20 research outputs found

    “FAST TRANSITION” INTO WIRELESS NETWORK USING 5G SECURITY CONTEXT

    Get PDF
    Techniques are described for using the concept of 802.11r Fast Base Station Subsystem (BSS) Transition in the security context generated between User Equipment (UE) and a 5G Radio Access Network (RAN) (UE – Next-Generation NodeB (gNB) security context) to provide “Fast Transition” into the wireless network. This eliminates the need for a separate handshaking mechanism, allowing security negotiation and requests for wireless resources to occur in parallel, thereby enabling faster, secure communication through the wireless link

    IMPROVING EFFICIENCY OF CITIZENS BROADBAND RADIO SERVICE DUAL CONNECTIVITY AND CITIZENS BROADBAND RADIO SERVICE / WIRELESS LOCAL AREA NETWORK RADIO LEVEL INTEGRATION AND INTERWORKING

    Get PDF
    Techniques are described herein for using Citizens Broadband Radio Service Dual Connectivity (CBRS-DC) to improve per-user throughput and mobility robustness. With CBRS-DC, a CBRS User Equipment (UE) can exchange data via a Master CBRS Device (CBSD) and a Secondary CBSD simultaneously, but control plane packets for both these CBSDs are sent only via the Master CBSD. In CBRS networks, the Spectrum Access System (SAS) may change the channel bandwidth allocated to a CBSD. The SAS could even remove all the resources allocated to a Master CBSD, which can create problems with DC operation in CBRS networks, particularly for denser deployments. There are similar problems associated with using Long Term Evolution (LTE) – Wireless Local Area Network (WLAN) Aggregation (LWA), LTE and Wi-Fi® radio level integration with IP security tunnel (LWIP), and Radio Access Network (RAN) Controlled LTE-WLAN Interworking (RCLWI) with CBRS and Wi-Fi integration at the radio network level. Moreover, current mechanisms do not operate efficiently with CBRS or some of the newer wireless technologies such as Institute of Electrical and Electronics Engineers (IEEE) 802.11ax, Extreme High Throughput (EHT), etc. Described herein are solutions to improve the efficiency of these operations

    DYNAMIC FUNCTION UPDATES FOR HYBRID CONTROLLERS

    Get PDF
    This submission presents a technique to synchronize data displayed in a Cloud network management unit and an on-premise network management unit for an enterprise deployment. In many cases, the available bandwidth for the Cloud network management unit forbids the near-real-time display of data available at an on-premise network management unit. However, by measuring which page may be accessed and the type of data is to be displayed via the page, the technique of this proposal provides for the ability to stream only the amount of data needed for a Cloud administrator to experience real time management, without consuming a large bandwidth with raw data streaming (as would often be the case with on-premise management)

    METHODS TO IMPROVE EFFICIENCY OF HIGHLY-RELIABLE / ULTRA-RELIABLE APPLICATIONS USING COORDINATED MULTI-POINT TECHNIQUES

    Get PDF
    Existing Coordinated Multi-Point (CoMP) mechanisms do not take into account reliability aspects of ongoing URC (or URLLC) services effectively. Presented herein are techniques that involve enhancing or optimizing CoMP mechanisms for applications that involve Ultra-Reliable Communication (URC) or Ultra-Reliable Low-Latency Communication (URLLC) services. These optimizations can also help to support a higher Highly Reliable Communication (HRC), URC, URLLC, and other Quality of Service (QoS) -aware applications in a network. Further, optimizations are proposed to provide URC or URLLC services over a single Protocol Data Unit (PDU) session in order to save Radio Access Network (RAN) and/or core network resources by tearing down redundant PDU sessions or for user equipment (UE) devices that do not support Redundancy Handler or Dual Connectivity capabilities but still require URC or URLLC services

    AUTOMATIC NETWORK TEST SCHEDULING AND EXECUTION BASED ON APPLICATION DETECTION

    Get PDF
    Techniques are described herein that provide a network and its management system with a deeper level of intelligence regarding the applications running on the network. This enables Information Technology (IT) administrators to understand which applications are on their networks and how those applications are performing

    WLC/AP FUNCTION ORCHESTRATOR

    Get PDF
    Dynamically positioning orchestration functions, which operate at the scale of a few Access Points (APs), to a cluster of APs maintains efficiency of operations as the number of functions and clusters increases. Especially in contrast to a deployment model in which all functions either operate at an individual AP or operate on the Wireless Local Area Network (LAN) Controller (WLC), positioning functions in limited clusters of APs optimizes compute load/time and message travel time between participants. This distributed type of structure becomes more effective as a WLC is pushed toward a cloud network deployment, where travel delay and scale may interfere with centralizing function operation at the WLC

    AUTOMATED SYSTEM TO ENFORCE ENTERPRISE DEFINED SERVICE LEVEL AGREEMENTS IN A 5G SYSTEM

    Get PDF
    Techniques are described herein for an automated system to enforce enterprise defined Service Level Agreements (SLAs) in a 5G System (5GS). This enforcement allows for management platform exchanges and permits a Network Data Analytics Function (NWDAF) to define target SLAs for specific applications, regions, and time windows. The NWDAF may additionally dynamically adjust differentiated parameters upward to achieve the target SLA where/when applicable, and downward to optimize the overall SLA cost where/when possible

    CONSTRAINED MACHINE LEARNING MODEL DEPLOYMENTS FOR OPERATIONAL TECHNOLOGY NETWORKS

    Get PDF
    Presented herein are techniques for formulating level and device specific machine learning (ML) models for operational technology (OT) networks that can be deployed closer to an end device (in a respective level) for constrained devices

    APPLICATION SPECIFIC 5G RAN SPLIT OPTIONS IN A SINGLE RADIO UNIT

    Get PDF
    Various technical specifications, such as Third Generation Partnership Project (3GPP) and Open Radio Access Network (O-RAN) specifications, define various functional splits that can be utilized for a Fifth Generation RAN (5G-RAN). For example, Split option 2 and Split option 7.2 are the typical implementations, and Split option 6 (Physical layer/femto application platform interface (PHY/FAPI)) is likely to be prevalent soon. Split option 7.2 is fronthaul heavy and involves strict latency budgets. For example, Split option 7.2 needs roughly four times the bandwidth of Split option 2/6 for the same amount of user plane throughput. Presented herein is a system in which a RAN Radio Unit (RU) can be operated simultaneously in two connectivity split options in order to cater to different use-cases simultaneously

    AUTOMATED ONBOARDING AND TIME-SENSITIVE NETWORK (TSN) FLOW CREATION OF DEVICES IN A TSN NETWORK ENVIRONMENT

    Get PDF
    Techniques described herein provide for automating a time-sensitive network (TSN) configuration using an edge inventory system. In particular, according to techniques described herein, an asset inventory system discovers a TSN-capable device, identifies the requirements of the TSN-capable device, and adds a TSN tag to the asset inventory system that describes the function of the device. The asset inventory system provides instructions to on-board the device to a network as TSN-mandatory and sets the latency bounds for the network based on known or discovered characteristics of the device
    corecore