Systems and methods for defining an exclusion zone to protect an earth station from user equipment interference

ABSTRACT

A network device may determine a geographical distance between an earth station and the network device. The network device may receive a plurality of geographical distances between the earth station and a corresponding plurality of other network devices. The network device may determine location coordinate points for an exclusion zone, associated with the earth station, based on the geographical distance and the plurality of geographical distances. The network device may generate an exclusion zone system information block that includes the location coordinate points for the exclusion zone. The network device may determine a state of a user equipment associated with the network device. The network device may provide, to the user equipment, the exclusion zone system information block based on the state of the user equipment.

BACKGROUND

An earth station is typically the terrestrial radio station portion of asatellite telecommunications network and is used primarily fortransmission and reception of radio waves from satellite radio sources.A strict out-of-band emission (OOBE) is defined to protect incumbentearth station operation in a particular range (e.g., about a 4 to 4.2gigahertz (GHz) range).

BRIEF DESCRIPTION OF THE DRAWINGS

FIGS. 1A-1G are diagrams of one or more example implementationsdescribed herein.

FIG. 2 is a diagram of an example environment in which systems and/ormethods described herein may be implemented.

FIG. 3 is a diagram of example components of one or more devices of FIG.2.

FIG. 4 is a flow chart of an example process for defining an exclusionzone to protect an earth station from user equipment (UE) interference.

DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS

The following detailed description of example implementations refers tothe accompanying drawings. The same reference numbers in differentdrawings may identify the same or similar elements.

A base station of a radio access network (RAN) may include multipletools for limiting OOBE to an earth station, such as reducing power,adjusting antenna tilt, and/or the like. However, a UE transmitting tothe base station (e.g., on an uplink) creates unique challengesassociated with OOBE to the earth station. A guard frequency band (e.g.,of 20 megahertz (MHz), 200 MHz, and/or the like) may be provided betweena fifth generation (5G) frequency band (e.g., about 3,700 MHz to about3,980 MHz, about 3,700 MHz to about 3,800 MHz, and/or the like)generated by the base station and a frequency band (e.g., about 4,000MHz to about 4,200 MHz) generated by the earth station. Unfortunately,the guard frequency band insufficiently protects the earth station fromthe UE located near the earth station and transmitting to the basestation. Currently, the base station of the RAN does not include anymechanisms to control aspects of a UE operating near the earth station,such as detecting whether the UE is operating near the earth station.This, in turn, wastes computing resources (e.g., processing resources,memory resources, communication resources, and/or the like), networkingresources, and/or the like associated with the UE and the earth stationcreating interference and not operating correctly, identifying theinterference between the UE and the earth station, correcting theinterference between the UE and the earth station, attempting toretrieve data not received due to the interference, and/or the like.

Some implementations described herein provide a device (e.g., a networkdevice of a RAN, such as a base station) that defines an exclusion zoneto protect an earth station from UE interference. For example, thenetwork device may determine a geographical distance between an earthstation and the network device, and may receive a plurality ofgeographical distances between the earth station and a correspondingplurality of other network devices. The network device may determinelocation coordinate points for an exclusion zone, associated with theearth station, based on the geographical distance and the plurality ofgeographical distances, and may generate an exclusion zone systeminformation block that includes the location coordinate points for theexclusion zone. The network device may determine a state of a UEassociated with the network device, and may provide, to the UE, theexclusion zone system information block based on the state of the UE.

In this way, the network device defines an exclusion zone to protect anearth station from UE interference. The exclusion zone may protect theearth station by causing a UE, located near the earth station andattempting to access RAN services in the 5G frequency band, to operatein a restricted mode. Ideally, the exclusion zone may enable the UE torecognize when the UE is operating near the earth station. If the UE iswithin the exclusion zone and may potentially impact operation of theearth station, then the UE may not attempt to access the RAN. Thus,defining the exclusion zone to protect the earth station from UEinterference conserves resources. that would otherwise have been wastedby incorrect operation of the UE and the earth station due tointerference, identifying the interference between the UE and the earthstation, correcting the interference between the UE and the earthstation, attempting to retrieve data not received due to theinterference, and/or the like.

FIGS. 1A-1G are diagrams of one or more example implementations 100described herein. As shown in FIG. 1A, UE 102-1 and UE 102-2(collectively referred to as UEs 102, and singularly as UE 102) may beassociated with a RAN 104 connected to a core network 106. UE 102 mayinclude a mobile phone, a laptop computer, a tablet computer, an IoTdevice and/or the like. RAN 104 may include one or more network devices,such as radio transmitters, base stations, and/or the like. Core network106 may include an example architecture of a 5G next generation (NG)core network included in a 5G wireless telecommunications system, andmay include physical elements, virtual elements, or a combination ofphysical and virtual elements. As further shown, an earth station may begeographically located near to RAN 104. Although implementations aredescribed herein in connection with a 5G NG core network, theimplementations may be utilized with other types of core networks, suchas a 4G core network.

As further shown in FIG. 1A, RAN 104 may provide a first frequency band(e.g., about 3,550 MHz to about 3,700 MHz) for a citizens band radioservice (CBRS), such as a shared wireless private broadband service. RAN104 may provide a second frequency band (e.g., about 3,700 MHz to about3,980 MHz, about 3,700 MHz to about 3,800 MHz, and/or the like) for 5Gwireless services provided to UEs 102. The earth station may provide athird frequency band (e.g., about 4,000 MHz to about 4,200 MHz) forextraplanetary telecommunication with terrestrial devices, (e.g.,satellites, space ships, space stations, rockets, and/or the like) orfor reception of radio waves from astronomical radio sources. A guardfrequency band (e.g., about 3,980 MHz to about 4,000 MHz, about 3,800MHz to about 4,000 MHz, and/or the like) may be provided between thesecond frequency band provided by RAN 104 and the third frequency bandprovided by the earth station.

As further shown in FIG. 1A, and by reference number 110-1, a first UE102-1 located within the second frequency band (e.g., the 5G frequencyband) may access RAN 104. For example, the first UE 102-1 may attempt toaccess or access RAN 104 to receive 5G services from RAN 104. As shownby reference number 110-2, a second UE 102-2 located within the guardfrequency band may also access or attempt to access RAN 104 to receive5G services from RAN 104.

A shown in FIG. 1A, and by reference number 112, the first UE 102-1 maynot cause interference with the earth station due to the location of thefirst UE 102-1 within the second frequency band. However, as shown byreference number 114, the second UE 102-2 may cause interference withthe earth station due to the location of the second UE 102-1 within theguard frequency band.

As shown in FIG. 1B, multiple RANs 104 (e.g., RAN 104-A, RAN 104-B, RAN104-C, and RAN 104-D) may be associated with multiple UEs 102 (e.g., UE102-X, UE 102-Y, UE 102-Z, and/or the like). A further shown, RAN 104-Cmay generate a primary cell (e.g., a primary geographical area coveredby RAN 104-C) and a secondary cell (e.g., secondary geographical areacovered by RAN 104-C). In some implementations, the primary cell coversa larger geographical area than the geographical area covered by thesecondary cell. Further details of the primary cell and the secondarycell are provided below in connection with FIGS. 1E and 1F. Furtherdetails of FIG. 1B are described with reference to RAN 104-C, but mayalso be performed by other RANs 104 of FIG. 1B, such as RAN 104-A, RAN104-B, and/or RAN 104-D.

RAN 104-C may determine a geographical distance between the earthstation and RAN 104-C. For example, RAN 104-C may determine thegeographical distance between the earth station and RAN 104-C based onradio signal strength of the earth station received by RAN 104-C. Inanother example, RAN 104-C may determine the geographical distancebetween the earth station and RAN 104-C based on receiving ageographical map that identifies location coordinates of the earthstation and calculating the geographical distance based on the locationcoordinates of the earth station and location coordinates of RAN 104-C.

RAN 104-A, RAN 104-B, and RAN 104-D may also determine geographicaldistances between the earth station and RAN 104-A, RAN 104-B, and RAN104-D, respectively, in a similar manner. RAN 104-A, RAN 104-B, and RAN104-D may provide, to RAN 104-C, the determined geographical distancesbetween the earth station and RAN 104-A, RAN 104-B, and RAN 104-D,respectively, and RAN 104-C may receive the determined geographicaldistances between the earth station and RAN 104-A, RAN 104-B, and RAN104-D.

As further shown in FIG. 1B, and by reference number 116, RAN 104-C maydetermine location coordinate points for an exclusion zone, associatedwith the earth station, based on the geographical distance between theearth station and RAN 104-C and the geographical distances between theearth station and RAN 104-A, RAN 104-B, and RAN 104-D. In someimplementations, RAN 104-C determines the location coordinate points forthe exclusion zone based on the geographical distance between the earthstation and RAN 104-C, the geographical distances between the earthstation and RANs 104-A, 104-B, and 104-D, and likelihoods of UEs 102 inthe exclusion zone (e.g., defined by the location coordinate points)impacting operation of the earth station. In some implementations, RAN104-C determines multiple exclusion zones for the earth station andlocation coordinate points for each of the multiple exclusion zones. Theexclusion zone may protect the earth station from experiencinginterference signals from UEs 102 geographically located with theexclusion zone, and may reduce OOBE downlink signaling by RAN 104-Cbased on preventing UEs 102, geographically located with the exclusionzone, from accessing RAN 104-C.

In some implementations, RAN 104-C generates an exclusion zone systeminformation block (SIB) with data identifying the location coordinatepoints for the exclusion zone. RAN 104-C may provide the exclusion zoneSIB to UEs 102 associated with RAN 104-C in various ways that are basedon states of UEs 102. Thus, RAN 104-C may determine states (e.g., idleor inactive states, mobility states, carrier aggregation states, dualconnectivity states, and/or the like) of UEs 102 associated with RAN104-C based on signaling received from UEs 102 associated with RAN104-C. As further shown in FIG. 1B, and by reference number 118, RAN104-C may provide, to UE 102-X, a SIB with data identifying theexclusion zone. For example, RAN 104-C may provide, to UE 102-X, the SIBwith the data identifying the location coordinate points for theexclusion zone based on a state of UE 102-X.

As shown in FIG. 1C, and when the state of UE 102-X is an idle state oran inactive state, RAN 104-C may provide, to UE 102-X, a masterinformation block (MIB) and multiple SIBs, such as a first SIB (SIB1), asecond SIB (SIB2), the exclusion zone SIB (SIBexz), and/or the like. TheMIB may include a quantity of parameters that are utilized by UE 102-Xto acquire other information from RAN 104-C. The first SIB may includean indication of whether a flag is set for the exclusion zone SIB. Ifthe flag is set in the first SIB, UE 102-X may read the exclusion zoneSIB. If the flag is not set in the first SIB, UE 102-X may not read theexclusion zone SIB. The first SIB and/or the second SIB may includeinformation that is utilized by UE 102-X to perform functions associatedwith RAN 104-C, such as cell selection, cell reselection, cell handover,and/or the like.

The exclusion zone SIB may include the data identifying the locationcoordinate points for the exclusion zone. For example, as shown in FIG.1B, the exclusion zone SIB may include the following example data.

ASN1START TAG-SIBexz-R18-IES-START SIBexz-r18-IEs ::= SEQUENCE { SIBexz-Polygon-Points_r18 maxPolyPoint  SIBexz-PointsInfo-r18SEQUENCE(SIZE (1.. maxPolyPoint))  OF CHOICE {   P1 (Lat, Long),   P2 (Lat,Long),   P3 (Lat, Long),   P4 (Lat, Long),   P5 (Lat, Long),   . . .  Pn (Lat, Long)  },  lateNonCriticalExtension  OCTET STRING  OPTIONAL, nonCriticalExtension     SEQUENCE { }  OPTIONAL }TAG-SIBexz-R18-IES-STOP ASN1STOP

As further shown in FIG. 1C, UE 102-X may wake up or power on from theidle state or the inactive state, and may read the MIB and the first SIBwith the indication of whether the flag is set for the exclusion zoneSIB. If the flag is set for the exclusion zone SIB, UE 102-X may readthe exclusion zone SIB to identify the location coordinate points of theexclusion zone, and may determine whether UE 102-X is located in theexclusion zone based on the location coordinate points and a location ofUE 102-X. If UE 102-X determines that UE 102-X is located in theexclusion zone, UE 102-X may not access RAN 104-C to preventinterference with the earth station. If the flag is not set for theexclusion zone SIB or UE 102-X is not located in the exclusion zone, UE102-X may access RAN 104-C since UE 102-X may not interfere with theearth station.

As shown in FIG. 1D, by reference number 120, and when a state of UE102-Y is a mobility state or a handover state, RAN 104-C (e.g., a sourceRAN) may receive, from UE 102-Y, a measurement report to be handed overto a target RAN (e.g., RAN 104-B). UE 102-Y may provide the measurementreport to RAN 104-C when UE 102-Y is geographically located at aboundary between RAN 104-C and RAN 104-B. In some implementations, themeasurement report includes data identifying a signal strength betweenRAN 104-C and UE 102-Y, a signal strength between RAN 104-B and UE102-Y, and/or the like. RAN 104-C may determine whether to hand over UE102-Y to RAN 104-B based on the measurement report.

As further shown in FIG. 1D, and by reference number 122, if RAN 104-Cdetermines that UE 102-Y may be handed over to RAN 104-B, RAN 104-C mayprovide a handover request to RAN 104-B based on the measurement report.For example, RAN 104-C may determine that the signal strength between UE102-Y and RAN 104-B is greater than the signal strength between UE 102-Yand RAN 104-C. RAN 104-C may provide the handover request to RAN 104-Bbased on determining that the signal strength between UE 102-Y and RAN104-B is greater than the signal strength between UE 102-Y and RAN104-C.

RAN 104-B may approve the handover request and may provide a handoverrequest acknowledgment (ACK) to RAN 104-C. In some implementations, thehandover request acknowledgment includes the exclusion zone SIB with thedata identifying the location coordinate points of the exclusion zone.The exclusion zone SIB may be provided to RAN 104-C via a mobilitycontrol container. As further shown in FIG. 1D, and by reference number124, RAN 104-C may receive, from RAN 104-B, the handover requestacknowledgment with the exclusion zone SIB.

The exclusion zone SIB may include the data identifying the locationcoordinate points for the exclusion zone. For example, as shown in FIG.1D, the exclusion zone SIB may include the following example data.

RRCReconfiguration-IEs: = SEQUENCE {  radioBearerConfig      OPTIONAL,-- Need M  secondaryCellGroup OCTET STRING (CONTAINING CellGroupConfig)OPTIONAL, -- Need M  measConfig          OPTIONAL, -- NeedM lateNonCriticalExtension    OCTET STRING  OPTIONAL, nonCriticalExtension RRCReconfiguration-v18xx-IEs  OPTIONAL }RRCReconfiguration-v18xx-IEs: = SEQUENCE {  ...  dedicatedSIB1-Delivery OCTET STRING (CONTAINING SIB1) OPTIONAL, --Need N dedicatedSIBexz-Delivery OCTET STRING (CONTAINING SIBexz) OPTIONAL, --Need N dedicatedSystemInformationDelivery OCTET STRING (CONTAININGSystemInformation) OPTIONAL, -- Need N   ... }

As further shown in FIG. 1D, and by reference number 126, RAN 104-C mayprovide, to UE 102-Y, a handover command with the exclusion zone SIB. Insome implementations, the handover command includes a radio resourcecontrol (RRC) reconfiguration message indicating that UE 102-Y is to bereconfigured to hand over to RAN 104-B. UE 102-Y may read the exclusionzone SIB to identify the location coordinate points of the exclusionzone, and may determine whether UE 102-Y is located in the exclusionzone based on the location coordinate points and a location of UE 102-Y.If UE 102-Y determines that UE 102-Y is located in the exclusion zone,UE 102-Y may reject the handover command with a handover rejectedmessage. In some implementations, the handover rejected command includesan RRC reconfiguration failure message (e.g., with a reason codeindicating that UE 102-Y is located in the exclusion zone). If UE 102-Ydetermines that UE 102-Y is not located in the exclusion zone, UE 102-Ymay accept the handover command and may perform a handover to RAN 104-B.

As further shown in FIG. 1D, and by reference number 128, since UE 102-Yis located in the exclusion zone, RAN 104-C may receive, from UE 102-Y,the handover rejected message based on the exclusion zone SIB. As shownby reference number 130, RAN 104-C may provide, to RAN 104-B, thehandover rejected message (e.g., with the reason code indicating that UE102-Y is located in the exclusion zone) so that RAN 104-B may ceasepreparing for a handover from UE 102-Y.

In some implementations, and to avoid frequently repeated signaling, RAN104-C includes a configurable prohibit timer that suspends the handoverprocess of UE 102-Y, from RAN 104-C to RAN 104-B, until the prohibittimer expires. Upon expiry of the prohibit timer, RAN 104-C may permitany future request to hand over to RAN 104-B based on an assumption thatUE 102-Y has moved out of the exclusion zone. In some implementations,and to avoid frequently repeated signaling, UE 102-Y may not provide themeasurement report to RAN 104-C when UE 102-Y is still located withinthe exclusion zone.

As shown in FIG. 1E, by reference number 130, and when a state of UE102-Z is a carrier aggregation state and RAN 104-C is a primary RAN, RAN104-C (e.g., a primary RAN) may provide, to a secondary RAN, a SIBrequest for the exclusion zone SIB. Carrier aggregation is a techniqueutilized to increase a data rate per UE 102, whereby multiple frequencyblocks are assigned to the same UE 102 (e.g., frequency blocks from theprimary RAN and frequency blocks from the secondary RAN).

As further shown in FIG. 1E, and by reference number 132, RAN 104-C mayreceive, from the secondary RAN, the exclusion zone SIB, with the dataidentifying the location coordinate points of the exclusion zone, basedon the SIB request. As shown by reference number 134, RAN 104-C mayprovide, to UE 102-Z, the exclusion zone SIB with a request to add thesecondary RAN for carrier aggregation purposes. In some implementations,the request to add the secondary RAN includes an RRC reconfigurationmessage indicating that UE 102-Z is to be reconfigured to add thesecondary RAN. UE 102-Z may read the exclusion zone SIB to identify thelocation coordinate points of the exclusion zone, and may determinewhether UE 102-Z is located in the exclusion zone based on the locationcoordinate points and a location of UE 102-Z. If UE 102-Z determinesthat UE 102-Z is located in the exclusion zone, UE 102-Z may reject therequest to add the secondary RAN with a reject message. In someimplementations, the reject message includes an RRC reconfigurationfailure message (e.g., with a reason code indicating that UE 102-Z islocated in the exclusion zone). If UE 102-Z determines that UE 102-Z isnot located in the exclusion zone, UE 102-Z may accept the request toadd the secondary RAN and may add the secondary RAN for carrieraggregation purposes.

As further shown in FIG. 1E, and by reference number 136, since UE 102-Zis located in the exclusion zone, RAN 104-C may receive, from UE 102-Z,the reject message based on the exclusion zone SIB. The reject messagemay cause RAN 104-C to cease preparing for adding the secondary RAN forUE 102-Z.

In some implementations, and to avoid frequently repeated signaling, RAN104-C includes a configurable prohibit timer that suspends the carrieraggregation process of UE 102-Z until the prohibit timer expires. Uponexpiry of the prohibit timer, RAN 104-C may permit any future request toadd the secondary RAN based on an assumption that UE 102-Z has moved outof the exclusion zone. In some implementations, if UE 102-Z continues toreject the request to add the secondary RAN after expiration of thetimer, RAN 104-C may increase a value of the prohibit timer so that thecarrier aggregation process is suspended for a longer period of time.Eventually (e.g., after UE 102-Z still continues to reject the requestto add the secondary RAN), RAN 104-C may permanently prevent UE 120-Zfrom adding the secondary RAN. For example, RAN 104-C may permanentlyprevent UE 120-Z from adding the secondary RAN when UE 102-Z is a fixedwireless access device operating in the exclusion zone.

As shown in FIG. 1F, by reference number 138, and when a state of UE102-Z is a dual connectivity state and RAN 104-C is a primary RAN, RAN104-C may provide, to a secondary RAN (e.g., RAN 104-B), a request fordual connectivity with RAN 104-B. Dual connectivity utilizes radioresources within multiple carriers to improve UE 102 throughput. Thedifference between dual connectivity and carrier aggregation is inapplication scenarios and hence implementation. Carrier aggregation isfor scenarios where a backhaul between RANs is ideal, while dualconnectivity is for non-ideal backhaul (e.g., relatively large delaybetween RANs).

As further shown in FIG. 1F, and by reference number 140, RAN 104-C mayreceive, from RAN 104-B, the exclusion zone SIB, with the dataidentifying the location coordinate points of the exclusion zone, basedon the request for dual connectivity. As shown by reference number 142,RAN 104-C may provide, to UE 102-Z, the exclusion zone SIB with arequest to add RAN 104-B for dual connectivity purposes. In someimplementations, the request to add RAN 104-B includes an RRCreconfiguration message indicating that UE 102-Z is to be reconfiguredto add RAN 104-B. UE 102-Z may read the exclusion zone SIB to identifythe location coordinate points of the exclusion zone, and may determinewhether UE 102-Z is located in the exclusion zone based on the locationcoordinate points and a location of UE 102-Z. If UE 102-Z determinesthat UE 102-Z is located in the exclusion zone, UE 102-Z may reject therequest to add RAN 104-B with a reject message. In some implementations,the reject message includes an RRC reconfiguration failure message(e.g., with a reason code indicating that UE 102-Z is located in theexclusion zone). If UE 102-Z determines that UE 102-Z is not located inthe exclusion zone, UE 102-Z may accept the request to add RAN 104-B andmay add RAN 104-B for dual connectivity purposes.

As further shown in FIG. 1F, and by reference number 144, since UE 102-Zis located in the exclusion zone, RAN 104-C may receive, from UE 102-Z,the reject message based on the exclusion zone SIB. The reject messagemay cause RAN 104-C to cease preparing for adding RAN 104-B for UE102-Z.

In some implementations, and to avoid frequently repeated signaling, RAN104-C includes a configurable prohibit timer that suspends the dualconnectivity process of UE 102-Z until the prohibit timer expires. Uponexpiry of the prohibit timer, RAN 104-C may permit any future request toadd RAN 104-B based on an assumption that UE 102-Z has moved out of theexclusion zone. In some implementations, if UE 102-Z continues to rejectthe request to add RAN 104-B after expiration of the timer, RAN 104-Cmay increase a value of the prohibit timer so that the carrieraggregation process is suspended for a longer period of time. Eventually(e.g., after UE 102-Z still continues to reject the request to add RAN104-B), RAN 104-C may permanently prevent UE 120-Z from adding RAN104-B. For example, RAN 104-C may permanently prevent UE 120-Z fromadding RAN 104-B when UE 102-Z is a fixed wireless access deviceoperating in the exclusion zone.

As shown in FIG. 1G, UE 102-Y may be moving from a first location (e.g.,supported by a serving RAN, such as RAN 104-B) to a second location(e.g., supported by a target RAN, such as RAN 104-C). Thus, UE1 102-Ymay enter the exclusion zone when moving from the first location to thesecond location. UE 102-Y may have received the exclusion zone SIB fromRAN 104-B and may identify the location coordinate points of theexclusion zone from the exclusion zone SIB. UE 102-Y may monitor alocation of UE 102-Y, and may determine whether UE 102-Y is located inthe exclusion zone based on the location coordinate points and thelocation of UE 102-Y.

As further shown in FIG. 1G, and by reference number 146, if UE 102-Y isabout to enter the exclusion zone, UE 102-Y may request (e.g., with areason code, such as entering the exclusion zone) the serving RAN tohand over UE 102-Y to another frequency band or another RAN (e.g., RAN104-C). As further shown FIG. 1G, and by reference number 148, UE 102-Ymay provide, to the serving RAN, a request for an RRC connection releasefrom the serving RAN. UE 102-Y may receive, from the serving RAN, an RRCconnection release based on the request. Once UE 102-Y is released, UE102-Y may enter into the idle state. In some implementations, UE 102-Ymay force itself into the idle state or may attempt to connect toanother RAN on a different frequency.

In some implementations, UE 102-Y may not perform an action when UE102-Y exits the exclusion zone. As further shown in FIG. 1G, and byreference number 150, when UE 102-Y exits the exclusion zone, RAN 104-Cmay receive, from UE 102-Y, a message indicating that UE 102-Y isexiting from the exclusion zone. Upon receipt of the message, RAN 104-Cmay remove UE 102-Y from an exclusion zone list and may treat UE 102-Yas a normal device by allowing handover, carrier aggregation, dualconnectivity, and/or the like.

In this way, the network device defines an exclusion zone to protect anearth station from UE interference. The exclusion zone may protect theearth station by causing a UE, located near the earth station andattempting to access RAN services in the 5G frequency band, to operatein a restricted mode. Thus, the exclusion zone protects the earthstation from UE interference, which conserves computing resources,networking resources, and/or the like that would otherwise have beenwasted by incorrect operation of the UE and the earth station due tointerference, identifying the interference between the UE and the earthstation, correcting the interference between the UE and the earthstation, attempting to retrieve data not received due to theinterference, and/or the like.

As indicated above, FIGS. 1A-1G are provided merely as examples. Otherexamples may differ from what was described with regard to FIGS. 1A-1G.The number and arrangement of devices and networks shown in FIGS. 1A-1Gare provided as an example. In practice, there may be additional devicesand/or networks, fewer devices and/or networks, different devices and/ornetworks, or differently arranged devices and/or networks than thoseshown in FIGS. 1A-1G. Furthermore, two or more devices shown in FIGS.1A-1G may be implemented within a single device, or a single deviceshown in FIGS. 1A-1G may be implemented as multiple, distributeddevices. Additionally, or alternatively, a set of devices (e.g., one ormore devices) of FIGS. 1A-1G may perform one or more functions describedas being performed by another set of devices of FIGS. 1A-1G.

FIG. 2 is a diagram of an example environment 200 in which systemsand/or methods described herein may be implemented. As shown in FIG. 2,example environment 200 may include UE 102, RAN 104, core network 106,application server 120, and a data network 255. Devices and/or networksof example environment 200 may interconnect via wired connections,wireless connections, or a combination of wired and wirelessconnections.

UE 102 includes one or more devices capable of receiving, generating,storing, processing, and/or providing information, such as informationdescribed herein. For example, UE 102 may include a mobile phone (e.g.,a smart phone, a radiotelephone, and/or the like), a laptop computer, atablet computer, a desktop computer, a handheld computer, a gamingdevice, a wearable communication device (e.g., a smart watch, a pair ofsmart glasses, and/or the like), a mobile hotspot device, a fixedwireless access device, customer premises equipment, an autonomousvehicle, or a similar type of device.

RAN 104 may support, for example, a cellular radio access technology(RAT). RAN 104 may include one or more base stations (e.g., basetransceiver stations, radio base stations, node Bs, eNodeBs (eNBs),gNodeBs (gNBs), base station subsystems, cellular sites, cellulartowers, access points, transmit receive points (TRPs), radio accessnodes, macrocell base stations, microcell base stations, picocell basestations, femtocell base stations, or similar types of devices) andother network entities that may support wireless communication for UE102. RAN 104 may transfer traffic between UE 102 (e.g., using a cellularRAT), one or more base stations (e.g., using a wireless interface or abackhaul interface, such as a wired backhaul interface), and/or corenetwork 106. RAN 104 may provide one or more cells that cover geographicareas.

In some implementations, RAN 104 may perform scheduling and/or resourcemanagement for UE 102 covered by RAN 104 (e.g., UE 102 covered by a cellprovided by RAN 104). In some implementations, RAN 104 may be controlledor coordinated by a network controller, which may perform loadbalancing, network-level configuration, and/or the like. The networkcontroller may communicate with RAN 104 via a wireless or wirelinebackhaul. In some implementations, RAN 104 may include a networkcontroller, a self-organizing network (SON) module or component, or asimilar module or component. In other words, RAN 104 may perform networkcontrol, scheduling, and/or network management functions (e.g., foruplink, downlink, and/or sidelink communications of UE 102 covered byRAN 104).

In some implementations, core network 106 may include an examplefunctional architecture in which systems and/or methods described hereinmay be implemented. For example, core network 106 may include an examplearchitecture of a fifth generation (5G) next generation (NG) corenetwork included in a 5G wireless telecommunications system. While theexample architecture of core network 106 shown in FIG. 2 may be anexample of a service-based architecture, in some implementations, corenetwork 106 may be implemented as a reference-point architecture, a 4Gcore network, and/or the like.

As shown in FIG. 2, core network 106 may include a number of functionalelements. The functional elements may include, for example, a networkslice selection function (NSSF) 205, a network exposure function (NEF)210, an authentication server function (AUSF) 215, a unified datamanagement (UDM) component 220, a policy control function (PCF) 225, anapplication function (AF) 230, an access and mobility managementfunction (AMF) 235, a session management function (SMF) 240, a userplane function (UPF) 245, and/or the like. These functional elements maybe communicatively connected via a message bus 250. Each of thefunctional elements shown in FIG. 2 is implemented on one or moredevices associated with a wireless telecommunications system. In someimplementations, one or more of the functional elements may beimplemented on physical devices, such as an access point, a basestation, a gateway, and/or the like. In some implementations, one ormore of the functional elements may be implemented on a computing deviceof a cloud computing environment.

NSSF 205 includes one or more devices that select network sliceinstances for UE 102. By providing network slicing, NSSF 205 allows anoperator to deploy multiple substantially independent end-to-endnetworks potentially with the same infrastructure. In someimplementations, each slice may be customized for different services.

NEF 210 includes one or more devices that support exposure ofcapabilities and/or events in the wireless telecommunications system tohelp other entities in the wireless telecommunications system discovernetwork services.

AUSF 215 includes one or more devices that act as an authenticationserver and support the process of authenticating UE 102 in the wirelesstelecommunications system.

UDM 220 includes one or more devices that store user data and profilesin the wireless telecommunications system. UDM 220 may be used for fixedaccess, mobile access, and/or the like, in core network 106.

PCF 225 includes one or more devices that provide a policy frameworkthat incorporates network slicing, roaming, packet processing, mobilitymanagement, and/or the like.

AF 230 includes one or more devices that support application influenceon traffic routing, access to NEF 210, policy control, and/or the like.

AMF 235 includes one or more devices that act as a termination point fornon-access stratum (NAS) signaling, mobility management, and/or thelike.

SMF 240 includes one or more devices that support the establishment,modification, and release of communication sessions in the wirelesstelecommunications system. For example, SMF 240 may configure trafficsteering policies at UPF 245, enforce user equipment IP addressallocation and policies, and/or the like.

UPF 245 includes one or more devices that serve as an anchor point forintraRAT and/or interRAT mobility. UPF 245 may apply rules to packets,such as rules pertaining to packet routing, traffic reporting, handlinguser plane QoS, and/or the like.

Message bus 250 represents a communication structure for communicationamong the functional elements. In other words, message bus 250 maypermit communication between two or more functional elements.

Data network 255 includes one or more wired and/or wireless datanetworks. For example, data network 255 may include an IP MultimediaSubsystem (IMS), a public land mobile network (PLMN), a local areanetwork (LAN), a wide area network (WAN), a metropolitan area network(MAN), a private network such as a corporate intranet, an ad hocnetwork, the Internet, a fiber optic-based network, a cloud computingnetwork, a third party services network, an operator services network,and/or the like, and/or a combination of these or other types ofnetworks.

The number and arrangement of devices and networks shown in FIG. 2 areprovided as an example. In practice, there may be additional devicesand/or networks, fewer devices and/or networks, different devices and/ornetworks, or differently arranged devices and/or networks than thoseshown in FIG. 2. Furthermore, two or more devices shown in FIG. 2 may beimplemented within a single device, or a single device shown in FIG. 2may be implemented as multiple, distributed devices. Additionally, oralternatively, a set of devices (e.g., one or more devices) of exampleenvironment 200 may perform one or more functions described as beingperformed by another set of devices of example environment 200.

FIG. 3 is a diagram of example components of a device 300. Device 300may correspond to UE 102, NSSF 205, NEF 210, AUSF 215, UDM 220, PCF 225,AF 230, AMF 235, SMF 240, and/or UPF 245. In some implementations, UE102, NSSF 205, NEF 210, AUSF 215, UDM 220, PCF 225, AF 230, AMF 235, SMF240, and/or UPF 245 may include one or more devices 300 and/or one ormore components of device 300. As shown in FIG. 3, device 300 mayinclude a bus 310, a processor 320, a memory 330, a storage component340, an input component 350, an output component 360, and acommunication interface 370.

Bus 310 includes a component that permits communication among thecomponents of device 300. Processor 320 is implemented in hardware,firmware, or a combination of hardware and software. Processor 320 is acentral processing unit (CPU), a graphics processing unit (GPU), anaccelerated processing unit (APU), a microprocessor, a microcontroller,a digital signal processor (DSP), a field-programmable gate array(FPGA), an application-specific integrated circuit (ASIC), or anothertype of processing component. In some implementations, processor 320includes one or more processors capable of being programmed to perform afunction. Memory 330 includes a random-access memory (RAM), a read onlymemory (ROM), and/or another type of dynamic or static storage device(e.g., a flash memory, a magnetic memory, and/or an optical memory) thatstores information and/or instructions for use by processor 320.

Storage component 340 stores information and/or software related to theoperation and use of device 300. For example, storage component 340 mayinclude a hard disk (e.g., a magnetic disk, an optical disk, amagneto-optic disk, and/or a solid-state disk), a compact disc (CD), adigital versatile disc (DVD), a floppy disk, a cartridge, a magnetictape, and/or another type of non-transitory computer-readable medium,along with a corresponding drive.

Input component 350 includes a component that permits device 300 toreceive information, such as via user input (e.g., a touch screendisplay, a keyboard, a keypad, a mouse, a button, a switch, and/or amicrophone). Additionally, or alternatively, input component 350 mayinclude a sensor for sensing information (e.g., a global positioningsystem (GPS) component, an accelerometer, a gyroscope, and/or anactuator). Output component 360 includes a component that providesoutput information from device 300 (e.g., a display, a speaker, and/orone or more light-emitting diodes (LEDs)).

Communication interface 370 includes a transceiver-like component (e.g.,a transceiver and/or a separate receiver and transmitter) that enablesdevice 300 to communicate with other devices, such as via a wiredconnection, a wireless connection, or a combination of wired andwireless connections. Communication interface 370 may permit device 300to receive information from another device and/or provide information toanother device. For example, communication interface 370 may include anEthernet interface, an optical interface, a coaxial interface, aninfrared interface, a radio frequency (RF) interface, a universal serialbus (USB) interface, a Wi-Fi interface, a cellular network interface,and/or the like.

Device 300 may perform one or more processes described herein. Device300 may perform these processes based on processor 320 executingsoftware instructions stored by a non-transitory computer-readablemedium, such as memory 330 and/or storage component 340. Acomputer-readable medium is defined herein as a non-transitory memorydevice. A memory device includes memory space within a single physicalstorage device or memory space spread across multiple physical storagedevices.

Software instructions may be read into memory 330 and/or storagecomponent 340 from another computer-readable medium or from anotherdevice via communication interface 370. When executed, softwareinstructions stored in memory 330 and/or storage component 340 may causeprocessor 320 to perform one or more processes described herein.Additionally, or alternatively, hardwired circuitry may be used in placeof or in combination with software instructions to perform one or moreprocesses described herein. Thus, implementations described herein arenot limited to any specific combination of hardware circuitry andsoftware.

The number and arrangement of components shown in FIG. 3 are provided asan example. In practice, device 300 may include additional components,fewer components, different components, or differently arrangedcomponents than those shown in FIG. 3. Additionally, or alternatively, aset of components (e.g., one or more components) of device 300 mayperform one or more functions described as being performed by anotherset of components of device 300.

FIG. 4 is a flow chart of an example process 400 for acquiring networkcontrol data of a user equipment in cellular networks. In someimplementations, one or more process blocks of FIG. 4 may be performedby a device (e.g., a network device of RAN 104). In someimplementations, one or more process blocks of FIG. 4 may be performedby another device or a group of devices separate from or including thedevice, such as a UE (e.g., UE 102), an SMF (e.g., SMF 240), a UPF(e.g., UPF 245), and/or the like. Additionally, or alternatively, one ormore process blocks of FIG. 4 may be performed by one or more componentsof device 300, such as processor 320, memory 330, storage component 340,input component 350, output component 360, and/or communicationinterface 370.

As shown in FIG. 4, process 400 may include determining a geographicaldistance between an earth station and a network device (block 410). Forexample, the network device may determine a geographical distancebetween an earth station and the network device, as described above.

As further shown in FIG. 4, process 400 may include receiving aplurality of geographical distances between the earth station and acorresponding plurality of other network devices (block 420). Forexample, the network device may receive a plurality of geographicaldistances between the earth station and a corresponding plurality ofother network devices, as described above.

As further shown in FIG. 4, process 400 may include determining locationcoordinate points for an exclusion zone, associated with the earthstation, based on the geographical distance and the plurality ofgeographical distances (block 430). For example, the network device maydetermine location coordinate points for an exclusion zone, associatedwith the earth station, based on the geographical distance and theplurality of geographical distances, as described above.

As further shown in FIG. 4, process 400 may include generating anexclusion zone system information block that includes the locationcoordinate points for the exclusion zone (block 440). For example, thenetwork device may generate an exclusion zone system information blockthat includes the location coordinate points for the exclusion zone, asdescribed above.

As further shown in FIG. 4, process 400 may include determining a stateof a user equipment associated with the network device (block 450). Forexample, the network device may determine a state of a user equipmentassociated with the network device, as described above.

As further shown in FIG. 4, process 400 may include providing, to theuser equipment, the exclusion zone system information block based on thestate of the user equipment (block 460). For example, the network devicemay provide, to the user equipment, the exclusion zone systeminformation block based on the state of the user equipment, as describedabove.

Process 400 may include additional implementations, such as any singleimplementation or any combination of implementations described belowand/or in connection with one or more other processes describedelsewhere herein.

In a first implementation, when the state of the user equipment is anidle state or an inactive state, process 400 includes providing theexclusion zone system information block to the user equipment, prior tothe user equipment waking up or powering up, wherein the exclusion zonesystem information block causes the user equipment to not access theradio access network when the user equipment is geographically locatedwithin the exclusion zone.

In a second implementation, when the state of the user equipment is amobility state or a handover state, process 400 includes receiving ameasurement report from the user equipment to be handed over to anotherradio access network; providing a handover request to the other radioaccess network based on the measurement report; receiving, from theother radio access network, a handover request acknowledgement thatincludes the exclusion zone system information block; and providing, tothe user equipment, a handover command that includes the exclusion zonesystem information block, wherein the exclusion zone system informationblock causes the user equipment to reject the handover command when theuser equipment is geographically located within the exclusion zone.

In a third implementation, when the state of the user equipment is amobility state or a handover state, process 400 includes receiving ahandover rejected message from the user equipment when the userequipment is geographically located within the exclusion zone, andproviding the handover rejected message to the other radio accessnetwork to cause the other radio access network to cease preparing for ahandover.

In a fourth implementation, when the state of the user equipment is amobility state or a handover state, process 400 includes starting atimer associated with preventing a handover of the user equipment whenthe user equipment rejects the handover command, and permitting thehandover of the user equipment to the other radio access network whenthe timer expires.

In a fifth implementation, when the user equipment is entering theexclusion zone, process 400 includes receiving, from the user equipment,a first request to hand over the user equipment to another frequency orto another radio access network; receiving, from the user equipment, asecond request for a connection release from the radio access network;handing over the user equipment to the other frequency or to the otherradio access network based on the first request; and releasing the userequipment from a connection with the radio access network based on thesecond request.

In a sixth implementation, after the user equipment has exited theexclusion zone, process 400 includes receiving, from the user equipment,a message indicating that the user equipment has exited from theexclusion zone, and removing the user equipment from an exclusion zonelist based on the message.

In a seventh implementation, when the state of the user equipment is acarrier aggregation state and the radio access network is a primaryradio access network, process 400 includes providing a request for theexclusion zone system information block to a secondary radio accessnetwork; receiving, from the secondary radio access network, theexclusion zone system information block based on the request; providing,to the user equipment, the exclusion zone system information block witha request to add the secondary radio access network; and receiving, fromthe user equipment and when the user equipment is geographically locatedwithin the exclusion zone, a reject message indicating that the userequipment rejects adding the secondary radio access network.

In an eighth implementation, process 400 includes starting a timerassociated with preventing addition of the secondary radio accessnetwork when the user equipment rejects adding the secondary radioaccess network, and permitting the user equipment to add the secondaryradio access network when the timer expires.

In a ninth implementation, process 400 includes preventing, based on thetimer expiring and the user equipment continuing to reject adding thesecondary radio access network, the user equipment from adding thesecondary radio access network.

In a tenth implementation, when the state of the user equipment is adual connectivity state and the radio access network is a primary radioaccess network, process 400 includes providing, to a secondary radioaccess network, a request for dual connectivity with the secondary radioaccess network; receiving, from the secondary radio access network, theexclusion zone system information block based on the request; providing,to the user equipment, the exclusion zone system information block witha request to add the secondary radio access network for dualconnectivity; and receiving, from the user equipment and when the userequipment is geographically located within the exclusion zone, a rejectmessage indicating that the user equipment rejects adding the secondaryradio access network for dual connectivity.

In an eleventh implementation, process 400 includes starting a timerassociated with preventing addition of the secondary radio accessnetwork for dual connectivity when the user equipment rejects adding thesecondary radio access network for dual connectivity, and permitting theuser equipment to add the secondary radio access network for dualconnectivity when the timer expires.

In a twelfth implementation, process 400 includes permanentlypreventing, based on the timer expiring and the user equipmentcontinuing to reject adding the secondary radio access network for dualconnectivity, the user equipment from adding the secondary radio accessnetwork for dual connectivity.

Although FIG. 4 shows example blocks of process 400, in someimplementations, process 400 may include additional blocks, fewerblocks, different blocks, or differently arranged blocks than thosedepicted in FIG. 4. Additionally, or alternatively, two or more of theblocks of process 400 may be performed in parallel.

The foregoing disclosure provides illustration and description, but isnot intended to be exhaustive or to limit the implementations to theprecise form disclosed. Modifications and variations may be made inlight of the above disclosure or may be acquired from practice of theimplementations.

As used herein, the term “component” is intended to be broadly construedas hardware, firmware, or a combination of hardware and software.

To the extent the aforementioned implementations collect, store, oremploy personal information of individuals, it should be understood thatsuch information shall be used in accordance with all applicable lawsconcerning protection of personal information. Additionally, thecollection, storage, and use of such information may be subject toconsent of the individual to such activity, for example, through wellknown “opt-in” or “opt-out” processes as may be appropriate for thesituation and type of information. Storage and use of personalinformation may be in an appropriately secure manner reflective of thetype of information, for example, through various encryption andanonymization techniques for particularly sensitive information.

It will be apparent that systems and/or methods, described herein, maybe implemented in different forms of hardware, firmware, or acombination of hardware and software. The actual specialized controlhardware or software code used to implement these systems and/or methodsis not limiting of the implementations. Thus, the operation and behaviorof the systems and/or methods were described herein without reference tospecific software code—it being understood that software and hardwaremay be designed to implement the systems and/or methods based on thedescription herein.

Even though particular combinations of features are recited in theclaims and/or disclosed in the specification, these combinations are notintended to limit the disclosure of various implementations. In fact,many of these features may be combined in ways not specifically recitedin the claims and/or disclosed in the specification. Although eachdependent claim listed below may directly depend on only one claim, thedisclosure of various implementations includes each dependent claim incombination with every other claim in the claim set.

No element, act, or instruction used herein should be construed ascritical or essential unless explicitly described as such. Also, as usedherein, the articles “a” and “an” are intended to include one or moreitems, and may be used interchangeably with “one or more.” Furthermore,as used herein, the term “set” is intended to include one or more items(e.g., related items, unrelated items, a combination of related andunrelated items, and/or the like), and may be used interchangeably with“one or more.” Where only one item is intended, the phrase “only one” orsimilar language is used. Also, as used herein, the terms “has,” “have,”“having,” or the like are intended to be open-ended terms. Further, thephrase “based on” is intended to mean “based, at least in part, on”unless explicitly stated otherwise.

What is claimed is:
 1. A method comprising: determining, by a network device of a radio access network, a geographical distance between an earth station and the network device; receiving, by the network device, a plurality of geographical distances between the earth station and a corresponding plurality of other network devices; determining, by the network device, location coordinate points for an exclusion zone, associated with the earth station, based on the geographical distance and the plurality of geographical distances; generating, by the network device, an exclusion zone system information block that includes the location coordinate points for the exclusion zone; determining, by the network device, a state of a user equipment associated with the network device; and providing, by the network device and to the user equipment, the exclusion zone system information block based on the state of the user equipment.
 2. The method of claim 1, wherein, when the state of the user equipment is an idle state or an inactive state, providing the exclusion zone system information block comprises: providing the exclusion zone system information block to the user equipment, prior to the user equipment waking up or powering up, wherein the exclusion zone system information block causes the user equipment to not access the radio access network when the user equipment is geographically located within the exclusion zone.
 3. The method of claim 1, wherein, when the state of the user equipment is a mobility state or a handover state, the method further comprises: receiving a measurement report from the user equipment to be handed over to another radio access network; providing a handover request to the other radio access network based on the measurement report; and receiving, from the other radio access network, a handover request acknowledgement that includes the exclusion zone system information block, wherein providing the exclusion zone system information block comprises: providing, to the user equipment, a handover command that includes the exclusion zone system information block, wherein the exclusion zone system information block causes the user equipment to reject the handover command when the user equipment is geographically located within the exclusion zone.
 4. The method of claim 3, further comprising: receiving a handover rejected message from the user equipment when the user equipment is geographically located within the exclusion zone; and providing the handover rejected message to the other radio access network to cause the other radio access network to cease preparing for a handover.
 5. The method of claim 3, further comprising: starting a timer associated with preventing a handover of the user equipment when the user equipment rejects the handover command; and permitting the handover of the user equipment to the other radio access network when the timer expires.
 6. The method of claim 1, wherein, when the user equipment is entering the exclusion zone, the method further comprises: receiving, from the user equipment, a first request to hand over the user equipment to another frequency or to another radio access network; receiving, from the user equipment, a second request for a connection release from the radio access network; handing over the user equipment to the other frequency or to the other radio access network based on the first request; and releasing the user equipment from a connection with the radio access network based on the second request.
 7. The method of claim 1, wherein, after the user equipment has exited the exclusion zone, the method further comprises: receiving, from the user equipment, a message indicating that the user equipment has exited from the exclusion zone; and removing the user equipment from an exclusion zone list based on the message.
 8. A network device of a radio access network, the network device comprising: one or more processors configured to: determine a geographical distance between an earth station and the network device; receive a plurality of geographical distances between the earth station and a corresponding plurality of other network devices; determine respective probabilities of a plurality of user equipment, within the geographical distance and the plurality of geographical distances, impacting operation of the earth station; determine location coordinate points for an exclusion zone, associated with the earth station, based on the geographical distance, the plurality of geographical distances, and the probabilities; generate an exclusion zone system information block that includes the location coordinate points for the exclusion zone; determine a state of a user equipment associated with the network device; and provide, to the user equipment, the exclusion zone system information block based on the state of the user equipment.
 9. The network device of claim 8, wherein, when the state of the user equipment is a carrier aggregation state and the radio access network is a primary radio access network, the one or more processors are further configured to: provide a request for the exclusion zone system information block to a secondary radio access network; receive, from the secondary radio access network, the exclusion zone system information block based on the request; provide, to the user equipment, the exclusion zone system information block with a request to add the secondary radio access network; and receive, from the user equipment and when the user equipment is geographically located within the exclusion zone, a reject message indicating that the user equipment rejects adding the secondary radio access network.
 10. The network device of claim 9, wherein the one or more processors are further configured to: start a timer associated with preventing addition of the secondary radio access network when the user equipment rejects adding the secondary radio access network; and permit the user equipment to add the secondary radio access network when the timer expires.
 11. The network device of claim 10, wherein the one or more processors are further configured to: prevent, based on the timer expiring and the user equipment continuing to reject adding the secondary radio access network, the user equipment from adding the secondary radio access network.
 12. The network device of claim 8, wherein, when the state of the user equipment is a dual connectivity state and the radio access network is a primary radio access network, the one or more processors are further configured to: provide, to a secondary radio access network, a request for dual connectivity with the secondary radio access network; receive, from the secondary radio access network, the exclusion zone system information block based on the request; provide, to the user equipment, the exclusion zone system information block with a request to add the secondary radio access network for dual connectivity; and receive, from the user equipment and when the user equipment is geographically located within the exclusion zone, a reject message indicating that the user equipment rejects adding the secondary radio access network for dual connectivity.
 13. The network device of claim 12, wherein the one or more processors are further configured to: start a timer associated with preventing addition of the secondary radio access network for dual connectivity when the user equipment rejects adding the secondary radio access network for dual connectivity; and permit the user equipment to add the secondary radio access network for dual connectivity when the timer expires.
 14. The network device of claim 13, wherein the one or more processors are further configured to: permanently prevent, based on the timer expiring and the user equipment continuing to reject adding the secondary radio access network for dual connectivity, the user equipment from adding the secondary radio access network for dual connectivity.
 15. A non-transitory computer-readable medium storing instructions, the instructions comprising: one or more instructions that, when executed by one or more processors of a network device of a radio access network, cause the one or more processors to: determine a geographical distance between an earth station and the network device; receive a plurality of geographical distances between the earth station and a corresponding plurality of other network devices; determine location coordinate points for an exclusion zone, associated with the earth station, based on the geographical distance and the plurality of geographical distances, wherein the exclusion zone is to prevent one or more user equipment from interfering with a signal of the earth station; generate an information block that includes the location coordinate points for the exclusion zone; determine a state of a user equipment associated with the network device; and provide, to the user equipment, the information block based on the state of the user equipment.
 16. The non-transitory computer-readable medium of claim 15, wherein, when the state of the user equipment is an idle state or an inactive state, the one or more instructions, that cause the one or more processors to provide the information block, cause the one or more processors to: provide the information block to the user equipment, prior to the user equipment waking up or powering up, wherein the information block causes the user equipment to not access the radio access network when the user equipment is geographically located within the exclusion zone.
 17. The non-transitory computer-readable medium of claim 15, wherein, when the state of the user equipment is a mobility state or a handover state, the instructions further comprise: one or more instructions that, when executed by the one or more processors, cause the one or more processors to: receive a measurement report from the user equipment to be handed over to another radio access network; provide a handover request to the other radio access network based on the measurement report; and receive, from the other radio access network, a handover request acknowledgement that includes the information block, wherein the one or more instructions, that cause the one or more processors to provide the information block, cause the one or more processors to: provide, to the user equipment, a handover command that includes the information block,  wherein the information block causes the user equipment to reject the handover command when the user equipment is geographically located within the exclusion zone.
 18. The non-transitory computer-readable medium of claim 15, wherein, when the user equipment is entering the exclusion zone, the instructions further comprise: one or more instructions that, when executed by the one or more processors, cause the one or more processors to: receive, from the user equipment, a first request to hand over the user equipment to another frequency or to another radio access network; receive, from the user equipment, a second request for a connection release from the radio access network; hand over the user equipment to the other frequency or to the other radio access network based on the first request; and release the user equipment from a connection with the radio access network based on the second request.
 19. The non-transitory computer-readable medium of claim 15, wherein, when the state of the user equipment is a carrier aggregation state and the radio access network is a primary radio access network, the instructions further comprise: one or more instructions that, when executed by the one or more processors, cause the one or more processors to: provide a request for the information block to a secondary radio access network; receive, from the secondary radio access network, the information block based on the request; provide, to the user equipment, the information block with a request to add the secondary radio access network; and receive, from the user equipment and when the user equipment is geographically located within the exclusion zone, a reject message indicating that the user equipment rejects adding the secondary radio access network.
 20. The non-transitory computer-readable medium of claim 15, wherein, when the state of the user equipment is a dual connectivity state and the radio access network is a primary radio access network, the instructions further comprise: one or more instructions that, when executed by the one or more processors, cause the one or more processors to: provide, to a secondary radio access network, a request for dual connectivity with the secondary radio access network; receive, from the secondary radio access network, the information block based on the request; provide, to the user equipment, the information block with a request to add the secondary radio access network for dual connectivity; and receive, from the user equipment and when the user equipment is geographically located within the exclusion zone, a reject message indicating that the user equipment rejects adding the secondary radio access network for dual connectivity. 