摘要:
A multicast replicating network node (203) according to the present invention reports to a traffic scheduling network node (205) information (231) indicative for the bandwidth consumed by multicast services or indicative for the bandwidth available for unicast services on a line coupled to the multicast replicating network node (203). The traffic scheduling network node (205) this way stays aware of the multicast bandwidth occupancy on different subscriber lines and access node uplinks without serious impact on its processing requirements.
摘要:
A multicast replicating network node (203) according to the present invention reports to a traffic scheduling network node (205) information (231) indicative for the bandwidth consumed by multicast services or indicative for the bandwidth available for unicast services on a line coupled to the multicast replicating network node (203). The traffic scheduling network node (205) this way stays aware of the multicast bandwidth occupancy on different subscriber lines and access node uplinks without serious impact on its processing requirements.
摘要:
In methods for setting up communications between digital-subscriber-line terminal modems (13) and internet-service-providers (30) via digital-subscriber-line-access-multiplexers (2,20) and forwarders (3) of asynchronous-transfer-mode-networks (1) further comprising dynamic-host-configuration-protocol-relay-agents (4,40), first messages are sent from the terminal modems (13) to the agents (4,40) via the access multiplexers (2,20), which first messages comprise incoming logical identifiers defining couplings (14) between the terminal modems (13) and the access multiplexers (2,20), second messages are sent from the agents (4,40) to dynamic-host-configuration-protocol-servers (5) for receiving internet-protocol-addresses to be supplied to the terminal modems (13) via the agents (4,40). To be able to locate the agents (4,40) outside the forwarders (3), the agents (4,40) convert the first messages into the second messages at least by inserting outgoing logical identifiers defining couplings (6) between the access multiplexers (2,20) and the forwarders (3), and the forwarders (3) are informed about relationships between the Internet-Protocol-addresses and the outgoing logical identifiers. The forwarders (3) then have sufficient knowlegde to find the right (part of the) access multiplexer (2,20).
摘要:
An access multiplexer system for performing stateless auto-configuration processes for use in networks comprising access multiplexers for receiving discovery messages from sources, which discovery messages comprise multicast destination addresses defining numbers of destinations. In order to increase the security of the networks, the system is provided with agents for replacing the original number of multicast destination addresses in the discovery messages with a further number destination addresses defining further destinations, wherein the further number of destinations is smaller than the original number of destinations. Discovery messages are defined in RFC 2461 and 2462 and comprise solicitation messages, with the sources comprising hosts and with the destinations comprising network-units, or comprise advertisement messages, with the sources comprising network-units and with the destinations comprising hosts.
摘要:
The present invention is applicable to access networks across which virtual connections have been provisioned to meet traffic and QoS requirements. The present invention improves service integrity by controlling the right for a service instance to use the network resources that have been provisioned for its class of service. Whenever a subscriber requests a service that requires a pre-determined bandwidth with a pre-determined QoS, one checks whether the virtual connection over which the service will be delivered to the subscriber can convey the required bandwidth with the required QoS. According to the check outcome, the service is granted or denied to the subscriber. The present invention may further improve the usage of the network resources. This second object is achieved by adapting the configuration of the access network according to the real traffic demand.