摘要:
Method and apparatus for controlling the routing of data packets in an IP network (200). A DNS system (202) stores a packet admission policy configured for a first end-host (B) that dictates conditions for allowing other end-hosts to get across data packets to the first end-host or not. A routing voucher is defined which is required for routing data packets to the first end-host. The routing voucher is distributed to routers (R) in the IP network. When an address query is received at the DNS system (202) from a second end-host, the voucher is supplied to the second end-host if the configured policy allows the second end-host to convey data packets. Otherwise, the voucher is not supplied. If allowed, the second end-host will add the routing voucher to any data packets directed to the first end-host. When a valid routing voucher is present in a packet at a router (204) in the network, the packet will be forwarded to the next router in the IP network. The router will otherwise discard the packet.
摘要:
Method and apparatus for controlling the routing of data packets in an IP network (200). A DNS system (202) stores a packet admission policy configured for a first end-host (B) that dictates conditions for allowing other end-hosts to get across data packets to the first end-host or not. A routing voucher is defined which is required for routing data packets to the first end-host. The routing voucher is distributed to routers (R) in the IP network. When an address query is received at the DNS system (202) from a second end-host, the voucher is supplied to the second end-host if the configured policy allows the second end-host to convey data packets. Otherwise, the voucher is not supplied. If allowed, the second end-host will add the routing voucher to any data packets directed to the first end-host. When a valid routing voucher is present in a packet at a router (204) in the network, the packet will be forwarded to the next router in the IP network. The router will otherwise discard the packet.
摘要:
A method and apparatus for protecting the routing of data packets in a packet data network. When a first end-host sends an address query to a DNS server system regarding a second end-host, the DNS server system responds by providing a destination parameter containing an encrypted destination address associated with the second end-host. Thereby, the first end-host is able to get across data packets to the second end-host by attaching the destination parameter to each transmitted data packet. A router in the packet data network admits a received packet if a destination parameter is attached to the packet including a valid destination address encrypted by a key dependent on a distributed master encryption key. Otherwise, the router discards the packet if no such valid destination address can be derived from the packet by applying decryption to the destination parameter.
摘要:
Method and apparatus for controlling transmission of data packets in a packet-switched network. When a first end-host (A) sends an address query to a DNS system (300) for a second end-host, the DNS system responds by providing a sender key created from a destination key registered for the second end-host, if the first end-host is authorised to send packets to the second end-host. Thereby, the first end-host, if authorised, is able to get across data packets to the second end-host by attaching a sender tag (TAG) generated from the sender key, as ingress tag to each transmitted data packet. A router (302) in the network matches an ingress tag in a received packet with entries in a forwarding table and sends out the packet on an output port (X) according to a matching entry. Otherwise, the router discards the packet if no matching entry is found in the table.
摘要:
A method and apparatus for protecting the routing of data packets in a packet data network. When a first end-host sends an address query to a DNS server system regarding a second end-host, the DNS server system responds by providing a destination parameter containing an encrypted destination address associated with the second end-host. Thereby, the first end-host is able to get across data packets to the second end-host by attaching the destination parameter to each transmitted data packet. A router in the packet data network admits a received packet if a destination parameter is attached to the pocket including a valid destination address encrypted by a key dependent on a distributed master encryption key. Otherwise, the router discards the packet if no such valid destination address can be derived from the packet by applying decryption to the destination parameter.
摘要:
A system a core (104), an edge node (102, 103) and a method are provided for congestion handling in a packet switched network domain. In case of congestion overload is measured, the data packets in proportion to the overload are marked and the signaled overload is stored. At least one egress node (103) receives marked and not marked packets, decodes and counts the overload from the marked packets in a counting interval. Congestion report messages are sent to ingress nodes (102) where flows are terminated. A core node (104) comprises a storage means (314) taking into account the previously signaled overload, which are already being handled in a congestion handling control loop. An edge node (103) comprises means for adding new flows to the set of affected flows, means for identifying affected flows to be terminated so that the number of identified affected flows should generate together traffic equal to the overload, and means for removing flows to be terminated from set of affected flows. In an advantageous embodiment the market module (315) applies a hysteresis algorithm with a higher bound used to detect congestion and to trigger the marking of user data packets in proportion to the measured overload, and a lower bound used as the reference to measure the overload ratio.
摘要:
A method and apparatus for selecting an edge node from a plurality of edge nodes in a fixed access communications network. A selection node receives from a host entity a request for a network service. The selection node then obtains, from at least one further network node, data relating to a plurality of edge nodes. On the basis of the retrieved data, the selection node selects an edge node from the plurality of edge nodes, wherein the selected edge node provides a path between the host entity and the requested network service. The selection node then sends a response to the host entity, the response including information identifying the selected edge node.
摘要:
A method of allowing a nomadic terminal to access a home network on the Layer 2 level. The method comprises connecting said terminal to a remote access network via an access point, the remote access network being connected to an operator's backbone network via a remote access router. Signalling is exchanged between the access point and an authentication server within the backbone network in order to authenticate the terminal to the authentication server and, following successful authentication, a Layer 2 tunnel extending across the backbone network is established for the purpose of connecting said nomadic terminal to the home network.
摘要:
A method is provided of enabling access for a terminal (12-1) to a remote network (60) via a mobile network (40). A first connectivity service function (30) is provided as part of the mobile network (40). A second connectivity service function (20) is provided as part of the remote network (60). A third connectivity service function (10) is provided associated with the terminal (12-1). The first connectivity service function (30) is adapted to cooperate in establishing a first layer 2 tunnel (25) between itself (30) and the second connectivity service function (20). The first connectivity service function (30) is also adapted to cooperate in establishing a second layer 2 tunnel (15) between itself (30) and the third connectivity service function (10). The terminal (12-1) thereby has layer 2 access into the remote network (60) through the first and second tunnels (25, 15) using the first, second and third connectivity service functions (30, 20, 10).
摘要:
A method and apparatus for selecting an edge node from a plurality of edge nodes in a fixed access communications network. A selection node receives from a host entity a request for a network service. The selection node then obtains, from at least one further network node, data relating to a plurality of edge nodes. On thebasis of the retrieved data, the selection node selects an edge node from the plurality of edge nodes, wherein the selected edge node provides a path between the host entity and the requested network service. The selection node then sends a response to the host entity, the response including information identifying the selected edge node.