Obtaining Information From Tunnel Layers Of A Packet At A Midpoint
First Claim
Patent Images
1. A method, comprising:
- monitoring, by a midpoint, a communication session between a subscriber side endpoint and a network side provider, the communication session involving a packet flow comprising one or more packets, a packet comprising a plurality of tunnel layers; and
performing the following at the midpoint for each packet of the one or more packets;
establishing one or more target layers of the plurality of tunnel layers of the each packet; and
performing the following for each tunnel layer at least until a last target layer of the one or more target layers is reached;
identifying a protocol associated with the each tunnel layer;
parsing the packet according to the identified protocol; and
extracting target information from the each tunnel layer if the each tunnel layer is a target layer.
1 Assignment
0 Petitions
Accused Products
Abstract
In one embodiment, a midpoint obtains information from packets by monitoring a communication session between a subscriber side endpoint and a network side provider. The communication session involves a packet flow comprising one or more packets, where a packet comprises tunnel layers. The midpoint establishes one or more target layers of the tunnel layers and performs the following for each tunnel layer at least until a last target layer is reached: identifies a protocol associated with a tunnel layer, parses the packet according to the identified protocol, and extracts target information from the tunnel layer if the tunnel layer is a target layer.
-
Citations
17 Claims
-
1. A method, comprising:
-
monitoring, by a midpoint, a communication session between a subscriber side endpoint and a network side provider, the communication session involving a packet flow comprising one or more packets, a packet comprising a plurality of tunnel layers; and performing the following at the midpoint for each packet of the one or more packets; establishing one or more target layers of the plurality of tunnel layers of the each packet; and performing the following for each tunnel layer at least until a last target layer of the one or more target layers is reached; identifying a protocol associated with the each tunnel layer; parsing the packet according to the identified protocol; and extracting target information from the each tunnel layer if the each tunnel layer is a target layer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. An apparatus, comprising:
-
a memory operable to store information about a communication session between a subscriber side endpoint and a network side provider, the communication session involving a packet flow comprising one or more packets, a packet comprising a plurality of tunnel layers; and one or more processors operable to; perform the following for each packet of the one or more packets; establish one or more target layers of the plurality of tunnel layers of the each packet; and perform the following for each tunnel layer at least until a last target layer of the one or more target layers is reached; identify a protocol associated with the each tunnel layer; parse the packet according to the identified protocol; and extract target information from the each tunnel layer if the each tunnel layer is a target layer. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A system, comprising:
-
means for monitoring, by a midpoint, a communication session between a subscriber side endpoint and a network side provider, the communication session involving a packet flow comprising one or more packets, a packet comprising a plurality of tunnel layers; and means for performing the following at the midpoint for each packet of the one or more packets; establishing one or more target layers of the plurality of tunnel layers of the each packet; and performing the following for each tunnel layer at least until a last target layer of the one or more target layers is reached; identifying a protocol associated with the each tunnel layer; parsing the packet according to the identified protocol; and extracting target information from the each tunnel layer if the each tunnel layer is a target layer.
-
Specification