REGISTER CLUSTERING IN A SIP-BASED NETWORK
First Claim
Patent Images
1. A method, comprising:
- receiving a request for service in a first edge proxy;
applying a hash function to a source address of an endpoint; and
forwarding the request to a second edge proxy in response to a first result of the hash function, or servicing the request in the first edge proxy in response to a second result of the hash function.
1 Assignment
0 Petitions
Accused Products
Abstract
In one embodiment, a method can include: receiving a request for service in a first edge proxy; applying a hash function to a source address of an endpoint; and forwarding the request to a second edge proxy in response to a first result of the hash function, or servicing the request in the first edge proxy in response to a second result of the hash function.
36 Citations
20 Claims
-
1. A method, comprising:
-
receiving a request for service in a first edge proxy; applying a hash function to a source address of an endpoint; and forwarding the request to a second edge proxy in response to a first result of the hash function, or servicing the request in the first edge proxy in response to a second result of the hash function. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method, comprising:
-
sending a lookup request to a domain name system (DNS) server; receiving a response from the DNS server, the response including a prioritized list of edge proxies for servicing a registration request; sending the registration request to a first edge proxy in the prioritized list; and receiving an acknowledgment from the first edge proxy or a second edge proxy in response to a hash function result in the first edge proxy, the hash function result being determined by hashing a source address of an endpoint sending the registration request. - View Dependent Claims (11, 12, 13, 14)
-
-
15. An apparatus having a first edge proxy, the apparatus comprising:
-
a receiver configured to receive a request for service from a source; a hash table configured to map the source of the request to the first edge proxy or a second edge proxy; and a forwarding engine configured to forward the request to the second edge proxy when a lookup of the hash table indicates the second edge proxy is mapped to the source. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification