Patent classifications
H04W24/08
Method for configuring PDCCH detection and related device
Embodiments of this application provide a method for configuring physical downlink control channel (PDCCH) detection and a terminal device. The method includes: receiving a first indication signal sent from a network side, and obtaining a parameter for PDCCH detection based on the first indication signal; and detecting a PDCCH based on the parameter for PDCCH detection.
Method and apparatus for transmitting or receiving signal in mobile communication system
A communication technique for convergence of internet of thing (IoT) technology and a 5th generation (5G) communication system for supporting a higher data transfer rate beyond a 4th generation (4G) system, and a system therefor are provided. The disclosure can be applied to intelligent services (e.g., smart homes, smart buildings, smart cities, smart or connected cars, health care, digital education, retail business, and services associated with security and safety) on the basis of 5G communication technology and IoT-related technology. The disclosure provides a paging monitoring method according to a state of a terminal and a method for reporting a connection setup failure in consideration of an inactive state of the terminal.
Method and apparatus for transmitting or receiving signal in mobile communication system
A communication technique for convergence of internet of thing (IoT) technology and a 5th generation (5G) communication system for supporting a higher data transfer rate beyond a 4th generation (4G) system, and a system therefor are provided. The disclosure can be applied to intelligent services (e.g., smart homes, smart buildings, smart cities, smart or connected cars, health care, digital education, retail business, and services associated with security and safety) on the basis of 5G communication technology and IoT-related technology. The disclosure provides a paging monitoring method according to a state of a terminal and a method for reporting a connection setup failure in consideration of an inactive state of the terminal.
Locating external interference in a wireless network
A method for locating a source of interference external to a wireless telecommunications network includes establishing a grid of pixels that represents an area associated with a plurality of cellular antennas, assigning an elevation value to each pixel in the grid, determining a vertical gain for each of the plurality of cellular antennas, and determining respective probability values for pixels in the grid using the elevation values and the vertical gain, each of the respective probability values representing a probability that the source of interference external to the wireless telecommunications network is located at an associated pixel.
Locating external interference in a wireless network
A method for locating a source of interference external to a wireless telecommunications network includes establishing a grid of pixels that represents an area associated with a plurality of cellular antennas, assigning an elevation value to each pixel in the grid, determining a vertical gain for each of the plurality of cellular antennas, and determining respective probability values for pixels in the grid using the elevation values and the vertical gain, each of the respective probability values representing a probability that the source of interference external to the wireless telecommunications network is located at an associated pixel.
Zero trust wireless monitoring-system and method for behavior based monitoring of radio frequency environments
A System and Method is provided that enable identifying cyber security attacks using observation and monitoring of end point activity. By following and monitoring the wireless connection related activities of endpoint devices as they cycle through various steps leading to establishing a connection to the secure network, a knowledge base is established in the cloud by analysis of the actions, and communication to build the confidence that the users of the network are where they should be. In one embodiment, no access is provided until a user presents valid credentials. Based on these credentials the network then builds a specific path based on access controls, tunnels or other techniques to control the user's communication and access to specific targets within the network.
Zero trust wireless monitoring-system and method for behavior based monitoring of radio frequency environments
A System and Method is provided that enable identifying cyber security attacks using observation and monitoring of end point activity. By following and monitoring the wireless connection related activities of endpoint devices as they cycle through various steps leading to establishing a connection to the secure network, a knowledge base is established in the cloud by analysis of the actions, and communication to build the confidence that the users of the network are where they should be. In one embodiment, no access is provided until a user presents valid credentials. Based on these credentials the network then builds a specific path based on access controls, tunnels or other techniques to control the user's communication and access to specific targets within the network.
Cellular enhancements for application mobility
- Vijay Venkataraman ,
- Amitabha Ghosh ,
- Eyad Al-Shemali ,
- Franco Travostino ,
- Jinghua Ling ,
- Lakshmi N. Kavuri ,
- Muhammad R. Dar ,
- Murtaza A. Shikari ,
- Muthukumaran Dhanapal ,
- Pankaj Subhash Vasandani ,
- Ravish Samuel ,
- Samuel J. Miller ,
- Shivani Suresh Babu ,
- Sree Ram Kodali ,
- Srinivasan Nimmala ,
- Srirang A. Lovlekar ,
- Yifan Zhu ,
- Irfan Khasim Mohammed ,
- Sofheem Mohammed ,
- Raghuram Mungara ,
- Vijay Gadde ,
- Sharad Garg
Apparatuses, systems, and methods for a wireless device to perform detection and mitigation of data stalls. The mitigation may occur during and/or at initiation of a data connection. The wireless device may establish a data connection(s) with a network over a Wi-Fi or cellular interface and monitor the data connection(s) for a data stall condition(s)/hint(s). The wireless device may perform a remedial action(s) responsive to detection of a data stall condition(s)/hint(s), including initiating a service recovery of the cellular interface, initiating a radio access technology (RAT) upgrade procedure, and/or initiating a handover procedure to a neighbor cell.
Cellular enhancements for application mobility
- Vijay Venkataraman ,
- Amitabha Ghosh ,
- Eyad Al-Shemali ,
- Franco Travostino ,
- Jinghua Ling ,
- Lakshmi N. Kavuri ,
- Muhammad R. Dar ,
- Murtaza A. Shikari ,
- Muthukumaran Dhanapal ,
- Pankaj Subhash Vasandani ,
- Ravish Samuel ,
- Samuel J. Miller ,
- Shivani Suresh Babu ,
- Sree Ram Kodali ,
- Srinivasan Nimmala ,
- Srirang A. Lovlekar ,
- Yifan Zhu ,
- Irfan Khasim Mohammed ,
- Sofheem Mohammed ,
- Raghuram Mungara ,
- Vijay Gadde ,
- Sharad Garg
Apparatuses, systems, and methods for a wireless device to perform detection and mitigation of data stalls. The mitigation may occur during and/or at initiation of a data connection. The wireless device may establish a data connection(s) with a network over a Wi-Fi or cellular interface and monitor the data connection(s) for a data stall condition(s)/hint(s). The wireless device may perform a remedial action(s) responsive to detection of a data stall condition(s)/hint(s), including initiating a service recovery of the cellular interface, initiating a radio access technology (RAT) upgrade procedure, and/or initiating a handover procedure to a neighbor cell.
Variable random access channel contention resolution window in a non-terrestrial network
Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a user equipment (UE) may transmit a physical uplink shared channel (PUSCH) message associated with a random access channel (RACH) procedure to a non-terrestrial network node. The UE may monitor a physical downlink control channel (PDCCH) for a contention resolution message associated with the RACH procedure during a contention resolution window. In some aspects, the UE may start to monitor the PDCCH a variable time period after the PUSCH message is transmitted. Numerous other aspects are provided.