H04L61/4541

METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR ROUTING INTER-PUBLIC LAND MOBILE NETWORK (INTER-PLMN) MESSAGES RELATED TO EXISTING SUBSCRIPTIONS WITH NETWORK FUNCTION (NF) REPOSITORY FUNCTION (NRF) USING SECURITY EDGE PROTECTION PROXY (SEPP)
20230110286 · 2023-04-13 ·

A method for routing inter-public land mobile network (inter-PLMN) messages relating to existing subscriptions with a network function (NF) repository functions (NRFs) includes, at a security edge protection proxy (SEPP) implemented using at least one processor, automatically populating, by the SEPP, a subscription identifier to target NRF resource identification information mapping database accessible to the SEPP with mappings between subscription identifiers and target NRF resource identification information. The method further includes receiving an inter-PLMN message for modifying or deleting a subscription. The method further includes reading a subscription identifier from the message for modifying or deleting the subscription. The method further includes using the subscription identifier from the message for modifying or deleting the subscription to access the database and obtain an identifier associated with an NRF that created the subscription. The method further includes forwarding the message for updating or deleting the subscription to the NRF.

Edge cloud anchoring

The present disclosure relates to a method for anchoring an edge cloud to a central cloud, the method being performed in a cloud environment comprising a central cloud and an edge cloud, the method comprising obtaining (S238, S310), by a connectivity controller of an edge cloud, an address of an anchoring registry of a central cloud; sending (S240, S312), by the connectivity controller, to the anchoring registry, information about networking configuration of the edge cloud; setting up (S246, S314), by an orchestrator of the central cloud, a virtual private network, VPN, service in the central cloud; requesting (S248, S316), by the orchestrator of the central cloud, edge VPN configuration information from the central VPN service, based on the information about networking configuration of the edge cloud; sending (S252, S318), by the anchoring registry, the edge VPN configuration information, to an orchestrator of the edge cloud; creating (S258, S320), by an orchestrator of the edge cloud, an edge VPN service, based on the edge VPN configuration information; and establishing (S260, S322) a VPN connection between the edge VPN service and the central VPN service, whereby services from either one of the edge cloud or the central cloud are exposed in the edge cloud and the central cloud.

SELECTING FORWARDER IN A NETWORK INSTALLATION
20230155898 · 2023-05-18 ·

Examples described herein relate to a selection of a network device in a network installation for a forwarder operation. Selection may include computing a performance score based on a set of performance parameters. Broadcasting the computed performance score to other network devices. Receiving performance scores from the other network devices. Comparing the received performance scores with the computed performance score. Continuing in the forwarder mode based on a determination that the received performance scores are less than its computed performance score. Receiving multicast Domain Name Service (mDNS) packets from one or more client devices. Sending the received mDNS packets to a central service.

TECHNIQUES TO SUPPORT EMERGENCY CALLS WITH OVER-THE-TOP SERVICE PROVIDER

Methods, systems, and devices are described for wireless communication. A wireless device such as an in-vehicle system (IVS) may transmit an emergency call (eCall) message to a third party eCall server using a communication session which may be packet based or circuit based. The eCall message may include session information and telematics data. The third party eCall server may relay the session information and telematics data to a public safety answering point (PSAP). For example, the third party eCall server may generate an automatic text-to-speech message that is transmitted to the PSAP over a public communications network. In some cases, the third party eCall server may transmit a response to the wireless device including metadata based on the telematics data transmitted in the eCall message. The eCall message may also include a call-back number, and the PSAP may contact the wireless device directly using the call-back number.

EPDG SELECTION
20170374018 · 2017-12-28 ·

Apparatuses, methods, and systems are disclosed for ePDG selection. One apparatus 200 includes a processor 605 that identifies a region in which the apparatus 200 is currently located, transmits a query 800 to a domain name system (“DNS”) server 270 based on the region not being a home region 210 of the apparatus 200, the query 800 identifying the region in which the apparatus is currently located, and selects an enhanced packet data gateway (“ePDG”) 140 based on a response to the query. The apparatus also includes a transceiver 630 that communicates with a mobile communication network 130 over a wireless local area network (“WLAN”) 235.

UTILIZING SERVICE TAGGING FOR ENCRYPTED FLOW CLASSIFICATION

In one embodiment, a device in a network receives domain name system (DNS) information for a domain. The DNS information includes one or more service tags indicative of one or more services offered by the domain. The device detects an encrypted traffic flow associated with the domain. The device identifies a service associated with the encrypted traffic flow based on the one or more service tags. The device prioritizes the encrypted traffic flow based on the identified service associated with the encrypted traffic flow.

Domain name system query method and communication apparatus
11689496 · 2023-06-27 · ·

A domain name system query method in which: a first network element receives a DNS query request including a first domain name from a terminal apparatus; the first network element sends first request information which comprises location information of the terminal apparatus and the first domain name to a second network element; the second network element determines, based on the first request information, an IP address and feeds back the IP address to the first network element; and the first network element sends the IP address to the terminal apparatus. When a terminal apparatus performs domain name query, a core network element determines an IP address of an application server based on location information of the terminal apparatus and a queried domain name. In this way, the terminal apparatus obtains an IP address of an application server close to the terminal apparatus, thereby improving service access efficiency of the terminal apparatus.

METHODS AND PROCEDURES FOR THE DYNAMIC MAC ADDRESS DISTRIBUTION IN IEEE 802.11 NETWORKS

Methods and apparatuses are described for dynamic medium access control (MAC) address distribution in a wireless network. A station (STA) may receive, from an access point (AP), a frame that includes an indicator indicating at least one MAC address type or MAC address policy supported by an extended service set (ESS) associated with the AP. The indicator may comprise an 8 bit bitmap. The STA may then transmit, to the AP, a request message that includes MAC Address Assignment Protocol information determined based on the at least one MAC address type or MAC address policy. The STA may receive a response message that includes a local medium access control (MAC) address assigned based on the MAC Address Assignment Protocol information. The STA may transmit, to the AP, an association request frame with the local MAC address.

METHODS AND PROCEDURES FOR THE DYNAMIC MAC ADDRESS DISTRIBUTION IN IEEE 802.11 NETWORKS

Methods and apparatuses are described for dynamic medium access control (MAC) address distribution in a wireless network. A station (STA) may receive, from an access point (AP), a frame that includes an indicator indicating at least one MAC address type or MAC address policy supported by an extended service set (ESS) associated with the AP. The indicator may comprise an 8 bit bitmap. The STA may then transmit, to the AP, a request message that includes MAC Address Assignment Protocol information determined based on the at least one MAC address type or MAC address policy. The STA may receive a response message that includes a local medium access control (MAC) address assigned based on the MAC Address Assignment Protocol information. The STA may transmit, to the AP, an association request frame with the local MAC address.

Asset detection system

A pluggable asset detection engine is used to identify devices within a network. The pluggable asset detection engine includes a set of pluggable discovery sensors and is adapted to identify particular address information of a particular computing device within a network, using a first pluggable discovery sensor in the set of discovery sensors, and send an identification of the particular address information of the particular computing device to an asset management system for inclusion of the particular address information in an asset repository managed by the asset management system.