摘要:
A method is provided in one example and includes communicating an access request to a network element, the access request is associated with network authentication relating to a subscriber. The method also includes receiving an access response that includes a profile associated with the subscriber. The profile can include a group attribute that defines the subscriber as being part of a group of subscribers sharing a network data plan, which defines a data allotment assigned to the group over a specified time interval. In more detailed embodiments, a unique data string sent by an Authentication, Authorization, and Accounting element is received, where the unique data string identifies a full set of subscribers belonging to the group. Data underutilization of a first subscriber is offset by data overutilization of a second subscriber, where a summation of the data underutilization and the data overutilization do not exceed the data allotment assigned.
摘要:
In general, techniques are described for supporting interchassis redundancy (ICR) by a plurality of network access servers (NASes) that are members of an ICR. For example, techniques may be used to associate, within a RADIUS server, multiple NAS identifiers for the NASes with a single NAS identifier alias. The RADIUS server is configured to handle RADIUS protocol messages from any member of the ICR cluster as though the RADIUS protocol messages issued from a single NAS having the NAS identifier alias.
摘要:
A method is provided in one example embodiment and includes communicating an access request message associated with a mobile node, receiving an access accept message that includes domain name data associated with the mobile node, and communicating a packet data protocol (PDP) context accept message for a tracking PDP context associated with the mobile node without associating an internet protocol (IP) address to the mobile node. The tracking PDP context identifies that the mobile node is available to receive network data. In more particular embodiments, the access request message includes an International Mobile Subscriber Identity (IMSI) associated with the mobile node, and the domain name data includes a fully qualified domain name. In still other embodiments, the tracking PDP includes a protocol configuration option (PCO) indicating that an IP address is not required for the mobile node.
摘要:
A method, performed by a network device, may include sending a request to a first server, detecting a first timeout without receiving a response from the first server, and sending the request to the first server and to a second server, in response to detecting the first timeout without receiving a response from the first server.
摘要:
In general, techniques are described for supporting interchassis redundancy (ICR) by a plurality of network access servers (NASes) that are members of an ICR. For example, techniques may be used to associate, within a RADIUS server, multiple NAS identifiers for the NASes with a single NAS identifier alias. The RADIUS server is configured to handle RADIUS protocol messages from any member of the ICR cluster as though the RADIUS protocol messages issued from a single NAS having the NAS identifier alias.
摘要:
A method is provided in one example and includes communicating an access request to a network element, the access request is associated with network authentication relating to a subscriber. The method also includes receiving an access response that includes a profile associated with the subscriber. The profile can include a group attribute that defines the subscriber as being part of a group of subscribers sharing a network data plan, which defines a data allotment assigned to the group over a specified time interval. In more detailed embodiments, a unique data string sent by an Authentication, Authorization, and Accounting element is received, where the unique data string identifies a full set of subscribers belonging to the group. Data underutilization of a first subscriber is offset by data overutilization of a second subscriber, where a summation of the data underutilization and the data overutilization do not exceed the data allotment assigned.