Facilitating beam recovery request for 5g or other next generation network

ABSTRACT

When configured, a channel state information reference signal (CSI-RS) can be used to identify new beams. If CSI-RS based monitoring fails to identify new beams, and no other reference signals (RS) are used for beam management, the user equipment cannot identify a new beam. However, instead of using a 4-step random access channel (RACH) procedure for beam recovery request transmission, a modified 2-step contention-based RACH procedure can saves overhead and reduce latency associated with the 4-step procedure.

TECHNICAL FIELD

This disclosure relates generally to facilitating failure recovery of abeam. For example, this disclosure relates to facilitating signaling andchannels for a beam identification and recovery request transmission fora 5G or other next generation network.

BACKGROUND

5th generation (5G) wireless systems represent a next major phase ofmobile telecommunications standards beyond the currenttelecommunications standards of 4^(th) generation (4G). Rather thanfaster peak Internet connection speeds, 5G planning aims at highercapacity than current 4G, allowing a higher number of mobile broadbandusers per area unit, and allowing consumption of higher or unlimiteddata quantities. This would enable a large portion of the population tostream high-definition media many hours per day with their mobiledevices, when out of reach of wireless fidelity hotspots. 5G researchand development also aims at improved support of machine-to-machinecommunication, also known as the Internet of things, aiming at lowercost, lower battery consumption, and lower latency than 4G equipment.

The above-described background relating to facilitating signaling andchannels for new beam identification and recovery request transmissionis merely intended to provide a contextual overview of some currentissues, and is not intended to be exhaustive. Other contextualinformation may become further apparent upon review of the followingdetailed description.

BRIEF DESCRIPTION OF THE DRAWINGS

Non-limiting and non-exhaustive embodiments of the subject disclosureare described with reference to the following figures, wherein likereference numerals refer to like parts throughout the various viewsunless otherwise specified.

FIG. 1 illustrates an example wireless communication system in which anetwork node device (e.g., network node) and user equipment (UE) canimplement various aspects and embodiments of the subject disclosure.

FIG. 2 illustrates an example schematic system block diagram of a randomaccess message sequence chart according to one or more embodiments.

FIG. 3 illustrates an example schematic system block diagram of beamfailure recovery according to one or more embodiments.

FIG. 4 illustrates an example schematic system block diagram of beamidentification by configured channel state information-reference signal(CSI-RS) according to one or more embodiments.

FIG. 5 illustrates an example schematic system block diagram of beamidentification by an SS-block according to one or more embodiments.

FIG. 6 illustrates an example schematic system block diagram of beamidentification by configured CSI-RS and a non-contention channelaccording to one or more embodiments.

FIG. 7 illustrates an example schematic system block diagram of beamidentification by an SS-block and a contention channel according to oneor more embodiments.

FIG. 8 illustrates an example schematic system block diagram of beamidentification by an SS-block and contention channel based on anon-configured CSI-RS according to one or more embodiments.

FIG. 9 illustrates an example schematic system block diagram of modifiedcontention based random access channel (RACH) procedure according to oneor more embodiments.

FIG. 10 illustrates an example flow chart for beam selection accordingto one or more embodiments.

FIG. 11 illustrates an example flow diagram for a method for beamselection for a 5G network according to one or more embodiments.

FIG. 12 illustrates an example flow diagram for a system for beamselection for a 5G network according to one or more embodiments.

FIG. 13 illustrates an example flow diagram for machine-readable mediumfor beam selection for a 5G network according to one or moreembodiments.

FIG. 14 illustrates an example block diagram of user equipment that canbe a mobile handset in accordance with one or more embodiments.

FIG. 15 illustrates an example block diagram of a computer that can beoperable to execute processes and methods in accordance with variousaspects and embodiments of the subject disclosure.

DETAILED DESCRIPTION

In the following description, numerous specific details are set forth toprovide a thorough understanding of various embodiments. One skilled inthe relevant art will recognize, however, that the techniques describedherein can be practiced without one or more of the specific details, orwith other methods, components, materials, etc. In other instances,well-known structures, materials, or operations are not shown ordescribed in detail to avoid obscuring certain aspects.

Reference throughout this specification to “one embodiment,” or “anembodiment,” means that a particular feature, structure, orcharacteristic described in connection with the embodiment is includedin at least one embodiment. Thus, the appearances of the phrase “in oneembodiment,” “in one aspect,” or “in an embodiment,” in various placesthroughout this specification are not necessarily all referring to thesame embodiment. Furthermore, the particular features, structures, orcharacteristics may be combined in any suitable manner in one or moreembodiments.

As utilized herein, terms “component,” “system,” “interface,” and thelike are intended to refer to a computer-related entity, hardware,software (e.g., in execution), and/or firmware. For example, a componentcan be a processor, a process running on a processor, an object, anexecutable, a program, a storage device, and/or a computer. By way ofillustration, an application running on a server and the server can be acomponent. One or more components can reside within a process, and acomponent can be localized on one computer and/or distributed betweentwo or more computers.

Further, these components can execute from various machine-readablemedia having various data structures stored thereon. The components cancommunicate via local and/or remote processes such as in accordance witha signal having one or more data packets (e.g., data from one componentinteracting with another component in a local system, distributedsystem, and/or across a network, e.g., the Internet, a local areanetwork, a wide area network, etc. with other systems via the signal).

As another example, a component can be an apparatus with specificfunctionality provided by mechanical parts operated by electric orelectronic circuitry; the electric or electronic circuitry can beoperated by a software application or a firmware application executed byone or more processors; the one or more processors can be internal orexternal to the apparatus and can execute at least a part of thesoftware or firmware application. As yet another example, a componentcan be an apparatus that provides specific functionality throughelectronic components without mechanical parts; the electroniccomponents can include one or more processors therein to executesoftware and/or firmware that confer(s), at least in part, thefunctionality of the electronic components. In an aspect, a componentcan emulate an electronic component via a virtual machine, e.g., withina cloud computing system.

The words “exemplary” and/or “demonstrative” are used herein to meanserving as an example, instance, or illustration. For the avoidance ofdoubt, the subject matter disclosed herein is not limited by suchexamples. In addition, any aspect or design described herein as“exemplary” and/or “demonstrative” is not necessarily to be construed aspreferred or advantageous over other aspects or designs, nor is it meantto preclude equivalent exemplary structures and techniques known tothose of ordinary skill in the art. Furthermore, to the extent that theterms “includes,” “has,” “contains,” and other similar words are used ineither the detailed description or the claims, such terms are intendedto be inclusive—in a manner similar to the term “comprising” as an opentransition word—without precluding any additional or other elements.

As used herein, the term “infer” or “inference” refers generally to theprocess of reasoning about, or inferring states of, the system,environment, user, and/or intent from a set of observations as capturedvia events and/or data. Captured data and events can include user data,device data, environment data, data from sensors, sensor data,application data, implicit data, explicit data, etc. Inference can beemployed to identify a specific context or action, or can generate aprobability distribution over states of interest based on aconsideration of data and events, for example.

Inference can also refer to techniques employed for composinghigher-level events from a set of events and/or data. Such inferenceresults in the construction of new events or actions from a set ofobserved events and/or stored event data, whether the events arecorrelated in close temporal proximity, and whether the events and datacome from one or several event and data sources. Various classificationschemes and/or systems (e.g., support vector machines, neural networks,expert systems, Bayesian belief networks, fuzzy logic, and data fusionengines) can be employed in connection with performing automatic and/orinferred action in connection with the disclosed subject matter.

In addition, the disclosed subject matter can be implemented as amethod, apparatus, or article of manufacture using standard programmingand/or engineering techniques to produce software, firmware, hardware,or any combination thereof to control a computer to implement thedisclosed subject matter. The term “article of manufacture” as usedherein is intended to encompass a computer program accessible from anycomputer-readable device, machine-readable device, computer-readablecarrier, computer-readable media, or machine-readable media. Forexample, computer-readable media can include, but are not limited to, amagnetic storage device, e.g., hard disk; floppy disk; magneticstrip(s); an optical disk (e.g., compact disk (CD), a digital video disc(DVD), a Blu-ray Disc™ (BD)); a smart card; a flash memory device (e.g.,card, stick, key drive); and/or a virtual device that emulates a storagedevice and/or any of the above computer-readable media.

As an overview, various embodiments are described herein to facilitatebeam recovery for a 5G or other next generation network. For simplicityof explanation, the methods (or algorithms) are depicted and describedas a series of acts. It is to be understood and appreciated that thevarious embodiments are not limited by the acts illustrated and/or bythe order of acts. For example, acts can occur in various orders and/orconcurrently, and with other acts not presented or described herein.Furthermore, not all illustrated acts may be required to implement themethods. In addition, the methods could alternatively be represented asa series of interrelated states via a state diagram or events.Additionally, the methods described hereafter are capable of beingstored on an article of manufacture (e.g., a machine-readable storagemedium) to facilitate transporting and transferring such methodologiesto computers. The term article of manufacture, as used herein, isintended to encompass a computer program accessible from anycomputer-readable device, carrier, or media, including a non-transitorymachine-readable storage medium.

It should be noted that although various aspects and embodiments havebeen described herein in the context of 5G, Universal MobileTelecommunications System (UMTS), and/or Long Term Evolution (LTE), orother next generation networks, the disclosed aspects are not limited to5G, a UMTS implementation, and/or an LTE implementation as thetechniques can also be applied in 3G, 4G or LTE systems. For example,aspects or features of the disclosed embodiments can be exploited insubstantially any wireless communication technology. Such wirelesscommunication technologies can include UMTS, Code Division MultipleAccess (CDMA), Wi-Fi, Worldwide Interoperability for Microwave Access(WiMAX), General Packet Radio Service (GPRS), Enhanced GPRS, ThirdGeneration Partnership Project (3GPP), LTE, Third Generation PartnershipProject 2 (3GPP2) Ultra Mobile Broadband (UMB), High Speed Packet Access(HSPA), Evolved High Speed Packet Access (HSPA+), High-Speed DownlinkPacket Access (HSDPA), High-Speed Uplink Packet Access (HSUPA), Zigbee,or another IEEE 802.XX technology. Additionally, substantially allaspects disclosed herein can be exploited in legacy telecommunicationtechnologies.

Described herein are systems, methods, articles of manufacture, andother embodiments or implementations that can facilitate beam recoveryfor a 5G network. Facilitating beam recovery for a 5G network can beimplemented in connection with any type of device with a connection tothe communications network (e.g., a mobile handset, a computer, ahandheld device, etc.) any Internet of things (TOT) device (e.g.,toaster, coffee maker, blinds, music players, speakers, etc.), and/orany connected vehicles (cars, airplanes, space rockets, and/or other atleast partially automated vehicles (e.g., drones)). In some embodimentsthe non-limiting term user equipment (UE) is used. It can refer to anytype of wireless device that communicates with a radio network node in acellular or mobile communication system. Examples of UE are targetdevice, device to device (D2D) UE, machine type UE or UE capable ofmachine to machine (M2M) communication, PDA, Tablet, mobile terminals,smart phone, laptop embedded equipped (LEE), laptop mounted equipment(LME), USB dongles etc. Note that the terms element, elements andantenna ports can be interchangeably used but carry the same meaning inthis disclosure. The embodiments are applicable to single carrier aswell as to multicarrier (MC) or carrier aggregation (CA) operation ofthe UE. The term carrier aggregation (CA) is also called (e.g.interchangeably called) “multi-carrier system”, “multi-cell operation”,“multi-carrier operation”, “multi-carrier” transmission and/orreception.

In some embodiments the non-limiting term radio network node or simplynetwork node is used. It can refer to any type of network node thatserves UE is connected to other network nodes or network elements or anyradio node from where UE receives a signal. Examples of radio networknodes are Node B, base station (BS), multi-standard radio (MSR) nodesuch as MSR BS, eNode B, network controller, radio network controller(RNC), base station controller (BSC), relay, donor node controllingrelay, base transceiver station (BTS), access point (AP), transmissionpoints, transmission nodes, RRU, RRH, nodes in distributed antennasystem (DAS) etc.

Cloud radio access networks (RAN) can enable the implementation ofconcepts such as software-defined network (SDN) and network functionvirtualization (NFV) in 5G networks. This disclosure can facilitate ageneric channel state information framework design for a 5G network.Certain embodiments of this disclosure can comprise an SDN controllerthat can control routing of traffic within the network and between thenetwork and traffic destinations. The SDN controller can be merged withthe 5G network architecture to enable service deliveries via openapplication programming interfaces (“APIs”) and move the network coretowards an all internet protocol (“IP”), cloud based, and softwaredriven telecommunications network. The SDN controller can work with, ortake the place of policy and charging rules function (“PCRF”) networkelements so that policies such as quality of service and trafficmanagement and routing can be synchronized and managed end to end.

To meet the huge demand for data centric applications, 4G standards canbe applied 5G, also called new radio (NR) access. 5G networks cancomprise the following: data rates of several tens of megabits persecond supported for tens of thousands of users; 1 gigabit per secondcan be offered simultaneously to tens of workers on the same officefloor; several hundreds of thousands of simultaneous connections can besupported for massive sensor deployments; spectral efficiency can beenhanced compared to 4G; improved coverage; enhanced signalingefficiency; and reduced latency compared to LTE. In multicarrier systemsuch as OFDM, each subcarrier can occupy bandwidth (e.g., subcarrierspacing). If the carriers use the same bandwidth spacing, then it can beconsidered a single numerology. However, if the carriers occupydifferent bandwidth and/or spacing, then it can be considered a multiplenumerology.

Downlink reference signals are predefined signals occupying specificresource elements within a downlink time—frequency grid. There areseveral types of downlink reference signals that can be transmitted indifferent ways and used for different purposes by a receiving terminal.Channel state information reference signals (CSI-RS) can be used byterminals to acquire channel-state information (CSI) and beam specificinformation (e.g., beam reference signal received power). In 5G, CSI-RScan be user equipment (UE) specific so it can have a significantly lowertime/frequency density. Demodulation reference signals (DM-RS), alsosometimes referred to as UE-specific reference signals, can be used byterminals for channel estimation of data channels. The label“UE-specific” relates to the each demodulation reference signal beingintended for channel estimation by a single terminal. The demodulationreference signal can then be transmitted within the resource blocksassigned for data traffic channel transmission to that terminal. Otherthan the aforementioned reference signals, there are other referencesignals, namely multi-cast broadcast single frequency network (MBSFN)and positioning reference signals that can be used for various purposes.

Beam recovery procedure is clear for a single beam pair link (BPL),where a beam pair link is a pair of a DL Tx beam and an UL Rx beam. TheBPL quality can be estimated by the associated RS resource. Thereforethe failure of the RS resource represents the beam failure. However, aUE can be configured with multiple sets of BPLs. Each set of BPL(s) canassociated with one RS resource.

After beam failure detection, the UE can try to identify a new candidatebeam to be used for beam recovery. To identify a new candidate beam, theUE can monitor the beam identification RS. This RS can be CSI-RS, usedfor beam management, if it is configured by the network. In the casewhen CSI-RS is not configured, or when the configured set of CSI-RScannot be used to identify a new beam, another RS can be used to do newbeam identification.

After new beam identification, the UE can send a beam recovery requesttransmission. Information carried by the beam recovery requesttransmission can include, but is not limited to, information aboutidentifying UE and new network node (e.g., gNB) TX beam information. Thechannels that carry the beam recovery request transmissions can besimilar to a non-contention physical random access channel (PRACH) basedon PRACH, which uses resources orthogonal to resources of other PRACHtransmissions.

In addition to non-contention based PRACH, other channels for recoveryrequest transmissions can also potentially be used, such ascontention-based RACH resources. A straightforward way is to use the4-step RACH procedure, similar to the one used in initial access, iswith preambles chosen from the traditional RACH resource pool.

During a beam failure recovery procedure, after beam failure detection,the UE can monitor the beam identification reference signal (RS), toidentify new beams for recovery. A beam failure can be detected when theUE is not able to receive any signal data detecting that the beam isworking. Beam identification RS s can be UE-specific channel stateinformation-reference signal (CSI-RS), used for beam management, ifconfigured for the UE. When configured, the CSI-RS can be used toidentify new beams. If the CSI-RS based monitoring fails to identify anew beam, and no other RS is used for beam management, the UE cannotidentify the new beam in the current example. This can result in eithera recovery signaling to the network to inform the network of no newcandidate beam exists, or a declaration of beam failure.

However, use of a synchronization signaling (SS) block, as another RSused for new beam identification, can be implemented in a 2-stepapproach for new beam identification. Existing solutions for beamrecovery request transmission can use non-contention based random accesschannel (RACH) type resources to inform the network of the identifiednew beam and the occurrence of the beam failure. These resources mightnot be sufficient when another RS, other than the configured CSI-RS isused for new beam identification, such as SS-block. Instead of using thetraditional 4-step RACH procedure for beam recovery requesttransmission, this disclosure discusses a modified 2-stepcontention-based RACH procedure that preserves overhead and reduceslatency associated with the traditional 4-step procedure.

RACH resources can comprise preambles (e.g., unique UE identifiers) thatare already configured to a specific UE. The preambles can allow thesystem to operate as a non contention-based system, wherein the UE cansend the network device a preamble to assist in identification of theUE, thereby preserving resources. However, in a non-contention-basedsystem, the number of reserved preamble resources might be smallcompared to non-reserved preamble resources used in contention-basedRACH procedure. Therefore non-contention based resources might not besufficient to transmit new beam identifiers based on another referencesignal, such as SS-block

This disclosure proposes signaling procedures for the new beamidentification in the beam recovery procedure. Using this new beamidentification approach, can comprise using new channels for recoveryrequest transmission from the UE to the network.

A two-step procedure can be used, wherein the first step comprises usingconfigured CSI-RS resources to identify a new beam, and where the secondstep comprises using SS-block transmitted RS to identify the new beam.In NR initial access, synchronization signals (e.g., a primarysynchronization signal (PSS), a secondary synchronization signal (SSS)and/or a primary broadcast channel (PBCH)) can be transmitted within anSS-block. One or multiple SS-blocks compose an SS burst. One or multipleSS bursts compose an SS burst set where the number of SS bursts withinan SS burst set is finite. A given number of SS blocks per cell can betransmitted with a given periodicity, depending on the carrierfrequency, to establish synchronization of the UE with a network deviceof the network. SS-blocks are not configured per UE, but rathertransmitted periodically by the network.

In one embodiment, during the two-step beam identification procedure,based on configured CSI-RS resources in step 1, a new beam can beidentified, and identification data associated with the new beam can bereported in a recovery request transmission. In another scenario wherethe configured CSI-RS fails to identify a new beam, a second step, cancomprise utilization of SS-blocks to identify the new beam. SS-blockbased new candidate beam identification can then be signaled to thenetwork via the recovery request transmission. Additionally, for thecase where the CSI-RS is not configured in the network, the SS-blockbased new candidate beam identification can then be signaled to thenetwork via the recovery request transmission.

In another embodiment, use of a channel associated with the recoveryrequest transmission, can prompt a modified contention-based RACHprocedure to report on the new identified beam in the 2-step approach beused in the aforementioned embodiment. For example, when configuredCSI-RS resources are used for new beam identification, non-contentionchannel based on physical (P)RACH can be used for beam recovery requesttransmissions. The required overhead to report on identified beams usingconfigured CSI-RS is not significant enough to merit the usecontention-based RACH preamble resources. For the two-step new beamidentification procedure, when the SS-block is used to identify newbeams, the number of the SS-blocks transmitted for a given cellidentification (ID) can lead to a large overhead that cannot be handledby reserving contention-free preamble resources such as in the RACH-likecontention-free method used for the configured CSI-RS. For such largeoverhead, contention-based RACH resources can be used.

Instead of using a traditional 4-step RACH procedure, akin to that usedin initial access, a modified 2-step RACH procedure can be used suchthat the preamble resources for the contention based procedure are usedto indicate the SS-block used for the new beam identification to thenetwork, and a random access response is used by the network to signalthe detection of the transmitted preamble and a timing synchronizationalignment instruction to synchronize subsequent uplink transmissionsfrom the UE. The proposed RACH procedure does not require transmissionof a message to indicate the user ID, since the UE is known to thenetwork, and does not subsequently require contention resolution.

In one embodiment, described herein is a method comprising in responseto a determination of a first failure of a reference signal configuredto manage a first beam, the first failure indicating that the referencesignal was not received, determining a second failure associated withthe first beam, wherein the reference signal and the first beam are tobe received by the mobile device from a network device of the wirelessnetwork. In response to a condition associated with the reference signalbeing determined to have been satisfied, the method can compriseidentifying a second beam that is not the first beam. The method canalso facilitate a transmission of the second beam via a transmissionchannel for a recovery request related to a recovery associated with thefirst beam to mitigate the second failure.

According to another embodiment, a system can facilitate, in response toa first determination of a first failure associated with a referencesignal configured to manage a first beam, determining a second failureassociated with a first beam, wherein the reference signal and the firstbeam have been directed to the mobile device from a network device of awireless network. In response to a condition associated with thereference signal being determined to have been satisfied, the system canidentify a second beam that is not the first beam, wherein the conditionis further associated with a second determination that the referencesignal does not identify the second beam. In response to the seconddetermination that the reference signal does not identify the secondbeam, the system can utilize a synchronization signal block associatedwith a synchronization signal to identify the second beam. Furthermore,the system can transmit the second beam via a random access channel fora recovery request related to a recovery of the first beam to rectifythe second failure.

According to yet another embodiment, described herein is amachine-readable storage medium that can perform the operationscomprising in response to a first determination of a first failureassociated with a blocked reference signal of a wireless network,determining a second failure associated with a first beam associatedwith the blocked reference signal. In response to a condition associatedwith the blocked reference signal being determined to have beensatisfied, the machine-readable storage medium can facilitateidentifying a second beam, wherein the condition is further associatedwith a second determination that the blocked reference signal does notidentify the second beam. In response to the second determination thatthe blocked reference signal does not identify the second beam, themachine-readable storage medium can facilitate utilizing asynchronization signal block associated with a synchronization signal toidentify the second beam. Additionally, the machine-readable storagemedium can facilitate transmitting data associated with the second beamvia a random access channel for a recovery request related to a recoveryof the first beam to rectify the second failure.

These and other embodiments or implementations are described in moredetail below with reference to the drawings.

Referring now to FIG. 1, illustrated is an example wirelesscommunication system 100 in accordance with various aspects andembodiments of the subject disclosure. In one or more embodiments,system 100 can comprise one or more user equipment UEs 102. Thenon-limiting term user equipment can refer to any type of device thatcan communicate with a network node in a cellular or mobilecommunication system. A UE can have one or more antenna panels havingvertical and horizontal elements. Examples of a UE comprise a targetdevice, device to device (D2D) UE, machine type UE or UE capable ofmachine to machine (M2M) communications, personal digital assistant(PDA), tablet, mobile terminals, smart phone, laptop mounted equipment(LME), universal serial bus (USB) dongles enabled for mobilecommunications, a computer having mobile capabilities, a mobile devicesuch as cellular phone, a laptop having laptop embedded equipment (LEE,such as a mobile broadband adapter), a tablet computer having a mobilebroadband adapter, a wearable device, a virtual reality (VR) device, aheads-up display (HUD) device, a smart car, a machine-type communication(MTC) device, and the like. User equipment UE 102 can also comprise IOTdevices that communicate wirelessly.

In various embodiments, system 100 is or comprises a wirelesscommunication network serviced by one or more wireless communicationnetwork providers. In example embodiments, a UE 102 can becommunicatively coupled to the wireless communication network via anetwork node 104. The network node (e.g., network node device) cancommunicate with user equipment (UE), thus providing connectivitybetween the UE and the wider cellular network. The UE 102 can sendtransmission type recommendation data to the network node 104. Thetransmission type recommendation data can comprise a recommendation totransmit data via a closed loop MIMO mode and/or a rank-1 precoder mode.

A network node can have a cabinet and other protected enclosures, anantenna mast, and multiple antennas for performing various transmissionoperations (e.g., MIMO operations). Network nodes can serve severalcells, also called sectors, depending on the configuration and type ofantenna. In example embodiments, the UE 102 can send and/or receivecommunication data via a wireless link to the network node 104. Thedashed arrow lines from the network node 104 to the UE 102 representdownlink (DL) communications and the solid arrow lines from the UE 102to the network nodes 104 represents an uplink (UL) communication.

System 100 can further include one or more communication serviceprovider networks 106 that facilitate providing wireless communicationservices to various UEs, including UE 102, via the network node 104and/or various additional network devices (not shown) included in theone or more communication service provider networks 106. The one or morecommunication service provider networks 106 can include various types ofdisparate networks, including but not limited to: cellular networks,femto networks, picocell networks, microcell networks, internet protocol(IP) networks Wi-Fi service networks, broadband service network,enterprise networks, cloud based networks, and the like. For example, inat least one implementation, system 100 can be or include a large scalewireless communication network that spans various geographic areas.According to this implementation, the one or more communication serviceprovider networks 106 can be or include the wireless communicationnetwork and/or various additional devices and components of the wirelesscommunication network (e.g., additional network devices and cell,additional UEs, network server devices, etc.). The network node 104 canbe connected to the one or more communication service provider networks106 via one or more backhaul links 108. For example, the one or morebackhaul links 108 can comprise wired link components, such as a T1/E1phone line, a digital subscriber line (DSL) (e.g., either synchronous orasynchronous), an asymmetric DSL (ADSL), an optical fiber backbone, acoaxial cable, and the like. The one or more backhaul links 108 can alsoinclude wireless link components, such as but not limited to,line-of-sight (LOS) or non-LOS links which can include terrestrialair-interfaces or deep space links (e.g., satellite communication linksfor navigation).

Wireless communication system 100 can employ various cellular systems,technologies, and modulation modes to facilitate wireless radiocommunications between devices (e.g., the UE 102 and the network node104). While example embodiments might be described for 5G new radio (NR)systems, the embodiments can be applicable to any radio accesstechnology (RAT) or multi-RAT system where the UE operates usingmultiple carriers e.g. LTE FDD/TDD, GSM/GERAN, CDMA2000 etc.

For example, system 100 can operate in accordance with global system formobile communications (GSM), universal mobile telecommunications service(UMTS), long term evolution (LTE), LTE frequency division duplexing (LTEFDD, LTE time division duplexing (TDD), high speed packet access (HSPA),code division multiple access (CDMA), wideband CDMA (WCMDA), CDMA2000,time division multiple access (TDMA), frequency division multiple access(FDMA), multi-carrier code division multiple access (MC-CDMA),single-carrier code division multiple access (SC-CDMA), single-carrierFDMA (SC-FDMA), orthogonal frequency division multiplexing (OFDM),discrete Fourier transform spread OFDM (DFT-spread OFDM) single carrierFDMA (SC-FDMA), Filter bank based multi-carrier (FBMC), zero tailDFT-spread-OFDM (ZT DFT-s-OFDM), generalized frequency divisionmultiplexing (GFDM), fixed mobile convergence (FMC), universal fixedmobile convergence (UFMC), unique word OFDM (UW-OFDM), unique wordDFT-spread OFDM (UW DFT-Spread-OFDM), cyclic prefix OFDM CP-OFDM,resource-block-filtered OFDM, Wi Fi, WLAN, WiMax, and the like. However,various features and functionalities of system 100 are particularlydescribed wherein the devices (e.g., the UEs 102 and the network device104) of system 100 are configured to communicate wireless signals usingone or more multi carrier modulation schemes, wherein data symbols canbe transmitted simultaneously over multiple frequency subcarriers (e.g.,OFDM, CP-OFDM, DFT-spread OFMD, UFMC, FMBC, etc.). The embodiments areapplicable to single carrier as well as to multicarrier (MC) or carrieraggregation (CA) operation of the UE. The term carrier aggregation (CA)is also called (e.g. interchangeably called) “multi-carrier system”,“multi-cell operation”, “multi-carrier operation”, “multi-carrier”transmission and/or reception. Note that some embodiments are alsoapplicable for Multi RAB (radio bearers) on some carriers (that is dataplus speech is simultaneously scheduled).

In various embodiments, system 100 can be configured to provide andemploy 5G wireless networking features and functionalities. 5G wirelesscommunication networks are expected to fulfill the demand ofexponentially increasing data traffic and to allow people and machinesto enjoy gigabit data rates with virtually zero latency. Compared to 4G,5G supports more diverse traffic scenarios. For example, in addition tothe various types of data communication between conventional UEs (e.g.,phones, smartphones, tablets, PCs, televisions, Internet enabledtelevisions, etc.) supported by 4G networks, 5G networks can be employedto support data communication between smart cars in association withdriverless car environments, as well as machine type communications(MTCs). Considering the drastic different communication needs of thesedifferent traffic scenarios, the ability to dynamically configurewaveform parameters based on traffic scenarios while retaining thebenefits of multi carrier modulation schemes (e.g., OFDM and relatedschemes) can provide a significant contribution to the highspeed/capacity and low latency demands of 5G networks. With waveformsthat split the bandwidth into several sub-bands, different types ofservices can be accommodated in different sub-bands with the mostsuitable waveform and numerology, leading to an improved spectrumutilization for 5G networks.

To meet the demand for data centric applications, features of proposed5G networks may comprise: increased peak bit rate (e.g., 20 Gbps),larger data volume per unit area (e.g., high system spectralefficiency—for example about 3.5 times that of spectral efficiency oflong term evolution (LTE) systems), high capacity that allows moredevice connectivity both concurrently and instantaneously, lowerbattery/power consumption (which reduces energy and consumption costs),better connectivity regardless of the geographic region in which a useris located, a larger numbers of devices, lower infrastructuraldevelopment costs, and higher reliability of the communications. Thus,5G networks may allow for: data rates of several tens of megabits persecond should be supported for tens of thousands of users, 1 gigabit persecond to be offered simultaneously to tens of workers on the sameoffice floor, for example; several hundreds of thousands of simultaneousconnections to be supported for massive sensor deployments; improvedcoverage, enhanced signaling efficiency; reduced latency compared toLTE.

The upcoming 5G access network may utilize higher frequencies (e.g., >6GHz) to aid in increasing capacity. Currently, much of the millimeterwave (mmWave) spectrum, the band of spectrum between 30 gigahertz (Ghz)and 300 Ghz is underutilized. The millimeter waves have shorterwavelengths that range from 10 millimeters to 1 millimeter, and thesemmWave signals experience severe path loss, penetration loss, andfading. However, the shorter wavelength at mmWave frequencies alsoallows more antennas to be packed in the same physical dimension, whichallows for large-scale spatial multiplexing and highly directionalbeamforming.

Performance can be improved if both the transmitter and the receiver areequipped with multiple antennas. Multi-antenna techniques cansignificantly increase the data rates and reliability of a wirelesscommunication system. The use of multiple input multiple output (MIMO)techniques, which was introduced in the third-generation partnershipproject (3GPP) and has been in use (including with LTE), is amulti-antenna technique that can improve the spectral efficiency oftransmissions, thereby significantly boosting the overall data carryingcapacity of wireless systems. The use of multiple-input multiple-output(MIMO) techniques can improve mmWave communications, and has been widelyrecognized a potentially important component for access networksoperating in higher frequencies. MIMO can be used for achievingdiversity gain, spatial multiplexing gain and beamforming gain. Forthese reasons, MIMO systems are an important part of the 3rd and 4thgeneration wireless systems, and are planned for use in 5G systems.

Referring now to FIG. 2, illustrated an example schematic system blockdiagram of a random access message sequence chart according to one ormore embodiments. A standard message sequence chart 200 for a 4-steprandom access procedure in next generation cellular networks is depictedin FIG. 2. Random access allows the UE 102 to request a connection setupwith the network node 104. Random access can be used for initial access(e.g., moving from radio resource control (RRC)-idle to RRC-connected),to re-establish a connection, after link failure, for handover.

The 4-step random access procedure illustrated comprises a UE 102transmitting a random access preamble for the network to estimate the UEtiming and establish uplink (UL) synchronization in Message 1. Message2, from the network node 104, can comprise a random access response fortransmitting a timing advance command to adjust the device transmittiming, and assign uplink resources for the device to use for Message.3. Message 3, sent from the UE 102, can comprise an UL physical ULshared channel (PUSCH) to transmit the UE identity, among otherinformation, to the network node 104. This is similar to normalscheduled data, and the content of Message 3 depends on the state of thedevice. Message 4 from the network node 104 can comprise contentionresolution on a DL physical downlink shared channel (PDSCH) if there isa contention due to multiple users trying to access the network.

In addition to the baseline contention-based 4-step RACH procedure, acontention-free random access procedure can be defined, where thenetwork can assign a dedicated preamble signature to the UE 102, so thatUEs 102 do not have to contend for preamble resources. This simplifiesthe procedure to a 2-step procedure that only has a preambletransmission step, and a random access response step. Thecontention-free RACH procedure can reduce the latency in cases such ashandover.

Additionally, a third random access procedure can possibly be definedwhere the 4-step procedure is replaced by a simplified 2-step procedure.This simplified RACH procedure is motivated by a reduction in theoverhead and delay, when a small packet is transmitted. It can also bebeneficial in an unlicensed scenario, or an LTE-assisted random accessprocedure.

For the 2-step (simplified) RACH procedure, transmission contents arecombined into two steps. Message 1 is transmitted in step 1, and Message2 is transmitted in step 2. Message 1 in the 2-step procedure can bethought of as combining Message 1 and Message 3 in the 4-step procedure,whereas the preamble can be sent followed by the message part thatcontains the device identity in addition to other mobile devicemessages. The Message 2 in step 2 of the 2-step RACH procedure can bethought of as combining Message 2 and Message 4, whereas a Message 2carries timing advance, UL grant and contention resolution information.

NR supports a 4-step random access procedure as a baseline. Randomaccess procedure is supported for both RRC-idle (idle) and RRC-connected(connected) UEs. At least for UE in idle mode, the UE can select thesubset of RACH preamble indices based on DL measurement and associationindicated by system information (SI).

Referring now to FIG. 3, illustrated is an example schematic systemblock diagram of beam failure recovery chart 300 according to one ormore embodiments. During a channel measurement campaign, one of themmWave propagation problems is a blockage effect. As a result of smallerwave lengths, objects around a user, including the user, mighttemporarily block the mmWave propagation in a certain direction. Thenarrower beamforming of NR can increase the magnitude of this effect.Therefore, bam failure recovery can also comprise the followingprocedure as indicated in the beam failure recovery chart 300.

The network node 104 can send a downlink signal transmission to the UE102. The UE 102 can then identify a beam failure 302 based on theconfigured RS resource using that beam. The UE 102 can also identifyalternative beams pair links 304 (including Tx and Rx beams) as newbeams to interact with. The UE 102 can then transmit uplink signaling(i.e., recovery request transmission) to the network node 104 toindicate the beam failure as well as the alternative beam pairs.Thereafter, the UE 102 can then switch to a physical channel downlinkcontrol information (PDCCH) receiver beam according by utilizing thealternative beam pairs 306 to monitor the PDCCH for confirmation fromthe network node 104 (e.g., gNB confirmation).

Referring now to FIG. 4, illustrated is an example schematic systemblock diagram of beam identification by configured CSI-RS according toone or more embodiments. The 2-step procedure 400 can begin with adownlink signal transmission being sent from the network node 104 to theUE 102. Therefore, the first step can use configured CSI-RS resources toidentify a new beam. For example, the UE 102 can determine beam failurebased on a configured CSI-RS 402. At step 2, the UE 102 can identify anew beam based on the configured CSI-RS resources in step 1. Thus, thenew beam information can be reported in the recovery requesttransmission of an uplink signal.

Referring now to FIG. 5 illustrates an example schematic system blockdiagram of beam identification by an SS-block according to one or moreembodiments. In another embodiment, the 2-step procedure 500 can beginwith a downlink signal transmission being sent from the network node 104to the UE 102. For this scenario, step 1 can comprise a configuredCSI-RS failing to identify a new beam 502. However, the second step, cancomprise identification of new beams based on SS-blocks 504. In NRinitial access, synchronization signals NR-PSS, NR-SSS and/or NR-PBCHcan be transmitted within an SS-block. One or multiple SS-blocks composean SS burst. One or multiple SS bursts compose a SS burst set where thenumber of SS bursts within an SS burst set is finite. A given number ofSS blocks per cell can be transmitted with a given periodicity,depending on the carrier frequency, to establish synchronization of theUE 102 with the network node 104. SS-blocks are not configured per UE102, but rather transmitted periodically by the network node 104.

The second step comprises using other transmitted RS (e.g., othersbesides the configured CSI-RS) for new candidate beam identification,wherein the RS used in the second step can be based on SS-block. TheSS-block based new candidate beam identification can then be signaled tothe network via a recovery request transmission of an uplink signal.

Referring now to FIG. 6, illustrated is an example schematic systemblock diagram of beam identification by configured CSI-RS and anon-contention channel according to one or more embodiments. Thisembodiment comprises a 2-step procedure 600 that can begin with adownlink signal transmission being sent from the network node 104 to theUE 102. Therefore, the first step can leverage configured CSI-RSresources to determine a beam failure. For example, the UE 102 candetermine beam failure based on a configured CSI-RS 602. At step 2, theUE 102 can identify a new beam based on the configured CSI-RS resourcesin step 1. Thus, the new beam information can be reported in therecovery request transmission of an uplink signal. However, in thisembodiment, a non-contention channel (e.g., assigning a preamble to theUE 102) associated with a PRACH can be used for beam recovery requesttransmission. Thus, the required overhead to report on the identifiedbeam using configured CSI-RS is not significant enough to usecontention-based RACH preamble resources.

Referring now to FIG. 7, illustrated is an example schematic systemblock diagram of beam identification by an SS-block and a contentionchannel according to one or more embodiments. In yet another embodimentcomprising a 2-step procedure 700, a downlink signal transmission can besent from the network node 104 to the UE 102. For the scenario, when aconfigured CSI-RS fails to identify a new beam 702, the new beam can beidentified by the SS-blocks 704. In NR initial access, synchronizationsignals NR-PSS, NR-SSS and/or NR-PBCH can be transmitted within anSS-block. One or multiple SS-blocks compose an SS burst. One or multipleSS bursts compose a SS burst set where the number of SS bursts within anSS burst set is finite. A given number of SS blocks per cell can betransmitted with a given periodicity, depending on the carrierfrequency, to establish synchronization of the UE 102 with the networknode 104. SS-blocks are not configured per UE 102, but rathertransmitted periodically by the network node 104.

The second step comprises using other transmitted RS (e.g., othersbesides the configured CSI-RS) for new candidate beam identification,wherein the RS used in the second step can be based on SS-block. TheSS-block based new candidate beam identification can then be signaled tothe network via a recovery request transmission of an uplink signal.

For the two-step new beam identification procedure, when SS-block isused to identify new beams, the number of SS-blocks transmitted for agiven cell ID might lead to a large overhead that cannot be handled byreserving contention-free preamble resources such as similar to the RACHcontention-free method used for configured CSI-RS. Thus, for such largeoverhead, contention-based RACH resources can be used.

Referring now to FIG. 8, illustrated is an example schematic systemblock diagram of beam identification by an SS-block and contentionchannel based on a non-configured CSI-RS according to one or moreembodiments. This embodiment comprises a 2-step procedure 800 that canbegin with a downlink signal transmission being sent from the networknode 104 to the UE 102. In this scenario, when the CSI-RS is notconfigured in the network 802, the SS-block can identify the new beam804 and transmit in the recovery request transmission via an uplinksignal transmission.

In NR initial access, synchronization signals NR-PSS, NR-SSS and/orNR-PBCH can be transmitted within an SS-block. One or multiple SS-blockscompose an SS burst. One or multiple SS bursts compose a SS burst setwhere the number of SS bursts within an SS burst set is finite. A givennumber of SS blocks per cell can be transmitted with a givenperiodicity, depending on the carrier frequency, to establishsynchronization of the UE 102 with the network node 104. SS-blocks arenot configured per UE 102, but rather transmitted periodically by thenetwork node 104.

The second step comprises using other transmitted RS (e.g., othersbesides the configured CSI-RS) for new candidate beam identification,wherein the RS used in the second step can be based on SS-block. TheSS-block based new candidate beam identification can then be signaled tothe network via a recovery request transmission of an uplink signal.

For the two-step new beam identification procedure, when SS-block isused to identify new beams, the number of SS-blocks transmitted for agiven cell ID can lead to a large overhead that may not be handled byreserving contention-free preamble resources such as those similar tothe RACH contention-free method used for the configured CSI-RS. Thus,for such large overhead, contention-based RACH resources can be used.

Referring now to FIG. 9, illustrates an example schematic system blockdiagram of modified contention based RACH procedure according to one ormore embodiments. Instead of using a traditional 4-step RACH procedure,akin to that used in initial access, a modified 2-step RACH procedure900 is represented. The modified RACH procedure can comprise preambleresources (e.g., Message 1: random access preamble) for thecontention-based procedure, which can be used to indicate the SS-blockused for new beam identification to the network node 104, and a randomaccess response (e.g., Message 2) can be used by the network node 104 tosignal the detection of the transmitted preamble and a timing alignmentinstruction to synchronize subsequent uplink transmissions from the UE102. The proposed RACH procedure does not, however, require transmissionof a Message 3 to indicate the UE ID, since the UE 102 is known to thenetwork node 104, and does not subsequently require contentionresolution. The proposed modified contention based RACH procedure forrecovery request transmission can further be applied to the simplified2-RACH procedure, whereas the signaling in the simplified 2-step RACHprocedure can be further reduced in the Message 1 and Message 2 to onlyaccount for the signaling required to deliver and identify the preambleresources by the UE 102 and the network node 104.

Referring now to FIG. 10, illustrated is an example flow chart for beamselection according to one or more embodiments. The beam selection flowchart 1000 can begin at step 1002. It should be understood that to beginthis process, a downlink signal transmission can be sent from thenetwork node 104 to the UE 102. Block 1004 comprises a CSI-RS. If theCSI-RS is configured, then the decision tree can select yes at step 1006and proceed to block 1010 for the new beam. Alternatively, if the CSI-RSis not configured, then the decision tree can select no at step 1006 andproceed to identify the new beam via SS blocks of block 1008 at the UE102. Thereafter, the UE 102 can send a recovery request transmission forthe new beam, at block 1014, to the network node 104. Sending therecovery request transmission based on the SS-block identification canalso end the process at the end block 1014.

If the new beam is identified at step 1012, then the UE 102 can send arecovery request transmission for the new beam, at block 1014, to thenetwork node 104. Sending the recovery request transmission can end theprocess at the end block 1014. Alternatively, if the new beam is notidentified at step 1012, then SS-blocks can be used to identify the newbeam by the UE 102 at block 1008. Thereafter, the UE 102 can send arecovery request transmission for the new beam, at block 1014, to thenetwork node 104. Sending the recovery request transmission based on theSS-block identification can also end the process at the end block 1014.

Referring now to FIG. 11, illustrated is an example flow diagram for amethod for beam selection 1100 for a 5G network according to one or moreembodiments. In response to a determination of a first failure of areference signal configured to manage a first beam, the first failureindicating that the reference signal was not received, a method candetermine a second failure (e.g., via a UE 102) associated with thefirst beam, wherein the reference signal and the first beam are to bereceived by the mobile device from a network device of the wirelessnetwork at element 1102. In response to a condition associated with thereference signal being determined to have been satisfied, the method cancomprise identifying (e.g., via a UE 102) a second beam that is not thefirst beam at element 1104. The method can also facilitate atransmission of the second beam via a transmission channel for arecovery request related to a recovery associated with the first beam tomitigate the second failure at element 1106.

Referring now to FIG. 12, illustrated is an example flow diagram for asystem for beam selection 1200 for a 5G network according to one or moreembodiments. In response to a determination of a first failureassociated with a reference signal configured to manage a first beam,the system can determine a second failure (e.g., via a UE 102)associated with the first beam, wherein the reference signal and thefirst beam have been directed to the mobile device from a network deviceof a wireless network at element 1202. In response to a conditionassociated with the reference signal being determined to have beensatisfied, the system can identify (e.g., via a UE 102) a second beamthat is not the first beam, wherein the condition is further associatedwith a second determination that the reference signal does not identifythe second beam at element 1204. Additionally, in response to the seconddetermination that the reference signal does not identify the secondbeam, the system can utilize a synchronization signal block (e.g., via aUE 102) associated with a synchronization signal to identify the secondbeam at element 1206. Furthermore, the system can transmit (e.g., via aUE 102) the second beam via a random access channel for a recoveryrequest related to a recovery of the first beam to rectify the secondfailure at element 1208.

Referring now to FIG. 13, illustrated is an example flow diagram formachine-readable medium for beam selection 1300 for a 5G networkaccording to one or more embodiments. In response to a firstdetermination of a first failure associated with a blocked referencesignal of a wireless network, the machine-readable storage medium canfacilitate determining a second failure associated (e.g., via a UE 102)with a first beam associated with the blocked reference signal atelement 1302. At element 1304, in response to a condition associatedwith the blocked reference signal being determined to have beensatisfied, the machine-readable storage medium can facilitateidentifying (e.g., via a UE 102) a second beam, wherein the condition isfurther associated with a second determination that the blockedreference signal does not identify the second beam. In response to thesecond determination that the blocked reference signal does not identifythe second beam, the machine-readable storage medium can facilitateutilizing (e.g., via a UE 102) a synchronization signal block associatedwith a synchronization signal to identify the second beam at element1306. Additionally, at element 1308, the machine-readable storage mediumcan facilitate transmitting data (e.g., via a UE 102) associated withthe second beam via a random access channel for a recovery requestrelated to a recovery of the first beam to rectify the second failure.

Referring now to FIG. 14, illustrated is a schematic block diagram of auser equipment (e.g., user equipment 102) that can be a mobile device1400 capable of connecting to a network in accordance with someembodiments described herein. Although a mobile handset 1400 isillustrated herein, it will be understood that other devices can be amobile device, and that the mobile handset 1400 is merely illustrated toprovide context for the embodiments of the various embodiments describedherein. The following discussion is intended to provide a brief, generaldescription of an example of a suitable environment 1400 in which thevarious embodiments can be implemented. While the description includes ageneral context of computer-executable instructions embodied on amachine-readable storage medium, those skilled in the art will recognizethat the innovation also can be implemented in combination with otherprogram modules and/or as a combination of hardware and software.

Generally, applications (e.g., program modules) can include routines,programs, components, data structures, etc., that perform particulartasks or implement particular abstract data types. Moreover, thoseskilled in the art will appreciate that the methods described herein canbe practiced with other system configurations, includingsingle-processor or multiprocessor systems, minicomputers, mainframecomputers, as well as personal computers, hand-held computing devices,microprocessor-based or programmable consumer electronics, and the like,each of which can be operatively coupled to one or more associateddevices.

A computing device can typically include a variety of machine-readablemedia. Machine-readable media can be any available media that can beaccessed by the computer and includes both volatile and non-volatilemedia, removable and non-removable media. By way of example and notlimitation, computer-readable media can comprise computer storage mediaand communication media. Computer storage media can include volatileand/or non-volatile media, removable and/or non-removable mediaimplemented in any method or technology for storage of information, suchas computer-readable instructions, data structures, program modules orother data. Computer storage media can include, but is not limited to,RAM, ROM, EEPROM, flash memory or other memory technology, CD ROM,digital video disk (DVD) or other optical disk storage, magneticcassettes, magnetic tape, magnetic disk storage or other magneticstorage devices, or any other medium which can be used to store thedesired information and which can be accessed by the computer.

Communication media typically embodies computer-readable instructions,data structures, program modules or other data in a modulated datasignal such as a carrier wave or other transport mechanism, and includesany information delivery media. The term “modulated data signal” means asignal that has one or more of its characteristics set or changed insuch a manner as to encode information in the signal. By way of example,and not limitation, communication media includes wired media such as awired network or direct-wired connection, and wireless media such asacoustic, RF, infrared and other wireless media. Combinations of the anyof the above should also be included within the scope ofcomputer-readable media.

The handset 1400 includes a processor 1402 for controlling andprocessing all onboard operations and functions. A memory 1404interfaces to the processor 1402 for storage of data and one or moreapplications 1406 (e.g., a video player software, user feedbackcomponent software, etc.). Other applications can include voicerecognition of predetermined voice commands that facilitate initiationof the user feedback signals. The applications 1406 can be stored in thememory 1404 and/or in a firmware 1408, and executed by the processor1402 from either or both the memory 1404 or/and the firmware 1408. Thefirmware 1408 can also store startup code for execution in initializingthe handset 1400. A communications component 1410 interfaces to theprocessor 1402 to facilitate wired/wireless communication with externalsystems, e.g., cellular networks, VoIP networks, and so on. Here, thecommunications component 1410 can also include a suitable cellulartransceiver 1411 (e.g., a global GSM transceiver) and/or an unlicensedtransceiver 1413 (e.g., Wi-Fi, WiMax) for corresponding signalcommunications. The handset 1400 can be a device such as a cellulartelephone, a PDA with mobile communications capabilities, andmessaging-centric devices. The communications component 1410 alsofacilitates communications reception from terrestrial radio networks(e.g., broadcast), digital satellite radio networks, and Internet-basedradio services networks.

The handset 1400 includes a display 1412 for displaying text, images,video, telephony functions (e.g., a Caller ID function), setupfunctions, and for user input. For example, the display 1412 can also bereferred to as a “screen” that can accommodate the presentation ofmultimedia content (e.g., music metadata, messages, wallpaper, graphics,etc.). The display 1412 can also display videos and can facilitate thegeneration, editing and sharing of video quotes. A serial I/O interface1414 is provided in communication with the processor 1402 to facilitatewired and/or wireless serial communications (e.g., USB, and/or IEEE1394) through a hardwire connection, and other serial input devices(e.g., a keyboard, keypad, and mouse). This supports updating andtroubleshooting the handset 1400, for example. Audio capabilities areprovided with an audio I/O component 1416, which can include a speakerfor the output of audio signals related to, for example, indication thatthe user pressed the proper key or key combination to initiate the userfeedback signal. The audio I/O component 1416 also facilitates the inputof audio signals through a microphone to record data and/or telephonyvoice data, and for inputting voice signals for telephone conversations.

The handset 1400 can include a slot interface 1418 for accommodating aSIC (Subscriber Identity Component) in the form factor of a cardSubscriber Identity Module (SIM) or universal SIM 1420, and interfacingthe SIM card 1420 with the processor 1402. However, it is to beappreciated that the SIM card 1420 can be manufactured into the handset1400, and updated by downloading data and software.

The handset 1400 can process IP data traffic through the communicationcomponent 1410 to accommodate IP traffic from an IP network such as, forexample, the Internet, a corporate intranet, a home network, a personarea network, etc., through an ISP or broadband cable provider. Thus,VoIP traffic can be utilized by the handset 1400 and IP-based multimediacontent can be received in either an encoded or decoded format.

A video processing component 1422 (e.g., a camera) can be provided fordecoding encoded multimedia content. The video processing component 1422can aid in facilitating the generation, editing and sharing of videoquotes. The handset 1400 also includes a power source 1424 in the formof batteries and/or an AC power subsystem, which power source 1424 caninterface to an external power system or charging equipment (not shown)by a power I/O component 1426.

The handset 1400 can also include a video component 1430 for processingvideo content received and, for recording and transmitting videocontent. For example, the video component 1430 can facilitate thegeneration, editing and sharing of video quotes. A location trackingcomponent 1432 facilitates geographically locating the handset 1400. Asdescribed hereinabove, this can occur when the user initiates thefeedback signal automatically or manually. A user input component 1434facilitates the user initiating the quality feedback signal. The userinput component 1434 can also facilitate the generation, editing andsharing of video quotes. The user input component 1434 can include suchconventional input device technologies such as a keypad, keyboard,mouse, stylus pen, and/or touch screen, for example.

Referring again to the applications 1406, a hysteresis component 1436facilitates the analysis and processing of hysteresis data, which isutilized to determine when to associate with the access point. Asoftware trigger component 1438 can be provided that facilitatestriggering of the hysteresis component 1436 when the Wi-Fi transceiver1413 detects the beacon of the access point. A SIP client 1440 enablesthe handset 1400 to support SIP protocols and register the subscriberwith the SIP registrar server. The applications 1406 can also include aclient 1442 that provides at least the capability of discovery, play andstore of multimedia content, for example, music.

The handset 1400, as indicated above related to the communicationscomponent 1410, includes an indoor network radio transceiver 1413 (e.g.,Wi-Fi transceiver). This function supports the indoor radio link, suchas IEEE 802.11, for the dual-mode GSM handset 1400. The handset 1400 canaccommodate at least satellite radio services through a handset that cancombine wireless voice and digital radio chipsets into a single handhelddevice.

Referring now to FIG. 15, there is illustrated a block diagram of acomputer 1500 operable to execute the functions and operations performedin the described example embodiments. For example, a network node (e.g.,network node 104) may contain components as described in FIG. 15. Thecomputer 1500 can provide networking and communication capabilitiesbetween a wired or wireless communication network and a server and/orcommunication device. In order to provide additional context for variousaspects thereof, FIG. 15 and the following discussion are intended toprovide a brief, general description of a suitable computing environmentin which the various aspects of the innovation can be implemented tofacilitate the establishment of a transaction between an entity and athird party. While the description above is in the general context ofcomputer-executable instructions that can run on one or more computers,those skilled in the art will recognize that the innovation also can beimplemented in combination with other program modules and/or as acombination of hardware and software.

Generally, program modules include routines, programs, components, datastructures, etc., that perform particular tasks or implement particularabstract data types. Moreover, those skilled in the art will appreciatethat the inventive methods can be practiced with other computer systemconfigurations, including single-processor or multiprocessor computersystems, minicomputers, mainframe computers, as well as personalcomputers, hand-held computing devices, microprocessor-based orprogrammable consumer electronics, and the like, each of which can beoperatively coupled to one or more associated devices.

The illustrated aspects of the innovation can also be practiced indistributed computing environments where certain tasks are performed byremote processing devices that are linked through a communicationsnetwork. In a distributed computing environment, program modules can belocated in both local and remote memory storage devices.

Computing devices typically include a variety of media, which caninclude computer-readable storage media or communications media, whichtwo terms are used herein differently from one another as follows.

Computer-readable storage media can be any available storage media thatcan be accessed by the computer and includes both volatile andnonvolatile media, removable and non-removable media. By way of example,and not limitation, computer-readable storage media can be implementedin connection with any method or technology for storage of informationsuch as computer-readable instructions, program modules, structureddata, or unstructured data. Computer-readable storage media can include,but are not limited to, RAM, ROM, EEPROM, flash memory or other memorytechnology, CD-ROM, digital versatile disk (DVD) or other optical diskstorage, magnetic cassettes, magnetic tape, magnetic disk storage orother magnetic storage devices, or other tangible and/or non-transitorymedia which can be used to store desired information. Computer-readablestorage media can be accessed by one or more local or remote computingdevices, e.g., via access requests, queries or other data retrievalprotocols, for a variety of operations with respect to the informationstored by the medium.

Communications media can embody computer-readable instructions, datastructures, program modules or other structured or unstructured data ina data signal such as a modulated data signal, e.g., a carrier wave orother transport mechanism, and includes any information delivery ortransport media. The term “modulated data signal” or signals refers to asignal that has one or more of its characteristics set or changed insuch a manner as to encode information in one or more signals. By way ofexample, and not limitation, communication media include wired media,such as a wired network or direct-wired connection, and wireless mediasuch as acoustic, RF, infrared and other wireless media.

With reference to FIG. 15, implementing various aspects described hereinwith regards to devices can include a computer 1500, the computer 1500including a processing unit 1504, a system memory 1506 and a system bus1508. The system bus 1508 couples system components including, but notlimited to, the system memory 1506 to the processing unit 1504. Theprocessing unit 1504 can be any of various commercially availableprocessors. Dual microprocessors and other multi-processor architecturescan also be employed as the processing unit 1504.

The system bus 1508 can be any of several types of bus structure thatcan further interconnect to a memory bus (with or without a memorycontroller), a peripheral bus, and a local bus using any of a variety ofcommercially available bus architectures. The system memory 1506includes read-only memory (ROM) 1527 and random access memory (RAM)1512. A basic input/output system (BIOS) is stored in a non-volatilememory 1527 such as ROM, EPROM, EEPROM, which BIOS contains the basicroutines that help to transfer information between elements within thecomputer 1500, such as during start-up. The RAM 1512 can also include ahigh-speed RAM such as static RAM for caching data.

The computer 1500 further includes an internal hard disk drive (HDD)1514 (e.g., EIDE, SATA), which internal hard disk drive 1514 can also beconfigured for external use in a suitable chassis (not shown), amagnetic floppy disk drive (FDD) 1516, (e.g., to read from or write to aremovable diskette 1518) and an optical disk drive 1520, (e.g., readinga CD-ROM disk 1522 or, to read from or write to other high capacityoptical media such as the DVD). The hard disk drive 1514, magnetic diskdrive 1516 and optical disk drive 1520 can be connected to the systembus 1508 by a hard disk drive interface 1524, a magnetic disk driveinterface 1526 and an optical drive interface 1528, respectively. Theinterface 1524 for external drive implementations includes at least oneor both of Universal Serial Bus (USB) and IEEE 1294 interfacetechnologies. Other external drive connection technologies are withincontemplation of the subject innovation.

The drives and their associated computer-readable media providenonvolatile storage of data, data structures, computer-executableinstructions, and so forth. For the computer 1500 the drives and mediaaccommodate the storage of any data in a suitable digital format.Although the description of computer-readable media above refers to aHDD, a removable magnetic diskette, and a removable optical media suchas a CD or DVD, it should be appreciated by those skilled in the artthat other types of media which are readable by a computer 1500, such aszip drives, magnetic cassettes, flash memory cards, cartridges, and thelike, can also be used in the example operating environment, andfurther, that any such media can contain computer-executableinstructions for performing the methods of the disclosed innovation.

A number of program modules can be stored in the drives and RAM 1512,including an operating system 1530, one or more application programs1532, other program modules 1534 and program data 1536. All or portionsof the operating system, applications, modules, and/or data can also becached in the RAM 1512. It is to be appreciated that the innovation canbe implemented with various commercially available operating systems orcombinations of operating systems.

A user can enter commands and information into the computer 1500 throughone or more wired/wireless input devices, e.g., a keyboard 1538 and apointing device, such as a mouse 1540. Other input devices (not shown)may include a microphone, an IR remote control, a joystick, a game pad,a stylus pen, touch screen, or the like. These and other input devicesare often connected to the processing unit 1504 through an input deviceinterface 1542 that is coupled to the system bus 1508, but can beconnected by other interfaces, such as a parallel port, an IEEE 2394serial port, a game port, a USB port, an IR interface, etc.

A monitor 1544 or other type of display device is also connected to thesystem bus 1508 through an interface, such as a video adapter 1546. Inaddition to the monitor 1544, a computer 1500 typically includes otherperipheral output devices (not shown), such as speakers, printers, etc.

The computer 1500 can operate in a networked environment using logicalconnections by wired and/or wireless communications to one or moreremote computers, such as a remote computer(s) 1548. The remotecomputer(s) 1548 can be a workstation, a server computer, a router, apersonal computer, portable computer, microprocessor-based entertainmentdevice, a peer device or other common network node, and typicallyincludes many or all of the elements described relative to the computer,although, for purposes of brevity, only a memory/storage device 1550 isillustrated. The logical connections depicted include wired/wirelessconnectivity to a local area network (LAN) 1552 and/or larger networks,e.g., a wide area network (WAN) 1554. Such LAN and WAN networkingenvironments are commonplace in offices and companies, and facilitateenterprise-wide computer networks, such as intranets, all of which mayconnect to a global communications network, e.g., the Internet.

When used in a LAN networking environment, the computer 1500 isconnected to the local network 1552 through a wired and/or wirelesscommunication network interface or adapter 1556. The adapter 1556 mayfacilitate wired or wireless communication to the LAN 1552, which mayalso include a wireless access point disposed thereon for communicatingwith the wireless adapter 1556.

When used in a WAN networking environment, the computer 1500 can includea modem 1558, or is connected to a communications server on the WAN1554, or has other means for establishing communications over the WAN1554, such as by way of the Internet. The modem 1558, which can beinternal or external and a wired or wireless device, is connected to thesystem bus 1508 through the input device interface 1542. In a networkedenvironment, program modules depicted relative to the computer, orportions thereof, can be stored in the remote memory/storage device1550. It will be appreciated that the network connections shown areexemplary and other means of establishing a communications link betweenthe computers can be used.

The computer is operable to communicate with any wireless devices orentities operatively disposed in wireless communication, e.g., aprinter, scanner, desktop and/or portable computer, portable dataassistant, communications satellite, any piece of equipment or locationassociated with a wirelessly detectable tag (e.g., a kiosk, news stand,restroom), and telephone. This includes at least Wi-Fi and Bluetooth™wireless technologies. Thus, the communication can be a predefinedstructure as with a conventional network or simply an ad hoccommunication between at least two devices.

Wi-Fi, or Wireless Fidelity, allows connection to the Internet from acouch at home, a bed in a hotel room, or a conference room at work,without wires. Wi-Fi is a wireless technology similar to that used in acell phone that enables such devices, e.g., computers, to send andreceive data indoors and out; anywhere within the range of a basestation. Wi-Fi networks use radio technologies called IEEE802.11 (a, b,g, n, etc.) to provide secure, reliable, fast wireless connectivity. AWi-Fi network can be used to connect computers to each other, to theInternet, and to wired networks (which use IEEE802.3 or Ethernet). Wi-Finetworks operate in the unlicensed 2.4 and 5 GHz radio bands, at an 11Mbps (802.11b) or 54 Mbps (802.11a) data rate, for example, or withproducts that contain both bands (dual band), so the networks canprovide real-world performance similar to the basic “10BaseT” wiredEthernet networks used in many offices.

As used in this application, the terms “system,” “component,”“interface,” and the like are generally intended to refer to acomputer-related entity or an entity related to an operational machinewith one or more specific functionalities. The entities disclosed hereincan be either hardware, a combination of hardware and software,software, or software in execution. For example, a component may be, butis not limited to being, a process running on a processor, a processor,an object, an executable, a thread of execution, a program, and/or acomputer. By way of illustration, both an application running on aserver and the server can be a component. One or more components mayreside within a process and/or thread of execution and a component maybe localized on one computer and/or distributed between two or morecomputers. These components also can execute from various computerreadable storage media having various data structures stored thereon.The components may communicate via local and/or remote processes such asin accordance with a signal having one or more data packets (e.g., datafrom one component interacting with another component in a local system,distributed system, and/or across a network such as the Internet withother systems via the signal). As another example, a component can be anapparatus with specific functionality provided by mechanical partsoperated by electric or electronic circuitry that is operated bysoftware or firmware application(s) executed by a processor, wherein theprocessor can be internal or external to the apparatus and executes atleast a part of the software or firmware application. As yet anotherexample, a component can be an apparatus that provides specificfunctionality through electronic components without mechanical parts,the electronic components can comprise a processor therein to executesoftware or firmware that confers at least in part the functionality ofthe electronic components. An interface can comprise input/output (I/O)components as well as associated processor, application, and/or APIcomponents.

Furthermore, the disclosed subject matter may be implemented as amethod, apparatus, or article of manufacture using standard programmingand/or engineering techniques to produce software, firmware, hardware,or any combination thereof to control a computer to implement thedisclosed subject matter. The term “article of manufacture” as usedherein is intended to encompass a computer program accessible from anycomputer-readable device, computer-readable carrier, orcomputer-readable media. For example, computer-readable media caninclude, but are not limited to, a magnetic storage device, e.g., harddisk; floppy disk; magnetic strip(s); an optical disk (e.g., compactdisk (CD), a digital video disc (DVD), a Blu-ray Disc™ (BD)); a smartcard; a flash memory device (e.g., card, stick, key drive); and/or avirtual device that emulates a storage device and/or any of the abovecomputer-readable media.

As it employed in the subject specification, the term “processor” canrefer to substantially any computing processing unit or devicecomprising, but not limited to comprising, single-core processors;single-processors with software multithread execution capability;multi-core processors; multi-core processors with software multithreadexecution capability; multi-core processors with hardware multithreadtechnology; parallel platforms; and parallel platforms with distributedshared memory. Additionally, a processor can refer to an integratedcircuit, an application specific integrated circuit (ASIC), a digitalsignal processor (DSP), a field programmable gate array (FPGA), aprogrammable logic controller (PLC), a complex programmable logic device(CPLD), a discrete gate or transistor logic, discrete hardwarecomponents, or any combination thereof designed to perform the functionsdescribed herein. Processors can exploit nano-scale architectures suchas, but not limited to, molecular and quantum-dot based transistors,switches and gates, in order to optimize space usage or enhanceperformance of user equipment. A processor also can be implemented as acombination of computing processing units.

In the subject specification, terms such as “store,” “data store,” “datastorage,” “database,” “repository,” “queue”, and substantially any otherinformation storage component relevant to operation and functionality ofa component, refer to “memory components,” or entities embodied in a“memory” or components comprising the memory. It will be appreciatedthat the memory components described herein can be either volatilememory or nonvolatile memory, or can comprise both volatile andnonvolatile memory. In addition, memory components or memory elementscan be removable or stationary. Moreover, memory can be internal orexternal to a device or component, or removable or stationary. Memorycan comprise various types of media that are readable by a computer,such as hard-disc drives, zip drives, magnetic cassettes, flash memorycards or other types of memory cards, cartridges, or the like.

By way of illustration, and not limitation, nonvolatile memory cancomprise read only memory (ROM), programmable ROM (PROM), electricallyprogrammable ROM (EPROM), electrically erasable ROM (EEPROM), or flashmemory. Volatile memory can comprise random access memory (RAM), whichacts as external cache memory. By way of illustration and notlimitation, RAM is available in many forms such as synchronous RAM(SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rateSDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), Synchlink DRAM (SLDRAM), anddirect Rambus RAM (DRRAM). Additionally, the disclosed memory componentsof systems or methods herein are intended to comprise, without beinglimited to comprising, these and any other suitable types of memory.

In particular and in regard to the various functions performed by theabove described components, devices, circuits, systems and the like, theterms (including a reference to a “means”) used to describe suchcomponents are intended to correspond, unless otherwise indicated, toany component which performs the specified function of the describedcomponent (e.g., a functional equivalent), even though not structurallyequivalent to the disclosed structure, which performs the function inthe herein illustrated example aspects of the embodiments. In thisregard, it will also be recognized that the embodiments comprise asystem as well as a computer-readable medium having computer-executableinstructions for performing the acts and/or events of the variousmethods.

Computing devices typically comprise a variety of media, which cancomprise computer-readable storage media and/or communications media,which two terms are used herein differently from one another as follows.Computer-readable storage media can be any available storage media thatcan be accessed by the computer and comprises both volatile andnonvolatile media, removable and non-removable media. By way of example,and not limitation, computer-readable storage media can be implementedin connection with any method or technology for storage of informationsuch as computer-readable instructions, program modules, structureddata, or unstructured data. Computer-readable storage media cancomprise, but are not limited to, RAM, ROM, EEPROM, flash memory orother memory technology, CD-ROM, digital versatile disk (DVD) or otheroptical disk storage, magnetic cassettes, magnetic tape, magnetic diskstorage or other magnetic storage devices, or other tangible and/ornon-transitory media which can be used to store desired information.Computer-readable storage media can be accessed by one or more local orremote computing devices, e.g., via access requests, queries or otherdata retrieval protocols, for a variety of operations with respect tothe information stored by the medium.

On the other hand, communications media typically embodycomputer-readable instructions, data structures, program modules orother structured or unstructured data in a data signal such as amodulated data signal, e.g., a carrier wave or other transportmechanism, and comprises any information delivery or transport media.The term “modulated data signal” or signals refers to a signal that hasone or more of its characteristics set or changed in such a manner as toencode information in one or more signals. By way of example, and notlimitation, communications media comprise wired media, such as a wirednetwork or direct-wired connection, and wireless media such as acoustic,RF, infrared and other wireless media

Further, terms like “user equipment,” “user device,” “mobile device,”“mobile,” station,” “access terminal,” “terminal,” “handset,” andsimilar terminology, generally refer to a wireless device utilized by asubscriber or user of a wireless communication network or service toreceive or convey data, control, voice, video, sound, gaming, orsubstantially any data-stream or signaling-stream. The foregoing termsare utilized interchangeably in the subject specification and relateddrawings. Likewise, the terms “access point,” “node B,” “base station,”“evolved Node B,” “cell,” “cell site,” and the like, can be utilizedinterchangeably in the subject application, and refer to a wirelessnetwork component or appliance that serves and receives data, control,voice, video, sound, gaming, or substantially any data-stream orsignaling-stream from a set of subscriber stations. Data and signalingstreams can be packetized or frame-based flows. It is noted that in thesubject specification and drawings, context or explicit distinctionprovides differentiation with respect to access points or base stationsthat serve and receive data from a mobile device in an outdoorenvironment, and access points or base stations that operate in aconfined, primarily indoor environment overlaid in an outdoor coveragearea. Data and signaling streams can be packetized or frame-based flows.

Furthermore, the terms “user,” “subscriber,” “customer,” “consumer,” andthe like are employed interchangeably throughout the subjectspecification, unless context warrants particular distinction(s) amongthe terms. It should be appreciated that such terms can refer to humanentities, associated devices, or automated components supported throughartificial intelligence (e.g., a capacity to make inference based oncomplex mathematical formalisms) which can provide simulated vision,sound recognition and so forth. In addition, the terms “wirelessnetwork” and “network” are used interchangeable in the subjectapplication, when context wherein the term is utilized warrantsdistinction for clarity purposes such distinction is made explicit.

Moreover, the word “exemplary” is used herein to mean serving as anexample, instance, or illustration. Any aspect or design describedherein as “exemplary” is not necessarily to be construed as preferred oradvantageous over other aspects or designs. Rather, use of the wordexemplary is intended to present concepts in a concrete fashion. As usedin this application, the term “or” is intended to mean an inclusive “or”rather than an exclusive “or”. That is, unless specified otherwise, orclear from context, “X employs A or B” is intended to mean any of thenatural inclusive permutations. That is, if X employs A; X employs B; orX employs both A and B, then “X employs A or B” is satisfied under anyof the foregoing instances. In addition, the articles “a” and “an” asused in this application and the appended claims should generally beconstrued to mean “one or more” unless specified otherwise or clear fromcontext to be directed to a singular form.

Existing solutions for beam recovery request transmission is to usenon-contention based RACH-like resources to inform the network of theidentified new beam and the occurrence of beam failure. These resourcesmight not be sufficient when another RS, other than configured CSI-RS isused for new beam identification, such as SS-block. Instead of using thetraditional 4-step RACH procedure for beam recovery requesttransmission, a modified 2-step contention-based RACH procedure can saveon overhead and latency associated with the traditional 4-stepprocedure.

The above description of illustrated embodiments of the subjectdisclosure, including what is described in the Abstract, is not intendedto be exhaustive or to limit the disclosed embodiments to the preciseforms disclosed. While specific embodiments and examples are describedherein for illustrative purposes, various modifications are possiblethat are considered within the scope of such embodiments and examples,as those skilled in the relevant art can recognize.

In this regard, while the subject matter has been described herein inconnection with various embodiments and corresponding FIGs, whereapplicable, it is to be understood that other similar embodiments can beused or modifications and additions can be made to the describedembodiments for performing the same, similar, alternative, or substitutefunction of the disclosed subject matter without deviating therefrom.Therefore, the disclosed subject matter should not be limited to anysingle embodiment described herein, but rather should be construed inbreadth and scope in accordance with the appended claims below.

What is claimed is:
 1. A method, comprising: in response to adetermination of a first failure of a reference signal configured tomanage a first beam, the first failure indicating that the referencesignal was not received, determining, by a mobile device that is part ofa wireless network and that comprises a processor, a second failureassociated with the first beam, wherein the reference signal and thefirst beam are to be received by the mobile device from a network deviceof the wireless network; in response to a condition associated with thereference signal being determined to have been satisfied, identifying,by the mobile device, a second beam that is not the first beam; andfacilitating, by the mobile device, a transmission of the second beamvia a transmission channel for a recovery request related to a recoveryassociated with the first beam to mitigate the second failure.
 2. Themethod of claim 1, further comprising: in response to the determining,utilizing, by the mobile device, the reference signal to identify thesecond beam.
 3. The method of claim 2, wherein the utilizing comprisesidentifying a beam pair, and wherein the second beam is a transmissionbeam for transmitting network data via the network device.
 4. The methodof claim 1, wherein the determination is a first determination, andwherein the condition is further associated with a second determinationthat the reference signal does not identify the second beam.
 5. Themethod of claim 4, further comprising: in response to the seconddetermination that the reference signal does not identify the secondbeam, utilizing, by the mobile device, a synchronization signal blockassociated with a synchronization signal to identify the second beam. 6.The method of claim 5, wherein the synchronization signal is a primarysynchronization signal of synchronization signals capable offacilitating a timing synchronization between network devices of thewireless network.
 7. The method of claim 6, wherein the primarysynchronization signal is transmitted within the synchronization signalblock to synchronize the mobile device with the network device.
 8. Themethod of claim 5, wherein the synchronization signal is a secondarysynchronization signal of synchronization signals capable offacilitating a timing synchronization between network devices of thewireless network.
 9. The method of claim 5, wherein the synchronizationsignal comprises channel data associated with a primary broadcastchannel capable of facilitating a timing synchronization between networkdevices of the wireless network.
 10. A mobile device, comprising: aprocessor; and a memory that stores executable instructions that, whenexecuted by the processor, facilitate performance of operations,comprising: in response to a first determination of a first failureassociated with a reference signal configured to manage a first beam,determining a second failure associated with the first beam, wherein thereference signal and the first beam have been directed to the mobiledevice from a network device of a wireless network; in response to acondition associated with the reference signal being determined to havebeen satisfied, identifying a second beam that is not the first beam,wherein the condition is further associated with a second determinationthat the reference signal does not identify the second beam; in responseto the second determination that the reference signal does not identifythe second beam, utilizing a synchronization signal block associatedwith a synchronization signal to identify the second beam; andtransmitting the second beam via a random access channel for a recoveryrequest related to a recovery of the first beam to rectify the secondfailure.
 11. The mobile device of claim 10, wherein the random accesschannel is a physical random access channel associated with anon-contention based channel associated with a preamble identifier ofthe mobile device.
 12. The mobile device of claim 10, wherein, inresponse to the utilizing the synchronization signal block, the randomaccess channel is associated with a contention-based channel thatcomprises preamble data associated with the mobile device.
 13. Themobile device of claim 12, wherein the operations further comprise:based on the contention-based channel, sending identifier datarepresentative of the preamble data associated with a reference from themobile device to the network device to indicate use of thesynchronization signal block.
 14. The mobile device of claim 13, whereinthe operations further comprise: in response to the sending theidentifier data, sending response data associated with a random accessresponse from the network device to the mobile device to indicatereception of the identifier data.
 15. The mobile device of claim 13,wherein the operations further comprise: in response to the sending theidentifier data, sending timing data associated with a timing alignmentinstruction from the network device to the mobile device to synchronizean uplink transmission from the mobile device.
 16. A machine-readablestorage medium, comprising executable instructions that, when executedby a processor, facilitate performance of operations, comprising: inresponse to a first determination of a first failure associated with ablocked reference signal of a wireless network, facilitating determininga second failure associated with a first beam associated with theblocked reference signal; in response to a condition associated with theblocked reference signal being determined to have been satisfied,facilitating identifying a second beam, wherein the condition is furtherassociated with a second determination that the blocked reference signaldoes not identify the second beam; in response to the seconddetermination that the blocked reference signal does not identify thesecond beam, facilitating utilizing a synchronization signal blockassociated with a synchronization signal to identify the second beam;and facilitating transmitting data associated with the second beam via arandom access channel for a recovery request related to a recovery ofthe first beam to rectify the second failure.
 17. The machine-readablestorage medium of claim 16, wherein the random access channel comprisesa non-contention channel associated with preamble data representative ofan identification of a mobile device.
 18. The machine-readable storagemedium of claim 16, wherein the random access channel comprises acontention channel that is not associated with preamble datarepresentative of an identification of a mobile device.
 19. Themachine-readable storage medium of claim 16, wherein the operationsfurther comprise: facilitating sending of confirmation data associatedwith a confirmation of a network device having received the dataassociated with the second beam.
 20. The machine-readable storage mediumof claim 19, wherein the operations further comprise: in response to thefacilitating the sending of the confirmation data, facilitating sendingmobile data from a first mobile device to a network device after thesecond beam has been identified.