Patent classifications
H04W36/16
Spectrum sharing based on self-organizing networks
Embodiments use the principles of self-organizing networks to allocate resources to allow spectrum owners to share spectrum with wireless carriers according to defined license conditions. A spectrum licensee holds the licensing conditions of the spectrum licensed by the spectrum owners. This licensed spectrum is referred to as secondary spectrum. A self-organizing network server requests access to secondary spectrum. The spectrum licensee grants access to the secondary spectrum along with the licensing conditions for access. The self-organizing network server monitors the conditions associated with the license and/or delegates the responsibility for monitoring conditions associated with the license to others. When the license conditions are met, enhanced Node B systems may begin using the secondary spectrum according to the license conditions. When the license conditions are no longer met, enhanced Node B systems discontinue use of the secondary spectrum.
Backhaul and fronthaul communications in a wireless mesh network
Adjusting backhaul and fronthaul communication links of wireless mesh networks are described. In one aspect, characteristics of network data packets transmitted within a wireless mesh network can be identified. Based on those characteristics, fronthaul communication links and/or backhaul communication links can be adjusted.
Intruder detection using a wireless service mesh network
The disclosed teachings relate to intruder detection. Some of the subject matter described herein includes a computer-implemented method for detecting physical movement using a wireless mesh network that provides wireless data communication, the wireless mesh network having a plurality of mesh points, each mesh point having a wireless coverage, the method including compiling a database of known devices based on monitoring unique identifiers of known devices that have previously conducted communication with the wireless mesh network through the plurality of mesh points; upon detecting a physical presence of a subject device within a physical space of the wireless mesh network, determining, based on the database of known devices, whether the physical presence of the subject device belongs to an anomaly; and when the physical presence of the subject device is determined to be an anomaly, causing a security action to be performed.
Equalized data latency for user applications in a wireless data network
A wireless data network equalizes latency for a user application. A source application controller exchanges application data with user communication devices over source wireless access points for a user application session. The source application controller maintains equalized latency within a latency window on the application data exchanges. The source application controller identifies a handover event for a user communication device and determines if the equalized latency can be maintained. The source application controller hands over the application session to a target application controller when the equalized latency cannot be adequately maintained within the latency window. The target application controller then exchanges application data with the user communication devices over the wireless access points for the user application session. The target application controller maintains equalized latency within another latency window on the subsequent application data exchanges for the user application session.
DECENTRALIZED BASE STATION LOAD BALANCING AND POWER
A method and base station for distributing wireless device traffic load in a wireless communication system having a plurality of base stations are provided. A method includes determining a wireless device traffic load on a serving base station of the plurality of base stations. The method also includes determining a priority for each of a plurality of target base stations of the plurality of base stations, the priority being based at least in part on a number of wireless devices being served by the serving base station that receive a signal from a corresponding target base station that exceeds a threshold. The method further includes determining whether to change the load of the serving base station and sending a load change request to a target base station having a highest priority based on a comparison of the load on the serving base station to a load change threshold.
METHOD AND DEVICE FOR TRANSMITTING SYSTEM INFORMATION, USER EQUIPMENT AND NETWORK DEVICE
A method and a device for transmitting system information, a UE and a network device are provided. The method includes: acquiring scheduling information transmitted from a network device; determining a transmission subframe scheduled by the network device for the system information in accordance with the scheduling information, the system information including first system information and/or second system information, the first system information being system information of a first type, the second system information being system information of a second type; and receiving the system information transmitted from the network device within the transmission subframe.
METHOD AND DEVICE FOR TRANSMITTING SYSTEM INFORMATION, USER EQUIPMENT AND NETWORK DEVICE
A method and a device for transmitting system information, a UE and a network device are provided. The method includes: acquiring scheduling information transmitted from a network device; determining a transmission subframe scheduled by the network device for the system information in accordance with the scheduling information, the system information including first system information and/or second system information, the first system information being system information of a first type, the second system information being system information of a second type; and receiving the system information transmitted from the network device within the transmission subframe.
Cell Handover Method, Apparatus, and System
A cell handover method, apparatus, and system, where the cell handover method includes receiving, by a mobile edge computing (MEC) server, status information of a mobile terminal from a source cell, where the status information includes location information and speed information, determining, by the MEC server, a target cell based on the status information, where the MEC server serves the target cell, the target cell is neighboring to the source cell, and coverage of the target cell partially overlaps coverage of the source cell, and sending, by the MEC server, an identifier of the target cell to the mobile terminal using the source cell. According to the cell handover method, apparatus, and system provided in this application, cell handover is controlled using the MEC server to improve efficiency of the cell handover.
INTER BASE STATION HANDOVER METHOD, RADIO COMMUNICATION SYSTEM, DRX CONTROL METHOD, BASE STATION, AND COMMUNICATION TERMINAL
A DRX control method and system includes receiving, from a source base station for transferring the UE from the source base station to a target base station, a plurality of configurations including: a first configuration of a first Discontinuous Reception (DRX) cycle, a second configuration of a second DRX cycle, and a first timer counting a period in the first DRX cycle to shift from the first DRX cycle to the second DRX cycle; performing, in a state of RRC Radio Resource Control (RRC) connected with the target base station, DRX operation with the first DRX cycle; and performing, in a state of RRC connected with the target base station, the DRX operation with the second DRX cycle when the UE does not receive data from the target base station until the first timer expires in the first DRX cycle.
Transmission of signaling indication for intra-UE punctured uplink transmissions
A method is provided including configuring, by a network node, a set of resources to be used by at least one user equipment for transmitting a first type of uplink data; receiving from the at least one user equipment information that indicates that at least one resource in the set of resources comprises a second type of uplink data different than the first type of uplink data; and decoding data received on the at least one resource based on the information.