Настройки

Укажите год
-

Небесная энциклопедия

Космические корабли и станции, автоматические КА и методы их проектирования, бортовые комплексы управления, системы и средства жизнеобеспечения, особенности технологии производства ракетно-космических систем

Подробнее
-

Мониторинг СМИ

Мониторинг СМИ и социальных сетей. Сканирование интернета, новостных сайтов, специализированных контентных площадок на базе мессенджеров. Гибкие настройки фильтров и первоначальных источников.

Подробнее

Форма поиска

Поддерживает ввод нескольких поисковых фраз (по одной на строку). При поиске обеспечивает поддержку морфологии русского и английского языка
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Укажите год
Укажите год

Применить Всего найдено 174. Отображено 148.
20-12-2012 дата публикации

BUNDLING DATA TRANSFERS AND EMPLOYING TAIL OPTIMIZATION PROTOCOL TO MANAGE CELLULAR RADIO RESOURCE UTILIZATION

Номер: US20120324041A1
Принадлежит: AT&T INTELLECTUAL PROPERTY I, L.P.

Techniques for increasing power and resource efficiency of a mobile device are presented herein. In the mobile device, with regard to periodic or one-time data transfers, a communication management component can analyze information comprising data transfer parameter information, including jitter information, associated with each application of a subset of applications used by the device and can desirably schedule and/or bundle data transfers associated with the applications to reduce the number of separate data bursts to transfer that data to thereby reduce use of wireless resources and power consumption by the device. A push notification system can receive respective jitter information associated with each application from the mobile device, and the push notification system can desirably schedule and/or bundle push notifications to reduce the number of separate data bursts sent to the device to reduce use of wireless resources and power consumption by the device. 1. A method , comprising:identifying a subset of data transfers to be bundled together into a data burst based on data transfer parameters, comprising jitter information, respectively associated with the subset of data transfers, wherein the subset of data transfers is associated with a mobile device; andtransmitting the data burst, comprising the subset of data transfers.2. The method of claim 1 , further comprising:identifying a set of data transfers, wherein the set of data transfers relates to a set of applications and is associated with the mobile device, and wherein the set of data transfers comprises at least as many data transfers as the subset of data transfers;identifying the data transfer parameters respectively associated with the set of data transfers; andanalyzing the data transfer parameters, comprising the jitter information respectively associated with the set of data transfers, to generate analysis results, in accordance with at least one predefined communication criterion.3. The method ...

Подробнее
06-05-2010 дата публикации

METHODS AND APPARATUS TO DYNAMICALLY CONTROL ACCESS FROM VIRTUAL PRIVATE NETWORKS TO NETWORK-BASED SHARED RESOURCES

Номер: US20100115604A1
Принадлежит:

Methods and apparatus to dynamically control access from VPNs to shared resources are disclosed. A disclosed example route reflector comprises a memory to implement a database, a user interface module to receive a request to permit access for a VPN to a shared resource, a BGP engine to process BGP advertisements, a network interface to receive a first BGP advertisement from a PE router associated with the VPN that includes a first RT associated with the VPN, and a shared resource access controller to update the database based on the request, to query the database to determine whether the VPN has access to the shared resource in response to the first BGP advertisement, and to direct the BGP engine to form a second BGP advertisement based on the first BGP advertisement that includes a second RT associated with the shared resource when the VPN has access to the shared resource.

Подробнее
10-10-2013 дата публикации

Method and System for Computing Multicast Traffic Matrices

Номер: US20130266023A1
Принадлежит: AT&T INTELLECTUAL PROPERTY I LP

A system and method for receiving, from one or more ingress routers, a first set of records including data corresponding to network traffic, receiving, from one or more egress routers, a second set of records including data corresponding to network traffic and creating a multicast traffic matrix using at least a portion of the data included in the first and second sets of records.

Подробнее
13-02-2018 дата публикации

Method and apparatus for improving non-uniform memory access

Номер: US0009892030B2

A method, computer readable medium and apparatus for improving non-uniform memory access are disclosed. For example, the method divides a plurality of stream processing jobs into a plurality of groups of stream processing jobs to match a topology of a non-uniform memory access platform. The method sets a parameter in an operating system kernel of the non-uniform memory access platform to favor an allocation of a local memory, and defines a plurality of processor sets. The method binds one of the plurality of groups to one of the plurality of processor sets, and run the one group of stream processing jobs on the one processor set.

Подробнее
10-12-2013 дата публикации

Method and apparatus for performing a demotion in a cellular communications network

Номер: US0008606290B2

A method, computer readable medium and apparatus for performing a demotion in a cellular communications network are disclosed. For example, the method receives a packet indicating that a batching transfer is completed, determines if a background packet was received after receiving the packet indicating that the batching transfer is completed and demotes a state of a state machine implemented by a radio network controller to a lower state if the background packet was not received.

Подробнее
08-12-2016 дата публикации

Hybrid Unicast/Anycast Content Distribution Network System

Номер: US20160359800A1
Принадлежит: AT&T Intellectual Property II, L.P.

A method includes receiving a request for an edge cache address, and comparing a requestor address to an anycast group. The method can further include providing an anycast edge cache address when the requestor address is in the anycast group. Alternatively, the method can further include determining an optimal cache server, and providing a unicast address of the optimal cache server when the requestor address is not in the anycast group.

Подробнее
14-05-2015 дата публикации

INTELLIGENT MOBILITY APPLICATION PROFILING TOOL

Номер: US20150131471A1
Принадлежит:

Analyzing mobile device applications within a wireless data network and other related aspects are presented herein. More particularly, described herein is a novel Intelligent Mobility Application Profiling Tool (iMAP) and/or other mechanisms, systems and methods for profiling and benchmarking applications associated with mobile devices in a wireless data network. Various systems and methods described herein expose cross-layer interaction associated with a network device in order to profile an application on the network device with respect to energy efficiency, performance, and functionality. As described herein, radio resource control (RRC) analysis can be performed to infer RRC states associated with a given application, identify tail time, etc. Further, analyzers are employed for various layers, including transmission control protocol (TCP) and/or hypertext transfer protocol (HTTP), as well as to analyze communication bursts associated with a given application. Analysis results are subsequently utilized to deliver application profiling results to a user. 1. A method , comprising:determining, by a system comprising a processor, a cross-layer interaction associated with network activity data of a network device with respect to a radio resource control state;determining, by the system, a burst corresponding to a period of time between consecutive packets of the network activity data;determining, by the system based on the cross-layer interaction, a source of the burst;determining, by the system, the radio resource control state based on a radio link control buffer characteristic of the network device; anddetermining, by the system based on the radio resource control state, an energy consumption of the burst.2. The method of claim 1 , wherein the determining the burst comprises determining the period of time between the consecutive packets received by the network device.3. The method of claim 1 , further comprising:generating, by the system, information representing ...

Подробнее
06-08-2013 дата публикации

Topology aware content delivery network

Номер: US0008504641B2

A method of assigning a server to a client system includes determining an ingress point of the client system and identifying possible egress points for the client system. The method further includes selecting the server from a plurality of servers to reduce network cost and delivery time.

Подробнее
06-01-2015 дата публикации

Reliability as an interdomain service

Номер: US0008929204B2

A system and techniques are disclosed that increase the redundancy (i.e., physical diversity and bandwidth) available to an IP network, thereby increasing the failure processing capability of IP networks. The techniques include pooling the resources of multiple networks together for mutual backup purposes to improve network reliability and employing methods to efficiently utilize both the intradomain and the interdomain redundancies provided by networks at low cost.

Подробнее
16-06-2011 дата публикации

METHODS AND APPARATUS TO COMMUNICATIVELY COUPLE VIRTUAL PRIVATE NETWORKS TO VIRTUAL MACHINES WITHIN DISTRIBUTIVE COMPUTING NETWORKS

Номер: US20110142053A1
Принадлежит:

Methods and apparatus to communicatively couple virtual private networks to virtual machines within distributive computing networks are disclosed. A disclosed example method includes receiving a request to provision a virtual machine from a virtual private network, determining a host for the virtual machine within a distributive computing network, creating the virtual machine within the host, communicatively coupling the virtual machine to a virtual local area network switch within the distributive computing network, configuring a portion of a router to be communicatively coupled to the virtual machine via the virtual local area network switch by specifying an address space within the router associated with at least one of the virtual machine or the virtual private network communicatively coupled to the router, and communicatively coupling the portion of the router to the virtual private network.

Подробнее
22-01-2019 дата публикации

Hybrid unicast/anycast content distribution network system

Номер: US0010187350B2

A method includes receiving a request for an edge cache address, and comparing a requestor address to an anycast group. The method can further include providing an anycast edge cache address when the requestor address is in the anycast group. Alternatively, the method can further include determining an optimal cache server, and providing a unicast address of the optimal cache server when the requestor address is not in the anycast group.

Подробнее
14-11-2013 дата публикации

Topology Aware Content Delivery Network

Номер: US20130304914A1
Принадлежит:

A method of assigning a server to a client system includes determining an ingress point of the client system and identifying possible egress points for the client system. The method further includes selecting the server from a plurality of servers to reduce network cost and delivery time. 1. A system for assigning a plurality of client systems to a plurality of servers providing content , the system comprising:a memory that stores instructions; identifying an ingress point for a first client system;', 'identifying egress points for the first client system;', 'calculating a network cost associated with assigning the first client system to each of the plurality of servers, wherein the network cost is calculated based on traffic from the ingress point to a server of the plurality of servers and traffic from the server to an egress point of the egress points; and', 'determining an optimal rule set for minimizing a rule set cost, wherein the optimal rule set is based on assigning the first client system to an optimal server of the plurality of servers, wherein a total network cost of the optimal rule set cost is equal to a sum of network costs associated with serving each client system from an assigned server, and wherein a total rule cost of the rule set cost is an impact that an evaluation of the optimal rule set has on a performance of the optimal server., 'a processor that executes the instructions to perform operations, the operations comprising2. The system of claim 1 , wherein the operation of calculating the network cost further comprises calculating the network cost based on network traffic flows and routing tables.3. The system of claim 1 , wherein the operation of identifying the ingress point for the first client system further comprises examining an amount of traffic from the first client system claim 1 , wherein the amount of traffic is associated with an internet protocol address of the first client system.4. The system of claim 1 , wherein the egress ...

Подробнее
05-10-2017 дата публикации

BUNDLING DATA TRANSFERS AND EMPLOYING TAIL OPTIMIZATION PROTOCOL TO MANAGE CELLULAR RADIO RESOURCE UTILIZATION

Номер: US20170290043A1
Принадлежит:

To facilitate increasing power and resource efficiency of a mobile device, in the mobile device, with regard to periodic or one-time data transfers, a communication management component can analyze information comprising data transfer parameter information, including jitter information, associated with each application of a subset of applications used by the device and can desirably schedule and/or bundle data transfers associated with the applications to reduce the number of separate data bursts to transfer that data to thereby reduce use of wireless resources and power consumption by the device. A push notification system can receive respective jitter information associated with each application from the mobile device, and the push notification system can desirably schedule and/or bundle push notifications to reduce the number of separate data bursts sent to the device to reduce use of wireless resources and power consumption by the device. 1. A method , comprising:determining, by a system comprising a processor, whether a first jitter time window associated with a first data transfer of data transfers at least partially overlaps a second jitter time window associated with a second data transfer of the data transfers based on a first result of comparing first jitter information that defines the first jitter time window and second jitter information that defines the second jitter time window, wherein the data transfers are associated with a device; andbased on a second result of the determining whether the first jitter time window at least partially overlaps the second jitter time window, determining, by the system, whether the first data transfer and the second data transfer are to be grouped to form a data burst for transmission in connection with the device.2. The method of claim 1 , further comprising:scheduling, by the system, the transmission of the data burst, based on a third result of determining whether the first data transfer and the second data transfer ...

Подробнее
25-02-2016 дата публикации

Systems and Methods for Optimized Route Caching

Номер: US20160057057A1
Принадлежит:

A method for optimized route caching includes comparing a destination address of a network packet to a first set of prefixes in a routing cache, and comparing the destination address to a second set of prefixes in a full routing table when a longest matching prefix for the destination address is not found in the routing cache. The method further includes copying the longest matching prefix and a set of sub-prefixes of the longest matching prefix from the full routing table to the routing cache, and forwarding the network packet. 1. A system , comprising:a memory that stores instructions; comparing, when a longest matching prefix of a destination address of a network packet is not found in a routing cache, the destination address of the network packet to a first set of prefixes in a full routing table;', 'copying, when the longest matching prefix of the destination address is found in the full routing table and not found in the routing cache, the longest matching prefix to the routing cache;', 'merging a plurality of contiguous sub-prefixes of the longest matching prefix into a super-prefix when the plurality of contiguous sub-prefixes have a same output port, wherein the super-prefix is inserted into the routing cache; and', 'forwarding the network packet., 'a processor that executes the instructions to perform operations, the operations comprising2. The system of claim 1 , wherein the operations further comprise comparing the destination address of the network packet to a second set of prefixes in the routing cache.3. The system of claim 1 , wherein the operations further comprise inserting the super-prefix as a single entry into the routing cache.4. The system of claim 1 , wherein the operations further comprise copying claim 1 , to the routing cache claim 1 , a sub-prefix of the longest matching prefix claim 1 , wherein the sub-prefix is a special-purpose prefix that represents a plurality of sub-prefixes having different output ports.5. The system of claim 1 , ...

Подробнее
06-06-2019 дата публикации

Hybrid Unicast/Anycast Content Distribution Network System

Номер: US20190173835A1
Принадлежит: AT&T INTELLECTUAL PROPERTY II, L.P.

A method includes receiving a request for an edge cache address, and comparing a requestor address to an anycast group. The method can further include providing an anycast edge cache address when the requestor address is in the anycast group. Alternatively, the method can further include determining an optimal cache server, and providing a unicast address of the optimal cache server when the requestor address is not in the anycast group. 1. A system comprising:a memory that stores instructions; and comparing an address of a requestor to an anycast group,', 'wherein when the anycast group is in a stable network, an existing relationship causes requests from the anycast group to enter the network at a same router, and', 'wherein when the anycast group is in an unstable network, the traffic enters the network at multiple provider edge routers., 'a processor that executes the instructions to perform operations, the operations comprising2. The system of claim 1 , wherein the operations further comprise receiving claim 1 , from the requestor claim 1 , a request for an edge cache address of a cache server.3. The system of claim 2 , wherein the operations further comprise providing claim 2 , to the requestor claim 2 , the edge cache address as an anycast address when the address of the requestor is in the anycast group.4. The system of claim 1 , wherein the operations further comprise determining an optimal cache server for the requestor.5. The system of claim 1 , wherein the operations further comprise utilizing the address of the requestor to determine an optimal edge cache router for the requestor.6. The system of claim 1 , wherein the existing relationship relates to regulating how traffic enters a network that includes a cache server.7. The system of claim 1 , wherein the operations further comprise selecting an optimal cache server for the requestor based on a network distance claim 1 , a network cost claim 1 , an available bandwidth claim 1 , an available server ...

Подробнее
27-06-2017 дата публикации

Method and apparatus for detecting tethering in a communications network

Номер: US0009693248B2

A method, non-transitory computer readable medium and apparatus for detecting a tethering function being performed by an endpoint device in a communications network are disclosed. For example, the method analyzes a data packet directed towards the endpoint device, detects a signature based upon analyzing the data packet, and identifies the endpoint device as performing the tethering function based upon detecting the signature.

Подробнее
23-02-2016 дата публикации

System for estimating download speed from passive measurements

Номер: US0009270565B2
Принадлежит: AT&T INTELLECTUAL PROPERTY I, L.P.

A system for passive estimation of throughput in an electronic network is disclosed. The system may include an plurality of mobile devices configured to operate in the network and may further include an electronic data processor. The processor may be configured to access flow records for data flows associated with the mobile devices during a predetermined time interval. Additionally, the processor may be configured to annotate the flow records with an application field and a content provider field. The processor may also be configured to determine a flow type of each data flow based on the application field and the content provider field of the flow records. Furthermore, the processor may be configured to generate a throughput index that only includes non-rate-limited flow types. Moreover, the processor may be configured to estimate maximum throughput for each data flow having non-rate-limited flow types in the throughput index.

Подробнее
08-04-2014 дата публикации

Method and apparatus for correlating end to end measurements through control plane monitoring of wireless traffic

Номер: US0008694627B2

A method, computer readable medium and apparatus for correlating measures of wireless traffic are disclosed. For example, the method obtains the wireless traffic, and processes the wireless traffic by a plurality of probe servers, where each of the plurality of probe servers generates a plurality of feeds, wherein the plurality of feeds comprises a data feed and a control feed. The method correlates the plurality of feeds from the plurality of probe servers by a plurality of aggregator servers, where the data feed and the control feed of each of the plurality of probe servers are correlated with at least one other probe server of the plurality of probe servers to provide a correlated control plane and a correlated data plane, and extracts at least partial path information of a flow from the correlated control plane. The method then correlates performance information from the correlated data plane for the flow.

Подробнее
21-06-2012 дата публикации

METHOD AND APPARATUS FOR APPLYING UNIFORM HASHING TO WIRELESS TRAFFIC

Номер: US20120155379A1
Принадлежит:

A method, computer readable medium and apparatus for hashing wireless traffic are disclosed. For example, the method hashes the wireless traffic uniformly by a plurality of probe servers based on at least one first key to provide a plurality of streams, and hashes at least one output stream of each of the plurality of probe servers uniformly based on at least one second key to provide a plurality of output streams. The method then provides the plurality of output streams to at least one aggregator server.

Подробнее
24-01-2012 дата публикации

Network aware forward caching

Номер: US0008103768B2

An Internet service provider includes a cache server and a network aware server. The network aware server is operable to determine an optimization between a cost of retrieving content from a network and a cost of caching content from the network at the first cache server and then send a content identifier to the cache server. The cache server is operable to receive the content identifier, and determine the source of a content item. If the source is the same as the content identifier, then the cache server caches the content item.

Подробнее
29-09-2016 дата публикации

TAIL OPTIMIZATION PROTOCOL FOR CELLULAR RADIO RESOURCE ALLOCATION

Номер: US20160286415A1
Принадлежит:

Power and resource efficiency of a mobile network device are increased. In one aspect, a tail optimization protocol (TOP) enables cooperation between a mobile device and an associated radio access network to eliminate idle periods (e.g., tails) when possible. Various systems and methods described herein can leverage the ability of applications and/or their associated connections to accurately predict a long tail time, from which a mobile device can notify an associated cellular network on such an imminent tail in order to allow the cellular network to immediately release tail resources. Various other aspects provided herein realize TOP via fast dormancy and/or other similar notification mechanisms, which enable a handset or other device to notify a cellular network for immediate resource release. 1. A system , comprising:a processor; and receiving, from a network device, trace data representing an empirical network trace; and', 'based on the trace data, adjusting parameter data associated with a tail timing criterion that is employable to transition a user equipment from a first communicative state to a second communicative state, wherein first radio resources of a group of radio resources utilized by the user equipment in the first communicative state are greater than second radio resources of the group of radio resources utilized by the user equipment in the second communicative state., 'a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations, comprising2. The system of claim 1 , wherein the operations further comprise:determining connection data representing network connections associated with applications of the user equipment, and wherein the adjusting further comprises adjusting the parameter data based on the connection data.3. The system of claim 1 , wherein the operations further comprise:receiving, from a content provider device, connection data representing network connections associated with ...

Подробнее
09-08-2016 дата публикации

Systems and methods for optimized route caching

Номер: US0009413663B2

A method for optimized route caching includes comparing a destination address of a network packet to a first set of prefixes in a routing cache, and comparing the destination address to a second set of prefixes in a full routing table when a longest matching prefix for the destination address is not found in the routing cache. The method further includes copying the longest matching prefix and a set of sub-prefixes of the longest matching prefix from the full routing table to the routing cache, and forwarding the network packet.

Подробнее
08-12-2015 дата публикации

Systems and methods for optimized route caching

Номер: US0009210084B2

A method for optimized route caching includes comparing a destination address of a network packet to a first set of prefixes in a routing cache, and comparing the destination address to a second set of prefixes in a full routing table when a longest matching prefix for the destination address is not found in the routing cache. The method further includes copying the longest matching prefix and a set of sub-prefixes of the longest matching prefix from the full routing table to the routing cache, and forwarding the network packet.

Подробнее
05-11-2013 дата публикации

TCP flow clock extraction

Номер: US0008576968B2

A packet trace is received. The packet trace is transformed into a sequence of pulse signals in a temporal domain. The sequence of pulse signals in the temporal domain is transformed into a sequence of pulse signals in a frequency domain. Peaks are detected within relevant frequency bands in the sequence of pulse signals in the frequency domain. A fundamental frequency is identified within the peaks. The fundamental frequency, which represents the TCP flow clock, is returned.

Подробнее
03-12-2009 дата публикации

SCALABLE MULTIPROTOCOL LABEL SWITCHING BASED VIRTUAL PRIVATE NETWORKS AND METHODS TO IMPLEMENT THE SAME

Номер: US20090296714A1
Принадлежит:

Example scalable multi-protocol label switching (MPLS) based virtual private networks (VPNs) and methods to implement the same are disclosed. A disclosed example spoke provider edge (PE) router for an MPLS-based VPN includes a truncated virtual routing and forwarding (VRF) table containing a first value referencing a hub PE router and a second value referencing a first customer edge (CE) router coupled to the VPN via the PE router, and a forwarding module to forward a packet received from the first CE router to the hub PE router when the packet contains an address referencing a second CE router coupled to the VPN via a second spoke PE router.

Подробнее
27-09-2018 дата публикации

CONTROLLING TRAFFIC TRANSMISSIONS TO MANAGE CELLULAR RADIO RESOURCE UTILIZATION

Номер: US20180279314A1
Принадлежит:

Techniques control traffic transmissions to manage radio resource utilization. When content is being streamed to user equipment (UE) and is at least initially intended to be streamed in real time at a constant bitrate, a communication management component can determine whether the content being transmitted to the UE can be delayed, instead of being transmitted in real time. In response to determining that the content can be delayed, the communication management component can facilitate buffering data and periodically streaming the data to the UE in data bursts to reduce use of UE power and radio resources. When transmitting a visual image to a UE, the communication management component can adjust resolution of a visual image to correspond to screen dimensions of the UE based on information indicating screen dimensions of the UE that can be received from the UE.

Подробнее
07-06-2011 дата публикации

System and method for sampling network traffic

Номер: US0007957315B2

Disclosed herein are systems, computer-implemented methods, and computer-readable media for sampling network traffic. The method includes receiving a plurality of flow records, calculating a hash for each flow record based on one or more invariant part of a respective flow, generating a quasi-random number from the calculated hash for each respective flow record, and sampling flow records having a quasi-random number below a probability P. Invariant parts of flow records include destination IP address, source IP address, TCP/UDP port numbers, TCP flags, and network protocol. A plurality of routers can uniformly calculate hashes for flow records. Each router in a plurality of routers can generate a same quasi-random number for each respective flow record and uses different values for probability P. The probability P can depend on a flow size. The method can divide the quasi-random number by a maximum possible hash value.

Подробнее
14-02-2013 дата публикации

Network Aware Forward Caching

Номер: US20130042009A1
Принадлежит: AT&T INTELLECTUAL PROPERTY I, L.P.

A network includes a cache server and a network aware server that operates to determine an optimization between a cost of retrieving content from a communication network and a cost of caching content at the cache server. The optimization is determined as a minimum of a sum of a transit cost, a backbone cost, and a caching cost. The transit cost includes a money cost per data unit. The backbone cost includes a money cost per data unit and time unit. The caching cost includes a money cost per server unit. In response to determining the optimization, the network aware server sends a content identifier to the cache server, and the cache server receives the content identifier, determines a source of a content item, and if the source is the same as the content identifier, then cache the content item. 2. The network of claim 1 , further comprising a second cache server claim 1 , and wherein:in further response to determining the optimization, the network aware server is operable to send a second content identifier to the second cache server; and receive the second content identifier:', 'determine a second source of a second content item; and', 'if the second source is the same as the second content identifier, then cache the second content item., 'the second cache server is operable to3. The network of claim 1 , wherein the transit cost of retrieving content from the communication network includes:an external transit cost that is associated with transporting content from the communication network to the network; andan internal transit cost that is associated with transporting the content item from an ingress point of presence to an egress point of presence.4. The network of claim 3 , wherein the caching cost is constrained by a maximum cache budget for the network.5. The network of claim 1 , wherein finding the minimum sum includes applying a pseudo-polynomial-time dynamic programming algorithm.6. The network of claim 1 , wherein finding the minimum sum includes:applying a ...

Подробнее
23-09-2014 дата публикации

Method and system for computing multicast traffic matrices

Номер: US0008842596B2

A system and method for receiving, from one or more ingress routers, a first set of records including data corresponding to network traffic, receiving, from one or more egress routers, a second set of records including data corresponding to network traffic and creating a multicast traffic matrix using at least a portion of the data included in the first and second sets of records.

Подробнее
28-04-2011 дата публикации

Inferring TCP Initial Congestion Window

Номер: US20110096662A1
Принадлежит:

A packet trace is received. Inter-arrival times between the multiple packets in the packet trace are determined. An inter-arrival time in the inter-arrival times that is greater than a threshold is identified. An order number of the inter-arrival time is identified. A determination is made as to whether a size of each of at least a portion of the multiple packets is equal to a maximum segment size. When a determination is made that the size of each of at least a portion of the multiple packets is equal to the maximum segment size a size of the ICW as a product of the order number and the maximum segment size is returned.

Подробнее
27-09-2012 дата публикации

Interdomain Network Aware Peer-to-Peer Protocol

Номер: US20120246308A1
Принадлежит: AT&T INTELLECTUAL PROPERTY I, L.P.

A method includes receiving network distance information, receiving a request from a client for an identity of a peer providing content, and identifying a first peer and a second peer providing the content. The network distance information includes a compilation of network distance information provided by a plurality of service providers. The method further includes determining that a network distance between the first peer and the client is less than a network distance between the second peer and the client based on the network distance information, and providing the identity of the first peer to the client.

Подробнее
24-06-2010 дата публикации

SYSTEM AND METHOD FOR SAMPLING NETWORK TRAFFIC

Номер: US20100161791A1
Принадлежит: AT&T Intellectual Property I.L.P.

Disclosed herein are systems, computer-implemented methods, and computer-readable media for sampling network traffic. The method includes receiving a plurality of flow records, calculating a hash for each flow record based on one or more invariant part of a respective flow, generating a quasi-random number from the calculated hash for each respective flow record, and sampling flow records having a quasi-random number below a probability P. Invariant parts of flow records include destination IP address, source IP address, TCP/UDP port numbers, TCP flags, and network protocol. A plurality of routers can uniformly calculate hashes for flow records. Each router in a plurality of routers can generate a same quasi-random number for each respective flow record and uses different values for probability P. The probability P can depend on a flow size. The method can divide the quasi-random number by a maximum possible hash value.

Подробнее
06-06-2017 дата публикации

Method and apparatus for managing a degree of parallelism of streams

Номер: US0009674728B2

A method, computer readable medium and apparatus for managing a degree of parallelism of streams are disclosed. For example, the method analyzes wireless traffic to determine a profile of the wireless traffic, determines an amount of available processing resources, and manages the degree of parallelism of streams based on the profile and the amount of available processing resources in a probe server.

Подробнее
07-11-2013 дата публикации

Network Based Audience Measurement

Номер: US20130298241A1
Принадлежит: AT&T INTELLECTUAL PROPERTY I LP

Methods, systems, and computer-readable media for providing network-based audience measurement are provided. Data packets are intercepted between a client computer and a content server. Unique subscribers and content names are identified based on the data packets. One or more audience measurement metrics are computed based on the unique subscribers and the content names.

Подробнее
16-06-2011 дата публикации

Network Based Audience Measurement

Номер: US20110145211A1
Принадлежит:

Methods, systems, and computer-readable media for providing network-based audience measurement are provided. Data packets are intercepted between a client computer and a content server. Unique subscribers and content names are identified based on the data packets. One or more audience measurement metrics are computed based on the unique subscribers and the content names.

Подробнее
25-10-2016 дата публикации

Methods, devices, and computer program products for providing a computing application rating

Номер: US0009477283B2

A rating is provided for a computing application. Traffic data, power data, and/or network signaling load data is collected for a computing application and compared with other similar data. A rating for the computing application is provided based on the comparison.

Подробнее
28-08-2018 дата публикации

Controlling traffic transmissions to manage cellular radio resource utilization

Номер: US0010064195B2

Techniques control traffic transmissions to manage radio resource utilization. When content is being streamed to user equipment (UE) and is at least initially intended to be streamed in real time at a constant bitrate, a communication management component can determine whether the content being transmitted to the UE can be delayed, instead of being transmitted in real time. In response to determining that the content can be delayed, the communication management component can facilitate buffering data and periodically streaming the data to the UE in data bursts to reduce use of UE power and radio resources. When transmitting a visual image to a UE, the communication management component can adjust resolution of a visual image to correspond to screen dimensions of the UE based on information indicating screen dimensions of the UE that can be received from the UE.

Подробнее
10-06-2014 дата публикации

Method and apparatus for applying uniform hashing to wireless traffic

Номер: US0008750146B2

A method, computer readable medium and apparatus for hashing wireless traffic are disclosed. For example, the method hashes the wireless traffic uniformly by a plurality of probe servers based on at least one first key to provide a plurality of streams, and hashes at least one output stream of each of the plurality of probe servers uniformly based on at least one second key to provide a plurality of output streams. The method then provides the plurality of output streams to at least one aggregator server.

Подробнее
05-11-2013 дата публикации

Method and apparatus for content aware optimized tunneling in a mobility environment

Номер: US0008578447B2

A method, computer readable medium and apparatus for performing content aware optimized tunneling in a communication network are disclosed. For example, the method authenticates a user endpoint device, establishes a tunnel to the user endpoint device if the user endpoint device is authenticated, analyzes content of a data packet transmitted through the tunnel to determine if the tunnel should be re-directed, and re-directs the tunnel to a gateway general packet radio services support node light based upon the content of the data packet.

Подробнее
29-10-2013 дата публикации

Method and apparatus for inferring state transitions in a wireless communications network

Номер: US0008570926B2

A method, a computer readable medium and an apparatus for inferring state transitions in a wireless communications network are disclosed. In one embodiment, the method infers a state promotion procedure. In another embodiment, the method infers a state demotion procedure.

Подробнее
13-01-2015 дата публикации

Method and apparatus for automated end to end content tracking in peer to peer environments

Номер: US0008935240B2

A method, computer readable medium and system for automatically tracking content in a peer-to-peer environment are disclosed. For example, the method monitors a number of times each content title of a plurality of content titles are downloaded in the peer-to-peer environment, adds one or more content titles of the plurality of content titles that are downloaded above a predetermined threshold to a list, downloads each one of the one or more content titles in the list via the peer-to-peer environment and verifies that each one of the one or more content titles that are downloaded matches at least one content title in the list.

Подробнее
24-03-2011 дата публикации

Network Aware Application Management

Номер: US20110072127A1
Принадлежит: AT&T Intellectual Property I, L.P.

A method of managing a network application includes identifying a network path for the network application, obtaining network performance measurements along the network path, obtaining application performance information for the network application, and extracting infrastructure specific information for the infrastructure supporting the network application. The method further includes correlating the application performance information, network performance measurements, and the infrastructure specific information to identify a performance issue affecting the network application, and modifying the application behavior, the network behavior, or any combination thereof in response to the performance issue.

Подробнее
03-09-2013 дата публикации

Intelligent mobility application profiling with respect to identified communication bursts

Номер: US0008527627B2

Systems and methods for analyzing mobile device applications within a wireless data network are presented herein. More particularly, described herein is a novel Intelligent Mobility Application Profiling Tool (iMAP) and/or other mechanisms, systems and methods for profiling and benchmarking applications associated with mobile devices in a wireless data network. Various systems and methods described herein expose cross-layer interaction associated with a network device in order to profile an application on the network device with respect to energy efficiency, performance, and functionality. As described herein, radio resource control (RRC) analysis can be performed to infer RRC states associated with a given application, identify tail time, etc. Further, analyzers are employed for various layers, including transmission control protocol (TCP) and/or hypertext transfer protocol (HTTP), as well as to analyze communication bursts associated with a given application. Analysis results are subsequently ...

Подробнее
14-06-2012 дата публикации

SYSTEM FOR ESTIMATING DOWNLOAD SPEED FROM PASSIVE MEASUREMENTS

Номер: US20120147758A1
Принадлежит: AT &T Intellectual Property I, L.P.

A system for passive estimation of throughput in an electronic network is disclosed. The system may include an plurality of mobile devices configured to operate in the network and may further include an electronic data processor. The processor may be configured to access flow records for data flows associated with the mobile devices during a predetermined time interval. Additionally, the processor may be configured to annotate the flow records with an application field and a content provider field. The processor may also be configured to determine a flow type of each data flow based on the application field and the content provider field of the flow records. Furthermore, the processor may be configured to generate a throughput index that only includes non-rate-limited flow types. Moreover, the processor may be configured to estimate maximum throughput for each data flow having non-rate-limited flow types in the throughput index. 1. A method for passive estimation of throughput in an electronic network , the method comprising:collecting a flow record for each data flow of a plurality of data flows during a predetermined time interval, wherein the plurality of data flows are associated with computing devices in the network;annotating the flow record for each data flow to include an application field and a content provider field, wherein the application field indicates an application protocol and the content provider field indicates a content provider with which each data flow is in communication;determining a flow type for each data flow based on the application field and the content provider field of the flow record, wherein the flow type comprises one of a rate-capped flow type, a partially rate-limited flow type, and a non-rate-limited flow type;generating a throughput index, wherein the throughput index comprises the flow type of each data flow if the flow type is determined to be the non-rate-limited flow type;selecting each data flow having the flow type in the ...

Подробнее
28-05-2013 дата публикации

Passive and comprehensive hierarchical anomaly detection system and method

Номер: US0008452871B2

A technique for monitoring performance in a network uses passively monitored traffic data at the server access routers. The technique aggregates performance metrics into clusters according to a spatial hierarchy in the network, and then aggregates performance metrics within spatial clusters to form time series of temporal bins. Representative values from the temporal bins are then analyzed using an enhanced Holt-Winters exponential smoothing algorithm.

Подробнее
19-05-2015 дата публикации

Prioritizing malicious website detection

Номер: US0009038181B2

A computer implemented method includes identifying a universal resource locator and characterizing a traffic pattern associated with the universal resource locator. The traffic pattern can include referrer information, referring information, advertising network relationship information, and any combination thereof. The method can further include classifying the universal resource locator into a risk category based on the traffic pattern.

Подробнее
20-06-2013 дата публикации

METHOD AND APPARATUS FOR DETECTING TETHERING IN A COMMUNICATIONS NETWORK

Номер: US20130159503A1
Принадлежит:

A method, non-transitory computer readable medium and apparatus for detecting a tethering function being performed by an endpoint device in a communications network are disclosed. For example, the method analyzes a data packet directed towards the endpoint device, detects a signature based upon analyzing the data packet, and identifies the endpoint device as performing the tethering function based upon detecting the signature. 1. A method for detecting a tethering function being performed by an endpoint device in a communications network , comprising:analyzing a data packet directed towards the endpoint device;detecting a signature based upon analyzing the data packet; andidentifying the endpoint device as performing the tethering function based upon detecting the signature.2. The method of claim 1 , wherein the analyzing comprises examining a header of the data packet.3. The method of claim 1 , wherein the analyzing comprises examining the data packet for an announcement identifying an operating system that the data packet is intended for.4. The method of claim 1 , wherein the analyzing comprises examining a source port and a destination port of the data packet.5. The method of claim 1 , wherein the detecting the signature comprises:identifying the data packet as being not compatible with the endpoint device.6. The method of claim 1 , wherein the endpoint device is identified as performing the tethering function if a predetermined number of tethering instances is detected within a predetermined period of time.7. The method of claim 1 , wherein the endpoint device is a wireless endpoint device associated with a subscription to a service provided by a network service provider of the communications network.8. The method of claim 1 , further comprising:if the endpoint device is identified as performing the tethering function, then determine if the endpoint device is an authorized tethering endpoint device; andif the endpoint device is not an authorized tethering ...

Подробнее
10-07-2012 дата публикации

Interdomain network aware peer-to-peer protocol

Номер: US0008219706B2

A method includes receiving network distance information, receiving a request from a client for an identity of a peer providing content, and identifying a first peer and a second peer providing the content. The network distance information includes a compilation of network distance information provided by a plurality of service providers. The method further includes determining that a network distance between the first peer and the client is less than a network distance between the second peer and the client based on the network distance information, and providing the identity of the first peer to the client.

Подробнее
11-03-2014 дата публикации

Methods and apparatus to implement scalable routing in network communication systems

Номер: US0008670351B2

An example method involves for a first virtual private network (VPN) installed on a candidate hub router, selecting a first spoke-to-hub assignment solution having a first least memory utilization cost to assign the candidate hub router a quantity of first virtual private edge (VPE) routers serving the first VPN; for a second VPN installed on the candidate hub router, selecting a second spoke-to-hub assignment solution having a second least memory utilization cost to assign the candidate hub router a quantity of second VPE routers serving the second VPN; determining third least memory utilization costs to assign the candidate hub router to a quantity of the first VPE routers, and fourth least memory utilization costs to assign the candidate hub router to a quantity of the second VPE routers; and selecting the first or second spoke-to-hub assignment solution for the candidate hub router based on the least memory utilization costs.

Подробнее
10-09-2020 дата публикации

Hybrid Unicast/Anycast Content Distribution Network

Номер: US20200287866A1
Принадлежит: AT&T INTELLECTUAL PROPERTY II, L.P.

A method includes receiving a request for an edge cache address, and comparing a requestor address to an anycast group. The method can further include providing an anycast edge cache address when the requestor address is in the anycast group. Alternatively, the method can further include determining an optimal cache server, and providing a unicast address of the optimal cache server when the requestor address is not in the anycast group.

Подробнее
25-09-2012 дата публикации

Inferring TCP initial congestion window

Номер: US0008274886B2

A packet trace is received. Inter-arrival times between the multiple packets in the packet trace are determined. An inter-arrival time in the inter-arrival times that is greater than a threshold is identified. An order number of the inter-arrival time is identified. A determination is made as to whether a size of each of at least a portion of the multiple packets is equal to a maximum segment size. When a determination is made that the size of each of at least a portion of the multiple packets is equal to the maximum segment size, a size of the ICW as a product of the order number and the maximum segment size is returned.

Подробнее
24-08-2006 дата публикации

Monitoring for replica placement and request distribution

Номер: US20060190602A1
Принадлежит: AT&T Corp.

A platform that may be used to dynamically reallocation resources to support an Internet application is disclosed. In an embodiment, the platform may include two layers of distribution, one at the DNS layer and one at an Internet data center layer. The platform may include a dynamic resource allocation manager that causes instances of applications to be initiated in Internet data centers in response to dynamic conditions and characteristics of the application. A monitoring system module may be provided to keep the dynamic resource allocation manager informed as the health and utilization of instances of the application.

Подробнее
23-02-2016 дата публикации

Method and apparatus for applying uniform hashing to wireless traffic

Номер: US0009270561B2
Принадлежит: AT&T Intellectual Property I, L.P.

A method, computer readable medium and apparatus for hashing wireless traffic are disclosed. For example, the method hashes the wireless traffic uniformly by a plurality of probe servers based on at least one first key to provide a plurality of streams, and hashes at least one output stream of each of the plurality of probe servers uniformly based on at least one second key to provide a plurality of output streams. The method then provides the plurality of output streams to at least one aggregator server.

Подробнее
17-05-2011 дата публикации

Method and apparatus for inferring the presence of static internet protocol address allocations

Номер: US0007945667B2

A method and apparatus for inferring if an IP address allocation in a remote network is static or dynamic are disclosed. For example, the method contacts at least one remote peer to peer endpoint using a peer to peer application to obtain an IP address of the at least one remote peer to peer endpoint. The method then analyzes characteristics of the at least one remote peer to peer endpoint over a predefined period of time to infer whether the presence of static IP address allocation exists for the at least one remote peer to peer endpoint.

Подробнее
11-05-2017 дата публикации

Systems and Methods for Optimized Route Caching

Номер: US20170134279A1
Принадлежит: AT&T INTELLECTUAL PROPERTY I, L.P.

A method for optimized route caching includes comparing a destination address of a network packet to a first set of prefixes in a routing cache, and comparing the destination address to a second set of prefixes in a full routing table when a longest matching prefix for the destination address is not found in the routing cache. The method further includes copying the longest matching prefix and a set of sub-prefixes of the longest matching prefix from the full routing table to the routing cache, and forwarding the network packet. 1. A system , comprising:a memory that stores instructions; merging a plurality of contiguous sub-prefixes of a longest matching prefix of a network packet into a super-prefix when the plurality of contiguous sub-prefixes have a same output port; and', 'forwarding the network packet., 'a processor that executes the instructions to perform operations, the operations comprising2. The system of claim 1 , wherein the operations further comprise inserting the super-prefix into a routing cache.3. The system of claim 1 , wherein the operations further comprise copying claim 1 , when the longest matching prefix is found in a full routing table and not found in a routing cache claim 1 , the longest matching prefix to the routing cache.4. The system of claim 1 , wherein the operations further comprise receiving the network packet.5. The system of claim 1 , wherein the operations further comprise forwarding the network packet to an intermediary when the longest matching prefix is not found in a routing cache.6. The system of claim 1 , wherein the operations further comprise comparing a destination address of the network packet to a set of prefixes in a full routing table.7. The system of claim 1 , wherein the operations further comprise updating a routing cache when the longest matching prefix is found in the routing cache.8. The system of claim 1 , wherein the operations further comprise evicting claim 1 , when a routing cache is full claim 1 , a ...

Подробнее
24-02-2015 дата публикации

Method and apparatus for detecting tethering in a communications network

Номер: US0008966078B2

A method, non-transitory computer readable medium and apparatus for detecting a tethering function being performed by an endpoint device in a communications network are disclosed. For example, the method analyzes a data packet directed towards the endpoint device, detects a signature based upon analyzing the data packet, and identifies the endpoint device as performing the tethering function based upon detecting the signature.

Подробнее
02-04-2015 дата публикации

Systems and Methods for Optimized Route Caching

Номер: US20150092781A1
Принадлежит:

A method for optimized route caching includes comparing a destination address of a network packet to a first set of prefixes in a routing cache, and comparing the destination address to a second set of prefixes in a full routing table when a longest matching prefix for the destination address is not found in the routing cache. The method further includes copying the longest matching prefix and a set of sub-prefixes of the longest matching prefix from the full routing table to the routing cache, and forwarding the network packet. 1. A system , comprising:a memory that stores instructions;a processor that executes the instructions to perform operations, the operations comprising:comparing, when a longest matching prefix of a destination address of a network packet is not found in a routing cache, the destination address of the network packet to a first set of prefixes in a full routing table;copying, when the longest matching prefix of the destination address is found in the full routing table and not found in the routing cache, the longest matching prefix from the full routing table to the routing cache;copying, from the full routing table to the routing cache, a sub-prefix of the longest matching prefix, wherein the sub-prefix is a special-purpose prefix that represents a plurality of sub-prefixes having different output ports; andforwarding the network packet based on a preferred route obtained based on the sub-prefix.2. The system of claim 1 , wherein the operations further comprise comparing the destination address of the network packet to a second set of prefixes in the routing cache.3. The system of claim 1 , wherein the operations further comprise performing a look-up on the full routing table based on the sub-prefix.4. The system of claim 1 , wherein the operations further comprise copying the preferred route to the routing cache.5. The system of claim 1 , wherein the operations further comprise placing the network packet in a queue when the longest matching ...

Подробнее
14-12-2010 дата публикации

Sampling and analyzing packets in a network

Номер: US0007852785B2

The preferred embodiments of the present invention can include sampling packets transmitted over a network based on the content of the packets. If a packet is sampled, the sampling unit can add one or more fields to the sampled packet that can include a field for a number of bytes contained in the packet, a packet count, a flow count, a sampling type, and the like. The sampled packets can be analyzed to discern desired information from the packets. The additional fields that are added to the sampled packets can be used during the analysis.

Подробнее
07-11-2013 дата публикации

Prioritizing Malicious Website Detection

Номер: US20130298240A1
Принадлежит:

A computer implemented method includes identifying a universal resource locator and characterizing a traffic pattern associated with the universal resource locator. The traffic pattern can include referrer information, referring information, advertising network relationship information, and any combination thereof. The method can further include classifying the universal resource locator into a risk category based on the traffic pattern. 1. A system for prioritizing malicious website detection , the system comprising:a memory that stores instructions; characterizing a traffic pattern associated with a destination universal resource locator as indicative of malicious content, wherein the traffic pattern is characterized based on popularity information of a referring universal resource locator that referred the destination universal resource locator, wherein the popularity information includes an indication that the referring universal resource locator is indexed by a search engine;', 'classifying the destination universal resource locator into a risk category based on characterizing the traffic pattern;', 'prioritizing the destination universal resource locator for malicious content analysis based on classifying the destination universal resource locator into the risk category; and', 'determining if content associated with the destination universal resource locator is malicious., 'a processor that executes the instructions to perform operations, the operations comprising2. The system of claim 1 , wherein the operations further comprise identifying the destination universal resource locator.3. The system of claim 1 , wherein the operations further comprise identifying the referring universal resource locator that referred that destination universal resource locator.4. The system of claim 1 , wherein prioritizing the destination universal resource locator further comprises prioritizing the destination universal resource locator with respect to a plurality of ...

Подробнее
15-08-2019 дата публикации

BUNDLING DATA TRANSFERS AND EMPLOYING TAIL OPTIMIZATION PROTOCOL TO MANAGE CELLULAR RADIO RESOURCE UTILIZATION

Номер: US20190254048A1
Принадлежит:

To facilitate increasing power and resource efficiency of a mobile device, in the mobile device, with regard to periodic or one-time data transfers, a communication management component can analyze information comprising data transfer parameter information, including jitter information, associated with each application of a subset of applications used by the device and can desirably schedule and/or bundle data transfers associated with the applications to reduce the number of separate data bursts to transfer that data to thereby reduce use of wireless resources and power consumption by the device. A push notification system can receive respective jitter information associated with each application from the mobile device, and the push notification system can desirably schedule and/or bundle push notifications to reduce the number of separate data bursts sent to the device to reduce use of wireless resources and power consumption by the device. 1. A method , comprising:determining, by a system comprising a processor, whether a first jitter time window associated with a first data transfer at least partially overlaps a second jitter time window associated with a second data transfer based on first jitter information associated with the first jitter time window and second jitter information associated with the second jitter time window; andbased on a result of the determining whether the first jitter time window at least partially overlaps the second jitter time window, determining, by the system, whether the first data transfer and the second data transfer are to be grouped to form a data burst for transmission in connection with a device.2. The method of claim 1 , wherein the result is a first result claim 1 , and wherein the method further comprises:comparing, by the system, the first jitter information to the second jitter information, wherein the first jitter information defines the first jitter time window, wherein the second jitter information defines the second ...

Подробнее
14-10-2010 дата публикации

Network Aware Forward Caching

Номер: US20100262683A1
Принадлежит: AT&T CORP.

An Internet service provider includes a cache server and a network aware server. The network aware server is operable to determine an optimization between a cost of retrieving content from a network and a cost of caching content from the network at the first cache server and then send a content identifier to the cache server. The cache server is operable to receive the content identifier, and determine the source of a content item. If the source is the same as the content identifier, then the cache server caches the content item.

Подробнее
14-08-2014 дата публикации

TAIL OPTIMIZATION PROTOCOL FOR CELLULAR RADIO RESOURCE ALLOCATION

Номер: US20140228040A1
Принадлежит: AT&T Intellectual Property I, L.P.

Power and resource efficiency of a mobile network device are increased. In one aspect, a Tail Optimization Protocol (TOP) enables cooperation between a mobile device and an associated radio access network to eliminate idle periods (e.g., tails) when possible. Various systems and methods described herein can leverage the ability of applications and/or their associated connections to accurately predict a long tail time, from which a mobile device can notify an associated cellular network on such an imminent tail in order to allow the cellular network to immediately release tail resources. Various other aspects provided herein realize TOP via fast dormancy and/or other similar notification mechanisms, which enable a handset or other device to notify a cellular network for immediate resource release. 1. (canceled)2. A method , comprising:determining, by a system comprising a processor, a time period of a network inactivity timer that is employable to transition a user equipment from a first communicative state to a second communicative state, wherein a first set of radio resources utilized by the user equipment in the first communicative state is greater than a second set of the radio resources utilized by the user equipment in the second communicative state; andbased on the time period, customizing, by the system, a tail timing criterion that is employable to transition the user equipment from the first communicative state to a third communicative state, wherein a third set of radio resources utilized by the user equipment in the third communicative state is less than the second set of the radio resources utilized by the user equipment in the second communicative state.3. The method of claim 2 , further comprising:in response to determining that the tail timing criterion has been satisfied, facilitating, by the system, the transition of the user equipment from the first communicative state to the third communicative state.4. The method of claim 3 , wherein the ...

Подробнее
22-11-2011 дата публикации

System and method for spatially consistent sampling of flow records at constrained, content-dependent rates

Номер: US0008064359B2

Disclosed herein are systems, computer-implemented methods, and computer-readable media for sampling network traffic. The method includes receiving a desired quantity of flow record to sample, receiving a plurality of network flow record each summarizing a network flow of packets, calculating a hash for each flow record of based on one or more invariant part of a respective flow, generating a quasi-random number from the calculated hash for each respective flow record, generating a priority from the calculated hash for each respective flow record, and sampling exactly the desired quantity of flow records, selecting flow records having a highest priority first. In one aspect, the method further partitions the plurality of flow records into groups based on flow origin and destination, generates an individual priority for each partitioned group, and separately samples exactly the desired quantity of flow records from each partitioned group, selecting flows having a highest individual priority ...

Подробнее
22-12-2015 дата публикации

Bundling data transfers and employing tail optimization protocol to manage cellular radio resource utilization

Номер: US0009220066B2

Techniques for increasing power and resource efficiency of a mobile device are presented herein. In the mobile device, with regard to periodic or one-time data transfers, a communication management component can analyze information comprising data transfer parameter information, including jitter information, associated with each application of a subset of applications used by the device and can desirably schedule and/or bundle data transfers associated with the applications to reduce the number of separate data bursts to transfer that data to thereby reduce use of wireless resources and power consumption by the device. A push notification system can receive respective jitter information associated with each application from the mobile device, and the push notification system can desirably schedule and/or bundle push notifications to reduce the number of separate data bursts sent to the device to reduce use of wireless resources and power consumption by the device.

Подробнее
16-05-2017 дата публикации

Method and apparatus for improving non-uniform memory access

Номер: US0009652372B2

A method, computer readable medium and apparatus for improving non-uniform memory access are disclosed. For example, the method divides a plurality of stream processing jobs into a plurality of groups of stream processing jobs to match a topology of a non-uniform memory access platform. The method sets a parameter in an operating system kernel of the non-uniform memory access platform to favor an allocation of a local memory, and defines a plurality of processor sets. The method binds one of the plurality of groups to one of the plurality of processor sets, and runs the one group of stream processing jobs on the one processor set.

Подробнее
01-03-2012 дата публикации

TAIL OPTIMIZATION PROTOCOL FOR CELLULAR RADIO RESOURCE ALLOCATION

Номер: US20120052814A1
Принадлежит: AT&T INTELLECTUAL PROPERTY I, L.P.

Systems and methods for increasing the power and resource efficiency of a mobile network device are presented herein. More particularly, described herein is a novel Tail Optimization Protocol (TOP) and/or other mechanisms, systems and methods for enabling cooperation between a mobile device and an associated radio access network to eliminate idle periods (e.g., tails) when possible. Various systems and methods described herein can leverage the ability of applications and/or their associated connections to accurately predict a long tail time, from which a mobile device can notify an associated cellular network on such an imminent tail in order to allow the cellular network to immediately release tail resources. Various other aspects provided herein realize TOP via fast dormancy and/or other similar notification mechanisms, which enable a handset or other device to notify a cellular network for immediate resource release. 1. A method , comprising: identifying at least one connection utilized for communication within a communication system;', 'obtaining information relating to respective predicted data transfer times associated with the at least one connection;', 'calculating an estimated inter-transfer time based on the respective predicted data transfer times; and', 'determining whether to trigger a transition to an idle communicative state independently of timing requirements associated with the transition to the idle communicative state at least in part by comparing the estimated inter-transfer time to a tail threshold., 'utilizing at least one processor to execute acts comprising2. The method of claim 1 , wherein the determining comprises triggering the transition to the idle communicative state if the estimated inter-transfer time is substantially greater than the tail threshold.3. The method of claim 1 , wherein:the identifying comprises identifying a plurality of connections utilized for communication within the communication system; and identifying a current ...

Подробнее
10-12-2019 дата публикации

Method and apparatus for detecting tethering in a communications network

Номер: US0010506440B2

A method, non-transitory computer readable medium and apparatus for detecting a tethering function being performed by an endpoint device in a communications network are disclosed. For example, the method analyzes a data packet directed towards the endpoint device, detects a signature based upon analyzing the data packet, and identifies the endpoint device as performing the tethering function based upon detecting the signature.

Подробнее
30-07-2015 дата публикации

Methods, Devices, and Computer Program Products for Providing a Computing Application Rating

Номер: US20150212563A1
Принадлежит: AT&T INTELLECTUAL PROPERTY I, L.P.

A rating is provided for a computing application. Traffic data, power data, and/or network signaling load data is collected for a computing application and compared with other similar data. A rating for the computing application is provided based on the comparison. 1. A method , comprising:obtaining, by a system comprising a processor, power consumption data associated with a device executing an application, the power consumption data predictive of a power requirement for executing the application on the device;performing, by the system, a comparison between the power consumption data and other power consumption data; andproviding, by the system, a rating for the application based on the comparison.2. The method of claim 1 , wherein the power consumption data is estimated based on a simulated state of the device.3. The method of claim 1 , wherein the obtaining comprises receiving one of data representative of traffic volume generated per session of usage of the application claim 1 , data representative of session duration claim 1 , and data representative of session frequency.4. The method of claim 3 , further comprising performing claim 3 , by the system claim 3 , a traffic data comparison claim 3 , the traffic data comparison being between traffic data and other traffic data.5. The method of claim 4 , wherein providing the rating is based on the traffic data comparison.6. The method of claim 4 , wherein the other traffic data is representative of traffic volume generated by usage of at least one other application.7. The method of claim 1 , wherein the other power consumption data is representative of power consumption data associated with usage of at least one other application.8. The method of claim 4 , wherein the traffic data is associated with downloading the application.9. The method of claim 4 , wherein the obtaining comprises receiving the traffic data.10. The method of claim 1 , further comprising associating the application with a category claim 1 , based ...

Подробнее
09-12-2014 дата публикации

Systems and methods for optimized route caching

Номер: US0008908696B2

A method for optimized route caching includes comparing a destination address of a network packet to a first set of prefixes in a routing cache, and comparing the destination address to a second set of prefixes in a full routing table when a longest matching prefix for the destination address is not found in the routing cache. The method further includes copying the longest matching prefix and a set of sub-prefixes of the longest matching prefix from the full routing table to the routing cache, and forwarding the network packet.

Подробнее
01-10-2013 дата публикации

Methods and apparatus to dynamically control access from virtual private networks to network-based shared resources

Номер: US0008549616B2

Methods and apparatus to dynamically control access from VPNs to shared resources are disclosed. A disclosed example route reflector comprises a memory to implement a database, a user interface module to receive a request to permit access for a VPN to a shared resource, a BGP engine to process BGP advertisements, a network interface to receive a first BGP advertisement from a PE router associated with the VPN that includes a first RT associated with the VPN, and a shared resource access controller to update the database based on the request, to query the database to determine whether the VPN has access to the shared resource in response to the first BGP advertisement, and to direct the BGP engine to form a second BGP advertisement based on the first BGP advertisement that includes a second RT associated with the shared resource when the VPN has access to the shared resource.

Подробнее
31-01-2017 дата публикации

Systems and methods for optimized route caching

Номер: US0009559955B2

A method for optimized route caching includes comparing a destination address of a network packet to a first set of prefixes in a routing cache, and comparing the destination address to a second set of prefixes in a full routing table when a longest matching prefix for the destination address is not found in the routing cache. The method further includes copying the longest matching prefix and a set of sub-prefixes of the longest matching prefix from the full routing table to the routing cache, and forwarding the network packet.

Подробнее
07-09-2010 дата публикации

Method and system for computing multicast traffic matrices

Номер: US0007792057B2
Принадлежит: AT&T Labs, Inc., AT & T LABS INC, AT&T LABS, INC.

A system and method for receiving, from one or more ingress routers, a first set of records including data corresponding to network traffic, receiving, from one or more egress routers, a second set of records including data corresponding to network traffic and creating a multicast traffic matrix using at least a portion of the data included in the first and second sets of records.

Подробнее
23-07-2009 дата публикации

Method for controlling traffic balance between peering networks

Номер: US20090185486A1
Принадлежит: AT&T Corp

A method that measures ratio, relative to a peering network, of traffic burden of incoming traffic to traffic burden of outgoing traffic, where traffic burden takes into account traffic volume and distance that the traffic traverses through the network. A determination is made from this ratio as to whether an imbalance exists with the peering network. With the assistance of a simulation of changes in routing policy and their effects, an existing or impending imbalance is remedied by changing the routing policy relative to particular customers, for example from a “hot potato” routing policy to a “best exit” routing policy.

Подробнее
08-03-2012 дата публикации

METHOD AND APPARATUS FOR PERFORMING A DEMOTION IN A CELLULAR COMMUNICATIONS NETWORK

Номер: US20120058773A1
Принадлежит: AT&T INTELLECTUAL PROPERTY I LP

A method, computer readable medium and apparatus for performing a demotion in a cellular communications network are disclosed. For example, the method receives a packet indicating that a batching transfer is completed, determines if a background packet was received after receiving the packet indicating that the batching transfer is completed and demotes a state of a state machine implemented by a radio network controller to a lower state if the background packet was not received.

Подробнее
25-06-2009 дата публикации

Method and System For Computing Multicast Traffic Matrices

Номер: US20090161673A1
Принадлежит:

A system and method for receiving, from one or more ingress routers, a first set of records including data corresponding to network traffic, receiving, from one or more egress routers, a second set of records including data corresponding to network traffic and creating a multicast traffic matrix using at least a portion of the data included in the first and second sets of records.

Подробнее
13-01-2015 дата публикации

Hierarchical anomaly localization and prioritization

Номер: US0008934352B2

Methods, apparatus and articles of manufacture for hierarchical anomaly localization and prioritization are disclosed. An example method disclosed herein comprises obtaining reported status for a plurality of nodes of a hierarchical topology, the reported status for a particular node being at least one of normal, abnormal or indeterminate, and determining a subset of root cause abnormal nodes, a root cause abnormal node included in the subset of root cause abnormal nodes having a total number of abnormal direct descendent nodes and indeterminate direct descendent nodes that is greater than a number of normal direct descendent nodes of the root cause abnormal node.

Подробнее
07-02-2013 дата публикации

CONTROLLING TRAFFIC TRANSMISSIONS TO MANAGE CELLULAR RADIO RESOURCE UTILIZATION

Номер: US20130035082A1
Принадлежит: AT&T INTELLECTUAL PROPERTY I, L.P.

Techniques for using controlling traffic transmissions to manage radio resource utilization are presented herein. When content is being streamed to user equipment (UE) and is at least initially intended to be streamed in real time at a constant bitrate, a communication management component can determine whether the content being transmitted to the UE can be delayed, instead of being transmitted in real time. In response to determining that the content can be delayed, the communication management component can facilitate buffering data and periodically streaming the data to the UE in data bursts to reduce use of UE power and radio resources. When transmitting a visual image to a UE, the communication management component can adjust resolution of a visual image to correspond to screen dimensions of the UE based on information indicating screen dimensions of the UE that can be received from the UE. 1. A system , comprising:at least one memory storing computer-executable instructions; and determine whether it is permissible for content to be received by a user equipment using a plurality of separate data bursts comprising respective portions of the content without using a continuous stream at a constant bitrate; and', 'in response to a determination that it is permissible for the content to be received by the user equipment using the plurality of separate data bursts, receive the respective portions of the content in respective data bursts of the plurality of separate data bursts., 'at least one processor, communicatively coupled to the at least one memory, that facilitates execution of the computer-executable instructions to at least2. The system of claim 1 , wherein the at least one processor further facilitates the execution of the computer-executable instructions to:identify the content is scheduled to be streamed to the user equipment using the continuous stream at the constant bitrate;determine that a defined amount of delay of reception of the content by the user ...

Подробнее
08-06-2017 дата публикации

Methods, Systems, and Products for Monitoring Domain Name Servers

Номер: US20170163596A1
Принадлежит: AT&T Intellectual Property I, L.P.

Methods, systems, and products infer performance of a domain name system. Queries to, and responses from, the domain name system are logged and categorized. Each category is associated with a different performance issue related to the domain name system. The number of entries in each category may be used to infer the performance of the domain name system

Подробнее
06-12-2012 дата публикации

Inferring TCP Initial Congestion Window

Номер: US20120307678A1
Принадлежит: AT&T INTELLECTUAL PROPERTY I, L.P.

A packet trace is received. Inter-arrival times between the multiple packets in the packet trace are determined. An inter-arrival time in the inter-arrival times that is greater than a threshold is identified. An order number of the inter-arrival time is identified. A determination is made as to whether a size of each of at least a portion of the multiple packets is equal to a maximum segment size. When a determination is made that the size of each of at least a portion of the multiple packets is equal to the maximum segment size, a size of the ICW as a product of the order number and the maximum segment size is returned.

Подробнее
21-02-2017 дата публикации

Intelligent mobility application profiling tool

Номер: US0009578441B2

Analyzing mobile device applications within a wireless data network and other related aspects are presented herein. More particularly, described herein is a novel Intelligent Mobility Application Profiling Tool (iMAP) and/or other mechanisms, systems and methods for profiling and benchmarking applications associated with mobile devices in a wireless data network. Various systems and methods described herein expose cross-layer interaction associated with a network device in order to profile an application on the network device with respect to energy efficiency, performance, and functionality. As described herein, radio resource control (RRC) analysis can be performed to infer RRC states associated with a given application, identify tail time, etc. Further, analyzers are employed for various layers, including transmission control protocol (TCP) and/or hypertext transfer protocol (HTTP), as well as to analyze communication bursts associated with a given application. Analysis results are subsequently utilized to deliver application profiling results to a user.

Подробнее
24-06-2010 дата публикации

METHOD AND APPARATUS FOR INFERRING THE PRESENCE OF STATIC INTERNET PROTOCOL ADDRESS ALLOCATIONS

Номер: US20100161535A1
Принадлежит:

A method and apparatus for inferring if an IP address allocation in a remote network is static or dynamic are disclosed. For example, the method contacts at least one remote peer to peer endpoint using a peer to peer application to obtain an IP address of the at least one remote peer to peer endpoint. The method then analyzes characteristics of the at least one remote peer to peer endpoint over a predefined period of time to infer whether the presence of static IP address allocation exists for the at least one remote peer to peer endpoint.

Подробнее
08-03-2012 дата публикации

Prioritizing Malicious Website Detection

Номер: US20120060221A1
Принадлежит: AT&T INTELLECTUAL PROPERTY I, L.P.

A computer implemented method includes identifying a universal resource locator and characterizing a traffic pattern associated with the universal resource locator. The traffic pattern can include referrer information, referring information, advertising network relationship information, and any combination thereof. The method can further include classifying the universal resource locator into a risk category based on the traffic pattern. 1. A computer implemented method comprising:identifying a universal resource locator;characterizing a traffic pattern associated with the universal resource locator, wherein the traffic pattern can include information selected from the group consisting of referrer information, referring information, advertising network relationship information, and any combination thereof; andclassifying the universal resource locator into a risk category based on characterizing the traffic pattern.2. The computer implemented method of claim 1 , wherein the traffic pattern further includes information selected from the group consisting of popularity information claim 1 , connectivity information claim 1 , white list information claim 1 , and any combination thereof.3. The computer implemented method of claim 1 , wherein the popularity is based on the activity of a plurality of user systems.4. The computer implemented method of claim 1 , wherein classifying is based on multiple aspects of the traffic pattern.5. The computer implemented method of claim 1 , further comprising analyzing the content associated with the universal resource locator to determine if the content is malicious.6. The computer implemented method of claim 5 , further comprising performing an action when the content is malicious claim 5 , the action selected from the group consisting of blocking the universal resource locator claim 5 , providing a warning claim 5 , and any combination thereof.7. The computer implemented method of claim 5 , further comprises performing an action ...

Подробнее
10-05-2011 дата публикации

Monitoring for replica placement and request distribution

Номер: US0007941556B2

A platform that may be used to dynamically reallocate resources to support an Internet application is disclosed. In an embodiment, the platform may include two layers of distribution, one at the domain name server (DNS) layer and one at an Internet data center layer. The platform may include a dynamic resource allocation manager that causes instances of applications to be initiated in Internet data centers in response to dynamic conditions and characteristics of the application. A monitoring system module may be provided to keep the dynamic resource allocation manager informed as the health and utilization of instances of the application.

Подробнее
22-08-2013 дата публикации

Reliability as an Interdomain Service

Номер: US20130215738A1
Принадлежит:

A system and techniques are disclosed that increase the redundancy (i.e., physical diversity and bandwidth) available to an IP network, thereby increasing the failure processing capability of IP networks. The techniques include pooling the resources of multiple networks together for mutual backup purposes to improve network reliability and employing methods to efficiently utilize both the intradomain and the interdomain redundancies provided by networks at low cost. 1. A controller to provide network reliability , the controller comprising:a processing device; and extracting a plurality of inter-domain bypass paths between a first intra-domain portion and a second intra-domain portion in a first network via a second network;', 'determining an inter-domain bypass path from the plurality of inter-domain bypass paths to link the first intra-domain portion and the second intra-domain portion in the first network via the second network in response to an intra-domain connectivity failure between the first intra-domain portion and second intra-domain portion; and', 'establishing an intra-domain label switched path in the second network and a tunnel from the first intra-domain portion in the first network to the intra-domain label switched path in the second network, the intra-domain label switched path and the tunnel being associated with the inter-domain bypass path., 'a memory device to store instructions that, when executed by the processing device, cause the processing device to perform operations comprising2. The controller of claim 1 , wherein the operations further comprise routing data packets between the first intra-domain portion and second intra-domain portion in the first network via the inter-domain bypass path using the tunnel to route packets from the first network to the second network and the intra-domain label switched path to route the packets in the second network.3. The controller of claim 1 , wherein the inter-domain bypass path links the first intra- ...

Подробнее
24-06-2010 дата публикации

SYSTEM AND METHOD FOR SPATIALLY CONSISTENT SAMPLING OF FLOW RECORDS AT CONSTRAINED, CONTENT-DEPENDENT RATES

Номер: US20100157809A1
Принадлежит: AT&T Intellectual Property I, L.P.

Disclosed herein are systems, computer-implemented methods, and computer-readable media for sampling network traffic. The method includes receiving a desired quantity of flow record to sample, receiving a plurality of network flow record each summarizing a network flow of packets, calculating a hash for each flow record of based on one or more invariant part of a respective flow, generating a quasi-random number from the calculated hash for each respective flow record, generating a priority from the calculated hash for each respective flow record, and sampling exactly the desired quantity of flow records, selecting flow records having a highest priority first. In one aspect, the method further partitions the plurality of flow records into groups based on flow origin and destination, generates an individual priority for each partitioned group, and separately samples exactly the desired quantity of flow records from each partitioned group, selecting flows having a highest individual priority first.

Подробнее
17-08-2017 дата публикации

CONTROLLING TRAFFIC TRANSMISSIONS TO MANAGE CELLULAR RADIO RESOURCE UTILIZATION

Номер: US20170238322A1
Принадлежит:

Techniques control traffic transmissions to manage radio resource utilization. When content is being streamed to user equipment (UE) and is at least initially intended to be streamed in real time at a constant bitrate, a communication management component can determine whether the content being transmitted to the UE can be delayed, instead of being transmitted in real time. In response to determining that the content can be delayed, the communication management component can facilitate buffering data and periodically streaming the data to the UE in data bursts to reduce use of UE power and radio resources. When transmitting a visual image to a UE, the communication management component can adjust resolution of a visual image to correspond to screen dimensions of the UE based on information indicating screen dimensions of the UE that can be received from the UE. 1. A system , comprising:a processor; and based on a jitter parameter associated with a second portion of content, determining whether a data transfer time for a second communication of the second portion of the content is able to be modified to delay the second communication via a second data burst for a defined amount of time after a first communication of a first portion of the content via a first data burst, wherein the jitter parameter indicates an amount of time delay from the data transfer time that is permitted; and', 'determining whether the content is permitted to be received by a device using separate data bursts comprising the first data burst comprising the first portion of the content and the second data burst comprising the second portion of the content,', 'wherein the determining whether the data transfer time is able to be modified facilitates the determining whether the content is permitted to be received by the device using the separate data bursts., 'a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations, comprising2. The ...

Подробнее
22-04-2014 дата публикации

Methods and apparatus to communicatively couple virtual private networks to virtual machines within distributive computing networks

Номер: US0008705513B2

Methods and apparatus to communicatively couple virtual private networks to virtual machines within distributive computing networks are disclosed. A disclosed example method includes receiving a request to provision a virtual machine from a virtual private network, determining a host for the virtual machine within a distributive computing network, creating the virtual machine within the host, communicatively coupling the virtual machine to a virtual local area network switch within the distributive computing network, configuring a portion of a router to be communicatively coupled to the virtual machine via the virtual local area network switch by specifying an address space within the router associated with at least one of the virtual machine or the virtual private network communicatively coupled to the router, and communicatively coupling the portion of the router to the virtual private network.

Подробнее
08-04-2014 дата публикации

Method and apparatus for presenting advertisements

Номер: US0008694377B2

A system that incorporates teachings of the present disclosure may include, for example, a controller to determine a behavioral profile of an end user from packet traffic generated by activities of the end user, and share the behavioral profile with a network element for distributing targeted advertisements to the end user according to the behavioral profile. Additional embodiments are disclosed.

Подробнее
28-05-2019 дата публикации

Bundling data transfers and employing tail optimization protocol to manage cellular radio resource utilization

Номер: US0010306665B2

To facilitate increasing power and resource efficiency of a mobile device, in the mobile device, with regard to periodic or one-time data transfers, a communication management component can analyze information comprising data transfer parameter information, including jitter information, associated with each application of a subset of applications used by the device and can desirably schedule and/or bundle data transfers associated with the applications to reduce the number of separate data bursts to transfer that data to thereby reduce use of wireless resources and power consumption by the device. A push notification system can receive respective jitter information associated with each application from the mobile device, and the push notification system can desirably schedule and/or bundle push notifications to reduce the number of separate data bursts sent to the device to reduce use of wireless resources and power consumption by the device.

Подробнее
11-03-2010 дата публикации

Systems and Methods for Optimized Route Caching

Номер: US20100061370A1
Принадлежит: AT&T Intellectual Property I, L.P.

A method for optimized route caching includes comparing a destination address of a network packet to a first set of prefixes in a routing cache, and comparing the destination address to a second set of prefixes in a full routing table when a longest matching prefix for the destination address is not found in the routing cache. The method further includes copying the longest matching prefix and a set of sub-prefixes of the longest matching prefix from the full routing table to the routing cache, and forwarding the network packet.

Подробнее
12-11-2015 дата публикации

BUNDLING DATA TRANSFERS AND EMPLOYING TAIL OPTIMIZATION PROTOCOL TO MANAGE CELLULAR RADIO RESOURCE UTILIZATION

Номер: US20150327057A1
Принадлежит: AT&T INTELLECTUAL PROPERTY I, L.P.

To facilitate increasing power and resource efficiency of a mobile device, in the mobile device, with regard to periodic or one-time data transfers, a communication management component can analyze information comprising data transfer parameter information, including jitter information, associated with each application of a subset of applications used by the device and can desirably schedule and/or bundle data transfers associated with the applications to reduce the number of separate data bursts to transfer that data to thereby reduce use of wireless resources and power consumption by the device. A push notification system can receive respective jitter information associated with each application from the mobile device, and the push notification system can desirably schedule and/or bundle push notifications to reduce the number of separate data bursts sent to the device to reduce use of wireless resources and power consumption by the device.

Подробнее
21-02-2012 дата публикации

System and method for inferring wireless trajectories in a cellular telephone network

Номер: US0008121599B2

A device includes a processor configured to determine a number of users in each of a plurality of wireless telephone cells of a trajectory in a wireless telephone network. The processor is also configured to determine handoff data between each adjacent pair of the wireless telephone cells, and to determine a first number of users traveling along the trajectory in the wireless telephone network while on a telephone call. The processor also calculates a total number of users associated with the trajectory in the wireless telephone network based on the handoff data between each adjacent pair of the wireless telephone cells, and based on the first number of users traveling along the trajectory while on the telephone call.

Подробнее
10-06-2010 дата публикации

Flexible Application Classification

Номер: US20100146100A1
Принадлежит: AT&T CORP.

A system includes an information storage module and an inspection module. The information storage module is configured to store a plurality of tags. Each tag is associated with a known set of traffic types of a plurality of known sets of traffic types. The inspection module is configured to compare a traffic flow to a set of traffic types to determine a matching set of traffic types, request a tag from the information storage module, and mark the traffic flow with the tag. The tag corresponds to the matching set of traffic types.

Подробнее
07-04-2015 дата публикации

Methods, devices, and computer program products for providing a computing application rating

Номер: US0009003017B2

A rating is provided for a computing application. Traffic data, power data, and/or network signaling load data is collected for a computing application and compared with other similar data. A rating for the computing application is provided based on the comparison.

Подробнее
11-02-2010 дата публикации

Reliability as an Interdomain Service

Номер: US20100034084A1
Принадлежит: AT&T INTELLECTUAL PROPERTY I, LP

A system and techniques are disclosed that increase the redundancy (i.e., physical diversity and bandwidth) available to an IP network, thereby increasing the failure processing capability of IP networks. The techniques include pooling the resources of multiple networks together for mutual backup purposes to improve network reliability and employing methods to efficiently utilize both the intradomain and the interdomain redundancies provided by networks at low cost.

Подробнее
19-08-2014 дата публикации

System and method for determination of routing information in a network

Номер: US0008811395B2
Принадлежит: AT&T Intellectual Property I, L.P.

A system and method to use network flow records to generate information about changes in network routing and to understand the impact of these changes on network traffic. The inferences made can be determinative, if sufficient information is available. If sufficient information is not available to make determinative inferences, inferences may be made that narrow the range of possible changes that may have occurred to network traffic and the underlying network.

Подробнее
28-03-2017 дата публикации

Methods, systems, and products for monitoring domain name servers

Номер: US0009608886B2

Methods, systems, and products infer performance of a domain name system. Queries to, and responses from, the domain name system are logged and categorized. Each category is associated with a different performance issue related to the domain name system. The number of entries in each category may be used to infer the performance of the domain name system.

Подробнее
03-06-2014 дата публикации

Tail optimization protocol for cellular radio resource allocation

Номер: US0008744367B2

Systems and methods for increasing the power and resource efficiency of a mobile network device are presented herein. More particularly, described herein is a novel Tail Optimization Protocol (TOP) and/or other mechanisms, systems and methods for enabling cooperation between a mobile device and an associated radio access network to eliminate idle periods (e.g., tails) when possible. Various systems and methods described herein can leverage the ability of applications and/or their associated connections to accurately predict a long tail time, from which a mobile device can notify an associated cellular network on such an imminent tail in order to allow the cellular network to immediately release tail resources. Various other aspects provided herein realize TOP via fast dormancy and/or other similar notification mechanisms, which enable a handset or other device to notify a cellular network for immediate resource release.

Подробнее
26-05-2016 дата публикации

HIERARCHICAL ANOMALY LOCALIZATION AND PRIORITIZATION

Номер: US20160149783A1
Принадлежит: AT&T INTELLECTUAL PROPERTY I LP

Example methods disclosed herein to prioritize anomalies in a communication network include classifying respective nodes in the communication network as normal, abnormal or indeterminate based on measurements received for the nodes. Disclosed example methods also include selecting a subset of the nodes classified as abnormal to be root cause abnormal nodes representing sources of the anomalies in the communication network, respective ones of the root cause abnormal nodes being abnormal nodes identified in the communication network and determined to have respective sets of direct descendent nodes having majorities of nodes classified as abnormal or indeterminate. Disclosed example methods further include combining respective anomaly sizes and anomaly scopes determined for the respective ones of root cause abnormal nodes based on the measurements to determine respective rankings for the root cause abnormal nodes, and outputting the respective rankings to prioritize the set of root cause abnormal nodes.

Подробнее
04-06-2013 дата публикации

Method and apparatus for automated end to end content tracking in peer to peer environments

Номер: US0008458172B2

A method, computer readable medium and system for automatically tracking content in a peer-to-peer environment are disclosed. For example, the method monitors a number of times each content title of a plurality of content titles are downloaded in the peer-to-peer environment, adds one or more content titles of the plurality of content titles that are downloaded above a predetermined threshold to a list, downloads each one of the one or more content titles in the list via the peer-to-peer environment and verifies that each one of the one or more content titles that are downloaded matches at least one content title in the list.

Подробнее
08-03-2012 дата публикации

METHOD AND APPARATUS FOR NORMALIZING CELLULAR COMMUNICATIONS NETWORK DATA

Номер: US20120057571A1
Принадлежит:

A method, computer readable medium and apparatus for normalizing cellular communications network data are disclosed. For example, the method collects a data packet from the cellular communications network, modifies a time stamp of the data packet in accordance with a promotion delay time from the time stamp of the data packet to create a normalized data packet and processes the normalized data packet to optimize state machine configurations. 1. A method for normalizing cellular communications network data , comprising:collecting a data packet from the cellular communications network;modifying a time stamp of the data packet in accordance with a promotion delay time from the time stamp of the data packet to create a normalized data packet; andprocessing the normalized data packet to optimize state machine configurations.2. The method of claim 1 , wherein the data packet is an uplink data packet traveling from a user endpoint device to a server.3. The method of claim 2 , wherein modifying the time stamp of the uplink data packet comprises:subtracting the promotion delay time from the time stamp of the uplink data packet.4. The method of claim 1 , wherein the data packet is a downlink data packet traveling from a server to a user endpoint device.5. The method of claim 4 , wherein modifying the time stamp of the downlink data packet comprises:adding the promotion delay time from the time stamp of the downlink data packet.6. The method of claim 1 , wherein the data packet is collected by and the time stamp is recorded by a gateway general packet radio services support node.7. The method of claim 1 , wherein the promotion delay is introduced by a promotion that occurs based upon a radio resource control state machine of a radio network controller.8. The method of claim 1 , wherein the processing comprises creating a new state machine based upon the processing of the normalized data packet.9. A computer-readable medium having stored thereon a plurality of instructions ...

Подробнее
19-04-2012 дата публикации

Network Aware Forward Caching

Номер: US20120096140A1
Принадлежит: AT&T Intellectual Property I, L.P.

A network includes a cache server and a network aware server that operates to determine an optimization between a cost of retrieving content from a communication network and a cost of caching content at the cache server. The optimization is determined as a minimum of a sum of a transit cost, a backbone cost, and a caching cost. The transit cost includes a money cost per data unit. The backbone cost includes a money cost per data unit and time unit. The caching cost includes a money cost per server unit. In response to determining the optimization, the network aware server sends a content identifier to the cache server, and the cache server receives the content identifier, determines a source of a content item, and if the source is the same as the content identifier, then cache the content item. 2. The network of claim 1 , further comprising a second cache server claim 1 , and wherein:in further response to determining the optimization, the network aware server is operable to send a second content identifier to the second cache server; and receive the second content identifier:', 'determine a second source of a second content item; and', 'if the second source is the same as the second content identifier, then cache the second content item., 'the second cache server is operable to3. The network of claim 1 , wherein the transit cost of retrieving content from the communication network includes:an external transit cost that is associated with transporting content from the communication network to the network; andan internal transit cost that is associated with transporting the content item from an ingress point of presence to an egress point of presence.4. The network of claim 3 , wherein the caching cost is further constrained by a maximum cache budget for the network.5. The network of claim 1 , wherein finding the minimum sum includes applying a pseudo-polynomial-time dynamic programming algorithm.6. The network of claim 1 , wherein finding the minimum sum includes: ...

Подробнее
17-05-2012 дата публикации

Method and apparatus for inferring state transitions in a wireless communications network

Номер: US20120120812A1
Принадлежит: Individual

A method, a computer readable medium and an apparatus for inferring state transitions in a wireless communications network are disclosed. In one embodiment, the method infers a state promotion procedure. In another embodiment, the method infers a state demotion procedure.

Подробнее
17-05-2012 дата публикации

METHOD AND APPARATUS FOR PROVIDING A DYNAMIC INACTIVITY TIMER IN A WIRELESS COMMUNICATIONS NETWORK

Номер: US20120122405A1
Принадлежит:

A method, a computer readable medium and an apparatus for providing a dynamic inactivity timer are disclosed. For example, the method monitors a timer for a time threshold associated with a burst of a plurality of bursts of packets, and determines if the timer for the time threshold associated with the burst has expired. The method predicts an inter-burst time for the burst, if the timer for the time threshold associated with the burst has expired and sets the dynamic inactivity timer in accordance with the inter-burst time for the burst. 1. A method for providing a dynamic inactivity timer in a network , comprising:monitoring a timer for a time threshold associated with a burst of a plurality of bursts of packets;determining if the timer for the time threshold associated with the burst has expired;predicting an inter-burst time for the burst, if the timer for the time threshold associated with the burst has expired; andsetting the dynamic inactivity timer in accordance with the inter-burst time for the burst.2. The method of claim 1 , further comprising:receiving a packet;determining if the packet is for the burst;resetting the timer for the time threshold associated with the burst, if the packet is for the burst; andrecording a new burst and setting a second timer for a second time threshold associated with the new burst, if the packet is not for the burst.3. The method of claim 1 , wherein the setting the dynamic inactivity timer comprises:determining if the inter-burst time is greater than an inactivity timer for transitioning from a first state to a second state, wherein the first state is associated with a first level of radio resource, wherein the second state is associated with a second level of radio resource, wherein the first level of radio resource is larger than the second level of radio resource;setting the dynamic inactivity timer to the value of the inactivity time for transitioning from the first state to the second state, if the predicted inter- ...

Подробнее
24-05-2012 дата публикации

METHOD AND APPARATUS FOR CONTENT AWARE OPTIMIZED TUNNELING IN A MOBILITY ENVIRONMENT

Номер: US20120131664A1
Принадлежит:

A method, computer readable medium and apparatus for performing content aware optimized tunneling in a communication network are disclosed. For example, the method authenticates a user endpoint device, establishes a tunnel to the user endpoint device if the user endpoint device is authenticated, analyzes content of a data packet transmitted through the tunnel to determine if the tunnel should be re-directed, and re-directs the tunnel to a gateway general packet radio services support node light based upon the content of the data packet. 1. A method for performing content aware optimized tunneling in a communication network , comprising:authenticating a user endpoint device;establishing a tunnel to the user endpoint device if the user endpoint device is authenticated;analyzing content of a data packet transmitted through the tunnel to determine if the tunnel should be re-directed; andre-directing the tunnel to a gateway general packet radio services support node light based upon the content of the data packet.2. The method of claim 1 , wherein the analyzing is performed by a traffic analyzer application programming interface.3. The method of claim 1 , wherein the analyzing comprises:looking at a packet data protocol context.4. The method of claim 1 , wherein the analyzing comprises:removing a packet header; andlooking at a body of the data packet to determine the content.5. The method of claim 1 , wherein the content comprises a request for multi-media content.6. The method of claim 5 , wherein the user endpoint device accesses a multi-media server that is geographically close to the user endpoint device via the tunnel that is re-directed to the gateway general packet radio services support node light.7. The method of claim 1 , wherein the content indicates that the data packet is a suspicious packet that is determined to pose a security threat.8. The method of claim 7 , wherein the suspicious packet is sent to a security server that is geographically close to the ...

Подробнее
14-06-2012 дата публикации

INTELLIGENT MOBILITY APPLICATION PROFILING TOOL

Номер: US20120151041A1
Принадлежит: AT&T Intellectual Property I, L.P.

Systems and methods for analyzing mobile device applications within a wireless data network are presented herein. More particularly, described herein is a novel Intelligent Mobility Application Profiling Tool (iMAP) and/or other mechanisms, systems and methods for profiling and benchmarking applications associated with mobile devices in a wireless data network. Various systems and methods described herein expose cross-layer interaction associated with a network device in order to profile an application on the network device with respect to energy efficiency, performance, and functionality. As described herein, radio resource control (RRC) analysis can be performed to infer RRC states associated with a given application, identify tail time, etc. Further, analyzers are employed for various layers, including transmission control protocol (TCP) and/or hypertext transfer protocol (HTTP), as well as to analyze communication bursts associated with a given application. Analysis results are subsequently utilized to deliver application profiling results to a user. 1. A method , comprising: obtaining network activity data relating to at least one network device;', 'analyzing cross-layer interaction associated with the network activity data between at least one of a radio resource control (RRC) layer, a transport layer, or an application layer; and', 'identifying bursts indicated within the network activity data and triggering factors of the bursts based at least in part on the cross-layer interaction associated with the network activity data., 'executing, using at least one processor, computer-readable instructions for performing acts, comprising2. The method of claim 1 , further comprising:generating a report relating to the cross-layer interaction associated with the network activity data, the bursts indicated within the network activity data and the triggering factors of the bursts.3. The method of claim 1 , wherein the analyzing comprises:inferring respective RRC states ...

Подробнее
21-06-2012 дата публикации

METHOD AND APPARATUS FOR PROVIDING A TWO-LAYER ARCHITECTURE FOR PROCESSING WIRELESS TRAFFIC

Номер: US20120155293A1
Принадлежит:

A method and system for processing wireless traffic of a wireless network, e.g., a cellular network are disclosed. For example, the method obtains wireless traffic, and processes the wireless traffic by a plurality of probe servers, where each of the plurality of probe servers generates a plurality of feeds comprising a data feed and a control feed. The method correlates the plurality of feeds from the plurality of probe servers by a plurality of aggregator servers, where the data feed and the control feed of each of the plurality of probe servers are correlated with at least one other probe server of the plurality of probe servers, and outputs a correlated result from the correlating. 1. A method for processing wireless traffic via a two-layer architecture , comprising:obtaining wireless traffic;processing the wireless traffic by a plurality of probe servers, where each of the plurality of probe servers generates a plurality of feeds comprising a data feed and a control feed;correlating the plurality of feeds from the plurality of probe servers by a plurality of aggregator servers, where the data feed and the control feed of each of the plurality of probe servers are correlated with at least one other probe server of the plurality of probe servers; andoutputting a correlated result from the correlating.2. The method of claim 1 , wherein the plurality of probe servers and the plurality of aggregator servers are co-located in a data center.3. The method of claim 1 , wherein the plurality of probe servers and the plurality of aggregator servers are not co-located at a common location.4. The method of claim 1 , wherein the wireless traffic is obtained from a splitter.5. The method of claim 4 , wherein the splitter comprises a passive optical splitter.6. The method of claim 1 , wherein the plurality of probe servers and the plurality of aggregator servers operate independently from each other.7. The method of claim 5 , wherein the plurality of probe servers and the ...

Подробнее
21-06-2012 дата публикации

Method and apparatus for correlating end to end measurements through control plane monitoring of wireless traffic

Номер: US20120157088A1
Принадлежит: AT&T INTELLECTUAL PROPERTY I LP

A method, computer readable medium and apparatus for correlating measures of wireless traffic are disclosed. For example, the method obtains the wireless traffic, and processes the wireless traffic by a plurality of probe servers, where each of the plurality of probe servers generates a plurality of feeds, wherein the plurality of feeds comprises a data feed and a control feed. The method correlates the plurality of feeds from the plurality of probe servers by a plurality of aggregator servers, where the data feed and the control feed of each of the plurality of probe servers are correlated with at least one other probe server of the plurality of probe servers to provide a correlated control plane and a correlated data plane, and extracts at least partial path information of a flow from the correlated control plane. The method then correlates performance information from the correlated data plane for the flow.

Подробнее
21-06-2012 дата публикации

METHOD AND APPARATUS FOR IMPROVING NON-UNIFORM MEMORY ACCESS

Номер: US20120159109A1
Принадлежит:

A method, computer readable medium and apparatus for improving non-uniform memory access are disclosed. For example, the method divides a plurality of stream processing jobs into a plurality of groups of stream processing jobs to match a topology of a non-uniform memory access platform. The method sets a parameter in an operating system kernel of the non-uniform memory access platform to favor an allocation of a local memory, and defines a plurality of processor sets. The method binds one of the plurality of groups to one of the plurality of processor sets, and run the one group of stream processing jobs on the one processor set. 1. A method for improving non-uniform memory access , comprising:dividing a plurality of stream processing jobs into a plurality of groups of stream processing jobs to match a topology of a non-uniform memory access platform;setting a parameter in an operating system kernel of the non-uniform memory access platform to favor an allocation of a local memory;defining a plurality of processor sets;binding one of the plurality of groups to one of the plurality of processor sets; andrunning the one group of stream processing jobs on the one processor set.2. The method of claim 1 , further comprising:measuring a fraction of an amount of local memory access versus an amount of remote memory access.3. The method of claim 2 , further comprising:adjusting the parameter in the operating system kernel in accordance with the fraction.4. The method of claim 3 , wherein the adjusting comprises adjusting a strength of the allocation to the local memory.5. The method of claim 4 , wherein the adjusting the strength of the allocation comprises increasing a strength of the allocation.6. The method of claim 4 , wherein the adjusting the strength of the allocation comprises decreasing a strength of the allocation.7. The method of claim 1 , wherein the one group of stream processing jobs comprises wireless traffic.8. The method of claim 1 , wherein the non-uniform ...

Подробнее
01-11-2012 дата публикации

METHODS AND APPARATUS TO IMPLEMENT SCALABLE ROUTING IN NETWORK COMMUNICATION SYSTEMS

Номер: US20120275344A1
Принадлежит:

An example method involves for a first virtual private network (VPN) installed on a candidate hub router, selecting a first spoke-to-hub assignment solution having a first least memory utilization cost to assign the candidate hub router a quantity of first virtual private edge (VPE) routers serving the first VPN; for a second VPN installed on the candidate hub router, selecting a second spoke-to-hub assignment solution having a second least memory utilization cost to assign the candidate hub router a quantity of second VPE routers serving the second VPN; determining third least memory utilization costs to assign the candidate hub router to a quantity of the first VPE routers, and fourth least memory utilization costs to assign the candidate hub router to a quantity of the second VPE routers; and selecting the first or second spoke-to-hub assignment solution for the candidate hub router based on the least memory utilization costs. 1. A method comprising:for a first virtual private network installed on a candidate hub router, selecting a first spoke-to-hub assignment solution having a first least memory utilization cost to assign the candidate hub router a quantity of first virtual private edge routers serving the first virtual private network;for a second virtual private network installed on the candidate hub router, selecting a second spoke-to-hub assignment solution having a second least memory utilization cost to assign the candidate hub router a quantity of second virtual private edge routers serving the second virtual private network;determining third least memory utilization costs, each associated with assigning the candidate hub router to a respective quantity of the first virtual private edge routers, and fourth least memory utilization costs, each associated with assigning the candidate hub router to a respective quantity of the second virtual private edge routers; andselecting one of the first or second spoke-to-hub assignment solutions for the candidate ...

Подробнее
28-02-2013 дата публикации

HIERARCHICAL ANOMALY LOCALIZATION AND PRIORITIZATION

Номер: US20130051248A1
Принадлежит:

Methods, apparatus and articles of manufacture for hierarchical anomaly localization and prioritization are disclosed. An example method disclosed herein comprises obtaining reported status for a plurality of nodes of a hierarchical topology, the reported status for a particular node being at least one of normal, abnormal or indeterminate, and determining a subset of root cause abnormal nodes, a root cause abnormal node included in the subset of root cause abnormal nodes having a total number of abnormal direct descendent nodes and indeterminate direct descendent nodes that is greater than a number of normal direct descendent nodes of the root cause abnormal node. 1. A method comprising:obtaining reported status for a plurality of nodes of a hierarchical topology, the reported status for a particular node being at least one of normal, abnormal or indeterminate; anddetermining with a processor a subset of root cause abnormal nodes, a root cause abnormal node included in the subset of root cause abnormal nodes having a total number of abnormal direct descendent nodes and indeterminate direct descendent nodes that is greater than a number of normal direct descendent nodes of the root cause abnormal node.2. A method as defined in wherein each node of the hierarchical topology represents a respective hierarchical portion of a network claim 1 , and the reported status is based on measured performance of the network.3. A method as defined in wherein the subset of root cause abnormal nodes covers all abnormal nodes in the hierarchical topology.4. A method as defined in wherein determining the subset of root cause abnormal nodes comprises:selecting a set of candidate root cause abnormal nodes from a set of abnormal nodes in the hierarchical topology; anddetermining the subset of root cause abnormal nodes from the set of candidate root cause abnormal nodes.5. A method as defined in wherein a candidate root cause abnormal node included in the set of candidate root cause ...

Подробнее
28-02-2013 дата публикации

PASSIVE AND COMPREHENSIVE HIERARCHICAL ANOMALY DETECTION SYSTEM AND METHOD

Номер: US20130054783A1
Принадлежит:

A technique for monitoring performance in a network uses passively monitored traffic data at the server access routers. The technique aggregates performance metrics into clusters according to a spatial hierarchy in the network, and then aggregates performance metrics within spatial clusters to form time series of temporal bins. Representative values from the temporal bins are then analyzed using an enhanced Holt-Winters exponential smoothing algorithm. 1. A method for detecting an anomaly event in a computer network comprising a plurality of clients , comprising:determining, by a computer, a plurality of series performance metrics, each one of the series performance metrics representing a time series of performance measurements of connections made to one of the plurality of clients;spatially aggregating, by the computer, the series performance metrics according to a spatial hierarchy to create a plurality of spatial clusters;in each spatial cluster of the plurality of spatial clusters, temporally aggregating, by the computer, series performance metrics to form a time series of temporal bins;for each temporal bin of the time series of temporal bins, determining, by the computer, an actual temporal bin metric representative of time series performance metrics in the temporal bin; and determining, by the computer, a forecast temporal bin metric from actual temporal bin metrics determined for temporal bins preceding the temporal bin; and', 'comparing, by the computer, an actual temporal bin metric of the temporal bin with the forecast temporal bin metric to detect the anomaly event., 'for each temporal bin of the time series of temporal bins2. The method of claim 1 , wherein the performance measurements of connections made to one of the plurality of clients comprise client round trip time measurements.3. The method of claim 2 , wherein the round trip time measurements are separated from each other by at least 600 seconds.4. The method of claim 2 , further comprising: ...

Подробнее
23-05-2013 дата публикации

System And Method For Determination Of Routing Information In A Network

Номер: US20130132608A1
Принадлежит: AT&T INTELLECTUAL PROPERTY I LP

A system and method to use network flow records to generate information about changes in network routing and to understand the impact of these changes on network traffic. The inferences made can be determinative, if sufficient information is available. If sufficient information is not available to make determinative inferences, inferences may be made that narrow the range of possible changes that may have occurred to network traffic and the underlying network.

Подробнее
03-10-2013 дата публикации

METHOD AND APPARATUS FOR AUTOMATED END TO END CONTENT TRACKING IN PEER TO PEER ENVIRONMENTS

Номер: US20130262429A1
Принадлежит:

A method, computer readable medium and system for automatically tracking content in a peer-to-peer environment are disclosed. For example, the method monitors a number of times each content title of a plurality of content titles are downloaded in the peer-to-peer environment, adds one or more content titles of the plurality of content titles that are downloaded above a predetermined threshold to a list, downloads each one of the one or more content titles in the list via the peer-to-peer environment and verifies that each one of the one or more content titles that are downloaded matches at least one content title in the list. 1. A method for tracking content in a peer-to-peer network , comprising:monitoring, by a processor, a number of times each content title of a plurality of content titles are downloaded in the peer-to-peer network;adding, by the processor, a content title of the plurality of content titles that is downloaded above a predetermined threshold to a list;downloading, by the processor, the content title in the list via the peer-to-peer network; andverifying, by the processor, that the content title that is downloaded matches a content title in the list.2. The method of claim 1 , wherein the monitoring comprises crawling search engines.3. The method of claim 1 , wherein the monitoring comprises subscribing to a RSS feed.4. The method of claim 1 , wherein the monitoring comprises using network probes that intercept peer to peer communications.5. The method of claim 1 , wherein the list comprises a torrent associated with the content title in the list.6. The method of claim 1 , wherein the verifying comprises:generating a content signature of the content title that is downloaded; anddetermining whether the content signature of the content title that is downloaded matches a content signature of a content title in the list.7. The method of claim 1 , wherein the list is ordered from most popular to least popular.8. The method of claim 1 , further comprising ...

Подробнее
17-10-2013 дата публикации

System for Estimating Download Speed From Passive Measurements

Номер: US20130272159A1
Принадлежит:

A system for passive estimation of throughput in an electronic network is disclosed. The system may include an plurality of mobile devices configured to operate in the network and may further include an electronic data processor. The processor may be configured to access flow records for data flows associated with the mobile devices during a predetermined time interval. Additionally, the processor may be configured to annotate the flow records with an application field and a content provider field. The processor may also be configured to determine a flow type of each data flow based on the application field and the content provider field of the flow records. Furthermore, the processor may be configured to generate a throughput index that only includes non-rate-limited flow types. Moreover, the processor may be configured to estimate maximum throughput for each data flow having non-rate-limited flow types in the throughput index. 1. A system for passive estimation of throughput , the system comprising:a memory that stores instructions; annotating a flow record for each data flow of a plurality of data flows to include an application field and a content provider field, wherein the application field indicates an application protocol and the content provider field indicates a content provider with which each data flow is in communication;', 'determining a flow type of each data flow based on the application field and the content provider field of the flow record;', 'selecting each data flow for which the flow type is determined to have a non-rate-limited flow type; and', 'estimating an average maximum throughput for each data flow selected., 'a processor that executes the instructions to perform operations, the operations comprising2. The system of claim 1 , wherein the operations further comprise generating a throughput index claim 1 , wherein the throughput index comprises the flow type determined for each data flow if the flow type is determined to have the non-rate- ...

Подробнее
24-10-2013 дата публикации

Passive And Comprehensive Hierarchical Anomaly Detection System And Method

Номер: US20130282896A1
Принадлежит:

A technique for monitoring performance in a network uses passively monitored traffic data at the server access routers. The technique aggregates performance metrics into clusters according to a spatial hierarchy in the network, and then aggregates performance metrics within spatial clusters to form time series of temporal bins. Representative values from the temporal bins are then analyzed using an enhanced Holt-Winters exponential smoothing algorithm. 1. A method for detecting abnormal observations from a series of observations , comprising:formulating, by a computer, an observation prediction by applying a working exponential smoothing model to a series of past observations;determining, by the computer, whether a most recent observation is an abnormal observation by comparing the most recent observation to the observation prediction;updating, by the computer, using the most recent observation, a shadow exponential smoothing model;selectively updating, by the computer, using the most recent observation, the working exponential smoothing model based on the determining whether the most recent observation is an abnormal observation;making a determination, by the computer, that a number of recent abnormal observations exceeds a threshold number of recent abnormal observations; andupon making the determination that the number of recent abnormal observations exceeds a threshold number of consecutive abnormal observations, replacing, by the computer, the working exponential smoothing model with the shadow exponential smoothing model.2. The method of claim 1 , wherein selectively updating the working exponential smoothing model further comprises:updating the working exponential smoothing model if and only if the most recent observation is not an abnormal observation, or the most recent observation is an abnormal observation and a number of abnormal observations received in a current time cycle is below a threshold number of abnormal observations for the current time cycle. ...

Подробнее
28-11-2013 дата публикации

INTELLIGENT MOBILITY APPLICATION PROFILING TOOL

Номер: US20130315088A1
Принадлежит: AT&T Intellectual Property I, L.P.

Analyzing mobile device applications within a wireless data network and other related aspects are presented herein. More particularly, described herein is a novel Intelligent Mobility Application Profiling Tool (iMAP) and/or other mechanisms, systems and methods for profiling and benchmarking applications associated with mobile devices in a wireless data network. Various systems and methods described herein expose cross-layer interaction associated with a network device in order to profile an application on the network device with respect to energy efficiency, performance, and functionality. As described herein, radio resource control (RRC) analysis can be performed to infer RRC states associated with a given application, identify tail time, etc. Further, analyzers are employed for various layers, including transmission control protocol (TCP) and/or hypertext transfer protocol (HTTP), as well as to analyze communication bursts associated with a given application. Analysis results are subsequently utilized to deliver application profiling results to a user. 1. A method , comprising:determining, by a system comprising a processor, cross-layer interaction associated with network activity data of a network device with respect to a radio resource control state;determining, by the system, a burst comprising a period of time between consecutive packets of the network activity data; anddetermining, by the system based on the cross-layer interaction, a source of the burst.2. The method of claim 1 , wherein the determining the burst comprises determining the period of time between data packets received by the network device.3. The method of claim 1 , further comprising:generating, by the system, information representing the cross-layer interaction, the burst, and the source of the burst.4. The method of claim 1 , further comprising:determining, by the system, the radio resource control state based on a radio link control buffer characteristic of the network device.5. The ...

Подробнее
27-02-2014 дата публикации

Methods, Systems, and Products for Monitoring Domain Name Servers

Номер: US20140059208A1
Принадлежит: AT&T INTELLECTUAL PROPERTY I LP

Methods, systems, and products infer performance of a domain name system. Queries to, and responses from, the domain name system are logged and categorized. Each category is associated with a different performance issue related to the domain name system. The number of entries in each category may be used to infer the performance of the domain name system

Подробнее
26-03-2015 дата публикации

Hierarchical anomaly localization and prioritization

Номер: US20150085675A1
Принадлежит: AT&T INTELLECTUAL PROPERTY I LP

Example methods disclosed herein to localize anomalies in a communication network include identifying a first set of abnormal nodes in the communication network, and including respective ones of the first set of abnormal nodes having a number of normal direct descendent nodes that is less than a combined number of abnormal direct descendent nodes and indeterminate direct descendent nodes in a set of candidate nodes. Such disclosed example methods also include iteratively selecting ones of the set of candidate nodes to include in a set of root cause abnormal nodes representing sources of the anomalies in the communication network. In such disclosed example methods, the ones of the set of candidate nodes are selected based on sizes of respective subsets of the abnormal nodes from the first set of abnormal nodes covered by the candidate nodes.

Подробнее
12-06-2014 дата публикации

Method and apparatus for presenting advertisements

Номер: US20140164140A1
Принадлежит: AT&T INTELLECTUAL PROPERTY I LP

A system that incorporates teachings of the present disclosure may include, for example, a controller to determine a behavioral profile of an end user from packet traffic generated by activities of the end user, and share the behavioral profile with a network element for distributing targeted advertisements to the end user according to the behavioral profile. Additional embodiments are disclosed.

Подробнее
24-07-2014 дата публикации

Method and apparatus for managing a degree of parallelism of streams

Номер: US20140204789A1
Принадлежит: AT&T INTELLECTUAL PROPERTY I LP

A method, computer readable medium and apparatus for managing a degree of parallelism of streams are disclosed. For example, the method analyzes wireless traffic to determine a profile of the wireless traffic, determines an amount of available processing resources, and manages the degree of parallelism of streams based on the profile and the amount of available processing resources in a probe server.

Подробнее
24-07-2014 дата публикации

METHOD AND APPARATUS FOR CORRELATING END TO END MEASUREMENTS THROUGH CONTROL PLANE MONITORING OF WIRELESS TRAFFIC

Номер: US20140206344A1
Принадлежит: AT&T Intellectual Property I, L.P.

A method, computer readable medium and apparatus for correlating measures of wireless traffic are disclosed. For example, the method obtains the wireless traffic, and processes the wireless traffic by a plurality of probe servers, where each of the plurality of probe servers generates a plurality of feeds, wherein the plurality of feeds comprises a data feed and a control feed. The method correlates the plurality of feeds from the plurality of probe servers, where the data feed and the control feed of each of the plurality of probe servers are correlated with at least one other probe server of the plurality of probe servers to provide a correlated control plane and a correlated data plane, and extracts at least partial path information of a flow from the correlated control plane. The method then correlates performance information from the correlated data plane for the flow. 1. A method for correlating performance information , comprising:correlating, by an aggregator server of a plurality of aggregator servers, a plurality of feeds received from each one of a plurality of probe servers, wherein the plurality of feeds associated with wireless traffic comprises a data feed and a control feed, wherein the data feed and the control feed of a first probe server of the plurality of probe servers are correlated with the data feed and the control feed of a second probe server of the plurality of probe servers to provide a correlated result comprising a correlated control plane and a correlated data plane;extracting, by the aggregator server, at least partial path information of a flow from the correlated control plane;filling in, by the aggregator server, any missing path information of the flow using external topology information; andcorrelating, by the aggregator server, the performance information from the correlated data plane for the flow.2. The method of claim 1 , further comprising:identify a network element along the flow having a performance issue.3. The method of ...

Подробнее
05-05-2016 дата публикации

CONTROLLING TRAFFIC TRANSMISSIONS TO MANAGE CELLULAR RADIO RESOURCE UTILIZATION

Номер: US20160127877A1
Принадлежит:

Techniques control traffic transmissions to manage radio resource utilization. When content is being streamed to user equipment (UE) and is at least initially intended to be streamed in real time at a constant bitrate, a communication management component can determine whether the content being transmitted to the UE can be delayed, instead of being transmitted in real time. In response to determining that the content can be delayed, the communication management component can facilitate buffering data and periodically streaming the data to the UE in data bursts to reduce use of UE power and radio resources. When transmitting a visual image to a UE, the communication management component can adjust resolution of a visual image to correspond to screen dimensions of the UE based on information indicating screen dimensions of the UE that can be received from the UE. 1. A system , comprising:a processor; and in connection with content that is initially scheduled to be communicated using a continuous stream at a defined bitrate, determining whether it is permissible for the content to be received by a device using separate data bursts comprising respective portions of the content without using the continuous stream at the defined bitrate, wherein the separate data bursts comprises a first separate data burst comprising a first portion of the content and a second separate data burst comprising a second portion of the content; and', 'to facilitate the determining whether the content is permitted to be received by the device using the separate data bursts, determining whether a scheduled data transfer start time for communication of the second portion of the content is able to be adjusted to delay the communication of the second portion of the content with the second separate data burst for a defined amount of time after communication of the first portion of the content with the first separate data burst based on a jitter parameter associated with the second portion of the ...

Подробнее
18-06-2015 дата публикации

Method and apparatus for detecting tethering in a communications network

Номер: US20150172942A1
Принадлежит: AT&T INTELLECTUAL PROPERTY I LP

A method, non-transitory computer readable medium and apparatus for detecting a tethering function being performed by an endpoint device in a communications network are disclosed. For example, the method analyzes a data packet directed towards the endpoint device, detects a signature based upon analyzing the data packet, and identifies the endpoint device as performing the tethering function based upon detecting the signature.

Подробнее
14-06-2018 дата публикации

METHOD AND APPARATUS FOR IMPROVING NON-UNIFORM MEMORY ACCESS

Номер: US20180165186A1
Принадлежит:

A method, computer readable medium and apparatus for improving non-uniform memory access are disclosed. For example, the method divides a plurality of stream processing jobs into a plurality of groups of stream processing jobs to match a topology of a non-uniform memory access platform. The method sets a parameter in an operating system kernel of the non-uniform memory access platform to favor an allocation of a local memory, and defines a plurality of processor sets. The method binds one of the plurality of groups to one of the plurality of processor sets, and run the one group of stream processing jobs on the one processor set. 1. A method for improving non-uniform memory access , the method comprising:acquiring, via a processor, a topology of a non-uniform memory access platform, wherein the topology comprises an arrangement of a local memory versus a remote memory, wherein the arrangement pertains to a physical location of the local memory and the remote memory;dividing, via the processor, a plurality of stream processing jobs into a plurality of groups of stream processing jobs to match the topology of the non-uniform memory access platform, wherein the plurality of stream processing jobs is divided among the local memory and the remote memory;setting, via the processor, a parameter in an operating system kernel of the non-uniform memory access platform to favor an allocation of the local memory;defining, via the processor, a plurality of processor sets;binding, via the processor, one group of the plurality of groups of stream processing jobs to one processor set of the plurality of processor sets;running, via the processor, the one group of the plurality of groups of stream processing jobs on the one processor set;measuring, via the processor, a fraction of an amount of local memory access versus an amount of remote memory access; andadjusting, via the processor, the parameter in the operating system kernel in accordance with the fraction, wherein the ...

Подробнее
11-09-2014 дата публикации

METHOD AND APPARATUS FOR APPLYING UNIFORM HASHING TO WIRELESS TRAFFIC

Номер: US20140258518A1
Принадлежит: AT&T Intellectual Property I, L.P.

A method, computer readable medium and apparatus for hashing wireless traffic are disclosed. For example, the method hashes the wireless traffic uniformly by a plurality of probe servers based on at least one first key to provide a plurality of streams, and hashes at least one output stream of each of the plurality of probe servers uniformly based on at least one second key to provide a plurality of output streams. The method then provides the plurality of output streams to at least one aggregator server.

Подробнее
18-09-2014 дата публикации

Method and apparatus for detecting tethering in a communications network

Номер: US20140269430A1
Принадлежит: AT&T INTELLECTUAL PROPERTY I LP

A method, non-transitory computer readable medium and apparatus for detecting a tethering function being performed by an endpoint device in a communications network are disclosed. For example, the method analyzes a data packet directed towards the endpoint device, detects a signature based upon analyzing the data packet, and identifies the endpoint device as performing the tethering function based upon detecting the signature.

Подробнее
31-08-2017 дата публикации

Method and apparatus for improving non-uniform memory access

Номер: US20170249244A1
Принадлежит: AT&T INTELLECTUAL PROPERTY I LP

A method, computer readable medium and apparatus for improving non-uniform memory access are disclosed. For example, the method divides a plurality of stream processing jobs into a plurality of groups of stream processing jobs to match a topology of a non-uniform memory access platform. The method sets a parameter in an operating system kernel of the non-uniform memory access platform to favor an allocation of a local memory, and defines a plurality of processor sets. The method binds one of the plurality of groups to one of the plurality of processor sets, and run the one group of stream processing jobs on the one processor set.

Подробнее
15-09-2016 дата публикации

Systems and Methods for Optimized Route Caching

Номер: US20160269291A1
Принадлежит: AT&T Intellectual Property I, L.P.

A method for optimized route caching includes comparing a destination address of a network packet to a first set of prefixes in a routing cache, and comparing the destination address to a second set of prefixes in a full routing table when a longest matching prefix for the destination address is not found in the routing cache. The method further includes copying the longest matching prefix and a set of sub-prefixes of the longest matching prefix from the full routing table to the routing cache, and forwarding the network packet. 1. A system , comprising:a memory that stores instructions; copying, when a longest matching prefix of a destination address of a network packet is found in a full routing table and not found in a routing cache, the longest matching prefix to the routing cache;', 'merging a plurality of contiguous sub-prefixes of the longest matching prefix into a super-prefix when the plurality of contiguous sub-prefixes have a same output port, wherein the super-prefix is inserted into the routing cache; and', 'forwarding the network packet., 'a processor that executes the instructions to perform operations, the operations comprising2. The system of claim 1 , wherein the operations further comprise comparing claim 1 , when the longest matching prefix of the destination address of the network packet is not found in the routing cache claim 1 , the destination address of the network packet to a first set of prefixes in the full routing table.3. The system of claim 2 , wherein the operations further comprise comparing the destination address of the network packet to a second set of prefixes in the routing cache.4. The system of claim 1 , wherein the operations further comprise updating the routing cache when the longest matching prefix is found in the routing cache.5. The system of claim 1 , wherein the operations further comprise updating the routing cache by incrementing a number of times the longest matching prefix has been used.6. The system of claim 1 , ...

Подробнее
12-10-2017 дата публикации

Method and apparatus for detecting tethering in a communications network

Номер: US20170295496A1
Принадлежит: AT&T INTELLECTUAL PROPERTY I LP

A method, non-transitory computer readable medium and apparatus for detecting a tethering function being performed by an endpoint device in a communications network are disclosed. For example, the method analyzes a data packet directed towards the endpoint device, detects a signature based upon analyzing the data packet, and identifies the endpoint device as performing the tethering function based upon detecting the signature.

Подробнее
20-05-2010 дата публикации

Hybrid unicast/anycast content distribution network

Номер: WO2010056761A1
Принадлежит: AT&T Intellectual Property I, L.P.

A method includes receiving a request for an edge cache address, and comparing a requestor address to an anycast group. The method can further include providing an anycast edge cache address when the requestor address is in the anycast group. Alternatively, the method can further include determining an optimal cache server, and providing a unicast address of the optimal cache server when the requestor address is not in the anycast group.

Подробнее
04-07-2017 дата публикации

Bundling data transfers and employing tail optimization protocol to manage cellular radio resource utilization

Номер: US9699737B2
Принадлежит: AT&T INTELLECTUAL PROPERTY I LP

To facilitate increasing power and resource efficiency of a mobile device, in the mobile device, with regard to periodic or one-time data transfers, a communication management component can analyze information comprising data transfer parameter information, including jitter information, associated with each application of a subset of applications used by the device and can desirably schedule and/or bundle data transfers associated with the applications to reduce the number of separate data bursts to transfer that data to thereby reduce use of wireless resources and power consumption by the device. A push notification system can receive respective jitter information associated with each application from the mobile device, and the push notification system can desirably schedule and/or bundle push notifications to reduce the number of separate data bursts sent to the device to reduce use of wireless resources and power consumption by the device.

Подробнее
15-11-1931 дата публикации

Apparatus for making frothy milk.

Номер: CH150600A
Автор: Gerber Alexandre
Принадлежит: Gerber Alexandre

Подробнее
16-02-2016 дата публикации

Controlling traffic transmissions to manage cellular radio resource utilization

Номер: US9264872B2
Принадлежит: AT&T INTELLECTUAL PROPERTY I LP

Techniques for using controlling traffic transmissions to manage radio resource utilization are presented herein. When content is being streamed to user equipment (UE) and is at least initially intended to be streamed in real time at a constant bitrate, a communication management component can determine whether the content being transmitted to the UE can be delayed, instead of being transmitted in real time. In response to determining that the content can be delayed, the communication management component can facilitate buffering data and periodically streaming the data to the UE in data bursts to reduce use of UE power and radio resources. When transmitting a visual image to a UE, the communication management component can adjust resolution of a visual image to correspond to screen dimensions of the UE based on information indicating screen dimensions of the UE that can be received from the UE.

Подробнее
10-06-2014 дата публикации

Inferring TCP initial congestion window

Номер: US8750109B2

A packet trace is received. Inter-arrival times between the multiple packets in the packet trace are determined. An inter-arrival time in the inter-arrival times that is greater than a threshold is identified. An order number of the inter-arrival time is identified. A determination is made as to whether a size of each of at least a portion of the multiple packets is equal to a maximum segment size. When a determination is made that the size of each of at least a portion of the multiple packets is equal to the maximum segment size, a size of the ICW as a product of the order number and the maximum segment size is returned.

Подробнее
08-03-2017 дата публикации

Hybrid unicast/anycast content distribution network

Номер: EP2361475B1
Принадлежит: AT&T INTELLECTUAL PROPERTY I LP

Подробнее
17-02-2015 дата публикации

System and method to guide active participation in peer-to-peer systems with passive monitoring environment

Номер: US8959243B2
Принадлежит: AT&T Intellectual Property II LP

A method includes identifying shared content by inspecting a peer-to-peer traffic flow and identifying source peers providing the shared content, and requesting the shared content from the source peers. The method further includes receiving requests for the shared content from requesting peers, identifying requesting peers based on the requests for the shared content, and providing the shared content to a local subset of the requesting peers.

Подробнее
20-01-2011 дата публикации

Indirect measurement methodology to infer routing changes using statistics of flow arrival processes

Номер: US20110013525A1
Принадлежит: AT&T INTELLECTUAL PROPERTY I LP

Statistical methods are used to observe packet flow arrival processes and to infer routing changes from those observations. Packet flow arrivals are monitored using NetFlow or another packet flow monitoring arrangement. Packet flow arrivals are quantified by counting arrivals per unit time, or by measuring an inter-arrival time between flows. When a change in packet flow arrivals is determined to be statistically significant, a change in network routing protocol is reported.

Подробнее
13-01-2011 дата публикации

Hybrid unicast/anycast content distribution network

Номер: WO2010056761A8
Принадлежит: AT&T Intellectual Property I, L.P.

A method includes receiving a request for an edge cache address, and comparing a requestor address to an anycast group. The method can further include providing an anycast edge cache address when the requestor address is in the anycast group. Alternatively, the method can further include determining an optimal cache server, and providing a unicast address of the optimal cache server when the requestor address is not in the anycast group.

Подробнее
07-02-2008 дата публикации

Method and apparatus for presenting advertisements

Номер: US20080033794A1
Принадлежит: SBC Knowledge Ventures LP

A method and apparatus for presenting advertisements is disclosed. An apparatus that incorporates teachings of the present disclosure may include, for example, a system having an inspection element that monitors packet traffic associated with an end user, and determines a behavioral profile of the end user from the monitored packet traffic, a publisher element that detects an end user visiting a website managed thereby, and generates an advertisement request associated with the website, and advertisement element that selects one or more advertisements according to the behavioral profile of the end user, and submits said one or more advertisements to the publisher element for presentation thereof to the end user. Additional embodiments are disclosed.

Подробнее
03-06-2014 дата публикации

Method and apparatus for detecting tethering in a communications network

Номер: US8745225B2
Принадлежит: AT&T INTELLECTUAL PROPERTY I LP

A method, non-transitory computer readable medium and apparatus for detecting a tethering function being performed by an endpoint device in a communications network are disclosed. For example, the method analyzes a data packet directed towards the endpoint device, detects a signature based upon analyzing the data packet, and identifies the endpoint device as performing the tethering function based upon detecting the signature.

Подробнее
12-02-2013 дата публикации

Method and system for computing multicast traffic matrices

Номер: US8374103B2
Принадлежит: AT&T INTELLECTUAL PROPERTY I LP

A system and method for receiving, from one or more ingress routers, a first set of records including data corresponding to network traffic, receiving, from one or more egress routers, a second set of records including data corresponding to network traffic and creating a multicast traffic matrix using at least a portion of the data included in the first and second sets of records.

Подробнее
25-11-2010 дата публикации

Method and System for Computing Multicast Traffic Matrices

Номер: US20100296430A1
Принадлежит: AT&T Labs Inc

A system and method for receiving, from one or more ingress routers, a first set of records including data corresponding to network traffic, receiving, from one or more egress routers, a second set of records including data corresponding to network traffic and creating a multicast traffic matrix using at least a portion of the data included in the first and second sets of records.

Подробнее
14-04-2011 дата публикации

Tcp flow clock extraction

Номер: US20110085630A1
Принадлежит: Individual

A packet trace is received. The packet trace is transformed into a sequence of pulse signals in a temporal domain. The sequence of pulse signals in the temporal domain is transformed into a sequence of pulse signals in a frequency domain. Peaks are detected within relevant frequency bands in the sequence of pulse signals in the frequency domain. A fundamental frequency is identified within the peaks. The fundamental frequency, which represents the TCP flow clock, is returned.

Подробнее
30-06-2011 дата публикации

Method and apparatus for automated end to end content tracking in peer to peer environments

Номер: US20110161313A1
Принадлежит: AT&T INTELLECTUAL PROPERTY I LP

A method, computer readable medium and system for automatically tracking content in a peer-to-peer environment are disclosed. For example, the method monitors a number of times each content title of a plurality of content titles are downloaded in the peer-to-peer environment, adds one or more content titles of the plurality of content titles that are downloaded above a predetermined threshold to a list, downloads each one of the one or more content titles in the list via the peer-to-peer environment and verifies that each one of the one or more content titles that are downloaded matches at least one content title in the list.

Подробнее
05-02-2009 дата публикации

Method and apparatus for presenting advertisements

Номер: WO2008011242A3

A method and apparatus for presenting advertisements is disclosed. An apparatus that incorporates teachings of the present disclosure may include, for example, a system having an inspection element that monitors packet traffic associated with an end user, and determines a behavioral profile of the end user from the monitored packet traffic, a publisher element that detects an end user visiting a website managed thereby, and generates an advertisement request associated with the website, and advertisement element that selects one or more advertisements according to the behavioral profile of the end user, and submits said one or more advertisements to the publisher element for presentation thereof to the end user. Additional embodiments are disclosed.

Подробнее
24-01-2008 дата публикации

Method and apparatus for presenting advertisements

Номер: WO2008011242A2
Принадлежит: At & T Knowledge Ventures, L.P.

A method and apparatus for presenting advertisements is disclosed. An apparatus that incorporates teachings of the present disclosure may include, for example, a system having an inspection element that monitors packet traffic associated with an end user, and determines a behavioral profile of the end user from the monitored packet traffic, a publisher element that detects an end user visiting a website managed thereby, and generates an advertisement request associated with the website, and advertisement element that selects one or more advertisements according to the behavioral profile of the end user, and submits said one or more advertisements to the publisher element for presentation thereof to the end user. Additional embodiments are disclosed.

Подробнее
16-05-2017 дата публикации

Controlling traffic transmissions to manage cellular radio resource utilization

Номер: US09654950B2
Принадлежит: AT&T INTELLECTUAL PROPERTY I LP

Techniques control traffic transmissions to manage radio resource utilization. When content is being streamed to user equipment (UE) and is at least initially intended to be streamed in real time at a constant bitrate, a communication management component can determine whether the content being transmitted to the UE can be delayed, instead of being transmitted in real time. In response to determining that the content can be delayed, the communication management component can facilitate buffering data and periodically streaming the data to the UE in data bursts to reduce use of UE power and radio resources. When transmitting a visual image to a UE, the communication management component can adjust resolution of a visual image to correspond to screen dimensions of the UE based on information indicating screen dimensions of the UE that can be received from the UE.

Подробнее