Methods and apparatus for routing in a network
First Claim
1. A method of controlling traffic on a data network, said traffic comprising payload data and associated signaling data, the method comprising:
- reading a portion of said payload data for a first traffic of a first communications session between a first entity and a second entity communicating over said data network;
using a signature in the portion of the payload data to determine whether said portion of the payload data identifies peer-to-peer (P2P) traffic;
storing signaling data associated with said portion of the payload data;
reading signaling data for a second traffic of a second communications session on said data network;
comparing said read signaling data with said stored signaling data to identify said second traffic as the P2P traffic andcontrolling said second communications session responsive to said identification of the P2P traffic, by limiting propagation of the P2P traffic without limiting propagation of non-P2P traffic.
6 Assignments
0 Petitions
Accused Products
Abstract
The invention generally relates to methods and apparatus for routing data in networks, in particular packet data routing in TCP/IP (Transmission Control Protocol/Internet Protocol). Application of the invention include routing of peer-to-peer (P2P) network data. A method of controlling traffic on a data network, said traffic comprising payload data and associated signaling data, the method comprising reading a portion of said payload data for a communications session between a first entity and a second entity communicating over said network; determining whether said portion of payload data identifies a type of traffic to be controlled; storing, responsive to said determining, signaling data associated with said portion of payload data; reading said signaling data to identify an attempt to begin a further communications session of said identified traffic type or to resume said communication session; and controlling traffic of said further or resumed communications session responsive to said identification.
-
Citations
19 Claims
-
1. A method of controlling traffic on a data network, said traffic comprising payload data and associated signaling data, the method comprising:
-
reading a portion of said payload data for a first traffic of a first communications session between a first entity and a second entity communicating over said data network; using a signature in the portion of the payload data to determine whether said portion of the payload data identifies peer-to-peer (P2P) traffic; storing signaling data associated with said portion of the payload data; reading signaling data for a second traffic of a second communications session on said data network; comparing said read signaling data with said stored signaling data to identify said second traffic as the P2P traffic and controlling said second communications session responsive to said identification of the P2P traffic, by limiting propagation of the P2P traffic without limiting propagation of non-P2P traffic. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A router for controlling traffic on a data network, said traffic comprising payload data and associated signaling data, the router comprising:
-
a network interface that interfaces with said data network; a packet switch coupled to the network interface that separates the traffic into peer-to-peer (P2P) traffic and non P2P traffic, wherein propagation of the P2P traffic is limited without limiting propagation of the non P2P traffic; a data memory that stores data to be processed; an instruction memory that stores computer executable code; and a processor coupled to said network interface, to said data memory, and to said instruction memory that processes said data in accordance with the computer-executable code stored in said instruction memory, whereby said processor is configured to; read a portion of said payload data for a first traffic of a communications session between a first entity and a second entity communicating over said network; using a signature in the portion of the payload data to determine whether said portion of payload data identifies the P2P; store signaling data associated with said portion of payload data; read signaling data for a second traffic on said network; and
tocompare said read signaling data with said stored signaling data to identify an attempt to begin a second communications session of said P2P traffic; and control said second communications session responsive to said identification. - View Dependent Claims (18, 19)
-
Specification