Regulating dataflow between a mobile device and a wireless telecommunications network
First Claim
1. One or more non-transitory computer-readable media having computer-useable instructions embodied thereon for performing a method of regulating a flow of data traffic that is communicated from a mobile device in a wireless coverage area to a wireless telecommunications network, the method comprising:
- performing a packet-inspection process on a portion of the flow of data traffic that is communicated from the mobile device to the wireless telecommunications network, wherein the packet-inspection process comprises selecting a data packet from a plurality of data packets within the flow and inspecting data-packet attributes within the data packet that include a user identifier attribute that identifies a user associated with the mobile device, an application identifier attribute that identifies an application from which the data packet originates, a mobile device identifier attribute that identifies the mobile device, and a sector identifier attribute that identifies a portion of the wireless coverage area; and
based on a value of a data-packet attribute, determining whether to enforce a network policy such that if the value of the data-packet attribute is a first value, then the network policy will be enforced but if the value of the data-packet attribute is a second value, then the network policy will not be enforced, wherein enforcing the network policy includes regulating the flow of data traffic that is communicated from the mobile device to an access node of the wireless telecommunications network, wherein enforcement of the network policy includes prioritizing a flow of data traffic from a first type of application over a flow of data traffic from a second type of application, wherein the flow of data traffic from the second type application is regulated to flow at a lower rate than the flow of data traffic from the first type of application and wherein the enforcement of the network policy is implemented by setting a value of a reverse activity bit (RAB) associated with the flow of data traffic.
6 Assignments
0 Petitions
Accused Products
Abstract
A method and medium are provided for regulating a flow of data traffic that is communicated between a mobile device and a wireless telecommunications network. The method includes performing a data-packet-inspection process on at least a portion of the flow and applying a network policy to a specific wireless telecommunications area based on the results of the inspection. The network policy may be based on the wireless coverage area, the application, or the subscriber from which a data-packet originates. The network policy should also determine the way in which to regulate the flow of data if a policy applies to that particular flow. To enforce the policy, the value of a reverse activity bit may be set in connection with the wireless coverage area so as to regulate the flow of data as dictated by the network policy.
-
Citations
18 Claims
-
1. One or more non-transitory computer-readable media having computer-useable instructions embodied thereon for performing a method of regulating a flow of data traffic that is communicated from a mobile device in a wireless coverage area to a wireless telecommunications network, the method comprising:
- performing a packet-inspection process on a portion of the flow of data traffic that is communicated from the mobile device to the wireless telecommunications network, wherein the packet-inspection process comprises selecting a data packet from a plurality of data packets within the flow and inspecting data-packet attributes within the data packet that include a user identifier attribute that identifies a user associated with the mobile device, an application identifier attribute that identifies an application from which the data packet originates, a mobile device identifier attribute that identifies the mobile device, and a sector identifier attribute that identifies a portion of the wireless coverage area; and
based on a value of a data-packet attribute, determining whether to enforce a network policy such that if the value of the data-packet attribute is a first value, then the network policy will be enforced but if the value of the data-packet attribute is a second value, then the network policy will not be enforced, wherein enforcing the network policy includes regulating the flow of data traffic that is communicated from the mobile device to an access node of the wireless telecommunications network, wherein enforcement of the network policy includes prioritizing a flow of data traffic from a first type of application over a flow of data traffic from a second type of application, wherein the flow of data traffic from the second type application is regulated to flow at a lower rate than the flow of data traffic from the first type of application and wherein the enforcement of the network policy is implemented by setting a value of a reverse activity bit (RAB) associated with the flow of data traffic. - View Dependent Claims (2, 3, 4)
- performing a packet-inspection process on a portion of the flow of data traffic that is communicated from the mobile device to the wireless telecommunications network, wherein the packet-inspection process comprises selecting a data packet from a plurality of data packets within the flow and inspecting data-packet attributes within the data packet that include a user identifier attribute that identifies a user associated with the mobile device, an application identifier attribute that identifies an application from which the data packet originates, a mobile device identifier attribute that identifies the mobile device, and a sector identifier attribute that identifies a portion of the wireless coverage area; and
-
5. A method for regulating a flow of data traffic from a mobile device, the method comprising:
- providing a set of network policies that determine how the flow of data traffic from the mobile device to an access node of a wireless communications network is regulated, wherein the set of network policies includes prioritizing a flow of data traffic from a first type of application over a flow of data traffic from a second type of application, wherein the flow of data traffic from the second type application is regulated to flow at a lower rate than the flow of data traffic from the first type of application;
inspecting data-packet attributes within a data packet that forms a portion of the flow of data traffic from the mobile device, wherein the data-packet attributes include a sector identifier attribute that identifies a sector from which sector a data packet originates, an application identifier attribute that identifies an application from which the data packet originates, and a user identifier attribute that identifies a user associated with the mobile device;
referencing the attributes against the network policies, wherein a value of an attribute is utilized to select one of the network policies; and
based on the referencing, regulating the flow of data traffic consistent with the one of the network policies, wherein the regulation of the flow involves setting a value of a reverse activity bit (RAB) associated with the flow of data traffic. - View Dependent Claims (6, 7, 8, 9, 10, 11, 12)
- providing a set of network policies that determine how the flow of data traffic from the mobile device to an access node of a wireless communications network is regulated, wherein the set of network policies includes prioritizing a flow of data traffic from a first type of application over a flow of data traffic from a second type of application, wherein the flow of data traffic from the second type application is regulated to flow at a lower rate than the flow of data traffic from the first type of application;
-
13. One or more non-transitory computer-readable media having computer-useable instructions embodied thereon for performing a method of regulating a flow of data traffic that is communicated from a mobile device to a wireless telecommunications network, the method comprising:
- receiving the flow of data packets from the mobile device in a wireless coverage area;
inspecting attributes of each data packet in the flow, wherein a user identifier, an application identifier, a mobile device identifier, and a sector identifier are available for inspection in each data packet, each attribute having a corresponding value;
based on one or more of the corresponding values, determining whether or not to enforce a network policy that regulates a flow rate of the flow of data packets from the mobile device, wherein enforcement of the network policy includes prioritizing a flow of data traffic from a first type of application over a flow of data traffic from a second type of application, wherein the flow of data traffic from the second type application is regulated to flow at a lower rate than the flow of data traffic from the first type of application; and
enforcing the network policy by way of setting a reverse-activity-bit (RAB) value associated with the flow. - View Dependent Claims (14, 15, 16, 17, 18)
- receiving the flow of data packets from the mobile device in a wireless coverage area;
Specification