摘要:
The invention concerns a method of providing resource admission control to packet flows (11, 12, 50) associated with sessions in a communication network (2), and an access controller (21, 22) to execute this method. The communication network (2) handles packets according to priority levels assigned to the packets. The priority levels comprise at least a first and a second priority level wherein the first priority level is higher than the second priority level. First, a packet flow (12) associated with the new session is identified when packets of the packet flow (12) enter the communication network (2). Preferably, the new session is a real-time session. The second priority level is assigned to the identified packet flow and the packet flow (12) is handled according to the second priority level within the communication network (2). A congestion level is measured in the communication network (2). If the measured congestion level stays below a predefined threshold, the priority level of the packet flow (12) associated with the new session is upgraded from the second priority to the first priority within the communication network (2). Once upgraded, the packet flow (12) is handled according to the first priority level within the communication network (2) until the packet flow (12) is terminated.
摘要:
According to an embodiment, a scout agent with network connectivity is configured to build a source database by learning address information, port information and protocol information of certain traffic sources. The scout agent is configured to learn application traffic profile information of these traffic sources, and instruct storage of the address information, port information, protocol information and application traffic profile information in a source database.
摘要:
Systems with support nodes (30) for transmitting multicast information to terminals (40) via radio networks controlled by radio network controllers (33) are provided with service detectors (54) for detecting multicast services supported by the radio networks and with contact instructors (55) for, in response to negative detection results, instructing the radio networks to contact the terminals (40) individually instead of contacting the terminals (34-39) as a group. Only radio network controllers (33) located in hotspot areas (81) need to be adapted to handle the multicast service. The terminals (40) comprise identifier selectors (43) for selecting access point identifiers to be sent to the support nodes (33) for identifying an individual bearer to be used for transmitting the multicast information, and identifier detectors (44) for detecting the access point identifier in a bearer set up message. The support nodes (33) further comprise identifier suppliers (56) for supplying the access point identifier received from the terminal (40) to the bearer set up message.
摘要:
The present invention describes an authentication method for use in a telecommunication system for providing Internet Protocol Multimedia services to a user using a terminal of a customer premises multimedia equipment and having a user identification. The method comprises, in the event when the user identification is one of a first plurality of user identifications that are sharing a first fixed access line, the steps of: predefining in a storing means for each one of a plurality of fixed access lines that comprises this first fixed access line, an association between the one fixed access line and a plurality of Internet Protocol Multimedia Subsystem profiles and providing thereby a plurality of associations, each one of the plurality of Internet Protocol Multimedia Subsystem profiles is related to one of a plurality of user identifications that are sharing the one fixed access line. The plurality of associations comprises hereby a first plurality of associations between the first fixed access line and a first plurality of Internet Protocol Multimedia Subsystem Profiles, each being related to one of the first plurality of user identifications; and transmitting by the terminal a service request, that comprises the user identification U3, via the first fixed access line; and determining with a processor, for the service request, the user identification and the first fixed access line; and controlling with the processor the plurality of associations, upon the presence of an association between the first fixed access line and an Internet Protocol Multimedia Subsystem Profile that is related to the user identification; and providing by the processor authentication for the user identification for at least one Internet Protocol Multimedia Subsystem service.
摘要:
A method for controlled delivery of a service from a server (S) to a client (C), includes the steps of sending a download descriptor, from server (S) to client (C), retrieving of the service by the client, sending of a first type confirmation message by the client, activating the service by the client (C), wherein the service is first transformed within the server (S) into a sequence of individual blocks, wherein download descriptor (descn) and first type of confirmation message (confn) are generated and transmitted per at least one block of said sequence, and wherein the first type confirmation message (confn) is sent upon receipt of said at least one block by said client (C). Further improvements include the activation of block n being started before the total contents of block n being received, the first type of confirmation message (confn) for block n being generated upon the complete receipt of block n, and the download descriptor (descn+2) for block n+2 being generated and transmitted upon receipt of said first type confirmation message (confn) for block n.
摘要:
A method for reconstructing torrent content metadata, i.e. a torrent identifier, a segment length and an amount of segments of a torrent content file, without access to the torrent content metafile, comprises the steps of: A. obtaining the torrent content identifier from torrent signaling from a client; B. obtaining a torrent content file size from said torrent signaling from said client; C. obtaining a tracker address from said torrent signaling from said client: D. obtaining a peer address from a tracker; E. contacting a peer via the peer address; F. downloading sequential minimum size blocks of a full size segment from the peer in order to determine the segment length; G. calculating the amount of segments from the torrent content file size and the segment length.
摘要:
A method for reconstructing torrent content metadata, i.e. a torrent identifier, a segment length and an amount of segments of a torrent content file, without access to the torrent content metafile, comprises the steps of: A. obtaining the torrent content identifier from torrent signaling from a client; B. obtaining a torrent content file size from said torrent signaling from said client; C. obtaining a tracker address from said torrent signaling from said client: D. obtaining a peer address from a tracker; E. contacting a peer via the peer address; F. downloading sequential minimum size blocks of a full size segment from the peer in order to determine the segment length; G. calculating the amount of segments from the torrent content file size and the segment length.