INTELLIGENT MOBILITY APPLICATION PROFILING TOOL
First Claim
1. A method, comprising:
- executing, using at least one processor, computer-readable instructions for performing acts, comprising;
obtaining network activity data relating to at least one network device;
analyzing cross-layer interaction associated with the network activity data between at least one of a radio resource control (RRC) layer, a transport layer, or an application layer; and
identifying bursts indicated within the network activity data and triggering factors of the bursts based at least in part on the cross-layer interaction associated with the network activity data.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for analyzing mobile device applications within a wireless data network are presented herein. More particularly, described herein is a novel Intelligent Mobility Application Profiling Tool (iMAP) and/or other mechanisms, systems and methods for profiling and benchmarking applications associated with mobile devices in a wireless data network. Various systems and methods described herein expose cross-layer interaction associated with a network device in order to profile an application on the network device with respect to energy efficiency, performance, and functionality. As described herein, radio resource control (RRC) analysis can be performed to infer RRC states associated with a given application, identify tail time, etc. Further, analyzers are employed for various layers, including transmission control protocol (TCP) and/or hypertext transfer protocol (HTTP), as well as to analyze communication bursts associated with a given application. Analysis results are subsequently utilized to deliver application profiling results to a user.
-
Citations
20 Claims
-
1. A method, comprising:
executing, using at least one processor, computer-readable instructions for performing acts, comprising; obtaining network activity data relating to at least one network device; analyzing cross-layer interaction associated with the network activity data between at least one of a radio resource control (RRC) layer, a transport layer, or an application layer; and identifying bursts indicated within the network activity data and triggering factors of the bursts based at least in part on the cross-layer interaction associated with the network activity data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
15. A system, comprising:
-
a data collection component configured to obtain information relating to communication activity of at least one network device; an activity analysis component configured to conduct cross-layer analysis of the information obtained by the data collection component with respect to at least one of a radio resource control (RRC) layer, a transport layer, or an application layer; a burst analysis component configured to identify communication bursts within the communication activity of the at least one network device and to infer triggers of the communication bursts; and an application profiling component configured to profile at least one application associated with the at least one network device based at least in part on the cross-layer analysis conducted by the activity analysis component and the bursts identified by the burst analysis component. - View Dependent Claims (16, 17, 18, 19)
-
-
20. A computer program product, comprising:
a computer-readable storage medium, comprising; code for causing a computer to obtain network device operation data including packet trace data and user input data; code for causing a computer to analyze the network device operation data on a radio resource control (RRC) layer, a transport layer and an application layer with respect to at least one network device application; code for causing a computer to identify bursts within the network device operation data; code for causing a computer to identify triggering factors of the bursts within the network device operation data based at least in part on the analysis of the network device operation data; and code for causing a computer to generate a performance profile of the at least one network device application based at least in part on the analysis of the network device operation data, the bursts within the network device operation data, and the triggering factors of the bursts.
Specification