摘要:
Method and apparatus for protecting the routing of data packets in a packet data network. When a first end-host (A) sends an address query to a DNS server system (302) regarding a second end-host, the DNS server system responds by providing a destination parameter (TAG) containing an encrypted destination address associated with the second end-host. Thereby, the first end-host is able to get across data packets to the second end-host by attaching the destination parameter (TAG) to each transmitted data packet. A router (300) in the packet data network admits a received packet if a destination parameter (TAG) is attached to the packet including a valid destination address encrypted by a key dependent on a distributed master encryption key. Otherwise, the router discards the packet ifno such valid destination address can be derived from the packet by applying decryption to the destination parameter.
摘要:
A method and network subsystem for providing on demand end to end Quality of Service (Qos) in a dynamic manner, use a combination of Resource Reservation Protocol (RSVP), load control protocol (and its successors) and Bandwidth Brokers (BBs)(1106) which communicate using a predetermined protocol. The predetermined protocol may be one of Common Open Policy Service Protocol (COPS) and Simple Network Management Protocol (SNMP) for direct communication by the BBs (1106). The network subsystem might also include differentiated services architecture (Diffserv)(1109) which might comprise a Diffserv domain (1309, 1409) including Border Routers (BRs)(1112) and Core Routers (CRs). The BBs (1106) may obtain resource availability information by communicating only with the BRs (1112) to the exclusion of CRs. The BBs (1106) may optionally have the capability of using an RSVP aggregation protocol and may have the ability to store and manage RSVP aggregation status. The method and network subsystem may additionally use Integrated Service Architecture (Intserv)(1108) which will enable achieving interoperability between Intserv and Diffserv through the use of an edge router (1103, 1104) on a bandwidth broker aggregator (1105).
摘要:
The present invention relates generally to configuration of routers in a communication WAN and more particularly with the problems of substantial work with manual configuration of routers in a WAN and the need for automation of the configuration process. A new node is added to an existing router within an Intranetwork. The node is to be configured to act like a router. A physical connection and a Point to Point link are established between the existing router and the new node. A routing protocol is started to make it possible for the new node to send and retrieve IP traffic. The new node finds automatically the essential resources to receive configuration information. By means of the configuration information, the new node is automatically configured.
摘要:
The soft state of a header compression scheme in a communication system carrying packet traffic including a real time communication signal can be updated (63) during periods of communication signal inactivity (62), during which there is no need to transmit the communication signal. The header compression soft state can also be updated by stealing bits (83, 84) from the communication signal to carry the header update information (73). If the communication signal includes source encoded data, the header compression soft state can be updated selectively (126) based on the bit rate (122, 124) of a codec that produced the source encoded data.
摘要:
A determination whether to establish a new connection that will supply new variable bit rate data packets to be transmitted in a shared system for transmitting variable bit rate data packets is made by determining, for the new connection, a value of a moment generating function defined based on the number of possible data packet sizes for the new connection, (Ri, Pi) pairs representing possible new connection data packet sizes, Ri, with corresponding assigned probabilities, Pi, and υ is an arbitrary positive real number. A determination is then made whether any value of υ exists that satisfies the Chernoff bound for all established connections and the new connection, given a length of a buffer for storing data packets supplied to the shared system for transmitting variable bit rate data packets, and a predefined packet loss rate that can be tolerated in the shared system for transmitting variable bit rate data packets. If a value of υ exists that satisfies the Chernoff bound, then the new connection is established, else it is rejected. In another aspect, a maximum number of connections in the shared system is determined, given a transmission rate of the shared system.