H04W88/18

COMMUNICATION SYSTEM AND METHOD FOR HIGH-RELIABILITY LOW-LATENCY WIRELESS CONNECTIVITY IN MOBILITY APPLICATION

A communication system includes a central cloud server and a processor that periodically obtains sensing information from an edge device that is in motion at a travel path. The processor predicts formed whether an existing cellular connectivity of the edge device is about to become less than a threshold performance value, based on the obtained sensing information. If the existing cellular connectivity of the edge device is about to become less than the threshold performance value, an alternative wireless connectivity option is triggered at the edge device bypassing an initial access-search at the edge device to maintain the cellular connectivity.

POLICY ENFORCEMENT ACROSS WIRELESS COMMUNICATION NETWORKS OVER APPLICATION FUNCTIONS
20230077026 · 2023-03-09 ·

A wireless communication network delivers policy enforcement to a wireless user device in another wireless communication network. The wireless communication network wirelessly serves the wireless user device based on a policy. The wireless communication network determines when the wireless user device is visiting the other wireless communication network, and in response, selects the policy for the wireless user device. The wireless communication network transfers the selected policy for the wireless user device to the other wireless communication network. The other wireless communication network receives and enforces the selected policy for the wireless user device.

POLICY ENFORCEMENT ACROSS WIRELESS COMMUNICATION NETWORKS OVER APPLICATION FUNCTIONS
20230077026 · 2023-03-09 ·

A wireless communication network delivers policy enforcement to a wireless user device in another wireless communication network. The wireless communication network wirelessly serves the wireless user device based on a policy. The wireless communication network determines when the wireless user device is visiting the other wireless communication network, and in response, selects the policy for the wireless user device. The wireless communication network transfers the selected policy for the wireless user device to the other wireless communication network. The other wireless communication network receives and enforces the selected policy for the wireless user device.

METHODS AND SYSTEMS FOR NETWORK SLICE SUBNET CAPABILITY MANAGEMENT

Embodiments herein disclose methods and systems for managing capabilities of network slice subnets in fifth generation (5G) communication networks. The network slice management function (NSMF) queries the existing network slice subnet's capabilities to determine if the existing network slice subnet can satisfy a network slice requirement. The NSMF receives the capability information of the existing network slice subnet by sending a request to the network slice subnet management function (NSSMF). The capability information of the existing network slice subnet is stored in at least one attribute of an information object class (IOC), wherein the IOC is created by the NSSMF.

Systems and Methods for Proxying Real Traffic for Simulation
20230126496 · 2023-04-27 ·

Methods, systems, and non-transitory computer readable media for validating a simulated component of a communication network using real traffic. More particularly, a simulator instantiates a simulation environment that includes a base station module, a user equipment (UE) module, and a simulated communication link therebetween. Real traffic generated by a non-simulated UE is sent to a proxy that routes the traffic to the UE module. As a result, test software instated in the simulation environment can be validated using traffic generated by a non-simulated UE.

Discontinuous reception (DRX) enhancements in LTE systems
11638170 · 2023-04-25 · ·

Embodiments of a system and method for providing DRX enhancements in LTE systems are generally described herein. In some embodiments, a system control module is provided for controlling communications via a communications interface. A processor is coupled to the system control module and is arranged to implement an inactivity timer and an on-duration timer for determining an active time for monitoring subframes on the physical downlink control channel for control signals, the processor further monitoring subframes after the active time.

Memory architecture of a near-field communication device

A near-field communication device operates to transmit data by near-field communications techniques to another device. The near-field communication device includes a memory that stores a message to be transmitted in an ASCII format. The message is retrieved from the memory and transmitted using the near-field communications techniques in an ASCII format.

Systems and methods for securely monitoring a shipping container for an environmental anomaly

Systems and methods are described for securely monitoring a shipping container for an environmental anomaly using elements of a wireless node network of sensor-based ID nodes disposed within the container and a command node associated with the container. The method has the command node identifying which of the ID nodes are confirmed as trusted sensors based upon a security credential specific to each of the ID nodes; monitoring only the confirmed ID nodes for sensor data broadcast those ID nodes; detecting the anomaly based upon the sensor data from at least one of the confirmed ID nodes; automatically generating an alert notification related to the detected environmental anomaly for the shipping container; and transmitting the alert notification to the external transceiver to initiate a mediation response related to the detected environmental anomaly.

Network resource function supporting multi-region querying

A system, e.g., associated with a telecommunications network, includes first and second registry devices. In some examples, the first registry device receives a registration message. The second registry device receives a query specifying a type (NFType) of a network function and forwards the query to the first registry device based at least in part on the NFType. The first registry device responds, and the second registry device forwards the response. In some examples, the query specifies a service class and the second registry device forwards the query based at least in part on the service class. In some examples, the first registry device sends an indication of the registration to the second registry device, and the second registry device responds to the query based at least in part on the received indication and on at least one of an NFType or a service class of the query.

Methods and systems for intelligent AMF assignment to minimize re-direction

A method, a system, and a non-transitory storage medium are described in which an access and mobility management function (AMF) assignment service is provided. A network device receives an assignment policy for selecting an AMF from a group of available AMFs, wherein the assignment policy includes network slice priorities for available network slices in the RAN; stores the assignment policy; receives, during a registration procedure initiated by an end device, Network Slice Selection Assistance Information (NSSAI); identifies, from the NSSAI, multiple single-NSSAIs (S-NSSAIs); and selects, based on the assignment policy, an AMF for a highest priority S-NSSAI, of the multiple S-NSSAIs.