摘要:
A method for creating an Operation Administration and Maintenance frame in an Ethernet/Transport Multi-Protocol Label Switch hybrid network. The method includes mapping values in an Ethernet Operation Administration and Maintenance data field (445) in a protocol data unit (PDU 410) in a first Ethernet Operation Administration and Maintenance frame (Ethernet OAM frame 150) into a Transport Multi-Protocol Label Switch Operation Administration and Maintenance data field (498) in PDU (460) in a first Transport Multi-Protocol Label Switch Operation Administration and Maintenance frame (TMPLS OAM frame 155) and mapping values in first control parameter fields (401) in 'the first Ethernet OAM frame (150) into second control parameter fields (402) in the first TMPLS OAM frame (155). The PDU (460) in the first TMPLS OAM frame (155) includes added extra fields (495) as necessary, and the second control parameter fields (402) further comprise pre-selected default information and routing information mapped from values stored in a memory.
摘要:
A system and method for monitoring end nodes using Ethernet Connectivity Fault Management (CFM) in an access network. In one embodiment, a broadband access server (BRAS) is operable to generate an Ethernet CFM frame that includes a query message with respect to a particular end node. An interworking function (IWF) entity associated with an access node that services the particular end node is operable to interpret the Ethernet CFM frame and construct a corresponding query message in a native protocol compatible with the particular end node. Upon receiving a reply message from the particular end node, the IWF entity constructs a suitable reply Ethernet CFM frame for transmission to the BRAS, wherein the reply Ethernet CFM frame includes a response corresponding to the reply message from the end node.
摘要:
A method of determining a bias parameter for a heterogeneous network including a small cell, a macro cell, and one or more user equipment (UEs), the small cell being underlaid with respect to the macro cell, includes determining, at a base station of the small cell, a loading state of the macro cell; and setting, at the base station, the bias parameter based on the determined loading state. A method of determining a cell border window (CBW) for the small cell, the small cell being underlaid with respect to the macro cell, the small cell having a plurality of attached UEs which are divided into inner cell UEs and border cell UEs, includes determining, at the base station, a difference value based on utilization values of the inner cell UEs and the border cell UEs; and adjusting the CBW based on the difference value and a threshold value.
摘要:
The method includes receiving, at a network element, a media data packet sent from a first source user equipment (UE) towards a first destination UE; detecting, at the network element, congestion in at least one of a downlink channel between the network element and the first destination UE, and an uplink channel between the first source UE and the network element; identifying a second source UE that is transmitting first data to a second destination UE through the network element and has a subscriber priority level lower than the first source UE if the detecting detects congestion; sending a congestion indication that causes the second source UE to lower a rate at which the second source UE transmits the first data through the network element to the second destination UE if the detecting detects congestion; and sending the media data packet from the network element to the first destination UE.
摘要:
The present invention provides a method of coordinating access nodes when a sleeping cell is detected. The method may include modifying a coverage area of an access node to compensate for lost coverage in a sleeping cell detected by the access node. The access node implements resource allocation algorithms and a cell identification algorithm. The method may also include instructing the resource allocation algorithms and/or the cell identification algorithm to perform a predetermined action concurrently with the modification.
摘要:
An access node (310) (e.g., DSLAM, OLT/ONT) is described herein that implements a trust verification method (350) comprising the steps of: (a) filtering (502) an up-stream message (370, 604, 702, 802) initiated by a non-trusted device (312, 312') (e.g., CPE); (b) intercepting (504) the filtered up-stream message if the filtered up-stream message is a connectivity fault management message (e.g., LB message (702), LBR message (604), CC message (802)); (c) inserting (506) a trusted identification (372) into the intercepted up-stream message; and (d) outputting (508) the intercepted up-stream message with the inserted trusted identification. Thereafter, a trusted device (304) (e.g., BRAS) receives and analyzes the outputted up-stream message with the inserted trusted identification message to ascertain a trustworthiness of the non-trusted device (e.g., CPE). Several different ways that an access network (300) (e.g., IPTV network) can implement the trust verification method are also described herein.