摘要:
Power and resource efficiency of a mobile network device are increased. In one aspect, a Tail Optimization Protocol (TOP) enables cooperation between a mobile device and an associated radio access network to eliminate idle periods (e.g., tails) when possible. Various systems and methods described herein can leverage the ability of applications and/or their associated connections to accurately predict a long tail time, from which a mobile device can notify an associated cellular network on such an imminent tail in order to allow the cellular network to immediately release tail resources. Various other aspects provided herein realize TOP via fast dormancy and/or other similar notification mechanisms, which enable a handset or other device to notify a cellular network for immediate resource release.
摘要:
A method, computer readable medium and apparatus for correlating measures of wireless traffic are disclosed. For example, the method obtains the wireless traffic, and processes the wireless traffic by a plurality of probe servers, where each of the plurality of probe servers generates a plurality of feeds, wherein the plurality of feeds comprises a data feed and a control feed. The method correlates the plurality of feeds from the plurality of probe servers, where the data feed and the control feed of each of the plurality of probe servers are correlated with at least one other probe server of the plurality of probe servers to provide a correlated control plane and a correlated data plane, and extracts at least partial path information of a flow from the correlated control plane. The method then correlates performance information from the correlated data plane for the flow.
摘要:
Analyzing mobile device applications within a wireless data network and other related aspects are presented herein. More particularly, described herein is a novel Intelligent Mobility Application Profiling Tool (iMAP) and/or other mechanisms, systems and methods for profiling and benchmarking applications associated with mobile devices in a wireless data network. Various systems and methods described herein expose cross-layer interaction associated with a network device in order to profile an application on the network device with respect to energy efficiency, performance, and functionality. As described herein, radio resource control (RRC) analysis can be performed to infer RRC states associated with a given application, identify tail time, etc. Further, analyzers are employed for various layers, including transmission control protocol (TCP) and/or hypertext transfer protocol (HTTP), as well as to analyze communication bursts associated with a given application. Analysis results are subsequently utilized to deliver application profiling results to a user.
摘要:
Analyzing mobile device applications within a wireless data network and other related aspects are presented herein. More particularly, described herein is a novel Intelligent Mobility Application Profiling Tool (iMAP) and/or other mechanisms, systems and methods for profiling and benchmarking applications associated with mobile devices in a wireless data network. Various systems and methods described herein expose cross-layer interaction associated with a network device in order to profile an application on the network device with respect to energy efficiency, performance, and functionality. As described herein, radio resource control (RRC) analysis can be performed to infer RRC states associated with a given application, identify tail time, etc. Further, analyzers are employed for various layers, including transmission control protocol (TCP) and/or hypertext transfer protocol (HTTP), as well as to analyze communication bursts associated with a given application. Analysis results are subsequently utilized to deliver application profiling results to a user.
摘要:
A method, computer readable medium and system for automatically tracking content in a peer-to-peer environment are disclosed. For example, the method monitors a number of times each content title of a plurality of content titles are downloaded in the peer-to-peer environment, adds one or more content titles of the plurality of content titles that are downloaded above a predetermined threshold to a list, downloads each one of the one or more content titles in the list via the peer-to-peer environment and verifies that each one of the one or more content titles that are downloaded matches at least one content title in the list.
摘要:
A method of assigning a server to a client system includes determining an ingress point of the client system and identifying possible egress points for the client system. The method further includes selecting the server from a plurality of servers to reduce network cost and delivery time.
摘要:
A cache server for providing content includes a processor configured to receive a first datagram from a client system sent to an anycast address, send a response datagram to the client system in response to the first datagram, receive a request datagram from the client system sent to the anycast address, and send a batch of content datagrams to the client system. The first datagram includes a universal resource locator corresponding to the content. The response datagram includes a content identifier for the content. The request datagram includes the content identifier, an offset, and a bandwidth indicator. The batch of content datagrams includes a portion of the content starting at the offset.
摘要:
Systems and methods provide containers instantiated for each user equipment (UE), or on “per-UE” bases, which consolidate certain network functions for processing UE traffic into an efficient, in-network, and proximate virtualization to reduce latency and increase customizability.
摘要:
Aspects of the subject disclosure may include, for example, obtaining provisioning information associated with a service provider where the provisioning information includes a mapping of identifications of a group of end user devices to cloud-based services of the service provider; determining, according to the provisioning information, that an end user device of the group of end user devices is permitted to access a service endpoint associated with a particular cloud-based service of the cloud-based services of the service provider; and facilitating the particular cloud-based service for the end user device utilizing a private network connection, the service endpoint and a private endpoint associated with the service provider. Other embodiments are disclosed.
摘要:
Aspects of the subject disclosure may include, for example, a device including: a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations of: receiving a request for a proxy player to continue gameplay on behalf of a player of a game; retrieving data describing characteristics of historical gameplay of the player; and continuing the gameplay by the proxy player, wherein the proxy player performs actions that emulate the player based on the data describing the characteristics of the historical gameplay of the player. Other embodiments are disclosed.