H04W8/02

CONTROL OF ROAMING IN A WIRELESS NETWORK USING A VARIABLE MOBILITY THRESHOLD
20230143729 · 2023-05-11 ·

A network management system (NMS) is configured to control roaming in a wireless network using a variable mobility threshold. For a first wireless device associated with a current location, the NMS obtains at least one performance metric of a first wireless signal received by the first wireless device at the current location from a first AP of a plurality of APs, compares the at least one parameter of the first wireless signal to at least one performance metric of a second wireless signal received by at least one other wireless device at the current location from a second AP of the plurality of APs, and triggers a roaming operation of the first wireless device from the first AP to the second AP if the comparison satisfies a mobility threshold that varies based on the at least one performance metric of the first wireless signal.

CONTROL OF ROAMING IN A WIRELESS NETWORK USING A VARIABLE MOBILITY THRESHOLD
20230143729 · 2023-05-11 ·

A network management system (NMS) is configured to control roaming in a wireless network using a variable mobility threshold. For a first wireless device associated with a current location, the NMS obtains at least one performance metric of a first wireless signal received by the first wireless device at the current location from a first AP of a plurality of APs, compares the at least one parameter of the first wireless signal to at least one performance metric of a second wireless signal received by at least one other wireless device at the current location from a second AP of the plurality of APs, and triggers a roaming operation of the first wireless device from the first AP to the second AP if the comparison satisfies a mobility threshold that varies based on the at least one performance metric of the first wireless signal.

RELATING TO ACCESS TO SERVICES AFTER A DISASTER CONDITION
20230147410 · 2023-05-11 ·

The disclosure relates to a 5G or 6G communication system for supporting a higher data transmission rate, A method and apparatus are provided for providing updated details to a user equipment (UE) that is disaster roaming in a second telecommunications network due to a disaster condition affecting an area of a first telecommunication network. The second telecommunication network determines that the area has changed and sends updated details to the UE. The updated details relates to the changed area affected by the disaster condition.

RELATING TO ACCESS TO SERVICES AFTER A DISASTER CONDITION
20230147410 · 2023-05-11 ·

The disclosure relates to a 5G or 6G communication system for supporting a higher data transmission rate, A method and apparatus are provided for providing updated details to a user equipment (UE) that is disaster roaming in a second telecommunications network due to a disaster condition affecting an area of a first telecommunication network. The second telecommunication network determines that the area has changed and sends updated details to the UE. The updated details relates to the changed area affected by the disaster condition.

Differentiated mobility schemes and neighbor lists

One or more computing devices, systems, and/or methods for implementing differentiated mobility schemes are provided. In an example, a communication device may be identified as being connected with a first base station. A selection criterion may be identified based upon a characteristic associated with the communication device. A mobility scheme may be selected from a set of mobility schemes based upon the selection criterion. One or more thresholds of the mobility scheme may be communicated to the communication device.

Differentiated mobility schemes and neighbor lists

One or more computing devices, systems, and/or methods for implementing differentiated mobility schemes are provided. In an example, a communication device may be identified as being connected with a first base station. A selection criterion may be identified based upon a characteristic associated with the communication device. A mobility scheme may be selected from a set of mobility schemes based upon the selection criterion. One or more thresholds of the mobility scheme may be communicated to the communication device.

Device based credentials

Methods and systems for providing a wireless communication service are disclosed. A device identifier for a wireless communication service can be used to generate a connection profile (e.g., communication profile, wide-area network profile, service profile, network profile, etc.) for the wireless communication service that requires credentials for authentication. The connection profile can be generated in response to a user accessing or signing up for the wireless communication service. The connection profile can comprise a username that includes and/or mirrors the device identifier and a password generated by inputting the device identifier into a predefined function. The connection profile also can comprise an authentication identifier. A service provider applies a specific type of authentication for devices that provide the authentication identifier as part of an authentication request message.

Device based credentials

Methods and systems for providing a wireless communication service are disclosed. A device identifier for a wireless communication service can be used to generate a connection profile (e.g., communication profile, wide-area network profile, service profile, network profile, etc.) for the wireless communication service that requires credentials for authentication. The connection profile can be generated in response to a user accessing or signing up for the wireless communication service. The connection profile can comprise a username that includes and/or mirrors the device identifier and a password generated by inputting the device identifier into a predefined function. The connection profile also can comprise an authentication identifier. A service provider applies a specific type of authentication for devices that provide the authentication identifier as part of an authentication request message.

Methods and apparatuses for exposure of monitoring event

Methods and apparatuses are disclosed for exposure of monitoring event. According to an embodiment, a network exposure node receives a first request for subscribing to a plurality of monitoring reports for each of a group of terminal devices which include one or more terminal devices having both globally valid identifiers (IDs) and locally valid IDs. The network exposure node obtains, from a subscriber management node, the globally valid IDs and the locally valid IDs of the one or more terminal devices and a correspondence between the globally valid IDs and the locally valid IDs. In response to receiving from a mobility management node a monitoring report for a terminal device in the group of terminal devices, the network exposure node determines, for the terminal device, a current remaining number of monitoring reports based on the obtained IDs and correspondence.

Methods and apparatuses for exposure of monitoring event

Methods and apparatuses are disclosed for exposure of monitoring event. According to an embodiment, a network exposure node receives a first request for subscribing to a plurality of monitoring reports for each of a group of terminal devices which include one or more terminal devices having both globally valid identifiers (IDs) and locally valid IDs. The network exposure node obtains, from a subscriber management node, the globally valid IDs and the locally valid IDs of the one or more terminal devices and a correspondence between the globally valid IDs and the locally valid IDs. In response to receiving from a mobility management node a monitoring report for a terminal device in the group of terminal devices, the network exposure node determines, for the terminal device, a current remaining number of monitoring reports based on the obtained IDs and correspondence.