Abstract:
A mobility management entity (MME) controls an enterprise fabric. The MME receives from a mobile device via a cellular network a request to initiate an attach procedure. In response, the MME acquires from the mobile device a unique equipment identifier of the mobile device. The MME generates an enterprise identity for the mobile device based on the unique equipment identifier, and registers the enterprise identity in the enterprise fabric. The MME signals to a user plane function of the cellular network that the mobile device has been registered, to trigger the user plane function to acquire an Internet Protocol (IP) address of the mobile device based on the enterprise identity. The MME receives from the user plane function the acquired IP address. The MME sends to the mobile device, through the cellular network, an attach accept message that includes the acquired IP address for use by the mobile device.
Abstract:
In one embodiment, a computing device determines a plurality of probability-based trajectories a mobile device could traverse through a plurality of access point (AP) cells within a given area depending on an entry point of the mobile device into the given area. A predictive dwell time may also be associated to each AP cell based on how long a mobile device is expected to remain within the respective AP cell. Based on i) current locations of mobile devices, ii) the plurality of probability-based trajectories a mobile device could traverse through the plurality of AP cells, and iii) the predictive dwell time of each AP cell, the computing device can compute a probability of mobile device density surpassing a potential flash crowd threshold within each AP cell at any given future time. In response, the computing device may then perform one or more mitigation actions.
Abstract:
An example method is provided in one example embodiment and may include receiving a request from a user equipment (UE) to access a wireless access network, wherein the UE is currently accessing one or more other wireless networks; determining by a Policy and Charging Rules Function (PCRF) whether a subscriber associated with the UE is authorized to access the wireless access network based, at least in part, on a profile for the subscriber; and communicating one of a wireless access rejection and a wireless access acceptance to the UE based on the determination. In some instances, the determining can include recovering the profile for the subscriber associated with the UE from a Subscriber Profile Repository (SPR) using an International Mobile Subscriber Identity (IMSI) for the subscriber.
Abstract:
An example method is provided in one example embodiment and may determining, by a first communication device, whether one or more other communication devices are communicating wireless signals in a particular channel of an unlicensed band of the communication network; scheduling one or more Long Term Evolution Unlicensed (LTE-U) sub-frames within a frame schedule for a user equipment (UE) based, at least in part, on determining that one or more communication devices are communicating wireless signals in the particular channel; and communicating the one or more LTE-U sub-frames to the UE according to the frame schedule.
Abstract:
Techniques are provided for a network device to receive a first notification message from a first wireless network operating via a first radio frequency protocol, where the notification message indicates a presence of a mobile device within a radio frequency coverage area of a first wireless access point in the first wireless network. A connection message is transmitted from the network device to the mobile device, where the connection message comprises information configured to initiate a connection of the mobile device to a second wireless network operating via a second radio frequency protocol when a radio frequency coverage area of a second wireless access point in the second wireless network is known to overlap the radio frequency coverage area of the first wireless access point in the first wireless network. The connection message may initiate mobile device connections or transfers between, e.g., macrocell, femtocell, and Wi-Fi networks, among other networks.
Abstract:
Systems, methods, and computer-readable media for an integrated Wi-Fi Access Point and cellular network Radio Unit (RU) include a communication system interfacing with a wired network for communicating Wi-Fi traffic and cellular network traffic, the communication system integrating a Wi-Fi Access Point (AP) with a cellular network Radio Unit (RU). The Wi-Fi traffic and cellular network traffic can be processed in the communication system. The communication system can interface with at least one programmable Radio Frequency (RF) front end configured for wireless communication over one or more frequency bands for Wi-Fi traffic and one or more frequency bands for cellular network traffic (e.g., 5G, LTE, Wi-Fi).
Abstract:
Systems, methods and computer-readable storage media are provided for detecting and simulating issues in a network. The methodology includes identifying: event sequences within network traffic data; filtering out a subset of the event sequences based on characteristics of the subset of the event sequences; generating definition groups by performing clustering on the subset of the event sequences, the definition groups comprising event sequence characteristics associated with one or more network issues; first simulating the subset of the event sequences; generating, based on results of the first simulating, a first issue identification; second simulating a most recent one of the identified event sequences; generating, based on results of the second simulating and the generated definition groups, a second issue identification; and validating the first issue identification with the second issue identification.
Abstract:
Systems and methods are provided for providing, by a user equipment, a short message service (SMS) message to initiate Wi-Fi onboarding to a mobile network, receiving, by the user equipment, a binary SMS message including a request for a certificate signing request by a server, generating, by the user equipment, the certificate signing request based on the request for the certificate signing request of the binary SMS message, providing, by the user equipment, the certificate signing request to the mobile network, and receiving, by the user equipment, a binary SMS message including Wi-Fi login data based on the certificate signing request provided to the mobile network.
Abstract:
An access point for a private network onboards a wireless device obtaining a connection request from the wireless device and detecting a standardized identifier that indicates the wireless device is unprovisioned for access to the private network. The access point disables an authentication protocol for granting access to the wireless device on the private network and limits access of the private network by the wireless device to accessing a provisioning server. The access point provides a connection response to the wireless device that indicates limited access to the private network.
Abstract:
Certain embodiments disclose systems and methods for creating a user private network (UPN) based on 11ay technology. Methods of the present disclosure include creating a personal basic service set (PBSS) having a service device and one or more flay devices, the service device configured to wirelessly communicate with the one or more flay devices in the PBSS, creating a UPN having an access point located in communicative proximity with the service device, and associating at least one 11ay device of the one or more 11ay devices with the UPN, wherein the at least one flay device is configured to establish a wireless connection with the one or more flay devices using the service device when within a coverage area of the PBSS, and to establish a wireless connection with the one or more flay devices using the access point when outside the coverage area of the PBSS.