Abstract:
A system described herein may provide a technique for the network-implemented detection of locations that exhibit excessive density of individuals, and/or for the detection of individuals who do not maintain a minimum level of distance between each other. Location information of one or more User Equipment (“UEs”) may be monitored and compared to policy information to determine that the locations exhibit at least a threshold level of population density. Further, remedial measures may be taken when such situations are detected, such as alerting devices that are located within, or are heading towards, such locations.
Abstract:
A device may receive channel data associated with a channel provided between a network and a user device, and may calculate, based on the channel data, key performance indicator data that includes a plurality of key performance indicators for the channel. The device may multiply the plurality of key performance indicators by factors to generate factored key performance indicator data that includes a plurality of factored key performance indicators. The device may apply weights to the plurality of factored key performance indicators of the factored key performance indicator data to generate factored weighted key performance indicator data that includes a plurality of factored weighted key performance indicators. The device may calculate a quality indicator for the channel based on the factored weighted key performance indicator data, and may perform one or more actions based on the quality indicator for the channel.
Abstract:
Systems and methods are provided for network slice selection during an initial connection. A wireless station receives, from a core network device, network slice data for each network slice available via the wireless station, wherein the network slice data includes a slice identifier and corresponding slice characteristics for each network slice. The wireless station receives, from a user equipment (UE) device, a registration request message that indicates a network slice characteristic required by an application being executed on UE device. The wireless station selects, based on the network slice data from the core network device and the network slice characteristic from the UE device, one of the slice identifiers for servicing the UE device.
Abstract:
A method, a device, and a non-transitory storage medium are described in which a traffic control service is provided. The traffic control service may include using user plane congestion information pertaining to a radio access network and a multi-access edge computing system to manage congestion or anticipated congestion.
Abstract:
A device may determine that a user device, connected to a first packet data network gateway (PGW) associated with a first area, is located in a second area associated with a second PGW. The first PGW may be associated with a provider network. The second PGW may be associated with the provider network. The user device may not be connected to the second PGW. The device may cause the user device to be disconnected from the first PGW and connected to the second PGW. The user device may remain connected to the provider network when disconnecting from the first PGW and connecting to the second PGW.
Abstract:
A system comprising: one or more server devices to: set a first network threshold level for determining network congestion in a network; set rate limiting criteria for determining when one or more subscribers will be rate limited; detect an increase in network congestion at a base station above the first network threshold level; identify one or more subscribers meeting one or more of the rate limiting criteria; rate limit network traffic associated with the one or more subscribers; detect a decrease in network congestion at the base station below a second network threshold level; and remove the rate limiting of the network traffic associated with the one or more subscribers.
Abstract:
A network device stores back-off definitions for different service categories of machine-type communications (MTC). The network device receives a service connection request originating from a wireless terminal and identifies the service connection request as a MTC request. The network device identifies an available bandwidth capacity for at least one portion of a network associated with the MTC request and determines, when the available bandwidth is below an admission threshold capacity, an admission control level for the MTC request. The admission control level is selected from a group of different admission control levels. The network device calculates a retry interval for the MTC request based on the determined admission control level for the MTC request and the available bandwidth capacity, and sends the retry interval with a response for the MTC request.
Abstract:
A system may be configured to identify that a user device is connected to a first radio access network (“RAN”), via a first technology; and to identify that the user device is capable of accessing a second RAN, via a second technology. The system may further be configured to instruct the user device to concurrently connect to the second RAN and the first RAN, send or receive a first type of traffic via the first RAN, and send or receive a second type of traffic via the second RAN.
Abstract:
Voice over LTE (VoLTE) services may be provided to a roaming mobile device, even when the home network of the mobile device does not provide VoLTE service. In one implementation, one or more devices in a network may determine based on a mobile device attaching to a network as a roaming device for the network, a home network of the mobile device. The devices may further determine whether the home network, associated with the mobile device, provides VoLTE services; transmit, based on the determination that the home network does not provide VoLTE services, a VoLTE client application to the mobile device, the VoLTE client application providing functionality, for the mobile device, relating to usage of VoLTE services in the network. The devices may further communicate with the mobile device and the VoLTE client application, to provide one or more VoLTE services to the mobile device.
Abstract:
A method, performed by a computer device, may include receiving an indication that a first user has acquired rights to access a digital content; generating a key for the digital content; encrypting the digital content using the generated key to generate encrypted digital content; obtaining a first passcode; and providing the first passcode and the encrypted digital content to a user device associated with the first user. The method may further include receiving, from the user device, a request for the key, wherein the request include the first passcode; determining that the first passcode is valid; determining that the key has not expired; and providing the key to the user device, in response to determining that the first passcode is valid and that the key has not expired.