H04M15/8016

System and Method for Managing Quality of Service Provided by a Communication System to an Unmanned Autonomous Vehicle
20230024033 · 2023-01-26 ·

A system for managing QoS provided to user equipment included in an unmanned autonomous vehicle (UAV) by a wireless communication system comprising base stations, each providing radio coverage over a corresponding cell. The system comprises one or more computing devices to execute: a setup module to receive data identifying a predetermined path, and send a request of allocating dedicated radio resources for wireless links, the requested dedicated radio resources being expected sufficient to guarantee a QoS not lower than a predefined QoS value, and a QoS verify module to receive QoS data indicative of measured QoS and position data indicative of an actual position of the UAV during traveling, and verify whether the QoS actually during travelling is not lower than the predefined QoS value of the received QoS data and verify whether an actual path followed by the UAV corresponds to the predetermined path of the received position data.

TECHNIQUES FOR EXTENDING A CELLULAR QUALITY OF SERVICE BEARER THROUGH AN ENTERPRISE FABRIC

Techniques are described for extending a cellular quality of service bearer through an enterprise fabric network. In one example, a method obtaining, by a first switch of a network, a packet to be delivered to a client connected to the network via a cellular access point; identifying quality of service (QoS) bearer information associated with the packet, wherein the QoS bearer information is associated with a radio access bearer for the client and the QoS bearer information comprises a bearer indicator and a QoS class identifier; providing a fabric tunnel encapsulation for the packet, wherein the bearer indicator and the QoS class identifier are included within the fabric tunnel encapsulation of the packet; and forwarding the packet within the fabric tunnel encapsulation toward a second switch of the network via a fabric tunnel, wherein the cellular access point is connected to the network via the second switch.

Virtualized Policy & Charging System
20230027934 · 2023-01-26 · ·

A network system for providing one or more services to one or more end-user devices communicatively coupled to the network system over a wireless access network, the network system comprising: a policy enforcement function, a first policy element, a second policy element, and a network element, wherein the network element is communicatively coupled to the policy enforcement function, the first policy element, and the second policy element, and wherein the network element is configured to communicate first policy information between the policy enforcement function and the first policy element, and communicate second policy information between the first policy enforcement function and the second policy element.

TSC-5G QoS MAPPING WITH CONSIDERATION OF ASSISTANCE TRAFFIC INFORMATION AND PCC RULES FOR TSC TRAFFIC MAPPING AND 5G QoS FLOWS BINDING

Systems and methods are disclosed herein that relate to Time Sensitive Communication (TSC) to Fifth Generation (5G) Quality of Service (QoS) mapping and associated QoS binding. In one embodiment, a method for QoS mapping in a 5G System (5GS) for a virtual Time Sensitive Networking (TSN) bridge comprises, at a first network function, obtaining information from a TSN Application Function (AF) comprising baseline TSC QoS parameters and one or more additional parameters comprising either or both of: (a) one or more additional TSC QoS attributes and (b) one or more additional traffic attributes. The method further comprises, at the first network function, generating one or more Policy and Charging Control (PCC) rules based on the obtained information and providing the one or more PCC rules to a second network function. The method further comprises, at the second network function, performing QoS binding based on the one or more PCC rules.

Authentication, authorization and accounting functionality within an access network of a telecommunications network and/or an improved access network architecture

A method for an access network of a telecommunications network includes: in a first step, a first authentication, authorization and accounting (AAA)-related message is sent by an authentication server entity and received by an access orchestrator entity, the first AAA-related message comprising: at least one standardized message attribute according to an access protocol; and at least one vendor-specific message attribute; in a second step, subsequent to the first step, the access orchestrator entity sends a second AAA-related message to a service edge entity, the second AAA-related message solely comprising the at least one standardized message attribute according to the access protocol; and in a third step, subsequent to the first step and prior to, during or after the second step, the access orchestrator entity sends at least one third AAA-related message to the service edge entity, the at least one third AAA-related message corresponding to a message according to an application programming interface (API) or to a further access protocol.

Latency-sensitive network-traffic quality of service

A telecommunication system can include routing devices, a bearer-management device, and a policy-management device. The bearer-management device can receive a request from a terminal to create a specialized bearer (SB) for a non-audio, non-video media type. The bearer-management device can determine that the request is associated with an authorized user, and then send a setup message comprising a Quality of Service (QoS) indicator to the policy-management device. The policy-management device can create the SB permitting data exchange between the terminal and a routing device. The SB can have QoS characteristics associated with the QoS indicator. In some examples, the terminal can receive a network address, determine an associated network port, and send a SIP INVITE message indicating the non-audio, non-video media type. The terminal can then exchange data on the network port with a peer network terminal.

Automatically influencing UE slice policies based on real time analysis

Systems and methods define an enhanced charging function (CHF) in a communication network by creating a type of slice analysis functionality. For example, the system can access slice information from multiple Policy Control Functions (PCFs) and determine analytics for multiple slices associated with a subscriber user/device or group of subscriber users/devices. Using the enhanced CHF, the system can trigger slice level decisions at a higher level of the hierarchy based on information being aggregated for family devices/plans, category, quota, usage, or other groupings at the CHF instead of just at the individual slice level (e.g., similar to standard PCF functionality).

Method and apparatus for a chargeable party at a session management with required quality of service

Methods and apparatuses for data transmission. A method implemented at a first network function may comprise obtaining information related to network slice selection; and sending a reroute message to an access network node, wherein the reroute message including a container comprising at least one information element of the information related to network slicing selection.

Network Slice Registrar Virtual Network Function
20220408394 · 2022-12-22 ·

A method of communicating over a plurality of network slices concurrently. The method comprises building a distributed ledger by a network slice registrar function (NSRF) application executing on a computer, where the distributed ledger records an association between a first network slice allocated to a user equipment (UE) and a second network slice allocated to the UE, providing information about the association of the UE to the first network slice and the second network slice by the NSRF application to a network slice selector function (NSSF), establishing a first communication link between the UE and a first call end point via the first network slice by a first user plane function (UPF) and establishing a second communication link between the UE and a second call end point via the second network slice by a second UPF based on the information provided by the NSRF application to the NSSF.

RADIO ACCESS TECHNOLOGY (RAT) TYPE USAGE DIFFERENTIATION FOR DIFFERENTIAL CHARGING IN 5G NON-STANDALONE (5G NSA) ARCHITECTURE DEPLOYMENTS

A control plane function node may be used in a Fifth Generation (5G) Non-Standalone (NSA) architecture having Radio Access Network (RAN) level interworking between a Long-Term Evolution (LTE) RAN and a 5G New Radio (NR). The node obtains usage report data which are based on traffic of a user equipment (UE) via primary and secondary Radio Access Technologies (RATs). The node also obtains secondary RAT usage report data which are based on traffic of the UE via the secondary RAT. The node constructs a message which indicates a request for charging based on the usage report data and the secondary RAT usage report data. In constructing the message, the node populates, in association with a corresponding rating group and usage data of the UE, an identifier of a flow or bearer associated with secondary RAT usage, together with the secondary RAT usage report data.