H04L47/74

Radio communications
11457423 · 2022-09-27 · ·

A radio receiver device is arranged to store samples of incoming data symbols in an indexed memory portion having a length of A+B+C. A first data buffer 20-1 has an initial address at index 0 and a final address at index A-1. A timing adjustment buffer 22 has an initial address at index A and a final address at index A+B−1. A second data buffer 20-2 has an initial address at an index A+B and a final address at an index A+B+C−1. A buffer switch pointer 24 has a trigger address between the index 0 and the index A+B−1, at which it triggers a switch 26 from the first to the second buffer. If the current address matches the trigger address, the current address is set to the index A+B. Otherwise, the current address is incremented. If there is a timing offset between local and network clocks, the trigger address is moved to reduce the offset.

Radio communications
11457423 · 2022-09-27 · ·

A radio receiver device is arranged to store samples of incoming data symbols in an indexed memory portion having a length of A+B+C. A first data buffer 20-1 has an initial address at index 0 and a final address at index A-1. A timing adjustment buffer 22 has an initial address at index A and a final address at index A+B−1. A second data buffer 20-2 has an initial address at an index A+B and a final address at an index A+B+C−1. A buffer switch pointer 24 has a trigger address between the index 0 and the index A+B−1, at which it triggers a switch 26 from the first to the second buffer. If the current address matches the trigger address, the current address is set to the index A+B. Otherwise, the current address is incremented. If there is a timing offset between local and network clocks, the trigger address is moved to reduce the offset.

Mail Obtaining Method, Terminal, and System
20170257323 · 2017-09-07 ·

A method resolves a problem of a slow mail downloading speed caused by a fact that an existing dual-mode dual-pass terminal cannot effectively utilize a network resource. The method includes obtaining a first transmission rate of a first network connection and a second transmission rate of a second network connection, obtaining a new mail list from a mail server, where the new mail list includes identifiers (IDs) of N mails and a data size of each mail in the N mails, creating a first download task and a second download task according to a preset rule, the first transmission rate, the second transmission rate, and the new mail list such that download time of the N mails is the shortest, downloading a mail indicated by the first download task using the first network connection, and downloading a mail indicated by the second download task using the second network connection.

BACKGROUND DATA TRAFFIC DISTRIBUTION OF MEDIA DATA
20220239601 · 2022-07-28 ·

An example device for retrieving media data includes a memory configured to store media data; and one or more processors implemented in circuitry and configured to: send a request to retrieve media data according to a background data transfer to a media streaming application function (AF); in response to the request, receive an indication of a background data transfer opportunity from the media streaming AF; in response to the indication of the background data transfer opportunity, retrieve the media data according to the background data transfer; and store the retrieved media data to the memory.

TECHNOLOGIES FOR PROVIDING HARDWARE RESOURCES AS A SERVICE WITH DIRECT RESOURCE ADDRESSABILITY

Technologies for providing hardware resources as a service with direct resource addressability are disclosed. According to one embodiment of the present disclosure, a device receives a request to access a destination accelerator device in an edge network, the request specifying a destination address assigned to the destination accelerator device. The device determines, as a function of the destination address, a location of the destination accelerator device and sends the request to the destination accelerator device.

MACHINE-LEARNING INFUSED NETWORK TOPOLOGY GENERATION AND DEPLOYMENT
20210392049 · 2021-12-16 · ·

Techniques are described herein for deploying, monitoring, and modifying network topologies comprising various computing and network nodes deployed across multiple workload resource domains. A deployment system may receive operational data from a network topology deployed across multiple workload resource domains, such as public or private cloud computing environments, on-premise data centers, and the like. The operational data may be provided to a trained machine-learning model, and output from the trained model may be used, along with constraint inputs and resource inventories of the workload resource domains, to determine updated topology models which may be deployed within the workload resource domains.

Method for reporting channel state information in wireless access system supporting unlicensed bands, and apparatus supporting same

A method for transmitting channel state information (CSI) by a user equipment in a wireless communication system is discussed. The method includes receiving a transmission burst; measuring the CSI based on the transmission burst; and transmitting the measured CSI, wherein the transmission burst is received in at least a first time resource and a second time resource, wherein the first time resource is configured as a first number of orthogonal frequency divisional multiplexing (OFDM) symbols, wherein the second time resource is configured as a second number of OFDM symbols, wherein the first number is smaller than the second number, and wherein the first time resource is considered to be an invalid time resource for the CSI.

NON-ACCESS STRATUM CONGESTION INDICATIONS

Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a user equipment (UE) may receive, from a network, a procedure rejection message for non-cellular access at a non-access stratum (NAS) layer, and provide a first congestion indication from the NAS layer to lower layers for non-cellular access based at least in part on the receiving the procedure rejection message. The UE may refrain, at the lower layers, from initiating establishment of a signaling connection based at least in part on the first congestion indication. Numerous other aspects are provided.

Failover management using availability groups

Techniques for failover management using availability groups are described. According to some embodiments, customers can define one or more availability groups within their infrastructure. Each availability group may be associated with one or more rules which describe how the availability group should fail over. The availability group definition may define the resources included in the availability group, a target region to fail over to, and capacity reservations for the availability group in the target region. In some embodiments, the definition may also include a replication frequency for storage resources which defines how often data is backed up. Once a customer as created an availability group the customer is then able to either create resources in that availability group or associate already existing resources with the availability group. An availability group management service can ensure that data, capacity reservations and network infrastructure are defined and/or replicated to the target location.

Dynamic visualization of requests traveling through a microservice mesh
11368408 · 2022-06-21 · ·

A method includes, in response to receiving a request for a graphical visualization of a microservice mesh comprising one or more nodes, obtaining information associated with services operating at the one or more nodes and connections between the one or more nodes. The method further includes determining, in view of the information, one or more types of requests associated with each of the services. The method further includes generating the graphical visualization of the microservice mesh. The graphical visualization includes a first vertex corresponding to a particular service and a second vertex corresponding to a type of a request received by the service. The first vertex and second vertex are connected by an edge that corresponds to the request.