摘要:
A system and method is provided for adjusting a traffic rate for a Message Session Relay Protocol (MSRP) session established between two network nodes at a per session level. Each MSRP session has a traffic rate for which MSRP messages are transmitted over the MSRP session. The traffic rate per session can be adjusted, and the adjusted traffic rate per session can be communicated to adjacent nodes.
摘要:
A system and method is provided for adjusting a traffic rate for a Message Session Relay Protocol (MSRP) session established between two network nodes at a per session level. Each MSRP session has a traffic rate for which MSRP messages are transmitted over the MSRP session. The traffic rate per session can be adjusted, and the adjusted traffic rate per session can be communicated to adjacent nodes.
摘要:
Methods and apparatuses, including computer program products, are described for establishing secure communications sessions between computing devices located behind network security devices. The method includes receiving, from a first client computing device, a request for a secure connection with a second client computing device, the request including a first transport protocol role and a first security protocol role associated with the first device. The method includes transmitting the request to the second device. The method includes receiving, from the second device, a response to the request including a second transport protocol role and a second security protocol role associated with the second device, transmitting the response to the first device, and establishing the secure connection between the first device and the second device, where the first and second security protocol roles are determined independently from the first and second transport protocol roles.
摘要:
Methods and apparatuses, including computer program products, are described for establishing secure communications sessions between computing devices located behind network security devices. The method includes receiving, from a first client computing device, a request for a secure connection with a second client computing device, the request including a first transport protocol role and a first security protocol role associated with the first device. The method includes transmitting the request to the second device. The method includes receiving, from the second device, a response to the request including a second transport protocol role and a second security protocol role associated with the second device, transmitting the response to the first device, and establishing the secure connection between the first device and the second device, where the first and second security protocol roles are determined independently from the first and second transport protocol roles.
摘要:
A method for control of real-time traffic entry of a managed packet network includes the step of receiving, from a border element processor, a first message indicative of a new active registration request associated with a client. The border element processor is one of a plurality of border element processors at an edge of a managed packet network controlling packets (e.g., relating to real-time multimedia traffic) entering the managed packet network. The method also includes the step of load balancing, by a load balancing engine, the new active registration request across the plurality of border element processors and assigning the client to a designated border element processor. A second message is generated in response to the new activation registration request. The second message includes a parameter identifying the designated border element processor assigned to the client.
摘要:
A method for control of real-time traffic entry of a managed packet network includes the step of receiving, from a border element processor, a first message indicative of a new active registration request associated with a client. The border element processor is one of a plurality of border element processors at an edge of a managed packet network controlling packets (e.g., relating to real-time multimedia traffic) entering the managed packet network. The method also includes the step of load balancing, by a load balancing engine, the new active registration request across the plurality of border element processors and assigning the client to a designated border element processor. A second message is generated in response to the new activation registration request. The second message includes a parameter identifying the designated border element processor assigned to the client.
摘要:
Systems and methods for user device registration are disclosed. In certain embodiments, at least a first edge device in a group of edge devices enters a mass-restart mode. The first edge device receives a request for registration from a user device and determines whether the user device is currently registered through the first edge device. The first edge device generates a notification associated with the user device if the user device is not currently registered through the first edge device. A second edge device in the group of edge devices receives the notification and determines whether the user device is currently registered through the second edge device based on the notification. Registration information about the user device is deleted from the second edge device if the user device is currently registered through the second edge device.
摘要:
Methods and apparatuses, including computer program products, are described for priority policing of requests with deferred determination of priority level. The method includes directing each packet in a data stream to a policer. The method also includes determining whether to allow, reject, or conditionally pass each packet through the policer based on parameters associated with the policer. The method also includes directing each packet conditionally passed by the policer to a classifier associated with the policer. The method also includes determining, by the classifier, a priority value of each packet received from the policer. The method also includes directing, by the classifier, each prioritized packet to the policer. The method also includes determining whether to allow or reject each prioritized packet through the policer based on the priority value.
摘要:
The invention includes two hosts having synchronized information to provide graceful failover for an SSCOP Service Access Point. Each host connected to the same SSCOP SS7 link, and has a Link Manager, SSCF-NNI layer, and SSCOP layer. For each link, there is an instance of SSCF-NNI state machine running in stack and similarly for each link there is an instance of SSCOP state machine running in the stack. Once the Link Manager detects that the active host on the redundancy group for SS7 links has failed, it checks its list of links, whether the failed host was the active host for those links and whether the links were active. If the Link Manager determines that the active host has failed and the links were active, it informs the SSCF-NNI and the SSCOP, which then switch the corresponding state machine from a default “Idle” state to an “In Service” and “Outgoing Recovery Pending” state respectively. By following the procedures defined for SSCOP in Q.2110 after this point on, SSCOP state machine eventually switches to “Data Transfer Ready” state and the standby host thereby becomes the active host in a transparent manner to the SSCOP user.
摘要:
Systems and methods for user device registration are disclosed. In certain embodiments, at least a first edge device in a group of edge devices enters a mass-restart mode. The first edge device receives a request for registration from a user device and determines whether the user device is currently registered through the first edge device. The first edge device generates a notification associated with the user device if the user device is not currently registered through the first edge device. A second edge device in the group of edge devices receives the notification and determines whether the user device is currently registered through the second edge device based on the notification. Registration information about the user device is deleted from the second edge device if the user device is currently registered through the second edge device.