摘要:
Network operators have deployed multiple network devices to provide stable data services amid a rapid increase in data traffic. One way to balance data load among the multiple network devices is by distributing the user equipments across the multiple network devices using an explicit detach with reattach required procedure. However, the explicit detach with reattach required procedure can disrupt on-going data services of user equipments. This disclosure provides systems and methods of an enhanced explicit detach with reattach required procedure that reduces disruption of on-going data services due to the explicit detach with reattach required procedure.
摘要:
Anchoring a communication session for a mobile node involves a signaling node that intercepts a routing information request sent by a switching center of a circuit-switched network. The routing information request requests routing information for the communication session. Subscription information associated with the mobile node is retrieved. Whether the mobile node is eligible to be anchored in a packet-switched network is established. Anchoring of the communication session in the packet-switched network is initiated if the mobile node is eligible to be anchored in the packet-switched network.
摘要:
In one embodiment, a method includes receiving packet flow optimization (PFO) configuration data that associates each rule name of multiple PFO rule names with a corresponding method for processing a data packet in a communications network based on data in a payload of a layer 3 protocol of the data packet. A first policy message is received from a policy management process in the communications network. The first policy message includes rule data that indicates a signaled rule name associated with a particular network address in the communications network. In response to receiving the first policy message, a data packet of the particular network address is processed according to a particular method associated with a particular rule name selected based on the signaled rule name. As a result, a PFO policy is controlled from the policy management process.
摘要:
In one embodiment, a method for providing correlation of billing entries for a mobile communications network is provided. A correlating network element in a bearer path determines a plurality of billing entries for a flow. One or more of the billing entries may be received from other network elements and includes traffic altering information for a flow. The correlating network element correlates the plurality of billing entries using state information included in the billing entries. The state information is used to determine information in billing entries that may be related, such as billing entries for a single flow. Also, the correlating network element uses the traffic altering information to determine a data volume sent for the flow. A correlated billing entry may then be generated using the data volume for the flow. The correlated billing entry is then sent to a billing system from the correlating network element. Billing entries are not sent from other network elements that may be generating billing entries in a link to the billing system.
摘要:
In one embodiment, a method includes receiving packet flow optimization (PFO) configuration data that associates each rule name of multiple PFO rule names with a corresponding method for processing a data packet in a communications network based on data in a payload of a layer 3 protocol of the data packet. A first policy message is received from a policy management process in the communications network. The first policy message includes rule data that indicates a signaled rule name associated with a particular network address in the communications network. In response to receiving the first policy message, a data packet of the particular network address is processed according to a particular method associated with a particular rule name selected based on the signaled rule name. As a result, a PFO policy is controlled from the policy management process.
摘要:
A method is provided in one embodiment and includes receiving a request for a session at a network element; communicating a query for whitelist data to a provisioning element; receiving the whitelist data at the network element; and communicating a message to an access point that communicated the request, where the message is indicative of whether the session is to be accepted or denied based on the whitelist data. In more specific implementations, the network element is a gateway configured to receive the whitelist data via a RADIUS access accept message. In addition, source Internet protocol (IP) address verification associated with the session can be executed before a wireless device associated with the access point is permitted access to a network.
摘要:
In one embodiment, a method for providing correlation of billing entries for a mobile communications network is provided. A correlating network element in a bearer path determines a plurality of billing entries for a flow. One or more of the billing entries may be received from other network elements and includes traffic altering information for a flow. The correlating network element correlates the plurality of billing entries using state information included in the billing entries. The state information is used to determine information in billing entries that may be related, such as billing entries for a single flow. Also, the correlating network element uses the traffic altering information to determine a data volume sent for the flow. A correlated billing entry may then be generated using the data volume for the flow. The correlated billing entry is then sent to a billing system from the correlating network element. Billing entries are not sent from other network elements that may be generating billing entries in a link to the billing system.
摘要:
According to one embodiment of the present invention, there is provided a method for providing security in a network environment that includes receiving a flow that propagates through an access gateway. The flow is initiated by an end user associated with the flow and propagates through a network. The method also includes receiving accounting information indicative of the termination of the flow. In response, tearing down of the communication associated with the flow is initiated.