Patent classifications
H04L12/813
Method, system, and entity for exercising policy control
A method and a system for exercising policy control, a policy and charging enforcement function (PCEF), and a policy control and charging rules function (PCRF) are provided, which can solve the problem that no policy control can be exercised over application service flows without an application function (AF). The method includes of the following steps: a PCRF receiving information about an application event sent by a PCEF; and the PCRF generating a control policy for a service flow of the application according to the information about the application event, and delivering the control policy to the PCEF. In the present invention, the PCEF sends the obtained information about the application event to the PCRF, so that even when no AF is involved, the PCRF can still generate a control policy according to policy contexts including the information about the application event and the like, so as to exercise an effective policy control over the QoS guarantee, charging and gating of the service flow, thus meeting the requirements of exercising the policy control over data applications with no AF being involved.
System and method for distribution of policy enforcement point
The disclosure herein describes an edge device of a network for distributed policy enforcement. During operation, the edge device receives an initial packet for an outgoing traffic flow, and identifies a policy being triggered by the initial packet. The edge device performs a reverse lookup to identify at least an intermediate node that is previously traversed by the initial packet and traffic parameters associated with the initial packet at the identified intermediate node. The edge device translates the policy based on the traffic parameters at the intermediate node, and forwards the translated policy to the intermediate node, thus facilitating the intermediate node in applying the policy to the traffic flow.
Policy enforcement for upstream flood traffic
Systems, methods, and computer-readable media are provided for enforcing policy for upstream (e.g., traffic from an endpoint to the physical network layer or hardware fabric of a data center) flood traffic (e.g., broadcast, unknown unicast, or multicast traffic) originating from a virtual endpoint via a network fabric. In one embodiment, upstream flood traffic can be transmitted using a special multicast group to which only elements of the data center fabric (e.g., physical switches, routers) are subscribed. That is, upstream flood traffic is assigned to the special multicast group, resulting in unintended endpoints not receiving the flood traffic. However, the hardware fabric receives the flood traffic and will then enforce applicable policies to route the packets to intended endpoints.
METHOD FOR TRANSMITTING/RECEIVING SIGNAL RELATED TO NBIFOM IN WIRELESS COMMUNICATION SYSTEM, AND APPARATUS THEREFOR
One embodiment of the present invention relates to a method for transmitting/receiving a signal related to network-based IP flow mobility (NBIFOM) in a wireless communication system, the method comprising the steps of: a terminal receiving a routing rule from a network, in network initiated mode in which the terminal cannot generate the routing rule; transmitting a rejection of the routing rule to the network; and transmitting, to the network, information indicating the availability of an access type included in the routing rule, when the access type included in the routing rule becomes available.
EFFICIENT SYNCHRONIZATION OF STORED INFORMATION USING A PARALLEL RING NETWORK TOPOLOGY
A routing system may include a primary message group to be used for synchronizing stored information. The primary message group may include multiple primary network devices. The multiple primary network devices may be configured with a first configuration regarding synchronizing the stored information. The primary message group may form a ring network topology. The routing system may include a secondary message group to be used for synchronizing the stored information. The secondary message group may include a single primary network device, of the multiple primary network devices, and multiple secondary network devices. Each secondary network device, of the multiple secondary network devices, may be included in a single secondary message group. The multiple secondary network devices may be configured with a second configuration regarding synchronizing the stored information. The secondary message group may form a different ring network topology.
SYSTEM AND METHOD FOR AUTOMATED RENDERING OF SERVICE CHAINING
In one embodiment, a method includes creating a catalog of service function (“SF”) profiles, wherein each of the profiles is associated with an SF and indicates a type of the associated SF; storing the catalog of SF profiles in a memory device of a service controller associated with the DVS; creating a service profile group template (“SPGT”) that includes at least one SF profile from the catalog of SF profiles, wherein the SPGT includes a service chain definition identifying at least one service chain comprising the SF associated with the at least one SF profile to be executed in connection with a service path and at least one policy for classifying traffic to the at least one service chain; deploying a first SPG instance based on the SPGT; and deploying an additional SPG instance based on the SPGT in accordance with a scaling policy included in the SPGT.
Bandwidth policy management in a self-corrected content delivery network
In one embodiment of a network pipe optimization method, a network element may obtain at least one of a push pipe utilization report and a pull pipe utilization report from each distribution node of the content delivery network. Based on the utilization reports, the network element may determine new push pipe weights and new pull pipe weights for distribution pipes associated with each distribution node of the content delivery network. Using at least one of the new push pipe weights and new pull pipe weights, a network pipe utilization model associated with the content delivery network may be simulated. Responsive to determining that the simulated network pipe utilization model yields an improved utilization of the content delivery network, the new push pipe weights and new pull pipe weights may be distributed to each distribution node in the content delivery network.
Application-based path computation
A software-defined network (SDN) may include a controller that causes data an flow to be routed at least partially based on an application associated with the flow. The controller may identify an application associated with a flow and may determine desired transmission characteristics associated with the application. The controller may then dynamically identify an appropriate path for the flow data based on the desired transmission characteristics. The controller may further identify a quality of service value associated with a source or destination device associated with the flow data and may adjust the quality of service value based on the desired transmission characteristics associated with the application.
SOFTWARE DEFINED NETWORK TRAFFIC CONGESTION CONTROL
A method includes obtaining traffic statistics of accepted hybrid traffic at a controller of a software defined network that includes multiple local switches coupled by links, calculating an end to end delay associated with the accepted hybrid traffic, determining network stability thresholds from each local switch as a function of network congestion, determining an adjusted rate decision policy as a function of the end to end delay and the network stability thresholds, the adjusted rate decision policy for use by an edge switch to determine whether or not to accept offered traffic loads.
System and method for reporting packet characteristics in a network environment
A method is provided in one example and includes receiving a request to initiate a communication flow associated with a subscriber and identifying one or more parameters to be monitored for the communication flow. The method further includes extracting one or more bits from packets associated with the communication flow; the bits are used to determine an operating system associated with the communication flow. A policy decision can be executed for the communication flow based on the operating system associated with the communication flow. In more specific examples, the bits are sent to a next destination in response to a threshold being reached for at least one of the parameters. The parameters can be associated a volume parameter or a time parameter. The policy decision could include blocking traffic associated with the subscriber, initiating billing, redirecting the communication, managing a quality of service level for the communication flow, etc.