nsis-10----Page:3
1  2  3  4  5  6  7  8  9  10  11  12  13  14 

Two-Party Approach
Properties:
Strong trust relationship between "Entity authorizing resource request" and "Entity performing QoS reservation"
Typically: Data-origin authentication sufficient
Financial establishment pre-established based on previous protocol execution
Examples:
Network access authentication reused for QoS authorization
QoS Request

Entity requesting resource

Entity authorizing resource request
granted/rejected
End Node
Node within the attached network
PPT Version