Content-Aware Caching and Proxy operations by a transit network device, when placed in Radio Access Networks (RAN) in UMTS and LTE networks, are described in copending U.S. Patent Publication No. 2010-0034089, the disclosure of which is incorporated by reference.
3GPP Release 10 Specifications define the Selective IP Traffic Offload (SIPTO) function in a transit network device (Traffic Offload Device) that intercepts the IuPS interface in the UMTS network. It offloads portions of SGSN/GGSN (Serving GPRS Support Node/Gateway GPRS Support Node) or SGW/PGW (Serving Gateway/PDN Gateway) traffic to an offload interface attached to the Internet or to the operator's data network. These specifications also define alternative solutions for Traffic Offload in the UMTS and LTE networks. The offload policies in these specifications use Access Point Name (APN) information or implement offload control specified by the SGSN/MME in the control plane.
It should be noted that the TOF (Traffic Offload Function) device defined in the 3GPP specification is a gateway device which forwards packets from one interface to either the offload interface or to the default SGSN/GGSN or SGW/PGW. However, it is not a content caching and content aware proxy device.
The SIPTO feature in these specifications does not specify caching content nor do these specifications define SIPTO devices capable of originating traffic. For example, these specifications do not define terminating a TCP session and delivering stored content from cache. Delivering content from cache, for example responding to a http request from Radio Network Controller (RNC) or eNodeB, requires establishing an association between two unidirectional GTP-U tunnels and mapping their bearer-plane User Equipment (UE) IP address. The caching device needs to encapsulate http responses for locally cached objects with the GTP-U tunnel ID of the RNC or eNodeB for the corresponding UE from these learned associations. Similarly, while performing Selective IP Traffic Offload function, the transit network device terminates the per UE GTP-U tunnel of traffic received from E-NodeB/RNC and forwards traffic based on bearer plane IP addresses, and encapsulates the traffic received from the offload interface with the GTP-U tunnel corresponding to the specific UE and bearer IP address while forwarding to the eNodeB/RNC.
The 3GPP specifications define learning the GTP-U tunnel and Bearer IP Addresses from the S11 interface in the LTE architecture. Also the S1-AP specification contains protocol elements that contain bearer IP addresses and the user plane GTP-Tunnel-IDs; however bearer IP addresses are contained within the NAS portion of the PDUs which may be encrypted and/or in certain deployments the logical S1AP may not available at specific deployment locations.
However, these specifications do not provide guidance regarding associating tunnels when the TOF or SIPTO device acts as a transparent proxy device. Thus, to properly implant local content caching, a method is needed to identify and associate pairs of GTP-U tunnels for each UE. Thus the current invention identifies methods of establishing association between the two unidirectional flows and the corresponding bearer IP addresses.
The present disclosure describes a method of learning and identifying two unidirectional tunnels (such as GTP-U tunnels in UMTS and LTE Networks) corresponding to a user equipment (UE) using a device placed in a Radio Access Network, where the device acts as a transparent proxy intercepting user plane and control plane protocols on the S1 interface. The S1 interface is the logical interface between eNodeB and core network. This interface includes the control plane (S1-C) between the eNodeB and the MME (Mobility Management Entity), and the user plane (S1-U) between the eNodeB and the SGW (Serving Gateway).
The GTP-U tunnels on the S1 interface in the LTE architecture and the IUPS interface in UMTS architecture are per UE and are unidirectional. Thus, traffic received from the eNodeB contains
Traffic received from the S/PGW contains:
The two unidirectional tunnels belonging to a specific UE have to be associated with each other for delivering any locally cached content or for delivering traffic received from an offload interface in a transit network device placed in RAN. The present disclosure identifies methods of pairing the two unidirectional tunnels that belong to same UE, when there is no control plane information or when there is control plane information, but the NAS portions of the S1 Control plane that contain the bearer IP addresses are encrypted.
In the latter case, the bearer IP addresses that belong to GTP-U tunnels cannot be identified by a transit device from the control plane since they are encrypted. Thus, the present disclosure defines control plane and user plane methods for associating GTP-U tunnels and the corresponding bearer plane IP addresses. Additionally, the present disclosure defines methods for detecting the mobility of a UE, as the UE moves from the coverage area of one eNodeB to another as the transit device is intercepting S1 interfaces of a plurality of eNodeBs in an LTE network, a plurality of RNCs in an UMTS network or a plurality of PCFs in a CDMA Network.
Furthermore, the present disclosure identifies methods to construct a topology map of eNodeBs, based on the information passed to the core network.
The present disclosure defines the process of learning the association between two unidirectional tunnels and the corresponding bearer plane IP Addresses from the S1 User Plane or from a combination of S1 User and Control Planes when NAS Portions of the S1 Control plane protocols that contain UE IP Address are encrypted.
Another aspect of the present invention is the ability to detect the mobility of a mobile device (from IUPS User Plane in UMTS or S1-U in LTE networks) in a RTND/Traffic offload device 100 when the device is deployed as shown in
While the descriptions use the LTE network as examples, the present invention is equally applicable to other mobile networks such as, UMTS, EVDO/CDMA, WIMAX etc., where user IP traffic is carried within encapsulated unidirectional tunnels (GTP-U or GRE) tunnels for specific user's flows and embedding them within transport layer addresses (i.e., with Source and Destination IP addresses of the network devices). For example, the methods are equally applicable for a device placed in RAN in the UMTS network, for example, on the IUPS interface between RNC and Core Network (SGSN/GGSN), or in CDMA network intercepting A10/A11 interfaces.
3GPP standards (36.413) define the process of establishing two unidirectional GTP-U tunnels and the associated User IP address for carrying user's data traffic using control plane protocols (such as S1AP in LTE).
Different methods may be used to learn the tunnel and user IP address associations in various configurations. For example, in one configuration, the Non Access Stratum Protocol Data Units (NAS PDUs) are encrypted in the LTE Architecture. The IP addresses assigned by the mobile network are contained within the encrypted portions of NAS PDUs, and therefore, the association of the unidirectional GTP-U tunnel IDs corresponding to the UE IP addresses can not be decoded. This method is illustrated in
To establish a user plane GTP-U tunnel for data transfer, the MME sends “Initial Context Setup Request” message to the eNodeB, as shown in step 200. This message contains the following fields or parameters:
However, since the NAS PDU is encrypted and the RTND 100 is not within the security context, the NAS PDU cannot be decoded by RTND 100. Thus, the RTND 100 cannot associate the bearer IP address to a tunnel based solely on this message.
In step 210, the eNodeB receives the “Initial Context Setup Request” from step 200, and returns “Initial Context Setup Response” message that contains:
The MME-UE-S1AP-ID, eNodeB-UE-S1AP-ID, and RAB-IDs in the above messages identify that they are for the same UE, and the same E-RAB. The TLA and GTP-TEIDs are unidirectional in the sense that one TLA and GTP-TEID pair corresponds to the tunnel for downstream traffic to the eNodeB for the specific UE, and the other {TLA, GTP-TEID} pair defines the tunnel that the eNodeB should use for sending upstream traffic from the UE.
Thus, the RTND 100 snoops the S1-AP messages and associates the “Initial Context Setup Request” message (step 200) and the “Initial Context Setup Response” message (step 210). Since the same per UE S1AP IDs, and RAB IDs are used, the RTND 100 can establish a relationship between the two unidirectional {TLA, GTP-TEID} pairs, as shown in step 220. However, as stated above, because the NAS Portion of the message that contains the bearer IP Address (UE IP Address) may be encrypted, the UE IP Address corresponding to these GTP tunnels is unknown to the RTND 100. Thus, the RTND 100 can associate the two tunnels based only on control plane information.
In step 310, the eNodeB 102 transmits this packet to the RTND 100. The RTND 100 receives the GTP packet from step 310, in the user plane and forwards it to the S/PGW 103. This packet contains the TLA, GTP-TEID, IP Source Address (IP Address of UE), and Destination IP address. The RTND 100 associates the bearer IP address with the two unidirectional TLA & GTP-TEIDs learned from control plane (S1AP) steps 200 and 210 above. This bearer IP address is the IP address of the UE.
Later, as shown in
The operation described in
An RTND may be deployed with offload interfaces (SIPTO) to the internet, to the operator data network, or to locally connected CDN device as identified in co-pending U.S. patent application Ser. No. 13/185,066, which is incorporated herein by reference in its entirety. One such embodiment is shown in
In some scenarios, the process shown in
When a GTP packet is received by the RTND 100 with a TEID that has not yet been associated with a bearer IP address and/or with a TEID in reverse direction, the RTND 100 may construct a GTP packet with an ICMP packet as the payload, using the same transport layer addresses and CN/GTP-TEID as the received packet. The RTND 100 then transmits this GTP packet to the core network, typically directed to a well known server IP address on the internet. The ICMP Ping response packet received from the destination will have the GTP-TEID for the reverse dataflow for valid bearer IP addresses. This mechanism facilitates the association of the two unidirectional GTP tunnels and the bearer IP addresses corresponding to the unidirectional tunnels.
A flowchart of this method is shown in
This method can also be an alternative to the method shown in
In certain deployments, the IUPS control plane or S1-AP information may not be available to the RTND 100. In addition, in some mobility environments, the RTND 100 may see User Plane GTP Tunnel traffic (IUPS user plane, or S1-U) of a mobile device before a relationship is established between the two Unidirectional GTP TEIDs of a user and the associated one or more bearer IP Addresses (user IP addresses). The present disclosure identifies the methods to determine this information while delivering locally cached content and/or performing SIPTO Functions (selective forwarding of user request to offload interfaces where there is no per UE GTP tunnel through the offload interface).
The RTND 100 maintains a table of TLA/TEIDs learned from the RNC or eNodeB 102 IUPS User Plane/S1-U interface, and the associated bearer IP addresses. The TEIDs received from RNC/eNodeB 102 define the tunnels for sending traffic to the CN 103 but do not define the TEIDs for sending traffic to the RNC/eNodeB 102. If an associated tunnel does not exist, the RTND 100 forwards the GTP tunneled packets to the CN 103, or constructs an ICMP/Ping Packet with same destination tunnel (CN-TEID), and TLA as the received packet to a well known IP destination (for example to an operator configured DNS server).
When tunneled traffic is received from the core network (SGSN/GGSN/SGW) 103, the GTP tunneled traffic contains the TLA of destination RNC or eNodeB 102, the TEID for the specific user and bearer plane destination IP addresses that correspond to the User Device.
In addition to the method shown in
When GTP tunneled packets are received from the eNodeB or RNC 102, the RTND 100 checks if the corresponding reverse tunnel is associated (as described in
Learning user IP addresses from GTP tunneled traffic received from RNC/eNodeB 102 and serving content from local cache or SIPTO interfaces after the reverse tunnel is established, as described above, has the disadvantage that any spoofed bearer IP addresses or IP addresses not validated by the Core Network could overload the RAN, and could cause denial of service attacks for other users in RAN. To overcome this problem, RTND 100 may verify that any GTP tunneled packets received from RNC/eNodeB 102 contain bearer Source IP addresses that have already been validated with the GTP tunneled traffic from core network 103 before serving content from local cache or using SIPTO functions. This validation ensures that the bearer IP addresses within a GTP tunnel from RAN are validated by the core 103. If the validation fails, the RTND 100 bypasses local proxy/caching/SIPTO operations and forwards to the CN 103. Thus, for traffic with non-validated bear IP addresses, the behavior of the network with the RTND is the same as it would be without the RTND 100.
Another scenario arises when a UE moves from the scope of one RNC/eNodeB 102 to another RNC/eNodeB 102. Specifically, the new RNC/eNodeB 102 may have an associated in line RTND, and the previous RNC/eNodeB 102 may not have an associated RTND 100 or there may be no communication between the two RTND devices.
When the UE moves to the scope of a new RTND, that RTND 100 will not have any association between the two tunnels. Thus, when GTP tunneled traffic is received from RNC/eNodeB 102 or from CN 103, the associated TLAs, TEIDs, and bearer IP addresses are learned by the RTND 100 and the packets are forwarded between the two interfaces without performing any Proxy/Caching or traffic offload functions.
The RTND 100 can then learn these associations using the method shown in
As an alternative to this approach, the relationship between the two unidirectional tunnels and bearer IP addresses corresponding to a user may be established from user plane information only, as shown in
Mobility detection from the control plane and using such information in the user plane is the subject matter of a copending U.S. patent application Ser. No. 12/939,690, the disclosure of which is incorporated herein by reference in its entirety. The present disclosure defines methods of detecting mobility when the RTND 100 is deployed to intercept multiple IUPS or S1 interfaces using the User Plane information (IUPS-UP in UMTS or S1-U in LTE).
As described above, GTP tunneled traffic received from RNC or eNodeB contains:
When a UE moves from the scope of one eNodeB/RNC (referred to as the Source eNodeB/RNC) to the scope of a second eNodeB/RNC (referred to as the Target eNodeB/RNC), the two sets of eNodeBs/RNCs and MME/SGSN exchange control plane information for changing the e-TLA & e-TEID assigned by the source eNodeB/RNC to the new e-TLA and e-TEID that are associated with the Target eNodeB/RNC. After this operation is complete, the traffic from SGW/SGSN to that UE contains the e-TLA and e-TEID that corresponds to the target eNodeB/RNC. In other words, the GTP traffic from the SGW/SGSN appears the same as shown above, except with new e-TLA and e-TEID fields.
When the RTND is intercepting user plane traffic from both the Source eNodeB/RNC and the target eNodeB/RNC, it sees the new eTLA and eTEIDs for the same bearer plane IP address, the same bearer Src/Dst Port Numbers, and the same CN-TLA. In addition, the CN-TEID may also be the same, although this is Core Network implementation dependent. Thus, when eTLA, eTEID change for the same bearer plane IP address, the same CN-TLA, and optionally the same CN-TEID, the RTND 100 identifies that the UE moved from the scope of one eNodeB/RNC to the scope of another eNodeB/RNC. The detection of mobility from the scope of one eNodeB/RNC to another within the same RTND facilitates estimating the traffic load of both source and target eNodeB/RNCs, and facilitates downstream traffic delivery and scheduling optimizations in RTND.
The above described methods of detecting a UE's mobility from the scope of one eNodeB to another eNodeB also allows the RTND to establish both of the eNodeB's as neighbors to each other. Thus, when traffic from a number of eNodeBs passes through RTND, it may be able to establish adjacency/neighbor relationships between them as described above. Thus, the RTND may construct a topology map of the corresponding eNodeBs.
As an example, when a UE moves from a first eNodeB (eNB1) to a second eNodeB (eNB2), the transport addresses and tunnel-id that the S/PGW uses changes from eNB1's address to eNB2's address. Thus, in a network with many eNodeB's, the adjacency of eNB1 and eNB2 may be established. Similarly, if there is mobility of UEs from eNB1 to eNB2, eNB5, and eNB8, then it could be concluded eNB1 has neighbors eNB2, eNB5, and eNB8, and that eNB3, eNB4, eNB5, eNB6, and eNB7 are likely not its neighbors. Thus from this information, the UE's mobility patterns could be predicted for future traffic. If the eNodeBs' physical location (Geo-Coordinates) are known by manual configuration or communication with a operator network device, the RF topology layout of the various eNodeB's could be estimated from the learned mobility patterns of UEs. The RTND, while operating as content proxy, intercepts HTTP protocols. When devices support GPS, and propagate UE's geo-coordinates, the RTND may recognize these GEO coordinates, and associate the coordinates with corresponding eNodeBs, for example from a UE that is getting the maximum throughput.
In certain operator configurations in LTE or UMTS deployments, the bearer IP addresses of two mobile devices (UEs) may be same. For example, this may happen if the two UEs are associated with two different APNs. The APN information is exchanged through control plane protocols (S1-AP or IUPS-CP) with NAS PDUs. In the LTE configuration, NAS PDUs may be encrypted and the APN information within the control protocol may not visible to the transit network device, such as the RTND that is intercepting user plane and control plane protocols. In this scenario, the transport layer addresses (TLA) and/or GTP-TEIDs that carry the bearer IP traffic will be different for two different UEs with the same bearer IP address. The current invention uses TLAs and/or GTP-TEIDs to distinguish between the two user flows while serving from local cache or offload interface (SIPTO function).
In another embodiment, a single UE IP address may utilize multiple user plane tunnels. This scenario arises for flow based charging or if 2 applications on the UE require different Qualities of Service (QOS) from the network. In this case, the user plane TCP/UDP source or destination port numbers will be different for the two tunnels. For example, one GTP-U tunnel may be used for accessing internet traffic through TCP destination port number 80, and a different tunnel for accessing mail-server. In this scenario, the RTND 100 uses the bearer plane Source/Destination Port Numbers in addition to the bearer plane Source/Destination IP addresses for associating relationship between the unidirectional tunnels.
Also included may be a large storage element 905, adapted to hold cached information. In some embodiments, this cache storage may be semiconductor memory, such as RAM or DRAM. In other embodiments, this cache storage may be a rotating media, such as a disk drive or other large storage device.
Also included may be an offload interface 907 which may be used for SIPTO or TOF functions.
The control logic/processing unit 903 may be physically implemented in a variety of technologies. For example, it may be a general-purpose processor, executing a set of instructions from an internal or external storage device.
In another embodiment, a dedicated hardware device having embedded instructions or state machines may be used to perform the functions described. Throughout this disclosure, the terms “control logic” and “processing unit” are used interchangeably to designate an entity adapted to perform the set of functions described.
The RTND 100 also contains software capable of performing the functions described herein. The software may be written in any suitable programming language and the choice is not limited by this disclosure. Additionally, all applications and software described herein are computer executable instructions that are contained on a computer-readable media. For example, the software and applications may be stored in a read only memory, a rewritable memory, or within an embedded processing unit. The particular computer on which this software executes is application dependent and not limited by the present invention.
The present disclosure is not to be limited in scope by the specific embodiments described herein. Indeed, other various embodiments of and modifications to the present disclosure, in addition to those described herein, will be apparent to those of ordinary skill in the art from the foregoing description and accompanying drawings. Thus, such other embodiments and modifications are intended to fall within the scope of the present disclosure. Further, although the present disclosure has been described herein in the context of a particular implementation in a particular environment for a particular purpose, those of ordinary skill in the art will recognize that its usefulness is not limited thereto and that the present disclosure may be beneficially implemented in any number of environments for any number of purposes.
This application claims priority of U.S. Provisional Patent Application Ser. No. 61/386,034, filed Sep. 24, 2010, the disclosure of which is incorporated herein by reference in its entirety.
Number | Name | Date | Kind |
---|---|---|---|
6694349 | Zou | Feb 2004 | B1 |
6907501 | Tariq et al. | Jun 2005 | B2 |
6996085 | Travostino et al. | Feb 2006 | B2 |
7318100 | Demmer et al. | Jan 2008 | B2 |
7568071 | Kobayashi et al. | Jul 2009 | B2 |
7739383 | Short et al. | Jun 2010 | B1 |
7991905 | Roussos et al. | Aug 2011 | B1 |
8111630 | Kovvali et al. | Feb 2012 | B2 |
8161158 | Curcio et al. | Apr 2012 | B2 |
8190674 | Narayanan et al. | May 2012 | B2 |
8208430 | Valmikam et al. | Jun 2012 | B2 |
8451800 | Kovvali et al. | May 2013 | B2 |
20030003919 | Beming et al. | Jan 2003 | A1 |
20030058874 | Sahaya et al. | Mar 2003 | A1 |
20030120805 | Couts et al. | Jun 2003 | A1 |
20030195977 | Liu et al. | Oct 2003 | A1 |
20040068571 | Ahmavaara | Apr 2004 | A1 |
20040098748 | Bo et al. | May 2004 | A1 |
20040185876 | Groenendaal et al. | Sep 2004 | A1 |
20040223505 | Kim et al. | Nov 2004 | A1 |
20040240390 | Seckin | Dec 2004 | A1 |
20040264368 | Heiskari et al. | Dec 2004 | A1 |
20050097085 | Shen et al. | May 2005 | A1 |
20050135428 | Hellgren | Jun 2005 | A1 |
20050136973 | Llamas et al. | Jun 2005 | A1 |
20050157646 | Addagatla et al. | Jul 2005 | A1 |
20060018294 | Kynaslahti et al. | Jan 2006 | A1 |
20060117139 | Kobayashi et al. | Jun 2006 | A1 |
20060159121 | Sakata et al. | Jul 2006 | A1 |
20060167975 | Chan et al. | Jul 2006 | A1 |
20060274688 | Maxwell et al. | Dec 2006 | A1 |
20070025301 | Petersson et al. | Feb 2007 | A1 |
20070113013 | Knoth | May 2007 | A1 |
20070143218 | Vasa | Jun 2007 | A1 |
20070174428 | Lev Ran et al. | Jul 2007 | A1 |
20070213058 | Shaheen | Sep 2007 | A1 |
20070223379 | Sivakumar et al. | Sep 2007 | A1 |
20070230342 | Skog | Oct 2007 | A1 |
20070254671 | Liu | Nov 2007 | A1 |
20070275726 | Lee et al. | Nov 2007 | A1 |
20080026789 | Llamas et al. | Jan 2008 | A1 |
20080031194 | Yaqub | Feb 2008 | A1 |
20080052366 | Olsen et al. | Feb 2008 | A1 |
20080082753 | Licht et al. | Apr 2008 | A1 |
20080162713 | Bowra et al. | Jul 2008 | A1 |
20080186912 | Huomo | Aug 2008 | A1 |
20080191816 | Balachandran et al. | Aug 2008 | A1 |
20080195745 | Bowra et al. | Aug 2008 | A1 |
20080273533 | Deshpande | Nov 2008 | A1 |
20080320151 | McCanne et al. | Dec 2008 | A1 |
20090019178 | Melnyk et al. | Jan 2009 | A1 |
20090019229 | Morrow et al. | Jan 2009 | A1 |
20090024835 | Fertig et al. | Jan 2009 | A1 |
20090029644 | Sue et al. | Jan 2009 | A1 |
20090043906 | Hurst et al. | Feb 2009 | A1 |
20090135749 | Yang | May 2009 | A1 |
20090156213 | Spinelli et al. | Jun 2009 | A1 |
20090196233 | Zhu et al. | Aug 2009 | A1 |
20090210904 | Baron et al. | Aug 2009 | A1 |
20090274224 | Harris | Nov 2009 | A1 |
20090287842 | Plamondon | Nov 2009 | A1 |
20090291696 | Cortes et al. | Nov 2009 | A1 |
20100020685 | Short et al. | Jan 2010 | A1 |
20100023579 | Chapweske et al. | Jan 2010 | A1 |
20100034089 | Kovvali et al. | Feb 2010 | A1 |
20100041402 | Gallagher et al. | Feb 2010 | A1 |
20100054204 | Dolganow et al. | Mar 2010 | A1 |
20100057887 | Wang et al. | Mar 2010 | A1 |
20100085962 | Issaeva et al. | Apr 2010 | A1 |
20100088369 | Sebastian et al. | Apr 2010 | A1 |
20100091736 | Kim et al. | Apr 2010 | A1 |
20100106770 | Taylor et al. | Apr 2010 | A1 |
20100158026 | Valmikam et al. | Jun 2010 | A1 |
20100184421 | Lindqvist et al. | Jul 2010 | A1 |
20100195602 | Kovvali et al. | Aug 2010 | A1 |
20100215015 | Miao et al. | Aug 2010 | A1 |
20100272021 | Kopplin et al. | Oct 2010 | A1 |
20110110333 | Chen | May 2011 | A1 |
20110136488 | Kuvvali et al. | Jun 2011 | A1 |
20110167170 | Kovvali et al. | Jul 2011 | A1 |
20120099533 | Kovvali et al. | Apr 2012 | A1 |
20120184258 | Kovvali et al. | Jul 2012 | A1 |
20120191862 | Kovvali et al. | Jul 2012 | A1 |
Number | Date | Country |
---|---|---|
2197187 | Jun 2010 | EP |
2008076073 | Jun 2008 | WO |
2012012334 | Jan 2012 | WO |
Entry |
---|
International Search Report and Written Opinion mailed Feb. 29, 2012 in co-pending PCT application No. PCT/US2011/044361. |
Office Action mailed Apr. 10, 2012 in co-pending U.S. Appl. No. 12/939,690. |
ETSI TS 136 413 V 9.8.0, Technical Specification, Jan. 2012, LTE; “Evolved Universal Terrestrial Radio Access Network (E-UTRAN); S1 Application Protocol (S1AP)” (3GPP TS 36.413 version 9.8.0 Release 9), 248 pages. |
3GPP TR 23.829 V1.3.0, Technical Report, Sep. 2010, “3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Local IP Access and Selected IP Traffic Offload; (Release 10)”, 44 pages. |
International Search Report/Written Opinion dated Oct. 6, 2009 in co-pending PCT application No. PCT/US2009/052871. |
International Preliminary Report on Patentability mailed Feb. 23, 2012 in co-pending PCT application No. PCT/US09/52871. |
International Search Report/Written Opinion dated Mar. 1, 2010 in co-pending PCT application No. PCT/US2009/069260. |
International Search Report/Written Opinion dated Mar. 12, 2010 in co-pending PCT application No. PCT/US2010/22542. |
International Search Report/Written Opinion dated May 13, 2011 in co-pending PCT application No. PCT/US2011/28477. |
International Search Report/Written Opinion mailed Feb. 29, 2012 in co-pending PCT application No. PCT/US2011/044156. |
RFC 1644-T/TCP—TCP Extensions for Translations Functional Specification, Jul. 1994—http://www.faqs.org/rfcs/rfc1644.html, 38 pages, R. Braden, et al. |
RFC 3135—Performance Enhancing Proxies Intended to Mitigate Link-Related Degradations, Jun. 2001—http://www.faqs.org.rfcs/rfc3135.html, 48 pages, J. Border et al. |
RFC 2045—Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Message Bodies; Nov. 1996—http://www.faqs.org/rfcs/rfc2045.html, 34 pages, N. Freed, et al. |
Http header enrichment, http://news.thomasnet.com/fullstory/Software-optimizes-high-speed-wireless-data-networks-485934, “Software optimizes high-speed wireless data networks”, Jun. 26, 2006, 10 pages, Thomasnet News. |
Proceedings of the USENIX Symposium on Internet Technologies and Systems, Dec. 1997, “Cost-Aware WWW Proxy Caching Algorithms”, 15 pages, CAO, et al. |
The Book of Webmin . . . Or: How I learned to Stop Worrying and Love UNIX, 2003, Chapter 12—Squid, 23 pages, Cooper. |
Proceedings of the 3rd International Workshop on Modeling Analysis and Simulation of Wireless and Mobil Systems (MSWIM '00), ACM, 2000, pp. 77-84, “Prefetching Policies for Energy Saving and Latency Reduction in a Wireless Broadcast Data Delivery System”, Grassi. |
Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, IEEE, 2007, “An Integrated Prefetching and Caching Scheme for Mobile Web Caching System”, p. 522-527, Jin, et al. |
Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS '02), IEEE, 2002, “Power-Aware Prefetch in Mobile Environments”, 8 pages, Yin, et al. |
Office Action mailed Jan. 2, 2013 in co-pending U.S. Appl. No. 13/339,629. |
Office Action mailed Oct. 23, 2012 in co-pending U.S. Appl. No. 12/696,378. |
Office Action mailed Apr. 12, 2013 in co-pending U.S. Appl. No. 13/185,066. |
International Search Report/Written Opinion in corresponding PCT application No. PCT/US2011/053050, 8 pages. |
Office Action mailed Apr. 30, 2013 in co-pending U.S. Appl. No. 13/048,378. |
Notice of Allowance mailed May 29, 2013 in co-pending U.S. Appl. No. 13/339,629. |
Number | Date | Country | |
---|---|---|---|
20120076120 A1 | Mar 2012 | US |
Number | Date | Country | |
---|---|---|---|
61386034 | Sep 2010 | US |