摘要:
Advertising referral methods and systems allow a first user to refer advertisements of interest to other users, taking advantage of pre-existing social networks. A referral server may coordinate a referral by either receiving a referral message from the first user for forwarding to another user, or by receiving notification of the referral message. Information about the referral may be stored in a database. If another user accesses the referred advertisement, additional information may be received by the referral server and stored in the database. The first user may be credited with inducements based on the referred advertisement and whether or not another user accessed it.
摘要:
A method, system, and computer program product for providing VLAN capacity requirement estimation is provided. The method includes receiving at a computing system a VLAN configuration file that specifies VLAN access ports, VLAN switches and VLAN trunks in a VLAN. A target access port identifier is received at the computing system from a requestor. A target trunk and target switch corresponding to the target access port are determined at the computing system. A bandwidth contribution of the target access port to the VLAN is calculated at the computing system. The calculating is based on a least contribution algorithm that reflects an impact of provisioning the target access port with respect to trunk capacity, and is responsive to the target bandwidth requirement, the target class of service and placement of the target port in the VLAN. The bandwidth contribution is then transmitted to the requestor.
摘要:
Quality of Service (QoS) in a communication network is managed. A service provider requests a level of QoS for communication in the communication network using a QoS request. The requested level of QoS may be allocated to the service provider based on the QoS request. The service provider may make the QoS request on its own initiative and/or in response to a request from an application that is hosted by the service provider. A QoS level may then be allocated to the service provider and/or to particular applications that are hosted by the service provider.
摘要:
Methods, systems and computer program products for load routing across a plurality of networks are provided. A request to exchange communication data between a user endpoint device and a target device is received. At an application layer, a first portion of the communication data associated with the request is allocated for routing over a first network domain and a second portion of the communication data associated with the request is allocated for routing over a second network domain, administered independently from the first network domain, to provide an allocation of the communication data. The first portion is routed between the user endpoint device and the target device over a network access link coupled to the first network domain without notifying the first network domain of the allocation of the communication data. The second portion is routed between the user endpoint device and the target device over a network access link coupled to the second network domain without notifying the second network domain of the allocation of the communication data.
摘要:
A method, system, and computer program product for providing VLAN capacity requirement estimation is provided. The method includes receiving at a computing system a VLAN configuration file that specifies VLAN access ports, VLAN switches and VLAN trunks in a VLAN. A target access port identifier is received at the computing system from a requestor. A target trunk and target switch corresponding to the target access port are determined at the computing system. A bandwidth contribution of the target access port to the VLAN is calculated at the computing system. The calculating is based on a least contribution algorithm that reflects an impact of provisioning the target access port with respect to trunk capacity, and is responsive to the target bandwidth requirement, the target class of service and placement of the target port in the VLAN. The bandwidth contribution is then transmitted to the requestor.
摘要:
Setup of a Voice over Internet Protocol (VoIP) call is initiated and an authentication token is received for the VoIP call that is set up, that indicates that the VoIP call is authorized. The authentication token is inserted into packets for the VoIP call. The packets, including the authentication token therein, are transmitted into an IP network. The authentication token may be placed in an IP version 6 (IPv6) flowID field.
摘要:
A method for traffic engineering of connectionless virtual private network (VPN) services. The method comprises receiving physical connectivity data for a connectionless VPN including service nodes and links between the service nodes. One or more of the service nodes are also edge nodes. Logical connectivity data for the edge nodes is received. A restricted topology is created in response to the physical connectivity data and to the logical connectivity data. The restricted topology includes a single path between each pair of the edge nodes and each path includes a plurality of the service nodes and one or more of the links. A bandwidth requirement for each link in the restricted topology is calculated. The bandwidth requirement is reserved on each link in the restricted topology. The method further comprises directing routing software to force a packet received from an edge node through one of the paths in the restricted topology.
摘要:
Setup of a Voice over Internet Protocol (VoIP) call is initiated and an authentication token is received for the VoIP call that is set up, that indicates that the VoIP call is authorized. The authentication token is inserted into packets for the VoIP call. The packets, including the authentication token therein, are transmitted into an IP network. The authentication token may be placed in an IP version 6 (IPv6) flowID field.
摘要:
Setup of a Voice over Internet Protocol (VoIP) call is initiated and an authentication token is received for the VoIP call that is set up, that indicates that the VoIP call is authorized. The authentication token is inserted into packets for the VoIP call. The packets, including the authentication token therein, are transmitted into an IP network. The authentication token may be placed in an IP version 6 (IPv6) flowID field.
摘要:
A method for traffic engineering of connectionless virtual private network (VPN) services that includes receiving physical connectivity data for a connectionless VPN. The data includes service nodes and links between the service nodes. One or more of the service nodes are also edge nodes. Logical connectivity data for the edge nodes is received. A restricted topology is created in response to the physical connectivity data and to the logical connectivity data. The restricted topology includes a single path between each pair of the edge nodes and each path includes a plurality of the service nodes and one or more of the links. A bandwidth requirement for each link in the restricted topology is calculated. The bandwidth requirement is reserved on each link in the restricted topology. The method further comprises directing routing software to force a packet received from an edge node through one of the paths in the restricted topology.