Abstract:
Methods, systems, and computer program products for security context escrowing are provided herein. According to one aspect, a method of operation of a network node for a telecommunications network comprises storing security context information associated with a small data, fast path connection between a wireless device and a first gateway that is serving the wireless device, determining a change in the gateway that is serving the wireless device from the first gateway to a second gateway, and, in response to determining the change, providing the stored security context information to the second gateway for use with the wireless device.
Abstract:
In one aspect of the teachings herein, a radio node provides a local loopback mode of operation in at least some operational instances, in which it loops “local” traffic between wireless devices operating within a local radio cell or cells, rather than forwarding such traffic along to a controlling gateway for handling. The wireless devices operating within the cell(s) and involved in the loopback operation switch over from symmetric encryption that involves the controlling gateway as a secure endpoint for their traffic, to asymmetric or public-private key pair encryption. The radio node uses a correspondingly derived loopback encryption key to enable security on the loopback traffic flow between the involved local devices. Use of the loopback encryption key means that the radio node need not know or otherwise have access to the symmetric encryption keys used by the involved devices and the controlling gateway for “normal” non-loopback operation.
Abstract:
An edge node of an Access/Network Service Provider (ANP) network tracks the delivery into the ANP network of content from Contzzent Providers (CP), and generates accounting sessions with an accounting server. The edge node is provisioned with the IP addresses of known CP servers. A content delivery session, characterized by a CP IP address and a content identifier, such as a Differentiated Service Code Point (DSCP) value, is started upon the source IP address of a packet matching a known CP, and a packet count is incremented for each subsequent packet from the CP with the same content identifier. An accounting session is initiated with an accounting server when the content delivery session is started, and the accounting session is terminated, with the packet count for the session, upon a time-out since the last packet received. Multiple content delivery sessions may be ongoing simultaneously.
Abstract:
The present disclosure describes methods and apparatus for differentiating subscriber devices of a subscriber hidden by a network address translation device and enables traffic flow steering on a per device basis rather than a per subscriber basis. Identification of subscriber devices is achieved by assigning a reserved set of external ports to each subscriber device. Different service paths can be defined for different subscriber devices to provide a subscriber with a different experience for each subscriber device of the subscriber.
Abstract:
Methods, network address translation (NAT) devices, network nodes and system for allowing identification of a private device in a public network or treating traffic of a private device in a public network. The NAT may allocate a private IPv4 address to the private device, reserve a block of ports on the public IPv4 address for the private device and send an identification of the block of ports to a network node in the public network. The network node of the public network may receive an identification of a block of ports on the public IPv4 address indicating that the block of ports is reserved for the private device and activate a rule for treating traffic of the private device.
Abstract:
A method for providing a parser by a network node, which includes a table defining a plurality of rules and a plurality of match fields required for extraction from an incoming data packet header in order to apply each of the respective rules is described. The method comprises determining at least one occurrence in the table of a first match field that requires extraction; and determining a parser for use in accordance with the at least one determined occurrence of the first match field. Furthermore, the step of determining at least one occurrence of the first match field comprises initializing a counter associated with the first match field and incrementing the counter for each of the plurality of rules that requires extraction of the first match field. And the step of determining a parser comprises determining the parser for use in accordance with the counter. A network node for carrying this method is also described.
Abstract:
A network element in a network is provided. The network element includes a receiver that receives a content request message. The received content request message indicates content to be transmitted to a device. The network element includes a processor in communication with the receiver. The processor generates a modified content request message by inserting identification data into the content request message. The identification data identifies at least one of a plurality of network nodes in the network. The network element includes a transmitter that transmits the modified content request message to a content distribution network server. The receiver further receives a redirect message that is based on the transmitted modified content request message. The redirect message identifies that a one of the plurality of network nodes is a cache location storing the indicated content.
Abstract:
Methods and network node in a network for receiving a network access request related to a subscriber via at least one external network interface and treating the network access request by using at least a first function and second function. A failure indication related to the subscriber is obtained from at least one of the first function or the second function. The network access request is thereafter denied by sending an access result via the external network interface. The access result comprises a cause of failure indicating the at least one of the first function or the second function as a source for the failure. The first and second functions may be, for instance, an AAA function and a DHCP function.
Abstract:
A MN, a method and a VMAP for increasing efficiency of handover of the MN from a AR1 to a AR2. The VMAP is hierarchically below a MAP and above the AR1. The MN has a RCoA valid under the MAP and a LCoA valid under the AR1. The VMAP comprises an OMM Function capable of receiving a PathUM thereby informing the VMAP that the MN 412 is handing over to the AR2, computing a LCoA2 valid under the AR2 and forwarding traffic received on the LCoA to the LCoA2. A VMAP Binding Cache Entry for the MN comprises at least the MN's RCoA, the MN's LCoA and a unique value associated with the MN. The VMAP, therewith, computes the LCoA2 using a same function as in the MN. Prior to receiving the PathUM, the VMAP could receive an E-LBA issued from the MAP and addressed to the LCoA comprising the MN's RCoA and the unique value associated with the MN and thereafter, creating or updating the VBCE for the MN using information included therein.
Abstract:
Systems and methods are described which delegate reachability testing for mobility signaling in communication networks. A mobile node transmits a mobility signaling package to other network nodes, which can use the information contained therein to perform the delegated reachability testing.