A location of a mobile phone in a cellular network is determined when the mobile phone has been turned off, placed in airplane mode, inactive mode or in idle mode. A first cell of interest and times of interest is received, and a location determination server in communication with the cellular network requests call data records (CDRs) associated with the first cell of interest and the times of interest. The location determination server receives the requested CDRs and determines possible locations of the mobile phone at the times of interest when the mobile phone antenna is powered off, airplane mode, idle or inactive using the received CDRs.
A cellular network system includes a multi-core network having core slices, at least one cell site, and a network exposure layer. The cell sites are configured to receive communications from a plurality of tenants. The network exposure layer is configured to receive, through the cell site(s), a plurality of requests for bandwidth from an application programming interface (API) of the plurality of tenants. One of the requests includes a first request from a first API of a first tenant. In response to the first tenant being determined to be authenticated using information from the first request, a first core slice is determined to be associated with the first tenant. Data transfers are then provided between the first tenant and the first core slice in response to determining that the first core slice is associated with the first tenant and the first tenant being authenticated.
A method for generating a digital twin of a radio network (RN) is disclosed that includes accessing, by one or more processing devices, a digital twin representation (DTR) of the RN, the RN including a plurality of nodes configured to enable communications between wireless user equipments (UEs), the DTR including virtual representations of the plurality of nodes and the interconnections. Using a trained machine learning (ML) model, a subset of the DTR is identified, the subset being representative of operating conditions for a particular time range. The method includes determining, by the processing devices via monitoring parameters of the subset of the DTR, that at least one of the operating conditions of the RN is outside of an expected range. In response to determining that the operating conditions of the RN is outside of the expected range, generating an output signal is generated indicative of a condition of the RN.
A session change over system monitors nodes to determine whether they are operational, and transfers user equipment from one node to another when nodes are not operational. The session change over system receives one or more health check messages from one or more foreign nodes which communicate with user equipment. The session change over system inspects each health check message to determine whether a foreign node is not operational. The session change over system identifies user equipment in communication with the foreign node at a time before the foreign node was not operational. The session change over system communicates with the identified user equipment in place of the foreign node.
H04L 69/40 - Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass for recovering from a failure of a protocol instance or entity, e.g. service redundancy protocols, protocol state redundancy or protocol service redirection
A cellular network system includes a multi-core network having core slices, at least one cell site, and a network exposure layer. The cell sites are configured to receive communications from a plurality of tenants. The network exposure layer is configured to receive, through the cell site(s), a plurality of requests for bandwidth from an application programming interface (API) of the plurality of tenants. One of the requests includes a first request from a first API of a first tenant. In response to the first tenant being determined to be authenticated using information from the first request, a first core slice is determined to be associated with the first tenant. Data transfers are then provided between the first tenant and the first core slice in response to determining that the first core slice is associated with the first tenant and the first tenant being authenticated.
SYSTEMS AND METHODS FOR A MULTIPLE MESSAGING SERVICE MANAGEMENT (MMSM) GATEWAY SEPARATING DIFFERENT TYPES OF WIRELESS NETWORK TRAFFIC FOR LAW ENFORCEMENT INTERCEPTION
A Multiple Messaging Service Management (MMSM) gateway (e.g., a Short Message Peer-to-Peer (SMPP) gateway), when receiving SMS and Multimedia Message Service (MMS) communications, determines whether users sending or receiving such communications are subjects (i.e., targets) of a law enforcement agency data intercept request. The MMSM gateway electronically separates out of the communications voice data, text data, image data and/or video data from the communications. In response to determining that the user sending and/or the user receiving the communication is the subject of at least one of the law enforcement agency data intercept requests, the MMSM gateway sends the separated-out voice data, text data, image data and/or video data to one or more law enforcement agencies associated with the applicable law enforcement agency data intercept request. The MMSM gateway may send a separate feed to the law enforcement agency for the SMS traffic and for the MMS traffic.
Embodiments are directed towards systems and methods for downlink access control in a communications network. An example method includes a base station receiving a request for downlink (DL) communication with a user equipment (UE), and the base station performing the following actions without communicating with the UE regarding the request for the DL communication: determining an unavailability of a resource required for the DL communication; responsive to the determined unavailability, sending a rejection of the request; determining an availability of the resource; and responsive to the determined availability, sending an indication of the availability of the resource required for the DL communication.
Methods and apparatuses for improving telecommunications services by intelligently deploying redundant links within a data center hierarchy to satisfy latency, power, availability, and quality of service requirements are described. A data center hierarchy of a cellular network is established with a first data center layer, a second data center layer, and a third data center layer. A first redundant link is established between a first node in the first data center layer and a third node in the third data center layer. In response to detecting that a failure rate of the first data center layer exceeds a threshold failure rate, the first redundant link is removed and a second redundant link is added between the third node and a second node in the second data center layer.
H04L 1/22 - Arrangements for detecting or preventing errors in the information received using redundant apparatus to increase reliability
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
Systems, devices and methods for customer specific network slicing include a virtual network operator (VNO) server, a first node, and a virtualized network. The VNO server instantiates a solution manager engine which identifies a Solution, communicates the Solution to the first node, and upon acceptance of the Solution by the first node, instructs the virtualized network to couple the first node with a second node in accordance with the Solution. The virtualized network may include network function virtualization infrastructure and the Solution may include a slice of the virtualized network. The slice satisfies a Service Level Requirement (SLR), such as one that specifies a maximum latency for the slice. The SLR is specified in a Need received by the VNO server from the first node. The SLR is determined based upon an application program the first Node is at least one of currently executing and expected to later execute.
Methods and systems for scaling energy consumption in wireless network infrastructure, while retaining the ability to quickly scale when load changes. This end is accomplished by using containerized (or virtualized) applications to implement 5G core Network Functions, and utilizing network redundancy/geo-redundancy or a multihoming transport protocol for communication between these containerized (or virtualized) applications and other 5G system elements such as the network functions of the Radio Access Nodes (RANs) or the network functions of 5G Core. In particular, one or more core Network Functions (NFs) are instantiated as containerized applications executing on one or more virtualized hosts in a cloud-native orchestration environment. The containers are selectively activated or deactivated based on a demand for utilization of the associated NF. Because elements of the 5G RAN, 5G Core and one or more NFs are connected to one another via a protocol that supports network redundancy and/or geo-redundancy and/or multihoming, endpoint addressing need not be reconfigured when demand on the NFs changes.
H04L 41/0833 - Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability for reduction of network energy consumption
H04L 41/0897 - Bandwidth or capacity management, i.e. automatically increasing or decreasing capacities by horizontal or vertical scaling of resources, or by migrating entities, e.g. virtual resources or entities
11.
CELLULAR NETWORK HOSTED TELECOMMUNICATIONS RELAY SERVICES METHODS AND SYSTEMS
Various arrangements for providing cellular network hosted telecommunications relay services (TRS) are detailed herein. A piece of user equipment (UE) can be reassigned from a first slice of the cellular network to a second slice of the cellular network that provides TRS. In response to a voice call being initiated and the UE being assigned to the second slice, a TRS function hosted by the cellular network can be provided for the voice call.
A cellular network having radio access network (RAN) nodes where each RAN node includes (i) a central unit (CU) that resides on a public cloud of the cellular network, (ii) a distributed unit (DU) that resides on a private cloud of the cellular network such that the DU is in communication with the CU on the public cloud of the cellular network, and (iii) a radio unit (RU) under control of the DU. The cellular network also has network repository functions (NRFs) that are distributed on the cellular network and reside on at least the public cloud of the cellular network where the NRFs control operation of cell sites and local data centers (LDCs) on the cellular network. The network also has processors configured to control data collection edge applications residing with the NRFs that are distributed on the cellular network.
A method may include receiving, by a computing system of a front-end service provider, a communications request including user data. The method may include determining, by the computing system of the front-end service provider, that one or more back-end service providers can fulfil the communications request. The method may include transmitting, by the computing system of the front-end service provider, data associated with the communications request and/or the one or more back-end service providers to a proxy service. The method may include receiving, by the computing system of the front-end service provider and from the proxy service, information associated with a back-end service provider of the one or more back-end service providers. The method may also include establishing, by the computing system of the front-end service provider, a communications connection with the back-end service provider and transmitting the user data such that the communications request is fulfilled.
H04L 41/5006 - Creating or negotiating SLA contracts, guarantees or penalties
H04L 41/50 - Network service management, e.g. ensuring proper service fulfilment according to agreements
H04L 41/5009 - Determining service level performance parameters or violations of service level contracts, e.g. violations of agreed response time or mean time between failures [MTBF]
14.
TARGET ENVIRONMENT AGNOSTIC NETWORK FUNCTION DEPLOYMENT PIPELINE
A system for deploying network functions into target cloud environments in a cellular telecommunication network is cloud computing service provider agnostic. The system may use target environment agnostic GUIs to collect network function and IP address information for the deployment of the network function. The system populates a template for deploying the network function based on the network function and IP address information as well as the identity of the target environment. The system builds and deploys the network functions in the target environment based on the template.
A mobile network operator may deploy a distributed network stack including, deploying a first cloud native function in a first public cloud and deploying a second cloud native function in a second public cloud. A system may provide a connected virtual private cloud. A system may deploy one or more virtual routers within the connected virtual private cloud. A system may connect the first public cloud and the second public cloud to the connected virtual private cloud using the one or more virtual routers in the connected virtual private cloud to form the overlay network. A system may transmit data traffic between the first cloud native function and the second cloud native function using the overlay network.
A connected streetlamp has live video feed zooming capabilities, Fifth Generation (5G) cellular wireless functionality, and traffic analytics capabilities using artificial intelligence (AI) and computer vision image recognition functionality built in to the monitoring device operably attached to or otherwise integrated with the streetlamp head. In other embodiments, the monitoring device may be located on or integrated with other parts of the streetlamp, or located on or integrated with a telephone poll, post, fence, building or other structure located alongside or near a street or road. A vehicle traffic monitoring system may include a plurality of multi-access edge computing (MEC) vehicle traffic monitoring devices each integrated in a respective connected streetlamp.
Various arrangements for dynamically adjusting physical resource block (PRB) usage on a cellular network are presented. An entity may be determined to be exercising its priority to spectrum overlapping PRBs used by the cellular network. A frequency band being used by the entity based on measuring the signal strengths of wireless transmission by the entity can be determined. Subcarriers of the PRBs are identified that overlap the frequency band. A predefined Physical Random Access Channel (PRACH) format can be selected based at least in part on the identified subcarriers. A predefined Physical Uplink Control Channel (PUCCH) format can be selected based at least in part on the identified plurality of subcarriers.
A disclosed method may include (i) building, based on telemetry data from an open radio access network, a machine learning model that predicts when a candidate distributed unit within the open radio access network will experience a failure, (ii) detect, by applying the machine learning model that predicts when the candidate distributed unit will shut down, that a specific distributed unit will experience a specific failure, and (iii) perform, in response to detecting that the specific distributed unit will experience the specific failure, a remedial action that addresses the specific failure. Related systems and computer-readable mediums are further disclosed.
H04W 24/04 - Arrangements for maintaining operational condition
H04L 41/0654 - Management of faults, events, alarms or notifications using network fault recovery
H04L 41/082 - Configuration setting characterised by the conditions triggering a change of settings the condition being updates or upgrades of network functionality
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
A disclosed method may include (i) building, based on telemetry data from an open radio access network, a machine learning model that predicts when a candidate distributed unit within the open radio access network will experience a failure, (ii) detect, by applying the machine learning model that predicts when the candidate distributed unit will shut down, that a specific distributed unit will experience a specific failure, and (iii) perform, in response to detecting that the specific distributed unit will experience the specific failure, a remedial action that addresses the specific failure. Related systems and computer-readable mediums are further disclosed.
H04W 24/02 - Arrangements for optimising operational condition
H04L 41/0631 - Management of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
H04L 41/0823 - Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
H04W 24/04 - Arrangements for maintaining operational condition
DISH Network Technologies India Private Limited (India)
Inventor
Gu, Chris
Cuavas, Orlando
Srinivasan, Prakash
Abstract
In various embodiments, zero touch provisioning (ZTP) in a cloud based 5G system are provided. In some embodiments, the ZTP includes receiving a request to perform ZTP on the component in the 5G system; generating a ZTP request based on the request; obtaining a ZTP payload according to the ZTP request; determining one or more ZTP operations based on the ZTP payload; determining instances of the component in the 5G system for the ZTP operations; distributing the ZTP payload to the first and second instances of the component in the 5G system to carry out the ZTP operations; determining one or more results of the ZTP operations; generating feedback information based on the one or more results of the ZTP operations.
A connected streetlamp has live video feed zooming capabilities, Fifth Generation (5G) cellular wireless functionality, and traffic analytics capabilities using artificial intelligence (AI) and computer vision image recognition functionality built in to the monitoring device operably attached to or otherwise integrated with the streetlamp head. In other embodiments, the monitoring device may be located on or integrated with other parts of the streetlamp, or located on or integrated with a telephone pole, post, fence, building or other structure located alongside or near a street or road. A vehicle traffic monitoring system may include a plurality of multi-access edge computing (MEC) vehicle traffic monitoring devices each integrated in a respective connected streetlamp.
G08G 1/01 - Detecting movement of traffic to be counted or controlled
G08G 1/04 - Detecting movement of traffic to be counted or controlled using optical or ultrasonic detectors
H04N 23/69 - Control of means for changing angle of the field of view, e.g. optical zoom objectives or electronic zooming
H04W 4/38 - Services specially adapted for particular environments, situations or purposes for collecting sensor information
H04W 4/44 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]
22.
VEHICLE TRAFFIC MONITORING DEVICE SYSTEMS AND METHODS
A connected streetlamp has live video feed zooming capabilities, Fifth Generation (5G) cellular wireless functionality, and traffic analytics capabilities using artificial intelligence (AI) and computer vision image recognition functionality built in to the monitoring device operably attached to or otherwise integrated with the streetlamp head. In other embodiments, the monitoring device may be located on or integrated with other parts of the streetlamp, or located on or integrated with a telephone pole, post, fence, building or other structure located alongside or near a street or road. A vehicle traffic monitoring system may include a plurality of multi-access edge computing (MEC) vehicle traffic monitoring devices each integrated in a respective connected streetlamp.
Various systems and methods for cellular network slice management are presented. An application may be determined to be authorized to manage a cellular network slice utilized by the application for communication with user equipment. A request can be received from the application to modify the cellular network slice from the application. In response to the request, a parameter of the cellular network slice may be modified. The cellular network can then use the modified slice for communication with user equipment for the cloud-based application.
When a failed connection is detected from a first radio unit (RU) to the cellular site router (CSR), activation of an existing backup cabled connection from the first RU to the CSR through a cabled connection between the first RU and a second RU of the cellular telecommunications tower may be performed. In one example, a first RU and second RU each have two physical network ports. The activation of the existing backup cabled connection from the first RU, via the second RU, to the CSR may include causing the first RU to enter from a normal operating mode into an Open Radio Access Network (O-RAN) cascade operating mode to attempt to attain network connectivity for the first RU using the second physical network port of the first RU.
H04W 84/02 - Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
H04L 41/0654 - Management of faults, events, alarms or notifications using network fault recovery
H04L 61/5076 - Update or notification mechanisms, e.g. DynDNS
H04L 101/622 - Layer-2 addresses, e.g. medium access control [MAC] addresses
A disclosed method may include (i) implementing, within a cloud computing platform, a hierarchical quality-of-service policy that includes a parent quality-of-service sub-policy in relation to a child quality-of-service sub-policy, (ii) receiving telecommunication traffic as part of a cellular service platform implemented through the cloud computing platform, and (iii) applying, within the cloud computing platform, the hierarchical quality-of-service policy to the telecommunication traffic to satisfy a predetermined level of quality of service.
A disclosed method may include (i) building, based on telemetry data from an open radio access network, a machine learning model that predicts when a candidate distributed unit within the open radio access network will experience a failure, (ii) detect, by applying the machine learning model that predicts when the candidate distributed unit will shut down, that a specific distributed unit will experience a specific failure, and (iii) perform, in response to detecting that the specific distributed unit will experience the specific failure, a remedial action that addresses the specific failure. Related systems and computer-readable mediums are further disclosed.
H04W 24/04 - Arrangements for maintaining operational condition
H04L 41/0631 - Management of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
H04L 41/0654 - Management of faults, events, alarms or notifications using network fault recovery
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
A mobile network operator may deploy a distributed network stack including, deploying a first cloud native function in a first public cloud and deploying a second cloud native function in a second public cloud. A system may provide a connected virtual private cloud. A system may deploy one or more virtual routers within the connected virtual private cloud. A system may connect the first public cloud and the second public cloud to the connected virtual private cloud using the one or more virtual routers in the connected virtual private cloud to form the overlay network. A system may transmit data traffic between the first cloud native function and the second cloud native function using the overlay network.
H04L 41/40 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities
H04L 45/586 - Association of routers of virtual routers
H04L 45/64 - Routing or path finding of packets in data switching networks using an overlay routing layer
Various arrangements for handling a voice over Internet protocol (VoIP) emergency call are provided herein. A VoIP emergency call can be made to a designated emergency phone number from a user equipment (UE). During the VolP emergency call, location data can be obtained from a presence information data format location object (PIDF-LO) tag. The location data from the PIDF-LO tag can be compared with a registered location mapped to the UE. If determined that the location data indicates a location more than a threshold distance away from the registered location, a registered location update request can be transmitted to the UE.
Systems and methods are provided for offering tenants the ability to purchase commoditized network resources in a next-generation, large-scale wireless communication network (e.g., a 5G or 6G cellular network) according to dynamic pricing. For example, the network can update pricing of commoditized network resources intelligently and dynamically based on present and/or predicted supply and/or demand of the network resources. The updated pricing is offered to tenants on a periodic or other basis, and the tenants can decide whether to purchase more or less of those resources based on the updated pricing. The network can adjust resource allocations to the tenants based on the updated purchase decisions. The network can also automatically adjust QoS parameters for the tenants to fit within their purchased resource allocations.
Techniques for dynamically reducing cell site component power consumption are disclosed. A load associated with an antenna of a cell site of a cellular network is determined. The load is compared to a predetermined threshold. Whether the load is below the predetermined threshold is determined. In response to the load being determined to be below the predetermined threshold, electrical power for the antenna is reduced. in response to the load being determined to be above the predetermined threshold, electrical power for the antenna is maintained. Reducing the electrical power for the antenna may include turning off a power amplifier for the antenna, turning off an antenna port of a radio unit that communicates with the antenna or an antenna port thereof, etc.
Techniques for allocating cell site component capacity to conserve power are disclosed. Antenna ports of a radio unit are identified and a capacity for each antenna port is obtained. A throughput of a first antenna is obtained. A configuration for the first antenna is determined based on the throughput and the antenna port capacities. One or more antenna ports are selected, based on the capacities and the configuration for the first antenna, to allocate to the first antenna. The one or more antenna ports of the radio unit are then allocated to the first antenna. Antenna ports of the radio unit that are not allocated to the first antenna may be entered into a reduced-power state or allocated to a second antenna of the cell site.
A cellular network having radio access network (RAN) nodes where each RAN node includes (i) a central unit (CU) that resides on a public cloud of the cellular network, (ii) a distributed unit (DU) that resides on a private cloud of the cellular network such that the DU is in communication with the CU on the public cloud of the cellular network, and (iii) a radio unit (RU) under control of the DU. The cellular network also has network repository functions (NRFs) that are distributed on the cellular network and reside on at least the public cloud of the cellular network where the NRFs control operation of cell sites and local data centers (LDCs) on the cellular network. The network also has processors configured to control data collection edge applications residing with the NRFs that are distributed on the cellular network.
H04L 41/08 - Configuration management of networks or network elements
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
H04L 43/08 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
33.
WIRELESS COMMUNICATION SYSTEMS FOR SELECTING ONE OR MORE ANTENNA PORTS FOR DOWNLINK TRANSMISSION
A method for selecting one or more antennas disposed at a base station BS of a wireless communication system, where the method includes: transmitting, to one or more use equipment (UE), one or more initial synchronization signal blocks (SSB) and one or more initial channel state information-reference signals (CSI-RS) using a plurality of antenna ports, receiving, from the one or more UE, signals including at least one parameter indicative of corresponding operating conditions at the one or more UE in response to the transmitted one or more initial SSB and CSI-RS, selecting one or more antenna ports among the plurality of antenna ports based on the received at least one parameter, and performing downlink transmission using the selected one or more antenna ports.
H04B 7/06 - Diversity systems; Multi-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
H04L 5/00 - Arrangements affording multiple use of the transmission path
H04W 52/24 - TPC being performed according to specific parameters using SIR [Signal to Interference Ratio] or other wireless path parameters
34.
WIRELESS COMMUNICATION SYSTEMS FOR SELECTING ONE OR MORE ANTENNA PORTS FOR DOWNLINK TRANSMISSION
A method for selecting one or more antennas disposed at a base station BS of a wireless communication system, where the method includes: transmitting, to one or more use equipment (UE), one or more initial synchronization signal blocks (SSB) and one or more initial channel state information-reference signals (CSI-RS) using a plurality of antenna ports, receiving, from the one or more UE, signals including at least one parameter indicative of corresponding operating conditions at the one or more UE in response to the transmitted one or more initial SSB and CSI-RS, selecting one or more antenna ports among the plurality of antenna ports based on the received at least one parameter, and performing downlink transmission using the selected one or more antenna ports.
H04B 7/06 - Diversity systems; Multi-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
H04L 5/00 - Arrangements affording multiple use of the transmission path
35.
DYNAMICALLY TRANSFERRING CELL TRAFFIC TO REDUCE POWER CONSUMPTION
Techniques for dynamically transferring cell traffic to reduce power consumption are disclosed. A method for dynamically transferring cell traffic to reduce power consumption begins by determining a load on radio units that service a geographic area. A determination is made that the load on a first radio unit fails to satisfy a reduce power threshold. A determination is made that the load on the first radio unit satisfies a transfer threshold. The load on the first radio unit is transferred to at least a second radio unit such that the first radio unit satisfies the reduce power threshold. Then, a component associated with the first radio unit to turn off is selected. The component is turned off, causing the first radio unit to enter a reduced-power state.
This disclosure relates to assessment of data quality for unstructured data. In some aspects, a method includes obtaining, by one or more computing devices, metadata of multiple data files; analyzing a graph database representative of the multiple data files and generated using the metadata, to identify unstructured data included in one or more data files, the graph database representing features of the multiple data files, and relationships among the features of the multiple data files; obtaining a set of customized rules for the unstructured data based on context of the unstructured data; determining that the unstructured data fails to satisfy the set of customized rules; and in response to determining that the unstructured data fails to satisfy the set of customized rules, modifying the unstructured data to satisfy the set of customized rules.
Various arrangements for cellular network slice usage management are presented herein. In response to an application being launched for execution, an access point name (APN) list update request can be transmitted. In response, an APN list update can be transmitted back to the UE based on the application being executed. The UE's stored APN list can be updated based on the APN list update. The UE can then determine a bearer slice to use for cellular network communications based on the updated stored APN list.
Various arrangements for cellular network slice usage management are presented herein. In response to an application being launched for execution, an access point name (APN) list update request can be transmitted. In response, an APN list update can be transmitted back to the UE based on the application being executed. The UE's stored APN list can be updated based on the APN list update. The UE can then determine a bearer slice to use for cellular network communications based on the updated stored APN list.
Data acquired from at least one source is provided for observability on a cloud network. The data is placed in a common language for observability on the network so that data can be targeted based on a telemetry characteristic. Data having a first telemetry characteristic is acquired and routed to a destination for observability, whereas data having a second telemetry characteristic may be routed to another destination to be stored for observability.
An apparatus is configured to communicate with multiple network components in a service-based architecture and comprises a memory and a processor. The memory stores multiple configuration commands. The processor is configured to generate a request to establish a communication session between a first network component, a second network component, and a third network component. The first network component exchanges connectivity signals with the second network component and the third network component. The second network component performs first plurality of session operations in response to the connectivity signals exchanged with the first network component. The second network component reports to the third network component that the first session operations are performed. The processor is further configured to, in response to determining that the communication session between the first network component and the second network component is lost, maintain the communication session between the first network component and the third network component.
H04L 41/0654 - Management of faults, events, alarms or notifications using network fault recovery
H04L 43/0811 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking connectivity
DISH Network Technologies India Private Limited (India)
Inventor
Shahdad, Mohammad Dawood
Arora, Ankesh
S, Kulasekaran
Abstract
An apparatus is configured to communicate with multiple network components in a service-based architecture and comprising a memory and a processor. The memory stores multiple configuration commands; multiple local provisioning parameters; and a configuration script. Each local provisioning parameter is a backup copy of a corresponding configuration command. The processor is configured to generate a request to establish a communication session between a first network and a second network component. Further, the processor is configured to establish the communication session between the first network component and the second network component based at least in part upon a configuration command; determine that the communication session is lost based at least in part upon identifying an interruption in the communication session; and execute the configuration script to instruct the first network component to establish a backup communication session based at least in part upon a local provisioning parameter.
An apparatus is communicatively coupled to a plurality of databases in a service-based architecture and comprises a memory and a processor. The memory stores multiple configuration commands. The processor is configured to generate a request to establish a communication session in which a network component accesses a first database and a second database based at least in part upon a configuration command of the configuration commands. The network component exchanges connectivity signals with the first database and the second database. The first database provides database operations in response to the connectivity signals exchanged with the network component. The first database reports to the second database that the database operations are provided. The processor is further configured to, in response to determining that the communication session between the network component and the first database is lost, maintain the communication session to access the second database.
H04L 41/0654 - Management of faults, events, alarms or notifications using network fault recovery
H04L 67/1097 - Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
Technologies for estimating performance for a communications network are disclosed. An example method includes obtaining a proposed entire coverage of the communications network, and prior to live traffic being generated by users on the communications network: determining a drive test pattern commensurate with the proposed entire coverage, causing performance of drive tests in accordance with the drive test pattern, and in real-time: analyzing drive test data from the drive tests, and generating emulated network performance metrics for the communications network based on the analyzing of the drive test data.
H04L 43/08 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
44.
CONCURRENTLY SUPPORTING INTERNET PROTOCOL VERSION 6 (IPV6) AND INTERNET PROTOCOL VERSION 4 (IPV4) IN A CLOUD-MANAGED WIRELESS TELECOMMUNICATION NETWORK
Example embodiments are directed towards concurrently supporting IPv6 and IPv4 in a cloud-managed wireless telecommunication network. This may include electronically providing support for internet Protocol IPv4 network traffic of user equipment (UEs) in a cloud-native, O-RAN, 5G NR cellular telecommunication network, and also electronically providing support for IPv6 network traffic of UEs in the cloud-native, O-RAN, 5G NR cellular telecommunication network while concurrently providing the support IPv4 network traffic. the wireless telecommunication service provider that is an MNO of the cloud-native, O-RAN, 5G NR cellular telecommunication network controls routing of the IPv6 network traffic within a cloud computing service provider cloud in which the cloud-native, O-RAN, 5G NR cellular telecommunication network operates.
DISH NETWORK TECHNOLOGIES INDIA PRIVATE LIMITED (India)
Inventor
Shahdad, Mohammad Dawood
Arora, Ankesh
S, Kulasekaran
Sarath, Arjun
Abstract
An apparatus is configured to communicate with multiple network components in a service-based architecture and comprising a memory and a processor. The memory stores multiple configuration commands; multiple local provisioning parameters; and a configuration script. Each local provisioning parameter is a backup copy of a corresponding configuration command. The processor is configured to generate a request to establish a communication session between a first network and a second network component. Further, the processor is configured to establish the communication session between the first network component and the second network component based at least in part upon a configuration command; determine that the communication session is lost based at least in part upon identifying an interruption in the communication session; and execute the configuration script to instruct the first network component to establish a backup communication session based at least in part upon a local provisioning parameter.
H04L 41/0663 - Performing the actions predefined by failover planning, e.g. switching to standby network elements
H04L 69/40 - Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass for recovering from a failure of a protocol instance or entity, e.g. service redundancy protocols, protocol state redundancy or protocol service redirection
H04W 24/04 - Arrangements for maintaining operational condition
A computer-implemented method of provisioning a software service is provided. In one example, the method includes: receiving a request to provision the software service, the request including information indicating a profile configuring the software service on a source deployment platform; obtaining the profile based on the request from a web server interface; determining a version of the software service for provisioning the software service on a destination deployment platform; and generating a deployment document, the generating comprising writing the determined version of the software service to the deployment document.
Various arrangements for performing intelligent cellular channel management are presented herein. A physical cellular communication channel may be established between a user equipment (UE) and a cellular network for sending a short message service (SMS) message in response to a cellular service request from the UE. A machine learning arrangement can be used to determine a duration of time for which the physical cellular communication channel is to be kept active. A channel maintenance instruction may be transmitted to keep the physical cellular communication channel active based on a cellular network messaging controller making the determination.
A method for analyzing communication traffic at a base station of a cellular network is provided. The method includes logging into a router at the base station of the cellular network, where: the router is connected with a radio unit and a distributed unit, the radio unit, the router, and the distributed unit being located on-site as part of the base station. The method also includes loading, by the router, a container into a container engine being executed by the router. The method also includes capturing, controlled by the container loaded into the container engine of the router, packet data transmitted from a first component of the cellular network to a second component of the cellular network that is part of the base station.
H04L 43/0811 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking connectivity
Digital document and network management (DDMS) system includes digitizing a document into a standard digital format, and storing the digitized document in an authoritative CTR governance database. The DDMS system also includes organizing a plurality of technical requirements extracted from the digitized contract within the authoritative CTR governance database, and linking a plurality of network function test cases to the plurality of technical requirements. Furthermore, the DDMS system includes storing a plurality of results in the authoritative CTR governance database.
Methods, devices, and systems for network slicing are provided. In one example, a method includes: selecting a first network slice and a second network slice both pertaining to a common data network, designating a first traffic flow to the first network slice and a second traffic flow to the second network slice, generating a first network slice profile including a first network identifier and first mapping information, generating a second network slice profile including a second network identifier and second mapping information, assigning the first network slice profile to the first traffic flow and the second network slice profile to the second traffic flow, and separating the first traffic flow from the second traffic flow on a user plane function (UPF) instance, based on the assigned first network slice profile and the second network slice profile.
Devices, systems and methods for securing an electronics cabinet are disclosed. A first system includes a fixed bracket assembly (“FBA”) attached to first electronics cabinet (“EC”) panel, a first arm, and a lock bracket assembly (“LBA”) attached to a second EC panel. The first arm extends across a third panel of the EC and is attached, at a proximal portion, to the LBA and, at a distal portion, to the FBA. The first arm, when so attached, prevents opening of at least one of the EC panels. The FBA includes a first plate with holes, a first slot, and a second plate. The FBA-FP is placed on the exterior of the first panel. The FBA-SP is placed on the interior of the first panel. The FBA is secured to the first panel by fasteners inserted into the FBA-FP holes, the holes in the first panel, and the FBA-SP holes.
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for monitoring a fronthaul interface. One of the methods includes receiving one or more messages exchanged between two internal nodes of a base station of an open radio access network (Open-RAN) through a fronthaul interface of the Open-RAN, the fronthaul interface being an interface between one or more radio units (RUs) and one or more distributed units (DUs) of the RAN, determining, based on the one or more messages, that an event affecting an operation status of the fronthaul interface has occurred, determining one or more actions to account for the operation status of the fronthaul interface, and generating a signal configured to trigger the one or more actions.
A technique is described for metering signals transmitted from a variety of frequency bands. As an example, receiving, at the software-defined multiband power meter, a first selection of a first modulation scheme corresponding to a first frequency range, configuring the software-defined multiband power meter to accept detection of a first set of one or more signals within the first frequency range, wherein the software-defined multiband power meter is configured to isolate the first set of one or more signals of the first frequency range, detecting the first set of one or more signals within the first frequency range, measuring a first signal quality of the first set of one or more signals, and transmitting one or more data packets identifying at least one signal quality measurement of the first set of one or more signals.
G01R 22/10 - Arrangements for measuring time integral of electric power or current, e.g. electricity meters by electronic methods using digital techniques
G01R 23/02 - Arrangements for measuring frequency, e.g. pulse repetition rate; Arrangements for measuring period of current or voltage
Methods, systems, and apparatus, including computer programs encoded on computer-storage media, for self-optimizing networks. In some implementations, a method for self-optimizing networks includes obtaining information indicating performance metrics of a first set of computing resources of a distributed system; generating information representing usage of a wireless network at a first point in time; providing the information to a machine learning model trained to predict network events at a time subsequent to the first point in time; determining that at least one particular network event predicted in the output is addressable by using a second set of computing resources of the distributed system; transmitting a signal configured to adjust the distributed computing system to deploy the second set of computing resources.
H04L 41/0897 - Bandwidth or capacity management, i.e. automatically increasing or decreasing capacities by horizontal or vertical scaling of resources, or by migrating entities, e.g. virtual resources or entities
H04L 41/147 - Network analysis or design for predicting network behaviour
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for monitoring a fronthaul interface. One of the methods includes receiving one or more messages exchanged between two internal nodes of a base station of an open radio access network (Open-RAN) through a fronthaul interface of the Open-RAN, the fronthaul interface being an interface between one or more radio units (RUs) and one or more distributed units (DUs) of the RAN, determining, based on the one or more messages, that an event affecting an operation status of the fronthaul interface has occurred, determining one or more actions to account for the operation status of the fronthaul interface, and generating a signal configured to trigger the one or more actions.
H04W 24/04 - Arrangements for maintaining operational condition
H04L 43/0817 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning
Systems, machine-readable media, and methods may facilitate data-streaming system overlay infrastructures for deployment pipelines. An event-streaming infrastructure may be overlaid on an event-streaming service system of a cloud environment so that a deployment pipeline to test and deploy software to a production computing service is integrated with the cloud environment to facilitate producing and consuming event data from the deployment pipeline. The event-streaming infrastructure may facilitate onboarding of applications to produce and consume event data via the event-streaming service system of the cloud environment. The event-streaming infrastructure may configure the event-streaming service system of the cloud environment to facilitate producing and consuming event data under defined topics mapped to environments of the deployment pipeline. The event-streaming infrastructure may facilitate authentication and linking of service accounts to produce event data under the defined topics mapped to the environments of the deployment pipeline.
Systems, methods, and devices perform core services on a 5G data and telephone network. A first edge data center of a first cloud network receives a communication from user equipment (UE). The communication is directed to another UE. A potential core shard from a plurality of potential core shards is selected to route the communication. The potential core shard includes a first instance at a first data center of a cloud network and a second instance at a second data center of the cloud network. The first instance is provisioned at the first data center, and the second instance is provisioned at the second data center. The communication is routed from an edge service to the first instance over a first communication channel, from the first instance to the second instance over the core communication channel, and from the second instance to the second UE over a third communication channel.
H04W 40/22 - Communication route or path selection, e.g. power-based or shortest path routing using selective relaying for reaching a BTS [Base Transceiver Station] or an access point
Systems, methods, and devices manage security controls associated with cloud accounts in a virtual private cloud. An example process includes retrieving native data and nonnative data for the cloud accounts. The cloud accounts comprise cloud roles that have access to cloud resources. Data for identities mapped to the cloud roles is retrieved. The identities are mapped in an identity management system. The retrieved native data for the cloud accounts, the retrieved nonnative data for the cloud accounts, and the retrieved data for the identities mapped to the cloud roles are compared to a security policy to identify a deviation in a cloud account from the cloud accounts. The cloud account is modified to remediate the deviation from the security policy.
A mobile terminal may select one or more transports from transports for a traffic type. A mobile terminal may request a link for each of the one or more transports. A mobile terminal may transmit packet traffic over each link of the one or more transports, wherein the transports are capable of providing wireless connectivity to the mobile terminal, and at least one of the transports comprises a deep penetrative radio frequency transport having a non-standard coverage.
Methods, systems, and apparatus, including computer programs encoded on computer-storage media, for self-optimizing networks. In some implementations, a method for self-optimizing networks includes obtaining information indicating performance metrics of a first set of computing resources of a distributed system; generating information representing usage of a wireless network at a first point in time; providing the information to a machine learning model trained to predict network events at a time subsequent to the first point in time; determining that at least one particular network event predicted in the output is addressable by using a second set of computing resources of the distributed system; transmitting a signal configured to adjust the distributed computing system to deploy the second set of computing resources.
H04L 41/0816 - Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
H04L 41/0895 - Configuration of virtualised networks or elements, e.g. virtualised network function or OpenFlow elements
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
H04L 47/83 - Admission control; Resource allocation based on usage prediction
An approach to adapt the topology of a disaggregated Radio Access Network (RAN) operating within a wireless network, depending on the attributes of a service to be supported by the RAN. The topology including a slice configuration for at least one of the disaggregated components of the RAN, including at least one Data Unit (DU), Central Unit (CU) or Control Unit (CU). Another resource, such as a compute or network resource may also be associated with topology. In some implementations, network connections between the resource and the disaggregated components of the RAN may be provided by a Virtual Local Area Network (VLAN).
Systems, processes, and devices migrate virtual machines to new servers. An example process includes identifying a virtual machine for migration in response to a load on a host server running the virtual machine. A direct device assignment of the virtual machine may be detected. The virtual machine may communicate with a first hardware device of the host server using the direct device assignment to bypass a host operating system of the host server. A target server is identified, and a replacement device assignment is reserved on the target server. The replacement device assignment includes a link to a second hardware device of the target server configured to bypass a host operating system of the target server. The virtual machine running on the host server is reconfigured with data supporting the replacement device assignment on the target server. The virtual machine migrates to the target server.
An approach to adapt the topology of a disaggregated Radio Access Network (RAN) operating within a wireless network, depending on the attributes of a service to be supported by the RAN. The topology including a slice configuration for at least one of the disaggregated components of the RAN, including at least one Data Unit (DU), Central Unit (CU) or Control Unit (CU). Another resource, such as a compute or network resource may also be associated with topology. In some implementations, network connections between the resource and the disaggregated components of the RAN may be provided by a Virtual Local Area Network (VLAN).
Systems, methods, and non-transitory, machine-readable media facilitate continuation of voice services in the event of failure of a subscriber data layer in a wireless network. A cellular network core may include one or more servers. An emergency server may be configured to, during non-emergency operations of the cellular network core, collect subscriber mapping data. The subscriber mapping data may correspond to subscriber phone numbers and international mobile subscriber identities (IMSIs) for particular user equipment (UE). The emergency server may be further configured to, during non-emergency operations of the cellular network core, store the subscriber mapping data in storage, where the storage is not shared with the cellular network core. The emergency server may be further configured to, during an emergency mode, use a mapping of the subscriber phone numbers and/or the IMSIs for the particular UE to facilitate completion of one or more voice calls.
Systems, methods, and devices automatically remediate denial-of-service (DOS) attacks on a 5G data and telephone network. An example process counts a number of dynamic ports assigned to a service running on a virtualized resource of the 5G data and telephone network. The process determines whether the number of dynamic ports assigned to the service of the 5G data and telephone network is greater than a first threshold. A processor load of the service running on the virtualized resource of the 5G data and telephone network is retrieved. The processor load of the service may be less than a second threshold, indicating a DOS attack in the 5G data and telephone network. The DOS attack is remediated by taking an action on the host operating system of the virtualized resource of the 5G data and telephone network.
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
H04L 41/40 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for detection of one-way calls. One of the methods includes receiving information pertaining to voice data packets exchanged for an audio call between a first mobile device and a second mobile device connected over a cellular network. The information is captured using a packet probe device configured to monitor data transfer between a first network device and a second network device of the cellular network. The method further includes identifying that a first flow of voice data packets is disrupted over a particular time period of a threshold duration, and a second flow of voice data packets is substantially undisrupted over the particular time period; identifying the particular time period as a one-way audio period; and altering at least one parameter of the cellular network based at least on the identification of the one-way audio period.
Embodiments are directed a system that monitors a plurality of relevant network conditions of a wireless cellular network. Over time, the system records a plurality of network snapshots based on the monitoring. Each network snapshot reflects a status of each applicable network condition at a respective point in time at which the snapshot was recorded. The system then generates a respective visual network topology map for each network snapshot through which the status of each network characteristic at the point time at which the snapshot was recorded is accessible. The system connects together each network snapshot resulting in a visual chronological historical record of the status of the network at each point time at which the snapshot was recorded reflected by each respective network topology map.
Systems, methods, and devices perform core services on a 5G data and telephone network. A first edge data center of a first cloud network receives a communication from user equipment (UE). The communication is directed to another UE. A potential core shard from a plurality of potential core shards is selected to route the communication. The potential core shard includes a first instance at a first data center of a cloud network and a second instance at a second data center of the cloud network. The first instance is provisioned at the first data center, and the second instance is provisioned at the second data center. The communication is routed from an edge service to the first instance over a first communication channel, from the first instance to the second instance over the core communication channel, and from the second instance to the second UE over a third communication channel.
Various network slice assignment arrangements are presented. A network slice management system can create a multi-dimensional attribute matrix that defines network slices that operate on a physical cellular network. Network slices that operate on the physical cellular network can be clustered based on attributes to create slice classes. A classification process to determine a slice class that most closely matches a cellular network service request may be performed. A network slice can then be selected from the slice class and be used for providing cellular network service.
A modified lug press and use thereof is described. The modified lug press includes a press and a cartridge. The press includes a drive which, when activated, crimps a lug, positioned on a die, to a wire. A cartridge holds the given lug and at least one additional lug, and successively aligns the given lug and the at least one next lug for insertion onto the die for crimping by the press. The cartridge includes a left rail, with a track therein, at least one middle rail, and a right rail. Distances between the rails may be adjustable. A drive motor, when activated, successively pushes lugs onto the die. A lug separator permits one lug to be pushed on the die at any given time. A lug placement device inhibit lateral lug movement during wire insertion and crimping operations.
B21D 39/04 - Application of procedures in order to connect objects or parts, e.g. coating with sheet metal otherwise than by plating; Tube expanders of tubes with rods
Systems and methods for group monitoring and management of network function statuses are provided. In one example, a method includes: generating a group query for statuses of a plurality of network functions of a network, in response to the group query performing group monitoring of the plurality of network functions to check the real-time status of each one of the plurality of network functions, receiving data corresponding to real-time status of each network function, comparing the data corresponding to real-time status with data corresponding to reference status for each one of the plurality of network functions, identifying presence or absence of an anomaly of each one of the plurality of network functions, based on the comparison, and generating a network function status output including data corresponding to the real-time status and an indication of the presence or absence of an anomaly for each network function.
Systems, devices and processes are provided to improve the design and implementation of radio frequency (RF) communication networks. Specifically, these various embodiments improve the likelihood of a successful RF network design by identifying and preferentially utilizing RF transmission sites having a relatively high probability of being successfully incorporated into the RF network. These various embodiments provide a site qualification database that includes site data for a plurality of RF transmission sites. When so implemented, the site qualification database is utilized to analyze the site data and generate a plurality of site scores for the corresponding RF transmission site, which can then be utilized in an RF analysis.
A system comprises a home network including a Radio Access Network and a core network, a roaming network, and a User Equipment (UE) subscribing to the home network and the roaming network. The UE is configured to determine, while connected to a control plane of the core network, that the UE is not connected to a user plane of the core network. In response, the UE connects to the roaming network. While connected to the roaming network, the UE periodically attempts to connect to the home network. The UE switches back to the home network upon successfully connecting to the control plane and the user plane of the core network.
Various arrangements for creating a slice on a cellular network are detailed herein. A cellular service request that indicates various metrics for a slice may be received. A test function may be created on the cellular network based on the cellular service request. Access to a reduced-scale slice that provides access to the test function for a small set of user equipment (UE) can be provided along with access to key performance indicators (KPIs) for the reduced-scale slice. The reduced-scale slice may then be converted to a production slice that provides access to the network function for a larger set of UE.
A disclosed method may include (i) checking whether a user plane of a cellular service network connection to a user equipment is operational, (ii) checking whether a control plane of the same cellular service network connection to the user equipment is operational, (iii) determining that one of the user plane and control plane is operational while the other of the user plane and the control plane is not operational such that the cellular service network connection is stalled, and (iv) remediating the cellular service network connection by disabling the one of the user plane and control plane that is operational such that a new cellular service network connection is established. Related systems and computer-readable mediums are further disclosed.
Methods and apparatuses for improving the privacy and security of wireless communications by leveraging electronic subscriber identity module (eSIM) profiles to enable number portability and the ability to transfer a secondary service plan from a first computing device to a second computing device are described. A second eSIM profile associated with a secondary service plan that depends on a primary service plan used by the first computing device may be transferred to the second computing device by displaying a QR code on a display screen of the first computing device or by sending an electronic message from the first computing device to the second computing device. The second eSIM profile may be automatically identified by the first mobile device based on a location of the second mobile device.
System, method, and non-transitory machine-readable media to facilitate adaptive monitoring and authentication control for a premises on which a raised structure is located are disclosed. First sensor-based data received from first sensors may be processed, consequent to the first sensors detecting phenomena on or around a raised structure. A particularized specification of recognized patterns mapped to a first location may be adaptively developed, the particularized specification of the recognized patterns including recognized patterns of sensor input from the first sensors. Second sensor-based data that is based on the first sensors may be processed. A mismatch of the second sensor-based data with respect to the particularized specification of the recognized patterns mapped to the first location may be detected. Activation adjustments in operation of one or both of the first sensors and second sensors may be selectively caused, and subsequent sensor-based data may be collected based on the activation adjustment.
H04L 67/125 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
G16Y 20/10 - Information sensed or collected by the things relating to location
G16Y 40/35 - Management of things, i.e. controlling in accordance with a policy or in order to achieve specified objectives
H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
Project scheduling systems and methods provide a set of automated functionality to schedule project activities related to site deployments, for example, a wireless cellular telecommunication cell site deployment. The system performs a series of calculations and value lookups to forecast or re-forecast a cell site's installation and deployment project timeline. To calculate the timeline for a single site, the project scheduling system is able to: define the activities, sequence the activities, estimate the activity durations (lead times); and calculate the timeline based on the estimated durations and task dependencies.
Embodiments are directed towards systems and methods for carrier aggregation and dual connectivity switching in a cellular network (e.g., a 5G network). Example embodiments include systems and methods for: the RAN functions supporting providing measuring and reporting particular items for dynamic carrier aggregation and dual connectivity switching; RAN dynamic carrier aggregation and dual connectivity switching with a network intelligence layer; RAN dynamic carrier aggregation and dual connectivity switching without a network intelligence layer; RAN dynamic carrier aggregation and dual connectivity switching based on availability of an inter-DU link and meeting latency/bandwidth criteria; RAN dynamic carrier aggregation and dual connectivity switching based on availability of an inter-DU link and meeting resource criteria; and prioritization for using CA instead of DC based on CQI information reported from UEs.
Embodiments are directed towards systems and methods for carrier aggregation and dual connectivity switching in a cellular network (e.g., a 5G network). Example embodiments include systems and methods for: the RAN functions supporting providing measuring and reporting particular items for dynamic carrier aggregation and dual connectivity switching; RAN dynamic carrier aggregation and dual connectivity switching with a network intelligence layer; RAN dynamic carrier aggregation and dual connectivity switching without a network intelligence layer; RAN dynamic carrier aggregation and dual connectivity switching based on availability of an inter-DU link and meeting latency/bandwidth criteria; RAN dynamic carrier aggregation and dual connectivity switching based on availability of an inter-DU link and meeting resource criteria; and prioritization for using CA instead of DC based on CQI information reported from UEs.
Embodiments are directed towards systems and methods for carrier aggregation and dual connectivity switching in a cellular network (e.g., a 5G network). Example embodiments include systems and methods for: the RAN functions supporting providing measuring and reporting particular items for dynamic carrier aggregation and dual connectivity switching; RAN dynamic carrier aggregation and dual connectivity switching with a network intelligence layer; RAN dynamic carrier aggregation and dual connectivity switching without a network intelligence layer; RAN dynamic carrier aggregation and dual connectivity switching based on availability of an inter-DU link and meeting latency/bandwidth criteria; RAN dynamic carrier aggregation and dual connectivity switching based on availability of an inter-DU link and meeting resource criteria; and prioritization for using CA instead of DC based on CQI information reported from UEs.
A disclosed method may include (i) detecting, from a first sensor at a first user equipment, a vertical height of the first user equipment, (ii) detecting, from the first user equipment, a request for emergency services directed to an emergency response service, (iii) detecting an indication that a second user equipment is located within a network vicinity of the first user equipment, and (iv) improving an accuracy of detecting the vertical height of the first user equipment by adjusting the detected vertical height of the first user equipment based on a detected vertical height from a second sensor at the second user equipment. Related systems and computer-readable mediums are further disclosed.
H04W 4/02 - Services making use of location information
G01C 5/06 - Measuring height; Measuring distances transverse to line of sight; Levelling between separated points; Surveyors' levels by using barometric means
G01S 5/02 - Position-fixing by co-ordinating two or more direction or position-line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves
H04W 4/90 - Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]
83.
IMS AND VOICE SERVICES SIMPLIFICATION IN CELLULAR NETWORKS OVER PUBLIC CLOUD
A disclosed method may include (i) establishing an Internet Protocol Multimedia Subsystem instance, (ii) aggregating, within the Internet Protocol Multimedia Subsystem instance, multiple distinct cloud native functions that are associated with the Internet Protocol Multimedia Subsystem instance such that the multiple distinct cloud native functions communicate through a single Internet Protocol address, and (iii) directing outbound communications from the multiple distinct cloud native functions associated with the Internet Protocol Multimedia Subsystem instance through the single Internet Protocol address. Various other systems and computer-readable mediums are further disclosed.
Systems and methods are described herein for utilizing dynamic terrestrial and non-terrestrial intra gNodeB handover in a wireless network. A location of a user device connecting to the network is determined. In response to the user device being located within a terrestrial-only coverage area of the network, the user device is connected to a terrestrial cell within the terrestrial-only coverage area. In response to the user device being located within a boundary area of the network, a terrestrial cell in the boundary area is selected and a cluster associated with that terrestrial cell is identified. The user device is connected to that terrestrial cell based on that cluster. But in response to the user device being located within a non-terrestrial-only coverage area of the network, a cluster associated with a terrestrial cell within the boundary area closest to the user device is identified, and the user device is connected to a non-terrestrial cell based on that cluster.
Systems and methods are described herein for utilizing dynamic terrestrial and non-terrestrial intra gNodeB handover in a wireless network. A location of a user device connecting to the network is determined. In response to the user device being located within a terrestrial-only coverage area of the network, the user device is connected to a terrestrial cell within the terrestrial-only coverage area. In response to the user device being located within a boundary area of the network, a terrestrial cell in the boundary area is selected and a cluster associated with that terrestrial cell is identified. The user device is connected to that terrestrial cell based on that cluster. But in response to the user device being located within a non-terrestrial-only coverage area of the network, a cluster associated with a terrestrial cell within the boundary area closest to the user device is identified, and the user device is connected to a non-terrestrial cell based on that cluster.
Disclosed is a method performed by a UE device that routes traffic to a 5G Core Network. The method includes receiving a first ATSSS rule including first traffic descriptor information corresponding to a first type of traffic for a first type of service and first steering mode information including a first network indicator corresponding to a first MNO, and a second ATSSS rule including second traffic descriptor information corresponding to a second type of traffic for a second type of service and second steering mode information including a second network indicator corresponding to a first MVNO or a second MNO; transmitting the first type of traffic for the first type of service a first 3GPP access network operated by the first MNO; and transmitting the second type of traffic for the second type of service to the first 3GPP access network operated by the first MNO.
A disclosed method may include (i) establishing an Internet Protocol Multimedia Subsystem instance, (ii) aggregating, within the Internet Protocol Multimedia Subsystem instance, multiple distinct cloud native functions that are associated with the Internet Protocol Multimedia Subsystem instance such that the multiple distinct cloud native functions communicate through a single Internet Protocol address, and (iii) directing outbound communications from the multiple distinct cloud native functions associated with the Internet Protocol Multimedia Subsystem instance through the single Internet Protocol address. Various other systems and computer-readable mediums are further disclosed.
Embodiments are directed towards systems and methods for carrier aggregation and dual connectivity switching in a cellular network (e.g., a 5G network). Example embodiments include systems and methods for: the RAN functions supporting providing measuring and reporting particular items for dynamic carrier aggregation and dual connectivity switching; RAN dynamic carrier aggregation and dual connectivity switching with a network intelligence layer; RAN dynamic carrier aggregation and dual connectivity switching without a network intelligence layer; RAN dynamic carrier aggregation and dual connectivity switching based on availability of an inter-DU link and meeting latency/bandwidth criteria; RAN dynamic carrier aggregation and dual connectivity switching based on availability of an inter-DU link and meeting resource criteria; and prioritization for using CA instead of DC based on CQI information reported from UEs.
Embodiments are directed towards systems and methods for carrier aggregation and dual connectivity switching in a cellular network (e.g., a 5G network). Example embodiments include systems and methods for: the RAN functions supporting providing measuring and reporting particular items for dynamic carrier aggregation and dual connectivity switching; RAN dynamic carrier aggregation and dual connectivity switching with a network intelligence layer; RAN dynamic carrier aggregation and dual connectivity switching without a network intelligence layer; RAN dynamic carrier aggregation and dual connectivity switching based on availability of an inter-DU link and meeting latency/bandwidth criteria; RAN dynamic carrier aggregation and dual connectivity switching based on availability of an inter-DU link and meeting resource criteria; and prioritization for using CA instead of DC based on CQI information reported from UEs.
Embodiments are directed towards systems and methods for carrier aggregation and dual connectivity switching in a cellular network (e.g., a 5G network). Example embodiments include systems and methods for: the RAN functions supporting providing measuring and reporting particular items for dynamic carrier aggregation and dual connectivity switching; RAN dynamic carrier aggregation and dual connectivity switching with a network intelligence layer; RAN dynamic carrier aggregation and dual connectivity switching without a network intelligence layer; RAN dynamic carrier aggregation and dual connectivity switching based on availability of an inter-DU link and meeting latency/bandwidth criteria; RAN dynamic carrier aggregation and dual connectivity switching based on availability of an inter-DU link and meeting resource criteria; and prioritization for using CA instead of DC based on CQI information reported from UEs.
Systems and methods for Service Data Adaptation Protocol (SDAP) and Quality of Service (QOS) based proactive scheduling for UpLink (UL) transmission grants. One such method includes: determining, using a primary gNB that acts as a scheduler, which UEs are in an idle mode and which UEs are in a connected mode; mapping, using SDAP layers, the QoS flow to Data Radio Bearers (DRBs) from the primary gNB for UEs that are in the connected mode, wherein QoS flow packets are classified and marked using a QoS flow identifier (QFI); targeting, using the scheduler, UEs with a higher priority QFI for selection before UEs with a lower priority QFI; providing proactive grants of UL transmissions to the selected UEs with a higher priority QFI; and providing grants of UL transmissions to the UEs with a lower priority QFI using dynamic scheduling.
H04W 72/1268 - Mapping of traffic onto schedule, e.g. scheduled allocation or multiplexing of flows of uplink data flows
H04W 72/566 - Allocation or scheduling criteria for wireless resources based on priority criteria of the information or information source or recipient
A disclosed method may include (i) detecting, from a first sensor at a first user equipment, a vertical height of the first user equipment, (ii) detecting, from the first user equipment, a request for emergency services directed to an emergency response service, (iii) detecting an indication that a second user equipment is located within a network vicinity of the first user equipment, and (iv) improving an accuracy of detecting the vertical height of the first user equipment by adjusting the detected vertical height of the first user equipment based on a detected vertical height from a second sensor at the second user equipment. Related systems and computer-readable mediums are further disclosed.
G01C 5/06 - Measuring height; Measuring distances transverse to line of sight; Levelling between separated points; Surveyors' levels by using barometric means
H04W 4/029 - Location-based management or tracking services
H04W 4/90 - Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]
93.
FRAMEWORK FOR CENTRALIZED MONITORING THE HEALTH OF REMOTE PACKET DATA NODES OF ROAMING PEERING PARTNERS OVER PUBLIC CLOUD
A disclosed method may include (i) obtaining, by a home cellular network service provider from a roaming cellular network service provider, a list of identifiers indicating respective ranges of Internet Protocol addresses that are targets for remote packet data nodes of the roaming cellular network service provider, (ii) for each respective server, in a list of respective servers that the home cellular network service provider assigned to respective geographic hubs, pinging through an on-demand cloud computing platform each usable Internet Protocol address indicated by each respective identifier in the list of identifiers, and (iii) discovering, by the home cellular network service provider, in response to the pinging, which Internet Protocol addresses indicated a healthy remote packet data node of the roaming cellular network service provider.
Systems and methods to utilize user device self-reported quality metrics and machine learning mechanisms to optimize management of user device mobility in a cellular network. Cells in the network obtain quality data for one or more user devices in communication with the cells, including channel-quality-indicator values, reference-signal-received-power values, and reference-signal-received-quality values. The quality data is processed by a machine learning mechanism to generate a separate quality report for each cell. In response to receiving a request to handover communications for a target user device, the quality reports are utilized to select a cell that is predicted to provide the best quality communications for the target user device.
A disclosed method may include (i) generating, at a first time, a first bitmap where each bit of the first bitmap indicates a pass or fail for a respective health check test in a series of health check tests testing a cellular service network, (ii) generating, at a second time, a second bitmap where each bit of the second bitmap indicates a pass or fail for a corresponding respective health check test in the same series of health check tests testing the cellular service network, and (iii) remediating a network problem indicated by detecting that a first result of a data integrity function executed on the first bitmap does not match a second result of the same data integrity function executed on the second bitmap.
Embodiments are directed towards an adaptive DU scheduler that increases the user experiences on higher channel bandwidths (BWs) while ensuring no drops for Voice over New Radio (VoNR) or other high priority traffic. Example embodiments include systems and methods for an adaptive distributed unit (DU) scheduler in a wireless telecommunication network, such as a wireless 5G network. Example embodiments include systems and methods that include: a central scheduler for maximizing overall throughput based on received parameter values; maximizing the overall cell site throughput; an intelligence layer that has an artificial intelligence and/or machine learning (AI/ML) model that increases the performance for all the cells by sending info to central scheduler for each of the cells; an intelligence layer that has an AI/ML models for each site type based on the traffic distribution across each cell; centralized RAN pooling; a containerized DU server with master a controller pod controlling individual cell pods; and a containerized DU server with a DU common scheduler managing all the cells.
H04W 72/566 - Allocation or scheduling criteria for wireless resources based on priority criteria of the information or information source or recipient
H04W 28/16 - Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
Embodiments are directed towards an adaptive DU scheduler that increases the user experiences on higher channel bandwidths (BWs) while ensuring no drops for Voice over New Radio (VoNR) or other high priority traffic. Example embodiments include systems and methods for an adaptive distributed unit (DU) scheduler in a wireless telecommunication network, such as a wireless 5G network. Example embodiments include systems and methods that include: a central scheduler for maximizing overall throughput based on received parameter values; maximizing the overall cell site throughput; an intelligence layer that has an artificial intelligence and/or machine learning (AI/ML) model that increases the performance for all the cells by sending info to central scheduler for each of the cells; an intelligence layer that has an AI/ML models for each site type based on the traffic distribution across each cell; centralized RAN pooling; a containerized DU server with master a controller pod controlling individual cell pods; and a containerized DU server with a DU common scheduler managing all the cells.
Embodiments are directed towards an adaptive DU scheduler that increases the user experiences on higher channel bandwidths (BWs) while ensuring no drops for Voice over New Radio (VoNR) or other high priority traffic. Example embodiments include systems and methods for an adaptive distributed unit (DU) scheduler in a wireless telecommunication network, such as a wireless 5G network. Example embodiments include systems and methods that include: a central scheduler for maximizing overall throughput based on received parameter values; maximizing the overall cell site throughput; an intelligence layer that has an artificial intelligence and/or machine learning (AI/ML) model that increases the performance for all the cells by sending info to central scheduler for each of the cells; an intelligence layer that has an AI/ML models for each site type based on the traffic distribution across each cell; centralized RAN pooling; a containerized DU server with master a controller pod controlling individual cell pods; and a containerized DU server with a DU common scheduler managing all the cells.
Embodiments are directed towards an adaptive DU scheduler that increases the user experiences on higher channel bandwidths (BWs) while ensuring no drops for Voice over New Radio (VoNR) or other high priority traffic. Example embodiments include systems and methods for an adaptive distributed unit (DU) scheduler in a wireless telecommunication network, such as a wireless 5G network. Example embodiments include systems and methods that include: a central scheduler for maximizing overall throughput based on received parameter values; maximizing the overall cell site throughput; an intelligence layer that has an artificial intelligence and/or machine learning (AI/ML) model that increases the performance for all the cells by sending info to central scheduler for each of the cells; an intelligence layer that has an AI/ML models for each site type based on the traffic distribution across each cell; centralized RAN pooling; a containerized DU server with master a controller pod controlling individual cell pods; and a containerized DU server with a DU common scheduler managing all the cells.
H04W 72/1263 - Mapping of traffic onto schedule, e.g. scheduled allocation or multiplexing of flows
H04W 72/566 - Allocation or scheduling criteria for wireless resources based on priority criteria of the information or information source or recipient
100.
METHODS AND APPARATUSES IMPLEMENTING AN ADAPTIVE DISTRIBUTED UNIT (DU) SCHEDULER
Embodiments are directed towards an adaptive DU scheduler that increases the user experiences on higher channel bandwidths, BWs, while ensuring no drops for Voice over New Radio, VoNR, or other high priority traffic. Embodiments include systems and methods for an adaptive distributed unit, DU, scheduler in a wireless telecommunication network, such as a wireless 5G network. Embodiments include systems and methods that include: a central scheduler for maximizing overall throughput based on received parameter values; maximizing the overall cell site throughput; an intelligence layer that has an artificial intelligence and/or machine learning, AI/ML, model that increases the performance for all the cells by sending info to central scheduler for each of the cells; an intelligence layer that has an AI/ML models for each site type based on the traffic distribution across each cell; centralized RAN pooling; a containerized DU server with master a controller pod controlling individual cell pods; and a containerized DU server with a DU common scheduler managing all the cells.