Abstract:
A method for facilitating the establishment of a virtual private network in a cellular communication network comprising the steps of: arranging a network interface device in close proximity to a plurality of antennas; identifying an access request from a client device to establish a virtual private network connection through a core network portion by means of the network interface device; determining application information from the client device by means of the net-work interface device; and comparing the application information to a network information of the core net-work portion to determine whether the application information matches the net-work information by means of the network interface device.
Abstract:
A method for facilitating coordinated multipoint communication providing a plurality of network interface devices for measuring synchronization accuracy in the backhaul network; creating an actual coverage map for the coordinated multipoint communication analyzing the created actual coverage map to determine whether the backhaul network is sufficient for a selected coordinated multipoint technique; if the backhaul network is not sufficient determining one or more key performance indicators creating a conditional coverage map; comparing the actual coverage map with the conditional coverage map; reconfiguring the wireless communication network if the actual coverage map does not match the conditional coverage map.
Abstract:
A method for facilitating participation of an intermediary network device in a security gateway communication including: establishing a secure channel between the intermediary network device and a security gateway; transmitting a virtual machine instantiation command generated by software running in the security gateway to the intermediary network device; instantiating a virtual machine on the intermediary network device; when establishing a secure communication session between the at least one base station and the core network portion via the security gateway for the first time, establishing an Internet Key Exchange communication between the virtual machine and the security gateway and transmitting session keys from the security gateway to the virtual machine during the Internet Key Exchange communication; establishing an IPsec tunnel between the virtual machine and the security gateway.
Abstract:
A method for facilitating the establishment of a virtual private network in a cellular communication network comprising the steps of: arranging a network interface device in close proximity to a plurality of antennas; identifying an access request from a client device to establish a virtual private network connection through a core network portion by means of the network interface device; determining application information from the client device by means of the net-work interface device; and comparing the application information to a network information of the core net-work portion to determine whether the application information matches the net-work information by means of the network interface device.
Abstract:
A method for establishing a self-organized emergency mobile core in a cellular communication network, the cellular communication network having a core element. The method includes the step of storing program code for implementing core network functionality on at least one stationary network element of the cellular communication network allowing to host virtual network functionality. The core network functionality remains inactive when the core element is available. The method includes the steps of detecting an emergency event within the cellular communication network resulting in an unavailability of the core element, and starting operating the core network functionality in order to establish a self-organized emergency mobile core in response to the detected emergency event.
Abstract:
A method for facilitating participation of an intermediary network device in a security gateway communication including: establishing a secure channel between the intermediary network device and a security gateway; transmitting a virtual machine instantiation command generated by software running in the security gateway to the intermediary network device; instantiating a virtual machine on the intermediary network device; when establishing a secure communication session between the at least one base station and the core network portion via the security gateway for the first time, establishing an Internet Key Exchange communication between the virtual machine and the security gateway and transmitting session keys from the security gateway to the virtual machine during the Internet Key Exchange communication; establishing an IPsec tunnel between the virtual machine and the security gateway.
Abstract:
A method for facilitating coordinated multipoint communication providing a plurality of network interface devices for measuring synchronization accuracy in the backhaul network; creating an actual coverage map for the coordinated multipoint communication analyzing the created actual coverage map to determine whether the backhaul network is sufficient for a selected coordinated multipoint technique; if the backhaul network is not sufficient determining one or more key performance indicators creating a conditional coverage map; comparing the actual coverage map with the conditional coverage map; reconfiguring the wireless communication network if the actual coverage map does not match the conditional coverage map.
Abstract:
A method for establishing a self-organized emergency mobile core in a cellular communication network, the cellular communication network having a core element. The method includes the step of storing program code for implementing core network functionality on at least one stationary network element of the cellular communication network allowing to host virtual network functionality. The core network functionality remains inactive when the core element is available. The method includes the steps of detecting an emergency event within the cellular communication network resulting in an unavailability of the core element, and starting operating the core network functionality in order to establish a self-organized emergency mobile core in response to the detected emergency event.