H04L29/08

METHOD AND SYSTEM FOR OPTIMIZING ROAD TRAFFIC CONTROL IN THE PRESENCE OF INCIDENTS
20180005520 · 2018-01-04 ·

A method for adjusting control parameters of a traffic management system in a presence of one or more incidents on a network includes junctions in a tree format, and at a lowest level of a tree comprise a group of associated junctions using coordinated timing, wherein each junction is associated with a weight as a function of its height within its tree, and wherein a junction with a highest weight in each tree comprises a lead junction for receiving timing information for its group of associated junctions.

ABR VIDEO WHITE SPOT COVERAGE SYSTEM AND METHOD

A scheme for managing ABR streaming of content in a wireless radio network environment that may have radio white spot areas. Upon determining that the wireless UE device executing an ABR client application is in a radio white spot area, the current ABR streaming session may be suspended at a particular segment. Thereafter, playback of other content locally cached at the wireless UE device may be commenced in lieu of the ABR media segments. When the wireless UE device exits the radio white spot area, the ABR streaming session may be resumed from a point adjacent to the particular segment where the ABR streaming session was suspended.

Data Caching, Distribution and Request Consolidation in a Local Network
20180007160 · 2018-01-04 ·

A data caching and distribution method, performed by a plurality of computational machines in a linear communication orbit, includes generating a data request by a first machine to request specific data, and passing the data request along a data request path that tracks the linear communication orbit until the request is received at a second machine, in the linear communication orbit, that returns the specific data in response to the data request. The method includes, at a third machine between the second machine and the first machine in the linear communication orbit, conditionally storing the specific data in a local cache of the third machine according to a data caching method.

APPLICATION CUSTOMIZATION USING A CUSTOMIZATION FILE
20180004376 · 2018-01-04 · ·

Techniques and systems for receiving and using a customization file are provided, including a computing device, a method, or a computer-program product. For example, a method may include receiving a customization file that includes customized content for customizing a communication interface overlay. The method may further include accessing native application code and executing the native application code to run a native application. The method may further include accessing a compiled set of code that is separate from the native application code. The compiled set of code is accessible by the native application code. The method may further include executing the compiled set of code, wherein a default file of the compiled set of code provides a native communication interface overlay, wherein the native communication interface overlay is overlaid over a graphical interface of the native application, and wherein the native communication interface overlay allows communication with a resource of a third-party. The method may further include executing the received customization file, wherein executing the received customization file customizes the compiled set of code, and wherein the customized compiled set of code customizes the native communication interface overlay to provide a customized communication interface overlay.

MANAGEMENT OF MULTIPLE DEVICES WITHIN AN ANALYTE MONITORING ENVIRONMENT

Systems, devices, and methods are provided for the management of multiple sensor control devices and/or multiple reader devices in an in vivo analyte monitoring environment, and also for resolving conflicts when merging data collected by different reader devices.

Front End Traffic Handling In Modular Switched Fabric Based Data Storage Systems

Systems, methods, apparatuses, and software for data storage systems are provided herein. In one example, a data storage system is provided that includes storage drives each comprising a PCIe interface, and configured to store data and retrieve the data stored on associated storage media responsive to data transactions received over a switched PCIe fabric. The data storage system includes processors configured to each manage only an associated subset of the storage drives over the switched PCIe fabric. A first processor is configured to identify first data packets received over a network interface associated with the first processor within a network buffer of the first processor as comprising a storage operation associated with at least one of the plurality of storage drives managed by a second processor, and responsively transfer the first data packets into a network buffer of the second processor.

PRIORITY-BASED PROCESSING OF MESSAGES FROM MULTIPLE SERVERS
20180007180 · 2018-01-04 ·

Systems and methods for priority-based processing of messages received from multiple servers. An example method comprises: receiving a plurality of network packets from one or more servers; processing the plurality of network packets to produce a first message associated with a first timestamp and a second message associated with a second timestamp; writing the first message to a first message queue of a plurality of message queues; writing the second message to a second message queue of the plurality of message queues; and retrieving, from the plurality of message queues, the first message and the second message in an order of their respective associated timestamps.

METHODS AND SYSTEMS FOR ANCHORING HYPERTEXT TRANSFER PROTOCOL (HTTP) LEVEL SERVICES IN AN INFORMATION CENTRIC NETWORK (ICN)
20180007116 · 2018-01-04 · ·

Methods and systems anchor hypertext transfer protocol (HTTP) level communication in an information-centric networking (ICN) network. Both content requests and responses to servers within the ICN network and to servers located outside the ICN network, in an IP network for example, are disclosed. Communication may be between two IP capable only devices at the HTTP level, one connected to an ICN network while the other one is connected either to an ICN or IP network. The disclosed namespace 200 enables IP based HTTP communication within the ICN network. An information-centric networking (ICN) network attachment point (NAP) or border gateway (BGW) may receive an HTTP request packet and encapsulate the received HTTP request packet. The ICN NAP/BGW may then forward the HTTP request packet towards the local ICN network servers. The HTTP request packet may be published to a named content identifier (CID) that may be determined through a hash function of a fully qualified domain name (FQDN). The ICN NAP may receive a HTTP response packet for a subscribed information item, which may be included in a named rCID. The named rCID may be determined through a hash function of a uniform resource locator (URL). Instead of using the hash of a URL and an FQDN directly, a separate scope identifier, which may be a root identifier, may be chosen for HTTP-over-ICN communication for the overall ICN namespace. The scope identifier may include a particular structure for the ICN namespace being built up. Using a root identifier may allow for separating HTTP-over-ICN communication from other ICN communication, for example, for operational or migration reasons. Under the root scope identifier, there may be two sub-scope identifiers, a first sub-scope identifier (I) for communication within the ICN network and a second sub-scope identifier (O) for communication to IP addresses outside the ICN network. The ICN may be based on the PURSUIT publish-subscribe architecture or on the Named Data Networking (NDN) project and the like.

USING MULTIPLE CREDENTIALS FOR ACCESS AND TRAFFIC DIFFERENTIATION
20180007057 · 2018-01-04 ·

The disclosure relates in some aspects to establishing connectivity with a network using a first set of credentials and determining whether additional connectivity needs to be established (e.g., using a second set of credentials) to communicate data. The disclosure relates in some aspects to the use of multiple credentials for access and service connectivity. For example, traffic generated by a device may be authorized based on a different set of credentials than the set of credentials used to access the network (e.g., to connect to an LTE network for a PDN connection). In this way, traffic belonging to a specific service or application can be charged and policed based on service specific needs. The disclosure thus relates in some aspects to the use of access credentials and service credentials. These different types of credentials can be used to enable traffic differentiation and policing based on the credentials in use.

Method And Apparatus For Scheduling Broadcasts In Social Networks
20180007151 · 2018-01-04 ·

A method, apparatus, and computer readable medium are provided for maximizing consumption of broadcasts by a producer. An example method includes receiving selection of a total number of time slots to use for scheduling broadcasts, and receiving information regarding the producer's followers. The example method further 5 includes identifying, by a processor and based on the received information, discount factors associated with the producer's followers, and calculating, by the processor and based on the received information, a predicted number of competitor broadcasts during each time slot of the total number of time slots. Finally, the example method includes determining, by the processor and based on the discount factors and the predicted 10 number of competitor broadcasts during each time slot, a number of broadcasts for the producer to transmit in each time slot of the total number of time slots.