Abstract:
A device may include a processor configured to maintain a plurality of session management entities (SMEs) for a core network associated with a radio access network (RAN). The processor may be further configured to establish a communication session using a first SME, of the plurality of SMEs; store session data for the communication session in a communication session database accessible by each of the plurality of SMEs; receive, using a second SME of the plurality of SMEs, a message associated with the communication session; retrieve, using the second SME, session data for the communication session from the communication session database, based on receiving the message; and process, using the second SME, the message using the retrieved session data.
Abstract:
Disclosure are techniques for allocating aggregation devices in a lawful intercept system. In an embodiment, a method includes maintaining a list of point of interception aggregation (PAG) functions in a network function repository function (NRF) of a cellular network upon instantiation of the PAG functions; receiving a lawful intercept (LI) request; querying the NRF to determine a respective PAG function; and associating a point of interception (POI) function with the respective PAG function.
Abstract:
A method, device, and non-transitory computer-readable medium provide for scanning, by a device, a radio service area of a small cell radio access node to detect radio signals of one or more radio frequency (RF) bands, the radio signals including transmissions associated with one or more other small cell radio access nodes that are operating in a vicinity of the small cell radio access node, and the small radio access node being configured to alternately operate at multiple RF bands including the one or more RF bands; determining, by the device, a signal strength associated with each of the one or more RF bands; and dynamically optimizing, by device, operation of the small cell radio access node based on the signal strength associated with each of the one or more RF bands.
Abstract:
A network node residing in a mobile network identifies a first network slice of the mobile network for use by a first session between a first user equipment device (UE) and a first application hosted by a first hosting device. The network node obtains a first security profile based on an identity of the first application and based on the identified first network slice, and establishes, using the obtained first security profile, a first secure tunnel between the network node and the first hosting device for transporting first data units associated with the first session between the network node and the first hosting device.
Abstract:
A mobile network gateway receives, from a user equipment device (UE), a session request for a session between the UE and an application hosted by a hosting device, where the session request includes an application identifier (ID) associated with the application. The mobile network gateway identifies a network slice of a mobile network based on the application ID and an ID associated with the UE, and retrieves a security profile from memory based on the application ID and the identified network slice. The mobile network gateway establishes a secure tunnel between the gateway and the hosting device using the retrieved security profile, and forwards data units associated with the requested session between the UE and the hosting device via the secure tunnel.
Abstract:
At least one network device receives a first network address of a first small cell wireless station that has been registered as an authorized wireless station for network access to a target network. The at least one network device adds the first network address of the first small cell wireless station to a small cell wireless station data structure that lists a plurality of network addresses associated with a plurality of authorized small cell wireless stations, and validates, upon power-up of the first small cell wireless station, the first small cell wireless station against the small cell wireless station data structure to selectively establish a first tunnel, between the first small cell wireless station and a gateway connected to the target network, to enable network access to the target network.
Abstract:
A system described herein may provide a technique for intercepting user equipment (“UE”) traffic based on granular characteristics specified by a law enforcement agency (“LEA”) or other authorized requestor. The granular characteristics may indicated a content type, keywords, and/or other characteristics that the requestor may desire to intercept. Traffic attributes, which may be different from the granular characteristics, may be identified based on the granular characteristics. Network components suited to intercepting traffic having the identified attributes may be provisioned to intercept the traffic.
Abstract:
Examples are disclosed that facilitate using enhanced cell global identifier to effectively manage the handover of cellular communication services for a mobile device in an LTE network from a source, or serving, evolved Node B (eNB) to a target home evolved Node B (HeNB). The increased use of HeNBs to provide service to mobile devices creates issues for the management of tracking area identifiers associated with the eNB and HeNBs and may increase tracking area update (TAU) signaling in the cellular network. The handover of a mobile device moving from an eNB coverage area to a neighboring HeNB coverage area is managed without use of a tracking area identifier by using enhanced cell global identifiers assigned to the respective HeNB. The following provides examples for minimizing the burden on the network devices to manage the administration of TAIs and that may reduce TAU signaling in the cellular network.
Abstract:
Techniques described herein relate to reducing co-channel interference between macrocells and small cells in a heterogeneous network environment. Macrocells and small cells may dynamically select from among multiple interfaces (e.g., an X2 or S1 interface) to communicate FeICIC control communications. In one implementation, the selection may be based on the round trip delay (RTD) time between pairs of nodes. Thus, the macrocells and small cells nodes may dynamically select either the X1 or S1 interface based on whichever of these interfaces has the smallest RTD to the destination radio node.
Abstract:
A server device may store information identifying that one or more first user devices, currently connected to a network device via a particular band, should continue to communicate via the particular band when a connection threshold, associated with the particular band, has been exceeded. The particular band may be associated with a multicast service that provides multicast content to the one or more first user devices via the particular band. The server device may determine that the connection threshold has been exceeded; identify a second user device, currently connected to the network device via the particular band, that should no longer communicate via the particular band when the connection threshold has been exceeded disconnected; and prevent the second user device from communicating via the particular band based on determining that the connection threshold has been exceeded and identifying the second user device.