Abstract:
In various implementations, a method includes receiving a request to establish an end-to-end encrypted session between a device in an enterprise network and an external entity that is outside the enterprise network. In some implementations, the end-to-end encrypted session allows encrypted packets to be transmitted between the device and the external entity. In various implementations, the method includes determining whether the request satisfies an enterprise security criterion for establishing the end-to-end encryption session. In various implementations, the method includes in response to determining that the request satisfies the enterprise security criterion, triggering the establishment of the end-to-end encrypted session between the device in the enterprise network and the external entity that is outside the enterprise entity.
Abstract:
An example method is provided in one example embodiment and may include subscribing to a key distribution service by a plurality of Wi-Fi access points belonging to a same mobility domain; receiving a request from a user equipment to connect to a first Wi-Fi access point of the plurality of Wi-Fi access points belonging to the same mobility domain; determining one or more second Wi-Fi access points of the plurality of Wi-Fi access points belonging to the same mobility domain that neighbor the first Wi-Fi access points; and distributing keying parameters to each of the one or more second Wi-Fi access points. The keying parameters can be associated with 802.11r pairwise master key (PMK) keying parameters.
Abstract:
An example method is provided in one example embodiment and includes receiving a request to relocate a user equipment (UE) from a source macro radio to an ambiguous small cell access point (AP), wherein the request includes a target cell identity (ID) encoded with a source macro cell identifier for the source macro radio and a target sub-carrier identifier for the ambiguous small cell AP; determining potential target small cell APs for relocation of the first UE using the using the first target cell ID, wherein each of the potential target small cell APs are within a coverage area of the source macro radio and operate using the target sub-carrier identifier; and preparing, for each of the potential target small cell APs, a common channel to receive relocation of the first UE. The first UE can relocate to a particular target small cell access point using the common channel.
Abstract:
An example method is provided in one example embodiment and includes intercepting a setup request for a session via a small cell network portion associated with a wide area network (WAN) instance, wherein the WAN instance comprises the small cell network portion and an enterprise network portion and wherein the small cell network portion and the enterprise network portion are interconnected to a service provider network; classifying the session to a particular WAN priority queue, wherein a plurality of WAN priority queues are configured for the WAN instance; determining whether the particular WAN priority queue has available bandwidth for the session; allocating bandwidth for the particular WAN priority queue if the particular WAN priority queue has available bandwidth; and permitting the session to be established if the particular WAN priority queue has available bandwidth.
Abstract:
An example method is provided in one example embodiment and may include determining a presence of user equipment (UE) in relation to small cell radio(s) of a small cell network based on information obtained through the small cell network and one or more parallel networks; and adjusting transmit power for the small cell radio(s) based on the presence of UE in relation to the small cell radio(s). Another example method can include determining that a UE in cell paging channel mode has changed its selected macro cell radio; determining that the UE is allowed service on a small cell radio located in a vicinity of a macro cell coverage area of a selected macro cell radio; and adjusting a transmit power of the small cell radio based on a presence of the UE in a surrounding macro cell coverage area of the small cell radio.
Abstract:
Embodiments include receiving one or more packets of a Wi-Fi calling session via a secure tunnel from a user device, where the user device is connected to a source network via a Wi-Fi access point. Embodiments also include determining whether the Wi-Fi calling session is a threat based, at least in part, on identifying an anomaly of at least one packet of the one or more packets. An action can be taken if the Wi-Fi calling communication is determined to be a threat. More specific embodiments include determining the at least one packet is associated with the Wi-Fi calling session by correlating information in the packet with control plane data of the Wi-Fi calling session. Further embodiments can include intercepting the one or more packets in a second secure tunnel established between an evolved packet data gateway and a service provider network associated with the user device.
Abstract:
In one example embodiment, an apparatus is provided that includes an antenna that receives, in a first wireless network, a first identifier of a second wireless network access point. The apparatus also includes a processor that processes data received by the antenna. The apparatus transmits, in the first wireless network, the first identifier of the second wireless network access point. The apparatus establishes a tunnel to the second wireless network. The antenna transmits a second identifier of the second wireless network access point.
Abstract:
A method is provided in one embodiment and includes receiving a first message including an indication that a first access point of a first network is a gateway access point of a first network, receiving a second message including an indication that a second access point of the first network is an inner access point of the first network, and receiving an indication of a number of wireless devices registered with at least one of the first access point and the second access point. The method further includes determining a power mode for the second access point based upon whether at least one wireless device is registered with the first access point or the second access point, and sending a power mode command message to the second access point indicative of the determined power mode.
Abstract:
A method is provided in one example embodiment and may include monitoring, by a radio access network (RAN) orchestration function, impairments between a plurality of candidate locations interconnected by a transport network, wherein one or more network elements capable of performing one or more operations associated with a RAN are located at the plurality of candidate locations; determining a decomposition of one or more operations associated with the RAN into a plurality of sets of virtualized network functions (VNFs) to execute the operations; determining a distribution of the plurality of sets of VNFs among the one or more network elements associated with the RAN for one or more optimal locations of the plurality of candidate locations based, at least in part, on the monitored impairments; and instantiating the plurality of sets of VNFs at each of the one or more optimal locations.
Abstract:
Systems and method are provided that allow an application layer client in a mobile device to manage multiple interfaces in a communication network. The multiple interfaces can include WiFi, cellular, Femto, WiMAX, Bluetooth, infrared, Ethernet, and other types of interfaces for communication in a network. The client on the mobile device can use intelligence and rules to determine how and when request fragments are communicated over the various interfaces available to the client. The intelligence can include parameters such as performance information for a particular interface and subscriber preferences. Based on this information the client can decide to use a combination of the interfaces to obtain multimedia content and render the content for display on the mobile device. By using a combination of interfaces and tracking the advantages and disadvantages of each interface, the client can make intelligent decisions in providing multimedia content to the user.