Abstract:
Methods, systems, and devices are disclosed for detecting encrypted Internet Protocol packet streams. The type of data within an encrypted stream of packets is inferred using an observable parameter. The observable parameter is observable despite encryption obscuring the contents of the encrypted stream of packets. A timer is established that maintains settings despite changes in the type of inferred data.
Abstract:
Bandwidth and/or Quality of Service (QoS) for a user session may be modified in a network that includes a Regional/Access Network (RAN) that facilitates differentiated end-to-end data transport between a Network Service Provider (NSP) and/or an Application Service Provider (ASP) and a Customer Premises Network (CPN) that includes a Customer Premises Equipment (CPE) by receiving a request at the NSP and/or the ASP to change the bandwidth and/or QoS associated with the user's session. An Application Programming Interface (API) is used at the NSP and/or the ASP to communicate with the RAN to modify the bandwidth and/or QoS associated with the user's session.
Abstract:
Methods, systems, and products are disclosed for specifying a signature for an encrypted packet stream. One method receives the encrypted stream of packets, and encryption obscures the contents of a packet. A signature for insertion into the stream of packets is specified, and the signature identifies a type of data encrypted within the stream of packets. The signature identifies the contents of the packet despite the encryption obscuring the contents.
Abstract:
A method of operating a data network may include establishing a data path through the data network between a routing gateway and service provider equipment providing a data service. Moreover, the data service may be provided for use at the routing gateway over the data path during a data session. A request may be received from the service provider equipment where the request defines a data flow characteristic for the data path between the routing gateway and the service provider equipment providing the data service. The data flow characteristic may then be transmitted to a network element along the data path between the routing gateway and the service provider equipment. A request from service provider equipment can include an allowed bandwidth or prioritization. Related methods, data networks, data service providers, routing gateways, and computer program products are also discussed.
Abstract:
A method of encoding data for distribution over a network includes determining a relative importance of content of a data packet associated with a predetermined class-of-service as compared to content of other data packets associated with the predetermined class-of-service. The data packet is marked to indicate the relative importance of the content thereof within the predetermined class-of-service. For example, based on the information contained in the data packet, the data packet may be marked as discard-eligible. The data packet is selectively discarded based on the marking thereof. Related methods, systems, and devices are also discussed.
Abstract:
Methods, systems, and devices are disclosed for detecting encrypted Internet Protocol packet streams. The type of data within an encrypted stream of packets is inferred using an observable parameter. The observable parameter is observable despite encryption obscuring the contents of the encrypted stream of packets. A timer is established that maintains settings despite changes in the type of inferred data.
Abstract:
Voice over Internet Protocol (VoIP) service is established in a network that that includes a Regional/Access Network (RAN) that facilitates differentiated end-to-end data transport between an Application Service Provider (ASP) and a Customer Premises Network (CPN) that includes Customer Premises Equipment (CPE). Application Programming interface (API) calls are used at the ASP to communicate with the RAN to establish VoIP service for the user having a user selected bandwidth and/or QoS associated therewith.
Abstract:
A method of operating a data network may include establishing a data path through the data network between a routing gateway for a subscriber of the data network and a service provider providing a data service. Moreover, the data service may be provided for use at the routing gateway over the data path during a data session. A request may be received from the service provider wherein the request defines a data flow characteristic for the data path between the routing gateway and the service provider providing the data service during the data session. The data flow characteristic may then be transmitted to a node along the data path between the routing gateway and the service provider for enforcement of the data flow characteristic for the data path at the node. More particularly, the data session may be a point-to-point protocol data session. Related methods, data networks, data service providers, routing gateways, and computer program products are also discussed.
Abstract:
Methods, systems and/or computer program products are provided for managing Quality of Service (QoS) and/or bandwidth allocation in a Regional/Access Network (RAN) having a broadband access server (BRAS) that facilitates differentiated end-to-end data transport between a Network Service Provider (NSP) and/or an Application Service Provider (ASP), and a Customer Premises Network (CPN) that includes a Routing Gateway (RG). In particular embodiments of the present invention, a modify QoS and/or bandwidth allocation message including updated QoS and/or bandwidth information from the NSP and/or ASP is received at the RAN. The BRAS is updated with the QoS and/or bandwidth information and the RG is also updated with the QoS and/or bandwidth information.
Abstract:
Methods, systems, and devices are disclosed for detecting encrypted Internet Protocol packet streams. A probe stream having a known observable parameter is generated. The observable parameter exhibits a known characteristic of a known type of data encrypted within a stream of packets. The probe stream is communicated to a network element via a communications network. When the probe stream is received by the network element, the network element can compare the known observable parameter to an actual value. Any difference between the known observable parameter and the actual value can be used to correct for network-induced variation and other effects, thus ensuring accurate detection and identification of data types within encrypted streams of packets.