Method and system of application-aware routing with crowdsourcing
First Claim
1. A method for application routing comprising:
- at a first edge device of a network;
receiving a first flow associated with an application and identifying in a flow identifier of the first flow an Internet Protocol (IP) address and port number of the application;
using deep packet inspection (DPI) to identify an application identifier that identifies the application associated with the first flow;
storing a record that maps the application identifier with the identified IP address and port number; and
sending the record to a second edge device to use to associate a second flow received by the second edge device with the application identifier by matching an IP address and port number in a flow identifier of the second flow with the identified IP address and port number in the record.
4 Assignments
0 Petitions
Accused Products
Abstract
In one aspect, a computerized method of an application routing service includes the step of using a deep-packet inspection (DPI) technique on a first network flow to identify an application. The method includes the step of storing an Internet-protocol (IP) address and a port number used by the application and an identity of the application in a database. The method includes the step of detecting a second network flow. The method includes the step of identifying the IP address and the port number of the application in the second network flow. The method includes the step of looking up the IP address and the port number in the database. The method includes the step of identifying the application based on the IP address and the port number.
-
Citations
19 Claims
-
1. A method for application routing comprising:
at a first edge device of a network; receiving a first flow associated with an application and identifying in a flow identifier of the first flow an Internet Protocol (IP) address and port number of the application; using deep packet inspection (DPI) to identify an application identifier that identifies the application associated with the first flow; storing a record that maps the application identifier with the identified IP address and port number; and sending the record to a second edge device to use to associate a second flow received by the second edge device with the application identifier by matching an IP address and port number in a flow identifier of the second flow with the identified IP address and port number in the record. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
12. A non-transitory machine readable medium storing a program for execution on a first edge device of a network, the program comprising sets of instructions for:
-
receiving a first flow associated with an application and identifying in a flow identifier of the first flow a Layer 3 address and Layer 4 address for the application; using deep packet inspection (DPI) to identify an application identifier that identifies the application associated with the first flow; storing a record that maps the application identifier with the identified Layer 3 and Layer 4 addresses; and sending the record to a second edge device to use to associate a second flow received by the second edge device with the application identifier by matching a Layer 3 address and a Layer 4 address in a flow identifier of the second flow with the identified Layer 3 address and Layer 4 address in the record. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
Specification