H04W84/042

Data transmission method and apparatus and computer storage medium

Embodiments of the disclosure provide a method for transmitting data in a wireless communication network. A network device sends first configuration signaling to a terminal. The first configuration signaling is used to determine a first resource occupied by first data in a first slot. The network device also sends third configuration signaling to the terminal. The third configuration signaling is used to determine a second resource occupied by second data in the first slot and the third configuration signaling has a different type of configuration signaling from the first configuration signaling. When at least one time domain symbol in the second resource is located in the first resource in the first slot, the network device further determines, based on a preset policy, data transmitted in the first slot.

Method and apparatus for single network slice selection assistance information based congestion control in mobile communications

Various solutions for single network slice selection assistance information (S-NSSAI) based congestion control with respect to user equipment and network apparatus in mobile communications are described. An apparatus may receive a message with a back-off timer from the network node. The apparatus may determine whether an S-NSSAI of a protocol data unit (PDU) session is provided by the network node. The apparatus may start the back-off timer and associate the back-off timer with the S-NSSAI of the PDU session in an event that the S-NSSAI is provided by the network node.

Communication apparatus, control method, and storage medium
11696111 · 2023-07-04 · ·

A communication apparatus controls, while carrying out wireless communication, the ongoing wireless communication based on country information acquired via other wireless communication.

Reducing authentication steps during Wi-Fi and 5G handover

Technologies for systems, methods and computer-readable storage media for reducing the time to complete authentication during inter-technology handovers by reusing security context between 5G and Wi-Fi. Assuming, that the administrative domain for Wi-Fi and 5G match (and belongs to an enterprise for instance), using an already established security context in one technology to do fast authentication in the other technology during handover. Specifically, if UE is on Wi-Fi and handing over to 5G, use its Wi-Fi security context to do fast security setup in 5G, which includes a corresponding method for use when the UE goes from 5G to Wi-Fi.

Configuration of fixed tracking areas and fixed cells for a 5G satellite rat

User equipment (UE) access to a non-terrestrial network (NTN) via a satellite to a Fifth Generation (5G) public land mobile network (PLMN) is supported using fixed tracking areas (TAs) and fixed cells. The fixed TAs and fixed cells are defined in the NTN independently of NTN radio cells. Network elements in the NTN are provided with configuration information for the fixed TAs and fixed cells from a server (e.g., an Operations and Maintenance (O&M) server). The configuration information includes location related information for the fixed TAs and fixed cells, which may not be standardized. The network entities perform one or more services for the UE based on the location related information for the fixed TAs and fixed cells, such as determining a fixed TA or fixed serving cell for a UE, locating the UE, routing emergency calls, and supporting wireless emergency alerting (WEA).

Primary signal detection via distributed machine learning coordinated across multiple user equipment devices
11696144 · 2023-07-04 · ·

Methods and systems for primary signal detection via distributed machine learning coordinated across multiple user equipment devices are disclosed. In an example method, In an example method, a first user equipment (UE) device, located in a predefined area, is caused to determine a first machine learning model configured to detect an anomaly in an RF environment associated with the area. The controller receives the first machine learning model from the first UE device. The controller sends the first machine learning model to a second UE device located in the area. The controller receives anomaly data indicative of an anomaly detected by the second UE device via the first machine learning model. The controller may optionally determine that a primary signal is present in an RF environment associated with the area based on the anomaly data.

Steering of roaming PLMN list update and management

Apparatuses, systems, and methods for SoR list management and PLMN selection based on an SoR list. A UE may receive an SoR container which may include a list of OPLMNs. The UE may store a prior list of OPLMNs stored on a USIM of the UE on a memory of the UE. The UE replace the prior list of OPLMNs stored on the USIM with the list of OPLMNs included in the SoR container. The UE may consider the prior list of OPLMNs as a lower priority list as compared to the list of OPLMNs stored on the USIM. Additionally, in response to determining to move from a current PLMN, the UE may scan for a new PLMN based on the list of OPLMNs stored on the USIM.

Method and apparatus for offloading hardware to software package
11695626 · 2023-07-04 · ·

A method, performed by a server, of executing a software package in a wireless communication system includes: obtaining package usage information for each of a plurality of software packages with respect to user equipment's (UEs) accessing a plurality of base stations (BSs) connected to the server; determining a first hardware component (HC) set, including a plurality of HCs, for processing tasks operating in a first software package from among the plurality of software packages, based on the package usage information including a use for each of the plurality of HCs included in the first HC set and a respective usage amount for the plurality of HCs; generating a second software package that is allocated to the first HC set; migrating the tasks operating in the first software package to the second software package; and deleting the first software package.

Performance testing using a remotely controlled device

Examples provide a network testing solution using a remote-controlled testing device. A test device includes a computing device for executing network performance testing logic and a cellular device. The test device controls the cellular device via a series of commands issued to the cellular device by the computing device. The test device is placed onto or inside a vehicle. As the vehicle moves through a geographical area, the test device automatically and autonomously performs network testing operations. The test data generated during the test is periodically uploaded to a central controller. The central controller aggregates test data received from a plurality of test devices assigned to a plurality of vehicles for a given campaign. The aggregated test data is analyzed and filtered to generate performance test results. A user can dynamically set up each campaign and assign test devices and vehicles to each campaign using a graphical user interface.

MAPPING AND STITCHING NETWORK SLICES ACROSS VARIOUS DOMAINS BASED ON A BORDER GATEWAY PROTOCOL ATTRIBUTE

The present technology is directed to generating a common Border Gateway Protocol (BGP) attribute, for example, BGP-Slice Identifier (ID) for a specific network slice and stitching the network slice across one or more domains to realize end-to-end slicing. The present technology can generate BGP ID for a specific network slice spanning a plurality of domains and map domain-specific attributes associated with sub-slices of the specific network slice in different domains of the plurality of domains to the BGP ID. The present technology can further facilitate distribution of the mapping of the domain-specific attributes to the BGP ID across the plurality of domains for stitching the sub-slices together from the domain-specific attributes based on the BGP ID to stitch the specific network slice across the plurality of domains. Furthermore, the present technology can identify a configuration error in the mapping of the domain-specific attributes and the BGP ID and transmit a feedback informing the existence of the error for performing remedial measures.