H04W8/082

DYNAMIC ACTIVATION OF LOCAL BREAKOUT WITH COORDINATION BETWEEN APPLICATION DOMAIN AND MOBILE NETWORK
20230224792 · 2023-07-13 ·

Disclosed herein is a method performed by a network node and a network node performing the method, which implements a DNS function in a mobile network, the method comprising the actions: receiving; a DNS query that originated at a UE; in response to receiving; the DNS query, determining; to trigger dynamic activation of Local Break Out, LBO, for a session of the UE at a breakout site of the mobile network for traffic between the UE and an edge AS site that is connected to the breakout site; and upon determining; to trigger dynamic activation of LBO for the session of the UE at the breakout site of the mobile network for traffic between the UE and the edge AS site, triggering; dynamic activation of LBO for the session of the UE at the breakout site of the mobile network for traffic between the UE and the edge AS site.

Connectivity to a local area network via a cellular radio access technology

Methods, systems, and devices for wireless communication are described. A user equipment (UE) may establish connectivity to a local area network using cellular radio access technology (RAT). The UE may establish a signaling radio link with a cellular access node (AN) via a cellular RAT. The UE may transmit a connectivity request to a network node via the signaling radio link. The connectivity request may specify a connectivity type for establishing connectivity to a LAN. Based at least in part on an acceptance of the connectivity request, the UE may establish a data radio link with the cellular AN. In an example, the acceptance of the connectivity request may include at least one parameter for configuring the connectivity to the LAN. The UE may then establish a data flow for exchanging data link layer packets with the LAN via the data radio link.

METHOD AND DEVICE FOR PROVIDING DIRECT COMMUNICATION IN WIRELESS COMMUNICATION SYSTEM
20220369092 · 2022-11-17 ·

According to an embodiment of the disclosure, an operating method of a first proximity-based services (ProSe) function belonging to a first public land mobile network (PLMN) includes: receiving a first ProSe Communication Create Request message from an application function (AF), a network exposure function (NEF) belonging to the first PLMN, or a first user equipment (UE) subscribed to the first PLMN; determining whether to perform inter-PLMN communication between the first UE and a second UE subscribed to a second PLMN, the second PLMN being different from the first PLMN; transmitting, to a second ProSe function belonging to the second PLMN, a ProSe Provisioning Request message including first radio resource information for direct communication by the first UE; receiving, from the second ProSe function, a ProSe Provisioning Response message including second radio resource information for direct communication by the second UE; and transmitting, to the first UE, the first ProSe Communication Create Request message including inter-PLMN communication information for direct communication with the second UE.

Method for transmitting data in CIoT system and device therefor

The present disclosure provides a method whereby a mobility management entity (MME) in a cellular communication system transmits uplink data, the method comprising: receiving uplink data from a terminal; determining if the received uplink data is an Internet Protocol (IP) packet by examining the uplink data; transmitting the uplink data to a destination node via a packet data network (PDN) if the uplink data is an IP packet; and transmitting the uplink data to the destination node via a service capability exposure function (SCEF) if the uplink data is not an IP packet, wherein the uplink data comprises an indicator for indicating whether the uplink data is an IP packet.

Systems and methods for modifying data usage permissions based on an event

A device receives instructions to update a field that defines a coverage area within a network. The device updates, based on receiving the instructions, the field to include a set of identifiers that are associated with a group of base stations within the coverage area. The device determines that a user equipment (UE), that is connected to the network, qualifies for the expanded data usage permissions based on account information associated with the UE including a particular identifier that allows the UE to utilize the expanded data usage permissions. The device provides, to another device, a request for data usage information that reflects the expanded data usage permissions. The device causes the data usage information to be applied to the UE.

Methods and Apparatus for Session Steering to Application Servers

A method includes receiving, by a control plane (CP) from an application function (AF), a traffic influence routing rule comprising a service address representing a destination address of a route to an application server, the traffic influence routing rule specifying a breakout rule for packets of a communicating device addressed to the application server; storing, by the CP, the traffic influence routing rule in a policy control function (PCF); and generating, by the CP, a traffic filter for packets of at least one traffic flow associated with the communicating device, the traffic filter directing packets of the at least one traffic flow that are addressed to the application server to the service address, the traffic filter being generated in accordance with the traffic influence routing rule.

Virtualized radio access network architecture for applications requiring a time sensitive network

Techniques associated with localizing data traffic for a time sensitive network within a virtualized radio access network are provided. In one embodiment, a method includes determining that a user equipment (UE) is associated with a time sensitive network; and localizing data traffic for the UE within a virtualized radio access network based on determining that the data traffic for the UE can be localized at one centralized user plane component of the virtualized radio access network for the time sensitive network. The data traffic can be Layer-2 data traffic or unstructured data traffic.

MANAGEMENT OF ROUTING
20230090407 · 2023-03-23 ·

The invention relates to a solution for controlling a routing of data traffic of a roaming terminal device (140) with data network (150), the method comprises: detecting (210) if the terminal device (140) is served by a private network (130), and in accordance with a detection result performing one of: selecting (220) a network node (135) of the private network (130) for managing the routing if the roaming terminal device (140) is served by the private network (130); or selecting (230) a network node (115; 125) of a mobile communication network (110; 120) for managing the routing if the terminal device (140) is not served by the private network (130), the method further comprising: generating (240) a control signal to a respective network (130; 110; 120) the selected network node (115; 125; 135) resides for assigning a responsibility for managing the routing.

ULTRA-RELIABLE AND LOW LATENCY COMMUNICATIONS LOCAL BREAKOUT METHOD AND SYSTEM FOR NEXT GENERATION RADIO ACCESS NETWORK
20220345361 · 2022-10-27 ·

An ultra-reliable and low latency communications local breakout (URLLC-LBO) method and a URLLC-LBO method for a next generation radio access network (NG-RAN) are provided. The method includes: configuring a core network to establish a packet data unit (PDU) session between first user equipment (UE) and the core network; configuring the first UE to establish a URLLC service; configuring a near real-time RAN intelligent controller (near-RT RIC) to establish an F1-LBO routing process to set an LBO dedicated radio bearer (DRB) for the local URLLC service; configuring an F1-LBO virtual network function (VNF) module according to a traffic rule by the F1-LBO routing process, to establish a routing table through the F1-LBO VNF module, in which the routing table defines a relationship between a first location and a second location of the LBO DRB.

Systems and methods for “machine-to-machine” (M2M) communications between modules, servers, and an application using public key infrastructure (PKI)
11606204 · 2023-03-14 · ·

Methods and systems are provided for supporting efficient and secure “Machine-to-Machine” (M2M) communications using a module, a server, and an application. A module can communicate with the server by accessing the Internet, and the module can include a sensor and/or an actuator. The module, server, and application can utilize public key infrastructure (PKI) such as public keys and private keys. The module can internally derive pairs of private/public keys using cryptographic algorithms and a first set of parameters. A server can authenticate the submission of derived public keys and an associated module identity. The server can use a first server private key and a second set of parameters to (i) send module data to the application and (ii) receive module instructions from the application. The server can use a second server private key and the first set of parameters to communicate with the module.