H04L1/0018

SYSTEMS AND METHODS FOR DETERMINING INITIAL CHANNEL QUALITY CONDITIONS OF A CHANNEL FOR PROVISION OF CONTENT

A device may receive channel data associated with a channel provided between a network and a user device, and may calculate, based on the channel data, key performance indicator data that includes a plurality of key performance indicators for the channel. The device may multiply the plurality of key performance indicators by factors to generate factored key performance indicator data that includes a plurality of factored key performance indicators. The device may apply weights to the plurality of factored key performance indicators of the factored key performance indicator data to generate factored weighted key performance indicator data that includes a plurality of factored weighted key performance indicators. The device may calculate a quality indicator for the channel based on the factored weighted key performance indicator data, and may perform one or more actions based on the quality indicator for the channel.

METHOD FOR CONTROLLING WIRELESS BACKHAUL LINK AND APPARATUS
20210378044 · 2021-12-02 ·

The present disclosure relates to methods and apparatus for controlling wireless backhaul link. In one example method, a first device determines to manage a first radio link control (RLC) bearer on a wireless backhaul link between a first backhaul node and a second device, where the second device is a parent node of the first backhaul node, the first device is a centralized unit (CU) of a donor base station, and the second device is a distributed unit (DU) of the donor base station; the second device is a second backhaul node, and the first device is a donor base station; or the first device is a CU of a donor base station, and the second device is a second backhaul node. The first device sends a backhaul type indicator and management information of the first RLC bearer to the first backhaul node.

Communication system and method where message length is assigned based on message preference

A method and communication system has been developed to increase the number of messages sent over a bandwidth limited channel and/or under noisy conditions by using a variable message length encoding and decoding scheme. With this technique, the messages having a higher probability of being sent are shorter as compared to the messages that are less likely to be sent under the current conditions. With this technique, a higher number of transactions per unit of time can be communicated and/or executed over a given bandwidth limited channel. When the transmitted message is received, the receiver does not know the message length, but the receiver deduces the length by using information from various error detection and correction techniques, such as forward error correction (FEC) and cyclic redundancy check (CRC) techniques.

SYSTEM AND METHOD FOR SAFETY MESSAGE LATENCY CHARACTERIZATION
20220200818 · 2022-06-23 ·

A method comprising: accessing a response mapping defining a set of safety-critical functions associated with a safety-critical latency threshold and a set of safety responses, each safety response corresponding to a safety-critical function; executing a time-synchronization protocol with a transmitting system to calculate a clock reference; accessing a safety message schedule indicating an expected arrival time for each safety message in a series of safety messages based on the clock reference; for each safety message in the series of safety messages, calculating a latency of the safety message based on an arrival time of the safety message and the expected arrival time; and in response to a latency of a current safety message in the series of safety messages exceeding the safety-critical latency threshold, initiating the safety response corresponding to the safety-critical function for each safety-critical function in the set of safety-critical functions.

Adaptive Bitrate Streaming Of Live Content
20220182433 · 2022-06-09 ·

There is provided a client device arranged to receive a live adaptive bitrate stream, the client device further arranged to: request a manifest file; and request a manifest update hint. The client device further arranged to receive a manifest update hint, the manifest update hint including an indication of when the manifest will be updated; and request an updated manifest file at a time indicated by the manifest update hint.

Uplink grant-free transmission method in URLLC, terminal side device and network side device

The present disclosure provides an uplink grant-free transmission method in Ultra Reliable & Low Latency Communication (URLLC), a terminal side device and a network side device. The uplink grant-free transmission method includes: receiving a configuration parameter, the configuration parameter including first information indicating a correspondence between time-domain resources for URLLC uplink transmission and identifiers of Hybrid Automatic Repeat reQuest (HARQ) processes; and after the arrival of a URLLC service, transmitting data for the URLLC service using a corresponding HARQ process on an available time-domain resource for the URLLC uplink transmission.

DYNAMIC BANDWIDTH SWITCHING FOR REDUCING POWER CONSUMPTION IN WIRELESS COMMUNICATION DEVICES

Systems, methods, apparatuses, and computer-program products for performing dynamic bandwidth switching between control signals and data signals of differing bandwidths are disclosed. A mobile device receives a control signal having a first bandwidth. The mobile device receives a data signal having a second bandwidth different from the first bandwidth. The control signal and the data signal are received over a single carrier frequency. The data signal is transmitted after the control signal such that the data signal and control signal are separated by a time interval. The time interval is based on a switching latency of the mobile device.

Scheduling request handling with multiple configured TTIs

Techniques for improved scheduling request (SR) operation using one or more short transmission time intervals (sTTIs) (908) are presented to ensure both short latency and improved wireless coverage for user equipment (UE) (102). In particular, a method (1000) performed by a UE (102) for managing SR transmissions to a network node (106) is presented. The method can include determining (1002) a value indicative of network coverage conditions, and based on the value indicative of network coverage conditions, determining (1004) a transmission duration (908) for transmitting one or more SRs (118). In addition, the example method can include transmitting (1006) the one or more SRs (118) to the network node (106) using the determined transmission duration (908). Related devices, computer programs, processor/memory combinations, and systems are likewise described.

Service multiplexing method, service demultiplexing method, and related device

Embodiments of the present invention disclose a service multiplexing method. The method includes: sending, by a sending device, a bit block stream of a first service to a receiving device; if the sending device determines to switch from the first service to a second service for service sending, sending, by the sending device, at least one service switching indication bit block to the receiving device; and sending, by the sending device, a bit block stream of the second service to the receiving device. In addition, a service switching indication bit block is inserted between bit block streams that require service switching, to perform service switching, thereby reducing a latency and jitter in a service switching process, and ensuring a low latency during service switching.

Systems and methods for detecting the presence of a user at a computer
11350238 · 2022-05-31 · ·

Systems and methods for securing an unattended computer. The systems and methods provide an additional layer of security for computer systems by using network presence sensing (NPS) to detect the presence or absence of a user physically present at a computer system and if an authorized user is detected as having departed, taking a security action in response. The response may be to lock the computer, encrypted sensitive data, and so forth. The concept may also be applied at a facilities level, in computing pools, and in other instances physical presence or absence of a user at a computer is indicative of a need for a change in system state. This change could be security related, or could pertain to other resources.