Abstract:
A server initiating shut down of a transport control protocol (TCP) connection when a radio connection is terminated is problematic because a new radio connection must be established for the sole purpose of shutting down the TCP connection. Hence, network and terminal resources for establishing the radio connection are wasted. Accordingly, a method, an apparatus, and a computer program product for initiating a closing of a transport layer connection at a client are provided. The apparatus determines whether a functionality associated with the transport layer connection satisfies at least one criterion, and closes the transport layer connection when the functionality satisfies the at least one criterion while a radio layer connection is available. As a result, the TCP connection is shut down by the client before the server can activate a new radio connection for the sole purpose of terminating the TCP connection.
Abstract:
Systems, methods and apparatus for communication are provided. In one aspect, a method of communication for an application running on an application layer of a first wireless host is provided. The method comprises communicating, via the application layer, a first data flow to a second wireless host over a first application connection on a first access network. The method further comprises determining, at the application, one or more channel quality metrics of each of the first application connection and an accessible second application connection on a second access network based on channel quality metrics. The method further comprises establishing, via the application layer, the second application connection with the second wireless host over the second access network based on the one or more channel quality metrics of one both of the first and second application connections.
Abstract:
Techniques for deriving a WLAN security context from an existing WWAN security context are provided. According to certain aspects, a user equipment (UE) establishes a secure connection with a wireless wide area network (WWAN). The UE may receive from the WWAN an indication of a wireless local area network (WLAN) for which to derive a security context. The UE then derives the security context for the WLAN, based on a security context for the WWAN obtained while establishing the secure connection with the WWAN and establishes a secure connection with the WLAN using the derived security context for the WLAN. This permits the UE to establish a Robust Security Network Association (RSNA) with the WLAN while avoiding lengthy authentication procedures with an AAA server, thus speeding up the association process.
Abstract:
A communication system enables a node to utilize multiple communication interfaces to connect to an overlay network. The use of multiple communication interfaces provides a redundant overlay network connection, thereby enabling a node to maintain connectivity or select a preferred connection to the overlay network, increasing efficiency or reducing costs in the overlay network. A network in which member nodes obtain services in the absence of server-based infrastructure is referred to as a "peer-to-peer overlay network" (or "overlay network" or simply "overlay"). Overlay networks consist of several nodes from hundreds, to thousands, joined together in a logical routing structure. Individual nodes often participate in routing and maintenance aspects of the overlay. Typically an overlay is formed through the enrollment and joining of all these nodes as defined by the overlay protocol. Nodes forming peer-to-peer overlay networks may communicate with each other over various network technologies.
Abstract:
The disclosure provides a method, apparatus, and computer program product directed to a client estimation of round trip time via transport control protocol (TCP) signals over multiple radio access technologies. A TCP probe signal is transmitted to a server via a TCP connection, and an acknowledgment signal is received from the server via the TCP connection in response to the TCP probe signal. A round trip time is then estimated based on the acknowledgment signal.
Abstract:
Systems and methods for prioritizing transmission control protocol (TCP) flows for communication devices in a network are described herein. The systems and methods herein may further allocate bandwidth to the flows based on the priority of the flows. Further, the systems and methods herein allow devices to determine whether particular flows share a traffic flow constraint or bottleneck that limits the overall available bandwidth to the flows. Therefore, allocation of bandwidth for one flow may be adjusted based on allocation of bandwidth to another flow if the flows share a traffic flow constraint. Further, the systems and methods herein allow for target data rates to be determined for the flows based on shared traffic flow constraints.