Abstract:
Embodiments are directed to a virtual mobility anchor network element to receive, from a packet gateway (PGW) node, a request for an internet protocol (IP) address for a mobile device, establish an IP address for the mobile device; and provide the IP address to the PGW node in response to the request for the IP address for the mobile device. The virtual mobility anchor network element is configured to receive IP traffic from a network location; determine a target destination for the IP traffic based on a destination IP address, the destination IP address comprising the second IP address; and forward the IP traffic to the PGW node associated with the destination IP address. The virtual mobility anchor network element is also configured to receive IP traffic from the PGW node; determine a target destination for the IP traffic; and route the IP traffic to the target destination.
Abstract:
Techniques are provided to manage how router advertisement messages are forwarded for ultimate wireless transmission in a wireless network. In one embodiment, a multicast router advertisement message intended for a virtual local area network is converted into individual unicast router advertisement messages directed to specific wireless mobile client devices that are part of that virtual local area network. In another embodiment, router advertisement messages are routed between controllers according to the current location of a wireless mobile client device. In still other embodiments, techniques are provided to minimize the volume of the router advertisement messages sent over a wireless network, and to proactively send a unicast router advertisement message to a mobile client device that has performed a handoff, without waiting for a router solicitation message.
Abstract:
An example method is provided and includes receiving a packet associated with a flow, determining a tunnel identifier for the flow, and determining a flow identifier for the flow. The method includes associating the flow identifier and the tunnel identifier to an Internet protocol (IP) address to generate a binding to be used for a network address and port translation (NAPT). In other embodiments, a routing decision is executed based on the binding between the identifiers and the IP address. The flow identifier can be a context identifier (CID), and the tunnel identifier can be a softwire tunnel ID. In yet other embodiments, the packet can be tagged as part of an encapsulation operation, which includes providing information about a network location at which the network address and port translation is to be executed.
Abstract:
Presented herein are techniques to facilitate fast roaming between a mobile network operator-public (MNO-public) wireless wide area (WWA) access network and an enterprise private WWA access network. In one example, a method is provided that may include generating, by an authentication node, authentication material for a user equipment (UE) based on the UE being connected to a public WWA access network, wherein the public WWA access network is associated with a mobile network operator, and the authentication node and the UE are associated with an enterprise entity; obtaining, by the authentication node, an indication that the UE is attempting to access a private WWA access network associated with the enterprise entity; and providing, by the authentication node, the authentication material for the UE, wherein the authentication material facilitates connection establishment between the UE and the private WWA access network.
Abstract:
This disclosure describes techniques for performing multi-factor authentication (MFA) by utilizing user generated authenticating gestures. The techniques may include establishing and monitoring peer-to-peer communication links between user devices. The techniques may include monitoring channel properties for fluctuations in the channel properties associated with the user generated authenticating gesture passing through signals of the communication links. The techniques may further include comparing a gesture performed by a user to a predefined authenticating gesture. The techniques may include determining a pattern of fluctuations in the channel properties associated with the predefined authenticating gesture. The techniques may include determining a confidence score associated with comparing the gesture performed and the predefined authenticating gesture. The techniques may further include determining a proximity of the user and/or the gesture to the user device. The techniques may further include granting or denying the user based at least in part on the proximity and/or the comparison.
Abstract:
A method is provided to anonymize the media access control (MAC) address of a client device. The method involves generating a plurality of media access control (MAC) addresses for use by a client device in a network. Policies are defined that determine which one of the plurality of MAC addresses is to be used by the client device. The plurality of MAC addresses allocated for use by the client device are registered with a management entity in the network.
Abstract:
Presented herein are techniques to provide a network-initiated group disconnect for wireless devices belonging to one or more device group(s). In one example, a method may include determining, by a control element of a network, that at least one device group is to be disconnected from the network, wherein the at least one device group comprises a plurality of wireless devices connected to the network; identifying one or more access network radios through which the plurality of wireless devices are connected to the network; and triggering a disconnect command for the at least one device group to be broadcast from each of the one or more access network radios to trigger the plurality of wireless devices to disconnect from the network.
Abstract:
Presented herein are techniques to facilitate fast roaming between a mobile network operator-public (MNO-public) wireless wide area (WWA) access network and an enterprise private WWA access network. In one example, a method is provided that may include generating, by an authentication node, authentication material for a user equipment (UE) based on the UE being connected to a public WWA access network, wherein the public WWA access network is associated with a mobile network operator, and the authentication node and the UE are associated with an enterprise entity; obtaining, by the authentication node, an indication that the UE is attempting to access a private WWA access network associated with the enterprise entity; and providing, by the authentication node, the authentication material for the UE, wherein the authentication material facilitates connection establishment between the UE and the private WWA access network.
Abstract:
Techniques are provided for operator specific customization of a network service configuration. In some embodiments, an operator defines a mapping between an application executing on a user equipment (UE) and a network service configuration. In some embodiments, the network service configuration indicates whether the application is to be supported via a UPF instance located within the core network or deployed at a network edge. The mapping is then provided to the UE, and passed back to the core network, for example, when the UE establishes a connection on behalf of the UE application. The core network then supports the UE application consistent with the configuration specified by the mapping.
Abstract:
Techniques are provided for operator specific customization of a network service configuration. In some embodiments, an operator defines a mapping between an application executing on a user equipment (UE) and a network service configuration. In some embodiments, the network service configuration indicates whether the application is to be supported via a UPF instance located within the core network or deployed at a network edge. The mapping is then provided to the UE, and passed back to the core network, for example, when the UE establishes a connection on behalf of the UE application. The core network then supports the UE application consistent with the configuration specified by the mapping.