Patent classifications
H04W16/18
SELF-CONTAINED ROBOTIC UNITS FOR PROVIDING MOBILE NETWORK SERVICES AND INTELLIGENT PERIMETER
Disclosed are systems and methods for a robotic mobile perimeter and telecommunication network. One or more stationary ground units are associated with a perimeter protected entity and comprise a broadband cellular network core for providing a private telecommunication network, and secondary transceivers for providing a second telecommunication network. Mobile robotic units comprise a broadband cellular network node for extending the private telecommunication network, secondary transceivers, a plurality of sensors, a locomotion device, and a controller. The mobile robotic units simultaneously create a dynamically responsive perimeter around the perimeter protected entity and a movable extension of the private telecommunication network, wherein the controllers generate locomotion control signals to cause least a portion of the plurality of mobile robotic units to reposition themselves within the surrounding environment and provide continuous coverage from the private telecommunication network to the perimeter protected entity as one or more locations of the perimeter protected entity change.
SELF-CONTAINED ROBOTIC UNITS FOR PROVIDING MOBILE NETWORK SERVICES AND INTELLIGENT PERIMETER
Disclosed are systems and methods for a robotic mobile perimeter and telecommunication network. One or more stationary ground units are associated with a perimeter protected entity and comprise a broadband cellular network core for providing a private telecommunication network, and secondary transceivers for providing a second telecommunication network. Mobile robotic units comprise a broadband cellular network node for extending the private telecommunication network, secondary transceivers, a plurality of sensors, a locomotion device, and a controller. The mobile robotic units simultaneously create a dynamically responsive perimeter around the perimeter protected entity and a movable extension of the private telecommunication network, wherein the controllers generate locomotion control signals to cause least a portion of the plurality of mobile robotic units to reposition themselves within the surrounding environment and provide continuous coverage from the private telecommunication network to the perimeter protected entity as one or more locations of the perimeter protected entity change.
Method and System for Testing Coverage Effect of VHF Communication Base Station
The present application provides a method for testing the coverage effect of a VHF communication base station, including: a server sending preset test parameter information to a mobile station, sending a first start test instruction to the mobile station and at least one base station, and receiving first audio data and first location information sent by the at least one base station, and second audio data and second location information sent by the mobile station. By using the mobile stations to send or receive audio data at different distances to a temporary VHF communication base station, it is possible to accurately determine a coverage distance of the temporary VHF communication base station and a transmission effect of the audio data at different communication distances.
Method and System for Testing Coverage Effect of VHF Communication Base Station
The present application provides a method for testing the coverage effect of a VHF communication base station, including: a server sending preset test parameter information to a mobile station, sending a first start test instruction to the mobile station and at least one base station, and receiving first audio data and first location information sent by the at least one base station, and second audio data and second location information sent by the mobile station. By using the mobile stations to send or receive audio data at different distances to a temporary VHF communication base station, it is possible to accurately determine a coverage distance of the temporary VHF communication base station and a transmission effect of the audio data at different communication distances.
Methods for Multi-Access Edge Computing Network Slicing in 5G Networks
Methods and systems are provided for allocating resources to users in a wireless network including a plurality of edge nodes that provide wireless network access and multi-access edge computing functions. Slice requests are received from the users for a type of resource, including one or more of networking resources, storage resources, and computation resources. A set of slice requests to be admitted is determined based on resource availability constraints among one or more of the networking resources, the storage resources, and the computation resources at each edge node.
Methods for Multi-Access Edge Computing Network Slicing in 5G Networks
Methods and systems are provided for allocating resources to users in a wireless network including a plurality of edge nodes that provide wireless network access and multi-access edge computing functions. Slice requests are received from the users for a type of resource, including one or more of networking resources, storage resources, and computation resources. A set of slice requests to be admitted is determined based on resource availability constraints among one or more of the networking resources, the storage resources, and the computation resources at each edge node.
Incorporating co-site interference in dynamic spectrum access systems with minimal computational needs
A system and method for incorporating co-site interference impact in dynamic spectrum access for heterogeneous hierarchical networks where preprocessing is used to create lookup tables for the different types of co-site interference. The lookup tables reflect the weight of the spectral leakage lobes for all signals internal and external to the system under different conditions. Lookup tables can be used at any hierarchical entity that offer dynamic spectrum access services in a cloud services construct. Co-site interference impact becomes its own set of dynamic spectrum access services that can be added to a dynamic spectrum access capable system without impacting the other dynamic spectrum access computations needs such as computation that produce spatial separation. Co-site interference becomes a second order spatial separation that is abstracted in lookup tables and adaptable based on measured metrics such that different lookup tables can be used under different conditions.
Secure communication in network access points
Disclosed is an access point (AP) for a network that includes security features for interacting with devices on the network. The other devices on the network may be other APs, client devices, or a backend configuration server. The access point includes a private key that is used to verify signals to and from (the private key may be different for different functions). In the case of other APs, the private key is used to verify control signals sent between the APs to identify and prevent a hijacked AP from taking control of the network by sending false control signals. In the case of a client device, the client device may use the subject AP's private key to identify that the subject AP is a trusted member of the network that may receive data. In the case of the backend server, the subject AP may verify configuration updates via use of the private key to prevent loading of malicious firmware.
Secure communication in network access points
Disclosed is an access point (AP) for a network that includes security features for interacting with devices on the network. The other devices on the network may be other APs, client devices, or a backend configuration server. The access point includes a private key that is used to verify signals to and from (the private key may be different for different functions). In the case of other APs, the private key is used to verify control signals sent between the APs to identify and prevent a hijacked AP from taking control of the network by sending false control signals. In the case of a client device, the client device may use the subject AP's private key to identify that the subject AP is a trusted member of the network that may receive data. In the case of the backend server, the subject AP may verify configuration updates via use of the private key to prevent loading of malicious firmware.
Installation location determination device and method for installation location determination of radio device
An installation location determination device for a radio device, includes a memory and a processor. The memory stores device information on a transmitter and a receiver, and environment information. The processor executes a process including, performing first simulation using a ray tracing method based on the device information and the environment information to calculate first received signal strengths at a plurality of installation candidate points, located respectively at centers of a plurality of installation candidate locations where the receiver is to be installed, and a plurality of neighboring points set for each of the installation candidate points within a first distance from the installation candidate point, calculating second received signal strengths in the respective installation candidate locations based on a calculation result of the first received signal strengths, determining an installation location of the receiver based on the second received signal strengths, and outputting the installation location.