Patent classifications
H04W40/30
CONNECTIONLESS ARCHITECTURE FOR MOBILITY MANAGEMENT
Aspects of the subject disclosure may include, for example, obtaining a first indication of a first decision to communicate with a first mobile communication device via a second node of a wireless communication system, the first mobile communication device being in communication with a first node of the wireless communication system at a time of a making of the first decision, the first node being configured for first communications with a transport layer of the wireless communication system via a first link and the second node being configured for second communications with the transport layer of the wireless communication system via a second link; responsive to the obtaining the first indication, changing in a route information listing a first latency value for the first link, the first latency value being changed from a first original value to a higher value that is greater than the first original value, the route information listing containing information associated with a plurality of mobile communication devices, including the first mobile communication device, that are communicating with the transport layer; and responsive to the obtaining the first indication, changing in the route information listing a second latency value for the second link, the second latency value being changed from the higher value to a lower value that is less than the higher value. Other embodiments are disclosed.
CONNECTIONLESS ARCHITECTURE FOR MOBILITY MANAGEMENT
Aspects of the subject disclosure may include, for example, obtaining a first indication of a first decision to communicate with a first mobile communication device via a second node of a wireless communication system, the first mobile communication device being in communication with a first node of the wireless communication system at a time of a making of the first decision, the first node being configured for first communications with a transport layer of the wireless communication system via a first link and the second node being configured for second communications with the transport layer of the wireless communication system via a second link; responsive to the obtaining the first indication, changing in a route information listing a first latency value for the first link, the first latency value being changed from a first original value to a higher value that is greater than the first original value, the route information listing containing information associated with a plurality of mobile communication devices, including the first mobile communication device, that are communicating with the transport layer; and responsive to the obtaining the first indication, changing in the route information listing a second latency value for the second link, the second latency value being changed from the higher value to a lower value that is less than the higher value. Other embodiments are disclosed.
SIDELINK-BASED UE RELAYING FOR EFFICIENT SUPPORT OF TRACKING APPLICATIONS
Systems, methods, apparatuses, and computer program products for sidelink (SL) based multi-hop UE relaying, for example, to support tracking applications are provided. One method may include determining, at a user equipment (UE), to which tier of a sidelink (SL) based multi-hop user equipment (UE) relaying the user equipment (UE) belongs. The method may also include determining at least a relaying mode and arrangement of transmit and receive occasions for sidelink (SL) transmission and reception in dependence on the determined tier that the user equipment (UE) belongs, and performing, on the determined transmit and receive occasions, transmit and receive operations for the sidelink (SL) based multi-hop user equipment (UE) relaying based on the determined relaying mode and arrangement.
HYBRID SOFTWARE-DEFINED NETWORKING AND MOBILE AD-HOC NETWORKING ROUTING IN MESH NETWORKS
A network controller is configured to cause a network to implement a primary network configuration of a network and a secondary network configuration as a backup to the primary network configuration. The network controller may be configured to receive information from a plurality of nodes of a network and information related to the client data to be transmitted through the network. Based on the node information, the network controller is configured to determine available nodes and possible links in the network and then determine a topology of the network. The primary network configuration is determined based on the topology. The network controller then sends instructions to the plurality of nodes of the network to implement the primary network configuration and to switch to a secondary network configuration where a failure of the primary network configuration occurs, wherein the secondary network configuration implements mobile ad-hoc networking in the determined topology.
SYSTEMS AND METHODS FOR DETERMINING ROUTING DATA BASED ON EXPLICIT CONGESTION NOTIFICATIONS AND ACTIVE QUEUE MANAGEMENT ENABLED NETWORK DEVICES
A device may receive explicit congestion notification data associated with user devices connected to a network of network devices, and may receive network data identifying network metrics associated with the network devices. The device may generate an active queue management mapping table based on utilizing a model to process the explicit congestion notification data and the network data. The device may determine, based on the active queue management mapping table and the network data, a routing table that includes routing data identifying traffic paths with active queue management enabled network devices and without non-active queue management enabled network devices of the network devices. The device may provide the routing table to the network devices.
SYSTEMS AND METHODS FOR DETERMINING ROUTING DATA BASED ON EXPLICIT CONGESTION NOTIFICATIONS AND ACTIVE QUEUE MANAGEMENT ENABLED NETWORK DEVICES
A device may receive explicit congestion notification data associated with user devices connected to a network of network devices, and may receive network data identifying network metrics associated with the network devices. The device may generate an active queue management mapping table based on utilizing a model to process the explicit congestion notification data and the network data. The device may determine, based on the active queue management mapping table and the network data, a routing table that includes routing data identifying traffic paths with active queue management enabled network devices and without non-active queue management enabled network devices of the network devices. The device may provide the routing table to the network devices.
Mesh networking using peer to peer messages for a hospitality entity
A method and system for communicating with wireless messaging enabled door locks is disclosed. The method includes advertising availability of the door lock via wireless messaging for a first period of time; triggering a message send event; determining a destination node; connecting to the destination node via Bluetooth; sending the message to the destination node; and entering a low power state for a second period of time, wherein the second period of time is longer than the first period of time; wherein the destination node is chosen from a second door lock or a computing system.
Mesh networking using peer to peer messages for a hospitality entity
A method and system for communicating with wireless messaging enabled door locks is disclosed. The method includes advertising availability of the door lock via wireless messaging for a first period of time; triggering a message send event; determining a destination node; connecting to the destination node via Bluetooth; sending the message to the destination node; and entering a low power state for a second period of time, wherein the second period of time is longer than the first period of time; wherein the destination node is chosen from a second door lock or a computing system.
SMART CASCADING SECURITY FUNCTIONS FOR 6G OR OTHER NEXT GENERATION NETWORK
In a 6G network, microservices can be utilized in the absence of a core network. For example, after a mobile device has authenticated, through its carrier network, with a transport service layer, microservices can be allocated to the mobile device without having to be transmitted via the core network. Thus, removing the core network from the process can generate a direct line of microservices from the transport layer to the end-user. Furthermore, additional microservices and/or resources can be access through a microservices library. Consequently, packets can be securely transmitted be a wireless network facilitating sending packet profile data from one to many node devices in anticipation of the packet traversing the various node devices.
SMART CASCADING SECURITY FUNCTIONS FOR 6G OR OTHER NEXT GENERATION NETWORK
In a 6G network, microservices can be utilized in the absence of a core network. For example, after a mobile device has authenticated, through its carrier network, with a transport service layer, microservices can be allocated to the mobile device without having to be transmitted via the core network. Thus, removing the core network from the process can generate a direct line of microservices from the transport layer to the end-user. Furthermore, additional microservices and/or resources can be access through a microservices library. Consequently, packets can be securely transmitted be a wireless network facilitating sending packet profile data from one to many node devices in anticipation of the packet traversing the various node devices.