摘要:
In a network including a centralized controller and a plurality of routers forming a security perimeter, a method for selectively discarding packets during a distributed denial-of-service (DDoS) attack over the network. The method includes aggregating victim destination prefix lists and attack statistics associated with incoming packets received from the plurality of routers to confirm a DDoS attack victim, and aggregating packet attribute distribution frequencies for incoming victim related packets received from the plurality of security perimeter routers. Common scorebooks are generated from the aggregated packet attribute distribution frequencies and nominal traffic profiles, and local cumulative distribution function (CDF) of the local scores derived from the plurality of security perimeter routers are aggregated. A common discarding threshold is derived from the CDF and sent to each of the plurality of security perimeter routers, where the discarding threshold defines a condition in which an incoming packet may be discarded at the security perimeter.
摘要:
The present invention provides systems and methods for providing distributed, adaptive IP filtering techniques used in detecting and blocking IP packets involved in DDOS attacks through the use of Bloom Filters and leaky-bucket concepts to identify “attack” flows. In an exemplary embodiment of the present invention, a device tracks certain criteria of all IP packets traveling from IP sources outside a security perimeter to network devices within the security perimeter. The present invention examines the criteria and places them in different classifications in a uniformly random manner, estimates the amount of criteria normally received and then determines when a group of stored classifications is too excessive to be considered normal for a given period of time. After the device determines the criteria that excessive IP packets have in common, the device then determines rules to identify the packets that meet such criteria and filters or blocks so identified packets.
摘要:
The present invention sets forth a methodology for providing improved downlink backhaul services from a radio network controller (RNC) to a plurality of base stations via a backhaul network that provides Ethernet services. The Ethernet services are provided by a group of provider edge (PE) switches and regular label switch routers (referred to as P switches). Base stations within the network are assigned into clusters, each of the clusters having a cluster ID. The RNC transmits packets to a given switch or switches out on the network based on a cluster ID included within the transmitted packet. The communications traffic is then multicast from at least one last hop switch in the network to candidate base stations on the basis of the cluster ID and an active set within the cluster. Advantageously, the clusters act as subgroups for more easily directing the transmission of the backhaul multicast traffic. Significant advantages are realized through use of the present invention, including the ability to allow faster and smoother handoffs, as well as backhaul bandwidth savings since intelligence regarding cell switching is extended out at a point farther along the network than was previously enabled.
摘要:
In a UMTS (universal mobile telecommunications system) Terrestrial Radio Access Network (UTRAN) based wireless system, a wireless network element (e.g., a base station) exchanges information with another wireless network element (e.g., a radio network controller) via data frames (uplink or downlink). Each data frame comprising a header portion and a payload portion, which comprises a QoS class indicator field. Illustratively, the eight bit spare extension field of a UTRAN data frame (uplink or downlink) is used to convey a four bit payload type indicator and a four bit QoS class indicator.
摘要:
A Layer 2 Tunneling Protocol (L2TP) performs a sender initiated recovery algorithm (SIRA) upon receiving, from an L2TP receiver, a predefined number of packets including the same “next received” (Nr) sequence number. The L2TP sender transmits a payload message that includes the “Reset Sr” (R-bit) indicator, which resets the value for Nr (at the receiver) to either just beyond the first missing packet or to the current send sequence number of the sender.
摘要:
An Internet Protocol (IP)-based network incorporates an application level switching server and a number of packet endpoints. A packet endpoint multiplexes application sessions destined for different packet endpoints into one multiplexed session that is terminated with the application level switching server. The latter extracts each application session (or packets associated therewith) and repackages, or switches, them into other multiplexed sessions such that at least two switched packets are transmitted to different packet endpoints. The multiplexed sessions utilize either RTP/UDP/IP or UDP/IP encapsulation.
摘要:
New Attribute Value Pairs (AVP)s are defined for use in the L2TP control messages for setting up a call. In particular, an L2TP Incoming-Call-Request (ICRQ) or Outgoing-Call-Request (OCRQ) message includes a QoS_Request AVP, which includes a field for defining the number of classes of service within the call. In another embodiment, a new QoS_Request extension and a new QoS_Reply extension are defined for use in Mobile IP networks.
摘要:
A method for data transmission in a wireless communication network utilizes an on-demand multiple access method with a fair queuing service discipline for efficient utilization of the limited bandwidth available in the network by sharing bandwidth among the remote hosts. In one embodiment, the base station broadcasts the system virtual time and the assigned shares of service classes to each of the wireless remotes. Each remote host computes its own service tag and reports it to the base station, which assigns transmit permits based on the service tag values and the available data slots. If a packet is lost or in error, the sending remote recomputes the service tag values of all its queued packets, including the packet whose transmission failed. Alternatively, the remote informs the base station of its queue size and the base station computes service tags for each remote based on the service shares of the remote and the available data slots. If a packet is lost or in error, the base station recomputes the service tag values for that remote host based on the current system virtual time. In an alternate embodiment, the AP or wireless node maintains a packet queue and a head-of-line tag. If a packet is lost, only the head-of-line tag needs to be changed. Once the head-of-line packet has been transmitted successfully, the rest of the queued packets will automatically receive the correct tag, the recomputed head-of-line tag plus appropriate increments. For half-duplex, both the uplink and downlink queues at the access points are managed as if there is only one system virtual time. For full-duplex, separate system virtual times for the uplink and the downlink traffic may be used. Remotes may also be divided into one or more separate groups, with each group having a different priority and receiving a different system virtual time. Service tags of all other remotes remain unaffected by the retransmission of a packet from any particular remote, meaning that the QoS experienced by the other remotes does not suffer.
摘要:
An advance over the prior art is achieved through an efficient method for an admission control algorithm and a scheduling mechanism that complement each other in providing the following three classes of service. A first class of service is termed Class 1 where users specify a nominal amount of bandwidth desired. A second, lower tier service class is termed Class 2, wherein users specify a nominal and minimum amount of bandwidth desired when entering into a network connection. A third server class is Class 3, where Class 3 users are treated as best effort users. For Class 1 users the methodology of the present invention provides a guaranteed nominal amount of bandwidth. The admission control procedure ensures that Class 1 users are admitted only if resources exist to satisfy the nominal bandwidth requirements of the Class 1 users. Class 2 users are admitted if resources exist to satisfy the minimum bandwidth requirements of the user. Class 2 users are served with a bandwidth of up to their nominal bandwidths if there is capacity left after serving the Class 1 users with their nominal capacities. Class 3 users are served only if the Class 2 users have received their nominal bandwidths.
摘要:
In a UMTS network, each packet data service user requires a dedicated channel (DCH) to transmit at high data rates. However, the number of DCHs available is small due to code and power limitations. Thus many users will have to be allocated the same DCH on a time sharing basis. Such sharing will not impact the quality of service for users whose applications are not delay sensitive and whose traffic generation pattern toggles between transmit and idle states. Such applications include web browsing, FTP sessions and E-mail. The present invention discloses four algorithms that can be used to dynamically allocate DCH channels to a contending user based on the user's need according to its traffic generation. One embodiment of the invention discloses a methodology of allocating user channels for packet data services in a wireless communications network, a first type channel having a given data rate and a second type channel having a lower data rate, including the steps of determining an estimated bandwidth requirement for the packet data services, switching a user to the second channel type from said first channel type if said estimated bandwidth requirement is below a first threshold, and switching a user to the first channel type from said second channel type if the estimated bandwidth requirement is greater than a second threshold. Another embodiment discloses methodology of allocating user channels for packet data services in a wireless communications network, a first type channel having a given data rate and a second type channel having a lower data rate, comprising the steps of providing an inactivity timer per user, and switching from the first channel type to said second channel type depending on a state of said inactivity timer.