US 12,289,663 B2
Managing access requests in a redundant network environment
Lei Zhu, Overland Park, KS (US); Deepesh Belwal, Ashburn, VA (US); Anuj Sharma, Broadlands, VA (US); and Ramesh Kumar Golla, Ashburn, VA (US)
Assigned to T-MOBILE INNOVATIONS LLC, Overland Park, KS (US)
Filed by T-MOBILE INNOVATIONS LLC, Overland Park, KS (US)
Filed on Dec. 31, 2021, as Appl. No. 17/566,899.
Prior Publication US 2023/0217351 A1, Jul. 6, 2023
Int. Cl. H04W 48/04 (2009.01); H04W 48/20 (2009.01)
CPC H04W 48/04 (2013.01) [H04W 48/20 (2013.01)] 19 Claims
OG exemplary drawing
 
1. A method for managing attachment requests comprising:
determining a first coverage area and a second coverage area, the first coverage area comprising a first base station, wherein a first boundary between the first coverage area and the second coverage area is defined by one or more network parameters exceeding a first predetermined threshold, the first base station being a member of a first set of base stations characterized by using a first wireless communication protocol;
wirelessly receiving, at a second base station, an attachment request by a first UE, the second base station being a member of a second set of base stations characterized by using a second wireless communication protocol different than the first wireless communication protocol; and
causing the first UE to select the first base station by rejecting the attachment request based on a determination that the first UE is located within the first coverage area and a determination that the second base station is a member of the second set of base stations.