摘要:
There is described a method for optimising the distribution of data objects between caches in a cache domain of a resource limited network. User requests for data objects are received at caches in the cache domain. A notification is sent from each cache at which a request is received to a cache manager. The notification reports the user request and identifies the requested data object. At the cache manager, object information including the request frequency of each requested data object and the locations of the caches at which the requests were received is collated and stored. At the cache manager, objects for distribution within the cache domain are identified on the basis of the object information. Instructions are sent from the cache manager to the caches to distribute data objects stored in those caches between themselves. The objects are classified into classes according to popularity, the classes including a high popularity class comprising objects which should be distributed to all caches in the cache domain, a medium popularity class comprising objects which should be distributed to a subset of the caches in the cache domain, and a low popularity class comprising objects which should not be distributed.
摘要:
A method is provided which introduces user plane caching over an interface between a first node in a radio access network and a second node in a core network. At the first node: receiving first uplink tunnel parameters relating to the second node, selecting first downlink tunnel parameters relating to the first node, sending the first uplink and downlink tunnel parameters to a cache node designated to the first node, receiving second uplink and downlink tunnel parameters relating to the cache node, and sending the second downlink tunnel parameters to the second node. A first tunnel is established between the first node and the cache node based on the second uplink tunnel parameters and the first downlink tunnel parameters, uplink user plane data is sent to the second node through the first and second tunnels via the cache node, and downlink user plane data is received from the second node.
摘要:
A method and arrangement for enabling delivery of an IT-service to a client, wherein execution of the IT-service requires resources in a cloud architecture. First, a plurality of predefined cloud computing services and respective requirements for resources, are registered. Then, service subscriptions and associated subscription identities, valid in a telecommunications network, are provisioned for the predefined cloud computing services. One of the service subscriptions and associated subscription identity is assigned to an identity module, for enabling delivery of the IT-service to the client by providing an associated predefined cloud computing service when the client uses the identity module. Then, activity of the assigned service subscription is monitored in the network based on the associated subscription identity, and resources are allocated in the cloud architecture according to the assigned service subscription, when it is detected that the assigned service subscription is activated or has been activated.
摘要:
A system and a method are described herein which provide for congestion handling in a packet switched network domain. In case of congestion, overload is measured by a core node, the data packets in proportion to the overload are marked and the signaled overload is stored. At least one egress node receives marked and not marked packets, decodes and counts the overload from the marked packets in a counting interval. Congestion report messages are sent to ingress nodes where flows are terminated.
摘要:
Method and apparatus for supporting the forwarding of received data packets in a router (402,702) of a packet-switched network. A forwarding table (706a) is configured in the router based on aggregating router keys and associated aggregation related instructions received from a key manager (400,700). Each aggregating router key represents a set of destinations. When a data packet (P) is received comprising an ingress tag derived from a sender key or router key, the ingress tag is matched with entries in the forwarding table. An outgoing port is selected for the packet according to a found matching table entry that further comprises an associated aggregation related instruction. An egress tag is then created according to the aggregation related instruction, and the packet with the created egress tag attached is sent from the selected outgoing port to a next hop router.
摘要:
Method and apparatus for controlling the routing of data packets in an IP network (200). A DNS system (202) stores a packet admission policy configured for a first end-host (B) that dictates conditions for allowing other end-hosts to get across data packets to the first end-host or not. A routing voucher is defined which is required for routing data packets to the first end-host. The routing voucher is distributed to routers (R) in the IP network. When an address query is received at the DNS system (202) from a second end-host, the voucher is supplied to the second end-host if the configured policy allows the second end-host to convey data packets. Otherwise, the voucher is not supplied. If allowed, the second end-host will add the routing voucher to any data packets directed to the first end-host. When a valid routing voucher is present in a packet at a router (204) in the network, the packet will be forwarded to the next router in the IP network. The router will otherwise discard the packet.
摘要:
A data packet network comprises a policer module metering the flow and deciding whether arrived packets are to be transmitted or discarded. The flow of transmitted packets is metered by a sliding window procedure having a fixed window length. The sliding window is divided in a plurality of subwindows of equal length and the sliding window moves by steps corresponding to the length of the subwindows. For each subwindow and for the sliding window counts of transmitted and/or discarded bytes and/or packets are determined and stored. For an arrived packet the counts of the current subwindow are compared to a maximum value obtained from the counts of the sliding window and an absolute maximum value, and based on the result of the comparison, the policer module will transmit or discard the packet. The policer module can perform soft policing in the case where the packets belong to different traffic classes.
摘要:
The invention relates to failure handling in a tree sructure network (NW1) that has edge nodes (EN1 . . . EN4) and switching nodes (SW1 . . . SW4) interconnected by lines (L1). VLANs (VLAN1-VLAN3) are established such that at least one thereof provides connectivity in case of any single failure in the network. The VLANs can be established by using spanning trees (ST1,ST2,ST3). Among the edge nodes, emitters (EN3) broadcast alive messages (A1,A2,A3) regularly on the VLANs and notifiers (EN2) note the alive messages. A missing alive message indicates a failure (CD1) on one VLAN (VLAN2) and the notifier (EN2) broadcasts corresponding failure messages (F1,F2,F3) on the VLANs. When all the alive messages (A1,A2,A3) appear again the notifier (EN2) broadcasts corresponding repair messages (R1,R2,R3). If the notifiers don't note a failure the nodes (EN1,EN4) with no special role performs a similar function as the notifier (EN2) somewhat slower. The failure handling is fast, robust, uses few messages, increases only slightly the traffic load in the network (NW1) and is compliant with present standards.
摘要:
Information about virtual private networks—VPNs—in each domain of a multi-domain communications system is provided. By comparing a request for a configuration of a VPN with the provided information of other connected domains, a match can be found. VPN configuration can then be performed based on the outcome of the match. The provided domain VPN information is in one embodiment spread to other domains under constrictions put by SLAs between domain operators. The spreading of VPN information can be performed regularly or triggered by an external event. In another embodiment, the VPN configuration request is instead spread to different domains.
摘要:
In the area of network provisioning, there is a problem of selecting a suitable traffic-provisioning model for large networks due to the high management complexity of the resource-efficient trunk model and the poor bandwidth efficiency of the easy-to-configure hose model. The invention is based on the idea of partitioning at least part of the network into multi-node clusters, and defining traffic limitations on at least two levels, including the intra-cluster level and the inter-cluster level, where the traffic limitations include one or more node-to-cluster traffic limitations for inter-cluster traffic. Subsequently, cluster-based provisioning of the network is performed based on the traffic limitations. The novel node-to-cluster limitations proposed by the invention are preferably applied in a cluster-based trunk or hose model on the inter-cluster level. In other words, for the description of the inter-cluster traffic (traffic between the clusters) cluster-based trunk or hose models can be used, preferably depending on the available information about the traffic. The cluster-based provisioning makes it possible to find a trade-off between management complexity and overprovisioning.