Abstract:
Techniques are described herein for dynamic platoon management. The techniques may include obtaining dynamic location data of a vehicle, where the dynamic location data indicates a current or predicted location of the vehicle. Based on the dynamic location data, a platoon of vehicles that is optimal for the vehicle to join may be identified. The vehicle may be dynamically joined to the platoon.
Abstract:
In one implementation, the method comprises, in response to obtaining a request to associate an electronic device with the one or more WLAN termination nodes: generating, between a base station and a networking device, a control link based on a first identifier associated with the base station; generating, between the networking device and a first WLAN termination node, a control link based on a second identifier that corresponds to a pseudonym for the base station; and associating the first and second identifiers in a control table. The method further comprises: instantiating, between the base station and the networking device, a first data tunnel associated with a first tunneling protocol; instantiating, between the networking device and the first WLAN termination node, a second data tunnel associated with a second tunneling protocol; and associating the first and second data tunnels.
Abstract:
In one implementation, the method comprises, in response to obtaining a request to associate an electronic device with the one or more WLAN termination nodes: generating, between a base station and a networking device, a control link based on a first identifier associated with the base station; generating, between the networking device and a first WLAN termination node, a control link based on a second identifier that corresponds to a pseudonym for the base station; and associating the first and second identifiers in a control table. The method further comprises: instantiating, between the base station and the networking device, a first data tunnel associated with a first tunneling protocol; instantiating, between the networking device and the first WLAN termination node, a second data tunnel associated with a second tunneling protocol; and associating the first and second data tunnels.
Abstract:
In one embodiment, an apparatus comprising networking circuitry adapted to receive, at a mobile network operated by an SP, flows associated with enterprise applications executing on device(s) in an enterprise network, the device(s) including a CPE and/or one or more devices behind the CPE, and processing circuitry adapted to vary, during a duration in which there is IP connectivity between the CPE and the mobile network, a pool of dedicated bearers for binding the flows, in response to at least part of changes occurring during the duration with respect to the flows, wherein the changes include variations during the duration in number of the flows and/or differences during the duration in detected characteristics of the flows, the detected characteristics of the flows having been detected based on inspection of respective packet(s) of the flows, and bind at least part of the flows to respective dedicated bearers included in the pool.
Abstract:
An example method is provided in one example embodiment and may include receiving a session request for a user equipment (UE) at a node, wherein the session request includes a timestamp for the UE and a retry count; determining if the session request is a stray session request; and maintaining session information for an existing session for the UE at the node if the session request is a stray session request. The method can include identifying the received session request as a stray request if the timestamp received in the request is less than a timestamp stored for an existing session for the UE. The method can also include identifying the received request as a stray request if the timestamp received is equal to the timestamp stored for the existing session and if the retry count received is less than or equal to a retry count stored for the session.
Abstract:
An example method is provided in one example embodiment and includes establishing a mobility context associated with a user equipment that includes a designation of a first radio access network as a primary access network and a second radio access network as a secondary access network. The method further includes defining an initial value for a data count variable representative of a number of consecutive uplink packets associated with the user equipment received over the first radio access network. The method further includes receiving at least one first uplink packet associated with the user equipment from at least one of the first radio access network and the second radio access network, modifying a value of the data count variable when the first uplink packet is received over the second radio access network, setting the value of the data count variable to the initial value of the data count variable when the first uplink packet is received over the first radio access network, and modifying the mobility context if the value of the data count variable is equal to a predetermined value.
Abstract:
Disclosed are a system and method for updating a user equipment route selection policy. The method includes receiving, at a home network in communication with a user equipment, an indication that a user of the user equipment desires to connect to a standalone non-public network for an event, receiving service hosting information for the event, revising a user equipment route selection policy at the home network based on the service hosting information to yield an updated user equipment route selection policy and transmitting the updated user equipment route selection policy to the user equipment. The user equipment registers, based on the updated user equipment route selection policy, with the standalone non-public network for the event.
Abstract:
In one illustrative example, a unified data management (UDM) of a mobile network is established in a UDM set with a plurality of private network UDMs instances of a plurality of private mobile networks. The UDM of the mobile network provides access to a plurality of subscription profiles associated with a plurality of subscribers of the mobile network, and each private network UDM instance provides access to a subset of the subscription profiles associated with a subset of the subscribers in the private mobile network. The UDM of the mobile network operates to communicate, in an authentication procedure, authentication data for authentication of a user equipment (UE) in the mobile network. After the authentication of the UE in the mobile network, the UDM operates to push authentication status information of the UE to the private network UDM instance of the private mobile network.
Abstract:
A Radio Access Network (RAN) element provides an internet indication to a User Equipment (UE) to enable the UE to quickly obtain internet access. The RAN element determines that the RAN element is connected to at least one gateway that provides public internet access, and broadcasts an internet indication. The RAN element determines that the UE has requested public internet access via the RAN element and provides the UE with public internet access.
Abstract:
Systems, methods, and computer-readable media are provided for optimizing utilization of available network slices, where such slices are created for specific applications/purposes. In one aspect, a method includes establishing a Protocol Data Unit (PDU) session for a mobile device on a default network slice; determining an application to be used on the mobile device; determining a specific network slice for servicing the application used on the mobile device; and configuring the mobile device to use the application on the specific network slice.