H04W8/087

P-VISITED-NETWORK-ID (PVNI) WITH DATA RESTORATION
20170366961 · 2017-12-21 ·

Techniques are disclosed for providing data restoration for a call server control function (S-CSCF) in a telecommunications network that includes a P-Visited-Network-ID (PVNI). In some embodiments, in the course of a user device registering to a telecommunications network, a home subscriber server (HSS) of the network stores a PVNI for the user device. If a S-CSCF that corresponds to the user device later fails, the network is able to restore the S-CSCF using the information in the HSS, which includes the PVNI.

CLOUD DELIVERED ACCESS

Cloud delivered access may be provided. A network device may provide a client device with a pre-authentication virtual network and a pre-authentication address. Next, a policy may be received in response to the client device authenticating. The client device may then be moved to a post-authentication virtual network based on the policy. A post-authentication address may then be obtained for the client device in response to moving the client device to a post-authentication virtual network. Traffic for the client device may then be translated to the post-authentication address.

Per-host locator to enable mobility gateway relocation in distributed mobility management
09781590 · 2017-10-03 · ·

A method and system of relocating user equipment, such as a mobile device in a network from a first mobility anchor to a second mobility anchor, includes providing an identifier address to the user equipment when the latter is anchored to the first mobility anchor or gateway. When the user equipment is relocated to be anchored at the second mobility anchor or gateway, a per-host locator address is associated with the user equipment, the per-host locator address directing network packets to be routed to the second mobility anchor. A destination address of network packets addressed to the identifier address is translated to the per-host locator address, such that the network packets are routed to the second mobility anchor, and the destination address of network packets that are addressed to the per-host locator address are reverse translated to the identifier address, and the packets are forwarded to the user equipment.

Anchor node selection in a distributed mobility management environment

Systems, methods, and instrumentalities to select a distributed gateway (D-GW). A WTRU may be configured to detect a request for an address associated with content. The WTRU may receive an address list associated with the content. The WTRU may select a distributed gateway (D-GW). If an address of a currently connected D-GW is included in the address list, the WTRU may select the currently connected D-GW. If the address of the currently connected D-GW is not in the address list and an address of an anchor D-GW that is not currently connected is included in the address list, the WTRU may select the anchor D-GW that is not currently connected. If the address of the currently connected D-GW is not in the address list and the address of the anchor D-GW that is not currently connected is not in the address list, the WTRU may select the currently connected D-GW.

Address assignment for initial authentication

A mobile device may transition between Extended Service Set (“ESS”) networks while maintaining the same internet protocol (“IP”) address while transitioning. The transition may occur seamlessly, such that a consumer never loses the network connection despite transitioning between networks. The mobile device may receive an IP address from a pool of addresses, such that the mobile device can keep that IP address as it is transitions between networks that each have access to the pool. The assignment of the IP address to the mobile device is from the pool of IP addresses rather than from the AP.

Position parameterized recursive network architecture with topological addressing
09762531 · 2017-09-12 · ·

A digital data communications network that supports efficient, scalable routing of data and use of network resources by combining a recursive division of the network into hierarchical sub-networks with repeating parameterized general purpose link communication protocols and an addressing methodology that reflects the physical structure of the underlying network hardware. The sub-division of the network enhances security by reducing the amount of the network visible to an attack and by insulating the network hardware itself from attack. The fixed bandwidth range at each sub-network level allows quality of service to be assured and controlled. The routing of data is aided by a topological addressing scheme that allows data packets to be forwarded towards their destination based on only local knowledge of the network structure, with automatic support for mobility and multicasting. The repeating structures in the network greatly simplify network management and reduce the effort to engineer new network capabilities.

CLOUD DELIVERED ACCESS

Cloud delivered access may be provided. A network device may provide a client device with a pre-authentication virtual network and a pre-authentication address. Next, a policy may be received in response to the client device authenticating. The client device may then be moved to a post-authentication virtual network based on the policy. A post-authentication address may then be obtained for the client device in response to moving the client device to a post-authentication virtual network. Traffic for the client device may then be translated to the post-authentication address.

APPLICATION INSTANCE ADDRESS TRANSLATION METHOD AND APPARATUS
20220030585 · 2022-01-27 ·

This application discloses example application instance address translation methods. One example method includes receiving, by a control plane device from a mobile edge cloud control device, an address of a target application instance of an application service accessed by a terminal. The control plane device can then send the address of the target application instance to a first user plane device. The control plane device can then instruct the first user plane device to set, as the address of the target application instance, a destination address of an uplink packet that is of the terminal and is associated with the application service

POSITION PARAMETERIZED RECURSIVE NETWORK ARCHITECTURE WITH TOPOLOGICAL ADDRESSING
20220021643 · 2022-01-20 · ·

A digital data communications network that supports efficient, scalable routing of data and use of network resources by combining a recursive division of the network into hierarchical sub-networks with repeating parameterized general purpose link communication protocols and an addressing methodology that reflects the physical structure of the underlying network hardware. The sub-division of the network enhances security by reducing the amount of the network visible to an attack and by insulating the network hardware itself from attack. The fixed bandwidth range at each sub-network level allows quality of service to be assured and controlled. The routing of data is aided by a topological addressing scheme that allows data packets to be forwarded towards their destination based on only local knowledge of the network structure, with automatic support for mobility and multicasting. The repeating structures in the network greatly simplify network management and reduce the effort to engineer new network capabilities.

PREDICTIVE CLIENT MOBILITY SESSION MANAGEMENT
20210360490 · 2021-11-18 ·

Systems and methods are disclosed that enable predictive device mobility session management in a wireless network. A wireless communications network is able to maintain IP session continuity as a wireless device roams among wireless access points of the communications network by ensuring that the wireless device maintains communications with its home wireless access gateway.