摘要:
A system and method for dynamic provisioning is provided. In an embodiment, a provisioning engine receives data representing a device profile, a device state and a network state, and to the extent that the device profile, device state and network state are not consistent, the engine can dynamically re-provision the device to achieve an alternative provisioning.
摘要:
Systems and methods for providing use of information technology in exchange for a fee based more precisely on actual or near actual use. Information technology may include software and/or hardware, which may be grouped into a convergent infrastructure or convergent architecture. Use of the hardware and/or software may be monitored, such as with metering software, by measuring usage metrics to determine resource usage. The raw metrics data may be converted into at least one common unit of measure. The raw or converted metrics may be used to determine a fee based on resource usage. The fee may be based on a fee rate, determined or calculated with reference to various information such as the type of information technology being used. The user may be charged the fee based on actual past usage, an approximation of past usage, an estimation of future usage, or a different usage basis.
摘要:
Methods and apparatus for a providing information to a core network where a terminal exchanges data with a cache in an access network. The node stores data in the cache. Data is exchanged between the cache and the terminal, and information relating to the exchanged data is provided to the core network. This allows the core network to apply normal core network functions such as LI, charging and policy control, even when the data does not pass through the core network.
摘要:
A device defines a first bucket for general Internet protocol (IP) traffic provided to and from a user device associated with an open network, and defines a second bucket for quality of service (QoS)-based traffic provided to and from the user device. The device also assigns a first billing rate for the general IP traffic associated with the first bucket, and assigns a second billing rate to the QoS-based traffic associated with the second bucket, where the second billing rate is greater than the first billing rate. The device further associates the first billing rate and the second billing rate with a subscriber associated with the user device.
摘要:
Example embodiments presented herein are directed towards a Packet Domain Network Gateway (PGW) (400), and corresponding methods therein, for service usage reporting and quota management in a Policy and Charging Control (PCC) based network. Example embodiments presented herein are also directed towards an Online Charging System (OCS) (500) for receiving service usage reporting and quota management in a PCC based network. Quota reporting and quota management is performed on a per-rating group basis.
摘要:
Source policy identification information of a registry service policy is captured. The source policy identification information includes a source policy identifier (ID), a source policy name, and a source policy uniform resource locator (URL). The captured source policy identification information is correlated with configured policy enforcement processing rules and processing actions using a source policy reference key. Per-transaction service policy enforcement information that documents policy enforcement activities performed by a policy enforcement point (PEP) is captured. The captured per-transaction service policy enforcement information is correlated with the captured source policy identification information using the source policy reference key.
摘要:
Concepts and technologies are described herein for managing network load using device application programs. An illustrative method includes receiving, at a mobile device, a list of preferred combinations of location area codes (“LACs”), cell identifiers (“CIDs”), and times that data access by the mobile device is to be incentivized, determining a current LAC associated with a location area within which the mobile device is currently located, determining a current CID associated with a base transceiver station to which the mobile device is currently connected, determining a current time, and determining if the current LAC, the current cell ID, and the current time are included as a preferred combination in the list. The method also includes providing an indication that data access by the mobile device is incentivized if the current LAC, the current cell ID, and the current time are included in the list as a preferred combination.
摘要:
Technologies are described herein to manage the replacement of routing rules. Some example technologies may receive a request to replace one or more active rules in a routing device with one or more stored rules. Each of the active rules and the stored rules may specify a routing rule that specifies how to route packets within a network. The active rules may be routing rules that are actively being used by the routing device. The stored rules may be routing rules that are not currently in use by the routing device. A determination may be made as to whether a number of active rule replacements for the routing device exceeds a threshold. In response to determining that the number of the active rule replacements exceeds the threshold, the request to replace the one or more active rules in the routing device may be denied.
摘要:
The present invention provides a method of providing rate tiers in a wireless communication system. Embodiments of the method include forming, at a network element in the wireless communication system, a statistical representation of resource usage for a user in the wireless communication system as a function of location and/or time using measurements of the user's resource usage at a plurality of locations. Embodiments of the method also include defining, at the network element, a plurality of rate tiers based on the statistical representation. Each rate tier indicates a rate for a different level of resource usage offered to the user.
摘要:
A wireless end-user device has a wireless wide-area network (WWAN) modem. A network element securely provisions the device with a differential traffic control policy list that distinguishes how network traffic for at least one network type should be treated on a per-application basis. A user is also allowed, through an interface, to configure one or more aspects of how a differential traffic control policy is applied to applications. One or more device agents classify whether an application is interacting with a user in a user interface foreground of the device and whether data communication for Internet service activities is provided through the WWAN modem. Based on the network- and user-configured policy information and the classifications, a network stack agent determines whether to allow or disallow a given Internet access request. Some requests that may otherwise be disallowed are allowed when the WWAN modem is already active to serve another request.