白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Instantiating a slice of a 5G or other next generation service network in an underserved area

專利號
US10834776B2
公開日期
2020-11-10
申請人
AT&T Intellectual Property I, L.P.; AT&T Mobility II LLC(US GA Atlanta US GA Atlanta)
發(fā)明人
Sangar Dowlatkhah; Zhi Cui
IPC分類
H04W76/18; H04W4/50; H04W4/08; H04W8/00
技術領域
slice,network,service,or,component,e.g,can,mobile,device,core
地域: GA GA Atlanta

摘要

Techniques for creating a service slice of a network in an underserved area are presented. A vehicle can be associated with a slice component that can generate service slices of a service network for various services. The vehicle can travel to an underserved area that does not have adequate wireless coverage or advance capabilities. For a communication device associated with an entity located in an underserved area, slice component can generate a service slice to connect the communication device to the communication network (and service network), establish a session with the communication device, provide applications, including VNF applications, to the communication device, and communicate information between the communication device and communication network (and service network). If no radio access to the network is available, slice component can continue the session with an internal slice and store information in its service database, which is synced when reconnected to the network.

說明書

RELATED APPLICATION

The subject patent application is a continuation of, and claims priority to, U.S. patent application Ser. No. 16/104,771 (now U.S. Pat. No. 10,499,446), filed Aug. 17, 2018, and entitled “INSTANTIATING A SLICE OF A 5G OR OTHER NEXT GENERATION SERVICE NETWORK IN AN UNDERSERVED AREA,” the entirety of which application is hereby incorporated by reference herein.

TECHNICAL FIELD

The subject disclosure relates generally to communications networks, and, for example, to instantiating a slice of a 5G or other next generation service network in an underserved area.

BACKGROUND

Communication devices, including wearable devices, sensory monitoring devices, and other types of mobile or portable communication devices, can be utilized for a variety of purposes. For example, such communication devices can be utilized in the healthcare industry to monitor conditions of patients, collect information regarding conditions of patients, and communicate such information to hospitals or other healthcare providers. When such communication devices are remotely located from a hospital or other healthcare provider, such communication devices typically have to be connected to a communication network in order to communicate with a communication device of the hospital or other healthcare provider.

The above-described description is merely intended to provide a contextual overview relating to communication devices and communication networks, and is not intended to be exhaustive.

BRIEF DESCRIPTION OF THE DRAWINGS

Various non-limiting embodiments are further described with reference to the accompanying drawings in which:

權利要求

1
What is claimed is:1. A system, comprising:a processor; anda memory that stores executable instructions that, when executed by the processor, facilitate performance of operations, comprising:initiating, via a mobile network device, a wireless communication connection between a device and a network device of a communication network; andgenerating a service slice of a service network associated with the communication network, wherein the service slice and the wireless communication connection are utilized to facilitate generation of a secure communication channel to securely communicate information between the device and a service network device of the service network, and wherein, in accordance with a defined security criterion relating to a service that is provided by the service network, the secure communication channel provides a first level of information communication security that is higher than a second level of information communication security provided by a portion of the communication network that does not include the secure communication channel.2. The system of claim 1, wherein the wireless communication connection is a first wireless communication connection, wherein the mobile network device is located in sufficiently close proximity to the device to enable establishing a second wireless communication connection between the device and the mobile network device, and wherein the first wireless communication connection comprises the second wireless communication connection.3. The system of claim 1, wherein the operations further comprise:generating a core slice of a core network of the communication network, wherein the core slice is associated with the service slice, wherein the service slice and the core slice facilitate the generation of the secure communication channel between the device and the service network device, in accordance with the defined security criterion.4. The system of claim 1, wherein the defined security criterion relates to an information communication security protocol of a group of information communication security protocols comprising a medical-related information communication security protocol, a military-related information communication security protocol, a law enforcement-related information communication security protocol, an agriculture-related information communication security protocol, or a fanning-related information communication security protocol, andwherein the operations further comprise:communicating the information securely between the device and the service network device based on the information communication security protocol.5. The system of claim 1, wherein the operations further comprise:instantiating a virtual network function associated with the service slice and the service to facilitate the secure communication of the information between the device and the service network device.6. The system of claim 1, wherein the operations further comprise:in response to determining that, during a first time period, a communication connection between the device and the network device is not able to be established:establishing a connection portion of the wireless communication connection between the device and the mobile network device; andgenerating an internal service slice of a mobile service network, wherein the internal service slice and the connection portion of the wireless communication connection are utilized to facilitate secure communication of an information portion of the information between the device and a mobile service network device of the mobile service network, in accordance with the defined security criterion.7. The system of claim 6, wherein the operations further comprise:instantiating a virtual network function associated with the internal service slice and the service to facilitate the secure communication of the information portion between the device and the mobile service network device.8. The system of claim 6, wherein the operations further comprise:via the internal service slice, receiving the information portion from the device; andstoring the information portion in a mobile database component associated with the internal service slice and the mobile network device.9. The system of claim 6, wherein the operations further comprise:during a second time period, in response to determining that the wireless communication connection between the device and the network device is able to be established, establishing, via the mobile network device, the wireless communication connection between the device and the network device, wherein the service slice of the service network is generated in connection with the establishing of the wireless communication connection; andcommunicating the information portion between the mobile network device and the service network device to facilitate synchronizing the information portion between the mobile network device and the service network device in connection with the service.10. The system of claim 1, wherein the mobile network device and a slice component, comprising a mobile database component, are associated with a movable component comprising a vehicle or a motorized device, wherein the movable component is operable to move between locations, comprising a first location and a second location, to facilitate moving the mobile network device and the slice component from the first location to the second location to place the mobile network device and the slice component in proximity to the device, wherein, while at the second location, the slice component initiates the wireless communication connection and generates the service slice, and wherein the mobile database component stores an information portion of the information that is associated with the service network, including the service.11. The system of claim 10, wherein the device is located in a third location in proximity to the mobile network device, and wherein, while the device is located in the third location, the network device is not able to provide wireless communication service to the device without utilizing the mobile network device to initiate the wireless communication connection and generate the service slice to facilitate providing the wireless communication service to the device.12. A method, comprising:facilitating, by a system comprising a processor, establishing a wireless connection between a device and a network device via a mobile network device, wherein the network device is part of a communication network; andgenerating, by the system, a service slice of a service network that is associated with the communication network, wherein the service slice and the wireless connection are utilized to facilitate generating a secure communication channel usable to securely communicate data between the device and a service network device of the service network, and wherein, in accordance with a defined security criterion relating to a service that is facilitated by the service network, the secure communication channel provides a first data security level that is higher than a second data security level provided by a portion of the communication network.13. The method of claim 12, wherein the wireless connection is a first wireless connection, and wherein the method further comprises:based on the mobile network device being located within a defined distance of the device, establishing, by the system, a second wireless connection between the device and the mobile network device via the mobile network device, wherein the first wireless connection comprises the second wireless connection.14. The method of claim 12, wherein the defined security criterion relates to a data security protocol of a group of data security protocols comprising a medical-related data security protocol, a military-related data security protocol, a law enforcement-related data security protocol, an agriculture-related data security protocol, or a farming-related data security protocol, and wherein the method further comprises:communicating, by the system, the data securely between the device and the service network device based on the data security protocol.15. The method of claim 12, further comprising:generating, by the system, a core slice of a core network of the communication network, wherein the core slice is associated with the service slice; andbased on the service slice and the core slice, generating, by the system, the secure communication channel between the device and the service network device to facilitate the secure communication of the data between the device and the service network device, in accordance with the defined security criterion.16. The method of claim 12, wherein the data comprises a first data portion of the data and a second data portion of the data, and wherein the method further comprises:facilitating, by the system, communicating, via the secure communication channel, the first data portion of the data from the device to the service network device, wherein the first data portion of the data is stored in a database component of the service network; andfacilitating, by the system, communicating, via the secure communication channel, the second data portion of the data from the service network device to the device.17. The method of claim 12, wherein the data comprises update data associated with the service, and wherein the method further comprises:receiving, by the system, via a first channel portion of the secure communication channel, the update data from the service network device; andcommunicating, by the system, via a second channel portion of the secure communication channel, the update data to the device, wherein the update data relates to a software update associated with the service or a firmware update associated with the service.18. The method of claim 12, further comprising:instantiating, by the system, a virtual network function associated with the service slice and the service to facilitate the secure communication of the data between the device and the service network device.19. A machine-readable storage medium, comprising executable instructions that, when executed by a processor, facilitate performance of operations, comprising:initiating, via a movable network device, a wireless connection between a device and a network device of a communication network; andcreating a slice of a service network, wherein the slice and the wireless connection are usable to create a secure communication pathway to facilitate secure communication of information between the device and a service network device of the service network, wherein, in accordance with a defined security criterion relating to a service that is facilitated by the service network, the secure communication pathway provides a first information security level with respect to the information that is higher than a second information security level provided by a portion of the communication network.20. The machine-readable storage medium of claim 19, wherein the slice is a first slice, and wherein the operations further comprise:creating a second slice of a core network of the communication network, wherein the second slice is associated with the first slice; andbased on the first slice and the second slice, creating the secure communication pathway between the device and the service network device to facilitate the secure communication of the information between the device and the service network device, in accordance with the defined security criterion.
微信群二維碼
意見反饋