Patent classifications
H04W40/02
Secure creation of application containers for fifth generation cellular network slices
Systems, methods, and computer-readable media for the secure creation of application containers for 5G slices. A MEC application in a MEC layer of a 5G network can be associated with a specific network slice of the 5G network. A backhaul routing policy for the MEC application can be defined based on the association of the MEC application with the specific network slice of the 5G network. Further, a SID for the MEC application that associates the MEC application with a segment routing tunnel through a backhaul of the 5G network can be generated. A MEC layer access policy for the MEC application can be defined based on the SID for the MEC application. As follows, access to the MEC application through the 5G network can be controlled based on both the backhaul routing policy for the MEC application and the MEC layer access policy for the application.
METHODS, INFRASTRUCTURE EQUIPMENT AND WIRELESS COMMUNICATIONS NETWORKS
A method for determining a route in an Integrated Access Backhaul “IAB” mesh zone. The method comprises transmitting, to each IAB node of a plurality of IAB nodes, one or more discovery parameters for each IAB node; determining one or more route selection parameters for each IAB node to select a route; a first IAB node of the plurality of IAB nodes determining, based on the one or more discovery parameters, that a second IAB node of the plurality of IAB nodes is discoverable; and upon receiving a packet, selecting a route from the first IAB node based on the one or more route selection parameters and on the first IAB node determining that the second IAB node is discoverable.
Method for performing relay forwarding on integrated access and backhaul links, information acquisition method, node, and storage medium
Provided is a method for performing relay forwarding on integrated access and backhaul (IAB) links. The method includes receiving, by a first IAB node, a data packet; and transmitting, by the first IAB node, the data packet to an IAB donor. Further provided are an information acquisition method, an IAB node, an IAB donor node and a storage medium.
CALL FLOW SYSTEM AND METHOD FOR USE IN A LEGACY TELECOMMUNICATION SYSTEM
A method of operating a network server, such as a mobile application gateway, connect devices on a cellular or carrier network with individual networks, such as enterprise voice and data networks or residential networks. The effects of the present invention are far reaching in terms of transferring effective call control from the cellular network into the control of the individual network, such as the enterprise, and enabling new business models for the purchase of cellular service from a public cellular carrier by an enterprise.
CALL FLOW SYSTEM AND METHOD FOR USE IN A LEGACY TELECOMMUNICATION SYSTEM
A method of operating a network server, such as a mobile application gateway, connect devices on a cellular or carrier network with individual networks, such as enterprise voice and data networks or residential networks. The effects of the present invention are far reaching in terms of transferring effective call control from the cellular network into the control of the individual network, such as the enterprise, and enabling new business models for the purchase of cellular service from a public cellular carrier by an enterprise.
MOBILE COMMUNICATION METHOD AND MOBILE COMMUNICATION SYSTEM
A mobile communication method according to the present invention includes the steps of: sending “INVITE” from a UE#1 to a P-CSCF/VATF in a visited network of the UE#1; sending “INVITE” from the P-CSCF/VATF to an IMS; and allocating, by the P-CSCF/VATF, an MGW#1 to the path for voice communications.
MOBILE COMMUNICATION METHOD AND MOBILE COMMUNICATION SYSTEM
A mobile communication method according to the present invention includes the steps of: sending “INVITE” from a UE#1 to a P-CSCF/VATF in a visited network of the UE#1; sending “INVITE” from the P-CSCF/VATF to an IMS; and allocating, by the P-CSCF/VATF, an MGW#1 to the path for voice communications.
Resource Reservation Protocol for Wireless Backhaul
The present disclosure generally relates to the field of resource reservation. More specifically, the present disclosure relates to a technique of reserving communication resources in a wireless communication network. A method embodiment comprises: receiving (S402), by a node of the plurality of nodes, a resource reservation message including first reservation information indicating one or more communication resources for at least one link of the wireless communication network; modifying (S404), by the node, the received resource reservation message by including second reservation information indicating one or more communication resources for a link of the node in the received resource reservation message; and transmitting (S406), by the node, the modified resource reservation message to one or more neighbor nodes of the node.
SYSTEM AND METHOD FOR ENABLING VPN-LESS SESSION SETUP FOR CONNECTING MOBILE DATA DEVICES TO AN ENTERPRISE DATA NETWORK
A mobile application gateway configured to interconnect mobile communication devices on a cellular network with an enterprise network is provided. The mobile application gateway includes a voice and data signaling gateway configured to provide routing functionalities, service functionalities and admission control. A gateway GPRS support node (GGSN) is configured to establish a secure data session between one or more of the mobile communication devices and the enterprise network by establishing a GPRS tunneling protocol (GTP) tunnel between a carrier-hosted serving GPRS support node (SGSN) and the GGSN.
INTERNET ACCESS AUTHENTICATION METHOD AND CLIENT, AND COMPUTER STORAGE MEDIUM
The present disclosure discloses an Internet access authentication method and client, and a computer storage medium. The Internet access authentication method includes establishing a network connection to a subnetwork; displaying, in a browser, a login page specified by a wireless access point, a network application icon used for Internet access being displayed on the login page; receiving an operation on the network application icon, and authenticating first data by sending the first data to a network server, the first data comprising: a gateway address, a wireless access point address, and a device address; and making a network connection when authentication on the first data succeeds.