Abstract:
Techniques are provided to manage how router advertisement messages are forwarded for ultimate wireless transmission in a wireless network. In one embodiment, a multicast router advertisement message intended for a virtual local area network is converted into individual unicast router advertisement messages directed to specific wireless mobile client devices that are part of that virtual local area network. In another embodiment, router advertisement messages are routed between controllers according to the current location of a wireless mobile client device. In still other embodiments, techniques are provided to minimize the volume of the router advertisement messages sent over a wireless network, and to proactively send a unicast router advertisement message to a mobile client device that has performed a handoff, without waiting for a router solicitation message.
Abstract:
Techniques are provided to manage how router advertisement messages are forwarded for ultimate wireless transmission in a wireless network. In one embodiment, a multicast router advertisement message intended for a virtual local area network is converted into individual unicast router advertisement messages directed to specific wireless mobile client devices that are part of that virtual local area network. In another embodiment, router advertisement messages are routed between controllers according to the current location of a wireless mobile client device. In still other embodiments, techniques are provided to minimize the volume of the router advertisement messages sent over a wireless network, and to proactively send a unicast router advertisement message to a mobile client device that has performed a handoff, without waiting for a router solicitation message.
Abstract:
Techniques for establishing connections between user devices and access points to connect to networks. Access points may indicate privacy-support capabilities, enabling a user device to discover privacy-capable access networks, and use this capability for network selection. Furthermore, the techniques enable the user device to request to enable and/or disable privacy support on an on-demand basis. The techniques described herein include the use of an access point that indicates the network's privacy capability to an endpoint device (e.g., source device, user device, etc.) over one or more link-layer messages, IP address configuration mechanisms, and over authentication protocols.
Abstract:
A network function is configured to initiate a bulk session cleanup with a single release request. The network function detects a configuration change to a wireless network system that affects multiple user sessions for multiple user devices. The network function generates a single bulk session release request identifying the affected user sessions and provides the single bulk session release request to at least one other network function responsible for the user sessions.
Abstract:
Presented herein are techniques to facilitate delivering standalone non-public network (SNPN) credentials from an enterprise authentication server to a user equipment (UE) using an Extensible Authentication Protocol (EAP) process. In one example, a method may include determining, by an authentication server of an enterprise, that a UE for the enterprise is to receive credentials to enable the UE to connect to a SNPN of the enterprise in which the determining is performed based, at least in part, on connection of the UE to an access network that is different than the SNPN for the enterprise; and performing an authentication process with the UE by the authentication server in which the authentication process includes providing the credentials to the UE via a first authentication message and obtaining confirmation from the UE via a second authentication message that indicates successful provisioning of the credentials for the UE.
Abstract:
In an enterprise network environment where there is deployment of two (or more) types of access network technologies, when a terminal device is unable to connect to one of the access networks, techniques are presented herein that the terminal device and the network can use for sharing error conditions/cause codes/remedial hints on the access technology that the terminal device is able to connect. With this approach, self-healing, proactive reporting and diagnostic actions are brought to terminal device access connectivity issues.
Abstract:
Supporting Multipath Transmission Control Protocol (MPTCP) subflows using multipath links, and more specifically supporting MPTCP subflows using Wi-Fi Multi-Link Operation (MLO) or cellular multi-link support may be provided. A multipath link may be established between an Access Point (AP) and a station (STA). The STA may mark the multipath link as Multipath Transmission Control Protocol (MPTCP) capable. Next, a request for an addition of a MPTCP subflow may be received. In response to receiving the request, the MPTCP subflow may be bound to the multipath link, and data from the MPTCP subflow may be sent over the multipath link.
Abstract:
Presented herein are techniques to facilitate providing slice attribute information to a user equipment (UE) for one or more slice types with which the user equipment is allowed to establish one or more session(s). In one example, a method may include obtaining, by a network element, a registration request for connection of a UE to a mobile network; performing an authentication for connection of the UE to the mobile network; and upon successful authentication, providing, by the network element, a registration response to the UE, wherein the registration response identifies one or more network slice types with which the UE is authorized to establish a session and the registration response identifies one of: attribute information for each of the one or more network slice types or network location information from which attribute information for each of the one or more network slice types is to be obtained.
Abstract:
Presented herein are techniques to provide sponsored data to a user equipment in a mobile network environment. For example, techniques provided herein may provide for the ability to enhance sponsored data connectivity by enabling a mobile network to facilitate sponsorship of a network slice as part of sponsored data connectivity in which the network slice can provide traffic flow specific Service Level Agreement (SLA) connectivity and treatment. In one example, a method is provided that includes determining, via a first session of a user equipment (UE), that the UE seeks to access content in which financial sponsorship for accessing the content by the UE is to be provided by a sponsoring entity in which the first session involves a first network slice and enabling the UE to establish a second session to access the content in which the second session involves a second network slice.
Abstract:
This disclosure describes techniques and mechanisms for performing user defined network (UDN) service authorization based on secondary identity credentials within a wireless network. For instance, the techniques may include receiving, from a user device, a first request to access a wireless network (e.g., such as a WLAN), where the first request may include primary access credentials for accessing the WLAN. Once primary access authentication of the user device is complete, the techniques may include receiving a second request from the user device to access a UDN group within the wireless network. The second request can include secondary credentials for accessing the UDN group. In response to the second request, a secondary EAP dialogue may be established to authenticate the user device using the secondary credentials. Once the secondary credentials are authenticated, the techniques may include granting the user device access to the UDN group.