Abstract:
An example method is provided in one example embodiment and includes receiving a first communication from a user equipment (UE) for a subscriber associated with the first UE to a small cell network, wherein a plurality core networks (CNs) share resources for the small cell network; selecting a first CN from the plurality of CNs to provide services to the first subscriber via the small cell network based, at least in part, on a first Mobile Country Code (MCC) and a first Mobile Network Code (MNC) for the first subscriber; and storing, in at least one memory element, at least one association of the MCC and the MNC to the CN for use in subsequent requests from other UEs for subscribers to attach to the small cell network.
Abstract:
An example method is provided in one example embodiment and includes receiving an assignment request from a core node in a network to establish a tunnel for user plane traffic; forwarding first parameters to a controller of an enterprise network, wherein the first parameters include a tunnel identifier and a network address associated with the core node; receiving an assignment response; and forwarding second parameters to the core node, wherein the second parameters include a tunnel identifier and a network address associated with the controller. In some instances, the assignment request can be a request to establish a tunnel for user plane data traffic. In some instances, the assignment request can be a request to establish a tunnel for user plane voice traffic.
Abstract:
A method provided in one embodiment includes receiving, at a first network element, a first message including a first network identifier associated with a first network. The first message further includes an indication of an association of the first network identifier with a first user equipment. The method further includes receiving, by the first network element, a second message indicative of an initiated handover of the first user equipment to a second network. The second message includes a second network identifier associated with the second network. The method further includes determining, by the first network element, whether the second network identifier matches the first network identifier, and terminating the initiated handover by the first network element when the second network identifier does not match the first network identifier.
Abstract:
An example method is provided in one example embodiment and includes receiving a first communication from a user equipment (UE) for a subscriber associated with the first UE to a small cell network, wherein a plurality core networks (CNs) share resources for the small cell network; selecting a first CN from the plurality of CNs to provide services to the first subscriber via the small cell network based, at least in part, on a first Mobile Country Code (MCC) and a first Mobile Network Code (MNC) for the first subscriber; and storing, in at least one memory element, at least one association of the MCC and the MNC to the CN for use in subsequent requests from other UEs for subscribers to attach to the small cell network.
Abstract:
A method provided in one embodiment includes receiving, at a first network element, a first message including a first network identifier associated with a first network. The first message further includes an indication of an association of the first network identifier with a first user equipment. The method further includes receiving, by the first network element, a second message indicative of an initiated handover of the first user equipment to a second network. The second message includes a second network identifier associated with the second network. The method further includes determining, by the first network element, whether the second network identifier matches the first network identifier, and terminating the initiated handover by the first network element when the second network identifier does not match the first network identifier.
Abstract:
This disclosure describes techniques for migrating nodes from a first communication protocol to a second communication protocol. An example method is performed by a software-defined wide area network (SDWAN) controller. The example method includes identifying nodes in a network; identifying features associated with the nodes; identifying Internet Protocol version 6 (IPv6)-incompatible features among the features; and outputting, to a user, a list of the IPv6-incompatible features. The example method further includes receiving, from the user, a selection of nonessential features including at least one of the IPv6-incompatible features; identifying at least one of the nodes corresponding to the selection; and causing migration of the at least one of the nodes to IPv6.
Abstract:
A method of controlling performance of a wireless device is performed by a node that is in electronic communication with a cellular network. The node includes a processor, a non-transitory memory, and a network interface. The method includes receiving a performance value characterizing a performance of a communication channel between a wireless device and a wireless access point. In some implementations, the wireless device and the cellular network are associated with different radio access technologies (RATs). The method includes determining whether the performance value breaches a performance criterion for the wireless device. The method includes adjusting a first amount of data transmitted to the wireless device from a base station of the cellular network and a second amount of data transmitted to the wireless device from the wireless access point. In some implementations, the combined first and second amounts of data satisfy the performance criterion for the wireless device.
Abstract:
A method of configuring network devices. The method may include, with a network orchestrator, measuring at least one characteristic of a quality of a link between a network device and the network orchestrator during a first measurement window, categorizing the link into a connection type based on the at least one characteristic, and tuning a configuration of the network device based at least in part on the connection type identified by the network orchestrator.
Abstract:
Techniques that provide proactive and intelligent packet capturing are described herein. In one embodiment, a method includes storing information associated with a plurality of user equipment (UE) sessions of a plurality of UEs within a mobile network; detecting an anomaly associated with at least one UE session of at least one UE based, at least in part, on the information stored for the at least one UE session; and activating a trace for the at least one UE session based, at least in part, on detecting the anomaly associated with the at least one UE session, wherein activating the trace comprises capturing packet information for a data packet flow associated with the at least one UE session at one or more data-path network elements of a plurality of data-path network elements within the mobile network.
Abstract:
Systems, methods, and computer-readable storage media are provided for parallel initiating of devices in a system. The method includes generating an affinity table that stores option ROM execution data including first data associated with a first device and second data associated with a second device and triggering, based on the affinity table, a first initialization of the first device and executing a first option ROM code during a pre-boot phase and triggering, based on the affinity table, a second initialization of the second device and executing a second option ROM code during the pre-boot phase. Triggering the first initialization of the first device and triggering the second initialization of the second device during the pre-boot phase is performed such that at least a part of the first initialization of the first device and at least part of the second initialization of the second device are executed in parallel.