Register clustering in a SIP-based network
First Claim
Patent Images
1. A method, comprising:
- identifying, using at least one processor device, a change to a first plurality of proxies resulting in a different second plurality of proxies, each proxy in the first plurality mapped to one or more respective hash keys of a particular hashing function according to a first mapping, the particular hashing function hashing source addresses corresponding to requests in a particular session initiation protocol (SIP) network to generate a corresponding hash key;
remapping the first mapping to accommodate for the change to the first plurality of proxies to generate a second mapping different from the first mapping, wherein at least one of the respective hash keys of the particular hashing function is mapped to a particular proxy included in the first plurality of proxies in the first mapping and mapped to a different, second proxy included in the second plurality of proxies in the second mapping;
receiving a particular request at a first proxy in the second plurality proxies following the remapping;
applying the particular hashing function to a particular source address associated with an endpoint that sent the request to identify a particular hash key corresponding the particular source address;
determining, from the second mapping, whether the first proxy in the second plurality of proxies is provisioned for servicing the request; and
forwarding the request to a second proxy based on a result of the particular hashing function.
0 Assignments
0 Petitions
Accused Products
Abstract
In one embodiment, a method can include: receiving a request for service in a first edge proxy; applying a hash function to a source address of an endpoint; and forwarding the request to a second edge proxy in response to a first result of the hash function, or servicing the request in the first edge proxy in response to a second result of the hash function.
-
Citations
20 Claims
-
1. A method, comprising:
-
identifying, using at least one processor device, a change to a first plurality of proxies resulting in a different second plurality of proxies, each proxy in the first plurality mapped to one or more respective hash keys of a particular hashing function according to a first mapping, the particular hashing function hashing source addresses corresponding to requests in a particular session initiation protocol (SIP) network to generate a corresponding hash key; remapping the first mapping to accommodate for the change to the first plurality of proxies to generate a second mapping different from the first mapping, wherein at least one of the respective hash keys of the particular hashing function is mapped to a particular proxy included in the first plurality of proxies in the first mapping and mapped to a different, second proxy included in the second plurality of proxies in the second mapping; receiving a particular request at a first proxy in the second plurality proxies following the remapping; applying the particular hashing function to a particular source address associated with an endpoint that sent the request to identify a particular hash key corresponding the particular source address; determining, from the second mapping, whether the first proxy in the second plurality of proxies is provisioned for servicing the request; and forwarding the request to a second proxy based on a result of the particular hashing function. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. Logic encoded in non-transitory tangible media that includes code for execution and when executed by a processor operable to perform operations comprising:
-
identifying, using at least one processor device, a change to a first plurality of proxies resulting in a different second plurality of proxies, each proxy in the first plurality mapped to one or more respective hash keys of a particular hashing function according to a first mapping, the particular hashing function hashing source addresses corresponding to requests in a particular session initiation protocol (SIP) network to generate a corresponding hash key; remapping the first mapping to accommodate for the change to the first plurality of proxies to generate a second mapping different from the first mapping, wherein at least one of the respective hash keys of the particular hashing function is mapped to a particular proxy included in the first plurality of proxies in the first mapping and mapped to a different, second proxy included in the second plurality of proxies in the second mapping; receiving a particular request at a first proxy in the second plurality of proxies following the remapping; applying the particular hashing function to a particular source address associated with an endpoint that sent the request to identify a particular hash key corresponding the particular source address; determining, from the second mapping, whether the first proxy in the second plurality of proxies is provisioned for servicing the request; and forwarding the request to a second proxy based on a result of the particular hashing function. - View Dependent Claims (18)
-
-
19. An apparatus, comprising:
-
a processor; a hash table; and a forwarding engine configured for forwarding information in a network environment, wherein the processor, the hash table, and the forwarding engine interact such that the apparatus is configured for; identifying, using at least one processor device, a change to a first plurality of proxies resulting in a different second plurality of proxies, each proxy in the first plurality mapped to one or more respective hash keys of a particular hashing function according to a first mapping, the particular hashing function hashing source addresses corresponding to requests in a particular session initiation protocol (SIP) network to generate a corresponding hash key; remapping the first mapping to accommodate for the change to the first plurality of proxies to generate a second mapping different from the first mapping, wherein at least one of the respective hash keys of the particular hashing function is mapped to a particular proxy included in the first plurality of proxies in the first mapping and mapped to a different, second proxy included in the second plurality of proxies in the second mapping; receiving a particular request at a first proxy in the second plurality of proxies following the remapping; applying the particular hashing function to a particular source address associated with an endpoint that sent the request to identify a particular hash key corresponding the particular source address; determining, from the second mapping, whether the first proxy in the second plurality of proxies is provisioned for servicing the request; and forwarding the request to a second proxy based on a result of the particular hashing function. - View Dependent Claims (20)
-
Specification