Abstract:
Systems and methods for managing a service set in network function virtualization (NVF) are provided. A service set can be defined as an ordered list of services to be applied to packet traffic and assigned to instances of the services in a distributed pool of virtual hosts. Responsive to determining that a first service in the service set is to be transferred from a first host to a second host, other services in the service set can also be identified to be transferred to the second host to maintain quality of service and latency as a packet is processed by the service set.
Abstract:
The use of Network Virtualization using Overlays over Layer 3 (NVO3) is a growing trend to address networking issues in data centers that make use of virtualization and cloud computing techniques. Additional considerations may be required to support application-specific multicast traffic in such overlay networks. Systems and methods are provided for an overlay network control function node to allocate one or more overlay network edge nodes to act as a multicast gateway for each network segment. The gateway can distribute multicast traffic to other participating edge nodes in its same network segment, thus reducing network traffic.
Abstract:
A 3GPP AAA server is able to instruct user equipment that it has been authenticated and authorized for access to a non-3GPP access network, but that access to the Evolved Packet Core has not been approved through the use of a modified Extensible Authentication Protocol message or an enhanced IPMS response. Upon receipt of such notification, the user equipment is able to configure itself to obtain data services through the access network, but will try to create EPC tunnels. This prevents the UE from being unable to connect to a local access network when the 3GPP AAA determines that it is unable to connect to the EPC.
Abstract:
Methods and Gateways (GWs) are provided for efficiently sending a router advertisement message to a User Equipment (UE). The GW comprises an interface, a processor, and an instructions repository that stores instructions that when executed by the processor cause the later to determine the UE is in idle mode, and responsive thereto, to delay a transmission of the router advertisement message to the UE until the UE transitions from the idle mode to an active mode. This is achieved by delaying a paging of the UE. In another embodiment, a method and GW is provided. The GW's processor detects a router advertisement message needs to be sent to the UE, determines the UE is in idle mode and delays a paging of the UE until detecting the UE transitions from the idle mode into an active mode, when the router advertisement message is sent to the UE.
Abstract:
Example embodiments presented herein are directed towards determining a Proxy Mobile Internet Protocol version 6 (ΡΙΜΡνβ) control plane used by a network node peer in an Internet Protocol version 4 (IPv4) transport network. The example embodiments provide a mechanism in PMIP protocol stack, to allow a Mobility Access Gateway/Local Mobility Anchor (MAG/LMA) node such as SGW (which may be supporting both PMIP draft and PMIP RFC) to decide which PMIP protocol stack shall be used to communicate to the peer node, i.e. LM A/MAG.
Abstract translation:这里呈现的示例性实施例旨在确定由互联网协议版本4(IPv4)传输网络中的网络节点对等体使用的代理移动因特网协议版本6(?????)控制平面。 该示例性实施例提供PMIP协议栈中的机制,以允许诸如SGW的移动性接入网关/本地移动锚(MAG / LMA)节点(其可以支持PMIP草案和PMIP RFC两者)来决定哪个PMIP协议栈应当 用于与对等节点通信,即LM A / MAG。
Abstract:
A network can handle access attempts by a mix of user equipments (UEs) that do and do not support multiple packet data network connections and do and do not support Internet Protocol version 6 (IPv6) and access attempts from networks that do and do not support multiple PDN connections. A method of operating a Trusted Non- 3GPP Access network with a 3GPP network involves an authentication, authorization, and accounting (AAA) proxy in the Trusted Non-3GPP Access network and a UE that supports multiple PDN connections, with the AAA proxy sending an indication to the UE that the network supports multiple PDN connections.
Abstract:
A method and a node are provided to detect routing loops in mobile Internet Protocol networks. A legitimate mobile node may register at a home agent by sending a binding message carrying a home address and a care-of address. The home agent stores the addresses in a binding cache entry. It is possible for a malicious node to send a binding message to one HA, resulting in a HoA being assigned by the HA. Then the malicious node may use this HoA as a CoA for registration at another HA. If the malicious MN uses the HoA assigned by the second HA as a CoA and updates the binding at the first HA, a routing loop is created. The present invention verifies the presence of a routing loop responsive to the receipt of the binding message. If a routing loop is detected, the binding cache entry is deleted.
Abstract:
Methods, a local mobility anchor (LMA) and a mobility access gateway (MAG) are provided for supporting multiple connections of a user equipment (UE) towards a given access point. As a UE connection is set up, the MAG provides a unique identifier (UID) for the connection and sends it toward the LMA. The LMA stores the UID along with an identity of the UE, an address of the MAG and an access point name in a binding cache entry. As the UE sets up an additional connection towards the same access point, the MAG provides another UID, which is also sent to the LMA. The LMA stores a distinct binding cache entry for that distinct UID. If a given connection is released or handed over to another MAG, a UID corresponding to the given connection is used at the LMA to release or update the proper binding cache entry.
Abstract:
The present invention relates to a method for closing all network connections to a detached user equipment. The local mobility anchor (LMA) receives and reads a control message saying that the user equipment is detached and all the network connections must be closed. The LMA performs the instructions in the control message, i.e. closes all the network connections to the user equipment. After the instructions have been executed, the LMA sends an acknowledgement back to indicate which actions have been performed. Thus, the closing of all network connections is done using only one message exchange and thereby saving signalling in the Core Network.
Abstract:
A load balancing function is integrated into a Network Virtualization Edge, NVE, function. This load balancing function is configured by a Network Virtualization Authority, NVA, using a new protocol. The NVA can thus enable or disable the LB function for a given VN in a specific NVE. According to one example method, the NVA receives (210) Virtual Machine, VM, configuration information from a VM orchestration system. Based on this information, the NVA configures (220) an attached NVE to enable load balancing by sending an enable message to the NVE. The NVA subsequently receives (230) a confirmation message from the NVE, indicating that the load balancing function is enabled. The NVA then updates (240) remote NVEs, allowing load balancing traffic to be sent to the first NVE.