Aspects of the subject disclosure may include, for example, receiving, from a user equipment (UE) device, a scheduling request for a configured grant operation during performance of an ultra-reliable low latency communications (URLLC) service at the UE device, determining radio channel characteristics of a radio channel of the UE device, and determining an appropriate modulation and coding scheme for a dynamic configured grant for the UE device, wherein the appropriate modulation and coding scheme is selected based on the radio channel characteristics. Aspects of the disclosure further include communicating information about the dynamic configured grant to the UE device, including communicating an assigned modulation and coding scheme to the UE device for use during performance of the URLLC service at the device, and suspending further scheduling requests for additional dynamic configured grants during completion of the URLLC service at the device. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, systems and methods for providing a diagnostic as service. Home network diagnostic data are obtained by communicating with customer premise equipment (CPE) connected with a mobility network. Mobility network diagnostic data are obtained by communicating with network equipment of the mobility network. Based on the home network diagnostic data and the mobility network diagnostic data, recommended actions are generated and provided as a response to the request for service diagnostic. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, enterprise application shield systems and methods for performing a sequence of security checks as to an incoming HTTP request and forwarding the HTTP request to a target system upon detection of an absence of a triggering event and an absence of sensitive personal information. Otherwise, the HTTP request is dropped and no response will be provided to a sender of the HTTP request. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, identifying data that is associated with an application being executed by an end user device and that has been transmitted from a hyperscaler in response to a first request by the application; determining that the data has been designated for edge caching resulting in a caching determination; selecting a network device from a group of network devices based on location information of the end user device; causing the data to be stored at the network device; and facilitating providing access to the data at the network device in response to a second request associated with the application. Other embodiments are disclosed.
H04L 47/783 - Distributed allocation of resources, e.g. bandwidth brokers
H04L 47/80 - Actions related to the user profile or the type of traffic
5.
APPARATUSES AND METHODS FOR IDENTIFYING AND DISSEMINATING INFORMATION PERTAINING TO ISSUES IN NETWORKS AND SYSTEMS UTILIZING MACHINE LEARNING AND ARTIFICIAL INTELLIGENCE
Aspects of the subject disclosure may include, for example, obtaining a plurality of alarms associated with a network, correlating the plurality of alarms to data that identifies a topology of the network to obtain a plurality of correlated events, applying a model that is based on machine learning to the plurality of correlated events to generate an extended correlated event, identifying a solution to the extended correlated event, and implementing the solution as part of the network. Other embodiments are disclosed.
H04L 41/0654 - Management of faults, events, alarms or notifications using network fault recovery
H04L 41/0604 - Management of faults, events, alarms or notifications using filtering, e.g. reduction of information by using priority, element types, position or time
H04L 41/12 - Discovery or management of network topologies
Aspects of the subject disclosure may include, for example, detecting data traffic at the application layer of a communication device and dividing the application data into two groups, C-plane and U-plane, based on delay-sensitive and non-delay-sensitive characteristics. The method involves determining whether the data traffic is delay-sensitive, routing the data traffic to a control plane group within the application layer if it is determined to be delay-sensitive, and transmitting the data traffic over the control plane using a wireless connection to a remote device in accordance with system timing designated for control plane traffic. Other embodiments are also disclosed.
Aspects of the subject disclosure may include, for example, determining whether a first device is communicating under a bandwidth surplus with a fixed network, wherein the bandwidth surplus results at least in part from use by the first device of one or more link aggregation groups, wherein the one or more link aggregation groups comprise one or more satellite broadband communication channels as well as licensed cellular wireless spectrum, unlicensed wireless spectrum, or a combination of the licensed cellular and unlicensed spectrum; determining whether a second device is communicating under a bandwidth deficit with the fixed network; and responsive to the first device communicating under the bandwidth surplus and responsive to the second device communicating under the bandwidth deficit, allocating at least a portion of the bandwidth surplus associated with the first device to the second device. Other embodiments are disclosed.
The described technology is generally directed towards network slice pre-configuration for cellular communication systems, including 5G and subsequent generation cellular communication systems. Network equipment can be preconfigured to identify whether a network slice identifier included in a network communication belongs to a group of network slice identifiers. If so, the network equipment can process the network communication either according to a network slice rule that corresponds specifically to the network slice identifier, or according to a default group network slice rule for the group to which the network slice identifier belongs. Different groups of network slice identifiers can be associated with different sets of group network slice rules which can be arranged to reduce the work of setting up network slice identifiers in various network slicing scenarios.
Adaptable resiliency for a virtualized radio access network (vRAN) framework is disclosed. A resiliency management component can determine vRAN topological adaptations that can reflect resiliency requirements of service instance(s). Accordingly, sufficient redundant vRAN components to satisfy the resiliency requirements can be deployed. However, unlike conventional redundancy techniques that can determine a highest level of redundancy and then apply that relative to all supported services, the disclosed subject matter can avoid over-deploying redundant vRAN components, e.g., redundant components exceeding the resiliency requirement of a service instance, resulting in lowered monetary and non-monetary costs to maintain a vRAN. Moreover, as the services change, the topology of the vRAN can be automatically adapted to purge excessive redundancies, add newly required redundancies, etc., which can facilitate propagating an adequate but lean vRAN topology that is sufficiently resilient.
Aspects of the subject disclosure may include, for example, obtaining a request pertaining to an onboarding of an application supporting a communication network or system, based on the obtaining of the request, establishing a profile for the application, selecting first resources of a first cloud computing network to support the application, based on the selecting of the first resources, configuring at least one resource of the first resources based on the profile, and deploying a first instance of the application to utilize the first resources. Other embodiments are disclosed.
Aspects of the subject disclosure may include systems and methods, for example, including receiving a user input in natural language, retrieving a first answer including a list of a first number of documents relevant to the user input by searching indexed documents in a knowledge base, applying the first answer to a large language model reader, resulting in a second answer, re-ranking the first answer by using the second answer, resulting in a third answer including a re-ranked list of the first number of documents, and generating a final response including the second answer and one or more documents among the third answer.
A method includes identifying a plurality of assets of an enterprise for which quantum risk is to be assessed, acquiring a plurality of sets of metadata, where each set of metadata describes one asset of the plurality of assets, executing a machine learning model that takes the plurality of sets of metadata as input and generates as output a plurality of scores, where each score of the plurality of scores quantifies a quantum risk associated with one set of metadata of the plurality of sets of metadata that corresponds to one asset of the plurality of assets, and initiating a remedial action for a first asset of the plurality of assets, based on a first score of the plurality of scores that is assigned to a first set of metadata of the plurality of sets of metadata corresponding to the first asset at least meeting a predefined threshold.
Gateway certificate management can include detecting, at a gateway device located at a premises, a connection between the gateway device and a user device located at the premises. The connection can be created to request communications between the user device and a resource that is not located at the premises. The gateway device can determine if a certificate should be issued for the communications and can analyze a profile associated with the user device and a context associated with the communications, wherein the context comprises information identifying a type of data to be communicated via the communications. The gateway device can generate the certificate, the certificate including custom certificate data including communication context data that defines the type of data. The gateway device can enable the communications to allow the user device to communicate with the resource via the gateway device to send and receive the type of data.
Aspects of the subject disclosure may include, for example, obtaining a first indication of a first vulnerability in a first communication network or system, based on the obtaining of the first indication, analyzing the first vulnerability, based on the analyzing, determining that the first vulnerability is a vulnerability of first impression, based on the determining, generating a first solution to the first vulnerability utilizing machine learning, artificial intelligence, or a combination thereof, and based on the generating, implementing the first solution as part of the first communication network or system to address the first vulnerability in the first communication network or system. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, a device having a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations of: receiving, from a user interface, a sample input format specification and output format specification for transforming data; searching a repository for a tag and associated data; merging or updating the sample input format specification and the output format specification with the associated data responsive to finding the tag in the repository, thereby creating updated data; providing the updated data as a prompt to a large language model; receiving a response to the prompt from the large language model; verifying that the response is satisfactory; and storing a context comprising the tag, the updated data and the response in the repository. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, generating a management manifest for a network function (NF) software application, wherein the NF software application is to be deployed in a cloud computing environment, based on the generating the management manifest, deriving a software package that includes the NF software application and the management manifest, and causing the software package to be outputted for deployment in the cloud computing environment, wherein inclusion of the management manifest with the NF software application in the software package facilitates utilization of the management manifest for monitoring and management of a system that results from deployment of the NF software application in the cloud computing environment. Other embodiments are disclosed.
An architecture to dynamically create fifth generation technology based geofences around defined areas to ensure the safe operation of user equipment (UE). A method can comprise determining that first serving cell equipment is servicing an aerial user equipment determining that the first serving cell equipment has enabled beamforming, determining that a first beam of a group of beams is being used to service the aerial user equipment, determining a second beam of the group of beams that the first serving cell equipment will use to service to the aerial user equipment, determining that a handover event from the first serving cell equipment to a second serving cell equipment will occur, and causing the first serving cell equipment to adjust an emitted power level associated with the second beam.
The disclosed technology is directed towards avoiding a misconfiguration that uses a Long Term Evolution (LTE) and new radio dynamic spectrum sharing (DSS) carrier as an LTE carrier and new radio primary secondary cell carrier concurrently for a dual connectivity mobile device. Network equipment can detect the misconfiguration and prevent its usage, or if already configured, deconfigure the LTE DSS secondary cell during setup of a dual connectivity mobile device. Alternatively a dual connectivity mobile device can detect the misconfiguration and notify the network to terminate one of the carriers. Information regarding the misconfiguration can be saved in the mobile device to proactively avoid the dual misconfiguration going forward. Such information can be communicated to other mobile devices, as well as the network.
In one example, a method includes receiving a plurality of network probes originating from a first provider edge router in a service provider network, calculating a plurality of network performance metrics, based on the plurality of network probes, and storing the network performance metrics associated with each network probe of the plurality of network probes in a path metric table, wherein an entry in the path metric table for the each network probe includes a path traveled by the each network probe from the first provider edge router to the processing system, the network performance metrics associated with the each network probe, a community value associated with the each network probe, and a traffic classification value associated with the each network probe.
Concepts and technologies disclosed herein are directed to autonomous vehicle pairing management. According to one aspect disclosed herein, a fleet pairing management application executed by a processor of an autonomous vehicle can initiate a fleet pairing process with a plurality of other autonomous vehicles, each of which can execute one of a plurality of other fleet pairing management applications. The fleet pairing management application can send, over a network, an initiate network pairing request to the plurality of other autonomous vehicles. The fleet pairing management application can receive a confirm network pairing response from at least one other autonomous vehicle of the plurality of other autonomous vehicles. A fleet can then be established. The fleet can include the autonomous vehicle and the at least one other autonomous vehicle of the plurality of other autonomous vehicles. The autonomous vehicles in the fleet can then share data among the fleet.
H04W 4/46 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for vehicle-to-vehicle communication [V2V]
G08G 1/00 - Traffic control systems for road vehicles
21.
APPARATUSES AND METHODS FOR SELECTIVELY SCANNING RESOURCES OF A COMMUNICATION NETWORK AND SYSTEM
Aspects of the subject disclosure may include, for example, transmitting a first value for a first parameter to a first user equipment, wherein the first parameter pertains to a first number of scans to be performed by the first user equipment to detect a first signal having a first frequency within a first frequency band as part of a first scanning procedure, and transmitting a second value for a second parameter to the first user equipment, wherein the second parameter pertains to a first amount of time that the first user equipment is to wait between the first scanning procedure and a second scanning procedure, the second scanning procedure pertaining to detection of the first signal having the first frequency within the first frequency band. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, a non-transitory machine-readable medium comprising executable instructions that, when executed by a processing system including a processor, facilitate performance of operations, the operations comprising: receiving by a selected one of a plurality of containers incoming traffic from a legacy application, the legacy application having been associated with a migrated application prior to the migrated application having been installed on a Software as a Service (SaaS) cloud infrastructure, the incoming traffic comprising a first instruction to perform a first legacy operation; mapping the first legacy operation of the legacy application to a replacement instruction for the migrated application by receiving data from the selected container and assigning the replacement instruction to replace the first instruction; and communicating with the migrated application on the SaaS cloud infrastructure, the communicating comprising sending to the migrated application on the SaaS cloud infrastructure the replacement instruction. Other embodiments are disclosed.
A processing system may identify first virtual circuits and first client systems associated with a first network-to-network interface between a first communication network and a second communication network, the first network-to-network interface having a first bandwidth parameter. The processing system may next select at least a first portion of the first client systems for transfer from the first virtual circuits associated with the first network-to-network interface to second virtual circuits associated with a second network-to-network interface between the first communication network and the second communication network, the second network-to-network interface having a second bandwidth parameter. The processing system may then generate an order to establish the second virtual circuits via the second network-to-network interface and transfer the at least the first portion of the first client systems to the second virtual circuits via the second network-to-network interface.
H04L 41/0896 - Bandwidth or capacity management, i.e. automatically increasing or decreasing capacities
H04L 41/5009 - Determining service level performance parameters or violations of service level contracts, e.g. violations of agreed response time or mean time between failures [MTBF]
24.
FIRST RESPONDER NETWORK IMPROVEMENTS FOR HIGH-CAPACITY ENVIRONMENT
Aspects of the subject disclosure may include, for example, receiving information defining a high-capacity event in a mobility network, receiving information defining a network location of the high-capacity event in the mobility network, automatically configuring one or more network components of the mobility network according to a set of high-capacity parameters, the one or more network components associated with the network location of the high-capacity event, limiting access to the mobile network to specific users according to the high-capacity parameters, and after the high-capacity event, automatically configuring the one or more network components of the mobile network according to a set of reversion parameters. Other embodiments are disclosed.
The concepts and technologies disclosed herein are directed to alarm correlation and ticketing for reconfigurable optical add/drop multiplexer (“ROADM”) networks. According to one aspect disclosed herein, a ROADM controller can create, based upon data associated with a plurality of ROADM network elements operating in a ROADM network, a graph of the plurality ROADM network elements. The ROADM controller can retrieve a plurality of alarms from at least a portion the plurality of ROADM network elements, associate the plurality of alarms with at least the portion of the plurality of ROADM network elements, and associate a direction of each alarm with a corresponding service direction. The ROADM controller can eliminate any alarms with a time stamp outside of a same time window. The ROADM controller can then determine that any remaining alarms are associated with a root cause of a failure within the ROADM network.
The described technology is generally directed towards network slicing for private cellular networks (PCNs). Network slicing can be leveraged as described herein to meet security requirements and/or other policies applicable to PCNs. Network slices implemented according to this disclosure can comprise a private network slice, a public network slice, and a public safety network slice. User equipment can be provisioned with slice identifiers for the network slices, and applications at the user equipment can specify an appropriate slice identifier for their network communications. Network equipment can be configured to route application traffic to a specified slice and to allocate network resources according to the specified slice, as well as to implement security and other policies according to the specified slice.
A processing system may maintain a relationship graph that includes nodes and edges representing phone numbers and device identifiers having associations with the phone numbers. The processing system may obtain an identification of a first phone number or a first device identifier for a fraud evaluation and extract features from the relationship graph associated with at least one of the first phone number or the first device identifier. The plurality of features may include one or more device identifiers associated with the first phone number, or one or more phone numbers associated with the first device identifier. The processing system may then apply the features to a prediction model that is implemented by the processing system and that is configured to output a fraud risk value of the first phone number or the first device identifier and implement at least one remedial action in response to the fraud risk value.
Estimation of network latency based on aggregated performance data is disclosed. End-to-end latency between endpoints can comprise protocol-induced latency, access network-induced, core-network latency, and network-distance-based latency. Network latency, e.g., network-distance-based latency, also referred to as topological latency, can correspond to communication path length between endpoints. Crowdsourcing of communication path performance information can enable estimation of topological latency, and derivatives thereof, such as topological distance. Crowdsourcing can be the practice of obtaining information or input into a task or project by enlisting the services of a large number of people, either paid or unpaid, e.g., collection of performance information. The disclosure illustrates estimation of protocol-induced latency, access network-induced, and core-network latency, such that they can be compensated for in end-to-end latency information, thereby enabling estimation of topological latency that can be employed in determining, initiating, etc., a network response operation that can affect change in a network.
H04L 43/067 - Generation of reports using time frame reporting
H04L 43/0817 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning
AT&T Communications Services India Private Limited (India)
Inventor
Pandey, Mritunjay
Kapoor, Subhash
Rivera, Lynn
Paira, Saurav
Abstract
Aspects of the subject disclosure may include, for example, identifying network elements of a wavelength division multiplexing (WDM) domain of an optical waveguide communication system that includes a group of optical-add-drop multiplexor (OADM) devices. Operations are observed for the WDM domain configured to deliver communication services configured for simultaneously transporting independent signals across a network of single optical waveguides. A demand for optical waveguide communication services is determined and the WDM network is configured according to the optical fiber communication link requirement and according to the observations. The configured WDM network includes at least one OADM device of the group of OADM devices configured to provide a WDM cross-frequency network path of the configured WDM network. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, a device including a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations of receiving a query for 5G Session Management Functions (SMFs) to handle a connection request, wherein the query includes a slice ID and data network name; determining a list of SMFs that each have a blockchain ID immutably recorded on a blockchain, wherein the blockchain ID is authorized to provide service to the slice ID; and sending, responsive to the query, the list of SMFs. Other embodiments are disclosed.
A processing system of an autonomous aerial vehicle including at least one processor may determine informational data to present for at least one person, capture at least a first image via at least one imaging sensor of the autonomous aerial vehicle in a vicinity of the at least one person and determine a first position and a first orientation of the at least one person. The processing system may then identify, based upon the first position and the first orientation of the at least one person, a plurality of candidate projection areas, each candidate projection area comprising a contiguous area within the at least the first image that is deemed to be visible to the at least one person, select one of the plurality of candidate projection areas as a projection zone, and project the informational data on the projection zone via a projector.
The disclosed technology is directed towards routing, by a mobile network operator, a message to a messaging hub associated with a partner carrier or to the partner carrier itself. In response to receiving a message to reroute, a data store (e.g., an ENUM database) is queried to attempt to obtain information corresponding to the routing. For example, when the query response includes a regular expression that specifies a domain, the domain is evaluated against a data structure of respective messaging hubs associated with respective domains. If the returned domain is matched such that an associated messaging hub is identified, the message is routed to the identified messaging hub; otherwise a mobile network partner carrier is determined based on the telephone number of the message recipient, and the message is routed to the determined partner carrier.
Architectures and techniques are presented that can leverage network equipment (e.g., broadband provider equipment, cellular provider equipment) in order to provide enhanced guidance to a target location. This enhanced guidance can supplement existing mapping or navigation equipment. Such can be advantageous for public safety answering point entities and first responder entities as well as, potentially, for service technicians or delivery. When an entity (e.g., first responder) is dispatched to a particular location, an associated residential gateway (RG) or other device can be identified, and an associated SSID determined. This SSID can be provided to the entity seeking that particular location so that SSID scans can operate similar to a transponder or homing beacon. The SSID might also be configured specially for this purpose. Additionally, the state of a device attached to the RG can be altered to further aid in locating, such as blinking porch lights or audible indicia.
Aspects of the subject disclosure may include, for example, co-locating network functions in virtual machines and/or containers in public clouds. A session border controller (SBC) may be combined with one or more voice and/or message services network functions. A virtual image or container runtime including co-located network functions may be provided to a public cloud service provider, and virtual machines or containers having co-located network functions may be instantiated as needed. Other embodiments are disclosed.
A method performed by a processing system including at least one processor includes collecting a set of data from a plurality of sensors that is monitoring a system, wherein the plurality of sensors includes sensors of a plurality of different modalities, detecting an instance of out-of-distribution data in the set of data by providing the set of data as an input to a machine learning model that generates as an output an indicator that the instance of out-of-distribution data is out-of-distribution with respect to the set of data, identifying a root cause for the instance of out-of-distribution data, and initiating an action to remediate the root cause of the instance of out-of-distribution data.
H04L 41/0654 - Management of faults, events, alarms or notifications using network fault recovery
H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
H04W 4/38 - Services specially adapted for particular environments, situations or purposes for collecting sensor information
36.
MAC ADDRESSES CAPTURING VIRTUAL-TO-PHYSICAL ASSOCIATIONS WITHIN VIRTUAL ENVIRONMENTS
Aspects of the subject disclosure may include, for example, identifying a request to initiate a virtual machine including a virtual network interface on a physical host processing system that includes a physical network interface. A location reference to a physical location of the physical network interface is determined and an adapted media access control (MAC) address is adapted to incorporate the location reference according to an association between the virtual network interface and the physical network interface. The adapted MAC address is further associated with the virtual network interface of the virtual machine, such that the physical location of the physical network interface is identifiable from within an environment of the virtual machine via the adapted MAC address. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, receiving a handover request from a user equipment (UE) device in a mobility network, wherein the handover request identifies a target cell for handing over radio communication with the UE device from a source cell, wherein the identifying is based on the handover request, determining a usage level of the UE device, wherein the usage level comprises one of performance-sensitive traffic and performance-tolerant traffic, selecting an alternative target cell for the handover request, wherein the selecting is responsive to determining a performance-sensitive traffic usage level of the UE device, and initiating a handover operation between the source cell and the alternative target cell. Other embodiments are disclosed.
Aspects of the subject disclosure may include receiving a first data set related to a first International Mobile Subscriber Identifier (IMSI) from a wireless core system, tidying the first data set by building a bandwidth matrix representing each bandwidth usage value with respect to a selected time-stamp and one or more flow IDs associated with the first IMSI, repeating the receiving and tidying operations with respect to a plurality of data sets related to remaining IMSIs, and generating data visualization displaying the bandwidth usage value of the first IMSI and the remaining IMSIs. The first IMSI and the remaining IMSIs are associated with a selected network slice ID. Other embodiments are disclosed.
H04W 8/18 - Processing of user or subscriber data, e.g. subscribed services, user preferences or user profilesTransfer of user or subscriber data
H04L 41/22 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
39.
METHODS, SYSTEMS, AND DEVICES FOR RECOMMENDING MITIGATION OF INTERNET OF THINGS (IOT) CYBER THREATS USING GENERATIVE ARTIFICIAL INTELLIGENCE
Aspects of the subject disclosure may include, for example, obtaining a group of threat research reports, obtaining a group of indicators of compromise (IOCs), and monitoring a network of Internet of Things (IoT) devices. Further embodiments can include determining a group of possible malware on the network based on the monitoring of the network, and generating a network security recommendation based on the group of threat research reports based on the group of threat research reports, the group of IOCs, and the group of possible malware. Other embodiments are disclosed.
The described technology is generally directed towards an automated security hangar for private cellular networks. In response to detecting that a user equipment is departing a geographic area served by a private cellular network, the user equipment can encrypt its data and send it to a private cellular network server. The server can receive and securely store the encrypted data, and the server can provide a code to the user equipment. The user equipment can store the code, disconnect from the private cellular network, and depart the geographic area. When the user equipment returns to the geographic area and reconnects to the private cellular network, the user equipment can present the code to the server. The server can validate the code, the user equipment, and/or the operator of the user equipment, and the server can return the encrypted data to the user equipment.
A processing system including at least one processor may apply an input vector to a location-based services recommendation module implemented by the processing system, where the location-based services recommendation module includes at least one location-based service prediction model, and where the input vector includes first characteristics associated with a first cell site of a cellular network. The processing system may obtain an output of the location-based services recommendation module in response to the applying of the input vector, the output including a first plurality of values for a plurality of configurable settings of at least a first network element associated with the first cell site. The processing system may then configure the at least the first network element associated with the first cell site to apply at least one of the first plurality of values for at least one of the plurality of configurable settings.
A method performed by a processing system including at least one processor includes detecting a presence of a plurality of user devices in a cell of a mobile network that deploys a carrier that supports beamforming, disabling, in response to the detecting the presence of the plurality of user devices, carrier aggregation in the cell for a first subset of the plurality of user devices that supports multi-user multiple input, multiple output communications, and activating, after disabling the carrier aggregation, multi user multiple input, multiple output communications for the first subset of the plurality of user devices.
Aspects of the subject disclosure may include, for example, a method that includes receiving, by a processing system, an uplink signal at a radio unit (RU) communicating over a fronthaul interface with a distributed unit (DU) of a communication network; receiving a demodulated reference signal (DMRS) configuration at the RU; performing a beamforming procedure at the RU for one or more beams generated at the RU; and determining, in accordance with an option selected by the DU, whether to perform an equalization procedure for the uplink signal at the RU resulting in equalized user data. In accordance with the equalization procedure being performed at the RU, equalization for the uplink signal is not performed at the DU. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, a system, comprising: a message-sending device comprising a first processing system including a first processor, wherein the message-sending device further comprises a first wireless communication mechanism, wherein the first processing system is configured to receive an input command, wherein the input command is provided by a person who is coaching a player, wherein the person who is coaching the player is located on a sideline of a field, and wherein the player is on the field; and a helmet worn by the player, wherein the helmet comprises a second processing system including a second processor, wherein the helmet further comprises a second wireless communication mechanism, and wherein the helmet further comprises a display mechanism positioned in a line of sight of at least one eye of the player; wherein the first processing system determines whether a play clock associated with a current play has been running for a threshold amount of time, resulting in a determination; wherein, responsive to the determination being that the play clock associated with the current play has not been running for the threshold amount of time, the first processing system transmits via the first wireless communication mechanism to the helmet a message that is based upon the input; wherein the second processing system receives, via the second wireless communication mechanism of the helmet, the message; and wherein, responsive to receipt of the message, the second processing system causes the display mechanism to display the message. Other embodiments are disclosed.
AT&T Global Network Services Czech Republic s.r.o. (Czech Republic)
AT&T Mobility II LLC (USA)
Inventor
Hao, Shuai
Andrei, Alexandru Cristian
Perez, Hector
Coates, Jr., Donald
Ge, Zihui
Hicks, Alvin
Tipton, Jason
Abstract
The technologies described herein are generally directed to validating the integration of new carrier components at base station equipment, e.g., in a fifth generation (5G) network or other next generation networks. For example, a method described herein can include, confirming based on installation data, an installation milestone of an installation of a carrier component at base station equipment, resulting in a confirmed milestone. The method can further include, based on the confirmed milestone, identifying for an evaluation of the installation of the carrier component, a criterion associated with a characteristic of operation of the base station equipment. Further, the method can include based on a result of evaluation of the installation, sending, by the network equipment, a validation signal to the base station equipment indicating that the installation of the carrier component is validated.
A processing system may obtain a request from a user device to activate an access credential locker for use in accessing at least one enterprise system of an enterprise via the processing system, the request comprising a token that identifies the access credential locker, obtain a first key from the user device, transmit, to the enterprise, a request for a second key, obtain the second key from the enterprise in response to the request, apply the first key and the second key to the access credential locker, the access credential locker being encrypted in accordance with the first and second keys and being decrypted via the applying of the first and second keys, and establish a communication session between the user device and the at least one enterprise system via the processing system using at least one access credential that is stored in the decrypted access credential locker.
G06F 21/45 - Structures or tools for the administration of authentication
H04L 9/14 - Arrangements for secret or secure communicationsNetwork security protocols using a plurality of keys or algorithms
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
Aspects of the subject disclosure may include, for example, obtaining a natural language statement of an optimization problem that is to be solved, analyzing the natural language statement to select a template included within a plurality of templates, generating a definition for the optimization problem using the template, constructing a model in accordance with the definition, resulting in a constructed model, and validating the constructed model, resulting in a validated model. Other embodiments are disclosed.
H04L 41/0823 - Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability
G06F 40/40 - Processing or translation of natural language
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
48.
SYSTEM AND METHOD FOR EVALUATING GENERATIVE LARGE LANGUAGE MODELS
Aspects of the subject disclosure may include, for example, a device that facilitates obtaining a plurality of prompts from a selected subject matter domain of a database configured to measure an effectiveness of a generative large language model (LLM) to distinguish variances between each prompt of the plurality of prompts; supplying the plurality of prompts to the LLM; receiving respective responses to each of the prompts from the LLM; transforming each of the prompts and respective responses to each of the prompts into an embedding space; determining, by applying domain-based metrics to the embedding space, a quality measurement of each respective response to produce a plurality of quality measurements; and generating, according to the plurality of quality measurements, a performance of the LLM. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, determining, for a network node, one or more neighbor network nodes relative to the network node; determining, for each of the one or more neighbor network nodes, whether support is provided for a particular type of end-user device; and generating, for the network node, a neighbor cell relation table, wherein the neighbor cell relation table includes the one or more neighbor network nodes, and wherein the neighbor cell relation table further includes for at least one of the neighbor network nodes an indication that support is provided for the particular type of end-user device. Other embodiments are disclosed.
A method includes monitoring a condition of a mobile device while the mobile device is connected to a terrestrial network, determining that the condition satisfies a trigger for switching to a non-terrestrial network, and sending, in response to the determining, a first instruction to the mobile device, where the first instruction causes the mobile device to disconnect from the terrestrial network and to connect to a non-terrestrial network.
The technologies described herein are generally directed to modeling radio wave propagation in a fifth generation (5G) network or other next generation networks. For example, a method described herein can include, for a network application, identifying, by a system comprising a processor, a first performance characteristic of first base station equipment, wherein the first base station equipment is actively communicating with a user equipment via a first network connection. The method can further include, based on the first performance characteristic being in a condition in relation to a first threshold, determining, by the system, to execute a handover of the user equipment to a second network connection with second base station equipment, resulting in a handover determination. Further, the method can include, based on the handover determination, facilitating, by the system, executing the handover of the user equipment to the second network connection.
The disclosed technology is directed towards preventing a handover of a Wi-Fi call to a Fifth Generation (5G) standalone cellular network. In one alternative, a 5G standalone usage setting is disabled on a mobile device when Wi-Fi calling is enabled on the mobile device. In another alternative, a 5G standalone usage setting is disabled on a mobile device when Wi-Fi calling is enabled on the mobile device and the mobile device is connected to a Wi-Fi network, which facilitates camping on a 5G standalone network when the mobile device is not connected to a Wi-Fi network. In yet another alternative, a 5G standalone usage setting is disabled on a mobile device when an evolved packet data gateway (ePDG) tunnel is set up on the mobile device, which similarly facilitates camping on a 5G standalone network when the ePDG tunnel is torn down.
Aspects of the subject disclosure may include, for example, a device including a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations of receiving a smart contract for tracking a position of a mobile device from a quantum blockchain; issuing a token uniquely identifying location data for the position of the mobile device; receiving location data including the token from the mobile device, wherein the position of the mobile device is determined by displacement from an initial position using a quantum accelerometer; verifying the location data using the token; and storing the location data in the quantum blockchain. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, obtaining a first user profile associated with a first user, the first user profile comprising a first privacy rule; obtaining a second user profile associated with a second user, the second user profile comprising a second privacy rule; determining which of the first privacy rule or the second privacy rule is more restrictive; setting for a first extended reality (XR) communication session a third privacy rule, the third privacy rule being set to the first privacy rule in a first case that the first privacy rule has been determined to be more restrictive than the second privacy rule and the third privacy rule being set to the second privacy rule in a second case that the second privacy rule has been determined to be more restrictive than the first privacy rule; creating the first XR communication session, the first XR communication session comprising one or more environments, the one or more environments supporting the first user and the second user; and facilitating communications via the one or more environments, the communications being between a first communication device used by the first user and a second communication device used by the second user, the communications being enforced to comply with the third privacy rule. Other embodiments are disclosed.
H04L 65/1069 - Session establishment or de-establishment
H04L 65/401 - Support for services or applications wherein the services involve a main real-time session and one or more additional parallel real-time or time sensitive sessions, e.g. white board sharing or spawning of a subconference
55.
SYSTEM AND METHOD FOR FRAUD DETECTION THROUGH NETWORK MONITORING
Aspects of the subject disclosure may include, for example, a device, having a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations of: collecting data traffic of one or more network devices of a user, wherein the data traffic is associated with multiple channels of interactions; building a channel-specific user signature and a cross-channel user signature of normal usage for the user based on the data traffic collected; detecting a change in a characteristic of the data traffic, wherein the change indicates fraudulent activity based on the channel-specific user signature and the cross-channel user signature; and issuing an alert of the fraudulent activity based on the change. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, a device having a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations of: receiving a series of values from a data stream generated by one or more equipment in a communications network; creating a first window of values received before a first point in time and a second window of values received on or after the first point in time; comparing a distribution of values in the first window and values in the second window to compute a distance at the first point in time; repeating the creating and comparing at subsequent points in time after the first point in time, thereby generating a series of distances; computing a z-score for a first distance in the series of distances; generating an alert responsive to the z-score exceeding a threshold; and storing the alert in a log of alerts. Other embodiments are disclosed.
A method for managing energy consumption in a traffic-aware manner includes monitoring a level of network traffic in a wireless network to which a plurality of user devices is connected, detecting, based on the monitoring, that a current level of traffic in the wireless network has exceeded a predefined threshold level of traffic, selecting, in response to the detecting, a subset of the plurality of user devices to put into an energy saving mode, and sending, to each user device in the subset, a signaling message, where the signaling message instructs the each user device to mute, for a defined number of symbols, at least one of: a transmit capability of the each user device or a receive capability of the each user device.
A method includes detecting that a first satellite of a non-terrestrial network is moving out of a field of view of a user endpoint device that is currently connected to the non-terrestrial network, estimating a time at which a second satellite of the non-terrestrial network is expected to enter the field of view of the user endpoint device, selecting, in response to the time at which the second satellite of the non-terrestrial network is expected to enter the field of view of the user endpoint device, an uplink power for the user endpoint device, and sending, to the user endpoint device, an instruction to transmit at the uplink power that is selected.
H04W 52/28 - TPC being performed according to specific parameters using user profile, e.g. mobile speed, priority or network state, e.g. standby, idle or non-transmission
H04W 52/40 - TPC being performed in particular situations during macro-diversity or soft handoff
A processing system including at least one processor of an endpoint device may obtain performance information of a plurality of wireless access networks in a vicinity of the endpoint device and receive a service request from a first process in operation on the endpoint device. The processing system may then select in response to the service request, a first wireless access network of the plurality of wireless access networks for the first process based upon the performance information of the plurality of wireless access networks and establish a communication session for the first process via the first wireless access network.
A method includes receiving a request for a communication session from a user device, identifying a first resource from a plurality of resources, wherein the first resource is associated with a first service control layer for a radio access network and wherein the plurality of resources includes at least one virtual network function (VNF), identifying a second resource from the plurality of resources, wherein the second resource is associated with a second service control layer for LTE core functions, identifying a third resource from the plurality of resources, wherein the third resource is associated with a third service control layer for content delivery, allocating a virtual machine to be used to instantiate the at least one VNF, instantiating the at least one VNF and establishing the communication session by facilitating communications between the first service control layer, the second service control layer and the third service control layer.
Aspects of the subject disclosure may include, for example, obtaining a first indication of a first count of resource blocks in a first cell in which the device is located, obtaining a second indication of a second count of resource blocks allocated to the device, obtaining a third indication of a reference signal received power (RSRP) value for the device, obtaining a fourth indication of a received signal strength indicator (RSSI) value for the device, computing a first reference signal received quality (RSRQ) value for the device based on the first indication, the second indication, the third indication, and the fourth indication, and transmitting a fifth indication of the first RSRQ value. Other embodiments are disclosed.
A processing system of a radio access network may obtain an attach request from a user equipment to the radio access network, identify a first cellular core network of a first mobile network operator associated with the user equipment from among a plurality of cellular core networks of a plurality of mobile network operators in communication with the radio access network, generate a first record that includes an identifier of the user equipment, at least one quality class indicator, and at least one radio access network resource utilization metric for a utilization of the radio access network by the user equipment associated with the at least one quality class indicator, and transmit the first record to at least one of: the first cellular core network of the first mobile network operator or a second cellular core network of a second mobile network operator of the plurality of network operators.
A processing system including at least one processor may detect an outage associated with at least one network element, apply at least one attribute of the at least one network element as at least a first input of a plurality of inputs to a machine learning model that is implemented by the processing system to obtain an output of the machine learning model indicative of an alarm smoothing interval, and present, in accordance with the alarm smoothing interval, an alarm indicative of the outage associated with the at least one network element.
H04L 41/0604 - Management of faults, events, alarms or notifications using filtering, e.g. reduction of information by using priority, element types, position or time
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
64.
TRAFFIC MANAGEMENT TECHNIQUES FOR HETEROGENEOUS TERRESTRIAL AND SATELLITE NETWORKS
Aspects of the subject disclosure may include, for example, obtaining first data associated with a plurality of user equipment devices that are communicating with at least one access point of a wireless terrestrial network, wherein the first data indicates a respective location of each user equipment device, a respective in-use wireless frequency that each user equipment device is using for communicating with the at least one access point, and one or more respective potential wireless frequencies that each user equipment device is capable of using for wireless communication; obtaining second data associated with a satellite access point of a wireless non-terrestrial network, wherein the second data indicates a current location of the satellite access point, a future predicted location of the satellite access point, and one or more wireless satellite frequencies that will be available for use by the satellite access point when at the future predicted location in order to communicate with one or more of the user equipment devices; and selecting, based upon the first and second data, at least one user equipment device of the plurality of user equipment devices to offload its data communication to the satellite access point. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, combining a plurality of machine learning (ML) models to form a composite model, the plurality of ML models including a first ML model trained on first local data received at a first network location and added models including a second ML model through an nth ML model, respective added models of the added models each being respectively trained on respective training data at a respective network location remote from the first network location; receiving input data at the first network location; providing the input data to the composite model; receiving, from the composite model, a conclusion about a status of the input data; receiving an indication to update one or more models of the plurality of ML models; and updating the one or more models according to the indication. Other embodiments are disclosed.
A network processing system obtains a viewport of a client device for volumetric video and a two-dimensional (2D) subframe of a frame of volumetric video is obtained associated with the viewport. Viewports may be obtained from the client device or be predicted. 2D subframes and reduced resolution versions of frames can be transmitted to the client device. A client device may request volumetric video from the network processing system and provides a viewport to the network processing system. The client device may obtain from the network processing system reduced resolution versions of volumetric video frames and 2D subframes in accordance with the viewport. The client device may determine whether a current viewport matches the viewport associated with the obtained 2D subframe and provides a display based on either that subframe (upon a match) or a 2D perspective of the reduced resolution frame associated with the current viewport (if no match).
A distributed denial of service (“DDoS”) attack profiler can determine a plurality of DDoS attack properties associated with a DDoS attack that utilizes an Internet of Things (“IoT”) device operating in communication with a home gateway. The DDoS attack profiler can create a DDoS attack profile and can provide a DDoS attack report based upon the DDoS attack profile to a correlator. An IoT device profiler can determine a plurality of IoT device properties and can create, based upon the plurality of IoT device properties, an IoT device profile. The IoT device profiler can create an anomaly report that identifies an anomaly associated with the IoT device. The correlator can correlate the DDoS attack report with the anomaly report to determine if a match exists. In response to determining that the match exists, the home gateway system can store the bot match record in a bot match repository.
Aspects of the subject disclosure may include, for example, authenticating, by a federated blockchain controller, a user equipment located within a cell coverage area of a network that includes heterogeneous cells. The federated blockchain controller can provide encryption data to the user equipment and corresponding authentication information to one or more multi-access edge computing (MEC) devices associated with the heterogeneous cells to enable secure and efficient handovers for the user equipment amongst the heterogeneous cells, without a need for additional handover reauthentication procedures. Other embodiments are disclosed.
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
Devices, computer-readable media and methods are disclosed for establishing a peer-to-peer network for rerouting network traffic of a telecommunication network during a network disruption. For example, a processing system may detect a network disruption between a first device and a second device of the telecommunication network. The processing system may identify a first peering device having a connection to the first device of the telecommunication network, identify a second peering device having a connection to the second device of the telecommunication network, and establish a peer-to-peer network via at least the first peering device and the second peering device, wherein at least one of the first peering device or the second peering device is a mobile endpoint device configured to operate as a virtual network function. The processing system may then route network traffic between the first device and the second device via the peer-to-peer network.
A processing system including at least one processor may identify a network zone with excess capacity, the network zone comprising a plurality of network components of a telecommunication network, transmit an invitation to a set of entities to utilize the network zone to obtain at least one network service at a geographic location of the network zone, configure at least one network component of the plurality of network components in accordance with an anticipated network demand from the set of entities, and provide the at least one network service to at least one entity of the set of entities via the network zone when the at least one entity is present at the geographic location of the network zone.
The system allows real time collection and processing of massive data from many network elements. It has an elastic architecture that scales horizontally to support different network sizes. The system in a uniform data format for downstream consumption. It employs a pub/sub data distribution mechanism that supports multiple concurrent downstream subscribers efficiently in real-time.
Aspects of the subject disclosure may include, for example, detecting a plurality uplink data packets on a network, the plurality of uplink data packets conveying application protocol messages from an application on a mobile device to an application server providing a service to the application on the mobile device over the network; providing data packets of the plurality uplink data packets to a machine learning model, the machine learning model trained to identify respective application protocol messages from the data packets; receiving from the machine learning model an indication that a start video download application protocol message has been identified by the machine learning model, the start video download application protocol message requesting initiation of a video download to the application on the mobile device from the application server; detecting a plurality of downlink data packets on the network, the plurality of downlink data packets conveying video content data to the mobile device in response to the start video download application protocol message; comparing a watch time for displaying the video content data on the mobile device by the application and a download data time; and determining a stall event has occurred based on the comparing. Other embodiments are disclosed.
H04N 21/41 - Structure of clientStructure of client peripherals
H04N 21/25 - Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication or learning user preferences for recommending movies
H04N 21/442 - Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed or the storage space available from the internal hard disk
The described technology is generally directed towards a cellular network area optimizer. The area optimizer observes cellular network conditions at multiple radio access network (RAN) nodes within a target area. Based on observed conditions, the area optimizer applies a set of parameter values at the multiple RAN nodes. The set of parameter values enhances the overall throughput, while maintaining or improving connection retainability and accessibility, of the multiple RAN nodes under the observed conditions. The area optimizer learns different sets of parameter values to apply in response to different observed conditions by making parameter value adjustments and observing the effect of the adjustments on overall throughput of the RAN nodes in the target area.
Aspects of the subject disclosure may include, for example, identifying a first message composed by a first user on a first user equipment that is directed to a second user of a second user equipment, identifying a preference of the second user, determining that a first content of the first message composed by the first user departs from the preference of the second user in an amount greater than a threshold, and providing, based on the determining, guidance to the first user for modifying the first content to generate second content that more closely aligns to the preference of the second user. Other embodiments are disclosed.
A method performed by a processing system including at least one processor includes applying a contextual filter to mask a portion of at least one of: an input of a software application, an output of the software application, or an underlying dataset of the software application, where the contextual filter simulates a limitation of a user of the software application, executing the software application with the contextual filter applied to the at least one of: the input of the software application, the output of the software application, or the underlying dataset of the software application, collecting ambient data during the executing, and recommending, based on a result of the executing, a modification to the software application to improve at least one of: an accessibility of the software application or an inclusion of the software application.
Aspects of the subject disclosure may include, for example, determining a self-interference channel response of a transceiver of a mobile base station having a transmitter and a receiver. The self-interference channel response spans multiple sub-bands of a predetermined mobile cellular frequency channel. A first sub-band of the multiple sub-bands is identified according to the self-interference channel response and, an estimate is determined, at the receiver, of a first coupled transmit power level of the transmitter when operating within the first sub-band. A receiver sensitivity is adjusted according to the first coupled transmit power level to obtain an adjustment adapted to increase receiver sensitivity, while restricting operation of the receiver to a substantially linear region. The adjustment allows a transmission within the first sub-band and a reception within a second sub-band of the plurality of sub-bands to occur simultaneously at the mobile base station. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, obtaining a first report comprising first data, obtaining a second report comprising second data, analyzing at least the first data and the second data to identify characteristics of an environment where a communication device is located, based at least in part on the characteristics, determining whether dual connectivity is appropriate for providing a communication service to the communication device, resulting in a determination of dual connectivity, and selectively enabling or disabling dual connectivity in respect of the communication device based on the determination of dual connectivity. Other embodiments are disclosed.
Providing and using a digital asset delivery service can include obtaining a digital asset delivery request that identifies a digital asset that is to be provided to a recipient device, the recipient device, and delivery requirements associated with providing the digital asset to the recipient device. A data source and a network resource via which the data source is to provide the digital asset to the recipient device can be determined, where the data source and the network resource are capable of satisfying the delivery requirements. A ledger that includes instructions for constructing the digital asset at the recipient device can be provided to the recipient device. Delivery of the digital asset to the recipient device by the data source can be triggered, and delivery of the digital asset to the recipient device by the data source can be tracked using a token.
Facilitating management of secondary cell group failures in advanced networks (e.g., 5G and beyond) is provided herein. Operations of a method can comprise determining, by a system comprising a processor, that a first secondary cell group procedure attempt is unsuccessful. Further, the method can comprise facilitating, by the system, a second secondary cell group procedure attempt based on expiration of a delay timer and based on a determination that a retry attempt threshold level is not exceeded.
H04L 41/0654 - Management of faults, events, alarms or notifications using network fault recovery
H04L 41/0816 - Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
Aspects of the subject disclosure may include, for example, establishing a communication session utilizing a first radio access technology (RAT), obtaining data associated with a performance of the communication session via the first RAT, analyzing the data to determine that the performance of the communication session may be enhanced utilizing a second RAT that is different from the first RAT, resulting in a first determination, and based on the first determination, causing the communication session to utilize the second RAT. Other embodiments are disclosed.
H04W 76/15 - Setup of multiple wireless link connections
H04W 72/0453 - Resources in frequency domain, e.g. a carrier in FDMA
81.
METHODS, SYSTEMS, AND DEVICES FOR GENERATING A MULTI-USER (MU) MULTIPLE-INPUT-MULTIPLE-OUTPUT (MIMO) GROUP BASED ON BEAM IDENTIFIERS OF COMMUNICATION DEVICES
Aspects of the subject disclosure may include, for example, obtaining a first beam identifier associated with a first communication device, obtaining a second beam identifier associated with a second communication device, and generating a multi-user (MU) multiple-input-multiple-output (MIMO) group including the first communication device and the second communication device based on the first beam identifier and the second beam identifier. Other embodiments are disclosed.
SYSTEMS AND METHODS FOR DETECTING NON-TERRESTRIAL CELLS AND MANAGING PHYSICAL CELL IDENTITY COLLISION AND NEIGHBORING LIST INTEGRITY IN A HETEROGENEOUS TERRESTRIAL AND SATELLITE WIRELESS COMMUNICATION NETWORKS
Aspects of the subject disclosure may include, for example, a method including receiving first neighbor cell information from a first user equipment (UE) operating in a first terrestrial service cell, where the first neighbor cell information includes a first physical cell identification (PCI) of a first neighbor cell and a cell type indicator detected by the first user equipment. The method further includes generating a database that cross-references the first PCI, the cell type indicator and a location of the first UE and analyzing a correlation among the first PCI, the cell type indicator and the location of the first UE to identify anomalies indicative of a non-terrestrial neighbor cell. No handover or neighbor list updates may take place for the non-terrestrial neighbor cell. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, detecting data traffic from a wireless device located in a customer premise, determining from characteristics of the data traffic whether to route the data traffic to a public network external to the customer premise or route the data traffic to a local network in the customer premise, responsive to determining to route the data traffic to the local network in the customer premise, performing a measurement on the data traffic, and detecting from the measurement that the data traffic requires mitigation action. Other embodiments are disclosed.
H04L 41/5009 - Determining service level performance parameters or violations of service level contracts, e.g. violations of agreed response time or mean time between failures [MTBF]
H04L 45/00 - Routing or path finding of packets in data switching networks
84.
CONSTRUCTING COMPACT THREE-DIMENSIONAL BUILDING MODELS
An example method performed by a processing system includes obtaining a light detecting and ranging point cloud of a building, where the point cloud includes a plurality of points, and where each point is associated with a set of (x,y,z) coordinates. A first point of the plurality of points is assigned to a subset of the plurality of points that is associated with the building, where the subset includes points whose (x,y) coordinates fall within a footprint of the building. The first point is grouped into a first cluster according to at least one of: a (z) coordinate of the first point and a gradient to which the first point belongs. A first prism formed by the first cluster is constructed. A model of the building is stored as a plurality of connected prisms, where the plurality of connected prisms includes the first prism.
G01S 17/42 - Simultaneous measurement of distance and other coordinates
G01S 17/89 - Lidar systems, specially adapted for specific applications for mapping or imaging
G06V 10/762 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using clustering, e.g. of similar faces in social networks
Aspects of the subject disclosure may include, for example, obtaining and aggregating first image content of an equipment site resulting in first aggregated image content, and providing the first aggregated image content to communication devices that render it on a respective display. Further embodiments include identifying first equipment from first user-generated input, and adjusting the first aggregated image content with a first equipment image resulting in second aggregated image content. Additional embodiments include identifying second equipment from second user-generated input, and adjusting the second aggregated image content with a second equipment image resulting in third aggregated image content. Also, embodiments include determining that installation of the second equipment does not satisfy an installation threshold in response to analyzing the third aggregated image content, and providing a notification to the communication devices indicating the installation of the second equipment does not satisfy the installation threshold. Other embodiments are disclosed.
G06V 10/22 - Image preprocessing by selection of a specific region containing or referencing a patternLocating or processing of specific regions to guide the detection or recognition
A system is provided with a software controller; a storage platform capable of storing stored blocks of data and having a central processing unit; a controller monitoring and isolation tool embedded in the software controller; and a storage monitoring and isolation tool embedded in the storage platform that is capable of locking down a memory partition on the storage platform. The system also includes a memory for storing computer instructions and a host computer coupled with the memory, wherein the host computer, responsive to executing the computer instructions, performs certain operations. The operations include extracting orchestration configurations through the controller monitoring and isolation tool and relaying the orchestration configurations to the storage monitoring and isolation tool. The operations include correlating using the controller monitoring and isolation tool and the storage monitoring and isolation tool actual locations for incoming data for a customer, and monitoring performance of the storage platform with the storage monitoring and isolation tool. The operations also include tying the stored blocks of data to a physical memory on which the stored blocks of data reside; and providing a passcode to the customer though the controller monitoring and isolation tool that has to be presented to the controller monitoring and isolation tool and the storage monitoring and isolation tool to store data.
A processing system may identify a plurality of message contents within a plurality of reported messages, where each is reported as an unwanted message, determine, for each message content, a respective count comprising a number of occurrences the message content within the plurality of reported messages, identify a set of message contents within the plurality of message contents for which associated counts of the plurality of counts exceeds a first threshold, identify a source phone number that is a source of a first set of messages within the plurality of reported messages containing one or more message contents of the set of message contents, and where a number of reporting entities associated with the first set of messages exceeds at least a second threshold, and perform at least one remedial action in a communication network in response to the identifying of the source phone number.
In one example, the present disclosure describes a device, computer-readable medium, and method for implementing programmable security specifications in home routers. For instance, in one example, a method performed by a processing system including at least one processor includes monitoring network traffic flowing into and out of a home network that is connected to a core network via a gateway device, constructing a model of network traffic flowing into and out of the home network, based on the monitoring, detecting an anomaly in the model of the network traffic, generating a rule based on the anomaly, where the rule specifies an action to be taken when a match condition related to the anomaly is detected, and deploying the rule on the gateway device.
Aspects of the subject disclosure may include, for example, obtaining for a first path carrying first network traffic a corresponding first alternate path; obtaining for a second path carrying second network traffic a corresponding second alternate path, at least a first portion of the first alternate path being the same as at least a second portion of the second alternate path; responsive to a first detected failure on the first path, causing communication of first re-directed network traffic via the first alternate path instead of via the first path; responsive to a second detected failure on the second path, detecting whether total traffic, including the first re-directed network traffic, on the first portion of the first alternate path meets a threshold; responsive to the detected meeting of the threshold, obtaining for the second path a corresponding back-up alternate path; and causing communication of second re-directed network traffic via the back-up alternative path instead of via the second path. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, obtaining a reference data set comprising a plurality of reference data records, wherein the reference data set is associated with a cloud infrastructure, and wherein each of the reference data records comprises a reference network name associated with one of a plurality of reference networks that is configured within the cloud infrastructure and a corresponding reference Virtual Local Area Network (VLAN) identifier for the one of the plurality of reference networks that is configured within the cloud infrastructure; obtaining an input data set comprising a plurality of input data records, wherein the input data set is associated with the cloud infrastructure, and wherein each of the input data records comprises a network name associated with one of a plurality of networks that is being considered for configuration within the cloud infrastructure and a corresponding VLAN identifier for the one of the plurality of networks that is being considered for configuration within the cloud infrastructure; analyzing the reference data records and the input data records in order to identify a set of one or more errors; and tagging one or more records in the input data set with each corresponding occurrence of each error. Other embodiments are disclosed.
Aspects of detecting and mitigating denial of service (“DoS”) attacks over home gateway network address translation (“NAT”) are disclosed herein. According to one aspect disclosed herein, a home gateway system can detect that a NAT table is overpopulated. In response to detecting that the NAT table is overpopulated, the home gateway system can determine a mitigation action to be performed. The home gateway system can then perform the mitigation action in an attempt to mitigate an effect of the NAT table overpopulation.
Devices, computer-readable media and methods are disclosed for dynamic capacity scaling for whitebox core networks. In one example, a method includes monitoring network traffic traversing a whitebox core network of a communications service provider, detecting a level of network traffic on a first link in the whitebox core network is greater than a threshold level of network traffic, and re-routing, in response to the detecting, at least one tunnel in the whitebox core network from the first link to a second link in the whitebox core network.
Aspects of the subject disclosure may include, for example, generating a multi-user (MU) multiple-input-multiple-output (MIMO) group including a first group of communication devices. The MU-MIMO group is associated with a base station. Further embodiments can include determining a first group data streams associated with the MU-MIMO group that is transmitted from the base station to the first group of communication devices, and determining a wireless signal associated with each data stream of the first group of data streams resulting in a first group wireless signals. Additional embodiments can include determining a power associated with each wireless signal of the first group of wireless signals is less than a power threshold resulting in a first determination, and increasing the power associated with each wireless signal of the first group of wireless signals based on the first determination resulting in a first group of amplified wireless signals. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, a mobile device, with a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations, including: initializing a wireless fidelity (Wi-Fi) radio; checking whether a Wi-Fi connection with a Wi-Fi access point is available; establishing a secure session with a border gateway via the Wi-Fi connection responsive to the checking; and facilitating a user of the mobile device with a switch function for control of user sessions, wherein the switch function does not affect the secure session or the Wi-Fi radio. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, performing a first analysis in respect of a first carrier, the first carrier operative in accordance with a frequency included in a frequency range from 24.25 GHz to 52.60 GHz, inclusive, determining, based on the performing of the first analysis, that a first user equipment (UE) is to be paired with at least one other UE as part of a multi-user multiple-input multiple-output (MU-MIMO) topology in the first carrier, resulting in a first determination, and subjecting the first UE to the MU-MIMO in the first carrier in accordance with the first determination. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, obtaining training from wireless devices, where the wireless devices collect the training data that indicates first operational parameters and operational errors at the wireless devices; analyzing the training data to generate pre-failure thresholds according to the first operational parameters and the operational errors; receiving operational data from a particular wireless device, where the particular wireless device collects the operational data that indicates second operational parameters at the particular wireless device; analyzing the operational data according to the pre-failure thresholds resulting in a pre-failure analysis; and providing an alarm when the pre-failure analysis indicates that one or more of the second operational parameters violates one or more of the pre-failure thresholds, where the alarm is generated prior to a failure of the particular wireless devices that is predictable based on the second operational parameters. Other embodiments are disclosed.
Systems, methods, and apparatuses provide a scalable framework for analyzing queuing and transient congestion in network switches. The system reports which flows contributed to the queue buildup and enables direct per-packet action in the data plane to prevent transient congestion. The system may be configured to analyze queuing in legacy network switches.
A method and system for centralized control of user devices is disclosed. The method for centralized control of user devices via universal IP services registrar includes receiving a request to register a user device for a plurality of services, registering the user device for the plurality of services by creating a user settings profile for the user for each of the plurality of services, receiving data from the plurality of registered services, and transmitting received data to the user device in accordance with the user profile.
In a 5G network, control unit (CU) can be connected to a radio access network controller (RC). In response to receiving measurement data from the CU, the RC can process the measurement data to determine polices and procedures related to radio resource management, and/or radio resource control, which can then be utilized to manage mobility, dual-connectivity, carrier aggregation, and/or integrated access and backhaul topology formation and routing. The measurement data provided by the CU can be provided directly to the RC without processing of the measurement data by the CU.
A processing system including at least one processor may capture a video of a preparation area for a consumable item, may identify at least one item in the video, the at least one item comprising at least one of: at least one ingredient of the consumable item, or at least one tool for preparing the consumable item, and may identify annotation content for the at least one item. The processing system may then modify the video to generate a modified video that includes a visual marker associated with the annotation content and present the modified video via a device associated with a user to be served the consumable item.
G06V 20/20 - ScenesScene-specific elements in augmented reality scenes
G06F 3/0481 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
G06F 40/169 - Annotation, e.g. comment data or footnotes
G06K 7/10 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation
G06K 19/06 - Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips