Patent classifications
H04L47/24
Methods of conveying buffer status with mixed critical and non-critical traffic
A method by a wireless device (110) includes determining that the wireless device has data to transmit on at least one logical channel of a priority N. The logical channel is associated with at least one logical channel group. The method further includes generating, by the wireless device, a buffer status report of type N, BSR N, for the at least one logical channel of the priority N and prioritizing a transmission of the BSR N for the at least one logical channel of priority N over a data transmission for at least one other logical channel that has a priority that is higher than the priority N.
Congestion control and priority handling in device-to-device (D2D) communications
Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a first wireless communication device may iterate a value of a channel access counter (CAC) to a trigger value based at least in part on configuring the value of the CAC. In some aspects, the first wireless communication device may utilize a channel access mechanism to select a set of time-frequency resources for a transmission of a packet based at least in part on iterating the value of the CAC to the trigger value. In some aspects, the first wireless communication device may transmit the packet to a second wireless communication device via the set of time-frequency resources based at least in part on utilizing the channel access mechanism to select the set of time-frequency resources for the transmission. Numerous other aspects are provided.
DATA TRANSMISSION METHOD AND RELATED DEVICE
Embodiments of this application disclose a data transmission method, to reduce a delay. If a network device receives burst data, the network device preferentially sends the burst data. The burst data may be data whose data amount is greater than a data amount threshold.
SYSTEMS AND METHODS OF WIRELESS TRIGGERING BUFFER STATUS REPORTING FOR TRANSMISSION STREAMS
A device may include one or more processors. The one or more processors may be configured to determine a first traffic identifier of a first wireless traffic stream, from a plurality of traffic identifiers. The one or more processors may be configured to generate a first frame including the first traffic identifier. The first frame may be configured to trigger a receiver device to send a response frame that comprises buffer status data corresponding to the first wireless traffic stream. The one or more processors may be configured to wirelessly transmit, via a transmitter, the generated first frame to the receiver device.
SYSTEMS AND METHODS OF WIRELESS TRIGGERING BUFFER STATUS REPORTING FOR TRANSMISSION STREAMS
A device may include one or more processors. The one or more processors may be configured to determine a first traffic identifier of a first wireless traffic stream, from a plurality of traffic identifiers. The one or more processors may be configured to generate a first frame including the first traffic identifier. The first frame may be configured to trigger a receiver device to send a response frame that comprises buffer status data corresponding to the first wireless traffic stream. The one or more processors may be configured to wirelessly transmit, via a transmitter, the generated first frame to the receiver device.
Techniques for file aware communications
Certain aspects of the present disclosure provide techniques for wireless communication. The method generally includes determining one or more target metrics associated with a file having a plurality of packets, the plurality of packets comprising at least one of a plurality of uplink packets or a plurality of downlink packets, determining one or more communication parameters for communicating the plurality of packets according to the one or more target metrics associated with the file, and communicating the plurality of packets with a second network entity in accordance with the determined one or more communication parameters.
Advertising network layer reachability information specifying a quality of service for an identified network flow
Methods, apparatus and articles of manufacture for advertising network layer reachability information specifying a quality of service for an identified network flow are disclosed. Example methods disclosed herein to specify quality of service for network flows include receiving network layer reachability information including a first quality of service class specified for a first network flow, the network layer reachability information having been advertised by a first network element that is to receive the first network flow. Such example methods can also include updating an incoming packet determined to belong to the first network flow to indicate that the incoming packet belongs to the first quality of service class, the incoming packet being received from a second network element. Such example methods can further include, after updating the incoming packet, routing the incoming packet towards the first network element.
Advertising network layer reachability information specifying a quality of service for an identified network flow
Methods, apparatus and articles of manufacture for advertising network layer reachability information specifying a quality of service for an identified network flow are disclosed. Example methods disclosed herein to specify quality of service for network flows include receiving network layer reachability information including a first quality of service class specified for a first network flow, the network layer reachability information having been advertised by a first network element that is to receive the first network flow. Such example methods can also include updating an incoming packet determined to belong to the first network flow to indicate that the incoming packet belongs to the first quality of service class, the incoming packet being received from a second network element. Such example methods can further include, after updating the incoming packet, routing the incoming packet towards the first network element.
Dynamic service chaining and late binding
A visibility platform can be used to monitor traffic traversing private cloud infrastructures and/or public cloud infrastructures. In some instances, the traffic is provided to a set of network services that are accessible to the visibility platform. These network services can be provisioned in a serial or parallel fashion. Network service chaining can be used to ensure that traffic streams skip unnecessary network services and receive only those network services that are needed. For example, an email service chain can include virus, spam, and phishing detection, while a video streaming service chain can include traffic shaping policies to satisfy quality of service (QoS) guarantees. When the visibility platform is represented as a graph that makes use of action sets, network service chains can be readily created or destroyed on demand.
Dynamic service chaining and late binding
A visibility platform can be used to monitor traffic traversing private cloud infrastructures and/or public cloud infrastructures. In some instances, the traffic is provided to a set of network services that are accessible to the visibility platform. These network services can be provisioned in a serial or parallel fashion. Network service chaining can be used to ensure that traffic streams skip unnecessary network services and receive only those network services that are needed. For example, an email service chain can include virus, spam, and phishing detection, while a video streaming service chain can include traffic shaping policies to satisfy quality of service (QoS) guarantees. When the visibility platform is represented as a graph that makes use of action sets, network service chains can be readily created or destroyed on demand.