Patent application number | Description | Published |
20110201285 | METHODS AND APPARATUS PROVIDING INTELLIGENT RADIO SELECTION FOR LEGACY AND NON-LEGACY APPLICATIONS - Methods and apparatus providing intelligent interface selection for legacy and non-legacy applications. The method includes intercepting a networking function call from an application desiring radio access, selecting a radio from a plurality of candidate radios based on selection criteria, and binding the radio to the application. To facilitate flow mobility, the method includes allocating an ephemeral port to the radio, generating a flow binding rule based only on the ephemeral port, and signaling the flow binding rule to a home agent. | 08-18-2011 |
20110211444 | Seamless Overlay Connectivity Using Multi-Homed Overlay Neighborhoods - A communication system enables a node to utilize multiple communication interfaces to connect to an overlay network. The use of multiple communication interfaces provides a redundant overlay network connection, thereby enabling a node to maintain connectivity or select a preferred connection to the overlay network, increasing efficiency or reducing costs in the overlay network. A network in which member nodes obtain services in the absence of server-based infrastructure is referred to as a “peer-to-peer overlay network” (or “overlay network” or simply “overlay”). Overlay networks consist of several nodes from hundreds, to thousands, joined together in a logical routing structure. Individual nodes often participate in routing and maintenance aspects of the overlay. Typically an overlay is formed through the enrollment and joining of all these nodes as defined by the overlay protocol. Nodes forming peer-to-peer overlay networks may communicate with each other over various network technologies. | 09-01-2011 |
20120106342 | SYSTEMS AND METHODS FOR COMMUNICATING IN A NETWORK - Systems and methods for prioritizing transmission control protocol (TCP) flows for communication devices in a network are described herein. The systems and methods herein may further allocate bandwidth to the flows based on the priority of the flows. Further, the systems and methods herein allow devices to determine whether particular flows share a traffic flow constraint or bottleneck that limits the overall available bandwidth to the flows. Therefore, allocation of bandwidth for one flow may be adjusted based on allocation of bandwidth to another flow if the flows share a traffic flow constraint. Further, the systems and methods herein allow for target data rates to be determined for the flows based on shared traffic flow constraints. | 05-03-2012 |
20130282911 | INVASIVE SOCKET MANAGER - A server initiating shut down of a transport control protocol (TCP) connection when a radio connection is terminated is problematic because a new radio connection must be established for the sole purpose of shutting down the TCP connection. Hence, network and terminal resources for establishing the radio connection are wasted. Accordingly, a method, an apparatus, and a computer program product for initiating a closing of a transport layer connection at a client are provided. The apparatus determines whether a functionality associated with the transport layer connection satisfies at least one criterion, and closes the transport layer connection when the functionality satisfies the at least one criterion while a radio layer connection is available. As a result, the TCP connection is shut down by the client before the server can activate a new radio connection for the sole purpose of terminating the TCP connection. | 10-24-2013 |
20140059206 | SYSTEM AND METHOD FOR NETWORK TRAFFIC AGGREGATION AND ANALYSIS OF MOBILE DEVICES USING SOCKET WRAPPERS - This disclosure describes systems, methods, and apparatus for per-application network traffic monitoring by extending socket functionality to include socket wrappers able to identify network traffic volume, applications responsible for the traffic, the network being loaded, and distinguish between internal device traffic and external network traffic. Network traffic shaping can then be carried out by managing an offending application's traffic. | 02-27-2014 |
20140181904 | DERIVING A WLAN SECURITY CONTEXT FROM A WWAN SECURITY CONTEXT - Techniques for deriving a WLAN security context from an existing WWAN security context are provided. According to certain aspects, a user equipment (UE) establishes a secure connection with a wireless wide area network (WWAN). The UE may receive from the WWAN an indication of a wireless local area network (WLAN) for which to derive a security context. The UE then derives the security context for the WLAN, based on a security context for the WWAN obtained while establishing the secure connection with the WWAN and establishes a secure connection with the WLAN using the derived security context for the WLAN. This permits the UE to establish a Robust Security Network Association (RSNA) with the WLAN while avoiding lengthy authentication procedures with an AAA server, thus speeding up the association process. | 06-26-2014 |
20150103812 | METHODS AND APPARATUS FOR WiFi QUALITY ESTIMATION BASED ON BASIC SERVICE SET LOAD AND WIDE AREA NETWORK METRICS - Methods, systems, and devices are described for determining a quality estimation of a wireless network that may be used to determine whether a particular wireless network meets one or more criteria for association with a station. The quality estimation may be based on a load quality of a basic service set (BSS) of an available wireless network and/or one or more wide area network (WAN) metrics associated with the wireless network. A station may evaluate such load quality and WAN metrics prior to association, and/or after association with a wireless network. | 04-16-2015 |
20150215184 | DETERMINATION OF END-TO-END TRANSPORT QUALITY - Methods, systems, and devices are described for assessing the quality of end-to-end connectivity for a wireless communication device. Data generated from at least one of existing traffic and networking operations caused by existing traffic of the wireless communication device may be monitored to obtain information related to connectivity quality. One or more values of one or more metrics may be determined using the obtained information. The quality of end-to-end connectivity for the wireless communication device may be assessed using the value(s) of the metric(s). Based at least in part on a result of the assessment, an action may be performed to improve connectivity quality for the wireless communication. | 07-30-2015 |