from the one or more virtual backgrounds is received and the selection is used to train the image generator. A request to use the virtual background may be received from a second participant of the online meeting and the virtual background or text used to generate the virtual background may be transmitted to the second participant.