H04L41/5022

UE-Initiated In-Band Policy Activation for Flow-Based Policies
20230246915 · 2023-08-03 ·

A method in a User Plane Function (UPF) comprising receiving from a Policy Control Function (PCF), an instruction to create a new Packet Detection Rule (PDR), the instruction comprising an IP address for the wireless device, a value of a ToS field, and a quality-of-service, QoS, reference or charging policy. The method further comprises storing the IP address, the value of the ToS field, and the QoS reference or charging policy as a predetermined PDR. The method further comprises subsequently receiving, from a wireless device, a first packet targeted to an application server, AS, mapping the first packet to the predetermined PDR, based on a value of a ToS, field in the first packet, and adding a 5-tuple associated with the first packet to the predetermined PDR. This serves to bind the new connection to the PDR.

EDGE DATABASE MANAGEMENT OF THE NETWORK DATA PLANE

Novel tools and techniques for network data plane management are provided. A system includes a host machine that includes a database, processor, and non-transitory computer readable media comprising instructions executable by the processor to obtain, via the database, a network configuration, spawn a container according to the network configuration, wherein the container is configured, based on the network configuration, to be coupled to a network overlay via a network interface, receive, via the network interface, incoming data associated with the container, the incoming data having attached one or more attached network data attributes, and identify, via the database, the attached one or more network data attributes attached to the incoming data as one or more network data attributes of the network data model.

EDGE DATABASE MANAGEMENT OF THE NETWORK DATA PLANE

Novel tools and techniques for network data plane management are provided. A system includes a host machine that includes a database, processor, and non-transitory computer readable media comprising instructions executable by the processor to obtain, via the database, a network configuration, spawn a container according to the network configuration, wherein the container is configured, based on the network configuration, to be coupled to a network overlay via a network interface, receive, via the network interface, incoming data associated with the container, the incoming data having attached one or more attached network data attributes, and identify, via the database, the attached one or more network data attributes attached to the incoming data as one or more network data attributes of the network data model.

Network communications

A method of processing browser sessions in a telecommunications network is provided. The method includes receiving, from a subscriber client device in a plurality of subscriber devices each having an associated subscriber and a browser session request. The method includes, at the entity in the service provider network: transmitting the browser session request to a server entity located inside or outside the service provider network, receiving, from the server entity, a browser session response in relation to the transmitted browser session request, transmitting the browser session response to the subscriber client device, performing a lookup in the subscriber profile database for the subscriber client device in the plurality or the associated subscriber, and modifying, prior to the respective transmittal, at least one of the browser session request and the browser session response according to the results of the lookup. An apparatus and computer software are also provided.

Slice assurance within a mobile network
11765049 · 2023-09-19 · ·

In general, techniques are described for slice assurance within a mobile network. In some examples, a method includes obtaining, by a slice assurance function (SAF) executed by a device, key performance indicator (KPI) values for a first slice of a plurality of slices implemented by a plurality of base stations serving a tracking area of a mobile network; determining, by the SAF, based in part on the KPI values for the first slice, a service level agreement (SLA) for the first slice has not been met; re-allocating, by the SAF in response to the determining, slice resources associated with any of the plurality of slices to compute a new slice configuration parameter for the first slice; and reconfiguring, by the SAF, at least one of the plurality of base stations to implement the new slice configuration parameter for the first slice.

Message queue architecture and interface for a multi-application platform

Non-volatile memory may contain definitions of: (i) a plurality of message queue implementations respectively associated with different queue behaviors, the different queue behaviors specified by corresponding sets of modes, and (ii) an application programming interface (API) through which applications can access one or more message queues. One or more processors may be configured to: create a message queue of a particular message queue type, supported by a corresponding message queue implementation, by specifying a set of modes corresponding to a queue behavior; receive, from a producing application and by way of the API, one or more messages for the message queue; store the one or more messages in a data structure associated with the message queue; receive, from a consuming application and by way of the API, a request to read from the message queue; and provide a message from the message queue to the consuming application.

Message queue architecture and interface for a multi-application platform

Non-volatile memory may contain definitions of: (i) a plurality of message queue implementations respectively associated with different queue behaviors, the different queue behaviors specified by corresponding sets of modes, and (ii) an application programming interface (API) through which applications can access one or more message queues. One or more processors may be configured to: create a message queue of a particular message queue type, supported by a corresponding message queue implementation, by specifying a set of modes corresponding to a queue behavior; receive, from a producing application and by way of the API, one or more messages for the message queue; store the one or more messages in a data structure associated with the message queue; receive, from a consuming application and by way of the API, a request to read from the message queue; and provide a message from the message queue to the consuming application.

FACILITATING DYNAMIC SATELLITE AND MOBILITY CONVERGENCE FOR MOBILITY BACKHAUL IN ADVANCED NETWORKS
20220029700 · 2022-01-27 ·

Facilitating dynamic satellite and mobility convergence for mobility backhaul in advanced networks (e.g., 4G, 5G, 6G and beyond) is provided herein. Operations of a system can comprise determining that a group of user equipment devices are located in a defined geographic area and are consuming more than a defined level of resources of a wireless communications network based on an amount of network traffic received from the group of user equipment devices. The operations also can comprise configuring an integrated network comprising a first group of terrestrial network devices and a second group of satellite network devices. Further, the operations can comprise routing at least a portion of network traffic associated with the group of user equipment devices among the first group of terrestrial network devices and the second group of satellite network devices.

Manifest files-based provisioning of physical hosts to clusters in hyperconverged infrastructures
11190416 · 2021-11-30 · ·

In one example, a computer implemented method may include dynamically generating a manifest file for a cluster in an hyperconverged infrastructure. The manifest file may include metadata associated with the cluster. Further, the method may include determining one or more physical hosts in a host pool that are compatible with the cluster using the manifest file and generating a cluster-to-physical host mapping table by mapping the cluster to the determined one or more physical hosts that are compatible with the cluster. Furthermore, the method may include provisioning the one or more physical hosts to the cluster using the cluster-to-physical host mapping table in response to detecting a trigger.

IOT APPLICATION LEARNING
20210367829 · 2021-11-25 ·

A system and method for performing automated learning of an Internet-of-Things (IoT) application are disclosed. The automated learning is based on generation of application-agnostic events, allowing the automated learning to be performed without prior knowledge of the IoT application.