Patent application number | Description | Published |
20090316585 | METHODS AND APPARATUS FOR COORDINATING NETWORK MONITORING AND/OR AUTOMATING DEVICE CONFIGURATIONS BASED ON MONITORING RESULTS - Methods and apparatus are described that enable a deployment of a system of wireless nodes, e.g., femtocells, which can self-configure themselves into a balanced and optimized wireless network. In various embodiments, access points switch between a network monitoring mode in which network monitoring is performed and a communications mode in which the access point serves one or more wireless terminals and communicates traffic data to/from the wireless terminals. Traffic data transmission to wireless terminals are not supported in network monitoring mode. Based on information gathered from one or more access nodes while they operating in network monitoring mode of operation, access point configuration information is generated and one or more access points are automatically configured. | 12-24-2009 |
20100091758 | TRANSMISSION SCHEDULING OPTIMIZATION METHOD AND WIRELESS USER EQUIPMENT DEVICE - A wireless user equipment device transmits a control channel and a data channel. Each of the control channel and the data channel include a plurality of time slots. The control channel is configured to transmit control information and includes both transmission time slots and non-transmission time slots. The data channel is configured to transmit data packets. The device further includes a processor configured to schedule at least one data packet for transmission in at least one data channel time slot that is concurrent to at least one control channel transmission time slot, and a transmission module configured to transmit the at least one data packet in the at least one data channel time slot that is concurrent to the at least one control channel transmission time slot. | 04-15-2010 |
20110128926 | METHOD, SYSTEM AND DEVICE FOR HIGH SPEED UPLINK PACKET ACCESS SCHEDULING - A method, apparatus and computer program product comprises determining a rise-over-thermal (RoT) budget associated with a cell within a communication network for user equipment served by the cell, determining a number of user equipment served by the cell to receive a minimum-grant of an uplink channel, determining a high-grant for allocation to a selected user equipment, the high-grant allowing the selected user equipment to communicate in the uplink channel of the communication network, the high-grant being based on the RoT budget, and allocating the high-grant to the selected user equipment and the minimum-grant to all other user equipment served by the cell. | 06-02-2011 |
20120190372 | RF CONSIDERATIONS FOR USER EQUIPMENT HANDOFF - A method for managing uplink signal quality at a radio node and at a macrocell and/or external cell, includes determining a first transmit power associated with a radio node of a small-cell radio access network and a second transmit power associated with a macrocell and/or an external cell. A desense value associated with an uplink of the radio node of the small-cell radio access network is provided, which enables balancing of a first signal to noise-plus-interference ratio associated with an uplink of the small-cell radio access network and a second signal to noise-plus-interference ratio associated with an uplink of the macrocell and/or external cell in relation to a downlink of the radio node, thereby managing uplink signal quality at the radio node of the small-cell radio access network and at the macrocell and/or external cell. | 07-26-2012 |
20130208643 | METHOD AND APPARATUS FOR TOPOLOGY MANAGEMENT FOR HANDOVERS IN HETEROGENEOUS NETWORKS - A method comprises receiving a measurement report, the measurement report containing information from a user equipment, the information being associated with a desired local Radio Access Network (RAN) cell to which the user equipment is to hand-in; and utilizing the information in the measurement report to disambiguate at least one target local RAN and cell from a plurality of local RANs and cells, the at least one target local RAN and cell including the desired local RAN cell. | 08-15-2013 |
20130210436 | METHOD AND APPARATUS FOR TOPOLOGY MANAGEMENT FOR HANDOVERS IN HETEROGENEOUS NETWORKS - A method comprises receiving a relocation required message for a user equipment from a source Radio Access Network (RAN); multicasting a relocation request to multiple local RANs; receiving a first relocation acknowledgement from a first local RAN of the multiple local RANs to which a user equipment may be handed into; and forwarding the first relocation acknowledgement to the source RAN. | 08-15-2013 |
20130303188 | METHOD AND APPARATUS FOR LOCATION BASED SERVICES - Systems and methods for providing location estimates of user equipment to be used in location based services are provided. Data collected from users in a local radio access network (RAN), such as an Enterprise RAN (E-RAN), as well as configuration information of the local RAN/E-RAN is siphoned from the system and utilized in conjunction with a location engine to provide a high accuracy location estimate for users in an indoor environment. The siphoned data is provided in a real-time location stream to the location engine. | 11-14-2013 |
20140179323 | UMTS RESELECTION PERFORMANCE IN SMALL CELL SYSTEMS - A beacon cell adapted for use in a small cell RAN includes dual identities—a beacon identity and a regular or “live” identity—in which the identities are individually configured to address differing performance requirements in the small cell RAN. The beacon identity in the cell is specially configured to meet the performance requirements for mobile user equipment (UE) to be able to quickly and easily move from a macrocell base station in a mobile operator's network to the small cell RAN using a process called “reselection.” The live identity is configured to meet all requirements for service to be provided to the UE within the small cell RAN. Once captured by the beacon identity of the beacon cell, the UE can then immediately reselect to the live identity of the cell which operates in a conventional manner. | 06-26-2014 |
20140364120 | UMTS RESELECTION PERFORMANCE IN SMALL CELL SYSTEMS - A beacon cell adapted for use in a small cell RAN includes dual identities—a beacon identity and a regular or “live” identity—in which the identities are individually configured to address differing performance requirements in the small cell RAN. The beacon identity in the cell is specially configured to meet the performance requirements for mobile user equipment (UE) to be able to quickly and easily move from a macrocell base station in a mobile operator's network to the small cell RAN using a process called “reselection.” The live identity is configured to meet all requirements for service to be provided to the UE within the small cell RAN. Once captured by the beacon identity of the beacon cell, the UE can then immediately reselect to the live identity of the cell which operates in a conventional manner. | 12-11-2014 |
Patent application number | Description | Published |
20100085884 | DYNAMIC TOPOLOGICAL ADAPTATION - Apparatus and methods for reconfiguration of a communication environment based on loading requirements. Network operations are monitored and analyzed to determine loading balance across the network or a portion thereof. Where warranted, the network is reconfigured to balance the load across multiple network entities. For example, in a cellular-type of network, traffic loads and throughput requirements are analyzed for the access points and their user equipment. Where loading imbalances occur, the cell coverage areas of one or more access points can be reconfigured to alleviate bottlenecks or improve balancing. | 04-08-2010 |
20100087148 | IDENTIFYING AND CONTROLLING INTERFERENCE FROM WIRELESS TERMINALS - Apparatus and methods for power control for mitigation or control of interference in a wireless communications environment. Control techniques can consider the effect of interference on an access point and the access point can identify interfering wireless terminals and cause a message to be sent to a controlling access point of the interfering wireless terminal to cause the uplink power of the interfering wireless terminal to be adjusted. | 04-08-2010 |
20100087149 | MEASURING COMMUNICATING AND USING INTERFERENCE INFORMATION - Apparatus and methods of performing interference mitigation in a communication network. The interference mitigation can include a controller sending a message to a first access point instructing the first access point to measure at least one signal transmitted by a first wireless terminal communicating a signal having known characteristics; the controller receiving from the first access point signal measurement information; and the controller communicating at least some of the signal measurement information received from the first access point to a second access point. | 04-08-2010 |
20100087221 | METHODS AND APPARATUS FOR GENERATING, REPORTING AND USING INTERFERENCE CANCELLATION INFORMATION - Apparatus and methods for power control for mitigation or control of interference in a wireless communications environment. Power control techniques can consider the effectiveness of interference cancellation before making power control determinations. For example, where interference with a base station from an interfering wireless terminal is being canceled such that the effects of that interference are not adversely affecting operations of the base station, the offending terminal can be left unchanged, or its transmit power can be increased. On the other hand, where the interference cancellation operation is not able to cancel the effects of the interfering signal sufficiently, the operation can lower the uplink transmit power of the offending signal so as to not cause interference to the other base station. | 04-08-2010 |
Patent application number | Description | Published |
20100157802 | TRANSPARENT NETWORK TRAFFIC INSPECTION - Methods and systems are disclosed for providing parties with levels of transparency into filtering functionality of network traffic inspection implementations. Embodiments include receiving a filter change request from a subscriber over a network that defines a modification to a set of filter criteria for filtering network traffic, the filter criteria being stored in association with the subscriber in a filter criteria data store; updating the set of filter criteria in the filter criteria data store as a function of the filter change request; receiving a content dataset relating to the network traffic; identifying the content dataset as being associated with the subscriber; retrieving the set of filter criteria associated with the subscriber from the data store; and filtering the network traffic as a function of the set of filter criteria. Embodiments further provide layers of access for different entities to the filtered traffic. | 06-24-2010 |
20100162359 | NETWORK USER USAGE PROFILING - Methods, systems, devices, and software are disclosed for generating a network usage profile. Certain embodiments of the network usage profile include a devices-by-node profile, indicating the set of customer devices available for use in communicating with a customer-side network node located at a customer side of an access network over a period of time, where some of the customer devices are not in operative communication with the customer-side network node during a portion of that time. Other embodiments associate the network usage profile with customer information to generate device-by-customer profiles. Still other embodiments associate the network usage profile with network traffic information to generate traffic-by-device profiles. Even other embodiments associate the multiple sources and types of information to generate traffic-by-customer profiles and/or traffic-by-device-by-customer profiles. Any of the profiles may then be accessed by one or more parties for use in affecting various network services, including targeting content delivery. | 06-24-2010 |
20110080843 | Transparent Network Traffic Inspection - Methods and systems are disclosed for providing parties with levels of transparency into filtering functionality of network traffic inspection implementations. Embodiments include receiving a filter change request from a subscriber over a network that defines a modification to a set of filter criteria for filtering network traffic, the filter criteria being stored in association with the subscriber in a filter criteria data store; updating the set of filter criteria in the filter criteria data store as a function of the filter change request; receiving a content dataset relating to the network traffic; identifying the content dataset as being associated with the subscriber; retrieving the set of filter criteria associated with the subscriber from the data store; and filtering the network traffic as a function of the set of filter criteria. Embodiments further provide layers of access for different entities to the filtered traffic. | 04-07-2011 |
20120230203 | Network User Usage Profiling - Methods, systems, devices, and software are disclosed for generating a network usage profile. Certain embodiments of the network usage profile include a devices-by-node profile, indicating the set of customer devices available for use in communicating with a customer-side network node located at a customer side of an access network over a period of time, where some of the customer devices are not in operative communication with the customer-side network node during a portion of that time. Other embodiments associate the network usage profile with customer information to generate device-by-customer profiles. Still other embodiments associate the network usage profile with network traffic information to generate traffic-by-device profiles. Even other embodiments associate the multiple sources and types of information to generate traffic-by-customer profiles and/or traffic-by-device-by-customer profiles. Any of the profiles may then be accessed by one or more parties for use in affecting various network services, including targeting content delivery. | 09-13-2012 |
20130238430 | Transparent Network Traffic Inspection - Methods and systems are disclosed for providing parties with levels of transparency into filtering functionality of network traffic inspection implementations. Embodiments include receiving a filter change request from a subscriber over a network that defines a modification to a set of filter criteria for filtering network traffic, the filter criteria being stored in association with the subscriber in a filter criteria data store; updating the set of filter criteria in the filter criteria data store as a function of the filter change request; receiving a content dataset relating to the network traffic; identifying the content dataset as being associated with the subscriber; retrieving the set of filter criteria associated with the subscriber from the data store; and filtering the network traffic as a function of the set of filter criteria. Embodiments further provide layers of access for different entities to the filtered traffic. | 09-12-2013 |
20140007235 | Identification of Infected Devices in Broadband Environments | 01-02-2014 |
20140258517 | Network User Usage Profiling - Methods, systems, devices, and software are disclosed for generating a network usage profile. Certain embodiments of the network usage profile include a devices-by-node profile, indicating the set of customer devices available for use in communicating with a customer-side network node located at a customer side of an access network over a period of time, where some of the customer devices are not in operative communication with the customer-side network node during a portion of that time. Other embodiments associate the network usage profile with customer information to generate device-by-customer profiles. Still other embodiments associate the network usage profile with network traffic information to generate traffic-by-device profiles. Even other embodiments associate the multiple sources and types of information to generate traffic-by-customer profiles and/or traffic-by-device-by-customer profiles. Any of the profiles may then be accessed by one or more parties for use in affecting various network services, including targeting content delivery. | 09-11-2014 |