H04L12/1442

Over the top network traffic classification

A system and method is disclosed to transform Over-The-Top (OTT) call log data collected by telecommunications network operators into a peer-to-peer log in order to determine more accurate information. In this method the IP addresses in the call log records are compared to a list of known mediator server IP addresses and the records in the log that contain mediator server IP addresses are removed from the log to create a peer-to-peer log containing only those records that contain peer IP addresses. The data in the peer-to-peer log can then be categorized with confidence to determine network performance information as well as, for example, the percentage of traffic to a particular country. Conclusions may then be inferred regarding the removed data records based upon the data found in the peer-to-peer log.

COORDINATING CELLULAR AND CABLE/FIBER BROADBAND NETWORKS
20220311682 · 2022-09-29 ·

Detect, at a cable/fiber broadband network termination unit of a cable/fiber broadband multi-service operator, an interruption in service to a cable/fiber broadband network customer unit—small cell pair. Responsive to detecting the interruption, the termination unit advises a charging server of the operator of the interruption in service, a corresponding identifier of the customer unit—small cell pair, and a corresponding account identifier. Responsive to termination unit advising the charging server, the charging server advises a backend server of an associated cellular network of a customer identifier corresponding to the account identifier. Responsive to the charging server advising the backend server, the backend server advises a policy control function of the associated cellular network to modify network parameters of the associated cellular network to compensate for the interruption in service.

OVER THE TOP NETWORK TRAFFIC CLASSIFICATION
20210392007 · 2021-12-16 ·

A system and method is disclosed to transform Over-The-Top (OTT) call log data collected by telecommunications network operators into a peer-to-peer log in order to determine more accurate information. In this method the IP addresses in the call log records are compared to a list of known mediator server IP addresses and the records in the log that contain mediator server IP addresses are removed from the log to create a peer-to-peer log containing only those records that contain peer IP addresses. The data in the peer-to-peer log can then be categorized with confidence to determine network performance information as well as, for example, the percentage of traffic to a particular country. Conclusions may then be inferred regarding the removed data records based upon the data found in the peer-to-peer log.

COORDINATING CELLULAR AND CABLE/FIBER BROADBAND NETWORKS
20230308366 · 2023-09-28 ·

Detect, at a cable/fiber broadband network termination unit of a cable/fiber broadband multi-service operator, an interruption in service to a cable/fiber broadband network customer unit-small cell pair. Responsive to detecting the interruption, the termination unit advises a charging server of the operator of the interruption in service, a corresponding identifier of the customer unit – small cell pair, and a corresponding account identifier. Responsive to termination unit advising the charging server, the charging server advises a backend server of an associated cellular network of a customer identifier corresponding to the account identifier. Responsive to the charging server advising the backend server, the backend server advises a policy control function of the associated cellular network to modify network parameters of the associated cellular network to compensate for the interruption in service.

SECONDARY INTERNET ACCESS FOR MOBILE DEVICES

In an approach for a secondary mobile internet access, a processor receives a request from a mobile device for a connection to a secondary wireless access point. A processor authorizes the connection request. A processor determines bandwidth associated with the mobile device. A processor adjusts bandwidth associated with the secondary wireless access point to include at least a sum of original bandwidth of the secondary wireless access point and the bandwidth associated with the mobile device to accommodate usage by the mobile device. A processor assigns temporary bandwidth to the mobile device based on the bandwidth associated with the mobile device. A processor executes a timer to a session associated with the authorized connection for the mobile device. A processor restores the original bandwidth of the secondary wireless access point upon detecting an end of the session.

Network-accessible service for executing virtual machines using client-provided virtual machine images

Techniques are described for managing communications between multiple intercommunicating computing nodes, such as multiple virtual machine nodes hosted on one or more physical computing machines or systems. In some situations, users may specify groups of computing nodes and optionally associated access policies for use in the managing of the communications for those groups, such as by specifying which source nodes are allowed to transmit data to particular destinations nodes. In addition, determinations of whether initiated data transmissions from source nodes to destination nodes are authorized may be dynamically negotiated for and recorded for later use in automatically authorizing future such data transmissions without negotiation. This abstract is provided to comply with rules requiring an abstract, and it is submitted with the intention that it will not be used to interpret or limit the scope or meaning of the claims.

Configurable application execution service for executing applications on virtual machines

Techniques are described for managing communications between multiple intercommunicating computing nodes, such as multiple virtual machine nodes hosted on one or more physical computing machines or systems. In some situations, users may specify groups of computing nodes and optionally associated access policies for use in the managing of the communications for those groups, such as by specifying which source nodes are allowed to transmit data to particular destinations nodes. In addition, determinations of whether initiated data transmissions from source nodes to destination nodes are authorized may be dynamically negotiated for and recorded for later use in automatically authorizing future such data transmissions without negotiation. This abstract is provided to comply with rules requiring an abstract, and it is submitted with the intention that it will not be used to interpret or limit the scope or meaning of the claims.

Data set valuation for service providers

Data set valuation techniques are provided. For example, a request is obtained from a client to utilize one or more cloud computing services managed by at least one service provider. A valuation is determined for delivering the one or more requested cloud computing services to the client. The valuation determination includes determining a valuation of one or more data sets associated with the one or more cloud computing services.

Secondary internet access for mobile devices

In an approach for a secondary mobile internet access, a processor receives a request from a mobile device for a connection to a secondary wireless access point. A processor authorizes the connection request. A processor determines bandwidth associated with the mobile device. A processor adjusts bandwidth associated with the secondary wireless access point to include at least a sum of original bandwidth of the secondary wireless access point and the bandwidth associated with the mobile device to accommodate usage by the mobile device. A processor assigns temporary bandwidth to the mobile device based on the bandwidth associated with the mobile device. A processor executes a timer to a session associated with the authorized connection for the mobile device. A processor restores the original bandwidth of the secondary wireless access point upon detecting an end of the session.

BILLING METHOD AND APPARATUS IN WIRELESS COMMUNICATION SYSTEM
20210306817 · 2021-09-30 ·

A method for billing in a wireless communication system, according to an embodiment, includes: transmitting billing data to an upper entity; determining whether the billing data has been normally transmitted; and executing a supplementary operation based on a result of the determining.