DISTRIBUTED FAULT-TOLERANT STATE STORE FOR VIRTUALIZED RADIO ACCESS NETWORKS

    公开(公告)号:US20220377563A1

    公开(公告)日:2022-11-24

    申请号:US17323653

    申请日:2021-05-18

    Abstract: Described are examples for providing a distributed fault-tolerant state store for a virtualized base station. In an aspect, a first server at a datacenter may perform physical layer processing for at least one virtualized base station. While performing the physical layer processing, the first server may generate inter-slot physical layer state data during a first slot. The inter-slot physical layer state data is to be used in a subsequent slot. The first server may periodically transmit the inter-slot physical layer state data to one or more other servers of the plurality of servers within the datacenter. One of the other servers may take over the physical layer processing for the at least one virtualized base station based on the inter-slot physical layer state data, for example, in response to a fault at the first server or a migration of the at least one virtualized base station.

    OPTIMIZATION OF GUARD BANDS IN MULTI-NUMEROLOGY 5G NETWORKS

    公开(公告)号:US20240422813A1

    公开(公告)日:2024-12-19

    申请号:US18335700

    申请日:2023-06-15

    Abstract: The present optimization of guard bands repurposes some guard band spectrum for data transmission in a 5G network. This approach takes spectrum that is otherwise “wasted” for guard bands to enable overall spectrum utilization to be increased. To mitigate effects of inter-numerology interference (INI) with narrower guard band bandwidth, physical resource blocks (PRBs) for particular user equipment (UE) are allocated to BWPs that are modified with increased bandwidth that comes from narrowing the guard band bandwidth. These particular UEs have high signal strength, for example, as characterized by SINR (signal-to-interference plus noise ratio), relative to other UE. Allocating PRBs for high signal strength UE in BWPs near the edges of the narrower guard band increases the risk of INI, but the higher signal strength for these UE helps to lessen the INI impact and enable overall throughput for all users to be maximized in the network.

    END-TO-END SECURE COMMUNICATIONS FOR PRIVILEGED 5G NETWORK TRAFFIC

    公开(公告)号:US20240114382A1

    公开(公告)日:2024-04-04

    申请号:US18500302

    申请日:2023-11-02

    Abstract: Software-defined networking and network function virtualization constructs are leveraged across diverse portions of 5G network infrastructure including radio access network, mobile core, and wide area network to enable a security property to be implemented for a network slice from end-to-end to provide for strong logical and/or physical isolation of slice traffic from other network traffic. One or more network slice controllers are implemented in the 5G network that are interoperable as separate elements, or under centralized control, to enable the underlying diverse network infrastructure to be abstracted and virtualized so that infrastructure properties can be mapped across infrastructure types for the end-to-end slice. Network resources may be dynamically allocated based on real-time traffic demands to instantiate the end-to-end network slices on a customized basis to meet particular quality of service parameters for various traffic types, including privileged traffic that may be prioritized when resources become scarce and network congestion occurs.

    PRIVACY TRANSFORMATIONS IN DATA ANALYTICS
    25.
    发明公开

    公开(公告)号:US20240104248A1

    公开(公告)日:2024-03-28

    申请号:US18374316

    申请日:2023-09-28

    CPC classification number: G06F21/6263 G06F21/6254 G16Y40/50

    Abstract: Systems and methods are provided for performing privacy transformation of data to protect privacy in data analytics under the multi-access edge computing environment. In particular, a policy receiver in an edge server receives privacy instructions. Inference determiner in the edge server in a data analytics pipeline receives data from an IoT device and evaluates the data to recognize data associated with personally identifiable information. Privacy data transformer transforms the received data with inference for protecting data privacy by preventing exposure of private information from the edge server. In particular, the privacy data transformer dynamically selects a technique among techniques for removing information that is subject to privacy protection and transforms the received data using the technique. The techniques includes reducing resolution of image data such that inference enables object recognition without sufficient details to prevent other servers in the data analytics pipeline to determine identifies of the object deeper inferences.

    COMPUTE-AWARE RESOURCE CONFIGURATIONS FOR A RADIO ACCESS NETWORK

    公开(公告)号:US20230388851A1

    公开(公告)日:2023-11-30

    申请号:US18202041

    申请日:2023-05-25

    CPC classification number: H04W28/06 H04W28/0942

    Abstract: Aspects of the present disclosure relate to allocating RAN resources among RAN slices using a machine learning model. In examples, the machine learning model may determine an optimal RAN resource configuration based on compute power needs. As a result, RAN resource allocation generation and compute power requirements may improve, even in instances with changing or unknown network conditions. In examples, a prediction engine may receive communication parameters and/or requirements associated with service-level agreements (SLAs) for applications executing at least partially at a device in communication with the RAN. The RAN may generate one or more RAN resource configuration for implementation among RAN slices. Upon a change in network conditions or SLA requirements, an optimal RAN configuration may be determined in terms of required compute power.

    DYNAMIC 5G NETWORK SLICING TO MAXIMIZE SPECTRUM UTILIZATION

    公开(公告)号:US20230090021A1

    公开(公告)日:2023-03-23

    申请号:US18071386

    申请日:2022-11-29

    Abstract: In a 5G network, a slice controller operating in a radio access network (RAN) is arranged to make predictions of channel state information (CSI) for user equipment (UE) on the network using a predictive propagation model. The slice controller uses the predicted CSI to schedule subcarriers and time slots associated with physical radio resources for data transmission on slices of the 5G network between a 5G radio unit (RU) and the UE to maximize network throughput on a slice for the radio spectrum that is utilized for a given time period. In view of the CSI predictions, the slice controller controls operations of the MAC (Medium Access Control) layer functions based on PHY (physical) layer radio resource subsets to schedule the subcarrier and time slots for data transmissions on a slice over the 5G air interface from RU to UE.

    EGRESS TRAFFIC ENGINEERING IN PUBLIC CLOUDS WITH COMMODITY ROUTERS ON THE WAN EDGE

    公开(公告)号:US20230041081A1

    公开(公告)日:2023-02-09

    申请号:US17397560

    申请日:2021-08-09

    Abstract: The present application relates to egressing traffic from a public cloud network. An egress traffic manager configures routing at hosts and edge routers within the public cloud network. The egress traffic manager determines, for an edge router, a plurality of current border gateway protocol (BGP) sessions with external networks. The egress traffic manager configures a virtual router hosted on the edge router to route a portion of egress traffic to a selected one of the external networks via one of the BGP sessions. A host is configured to route the portion of egress traffic within the public cloud network to the edge router. An edge router configured to route, by the virtual router, the portion of egress traffic from the edge router to the selected one of the external networks.

    ORCHESTRATION OF OVERLAY PATHS FOR WIDE AREA NETWORK VIRTUALIZATION

    公开(公告)号:US20230039665A1

    公开(公告)日:2023-02-09

    申请号:US17397525

    申请日:2021-08-09

    Abstract: The present application relates to traffic routing for overlay paths in a public cloud network. A path orchestrator receives a configuration of a set of overlay paths for a wide area network virtualization from a client, each overlay path including virtual routing nodes associated with respective geographic regions and at least one policy for a link between the virtual routing nodes. The path orchestrator is configured to instantiate a plurality of virtual routers on computing resources of the public cloud network located within the respective geographic regions based on the configuration, each virtual router configured to route traffic according to the policy for each link associated with the virtual routing node corresponding to the virtual router. The path orchestrator is configured to scale the plurality of virtual routers based on traffic for the client on the set of overlay paths.

Patent Agency Ranking