Abstract:
A method is provided in one example embodiment and may include monitoring, by a radio access network (RAN) orchestration function, impairments between a plurality of candidate locations interconnected by a transport network, wherein one or more network elements capable of performing one or more operations associated with a RAN are located at the plurality of candidate locations; determining a decomposition of one or more operations associated with the RAN into a plurality of sets of virtualized network functions (VNFs) to execute the operations; determining a distribution of the plurality of sets of VNFs among the one or more network elements associated with the RAN for one or more optimal locations of the plurality of candidate locations based, at least in part, on the monitored impairments; and instantiating the plurality of sets of VNFs at each of the one or more optimal locations.
Abstract:
An example method is provided in one example embodiment and can include obtaining, within a radio access network, a channel state for a data channel associated with a mobile terminal; including the channel state in a differentiated services (diffserv) marking within an Internet Protocol (IP) header of at least one IP packet associated with the mobile terminal; and transmitting the at least one IP packet including the IP header having the diffserv marking toward a packet data network.
Abstract:
Presented herein are techniques to facilitate fast roaming between a mobile network operator-public (MNO-public) wireless wide area (WWA) access network and an enterprise private WWA access network. In one example, a method is provided that may include generating, by an authentication node, authentication material for a user equipment (UE) based on the UE being connected to a public WWA access network, wherein the public WWA access network is associated with a mobile network operator, and the authentication node and the UE are associated with an enterprise entity; obtaining, by the authentication node, an indication that the UE is attempting to access a private WWA access network associated with the enterprise entity; and providing, by the authentication node, the authentication material for the UE, wherein the authentication material facilitates connection establishment between the UE and the private WWA access network.
Abstract:
A method, computer system, and computer program product are provided for obfuscating and storing data. A data object is obtained comprising data for storing to a plurality of distributed ledgers. Sequence information is obtained indicating a number of a plurality of data portions into which the data object is divided, and instructions for storing the plurality of data portions to the plurality of distributed ledgers. The plurality of data portions is generated by dividing the data object according to the number. The plurality of distributed ledgers are determined to store the plurality of data portions based on the instructions indicated by the sequence information. The plurality of data portions is stored across the plurality of distributed ledgers by accessing the plurality of distributed ledgers, wherein each data portion is stored to a particular distributed ledger of the plurality of distributed ledgers according to the instructions indicated by the sequence information.
Abstract:
Presented herein are techniques to facilitate fast roaming between a mobile network operator-public (MNO-public) wireless wide area (WWA) access network and an enterprise private WWA access network. In one example, a method is provided that may include generating, by an authentication node, authentication material for a user equipment (UE) based on the UE being connected to a public WWA access network, wherein the public WWA access network is associated with a mobile network operator, and the authentication node and the UE are associated with an enterprise entity; obtaining, by the authentication node, an indication that the UE is attempting to access a private WWA access network associated with the enterprise entity; and providing, by the authentication node, the authentication material for the UE, wherein the authentication material facilitates connection establishment between the UE and the private WWA access network.
Abstract:
In one embodiment, a data sharing platform performs a series of data operations to provide different types of data via different sharing services of the data sharing platform that are derived from data shared by a particular data owner. The data sharing platform generates tag data associated with the particular data owner for one or more of the series of data operations. The data sharing platform determines, based on the tag data, an attribution chain that links the data shared by the particular data owner to the different types of data provided via the different sharing services. The data sharing platform sends an indication of the attribution chain for display.
Abstract:
An enterprise controller of an enterprise network sends to a service gateway of a service provider network a request for network slice information about network slices provisioned on a data plane of the service provider network. Responsive to the sending, the enterprise controller receives from the service gateway the network slice information including identifiers of and properties associated with the network slices. Responsive to receiving a request for the network slice information from a network device at a border of a forwarding plane of the enterprise network, the enterprise controller sends the network slice information to the network device to cause the network device to perform configuring network traffic in the forwarding plane with identifiers of ones of the network slices that match the network traffic, and to perform forwarding the network traffic configured with the identifiers to the data plane of the service provider network.
Abstract:
A first data plane is established between a user equipment device and a gateway device, wherein the user equipment device comprises a 3rd Generation Partnership Project (3GPP) user equipment device, and wherein the first data plane comprises a 3GPP data plane. A second data plane is established between the gateway device and an anchor device, wherein the second data plane comprises a Proxy Mobile Internet Protocol version 6 (PMIPv6) data plane. Mobility management is performed for the user equipment device via communications between the gateway device and the anchor device.
Abstract:
An enterprise controller of an enterprise network sends to a service gateway of a service provider network a request for network slice information about network slices provisioned on a data plane of the service provider network. Responsive to the sending, the enterprise controller receives from the service gateway the network slice information including identifiers of and properties associated with the network slices. Responsive to receiving a request for the network slice information from a network device at a border of a forwarding plane of the enterprise network, the enterprise controller sends the network slice information to the network device to cause the network device to perform configuring network traffic in the forwarding plane with identifiers of ones of the network slices that match the network traffic, and to perform forwarding the network traffic configured with the identifiers to the data plane of the service provider network.
Abstract:
In one embodiment, a device receives, from a requestor, a query function that queries a dataset and an intended use schema associated with the query function. The device determines, using a policy ruleset, whether the intended use schema falls within an available schema for the dataset. The device executes the query function on the dataset to form a result data, when the intended use schema falls within the available schema for the dataset. The device provides the result data to the requestor.