Abstract:
An example apparatus for control channel determination and detection in an opportunistic wireless network environment is provided and includes a processor; and a memory in communication with the processor. The processor configured is to send, by a first device, a request for a whitespace map, the whitespace map including a list of whitespace frequency channels available for use within a particular geographical area. The processor is further configured to receive the whitespace map by the first device, and determine, by the first device, a control channel map from the whitespace map using a probability algorithm. The control channel map is a subset of the white space map and includes a list of control channel frequencies.
Abstract:
In one embodiment a router connects to a cellular network using at least one authentication credential stored on a smart card of the router. The router receives, from a client device coupled to the router, a Session Initiation Protocol (SIP) request to register with an Internet Protocol Multimedia Subsystem (IMS) network coupled to the cellular network. The router sends a SIP registration request for the client device to the IMS network, the SIP registration request comprising authorization information associated with the router, wherein the authorization information associated with the router is used by the IMS network to register the client device with the IMS network.
Abstract:
An example method is provided and includes receiving a packet associated with a flow, determining a tunnel identifier for the flow, and determining a flow identifier for the flow. The method includes associating the flow identifier and the tunnel identifier to an Internet protocol (IP) address to generate a binding to be used for a network address and port translation (NAPT). In other embodiments, a routing decision is executed based on the binding between the identifiers and the IP address. The flow identifier can be a context identifier (CID), and the tunnel identifier can be a softwire tunnel ID. In yet other embodiments, the packet can be tagged as part of an encapsulation operation, which includes providing information about a network location at which the network address and port translation is to be executed.
Abstract:
Provided herein are techniques to facilitate radio access network sharing for a Multi-Operator Core Network (MOCN) environment. In one instance, a method may include obtaining, by a radio node of a shared RAN, home mobile network identifiers that are associated with a home access and mobility management function (AMF) in which the home mobile network identifiers are obtained from a first transit AMF that include first priority values and from a second transit AMF that include second priority values. The method may further include obtaining a control plane communication from a user equipment (UE) including a particular home mobile network identifier, identifying the first transit AMF or the second transit AMF that is associated with a highest priority value for the particular home mobile network identifier; and transmitting the communication to the identified transit AMF that is to proxy control plane communications between the UE and the home AMF.
Abstract:
Techniques are described for extending a cellular quality of service bearer through an enterprise fabric network. In one example, a method obtaining, by a first switch of a network, a packet to be delivered to a client connected to the network via a cellular access point; identifying quality of service (QoS) bearer information associated with the packet, wherein the QoS bearer information is associated with a radio access bearer for the client and the QoS bearer information comprises a bearer indicator and a QoS class identifier; providing a fabric tunnel encapsulation for the packet, wherein the bearer indicator and the QoS class identifier are included within the fabric tunnel encapsulation of the packet; and forwarding the packet within the fabric tunnel encapsulation toward a second switch of the network via a fabric tunnel, wherein the cellular access point is connected to the network via the second switch.
Abstract:
Provided herein are techniques for providing emergency telecommunication services and application driven profile prioritization for wireless local area network architectures. In one instance, a method can include facilitating, for an emergency call initiated by a wireless device, connection of the wireless device with a radio node; providing a location tag to the wireless device that is associated with a location of the wireless device; obtaining, by an emergency services identity provider, a session initiation protocol (SIP) registration request message from the wireless device that includes the location tag; determining, by the emergency services identity provider, a location of the wireless device based, at least in part, on the location tag; and facilitating the emergency call for the wireless device with a public safety answering point (PSAP) that is determined based on the location of the wireless device in which the location is provided to the PSAP.
Abstract:
Presented herein are techniques to provide for the ability to utilize 3GPP-generated Session Keys that can be generated via a primary authentication or a secondary authentication process for a user equipment (UE) via a private wireless wide area (WWA) access network in which the keys can be leveraged to facilitate connection of the UE to a wireless local area (WLA) access network. In one example, a method may include obtaining a request to authenticate a UE for connection to a WWA access network; determining that the UE is capable of a Fast Transition (FT) capability; authenticating the UE for connection to the WWA access in which, based on the FT capability, the authenticating includes generating a root security key for the UE; and upon determining that the UE is attempting to access the WLA access network, providing the root security key for the UE to the WLA access network.
Abstract:
Techniques are described to provide for authentication and subscription management that are decoupled from a Home Subscriber Server (HSS). In one example, a method includes providing a device profile at an authentication function, wherein the device profile comprises identification information for a device for a plurality of access types including a first identifier for the device associated with a cellular access and a second identifier for the device associated with a wireless local area network access; obtaining an access request message associated with the device for the cellular access, wherein the access request message comprises the first identifier and an authentication attribute; generating authentication information for authenticating the device for the cellular access based, at least in part, on the authentication attribute; and generating, for transmission, an access accept message for the cellular access, wherein the access accept message comprises the first identifier, the second identifier, and the authentication information.
Abstract:
Presented herein are techniques to provide a network-initiated group disconnect for wireless devices belonging to one or more device group(s). In one example, a method may include determining, by a control element of a network, that at least one device group is to be disconnected from the network, wherein the at least one device group comprises a plurality of wireless devices connected to the network; identifying one or more access network radios through which the plurality of wireless devices are connected to the network; and triggering a disconnect command for the at least one device group to be broadcast from each of the one or more access network radios to trigger the plurality of wireless devices to disconnect from the network.
Abstract:
A user device operates a first data session using a first network slice. The user device obtains a trigger notification from a remote application that identifies a second network slice, and the user device determines that the first network slice and the second network slice are mutually exclusive. The user device ends the first data session on the first network slice and initiates a second data session on the second network slice.