BASEBAND UNIT POOLING USING SHARED SCHEDULER

    公开(公告)号:US20230422279A1

    公开(公告)日:2023-12-28

    申请号:US17809363

    申请日:2022-06-28

    CPC classification number: H04W72/1252 H04W76/30 H04W76/10 H04W72/1263

    Abstract: Described is centralized scheduling of baseband unit resources of a hub, including allocating and deallocating baseband unit resources of a distributed unit instance based on anticipated and/or actual demand for the resources. For example, when user equipment transitions to a connected state, a corresponding message can be detected and used to determine whether sufficient baseband unit resources exist to handle the traffic of the newly connecting user equipment. If not, additional baseband unit resources are allocated, coupled to a node (cell), and the node scheduled to handle the user equipment traffic. When user equipment transitions to an inactive state, the corresponding command can be detected and used to determine whether the baseband unit resources are still needed for other traffic. If not, the baseband unit resources are deallocated.

    Protection Against Wireless Access Point Impersonation

    公开(公告)号:US20230308878A1

    公开(公告)日:2023-09-28

    申请号:US17702861

    申请日:2022-03-24

    CPC classification number: H04W12/122 H04W12/128 H04L63/145

    Abstract: An access point impersonation protection system (“the system”) can scan for wireless network signals to detect a wireless network provided by a malicious access point. The system can collect a network feature associated with the wireless network. The system can analyze the network feature and can provide analysis results to a machine learning classifier. The machine learning classifier can assign a classification to the access point. The classification can be a benign classification indicative of the access point being benign. The classification can be a malicious classification indicative of the access point being malicious. The network feature can be an active time, an SSID name, a vendor, a model, a signal strength, an authentication requirement, or a combination thereof. The system can alert upon identifying a malicious access point and apply counter measures to prevent the malicious access point from causing harm to nearby devices.

    Enhancing network services based on edge clouds

    公开(公告)号:US11483379B2

    公开(公告)日:2022-10-25

    申请号:US17099313

    申请日:2020-11-16

    Abstract: A method, computer-readable medium, and apparatus for supporting services for customer traffic using edge clouds are disclosed. For example, a processing system may receive an indication of a set of customer devices of a customer of a network provider and an indication of a service of an edge cloud to be applied to customer traffic of the customer devices, support configuration of a network of the network provider to support a customer segment for the customer including configuration of a gateway of the network and a switch of the network that is associated with the edge cloud, support configuration of a virtual network between the switch and an edge cloud element supporting the service, and support configuration of the switch to support an association of the customer segment and the virtual network for supporting routing of the customer traffic to the service via the virtual network.

    Extending distributed hash table-based software network functions to switching hardware

    公开(公告)号:US11140081B2

    公开(公告)日:2021-10-05

    申请号:US16589387

    申请日:2019-10-01

    Abstract: According to one aspect disclosed herein, a system can include a set of node peers, including a first subset implemented in software and a second subset implemented in hardware. The first subset can include a software node. The second subset can include a hardware node that includes a hardware cache, a processor, and a memory that stores computer-executable instructions. The hardware node can receive, from a network, a packet, and can determine if data that identifies a path associated with the packet is stored in the hardware cache. If not, the hardware node can query the software node to identify the path associated with the packet, and can receive, in response from the software node, the data that identifies the path, which then can be stored in the hardware cache. The hardware node can forward, along the path, the packet to a network element.

    Voice gateway for federated voice services

    公开(公告)号:US11037559B2

    公开(公告)日:2021-06-15

    申请号:US16234343

    申请日:2018-12-27

    Abstract: Devices, computer-readable media, and methods for submitting a modified voice input to a service based upon a user intent determined from a voice input in accordance with a voice interface of the service are disclosed. A processing system including at least one processor may obtain a voice input of a user, determine an intent from the voice input, identify a first service, from among a plurality of services, in accordance with the intent, and formulate a first modified voice input from the voice input in accordance with a voice interface of the first service, where each of the services is associated with one of a plurality of different voice interfaces. The processing system may further submit the first modified voice input to the first service, obtain a first voice response from the first service, and present a voice output to the user in accordance with the first voice response.

    Extending Distributed Hash Table-Based Software Network Functions to Switching Hardware

    公开(公告)号:US20210099388A1

    公开(公告)日:2021-04-01

    申请号:US16589387

    申请日:2019-10-01

    Abstract: According to one aspect disclosed herein, a system can include a set of node peers, including a first subset implemented in software and a second subset implemented in hardware. The first subset can include a software node. The second subset can include a hardware node that includes a hardware cache, a processor, and a memory that stores computer-executable instructions. The hardware node can receive, from a network, a packet, and can determine if data that identifies a path associated with the packet is stored in the hardware cache. If not, the hardware node can query the software node to identify the path associated with the packet, and can receive, in response from the software node, the data that identifies the path, which then can be stored in the hardware cache. The hardware node can forward, along the path, the packet to a network element.

Patent Agency Ranking