ADAPTIVE GUARD INTERVAL CALIBRATION
    62.
    发明公开

    公开(公告)号:US20230198823A1

    公开(公告)日:2023-06-22

    申请号:US18172479

    申请日:2023-02-22

    CPC classification number: H04L27/2646 H04L27/2607 H04W24/02 H04W84/12

    Abstract: Adaptive guard interval calibration may be provided. A computing device may receive a first plurality of delay spread values. Each of the first plurality of delay spread values may respectively comprise an amount of time between when each of a respective first plurality Access Points (APs) receives a first tuning symbol from a first calibrating AP and when each of the respective first plurality APs receives a final multipath reflection of the first tuning symbol. Next, a first Guard Interval (GI) may be determined based on the first plurality of delay spread values. The first calibrating AP may then be provisioned with the first GI.

    Implementing service level agreements in an identity federation

    公开(公告)号:US11627498B2

    公开(公告)日:2023-04-11

    申请号:US17148146

    申请日:2021-01-13

    Abstract: Embodiments herein describe techniques for dynamically negotiating an SLA between a roaming device and a VN in an identity federation. Instead of an IDP having to individually negotiate with a VN to decide on an SLA before a user device roams to the VN, the parties can dynamically negotiate the SLA after the user device has detected the VN (but before the device is permitted to connect or associate with the VN). In one embodiment, when a roaming user device comes within wireless range of a VN, the roaming device receives an advertisement from the VN that indicates the current SLA (or SLAs) offered by the VN. The roaming device can compare this offered SLA to a stored SLA in an identity profile the device received from the IDP to determine whether to accept the offer. In another embodiment, the SLA is instead negotiated between VN and the IDP.

    Load-balancer for saturated wireless

    公开(公告)号:US11589263B2

    公开(公告)日:2023-02-21

    申请号:US17010032

    申请日:2020-09-02

    Abstract: Load balancing for saturated wireless may be provided. A computing device may determine that an Access Point (AP) has reached a saturation point. A first Service Device (SD) having a first SD coverage area that overlaps an AP coverage area associated with the AP may be identified. Then a license to operate within a frequency spectrum segment for the first SD coverage area may be obtained. A plurality of user devices may be moved from the AP to the first SD. The first SD may then service the plurality of user devices using at least a portion of the frequency spectrum segment.

    Secure creation of application containers for fifth generation cellular network slices

    公开(公告)号:US11558779B2

    公开(公告)日:2023-01-17

    申请号:US17684263

    申请日:2022-03-01

    Abstract: Systems, methods, and computer-readable media for the secure creation of application containers for 5G slices. A MEC application in a MEC layer of a 5G network can be associated with a specific network slice of the 5G network. A backhaul routing policy for the MEC application can be defined based on the association of the MEC application with the specific network slice of the 5G network. Further, a SID for the MEC application that associates the MEC application with a segment routing tunnel through a backhaul of the 5G network can be generated. A MEC layer access policy for the MEC application can be defined based on the SID for the MEC application. As follows, access to the MEC application through the 5G network can be controlled based on both the backhaul routing policy for the MEC application and the MEC layer access policy for the application.

    Dynamic allocation and re-allocation of learning model computing resources

    公开(公告)号:US11556384B2

    公开(公告)日:2023-01-17

    申请号:US16818955

    申请日:2020-03-13

    Abstract: This disclosure describes techniques for improving allocation of computing resources to computation of machine learning tasks, including on massive computing systems hosting machine learning models. A method includes a computing system, based on a computational metric trend and/or a predicted computational metric of a past task model, allocating a computing resource for computing of a machine learning task by a current task model prior to runtime of the current task model; computing the machine learning task by executing a copy of the current task model; quantifying a computational metric of the copy of the current task model; determining a computational metric trend based on the computational metric; deriving a predicted computational metric of the copy of the current task model based on the computational metric; and, based on the computational metric trend, changing allocation of a computing resource for computing of the machine learning task by the current task model.

    AUTOMATED ACTIVATION OF UNSOLICITED PROBE RESPONSES

    公开(公告)号:US20230007516A1

    公开(公告)日:2023-01-05

    申请号:US17366363

    申请日:2021-07-02

    Abstract: Automated activation of unsolicited probe responses may be provided. Probe traffic data may be received. Then, based on the probe traffic data, a plurality of probe traffic cost metrics may be determined. Each one of the plurality of probe traffic cost metrics may be respectively associated with a plurality of Unsolicited Probe Response (UPR) modes. An Access Point (AP) may then be operated in a one of the plurality of UPR modes that has a respective probe traffic cost metric that indicates a lowest probe traffic cost of the plurality of probe traffic cost metrics.

    Proactive notification of wireless client address rotation

    公开(公告)号:US11540116B2

    公开(公告)日:2022-12-27

    申请号:US17329819

    申请日:2021-05-25

    Abstract: A network controller provides proactive notification of a wireless client device's address rotation to layer 2 (L2) and/or layer 3 (L3) devices. Traditional methods of device address discovery rely on broadcasting of address queries across a plurality of links until a path to a device having the queried address responds. As device address changes become more frequent in an effort to improve user privacy, traditional methods of address discovery impose a large burden on networks, reducing their performance and efficiency. By proactively propagating address changes to upstream devices, the need for broadcast oriented address discovery techniques is reduced, resulting in improved network performance.

    ENCRYPTED NONCES AS ROTATED DEVICE ADDRESSES

    公开(公告)号:US20220386117A1

    公开(公告)日:2022-12-01

    申请号:US17333463

    申请日:2021-05-28

    Abstract: Rotation of a wireless client device address is based on an encryption key and a nonce value. Key information and nonce value information are shared between a wireless client device and a network infrastructure component over a secure communication channel. The wireless client device encrypts the nonce value using the key information and encodes the encrypted value as a device address. The wireless client device then identifies itself via a source address value in a message transmitted over a wireless network. Upon receiving the message, the network infrastructure component decrypts information derived from the source address value and compares the resulting data to the nonce value. If a match is identified, the network infrastructure identifies the wireless client device as a source of the message. In some embodiments, the nonce value is updated with each rotation to provide for improved entropy of generated device addresses.

Patent Agency Ranking