Intelligent mobility application profiling with respect to identified communication bursts
First Claim
1. A method, comprising:
- receiving, by a system comprising a processor, network activity data relating to a network device;
analyzing, by the system, cross-layer interaction related to a radio resource control layer of an application executed by the network device;
in response to the analyzing, determining, by the system, a communication burst is represented in the network activity data; and
in response to the determining the communication burst is represented in the network activity data, profiling, by the system, the application executed by the network device.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for analyzing mobile device applications within a wireless data network are presented herein. More particularly, described herein is a novel Intelligent Mobility Application Profiling Tool (iMAP) and/or other mechanisms, systems and methods for profiling and benchmarking applications associated with mobile devices in a wireless data network. Various systems and methods described herein expose cross-layer interaction associated with a network device in order to profile an application on the network device with respect to energy efficiency, performance, and functionality. As described herein, radio resource control (RRC) analysis can be performed to infer RRC states associated with a given application, identify tail time, etc. Further, analyzers are employed for various layers, including transmission control protocol (TCP) and/or hypertext transfer protocol (HTTP), as well as to analyze communication bursts associated with a given application. Analysis results are subsequently utilized to deliver application profiling results to a user.
-
Citations
20 Claims
-
1. A method, comprising:
-
receiving, by a system comprising a processor, network activity data relating to a network device; analyzing, by the system, cross-layer interaction related to a radio resource control layer of an application executed by the network device; in response to the analyzing, determining, by the system, a communication burst is represented in the network activity data; and in response to the determining the communication burst is represented in the network activity data, profiling, by the system, the application executed by the network device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system, comprising:
-
a memory to store instructions; and a processor, coupled to the memory, that facilitates execution of the instructions to perform operations, comprising; receiving information relating to communication activity of a network device; conducting a cross-layer analysis of the information with respect to a radio resource control layer of an application executed by the network device; identifying a communications burst within the communication activity of the network device; and characterizing the application in response to the conducting of the cross-layer analysis and the identifying of the communications burst. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A computer readable storage device comprising computer-executable instructions that, in response to execution, cause a system comprising a processor to perform operations, comprising:
-
receiving network device operation data comprising packet trace data associated with a network device; performing a cross-layer analysis of the network device operation data with respect to a radio resource control layer associated with an application executed by the network device; determining a burst that is represented in the network device operation data; and generating a performance profile of the application in part on in response to the performing of the cross-layer analysis of the network device operation data, and in response to the determining that the burst is represented in the network device operation data. - View Dependent Claims (19, 20)
-
Specification