SYSTEM AND METHOD FOR TRAFFIC LOCALIZATION
First Claim
1. A network device comprising:
- at least one interface configured to communicate with a first mobile node, a second mobile node, and a destination device;
a memory configured to store session information about the first mobile node and the second mobile node that is used to manage processing of packet data associated respectively with the first mobile node and the second mobile node; and
a processor configured to determine when the first mobile node and the second mobile node are communicating through the network device to the destination device, wherein the processor is configured to establish a data bypass so data is sent and received directly between the first mobile node and the second mobile node at the network device and updates are communicated to the destination.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for bridging packet flows to bypass call legs and/or tunnels are provided. A tunnel initiator, which can be an access gateway, a foreign agent, and a mobility anchor point, for example, provides a bypass for certain packets that have a destination serviced by the same tunnel initiator. The bridge allows the packets to bypass a backhaul loop and reduces latency and frees bandwidth for other purposes in the network. The bridging can be implemented in a tunnel initiator for mobile to mobile packet flows, mobile to land line packet flows, and land line to mobile packet flows. Route optimization can also be provided in certain embodiments.
40 Citations
20 Claims
-
1. A network device comprising:
-
at least one interface configured to communicate with a first mobile node, a second mobile node, and a destination device; a memory configured to store session information about the first mobile node and the second mobile node that is used to manage processing of packet data associated respectively with the first mobile node and the second mobile node; and a processor configured to determine when the first mobile node and the second mobile node are communicating through the network device to the destination device, wherein the processor is configured to establish a data bypass so data is sent and received directly between the first mobile node and the second mobile node at the network device and updates are communicated to the destination. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method comprising:
-
establishing communications at a network device with a first mobile node, a second mobile node, and a destination device; managing separately, at the network device, processing of packet data corresponding to the first mobile node and the second mobile node based on session information for the first mobile and the second mobile node respectively; checking session information regarding the packet data communications between the first mobile node and the second mobile node through the network device to determine when a data bypass can be established; establishing a data bypass to send and receive data directly between the first mobile node and the second mobile node at the network device. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. Logic encoded in one or more non-transient media that includes code for execution and when executed by a processor is operable to perform operations comprising:
-
establishing communications at a network device with a first mobile node, a second mobile node, and a destination device; managing separately, at the network device, processing of packet data corresponding to the first mobile node and the second mobile node based on session information for the first mobile and the second mobile node respectively; checking session information regarding the packet data communications between the first mobile node and the second mobile node through the network device to determine when a data bypass can be established; establishing a data bypass to send and receive data directly between the first mobile node and the second mobile node at the network device. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification