摘要:
Provided is a method of controlling resources using out-of-band signaling. A central admission entity checks subscription information of a user requesting resources and policies of a network for call setting, determines whether the resources are to be assigned, and distributes an IP-level flow descriptor to an edge node of the network in order to assign the resources. The edge node receiving the IP-level flow descriptor performs mapping of the IP-level flow descriptor to flow state aware (FSA) parameters, and generates a start node. Thus, a process of in-band signaling can be simplified by omitting respond and reconfirm operations.
摘要:
Provided are a network resource control method and apparatus for guaranteeing an admission rate of a high-priority service. In the method and apparatus, the admission rate of the high-priority service is increased by differentiating between the high-priority service and a low-priority service by either rejecting the low-priority service or reducing a bandwidth allocated to the low-priority service when the low-priority service has already been accepted.
摘要:
Provided are a network resource control method and apparatus for guaranteeing an admission rate of a high-priority service. In the method and apparatus, the admission rate of the high-priority service is increased by differentiating between the high-priority service and a low-priority service by either rejecting the low-priority service or reducing a bandwidth allocated to the low-priority service when the low-priority service has already been accepted.
摘要:
A method and apparatus for supporting user mobility by allowing guest access in an Internet service network and a billing method based on the same are provided. The method for supporting user mobility by allowing guest access in an Internet service network includes the steps of: performing user authentication and querying a subscriber DB to determine whether a user is a host user or a guest user when a subscriber ID is inputted; querying the subscriber DB to determine whether there is an available bandwidth for the guest user when the user is the guest user; and querying the subscriber DB to provide a service package corresponding to the guest user when there is an available bandwidth for the guest user.
摘要:
Provided is a method and apparatus for guaranteeing QoS using end-to-end CAC in an Internet service network. The method includes the steps of: (a) performing a subscriber domain CAC by querying a subscriber DB to determine whether to admit a call based on available bandwidth information of a subscriber when a subscriber terminal requests resource reservation; (b) performing a network domain CAC by querying a resource DB based on a result of the subscriber domain CAC to determine whether a resource required for service can be reserved or not; and (c) updating reserved bandwidth information and available bandwidth information of a subscriber domain in the subscriber DB and resource use information of a network domain in the resource DB when the resource reservation is completed through the steps (a) and (b).
摘要:
Provided is a traffic authentication apparatus using information on a header of a packet for traffic authentication. The apparatus includes a call admission control agent receiving a call admission request from a calling terminal; a network controller determining whether to approve the call admission request received by the call admission control agent and obtaining call information from the call admission request; and a networking unit which, when the networking unit receives traffic from the calling terminal, compares information on the header of a packet of the traffic with the call information received from the network controller and authenticates the traffic.
摘要:
In an apparatus and method for integrated signal processing for an IP-based wired and wireless convergence network, based on an ID of a second user acquired in response to a service call request from a first user terminal, a unique address corresponding to the ID is acquired. The location address corresponding to the unique address, acquired from the address information of the terminals being stored and managed, i.e., the transport address of the second user terminal, is acquired. An IP connection request is sent to the acquired transport address of the second user terminal and the transport address of the first user terminal, and upon completion of the IP connection, data traffic for the requested service is transferred.
摘要:
In order for a peer node to perform direct communication with a correspondent peer node in an Internet protocol network, the peer node receives a virtual address of the correspondent peer node from a server, and then when the peer node can directly set a tunnel with the correspondent peer node, the peer node sets a tunnel with the correspondent peer node, and when the peer node cannot directly set a tunnel with the correspondent peer node, the peer node sets a tunnel with a tunnel repeater. Thereafter, the peer node connects a virtual address of the correspondent peer node as route information to the tunnel. Thereby, a packet using a virtual address of the correspondent peer node as a destination is transmitted to the correspondent peer node through a predetermined tunnel.
摘要:
A method and apparatus for collaboratively protecting against a Distributed Denial of Service (DDoS) attack are provided. The method performed by a network apparatus includes detecting data suspected as being used in the DDoS attack by monitoring traffic forwarded to a service server, notifying a security apparatus that the detected data is suspected as being used in the DDoS attack, and performing at least one of a first operation and a second operation, the first operation being receiving an analysis result for the detected data from the security apparatus and controlling the traffic based on the analysis result, and the second operation being controlling, prior to the first operation, the traffic based on a rule set in advance.
摘要:
Provided is a method for measuring performance of a multi-protocol label switching label switched path (MPLS LSP), using a fast failure detection (FFD) packet among MPLS operation and management (OAM) packets recommended by International Telecommunication Union-Telecommunication standardization sector (ITU-T) Y.1711 to detect a packet error generated in the MPLS LSP and newly defining bytes not used in the FFD frame to use the bytes for parity check.An ingress node performs the steps of: calculating a parity value of an MPLS packet as byte interleaved parity (BIP)-8 before transmitting the MPLS packet; storing the calculated parity value of the MPLS packet in an MPLS OAM packet of an FFD structure; and transmitting the MPLS OAM packet whenever transmitting the MPLS packet. And an egress node performs the steps of: calculating a parity value of a received MPLS packet; comparing a parity value of an MPLS packet stored in the MPLS OAM packet with the parity value of the received MPLS packet; and when the two parity values are not identical, determining that an error has occurred in the MPLS packet and discarding the MPLS packet.