摘要:
A method performed by a wireless node includes receiving a data flow associated with user devices; performing a packet inspection of the data flow; determining whether a network address of the wireless node matches another network address associated with the data flow; converting the other network address to a layer 2 identifier when the other network address matches the network address; establishing a bearer link within the wireless node based on the layer 2 identifier; and offloading the data flow from layers of a network, which are higher relative to the wireless node, to the bearer link, wherein the data flow does not traverse the layers.
摘要:
A method performed by a wireless node including receiving charging policies for data offloading; performing data offloading with respect to a user data flow; generating charging information associated with data offloading based on the charging policies; and sending the charging information to at least one of an on-line charging function or an off-line charging function.
摘要:
A method performed by a wireless node including receiving charging policies for data offloading; performing data offloading with respect to a user data flow; generating charging information associated with data offloading based on the charging policies; and sending the charging information to at least one of an on-line charging function or an off-line charging function.
摘要:
A method performed by a wireless node includes receiving a data flow associated with user devices; performing a packet inspection of the data flow; determining whether a network address of the wireless node matches another network address associated with the data flow; converting the other network address to a layer 2 identifier when the other network address matches the network address; establishing a bearer link within the wireless node based on the layer 2 identifier; and offloading the data flow from layers of a network, which are higher relative to the wireless node, to the bearer link, wherein the data flow does not traverse the layers.
摘要:
A method includes receiving, by an Internet Protocol (IP) anchor point, a session request to a network originating from a user equipment (UE); assigning an IP address to the UE; determining whether a reverse IP address registration is permitted to a first network device, wherein the reverse IP address registration permits a media flow associated with the IP address and the UE to omit traversing the IP anchor point; and assigning an ownership of the IP address to the first network device when reverse IP address registration is permitted.
摘要:
A method includes receiving, by an Internet Protocol (IP) anchor point, a session request to a network originating from a user equipment (UE); assigning an IP address to the UE; determining whether a reverse IP address registration is permitted to a first network device, wherein the reverse IP address registration permits a media flow associated with the IP address and the UE to omit traversing the IP anchor point; and assigning an ownership of the IP address to the first network device when reverse IP address registration is permitted.
摘要:
A collapsed or compact mobile architecture system includes connection nodes each comprising an access interface and at least one network interface; a backhaul network coupled to each of the connection nodes; and a mobility control unit coupled to the backhaul network. The mobility control unit comprises an Internet Protocol (IP) address server. Each of the connection nodes is configured to receive attachment requests from at least one user device. The mobility control unit is configured to receive first control plane signals from the connection nodes based on the attachment requests and transmit second control plane signals to the connection nodes based on the attachment requests. The mobility control unit is further configured to assign an IP address to each of the at least one user devices, based on the receive first control plane signals.
摘要:
A collapsed or compact mobile architecture system includes connection nodes each comprising an access interface and at least one network interface; a backhaul network coupled to each of the connection nodes; and a mobility control unit coupled to the backhaul network. The mobility control unit comprises an Internet Protocol (IP) address server. Each of the connection nodes is configured to receive attachment requests from at least one user device. The mobility control unit is configured to receive first control plane signals from the connection nodes based on the attachment requests and transmit second control plane signals to the connection nodes based on the attachment requests. The mobility control unit is further configured to assign an IP address to each of the at least one user devices, based on the receive first control plane signals.
摘要:
Disclosed techniques provide enhanced security for a communications network. Access terminal devices intended for operation via the network are expected to have security agent functionality, e.g. in the form security agent software loaded into or otherwise enabled on each of the access terminal devices. Registration procedures include verification that such an agent is present/enabled on an access terminal and that the agent currently implemented on the terminal device provides adequate security for the communications network against malicious traffic from that device.
摘要:
Disclosed techniques provide enhanced security for a communications network. Access terminal devices intended for operation via the network are expected to have security agent functionality, e.g. in the form security agent software loaded into or otherwise enabled on each of the access terminal devices. Registration procedures include verification that such an agent is present/enabled on an access terminal and that the agent currently implemented on the terminal device provides adequate security for the communications network against malicious traffic from that device.