摘要:
Various exemplary embodiments relate to a method and related network node including one or more of the following: receiving, at a policy and charging rules node (PCRN) from a requesting entity, a message including a request associated with at least one service data flow (SDF); extracting a subscriber identifier and a first identifier from the message; retrieving a subscription record associated with the subscriber identifier, wherein the subscription record is associated with a first plurality of subrecords; identifying an first subrecord from the plurality of subrecords based on the first identifier; and conditionally fulfilling the request based on a first value stored in the first subrecord.
摘要:
Various exemplary embodiments relate to a method and related network node including one or more of the following: receiving, at the policy and charging rules node from a requesting entity, a message including a request associated with at least one service data flow (SDF), wherein the request includes at least one requested bandwidth; extracting at least one subscriber identifier from the message; retrieving a subscription record associated with the at least one subscriber identifier; determining whether the request should be fulfilled by performing at least one comparison of the at least one requested bandwidth for the SDF against at least one field of the subscription record; if the request should be fulfilled, establishing the SDF; and if the request should not be fulfilled: generating a response message that indicates that the request was rejected, and transmitting the response message to the requesting entity.
摘要:
Various exemplary embodiments relate to a method and related network node including one or more of the following: receiving, at a policy and charging rules node (PCRN) from a requesting entity, a message including a request associated with at least one service data flow (SDF); extracting a subscriber identifier and a first identifier from the message; retrieving a subscription record associated with the subscriber identifier, wherein the subscription record is associated with a first plurality of subrecords; identifying an first subrecord from the plurality of subrecords based on the first identifier; and conditionally fulfilling the request based on a first value stored in the first subrecord.
摘要:
Various exemplary embodiments relate to a method and related network node including one or more of the following: receiving, at the policy and charging rules node from a requesting entity, a message including a request associated with at least one service data flow (SDF), wherein the request includes at least one requested bandwidth; extracting at least one subscriber identifier from the message; retrieving a subscription record associated with the at least one subscriber identifier; determining whether the request should be fulfilled by performing at least one comparison of the at least one requested bandwidth for the SDF against at least one field of the subscription record; if the request should be fulfilled, establishing the SDF; and if the request should not be fulfilled: generating a response message that indicates that the request was rejected, and transmitting the response message to the requesting entity.
摘要:
A method of exchanging a rules engine decision tree cache is disclosed. The method provides for provision accepting a command to build a replacement rules engine decision tree cache, replacing the existing cache if the decision tree creation process is successful, retaining the existing cache if the decision tree creation process is not successful, and providing specific error messages in the event that the replacement fails. The method allows an network operator to change the rules for the rule engine without disruption of real-time service and allows for a level of error checking prior to provisioning the new decision tree.
摘要:
Various exemplary embodiments relate to a method and related network node and machine-readable storage medium including a policy and charging rules node (PCRN) receiving a plurality of related service requests from different devices. The PCRN may establish a Session Binding Identifier (SBI) for each message received. The SBI may include one or more subscriber IDs. Upon receipt of a message, the PCRN may compare the included subscriber IDs against information included in a subscriber database to match with a specific subscriber profile. The PCRN may use the subscriber profile to determine whether existing established sessions are associated with the same subscriber profile, and may bind the sessions together when they are associated with a common subscriber profile.
摘要:
Various exemplary embodiments relate to a method and related network node and machine-readable storage medium including a policy and charging rules node (PCRN) receiving a plurality of related service requests from different devices. The PCRN may establish a Session Binding Identifier (SBI) for each message received. The SBI may include one or more subscriber IDs. Upon receipt of a message, the PCRN may compare the included subscriber IDs against information included in a subscriber database to match with a specific subscriber profile. The PCRN may use the subscriber profile to determine whether existing established sessions are associated with the same subscriber profile, and may bind the sessions together when they are associated with a common subscriber profile.
摘要:
A method of exchanging a rules engine decision tree cache is disclosed. The method provides for provision accepting a command to build a replacement rules engine decision tree cache, replacing the existing cache if the decision tree creation process is successful, retaining the existing cache if the decision tree creation process is not successful, and providing specific error messages in the event that the replacement fails. The method allows an network operator to change the rules for the rule engine without disruption of real-time service and allows for a level of error checking prior to provisioning the new decision tree.
摘要:
A method of optimizing a rules engine rule set is disclosed. The method provides for identifying groups of rule conditions within a rule table that are repetitive; determining a hash function that will effectively summarize in a condensed form the set of criteria, operations and values that distinguish the group for each respective group of the identified groups; calculating hash values per the hash functions for each row of the rule table; storing the derived hash functions, the calculated hash values, and the original rule in memory when loading; and then at run time when the rule engine is invoked: calculating the hash values using the respective hash functions associated with the rule table using the attributes provided at invocation; and skipping all rows whose hash values are different from the calculated invocation hash values. The method of optimizing rule entities is particularly useful for overcoming the longer calculation times associated with un-optimized rule tables known in the art.
摘要:
A framework for connectivity verification is provided. The framework includes a connectivity verification server performing unattended connectivity verification, and a connectivity verification application, both the connectivity verification server and connectivity verification application operating in a network management context. Connectivity verification jobs are defined via the connectivity verification application and the connectivity verification server is configured accordingly. Connectivity verification jobs can also be scheduled. The connectivity verification application also provides a display of connectivity verification results. The results of each connectivity verification job may be compared against a desired connectivity profile and deviations from the connectivity profile being used to raise alarms. Connectivity verification results, including alarm information, are further used to highlight displayed managed communications network entities on a network map displaying selected connectivity verification results. The advantages are derived from using the connectivity verification framework to automate connectivity verification testing at reduced operational costs.