Patent classifications
H04W28/0831
NETWORK NODES AND METHODS THEREIN FOR QUALITY OF SERVICE CONTROL
The present disclosure provides a method in an application server for Quality of Service, QoS, control. The method includes: determining to adjust a QoS associated with a service for one or more terminal devices; and transmitting, to a control function entity, a request for adjusting the QoS for the one or more terminal devices.
Method for Traffic Steering, Network Device and Terminal Device
The present disclosure provides a method (200) in a network device for traffic steering. The method (200) comprises: receiving (S210) from a terminal device a radio capability indication indicating one or more radio capabilities of the terminal device and one or more radio capabilities of radio access networks as detected by the terminal device; generating (S220) a traffic steering policy based on the radio capability indication; and transmitting (S230) the traffic steering policy to the terminal device.
MME overload or underload mitigation by MME VNF apparatus and method
Embodiments of the present disclosure describe apparatuses and methods for mobility management entity (MME) overload or underload mitigation using an MME virtual network function (VNF). Various embodiments may include one or more processors to execute instructions to process a notification from a virtual network function manager (VNFM) to determine instantiation of a MME as a VNF, add the MME to an MME pool, and assign a value to an application parameter of the MME VNF. Other embodiments may be described and/or claimed.
Load balancing of data flows
A method for performing load balancing of data flows from a user equipment (UE) between a first radio access network and a second radio access network, wherein the UE is attached to the said first radio access network, the method comprising providing preference data from the first radio access network to the UE representing radio related parameters, determining the presence of an access network discovery and selection function (ANDSF) of the UE, evaluating, at the UE, including using ANDSF if present, the preference data to determine if a data flow can be offloaded to the second radio access network, and on the basis of the evaluation, offloading a data flow of the UE from the first radio access network.
CONTROL SYSTEM AND CONTROL METHOD
An operation control module executes, in accordance with a predetermined rule, operation control corresponding to a degree of operation of a leader base station system included in one of base station system groups, with respect to a follower base station system included in the base station system group. The operation control module executes, in accordance with occurrence of a predetermined event, operation control different from the operation control performed in accordance with the predetermined rule, for the follower base station system which is included in one of the base station system groups, and in which a degree of similarity of a transition of the degree of operation with respect to the leader base station system is smaller than a predetermined magnitude.
MME OVERLOAD OR UNDERLOAD MITIGATION BY MME VNF APPARATUS AND METHOD
Embodiments of the present disclosure describe apparatuses and methods for mobility management entity (MME) overload or underload mitigation using an MME virtual network function (VNF). Various embodiments may include one or more processors to execute instructions to process a notification from a virtual network function manager (VNFM) to determine instantiation of a MME as a VNF, add the MME to an MME pool, and assign a value to an application parameter of the MME VNF. Other embodiments may be described and/or claimed.
Location selection for disaggregated radio access network functions
The described technology is generally directed towards location selection for disaggregated radio access network (RAN) network functions. Disaggregated RAN network functions include, for example, RAN distributed units (DUs) and RAN central units (CUs) that are associated with RAN cells and RAN radio units (RUs). When multiple viable equipment locations are available, of equipment that can host DUs and/or CUs, the disclosed techniques can be used to select preferred location(s). The DU(s) and/or the CU(s) can be moved to equipment at the selected location(s) to improve network performance. Disclosed techniques can account for inter-cell delay requirements of different RAN cells, to place network functions in a manner that supports effective coordination between multiple cells.
Methods and systems for 5G slicing based on dynamic security properties
Systems and methods enable the provisioning of security as a service for network slices. A network device stores definitions of multiple security assurance levels for network slices based on security parameters of assets used in the network slices. The network device stores multiple network slice templates, wherein the multiple network slice templates have different security assurance levels, of the multiple security assurance levels, for a Network Service Descriptor (NSD). The network device receives a request for a network slice with a requested security assurance level, of the multiple security assurance levels, for the NSD, and deploys the network slice using one of the network slice templates that has a security assurance level that corresponds to the requested security assurance level. The network device monitors the security parameters of the assets of the network slice for changes to the security assurance level of the deployed network slice.
Device and method for providing service according to wireless communication network type in edge computing system
According to one embodiment of the present disclosure, a method by which an edge enabler server (EES) of an edge computing system provides an edge computing service to user equipment (UE) comprises steps in which: the UE receives a registration message including available or currently connected core network (CN) type information or radio access technology (RAT) type information; a first network function (NF) device of a core network for providing the edge computing service to the UE is selected on the basis of the CN type information or the RAT type information; and a registration response message is transmitted to the UE, wherein, if the registration message includes the CN type information, one from among a first type for supporting a first CN, a second type for supporting a second CN, and a third type for supporting both the first CN and the second CN is indicated, and, if the registration message is the RAT type information, one from among a first type for supporting a first RAT, a second type for supporting a second RAT, and a third type for supporting both the first RAT and the second RAT can be indicated.
Image-based device enrollment
In one implementation, a method of using image data to enroll devices into security systems includes authenticating a user in a device enrollment function of a security system; initiating, by the device enrollment function, an image-based device enrollment session upon authentication of the user; identifying, during the image-based device enrollment session, a device to be enrolled into the security system; determining, during the image-based device enrollment session, a location of the device within the premises of the security system; enrolling the device into the security system.