Abstract:
Techniques for network communications are disclosed. These techniques include receiving a cryptographically generated device identifier (CGDI) and a public key relating to a wireless station (STA). The techniques further include determining a first hash based on decrypting the CGDI using the public key, and validating the first hash for an access network. The techniques further include identifying the STA in the access network using the CGDI based on binding the CGDI to a session associated with the STA and the access network.
Abstract:
Systems and methods for controlling the power of small cells in a coverage area includes obtaining signal strength measurements of wireless signals received from a plurality of small cells in a defined coverage area by identifying signal strength at a plurality of locations near the perimeter of the coverage area, and determining a revised transmit power of the small cells based on the determined signal strength (a) to maintain a minimum threshold of received signal while reducing the average power within the coverage area, or (b) to reduce leakage outside the perimeter of the coverage area relative to a desired threshold.
Abstract:
A method of controlling performance of a wireless device is performed by a node that is in electronic communication with a cellular network. The node includes a processor, a non-transitory memory, and a network interface. The method includes receiving a performance value characterizing a performance of a communication channel between a wireless device and a wireless access point. In some implementations, the wireless device and the cellular network are associated with different radio access technologies (RATs). The method includes determining whether the performance value breaches a performance criterion for the wireless device. The method includes adjusting a first amount of data transmitted to the wireless device from a base station of the cellular network and a second amount of data transmitted to the wireless device from the wireless access point. In some implementations, the combined first and second amounts of data satisfy the performance criterion for the wireless device.
Abstract:
A method for improving performance in a residential/community WiFi network is implemented on a self-optimizing network (SON) server and includes: receiving current configuration details and local performance statistics from SON clients installed in access points (APs) in the residential/community WiFi networks, where at least one of the APs is a residential AP configured to provide WiFi connectivity to both authorized users of the residential AP and a community of WiFi users not associated with the residential AP, analyzing at least the current configuration details and local performance statistics to identify performance issues in the residential/community WiFi network, determining remedial actions based on the analyzing, and instructing the access points to perform the remedial actions via the SON clients.
Abstract:
Systems and methods for small cell idle mode mobility include receiving, at a first small cell of a preconfigured cluster of small cells, a mobility area update request from a user equipment (UE). The method can also include registering location information of the UE with a small cell gateway, and retrieving a core network periodic timer for the UE from a mobility server. If certain conditions are met, the first small cell forwards the mobility area update request to a core network via the small cell gateway. Otherwise, the method can include the first small cell updating the location information of the UE with the mobility server, generating a locally-generated mobility area update accept message, and sending a locally generated mobility area update accept message to the UE along with a local periodic timer instructing the UE to send another mobility area update request when the local periodic timer expires.
Abstract:
Differentiated service in a federation-based access network is provided by receiving a set of credentials from a User Equipment (UE) for a wireless network offering a plurality of service levels. In response to determining that the set of credentials indicate a realm associated with a given service level, network access is provided to the UE according to the given service level. In response to determining that the given service level is not a highest service level in the wireless network, a list of one or more preferred realms is transmitted to the UE, where each realm of the list of one or more preferred realms is associated with one or more higher service levels than the given service level.
Abstract:
Techniques for dynamically negotiating a service legal agreement (SLA) between a roaming device and a visited network (VN) in an identity federation. An identity profile provided to a user device by an identity provider (IDP) is accessed by the user device. The identity profile includes a first SLA criteria. An advertisement from the VN indicating one or more SLAs supported by the VN is received at the user device. The advertisement is received before the user device has associated with the VN. The IDP and the VN are part of a same identity federation. It is determined that the SLA supported by the VN satisfies the first SLA criteria. Upon that determination, an acceptance is transmitted by the user device to the VN, and the user device is associated with the VN.
Abstract:
Differentiated service in a federation-based access network is provided by receiving, with a request for access to a wireless network offering at least a two different service levels based on user identities, a set of user credentials from a User Equipment (UE); forwarding, for authentication, the set of user credentials to an identity provider in an identity federation with the wireless network, wherein the identity provider is independent from the wireless network; in response to determining that the set of user credentials indicate a realm known to be associated with a given service level, providing network access to the UE according to the given service level; and in response to determining that the given service level is not a highest service level in the wireless network, transmitting a list of preferred realms to the UE that are associated with higher service levels than the given service level.
Abstract:
Federation policy exchange is provided in response to receiving a sharing query from an Access Point (AP) indicating that an associated wireless network supports federated identities with data sharing, determining whether the sharing query is within sharing preferences; and in response to determining that the sharing query is within the sharing preferences, transmitting, to the AP, a positive response for identity sharing that authorizes collection and sharing of identity data with at least one entity identified in a sharing policy for the associated wireless network. In various embodiments, federation policy exchange includes transmitting a support notification, via an AP, indicating support for federated identities with data sharing within a wireless network associated with the AP; and in response to receiving a first identify sharing preference from a User Equipment (UE) that indicates that negotiation is preferred, transmitting a sharing policy for the wireless network to the UE.
Abstract:
A method includes linking, at an access node, a first media control access (MAC) address of a device to an identifier of the device to establish a communication session between the access node and the device and during the communication session, receiving, at the access node, an indication of a change of the first MAC address to a second MAC address. The method also includes linking, at the access node, the second MAC address to the first MAC address and the identifier and receiving, at the access node, a communication from the device using the second MAC address while maintaining the communication session.