H04L65/10

Event-based multiprotocol communication session distribution
11375049 · 2022-06-28 · ·

To allow the multiple communication endpoints that support different protocols to communicate, a protocol specific message (e.g., a SIP INVITE message) is converted to a protocol neutral message and sent to a protocol neutral bus. The bus delivers this message to a session processing engine, which then applies one or more rules to the protocol neutral request for the first communication session message. The rules are used to apply communication application logic to the first communication session message, then generate a first offer for a communication session message. This message is published to the protocol neutral bus. One or more edge servers supporting one or more protocols may receive that first offer message. The protocol neutral message is converted, by each edge server recipient of that message, to a protocol specific message (e.g., in a different protocol) and is then sent to one or more communication endpoints.

COMPUTER-IMPLEMENTED METHOD OF OPTIMIZING BANDWIDTH IN A PSAP ENVIRONMENT AND COMMUNICATION NETWORK

A computer-implemented method of optimizing bandwidth in a public safety answering point (PSAP) environment ca n include retrieving content related to emergency incidents from a Social Media (SM) server, feeding the content to a Stream Processing Module having a Machine Learning engine for determining a similarity level between the emergency call and any of the emergency incidents retrieved from the SM server. If the similarity level exceeds a predetermined threshold value, then option for downgrading the emergency call to a call comprising only audio data can be provided. If this downgrade option is selected, the RTP stream of the emergency call can be downgraded to an audio call without any video.

TERMINAL, WIRELESS COMMUNICATION SYSTEM INCLUDING TERMINAL, AND METHOD OF OPERATING TERMINAL
20220201575 · 2022-06-23 ·

The present disclosure provides a method of operating a terminal. The method includes connecting a first radio access technology (RAT)-based network to a first base station, transmitting a first message based on a session initiation protocol to the first base station, starting an evolved packet system fallback (ETSFB) timer in response to the first message to the first base station, performing any one of an EPSFB procedure and a transition procedure to connect a second RAT-based network to a second base station by using the EPSFB timer, and performing a voice communication session through the second RAT-based network.

Registration control for wireless networks, such as IMS networks
11368499 · 2022-06-21 · ·

Systems and methods for dynamically controlling network registrations are disclosed. The method includes replacing a stringent error message with a lenient cause message in responding to a registration request from a user equipment.

Simulation view network streamer

A simulation view network streamer is disclosed. A first request is received to generate a first network view stream from a first view that exists in a simulation of a virtual environment. The first view is defined by first view data that identifies a first portion of the virtual environment encompassed by the first view. The first request includes a first destination address of a first output device. A second request is received to generate a second network view stream from a second view that exists in the simulation of the virtual environment concurrently with the first view, the second request including a second destination address of a second output device. A stream of images of the first view is sent to the first output device, and a stream of images of the second view is sent to the second output device.

Simulation view network streamer

A simulation view network streamer is disclosed. A first request is received to generate a first network view stream from a first view that exists in a simulation of a virtual environment. The first view is defined by first view data that identifies a first portion of the virtual environment encompassed by the first view. The first request includes a first destination address of a first output device. A second request is received to generate a second network view stream from a second view that exists in the simulation of the virtual environment concurrently with the first view, the second request including a second destination address of a second output device. A stream of images of the first view is sent to the first output device, and a stream of images of the second view is sent to the second output device.

System for autonomous mobile device assisted communication

An autonomous mobile device (AMD) may be used in an environment as a communication endpoint for voice or video communications. An incoming request for communication may initiate a process in which the AMD finds a user within the environment. Information obtained from sensors onboard the AMD or in the environment may be used to determine the whereabouts of the user. If an existing communication endpoint is not available to the user or cannot support a requested communication modality, the AMD may travel to permitted areas within the environment to find the user, while avoiding areas designated as private. Once found, communication may be established with the user. If the incoming request expires, the AMD may present information indicative of the request to the user.

METHODS AND APPARATUS RELATING TO HANDOVER OF A WIRELESS DEVICE

A method performed by a first intermediate node in an ongoing communication session between a first network node and a second network node in a communication network is provided. The method comprises: receiving an indication that handover of a first network node from a first radio access network to a second radio access network has occurred during the ongoing communication session; generating a message comprising a header, wherein the header identifies the second radio access network; and transmitting the message to a second intermediate node in the ongoing communication session.

PREDICTIVE SCORING BASED ON KEY PERFORMANCE INDICATORS IN TELECOMMUNICATIONS SYSTEM
20220188732 · 2022-06-16 ·

A method includes: receiving protocol event data from a plurality of probes within the telecommunication system; determining a most probable cause of a call event from the protocol event data; applying the most probable cause to a trained machine learning algorithm that includes the most probable cause as its input and a telecommunication system score as its output; and in response to an output score from the trained machine learning algorithm, performing a corrective action for a plurality of network users that are expected to be affected by the most probable cause.

Next generation to VoLTE fallback for voice calls

A network device receives, from a user equipment (UE), a Fifth Generation (5G) New Radio (NR) network attach request, wherein the 5G NR network attach request includes a Voice over Long Term Evolution (VoLTE) network attach request. The network device initiates attachment procedures, in response to receipt of the 5G NR network attach request and the VoLTE network attach request, to attach the UE to the 5G NR network and to a VoLTE network, and initiates establishment of a connection between the 5G NR network and the UE.