Abstract:
A method and apparatus can be configured to transmit first policy rules to a packet-data-network gateway. The first policy rules are configured to be installed on the packet-data-network gateway. The first policy rules are configured to enable the packet-data-network gateway to create first route-header information. The method can also include transmitting second policy rules to an interworking gateway. The second policy rules are configured to be installed on the interworking gateway. The second policy rules are configured to enable the interworking gateway to create second route-header information.
Abstract:
A method and apparatus can be configured to transmit, by a first user equipment, a first communication. The method can also receive, by the first user equipment, a group communication. The group communication is directed to a group. The group comprises the first user equipment and a second user equipment. The group communication comprises the first communication. The group communication also comprises an identifier that identifies the first communication of the group communication as originating from the first user equipment. The method can also identify, by the first user equipment, that the first communication of the group communication originates from the first user equipment based on the identifier. The method can also ignore the first communication of the group communication.
Abstract:
Various communication systems may benefit from appropriate restriction on use. For example, certain wireless communication systems may benefit from radio-access-technology-specific access restrictions. A method can include registering a user equipment with a network element. The registering can include identifying user equipment capabilities. The method can also include receiving a response from the network element indicating restriction on use of at least one radio access technology.
Abstract:
Systems, methods, apparatuses, and computer program products for dynamic subscription handling are provided. One method includes receiving, by a control node in a network, a request in which a user equipment requests to register with the network or requests to obtain a specific service for a certain access point name. The method may then include determining whether the user equipment is authorized to obtain services from the network or authorized to use the access point name. When it is determined that the user equipment is not authorized to obtain services from the network or not authorized to use the access point name, the method includes re-directing the user equipment to a subscription server, sending a response to the user equipment indicating that the request is rejected with re-direction, and triggering establishment of a packet data connectivity session for the user equipment.
Abstract:
Systems, methods, apparatuses, and computer program products for interworking between bearer-less networks and bearer-based networks are provided. One method includes receiving, by a network entity in a bearer-less network, a context request to obtain user equipment context information for a user equipment moving from the bearer-less network to a bearer-based network. The method may further include providing a context response comprising the context information to a network entity in the bearer-based network, the context information used to establish bearers for the user equipment to obtain internet protocol (IP) based services.
Abstract:
Systems, methods, apparatuses, and computer program products for interworking between bearer-less networks and bearer based networks are provided. One method includes receiving, by a network entity in a bearer-less network, a context request to obtain user equipment context information for a user equipment moving from the bearer-less network to a bearer-based network. The method may further include providing a context response comprising the context information to a network entity in the bearer-based network, the context information used to establish bearers for the user equipment to obtain internet protocol (IP) based services.
Abstract:
Various communication systems may benefit from improved handover procedures. For example, certain handover procedures involving edge clouds in a 5G or LTE network may benefit from a more seamless handover during communication. A method may include receiving at a first application server located in a first cloud a handover notification that a user equipment is moving to a radio network being served by a second application server located in a second cloud, where the application server is running an application session for the user equipment. The method may also include transferring the application session to the second application server.
Abstract:
Various communication systems may benefit from appropriate restriction on use. For example, certain wireless communication systems may benefit from radio-access-technology-specific access restrictions. A method can include registering a user equipment with a network element. The registering can include identifying user equipment capabilities. The method can also include receiving a response from the network element indicating restriction on use of at least one radio access technology.
Abstract:
It is provided a method, comprising supervising if an information in a registration request is received from a registrar of a network domain, wherein the information comprises an application identity of a user of a terminal device and a network identity; storing, based on the received information, a binding between the application identity and the network identity; determining the network identity based on the binding and a received first request for establishing a communication to the terminal device; providing, based on the received first request, to the network domain, a second request for establishing the communication towards the terminal device, wherein the second request is based on the determined network identity.
Abstract:
A system, a method, an apparatus, and a computer program product for general packet radio service (GPRS) tunneling protocol control plane (GTP-C) overload control is provided. One method includes sending a message indicating overload to a network entity. The message may comprise a back-off time value to indicate the overload. The method may further include selectively reducing signaling based on the message.