H04L12/813

Service control method and device

Provided are a service control method and device. The method includes: acquiring related information of a user service and real-time status information of a service used by a user, wherein the related information includes: information needing to be referenced for regulating a control policy for the user service; based on the related information and real-time status information which are acquired, monitoring a current service status of a mobile network; and generating or adjusting user control policy information according to a result of the monitoring, and issuing the generated or adjusted user control policy information. The technical solution solves the problem in the related art of being unable to dynamically adjust the control policy of a user, thereby improving the mobile network quality, and improving the network experience of the user.

METHOD AND APPARATUS FOR CONTROLLING TRAFFIC QUALITY
20170230291 · 2017-08-10 ·

A method for controlling traffic transmission in a control server of a communication system includes receiving information of an application corresponding to a network session; receiving, from a network node, information related to a network congestion condition with respect to the network session; and controlling a traffic flow of the network session on the basis of a traffic quality policy which is determined on the basis of the received application information and/or the information related to the network congestion condition. The control server can receive, from an electronic device, the application information of an application corresponding to the network session. The control server can determine the quality policy on the basis of the application information. The control sever can control the traffic flow of the network session according to the quality policy.

Multi-protocol label switching rings
09729455 · 2017-08-08 · ·

Techniques are described for specifying and constructing multi-protocol label switching (MPLS) rings. Routers may signal membership within MPLS rings and automatically establish ring-based label switch paths (LSPs) as components of the MPLS rings for packet transport within ring networks. In one example, a router includes a processor configured to establish an MPLS ring having a plurality of ring LSPs. Each of the ring LSPs is configured to transport MPLS packets around the ring network to a different one of the routers operating as an egress router for the respective ring LSP. Moreover, each of the ring LSPs comprises a bidirectional, multipoint-to-point (MP2P) LSP for which any of the routers can operate as an ingress to source packet traffic into the ring LSP for transport to the respective egress router for the ring LSP. Separate protection paths, bypass LSPs, detours or loop-free alternatives need not be signaled.

USER PACKET FORWARDING CONTROL METHOD AND PROCESSING NODE
20170222953 · 2017-08-03 ·

This embodiment provides a user packet forwarding control method and a processing node. A processing node receives a processed user packet sent by a first target value-added server (VAS), and the processing node correspondingly generates a target processing identifier according to the processed user packet, so that the processing node determines, according to the target processing identifier, that the user packet has been processed by the first target VAS. Each processing node can determine VASs that have processed the user packet, without the need to change the original user packet, thereby effectively ensuring that each VAS provides a normal value-added service to the user packet, and avoiding a fault in a process of forwarding the user packet between value-added servers.

System and method for customizing the identification of application or content type
09722918 · 2017-08-01 · ·

Expertise, for performing classification of a type of network traffic, can be encapsulated in a module. A set of modules, as currently available to a traffic controller, can be referred to as a collection. Programming language constructs are introduced that facilitate the writing of modules customized to identify network traffic that is peculiar to a particular user, or to a relatively small group of users. An example programming language, based on Tcl, is introduced. A key aspect is event-driven programming, and the “when” command construct is introduced. Three important event types, that can trigger a “when” command, are CLIENT_DATA, SERVER_DATA, and RULE_INIT. Another key aspect is an ability to keep state information between events. Constructs for intra-session, intra-module, and global state are introduced. A module can be blocked from executing more than once for a session. Successful execution of a module can be specified by a “match” statement.

Selective packet sequence acceleration in a network environment

A data flow is received at a network processor that includes a plurality of frames. A first set of frames in the plurality of frames are passed from the network processor to a general processor for processing by the general processor. A flow acceleration request is received at the network processor from the general processor based at least in part on inspection of a first frame in the first set of frames. The flow acceleration request is received subsequent to passing at least two of the first set of frames to the general processor. A particular frame in the plurality of frames received subsequent to the first set of frames is processed by the network processor such that it is accelerated relative to processing of the first set of frames by the general processor and bypasses the general processor.

Dynamically tunable heterogeneous latencies in switch or router chips

A device with dynamically tunable heterogeneous latencies includes an input port configured to receive a packet via a network, and a processing module configured to determine multiple values corresponding to a number of qualifying parameters associated with the packet. The processing module may use the values to generate a selector value and may allocate a latency mode to the packet based on the selector value.

METHODS AND DEVICES FOR POLICING TRAFFIC FLOWS IN A NETWORK
20170280357 · 2017-09-28 ·

Devices and methods for policing traffic flows in a network are described herein. For example, a network device can include a processing unit and a memory operably coupled to the processing unit. The network device can be configured to provide an input port and an output port, the input and output ports being configured to process a traffic flow received at the network device. The network device can also be configured to queue the traffic flow using a plurality of buffers associated with the output port, cyclically direct the traffic flow from the input port to each of the plurality of buffers according to a queuing schedule, and enforce a policer policy synchronized to the queuing schedule. The policer policy can ensure that the traffic flow does not exceed a predetermined bandwidth.

Hierarchical service policies for creating service usage data records for a wireless end-user device
09819808 · 2017-11-14 · ·

A non-transitory computer-readable storage medium storing one or more machine-executable instructions that, when executed by one or more processors, cause the one or more processors to: determine whether a traffic flow of a wireless end-user device is associated with a first service activity, the traffic flow comprising one or more attempted or successful communications over a wireless access network; if it is determined that the traffic flow is associated with the first service activity, create a first data record, the first data record identifying the first service activity; if it is determined that the traffic flow is not associated with the first service activity, determine whether the traffic flow is associated with a second service activity; and if it is determined that the traffic flow is associated with the second service activity, create a second data record, the second data record identifying the second service activity.

Efficient policy enforcement using network tokens for services C-plane approach

A device establishes flows associated with one or more applications using control plane signaling. A gateway device obtains a request for a network token during the control plane signaling. The gateway device derives the network token and sends it to the device and/or an access node during the control plane signaling. The device and/or access node obtain the network token, where the network token is associated with a first flow of the one or more flows, a first application of the one or more applications, and provisioned to the device or access node via the control plane signaling. The network token may be included in a packet sent in the user plane from the device. The network token may be verified at the access node and/or the gateway device using a cryptographic function and sent to its destination based on the results of the verification.