Abstract:
In one example, a control plane entity obtains an indication that a User Equipment (UE) has entered an idle mode. The control plane entity sets a routing locator corresponding to the UE to cause the control plane entity to trigger a paging request toward the UE to prompt the UE to transition from the idle mode when a first network node obtains a downlink packet destined for the UE. The control plane entity obtains a notification that the first network node has obtained the downlink packet and initiates the paging request toward the UE. The control plane entity updates the routing locator corresponding to the UE to cause the first network node to transmit further downlink packets destined for the UE toward a second network node configured to handle traffic on behalf of the UE.
Abstract:
An example method is provided in one example embodiment and may include receiving traffic associated with at least one of a mobile network and a Gi-Local Area Network (Gi-LAN), wherein the traffic comprises one or more packets; determining a classification of the traffic to a service chain, wherein the service chain comprises one or more service functions associated at least one of one or more mobile network services and one or more Gi-LAN services; routing the traffic through the service chain; and routing the traffic to a network using one of a plurality of egress interfaces, wherein each egress interface of the plurality of egress interfaces is associated with at least one of the one or more mobile network services and the one or more Gi-LAN services.
Abstract:
Techniques are described to provide multipath mobility via Domain Name System-as-an-Authoritative Source (DNS-AS) techniques. In one example, a method includes obtaining, by a multipath policy decision element, a plurality of multipath policy recommendations for an application, wherein the plurality of multipath policy recommendations are obtained from one or more multipath policy recommendation elements; combining the plurality of multipath policy recommendations to generate a policy enforcement decision, wherein the policy enforcement decision identifies, at least in part, one or more network paths that are to be utilized for one or more packet flows associated with the application, wherein each of the one or more network paths is associated with an access type; and enforcing the policy enforcement decision for one or more packet flows associated with the application.
Abstract:
Techniques are described to provide traffic steering and policy combining in a mobile network. In one example, a method includes combining, by a policy function of a network, a user equipment (UE) access policy comprising UE access rules obtained from a UE with a network-based access policy associated with the network to generate a combined access policy, the combined access policy comprising combined access rules; communicating the combined access rules to the UE via a message, wherein the message comprises an indication that indicates that the UE is not allowed to override the combined access rules with the UE access rules; and communicating the combined access rules to a user plane function handling traffic for the UE.
Abstract:
Techniques that provide enterprise slice management are described herein. In one embodiment, a method includes providing an enterprise service template to an enterprise, the enterprise service template comprising parameter input fields for indicating enterprise devices associated with the enterprise, services to be provided to the enterprise devices using a mobile network, and service options associated with the services; determining one or more mobile network services to be provided to a plurality of enterprise devices and one or more service options associated with the one or more mobile network services; identifying, based on the one or more mobile network services, an enterprise slice to provide the one or more mobile network services; and provisioning the enterprise slice based on the one or more mobile network services, the plurality of enterprise devices, and the one or more service options associated with the one or more mobile network services.
Abstract:
In one illustrative example, an interface between a user plane function (UPF) instance of a mobile network and a tunnel router endpoint of an enterprise software-defined wide area network (SD-WAN) fabric is provided. The UPF instance may be part of a network slice that is (uniquely) associated with an enterprise of the enterprise SD-WAN. A plurality of mappings between policies associated with different QoS flows via the UPF instance and SD-WAN policies associated with different virtual private networks (VPNs) of the SD-WAN fabric may be maintained. Each VPN of the SD-WAN fabric may be associated with a different underlying transport mechanism that satisfies characteristics of a specific SD-WAN policy. Communications for user equipment (UE) in the mobile network may be facilitated across the SD-WAN fabric based on the policy mappings.
Abstract:
An example method is provided in one example embodiment and may include configuring a measurement indication for a packet; forwarding the packet through a service chain comprising one or more service functions; recording measurement information for the packet as it is forwarded through the service chain; and managing capacity for the service chain based, at least in part, on the measurement information. In some cases, the method can include determining end-to-end measurement information for the service chain using the recorded measurement information. In some cases, managing capacity for the service chain can further include identifying a particular service function as a bottleneck service function for the service chain; and increasing capacity for the bottleneck service. In various instances, increasing capacity for the bottleneck service can include at least one of: instantiating additional instances of the bottleneck service; and instantiating additional instances of the service chain.
Abstract:
An example method is provided in one example embodiment and may include configuring a measurement indication for a packet; forwarding the packet through a service chain comprising one or more service functions; recording measurement information for the packet as it is forwarded through the service chain; and managing capacity for the service chain based, at least in part, on the measurement information. In some cases, the method can include determining end-to-end measurement information for the service chain using the recorded measurement information. In some cases, managing capacity for the service chain can further include identifying a particular service function as a bottleneck service function for the service chain; and increasing capacity for the bottleneck service. In various instances, increasing capacity for the bottleneck service can include at least one of: instantiating additional instances of the bottleneck service; and instantiating additional instances of the service chain.
Abstract:
An example method is provided in one example embodiment and can include obtaining, within a radio access network, a channel state for a data channel associated with a mobile terminal; including the channel state in a differentiated services (diffserv) marking within an Internet Protocol (IP) header of at least one IP packet associated with the mobile terminal; and transmitting the at least one IP packet including the IP header having the diffserv marking toward a packet data network.
Abstract:
Systems, methods, and computer-readable media are provided for inter-network messaging among private and public 5G networks. For instance, a first server on a public 5G mobile network can receive a first message directed to a first wireless device associated with a first network identity. The first server can determine, based on the first network identity, that the first wireless device is associated with a second network identity, wherein the second network identity is used to identify the first wireless device on a private 5G mobile network. The first server can send a copy of the first message to a second server on the private 5G mobile network for transmission to the first wireless device through the private 5G mobile network based on the second network identity.