摘要:
The invention relates to a method for remotely controlling the congestion of meshed flow exchanged in a packet mode telecommunication network between a number N of central sites Ci provided with flow management devices and a number M of remote sites Dm devoid of such devices. According to the invention, said active devices of central sites Ci exchange between them information intended specifically for the management of flows exchanged between each of the central sites Ci and each of the remote sites Dm.
摘要:
The invention relates to a method for remotely controlling the congestion of meshed flow exchanged in a packet mode telecommunication network between a number N of central sites Ci provided with flow management devices and a number M of remote sites Dm devoid of such devices.According to the invention, said active devices of central sites Ci exchange between them information intended specifically for the management of flows exchanged between each of the central sites Ci and each of the remote sites Dm.
摘要:
The invention relates to a method for optimising the transfer of secure data streams via an autonomic network between multiple information-producing users Pi and multiple information-consuming users Cj, in which, for each secure session between an information-producing user Pi and an information-consuming user Cj, non-persistent security settings are exchanged between an optimisation module and an autonomic agent via a secure control channel to apply between the autonomic agent and the optimisation module the previously negotiated security procedure, such that during an exchange of streams between the information-producing user Pi and the information-consuming user Cj, the optimisation module having non-persistent security settings appears as a client for a server during the said session.
摘要:
The invention relates to a method for optimizing the transfer of secure data streams via an autonomic network between multiple information-producing users Pi and multiple information-consuming users Cj, in which, for each secure session between an information-producing user Pi and an information-consuming user Cj, non-persistent security settings are exchanged between an optimization module and an autonomic agent via a secure control channel to apply between the autonomic agent and the optimization module the previously negotiated security procedure, such that during an exchange of streams between the information-producing user Pi and the information-consuming user Cj, the optimization module having non-persistent security settings appears as a client for a server during the said session.