Search

US-20260129565-A1 - METHOD AND APPARATUS FOR SERVICE-AWARE AND APPLICATION-AWARE BAND AND NETWORK SLICING SELECTIONS

US20260129565A1US 20260129565 A1US20260129565 A1US 20260129565A1US-20260129565-A1

Abstract

Aspects of the subject disclosure may include, for example, receiving messaging indicating a subscription to a communication service from an end user device; obtaining an RFSP value from a network database where the RFSP value is selected from among a group of RFSP values based on the communication service; and providing the RFSP value to the end user device for a priority order for scanning frequencies. Another example includes generating unique identifiers corresponding to different applications and/or different features of an application being executed (e.g., via browser(s)) of the end user device; and selecting traffic descriptors according to the unique identifiers which can be used in conjunction with URSP rules to utilize different network slices for communication services for the end user device. Other embodiments are disclosed.

Inventors

  • Prashant Raghuvanshi
  • Richard T. Kwapniewski

Assignees

  • AT&T INTELLECTUAL PROPERTY I, L.P.
  • AT&T MOBILITY II LLC

Dates

Publication Date
20260507
Application Date
20241105

Claims (20)

  1. 1 . A non-transitory machine-readable medium, comprising executable instructions that, when executed by a processing system including a processor of an end user device, facilitate performance of operations, the operations comprising: generating a first unique identifier corresponding to a first feature of an application executed by the end user device; selecting a first traffic descriptor according to the first unique identifier; generating a second unique identifier corresponding to a second feature of the application; and selecting a second traffic descriptor according to the second unique identifier, wherein the first and second traffic descriptors are used in conjunction with UE Route Selection Policy (URSP) rules to utilize one or more network slices for communication services associated with the first and second features of the application.
  2. 2 . The non-transitory machine-readable medium of claim 1 , wherein the operations further comprise accessing an Application Programming Interface (API), wherein the generating of the first and second unique identifiers is based on information available to the end user device via the API.
  3. 3 . The non-transitory machine-readable medium of claim 1 , wherein the operations further comprise applying an Artificial Intelligence (AI) model to information associated with the first and second features for the selecting of the first and second unique identifiers.
  4. 4 . The non-transitory machine-readable medium of claim 1 , wherein the operations further comprise accessing a stored identifier table, wherein the generating of the first and second unique identifiers is based on information in the stored identifier table.
  5. 5 . The non-transitory machine-readable medium of claim 1 , wherein the first feature is selected from among voice, video, or messaging.
  6. 6 . The non-transitory machine-readable medium of claim 1 , wherein the application is a first application that is being executed via a first browser, and wherein the operations further comprise: generating a third unique identifier corresponding to a third feature of a second application executed by the end user device via a second browser; and selecting a third traffic descriptor according to the third unique identifier, wherein the third traffic descriptor is used in conjunction with the URSP rules to utilize one or more network slices for communication services associated with the third feature of the second application.
  7. 7 . The non-transitory machine-readable medium of claim 6 , wherein the application is a first application that is being executed via a first browser, and wherein the operations further comprise: generating a fourth unique identifier corresponding to a fourth feature of the second application; and selecting a fourth traffic descriptor according to the fourth unique identifier, wherein the fourth traffic descriptor is used in conjunction with the URSP rules to utilize one or more network slices for communication services associated with the fourth feature of the second application.
  8. 8 . An end user device, comprising: a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations, the operations comprising: generating unique identifiers corresponding to different applications being executed via browsers of the end user device; and selecting traffic descriptors according to the unique identifiers, wherein the traffic descriptors are used in conjunction with UE Route Selection Policy (URSP) rules to utilize different network slices for communication services associated with the different applications.
  9. 9 . The end user device of claim 8 , wherein the operations further comprise accessing an Application Programming Interface (API), wherein the generating of unique identifiers is based on information available to the end user device via the API.
  10. 10 . The end user device of claim 8 , wherein the operations further comprise applying an Artificial Intelligence (AI) model to information associated with features of the different applications for the selecting of the unique identifiers.
  11. 11 . The end user device of claim 8 , wherein the operations further comprise accessing a stored identifier table, wherein the generating of the unique identifiers is based on information in the stored identifier table.
  12. 12 . The end user device of claim 8 , wherein the different applications include features associated with voice, video, messaging, or a combination thereof.
  13. 13 . The end user device of claim 8 , wherein a first application of the different applications has multiple unique identifiers corresponding to different features of the first application.
  14. 14 . The end user device of claim 13 , wherein the different features include at least two of voice, video, or messaging.
  15. 15 . A method, comprising: receiving, by a processing system including a processor, a first message indicating a subscription to a first communication service, the first message being received from an end user device; obtaining, by the processing system, a first Radio Frequency Selection Priority (RFSP) value from a network database, wherein the first RFSP value is selected from among a group of RFSP values available to the end user device based on the first communication service, wherein the group of RFSP values are mapped to different communication services that include the first communication service; and providing, by the processing system, the first RFSP value to the end user device to cause the end user device to scan frequencies according to the first RFSP to provide the first communication service.
  16. 16 . The method of claim 15 , comprising: receiving, by the processing system, a second message indicating another subscription to a second communication service, the second message being received from the end user device; obtaining, by the processing system, a second RFSP value from the network database, wherein the second RFSP value is selected from among the group of RFSP values available to the end user device based on the second communication service, wherein the different communication services mapped to the group of RFSP values include the second communication service; and providing, by the processing system, the second RFSP value to the end user device to cause the end user device to scan frequencies according to the second RFSP to provide the second communication service.
  17. 17 . The method of claim 16 , wherein the processing system operates as an Access and Mobility Management Function (AMF).
  18. 18 . The method of claim 16 , wherein the network database operates as a Unified Data Repository (UDR).
  19. 19 . The method of claim 16 , wherein one or more RFSP values of the group of RFSP values are dynamically adjusted based on network conditions.
  20. 20 . The method of claim 16 , wherein the first communication service is associated with a public safety service, and wherein the first communication service is being requested in a visited jurisdiction that utilizes a different frequency band for the public safety service as compared to a local jurisdiction associated with the end user device.

Description

FIELD OF THE DISCLOSURE The subject disclosure relates to a method and apparatus for service-aware and application-aware band and network slicing selections. BACKGROUND Different Radio Frequencies (RF) can provide different service characteristics for communication services. Network operators can have access to specific low, mid, and/or high band frequencies. Certain services work well in one RF frequency versus another. As countries develop, they seek to improve or adopt a dedicated public safety mobile network, such as FirstNet in the United States, which has been the frontrunner in expanding the public safety needs and has since been built out as a purpose-built network. Today, if another country were to build the same network, it would need to start from scratch and this will lead to long lead times. Additionally, in current wireless communication networks, user devices connect to the network by scanning available frequencies based on a predefined priority order. This static priority order results in different services utilizing the same frequency, which can lead to potential congestion and inefficient use of spectrum resources. For example, public safety networks require dedicated frequencies to ensure reliable and low-latency communication for services. Current systems do not differentiate between various types of services when assigning frequencies, causing services to share bandwidth with less important applications. This can degrade the quality of service for particular applications, which require higher priority and dedicated resources. Further, in current network environments, users access and manage network resources through mobile devices, creating customized network configurations for specific purposes. This capability can lead to more efficient use of network resources, improved performance, and tailored experiences for various applications and services. One existing feature enables the allocation of multiple configurations to a single mobile device and assigns configurations to particular applications based on specific rules. These rules consist of route descriptors such as Data Network Name (DNN) or Operating System specific Application Identifier (OSAppID). Current policies support providing a specific configuration based on a network connection indicator. This indicator is provided to the mobile OS, which interacts with the network to assign a configuration to a particular application set, such as low latency or high bandwidth application categories. However, this approach has limitations. Many users perform different actions using mobile browsers rather than downloading separate applications for each service. Additionally, a single application with multiple subfunctions or features receives one configuration, which may not be optimal for different features, such as voice, video, and messaging services. Furthermore, current solutions do not address scenarios where users access services through mobile browsers, potentially bypassing network policies intended for specific applications. BRIEF DESCRIPTION OF THE DRAWINGS Reference will now be made to the accompanying drawings, which are not necessarily drawn to scale, and wherein: FIG. 1 is a block diagram illustrating an exemplary, non-limiting embodiment of a communications network in accordance with various aspects described herein. FIG. 2A is a block diagram illustrating an example, non-limiting embodiment of a system functioning within the communication network of FIG. 1 in accordance with various aspects described herein. FIG. 2B is a block diagram illustrating an example, non-limiting embodiment of a data flow functioning within the communication network of FIG. 1 in accordance with various aspects described herein. FIG. 2C is a block diagram illustrating an example, non-limiting embodiment of data flow functioning within the communication network of FIG. 1 in accordance with various aspects described herein. FIG. 2D is a block diagram illustrating an example, non-limiting embodiment of a system functioning within the communication network of FIG. 1 in accordance with various aspects described herein. FIG. 2E is a block diagram illustrating an example, non-limiting embodiment of data in an application layer and operating system of an end user device functioning within the communication network of FIG. 1 in accordance with various aspects described herein. FIG. 2F is a block diagram illustrating an example, non-limiting embodiment of a data flow for UE Route Selection Policy management functioning within the communication network of FIG. 1 in accordance with various aspects described herein. FIG. 2G depicts an illustrative embodiment of a method in accordance with various aspects described herein. FIG. 2H depicts an illustrative embodiment of a method in accordance with various aspects described herein. FIG. 3 is a block diagram illustrating an example, non-limiting embodiment of a virtualized communication network in accordance with va