Abstract:
A device identification module identifies devices on a remote network, where the remote network may use Network Address Translation techniques. The device identification module can receive a list of devices on the remote network. The devices in the remote network can be identified by the device classification module based, at least in part, on the device classification and one or more of Dynamic Host Configuration Protocol (DHCP) information for the remote network, port sequences used in Network Address Translation on the remote network, and a live Uniform Resource Locator (URL) check performed on the remote network.
Abstract:
A recommendation engine can provide recommendations with respect to an application and can provide insights to a user of a computing device. The recommendation engine can receive a prediction based on user engagement with the application during an initial period of time (e.g., a trial period) as to whether the user will convert use of the application to a paid basis (e.g., a subscription or license to the application). An action can be recommended based on the prediction. The recommendation engine can provide insights to a user based on a score associated with the insight. The score can be determined by measuring previous user interactions with the insight over a period of time.
Abstract:
Person detection and tracking techniques may be used to estimate pedestrian traffic in locations equipped with cameras. Persons detected in video data from the cameras may help determine existing pedestrian traffic data. Future pedestrian traffic estimation may be performed to estimate pedestrian traffic characteristics (such as volume, direction, etc.) Such traffic estimation may be provided to users for route planning/congestion information. A traffic map can be derived based on the number of people at or expected to be at certain locations. The map may be provided to users to provide traffic data and/or estimations.
Abstract:
Handover parameter settings are automatically adapted in access points in a system to improve handover performance. Reactive detection techniques are employed for identifying different types of handover-related failures and adapting handover parameters based on this detection. Messaging schemes are also employed for providing handover-related information to access points. Proactive detection techniques also may be used for identifying conditions that may lead to handover-related failures and then adapting handover parameters in an attempt to prevent such handover-related failures. Ping-ponging may be mitigated by adapting handover parameters based on analysis of access terminal visited cell history acquired by access points in the system. In addition, configurable parameters (e.g., timer values) may be used to detect handover-related failures.
Abstract:
Apparatuses and methods for detecting falsified wireless access points are presented. A method includes identifying a target wireless access point for validation and measuring a round trip time delay to the wireless access point. The method also includes determining an expected processing delay of the wireless access point, analyzing the measured round trip time delay and the expected processing delay, and validating the wireless access point based upon the analysis. An apparatus includes a wireless transceiver, a processing unit coupled to the wireless transceiver, and a memory coupled to the processing unit. The processing unit is configured to identify a target wireless access point for validation, measure a round trip time delay to the wireless access point, determine an expected processing delay of the wireless access point, analyze the measured round trip time delay and the expected processing delay, and validate the wireless access point based upon the analysis.
Abstract:
Problems caused by interaction between paging optimization and synchronizing CSG information are mitigated by setting a network indication indicating, for example, that a subscriber is no longer a member of a CSG (502), but the network has not yet received confirmation that an access terminal associated with the subscriber has been informed of this. A timer-based scheme may be employed for removing a CSG ID from the subscriber information for a subscriber once it is determined that the subscriber is no longer a member of the CSG (702), (704), (706), (708). In addition, a temporary member of a CSG may determine whether it is still a member of a CSG upon expiration of a CSG timer (1002), (1004), (1006). Also, the frequency with which an access terminal registers may be changed based on various criteria. Furthermore, an allowed CSG list may be selectively included in a page message depending on the destination of the page message (1314).
Abstract:
Ambiguity (e.g., confusion) associated with access point identifiers may be resolved by querying candidate target access points and/or by using historical records indicative of one or more access points that the access point has previously accessed. For example, messages may be sent to access points that are assigned the same identifier to cause the access points to monitor for a signal from an access terminal that received the identifier from a target access point. The target access point may then be identified based on any responses that indicate that a signal was received from the access terminal. In some aspects the access points subject to being queried may be selected using a tiered priority. In addition, it may be determined based on prior handoffs of a given access terminal that when that access terminal reports a given identifier, the access terminal usually ends up being handed-off to a particular access point. Accordingly, a mapping may be maintained for that access terminal that maps the identifier to that access point so that the mapping may be used to resolve any future confusion associated with the use of that identifier by that access terminal.
Abstract:
Systems and methodologies are described that facilitate multiplexing communications from multiple downstream access points to one or more mobility management entities (MME). In particular, a concentrator component is provided that can establish a single transport layer connection with an MME along with multiple application layer connections over the single transport layer connection for each of multiple downstream access points and/or related mobile devices. The downstream access points and/or mobile devices can provide identifiers to the concentrator component, which can utilize the identifiers to track communications with the MME. In this regard, the MME can additionally include identifiers received from the concentrator component in subsequent communications to facilitate identifying the appropriate downstream access point and/or mobile device.
Abstract:
Paging and power consumption are managed in conjunction with providing local breakout in a wireless wide area network. In some aspects, if a packet destined for an access terminal is received at an access point that provides local breakout, the access point may inform the network so that the network will cause the access point to page the access terminal. Alternatively, in some aspects an access point that provides local breakout may maintain idle context of the access terminal, whereby the access point may autonomously page the access terminal (i.e., without involving the core network). In some aspects local breakout traffic is filtered at an access point to reduce the number of pages or packets sent to an access terminal. In some aspects an indication of a packet type is provided with a page message to enable an access terminal to determine whether to receive the packet. In some aspects a local link interface may be selectively disabled or enabled to limit traffic at an access terminal.