The present technology pertains to management of subscriber resources in a network environment. More particularly, the technology pertains to subscriber Quality of Service (QoS) management in a 5G mobile network environment.
When a user device executes an application over a network, a dedicated bearer is established for transmitting the application data over the network. In other words, the dedicated bearer is a dedicated data pipeline between network nodes for relaying application data and the like. The dedicated bearer is established under predetermined parameters which are associated with the user device through a subscriber account. The predetermined parameters include QoS attributes and the like. Applications increasingly rely on varying levels of connection quality. For example, an email application may require only a minimal bitrate and the like, whereas a virtual reality (VR) application may require a substantially higher QoS. Oftentimes, applications are used intermittently and a single QoS may be unnecessary for one application and insufficient for another. Further, an increased QoS may only be needed for a short period of time, after which a lower QoS may be sufficient for other applications executed on the user device.
In order to describe the manner in which the above-recited and other advantages and features of the disclosure can be obtained, a more particular description of the principles briefly described above will be rendered by reference to specific embodiments thereof which are illustrated in the appended drawings. Understanding that these drawings depict only exemplary embodiments of the disclosure and are not therefore to be considered to be limiting of its scope, the principles herein are described and explained with additional specificity and detail through the use of the accompanying drawings in which:
Various embodiments of the disclosure are discussed in detail below. While specific implementations are discussed, it should be understood that this is done for illustration purposes only. A person skilled in the relevant art will recognize that other components and configurations may be used without parting from the spirit and scope of the disclosure. Thus, the following description and drawings are illustrative and are not to be construed as limiting. Numerous specific details are described to provide a thorough understanding of the disclosure. However, in certain instances, well-known or conventional details are not described in order to avoid obscuring the description. References to one or an embodiment in the present disclosure can be references to the same embodiment or any embodiment; and, such references mean at least one of the embodiments.
Reference to “one embodiment” or “an embodiment” means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the disclosure. The appearances of the phrase “in one embodiment” in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Moreover, various features are described which may be exhibited by some embodiments and not by others.
The terms used in this specification generally have their ordinary meanings in the art, within the context of the disclosure, and in the specific context where each term is used. Alternative language and synonyms may be used for any one or more of the terms discussed herein, and no special significance should be placed upon whether or not a term is elaborated or discussed herein. In some cases, synonyms for certain terms are provided. A recital of one or more synonyms does not exclude the use of other synonyms. The use of examples anywhere in this specification including examples of any terms discussed herein is illustrative only, and is not intended to further limit the scope and meaning of the disclosure or of any example term. Likewise, the disclosure is not limited to various embodiments given in this specification.
Without intent to limit the scope of the disclosure, examples of instruments, apparatus, methods and their related results according to the embodiments of the present disclosure are given below. Note that titles or subtitles may be used in the examples for convenience of a reader, which in no way should limit the scope of the disclosure. Unless otherwise defined, technical and scientific terms used herein have the meaning as commonly understood by one of ordinary skill in the art to which this disclosure pertains. In the case of conflict, the present document, including definitions will control.
Additional features and advantages of the disclosure will be set forth in the description which follows, and in part will be obvious from the description, or can be learned by practice of the herein disclosed principles. The features and advantages of the disclosure can be realized and obtained by means of the instruments and combinations particularly pointed out in the appended claims. These and other features of the disclosure will become more fully apparent from the following description and appended claims, or can be learned by the practice of the principles set forth herein.
A network service modification, sponsored by a sponsoring member, may be requested by a requesting member and the request may include an identification of a sponsoring member. A group may be generated and can include the requesting member and sponsoring member, as well as a group policy which has a reference to the sponsored network service modification. Further, the sponsoring member may be provided with an activation key which can be used to activate the sponsored network service modification. The group policy may then be used to apply a first network policy to the requesting member and also a second network policy to the sponsoring member.
When a user device makes a connection over a public data network (PDN), a default bearer is established for carrying data over the connection. A default bearer may typically be associated with a particular aggregate maximum bit rate value for the access point name, or APN-AMBR value, which may determine various aspects of service over the connection (e.g., QoS, speed, bandwidth, and the like). The service aspects may, in some examples, operate within a range without providing a guaranteed rating and the like.
When the user device executes, for example, an application while connected over the PDN, the application may require a guaranteed bit rate (GBR) and/or other QoS attributes such as, without limitation, maximum bit rate (MBR), packet delay, error level, QoS class identifier (QCI), and the like. In some cases, the application may require QoS parameters that exceed the QoS associated with the subscription level for the user device. In such cases, the user device may be unable to execute the application or the user experience with the application may be poor.
In one particular embodiment, a user who is a network member can provide a request for a sponsored network service modification, such as an alteration of QoS associated with the member account and the like, and identify another network member as a sponsor. As a result, a group may be generated for associating the requesting member and the sponsoring member as well as the requested service modification. The sponsoring member may then receive an activation key for the service modification which, when used, may cause network policies (e.g., QoS and the like) for the requesting member and the sponsoring member to be modified. For example, the requesting member may receive an increase in QoS whereas the sponsoring member may receive a proportionally equivalent decrease in QoS. Further, in some examples, the modification can be applied for a timed duration, after which it may be reverted so that the requesting member and the sponsoring member return to their respective original QoS.
While a user device is connected to a PDN, a dedicated bearer may be established in response to an application being executed on the device and requiring a dedicated data connection. For example, when a Voice over Internet Protocol (VoIP) application initiates a call session, a dedicated bearer may be utilized to ensure a consistent and stable connection. The dedicated bearer may be assigned, for example, a GBR or other QoS attributes based on the policies related to an account owner associated with the user device. The policies may be defined by, for example, a subscription plan of the account owner and the like.
Where the policies related to the account owner are insufficient to assign adequate characteristics to the dedicated bearer—for example, a low cost subscription may be associated with a fairly poor QoS—the account owner can change a subscription plan for the user device. However, updating the subscription plan may take time, increase expense, or be otherwise infeasible in a given context.
In some embodiments, an account owner, or requesting member, may request QoS and the like from another account owner, or sponsoring member, in order to facilitate adequate dedicated bearers for applications and the like executed on the respective user device. Upon agreement by the sponsoring member, QoS for the requesting member account may be increased and a proportionate reduction in QoS may be applied to the account of the sponsoring member.
In some examples, the account modifications can be processed by an Unstructured Supplementary Service Data function (USSD). In some other examples, the account modifications may be processed by a Network Exposure Function (NEF).
Further, in one embodiment, a sponsor group may be created. The sponsor group provides for multiple different account holders to serve as sponsoring members. In some examples, each sponsoring member within the sponsor group can contribute an equal amount of QoS to the requesting member. In other examples, various allocation schemes can be included with a request or with the agreement to sponsor provided by respective sponsoring members.
In one embodiment, a duration or other time component can be associated with the modifications to QoS and the like. In one example, once the duration has expired, the QoS modifications can revert to their respective original pre-modification states. In some other examples, the time component may include a scheduler or time tracker wherein a total use time and the like can be tracked so that the requesting member can use the modified service for a time, cease using it, and then return to using it until a certain amount of total time has been used.
A requesting member device 104 and a sponsoring member device 106 can generate a QoS sharing agreement 108 between them. The QoS sharing agreement 108 can include further details such as QoS attributes like bit rate, bandwidth, and the like. A time duration and the like for the sponsored QoS can also be included in the QoS sharing agreement 108.
The requesting member device 104 can also transmit a share-group creation request 110 to network backend 102. In some examples, the share-group creation request 110 can include identification of the sponsoring member device 106. In other examples, the share-group creation request 110 may include an open ended component and the like in order to allow for adding new sponsor members on the fly.
Sponsoring member device 106 can transmit a request 112 for sharing QoS rating or other service attribute to be modified within the group. Network backend 102 receives requests 110 and 112 from respective devices 104 and 106. Network service backend 102 may include various services and functions such as, without limitation, network function (NF) 116A, network exposure function (NEF) 116B, and unstructured supplementary service data (USSD) 116C.
Further, in one embodiment, network backend 102 may include policy controller 114 (e.g., a policy control function (PCF)). Policy controller 114 can maintain any number of policies 118 which can include QoS ratings and the like.
A packet data network (PDN) session for requestor 202 may be first established via a PDN session establishment sequence 218. In some examples, PDN session establishment sequence 218 can include various messages being passed between requestor 202, RAN 206, AMF 208, SMF 210, and PCF 212 as will be understood by a person having ordinary skill in the art. Further, donors 204A-B may also establish PDN sessions via one or more PDN session establishment sequences 218 and the like.
Having established respective PDN sessions for requestor 202 and donors 204A-B, requestor 202 can transmit to USSD 216 a message 2.01 including a supplementary service request in order to create a group for sponsoring increased QoS rates and the like for requestor 202. In response, USSD 216 may transmit to requestor 202 a message 2.02 including an acknowledgement and passkey. Requestor 202 may then provide the received passkey to donors 204A-B. Further, USSD 216 can transmit to NEF 214 a group creation request message 2.03 and NEF 214 may transmit back to USSD 216 an acknowledgement message 2.04. As a result, NEF 214 and USSD 216 will have a record of the created group.
Donor 204A can transmit to USSD 216 a message 2.05 including a sponsorship request and the passkey received by requestor 202 in message 2.02. The sponsorship request message can include further information identifying the group created by USSD 216 via message 2.03. In some examples, the passkey may serve as both group identifier and access code.
USSD 216 may transmit back to donor 204A an acknowledgement message 2.06 and then proceed to transmit to NEF 214 an update message 2.07 for adding donor 204A to the group. NEF 214 can then reciprocate by transmitting an acknowledgement message 2.04 back to USSD 216.
In one embodiment, multiple sponsors may join the group and a donor 204B may participate in a similar call sequence as that above. In particular, donor 204B can transmit to USSD 216 a message 2.09 including a sponsorship request and the passkey, which USSD 216 may respond to by transmitting back to donor 204B an acknowledgement message 2.10. USSD 216 can then transmit to NEF 214 an update message 2.11 for the appropriate group and may receive back from NEF 214 an acknowledgement message 2.12.
NEF 214 may generate cumulative QoS policies by sending a message 2.13 to itself. For example, where donors 204A-B contribute equal portions of QoS rating to requestor 202, the QoS for each of donors 204A-B may be proportionately reduced whereas the QoS rating for requestor 202 may be increased by a sum total of the reductions of the donor 204A-B QoS ratings. The updated policies may be used to provide subscriber profile updates to PCF 212 via message 2.14 from NEF 214 to PCF 212.
Using the provided subscriber profile updates, PCF 212 may update respective QoS rules via message 2.15 sent to itself. SMF 210 can then be notified of the updates by receiving a message 2.16 from PCF 212. Further, SMF 210 can transmit to requestor 202 a message 2.17 to provide it with notifications of bearer QoS modifications (e.g., increased QoS for a dedicated bearer enabling, for example, VoIP service and the like).
In one embodiment, NEF 214 can maintain an internal limitation on the QoS modifications in order to reset the QoS policies by sending message 2.18 to itself. For example, NEF 214 may track time and only allow QoS modifications to exist for a certain duration, or NEF 214 may track total data usage and thus reset the QoS modifications once requestor 202 has utilized a certain amount of data at the modified QoS level, or other such variations as will be apparent to a person having ordinary skill in the art. Accordingly, NEF 214 may transmit to PCF 212 a message 2.19 to update the respective QoS profile (e.g., resetting each back to a pre-modification level). PCF 212 can then transmit a message 2.20 to SMF 210 in order to notify SMF 210 of the modifications (e.g., reset policies and the like).
A sponsorship request may first be received by, for example, NEF 116B (operation 302). In one embodiment, the request may be provided by a requesting member via, for example, user device 104 and the like. Further, the sponsorship request may identify a sponsoring member and time duration.
A sponsor group can be generated and associated with the sponsoring member and the requesting member (operation 304). In one embodiment, the sponsor group can be generated by NEF 116B. In another embodiment, the sponsor group can be provided to NEF 116B by, for example, USSD 116C and the like.
The sponsoring member may then receive an activation key (operation 306). In one embodiment, the activation key may be provided first to the requesting member who can then provide the key to one or more sponsoring members over, for example, email, text message, and the like as will be apparent to a person having ordinary skill in the art. In another embodiment, the sponsoring member may automatically receive the activation key based on the identification of the sponsoring member included in the sponsorship request.
The sponsoring member can provide the activation key to, for example, NEF 116B via user device 106 (operation 308). In response, QoS for the requesting member can be increased and QoS for the sponsoring member can be decreased in proportion to the increase of QoS (operation 310). In one embodiment, modifications to QoS can be performed for every member of the sponsor group. Further, in some examples, the sponsor group can include other information used for the modifications to QoS such as, for example and without imputing limitation, a time based on the time included in the sponsorship request and the like.
In one embodiment, when an amount of time equal to the time included in the sponsorship request has passed, QoS for the sponsoring member and the requesting member may be respectively reset (operation 312).
Although the system shown in
Regardless of the network device's configuration, it may employ one or more memories or memory modules (including memory 406) configured to store program instructions for the general-purpose network operations and mechanisms for roaming, route optimization and routing functions described herein. The program instructions may control the operation of an operating system and/or one or more applications, for example. The memory or memories may also be configured to store tables such as mobility binding, registration, and association tables, etc. Memory 406 could also hold various software containers and virtualized execution environments and data.
The network device 400 can also include an application-specific integrated circuit (ASIC), which can be configured to perform routing, switching, and/or other operations. The ASIC can communicate with other components in the network device 400 via the connection 410, to exchange data and signals and coordinate various types of operations by the network device 400, such as routing, switching, and/or data storage operations, for example.
To enable user interaction with the computing device 500, an input device 545 can represent any number of input mechanisms, such as a microphone for speech, a touch-sensitive screen for gesture or graphical input, keyboard, mouse, motion input, speech and so forth. An output device 535 can also be one or more of a number of output mechanisms known to those of skill in the art. In some instances, multimodal systems can enable a user to provide multiple types of input to communicate with the computing device 500. The communications interface 540 can generally govern and manage the user input and system output. There is no restriction on operating on any particular hardware arrangement and therefore the basic features here may easily be substituted for improved hardware or firmware arrangements as they are developed.
Storage device 530 is a non-volatile memory and can be a hard disk or other types of computer readable media which can store data that are accessible by a computer, such as magnetic cassettes, flash memory cards, solid state memory devices, digital versatile disks, cartridges, random access memories (RAMs) 525, read only memory (ROM) 520, and hybrids thereof.
The storage device 530 can include services 532, 534, 536 for controlling the processor 510. Other hardware or software modules are contemplated. The storage device 530 can be connected to the system connection 505. In one aspect, a hardware module that performs a particular function can include the software component stored in a computer-readable medium in connection with the necessary hardware components, such as the processor 510, connection 505, output device 535, and so forth, to carry out the function.
For clarity of explanation, in some instances the present technology may be presented as including individual functional blocks including functional blocks comprising devices, device components, steps or routines in a method embodied in software, or combinations of hardware and software.
In some embodiments the computer-readable storage devices, mediums, and memories can include a cable or wireless signal containing a bit stream and the like. However, when mentioned, non-transitory computer-readable storage media expressly exclude media such as energy, carrier signals, electromagnetic waves, and signals per se.
Methods according to the above-described examples can be implemented using computer-executable instructions that are stored or otherwise available from computer readable media. Such instructions can comprise, for example, instructions and data which cause or otherwise configure a general purpose computer, special purpose computer, or special purpose processing device to perform a certain function or group of functions. Portions of computer resources used can be accessible over a network. The computer executable instructions may be, for example, binaries, intermediate format instructions such as assembly language, firmware, or source code. Examples of computer-readable media that may be used to store instructions, information used, and/or information created during methods according to described examples include magnetic or optical disks, flash memory, USB devices provided with non-volatile memory, networked storage devices, and so on.
Devices implementing methods according to these disclosures can comprise hardware, firmware and/or software, and can take any of a variety of form factors. Typical examples of such form factors include laptops, smart phones, small form factor personal computers, personal digital assistants, rackmount devices, standalone devices, and so on. Functionality described herein also can be embodied in peripherals or add-in cards. Such functionality can also be implemented on a circuit board among different chips or different processes executing in a single device, by way of further example.
The instructions, media for conveying such instructions, computing resources for executing them, and other structures for supporting such computing resources are means for providing the functions described in these disclosures.
Although a variety of examples and other information was used to explain aspects within the scope of the appended claims, no limitation of the claims should be implied based on particular features or arrangements in such examples, as one of ordinary skill would be able to use these examples to derive a wide variety of implementations. Further and although some subject matter may have been described in language specific to examples of structural features and/or method steps, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to these described features or acts. For example, such functionality can be distributed differently or performed in components other than those identified herein. Rather, the described features and steps are disclosed as examples of components of systems and methods within the scope of the appended claims.
Claim language reciting “at least one of” refers to at least one of a set and indicates that one member of the set or multiple members of the set satisfy the claim. For example, claim language reciting “at least one of A and B” means A, B, or A and B.
Number | Name | Date | Kind |
---|---|---|---|
4236068 | Walton | Nov 1980 | A |
5642303 | Small et al. | Jun 1997 | A |
5751223 | Turner | May 1998 | A |
6812824 | Goldinger et al. | Nov 2004 | B1 |
D552603 | Tierney | Oct 2007 | S |
7573862 | Chambers et al. | Aug 2009 | B2 |
D637569 | Desai et al. | May 2011 | S |
7975262 | Cozmei | Jul 2011 | B2 |
8010079 | Mia et al. | Aug 2011 | B2 |
8102814 | Rahman et al. | Jan 2012 | B2 |
8260320 | Herz | Sep 2012 | B2 |
8284748 | Borghei | Oct 2012 | B2 |
8300594 | Bernier et al. | Oct 2012 | B1 |
8325626 | Tóth et al. | Dec 2012 | B2 |
8396485 | Grainger et al. | Mar 2013 | B2 |
8446899 | Lei et al. | May 2013 | B2 |
8457145 | Zimmerman et al. | Jun 2013 | B2 |
8458184 | Dorogusker et al. | Jun 2013 | B2 |
D691636 | Bunton | Oct 2013 | S |
8549638 | Aziz | Oct 2013 | B2 |
8553634 | Chun et al. | Oct 2013 | B2 |
8644301 | Tamhankar et al. | Feb 2014 | B2 |
8650279 | Mehta et al. | Feb 2014 | B2 |
8669902 | Pandey et al. | Mar 2014 | B2 |
8676182 | Bell et al. | Mar 2014 | B2 |
8682279 | Rudolf et al. | Mar 2014 | B2 |
8693367 | Chowdhury et al. | Apr 2014 | B2 |
8718644 | Thomas et al. | May 2014 | B2 |
8761174 | Jing et al. | Jun 2014 | B2 |
8768389 | Nenner et al. | Jul 2014 | B2 |
8849283 | Rudolf et al. | Sep 2014 | B2 |
8909698 | Parmar et al. | Dec 2014 | B2 |
8958318 | Hastwell et al. | Feb 2015 | B1 |
9060352 | Chan et al. | Jun 2015 | B2 |
9130859 | Knappe | Sep 2015 | B1 |
9173084 | Foskett | Oct 2015 | B1 |
9173158 | Varma | Oct 2015 | B2 |
D744464 | Snyder et al. | Dec 2015 | S |
9270709 | Shatzkamer et al. | Feb 2016 | B2 |
9271216 | Friman et al. | Feb 2016 | B2 |
9281955 | Moreno et al. | Mar 2016 | B2 |
D757424 | Phillips et al. | May 2016 | S |
D759639 | Moon et al. | Jun 2016 | S |
9369387 | Filsfils et al. | Jun 2016 | B2 |
9389992 | Gataullin et al. | Jul 2016 | B2 |
9426305 | De Foy et al. | Aug 2016 | B2 |
D767548 | Snyder et al. | Sep 2016 | S |
9467918 | Kwan | Oct 2016 | B1 |
D776634 | Lee et al. | Jan 2017 | S |
9544337 | Eswara et al. | Jan 2017 | B2 |
9569771 | Lesavich et al. | Feb 2017 | B2 |
9609504 | Karlqvist et al. | Mar 2017 | B2 |
9615268 | Navarro et al. | Apr 2017 | B2 |
9634952 | Gopinathan et al. | Apr 2017 | B2 |
9642167 | Snyder et al. | May 2017 | B1 |
9654344 | Chan et al. | May 2017 | B2 |
9712444 | Bolshinsky et al. | Jul 2017 | B1 |
9713114 | Yu | Jul 2017 | B2 |
9736056 | Vasseur et al. | Aug 2017 | B2 |
9762683 | Karampurwala et al. | Sep 2017 | B2 |
9772927 | Gounares et al. | Sep 2017 | B2 |
9820105 | Snyder et al. | Nov 2017 | B2 |
D804450 | Speil et al. | Dec 2017 | S |
9858559 | Raleigh et al. | Jan 2018 | B2 |
9860151 | Ganichev et al. | Jan 2018 | B2 |
9933224 | Dumitriu et al. | Feb 2018 | B2 |
9923780 | Rao et al. | Mar 2018 | B2 |
9961560 | Farkas et al. | May 2018 | B2 |
9967191 | Frost et al. | May 2018 | B2 |
9967906 | Verkaik et al. | May 2018 | B2 |
9980220 | Snyder et al. | May 2018 | B2 |
9985837 | Rao et al. | May 2018 | B2 |
9998368 | Chen et al. | Jun 2018 | B2 |
20020026525 | Armitage | Feb 2002 | A1 |
20030087645 | Kim et al. | May 2003 | A1 |
20030116634 | Tanaka | Jun 2003 | A1 |
20040203572 | Aerrabotu et al. | Oct 2004 | A1 |
20050090225 | Muehleisen et al. | Apr 2005 | A1 |
20050147050 | Klink | Jul 2005 | A1 |
20050169193 | Black et al. | Aug 2005 | A1 |
20050186904 | Kowalski et al. | Aug 2005 | A1 |
20060022815 | Fischer et al. | Feb 2006 | A1 |
20060030290 | Rudolf et al. | Feb 2006 | A1 |
20060092964 | Park et al. | May 2006 | A1 |
20060126882 | Deng et al. | Jun 2006 | A1 |
20060187866 | Werb et al. | Aug 2006 | A1 |
20070037605 | Logan | Feb 2007 | A1 |
20070239854 | Janakiraman et al. | Oct 2007 | A1 |
20080037715 | Prozeniuk et al. | Feb 2008 | A1 |
20080084888 | Yadav et al. | Apr 2008 | A1 |
20080101381 | Sun et al. | May 2008 | A1 |
20080138084 | Youn et al. | Jun 2008 | A1 |
20080163207 | Reumann et al. | Jul 2008 | A1 |
20080233969 | Mergen | Sep 2008 | A1 |
20090129389 | Halna DeFretay et al. | May 2009 | A1 |
20090203370 | Giles et al. | Aug 2009 | A1 |
20090282048 | Ransom et al. | Nov 2009 | A1 |
20090298511 | Paulson | Dec 2009 | A1 |
20090307485 | Weniger et al. | Dec 2009 | A1 |
20100039280 | Holm et al. | Feb 2010 | A1 |
20100097969 | De Kimpe et al. | Apr 2010 | A1 |
20110019627 | Krishnaswamy | Jan 2011 | A1 |
20110087799 | Padhye et al. | Apr 2011 | A1 |
20110142053 | Van Der Merwe et al. | Jun 2011 | A1 |
20110182295 | Singh et al. | Jul 2011 | A1 |
20110194553 | Sahin et al. | Aug 2011 | A1 |
20110222412 | Kompella | Sep 2011 | A1 |
20110228779 | Goergen | Sep 2011 | A1 |
20120023552 | Brown et al. | Jan 2012 | A1 |
20120051229 | Feldmann et al. | Mar 2012 | A1 |
20120054367 | Ramakrishnan et al. | Mar 2012 | A1 |
20120088476 | Greenfield | Apr 2012 | A1 |
20120115512 | Grainger et al. | May 2012 | A1 |
20120157126 | Rekimoto | Jun 2012 | A1 |
20120167207 | Beckley et al. | Jun 2012 | A1 |
20120182147 | Forster | Jul 2012 | A1 |
20120311127 | Kandula et al. | Dec 2012 | A1 |
20120324035 | Cantu et al. | Dec 2012 | A1 |
20130010600 | Jocha et al. | Jan 2013 | A1 |
20130029685 | Moshfeghi | Jan 2013 | A1 |
20130039391 | Skarp | Feb 2013 | A1 |
20130057435 | Kim | Mar 2013 | A1 |
20130077612 | Khorami | Mar 2013 | A1 |
20130088983 | Pragada et al. | Apr 2013 | A1 |
20130107853 | Pettus et al. | May 2013 | A1 |
20130108263 | Srinivas et al. | May 2013 | A1 |
20130115916 | Herz | May 2013 | A1 |
20130128749 | Krzanowski et al. | May 2013 | A1 |
20130145008 | Kannan et al. | Jun 2013 | A1 |
20130155906 | Nachum et al. | Jun 2013 | A1 |
20130191567 | Rofougaran et al. | Jul 2013 | A1 |
20130203445 | Grainger et al. | Aug 2013 | A1 |
20130217332 | Altman et al. | Aug 2013 | A1 |
20130232433 | Krajec et al. | Sep 2013 | A1 |
20130273938 | Ng et al. | Oct 2013 | A1 |
20130317944 | Huang et al. | Nov 2013 | A1 |
20130322438 | Gospodarek et al. | Dec 2013 | A1 |
20130343198 | Chhabra et al. | Dec 2013 | A1 |
20130347103 | Veteikis et al. | Dec 2013 | A1 |
20140007089 | Bosch et al. | Jan 2014 | A1 |
20140016926 | Soto et al. | Jan 2014 | A1 |
20140025770 | Warfield et al. | Jan 2014 | A1 |
20140052508 | Pandey et al. | Feb 2014 | A1 |
20140059655 | Beckley et al. | Feb 2014 | A1 |
20140086253 | Yong | Mar 2014 | A1 |
20140087693 | Walby et al. | Mar 2014 | A1 |
20140105213 | A K et al. | Apr 2014 | A1 |
20140118113 | Kaushik et al. | May 2014 | A1 |
20140148196 | Bassan-Eskenazi et al. | May 2014 | A1 |
20140177638 | Bragg et al. | Jun 2014 | A1 |
20140179352 | V.M. et al. | Jun 2014 | A1 |
20140191868 | Ortiz et al. | Jul 2014 | A1 |
20140198808 | Zhou | Jul 2014 | A1 |
20140222997 | Mermoud et al. | Aug 2014 | A1 |
20140233460 | Pettus et al. | Aug 2014 | A1 |
20140269321 | Kamble et al. | Sep 2014 | A1 |
20140280834 | Medved et al. | Sep 2014 | A1 |
20140302869 | Rosenbaum et al. | Oct 2014 | A1 |
20140337824 | St. John et al. | Nov 2014 | A1 |
20140341568 | Zhang et al. | Nov 2014 | A1 |
20150011182 | Goldner | Jan 2015 | A1 |
20150016245 | Ra et al. | Jan 2015 | A1 |
20150016286 | Ganichev et al. | Jan 2015 | A1 |
20150016469 | Ganichev et al. | Jan 2015 | A1 |
20150023176 | Korja et al. | Jan 2015 | A1 |
20150030024 | Venkataswami et al. | Jan 2015 | A1 |
20150043581 | Devireddy et al. | Feb 2015 | A1 |
20150063166 | Sif et al. | Mar 2015 | A1 |
20150065161 | Ganesh et al. | Mar 2015 | A1 |
20150087330 | Prechner et al. | Mar 2015 | A1 |
20150103818 | Kuhn et al. | Apr 2015 | A1 |
20150163192 | Jain et al. | Jun 2015 | A1 |
20150172391 | Kasslin et al. | Jun 2015 | A1 |
20150223337 | Steinmacher-Burow | Aug 2015 | A1 |
20150256972 | Markhovsky et al. | Sep 2015 | A1 |
20150264519 | Mirzaei et al. | Sep 2015 | A1 |
20150280827 | Adiletta et al. | Oct 2015 | A1 |
20150288410 | Adiletta et al. | Oct 2015 | A1 |
20150326469 | Kern et al. | Nov 2015 | A1 |
20150326704 | Ko et al. | Nov 2015 | A1 |
20150358777 | Gupta | Dec 2015 | A1 |
20150362581 | Friedman et al. | Dec 2015 | A1 |
20150365288 | Van Der Merwe et al. | Dec 2015 | A1 |
20160007315 | Lundgreen et al. | Jan 2016 | A1 |
20160021597 | Hart et al. | Jan 2016 | A1 |
20160044627 | Aggarwal et al. | Feb 2016 | A1 |
20160099847 | Melander et al. | Apr 2016 | A1 |
20160100395 | Xu et al. | Apr 2016 | A1 |
20160105408 | Cooper et al. | Apr 2016 | A1 |
20160127875 | Zampini, II | May 2016 | A1 |
20160146495 | Malve et al. | May 2016 | A1 |
20160330045 | Tang et al. | Nov 2016 | A1 |
20160344641 | Javidi et al. | Nov 2016 | A1 |
20170026974 | Dey et al. | Jan 2017 | A1 |
20170104660 | Wexler et al. | Apr 2017 | A1 |
20170111209 | Ward et al. | Apr 2017 | A1 |
20170195205 | Li et al. | Jul 2017 | A1 |
20170202000 | Fu et al. | Jul 2017 | A1 |
20170214551 | Chan et al. | Jul 2017 | A1 |
20170250907 | Pignataro et al. | Aug 2017 | A1 |
20170317997 | Smith et al. | Nov 2017 | A1 |
20170324622 | Ubaldi et al. | Nov 2017 | A1 |
20170324651 | Penno et al. | Nov 2017 | A1 |
20170332421 | Sternberg et al. | Nov 2017 | A1 |
20170339706 | Andreoli-Fang et al. | Nov 2017 | A1 |
20170366456 | Dara et al. | Dec 2017 | A1 |
20180013669 | Bardhan et al. | Jan 2018 | A1 |
20180062991 | Nainar et al. | Mar 2018 | A1 |
20180063018 | Bosch et al. | Mar 2018 | A1 |
20180069311 | Pallas et al. | Mar 2018 | A1 |
20180084389 | Snyder et al. | Mar 2018 | A1 |
20180176134 | Pignataro et al. | Jun 2018 | A1 |
20180278510 | Iqbal et al. | Sep 2018 | A1 |
20180278548 | Pignataro et al. | Sep 2018 | A1 |
Number | Date | Country |
---|---|---|
WO 2013020126 | Feb 2013 | WO |
WO 2014098556 | Jun 2014 | WO |
WO 2015131920 | Sep 2015 | WO |
WO 2017078657 | May 2017 | WO |
WO 2017187011 | Nov 2017 | WO |
WO 2018009340 | Jan 2018 | WO |
WO 2018028777 | Feb 2018 | WO |
WO 2018053271 | Mar 2018 | WO |
WO 2018066362 | Apr 2018 | WO |
Entry |
---|
Cox et al., “Advancing Software-Defined Networks: A Survey,” IEEE, Oct. 12, 2017, pp. 1-40. |
Afolabi et al., “Network Slicing & Softwarization: A Survey on Principles, Enabling Technologies & Solutions,” mosaic-lab.org, pp. 1-24. |
“I Love WiFi, the difference between L2 and L3 Roaming Events,” Apr. 1, 2010, 6 pages. |
Antonioli, Roberto, et al., “Dual Connectivity for LTE-NR Cellular Networks,” Research Gate, Sep. 3-6, 2017, pp. 171-175. |
Carter, Steve Sr., “E911 VoIP Essentials for Enterprise Deployments,” XO Communications, LLC, 2012, 9 pages. |
Chalise, Batu K., et al., “MIMO Relaying for Multiaccess Communication in Cellular Networks,” Sensor Array and MultiChannel Signal Processing Workshop, 2008, SAM 2008, 5th IEEE, Jul. 21, 2008, pp. 146-150. |
Cisco ASR 5×00 Mobility Management Entity Administration Guide, Version 15.0, Last updated Jun. 13, 2014, Cisco, 1-266. |
Cisco Systems, Inc., “Wi-FI Location-Based Services 4.1 Design Guide,” May 20, 2008, 206 pages. |
Cui, Wenzhi et al., “DiFS: Distributed Flow Scheduling for Data Center Networks,” Nanjing University, China, Jul. 28, 2013, 10 pages. |
Galvan T., Carlos E., et al., “Wifi bluetooth based combined positioning algorithm,” International Meeting of Electrical Engineering Research ENIINVIE 2012, Procedia Engineering 35 (2012 ), pp. 101-108. |
Geller, Michael, et al. , “5G Security Innovation with Cisco,” Whitepaper Cisco Public, Jun. 8, 2018, pp. 1-29. |
Gesbert, David, “Advances in Multiuser MIMO Systems (Tutorial Part II) Emerging Topics in Multiuser MIMO Networks,” IEEE PIMRC Conference, Sep. 2007, 107 pages. |
Halperin, Daniel, et al., “Augmenting Data Center Networks with Multi-Gigabit Wireless Links,” Aug. 15-19, 2011, SIGCOMM'11, ACM 978-1-4503-0797-0/11/08, pp. 38-49. |
Ji, Philip N., et al., “Demonstration of High-Speed MIMO OFDM Flexible Bandwidth Data Center Network,” Optical Society of America, 2012, 2 pages. |
Kandula, Srikanth, et al., “Flyways to De-Congest Data Center Networks,” Microsoft Research, Oct. 23, 2009, 6 pages. |
Katayama, Y. et al., “MIMO Link Design Strategy for Wireless Data Center Applications,” IEEE Wireless Communications and Networking Conference: Services, Applications, and Business, 2012, 5 pages. |
Leary, Jonathan, et al., “Wireless LAN Fundamentals: Mobility,” Jan. 9, 2004, Cisco Press, 15 pages. |
Network Heresy, “NVGRE, VXLAN and What Microsoft is Doing Right,” Oct. 3, 2011, 5 pages. |
Saraiva de Sousa, Nathan F., et al., “Network Service Orchestration: A Survey,” IEEE Communications Surveys & Tutorials, Mar. 23, 2018, pp. 1-30. |
Savvides, Andreas, et al., “Dynamic Fine-Grained Localization in Ad-Hoc Networks of Sensors”, Proceeding MobiCom '01 Proceedings of the 7th annual international conference on Mobile computing and networking, Jul. 2001, pp. 166-179. |
Ventre, Pier Luigi, et al., “Performance Evaluation and Tuning of Virtual Infrastructure Managers for (Micro) Virtual Network Functions,” ieee.org, Nov. 7-10, 2016, pp. 1-7. |
“Cisco ASR 5×00 Mobility Management Entity Administration Guide,” Version 15.0, Cisco Systems, Inc., Last updated Jun. 13, 2014, pp. 1-266. |
“Quality of Service Regulation Manual,” ITU 2017, pp. 1-174. |
“Cisco 10000 Series Router Quality of Service Configuration Guide, Chapter 20: Configuring Quality of Service for MPLS Traffic,” Cisco Systems, Inc., Updated Nov. 17, 2013, pp. 1-34. |
“Enterprise Mobility 7.3 Design Guide, Chapter 11: CISCO Mobility Services Engine,” Cisco Systems, Inc., Updated Apr. 20, 2015, 8 pages. |
Afolabi, Ibrahim, et al., “Network Slicing & Softwarization: A Survey on Principles, Enabling Technologies & Solutions,” Mar. 21, 2018, pp. 1-24. |
Ali, Z., et al., “Performance Measurement in Segment Routing Networks with IPv6 Data Plane (SRv6),” Spring Working Group, Feb. 26, 2018, pp. 1-17. |
An, Xueli, et al., “Virtualization of Cellular Network EPC Gateways based on a Scalable SDN Architecture,” IEEE, Feb. 12, 2015, pp. 1-7. |
Bekan, Adnan, et al., “D5.1: Machine Learning Algorithms Development and Implementation,” 2016-2018 eWINE Consortium, 23, 2016, pp. 1-72. |
Bogale, Tadilo Endeshaw, et al., “Machine Intelligence Techniques for Next-Generation Context-Aware Wireless Networks,” arxiv.org, Jan. 12, 2018, pp. 1-10. |
Cheng, W., et al., “Path Segment in MPLS Based Sement Routing Network,” Network Working Group, Oct. 2017, pp. 1-10. |
Christidis, Konstantinos, et al., “Blockchains and Smart Contracts for the Internet of Things,” IEEE Access, Special Section on the of Research in Internet of Things (loT), vol. 4, May 10, 2016, pp. 1-12. |
de Sousa, Nathan F. Saraiva, et al., “Network Service Orchestration: A Survey,” IEEE Communications Surveys & Tutorials, Mar. 23, 2018, pp. 1-30. |
Doyle, Matthew G., “An IP Address Management Solution for a Server Solution Provider,” A Dissertation Submitted to The University of Liverpool, Sep. 28, 2005, 116 pages. |
Herb, Daniel, et al., “ROAUM: How to Unblock ROAMING loT Using BLockchain,” https://uploads-ssl.webflow.com/5987a08baeea4300016b7bd9/5a7a6d6cee5bc400010a08f2_Roaum_Roaming-loT_Whitepaper.pdf, pp. 1-14. |
Hsieh, Cynthia, “Location Awareness in VMware View 4.5 and Above,” VMware, 2011, 8 pages. |
Husain, Syed, et al., “Mobile Edge Computing with Network Resource Slicing for Internet-of-Things,” IEEE 2017, pp. 1-7. |
Jero, Samuel, et al., “Identifier Binding Attacks and Defenses in Software-Defined Networks,” USENIX, The Advanced Computing Systems Association, Aug. 16-18, 2017, 19 pages. |
Leonhardt, Ulf, “Supporting Location-Awareness in Open Distributed Systems,” May 1998, 186 pages. |
Morozov, Yury, “Blockchain Telecom: Bubbletone Blockchain,” Dec. 29, 2017, pp. 1-33. |
Norwegian National Security Authority, “N-03 Security guidance for switches and routers,” Sep. 26, 2012, pp. 1-24. |
Shwetha, D., et al.,“A Bandwidth Request Mechanism for QoS Enhancement in Mobile WiMAX Networks,” International Journal of Advanced Research in Electrical Electronics and Instrumentation Engineering, vol. 3, Issue 1, Jan. 2014, pp. 1-8. |
Sun, et al., “The future of Wi-Fi,” IEEE Communications Magazine, vol. 52, No. 11, Nov. 21, 2014, 166 pages. |
Wright, Joshua, “Detecting Wireless LAN MAC Address Spoofing,” Jan. 21, 2003, pp. 1-20. |
Zickau, Sebastian, et al., “Enabling Location-based Policies in a Healthcare Cloud Computing Environment,” 2014 IEEE 3rd International Conference on Cloud Networking (Cloudnet), Oct. 2014, pp. 353-358. |