Abstract:
In one embodiment, a method comprises obtaining, by a first network element comprising processing logic, notification of a plurality of events associated with a plurality of communication sessions, wherein the events include at least one of a mid-session event or an end-session event, wherein the plurality of events are communicated to a routing agent using a first communication protocol by a plurality of second network elements; receiving, by the first network element, a request via a second communication protocol for a first communication session to be established for a client computing device; selecting, by the first network element, one or more network elements from the second network elements for the communication session based on the at least one of a mid-session or an end-session event; and communicating, by the first network element, identification information of the one or more network elements selected for use in the first communication session.
Abstract:
A method is provided in one example embodiment and includes communicating a message from a network element to a remote data plane element in order to request a data plane resource for hosting a session for a particular subscriber. The remote data plane element is designated to host a data plane function for a particular mobile network subscriber and the data plane resource comprises at least one of memory space and processor allocation. The method further includes discovering nodes capable of supporting the control plane functions; discovering nodes capable of supporting the data plane functions for the session; and performing a system-specific internal configuration to support separation of the data plane functions and the control plane functions.
Abstract:
The method disclosed herein manages and generates enterprise-policy compliant guest credentials for connectivity to one or more enterprise networks. The method may include receiving a request from a guest user device to connect to a first network provided by an enterprise. The method may further comprise determining that the guest user device is authorized to access the first network when the access by the guest user is subject to a movement and roaming policy. A first credential may be provisioned for the guest user to access the first network that is consistent with the movement and roaming policy. Prior to receiving a second request to connect to a second network of the enterprise from the guest user device, provisioning a second credential, consistent with the movement and roaming policy, to the guest user.
Abstract:
The present technology discloses non-transitory computer-readable media, systems, and methods for receiving a notification that an identified physical object has attached to a roaming network, wherein the identified physical object is roaming when on the roaming network; translating at least one policy intent that was defined at a home network for the identified physical object into a policy suitable to be applied by the roaming network; and sending, to the roaming network, the at least one translated policy intent to be applied to the identified physical object on the roaming network.
Abstract:
The present technology discloses non-transitory computer-readable media, systems, and methods for receiving a notification that an identified physical object has attached to a roaming network, wherein the identified physical object is roaming when on the roaming network; translating at least one policy intent that was defined at a home network for the identified physical object into a policy suitable to be applied by the roaming network; and sending, to the roaming network, the at least one translated policy intent to be applied to the identified physical object on the roaming network.
Abstract:
In one embodiment, a method comprises communicating with a plurality of network elements via a first communication protocol to obtain state information of the plurality of network elements; receiving a request via a second communication protocol for a communication session to be established for a client computing device; selecting one or more network elements, wherein the selection is based on at least a portion of the state information of the network elements; and communicating identification information of the one or more network elements selected for use in the communication session.
Abstract:
First, an authentication module may receive an identification (ID) linking request, create a secured ID linking request from the ID linking request, and send the secured ID linking request to a packet gateway module located in a packet core of a mobile network. Next, the packet gateway module may insert into the secured ID linking request, an encrypted version of a mobile identifier corresponding to a client device from which the secured ID linking request was received. Next, a mobile video session manager module may receive from the packet gateway module, the secured ID linking request and link a subscriber of a managed video service corresponding to a video identifier to the client device corresponding to the mobile identifier. A policy corresponding to the subscriber of the managed video service may then be applied to flows over the packet core to and from the client device.
Abstract:
In one embodiment, a system includes an interface to receive a device identifier which uniquely identifies a first device, a processor to determine at least one characteristic of the first device from the device identifier, and select a first network slice based on the at least one characteristic of the first device, the first network slice including a first plurality of security services countering security risks associated with the at least one characteristic of the first device, wherein the interface is operative to send slice identifier information about the first network slice towards the first device. Related apparatus and methods are also described.
Abstract:
Particular embodiments provide an access gateway that facilitates communication between a plurality of access technologies. The access gateway facilitates data communication with an access terminal through a bearer path. A radio resource manager is configured to provide radio resource management functions for the communications. The radio resource manager is decoupled from the bearer path and provides control of radio transmission characteristics for the bearer path to the gateway. Because the radio resource manager is not in the bearer path, the access gateway may be access technology agnostic. Thus, the access gateway does not need to have access-specific modules based on the radio technology for each bearer path.
Abstract:
Systems, methods, and computer-readable media are disclosed for dynamically onboarding a UE between private 5G networks. In one aspect, a private 5G (P5G) federation system can receive a request from a user device for registration with a serving private 5G network, which is part of a P5G federation system. The P5G federation system can further determine that the user device is authenticated with a home private 5G network of the user device, which is also part of the P5G federation system. The P5G federation system can transmit, to the serving private 5G network, a security profile of the user device that is received from the home private 5G network. As follows, the P5G federation system can facilitate onboarding of the user device to the serving private 5G network with the security profile.