H04W28/0215

Dedicated core networks (DCN) selection

The invention provides for a method of selecting a Dedicated Core Network (DCN) based on assisting indication by mobile terminals, and including the step of configuring the RAN Nodes of the mobile network with the DCN Types of the serving EPC Nodes so that the RAN Nodes can map the DCN selection assisting information from the connecting mobile terminals with the right dedicated EPC Node. This allows for the RAN Node to connect the mobile terminals with EPC Node of the mobile terminal's dedication at initial attach and then keep the mobile terminals on the same DCN. Thus, a re-routing of mobile terminals NAS message from one EPC Node to another EPC node is avoided. The invention also allows for a flexible and dynamic change of the EPC Nodes dedication based on operator's configuration and policy. Additionally, the invention allows for DCN access restriction control by broadcasting of the supported DCN Types by the RAN Node.

METHOD AND DEVICE OF COORDINATING TRANSMISSION TIME OF V2X MESSAGE
20230007525 · 2023-01-05 ·

A method of coordinating a transmission time of V2X message includes: acquiring, by an application layer module of a V2X device, an ideal time point at which an underlying layer module of the V2X device schedules to transmit the V2X message, the application layer module being configured to manage V2X application scenario and the underlying layer module being configured to manage V2X radio frequency function; determining a processing period for processing the V2X message; determining a waiting period based on the ideal time point and the processing period; transmitting, from the application layer module to the underlying layer module, a message transmission request after elapse of the waiting period from acquiring of the ideal time point; and in response to a reception of the message transmission request in the underlying layer module, transmitting, using the underlying layer module, the V2X message toward outside at the ideal time point.

Access barring method and apparatus and communication system
11546834 · 2023-01-03 · ·

An access barring method and apparatus and a communication system. The method includes: performing access barring check or access class determination by UE by using parameters defined for a new radio system. The parameters are applicable to all radio resource control (RRC) states. For different public land mobile networks (PLMNs) and/or network slicing, the parameters are identical or different. With the embodiments of this disclosure, selectable parameters are provided for a uniform access control mechanism defined by an NR system, thereby simplifying an access mechanism, and ensuring all-directional compatibility of a terminal state.

DEMODULATOR REPORT FOR SMART RECEIVER POWER OPTIMIZATION
20220416854 · 2022-12-29 ·

Certain aspects of the present disclosure provide techniques for wireless communications by a user equipment (UE). The UE implements the technique to transmit to a network entity a report that includes an indication of a desired demodulator or precoding per precoding resource block group (PRG) for a group of one or more PRGs. The UE then demodulates downlink (DL) transmissions, transmitted from the network entity on the group of one or more PRGs, in accordance with the indication included in the report.

Method for determining timing of transmission, network node, and computer program

A network node is arranged to operate in a cell of a cellular communication system. The network node includes an interface towards the cellular communication system where the interface is arranged to receive paging information for an idle user equipment, UE, a paging handler arranged to determine a mode of power saving for the UE, and to determine timing for a wake-up signal based on the determined mode and the received paging information, and a transmitter arranged to transmit the wake-up signal at the determined timing. A method of the network node includes receiving paging information for an idle user equipment, UE, from the cellular communication system, determining a mode of power saving for the UE, determining timing for a wake-up signal based on the determined mode and the received paging information, and transmitting the wake-up signal at the determined timing.

Zero-Trust Enabled Workload Access for User Equipment
20220408255 · 2022-12-22 ·

The present disclosure relates to systems and methods for cloud-based 5G security network architectures intelligent steering, workload isolation, identity, and secure edge steering. Specifically, various approaches are described to integrate cloud-based security services into Multiaccess Edge Compute servers (MECs). That is, existing cloud-based security services are in line between a UE and the Internet. The present disclosure includes integrating the cloud-based security services and associated cloud-based system within service provider's MECs. In this manner, a cloud-based security service can be integrated with a service provider's 5G network or a 5G network privately operated by the customer. For example, nodes in a cloud-based system can be collocated within a service provider's network, to provide security functions to 5G users or connected by peering from the cloud-based security service into the 5G service provider's regional communications centers.

Creating a network slice selection policy rule

Apparatuses, methods, and systems are disclosed for creating a network slice section policy (“NSSP”) rule. One apparatus includes a processor and a transceiver for communicating with a network function in a mobile communication network. The processor receives a first request from the network function, the first request comprising a list of one or more application identifiers and a corresponding application profile and application provider for each application identifier. The processor determines one or more network slice identifiers for each application identifier using the corresponding application profile and application provider. The processor also creates a NSSP rule for each application identifier in the list of application identifiers, the NSSP rule containing the application identifier and the associated one or more network slice identifiers.

Wireless communication method and wireless communications apparatus
11533647 · 2022-12-20 · ·

A wireless communication method and a wireless communications apparatus are provided. Implementation of the method includes: when a first wireless communications apparatus uses a first wireless communication capability to communicate with a second wireless communications apparatus, if the first wireless communications apparatus determines to adjust a wireless communication capability of the first wireless communications apparatus, sending, by the first wireless communications apparatus, first adjustment information to the second wireless communications apparatus, and starting a first timer, where the first adjustment information is used to indicate to adjust the wireless communication capability of the first wireless communications apparatus to a second wireless communication capability. In embodiments of this application, the second wireless communication capability is any one of a plurality of wireless communication capabilities of the first wireless communications apparatus except a maximum wireless communication capability and a minimum wireless communication capability.

MEASUREMENT METHOD AND APPARATUS
20220400370 · 2022-12-15 ·

A first access network device sends, to a terminal device, an application layer measurement configuration used to indicate the terminal device to perform quality of experience measurement and collection on a first service. The application layer measurement configuration includes a type of the first service and an indicator of quality of experience of the first service. The type of the first service includes one or more of Augmented Reality (AR), Virtual Reality (VR), and 5th Generation Media Streaming (5GMS). The first access network device receives an application layer measurement report from the terminal device. The application layer measurement report includes the type of the first service and a value corresponding to the indicator of quality of experience of the first service.

AUTHORIZATION AND POLICY PARAMETER CONFIGURATION METHOD, TERMINAL, AND NETWORK FUNCTION
20220400378 · 2022-12-15 · ·

An authorization and policy parameter configuration method, a terminal, and a network function are provided. The method is applied to a terminal and includes: sending terminal-to-terminal relay communication capability information and/or a terminal policy container to a first network function; and receiving an authorization and policy parameter for relay communication sent by a second network function, where the authorization and policy parameter for relay communication is generated based on the relay communication capability information and/or the terminal policy container.