Abstract:
In one implementation, the method comprises, in response to obtaining a request to associate an electronic device with the one or more WLAN termination nodes: generating, between a base station and a networking device, a control link based on a first identifier associated with the base station; generating, between the networking device and a first WLAN termination node, a control link based on a second identifier that corresponds to a pseudonym for the base station; and associating the first and second identifiers in a control table. The method further comprises: instantiating, between the base station and the networking device, a first data tunnel associated with a first tunneling protocol; instantiating, between the networking device and the first WLAN termination node, a second data tunnel associated with a second tunneling protocol; and associating the first and second data tunnels.
Abstract:
In one implementation, the method comprises, in response to obtaining a request to associate an electronic device with the one or more WLAN termination nodes: generating, between a base station and a networking device, a control link based on a first identifier associated with the base station; generating, between the networking device and a first WLAN termination node, a control link based on a second identifier that corresponds to a pseudonym for the base station; and associating the first and second identifiers in a control table. The method further comprises: instantiating, between the base station and the networking device, a first data tunnel associated with a first tunneling protocol; instantiating, between the networking device and the first WLAN termination node, a second data tunnel associated with a second tunneling protocol; and associating the first and second data tunnels.
Abstract:
In one embodiment, an apparatus comprising networking circuitry adapted to receive, at a mobile network operated by an SP, flows associated with enterprise applications executing on device(s) in an enterprise network, the device(s) including a CPE and/or one or more devices behind the CPE, and processing circuitry adapted to vary, during a duration in which there is IP connectivity between the CPE and the mobile network, a pool of dedicated bearers for binding the flows, in response to at least part of changes occurring during the duration with respect to the flows, wherein the changes include variations during the duration in number of the flows and/or differences during the duration in detected characteristics of the flows, the detected characteristics of the flows having been detected based on inspection of respective packet(s) of the flows, and bind at least part of the flows to respective dedicated bearers included in the pool.
Abstract:
An example method is provided in one example embodiment and may include receiving a session request for a user equipment (UE) at a node, wherein the session request includes a timestamp for the UE and a retry count; determining if the session request is a stray session request; and maintaining session information for an existing session for the UE at the node if the session request is a stray session request. The method can include identifying the received session request as a stray request if the timestamp received in the request is less than a timestamp stored for an existing session for the UE. The method can also include identifying the received request as a stray request if the timestamp received is equal to the timestamp stored for the existing session and if the retry count received is less than or equal to a retry count stored for the session.
Abstract:
An example method is provided in one example embodiment and includes establishing a mobility context associated with a user equipment that includes a designation of a first radio access network as a primary access network and a second radio access network as a secondary access network. The method further includes defining an initial value for a data count variable representative of a number of consecutive uplink packets associated with the user equipment received over the first radio access network. The method further includes receiving at least one first uplink packet associated with the user equipment from at least one of the first radio access network and the second radio access network, modifying a value of the data count variable when the first uplink packet is received over the second radio access network, setting the value of the data count variable to the initial value of the data count variable when the first uplink packet is received over the first radio access network, and modifying the mobility context if the value of the data count variable is equal to a predetermined value.
Abstract:
In one illustrative example, a unified data management (UDM) of a mobile network is established in a UDM set with a plurality of private network UDMs instances of a plurality of private mobile networks. The UDM of the mobile network provides access to a plurality of subscription profiles associated with a plurality of subscribers of the mobile network, and each private network UDM instance provides access to a subset of the subscription profiles associated with a subset of the subscribers in the private mobile network. The UDM of the mobile network operates to communicate, in an authentication procedure, authentication data for authentication of a user equipment (UE) in the mobile network. After the authentication of the UE in the mobile network, the UDM operates to push authentication status information of the UE to the private network UDM instance of the private mobile network.
Abstract:
A Radio Access Network (RAN) element provides an internet indication to a User Equipment (UE) to enable the UE to quickly obtain internet access. The RAN element determines that the RAN element is connected to at least one gateway that provides public internet access, and broadcasts an internet indication. The RAN element determines that the UE has requested public internet access via the RAN element and provides the UE with public internet access.
Abstract:
Systems, methods, and computer-readable media are provided for optimizing utilization of available network slices, where such slices are created for specific applications/purposes. In one aspect, a method includes establishing a Protocol Data Unit (PDU) session for a mobile device on a default network slice; determining an application to be used on the mobile device; determining a specific network slice for servicing the application used on the mobile device; and configuring the mobile device to use the application on the specific network slice.
Abstract:
Provided herein are techniques to facilitate service-based network function (NF) selection for roaming scenarios involving multiple home core networks. In one instance, a method may include obtaining, by a visited public land mobile network (PLMN) from a home PLMN that is to provide a first service for a wireless device, service hosting information that identifies a service hosting data network name and a service hosting PLMN that is to provide a second service for the wireless device in which the service hosting information is obtained by the visited PLMN through registration of the wireless device with the home PLMN. Upon determining that a session for the second service is to be established for the wireless device, the method may include performing a NF query to the service hosting PLMN identified from the service hosting information obtained through the registration in order to identify a NF to facilitate the session.
Abstract:
The present disclosure is directed to migrating network traffic from a licensed spectrum to an unlicensed spectrum within the same radio access technology (RAT). In one aspect, a method includes identifying a user device connected to a cellular wireless access technology, over a licensed spectrum; determining whether a condition for switching network traffic associated with the user device to an unlicensed spectrum is triggered; in response to determining that the condition is triggered, determining an unlicensed spectrum to move the network traffic to, the unlicensed spectrum being within a same cell as the licensed spectrum or in a different cell compared to a cell in which the licensed spectrum is; and migrating at least a portion of the network traffic to the unlicensed spectrum while maintaining network connectivity of the user device over the cellular wireless access technology.