Abstract:
An example method is provided in one example embodiment and may include receiving an indication of a radio access technology (RAT) change for a user equipment (UE); determining availability of a preferred RAT type for a policy related rule associated with the UE, wherein the policy related rule includes, at least in part, the preferred RAT type for one or more service data flows for the UE; and configuring the one or more service data flows for the UE based, at least in part, on a change in availability of the preferred RAT type following the RAT change. In at least one case, the method can include routing downlink packets to the UE using the one or more service data flows for the preferred RAT type if the preferred RAT type is available.
Abstract:
In one aspect, a method of supporting enhanced UE policies that control which access technologies and the number of access technologies a user equipment can access beyond a single 3GPP connection and a single non-3GPP connection, the method including registering, by a user equipment, to a 3GPP network, wherein the registering includes an indication that the user equipment supports multi-access packet data unit (MA-PDU) sessions; receiving, by the user equipment, a UE policy for a first application permitting the user equipment to access at least three access technologies for communications while accessing the first application, wherein the UE policy is received from an access mobility function (AMF) of the 3GPP network; and determining, by the user equipment, one or more of the access technologies permitted in the UE policy for the first application to use to establish protocol data unit (PDU) session with the first application.
Abstract:
Presented herein are techniques to provide selective network slice authentication and authorization in a mobile network environment. In one example, a method may include obtaining, by an access management element of a mobile network, a registration request from a user equipment, wherein the registration request identifies a plurality of network slices with which the user equipment seeks authentication; determining that if authentication for the user equipment with a first network slice is successful, authentication for the user equipment with one or more other network slices can be skipped; and upon successful authentication for the user equipment with the first network slice, skipping authentication for the user equipment with the one or more other network slices.
Abstract:
The present disclosure is directed to migrating network traffic from a licensed spectrum to an unlicensed spectrum within the same radio access technology (RAT). In one aspect, a method includes identifying a user device connected to a cellular wireless access technology, over a licensed spectrum; determining whether a condition for switching network traffic associated with the user device to an unlicensed spectrum is triggered; in response to determining that the condition is triggered, determining an unlicensed spectrum to move the network traffic to, the unlicensed spectrum being within a same cell as the licensed spectrum or in a different cell compared to a cell in which the licensed spectrum is; and migrating at least a portion of the network traffic to the unlicensed spectrum while maintaining network connectivity of the user device over the cellular wireless access technology.
Abstract:
Presented herein are techniques to facilitate delivering standalone non-public network (SNPN) credentials from an enterprise authentication server to a user equipment (UE) using an Extensible Authentication Protocol (EAP) process. In one example, a method may include determining, by an authentication server of an enterprise, that a UE for the enterprise is to receive credentials to enable the UE to connect to a SNPN of the enterprise in which the determining is performed based, at least in part, on connection of the UE to an access network that is different than the SNPN for the enterprise; and performing an authentication process with the UE by the authentication server in which the authentication process includes providing the credentials to the UE via a first authentication message and obtaining confirmation from the UE via a second authentication message that indicates successful provisioning of the credentials for the UE.
Abstract:
The present technology is generally directed to dynamically adding network resources based on an application function (AF) notification. The present technology can determine, by an AF of a service provider, a network congestion on a network, the network congestion indicating that network resources for servicing a user device using services of the service provider do not meet corresponding Quality of Service (QoS) requirements. Further, the present technology can transmit a notification by the AF to a core network of a network provider to request additional network resources to be allocated for servicing the user device, the network provider providing network connectivity for the user device to receive the services provided by the service provider.
Abstract:
Presented herein are techniques to facilitate providing slice attribute information to a user equipment (UE) for one or more slice types with which the user equipment is allowed to establish one or more session(s). In one example, a method may include obtaining, by a network element, a registration request for connection of a UE to a mobile network; performing an authentication for connection of the UE to the mobile network; and upon successful authentication, providing, by the network element, a registration response to the UE, wherein the registration response identifies one or more network slice types with which the UE is authorized to establish a session and the registration response identifies one of: attribute information for each of the one or more network slice types or network location information from which attribute information for each of the one or more network slice types is to be obtained.
Abstract:
Presented herein are techniques to provide sponsored data to a user equipment in a mobile network environment. For example, techniques provided herein may provide for the ability to enhance sponsored data connectivity by enabling a mobile network to facilitate sponsorship of a network slice as part of sponsored data connectivity in which the network slice can provide traffic flow specific Service Level Agreement (SLA) connectivity and treatment. In one example, a method is provided that includes determining, via a first session of a user equipment (UE), that the UE seeks to access content in which financial sponsorship for accessing the content by the UE is to be provided by a sponsoring entity in which the first session involves a first network slice and enabling the UE to establish a second session to access the content in which the second session involves a second network slice.
Abstract:
In one illustrative example, a user equipment (UE) policy may be communicated to a UE. The UE policy may be a UE Route Selection Policy (URSP) which includes a policy rule that associates an application and/or traffic thereof with a routing policy comprising an indicated radio access technology (RAT) type for 3GPP access. When the UE operates to communicate the traffic in a communication session for the application via non-3GPP access, a message which indicates an attach request with a request type indicating “handover” may be received from the UE via a selected radio access network (RAN) corresponding to the indicated RAT type. The message is for triggering a handover of the communication session for the application from the non-3GPP access to the 3GPP access. In one scenario, when Voice over NR (VoNR) is unavailable, the indicated RAT type of the routing policy may be set to indicate an E-UTRAN.
Abstract:
Presented herein are techniques to provide selective network slice authentication and authorization in a mobile network environment. In one example, a method may include obtaining, by an access management element of a mobile network, a registration request from a user equipment, wherein the registration request identifies a plurality of network slices with which the user equipment seeks authentication; determining that if authentication for the user equipment with a first network slice is successful, authentication for the user equipment with one or more other network slices can be skipped; and upon successful authentication for the user equipment with the first network slice, skipping authentication for the user equipment with the one or more other network slices.