Patent classifications
H04L12/1407
Restricted local operator services for a wireless network
A base station sends, to a wireless device, a system information block (SIB) indicating that restricted local operator services (RLOS) are supported by a public land mobile network, and receives, from the wireless device and based on the SIB indicating support for the RLOS, a preamble. The base station sends a random access response to the preamble and receives at least one first radio resource control (RRC) message comprising a first information element indicating that an RRC connection of the wireless device is for the RLOS and a second information element comprising an attach request message indicating, to a mobility management entity (MME) configured with an RLOS access point name, that an attach request of the wireless device is for the RLOS. The base station sends to the wireless device a second RRC message comprising an attach accept message indicating acceptance of the RLOS by the MME.
Latency-sensitive network-traffic quality of service
A telecommunication system can include routing devices, a bearer-management device, and a policy-management device. The bearer-management device can receive a request from a terminal to create a specialized bearer (SB) for a non-audio, non-video media type. The bearer-management device can determine that the request is associated with an authorized user, and then send a setup message comprising a Quality of Service (QoS) indicator to the policy-management device. The policy-management device can create the SB permitting data exchange between the terminal and a routing device. The SB can have QoS characteristics associated with the QoS indicator. In some examples, the terminal can receive a network address, determine an associated network port, and send a SIP INVITE message indicating the non-audio, non-video media type. The terminal can then exchange data on the network port with a peer network terminal.
Automatically influencing UE slice policies based on real time analysis
Systems and methods define an enhanced charging function (CHF) in a communication network by creating a type of slice analysis functionality. For example, the system can access slice information from multiple Policy Control Functions (PCFs) and determine analytics for multiple slices associated with a subscriber user/device or group of subscriber users/devices. Using the enhanced CHF, the system can trigger slice level decisions at a higher level of the hierarchy based on information being aggregated for family devices/plans, category, quota, usage, or other groupings at the CHF instead of just at the individual slice level (e.g., similar to standard PCF functionality).
Coordinating cellular and cable/fiber broadband networks
Detect, at a cable/fiber broadband network termination unit of a cable/fiber broadband multi-service operator, an interruption in service to a cable/fiber broadband network customer unit—small cell pair. Responsive to detecting the interruption, the termination unit advises a charging server of the operator of the interruption in service, a corresponding identifier of the customer unit—small cell pair, and a corresponding account identifier. Responsive to termination unit advising the charging server, the charging server advises a backend server of an associated cellular network of a customer identifier corresponding to the account identifier. Responsive to the charging server advising the backend server, the backend server advises a policy control function of the associated cellular network to modify network parameters of the associated cellular network to compensate for the interruption in service.
Adjustable and dynamic thresholds in wireless networks
Techniques and architectures enable a wireless communications network to allow for dynamic changes or on-the-fly selections of Fair Usage thresholds or other thresholds and to allow for the Fair Usage thresholds to be associated with individual subscribers of the wireless communications network. Subscriber groups of relatively small granularity or individual subscribers may be assigned a profile that sets forth actions to be applied to subscribers in response to the subscribers reaching particular thresholds of data usage.
METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR RESOURCE CLEANUP IN COMMUNICATIONS NETWORKS
Methods, systems, and computer readable media for resource cleanup in communications networks are disclosed. One method for resource cleanup in a communications network comprises: at a policy control function (PCF) comprising at least one processor: receiving, from a binding support function (BSF), a first notification indicating a potentially stale or inactive first binding record, wherein the first notification includes context data associated with the first binding record; determining that resource cleanup associated with the first binding record should be performed; and initiating, using the context data, resource cleanup associated with the first binding record at one or more network entities.
Method for Determining Policy Control Network Element, Apparatus, and System
A method for determining a policy control network element, in which a mobility management network element obtains first indication information, where the first indication information indicates to select a same policy control network element as a policy control network element for access and mobility management and a policy control network element for session management; the mobility management network element receives a session establishment request from a terminal for establishing a first session; and the mobility management network element sends second indication information and information about a first policy control network element to a session management network element based on the first indication information, where the second indication information indicates to select a same policy control network element as a policy control network element used for access and mobility management and a policy control network element used for session management of the first session.
Sx protocol extension to support node PDR
The embodiments herein relate to Sx protocol extension to support node PDR. In one embodiment, there proposes a method (500) in a first network node (301) configured as control plane function (CPF). The first network node (301) is coupled to a second network node (302) configured as user plane function (UPF) via an Sx interface. The method (500) comprising transmitting (S501) a message associated with a Packet Detection Rule (PDR) to the second network node (302) via the Sx interface, wherein the PDR is applicable to more than one Sx session. With embodiments herein, the CPF-UPF signaling throughput can be minimized significantly, and the memory footprint per Sx session can be decreased.
System and mechanism to report usage for offline services with specific trigger requirements
Systems and methods are provided for utilizing an asynchronous report feature when a time or volume reporting trigger is unavailable. The systems and method can include receiving node level capabilities from at least one of a plurality of user plane functions, receiving an asynchronous report from the at least one of the plurality of user plane functions, determining an absence of a reporting trigger based on charging information associated with a policy control function and trigger information associated with a charging function, selecting a user plane function from the plurality of user plane functions based on the asynchronous report, and generating a usage reporting rule without the reporting trigger to be provided to the user plane function from the plurality of user plane functions.
RADIO ACCESS TECHNOLOGY (RAT) TYPE USAGE DIFFERENTIATION FOR DIFFERENTIAL CHARGING IN 5G NON-STANDALONE (5G NSA) ARCHITECTURE DEPLOYMENTS
A control plane function node may be used in a Fifth Generation (5G) Non-Standalone (NSA) architecture having Radio Access Network (RAN) level interworking between a Long-Term Evolution (LTE) RAN and a 5G New Radio (NR). The node obtains usage report data which are based on traffic of a user equipment (UE) via primary and secondary Radio Access Technologies (RATs). The node also obtains secondary RAT usage report data which are based on traffic of the UE via the secondary RAT. The node constructs a message which indicates a request for charging based on the usage report data and the secondary RAT usage report data. In constructing the message, the node populates, in association with a corresponding rating group and usage data of the UE, an identifier of a flow or bearer associated with secondary RAT usage, together with the secondary RAT usage report data.