In some implementations, a service communication proxy (SCP) network function device may receive, from a first network function device, a service request associated with a second network function device. The SCP network function device may transmit an access token request to a network repository function (NRF) network function device. The SCP network function device may receive, based on the access token request, an access token associated with the first network function device. The SCP network function device may transmit the service request to the second network function device, wherein the service request is transmitted to the second network function device with an indication of the access token.
A device may include a processor. The processor may be configured to: receive, from one or more network components, key performance indicators (KPIs) and parameters that are associated with a User Equipment device; select a scheduling strategy, for data communications over a wireless link between the device and the UE, based on the KPIs and the parameters; apply the selected scheduling strategy to schedule data for transmission to the UE; and transmit the data to the UE based on the scheduling.
A method may include identifying an event in a network and identifying a template in response to the event. The template may identify actions to be performed to service data traffic associated with the event. The method may also include determining, by an event controller, that at least one wireless station in the network has capacity to service data traffic associated with the event and transmitting, by the event controller and based on the identified template, instructions to at least one device to implement changes to the least one wireless station. The method may further include instantiating the changes to the at least one wireless station.
A device described herein may maintain a model associating sets of traffic attributes with respective sets of attributes of user interface (“UI”) elements; receive a request to associate a particular UI element with a particular set of Quality of Service (“QoS”) parameters; identify a first set of attributes of the particular UI element; identify that the first set of attributes, of the particular UI element, matches a second set of attributes of UI elements included in the model; and identify a particular set of traffic attributes indicated in the model as being associated with the second set of attributes of UI element attributes. The device may identify traffic associated with the particular set of traffic attributes; and may process the identified traffic in accordance with the particular set of QoS parameters indicated in the request, based on identifying that the traffic is associated with the particular set of traffic attributes.
H04L 47/2441 - Traffic characterised by specific attributes, e.g. priority or QoS relying on flow classification, e.g. using integrated services [IntServ]
G06F 3/0481 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
5.
SYSTEM AND METHOD FOR DYNAMIC AUTHORIZATION OF PRIORITY-BASED SESSION
A method, network device, system, and non-transitory computer-readable storage medium are described in relation to priority-based service authorization, including receiving, via an application service, a session request from a user equipment device (UE), wherein the session request includes a priority service subscription indicator associated with invoking a priority service session with the UE; determining, based on an applicable policy, a first authorization of the application service for the priority service; obtaining, from a user data function and based on the first authorization, a subscriber profile associated with the UE; sending, to an authenticator, a request for a second authorization of the UE for the priority service based on a verification of the priority service subscription indicator to the subscriber profile; receiving, from the authenticator, a verification message of the second authorization; and notifying, based on the verification message, the application service of the invoking of the priority service session.
A system described herein may monitor Key Performance Indicators (“KPIs”) of a radio access network (“RAN”) that implements a first radio access technology (“RAT”), such as a Fifth Generation (“5G”) RAT. The system may determine, based on monitoring the KPIs of the RAN, that a particular RAN condition has occurred, and may notify a Fixed Wireless Access (“FWA”) device, that is wirelessly connected to the RAN via the first RAT and that is also wirelessly connected to a plurality of client devices via a second RAT, such as a WiFi RAT, that the particular RAN condition has occurred. The FWA device may implement one or more policies for communications between the FWA device and the plurality of client devices based on receiving the notification that the particular RAN condition has occurred.
A Fixed Wireless Access (FWA) gateway (GW), wirelessly connected to a mobile network, receives user equipment device (UE) Route Selection Policy (URSP) information that includes UE policy rules. The FWA GW determines UEs that are connected to the FWA GW and determines policy rules for each of the connected UEs based on the received URSP UE policy rules. The FWA GW distributes the determined policy rules to each of the connected UEs for policy application at each of the connected UEs.
One or more systems and/or methods are provided for identifying one or more target roads of a point of interest (POI) and/or identifying impressions of the POI. In an example, a first target road of a POI may be identified, wherein the POI is viewable from the first target road. A plurality of locations of a User Equipment (UE) may be determined. A set of locations, of the plurality of locations, that are within a threshold distance of a road object corresponding to the first target road may be identified. It may be determined that the UE is associated with the impression based upon the set of locations meeting a threshold amount of locations.
In some implementations, a first device may obtain first channel state information (CSI) of a second device. The first device may determine that a variance of the first CSI exceeds a variance threshold. The first device may determine that a motion event has occurred based on determining that the variance, of the first CSI, exceeds the variance threshold. The first device may determine a location of the motion event based on the first CSI and second CSI of a third device. The first device may adjust an operation of one or more devices associated with the location based on determining the motion event.
H04W 64/00 - Locating users or terminals for network management purposes, e.g. mobility management
H04B 7/06 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
10.
SYSTEMS AND METHODS FOR UTILIZING A MACHINE LEARNING MODEL FOR SENTENCE BOUNDARY DETECTION
A device may receive text data, may extract phrases from the text data, and may calculate question scores for the phrases. The device may determine whether the phrases are associated with single answers or multiple answers, may calculate, single answer scores for the phrases associated with the single answers, and may calculate multiple answer scores for the phrases associated with the multiple answers. The device may extract, from the phrases, phrase data identifying grammar data, start tag data, and end tag data, and may process the phrase data, the single answer scores, and the multiple answer scores, with a machine learning model, to generate valid sentence scores for the text data. The device may identify, as a valid sentence, a group of phrases of the text data associated with a highest one of the valid sentence scores, and may add punctuation to the valid sentence to generate a final sentence.
A device may receive user activity data identifying activities of a user, and content data identifying text transcripts associated with the user. The device may generate a first custom embedding associated with the user based on the user activity data, and may process the first custom embedding, with a machine learning model, to generate an intent of the user and a next action for the user based on the intent. The device may process the content data to generate a second custom embedding for the user and an end user vector based on the second custom embedding, and may generate a document vector for the user based on the next action for the user. The device may process the document vector and the end user vector, with a language model, to generate a document for the user, and may perform one or more actions based on the document.
The present teaching relates to recommendation. Current event information and historic sequence data are received. The former characterizes a current event involving a user and user's interactions with a user interface (UI). The latter includes UIs and corresponding user interactions thereon with corresponding performance data. A task sentence is created with multiple tokens, each of which corresponds to a task. The current event information, the historic sequence data, and the task sentence are used for predicting a next item to be recommended via a mixture of expert (MoE) prediction model, trained via multi-task learning. The next item is recommended to the user on the UI.
A system described herein may identify a particular value that was wirelessly received by a User Equipment (“UE”) at a first time. The particular value may have been recorded to a blockchain, along with a second time, at which the particular value was outputted by a base station of a wireless network. The particular value may include a randomly generated number. The system may determine a location of the base station from which the particular value was outputted. The location of the UE may be determined based on a delay time associated with the particular value, which may be determined based on a difference between the first and second times. The location of the UE may further be determined (e.g., using triangulation techniques) based on values outputted by other base stations, for which the blockchain includes records indicating times at which such values were outputted by the other base stations.
A device may receive data identifying network slices and applications permitted on the network slices, and data identifying addresses of the applications permitted on the network slices. The device may provide, to a UE, a list of the network slices and the applications permitted on the network slices, and may receive, from the UE, a UE identifier and subscribed to applications from the list. The device may create rules for the subscribed to applications and corresponding network slices, and may associate the rules for the subscribed to applications and the corresponding network slices with the UE identifier. The device may receive, from a network function, a request for the rules associated with the UE identifier, the subscribed to applications, and the corresponding network slices, and may provide, based on the request, the rules to the UE via the network function.
A device may receive user criteria associated with a route for network performance testing of a network, network data associated with the network, and cartographic data associated with a location of the network. The device may calculate network spatial data based on the user criteria and the network data, and may perform feature extraction of the network spatial data to calculate network statistics and to extract network event locations. The device may generate waypoint criteria based on the network statistics and the network event locations, and may map the network spatial data to valid roadways identified in the cartographic data to generate mapped data. The device may identify a list of viable waypoints based on comparing the mapped data and the waypoint criteria, and may process the list of viable waypoints, the network data, and the cartographic data, with a clustering model, to generate the route.
In some implementations, a device may identify a network node that supports a first radio access technology (RAT), wherein the network node is associated with sessions with user equipments (UEs). The device may calculate a percentage of traffic from the sessions that is associated with the first RAT and not a second RAT. The device may determine that the network node is associated with a score based on the percentage of traffic associated with the first RAT not satisfying a threshold. The device may collect, based on the network node being associated with the score, device data associated with the UEs. The device may determine a network issue associated with the network node based on the device data. The device may determine a root cause for the network issue. The server may transmit an indication of the root cause.
H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
H04L 43/062 - Generation of reports related to network traffic
A method, an end device, and a non-transitory computer-readable storage medium are described in relation to an application and network slice mapping service. The application and network slice mapping service may include mapping an end device application to multiple application categories of the connection capabilities component of the traffic descriptors associated with route selection policies. For example, the end device application may be separated into multiple application traffic characteristics or different application categories. The mapping service may map the application categories to one or multiple network slices. The mapping service may assign a quality of service identifier value to each application category. The mapping service may apply a scheduling algorithm to the application categories that share the same network slice.
In the various embodiments, systems and methods are disclosed for determining user engagement with an application based on network traffic data corresponding to network traffic on a network. An aspect of the present disclosure is a method comprising obtaining network traffic data for a period of time, the network traffic data including a plurality of host calls; determining a host call sequence from the plurality of host calls, the host call sequence including one or more of the plurality of host calls; identifying an application corresponding to the host call sequence based on an augmented dataset; and determining a number of users of the application for the period of time based on a number of times the host call sequence repeats in the network traffic data.
In some implementations, a radio access network (RAN) may obtain data rate information from a device. The device may be associated with an application and the data rate information may be associated with the application. The RAN may determine, based on the data rate information, one or more data rate parameters associated with the application. The one or more data rate parameters may include at least one of one or more radio frequency parameters, one or more network loading parameters, one or more mobility parameters, or an available data rate parameter. The RAN may transmit, to the device, the one or more data rate parameters.
H04L 47/25 - Flow controlCongestion control with rate being modified by the source upon detecting a change of network conditions
H04L 47/283 - Flow controlCongestion control in relation to timing considerations in response to processing delays, e.g. caused by jitter or round trip time [RTT]
20.
SYSTEMS AND METHODS FOR AUTOMATED DEPLOYMENT OF LOAD-BALANCED SERVICES IN A CONTAINERIZED ENVIRONMENT
A system described herein may receive a request to configure a load-balanced service in a containerized environment. The system may include an indication of a particular network with which the load-balanced service should communicate. The system may generate a load balancer proxy node. Generating the load balancer proxy node may include associating the load balancer proxy node with a first interface associated with the particular network and with a second interface associated with the containerized environment. The system may generate a set of service node instances, which may include associating the set of service node instances with a third interface associated with the containerized environment. The system may associate the second interface with the third interface and may deploy, in response to the request, the set of load balancer proxy node instances and the set of service node instances to the containerized environment.
A device may receive session data of a communication session between an artificial intelligence (AI) communication device and a first user device. The device may analyze the session data to determine one or more portions of the session data and may identify a portion, of the one or more portions, for processing based on one or more criteria associated with the portion. The portion may include a plurality of entries including communications from the first user device and from the AI communication device. The device may analyze the plurality of entries to identify an entry including information regarding an escalation and may analyze one or more additional entries, of the plurality of entries, to determine a category associated with a cause of the escalation. The device may cause the AI communication device to be configured to address the cause based on the one or more additional entries and the category.
H04L 51/02 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail using automatic reactions or user delegation, e.g. automatic replies or chatbot-generated messages
A device may receive control traffic that includes a plurality of provisioning events associated with a network, and may identify provisioning events, of the plurality of provisioning events, that are associated with a service. The device may calculate a quantity of the provisioning events that are associated with the service, and may determine whether the quantity of the provisioning events satisfies a quantity threshold. The device may provide the quantity of the provisioning events to network devices that provide the service to subscribers based on the quantity of the provisioning events failing to satisfy the quantity threshold, or may calculate a remaining quantity of the provisioning events that are associated with the service based on the quantity of the provisioning events satisfying the quantity threshold.
A system described herein may receive a first authentication request that includes a first identifier of a User Equipment (“UE”), and a second identifier of a second device. The system may output a second authentication request to a wireless network with which the UE is associated, which may include the first identifier of the UE. The system may receive, in response to the second authentication request an indication that the UE has been authenticated, and location information associated with the UE. The system may identify one or more services associated with the received location of the UE, and may output, to the second device and based on the response to the second authentication request, traffic associated with the identified one or more services.
H04L 67/51 - Discovery or management thereof, e.g. service location protocol [SLP] or web services
H04L 67/52 - Network services specially adapted for the location of the user terminal
H04L 67/75 - Indicating network or usage conditions on the user display
24.
SYSTEMS AND METHODS FOR UTILIZING GENERATIVE ARTIFICIAL INTELLIGENCE TECHNIQUES TO CORRECT TRAINING DATA CLASS IMBALANCE AND IMPROVE PREDICTIONS OF MACHINE LEARNING MODELS
A device may receive first data associated with a first class and second data associated with a second class that is different than the first class, and may process the first data, with a generative adversarial network model, to generate synthetic data. The device may train a variational autoencoder (VAE) model using the second data, to generate a trained VAE model, and may utilize the first data, the second data, and the synthetic data with the trained VAE model to generate anomaly scores. The device may combine the anomaly scores with the first data, the second data, and the synthetic data to generate final data, and may train a machine learning model with the final data to generate a trained machine learning model. The device may perform one or more actions based on the trained machine learning model.
In some implementations, a call session control function (CSCF) may receive, from a user equipment (UE), a message associated with a text message sent from the UE to an emergency number. The CSCF may add, based on the message being associated with the text message sent to the emergency number, an enhanced 911 (e911) attribute to the message, wherein the e911 attribute provides prioritized handling for the message during network congestion in relation to messages without the e911 attribute. The CSCF may transmit the message having the e911 attribute.
Systems and methods described herein providing consumer-driven access to network slices. A network device receives, from a user device, a slice selection to associate an application on the user device with a network slice. A slice recommender device generates a slice recommendation based on at least one of device parameters or network parameters. The network device provides, to the user device, the slice recommendation for presentation to the user.
H04W 48/18 - Selecting a network or a communication service
H04M 1/72469 - User interfaces specially adapted for cordless or mobile telephones for operating the device by selecting functions from two or more displayed items, e.g. menus or icons
H04W 48/16 - DiscoveringProcessing access restriction or access information
27.
SYSTEMS AND METHODS FOR OPTIMAL NETWORK SLICE SELECTION
A device may include a processor. The processor may be configured to: receive, from an external device outside a cellular network, a request to provide network slice information for an application which is to receive a service from a network slice when the application is installed and running on a User Equipment device (UE); select optimum network slices for providing the service to the application; and provide the network slice information to the external device, wherein the network slice information identifies the optimum network slices. The external device may be configured to download the application to the UE.
H04L 41/40 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities
H04W 24/02 - Arrangements for optimising operational condition
28.
SYSTEMS AND METHODS FOR HYPER-PRECISE TIME OPERATIONS
Disclosed are systems and methods for a computerized Hyper-precise time (HPT) framework that accurately and efficiently provides precise time data for all sorts of network-based and local operations. The disclosed HPT framework can, among other benefits, provide sub-nanosecond time accuracy for operations involving, but not limited to, precise positioning, ambiguity resolution, mitigation of signal delays, maintaining continuous and accurate tracking for dynamic applications, improved convergence for accurate solutions, and the like. The framework can be utilized for Real-Time Kinematic (RTK), such that the determined HPT can directly contribute to achieving the high levels of accuracy and reliability required in RTK applications.
One or more computing devices, systems, and/or methods for providing multi-screen navigation for an application such as a mobile application are provided. An instance of the application is hosted on a mobile device. A primary display interface is populated with a first screen of the application for display through the mobile device. In response to detecting a trigger through the application, a secondary display interface is generated and populated with a second screen of the application for display through the mobile device while the primary display interface is being displayed through the mobile device. A first backstack of the application is utilized to track user navigation amongst screens of the application through the primary display interface. A second backstack of the application is utilized to track user navigation amongst the screens of the application through the secondary display interface.
G06F 3/04845 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range for image manipulation, e.g. dragging, rotation, expansion or change of colour
G06F 3/0481 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
A device may receive, from a first device, first tracking data that includes first temporal data and first location data, and may receive, from a second device, second tracking data that includes second temporal data and second location data. The device may generate a first spatio-temporal object based on the first tracking data, and may generate a second spatio-temporal object based on the second tracking data. The device may calculate a matching score associated with the first spatio-temporal object and the second spatio-temporal object, and may determine whether the matching score satisfies a score threshold. The device may determine that the first device is associated with the second device based on determining that the matching score satisfies the score threshold, and may perform one or more actions based on determining that the first device is associated with the second device.
According to disclosed embodiments, as discussed below, a cell broadcasting framework is provided including receiving a request from a Network Function (NF) consumer by a service communication proxy (SCP) on a network, the request including a set of parameters, identifying a plurality of target NF producers corresponding to the set of parameters, transmitting the request to the plurality of target NF producers, receiving a plurality of successful request responses corresponding to some or all of the plurality of target NF producers, transmitting one of the plurality of successful request response to the NF consumer, and discarding all other successful request responses.
In some implementations, a first network device may encode Internet Protocol version 4 (IPv4) network layer reachability information (NLRI) using Internet Protocol version 6 (IPv6) next hop encoding to generate encoded IPv4 NLRI. The first network device may include information indicating border gateway protocol (BGP) labeled unicast (BGP-LU) in the encoded IPv4 NLRI. The first network device may advertise the encoded IPv4 NLRI. The first network device may establish a communication session with a second network device, wherein the communication session is established via an IPv6 core network. The first network device may forward, via the communication session, one or more IPv4 packets using the encoded IPv4 NLRI.
H04L 45/50 - Routing or path finding of packets in data switching networks using label swapping, e.g. multi-protocol label switch [MPLS]
H04L 61/251 - Translation of Internet protocol [IP] addresses between different IP versions
H04L 101/659 - Internet protocol version 6 [IPv6] addresses
H04L 101/686 - Types of network addresses using dual-stack hosts, e.g. in Internet protocol version 4 [IPv4]/Internet protocol version 6 [IPv6] networks
33.
METHOD AND SYSTEM FOR MACHINE LEARNING MODEL GENERATION AND ANOMALOUS EVENT DETECTION
One or more computing devices, systems, and/or methods for machine learning model generation and/or anomalous event detection are provided. In an example, one or more datasets having first fields are identified. Significance scores associated with the first fields are determined. Second fields are selected from the first fields based upon the significance scores. Field combinations are generated based upon the second fields. Based upon the field combinations, a plurality of machine learning models is generated. The plurality of machine learning models include a first machine learning model associated with a first field combination of the field combinations, and a second machine learning model associated with a second field combination of the field combinations. The plurality of machine learning models is deployed in a data monitoring pipeline. Using the plurality of machine learning models, an anomalous event is detected based upon data passing through the real-time data monitoring pipeline.
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
Disclosure are techniques for allocating aggregation devices in a lawful intercept system. In an embodiment, a method includes maintaining a list of point of interception aggregation (PAG) functions in a network function repository function (NRF) of a cellular network upon instantiation of the PAG functions; receiving a lawful intercept (LI) request; querying the NRF to determine a respective PAG function; and associating a point of interception (POI) function with the respective PAG function.
In an example, an emergency communication session request is received from a first user equipment (UE). In response to the emergency communication session request, a communication session between the first UE and a first public safety answering point (PSAP) may be established. In response to the emergency communication session request, a first emergency message may be provided to an emergency contact of the first UE.
H04W 76/50 - Connection management for emergency connections
H04W 4/48 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for in-vehicle communication
A device described herein may establish a communication session with a first Security Edge Protection Proxy (“SEPP”) of a first network, and further with a second SEPP of a second network. The device may be or may implement an intermediary gateway between the SEPPs. The communication session may be associated with an N32-F interface that includes the SEPPs, the intermediary gateway, and one or more other intermediary gateways. The device may receive traffic from the first SEPP, and may determine that the traffic satisfies one or more error conditions. The device may identify an error reporting policy associated with the identified error condition, and may output, to the first SEPP and/or to the second SEPP (e.g., in accordance with the error reporting policy), an indication that the traffic satisfies the one or more error conditions.
A method, a network device, a system, and a non-transitory computer-readable storage medium are described in relation to an device status intelligence function service. The device status intelligence function service may include event monitoring and notification services. The device status intelligence function service may include generating policies based on application requirements pertaining to an application and an end device. The application requirements may include end device criteria that may be specified by a third party application network device. The device status intelligence function service may include generating a communication profile, based on the policies, that enable end device criteria monitoring in a network. The device status intelligence function service may provide notifications to the third party application network device when requested events occur.
In some implementations, a network element may receive information indicating a list of user equipments (UEs) that are off a wireless network. The network element may receive a verification request to verify a call received by the wireless network. The network element may determine, in response to the verification request and based on the information, whether a UE authorized to use a calling number associated with the call is on the wireless network. The network element may transmit an indication of whether the UE is on the wireless network.
In some implementations, the techniques described herein relate to a method including: receiving an expected object and a candidate object; computing a similarity coefficient between the expected object and the candidate object; computing an edit distance between the expected object and the candidate object; computing an embedding similarity between the expected object and the candidate object; and computing a matching score between the expected object and the candidate object based on the similarity coefficient, the edit distance, and the embedding similarity, the matching score representing a likelihood that the candidate object has replaced the expected object.
In some implementations, a first network device may receive, from a user equipment (UE), a request for a network resource. The first network device may determine, based on the request for the network resource, a prioritization associated with the UE, wherein the prioritization relates to a quality of service (QoS) attribute of the UE or a message priority of a message associated with the request for the network resource. The first network device may determine that a resource availability of resources at the first network device is less than an availability threshold. The first network device may transmit a preemption message to at least one of the UE or a second network device, wherein the preemption message indicates an interruption to one or more network resources associated with the UE or one or more other UEs associated with the second network device.
Systems and methods provide for application-enabled multicast control. A network device receives first parameters for an application executed on a first user equipment (UE) device and receives second parameters for the application executed on a second UE device. The network device detects, based on the first and second parameters, a multicast opportunity for the application and provides, to an application server for the first UE device and the second UE device, a multicast target address to initiate multicast streaming to the first UE device and the second UE device.
A network device determines at least one of throughput variation and latency variation associated with at least one flow transiting a network slice of a mobile network. The network device compares the at least one of the throughput variation and the latency variation with performance requirements of the network slice, and determines, based on the comparing, network slice resources needed for capacity planning of the network slice. The network device adds or removes network slice resources from the network slice based on the determined network slice resources.
A device may include a processor configured to receive a data stream connection request via a WIFI connection or a wired connection and establish a cellular wireless connection with a base station based on the data stream connection request. The processor may be further configured to determine a cellular wireless Quality of Service (QOS) class or network slice assigned to the cellular wireless connection by a core network associated with the base station; map the cellular wireless QoS class or network slice to a priority class associated with the WIFI connection or the wired connection; assign the priority class to a data stream associated with the data stream connection request; and process data units associated with the data stream based on the assigned priority class.
A system described herein may maintain information indicating groups of wireless trip devices. The system may maintain information associating each wireless trip device, of a plurality of wireless trip devices, with respective edge computing devices. The system may receive a wireless alert from a particular wireless trip device, which indicates an electrical fault condition. The system may identify a particular group of wireless trip devices with which the wireless alert is associated, and may identify a particular set of edge computing devices that are associated with respective wireless trip devices of the group of wireless trip devices. The system may output, to each edge computing device of the identified particular set of edge computing devices, a notification based on the wireless alert, and each edge computing device may wirelessly communicate respective wireless trip devices based on the wireless alert received from the particular wireless trip device.
In some implementations, a server may receive a plurality of signal measurements associated with a coverage area, wherein the plurality of signal measurements are collected over a measurement period by a device within the coverage area while the device is associated with a fixed location. The server may identify a signal measurement from the plurality of signal measurements, wherein the signal measurement represents a baseline radio frequency (RF) environment for the coverage area without a threshold amount of interference or transient changes in the coverage area. The server may provide an output based on the baseline RF environment.
A device may provide a first optical signal to an optical fiber network via a live fiber cable, the first optical signal including a distributed fiber optic sensing optical signal, and may receive, from the optical fiber network, a second optical signal, based on the first optical signal and via the live fiber cable. The device may determine whether a vibration event associated with the live fiber cable is detected based on the second optical signal, and may perform one or more actions based on whether the vibration event associated with the live fiber cable is detected.
G01H 9/00 - Measuring mechanical vibrations or ultrasonic, sonic or infrasonic waves by using radiation-sensitive means, e.g. optical means
G01D 5/353 - Mechanical means for transferring the output of a sensing memberMeans for converting the output of a sensing member to another variable where the form or nature of the sensing member does not constrain the means for convertingTransducers not specially adapted for a specific variable using optical means, i.e. using infrared, visible or ultraviolet light with attenuation or whole or partial obturation of beams of light the beams of light being detected by photocells influencing the transmission properties of an optical fibre
48.
SYSTEMS AND METHODS FOR UTILIZING DISTRIBUTED FIBER OPTIC SENSING TO DETECT RISKS TO FIBERS
A monitoring system connected to a network may receive a request from a user device over the network to monitor a fiber cable. A fiber sensing device may connect to the monitoring system, may communicate messages with the monitoring system, and may connect to the fiber cable. The fiber sensing device may receive an instruction from the monitoring system to begin a monitoring function for the fiber cable, and may provide a first optical signal to the fiber cable. The fiber sensing device may receive, from the fiber cable, a second optical signal, based on the first optical signal, and may detect a risk to the fiber cable based on the second optical signal. The fiber sensing device may send an alert about the risk to the fiber cable to the monitoring system, and the monitoring system may send the alert over the network to the user device.
G01D 5/353 - Mechanical means for transferring the output of a sensing memberMeans for converting the output of a sensing member to another variable where the form or nature of the sensing member does not constrain the means for convertingTransducers not specially adapted for a specific variable using optical means, i.e. using infrared, visible or ultraviolet light with attenuation or whole or partial obturation of beams of light the beams of light being detected by photocells influencing the transmission properties of an optical fibre
49.
SYSTEMS AND METHODS FOR 5G CORE NETWORK ACCESS CONTROL
A device described herein, such as a User Equipment (“UE”), may receive an indication that the device is not authorized to access a first type of core network; detect a first set of wireless signals associated with a first network that is associated with the first type of core network; detect a second set of wireless signals associated with a second network that is associated with a second type of core network; and request, based on detecting the first and second sets of wireless signals and further based on the indication that the device is not authorized to access the first type of core network, establishment of a communication session with the second network.
Systems and methods described herein enable private telecommunications network subscribers that do not have a distinctive Public Land Mobile Network (PLMN) ID to access visited PLMN services. A device in a visited wireless network receives an attach request for a user equipment (UE) device; detects, based on the attach request, that the UE device is subscribed to a private network; provides, to a roaming identity register (RIR), a roaming authorization request for the UE device; receives a roaming authorization response that includes a network pointer to the private network; and applies, based on the roaming authorization response, a roaming policy for the UE device.
H04W 8/02 - Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]Transfer of mobility data, e.g. between HLR, VLR or external networks
51.
SYSTEMS AND METHODS FOR NETWORK FUNCTION DISCOVERY IN A SEGMENTED NETWORK
A method may include subscribing, by a first network repository function (NRF) located in a first segment of a network, to event information associated with a unified data management (UDM) function or a unified data repository (UDR) located in a second segment of the network. The method may also include receiving, by the first NRF and from a second NRF included in the second segment UDM or UDR information associated with the UDM or UDR located in the second segment of the network. The method may further include receiving, at the first NRF, a UDM or UDR discovery request from a network function (NF), wherein the UDM or UDR discovery request is associated with subscriber information stored in a UDM or UDR located in the second segment of the network, and responding, by the first NRF, to the discovery request.
H04L 41/122 - Discovery or management of network topologies of virtualised topologies e.g. software-defined networks [SDN] or network function virtualisation [NFV]
52.
SYSTEMS AND METHODS FOR INSTRUCTING A USER EQUIPMENT TO UTILIZE A FIFTH GENERATION (5G) NETWORK INSTEAD OF A WIRELESS NETWORK
A network device, of a fifth generation (5G) radio access network, may establish a connection or a session with a user equipment connected to a Wi-Fi network. The network device may determine an indicator indicating whether a 5G network preference is in effect based on a subscription of the user equipment and may provide the indicator to the user equipment. The network device may maintain the connection or the session with the user equipment when the indicator indicates that the Wi-Fi network is not preferred for Wi-Fi offload and may receive traffic from the user equipment when the indicator indicates that the Wi-Fi network is not preferred for Wi-Fi offload.
A device receives User Equipment device (UE) Policy Section Codes (UPSCs) and a first version of associated UE policy rules. The device further receives first inconsistency detection codes for the UPSCs and a current version of the associated UE policy rules. The device determines, based on the UPSCs and the first version of the associated UE policy rules, second inconsistency detection codes, and compares the first and second inconsistency detection codes to identify inconsistencies between the first version of the UE policy rules and the current version of the UE policy rules. The device sends, when the comparison identifies the inconsistencies, a request for updated UE policy rules, and receives one of the UPSCs and an updated version of an associated UE policy rule of the one of the UPSCs.
A system described herein may receive a request for a blockchain network to perform a particular set of operations, such as executing chaincode recorded to a blockchain associated with the blockchain network. The system may receive Key Performance Indicators (“KPIs”) of nodes of the blockchain network, and may receive a consensus policy associated with the blockchain network. The consensus policy may indicate a particular quantity of result sets used to verify execution of a given operation by the blockchain network. The system may assign different nodes of the blockchain network to perform different portions of the requested set of operations. The assignments may be determined based on the consensus policy and the KPIs of the nodes. The system may aggregate result sets from different nodes in order to generate aggregated result sets, where the quantity of aggregated result sets satisfies the consensus policy.
Disclosed are systems and methods for a computerized framework that operates a secure connection broker (SCB) for management and control of swarm communications. The SCB can define secure zones within a network(s), which can be leveraged to control and/or divert network traffic related to resource requests between entities based on the entities' designed zones. Secure zones, as managed by the SCB can serve as coordination centers for swarm activities among entities, thereby facilitating communication and data sharing among swarm members. The SCB(s) on a network can ensure that swarm communications are secure, controlled and efficient by providing a structured and protected environment for swarm nodes to operate.
A device may receive, from a service provider, a network address associated with a request for a service. The request for the service may be provided to the service provider by a user equipment associated with a network device. The device may receive, from the service provider, a query for a geolocation of the network device, and may determine the geolocation of the network device based on the network address. The device may provide the geolocation of the network device to the service provider.
In some implementations, an application programming interface (API) management platform may receive, from a user equipment (UE), a request to a unified application programming interface (API) proxy that supports multiple users with different certifications, different sets of registered endpoints, different API keys, and different authentication tokens, wherein the request is associated with a user of the multiple users. The API management platform may perform an evaluation of the request based on a comparison of information indicated in the request and information associated with the user, wherein the request is accepted based on a validation of the request or the request is blocked based on an invalidation of the request.
In some implementations, a call session control function (CSCF) may identify information associated with a user equipment (UE). The CSCF may determine, based on the information, whether the UE is roaming in a circuit switched mobility network. The CSCF may transmit signaling associated with delivering a call to the UE, wherein the signaling bypasses a service continuity gateway (SCG) on a call delivery path when the UE is not roaming in the circuit switched mobility network and the signaling traverses the SCG on the call delivery path when the UE is roaming in the circuit switched mobility network.
A system described herein may efficiently perform a multi-destination backward search, which may be a part of performing a bidirectional search in a node map that implements contraction hierarchy techniques. Lowest cost paths to each node reachable to each destination node of a set of destination nodes may be computed. A queue may be initialized with the set of destination nodes. For each particular node in the queue, the system may add higher priority neighbors of the particular node to the queue, identify costs of outgoing links from the particular node to the higher priority neighbors, compute lowest cost paths associated with the set of destination nodes based on the identified costs of outgoing links from the particular node to the higher priority neighbors and any previously computed lowest cost paths associated with the set of destination nodes, and increment to a next node in the queue.
In some implementations, a network element may identify gaming traffic associated with a user equipment (UE). The network element may detect a traffic pattern associated with the gaming traffic. The network element may determine that the UE is associated with a prioritized service, wherein the prioritized service is associated with network slicing. The network element may perform a network scheduling for the UE that prioritizes the gaming traffic associated with the UE over non-gaming traffic associated with another UE, wherein the network scheduling is based on the traffic pattern and the UE being associated with the prioritized service.
H04W 28/02 - Traffic management, e.g. flow control or congestion control
H04W 72/566 - Allocation or scheduling criteria for wireless resources based on priority criteria of the information or information source or recipient
Systems and methods described herein provide dynamic network slicing. A network device receives, from an application server, application performance requirements for an application and receives capability and performance information of an existing network slice that is servicing a User Equipment (UE) device using the application. The network device determines, based on the capability and performance information, that a new network slice is needed to support the application performance requirements for the UE device; and sends a signal to initiate a slice creation process for the new network slice.
An illustrative intent classification engine may access a text transcript and determine one or more features associated with the text transcript. Based on the one or more features, the intent classification engine may generate an aggregate embedding vector and provide the aggregate embedding vector as an input to a trained model configured to output an intent classification. Corresponding methods and systems are also disclosed.
A network device may select a target reliability from a table that includes a list of target reliabilities not associated with a default reliability, and may provide the target reliability to a user equipment. The user equipment may be configured to associate the target reliability with a channel quality indicator (CQI) process that computes CQI values that satisfy the target reliability.
H04W 72/542 - Allocation or scheduling criteria for wireless resources based on quality criteria using measured or perceived quality
H04B 7/06 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
H04L 1/00 - Arrangements for detecting or preventing errors in the information received
H04L 1/20 - Arrangements for detecting or preventing errors in the information received using signal-quality detector
64.
SYSTEMS AND METHODS TO MAXIMIZE COVERAGE OF PREFERRED FREQUENCY BANDS
Systems and methods provide for dynamic updates of downlink (DL) Reference Signal Received Power (RSRP) thresholds to maximize uplink (UL) coverage on cells with a preferred frequency band. A network device identifies a desired minimum UL signal-to-interference-plus-noise ratio (SINR) value for a source cell; maps the minimum UL SINR value to a corresponding DL RSRP value for the source cell; and determines, based on the DL RSRP value, a loaded DL RSRP value that reflects an estimated interference level for a time period. The network device provides one or more DL RSRP thresholds for implementation in the source cell based on the loaded DL RSRP value.
In some implementations, an Internet Protocol multimedia subsystem (IMS) entity may receive, from a home subscriber service (HSS) or a unified data management (UDM), an identifier associated with a government emergency telecommunications service (GETS) subscription, wherein the identifier includes a selection prefix. The IMS entity may identify that a call is associated with GETS based on the identifier. The IMS identifier may transmit, to a network node, an indication that the call is associated with GETS.
A device of a first network, to which a User Equipment (“UE”) is wirelessly connected, may receive, a request to access a service provided by a second network. The device may establish, based on the request, a user plane connection between the first network and the second network while the UE remains wirelessly connected to the first network. The first network may receive, from the UE, traffic that is associated with the service, and may output the received traffic to the second network via the user plane connection. The first and second networks may communicate via a connection, such as a tunnel, via respective User Plane Functions (“UPFs”) of the first and second networks. The UPFs may communicate via an N9 interface. The service may be provided by an edge computing device of the second network.
A method, a network device, a system, and a non-transitory computer-readable storage medium are described in relation to an gateway type monitoring event service. The gateway type monitoring event service may include providing a current gateway type associated with an end device and a network to an application function. The current gateway type may be used by the application function to perform a network operation or procedure.
A device may authenticate a first application provided to a first client and a second application provided to a second client. The device may receive a communication initiated by the first client via the first application, and may provide the communication to the second application. The device may enable the communication to be answered by the second client via the second application, and may establish a data channel for the communication. The device may enable a request to grant access to the second application as an avatar to be provided to the second application, and may enable the request to be accepted by the second client via the second application. The device may enable the first application to provide avatar volumetric reconstruction data and an avatar position and rotation to the second application, and may enable the second application to provide foveated equirectangular data to the first application.
A63F 13/335 - Interconnection arrangements between game servers and game devicesInterconnection arrangements between game devicesInterconnection arrangements between game servers using wide area network [WAN] connections using Internet
G06T 13/40 - 3D [Three Dimensional] animation of characters, e.g. humans, animals or virtual beings
69.
DYNAMIC INTER-REGION CONNECTION DISTRIBUTION TO 5G NETWORK FUNCTIONS
The disclosed embodiments involve recording performance metrics for network connections in a centralized database, storing network connection data in a global registry across multiple data centers, detecting backlogs at specific data centers linked to network elements and connections, and generating updated connection assignments. These assignments include identifiers for the involved data centers and connections. Upon receiving a connection assignment update notification, the method updates the network connection and communicates the first data center's connection state to the global registry.
A predictive modeling approach to managing cellular network infrastructure is disclosed. In an embodiment, a method can include receiving raw data from a plurality of data sources populated while operating a cellular network. The method can then generate per-logical cell site data by normalizing the raw data based on a set of LCSs in the cellular network to generate per-LCS data. The method can then generate an example from the per-LCS data and generate a predicted energy consumption value for the given LCS by inputting the example into a predictive model (e.g., a decision tree-based model, such as an XGBoost model). From this output, the method can determine if the predicted energy consumption value is higher than an expected energy consumption value (e.g., a historical range of consumption). If so, the method can then label the given LCS as an outlier.
Disclosed are systems and methods for a network framework for Wi-Fi barring of network usage that enables network management at a device level, which provides capabilities for the optimization of internet connectivity and data usage based on a user's and/or device's specific needs and priorities. The framework operates to handle information management system (IMS) connections and IMS registration failures over evolved Packet Data Gateways (ePDG). The framework provides a Wi-Fi backoff timer that can be implemented for particular Wi-Fi networks, which can correspond to a Wi-Fi access point (AP). Thus, a connected device (e.g., a user's smart phone) can toggle connectivity to and/or from a cellular network in accordance with encountered failures with an AP via the timer's implementation and network control of the device.
A device may include a processor. The processor may be configured to: receive, from a User Equipment device (UE) over a wireless connection, a request to enroll an application installed on the UE to receive a service from a network slice; select a network slice to provide the service to the application on the UE; bind the application on the UE to the selected network slice; and send an enrollment reply to the UE. The processor may perform a dynamic, short-term application enrollment or a long-term application enrollment, to enable the application to access the service.
A device may receive forward facing video data associated with a vehicle, and may process the forward facing video data, with neural network models, to detect lane lines and to determine classifications for the lane lines. The device may utilize the forward facing video data to generate a histogram of horizontal positions of the vehicle, and may fit probability density functions on the histogram to calculate a mean and a standard deviation. The device may utilize the mean and the standard deviation to identify a crossing interval, and may classify the forward facing video data as a lane crossing or a lane change based on the crossing interval. The device may calculate a lane crossing score or may calculate a lane change score. The device may perform actions based on the lane crossing score or the lane change score.
G06V 20/56 - Context or environment of the image exterior to a vehicle by using sensors mounted on the vehicle
B60R 1/22 - Real-time viewing arrangements for drivers or passengers using optical image capturing systems, e.g. cameras or video systems specially adapted for use in or on vehicles for viewing an area outside the vehicle, e.g. the exterior of the vehicle
G06V 10/50 - Extraction of image or video features by performing operations within image blocksExtraction of image or video features by using histograms, e.g. histogram of oriented gradients [HoG]Extraction of image or video features by summing image-intensity valuesProjection analysis
G06V 10/764 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using classification, e.g. of video objects
G06V 10/82 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using neural networks
74.
METHOD AND SYSTEM FOR NETWORK MANAGEMENT AND FAIRNESS CRITERIA ADJUSTMENT IN CELLULAR NETWORKS FOR MULTI-DWELLING UNITS
Methods and systems are provided for managing data transmission within a cellular network. A base station detects the attachment of a Fixed Wireless Access (FWA) gateway. Upon detection, the base station determines a traffic cap for the FWA gateway based on this attachment. The base station then generates a normalized data rate for the FWA gateway by weighting its achieved data rate. Subsequently, the fairness criteria of a Radio Access Network (RAN) scheduler are adjusted based on this normalized data rate. This methodology ensures a balanced and efficient allocation of resources within the network.
A network device may receive, from a user device, a request for data associated with network slices provided to a region or a network, and may provide, to the user device, network slice data, quality of service (QOS) levels, and a policy lookup table based on the request. The network device may receive, from the user device, priority data identifying a network slice for prioritization, a duration of the prioritization, and a policy for the prioritization, and may create, based on the priority data, a QoS policy table that includes a QoS level for the network slice. The network device may cause network functions to utilize the QoS policy table for a user equipment.
One or more computing devices, systems, and/or methods for low power consumption geofencing are provided. During a learning phase, a model is generated to determine whether a device is within a geofence. In response to receiving a first lookup location request, location identification logic is used to determine a first device location and a determination is made as to whether the device is within the geofence. First radio signal information associated with determining the first device location is recorded within a training data structure used to create the model. In response to receiving a second lookup location request after the learning phase, the model is used to determine whether the device is within the geofence. An output by the model is used if a confidence level is above a threshold, otherwise, the location identification logic is used.
G08B 21/02 - Alarms for ensuring the safety of persons
G06F 30/27 - Design optimisation, verification or simulation using machine learning, e.g. artificial intelligence, neural networks, support vector machines [SVM] or training a model
77.
SYSTEMS AND METHODS FOR UDM/UDR-INITIATED UE CONTEXT MANAGEMENT
A system described herein may maintain User Equipment (“UE”) context information associated with one or more communication sessions between a particular UE and a wireless network, and may detect that one or more triggering events have occurred with respect to the particular UE or the one or more communication sessions. The system may output, based on detecting the one or more triggering events, a status update request. The request may include an identifier of the particular UE and/or an identifier of a particular communication session between the particular UE and the wireless network. The system may receive a response to the status update request, and may selectively remove at least a portion of the maintained UE context information, associated with the one or more communication sessions between the particular UE and the wireless network, based on the response to the status update request.
A method, a network device, a system, and a non-transitory computer-readable storage medium are described in relation to an RAT type monitoring event service. The RAT type monitoring event service may include providing a current RAT type associated with an end device and a network to an application function. The RAT type monitoring event service may also include providing a notification to the application function when the end device changes its RAT type. The current RAT type may be used by the application function to perform a network operation or procedure. The application function may subscribe to a monitoring and event notification associated with the RAT type monitoring event service.
A network device may establish an interface with a unified data management (UDM) device, and may utilize the interface to register with the UDM device and to provide, to the UDM device, registration data identifying an association between the network device and a user equipment (UE). The network device may provide policy data to a network data analytics function (NWDAF) that identifies the network device based on the registration data, and may receive, from the NWDAF, analytics calculated based on the policy data. The network device may perform one or more actions based on the analytics.
The present teaching relates to customer service with AI-based automated auditing on agent fraud. Real-time features of a communication between an agent and a customer are obtained. To detect agent fraud, a batch feature vector is computed based on real-time features extracted from communications involving the agent and accumulated over a batch period. Agent fraud is detected based on a model and the detection result is used to audit the agent for service performance.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
Systems and methods described provide a multiple-input multiple-output (MIMO) optimization service. A network device in a RAN predicts high usage thresholds and available per-service resources for supporting MIMO transmissions. The network device identifies, based on the predicted usage thresholds, user equipment (UE) devices that have a high-throughput session and have high usage levels on a cell. The network device assigns, based on the predicted available per-service resources, sounding reference signal (SRS)-based MIMO resources to the UE devices in the cell and assigns codebook-based MIMO resources to other UE devices in the cell.
A device may include a processor configured to obtain requirements for a wireless communication service to be deployed on a carrier on a sector of a base station and obtain key performance indicator (KPI) values for the carrier on the sector of the base station. The processor may be further configured to use a trained machine learning model to determine a required capacity and a predicted average latency for the wireless communication service based on the obtained requirements and the obtained KPI values; determine that the wireless communication service satisfies a deployment requirement to be deployed on the carrier on the sector of the base station based on the determined required capacity and the predicted average latency; and deploy the wireless communication service on the carrier on the sector of the base station, in response to determining that the wireless communication service satisfies the deployment requirement.
H04L 41/0896 - Bandwidth or capacity management, i.e. automatically increasing or decreasing capacities
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
H04L 41/5009 - Determining service level performance parameters or violations of service level contracts, e.g. violations of agreed response time or mean time between failures [MTBF]
83.
SYSTEMS AND METHODS FOR CROSS-CHAIN CHAINCODE ACCESS AND INTEROPERABILITY
A system described herein may identify a chaincode record recorded to a blockchain, and may output chaincode discovery information to a chaincode discovery system. A client device may receive the chaincode discovery information from the chaincode discovery system, and may output a request to invoke the chaincode. The system may obtain verification, from the chaincode discovery system, that the client device is authorized to invoke the chaincode, and may instruct a node that maintains the blockchain to execute the chaincode. The system may receive output values resulting from executing the chaincode and may output, to the client device, the output values resulting from executing the chaincode.
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
84.
SYSTEMS AND METHODS FOR MODIFYING SESSIONS IN ACCORDANCE WITH A USER PLANE FUNCTION SELECTION BASED ON LATENCY
In some implementations, a session management function (SMF) may transmit, to a network data analytics function (NWDAF), an analytics message that requests or subscribes to analytics for user equipment (UE) to user plane function (UPF) (UE-to-UPF) latency. The SMF may receive, from the NWDAF, analytics information in response to the analytics message, wherein the analytics information indicates present or future predicted UE-to-UPF latency information for one or more of a downlink direction or an uplink direction. The SMF may transmit a session modify message to modify a protocol data unit (PDU) session, wherein the PDU session is to be modified based on a UPF selection, and the UPF selection is based on the analytics information.
Disclosed are systems and methods for a computerized framework enacted by service contact centers that provides a proactive and adaptive response system that accurately identifies security and/or legal concerns of service requests, and enables artificial intelligence/machine learning (AI/ML)-based mechanisms for dynamically addressing the underlying technical and/or service related concerns of such service requests. The disclosed framework can computationally determine how effective service agents have been, and are currently being in curating solutions/responses to each customer service call, which can enable modified functionality for the customer as well as curated services based on how sufficiently handled the service call was responded to by the agent. The disclosed systems and methods provide a generative service call experience that can improve agent performance while reducing the strain on user experience, both during and/or after service calls.
One or more computing devices, systems, and/or methods for low power consumption geofencing are provided. Location determination facilities used during a past number of device location lookups over a timeframe are tracked. If a geofence is actively set and movement of a device has triggered execution of location identification logic, then a determination is made as to whether a particular location determination facility was used during the past number of device location lookups over the timeframe. If the particular location determination facility was used during the past number of device location lookups over the timeframe, then an original sequence of location determination facilities attempted by the location identification logic is modified to create a modified sequence of location determination facilities used to determine a current device location of the device. Otherwise, the original sequence of location determination facilities is used to determine the current device location of the device.
The present teaching is directed to network capacity planning based on denoised user clusters and network element clusters. Collected information representing characteristics and activities of users and characteristics and performance of network elements is used to cluster users and network elements to generate initial user clusters and initial network element clusters, each of which is denoised in an iterative process to derive denoised subclusters that have no impure subclusters therein. Network capacity planning is performed based on correlations identified between denoised user subclusters and denoised network element subclusters.
One or more computing devices, systems, and/or methods for upgrading sites of a communication network are provided. Operational information of network functions within a communication network are tracked within a data repository. An upgrade ruleset is defined for identifying sites within a communication network to upgrade. The operational information, the upgrade ruleset, and model rules generated by a model for a set of candidate sites are processed to generate a positive list of sites to upgrade and a negative list of sites to not upgrade. The negative list of sites and criteria used to determine that the negative list of sites are not being upgraded are provided such as to a user. An upgrade process is performed to upgrade the sites within the positive list of sites.
H04L 41/082 - Configuration setting characterised by the conditions triggering a change of settings the condition being updates or upgrades of network functionality
Systems and methods enable dynamic network function management, including obtaining user input data identifying network slice provisioning parameters for a creation of a network slice in a network; sending a request for a network repository function (NRF) instance for the network slice, to an orchestrator; receiving, from the NRF instance, a verification message of the creation of the network slice; sending, to the orchestrator, a request for a creation of multiple network function (NF) instances according to the network slice provisioning parameters; receiving, from the orchestrator, a verification message of the creation of the NF instances for the network slice; receiving, from the NRF, a confirmation message of a registration of the NF instances for the network slice; sending slice-specific subscriber provisioning data to a user data instance provisioned for the network slice; and generating a network slice creation confirmation message identifying the network slice.
In some implementations, a domain name system (DNS) server may receive, from a user equipment (UE), a DNS request message that indicates location information. The DNS server may select a node for the UE based on the location information. The DNS server may transmit, to the UE, an indication of the node.
H04W 40/20 - Communication route or path selection, e.g. power-based or shortest path routing based on geographic position or location
H04L 61/4511 - Network directoriesName-to-address mapping using standardised directoriesNetwork directoriesName-to-address mapping using standardised directory access protocols using domain name system [DNS]
H04W 8/26 - Network addressing or numbering for mobility support
A device may include a processor. The processor may be configured to: determine whether a network demand for the device to send or receive data is below a threshold; if the network demand is below threshold, determine whether a network to which the device is wirelessly connected is congested; and when it is determined that the network is not congested, decrease processing capabilities at the device to process the network demand.
A method, a device, and a non-transitory storage medium are described in which an inter-operator mobility service is provided. The service may provide provisioning decisions and configurations that may include core devices that are shared between users of a first entity and users of a second entity or are dedicated to the users of an entity to support a network slice and/or access to an application service for end devices. The service may manage access and use of radio frequencies associated with the first and second entities based on subscription information and location of the end devices associated with first and second entities. The service may further include enabling inter-network handovers associated with end devices.
One or more computing devices, systems, and/or methods for locating subscriber information are provided. When a trigger event occurs within a communication network (e.g., a network outage where a provisioning component is unable to provision a subscriber with a subscriber location service), the subscriber location service is transitioned from a first mode of operation to a second mode of operation. While in the second mode of operation, the subscriber location service responds to requests from a network repository service with an indicator when a subscriber cannot be found. The indicator triggers the network repository service to select and recommend one or more data stores of subscriber information for a network function to attempt for accessing the subscriber information. The network repository service may provide retry instructions to the network function for retrying the attempts to access the subscriber information one or more times.
A device may receive global metadata terms and aliases, group level metadata terms and aliases, and user level metadata terms and aliases, and may generate global metadata graphs, group level metadata graphs, and user level metadata graphs. The device may train natural language understanding (NLU) models with the global metadata graphs, the group level metadata graphs, and the user level metadata graphs to generate trained NLU models, and may receive a search request from a user. The device may assign a level to the user and an identifier within the level based on a confidence and prior interactions associated with the user, and may select an NLU model from the trained NLU models based on the level and the identifier assigned to the user. The device may process the search request, with the NLU model, to generate search results, and may perform actions based on the search results.
A method, a network device, and a non-transitory computer-readable storage medium are described in relation to an application authorization service. The application authorization service may be performed at an end device and invoked responsive to the launching of an application. The application authorization service may include validating an application certificate associated with the application, validating an attestation value, and validating a token provided by the application. The application may provide a request that includes an application identifier and a token. The application may be granted access to a network or denied access depending on the outcome of the validation procedures. The granted access may include assignment of a network slice. The application certificate, a secured token, and a secured attestation value may be stored in a secure environment at the end device and used for validation procedures.
A network function virtualization (NFV) orchestration service includes a centralized orchestration device and a multi-cluster container management (MCCM) platform. The centralized orchestration device stores a catalog of virtual network function descriptors (VNFDs) in an input language; generates, based on the catalog of VNFDs, intents for containerized network function (CNF) services; and stores the generated intents as blocks in a central intent database, wherein the blocks include an input data model for the CNF services. The MCCM platform includes one or more processors to receive and store a copy of the intent database; read design time policies from the copy of the intent database; and convert the input data model into a vendor-specific output data model in an output language.
A system described herein may maintain a set of Quality of Service (“QoS”) parameters associated with a particular User Equipment (“UE”). The system may provide the set of QoS parameters to a policy element of a wireless network, wherein the wireless network establishes a first dedicated bearer with the particular UE, which may be associated with the set of QoS parameters. The system may receive, after the first dedicated bearer is established, information indicating an occurrence of a particular event associated with the particular UE, and may output, to a policy element of the wireless network, a request to establish a second dedicated bearer with the particular UE. The wireless network may establish the second dedicated bearer with the particular UE, which may be associated with the set of QoS parameters.
A method, a network device, and a non-transitory computer-readable storage medium are described in relation to a low latency, low loss, and scalable throughput (LI4S)-triggered prioritized connection service. The LI4S-triggered prioritized connection service may enable an evolved packet data gateway (ePDG) to provision prioritized and non-prioritized tunnels with end devices via untrusted wireless local area networks. The prioritized tunnel may support LI4S or another quality of service in which the ePDG may provide prioritized data forwarding. The end device may transmit a request that includes priority data.
In some implementations, a radio access network (RAN) intelligent controller (RIC) associated with a core network may identify one or more controls for controlling a RAN at two or more of a cell level, a slicing level, a user equipment (UE) grouping level, or a quality of service (QOS) level. The RIC may transmit, to one or more of a radio unit (RU) associated with the RAN, a distributed unit (DU) associated with the RAN, a centralized unit (CU) associated with the RAN, or a network management system (NMS), signaling associated with the one or more controls.
A device may receive, before a time period, current capacity data associated with sectors of an FWA network and qualified sector data identifying qualified sectors of FWA devices associated with the FWA network, and may receive, over the time period, FWA data associated with the FWA devices and corresponding sectors. The device may apply rules to the FWA data to generate modified FWA data, and may calculate maximum data volumes during the time period for the FWA devices based on the modified FWA data. The device may assign actual sectors to the FWA devices based on the maximum data volumes, and may compare the qualified sectors and the actual sectors to identify modified sectors. The device may modify the current capacity data based on the modified sectors and to generate modified capacity data associated with the sectors, and may perform actions based on the modified capacity data.