Patent classifications
H04W28/0831
User plane function (UPF) selection based on predicted load information
When a packet data session is established for a user equipment (UE), a comparative assessment of load information factors from different sets of load information factors associated with a plurality of user plane function (UPF) instances may be performed. Each set of load information factors of a UPF instance may include predicted load information factors indicative of a predicted load at the UPF instance. A UPF instance may be selected for the packet data session of the UE based on the comparative assessment. The comparative assessment may additionally consider a predicted load contribution of the packet data session to be established for the UE. A data analytics function may utilize a model (e.g. a multiple linear regression model) to calculate predicted load contribution factors, where the model is derived based on historical usage data from previous sessions of one or more UEs, for example, data from charging data records (CDRs).
METHODS AND SYSTEMS FOR 5G SLICING BASED ON DYNAMIC SECURITY PROPERTIES
Systems and methods enable the provisioning of security as a service for network slices. A network device stores definitions of multiple security assurance levels for network slices based on security parameters of assets used in the network slices. The network device stores multiple network slice templates, wherein the multiple network slice templates have different security assurance levels, of the multiple security assurance levels, for a Network Service Descriptor (NSD). The network device receives a request for a network slice with a requested security assurance level, of the multiple security assurance levels, for the NSD, and deploys the network slice using one of the network slice templates that has a security assurance level that corresponds to the requested security assurance level. The network device monitors the security parameters of the assets of the network slice for changes to the security assurance level of the deployed network slice.
Systems and methods for cooperative communication using interfering signals
An electronic device discussed herein may include radio frequency communication circuitry for communication on a radio frequency network according to a communication configuration, a processor, and memory. The memory may store instructions that, when executed by the processor, cause the electronic device to perform operations including receiving, a first muting configuration indicating when the radio frequency communication circuitry is to communicate using a first type of communication on a first frequency band and when the radio frequency communication circuitry is to communicate using a second type of communication on a second frequency band, where the first frequency band may overlap with the second frequency band. The memory may store instructions that, when executed by the processor, cause the electronic device to perform operations including transmitting or receiving a data packet using the radio frequency communication circuitry according to the communication configuration.
NETWORK NODE, DEVICE AND METHODS IN A TELECOMMUNICATION NETWORK
Embodiments herein relate to a method performed by a network node in a telecommunication network providing a multicast transmission to a group of devices residing in a cell of the telecommunication network. The network node monitors a congestion level for communication, and, if the congestion level reaches a first threshold, the network node orders for at least one device in a RRC connected mode to be released from the RRC connected mode to an RRC idle mode or an RRC inactive mode, thereby disabling a capability of the at least one device to provide one or more re-transmission requests while keeping an ability of the at least one device to further receive the multicast transmission.
Handling radio access technologies based on core network failures
Systems, devices, and techniques described herein relate to prioritizing access by first user equipment (UEs) connected to a first radio access technology (RAT) type over access by second UEs connected to a second RAT type responsive to a failure of a core network node. A node of the core network, such as a session management node, may determine that another node of the core network has failed based on a negative response or no response from that other node. The node may then prioritize access based on RAT types of requesting UEs.
User plane function (UPF) selection based on predicted load information
When a packet data session is established for a user equipment (UE), a comparative assessment of load information factors from different sets of load information factors associated with a plurality of user plane function (UPF) instances may be performed. Each set of load information factors of a UPF instance may include predicted load information factors indicative of a predicted load at the UPF instance. A UPF instance may be selected for the packet data session of the UE based on the comparative assessment. The comparative assessment may additionally consider a predicted load contribution of the packet data session to be established for the UE. A data analytics function may utilize a model (e.g. a multiple linear regression model) to calculate predicted load contribution factors, where the model is derived based on historical usage data from previous sessions of one or more UEs, for example, data from charging data records (CDRs).
METHOD FOR RELAY TRANSMISSION, RELAY USER EQUIPMENT, AND REMOTE USER EQUIPMENT
Methods for relay transmission, a relay user equipment (UE), and a remote UE are provided in implementations of the disclosure. The method includes the following. A relay UE receives a first message transmitted by a network device, where the first message contains information of a back-off (BO) timer, and the BO timer is used for congestion control. During running of the BO timer, the relay UE is restrained from performing a relay service for a remote UE.
METHODS AND SYSTEMS FOR 5G SLICING BASED ON DYNAMIC SECURITY PROPERTIES
Systems and methods enable the provisioning of security as a service for network slices. A network device stores definitions of multiple security assurance levels for network slices based on security parameters of assets used in the network slices. The network device stores multiple network slice templates, wherein the multiple network slice templates have different security assurance levels, of the multiple security assurance levels, for a Network Service Descriptor (NSD). The network device receives a request for a network slice with a requested security assurance level, of the multiple security assurance levels, for the NSD, and deploys the network slice using one of the network slice templates that has a security assurance level that corresponds to the requested security assurance level. The network device monitors the security parameters of the assets of the network slice for changes to the security assurance level of the deployed network slice.
Handling of URSP Regarding S-NSSAI and PDU Type
A method for UE route selection policy (URSP) rule matching regarding S-NSSAI and PDU session type is proposed. When an application is executed, a UE finds an RSD of a matching URSP rule, and the association of the application with an existing PDU session should have some exceptions. In one example, regarding S-NSSAI, if there's only a single allowed S-NSSAI or the UE is aware of the default S-NSSAI, the UE can associate the PDU session with the application where the existing PDU session is established with an S-NSSAI provided by the UE, but the RSD doesn't include any S-NSSAI. In another example, regarding PDU session type, the PDU session type IPv4v6 in the RSD can match with PDU session type IPv4 or IPv6 of the PDU session, which was established when the UE requested IPv4v6 during the PDU session establishment.
Methods and servers for managing traffic steering policies
Methods, a policy server (110) and a traffic steering server (120) for managing traffic steering policies for steering of traffic of a user equipment are disclosed. The policy server (110) generates (A020) a policy request, wherein the policy request comprises the traffic steering policies, wherein the traffic steering policies include a first traffic steering policy and a second traffic steering policy, both the first and second traffic steering policies being applicable to the traffic in one direction with respect to the user equipment. The policy server (110) sends (A030) the policy request to the traffic steering server (120). The traffic steering server (120) applies (A070) at least one of the first and second traffic steering policies to manage the traffic. Corresponding computer programs and computer program carriers are also disclosed.