Abstract:
Spoofed radio control signaling instructions can be used to dynamically adapt management of the radio interface by radio control processors. More specifically, spoofed radio control signaling can be communicated to an accelerator application instantiated on a device-side of a radio control processor. The accelerator application can pre-process the spoofed radio control signaling before forwarding the instructions to a generic radio control processor. In one example, the generic radio control processor has a universal configuration that is capable of being adapted to different telecommunication protocols based on the spoofed radio control signaling. In another example, the spoofed radio control channel signaling is translated into control instructions at the accelerator application, which are forwarded to the generic radio control processor. The control instructions govern processing of downlink data channel transmissions and/or specify parameters of uplink transmissions.
Abstract:
A method for configuring a first base station within a cluster in a communications system having a plurality of cluster includes optimizing an operating parameter of the first base station in accordance with first utility function results from a first utility function associated with the first base station and second utility function results from a second utility function associated with a second base station within the cluster, the first utility function results and the second utility function results according to multiple settings for the operating parameter of the first base station, a first initialized setting of the operating parameter for the second base station, and a second initialized setting of the operating parameter for an external base station outside the cluster. The method also includes sharing the optimized operating parameter with the external base station.
Abstract:
Methods and devices for reducing traffic over a wireless link through the compression or suppression of high layer packets carrying predictable background data prior to transportation over a wireless link. The methods include intercepting application layer protocol packets carrying the predictable background data. In embodiments where the background data is periodic in nature, the high layer packets may be compressed into low-layer signaling indicators for communication over a low-layer control channel (e.g., an on off keying (OOK) channel). Alternatively, the high layer packets may be suppressed entirely (not transported over the wireless link) when a receiver side daemon is configured to autonomously replicate the periodic background nature according to a projected interval. In other embodiments, compression techniques may be used to reduce overhead attributable to non-periodic background data that is predictable in context.
Abstract:
Increased resource utilization efficiency can be improved by modeling path costs during admission and path-selection. Specifically, path costs for candidate paths are modeled based on load characteristics (e.g., current load, load variation, etc.) of links in the candidate paths. Path costs can represent any quantifiable cost or liability associated with transporting a service flow over the corresponding path. For example, path costs can correspond to a probability that at least one link in the path will experience an outage when transporting the service flow, a price charged by a network operator (NTO) for transporting the traffic flow over the candidate path, or a total network cost for transporting the flow over a candidate path. The candidate path having the lowest path cost is selected to transport a service flow.
Abstract:
Base stations (BSs) can remove inter-BS interference components from received uplink signals using downlink information communicated over a backhaul network. The downlink information is associated with downlink transmissions of neighboring base stations, and is used to remove the inter-BS interference in accordance with interference cancellation techniques, e.g., signal interference cancellation (SIC), etc. The downlink information includes information associated with downlink transmission of the interfering BSs, such as information bits (e.g., data), parity information, control information, modulation and coding scheme (MCS) parameters, forward error correction (FEC) parameters, and other information. Additionally, inter-BS interference can be suppressed using channel information of interference channels using interference suppression techniques, e.g., interference rejection combining (IRC), etc.
Abstract:
In one embodiment, a method for beam alignment includes determining an orientation of a device and performing angle compensation in accordance with the orientation of the device. The method also includes performing beamforming adaptation and modifying the beamforming adaptation in accordance with the orientation of the device.
Abstract:
Methods and apparatus optimize settings of a wireless communication network via an abstractor. The abstractor receives an event sent by the wireless communication network. The abstractor receives one or more proposed settings from one or more optimizers of the wireless communication network. The abstractor transmits one or more predicted values to the one or more optimizers. The predicted values predict the effect that the one or more proposed settings will have on the wireless communication network.
Abstract:
An embodiment method includes receiving service parameters for a service and locating logical network nodes for a service-specific data plane logical topology at respective physical network nodes among a plurality of physical network nodes according to the service parameters, a service-level topology, and a physical infrastructure of the plurality of physical network nodes. The method also includes defining connections among the logical network nodes according to the service parameters, the service-level topology, and the physical infrastructure, and defining respective connections for a plurality of UEs to at least one of the logical network nodes according to the service parameters, the service-level topology, and the physical infrastructure. The method further includes defining respective functionalities for the logical network nodes.
Abstract:
A method for decompressing data includes receiving, by a network element, a first plurality of packets. Also, the method includes receiving, by the network element, a second plurality of packets. Additionally, the method includes decompressing the first plurality of packets by a first decompressor using a first compression scheme and decompressing the second plurality of packets by a second decompressor using a second compression scheme.
Abstract:
Historical decoding can be performed in accordance with pilot signal retransmission or control information retransmission to reduce the amount network resources consumed during data recovery. In one example, historical decoding is achieved through retransmitting a sub-set of coded bits carried by an earlier transmission, which are compared with a corresponding portion of the original signal (stored in memory) to obtain improved channel state information (CSI) relating to that earlier transmission. In another example, historical decoding is achieved through communicating parity information related to a sub-set of the coded bits carried by an earlier transmission, which are used in accordance with a data aided CSI technique to obtain the improved CSI relating to that earlier transmission. In yet another example, historical decoding is achieved by re-transmitting control information carried by an earlier transmission, which is used to decode an original signal (stored in memory).