System and method for traffic localization
First Claim
Patent Images
1. A system comprising:
- a tunnel initiator upon which a first session and a second session are implemented, where the first session and the second session are each used to manage processing of packet data associated respectively with a first mobile node and a second mobile node, and wherein the tunnel initiator is in communication with a tunnel terminator;
the tunnel initiator including a processor that obtains information regarding the first session and the second session, compares session information, and determines if a bridge can be established, wherein the bridge couples a matching first session and second session for packet data to flow from the matching first session to the matching second session on the tunnel initiator; and
the tunnel initiator sending updates to the tunnel terminator regarding packet data flowing through the bridge.
3 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for bridging packet flows to bypass call legs and/or tunnels are provided. A tunnel initiator, which can be an access gateway, a foreign agent, and a mobility anchor point, for example, provides a bypass for certain packets that have a destination serviced by the same tunnel initiator. The bridge allows the packets to bypass a backhaul loop and reduces latency and frees bandwidth for other purposes in the network. The bridging can be implemented in a tunnel initiator for mobile to mobile packet flows, mobile to land line packet flows, and land line to mobile packet flows. Route optimization can also be provided in certain embodiments.
78 Citations
27 Claims
-
1. A system comprising:
-
a tunnel initiator upon which a first session and a second session are implemented, where the first session and the second session are each used to manage processing of packet data associated respectively with a first mobile node and a second mobile node, and wherein the tunnel initiator is in communication with a tunnel terminator; the tunnel initiator including a processor that obtains information regarding the first session and the second session, compares session information, and determines if a bridge can be established, wherein the bridge couples a matching first session and second session for packet data to flow from the matching first session to the matching second session on the tunnel initiator; and the tunnel initiator sending updates to the tunnel terminator regarding packet data flowing through the bridge. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method comprising:
-
receiving a packet at a tunnel initiator and associating the packet with a session implemented on the tunnel initiator, where the session manages processing of packet data corresponding to a particular mobile node; checking the packet to determine if the packet can be sent from a first session to a second session at the tunnel initiator where the first session and the second session are each used to manage processing of only packet data associated respectively with a first mobile node and a second mobile node; sending the packet from the first session to the second session on the tunnel initiator; and sending the packet from the second session to the packet'"'"'s destination. - View Dependent Claims (13, 14, 15, 16, 17)
-
-
18. A method comprising:
-
creating a first session instance on a tunnel initiator where the first session instance manages processing of packets corresponding to a first mobile node; inspecting packets associated with the first session instance and retrieving information from the packets; associating the information obtained from a packet with the first session; checking if a second session exists on the tunnel initiator that includes information matching the first session; creating a bridge between the first session and the second session after a match is found; and sending a packet from the first session to the second session over the bridge. - View Dependent Claims (19, 20, 21, 22)
-
-
23. Logic encoded in one or more non-transient media that includes code for execution and when executed by a processor is operable to perform operations comprising:
-
receiving a packet at a tunnel initiator and associating the packet with a session implemented on the tunnel initiator, where the session manages processing of packet data corresponding to a particular mobile node; checking the packet to determine if the packet can be sent from a first session to a second session at the tunnel initiator where the first session and the second session are each used to manage processing of only packet data associated respectively with a first mobile node and a second mobile node; sending the packet from the first session to the second session on the tunnel initiator; and sending the packet from the second session to the packet'"'"'s destination. - View Dependent Claims (24, 25, 26, 27)
-
Specification