摘要:
An auditing function detects and corrects reservation and routing topology map errors by monitoring the operation of an advanced bandwidth manager (ABM). A session/call admission controller (S/CAC) attached to a network manages loading with policy enforcement points (PEP's) when the network nears or exceeds its capacity. Ever-changing network topology information is monitored, modeled, and analyzed from remote listeners. A correct model of how traffic is being routed through various parts of the network is critical to admission control. The PEP's at the network edges provide short-term, application-aware controls on their own that are applied to the corresponding network ingress traffic. The S/CAC uses the path tables to calculate whether particular PEP's can admit more traffic, or should they shed sessions/calls to keep service up for the existing application traffic. Long-term controls are periodically downloaded as admission tables from the S/CAC to the PEP's.
摘要:
A method for video-on-demand (VoD) admission control at a network edge assigns to a triple-play network virtual topology lesser resources than there exists in a corresponding underlying physical link bandwidth. This prevents video-on-demand (VoD) starvation of data-class traffic. At least one policy enforcement point (PEP) is attached to an edge of the network, providing for autonomous short-term, application-aware controls to be applied to corresponding network ingress traffic, and also providing for long-term controls on corresponding network ingress traffic. The network ingress traffic to the network comes under management when the traffic nears or exceeds network capacity. It is enabled to do so by computations of current network routing topology and bandwidth reservations. Path tables are used to calculate if a PEP may admit more, or must shed, sessions/calls to maintain service for other existing application traffic. The PEP and a session/call admission controller (S/CAC) may be independently located within the topology of the network, and together implement admission controls that differentiate between triple-play video, voice, and data traffic classes.
摘要:
A policy enforcement point (PEP) attaches to the edge of a packet-switched network to manage loading when the network nears or exceeds its capacity due to changes in the network, e.g., component failures or incremental growth. Autonomous PEP's at the network's edges provide short-term, application-aware controls on their own that are applied to the corresponding network ingress traffic. Changes become necessary when a network event results in a loss of resilient bandwidth that effects the traffic class under admission control. Or, when an unexpected surge in traffic exceeds the PEP's reserved resources to a particular destination. The resources available across the network are recalculated for minimizing impact on existing sessions or calls, and it informs the PEP's of the new resources available. If the new maximum exceeds the current utilization to that destination, the PEP invokes a local priority drop mechanism to back off the traffic until it is under the new limit. A media gateway handling voice calls can keep all emergency calls up, and then invoke a local algorithm, such as random drop, for the remaining calls until calls to the constrained destination are under the new limit. In the second case, where there is an unexpected surge in demand, the PEP can request from the bandwidth manager additional resources to a particular destination.
摘要:
An advanced bandwidth manager (ABM) comprises a session/call admission controller (S/CAC) to manage network ingress traffic when a packet-switched network nears or exceeds its capacity due to changes in the network, e.g., component failures or incremental growth. Ever-changing network topology information is gathered from remote listeners about how traffic is being routed through various parts of the network. These reports are harmonized to build a single view of the network topology, and the point-to-point connections are abstracted into path tables. Autonomous policy enforcement points (PEP's) provide short-term, application-aware controls on their own that are applied to the corresponding network ingress traffic. The S/CAC uses the path tables constructed to calculate whether the PEP's can admit more or should shed sessions/calls to keep service up for all existing application traffic. Long-term controls are periodically downloaded as admission tables from the S/CAC to the PEP's.
摘要:
A policy enforcement point (PEP) attaches to the edge of a packet-switched network to manage loading when the network nears or exceeds its capacity due to changes in the network, e.g., component failures or incremental growth. Autonomous PEP's at the network's edges provide short-term, application-aware controls on their own that are applied to the corresponding network ingress traffic. Changes become necessary when a network event results in a loss of resilient bandwidth that effects the traffic class under admission control. Or, when an unexpected surge in traffic exceeds the PEP's reserved resources to a particular destination. The resources available across the network are recalculated for minimizing impact on existing sessions or calls, and it informs the PEP's of the new resources available. If the new maximum exceeds the current utilization to that destination, the PEP invokes a local priority drop mechanism to back off the traffic until it is under the new limit. A media gateway handling voice calls can keep all emergency calls up, and then invoke a local algorithm, such as random drop, for the remaining calls until calls to the constrained destination are under the new limit. In the second case, where there is an unexpected surge in demand, the PEP can request from the bandwidth manager additional resources to a particular destination.
摘要:
Example embodiments are directed to methods of configuring a virtual private local area network service for an enterprise. At least one method includes assigning a virtual private local area network instance to a first node within a network. A first node attempts to establish a label distribution protocol session between the first node and at least one other node within the network based on an interior gateway protocol map. The interior gateway protocol map identifies the at least one other node and nodes connected to the at least one other node. The virtual private local area network service is established based on the label distribution protocol sessions that are established.
摘要:
A network includes an advanced bandwidth manager (ABM) to manage loading when a network nears or exceeds its capacity due to changes in the network, e.g., component failures or incremental growth. The ABM gathers strategic information from remote listeners about how traffic is being routed over the whole network, and is abstracted into point-to-point tables. The information gathered also helps to provide long term service planning. Autonomous policy enforcement points (PEP's) provide short term controls on their own. Intelligent action can be taken by the ABM through the PEP's by downloading admission tables based in the point-to-point abstractions. The goal is to keep the highest level of service up for the most users and prevent total failures. Requested network connections are either admitted or denied to these ends.
摘要:
A policy enforcement point (PEP) attaches to the edge of a network to manage loading when the network nears or exceeds its capacity due to changes in the network, e.g., component failures or incremental growth. Autonomous PEP's at the network's edges provide short-term, application-aware controls on their own that are applied to the corresponding network ingress traffic. Path tables are used to calculate whether particular PEP's can admit more traffic, or should they shed sessions/calls to keep service up for the existing application traffic. Long-term controls are periodically downloaded as admission tables from a session/call admission controller to the PEP's.
摘要:
An auditing function detects and corrects reservation and routing topology map errors by monitoring the operation of an advanced bandwidth manager (ABM). A session/call admission controller (S/CAC) attached to a network manages loading with policy enforcement points (PEP's) when the network nears or exceeds its capacity. Ever-changing network topology information is monitored, modeled, and analyzed from remote listeners. A correct model of how traffic is being routed through various parts of the network is critical to admission control. The PEP's at the network edges provide short-term, application-aware controls on their own that are applied to the corresponding network ingress traffic. The S/CAC uses the path tables to calculate whether particular PEP's can admit more traffic, or should they shed sessions/calls to keep service up for the existing application traffic. Long-term controls are periodically downloaded as admission tables from the S/CAC to the PEP's.
摘要:
A method for video-on-demand (VoD) admission control at a network edge assigns to a triple-play network virtual topology lesser resources than there exists in a corresponding underlying physical link bandwidth. This prevents video-on-demand (VoD) starvation of data-class traffic. At least one policy enforcement point (PEP) is attached to an edge of the network, providing for autonomous short-term, application-aware controls to be applied to corresponding network ingress traffic, and also providing for long-term controls on corresponding network ingress traffic. The network ingress traffic to the network comes under management when the traffic nears or exceeds network capacity. It is enabled to do so by computations of current network routing topology and bandwidth reservations. Path tables are used to calculate if a PEP may admit more, or must shed, sessions/calls to maintain service for other existing application traffic. The PEP and a session/call admission controller (S/CAC) may be independently located within the topology of the network, and together implement admission controls that differentiate between triple-play video, voice, and data traffic classes.