H04L47/821

Radio network node, user equipment (UE), system and methods performed therein for handling communication in a wireless communication network

According to an embodiment herein a method performed by a radio network node for handling communication of data for a user equipment, UE, served in a service area associated with the radio network node in a wireless communication network is herein provided. The radio network node receives an indication from the UE, wherein the indication indicates a priority level for bandwidth allocation compared to other UEs. The radio network node further allocates a first bandwidth out of a total bandwidth to the UE for communication, wherein the first bandwidth is allocated in size based on the indication.

Devices and methods for multipath communications
11582343 · 2023-02-14 · ·

Broadband communications devices and methods operate with at least two separate communication paths between the devices and the network, such as the Internet. The broadband devices and methods receive data concurrently over the communication paths or separately. The bandwidth is increased when the separate communication paths are combined. The broadband devices employ packetized data with Voice over Internet Protocol (VoIP) technologies combined with RF communications technologies.

SIGNAL UPLOAD OPTIMIZATION
20180006967 · 2018-01-04 ·

Aspects of the technology described herein allocate limited computing resources, such as available bandwidth and battery power, to transferring the most urgent and important data from a client device to an online service. Client devices have enormous amounts of information about the user's activities that could be communicated to the service at any given time. However, the wireless transfer of information uses available battery power and can consume a user's data plan. The technology described herein uses a model to determine how often information should be sent to a service. The model can also determine what information to send. Different models can be implemented in different scenarios. The different models can include different weighting that will produce different decisions given the same inputs.

Remote port for network connectivity for non-colocated customers of a cloud exchange

In general, techniques are described for network connectivity for non-colocated customers of a cloud exchange. A programmable network platform for the cloud exchange comprises processing circuitry configured to: configure a virtual network device in the data center to run a network service for a customer; receive, from the customer, a request for a remote port and network information for a network service provider connectivity service for the customer; assign, in response to receiving the request for the remote port, a remote port of the cloud exchange to the customer; and configure, in response to receiving the request for the remote port using the network information, the cloud exchange to connect the network service provider connectivity service to the virtual network device via the remote port of the cloud exchange.

Method and apparatus for CSI reporting

For CSI reporting mechanisms, a user equipment (UE) includes a transceiver and a processor operably connected to the transceiver. The transceiver is configured to receive channel state information (CSI) process configuration information including at least one beamformed type associated with a plurality of non-zero-power (NZP) CSI reference signal (CSI-RS) resource configurations and receive a CSI-RS resource index (CRI) reporting configuration. The processor is configured to calculate, in response to receipt of the configuration information, a CRI and a channel quality indicator (CQI). The transceiver is further configured to report the CRI and the CQI by transmitting the CRI and the CQI on an uplink channel.

Diffserv traffic engineering compliant backup paths for fast reroute protection in MPLS

A Point of Local Repair (PLR) network element includes one or more ports and circuitry connected thereto for forwarding and control, wherein the circuitry is configured to receive a PATH message for a Label Switched Path (LSP) tunnel in a Multiprotocol Label Switching (MPLS) network with a specified DiffSery Traffic Engineering (DSTE) Class Type, determine the DSTE Class Type based on the PATH message, and store the DSTE Class Type for the LSP tunnel to ensure a Facility Bypass tunnel used for the LSP tunnel supports the specified DSTE Class Type. The circuitry can be further configured to, responsive to a failure of the LSP tunnel, select the Facility Bypass tunnel for the LSP tunnel such that the Facility Bypass tunnel supports the specified DSTE Class Type.

System and method for tag based request context in a cloud infrastructure environment

Systems and methods described herein support tag based request context in a cloud infrastructure environment. Cloud administrators do not generally have the ability to restrict resource usage in existing clouds. Granting a user permission to create resources allows them to create and/or terminate any number of resources up to a predefined account limit. Tags are associated with requests for resources for allowing administrators to restrict a user's handling of resources to the appropriate level by allowing fine-tuned control of access to the resources based on the context of the request for the resources. Request context information of the request is compared against a required credential gate level for permitting handling of resources in a tenancy having the first privilege level classification, and the request is selectively granted based on the request context information matching the first required credential gate level.

SYSTEM FOR EXECUTING DIGITAL RESOURCE TRANSFER USING TRUSTED COMPUTING

Systems, computer program products, and methods are described herein for executing digital resource transfer using trusted computing. The present invention is configured to receive, from a second computing device, an indication that a first computing device has initiated a transfer of a digital resource; determine, using the authentication protocol, that the first computing device is in secure possession of the digital resource; initiate, via the second computing device, a request to receive the digital resource from the first computing device; receive, via the second computing device, an indication that the second computing device has received the digital resource from the first computing device; initiate, via the second computing device, a resource verification protocol on the digital resource; verify, using the resource verification protocol, one or more digital signatures associated with the digital resource; and transmit, via the second computing device, an acknowledgement to the first computing device.

System for Managing Data Center Asset Resource Load Balance

A system, method, and computer-readable medium are disclosed for performing a data center monitoring and management operation. The data center monitoring and management operation includes: identifying a plurality of asset resources within a data center; monitoring workloads within the data center, the monitoring providing data center workload data, the data center workload data including asset resource utilization data; determining whether certain asset resources are underutilized; presenting a load balance configurator user interface, the load balance configurator user interface enabling allocation of asset resources to target workloads; and, performing a data center asset allocation operation, the data center asset allocation operation reallocating workloads in response to the allocation of asset resources to target workloads.

Quota-based resource scheduling

The present disclosure relates to dynamically scheduling resource requests in a distributed system based on usage quotas. One example method includes identifying usage information for a distributed system including atoms, each atom representing a distinct item used by users of the distributed system; determining that a usage quota associated with the distributed system has been exceeded based on the usage information, the usage quota representing an upper limit for a particular type of usage of the distributed system; receiving a first request for a particular atom requiring invocation of the particular type of usage represented by the usage quota; determining that a second request for a different type of usage of the particular atom is waiting to be processed; and processing the second request for the particular atom before processing the first request.