Solutions for routing an emergency call made through a non-terrestrial network (NTN) include: receiving, by an NTN, from a user equipment (UE), an emergency call; not selecting, by the NTN, a public safety answering point (PSAP) for routing the emergency call; selecting, by the NTN, a packet data network (PDN) gateway (GW) in a terrestrial network (TN) to which to route the emergency call; and routing the emergency call to the selected PDN GW. Solutions also include: receiving, by the TN, from the NTN, the emergency call placed by the UE that is using the NTN; determining, by the TN, a location of the UE; selecting, by the TN, a PSAP using the location of the UE; and routing the emergency call to the selected PSAP.
An internet protocol (IP) multimedia core subsystem (IMS) of a telecommunications network includes an interconnection border control function (IBCF). The system can receive a request to connect a particular voice call or messaging over a voice over IP (VoIP) network. In response to the request, the IBCF can send a location information request (LIR) to a home subscriber server (HSS) of the telecommunications network. The HSS and the IBCF can be in direct communication with each other via an HSS/IBCF interface. The LIR can include a request for a subscriber status associated with a user associated with a terminating device. The IBCF can receive a location information answer (LIA) from the HSS. The LIA can indicate whether the user is a subscriber of the telecommunications network. In response to receiving the LIA, the system can determine whether to allow the IMS to establish a session for the particular voice call.
Aspects of the present disclosure relate to implementing on-device latency detection into operating system (OS)-level functionality of a client device in client-server and/or network communications. An example method includes extracting packet headers from data-connection packets transmitted between a local application client and a remote application server. Data records including packet headers and timestamps are stored. Data records for related data-connection packets (e.g., queries and responses, handshakes) are identified via the packet headers, and timestamps of the identified data records are compared to determine latency measurements. Latency measurements are then distributed to relevant application clients locally residing on an upper layer. The latency measurements are presented in dashboard display to an end user and used for server-side dynamic load balancing.
Solutions for intelligent allocation of internet protocol (IP) multimedia system (IMS) resources include: receiving, at a first node, over a wireless network, a request from a client device for a data traffic session passing through an internet protocol (IP) multimedia subsystem (IMS), the client device connected to the wireless network via an air interface; determining, by the first node, a priority of the client device for receiving enhanced services for the data traffic session, the enhanced services requiring a higher bandwidth than non-enhanced services; based on at least the priority of the client device and (in some examples) loading of the wireless network, determining whether the enhanced services are to be allocated for the data traffic session; and based on at least determining that the enhanced services are not to be allocated for the data traffic session, instructing the client device to use non-enhanced services for the data traffic session.
Solutions for dynamically toggling physical downlink control channel (PDCCH) interleaving include: a base station receiving radio measurement reports from a user equipment (UE); based on at least the radio measurement reports, determining that radio reception by the UE meets a threshold; based on at least meeting the threshold, ceasing to interleave data on the PDCCH. The base station continues to monitor radio measurement reports from the UE, and based on at least the radio measurement reports indicating that radio reception by the UE meets a second threshold, resuming interleaving data transmitted on the PDCCH. In some examples, UEs are managed in broadcast groups (e.g., UEs within a common in a cell sector), and interleaving or ceasing interleaving is based on a determination of whether all UEs in the broadcast group are able to forego interleaving.
Systems, methods, and devices that relate to geo-location determination of roaming Wi-Fi calling are disclosed. In one example aspect, a method for wireless communication includes transmitting, by a first network element in a home network, a message to a second network element indicating an establishment of a roaming voice session using a non-cellular network access technology. The message includes an Internet Protocol (IP) address allocated to a terminal device. The method also includes determining, by the first network element in the home network, a geographical location of the roaming voice session based on the IP address allocated to the terminal device.
H04W 8/02 - Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
The disclosed system causes a UE to determine a signal strength associated with a communication provided to the UE by a base station. Based on the signal strength, the system causes the UE to determine whether to establish a connection with the base station. Upon determining to not establish the connection with the base station, the system sends a request to the UE to connect to a repeater that includes a first radio and a second radio. The system establishes a communication channel between the repeater and the UE, wherein the communication channel enables the low-power communication of information. The system communicates the information between the first radio and the second radio, encodes the information into a high-power communication, and sends the high-power communication to a non-terrestrial network.
The system obtains an access class associated with a UE, where the access class indicates whether the UE is authorized to communicate with a satellite, and stores the access class at the UE. The system obtains broadcast information from the satellite, where the broadcast information indicates one or more access classes authorized to communicate with the satellite. The system determines whether the access class stored at the UE is included in the one or more access classes authorized to communicate with the satellite. Upon determining that the access class is not included in the one or more access classes, the system reduces communication with the satellite by refraining from sending a request to connect to the satellite. Upon determining that the access class is included in the one or more access classes, the system sends the request to connect to the satellite.
Systems and methods for extending the Service Based Architecture to Internet Protocol (IP) Multimedia Subsystem (IMS) are disclosed. In one example aspect, a wireless communication method includes transmitting, by a network node in the IMS, a registration request to a Network Function Repository Function (NRF) via a first service-based network interface. The registration request includes capability information of the network node indicating support for one or more services.
Systems, methods, and devices that relate to enabling roaming users to use various communication services by assigning temporary local numbers are disclosed. In one example aspect, a method for wireless communication includes entering a visited network by a roaming device. The roaming device has a primary number associated with its home network. The method includes requesting a local number associated with the visited network by the roaming device and performing a communication using the local number associated with the visited network.
The system monitors multiple communication channels between a first communicator and a second communicator. At least a portion of the multiple channels spatially overlap. The overlapping channels carry different communications. The system determines whether a first set of two or more channels among the multiple channels are interfering with each other. Upon detecting interference, the system obtains a first multiplicity of physical resource blocks associated with a first channel and a second multiplicity of physical resource blocks associated with a second channel, where a physical resource block comprises a frequency band of predetermined size. The system allocates a first subset of the first multiplicity of physical resource blocks to the first channel, and a second subset of the second multiplicity of physical resource blocks to the second channel, where the first subset and the second subset do not overlap.
Solutions for providing proxy node (e.g., proxy-call session control function (P-CSCF)) selection by traffic type include: receiving, by a network node (e.g., a packet gateway (PGW)), from a network device (e.g., a user equipment (UE) or internet of things (loT) device), a first message indicating a request for identification of a proxy node; receiving, by the network node, from the network device, an indication of a first data traffic type; based on at least the indication of the first data traffic type, selecting, by the network node, a first proxy node over a second proxy node to identify to the network device; and transmitting an identification of the first proxy node to the network device.
Solutions for providing a data traffic session include: while a voice over new radio (VoNR) capable user equipment (UE) is being served by a first cell that does not support VoNR, determining that a second cell that does support VoNR is available to serve the UE; transferring the UE to service by the second cell; and providing a VoNR call to the UE through the second cell. The transfer may comprise a redirection or a handover (based on whether the UE is already in a call). Some examples further include a trigger of: receiving a notification of an incoming voice call to the UE, receiving a notification of an outgoing voice call from the UE, and receiving a notification of a handover of a voice call for the UE.
Methods, devices, and system related to adaptive determination of payload sizes based on usage patterns of the contents are disclosed. In one example aspect, an apparatus for wireless communication includes a processor that is configured to transmit a first data packet associated with a first network content to a user device, receive a request from the user device indicating a switch to a second network content from the first network content, determine a usage pattern associated with the first network content based on information included in at least the first data packet and the request, and adaptively change, based on the usage pattern, a payload size of a second data packet associated with a subsequent transmission of the first network content.
H04L 67/131 - Protocols for games, networked simulations or virtual reality
H04L 67/63 - Routing a service request depending on the request content or context
H04N 21/238 - Interfacing the downstream path of the transmission network, e.g. adapting the transmission rate of a video stream to network bandwidth; Processing of multiplex streams
H04N 21/45 - Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies
15.
PROXY-CALL SESSION CONTROL FUNCTION (P-CSCF) RESTORATION
Solutions for providing a data traffic session with proxy-call session control function (P-CSCF) restoration include: receiving an indication, by an application server (AS), that a user equipment (UE) registered with a first proxy node; receiving, by the AS, from a call session control function, a first indication that the first proxy node is unavailable; based on at least receiving the first indication that the first proxy node is unavailable, transmitting, by the AS, to a subscriber information node, a first message triggering proxy node restoration (e.g., over an N71 interface); receiving an indication, by the AS, that the UE is registered with a second proxy node different than the first proxy node; and based on at least receiving a session initiation message, establishing the data traffic session for the UE with the second proxy node.
Solutions for providing a data traffic session with proxy-call session control function (P-CSCF) restoration include: receiving an indication, by an application server (AS), that a user equipment (UE) is registered with a first proxy node; receiving, at a subscriber information node, from a call session control function (e.g., over an N70 interface), a first message triggering proxy node restoration; based on at least receiving the first message triggering proxy node restoration, transmitting, by the subscriber information node, to a management node, a second message triggering proxy node restoration; receiving an indication, by the AS, that the UE is registered with a second proxy node different than the first proxy node; and based on at least receiving a session initiation message, establishing the data traffic session for the UE with the second proxy node.
Solutions for providing a data traffic session with proxy-call session control function (P-CSCF) restoration include: receiving an indication, by an application server (AS), that a user equipment (UE) is registered with a first proxy node (e.g., a P-CSCF); subscribing, by the AS, with a status repository, to a status of the first proxy node; receiving, by the AS, from the status repository, an indication that the first proxy node is unavailable; based on at least receiving the indication that the first proxy node is unavailable, transmitting, by the AS, to a subscriber information node, a first message triggering proxy node restoration; receiving an indication, by the AS, that the UE is registered with a second proxy node different than the first proxy node; and based on at least receiving a session initiation message, establishing the data traffic session for the UE with the second proxy node.
H04L 65/1045 - Proxies, e.g. for session initiation protocol [SIP]
H04L 69/40 - Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass for recovering from a failure of a protocol instance or entity, e.g. service redundancy protocols, protocol state redundancy or protocol service redirection
A flexible solution for handling WiFi to cellular (W2C) handover (e.g., for voice over WiFi (VoWiFi) or video calls) includes: determining, for a wireless network, at least one live conversation performance indicator; based on the at least one live conversation performance indicator, determining at least one W2C handover parameter of a set of W2C handover parameters, the set of W2C handover parameters including a first W2C handover parameter indicating a first trigger condition and a second W2C handover parameter indicating a second trigger condition; and transmitting, by the wireless network, to a user equipment (UE), the at least one W2C handover parameter. In some examples, the W2C handover parameters include a reference signal receive power (RSRP) threshold and/or a received signal strength indication (RSSI) threshold. In some examples, live conversation performance indicators may include a cellular call drop rate, a WiFi call drop rate, and a handover failure rate.
Methods, devices, and system related to wireless communications are disclosed. In one example aspect, a method for wireless communication includes receiving, by a first access node in a first type of communication network, a request from a wireless device to establish a voice session with an Internet Protocol Multimedia System (IMS); initiating, by the first access node, an IMS voice session establishment for the wireless device; configuring, by the first access node, a Quality of Service (QoS) for the IMS voice session using a Protocol Data Unit (PDU) session modification request; and determining, in part based on one or more capabilities of the wireless device, to refrain from triggering a fallback to a second type of communication network for the IMS voice session establishment.
A solution for route selection includes receiving, by a network repository, from a first network function (NF), a query related to a target NF; querying, by the network repository, a route selection node for a shortest path to the target NF; receiving, by the network repository, from the route selection node, an indication of the shortest path to the target NF; and based on at least receiving the indication of the shortest path to the target NF, transmitting, by the network repository, to the first NF, a route to the target NF. In some examples, the shortest path has at least one of: a minimum number of hops, a minimum latency, a minimum jitter, and a minimum weighted transport score. In some examples, the route selection node is co-located with the network repository, which may be a network repository function (NRF).
Providing a voice call includes: receiving, from a user equipment (UE), a request to initiate a voice call traffic session; requesting setup of a voice call data pipe; based on at least a setup of the voice call data pipe not completing prior to a timer event, transmitting voice packets over a signaling data pipe; and based on at least the voice call data pipe setup completing, ceasing to transmit voice packets over the signaling data pipe and transmitting voice packets over the voice call data pipe. Placing a voice call includes: requesting, by the UE, to initiate the voice call traffic session; based on at least a first trigger event, transmitting voice packets over the signaling data pipe; and based on at least a second trigger event, ceasing to transmit voice packets over the signaling data pipe and transmitting voice packets over the voice call data pipe.
Disclosed here is a system and method to determine which wireless telecommunication network functionalities are impaired when using end-to-end encryption and to ameliorate the impairment of the functionality. The system receives a request from a sender device to communicate with a receiver device, where the request indicates whether the sender device is capable of an end-to-end encryption. The system determines whether the receiver device is capable of the end-to-end encryption, and whether the receiver device is associated with a functionality provided by a wireless telecommunication network that is impaired when the end-to-end encryption is used. Upon determining that the receiver device is not capable of the end-to-end encryption or that the receiver device is associated with the functionality that is impaired, the system performs an action to ameliorate the impairment to the functionality.
Methods, devices, and systems related to wireless communications are disclosed. In one example aspect, a device for wireless communication includes a processor that is configured to receive an enquiry message from a base station enquiring capability information of the terminal device and transmit a response message to the base station indicating one or more templates of capability information determined according the one or more radio access technologies and a list of frequency bands.
Dynamically steering data traffic sessions based on traffic type may include: determining that both frequency division duplex (FDD) and time division duplex (TDD) are available for an air interface between a user equipment (UE) and a base station (BS); determining a first traffic type expected over the air interface for a first data traffic session; based on at least the first traffic type, determining that FDD is a preferred duplex scheme for the first data traffic session; instructing the UE to use FDD over the air interface for the first data traffic session; determining a second traffic type expected over the air interface for a second data traffic session; based on at least the second traffic type, determining that TDD is a preferred duplex scheme for the second data traffic session; and instructing the UE to use TDD over the air interface for the second data traffic session.
Techniques and architectures enable a wireless communications network to allow for dynamic changes or on-the-fly selections of Fair Usage thresholds or other thresholds and to allow for the Fair Usage thresholds to be associated with individual subscribers of the wireless communications network. Subscriber groups of relatively small granularity or individual subscribers may be assigned a profile that sets forth actions to be applied to subscribers in response to the subscribers reaching particular thresholds of data usage.
Described herein are techniques for facilitating communications between vehicles within a platoon while minimizing latency. In some embodiments, such techniques may be performed by a lead vehicle and may comprise obtaining, from one or more sensors, sensor information pertaining to an environment in which the lead vehicle is located and generating, from the sensor information, driving instructions to be executed by a platoon of vehicles. The techniques may further comprise identifying, within the platoon of vehicles, a plurality of separate groups of vehicles and transmitting the generated driving instructions to a platooning platform via a long-range communication channel such that the driving instructions are relayed to each of the plurality of separate groups of vehicles. The techniques may further comprise transmitting the generated driving instructions to at least one additional vehicle of the platoon of vehicles via a short-range communication channel.
B60W 30/165 - Control of distance between vehicles, e.g. keeping a distance to preceding vehicle automatically following the path of a preceding lead vehicle, e.g. "electronic tow-bar"
B60W 60/00 - Drive control systems specially adapted for autonomous road vehicles
B60W 40/02 - Estimation or calculation of driving parameters for road vehicle drive control systems not related to the control of a particular sub-unit related to ambient conditions
G05D 1/00 - Control of position, course, altitude, or attitude of land, water, air, or space vehicles, e.g. automatic pilot
G05D 1/10 - Simultaneous control of position or course in three dimensions
G08G 1/00 - Traffic control systems for road vehicles
H04W 4/46 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for vehicle-to-vehicle communication [V2V]
H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
B60W 50/00 - CONJOINT CONTROL OF VEHICLE SUB-UNITS OF DIFFERENT TYPE OR DIFFERENT FUNCTION; CONTROL SYSTEMS SPECIALLY ADAPTED FOR HYBRID VEHICLES; ROAD VEHICLE DRIVE CONTROL SYSTEMS FOR PURPOSES NOT RELATED TO THE CONTROL OF A PARTICULAR SUB-UNIT - Details of control systems for road vehicle drive control not related to the control of a particular sub-unit
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for implementing a spam telephone call reducer are disclosed. In one aspect, a method includes the actions of receiving first telephone call data that reflects telephone calls received by a first user and second telephone call data that reflects telephone calls received by a second user. The actions further include comparing the first telephone call data and the second telephone call data. The actions further include determining that the first user received more spam telephone calls than the second user. The actions further include determining a first characteristic of the first user and a second characteristic of the second user. The actions further include determining an action that increases a similarity of the first characteristic to the second characteristic. The actions further include performing the action on the first characteristic.
This disclosure describes techniques that enable a telecommunications network to share available bandwidth within a cell of base station node between different air-interface technologies, such as Long-Term Evolution (LTE) and 5G-New Radio (5G-NR). This disclosure further enables spectrum allocation to service segments of a base station node. A spectrum allocation controller is described that is configured to identify, within a service area of a base station node, available spectrum, and in doing so, allocate available spectrum to non-overlapping service segments.
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for implementing a caller identifier are disclosed. In one aspect, a method includes the actions of receiving, by a server, a request to initiate a telephone call between a calling phone and a callee phone, wherein the request includes a telephone number of the calling phone. The actions further include determining, by the server, a name that corresponds to the telephone number. The actions further include accessing, by the server, a calling history that indicates previous telephone calls of the phone number. The actions further include, based on the calling history that indicates previous telephone calls of the phone number, determining, by the server, whether to generate a notification that includes the name that corresponds to the telephone number.
An orchestration and mediation (O/M) stack to be installed in a user device that subscribes to a carrier system is provided. The O/M stack configures the user device to receive a policy for accessing a plurality of different network slices that are logical networks virtualized on a physical infrastructure of the carrier system. The O/M stack configures the user device to coordinate each application's access to different services provided by the plurality of different network slices. An application is allowed access to a particular network slice when the application and the user device meet a condition specified by the received policy for accessing the particular network slice.
Described herein are techniques for implementing intelligent network slicing. Such techniques may include receiving data usage information associated with at least one user and generating, using the data usage information, a predicted usage model for the at least one user. Upon identifying an upcoming predicted usage event from the predicted usage model, the techniques may further include determining a current status of a core network and upon determining, based on the current status of the core network, that the core network is inadequate to handle the upcoming predicted usage event, instantiating a new network slice within the core network configured to handle the upcoming predicted usage event. Upon identifying network traffic associated with the upcoming predicted usage event, the techniques comprise routing that network traffic through the new network slice.
A mobile device app may be provided with a communications registry describing network-based resources with which the app would like to communicate, including IP addresses and URLs of the network-based resources, for example. A local firewall on the mobile device allows the app to only communicate with the defined network-based resources in the communications registry. A user is presented with the communications registry prior to accepting download or installation. The user is thus alerted to which external resources are necessary to operate the app and which ones are not. Users would be warned when requested communication permissions are overly broad or relate to known threat locations. A threat score may be provided to users for self-mitigation.
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
H04L 29/06 - Communication control; Communication processing characterised by a protocol
33.
DETECTING MALICIOUS SMALL CELLS BASED ON A CONNECTIVITY SCHEDULE AND CACHED ENTITY PROFILES AT NETWORK ACCESS NODES TO RE-AUTHENTICATE NETWORK ENTITIES
A method performed by a network node that generates a schedule of communication exchanges between the network node and a small cell of a telecommunications network. The schedule is unique for the small cell among multiple small cells and sets times for sending status signals to the small cell and receiving counterpart response signals from the small cell. When the network node detects non-compliance with the schedule, the network node can begin to monitor the small cell for anomalous activity. Upon detecting that the anomalous activity includes malicious activity, the network node can communicate with the small cell wirelessly to deauthorize the small cell.
Methods, apparatus, and systems for detecting signals interfering with satellite signaling and determining a location of the interfering source are disclosed. In one example aspect, a method for detecting a signal directed at interfering with satellite signaling includes receiving, by a receiving node, a signal from a signal source, the signal produced by the signal source disguised as a satellite signal; determining an estimated position of the receiving node based on an orbital position of the satellite and a characteristic of the signal; comparing the estimated position of the receiving node with a reference position of the receiving node; determining that the signal source is a spoofing source different than the satellite; and determine a location of the spoofing source in part based on the estimated position.
G01S 5/02 - Position-fixing by co-ordinating two or more direction or position-line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves
G01S 5/04 - Position of source determined by a plurality of spaced direction-finders
G01S 3/02 - Direction-finders for determining the direction from which infrasonic, sonic, ultrasonic, or electromagnetic waves, or particle emission, not having a directional significance, are being received using radio waves
Systems and methods for deriving and providing mobile device locations are disclosed. The method includes a communication network detecting one or more triggering conditions. Based on the triggering conditions, the network may derive a current location of the mobile device. The current location may be sent to the mobile device and/or another device communicating with the mobile device.
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
H04W 4/029 - Location-based management or tracking services
H04W 4/06 - Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
The disclosed technology includes at least one method performed by a system of a telecommunications network. The system can establish a communications link between the wireless device and a network access node (NAN) of the 5G network. While connected over a non-mmW band, the wireless device autonomously schedules data downloads to occur when the wireless device is on an mmW band. The system then receives a request from the wireless device to perform the data downloads, which can be enabled by a packet gateway (PGW) upon receiving a confirmation by the NAN that the wireless device can connect over the mmW band. Otherwise, the PGW denies the wireless device's request to perform the data downloads, which can be enforced by the NAN.
This disclosure describes techniques for determining technological capability of devices whose technological capability are unknown. The devices can be users of a wireless telecommunication network. A device, such as a cell phone, has a type allocation code (TAC) which can indicate a make and model of the device. Once the make and model of the device are known, the technical capability of the device is known. Certain TAC numbers, however, do not indicate the make and model of the device, and thus a device's technical capability is unknown. To determine the technological capability of the devices, a machine learning model is trained using usage data of the devices with known technological capability. After training, the machine learning model can be deployed to predict the technological capability of devices with unrecognizable TAC numbers by providing usage data associated with the devices with unrecognizable TAC numbers.
This disclosure describes techniques for creating a hybrid mesh of unlicensed wireless frequency bands between two or more vehicles communicating using an unlicensed wireless frequency band, and a massive MIMO base station communicating with the two or more vehicles using a licensed wireless frequency band. The hybrid mesh can be used to upload and download data from a vehicle in motion. The hybrid mesh can be formed via V2V connections between the vehicle and nearby vehicles. In other words, if a vehicle moves into a region outside the operating boundary of a 5G-NR massive MIMO base-station node, the vehicle can interact with other vehicles to generate a data pipeline using the unlicensed wireless frequency band from the vehicle the nearby vehicle, and using the licensed wireless frequency band from the nearby vehicle to the nearest, massive MIMO base station.
H04W 72/02 - Selection of wireless resources by user or terminal
H04W 4/46 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for vehicle-to-vehicle communication [V2V]
H04W 88/06 - Terminal devices adapted for operation in multiple networks, e.g. multi-mode terminals
H04W 92/18 - Interfaces between hierarchically similar devices between terminal devices
H04W 92/10 - Interfaces between hierarchically different network devices between terminal device and access point, i.e. wireless air interface
39.
CONCURRENT CONNECTIVITY WITH BOTH 4G AND 5G NETWORKS FOR MOBILE DEVICES
In 5G Non-Standalone (NSA), to balance the load on 5G users and 4G users effectively, the disclosed technology selects the proper secondary cell group (SCG), when the master cell group (MCG) is provided by 4G infrastructure. E-UTRAN New Radio – Dual Connectivity (ENDC) allows users to connect to a 4G MCG and a 5G SCG (SCG). The technology selects the SCG based on each user's application's attributes such as UL/DL data volume, speed or bandwidth.
H04W 36/36 - Reselection control by user or terminal equipment
H04W 88/06 - Terminal devices adapted for operation in multiple networks, e.g. multi-mode terminals
H04W 36/04 - Reselecting a cell layer in multi-layered cells
H04W 64/00 - Locating users or terminals for network management purposes, e.g. mobility management
H04W 76/16 - Setup of multiple wireless link connections involving different core network technologies, e.g. a packet-switched [PS] bearer in combination with a circuit-switched [CS] bearer
Systems and methods for provisioning user privacy parameters necessary for network security in 5G telecommunication networks are provided, such as the subscriber permanent identifier (SUPI), the routing indicator, the protection scheme identifier, or the home network key. In order to protect the user privacy parameters, the techniques disclosed herein use private and public key encryption, as well as integrity protection offered by 5G telecommunications protocols. Such techniques use registration response messages, update location requests, or update notification request messages to provide end-to-end or end-to-middle security in the provisioning process. Unlike existing over- the- air (OTA) techniques, the techniques described herein provision user privacy parameters or other similar data in a secure and verifiable manner.
The disclosed systems and methods authenticate a user of a telecommunications network for a third-party service provider to seamlessly provision a third-party service. The telecommunications network receives an indication that a user device on the telecommunications network received an input by a user to access the third-party service. In response, the telecommunications network obtains a network-based identifier (e.g., IP address) that uniquely identifies the user device and associated user, determine that the user is eligible for the third-party service based on the user's subscribed service plan, and communicates information to enable the third-party service provider to automatically provision the third-party service on the user device without needing additional input to activate the third-party service or authenticate the user with the third-party service on the user device.
The disclosed embodiments include a method performed by a Telephony Application Server (TAS) or other telecommunications network node, to retrieve a voicemail pilot number during registration of a user equipment (UE). The method includes receiving a registration message to register the UE and, in response, sending a request message to a home subscriber server (HSS). The request message includes a request for a voicemail pilot number for the subscriber. The method further includes receiving an answer message from the HSS including the voicemail pilot number, which is stored at the TAS, receiving a voicemail service message to deposit/retrieve a voicemail message and, in response, retrieving the voicemail pilot number from the TAS instead of issuing an SS7 query to obtain the voicemail pilot number. The method further includes enabling the subscriber to deposit or retrieve the voicemail message based on the voicemail pilot number retrieved from the TAS.
The methods, systems, and computer readable media discussed herein are directed to maintaining status information of network functions (NFs) associated with one or more network function repository functions (NRFs). An NRF, which may be one of a plurality of NRFs belonging to a group of NRFs, maybe queried. The plurality of NRFs may be synchronized to each other, and the group of NRFs may be one of a plurality of groups of NRFs. One or more NFs may be registered with the NRF, and each NRF of the plurality of NRFs may have one or more corresponding NFs registered to it. The NRF may maintain status information of the one or more NFs registered to the NRF. The NRF may collect information associated with querying of NFs by another NF, and send statistical data based on the collected information to a user interface (UI) of an external device to be displayed on the UI.
Systems and methods for performing Evolved Packet System (EPS) fallback from a 5G system to an Evolved Packet Core (EPC) system are disclosed. The method, performed in a mobile device, detects a communication at the mobile device. The method then determines whether either the mobile device or a base station supports the communication over new radio. Directly in response to determining that either one of the mobile device or the base station does not support the communication over new radio, the method generates and transmits an EPS fallback message from the mobile device to the base station, wherein the EPS fallback message instructs the base station to initiate a fallback procedure from the 5G system to the EPC system.
A policy enhancement for mixed capabilities of devices may include a first User Equipment (UE) that publishes to a presence server via an IP Multimedia Subsystem (IMS) Core network and a Rich Communication Services (RCS) node. A second UE may subscribe to the first UE by requesting information about the first UE from the presence server. The presence server may determine that the first UE is one of multiple instantiations of a same device. The presence server may determine that a third UE is another instantiation of the same device as the first UE, and that the third UE is a lesser-capable device (e.g., non-Universal Profile enabled) with respect to the first UE. The presence server may send a notify message including a capability indicator associated with the third UE to the second UE, and/or the notify message may omit a capability indicator associated with the first UE.
Systems, devices, and techniques described herein relate to handover between Non-Standalone (NSA) and Standalone (SA) networks. An example method includes receiving, from a User Equipment (UE), a measurement report indicating that a signal threshold has been satisfied. In response to receiving the measurement report, handover of a communication session from a first core network to a second core network may be initiated. A message confirming that the communication session has been handed over from the first core network to the second core network can be received. In response to receiving the message, handover of the communication session can be initiated between a single radio bearer associated with a first Radio Access Technology (RAT) and a dual radio bearer associated with the first RAT and a second RAT.
Systems, devices, and techniques described herein relate to intelligently selecting a connectivity mode. At least one first network characteristic of a first radio link utilizing a first radio technology may be determined. A connectivity mode may be selected based on the at least one first network characteristic. The connectivity mode can be selected from among a dual connectivity mode utilizing the first radio link and a second radio link utilizing a second radio technology, a first single connectivity mode utilizing the first radio link, and a second single connectivity mode utilizing the second radio link. The device may be connected to the first radio link and/or the second radio link according to the selected connectivity mode.
H04W 76/16 - Setup of multiple wireless link connections involving different core network technologies, e.g. a packet-switched [PS] bearer in combination with a circuit-switched [CS] bearer
H04W 28/02 - Traffic management, e.g. flow control or congestion control
Systems, devices, and techniques described herein relate to selectively implementing an expedited retransmission time. In some examples, a call setup message is transmitted to a first network system associated with a first network access technology. A transfer request may be received from the first network system. The transfer request may indicate handover or redirection to a second network system associated with a second network access technology. Upon expiration of the expedited retransmission time after receiving the transfer request, the call setup message can be retransmitted to the second network system.
A system, e.g., associated with a telecommunications network, includes first and second registry devices. In some examples, the first registry device receives a registration message. The second registry device receives a query specifying a type (NFType) of a network function and forwards the query to the first registry device based at least in part on the NFType. The first registry device responds, and the second registry device forwards the response. In some examples, the query specifies a service class and the second registry device forwards the query based at least in part on the service class. In some examples, the first registry device sends an indication of the registration to the second registry device, and the second registry device responds to the query based at least in part on the received indication and on at least one of an NFType or a service class of the query.
A telecommunication system can include routing devices, a Quality of Service (QoS) controller, a policy-management device, and a flow-management device. The QoS controller or flow-management device can receive a request from a terminal to create a specialized flow (SF), e.g., for a non-audio, non-video media type. If the request is associated with an authorized user, a setup message can be sent comprising a QoS indicator. The system can create the SF permitting data exchange between the terminal and a routing device. The SF can have QoS characteristics associated with the QoS indicator. In some examples, the terminal can receive network-address information, determine an associated network resource, and send a flow-request message indicating a non-audio, non-video media type. The terminal can then exchange data on the network port with a peer network terminal.
In some examples, a terminal can establish wireless communication with a base station. The terminal can determine a challenge, transmit the challenge, receive a response, and determine that the response is valid. The terminal can, in response, establish a secure network tunnel to a network node. In some examples, a terminal can determine a first communication parameter associated with communication with the base station. The terminal can receive data indicating a second communication parameter via a secure network tunnel. The terminal can determine that the communication parameters do not match, and, in response, provide an indication that an attack is under way against the network terminal. Some example terminals transmit a challenge, determine a response status associated with the challenge, and determine that an attack is under way based on the response status.
H04W 12/00 - Security arrangements; Authentication; Protecting privacy or anonymity
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
52.
INTELLIGENT DUPLICATION DETECTION FOR WIRELESS EMERGENCY ALERTS IN DEVICES
Cellular communication networks may be configured to broadcast wireless emergency alert (WEA) messages to multiple receiving communication devices. A communication device has physical-layer components, such as a modem subsystem, that receive broadcast alert messages. The modem subsystem uses a cache to record received alert messages and references the cache to perform duplication checking for newly received messages. Newly received messages that are not duplicates are provided to application-layer software for further processing. The application-layer software notifies a device user of the alert message if the alert message satisfies certain criteria. In addition, the application-layer detects changes in device properties that could potentially affect the criteria and in response causes the cache of the modem subsystem to be cleared so that the modem subsystem will not declare a subsequently received alert message to be a duplicate.
Systems and methods are described herein for handling video calls placed on hold or otherwise parked by one or more parties within the video call. The systems and methods can determine a video call has been placed on hold (or otherwise set to be parked), and transfer the video call to a call park server (CPS). The systems and methods can then access a content server, retrieve one or more content items (e.g., video clips, interactive content or advertisements, and so on), and present the content items within the on hold video call.
H04N 21/45 - Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies
In a 5th-Generation (5G) cellular communication network, charging customers for data usage is performed by a network function referred to as a charging function (CHF). A session management function (SMF) of the network repeatedly sends update requests to reserve additional data for a data session. If the CHF is not available and the SMF does not receive a response to an update message, the SMF continues to assign data for the data session, even though it has not received authorization to do so from the CHF. When the CHF becomes available, the SMF sends a request to start a second data session to continue the data connection that was previously supported by the original data session. This request specifies the amount of data that was used in the original data session without being confirmed by the CHF, allowing the CHF to account for this data usage.
Systems and methods are described for monitoring performance and allocating resources to improve the performance of a wireless telecommunications network. A wireless telecommunications network may be comprised of base stations and other infrastructure equipment, which may be sourced from various suppliers. Users may generate traffic on the wireless network, and performance metrics relating to the user experience may be collected from individual base stations. The set of available metrics for a particular base station may vary according to the supplier. A machine learning model is thus trained using metrics from multiple base stations, and used to estimate values for metrics that a particular base station does not provide. The metrics are then further characterized according to the service classes of the users, and resources for improving the performance of base stations are allocated according to the reported and estimated metrics for various service classes.
An improved telecommunications network that can reduce the network load on a rich communication services (RCS) server and/or local routers that implement 1-to-N and/or M-to-N services is described herein. In particular, the improved telecommunications network may include an improved RCS server that can route multicast messages instead of and/or in addition to unicast messages. For example, the improved RCS server can create a multicast group for a group of UEs in response to a request from a UE to create a group of UEs. Creation of the multicast group may include assigning a group Internet protocol (IP) address to the multicast group. The improved RCS server can then determine which UEs in the multicast group are capable of sending and/or receiving multicast messages, and send multicast messages instead of unicast messages to these UEs.
The disclosed technology provides a system and method for scheduling downlink transmissions and for granting uplink frequency resources to a user device such that concurrent transmissions and receptions by the user device, or multiple concurrent transmissions and receptions by the user device, does not lead to deleterious intermodulation distortion or at least minimizes the extent of any such resulting intermodulation distortion.
An improved telecommunications network that can reduce the network load on a rich communication services (RCS) server and/or local routers that implement 1-to-N and/or M-to-N services is described herein. In particular, the improved telecommunications network may include an improved RCS server that can route secure multicast messages instead of and/or in addition to unicast messages. For example, the improved RCS server can create a multicast group for a group of UEs in response to a request from a UE to create a group of UEs. Creation of the multicast group may include creating a shared multicast group key (SMGK) for the multicast group and/or selecting a security algorithm for the multicast group. The improved RCS server can then distribute the SMGK and/or the selected security algorithm to the UEs such that the UEs can use the SMGK and/or the selected security algorithm to encrypt and/or decrypt messages.
Various systems, methods, and devices relate to determining a delay associated with a device; calculating a guard time based at least in part on the delay; and scheduling a wireless resource to include a downlink interval, an uplink interval, and the guard time between the downlink interval and the uplink interval. By calculating the guard time based at least in part on the delay associated with the device, spectrum efficiency can be enhanced, and latency can be reduced.
Methods, systems, and non-transitory computer readable media for intelligent steering of roaming of user equipment. More particularly, the methods include receiving, from a user equipment (UE) located in a visitor network, a registration message to register with a home network, the registration message including an identifier of the UE. The methods also include querying, by one or more processors, a steering controller using the identifier of the UE to obtain a roaming list customized for the UE. The methods also include pushing, by one or more processors, the roaming list to the UE.
Techniques for dynamically determining coverage area and data throughput in a heterogeneous network are discussed herein. In some examples, a base station can use frequency resources from a Citizens Broadband Radio Service band provided that such use does not cause harmful interference for incumbent users. For example, to avoid interfering with an incumbent device while maintaining transmission, an algorithm may be deployed to dynamically determine data throughput for the base station and connected user equipment based on interference level and traffic type. The base station can receive interference information with uplink feedback from the user equipment. Interference information can also be used to configure the base station to dynamically adjust its data coverage area, for example, by varying a transmission power. As the conditions at a base station change over time (e.g., hourly, daily, weekly, etc.), data coverage area can be reconfigured at the base station.
Architecture and techniques for identifying types of objects based upon disruption of signal strength of millimeter-wave (mmW) transmitted signals caused by objects interfering with or blocking transmitted signals within a wireless communication network. In particular, types of objects may be identified based upon drops in signal strength due to objects moving between a transmission point and a receiving device. Based on factors including one or more of a size of an object, materials that make up the object, etc., the object causes a drop in received signal strength, thereby causing a change in a pattern of received signal strength. The changed pattern may be compared with base patterns that are correlated with a type or identity of an object in order to identify the object.
A method for discovering an interface session within a wireless communication network is discussed herein. The method includes establishing an Internet Protocol (IP) packet-switched network registration between a first node of a plurality of nodes within the wireless communication network and a second node of the plurality of nodes. The method further includes, requesting, by a third node of the plurality of nodes from a fourth node of the plurality of nodes, service for a call of a mobile device within the wireless communication network. Based upon not having an appropriate interface session established between the first node and the fourth node, the method also includes performing, by the fourth node, an interface session discovery. Based at least in part on the interface session discovery, a dedicated bearer is established at the second node for the call.
Systems and methods are described herein for configuring vehicles and infrastructure (e.g., buildings, smart homes, traffic devices, utilities and associated systems, emergency response systems, and so on) to include blockchain nodes, so a smart city or area of the various devices can be supported by a blockchain network, with some or all devices and systems provisioned with nodes acting as distributed nodes for the blockchain network.
H04W 4/46 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for vehicle-to-vehicle communication [V2V]
Systems and methods are described herein for providing mobile devices with peer to peer access to telecommunications networks. The network-based systems enable mobile devices associated with subscribers of the telecommunications networks to establish direct connections with other mobile devices (e.g., third party mobile devices of users that are not subscribers) over peer to peer (P2P) communication protocols. For example, a mobile device can, over a P2P connection, act as a Hotspot, Wi-Fi tether, or bridge for a third party or other mobile device requesting access to the networks.
A system and method for detecting and correcting uplink-only problems is disclosed. The system comprises one or more of the following modules: uplink problem detection module, maximum permissible limit module, and uplink improvement calculation and actions module. The uplink problem detection module detects uplink-only problems using values of one or more parameters related to bearer performance. For instance, the uplink problem detection module continuously monitors the uplink performance by checking uplink transmission error and when a threshold is crossed, declares an uplink problem. The maximum permissible limit module limits the actions by uplink improvement calculation and actions module so that other parts in the system are not negatively affected. The uplink improvement calculation and actions module determines and performs the actions to improve the uplink transmission error situation detected by the uplink problem detection module.
Systems and methods are described herein for storing and/or retaining message object data for subscribers of a wireless network. The systems and methods introduce a storage architecture that retains message objects in both hot storage (or local storage) and cold storage (remote or archive storage), to comply with the OMA and/or GSMA standards. After certain events associated with the message objects occur, such as an expiration of a time-to-live (TTL) parameter for the message objects, the systems and methods purge or remove message objects from the local storage, but maintain the message objects in the remote storage location.
Systems and methods are described herein for providing a telecommunications network, such as a wireless network, LTE (Long Term Evolution) network, and so on, with blockchain nodes, agents, or sub-nodes. The blockchain nodes enable network components to access and maintain a blockchain for the network, such as a distributed ledger that tracks actions, activities, or other transaction associated with the telecommunications network.
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
H04L 9/06 - Arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
The methods, systems, and computer readable media discussed herein are directed to enabling a fifth generation cellular-wireless access technology (5G) user equipment (UE) to receive 5G service using a fourth generation cellular-wireless access technology (4G) subscriber identity module (SIM). Upon powering on, the 5G UE may determine whether a mobile network operator (MNO) public key file exists in the 4G SIM. Upon determining that the MNO public key file exists in the 4G SIM, the 5G UE may retrieve a MNO public key value from the MNO public key file, read a subscription permanent identifier (SUPI) from the 4G SIM, generate a subscription concealed identifier (SUCI) based on the SUPI and the MNO public key value, send the SUCI to a 5G mobile network for registering the 5G UE, and begin receiving 5G services from the 5G mobile network.
The disclosed technology provides a system for scanning frequency channels that reduces the number of frequency channels scanned from among all the possible frequency channels that a wireless communication device can operate on. The wireless communication device uses historical data on last successful connection together with device data metrics from the last successful connection to determine a probability of successful connection for each of the potential frequency channels. The wireless communication device then ranks the probability associated with each frequency channel to determine a frequency scanning order that results in fewer frequencies being scanned before an appropriate channel is identified.
A 5G user equipment (UE) can register for 5G services with a telecommunication network in part using a Subscription Concealed Identifier (SUCI), an encrypted version of a subscriber identifier, so that the actual subscriber identifier is not exposed during network registration. Legacy SIMs originally deployed for 4G/LTE and other legacy wireless access technologies store an international mobile subscriber identity (IMSI), but do not store a network public key needed to generate a SUCI. However, a 5G UE can still use a legacy SIM to securely obtain 5G services by encrypting the IMSI from the legacy SIM using a network public key stored in the 5G UE's own memory to generate a SUCI, and then transmitting the generated SUCI to the telecommunication network during network registration. Accordingly, the IMSI on the legacy SIM is not exposed during network registration.
Systems and methods for enabling one-way video calling are disclosed. The system can enable user equipment (UE) with varying capabilities to communicate in an asymmetrical manner. A UE receiving an incoming two-way video call can request that the call be "downgraded" to a one-way video-in call, a one-way video-out call, or even an audio-only call. The system can include a multi-way video graphical user interface (GUI) to enable the user to choose between accepting an incoming two-way video call or requesting a different type of call (e.g., a one-way video call or an audio-only call). The system can also include a call initiation GUI to enable users to select between two-way video, one-way video, or audio-only for outbound calls. The system can also include a call modification GUI to enable users to modify the parameters for an incoming call prior to initiating the call.
Systems and methods for providing additional video call transfer functionality are disclosed. The systems and methods can enable a video call between a first user equipment (UE) and a second UE to be transferred to a video call between the second UE and a third UE either a video call or an audio call. The systems and methods can also enable the third UE to accept a transferred video call or to request that the video call be downgraded to an audio call. The systems and methods can incorporate a multimedia resource function (MRF) to connect to the second UE while the transfer is being negotiated and effected. The MRF can provide an audio stream and a video stream to the second UE to provide a "video hold" feature - to prevent the video call from dropping to an audio call automatically or dropping altogether.
H04N 21/2368 - Multiplexing of audio and video streams
H04N 21/434 - Disassembling of a multiplex stream, e.g. demultiplexing audio and video streams or extraction of additional data from a video stream; Remultiplexing of multiplex streams; Extraction or processing of SI; Disassembling of packetised elementary stream
74.
LATENCY-SENSITIVE NETWORK-TRAFFIC QUALITY OF SERVICE
A telecommunication system can include routing devices, a bearer-management device, and a policy-management device. The bearer-management device can receive a request from a terminal to create a specialized bearer (SB) for a non-audio, non-video media type. The bearer-management device can determine that the request is associated with an authorized user, and then send a setup message comprising a Quality of Service (QoS) indicator to the policy-management device. The policy-management device can create the SB permitting data exchange between the terminal and a routing device. The SB can have QoS characteristics associated with the QoS indicator. In some examples, the terminal can receive a network address, determine an associated network port, and send a SIP INVITE message indicating the non-audio, non-video media type. The terminal can then exchange data on the network port with a peer network terminal.
Devices, systems, and methods relate to performing Internet Protocol (IP) Media Subsystem (IMS) bearer activation and radio bearer activation at different times. In some embodiments, a radio bearer is activated after the IMS bearer is activated. The radio bearer that is activated after the IMS bearer is activated may utilize a different Radio Access Technology (RAT) than an initial radio bearer. In certain instances, a device initiates activation of the radio bearer upon receiving confirmation that the IMS bearer is activated, or initiates activation of the radio bearer a predetermined period of time after initiating activation of the IMS bearer. In various embodiments, staggered IMS bearer activation and radio bearer activation can prevent collisions at components of an Evolved Packet Core (EPC).
H04W 76/16 - Setup of multiple wireless link connections involving different core network technologies, e.g. a packet-switched [PS] bearer in combination with a circuit-switched [CS] bearer
H04W 88/06 - Terminal devices adapted for operation in multiple networks, e.g. multi-mode terminals
76.
BEARER SELECTION FOR DUAL CONNECTIVITY CELLULAR SYSTEMS
When using Dual Connectivity in a Non-Standalone Architecture cellular communication system, a data bearer may be steered through a Long-Term Evolution (LTE) base station or a New Radio (NR) base station. Each bearer is assigned a combination of Quality of Service (QoS) values corresponding to the service type that the bearer is supporting. For example, each different service type may be assigned a combination of a QoS Class Identifier and an Allocation and Retention Priority parameter value. Each combination is also associated with a radio access technology such as LTE radio access technology or NR radio access technology. When NR communications are available between a network core and a communication device, and if the bearer's combination of QoS values has been associated with NR, bearer data is routed through an NR base station. Otherwise, the bearer data is routed through the LTE base station.
H04W 28/02 - Traffic management, e.g. flow control or congestion control
H04W 76/16 - Setup of multiple wireless link connections involving different core network technologies, e.g. a packet-switched [PS] bearer in combination with a circuit-switched [CS] bearer
H04W 88/06 - Terminal devices adapted for operation in multiple networks, e.g. multi-mode terminals
Technologies for using edge devices in a cellular network as compute nodes to participate in a blockchain network are described. A cellular network may provision one or more edge devices in communication with the cellular network to instantiate a virtual machine on the edge device to act as a compute node. The cellular network may submit a bid to solve a blockchain hash function using the compute nodes and may instruct the edge to solve the blockchain hash function.
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
A group database can maintain information about member user equipments (UEs) that are part of a group associated with a shared group number. One or more of the member UEs can be associated with distinct phone numbers that are different from the shared group number. One or more communication servers can route incoming calls and text messages sent to the shared group number to one or more member UEs based on the information in the group database, such as routing incoming calls only to member UEs indicated as being active members of the group in the group database.
During a call session between a first user equipment (UE) and a second UE managed by a call application server, the first UE can send a request to a conference application server to upgrade the call session to a meeting session. The conference application server can set up the meeting session. Once the first UE and the second UE have joined the meeting session with the conference application server, the first UE and the second UE can end their legs of the original call session with the call application server. The first UE and the second UE can transition their user interfaces from a call mode to a meeting mode upon joining the meeting session, such that users are seamlessly transitioned from a call to a meeting.
Techniques for dynamically allocating frequency resources in accordance with wireless access technologies are discussed herein. For example, a base station can determine whether user equipment (UE) requesting communications at the base station are configured to operate in accordance with 4th Generation (5G) radio access technologies and/or in accordance with 5th Generation (5G) radio access technologies. Based on the number of 5G UEs and 4G UEs, a first portion of a frequency resource can be allocated to 5G and a second portion of the frequency resource can be allocated to 4G. In some examples, a first allocation strategy for a first frequency resource (e.g., Band 71) can be used to generate a second allocation strategy for a partially overlapping second frequency resource (e.g., Band 41).
A telecommunication system can include a network flow controller (e.g., SMF) and a network-charging node (e.g., CHF). The flow controller can generate a first charging-event record associated with a network session. The flow controller can detect an outage at least partly by determining that no network-charging node is available to receive the first charging-event record and, in response, mark the first charging-event record to provide a first marked charging-event record. The flow controller can store the first marked charging-event record in a buffer. After the marking, the flow controller can determine that a network-charging node is available to receive the first marked charging-event record, and, in response, send the first marked charging-event record to the network-charging node. The network-charging node can determine a charging-data record indicating occurrence of an event during the outage.
A first user equipment (UE) - during a real time text (RTT) communication session with a second UE - may be configured to transmit RTT content in "word mode" by buffering text characters in local memory as they are typed by a user, and holding off on transmitting the buffered text characters until the user types a word delimiter or a timer expires, whichever occurs first. In an example process, the first UE may detect character user input requesting to type a text character, and, in response, the first UE starts a timer and buffers the text character in local memory. The timer can be restarted for additional text characters that are typed before expiration of the timer, and those additional text characters are also buffered. The buffered text characters are transmitted upon detecting delimiter user input requesting to type a word delimiter or the expiration of the timer, whichever occurs first.
Systems, methods, and devices can be utilized to schedule at least one Hybrid Automatic Repeat Request (HARQ) transmission and at least one HARQ feedback message in the same Physical Resource Block (PRB). A HARQ transmission can be scheduled in a mini-slot of the PRB. Accordingly, latencies associated with transmitting and receiving the PRB can be reduced, while the high reliability of HARQ can be retained. Implementations can be applied to 5G technologies such as Ultra Reliable Low Latency Communications (URLLCs) and enhanced Mobile BroadBand (eMBB), as well as other low-latency communications. A method can include determining a location of a device; selecting, based at least in part on the location of the device, a mini-slot size; scheduling, in one or more mini-slots having the mini-slot size in a PRB, a HARQ transmission; and transmitting, to the device, the HARQ transmission in the one or more mini-slots of the PRB.
Systems, methods, and devices can be utilized to schedule at least one Hybrid Automatic Repeat Request (HARQ) transmission and at least one HARQ feedback message in the same Physical Resource Block (PRB). A HARQ transmission can be scheduled in a mini-slot of the PRB. Accordingly, latencies associated with transmitting and receiving the PRB can be reduced, while the high reliability of HARQ can be retained. Implementations can be applied to 5G technologies such as Ultra Reliable Low Latency Communications (URLLCs) and enhanced Mobile BroadBand (eMBB), as well as other low-latency communications. A method can include detecting a fading condition of a device; scheduling, in one or more mini-slots of a PRB, a HARQ transmission based at least in part on the fading condition; and transmitting, to the device, the HARQ transmission in the one or more mini-slots of the PRB.
H04L 1/00 - Arrangements for detecting or preventing errors in the information received
H04L 1/16 - Arrangements for detecting or preventing errors in the information received by using return channel in which the return channel carries supervisory signals, e.g. repetition request signals
85.
CONTROLLING FALLBACK PROCEDURES FOR DIFFERENT USER GROUPS OR DEVICE GROUPS
A user equipment (UE) and an Internet Protocol (IP) Multimedia Subsystem (IMS) node may exchange fallback indicators in SIP signaling for purposes of controlling fallback procedures implemented by the UE. The SIP signaling may include a SIP request from the UE that includes first information. The IMS node can evaluate a criterion based on the first information, and, if the criterion is met, the IMS node may authorize (or prohibit) the use of a UE-supported fallback radio access technology (RAT) that corresponds to a fallback indicator also included in the SIP request. Based on the evaluation of the criterion, the IMS node may respond to the UE with a SIP response that includes second information indicating which of the supported Fallback RATs the UE is authorized to use (if any), and which of the supported Fallback RATs the UE is not authorized to use (if any).
A network base station can select, for each of one or more attached terminals, a respective downlink transmission mode (DTM) based at least in part on respective channel condition information (CCI). The base station can determine a subframe allocation of DTMs to subframes of a radio frame, and transmit downlink data to terminals based the subframe allocation. Additionally or alternatively, the base station can receive load information from a second base station associated with a different access network and determine the subframe allocation based on the load information. The subframe allocation can associate a specific access network with each subframe. Additionally or alternatively, the base station can send the subframe allocation to the second base station. Additionally or alternatively, the base station can determine a proportion of GBR traffic of a particular DTM, determine a reference-signal transmission rate associated with that DTM, and transmit reference signals accordingly.
Systems, devices, and techniques described herein relate to migrating a communication session from a path including a stressed user plane function (UPF) to a path including a replacement UPF. A communication session may traverse a first path including the first UPF. After establishing the communication session, the first UPF may be determined to be stressed. In response, the communication session can be proactively migrated to a second path including a second UPF. According to various implementations, the existing communication session can be maintained during the migration, thereby substantially eliminating interruptions caused by the stressed first UPF.
A cellular communication device is configured to use Non-Standalone Architecture (NSA) dual connectivity for communicating with a cellular communication network, using simultaneous 4th-Generation (4G) Long-Term Evolution (LTE) and 5th-Generation (5G) New Radio (NR) radio access technologies. When implementing NSA dual connectivity, the device may receive separate transmit power control commands for LTE uplink transmissions and NR uplink transmissions, respectively. In order to keep total transmitted power of the device below a regulatory maximum transmit power, LTE transmit power is limited to a value that is less than regulatory maximum transmit power, thereby reserving at least a reserved transmit power for NR transmissions. This allows NR acknowledgements to be sent from the device to avoid NR downlink failure.
H04W 52/34 - TPC management, i.e. sharing limited amount of power among users or channels or data types, e.g. cell loading
H04W 52/36 - Transmission power control [TPC] using constraints in the total amount of available transmission power with a discrete range or set of values, e.g. step size, ramping or offsets
H04W 52/54 - Signalisation aspects of the TPC commands, e.g. frame structure
H04W 76/16 - Setup of multiple wireless link connections involving different core network technologies, e.g. a packet-switched [PS] bearer in combination with a circuit-switched [CS] bearer
89.
CACHE AND MULTICAST TECHNIQUES TO REDUCE BANDWIDTH UTILIZATION
Techniques are described herein for caching content locally at a local network device and serving the cached content via multicast transmission to a user equipment in a multicast single frequency network (SFN) coverage area in which the local network device is located. The local network device receives a request for content from the user equipment in the multicast SFN coverage area. The request includes usage data associated with the user equipment indicating a triggering event. If the content is not cached at the local network device, the local network device identifies a content server to provide the content based at least on the usage data and a broadcast identifier associated with the local network device. The local network device receives the content that is associated with the broadcast identifier of the local network device and stores the content locally, which is then served via multicast transmission to the user equipment.
H04W 4/06 - Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
H04W 4/20 - Services signalling; Auxiliary data signalling, i.e. transmitting data via a non-traffic channel
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
90.
ZERO CODING AUTOMATION WITH NATURAL LANGUAGE PROCESSING, SUCH AS FOR USE IN TESTING TELECOMMUNICATIONS SOFTWARE AND RESOURCES
A framework for automated testing for use in testing telecommunications software and resources is disclosed that reuses testing code modules, thereby reducing redundancy and increasing efficiency and productivity. The zero coding automation system disclosed herein provides an end-to-end testing automation framework, which minimizes (and in some cases eliminates) the requirement for testers to write software code to test software modules. Instead, the coding automation systems and methods provide a hierarchical framework to translate testing requests (commands, statements, and so on) received in a natural language (for example, English) to testing code modules written in, for example, one or more programming languages (for example, tool specific Application Program Interface (API)/libraries developed to test functionality).
Systems and methods discussed herein are directed to allocating subframes (or slots) of radio frames for LTE uplink transmissions and NR uplink transmissions. In some instances, subframes (or slots) of radio frames may be allocated for LTE downlink transmissions and NR downlink transmissions.
Techniques are described herein for implementing a presence application server to handle Universal Profile (UP) transfers over roaming. The presence application server may receive a Session Initiation Protocol (SIP) request from a user device. The SIP request can include presence information of the user device, P-Access-Network-Info (PANI), and a subscriber identifier of a subscriber associated with the user device. Based at least on the presence information, the presence application server can determine whether the user device is UP capable. Additionally, the presence application server can determine whether the user device is roaming based at least on the PANI. If the user device is roaming, the presence application server can indicate that the user device is roaming and remove a tuple associated with the presence information indicating the UP capabilities of the user device in a SIP response. Removing the tuple suspends the user device's UP capabilities.
H04W 8/18 - Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
H04W 8/02 - Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
H04W 80/10 - Upper layer protocols adapted for session management, e.g. SIP [Session Initiation Protocol]
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
93.
MOBILE AERIAL DRONE EARLY WARNING PRIVACY BREACH DETECT, INTERCEPT, AND DEFEND SYSTEMS AND METHODS
Systems and methods for aerial unmanned vehicle (for example, drone) early warning privacy breach detection, interception, and defense are disclosed. The system detects drones within a threshold distance of an individual or configurable location, notifies the individual of the drones' existence, tracks the drones, and executes countermeasures. The system can communicate with telecommunication networks or other sources (for example, FAA) to identify and filter out drones that are authorized to be in the airspace around the individual.
A fifth generation (5G) radio access network (RAN) can determine that a user equipment (UE) should fall back to engaging in a communication session over an LTE-based Evolved Packet System (EPS) instead of a 5G system. However, to avoid interrupting setup operations that may be occurring separately for that communication session in an IP Multimedia Subsystem (IMS) apart from the 5G system, the EPS fallback can be delayed such that setup in the IMS can proceed at least to a point at which IMS signaling messages are less likely to be undeliverable due to the EPS fallback.
Systems, devices, and techniques described herein relate to intelligently allocating network resources to Quality of Service (QoS)-sensitive data traffic. An example method includes identifying a request to deliver QoS-sensitive services to a User Equipment (UE) over at least one delivery network. The at least one delivery network may include at least one reserved resource and at least one pooled resource. The QoS-sensitive services are determined to be delivered over the at least one pooled resource. In addition, delivery of the QoS-sensitive services is caused over the at least one pooled resource.
Systems, devices, and techniques described herein relate to user plane system selection based on latency in mobile networks. In particular, the systems, devices, and techniques can be implemented in fifth generation (5G) mobile networks to provide selection of a user plane function (UPF) based on latency. The UPF can measure a latency toward an access network and provide an indication of the latency to a policy control function (PCF). The PCF can select the UPF based on the indication and can request the UPF to provide services to a user equipment (UE) originating a priority request. In response, the UPF can provide services to the UE.
Policy based dual connectivity traffic steering is described herein. A master Long-Term Evolution (LTE) base station may operate in conjunction with a secondary New Radio (NR) base station to provide dual connectivity to user equipment (UE) operating in an environment. The LTE base station can steer traffic between the LTE base station and the NR base station based at least in part on policy information received at the LTE base station. The policy information can indicate, for a particular UE and for a particular Quality of Service (QoS) Class Identifier (QCI), whether the LTE base station can transfer a communication to the NR base station. Thus, traffic steering determinations can be based on the policy information, quality identifiers, device capability, signal strength(s), load level(s), and the like, thereby providing a flexible framework for steering wireless traffic in a dual connectivity environment.
H04W 28/02 - Traffic management, e.g. flow control or congestion control
H04W 76/16 - Setup of multiple wireless link connections involving different core network technologies, e.g. a packet-switched [PS] bearer in combination with a circuit-switched [CS] bearer
98.
SYSTEMS AND METHODS FOR MANAGING CELLULAR MULTI-CONNECTIVITY
Systems and methods for managing multiple network connections for user equipment (UE) are disclosed. The systems and methods can monitor power headroom (PHR) reports on one or more networks. When the PHR report for a UE approaches a first predetermined level on a first network, the system can evaluate the UE for a predetermined amount of time. If during the predetermined amount of time, the PHR on the first network increases to a second predetermined level - i.e., to a level where the transmission power used by the UE is closer to a maximum transmission power that the UE can provide - the UE can be instructed to disconnect from the network. This can enable the UE to disconnect in a controlled manner rather than simply letting the connection "drop" due to radio link failure.
H04W 76/38 - Connection release triggered by timers
H04W 76/16 - Setup of multiple wireless link connections involving different core network technologies, e.g. a packet-switched [PS] bearer in combination with a circuit-switched [CS] bearer
H04W 52/36 - Transmission power control [TPC] using constraints in the total amount of available transmission power with a discrete range or set of values, e.g. step size, ramping or offsets
H04W 88/10 - Access point devices adapted for operation in multiple networks, e.g. multi-mode access points
99.
TIME-DIVISION MULTIPLEXING FOR 5G NETWORK COVERAGE EXTENSION
Techniques for time-division multiplexing for extending 5thGeneration (5G) network coverage are described herein. In an example, a device operating in a dual transmission mode for transmitting data via a first network node associated with a 5G network and a second network node associated with a 4th Generation (4G) network at or near a same time, can determine a measurement associated with a transmission and/or receiving characteristic. The device can determine that the measurement meets or exceeds a threshold and, based at least in part on determining that the measurement meets or exceeds the threshold, the device can transition to an alternating transmission mode for transmitting data via the first network node and the second network node in an alternating pattern thereby extending 5G network coverage.
H04W 76/16 - Setup of multiple wireless link connections involving different core network technologies, e.g. a packet-switched [PS] bearer in combination with a circuit-switched [CS] bearer
H04W 88/06 - Terminal devices adapted for operation in multiple networks, e.g. multi-mode terminals
100.
USE-TRIGGERED SIGNAL SCANNING FOR NETWORK DETECTION
A wireless communication system may support two types of networks, such as a 4th- Generation (4G) network and a 5th-Generation (5G) network. The 4G network is accessed through Long-Term Evolution (LTE) base stations. The 5G network is accessed through New Radio (NR) base stations. During idle mode, a communication device may scan 5G RF frequencies to determine whether a 5G signal is available and whether to display a 5G network symbol in the status bar of the device. The communication device is configured to detect conditions indicating whether a user of the device is likely viewing the device and/or the display of the device. If it is unlikely that the user is viewing the device or its screen, RF frequency scanning is paused to reduce power consumption and the currently displayed network symbol is maintained until RF frequency scanning is resumed.
H04W 48/16 - Discovering; Processing access restriction or access information
H04W 48/08 - Access restriction or access information delivery, e.g. discovery data delivery
H04W 76/16 - Setup of multiple wireless link connections involving different core network technologies, e.g. a packet-switched [PS] bearer in combination with a circuit-switched [CS] bearer
H04W 88/06 - Terminal devices adapted for operation in multiple networks, e.g. multi-mode terminals