US20110317561A1 - Method, apparatus and system for improving packet throughput based on classification of packet loss in data transmissions - Google Patents

Method, apparatus and system for improving packet throughput based on classification of packet loss in data transmissions Download PDF

Info

Publication number
US20110317561A1
US20110317561A1 US13/227,849 US201113227849A US2011317561A1 US 20110317561 A1 US20110317561 A1 US 20110317561A1 US 201113227849 A US201113227849 A US 201113227849A US 2011317561 A1 US2011317561 A1 US 2011317561A1
Authority
US
United States
Prior art keywords
packets
lost
mobile device
delivery strategy
selective acknowledgements
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US13/227,849
Inventor
Jonathan Sau
Xinhua Ling
Bruno Preiss
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BlackBerry Ltd
Malikie Innovations Ltd
Original Assignee
Research in Motion Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Research in Motion Ltd filed Critical Research in Motion Ltd
Priority to US13/227,849 priority Critical patent/US20110317561A1/en
Assigned to RESEARCH IN MOTION LIMITED reassignment RESEARCH IN MOTION LIMITED ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: LING, XINHUA, PREISS, BRUNO, Sau, Jonathan
Publication of US20110317561A1 publication Critical patent/US20110317561A1/en
Assigned to MALIKIE INNOVATIONS LIMITED reassignment MALIKIE INNOVATIONS LIMITED ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BLACKBERRY LIMITED
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/0001Systems modifying transmission characteristics according to link quality, e.g. power backoff
    • H04L1/0002Systems modifying transmission characteristics according to link quality, e.g. power backoff by adapting the transmission rate
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/12Arrangements for detecting or preventing errors in the information received by using return channel
    • H04L1/16Arrangements for detecting or preventing errors in the information received by using return channel in which the return channel carries supervisory signals, e.g. repetition request signals
    • H04L1/18Automatic repetition systems, e.g. Van Duuren systems
    • H04L1/1809Selective-repeat protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/26Flow control; Congestion control using explicit feedback to the source, e.g. choke packets
    • H04L47/263Rate modification at the source after receiving feedback
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Definitions

  • the present specification relates generally to computing and more specifically relates to a method, apparatus and system for improving packet throughput based on classification of packet loss in data transmissions.
  • TCP Transmission Control Protocol
  • Many network transport protocols feature adaptive congestion control mechanisms, in which the data transmission rate is dynamically adjusted to the network condition in order to utilize the available bandwidth optimally. For example, when available bandwidth is detected, the transport protocol increases the rate of data transmission. When network congestion is detected, the transport protocol reduces the rate of data transmission.
  • Some network transport protocols use packet loss as an indication that network congestion has occurred. While this method is well suited to networks in which the predominant cause of packet loss is network congestion, it does not work well in networks in which a non-negligible amount of packet loss is caused by reasons other than network congestion. For example, in a wireless network, a significant source of packet loss is due to transmission errors caused by fluctuating signal strength, thermal noise and interference.
  • FEC forward error correction
  • ARQ automatic retransmission requests
  • FIG. 1 shows a schematic representation of a system for improving packet throughput based on classification of packet loss in data transmissions.
  • FIG. 2 shows a schematic representation of the portable computing device of FIG. 1 .
  • FIG. 3 shows a flow-chart depicting a method for improving packet throughput based on classification of packet loss in data transmissions.
  • FIG. 4 shows the system of claim 1 during exemplary performance of the method in FIG. 3 .
  • FIG. 5 shows the system of claim 1 during a second exemplary performance of the method in FIG. 3 .
  • FIG. 6 shows a representation of the structure of selective acknowledgements from FIG. 5 .
  • FIG. 7 shows the system of claim 1 during a third exemplary performance of the method in FIG. 3 .
  • FIG. 8 shows a representation of the structure of selective acknowledgements from FIG. 7 .
  • An aspect of the specification provides a method for improving packet throughput comprising:
  • the method can further comprise: if said lost packets were not clustered, adjusting said delivery strategy using a second factor to accommodate a second type of packet loss.
  • the first type of packet loss can be loss due to congestion on said link.
  • the first factor can comprise reducing a data transmission rate.
  • the second type of packet loss can be loss due to transmission errors.
  • At least a portion of the link can be wireless and said transmission errors can occur over said wireless portion. At least a portion of said link can be characterized by a non-negligible chance of packet loss due to transmission error.
  • the second factor can comprise no adjustment to said delivery strategy.
  • the first type of packet loss can be congestion loss and at the same time the second type of packet loss can be loss due to transmission errors.
  • the first factor can comprise reducing a data transmission rate by a first amount and said second factor can comprise reducing said data transmission rate by a second amount, and the second amount is less than said first amount.
  • the second amount can be zero.
  • the method can further comprise, where said lost packets were not clustered, maintaining said delivery strategy.
  • a computer comprising an interface connected to a network configured to receive selective acknowledgements from a receiving computer that is connected to said interface by a link that is shared with at least one additional computer.
  • the selective acknowledgements are responsive to packets sent via said interface to said receiving computer according to a delivery strategy.
  • the computer also comprises a processor connected to said interface and is configured to maintain said delivery strategy.
  • the processor is further configured to determine from said selective acknowledgements whether any of said packets were lost.
  • the processor further is configured to maintain said delivery strategy if said selective acknowledgements indicate none of said packets were lost.
  • the processor is further configured to determine whether any of said lost packets were clustered if said selective acknowledgements indicate packets were lost.
  • the processor is also configured to adjust said delivery strategy using a first factor to accommodate a first type of packet loss if said lost packets were clustered.
  • the processor can be further configured to adjust said delivery strategy using a second factor if said lost packets were not clustered in order to accommodate a second type of packet loss.
  • the sending or receiving computer can be a portable electronic device.
  • the sending computer or recipient can be a server.
  • Another aspect of the specification provides a system comprising a sending computer connectable to a link and a receiving computer connectable to said sending computer via said link.
  • the sending computer is configured to receive selective acknowledgements from said receiving computer.
  • the selective acknowledgements are responsive to packets sent from said sending computer to said receiving computer according to a delivery strategy.
  • the sending computer is configured to maintain said delivery strategy.
  • the sending computer is further configured to determine from said selective acknowledgements whether any of said packets were lost.
  • the sending computer is further configured to maintain said delivery strategy if said selective acknowledgements indicate none of said packets were lost.
  • the sending computer is further configured to determine whether any of said lost packets were clustered if said selective acknowledgements indicate packets were lost.
  • the sending computer is further configured to adjust said delivery strategy using a first factor to accommodate a first type of packet loss if said lost packets were clustered.
  • Another aspect of the specification comprises a computer readable storage device, such as a persistent or volatile storage device, containing programming instructions executable on a processor of a sending server; said programming instructions comprising the method of:
  • system 50 comprises at least one portable computing device 54 , and a server 58 .
  • a wireless base station 62 interconnects computing device 54 and mediation server 58 .
  • server 58 can be considered a sending computer and computing device 54 can be considered a receiving computer. In certain variations, these roles can be reversed.
  • the sending computer can be either a computing device or a server, while the receiving computer can also be either a computing device or a server.
  • a backhaul link 66 connects base station 62 with server 58 .
  • Backhaul link 66 can be based on a broader network infrastructure such as the Internet. In a present example it will be assumed that backhaul link 66 is a wired link.
  • a wireless link 70 connects base station 62 with computing device 54 .
  • Link 70 can be based on a variety of protocols, including, without limitation, Global System for Mobile communications (GSM), General Packet Radio Service (GPRS), Enhanced Data Rates for GSM Evolution (EDGE), 3G, 4G, Universal Mobile Telecommunications System (UMTS), Institute of Electrical and Electronics Engineers (IEEE) Standard 802.11, IEEE 802.15, Bluetooth.
  • GSM Global System for Mobile communications
  • GPRS General Packet Radio Service
  • EDGE Enhanced Data Rates for GSM Evolution
  • 3G Third Generation
  • 4G Universal Mobile Telecommunications System
  • UMTS Universal Mobile Telecommunications System
  • IEEE Institute of Electrical and Electronics Engineers
  • Computing device 54 is configured to maintain and execute a first packet manager application 74
  • server 58 is configured to maintain a second packet manager 67 which will be discussed further below.
  • computing device 54 can be any type of electronic device that can be used in a self-contained manner and to interact with server 58 . Interaction includes displaying information on a display of computing device 54 based on content received over link 70 , as well as receiving input at computing device 54 that can in turn be sent back over link 70 . It should be emphasized that the structure in FIG. 2 is purely exemplary, and contemplates a device that can be used for both wireless voice (e.g. telephony) and wireless data (e.g. email, web browsing, text) communications.
  • computing device 54 is a mobile electronic device with the combined functionality of a personal digital assistant, a cell phone, and an email paging device. Many well known cellular telephone models, or variants thereof, are suitable for the present embodiment.
  • Device 54 thus includes a plurality of input devices which in a present embodiment include a keyboard 200 , a pointing device 202 , and a microphone 204 .
  • Pointing device 202 can be implemented as a track wheel, trackball, touch-screen or the like.
  • Input from keyboard 200 , pointing device 202 and microphone 204 is received at a processor 208 .
  • Processor 208 is configured to communicate with a non-volatile storage unit 212 (e.g. Erasable Electronic Programmable Read Only Memory (“EEPROM”), Flash Memory) and a volatile storage unit 216 (e.g. random access memory (“RAM”)).
  • EEPROM Erasable Electronic Programmable Read Only Memory
  • RAM random access memory
  • non-volatile storage unit 212 Programming instructions that implement the functional teachings of device 54 as described herein are typically maintained, persistently, in non-volatile storage unit 212 and used by processor 208 which makes appropriate utilization of volatile storage 216 during the execution of such programming instructions.
  • processor 208 which makes appropriate utilization of volatile storage 216 during the execution of such programming instructions.
  • non-volatile storage unit 212 and volatile storage 216 are non-limiting examples of computer readable media that can store programming instructions executable on processor 208 .
  • Processor 208 in turn is also configured to control a speaker 220 and a display 224 .
  • Processor 208 also connects to a network interface 228 , which are implemented in a present embodiment as radios configured to communicate over link 70 .
  • interface 228 is configured to correspond with the network architecture that is used to implement link 70 . (In other embodiments a plurality of links 70 with different protocols can be employed and thus a plurality of interfaces can be provided to support each link.) It should be understood that in general a wide variety of configurations for device 54 are contemplated.
  • device 54 is also configured to maintain packet manager application 74 .
  • Packet manager application 74 is configured to cooperate with packet manager application 67 in order to manage loss of packets in transmissions between server 58 and device 54 .
  • Packet manager application 74 is maintained within non-volatile storage 212 .
  • Processor 208 is configured to execute packet manager application 74 .
  • Device 54 also includes a battery 240 or other power supply. Battery 240 provides power to components within device 54 .
  • server 58 can be based on any well-known server environment including a module that houses one or more central processing units, volatile memory (e.g. random access memory), persistent memory (e.g. hard disk devices) and network interfaces to allow server 58 to communicate over relevant links.
  • server 58 can be a Sun Fire V480 running a UNIX operating system, from Sun Microsystems, Inc. of Palo Alto Calif., and having four central processing units each operating at about nine-hundred megahertz and having about sixteen gigabytes of random access memory.
  • this particular server is merely exemplary, and a vast array of other types of computing environments for server 58 is contemplated.
  • non-volatile storage and volatile storage are non-limiting examples of computer readable media that can store programming instructions executable on the processor of server 58 .
  • Method 300 can be implemented on system 50 or a suitable variation thereof.
  • server 58 is configured to send a plurality of packets Pa via wired link 66 and wireless link 70 to device 54 .
  • packets Pa are sent according to a defined delivery strategy that is configured to accommodate known or expected characteristics of link 66 and link 70 and to thereby obtain an optimum (for example, where circumstances permit, a maximum) bit rate for packets Pa.
  • a default delivery strategy is employed.
  • Such a default delivery strategy can employ, for example, selected transmission rates, error correction techniques like forward error correction (FEC).
  • FEC forward error correction
  • a delivery strategy can include increasing the data transmission rate every so often provided that no congestion is detected.
  • packets Pa are sent via a transport protocol.
  • the transport protocol that is chosen inherently includes the ability to adjust delivery via congestion control and utilizes packet loss as an indication of congestion.
  • An example of a transport protocol is the Transport Control Protocol (TCP).
  • TCP Transport Control Protocol
  • SCTP Stream Control Transmission Protocol
  • device 54 is configured to send selective acknowledgements Sa that correspond to the reception of packets Pa at device 54 .
  • selective acknowledgements Sa can conform to the selective acknowledgments discussed in Mathis et al, Request for Comments: 2018, “RFC 2018—TCP Selective Acknowledgement Options”, October 1996).
  • packet manager application 74 can be configured to send selective acknowledgements Sa utilizing functionality that is described in RFC 2018.
  • selective acknowledgements Sa indicate that ALL packets Pa were received at device 54 .
  • block 305 comprises receiving selective acknowledgements Sa at server 58 .
  • Block 310 comprises determining if any packets were lost based on the selective acknowledgements received at block 305 .
  • selective acknowledgements Sa indicated that ALL packets Pa were received, and therefore a “No” determination is reached at block 310 .
  • Block 315 comprises maintaining the current packet delivery strategy and then method 300 cycles back to block 305 . Recall that where a current strategy includes periodically increasing the data transmission rate provided that no congestion is detected, then “maintaining” can comprise such periodic increasing.
  • server 58 is configured to send a plurality of packets Pb via wired link 66 and wireless link 70 to device 54 .
  • packets Pb are sent according to a defined delivery strategy and packets Pb are sent via a transport protocol.
  • device 54 is configured to send selective acknowledgements Sb that correspond to the reception of packets Pb at device 54 .
  • link 66 is shown as also carrying a plurality of other traffic T, and thus, in the example in FIG. 5 , link 66 is congested.
  • FIG. 6 shows a representation of selective acknowledgements Sb, which indicate that; first packet Pb- 1 ; second packet Pb- 2 ; sixth packet Pb- 6 ; and eighth packet Pb- 8 of packets Pb were NOT received, while the remainder of the packets in packets Pb were received.
  • Block 320 comprises determining if the lost packets were clustered.
  • Various criteria can be defined as to what characteristics of packet loss establish clustered packet loss and thereby reach a “yes” determination at block 320 .
  • the loss of at least a first predefined number (“X”) of packets, out of a second predefined number (“Y”) of consecutively-transmitted packets and within a predefined time span (“Z”) will satisfy the established criteria.
  • the predefined number X can be as low as two.
  • the predefined number X can be greater.
  • the predefined number Y is greater than X.
  • first packet Pb- 1 and second packet Pb- 2 were not received and this satisfies the criteria of a loss of at least two packets, within a certain time span and a certain span of sequence, thereby leading to a “yes” determination at block 320 .
  • the packet delivery strategy is adjusted to accommodate for congestion loss.
  • the congestion due to traffic T has been detected and the packet delivery strategy is adjusted to accommodate for this congestion.
  • the selected congestion loss packet delivery strategy at block 325 is not particularly limited, but examples of such congestion loss packet delivery strategies will be discussed further below.
  • method 300 cycles back to block 305 .
  • server 58 is configured to send a plurality of packets Pc via wired link 66 and wireless link 70 to device 54 .
  • packets Pc are sent according to a defined delivery strategy and packets Pc are sent via a transport protocol.
  • device 54 is configured to send selective acknowledgements Sc that correspond to the reception of packets Pc at device 54 .
  • link 70 is shown as occurring over two time periods, represented using references 70 -t 1 and 70 -t 2 , together corresponding to the transmission of packets Pc.
  • link 70 -t 1 has been interrupted such that link 70 -t 1 is broken and no complete link exists between base station 62 and device 54 . Such breakage can occur for any variety of reasons, such as an object passing along the path between base station 62 and device 54 , or interference from another adjacent radio link.
  • link 70 -t 2 is intact and corresponds to the previously discussed functionality in relation to link 70 .
  • FIG. 8 shows a representation of selective acknowledgements Sc, which indicate that; first packet Pc- 1 ; was NOT received, while the remainder of the packets in packets Pc were received. Thus, according to selective acknowledgements Sc, only one packet has been lost.
  • Block 320 comprises determining if the lost packets were clustered. Referring again to FIG. 8 in relation to block 320 , it can be noted that only packet Pc- 1 was not received. Therefore, according to the previously-discussed criteria example, the determination at block 320 is “no”, because less than two packets were lost within the time span and a sequence of selective acknowledgements Sc.
  • the packet delivery strategy is adjusted to accommodate for wireless loss.
  • wireless loss is a type of loss due to residual errors or transmission errors in link 70 .
  • the selected wireless loss packet delivery strategy at block 325 is not particularly limited, but examples of such congestion loss packet delivery strategies will be discussed further below.
  • method 300 can be performed on portable computing device 54 based on selective acknowledgements received from server 58 .
  • the strategies for block 325 and block 330 are not particularly limited.
  • the congestion loss delivery strategy for block 325 is configured to reduce the data transmission rate by a first factor
  • the corresponding wireless loss delivery strategy for block 330 is configured to reduce the data transmission rate by a second factor.
  • the second factor can also be configured to be an amount that is less than the first factor, such that the data transmission rate for wireless congestion still includes a reduction, but a reduction that is a lesser amount compared with congestion loss.
  • the second factor can also be selected to be zero, such that in effect the wireless loss delivery strategy is to maintain the existing delivery strategy.
  • the second factor can also be configured to vary according to the first factor, and the first factor dynamically varied over time in order to determine a transmission rate that achieves a predefined accepted loss.
  • wireless loss can be considered a specific case of transmission error loss, whereby packets are discarded due to errors introduced during the data transmission, for example due to thermal noise or interference.
  • the wireless medium is an example of a medium where transmission error loss can occur.
  • error control procedures for example forward error correction (FEC) or Automatic Retransmission Request (ARQ)
  • FEC forward error correction
  • ARQ Automatic Retransmission Request
  • the criteria discussed above in the example in relation to FIGS. 4-8 can be varied.
  • An example of such varied criteria is that the loss of at least two clusters can be required in order to reach a “Yes” determination at block 320 .
  • this variation criteria would lead to a “No” determination at block 320 as only one cluster is lost according to selective acknowledgements Sb.

Abstract

A method, apparatus and system for managing loss of packets in data transmissions is provided. In a method embodiment, selective acknowledgements are received at a sending computer from a receiving computer. The sending computer is configured to analyze patterns in the selective acknowledgements and infer a type of packet loss. As a result of the inference, the packet delivery strategy from the sending computer can be adjusted.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application is a continuation of U.S. patent application No. 12/393,327, filed Feb. 26, 2009, the contents of which is incorporated herein by reference.
  • FIELD
  • The present specification relates generally to computing and more specifically relates to a method, apparatus and system for improving packet throughput based on classification of packet loss in data transmissions.
  • BACKGROUND
  • Many network transport protocols (like the Transmission Control Protocol (TCP)) feature adaptive congestion control mechanisms, in which the data transmission rate is dynamically adjusted to the network condition in order to utilize the available bandwidth optimally. For example, when available bandwidth is detected, the transport protocol increases the rate of data transmission. When network congestion is detected, the transport protocol reduces the rate of data transmission. Some network transport protocols use packet loss as an indication that network congestion has occurred. While this method is well suited to networks in which the predominant cause of packet loss is network congestion, it does not work well in networks in which a non-negligible amount of packet loss is caused by reasons other than network congestion. For example, in a wireless network, a significant source of packet loss is due to transmission errors caused by fluctuating signal strength, thermal noise and interference. Furthermore, despite the application of error control technique like forward error correction (FEC) and/or automatic retransmission requests (ARQ), there are often residual transmission errors that are not detected by the error control technique. For transport protocols using packet loss as an indication of network congestion, this will result in the sender unnecessarily reducing the data transmission rate, resulting in poor link utilization.
  • Various solutions have been proposed. For example, “De-randomizing” Congestion Losses To Improve TCP Performance over Wired-Wireless Networks” by Saad Biaz and Nitin H. Vaidya dated Sep. 27, 2004, ACM/IEEE Transactions on Networking June 2005, proposes one solution which relies on having a bottleneck network node that supports drop precedence.
  • As another example, “An Adaptive End-to-End Loss Differentiation Scheme for TCP over Wired/Wireless Networks” by Chang-hyeon Lim, and Ju-wook Jang IJCSNS International Journal of Computer Science and Network Security, VOL. 7 No. 3, March 2007 at page 72, proposes another solution, which uses the variation of round trip time (RTT) as the detection signature.
  • The inventors believe that other solutions for improving packet throughput can be provided.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 shows a schematic representation of a system for improving packet throughput based on classification of packet loss in data transmissions.
  • FIG. 2 shows a schematic representation of the portable computing device of FIG. 1.
  • FIG. 3 shows a flow-chart depicting a method for improving packet throughput based on classification of packet loss in data transmissions.
  • FIG. 4 shows the system of claim 1 during exemplary performance of the method in FIG. 3.
  • FIG. 5 shows the system of claim 1 during a second exemplary performance of the method in FIG. 3.
  • FIG. 6 shows a representation of the structure of selective acknowledgements from FIG. 5.
  • FIG. 7 shows the system of claim 1 during a third exemplary performance of the method in FIG. 3.
  • FIG. 8 shows a representation of the structure of selective acknowledgements from FIG. 7.
  • DESCRIPTION
  • An aspect of the specification provides a method for improving packet throughput comprising:
      • receiving, at a sending computer, selective acknowledgements from a receiving computer that is connected to said sending computer by a link that is shared with at least one additional computer; said selective acknowledgements responsive to packets sent from said sending computer to said receiving computer according to a delivery strategy;
      • determining from said selective acknowledgements whether any of said packets were lost;
      • if said selective acknowledgements indicate none of said packets were lost, maintaining said delivery strategy;
      • if said selective acknowledgements indicate packets were lost, determining if any of said lost packets were clustered;
      • if said lost packets were clustered, adjusting said delivery strategy using a first factor to accommodate a first type of packet loss.
  • The method can further comprise: if said lost packets were not clustered, adjusting said delivery strategy using a second factor to accommodate a second type of packet loss.
  • The first type of packet loss can be loss due to congestion on said link.
  • The first factor can comprise reducing a data transmission rate.
  • The second type of packet loss can be loss due to transmission errors.
  • At least a portion of the link can be wireless and said transmission errors can occur over said wireless portion. At least a portion of said link can be characterized by a non-negligible chance of packet loss due to transmission error.
  • The second factor can comprise no adjustment to said delivery strategy.
  • The first type of packet loss can be congestion loss and at the same time the second type of packet loss can be loss due to transmission errors. In this case the first factor can comprise reducing a data transmission rate by a first amount and said second factor can comprise reducing said data transmission rate by a second amount, and the second amount is less than said first amount. The second amount can be zero.
  • The method can further comprise, where said lost packets were not clustered, maintaining said delivery strategy.
  • Another aspect of the specification provides a computer comprising an interface connected to a network configured to receive selective acknowledgements from a receiving computer that is connected to said interface by a link that is shared with at least one additional computer. The selective acknowledgements are responsive to packets sent via said interface to said receiving computer according to a delivery strategy. The computer also comprises a processor connected to said interface and is configured to maintain said delivery strategy. The processor is further configured to determine from said selective acknowledgements whether any of said packets were lost. The processor further is configured to maintain said delivery strategy if said selective acknowledgements indicate none of said packets were lost. The processor is further configured to determine whether any of said lost packets were clustered if said selective acknowledgements indicate packets were lost. The processor is also configured to adjust said delivery strategy using a first factor to accommodate a first type of packet loss if said lost packets were clustered.
  • The processor can be further configured to adjust said delivery strategy using a second factor if said lost packets were not clustered in order to accommodate a second type of packet loss.
  • The sending or receiving computer can be a portable electronic device.
  • The sending computer or recipient can be a server.
  • Another aspect of the specification provides a system comprising a sending computer connectable to a link and a receiving computer connectable to said sending computer via said link. The sending computer is configured to receive selective acknowledgements from said receiving computer. The selective acknowledgements are responsive to packets sent from said sending computer to said receiving computer according to a delivery strategy. The sending computer is configured to maintain said delivery strategy. The sending computer is further configured to determine from said selective acknowledgements whether any of said packets were lost. The sending computer is further configured to maintain said delivery strategy if said selective acknowledgements indicate none of said packets were lost. The sending computer is further configured to determine whether any of said lost packets were clustered if said selective acknowledgements indicate packets were lost. The sending computer is further configured to adjust said delivery strategy using a first factor to accommodate a first type of packet loss if said lost packets were clustered.
  • Another aspect of the specification comprises a computer readable storage device, such as a persistent or volatile storage device, containing programming instructions executable on a processor of a sending server; said programming instructions comprising the method of:
      • receiving, at a sending computer, selective acknowledgements from a receiving computer that is connected to said sending computer by a link that is shared with at least one additional computer; said selective acknowledgements responsive to packets sent from said sending computer to said receiving computer according to a delivery strategy;
      • determining from said selective acknowledgements whether any of said packets were lost;
      • if said selective acknowledgements indicate none of said packets were lost, maintaining said delivery strategy;
      • if said selective acknowledgements indicate packets were lost, determining if any of said lost packets were clustered;
      • if said lost packets were clustered, adjusting said delivery strategy using a first factor to accommodate a first type of packet loss.
  • Referring now to FIG. 1, an exemplary system for improving packet throughput based on classification of packet loss in data transmissions is indicated generally at 50. In a present embodiment system 50 comprises at least one portable computing device 54, and a server 58. A wireless base station 62 interconnects computing device 54 and mediation server 58. As will be discussed further below, in more general terms server 58 can be considered a sending computer and computing device 54 can be considered a receiving computer. In certain variations, these roles can be reversed. In other variations the sending computer can be either a computing device or a server, while the receiving computer can also be either a computing device or a server.
  • A backhaul link 66 connects base station 62 with server 58. Backhaul link 66 can be based on a broader network infrastructure such as the Internet. In a present example it will be assumed that backhaul link 66 is a wired link.
  • A wireless link 70 connects base station 62 with computing device 54. Link 70 can be based on a variety of protocols, including, without limitation, Global System for Mobile communications (GSM), General Packet Radio Service (GPRS), Enhanced Data Rates for GSM Evolution (EDGE), 3G, 4G, Universal Mobile Telecommunications System (UMTS), Institute of Electrical and Electronics Engineers (IEEE) Standard 802.11, IEEE 802.15, Bluetooth.
  • Computing device 54 is configured to maintain and execute a first packet manager application 74, and server 58 is configured to maintain a second packet manager 67 which will be discussed further below.
  • Referring briefly now to FIG. 2, computing device 54 can be any type of electronic device that can be used in a self-contained manner and to interact with server 58. Interaction includes displaying information on a display of computing device 54 based on content received over link 70, as well as receiving input at computing device 54 that can in turn be sent back over link 70. It should be emphasized that the structure in FIG. 2 is purely exemplary, and contemplates a device that can be used for both wireless voice (e.g. telephony) and wireless data (e.g. email, web browsing, text) communications. In a present embodiment, computing device 54 is a mobile electronic device with the combined functionality of a personal digital assistant, a cell phone, and an email paging device. Many well known cellular telephone models, or variants thereof, are suitable for the present embodiment.
  • Device 54 thus includes a plurality of input devices which in a present embodiment include a keyboard 200, a pointing device 202, and a microphone 204. Pointing device 202 can be implemented as a track wheel, trackball, touch-screen or the like. Input from keyboard 200, pointing device 202 and microphone 204 is received at a processor 208. Processor 208 is configured to communicate with a non-volatile storage unit 212 (e.g. Erasable Electronic Programmable Read Only Memory (“EEPROM”), Flash Memory) and a volatile storage unit 216 (e.g. random access memory (“RAM”)). Programming instructions that implement the functional teachings of device 54 as described herein are typically maintained, persistently, in non-volatile storage unit 212 and used by processor 208 which makes appropriate utilization of volatile storage 216 during the execution of such programming instructions. Those skilled in the art will now recognize that non-volatile storage unit 212 and volatile storage 216 are non-limiting examples of computer readable media that can store programming instructions executable on processor 208.
  • Processor 208 in turn is also configured to control a speaker 220 and a display 224. Processor 208 also connects to a network interface 228, which are implemented in a present embodiment as radios configured to communicate over link 70. In general, it will be understood that interface 228 is configured to correspond with the network architecture that is used to implement link 70. (In other embodiments a plurality of links 70 with different protocols can be employed and thus a plurality of interfaces can be provided to support each link.) It should be understood that in general a wide variety of configurations for device 54 are contemplated.
  • In a present embodiment, device 54 is also configured to maintain packet manager application 74. Packet manager application 74 is configured to cooperate with packet manager application 67 in order to manage loss of packets in transmissions between server 58 and device 54. Packet manager application 74 is maintained within non-volatile storage 212. Processor 208 is configured to execute packet manager application 74. Device 54 also includes a battery 240 or other power supply. Battery 240 provides power to components within device 54.
  • Referring again to FIG. 1, server 58 can be based on any well-known server environment including a module that houses one or more central processing units, volatile memory (e.g. random access memory), persistent memory (e.g. hard disk devices) and network interfaces to allow server 58 to communicate over relevant links. For example, server 58 can be a Sun Fire V480 running a UNIX operating system, from Sun Microsystems, Inc. of Palo Alto Calif., and having four central processing units each operating at about nine-hundred megahertz and having about sixteen gigabytes of random access memory. However, it is to be emphasized that this particular server is merely exemplary, and a vast array of other types of computing environments for server 58 is contemplated. Those skilled in the art will now recognize that non-volatile storage and volatile storage are non-limiting examples of computer readable media that can store programming instructions executable on the processor of server 58.
  • Referring now to FIG. 3, a flowchart depicting a method for determining the cause of packet loss in data transmissions is indicated generally at 300. Method 300 can be implemented on system 50 or a suitable variation thereof.
  • To assist in explaining method 300, certain assumptions will be made according to a specific example is shown in FIG. 4, wherein server 58 is configured to send a plurality of packets Pa via wired link 66 and wireless link 70 to device 54. Such packets Pa are sent according to a defined delivery strategy that is configured to accommodate known or expected characteristics of link 66 and link 70 and to thereby obtain an optimum (for example, where circumstances permit, a maximum) bit rate for packets Pa. During an initial transmission of packets from server 58 to device 54, such characteristics may not be known and accordingly a default delivery strategy is employed. Such a default delivery strategy can employ, for example, selected transmission rates, error correction techniques like forward error correction (FEC). A delivery strategy can include increasing the data transmission rate every so often provided that no congestion is detected.
  • In a present embodiment packets Pa are sent via a transport protocol. The transport protocol that is chosen inherently includes the ability to adjust delivery via congestion control and utilizes packet loss as an indication of congestion. An example of a transport protocol is the Transport Control Protocol (TCP). Another example transport protocol is the Stream Control Transmission Protocol (SCTP).
  • Also in the example in FIG. 4, device 54 is configured to send selective acknowledgements Sa that correspond to the reception of packets Pa at device 54. As an example, selective acknowledgements Sa can conform to the selective acknowledgments discussed in Mathis et al, Request for Comments: 2018, “RFC 2018—TCP Selective Acknowledgement Options”, October 1996). Thus, in this example, packet manager application 74 can be configured to send selective acknowledgements Sa utilizing functionality that is described in RFC 2018.
  • According to the example in FIG. 4, it will be assumed that selective acknowledgements Sa indicate that ALL packets Pa were received at device 54.
  • Thus, continuing with the example in FIG. 4, block 305 comprises receiving selective acknowledgements Sa at server 58. Block 310 comprises determining if any packets were lost based on the selective acknowledgements received at block 305. In the example discussed in relation to FIG. 4, selective acknowledgements Sa indicated that ALL packets Pa were received, and therefore a “No” determination is reached at block 310. Block 315 comprises maintaining the current packet delivery strategy and then method 300 cycles back to block 305. Recall that where a current strategy includes periodically increasing the data transmission rate provided that no congestion is detected, then “maintaining” can comprise such periodic increasing.
  • To further assist in explaining method 300, certain assumptions will be made according to another specific example shown in FIG. 5, wherein, like FIG. 4 server 58 is configured to send a plurality of packets Pb via wired link 66 and wireless link 70 to device 54. Like the example in FIG. 4, packets Pb are sent according to a defined delivery strategy and packets Pb are sent via a transport protocol. Also like the example in FIG. 4, in the example in FIG. 5 device 54 is configured to send selective acknowledgements Sb that correspond to the reception of packets Pb at device 54. However in the example, link 66 is shown as also carrying a plurality of other traffic T, and thus, in the example in FIG. 5, link 66 is congested. Thus, according to the example in FIG. 5, it will be assumed that selective acknowledgements Sb indicate packet loss occurred at device 54. FIG. 6 shows a representation of selective acknowledgements Sb, which indicate that; first packet Pb-1; second packet Pb-2; sixth packet Pb-6; and eighth packet Pb-8 of packets Pb were NOT received, while the remainder of the packets in packets Pb were received.
  • Thus, at block 310 in this second example, it is determined that “Yes”, certain packets were lost. Block 320 comprises determining if the lost packets were clustered. Various criteria can be defined as to what characteristics of packet loss establish clustered packet loss and thereby reach a “yes” determination at block 320. In a present embodiment according to this example, the loss of at least a first predefined number (“X”) of packets, out of a second predefined number (“Y”) of consecutively-transmitted packets and within a predefined time span (“Z”) will satisfy the established criteria. The predefined number X can be as low as two. The predefined number X can be greater. The predefined number Y is greater than X.
  • Referring again to FIG. 6 in relation to block 320, it can be noted that first packet Pb-1 and second packet Pb-2 were not received and this satisfies the criteria of a loss of at least two packets, within a certain time span and a certain span of sequence, thereby leading to a “yes” determination at block 320.
  • Assuming a “yes” determination is made at block 320, then at block 325 the packet delivery strategy is adjusted to accommodate for congestion loss. In this example, the congestion due to traffic T has been detected and the packet delivery strategy is adjusted to accommodate for this congestion. The selected congestion loss packet delivery strategy at block 325 is not particularly limited, but examples of such congestion loss packet delivery strategies will be discussed further below.
  • After block 325 method 300 cycles back to block 305.
  • To further assist in explaining method 300, certain assumptions will be made according to another specific example shown in FIG. 7, wherein, like FIG. 4 server 58 is configured to send a plurality of packets Pc via wired link 66 and wireless link 70 to device 54. Like the example in FIG. 4, packets Pc are sent according to a defined delivery strategy and packets Pc are sent via a transport protocol. Also like the example in FIG. 4, in the example in FIG. 7 device 54 is configured to send selective acknowledgements Sc that correspond to the reception of packets Pc at device 54. However in the example, link 70 is shown as occurring over two time periods, represented using references 70-t1 and 70-t2, together corresponding to the transmission of packets Pc. At time period one, link 70-t1 has been interrupted such that link 70-t1 is broken and no complete link exists between base station 62 and device 54. Such breakage can occur for any variety of reasons, such as an object passing along the path between base station 62 and device 54, or interference from another adjacent radio link. However, at time period two, link 70-t2 is intact and corresponds to the previously discussed functionality in relation to link 70.
  • Thus, according to the example in FIG. 8, it will be assumed that selective acknowledgements Sc indicate packet loss occurred at device 54. FIG. 8 shows a representation of selective acknowledgements Sc, which indicate that; first packet Pc-1; was NOT received, while the remainder of the packets in packets Pc were received. Thus, according to selective acknowledgements Sc, only one packet has been lost.
  • Thus, at block 310 in this third example, it is determined that “Yes”, certain packets were lost. Block 320 comprises determining if the lost packets were clustered. Referring again to FIG. 8 in relation to block 320, it can be noted that only packet Pc-1 was not received. Therefore, according to the previously-discussed criteria example, the determination at block 320 is “no”, because less than two packets were lost within the time span and a sequence of selective acknowledgements Sc.
  • Since a “no” determination is made at block 320, then at block 330 the packet delivery strategy is adjusted to accommodate for wireless loss. In this example, the congestion due to the erratic behavior of link 70-t1 and link 70-t2 has been detected and the packet delivery strategy is adjusted to accommodate for these wireless losses. It will be understood that wireless loss is a type of loss due to residual errors or transmission errors in link 70. The selected wireless loss packet delivery strategy at block 325 is not particularly limited, but examples of such congestion loss packet delivery strategies will be discussed further below. After block 330 method 300 cycles back to block 305.
  • It should be understood that method 300 can be performed on portable computing device 54 based on selective acknowledgements received from server 58.
  • As indicated earlier, the strategies for block 325 and block 330 are not particularly limited. In a specific embodiment, the congestion loss delivery strategy for block 325 is configured to reduce the data transmission rate by a first factor, and the corresponding wireless loss delivery strategy for block 330 is configured to reduce the data transmission rate by a second factor. The second factor can also be configured to be an amount that is less than the first factor, such that the data transmission rate for wireless congestion still includes a reduction, but a reduction that is a lesser amount compared with congestion loss. The second factor can also be selected to be zero, such that in effect the wireless loss delivery strategy is to maintain the existing delivery strategy. The second factor can also be configured to vary according to the first factor, and the first factor dynamically varied over time in order to determine a transmission rate that achieves a predefined accepted loss.
  • In general, it should be understood that the teachings can be modified to apply to any sending computer and receiving computer joined by a link or any shared medium over which, in addition to packet loss caused by congestion, there is a non-negligible number of packets lost due to transmission errors.
  • Also, in general, it should be understood that wireless loss can be considered a specific case of transmission error loss, whereby packets are discarded due to errors introduced during the data transmission, for example due to thermal noise or interference. The wireless medium is an example of a medium where transmission error loss can occur. In the case when error control procedures are used (for example forward error correction (FEC) or Automatic Retransmission Request (ARQ)), any residual errors not detected and corrected by the error control procedure can contribute to transmission errors.
  • Combinations, subsets and variations of the foregoing are also contemplated. For example, the criteria discussed above in the example in relation to FIGS. 4-8, can be varied. An example of such varied criteria is that the loss of at least two clusters can be required in order to reach a “Yes” determination at block 320. Thus, according to the example in FIG. 6, this variation criteria would lead to a “No” determination at block 320 as only one cluster is lost according to selective acknowledgements Sb. In another variation embodiment, a cluster can also be deemed to occur if there are at least X1 lost packets out of Y1 consecutively-transmitted packets within a predefined time span Z1 OR if there's at least X2 lost packets out of Y2 consecutively-transmitted packets within time span Z2, where X2>=X1, Y2>=Y1, and Z2>=Z1.
  • The claims attached hereto define the scope of the monopoly sought.

Claims (20)

1. A method for improving packet throughput comprising:
receiving, at a mobile device, selective acknowledgements, said selective acknowledgements responsive to packets sent from said mobile device according to a delivery strategy;
determining from said selective acknowledgements whether any of said packets were lost;
if said selective acknowledgements indicate none of said packets were lost, maintaining said delivery strategy;
if said selective acknowledgements indicate packets were lost, determining if any of said lost packets were clustered by determining whether at least a first number of packets were lost out of a second number of packets sent within a predefined time period;
if said lost packets were clustered, adjusting said delivery strategy using a first factor to accommodate a first type of packet loss;
if said lost packets were not clustered, adjusting said delivery strategy using a second factor to accommodate a second type of packet loss.
2. The method of claim 1 wherein said first type of packet loss is loss due to congestion on said link, and wherein said second type of packet loss is loss due to transmission errors.
3. The method of claim 2 wherein said first factor comprises reducing a data transmission rate by a first amount and said second factor comprises reducing said data transmission rate by a second amount; said second amount being less than said first amount.
4. The method of claim 3 wherein said second amount is zero.
5. The method of claim 1, wherein the second number of packets are sent consecutively within the period of time.
6. The method of claim 1, wherein the first number is at least two, and wherein the second number is greater than the first number.
7. The method of claim 1, wherein determining if any of said lost packets were clustered comprises determining whether at least a first number of packets were lost out of a second number of packets sent within a predefined time period, or whether at least a third number of packets were lost out of a fourth number of packets sent within another predefined time period.
8. The method of claim 7, wherein the third number is greater than the first number, and wherein the fourth number is greater than the second number, and wherein the another predefined time period is greater than the predefined time period.
9. A mobile device comprising:
an interface connected to a network configured to receive selective acknowledgements, said selective acknowledgements responsive to packets sent from said mobile device via said interface according to a delivery strategy;
a processor connected to said interface and configured to maintain said delivery strategy; said processor further configured to determine from said selective acknowledgements whether any of said packets were lost;
said processor further configured to maintain said delivery strategy if said selective acknowledgements indicate none of said packets were lost,
said processor further configured, if said selective acknowledgements indicate packets were lost, to determine whether any of said lost packets were clustered by determining whether at least a first number of packets were lost out of a second number of packets sent within a predefined time period;
said processor configured to adjust said delivery strategy using a first factor to accommodate a first type of packet loss if said lost packets were clustered;
said processor further configured to adjust said delivery strategy using a second factor if said lost packets were not clustered in order to accommodate a second type of packet loss.
10. The mobile device of claim 9 wherein the mobile device is one of a portable electronic device and a server.
11. The mobile device of claim 9, wherein the second number of packets are sent consecutively within the period of time.
12. The mobile device of claim 9 wherein said first type of packet loss is loss due to congestion on said link, and wherein said second type of packet loss is loss due to transmission errors.
13. The mobile device of claim 12 wherein said first factor comprises reducing a data transmission rate by a first amount and said second factor comprises reducing said data transmission rate by a second amount; said second amount being less than said first amount.
14. The mobile device of claim 13 wherein said second amount is zero.
15. The mobile device of claim 9, wherein the first number is at least two, and wherein the second number is greater than the first number.
16. The mobile device of claim 9 wherein determining if any of said lost packets were clustered comprises determining whether at least a first number of packets were lost out of a second number of packets sent within a predefined time period, or whether at least a third number of packets were lost out of a fourth number of packets sent within another predefined time period.
17. The mobile device of claim 16, wherein the third number is greater than the first number, and wherein the fourth number is greater than the second number, and wherein the another predefined time period is greater than the predefined time period.
18. A system comprising:
a mobile device connectable to a link;
a server connectable to said mobile device via said link;
said mobile device configured to receive selective acknowledgements from said server; said selective acknowledgements responsive to packets sent from said mobile device to said server according to a delivery strategy;
said mobile device configured to maintain said delivery strategy; said mobile device further configured to determine from said selective acknowledgements whether any of said packets were lost;
said mobile device further configured to maintain said delivery strategy if said selective acknowledgements indicate none of said packets were lost,
said mobile device further configured, if said selective acknowledgements indicate packets were lost, to determine whether any of said lost packets where clustered by determining whether at least a first number of packets were lost out of a second number of packets sent within a predefined time period;
said mobile device configured to adjust said delivery strategy using a first factor to accommodate a first type of packet loss if said lost packets were clustered;
said mobile device further configured to adjust said delivery strategy using a second factor if said lost packets were not clustered in order to accommodate a second type of packet loss.
19. The system of claim 18, wherein at least a portion of said link is wireless.
20. A computer readable storage device containing programming instructions executable on a processor of a mobile device; said programming instructions comprising the method of:
receiving, at the mobile device, selective acknowledgements, said selective acknowledgements responsive to packets sent from said mobile device according to a delivery strategy;
determining from said selective acknowledgements whether any of said packets were lost;
if said selective acknowledgements indicate none of said packets were lost, maintaining said delivery strategy;
if said selective acknowledgements indicate packets were lost, determining if any of said lost packets were clustered by determining whether at least a first number of packets were lost out of a second number of packets sent within a predefined time period;
if said lost packets were clustered, adjusting said delivery strategy using a first factor to accommodate a first type of packet loss;
if said lost packets were not clustered, adjusting said delivery strategy using a second factor to accommodate a second type of packet loss.
US13/227,849 2009-02-26 2011-09-08 Method, apparatus and system for improving packet throughput based on classification of packet loss in data transmissions Abandoned US20110317561A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US13/227,849 US20110317561A1 (en) 2009-02-26 2011-09-08 Method, apparatus and system for improving packet throughput based on classification of packet loss in data transmissions

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US12/393,327 US8036223B2 (en) 2009-02-26 2009-02-26 Method, apparatus and system for improving packet throughput based on classification of packet loss in data transmissions
US13/227,849 US20110317561A1 (en) 2009-02-26 2011-09-08 Method, apparatus and system for improving packet throughput based on classification of packet loss in data transmissions

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US12/393,327 Continuation US8036223B2 (en) 2009-02-26 2009-02-26 Method, apparatus and system for improving packet throughput based on classification of packet loss in data transmissions

Publications (1)

Publication Number Publication Date
US20110317561A1 true US20110317561A1 (en) 2011-12-29

Family

ID=42630876

Family Applications (2)

Application Number Title Priority Date Filing Date
US12/393,327 Active 2029-09-10 US8036223B2 (en) 2009-02-26 2009-02-26 Method, apparatus and system for improving packet throughput based on classification of packet loss in data transmissions
US13/227,849 Abandoned US20110317561A1 (en) 2009-02-26 2011-09-08 Method, apparatus and system for improving packet throughput based on classification of packet loss in data transmissions

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US12/393,327 Active 2029-09-10 US8036223B2 (en) 2009-02-26 2009-02-26 Method, apparatus and system for improving packet throughput based on classification of packet loss in data transmissions

Country Status (1)

Country Link
US (2) US8036223B2 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9612902B2 (en) 2012-03-12 2017-04-04 Tvu Networks Corporation Methods and apparatus for maximum utilization of a dynamic varying digital data channel
CN107277423A (en) * 2017-07-28 2017-10-20 北京小米移动软件有限公司 The method and device that packet loss is retransmitted

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8036223B2 (en) * 2009-02-26 2011-10-11 Research In Motion Limited Method, apparatus and system for improving packet throughput based on classification of packet loss in data transmissions
US10951688B2 (en) * 2013-02-27 2021-03-16 Pavlov Media, Inc. Delegated services platform system and method
CN112511381B (en) * 2020-11-20 2022-03-29 鹏城实验室 Link quality event detection method, intelligent terminal and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6097697A (en) * 1998-07-17 2000-08-01 Sitara Networks, Inc. Congestion control
US20060034286A1 (en) * 2004-07-29 2006-02-16 Koning G P High performance TCP for systems with infrequent ACK
US20070070892A1 (en) * 2005-09-23 2007-03-29 Samsung Electronics Co., Ltd. Method of controlling transmission rate and communication device using the same
US20070115814A1 (en) * 2003-03-29 2007-05-24 Regents Of The University Of California, The Method and apparatus for improved data transmission
US7355997B2 (en) * 2004-05-07 2008-04-08 Cisco Technology, Inc. Data rate shifting methods and techniques
US7742420B2 (en) * 1999-04-30 2010-06-22 Ciena Corporation Method and apparatus for bandwidth management of aggregate data flows
US8036223B2 (en) * 2009-02-26 2011-10-11 Research In Motion Limited Method, apparatus and system for improving packet throughput based on classification of packet loss in data transmissions

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5913041A (en) * 1996-12-09 1999-06-15 Hewlett-Packard Company System for determining data transfer rates in accordance with log information relates to history of data transfer activities that independently stored in content servers
US6975591B1 (en) 2000-11-22 2005-12-13 International Business Machines Corporation Methodology for improving TCP throughput over lossy communication links
US7460472B2 (en) 2003-07-25 2008-12-02 Nokia Corporation System and method for transmitting information in a communication network
US8000242B2 (en) * 2006-07-06 2011-08-16 Alcatel Lucent Reducing packet loss for a packet data service during congestion in a transport network

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6097697A (en) * 1998-07-17 2000-08-01 Sitara Networks, Inc. Congestion control
US7742420B2 (en) * 1999-04-30 2010-06-22 Ciena Corporation Method and apparatus for bandwidth management of aggregate data flows
US20070115814A1 (en) * 2003-03-29 2007-05-24 Regents Of The University Of California, The Method and apparatus for improved data transmission
US7355997B2 (en) * 2004-05-07 2008-04-08 Cisco Technology, Inc. Data rate shifting methods and techniques
US20060034286A1 (en) * 2004-07-29 2006-02-16 Koning G P High performance TCP for systems with infrequent ACK
US20070070892A1 (en) * 2005-09-23 2007-03-29 Samsung Electronics Co., Ltd. Method of controlling transmission rate and communication device using the same
US8036223B2 (en) * 2009-02-26 2011-10-11 Research In Motion Limited Method, apparatus and system for improving packet throughput based on classification of packet loss in data transmissions

Non-Patent Citations (6)

* Cited by examiner, † Cited by third party
Title
Biaz et al ,"De-Randomizing Congestion Losses to Improve TCP Performance Over Wired-Wireless Networks"; IEEE ACM Transactions on Networking; pages 596-608 published on June 2005 *
Chungroo et al. ("TCP k-SACK: A Simple Protocol to Improve Performance over Lossy Links"; IEEE GlobeCom 2001; pages 1713-1717 published on November 29 2001) *
Floyd et al. ("The NewReno Modification to TCP's Fast Recovery Algorithm" Request for Comments 3782 published April 2004) *
Floyd et al. ("The NewReno Modification to TCP's Fast Recovery Algorithm" RFC3782 published April 2004) describes TCP New Reno *
IEFT ("RTP: A Transport Protocol for Real-Time Applications" RFC 1889 published January 1996) http://www.ietf.org/rfc/rfc1889.txt *
Mathis et al. ("TCP Selective Acknowledgments Options" Request for Comments 2018 published October 1996) *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9612902B2 (en) 2012-03-12 2017-04-04 Tvu Networks Corporation Methods and apparatus for maximum utilization of a dynamic varying digital data channel
US10020914B2 (en) 2012-03-12 2018-07-10 Tvu Networks Corporation Methods and apparatus for maximum utilization of a dynamic varying digital data channel
CN107277423A (en) * 2017-07-28 2017-10-20 北京小米移动软件有限公司 The method and device that packet loss is retransmitted

Also Published As

Publication number Publication date
US20100214921A1 (en) 2010-08-26
US8036223B2 (en) 2011-10-11

Similar Documents

Publication Publication Date Title
US7924728B2 (en) Systems and methods for energy-conscious communication in wireless ad-hoc networks
US9391907B2 (en) Packet aggregation
Xu et al. CMT-NC: improving the concurrent multipath transfer performance using network coding in wireless networks
Marchi et al. DTSN: distributed transport for sensor networks
US20070091900A1 (en) Prioritized control packet delivery for transmission control protocol (TCP)
US7733913B1 (en) Striping data over transmission channels
US20160112544A1 (en) Transparent Proxy Architecture for Multi-Path Data Connections
RU2505927C1 (en) Method of controlling different-speed traffic streams
US7032153B1 (en) Dynamic automatic retransmission request in wireless access networks
US7903690B2 (en) Method and system of sending an audio stream and a data stream
US20040015591A1 (en) Collective TCP control for improved wireless network performance
US20040170150A1 (en) Quality of service differentiation in wireless networks
US20110317561A1 (en) Method, apparatus and system for improving packet throughput based on classification of packet loss in data transmissions
US20110194490A1 (en) Method for tcp ack containment in unidirectional flows with cross layer optimization in wireless networks
Mast et al. A survey of performance enhancement of transmission control protocol (TCP) in wireless ad hoc networks
Aljubayri et al. Reduce delay of multipath TCP in IoT networks
Rathnayaka et al. Wireless sensor network transport protocol-a state of the art
US20100303053A1 (en) Aggregated session management method and system
WO2013036453A1 (en) Methods, system and apparatus for packet routing using a hop-by-hop protocol in multi-homed environments
US7672279B2 (en) Methods for dynamic radio resource management and link control
EP2224631B1 (en) Method, apparatus and system for improving packet throughput based on classification of packet loss in data transmissions
Tomar et al. Path-Rank-Based Data Chunk Scheduling for Concurrent Multipath Transmission
US10652159B2 (en) Mobile packet data rate control based on radio load and other measures
EP2177064B1 (en) Control of data flow
Zong et al. Transmission control for heterogeneous network composed of MANET and terrestrial-satellite network

Legal Events

Date Code Title Description
AS Assignment

Owner name: RESEARCH IN MOTION LIMITED, CANADA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SAU, JONATHAN;LING, XINHUA;PREISS, BRUNO;REEL/FRAME:026874/0483

Effective date: 20090220

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

AS Assignment

Owner name: MALIKIE INNOVATIONS LIMITED, IRELAND

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BLACKBERRY LIMITED;REEL/FRAME:064104/0103

Effective date: 20230511