REGISTER CLUSTERING IN A SIP-BASED NETWORK
0 Assignments
0 Petitions
Accused Products
Abstract
In one embodiment, a method can include: receiving a request for service in a first edge proxy; applying a hash function to a source address of an endpoint; and forwarding the request to a second edge proxy in response to a first result of the hash function, or servicing the request in the first edge proxy in response to a second result of the hash function.
-
Citations
40 Claims
-
1-20. -20. (canceled)
-
21. A method, comprising:
-
receiving a request at a first proxy; applying a hash function to a source address associated with an endpoint that sent the request; determining if the proxy is provisioned for servicing the request; and forwarding the request to a second proxy based on a result of the hash function. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. Logic encoded in non-transitory tangible media that includes code for execution and when executed by a processor operable to perform operations comprising:
-
receiving a request at a first proxy; applying a hash function to a source address associated with an endpoint that sent the request; determining if the proxy is provisioned for servicing the request; and forwarding the request to a second proxy based on a result of the hash function. - View Dependent Claims (31, 32, 33, 34, 35, 36)
-
-
37. An apparatus, comprising:
-
a processor; a hash table; and a forwarding engine configured for forwarding information in a network environment, wherein the processor, the hash table, and the forwarding engine interact such that the apparatus is configured for; receiving a request at a first proxy; applying a hash function to a source address associated with an endpoint that sent the request; determining if the proxy is provisioned for servicing the request; and forwarding the request to a second proxy based on a result of the hash function. - View Dependent Claims (38, 39, 40)
-
Specification