Abstract:
A computer-implemented method includes sending a first request message to a first server associated with a first access network indicative of a request for an indication of whether the first server is configured to support prioritization of tunneled traffic, receiving a first response message from the first server indicative of whether the first server is configured to support prioritization of tunneled traffic, establishing one or more first tunnels with a security service when the first response message is indicative that the first server is configured to support prioritization of tunneled traffic, sending first flow characteristics and a first tunnel identifier to the first server; and receiving the first flow characteristics for each first tunnel from the first server at a first network controller. The first network controller is configured to apply a quality of service policy within the first access network for each tunnel in accordance with the flow characteristics.
Abstract:
An example method for reducing real time media traffic in a network environment is provided and includes examining a plurality of first requests in a first protocol to identify participants in a media session; examining a plurality of second requests in a second protocol to determine media characteristics associated with the participants; and grouping the participants into different groups based, at least in part, on the media characteristics, wherein at least some of the participants associated with substantially identical media characteristics are grouped together.
Abstract:
A computer-implemented method includes sending a first request message to a first server associated with a first access network indicative of a request for an indication of whether the first server is configured to support prioritization of tunneled traffic, receiving a first response message from the first server indicative of whether the first server is configured to support prioritization of tunneled traffic, establishing one or more first tunnels with a security service when the first response message is indicative that the first server is configured to support prioritization of tunneled traffic, sending first flow characteristics and a first tunnel identifier to the first server; and receiving the first flow characteristics for each first tunnel from the first server at a first network controller. The first network controller is configured to apply a quality of service policy within the first access network for each tunnel in accordance with the flow characteristics.
Abstract:
An example method for reducing real time media traffic in a network environment is provided and includes examining a plurality of first requests in a first protocol to identify participants in a media session; examining a plurality of second requests in a second protocol to determine media characteristics associated with the participants; and grouping the participants into different groups based, at least in part, on the media characteristics, wherein at least some of the participants associated with substantially identical media characteristics are grouped together.