Abstract:
Various implementations disclosed herein enable identifying anomalies in a network. For example, in various implementations, a method of identifying anomalies in a network is performed by a network node. In various implementations, the network node includes one or more processors, and a non-transitory memory. In various implementations, the method includes generating a characteristic indicator that characterizes a device type based on communications associated with a first device of the device type. In various implementations, the method includes determining, based on communications associated with the first device, a performance indicator that indicates a performance of the first device. In various implementations, the method includes synthesizing an anomaly indicator as a function of the performance indicator in relation to the characteristic indicator.
Abstract:
In one embodiment, a method for providing access to wireless networks may include receiving, by a wireless network access provider from a user device, a request to access a wireless network. The method may include obtaining data representing a policy applicable to the access request, sending the access request, augmented with the policy, to an identity provider associated with the user and having no pre-existing relationship with the access provider, and receiving, from the identity provider, an access request response indicating whether or not the policy is met. The method may include communicating, to the wireless device, an indication that the access request has been accepted, if the policy is met, or an indication that the access request has been rejected, if the policy is not met. The access provider and identity provider may be members of an identity and access federation that communicate over a dynamically established secure connection.
Abstract:
In various implementations, a method includes receiving a request to establish an end-to-end encrypted session between a device in an enterprise network and an external entity that is outside the enterprise network. In some implementations, the end-to-end encrypted session allows encrypted packets to be transmitted between the device and the external entity. In various implementations, the method includes determining whether the request satisfies an enterprise security criterion for establishing the end-to-end encryption session. In various implementations, the method includes in response to determining that the request satisfies the enterprise security criterion, triggering the establishment of the end-to-end encrypted session between the device in the enterprise network and the external entity that is outside the enterprise entity.
Abstract:
An example method is provided in one example embodiment and may include subscribing to a key distribution service by a plurality of Wi-Fi access points belonging to a same mobility domain; receiving a request from a user equipment to connect to a first Wi-Fi access point of the plurality of Wi-Fi access points belonging to the same mobility domain; determining one or more second Wi-Fi access points of the plurality of Wi-Fi access points belonging to the same mobility domain that neighbor the first Wi-Fi access points; and distributing keying parameters to each of the one or more second Wi-Fi access points. The keying parameters can be associated with 802.11r pairwise master key (PMK) keying parameters.
Abstract:
An example method is provided in one example embodiment and includes receiving a request to relocate a user equipment (UE) from a source macro radio to an ambiguous small cell access point (AP), wherein the request includes a target cell identity (ID) encoded with a source macro cell identifier for the source macro radio and a target sub-carrier identifier for the ambiguous small cell AP; determining potential target small cell APs for relocation of the first UE using the using the first target cell ID, wherein each of the potential target small cell APs are within a coverage area of the source macro radio and operate using the target sub-carrier identifier; and preparing, for each of the potential target small cell APs, a common channel to receive relocation of the first UE. The first UE can relocate to a particular target small cell access point using the common channel.
Abstract:
An example method is provided in one example embodiment and includes intercepting a setup request for a session via a small cell network portion associated with a wide area network (WAN) instance, wherein the WAN instance comprises the small cell network portion and an enterprise network portion and wherein the small cell network portion and the enterprise network portion are interconnected to a service provider network; classifying the session to a particular WAN priority queue, wherein a plurality of WAN priority queues are configured for the WAN instance; determining whether the particular WAN priority queue has available bandwidth for the session; allocating bandwidth for the particular WAN priority queue if the particular WAN priority queue has available bandwidth; and permitting the session to be established if the particular WAN priority queue has available bandwidth.
Abstract:
An example method is provided in one example embodiment and may include determining a presence of user equipment (UE) in relation to small cell radio(s) of a small cell network based on information obtained through the small cell network and one or more parallel networks; and adjusting transmit power for the small cell radio(s) based on the presence of UE in relation to the small cell radio(s). Another example method can include determining that a UE in cell paging channel mode has changed its selected macro cell radio; determining that the UE is allowed service on a small cell radio located in a vicinity of a macro cell coverage area of a selected macro cell radio; and adjusting a transmit power of the small cell radio based on a presence of the UE in a surrounding macro cell coverage area of the small cell radio.
Abstract:
Embodiments include receiving one or more packets of a Wi-Fi calling session via a secure tunnel from a user device, where the user device is connected to a source network via a Wi-Fi access point. Embodiments also include determining whether the Wi-Fi calling session is a threat based, at least in part, on identifying an anomaly of at least one packet of the one or more packets. An action can be taken if the Wi-Fi calling communication is determined to be a threat. More specific embodiments include determining the at least one packet is associated with the Wi-Fi calling session by correlating information in the packet with control plane data of the Wi-Fi calling session. Further embodiments can include intercepting the one or more packets in a second secure tunnel established between an evolved packet data gateway and a service provider network associated with the user device.
Abstract:
In one example embodiment, an apparatus is provided that includes an antenna that receives, in a first wireless network, a first identifier of a second wireless network access point. The apparatus also includes a processor that processes data received by the antenna. The apparatus transmits, in the first wireless network, the first identifier of the second wireless network access point. The apparatus establishes a tunnel to the second wireless network. The antenna transmits a second identifier of the second wireless network access point.
Abstract:
A method is provided in one embodiment and includes receiving a first message including an indication that a first access point of a first network is a gateway access point of a first network, receiving a second message including an indication that a second access point of the first network is an inner access point of the first network, and receiving an indication of a number of wireless devices registered with at least one of the first access point and the second access point. The method further includes determining a power mode for the second access point based upon whether at least one wireless device is registered with the first access point or the second access point, and sending a power mode command message to the second access point indicative of the determined power mode.