H04L45/121

PACKET BUFFERING WITH A COMMON TIME-INDEXED DATA STORE ACROSS PACKET STREAMS
20230216794 · 2023-07-06 ·

Receiving, by a network device at a receiving time, one or more packets, each packet being one of a plurality of ordered packets in one of a plurality of streams received at the network device. Determining, by the network device for each received packet, a transmit time based on one timer common to the plurality of streams. Indexing, by the network device in a data store common to the plurality of streams, each packet by the determined transmit time. Transmitting, by the network device at each particular time corresponding to a determined transmit time, all packets in the data store indexed to the particular time.

EFFICIENT MECHANISM FOR THE TRANSMISSION OF MULTIPATH DUPLICATE PACKETS
20230216804 · 2023-07-06 ·

The method, in some embodiments, aggregates duplicate transmission control protocol (TCP) packets of a data stream duplicated and sent over disjoint routing paths. Each duplicate pair of packets includes a packet sequence number unique to that duplicate pair. The method iteratively (1) generates a window of packet sequence numbers for the data stream starting with a lowest packet sequence number, of the data stream, that has not been received, (2) receives a TCP packet sent over one of a first routing path and a second, disjoint routing path. If the packet sequence number of the received TCP packet is outside the window or is a duplicate of a previously received TCP packet, the method drops the received TCP packet. If the packet sequence number of the received TCP packet is within the window and is not a duplicate of a previously received TCP packet, the method stores the received packet.

EFFICIENT MECHANISM FOR THE TRANSMISSION OF MULTIPATH DUPLICATE PACKETS
20230216804 · 2023-07-06 ·

The method, in some embodiments, aggregates duplicate transmission control protocol (TCP) packets of a data stream duplicated and sent over disjoint routing paths. Each duplicate pair of packets includes a packet sequence number unique to that duplicate pair. The method iteratively (1) generates a window of packet sequence numbers for the data stream starting with a lowest packet sequence number, of the data stream, that has not been received, (2) receives a TCP packet sent over one of a first routing path and a second, disjoint routing path. If the packet sequence number of the received TCP packet is outside the window or is a duplicate of a previously received TCP packet, the method drops the received TCP packet. If the packet sequence number of the received TCP packet is within the window and is not a duplicate of a previously received TCP packet, the method stores the received packet.

METHOD FOR INFORMATION TRANSMISSION AND DEVICE
20220408450 · 2022-12-22 ·

The present disclosure relates to a pre-5.sup.th-Generation (5G) or 5G communication system to be provided for supporting higher data rates Beyond 4.sup.th-Generation (4G) communication system such as Long Term Evolution (LTE).

An embodiment of the present application provides a method for information transmission and device. The method is applied to a first node. The method includes: obtaining, from a second node, a latency requirement of information to be forwarded and the information to be forwarded; and forwarding, to a third node, the information to be forwarded according to the latency requirement of information to be forwarded. In the present application the first node forwards the information to be forwarded to the third node according to the latency requirement of the information to be forwarded, thereby satisfying the needs of services with higher latency requirements.

Provided is a method and device for transmitting a PUSCH. The method for transmitting the PUSCH includes: performing a predetermined measurement; determining parameters for transmitting the PUSCH according to a measurement result of the predetermined measurement; and transmitting the PUSCH based on the parameters for transmitting the PUSCH, thus adjustment of the PUSCH transmission parameters and improved performance of the PUSCH can be achieved.

Method and system for dynamic traffic distribution and bi-casting in a hybrid network environment

A method, apparatus and computer program product are provided in accordance with example embodiments in order to provide for the efficient, dynamic distribution of traffic in a hybrid network environment based at least in part on reliability probabilities associated with individual subflows within the network. In some example implementations, a traffic distribution entity provides for control over the determination of combined reliability probabilities of multiple potential traffic distribution modes and the selection of a traffic distribution mode that is capable of meeting performance targets, such as those associated with mission-critical operations of cyber-physical systems.

Method and system for dynamic traffic distribution and bi-casting in a hybrid network environment

A method, apparatus and computer program product are provided in accordance with example embodiments in order to provide for the efficient, dynamic distribution of traffic in a hybrid network environment based at least in part on reliability probabilities associated with individual subflows within the network. In some example implementations, a traffic distribution entity provides for control over the determination of combined reliability probabilities of multiple potential traffic distribution modes and the selection of a traffic distribution mode that is capable of meeting performance targets, such as those associated with mission-critical operations of cyber-physical systems.

Energy-balanced and latency-constrained routing methods in wireless network

A method of operating an access control system comprising a plurality of access controls, the method comprising: determining an energy metric of each of the plurality of access controls; determining a latency metric of each of the plurality of access controls; transmitting the energy metric of each of the plurality of access controls; transmitting the latency metric of each of the plurality of access controls; collecting the energy metric and the latency metric at a head node or collecting energy metric at each of the plurality of access controls from a 1-hop transmission distance; and determining a data route through the plurality of access controls in response to the energy metric of each of the plurality of access controls and the latency metric of each of the plurality of access controls.

Energy-balanced and latency-constrained routing methods in wireless network

A method of operating an access control system comprising a plurality of access controls, the method comprising: determining an energy metric of each of the plurality of access controls; determining a latency metric of each of the plurality of access controls; transmitting the energy metric of each of the plurality of access controls; transmitting the latency metric of each of the plurality of access controls; collecting the energy metric and the latency metric at a head node or collecting energy metric at each of the plurality of access controls from a 1-hop transmission distance; and determining a data route through the plurality of access controls in response to the energy metric of each of the plurality of access controls and the latency metric of each of the plurality of access controls.

On-demand network configuration of V2X UE autonomy in new radio mobile communications
11516631 · 2022-11-29 · ·

Various examples and schemes pertaining to on-demand network configuration of vehicle-to-everything (V2X) user equipment (UE) autonomy in New Radio (NR) mobile communications are described. An apparatus implemented in a first user equipment (UE) receives a signaling from a network node of a wireless network. Based on the signaling, the apparatus operates simultaneously in a network-controlled mode and an autonomous mode such that: (a) the first UE operates in the network-controlled mode with respect to resource allocation on a first sidelink with a second UE, and (b) the first UE operates in the autonomous mode with respect to resource allocation on a second sidelink with the second UE or a third UE.

On-demand network configuration of V2X UE autonomy in new radio mobile communications
11516631 · 2022-11-29 · ·

Various examples and schemes pertaining to on-demand network configuration of vehicle-to-everything (V2X) user equipment (UE) autonomy in New Radio (NR) mobile communications are described. An apparatus implemented in a first user equipment (UE) receives a signaling from a network node of a wireless network. Based on the signaling, the apparatus operates simultaneously in a network-controlled mode and an autonomous mode such that: (a) the first UE operates in the network-controlled mode with respect to resource allocation on a first sidelink with a second UE, and (b) the first UE operates in the autonomous mode with respect to resource allocation on a second sidelink with the second UE or a third UE.