Abstract:
To reduce the potential for renewed network congestion after a need for a restriction of data communications for background applications has been eliminated, the examples implement techniques in which a mobile device calculates a distributed deactivation delay value corresponding to an amount of time to wait before deactivating the restriction. The mobile device may generate a seed value unique to the mobile device for use in generating an initial distributed deactivation delay value and random control values generated by a threshold determination. The threshold determination iterates through generating a respective control value and calculating a respective threshold value until either a relationship between the respective control value and the respective threshold value meets a threshold condition or a maximum number of iterations are performed. Each threshold determination iteration increases the initial distributed deactivation delay value such that the distributed deactivation delay value is relative to a total of performed iterations.
Abstract:
A network device transmits data to a user equipment (UE) via a first Radio Access Network (RAN) using first Transmission Control Protocol (TCP) congestion control parameters. The network device receives a notification message indicating that the UE has moved from the first RAN to a second RAN, and modifies, responsive to receipt of the notification, the first TCP congestion control parameters to create second TCP congestion control parameters. The network device transmits data to the UE via the second RAN using the second TCP congestion control parameters.
Abstract:
Near real time identification of predicted wireless communication congestion is based on a relationship between a number of key performance indicator (KPI) trend prediction values and corresponding KPI trend thresholds. Each KPI trend prediction value is calculated based on a number of past intervals and a number of KPIs corresponding to each past interval of the number of past intervals utilizing linear regression. A mobile communication network node, such as an enhanced node B, may identify predicted wireless communication congestion and notify mobile devices served by the node. Mobile devices served by the node, based on the notification, may restrict background application data communication and/or take appropriate action to contribute to a reduction in and/or elimination of the congestion.
Abstract:
To reduce the potential for renewed network congestion after a need for a restriction of data communications for background applications has been eliminated, the examples implement techniques in which a mobile device calculates a distributed deactivation delay value corresponding to an amount of time to wait before deactivating the restriction. The mobile device may generate a seed value unique to the mobile device for use in generating an initial distributed deactivation delay value and random control values generated by a threshold determination. The threshold determination iterates through generating a respective control value and calculating a respective threshold value until either a relationship between the respective control value and the respective threshold value meets a threshold condition or a maximum number of iterations are performed. Each threshold determination iteration increases the initial distributed deactivation delay value such that the distributed deactivation delay value is relative to a total of performed iterations.
Abstract:
A network device transmits data to a user equipment (UE) via a first Radio Access Network (RAN) using first Transmission Control Protocol (TCP) congestion control parameters. The network device receives a notification message indicating that the UE has moved from the first RAN to a second RAN, and modifies, responsive to receipt of the notification, the first TCP congestion control parameters to create second TCP congestion control parameters. The network device transmits data to the UE via the second RAN using the second TCP congestion control parameters.
Abstract:
Near real time identification of predicted wireless communication congestion is based on a relationship between a number of key performance indicator (KPI) trend prediction values and corresponding KPI trend thresholds. Each KPI trend prediction value is calculated based on a number of past intervals and a number of KPIs corresponding to each past interval of the number of past intervals utilizing linear regression. A mobile communication network node, such as an enhanced node B, may identify predicted wireless communication congestion and notify mobile devices served by the node. Mobile devices served by the node, based on the notification, may restrict background application data communication and/or take appropriate action to contribute to a reduction in and/or elimination of the congestion.
Abstract:
A network device transmits data to a user equipment (UE) via a first Radio Access Network (RAN) using first Transmission Control Protocol (TCP) congestion control parameters. The network device receives a notification message indicating that the UE has moved from the first RAN to a second RAN. The network device modifies, responsive to receipt of the notification, the first TCP congestion control parameters to create second TCP congestion control parameters, where the first TCP congestion control parameters include a first slow start threshold (ssthresh), and wherein the second TCP congestion control parameters include a second ssthresh that is different than the first ssthresh. The network device transmits data to the UE via the second RAN using the second TCP congestion control parameters.
Abstract:
Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a device may receive traffic data associated with a coverage area and determine that there is network congestion. If there is network congestion, the device may identify a high-consumption user device. The device may perform a corrective action in connection with a load of the high-consumption user device, such as limit a throughput of the high-consumption user device. The device may perform a corrective action based on a policy obtained from a policy and control function.
Abstract:
A network device for a mobile carrier network sends, to a third-party platform, a first client message including a first parameter extension. The first parameter extension indicates subscription parameters for a data flow between a user equipment (UE) device that originated the first client message and the third-party platform. The network device receives, from the third-party platform, a server message. The server message does not include a confirmation that the third-party platform accepts subscription parameters. The network device forwards, to the UE device, the server message with the first parameter extension. The network device receives, from the UE device, a second client message including a second parameter extension. The second parameter extension confirms that the third-party platform accepts the one or more subscription parameters. The network device then generates a policy enforcement rule for the data flow that relies on the confirmation from the third-party platform.