Call routing while roaming on a 5G wireless telecommunication network

ABSTRACT

Disclosed is a system and method to route a call from a roaming UE on a 5G network. The system receives from a UE belonging to a home network an indication of a call to a dialed number. The call requires information associated with the UE that is not available to the first wireless telecommunication network, because the UE is roaming on a visitor network. The indication of the call includes a unique identifier of the visitor network. The system can determine based on the unique identifier that the UE is roaming and send a request to the visitor network to provide instructions on how to route the received call. Upon obtaining the instructions on how to route the received call, the system routes the received call.

BACKGROUND

In telecommunications, 5G is the fifth-generation technology standardfor broadband cellular networks, which cellular phone companies begandeploying worldwide in 2019, and is the planned successor to the 4Gnetworks which provide connectivity to most current cellphones. 5Gnetworks are predicted to have more than 1.7 billion subscribersworldwide by 2025, according to the GSM Association. Like itspredecessors, 5G networks are cellular networks, in which the servicearea is divided into small geographical areas called cells. All 5Gwireless devices in a cell are connected to the internet and telephonenetwork by radio waves through a local antenna in the cell. The mainadvantage of the new networks is that they will have greater bandwidth,providing higher download speeds, eventually up to 10 gigabits persecond (Gbit/s). Due to the increased bandwidth, it is expected thenetworks will not only exclusively serve cellphones like existingcellular networks but will also be used as general internet serviceproviders for laptops and desktop computers, competing with existingISPs such as cable internet, and also will make possible newapplications in internet of things (IoT) and machine-to-machine areas.4G cellphones are not able to use the new networks, which require5G-enabled wireless devices.

The current specification for a roaming user equipment (UE) on a 5Gnetwork does not include a mechanism for the home network to understandthe location details of the UE to be able to route the call based onthose location details.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 shows the UE roaming on the second telecommunication network.

FIG. 2 shows some of the network nodes in a 5G wirelesstelecommunication network.

FIG. 3 shows how the call is routed from the visitor network to the homenetwork.

FIG. 4 is a flowchart of a method to route a call from a UE on a 5Gnetwork or higher.

FIG. 5 is a diagrammatic representation of a machine in the example formof a computer system within which a set of instructions, for causing themachine to perform any one or more of the methodologies or modulesdiscussed herein, can be executed.

DETAILED DESCRIPTION

Disclosed here is a system and method to route a location-dependentcall, such as a call to a short code number, from a user equipment (UE)roaming on a 5G network. To route the call, the system can receive fromthe UE belonging to a home wireless telecommunication network to whichthe UE is subscribed, an indication of a call to a telephone number,such as a short code telephone number 211, 311, 411, etc. The UE placingthe call can roam on a visitor wireless telecommunication network.Routing the call can require information about a geographic location ofthe UE, but the location of the UE is not available to the home wirelesstelecommunication network, because the UE is communicating with thevisitor telecommunication network. For example, when a UE calls a shortcode such as 411 from Seattle, and when a UE calls 411 from Palo Alto,the UE is calling two different 10-digit phone numbers. Earliergenerations of wireless telecommunication technologies, such as 4G andlower, enable the home network to route a call that is dependent on thelocation of the UE, but the 5G standard is missing the feature. Thedisclosed system modifies the 5G network to resolve location-specificphone numbers when the UE is roaming. The system can use NRF-to-NRFcommunication, which is part of the 5G standard, to resolvelocation-based phone numbers. The system creates a chain ofcommunication between the home telecommunication network and the visitortelecommunication network, enabling the home telecommunication networkto place the call without knowing the location of the UE.

FIG. 1 shows the UE roaming on the second telecommunication network. TheUE 100 can be a subscriber of the first telecommunication network 110,the home network. The UE 100 can be a cell phone, a vehicle, a personaldigital assistant, wearable device, vehicle or any device connected tothe first telecommunication network 110. However, the UE placing thecall can roam on a second wireless telecommunication network 120, thevisitor network. For example, the UE 100 can be a T-Mobile subscriberthat is using the AT&T network to place the call because T-Mobile doesnot have cell sites in the region where the UE 100 is located. The homenetwork 110 and the visitor network 120 can be 5G wirelesstelecommunication networks or higher.

When the UE 100 is roaming, and the visitor network 120 receives thecall 130, the visitor network 120 sends an indication 140 of the call tothe home network 110. However, completing the call can requireinformation about a location of the UE. For example, the call can be anN11 short code such 211, 311, 411, 511, 611, 711, 811, *210, #210,except 911, whose corresponding 10-digit or 11-digit number, forexample, a translated number, depends on the location of the UE 100. Ina more specific example, if a person dials 511 to seek road and weatherinformation, the call should be routed to the nearest 511 stationcapable of providing local road and weather information. To determinethe nearest 511 station, the home network 110 needs to know the locationof the UE 100.

The location of the UE 100 is not available to the first wirelesstelecommunication network 110 because the UE is communicating with thevisitor telecommunication network 120. The indication 140 of the callsent to the home network 110 can include a unique identifier of a cellsite 180 communicating directly with the UE 100.

The unique identifier of the cell site 180 can be a part of Cell GlobalIdentity (CGI) which is a globally unique identifier for a BaseTransceiver Station in mobile phone networks. CGI consists of fourparts: Mobile Country Code (MCC), Mobile Network Code (MNC), LocationArea Code (LAC) and Cell Identification (CI). CGI is an integral part of3GPP specifications for mobile networks, for example, for identifyingindividual base stations to “handover” ongoing phone calls betweenseparately controlled base stations, or between different mobiletechnologies. MCC and MNC make up a PLMN identifier, and PLMN and LACmake up a location area identity (LAI), which uniquely identifies aLocation Area of a given operator's network. A CGI can be seen as a LAIwith added Cell Identification (CI), to further identify the individualbase station of that Location Area.

The home network 110 can determine, based on the unique identifier ofthe cell site, that the UE 100 is roaming and an identifier (ID) of thevisitor network 120. For example, the home network 110 can determine theID of the visitor network 120 based on LAI contained in the CGI.

Based on the ID of the visitor network 120, the home network 110 cansend a request to the visitor network 120 asking for a unique address ofa node 150 in the second wireless telecommunication network configuredto provide instructions on how to route the received call. Uponreceiving the unique address of the node 150, the home network 110 canrequest instructions on how to route the received call 140 from the node150.

The home network 110 can obtain the instructions on how to route thereceived call and, based on the instructions, route the received call.For example, if the placed call is 411, the call can be routed viacommunication link 160 to a directory assistance station 170 close tothe UE 100. In another example, if the placed call is a short code fortraffic information, the call can be routed to a center having trafficinformation surrounding the location of the UE 100.

FIG. 2 shows some of the network nodes in a 5G wirelesstelecommunication network. The 5G System (5GS) architecture separatesthe 5G Core Network (5GC) into Control Plane (CP) and User Plane (UP)networks. The 5GC CP is a network 200 including a 5G NR core networknode including network function (NF) elements, for example, networknodes (nodes) 210, 220, 230, 240, 250 (only five labeled for brevity)that act as consumers 240 and/or producers 250 of services. This ServiceBased Architecture (SBA) adheres to a RESTful architecture paradigmmandating NF elements, for example, nodes 210, 220, 230, 240, 250 toexpose service application programmer interfaces (APIs).

The Network Repository Function (NRF) node 230 is a key component of the5G SBA and is not part of any earlier telecommunication standard such as4G, 3G, 2G, etc. The NRF node 230 maintains an updated repository of allthe 5G elements available in the operator's network along with theservices provided by each of the elements in the 5G core that areexpected to be instantiated, scaled, and terminated with minimal orwithout manual intervention. In addition to serving as a repository ofthe services, the NRF node 230 also supports discovery mechanisms thatallow 5G elements to discover each other and get the updated status ofthe desired elements. The NRF supports the following functions: maintainthe profiles of the available NF instances and their supported servicesin the 5G core network; allow consumer NF instances to discover otherproviders NF instances in the 5G core network; and allow NF instances totrack the status of other NF instances. In other words, the NRF node 230can discover the NRF nodes of other 5G telecommunication networks, fromwhich the NRF node 230 of the home network 110 in FIG. 1 can obtaininformation from the visitor network 120 in FIG. 1.

FIG. 3 shows how the call is routed from the visitor network to the homenetwork. The nodes 300, 310, 320, 330, 340, and 350 belong to the homenetwork 110 in FIG. 1. The nodes 360, 370, and 380 belong to the visitornetwork 120 in FIG. 1. In step 305, the roaming UE 100 dials a numberrequiring location services. The node 300 S-CSCF receives the indicationof the call. S-CSCF is a Serving-Call Session Control Function. TheS-CSCF is the primary node in the Internet Protocol Multimedia Subsystem(IMS) responsible for session control.

The indication of the call includes the number dialed and the CGI. Thenode 300 in step 315 sends the CGI and the number dialed to GatewayMobile Location Centre (GMLC) 310 to determine the final number to dialbased on location. The GMLC contains functionality required to supportlocation-based service (LBS). GMLC includes a database of latitudes andlongitudes of cell site IDs.

The GMLC 310 can receive the CGI. In addition to containing the ID ofthe visitor network 120, the CGI contains the ID of the cell site 180 inFIG. 1 in direct communication with the UE 100. Based on the ID of thevisitor network 120 in FIG. 1, and/or the ID of the cell site 180, theGMLC 310 can determine that the UE 100 is roaming, because the ID of thecell site 180 is unknown to the GMLC 310, and/or the network ID isunknown to the GMLC 310.

Upon determining that the UE 100 is roaming, the GMLC 310, in step 325can request service discovery for a visited GMLC via a local NetworkRepository Function (NRF) 320. NFR is related to the 3GPP 5GArchitecture. NRF supports the service discovery function. As such, NRF320 is able to receive an NRF Discovery Request from an NRF instance andcan provide information about discovered NRF 320 instances.

The NRF 340, in step 335, can query the visitor NRF nodes 370 via SEPP350, 360 for an address of a GMLC of the visitor network 120. TheSecurity Edge Protection Proxy (SEPP) enables a secure interconnectbetween 5G networks 110, 120. The SEPP ensures end-to-endconfidentiality and/or integrity between the home and visitor networks110, 120 for all 5G interconnect roaming messages.

The visitor NRF node 370 belongs to the visitor network 120 and, in step345, can respond to the home NRF nodes 340 with the Fully QualifiedDomain Name (FQDN) of the visitor GMLC 380. FQDN is a unique address ofthe GMLC 380, akin to an Internet Protocol (IP) address, in the visitornetwork 120.

Upon receiving the FQDN of the visitor GMLC 380, the GMLC 330 of thehome network 110, in step 355, can directly query the GMLC 380 of thevisitor network 120 and request the translated number based on the callnumber received from the UE 100 using Ngmlc_RouteInfo. For example, ifthe call number received from the UE is a short code such as athree-digit number, the three-digit number is not a routable number. Toplace the call based on the three-digit number, the wirelesstelecommunication network needs to know the translated number, forexample, a routing number having 10 or 11 digits. The translationbetween the three-digit number and the routing number can depend on thelocation of the UE 100.

For example, the UE 100 can dial a service providing a weather forecast.The phone number of the service can vary because the service can havemultiple phone numbers providing information for multiple locations. TheUE 100 is not expected to know the phone number depending on thelocation, and the service can provide a general phone number that theuser can dial regardless of the UE's location. However, the translationbetween the general phone number and the appropriate weather forecastingservice can be done by the telecommunication network.

In step 365, the GMLC 380 sends the routing number to the home network110. The GMLC 380 can determine the routing number based on the uniqueID of the cell site 180 in FIG. 1 contained in the CGI. The GMLC 380 cantriangulate the location of the UE 100, and, based on the originalnumber dialed and the location of the UE, the GMLC 380 can determine theappropriate number to dial. The GMLC 380 has a lookup table that mapsshort codes to routing numbers. If the original number dialed issupported by GMLC 380, the lookup table contains the mapping between theoriginal number dialed and the routing number. The GMLC 380 candetermine the routing number by looking up the table based on the shortcode dialed. If the original number dialed is not supported by GMLC 380,the GMLC can resolve the short code by reaching outside of visitor thenetwork to obtain the routing number. Finally, the home GMLC 330, instep 375, provides the routing number to the home network 110 in acontact header.

If the UE 100 was not roaming, communication with nodes 360, 370, 380would not be necessary. Specifically, once is the GMLC 330 receives theCGI associated with the call, the home GMLC 330 can determine therouting number without communicating with the nodes 360, 370, 380 of thevisitor network 120.

FIG. 4 is a flowchart of a method to route a call from a roaming UE on a5G network or higher. In step 400, a hardware or software processorexecuting instructions described in this application receives from a UEbelonging to a first wireless telecommunication network, an indicationof a call to a dialed first telephone number. The first wirelesstelecommunication network can be the home network. The first telephonenumber can be a short code, such as 411, 511, that is location-specific.The call can require information associated with the UE that is notavailable to the first wireless telecommunication network. For example,the call can require a location of the UE to be completed, and thelocation of the UE may not be available to the first wirelesstelecommunication network because the UE is roaming on a second wirelesstelecommunication network, for example, a visitor network. The firstwireless telecommunication network and the second wirelesstelecommunication network are 5G networks or higher. For example, thefirst and second wireless telecommunication networks can be 5G, or 6G,but not LTE, 4G, 3G, etc.

The indication of the call can include a unique identifier associatedwith the second telecommunication network and/or a unique identifier ofa cell site communicating directly with the UE. For example, theindication of the call can include CGI and the first telephone number.

In step 410, the processor determines the UE is roaming, e.g. based onthe unique identifier. For example, the processor can query a databaseof addresses associated with the first telecommunication network to seeif the unique identifier is included. If the unique identifier is notincluded in the database, the processor determines that the UE isroaming.

In step 420, the processor sends a request to the second 5G wirelesstelecommunication network to provide instructions on how to route thereceived call.

In step 430, the processor obtains the instructions on how to route thereceived call. In one embodiment, the instructions can include theroutable number. The processor of the home network can send a firstrequest to the second 5G wireless telecommunication network for a uniqueaddress of a node in the second wireless telecommunication networkconfigured to provide instructions on how to route the received call.Specifically, the node can be the GMLC of the second telecommunicationnetwork including a database of latitudes and longitudes of the cellsite IDs. Upon receiving the address, the processor can send a secondrequest to the node having the unique address to provide a routablenumber based on the first telephone number. The processor can obtain theroutable number and call the routable number. The routable number can bea 10- or 11-digit number that can be called without the knowledge of thelocation of the UE. In other words, the routable number can be a secondphone number based on the first telephone number and the location of theUE.

In the above embodiment, to request the routable number, the processorcan send the CGI to the GMLC of the visitor network. The CGI can includea cell identification (CI) of a cell site directly in communication withthe UE. Based on the CI, the GMLC of the visitor network can determinethe location of the UE and/or the routable number. For example, a CGI(e.g. 001-02-3-4) includes:

-   -   a LAI (001-02-3), which consists of:        -   a PLMN (001-02), which consists of:            -   MCC (001)            -   MNC (02)        -   and a LAC (03),    -   and a CI (4).

In the above embodiment, to obtain the instructions, the processorobtains the address of the GMLC of the visitor network. To obtain theaddress of the GMLC of the visitor network, the processor can send therequest by a first network repository function (NRF) associated with thefirst wireless telecommunication network to a second NRF associated withthe second wireless telecommunication network. This type NRF-to-NRFcommunication is unique to a 5G network and does not require a specialagreement between the two networks to provide GMLC information to eachother. NRF-to-NRF communication can be used to discover other networkfunctions besides GMLC. For example NRF-to-NRF communication can be usedto discover UDM, SMF, AUSF, and PCF.

In step 440, based on the instructions, the processor can route, forexample, place, the received call.

Computer

FIG. 5 is a diagrammatic representation of a machine in the example formof a computer system 500 within which a set of instructions, for causingthe machine to perform any one or more of the methodologies or modulesdiscussed herein, can be executed.

In the example of FIG. 5, the computer system 500 includes a processor,memory, non-volatile memory, and an interface device. Various commoncomponents (e.g., cache memory) are omitted for illustrative simplicity.The computer system 500 is intended to illustrate a hardware device onwhich any of the components described in the examples of FIGS. 1-4 (andany other components described in this specification) can beimplemented. The computer system 500 can be of any applicable known orconvenient type. The components of the computer system 500 can becoupled together via a bus or through some other known or convenientdevice.

The processor of the computer system 500 can execute instructionsdescribed in this application, such as instructions described in FIG. 4.The processor of the computer system 500 can be associated with the homenetwork 110 in FIG. 1, the visitor network 120 in FIG. 1, and/or the UE100 in FIG. 1. The main memory, the non-volatile memory, and/or thedrive unit can store the instructions described in this application. Thevisitor network 120, the home network 110, and the UE 100 cancommunicate with each other using the network of the computer system500.

This disclosure contemplates the computer system 500 taking any suitablephysical form. As example and not by way of limitation, computer system500 can be an embedded computer system, a system-on-chip (SOC), asingle-board computer system (SBC) (such as, for example, acomputer-on-module (COM) or system-on-module (SOM)), a desktop computersystem, a laptop or notebook computer system, an interactive kiosk, amainframe, a mesh of computer systems, a mobile telephone, a personaldigital assistant (PDA), a server, or a combination of two or more ofthese. Where appropriate, computer system 500 can include one or morecomputer systems 500; be unitary or distributed; span multiplelocations; span multiple machines; or reside in a cloud, which caninclude one or more cloud components in one or more networks. Whereappropriate, one or more computer systems 500 can perform withoutsubstantial spatial or temporal limitation one or more steps of one ormore methods described or illustrated herein. As an example and not byway of limitation, one or more computer systems 500 can perform in realtime or in batch mode one or more steps of one or more methods describedor illustrated herein. One or more computer systems 500 can perform atdifferent times or at different locations one or more steps of one ormore methods described or illustrated herein, where appropriate.

Software is typically stored in the non-volatile memory and/or the driveunit. Indeed, storing an entire large program in memory may not even bepossible. Nevertheless, it should be understood that for software torun, if necessary, it is moved to a computer-readable locationappropriate for processing, and for illustrative purposes, that locationis referred to as the memory in this application. Even when software ismoved to the memory for execution, the processor will typically make useof hardware registers to store values associated with the software, anda local cache that, ideally, serves to speed up execution. As usedherein, a software program is assumed to be stored at any known orconvenient location (from non-volatile storage to hardware registers)when the software program is referred to as “implemented in acomputer-readable medium.” A processor is considered to be “configuredto execute a program” when at least one value associated with theprogram is stored in a register readable by the processor.

Unless specifically stated otherwise as apparent from the followingdiscussion, it is appreciated that throughout the description,discussions utilizing terms such as “processing” or “computing” or“calculating” or “determining” or “displaying” or “generating” or thelike, refer to the action and processes of a computer system, or similarelectronic computing device, that manipulates and transforms datarepresented as physical (electronic) quantities within the computersystem's registers and memories into other data similarly represented asphysical quantities within the computer system memories or registers orother such information storage, transmission or display devices.

The algorithms and displays presented herein are not inherently relatedto any particular computer or other apparatus. Various general purposesystems can be used with programs in accordance with the teachingsherein, or it can prove convenient to construct more specializedapparatus to perform the methods of some embodiments. The requiredstructure for a variety of these systems will appear from thedescription below. In addition, the techniques are not described withreference to any particular programming language, and variousembodiments can thus be implemented using a variety of programminglanguages.

While the computer-readable medium or computer-readable storage mediumis shown in an exemplary embodiment to be a single medium, the term“computer-readable medium” and “computer-readable storage medium” shouldbe taken to include a single medium or multiple media (e.g., acentralized or distributed database, and/or associated caches andservers) that store the one or more sets of instructions. The term“computer-readable medium” and “computer-readable storage medium” shallalso be taken to include any medium that is capable of storing, encodingor carrying a set of instructions for execution by the machine and thatcause the machine to perform any one or more of the methodologies ormodules of the presently disclosed technique and innovation.

In some circumstances, operation of a memory device, such as a change instate from a binary one to a binary zero or vice versa, for example, cancomprise a transformation, such as a physical transformation. Withparticular types of memory devices, such a physical transformation cancomprise a physical transformation of an article to a different state orthing. For example, but without limitation, for some types of memorydevices, a change in state can involve an accumulation and storage ofcharge or a release of stored charge. Likewise, in other memory devices,a change of state can comprise a physical change or transformation inmagnetic orientation or a physical change or transformation in molecularstructure, such as from crystalline to amorphous or vice versa. Theforegoing is not intended to be an exhaustive list in which a change instate for a binary one to a binary zero or vice versa in a memory devicecan comprise a transformation, such as a physical transformation.Rather, the foregoing are intended as illustrative examples.

A storage medium typically can be non-transitory or comprise anon-transitory device. In this context, a non-transitory storage mediumcan include a device that is tangible, meaning that the device has aconcrete physical form, although the device can change its physicalstate. Thus, for example, non-transitory refers to a device remainingtangible despite this change in state.

Remarks

Unless the context clearly requires otherwise, throughout thedescription and the claims, the words “comprise,” “comprising,” and thelike are to be construed in an inclusive sense, as opposed to anexclusive or exhaustive sense; that is to say, in the sense of“including, but not limited to.” As used herein, the terms “connected,”“coupled,” or any variant thereof means any connection or coupling,either direct or indirect, between two or more elements; the coupling orconnection between the elements can be physical, logical, or acombination thereof. Additionally, the words “herein,” “above,” “below,”and words of similar import, when used in this application, refer tothis application as a whole and not to any particular portions of thisapplication. Where the context permits, words in the above DetailedDescription using the singular or plural number may also include theplural or singular number respectively. The word “or” in reference to alist of two or more items covers all of the following interpretations ofthe word: any of the items in the list, all of the items in the list,and any combination of the items in the list.

The above Detailed Description of examples of the invention is notintended to be exhaustive or to limit the invention to the precise formdisclosed above. While specific examples for the invention are describedabove for illustrative purposes, various equivalent modifications arepossible within the scope of the invention, as those skilled in therelevant art will recognize. For example, while processes or blocks arepresented in a given order, alternative implementations may performroutines having steps, or employ systems having blocks, in a differentorder, and some processes or blocks may be deleted, moved, added,subdivided, combined, and/or modified to provide alternative orsub-combinations. Each of these processes or blocks may be implementedin a variety of different ways. Also, while processes or blocks are attimes shown as being performed in series, these processes or blocks mayinstead be performed or implemented in parallel, or may be performed atdifferent times. Further any specific numbers noted herein are onlyexamples: alternative implementations may employ differing values orranges.

The teachings of the invention provided herein can be applied to othersystems, not necessarily the system described above. The elements andacts of the various examples described above can be combined to providefurther implementations of the invention. Some alternativeimplementations of the invention may include not only additionalelements to those implementations noted above, but also may includefewer elements.

Any patents and applications and other references noted above, and anythat may be listed in accompanying filing papers, are incorporatedherein by reference in the entirety, except for any subject matterdisclaimers or disavowals, and except to the extent that theincorporated material is inconsistent with the express disclosureherein, in which case the language in this disclosure controls. Aspectsof the invention can be modified to employ the systems, functions, andconcepts of the various references described above to provide yetfurther implementations of the invention.

These and other changes can be made to the invention in light of theabove Detailed Description. While the above description describescertain examples of the invention, and describes the best modecontemplated, no matter how detailed the above appears in text, theinvention can be practiced in many ways. Details of the system may varyconsiderably in its specific implementation, while still beingencompassed by the invention disclosed herein. As noted above,particular terminology used when describing certain features or aspectsof the invention should not be taken to imply that the terminology isbeing redefined herein to be restricted to any specific characteristics,features, or aspects of the invention with which that terminology isassociated. In general, the terms used in the following claims shouldnot be construed to limit the invention to the specific examplesdisclosed in the specification, unless the above Detailed Descriptionsection explicitly defines such terms. Accordingly, the actual scope ofthe invention encompasses not only the disclosed examples, but also allequivalent ways of practicing or implementing the invention under theclaims.

To reduce the number of claims, certain aspects of the invention arepresented below in certain claim forms, but the applicant contemplatesthe various aspects of the invention in any number of claim forms. Forexample, while only one aspect of the invention is recited as ameans-plus-function claim under 35 U.S.C. § 112(f), other aspects maylikewise be embodied as a means-plus-function claim, or in other forms,such as being embodied in a computer-readable medium. (Any claimsintended to be treated under 35 U.S.C. § 112(f) will begin with thewords “means for”, but use of the term “for” in any other context is notintended to invoke treatment under 35 U.S.C. § 112(f).) Accordingly, theapplicant reserves the right to pursue additional claims after filingthis application to pursue such additional claim forms, in either thisapplication or in a continuing application.

We claim:
 1. At least one computer-readable medium, excluding transitorysignals, and carrying instructions that, when executed by at least onedata processor, performs a method to route a call from a mobile deviceroaming on a 5G network, the method comprising: receiving, from themobile device authorized on a first 5G wireless telecommunicationnetwork, an indication of the call to a first telephone number, whereinthe call requires information about a geographic location of the mobiledevice for the call to be connected, wherein the location of the mobiledevice is not available to the first wireless telecommunication network,wherein the mobile device is roaming on a second 5G wirelesstelecommunication network when the indication of the call is received,wherein the second 5G wireless network is managed by a company differentfrom a company managing the first wireless network, and wherein theindication of the call includes a unique identifier of a cell sitecommunicating directly with the mobile device; determining based on theunique identifier of the cell site that the mobile device is roaming;determining an identifier (ID) of the second 5G wirelesstelecommunication network based on the unique identifier of the cellsite; based on the ID of the second 5G wireless telecommunicationnetwork, sending a request to the second 5G wireless telecommunicationnetwork for a unique address of a node in the second 5G wirelesstelecommunication network, wherein the node in the second 5G wirelesstelecommunication network is configured to provide instructions on howto route the call; obtaining the instructions on how to route the call;and based on the instructions and the first telephone number, routingthe call.
 2. The computer readable medium of claim 1, wherein sendingthe request to the second 5G wireless telecommunication network for theunique address includes: sending the request by a first networkrepository function (NRF) associated with the first wirelesstelecommunication network to a second NRF associated with the second 5Gwireless telecommunication network.
 3. The computer-readable medium ofclaim 1, wherein the first telephone number is a short code.
 4. Thecomputer-readable medium of claim 1, wherein obtaining the instructionson how to route the call further comprises: obtaining a second telephonefor routing the call number based on the first telephone number and thelocation of the mobile device.
 5. The computer-readable medium of claim1, wherein the sending of the request to the second 5G wirelesstelecommunication network includes: based on the ID of the second 5Gwireless telecommunication network, sending the request to the second 5Gwireless telecommunication network for a unique address of a databaseassociated with the second 5G wireless telecommunication network,wherein the database includes a geographic location of the cell site. 6.The computer-readable medium of claim 1, wherein the obtaining of theinstructions on how to route the call includes: obtaining the locationof the mobile device or a location of the cell site.
 7. A method,comprising: receiving, from a user equipment (UE) registered to a firstwireless telecommunication network, an indication of a connectionrequest based on a first telephone number, wherein the connectionrequest requires information associated with the UE that is notavailable to the first wireless telecommunication network, wherein theconnection request is placed by the UE roaming on a second wirelesstelecommunication network, wherein the indication of the connectionrequest includes a unique identifier associated with the second wirelesstelecommunication network, and wherein the first wirelesstelecommunication network and the second wireless telecommunicationnetwork are 5G or higher generation wireless network; determining basedon the unique identifier that the UE is roaming in the second wirelesstelecommunication network; sending a request to the second wirelesstelecommunication network to provide instructions on how to complete theconnection request; obtaining the instructions on how to complete theconnection request; and based on the instructions, completing theconnection request.
 8. The method of claim 7, wherein the connectionrequest requires information about a geographic location of the UE to becompleted.
 9. The method of claim 7, further comprising: sending a firstrequest to the second 5G wireless telecommunication network for a uniqueaddress of a node in the second wireless telecommunication networkconfigured to provide the instructions on how to complete the connectionrequest; sending a second request to the node having the unique addressto provide a routable number based on the first telephone number;obtaining the routable number; and calling the routable number.
 10. Themethod of claim 7, wherein the indication of the connection requestincludes a unique identifier of a wireless cell near the UE.
 11. Themethod of claim 7, wherein the first telephone number is a short code.12. The method of claim 7, wherein the obtaining of the instructions onhow to complete the connection request comprises: obtaining theinstructions on how to complete the connection request to a second phonenumber based on the first telephone number and a geographic location ofthe UE.
 13. The method of claim 7, wherein the sending the request tothe second wireless telecommunication network includes: based on theunique identifier of the second wireless telecommunication network,sending the request to the second wireless telecommunication network fora unique address of a database associated with the second wirelesstelecommunication network including a location of a cell sitecommunicating directly with the UE.
 14. The method of claim 7, whereinthe obtaining of the instructions on how to complete the connectionrequest comprises: obtaining a location of the UE or a location of acell site communicating directly with the UE.
 15. The method of claim 7,wherein the sending the request to the second wireless telecommunicationnetwork further includes: sending the request by a first networkrepository function (NRF) associated with the first wirelesstelecommunication network to a second NRF associated with the secondwireless telecommunication network.
 16. A system comprising: one or moreprocessors; memory coupled to the one or more processors, wherein thememory includes instructions executable by the one or more processorsto: receive from a user equipment (UE) belonging to a first wirelesstelecommunication network an indication of a call to a first telephonenumber, wherein the call requires information associated with the UEthat is not available to the first wireless telecommunication network,wherein the call is placed by the UE roaming on a second wirelesstelecommunication network, wherein the indication of the call includes aunique identifier associated with the second wireless telecommunicationnetwork, and wherein the first wireless telecommunication network andthe second wireless telecommunication network are 5G or higher;determine based on the unique identifier that the UE is roaming; send arequest to the second wireless telecommunication network to provideinstructions on how to route the call; obtain the instructions on how toroute the call; and based on the instructions, route the call.
 17. Thesystem of claim 16, wherein the call requires information about alocation of the UE to be completed.
 18. The system of claim 16,comprising: the instructions to send the request to the second wirelesstelecommunication network comprising the instructions to: send a firstrequest to the second wireless telecommunication network for a uniqueaddress of a node in the second wireless telecommunication networkconfigured to provide the instructions on how to route the call; send asecond request to the node having the unique address to provide aroutable number based on the first telephone number; obtain the routablenumber; and call the routable number.
 19. The system of claim 16,wherein the instructions on how to route the call include a location ofthe UE or a location of a cell site communicating directly with the UE.20. The system of claim 16, the instructions to send the request to thesecond wireless telecommunication network comprising the instructionsto: send the request by a first network repository function (NRF)associated with the first wireless telecommunication network to a secondNRF associated with the second wireless telecommunication network.