Unlock instant, AI-driven research and patent intelligence for your innovation.

Method, device and system for content accessing

A content access and content technology, applied in transmission systems, digital transmission systems, electrical components, etc., can solve problems such as network resources to be optimized, and achieve the effects of improving content access efficiency, avoiding information interaction, and saving network resources

Active Publication Date: 2012-04-25
XFUSION DIGITAL TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In the process of realizing the present invention, the inventor found that in the content access method based on L2TP, the content access efficiency and the network resources occupied by the content access need to be optimized

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for content accessing
  • Method, device and system for content accessing
  • Method, device and system for content accessing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] Embodiment 1. Content access method. The process of this method is attached figure 2 shown.

[0030] figure 2 In S200, the LAC monitors the user's message, acquires and stores the correspondence between the user's IP address and the PPP session information.

[0031] A specific example where the LAC obtains and stores the correspondence between the user's IP address and the PPP session information by monitoring the user's packets includes: the LAC monitors the Point to Point Protocol (PPP) negotiation process between the user and the network side. to obtain and store the correspondence between the user's IP address and the PPP session information. The above-mentioned monitored PPP negotiation process is, for example, IP Control Protocol (IP Control Protocol, IPCP) negotiation in the PPP negotiation process. The messages in the monitored PPP negotiation process may include: a PPP negotiation message sent by the user and / or a PPP negotiation message sent by the LAC t...

Embodiment 2

[0051] Embodiment 2. Content access method. The following takes the BRAS of ILEC as LAC and the BRAS of CLEC as LNS as an example. image 3 This embodiment will be described.

[0052] image 3 The shown content includes: protocol stack information of the end user involved in the content access method of this embodiment (ie, the user described in the above embodiment), the protocol stack information of the DSLAM, and the protocol stack information of the BRAS of the ILEC.

[0053] image 3 The end users in the ILEC can first access the BRAS of the ILEC through PPPoE, and then connect to the BRAS of the CLEC through L2TP, so that the end users go online. It should be noted that although image 3 It is shown that the end user accesses the BRAS of the ILEC through PPPoE, but in practical applications, the end user can also access the BRAS of the ILEC through other PPPoX (such as PPPoA or PPPoEoA) other than PPPoE.

[0054] During the online process of the end user, the BRAS o...

Embodiment 3

[0073] Embodiment 3. Content access device. The content access device can be set in the LAC, for example, the content access device is set in the BRAS, and the BRAS is the BRAS of the ILEC. The structure of the content access device is as follows Figure 4 shown.

[0074] Figure 4 The content access device in the device includes: a monitoring module 400 , a receiving module 410 and a control module 420 .

[0075] The monitoring module 400 is configured to monitor the user's message, and obtain and store the correspondence between the user's IP address and the PPP session information.

[0076] A specific example of the monitoring module 400 monitoring the user's message, obtaining and storing the corresponding relationship between the user's IP address and the PPP session information includes: the monitoring module 400 obtains and stores the user by monitoring the PPP negotiation process between the user and the network side. The corresponding relationship between the IP a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method, a device and a system for content accessing. The content accessing method comprises: monitoring a user message, obtaining and storing the corresponding relationship between the IP address of the user and PPP session information; receiving a content accessing request sent by the user; sending the content accessing request to the edge server of a content delivery network; and according to the corresponding relationship, forwarding the content which is provided for the user by the edge server according to the request to the user. The technical scheme can avoid information exchange between broadband wholesale providers such as ILEC, and broadband retailers such as CLEC, thereby improving content accessing efficiency and saving network resource occupied by thecontent accessing.

Description

technical field [0001] The present invention relates to the technical field of network communication, in particular to the technical field of content access. Background technique [0002] Broadband wholesale providers such as Incumbent Local Exchange Carrier (traditional local exchange operator, ILEC) can wholesale their own copper wires to broadband retailers such as Competitive Local Exchange Carrier (competitive local exchange operator, CLEC), that is, ILEC can be opened to CLEC Copper Wire Resources. After ILEC opens copper wire resources, CLEC can provide users with broadband services through Layer Two Tunneling Protocol (L2TP), that is, CLEC regards ILEC's broadband access server BRAS as an L2TP Access Concentrator , LAC), the user's access to the Internet is terminated by the L2TP Network Server (L2TP network server, LNS) of CLEC, thereby providing users with broadband services. [0003] In the application environment where the content is pushed to the network edge ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/56H04L29/08H04L29/06
Inventor 舒志龙
Owner XFUSION DIGITAL TECH CO LTD