Patent application number | Description | Published |
20090125995 | Method and System For Accounting Access by Users to Data Networks, Related Computer Program Product - A system for the time-based accounting of access by users to services provided by a data network includes a primary access node to provide access by users by establishing via the primary access node a steady connectivity between the users and the network. A secondary access node is associated with the primary access node, such secondary access node being configured for acting as a backup node to maintain connectivity in the case of failure involving the primary access node. The primary access node is configured for issuing a request for credentials for any user requesting access to said data network and, as a result of receiving valid credentials from the user, starts time-based accounting for the user. An authentication node cooperative with the primary access node and the secondary access node stores the secondary access node information items concerning the time-based accounting started for the user. The time-based accounting is thus maintained in the case of failure involving the primary access node as connectivity is maintained by the secondary access node. | 05-14-2009 |
20090285090 | Method and System for Providing User Access to Communication Services, and Related Computer Program Product - A system for providing to users of data communication services access to a communication network providing these services, includes an edge node of the communication network providing these services as well as a packet network, such as, an ethernet connecting the users to the edge node. The packet network is equipped with operation and maintenance procedures for preserving edge connectivity over the packet network. The edge node has associated therewith a backup edge node providing access to the communication network. Preferably, the backup edge node is reachable by the users via the packet network by using an address common to the edge node and the backup edge node associated therewith. In the presence of failure of the edge node, connection is established between the users and the backup edge node by applying the operation and maintenance procedures. Preferably, this, occurs by using the address common to the edge node and the associated backup edge node. | 11-19-2009 |
20110047612 | Method for Network Access, Related Network and Computer Program Product Therefor - A method of providing access of a mobile terminal to an IP network includes establishing a security association between the mobile terminal and a first security gateway of a first router in said plurality of routers. The mobile terminal is provided access to the IP network via the first router, and the data exchanged between the mobile terminal and the first router is encapsulated by using the security association. The security association is made available to at least one second router having a second security gateway. The mobile terminal is provided access to the IP network via said the second router, and data exchanged between the mobile terminal and the second router is encapsulated by using the same security association. Establishing the security association includes assigning a Security Parameter Index that identifies univocally the first security gateway and the security association. Making the security association available to the second router includes making available to the second router the Security Parameter Index. The second router may thus have access to the security association either by requesting it from the first router or by identifying it in a set of security associations sent from the first router to a set of routers candidate to become the second router as result of the mobility of the mobile terminal. | 02-24-2011 |
20110208862 | METHOD AND SYSTEM FOR PROFILING DATA TRAFFIC IN TELECOMMUNICATIONS NETWORKS - A method of profiling communication traffic of users in a data network, comprising: monitoring communication traffic originated by a user of a communication terminal; and assigning to the user of the communication terminal a unique and anonymous user traffic identifier, wherein the user traffic identifier is related to a user address assigned to the communication terminal in the data network. Also, the user traffic identifier is adapted to be included in the communication traffic with respect to that user. The method further includes communicating the unique and anonymous user traffic identifier to the user terminal and having the user communication terminal include the user traffic identifier in the user traffic, upon receipt of communication traffic including the user traffic identifier, obtaining a descriptor of the received communication traffic useful to describe the detected traffic and at least temporarily storing the obtained descriptor; and building an anonymous user profile related to the user's communication activities based on the stored descriptors. | 08-25-2011 |
20120221646 | CACHING OF DIGITAL CONTENTS IN P2P NETWORKS - A method for enabling sharing of content files among nodes of a P2P network is provided. The P2P network comprises sub-networks each including a respective plurality of nodes capable of storing content files. Each sub-network has an associated corresponding hash table for indexing the content files stored in the nodes of the sub-network. The hash table is distributed among at least some of the nodes of the sub-network. The method comprises, for each content file stored in at least one node of a sub-network, storing in the hash table associated with the sub-network a criticality index providing an indication of the degree of sharing of the content file among the nodes of the sub-network. The method causes a node to cache at least one content file for sharing with other nodes of the sub-network based on the criticality index of the at least one content file. | 08-30-2012 |
20120221647 | SHARING OF DIGITAL CONTENTS IN P2P NETWORKS EXPLOITING LOCALIZATION DATA - A method for enabling sharing of content files among nodes of a P2P network is provided. The P2P network comprises sub-networks each including a respective plurality of nodes capable of storing content files. Each sub-network has an associated corresponding hash table for indexing content files stored in the nodes. The hash table is distributed among at least some of the nodes of the sub-network. For each content file stored in at least one node, the hash table comprises a corresponding node list of the sub-network nodes which store the content file. The method comprises associating each node of the sub-network listed in the node list corresponding to a content file with localization data indicating the localization of the node within the sub-network. The localization data defines a corresponding preferential list of the nodes storing the content file for downloading the content file by a requesting node. | 08-30-2012 |
20140241164 | APPARATUS AND METHOD FOR SELECTIVELY DELAYING NETWORK DATA FLOWS - A control system managing data flows between a sender data processor and a recipient data processor. The data flows originate at the recipient data processor and pass through at least one telecommunications network gateway. The control system includes: a data flow identifier operable to discriminate data packets, sent by the sender data processor to the recipient data processor, as belonging to different data flows depending on respective software applications from which the data flows are originated; and an acknowledgement packet delayer operable to detect acknowledgment packets sent by the recipient data processor for acknowledging receipt of corresponding data packets received from the sender data processor, to discriminate among the acknowledgment packets depending on the data flow to which the acknowledgment packets pertains, and to selectively delay forwarding of the acknowledgment packets to the sender data processor, the selectively delaying depending on the data flow to which the acknowledgment packets relate. | 08-28-2014 |
20150341205 | METHOD FOR GUARANTEEING SERVICE CONTINUITY IN A TELECOMMUNICATION NETWORK AND SYSTEM THEREOF - A method providing service continuity of a telecommunication network, wherein a first node of the network receives a service request sent by a client computer to a first service server providing the service, the first service server accessing the network by the first node, the method including: storing a local copy of data packets related to the received service request; starting a server state verification procedure to check an operative state of the first service server; and transmitting the data packets to a second service server if the server state verification procedure detects a failure in the operative state of the first service server, the second service server being configured to act as a backup server for the service to be provided. | 11-26-2015 |