Abstract:
A method, computer-readable storage device and apparatus for closing a transmission control protocol connection in a wireless network are disclosed. For example, the method sends a first transmission control protocol option requesting a use of a silent transmission control protocol closure for the transmission control protocol connection, receives a confirmation from a recipient device that silent transmission control protocol closure is to be used for the transmission control protocol connection, sends a second transmission control protocol option that indicates a connection timeout period for the sender device, receives a connection timeout period for the recipient device, tracks the connection timeout period for the sender device and the connection timeout period for the recipient device, and closes the transmission control protocol connection when one of the connection timeout period for the sender device or the connection timeout period for the recipient device has expired.
Abstract:
A more efficient mobile device can be achieved via an optimization process based on display screen dormancy. Application data transmissions can be throttled based on a screen-on or screen-off status of a mobile device. Furthermore, an application management platform can be used to prioritize application data transmissions based on data associated with each application's packet transmissions.
Abstract:
Analyzing mobile device applications within a wireless data network and other related aspects are presented herein. More particularly, described herein is a novel Intelligent Mobility Application Profiling Tool (iMAP) and/or other mechanisms, systems and methods for profiling and benchmarking applications associated with mobile devices in a wireless data network. Various systems and methods described herein expose cross-layer interaction associated with a network device in order to profile an application on the network device with respect to energy efficiency, performance, and functionality. As described herein, radio resource control (RRC) analysis can be performed to infer RRC states associated with a given application, identify tail time, etc. Further, analyzers are employed for various layers, including transmission control protocol (TCP) and/or hypertext transfer protocol (HTTP), as well as to analyze communication bursts associated with a given application. Analysis results are subsequently utilized to deliver application profiling results to a user.
Abstract:
Systems and methods provide containers instantiated for each user equipment (UE), or on “per-UE” bases, which consolidate certain network functions for processing UE traffic into an efficient, in-network, and proximate virtualization to reduce latency and increase customizability.
Abstract:
A method includes acquiring a playlist identifying video files and an order in which the video files are to be played back during a video streaming session on an endpoint device, obtaining, from an operator of a communications network over which the video files are to be downloaded, a maximum value of a streaming parameter for the video streaming session, selecting a subsequent video file that is scheduled for playback after a playback of a currently playing video file, wherein the subsequent video file includes a plurality of chunks, selecting, for each chunk, a variant, such that a plurality of variants is selected in which each variant corresponds to one chunk of the plurality of chunks, wherein the selecting the variant is based on both the maximum value and a measured value for the streaming parameter, and downloading the plurality of variants to a local buffer of the endpoint device.
Abstract:
Systems and methods provide containers instantiated for each user equipment (UE), or on “per-UE” bases, which consolidate certain network functions for processing UE traffic into an efficient, in-network, and proximate virtualization to reduce latency and increase customizability.
Abstract:
The technologies described herein are generally directed to modeling radio wave propagation in a fifth generation (5G) network or other next generation networks. For example, a method described herein can include, for a network application, identifying, by a system comprising a processor, a characteristic value of a performance characteristic associated with an uplink connection enabled via a network of a user equipment to application server equipment hosting the network application. The method can further include, based on the characteristic value and a criterion, selecting, by the system, a first packet size for the uplink connection. The method can further include communicating, by the system, to the user equipment, the first packet size for use with the uplink connection.
Abstract:
Aspects of the subject disclosure may include, for example, a method in which a processing system parses a network trace to collect packet information for an encrypted adaptive bite rate (ABR) video stream encoded into a plurality of tracks; detects request packets corresponding to a sequence of requests for video segments to be downloaded at a network client; and determines a traffic volume downloaded at the network client to obtain a sequence of traffic volumes. The processing system identifies, for each of the sequence of traffic volumes, a set of candidate segments each having a size meeting a size-matching criterion; selects a segment from the set of candidate segments to determine a segment sequence meeting an index-matching criterion; and infers characteristics of the sequence of traffic volumes based on the segment sequence. Other embodiments are disclosed.
Abstract:
A processing system may obtain a downscaled version of a reference copy of a video, comprising a plurality of downscaled versions of a plurality of frames of the reference copy of the video, obtain a first recorded frame of a first variant of a plurality of variants associated with the reference copy of the video, where the plurality of variants comprises a plurality of copies of the video encoded at different bitrates, generate a first downscaled version of the first recorded frame, calculate a first plurality of image distances between the first downscaled version of the first recorded frame and the plurality of downscaled versions of the plurality of frames of the reference copy of the video, and determine a first frame index of the first recorded frame in accordance with a first least image distance from among the first plurality of image distances that is calculated.
Abstract:
An example first device disclosed herein is to obtain, from a library of the first device, a pre-master secret value and a master secret value associated with a session key for a communication session between the first device and a second device, the library instrumented to log the pre-master and master secret values during handshaking, the session key based on the pre-master secret value, the master secret value and data strings exchanged during the handshaking. The disclosed example first device is also to capture a packet level trace corresponding to the communication session, the packet level trace including the data strings and encrypted data. The disclosed example first device is further to determine the session key based on the pre-master secret value, the master secret value and the data strings without use of a proxy, and decrypt the encrypted data with the session key to obtain decrypted data.