Abstract:
Techniques control traffic transmissions to manage radio resource utilization. When content is being streamed to user equipment (UE) and is at least initially intended to be streamed in real time at a constant bitrate, a communication management component can determine whether the content being transmitted to the UE can be delayed, instead of being transmitted in real time. In response to determining that the content can be delayed, the communication management component can facilitate buffering data and periodically streaming the data to the UE in data bursts to reduce use of UE power and radio resources. When transmitting a visual image to a UE, the communication management component can adjust resolution of a visual image to correspond to screen dimensions of the UE based on information indicating screen dimensions of the UE that can be received from the UE.
Abstract:
Power and resource efficiency of a mobile network device are increased. In one aspect, a Tail Optimization Protocol (TOP) enables cooperation between a mobile device and an associated radio access network to eliminate idle periods (e.g., tails) when possible. Various systems and methods described herein can leverage the ability of applications and/or their associated connections to accurately predict a long tail time, from which a mobile device can notify an associated cellular network on such an imminent tail in order to allow the cellular network to immediately release tail resources. Various other aspects provided herein realize TOP via fast dormancy and/or other similar notification mechanisms, which enable a handset or other device to notify a cellular network for immediate resource release.
Abstract:
Analyzing mobile device applications within a wireless data network and other related aspects are presented herein. More particularly, described herein is a novel Intelligent Mobility Application Profiling Tool (iMAP) and/or other mechanisms, systems and methods for profiling and benchmarking applications associated with mobile devices in a wireless data network. Various systems and methods described herein expose cross-layer interaction associated with a network device in order to profile an application on the network device with respect to energy efficiency, performance, and functionality. As described herein, radio resource control (RRC) analysis can be performed to infer RRC states associated with a given application, identify tail time, etc. Further, analyzers are employed for various layers, including transmission control protocol (TCP) and/or hypertext transfer protocol (HTTP), as well as to analyze communication bursts associated with a given application. Analysis results are subsequently utilized to deliver application profiling results to a user.
Abstract:
Analyzing mobile device applications within a wireless data network and other related aspects are presented herein. More particularly, described herein is a novel Intelligent Mobility Application Profiling Tool (iMAP) and/or other mechanisms, systems and methods for profiling and benchmarking applications associated with mobile devices in a wireless data network. Various systems and methods described herein expose cross-layer interaction associated with a network device in order to profile an application on the network device with respect to energy efficiency, performance, and functionality. As described herein, radio resource control (RRC) analysis can be performed to infer RRC states associated with a given application, identify tail time, etc. Further, analyzers are employed for various layers, including transmission control protocol (TCP) and/or hypertext transfer protocol (HTTP), as well as to analyze communication bursts associated with a given application. Analysis results are subsequently utilized to deliver application profiling results to a user.
Abstract:
A method, computer readable medium and system for automatically tracking content in a peer-to-peer environment are disclosed. For example, the method monitors a number of times each content title of a plurality of content titles are downloaded in the peer-to-peer environment, adds one or more content titles of the plurality of content titles that are downloaded above a predetermined threshold to a list, downloads each one of the one or more content titles in the list via the peer-to-peer environment and verifies that each one of the one or more content titles that are downloaded matches at least one content title in the list.
Abstract:
A method includes acquiring a playlist identifying a plurality of video files to be played back during a video streaming session on an endpoint device, obtaining, from an operator of a communications network over which the video files are to be downloaded, a maximum throughput for the video streaming session, selecting a subsequent video file that is scheduled in the playlist for playback after a playback of a currently playing video file, wherein the subsequent video file includes a plurality of chunks, selecting, based on the maximum throughput and for each of the chunks, a variant, such that a plurality of variants is selected in which each variant corresponds to one chunk of the plurality of chunks, wherein the variants are selected to maximize a utility function that is constrained by the maximum throughput, and downloading the plurality of variants to a local buffer of the endpoint device.
Abstract:
A method includes acquiring a playlist identifying a plurality of video files to be played back during a video streaming session on an endpoint device, obtaining, from an operator of a communications network over which the video files are to be downloaded, a maximum throughput for the video streaming session, selecting a subsequent video file that is scheduled in the playlist for playback after a playback of a currently playing video file, wherein the subsequent video file includes a plurality of chunks, selecting, based on the maximum throughput and for each of the chunks, a variant, such that a plurality of variants is selected in which each variant corresponds to one chunk of the plurality of chunks, wherein the variants are selected to maximize a utility function that is constrained by the maximum throughput, and downloading the plurality of variants to a local buffer of the endpoint device.
Abstract:
Optimal data packet size is identified to achieve a higher throughput a wireless communication network. For example, a system can comprise monitoring a transmit control protocol performance associated with a first transmission of data packets over a first duration of time, wherein a packet size of the data packets is a first data packet size, detecting that the transmit control protocol performance satisfies a function with respect to a threshold and in response to the detecting that transmit control protocol performance satisfies the function with respect to the first threshold, determining a second data packet size to use for a second transmission of the data packets over a second duration of time, transmitting a request to change the packet size of the data packets to the second data packet.
Abstract:
The technologies described herein are generally directed to modeling radio wave propagation in a fifth generation (5G) network or other next generation networks. For example, a method described herein can include, for a network application, identifying, by a system comprising a processor, a characteristic value of a performance characteristic associated with an uplink connection enabled via a network of a user equipment to application server equipment hosting the network application. The method can further include, based on the characteristic value and a criterion, selecting, by the system, a first packet size for the uplink connection. The method can further include communicating, by the system, to the user equipment, the first packet size for use with the uplink connection.
Abstract:
Devices, computer-readable media, and methods for making a cache admission decision regarding a video chunk are described. For instance, a processing system including at least one processor may obtain a request for a first chunk of a first video, determine that the first chunk is not stored in a cache, and apply, in response to the determining that the first chunk is not stored in the cache, a classifier to predict whether the first chunk will be re-requested within a time horizon, where the classifier is trained in accordance with a set of features associated with a plurality of chunks of a plurality of videos. When it is predicted via the classifier that the first chunk will be re-requested within the time horizon, the processing system may store the first chunk in the cache.