Telefonaktiebolaget LM Ericsson (publ) patent applications published on December 28th, 2023

From WikiPatents
Revision as of 18:00, 1 January 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Contents

Patent applications for Telefonaktiebolaget LM Ericsson (publ) on December 28th, 2023

TIME TO DIGITAL CONVERTER ARRANGEMENT WITH INCREASED DETECTION RANGE (18459719)

Main Inventor

Mohammed ABDULAZIZ


Brief explanation

The abstract describes a Time to Digital Converter (TDC) arrangement that includes various components such as delay circuits, phase detectors, logic circuits, multiplexers, a TDC, and an adder. These components work together to convert a signal with N phases into a digital output signal.
  • The TDC arrangement includes a first delay circuit that receives a signal with N phases.
  • A set of phase detectors compare each phase of the signal with a reference signal.
  • A logic circuit receives the output signals from the phase detectors and determines which phase signal is closest to the reference signal.
  • A first multiplexer receives the outputs from the first delay circuit and the logic circuit.
  • A second delay circuit delays the reference signal.
  • A TDC receives the output signals from the first multiplexer and the second delay circuit.
  • An adder sums the outputs from the logic circuit and the TDC to generate the final output signal of the TDC arrangement.

Potential applications of this technology:

  • Time measurement in various fields such as telecommunications, radar systems, and scientific research.
  • High-resolution time interval measurements in digital systems.
  • Time-of-flight measurements in distance measurement systems.

Problems solved by this technology:

  • Accurate measurement of time intervals with high precision.
  • Efficient conversion of analog signals into digital signals.
  • Reduction of errors and noise in time measurement.

Benefits of this technology:

  • High accuracy and precision in time measurement.
  • Improved reliability and stability in digital systems.
  • Increased efficiency and performance in various applications.

Abstract

A Time to Digital Converter (TDC) arrangement includes a first delay circuit configured to receive a signal with N phases; a set of phase detectors configured to compare each phase of the signal with a reference signal; a logic circuit configured to receive output signals from the set of phase detectors and detect which phase signal that is the closest signal leading or lagging the reference signal; a first multiplexer configured to receive outputs from the first delay circuit and the logic circuit; a second delay circuit configured to delay the reference signal; a TDC configured to receive output signals from the first multiplexer and the second delay circuit; an adder configured to sum outputs from the logic circuit and the TDC and generate an output signal of the TDC arrangement.

MANAGING TRAINING OF A MACHINE LEARNING MODEL (18035333)

Main Inventor

Selim Ickin


Brief explanation

The abstract describes a method for managing the training of a machine learning model using a master node and multiple worker nodes. Here are the key points:
  • The method involves selecting one or more worker nodes from a group of worker nodes to train a machine learning model.
  • The selection of worker nodes is based on optimizing the performance of an updated machine learning model on a validation dataset.
  • The updated machine learning model has parameters that were trained by the selected worker nodes in a previous round of training.

Potential Applications

  • This method can be applied in various fields where machine learning models are used, such as healthcare, finance, and autonomous vehicles.
  • It can be used to train models for image recognition, natural language processing, fraud detection, and many other applications.

Problems Solved

  • Efficiently managing the training of machine learning models with a large number of worker nodes.
  • Optimizing the performance of the updated model by selecting the most suitable worker nodes for training.
  • Handling the training of machine learning models in a distributed computing environment.

Benefits

  • Improved performance of machine learning models by selecting worker nodes based on validation dataset results.
  • Faster training process by utilizing multiple worker nodes simultaneously.
  • Scalability to handle large datasets and complex models by distributing the training workload among multiple nodes.

Abstract

There is provided a method performed by a master node for managing training of a machine learning model. One or more worker nodes of a plurality of worker nodes are selected to train a machine learning model in a round of training. The one or more worker nodes are selected to optimize a performance of an updated machine learning model for a validation dataset after the round of training. The updated machine learning model has one or more parameters of the machine learning model trained by the one or more worker nodes in a previous round of training.

UE DRIVEN ANTENNA TILT (18036854)

Main Inventor

Alexandros NIKOU


Brief explanation

The present disclosure describes a method for controlling the antenna tilt of a radio base station using machine learning. The method involves a wireless communication device receiving information about the location of the base station and determining a set of values representing the quality of the signal received from the base station at different distances. These values are then used to train a machine learning model that associates the distance from the base station with the signal quality. The trained model is then transmitted to the base station, which uses it to control the antenna tilt.
  • The wireless communication device receives information about the location of the radio base station.
  • The device determines a set of values representing the signal quality at different distances from the base station.
  • A machine learning model is created using the determined values and the distance from the base station.
  • The trained model is transmitted to the base station.
  • The base station uses the model to control the antenna tilt.

Potential Applications

  • This technology can be used in wireless communication networks to optimize the performance of radio base stations.
  • It can improve signal quality and coverage by dynamically adjusting the antenna tilt based on the distance from the base station.

Problems Solved

  • Traditional methods of controlling antenna tilt may not be efficient or accurate enough to adapt to changing network conditions.
  • This technology solves the problem of optimizing antenna tilt by using machine learning to create a model that associates signal quality with distance from the base station.

Benefits

  • By using machine learning, this method can adapt to changing network conditions and optimize antenna tilt in real-time.
  • It improves signal quality and coverage, leading to better overall performance of wireless communication networks.

Abstract

The present disclosure relates to a method of a wireless communication device () of facilitating control of antenna tilt for a radio base station (), a method of a radio base station () of facilitating control of antenna tilt at the radio base station () and further a wireless communication device () and a radio base station () performing the respective method. In a first aspect a method of a wireless communication device () of facilitating control of antenna tilt for a radio base station () is provided. The method comprises receiving (S), from the radio base station (), information indicating a location of the radio base station (), determining (S) a set of values of a measure of quality of a signal received from the radio base station and a distance of the wireless communication device () from the location of the radio base station () at which each value in the set is determined, supplying (S) a machine learning model with the determined set of values of said measure of quality and the distance of the wireless communication device () from the location of the radio base station () for each value, thereby creating a trained machine learning model associating a distance of the wireless communication device () from the location of the radio base station () with a value of a measure of quality of a signal received from the radio base station (), and transmitting (S) the trained machine learning model to the radio base station (), the trained machine learning model being used by the radio base station () to control antenna tilt.

PVT Stabilization of Pipelined SAR ADC (18038675)

Main Inventor

Christer Jansson


Brief explanation

The abstract describes a method for stabilizing the bias voltage in a pipelined Successive Approximation Register Analog to Digital Converter (SAR ADC) by tracking Process, Temperature, and Voltage (PVT) variations. The method involves generating a PVT-dependent bias voltage that is used to bias the inputs of comparators in the SAR ADC. This ensures a stable operating point for the comparators and input stages, regardless of PVT variations. 
  • The method generates a PVT-dependent bias voltage to stabilize the biasing of comparators in a SAR ADC.
  • The PVT-dependent bias voltage tracks PVT variations to counteract variations in MOS threshold voltage and drain-source voltage.
  • A threshold common mode voltage is generated from the PVT-dependent voltage to control the amplification duration of the residual amplifier (RA).
  • The threshold is set to account for logic delays in terminating the amplification, ensuring the desired common mode amplifier output.
  • The dependency of the threshold on PVT cancels out temperature variation from a differential stage transconductance of the RA.
  • Temperature stabilization is further achieved by boosting the charge output by the RA to a capacitive load during part of the amplification.

Potential Applications

  • Analog to digital converters (ADCs)
  • Integrated circuits requiring stable biasing and operating points

Problems Solved

  • Instability of bias voltage in SAR ADCs due to PVT variations
  • Variations in MOS threshold voltage and drain-source voltage affecting the operating point of comparators and input stages
  • Temperature variation affecting the differential stage transconductance of the residual amplifier

Benefits

  • Stable biasing and operating point of comparators and input stages in SAR ADCs
  • Compensation for PVT variations to counteract MOS threshold voltage and drain-source voltage variations
  • Temperature stabilization of the differential stage transconductance in the residual amplifier
  • Improved accuracy and reliability of analog to digital conversion.

Abstract

In a pipelined Successive Approximation Register Analog to Digital Converter, SAR ADC, a Process, Temperature, and Voltage (PVT)-dependent bias voltage is generated and used to bias the inputs of comparators in at least the first SAR stage and residual amplifier (RA). This achieves a stable biasing and an operating point of the comparators and RA input stages that is independent of PVT variations, by tracking PVT variations in such a way that variations in MOS threshold voltage and drain-source voltage are counteracted. Additionally, a threshold common mode voltage is generated from the PVT-dependent voltage, which controls the amplification duration of the RAs such that the final RA output common mode voltage is substantially equal to the PVT-dependent voltage, which is used to bias the inputs of successive SAR stages. The threshold is set to account for logic delays in terminating the amplification based on the threshold comparison, to achieve the desired common mode amplifier output. The dependency on PVT of the threshold additionally cancels temperature variation from a differential stage transconductance of the RA. Further temperature stabilization is achieved by boosting the charge output by the RA to a capacitive load during part of the amplification.

TRANSMITTER CIRCUIT (18003026)

Main Inventor

Christian ELGAARD


Brief explanation

The abstract describes a patent application for a transmitter circuit that receives an analog input signal and a local oscillator (LO) signal. It includes a mixer circuit, a PA circuit, a control circuit, a phase-control circuit, and a gain-control circuit.
  • The mixer circuit combines the analog input signal with the LO signal.
  • The PA circuit amplifies the mixed signal.
  • The control circuit generates a phase-control signal and a gain-control signal based on the envelope of the analog input signal.
  • The phase-control circuit adjusts the LO signal based on the phase-control signal and supplies it to the mixer circuit.
  • The gain-control circuit adjusts the gain of the transmitter circuit based on the gain-control signal.

Potential applications of this technology:

  • Wireless communication systems
  • Radio frequency (RF) transmitters
  • Signal processing devices

Problems solved by this technology:

  • Efficient mixing and amplification of analog input signals
  • Precise control of phase and gain in the transmitter circuit

Benefits of this technology:

  • Improved signal quality and accuracy
  • Enhanced efficiency in wireless communication systems
  • Better control over phase and gain adjustments

Abstract

A transmitter circuit has a signal input for receiving an analog input signal and a local oscillator (LO) input for receiving an LO signal. A mixer circuit has a first input, a second input, and an output. The second input of the mixer circuit is connected to a signal input of the transmitter circuit. A PA circuit has an input connected to the output of the mixer circuit, and an output. A control circuit generates a phase-control signal and a gain-control signal in response to an envelope of the analog input signal. A phase-control circuit generates a phase-adjusted LO signal in response to the LO signal and the phase-control signal and supplies the phase-adjusted LO signal to the first input of the mixer circuit. A gain-control circuit controls a gain of the transmitter circuit in response to the gain-control signal.

METHODS AND DEVICES FOR BEAMFORMING (18036449)

Main Inventor

Yue HUANG


Brief explanation

==Abstract==

Various embodiments of the present disclosure provide a method for beamforming. The method, which may be implemented at a network node, includes obtaining channel information of a terminal device, determining a self-correlation factor of the terminal device based on the channel information, determining the main lobe width based on the relationship between the self-correlation factor and the main lobe width, determining a weight vector on at least one transmitting antenna based on the determined main lobe width, and transmitting a message to the terminal device using the weight vector on the at least one transmitting antenna.

Explanation

  • The patent application describes a method for beamforming, which is a technique used in wireless communication systems to improve signal quality and coverage.
  • The method involves obtaining channel information of a terminal device, which refers to the characteristics of the wireless channel between the network node and the terminal device.
  • The self-correlation factor of the terminal device is determined based on the channel information. The self-correlation factor represents the correlation between the signals received by the terminal device.
  • The main lobe width, which determines the directionality of the transmitted signal, is determined based on the relationship between the self-correlation factor and the main lobe width.
  • A weight vector is then calculated based on the determined main lobe width. The weight vector represents the relative strength and phase of the signals transmitted from each antenna.
  • Finally, the network node transmits a message to the terminal device using the calculated weight vector on the transmitting antenna(s), resulting in improved signal reception at the terminal device.

Potential Applications

  • This technology can be applied in various wireless communication systems, such as cellular networks, Wi-Fi networks, and satellite communication systems.
  • It can improve the signal quality and coverage in areas with high interference or weak signal strength.
  • Beamforming can be particularly beneficial in crowded environments, such as stadiums, airports, and urban areas, where multiple devices are competing for limited wireless resources.

Problems Solved

  • Beamforming helps mitigate the effects of interference and multipath fading, which can degrade the quality of wireless signals.
  • By focusing the transmitted signal towards the intended receiver, beamforming improves the signal-to-noise ratio and reduces the likelihood of errors or dropped connections.
  • This technology also enables better utilization of available spectrum, as it allows for more efficient transmission and reception of signals.

Benefits

  • Improved signal quality and coverage: Beamforming enhances the received signal strength and reduces signal degradation, leading to better overall communication performance.
  • Increased capacity: By directing the signal towards the intended receiver, beamforming allows for more efficient use of available resources, enabling higher data rates and accommodating more simultaneous connections.
  • Enhanced user experience: With improved signal quality and coverage, users can enjoy faster and more reliable wireless connections, resulting in better voice and data communication, smoother video streaming, and faster downloads/uploads.

Abstract

Various embodiments of the present disclosure provide a method for beamforming. The method which may be at a network node and includes: obtaining channel information of a terminal device; determining a self-correlation factor of the terminal device according to the channel information; determining main lobe width according to a relationship between self-correlation factor and main lobe width; determining a weight vector on at least one transmitting antenna according to the determined main lobe width; and transmitting a message using the weight vector on the at least one transmitting antenna, to the terminal device.

METHOD FOR MULTISITE TRANSMISSION USING COMPLEMENTARY CODES (18249735)

Main Inventor

Ali S. KHAYRALLAH


Brief explanation

The abstract describes a method for multi-site wireless transmission using complementary channel coding. Here is a simplified explanation of the abstract:
  • The method involves encoding a message using a shared mother code and then parsing it into a specific set of complementary codewords.
  • It determines the resources and configuration of the transmitter needed to transmit the first complementary codeword.
  • Finally, it transmits the first complementary codeword to the receiver.

Potential Applications:

  • Multi-site wireless communication systems
  • Mobile networks
  • Internet of Things (IoT) devices
  • Satellite communication systems

Problems Solved:

  • Efficient utilization of channel resources for multi-site wireless transmission
  • Enhancing the reliability and error correction capabilities of wireless communication
  • Enabling seamless communication between different sites or devices

Benefits:

  • Improved transmission efficiency and reliability
  • Enhanced error correction capabilities
  • Increased capacity for multi-site wireless communication
  • Better utilization of channel resources

Abstract

A method of a transmitter enables multi-site wireless transmission using complementary channel coding. The method includes receiving a message to be transmitted to a receiver, encoding the message as a first codeword using a shared mother code, parsing the first codeword into a first complementary codeword of a set of complementary codewords specific to the first codeword, determining a set of shared channel resources and a configuration of the transmitter to be utilized to transmit the first complementary codeword, and transmitting the first complementary codeword to the receiver.

POWER CONTROL FOR FEEDBACK SIGNALING (18462781)

Main Inventor

Robert BALDEMAIR


Brief explanation

The patent application describes a method for operating a user equipment in a radio access network. The method involves transmitting feedback signaling for multiple cells at a power level determined by the difference between two values, V and U. 
  • The value V represents the total number of scheduling assignments the user equipment is expected to receive for the multiple cells.
  • The value U represents the total number of scheduling assignments actually received by the user equipment for the multiple cells.

Potential applications of this technology:

  • Mobile communication networks
  • Wireless communication systems
  • Radio access networks

Problems solved by this technology:

  • Efficient allocation of power for transmitting feedback signaling in a radio access network
  • Optimizing the power level based on the expected and received scheduling assignments

Benefits of this technology:

  • Improved performance and reliability of user equipment in a radio access network
  • Enhanced power management and resource allocation in wireless communication systems

Abstract

There is disclosed a method of operating a user equipment in a radio access network. The method includes transmitting feedback signaling pertaining to a plurality of cells, the feedback signaling being transmitted at a power level, the power level being based on a difference between a value V and a value U, the value V being indicative of the total number of scheduling assignments the user equipment is expected to receive for the plurality of cells, and the value U being indicative of the total number of scheduling assignments for the plurality of cells received by the user equipment. The disclosure also pertains to related devices and methods.

RADIO UNIT, DIGITAL UNIT, SYSTEM, AND METHOD FOR POSITIONING (18037132)

Main Inventor

Huaisong Zhu


Brief explanation

The present disclosure describes a method performed by a Radio Unit (RU) in a communication system. The method involves the following steps:
  • Receiving an instruction from a Digital Unit (DU) to receive a reference signal.
  • Receiving the reference signal from a terminal device based on the instruction.
  • Transmitting a positioning signal to the DU based on the received reference signal.

Potential applications of this technology:

  • This method can be used in various communication systems, such as cellular networks, to improve positioning accuracy.
  • It can be applied in location-based services, asset tracking, and navigation systems.

Problems solved by this technology:

  • The method helps in accurately determining the position of a terminal device in a communication system.
  • It addresses the challenge of obtaining reliable reference signals for positioning purposes.

Benefits of this technology:

  • Improved positioning accuracy leads to better location-based services and navigation experiences.
  • The method enables efficient and reliable transmission of positioning signals between the RU and DU.
  • It enhances the overall performance and reliability of the communication system.

Abstract

The present disclosure, a method performed by a Radio Unit, RU, is provided. The method includes: receiving, from a Digital Unit, DU, an instruction to receive a reference signal; receiving, from a terminal device, the reference signal in accordance with the instruction; and transmitting, to the DU, a positioning signal based on the received reference signal.

PUCCH RESOURCE INDICATION FOR CSI AND HARQ FEEDBACK (18342154)

Main Inventor

Sebastian FAXÉR


Brief explanation

The patent application describes systems and methods for triggering Channel State Information (CSI) reporting on the Physical Uplink Control Channel (PUCCH) in a wireless network.
  • A network node sends a control message to a wireless device.
  • The control message includes a CSI request field and a PUCCH resource indicator.
  • The wireless device receives the control message.
  • The wireless device determines to trigger a CSI report based on the CSI request field and the PUCCH resource indicator.

Potential Applications

  • Wireless communication networks
  • Cellular networks
  • Internet of Things (IoT) devices
  • 5G networks

Problems Solved

  • Efficient triggering of CSI reporting in wireless networks
  • Optimizing resource allocation for CSI reporting
  • Enhancing network performance and reliability

Benefits

  • Improved accuracy and timeliness of CSI reporting
  • Reduced network congestion and interference
  • Enhanced network capacity and efficiency
  • Better overall user experience in wireless communication.

Abstract

Systems and methods for triggering CSI reporting on PUCCH are described herein. A network node transmits a downlink-related control message including a Channel State Information (CSI) request field and a Physical Uplink Control Channel (PUCCH) resource indicator. A wireless device receives the control message and determines to trigger a CSI report in accordance with the CSI request field and the PUCCH resource indicator.

IMPLICIT UPDATE OF ACTIVATED TCI STATES (18250385)

Main Inventor

Claes TIDESTAV


Brief explanation

The abstract describes a patent application for systems and methods that allow for the activation of Transmission Configuration Indicator (TCI) states in wireless communication devices. This activation is done implicitly, without the need for additional messages.
  • The method involves sending a measurement report for reference signals to a base station.
  • The reference signals are associated with different TCI states.
  • Based on the measurement report, at least one TCI state is activated.
  • This simplifies and expedites the selection of TCI states, as it eliminates the need for additional activation messages.

Potential Applications

  • Wireless communication devices and networks
  • Mobile devices and smartphones
  • Internet of Things (IoT) devices

Problems Solved

  • Simplifies and expedites the selection of TCI states
  • Avoids the need for additional Medium Access Control (MAC) Control Element (CE) activation messages

Benefits

  • Faster and more efficient activation of TCI states
  • Simplified communication between wireless devices and base stations
  • Improved performance and reliability of wireless networks

Abstract

Systems and methods for implicitly activating one or more Transmission Configuration Indicator (TCI) states are provided. In some embodiments, a method performed by a wireless communication device for implicit TCI state activation includes sending a measurement report for one or more reference signals to a base station. The one or more reference signals are related to one or more TCI states, respectively. The method further includes activating at least one TCI state from among the one or more TCI states that are related to the one or more reference signals. In this way, the TCI state selection may be expedited and simplified because additional Medium Access Control (MAC) Control Element (CE) activation message may be avoided.

Method and Apparatus for Detection of Radio Signal (18036980)

Main Inventor

Ke Zhong


Brief explanation

The present disclosure describes methods and apparatus for detecting radio signals using match filters and classifiers. The goal is to determine whether a specific code sequence is present in the radio signal.
  • The reception apparatus obtains time domain samples of the radio signal.
  • The time domain samples are processed by multiple match filters to generate filtered results.
  • A classifier is used to classify the filtered results.
  • Filtered results that are not associated with the code sequence are discarded.
  • If a filtered result is associated with the code sequence, it is determined that the code sequence is used in the radio signal.

Potential applications of this technology:

  • Wireless communication systems: This technology can be used to detect specific code sequences in radio signals, which is useful in wireless communication systems for signal identification and decoding.
  • Spectrum monitoring: By detecting specific code sequences, this technology can help in monitoring and analyzing the spectrum usage, identifying the presence of specific signals or interference.

Problems solved by this technology:

  • Signal identification: The method provides a way to determine whether a specific code sequence is present in a radio signal, which can be useful for identifying and decoding signals.
  • Computational complexity: By discarding filtered results that are not associated with the code sequence, unnecessary processing procedures can be avoided, reducing computational complexity.

Benefits of this technology:

  • Efficient signal detection: The use of match filters and classifiers allows for efficient detection of specific code sequences in radio signals.
  • Reduced computational complexity: By discarding irrelevant filtered results, the method helps in reducing computational complexity and improving overall efficiency.

Abstract

Embodiments of the present disclosure provide methods and apparatus for detection of radio signal. A method performed by a reception apparatus may comprise: obtaining (S) time domain samples of a radio signal; processing (S) the time domain samples by a plurality of match filters respectively, to generate a plurality of filtered results of the time domain samples; classifying (S) a filtered result of the plurality of filtered results by a classifier; discarding (S) a filtered result classified as being not associated to the code sequence; and determining (S) whether the code sequence is used in the radio signal, when a filtered result of the radio signal is classified as being associated to the code sequence. Some processing procedures may be avoided based on the classification result of the detected radio signal, and computational complexity may be reduced.

CONFIGURING MEASUREMENT REFERENCE SIGNALS FOR MIMO (18242454)

Main Inventor

Mattias Frenne


Brief explanation

The patent application describes systems and methods for configuring Channel State Information Reference Signal (CSI-RS) ports in a cellular communications network. The method involves configuring a plurality of CSI-RS ports for a wireless device, such as six, ten, twelve, fourteen, or sixteen ports. The method also includes transmitting CSI-RS on at least a subset of the configured ports. This allows for increased support for antenna ports and two-dimensional antenna arrays.
  • The patent application focuses on 6-port and greater than 8-port CSI-RS configurations.
  • The method involves configuring a plurality of CSI-RS ports for a wireless device.
  • The number of CSI-RS ports can be six, ten, twelve, fourteen, or sixteen, depending on the embodiment.
  • CSI-RS is transmitted on at least a subset of the configured ports.
  • This technology provides support for an increased number of antenna ports.
  • It also enables support for two-dimensional (2D) antenna arrays.

Potential Applications

This technology can be applied in various areas, including:

  • Cellular communications networks
  • Wireless devices with multiple antenna ports
  • Two-dimensional antenna arrays

Problems Solved

This technology addresses the following problems:

  • Limited support for antenna ports in cellular communications networks
  • Inability to support two-dimensional antenna arrays effectively

Benefits

The benefits of this technology include:

  • Increased support for antenna ports, allowing for improved network performance
  • Enhanced support for two-dimensional antenna arrays, enabling better signal reception and transmission

Abstract

Systems and methods relating to 6-port and/or greater than 8-port Channel State Information Reference Signal (CSI-RS) configurations are disclosed. In some embodiments, a method of operation of a radio access node in a cellular communications network comprises configuring a plurality of CSI-RS ports for a wireless device, where the plurality of CSI-RS ports is six CSI-RS ports, ten CSI-RS ports, twelve CSI-RS ports, fourteen CSI-RS ports, or sixteen CSI-RS ports, depending on the embodiment. The method further comprises transmitting CSI-RS on at least a subset of the plurality of CSI-RS ports configured for the wireless device. In this manner, support for, e.g., an increased number of antenna ports and/or support for two-dimensional (2D) antenna arrays is provided.

METHOD AND SYSTEM FOR EFFICIENT INPUT/OUTPUT TRANSFER IN NETWORK DEVICES (18253772)

Main Inventor

Amir ROOZBEH


Brief explanation

Abstract:

This patent application describes methods and systems for selectively accessing the processing unit of a network device. When packets of a flow are received by the network interface of the device, the network interface analyzes the attributes of the packets. If it determines that the packets should be directly sent to the processing unit, they are sent there for processing.

Patent/Innovation Explanation:

  • Network devices have a processing unit that handles the processing of packets.
  • The network interface of the device receives packets of a flow.
  • The network interface analyzes the attributes of the packets to determine if they should be directly sent to the processing unit.
  • If the network interface determines that the packets should be directly sent to the processing unit, they are sent there for processing.

Potential Applications:

  • This technology can be applied in routers, switches, and other network devices to improve packet processing efficiency.
  • It can be used in data centers to optimize the processing of network traffic.
  • Network security appliances can benefit from this technology to quickly process packets for threat detection and prevention.

Problems Solved:

  • Traditional methods of packet processing in network devices may involve unnecessary steps, leading to increased latency and reduced efficiency.
  • By selectively sending packets directly to the processing unit, this technology eliminates the need for intermediate processing steps, improving overall performance.

Benefits:

  • Improved packet processing efficiency and reduced latency.
  • Enhanced performance of network devices, leading to better overall network performance.
  • Faster threat detection and prevention in network security appliances.

Abstract

Methods and systems for selective direct access to a processing unit of a network device are described. A network interface of the network device receives packets of a flow. The network interface determines based on attributes of the packets that the packets are to be directly sent to the processing unit. In response to determining that the packets are to be directly sent to the processing unit, they are directly sent to the processing unit for processing.

Network Traffic Management (18037822)

Main Inventor

András Kern


Brief explanation

The patent application describes a method for managing traffic between a network gateway and an application server. Here is a simplified explanation of the abstract:
  • The method involves updating a network prefix assigned to a DNS view in response to a user equipment (UE) connecting to or disconnecting from the network gateway.
  • The network prefix consists of one or more internet protocol (IP) addresses that identify UEs connected to the network gateway and accessible to the DNS view.
  • Traffic between the network gateway and the application server is directed based on the DNS view to which the updated network prefix is assigned.

Potential Applications

This technology has potential applications in various areas, including:

  • Network management: The method can be used to efficiently manage traffic between network gateways and application servers, ensuring optimal routing based on the DNS view assigned to the network prefix.
  • Load balancing: By updating the network prefix and steering traffic based on the DNS view, the method can help distribute the load evenly across multiple application servers, improving performance and reliability.
  • Security: The ability to update the network prefix and control traffic based on the DNS view can enhance security measures by allowing or restricting access to specific UEs or groups of UEs.

Problems Solved

The technology addresses several problems in managing traffic between a network gateway and an application server, including:

  • Efficient traffic routing: By updating the network prefix and steering traffic based on the DNS view, the method ensures that traffic is directed to the appropriate destination, optimizing network resources and reducing congestion.
  • Scalability: The method allows for the dynamic addition or removal of UEs from the network gateway without disrupting traffic flow, enabling seamless scalability as the number of connected UEs fluctuates.
  • Flexibility: The ability to assign different DNS views to different network prefixes provides flexibility in managing traffic based on specific requirements or policies.

Benefits

The technology offers several benefits, including:

  • Improved performance: By directing traffic based on the DNS view assigned to the network prefix, the method optimizes routing, reducing latency and improving overall performance.
  • Enhanced reliability: The ability to update the network prefix and steer traffic ensures that UEs are connected to the appropriate application server, enhancing reliability and minimizing downtime.
  • Simplified management: The method provides a streamlined approach to managing traffic between a network gateway and an application server, allowing for easy addition or removal of UEs and efficient load balancing.

Abstract

There is provided a method performed by an entity for managing traffic between a network gateway and an application server. In response to a user equipment (UE) connecting to or disconnecting from the network gateway, a network prefix assigned to a DNS view is updated (). The network prefix comprises one or more internet protocol (IP) addresses that each identify a UE that is connected to the network gateway and to which the DNS view is accessible. Traffic between the network gateway and the application server is steered according to the DNS view to which the updated network prefix is assigned.

METHOD AND SYSTEM FOR HANDLING A TELECONFERENCE (18039026)

Main Inventor

Tommy ARNGREN


Brief explanation

The patent application describes a method performed by a communication network system for conducting teleconferences with parallel discussions. Here are the key points:
  • The system obtains digital representations of speech from communication devices connected to a teleconference.
  • If a request for a parallel discussion is received from a device, the system sets up a separate discussion group for that device and a subgroup of devices.
  • The digital representations of speech from the device and the subgroup are only provided to the devices in the parallel discussion group.
  • Each device in the parallel discussion group can play back the digital representations of speech from the other devices in the group.
  • The digital representations of speech from the rest of the devices (excluding the first device and the subgroup) are provided separately.

Potential applications of this technology:

  • Enhanced teleconferencing systems that allow for parallel discussions within a larger conference.
  • Improved collaboration and communication in large group settings where multiple discussions are taking place simultaneously.
  • More efficient and focused discussions by separating participants into smaller groups based on their interests or roles.

Problems solved by this technology:

  • Overcoming the limitations of traditional teleconferencing systems that only allow for one conversation at a time.
  • Addressing the challenge of managing multiple discussions within a single teleconference without causing confusion or interruptions.
  • Providing a solution for organizing and facilitating parallel discussions in a teleconference setting.

Benefits of this technology:

  • Increased productivity and engagement in teleconferences by allowing participants to have focused discussions in smaller groups.
  • Improved communication and collaboration by enabling parallel discussions on different topics or tasks.
  • Enhanced flexibility and adaptability in teleconferencing systems to accommodate different communication needs and preferences.

Abstract

A method performed by a system of a communication network includes obtaining digital representations of speech detected from communication devices connected to a teleconference, and receiving a request for a parallel discussion from a first of the communication devices with a subgroup of the communication devices. Further, the system sets up a parallel discussion group for the first communication device and the subgroup of communication devices, provides the digital representations of speech of the first communication device and the subgroup of communication devices only to the devices of the parallel discussion group so that each device of the parallel discussion group is able to play back the digital representations of speech of the other devices of the parallel discussion group, and provides the digital representations of speech of the plurality of communication devices except the first communication device and the subgroup of communication devices.

METHODS PROVIDING DYNAMIC NEF TUNNEL ALLOCATION AND RELATED NETWORK NODES/FUNCTIONS (18335444)

Main Inventor

Hans Bertil Rönneke


Brief explanation

The abstract describes methods for operating a Session Management Function (SMF) node in a wireless network. Here is a simplified explanation of the abstract:
  • The SMF node receives a request to create a session for a wireless device.
  • In response to the request, the SMF node sends a communication establishment request to an NEF node.
  • The communication establishment request includes information about the User Plane Function (UPF) node, which is responsible for handling the data traffic for the session.
  • The SMF node receives a communication establishment response from the NEF node, which includes information about the tunnel between the UPF node and the NEF node to be used for the session.
  • After receiving the communication establishment response, the SMF node sends a tunnel information update to the UPF node, including the NEF node information for the tunnel.

Potential applications of this technology:

  • Wireless network operators can use this technology to efficiently manage sessions for wireless devices in their networks.
  • It can be applied in various wireless communication systems, such as 4G LTE and 5G networks.

Problems solved by this technology:

  • The methods described in the patent application solve the problem of establishing and managing sessions for wireless devices in a network.
  • It provides a streamlined process for communication establishment between different network nodes.

Benefits of this technology:

  • The methods improve the efficiency and reliability of session management in wireless networks.
  • It enables seamless communication between different network nodes, ensuring a smooth user experience for wireless device users.
  • The technology simplifies the process of setting up and updating tunnels between network nodes, reducing complexity and potential errors.

Abstract

Methods are provided to operate an SMF node. A request to create a session for a wireless device is received. A communication establishment request is transmitted to an NEF node responsive to receiving the request to create the session for the wireless device, wherein the communication establishment request includes UPF node information for a tunnel between a UPF node and the NEF node to be used for the session for the wireless device. A communication establishment response is received from the NEF node, wherein the communication establishment response includes NEF node information for the tunnel between the UPF node and the NEF node to be used for the session for the wireless device. A tunnel information update is transmitted to the UPF node after receiving the communication establishment response, wherein the tunnel information update includes the NEF node information for the tunnel between the UPF node and the NEF node.

EXTENSION DATA HANDLING (18329739)

Main Inventor

Jonatan SAMUELSSON


Brief explanation

Explanation of the abstract:

The patent application describes a method for adding an extension field to the slice headers of encoded representations. The length of this extension field is indicated by a length indicator. By parsing this indicator, a decoder can determine which values of the extension field to ignore during decoding. This allows for the addition of the extension field without causing issues for legacy decoders.

  • A length indicator associated with an encoded representation of a slice is parsed.
  • The length indicator indicates the length of an extension field in the slice header.
  • The decoder can ignore certain values of the extension field based on the length indicator.
  • This enables the addition of an extension field to slice headers without affecting legacy decoders.

Potential applications of this technology:

  • Video encoding and decoding systems
  • Multimedia streaming platforms
  • Video conferencing software
  • Video compression algorithms

Problems solved by this technology:

  • Compatibility issues between legacy decoders and encoded representations with added extension fields
  • Limitations in the ability to add new features or information to encoded representations without breaking compatibility

Benefits of this technology:

  • Allows for the addition of extension fields to encoded representations without affecting legacy decoders
  • Enables the incorporation of new features or information into encoded representations without sacrificing compatibility
  • Provides flexibility for future enhancements and improvements in video encoding and decoding systems.

Abstract

A length indicator associated with an encoded representation of a slice is parsed. The length indicator is indicative of a length of an extension field present in a slice header of the encoded representation. A decoder can then determine to ignore, during decoding of the encoded representation, any value of the extension field in the slice header where these values are identified based on the length indicator. As a consequence, an extension field can be added to slice headers and still enable legacy decoders to correctly decode the encoded representations.

REFERENCE PICTURE SIGNALING (18458256)

Main Inventor

Jonatan Samuelsson


Brief explanation

The abstract describes a method for decoding an encoded representation of a picture or video stream by retrieving buffer description information from the encoded representation. This buffer description information is used to determine a picture identifier that identifies a reference picture to be used as a decoding reference for the picture. The decoded picture buffer is then updated based on the determined picture identifier. The encoded representation of the picture contains the necessary information for the decoder to identify the reference pictures required for decoding.
  • The method involves decoding an encoded representation of a picture or video stream.
  • Buffer description information is retrieved from the encoded representation.
  • The buffer description information helps determine a picture identifier.
  • The picture identifier identifies a reference picture to be used as a decoding reference for the picture.
  • The decoded picture buffer is updated based on the determined picture identifier.
  • The encoded representation of the picture contains the necessary information for the decoder to identify the reference pictures required for decoding.

Potential Applications

  • Video streaming services
  • Video compression technologies
  • Video playback software

Problems Solved

  • Efficient decoding of encoded picture or video streams
  • Accurate identification of reference pictures for decoding

Benefits

  • Improved video quality
  • Reduced bandwidth usage
  • Faster decoding process

Abstract

An encoded representation of a picture of a video stream is decoded by retrieving buffer description from the encoded representation. The buffer description information is used to determine at least one picture identifier identifying a respective reference picture as decoding reference for the picture. A decoded picture buffer is updated based on the determined picture identifier. The encoded representation of the picture itself comprises the information needed by a decoder to identify the reference pictures required to decode the encoded representation.

Updating a background data transfer policy negotiated between an application function and a core network (18461952)

Main Inventor

Antonio Iniesta Gonzalez


Brief explanation

The abstract describes a method for updating a background data transfer (BDT) policy in a telecommunication network. The method involves a Policy Control Function (PCF) receiving a notification of degraded network performance and determining that the negotiated BDT policy is affected by the degraded performance. The PCF then determines updated BDT policy information based on operator policies and sends it to the Application Function (AF).
  • The method updates a BDT policy negotiated between an AF and a CN.
  • It responds to degraded network performance by determining the impact on the negotiated BDT policy.
  • The method provides updated BDT policy information, including candidate BDT policies and updated conditions.
  • The updated BDT policy information is sent to the AF.

Potential Applications

  • Telecommunication networks
  • Mobile networks
  • Network performance optimization

Problems Solved

  • Updating BDT policies in response to degraded network performance
  • Ensuring that negotiated BDT policies are not negatively affected by network issues

Benefits

  • Improved network performance during degraded conditions
  • Efficient utilization of network resources
  • Enhanced user experience during network disruptions

Abstract

Embodiments include methods of updating a background data transfer (BDT) policy negotiated between an application function (AF) and a core network (CN) of a telecommunication network. Such methods can be performed by a Policy Control Function (PCF) of the CN and can include, in response to receiving a notification of degraded network performance of a network area, determining that the negotiated BDT policy is affected by the degraded network performance and an Application Service Provider (ASP) associated with the negotiated BDT policy requested a warning notification. Such methods can include determining, at least based on operator policies, updated BDT policy information for the negotiated BDT policy, wherein the updated BDT policy information comprises at least one of the following: at least one candidate BDT policy, and updated conditions for the negotiated BDT policy. Such methods can include sending the updated BDT policy information to the AF.

Methods for Handling Radio Access Network Notification Area (RNA) Update Configuration Upon Reject (18367011)

Main Inventor

Gunnar Mildh


Brief explanation

The abstract describes a wireless device that handles area update reports. When the device enters a cell that is not configured for it, it initiates a radio network area update (RNAU). If the RNAU is rejected by the wireless network, the device sets a reject wait timer and performs the RNAU after the timer expires. In some cases, the device also sets a periodic RNAU timer and performs the RNAU when both timers expire.
  • The wireless device detects when it enters a cell that is not configured for it.
  • It initiates a radio network area update (RNAU) to update its network area.
  • If the RNAU is rejected, the device sets a reject wait timer.
  • After the timer expires, the device performs the RNAU again.
  • In some cases, the device also sets a periodic RNAU timer.
  • The device performs the RNAU when both the reject wait timer and the periodic RNAU timer expire.

Potential Applications

  • Mobile devices that need to update their network area when entering a new cell.
  • Wireless devices that need to handle area update reports efficiently.

Problems Solved

  • Ensures that wireless devices are properly configured for the cell they are in.
  • Handles cases where the initial RNAU is rejected by the network.

Benefits

  • Improves the efficiency of area update reports for wireless devices.
  • Reduces the chances of network configuration errors for wireless devices.
  • Allows for periodic RNAU updates to ensure continuous network connectivity.

Abstract

A wireless device handles area update reports. The wireless device initiates a radio network area update, RNAU, responsive to detecting that the wireless device has entered a cell not belonging to a radio network area, RNA, configured for the wireless device. The wireless device receives, from the wireless network, a message indicating that the wireless device's attempt to perform the RNAU has been rejected. The message includes or is accompanied by an indication that a wait time value is applicable. Responsive to the message, the wireless device sets a reject wait timer to the wait time value and performs the RNAU upon expiry of the reject wait timer. In some embodiments, the wireless device sets a periodic RNAU timer to the wait time value, responsive to the message, and performs the RNAU upon expiry of the reject wait timer and the periodic RNAU timer.

Trustful Service Traffic Handling in a Core Network Domain (18039078)

Main Inventor

Alfonso de Jesus Perez Martinez


Brief explanation

The patent application describes a technique for configuring a wireless communication network to detect and handle service traffic based on information stored in a blockchain. Here are the key points:
  • The technique involves receiving traffic detection information from a service provider for specific service traffic.
  • This information is then associated with traffic handling information stored in a blockchain.
  • The traffic detection information is provided to the core network domain, which uses it to detect and handle the service traffic according to the traffic handling information.

Potential applications of this technology:

  • Wireless communication networks can use this technique to ensure that specific service traffic is handled securely and in accordance with predetermined rules.
  • It can be applied in various industries such as telecommunications, IoT, and smart cities, where reliable and secure handling of service traffic is crucial.

Problems solved by this technology:

  • The technique solves the problem of trust and reliability in handling service traffic by using a blockchain to store and associate traffic detection information with traffic handling information.
  • It ensures that the service traffic is handled in accordance with predetermined rules, reducing the risk of unauthorized access or tampering.

Benefits of this technology:

  • By using a blockchain, the technique provides a transparent and immutable record of traffic detection and handling information, enhancing trust and security.
  • It enables efficient and accurate detection and handling of service traffic, improving overall network performance and user experience.
  • The technique can be easily implemented in existing wireless communication networks, minimizing the need for major infrastructure changes.

Abstract

A technique of configuring a core network domain of a wireless communication network for detection of service traffic that is to be trustfully handled in accordance with traffic handling information stored in a blockchain is provided. A method implementation of this technique comprises receiving, from a service provider, traffic detection information for service traffic that is to be handled in accordance with the traffic handling information. The method further comprises triggering an association, in the blockchain, of the received traffic detection information with the traffic handling information, and providing the traffic detection information to the core network domain for detecting the service traffic that is to be handled in accordance with the traffic handling information.

METHODS FOR AUTHENTICATION AND KEY MANAGEMENT IN A WIRELESS COMMUNICATIONS NETWORK AND RELATED APPARATUSES (18466261)

Main Inventor

Noamen BEN HENDA


Brief explanation

==Abstract Explanation==

The abstract describes a method performed by a network server for authentication and key management for a terminal device in a wireless communication network. The method involves authenticating the terminal device, obtaining a key, and generating bootstrapping security parameters.

  • The method authenticates the terminal device during a primary authentication session.
  • If the authentication is successful, a first key is obtained.
  • Bootstrapping security parameters are generated, which include a second key derived from the first key and a temporary identifier.
  • The temporary identifier is used to identify the terminal device and the bootstrapping security parameters.

Potential Applications

  • Wireless communication networks
  • Terminal devices in wireless networks
  • Network server authentication and key management

Problems Solved

  • Ensuring secure authentication and key management for terminal devices in wireless networks
  • Generating bootstrapping security parameters for secure communication

Benefits

  • Enhanced security for terminal devices in wireless networks
  • Efficient authentication and key management process
  • Secure communication between network server and terminal devices

Abstract

A method performed by a network server is provided for authentication and key management for a terminal device in a wireless communication network. The method includes authenticating the terminal device during a primary authentication session for the terminal device. The method further includes responsive to a successful authentication of the terminal device, obtaining a first key. The method further includes generating bootstrapping security parameters. The parameters include a second key derived from the first key and a temporary identifier. The temporary identifier identifies the terminal device and the bootstrapping security parameters.

LAWFUL INTERCEPTION IN NETWORK SLICES (18248901)

Main Inventor

Antonio Vitiello


Brief explanation

The abstract describes a method for providing lawful interception (LI) in a radio communication system with network slices. The method involves a broker LI provisioning function (bLIPF) connected to an LI centralized function (LICF) and at least one slice LI provisioning function (sLIPF) implemented on one of the network slices. 
  • The LICF determines if a party of a network service has the LI target identity.
  • If the LI target identity is detected, the bLIPF conveys the LI target identity to the sLIPF.
  • The sLIPF activates a point of interception (POI) associated with or embedded in the network function (NF) to intercept data.

Potential applications of this technology:

  • Law enforcement agencies can use this method to intercept data in a radio communication system with network slices.
  • Telecommunication service providers can comply with legal requirements for lawful interception.

Problems solved by this technology:

  • Ensures compliance with lawful interception requirements in a radio communication system with network slices.
  • Provides a streamlined method for activating interception points in network functions.

Benefits of this technology:

  • Enables efficient and effective lawful interception in a complex radio communication system.
  • Reduces the complexity and cost associated with implementing lawful interception in network slices.

Abstract

A method for providing lawful interception, LI, in a radio communication system () with network slices, NSs, (). The method comprises: providing a broker LI provisioning function, bLIPF () connected to an LI centralized function, LICF, (), and to at least one slice LI provisioning function, sLIPF, () implemented on one of the NSs; receiving an LI target identity, if the LICF determines that a party of a network service provided using a network function, NF, () running on the one of the NSs has the LI target identity; and conveying the LI target identity from the bLIPF to the at least one sLIPF, wherein the at least one sLIPF activates a point of interception, POI, () associated with or embedded in the NF to intercept data.

Disturbance Detection for Transport Links (18210126)

Main Inventor

Martin Sjödin


Brief explanation

The abstract describes a method for detecting and resolving disturbances in a transport link based on sampled transport data. Here is a simplified explanation of the abstract:
  • The method involves collecting data from the transport link to determine its properties.
  • By analyzing the properties of the transport link, disturbances can be detected.
  • Once a disturbance is detected, the method uses the sampled data to determine the cause of the disturbance.
  • Depending on the detection of a disturbance, the method either refrains from transmitting an indication of the disturbance or transmits the indication with instructions for resolving the disturbance.

Potential Applications

This technology has potential applications in various industries and sectors, including:

  • Telecommunications: It can be used to monitor and troubleshoot network connections, ensuring reliable communication.
  • Transportation: It can be applied to monitor and manage the performance of transportation systems, such as railways or highways.
  • Energy: It can help identify and resolve issues in power transmission and distribution networks, improving overall grid stability.
  • Internet of Things (IoT): It can be utilized to monitor and maintain the connectivity of IoT devices, ensuring seamless operation.

Problems Solved

The technology addresses several problems related to transport link disturbances:

  • Efficient Detection: The method provides an efficient way to detect disturbances in transport links, allowing for timely resolution.
  • Root Cause Analysis: By analyzing the sampled transport data, the method helps determine the underlying cause of the disturbance, aiding in effective troubleshooting.
  • Proactive Resolution: The ability to transmit instructions for resolving the disturbance enables proactive measures to be taken, minimizing downtime and improving overall system performance.

Benefits

The use of this technology offers several benefits:

  • Improved Reliability: By promptly detecting and resolving disturbances, the method enhances the reliability and stability of transport links.
  • Cost Savings: Timely resolution of disturbances reduces downtime and associated costs, optimizing operational efficiency.
  • Enhanced Performance: The ability to analyze transport data helps identify potential issues before they become major problems, leading to improved performance.
  • Streamlined Maintenance: The method enables targeted troubleshooting and maintenance, reducing the need for extensive manual inspections.

Abstract

The method comprises sampling transport data received on the transport link to determine properties of the transport link. The method comprises detecting the disturbance of the transport link based on the determined properties of the transport link. The method comprises, responsive to the detecting the disturbance, determining, based on the sampled received transport data, the cause of the disturbance. The method further comprises, responsive to detecting the disturbance, refraining from transmitting an indication of the disturbance or transmitting the indication of the disturbance with an instruction for resolving the disturbance.

Data Collection by Considering UE Interaction (18037900)

Main Inventor

Attila Báder


Brief explanation

The patent application describes a system for analyzing network data services provided to user equipment (UEs) in a wireless network. 
  • User interaction with an application data service triggers network analytics.
  • The wireless network filters and controls the network analytics based on the trigger.
  • This approach reduces the network load and allows the network to focus on specific events and application goals.

Potential Applications

This technology can be applied in various scenarios, including:

  • Mobile network operators can use it to optimize network performance and improve user experience.
  • Application developers can utilize it to gather insights and improve their applications.
  • Network administrators can benefit from it to monitor and troubleshoot network issues.

Problems Solved

The technology addresses the following problems:

  • Overloaded network functions and analytics load.
  • Inefficient use of network resources for analytics.
  • Lack of focus on specific events and application goals.

Benefits

The use of user-specific network analytics offers several benefits:

  • Decreased network load and improved network efficiency.
  • Enhanced user experience and application performance.
  • Better utilization of network resources.
  • Improved troubleshooting and network management capabilities.

Abstract

User-specific network analytics for application data services provided to user equipment (UEs) in a wireless network is disclosed herein. User interaction for an application data service and captured by an overlay on the UE triggers network analytics. The wireless network filters or otherwise controls the network analytics performed by the network node responsive to the trigger. In so doing, the user-specific network analytics disclosed herein decreases the network functions and analytics load at the network, and enables the network to focus on specific events, which enables the network to establish and support specific application goals.

Radio Network Node, User Equipment and Methods Performed Therein (18039131)

Main Inventor

Pradeepa Ramachandra


Brief explanation

The abstract describes a method performed by a User Equipment (UE) in a wireless communications network for handling measurements. When certain conditions are met, the UE logs a measurement associated with the last serving cell after entering a cell-selection state. The conditions include the last serving cell belonging to a Public Land Mobile Network (PLMN) that is configured in the UE's list of PLMN identities in a logged MDT (Minimization of Drive Tests) configuration.
  • The method is performed by a UE in a wireless communications network.
  • The UE logs a measurement associated with the last serving cell after entering a cell-selection state.
  • The conditions for logging the measurement include the last serving cell belonging to a specific PLMN.
  • The specific PLMN is configured in the UE's list of PLMN identities in a logged MDT configuration.

Potential applications of this technology:

  • Wireless communications networks
  • User Equipment (UE) devices
  • Minimization of Drive Tests (MDT) configurations

Problems solved by this technology:

  • Efficient handling of measurements in a wireless communications network
  • Accurate logging of measurements associated with the last serving cell
  • Simplified management of PLMN identities in a UE's configuration

Benefits of this technology:

  • Improved network performance and optimization
  • Enhanced accuracy in measurement logging
  • Streamlined configuration management for UE devices

Abstract

Embodiments herein relate to a method performed by a UE () for handling one or more measurements in a wireless communications network. The UE () logs, when one or more conditions are fulfilled, a measurement associated to a last serving cell after entering an any cell-selection state, wherein the one or more conditions comprise, the last serving cell belongs to a PLMN, said PLMN is configured in the UE () in a list of PLMN identities in a logged MDT configuration.

METHOD AND NODES FOR HANDLING BEAM MEASUREMENTS (18249433)

Main Inventor

Pradeepa RAMACHANDRA


Brief explanation

The present disclosure describes a method performed by a network node in a communications system for handling beam measurements. The network node obtains information about how to report beam measurements from another node and provides instructions to a user equipment (UE) on how to provide the report. The network node then receives the report from the UE, which includes information about the executed beam measurements.
  • The network node obtains information about how to report beam measurements from another node.
  • The network node provides instructions to a UE on how to provide a report of the beam measurements.
  • The network node receives the report from the UE, which includes information about the executed beam measurements.

Potential Applications

  • This technology can be applied in various communication systems, such as cellular networks, to improve the handling of beam measurements.
  • It can be used to enhance the performance and efficiency of beamforming techniques in wireless communication.

Problems Solved

  • The method solves the problem of efficiently handling beam measurements in a communications system.
  • It addresses the challenge of obtaining accurate and timely information about beam measurements from UEs.

Benefits

  • The method allows for improved control and management of beam measurements in a communications system.
  • It enables more efficient utilization of network resources by providing accurate and timely information about beam measurements.
  • The method enhances the performance and reliability of beamforming techniques, leading to better communication quality for users.

Abstract

The present disclosure relates to a method performed by a network node for handling of one or more beam measurements in a communications system. The network node obtains information associated with a report configuration for one or more beam measurements from another node. Based on the obtained information, the network node provides, to a UE, instructions on how to provide a report of the one or more beam measurements to the network node. The network node obtains, from the UE and according to the instructions, the report of the one or more beam measurement, wherein the report includes information associated with executed one or more beam measurements.

Radio Network Nodes, and Methods Performed in a Wireless Communication Network (18026468)

Main Inventor

Luca Lunardi


Brief explanation

The abstract describes a method used by a first radio network node to handle communication in a wireless communication network. The first radio network node sends a request to a second radio network node to retrieve an update indication of measurement when there is a potential resource aggregation of one or more cells controlled by the second radio network node.
  • The first radio network node sends a request to the second radio network node for an update indication of measurement.
  • The update indication of measurement is related to potential resource aggregation of one or more cells controlled by the second radio network node.

Potential Applications

  • This technology can be applied in wireless communication networks to improve communication efficiency and resource allocation.
  • It can be used in cellular networks to optimize the utilization of network resources and enhance network performance.

Problems Solved

  • The method addresses the issue of efficiently handling communication in a wireless communication network.
  • It solves the problem of effectively managing resource aggregation in a network with multiple cells.

Benefits

  • The method allows for better coordination and utilization of network resources.
  • It improves the overall performance and efficiency of the wireless communication network.

Abstract

Embodiments herein disclose, for example, a method performed by a first radio network node () for handling communication in a wireless communication network. The first radio network node transmits to a second radio network node (), a request for retrieval of an update indication of measurement upon a potential resource aggregation of one or more cells controlled by the second radio network node ().

PROVIDING BURST END TIME IN TIME SENSITIVE COMMUNICATION ASSISTANCE INFORMATION (18249792)

Main Inventor

John Walter DIACHINA


Brief explanation

The abstract of the patent application describes a method used by a radio access network node to receive information about the end time of a burst of data traffic within a traffic flow from a network node.
  • The method involves receiving information about the burst end time (BET) for a specific burst of data traffic.
  • The information is received from a network node.
  • The burst of data traffic is part of a larger traffic flow.

Potential Applications:

  • This technology can be applied in various wireless communication systems, such as cellular networks, to efficiently manage data traffic.
  • It can be used in 5G networks to improve the overall performance and quality of service.

Problems Solved:

  • The method solves the problem of effectively managing bursty data traffic within a traffic flow.
  • It helps in optimizing the utilization of network resources and improving the overall efficiency of data transmission.

Benefits:

  • By receiving information about the burst end time, the radio access network node can better allocate resources and schedule subsequent bursts of data traffic.
  • This leads to improved network performance, reduced latency, and enhanced user experience.
  • The method allows for more efficient use of network resources, resulting in cost savings for network operators.

Abstract

A method by a radio access network node includes receiving, from a network node, information indicating a burst end time (BET) for a first burst of data traffic within a traffic flow.

METHOD AND APPARATUS FOR CONTROLLING SIDELINK QOS (18456034)

Main Inventor

Congchi ZHANG


Brief explanation

The patent application is about a method and apparatus for controlling the Quality of Service (QoS) in wireless communication, specifically for sidelink transmission. The method involves generating QoS requirements based on packet characteristics, determining the appropriate bearer configuration, and performing sidelink transmission based on the configured parameters.
  • The method focuses on controlling the QoS for sidelink transmission in wireless communication.
  • QoS requirements are generated based on the characteristics of the packets to be transmitted.
  • The appropriate bearer configuration is determined based on the QoS requirements.
  • Sidelink transmission is performed according to the configured parameters.

Potential Applications

  • This technology can be applied in various wireless communication systems, such as cellular networks, IoT devices, and wireless sensor networks.
  • It can be used to ensure reliable and efficient transmission of data packets in sidelink communication.
  • The method can be implemented in devices like User Equipment (UE) to enhance the QoS for sidelink transmission.

Problems Solved

  • The method solves the problem of controlling the QoS for sidelink transmission, ensuring that the required QoS is met.
  • It addresses the challenge of efficiently configuring the bearer parameters based on the QoS requirements.
  • The method solves the problem of optimizing sidelink transmission based on the configured parameters.

Benefits

  • The method allows for better control and management of the QoS in sidelink transmission.
  • It ensures that the QoS requirements for the transmitted packets are met, leading to improved reliability and performance.
  • By optimizing the bearer configuration, the method enables efficient use of network resources and enhances overall system efficiency.

Abstract

The present application generally relates to wireless communication technology. More particularly, it relates to a method and apparatus for controlling sidelink (SL) Quality of Service (QoS). According to one or more embodiments, a method for controlling sidelink (SL) Quality of Service (QoS) comprising the following steps carried out at a User Equipment (UE): a) generating QoS requirement from characteristics for one or more packets to be transmitted via a sidelink; b) determining bearer configuration corresponding to the QoS requirement; and c) performing SL transmission on the basis of the bearer configuration.

USER PLANE ENCRYPTION POLICY AT INTERWORKING HANDOVER FROM EPS AND 5GS (18037417)

Main Inventor

Monica WIFVESSON


Brief explanation

The abstract describes a method for facilitating handover from an evolved packet system (EPS) to a fifth-generation system (5GS) in a mobile network. The method involves receiving a user plane (UP) encryption policy from a source network node and providing this policy to a target radio access network node.
  • The method enables seamless handover between different generations of mobile networks.
  • It involves the exchange of encryption policies between network nodes.
  • The method ensures that the determined UP encryption policy is maintained during the handover process.

Potential Applications

  • This technology can be applied in mobile networks to support the transition from older generations (such as 4G) to the latest fifth-generation (5G) systems.
  • It can be used by network operators to enhance the performance and reliability of handover processes for mobile devices.

Problems Solved

  • Seamless handover between different generations of mobile networks can be challenging due to differences in protocols and encryption mechanisms.
  • This technology solves the problem of maintaining the user plane encryption policy during the handover process, ensuring secure and uninterrupted communication for mobile devices.

Benefits

  • The method simplifies the handover process, reducing the potential for service disruptions or loss of connectivity.
  • It improves the overall user experience by ensuring a seamless transition between different generations of mobile networks.
  • The technology enhances the security of communication by maintaining the UP encryption policy during the handover process.

Abstract

A method performed by a target network node for interworking handover from an evolved packet system, EPS, to a fifth generation system, 5GS, in a mobile network is provided. The method includes receiving, from a source network node, a determined user plane, UP, encryption policy. The method further includes providing the determined UP encryption policy to a target radio access network node. Corresponding embodiments for methods performed by a source network node and a first target network node are also provided.

HANDLING QOS UPDATING DURING XN HANDOVER (18248898)

Main Inventor

Nianshan SHI


Brief explanation

The patent application describes a method, system, and apparatus for handling Quality-of-Service (QoS) updating during handover (HO) in a wireless network.
  • The network node receives a path switch request acknowledgement message from a wireless device (WD) during a handover procedure.
  • The message includes at least one first QoS parameter value associated with the WD.
  • Based on the received message, the network node uses at least one second QoS parameter value associated with the WD.
  • The network node then sends a notification to the WD indicating one of the following:
 * The first QoS parameter value is not fulfilled.
 * QoS parameter updating is not supported by the network node.
 * The QoS parameter updating failed.

Potential applications of this technology:

  • Wireless communication networks
  • Mobile networks
  • Internet of Things (IoT) networks

Problems solved by this technology:

  • Ensures that QoS parameters are properly updated during handover procedures in wireless networks.
  • Provides a mechanism for notifying the wireless device if the QoS parameter updating fails or is not supported.

Benefits of this technology:

  • Improved QoS management during handover procedures.
  • Enhanced user experience in wireless communication.
  • Efficient utilization of network resources.

Abstract

A method, system and apparatus are disclosed for handling Quality-of-Service (QoS) updating during handover (HO). In one embodiment, a network node is configured to during a handover, HO, procedure associated with a wireless device, WD, receive a path switch request acknowledgement message comprising at least one first Quality-of-Service, QoS, parameter value associated with the WD; and as a result of the received path switch request acknowledgement message comprising the at least one first QoS parameter value, use at least one second QoS parameter value associated with the WD and send a notification, the notification indicating at least one of: that the at least one first QoS parameter value is not fulfilled, that a QoS parameter updating is not supported by the network node and that the QoS parameter updating failed.

MEDIA ACCESS CONTROL RESET FOR LAYER 1/LAYER 2 CENTRIC MOBILITY (18036444)

Main Inventor

Icaro Leonardo DA SILVA


Brief explanation

The patent application describes a communication device that can have multiple physical cell identifiers (PCIs), transmission configurations, and cells operating in the same frequency. The device can receive an indication from a network node to activate a transmission configuration associated with a non-serving cell or PCI. Based on this indication, the device can perform a media access control (MAC) reset operation.
  • The communication device has multiple PCIs, transmission configurations, and cells operating in the same frequency.
  • It can receive an indication from a network node to activate a transmission configuration associated with a non-serving cell or PCI.
  • Based on this indication, the device can perform a MAC reset operation.

Potential Applications

  • This technology can be applied in cellular networks to improve mobility procedures and optimize communication between devices and network nodes.
  • It can enhance the efficiency and reliability of communication in areas with multiple cells operating in the same frequency.

Problems Solved

  • The technology solves the problem of efficiently managing multiple PCIs and transmission configurations in a communication device.
  • It addresses the challenge of activating the appropriate transmission configuration for non-serving cells or PCIs.

Benefits

  • The technology improves the overall performance and reliability of communication devices in cellular networks.
  • It enhances the efficiency of mobility procedures and reduces the potential for communication disruptions.
  • The ability to perform MAC reset operations based on the indicated transmission configuration ensures optimal communication between devices and network nodes.

Abstract

A communication device can be configured with a plurality of physical cell identifiers, PCIs, for a mobility procedure, a plurality of transmission configurations, and one or more cells. Each cell can be operating in a same serving frequency and each cell can be associated with one or more PCIs. The communication device can receive an indication of a transmission configuration to be activated, from the plurality of transmission configurations, that is associated with a non-serving cell or a non-serving PCI, from a network node. The communication device can determine to perform a media access control, MAC, reset operation based on the transmission configuration to be activated.

METHOD FOR DETERMINATION BETWEEN INTRA- AND INTER-FREQUENCY OPERATIONS (18244270)

Main Inventor

Iana Siomina


Brief explanation

The abstract describes a method for determining intra-frequency and inter-frequency operations in cellular networks. 
  • The method involves obtaining a reference measurement resource from a first cell and a measurement resource from a second cell.
  • The reference measurement resource and the measurement resource are of the same type.
  • By comparing the reference measurement resource to the measurement resource of the second cell, it can be determined whether the second cell operates on an intra-frequency or inter-frequency carrier.
  • This method can be implemented in user equipment or network nodes.

Potential Applications

This technology can be applied in the field of cellular networks and telecommunications.

Problems Solved

1. Determining whether a cell operates on an intra-frequency or inter-frequency carrier can be challenging in cellular networks. 2. Existing methods may not provide an efficient and accurate way to determine the type of carrier.

Benefits

1. The method provides a simplified and efficient way to determine intra-frequency and inter-frequency operations in cellular networks. 2. It can help optimize network performance and resource allocation. 3. The method can be implemented in both user equipment and network nodes, providing flexibility in its application.

Abstract

The solution outlined in this disclosure is a method for determining intra-frequency operations and inter-frequency operations, the method comprises obtaining a first measurement resource of a first cell as a reference measurement resource, obtaining a second measurement resource of a second cell, the second measurement resource of the second cell and the first measurement resource of the first cell are of the same type, and determining whether the second cell operates on an intra-frequency carrier or an inter-frequency carrier by comparing the reference measurement resource to the second measurement resource of the second cell. The method may be carried out in a user equipment or a network node.

Network Nodes and Methods in a Wireless Communications Network (18036927)

Main Inventor

Hasibur Rahman


Brief explanation

The abstract describes a method performed by a network node in a wireless communications network to determine which cells should serve a wireless device. The network node receives current load information for a cell candidate from another network node and uses this information to decide which cells should serve the wireless device.
  • The method is performed by a network node in a wireless communications network.
  • The network node receives current load information for a cell candidate from another network node.
  • The cell candidate is served by a different network node.
  • Based on the current load information, the network node determines which cells should serve the wireless device.

Potential Applications

  • Wireless communications networks
  • Cellular networks
  • Mobile network operators

Problems Solved

  • Efficient allocation of cells to serve wireless devices
  • Optimizing network performance based on current load information

Benefits

  • Improved network performance and efficiency
  • Enhanced user experience with better cell allocation
  • Dynamic allocation of cells based on real-time load information

Abstract

A method performed by a first network node for determining one or more cells to serve a wireless device connected to the first network node in a wireless communications network is provided. In a control connection between the first network node and a second network node, the first network node receives () from the second network node, current load information for a third cell candidate, wherein the third cell candidate is served by a third network node. The first network node determines () one or more cells to serve the wireless device based on the current load information of the third cell candidate.

Radio Unit and a Method Therein for Controlling Power Levels of Spatially Separated Transceivers in a Wireless Communications Network (18244756)

Main Inventor

Mårten Ericson


Brief explanation

The patent application describes a method for controlling power levels of transceivers in a wireless communication network. The method involves receiving measurements on uplink transmissions from wireless devices and determining the load on each transceiver based on the relevance of its measurements. The power level of at least one transceiver is then controlled based on the determined loads.
  • The method is performed by a radio unit in a wireless communication network.
  • Each transceiver is connected to the radio unit via corresponding antenna ports.
  • The transceivers are capable of performing measurements on uplink transmissions from wireless devices.
  • The radio unit receives measurements on uplink transmissions from each transceiver.
  • The radio unit determines the load on each transceiver based on the number of wireless devices that have the transceiver as the most relevant measurement for their uplink transmissions.
  • The power level of at least one transceiver is controlled based on the determined loads.

Potential Applications

  • Wireless communication networks
  • Cellular networks
  • Internet of Things (IoT) networks

Problems Solved

  • Efficient power control in wireless communication networks
  • Optimizing the performance of transceivers based on load

Benefits

  • Improved network performance
  • Reduced power consumption
  • Enhanced reliability and coverage of wireless communication networks

Abstract

Embodiments herein relate to a method performed by a radio unit () for controlling power levels of spatially separated transceivers (-) connected to the radio unit () via corresponding antenna ports (a-j). Each transceiver (-) is capable of performing measurements on uplink transmissions from wireless devices in a wireless communication network (). The radio unit () receives, from each transceiver (-), measurements on uplink transmissions from wireless devices. Then, the radio unit () determines, for each transceiver (-), a load based on how many wireless devices that have the transceiver as the transceiver with the most relevant measurement for its uplink transmissions. The radio unit () also controls a power level of at least one first transceiver () based on at least one of the determined loads for the transceivers (-). Embodiments of the radio unit () are also described.

Strategies for Power Efficient Configuration of a Wireless Access Network (18034814)

Main Inventor

Ali Nader


Brief explanation

The abstract describes a computer implemented method for configuring secondary component carriers (Scells) and bandwidth parts (BWP) in a wireless access network for a wireless device. The method involves obtaining control channel capacity data, determining the control channel load, evaluating alternative Scell and/or BWP configurations in terms of energy consumption, detecting control channel resource deficit, selecting a configuration based on evaluated energy consumptions, and reconfiguring the wireless device with the selected configuration.
  • The method helps in configuring Scells and BWPs in a wireless access network for a wireless device.
  • Control channel capacity data is obtained to determine the nominal capacity of the current control channel.
  • The control channel load of the wireless access network is determined.
  • Alternative Scell and/or BWP configurations are evaluated based on energy consumption of the wireless device.
  • Each alternative configuration offers increased control channel capacity compared to the current control channel.
  • Control channel resource deficit is detected based on the control channel load and capacity data.
  • In response to detecting resource deficit, a configuration is selected based on the evaluated energy consumptions.
  • The wireless device is reconfigured with the selected Scell and/or BWP configuration.

Potential Applications

  • Wireless communication networks
  • Mobile devices
  • Internet of Things (IoT) devices

Problems Solved

  • Efficient configuration of Scells and BWPs in wireless access networks
  • Optimizing energy consumption of wireless devices
  • Managing control channel resource deficit

Benefits

  • Improved performance and efficiency of wireless access networks
  • Reduced energy consumption of wireless devices
  • Enhanced network capacity and resource management

Abstract

A computer implemented method, performed in a network node (), for configuring one or more secondary component carriers, Scells, and/or at least one bandwidth part, BWP, in a wireless access network () fora wireless device (), the method comprising obtaining (S) control channel capacity data indicative of a nominal capacity of a current control channel of the wireless access network (), determining (S) a control channel load of the wireless access network (), evaluating (S) one or more alternative Scell and/or BWP configurations of the wireless access network () for the wireless device () in terms of an energy consumption of the wireless device (), where each of the one or more alternative Scell and/or BWP configurations of the wireless access network () is associated with an increased control channel capacity compared to the nominal capacity of the current control channel, detecting (S) control channel resource deficit based on the control channel load and on the control channel capacity data, and, in response to detecting control channel resource deficit, selecting (S) an Scell and/or BWP configuration from the one or more alternative Scell and/or BWP configurations based on the evaluated energy consumptions of the wireless device, and reconfiguring (S) the wireless device with the selected Scell and/or BWP configuration.

SCHEDULING BEAMFORMING COMMUNICATIONS BASED ON A NUMBER OF COMMUNICATION DEVICES IN EACH BEAM (18039007)

Main Inventor

Zaigham KAZMI


Brief explanation

The abstract describes a network node that can efficiently schedule communications with multiple devices in a communications network using multiple beams. Here are the key points:
  • The network node is designed to communicate with multiple devices in a communications network using multiple beams.
  • It can determine the number of devices in each beam to understand the congestion level.
  • Based on the number of devices in a beam, the network node assigns a scheduling priority to each device.
  • The network node selects the beam for communication with a device based on its scheduling priority.
  • Once the beam is selected, the network node schedules communication with the device using that beam.

Potential applications of this technology:

  • Wireless communication networks: This technology can be used in wireless networks to efficiently manage communication with multiple devices, such as in 5G networks.
  • Satellite communication systems: It can be applied in satellite communication systems to optimize communication with multiple devices on the ground.
  • Internet of Things (IoT): This technology can enhance the connectivity and communication efficiency in IoT networks, where numerous devices need to be connected and managed.

Problems solved by this technology:

  • Congestion management: By considering the number of devices in each beam, the network node can effectively manage congestion and allocate resources accordingly.
  • Efficient communication scheduling: The technology ensures that communication with devices is scheduled based on their priority, optimizing the overall network performance.

Benefits of this technology:

  • Improved network performance: By intelligently scheduling communication based on congestion levels and device priorities, the network can achieve better performance and throughput.
  • Enhanced user experience: The technology helps in reducing communication delays and improving the overall user experience for connected devices.
  • Efficient resource allocation: By dynamically assigning scheduling priorities, the network can allocate resources more efficiently, leading to better utilization and cost-effectiveness.

Abstract

A network node configured to communicate with a plurality of communication devices in a communications network via a plurality of beams can schedule communications based on the number of communication devices in each beam. The network node can determine a number of communication devices of the plurality of communication devices that are in a beam of the plurality of beams. The network node can determine a scheduling priority of a communication device of the plurality of communication devices based on the number of communication devices that are in the beam, the communication device being in the beam. The network node can select the beam based on the scheduling priority of the communication device. The network node can, responsive to selecting the beam, schedule communication with the communication device via the beam.

RADIO ACCESS NETWORK RESOURCE GRANT ALLOCATION AND RELATED ASPECTS (18038997)

Main Inventor

Bikramjit SINGH


Brief explanation

The abstract describes a patent application that discloses various methods for a network node in a radio access network to allocate radio resources to wireless communication devices. These methods disperse repetitive transmissions within a configured grant period.
  • The patent application focuses on allocating a grant of dedicated and/or shared radio resources to wireless communication devices in a radio access network.
  • The network node obtains signaling information that indicates the configuration of radio resources for repetitive transmissions within a configured grant period.
  • Each configured grant period is designed to have time-gaps of different durations between the repetitive transmissions.
  • The network node then sends this signaling information to the wireless communication devices.

Potential Applications

  • This technology can be applied in various wireless communication networks, such as cellular networks, to efficiently allocate radio resources to multiple devices.
  • It can improve the overall performance and capacity of the network by optimizing the allocation of resources for repetitive transmissions.

Problems Solved

  • Efficiently allocating radio resources in a radio access network can be challenging, especially when dealing with repetitive transmissions.
  • The patent application addresses the problem of efficiently managing and allocating resources to wireless communication devices within a configured grant period.
  • By dispersing repetitive transmissions with different time-gaps, the technology helps to minimize interference and optimize resource utilization.

Benefits

  • The technology allows for more efficient use of radio resources, leading to improved network performance and capacity.
  • By optimizing the allocation of resources, it can enhance the overall user experience by reducing interference and improving data transmission rates.
  • The dispersed repetitive transmissions within a configured grant period help to ensure fair resource allocation among multiple wireless communication devices.

Abstract

Various ways for a network node in a radio access network to allocate a grant, “CG” of dedicated and/or shared radio resources to a wireless communications device are disclosed which disperse repetitive transmissions within a configured grant period. One disclosed example aspect includes a method performed by a network node in a radio access network, the network node being configured to grant radio resources to a plurality of wireless communications devices, the method including: obtaining signalling information indicating at least one configuration of radio resources for a plurality of time-domain repetitive transmissions in at least one configured grant period, wherein each configured grant period is configured to provide at least one time-gap of a longer duration than another time-gap between the repetitive transmissions in that configured grant period; and sending the signalling information to at least one of the plurality of wireless communication devices.

SYSTEMS AND METHODS FOR SCHEDULING IN A TDD SYSTEM BASED ON UE SPECIFIC DL-UL GAP REQUIREMENTS (18038814)

Main Inventor

Zaigham Kazmi


Brief explanation

The abstract describes a patent application for systems and methods that schedule downlink and uplink transmissions to wireless communication devices in a Time Division Duplexing (TDD) system. These systems and methods consider the downlink-to-uplink gap requirements of the wireless communication devices.
  • The method involves obtaining path delay requirements of multiple wireless communication devices.
  • The downlink-to-uplink gap requirements of the devices are determined based on their path delay requirements.
  • Scheduling for the devices is performed based on their downlink-to-uplink gap requirements.

Potential Applications

  • Wireless communication networks
  • Cellular networks
  • Internet of Things (IoT) devices
  • Smart devices and appliances

Problems Solved

  • Efficient scheduling of downlink and uplink transmissions in TDD systems
  • Meeting the path delay requirements of wireless communication devices
  • Optimizing the use of available bandwidth and resources

Benefits

  • Improved performance and reliability of wireless communication systems
  • Enhanced network capacity and efficiency
  • Reduced interference and latency in TDD systems
  • Better utilization of available spectrum resources

Abstract

Systems and methods for scheduling downlink and/or uplink transmissions to wireless communication devices in a Time Division Duplexing (TDD) system that take into account downlink-to-uplink gap requirements of the wireless communication devices are disclosed. In one embodiment, a method performed by a network node for scheduling downlink and/or uplink transmissions to a plurality of wireless communication devices in a TDD system comprises obtaining path delay requirements (e.g., timing advance requirements) of a plurality of wireless communication devices, determining downlink-to-uplink gap requirements of the plurality of wireless communication devices based on the path delay requirements of the plurality of wireless communication devices, and performing scheduling for the plurality of wireless communication devices based on the downlink-to-uplink gap requirements of the plurality of wireless communication devices.

DECODING CHANNEL STATE INFORMATION REPORT PART TWO (18249798)

Main Inventor

Qingchao Liu


Brief explanation

The patent application describes a method for decoding a channel state information (CSI) report in a network node. Here are the key points:
  • The method involves generating a scrambling sequence for a physical uplink shared channel (PUSCH).
  • The PUSCH is descrambled using the generated scrambling sequence.
  • A CSI report part one is decoded to determine a rank indicator.
  • The location of a CSI report part two is determined.
  • A scrambling sequence is extracted from the PUSCH scrambling sequence corresponding to the location of the CSI report part two.
  • A CSI part two scrambling sequence is generated based on the extracted scrambling sequence and the location of the CSI report part two.
  • The extracted scrambling sequence is applied to the location of the CSI report part two.
  • The location of the CSI report part two in the PUSCH is descrambled using the CSI part two scrambling sequence.
  • The CSI part two is then decoded.

Potential applications of this technology:

  • This method can be used in wireless communication systems to improve the decoding of channel state information reports.
  • It can be applied in 5G networks or future generations of wireless networks to enhance the accuracy and reliability of CSI reporting.

Problems solved by this technology:

  • The method addresses the challenge of accurately decoding CSI reports in wireless communication systems.
  • It helps in extracting and decoding different parts of the CSI report, improving the overall quality of the received information.

Benefits of this technology:

  • By improving the decoding process, this method can enhance the performance of wireless networks.
  • It can lead to better resource allocation, interference management, and overall system efficiency.
  • The accurate decoding of CSI reports can enable more effective beamforming and adaptive modulation techniques.

Abstract

According to some embodiments, a method performed by a network node for decoding a channel state information (CSI) report comprises generating a physical uplink shared channel (PUSCH) scrambling sequence, descrambling a PUSCH using the PUSCH scrambling sequence, decoding a CSI report part one to determine a rank indicator, and determining a location of a CSI report part two. The method further comprises extracting a scrambling sequence from the PUSCH scrambling sequence corresponding to the location of the CSI report part two, generating a CSI part two scrambling sequence based on the PUSCH scrambling sequence and the location of the CSI report part two, and applying the extracted scrambling sequence to the location of the CSI report part two. The method further comprises descrambling the location of the CSI report part two in the PUSCH using the CSI part two scrambling sequence and decoding the CSI part two.

TRANSMISSION PROFILES FOR NR (18367621)

Main Inventor

Mats Folke


Brief explanation

The patent application describes a method for logical channel prioritization (LCP) by a wireless device. This method involves selecting a set of logical channels based on certain restrictions and determining which logical channel to serve.
  • The method helps wireless devices prioritize logical channels for efficient communication.
  • Logical channel restrictions are used to select a specific set of logical channels.
  • The wireless device determines the most suitable logical channel to serve based on the selected set.
  • This method can improve the overall performance and reliability of wireless communication.

Potential Applications

This technology can be applied in various wireless communication systems, including:

  • Cellular networks
  • Wi-Fi networks
  • Internet of Things (IoT) devices
  • Wireless sensor networks
  • Satellite communication systems

Problems Solved

The method addresses the following problems in wireless communication:

  • Congestion: By prioritizing logical channels, the method helps alleviate congestion in wireless networks.
  • Interference: Selecting the most suitable logical channel reduces interference and improves signal quality.
  • Resource allocation: The method optimizes the allocation of resources by focusing on specific logical channels.

Benefits

The use of logical channel prioritization offers several benefits:

  • Enhanced performance: By serving the most appropriate logical channel, the method improves the overall performance of wireless communication.
  • Increased reliability: Prioritizing logical channels helps ensure reliable and uninterrupted communication.
  • Efficient resource utilization: The method optimizes the allocation of resources, leading to improved efficiency in wireless networks.

Abstract

According to certain embodiments, a method by a wireless device is provided for performing logical channel prioritization (LCP) by a wireless device. The method includes selecting a set of logical channels based on one or more logical channel restrictions. The method further includes determining at least one logical channel of the set of logical channels to serve.

METHOD, DEVICE AND APPARATUS FOR OPTIMIZING GRANT FREE UPLINK TRANSMISSION OF MACHINE TO MACHINE (M2M) TYPE DEVICES (18253440)

Main Inventor

Joao Victor De Carvalho Evangelista


Brief explanation

The abstract describes a method, device, and computer-readable media for selecting transmit power, physical resource block (PRB), and modulation and coding scheme (MCS) for a grant-free uplink transmission. 
  • The method involves obtaining an observation of the radio environment of the device.
  • Based on the observation, an action is selected for execution in the next time slot.
  • The action includes selecting the transmit power, PRB, and MCS for the grant-free uplink transmission.

Potential Applications

  • Wireless communication systems
  • Internet of Things (IoT) devices
  • Mobile networks

Problems Solved

  • Efficient selection of transmit power, PRB, and MCS for grant-free uplink transmission
  • Optimizing uplink transmission in dynamic radio environments

Benefits

  • Improved performance and reliability of uplink transmission
  • Enhanced utilization of available resources
  • Increased efficiency in wireless communication systems

Abstract

The disclosure relates to a method, device and non-transitory computer readable media or selecting a transmit power, a physical resource block (PRB), and a modulation and coding scheme (MCS) for a grant free uplink transmission. The method comprises obtaining an observation of the radio environment of the device. The method comprises selecting an action, based on the observation, for execution during a next time slot, the action comprising selecting the transmit power, the PRB, and the MCS for the grant free uplink transmission.

SECONDARY CELL GROUP (SCG) ACTIVATION AND DEACTIVATION AT SECONDARY NODE (SN) ADDITION (18039408)

Main Inventor

Liwei QIU


Brief explanation

The abstract describes a method performed by a user equipment (UE) in a wireless communication network. The method involves receiving a request from a master node (MN) that includes a configuration and mode of operation for a secondary cell group (SCG). The UE determines the mode of operation of the SCG based on the received indication and decides whether to perform random access or delay it accordingly.
  • The method is performed by a user equipment (UE) in a wireless communication network.
  • The UE receives a request from a master node (MN) that includes the configuration and mode of operation for a secondary cell group (SCG).
  • Based on the received indication, the UE determines the mode of operation of the SCG.
  • The UE then decides whether to perform random access or delay it based on the mode of operation of the SCG.

Potential Applications

  • This technology can be applied in various wireless communication networks, such as 5G or beyond, where secondary cell groups are used.
  • It can be used in scenarios where efficient management of random access procedures is required.

Problems Solved

  • The method solves the problem of determining the mode of operation of a secondary cell group based on the received indication.
  • It addresses the issue of deciding whether to perform random access or delay it based on the mode of operation of the secondary cell group.

Benefits

  • The method allows for efficient management of random access procedures in a wireless communication network.
  • It enables the user equipment to make informed decisions regarding random access based on the mode of operation of the secondary cell group.

Abstract

A method performed by a user equipment, UE, includes receiving a request from a master node, MN, including a secondary cell group, SCG, configuration and a mode of operation of the SCG. The method includes determining the mode of operation of the SCG based on the indication of the mode of operation of the SCG. The method includes determining whether to perform random access or to delay performing random access based on the mode of operation of the SCG. UE apparatuses, computer programs, and computer program products are also provided.

MULTI-BEAM RANDOM ACCESS PROCEDURE IN HANDOVER EXECUTION (18244269)

Main Inventor

Icaro L.J. Da Silva


Brief explanation

The abstract describes a method used in a User Equipment (UE) device for performing random access in a cellular network. Here are the key points:
  • The UE receives a message from a network node containing information about dedicated random access channel (RACH) resources associated with a target cell.
  • The UE obtains an estimate of beam quality for each beam associated with the dedicated RACH resources.
  • Based on the obtained estimate of beam quality, the UE determines if any beam meets certain criteria for performing random access.
  • Random access is performed by the UE based on whether any beam meets the criteria for random access.

Potential applications of this technology:

  • This method can be used in cellular networks to improve the efficiency and reliability of random access procedures performed by User Equipment devices.
  • It can help optimize the selection of dedicated RACH resources based on beam quality, leading to better network performance.

Problems solved by this technology:

  • Random access procedures in cellular networks can be prone to errors and inefficiencies, leading to delays and degraded network performance.
  • This method helps address these issues by considering beam quality and selecting the most suitable dedicated RACH resources for random access.

Benefits of this technology:

  • Improved random access performance: By selecting dedicated RACH resources based on beam quality, the method enhances the success rate and speed of random access procedures.
  • Enhanced network efficiency: The method optimizes the utilization of dedicated RACH resources, leading to improved overall network efficiency.
  • Better user experience: By reducing delays and errors in random access, the technology improves the user experience in cellular networks.

Abstract

A method in a UE comprises: receiving a message from a network node comprising information about one or more sets of dedicated random access channel (RACH) resources, each set of dedicated RACH resources associated with a beam associated with a target cell; obtaining an estimate of beam quality for each beam associated with the sets of dedicated RACH resources; determining, based on the obtained estimate of beam quality, whether any beam associated with the one or more sets of dedicated RACH resources meets one or more criteria of a first set of criteria for performing random access; and performing random access based on whether any beam associated with the one or more sets of dedicated RACH resources meets the one or more criteria of the first set of criteria for performing random access.