Disclosed are systems and methods for a computerized, network-based framework that provides enhanced algorithmic mechanisms for improving GSM location determinations for cell tower communications. The disclosed framework's operations can provide improved visit determinations/estimates and increased value for a user's wireless/cellular data, whereby optimized parameters from and/or of the signals associated with a user device (e.g., mobile device) and tower radio communications therebetween can be leveraged to discern the POIs a user has visited and/or is currently visiting. The location tracking of the user, within a predisposed uncertainty sector correlated among the user's device communications with corresponding radio towers, provides network coverage to track specific locations among POIs for which the user has visited and/or is currently located.
A method for monitoring an optical distribution network (ODN) in a passive optical network (PON), comprises establishing at least one data channel between an optical line terminal (OLT) and at least one optical network unit (ONU). The at least one ONU receives a live data traffic signal on at least one of the at least one data channel. The at least one ONU monitors the live data traffic signal for one or more abnormalities. The at least one ONU transmits an alert to the OLT when one or more abnormalities is detected.
H04B 10/077 - Arrangements for monitoring or testing transmission systemsArrangements for fault measurement of transmission systems using an in-service signal using a supervisory or additional signal
A method, a network device, and a non-transitory computer-readable storage medium are described in relation to a data network name (DNN) replacement service. The DNN replacement service may be provided in a roaming context associated with an end device. The DNN replacement service may be implemented by a network device of a home core network of the end device. The network device may obtain a policy pertaining to a session establishment between a visited core network and a home core network. The network device may determine whether DNN replacement is applicable based on the policy. The network device may modify a message to establish the session creation by including a replacement DNN when DNN replacement is applicable.
A base station determines a latency requirement of a user equipment device (UE), and receives latency measurements associated with multiple neighboring cells or cell sectors having coverage areas within a certain proximity to the base station. The base station measures a latency associated with a first cell or cell sector, having a coverage area generated by the base station, that is currently serving the UE. The base station triggers a mobility event for the UE, based on the UE's latency requirement, the measured latency of the first cell or cell sector, and the latency measurements associated with the multiple neighboring cells or cell sectors, to a selected one of the multiple neighboring cells or cell sectors.
A method, network device, system, and non-transitory computer-readable storage medium are described in relation to an dynamic user application control service that includes receiving from an application device, a request for access controls associated with a user application and an end device; generating, per the request, policies pertaining to the access controls, wherein the policies include time-based rules, location-based rules, or application type-based rules; obtaining a current location of the end device; comparing, by the network device, a current time with the time-based rules, the current location with the location-based rules, or an application type for the user application with the application-type rules; generating, per the comparing, a policy decision among the policies pertaining to the access controls; and applying, per the policy decision, the time-based rules, the location-based rules, and the application type-based rules for establishment of an application session with the end device.
A system described herein may maintain a set of policies associated with non-Internet Protocol (“IP”) messaging; maintain information associating an IP address of a User Equipment (“UE”) with a non-IP identifier of the UE; receive first traffic, that includes the IP address of the UE as a source of the first traffic, and payload information; identify, using the maintained information associating the IP address of the UE with the non-IP identifier of the UE, the non-IP identifier of the UE based on the IP address of the UE included in the first traffic; identify that the first traffic is associated with a particular policy of the set of policies; and forward second traffic, including the payload information and the non-IP identifier of the UE, to a destination device indicated in the first traffic, where forwarding the second traffic includes implementing the particular policy with respect to the second traffic.
A system described herein may identify traffic associated with a User Equipment (“UE”) that is connected to a first network. The UE may maintain a plurality of UE identities via one or more SIM (“Subscriber Identification Module”) cards, Universal Integrated Circuit Cards (“UICCs”), etc. The system may determine, based on one or more policies, that the traffic is not authorized via the first network. In some situations, the traffic may not be authorized if the first network does not support a type, service, etc. of the traffic. The system may identify a second network, based on the one or more policies, via which the traffic is authorized, and may indicate the second network to the UE. The UE may automatically (e.g., without user intervention) switch to a particular UE identity that is associated with the second network, and may output the traffic via the second network using such UE identity.
Systems and methods described herein enable association of an application with a line of service on Dual SIM Dual Standby (DSDS) devices. A user equipment (UE) device receives a command to execute an application that requires a mobile network connection. The UE device detects multiple available subscriber identity modules (SIMs), wherein each of the multiple available SIMs is associated with a different line of service. The UE device extracts an application identifier for the application, and determines, based on the application identifier, that the application is associated with a designated line of service. The UE devices initiates a session connection request for the application using a SIM, of the multiple available SIMs, associated with the designated line of service.
One or more computing devices, systems, and/or methods for performance indicator acquisition and processing for a communication network are provided. A compiler generates a package with compiler objects specifying how a normalizer is to process performance indicator data from a network element. The package is injected into the normalizer. The normalizer receives incoming performance indicator data from the network element over a message bus. The compiler objects are used to process the incoming performance indicator data to create and persistently store performance indicators records.
One or more computing devices, systems, and/or methods for providing near zero downtime during database upgrades for a computing environment are provided. A first database instance of a first version of a database may be hosted within a computing environment. A second database instance of a second version of the database may be deployed within the computing environment. The database instances are configured with triggers used to propagate data changes amongst the database instances. Requests to the database are routed based on a plurality of routing rules. A first routing rule routes a first portion of the requests to the first database instance and a second portion of the requests to the second database instance. The second database instance is monitored to determine whether to progress to a second routing rule of the plurality of routing rules.
G06F 11/20 - Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
A device, such as a Subscriber Identification Module (“SIM”) device, may maintain a set of profiles that each include a respective set of authentication credentials for connecting to one or more wireless networks. The device may maintain a set of policies associating respective events with respective profiles of the set of profiles, may receive an indication of a particular event, and may identify, based on the set of policies, that the particular event is associated with a particular profile. The device may select the particular profile as an active profile, and may output a refresh command after selecting the particular profile as the active profile. The device may receive, based on outputting the refresh command, a request for the active profile, and may output, based on the request for the active profile, the set of authentication credentials associated with the selected particular profile.
In some implementations, the techniques described herein relate to a method including: receiving a set of communication events from a user equipment to a base station; obtaining a set of geocoordinates corresponding to the user equipment; calculating an angular mean for the set of geocoordinates; sorting the set of geocoordinates based on distances between the set of geocoordinates and a location of the base station to generate an ordered list of geocoordinates; calculating a k-th order statistic of the ordered list of geocoordinates; generating a predicted location based on the angular mean and the k-th order statistic; and assigning the predicted location as a current location of the user equipment in a cellular core network.
A device may receive channel data associated with digital channels utilized by a customer, and may identify, in the channel data, potential issues and sequential events for the potential issues. The device may generate a causal relationship graph based on the sequential events and the potential issues, and may process the causal relationship graph, with a machine learning model, to identify issues of the customer and events associated with the issues. The device may apply causal inference to identify causal relationships between the issues and the events, and may calculate an inference score for the issues and the events based on the causal relationships. The device may modify, based on the inference score, a customer journey defined by the events to generate a modified customer journey, and may perform one or more actions based on the modified customer journey.
A system described herein may receive traffic from a User Equipment (“UE”) via a radio unit (“RU”), may identify one or more attributes of the traffic, and may select a first Central Unit (“CU”), from a group of CUs that includes the first CU and a second CU, based on the one or more attributes of the traffic. The one or more attributes may include a network slice. The device may further route the traffic to the selected first CU, wherein the CU aggregates received traffic and routes the aggregated traffic to a user plane gateway. The device may include a Distributed Unit (“DU”) of a radio access network (“RAN”) that includes the first and second CUs. The first and second CUs may include a first CU-User Plane (“CU-UP”) and a second CU-UP. The DU and the CUs may be configured by a CU-Control Plane (“CU-CP”) of the RAN.
A device may receive historical input data associated with trips traversed by a plurality of vehicles with vehicle tracking units (VTUs), and may process the historical input data to generate training data. The device may train a neural network model, with the training data, to generate a trained neural network model that provides a latent space representation of vectors, and may cluster the latent space representation of vectors to generate clusters. The device may receive input data associated with a trip traversed by a vehicle of the plurality of vehicles with the VTUs, and may process the input data to generate time series data. The device may compare the time series data and the clusters to determine whether the trip is anomalous or not anomalous, and may perform one or more actions based on the determination of whether the trip is anomalous or not anomalous.
In some implementations, the techniques described herein relate to a method including: receiving a network request from a second network function, the network request including a parameter; validating the parameter upon receipt of the network request to determine a status of the network request, the status indicating a valid or invalid request; processing, by a first network function, a resource managed by the first network function based on the network request and returning a network response when the status indicates a valid request; and denying the network request and returning an error code when the status indicates an invalid request.
In some implementations, a device may receive a multimedia content file. The device may divide the multimedia content file into a set of logical entities. The device may generate a set of embeddings for each logical entity of the set of logical entities. The device may compare groups of logical entities, of the set of logical entities, to generate a similarity metric. The device may selectively merge, based on the similarity metric satisfying a threshold, a pair of logical entities, in a group of logical entities of the groups of logical entities, to generate one or more logical entity sets. The device may process the one or more logical entity sets to generate one or more metadata tags for the one or more logical entity sets. The device may store a metadata file including the one or more metadata tags.
H04N 21/84 - Generation or processing of descriptive data, e.g. content descriptors
G06F 16/783 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
G06V 20/40 - ScenesScene-specific elements in video content
G06V 20/70 - Labelling scene content, e.g. deriving syntactic or semantic representations
H04N 21/234 - Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
H04N 21/44 - Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
18.
SYSTEMS AND METHODS FOR USING EXTERNAL IDENTIFIERS FOR ROUTING
A device may include a processor. The processor may be configured to receive, via a wireless connection, from an application server that provided a source external identifier to a source User Equipment device (UE), a routing request that includes data and an identifier for a destination UE. The processor may also be configured to look up a target external identifier for the destination UE; and route the data to a target application server that issued the target external identifier.
A system described herein may identify Key Performance Indicators (“KPIs”) associated with User Equipment (“UEs”) that are connected to a radio access network (“RAN”). Each KPI may be associated with wireless communications between a respective UE and the RAN. The system may identify a plurality of service categories associated with the plurality of UEs, where each particular UE is associated with a respective service category. The system may determine, based on the KPIs and the service category associated with each UE of the plurality of UEs, a radio resource partitioning configuration for the RAN. The particular radio resource partitioning configuration may specify that different portions of a set of radio resources, implemented by the RAN, are associated with different network slices. The RAN may implement the radio resource partitioning configuration by sending and receiving traffic, associated with respective network slices, via a corresponding portion of the set of radio resources.
A system described herein may maintain and distribute precision time across diverse locations and network types, including wired and wireless networks. A particular device may receive topology information indicating a particular set of time synchronization nodes, out of a plurality of time synchronization nodes of a time synchronize network; communicate with the particular set of time synchronization nodes on an ongoing basis, wherein the device and the plurality of devices maintain precision time information based on the ongoing communication; receive a request for precision time information from a particular time synchronization client, wherein the particular time synchronization client is assigned to the device based on attributes of the time synchronization client and the device; and output, to the particular time synchronization client and in response to the request, the requested precision time information.
A device may include a processor. The processor may be configured to send first control signals to optical switches to optically connect embedded optical time domain reflectometers (OTDRs), of an optical network, to optical fibers of the optical network; send second control signals to the OTDRs to measure attenuations of optical signals in the optical fibers; receive measurement data from the OTDRs as results of measuring the attenuations of the optical signals in the optical fibers; process the measurement data; and determine whether the optical fibers meet a performance requirement based on the processed measurement data.
G01M 11/00 - Testing of optical apparatusTesting structures by optical methods not otherwise provided for
H04B 10/071 - Arrangements for monitoring or testing transmission systemsArrangements for fault measurement of transmission systems using a reflected signal, e.g. using optical time domain reflectometers [OTDR]
22.
SYSTEMS AND METHODS OF MULTIMODAL USER INTERFACE AUTOMATION
Systems and methods provide user interface (UI) automation for multiple types of devices and applications. A computing device stores an objective for automated manipulation of a UI of a user device and conducts an iterative sequence to achieve the objective. The iterative sequence includes capturing current state information of the UI, wherein the current state information includes text and an image of the UI; sending multimodal input to a generative artificial intelligence (AI) system, wherein the multimodal input includes the image of the UI, a text prompt, and the objective; receiving, from the AI system, a predicted next action for the UI based on the multimodal input; initiating a programmatic action to implement the predicted next action on the UI; and recording the programmatic action. The computing device generates, based on the iterative sequence, a UI automation model associated with achieving the objective on the UI.
G06F 3/023 - Arrangements for converting discrete items of information into a coded form, e.g. arrangements for interpreting keyboard generated codes as alphanumeric codes, operand codes or instruction codes
G06F 3/0482 - Interaction with lists of selectable items, e.g. menus
In some implementations, a network node a radio access network (RAN) may receive, from a user equipment (UE), an indication of a traffic descriptor associated with an application running on the UE. The network node may allocate, using a RAN scheduling function associated with the network node, resources for the application based on an intra-user flow priority, wherein different applications associated with the UE are allocated with different amounts of resources based on the intra-user flow priority.
In some implementations, a network device may receive a group command associated with data transfers for a plurality of user equipments (UEs). The network device may transmit, based on the group command, a wakeup signal to a subset of UEs, of the plurality of UEs, in a target area, wherein the wakeup signal is associated with a control of data transfers for the subset of UEs based on a number of UEs in the target area and a load condition level associated with the target area.
A method may include receiving, by an access and mobility management function (AMF), a registration request from a user equipment (UE) device. The method may also include obtaining subscriber-related information associated with the UE device, wherein the subscriber-related information includes UE policy association information, and determining, based on the subscriber-related information, whether a UE policy association is enabled for the UE device. The method may further include transmitting, in response to determining that the UE policy association is enabled for the UE device, policy information to the UE device.
H04W 40/22 - Communication route or path selection, e.g. power-based or shortest path routing using selective relaying for reaching a BTS [Base Transceiver Station] or an access point
26.
SYSTEMS AND METHODS FOR SCHEDULING RESOURCES OF A RADIO ACCESS NETWORK BASED ON PER-USER EQUIPMENT FACTORS
A system described herein may identify a plurality of radio Key Performance Indicators (“KPIs”) associated with a plurality of User Equipment (“UEs”) that are connected to a radio access network (“RAN”). Each radio KPI may be associated with wireless communications between a respective UE and the RAN. The system may identify a plurality of service categories associated with the plurality of UEs, wherein each particular UE is associated with a respective service category. The system may determine, based on the radio KPIs and the service category associated with each UE of the plurality of UEs, a respective priority weight for each UE. The system may schedule traffic, between the RAN and the plurality of UEs, based on the determined priority weights for the plurality of UEs.
H04W 72/566 - Allocation or scheduling criteria for wireless resources based on priority criteria of the information or information source or recipient
A method, a network device, and a non-transitory computer-readable storage medium are described in relation to a coordinated domain-based L4S service. The service may enable end-to-end congestion control based on a predetermined order of domains, which are associated with L4S devices that support a packet flow, for which congestion control responses are to be provided. The service may provide independent feedback loops of state information from each domain and associated L4S device. The feedback loops may operate on different timescales. The service may coordinate congestion control among domains of an end-to-end path that support the packet flow and prevent fragmented or contentious congestion control responses between the domains.
A device may maintain, as a member of a two blockchain networks respective first and second blockchains. The first blockchain may include one or more sets of operations, and the second blockchain may include cross-chain authorization information. The device may identify a request to invoke a particular set of operations included in the first blockchain, where the request includes a set of input parameters and an identifier. The device may determine that the identifier satisfies the cross-chain authorization information included in the second blockchain, and may accordingly communicate with the second blockchain network to execute the particular set of operations. Executing the particular set of operations may include generating a set of output parameters. The device may output the set of output parameters in response to the request.
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
29.
SYSTEMS AND METHODS FOR ADAPTIVE POLICY CONTROL IN CELLULAR NETWORKS
A device may include a processor configured to collect user behavior data associated with a user equipment (UE) device and determine a user behavior pattern for the UE device based on the collected user behavior data. The processor may be further configured to generate a policy in a core network for the UE device based on the determined user behavior pattern for the UE device, wherein the core network manages a communication session for the UE device via a Radio Access Network (RAN), and provide the generated policy to a Policy Control Function (PCF) in the core network to apply to the communication session for the UE device.
In some implementations, a network device may transmit an indication of physical properties associated with a user equipment (UE), wherein the physical properties include a route associated with the UE. The network device may receive a metric associated with a line-of-sight (LOS) of the UE with a base station, wherein the LOS is while the UE is traveling along the route. The network device may transmit a message to enable dual connectivity for the UE based on the metric and one or more other slice parameters.
A method, an end device, and a non-transitory computer-readable storage medium are described in relation to a multi-subscriber identification module (SIM) network slice mapping service. The multi-SIM network slice mapping service may be used by an end device with multiple SIMs. The service may include mapping a SIM to use for an end device application session and a network slice based on user equipment (UE) route selection policies (URSP) stored by the end device, a request from the end device application, setting information configured by a user, and/or a network device.
H04L 45/302 - Route determination based on requested QoS
H04M 1/72409 - User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
In some implementations, a service communication proxy (SCP) network function device may receive, from a first network function device, a service request associated with a second network function device. The SCP network function device may transmit an access token request to a network repository function (NRF) network function device. The SCP network function device may receive, based on the access token request, an access token associated with the first network function device. The SCP network function device may transmit the service request to the second network function device, wherein the service request is transmitted to the second network function device with an indication of the access token.
A device may include a processor. The processor may be configured to: receive, from one or more network components, key performance indicators (KPIs) and parameters that are associated with a User Equipment device; select a scheduling strategy, for data communications over a wireless link between the device and the UE, based on the KPIs and the parameters; apply the selected scheduling strategy to schedule data for transmission to the UE; and transmit the data to the UE based on the scheduling.
A method may include identifying an event in a network and identifying a template in response to the event. The template may identify actions to be performed to service data traffic associated with the event. The method may also include determining, by an event controller, that at least one wireless station in the network has capacity to service data traffic associated with the event and transmitting, by the event controller and based on the identified template, instructions to at least one device to implement changes to the least one wireless station. The method may further include instantiating the changes to the at least one wireless station.
A device described herein may maintain a model associating sets of traffic attributes with respective sets of attributes of user interface (“UI”) elements; receive a request to associate a particular UI element with a particular set of Quality of Service (“QoS”) parameters; identify a first set of attributes of the particular UI element; identify that the first set of attributes, of the particular UI element, matches a second set of attributes of UI elements included in the model; and identify a particular set of traffic attributes indicated in the model as being associated with the second set of attributes of UI element attributes. The device may identify traffic associated with the particular set of traffic attributes; and may process the identified traffic in accordance with the particular set of QoS parameters indicated in the request, based on identifying that the traffic is associated with the particular set of traffic attributes.
H04L 47/2441 - Traffic characterised by specific attributes, e.g. priority or QoS relying on flow classification, e.g. using integrated services [IntServ]
G06F 3/0481 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
36.
SYSTEM AND METHOD FOR DYNAMIC AUTHORIZATION OF PRIORITY-BASED SESSION
A method, network device, system, and non-transitory computer-readable storage medium are described in relation to priority-based service authorization, including receiving, via an application service, a session request from a user equipment device (UE), wherein the session request includes a priority service subscription indicator associated with invoking a priority service session with the UE; determining, based on an applicable policy, a first authorization of the application service for the priority service; obtaining, from a user data function and based on the first authorization, a subscriber profile associated with the UE; sending, to an authenticator, a request for a second authorization of the UE for the priority service based on a verification of the priority service subscription indicator to the subscriber profile; receiving, from the authenticator, a verification message of the second authorization; and notifying, based on the verification message, the application service of the invoking of the priority service session.
A system described herein may monitor Key Performance Indicators (“KPIs”) of a radio access network (“RAN”) that implements a first radio access technology (“RAT”), such as a Fifth Generation (“5G”) RAT. The system may determine, based on monitoring the KPIs of the RAN, that a particular RAN condition has occurred, and may notify a Fixed Wireless Access (“FWA”) device, that is wirelessly connected to the RAN via the first RAT and that is also wirelessly connected to a plurality of client devices via a second RAT, such as a WiFi RAT, that the particular RAN condition has occurred. The FWA device may implement one or more policies for communications between the FWA device and the plurality of client devices based on receiving the notification that the particular RAN condition has occurred.
A Fixed Wireless Access (FWA) gateway (GW), wirelessly connected to a mobile network, receives user equipment device (UE) Route Selection Policy (URSP) information that includes UE policy rules. The FWA GW determines UEs that are connected to the FWA GW and determines policy rules for each of the connected UEs based on the received URSP UE policy rules. The FWA GW distributes the determined policy rules to each of the connected UEs for policy application at each of the connected UEs.
One or more systems and/or methods are provided for identifying one or more target roads of a point of interest (POI) and/or identifying impressions of the POI. In an example, a first target road of a POI may be identified, wherein the POI is viewable from the first target road. A plurality of locations of a User Equipment (UE) may be determined. A set of locations, of the plurality of locations, that are within a threshold distance of a road object corresponding to the first target road may be identified. It may be determined that the UE is associated with the impression based upon the set of locations meeting a threshold amount of locations.
A device may receive text data, may extract phrases from the text data, and may calculate question scores for the phrases. The device may determine whether the phrases are associated with single answers or multiple answers, may calculate, single answer scores for the phrases associated with the single answers, and may calculate multiple answer scores for the phrases associated with the multiple answers. The device may extract, from the phrases, phrase data identifying grammar data, start tag data, and end tag data, and may process the phrase data, the single answer scores, and the multiple answer scores, with a machine learning model, to generate valid sentence scores for the text data. The device may identify, as a valid sentence, a group of phrases of the text data associated with a highest one of the valid sentence scores, and may add punctuation to the valid sentence to generate a final sentence.
A device may receive user activity data identifying activities of a user, and content data identifying text transcripts associated with the user. The device may generate a first custom embedding associated with the user based on the user activity data, and may process the first custom embedding, with a machine learning model, to generate an intent of the user and a next action for the user based on the intent. The device may process the content data to generate a second custom embedding for the user and an end user vector based on the second custom embedding, and may generate a document vector for the user based on the next action for the user. The device may process the document vector and the end user vector, with a language model, to generate a document for the user, and may perform one or more actions based on the document.
In some implementations, a first device may obtain first channel state information (CSI) of a second device. The first device may determine that a variance of the first CSI exceeds a variance threshold. The first device may determine that a motion event has occurred based on determining that the variance, of the first CSI, exceeds the variance threshold. The first device may determine a location of the motion event based on the first CSI and second CSI of a third device. The first device may adjust an operation of one or more devices associated with the location based on determining the motion event.
H04W 64/00 - Locating users or terminals for network management purposes, e.g. mobility management
H04B 7/06 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
43.
SYSTEM AND METHOD FOR PROVIDING REAL TIME RECOMMENDATIONS FOR MULTIPLE TASKS
The present teaching relates to recommendation. Current event information and historic sequence data are received. The former characterizes a current event involving a user and user's interactions with a user interface (UI). The latter includes UIs and corresponding user interactions thereon with corresponding performance data. A task sentence is created with multiple tokens, each of which corresponds to a task. The current event information, the historic sequence data, and the task sentence are used for predicting a next item to be recommended via a mixture of expert (MoE) prediction model, trained via multi-task learning. The next item is recommended to the user on the UI.
A device may receive data identifying network slices and applications permitted on the network slices, and data identifying addresses of the applications permitted on the network slices. The device may provide, to a UE, a list of the network slices and the applications permitted on the network slices, and may receive, from the UE, a UE identifier and subscribed to applications from the list. The device may create rules for the subscribed to applications and corresponding network slices, and may associate the rules for the subscribed to applications and the corresponding network slices with the UE identifier. The device may receive, from a network function, a request for the rules associated with the UE identifier, the subscribed to applications, and the corresponding network slices, and may provide, based on the request, the rules to the UE via the network function.
A device may receive user criteria associated with a route for network performance testing of a network, network data associated with the network, and cartographic data associated with a location of the network. The device may calculate network spatial data based on the user criteria and the network data, and may perform feature extraction of the network spatial data to calculate network statistics and to extract network event locations. The device may generate waypoint criteria based on the network statistics and the network event locations, and may map the network spatial data to valid roadways identified in the cartographic data to generate mapped data. The device may identify a list of viable waypoints based on comparing the mapped data and the waypoint criteria, and may process the list of viable waypoints, the network data, and the cartographic data, with a clustering model, to generate the route.
A system described herein may identify a particular value that was wirelessly received by a User Equipment (“UE”) at a first time. The particular value may have been recorded to a blockchain, along with a second time, at which the particular value was outputted by a base station of a wireless network. The particular value may include a randomly generated number. The system may determine a location of the base station from which the particular value was outputted. The location of the UE may be determined based on a delay time associated with the particular value, which may be determined based on a difference between the first and second times. The location of the UE may further be determined (e.g., using triangulation techniques) based on values outputted by other base stations, for which the blockchain includes records indicating times at which such values were outputted by the other base stations.
In some implementations, a device may identify a network node that supports a first radio access technology (RAT), wherein the network node is associated with sessions with user equipments (UEs). The device may calculate a percentage of traffic from the sessions that is associated with the first RAT and not a second RAT. The device may determine that the network node is associated with a score based on the percentage of traffic associated with the first RAT not satisfying a threshold. The device may collect, based on the network node being associated with the score, device data associated with the UEs. The device may determine a network issue associated with the network node based on the device data. The device may determine a root cause for the network issue. The server may transmit an indication of the root cause.
H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
H04L 43/062 - Generation of reports related to network traffic
A method, an end device, and a non-transitory computer-readable storage medium are described in relation to an application and network slice mapping service. The application and network slice mapping service may include mapping an end device application to multiple application categories of the connection capabilities component of the traffic descriptors associated with route selection policies. For example, the end device application may be separated into multiple application traffic characteristics or different application categories. The mapping service may map the application categories to one or multiple network slices. The mapping service may assign a quality of service identifier value to each application category. The mapping service may apply a scheduling algorithm to the application categories that share the same network slice.
In the various embodiments, systems and methods are disclosed for determining user engagement with an application based on network traffic data corresponding to network traffic on a network. An aspect of the present disclosure is a method comprising obtaining network traffic data for a period of time, the network traffic data including a plurality of host calls; determining a host call sequence from the plurality of host calls, the host call sequence including one or more of the plurality of host calls; identifying an application corresponding to the host call sequence based on an augmented dataset; and determining a number of users of the application for the period of time based on a number of times the host call sequence repeats in the network traffic data.
In some implementations, a radio access network (RAN) may obtain data rate information from a device. The device may be associated with an application and the data rate information may be associated with the application. The RAN may determine, based on the data rate information, one or more data rate parameters associated with the application. The one or more data rate parameters may include at least one of one or more radio frequency parameters, one or more network loading parameters, one or more mobility parameters, or an available data rate parameter. The RAN may transmit, to the device, the one or more data rate parameters.
H04L 47/25 - Flow controlCongestion control with rate being modified by the source upon detecting a change of network conditions
H04L 47/283 - Flow controlCongestion control in relation to timing considerations in response to processing delays, e.g. caused by jitter or round trip time [RTT]
51.
SYSTEMS AND METHODS FOR NETWORK-ASSISTED AUTHENTICATION AND LOCATION SERVICES
A system described herein may receive a first authentication request that includes a first identifier of a User Equipment (“UE”), and a second identifier of a second device. The system may output a second authentication request to a wireless network with which the UE is associated, which may include the first identifier of the UE. The system may receive, in response to the second authentication request an indication that the UE has been authenticated, and location information associated with the UE. The system may identify one or more services associated with the received location of the UE, and may output, to the second device and based on the response to the second authentication request, traffic associated with the identified one or more services.
H04L 67/51 - Discovery or management thereof, e.g. service location protocol [SLP] or web services
H04L 67/52 - Network services specially adapted for the location of the user terminal
H04L 67/75 - Indicating network or usage conditions on the user display
52.
SYSTEMS AND METHODS FOR UTILIZING GENERATIVE ARTIFICIAL INTELLIGENCE TECHNIQUES TO CORRECT TRAINING DATA CLASS IMBALANCE AND IMPROVE PREDICTIONS OF MACHINE LEARNING MODELS
A device may receive first data associated with a first class and second data associated with a second class that is different than the first class, and may process the first data, with a generative adversarial network model, to generate synthetic data. The device may train a variational autoencoder (VAE) model using the second data, to generate a trained VAE model, and may utilize the first data, the second data, and the synthetic data with the trained VAE model to generate anomaly scores. The device may combine the anomaly scores with the first data, the second data, and the synthetic data to generate final data, and may train a machine learning model with the final data to generate a trained machine learning model. The device may perform one or more actions based on the trained machine learning model.
In some implementations, a call session control function (CSCF) may receive, from a user equipment (UE), a message associated with a text message sent from the UE to an emergency number. The CSCF may add, based on the message being associated with the text message sent to the emergency number, an enhanced 911 (e911) attribute to the message, wherein the e911 attribute provides prioritized handling for the message during network congestion in relation to messages without the e911 attribute. The CSCF may transmit the message having the e911 attribute.
A system described herein may receive a request to configure a load-balanced service in a containerized environment. The system may include an indication of a particular network with which the load-balanced service should communicate. The system may generate a load balancer proxy node. Generating the load balancer proxy node may include associating the load balancer proxy node with a first interface associated with the particular network and with a second interface associated with the containerized environment. The system may generate a set of service node instances, which may include associating the set of service node instances with a third interface associated with the containerized environment. The system may associate the second interface with the third interface and may deploy, in response to the request, the set of load balancer proxy node instances and the set of service node instances to the containerized environment.
A device may receive session data of a communication session between an artificial intelligence (AI) communication device and a first user device. The device may analyze the session data to determine one or more portions of the session data and may identify a portion, of the one or more portions, for processing based on one or more criteria associated with the portion. The portion may include a plurality of entries including communications from the first user device and from the AI communication device. The device may analyze the plurality of entries to identify an entry including information regarding an escalation and may analyze one or more additional entries, of the plurality of entries, to determine a category associated with a cause of the escalation. The device may cause the AI communication device to be configured to address the cause based on the one or more additional entries and the category.
H04L 51/02 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail using automatic reactions or user delegation, e.g. automatic replies or chatbot-generated messages
A device may receive control traffic that includes a plurality of provisioning events associated with a network, and may identify provisioning events, of the plurality of provisioning events, that are associated with a service. The device may calculate a quantity of the provisioning events that are associated with the service, and may determine whether the quantity of the provisioning events satisfies a quantity threshold. The device may provide the quantity of the provisioning events to network devices that provide the service to subscribers based on the quantity of the provisioning events failing to satisfy the quantity threshold, or may calculate a remaining quantity of the provisioning events that are associated with the service based on the quantity of the provisioning events satisfying the quantity threshold.
Systems and methods described herein providing consumer-driven access to network slices. A network device receives, from a user device, a slice selection to associate an application on the user device with a network slice. A slice recommender device generates a slice recommendation based on at least one of device parameters or network parameters. The network device provides, to the user device, the slice recommendation for presentation to the user.
H04W 48/18 - Selecting a network or a communication service
H04M 1/72469 - User interfaces specially adapted for cordless or mobile telephones for operating the device by selecting functions from two or more displayed items, e.g. menus or icons
H04W 48/16 - DiscoveringProcessing access restriction or access information
58.
SYSTEMS AND METHODS FOR OPTIMAL NETWORK SLICE SELECTION
A device may include a processor. The processor may be configured to: receive, from an external device outside a cellular network, a request to provide network slice information for an application which is to receive a service from a network slice when the application is installed and running on a User Equipment device (UE); select optimum network slices for providing the service to the application; and provide the network slice information to the external device, wherein the network slice information identifies the optimum network slices. The external device may be configured to download the application to the UE.
H04L 41/40 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities
H04W 24/02 - Arrangements for optimising operational condition
59.
SYSTEMS AND METHODS FOR HYPER-PRECISE TIME OPERATIONS
Disclosed are systems and methods for a computerized Hyper-precise time (HPT) framework that accurately and efficiently provides precise time data for all sorts of network-based and local operations. The disclosed HPT framework can, among other benefits, provide sub-nanosecond time accuracy for operations involving, but not limited to, precise positioning, ambiguity resolution, mitigation of signal delays, maintaining continuous and accurate tracking for dynamic applications, improved convergence for accurate solutions, and the like. The framework can be utilized for Real-Time Kinematic (RTK), such that the determined HPT can directly contribute to achieving the high levels of accuracy and reliability required in RTK applications.
One or more computing devices, systems, and/or methods for providing multi-screen navigation for an application such as a mobile application are provided. An instance of the application is hosted on a mobile device. A primary display interface is populated with a first screen of the application for display through the mobile device. In response to detecting a trigger through the application, a secondary display interface is generated and populated with a second screen of the application for display through the mobile device while the primary display interface is being displayed through the mobile device. A first backstack of the application is utilized to track user navigation amongst screens of the application through the primary display interface. A second backstack of the application is utilized to track user navigation amongst the screens of the application through the secondary display interface.
G06F 3/04845 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range for image manipulation, e.g. dragging, rotation, expansion or change of colour
G06F 3/0481 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
According to disclosed embodiments, as discussed below, a cell broadcasting framework is provided including receiving a request from a Network Function (NF) consumer by a service communication proxy (SCP) on a network, the request including a set of parameters, identifying a plurality of target NF producers corresponding to the set of parameters, transmitting the request to the plurality of target NF producers, receiving a plurality of successful request responses corresponding to some or all of the plurality of target NF producers, transmitting one of the plurality of successful request response to the NF consumer, and discarding all other successful request responses.
In some implementations, a first network device may encode Internet Protocol version 4 (IPv4) network layer reachability information (NLRI) using Internet Protocol version 6 (IPv6) next hop encoding to generate encoded IPv4 NLRI. The first network device may include information indicating border gateway protocol (BGP) labeled unicast (BGP-LU) in the encoded IPv4 NLRI. The first network device may advertise the encoded IPv4 NLRI. The first network device may establish a communication session with a second network device, wherein the communication session is established via an IPv6 core network. The first network device may forward, via the communication session, one or more IPv4 packets using the encoded IPv4 NLRI.
H04L 45/50 - Routing or path finding of packets in data switching networks using label swapping, e.g. multi-protocol label switch [MPLS]
H04L 61/251 - Translation of Internet protocol [IP] addresses between different IP versions
H04L 101/659 - Internet protocol version 6 [IPv6] addresses
H04L 101/686 - Types of network addresses using dual-stack hosts, e.g. in Internet protocol version 4 [IPv4]/Internet protocol version 6 [IPv6] networks
63.
METHOD AND SYSTEM FOR MACHINE LEARNING MODEL GENERATION AND ANOMALOUS EVENT DETECTION
One or more computing devices, systems, and/or methods for machine learning model generation and/or anomalous event detection are provided. In an example, one or more datasets having first fields are identified. Significance scores associated with the first fields are determined. Second fields are selected from the first fields based upon the significance scores. Field combinations are generated based upon the second fields. Based upon the field combinations, a plurality of machine learning models is generated. The plurality of machine learning models include a first machine learning model associated with a first field combination of the field combinations, and a second machine learning model associated with a second field combination of the field combinations. The plurality of machine learning models is deployed in a data monitoring pipeline. Using the plurality of machine learning models, an anomalous event is detected based upon data passing through the real-time data monitoring pipeline.
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
64.
SYSTEMS AND METHODS FOR LOCATION TRACKING AND ASSOCIATION OF MULTIPLE DEVICES
A device may receive, from a first device, first tracking data that includes first temporal data and first location data, and may receive, from a second device, second tracking data that includes second temporal data and second location data. The device may generate a first spatio-temporal object based on the first tracking data, and may generate a second spatio-temporal object based on the second tracking data. The device may calculate a matching score associated with the first spatio-temporal object and the second spatio-temporal object, and may determine whether the matching score satisfies a score threshold. The device may determine that the first device is associated with the second device based on determining that the matching score satisfies the score threshold, and may perform one or more actions based on determining that the first device is associated with the second device.
Disclosure are techniques for allocating aggregation devices in a lawful intercept system. In an embodiment, a method includes maintaining a list of point of interception aggregation (PAG) functions in a network function repository function (NRF) of a cellular network upon instantiation of the PAG functions; receiving a lawful intercept (LI) request; querying the NRF to determine a respective PAG function; and associating a point of interception (POI) function with the respective PAG function.
In an example, an emergency communication session request is received from a first user equipment (UE). In response to the emergency communication session request, a communication session between the first UE and a first public safety answering point (PSAP) may be established. In response to the emergency communication session request, a first emergency message may be provided to an emergency contact of the first UE.
H04W 76/50 - Connection management for emergency connections
H04W 4/48 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for in-vehicle communication
A device described herein may establish a communication session with a first Security Edge Protection Proxy (“SEPP”) of a first network, and further with a second SEPP of a second network. The device may be or may implement an intermediary gateway between the SEPPs. The communication session may be associated with an N32-F interface that includes the SEPPs, the intermediary gateway, and one or more other intermediary gateways. The device may receive traffic from the first SEPP, and may determine that the traffic satisfies one or more error conditions. The device may identify an error reporting policy associated with the identified error condition, and may output, to the first SEPP and/or to the second SEPP (e.g., in accordance with the error reporting policy), an indication that the traffic satisfies the one or more error conditions.
A method, a network device, a system, and a non-transitory computer-readable storage medium are described in relation to an device status intelligence function service. The device status intelligence function service may include event monitoring and notification services. The device status intelligence function service may include generating policies based on application requirements pertaining to an application and an end device. The application requirements may include end device criteria that may be specified by a third party application network device. The device status intelligence function service may include generating a communication profile, based on the policies, that enable end device criteria monitoring in a network. The device status intelligence function service may provide notifications to the third party application network device when requested events occur.
In some implementations, a network element may receive information indicating a list of user equipments (UEs) that are off a wireless network. The network element may receive a verification request to verify a call received by the wireless network. The network element may determine, in response to the verification request and based on the information, whether a UE authorized to use a calling number associated with the call is on the wireless network. The network element may transmit an indication of whether the UE is on the wireless network.
In some implementations, the techniques described herein relate to a method including: receiving an expected object and a candidate object; computing a similarity coefficient between the expected object and the candidate object; computing an edit distance between the expected object and the candidate object; computing an embedding similarity between the expected object and the candidate object; and computing a matching score between the expected object and the candidate object based on the similarity coefficient, the edit distance, and the embedding similarity, the matching score representing a likelihood that the candidate object has replaced the expected object.
In some implementations, a first network device may receive, from a user equipment (UE), a request for a network resource. The first network device may determine, based on the request for the network resource, a prioritization associated with the UE, wherein the prioritization relates to a quality of service (QoS) attribute of the UE or a message priority of a message associated with the request for the network resource. The first network device may determine that a resource availability of resources at the first network device is less than an availability threshold. The first network device may transmit a preemption message to at least one of the UE or a second network device, wherein the preemption message indicates an interruption to one or more network resources associated with the UE or one or more other UEs associated with the second network device.
Systems and methods provide for application-enabled multicast control. A network device receives first parameters for an application executed on a first user equipment (UE) device and receives second parameters for the application executed on a second UE device. The network device detects, based on the first and second parameters, a multicast opportunity for the application and provides, to an application server for the first UE device and the second UE device, a multicast target address to initiate multicast streaming to the first UE device and the second UE device.
A network device determines at least one of throughput variation and latency variation associated with at least one flow transiting a network slice of a mobile network. The network device compares the at least one of the throughput variation and the latency variation with performance requirements of the network slice, and determines, based on the comparing, network slice resources needed for capacity planning of the network slice. The network device adds or removes network slice resources from the network slice based on the determined network slice resources.
A device may include a processor configured to receive a data stream connection request via a WIFI connection or a wired connection and establish a cellular wireless connection with a base station based on the data stream connection request. The processor may be further configured to determine a cellular wireless Quality of Service (QOS) class or network slice assigned to the cellular wireless connection by a core network associated with the base station; map the cellular wireless QoS class or network slice to a priority class associated with the WIFI connection or the wired connection; assign the priority class to a data stream associated with the data stream connection request; and process data units associated with the data stream based on the assigned priority class.
A system described herein may maintain information indicating groups of wireless trip devices. The system may maintain information associating each wireless trip device, of a plurality of wireless trip devices, with respective edge computing devices. The system may receive a wireless alert from a particular wireless trip device, which indicates an electrical fault condition. The system may identify a particular group of wireless trip devices with which the wireless alert is associated, and may identify a particular set of edge computing devices that are associated with respective wireless trip devices of the group of wireless trip devices. The system may output, to each edge computing device of the identified particular set of edge computing devices, a notification based on the wireless alert, and each edge computing device may wirelessly communicate respective wireless trip devices based on the wireless alert received from the particular wireless trip device.
In some implementations, a server may receive a plurality of signal measurements associated with a coverage area, wherein the plurality of signal measurements are collected over a measurement period by a device within the coverage area while the device is associated with a fixed location. The server may identify a signal measurement from the plurality of signal measurements, wherein the signal measurement represents a baseline radio frequency (RF) environment for the coverage area without a threshold amount of interference or transient changes in the coverage area. The server may provide an output based on the baseline RF environment.
A device may provide a first optical signal to an optical fiber network via a live fiber cable, the first optical signal including a distributed fiber optic sensing optical signal, and may receive, from the optical fiber network, a second optical signal, based on the first optical signal and via the live fiber cable. The device may determine whether a vibration event associated with the live fiber cable is detected based on the second optical signal, and may perform one or more actions based on whether the vibration event associated with the live fiber cable is detected.
G01H 9/00 - Measuring mechanical vibrations or ultrasonic, sonic or infrasonic waves by using radiation-sensitive means, e.g. optical means
G01D 5/353 - Mechanical means for transferring the output of a sensing memberMeans for converting the output of a sensing member to another variable where the form or nature of the sensing member does not constrain the means for convertingTransducers not specially adapted for a specific variable using optical means, i.e. using infrared, visible or ultraviolet light with attenuation or whole or partial obturation of beams of light the beams of light being detected by photocells influencing the transmission properties of an optical fibre
79.
SYSTEMS AND METHODS FOR UTILIZING DISTRIBUTED FIBER OPTIC SENSING TO DETECT RISKS TO FIBERS
A monitoring system connected to a network may receive a request from a user device over the network to monitor a fiber cable. A fiber sensing device may connect to the monitoring system, may communicate messages with the monitoring system, and may connect to the fiber cable. The fiber sensing device may receive an instruction from the monitoring system to begin a monitoring function for the fiber cable, and may provide a first optical signal to the fiber cable. The fiber sensing device may receive, from the fiber cable, a second optical signal, based on the first optical signal, and may detect a risk to the fiber cable based on the second optical signal. The fiber sensing device may send an alert about the risk to the fiber cable to the monitoring system, and the monitoring system may send the alert over the network to the user device.
G01D 5/353 - Mechanical means for transferring the output of a sensing memberMeans for converting the output of a sensing member to another variable where the form or nature of the sensing member does not constrain the means for convertingTransducers not specially adapted for a specific variable using optical means, i.e. using infrared, visible or ultraviolet light with attenuation or whole or partial obturation of beams of light the beams of light being detected by photocells influencing the transmission properties of an optical fibre
80.
SYSTEMS AND METHODS FOR 5G CORE NETWORK ACCESS CONTROL
A device described herein, such as a User Equipment (“UE”), may receive an indication that the device is not authorized to access a first type of core network; detect a first set of wireless signals associated with a first network that is associated with the first type of core network; detect a second set of wireless signals associated with a second network that is associated with a second type of core network; and request, based on detecting the first and second sets of wireless signals and further based on the indication that the device is not authorized to access the first type of core network, establishment of a communication session with the second network.
Systems and methods described herein enable private telecommunications network subscribers that do not have a distinctive Public Land Mobile Network (PLMN) ID to access visited PLMN services. A device in a visited wireless network receives an attach request for a user equipment (UE) device; detects, based on the attach request, that the UE device is subscribed to a private network; provides, to a roaming identity register (RIR), a roaming authorization request for the UE device; receives a roaming authorization response that includes a network pointer to the private network; and applies, based on the roaming authorization response, a roaming policy for the UE device.
H04W 8/02 - Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]Transfer of mobility data, e.g. between HLR, VLR or external networks
82.
SYSTEMS AND METHODS FOR NETWORK FUNCTION DISCOVERY IN A SEGMENTED NETWORK
A method may include subscribing, by a first network repository function (NRF) located in a first segment of a network, to event information associated with a unified data management (UDM) function or a unified data repository (UDR) located in a second segment of the network. The method may also include receiving, by the first NRF and from a second NRF included in the second segment UDM or UDR information associated with the UDM or UDR located in the second segment of the network. The method may further include receiving, at the first NRF, a UDM or UDR discovery request from a network function (NF), wherein the UDM or UDR discovery request is associated with subscriber information stored in a UDM or UDR located in the second segment of the network, and responding, by the first NRF, to the discovery request.
H04L 41/122 - Discovery or management of network topologies of virtualised topologies e.g. software-defined networks [SDN] or network function virtualisation [NFV]
83.
SYSTEMS AND METHODS FOR INSTRUCTING A USER EQUIPMENT TO UTILIZE A FIFTH GENERATION (5G) NETWORK INSTEAD OF A WIRELESS NETWORK
A network device, of a fifth generation (5G) radio access network, may establish a connection or a session with a user equipment connected to a Wi-Fi network. The network device may determine an indicator indicating whether a 5G network preference is in effect based on a subscription of the user equipment and may provide the indicator to the user equipment. The network device may maintain the connection or the session with the user equipment when the indicator indicates that the Wi-Fi network is not preferred for Wi-Fi offload and may receive traffic from the user equipment when the indicator indicates that the Wi-Fi network is not preferred for Wi-Fi offload.
A device receives User Equipment device (UE) Policy Section Codes (UPSCs) and a first version of associated UE policy rules. The device further receives first inconsistency detection codes for the UPSCs and a current version of the associated UE policy rules. The device determines, based on the UPSCs and the first version of the associated UE policy rules, second inconsistency detection codes, and compares the first and second inconsistency detection codes to identify inconsistencies between the first version of the UE policy rules and the current version of the UE policy rules. The device sends, when the comparison identifies the inconsistencies, a request for updated UE policy rules, and receives one of the UPSCs and an updated version of an associated UE policy rule of the one of the UPSCs.
In some implementations, an application programming interface (API) management platform may receive, from a user equipment (UE), a request to a unified application programming interface (API) proxy that supports multiple users with different certifications, different sets of registered endpoints, different API keys, and different authentication tokens, wherein the request is associated with a user of the multiple users. The API management platform may perform an evaluation of the request based on a comparison of information indicated in the request and information associated with the user, wherein the request is accepted based on a validation of the request or the request is blocked based on an invalidation of the request.
A system described herein may receive a request for a blockchain network to perform a particular set of operations, such as executing chaincode recorded to a blockchain associated with the blockchain network. The system may receive Key Performance Indicators (“KPIs”) of nodes of the blockchain network, and may receive a consensus policy associated with the blockchain network. The consensus policy may indicate a particular quantity of result sets used to verify execution of a given operation by the blockchain network. The system may assign different nodes of the blockchain network to perform different portions of the requested set of operations. The assignments may be determined based on the consensus policy and the KPIs of the nodes. The system may aggregate result sets from different nodes in order to generate aggregated result sets, where the quantity of aggregated result sets satisfies the consensus policy.
Disclosed are systems and methods for a computerized framework that operates a secure connection broker (SCB) for management and control of swarm communications. The SCB can define secure zones within a network(s), which can be leveraged to control and/or divert network traffic related to resource requests between entities based on the entities' designed zones. Secure zones, as managed by the SCB can serve as coordination centers for swarm activities among entities, thereby facilitating communication and data sharing among swarm members. The SCB(s) on a network can ensure that swarm communications are secure, controlled and efficient by providing a structured and protected environment for swarm nodes to operate.
A device may receive, from a service provider, a network address associated with a request for a service. The request for the service may be provided to the service provider by a user equipment associated with a network device. The device may receive, from the service provider, a query for a geolocation of the network device, and may determine the geolocation of the network device based on the network address. The device may provide the geolocation of the network device to the service provider.
In some implementations, a call session control function (CSCF) may identify information associated with a user equipment (UE). The CSCF may determine, based on the information, whether the UE is roaming in a circuit switched mobility network. The CSCF may transmit signaling associated with delivering a call to the UE, wherein the signaling bypasses a service continuity gateway (SCG) on a call delivery path when the UE is not roaming in the circuit switched mobility network and the signaling traverses the SCG on the call delivery path when the UE is roaming in the circuit switched mobility network.
A system described herein may efficiently perform a multi-destination backward search, which may be a part of performing a bidirectional search in a node map that implements contraction hierarchy techniques. Lowest cost paths to each node reachable to each destination node of a set of destination nodes may be computed. A queue may be initialized with the set of destination nodes. For each particular node in the queue, the system may add higher priority neighbors of the particular node to the queue, identify costs of outgoing links from the particular node to the higher priority neighbors, compute lowest cost paths associated with the set of destination nodes based on the identified costs of outgoing links from the particular node to the higher priority neighbors and any previously computed lowest cost paths associated with the set of destination nodes, and increment to a next node in the queue.
In some implementations, a network element may identify gaming traffic associated with a user equipment (UE). The network element may detect a traffic pattern associated with the gaming traffic. The network element may determine that the UE is associated with a prioritized service, wherein the prioritized service is associated with network slicing. The network element may perform a network scheduling for the UE that prioritizes the gaming traffic associated with the UE over non-gaming traffic associated with another UE, wherein the network scheduling is based on the traffic pattern and the UE being associated with the prioritized service.
H04W 28/02 - Traffic management, e.g. flow control or congestion control
H04W 72/566 - Allocation or scheduling criteria for wireless resources based on priority criteria of the information or information source or recipient
Systems and methods described herein provide dynamic network slicing. A network device receives, from an application server, application performance requirements for an application and receives capability and performance information of an existing network slice that is servicing a User Equipment (UE) device using the application. The network device determines, based on the capability and performance information, that a new network slice is needed to support the application performance requirements for the UE device; and sends a signal to initiate a slice creation process for the new network slice.
An illustrative intent classification engine may access a text transcript and determine one or more features associated with the text transcript. Based on the one or more features, the intent classification engine may generate an aggregate embedding vector and provide the aggregate embedding vector as an input to a trained model configured to output an intent classification. Corresponding methods and systems are also disclosed.
A network device may select a target reliability from a table that includes a list of target reliabilities not associated with a default reliability, and may provide the target reliability to a user equipment. The user equipment may be configured to associate the target reliability with a channel quality indicator (CQI) process that computes CQI values that satisfy the target reliability.
H04W 72/542 - Allocation or scheduling criteria for wireless resources based on quality criteria using measured or perceived quality
H04B 7/06 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
H04L 1/00 - Arrangements for detecting or preventing errors in the information received
H04L 1/20 - Arrangements for detecting or preventing errors in the information received using signal-quality detector
95.
SYSTEMS AND METHODS TO MAXIMIZE COVERAGE OF PREFERRED FREQUENCY BANDS
Systems and methods provide for dynamic updates of downlink (DL) Reference Signal Received Power (RSRP) thresholds to maximize uplink (UL) coverage on cells with a preferred frequency band. A network device identifies a desired minimum UL signal-to-interference-plus-noise ratio (SINR) value for a source cell; maps the minimum UL SINR value to a corresponding DL RSRP value for the source cell; and determines, based on the DL RSRP value, a loaded DL RSRP value that reflects an estimated interference level for a time period. The network device provides one or more DL RSRP thresholds for implementation in the source cell based on the loaded DL RSRP value.
In some implementations, an Internet Protocol multimedia subsystem (IMS) entity may receive, from a home subscriber service (HSS) or a unified data management (UDM), an identifier associated with a government emergency telecommunications service (GETS) subscription, wherein the identifier includes a selection prefix. The IMS entity may identify that a call is associated with GETS based on the identifier. The IMS identifier may transmit, to a network node, an indication that the call is associated with GETS.
A device of a first network, to which a User Equipment (“UE”) is wirelessly connected, may receive, a request to access a service provided by a second network. The device may establish, based on the request, a user plane connection between the first network and the second network while the UE remains wirelessly connected to the first network. The first network may receive, from the UE, traffic that is associated with the service, and may output the received traffic to the second network via the user plane connection. The first and second networks may communicate via a connection, such as a tunnel, via respective User Plane Functions (“UPFs”) of the first and second networks. The UPFs may communicate via an N9 interface. The service may be provided by an edge computing device of the second network.
A method, a network device, a system, and a non-transitory computer-readable storage medium are described in relation to an gateway type monitoring event service. The gateway type monitoring event service may include providing a current gateway type associated with an end device and a network to an application function. The current gateway type may be used by the application function to perform a network operation or procedure.
A device may authenticate a first application provided to a first client and a second application provided to a second client. The device may receive a communication initiated by the first client via the first application, and may provide the communication to the second application. The device may enable the communication to be answered by the second client via the second application, and may establish a data channel for the communication. The device may enable a request to grant access to the second application as an avatar to be provided to the second application, and may enable the request to be accepted by the second client via the second application. The device may enable the first application to provide avatar volumetric reconstruction data and an avatar position and rotation to the second application, and may enable the second application to provide foveated equirectangular data to the first application.
A63F 13/335 - Interconnection arrangements between game servers and game devicesInterconnection arrangements between game devicesInterconnection arrangements between game servers using wide area network [WAN] connections using Internet
G06T 13/40 - 3D [Three Dimensional] animation of characters, e.g. humans, animals or virtual beings
100.
DYNAMIC INTER-REGION CONNECTION DISTRIBUTION TO 5G NETWORK FUNCTIONS
The disclosed embodiments involve recording performance metrics for network connections in a centralized database, storing network connection data in a global registry across multiple data centers, detecting backlogs at specific data centers linked to network elements and connections, and generating updated connection assignments. These assignments include identifiers for the involved data centers and connections. Upon receiving a connection assignment update notification, the method updates the network connection and communicates the first data center's connection state to the global registry.