H04J3/08

Uninterrupted transmission of internet protocol transmissions during endpoint changes

Facilitating uninterrupted transmission of internet protocol (IP) transmissions during endpoint changes is disclosed. When an IP transmission is received at a first relay port or a second relay port, a call record having the first relay port identifier or the second relay port identifier matching a destination port identifier in the IP transmission is located. When the destination port identifier matches the first relay port identifier of the record, a source IP address identifier and a source port identifier from the IP transmission are set as a first entity IP address identifier and first entity port identifier, respectively, of the record when the first entity IP address identifier and first entity port identifier do not match the source IP address identifier and source port identifier respectively and a received IP session identifier in the IP transmission matches the first entity session identifier. A similar procedure is followed to set a second entity IP address identifier and port identifier.

Method for transmitting service data, terminal, and base station
09999048 · 2018-06-12 · ·

Embodiments of the present disclosure provide a method for transmitting service data, a terminal, and a base station. The method includes: a terminal sends a transmission attribute of the terminal to a base station, wherein the transmission attribute of the terminal is used for a determination of a transmission time interval (TTI) bundling transmission policy of the terminal; receives a TTI bundling transmission indication from the base station; determines a TTI bundling transmission policy of the terminal according to the transmission attribute of the terminal; and sends service data to the base station in a TTI bundling transmission manner according to the TTI bundling transmission policy of the terminal. Technical solutions provided in the embodiments of the present disclosure are used to enlarge coverage of medium-data rate and high-data rate services.

Permutated Ring Network
20180145850 · 2018-05-24 ·

A permutated ring network includes a plurality of bi-directional source-synchronous ring networks, each having a plurality of data transport stations, and a plurality of communication nodes. Each of the communication nodes is coupled to one of the data transport stations in each of the plurality of bi-directional source-synchronous ring networks.

Contention-free mobile access for handover to a relay base station with wireless backhaul

A method and system for handover of a wireless communication device (WCD) from a source base station to a target base station that is a relay base station. The source base station may engage in procedure to handover the WCD to the target base station. A determination may be made as to whether or not the target base station is a relay base station with a wireless backhaul. If the target base station is determined to be a relay base station with a wireless backhaul, then the source base station may transmit to the WCD on an air interface a message containing a particular identifier for use by the WCD in a contention-free random access request to the source base station. In the event that the handover fails, the WCD may make a contention-free random access request to the source base station to regain access through the source base station.

PROTECTION PATH DETERMINATION METHOD AND DEVICE BASED ON RESILIENT OPTICAL NETWORK
20180102864 · 2018-04-12 ·

A protection path determination method and apparatus based on an elastic optical network are provided. The method includes: searching a virtual working topology for a virtual working link satisfying a condition on receipt of a routing request of a target service; updating a residual bandwidth of the virtual working link if the virtual working link is found; otherwise, creating a working link for the target service and creating a virtual working link in the virtual working topology; searching a virtual protection topology for a virtual protection link satisfying a condition according to a shared path protection mechanism; updating a residual bandwidth of the virtual protection link if the virtual protection link is found; otherwise, creating a protection link for the target service according to the shared path protection mechanism and creating a virtual protection link in the virtual protection topology.

PACKETIZATION WITHIN MULTI-STREAM WIRELINE-WIRELESS PHYSICALLY CONVERGED ARCHITECTURES
20240388374 · 2024-11-21 · ·

Embodiments of the present invention provide systems, devices and methods for multiplexing a plurality of streams into a multi-stream signal and demultiplexing a multi-stream signal into a plurality of streams within a wireline-wireless architecture. In certain examples, multi-stream signals are generated for transmission onto a wireline segment coupled to a wireless segment. In other examples, multi-stream signals are generated from wireless signals and transmitted onto a wireline segment.

PACKETIZATION WITHIN MULTI-STREAM WIRELINE-WIRELESS PHYSICALLY CONVERGED ARCHITECTURES
20240388374 · 2024-11-21 · ·

Embodiments of the present invention provide systems, devices and methods for multiplexing a plurality of streams into a multi-stream signal and demultiplexing a multi-stream signal into a plurality of streams within a wireline-wireless architecture. In certain examples, multi-stream signals are generated for transmission onto a wireline segment coupled to a wireless segment. In other examples, multi-stream signals are generated from wireless signals and transmitted onto a wireline segment.

Selection of a proxy device for a network

Multiple devices in a user's premises may each be configured to separately communicate with an external network, but the signal strength available to each may vary significantly depending on the wiring of the premises. The disclosure provides methods wherein the various devices may coordinate with one another, and determine which among them has the best signal connection and the most available capacity, and a subset of the devices may be chosen to act as network proxies to relay communications to/from the other devices in the premises.

Service scheduling method and base station
09924535 · 2018-03-20 · ·

Embodiments disclose a service scheduling method and a base station. The method includes reporting, by a Medium Access Control (MAC) entity of a carrier, bearer information of the carrier to a Radio Link Control RLC entity; and allocating, by the RLC entity, service data and control information to the carrier, and sending the service data and the control information to a data buffer of the carrier. The method also includes determining, by the MAC entity, a user equipment that needs to be scheduled, and acquiring the service data and the control information from the data buffer; and performing, by the MAC entity, RLC packet assembly and MAC packet assembly on the service data, and sending the service data experiencing the packet assembly to the user equipment.

Mobile relay, and method for enhancing and processing X2 interface proxy
09894574 · 2018-02-13 · ·

The embodiments of the present document disclose a mobile relay, and a method for enhancing and processing an X2 interface proxy. The method for enhancing an X2 interface proxy comprises: triggering an X2 proxy to relocate from a first node to a second node, or triggering to set up an X2 interface between a third node and the second node; and using the second node as an X2 proxy of the third node and a base station adjacent to the third node.