As the use of smart phones and Internet of Things (IoT) devices has increased, so too has the desire for more reliable, fast, and continuous transmission of content. In an effort to improve the content transmission, networks continue to improve with faster speeds and increased bandwidth. The advent and implementation of advanced wireless technology has resulted in faster speeds and increased bandwidth. Thus, minimizing interruptions in the supporting networking infrastructure is important to providing a resilient and stable network with the desired end-to-end performance. It is with respect to these and other considerations that the embodiments described herein have been made.
In some types of cellular network systems, there may be issues with problematic service coverage. This may be due to the network service area being new or may be because of long-term issues such as geography or weather conditions. There is a continuing need to address these network service areas with problematic service coverage with some type of technological improvement that will overcome these service coverage shortfalls. Unfortunately, a full solution to these end user experience problems of dropped calls and other types of poor network coverage has yet to be produced. The present disclosure addresses this and other issues.
The present disclosure relates generally to telecommunication networks, more particularly, to a system and method for instantiating persistent roaming for a mobile device.
Briefly stated, one or more methods for instantiating persistent roaming for a mobile device are disclosed. Some such methods include: receiving, at a provisioning engineering tool for managing mobile device provisioning and a plurality of Tracking Area Code (TAC) restriction tables, a request to update a provisioning profile associated with a user account, the user account associated with at least one mobile device, by adding at least one of the plurality of TAC restriction tables to the provisioning profile associated with the user account, each of the plurality of TAC restriction tables including a list of cellular sites in a geographical area; restricting the mobile device associated with the user account from a home Mobile Network Operators (MNO) network when the mobile device associated with the user account is in the geographical area associated with the listed cellular sites of the TAC restriction table in the provisioning profile; and enabling the restricted mobile device associated with the user account to begin roaming on a third party Mobile Network Operators (MNO) network.
In some embodiments, the method for instantiating persistent roaming for a mobile device further includes determining that one or more of the mobile devices associated with user accounts are candidates for persistent roaming in one or more geographical areas, and adding the one or more of the mobile devices associated with user accounts to the TAC restriction table. In another aspect of some embodiments, the restricting of the mobile device associated with the user account from the home MNO network further includes: sending a payload of data to the UDR to force the mobile device associated with the user account to attempt a registration process that launches the updated provisioning profile with the TAC restriction table. In still another aspect of some embodiments, the restricting of the mobile device associated with the user account from the home MNO network further includes: forcing the mobile device associated with the user account, via the UDR, to attempt a registration process further comprises losing Network Registration. In yet another aspect of some embodiments, the provisioning engineering tool includes multiple TAC restriction tables. In some embodiments, each TAC restriction table contains up to 255 Tracking Area Codes.
In one or more embodiments of the method for instantiating persistent roaming for a mobile device, the TAC restriction table individually identifies a user by International Mobile Subscriber Identifier (IMSI). In another aspect of some embodiments, the method for persistent roaming to mitigate problematic home network coverage areas further includes: enabling the user to be queried to determine their current connectivity state. In still another aspect of some embodiments, the prohibited services include one or more of voice and data services. In yet another aspect of some embodiments, the restricting of the mobile device of the user from the home Mobile Network Operators (MNO) network further comprises rejecting a registration attempt of the mobile device of the user.
In other embodiments, one or more systems for instantiating persistent roaming for a mobile device are disclosed. The system includes a memory that stores computer-executable instructions; and a processor that executes the computer-executable instructions that cause the processor to: receiving, at a provisioning engineering tool for managing mobile device provisioning and a plurality of Tracking Area Code (TAC) restriction tables, a request to update a provisioning profile associated with a user account, the user account associated with at least one mobile device, by adding at least one of the plurality of TAC restriction tables to the provisioning profile associated with the user account, each of the plurality of TAC restriction tables including a list of cellular sites in a geographical area; restrict the mobile device associated with the user account from a home Mobile Network Operators (MNO) network when the mobile device associated with the user account is in the geographical area associated with the listed cellular sites of the TAC restriction table in the provisioning profile; and enable the restricted mobile device associated with the user account to begin roaming on a third party Mobile Network Operators (MNO) network.
In some embodiments of the system for instantiating persistent roaming for a mobile device, the system determines that one or more of the mobile devices associated with user accounts are candidates for persistent roaming in one or more geographical areas, and adds the one or more of the mobile devices associated with user accounts to the TAC restriction table. In another aspect of some embodiments, the restricting of the mobile device associated with the user account from the home MNO network further includes a payload of data being sent to the UDR to force the mobile device associated with the user account to attempt a registration process that launches the updated provisioning profile with the TAC restriction table. In still another aspect of some embodiments, the restricting of the mobile device associated with the user account from the home MNO network further includes the mobile device associated with the user account being forced, via the UDR, to attempt a registration process further comprises losing Network Registration. In yet another aspect of some embodiments, the provisioning engineering tool includes multiple TAC restriction tables. In one embodiment, each TAC restriction table contains up to 255 Tracking Area Codes.
In one or more embodiments of the instantiating persistent roaming for a mobile device, the TAC restriction table individually identifies a user by International Mobile Subscriber Identifier (IMSI). In another aspect of some embodiments, the system enables the user to be queried to determine their current connectivity state. In still another aspect of some embodiments, the prohibited services include one or more of voice and data services. In yet another aspect of some embodiments, the restricting of the mobile device of the user from the home Mobile Network Operators (MNO) network further comprises rejecting a registration attempt of the mobile device of the user.
Moreover, in still other embodiments, one or more non-transitory computer-readable storage mediums are disclosed. The one or more non-transitory computer-readable storage mediums have computer-executable instructions stored thereon that, when executed by a processor, cause the processor to: receiving, at a provisioning engineering tool for managing mobile device provisioning and a plurality of Tracking Area Code (TAC) restriction tables, a request to update a provisioning profile associated with a user account, the user account associated with at least one mobile device, by adding at least one of the plurality of TAC restriction tables to the provisioning profile associated with the user account, each of the plurality of TAC restriction tables including a list of cellular sites in a geographical area; and restrict the mobile device associated with the user account from a home Mobile Network Operators (MNO) network when the mobile device associated with the user account is in the geographical area associated with the listed cellular sites of the TAC restriction table in the provisioning profile.
In one or more embodiments of the system for instantiating persistent roaming for a mobile device, the non-transitory computer-readable storage medium includes further computer-executable instructions that, when executed by a processor, cause the processor to: enable the restricted mobile device of the user to begin roaming on a third party Mobile Network Operators (MNO) network.
In some embodiments of the system for non-transitory computer-readable storage medium for instantiating persistent roaming for a mobile device, the system determines that one or more of the mobile devices associated with user accounts are candidates for persistent roaming in one or more geographical areas, and adds the one or more of the mobile devices associated with user accounts to the TAC restriction table. In another aspect of some embodiments, the restricting of the mobile device associated with the user account from the home MNO network further includes a payload of data being sent to the UDR to force the mobile device associated with the user account to attempt a registration process that launches the updated provisioning profile with the TAC restriction table. In still another aspect of some embodiments, the restricting of the mobile device associated with the user account from the home MNO network further includes the mobile device associated with the user account being forced, via the UDR, to attempt a registration process further comprises losing Network Registration. In yet another aspect of some embodiments, the provisioning engineering tool includes multiple TAC restriction tables. In one embodiment, each TAC restriction table contains up to 255 Tracking Area Codes.
In one or more embodiments of non-transitory computer-readable storage medium instantiating persistent roaming for a mobile device, the TAC restriction table individually identifies a user by International Mobile Subscriber Identifier (IMSI). In another aspect of some embodiments, the system enables the user to be queried to determine their current connectivity state. In still another aspect of some embodiments, the prohibited services include one or more of voice and data services. In yet another aspect of some embodiments, the restricting of the mobile device of the user from the home Mobile Network Operators (MNO) network further comprises rejecting a registration attempt of the mobile device of the user.
Non-limiting and non-exhaustive embodiments are described with reference to the following drawings. In the drawings, like reference numerals refer to like parts throughout the various figures unless otherwise specified.
For a better understanding of the disclosed invention, reference will be made to the following Detailed Description, which is to be read in association with the accompanying drawings:
The following description, along with the accompanying drawings, sets forth certain specific details in order to provide a thorough understanding of various disclosed embodiments. However, one skilled in the relevant art will recognize that the disclosed embodiments may be practiced in various combinations, without one or more of these specific details, or with other methods, components, devices, materials, and the like. In other instances, well-known structures or components that are associated with the environment of the present disclosure, including but not limited to the communication systems and networks, have not been shown or described in order to avoid unnecessarily obscuring descriptions of the embodiments. Additionally, the various embodiments may be methods, systems, media, or devices. Accordingly, the various embodiments may be entirely hardware embodiments, entirely software embodiments, or embodiments combining software and hardware aspects.
Throughout the specification, claims, and drawings, the following terms take the meaning explicitly associated herein, unless the context clearly dictates otherwise. The term “herein” refers to the specification, claims, and drawings associated with the current application. The phrases “in one embodiment,” “in another embodiment,” “in various embodiments,” “in some embodiments,” “in other embodiments,” and other variations thereof refer to one or more features, structures, functions, limitations, or characteristics of the present disclosure, and are not limited to the same or different embodiments unless the context clearly dictates otherwise. As used herein, the term “or” is an inclusive “or” operator, and is equivalent to the phrases “A or B, or both” or “A or B or C, or any combination thereof,” and lists with additional elements are similarly treated. The term “based on” is not exclusive and allows for being based on additional features, functions, aspects, or limitations not described, unless the context clearly dictates otherwise. In addition, throughout the specification, the meaning of “a,” “an,” and “the” include singular and plural references.
Advanced cellular networks provide a broad range of wireless services delivered to the end user across multiple access platforms and multi-layer networks. For example, 5G is a dynamic, coherent and flexible framework of multiple advanced technologies supporting a variety of applications. 5G utilizes an intelligent architecture, with Radio Access Networks (RANs) not constrained by base station proximity or complex infrastructure. 5G enables a disaggregated, flexible, and virtual RAN with interfaces creating additional data access points. 5G network functions may be completely software-based and designed as cloud-native, meaning that they're agnostic to the underlying cloud infrastructure, allowing higher deployment agility and flexibility. With the advent of 5G, industry experts defined how the 5G Core (5GC) network should evolve to support the needs of 5G New Radio (NR) and the advanced use cases enabled by it. The 3rd Generation Partnership Project (3GPP) develops protocols and standards for telecommunication technologies including RAN, core transport networks and service capabilities. 3GPP has provided complete system specifications for 5G network architecture which is much more service oriented than previous generations. Future network architectures, such as 6G and others, are expected to utilize many of these features and functionalities.
Multi-Access Edge Computing (MEC) is an important element of 5G architecture. MEC is an evolution in telecommunications that brings the applications from centralized data centers to the network edge, and therefore closer to the end users and their devices. This essentially creates a shortcut in content delivery between the user and host, and the long network path that once separated them. This MEC technology is not exclusive to 5G but is certainly important to its efficiency. Characteristics of the MEC include the low latency, high bandwidth and real time access to RAN information that distinguishes 5G architecture from its predecessors. This convergence of the RAN and core networks enables operators to leverage new approaches to network testing and validation. 5G networks based on the 3GPP 5G specifications provide an environment for MEC deployment. The 5G specifications define the enablers for edge computing, allowing MEC and 5G to collaboratively route traffic. In addition to the latency and bandwidth benefits of the MEC architecture, the distribution of computing power better enables the high volume of connected devices inherent to 5G deployment and the rise of IoT.
The 3rd Generation Partnership Project (3GPP) develops protocols for mobile telecommunications and has developed a standard for 5G. The 5G architecture is based on what is called a Service-Based Architecture (SBA), which leverages IT development principles and a cloud-native design approach. In this architecture, each network function (NF) offers one or more services to other NFs via Application Programming Interfaces (API). Network function virtualization (NFV) decouples software from hardware by replacing various network functions such as firewalls, load balancers and routers with virtualized instances running as software. This eliminates the need to invest in many expensive hardware elements and can also accelerate installation times, thereby providing revenue generating services to the customer faster.
NFV enables the 5G infrastructure by virtualizing appliances within the 5G network. This includes the network slicing technology that enables multiple virtual networks to run simultaneously. NFV may address other 5G challenges through virtualized computing, storage, and network resources that are customized based on the applications and customer segments. The concept of NFV extends to the RAN through, for example, network disaggregation promoted by alliances such as O-RAN. This enables flexibility, provides open interfaces and open-source development, ultimately to ease the deployment of new features and technology with scale. The O-RAN ALLIANCE objective is to allow multi-vendor deployment with off-the-shelf hardware for the purposes of easier and faster inter-operability. Network disaggregation also allows components of the network to be virtualized, providing a means to scale and improve user experience as capacity grows. The benefits of virtualizing components of the RAN provide a means to be more cost effective from a hardware and software viewpoint especially for IoT applications where the number of devices is in the millions.
The 5G New Radio (5G NR) RAN comprises a set of radio base stations (each known as Next Generation Node B (gNB)) connected to the 5G Core (5GC) and to each other. The gNB incorporates three main functional modules: the Centralized Unit (CU), the distributed Unit (DU), and the Radio Unit (RU), which can be deployed in multiple combinations. The primary interface is referred to as the F1 interface between DU and CU and are interoperable across vendors. The CU may be further disaggregated into the CU user plane (CU-UP) and CU control plane (CU-CP), both of which connect to the DU over F1-U and F1-C interfaces respectively. This 5G RAN architecture is described in 3GPP TS 38.401 V16.8.0 (2021 December). Each network function (NF) is formed by a combination of small pieces of software code called microservices. Future network architectures, such as 6G and others, are expected to utilize many of these technological improvements, plus additional advancements.
As shown in
The DU 204 may sit close to the RU 206 and runs the radio link control (RLC), the Medium Access Control (MAC) sublayer of the 5G NR protocol stack, and parts of the PHY layer. The MAC sublayer interfaces to the RLC sublayer from above and to the PHY layer from below. The MAC sublayer maps information between logical and transport channels. Logical channels are about the type of information carried whereas transport channels are about how such information is carried. This logical node includes a subset of the gNB functions, depending on the functional split option, and its operation is controlled by the CU 202.
The CU 202 is the centralized unit that runs the RRC and Packet Data Convergence Protocol (PDCP) layers. A gNB may comprise a CU and one DU connected to the CU via Fs-C and Fs-U interfaces for control plane (CP) and user plane (UP), respectively. A CU with multiple DUs will support multiple gNBs. The split architecture enables a 5G network to utilize different distribution of protocol stacks between CU 202 and DU 204 depending on mid-haul availability and network design. The CU 202 is a logical node that includes the gNB functions like transfer of user data, mobility control, RAN sharing, positioning, session management, etc., with the exception of functions that may be allocated exclusively to the DU 204. The CU 202 controls the operation of several DUs 204 over the mid-haul interface.
As mentioned above, 5G network functionality is split into two functional units: the DU 204, responsible for real time 5G layer 1 (L1) and 5G layer 2 (L2) scheduling functions, and the CU 202 responsible for non-real time, higher L2 and 5G layer 3 (L3). As shown in
A virtual private cloud is a configurable pool of shared resources allocated within a public cloud environment. The VPC provides isolation between one VPC user and all other users of the same cloud, for example, by allocation of a private IP subnet and a virtual communication construct (e.g., a VLAN or a set of encrypted communication channels) per user. In some embodiments, this 5G network leverages the distributed nature of 5G cloud-native network functions and cloud flexibility, which optimizes the placement of 5G network functions for optimal performance based on latency, throughput and processing requirements.
In some embodiments, the network architecture utilizes a logical hierarchical architecture consisting of National Data Centers (NDCs), Regional Data Centers (RDCs) and Breakout Edge Data Centers (BEDCs), to accommodate the distributed nature of 5G functions and the varying requirements for service layer integration. In one or more embodiments, BEDCs are deployed in Local Zones hosting 5G NFs that have strict latency budgets. They may also be connected with Pass-through Edge Data Centers (PEDC), which serve as an aggregation point for all Local Data Centers (LDCs) and cell sites in a particular market. BEDCs also provide Internet peering for 5G data service.
In one or more embodiments, an O-RAN network may be implemented that includes an RU (Radio Unit), which is deployed on towers and a DU (Distributed Unit), which controls the RU. These units interface with the Centralized Unit (CU), which is hosted in the BEDC at the Local Zone. These combined pieces provide a full RAN solution that handles all radio level control and subscriber data traffic. In some embodiments, the User Plane Function (Data Network Name (DNN)) is collocated in the BEDC, which anchors user data sessions and routes to the Internet. In another aspect, the BEDCs leverage local Internet access available in Local Zones, which allows for a better user experience while optimizing network traffic utilization.
In one of more embodiments, the Regional Data Centers (RDCs) are hosted in the Region across multiple availability zones. The RDCs host 5G subscribers' signaling processes such as authentication and session management as well as voice for 5G subscribers. These workloads can operate with relatively high latencies, which allows for a centralized deployment throughout a region, resulting in cost efficiency and resiliency. For high availability, multiple RDCs are deployed in a region, each in a separate Availability Zone (AZ) to ensure application resiliency and high availability.
In another aspect of some embodiments, an AZ is one or more discrete data centers with redundant power, networking, and connectivity in a Region. In some embodiments, AZs in a Region are interconnected with high-bandwidth and low-latency networking over a fully redundant, dedicated metro fiber, which provides high-throughput, low-latency networking between AZs. Cloud Native Functions (CNFs) deployed in the RDC utilize a high speed backbone to failover between AZs for application resiliency. CNFs like AMF and SMF, which are deployed in RDC, continue to be accessible from the BEDC in the Local Zone in case of an AZ failure. They serve as the backup CNF in the neighboring AZ and would take over and service the requests from the BEDC.
In this embodiment of the system for persistent roaming to mitigate problematic home network coverage areas, dedicated VPCs are implemented for each Data Center type (e.g., local data center, breakout edge data center, regional data center, national data center, and the like). In some such embodiments, the national data center VPC stretches across multiple Availability Zones (AZs). In another aspect of some embodiments, two or more AZs are implemented per region of the cloud computing service provider. Some embodiments of the 5G Core network functions require support for advanced routing capabilities inside VPC and across VPCs (e.g., UPF, SMF and ePDG). These functions rely on routing protocols such as BGP for route exchange and fast failover (both stateful and stateless). To support these requirements, virtual routers are deployed on EC2 to provide connectivity within and across VPCs, as well as back to the on-prem network.
Similarly to
In one or more embodiments, the system for persistent roaming to mitigate problematic home network coverage areas ensures consistent service quality and seamless transition between cell site clusters and markets for subscribers restricting subscriber access to voice and data services in problematic home network coverage areas. Once the subscriber access is restricted from its home MNO network, UE 410 associated with the restricted subscriber starts roaming on third-party MNO networks. In some such embodiments, Tracking Area Code (TAC) restriction tables are used to restrict the use of a cell site by a subscriber. This is accomplished by updating the provisioning profile on the UDR 460 using a Provisioning Engineering Tool 510 (as shown in
Referring again to
Referring now to
In
Referring now to
Once the UE 410 has its registration rejected in the tracking areas of TAC 602, it is then directed by the system to a roaming partner for cellular mobile service. Thus, when a cellular mobile device (e.g., 410) knows that its coverage is poor, spotty, or otherwise problematic in a certain region due to the region being new (or it simply being a challenging coverage area due to geography or other factors), the TAC Restriction List is used to automatically direct certain listed users to roaming partners. This directing (or even forcing) of certain listed users to roaming partners is performed from the very beginning of those users attempting service (i.e., registration) in that tracking area so that they have acceptable service coverage from the beginning of their attempt for service in that tracking area. Otherwise stated, there is no period of unsatisfactory service coverage that is required to be endured before the certain listed users are directed from the home coverage area to roaming partner.
Referring now to
Unlike the scenario shown in
This may be accomplished since the TAC Restriction List is a list of tracking areas (i.e., a group of cell sites) where only specific users are prohibited from access to these cell sites, while other specific users may be allowed to obtain registration and thus access to these cell sites. This use case may be seen in an embodiment where a service market is not yet ready for commercial service in this service area, but mobile carrier testers still need to have access to this service access so that they can perform the testing needed to bring the service area up to satisfactory service standards. Therefore, in such service areas, commercial users service access is restricted using the TAC Restriction List of the system for persistent roaming to mitigate problematic home network coverage areas, while the system simultaneously allows mobile carrier testers to have registration and thus access to these service areas.
In some embodiments, end user mobile devices have experienced dropped calls or other network problems such as poor service. In some embodiments, the disclosed system consolidates user data (or tester data) regarding dropped calls of end user mobile devices and other network problems. This user data (or tester data) may include data logs, as well as service calls, user/tester complaints, or other data that has been generated or obtained by the carrier network. In some embodiments, this user/tester data will be collected over as long a period of time as possible. In other embodiments, such as when a recent network upgrade has occurred, the user/tester data may be collected and consolidated from the time and date of the upgrade to present.
Referring now to other aspects of the system for persistent roaming to mitigate problematic home network coverage areas, in some embodiments, this consolidated user data is then used as training data to train a machine learning model regarding dropped calls of the end user mobile devices and/or other network problems experienced by the end user. Next, the machine learning model analyzes the user data to determine geographical areas in which repetitive dropped calls of the end user mobile devices and/or other network problems experienced by the end user have been identified. This analysis of the training data by the machine learning model is then able to predict, as an output from the machine learning model, future dropped calls of the end user mobile devices and/or other network problems experienced by the end user in identified geographical areas.
These identified geographical areas may be referred to predicted call drop zones in the home network coverage area. While these regions are referred to as predicted call drop zones, these regions may also include, or alternatively include, other identified network problems experienced by the end user, such as poor voice quality or data transfer without actual resulting in a dropped call. In some embodiments, the alternate carrier is a roaming partner that is used when an end user travels with its mobile device outside of its contracted coverage area. In one or more embodiments of the system and method for persistent roaming, the system determines that the end user mobile device is approaching a predicted call drop zone using Global Positioning System (GPS), local positioning systems, or other inertial positioning systems. Such other inertial positioning systems include, by way of example only, and not by way of limitation: sensors such as cameras, LiDAR, radar, radios, and star trackers.
Notably, some carrier networks will know where the outer edges of their coverage area exist and may take some type of measure to address coverage at the known edges of their coverage area. In contrast, the system and method for persistent roaming to mitigate problematic home network coverage areas described herein provides a technological improvement and solution to a technological problem by addressing problematic repetitive call drop areas and poor network experience areas that are within the geographical areas of the network carrier coverage and at least partially away from edges of the network carrier coverage. Thus, in some embodiments, the system and method for persistent roaming identifies and predicts future dropped calls of the end user mobile devices and network problems in identified geographical areas that would be unknown without the persistent roaming by the machine learning model.
Embodiments of the system and method for persistent roaming have been described above that implement a machine learning model. While many embodiments of the system and method for persistent roaming implement a machine learning model, other embodiments of the system and method for persistent roaming do not employ a machine learning model, but rather utilize more traditional analysis (i.e., non-machine learning). They may be several technical reasons to implement traditional, non-machine learning, analysis, including by way of example only, and not by way of limitation: lack of sufficient computation power available, an insufficient amount of data to properly train a machine learning model, lack of authorization to use the data in a machine learning model (e.g., potentially due to contractual or privacy issues), or the like. Thus, the predicted call drop zones may be identified using other types of analysis (i.e., non-machine learning) of the user data in one or more embodiments of the system and method for persistent roaming to mitigate problematic home network coverage areas.
In some embodiments of a system for persistent roaming to mitigate problematic home network coverage areas, each individual end user mobile device is associated with its corresponding 5G Core using an IMSI (International Mobile Subscriber Identifier) number. An IMSI is a unique number associated with Global System for Mobile Communications (GSM) and Universal Mobile Telecommunications System (UMTS) network mobile phone users. As such, the IMSI is a unique number that identifies a mobile end user that is a subscriber to the carrier network.
In particular, shown is example host computer system(s) 901. For example, such computer system(s) 901 may represent those in various data centers and cell sites shown and/or described herein that host the functions, components, microservices and other aspects described herein to implement a system for persistent roaming to mitigate problematic home network coverage areas. In some embodiments, one or more special-purpose computing systems may be used to implement the functionality described herein. Accordingly, various embodiments described herein may be implemented in software, hardware, firmware, or in some combination thereof. Host computer system(s) 901 may include memory 902, one or more central processing units (CPUs) 914, I/O interfaces 918, other computer-readable media 920, and network connections 922.
Memory 902 may include one or more various types of non-volatile and/or volatile storage technologies. Examples of memory 902 may include, but are not limited to, flash memory, hard disk drives, optical drives, solid-state drives, various types of random-access memory (RAM), various types of read-only memory (ROM), other computer-readable storage media (also referred to as processor-readable storage media), or the like, or any combination thereof. Memory 902 may be utilized to store information, including computer-readable instructions that are utilized by CPU 914 to perform actions, including those of embodiments described herein.
Memory 902 may have stored thereon control module(s) 904. The control module(s) 904 may be configured to implement and/or perform some or all of the functions of the systems, components and modules described herein for a system for persistent roaming to mitigate problematic home network coverage areas. Memory 902 may also store other programs and data 910, which may include rules, databases, application programming interfaces (APIs), software platforms, cloud computing service software, network management software, network orchestrator software, network functions (NF), AI or ML programs or models to perform the functionality described herein, user interfaces, operating systems, other network management functions, other NFs, etc.
Network connections 922 are configured to communicate with other computing devices to facilitate the functionality described herein. In various embodiments, the network connections 922 include transmitters and receivers (not illustrated), cellular telecommunication network equipment and interfaces, and/or other computer network equipment and interfaces to send and receive data as described herein, such as to send and receive instructions, commands and data to implement the processes described herein. I/O interfaces 918 may include a video interface, other data input or output interfaces, or the like. Other computer-readable media 920 may include other types of stationary or removable computer-readable media, such as removable flash drives, external hard drives, or the like.
The various embodiments described above can be combined to provide further embodiments. These and other changes can be made to the embodiments in light of the above-detailed description. In general, in the following claims, the terms used should not be construed to limit the claims to the specific embodiments disclosed in the specification and the claims, but should be construed to include all possible embodiments along with the full scope of equivalents to which such claims are entitled. Accordingly, the claims are not limited by the disclosure.