Self-optimizing network for narrowband internet-of-things in-band deployment modes

    公开(公告)号:US10743199B1

    公开(公告)日:2020-08-11

    申请号:US16265036

    申请日:2019-02-01

    Abstract: Techniques for optimizing performance of narrowband Internet-of-Things (NB-IoT) devices in a wireless wide area network (WWAN) are described. In one embodiment, a method includes providing a NB-IoT base station in an in-band deployment mode to operate within a WWAN. The NB-IoT base station is configured to use a physical resource block of the WWAN for communicating with a plurality of NB-IoT devices. The method includes causing a reduction of a power level for a transmission from an initial power level to a first reduced power level. The method includes obtaining parameters associated with performance and throughput for the WWAN and comparing the parameters to a quality threshold. Based on the comparison of the parameters to the threshold, the method includes determining whether or not to reduce the power level for the physical resource block from the first reduced power level to a second reduced power level.

    System and method to facilitate unequal cost multipath routing in a network environment

    公开(公告)号:US10701615B2

    公开(公告)日:2020-06-30

    申请号:US15413067

    申请日:2017-01-23

    Abstract: An example method is provided in one example embodiment and may include determining a first routing metric associated with a first communication network, wherein the first routing metric identifies a capability of the first communication network to handle an Internet Protocol (IP) flow for a user equipment (UE); determining a second routing metric associated with a second communication network, wherein the second routing metric identifies a capability of the second communication network to handle the IP flow for the UE and wherein the second routing metric is different from the first routing metric; and routing the IP flow for the UE using the first communication network or the second communication network based, at least in part, on the first routing metric and the second routing metric.

    Identifying anomalies in a network
    159.
    发明授权

    公开(公告)号:US10375100B2

    公开(公告)日:2019-08-06

    申请号:US15795670

    申请日:2017-10-27

    Abstract: Various implementations disclosed herein enable identifying anomalies in a network. For example, in various implementations, a method of identifying anomalies in a network is performed by a network node. In various implementations, the network node includes one or more processors, and a non-transitory memory. In various implementations, the method includes generating a characteristic indicator that characterizes a device type based on communications associated with a first device of the device type. In various implementations, the method includes determining, based on communications associated with the first device, a performance indicator that indicates a performance of the first device. In various implementations, the method includes synthesizing an anomaly indicator as a function of the performance indicator in relation to the characteristic indicator.

    DYNAMIC POLICY-BASED ON-BOARDING OF DEVICES IN ENTERPRISE ENVIRONMENTS

    公开(公告)号:US20190215692A1

    公开(公告)日:2019-07-11

    申请号:US15868573

    申请日:2018-01-11

    Abstract: In one embodiment, a method for providing access to wireless networks may include receiving, by a wireless network access provider from a user device, a request to access a wireless network. The method may include obtaining data representing a policy applicable to the access request, sending the access request, augmented with the policy, to an identity provider associated with the user and having no pre-existing relationship with the access provider, and receiving, from the identity provider, an access request response indicating whether or not the policy is met. The method may include communicating, to the wireless device, an indication that the access request has been accepted, if the policy is met, or an indication that the access request has been rejected, if the policy is not met. The access provider and identity provider may be members of an identity and access federation that communicate over a dynamically established secure connection.

Patent Agency Ranking