摘要:
There is provided an authentication method and system where protection of user equipment (UE) privacy and network security can be improved. The system includes a third party communicatively trusted by and connected to the UE and one or more network entities, the third party configured to obtain identity information indicative of identity of the UE or the network entities and verify the UE and the network entities on whether the UE and the network entities are authorized to perform communications in the communication network. The third party is further configured to create mapping information, the mapping information including mappings between each identity indicated by the identity information and a respective temporary authentication identifier (ID) and according to the mapping information, transmit the respective temporary authentication ID to each of the UE and the network entities that are verified successfully by the third party. The system further includes the one or more network entities to which the UE is authenticated to access, each of the network entities configured to communicate with the UE or other network entities based on their respective temporary authentication ID.
摘要:
Systems and methods for performing traffic engineering in a communications network using a plurality of network slices are disclosed. The network slices are configured to manage a service including transmission of data along one or more flows along nodes of the communications network using a portion of physical link resources of the communications network. The method includes allocating the portion of physical link resources of the communications network associated with a first network slice of the plurality of network slices in accordance with instructions received from a traffic engineering entity associated with the first network slice.
摘要:
A method, apparatus and system for supporting Mobile Edge Computing (MEC) in a network such as a 5G communication network. Application Function (AF) request data is received from an AF operating in the network in support of MEC, stored in memory, and transmitted from the memory to one or more Policy Control Functions (PCFs) operating in the network. Subscribing PCFs may be notified of the receipt and storage of the data and request retrieval of the data. The data may be stored and handled by a function referred to as the Application Data Repository, or by another data repository. The operations may be performed by a network function such as but not limited to an Application Data Repository function. The function can store the AF request data and notify the PCFs. The function can handle AF requests associated with roaming UEs.
摘要:
A network architecture and methods of managing packet data unit (PDU) sessions in a network are provided. The methods include PDU session establishment procedures, PDU session modification procedures, PDU session state transfer procedures, PDU session release procedures, and user equipment (UE) handover procedures.
摘要:
A method of providing a network slice service includes a mobile network operator (MNO): providing one or more service profiles to a virtual service provider (VSP) serving a user population including a plurality of user devices, each service profile comprising attributes defining characteristics of a respective network slice service offered by the MNO, the network slice service comprising any one or more of: a Virtual Network with E2E service requirements; a Virtual Network with a specified network topology; and a virtualized infrastructure. The MNO receives a request for a selected network slice service from the VSP; determines whether or not the requested service can be provided; and responsive to determining that the requested service can be provided: sending a Service Level Agreement (SLA) for the network slice service to the VSP; and subsequently facilitating a network slice service instance in accordance with the SLA.
摘要:
A method and apparatus for connecting a user equipment (UE) to a wireless communication network such as a 5th generation network. The network supports node-level tunnelling. Node-level tunnels can be pre-configured prior to receipt of UE attach requests. The tunnels can be shared by plural UEs, flows, or services. A policy function is connected to a network management function and performs tasks such as applying constraints to the node-level tunnels. A session management function pre-establishes node-level tunnels based on policy information from the policy function. Operations of network elements such as the access network node and user plane function to handle UE attachment, session establishment, and handling of mobile-originated and mobile-terminated traffic are described. Also described is a method and apparatus for packet transmission in which packets are processed according to an identified tunnel type. The tunnel type can be identified using a field in the tunnel encapsulation header.
摘要:
A method and apparatus for delivering a service to an end point, such as a UE or server, via a communication network, is provided. A virtual network is pre-configured to handle service packets and includes virtual routers for routing packets via logical tunnels. The end point pre-registers with the virtual network and/or service and receives operating parameters for use in service access. The end point location may be tracked following pre-registration. The end point subsequently transmits and/or receives service packets using the operating parameters via an edge node, such as an access node or gateway. The edge node transmits service packets using the operating parameters and, upon detecting operating parameter usage by the end point, forwards received service packets to the virtual network. Operating parameters may include an identifier included in the packet. The end point may use multiple different edge nodes to access the service.
摘要:
Systems and methods for management of network slices in a communication network such as a 5th generation wireless communication network are provided. Network slicing formats of varying degrees of specificity are defined. An appropriate format may be selected for definition of a network slice. Different segments of a slice can be defined using different formats. Slice scoping, purposing, granularity, and resource usage are described. Slice creation and adaptation, and cloud resource management are also described.
摘要:
Methods and apparatus for management of network slices in a communication network such as a 5th generation wireless communication network are provided. Management planes may be provided which are separate from the plurality of network slices. A connection manager residing in a management plane receives an indication that a mobile device is to be associated with the communication network. The connection manager may reside at an access node or in the core network. A network slice is determined, and the connection manager transmits instructions, to one or more network nodes, to associate the mobile device with the network slice. The instructions may be provided to a local connection manager. The slice may be requested explicitly by the mobile device, or determined based on device and/or network requirements.
摘要:
An aspect of the disclosure provides a method for session admission at a node in an infrastructure provider network. The method includes receiving a connection request from a user equipment not associated with a network with which the infrastructure provider network is associated and obtaining from the user equipment, an identification of a service provider with which the infrastructure provider network is associated. Access authorization is then requested from the identified service provider. Embodiments allow such a process to provide government mandated free access, or for some other service provider to pay for the service.