Systems and method for dynamically scaling network function nodes or pods in a wireless network. A number of existing nodes are determined for the wireless network, and an arrival load rate is determined for the existing nodes. A load existence time is also determined for the existing nodes. High and low load thresholds are defined based on the number of existing nodes, the load existence time, and the arrival load rate. A new node is added to the existing nodes in response to determining that a current load on each existing node meets the high load threshold. And at least one existing node is set for removal in response to determining that the current load on the at least one existing node is below the low load threshold. A new received load is then scheduled to be assigned to an existing node having a least average load.
Technologies for network drive test prioritization based on machine learning are disclosed. An example method includes feeding a representation of routes of a target candidate drive test to a trained machine learning model to obtain a drive test prediction, wherein the trained machine learning model is trained based on integrating radio frequency (RF) estimations or predictions with past drive test data. The method also includes sorting a set of candidate drive tests for the communications network including the target candidate drive test, based on drive test predictions associated with each candidate drive test, to determine priorities for executing drive tests; and determining expectation of network usability in accordance with network availability and performance metrics.
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
3.
SYSTEM AND METHOD FOR DETERMINING PERFORMANCE OF A CELLULAR NETWORK
A database stores data relating to a plurality of performance indicators associated with performance of a cellular network as experienced by a first UE. The data includes data relating to a first set of the performance indicators that indicate a quality of cellular coverage associated with the cellular network as experienced by the first UE and data relating to a second set of the performance indicators that indicate whether the first UE was operating in an indoor environment. It is determined based on the second set of performance indicators whether the UE was operating in an indoor environment for a particular time period. If yes, a portion of the data relating to the first set of performance indicators collected during the particular time period is discarded and the remaining data is plotted on a graph to represent a quality of the cellular network.
A system receives the log messages including data regarding one or more cell site performance issues of a cell site. Based on the log messages, the system determines whether there is a time-based correlation between a cell site router (CSR) of the cell site experiencing a cold start and the one or more cellular site performance issues. Then, based on the determination whether there is a time-based correlation between the CSR experiencing a cold start and the one or more cell site performance issues, the system electronically generates an action item associated with addressing the one or more cell site performance issues.
DISH Network Technologies India Private Limited (India)
Inventor
Cuavas, Orlando
Srinivasan, Prakash
Ganagalla, Rama Krishna
Rajanbabu, Jeyanth
Sabando, John
Taylor, Christopher
Agcaoili, Arnold
Abstract
A fallout engine performs fallout handling for workflows in deploying a cell site and helps to ensure that any errors in operations performed in earlier stages are addressed before moving onto a later stage. The fallout engine identifies the occurrence of one or more errors that occur during a pre-check before execution of the stage, during the execution of the stage, or a post-check after execution of the stage. The fallout engine determines the occurrence of an error, determines the appropriate party/component to remedy the error, and can re-starts the workflow at the point of the error, or before the error.
A fallout engine performs fallout handling for workflows in deploying a cell site and helps to ensure that any errors in operations performed in earlier stages are addressed before moving onto a later stage. The fallout engine identifies the occurrence of one or more errors that occur during a pre-check before execution of the stage, during the execution of the stage, or a post-check after execution of the stage. The fallout engine determines the occurrence of an error, determines the appropriate party/component to remedy the error, and can re-starts the workflow at the point of the error, or before the error.
An Inter-Satellite-Link (ISL) for an Open Radio Access Network (O-RAN) that is part of a Non-Terrestrial Network (NTN). The disclosed embodiment of an O-RAN system makes use of multiple satellite systems in combination with terrestrial based systems in various configurations to carry out the O-RAN system functions. An O-RAN system includes, among other structures and functions, a Radio Unit (RU), a Distributed Unit (DU), and a Central Unit (CU). This disclosure introduces various configuration/hierarchies of using satellites for the hardware and software to carry various portions of the RU, DU and CU in the O-RAN architecture. Various functions of the network can be implemented by satellite, with each satellite providing some level of RU and DU functionality. In one alternative, one satellite in a group of satellites acts as the DU in the form of a router, communicating with other satellites via the ISL, acting as a router.
Methods and systems for adaptive spectrum allocation are provided. An example method includes receiving an input from a network consumer of a network, extracting a consumer intent from the input data and mapping the consumer intent with one or more predetermined QoS attributes, assigning a consumer priority indicator to the network consumer based on the QoS attributes, generating a network slice and assign the network slice to the network consumer, selecting a radio frequency band, assigning the band to the network slice, allocating a first allotment of the band to the network slice, provisioning network service to the network consumer for at least one UE connected to the network slice to use the allocated allotment of the band, monitoring continuously real-time bandwidth usage by the network slice, and adjusting, automatically and adaptively, a total bandwidth allocated to the network slice during network.
A method of integrating a wireless network site may include receiving a first signal indicating that a component associated with the wireless network site is in a first stage. The method may include verifying that the component associated with the wireless network site is functioning according to the first stage. The method may include determining an entity associated with a second stage, based at least in part on the component associated with the wireless network site and the first stage. The method may include transmitting a signal to the entity, the signal associated with one or more tasks further associated with the second stage. The method may include receiving a second signal indicating that the component associated with the wireless network site is in the second stage. The method may include verifying that the component associated with the wireless network site is functioning according to the second stage.
Systems, devices, and methods related to allocating cellular wireless network resources and providing access on-demand (AoD) to the cellular wireless network resources are provided. An example method includes: obtaining tenant information and historical tenant data of multiple tenants, predicting an anticipated/optimized demand of a resource of a cellular network for each tenant, determining aa anticipated/optimized unit price of the resource, providing the anticipated/optimized unit price to each tenant, receiving an actual demand from each tenant, determining that a deviation of the actual demand from the anticipated/optimized demand is of or below a predetermined threshold, allocating the resource to the tenants based on the actual demand received from each one of the plurality of tenants, and providing access to the allocated resource to one of the plurality of tenants for one or more user equipment (UE) connected to a tenant network of the tenant to use the allocated resource.
Systems and methods for performing vendor RAN swapping is provided. An example method includes receiving a request to perform a vendor RAN swap of one or more first O-RAN components from a first vendor to one or more second O-RAN components from a second vendor within a cell site, determining one or more workflows to perform the vendor RAN swap, wherein the one or more workflows include first ZTP operations to reconfigure one or more computer environments from a first configuration to a second configuration to support the one or more second O-RAN components of the second vendor, and causing the one or more workflows to execute, wherein the one or more workflows perform the first ZTP operations to reconfigure the one or more computing environments to the second configuration and perform second ZTP operations to deploy the one or more second O-RAN components.
Methods and systems for adaptive bandwidth application are provided. An example method includes generating multiple RAN slices of a network for multiple network consumers, selecting one or more of RAN slices and assigning the one or more RAN slices to each one of multiple network consumers, dividing a radio frequency spectrum into multiple radio frequency bands, assigning one or more of the multiple bands to each one of the multiple RAN slices, associating one or more QoS priority indicators to each one of the bands assigned to the RAN slices, allocating one or more allotments of the one or more bands to each RAN slice, monitoring continuously real-time bandwidth usage by each one of the multiple RAN slices, and adjusting automatically and adaptively a total bandwidth allocated to each RAN slice, according to the one or more QoS priority indicator associated with the RAN slice and a predetermined rule.
Methods and systems for network slice management and adaptive bandwidth allocation are provided. An example method includes assigning a first radio frequency band to multiple RAN slices of a network. Each one of the RAN slices is assigned to a network consumer, the first band includes a first BWS and a second BWS, the first BWS is configured to be allocatable to each one of the RAN slices, and the second BWS is configured to be allocatable to qualified RAN slices. The method further includes allocating a first allotment belonging to the first BWS to the identified RAN slice, monitoring continuously real-time bandwidth usage of the first BWS by the identified RAN slice, and determining whether the first allotment allocated to the identified RAN slice is sufficient to achieve predetermined QoS attributes of the identified RAN slice.
Devices, systems, and methods for detecting cell site simulators are provided. An example method includes obtaining signal characteristics data including geolocation data, identifying a legitimate cell site in proximity to the geolocation of the user device based on the geolocation data, identifying a preestablished model stored in the user device, and the model is corresponding to the identified legitimate cell site and includes one or more predetermined expected features. The method further includes selecting the identified model, extracting one or more actual features from the signal characteristics data using the selected model, comparing the actual features with the predetermined expected features to determine a degree of matching of the actual features with the predetermined expected features, and in response to a determination that the degree of matching is below a predetermined threshold, indicating that the cell site is a suspicious cell site simulator.
Methods and systems for operating a Non-Terrestrial Network (NTN) within geographic areas, and where a Terrestrial Network (TN) is also operating in at least one of the areas. A set of two or more candidate channels are selected for use by the NTN from spectrum allocated for use by the NTN which does not overlap with the channels allocated for use by the TN. The two or more channels may each specify a contiguous set of frequencies and timeslots. One of the candidate channels is assigned for use by the NTN as an active channel in a first one of the geographic areas, and another one of the candidate channels is assigned for use by the UEs as an active channel in a second one of the geographic areas.
Systems and methods for C-RAN provisioning is provided. An example method includes determining, by one or more processors, to perform C-RAN ZTP of one or more O-RAN components associated with one or more cell sites, determining, by the one or more processors, one or more workflows to perform the C-RAN ZTP, wherein the one or more workflows include ZTP operations to provision distributed units (DUs) within a DU host server system at a data center separate from one or more associated radio units (RUs), and causing, by the one or more processors, the one or more workflows to execute, wherein the one or more workflows perform the ZTP operations.
H04L 41/08 - Configuration management of networks or network elements
H04L 41/082 - Configuration setting characterised by the conditions triggering a change of settings the condition being updates or upgrades of network functionality
Methods and systems for adaptive spectrum allocation are provided. An example method includes receiving an input from a network consumer of a network, extracting a consumer intent from the input data and mapping the consumer intent with one or more predetermined QoS attributes, assigning a consumer priority indicator to the network consumer based on the QoS attributes, generating a network slice and assign the network slice to the network consumer, selecting a radio frequency band, assigning the band to the network slice, allocating a first allotment of the band to the network slice, provisioning network service to the network consumer for at least one UE connected to the network slice to use the allocated allotment of the band, monitoring continuously real-time bandwidth usage by the network slice, and adjusting, automatically and adaptively, a total bandwidth allocated to the network slice during network
Systems and methods for slice-specific adaptive resource allocation are provided. An example method includes generating multiple RAN sub-slices within a RAN slice of a network, assigning a first band to the RAN slice. The first band has a first BWS and a second BWS, the first BWS is allocatable to each one of the RAN sub-slices, and the second BWS is allocatable to qualified RAN sub-slices. The method further includes assigning a first allotment of the first BWS to an identified RAN sub-slice, monitor continuously real-time bandwidth usage of the first BWS by the identified RAN sub-slice, and determine whether the first allotment allocated to the first RAN sub-slice is sufficient to achieve predetermined QoS attributes of the first RAN sub-slice.
An apparatus comprises a memory and a processor communicatively coupled to one another. The memory may be configured to store multiple configuration commands. The processor may be configured to establish a communication session between a first network component and a second network component based at least in part upon the configuration commands. Further, the processor may be configured to generate multiple space backup configuration commands indicating to back up the configuration commands to a space server. The processor may be configured to transfer the space backup configuration commands to the space server, determine that the communication session between the first network component and the second network component is interrupted, and reestablish the communication session between the first network component and the second network component via the space server based at least in part upon the space backup configuration commands in response to determining that the communication session is interrupted.
H04L 41/0816 - Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
H04L 41/0853 - Retrieval of network configurationTracking network configuration history by actively collecting configuration information or by backing up configuration information
According to various embodiments, the systems and methods disclosed herein can utilize a blocking service to prevent malfunctioning NF instances from being discovered by consumer NF instances in discovery requests within a wireless network (e.g., a 5G network). The blocking service can be integrated into an NRF of the wireless network and can be used to add a malfunctioning NF instance to a block list. Additionally, the blocking service can prevent any malfunctioning NF instance on the block list from being returned to a consumer NF instance during a discovery request. When an NF producer instance is determined to be malfunctioning and subsequently added to the block list, the blocking service can trigger a notification to be sent to an NF consumer instance that is utilizing the affected NF producer instance. Upon receipt of this notification, the NF producer instance can cease its consumption of the malfunctioning producer NF instance.
H04L 41/0659 - Management of faults, events, alarms or notifications using network fault recovery by isolating or reconfiguring faulty entities
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
21.
RESOLVING TN/NTN SPECTRUM CONFLICT BY ASSIGNMENT OF NON-OVERLAPPING CHANNELS
Methods and systems for operating a Non-Terrestrial Network (NTN) within geographic areas, and where a Terrestrial Network (TN) is also operating in at least one of the areas. A set of two or more candidate channels are selected for use by the NTN from spectrum allocated for use by the NTN which does not overlap with the channels allocated for use by the TN. The two or more channels may each specify a contiguous set of frequencies and timeslots. One of the candidate channels is assigned for use by the NTN as an active channel in a first one of the geographic areas, and another one of the candidate channels is assigned for use by the UEs as an active channel in a second one of the geographic areas.
An apparatus comprises a memory and a processor communicatively coupled to one another. The memory may be configured to store one or more directories comprising access to multiple tenant profiles and one or more network access commands configured to provide access to one or more entitlements. Each tenant profile of the tenant profiles are associated with one or more services. The processor may be configured to receive a request to access at least one service. The request comprises an application function identifier (AFID) comprising a tenant ID that references a tenant profile of the tenant profiles, a department ID that references multiple entitlements associated with the tenant profile, and an API ID that references a service associated with the entitlements. Further, the processor may be configured to generate a report comprising multiple network access commands configured to enable access to the service in accordance with the entitlements.
A radio access network (“RAN”) includes a transceiver for receiving a request from user equipment (“UE”) to join the RAN. The RAN also includes a processor that is configured for: responding to the UE request by sending a message directly from the RAN to the UE to offer a set of first terms for the UE to use a cellular network of the RAN; receiving a response from the UE agreeing to the set of first terms; and in response to the UE agreeing to the set of first terms, connecting the UE to use a cellular network of the RAN.
An apparatus comprises a memory and a processor communicatively coupled to one another. The memory may be configured to store one or more directories comprising access to multiple tenant profiles and one or more network access commands configured to provide access to one or more entitlements. Each tenant profile of the tenant profiles are associated with one or more services. The processor may be configured to receive a request to access at least one service. The request comprises an application function identifier (AFID). The tenant ID references a tenant profile of the tenant profiles. The department ID references multiple entitlements associated with the tenant profile. The API ID references a service associated with the entitlements. Further, the processor may be configured to determine multiple network access commands configured to enable access to the service in accordance with the entitlements and generate a report comprising the network access commands.
In various embodiments, orchestration of zero touch provisioning (ZTP) in a cloud based 5G system in provided. In some embodiments, a ZTP orchestrator (ZTPO) receives a request to perform zero-touch provisioning (ZTP) associated with deployment/configuration of a cell site. One or more ZTP pipelines that perform ZTP operations associated with the deployment/configuration of the cell site are executed. The execution of the one or more ZTP pipelines are monitored and one or more results associated with the execution of the one or more ZTP pipelines determined. Feedback information based on the one or more results of the ZTP operations is determined.
Devices, systems, and methods for automated generation of script in a software development environment are provided. An example method includes receiving a request for a script from the user, the request indicating a scripting language type and including input data and information related to the script. The method further includes analyzing the information related to the script to determine one or more attributes related to the script and identifying a standardized script template for the requested script. The standardized script template is stored in a database in connection with the automated script generator and has the requested scripting language type and attributes that match the determined attributes of the script. The method further includes configuring the standardized script template with the input data included in the request, generating a script based on the configuration of the standardized script template, and executing an audit function on the generated script.
A method for improving quality of experience (QoE) of a user of a cellular network is disclosed. The QoE of the user is monitored using key performance indicator (KPI) data stored in a quality of service (QoS) parameter database. Using data analytics, network configuration parameters are determined in response to determining that the monitored QoE is below a predetermined threshold set for the user. The determined network configuration parameters are adjusted until the monitored QoE reaches the predetermined threshold.
Various examples of automated processes, computing systems, devices and other aspects of a wireless data network are disclosed herein. According to various embodiments, message flooding in the wireless network is reduced through the use of “dummy” messages from the radio unit (RU) to the distributed unit (DU) or layer two (L2) switch. The dummy messages tend to prevent timeout of the RU's data in the L2 switch's routing tables, thereby prolonging the period of time that the L2 switch is able to more efficiently direct subsequent traffic toward that particular device.
Systems and methods are provided for reducing power consumption at a cell site. An example process includes the steps of detecting a change from a normal operation at a cell site, initializing a small bandwidth part (BWP), and moving user equipment communicating with the cell site from a dedicated BWP to the small BWP in response to the change from the normal operation at the cell site. A return to normal operation is detected at the cell site. The process includes restoring the user equipment to the dedicated BWP in response to the return to the normal operation at the cell site.
Various embodiments provide various attributes of data that should be ready to carry out zero or low touch provisioning in the O-RAN at different stages. In various embodiment, a workflow management system is employed to check for data attributes at different timeframes during execution of zero or low touch provisioning. In those embodiments, the workflow management system is configured to validate the data collected at a specific timeframe and determine if the data collected is ready for the zero or low touch provisioning to be carried out at that timeframe. In various embodiments, when the workflow management system determines that the data collected is not ready, the workflow management system is configured to interface with an incident system so that the owner(s) of the data is notified to rectify the data.
Various embodiments provide data validation for a cell site. In some embodiments, the data validation for the cell site is performed in different phases of the O-RAN by a validation engine. Inventory management is employed in those embodiments to capture statuses of the validation. Triggers are created to cause the validation of the cell site to move onto the next phase when one or more previous phases are completed with success statuses.
A method and an apparatus for attribute-based edge compute content caching are provided. An edge compute server receives an identity for each of a plurality of user equipment, respectively, that are connected to a 5G wireless communications network. The edge compute server receives a plurality of sets of attributes associated with the plurality of user equipment, respectively, and determines, based on the plurality of sets of attributes, an attribute for which to cache content. The edge compute server requests a plurality of content identifiers associated with the attribute and caches cause content identified by the plurality of content identifiers.
H04N 21/231 - Content storage operation, e.g. caching movies for short term storage, replicating data over plural servers or prioritizing data for deletion
H04N 21/4363 - Adapting the video stream to a specific local network, e.g. a Bluetooth® network
33.
DATA TRAFFIC CONTROLLER FOR MOBILE DISTRIBUTED ENTITIES
A system for dynamic edge routing of data traffic for a mobile entity having a plurality of applications is provided. An automotive edge router (AER) is located on the mobile entity. The AER is configured to connect to and be in signal communication with a plurality of cellular networks associated with different communication service providers (CSPs), and to receive performance data for each of the plurality of cellular networks. A data traffic controller is in signal communication with the AER via one of the plurality of cellular networks and is configured to receive the performance data for each cellular network from the AER, to dynamically select one of the plurality of cellular networks for each of the applications on the mobile entity based on the performance data, and to transmit a command signal to the AER indicating the selection of one of the plurality of cellular networks for each application.
In various embodiments, ZTP execution workflows are provided to enable integration of individual cells into an O-RAN. In various embodiments, this involves provisioning computer hosts including a first computer host, a second computer host and a group of computer hosts. In those embodiments, this includes provisioning a server management software on the first computer host; creating a node pool using the group of computer hosts; provisioning a distributed unit (DU) on the second computer host; and configuring a RAN using the DU.
Various embodiments provide RU/DU/CU chaining in an O-RAN by ZTP operations automatically. The chaining creates a logical gNB for achieving flexibility in the O-RAN. In some embodiments, one or more RUs are chained to a DU in a cell site when the DU is initiated in the O-RAN. In those embodiments, a network management system is employed to store and manage O-RAN configurations to facilitate the RU/DU/CU chaining. In some embodiments, the cell site is customized during the chaining process.
The present teachings disclose a system and method for accessing a cellular network system including: checking, at a Serving Call Session Control Function (SCSCF), legitimacy of an International Mobile Equipment Identity (IMEI) included in an registration request with an Equipment Identity Register (EIR) check; determining a SCSCF action based on a response code of an EIR response from the EIR check; and performing the SCSCF action, wherein the registration request comprises an IP Multimedia Subsystem (IMS) REGISTER.
Devices, systems and processes for substantially simultaneous payment verification using multi-factor authentication are described. A system may include a user payment system (UPS), a point of sale system (POS) communicatively coupled to the user payment system, and an issuing bank system (IBK) communicatively coupled to at least the POS. The IBK system may include an IBK hardware processor configured to execute first non-transient computer executable instructions including instructions for establishing a direct connection between the IBK and the UPS. The instructions may also include those for communicating, using the direct connection, a query to the UPS, receiving a first response, from the UPS, to the query, and based, upon the first response, determining whether to approve a given transaction. The direct connection may use a 5G wireless link. The query may be communicated to substantially simultaneously with receipt of a request to approve the given transaction.
In various embodiments, a messaging system is provided, where message streaming is employed to exchange information among various components in a network to facilitate Zero Touch Provisioning (ZTP hereinafter). In those embodiments, messages may pass through the messaging system via REST API or Kafka with consistent message schemas across the messaging system. In various embodiments, message adaptors are provided when different message schemas of the same message is used in the network.
DISH Network Technologies India Private Limited (India)
Inventor
Cuavas, Orlando
Srinivasan, Prakash
Ganagalla, Rama Krishna
Rajanbabu, Jeyanth
Abstract
A validation method of facilitating automated provisioning in a telecommunication network is provided. In some embodiments, the validation method comprises managing a first validation app and a first validation worker; receiving a validation request indicating a requested validation; identifying the first validation app to process the requested validation; generating, by the first validation app, a job to perform the requested validation; placing the job onto a job queue; retrieving the job, by the first validation worker, from the job queue; executing, by the first validation worker, the first job; receiving, by the first validation worker, information regarding the execution of the first job; placing, by the first validation worker, the information onto a message queue; retrieving, by the first validation app, the information; and generating, by the first validation app, a result for display to a user based on the information retrieved. Other embodiments are contemplated.
DISH Network Technologies India Private Limited (India)
Inventor
Cuavas, Orlando
Srinivasan, Prakash
Ganagalla, Rama Krishna
Abstract
A method for cabling verification of a Cell Site Router (CSR) including CSR ports that are cabled to a server including server ports, the method including: providing a wiring configuration including pairings including a CSR port ID of one of the CSR ports and a server port ID of one of the server ports; connecting, with cables, the server ports with the CSR ports per the pairings; getting, on the server, addresses of the server ports; learning, at the CSR, distal addresses of the server ports connected to each of the CSR ports; matching, based on the pairings, a respective address of a respective server port ID with a respective distal address of a respective CSR port ID. In some embodiments, the getting may be performed by the CSR and the learning may be performed by the server.
H04L 43/0811 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking connectivity
H04L 41/5074 - Handling of user complaints or trouble tickets
41.
VENDOR ONBOARDING AND PRE-DEPLOYMENT SERVICE TESTING
Systems and methods for service vendor onboarding and pre-production artifact validation and functional testing are provided. An example method includes receiving, in an automated test control system in connection with a cellular network, a request for deploying an artifact on the cellular network, generating an artifact profile, a configuration profile, a release note associated with the artifact, performing a validation of the artifact according to a predetermined validation rule, in response to a determination that the artifact is validated, instantiating one or more test environments for the validated artifact, performing a functional test on the artifact within the test environment, and outputting results of the validation and the functional test.
Systems and methods for service vendor onboarding and pre-production artifact validation and functional testing are provided. An example method includes receiving, in an automated test control system in connection with a cellular network implemented on a cloud-computing platform, an artifact associated with a service provided by a service vendor, and the service is to be deployed on the cellular network. The method further includes storing the received artifact in an untrusted artifacts database, generating and configuring a first test environment on a first virtual private cloud of the cloud-computing platform, performing validation on the received artifact in the first test environment, in response to a determination that the artifact is validated, performing functional testing on the validated artifact in the first test environment, and in response to a determination that the artifact passes the functional testing, signing the artifact and storing the signed artifact in a repository.
A method for predicting a fault condition in a wireless network includes: receiving, at a trained machine-learning model from multiple subsystems of the wireless network, information associated with multiple alerts triggered across the multiple subsystems, each of the multiple alerts being indicative of a corresponding potential fault condition in one of the multiple subsystems, receiving, at the machine-learning model from a plurality of external devices, observation information regarding the wireless network, receiving, at the machine-learning model from a network platform, information regarding resources of the wireless network; training the machine-learning model using the multiple alerts, the observation information, and the information, identifying, by the machine-learning model, a subset of alerts of the multiple alerts, the subset of alerts representing a set of one or more predicted fault conditions associated with the multiple alerts triggered across the multiple subsystems, and training the machine-learning model using the subset of alerts.
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
A method for automatically identifying a fault condition in a wireless network can include receiving, at a trained machine-learning model from multiple subsystems of the wireless network, information associated with multiple alerts triggered across the multiple subsystems, each of the multiple alerts being indicative of a corresponding potential fault condition in one of the multiple subsystems, identifying, by the machine-learning model, a subset of alerts of the multiple alerts, where the subset of alerts represents a set of one or more root fault conditions associated with the multiple alerts triggered across the multiple subsystems, and identifying, by the machine-learning model, one or more remediating actions configured to address the one or more root fault conditions in at least one corresponding subsystem of the multiple subsystems. The machine-learning model is trained using training data that identifies correlation between alerts generated in the multiple subsystems.
H04W 24/04 - Arrangements for maintaining operational condition
H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
Methods and apparatuses for improving the privacy and security of wireless communications by automatically preloading an electronic subscriber identity module (eSIM) profile associated with a temporary service plan prior to making a phone call to a particular phone number and by leveraging eSIM profiles to enable number portability are described. Before placing a call to a new or unknown phone number, a mobile phone may automatically identify a temporary eSIM profile from a pool of eSIM profiles based on a geographic location of the mobile phone and/or the particular phone number to be called. The temporary eSIM profile may be loaded into an embedded universal integrated circuit card (eUICC) of the mobile phone prior to placing the call to the new or unknown phone number.
A technique is described for converting a variety of video streams from transmission sources into a single designated video stream on a client device. As an example, a converter device may receive video streams from multiple transmission sources and select the video stream to convert and output on a client device based on the signal quality. In some examples, the converter device may switch between transmission sources. The converter device may measure the time offset between the video streams of the transmission sources and buffer one of the video streams to align the timing of the video streams, so the user does not detect a timing delay while viewing the video content.
H04N 21/4402 - Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving reformatting operations of video signals for household redistribution, storage or real-time display
H04N 21/44 - Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
H04N 21/442 - Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed or the storage space available from the internal hard disk
DISH Network Technologies India Private Limited (India)
Inventor
Shahdad, Mohammad Dawood
Nair, Sruthi
Chikatmarla, Jaya Chandra
Patel, Krupal Kumar
Anshuman, Kumar
Abstract
Systems and methods are provided for implementing an IP multimedia services or subsystem (“IMS”) within a communication network. One system may include a server configured to facilitate multimedia communication services via the IMS. The server may include a memory storing an integrated IMS function and an electronic processor communicatively coupled to the memory. The electronic processor may be configured to receive, with the integrated IMS function, a request to establish a multimedia communication session for a user equipment (“UE”) device over the communication network; and establish and control, with the integrated IMS function, the multimedia communication session for UE device over the communication network.
The present disclosure is directed to methods and systems for monitoring users on a decentralized network. The system can track users on the decentralized network to identify the products or services the users have purchased or have a subscription to. The system can identify whether a user has referred other users to purchase or subscribe to a product or service and provide an incentive to the user if a referral was made. By storing user data in a decentralized network, the system can determine the size of a social network of a user and the duration that a user maintains a product or service. In some implementations, the user data is arranged into a hierarchy to provide a visual representation of the social connections and products of the user.
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor
A tiered simultaneous core that uses private core(s) and carrier (public) core(s) in coordination with one another is disclosed. The system can use network capabilities and intelligently select how to use one or more private cores and one or more public cores together, coordinating between the networks using tiered use. In other words, use of the private core(s) and the public core(s) is divided into tiers. These tiers may be associated with a user or entity (e.g., a corporation, a government organization, etc.), an application, a type of data transfer, a priority, etc.
Systems and methods are provided to migrate a set of network functions between control planes of a network slice A and a network slice B; and a migration management unit to manage a gradual staged transfer of a subset of the plurality of network functions originally contained in the control plane of the network slice A to the control plane of network slice B wherein the gradual transfer is a migration of the plurality of network functions in a set of multiple stages to create the subset of the plurality of network functions in the control plane of slice B, wherein each gradual staged transfer includes the migration of a reduced subset of the plurality of network functions contained in the control plane of the network slice A reconfigured to the control plane of the network slice B.
H04L 41/0226 - Mapping or translating multiple network management protocols
H04L 41/0816 - Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
H04W 48/18 - Selecting a network or a communication service
A process, device and system facilitate mounting of apparatus on a tower. The process includes positioning a tunnel void clip on a strap, positioning the strap on the tower, fastening the strap to the tower, resting a first bracket on the clip, and fastening the first bracket, at a mounting position, onto the tower. The tunnel void clip includes a top portion, inner and outer prongs, a top connecting portion couples the top portion to the outer prong, and to the tops of the inner and outer prongs. A bottom connecting portion couples bottoms of the inner and outer prongs. The top and bottom connecting portions separate the inner and outer prongs to form a void therebetween, and the top and bottom connection portions, the inner and outer prongs and the void collectively form a tunnel void within the tunnel void clip through which the strap may be inserted.
A system may receive, a request for communications data of a first data type and a second data type, the communications data associated with a target user equipment. The system may provision the wireless network to fulfill the request for communications data. The system may configure a first network function to generate first duplicated data, and a second network function to generate second duplicated data. The system may receive a first communication of the first data type and a second communication of the second data type. The system may generate the first duplicated data based on the first communication and transmit the first communication to a respective intended recipient and the first duplicated data to a mediation and delivery function. The system may generate the second duplicated data and transmit the second communications data to the respective destination and the second duplicated data to the mediation and delivery function.
Technologies for population distribution-based drive testing are disclosed. An example method includes determining geographic units for drive testing based on a proposed coverage of the communications network and a population distribution of potential users of the communications network, and for each geographic unit: determining a mobile test pattern and a set of stationary test locations for drive testing, and causing performance of drive testing in accordance with the mobile test pattern and set of stationary test locations.
In various embodiments, a workflow management for ZTP workflow in a O-RAN is provided. In some embodiments, the ZTP workflow comprises: performing a pre-stage check to confirm a workflow stage is ready to be executed; when the pre-stage check succeeds, executing one or more operations in the workflow stage; and performing an execution of a next workflow stage when the post-stage check succeeds; when the pre-stage check fails: requesting a workflow management to address one or more issues in the pre-stage check; and performing the pre-stage check; when the execution of the one or more operations in the workflow stage fails: requesting the workflow management system to address one or more issues in the execution of the one or more operations in the workflow stage; and executing one or more operations in the workflow stage.
H04L 41/0806 - Configuration setting for initial configuration or provisioning, e.g. plug-and-play
H04L 41/0823 - Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability
H04L 41/083 - Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability for increasing network speed
55.
REMOVING REQUESTER NF TYPE AMBIGUITY IN INTER-PLMN DISCOVERIES
DISH Network Technologies India Private Limited (India)
Inventor
Chikatmarla, Jaya Chandra
Anshuman, Kumar
Nair, Sruthi
Shahdad, Dawood
Sabhapati, Mythri Amulya
Samal, Niraj Kanti
Abstract
According to various embodiments, systems and methods disclosed herein can configure a profile of at least one NF of a 5G network to support a plurality of requester NF types, including the type of network repository function (NRF). The NF profile can be registered with the NRF of the 5G network. Such NF profile configurations and registrations enable the at least one NF to be discovered by discovery requests that use NRF or a consumer NF type as the requester NF type, thus increasing interoperability between the HPMN and roaming partners that use different requested NF types in their NF discovery requests.
DISH Network Technologies India Private Limited (India)
Inventor
Chikatmarla, Jaya Chandra
Nair, Sruthi
Dai, Xiangang
Anshuman, Kumar
Shahdad, Dawood
Abstract
According to various embodiments, systems and methods disclosed herein can extract an actual address of a visitor location register (VLR) and an actual address of a mobile switching center (MSC) from signaling messages from a circuit-switched (CS) network in a foreign country and forward the actual addresses to a wireless network (e.g., a 5G network) whose subscriber is roaming in the foreign country through the CS network. The wireless network can use the actual address to determine the identity of the roaming country and the identity of the CS network so that the wireless network can exercise roaming control (e.g., authorizing or rejecting roaming calls) and billing users of the roaming subscribers based on which countries they are roaming in.
An intelligent simultaneous core that provides coordination between private core(s) and public core(s) (i.e., carrier core(s)) to improve network throughput and efficiency is disclosed. Both the private core(s) and the public core(s) may be configured for and facilitate 5G communications. Network procedures and protocols may intelligently divide processing throughput based on factors such as capacity, bit rate, etc. When only a particular data throughput can be supported, for example, a simultaneous core connection can be utilized.
Embodiments are directed towards embodiments are directed toward systems and methods for user plane function (UPF) and network slice load balancing within a 5G network. Example embodiments include systems and methods for load balancing based on current UPF load and thresholds that depend on UPF capacity; UPF load balancing using predicted throughput of new UE on the network based on network data analytics; UPF load balancing based on special considerations for low latency traffic; UPF load balancing supporting multiple slices, maintaining several load-thresholds for each UPF and each slice depending on the UPF and network slice capacity; and UPF load balancing using predicted central processing unit (CPU) utilization and/or predicted memory utilization of new UE on the network based on network data analytics.
H04W 72/52 - Allocation or scheduling criteria for wireless resources based on load
H04W 28/084 - Load balancing or load distribution among network function virtualisation [NFV] entitiesLoad balancing or load distribution among edge computing entities, e.g. multi-access edge computing
A method is disclosed for facilitating work-related tasks on a device with a Subscriber Identity Module (SIM). The method includes providing a work profile to access work-related tasks over a work network; retrieving identity data from the SIM; verifying the device based on the identity data; enabling, after a successful verification of the device, access to the work network via a SIM network associated with the identity data; and activating, after the successful verification, the work profile. This method provides a secure way to manage work profiles on devices, ensuring that only authorized users can access work-related resources and enhancing productivity in a work environment.
A method for selecting a secondary cell in a wireless communication system for carrier aggregation includes providing at least one parameter for each secondary cell in a plurality of secondary cells that indicates a connection priority for each secondary cell and transmitting a set of parameters for each secondary cell to a UE. The set of parameters for each secondary cell includes the parameter indicating a connection priority for the secondary cell. The method further includes receiving a request from the UE to connect with a secondary cell selected based on the parameter indicating a connection priority for the secondary cell, connecting the selected secondary cell to the UE, and transmitting data to the UE using a primary cell and the selected secondary cell.
A method may include accessing data associated with a failure of a 5G network component. The method may include providing the data associated with the failure of the 5G network component to a first machine learning model, configured to determine and output data indicating a root cause of the failure. The method may include providing data indicating the root cause of the failure to a second machine learning model, configured to determine and output data indicating one or more service providers and respective destinations associated with the root cause. The method may include generating a service ticket may include data indicating the root cause and the respective destinations associated with the root cause. The method may include transmitting the service ticket to the respective destinations of the one or more service providers associated with the root cause of the failure.
H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance
An intelligent simultaneous core that provides coordination between private core(s) and public core(s) (i.e., carrier core(s)) to improve network throughput and efficiency is disclosed. Both the private core(s) and the public core(s) may be configured for and facilitate 5G communications. Network procedures and protocols may intelligently divide processing throughput based on factors such as capacity, bit rate, etc. When only a particular data throughput can be supported, for example, a simultaneous core connection can be utilized.
An intelligent simultaneous core that provides coordination between private core(s) and public core(s) (i.e., carrier core(s)) to improve network throughput and efficiency is disclosed. Both the private core(s) and the public core(s) may be configured for and facilitate 5G communications. Network procedures and protocols may intelligently divide processing throughput based on factors such as capacity, bit rate, etc. When only a particular data throughput can be supported, for example, a simultaneous core connection can be utilized.
DISH Network Technologies India Private Limited (India)
Inventor
Arora, Ankesh
Shahdad, Mohammad Dawood
Plunkett, Kevin Joseph
Abstract
A system to distinguish internal network routing issues within a user plane function (UPF) from external routing issues via multi-domain system (DNS) servers probing is disclosed. The system determines latency in communication between a given UPF and each of a plurality of DNS servers. The system compares each latency with a threshold latency value. If it is determined that each of the latencies in communication between the UPF and each DNS server is more than the threshold latency values, the system may determine that there is an internal network routing issue at the UPF that caused the high latencies. If it is determined that a latency in communication between the UPF and a particular DNS server is more than the threshold latency value, the system may determine that the latency is caused by a network routing issue at the particular DNS server—which is external to the UPF.
An apparatus comprises a memory and a processor communicatively coupled to one another. The memory may be configured to store multiple existing configuration commands instructing execution of one or more operations. The processor may be configured to perform multiple existing operations in accordance with the existing configuration commands, collect dynamic notification data from one or more interfaces configured to perform the existing operations, generate multiple dynamic configuration commands based on the dynamic notification data, and compare the dynamic configuration commands to the existing configuration commands. Further, the processor is configured to determine whether the dynamic configuration commands comprise commands that are different from those comprised in the plurality of existing configuration commands, generate at least one suggestion to perform multiple suggested operations based on dynamic configuration commands, and present the at least one suggestion in a dynamic notification via the one or more interfaces.
G06F 16/583 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
An apparatus comprises a memory and a processor communicatively coupled to one another. The memory may be configured to store existing configuration commands instructing execution of one or more operations. The processor may be configured to collect dynamic banner data from one or more interfaces. The dynamic banner data may be representative of multiple existing operations performed by the one or more interfaces. Further, the processor may be configured to generate a plurality of dynamic configuration commands based at least in part upon the dynamic banner data. The dynamic configuration commands may be updates to the existing configuration commands. The processor may be configured to generate multiple suggestions to perform one or more suggested operations based on the dynamic configuration commands, and present the suggestions in a dynamic banner via the one or more interfaces.
A method may include providing an amount of first data and increasing the amount of first data until a first network component fails. The method may include determining first failure data associated with the failure of the first network component. The method may include providing an amount of second data and increasing the amount of second data until a second network component fail. The method may include determining second failure data associated with the failure of the second network component. The method may include generating synthetic data. The method may include providing the synthetic data such that one or more network components fail. The method may include determining third failure data associated with the failure of the network component and the synthetic data. The method may include generating the network parameters based at least in part on the third failure data.
A method for selecting a secondary cell in a wireless communication system for carrier aggregation includes providing at least one parameter for each secondary cell in a plurality of secondary cells that indicates a connection priority for each secondary cell and transmitting a set of parameters for each secondary cell to a UE. The set of parameters for each secondary cell includes the parameter indicating a connection priority for the secondary cell. The method further includes receiving a request from the UE to connect with a secondary cell selected based on the parameter indicating a connection priority for the secondary cell, connecting the selected secondary cell to the UE, and transmitting data to the UE using a primary cell and the selected secondary cell.
H04W 36/28 - Reselection being triggered by specific parameters by agreed or negotiated communication parameters involving a plurality of connections, e.g. multi-call or multi-bearer connections
H04W 36/30 - Reselection being triggered by specific parameters by measured or perceived connection quality data
H04W 36/32 - Reselection being triggered by specific parameters by location or mobility data, e.g. speed data
H04W 36/36 - Reselection control by user or terminal equipment
Systems and method dynamically determine provisioning of networking services. A service area is serviced by a first user plane function (UPF) as a primary service area and by a second UPF as a secondary service area. A request is received from a user equipment to connect to a network, and a location of the user equipment is identified. Determination is made whether the location is in the first service area. A first load of the first UPF is determined. In response to the first load not exceeding a load threshold value, the user equipment is connected to the first UPF. In response to the first load exceeding the load threshold value, the user equipment is connected to the second UPF when a second load thereof does not exceed the first load or to the first UPF when the second load exceeds the first load.
A wireless device includes a transceiver, sensing circuitry, and an electronic processor. The transceiver receives electromagnetic wave signals emitted wirelessly from a plurality of cells. The sensing circuitry measures a signal from a source cell to obtain a signal to interference and noise ratio (SINR) and a received signal reference power (RSRP) for the signal. When the transceiver receives a reconfiguration message from the source cell during a time span, the electronic processor controls a legacy handover that shifts communication with the transceiver from the source cell to the target cell. When a conditional handover state exists, the electronic processor controls a conditional handover that shifts communication with the transceiver from the source cell to the target cell. The conditional handover state includes an absence of the legacy handover, the RSRP being below an RSRP threshold and the SINR below an SINR threshold.
A method may include accessing event data corresponding to an event affecting a region covered by a 5G network including a plurality of network components. The method may include accessing user data corresponding to a user equipment within the region covered by the 5G network. The method may include generating, using a machine learning model, an expected network load. The method may include accessing, a dynamic threshold associated with the 5G network. The dynamic threshold may include one or more limits associated with the plurality of network components. The method may include determining that the expected network load will cause the 5G network to exceed at least one limit of the dynamic threshold. In response to determining that the expected network load will exceed the limit, the method may include generating a new network component in the 5G network based at least in part on the expected network load.
A tiered simultaneous core that uses private core(s) and carrier (public) core(s) in coordination with one another is disclosed. The system can use network capabilities and intelligently select how to use one or more private cores and one or more public cores together, coordinating between the networks using tiered use. In other words, use of the private core(s) and the public core(s) is divided into tiers. These tiers may be associated with a user or entity (e.g., a corporation, a government organization, etc.), an application, a type of data transfer, a priority, etc.
A tiered simultaneous core that uses private core(s) and carrier (public) core(s) in coordination with one another is disclosed. The system can use network capabilities and intelligently select how to use one or more private cores and one or more public cores together, coordinating between the networks using tiered use. In other words, use of the private core(s) and the public core(s) is divided into tiers. These tiers may be associated with a user or entity (e.g., a corporation, a government organization, etc.), an application, a type of data transfer, a priority, etc.
Various example embodiments are directed a system that electronically discovers a plurality of current network components of an existing wireless network and relationships between the plurality network components. This is performed based on starting at a first network component and electronically continuously crawling through the wireless network via discovering and following links between the plurality of network components in real time. The system generates and then updates metadata describing a snapshot of a current network topology of the wireless network based on the continuous electronic discovery of the plurality of current network components of the existing wireless network and relationships between the plurality network components.
Various example embodiments are directed a system that electronically discovers a plurality of current network components of an existing wireless network and relationships between the plurality network components. This is performed based on starting at a first network component and electronically continuously crawling through the wireless network via discovering and following links between the plurality of network components in real time. The system generates and then updates metadata describing a snapshot of a current network topology of the wireless network based on the continuous electronic discovery of the plurality of current network components of the existing wireless network and relationships between the plurality network components.
H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
H04L 41/0853 - Retrieval of network configurationTracking network configuration history by actively collecting configuration information or by backing up configuration information
H04L 41/12 - Discovery or management of network topologies
H04L 41/22 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
H04L 43/045 - Processing captured monitoring data, e.g. for logfile generation for graphical visualisation of monitoring data
H04L 43/08 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
76.
FLEXIBLE MODEL TO PROVISION WIRELESS COMMUNICATION SERVICES IN PRIMARY AND SECONDARY USER PLANE FUNCTION TRACKING AREAS
Systems and method dynamically determine provisioning of networking services. A service area is serviced by a first user plane function (UPF) as a primary service area and by a second UPF as a secondary service area. A request is received from a user equipment to connect to a network, and a location of the user equipment is identified. Determination is made whether the location is in the first service area. A first load of the first UPF is determined. In response to the first load not exceeding a load threshold value, the user equipment is connected to the first UPF. In response to the first load exceeding the load threshold value, the user equipment is connected to the second UPF when a second load thereof does not exceed the first load or to the first UPF when the second load exceeds the first load.
An apparatus comprises a memory and a processor communicatively coupled to one another. The memory may be configured to store one or more data exchange operations and one or more reporting operations. The processor may be configured to identify a recipient configured to receive a report, and match the recipient to entitlements in a service directory. The entitlements indicating data object information for a data object associated with the recipient. Further, the processor is configured to obtain a category information associated with the recipient. The category information indicating that the recipient is part of an affinity group. The processor may be configured to determine a data object modification for the data object information based at least in part upon the category information, generate the report comprising the entitlements and the data object modification, and generate the report comprising the entitlements and the data object modification.
A method may include receiving request data associated with a service, the request data in a first format. The method may also include determining an endpoint of the service and a second format associated with the service. The method may include generating a service request based at least in part on the request data, the service request in the second format. The method may then include providing the service request in the second format to an orchestrator. The method may include transmitting, by the orchestrator, the service request to the endpoint of the service. The method may include receiving, by the orchestrator, response data from the service, the response data based at least in part on the service request. The method may include generating, by the orchestrator, a response based at least in part on the response data. The method may include providing, by orchestrator, the response to the user.
H04L 67/60 - Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
Technologies for facilitating APIs for microservices associated with a communications network are disclosed. An example method includes receiving a request to a target API exposed by an API platform, and invoking a combination of API governance modules corresponding to the target API and selected from API governance modules implemented remotely from the API platform, to map the request to microservices. The microservices include internal microservice(s) maintained within the communications network and external microservice(s) maintained externally to the communications network. The method also includes applying API governance policies indicated by the combination of API governance modules to validate interactions with the external microservice(s) based on the request and generating and sending a response to the request.
H04L 41/5009 - Determining service level performance parameters or violations of service level contracts, e.g. violations of agreed response time or mean time between failures [MTBF]
80.
RESOLVING TN/NTN SPECTRUM OVERLAP BY ASSIGNMENT OF BANDWIDTH PARTS TO GEOGRAPHIC AREAS
Methods and systems for operating a Non-Terrestrial Network (NTN) within neighboring geographic areas, and where a Terrestrial Network (TN) is also operating in at least one of the areas. A set of two or more candidate Bandwidth Parts (BWPs) are selected for use by the NTN from spectrum allocated for use by the NTN which does not overlap with the channels used by the TN. The two or more BWPs may each specify a contiguous set of frequencies and timeslots. One of the candidate BWPs is assigned for use by the NTN as an active BWP in a first one of the neighboring geographic areas; and one candidate BWPs is also assigned for use by the UEs as an active BWP in a second one of the neighboring geographic areas.
A mobile device is configured for use with selected mobile services and performs operations including receiving a request to use a given selected mobile service (SMS) which facilitates virtualization of an application program, first identifying and retrieving mobile application data (MAD) associated with the SMS from a first data store and receiving the SMS. A server provides the SMS to the mobile device and the SMS provides at least one feature of the application program to a first user. The MAD facilitates providing of the SMS on the mobile device and the SMS facilitates providing of features of the application program without having the mobile device download and execute the application program. The operations may include communicatively coupling the mobile device with a wireless component (WC) which communicatively couples the mobile device with the server and first authenticating, with the WC, a subscriber identity module (SIM) for the mobile device.
Spectrum and radio resources associated with a 5G radio unit (RU) of a host network are dynamically allocated amongst one or more guest networks. A provisioning plane receives inputs from a guest network operator that identifies desired times, locations and/or frequency bands for desired network coverage. The provisioning plane responsively identifies bandwidth allocations that meet the requested parameters for exclusive use by the guest network. User equipment (UE) associated with each guest network maintains time and frequency synchronization with the host network, but otherwise limits its communications to the frequency bands allocated to the guest network. By dynamically obtaining physical radio and spectrum resources from a host provider and by scaling backend network capabilities using cloud resources, guest networks for any number of different purposes can be quickly deployed or modified as desired.
Systems, methods, and machine-readable media may facilitate one or a combination of the following. A software change operation within a deployment pipeline for testing and deploying a software change to a production computing service may be processed. The software change operation may be identified as corresponding to a software change with the deployment pipeline, where the software change may be identified as being configured to make a pipeline change to a configuration of the deployment pipeline itself. Responsive to the identifying, a regression suite configured to run a plurality of test applications on the deployment pipeline to test the deployment pipeline with respect to the software change may be invoked, and the plurality of test applications may be run with the software change. The running the plurality of test applications may include simulating pipeline runs with a plurality of use cases.
Methods and systems for operating a Non-Terrestrial Network (NTN) within neighboring geographic areas, and where a Terrestrial Network (TN) is also operating in at least one of the areas. A set of two or more candidate Bandwidth Parts (BWPs) are selected for use by the NTN from spectrum allocated for use by the NTN which does not overlap with the channels used by the TN. The two or more BWPs may each specify a contiguous set of frequencies and timeslots. One of the candidate BWPs is assigned for use by the NTN as an active BWP in a first one of the neighboring geographic areas; and one candidate BWPs is also assigned for use by the UEs as an active BWP in a second one of the neighboring geographic areas.
A method may include receiving request data associated with a service, the request data in a first format. The method may also include determining an endpoint of the service and a second format associated with the service. The method may include generating a service request based at least in part on the request data, the service request in the second format. The method may then include providing the service request in the second format to an orchestrator. The method may include transmitting, by the orchestrator, the service request to the endpoint of the service. The method may include receiving, by the orchestrator, response data from the service, the response data based at least in part on the service request. The method may include generating, by the orchestrator, a response based at least in part on the response data. The method may include providing, by orchestrator, the response to the user.
H04L 67/565 - Conversion or adaptation of application format or content
H04L 67/567 - Integrating service provisioning from a plurality of service providers
H04L 67/60 - Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
86.
AI DRIVEN 5G NETWORK AND SERVICE MANAGEMENT SOLUTION
Methods and apparatuses for improving wireless network performance and efficiency by dynamically configuring network selection and session management functions within a wireless networking environment are described. In some cases, a network and service management system within the wireless networking environment may perform adjustments to the configuration of network slices and protocol data unit (PDU) sessions associated with user equipment (UE) devices utilizing network services provided by the wireless networking environment. The network and service management system may utilize machine learning techniques to provide real-time selection and reconfiguration of network slices and PDU sessions running within the wireless networking environment.
H04L 41/5009 - Determining service level performance parameters or violations of service level contracts, e.g. violations of agreed response time or mean time between failures [MTBF]
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
H04L 41/5025 - Ensuring fulfilment of SLA by proactively reacting to service quality change, e.g. by reconfiguration after service quality degradation or upgrade
87.
ACCELERATING SOFTWARE CHANGE REQUESTS IN DEPLOYMENT PIPELINES
Systems, machine-readable media, and methods may facilitate accelerating software change requests in deployment pipelines. Operations of a deployment pipeline for testing and deploying a software change may be monitored, the operations corresponding to a set of input requirements for testing and deploying the software change. Data composites may be collected. The data composites may be created and may include pipeline information associated with operations of the deployment pipeline. Rules corresponding to software change request protocols may be learned and may define mappings of the data composites to requirements pertaining to software change request operations of the deployment pipeline. Input required for a software change request may be decreased based on the learning so that the input required for the software change request conforms to a subset of the set of input requirements.
A method for performance testing connections between a public cloud and a cellular node includes selecting a test node and a peer node for testing from candidate nodes, wherein the candidate nodes include nodes of a public network and nodes of a cellular network; establishing a connection between a testing agent on the test node and a peer testing agent on the peer node; and collecting Key Performance Indicators (KPIs) for a network path between the testing agent and the peer testing agent, wherein the network path between the test node and the peer node traverses a cloud network. This method enables efficient and accurate performance testing of connections between a public cloud and a cellular node, facilitating the optimization of network performance and reliability.
An apparatus comprises a memory and a processor communicatively coupled to one another. The memory may be configured to store a data lake and multiple existing spectrum administration service (SAS) configuration commands. The processor may be configured to perform first SAS operations in accordance with the existing SAS configuration commands, collect multiple channel parameters from one or more communication channels configured to provide connectivity between user equipment and a core network, store the channel parameters in the data lake, monitor the channel parameters in the data lake, and generate optimized SAS configuration commands based at least in part upon the channel parameters. Further, the processor is configured to compare the optimized SAS configuration commands to the existing SAS configuration commands and perform second SAS operations in accordance with the optimized SAS configuration commands.
H04L 41/40 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities
90.
FLEXIBLE MODEL TO PROVISION WIRELESS COMMUNICATION SERVICES IN OVERLAPPING USER PLANE FUNCTION TRACKING AREAS
Systems and method are directed towards dynamically determining how to provision networking services. First and second user plane functions are initialized for first and second service areas, respectively. The second service area and the first service area share an overlap area. A request is received from a user equipment to connect to a network, and a location of the user equipment is identified. Determination is made whether the location is in the overlap area. In response to the location being in the overlap area, a first load of the first user plane function and a second load of the second user plane function are determined. In response to the first load exceeding the second load, the user equipment is connected to the second user plane function. In response to the second load exceeding the first load, the user equipment is connected to the first user plane function.
Systems and method are directed towards dynamically determining how to provision networking services. First and second user plane functions are initialized for first and second service areas, respectively. The second service area and the first service area share an overlap area. A request is received from a user equipment to connect to a network, and a location of the user equipment is identified. Determination is made whether the location is in the overlap area. In response to the location being in the overlap area, a first load of the first user plane function and a second load of the second user plane function are determined. In response to the first load exceeding the second load, the user equipment is connected to the second user plane function. In response to the second load exceeding the first load, the user equipment is connected to the first user plane function.
A method for performing a software update that reduces down time in a Radio Access Network (RAN) is disclosed. A first computing device receives first Distributed Unit (DU) configuration information including an address of a first radio unit (RU) device. The first computing device cause the first RU device to stores an address of the first computing device as a value of a configuration parameter. After a second computing device installs software, the second computing device receives the first DU configuration information including the address of the first RU device. The first computing device receives an instruction to stop data transmission to the first RU device. The second computing device causes the first RU device stores an address of the second computing device as the value of the configuration parameter. The second computing device receives an instruction to start data transmission to the first RU device.
Embodiments are directed towards systems and methods for managing user experiences during cellular telecommunication outages within a wireless telecommunication network, such as a wireless 5G network. Example embodiments include systems and methods managing user experiences during a cellular telecommunication network outage utilizing a backup data center. For example, in response to the distributed unit (DU) detecting there exists the failure in communication between the DU and the corresponding primary centralized unit control plane (CU-CP), the system causes the DU to switch from using the corresponding primary CU-CP to using the secondary CU-CP of a secondary CU hosted on the backup cloud-native virtualized compute instance based on utilizing a secondary ID pre-configured on the DU.
Automated navigation systems and methods are provided. An example method includes receiving a request for automated navigation service from an autonomous vehicle, the request including vehicle information and a destination of the autonomous vehicle. The method further includes receiving continuously real-time location and position measurements data from the autonomous vehicle, determining a virtual zone centered around the autonomous vehicle, identifying nearby vehicles proximate to the autonomous vehicles within the virtual zone, receiving continuously real-time location and position measurements data of the identified nearby vehicles, obtaining and updating real-time traffic environment data of the traffic environment, generating an optimal route segment for the autonomous vehicle in the virtual zone, and transmitting an instruction to the autonomous vehicle for guiding the autonomous vehicle to adjust operational parameters comply with the optimal route segment.
A method for determining how long to store data in a data lake is disclosed. The travel data associated with a mobile device is received via cellular towers. The travel data is determined as to whether it meets a threshold associated with unusual behavior for a user of the mobile device. In response to determining that the travel data meeting or exceeding the unusual behavior threshold, the travel data is stored for long term storage which may be greater than a predetermined time length associated with short term storage.
An apparatus comprises a memory and a processor communicatively coupled to one another. The memory may be configured to store a data lake and multiple existing spectrum administration service (SAS) configuration commands. The processor may be configured to perform first SAS operations in accordance with the existing SAS configuration commands, collect multiple channel parameters from one or more communication channels configured to provide connectivity between user equipment and a core network, store the channel parameters in the data lake, monitor the channel parameters in the data lake, and generate optimized SAS configuration commands based at least in part upon the channel parameters. Further, the processor is configured to compare the optimized SAS configuration commands to the existing SAS configuration commands and perform second SAS operations in accordance with the optimized SAS configuration commands.
A method for determining how long to store data in a data lake is disclosed. The travel data associated with a mobile device is received via cellular towers. The travel data is determined as to whether it meets a threshold associated with unusual behavior for a user of the mobile device. In response to determining that the travel data meeting or exceeding the unusual behavior threshold, the travel data is stored for long term storage which may be greater than a predetermined time length associated with short term storage.
A disclosed method may include (i) initiating a cellular field testing tool that tests a condition of cellular network connectivity of a device under test, (ii) checking, prior to starting a specific test of the cellular field testing tool, whether each precondition in a set of preconditions is satisfied, and (iii) preventing the cellular field testing tool from starting the specific test until each precondition in the set of preconditions is satisfied. Related systems and computer-readable mediums are further disclosed.
In order to operate and maintain a wireless network system in a building that includes a 5G network and a Wi-Fi network, the master node captures location data and measurement data reported by one or more mobile devices. The master node then uses the location data and the measurement data reported by the one or more mobile devices and measurement data captured by the master node to optimize network performance, and adjusts one or more parameters within the wireless network system.
Enhancing cybersecurity protection during data packet transportation. This involves selecting transport paths differing by a respective modality with one or more processors and associating a plurality of bins, each with a respective modality of a respective transport path. The data packets are split into packets of the bins and formatted based on the associated modality. The respective data packets of each of the bins are transported with the respective transport path of the transport paths. The count of the transport paths is greater than one.