H04W16/18

USE OF AN OVERLAY NETWORK TO INTERCONNECT BETWEEN A FIRST PUBLIC CLOUD AND SECOND PUBLIC CLOUD
20230336476 · 2023-10-19 ·

Embodiments are directed towards systems and methods for enabling an overlay network to interconnect a first public cloud and second public cloud. One such method includes: providing a connected VPC (Virtual Private Cloud); deploying one or more virtual routers within the connected VPC; connecting the first public cloud to the connected VPC using the virtual routers in the connected VPC to form the overlay network; connecting the second public cloud to the connected VPC using the overlay network via the virtual routers in the connected VPC; and transmitting data traffic between the first public cloud and the second public cloud using the overlay network via the virtual routers in the connected VPC.

USE OF AN OVERLAY NETWORK TO INTERCONNECT BETWEEN A FIRST PUBLIC CLOUD AND SECOND PUBLIC CLOUD
20230336476 · 2023-10-19 ·

Embodiments are directed towards systems and methods for enabling an overlay network to interconnect a first public cloud and second public cloud. One such method includes: providing a connected VPC (Virtual Private Cloud); deploying one or more virtual routers within the connected VPC; connecting the first public cloud to the connected VPC using the virtual routers in the connected VPC to form the overlay network; connecting the second public cloud to the connected VPC using the overlay network via the virtual routers in the connected VPC; and transmitting data traffic between the first public cloud and the second public cloud using the overlay network via the virtual routers in the connected VPC.

STRETCHING CLUSTERS FOR RADIO ACCESS NETWORKS FROM A PUBLIC NETWORK TO A PRIVATE NETWORK
20230337011 · 2023-10-19 · ·

A 5G cellular network system includes a private network accessible to only authorized users. The private network may include: a plurality of servers that each include: a processor; memory; an operating system; a distributed unit (DU) installed in the memory and a worker installed in the memory. The distributed unit includes computer instructions, that when executed by the processor, processes and controls communications with at least one tower to handle communications between cellular devices. Each DU communicates with a central unit (CU) deployed at a public network that is open to the authorized users and users other than the authorized users. The worker is configured to communicate over a wide area network to the CU in a core network for handling the communications to/from the DU and the CU.

STRETCHING CLUSTERS FOR RADIO ACCESS NETWORKS FROM A PUBLIC NETWORK TO A PRIVATE NETWORK
20230337011 · 2023-10-19 · ·

A 5G cellular network system includes a private network accessible to only authorized users. The private network may include: a plurality of servers that each include: a processor; memory; an operating system; a distributed unit (DU) installed in the memory and a worker installed in the memory. The distributed unit includes computer instructions, that when executed by the processor, processes and controls communications with at least one tower to handle communications between cellular devices. Each DU communicates with a central unit (CU) deployed at a public network that is open to the authorized users and users other than the authorized users. The worker is configured to communicate over a wide area network to the CU in a core network for handling the communications to/from the DU and the CU.

CELLULAR NETWORK SYSTEM CONFIGURATION
20230337012 · 2023-10-19 · ·

A method includes determining if a distributed unit (DU) can be deployed at a cluster created using a containerized application by determining if the DU exceeds a maximum capacity of DUs at the cluster, and in response to determining that the DU exceeds the maximum capacity of DUs at the cluster, creating a second cluster. Also, in another embodiment, in response to determining that the DU exceeds the maximum capacity of DUs at the first cluster, a portion of the DUs in the first cluster is moved to a second cluster. In yet another embodiment, in response to determining that the DU does not exceed the maximum distance from each of DUs in the first cluster, preventing deployment of the DU in the first cluster.

CELLULAR NETWORK SYSTEM CONFIGURATION
20230337012 · 2023-10-19 · ·

A method includes determining if a distributed unit (DU) can be deployed at a cluster created using a containerized application by determining if the DU exceeds a maximum capacity of DUs at the cluster, and in response to determining that the DU exceeds the maximum capacity of DUs at the cluster, creating a second cluster. Also, in another embodiment, in response to determining that the DU exceeds the maximum capacity of DUs at the first cluster, a portion of the DUs in the first cluster is moved to a second cluster. In yet another embodiment, in response to determining that the DU does not exceed the maximum distance from each of DUs in the first cluster, preventing deployment of the DU in the first cluster.

Connecting to a fixed network using an extensible drone-based, dynamic network
20230337329 · 2023-10-19 · ·

A method for dynamic and extensible creation of an extensible wireless network, using a set of drones that individually support server processes. The drones interact with one another, exchanging information, type of coverage, type and amount of throughput, location, etc. A control node connects to a wired network. The node operates a leader election protocol, captures state information from the drones, and positions/re-positions the drones as necessary. Drones are flown in to position and then engaged as necessary to stretch/adapt the coverage as necessary. The drone's power utilization is monitored and its coverage area modified as necessary to optimize power utilization. The control node performs drone-based coverage/power utilization computations, and attempts to apply the appropriate location assignments to provide maximum network coverage (extensibility) while also preserving drone-specific power (battery) utilization. The approach herein can be used to supplement existing networks during events, migrations of populations during work hours, etc.

Connecting to a fixed network using an extensible drone-based, dynamic network
20230337329 · 2023-10-19 · ·

A method for dynamic and extensible creation of an extensible wireless network, using a set of drones that individually support server processes. The drones interact with one another, exchanging information, type of coverage, type and amount of throughput, location, etc. A control node connects to a wired network. The node operates a leader election protocol, captures state information from the drones, and positions/re-positions the drones as necessary. Drones are flown in to position and then engaged as necessary to stretch/adapt the coverage as necessary. The drone's power utilization is monitored and its coverage area modified as necessary to optimize power utilization. The control node performs drone-based coverage/power utilization computations, and attempts to apply the appropriate location assignments to provide maximum network coverage (extensibility) while also preserving drone-specific power (battery) utilization. The approach herein can be used to supplement existing networks during events, migrations of populations during work hours, etc.

METHODS AND SYSTEMS FOR VIRTUAL SITE INSPECTIONS

A technique is directed to methods and systems of virtual site inspections. In some embodiments, a network operator navigates a drone which captures image data of equipment and layout of a site. The image data is processed and used to generate a 3D model of the site. A network operator virtually installs new equipment in the virtual representation of the site, and presents the 3D model of the site, with the new equipment in the proposed location, to a permitting authority. The permitting authority can review the 3D model of the new equipment at the site and approve or deny authorization for the network operator to physically install the equipment at the site. After the new equipment is installed, a network operator can capture image data of the installed equipment at the site to prove to the permitting authority that the equipment was installed at the site according to regulation.

METHODS AND SYSTEMS FOR VIRTUAL SITE INSPECTIONS

A technique is directed to methods and systems of virtual site inspections. In some embodiments, a network operator navigates a drone which captures image data of equipment and layout of a site. The image data is processed and used to generate a 3D model of the site. A network operator virtually installs new equipment in the virtual representation of the site, and presents the 3D model of the site, with the new equipment in the proposed location, to a permitting authority. The permitting authority can review the 3D model of the new equipment at the site and approve or deny authorization for the network operator to physically install the equipment at the site. After the new equipment is installed, a network operator can capture image data of the installed equipment at the site to prove to the permitting authority that the equipment was installed at the site according to regulation.