Abstract:
Internet protocol (IP) addresses are received from one or more domain name service (DNS) servers for accessing a remote host in response to a DNS query. The IP addresses are prioritized based on a list of preferred network interfaces associated with a plurality of networks. A network connection is established with the remote host using the most prioritized one of the IP addresses and a network protocol associated with the most prioritized IP address, where the most prioritized IP address is routable to reach the remote host over a network via the most preferred network interface.
Abstract:
An event is detected at a first device. Responsive to the detection, at least some functionality of the first device is deactivated. The presence of a second device, cryptographically paired with the first device, is detected by the first device. Responsive to the detection, at least some functionality of the first device is activated or reactivated.
Abstract:
In some implementations, a network daemon can manage access to a mobile device's network interface. The network daemon (e.g., network connection managing process) can monitor the condition of the mobile device's network connection on one or more interfaces. The network daemon can monitor many conditions on the mobile device. The network daemon can receive background networking requests from network clients (e.g., processes, applications) that specify criteria for initiating a network connection. The network daemon can then smartly manage network connections taking into account network conditions, mobile device conditions and/or client criteria received in the client request. This can help reduce battery life impact, memory usage, likelihood of call drops, data usage cost, and load on network operators.
Abstract:
Techniques for electronic devices to control a multipath transmission control protocol (MPTCP) connection. An MPTCP connection between two endpoints may be established. The MPTCP connection may include at least one MPTCP subflow. At least one of the endpoints may be configured to act as a master with respect to the MPTCP connection. The master may perform one or more control operations on the MPTCP connection, while if one of the endpoints is not a master, that endpoint may not perform control operations on the MPTCP connection. The control operations may include initiating or establishing new MPTCP subflows or modifying a priority level of one or more MPTCP subflows of the MPTCP connection.
Abstract:
Techniques for electronic devices to control a multipath transmission control protocol (MPTCP) connection. An MPTCP connection between two endpoints may be established. The MPTCP connection may include at least one MPTCP subflow. At least one of the endpoints may be configured to act as a master with respect to the MPTCP connection. The master may perform one or more control operations on the MPTCP connection, while if one of the endpoints is not a master, that endpoint may not perform control operations on the MPTCP connection. The control operations may include initiating or establishing new MPTCP subflows or modifying a priority level of one or more MPTCP subflows of the MPTCP connection.
Abstract:
An event is detected at a first device. Responsive to the detection, at least some functionality of the first device is deactivated. The presence of a second device, cryptographically paired with the first device, is detected by the first device. Responsive to the detection, at least some functionality of the first device is activated or reactivated.
Abstract:
An event is detected at a first device. Responsive to the detection, at least some functionality of the first device is deactivated. The presence of a second device, cryptographically paired with the first device, is detected by the first device. Responsive to the detection, at least some functionality of the first device is activated or reactivated.
Abstract:
An event is detected at a first device. Responsive to the detection, at least some functionality of the first device is deactivated. The presence of a second device, cryptographically paired with the first device, is detected by the first device. Responsive to the detection, at least some functionality of the first device is activated or reactivated.
Abstract:
An event is detected at a first device. Responsive to the detection, at least some functionality of the first device is deactivated. The presence of a second device, cryptographically paired with the first device, is detected by the first device. Responsive to the detection, at least some functionality of the first device is activated or reactivated.
Abstract:
An event is detected at a first device. Responsive to the detection, at least some functionality of the first device is deactivated. The presence of a second device, cryptographically paired with the first device, is detected by the first device. Responsive to the detection, at least some functionality of the first device is activated or reactivated.