Tagging and metering network traffic originating from tethered stations

作者: Chandwani Rakesh , Kotecha Lalit R

DOI:

关键词:

摘要: Systems and methods receive first traffic originating from a mobile device second devices tethered to the device; tag indicate that originates devices; subscriber data includes threshold threshold, wherein is associated with determine an amount of exceeds threshold; rate limit without limiting when does not exceed threshold.

参考文章(10)
Joseph Tu-Long Deu-Ngoc, Craig Ian Haight Swann, Data service level uplink data flow control ,(2012)
Michael Shannon Irizarry, Sumeet Singh Bhatia, Narothum Saxena, Mankesh S. Ahluwalia, System And Method For Network Assisted Control And Monetization Of Tethering To Mobile Wireless Devices ,(2011)
Shahzada Rasool, Aik Chindapol, Daniel Vivanco, Yu Zhou, Detecting unauthorized tethering ,(2012)
Yunxin Liu, Guobin Shen, Yongguang Zhang, Hao Han, Power saving wi-fi tethering ,(2012)
Patrick Coffman, Jeremiah Shaw, Steve S. Ko, Robert B. Ulrich, Client-initiated tethering for electronic devices ,(2015)
László Toka, Péter Kersch, Gabor Nemeth, Traffic analysis for HTTP user agent based device category mapping ,(2014)
Arnaud Sahuguet, Resource conscious tethering ,(2012)
Jeffrey Alan Dyck, Uppinder Singh Babbar, Hongshi Guo, Keyur C. Shah, Host-based quality of service for wireless communications ,(2008)