H04W40/246

Base station, user terminal, and processor
09781587 · 2017-10-03 · ·

A base station, which accommodates a user terminal that transmits a discovery-use signal used for discovering a communication partner terminal in D2D communication that is direct device-to-device radio communication in a mobile communication system that supports the D2D communication, comprises a control unit that controls transmission of power control information for designating transmission power of the discovery-use signal to the user terminal.

COMMUNICATION SYSTEM, COMMUNICATION DEVICE, AND COMMUNICATION METHOD
20220052940 · 2022-02-17 ·

A communication system includes a server and multiple communication nodes. The server broadcasts a mesh network entry request to the communication nodes. Each communication node is configured to receive the mesh network entry request, cause a mesh network entry request to hop to the other communication nodes if the entry request is not addressed to the node itself, register a rank of the node based on a number of hops required for the entry request to reach the node if the entry request is addressed to the communication node, transmit a rank request when the communication node registers its rank, receive a rank response from other nodes, each rank response including a rank of the node sending the rank response, and register the node having a highest ranking response as a communication path to the server if its rank is higher than the node itself.

Systems and methods for detecting potentially illegitimate wireless access points
09781601 · 2017-10-03 · ·

The disclosed computer-implemented method for detecting potentially illegitimate wireless access points may include (1) determining that a computing device has established a connection with a wireless access point that resembles a known wireless access point, (2) collecting a set of network details related to a route from the computing device to a network resource via the wireless access point, (3) identifying a previously collected set of network details related to a route from the computing device to the network resource via the known wireless access point, (4) determining that a portion of the set of network details related to the route via the wireless access point does not match the set of network details related to the route via the known wireless access point, and then (5) determining that the wireless access point is potentially illegitimate.

METHOD AND APPARATUS FOR OBTAINING USER EQUIPMENT UE INFORMATION
20170251355 · 2017-08-31 ·

Embodiments of the present disclosure disclose a method for obtaining user equipment UE information, including: obtaining identification information of UE on an access network; sending request information to a mobility management entity, where the request information includes the identification information of the UE on the access network, so as to request the mobility management entity to return the UE information according to the identification information of the UE on the access network; and obtaining the UE information returned by the mobility management entity. Correspondingly, the embodiments of the present disclosure further disclose an apparatus for obtaining user equipment UE information. According to the present disclosure, UE information of one or some user equipments may be obtained, so that a core network can accordingly control user equipment, thereby improving system processing efficiency.

Power controlled network devices for security and power conservation
09749959 · 2017-08-29 · ·

The present invention provides method and systems for activating or deactivating network devices by managing the power of the network device. By controlling the power for network devices, the size and coverage of the network can be adjusted to meet the needs for the current usage. This can be particularly advantageous in wireless networks where multiple wireless access points may be provided to provide coverage during peak usage but present the additional security concern of the network being accessible to unauthorized users. Being able to power down unneeded wireless access points during off-peak usage allows for the minimization of such potential security concerns.

Signaling-less dynamic call setup and teardown by utilizing observed session state information

Signaling-less call setup and teardown by employing observed Quality of Experience (QoE) and resource demands. A system provides an environment for supersonic treatment of observed QoE and Quality of Service (QoS) demands for mobile applications. Specifically, a monitoring component is employed to determine session state information associated with a traffic flow, which includes observed QoE and resource demand data. The session state information is stored in a shared memory location and can be analyzed to modify and/or create a network policy for the traffic flow. The network policy is applied to one or more traffic flows to minimize signaling exchanges between a communication network and a mobile station.

Methods and apparatus for cell scanning in system with large number of antennas

A mobile station is configured to scan cells in a wireless network. The mobile station includes at least one antenna configured to transmit and receive wireless signals. The mobile station also includes a processor coupled to the at least one antenna, the processor configured to scan for one or more neighboring base station cells in a same frequency band as a serving base station cell using one or more receive beams. The one or more receive beams used for scanning are different than receive beams used for data communication with the serving base station cell.

Controlling channel usage in a wireless network

Methods, apparatuses, and embodiments related to a technique for controlling channel usage in a wireless network in a multi-band wireless networking system. In a wireless network with multiple wireless networking devices and one or more client devices, communications between the wireless networking devices occurs via a backhaul channel, and communication between the client(s) and the wireless networking devices occurs via a fronthaul channel. Based on interference characteristics of the wireless channels, a device determines a channel usage plan, and communicates the plan via the backhaul channel to the wireless networking devices of the wireless network.

Node and a method performed by the node operable in a mesh communication network for routing a received packet towards a destination

A node operable in a mesh communication network and a method performed thereby for routing a received packet towards a destination are provided. The method includes receiving a packet addressed to a destination node in the mesh network, the packet including information related to address of source node, last hop address, address of destination node, and a hop counter. The method further includes determining whether the destination address is included in a routing table of the node in the mesh communication network. When the destination address is included in a routing table, the received packet is forwarded according to the routing table; or when the destination address is not included in a routing table, the received packet is flooded by broadcasting it in the mesh communication network.

Detecting critical links in bluetooth mesh networks

Embodiments include methods, for an intermediate node in a wireless mesh network, to identify a critical link in a path between a source node and a destination node in the wireless mesh network. Such methods include receiving a first message relating to a discovery of a path between the source node and the destination node. Such methods also include forwarding the first message to one or more other nodes in the wireless mesh network based on an entry in a discovery table, stored in the intermediate node, that indicates that the intermediate node is part of a critical link in the path. The first message can be a path request message or a path reply message, and the methods can include various other operations associated with each type of first message. Other embodiments include wireless devices configured to operate as intermediate nodes in accordance with these methods.