Systems and methods for integrating a broadband network gateway into a 5G network

ABSTRACT

In one embodiment, a method includes configuring a router to act as a BNG and establishing, by the router, a connection between CPE and the BNG. The method also includes receiving, by the router, end-user and access parameters and communicating, by the router, the end-user and access parameters to one or more 5G NFs by interacting with one or more SBIs. The method further includes allowing, by the router, the CPE access to the one or more 5G NFs in response to communicating the end-user and access parameters to the one or more 5G NFs.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.16/719,355 filed Dec. 18, 2019 by Raghunadha Reddy Pocha et al. entitled“SYSTEMS AND METHODS FOR INTEGRATING A BROADBAND NETWORK GATEWAY INTO A5G NETWORK”, which is hereby incorporated by reference in its entirety.

TECHNICAL FIELD

This disclosure generally relates to integrating a Broadband NetworkGateway (BNG) into a network, and more specifically to systems andmethods for integrating the BNG into a fifth generation wireless (5G)network.

BACKGROUND

A BNG serves as an access point for subscribers to connect to a network.For example, users may connect to customer premise equipment (CPE),which communicates through the BNG to the network. 5G systems implementa number of network functions (NFs) that provide a variety offunctionality.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates an example system for integrating a BNG into a 5Gnetwork using Service Based Interfaces (SBIs);

FIG. 2 illustrates an example system for integrating a BNG into a 5Gnetwork using a Non-3GPP Interworking Function (N3IWF);

FIG. 3 illustrates an example method for integrating a BNG into a 5Gnetwork; and

FIG. 4 illustrates an example computer system that may be used by thesystems and methods described herein.

DESCRIPTION OF EXAMPLE EMBODIMENTS

Overview

According to an embodiment, a router includes one or more processors andone or more computer-readable non-transitory storage media coupled tothe one or more processors. The one or more computer-readablenon-transitory storage media include instructions that, when executed bythe one or more processors, cause the router to perform operationsincluding configuring the router to act as a BNG and establishing aconnection between CPE and the BNG. The operations also includereceiving end-user and access parameters and communicating the end-userand access parameters to one or more 5G NFs by interacting with one ormore SBIs. The operations further include allowing the CPE access to theone or more 5G NFs in response to communicating the end-user and accessparameters to the one or more 5G NFs.

In certain embodiments, the operations further include using PseudowireHeadend (PWHE) to expose end-user Layer 2 (L2) connectivity to the BNG.In some embodiments, the operations may further include programmingQuality of Service (QoS) flows using packet forwarding control protocol(PFCP). The one or more 5G NFs may include one or more of the followingNFs: Network Slice Selection Function (NSSF); Network RepositoryFunction (NRF); Policy Control Function (PCF); Charging Function (CHF);and Authentication Server Function (AUSF). The end-user parameters mayinclude end-user identifications and the access parameters may includeremote IDs and/or circuit IDs. In some embodiments, the router islocated in a control plane data center, and the control plane datacenter is segregated from a user plane data center. In some embodiments,the router is located between a digital subscriber line accessmultiplexer (DSLAM) and a Non-3GPP Interworking Function (N3IWF), therouter communicates with the N3IWF via an Internet Protocol Security(IPSec) tunnel, and the router interacts with the one or more SBIs viathe N3IWF.

According to another embodiment, a method includes configuring a routerto act as a BNG and establishing, by the router, a connection betweenCPE and the BNG. The method also includes receiving, by the router,end-user and access parameters and communicating, by the router, theend-user and access parameters to one or more 5G NFs by interacting withone or more SBIs. The method further includes allowing, by the router,the CPE access to the one or more 5G NFs in response to communicatingthe end-user and access parameters to the one or more 5G NFs.

According to yet another embodiment, one or more computer-readablenon-transitory storage media embody instructions that, when executed bya processor, cause the processor to perform operations includingconfiguring the router to act as a BNG and establishing a connectionbetween CPE and the BNG. The operations also include receiving end-userand access parameters and communicating the end-user and accessparameters to one or more 5G NFs by interacting with one or more SBIs.The operations further include allowing the CPE access to the one ormore 5G NFs in response to communicating the end-user and accessparameters to the one or more 5G NFs.

Technical advantages of certain embodiments of this disclosure mayinclude one or more of the following. Certain systems and methodsdescribed herein integrate a BNG into the 5G network to allow end-usersaccess to one or more 5G NF services. The 5G NF services may classify,enforce, and/or apply various policies and billing systems based onaccess-technology. The 5G cloud architecture may utilizenetwork-as-a-service (NaaS) with unified subscriber management to allowend-users access to these 5G NF services.

In certain embodiments, an access aggregation network is located closeto CPE/DSLAM devices to accommodate the throughput requirementsrequested by the end-user (e.g., Internet Protocol television (IPTV),gaming, high-speed broadband (more than 1 gigabits per second), etc.).In some embodiments, the 5G cloud-based architecture includes acentralized control plane that is created by slicing the NFs based onend-user parameters and access-parameters, which may support higherbandwidth requirements. The centralized control plane may be easier tomaintain than traditional control planes and may be scaled according toload requirements. The edge user plane may be located close to theaccess network, which may accommodate higher bandwidth and speed thantraditional systems. The edge user plane also provides flexibility tobreak out required flows locally and forward certain flows to 5Gnetworks and Evolved Packet Core (EPC). In certain embodiments, theend-user may be connected from any fixed wireless access so that therespective BNG can retrieve the user profile based on user identityparameters.

Other technical advantages will be readily apparent to one skilled inthe art from the following figures, descriptions, and claims. Moreover,while specific advantages have been enumerated above, variousembodiments may include all, some, or none of the enumerated advantages.

EXAMPLE EMBODIMENTS

This disclosure describes systems and methods for integrating a BNG intoa 5G network. A BNG is an access point for subscribers to connect to abroadband network. When a connection is established between the BNG andCPE, the subscriber can access the broadband services. The broadbandservices may be provided by a network service provider (NSP) or anInternet service provider (ISP). The control architecture for a 5Gnetwork is capable of supporting the integration of a ubiquitous accesscontinuum composed of millions of fixed and heterogeneous wirelessresources. 5G networks can accommodate different deployments (e.g.,traditional broadband deployments, on-site tailor-made industrialapplication deployments, etc.) having multiple accesses in differentenvironments.

Third Generation Partnership Project (3GPP) 5G systems of Service BasedArchitecture (SBA) have defined Network Functions (NFs) with SBIs tosupport a cloud infrastructure. The cloud infrastructure is supported bysegregating control-plane and user-plane functionality. The 5G systemshave defined processes for network selection, identification,authentication, authorization, access control, barring, mobility,Evolved Packet System (EPS) fallback, policy control, and lawfulinterception for the end-user based on Subscription Permanent Identifier(SUPI), Permanent Equipment Identifier (PEI), Public Land Mobile Network(PLMN), slice information (e.g., Network Slice Selection AssistanceInformation (NSSAI)), and the like. However, there are no processes tointeroperate with broadband users of wireline/fixed-wireless deploymentssince the broadband users can use any kind of access technologies toutilize the services.

This disclosure includes systems and methods that support selection ofNFs for broadband users and interoperability with the 5G cloudarchitecture platforms. Certain systems and methods of this disclosureuse centralized BNG deployment and leverage 5G SBIs without interactingwith enhanced packet data gateway (ePDG) and/or a non-3GPP interworkingfunction (N3IWF). FIG. 1 shows an example system for integrating a BNGinto a 5G network using SBIs, and FIG. 2 shows an example system forintegrating a BNG into a 5G network using a N3IWF. FIG. 3 shows anexample method for integrating a BNG into a 5G network. FIG. 4 shows anexample computer system that may be used by the systems and methodsdescribed herein.

FIG. 1 illustrates an example system 100 for integrating a BNG into a 5Gnetwork using SBIs. System 100 or portions thereof may be associatedwith an entity, which may include any entity, such as a business orcompany (e.g., a service provider) that integrates a BNG into a 5Gnetwork using SBIs. The components of system 100 may include anysuitable combination of hardware, firmware, and software. For example,the components of system 100 may use one or more elements of thecomputer system of FIG. 4 .

System 100 includes CPEs 110, Fiber to the home (FTTH) networks 120, anInternet Protocol (IP)/Multiprotocol Label Switching (MPLS) aggregationnetwork 130, an IP/MPLS core network 140, a control plane data center150, and a user plane data center 160. One or more networks (e.g., FTTHnetworks 120, IP/MPLS network 130, and IP/MPLS core network 140) ofsystem 100 include any type of network that facilitates communicationbetween components of system 100. One or more networks of system 100 mayconnect one or more components of system 100. This disclosurecontemplates any suitable network. One or more portions of any networkof system 100 may include an ad-hoc network, an intranet, an extranet, avirtual private network (VPN), a local area network (LAN), a wirelessLAN (WLAN), a wide area network (WAN), a wireless WAN (WWAN), ametropolitan area network (MAN), a portion of the Internet, a portion ofthe Public Switched Telephone Network (PSTN), a cellular telephonenetwork, a combination of two or more of these, or other suitable typesof networks. One or more networks of system 100 may be a communicationsnetwork, such as a private network, a public network, a connectionthrough Internet, a mobile network, a WI-FI network, etc. One or morecomponents of system 100 may communicate over one or more networks ofsystem 100. One or more networks may include a core network (e.g., a 4Gand/or 5G network), an access network, an edge network, an ISP network,an NSP network, an aggregation network, and the like. One or morenetworks of system 100 may implement SD-WAN technology. SD-WAN is aspecific application of software defined networking technology appliedto WAN connections (e.g., broadband Internet, 4G, 5G, Long TermEvolution (LTE), MPLS, etc.).

One or more networks of system 100 include one or more network nodes(e.g., aggregation routers 124 of FTTH networks 120, aggregation routers134 of IP/MPLS aggregation network 130, and aggregation routers 144 ofIP/MPLS core network 140). The network nodes of system 100 areconnection points that can receive, create, store, and/or send data. Thenodes of system 100 may be managed by an administrator (e.g., a serviceprovider) of one or more networks. The nodes may include one or moreendpoints and/or one or more redistribution points that recognize,process, and forward data to other nodes. In certain embodiments, thenodes of system 100 include data communications equipment such asswitches, bridges, modems, hubs, and the like. In some embodiments, thenodes may include data terminal equipment such as routers, servers,printers, workstations, and the like. In certain embodiments, the nodesmay include host computers, personal computers, smartphones, Internet ofThings (IOT) devices, edge routers, and/or gateways.

CPE 110 of system 100 is any telecommunications hardware located at thehome or business of a user (e.g., a subscriber). CPE 110 may be anyterminal and associated equipment located at a subscriber's premises andconnected with a carrier's telecommunication circuit. CPE 110 may allowusers to access providers' communication services and distribute them ina residence or enterprise with a LAN. CPE 110 may include devices suchas telephones, routers, network switches, residential gateways (RG),set-top boxes (STBs), personal computers (PCs), fixed mobile convergenceproducts, home networking adapters, and Internet access gateways. In theillustrated embodiment of FIG. 1 , each CPE 110 (i.e., CPE 110 a, CPE110 b, CPE 110 c, and CPE 110 d) represents a triple play service intelecommunications that includes voice (phone), video (STB/TV), and data(PC). Individual devices of CPE 110 may connect to a home gateway (HG).In certain embodiments, the HG is a router that provides network accessbetween LAN hosts to a larger network. The HG may provide network accessvia a modem. In the illustrated embodiment of FIG. 1 , the HGs connectCPEs 110 to FTTH networks 120.

FTTH networks 120 (e.g., FTTH network 120 a and FTTH network 120 b) ofsystem 100 are broadband networks that use optical fiber to providehigh-speed Internet access. FTTP networks 120 may include fiber laid allthe way to the premises/home/building of CPE 110 and/or fiber laid to anode with copper wires completing the connection. FTTH networks 120 mayinclude one or more optical line terminals (OLTs) 122 and one or moreaggregation routers 124. Each OLT 122 is a hardware device used in apassive optical network (PON) system. Each OLT 122 may convert standardsignals used by a fiber optic service provider to the frequency andframing used by the PON system. Aggregation routers 124 (notated as AG1in FIG. 1 ) are used to organize FTTH networks 120 by replacing multipleroutes with a single, general route. Aggregation routers 124 limit thenumber of routers (and accompanying routes) available to serviceproviders. OLTs 122 and aggregation routers 124 of FTTH networks 120 maybe used to connect users (e.g., subscribers) associated with CPEs 110 toBNG router 154 of control plane data center 150. In the illustratedembodiment of FIG. 1 , FTTH networks 120 connect CPEs 110 to IP/MPLSaggregation network 130.

IP/MPLS aggregation network 130 of system 100 is an integrated,packet-based network capable of supporting converged network services.IP/MPLS aggregation network 130 may utilize both IP and MPLS technology.MPLS is a routing technique that directs data from one node to the nextbased on short path labels rather than long network addresses. IP/MPLSaggregation network 130 includes multiple aggregation routers 134(notated as AG2 in FIG. 1 ). Aggregation routers 134 are used toorganize IP/MPLS aggregation network 130 by replacing multiple routeswith a single, general route. Aggregation routers 134 limit the numberof routers (and accompanying routes) available to service providers. Inthe illustrated embodiment of FIG. 1 , aggregation routers 134 ofIP/MPLS aggregation network 130 communicate network traffic to IP/MPLScore network 140.

IP/MPLS core network 140 of system 100 is an integrated core networkthat may utilize both IP and MPLS technology. IP/MPLS core network 140acts as an anchor point for multi-access technologies. In theillustrated embodiment of FIG. 1 , IP/MPLS core network 140 is a 5Gnetwork. IP/MPLS core network 140 may aggregate data traffic from enddevices, authenticate subscribers and devices, apply personalizedpolicies, and/or manage the mobility of the devices before routing thetraffic to operator services or the Internet. IP/MPLS core network 140includes multiple aggregation routers 144 (notated as AG3 in FIG. 1 ).Aggregation routers 144 are used to organize IP/MPLS core network 140 byreplacing multiple routes with a single, general route. Aggregationrouters 144 limit the number of routers (and accompanying routes)available to service providers. In the illustrated embodiment of FIG. 1, aggregation routers 144 of IP/MPLS core network 140 communicatenetwork traffic to BNG router 154 of control plane data center 150.IP/MPLS core network 140 may be decomposed into a number of SBAelements. IP/MPLS core network 140 includes pure, virtualized,software-based NFs (or services) that are instantiated withinmulti-access edge computing (MEC) cloud infrastructures. The 5G NFsinclude an NSSF, an NRF, a Unified Data Management (UDM), a PCF, a CHF,and an AUSF.

The NSSF is a mobile core network function that allows the network to besegmented and managed for a specific use case or business scenario. TheNSSF may be used to select the network slice instances that will serve aparticular device. In certain embodiments, the NSSF determines theallowed NSSAI that is communicated to a device. A network slice includesthe 5G NFs needed to serve an end-user.

The NRF is a mobile core network function that provides NF serviceregistration and discovery and allows NFs to identify appropriateservices in one another. For example, the NRF may be used to identifysubscriptions of NF instances using BNG router 154 enhanced by accessparameters (e.g., remote ID and circuit ID). The access parameters maybe received by CPE 110. As another example, NRF may be used to performservice discovery of NF instances based on NF instance IDs and accessparameters (e.g., remote ID and circuit ID).

A Unified Data Management (UDM) is a network function that providesservices to other SBA functions. The UDM may provide authenticationcredentials while being employed by the Access and Mobility ManagementFunction (AMF) and Session Management Function (SMF) to retrievesubscriber data and context. The UDM may retrieve subscription data andservice support based on NF Instance ID, end-user parameters (e.g., ausername or a media access control (MAC) address), and/or accessparameters (e.g., a remote ID and a circuit ID).

A PCF is a network function that provides subscriber and accessparameters as part of policy control. The PCF may be used to retrieve apolicy enforcement profile from an end-user using end-user parameters(e.g., a username or MAC address) and/or access parameters (e.g., aremote ID and a circuit ID). The PCF may leverage BNG router 154 toprovide hierarchical QoS based on the end-user and access parameters.

A CHF is a network function that introduces subscriber and accessparameters for broadband users for billing purposes with variouscharging triggers. Online and/or offline charging are supported on theuser subsection and may be location based. The CHF requires themodification of the N40 interface based on the access parameters (e.g.,remote ID and circuit ID).

The AUSF is a network function that is used to manage subscriberauthentication during registration or re-registration with 5G. The AUSFmay obtain authentication vectors from the UDM. The AUSF may authorizeand/or authenticate end-users using Password Authentication Protocol(PAP), Challenge-Handshake Authentication Protocol (CHAP), and/orExtensible Authentication Protocol and authentication parameters thatare received as part of Point to Point Protocol over Ethernet (PPPoE),Internet Protocol over Ethernet (IPoE), and/or Dynamic HostConfiguration Protocol (DHCP) packets from end-users. The AUSF leveragesthe access parameters (e.g., remote ID and circuit ID) to authorizeand/or authenticate the user.

Control plane data center 150 of system 100 is responsible formaintaining sessions and exchanging protocol information with networkdevices. Control Plane/User Plane Separation (CUPS) is a capability thatallows mobile operators to separate the control plane (e.g., controlplane data center 150) and the user plane (e.g., user plane data center160) of system 100. For example, control plane data center 150 may becentrally located (e.g., the middle of the United States), and userplane data center 160 may be located closer to an application (e.g., anapplication on CPE 110 a) that it is supporting. Control plane datacenter 150 includes interfaces 152, a BNG router 154, an SMF router 155,a Packet Gateway (PGW) router 156, and a database 158. Database 158 ofcontrol plane data center 150 is an organized collection of data thatmaintains subscription information once a user is connected to a network(e.g., 4G, 5G, or fixed wireless access).

Interfaces 152 of control plane data center 150 are points ofinterconnection between two network elements of system 100. Interfaces152 include SBIs 152 a and LTE interfaces 152 b. SBIs 152 a arecomponents of SBA that are used for interaction between NF serviceswithin 5G core networks. NFs may expose their functionality through SBIs152 a. SBIs 152 a may support a request-response model or asubscribe-notify model of an NF service. For example, SBI 152 a may beused to communicate a request from a first NF to a second NF andcommunicate a response from the second NF to the first NF. As anotherexample, SBI 152 a may be used to communicate a subscription from afirst NF to a second NF and communicate a notification from the secondNF to the first NF. Examples of SBIs 152 a include N7, N10, N40, NRF,and AUSF interfaces. LTE interfaces 152 b connect various components toor within a core network. LTE interfaces 152 b include Gx, Gy, and Gzinterfaces. The Gx interface may allow signaling of Policy Control andCharging (PCC) decisions. The Gy interface may serve as an onlinecharging reference point. The Gz interface may serve as an offlinecharging reference point.

BNG router 154 of control plane data center 150 is a network node thatsupports BNG functionality. BNG router 154 may communicate with CPEs110, store subscription and credentials of CPEs 110, allow access toexternal networks and services, provide security, manage the networkaccess, manage network mobility, and the like. When a connection isestablished between BNG router 154 and CPE 110, the end-user (e.g., thesubscriber) can access the broadband services provided by the NSP orISP. In certain embodiments, BNG router 154 establishes and managessubscriber sessions. When a session is active, BNG router 154 aggregatestraffic from various subscriber sessions from an access network (e.g.,FTTH network 120) and routes the traffic to the network of the serviceprovider. In certain embodiments, the BNG functionality of BNG router154 is introduced as its own NF. The BNG NF may define a correspondingSBI 152 a and use expose its functionality through the corresponding SBI152 a.

In certain embodiments, BNG router 154 is configured to act as a BNG.Configuring router 154 to act as a BNG may include one or more of thefollowing steps: configuring BNG router 154 to interact with a RemoteAuthentication Dial-In User Service (RADIUS) server, activating one ormore control policies to determine an action that BNG performs inresponse to specific events, establishing subscriber sessions, deployingQoS, configuring subscriber features, verifying session establishment,and disabling Select VPN Routing and Forwarding (VRF) download (SVD).BNG router 154 may be deployed by the service provider. In theillustrated embodiment of FIG. 1 , BNG router 154 is centrally locatedin control plane data center 150.

SMF router 155 of control plane data center 150 is a router thatsupports SMF functionality. An SMF is a network function that isresponsible for interacting with user plane data center 160. SMF router155 may create, update, and/or and remove Protocol Data Unit (PDU)sessions and managing session context within User Plane Function (UPF)routers 164 of user plane data center 160. In certain embodiments, SMFrouter 155 acts as a DHCP node and IP Address Management (IPAM) system.

PGW-C router 156 of control plane data center 150 is a router thatsupports packet gateway control plane functions. PGW-C router 156 isresponsible for handling signaling traffic. In certain embodiments, CUPSdecouples PGW-C (control-plane) and PGW-U (user plane) functions toallow the data forwarding component (PGW-U) to be decentralized. Assuch, PGW-C router 156 remains centralized in control plane data center150, whereas a PGW-U router may be located in user plane data center 160that is located closer to the network edge.

User plane data center 160 of system 100 is responsible for theswitching of packets through a router. User plane data center 160includes UPF routers 164 (notated as AG1 in FIG. 1 ). UPF routers 164 ofuser plane data center 160 are network components that support UPFfunctionality. UPF is a 5G network function that acts as a forwardingengine for user traffic. In the illustrated embodiment of FIG. 1 , UPFrouters 164 are distributed and deployed independently from centralizedcontrol plane data center 150. UPF routers 164 may provide packet-basedrouting/forwarding, header manipulations, QoS, billing/charging, policycontrols, and the like.

PWHE 172 of system 100 may be used to establish connection 170 from FTTHnetwork 120 b to BNG router 154 of control plane data center 150.Similarly, PWHE 182 of system 100 may be used to establish connection180 from FTTH network 120 a to BNG router 154 of control plane datacenter 150. PWHE is a technology that allows termination of access PWsinto a Layer 3 (VRF or global) domain or into a Layer 2 domain. PWsfacilitate tunneling customer traffic into a common IP/MPLS networkinfrastructure (e.g., IP/MPLS aggregation network 130 and IP/MPLS corenetwork 140).

System 100 of FIG. 1 may integrate BNG router 154 into a 5G network byestablishing PWHE 172 or 182 to expose end-user L2 connectivity from CPE110 to BNG router 154 located in control plane data center 150. Forexample, an end-user may connect from CPE 110 a to FTTH network 120 ausing OLT 122, and OLT 122 may establish a connection to aggregationrouter 124 of FTTH network 120 a. PWHE 182 may be used to establishconnection 180 from aggregation router 124 of FTTH network 120 a to BNGrouter 154 of control plane data center 150. Specifically, PHWE 182 maybe used to establish connection 180 from aggregation router 124 of FTTHnetwork 120 a to aggregation router 134 of IP/MPLS aggregation network130, from aggregation router 134 of IP/MPLS aggregation network 130 toaggregation router 144 of IP/MPLS core network 140, and from aggregationrouter 144 of IP/MPLS core network 140 to BNG router 154 of controlplane data center 150.

Similarly, an end-user may connect from CPE 110 d to FTTH network 120 busing OLT 122, and OLT 122 may establish a connection to aggregationrouter 124 of FTTH network 120 b. PWHE 172 may be used to establishconnection 170 from aggregation router 124 of FTTH network 120 b to BNGrouter 154 of control plane data center 150. Specifically, PHWE 172 maybe used to establish connection 170 from aggregation router 124 of FTTHnetwork 120 b to aggregation router 134 of IP/MPLS aggregation network130, from aggregation router 134 of IP/MPLS aggregation network 130 toaggregation router 144 of IP/MPLS core network 140, and from aggregationrouter 144 of IP/MPLS core network 140 to BNG router 154 of controlplane data center 150.

PPPoE is a type of broadband connection that provides authentication(e.g., username and password) in addition to data transport. IPoE is amethod of delivering an IP payload over an Ethernet-based access networkor an access network using bridged Ethernet over Asynchronous TransferMode (ATM) without using PPPoE. Each subscriber (e.g., an applicationrunning on CPE 110) connects to one or more networks (e.g., FTTH network120) of system 100 by a logical session. A PPPoE subscriber session maybe established using the PPP protocol that runs between CPE 110 and BNGrouter 154. An IPoE subscriber session may be established using IPprotocol that runs between CPE 110 and BNG router 154.

IP addressing may be performed using a DHCP. DHCP is used to assigncustomer premise host IP addresses in a LAN environment. A relay agentinformation option may be inserted by the DHCP relay agent whenforwarding client-originated DHCP packets to a DHCP node (e.g., SMFrouter 155). Nodes recognizing the relay agent information option mayuse the information to implement IP address or other parameterassignment policies. The relay agent information option is organized asa single DHCP option that includes one or more sub-options that conveyinformation known by the relay agent. The initial sub-options aredefined for a relay agent that is co-located in a public circuit accessunit. These include a “circuit ID” that identifies the incoming circuitand a “remote ID” that identifies the remote host end (e.g., ahigh-speed modem) of the circuit. The relay agent (e.g., a DHCPv4/v6relay agent) or an access-aggregation device may be used to discover theremote ID. For example, the relay agent or the access-aggregation devicemay snoop the DHCPv4/v6 or PPPoE packets to append the packets with theremote ID and/or the circuit ID prior to relaying them to the DHCP node.The remote ID and/or the circuit ID may be represented as a decimalvalue, a string value, or a hostname.

System 100 may leverage end-user parameters for authorization and/orauthentication. End-user parameters are used to identify the end-user.For PPPoE, the identification of the end-user is a username. For IPoE,the identification of the end-user is a MAC address. System 100 mayleverage access parameters to determine how to slice the NFs. Forexample, broadband deployments may leverage the remote ID and thecircuit ID of the access network to provide a selection of one or moreof the following parameters: access, QoS, policy enforcement, prepaidonline charging, offline charging, etc.

System 100 may leverage authentication parameters to determine how toslice the NFs. Authentication parameters include credentials of theend-users. For PPPoE broadband users, the authentication protocols thatcarry the username and password are the PAP and the CHAP. For IPoEbroadband users, DHCPv4 and DHCPv6 carry authentication parameters forvarious protocols (e.g., PAP, CHAP, Extensible Authentication Protocol(EAP), etc.). For fixed-wireless users, DHCPv4 and DHCPv6 carryauthentication parameters for various protocols (e.g., EAP).

In operation, BNG router 154 of control plane data center 150 isconfigured to act as a BNG. BNG router 154 establishes connection 180between CPE 110 a and the BNG. Connection 180 of system 100 isestablished through aggregation routers 124 of FTTH network 120 a,aggregation routers 134 of IP/MPLS aggregation network 130, andaggregation routers 144 of IP/MPLS core network 140. PWHE 182 is used toexpose end-user L2 connectivity to BNG router 154. BNG router 154receives end-user parameters (e.g., a username, a MAC address, etc.)from CPE 110 and access parameters (e.g., a remote ID and a circuit ID)from access FTTH network 120 a. BNG router 154 introduces the end-userand access parameters to one or more 5G NFs by interacting with one ormore SBIs 152 a. The 5G NFs may include NSSF, NRF, PCF, CHF, AUSF, andthe like. BNG router 154 provides CPE 110 a access to the one or more 5GNFs in response to communicating the end-user and access parameters tothe one or more 5G NFs. As such, system 100 provides end-users access to5G NFs while maintaining interoperability with the 5G architecture.

Although FIG. 1 illustrates a particular arrangement of CPEs 110, FTTHnetworks 120, IP/MPLS aggregation network 130, IP/MPLS core network 140,control plane data center 150, and user plane data center 160, thisdisclosure contemplates any suitable arrangement of CPEs 110, FTTHnetworks 120, IP/MPLS aggregation network 130, IP/MPLS core network 140,control plane data center 150, and user plane data center 160. AlthoughFIG. 1 illustrates a particular number of CPEs 110, FTTH networks 120,IP/MPLS aggregation networks 130, IP/MPLS core networks 140, controlplane data centers 150, and user plane data centers 160, this disclosurecontemplates any suitable number of CPEs 110, FTTH networks 120, IP/MPLSaggregation networks 130, IP/MPLS core networks 140, control plane datacenters 150, and user plane data centers 160. For example, system 100may include more than one BNG router 154.

FIG. 2 illustrates an example system 200 for integrating a BNG into a 5Gnetwork using an N3IWF. System 200 or portions thereof may be associatedwith an entity, which may include any entity, such as a business orcompany (e.g., a service provider) that integrates the BNG into a 5Gnetwork using the N3IWF. The components of system 200 may include anysuitable combination of hardware, firmware, and software. For example,the components of system 200 may use one or more elements of thecomputer system of FIG. 4 .

System 200 includes CPE 210, a digital subscriber line accessmultiplexer (DSLAM) 220, an aggregate network 230, a BNG-CP 240, anN3IWF 250, a UPF 252, a data network (DN) 254, a BNG-UP 260, a UPF 262,a local DN 264, an SMF/PGW-C 270, and interfaces 280. One or morenetworks of system 200 include any type of network that facilitatescommunication between components of system 200.

CPE 210 of system 200 is any telecommunications hardware located at thehome or business of a user (e.g., a subscriber). CPE 210 may be anyterminal and associated equipment located at a subscriber's premises andconnected with a carrier's telecommunication circuit. CPE 210 may allowusers to access providers' communication services and distribute them ina residence or enterprise with a LAN. CPE 210 may include devices suchas telephones, routers, network switches, RGs, STBs, PCs, fixed mobileconvergence products, home networking adapters, and Internet accessgateways. In the illustrated embodiment of FIG. 2 , CPE 210 represents atriple play service in telecommunications that includes voice (phone),video (STB/TV), and data (PC). Individual devices of CPE 210 may connectto HG. In certain embodiments, HG is a router that provides networkaccess between LAN hosts to a larger network. HG may provide networkaccess via a modem. In the illustrated embodiment of FIG. 2 , HGconnects CPE 210 to DSLAM 220.

DSLAM 220 is a network device that receives signals from multiplecustomer Digital Subscriber Line (DSL) connections and puts the signalson a high-speed backbone line using multiplexing techniques. In certainembodiments, multiple HGs may connect to a single DSLAM 220. DSLAM 220sends traffic received from CPE 210 to aggregation network 230.Aggregation network 230 is located between DSLAM 220 and BNG-CP 240.Aggregation network 230 communicates the traffic received from CPE 210to BNG-CP 240.

BNG-CP 240 is a network component located in a control plane thatprovides BNG functionality. As illustrated in FIG. 2 , BNG-CP 240 islocated between aggregation network 230 and N3IWF 250. BNG-CP 240interacts with N3IWF 250 over a secure channel communication (e.g., anIPSec tunnel). BNG-CP 240 may communicate end-user parameters (e.g.,username or MAC address), access parameters (e.g., remote ID and circuitID), and/or authentication parameters to N3IWF 250 using Internet KeyExchange version 2 (IKEv2) Protocol.

N3IWF 250 is an IPSec gateway that is used for integrating non-3GPPaccess types into the 5G standalone (SA) core. N3IWF 250 may be used fornon-3GPP access types such as WI-FI and fixed-line integration into the5G SA core. N3IWF 250 terminates the IKEv2 and IPSec protocols with theuser equipment and relays over the N3 interface the information neededto authenticate the user equipment and authorize its access to the 5Gcore network. N3IWF 250 communicates, via interface N3, with UPF 252.UPF 252 is a network component that supports UPF functionality. UPF 252provides a forwarding engine for user traffic. UPF 252 communicates withDN 254 over interface N6. DN 254 may provide operator services, Internetaccess, and/or third party services.

N3IWF 250 communicates with SMF/PGW-C 270 over interface S2B. SMF/PGW-C270 is a network component that provides SMF and/or PGW functionality.The SMF is responsible for session management with individual functionsbeing supported on a per session basis. The SMF may allocate IPaddresses to user equipment and select and control the UPF (e.g., UPF252 or UPF 62) for data transfer. SMF/PGW-C 270 may act as the externalpoint for all communication related to the various services offered andenabled in the user plane and how the policy and charging treatment forthese services is applied. S2B interface is a reference point thatconnects N3IWF 250 and SMF/PGW-C 270. SMF/PGW-C 270 may utilizeinterfaces 280 (e.g., SBIs 280 a and LTE interfaces 280 b). For example,SMF/PGW-C 270 may use SBIs 280 a to expose the functionality of the NFs.

Sending all traffic received by BNG-CP 240 to N3IWF 250 over the IPSectunnel may slow down the traffic due to encryption/decryption. Incertain embodiments, traffic may be offloaded from BNG-CP 240 such thatthe traffic is not sent to N3IWF 250 over the IPSec tunnel. For example,the traffic may be offloaded to BNG-UP 260. BNG-CP 240 may program flowsto local DN 264 directly on BNG-UP 260 using N3IWF 250. BNG-UP 260 is anetwork component located in a user plane that provides BNGfunctionality. BNG-UP 260 includes a UPF branching point to UPF 262.BNG-UP 260 communicates with BNG-CP 250 and SMF/PGW-C 270 using PFCP.BNG-UP 260 supports an N4 interface, which can be controlled by SMF.BNG-UP 260 communicates with UPF 262 using interface N9, and UPF 262communicates with local DN 264 using interface N6. Local DN 264 is a DNthat is accessible by CPE 210 only in specific locations. Local DN 264may provide operator services, Internet access, and/or third partyservices.

In certain embodiments, one or more of the following 5G NFs are modifiedbased on end-user parameters (e.g., a username or a MAC address)received from CPE 210 and access parameters (e.g., a remote ID and acircuit ID) received from aggregation network 230: NSSF, NRF, PCF, CHF,and AUSF. For example, CPE 210 may communicate the end-user parametersto SBIs 280 a using DSLAM 220, BNG-CP 240, N3IWF 250, and SMG/PGW-C 270,and access aggregation network 230 may communicate access parameters toSBIs 280 a using BNG-CP 240, N3IWF 250, and SMG/PGW-C 270. SBIs 280 amay then expose the functionality of one or more 5G NFs using theend-user parameters and the access parameters. In some embodiments, theBNG functionality of BNG-CP 240 is introduced as its own NF. The BNG NFmay define a corresponding SBI 180 a and use expose its functionalitythrough the corresponding SBI 180 a.

Although FIG. 2 illustrates a particular arrangement of CPE 210, DSLAM220, aggregate network 230, BNG-CP 240, N3IWF 250, UPF 252, DN 254,BNG-UP 260, UPF 262, local DN 264, SMF/PGW-C 270, and interfaces 280,this disclosure contemplates any suitable arrangement of CPE 210, DSLAM220, aggregate network 230, BNG-CP 240, N3IWF 250, UPF 252, DN 254,BNG-UP 260, UPF 262, local DN 264, SMF/PGW-C 270, and interfaces 280.Although FIG. 1 illustrates a particular number of CPEs 210, DSLAMs 210,aggregate networks 230, BNG-CPs 240, N3IWFs 250, UPFs 252, DNs 254,BNG-UPs 260, UPFs 262, local DNs 264, SMF/PGW-Cs 270, and interfaces280, this disclosure contemplates any suitable number of CPEs 210,DSLAMs 210, aggregate networks 230, BNG-CPs 240, N3IWFs 250, UPFs 252,DNs 254, BNG-UPs 260, UPFs 262, local DNs 264, SMF/PGW-Cs 270, andinterfaces 280.

FIG. 3 illustrates an example method 300 for integrating a BNG into a 5Gnetwork. Method 300 begins at step 310. At step 320, a router isconfigured to act as a BNG. For example, BNG router 154 of FIG. 1 ,which is centrally located in control plane data center 150, may beconfigured to act as a BNG. As another example, BNG-CP 240 of FIG. 2 ,which is located in a control plane between aggregation network 230 andN3IWF 250, may be configured to act as a BNG. Method 300 then moves fromstep 320 to step 330.

At step 330 of method 300, the BNG router establishes a connectionbetween CPE and BNG using 5G network SBIs. For example, BNG router 154of FIG. 1 may use SBIs 152 a to establish connection 170 between CPE 110d and BNG router 154 through FTTH network 120 b, IP/MPLS aggregationnetwork 130, and IP/MPLS core network 140, and PWHE 172 may be used toexpose end-user L2 connectivity to BNG router 154. As another example,BNG router 154 of FIG. 1 may use SBIs 152 a to establish connection 180between CPE 110 a and BNG router 154 through FTTH network 120 a, IP/MPLSaggregation network 130, and IP/MPLS core network 140, and PWHE 182 maybe used to expose end-user Layer 2 (12) connectivity to BNG router 154.As still another example, BNG-CP 240 of FIG. 2 may use SBIs 280 a toestablish a connection between CPE 210 and BNG-CP 240 through DSLAM 220and aggregation network 230. Method 300 then moves from step 330 to step340.

At step 340 of method 300, the BNG router receives end-user parameters(e.g., a username, a MAC address, etc.) and access parameters (e.g., aremote ID and a circuit ID). For example, BNG router 154 of FIG. 1 mayreceive end-user parameters (e.g., a username, a MAC address, etc.)associated with CPE 110 a and access parameters (e.g., a remote ID and acircuit ID) associated with connection 180. As another example, BNG-CP240 of FIG. 2 may receive end-user parameters (e.g., a username, a MACaddress, etc.) associated with CPE 210 and access parameters (e.g., aremote ID and a circuit ID) associated with the connection between CPE210 and BNG-CP 240. Method 300 then moves from step 340 to step 350.

At step 350, method 300 determines whether the BNG router is centrallylocated within a control plane data center. For example, method 300 maydetermine that the BNG router is centrally located within a controlplane data center as illustrated in FIG. 1 . If the BNG router iscentrally located within the control plane data center, method 300 movesfrom step 350 to step 360, where the BNG router introduces the end-userand access parameters to one or more 5G NFs by interacting with one ormore SBIs. For example, BNG router 154 of FIG. 1 may introduce theend-user and access parameters to one or more 5G NFs by interacting withone or more SBIs 152 a. The 5G NFs may include NSSF, NRF, PCF, CHF,AUSF, and the like. If the BNG router is not centrally located withinthe control plane data center, method 300 moves from step 350 to step370, where the BNG router introduces the end-user and access parametersto one or more 5G NFs using an N3IWF. For example, BNG-CP 240 of FIG. 2may communicate the end-user and access parameters to N3IWF 250 using anIKEv2 Protocol so that N3IWF 250 can introduce the end-user and accessparameters to one or more 5G NFs using SBIs 280 a. Method 300 then movesfrom steps 360 and 370 to step 380.

At step 380 of method 300, the BNG router provides CPE access to the oneor more 5G NFs. For example, BNG router 154 of FIG. 1 may provide CPE110 a access to the one or more 5G NFs in response to communicating theend-user and access parameters to the one or more 5G NFs using SBIs 152a. As another example, BNG-CP 240 of FIG. 2 may provide CPE 210 accessto the one or more 5G NFs in response to communicating the end-user andaccess parameters to the one or more 5G NFs using N3IWF 250. Method 300then moves from step 380 to step 390, where method 300 ends. As such,method 300 provides end-users access to 5G NFs while maintaininginteroperability with the 5G architecture.

Although this disclosure describes and illustrates an example method 300for integrating a BNG into a 5G network including the particular stepsof the method of FIG. 3 , this disclosure contemplates any suitablemethod 300 for integrating the BNG into a 5G network, including anysuitable steps, which may include all, some, or none of the steps of themethod of FIG. 3 , where appropriate. Although this disclosure describesand illustrates particular steps of method 300 of FIG. 3 as occurring ina particular order, this disclosure contemplates any suitable steps ofmethod 300 of FIG. 3 occurring in any suitable order. Although thisdisclosure describes and illustrates particular components, devices, orsystems carrying out particular steps of method 300 of FIG. 3 , thisdisclosure contemplates any suitable combination of any suitablecomponents, devices, or systems carrying out any suitable steps ofmethod 300 of FIG. 3 .

FIG. 4 illustrates an example computer system 400. In particularembodiments, one or more computer systems 400 perform one or more stepsof one or more methods described or illustrated herein. In particularembodiments, one or more computer systems 400 provide functionalitydescribed or illustrated herein. In particular embodiments, softwarerunning on one or more computer systems 400 performs one or more stepsof one or more methods described or illustrated herein or providesfunctionality described or illustrated herein. Particular embodimentsinclude one or more portions of one or more computer systems 400.Herein, reference to a computer system may encompass a computing device,and vice versa, where appropriate. Moreover, reference to a computersystem may encompass one or more computer systems, where appropriate.

This disclosure contemplates any suitable number of computer systems400. This disclosure contemplates computer system 400 taking anysuitable physical form. As example and not by way of limitation,computer system 400 may be an embedded computer system, a system-on-chip(SOC), a single-board computer system (SBC) (such as, for example, acomputer-on-module (COM) or system-on-module (SOM)), a desktop computersystem, a laptop or notebook computer system, an interactive kiosk, amainframe, a mesh of computer systems, a mobile telephone, a personaldigital assistant (PDA), a server, a tablet computer system, anaugmented/virtual reality device, or a combination of two or more ofthese. Where appropriate, computer system 400 may include one or morecomputer systems 400; be unitary or distributed; span multiplelocations; span multiple machines; span multiple data centers; or residein a cloud, which may include one or more cloud components in one ormore networks. Where appropriate, one or more computer systems 400 mayperform without substantial spatial or temporal limitation one or moresteps of one or more methods described or illustrated herein. As anexample and not by way of limitation, one or more computer systems 400may perform in real time or in batch mode one or more steps of one ormore methods described or illustrated herein. One or more computersystems 400 may perform at different times or at different locations oneor more steps of one or more methods described or illustrated herein,where appropriate.

In particular embodiments, computer system 400 includes a processor 402,memory 404, storage 406, an input/output (I/O) interface 408, acommunication interface 410, and a bus 412. Although this disclosuredescribes and illustrates a particular computer system having aparticular number of particular components in a particular arrangement,this disclosure contemplates any suitable computer system having anysuitable number of any suitable components in any suitable arrangement.

In particular embodiments, processor 402 includes hardware for executinginstructions, such as those making up a computer program. As an exampleand not by way of limitation, to execute instructions, processor 402 mayretrieve (or fetch) the instructions from an internal register, aninternal cache, memory 404, or storage 406; decode and execute them; andthen write one or more results to an internal register, an internalcache, memory 404, or storage 406. In particular embodiments, processor402 may include one or more internal caches for data, instructions, oraddresses. This disclosure contemplates processor 402 including anysuitable number of any suitable internal caches, where appropriate. Asan example and not by way of limitation, processor 402 may include oneor more instruction caches, one or more data caches, and one or moretranslation lookaside buffers (TLBs). Instructions in the instructioncaches may be copies of instructions in memory 404 or storage 406, andthe instruction caches may speed up retrieval of those instructions byprocessor 402. Data in the data caches may be copies of data in memory404 or storage 406 for instructions executing at processor 402 tooperate on; the results of previous instructions executed at processor402 for access by subsequent instructions executing at processor 402 orfor writing to memory 404 or storage 406; or other suitable data. Thedata caches may speed up read or write operations by processor 402. TheTLBs may speed up virtual-address translation for processor 402. Inparticular embodiments, processor 402 may include one or more internalregisters for data, instructions, or addresses. This disclosurecontemplates processor 402 including any suitable number of any suitableinternal registers, where appropriate. Where appropriate, processor 402may include one or more arithmetic logic units (ALUs); be a multi-coreprocessor; or include one or more processors 402. Although thisdisclosure describes and illustrates a particular processor, thisdisclosure contemplates any suitable processor.

In particular embodiments, memory 404 includes main memory for storinginstructions for processor 402 to execute or data for processor 402 tooperate on. As an example and not by way of limitation, computer system400 may load instructions from storage 406 or another source (such as,for example, another computer system 400) to memory 404. Processor 402may then load the instructions from memory 404 to an internal registeror internal cache. To execute the instructions, processor 402 mayretrieve the instructions from the internal register or internal cacheand decode them. During or after execution of the instructions,processor 402 may write one or more results (which may be intermediateor final results) to the internal register or internal cache. Processor402 may then write one or more of those results to memory 404. Inparticular embodiments, processor 402 executes only instructions in oneor more internal registers or internal caches or in memory 404 (asopposed to storage 406 or elsewhere) and operates only on data in one ormore internal registers or internal caches or in memory 404 (as opposedto storage 406 or elsewhere). One or more memory buses (which may eachinclude an address bus and a data bus) may couple processor 402 tomemory 404. Bus 412 may include one or more memory buses, as describedbelow. In particular embodiments, one or more memory management units(MMUs) reside between processor 402 and memory 404 and facilitateaccesses to memory 404 requested by processor 402. In particularembodiments, memory 404 includes random access memory (RAM). This RAMmay be volatile memory, where appropriate. Where appropriate, this RAMmay be dynamic RAM (DRAM) or static RAM (SRAM). Moreover, whereappropriate, this RAM may be single-ported or multi-ported RAM. Thisdisclosure contemplates any suitable RAM. Memory 404 may include one ormore memories 404, where appropriate. Although this disclosure describesand illustrates particular memory, this disclosure contemplates anysuitable memory.

In particular embodiments, storage 406 includes mass storage for data orinstructions. As an example and not by way of limitation, storage 406may include a hard disk drive (HDD), a floppy disk drive, flash memory,an optical disc, a magneto-optical disc, magnetic tape, or a UniversalSerial Bus (USB) drive or a combination of two or more of these. Storage406 may include removable or non-removable (or fixed) media, whereappropriate. Storage 406 may be internal or external to computer system400, where appropriate. In particular embodiments, storage 406 isnon-volatile, solid-state memory. In particular embodiments, storage 406includes read-only memory (ROM). Where appropriate, this ROM may bemask-programmed ROM, programmable ROM (PROM), erasable PROM (EPROM),electrically erasable PROM (EEPROM), electrically alterable ROM (EAROM),or flash memory or a combination of two or more of these. Thisdisclosure contemplates mass storage 406 taking any suitable physicalform. Storage 406 may include one or more storage control unitsfacilitating communication between processor 402 and storage 406, whereappropriate. Where appropriate, storage 406 may include one or morestorages 406. Although this disclosure describes and illustratesparticular storage, this disclosure contemplates any suitable storage.

In particular embodiments, I/O interface 408 includes hardware,software, or both, allowing one or more interfaces for communicationbetween computer system 400 and one or more I/O devices. Computer system400 may include one or more of these I/O devices, where appropriate. Oneor more of these I/O devices may enable communication between a personand computer system 400. As an example and not by way of limitation, anI/O device may include a keyboard, keypad, microphone, monitor, mouse,printer, scanner, speaker, still camera, stylus, tablet, touch screen,trackball, video camera, another suitable I/O device or a combination oftwo or more of these. An I/O device may include one or more sensors.This disclosure contemplates any suitable I/O devices and any suitableI/O interfaces 408 for them. Where appropriate, I/O interface 408 mayinclude one or more device or software drivers enabling processor 402 todrive one or more of these I/O devices. I/O interface 408 may includeone or more I/O interfaces 408, where appropriate. Although thisdisclosure describes and illustrates a particular I/O interface, thisdisclosure contemplates any suitable I/O interface.

In particular embodiments, communication interface 410 includeshardware, software, or both allowing one or more interfaces forcommunication (such as, for example, packet-based communication) betweencomputer system 400 and one or more other computer systems 400 or one ormore networks. As an example and not by way of limitation, communicationinterface 410 may include a network interface controller (NIC) ornetwork adapter for communicating with an Ethernet or other wire-basednetwork or a wireless NIC (WNIC) or wireless adapter for communicatingwith a wireless network, such as a WI-FI network. This disclosurecontemplates any suitable network and any suitable communicationinterface 410 for it. As an example and not by way of limitation,computer system 400 may communicate with an ad hoc network, a personalarea network (PAN), a LAN, a WAN, a MAN, or one or more portions of theInternet or a combination of two or more of these. One or more portionsof one or more of these networks may be wired or wireless. As anexample, computer system 400 may communicate with a wireless PAN (WPAN)(such as, for example, a BLUETOOTH WPAN), a WI-FI network, a WI-MAXnetwork, a cellular telephone network (such as, for example, a GlobalSystem for Mobile Communications (GSM) network, a LTE network, or a 5Gnetwork), or other suitable wireless network or a combination of two ormore of these. Computer system 400 may include any suitablecommunication interface 410 for any of these networks, whereappropriate. Communication interface 410 may include one or morecommunication interfaces 410, where appropriate. Although thisdisclosure describes and illustrates a particular communicationinterface, this disclosure contemplates any suitable communicationinterface.

In particular embodiments, bus 412 includes hardware, software, or bothcoupling components of computer system 400 to each other. As an exampleand not by way of limitation, bus 412 may include an AcceleratedGraphics Port (AGP) or other graphics bus, an Enhanced Industry StandardArchitecture (EISA) bus, a front-side bus (FSB), a HYPERTRANSPORT (HT)interconnect, an Industry Standard Architecture (ISA) bus, an INFINIBANDinterconnect, a low-pin-count (LPC) bus, a memory bus, a Micro ChannelArchitecture (MCA) bus, a Peripheral Component Interconnect (PCI) bus, aPCI-Express (PCIe) bus, a serial advanced technology attachment (SATA)bus, a Video Electronics Standards Association local (VLB) bus, oranother suitable bus or a combination of two or more of these. Bus 412may include one or more buses 412, where appropriate. Although thisdisclosure describes and illustrates a particular bus, this disclosurecontemplates any suitable bus or interconnect.

Herein, a computer-readable non-transitory storage medium or media mayinclude one or more semiconductor-based or other integrated circuits(ICs) (such, as for example, field-programmable gate arrays (FPGAs) orapplication-specific ICs (ASICs)), hard disk drives (HDDs), hybrid harddrives (HHDs), optical discs, optical disc drives (ODDs),magneto-optical discs, magneto-optical drives, floppy diskettes, floppydisk drives (FDDs), magnetic tapes, solid-state drives (SSDs),RAM-drives, SECURE DIGITAL cards or drives, any other suitablecomputer-readable non-transitory storage media, or any suitablecombination of two or more of these, where appropriate. Acomputer-readable non-transitory storage medium may be volatile,non-volatile, or a combination of volatile and non-volatile, whereappropriate.

Herein, “or” is inclusive and not exclusive, unless expressly indicatedotherwise or indicated otherwise by context. Therefore, herein, “A or B”means “A, B, or both,” unless expressly indicated otherwise or indicatedotherwise by context. Moreover, “and” is both joint and several, unlessexpressly indicated otherwise or indicated otherwise by context.Therefore, herein, “A and B” means “A and B, jointly or severally,”unless expressly indicated otherwise or indicated otherwise by context.

The scope of this disclosure encompasses all changes, substitutions,variations, alterations, and modifications to the example embodimentsdescribed or illustrated herein that a person having ordinary skill inthe art would comprehend. The scope of this disclosure is not limited tothe example embodiments described or illustrated herein. Moreover,although this disclosure describes and illustrates respectiveembodiments herein as including particular components, elements,feature, functions, operations, or steps, any of these embodiments mayinclude any combination or permutation of any of the components,elements, features, functions, operations, or steps described orillustrated anywhere herein that a person having ordinary skill in theart would comprehend. Furthermore, reference in the appended claims toan apparatus or system or a component of an apparatus or system beingadapted to, arranged to, capable of, configured to, enabled to, operableto, or operative to perform a particular function encompasses thatapparatus, system, component, whether or not it or that particularfunction is activated, turned on, or unlocked, as long as thatapparatus, system, or component is so adapted, arranged, capable,configured, enabled, operable, or operative. Additionally, although thisdisclosure describes or illustrates particular embodiments as providingparticular advantages, particular embodiments may provide none, some, orall of these advantages.

The embodiments disclosed herein are only examples, and the scope ofthis disclosure is not limited to them. Particular embodiments mayinclude all, some, or none of the components, elements, features,functions, operations, or steps of the embodiments disclosed herein.Embodiments according to the disclosure are in particular disclosed inthe attached claims directed to a method, a storage medium, a system anda computer program product, wherein any feature mentioned in one claimcategory, e.g. method, can be claimed in another claim category, e.g.system, as well. The dependencies or references back in the attachedclaims are chosen for formal reasons only. However, any subject matterresulting from a deliberate reference back to any previous claims (inparticular multiple dependencies) can be claimed as well, so that anycombination of claims and the features thereof are disclosed and can beclaimed regardless of the dependencies chosen in the attached claims.The subject-matter which can be claimed comprises not only thecombinations of features as set out in the attached claims but also anyother combination of features in the claims, wherein each featurementioned in the claims can be combined with any other feature orcombination of other features in the claims. Furthermore, any of theembodiments and features described or depicted herein can be claimed ina separate claim and/or in any combination with any embodiment orfeature described or depicted herein or with any of the features of theattached claims.

What is claimed is:
 1. A router, comprising: one or more processors; andone or more computer-readable non-transitory storage media coupled tothe one or more processors and comprising instructions that, whenexecuted by the one or more processors, cause the router to performoperations comprising: configuring the router to act as a BroadbandNetwork Gateway (BNG); establishing a connection between customerpremise equipment (CPE) and the BNG; receiving end-user and accessparameters; communicating the end-user and access parameters to one ormore 5G Network Functions (NFs) by interacting with one or more servicebased interfaces (SBIs); allowing the CPE access to the one or more 5GNFs in response to communicating the end-user and access parameters tothe one or more 5G NFs; and programming Quality of Service (QoS) flowsusing a packet forwarding control protocol (PFCP).
 2. The router ofclaim 1, wherein the one or more 5G NFs comprise one or more of thefollowing NFs: a Network Slice Selection Function (NSSF); a NetworkRepository Function (NRF); a Policy Control Function (PCF); a ChargingFunction (CHF); and an Authentication Server Function (AUSF).
 3. Therouter of claim 1, wherein: the end-user parameters comprise end-useridentifications; and the access parameters comprise at least one ofremote IDs and circuit IDs.
 4. The router of claim 1, wherein: therouter is located in a control plane data center; and the control planedata center is segregated from a user plane data center.
 5. The routerof claim 1, wherein: the router is located between a digital subscriberline access multiplexer (DSLAM) and a Non-3GPP Interworking Function(N3IWF); the router communicates with the N3IWF via an Internet ProtocolSecurity (IPSec) tunnel; and the router interacts with the one or moreSBIs via the N3IWF.
 6. The router of claim 1, wherein the connectionbetween the CPE and the BNG passes through a fiber-to-the-home (FTTH)network.
 7. The router of claim 1, the operations further comprisingexposing end-user Layer 2 (L2) connectivity to the BNG using PseudowireHeadend (PWHE).
 8. A method, comprising: configuring a router to act asa Broadband Network Gateway (BNG); establishing, by the router, aconnection between customer premise equipment (CPE) and the BNG;receiving, by the router, end-user and access parameters; communicating,by the router, the end-user and access parameters to one or more 5GNetwork Functions (NFs) by interacting with one or more service basedinterfaces (SBIs); and allowing, by the router, the CPE access to theone or more 5G NFs in response to communicating the end-user and accessparameters to the one or more 5G NFs; and programming Quality of Service(QoS) flows using a packet forwarding control protocol (PFCP).
 9. Themethod of claim 8, wherein the one or more 5G NFs comprise one or moreof the following NFs: a Network Slice Selection Function (NSSF); aNetwork Repository Function (NRF); a Policy Control Function (PCF); aCharging Function (CHF); and an Authentication Server Function (AUSF).10. The method of claim 8, wherein: the end-user parameters compriseend-user identifications; and the access parameters comprise at leastone of remote IDs and circuit IDs.
 11. The method of claim 8, wherein:the router is located in a control plane data center; and the controlplane data center is segregated from a user plane data center.
 12. Themethod of claim 8, wherein: the router is located between a digitalsubscriber line access multiplexer (DSLAM) and a Non-3GPP InterworkingFunction (N3IWF); the router communicates with the N3IWF via an InternetProtocol Security (IPSec) tunnel; and the router interacts with the oneor more SBIs via the N3IWF.
 13. The method of claim 8, wherein theconnection between the CPE and the BNG passes through afiber-to-the-home (FTTH) network.
 14. The method of claim 8, furthercomprising exposing end-user Layer 2 (L2) connectivity to the BNG usingPseudowire Headend (PWHE).
 15. One or more computer-readablenon-transitory storage media embodying instructions that, when executedby a processor, cause the processor to perform operations comprising:configuring a router to act as a Broadband Network Gateway (BNG);establishing a connection between customer premise equipment (CPE) andthe BNG; receiving end-user and access parameters; communicating theend-user and access parameters to one or more 5G Network Functions (NFs)by interacting with one or more service based interfaces (SBIs);allowing the CPE access to the one or more 5G NFs in response tocommunicating the end-user and access parameters to the one or more 5GNFs; and programming Quality of Service (QoS) flows using a packetforwarding control protocol (PFCP).
 16. The one or morecomputer-readable non-transitory storage media of claim 15, wherein theone or more 5G NFs comprise one or more of the following NFs: a NetworkSlice Selection Function (NSSF); a Network Repository Function (NRF); aPolicy Control Function (PCF); a Charging Function (CHF); and anAuthentication Server Function (AUSF).
 17. The one or morecomputer-readable non-transitory storage media of claim 15, wherein: theend-user parameters comprise end-user identifications; and the accessparameters comprise at least one of remote IDs and circuit IDs.
 18. Theone or more computer-readable non-transitory storage media of claim 15,wherein: the router is located in a control plane data center; and thecontrol plane data center is segregated from a user plane data center.19. The one or more computer-readable non-transitory storage media ofclaim 15, wherein: the router is located between a digital subscriberline access multiplexer (DSLAM) and a Non-3GPP Interworking Function(N3IWF); the router communicates with the N3IWF via an Internet ProtocolSecurity (IPSec) tunnel; and the router interacts with the one or moreSBIs via the N3IWF.
 20. The one or more computer-readable non-transitorystorage media of claim 15, wherein the connection between the CPE andthe BNG passes through a fiber-to-the-home (FTTH) network.