H04L47/2475

ELECTRONIC DEVICE FOR FILTERING PACKET AND METHOD FOR OPERATING SAME

According to various embodiments, an electronic device comprises a communication processor, an application processor operatively connected to the communication processor, and a memory, wherein the at least one memory may store instructions configured to, when executed, cause the application processor to identify a user identifier (UID) corresponding to at least one allowed application or at least one disallowed application when the electronic device enters a power saving state and to generate, on the basis of the user identifier, a first packet filter program which includes at least one condition for filtering a packet, and cause the communication processor to identify the first packet filter program generated from the application processor and to filter at least one packet associated with an application other than the at least one allowed application or at least one packet associated with the at least one disallowed application by using the first packet filter program, while the electronic device is in the power saving state. Various other embodiments are possible.

Method and system for controlling an operation of an application by classifying an application type using data bearer characteristics

An application type of a bearer is classified by computing statistics vectors of bearer metrics and locating points on a label map corresponding to the statistics vectors to obtain application type information. The application type information is exported to a network node to control an operation of application. The bearer metrics include bearer identifier information and bearer condition information, where the bearer condition information includes channel condition information and cell congestion level information. The bearers are paired, such that uplink and downlink bearers for a same application are identified, so that paired bearers are classified together. The label map is produced using previously classified bearer information to calculate cluster centroids and cluster regions that define portions of the map for particular application types. The bearer is classified by determining which cluster region is closest to points on the label map that are associated with the statistics vectors for a particular bearer.

SYSTEMS AND METHODS FOR NETWORK SLICE SELECTION ACCORDING TO APPLICATION SPECIFIC REQUEST

A device of a network may receive a session configuration message for an application session associated with an application of a user equipment (UE) that provided the session configuration message. The device of a network may identify, from the session configuration message, a quality of service (QoS) profile for the application session. The device of a network may determine that the application is authorized to use a network slice of the network that satisfies one or more QoS thresholds of the QoS profile. The device of a network may identify resources of the network that can be configured to satisfy the one or more QoS thresholds. The device of a network may instantiate the resources for communication of application data of the application session. Instantiating the resources may enable the UE to communicate the application data via the network slice using the resources.

NETWORK SERVICE ACCESS AND DATA ROUTING BASED ON ASSIGNED CONTEXT
20220052947 · 2022-02-17 ·

The present technology discloses methods, systems, and non-transitory computer-readable media for defining, for a network primitive in a network domain, whether the network primitive can receive data carrying an assigned context associated from one or more source nodes through a software-defined wide area network (SDWAN) fabric overlay; advertising a capability of the network primitive, the capability stating whether the network primitive can receive the data carrying the assigned context; and controlling selective transmission of the data carrying the assigned context from the one or more source nodes to the network primitive through the SDWAN fabric overlay based on the capability of the network primitive to receive the data carrying the assigned context.

INTEREST SCHEDULING BY AN INFORMATION AND DATA FRAMEWORK IN A CONTENT CENTRIC NETWORK
20170279920 · 2017-09-28 · ·

One embodiment provides a system for facilitating scheduling of interests in a CCN. The system determines, by a scheduler component, network properties associated with name prefixes of interests transmitted by a plurality of local applications, wherein a name for an interest is a hierarchically structured variable length identifier that includes contiguous name components ordered from a most general level to a most specific level, and wherein a name prefix includes one or more contiguous name components. The system generates a first interest which indicates a command to set a window size for a transport stack associated with a respective local application based on the network properties. The system transmits the first interest to a component associated with the transport stack, which causes the component to set the window size for the transport stack, thereby facilitating scheduling of interests based on the network properties.

Mobile device with virtual interfaces

Mobile devices, systems and methods are described with a plurality of virtual machines, wherein each virtual machine executes a separate virtual interface, or guest operating system. Each guest operating system corresponds to a different virtual device having its own contact list, applications, and so on. A virtual “device” can be controlled by an employer or service provider, and is a secure space that provides authenticated applications that are walled off from another virtual device. A host operating system provides a hardware abstraction layer. A proxy server on the host operating system receives an incoming signal from a remote device on the external network, and routes the incoming signal to one of the first and second virtual machines based on a call context. A method and computer program product for providing a plurality of virtual interfaces on a mobile device are also disclosed.

Application-based network security
11245697 · 2022-02-08 · ·

A network device may receive, from an application on a user device, a first network packet associated with a packet flow. The network device may identify an application identifier of the first network packet, wherein the application identifier identifies the application on the user device. The network device may select, based on the application identifier, a security protocol, wherein the security protocol is associated with at least one of an authentication header (AH) or an encryption algorithm. The network device may selectively apply, to a second network packet associated with the packet flow, at least one of the AH or the encryption algorithm, associated with the security protocol, to generate a protected network packet. The network device may transmit the protected network packet.

NETWORK FLOW CONTROL

Aspects of the present disclosure include a content delivery network (CDN) for delivering content associated with a plurality of different types of applications/devices. Using a CDN flow application, a plurality of network flow parameters are generated for content delivery unique to different types of applications or devices. The network flow parameters include customized data transmission rates. The network flow parameters include predetermined settings for transmission control protocol (TCP) connections between the CDN and devices using a TCP flow control mechanism. Upon receiving a content request, the CDN fulfills the content request based upon first network flow parameters. The network flow parameters may be adjusted for each of the plurality of different types of applications/devices. The network flow parameters may be generated based upon requests or based upon the performance of each of the plurality of applications/devices.

Dynamic Application QoS Profile Provisioning

Dynamic application QoS profile provisioning may be provided. First, an access point may send a profile to a client device. The profile may comprise a plurality of application identifiers and a plurality policies corresponding to the plurality of application identifiers. Each of the plurality of application identifiers may respectively correspond to a plurality of applications. Next, the client device may receive the profile. Then the client device may select, from the received profile, a first policy from the plurality policies in the profile. The first policy may correspond to a first application identifier in the plurality of application identifiers. The first application identifier may correspond to a first application within the plurality of applications. The first application may be on the client device. The first application on the client device may then create a network flow from the client device to the access point based on the selected first policy.

SYSTEMS AND METHODS FOR BANDWIDTH MANAGEMENT IN SOFTWARE DEFINED NETWORKING CONTROLLED MULTI-LAYER NETWORKS
20170244606 · 2017-08-24 ·

Bandwidth management systems and methods performed in a Software Defined Networking (SDN) controlled network include, responsive to detecting congestion on one or more network services with identifiable data therein, obtaining policy associated with the congested network services and causing bandwidth on demand in the network to mitigate the congestion if the bandwidth on demand is possible in the network and permitted based on the policies of the congested network services; responsive to the congestion remaining subsequent to the bandwidth on demand or if the bandwidth on demand is not possible or permitted, orchestrating bandwidth for the congested network services based on their associated priority in their policy; and, responsive to the congestion remaining subsequent to the orchestrating bandwidth based on priority, orchestrating bandwidth for the congested network services based on an amount remaining to download for each of the congested network services.