Charging method for second layer tunnel protocol user based on point-to-point protocol mode
A point-to-point protocol and tunneling protocol technology, applied in the field of L2TP users charging by PPP, can solve the problems affecting L2TP user charging, etc., and achieve the effect of improving compatibility
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0032] In order to better understand the present invention, the present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.
[0033] see figure 1 , the implementation process of charging according to the PPP method when an L2TP user goes online is as follows:
[0034] Step 101, the L2TP user normally accesses the LAC (L2TP Access Concentrator, L2TP access concentrator);
[0035] Step 102, LAC establishes a tunnel with LNS (L2TP Network Server, L2TP network server), wherein LAC and LNS form an access server;
[0036] Step 103, the LAC establishes a session with the LNS;
[0037] Step 104, the LAC sends the accounting start message to the Radius server: by modifying the Acct-Status-Type attribute in the Accounting-Request message from tunnel-link-start (value 12) to start (value 1) report text to achieve;
[0038] Step 105, the LNS sends the accounting start message to the Radius server: realize the same as above,...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com