Patent classifications
H04L41/5022
NETWORK SLICE SELECTION METHOD AND APPARATUS, DEVICE AND STORAGE MEDIUM
A network slice selection method includes, in response to an update in configuration information of a user of a media service, determining first information indicating updated configuration information of the user of the media service. The first information indicates an updated selection of a first network slice from at least two network slices. The method further includes transmitting, by the media service, the first information to an entity of a 5G Core network.
METHOD AND APPARATUS FOR REAL-TIME DYNAMIC APPLICATION PROGRAMMING INTERFACE (API) TRAFFIC SHAPING AND INFRASTRUCTURE RESOURCE PROTECTION IN A MULTICLIENT NETWORK ENVIRONMENT
A real-time dynamic API traffic shaping and infrastructure resource protection in a multiclient network environment is provided. A traffic rules engine (TRE) applies traffic shaping only to customers that are utilizing “more than their fair share” of the currently available bandwidth without allowing them to negatively impact the user experience of other users. The present invention takes current API traffic into consideration, allowing one or a few high volume users to utilize most of all available bandwidth as long as other users do not need that bandwidth. This includes dynamically measuring and adjusting which users had traffic shaping applied to them based on the overall traffic during any given second. The solution of the present invention avoids any slowdown of customer API requests unless the maximum allowable TPS limit is near to being reached.
METHODS AND SYSTEMS FOR AF CONTROL OF NETWORK SLICE QUOTA
The disclosure relates to a 5G or 6G communication system for supporting a higher data transmission rate. Embodiments herein disclose methods and systems of how an application function can request the Fifth Generation (5G) core network to perform a specific action, when a network slice quota reaches a maximum limit or when the behavior of the UE(s) falls outside the expected communication behavior.
Radio network node, user equipment (UE), system and methods performed therein for handling communication in a wireless communication network
According to an embodiment herein a method performed by a radio network node for handling communication of data for a user equipment, UE, served in a service area associated with the radio network node in a wireless communication network is herein provided. The radio network node receives an indication from the UE, wherein the indication indicates a priority level for bandwidth allocation compared to other UEs. The radio network node further allocates a first bandwidth out of a total bandwidth to the UE for communication, wherein the first bandwidth is allocated in size based on the indication.
INFORMATION PROCESSING METHOD AND APPARATUS, NODE DEVICE, SERVER AND STORAGE MEDIUM
The embodiments of the present disclosure provide a method and apparatus for information processing, a node device, a server and a storage medium. The method includes that: characteristic information is extracted from an acquired service packet; and the characteristic information is sent to a server, so that the server generates, according to the characteristic information, a detection instance for detecting a service flow corresponding to the service packet. Thus, by extracting the characteristic information of the service packet, the server generates a detection instance corresponding to the characteristic information, achieving the flexible deployment and application of channel associated performance detection, and reducing the difficulty and cost of manual maintenance.
Dynamic Policy Rule Selection
The invention relates to a method, by a policy controller 100, for generating policy rules for data packet flows in a communications network. The policy controller 100 has access to a policy database 130 and stores a service level agreement. The service level agreement contains a plurality of different service level identifiers, each service level identifier being associated with a set of conditions that govern the policy rules to be applied to the data packet flows in the communications network. The method comprises the following steps: An authorization request is received for a data packet flow, the authorization request comprising service information for a service and a service level identifier. The policy database 130 is accessed and the set of conditions associated with the received service level identifier is determined. Further, based on the determined set of conditions, a policy rule to be applied to the data packet flow is generated. Policy controller 100 is configured to generate policy rules based on a third party or company profile, with the third party company being able to influence which policy rule should be selected by the policy controller. The authorization request may be received directly from an application function, AF 200. An input unit 230 is provided via which the third party can define and agree upon the service level agreement with an operator of the communications network. A policy control enforcing function PCEF 51 can interact with the PCRF 100 in order to enforce the policy rules.
Modifying data packet transmission characteristics by an intermediate node on a communication path
Techniques for modifying data packet transmission characteristics by an intermediate node in a network are disclosed. An intermediate node in a data transmission network determines a current estimated transmission time for packets being transmitted from the source node to the intermediate node. The node analyzes a data packet to determine a Quality of Service (QoS) requirement for transmission of the first data packet. Based on the current estimated transmission time for packets being transmitted from the source node to the intermediate node and the QoS requirement for transmission of the first data packet, the intermediate node selects one or more transmission characteristics for forwarding the first data packet toward the destination node. The intermediate node transmits the packet toward the destination node in accordance with the one or more transmission characteristics.
Modifying data packet transmission characteristics by an intermediate node on a communication path
Techniques for modifying data packet transmission characteristics by an intermediate node in a network are disclosed. An intermediate node in a data transmission network determines a current estimated transmission time for packets being transmitted from the source node to the intermediate node. The node analyzes a data packet to determine a Quality of Service (QoS) requirement for transmission of the first data packet. Based on the current estimated transmission time for packets being transmitted from the source node to the intermediate node and the QoS requirement for transmission of the first data packet, the intermediate node selects one or more transmission characteristics for forwarding the first data packet toward the destination node. The intermediate node transmits the packet toward the destination node in accordance with the one or more transmission characteristics.
Dynamic scope adjustment
An embodiment includes a method of secured, remote device access through dynamic scope adjustment in an incident management system. The method includes receiving an incident report indicative of a technical issue at a first device. Responsive to receipt of the incident report, the method includes determining that the first device is assigned an information technology (IT) support provider and dynamically elevating the first device to a scope of the IT support provider. Following a correction of at least a portion of the technical issue by the IT support provider, the method includes dynamically relegating the first device from the scope to prevent remote access to the first device following the correction.
Dynamic scope adjustment
An embodiment includes a method of secured, remote device access through dynamic scope adjustment in an incident management system. The method includes receiving an incident report indicative of a technical issue at a first device. Responsive to receipt of the incident report, the method includes determining that the first device is assigned an information technology (IT) support provider and dynamically elevating the first device to a scope of the IT support provider. Following a correction of at least a portion of the technical issue by the IT support provider, the method includes dynamically relegating the first device from the scope to prevent remote access to the first device following the correction.