摘要:
A method is provided in one example embodiment and includes receiving a request to authenticate an end user in a service provider network, and evaluating the request to identify the end user as belonging to an enterprise network. A tag is generated for a packet associated with a flow for the end user in the enterprise network. Routing occurs for subsequent packets associated with the flow between the enterprise network and the end user. The subsequent packets associated with the flow are not routed through the service provider network. In more particular embodiments, the end user is authenticated in the enterprise network after being authenticated in the service provider network. In addition, traffic for the end user can be separated based on one or more tags identified within the flow. A plurality of flows can be classified based on a customer identification (CID). The tag can be a virtual local area network (VLAN) tag generated at a base station.
摘要:
A method is provided in one example embodiment and includes receiving a request to authenticate an end user in a service provider network, and evaluating the request to identify the end user as belonging to an enterprise network. A tag is generated for a packet associated with a flow for the end user in the enterprise network. Routing occurs for subsequent packets associated with the flow between the enterprise network and the end user. The subsequent packets associated with the flow are not routed through the service provider network. In more particular embodiments, the end user is authenticated in the enterprise network after being authenticated in the service provider network. In addition, traffic for the end user can be separated based on one or more tags identified within the flow. A plurality of flows can be classified based on a customer identification (CID). The tag can be a virtual local area network (VLAN) tag generated at a base station.
摘要:
A method is provided in one example embodiment and includes receiving a request for a service flow over a wireless link, where the request specifies resource requirements; dynamically reserving bandwidth for the resource requirements in a backhaul link; and mapping a packet received over the wireless link to the backhaul link based on an identification element associated with the packet and the service flow.
摘要:
A method is provided in one example embodiment and includes receiving a plurality of status signals, for a plurality of radio links, at a microwave device; detecting a bandwidth anomaly based on the status signals; and communicating a quality of service (QoS) control signal, which is based on the bandwidth anomaly, to a gateway coupled to at least one of the radio links.
摘要:
A method is provided in one example embodiment and includes receiving a plurality of status signals, for a plurality of radio links, at a microwave device; detecting a bandwidth anomaly based on the status signals; and communicating a quality of service (QoS) control signal, which is based on the bandwidth anomaly, to a gateway coupled to at least one of the radio links.
摘要:
Techniques are provided for performing web authentication of mobile wireless devices that roam from a wireless wide area network to a wireless local area network. A redirect rule is invoked when a request is received from the mobile wireless device for world wide web access in order to obtain authentication for the mobile wireless device before permitting world wide web access. When a world wide web access request is received from the mobile wireless device, it is redirected to an authentication portal to allow a user of the mobile wireless device to enter user credentials to allow for world wide web access using the IP address.
摘要:
A method is provided in one example embodiment and includes creating a service flow with an endpoint over a wireless link coupled to a backhaul; notifying a mobility anchor of a location associated with the endpoint; relaying control packets between the endpoint and an access gateway; and relaying bearer packets between the endpoint and the mobility anchor, where the bearer packets are exchanged with the endpoint over a locally terminated bearer tunnel and the bearer packets are exchanged with the mobility anchor using Proxy Mobile Internet Protocol.
摘要:
Techniques are provided for performing web authentication of mobile wireless devices that roam from a wireless wide area network to a wireless local area network. A redirect rule is invoked when a request is received from the mobile wireless device for world wide web access in order to obtain authentication for the mobile wireless device before permitting world wide web access. When a world wide web access request is received from the mobile wireless device, it is redirected to an authentication portal to allow a user of the mobile wireless device to enter user credentials to allow for world wide web access using the IP address.
摘要:
A method is provided in one example embodiment and includes creating a service flow with an endpoint over a wireless link coupled to a backhaul; notifying a mobility anchor of a location associated with the endpoint; relaying control packets between the endpoint and an access gateway; and relaying bearer packets between the endpoint and the mobility anchor, where the bearer packets are exchanged with the endpoint over a locally terminated bearer tunnel and the bearer packets are exchanged with the mobility anchor using Proxy Mobile Internet Protocol.
摘要:
A method (200, 300, 400) and a system (100, 500) of controlling access to media content (120). A first setup request indicating a request to access at least a first portion of the media content can be received from a mobile client (104). A first authorization request can be communicated to a policy manager (116, 132) to inquire whether access by the mobile client to the first portion of the media content is authorized, and a first authorization response to the first authorization request can be received from the policy manager. When the first authorization response indicates that the request to access the first portion of the media content is authorized, a second authorization response that indicates that the request to access the first portion of the media content is authorized can be communicated to the mobile client.