摘要:
Methods and apparatus providing intelligent interface selection for legacy and non-legacy applications. The method includes intercepting a networking function call from an application desiring radio access, selecting a radio from a plurality of candidate radios based on selection criteria, and binding the radio to the application. To facilitate flow mobility, the method includes allocating an ephemeral port to the radio, generating a flow binding rule based only on the ephemeral port, and signaling the flow binding rule to a home agent.
摘要:
Methods and apparatus providing intelligent interface selection for legacy and non-legacy applications. The method includes intercepting a networking function call from an application desiring radio access, selecting a radio from a plurality of candidate radios based on selection criteria, and binding the radio to the application. To facilitate flow mobility, the method includes allocating an ephemeral port to the radio, generating a flow binding rule based only on the ephemeral port, and signaling the flow binding rule to a home agent.
摘要:
Systems and methods for prioritizing transmission control protocol (TCP) flows for communication devices in a network are described herein. The systems and methods herein may further allocate bandwidth to the flows based on the priority of the flows. Further, the systems and methods herein allow devices to determine whether particular flows share a traffic flow constraint or bottleneck that limits the overall available bandwidth to the flows. Therefore, allocation of bandwidth for one flow may be adjusted based on allocation of bandwidth to another flow if the flows share a traffic flow constraint. Further, the systems and methods herein allow for target data rates to be determined for the flows based on shared traffic flow constraints.
摘要:
Systems and methods for prioritizing transmission control protocol (TCP) flows for communication devices in a network are described herein. The systems and methods herein may further allocate bandwidth to the flows based on the priority of the flows. Further, the systems and methods herein allow devices to determine whether particular flows share a traffic flow constraint or bottleneck that limits the overall available bandwidth to the flows. Therefore, allocation of bandwidth for one flow may be adjusted based on allocation of bandwidth to another flow if the flows share a traffic flow constraint. Further, the systems and methods herein allow for target data rates to be determined for the flows based on shared traffic flow constraints.
摘要:
Methods, systems, and devices are described for discovering and associating with WLAN using Request to Send (RTS) and Clear to Send (CTS) frames. A mobile device may identify a WLAN access point associated with a location of the mobile device. The mobile device may transmit a Request to Send (RTS) frame to the access point and receive a CTS frame from the access point. The mobile device may determine that the access point is within range of the mobile device based on the received CTS frame. Some embodiments may provide for transmitting an association request frame to the access point in response to the received CTS frame. The association request frame may be transmitted to the access point in a time period associated with the CTS frame.
摘要:
Systems, methods, and devices for implementing a communication access policy are described herein. In some aspects, a wireless device is configured to execute a plurality of applications and to communicate with a communication network. The wireless device comprises a receiver configured to receive a plurality of rules specifying how one or more of the plurality of applications should communicate with the communication network. The wireless device comprises a processor configured to delay communication by one or more of the plurality of applications in compliance with the rules. The processor is further configured to allow transmission of the communication by one or more of the plurality of applications after termination of the delay. In one aspect, the processor is configured to separately record communication statistics based on whether the device is in a background or foreground state.
摘要:
Systems, methods, and devices for implementing a communication access policy are described herein. In some aspects, a wireless device is configured to execute a plurality of applications and to communicate with a communication network. The wireless device comprises a receiver configured to receive a plurality of rules specifying how one or more of the plurality of applications should communicate with the communication network. The wireless device comprises a processor configured to delay communication by one or more of the plurality of applications in compliance with the rules. The processor is further configured to allow transmission of the communication by one or more of the plurality of applications after termination of the delay. In one aspect, the processor is configured to separately record communication statistics based on whether the device is in a background or foreground state.
摘要:
Systems, methods, and devices for implementing a communication access policy are described herein. In some aspects, a wireless device is configured to execute a plurality of applications and to communicate with a communication network. The wireless device comprises a receiver configured to receive a plurality of rules specifying how one or more of the plurality of applications should communicate with the communication network. The wireless device comprises a processor configured to delay communication by one or more of the plurality of applications in compliance with the rules. The processor is further configured to allow transmission of the communication by one or more of the plurality of applications after termination of the delay. In one aspect, the processor is configured to separately record communication statistics based on whether the device is in a background or foreground state.
摘要:
Systems, methods, and devices for implementing a communication access policy are described herein. In some aspects, a wireless device is configured to execute a plurality of applications and to communicate with a communication network. The wireless device comprises a receiver configured to receive a plurality of rules specifying how one or more of the plurality of applications should communicate with the communication network. The wireless device comprises a processor configured to delay communication by one or more of the plurality of applications in compliance with the rules. The processor is further configured to allow transmission of the communication by one or more of the plurality of applications after termination of the delay. In one aspect, the processor is configured to separately record communication statistics based on whether the device is in a background or foreground state.
摘要:
Providing for select Internet Protocol traffic offload (SIPTO) in a mobile communication environment is described herein. By way of example, SIPTO traffic can be facilitated via local packet gateways (P-GWs) that provide an interface to the Internet or a like data network, in addition to a centralized gateway GPRS support node (GGSN). Eligibility for SIPTO can be on a user equipment (UE) by UE basis; for instance, relying on stored subscription or account information to determine SIPTO eligibility. In particular aspects, eligibility for SIPTO can also be based on a packet network by packet network basis, or a combination of the foregoing. This enables flexibility in determining whether SIPTO can be established for a given UE in a given location, and can be based for instance on UE capability, subscription status information, data network capability, tariff rates, and so on, as well as different legal requirements of government jurisdictions.