Abstract:
A location estimation method and a communication device configured to estimate location and automatically connect to one or more wireless display devices based on the determined location. The estimation of location can be based on one or more location signatures that include information of the wireless display device(s). The location estimation method can include identifying available access points (APs) and wireless display adapters, determining wireless characteristics of the available APs and wireless display adapters, calculating match scores based on the wireless characteristics of the available APs and the wireless characteristics of the available wireless display adapters, determining a location signature based on the determined match scores, and determining a location based on the location signature. The communication device can be configured to automatically connect to the wireless display device(s). The communication device can operate in a standby display mode upon the connection.
Abstract:
This disclosure describes systems, methods, and devices related to service function chaining in wireless networks. A communications system may include a communication control function to select one or multiple communication service functions associated with establishing service function chaining (SFC) services for telecommunications; a service orchestration and chaining function (SOCF) to establish the SFC services; and a service orchestration exposure function (SOEF) to expose the SFC services to an application function (AF) of the system.
Abstract:
Various embodiments herein provide techniques related to sixth generation (6G) system architecture and functions. For example, embodiments may relate to one or more of: Design principle and system architecture; Orchestration frontend service; Dynamic device-network computing scaling; RDMA over radio; Cloud workload offloading to network; Computing-embedded air interface; Service chain aware transport; and/or Enabling Al capabilities. Other embodiments may be described and/or claimed.
Abstract:
Various embodiments herein provide techniques related to a cellular network. Specifically, a cyber attack detection function (CDAF) of the cellular network may be configured to: identify operation state data from an analytics logical function (AnLF), wherein the operation state data corresponds to an analytics output of the AnLF; identify, based on the operation state data, a cyber-attack of at least one element of the cellular network; and transmit, based on the identification of the cyber-attack, a report that includes an indication of the cyber-attack. Other embodiments may be described and/or claimed.
Abstract:
Various embodiments herein provide techniques related to an artificial intelligence application function (AI AF) and an artificial intelligence function (AIF) in a cellular network. In embodiments, the cellular network may be a fifth generation (5G) network, a sixth generation (6G) network or some other beyond-5G network. Other embodiments may be described and/or claimed.
Abstract:
System and techniques for secure wireless association are described herein. A station (STA) may transmit a probe request for the wireless network that includes identification of a certificate. An access point (AP) receiving the probe request may obtain the identified certificate and use the certificate to encrypt a key. The encrypted key may then be included in a beacon by the AP. The STA may then obtain the encrypted key from the beacon, decrypt the key with the certificate, and then use the key to associate to the wireless network via the AP.