Patent classifications
H04W24/08
Radio link failure declaration for full-duplex
Wireless communication systems and methods related radio link failure monitoring and handling in full-duplex communications are provided. A user equipment communicates, with a base station, in a full-duplex mode using a first uplink beam and a first downlink beam. The user equipment detects a beam failure of at least one of the first uplink beam or the first downlink beam. The user equipment determines whether the beam failure is associated with self-interference in the full-duplex mode. The user equipment determines, based at least in part on the determination that the beam failure is associated with the self-interference in the full-duplex mode, to refrain from declaring a radio link failure.
Radio link failure declaration for full-duplex
Wireless communication systems and methods related radio link failure monitoring and handling in full-duplex communications are provided. A user equipment communicates, with a base station, in a full-duplex mode using a first uplink beam and a first downlink beam. The user equipment detects a beam failure of at least one of the first uplink beam or the first downlink beam. The user equipment determines whether the beam failure is associated with self-interference in the full-duplex mode. The user equipment determines, based at least in part on the determination that the beam failure is associated with the self-interference in the full-duplex mode, to refrain from declaring a radio link failure.
Unified interface and tracing tool for network function virtualization architecture
A system instantiates a unified interface for a telecommunications network including a Network Function Virtualization (NFV) architecture of an IP multimedia subsystem (IMS) with multiple Virtual Network Functions (VNFs) that each have multiple component VNFs. The system instantiates a tracing tool configured to evaluate performance of the IMS in response to execution of a test case, which includes a test script to test a computing product and where the performance of the IMS is based on packets captured concurrently from VNFs. The test script causes capture and analysis of parameters extracted from packets of the VNFs. In response to completing the test case, the system reports test results indicating the performance of the IMS relative to pass/fail criteria, where the test results are presented through the unified interface.
Unified interface and tracing tool for network function virtualization architecture
A system instantiates a unified interface for a telecommunications network including a Network Function Virtualization (NFV) architecture of an IP multimedia subsystem (IMS) with multiple Virtual Network Functions (VNFs) that each have multiple component VNFs. The system instantiates a tracing tool configured to evaluate performance of the IMS in response to execution of a test case, which includes a test script to test a computing product and where the performance of the IMS is based on packets captured concurrently from VNFs. The test script causes capture and analysis of parameters extracted from packets of the VNFs. In response to completing the test case, the system reports test results indicating the performance of the IMS relative to pass/fail criteria, where the test results are presented through the unified interface.
Managing and monitoring infrastructure access in networked environments
Embodiments are directed to managing access to network resources. Mesh agents for an overlay network may be provided. If a client requests access to a resource, a first mesh agent configured to provide the client with ingress to the overlay network may be determined. If a security engine validates the request received from the first mesh agent, a route from the client to the resource may be determined. A secure tunnel may be generated between the first mesh agent and a last mesh agent based on forwarding the request to mesh agents on the route. If the request is provided to the last mesh agent credential information for the resource may be provided to the last mesh agent and the last mesh agent, the request and the credential information may be employed to access the resource.
Managing and monitoring infrastructure access in networked environments
Embodiments are directed to managing access to network resources. Mesh agents for an overlay network may be provided. If a client requests access to a resource, a first mesh agent configured to provide the client with ingress to the overlay network may be determined. If a security engine validates the request received from the first mesh agent, a route from the client to the resource may be determined. A secure tunnel may be generated between the first mesh agent and a last mesh agent based on forwarding the request to mesh agents on the route. If the request is provided to the last mesh agent credential information for the resource may be provided to the last mesh agent and the last mesh agent, the request and the credential information may be employed to access the resource.
Paging early indication for paging occasion
Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a user equipment (UE) may receive a paging early indication that indicates one or more paging occasions (POs) in a quantity of paging frames based at least in part on a maximum quantity of paging frames. The UE may process a physical downlink control channel communication received in a PO of the one or more POs. Numerous other aspects are described.
Paging early indication for paging occasion
Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a user equipment (UE) may receive a paging early indication that indicates one or more paging occasions (POs) in a quantity of paging frames based at least in part on a maximum quantity of paging frames. The UE may process a physical downlink control channel communication received in a PO of the one or more POs. Numerous other aspects are described.
METHOD AND DEVICE FOR ALLOCATING BEAM FAILURE DETECTION RESOURCES
A method for allocating beam failure detection resources includes determining control channel resource sets (CORESETs) configured by a network device for a terminal; in response to a number of the CORESETs being greater than a number of beam failure detection (BFD) resources supported by the terminal, selecting target CORESETs with a number of the BFD resources; and determining reference signal (RS) resources corresponding to transmission configuration indication (TCI) states of quasi co-locations (QCLs) of the selected target CORESETs as BFD RS resources. A device having a processor and memory may perform the method.
METHOD AND DEVICE FOR ALLOCATING BEAM FAILURE DETECTION RESOURCES
A method for allocating beam failure detection resources includes determining control channel resource sets (CORESETs) configured by a network device for a terminal; in response to a number of the CORESETs being greater than a number of beam failure detection (BFD) resources supported by the terminal, selecting target CORESETs with a number of the BFD resources; and determining reference signal (RS) resources corresponding to transmission configuration indication (TCI) states of quasi co-locations (QCLs) of the selected target CORESETs as BFD RS resources. A device having a processor and memory may perform the method.