摘要:
Embodiments of the present invention provide a method, system and computer program product for split transport control protocol (TCP) flow control management in a cellular broadband network. In an embodiment of the invention, a method for split TCP flow control management in a cellular broadband network is provided. The method includes first determining a context for a packet received as part of a data flow in a base station of a cellular broadband network and then selecting either an end-to-end TCP connection or a split TCP connection to support the data flow. Thereafter, the data flow is routed using the selected connection.
摘要:
Embodiments of the present invention provide a method, system and computer program product for split transport control protocol (TCP) flow control management in a cellular broadband network. In an embodiment of the invention, a method for split TCP flow control management in a cellular broadband network is provided. The method includes first determining a context for a packet received as part of a data flow in a base station of a cellular broadband network and then selecting either an end-to-end TCP connection or a split TCP connection to support the data flow. Thereafter, the data flow is routed using the selected connection.
摘要:
Methods and apparatus are provided for recovering from packet loss in an end-to-end network connection having at least one wireless segment. A packet on a wireless segment of an end-to-end network connection is processed by determining whether the packet comprises one or more of a lost packet and a malformed packet; and generating a modified packet for an application associated with the packet to replace one or more of the lost packet and the malformed packet if the application is substantially tolerant to one or more of lost and malformed data. The modified packet comprises, for example, a non-original packet and/or a corrected packet. Link layer information or information from a deep packet inspection can be used to determine whether the packet comprises a lost packet or a malformed packet.
摘要:
Methods and apparatus are provided for recovering from packet loss in an end-to-end network connection having at least one wireless segment. A packet on a wireless segment of an end-to-end network connection is processed by determining whether the packet comprises one or more of a lost packet and a malformed packet; and generating a modified packet for an application associated with the packet to replace one or more of the lost packet and the malformed packet if the application is substantially tolerant to one or more of lost and malformed data. The modified packet comprises, for example, a non-original packet and/or a corrected packet. Link layer information or information from a deep packet inspection can be used to determine whether the packet comprises a lost packet or a malformed packet.
摘要:
Various embodiments provide byte caching in wireless communication networks. In one embodiment, a plurality of data packets are received through an internet protocol (IP) data flow established between a wireless communication device and at least one server. Each of the plurality of data packets are combined into a packet bundle. A determination is made as to whether a second byte caching system is available. The packet bundle is transformed using one or more byte caching operations based on a second byte caching system being available. The transformed packet bundle is sent to the second byte caching system using an IP communication mechanism.
摘要:
Various embodiments detecting wireless communication device mobility in a wireless communication network. In one embodiment, one or more Internet Protocol (IP) data packets associated with a wireless communication device are analyzed. The wireless communication device is coupled with the edge entity. A determination is made, based on the analyzing, that the wireless communication device is a newly coupled device at the edge entity. A central entity disposed within the wireless communication network is notified that the wireless communication device is currently coupled to the edge entity.
摘要:
One or more embodiments perform byte caching. At least one data packet is received from at least one network node. At least one data object is received from the at least one data packet. An object type associated with the at least one data object is identified. The at least one data object is divided into a plurality of byte sequences based on the object type that is associated with the at least one data object. At least one byte sequence in the plurality of byte sequences is stored into a byte cache.
摘要:
A computer implemented method monitors resource usage of a virtual machine. When a virtual machine is instantiated, resource usage of the virtual machine is monitored to form monitoring data. The monitoring is performed externally from the virtual machine. When the virtual machine is later suspended, the monitoring data is stored as metadata associated with the virtual machine.
摘要:
A method, system and computer program product for creating a customized message in a video-on-demand service, in which a user accesses the service using a communications device. In an embodiment, the method comprises using a video-on-demand server to intercept the access by the user of the video-on-demand service, obtain information about video content of a local cache of the video-on-demand service, obtain a profile of the user, and identify a context of the user. A customized message is constructed for the communications device based on the information about the local cache, the profile of the user, and the context of the user. The video-on-demand server sends the customized message to the communications device. In one embodiment, the user accesses the video-on-demand service through an edge base station of a core network, and the video-on-demand server is in this base station of the core network.
摘要:
A computer system, and computer program product monitor resource usage of a virtual machine. When a virtual machine is instantiated, resource usage of the virtual machine is monitored to form monitoring data. The monitoring is performed externally from the virtual machine. When the virtual machine is later suspended, the monitoring data is stored as metadata associated with the virtual machine.