Telefonaktiebolaget LM Ericsson (publ) patent applications published on December 14th, 2023

From WikiPatents
Jump to navigation Jump to search

Contents

Patent applications for Telefonaktiebolaget LM Ericsson (publ) on December 14th, 2023

TECHNIQUE FOR PERFORMING QoS CONTROL IN A CLOUD ROBOTICS SYSTEM (18036453)

Main Inventor

Géza Szabó


Brief explanation

The abstract describes a technique for controlling the Quality of Service (QoS) of control messages sent from a robot controller to a robot through a mobile communication network in a cloud robotics system. Here are the key points:
  • The technique involves mapping control messages to different QoS classes supported by the mobile communication network based on the Quality of Control (QoC) tolerance associated with each message.
  • Each control message is assigned to a specific QoS class, which determines the priority and level of service it receives during transmission.
  • By applying this mapping, the technique ensures that control messages with higher QoC tolerance are given higher priority and better service in terms of network resources and reliability.
  • This technique helps optimize the transmission of control messages in a cloud robotics system, ensuring that critical control messages are delivered with minimal delay and maximum reliability.

Potential applications of this technology:

  • Cloud robotics systems: This technique can be applied in various cloud robotics applications where robots are controlled remotely through a mobile communication network.
  • Industrial automation: It can be used in manufacturing or industrial automation processes where robots are controlled and monitored through a cloud-based system.
  • Teleoperation: This technique can enhance the QoS of control messages in teleoperation scenarios, where robots are controlled remotely by human operators.

Problems solved by this technology:

  • Prioritization of control messages: The technique solves the problem of efficiently prioritizing control messages based on their QoC tolerance, ensuring that critical messages are given higher priority.
  • Network optimization: By mapping control messages to appropriate QoS classes, the technique optimizes the utilization of network resources and improves the overall performance of the cloud robotics system.

Benefits of this technology:

  • Improved control message delivery: By assigning different QoS classes to control messages, the technique ensures that critical messages are delivered with minimal delay and maximum reliability.
  • Enhanced system performance: The optimization of network resources and prioritization of control messages lead to improved overall performance and responsiveness of the cloud robotics system.
  • Flexibility and adaptability: The technique allows for dynamic mapping of control messages to QoS classes, enabling the system to adapt to changing network conditions and QoC requirements.

Abstract

A technique for performing Quality of Service, QoS, control regarding control messages communicated from a robot controller to a robot via a mobile communication network in a cloud robotics system is disclosed. A method implementation of the technique comprises triggering applying a mapping of control messages communicated from the robot controller to the robot to QoS classes among a plurality of data session related QoS classes supported by the mobile communication network for transmission of traffic via the mobile communication network, wherein each of the control messages is mapped to a respective QoS class depending on a Quality of Control, QoC, tolerance associated with the respective control message.

A Computer Software Module Arrangement, a Circuitry Arrangement, an Arrangement and a Method for Improved Object Detection Adapting the Detection through Shifting the Image (18033226)

Main Inventor

Fredrik Dahlgren


Brief explanation

The abstract describes an object detection arrangement that uses a multi-scale convolutional neural network to detect objects in images. The arrangement includes a controller that receives image data and determines the distance of the object to be detected within the image. Based on this distance, the controller classifies whether there is a risk of incorrectly detecting the object. If there is a risk, the controller compensates for it by shifting the image.
  • The object detection arrangement uses a multi-scale convolutional neural network for detecting objects in images.
  • The controller receives image data and determines the distance of the object to be detected within the image.
  • Based on the distance, the controller classifies whether there is a risk of incorrectly detecting the object.
  • If there is a risk, the controller compensates for it by shifting the image.

Potential Applications

  • Object detection in autonomous vehicles to improve accuracy and reliability.
  • Surveillance systems for detecting and tracking objects in real-time.
  • Robotics applications for object recognition and manipulation.

Problems Solved

  • Reduces the risk of incorrectly detecting objects based on their distance in the image.
  • Improves the accuracy of object detection in various applications.
  • Provides a mechanism for compensating and adjusting the object detection process.

Benefits

  • Enhanced object detection accuracy by considering the distance of the object in the image.
  • Improved reliability and performance of object detection systems.
  • Increased efficiency in object recognition and tracking tasks.

Abstract

An object detection arrangement () comprising a controller () configured to detect objects utilizing a multi-scale convolutional neural network, wherein the controller () is further configured to: receive () image data representing an image () comprising an object to be detected () being at a distance (d) into the image (); classify () whether the object to be detected () is at risk of being incorrectly detected based on the distance (d); and if so compensate () the object detection by shifting () the image ().

NOISE SUPPRESSION LOGIC IN ERROR CONCEALMENT UNIT USING NOISE-TO-SIGNAL RATIO (18036481)

Main Inventor

Chamran MORADI ASHOUR


Brief explanation

The patent application describes a method and decoder for generating a concealed audio frame from an audio signal. Here is a simplified explanation of the abstract:
  • The method involves analyzing a previously decoded audio signal in the frequency domain to obtain a frequency spectrum.
  • Peaks in the spectrum are identified, which represent important components of the audio signal.
  • The method estimates the relative energy between the noise spectrum and the complete spectrum.
  • Based on this relative energy, the attenuation of the noise spectrum is determined.
  • The attenuation is then applied to the noise spectrum.
  • An inverse transform is applied to the error concealment spectrum, which includes the peaks and the attenuated noise spectrum, to obtain a concealed audio frame.

Potential applications of this technology:

  • Audio signal processing and decoding systems
  • Multimedia devices and applications
  • Communication systems and codecs

Problems solved by this technology:

  • Concealing errors or missing data in audio signals during transmission or decoding
  • Improving the quality and intelligibility of audio signals in the presence of errors or missing data

Benefits of this technology:

  • Enhanced audio signal quality and intelligibility
  • Improved error resilience and error concealment capabilities
  • More robust audio transmission and decoding systems

Abstract

A method and a decoder for generating concealment audio frame of an audio signal. The method includes performing a frequency domain analysis of a sequence of previously decoded audio signal to obtain a frequency spectrum and identifying peaks in the spectrum. The method further includes estimating a relative energy between the noise spectrum and the complete spectrum, determining an attenuation of the noise spectrum based on the relative energy, and applying the attenuation to the noise spectrum. The method includes applying an inverse transform to time domain on an error concealment spectrum, that includes the peaks and the attenuated noise spectrum.

Circuit and Method for Controlling Rectifier, and Circuit Including the Rectifier (18035315)

Main Inventor

Huajuan Xiao


Brief explanation

The patent application describes a circuit and method for controlling a rectifier, which includes a transformer, an inductor, and at least one switching component. The method involves sensing the current flowing into the inductor and primary winding of the transformer, generating an indication voltage based on the sensed current, comparing the indication voltage with a reference voltage, and driving the switching component based on the comparison result.
  • The rectifier includes a transformer, inductor, and switching component.
  • The method involves sensing the current, generating an indication voltage, comparing it with a reference voltage, and driving the switching component accordingly.
  • The timing for turning on/off the switching component is optimized to reduce power loss and improve efficiency.

Potential Applications

  • Power electronics
  • Renewable energy systems
  • Electric vehicle charging stations
  • Industrial automation

Problems Solved

  • Power loss in rectifiers
  • Inefficient energy conversion
  • Lack of control in rectifier circuits

Benefits

  • Reduced power loss
  • Improved energy efficiency
  • Enhanced control over rectifier circuits

Abstract

A circuit and a method for controlling a rectifier, and a circuit including the rectifier are disclosed. The rectifier may comprise: a transformer (T); an inductor (Lm) coupled with a primary winding (Np) of the transformer (T) in parallel; at least one switching component (SR, SR) coupled between a secondary winding (Ns, Ns) of the transformer (T) and an output of the rectifier. The method may comprise: sensing (S) a current flowing into a combination of the inductor (Lm) and the primary winding (Np) of the transformer (T); generating (S) an indication voltage, based on the sensed current; comparing (S) the indication voltage and a reference voltage; and driving (S) the at least one switching component (SR, SR), based on a comparison result of the indication voltage and the reference voltage. The timing point for turning on/off the switching component (SR, SR) may be optimized, so as to reduce the power loss and improve the efficiency.

Detecting or Correcting One or More Errors in Data (18249811)

Main Inventor

Jonas Almlöf


Brief explanation

The abstract of this patent application describes a method for detecting and correcting errors in data. Here are the key points:
  • The method involves receiving data in a channel, where the data consists of symbols.
  • Each symbol represents either a ground state or one of several energized states.
  • Symbols in the channel can only transition from an energized state to the ground state.
  • The data includes at least one symbol that corresponds to the ground state.
  • The method analyzes the symbols to determine if any transitions of the states have occurred.
  • If a transition is detected, the method can then detect or correct errors in the data.

Potential applications of this technology:

  • Data transmission and communication systems
  • Error detection and correction in computer networks
  • Storage systems and devices
  • Digital signal processing

Problems solved by this technology:

  • Errors in data transmission or storage can occur due to noise or other factors.
  • Identifying and correcting these errors is crucial for maintaining data integrity and reliability.
  • This method provides a systematic approach to detect and correct errors in data.

Benefits of this technology:

  • Improved accuracy and reliability of data transmission and storage.
  • Enhanced error detection and correction capabilities.
  • Efficient and effective method for maintaining data integrity.

Abstract

Examples of this disclosure include a method of detecting or correcting one or more errors in data. The method comprises receiving data in a channel, wherein the data comprises one or more symbols, wherein each symbol corresponds to one of a ground state or to one of one or more energized states, and wherein the only transition possible for a symbol in the channel is one in which one of the one or more energized states transitions to the ground state, and wherein the data comprises at least one symbol that corresponds to the ground state. The method also comprises analyzing the one or more symbols to determine if a transition of one or more of the states has occurred and, if a transition of one or more of the states has occurred, detecting or correcting errors in the data.

PRE-EQUALIZATION USING BEAMFORMING FUNCTIONALITY (18252089)

Main Inventor

Miguel BERG


Brief explanation

The patent application describes a method, network node, and customer premises equipment for pre-equalization using beamforming functionality in a hybrid fiber cable network. Here is a simplified explanation of the abstract:
  • The method involves estimating the uplink channel of a hybrid fiber cable network by using reference signals received from consumer premises equipment.
  • The downlink channel is determined by taking the inverse of the uplink channel estimate.
  • A downlink signal is mapped to multiple layer-specific signals.
  • Beamforming weights are applied to the layer-specific signals to generate layer-specific downlink signals.
  • The layer-specific downlink signals are summed to produce a frequency-compensated downlink signal for transmission over the hybrid fiber cable network.

Potential applications of this technology:

  • This technology can be used in hybrid fiber cable networks to improve the quality and reliability of communication signals.
  • It can be applied in various industries that rely on high-speed data transmission, such as telecommunications, internet service providers, and broadcasting.

Problems solved by this technology:

  • The method addresses the challenge of estimating and compensating for channel impairments in a hybrid fiber cable network.
  • It improves the accuracy of signal transmission by pre-equalizing the uplink and downlink channels.

Benefits of this technology:

  • By using beamforming functionality, the method enhances the performance of the hybrid fiber cable network.
  • It allows for efficient transmission of data, resulting in improved communication quality and reliability.
  • The technology can potentially increase the capacity and speed of data transmission in hybrid fiber cable networks.

Abstract

A method, network node and customer premises equipment for pre-equalization using beamforming functionality are disclosed. According to one aspect, a method in a network node includes estimating an uplink channel of a hybrid fiber cable network using references signals received from consumer premises equipment, determining a downlink channel using an inverse of the uplink channel estimate, mapping a downlink signal to a plurality of layer-specific signals, and applying beamforming weights to the layer-specific signals to produce layer-specific downlink signals, and summing the layer-specific downlink signals to produce a frequency-compensated downlink signal for transmission over the hybrid fiber cable network.

CODEBOOK AND PMI OVERRIDE IN DOWNLINK MU-MIMO TRANSMISSION (18032318)

Main Inventor

Yongquan QIANG


Brief explanation

The patent application describes a method for operating a network node in a wireless communication system. Here are the key points:
  • The network node receives a precoding matrix indicator (PMI) from a user equipment (UE). The PMI is based on an antenna-grouping codebook, which helps in determining the optimal precoding matrix for transmission.
  • For downlink multi-user multiple input, multiple output (MU-MIMO) transmission, the network node selects a non-antenna-grouping codebook. This codebook is used for MU-MIMO transmission, where multiple UEs are served simultaneously.
  • The network node determines a second PMI from the non-antenna-grouping codebook based on the first PMI received from the UE. This allows the network node to select the appropriate precoding matrix for MU-MIMO transmission.
  • Based on the second PMI, the network node performs MU-MIMO pairing and beamforming towards the UE. This ensures efficient and optimized transmission to the UE.

Potential applications of this technology:

  • This method can be applied in wireless communication systems, such as 4G LTE and 5G, to improve the efficiency and capacity of downlink MU-MIMO transmissions.
  • It can be used in various network nodes, such as base stations, to enhance the performance of wireless networks and provide better user experience.

Problems solved by this technology:

  • MU-MIMO transmission in wireless communication systems requires selecting the appropriate precoding matrix for each UE. This can be challenging when using different codebooks for different types of transmission.
  • The method solves the problem of efficiently pairing and beamforming towards UEs in downlink MU-MIMO transmissions by using a non-antenna-grouping codebook.

Benefits of this technology:

  • By using a non-antenna-grouping codebook, the method allows for more flexibility and optimized precoding matrix selection in downlink MU-MIMO transmissions.
  • It improves the efficiency and capacity of wireless networks by enabling simultaneous transmission to multiple UEs.
  • The method enhances the overall performance and user experience in wireless communication systems.

Abstract

A method of operating a network node includes receiving a first precoding matrix indicator, PMI, from a UE, wherein the first PMI is based on an antenna-grouping codebook, selecting a non-antenna-grouping codebook for downlink multi-user multiple input, multiple output, MU-MIMO transmission, determining a second PMI of the non-antenna-grouping codebook based on the first PMI of the antenna-grouping codebook, and performing MU-MIMO pairing and beamforming toward the UE based on the second PMI of the non-antenna-grouping codebook. Related network nodes are disclosed.

BEAM SELECTION FOR WIRELESS COMMUNICATION NETWORK (18251262)

Main Inventor

Joao VIEIRA


Brief explanation

The abstract describes a method for operating a signaling radio node in a wireless communication network. The method involves using a signaling beam, which is selected from a set of beams represented by a beam matrix. The selection process is based on a training matrix that represents a different set of beams.
  • The method involves using a signaling beam in a wireless communication network.
  • The signaling beam is selected from a set of beams represented by a beam matrix.
  • The selection process for the signaling beam utilizes a training matrix that represents a different set of beams.
  • The number of beams in the training matrix is smaller than the number of beams in the beam matrix.

Potential applications of this technology:

  • Wireless communication networks
  • Cellular networks
  • Internet of Things (IoT) devices
  • Satellite communication systems

Problems solved by this technology:

  • Efficient beam selection in wireless communication networks
  • Optimizing signal transmission and reception in a crowded network environment
  • Minimizing interference and maximizing signal quality

Benefits of this technology:

  • Improved signal transmission and reception performance
  • Enhanced network capacity and efficiency
  • Reduced interference and improved overall network reliability
  • Better utilization of available resources

Abstract

There is disclosed a method of operating a signaling radio node in a wireless communication network. The method includes communicating utilising a signaling beam, the signaling beam being one of a first set of M beams represented or representable by a beam matrix F, wherein the signaling beam is determined based on a beam selection process utilising a second set of N beams represented or representable by a training matrix G, wherein N<M. The disclosure also pertains to related devices and methods.

COMMUNICATION USING A DUAL POLARIZED ANTENNA ARRAY (18034629)

Main Inventor

Sven PETERSSON


Brief explanation

The patent application describes a method for communication in a wireless access network using a dual polarized antenna array. The antenna array consists of antenna elements with two different polarizations.
  • The method involves transmitting a signal on a first link of the network using a transmit antenna port connected to both polarizations of the antenna elements.
  • The method also involves receiving a signal on a second link of the network using a first receive antenna port connected to the first polarization and a second receive antenna port connected to the second polarization.
  • The transmit beam and receive beams are designed to have overlapping power patterns.

Potential applications of this technology:

  • Wireless communication networks
  • Cellular networks
  • Wi-Fi networks

Problems solved by this technology:

  • Improved communication efficiency in wireless access networks
  • Enhanced signal reception and transmission capabilities

Benefits of this technology:

  • Increased network capacity and coverage
  • Reduced interference and improved signal quality
  • Enhanced data rates and reliability

Abstract

There is provided mechanisms for communication in a wireless access network using a dual polarized antenna array. The antenna array comprises antenna elements of a first polarization and of a second polarization. A method comprises transmitting a first signal via a transmit antenna port in a transmit beam on a first link of the wireless access network. The transmit antenna port is connected to the antenna elements of both the first polarization and the second polarization. The method comprises receiving a second signal on a second link of the wireless access network via a first receive antenna port in a first receive beam and via a second receive antenna port in a second receive beam. The first receive antenna port is connected to antenna elements of the first polarization and the second receive antenna port is connected to antenna elements of the second polarization. The receive beams and the transmit beam fulfil an overlap criterion with respect to their total power patterns.

METHOD AND APPARATUS FOR DUAL CONNECTIVITY (18034414)

Main Inventor

Hyun Yang


Brief explanation

The abstract describes a method for dual connectivity in a network. The method involves a first network node determining a configuration for dual connectivity of a terminal device and evaluating the performance of this configuration. The first network node then transmits a message to a second network node, indicating the configuration and performance evaluation.
  • The method allows for dual connectivity of a terminal device in a network.
  • The first network node determines the configuration and evaluates its performance.
  • A message is transmitted to a second network node, providing information about the configuration and performance evaluation.

Potential Applications

  • This method can be applied in various wireless communication networks to enable dual connectivity of terminal devices.
  • It can be used in 5G networks to enhance network performance and provide seamless connectivity for devices.

Problems Solved

  • Dual connectivity allows for improved network performance and reliability by utilizing multiple network nodes.
  • The method solves the problem of efficiently configuring and evaluating the performance of dual connectivity in a network.

Benefits

  • Dual connectivity improves network performance by utilizing multiple network nodes simultaneously.
  • It provides seamless connectivity for terminal devices, ensuring uninterrupted communication.
  • The method allows for efficient configuration and evaluation of dual connectivity, optimizing network resources.

Abstract

Various embodiments of the present disclosure provide a method for dual connectivity. The method which may be performed by a first network node comprises determining a first configuration for dual connectivity of a terminal device supported by the first network node and a first performance evaluation of the first configuration. In accordance with an exemplary embodiment, the method further comprises transmitting a first message to a second network node. The first message may indicate the first configuration and the first performance evaluation.

MULTI-SLOT REFERENCE SIGNAL TRIGGERING (18249138)

Main Inventor

Stephen GRANT


Brief explanation

The abstract describes a network node that is designed to communicate with a wireless device. The network node has a radio interface and processing circuitry that can transmit a configuration of reference signals to the wireless device. It can also transmit a downlink control information (DCI) that triggers the reference signals in multiple slots. The DCI includes a field indicating the number of slots in which the reference signals should be triggered. The abstract also mentions methods for the network node and the wireless device.
  • The network node is configured to communicate with a wireless device.
  • It includes a radio interface and processing circuitry.
  • The network node can transmit a configuration of reference signals to the wireless device.
  • It can also transmit a downlink control information (DCI) that triggers the reference signals in multiple slots.
  • The DCI includes a field indicating the number of slots in which the reference signals should be triggered.
  • The abstract also mentions methods for the network node and the wireless device.

Potential Applications

  • This technology can be used in wireless communication networks to improve the efficiency and reliability of communication between network nodes and wireless devices.
  • It can be applied in various industries that rely on wireless communication, such as telecommunications, IoT, and smart devices.

Problems Solved

  • The technology solves the problem of efficiently configuring and triggering reference signals in wireless communication networks.
  • It addresses the need for reliable and accurate communication between network nodes and wireless devices.

Benefits

  • The technology improves the overall performance and reliability of wireless communication networks.
  • It allows for more efficient use of network resources by accurately configuring and triggering reference signals.
  • It enhances the user experience by ensuring reliable and seamless communication between network nodes and wireless devices.

Abstract

A network node is configured to communicate with a wireless device. The network node includes a radio interface and processing circuitry configured to transmit a configuration of a set of reference signals via RRC signaling to the wireless device. The radio interface and processing circuitry are further configured to transmit a downlink control information, DCI, that triggers the set of reference signals in multiple slots to the wireless device. In some embodiments the DCI has a field which indicates the number of slots in which the DCI should trigger the set of reference signals. In some further embodiments the RRC signaling configures the set of reference signals in a number of slots. A method for a network node, a wireless device and a method for a wireless device are also provided.

Methods, Entities, and Computer Readable Media for Error Handling (18250623)

Main Inventor

Hong Zhang


Brief explanation

The present disclosure describes methods, entities, and computer readable storage media for error handling in a policy decision system. The method involves the following steps:
  • A first entity determines that there is an error in either the reference of a session rule and/or a Policy and Charging Control (PCC) rule to the policy decision, or an attribute in the policy decision.
  • The first entity transmits a notification of the error to a second entity, which is responsible for provisioning policy decisions.

Potential applications of this technology:

  • This technology can be applied in telecommunications networks where policy decisions need to be made for managing network resources and services.
  • It can be used in systems that require error handling and notification mechanisms for policy decisions.

Problems solved by this technology:

  • This technology helps in identifying errors in policy decisions, such as incorrect references or attributes, which can lead to incorrect network resource allocation or service provisioning.
  • It provides a mechanism for notifying the responsible entity about the errors, allowing for timely resolution and preventing potential network issues.

Benefits of this technology:

  • By detecting and notifying errors in policy decisions, this technology helps in maintaining the accuracy and reliability of network resource allocation and service provisioning.
  • It enables efficient error handling and resolution, reducing the impact of errors on network performance and user experience.

Abstract

The present disclosure provides methods, entities and computer readable storage media for error handling. The method at a first entity includes: determining, based on a policy decision provisioned by a second entity, that an error in at least one of: reference of a session rule and/or a Policy and Charging Control, PCC, rule to the policy decision, or an attribute in the policy decision; and transmitting, to the second entity, a notification of the error.

GEOGRAPHIC SCALING IN A CONTAINER BASED CLOUD INFRASTRUCTURE (18036115)

Main Inventor

Xuejun CAI


Brief explanation

The patent application describes a method for operating a container-based cloud infrastructure distributed over multiple geographically distributed edge sites. The method involves determining performance parameters that affect how a specific part of the cloud infrastructure on a particular edge site provides services to users. Based on these parameters, it is determined whether scaling of the cloud infrastructure on other edge sites is necessary. If scaling is required, amendments are made to the container-based cloud infrastructure on the relevant edge site to improve service provision.
  • The method involves operating a container-based cloud infrastructure distributed over multiple edge sites.
  • Performance parameters are determined to assess how a specific part of the cloud infrastructure on a particular edge site provides services to users.
  • Scaling of the cloud infrastructure on other edge sites is determined based on the performance parameters.
  • Amendments are made to the container-based cloud infrastructure on the relevant edge site to improve service provision.

Potential Applications

  • This technology can be applied in various industries that rely on cloud infrastructure, such as e-commerce, telecommunications, and healthcare.
  • It can be used to optimize the performance and scalability of container-based cloud services in geographically distributed environments.

Problems Solved

  • The method addresses the challenge of efficiently managing and scaling container-based cloud infrastructure across multiple geographically distributed edge sites.
  • It helps ensure that the cloud infrastructure can provide optimal service to users by making amendments based on performance parameters.

Benefits

  • The method allows for improved performance and scalability of container-based cloud services.
  • It enables efficient management of cloud infrastructure across multiple edge sites, leading to enhanced user experience.
  • By dynamically determining scaling needs and making amendments accordingly, the method optimizes resource utilization and reduces operational costs.

Abstract

The application relates to a method for operating a first scaling entity  of a container based cloud infrastructure distributed over a plurality of geographically distributed edge sites - of a network, wherein the container based cloud infrastructure provides at least one service to a user of the network, the method comprising: the step of determining at least one performance parameter influencing a performance how a first part of the container based cloud infrastructure provided on a first edge site of the plurality of edge sites where the first scaling entity is located provides the service to the user. Based on the determined at least one performance parameter, it is determined whether a scaling of the cloud infrastructure located on at least one other edge site of the plurality of geographically distributed edge sites outside the first edge site is necessary, wherein in the affirmative, an amendment of the container based cloud infrastructure is determined at the at least one other edge site which is configured to provide the service to the user. The determined amendment of the container cloud infrastructure is triggered at the at least one other edge site.

METHOD AND NETWORK ELEMENT FOR NETWORK REDUNDANCY (18036526)

Main Inventor

Wei LUO


Brief explanation

The present disclosure describes a method and network element for network redundancy. The method involves determining whether a network element should function as an active or standby element for a specific route, based on its priority and whether the route is advertised by other network elements. If the network element is determined to be in standby mode, it advertises the route.
  • The method determines the role of a network element in providing a service in a redundant manner.
  • The determination is based on the priority of the network element and whether the route is advertised by other network elements.
  • If the network element is in standby mode, it advertises the route.

Potential Applications

  • This technology can be applied in various network systems that require redundancy and failover mechanisms.
  • It can be used in telecommunications networks, data centers, and cloud computing environments to ensure uninterrupted service.

Problems Solved

  • Network redundancy is crucial for maintaining uninterrupted service in case of failures or disruptions.
  • This technology solves the problem of efficiently determining the role of network elements in a redundant network setup.

Benefits

  • The method provides a simplified approach to determine the active and standby network elements.
  • It ensures that the standby network element can advertise the route when necessary, maintaining seamless service.
  • The technology improves network reliability and reduces the risk of service disruptions.

Abstract

The present disclosure is related to a method and network element for network redundancy. The method may be performed at a first network element for providing a service together with a plurality of second network elements in a redundant manner. The method includes: determining whether the first network element is to function as an active network element or a standby network element for a first route at least partially based on a first priority of the first network element and/or whether the first route is advertised by at least one of the plurality of the second network elements; and advertising, in a standby state, the first route in response to determining that the first network element is to function as a standby network element for the first route.

MANAGING NETWORK SLICE BANDWIDTH FOR REMOTE GAME SESSIONS (18034845)

Main Inventor

Chris Phillips


Brief explanation

The abstract describes a scheme for remote gaming in a distributed network architecture. It involves a dedicated network slice for gaming and a remote game rendering application service deployed in a trusted edge data network. The scheme includes a remote render system manager that instantiates remote game rendering engines coupled to game engines. The manager interfaces with a remote gaming back office in an external network to instantiate and manage multiple gaming sessions for clients. An edge routing application provides network location information of the game engines to the back office. A multisession game slice bandwidth manager allocates bandwidth to each gaming session from the dedicated network slice.
  • The scheme allows for remote gaming in a distributed network architecture.
  • It includes a dedicated network slice for gaming and a remote game rendering application service.
  • The remote render system manager instantiates remote game rendering engines coupled to game engines.
  • The manager interfaces with a remote gaming back office in an external network.
  • It can manage multiple gaming sessions for clients.
  • An edge routing application provides network location information of the game engines to the back office.
  • A multisession game slice bandwidth manager allocates bandwidth to each gaming session from the dedicated network slice.

Potential Applications

  • Remote gaming platforms
  • Cloud gaming services
  • Multiplayer online games

Problems Solved

  • Efficient management of multiple gaming sessions in a distributed network architecture
  • Allocation of dedicated bandwidth for gaming sessions

Benefits

  • Improved gaming experience for remote players
  • Efficient utilization of network resources
  • Scalability for handling multiple gaming sessions

Abstract

A multisession remote game scheme in a distributed network architecture (A-C) including a dedicated network slice () for gaming. A remote game rendering application service () deployed in a trusted edge data network (A-B) includes a remote render system (RRS) manager () operative to instantiate one or more remote game rendering engines coupled to respective game engines (). RRS manager () includes an interface to a remote gaming back office () disposed in an external network (), wherein the RRS manager () is operative to instantiate and manage a plurality of gaming sessions responsive to game session setup requests propagated from the back office on behalf of clients (). An edge routing application () is configured to provide edge network location information of the game engines to the remote game back office (). A multisession game slice bandwidth manager () is operative to allocate a respective bandwidth to each of the plurality of gaming sessions from a dedicated bandwidth of the network slice () serving the plurality of gaming sessions.

LWM2M SERVER DEVICE, LWM2M CLIENT DEVICE, AND METHODS THEREOF (18034741)

Main Inventor

Oscar NOVO DIAZ


Brief explanation

The abstract describes a device and method for managing a group of Lightweight Machine to Machine (LwM2M) devices using the Message Queueing Telemetry Transport (MQTT) protocol. The device, called the LwM2M server device, can perform management operations on LwM2M clients that meet a certain criterion. It can identify a group management topic that is not specific to any particular LwM2M endpoint. The device can then publish a group management message to an MQTT server, specifying the group management topic and the operation to be performed. 
  • LwM2M server device with integrated MQTT client for group management of LwM2M devices
  • Processing circuitry to determine when a management operation is needed on LwM2M clients
  • Identification of a group management topic that is not specific to any particular LwM2M endpoint
  • Publishing of a group management message to an MQTT server, specifying the topic and operation

Potential Applications

  • IoT device management: This technology can be used to efficiently manage a large number of IoT devices by performing group management operations on them.
  • Firmware updates: The LwM2M server device can use this technology to send firmware update commands to a group of LwM2M clients, simplifying the process of updating device firmware.
  • Configuration management: Group management messages can be used to configure settings on multiple LwM2M devices simultaneously, reducing the time and effort required for configuration tasks.

Problems Solved

  • Scalability: The LwM2M server device allows for efficient management of a large number of LwM2M devices by performing group management operations.
  • Simplified management: The use of group management topics and messages simplifies the process of managing multiple LwM2M devices, reducing the complexity and effort required.
  • Flexibility: The technology allows for the identification of LwM2M clients based on criteria, enabling targeted management operations on specific groups of devices.

Benefits

  • Efficient management: The technology enables the management of multiple LwM2M devices in a more efficient and scalable manner.
  • Simplified operations: Group management messages and topics simplify the process of performing management operations on multiple devices, reducing complexity and effort.
  • Targeted management: The ability to identify LwM2M clients based on criteria allows for targeted management operations on specific groups of devices, improving flexibility and control.

Abstract

Group management of LwM2M devices over MQTT A Lightweight Machine to Machine (LwM2M) server device is disclosed that is operable to run a LwM2M server and a Message Queueing Telemetry Transport (MQTT) client. The LwM2M server device comprises processing circuitry configured to cause the LwM2M server device to determine () that a LwM2M management operation should be performed on LwM2M clients fulfilling a criterion, and to identify () a LwM2M group management topic corresponding to the criterion, a LwM2M group management topic comprising a topic within a LwM2M namespace that is nonspecific to a particular LwM2M endpoint. The processing circuitry is further configured to cause the LwM2M server device to publish () a group management message to an MQTT server, the group management message specifying the identified LwM2M group management topic and the management operation to be performed. Also disclosed are a LwM2M client device and associated methods.

NOTIFICATION OF DISASTER CONDITION AND ALTERNATIVE PLMNs (18035428)

Main Inventor

Ivo Sedlacek


Brief explanation

The patent application describes a system and method for notifying network nodes and user devices about disaster conditions and providing alternative mobile network options. Here are the key points:
  • The method involves a User Equipment (UE) responding to a disaster condition in a first mobile network (PLMN).
  • If the first PLMN is not available due to the disaster, the UE determines if a second PLMN is available for disaster roaming.
  • If a second PLMN is available, the UE attempts to register with it to receive service during the disaster.
  • This allows the UE to be informed about the failure of its current PLMN due to a disaster and enables it to receive service from an alternative PLMN that would not be accessible under normal conditions.

Potential applications of this technology:

  • Emergency response systems: The system can be used to notify emergency response teams and users about disaster conditions and provide alternative mobile network options for communication during emergencies.
  • Disaster management: The technology can assist in coordinating disaster management efforts by ensuring uninterrupted communication services for first responders and affected individuals.
  • Public safety: The system can enhance public safety by enabling users to quickly switch to alternative mobile networks in case of network failures during disasters.

Problems solved by this technology:

  • Lack of communication during disasters: The technology addresses the issue of network failures during disasters by providing alternative mobile network options for users to stay connected.
  • Limited access to services: Under normal conditions, certain PLMNs may not allow users to access their services. This technology enables users to receive service from such PLMNs during disaster situations.

Benefits of this technology:

  • Improved emergency communication: The system ensures that users have access to communication services even when their primary network is unavailable.
  • Enhanced disaster response: By providing alternative network options, the technology facilitates better coordination and communication among emergency response teams during disasters.
  • Increased public safety: Users can quickly switch to alternative networks, ensuring that they can reach out for help or stay informed during critical situations.

Abstract

Systems and methods for enabling notification of disaster conditions and alternative Public Land Mobile Networks (PLMNs) to network nodes are disclosed. In one embodiment, a method performed by a User Equipment (UE) for responding to a disaster condition in a first PLMN, comprises determining that a first PLMN is not available; determining that a second PLMN is available for disaster roaming; and attempting to register with the second PLMN, responsive to determining that the first PLMN is not available due to the disaster condition and determining that a second PLMN is available for disaster roaming. In this way, a UE is informed of the failure of its currently used PLMN due to a disaster condition and a service may be provided in another PLMN, where the UE under normal conditions may not be allowed to receive a service from the second PLMN.

METHOD AND APPARATUS FOR TERMINAL DEVICE BEHAVIOR CLASSIFICATION (18032282)

Main Inventor

Huaisong ZHU


Brief explanation

The abstract describes a method and apparatus for classifying the behavior of terminal devices in a network. Here is a simplified explanation of the abstract:
  • The method involves obtaining communication measurement data related to terminal devices.
  • Terminal implementation characteristics for a group of terminal devices are determined based on the communication measurement data.
  • The terminal implementation characteristics and/or a policy for the group of terminal devices are sent to other network functions.
  • The policy for the group of terminal devices is determined based on the terminal implementation characteristics.

Potential Applications

This technology can have various applications in the field of network management and optimization. Some potential applications include:

  • Network Traffic Management: The classification of terminal device behavior can help in managing network traffic efficiently by identifying devices that may be causing congestion or consuming excessive resources.
  • Quality of Service (QoS) Optimization: By understanding the behavior of terminal devices, network functions can prioritize and allocate resources effectively to ensure a better quality of service for users.
  • Security and Threat Detection: Analyzing the behavior of terminal devices can aid in identifying potential security threats or abnormal activities within the network.

Problems Solved

This technology addresses several problems in network management and optimization:

  • Lack of Visibility: By obtaining communication measurement data and determining terminal implementation characteristics, network functions gain better visibility into the behavior of terminal devices, allowing for more informed decision-making.
  • Resource Allocation: The classification of terminal device behavior helps in optimizing resource allocation by identifying devices that may require additional resources or devices that are not utilizing resources efficiently.
  • Network Congestion: By identifying devices causing congestion, network functions can take appropriate measures to alleviate congestion and ensure smooth network performance.

Benefits

The use of this technology offers several benefits:

  • Improved Network Performance: By classifying terminal device behavior and implementing appropriate policies, network performance can be enhanced, leading to better user experience.
  • Efficient Resource Management: Understanding the behavior of terminal devices allows for efficient allocation and utilization of network resources, resulting in cost savings and improved network efficiency.
  • Enhanced Security: By analyzing terminal device behavior, potential security threats can be detected early, enabling proactive measures to protect the network and its users.

Abstract

Embodiments of the present disclosure provide methods and apparatus for terminal device behavior classification. A method performed by a first network function comprises obtaining communication measurement data related to at least one terminal device. The method further comprises determining terminal implementation characteristics for a group of terminal devices based on the communication measurement data. The method further comprises sending the terminal implementation characteristics and/or a policy for the group of terminal devices to at least one second network function. The policy for the group of terminal devices is determined based on the terminal implementation characteristics.

HANDLING OF MULTIPLE AUTHENTICATION PROCEDURES IN 5G (18239364)

Main Inventor

Noamen Ben Henda


Brief explanation

The abstract describes a method used by a home PLMN (Public Land Mobile Network) to communicate with electronic devices. The method involves receiving authentication requests from different PLMNs (Public Land Mobile Networks) for the same electronic device and obtaining security keys for message integrity protection. The method also includes determining the latest security key and using it to protect a message associated with a message protection request.
  • The method is used by a home PLMN to communicate with electronic devices.
  • Authentication requests are received from different PLMNs for the same electronic device.
  • Security keys are obtained for message integrity protection.
  • The latest security key is determined.
  • The latest security key is used to protect a message associated with a message protection request.

Potential Applications

  • This method can be used in mobile network systems to ensure secure communication between a home PLMN and electronic devices.
  • It can be applied in various industries that rely on mobile networks, such as telecommunications, IoT (Internet of Things), and smart home systems.

Problems Solved

  • Ensures secure communication between a home PLMN and electronic devices by obtaining and using the latest security key.
  • Solves the problem of managing multiple security keys for the same electronic device when authenticating with different PLMNs.

Benefits

  • Enhances the security of communication between a home PLMN and electronic devices by using the latest security key.
  • Simplifies the management of security keys by determining the latest key to be used.
  • Improves the efficiency and reliability of message protection in mobile network systems.

Abstract

A method by an AUSF of a home PLMN configured to communicate through an interface with electronic devices is provided. A first authentication request is received from a first PLMN that is authenticating an electronic device. A first security key used for integrity protection of messages delivered from the home PLMN to the electronic device is obtained. A second authentication request is received from a second PLMN that is authenticating the electronic device. A second security key used for integrity protection of the messages delivered from the home PLMN to the electronic device is obtained. A message protection request is received. Which of the first security key and the second security key is a latest security key is determined. The latest security key is used to protect a message associated with the message protection request.

MANAGING A RADIO ACCESS NETWORK OPERATION (18030517)

Main Inventor

Henrik Rydén


Brief explanation

The abstract describes a method for managing a Radio Access Network (RAN) operation in a communication network. The method involves receiving a representation of the state of a second node in relation to the RAN operation, which includes compressed parameter values describing the physical state, radio environment, or physical environment experienced by the second node or other nodes connected to the network through the second node. The received state representation is then used to generate a configuration action for the RAN operation, and the RAN operation is configured accordingly.
  • The method manages a RAN operation performed by a first node in a communication network.
  • The first node receives a representation of the state of a second node in relation to the RAN operation.
  • The state representation includes compressed parameter values describing the physical state, radio environment, or physical environment experienced by the second node or connected nodes.
  • The received state representation is used to generate a configuration action for the RAN operation.
  • The RAN operation is then configured based on the generated configuration action.

Potential Applications

  • This method can be applied in various communication networks that utilize a RAN, such as cellular networks.
  • It can be used to optimize and improve the performance of the RAN operation.
  • The method can be implemented in network management systems to efficiently manage and configure RAN operations.

Problems Solved

  • The method solves the problem of efficiently managing and configuring RAN operations in a communication network.
  • It addresses the challenge of obtaining and utilizing accurate and relevant information about the state of nodes and their environments in the RAN operation.

Benefits

  • The method allows for more efficient management and configuration of RAN operations.
  • It enables better optimization and performance improvement of the RAN operation.
  • By using compressed representations of parameter values, the method reduces the amount of data transmission and processing required, leading to improved network efficiency.

Abstract

A method is disclosed for managing a Radio Access Network (RAN) operation performed by a first node in a communication network that comprises a RAN. The method is performed by the first node and comprises receiving a representation of a state of a second node with respect to the RAN operation, wherein the state of the second node comprises a compressed representation of parameter values that describe at least one of a physical state, a radio environment or a physical environment experienced by the second node or experienced by at least one node that is connected to the communication network via the second node. The method further comprises using the received state representation to generate a configuration action for the RAN operation and initiating configuration of the RAN operation in accordance with the generated configuration action.

CENTRAL NODE AND A METHOD FOR REINFORCEMENT LEARNING IN A RADIO ACCESS NETWORK (18033407)

Main Inventor

Yu WANG


Brief explanation

The abstract describes a method for controlling an exploration strategy in a distributed node in a Radio Access Network (RAN) using Reinforcement Learning (RL). The central node evaluates the cost and performance of actions performed for exploration in RL modules and determines exploration parameters based on the evaluation. The central node then configures the RL modules with the determined exploration parameters to update their exploration strategy and produce data samples.
  • The method controls an exploration strategy in RL modules in a distributed node in a RAN.
  • The central node evaluates the cost and performance of actions performed for exploration in the RL modules.
  • Based on the evaluation, the central node determines exploration parameters associated with the exploration strategy.
  • The central node configures the RL modules with the determined exploration parameters to update their exploration strategy.
  • The updated exploration strategy enforces the RL modules to act accordingly and produce data samples.

Potential Applications

  • This method can be applied in various wireless communication systems that utilize RL for optimization and decision-making.
  • It can be used in network management and resource allocation in RANs to improve performance and efficiency.

Problems Solved

  • The method solves the problem of controlling and optimizing the exploration strategy in RL modules in a distributed node.
  • It addresses the challenge of evaluating the cost and performance of exploration actions and determining suitable exploration parameters.

Benefits

  • The method allows for efficient control and optimization of the exploration strategy in RL modules.
  • It enables improved performance and decision-making in wireless communication systems.
  • The method can lead to enhanced resource allocation and network management in RANs.

Abstract

A method performed by a central node for controlling an exploration strategy associated to Reinforcement Learning, RL, in one or more RL modules in a distributed node in a Radio Access Network, RAN, is provided. The central node evaluates a cost of actions performed for explorations in the one or more RL modules, and a performance of the one or more RL modules. Based on the evaluation, the central node determines one or more exploration parameters associated to the exploration strategy. The central node controls the exploration strategy by configuring the one or more RL modules with the determined one or more exploration parameters to update its exploration strategy, enforcing the respective one or more RL modules to act according to the updated exploration strategy to produce data samples for the one or more RL modules in the distributed node.

Cell Similarity Indicator Based on Coverage Area Morphology (18034192)

Main Inventor

José María Ruiz Avilés


Brief explanation

The patent application describes a method and apparatus for quantifying similarities between two cells in a mobile communications network. 
  • The method involves receiving input parameters for each cell and determining respective sets of features for the cell based on those parameters.
  • Each set of features defines a cell configuration and a coverage area morphology for the cell.
  • The level of similarity between the two cells can be determined by comparing their respective sets of features.

Potential Applications

  • This technology can be used in mobile communications networks to analyze and compare the similarities between different cells.
  • It can help network operators in optimizing their network configurations and coverage areas.
  • The method can be applied in network planning and deployment to ensure efficient utilization of resources.

Problems Solved

  • The technology solves the problem of quantifying similarities between cells in a mobile communications network.
  • It provides a systematic approach to compare and analyze the configuration and coverage area morphology of different cells.
  • The method helps in identifying similarities and differences between cells, which can aid in network optimization and resource allocation.

Benefits

  • The method provides a quantitative measure of similarity between cells, allowing for objective analysis and comparison.
  • It helps in identifying redundant or overlapping coverage areas, enabling network operators to optimize their network configurations.
  • The technology can lead to improved network performance, better resource utilization, and enhanced user experience.

Abstract

A method () and apparatus () for quantifying similarities between first and second cells () in a mobile communications network () is provided. In particular, for each of the first cell and the second cell, a network node () receives input parameters, and based on those parameters, determines () respective sets of features for the cell. Each respective set of features defines a cell configuration and a coverage area morphology for the cell. So determined, a level of similarity between the first and second cells can be determined () based on their respective sets of features.

SIMULTANEOUS QUALITY OF EXPERIENCE MEASUREMENT CONFIGURATIONS FOR INCAPABLE USER EQUIPMENTS (18031896)

Main Inventor

Johan RUNE


Brief explanation

The patent application describes a method for operating a user equipment (UE) in a wireless communication network to measure the quality of experience (QoE) for multiple applications or application data flows. The method involves obtaining a time sharing configuration for QoE measurements and performing these measurements by dividing the time between the different applications or data flows based on the configuration.
  • The method allows for QoE measurements to be performed on multiple applications or data flows processed by a UE.
  • The time sharing configuration determines how the QoE measurements are divided among the different applications or data flows.
  • The method ensures that QoE measurements are performed in a time-efficient manner, optimizing the use of resources.

Potential Applications

  • This technology can be applied in wireless communication networks to improve the overall quality of experience for users by accurately measuring the performance of different applications or data flows.
  • It can be used in network optimization and troubleshooting to identify and address performance issues in specific applications or data flows.
  • The method can also be utilized in network planning and resource allocation to optimize the allocation of network resources based on the QoE measurements.

Problems Solved

  • The method solves the problem of efficiently measuring the quality of experience for multiple applications or data flows processed by a UE.
  • It addresses the challenge of dividing the time for QoE measurements among different applications or data flows in a fair and effective manner.
  • The method helps in identifying and resolving performance issues in specific applications or data flows, leading to improved user satisfaction.

Benefits

  • The method allows for accurate and efficient measurement of QoE for multiple applications or data flows, providing valuable insights into the performance of the network.
  • It enables network operators to optimize resource allocation and network planning based on the QoE measurements, leading to improved overall network performance.
  • By identifying and addressing performance issues in specific applications or data flows, the method helps in enhancing the user experience and satisfaction.

Abstract

A method of operating a UE in a wireless communication network, includes obtaining time sharing configuration for quality of experience (QoE) measurements. The method further includes performing QoE measurements time divided between multiple applications and/or multiple application data flows processed by the UE, wherein the QoE measurements are time divided based on the time sharing configuration. Another related method of operating a network node in a wireless communication network, includes generating a time sharing configuration defining time divided QoE measurements to be performed by a UE for multiple applications and/or multiple application data flows processed by the UE, and providing the time sharing configuration to the UE.

SYSTEMS AND METHODS FOR BANDWIDTH PART AND BEAM SWITCHING FOR NON-TERRESTRIAL NETWORKS (18249331)

Main Inventor

Hazhir SHOKRI RAZAGHI


Brief explanation

Abstract: This patent application describes a method for a wireless device to perform measurements on non-active bandwidth parts (BWP) while in connected mode.
  • The wireless device performs measurements on non-active BWP.
  • The measurements are conducted while the device is in connected mode.

Potential Applications

This technology has potential applications in the following areas:

  • Wireless communication networks
  • Mobile devices
  • Internet of Things (IoT) devices

Problems Solved

The technology solves the following problems:

  • Limited ability to perform measurements on non-active BWP while in connected mode.
  • Lack of efficient utilization of non-active BWP for measurement purposes.

Benefits

The benefits of this technology include:

  • Improved measurement capabilities for wireless devices.
  • Enhanced utilization of non-active BWP for measurement purposes.
  • Better optimization and management of wireless communication networks.

Abstract

A method by a wireless device includes performing at least one measurement on at least one non-active bandwidth part (BWP) while the wireless device is in connected mode.

QoS AWARE REINFORCEMENT LEARNING PREVENTION INTRUSION SYSTEM (18250120)

Main Inventor

Amine BOUKHTOUTA


Brief explanation

The patent application describes a network node that is designed to perform network routing for multiple wireless devices in a communication system. The network node collects information about the network topology and uses self-learning techniques to determine actions for updating network routes. These actions are then transmitted to a controller, which instructs the wireless devices to update their network routes accordingly.
  • The network node collects graph states associated with multiple graphs, where each graph represents the network topology and has nodes associated with wireless devices.
  • Using self-learning techniques, the network node determines actions to update network routes in the graphs based on the collected graph states.
  • The determined actions are transmitted to a controller, which then instructs the wireless devices to update their network routes based on the actions.

Potential Applications

  • This technology can be applied in various communication systems that involve multiple wireless devices, such as cellular networks, IoT networks, and wireless sensor networks.
  • It can be used to optimize network routing and improve the overall performance and efficiency of the communication system.

Problems Solved

  • Traditional network routing algorithms may not be able to adapt to dynamic changes in the network topology and may result in suboptimal routing decisions.
  • This technology solves the problem of inefficient network routing by using self-learning techniques to update network routes based on real-time information about the network topology.

Benefits

  • The use of self-learning techniques allows for adaptive and efficient network routing, improving the overall performance and reliability of the communication system.
  • By updating network routes based on real-time information, this technology can optimize the utilization of network resources and reduce network congestion.
  • The ability to collect and analyze graph states associated with multiple graphs enables a more comprehensive understanding of the network topology, leading to better routing decisions.

Abstract

Methods, systems, and apparatuses are disclosed. A network node configured for performing network routing associated with a plurality of wireless devices, WDs, in a communication system is described. The network node includes processing circuit configured to collect, from a control plane, a plurality of graph states associated with a plurality of graphs. Each graph of the plurality of graphs has at least one graph node associated with one WD of the plurality of WDs. At least one action is determined, using self-learning, to update at least one route in at least one graph of the plurality of graphs based on the collected plurality of graphs states. The at least one action is transmitted to a controller for instructing at least one WD to update at least one network route based on the at least one action.

Network Node and Methods Therein (18034829)

Main Inventor

Sina Maleki


Brief explanation

The abstract describes a method performed by a network node to communicate with a wireless device (WD). The method involves determining the status of a data radio bearer (DRB) of the WD and based on this status, determining the configurations of one or more bandwidth parts (BWPs) and/or search spaces (SS) for the WD. 
  • The method enables a power saving mode for the WD when the DRB status is inactive by configuring the WD with an SS configuration from the determined BWPs and SS configurations.
  • When the DRB status is active, the power saving mode is disabled or not enabled.

Potential applications of this technology:

  • This method can be applied in wireless communication networks to optimize power consumption of wireless devices.
  • It can be used in various wireless communication protocols and standards to improve energy efficiency.

Problems solved by this technology:

  • Power consumption is a significant concern in wireless communication devices, and this method helps in reducing power usage by enabling a power saving mode when the DRB status is inactive.

Benefits of this technology:

  • Improved energy efficiency and extended battery life for wireless devices.
  • Reduced power consumption leads to lower operating costs and environmental impact.
  • Enhanced performance and reliability of wireless communication networks.

Abstract

A method performed by a network node that is configured to communicate with a WD is provided. The method comprises determining () a data radio bearer (DRB) status of the WD; determining () one or more bandwidth parts (BWPs) and/or one or more search space (SS) configurations of one or more BWPs for the WD based on the DRB status; when the DRB status is inactive, enabling () a power saving mode for the WD by configuring the WD with an SS configuration from the determined one or more SS configurations of the one or more BWPs for the WD based at least on the DRB status; and when the DRB status is active, disabling () the power saving mode or not enabling the power saving mode.

MANAGING RESOURCES IN A RADIO ACCESS NETWORK (18033060)

Main Inventor

Luca Lunardi


Brief explanation

The patent application describes a computer implemented method for managing resources in a communication network. The method involves using machine learning to predict resource usage in a future time period based on historical data. The predicted resource status information is then sent to another node in the network for resource management purposes.
  • The method involves obtaining a record of resource status information for a communication network.
  • Machine learning is used to predict resource usage in the future based on the obtained record.
  • The predicted resource status information is sent to another node in the network.
  • The second node uses the received representation of predicted resource status information for resource management.

Potential Applications

  • Resource management in communication networks.
  • Optimization of resource allocation in a communication network.
  • Predictive maintenance of network resources.

Problems Solved

  • Inefficient resource allocation in communication networks.
  • Lack of predictive capabilities for resource usage.
  • Inability to optimize resource management based on future predictions.

Benefits

  • Improved resource allocation and utilization.
  • Cost savings through optimized resource management.
  • Enhanced network performance and reliability.

Abstract

A computer implemented method for managing resources in a RAN of a communication network is disclosed. The method, performed by a first node in the RAN, comprises obtaining a record of resource status information describing usage, during a historical time period and within a coverage area of the first node, of RAN resources controlled by the first node (), and using an ML process to predict, based on the obtained record, resource status information describing usage of RAN resources controlled by the first node within a coverage area of the first node and during a future time period (). The method further comprises sending, to a second node in the RAN, a representation of the predicted resource status information (). Also disclosed is a method performed by a second node in which the second node uses a received representation of predicted resource status information for RAN resources controlled by a first node in a process relating to management of RAN resources controlled by the second node ().

Inter Base Station Handover with Dual Active Protocol Stack (18036452)

Main Inventor

Pontus Wallentin


Brief explanation

The abstract describes techniques for inter base station handovers in a wireless device operating in a PDCP packet duplication mode. These techniques allow the device to transition from PDCP packet duplication with the source cell to DAPS (Data Adaptation and Protocol Support) and back to PDCP packet duplication with the target cell during handover. The RLC (Radio Link Control) entities established with the source cell are preserved during the handover to ensure QoS (Quality of Service) requirements for URLLC (Ultra-Reliable Low Latency Communications) are met.
  • The patent application provides techniques for inter base station handovers in wireless devices operating in PDCP packet duplication mode.
  • These techniques enable smooth transitions from PDCP packet duplication with the source cell to DAPS and back to PDCP packet duplication with the target cell during handover.
  • The RLC entities established with the source cell are preserved during the handover process.
  • The handover techniques ensure that QoS requirements for URLLC can be maintained during the inter base station handover.

Potential Applications

  • This technology can be applied in wireless communication systems to improve handover performance and maintain QoS for URLLC.
  • It can be utilized in various industries that rely on wireless communication, such as telecommunications, IoT (Internet of Things), and autonomous vehicles.

Problems Solved

  • The techniques address the challenge of maintaining QoS for URLLC during inter base station handovers.
  • They solve the problem of transitioning from PDCP packet duplication with the source cell to DAPS and back to PDCP packet duplication with the target cell seamlessly.
  • The preservation of RLC entities ensures a smooth handover process without compromising the quality of communication.

Benefits

  • The handover techniques improve the overall performance and reliability of wireless communication systems.
  • They enable uninterrupted communication during handovers, ensuring a seamless user experience.
  • By preserving RLC entities, the techniques minimize disruptions and maintain QoS for URLLC applications.

Abstract

Techniques for inter base station handovers are provided for the case where a wireless device is operating in a PDCP packet duplication mode. The handover techniques enable the wireless device to transition from PDCP packet duplication with the source cell to DAPS and to transition back to PDCP packet duplication with the target cell when the handover is complete. In some embodiments, the RLC entities established with the source cell are preserved during the inter base station handover. The handover techniques ensure that QoS requirements for URLLC can be met during the inter base station handover.

METHOD AND APPARATUS FOR RELAY COMMUNICATION (18032317)

Main Inventor

Min WANG


Brief explanation

The abstract describes a method for relay communication in a terminal device. The method involves obtaining configuration information of the terminal device, which indicates that the identifier of the device for an adaptation layer needs to be reconfigured. The method also includes determining whether to update the identifier of the device for a data unit.
  • The method is performed by a terminal device.
  • Configuration information of the device is obtained.
  • The configuration information indicates the need to reconfigure the identifier for an adaptation layer.
  • The method includes determining whether to update the identifier for a data unit.

Potential Applications

  • This method can be applied in various communication systems that involve relay communication.
  • It can be used in wireless networks to improve the efficiency and reliability of data transmission.

Problems Solved

  • The method solves the problem of reconfiguring the identifier of a terminal device for an adaptation layer.
  • It addresses the challenge of determining whether to update the identifier for a data unit.

Benefits

  • The method allows for efficient relay communication by reconfiguring the identifier of the terminal device.
  • It improves the reliability of data transmission by determining whether to update the identifier for a data unit.

Abstract

Various embodiments of the present disclosure provide a method for relay communication. The method which may be performed by a terminal device comprises obtaining configuration information of the terminal device. The configuration information may indicate that a first identifier of the terminal device for an adaptation layer is to be reconfigured to a second identifier of the terminal device for the adaptation layer. In accordance with an exemplary embodiment, the method further comprises determining whether to update the first identifier of the terminal device for a data unit to the second identifier.

SCG ACTIVATION DURING MOBILITY (18032290)

Main Inventor

Pontus WALLENTIN


Brief explanation

The abstract describes a method performed by a communication device operating in a wireless communication network. The method involves receiving a message from a network node that instructs the device to perform a mobility procedure related to a master cell group (MCG) or a secondary cell group (SCG). The device determines the power-saving state of the SCG, executes the mobility procedure based on the instruction and SCG state, and applies the determined SCG state after the procedure.
  • The communication device operates in dual connectivity with both MCG and SCG in a wireless communication network.
  • The device receives a message from a network node containing an instruction for a mobility procedure related to MCG or SCG.
  • It determines the power-saving state of the SCG.
  • The device executes the mobility procedure based on the received instruction and the determined SCG state.
  • After executing the mobility procedure, the device applies the determined SCG state.

Potential Applications

  • This technology can be applied in various wireless communication networks, such as cellular networks, to improve the efficiency of mobility procedures.
  • It can be used in devices that require seamless handovers between different cell groups to maintain uninterrupted communication.

Problems Solved

  • The method addresses the issue of power consumption in the SCG during mobility procedures.
  • It solves the problem of maintaining the power-saving state of the SCG after executing a mobility procedure.

Benefits

  • By considering the power-saving state of the SCG, the method helps optimize power consumption in the communication device.
  • It ensures that the determined SCG state is applied after executing the mobility procedure, improving the overall efficiency of the device.
  • The method enables seamless handovers between different cell groups, enhancing the user experience in wireless communication networks.

Abstract

A method, performed by a communication device operating in dual connectivity with a master cell group, MCG, and a secondary cell group, SCG, of a wireless communication network includes receiving a message from a network node of the wireless communication network, the message including an instruction to perform a mobility procedure concerning at least one of the MCG or the SCG, determining an SCG state for power saving for the communication device, executing the mobility procedure according to the instruction and the SCG state, and applying the determined SCG state following execution of the mobility procedure.

GRAPH-BASED SYSTEMS AND METHODS FOR CONTROLLING POWER SWITCHING OF COMPONENTS (18027482)

Main Inventor

Selim ICKIN


Brief explanation

The patent application describes a computer implemented method for managing power control in a communication system. Here is a simplified explanation of the abstract:
  • The method involves creating a graph representation of the communication system, where each component is represented as a node and the dependency relationships between components are represented as edges.
  • The edges in the graph have weights that indicate the relative importance of the dependency relationship.
  • The method then generates a policy for managing power control by determining the order in which components should be switched on or off based on the edge weights.

Potential applications of this technology:

  • Power management in wireless communication networks.
  • Energy-efficient management of data centers.
  • Optimization of power usage in smart grid systems.

Problems solved by this technology:

  • Efficient power control management in complex communication systems.
  • Minimizing power consumption while maintaining system functionality.
  • Prioritizing power control decisions based on the importance of dependency relationships.

Benefits of this technology:

  • Improved energy efficiency and reduced power consumption.
  • Enhanced system reliability by managing power control based on dependency relationships.
  • Optimal utilization of power resources in communication systems.

Abstract

A computer implemented method of managing power control in a communication system includes generating a graph representation of interdependencies of components of the communication system, wherein the graph representation includes graph nodes corresponding to the components of the communication system and edges between pairs of graph nodes representing dependency relationships between the pairs of nodes. The method generates edge weights for the edges of the graph representation that correspond to the relative importance of the dependency relationship represented by the edge weight, and generates a policy for managing power control by determining an order for switching the components of the communication system on or off based on the edge weights.

RECURRENT DATA RECEPTION IN IDLE/INACTIVE UE (18249077)

Main Inventor

Ali NADER


Brief explanation

The abstract of this patent application describes a method performed by a wireless device in idle/inactive mode. The method involves receiving assistance information from a network node, which includes a time-domain resource guarantee for a recurrent wakeup activity. Based on this assistance information, the wireless device determines whether to enter a power saving mode of operation between receiving control information and receiving data information associated with the recurrent wakeup activity.
  • The wireless device receives assistance information from a network node.
  • The assistance information includes a time-domain resource guarantee for a recurrent wakeup activity.
  • The wireless device uses the assistance information to decide whether to enter a power saving mode.
  • The decision is made based on whether the control information and data information associated with the recurrent wakeup activity can be received efficiently.

Potential applications of this technology:

  • This technology can be applied in wireless devices operating in idle/inactive mode.
  • It can be used in various wireless communication systems, such as cellular networks, Wi-Fi networks, and IoT networks.
  • The method can help improve power efficiency and extend battery life in wireless devices.

Problems solved by this technology:

  • Wireless devices in idle/inactive mode often consume unnecessary power while waiting for control and data information.
  • It can be challenging to efficiently manage power consumption in wireless devices during recurrent wakeup activities.
  • This technology addresses these issues by providing a method to determine whether to enter a power saving mode based on assistance information received from a network node.

Benefits of this technology:

  • By entering a power saving mode during idle periods, wireless devices can conserve energy and extend battery life.
  • The method allows wireless devices to optimize power consumption based on the specific requirements of recurrent wakeup activities.
  • Improved power efficiency can lead to cost savings and a reduced environmental impact.

Abstract

According to some embodiments, a method performed by a wireless device operating in idle/inactive mode comprises receiving assistance information from a network node, wherein the assistance information comprises a time-domain resource guarantee for a recurrent wakeup activity; and based on the assistance information, determining whether to enter a power saving mode of operation between receiving control information associated with the recurrent wakeup activity and receiving data information associated with the recurrent wakeup activity.

METHODS AND APPARATUSES FOR CHANNEL ESTIMATION (18022698)

Main Inventor

Huichen Wang


Brief explanation

The patent application describes methods and apparatuses for channel estimation in a network node. Here is a simplified explanation of the abstract:
  • The network node receives a channel quality indication (CQI) value from a terminal device.
  • The CQI value is reported by the terminal device for a specific anchor physical resource block (PRB).
  • Based on the CQI value, the network node determines the first signal to interference plus noise ratio (SINR) of the downlink channel for the anchor PRB.

Potential Applications:

  • Wireless communication networks
  • Cellular networks
  • Internet of Things (IoT) devices
  • 5G and beyond networks

Problems Solved:

  • Accurate channel estimation is crucial for optimizing the performance of wireless communication systems.
  • Traditional methods of channel estimation may be inefficient or inaccurate.
  • This technology provides a more reliable and efficient way to estimate the channel quality.

Benefits:

  • Improved signal quality and reliability in wireless communication systems.
  • Enhanced network performance and capacity.
  • Better resource allocation and management.
  • Increased data rates and throughput.
  • Improved user experience and satisfaction.

Abstract

Methods and apparatuses are disclosed for channel estimation. According to an embodiment, a network node obtains, from a terminal device, a channel quality indication (CQI) value reported by the terminal device for an anchor physical resource block (PRB). The network node determines, for the anchor PRB, a first signal to interference plus noise ratio (SINR) of a downlink channel, based at least on the CQI value.

SYNCHRONISATION SIGNALING FOR WIRELESS COMMUNICATION NETWORK (18247781)

Main Inventor

Ning HE


Brief explanation

The patent application describes a method for operating a transmitting radio node in a wireless communication network. The method involves transmitting two types of synchronisation signaling, each carrying broadcast signaling on different pairs of allocation units. The broadcast signaling on the first and second pairs of allocation units are associated with each other.
  • The method involves transmitting synchronisation signaling in a wireless communication network.
  • The synchronisation signaling includes pairs of allocation units carrying broadcast signaling.
  • The broadcast signaling on the first and second pairs of allocation units are cross-wise associated.

Potential Applications:

  • This technology can be applied in various wireless communication networks, such as cellular networks or Wi-Fi networks.
  • It can improve the synchronization and coordination between transmitting radio nodes in the network.
  • The method can enhance the efficiency and reliability of broadcast signaling in wireless communication.

Problems Solved:

  • The method addresses the issue of synchronization in wireless communication networks.
  • It solves the problem of coordinating broadcast signaling between transmitting radio nodes.
  • The technology improves the overall performance and reliability of wireless communication networks.

Benefits:

  • The method allows for better synchronization and coordination between transmitting radio nodes, leading to improved network performance.
  • It enhances the efficiency of broadcast signaling, resulting in faster and more reliable communication.
  • The technology can be implemented in existing wireless communication networks without requiring significant changes or upgrades.

Abstract

There is disclosed a method of operating a transmitting radio node in a wireless communication network. The method includes transmitting first synchronisation signaling having one or more first pairs of allocation units carrying broadcast signaling, and transmitting second synchronisation signaling having one or more second pairs of allocation units carrying broadcast signaling, wherein broadcast signaling carried on the first and second pairs of allocation units are cross-wise associated. The disclosure also pertains to related devices and methods.

ENHANCEMENT FOR UPLINK DATA TRANSMISSION (18248558)

Main Inventor

Ling Su


Brief explanation

The present disclosure relates to enhancing uplink data transmission in the field of telecommunication. 
  • The method involves a terminal device receiving a message from a network node that indicates parameters for a Physical Uplink Shared Channel (PUSCH) transmission.
  • The terminal device then transmits the PUSCH transmission to the network node based on the received message.
  • The network node transmits a message to the terminal device indicating parameters for a PUSCH transmission.
  • The network node receives the PUSCH transmission from the terminal device based on the transmitted message.

Potential Applications

  • This technology can be applied in various telecommunication systems that involve uplink data transmission.
  • It can be used in mobile networks to improve the efficiency and reliability of uplink data transmission.

Problems Solved

  • The technology addresses the need for efficient uplink data transmission in telecommunication systems.
  • It solves the problem of optimizing the parameters for PUSCH transmission to ensure reliable and high-quality data transmission.

Benefits

  • The technology improves the performance of uplink data transmission by providing optimized parameters for PUSCH transmission.
  • It enhances the overall efficiency and reliability of telecommunication systems.
  • The method simplifies the process of transmitting and receiving uplink data, leading to improved user experience.

Abstract

The present disclosure is related to the field of telecommunication, and in particular, to enhancement for uplink data transmission. A method at a terminal device comprises: receiving, from a network node, a first message indicating at least one parameter for a Physical Uplink Shared Channel (PUSCH) transmission; and transmitting, to the network node, the PUSCH transmission at least partially based on the first message. A method at a network node comprises: transmitting, to a terminal device, a first message indicating at least one parameter for a Physical Uplink Shared Channel (PUSCH) transmission; and receiving, from the terminal device, the PUSCH transmission at least partially based on the first message.

LBT Parameters for SRS Transmission (18450565)

Main Inventor

Sorour FALAHATI


Brief explanation

The patent application describes a method for managing the size of a contention window in a user equipment (UE) for unlicensed spectrum transmissions. The method involves performing a listen-before-talk (LBT) procedure using a specific contention window size and priority class for an acknowledged uplink transmission. It also includes transmitting an un-acknowledged uplink transmission and receiving an acknowledgement for the first transmission. Based on the received acknowledgement, both the contention window size for the acknowledged transmission and a second contention window size are modified. A second LBT procedure is then performed using the modified contention window size and a different priority class for an un-acknowledged uplink transmission.
  • The method involves managing the contention window size in a UE for unlicensed spectrum transmissions.
  • It includes performing a first LBT procedure for an acknowledged uplink transmission.
  • The method also involves transmitting an un-acknowledged uplink transmission and receiving an acknowledgement for the first transmission.
  • Based on the received acknowledgement, both the contention window size for the acknowledged transmission and a second contention window size are modified.
  • A second LBT procedure is performed using the modified contention window size and a different priority class for an un-acknowledged uplink transmission.

Potential Applications

  • This method can be applied in various wireless communication systems that utilize unlicensed spectrum, such as Wi-Fi networks.
  • It can be used in devices like smartphones, tablets, laptops, and IoT devices that rely on unlicensed spectrum for uplink transmissions.

Problems Solved

  • The method addresses the issue of contention in unlicensed spectrum by managing the contention window size.
  • It helps in optimizing the transmission performance by adjusting the contention window size based on the acknowledgement received for previous transmissions.

Benefits

  • By dynamically modifying the contention window size based on acknowledgements, the method improves the efficiency and reliability of uplink transmissions in unlicensed spectrum.
  • It allows for better management of contention and reduces the chances of collisions and interference in the spectrum.
  • The method helps in maximizing the utilization of unlicensed spectrum resources and improving overall network performance.

Abstract

According to some embodiments, a method for use in a user equipment (UE) of managing a listen-before-talk (LBT) contention window size comprises performing a first LBT procedure using a first contention window size and priority class for a first uplink transmission in unlicensed spectrum. The first uplink transmission comprises an acknowledged transmission. The method further comprises transmitting a second uplink transmission. The second uplink transmission comprises an un-acknowledged transmission. The method further comprises receiving an acknowledgement for the first uplink transmission, and modifying both the first contention window size and a second contention window based on the received acknowledgement. The method further comprises performing a second LBT procedure using the second contention window size and a second priority class for a third uplink transmission in unlicensed spectrum. The third uplink transmission comprises an un-acknowledged transmission.

Method, Apparatus and Computer Program Product for Providing Service Continuity for Multicast and Broadcast Service (18249799)

Main Inventor

Dung Pham Van


Brief explanation

The present patent application is related to wireless communication technology and specifically focuses on providing service continuity for Multicast and Broadcast Service (MBS). The application describes a method and apparatus for retransmitting missing data units in MBS sessions to ensure uninterrupted service for users.
  • The patent application addresses the need for service continuity in Multicast and Broadcast Service (MBS) in wireless communication.
  • It proposes a method for retransmitting missing Packet Data Units (PDUs) in MBS data that were not received by the user equipment (UE).
  • The method involves receiving a request from the UE for retransmitting the missing PDUs associated with an MBS session.
  • Based on the request, the first RAN node handles the retransmission of the missing PDUs to ensure the uninterrupted delivery of MBS data to the UE.

Potential Applications

This technology has potential applications in various wireless communication systems that utilize Multicast and Broadcast Service (MBS). Some potential applications include:

  • Broadcasting live events or multimedia content to a large number of users simultaneously.
  • Providing software updates or firmware upgrades to multiple devices simultaneously.
  • Delivering real-time information or emergency alerts to a wide range of users in a specific area.

Problems Solved

The technology described in this patent application addresses the following problems:

  • Ensuring uninterrupted service for Multicast and Broadcast Service (MBS) in wireless communication systems.
  • Handling missing data units in MBS sessions to prevent service disruptions for users.
  • Efficiently retransmitting missing Packet Data Units (PDUs) to minimize data loss and maintain service continuity.

Benefits

The proposed method and apparatus for providing service continuity for Multicast and Broadcast Service (MBS) offer several benefits, including:

  • Improved user experience by minimizing service disruptions and ensuring uninterrupted delivery of MBS data.
  • Efficient utilization of network resources by selectively retransmitting missing PDUs instead of retransmitting the entire MBS session.
  • Enhanced reliability and robustness of wireless communication systems utilizing MBS technology.

Abstract

The present application generally relates to wireless communication technology. More particularly, the present application relates to a method and apparatus for providing service continuity for Multicast and Broadcast Service (MBS). The present application also relates to computer program product adapted for the same purpose. According to one embodiment of the present application, a method in a first RAN node for providing service continuity for Multicast and Broadcast Service (MBS) comprises: receiving () from a UE a request for retransmitting one or more missing Packet Data Units (PDUs) in MBS data associated with an MBS session previously transmitted from a second RAN node to the UE; and handling () retransmission of the missing PDUs based on the request.