Abstract:
A method, a device, and a non-transitory storage medium provide for receiving a request from an end device to access a network; obtaining subscription data pertaining to the end device based on the request; determining whether to establish a default bearer during an attachment procedure based on at least one of the request or the subscription data; permitting attachment to the network without establishment of the default bearer based on determining not to establish the default bearer; and storing context data that indicates the end device is attached without the default bearer based on the permitting. Additionally, the method, the device, and the non-transitory storage medium provide for end device-side and network device-side setting up and tearing down of the default bearer subsequent to attachment.
Abstract:
A base station may receive a resource request, from a device, that includes a request to access a radio resource. The base station may determine a device class to which the device belongs. The base station may determine an amount of radio resources permitted to be allocated to devices belonging to the device class, may determine an amount of radio resources being utilized by devices belonging to the device class, and may compare the amounts. The base station may determine whether radio resources are available to be allocated to the device based on comparing the amounts, and may process the resource request based on the determination. The base station may grant the resource request when radio resources are available to be allocated to the device, and may deny or postpone the resource request when radio resources are not available to be allocated to the device.
Abstract:
A device may receive service information associated with an internet protocol multimedia subsystem (IMS) service. The IMS service may be provided via an IMS network. The service information may include information that identifies a terminating device that is to receive the IMS service. The device may cause registration trigger information to be provided to the terminating device based on receiving the service information. The registration trigger information may be provided to the terminating device to cause the terminating device to register to the IMS network to allow the terminating device to receive the IMS service.
Abstract:
A first server device, associated with a first carrier network, may provide a first identifier of a first application device to a second server device to cause the second server device to store the first identifier. The second server device may be accessible from the first carrier network and from a different second carrier network. The first server device may receive a first message from the first application device; transmit the first message and the first identifier of the first application device towards a client device via the first carrier network and the second carrier network; receive, from a second application device associated with the second carrier network, a second message; identify the second application device based on information, maintained by the second server, associating the second application device with the second identifier; identify a set of policies based on the second identifier; and apply the set of policies.
Abstract:
A method, a network device, and a non-transitory computer-readable storage medium are described in relation to an LAS service. The LAS service may include enablement or disablement of the LA service subsequent to an establishment and active traffic flow associated with an application session. The LAS service may be enabled or disabled based on performance metric criteria and threshold values not being satisfied or being satisfied. The LAS service may be implemented to include an exposure function.
Abstract:
A method may include establishing, for a user equipment (UE) device, a data session via a network and determining whether the network is congested or overloaded or whether a power level of the UE device is less than a threshold. The method may also include instructing the UE device to re-register for a Category M1 (Cat-M1) data session, in response to determining that the network is congested or overloaded or the power level of the UE device is less than the threshold.
Abstract:
A method, a network device, and a non-transitory computer-readable storage medium are described in relation to an intelligent secure access for SIM-less end device service. The intelligent secure access for SIM-less end device service may include providing authentication and/or authorization of SIM-less end devices and an intermediary network device or intermediary customer premises equipment. The intelligent secure access for SIM-less end device service may include validation of an identity of the SIM-less devices and the intermediary network device or intermediary customer premises equipment as well as applications of the SIM-less devices for access and use of an application service layer network.
Abstract:
A system described herein may provide a technique for an inter-segment Network Function (“NF”) discovery procedure in a network that includes multiple discrete network segments. The network segments may each include a respective set of NFs. An NF discovery request may include discovery parameters such as an identifier of a User Equipment (“UE”). Network segments may be checked in a sequential or hierarchical manner to determine whether a respective network segment includes an instance of the requested NF that matches the discovery parameters (e.g., is associated with the UE identified in the NF discovery request).
Abstract:
A system may receive a request to perform a firmware update on an Internet of Things (IoT) device and determine whether the IoT device is capable of switching from a first mode to a second mode. The IoT device sends and receives data via first channels when the IoT device is operating in the first mode and the IoT device sends and receives data via second channels when the IoT device is operating in the second mode. The system instructs the IoT device to switch to the second mode in response to determining that the IoT device is capable of switching to the second mode and sends the firmware update to the IoT device while the IoT device is in the second mode. The system determines that the firmware update has been completed and instructs the IoT device to switch from the second mode to the first mode when the firmware update has been completed.
Abstract:
A device may include a processor configured to provide an interface to enable a user equipment (UE) device to request a data flow in a network slice via a network exposure function (NEF). The processor may be further configured to receive a request from the UE device via the provided interface to create a data flow in the network slice, wherein the data flow is associated with a Quality of Service (QOS) characteristic; map the QoS characteristic to a QoS identifier; and create a data flow associated with the QoS identifier in a communication session associated with the UE device in the network slice.