Abstract:
In one example embodiment, an apparatus is provided that includes an antenna that receives, in a first wireless network, a first identifier of a second wireless network access point. The apparatus also includes a processor that processes data received by the antenna. The apparatus transmits, in the first wireless network, the first identifier of the second wireless network access point. The apparatus establishes a tunnel to the second wireless network. The antenna transmits a second identifier of the second wireless network access point.
Abstract:
An example method is provided in one example embodiment and may include determining a presence of user equipment (UE) in relation to small cell radio(s) of a small cell network based on information obtained through the small cell network and one or more parallel networks; and adjusting transmit power for the small cell radio(s) based on the presence of UE in relation to the small cell radio(s). Another example method can include determining that a UE in cell paging channel mode has changed its selected macro cell radio; determining that the UE is allowed service on a small cell radio located in a vicinity of a macro cell coverage area of a selected macro cell radio; and adjusting a transmit power of the small cell radio based on a presence of the UE in a surrounding macro cell coverage area of the small cell radio.
Abstract:
An example method is provided in one example embodiment and includes receiving a handover request from a first radio network to handover a user equipment (UE) to a second radio network, wherein the handover request includes an international mobile subscriber identity (IMSI) for a user associated with the UE and a pseudo cell identifier (ID); determining a target channel configuration for the UE using the pseudo cell ID; querying a third radio network using the user IMSI to determine a location of the UE, wherein at least one access point in the third radio network is in communication with the UE; and selecting a particular target access point in the second radio network for handover of the UE based, at least in part, on the location of the UE, the target channel configuration for the UE and a location of the particular target access point.
Abstract:
In one embodiment, a load balancer receives a message from a tunnel termination gateway (TTG) associated with a mobile device. The load balancer may receive messages from a plurality of TTGs. A gateway node in a plurality of gateway nodes in which to send the message is determined. The load balancer then assigns a NSAPI for use by the gateway node. For example, the NSAPI may be associated with a tunnel that is generated between the TTG and GGSN. The load balancer ensures that the assigned NSAPI is not currently in use at the gateway node. Thus, no overlapping of NSAPIs may occur even though the load balancer is processing messages from multiple TTGs for multiple gateway nodes.
Abstract:
In one example, an apparatus is provided that includes a processor configured to receive, in a first wireless network, an identifier of a base station in a second wireless network, and to determine an identity of a first device in the second wireless network. The apparatus is configured to transmit the identifier of the base station to the second wireless network.
Abstract:
In one example embodiment, an apparatus is provided that includes an antenna that receives, in a first wireless network, a first identifier of a second wireless network access point. The apparatus also includes a processor that processes data received by the antenna. The apparatus transmits, in the first wireless network, the first identifier of the second wireless network access point. The apparatus establishes a tunnel to the second wireless network. The antenna transmits a second identifier of the second wireless network access point.
Abstract:
A method is provided in one embodiment and includes receiving a first message including an indication that a first access point of a first network is a gateway access point of a first network, receiving a second message including an indication that a second access point of the first network is an inner access point of the first network, and receiving an indication of a number of wireless devices registered with at least one of the first access point and the second access point. The method further includes determining a power mode for the second access point based upon whether at least one wireless device is registered with the first access point or the second access point, and sending a power mode command message to the second access point indicative of the determined power mode.
Abstract:
An example method is provided and includes receiving a packet associated with a flow, determining a tunnel identifier for the flow, and determining a flow identifier for the flow. The method includes associating the flow identifier and the tunnel identifier to an Internet protocol (IP) address to generate a binding to be used for a network address and port translation (NAPT). In other embodiments, a routing decision is executed based on the binding between the identifiers and the IP address. The flow identifier can be a context identifier (CID), and the tunnel identifier can be a softwire tunnel ID. In yet other embodiments, the packet can be tagged as part of an encapsulation operation, which includes providing information about a network location at which the network address and port translation is to be executed.
Abstract:
In one embodiment, a load balancer receives a message from a tunnel termination gateway (TTG) associated with a mobile device. The load balancer may receive messages from a plurality of TTGs. A gateway node in a plurality of gateway nodes in which to send the message is determined. The load balancer then assigns a NSAPI for use by the gateway node. For example, the NSAPI may be associated with a tunnel that is generated between the TTG and GGSN. The load balancer ensures that the assigned NSAPI is not currently in use at the gateway node. Thus, no overlapping of NSAPIs may occur even though the load balancer is processing messages from multiple TTGs for multiple gateway nodes.
Abstract:
The disclosed technology relates to a process of evaluating any number of different identity providers (IDPs) and their respective set of credentials that are used to authenticate corresponding users to assist with the onboarding of the different IDPs in connection with Wi-Fi identity federations. In particular, the process allows a person's electronic identity and attributes (stored across one or more IDPs) to be determined once using a standard. Once trust has been established for the user, that trust can then be utilized across a number of different systems (e.g., Single-sign on). The same trust determination can be used without the need for the authenticity of the user identity to be re-evaluated with each new access request.