The disclosed technology relates to solutions for identifying User Equipment (UE) locations in a wireless network and in particular, for identifying UE locations based on radio location information that is encapsulated in SRv6 packet headers for location reporting in a 5G network.
An ever-increasing consumer demand, improved technological advancements (e.g., hardware/software infrastructure), and industry collaboration has driven significant growth in modern telecommunication networks and continues to drive its evolution. Indeed, each iteration or “next generation” of network capabilities, e.g., represented by standards promulgated by a Third Generation Partnership Project (3GPP), interconnects more devices, improves network bandwidth, increases data-rates, and so on. For example, a transition from 3rd Generation (3G) networks to 4th Generation (4G) networks introduced new network services and connected mobile devices to third party data networks such as the Internet. More recently, a transition is underway from existing 4G networks to new 5G networks, which includes a new service-oriented architecture for provisioning network services/resources in a dynamic, scalable, and customizable fashion (e.g., micro-services, network functions virtualization (NFV), etc.). For example, this service-oriented architecture supports network slices, which employ an isolated set of programmable resources that can implement individual network functions and/or application services through software programs within a respective network slice, without interfering with other functions and services on coexisting network slices. In turn, the service-oriented architecture, including its network slice support, creates opportunities to employ new mechanisms that natively support such dynamic and flexible workload provisioning and improve overall UE mobility.
The embodiments herein may be better understood by referring to the following description in conjunction with the accompanying drawings in which like reference numerals indicate identical or functionally similar elements. Understanding that these drawings depict only exemplary embodiments of the disclosure and are not therefore to be considered to be limiting of its scope, the principles herein are described and explained with additional specificity and detail through the use of the accompanying drawings in which:
Overview
This disclosure describes techniques for communicating UE location information to a data network (DN) and for optimizing delivery of applications via the DN based on the same. User Equipment location reporting can be performed by encapsulating location information, such as a Tracking Area Identifier (TAI) or a Presence Reporting Area (PRA) ID, in SRv6 headers for packets transmitted to the AF. In response, the AF can perform steps for optimizing application delivery to the UE, for example, by re-provisioning application delivery from a local DN or other servers/entities in closer proximity to the UE than the original DN. In some implementations, additional information, such as information identifying applications used by the UE, can be included in the packet header information. In some implementations, where location reporting is restricted, i.e., either by policy (PDU policy) or SRv6 compatibility, User Plane Function (UPF) latency information can be alternatively used to infer UE locations and to perform application re-redirection. persuade
In one aspect, a process of the disclosed technology includes steps for receiving, at an intermediate-User Plane Function (I-UPF) entity, uplink data from a Radio Access Network (RAN), wherein the uplink data originated from a User Equipment (UE) device, determining, at the I-UPF entity, if sharing of location information or application information associated with the UE is restricted, and encapsulating, by the I-UPF entity, first location metadata or application metadata in an SRv6 packet if the sharing of location information or application information is not restricted. In some aspects, the process can further include steps for transmitting the SRv6 packet to an anchor-User Plane Function (A-UPF) entity, for forwarding to a Data Network (DN), wherein the SRv6 packet is configured to cause the DN to transmit a first location report to at least one Application Function (AF) entity associated with the UE device.
In some aspects, the disclosed process can further include steps for calculating, at the A-UPF entity, a location of the UE device based on a measured latency between the I-UPF entity and the A-UPF entity, if the sharing of location information or application information is restricted, generating a second location report, wherein the second location report comprises second location metadata comprising the location of the UE device, and transmitting the second location report to a Session Management Function (SMF) entity, wherein the second location report is configured to cause the SMF entity to transmit the second location report to the AF entity via a Network Exposure Function (NEF) entity.
Various embodiments of the disclosure are discussed in detail below. While specific implementations are described in detail, it should be understood that this is done for illustration purposes only. A person skilled in the relevant art will recognize that other components and configurations may be used without departing from the spirit and scope of the disclosure.
As provided herein, this disclosure relates to communication networks (e.g., telecommunication networks), which include a number of network devices/modules/entities or “Network Function(s)” (NF(s)), which can be implemented as a network element on a dedicated hardware, as a software instance running on a dedicated hardware, and/or as a virtualized function instantiated on an appropriate platform (e.g. on a cloud infrastructure), as is appreciated by those skilled in the art. For sake of clarity, the NFs described herein are based on NFs specified by existing Technical Specifications such as the 3GPP TS 23.501, TS 23.502, TS 24.501, TS 29.509, TS 29.518, TS 33.301, TS 33.501, each of which is incorporated herein by reference to its entirety. Moreover, while some operations and functionality may be described and/or attributed to a particular NF, it is appreciated that such operations are not intended to be limited to the particular NF, but may be performed by other NFs as appropriate, particularly in view of the ongoing development and evolving nature of telecommunication networks.
A communication network is a geographically distributed collection of nodes interconnected by communication links and segments for transporting data between end nodes, such as mobile devices, computers, personal computing devices (and so on), and other devices, such as network entities, sensors, etc. Many types of networks are available, ranging from local area networks (LANs) to wide area networks (WANs). LANs typically connect these nodes over dedicated private communications links located in the same general physical location, such as a building or campus. WANs, on the other hand, typically connect geographically dispersed nodes over long-distance communications links, such as common carrier telephone lines, optical lightpaths, synchronous optical networks (SONET), synchronous digital hierarchy (SDH) links, etc. Some communication networks can include telecommunication networks, which transport data between end nodes, such as user equipment (UE), which can include mobile devices.
Those skilled in the art will understand that any number of nodes, devices, communication links, and the like may be used. Additionally, the examples described and illustrated herein are intended to provide examples of the disclosed technology, and are not intended to convey every implementation or implementation context in which the disclosed technology may be practiced. In particular, the representations of telecommunication networks 100, including respective interconnected network entities, are illustrated and described for purposes of discussion, not limitation, and it is appreciated that the illustrated networks can support inter-network operability/compatibility, and can include (or exclude) any number of network entities, communication links, and the like.
Access network 150 represents the infrastructure or radio towers, such as a Radio Access Network (RAN), for receiving and transmitting data packets between end user nodes (UE) as well as the various network entities (e.g., core network entities). Access network 150 includes NodeBs (NBs) for 3G network 110, eNodeBs (eNBs) for 4G network 120, and gNodeBs (gNBs) for 5G network 130. The infrastructure for each network may support different functionality and it is appreciated that infrastructure illustrated within one network can include appropriate hardware/software to support functionality of other telecommunication networks.
Respective network entities that form core network 160 (within the telecommunication networks 100) operatively connect respective RAN infrastructure (NBs, eNBs, gNBs) to third party networks such as a voice network 105 (e.g., a Public Switched Telephone Network (PSTN) network) and/or a data network (DN) 108 to create end-to-end connections. Prior to 3G (e.g., 2G, 2.5G, etc.) the third party network primarily included a voice network/PSTN 105 (e.g., a circuit switched network). From 3G onward, the third party network transitioned to include a public network (e.g., the Internet), represented by data network 108 (e.g., a packet switched network). Core network 160 and its respective network entities collectively operate to manage connections, bandwidth, and mobility for respective UE.
Notably, core network 160 evolved along three functional planes, including service management, session management, and mobility management. Service management for 2G and 3G networks includes operations to create an Integrated Services Digital Network (ISDN) over wireless links (e.g., Uu links). Session management for 3G and 4G networks generally include operations establish, maintain, and release network resources (e.g., data connections). In particular, in 3G network 110, session management includes a standalone General Packet Radio Service (GPRS) network, while 4G network 120 introduced a fully integrated data only network optimized for mobile broadband (where basic telephone operations are supported as one profile). Mobility management generally includes operations that support movement of UE in a mobile network, such as system registration, location tracking and handover (e.g., often optimized reduce heavy signaling loads). For example, in the context of 4G network 120, a Serving Gateway (SGW) and a Packet Data Gateway (PGW) support session management operations while mobility management operations (which maintains data sessions for mobile UE) are centralized within a Mobility Management Entity (MME).
The 5G network 130 introduces a 5G core architecture 132 that redistributes functionality of 4G network entities into smaller service-based functions/network entities. In addition, packet routing and forwarding functions (which are performed by SGW and PGW in 4G network 120) are realized as services rendered through a new network entity called the User Plane Function (UPF) entity. In this fashion, 5G network 130 provides a modular set of services that support dynamic and scalable deployment of resources to satisfy diverse user demands.
Environment 200 includes User Equipment (UE) device 202, Radio Access Network (RAN) 204, and a variety of 5G network entities that connect UE device 202 to data network (DN) 206. The 5G entities include an intermediary-User Plane Function (I-UPF) entity 208 that is coupled to RAN 204, and an Application Management Function (AMF) entity 210, that is coupled to UE device 202 and RAN 204. 5G environment 200 further includes an anchor-UPF (A-UPF) 212 that is coupled to DN 206, as well as a Session Management Function (SMF) 214, Network Exposure Function/Policy Control Function (NEF/PCF) 216, and an Application Function (AF) 218 responsible for management of application 220. For simplicity, the NEF and PCF entities are illustrated as a single combined network entity, i.e., NEF/PCF entity 216; however, it is understood that such functions may be divided, or combined, with other network entities, depending on the desired implementation. Additionally, each entity can be implemented either as a network element on dedicated hardware, as a software instance running on dedicated hardware, or as a virtualized function instantiated on an appropriate platform, e.g., a cloud infrastructure, as is appreciated by those skilled in the art.
In the illustrated 5G network configuration, UE 202 connects to RAN 204 as well as AMF 210 over respective network interfaces. Specifically, UE 202 is coupled to AMF 210 via an N1 interface, and RAN 204 is coupled to AMF 210 via an N2 interface. AMF 210 provides UE-based authentication, authorization, and mobility management, etc. Notably, AMF 210 represents a common entity logically associated with all network slice instances that serve UE 202.
SMF 214 is responsible for session management, IP address allocation to UE(s), and traffic management/selection of the UPFs, e.g., I-UPF 208 and A-UPF 212, for proper routing/data transfer. If UE 202 has multiple sessions, different SMFs can be allocated to each session for individual management and/or different functionality per session. In some implementations, AMF 210 can discover SMF 214 based on session request data from UE 202.
The network exposure function entity portion of NEF/PCF entity 216 supports the exposure of capabilities and events, and performs operations necessary to ensure the secure provisioning of information from external applications to the 5G network, as well as translation of internal/external information. For example NEF provides a means for the application functions to securely provide information to the 5G network. In particular, NEF handles the masking of network and user sensitive information to external AF's according to network policies, for example, that are supplied by the policy control function entity portion of NEF/PCF entity 216.
AF 218 generally provides information on packet flows to PCF as part of PCF/NEF entity 216, which is responsible for policy control in order to support Quality of Service (QoS). PCF 216 determines policies about mobility and session management for proper AMF/SMF operations based on the information from AF 218.
Because of the mobile and dynamic nature of UE device operation and application provisioning, UE traffic latency can be reduced by sourcing application flows from servers proximate to the associated UE devices. Successful location-based application provisioning therefore depends on the location of the UE device (e.g., UE location information), as well as information regarding UE application types (e.g., application information) and the DN locations provisioned to serve requested application services and/or data.
Aspects of the instant disclosure provide solutions for providing UE location and/or application information to various entities in the 5G network that are necessary to facilitate location-based application provisioning. Awareness of UE location information and/or application information can be used to ensure that UE (e.g., UE device 202) content access requests are directed to local DNs, and provide the ability for application relocation to be performed by the AF (e.g., AF 218).
Environment 200 illustrates an example of 5G core infrastructure components that can facilitate location-based application provisioning. As such, UE requests can be processed at the network edge, e.g., in Mobile Edge Computing locations, rather forcing UE application access at remote DN locations, for example, as determined by a DNS returned IP address. Location based application management depends on UE location. However, to perform location based application sourcing, the corresponding applications need to know how to redirect traffic to the MEC's N6 applications. That is, the AF needs to be provided with UE device location information and/or application information so that local DNs can be selected for application delivery or application redirection/provisioning.
As discussed in further detail below with respect to the example process described in
In some implementations, UE locations are communicated to DN and subsequently AF entities by encapsulating location and/or application metadata into packet headers. As used herein, location information/metadata can refer to any information that can be used to directly indicate or indirectly infer UE device locations. By way of example, location information can include information about the RAN, such as a Tracking Area Identifier (TAI), or a Presence Reporting Area (PRA) identifier (ID) indicating the geographic vicinity of a corresponding UE device. Application information/metadata can refer to any information that identifies applications currently running, or likely to be run by the UE device.
Depending on the desired implementation location and/or application information encapsulation can be performed by different network entities, such as at the user device e.g., UE 202, at the radio network, e.g., RAN 204 or at one or more User Plane Function Entities such as I-UPF 208 or A-UPF 212, discussed above. Location information and/or application information embedded in the packets is then provided to the DN 206 that is associated with an AF entity 218 that provides an application 220 used by UE device 202. Location and/or application information is provided to the receiving DN and AF entities using encapsulated SRv6 packet headers.
In an alternative aspect, where UE location information cannot be reported, either due to limitations on SRv6 packet transport or policy limitations, location reports may be generated based on latency information between User Plane Function entities. For example, traffic latency between various UPF entities can be measured (e.g., on an N9 interface), and used by the AF entity to determine if application relocation should be performed. Various aspects of location/application reporting are described in greater detail with respect to the process illustrated by
Turning now to
Once the initial DN has been contacted by the UE, subsequent uplink data is transmitted from the UE via the associated Radio Access Network, e.g., RAN 204, discussed above with respect to
Uplink data received by the RAN is then transmitted to the I-UPF entity (step 306), for example, over an N3 interface. RAN uplink transmissions to the I-UPF entity can be performed using a GPRS Tunnelling Protocol (GTP). The I-UPF entity can then pass the uplink data onto the A-UPF entity, for example, via an N9 interface.
In instances where encapsulation is not performed by the RAN (see step 304, above), then the I-UPF entity can encapsulate the uplink packets with location information and/or application information of the UE device. Location information can include one or more of a Tracking Area Identifier (TAI) and/or a Presence Reporting Area identifier (PRA ID). Application information can include a list of applications currently running or in use by the UE. In some aspects, application information may include information identifying applications that have been previously run on the UE, for example, that may be used to make inferences regarding application access requests the UE is likely to make at some future time. In another embodiment, local DNs may register their application IDs with nearby UPF entities. In such instances, application information may identify one or more available applications on the respective UPF entity's N6 interfaces, e.g., as an application list.
As discussed above, packet encapsulation can be performed by encapsulating the received datagram of uplink packets into one or more SRv6 packets. In some approaches, the A-UPF entity performs encapsulation by inserting the TAI/PRA ID information into a segment routing header (SRH) segment identifier (SID), of the corresponding SRv6 packet/s. Application information can also be encapsulated, identifying UE applications and/or UPF registered applications available from one or more local DNs. In some aspects, other network information may also be encapsulated, such as data identifying Quality of Service (QoS), and other network policy information.
It is understood that encapsulation of location and/or application information pertaining to any UE device on the network can be performed on a per-UE basis, a per-application basis, a per-location basis, and/or a combination thereof.
In some aspects, the I-UPF entity may also take latency measurements, i.e., to determine a latency for UE uplink data when transmitted between UE entities. For example, the I-UPF entity may use N9 latency measurements to make inferences about UE location or distance that can be used to perform location-based application redirection, as discussed in further detail below.
In some network deployments, SRv6 transmissions can be limited due to UPF entity SRv6 traffic handling capabilities and/or due to policies set by the UE and/or various applications. For example, policies (e.g., PDU or network policies) can limit or prevent device location reporting. As such, determinations can be made as to whether location/application information can be encapsulated in SRv6 headers (step 310).
If it is determined that location/application information reporting is not restricted, the A-UPF transmits the encapsulated SRv6 packet metadata to the DN (step 312). Subsequently, the DN generates a location report indicating location and/or application information for the respective UE device (step 314). The location report is then sent to the AF (step 316). The location report provides information required for the AF to determine if a better server is available to provide one or more applications used by the UE. That is, the AF identifies application servers deployed near the UE so that the DN can optimize/redirect application traffic to the UE from a proximate server. If the AF identifies a proximate application server, then the DNS is updated so that subsequent application requests are directed to the local DN/server.
In some implementations, the AF may provision a server of a local DN by moving an application. For example, the DN can use the new server information received from the AF or application content delivery network policy (CDN) to redirect the application to the local DN's server. Thus, application provisioning can be performed by the AF in response to changes in location and/or application information reported by the UE.
If in step 310 it is determined that location reporting is not permitted, either due to limitations on SRv6 traffic handling, or due to policy restrictions, then process 300 proceeds to step 318. Location information received by the A-UPF entity (e.g., on the N9 interface), is reported to the AF via the Session management Function (SMF) entity and the Network Exposure Function (NEF) entity (step 318). Location information based on N9 latency measurements can be provided to the AF in addition to 3GPP specific TAI information that can be received, for example, over a Service Based Interface (SBA), such as an N11 interface. Once the location report is provided by the NEF entity to the AF, process 300 can revert to step 316, as discussed above.
The communication process illustrated in signal diagram 400 begins with step 420 in which the UE device 404 requests content access from a (remote) data network (DN 419). The ability of UE device 404 to access content on DN 419 follows a lookup response/request communication to a DNS server (not illustrated), in which the IP address of DN 419 is returned to UE 404.
Next, UE device 404 sends uplink data to the radio access network, i.e., 5G NR 406 (signal 422). As discussed above, the SRv6 encapsulation process can optionally be performed by 5G NR device 406, i.e., to insert location/application information pertaining to UE device 404 into the uplink data. Alternatively, the uplink data may be left un-encapsulated, and transmitted by 5G NR device 406 to I-UPF entity 408 wherein encapsulation is performed (signal 424).
In such embodiments, I-UPF entity 408 encapsulates the uplink datagram as a SRv6 packet in which location information and/or application information for UE device 404 is included in a segment routing header segment identifier (SRH SID). Although the location information can include any type of information identifying the UE device position, in some aspects the location information can include one or more of a Tracking Area Identifier (TAI) and/or a Presence Reporting Area identifier (PRA ID), as discussed above. Additionally, other information may be encapsulated, such as information identifying one or more applications running on UE device 404 and/or information regarding Quality of Service (QoS) and/or other policies that are in effect for the UE device (collectively application information).
Once the location/application information is encapsulated by I-UPF 408, the SRv6 uplink packet/s are sent to A-UPF entity 412 (signal 425). Subsequently, A-UPF entity 412 passes the SRv6 uplink data to DN 419 (signal 426). Based on the charging action rule, traffic transmitted by A-UPF entity 412 to DN 419 can be used by DN 419 to trigger network changes. As discussed above, for example, DN 419 can provide a location report to one or more application functions, e.g., AF 418, for example, to cause changes in an application accessed by UE device 404 (signal 428).
In alternative embodiments, where SRv6 location reporting is not permitted, for example, either because the DN application server does not permit SRv6, or because location reporting is restricted by network policy (e.g., a PDU policy), then A-UPF 412 cannot communicate UE location directly to DN 419 in signal 426. Alternatively, A-UPF 412 reports traffic latency information from received from its N9 interface to SMF 416, to permit the SMF to take action (signal 440). In some aspects, latency between UPF entities, e.g., between I-UPF 408 and A-UPF 412 can be used to infer UE device 404 locations in the network. SMF 416 then reports the location directly to NEF entity 417 (signal 442), which in turn provides a location report directly to AF 418 (signal 444).
Once a location report is received at AF 418, either as an SRv6 notification received from DN 419 (signal 428), or as a location report received directly from NEF 417 (signal 444), then AF 418 can take determine what application servers are locally available to UE device 404 e.g., from a local DN, such as DN (local) 410. As discussed above, the AF may implement necessary network changes to ensure that additional applications requests are received at DN that is local to UE device 404, e.g., DN 410. In other aspects, the AF may cause network changes necessary to redirect an application by deploying an instance of the application at a local server where it did not previously exist.
Specifically, to perform application redirection, AF 418 can update a DNS address (in DN 419) to redirect application traffic to a closer server (signal 430). Successive application requests from UE device 404 are then directed to local DN/server 410 using the updated IP address (signal 432). For example, an uplink request from UE device 404 would first be communicated to 5G NR 406 (signal 434), and the passed by 5G NR 406 to I-UPF 408 (signal 435), before transmission to the local DN 410 (signal 436). The requested content would then be transmitted from the local DN 410 back to UE device 404 in reply (signal 437).
Device 510 includes central processing unit (CPU) 562, network interfaces 568, and a bus 515 (e.g., a PCI bus). When acting under the control of appropriate software or firmware, the CPU 562 is responsible for executing a method for conveying User Equipment (UE) information to an Application Function (AF), the method including steps for receiving, at an intermediate-User Plane Function (I-UPF) entity, User Equipment (UE) uplink data from a Radio Access Network (RAN), wherein the UE uplink data originated from a User Equipment (UE) device, determining, at the I-UPF entity, if sharing of location information or application information associated with the UE is restricted, and encapsulating, by the I-UPF entity, first location metadata or application metadata in an SRv6 packet if the sharing of location information or application information is not restricted. In some aspects, the steps can further include transmitting the SRv6 packet to an anchor-User Plane Function (A-UPF) entity for forwarding to a Data Network (DN), wherein the SRv6 packet is configured to cause the DN to transmit a first location report to at least one Application Function (AF) entity associated with an application associated with the UE device.
In some instances, the first location metadata includes one or more of: a Tracking Area Identifier (TAI) or a Presence Reporting Area (PRA).
In some instances, the application metadata comprises a list of one or more applications associated with the UE device.
In some instances, the first location report is configured to cause the AF to re-provision at least one application to a server proximate to the UE device.
In some instances the steps of the disclosed method can further include: calculating, at the A-UPF entity, a location of the UE device based on a measured latency between the I-UPF entity and the A-UPF entity, if the sharing of location information or application information is restricted, generating a second location report, wherein the second location report comprises second location metadata comprising the location of the UE device, transmitting the second location report to a Session Management Function (SMF) entity, wherein the second location report is configured to cause the SMF entity to transmit the second location report to the AF entity via a Network Exposure Function (NEF) entity.
CPU 562 can accomplish all these functions under the control of software including an operating system and any appropriate applications software. CPU 562 may include one or more processors 563, such as a processor from the INTEL X86 family of microprocessors. In some cases, processors 563 can be specially designed hardware for controlling the operations of network device 510. In some cases a computer-readable memory, e.g., memory 461 (a non-volatile Random Access Memory (RAM), or a Read Only Memory (ROM), etc., also forms part of CPU 562. However, there are many different ways in which memory could be coupled to the system.
Interfaces 568 can be provided as modular interface cards (sometimes referred to as “line cards”). They can control the sending and receiving of data packets over the network and sometimes support other peripherals used with network device 510. Among the interfaces that may be provided are Ethernet interfaces, frame relay interfaces, cable interfaces, Digital Subscriber Line (DSL) interfaces, token ring interfaces, and the like.
In addition, various very high-speed interfaces may be provided such as fast token ring interfaces, wireless interfaces, Ethernet interfaces, Gigabit Ethernet interfaces, ATM interfaces, High Speed Serial Interfaces (HSSIs), POS interfaces, FDDI interfaces, WIFI interfaces, 3G/4G/5G cellular interfaces, CAN BUS, LoRA, and the like. Generally, these interfaces may include ports appropriate for communication with the appropriate media. In some cases, they may also include an independent processor and, in some instances, volatile RAM. The independent processors may control such communications intensive tasks as packet switching, media control, signal processing, crypto processing, and management. By providing separate processors for the communications intensive tasks, these interfaces allow the master microprocessor 563 to efficiently perform routing computations, network diagnostics, security functions, etc.
Although the system shown in
Regardless of the network device's configuration, it may employ one or more memories or memory modules (including memory 561) configured to store program instructions for the general-purpose network operations and mechanisms for roaming, route optimization and routing functions described herein. The program instructions may control the operation of an operating system and/or one or more applications, for example. The memory or memories may also be configured to store tables such as mobility binding, registration, and association tables, etc. Memory 561 could also hold various software containers and virtualized execution environments and data.
In some implementations, the program instructions may be configured to cause CPU 562 and/or processor/s 563 to perform operations for implementing
Network device 510 can also include an application-specific integrated circuit (ASIC), which can be configured to perform any of the operations described above. The ASIC can communicate with other components in the network device 510 via bus 515, to exchange data and signals and coordinate various types of operations by network device 510, such as routing, switching, and/or data storage operations, for example.
For clarity of explanation, in some instances the present technology may be presented as including individual functional blocks including functional blocks comprising devices, device components, steps or routines in a method embodied in software, or combinations of hardware and software.
In some embodiments the computer-readable storage devices, mediums, and memories can include a cable or wireless signal containing a bit stream and the like. However, when mentioned, non-transitory computer-readable storage media expressly exclude media such as energy, carrier signals, electromagnetic waves, and signals per se.
Methods according to the above-described examples can be implemented using computer-executable instructions that are stored or otherwise available from non-transitory forms of computer-readable media. Such instructions can comprise, for example, instructions and data which cause or otherwise configure a general purpose computer, special purpose computer, or special purpose processing device to perform a certain function or group of functions.
Portions of computer resources used can be accessible over a network. The computer executable instructions may be, for example, binaries, intermediate format instructions such as assembly language, firmware, or source code. Examples of computer-readable media that may be used to store instructions, information used, and/or information created during methods according to described examples include magnetic or optical disks, flash memory, USB devices provided with non-volatile memory, networked storage devices, and so on.
Devices implementing methods according to these disclosures can comprise hardware, firmware and/or software, and can take any of a variety of form factors. Typical examples of such form factors include laptops, smart phones, small form factor personal computers, personal digital assistants, rackmount devices, standalone devices, and so on. Functionality described herein also can be embodied in peripherals or add-in cards. Such functionality can also be implemented on a circuit board among different chips or different processes executing in a single device, by way of further example.
The instructions, media for conveying such instructions, computing resources for executing them, and other structures for supporting such computing resources are means for providing the functions described in these disclosures.
Although a variety of examples and other information was used to explain aspects within the scope of the appended claims, no limitation of the claims should be implied based on particular features or arrangements in such examples, as one of ordinary skill would be able to use these examples to derive a wide variety of implementations. Further and although some subject matter may have been described in language specific to examples of structural features and/or method steps, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to these described features or acts. For example, such functionality can be distributed differently or performed in components other than those identified herein. Rather, the described features and steps are disclosed as examples of components of systems and methods within the scope of the appended claims.
The foregoing description has been directed to specific embodiments. It will be apparent, however, that other variations and modifications may be made to the described embodiments, with the attainment of some or all of their advantages. For instance, it is expressly contemplated that the components, elements, and/or operations described herein can be implemented as software being stored on a tangible (non-transitory) computer-readable medium, devices, and memories (e.g., disks/CDs/RAM/EEPROM/etc.) having program instructions executing on a computer, hardware, firmware, or a combination thereof. Further, methods describing the various functions and techniques described herein can be implemented using computer-executable instructions that are stored or otherwise available from computer readable media. Such instructions can comprise, for example, instructions and data which cause or otherwise configure a general purpose computer, special purpose computer, or special purpose processing device to perform a certain function or group of functions. Portions of computer resources used can be accessible over a network.
The computer executable instructions may be, for example, binaries, intermediate format instructions such as assembly language, firmware, or source code. Examples of computer-readable media that may be used to store instructions, information used, and/or information created during methods according to described examples include magnetic or optical disks, flash memory, USB devices provided with non-volatile memory, networked storage devices, and so on. In addition, devices implementing methods according to these disclosures can comprise hardware, firmware and/or software, and can take any of a variety of form factors. Typical examples of such form factors include laptops, smart phones, small form factor personal computers, personal digital assistants, and so on. Functionality described herein also can be embodied in peripherals or add-in cards. Such functionality can also be implemented on a circuit board among different chips or different processes executing in a single device, by way of further example. Instructions, media for conveying such instructions, computing resources for executing them, and other structures for supporting such computing resources are means for providing the functions described in these disclosures. Accordingly this description is to be taken only by way of example and not to otherwise limit the scope of the embodiments herein. Therefore, it is the object of the appended claims to cover all such variations and modifications as come within the true spirit and scope of the embodiments herein.
Number | Name | Date | Kind |
---|---|---|---|
4236068 | Walton | Nov 1980 | A |
5642303 | Small et al. | Jun 1997 | A |
5751223 | Turner | May 1998 | A |
6812824 | Goldinger et al. | Nov 2004 | B1 |
D552603 | Tierney | Oct 2007 | S |
7573862 | Chambers et al. | Aug 2009 | B2 |
D637569 | Desai et al. | May 2011 | S |
7975262 | Cozmei | Jul 2011 | B2 |
8010079 | Mia et al. | Aug 2011 | B2 |
8102814 | Rahman et al. | Jan 2012 | B2 |
8260320 | Herz | Sep 2012 | B2 |
8284748 | Borghei | Oct 2012 | B2 |
8300594 | Bernier et al. | Oct 2012 | B1 |
8325626 | Tóth et al. | Dec 2012 | B2 |
8396485 | Grainger et al. | Mar 2013 | B2 |
8446899 | Lei et al. | May 2013 | B2 |
8457145 | Zimmerman et al. | Jun 2013 | B2 |
8458184 | Dorogusker et al. | Jun 2013 | B2 |
D691636 | Bunton | Oct 2013 | S |
8549638 | Aziz | Oct 2013 | B2 |
8553634 | Chun et al. | Oct 2013 | B2 |
8644301 | Tamhankar et al. | Feb 2014 | B2 |
8650279 | Mehta et al. | Feb 2014 | B2 |
8669902 | Pandey et al. | Mar 2014 | B2 |
8676182 | Bell et al. | Mar 2014 | B2 |
8682279 | Rudolf et al. | Mar 2014 | B2 |
8693367 | Chowdhury et al. | Apr 2014 | B2 |
8718644 | Thomas et al. | May 2014 | B2 |
8761174 | Jing et al. | Jun 2014 | B2 |
8768389 | Nenner et al. | Jul 2014 | B2 |
8849283 | Rudolf et al. | Sep 2014 | B2 |
8909698 | Parmar et al. | Dec 2014 | B2 |
8958318 | Hastwell et al. | Feb 2015 | B1 |
9060352 | Chan et al. | Jun 2015 | B2 |
9130859 | Knappe | Sep 2015 | B1 |
9173084 | Foskett | Oct 2015 | B1 |
9173158 | Varma | Oct 2015 | B2 |
D744464 | Snyder et al. | Dec 2015 | S |
9270709 | Shatzkamer et al. | Feb 2016 | B2 |
9271216 | Friman et al. | Feb 2016 | B2 |
9281955 | Moreno et al. | Mar 2016 | B2 |
D757424 | Phillips et al. | May 2016 | S |
D759639 | Moon et al. | Jun 2016 | S |
9369387 | Filsfils et al. | Jun 2016 | B2 |
9389992 | Gataullin et al. | Jul 2016 | B2 |
9426305 | De Foy et al. | Aug 2016 | B2 |
D767548 | Snyder et al. | Sep 2016 | S |
9467918 | Kwan | Oct 2016 | B1 |
D776634 | Lee et al. | Jan 2017 | S |
9544337 | Eswara et al. | Jan 2017 | B2 |
9569771 | Lesavich et al. | Feb 2017 | B2 |
9609504 | Karlqvist et al. | Mar 2017 | B2 |
9615268 | Navarro et al. | Apr 2017 | B2 |
9634952 | Gopinathan et al. | Apr 2017 | B2 |
9642167 | Snyder et al. | May 2017 | B1 |
9654344 | Chan et al. | May 2017 | B2 |
9712444 | Bolshinsky et al. | Jul 2017 | B1 |
9713114 | Yu | Jul 2017 | B2 |
9736056 | Vasseur et al. | Aug 2017 | B2 |
9762683 | Karampurwala et al. | Sep 2017 | B2 |
9772927 | Gounares et al. | Sep 2017 | B2 |
9820105 | Snyder et al. | Nov 2017 | B2 |
D804450 | Spiel et al. | Dec 2017 | S |
9858559 | Raleigh et al. | Jan 2018 | B2 |
9860151 | Ganichev et al. | Jan 2018 | B2 |
9933224 | Dumitriu et al. | Feb 2018 | B2 |
9923780 | Rao et al. | Mar 2018 | B2 |
9961560 | Farkas et al. | May 2018 | B2 |
9967906 | Verkaik et al. | May 2018 | B2 |
9980220 | Snyder et al. | May 2018 | B2 |
9985837 | Rao et al. | May 2018 | B2 |
9998368 | Chen et al. | Jun 2018 | B2 |
20030087645 | Kim et al. | May 2003 | A1 |
20030116634 | Tanaka | Jun 2003 | A1 |
20040203572 | Aerrabotu et al. | Oct 2004 | A1 |
20050090225 | Muehleisen et al. | Apr 2005 | A1 |
20050169193 | Black et al. | Aug 2005 | A1 |
20050186904 | Kowalski et al. | Aug 2005 | A1 |
20060022815 | Fischer et al. | Feb 2006 | A1 |
20060030290 | Rudolf et al. | Feb 2006 | A1 |
20060092964 | Park et al. | May 2006 | A1 |
20060126882 | Deng et al. | Jun 2006 | A1 |
20060187866 | Werb et al. | Aug 2006 | A1 |
20070037605 | Logan | Feb 2007 | A1 |
20070239854 | Janakiraman et al. | Oct 2007 | A1 |
20080037715 | Prozeniuk et al. | Feb 2008 | A1 |
20080084888 | Yadav et al. | Apr 2008 | A1 |
20080101381 | Sun et al. | May 2008 | A1 |
20080163207 | Reumann et al. | Jul 2008 | A1 |
20080233969 | Mergen | Sep 2008 | A1 |
20090129389 | Halna DeFretay et al. | May 2009 | A1 |
20090203370 | Giles et al. | Aug 2009 | A1 |
20090282048 | Ransom et al. | Nov 2009 | A1 |
20090298511 | Paulson | Dec 2009 | A1 |
20090307485 | Weniger et al. | Dec 2009 | A1 |
20100039280 | Holm et al. | Feb 2010 | A1 |
20100097969 | De Kimpe et al. | Apr 2010 | A1 |
20110087799 | Padhye et al. | Apr 2011 | A1 |
20110142053 | Van Der Merwe et al. | Jun 2011 | A1 |
20110182295 | Singh et al. | Jul 2011 | A1 |
20110194553 | Sahin et al. | Aug 2011 | A1 |
20110228779 | Goergen | Sep 2011 | A1 |
20120023552 | Brown et al. | Jan 2012 | A1 |
20120054367 | Ramakrishnan et al. | Mar 2012 | A1 |
20120088476 | Greenfield | Apr 2012 | A1 |
20120115512 | Grainger et al. | May 2012 | A1 |
20120157126 | Rekimoto | Jun 2012 | A1 |
20120167207 | Beckley et al. | Jun 2012 | A1 |
20120182147 | Forster | Jul 2012 | A1 |
20120311127 | Kandula et al. | Dec 2012 | A1 |
20120324035 | Cantu et al. | Dec 2012 | A1 |
20130029685 | Moshfeghi | Jan 2013 | A1 |
20130039391 | Skarp | Feb 2013 | A1 |
20130057435 | Kim | Mar 2013 | A1 |
20130077612 | Khorami | Mar 2013 | A1 |
20130088983 | Pragada et al. | Apr 2013 | A1 |
20130107853 | Pettus et al. | May 2013 | A1 |
20130108263 | Srinivas et al. | May 2013 | A1 |
20130115916 | Herz | May 2013 | A1 |
20130145008 | Kannan et al. | Jun 2013 | A1 |
20130155906 | Nachum et al. | Jun 2013 | A1 |
20130191567 | Rofougaran et al. | Jul 2013 | A1 |
20130203445 | Grainger et al. | Aug 2013 | A1 |
20130217332 | Altman et al. | Aug 2013 | A1 |
20130232433 | Krajec et al. | Sep 2013 | A1 |
20130273938 | Ng et al. | Oct 2013 | A1 |
20130317944 | Huang et al. | Nov 2013 | A1 |
20130322438 | Gospodarek et al. | Dec 2013 | A1 |
20130343198 | Chhabra et al. | Dec 2013 | A1 |
20130347103 | Veteikis et al. | Dec 2013 | A1 |
20140007089 | Bosch et al. | Jan 2014 | A1 |
20140016926 | Soto et al. | Jan 2014 | A1 |
20140025770 | Warfield et al. | Jan 2014 | A1 |
20140031031 | Gauvreau et al. | Jan 2014 | A1 |
20140052508 | Pandey et al. | Feb 2014 | A1 |
20140059655 | Beckley et al. | Feb 2014 | A1 |
20140087693 | Walby et al. | Mar 2014 | A1 |
20140105213 | A K et al. | Apr 2014 | A1 |
20140118113 | Kaushik et al. | May 2014 | A1 |
20140148196 | Bassan-Eskenazi et al. | May 2014 | A1 |
20140179352 | V.M. et al. | Jun 2014 | A1 |
20140191868 | Ortiz et al. | Jul 2014 | A1 |
20140198808 | Zhou | Jul 2014 | A1 |
20140222997 | Mermoud et al. | Aug 2014 | A1 |
20140233460 | Pettus et al. | Aug 2014 | A1 |
20140269321 | Kamble et al. | Sep 2014 | A1 |
20140302869 | Rosenbaum et al. | Oct 2014 | A1 |
20140337824 | St. John et al. | Nov 2014 | A1 |
20140341568 | Zhang et al. | Nov 2014 | A1 |
20150016286 | Ganichev et al. | Jan 2015 | A1 |
20150016469 | Ganichev et al. | Jan 2015 | A1 |
20150023176 | Korja et al. | Jan 2015 | A1 |
20150030024 | Venkataswami et al. | Jan 2015 | A1 |
20150043581 | Devireddy et al. | Feb 2015 | A1 |
20150063166 | Sif et al. | Mar 2015 | A1 |
20150065161 | Ganesh et al. | Mar 2015 | A1 |
20150087330 | Prechner et al. | Mar 2015 | A1 |
20150103818 | Kuhn et al. | Apr 2015 | A1 |
20150163192 | Jain et al. | Jun 2015 | A1 |
20150172391 | Kasslin et al. | Jun 2015 | A1 |
20150223337 | Steinmacher-Burow | Aug 2015 | A1 |
20150256972 | Markhovsky et al. | Sep 2015 | A1 |
20150264519 | Mirzaei et al. | Sep 2015 | A1 |
20150280827 | Adiletta et al. | Oct 2015 | A1 |
20150288410 | Adiletta et al. | Oct 2015 | A1 |
20150326704 | Ko et al. | Nov 2015 | A1 |
20150358777 | Gupta | Dec 2015 | A1 |
20150362581 | Friedman et al. | Dec 2015 | A1 |
20160007315 | Lundgreen et al. | Jan 2016 | A1 |
20160044627 | Aggarwal et al. | Feb 2016 | A1 |
20160099847 | Melander et al. | Apr 2016 | A1 |
20160100395 | Xu et al. | Apr 2016 | A1 |
20160105408 | Cooper et al. | Apr 2016 | A1 |
20160127875 | Zampini, II | May 2016 | A1 |
20160146495 | Malve et al. | May 2016 | A1 |
20160330045 | Tang et al. | Nov 2016 | A1 |
20160344641 | Javidi et al. | Nov 2016 | A1 |
20170026974 | Dey et al. | Jan 2017 | A1 |
20170180999 | Alderfer et al. | Jun 2017 | A1 |
20170181136 | Bharadwaj et al. | Jun 2017 | A1 |
20170195205 | Li et al. | Jul 2017 | A1 |
20170202000 | Fu et al. | Jul 2017 | A1 |
20170214551 | Chan et al. | Jul 2017 | A1 |
20170273083 | Chen et al. | Sep 2017 | A1 |
20170317997 | Smith et al. | Nov 2017 | A1 |
20170332421 | Sternberg et al. | Nov 2017 | A1 |
20170339706 | Andreoli-Fang et al. | Nov 2017 | A1 |
20180063018 | Bosch et al. | Mar 2018 | A1 |
20180069311 | Pallas et al. | Mar 2018 | A1 |
20180084389 | Snyder et al. | Mar 2018 | A1 |
Number | Date | Country |
---|---|---|
WO 2013020126 | Feb 2013 | WO |
WO 2014098556 | Jun 2014 | WO |
WO 2015131920 | Sep 2015 | WO |
WO 2017078657 | May 2017 | WO |
2017187011 | Nov 2017 | WO |
WO 2018009340 | Jan 2018 | WO |
WO 2018028777 | Feb 2018 | WO |
WO 2018053271 | Mar 2018 | WO |
WO 2018066362 | Apr 2018 | WO |
Entry |
---|
“Cisco ASR 5×00 Mobility Management Entity Administration Guide,” Version 15.0, Cisco Systems, Inc., Last updated Jun. 13, 2014, pp. 1-266. |
“Cisco 10000 Series Router Quality of Service Configuration Guide, Chapter 20: Configuring Quality of Service for MPLS Traffic,” Cisco Systems, Inc., Updated Nov. 17, 2013, pp. 1-34. |
“Enterprise Mobility 7.3 Design Guide, Chapter 11: CISCO Mobility Services Engine,” Cisco Systems, Inc., Updated Apr. 20, 2015, 8 pages. |
“I Love WiFi, The difference between L2 and L3 Roaming Events,” Apr. 1, 2010, 6 pages. |
“Quality of Service Regulation Manual,” ITU 2017, pp. 1-174. |
“Wi-FI Location-Based Services 4.1 Design Guide,” May 20, 2008, 206 pages. |
Afolabi, Ibrahim, et al., “Network Slicing & Softwarization: A Survey on Principles, Enabling Technologies & Solutions,” Mar. 21, 2018, pp. 1-24. |
Ali, Z., et al., “Performance Measurement in Segment Routing Networks with IPv6 Data Plane (SRv6),” Spring Working Group, Feb. 26, 2018, pp. 1-17. |
An, Xueli, et al., “Virtualization of Cellular Network EPC Gateways based on a Scalable SDN Architecture,” IEEE, Feb. 12, 2015, pp. 1-7. |
Antonioli, Roberto, et al., “Dual Connectivity for LTE-NR Cellular Networks,” Research Gate, Sep. 3-6, 2017, pp. 171-175. |
Bekan, Adnan, et al., “D5.1: Machine Learning Algorithms Development and Implementation,” 2016-2018 eWINE Consortium, 23, 2016, pp. 1-72. |
Bogale, Tadilo Endeshaw, et al., “Machine Intelligence Techniques for Next-Generation Context-Aware Wireless Networks,” arxiv.org, Jan. 12, 2018, pp. 1-10. |
Carter, Steve Sr., “E911 VoIP Essentials for Enterprise Deployments,” XO Communications, LLC, 2012, 9 pages. |
Chalise, Batu K., et al., “MIMO Relaying for Multiaccess Communication in Cellular Networks,” Sensor Array and MultiChannel Signal Processing Workshop, 2008, SAM 2008, 5th IEEE, Jul. 21, 2008, pp. 146-150. |
Cheng, W., et al., “Path Segment in MPLS Based Sement Routing Network,” Network Working Group, Oct. 2017, pp. 1-10. |
Christidis, Konstantinos, et al., “Blockchains and Smart Contracts for the Internet of Things,” IEEE Access, Special Section on the of Research in Internet of Things (IoT), vol. 4, May 10, 2016, pp. 1-12. |
Cox, Jacob H. Jr., et al., “Advancing Software-Defined Networks: A Survey,” IEEE, Oct. 12, 2017, pp. 25487-25526. |
Cui, Wenzhi et al., “DiFS: Distributed Flow Scheduling for Data Center Networks,” Nanjing University, China, Jul. 28, 2013, 10 pages. |
Doyle, Matthew G., “An IP Address Management Solution for a Server Solution Provider,” A Dissertation Submitted to the University of Liverpool, Sep. 28, 2005, 116 pages. |
Galvan T., Carlos E., et al., “Wifi bluetooth based combined positioning algorithm,” International Meeting of Electrical Engineering Research ENIINVIE 2012, Procedia Engineering 35 (2012 ), pp. 101-108. |
Geller, Michael, et al. , “5G Security Innovation with Cisco,” Whitepaper Cisco Public, Jun. 8, 2018, pp. 1-29. |
Gesbert, David, “Advances in Multiuser MIMO Systems (Tutorial Part II) Emerging Topics in Multiuser MIMO Networks,” IEEE PIMRC Conference, Sep. 2007, 107 pages. |
Halperin, Daniel, et al., “Augmenting Data Center Networks with Multi-Gigabit Wireless Links,” Aug. 15-19, 2011, SIGCOMM'11, ACM 978-1-4503-0797-0/11/08, pp. 38-49. |
Herb, Daniel, et al., “ROAUM: How to Unblock Roaming IoT Using BLockchain,” available at https://uploads-ssl.webflow.com/5987a08baeea4300016b7bd9/5a7a6d6cee5bc400010a08f2_Roaum_Roaming_IoT_Whitepaper.pdf, pp. 1-14. |
Hsieh, Cynthia, “Location Awareness in VMware View 4.5 and Above,” VMware, 2011, 8 pages. |
Jero, Samuel, et al., “Identifier Binding Attacks and Defenses in Software-Defined Networks,” USENIX, The Advanced Computing Systems Association, Aug. 16-18, 2017, 19 pages. |
Ji, Philip N., et al., “Demonstration of High-Speed MIMO OFDM Flexible Bandwidth Data Center Network,” Optical Society of America, 2012, 2 pages. |
Kandula, Srikanth, et al., “Flyways to De-Congest Data Center Networks,” Microsoft Research, Oct. 23, 2009, 6 pages. |
Katayama, Y. et al., “MIMO Link Design Strategy for Wireless Data Center Applications,” IEEE Wireless Communications and Networking Conference: Services, Applications, and Business, 2012, 5 pages. |
Leary, Jonathan, et al., “Wireless LAN Fundamentals: Mobility,” Jan. 9, 2004, Cisco Press, 15 pages. |
Leonhardt, Ulf, “Supporting Location-Awareness in Open Distributed Systems,” May 1998, 186 pages. |
Morozov, Yury, “Blockchain Telecom: Bubbletone Blockchain,” Dec. 29, 2017, pp. 1-33. |
Network Heresy, “NVGRE, VXLAN and What Microsoft is Doing Right,” Oct. 3, 2011, 5 pages. |
Norwegian National Security Authority, “N-03 Security guidance for switches and routers,” Sep. 26, 2012, pp. 1-24. |
Saraiva de Sousa, Nathan F., et al., “Network Service Orchestration: A Survey,” IEEE Communications Surveys & Tutorials, Mar. 23, 2018, pp. 1-30. |
Savvides, Andreas, et al., “Dynamic Fine-Grained Localization in Ad-Hoc Networks of Sensors”, Proceeding MobiCom '01 Proceedings of the 7th annual international conference on Mobile computing and networking, Jul. 2001, pp. 166-179. |
Shwetha, D., et al.,“A Bandwidth Request Mechanism for QoS Enhancement in Mobile WiMAX Networks,” International Journal of Advanced Research in Electrical Electronics and Instrumentation Engineering, vol. 3, Issue 1, Jan. 2014, pp. 1-8. |
Sun, et al., “The future of Wi-Fi,” IEEE Communications Magazine, vol. 52, No. 11, Nov. 21, 2014, 166 pages. |
Ventre, Pier Luigi, et al., “Performance Evaluation and Tuning of Virtual Infrastructure Managers for (Micro) Virtual Network Functions,” ieee.org, Nov. 7-10, 2016, pp. 1-7. |
Wright, Joshua, “Detecting Wireless LAN MAC Address Spoofing,” Jan. 21, 2003, pp. 1-20. |
Zickau, Sebastian, et al., “Enabling Location-based Policies in a Healthcare Cloud Computing Environment,” 2014 IEEE 3rd International Conference on Cloud Networking (Cloudnet), Oct. 2014, pp. 353-358. |
Husain et al., “Mobile Edge Computing with Network Resource Slicing for Internet-of-Things,” IEEE 2017, pp. 1-7. |