Prioritization of protocol messages at a server
First Claim
1. A method, comprising:
- receiving, by a server device comprising a processor of a telecommunications network, request data indicative of a first authorization, authentication, and accounting request of authorization, authentication, and accounting requests, from a client device of the telecommunications network, wherein the request data comprises classification data representing types of applications that trigger the authorization, authentication, and accounting requests, and wherein the authorization, authentication, and accounting requests are received according to a first order;
determining, by the server device, whether a condition related to a key performance indicator has been satisfied;
in response to the determining, rejecting, by the server device, a second authorization, authentication, and accounting request of the authorization, authentication, and accounting requests;
based on the classification data and the determining, generating, by the server device, scheduling policy data indicative of a policy that specifies priority values of execution priorities of the types of applications, and specifies a second order in which the authorization, authentication, and accounting requests are to be processed based on the priority values; and
based on the scheduling policy data, facilitating, by the server device, a processing of the requests according to the second order.
1 Assignment
0 Petitions
Accused Products
Abstract
System(s) and method(s) are provided for prioritizing protocol messages received at a server. A client generates a request message and incorporates a data unit therein in order to indicate type of service application that triggered generation of the request message. The client conveys the request message to a server configured to respond to the request message. To supply data in response to the message request, the server prioritizes the request message based at least on the data unit that conveys the type of service application. The server can assign a set of request messages to a group of scheduling queues based at least on ranking of the type of service associated with at least one request message in the set of request messages. Based on performance conditions, the server also can reject one or more request messages according to the ranking.
-
Citations
20 Claims
-
1. A method, comprising:
-
receiving, by a server device comprising a processor of a telecommunications network, request data indicative of a first authorization, authentication, and accounting request of authorization, authentication, and accounting requests, from a client device of the telecommunications network, wherein the request data comprises classification data representing types of applications that trigger the authorization, authentication, and accounting requests, and wherein the authorization, authentication, and accounting requests are received according to a first order; determining, by the server device, whether a condition related to a key performance indicator has been satisfied; in response to the determining, rejecting, by the server device, a second authorization, authentication, and accounting request of the authorization, authentication, and accounting requests; based on the classification data and the determining, generating, by the server device, scheduling policy data indicative of a policy that specifies priority values of execution priorities of the types of applications, and specifies a second order in which the authorization, authentication, and accounting requests are to be processed based on the priority values; and based on the scheduling policy data, facilitating, by the server device, a processing of the requests according to the second order. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system comprising:
-
a processor; and a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations, comprising; receiving, from a mobile device of a telecommunications network, message data indicative of authorization, authentication, and accounting requests that are received by a subscriber server device in a first order, wherein the authorization, authentication, and accounting requests comprise classification data representing respective types of applications that initiate the authorization, authentication, and accounting requests; in response to determining whether a condition associated with a key performance indicator, of key performance indicators, has been determined to have been satisfied, generating severity data indicative of a number of the key performance indicators that have been determined to have been overloaded; in response to the generating, dropping an authorization, authentication, and accounting request of the authorization, authentication, and accounting requests resulting in modified authorization, authentication, and accounting requests; based on the classification data, determining a priority value; and based on the priority value, determining a second order in which the modified authorization, authentication, and accounting requests are to be processed. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A non-transitory machine-readable storage device, comprising executable instructions that, when executed by a processor, facilitate performance of operations, comprising:
-
receiving, from a client device of a network, request data indicative of authorization, authentication, and accounting requests that are received by a server device of the network in a first order, wherein the request data comprises classification data representing types of applications that initiate the authorization, authentication, and accounting requests; based on an indication that a number of key performance indicators are overloaded, generating priority values indicative of execution priorities for the authorization, authentication, and accounting requests; generating, based at least in part on the classification data, scheduling policy data that is utilized to determine a second order in which the authorization, authentication, and accounting requests are to be scheduled based on the priority values; and based on the scheduling policy data, facilitating a scheduling of the authorization, authentication, and accounting requests in accordance with the second order. - View Dependent Claims (18, 19, 20)
-
Specification