H04W40/246

Discovery of a network topology from a client perspective
11540199 · 2022-12-27 · ·

An access point that determines communication boundaries is described. During operation, the access point may receive one or more probe requests associated with the one or more electronic devices, where a given probe request may include an identifier of a given electronic device. Moreover, when the access point receives the given probe request, the access point may determine a signal strength associated with the given probe request and timestamps when the given probe request was received. Then, the access point may exchange probe-request information with one or more additional access points, where the probe-request information corresponds to received probe requests. Next, the access point may compare the probe-request information to determine the communication boundaries. For example, the communication boundaries may be determined by comparing the probe-request information for pairs of access points. Furthermore, the access point may identify neighboring access points based at least in part on the probe-request information.

COMMUNICATION METHOD AND COMMUNICATION APPARATUS
20220408341 · 2022-12-22 ·

A communication method is disclosed, including: An integrated access and backhaul IAB donor node receives a first message from a core network network element, where the first message indicates to establish a local route between a first node and a second node, and the first node is an IAB node; and the IAB donor node determines a local routing node based on the first message, where a data packet between the first node and the second node is locally forwarded by using the local routing node. This method can reduce data bypassing and reduce a communication latency.

Relay Method, Method for Generating Routing Table, and Device
20220408342 · 2022-12-22 ·

A relay terminal includes a relay protocol stack, the relay protocol stack being located between a packet data convergence protocol (PDCP) layer and a layer 2 protocol stack, or the relay protocol stack being a media access control (MAC) layer protocol stack. The relay method includes: a relay receiving entity receiving a relay protocol data unit (PDU) sent by a previous hop node, and transmitting the relay PDU to a relay sending entity; and the relay sending entity sending the relay PDU to a next hop node.

CORE NETWORK SUPPORT FOR TRANSPORT NETWORK PATH DIVERSITY FOR URLLC USER PLANE
20220394593 · 2022-12-08 ·

Information regarding disjoint transport paths of a transport network is acquired (S501). Based on the acquired information, a user plane node of a plurality of user plane nodes of a core network is selected (S503), from which at least one of the disjoint transport paths is reachable, wherein the user plane node is selected as an endpoint of at least one tunnel out of at least two tunnels to be established for a packet data unit, PDU, session to carry traffic between the user plane node and an access node of an access network, wherein the at least two tunnels are to be set up by mapping the at least two tunnels to the disjoint transport paths.

Access Control at a Relay User Equipment

A relay user equipment (UE) configured to operate as a relay between a remote UE and a network component performs a method. The method includes determining at least one relay capability of the relay UE and performing a relay access control operation that indicates to the remote UE whether the remote UE is permitted to use the relay UE as the relay.

SYSTEMS AND METHODS FOR CONFIGURING AND DEPLOYING MULTI-ACCESS EDGE COMPUTING APPLICATIONS
20220393956 · 2022-12-08 ·

A device may include a processor configured to determine a plurality of requirements for a Multi-Access Edge Computing (MEC) application requested by a customer; select a solution blueprint for the MEC application, from a set of solution blueprints, based on the determined plurality of requirements, wherein the solution blueprint includes an application deployment blueprint and a connectivity blueprint; and receive approval of the selected solution blueprint from the customer. The processor may be further configured to configure at least one transport network device based on the connectivity blueprint, in response to receiving the approval of the selected solution blueprint from the customer; and deploy at least one component of the MEC application on a MEC device in a MEC network based on the application deployment blueprint, in response to receiving the approval of the selected solution blueprint from the customer.

Method for configuring a wireless communication coverage extension system and a wireless communication coverage extension system implementing said method

A method for configuring a wireless communication coverage extension system is described. The latter comprises a backhaul subnetwork in tree form comprising a plurality of interconnected nodes. At least two nodes directly connected to an internet access gateway are identified among the nodes of the backhaul subnetwork. A single node is selected from the at least two identified nodes to be the node through which a configuration of the wireless communication coverage extension system is defined. The configuration of the wireless communication coverage extension system defined is then sent from the selected node to all the other nodes of the backhaul subnetwork.

MESH CONNECTIVITY IN INTEGRATED ACCESS AND BACKHAUL NETWORKS

Methods, systems, and devices for wireless communications are described that provide for mesh connectivity between integrated access and backhaul (IAB) nodes. A first node of an IAB network may determine a routing address for a second node, and communications may be transmitted to the second node based on the routing address to allow for coordination between the first and second nodes. The first node may detect a discovery signal of a second node, and may determine to communicate with the second node based on the discovery signal. The first node may obtain the routing address based on one or more of transmitting a request for the routing address to a third node, establishing a sidelink connection with the second node to obtain the routing address, receiving a mapping between routing addresses and cell IDs that are transmitted in discovery signals, or any combinations thereof.

SWARM CONTROL ALGORITHM TO MAINTAIN MESH CONNECTIVITY WHILE ASSESSING AND OPTIMISING AREAL COVERAGE IN UNKNOWN COMPLEX ENVIRONMENTS

A method for controlling the position of an updating agent in a decentralised multi-agent system, the method comprising: identifying a first neighbouring agent within a communicative range of the updating agent; estimating a first distance to the first neighbouring agent and a first direction to the first neighbouring agent; determining a movement direction based on the first direction to the first neighbouring agent; and determining a movement magnitude based on an activation function, the first distance to the first neighbouring agent, and a desired reference distance. The activation function is configured such that the greater the difference between the first distance to the neighbouring agent and the desired reference difference, the larger the movement magnitude. The method further comprises moving the updating agent based on the movement direction and the movement magnitude.

Rapid topology discovery through identification of mesh network edges
11516725 · 2022-11-29 · ·

To speed up a firmware update process, a gateway performs an expedited topological discovery of networked nodes. The gateway maintains a list of unlinked network nodes that are not known to share good edges with other nodes. The gateway transmits a topology query to a selected unlinked node, which the node retransmits to its neighboring nodes. Each neighboring node responds to the gateway with a link status of the edge between the queried node and the neighbor. The queried node and each neighboring node with an edge of sufficient link quality are removed from the list of unlinked nodes. The process is repeated until no networked nodes remain in the list of unlinked nodes. The gateway then sends a firmware update to nodes that will in turn retransmit the update over identified good edges.