摘要:
A method is provided in one example embodiment and includes receiving a request for a service flow over a wireless link, where the request specifies resource requirements; dynamically reserving bandwidth for the resource requirements in a backhaul link; and mapping a packet received over the wireless link to the backhaul link based on an identification element associated with the packet and the service flow.
摘要:
A method is provided in one example embodiment and includes creating a service flow with an endpoint over a wireless link coupled to a backhaul; notifying a mobility anchor of a location associated with the endpoint; relaying control packets between the endpoint and an access gateway; and relaying bearer packets between the endpoint and the mobility anchor, where the bearer packets are exchanged with the endpoint over a locally terminated bearer tunnel and the bearer packets are exchanged with the mobility anchor using Proxy Mobile Internet Protocol.
摘要:
A method is provided in one example embodiment and includes creating a service flow with an endpoint over a wireless link coupled to a backhaul; notifying a mobility anchor of a location associated with the endpoint; relaying control packets between the endpoint and an access gateway; and relaying bearer packets between the endpoint and the mobility anchor, where the bearer packets are exchanged with the endpoint over a locally terminated bearer tunnel and the bearer packets are exchanged with the mobility anchor using Proxy Mobile Internet Protocol.
摘要:
A method is provided in one example embodiment and includes receiving a plurality of status signals, for a plurality of radio links, at a microwave device; detecting a bandwidth anomaly based on the status signals; and communicating a quality of service (QoS) control signal, which is based on the bandwidth anomaly, to a gateway coupled to at least one of the radio links.
摘要:
A method is provided in one example embodiment and includes receiving a plurality of status signals, for a plurality of radio links, at a microwave device; detecting a bandwidth anomaly based on the status signals; and communicating a quality of service (QoS) control signal, which is based on the bandwidth anomaly, to a gateway coupled to at least one of the radio links.
摘要:
A method is provided in one example embodiment that includes aggregating resource availability from a plurality of network elements operating in a network; receiving a request to apply a policy to a network flow propagating in the network; and orchestrating resources to apply the policy to the network flow based on the aggregated resource availability. In more particular embodiments, the policy includes a quality of service for the network flow. In addition, the policy can include relocating subscribers accessing common content from a first gateway to a second gateway. In other instances, the policy includes relocating resources for the network flow.
摘要:
Techniques are provided for performing web authentication of mobile wireless devices that roam from a wireless wide area network to a wireless local area network. A redirect rule is invoked when a request is received from the mobile wireless device for world wide web access in order to obtain authentication for the mobile wireless device before permitting world wide web access. When a world wide web access request is received from the mobile wireless device, it is redirected to an authentication portal to allow a user of the mobile wireless device to enter user credentials to allow for world wide web access using the IP address.
摘要:
A method is provided in one example embodiment and includes receiving a request to authenticate an end user in a service provider network, and evaluating the request to identify the end user as belonging to an enterprise network. A tag is generated for a packet associated with a flow for the end user in the enterprise network. Routing occurs for subsequent packets associated with the flow between the enterprise network and the end user. The subsequent packets associated with the flow are not routed through the service provider network. In more particular embodiments, the end user is authenticated in the enterprise network after being authenticated in the service provider network. In addition, traffic for the end user can be separated based on one or more tags identified within the flow. A plurality of flows can be classified based on a customer identification (CID). The tag can be a virtual local area network (VLAN) tag generated at a base station.
摘要:
Techniques are provided for performing web authentication of mobile wireless devices that roam from a wireless wide area network to a wireless local area network. A redirect rule is invoked when a request is received from the mobile wireless device for world wide web access in order to obtain authentication for the mobile wireless device before permitting world wide web access. When a world wide web access request is received from the mobile wireless device, it is redirected to an authentication portal to allow a user of the mobile wireless device to enter user credentials to allow for world wide web access using the IP address.
摘要:
A method is provided in one example embodiment and includes receiving a request to authenticate an end user in a service provider network, and evaluating the request to identify the end user as belonging to an enterprise network. A tag is generated for a packet associated with a flow for the end user in the enterprise network. Routing occurs for subsequent packets associated with the flow between the enterprise network and the end user. The subsequent packets associated with the flow are not routed through the service provider network. In more particular embodiments, the end user is authenticated in the enterprise network after being authenticated in the service provider network. In addition, traffic for the end user can be separated based on one or more tags identified within the flow. A plurality of flows can be classified based on a customer identification (CID). The tag can be a virtual local area network (VLAN) tag generated at a base station.