Abstract:
An example method is provided in one example embodiment and includes receiving an assignment request from a core node in a network to establish a tunnel for user plane traffic; forwarding first parameters to a controller of an enterprise network, wherein the first parameters include a tunnel identifier and a network address associated with the core node; receiving an assignment response; and forwarding second parameters to the core node, wherein the second parameters include a tunnel identifier and a network address associated with the controller. In some instances, the assignment request can be a request to establish a tunnel for user plane data traffic. In some instances, the assignment request can be a request to establish a tunnel for user plane voice traffic.
Abstract:
A method provided in one embodiment includes receiving, at a first network element, a first message including a first network identifier associated with a first network. The first message further includes an indication of an association of the first network identifier with a first user equipment. The method further includes receiving, by the first network element, a second message indicative of an initiated handover of the first user equipment to a second network. The second message includes a second network identifier associated with the second network. The method further includes determining, by the first network element, whether the second network identifier matches the first network identifier, and terminating the initiated handover by the first network element when the second network identifier does not match the first network identifier.
Abstract:
An example method is provided and includes receiving a packet associated with a flow, determining a tunnel identifier for the flow, and determining a flow identifier for the flow. The method includes associating the flow identifier and the tunnel identifier to an Internet protocol (IP) address to generate a binding to be used for a network address and port translation (NAPT). In other embodiments, a routing decision is executed based on the binding between the identifiers and the IP address. The flow identifier can be a context identifier (CID), and the tunnel identifier can be a softwire tunnel ID. In yet other embodiments, the packet can be tagged as part of an encapsulation operation, which includes providing information about a network location at which the network address and port translation is to be executed.
Abstract:
An example method is provided in one example embodiment and may include configuring a Home eNode B (HeNB) with plurality of tracking area identities (TAIs), wherein each TAI is served by one of a plurality of HeNB gateways (HeNB-GWs); configuring a TAI list for a Mobility Management Entity (MME), wherein the TAI list includes each of the plurality of TAIs; broadcasting a first TAI by the HeNB, wherein the first TAI is served by a first HeNB-GW; and switching the broadcasting from the first TAI to a second TAI served by a second HeNB-GW and re-parenting the HeNB from the first HeNB-GW to the second HeNB-GW if the HeNB loses connectivity with the first HeNB-GW.
Abstract:
A method is provided in one embodiment and includes receiving a network address associated with a wireless device at a first network element in which the network address identifies the wireless device on a first network, and receiving user credentials from a directory service associated with a second network. The user credentials identify a user associated with the wireless device on the second network. The method further includes associating the user credentials with the network address, and communicating a request message to a second network element. The request message includes a request for a user identifier identifying the user on a third network. The method further includes receiving a response message from the second network element including the user identifier, associating the user credentials with the user identifier, and storing the association of the user credentials and the user identifier in a whitelist.
Abstract:
An example method is provided in one example embodiment and includes receiving a first communication from a user equipment (UE) for a subscriber associated with the first UE to a small cell network, wherein a plurality core networks (CNs) share resources for the small cell network; selecting a first CN from the plurality of CNs to provide services to the first subscriber via the small cell network based, at least in part, on a first Mobile Country Code (MCC) and a first Mobile Network Code (MNC) for the first subscriber; and storing, in at least one memory element, at least one association of the MCC and the MNC to the CN for use in subsequent requests from other UEs for subscribers to attach to the small cell network.
Abstract:
A method provided in one embodiment includes receiving, at a first network element, a first message including a first network identifier associated with a first network. The first message further includes an indication of an association of the first network identifier with a first user equipment. The method further includes receiving, by the first network element, a second message indicative of an initiated handover of the first user equipment to a second network. The second message includes a second network identifier associated with the second network. The method further includes determining, by the first network element, whether the second network identifier matches the first network identifier, and terminating the initiated handover by the first network element when the second network identifier does not match the first network identifier.
Abstract:
The disclosed technology relates to a process of evaluating any number of different identity providers (IDPs) and their respective set of credentials that are used to authenticate corresponding users to assist with the onboarding of the different IDPs in connection with Wi-Fi identity federations. In particular, the process allows a person's electronic identity and attributes (stored across one or more IDPs) to be determined once using a standard. Once trust has been established for the user, that trust can then be utilized across a number of different systems (e.g., Single-sign on). The same trust determination can be used without the need for the authenticity of the user identity to be re-evaluated with each new access request.
Abstract:
System, methods, and computer-readable media for validating and committing a shared O-RU configuration via a shared O-RU Operator. The shared O-RU Operator validates a partitioned configuration received from a tenant operator, with the ability to indicate to the tenant operator that the partitioned configuration is conformant to agreed-upon sharing rules and then commits the shared configuration to the shared O-RU. The shared O-RU operator shares the outcome of the commit operation to the tenant operator via defined operational-data that can be read by the tenant operator. A single radio in O-RAN is shared by multiple different operators and enables a neutral host to deploy a radio unit and then have that attached to different operators networks.
Abstract:
Provided herein are techniques for providing emergency telecommunication services and application driven profile prioritization for wireless local area network architectures. In one instance, a method can include facilitating, for an emergency call initiated by a wireless device, connection of the wireless device with a radio node; providing a location tag to the wireless device that is associated with a location of the wireless device; obtaining, by an emergency services identity provider, a session initiation protocol (SIP) registration request message from the wireless device that includes the location tag; determining, by the emergency services identity provider, a location of the wireless device based, at least in part, on the location tag; and facilitating the emergency call for the wireless device with a public safety answering point (PSAP) that is determined based on the location of the wireless device in which the location is provided to the PSAP.