Abstract:
A WTRU may perform cERFs. A method may include any of: transmitting, to a nEAR, a signal requesting an IP address identifying (e.g., associated with) a DNS server associated with the WTRU; applying, by the WTRU, any of EI record rules for the identified DNS server, or updating EI records with the IP address identifying the DNS server; transmitting, to a DNS server, a DNS query associated with a FQDN; receiving, in response to the DNS query, FQDN resolution from the DNS server; on condition that a mobility event of the WTRU occurs, transmitting, to the nEAR, a signal requesting information for updating the EI records of the WTRU; and applying, by the WTRU, any of the updated EI record rules in order to perform any of: (1) redirecting application session traffic to provides session continuity for the WTRU, and (2) breaking any number of application sessions.
Abstract:
Method, systems, and devices for transparent relocatable application instance deployment are described. A method performed by a Wireless Transmit/Receive Unit may comprise transmitting, to a Multi-access Edge Computing (MEC) system, a first message including a request to deploy the relocatable application instance at a target. The method may comprise receiving a second message including an indication to establish communication with the application instance and a Transparent Instance Relocation Session Identifier (TIRSI) and establishing, based on the second message, communication with the relocatable application instance at the target. The method may comprise transmitting a third message including a request for relocation of the application instance to another target. The method may comprise receiving a fourth message including an indication to establish communication with a relocated application instance at the another target and the TIRSI and establishing, based on the fourth message, communication with the relocated application instance at the another target.
Abstract:
Described herein are systems, methods, and instrumentalities associated with enabling a wireless transmit/receive unit (WTRU) to participate in multi-access edge computing (MEG) services. The WTRU may be a constrained WTRU, for example, in terms of computation, storage, and/or networking resources available to the WTRU. A function may be implemented on the WTRU to expose an interface to an MEG application on the WTRU, through which the MEG application may register with a network device such as an MEO host located at the edge of a mobile communication network and join an MEO service provided by the MEG host. A transport may be established between the WTRU and the MEG host to facilitate provision of the MEG service, and the transport may be modified and/or deleted, for example, based on mobility events at the WTRU and/or load conditions of the WTRU.
Abstract:
Systems and methods for using a communication system in a spectrum are provided. For example, a random access or RACH procedure may be performed where the random access or RACH procedure may be configured to reduce secondary interference and/or to be used in a pixel-based environment. The random access or RACH procedure may include selecting a RACH preamble; sending a RACH preamble and/or format information; determining a transmission power of the RACH preamble and/or the format information; determining a random access radio network temporary identifier (RA-RNTI) and preamble ID associated with the RACH preamble; and/or selecting a physical RACH (PRACH).
Abstract:
Systems and methods for using a communication system in a spectrum are provided. For example, a random access or RACH procedure may be performed where the random access or RACH procedure may be configured to reduce secondary interference and/or to be used in a pixel-based environment. The random access or RACH procedure may include selecting a RACH preamble; sending a RACH preamble and/or format information; determining a transmission power of the RACH preamble and/or the format information; determining a random access radio network temporary identifier (RA-RNTI) and preamble ID associated with the RACH preamble; and/or selecting a physical RACH (PRACH).
Abstract:
Coexistence gaps may permit one radio access technology (RAT) to coexists with another RAT by providing period in which one RAT may be silent and another may transmit. Methods may account for the RAT traffic and for the presence of other secondary users in a channel. Methods may be provided to dynamically change the parameters of a coexistence gap pattern, such as the duty cycle, to adapt to both the RAT traffic and the presence of other secondary users. Methods may include PHY methods, such as synchronization signal (PSS/SSS) based, MIB based, and PDCCH based, MAC CE based methods, and RRC Methods. Measurements may be provided to detect the presence of secondary users, and may include reporting of interference measured during ON and OFF durations, and detection of secondary users based on interference and RSRP/RSRQ measurements.
Abstract:
A method and apparatus for operating supplementary cells in licensed exempt (LE) spectrum. An aggregating cell operating in a frequency division duplex (FDD) licensed spectrum is aggregated with a LE supplementary cell operating in a time sharing mode for uplink (UL) and downlink (DL) operations. The LE supplementary cell may be an FDD supplementary cell dynamically configurable between an UL only mode, a DL only mode, and a shared mode, to match requested UL and DL traffic ratios. The LE supplementary cell may be a time division duplex (TDD) supplementary cell. The TDD supplementary cell may be dynamically configurable between multiple TDD configurations. A coexistence capability for coordinating operations between the LE supplementary cell with other systems operating in the same channel is provided. Coexistence gaps are provided to measure primary/secondary user usage and permit other systems operating in the LE supplementary cell channel to access the channel.
Abstract:
Systems and methods for using a communication system in a spectrum are provided. For example, a random access or RACH procedure may be performed where the random access or RACH procedure may be configured to reduce secondary interference and/or to be used in a pixel-based environment. The random access or RACH procedure may include selecting a RACH preamble; sending a RACH preamble and/or format information; determining a transmission power of the RACH preamble and/or the format information; determining a random access radio network temporary identifier (RA-RNTI) and preamble ID associated with the RACH preamble; and/or selecting a physical RACH (PRACH).
Abstract:
Embodiments include methods, systems, and apparatuses for content delivery using shared caching, and more specifically, a browser cache extension (BCE) between a local browser cache and a remote cache located on an edge server. In an embodiment, a remote BCE function on the edge server may create a shared cache folder containing a remote cache and an remote cache index file. A local BCE function in the local browser may be able to access the shared cache folder via a network file system (NFS) protocol. The local BCE function may merge the remote index file with a local index file from the local browser and retrieve the remote cache at the local browser.
Abstract:
A method of Inter-User Equipment (UE) Transfer (IUT) for use in an Internet Protocol (IP) Multimedia Subsystem (IMS) capable wireless transmit/receive unit (WTRU), the method comprising: receiving, at the IMS capable WTRU, an IUT session transfer command from a non-IMS capable WTRU via non-IMS signaling; translating, at the IMS capable WTRU, the IUT session transfer command to an IMS based message; and transmitting, from the IMS capable WTRU, the translated IMS based message to a Service Centralization and Continuity Application Server (SCC AS).