Abstract:
In one embodiment, a device receives, from a requestor, a query function that queries a dataset and an intended use schema associated with the query function. The device determines, using a policy ruleset, whether the intended use schema falls within an available schema for the dataset. The device executes the query function on the dataset to form a result data, when the intended use schema falls within the available schema for the dataset. The device provides the result data to the requestor.
Abstract:
Presented herein are techniques to facilitate fast roaming between a mobile network operator-public (MNO-public) wireless wide area (WWA) access network and an enterprise private WWA access network. In one example, a method is provided that may include generating, by an authentication node, authentication material for a user equipment (UE) based on the UE being connected to a public WWA access network, wherein the public WWA access network is associated with a mobile network operator, and the authentication node and the UE are associated with an enterprise entity; obtaining, by the authentication node, an indication that the UE is attempting to access a private WWA access network associated with the enterprise entity; and providing, by the authentication node, the authentication material for the UE, wherein the authentication material facilitates connection establishment between the UE and the private WWA access network.
Abstract:
In one illustrative example, an interface between a user plane function (UPF) instance of a mobile network and a tunnel router endpoint of an enterprise software-defined wide area network (SD-WAN) fabric is provided. The UPF instance may be part of a network slice that is (uniquely) associated with an enterprise of the enterprise SD-WAN. A plurality of mappings between policies associated with different QoS flows via the UPF instance and SD-WAN policies associated with different virtual private networks (VPNs) of the SD-WAN fabric may be maintained. Each VPN of the SD-WAN fabric may be associated with a different underlying transport mechanism that satisfies characteristics of a specific SD-WAN policy. Communications for user equipment (UE) in the mobile network may be facilitated across the SD-WAN fabric based on the policy mappings.
Abstract:
Techniques are described to provide multipath mobility via Domain Name System-as-an-Authoritative Source (DNS-AS) techniques. In one example, a method includes obtaining, by a multipath policy decision element, a plurality of multipath policy recommendations for an application, wherein the plurality of multipath policy recommendations are obtained from one or more multipath policy recommendation elements; combining the plurality of multipath policy recommendations to generate a policy enforcement decision, wherein the policy enforcement decision identifies, at least in part, one or more network paths that are to be utilized for one or more packet flows associated with the application, wherein each of the one or more network paths is associated with an access type; and enforcing the policy enforcement decision for one or more packet flows associated with the application.
Abstract:
Techniques are provided for downlink packet replication to support handovers. In one example, downlink packet replication occurs on a fabric node in an S1AP handover scenario. In another example, downlink packet replication occurs on a source Access Point (AP) using a target AP as a secondary AP in an S1AP handover scenario. In yet another example, downlink packet replication occurs on a source AP using packet encapsulation in an S1AP handover scenario. In still another example, downlink packet replication occurs on a source AP in an X2 handover scenario. Similar techniques are provided for any suitable telecommunications/cellular technology.
Abstract:
Techniques are described to provide multipath mobility via Domain Name System-as-an-Authoritative Source (DNS-AS) techniques. In one example, a method includes obtaining, by a multipath policy decision element, a plurality of multipath policy recommendations for an application, wherein the plurality of multipath policy recommendations are obtained from one or more multipath policy recommendation elements; combining the plurality of multipath policy recommendations to generate a policy enforcement decision, wherein the policy enforcement decision identifies, at least in part, one or more network paths that are to be utilized for one or more packet flows associated with the application, wherein each of the one or more network paths is associated with an access type; and enforcing the policy enforcement decision for one or more packet flows associated with the application.
Abstract:
Techniques that provide enterprise slice management are described herein. In one embodiment, a method includes providing an enterprise service template to an enterprise, the enterprise service template comprising parameter input fields for indicating enterprise devices associated with the enterprise, services to be provided to the enterprise devices using a mobile network, and service options associated with the services; determining one or more mobile network services to be provided to a plurality of enterprise devices and one or more service options associated with the one or more mobile network services; identifying, based on the one or more mobile network services, an enterprise slice to provide the one or more mobile network services; and provisioning the enterprise slice based on the one or more mobile network services, the plurality of enterprise devices, and the one or more service options associated with the one or more mobile network services.
Abstract:
In one illustrative example, an interface between a user plane function (UPF) instance of a mobile network and a tunnel router endpoint of an enterprise software-defined wide area network (SD-WAN) fabric is provided. The UPF instance may be part of a network slice that is (uniquely) associated with an enterprise of the enterprise SD-WAN. A plurality of mappings between policies associated with different QoS flows via the UPF instance and SD-WAN policies associated with different virtual private networks (VPNs) of the SD-WAN fabric may be maintained. Each VPN of the SD-WAN fabric may be associated with a different underlying transport mechanism that satisfies characteristics of a specific SD-WAN policy. Communications for user equipment (UE) in the mobile network may be facilitated across the SD-WAN fabric based on the policy mappings.
Abstract:
A method is provided in one example embodiment and may include receiving a scheduling command for a subframe at a Remote Radio Unit (RRU), wherein the scheduling command provides a subframe configuration for the subframe; determining whether the subframe configuration comprises at least one resource block gap for the subframe; and if the subframe configuration comprises a resource block gap, utilizing the at least one resource block gap to accommodate one or more previously allocated resource blocks for one or more user equipment served by the RRU for which at least one of a previous downlink transmission has failed or a previous uplink grant has been delayed. In some instances, the subframe configuration can be associated with downlink transmissions and uplink transmissions for one or more user equipment served by the RRU.
Abstract:
A method is provided in one example embodiment and may include monitoring, by a radio access network (RAN) orchestration function, impairments between a plurality of candidate locations interconnected by a transport network, wherein one or more network elements capable of performing one or more operations associated with a RAN are located at the plurality of candidate locations; determining a decomposition of one or more operations associated with the RAN into a plurality of sets of virtualized network functions (VNFs) to execute the operations; determining a distribution of the plurality of sets of VNFs among the one or more network elements associated with the RAN for one or more optimal locations of the plurality of candidate locations based, at least in part, on the monitored impairments; and instantiating the plurality of sets of VNFs at each of the one or more optimal locations.