Abstract:
Technologies for performing security monitoring services of a network functions virtualization (NFV) security architecture that includes an NVF security services controller and one or more NFV security services agents. The NFV security services controller is configured to transmit a security monitoring policy to the NFV security services agents and enforce the security monitoring policy at the NFV security services agents. The NFV security services agents are configured to monitor telemetry data and package at least a portion of the telemetry for transmission to an NFV security monitoring analytics system of the NFV security architecture for security threat analysis. Other embodiments are described and claimed.
Abstract:
An apparatus may comprise a radio-frequency (RF) transceiver and a message aggregation module arranged to intercept multiple messages from one or more mobile data applications during an idle mode of a device, one or more of the multiple messages operable to trigger a transition of the device from the idle mode to a connected mode by causing a radio resource control message to be sent from the device to a radio access network, the message aggregation module to store the multiple messages in a buffer associated with the one or more mobile data applications in order to maintain the device in the idle mode, and schedule for transmission by the RF transceiver the stored messages at a defined time instance based on a delay tolerance for the one or more mobile data applications when the device is in the connected mode. Other embodiments are disclosed and claimed.
Abstract:
Embodiments of system and method configurations for device discovery and connection establishment in connection with use of device-to-device (D2D) and proximity-based services are generally described herein. In some examples, an evolved packet core (EPC) of a 3GPP Long Term Evolution or 3GPP Long Term Evolution-Advanced (LTE/LTE-A) network is arranged to assist D2D identification and discovery procedures at user equipment (UEs) connected to the LTE/LTE-A network. Various identification and discovery procedures may be implemented in connection with proximity detection and the establishment of communication times for the establishment of the D2D communication link, between the UEs. Accordingly, the EPC of the LTE/LTE-A network may assist the establishment of a device-to-device communication link between UEs on a wireless network employing a distinct wireless protocol (for example, a direct wireless network connection via a wireless local area network (WLAN) or wireless personal area network (WPAN)).
Abstract:
Embodiments of system and method configurations for device discovery and connection establishment in connection with use of device-to-device (D2D) and proximity-based services are generally described herein. In some examples, an evolved packet core (EPC) of a 3GPP Long Term Evolution or 3GPP Long Term Evolution-Advanced (LTE/LTE-A) network is arranged to assist D2D identification and discovery procedures at user equipment (UEs) connected to the LTE/LTE-A network. Various identification and discovery procedures may be implemented in connection with proximity detection and the establishment of communication times for the establishment of the D2D communication link, between the UEs. Accordingly, the EPC of the LTE/LTE-A network may assist the establishment of a device-to-device communication link between UEs on a wireless network employing a distinct wireless protocol (for example, a direct wireless network connection via a wireless local area network (WLAN) or wireless personal area network (WPAN)).
Abstract:
In embodiments, apparatuses, methods, and storage media may be described for secure broadcast of discovery information of a discoverable user equipment (UE) in a device-to-device (D2D) network. Specifically, the discovery information may be encrypted with a first encryption key, and then the result of that encryption may be re-encrypted with a second encryption key. The dual-encrypted discovery information may then be broadcast in a cell. Upon reception of the dual-encrypted discovery information, a discovering UE with the appropriate decryption keys may decrypt the message to identify the discovery information. Based on the decrypted discovery information, the discovering UE may identify the presence of the discoverable UE.
Abstract:
Embodiments of system and method configurations for device discovery and connection establishment in connection with use of device-to-device (D2D) and proximity-based services are generally described herein. In some examples, an evolved packet core (EPC) of a 3GPP Long Term Evolution or 3GPP Long Term Evolution-Advanced (LTE/LTE-A) network is arranged to assist D2D identification and discovery procedures at user equipment (UEs) connected to the LTE/LTE-A network. Various identification and discovery procedures may be implemented in connection with proximity detection and the establishment of communication times for the establishment of the D2D communication link, between the UEs. Accordingly, the EPC of the LTE/LTE-A network may assist the establishment of a device-to-device communication link between UEs on a wireless network employing a distinct wireless protocol (for example, a direct wireless network connection via a wireless local area network (WLAN) or wireless personal area network (WPAN)).
Abstract:
Methods, systems, and devices for switching internet protocol (IP) flows from a first communication path to a second communication path are disclosed herein. A user equipment (UE) may include an exchange component, a session component, and a communication component. The exchange component exchanges second communication path availability information between the UE and another UE by sending and receiving session initiation protocol (SIP) messages that include second communication path availability information over the first communication path. The session component changes the communication session by re-routing traffic flows to the second communication path based on the exchanged second path availability information. The communication component sends to and receives from the other UE data corresponding to an IP flow over the second communication path.
Abstract:
An integrated WLAN/WWAN Radio Access Technology (RAT) architecture is described in which signaling used to control the integration of the WLAN/WWAN architecture is performed over the Radio Resource Control (RRC) plane. The integrated architecture may provide a network-controlled framework for performing traffic steering and radio resource management.
Abstract:
An integrated WLAN/WWAN Radio Access Technology (RAT) architecture is described in which signaling used to control the integration of the WLAN/WWAN architecture is performed over the Radio Resource Control (RRC) plane. The integrated architecture may allow for User Equipment (UE) assistance in cell selection and traffic steering. In particular, UE-assisted RRC signaling is described for managing inter-RAT session transfers and secondary cell (SCell) selection.
Abstract:
A method and an information handling system configured to select a mobility anchor point for a mobile device in a distributed mobility anchor point network may comprise collecting information about movement behavior or data transfer behavior of the mobile device, or tunneling overhead of two or more base stations. A mobility anchor point associated with a first base station may be assigned to the mobile device if the mobile device is connected to the first base station for at least a predetermined amount of time, if the mobile device transfers at least a predetermined amount of data via the first base station, or device if a tunneling overhead of the first base station is less than a predetermined level. In some embodiments, a centralized mobility anchor may be assigned to the mobile device if the mobile device is highly mobile and there is no identified base station to which the mobile device is frequently connected.