摘要:
A method of operating a data network may include establishing a data path through the data network between a routing gateway and service provider equipment providing a data service. Moreover, the data service may be provided for use at the routing gateway over the data path during a data session. A request may be received from the service provider equipment where the request defines a data flow characteristic for the data path between the routing gateway and the service provider equipment providing the data service. The data flow characteristic may then be transmitted to a network element along the data path between the routing gateway and the service provider equipment. A request from service provider equipment can include an allowed bandwidth or prioritization. Related methods, data networks, data service providers, routing gateways, and computer program products are also discussed.
摘要:
Quality of Service (QoS) and/or bandwidth allocation is managed in a Regional/Access Network (RAN) that provides end-to-end transport between a Network Service Provider (NSP) and/or an Application Service Provider (ASP), and a Customer Premises Network (CPN) that includes a Routing Gateway (RG). A first subsystem is configured to manage QoS and/or bandwidth allocation for an access session in the CPN. A second subsystem is configured to manage QoS and/or bandwidth allocation for an application flow in the CPN. Thus, the RAN can independently manage QoS, session authentication and/or bandwidth allocation for an access session and for an application flow.
摘要:
Methods, systems, and devices are disclosed for detecting encrypted Internet Protocol packet streams. The type of data within an encrypted stream of packets is inferred using an observable parameter. The observable parameter is observable despite encryption obscuring the contents of the encrypted stream of packets. A timer is established that maintains settings despite changes in the type of inferred data.
摘要:
Methods, systems, and devices are disclosed for detecting encrypted Internet Protocol packet streams. A probe stream having a known observable parameter is generated. The observable parameter exhibits a known characteristic of a known type of data encrypted within a stream of packets. The probe stream is communicated to a network element via a communications network. When the probe stream is received by the network element, the network element can compare the known observable parameter to an actual value. Any difference between the known observable parameter and the actual value can be used to correct for network-induced variation and other effects, thus ensuring accurate detection and identification of data types within encrypted streams of packets.
摘要:
Methods, systems, and products are disclosed for specifying a signature for an encrypted packet stream. One method receives the encrypted stream of packets, and encryption obscures the contents of a packet. A signature for insertion into the stream of packets is specified, and the signature identifies a type of data encrypted within the stream of packets. The signature identifies the contents of the packet despite the encryption obscuring the contents.