Patent classifications
H04L69/24
Method for Transmitting Subscription Data, and Also Data Provision Component, Data Consumption Component, Network and Installation
Various embodiments include a method for transmitting subscription data in a brokerless publication/subscription service from a data provision component to a data consumption component. The method includes: reaching agreement between the data consumption component and the data provision component upon a protocol; and transmitting the subscription data from the data provision component to the data consumption component in the protocol agreed upon.
Method for Transmitting Subscription Data, and Also Data Provision Component, Data Consumption Component, Network and Installation
Various embodiments include a method for transmitting subscription data in a brokerless publication/subscription service from a data provision component to a data consumption component. The method includes: reaching agreement between the data consumption component and the data provision component upon a protocol; and transmitting the subscription data from the data provision component to the data consumption component in the protocol agreed upon.
Bluetooth audio streaming passthrough
A Bluetooth audio streaming passthrough, and a method for transmitting an audio stream over a Bluetooth communication link and disclosed. The method is carried out by a source device. An audio codec configuration and a sampling rate of the audio stream are received, the audio stream coming from a streaming application running on the source device. A Bluetooth audio stream between the source device and a sink device is configured using the received audio codec configuration and sampling rate. The first audio stream is received from the streaming application. The received first audio stream is packetized into the Bluetooth audio stream. The Bluetooth audio stream is transmitted to the sink device over the Bluetooth communication link, including the packetized received audio stream.
Data security processing method and apparatus
Example data security processing methods and apparatus are described. One example method includes setting up a first PDU session. A first base station derives a first user plane key based on a received base key and performs security processing on user plane data in the first PDU session by using the first user plane key and a security algorithm. A second PDU session is set up. The first base station derives a second user plane key based on the base key and performs security processing on user plane data in the second PDU session by using the second user plane key and the security algorithm. The user plane key includes a user plane encryption key and/or a user plane integrity protection key.
Status prompt multimedia playing method and system, and apparatus
Example status prompt multimedia playing methods and apparatus are described. One example method includes receiving a first multimedia request by a status prompt application server, where the first multimedia request includes a non-idle identifier and is sent by a TAS. The status prompt application server sends a first multimedia response including a status prompt multimedia session description protocol (SDP) to the TAS, and receives a first multimedia acknowledgement message that includes a calling-side multimedia SDP and that is sent by the TAS. In this way, the status prompt application server obtains the calling-side multimedia SDP, and implements negotiation and acknowledgement of multimedia capability sets between the status prompt application server and a calling terminal device. The status prompt application server can play corresponding status prompt multimedia for the calling terminal device based on different non-idle identifiers. This implements playing of personalized status prompt multimedia in a non-idle state scenario.
Methods for increasing Voice-over-Internet Protocol (VoIP) network coverage
The disclosure generally relates to various methods to increase network coverage for a Voice-over-Internet Protocol (VoIP) session between a first user equipment (UE) and a second UE. In an aspect, a first and second UEs negotiate a codec configuration to use in the VoIP session, transmits, to the second UE, a maximum end-to-end packet loss rate (PLR) that the first UE can tolerate for received media given the negotiated codec configuration, receives, from the second UE, a maximum end-to-end PLR that the second UE can tolerate for received media given the negotiated codec configuration, and determines a distribution of the maximum end-to-end PLRs among respective uplinks and downlinks at the first UE and the second UE.
Methods for increasing Voice-over-Internet Protocol (VoIP) network coverage
The disclosure generally relates to various methods to increase network coverage for a Voice-over-Internet Protocol (VoIP) session between a first user equipment (UE) and a second UE. In an aspect, a first and second UEs negotiate a codec configuration to use in the VoIP session, transmits, to the second UE, a maximum end-to-end packet loss rate (PLR) that the first UE can tolerate for received media given the negotiated codec configuration, receives, from the second UE, a maximum end-to-end PLR that the second UE can tolerate for received media given the negotiated codec configuration, and determines a distribution of the maximum end-to-end PLRs among respective uplinks and downlinks at the first UE and the second UE.
METHOD AND SYSTEM FOR PARALLELLY PROCESSING DATA
The present disclosure discloses system and method for managing operations of one or more applications on an electronic device. The method includes monitoring at predefined instants, device parameters associated with the electronic device and user parameters associated with usage of a plurality of applications in the electronic device. Application usage pattern is identified based on the device parameters and the user parameters using predefined techniques. Further, the one or more applications may be clustered into one or more groups using a real-time learning model stored in the electronic device. The learning model is trained dynamically based on the application usage pattern for clustering. The operations of the one or more applications are managed on the electronic device based on the one or more clustered groups.
The disclosure provides a method and a system for improving throughput in wireless communication. The system divides data link layers and/or a physical layer of a network entity and a UE based on a number of parallel data processing supported by the UE. Further, data is processed through the divided set of data link layers and/or the physical layer in parallel and independently for significantly improving the throughput in the UE and the network entity.
PATH SELECTION FOR DATA TRAFFIC WITHIN A SOFTWARE-DEFINED WIDE AREA NETWORK USING TRAFFIC METRICS
Embodiments herein disclose path selection for data traffic within a software-defined wide area network using traffic metrics. Some embodiments relate to a method that includes polling peers of the SD-WAN for traffic metrics, receiving traffic metrics from at least a portion of the peers, combining the received traffic metrics, calculating performance of a plurality of possible paths from a source node to a destination node, the nodes being within the SD-WAN topology, and selecting a path from the source node to the destination node based on the calculated performance.
Presence server message handling
A presence server in a network can receive capability information about a UE in a publish message, and make that capability information available to other UEs on the network. When the UE later deregisters from the network, the UE can send an unpublish message. However, the presence server can at least partially disregard the unpublish message and continue to make the capability information about the UE available to other UEs. The presence server can also filter capability information of one or more target UEs provided to a watcher UE based on a registration status of a target UE, capabilities of the watcher UE, and/or whether a set of target UEs associated with a single user share certain capabilities.