Abstract:
Technologies for performing security monitoring services of a network functions virtualization (NFV) security architecture that includes an NVF security services controller and one or more NFV security services agents. The NFV security services controller is configured to transmit a security monitoring policy to the NFV security services agents and enforce the security monitoring policy at the NFV security services agents. The NFV security services agents are configured to monitor telemetry data and package at least a portion of the telemetry for transmission to an NFV security monitoring analytics system of the NFV security architecture for security threat analysis. Other embodiments are described and claimed.
Abstract:
Examples are disclosed for fractional wireless broadband usage. In some examples, a portal managed by a usage manager may be accessed to enable a user of a wireless device to establish an agreement with the usage manager for the use of an application via a wireless wide area network (WWAN). The agreement may include policies associated with limits to data bandwidth utilized while the application is used via the WWAN. For these examples, access may be obtained to the WWAN through an operator of the WWAN. The access may be obtained via presentation of credentials to authenticate the wireless device to the operator of the WWAN. Also, other credentials may be presented to authenticate the wireless device or a user of the wireless device for use the application via the WWAN. The application may then be executed at the wireless device according to the agreement. Also, for these examples, the application may be provided by an application service provider having a service level agreement with the usage manager and/or the operator of the WWAN for providing the application for use via the WWAN. Other examples are described and claimed.
Abstract:
Embodiments of apparatus, packages, computer-implemented methods, systems, devices, and computer-readable media (transitory and non-transitory) are described herein for ascertaining, e.g., by a traffic detection function (“TDF”), that a first user equipment (“UE”) and a second UE are, potentially, sufficiently proximate to each other to wirelessly exchange data directly. In various embodiments, an evolved serving mobile location center (“E-SMLC”) may be instructed, e.g., by the TDF, to obtain location change data associated with the first and second UEs. In various embodiments, a determination may be made, e.g., by the TDF, based on the location change data, whether the first and second UEs are sufficiently proximate to exchange data directly, and whether the first and second UEs are likely to remain proximate for at least a predetermined time interval. In various embodiments, the first and second UEs may be caused to commence device-to-device (“D2D”) communication based on the determination.
Abstract:
Embodiments of apparatus, packages, computer-implemented methods, systems, devices, and computer-readable media (transitory and non-transitory) are described herein for ascertaining, e.g., by a traffic detection function (“TDF”), that a first user equipment (“UE”) and a second UE are, potentially, sufficiently proximate to each other to wirelessly exchange data directly. In various embodiments, an evolved serving mobile location center (“E-SMLC”) may be instructed, e.g., by the TDF, to obtain location change data associated with the first and second UEs. In various embodiments, a determination may be made, e.g., by the TDF, based on the location change data, whether the first and second UEs are sufficiently proximate to exchange data directly, and whether the first and second UEs are likely to remain proximate for at least a predetermined time interval. In various embodiments, the first and second UEs may be caused to commence device-to-device (“D2D”) communication based on the determination.
Abstract:
Embodiments of system and method configurations for device discovery and connection establishment in connection with use of device-to-device (D2D) and proximity-based services are generally described herein. In some examples, an evolved packet core (EPC) of a 3GPP Long Term Evolution or 3GPP Long Term Evolution-Advanced (LTE/LTE-A) network is arranged to assist D2D identification and discovery procedures at user equipment (UEs) connected to the LTE/LTE-A network. Various identification and discovery procedures may be implemented in connection with proximity detection and the establishment of communication times for the establishment of the D2D communication link, between the UEs. Accordingly, the EPC of the LTE/LTE-A network may assist the establishment of a device-to-device communication link between UEs on a wireless network employing a distinct wireless protocol (for example, a direct wireless network connection via a wireless local area network (WLAN) or wireless personal area network (WPAN)).
Abstract:
A 3GPP monitoring architecture framework provides monitoring event configuration, detection, and reporting for machine-type and other mobile data applications using a machine type communication interworking function (MTC-IWF) that communicates monitoring event configuration, detection, and reporting messages through existing interfaces, such as Tsp, T4, and T5 interfaces.
Abstract:
The present disclosure is related to Multi-Access Management Services (MAMS), which is a programmable framework that provides mechanisms for the flexible selection of network paths in a multi-access (MX) communication environment, based on an application's needs. Generic Multi-Access (GMA) data plane functions are integrated into the MAMS framework to provide a virtual network connection that acts as the MAMS anchor connection. The virtual (anchor) connection is used for sending time-sensitive MAMS control/management messages. Virtual network configuration parameters are discussed in the present disclosure, which are used for establishing and setting up the virtual (anchor) connection. Other embodiments may be described and/or claimed.
Abstract:
A user equipment (UE) operable to communicate in a peer to peer (P2P) network is described. The UE can encode a proximity detection request for transmission to a ProSe server in an Evolved Packet Core (EPC). The proximity detection request can include one or more of: a time period window parameter, identification information of a second UE, or a proximity detection signal indicating when the proximity detection request is for proximity detection of the second UE. The UE can decode a proximity alert message received from the ProSe server in accordance with the time period window parameter.
Abstract:
Techniques for improved energy-savings management are described. In various embodiments, for example, a network management node includes a processor circuit, a communication component arranged for execution by the processor circuit to receive device tracking information from a device tracking node, and a determination component arranged for execution by the processor circuit to determine whether an eNodeB is to enter an energy-saving mode based on the device tracking information. Other embodiments are described and claimed.
Abstract:
A 3GPP monitoring architecture framework provides monitoring event configuration, detection, and reporting for machine-type and other mobile data applications by configuring monitoring on a mobility management entity (MME), a serving general packet radio service support node (SGSN), or a home subscriber service (HSS) node through existing interfaces, such as Tsp, T4, and T5 interfaces.