Patent classifications
H04W8/30
UDSF RECORD RETRIEVAL AND DELETION
In a search or delete request towards a storage entity storing data in a plurality of records, an identifier list indicating identifiers associated with specific records to be processed is included, and the request including the identifier list is transmitted.
Wireless access node fault recovery using integrated access and backhaul
A network controller monitors a wireless access node for a fault. The wireless access node experiences the fault and scans for wireless Integrated Access and Backhaul (IAB) service. The network controller detects the fault and directs a neighbor access node to deliver the wireless IAB service. The neighbor access node delivers the wireless IAB service in response to the network controller. The wireless access node detects the wireless IAB service from the neighbor access node and exchanges fault data with the network controller using the wireless IAB service delivered by the neighbor access node. The network controller exchanges the fault data with the wireless access node using the wireless IAB service delivered by the neighbor access node. An Access and Mobility Management Function (AMF) or a User Plane Function (UPF) may detect a lack of signaling or data from the wireless access node to detect the fault.
Wireless access node fault recovery using integrated access and backhaul
A network controller monitors a wireless access node for a fault. The wireless access node experiences the fault and scans for wireless Integrated Access and Backhaul (IAB) service. The network controller detects the fault and directs a neighbor access node to deliver the wireless IAB service. The neighbor access node delivers the wireless IAB service in response to the network controller. The wireless access node detects the wireless IAB service from the neighbor access node and exchanges fault data with the network controller using the wireless IAB service delivered by the neighbor access node. The network controller exchanges the fault data with the wireless access node using the wireless IAB service delivered by the neighbor access node. An Access and Mobility Management Function (AMF) or a User Plane Function (UPF) may detect a lack of signaling or data from the wireless access node to detect the fault.
Commit sets in a Kubernetes environment
Techniques are disclosed for performing operations in a distributed computing environment comprising a plurality of computing devices implementing a Kubernetes environment. An indication is received of one or more custom resources of the Kubernetes environment. The custom resources are grouped into a commit set. The commit set is defined as an atomic unit which either succeeds or fails atomically. It is determined that at least one of the custom resources has failed to complete. In response to the determination, the custom resources of the commit set are reverted to a previous consistent state.
Commit sets in a Kubernetes environment
Techniques are disclosed for performing operations in a distributed computing environment comprising a plurality of computing devices implementing a Kubernetes environment. An indication is received of one or more custom resources of the Kubernetes environment. The custom resources are grouped into a commit set. The commit set is defined as an atomic unit which either succeeds or fails atomically. It is determined that at least one of the custom resources has failed to complete. In response to the determination, the custom resources of the commit set are reverted to a previous consistent state.
Method and apparatus for validating stored system information
A system for converging fifth generation (5G) communication systems for supporting higher data rates beyond fourth generation (4G) systems with a technology for Internet of things (IoT) is provided. The communication method and system may be applied to intelligent services based on the 5G communication technology and the IoT-related technology, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services. A system is provided for determining system information validity by acquiring and storing a first system information block and other system information, including information on a public land mobile network (PLMN) identity and a value tag, and determining whether the stored system information is valid for the cell. As another example, a terminal and base station are provided for performing beam failure detection and a recovery procedure using first and second configuration information for beam failure recovery (BFR) and if failure is detected, initiating a first random access (RA) procedure and if second configuration information is received while the first RA procedure is ongoing, terminating the first RA procedure and initiating a second RA procedure based on the second configuration information.
Method and apparatus for validating stored system information
A system for converging fifth generation (5G) communication systems for supporting higher data rates beyond fourth generation (4G) systems with a technology for Internet of things (IoT) is provided. The communication method and system may be applied to intelligent services based on the 5G communication technology and the IoT-related technology, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services. A system is provided for determining system information validity by acquiring and storing a first system information block and other system information, including information on a public land mobile network (PLMN) identity and a value tag, and determining whether the stored system information is valid for the cell. As another example, a terminal and base station are provided for performing beam failure detection and a recovery procedure using first and second configuration information for beam failure recovery (BFR) and if failure is detected, initiating a first random access (RA) procedure and if second configuration information is received while the first RA procedure is ongoing, terminating the first RA procedure and initiating a second RA procedure based on the second configuration information.
NETWORK ACCESS METHOD AND MOBILE COMMUNICATION TERMINAL
A network access method includes transmitting a request for acquiring shared network information to a shared server if a mobile communication terminal detects that a network identification of a PLMN of a visited place does not exist in a local memory of the mobile communication terminal; receiving the shared network information which the shared server transmits in response to the request, and acquiring the network identification of the PLMN of the visited place from the shared network information; adding the network identification of the PLMN of the visited place to an EPLMN list by the mobile communication terminal; and accessing a network according to the EPLMN list.
NETWORK ACCESS METHOD AND MOBILE COMMUNICATION TERMINAL
A network access method includes transmitting a request for acquiring shared network information to a shared server if a mobile communication terminal detects that a network identification of a PLMN of a visited place does not exist in a local memory of the mobile communication terminal; receiving the shared network information which the shared server transmits in response to the request, and acquiring the network identification of the PLMN of the visited place from the shared network information; adding the network identification of the PLMN of the visited place to an EPLMN list by the mobile communication terminal; and accessing a network according to the EPLMN list.
System and method for managing visitor location register (VLR) records by updating duplicate records
There is a method and system of removing duplicate Visitor Location Register (VLR) records, and updating the VLR's Global Title Address (GTA) in their Home Location Register (HLR) to avoid duplicate VLR impact to customer service, which may result in missed inbound calls and delayed inbound SMS. Duplicate VLR GTA means that one subscriber has more than one VLR record in different Mobile Switching Stations (MSS) or Mobile Switching Centers (MSC). The valid VLR is identified by comparing the “last active timestamp” of the same subscriber identity (IMSI, or MSISDN, or MDN) of VLR records obtained from each MSS/MSC. The VLR that has the most recent “last active timestamp” is used to identify the active/valid VLR which serves the subscriber. Afterwards the non-active VLR records will be deleted, and the VLR's GTA in HLR will be updated as needed.