Abstract:
Systems and methods provide containers instantiated for each user equipment (UE), or on “per-UE” bases, which consolidate certain network functions for processing UE traffic into an efficient, in-network, and proximate virtualization to reduce latency and increase customizability.
Abstract:
Aspects of the subject disclosure may include, for example, receiving a request for media content, the media content being divided into a plurality of chunks, obtaining information about the chunks and constraints, determining whether there is a remaining layer to be downloaded, in response to determining that there is a remaining layer to be downloaded, determining a list of chunks that can be downloaded at a current layer and a downloading schedule according to the list of chunks that can be downloaded at the current layer, in response to determining that there is no remaining layer to be downloaded, producing a composite schedule for downloading the media content, and downloading the media content according to the composite schedule. Other embodiments are disclosed.
Abstract:
A processing system may obtain a first frame of a first variant associated with a reference copy of a video, where a plurality of variants comprises copies of the video encoded at different bitrates, determine a frame number of the first frame from a visual overlay containing the first frame number, calculate a first image distance between the first frame and a frame of the reference copy having the frame number, determine, from among a plurality of image distances for frames of each variant having the frame number, a closest image distance to the first image distance, the plurality of image distances comprising image distances between frames of the variants and the frame of the reference copy having the frame number, and identify the first frame as being from the first variant in accordance with a variant associated with the first closest image distance.
Abstract:
Aspects of the subject disclosure may include, for example, upon receiving a request for media content, a first signal quality may be determined, a first quality level may be selected based on the first signal quality, and segments of the first quality level may be retrieved, stored in a buffer, and played from the buffer. When the buffer is sufficiently occupied first inferior segments stored in the buffer may be replaced by determining a second signal quality selecting a second quality level based on the second signal quality, identifying the first inferior segment based on the second quality level, and replacing the first inferior segment with a first replacement segment, the first replacement segment corresponding to the first inferior segment. These processes may be performed iteratively. Other embodiments are disclosed.
Abstract:
To facilitate increasing power and resource efficiency of a mobile device, in the mobile device, with regard to periodic or one-time data transfers, a communication management component can analyze information comprising data transfer parameter information, including jitter information, associated with each application of a subset of applications used by the device and can desirably schedule and/or bundle data transfers associated with the applications to reduce the number of separate data bursts to transfer that data to thereby reduce use of wireless resources and power consumption by the device. A push notification system can receive respective jitter information associated with each application from the mobile device, and the push notification system can desirably schedule and/or bundle push notifications to reduce the number of separate data bursts sent to the device to reduce use of wireless resources and power consumption by the device.
Abstract:
Techniques control traffic transmissions to manage radio resource utilization. When content is being streamed to user equipment (UE) and is at least initially intended to be streamed in real time at a constant bitrate, a communication management component can determine whether the content being transmitted to the UE can be delayed, instead of being transmitted in real time. In response to determining that the content can be delayed, the communication management component can facilitate buffering data and periodically streaming the data to the UE in data bursts to reduce use of UE power and radio resources. When transmitting a visual image to a UE, the communication management component can adjust resolution of a visual image to correspond to screen dimensions of the UE based on information indicating screen dimensions of the UE that can be received from the UE.
Abstract:
A rating is provided for a computing application. Traffic data, power data, and/or network signaling load data is collected for a computing application and compared with other similar data. A rating for the computing application is provided based on the comparison.
Abstract:
Power and resource efficiency of a mobile network device are increased. In one aspect, a tail optimization protocol (TOP) enables cooperation between a mobile device and an associated radio access network to eliminate idle periods (e.g., tails) when possible. Various systems and methods described herein can leverage the ability of applications and/or their associated connections to accurately predict a long tail time, from which a mobile device can notify an associated cellular network on such an imminent tail in order to allow the cellular network to immediately release tail resources. Various other aspects provided herein realize TOP via fast dormancy and/or other similar notification mechanisms, which enable a handset or other device to notify a cellular network for immediate resource release.
Abstract:
A system for decrypts encrypted Secure Sockets Layer (SSL) data from packet traces without using private keys or a proxy. Decryption of encrypted SSL data is accomplished by intercepting a session key associated with a communication session transmitted from a user device to a server during handshaking between the user device and the server. The session key is then used to decrypt packet level traces of the communication session. The decrypted packet level traces are then used to measure traffic.
Abstract:
The technologies described herein are generally directed to modeling radio wave propagation in a fifth generation (5G) network or other next generation networks. For example, a method described herein can include, for a network application, identifying, by a system comprising a processor, a characteristic value of a performance characteristic associated with an uplink connection enabled via a network of a user equipment to application server equipment hosting the network application. The method can further include, based on the characteristic value and a criterion, selecting, by the system, a first packet size for the uplink connection. The method can further include communicating, by the system, to the user equipment, the first packet size for use with the uplink connection.