Controlling access to a host processor in a session border controller
First Claim
1. A system comprising:
- a host processor configured to manage calls in a network, each call associated with a plurality of signaling packets, each signaling packet comprising a source endpoint identifier; and
a traffic manager coupled to the host processor via a first path and a second path, each path associated with a bandwidth limit for a respective one of the paths,the traffic manager configured to receive the plurality of signaling packets and to communicate at least a first portion of the plurality of signaling packets to the host processor via a selected one of the paths,the traffic manager further configured to regulate traffic along the first path such that the bandwidth limit of the first path is respected, and to regulate traffic along the second path such that the bandwidth limit of the second path is respected.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and systems for controlling access to a host processor is disclosed. One exemplary method comprises the steps of receiving a plurality of signaling packets and controlling access to a host processor, via a first and a second path, for at least a portion of the packets in accordance with a bandwidth limit for the respective path. An exemplary system comprises: a host processor; and a traffic manager coupled to the host processor via a first path and a second path. The traffic manager is configured to communicate at least a portion of the packets to the host processor via a selected one of the paths. The traffic manager is further configured to regulate traffic along the first path such that the bandwidth limit of the first path is respected, and to regulate traffic along the second path such that the bandwidth limit of the second path is respected.
71 Citations
42 Claims
-
1. A system comprising:
-
a host processor configured to manage calls in a network, each call associated with a plurality of signaling packets, each signaling packet comprising a source endpoint identifier; and a traffic manager coupled to the host processor via a first path and a second path, each path associated with a bandwidth limit for a respective one of the paths, the traffic manager configured to receive the plurality of signaling packets and to communicate at least a first portion of the plurality of signaling packets to the host processor via a selected one of the paths, the traffic manager further configured to regulate traffic along the first path such that the bandwidth limit of the first path is respected, and to regulate traffic along the second path such that the bandwidth limit of the second path is respected. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 39, 40)
-
-
11. A method implemented in a session border controller, comprising the steps of:
-
receiving a plurality of signaling packets, each signaling packet comprising a source endpoint identifier; and controlling access to a host processor of the session border controller by a traffic manager, via a first and a second path, for at least a portion of the signaling packets in accordance with a bandwidth limit for a respective one of the paths by regulating traffic along the first path such that the bandwidth limit of the first path is respected, and by regulating traffic along the second path such that the bandwidth limit of the second path is respected. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A system comprising:
-
means for receiving a plurality of signaling packets, each signaling packet comprising a source endpoint identifier; and means for controlling access to a host processor by a traffic manager, via a first and a second path, for at least a portion of the signaling packets in accordance with a bandwidth limit for a respective one of the paths by regulating traffic along the first path such that the bandwidth limit of the first path is respected, and by regulating traffic along the second path such that the bandwidth limit of the second path is respected. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32, 33, 34)
-
-
35. A method implemented in a session border controller, comprising the steps of:
-
receiving a plurality of signaling packets, each signaling packets comprising a source endpoint identifier; and selecting a first or a second path, responsive to the source endpoint identifier of the packet, for at least a portion of the packets in accordance with a bandwidth limit for a respective one of the paths; and routing by a traffic manager each packet in the portion of packets to a host processor of the session border controller via the selected path to respect the bandwidth limit of the first path and the bandwidth limit of the second path. - View Dependent Claims (36, 37, 38, 41, 42)
-
Specification