System and method for traffic localization
First Claim
1. A system comprising:
- a tunnel initiator including a first session and a second session;
a tunnel terminator in communication with the tunnel terminator and including at least one session;
the tunnel initiator including a processor that obtains information regarding the first session and the second session, compares session information in the tunnel initiator, and determines if a bridge can be established;
the bridge which couples a matching first session and second session for packet data to flow from the matching first session to the matching second session on the tunnel initiator; and
the tunnel initiator sending updates to the tunnel terminator regarding packet data flowing through the bridge.
3 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for bridging packet flows to bypass call legs and/or tunnels are provided. A tunnel initiator, which can be an access gateway, a foreign agent, and a mobility anchor point, for example, provides a bypass for certain packets that have a destination serviced by the same tunnel initiator. The bridge allows the packets to bypass a backhaul loop and reduces latency and frees bandwidth for other purposes in the network. The bridging can be implemented in a tunnel initiator for mobile to mobile packet flows, mobile to land line packet flows, and land line to mobile packet flows. Route optimization can also be provided in certain embodiments.
119 Citations
12 Claims
-
1. A system comprising:
-
a tunnel initiator including a first session and a second session;
a tunnel terminator in communication with the tunnel terminator and including at least one session;
the tunnel initiator including a processor that obtains information regarding the first session and the second session, compares session information in the tunnel initiator, and determines if a bridge can be established;
the bridge which couples a matching first session and second session for packet data to flow from the matching first session to the matching second session on the tunnel initiator; and
the tunnel initiator sending updates to the tunnel terminator regarding packet data flowing through the bridge. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method comprising:
-
receiving a packet at a tunnel initiator;
checking the packet to determine if the packet can be bridged;
sending the packet from a first session to a second session on the tunnel initiator;
sending the packet to the packet'"'"'s destination; and
updating a tunnel terminator regarding a packet flow from the first session to the second session. - View Dependent Claims (8, 9)
-
-
10. A method comprising:
-
creating a first session instance on a tunnel initiator;
inspecting packets associated with the first session instance and retrieving information from the packets;
associating the information obtained from the packet with the first session;
checking if a second session exists on the tunnel initiator that includes information matching the first session;
creating a bridge between the first session and the second session after a match is found; and
sending a packet from the first session to the second session over the bridge. - View Dependent Claims (11, 12)
-
Specification