H04L47/824

METHOD OF RELEASING RESOURCE RESERVATION IN NETWORK

The present disclosure provides methods for releasing a reserved resource in a network. An operation method performed in a first communication node of a vehicle network includes generating a first frame including identification information of a stream transmitted through a reserved resource and a first indicator instructing to release the reserved resource; and transmitting the first frame to a second communication node.

Dynamic resource allocation, scheduling and signaling for variable data rate service in LTE

A method and apparatus are provided for dynamic resource allocation, scheduling and signaling for variable data real time services (RTS) in long term evolution (LTE) systems. Preferably, changes in data rate for uplink RTS traffic are reported to an evolved Node B (eNB) by a UE using layer 1, 2 or 3 signaling. The eNB dynamically allocates physical resources in response to a change in data rate by adding or removing radio blocks currently assigned to the data flow, and the eNB signals the new resource assignment to the UE. In an alternate embodiment, tables stored at the eNB and the UE describe mappings of RTS data rates to physical resources under certain channel conditions, such that the UE uses the table to locally assign physical resources according to changes in UL data rates. Additionally, a method and apparatus for high level configuration of RTS data flows is also presented.

SCALABLE EDGE COMPUTING

There is disclosed in one example an application-specific integrated circuit (ASIC), including: an artificial intelligence (Al) circuit; and circuitry to: identify a flow, the flow including traffic diverted from a core cloud service of a network to be serviced by an edge node closer to an edge of the network than to the core of the network; receive telemetry related to the flow, the telemetry including fine-grained and flow-level network monitoring data for the flow; operate the Al circuit to predict, from the telemetry, a future service-level demand for the edge node; and cause a service parameter of the edge node to be tuned according to the prediction.

Use of access-block history as basis to dynamically control maximum number of connection-request transmissions per access attempt
11432359 · 2022-08-30 · ·

A method and system for dynamically controlling connection-request transmission in a cell provided by an access node, the access node supporting access attempts by user equipment devices (UEs), each access attempt including the UE engaging in random access signaling with the access node and the UE then engaging in up to a maximum allowed number of connection-request transmissions to the access node in an effort to ensure successful receipt by the access node of a connection request from the UE, where an access block occurs if the access node does not successfully receive connection-request transmission from the UE through the maximum allowed number connection-request transmissions. An example method includes (i) determining an extent to which the cell has experienced such access blocks and (ii) using the determined extent as a basis to dynamically set a maximum allowed number of connection-request transmissions per access attempt in the cell.

SEGREGATING VPN TRAFFIC BASED ON THE ORIGINATING APPLICATION
20170230281 · 2017-08-10 ·

Disclosed are various examples for segregating virtual private network (VPN) traffic based on the originating client application. A tunnel endpoint receives, through a network tunnel, network traffic sent by a client application executed by a client device. The tunnel endpoint identifies characteristics of the client application or the client device. The tunnel endpoint then selects a particular virtual local area network (VLAN) from multiple VLANs based at least in part on the characteristics. The tunnel endpoint then forwards the network traffic to an internal network gateway of an organization using the particular VLAN.

Method and apparatus for managing congestion in a wireless system

Systems and methodologies are described herein that facilitate congestion control in a wireless communication system. As described herein, an access network and associated terminals can utilize a token bucket access control mechanism, through which respective terminals can be allotted access tokens and/or other units for access to the access network. For example, upon requesting access to a given network, a user of the network can determine whether sufficient access tokens have been accumulated, based on which the request can be selectively allowed or denied. As further described herein, multiple token bucket mechanisms can be utilized, which can correspond to respective packet flows or the like. Additionally, token bucket access control can be implemented as described herein in cooperation with conventional access persistence functionality. Further aspects described herein facilitate the adjustment of token bucket parameters for network access control based on network loading.

CONNECTIVITY SCHEDULER FOR NB-IOT DEVICES
20220039109 · 2022-02-03 ·

A method performed by one or more network nodes of a wireless telecommunications network to schedule intermittent connectivity of multiple narrowband Internet-of-Things (NB-IoT) devices with the network. The network node(s) can maintain a connectivity schedule that includes profiles for NB-IoT devices and cause the multiple NB-IoT devices to connect to the network in accordance with the schedule at different times based on priority levels associated with the NB-IoT devices. The network node(s) can adjust the connectivity schedule in response to detection of a condition of the network or the NB-IoT device.

Scalable edge computing

There is disclosed in one example an application-specific integrated circuit (ASIC), including: an artificial intelligence (Al) circuit; and circuitry to: identify a flow, the flow including traffic diverted from a core cloud service of a network to be serviced by an edge node closer to an edge of the network than to the core of the network; receive telemetry related to the flow, the telemetry including fine-grained and flow-level network monitoring data for the flow; operate the Al circuit to predict, from the telemetry, a future service-level demand for the edge node; and cause a service parameter of the edge node to be tuned according to the prediction.

Hybrid communications system and method of operation

A method includes providing account enable data from a multi-tenant hosted communication system to a premises based communications system. The method also includes receiving user configuration data at a remote portal of the hosted communications system, the configuration data including the account enable data and user data describing properties of each of a plurality of users in the premises based communications system including at least one user group to which a subset of the users belongs. The method also includes providing enablement data to the premises based communications system via the portal to identify which resources in the multi-tenant hosted system are enabled for the plurality of users in the premises based communications system based on the user configuration data. Changes in the enablement data further can be synchronized based on changes in the user configuration data received from the premises based communications system via the portal.

Routers with personalized quality of service

The present disclosure relates to routers and quality of service (QoS) systems and methods that base decisions on the identification of one or more users of computing devices within the environment. Profiles and/or attributes associated with the users may be created and dynamically updated to optimize user experience. For example, the routers may dynamically adapt QoS settings to regulate bandwidth, latency and other parameters to prioritize users and/or optimize a specific user's experience based on the user's priority, personal profile, and/or other attributes.