H04L12/1407

TSC-5G QoS MAPPING WITH CONSIDERATION OF ASSISTANCE TRAFFIC INFORMATION AND PCC RULES FOR TSC TRAFFIC MAPPING AND 5G QoS FLOWS BINDING

Systems and methods are disclosed herein that relate to Time Sensitive Communication (TSC) to Fifth Generation (5G) Quality of Service (QoS) mapping and associated QoS binding. In one embodiment, a method for QoS mapping in a 5G System (5GS) for a virtual Time Sensitive Networking (TSN) bridge comprises, at a first network function, obtaining information from a TSN Application Function (AF) comprising baseline TSC QoS parameters and one or more additional parameters comprising either or both of: (a) one or more additional TSC QoS attributes and (b) one or more additional traffic attributes. The method further comprises, at the first network function, generating one or more Policy and Charging Control (PCC) rules based on the obtained information and providing the one or more PCC rules to a second network function. The method further comprises, at the second network function, performing QoS binding based on the one or more PCC rules.

System and method for determining data usage in a converged charging system

Systems and methods described herein include receiving, at a network device and from a session management device, a first message that includes a first identifier associated with a subscriber and a second identifier associated with a first service that is charged using an online charging system. The network device transmits a second message that indicates a first time period in which to report data usage associated with the first service and a second time period in which to report data usage associated with one or more second services that are charged using an offline charging system. The network device receives first data usage information associated with the first service after the first time period and second data usage information associated with the one or more second services after the second time period. The network device processes the data usage information.

DIAL-UP PACKET PROCESSING METHOD, NETWORK ELEMENT, SYSTEM, AND NETWORK DEVICE
20230018346 · 2023-01-19 ·

This application provides a dial-up packet processing method. The method is applied to a dial-up packet processing system. The system includes a controller, an access gateway, a forwarding plane network element, and a control plane network element that are connected to each other. The method includes: The control plane network element receives a dial-up packet from the access gateway, where the dial-up packet is a dial-up packet sent by user equipment to the access gateway; the control plane network element sends an authentication request to an external server, where the authentication request is generated by the control plane network element based on the dial-up packet; the control plane network element receives dial-up success information sent by the external server; and the control plane network element determines the forwarding plane network element based on the dial-up success information.

Optimized Procedure for PFD Management

The embodiments herein relate to optimized procedure for Packet Flow Description (PFD) management. In one embodiment, there proposes a method (800) for managing Packet Flow Description (PFD), comprising: receiving (S801) from a Session Management Function (SFM) (201) or a User Plane Function (UPF) (302) a demand message indicating the demand for at least one PFD mle for an application; detecting (S802) the at least one PFD mle for the application; and notifying (S803) information regarding the at least one PFD rule to the SMF (201) or the UPF (302). The embodiments herein may achieve an optimized procedure for PFD Management which optimizes the delivery of PFD rules, by reducing the amount of signaling and by reducing the number of hops between the producer (AF) and the consumer (UPF).

Provisional computing resource policy evaluation

A policy management service receives a request to evaluate a provisional policy to determine the impact of implementation of the provisional policy. The policy management service evaluates an active policy against a request to access a computing resource to determine an authorization decision. The policy management service then evaluates the provisional policy against the request to access the computing resource to generate an evaluation of the provisional policy. The policy management service provides the evaluation and the authorization decision in response to the request to evaluate the provisional policy.

METHODS AND SYSTEMS FOR CHARGING FOR DEVICE IDENTIFICATION, ADDITION AND/OR CHANGE
20230223764 · 2023-07-13 ·

Systems and methods are provided for charging for a connection in a radiocommunication system that provides services to both a device which is directly connected to the radiocommunication system and one or more other devices which connect to the radiocommunication system using, e.g., the transceiver of the device which is able to directly connect to the radiocommunication system. A method for charging for a first device which is connected to a second device that has radiocommunication connectivity includes receiving, at a node in the radiocommunication system, a charging authorization message for the second device’s connection to the radiocommunication system, which charging authorization message includes the device identifier associated with the first device; adding, by the node in the radiocommunication system, the device identifier for the first device to a list associated with the second device; and sending an indication that a connection for the first and second device is authorized.

Transmission of packets relating to a processing rule
11700199 · 2023-07-11 · ·

A method of controlling a packet stream generated by an application installed in a mobile terminal, the stream being intended to be sent by the terminal over a communications network managed by an operator. The method includes the following acts implemented in the terminal, for at least one packet generated by the application: obtaining a first packet having a first header and payload data; transmitting a request message to a security module installed in the terminal, the message including a parameter of the first header; receiving a response from the security module, which includes an instruction relating to transmission of a second packet, the response being based on the parameter and established according to a processing rule; preparing the second packet by modifying the first header into a second header, based on the instruction, the second packet including the second header and the payload data; and transmitting the second packet.

Policy control for multiple accesses

A wireless device sends a registration request message to an access and mobility management function (AMF) of a network. The wireless device receives, from the AMF, a registration accept message comprising an access traffic steering, switching, and splitting (ATSSS) capability indication of the network.

METHOD AND APPARATUS FOR FLEXIBLE AND EFFICIENT ANALYTICS IN A NETWORK SWITCH

Embodiments of the present invention relate to a centralized network analytic device, the centralized network analytic device efficiently uses on-chip memory to flexibly perform counting, traffic rate monitoring and flow sampling. The device includes a pool of memory that is shared by all cores and packet processing stages of each core. The counting, the monitoring and the sampling are all defined through software allowing for greater flexibility and efficient analytics in the device. In some embodiments, the device is a network switch.

EVENT SUBSCRIPTION METHOD, APPARATUS, AND SYSTEM
20230216697 · 2023-07-06 · ·

This disclosure provides an event subscription method. A policy control entity receives information about a first event from a session management entity, where the information about the first event includes subscription indication information of the first event and first data description information of the first event. The policy control entity determines that second data description information of a second policy and charging control (PCC) rule is the same as the first data description information, where the second data description information is data description information of a second event, and the second PCC rule includes second indication second information indicating to detect the second event. The policy control entity, based on the subscription indication information, updates the second PCC rule obtain a first PCC rule, and sends, the first PCC rule comprising the second indication information and first indication information indicating to detect the first event, to the session management entity.