scispace - formally typeset
Search or ask a question
Author

C. Lewis

Bio: C. Lewis is an academic researcher. The author has contributed to research in topics: Transparent LAN Service & Service provider. The author has an hindex of 1, co-authored 1 publications receiving 154 citations.

Papers
More filters
Journal ArticleDOI
P. Knight1, C. Lewis
TL;DR: A wide range of emerging L2 and L3 VPN architectures and technical solutions or approaches are described, and some mechanisms that provide membership, reachability, topology, security, and management functions are described.
Abstract: Virtual private network services are often classified by the OSI layer at which the VPN service provider's systems interchange VPN reachability information with customer sites. Layer 2 and 3 VPN services are currently being designed and deployed, even as the related standards are being developed. This article describes the wide range of emerging L2 and L3 VPN architectures and technical solutions or approaches, and discusses the status of standards work. Some specific L2VPN and L3VPN technologies described here include virtual private LAN service, transparent LAN service, BGP/MPLS-based VPNs (RFC 2547bis), virtual router, and IPSec VPN approaches. We discuss recent and continuing standards efforts in the IETF 12vpn and 13vpn working groups, and related work in the pseudo-wire emulation edge-to-edge working group, as well as in some other standards fora, and describe some mechanisms that provide membership, reachability, topology, security, and management functions.

154 citations


Cited by
More filters
Patent
15 Nov 2012
TL;DR: In this paper, the authors propose a method comprising providing a plurality of links to end-user devices communicatively coupled to a network system, a particular link of the plurality supporting control-plane communications between the network system and a particular user over one or more wireless access networks, the message comprising payload for delivery to the particular user and an identifier identifying a particular device agent on the particular enduser device.
Abstract: A method comprising providing a plurality of links to a plurality of end-user devices communicatively coupled to a network system, a particular link of the plurality of links supporting control-plane communications between the network system and a particular end-user device of the plurality of end-user devices over one or more wireless access networks; receiving a message from a server communicatively coupled to the network system, the message comprising payload for delivery to the particular end-user device; generating an encrypted message comprising the payload and an identifier identifying a particular device agent of a plurality of device agents on the particular end-user device, the identifier configured to assist in delivering at least a portion of the payload to the particular device agent on the particular end-user device; and sending the encrypted message to the particular end-user device over the particular link.

483 citations

Patent
25 May 2011
TL;DR: In this article, a device assisted service (DAS) for protecting network capacity is provided, which includes monitoring a network service usage activity of the communications device in network communication and classifying the network service activity for differential network access control for protecting the network capacity.
Abstract: Device Assisted Services (DAS) for protecting network capacity is provided. In some embodiments, DAS for protecting network capacity includes monitoring a network service usage activity of the communications device in network communication; classifying the network service usage activity for differential network access control for protecting network capacity; and associating the network service usage activity with a network service usage control policy based on a classification of the network service usage activity to facilitate differential network access control for protecting network capacity.

400 citations

Patent
13 Sep 2012
TL;DR: In this paper, a wireless device capable of communicating over a first wireless network and a second wireless network, the wireless device comprising one or more processors for executing agents including an application interface agent for assisting in applying a policy by communicating with a software component associated with a service activity.
Abstract: A wireless device capable of communicating over a first wireless network and a second wireless network, the wireless device comprising one or more processors for executing one or more agents including an application interface agent for assisting in applying a policy by communicating with a software component associated with a service activity, the policy for reducing data usage over the first wireless network associated with the service activity, the policy enabling control of the service activity on the first wireless network that is different from how the service activity is controlled on the second wireless network, the one or more agents configured to: obtain a user input specifying at least an aspect of the policy, identify that the wireless device is connected to the first wireless network, identify an intended, attempted, or successful data communication over the first wireless network associated with the service activity, and apply the policy.

266 citations

Patent
27 Jan 2010
TL;DR: In this article, a method for implementing a service policy on a device by obtaining, from a user interface (UI) or a network interface, a quality of service (QoS) activity map of an application identifier to a QoS policy is presented.
Abstract: A method for implementing a service policy on a device by obtaining, from a user interface (UI) or a network interface, a quality of service (QoS) activity map of an application identifier to a QoS policy, wherein the QoS policy is determined at least in part by an access state qualifier, the access state qualifier characterizing an aspect of access network resources; identifying a device service usage in association with the application identifier; applying the QoS policy from the QoS activity map to the device service usage, wherein a QoS service activity, including the device service usage, falls within a class of activities associated with the application identifier and governed by the QoS policy; and processing the device service usage in accordance with the QoS policy.

237 citations

Patent
15 Jan 2010
TL;DR: In this paper, a wireless device and a method for reducing data usage over a first wireless access network associated with a first service activity with the method being performed by the wireless device are disclosed.
Abstract: A wireless device and a method for reducing data usage over a first wireless access network associated with a first service activity with the method being performed by the wireless device are disclosed. The wireless device comprises one or more modems for enabling the wireless device to communicate over at least two wireless access networks; a user interface; a memory and one or more processors for executing one or more agents. The at least two wireless access networks comprises a first wireless access network and a second wireless access network. The memory is configured to store a first service policy associated with the first wireless access network. The first service policy comprises one or more first network policy settings or rules and the first service policy is configured to assist in reducing data usage associated with a first service activity over the first wireless access network. The first service activity is less than all service activities available to the wireless device and the first service policy is for enabling control of the first service activity on the first wireless access network that is different from how the first service activity is controlled on the second wireless access network. The one or more agents are configured to obtain, through the user interface, a user input indicating to apply the first service policy to the first service activity when the wireless device is connected to the first wireless access network, identify when the wireless device is connected to the first wireless access network, identify attempted or successful data communications over the first wireless access network that are associated with the first service activity, and apply the first service policy to the identified attempted or successful data communications over the first wireless access network, thereby reducing data usage over the first wireless access network associated with the first service activity.

233 citations