Patent classifications
H04W40/34
METHOD FOR DETERMINING LINK AVAILABILITY FOR IAB NODE, AND NODE USING SAME
The present specification provides a method for receiving gap symbol information, the method being performed by a node in a wireless communication system. The method is characterized by including: receiving the gap symbol information, wherein the gap symbol information indicates the number of gap symbols pertaining to switching between a mobile terminal (MT) operation and a distributed unit (DU) operation; and performing an integrated access and backhaul (IAB) operation on the basis of the gap symbol information, wherein the node does not perform the IAB operation on the symbol indicated by the gap symbol information.
METHOD FOR DETERMINING LINK AVAILABILITY FOR IAB NODE, AND NODE USING SAME
The present specification provides a method for receiving gap symbol information, the method being performed by a node in a wireless communication system. The method is characterized by including: receiving the gap symbol information, wherein the gap symbol information indicates the number of gap symbols pertaining to switching between a mobile terminal (MT) operation and a distributed unit (DU) operation; and performing an integrated access and backhaul (IAB) operation on the basis of the gap symbol information, wherein the node does not perform the IAB operation on the symbol indicated by the gap symbol information.
METHOD AND APPARATUS FOR DETERMINING TERMINAL POLICY BEHAVIOR, AND NETWORK DEVICE
A method for determining a User Equipment (UE) policy behavior includes: a first network element acquires at least one of the following information: first information sent by UE, second information sent by a Policy Control Function (PCF), third information sent by a Session Management Function (SMF) or fourth information sent by an application server; and the first network element determines, according to the at least one of the information, a UE policy behavior performed by the UE.
METHOD AND APPARATUS FOR DETERMINING TERMINAL POLICY BEHAVIOR, AND NETWORK DEVICE
A method for determining a User Equipment (UE) policy behavior includes: a first network element acquires at least one of the following information: first information sent by UE, second information sent by a Policy Control Function (PCF), third information sent by a Session Management Function (SMF) or fourth information sent by an application server; and the first network element determines, according to the at least one of the information, a UE policy behavior performed by the UE.
Route Configuration Method and Apparatus
This application provides a route configuration method and an apparatus, and relates to the field of communications technologies. The method includes: After a first terminal moves out of a service scope of a UPF that currently provides a service for the first terminal, a first SMF inserts a first I-UPF into a user plane path of the first terminal, and configures, for the first I-UPF, a first routing rule corresponding to a second terminal. The first routing rule is used to send a packet whose destination address information is address information of the second terminal to a second A-UPF. Therefore, a packet whose destination address information is the address information of the second terminal can be directly forwarded by the first I-UPF to the first A-UPF, instead of being forwarded by the first I-UPF to the second A-UPF through the first A-UPF.
Server-based notification of alarm event subsequent to communication failure with armed security system
A server-based environment for reporting a status of a security, monitoring and automation controller is provided. Detecting cessation of an always-on persistent network connection between the SMA controller and the server is also provided. Reporting the cessation of the network connection to an end user and defined others is further provided. A further aspect provides for automatically reporting an alarm event to a central station, the end user, and others, in the event the cessation of the network connection occurs while the SMA controller is aimed and after a zone fault event, and not receiving a disarm notification prior to expiration of a preset entry delay.
Server-based notification of alarm event subsequent to communication failure with armed security system
A server-based environment for reporting a status of a security, monitoring and automation controller is provided. Detecting cessation of an always-on persistent network connection between the SMA controller and the server is also provided. Reporting the cessation of the network connection to an end user and defined others is further provided. A further aspect provides for automatically reporting an alarm event to a central station, the end user, and others, in the event the cessation of the network connection occurs while the SMA controller is aimed and after a zone fault event, and not receiving a disarm notification prior to expiration of a preset entry delay.
SMART CASCADING SECURITY FUNCTIONS FOR 6G OR OTHER NEXT GENERATION NETWORK
In a 6G network, microservices can be utilized in the absence of a core network. For example, after a mobile device has authenticated, through its carrier network, with a transport service layer, microservices can be allocated to the mobile device without having to be transmitted via the core network. Thus, removing the core network from the process can generate a direct line of microservices from the transport layer to the end-user. Furthermore, additional microservices and/or resources can be access through a microservices library. Consequently, packets can be securely transmitted be a wireless network facilitating sending packet profile data from one to many node devices in anticipation of the packet traversing the various node devices.
SMART CASCADING SECURITY FUNCTIONS FOR 6G OR OTHER NEXT GENERATION NETWORK
In a 6G network, microservices can be utilized in the absence of a core network. For example, after a mobile device has authenticated, through its carrier network, with a transport service layer, microservices can be allocated to the mobile device without having to be transmitted via the core network. Thus, removing the core network from the process can generate a direct line of microservices from the transport layer to the end-user. Furthermore, additional microservices and/or resources can be access through a microservices library. Consequently, packets can be securely transmitted be a wireless network facilitating sending packet profile data from one to many node devices in anticipation of the packet traversing the various node devices.
METHOD AND APPARATUS FOR PERFORMING ROUTING BASED ON FLOW CONTROL FEEDBACK BY IAB NODE IN WIRELESS COMMUNICATION SYSTEM
The present disclosure relates to a method of transmitting a packet by an Integrated Access and Backhaul (IAB) node in a wireless communication system. In particular, the method includes the steps of: receiving, from a first node, an indication indicating that a congestion problem occurs between the first node and a second node; if the packet is to be transmitted to other node via the first node, transmitting the packet to the first node; and if the packet is to be transmitted to the second node via the first node, transmitting the packet to a third node.