Two-Party Approach Properties: Strong trust relationship between "Entity authorizing resource request" and "Entity performing QoS reservation" Typically: Data-origin authentication sufficient Financial establishment pre-established based on previous protocol execution Examples: Network access authentication reused for QoS authorization QoS Request Entity requesting resource Entity authorizing resource request granted/rejected End Node Node within the attached network |