An apparatus comprises a memory and a processor communicatively coupled to one another. The memory may be configured to store existing configuration commands instructing execution of one or more operations. The processor may be configured to collect dynamic banner data from one or more interfaces. The dynamic banner data may be representative of multiple existing operations performed by the one or more interfaces. Further, the processor may be configured to generate a plurality of dynamic configuration commands based at least in part upon the dynamic banner data. The dynamic configuration commands may be updates to the existing configuration commands. The processor may be configured to generate multiple suggestions to perform one or more suggested operations based on the dynamic configuration commands, and present the suggestions in a dynamic banner via the one or more interfaces.
A method may include providing an amount of first data and increasing the amount of first data until a first network component fails. The method may include determining first failure data associated with the failure of the first network component. The method may include providing an amount of second data and increasing the amount of second data until a second network component fail. The method may include determining second failure data associated with the failure of the second network component. The method may include generating synthetic data. The method may include providing the synthetic data such that one or more network components fail. The method may include determining third failure data associated with the failure of the network component and the synthetic data. The method may include generating the network parameters based at least in part on the third failure data.
DISH Network Technologies India Private Limited (India)
Inventor
Arora, Ankesh
Shahdad, Mohammad Dawood
Plunkett, Kevin Joseph
Abstract
A system to distinguish internal network routing issues within a user plane function (UPF) from external routing issues via multi-domain system (DNS) servers probing is disclosed. The system determines latency in communication between a given UPF and each of a plurality of DNS servers. The system compares each latency with a threshold latency value. If it is determined that each of the latencies in communication between the UPF and each DNS server is more than the threshold latency values, the system may determine that there is an internal network routing issue at the UPF that caused the high latencies. If it is determined that a latency in communication between the UPF and a particular DNS server is more than the threshold latency value, the system may determine that the latency is caused by a network routing issue at the particular DNS server—which is external to the UPF.
An apparatus comprises a memory and a processor communicatively coupled to one another. The memory may be configured to store multiple existing configuration commands instructing execution of one or more operations. The processor may be configured to perform multiple existing operations in accordance with the existing configuration commands, collect dynamic notification data from one or more interfaces configured to perform the existing operations, generate multiple dynamic configuration commands based on the dynamic notification data, and compare the dynamic configuration commands to the existing configuration commands. Further, the processor is configured to determine whether the dynamic configuration commands comprise commands that are different from those comprised in the plurality of existing configuration commands, generate at least one suggestion to perform multiple suggested operations based on dynamic configuration commands, and present the at least one suggestion in a dynamic notification via the one or more interfaces.
G06F 16/583 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
Embodiments are directed towards embodiments are directed toward systems and methods for user plane function (UPF) and network slice load balancing within a 5G network. Example embodiments include systems and methods for load balancing based on current UPF load and thresholds that depend on UPF capacity; UPF load balancing using predicted throughput of new UE on the network based on network data analytics; UPF load balancing based on special considerations for low latency traffic; UPF load balancing supporting multiple slices, maintaining several load-thresholds for each UPF and each slice depending on the UPF and network slice capacity; and UPF load balancing using predicted central processing unit (CPU) utilization and/or predicted memory utilization of new UE on the network based on network data analytics.
H04W 72/52 - Allocation or scheduling criteria for wireless resources based on load
H04W 28/084 - Load balancing or load distribution among network function virtualisation [NFV] entitiesLoad balancing or load distribution among edge computing entities, e.g. multi-access edge computing
An intelligent simultaneous core that provides coordination between private core(s) and public core(s) (i.e., carrier core(s)) to improve network throughput and efficiency is disclosed. Both the private core(s) and the public core(s) may be configured for and facilitate 5G communications. Network procedures and protocols may intelligently divide processing throughput based on factors such as capacity, bit rate, etc. When only a particular data throughput can be supported, for example, a simultaneous core connection can be utilized.
An intelligent simultaneous core that provides coordination between private core(s) and public core(s) (i.e., carrier core(s)) to improve network throughput and efficiency is disclosed. Both the private core(s) and the public core(s) may be configured for and facilitate 5G communications. Network procedures and protocols may intelligently divide processing throughput based on factors such as capacity, bit rate, etc. When only a particular data throughput can be supported, for example, a simultaneous core connection can be utilized.
A method is disclosed for facilitating work-related tasks on a device with a Subscriber Identity Module (SIM). The method includes providing a work profile to access work-related tasks over a work network; retrieving identity data from the SIM; verifying the device based on the identity data; enabling, after a successful verification of the device, access to the work network via a SIM network associated with the identity data; and activating, after the successful verification, the work profile. This method provides a secure way to manage work profiles on devices, ensuring that only authorized users can access work-related resources and enhancing productivity in a work environment.
A method may include accessing data associated with a failure of a 5G network component. The method may include providing the data associated with the failure of the 5G network component to a first machine learning model, configured to determine and output data indicating a root cause of the failure. The method may include providing data indicating the root cause of the failure to a second machine learning model, configured to determine and output data indicating one or more service providers and respective destinations associated with the root cause. The method may include generating a service ticket may include data indicating the root cause and the respective destinations associated with the root cause. The method may include transmitting the service ticket to the respective destinations of the one or more service providers associated with the root cause of the failure.
H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance
A method for selecting a secondary cell in a wireless communication system for carrier aggregation includes providing at least one parameter for each secondary cell in a plurality of secondary cells that indicates a connection priority for each secondary cell and transmitting a set of parameters for each secondary cell to a UE. The set of parameters for each secondary cell includes the parameter indicating a connection priority for the secondary cell. The method further includes receiving a request from the UE to connect with a secondary cell selected based on the parameter indicating a connection priority for the secondary cell, connecting the selected secondary cell to the UE, and transmitting data to the UE using a primary cell and the selected secondary cell.
A method for selecting a secondary cell in a wireless communication system for carrier aggregation includes providing at least one parameter for each secondary cell in a plurality of secondary cells that indicates a connection priority for each secondary cell and transmitting a set of parameters for each secondary cell to a UE. The set of parameters for each secondary cell includes the parameter indicating a connection priority for the secondary cell. The method further includes receiving a request from the UE to connect with a secondary cell selected based on the parameter indicating a connection priority for the secondary cell, connecting the selected secondary cell to the UE, and transmitting data to the UE using a primary cell and the selected secondary cell.
H04W 36/28 - Reselection being triggered by specific parameters by agreed or negotiated communication parameters involving a plurality of connections, e.g. multi-call or multi-bearer connections
H04W 36/30 - Reselection being triggered by specific parameters by measured or perceived connection quality data
H04W 36/32 - Reselection being triggered by specific parameters by location or mobility data, e.g. speed data
H04W 36/36 - Reselection control by user or terminal equipment
A tiered simultaneous core that uses private core(s) and carrier (public) core(s) in coordination with one another is disclosed. The system can use network capabilities and intelligently select how to use one or more private cores and one or more public cores together, coordinating between the networks using tiered use. In other words, use of the private core(s) and the public core(s) is divided into tiers. These tiers may be associated with a user or entity (e.g., a corporation, a government organization, etc.), an application, a type of data transfer, a priority, etc.
Systems and method dynamically determine provisioning of networking services. A service area is serviced by a first user plane function (UPF) as a primary service area and by a second UPF as a secondary service area. A request is received from a user equipment to connect to a network, and a location of the user equipment is identified. Determination is made whether the location is in the first service area. A first load of the first UPF is determined. In response to the first load not exceeding a load threshold value, the user equipment is connected to the first UPF. In response to the first load exceeding the load threshold value, the user equipment is connected to the second UPF when a second load thereof does not exceed the first load or to the first UPF when the second load exceeds the first load.
A tiered simultaneous core that uses private core(s) and carrier (public) core(s) in coordination with one another is disclosed. The system can use network capabilities and intelligently select how to use one or more private cores and one or more public cores together, coordinating between the networks using tiered use. In other words, use of the private core(s) and the public core(s) is divided into tiers. These tiers may be associated with a user or entity (e.g., a corporation, a government organization, etc.), an application, a type of data transfer, a priority, etc.
A method may include accessing event data corresponding to an event affecting a region covered by a 5G network including a plurality of network components. The method may include accessing user data corresponding to a user equipment within the region covered by the 5G network. The method may include generating, using a machine learning model, an expected network load. The method may include accessing, a dynamic threshold associated with the 5G network. The dynamic threshold may include one or more limits associated with the plurality of network components. The method may include determining that the expected network load will cause the 5G network to exceed at least one limit of the dynamic threshold. In response to determining that the expected network load will exceed the limit, the method may include generating a new network component in the 5G network based at least in part on the expected network load.
A wireless device includes a transceiver, sensing circuitry, and an electronic processor. The transceiver receives electromagnetic wave signals emitted wirelessly from a plurality of cells. The sensing circuitry measures a signal from a source cell to obtain a signal to interference and noise ratio (SINR) and a received signal reference power (RSRP) for the signal. When the transceiver receives a reconfiguration message from the source cell during a time span, the electronic processor controls a legacy handover that shifts communication with the transceiver from the source cell to the target cell. When a conditional handover state exists, the electronic processor controls a conditional handover that shifts communication with the transceiver from the source cell to the target cell. The conditional handover state includes an absence of the legacy handover, the RSRP being below an RSRP threshold and the SINR below an SINR threshold.
Various example embodiments are directed a system that electronically discovers a plurality of current network components of an existing wireless network and relationships between the plurality network components. This is performed based on starting at a first network component and electronically continuously crawling through the wireless network via discovering and following links between the plurality of network components in real time. The system generates and then updates metadata describing a snapshot of a current network topology of the wireless network based on the continuous electronic discovery of the plurality of current network components of the existing wireless network and relationships between the plurality network components.
Various example embodiments are directed a system that electronically discovers a plurality of current network components of an existing wireless network and relationships between the plurality network components. This is performed based on starting at a first network component and electronically continuously crawling through the wireless network via discovering and following links between the plurality of network components in real time. The system generates and then updates metadata describing a snapshot of a current network topology of the wireless network based on the continuous electronic discovery of the plurality of current network components of the existing wireless network and relationships between the plurality network components.
H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
H04L 41/0853 - Retrieval of network configurationTracking network configuration history by actively collecting configuration information or by backing up configuration information
H04L 41/12 - Discovery or management of network topologies
H04L 41/22 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
H04L 43/045 - Processing captured monitoring data, e.g. for logfile generation for graphical visualisation of monitoring data
H04L 43/08 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
19.
FLEXIBLE MODEL TO PROVISION WIRELESS COMMUNICATION SERVICES IN PRIMARY AND SECONDARY USER PLANE FUNCTION TRACKING AREAS
Systems and method dynamically determine provisioning of networking services. A service area is serviced by a first user plane function (UPF) as a primary service area and by a second UPF as a secondary service area. A request is received from a user equipment to connect to a network, and a location of the user equipment is identified. Determination is made whether the location is in the first service area. A first load of the first UPF is determined. In response to the first load not exceeding a load threshold value, the user equipment is connected to the first UPF. In response to the first load exceeding the load threshold value, the user equipment is connected to the second UPF when a second load thereof does not exceed the first load or to the first UPF when the second load exceeds the first load.
An apparatus comprises a memory and a processor communicatively coupled to one another. The memory may be configured to store one or more data exchange operations and one or more reporting operations. The processor may be configured to identify a recipient configured to receive a report, and match the recipient to entitlements in a service directory. The entitlements indicating data object information for a data object associated with the recipient. Further, the processor is configured to obtain a category information associated with the recipient. The category information indicating that the recipient is part of an affinity group. The processor may be configured to determine a data object modification for the data object information based at least in part upon the category information, generate the report comprising the entitlements and the data object modification, and generate the report comprising the entitlements and the data object modification.
A method may include receiving request data associated with a service, the request data in a first format. The method may also include determining an endpoint of the service and a second format associated with the service. The method may include generating a service request based at least in part on the request data, the service request in the second format. The method may then include providing the service request in the second format to an orchestrator. The method may include transmitting, by the orchestrator, the service request to the endpoint of the service. The method may include receiving, by the orchestrator, response data from the service, the response data based at least in part on the service request. The method may include generating, by the orchestrator, a response based at least in part on the response data. The method may include providing, by orchestrator, the response to the user.
H04L 67/60 - Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
Technologies for facilitating APIs for microservices associated with a communications network are disclosed. An example method includes receiving a request to a target API exposed by an API platform, and invoking a combination of API governance modules corresponding to the target API and selected from API governance modules implemented remotely from the API platform, to map the request to microservices. The microservices include internal microservice(s) maintained within the communications network and external microservice(s) maintained externally to the communications network. The method also includes applying API governance policies indicated by the combination of API governance modules to validate interactions with the external microservice(s) based on the request and generating and sending a response to the request.
H04L 41/5009 - Determining service level performance parameters or violations of service level contracts, e.g. violations of agreed response time or mean time between failures [MTBF]
23.
RESOLVING TN/NTN SPECTRUM OVERLAP BY ASSIGNMENT OF BANDWIDTH PARTS TO GEOGRAPHIC AREAS
Methods and systems for operating a Non-Terrestrial Network (NTN) within neighboring geographic areas, and where a Terrestrial Network (TN) is also operating in at least one of the areas. A set of two or more candidate Bandwidth Parts (BWPs) are selected for use by the NTN from spectrum allocated for use by the NTN which does not overlap with the channels used by the TN. The two or more BWPs may each specify a contiguous set of frequencies and timeslots. One of the candidate BWPs is assigned for use by the NTN as an active BWP in a first one of the neighboring geographic areas; and one candidate BWPs is also assigned for use by the UEs as an active BWP in a second one of the neighboring geographic areas.
A mobile device is configured for use with selected mobile services and performs operations including receiving a request to use a given selected mobile service (SMS) which facilitates virtualization of an application program, first identifying and retrieving mobile application data (MAD) associated with the SMS from a first data store and receiving the SMS. A server provides the SMS to the mobile device and the SMS provides at least one feature of the application program to a first user. The MAD facilitates providing of the SMS on the mobile device and the SMS facilitates providing of features of the application program without having the mobile device download and execute the application program. The operations may include communicatively coupling the mobile device with a wireless component (WC) which communicatively couples the mobile device with the server and first authenticating, with the WC, a subscriber identity module (SIM) for the mobile device.
Spectrum and radio resources associated with a 5G radio unit (RU) of a host network are dynamically allocated amongst one or more guest networks. A provisioning plane receives inputs from a guest network operator that identifies desired times, locations and/or frequency bands for desired network coverage. The provisioning plane responsively identifies bandwidth allocations that meet the requested parameters for exclusive use by the guest network. User equipment (UE) associated with each guest network maintains time and frequency synchronization with the host network, but otherwise limits its communications to the frequency bands allocated to the guest network. By dynamically obtaining physical radio and spectrum resources from a host provider and by scaling backend network capabilities using cloud resources, guest networks for any number of different purposes can be quickly deployed or modified as desired.
Systems, methods, and machine-readable media may facilitate one or a combination of the following. A software change operation within a deployment pipeline for testing and deploying a software change to a production computing service may be processed. The software change operation may be identified as corresponding to a software change with the deployment pipeline, where the software change may be identified as being configured to make a pipeline change to a configuration of the deployment pipeline itself. Responsive to the identifying, a regression suite configured to run a plurality of test applications on the deployment pipeline to test the deployment pipeline with respect to the software change may be invoked, and the plurality of test applications may be run with the software change. The running the plurality of test applications may include simulating pipeline runs with a plurality of use cases.
Methods and systems for operating a Non-Terrestrial Network (NTN) within neighboring geographic areas, and where a Terrestrial Network (TN) is also operating in at least one of the areas. A set of two or more candidate Bandwidth Parts (BWPs) are selected for use by the NTN from spectrum allocated for use by the NTN which does not overlap with the channels used by the TN. The two or more BWPs may each specify a contiguous set of frequencies and timeslots. One of the candidate BWPs is assigned for use by the NTN as an active BWP in a first one of the neighboring geographic areas; and one candidate BWPs is also assigned for use by the UEs as an active BWP in a second one of the neighboring geographic areas.
A method may include receiving request data associated with a service, the request data in a first format. The method may also include determining an endpoint of the service and a second format associated with the service. The method may include generating a service request based at least in part on the request data, the service request in the second format. The method may then include providing the service request in the second format to an orchestrator. The method may include transmitting, by the orchestrator, the service request to the endpoint of the service. The method may include receiving, by the orchestrator, response data from the service, the response data based at least in part on the service request. The method may include generating, by the orchestrator, a response based at least in part on the response data. The method may include providing, by orchestrator, the response to the user.
H04L 67/565 - Conversion or adaptation of application format or content
H04L 67/567 - Integrating service provisioning from a plurality of service providers
H04L 67/60 - Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
29.
AI DRIVEN 5G NETWORK AND SERVICE MANAGEMENT SOLUTION
Methods and apparatuses for improving wireless network performance and efficiency by dynamically configuring network selection and session management functions within a wireless networking environment are described. In some cases, a network and service management system within the wireless networking environment may perform adjustments to the configuration of network slices and protocol data unit (PDU) sessions associated with user equipment (UE) devices utilizing network services provided by the wireless networking environment. The network and service management system may utilize machine learning techniques to provide real-time selection and reconfiguration of network slices and PDU sessions running within the wireless networking environment.
H04L 41/5009 - Determining service level performance parameters or violations of service level contracts, e.g. violations of agreed response time or mean time between failures [MTBF]
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
H04L 41/5025 - Ensuring fulfilment of SLA by proactively reacting to service quality change, e.g. by reconfiguration after service quality degradation or upgrade
30.
ACCELERATING SOFTWARE CHANGE REQUESTS IN DEPLOYMENT PIPELINES
Systems, machine-readable media, and methods may facilitate accelerating software change requests in deployment pipelines. Operations of a deployment pipeline for testing and deploying a software change may be monitored, the operations corresponding to a set of input requirements for testing and deploying the software change. Data composites may be collected. The data composites may be created and may include pipeline information associated with operations of the deployment pipeline. Rules corresponding to software change request protocols may be learned and may define mappings of the data composites to requirements pertaining to software change request operations of the deployment pipeline. Input required for a software change request may be decreased based on the learning so that the input required for the software change request conforms to a subset of the set of input requirements.
A method for performance testing connections between a public cloud and a cellular node includes selecting a test node and a peer node for testing from candidate nodes, wherein the candidate nodes include nodes of a public network and nodes of a cellular network; establishing a connection between a testing agent on the test node and a peer testing agent on the peer node; and collecting Key Performance Indicators (KPIs) for a network path between the testing agent and the peer testing agent, wherein the network path between the test node and the peer node traverses a cloud network. This method enables efficient and accurate performance testing of connections between a public cloud and a cellular node, facilitating the optimization of network performance and reliability.
An apparatus comprises a memory and a processor communicatively coupled to one another. The memory may be configured to store a data lake and multiple existing spectrum administration service (SAS) configuration commands. The processor may be configured to perform first SAS operations in accordance with the existing SAS configuration commands, collect multiple channel parameters from one or more communication channels configured to provide connectivity between user equipment and a core network, store the channel parameters in the data lake, monitor the channel parameters in the data lake, and generate optimized SAS configuration commands based at least in part upon the channel parameters. Further, the processor is configured to compare the optimized SAS configuration commands to the existing SAS configuration commands and perform second SAS operations in accordance with the optimized SAS configuration commands.
H04L 41/40 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities
33.
FLEXIBLE MODEL TO PROVISION WIRELESS COMMUNICATION SERVICES IN OVERLAPPING USER PLANE FUNCTION TRACKING AREAS
Systems and method are directed towards dynamically determining how to provision networking services. First and second user plane functions are initialized for first and second service areas, respectively. The second service area and the first service area share an overlap area. A request is received from a user equipment to connect to a network, and a location of the user equipment is identified. Determination is made whether the location is in the overlap area. In response to the location being in the overlap area, a first load of the first user plane function and a second load of the second user plane function are determined. In response to the first load exceeding the second load, the user equipment is connected to the second user plane function. In response to the second load exceeding the first load, the user equipment is connected to the first user plane function.
Systems and method are directed towards dynamically determining how to provision networking services. First and second user plane functions are initialized for first and second service areas, respectively. The second service area and the first service area share an overlap area. A request is received from a user equipment to connect to a network, and a location of the user equipment is identified. Determination is made whether the location is in the overlap area. In response to the location being in the overlap area, a first load of the first user plane function and a second load of the second user plane function are determined. In response to the first load exceeding the second load, the user equipment is connected to the second user plane function. In response to the second load exceeding the first load, the user equipment is connected to the first user plane function.
A method for performing a software update that reduces down time in a Radio Access Network (RAN) is disclosed. A first computing device receives first Distributed Unit (DU) configuration information including an address of a first radio unit (RU) device. The first computing device cause the first RU device to stores an address of the first computing device as a value of a configuration parameter. After a second computing device installs software, the second computing device receives the first DU configuration information including the address of the first RU device. The first computing device receives an instruction to stop data transmission to the first RU device. The second computing device causes the first RU device stores an address of the second computing device as the value of the configuration parameter. The second computing device receives an instruction to start data transmission to the first RU device.
Embodiments are directed towards systems and methods for managing user experiences during cellular telecommunication outages within a wireless telecommunication network, such as a wireless 5G network. Example embodiments include systems and methods managing user experiences during a cellular telecommunication network outage utilizing a backup data center. For example, in response to the distributed unit (DU) detecting there exists the failure in communication between the DU and the corresponding primary centralized unit control plane (CU-CP), the system causes the DU to switch from using the corresponding primary CU-CP to using the secondary CU-CP of a secondary CU hosted on the backup cloud-native virtualized compute instance based on utilizing a secondary ID pre-configured on the DU.
Automated navigation systems and methods are provided. An example method includes receiving a request for automated navigation service from an autonomous vehicle, the request including vehicle information and a destination of the autonomous vehicle. The method further includes receiving continuously real-time location and position measurements data from the autonomous vehicle, determining a virtual zone centered around the autonomous vehicle, identifying nearby vehicles proximate to the autonomous vehicles within the virtual zone, receiving continuously real-time location and position measurements data of the identified nearby vehicles, obtaining and updating real-time traffic environment data of the traffic environment, generating an optimal route segment for the autonomous vehicle in the virtual zone, and transmitting an instruction to the autonomous vehicle for guiding the autonomous vehicle to adjust operational parameters comply with the optimal route segment.
A method for determining how long to store data in a data lake is disclosed. The travel data associated with a mobile device is received via cellular towers. The travel data is determined as to whether it meets a threshold associated with unusual behavior for a user of the mobile device. In response to determining that the travel data meeting or exceeding the unusual behavior threshold, the travel data is stored for long term storage which may be greater than a predetermined time length associated with short term storage.
An apparatus comprises a memory and a processor communicatively coupled to one another. The memory may be configured to store a data lake and multiple existing spectrum administration service (SAS) configuration commands. The processor may be configured to perform first SAS operations in accordance with the existing SAS configuration commands, collect multiple channel parameters from one or more communication channels configured to provide connectivity between user equipment and a core network, store the channel parameters in the data lake, monitor the channel parameters in the data lake, and generate optimized SAS configuration commands based at least in part upon the channel parameters. Further, the processor is configured to compare the optimized SAS configuration commands to the existing SAS configuration commands and perform second SAS operations in accordance with the optimized SAS configuration commands.
A method for determining how long to store data in a data lake is disclosed. The travel data associated with a mobile device is received via cellular towers. The travel data is determined as to whether it meets a threshold associated with unusual behavior for a user of the mobile device. In response to determining that the travel data meeting or exceeding the unusual behavior threshold, the travel data is stored for long term storage which may be greater than a predetermined time length associated with short term storage.
A disclosed method may include (i) initiating a cellular field testing tool that tests a condition of cellular network connectivity of a device under test, (ii) checking, prior to starting a specific test of the cellular field testing tool, whether each precondition in a set of preconditions is satisfied, and (iii) preventing the cellular field testing tool from starting the specific test until each precondition in the set of preconditions is satisfied. Related systems and computer-readable mediums are further disclosed.
In order to operate and maintain a wireless network system in a building that includes a 5G network and a Wi-Fi network, the master node captures location data and measurement data reported by one or more mobile devices. The master node then uses the location data and the measurement data reported by the one or more mobile devices and measurement data captured by the master node to optimize network performance, and adjusts one or more parameters within the wireless network system.
Enhancing cybersecurity protection during data packet transportation. This involves selecting transport paths differing by a respective modality with one or more processors and associating a plurality of bins, each with a respective modality of a respective transport path. The data packets are split into packets of the bins and formatted based on the associated modality. The respective data packets of each of the bins are transported with the respective transport path of the transport paths. The count of the transport paths is greater than one.
System and method for selecting location data to be used as the location of a user device using a location-based service. Horizontal location data and vertical location data for the user device are obtained from multiple sources. A horizontal location uncertainty and a vertical location uncertainty are determined or obtained for each source. In response to determining that both the horizontal location uncertainty meets a threshold horizontal uncertainty value and the vertical location uncertainty meets a threshold vertical uncertainty value, the corresponding source is identified as compliant. In response to identifying at least one compliant source, an optimum compliant source is selected to provide as the location of the user device using the location-based service.
System and method for selecting location data to be used as the location of a user device using a location-based service. Horizontal location data and vertical location data for the user device are obtained from multiple sources. A horizontal location uncertainty and a vertical location uncertainty are determined or obtained for each source. In response to determining that both the horizontal location uncertainty meets a threshold horizontal uncertainty value and the vertical location uncertainty meets a threshold vertical uncertainty value, the corresponding source is identified as compliant. In response to identifying no compliant sources, a lowest horizontal location uncertainty and a lowest vertical location uncertainty are selected from among the plurality of sources.
Methods, systems, and apparatus, including computer programs encoded on computer-storage media, for improved network computing for network function testing. In some implementations, a method includes providing an application programming interface (API) to a user device of a network computing system; receiving input data from the user device indicating one or more application requirements for testing one or more network functions; generating one or more virtual processing machines using the one or more application requirements; obtaining testing data from one or more communication networks; providing the testing data to the one or more virtual processing machines configured to generate results based on processing the testing data using the one or more network functions; and providing the results to the user device.
H04L 41/0895 - Configuration of virtualised networks or elements, e.g. virtualised network function or OpenFlow elements
H04L 41/0897 - Bandwidth or capacity management, i.e. automatically increasing or decreasing capacities by horizontal or vertical scaling of resources, or by migrating entities, e.g. virtual resources or entities
System and method for selecting location data to be used as the location of a user device using a location-based service. Horizontal location data and vertical location data for the user device are obtained from multiple sources. A horizontal location uncertainty and a vertical location uncertainty are determined or obtained for each source. In response to determining that both the horizontal location uncertainty meets a threshold horizontal uncertainty value and the vertical location uncertainty meets a threshold vertical uncertainty value, the corresponding source is identified as compliant. In response to identifying no compliant sources, a lowest horizontal location uncertainty and a lowest vertical location uncertainty are selected from among the plurality of sources.
H04W 4/02 - Services making use of location information
H04L 67/52 - Network services specially adapted for the location of the user terminal
G01S 5/02 - Position-fixing by co-ordinating two or more direction or position-line determinationsPosition-fixing by co-ordinating two or more distance determinations using radio waves
G01S 1/02 - Beacons or beacon systems transmitting signals having a characteristic or characteristics capable of being detected by non-directional receivers and defining directions, positions, or position lines fixed relatively to the beacon transmittersReceivers co-operating therewith using radio waves
G01S 3/02 - Direction-finders for determining the direction from which infrasonic, sonic, ultrasonic, or electromagnetic waves, or particle emission, not having a directional significance, are being received using radio waves
48.
DYNAMIC SELECTION OF LOCATION DATA FROM MULTIPLE SOURCES FOR USER DEVICE LOCATION DETECTION FOR LOCATION-BASED SERVICES USING ALTERNATIVE UNCERTAINTY THRESHOLDS
System and method for selecting location data to be used as the location of a user device using a location-based service. Horizontal location data and vertical location data for the user device are obtained from multiple sources. A horizontal location uncertainty and a vertical location uncertainty are determined or obtained for each source. In response to determining that both the horizontal location uncertainty meets a threshold horizontal uncertainty value and the vertical location uncertainty meets a threshold vertical uncertainty value, the corresponding source is identified as compliant. If there are no compliant sources, then alternative threshold horizontal uncertainty value or alternative threshold vertical uncertainty value are selected and used to determine if a source is compliant by meeting the alternative thresholds. In response to identifying at least one compliant source, an optimum compliant source is selected to provide as the location of the user device using the location-based service.
A system and method for performing a Random Access Channel (RACH) procedure is provided. The method includes configuring a plurality of Bandwidths Parts (BWPs) to one or more Physical Random Access Channel (PRACH) occasions mapped to a public land mobile network identification (PLMN-ID) of a set of different PLMN-IDs, each different PLMN-ID is assigned with at least one operator of a set of operators; assigning each PRACH occasion within an uplink (UL) transmission wherein each PRACH occasion is allocated by the host operator to at least one operator; separating each PRACH occasion of a set of PRACH occasions based on each PLMN-ID of the set of PLMN-IDs; and enabling a User Equipment (UE) operating at a cell site of the RACH procedure via at least one PRACH occasion allocated by the host operator based on the PLMN-ID that has been mapped to subscribers for at least one operator.
Methods, systems, and apparatus, including computer programs encoded on computer-storage media, for improved network computing for network function testing. In some implementations, a method includes providing an application programming interface (API) to a user device of a network computing system; receiving input data from the user device indicating one or more application requirements for testing one or more network functions; generating one or more virtual processing machines using the one or more application requirements; obtaining testing data from one or more communication networks; providing the testing data to the one or more virtual processing machines configured to generate results based on processing the testing data using the one or more network functions; and providing the results to the user device.
H04L 43/20 - Arrangements for monitoring or testing data switching networks the monitoring system or the monitored elements being virtualised, abstracted or software-defined entities, e.g. SDN or NFV
51.
DYNAMIC ALLOCATION AND USE OF PROCESSING RESOURCES
According to the present disclosure various network functions are dynamically instantiated on a selected data center to utilize the most efficient and rapid resources available. An analytic module and a data lake receive performance data from the various data centers of a cellular network, such as a Regional Data Center, a National Data Center and an Edge Data Center. The analytic module will analyze the received performance data and apply artificial intelligence and machine learning to determine current resource use and estimate future resources available on various data centers of the cellular network. The appropriate data center is then selected to perform a particular network function.
G06F 11/36 - Prevention of errors by analysis, debugging or testing of software
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
H04L 43/08 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
H04L 67/1031 - Controlling of the operation of servers by a load balancer, e.g. adding or removing servers that serve requests
H04W 24/04 - Arrangements for maintaining operational condition
Systems and methods for facilitating inter-network handover of a communication with a call center are provided. In one example, a computer-implemented method includes: receiving, at a first network from a second network, information indicating a location of a user device, detecting, at the first network, presence or absence of an active connection between the user device and a call center designated to the first network, obtaining, at the first network, the location of the user device from the received information, in response to the detection of the presence of the active connection, and transmitting the information indicating the location to a location database in communication to the call center.
A location of a mobile phone in a cellular network is determined when the mobile phone has been turned off, placed in airplane mode, inactive mode or in idle mode. A first cell of interest and times of interest is received, and a location determination server in communication with the cellular network requests call data records (CDRs) associated with the first cell of interest and the times of interest. The location determination server receives the requested CDRs and determines possible locations of the mobile phone at the times of interest when the mobile phone antenna is powered off, airplane mode, idle or inactive using the received CDRs.
A cellular network system includes a multi-core network having core slices, at least one cell site, and a network exposure layer. The cell sites are configured to receive communications from a plurality of tenants. The network exposure layer is configured to receive, through the cell site(s), a plurality of requests for bandwidth from an application programming interface (API) of the plurality of tenants. One of the requests includes a first request from a first API of a first tenant. In response to the first tenant being determined to be authenticated using information from the first request, a first core slice is determined to be associated with the first tenant. Data transfers are then provided between the first tenant and the first core slice in response to determining that the first core slice is associated with the first tenant and the first tenant being authenticated.
A method for generating a digital twin of a radio network (RN) is disclosed that includes accessing, by one or more processing devices, a digital twin representation (DTR) of the RN, the RN including a plurality of nodes configured to enable communications between wireless user equipments (UEs), the DTR including virtual representations of the plurality of nodes and the interconnections. Using a trained machine learning (ML) model, a subset of the DTR is identified, the subset being representative of operating conditions for a particular time range. The method includes determining, by the processing devices via monitoring parameters of the subset of the DTR, that at least one of the operating conditions of the RN is outside of an expected range. In response to determining that the operating conditions of the RN is outside of the expected range, generating an output signal is generated indicative of a condition of the RN.
A session change over system monitors nodes to determine whether they are operational, and transfers user equipment from one node to another when nodes are not operational. The session change over system receives one or more health check messages from one or more foreign nodes which communicate with user equipment. The session change over system inspects each health check message to determine whether a foreign node is not operational. The session change over system identifies user equipment in communication with the foreign node at a time before the foreign node was not operational. The session change over system communicates with the identified user equipment in place of the foreign node.
H04L 69/40 - Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass for recovering from a failure of a protocol instance or entity, e.g. service redundancy protocols, protocol state redundancy or protocol service redirection
A cellular network system includes a multi-core network having core slices, at least one cell site, and a network exposure layer. The cell sites are configured to receive communications from a plurality of tenants. The network exposure layer is configured to receive, through the cell site(s), a plurality of requests for bandwidth from an application programming interface (API) of the plurality of tenants. One of the requests includes a first request from a first API of a first tenant. In response to the first tenant being determined to be authenticated using information from the first request, a first core slice is determined to be associated with the first tenant. Data transfers are then provided between the first tenant and the first core slice in response to determining that the first core slice is associated with the first tenant and the first tenant being authenticated.
SYSTEMS AND METHODS FOR A MULTIPLE MESSAGING SERVICE MANAGEMENT (MMSM) GATEWAY SEPARATING DIFFERENT TYPES OF WIRELESS NETWORK TRAFFIC FOR LAW ENFORCEMENT INTERCEPTION
A Multiple Messaging Service Management (MMSM) gateway (e.g., a Short Message Peer-to-Peer (SMPP) gateway), when receiving SMS and Multimedia Message Service (MMS) communications, determines whether users sending or receiving such communications are subjects (i.e., targets) of a law enforcement agency data intercept request. The MMSM gateway electronically separates out of the communications voice data, text data, image data and/or video data from the communications. In response to determining that the user sending and/or the user receiving the communication is the subject of at least one of the law enforcement agency data intercept requests, the MMSM gateway sends the separated-out voice data, text data, image data and/or video data to one or more law enforcement agencies associated with the applicable law enforcement agency data intercept request. The MMSM gateway may send a separate feed to the law enforcement agency for the SMS traffic and for the MMS traffic.
Embodiments are directed towards systems and methods for downlink access control in a communications network. An example method includes a base station receiving a request for downlink (DL) communication with a user equipment (UE), and the base station performing the following actions without communicating with the UE regarding the request for the DL communication: determining an unavailability of a resource required for the DL communication; responsive to the determined unavailability, sending a rejection of the request; determining an availability of the resource; and responsive to the determined availability, sending an indication of the availability of the resource required for the DL communication.
Methods and apparatuses for improving telecommunications services by intelligently deploying redundant links within a data center hierarchy to satisfy latency, power, availability, and quality of service requirements are described. A data center hierarchy of a cellular network is established with a first data center layer, a second data center layer, and a third data center layer. A first redundant link is established between a first node in the first data center layer and a third node in the third data center layer. In response to detecting that a failure rate of the first data center layer exceeds a threshold failure rate, the first redundant link is removed and a second redundant link is added between the third node and a second node in the second data center layer.
H04L 1/22 - Arrangements for detecting or preventing errors in the information received using redundant apparatus to increase reliability
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
Systems, devices and methods for customer specific network slicing include a virtual network operator (VNO) server, a first node, and a virtualized network. The VNO server instantiates a solution manager engine which identifies a Solution, communicates the Solution to the first node, and upon acceptance of the Solution by the first node, instructs the virtualized network to couple the first node with a second node in accordance with the Solution. The virtualized network may include network function virtualization infrastructure and the Solution may include a slice of the virtualized network. The slice satisfies a Service Level Requirement (SLR), such as one that specifies a maximum latency for the slice. The SLR is specified in a Need received by the VNO server from the first node. The SLR is determined based upon an application program the first Node is at least one of currently executing and expected to later execute.
Methods and systems for scaling energy consumption in wireless network infrastructure, while retaining the ability to quickly scale when load changes. This end is accomplished by using containerized (or virtualized) applications to implement 5G core Network Functions, and utilizing network redundancy/geo-redundancy or a multihoming transport protocol for communication between these containerized (or virtualized) applications and other 5G system elements such as the network functions of the Radio Access Nodes (RANs) or the network functions of 5G Core. In particular, one or more core Network Functions (NFs) are instantiated as containerized applications executing on one or more virtualized hosts in a cloud-native orchestration environment. The containers are selectively activated or deactivated based on a demand for utilization of the associated NF. Because elements of the 5G RAN, 5G Core and one or more NFs are connected to one another via a protocol that supports network redundancy and/or geo-redundancy and/or multihoming, endpoint addressing need not be reconfigured when demand on the NFs changes.
H04L 41/0833 - Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability for reduction of network energy consumption
H04L 41/0897 - Bandwidth or capacity management, i.e. automatically increasing or decreasing capacities by horizontal or vertical scaling of resources, or by migrating entities, e.g. virtual resources or entities
63.
CELLULAR NETWORK HOSTED TELECOMMUNICATIONS RELAY SERVICES METHODS AND SYSTEMS
Various arrangements for providing cellular network hosted telecommunications relay services (TRS) are detailed herein. A piece of user equipment (UE) can be reassigned from a first slice of the cellular network to a second slice of the cellular network that provides TRS. In response to a voice call being initiated and the UE being assigned to the second slice, a TRS function hosted by the cellular network can be provided for the voice call.
A cellular network having radio access network (RAN) nodes where each RAN node includes (i) a central unit (CU) that resides on a public cloud of the cellular network, (ii) a distributed unit (DU) that resides on a private cloud of the cellular network such that the DU is in communication with the CU on the public cloud of the cellular network, and (iii) a radio unit (RU) under control of the DU. The cellular network also has network repository functions (NRFs) that are distributed on the cellular network and reside on at least the public cloud of the cellular network where the NRFs control operation of cell sites and local data centers (LDCs) on the cellular network. The network also has processors configured to control data collection edge applications residing with the NRFs that are distributed on the cellular network.
A method may include receiving, by a computing system of a front-end service provider, a communications request including user data. The method may include determining, by the computing system of the front-end service provider, that one or more back-end service providers can fulfil the communications request. The method may include transmitting, by the computing system of the front-end service provider, data associated with the communications request and/or the one or more back-end service providers to a proxy service. The method may include receiving, by the computing system of the front-end service provider and from the proxy service, information associated with a back-end service provider of the one or more back-end service providers. The method may also include establishing, by the computing system of the front-end service provider, a communications connection with the back-end service provider and transmitting the user data such that the communications request is fulfilled.
H04L 41/5006 - Creating or negotiating SLA contracts, guarantees or penalties
H04L 41/50 - Network service management, e.g. ensuring proper service fulfilment according to agreements
H04L 41/5009 - Determining service level performance parameters or violations of service level contracts, e.g. violations of agreed response time or mean time between failures [MTBF]
66.
DISTRIBUTED NETWORK STACK USING AN OVERLAY NETWORK
A mobile network operator may deploy a distributed network stack including, deploying a first cloud native function in a first public cloud and deploying a second cloud native function in a second public cloud. A system may provide a connected virtual private cloud. A system may deploy one or more virtual routers within the connected virtual private cloud. A system may connect the first public cloud and the second public cloud to the connected virtual private cloud using the one or more virtual routers in the connected virtual private cloud to form the overlay network. A system may transmit data traffic between the first cloud native function and the second cloud native function using the overlay network.
A connected streetlamp has live video feed zooming capabilities, Fifth Generation (5G) cellular wireless functionality, and traffic analytics capabilities using artificial intelligence (AI) and computer vision image recognition functionality built in to the monitoring device operably attached to or otherwise integrated with the streetlamp head. In other embodiments, the monitoring device may be located on or integrated with other parts of the streetlamp, or located on or integrated with a telephone poll, post, fence, building or other structure located alongside or near a street or road. A vehicle traffic monitoring system may include a plurality of multi-access edge computing (MEC) vehicle traffic monitoring devices each integrated in a respective connected streetlamp.
Various arrangements for dynamically adjusting physical resource block (PRB) usage on a cellular network are presented. An entity may be determined to be exercising its priority to spectrum overlapping PRBs used by the cellular network. A frequency band being used by the entity based on measuring the signal strengths of wireless transmission by the entity can be determined. Subcarriers of the PRBs are identified that overlap the frequency band. A predefined Physical Random Access Channel (PRACH) format can be selected based at least in part on the identified subcarriers. A predefined Physical Uplink Control Channel (PUCCH) format can be selected based at least in part on the identified plurality of subcarriers.
A disclosed method may include (i) building, based on telemetry data from an open radio access network, a machine learning model that predicts when a candidate distributed unit within the open radio access network will experience a failure, (ii) detect, by applying the machine learning model that predicts when the candidate distributed unit will shut down, that a specific distributed unit will experience a specific failure, and (iii) perform, in response to detecting that the specific distributed unit will experience the specific failure, a remedial action that addresses the specific failure. Related systems and computer-readable mediums are further disclosed.
H04W 24/04 - Arrangements for maintaining operational condition
H04L 41/0654 - Management of faults, events, alarms or notifications using network fault recovery
H04L 41/082 - Configuration setting characterised by the conditions triggering a change of settings the condition being updates or upgrades of network functionality
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
A disclosed method may include (i) building, based on telemetry data from an open radio access network, a machine learning model that predicts when a candidate distributed unit within the open radio access network will experience a failure, (ii) detect, by applying the machine learning model that predicts when the candidate distributed unit will shut down, that a specific distributed unit will experience a specific failure, and (iii) perform, in response to detecting that the specific distributed unit will experience the specific failure, a remedial action that addresses the specific failure. Related systems and computer-readable mediums are further disclosed.
H04W 24/02 - Arrangements for optimising operational condition
H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
H04L 41/0823 - Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
H04W 24/04 - Arrangements for maintaining operational condition
A system for deploying network functions into target cloud environments in a cellular telecommunication network is cloud computing service provider agnostic. The system may use target environment agnostic GUIs to collect network function and IP address information for the deployment of the network function. The system populates a template for deploying the network function based on the network function and IP address information as well as the identity of the target environment. The system builds and deploys the network functions in the target environment based on the template.
A connected streetlamp has live video feed zooming capabilities, Fifth Generation (5G) cellular wireless functionality, and traffic analytics capabilities using artificial intelligence (AI) and computer vision image recognition functionality built in to the monitoring device operably attached to or otherwise integrated with the streetlamp head. In other embodiments, the monitoring device may be located on or integrated with other parts of the streetlamp, or located on or integrated with a telephone pole, post, fence, building or other structure located alongside or near a street or road. A vehicle traffic monitoring system may include a plurality of multi-access edge computing (MEC) vehicle traffic monitoring devices each integrated in a respective connected streetlamp.
G08G 1/01 - Detecting movement of traffic to be counted or controlled
G08G 1/04 - Detecting movement of traffic to be counted or controlled using optical or ultrasonic detectors
H04N 23/69 - Control of means for changing angle of the field of view, e.g. optical zoom objectives or electronic zooming
H04W 4/38 - Services specially adapted for particular environments, situations or purposes for collecting sensor information
H04W 4/44 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]
73.
VEHICLE TRAFFIC MONITORING DEVICE SYSTEMS AND METHODS
A connected streetlamp has live video feed zooming capabilities, Fifth Generation (5G) cellular wireless functionality, and traffic analytics capabilities using artificial intelligence (AI) and computer vision image recognition functionality built in to the monitoring device operably attached to or otherwise integrated with the streetlamp head. In other embodiments, the monitoring device may be located on or integrated with other parts of the streetlamp, or located on or integrated with a telephone pole, post, fence, building or other structure located alongside or near a street or road. A vehicle traffic monitoring system may include a plurality of multi-access edge computing (MEC) vehicle traffic monitoring devices each integrated in a respective connected streetlamp.
Various systems and methods for cellular network slice management are presented. An application may be determined to be authorized to manage a cellular network slice utilized by the application for communication with user equipment. A request can be received from the application to modify the cellular network slice from the application. In response to the request, a parameter of the cellular network slice may be modified. The cellular network can then use the modified slice for communication with user equipment for the cloud-based application.
When a failed connection is detected from a first radio unit (RU) to the cellular site router (CSR), activation of an existing backup cabled connection from the first RU to the CSR through a cabled connection between the first RU and a second RU of the cellular telecommunications tower may be performed. In one example, a first RU and second RU each have two physical network ports. The activation of the existing backup cabled connection from the first RU, via the second RU, to the CSR may include causing the first RU to enter from a normal operating mode into an Open Radio Access Network (O-RAN) cascade operating mode to attempt to attain network connectivity for the first RU using the second physical network port of the first RU.
H04W 84/02 - Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
H04L 41/0654 - Management of faults, events, alarms or notifications using network fault recovery
H04L 61/5076 - Update or notification mechanisms, e.g. DynDNS
H04L 101/622 - Layer-2 addresses, e.g. medium access control [MAC] addresses
A disclosed method may include (i) implementing, within a cloud computing platform, a hierarchical quality-of-service policy that includes a parent quality-of-service sub-policy in relation to a child quality-of-service sub-policy, (ii) receiving telecommunication traffic as part of a cellular service platform implemented through the cloud computing platform, and (iii) applying, within the cloud computing platform, the hierarchical quality-of-service policy to the telecommunication traffic to satisfy a predetermined level of quality of service.
A disclosed method may include (i) building, based on telemetry data from an open radio access network, a machine learning model that predicts when a candidate distributed unit within the open radio access network will experience a failure, (ii) detect, by applying the machine learning model that predicts when the candidate distributed unit will shut down, that a specific distributed unit will experience a specific failure, and (iii) perform, in response to detecting that the specific distributed unit will experience the specific failure, a remedial action that addresses the specific failure. Related systems and computer-readable mediums are further disclosed.
H04W 24/04 - Arrangements for maintaining operational condition
H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
H04L 41/0654 - Management of faults, events, alarms or notifications using network fault recovery
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
DISH Network Technologies India Private Limited (India)
Inventor
Gu, Chris
Cuavas, Orlando
Srinivasan, Prakash
Abstract
In various embodiments, zero touch provisioning (ZTP) in a cloud based 5G system are provided. In some embodiments, the ZTP includes receiving a request to perform ZTP on the component in the 5G system; generating a ZTP request based on the request; obtaining a ZTP payload according to the ZTP request; determining one or more ZTP operations based on the ZTP payload; determining instances of the component in the 5G system for the ZTP operations; distributing the ZTP payload to the first and second instances of the component in the 5G system to carry out the ZTP operations; determining one or more results of the ZTP operations; generating feedback information based on the one or more results of the ZTP operations.
A mobile network operator may deploy a distributed network stack including, deploying a first cloud native function in a first public cloud and deploying a second cloud native function in a second public cloud. A system may provide a connected virtual private cloud. A system may deploy one or more virtual routers within the connected virtual private cloud. A system may connect the first public cloud and the second public cloud to the connected virtual private cloud using the one or more virtual routers in the connected virtual private cloud to form the overlay network. A system may transmit data traffic between the first cloud native function and the second cloud native function using the overlay network.
H04L 41/40 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities
H04L 45/586 - Association of routers of virtual routers
H04L 45/64 - Routing or path finding of packets in data switching networks using an overlay routing layer
Systems and methods are provided for offering tenants the ability to purchase commoditized network resources in a next-generation, large-scale wireless communication network (e.g., a 5G or 6G cellular network) according to dynamic pricing. For example, the network can update pricing of commoditized network resources intelligently and dynamically based on present and/or predicted supply and/or demand of the network resources. The updated pricing is offered to tenants on a periodic or other basis, and the tenants can decide whether to purchase more or less of those resources based on the updated pricing. The network can adjust resource allocations to the tenants based on the updated purchase decisions. The network can also automatically adjust QoS parameters for the tenants to fit within their purchased resource allocations.
Techniques for dynamically reducing cell site component power consumption are disclosed. A load associated with an antenna of a cell site of a cellular network is determined. The load is compared to a predetermined threshold. Whether the load is below the predetermined threshold is determined. In response to the load being determined to be below the predetermined threshold, electrical power for the antenna is reduced. in response to the load being determined to be above the predetermined threshold, electrical power for the antenna is maintained. Reducing the electrical power for the antenna may include turning off a power amplifier for the antenna, turning off an antenna port of a radio unit that communicates with the antenna or an antenna port thereof, etc.
Techniques for allocating cell site component capacity to conserve power are disclosed. Antenna ports of a radio unit are identified and a capacity for each antenna port is obtained. A throughput of a first antenna is obtained. A configuration for the first antenna is determined based on the throughput and the antenna port capacities. One or more antenna ports are selected, based on the capacities and the configuration for the first antenna, to allocate to the first antenna. The one or more antenna ports of the radio unit are then allocated to the first antenna. Antenna ports of the radio unit that are not allocated to the first antenna may be entered into a reduced-power state or allocated to a second antenna of the cell site.
A method for selecting one or more antennas disposed at a base station BS of a wireless communication system, where the method includes: transmitting, to one or more use equipment (UE), one or more initial synchronization signal blocks (SSB) and one or more initial channel state information-reference signals (CSI-RS) using a plurality of antenna ports, receiving, from the one or more UE, signals including at least one parameter indicative of corresponding operating conditions at the one or more UE in response to the transmitted one or more initial SSB and CSI-RS, selecting one or more antenna ports among the plurality of antenna ports based on the received at least one parameter, and performing downlink transmission using the selected one or more antenna ports.
H04B 7/06 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
H04L 5/00 - Arrangements affording multiple use of the transmission path
H04W 52/24 - TPC being performed according to specific parameters using SIR [Signal to Interference Ratio] or other wireless path parameters
84.
WIRELESS LOCAL AREA NETWORK EMERGENCY CALL LOCATION UPDATE
Various arrangements for handling a voice over Internet protocol (VoIP) emergency call are provided herein. A VoIP emergency call can be made to a designated emergency phone number from a user equipment (UE). During the VolP emergency call, location data can be obtained from a presence information data format location object (PIDF-LO) tag. The location data from the PIDF-LO tag can be compared with a registered location mapped to the UE. If determined that the location data indicates a location more than a threshold distance away from the registered location, a registered location update request can be transmitted to the UE.
A cellular network having radio access network (RAN) nodes where each RAN node includes (i) a central unit (CU) that resides on a public cloud of the cellular network, (ii) a distributed unit (DU) that resides on a private cloud of the cellular network such that the DU is in communication with the CU on the public cloud of the cellular network, and (iii) a radio unit (RU) under control of the DU. The cellular network also has network repository functions (NRFs) that are distributed on the cellular network and reside on at least the public cloud of the cellular network where the NRFs control operation of cell sites and local data centers (LDCs) on the cellular network. The network also has processors configured to control data collection edge applications residing with the NRFs that are distributed on the cellular network.
H04L 41/08 - Configuration management of networks or network elements
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
H04L 43/08 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
H04L 41/40 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities
86.
WIRELESS COMMUNICATION SYSTEMS FOR SELECTING ONE OR MORE ANTENNA PORTS FOR DOWNLINK TRANSMISSION
A method for selecting one or more antennas disposed at a base station BS of a wireless communication system, where the method includes: transmitting, to one or more use equipment (UE), one or more initial synchronization signal blocks (SSB) and one or more initial channel state information-reference signals (CSI-RS) using a plurality of antenna ports, receiving, from the one or more UE, signals including at least one parameter indicative of corresponding operating conditions at the one or more UE in response to the transmitted one or more initial SSB and CSI-RS, selecting one or more antenna ports among the plurality of antenna ports based on the received at least one parameter, and performing downlink transmission using the selected one or more antenna ports.
H04B 7/06 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
H04L 5/00 - Arrangements affording multiple use of the transmission path
87.
DYNAMICALLY TRANSFERRING CELL TRAFFIC TO REDUCE POWER CONSUMPTION
Techniques for dynamically transferring cell traffic to reduce power consumption are disclosed. A method for dynamically transferring cell traffic to reduce power consumption begins by determining a load on radio units that service a geographic area. A determination is made that the load on a first radio unit fails to satisfy a reduce power threshold. A determination is made that the load on the first radio unit satisfies a transfer threshold. The load on the first radio unit is transferred to at least a second radio unit such that the first radio unit satisfies the reduce power threshold. Then, a component associated with the first radio unit to turn off is selected. The component is turned off, causing the first radio unit to enter a reduced-power state.
This disclosure relates to assessment of data quality for unstructured data. In some aspects, a method includes obtaining, by one or more computing devices, metadata of multiple data files; analyzing a graph database representative of the multiple data files and generated using the metadata, to identify unstructured data included in one or more data files, the graph database representing features of the multiple data files, and relationships among the features of the multiple data files; obtaining a set of customized rules for the unstructured data based on context of the unstructured data; determining that the unstructured data fails to satisfy the set of customized rules; and in response to determining that the unstructured data fails to satisfy the set of customized rules, modifying the unstructured data to satisfy the set of customized rules.
Various arrangements for cellular network slice usage management are presented herein. In response to an application being launched for execution, an access point name (APN) list update request can be transmitted. In response, an APN list update can be transmitted back to the UE based on the application being executed. The UE's stored APN list can be updated based on the APN list update. The UE can then determine a bearer slice to use for cellular network communications based on the updated stored APN list.
Various arrangements for cellular network slice usage management are presented herein. In response to an application being launched for execution, an access point name (APN) list update request can be transmitted. In response, an APN list update can be transmitted back to the UE based on the application being executed. The UE's stored APN list can be updated based on the APN list update. The UE can then determine a bearer slice to use for cellular network communications based on the updated stored APN list.
Data acquired from at least one source is provided for observability on a cloud network. The data is placed in a common language for observability on the network so that data can be targeted based on a telemetry characteristic. Data having a first telemetry characteristic is acquired and routed to a destination for observability, whereas data having a second telemetry characteristic may be routed to another destination to be stored for observability.
An apparatus is configured to communicate with multiple network components in a service-based architecture and comprises a memory and a processor. The memory stores multiple configuration commands. The processor is configured to generate a request to establish a communication session between a first network component, a second network component, and a third network component. The first network component exchanges connectivity signals with the second network component and the third network component. The second network component performs first plurality of session operations in response to the connectivity signals exchanged with the first network component. The second network component reports to the third network component that the first session operations are performed. The processor is further configured to, in response to determining that the communication session between the first network component and the second network component is lost, maintain the communication session between the first network component and the third network component.
H04L 41/0654 - Management of faults, events, alarms or notifications using network fault recovery
H04L 43/0811 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking connectivity
CONCURRENTLY SUPPORTING INTERNET PROTOCOL VERSION 6 (IPV6) AND INTERNET PROTOCOL VERSION 4 (IPV4) IN A CLOUD-MANAGED WIRELESS TELECOMMUNICATION NETWORK
Example embodiments are directed towards concurrently supporting IPv6 and IPv4 in a cloud-managed wireless telecommunication network. This may include electronically providing support for internet Protocol IPv4 network traffic of user equipment (UEs) in a cloud-native, O-RAN, 5G NR cellular telecommunication network, and also electronically providing support for IPv6 network traffic of UEs in the cloud-native, O-RAN, 5G NR cellular telecommunication network while concurrently providing the support IPv4 network traffic. the wireless telecommunication service provider that is an MNO of the cloud-native, O-RAN, 5G NR cellular telecommunication network controls routing of the IPv6 network traffic within a cloud computing service provider cloud in which the cloud-native, O-RAN, 5G NR cellular telecommunication network operates.
DISH Network Technologies India Private Limited (India)
Inventor
Shahdad, Mohammad Dawood
Arora, Ankesh
S, Kulasekaran
Abstract
An apparatus is configured to communicate with multiple network components in a service-based architecture and comprising a memory and a processor. The memory stores multiple configuration commands; multiple local provisioning parameters; and a configuration script. Each local provisioning parameter is a backup copy of a corresponding configuration command. The processor is configured to generate a request to establish a communication session between a first network and a second network component. Further, the processor is configured to establish the communication session between the first network component and the second network component based at least in part upon a configuration command; determine that the communication session is lost based at least in part upon identifying an interruption in the communication session; and execute the configuration script to instruct the first network component to establish a backup communication session based at least in part upon a local provisioning parameter.
An apparatus is communicatively coupled to a plurality of databases in a service-based architecture and comprises a memory and a processor. The memory stores multiple configuration commands. The processor is configured to generate a request to establish a communication session in which a network component accesses a first database and a second database based at least in part upon a configuration command of the configuration commands. The network component exchanges connectivity signals with the first database and the second database. The first database provides database operations in response to the connectivity signals exchanged with the network component. The first database reports to the second database that the database operations are provided. The processor is further configured to, in response to determining that the communication session between the network component and the first database is lost, maintain the communication session to access the second database.
H04L 41/0654 - Management of faults, events, alarms or notifications using network fault recovery
H04L 67/1097 - Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
Technologies for estimating performance for a communications network are disclosed. An example method includes obtaining a proposed entire coverage of the communications network, and prior to live traffic being generated by users on the communications network: determining a drive test pattern commensurate with the proposed entire coverage, causing performance of drive tests in accordance with the drive test pattern, and in real-time: analyzing drive test data from the drive tests, and generating emulated network performance metrics for the communications network based on the analyzing of the drive test data.
DISH NETWORK TECHNOLOGIES INDIA PRIVATE LIMITED (India)
Inventor
Shahdad, Mohammad Dawood
Arora, Ankesh
S, Kulasekaran
Sarath, Arjun
Abstract
An apparatus is configured to communicate with multiple network components in a service-based architecture and comprising a memory and a processor. The memory stores multiple configuration commands; multiple local provisioning parameters; and a configuration script. Each local provisioning parameter is a backup copy of a corresponding configuration command. The processor is configured to generate a request to establish a communication session between a first network and a second network component. Further, the processor is configured to establish the communication session between the first network component and the second network component based at least in part upon a configuration command; determine that the communication session is lost based at least in part upon identifying an interruption in the communication session; and execute the configuration script to instruct the first network component to establish a backup communication session based at least in part upon a local provisioning parameter.
H04L 41/0663 - Performing the actions predefined by failover planning, e.g. switching to standby network elements
H04L 69/40 - Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass for recovering from a failure of a protocol instance or entity, e.g. service redundancy protocols, protocol state redundancy or protocol service redirection
H04W 24/04 - Arrangements for maintaining operational condition
A computer-implemented method of provisioning a software service is provided. In one example, the method includes: receiving a request to provision the software service, the request including information indicating a profile configuring the software service on a source deployment platform; obtaining the profile based on the request from a web server interface; determining a version of the software service for provisioning the software service on a destination deployment platform; and generating a deployment document, the generating comprising writing the determined version of the software service to the deployment document.
A method for analyzing communication traffic at a base station of a cellular network is provided. The method includes logging into a router at the base station of the cellular network, where: the router is connected with a radio unit and a distributed unit, the radio unit, the router, and the distributed unit being located on-site as part of the base station. The method also includes loading, by the router, a container into a container engine being executed by the router. The method also includes capturing, controlled by the container loaded into the container engine of the router, packet data transmitted from a first component of the cellular network to a second component of the cellular network that is part of the base station.
H04L 43/0811 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking connectivity
Various arrangements for performing intelligent cellular channel management are presented herein. A physical cellular communication channel may be established between a user equipment (UE) and a cellular network for sending a short message service (SMS) message in response to a cellular service request from the UE. A machine learning arrangement can be used to determine a duration of time for which the physical cellular communication channel is to be kept active. A channel maintenance instruction may be transmitted to keep the physical cellular communication channel active based on a cellular network messaging controller making the determination.