Patent classifications
H04W48/16
Interference Reduction in Telecommunication Networks
Various embodiments of the teachings herein include a computer-implemented method for scheduling transmissions of a plurality of data streams in a telecommunication network. The transmissions are partitioned into transmission cycles with a predetermined length in time. Repetitive transmissions of each of the data streams are transmitted based on the predetermined length multiplied by a respective repetition rate. The method includes: determining a path through the network for the transmissions of each stream; determining a shared transmission links based on a comparison of the paths, wherein each shared transmission link is part of at least two of the paths; based on a numerical optimization, determining a phase of the repetitive transmissions for each data stream, the optimization using an objective function with a value for interference between two repetitive transmissions; and scheduling the transmissions of each data stream, wherein the transmissions start at a transmission cycle associated with the respective phase.
Wireless access node fault recovery using integrated access and backhaul
A network controller monitors a wireless access node for a fault. The wireless access node experiences the fault and scans for wireless Integrated Access and Backhaul (IAB) service. The network controller detects the fault and directs a neighbor access node to deliver the wireless IAB service. The neighbor access node delivers the wireless IAB service in response to the network controller. The wireless access node detects the wireless IAB service from the neighbor access node and exchanges fault data with the network controller using the wireless IAB service delivered by the neighbor access node. The network controller exchanges the fault data with the wireless access node using the wireless IAB service delivered by the neighbor access node. An Access and Mobility Management Function (AMF) or a User Plane Function (UPF) may detect a lack of signaling or data from the wireless access node to detect the fault.
Battery efficient wireless network connection and registration for a low-power device
A client device is configured to communicate with an access point over a wireless network, exchanging data with the access point over a selected communication channel. The client device stores an identifier of the selected communication channel. After the wireless connection to the access point has ended, the client device initiates a process to reconnect to the access point over the selected communication channel using the stored identifier.
Network watermark
A network communications method utilizing a network watermark for providing security in the communications includes creating a verifiable network communications path of nodes through a network for the transfer of information from a first end node to a second end node; verifying the network communications path of nodes, by the first end node, before communicating by the first end node information intended for receipt by the second end node; and once the network communications path of nodes is verified by the first end node, communicating by the first end node, via the verified communications path of nodes, the information intended for receipt by the second end node; wherein the network watermark represents the verifiable network communications path of nodes.
Artificial intelligence radio classifier and identifier
A system whereby individual RF emitter devices are distinguished in real-world environments through deep-learning comprising an RF receiver for receiving RF signals from a plurality of individual devices; a preprocessor configured to produce complex-valued In-phase (I) and Quadrature (Q) IQ signal sample representations; a two-stage Augmented Dilated Causal Convolution (ADCC) network comprising a stack of dilated causal convolution layers and traditional convolutional layers configured to process I and Q components of the complex IQ samples; transfer learning comprising a classifier and a cluster embedding dense layer; unsupervised clustering whereby the RF signals are grouped according to a device that transmitted the RF signal; and an output identifying the individual RF emitter device whereby the individual RF emitter device is distinguished in the real-world environment.
Artificial intelligence radio classifier and identifier
A system whereby individual RF emitter devices are distinguished in real-world environments through deep-learning comprising an RF receiver for receiving RF signals from a plurality of individual devices; a preprocessor configured to produce complex-valued In-phase (I) and Quadrature (Q) IQ signal sample representations; a two-stage Augmented Dilated Causal Convolution (ADCC) network comprising a stack of dilated causal convolution layers and traditional convolutional layers configured to process I and Q components of the complex IQ samples; transfer learning comprising a classifier and a cluster embedding dense layer; unsupervised clustering whereby the RF signals are grouped according to a device that transmitted the RF signal; and an output identifying the individual RF emitter device whereby the individual RF emitter device is distinguished in the real-world environment.
Protected WiFi sensing measurements
This disclosure provides systems, methods, and apparatuses for wireless communication. In some aspects, An example method includes receiving, from a second wireless communication device, a frame associated with one or more wireless sensing measurements, verifying an integrity of the received frame associated with a message integrity code (MIC) in the received frame, and obtaining one or more wireless sensing measurements associated with the received frame.
Protected WiFi sensing measurements
This disclosure provides systems, methods, and apparatuses for wireless communication. In some aspects, An example method includes receiving, from a second wireless communication device, a frame associated with one or more wireless sensing measurements, verifying an integrity of the received frame associated with a message integrity code (MIC) in the received frame, and obtaining one or more wireless sensing measurements associated with the received frame.
System and method for identification of aggressor cells
A system and method for identifying at least one aggressor cell are described. The method comprises transmitting at least one subframe from at least one base station of a first set of base stations to a second set of base stations, wherein the at least one subframe further comprises of at least one downlink subframe, at least uplink subframe and at least one special subframe. The second set of base stations decodes the at least one received subframe, and maps each of the at least one received downlink subframe, at least one received uplink subframe and at least one received special subframe of the at least one received subframe to at least one expected subframe. Lastly, at least one aggressor cell is determined based on a mismatch of the at least one received subframe and the at least one expected subframe.
System and method for identification of aggressor cells
A system and method for identifying at least one aggressor cell are described. The method comprises transmitting at least one subframe from at least one base station of a first set of base stations to a second set of base stations, wherein the at least one subframe further comprises of at least one downlink subframe, at least uplink subframe and at least one special subframe. The second set of base stations decodes the at least one received subframe, and maps each of the at least one received downlink subframe, at least one received uplink subframe and at least one received special subframe of the at least one received subframe to at least one expected subframe. Lastly, at least one aggressor cell is determined based on a mismatch of the at least one received subframe and the at least one expected subframe.