Abstract:
One or more devices may be configured to store jurisdiction information that associates each of a plurality of base stations with at least one jurisdiction. The one or more devices may establish a session, between a first base station and a user device, that uses a frequency. The one or more device may record handover information based on the first base station handing over the session to a second base station. The handover information may indicate an amount of data used while the session is hosted by the first base station. The one or more devices may determine a particular jurisdiction associated with the first base station based on the jurisdiction information. The one or more devices may cause a particular rights holder to be compensated for use of the frequency based on the amount of data used while the session is hosted by the first base station.
Abstract:
A station assisted interference measurement scheme is described containing a system and devices that facilitate the measurement of interference levels or path loss values between nearby potentially interfering transmitting transceivers and candidate victim receivers. Such interference levels or path loss values are used to assist intelligent assignment of communication channels in an authorized shared access system (ASAS). Using control signals from a controller of the ASAS, suspected interfering devices transmit specialized signals on specific channels at specific times that may have a waveform and/or bit format different from typically used data communication signals. A candidate victim receiver may receive one or more of the specialized signals and measure a signal parameter of the received specialized signal. The controller of the authorized shared access system uses the measured signal parameters to determine interference between devices and improve the assignment of communication channels to mitigate interference.
Abstract:
Devices and methods are provided for implementing a shared radio frequency spectrum allocation system. Access points and end user devices in an Authorized Shared Access System are allowed to access a channel of the shared radio frequency spectrum managed by an Authorized Shared Access System controller. Access points provide a communication, or frequency, channel over which similarly configured end user devices obtain access to data networks for client devices. Secure access to the allocated channel of the shared radio frequency spectrum is provided, thereby preventing rogue devices from gaining uncontrolled, or unauthorized, access to a channel of the shared radio frequency spectrum that may result in interference with other users of the channel including higher priority users. A secure synthesizer and secure encrypted tuning control words uniquely and securely control local channel usage.
Abstract:
A radio access network (RAN) mobility management element can receive a satellite-based measurement of a geolocation of an airborne mobile device. The RAN mobility management element can determine, based on the satellite-based measurement, a distance between the geolocation of the airborne mobile device and a geolocation of a serving cell that is serving the airborne mobile device, and a respective distance between the geolocation of the airborne mobile device and a respective geolocation of each cell of a plurality of cells. The RAN mobility management element can determine whether to hand over the airborne mobile device to a cell, included in the plurality of cells, based on the distance between the geolocation of the airborne mobile device and the geolocation of the serving cell, and a distance between the geolocation of the airborne mobile device and a geolocation of the cell included in the plurality of cells.
Abstract:
Techniques described herein may be used to manage a wireless telecommunications network that is subject to carrier restrictions. In a handover procedure, a source base station may assign an alternative primary carrier to a user device if the current primary carrier (or a secondary carrier thereof) is prohibited by a target base station. An unpaired downlink carrier may be aggregated to the alternative primary carrier as a supplemental downlink (SDL) carrier. New primary carriers may be created by joining unpaired downlink carriers with unpaired uplink carriers. New primary carriers may include a high frequency downlink carrier and a low frequency uplink carrier. New primary carriers may be allocated to wireless devices within a coverage area based on device type and/or a signal propagation quality of each wireless device.
Abstract:
The examples describe a self-protection feature in components of an authorized shared access system (ASAS). In the ASAS, radio frequency spectrum is shared by different users having different levels of priority when accessing the shared radio frequencies. Higher-tiered user equipment, such as radar systems, generate signals having significantly higher levels of power than the lowest tier user equipment. Exposure to the high power signals may damage the lower-tiered user equipment. The examples describe a lower-tiered access point device and a lower-tiered end user device that participate in the shared access system to communicate over the shared radio frequency spectrum under control of a shared access system manager. In response to a threat of high power signals, the access points and the end user devices are instructed to enter a self-protection mode. The self-protection is enabled by a local switch system within the access point and the end user devices.
Abstract:
The examples describe a self-protection feature in components of an authorized shared access system (ASAS). In the ASAS, radio frequency spectrum is shared by different users having different levels of priority when accessing the shared radio frequencies. Higher-tiered user equipment, such as radar systems, generate signals having significantly higher levels of power than the lowest tier user equipment. Exposure to the high power signals may damage the lower-tiered user equipment. The examples describe a lower-tiered access point device and a lower-tiered end user device that participate in the shared access system to communicate over the shared radio frequency spectrum under control of a shared access system manager. In response to a threat of high power signals, the access points and the end user devices are instructed to enter a self-protection mode. The self-protection is enabled by a local switch system within the access point and the end user devices.
Abstract:
A station assisted interference measurement scheme is described containing a system and devices that facilitate the measurement of interference levels or path loss values between nearby potentially interfering transmitting transceivers and candidate victim receivers. Such interference levels or path loss values are used to assist intelligent assignment of communication channels in an authorized shared access system (ASAS). Using control signals from a controller of the ASAS, suspected interfering devices transmit specialized signals on specific channels at specific times that may have a waveform and/or bit format different from typically used data communication signals. A candidate victim receiver may receive one or more of the specialized signals and measure a signal parameter of the received specialized signal. The controller of the authorized shared access system uses the measured signal parameters to determine interference between devices and improve the assignment of communication channels to mitigate interference.
Abstract:
The described examples are usable in an authorized shared access system to provide a front end sub-band filter system and method that securely allows the selection of a front end sub-band filter for receiving signals in a shared radio frequency spectrum (SRFS). A controller manages allocation of communication channels in the SRFS using an encrypted signal. The encrypted signal is only decrypted by a filter controller of a filter selection system. Based on the decrypted signal, the filter controller instructs a filter switch which band pass filters are to be incorporated into a front end communication path. The encrypted signal prevents unauthorized users from accessing a communication channel, and the selection of a specific sub-band filter prevents transmitter interference into other communications channels in other sub-bands, and prevents the reception of signals or interference from other communications channels in other sub-bands.
Abstract:
Techniques described herein may be used to manage a wireless telecommunications network that is subject to carrier restrictions. In a handover procedure, a source base station may assign an alternative primary carrier to a user device if the current primary carrier (or a secondary carrier thereof) is prohibited by a target base station. An unpaired downlink carrier may be aggregated to the alternative primary carrier as a supplemental downlink (SDL) carrier. New primary carriers may be created by joining unpaired downlink carriers with unpaired uplink carriers. New primary carriers may include a high frequency downlink carrier and a low frequency uplink carrier. New primary carriers may be allocated to wireless devices within a coverage area based on device type and/or a signal propagation quality of each wireless device.