Patent classifications
H04L47/2475
Communication Method and Apparatus
A communication method and apparatus, where a session management network element sends a first policy rule and a second policy rule to a first user plane network element. Therefore, the first user plane network element performs the following actions according to the first policy rule: including identification information of a first session or second indication information in first data of a first application, and sending the first data to a first application server. The first user plane network element performs the following actions according to the second policy rule: identifying second data that carries the identification information of the first session and that is initiated by the first application server, and sending the second data to a network element associated with the first session, so as to send, through the first session, the second data to the network element associated with the first session.
Communication Method and Apparatus
A communication method and apparatus, where a session management network element sends a first policy rule and a second policy rule to a first user plane network element. Therefore, the first user plane network element performs the following actions according to the first policy rule: including identification information of a first session or second indication information in first data of a first application, and sending the first data to a first application server. The first user plane network element performs the following actions according to the second policy rule: identifying second data that carries the identification information of the first session and that is initiated by the first application server, and sending the second data to a network element associated with the first session, so as to send, through the first session, the second data to the network element associated with the first session.
Device initiated quality of service
A method for initiating quality of service levels within a user equipment (UE) device may include receiving application mapping rules from a core network, storing the application mapping rules within the UE device, and determining, by the UE device, a slice service profile (SSP) category associated with an application flow. The method may further include determining, by the UE device, whether an application mapping rule associated with the SSP category is stored within the UE device, and obtaining, from the UE device, a quality of service level for the application flow based on the SSP category, in response to determining that the application mapping rule is stored within the UE device.
Device initiated quality of service
A method for initiating quality of service levels within a user equipment (UE) device may include receiving application mapping rules from a core network, storing the application mapping rules within the UE device, and determining, by the UE device, a slice service profile (SSP) category associated with an application flow. The method may further include determining, by the UE device, whether an application mapping rule associated with the SSP category is stored within the UE device, and obtaining, from the UE device, a quality of service level for the application flow based on the SSP category, in response to determining that the application mapping rule is stored within the UE device.
TECHNIQUES FOR IMPROVING REFLECTIVE QUALITY OF SERVICE
Certain aspects of the present disclosure provide techniques for implementing reflective quality of service (RQoS) in wireless communication systems. A method for implementing RQoS that may be performed by a user equipment (UE) generally includes receiving a plurality of downlink user data packets from a first base station (BS), determining at least one reflective quality of service (RQoS) mapping rule for one or more uplink packet transmissions based on a subset of the plurality of downlink user data packets, filtering the plurality of downlink user data packets based on the at least one RQoS mapping rule, and forwarding the plurality of downlink user data packets to a corresponding application entity of the UE based on the filtering.
Systems and methods for managing streams of packets via intermediary devices
Virtual application and desktop delivery may be optimized by supplying application metadata and user intent to the device between a client and a server hosting resources for the delivery. The data packets used to deliver the virtual application or desktop may be also tagged with references to the application. By supplying the metadata and tagging packets with the metadata, an intermediary network device may provide streams of data packets at the target QoS. In addition, the device may apply network resource allocation rules (e.g., firewalls and QoS configuration) for redirected content retrieved by the client out of band relative to a virtual channel such as the Internet. The network resource allocation rules may differ for different types of resources accessed. The device may also control a delivery agent on the server to modify communication sessions established through the virtual channels based on network conditions.
Systems and methods for managing streams of packets via intermediary devices
Virtual application and desktop delivery may be optimized by supplying application metadata and user intent to the device between a client and a server hosting resources for the delivery. The data packets used to deliver the virtual application or desktop may be also tagged with references to the application. By supplying the metadata and tagging packets with the metadata, an intermediary network device may provide streams of data packets at the target QoS. In addition, the device may apply network resource allocation rules (e.g., firewalls and QoS configuration) for redirected content retrieved by the client out of band relative to a virtual channel such as the Internet. The network resource allocation rules may differ for different types of resources accessed. The device may also control a delivery agent on the server to modify communication sessions established through the virtual channels based on network conditions.
Teaming applications executing on machines operating on a computer with different interfaces of the computer
Some embodiments provide a method for associating data message flows from applications executing on a host computer with network interfaces of the computer. The method of some embodiments identifies a set of applications operating on a machine executing on the host computer, identifies candidate teaming policies for associating each identified application with a subset of one or more interfaces, and generates a report to display the identified candidate teaming policies per application to a user. In response to user input selecting a first teaming policy for a first application, the method generates a rule, and distributes the rule, to the host computer to associate the first application with a first subset of the network interfaces specified by the first teaming policy. Similarly, in response to user input selecting a second teaming policy for a second application executing on the machine, the method generates a second rule, and distributes the second rule, to the host computer to associate the second application with a second subset of the network interfaces specified by the second teaming policy.
Secure firewall configurations
A kernel driver on an endpoint uses a process cache to provide a stream of events associated with processes on the endpoint to a data recorder. The process cache can usefully provide related information about processes such as a name, type or path for the process to the data recorder through the kernel driver. Where a tamper protection cache or similarly secured repository is available, this secure information may also be provided to the data recorder for use in threat detection, forensic analysis and so forth.
Secure firewall configurations
A kernel driver on an endpoint uses a process cache to provide a stream of events associated with processes on the endpoint to a data recorder. The process cache can usefully provide related information about processes such as a name, type or path for the process to the data recorder through the kernel driver. Where a tamper protection cache or similarly secured repository is available, this secure information may also be provided to the data recorder for use in threat detection, forensic analysis and so forth.