CPC H04W 28/0268 (2013.01) [H04L 12/4633 (2013.01); H04L 47/18 (2013.01); H04L 47/24 (2013.01); H04L 47/245 (2013.01); H04L 47/2425 (2013.01); H04L 47/2475 (2013.01); H04W 4/50 (2018.02); H04W 8/18 (2013.01); H04W 12/102 (2021.01); H04W 28/0252 (2013.01); H04W 28/0284 (2013.01); H04W 28/10 (2013.01); H04W 28/26 (2013.01); H04W 40/12 (2013.01); H04W 40/22 (2013.01); H04W 76/12 (2018.02); H04W 76/15 (2018.02); H04W 76/22 (2018.02); H04W 76/25 (2018.02); H04W 84/02 (2013.01); H04W 88/005 (2013.01); H04W 88/02 (2013.01); H04W 88/08 (2013.01); H04W 88/14 (2013.01); H04W 88/16 (2013.01); H04W 88/18 (2013.01); H04W 92/02 (2013.01); H04W 92/045 (2013.01); H04W 92/06 (2013.01); H04W 92/10 (2013.01); H04W 92/24 (2013.01)] | 7 Claims |
1. A method of providing network slicing, comprising:
establishing, in a multi Radio Access Technology (RAT) network, a first backhaul bearer at a base station with a first core network, the first backhaul bearer having a single priority parameter, the first backhaul bearer terminating at a first packet data network gateway in the first core network, the first backhaul bearer for carrying data from a plurality of UEs attached at the base station to the first core network;
identifying at least one network resource from end to end at a plurality of network nodes throughout a network as belonging to the first backhaul bearer;
establishing an encrypted internet protocol (IP) tunnel between the base station and a coordinating gateway in communication with the first core network and a second core network;
facilitating, for at least one UE attached at a base station, establishment of a plurality of UE data bearers encapsulated in a secure IP tunnel, the plurality of UE data bearers terminating at a second packet data network gateway in the second core network and having a plurality of individual priority parameters for prioritized traffic control at the second core network;
transmitting prioritized data of the plurality of UE data bearers via the first backhaul bearer and the coordinating gateway to the second core network,
thereby enabling a single user to have a group of network resources allocated to that user such that each resource is able to be sliced and enabled to designate portions of resources as belonging to a network slice.
|