Abstract:
A device may receive first common public radio interface (CPRI) information associated with a first CPRI format. The device may determine a translation key associated with the first CPRI format. The translation key may include information associated with translating the first CPRI information to a second CPRI format. The second CPRI format may be different from the first CPRI format. The device may generate second CPRI information based on processing the first CPRI information with the translation key. The second CPRI information may be associated with the second CPRI format. The device may provide the second CPRI information associated with the second CPRI format.
Abstract:
A device may manage end-to-end traffic across a network based on adjusting Quality of Service (QoS) parameters. The device may receive performance requirements for packets corresponding to different applications and QoS levels within segments across the network, and measure performance values along the segments across the network. The device may also identify the application data flows and their associated network locations failing to meet performance values across network segments, and detect an application data flow failing to meet end-to-end (E2E) performance requirements. The device may determine network location(s) to adjust the QoS parameters of the detected application data flow, and adjust its QoS parameters at the determined network location(s) to bring the detected application data flow into compliance with its E2E performance requirements, while maintaining E2E performances compliance of other application data flows.
Abstract:
A method, performed by a computer device, may include receiving an indication that a first user has acquired rights to access a digital content; generating a key for the digital content; encrypting the digital content using the generated key to generate encrypted digital content; obtaining a first passcode; and providing the first passcode and the encrypted digital content to a user device associated with the first user. The method may further include receiving, from the user device, a request for the key, wherein the request include the first passcode; determining that the first passcode is valid; determining that the key has not expired; and providing the key to the user device, in response to determining that the first passcode is valid and that the key has not expired.
Abstract:
One or more devices, including one or more virtual elements associated with a virtual transmission system that emulates one or more physical devices of a physical transmission system, may receive provisioning information for a client device; provision the client device to prepare the client device to receive or transmit a data flow via the one or more virtual elements based on the provisioning information; receive the data flow; and transmit the data flow from the client device or to the client device via the one or more virtual elements based on provisioning the client device. The data flow may be transmitted or received via the one or more virtual elements to circumvent one or more gateways of the physical transmission system.
Abstract:
A method may include transmitting multiple antenna beams to an unmanned aerial vehicle (UAV) and determining a location of the UAV. The method may also include identifying a network slice to service the UAV, assigning the identified network slice to the UAV and performing antenna beam management for the UAV while the UAV is in flight.
Abstract:
A device may receive device data identifying Internet of Things (IoT) devices and may receive network data identifying network traffic patterns associated with the IoT devices. The device may process the device data and the network data, with a machine learning model, to determine parameters for charging each of the IoT devices and may determine that a particular IoT device of the IoT devices requires charging based on particular parameters associated with the particular IoT device. The device may receive location data identifying a location of the particular IoT device and may cause, based on the location data, one or more chargers to wirelessly provide a radio frequency power beam to the particular IoT device based on the particular parameters.
Abstract:
A Multi-access Edge Computing (MEC) device receives first parameters associated with a user device from a first radio access network (RAN) device. The MEC device performs functions associated with an application being executed by the user device and the MEC device is co-located with the RAN device. The MEC device receives second parameters associated with the user device from a core network device. The MEC device modifies performance of the functions based on the received first and second parameters and provides third parameters associated with the user device to a second RAN device that is co-located with the MEC device for adjusting performance of a network.
Abstract:
A base station may allocate wireless communication resources to configure a synthetic wireless communication signal for use as a radar signal. The synthetic wireless communication signal may be configured according to a wireless communication protocol of a wireless communication network that is associated with the base station. The base station may transmit, from an antenna and toward an area associated with the base station, the synthetic wireless communication signal. The base station may detect a reflected signal that is associated with the synthetic wireless communication signal. The base station may process the reflected signal to generate radar data; and perform an action associated with the radar data and the area.
Abstract:
Systems and methods provide a latency certification service. One or more network devices in an application service layer network receive a service request for a latency certification service and instantiate a Transmission Control Protocol (TCP) proxy for a data session between an application server device and a user equipment (UE) device. The one or more network devices obtain a digital certificate for the TCP proxy. The one or more network devices receive, at the TCP proxy, a data packet from the UE device; apply a certified timestamp to the data packet to form a certified timestamped data packet; and forward the certified timestamped data packet to the application server device.
Abstract:
A method and device is disclosed to select a network access link for an application in a user equipment (UE) device to use for communicating with a network. The method may include determining a plurality of network access links associated with the UE device and determining one or more criteria associated with a request to access a network. The criteria may include throughput, financial cost, latency, or signal strength. The method may include determining a score for each of the plurality of network access links with respect to the criteria. The score score may be based on historical data related to the criteria. The method may include comparing the score for each of the plurality of network access links with the criteria and selecting one of the network access links for an application to use to communicate with the network.