摘要:
A method that includes receiving a reservation request from a first endpoint that comprises a bandwidth list identifying a plurality of bandwidth levels associated with the first endpoint. At least two of the bandwidth levels have a unique priority level associated therewith. The method also includes establishing a communication session between the first endpoint and at least one additional endpoint using a first bandwidth based on a first priority level. The first bandwidth and the first priority level are each associated with a first bandwidth level of the plurality of bandwidth levels. The method further includes detecting a bandwidth event that impacts a bandwidth used by the first endpoint for the communication session. The method additionally includes adjusting the bandwidth used by the first endpoint to a second bandwidth that is different than the first bandwidth based on a second priority level that is different than the first priority level.
摘要:
A technique for reserving resources in a communication network for an entity. Communication units in the network register with policy data points (PDPs) to attain authorization to establish and receive calls in a communication network. The PDPs supply the communication units with security tokens that the communication units use to assert that they are authorized to establish sessions and reserve resources in the communication network. Communication units associated with a call include their tokens in signaling messages that are used to establish the call. Nodes along the path between a communication unit associated with a calling party in the call and a communication unit associated with a called party in the call use the tokens to authenticate the source of the signaling messages and determine whether they have permission to reserve resources in the communication network.
摘要:
In one embodiment, a method and corresponding apparatus, in a network, treat a reservation for network layer resources according to a domain of reservation treatment to which the reservation belongs.
摘要:
In one embodiment, a method includes reserving a first amount of bandwidth with respect to a path in response to a reservation request from a sender. The reservation request specifies a plurality of acceptable amounts of bandwidth including the first amount of bandwidth and a second amount of bandwidth. The first amount of bandwidth is less than the second amount of bandwidth. The method also includes determining, after reserving the first amount of bandwidth, that additional bandwidth sufficient to accommodate the second amount of bandwidth is available, and automatically providing a first indication that the additional bandwidth is available. Automatically providing the first indication that the additional bandwidth is available includes providing the first indication to at least the sender. Finally, the method includes obtaining a second indication, the second indication being arranged to indicate whether the second amount of bandwidth may be accommodated with respect to the path.
摘要:
In one embodiment, a method includes reserving a first amount of bandwidth with respect to a path in response to a reservation request from a sender. The reservation request specifies a plurality of acceptable amounts of bandwidth including the first amount of bandwidth and a second amount of bandwidth. The first amount of bandwidth is less than the second amount of bandwidth. The method also includes determining, after reserving the first amount of bandwidth, that additional bandwidth sufficient to accommodate the second amount of bandwidth is available, and automatically providing a first indication that the additional bandwidth is available. Automatically providing the first indication that the additional bandwidth is available includes providing the first indication to at least the sender. Finally, the method includes obtaining a second indication, the second indication being arranged to indicate whether the second amount of bandwidth may be accommodated with respect to the path.
摘要:
A system and a method are disclosed for authenticating a subsequent callback from a public safety answering point (PSAP) in response to a user agent's initial emergency call. In one embodiment, the user agent forwards a token to the PSAP during the initial call, and the PSAP returns the token during callback. The PSAP is authenticated when the forwarded and returned tokens match. In another embodiment, the user agent encrypts a token using a Public Key Infrastructure and forwards the encrypted token to the PSAP. The PSAP decrypts the token and, upon callback, includes a signed digital certificate based on the token. The user agent authenticates the PSAP when the decrypted digital certificate matches the originally sent token. In yet another embodiment, the user agent forwards a first token to the PSAP. Upon callback, the user agent forwards a second token to the PSAP. The PSAP performs a function on the pair of received tokens and forward the result to the user agent. The user agent performs the same function on the same tokens to obtain a local result. The user agent authenticates the PSAP when the local and forwarded results match.
摘要:
In one embodiment, a method for establishing a session between a first party and a second party in a communication network comprises issuing a request to establish the session with the second party, the request containing a first security level associated with the first party. A response is received to the request from the second party, the response containing a second security level associated with the second party. A security level for the session is identified from the first security level and the second security level and the session established at the identified security level.
摘要:
In one embodiment, a mechanism where a client can transmit a request for a digitally-signed location data uniform resource locator (location data-URL), and receive a response including a digitally-signed location data-URL, wherein the location data-URL includes location information corresponding to a requesting host.
摘要:
A technique for providing information relative to an entity's location to an entity in a communication network. A request for information is generated by a first entity wherein the request contains a location of the first entity. The request is then forwarded to a second entity which illustratively is a trusted source in the communication network. The second entity receives the request and identifies the requested information using the location information contained in the request. A notification containing the identified information is then generated by the second entity and forwarded to the first entity. The first entity receives the notification and processes it accordingly.
摘要:
A technique for displaying information ancillary to an entity's location. A request for information ancillary to the location of a communication unit in a communication network is generated by the communication unit wherein the request contains a location of the communication unit as well as specifies the information ancillary to the communication unit's location that is sought. The request is forwarded to an information server in the communication network which may be a “trusted source” meaning that the communication unit considers the information server a reliable (trustworthy) source of information. The information server receives the request and identifies the requested information using the location information contained in the request. A response (notification) containing the identified information is then generated by the information server and forwarded to the communication unit. The communication unit receives the notification and processes it accordingly, including displaying the identified information in a manner that indicates the requested information is available. If the requested information is not available, the communication unit provides a display indicating the information is not available.