Prioritizing local and network traffic
First Claim
1. A method, implemented by one or more computing devices, comprising:
- receiving a data packet comprising;
a device identifier; and
a software identifier;
comparing the data packet with a plurality of application signatures to determine whether the data packet was created by a software application that is associated with the software identifier;
determining, for the data packet;
a first priority indicator based on the software identifier, anda second priority indicator based on the device identifier;
in response to determining that a conflict exists between the first priority indicator and the second priority indicator, accessing a rule to resolve the conflict;
assigning, to the data packet and based on the rule, one of the first priority indicator or the second priority indicator; and
sending the data packet via a network flow associated with the assigned one of the first priority indicator or the second priority indicator.
1 Assignment
0 Petitions
Accused Products
Abstract
According to some aspects as described herein, a user may purchase or otherwise be provided with an accelerated service for selected software applications, devices, and/or ports to experience a high level of communication. The accelerated service may be created, for example, by using a dedicated network data flow such that the user'"'"'s customer premise equipment (CPE) network access device may put priority traffic in a different upstream data flow than the commonly shared flow, which may involve tagging the traffic upstream to the network with a priority indicator such as a flow identifier. Based on similar factors, the user may also control local priority of data received downstream from the network for distribution to one or more local devices.
44 Citations
24 Claims
-
1. A method, implemented by one or more computing devices, comprising:
-
receiving a data packet comprising; a device identifier; and a software identifier; comparing the data packet with a plurality of application signatures to determine whether the data packet was created by a software application that is associated with the software identifier; determining, for the data packet; a first priority indicator based on the software identifier, and a second priority indicator based on the device identifier; in response to determining that a conflict exists between the first priority indicator and the second priority indicator, accessing a rule to resolve the conflict; assigning, to the data packet and based on the rule, one of the first priority indicator or the second priority indicator; and sending the data packet via a network flow associated with the assigned one of the first priority indicator or the second priority indicator. - View Dependent Claims (2, 3, 4, 5, 6, 7, 17, 19, 20)
-
-
8. A method comprising:
-
receiving, by a first computing device associated with a user, an indication of a software application, and an identification of a communication port, wherein the indication of the software application comprises an application signature; assigning, by the first computing device, a first priority level to the software application and a second priority level to the communication port; receiving a data packet; determining, by the first computing device, whether the data packet identifies the communication port and the software application, wherein the determining is based in part on examining packet formatting for the data packet; applying, by the first computing device, in response to determining that the data packet identifies the communication port and the software application, a rule to resolve a conflict between the first priority level and the second priority level; assigning, by the first computing device, one of the first priority level or the second priority level to the data packet based on the communication port, the rule, and the application signature that indicates the software application; and sending, based on the assigning, the data packet via a network flow associated with either the first priority level or the second priority level. - View Dependent Claims (9, 10, 11, 18)
-
-
12. A method, implemented by one or more computing devices, comprising:
-
receiving priority configuration information comprising a plurality of priority indicators, the plurality of priority indicators being associated with a software identifier, a communication port identifier, or a device identifier; receiving a plurality of data packets, at least one of the plurality of data packets comprising the following three elements; a communication port identifier, a device identifier, and an application signature that is associated with a software identifier; determining priority indicators for each of the plurality of data packets, the determining being based on one or more of the respective application signature, the device identifier, or the communication port identifier associated with each of the plurality of data packets; resolving, for each of the plurality of data packets and based on a rule, a conflict between the plurality of priority indicators, wherein the rule indicates an order of precedence between the plurality of priority indicators based on one or more of the software identifier, the communication port identifier, or the device identifier; and sending each of the plurality of data packets via a respective network flow and based on the order of precedence. - View Dependent Claims (13, 14, 15, 16)
-
-
21. An apparatus, comprising:
-
one or more processors; and memory storing instructions that, when executed by the one or more processors, cause the apparatus to; receive a data packet comprising; a device identifier; and a software identifier; compare the data packet with a plurality of application signatures to determine whether the data packet was created by a software application that is associated with the software identifier; determine, for the data packet; a first priority indicator based on the software identifier, and a second priority indicator based on the device identifier; in response to determining that a conflict exists between the first priority indicator and the second priority indicator, access a rule to resolve the conflict; assign, to the data packet and based on the rule, one of the first priority indicator or the second priority indicator; and send the data packet via a network flow associated with the assigned one of the first priority indicator or the second priority indicator. - View Dependent Claims (22, 23, 24)
-
Specification