The subject matter described herein relates to methods and systems for monitoring signaling messages. More particularly, the subject matter described herein relates to methods, systems, and computer readable media for congestion management in a Diameter signaling network.
Diameter is an authentication, authorization and accounting (AAA) protocol for computer networks, and is a successor to Radius. The Diameter base protocol is defined in International Engineering Task Force (IETF) request for comments (RFC) 3588 which is incorporated by reference herein in its entirety. Diameter messages use a per user framework and exist in the format of request-answer messages. Diameter answer messages travel back to the request source via the same path through which the request message was routed using hop-by-hop transport.
Diameter messages may be exchanged between Diameter nodes for performing various functions. For example, a mobility management entity (MME) and a home subscriber server (HSS) may interact for authentication, authorization, and/or accounting (AAA) purposes. While RFC 3588 discloses various aspects involving Diameter, performing congestion management of Diameter signaling messages is not adequately addressed.
Accordingly, there exists a need for methods, systems, and computer readable media for congestion management in a Diameter signaling network.
According to one aspect, the subject matter described herein includes a method for congestion management in a Diameter signaling network. The method occurs a Diameter routing node. The method includes determining, using a metric associated with Diameter message processing, that a first Diameter message processing metric threshold has been exceeded. The method also includes in response to determining that the first Diameter message processing metric threshold has been exceeded, performing a first congestion mitigation action. Performing the first congestion mitigation action includes analyzing subsequent Diameter messages to determine one or more common attributes of the subsequent Diameter messages and in response to determining the one or more common attributes of the subsequent Diameter messages, performing a second congestion mitigation action for Diameter messages having the one or more common attributes.
According to another aspect, the subject matter described herein includes a system for congestion management in a Diameter signaling network. The system includes a Diameter routing node. The Diameter routing node includes a screening module configured to determine, using a metric associated with Diameter message processing, that a first Diameter message processing metric threshold has been exceeded. The Diameter routing node also includes a congestion management module configured to perform a first congestion mitigation action in response to determining that the first Diameter message processing metric threshold has been exceeded. Performing the first congestion mitigation action includes analyzing subsequent Diameter messages to determine one or more common attributes of the subsequent Diameter messages and in response to determining the one or more common attributes of the subsequent Diameter messages, performing a second congestion mitigation action for Diameter messages having the one or more common attributes.
The subject matter described herein can be implemented in software in combination with hardware and/or firmware. For example, the subject matter described herein can be implemented in software executed by a processor. In one exemplary implementation, the subject matter described herein may be implemented using a computer readable medium having stored thereon computer executable instructions that when executed by the processor of a computer control the computer to perform steps. Exemplary computer readable media suitable for implementing the subject matter described herein include non-transitory devices, such as disk memory devices, chip memory devices, programmable logic devices, and application specific integrated circuits. In addition, a computer readable medium that implements the subject matter described herein may be located on a single device or computing platform or may be distributed across multiple devices or computing platforms.
As used herein, the term “node” refers to a physical computing platform including one or more processors and memory.
As used herein, the terms “function” or “module” refer to software in combination with hardware and/or firmware for implementing features described herein.
Preferred embodiments of the subject matter described herein will now be explained with reference to the accompanying drawings, wherein like reference numerals represent like parts, of which:
In accordance with the subject matter disclosed herein, systems, methods, and computer readable media are provided for performing congestion management in Diameter signaling network. Advantageously, the present subject matter described herein can prevent overloading of nodes in the Diameter signaling network by using a congestion management module. For example, a Diameter routing node may receive, process, and route a significant amount of Diameter messages. By providing a Diameter routing node that performs congestion management based on dynamic and/or user-customizable rules, performance of the Diameter routing node and Diameter Peer nodes connected to the Diameter routing node may be maintained. For example, the Diameter signaling node may be capable of throttling the volume of Diameter traffic sent to or received from peers based on the content of the traffic, network conditions, and/or other factors.
Reference will now be made in detail to exemplary embodiments of the subject matter described herein, examples of which are illustrated in the accompanying drawings. Wherever possible, the same reference numbers will be used throughout the drawings to refer to the same or like parts.
Referring to
Screening modules 102 may include functionality for processing (e.g., identifying and marking relevant messages) and/or copying messages. For example, Diameter messages traversing a node via an interface may be processed or screened by screening modules 102. In some embodiments, screening modules 102 may be adapted to screen signaling messages (e.g., Diameter messages) based on one or more screening rules and/or policies. If a signaling message matches a rule and/or policy, the signaling message, or portion thereof, may be copied, marked, and/or flagged. The copied, marked, and/or flagged message may be sent to other modules (e.g., CMM 104) and/or nodes for further processing.
Screening modules 102 may be used in performing congestion management in a Diameter signaling network. For example, each screening module 102 may be configured to monitor one or more metrics associated with Diameter processing. Screening modules 102 may mark Diameter messages (e.g., by setting one or more flags and/or by adding or modifying an attribute in the Diameter messages) that should receive or be affected by congestion management actions. Screening modules 102 may mark Diameter messages that should bypass or not be affected by congestion management actions.
Exemplary monitored metrics may include an ingress rate of Diameter signaling messages to DSR 100, an egress rate of Diameter signaling messages from DSR 100, a message processing queue depth associated with DSR 100, a processor utilization metric associated with DSR 100, a failed transaction volume metric associated with DSR 100, a rate of communication of Diameter messages, or a pending transaction volume metric. Screening modules may be aware of various metric thresholds that correspond to a monitored metric. For example, an ingress message per second (MPS) rate for Diameter request messages directed to DSR 100 could be monitored and a threshold for the metric may be 800 MPS. If a metric threshold is exceeded, screening module 102 may be configured to mark, identify, and/or initiate another module to perform a congestion mitigation action.
In some embodiments, monitored metrics and associated thresholds may include aggregate metrics associated with the entire DSR 100, a message processor, or a module within DSR 100. In some embodiments, monitored metrics and associated thresholds may be associated with a single Diameter communication interface, a single connection, single association, or a grouping of various interfaces, connections, or associations.
CMM 104 may include functionality for performing congestion management for a Diameter signaling network, including correlating messages and performing congestion mitigation actions, also referred to as congestion mediation actions. CMM 104 may perform one or more congestion mitigation actions in response to various metric thresholds being exceeded and/or a Diameter message being marked for congestion management. Exemplary congestion mitigation actions may include discarding a subsequently received message, generating a copy of a subsequently received message, generating a transaction detail record associated with a subsequently received message, preferentially routing or processing a Diameter message, performing traffic profiling, ceasing one or more congestion mitigation actions, or applying one or more additional congestion mitigation actions (e.g., in a recursive manner).
CMM 104 may include functionality for traffic profiling and/or correlation. Traffic profiling and/or correlation may include identifying (e.g., indexing, tagging, or associating) related Diameter messages and/or other signaling messages. For example, correlation processing may include correlating received Diameter messages that are associated with the same subscriber, session, and/or access node.
In some embodiments, Diameter traffic profiling may be performed as a congestion mitigation action. Diameter traffic profiling may indicate to a network operator or an analysis module additional congestion mitigation actions to perform and/or indicate which Diameter messages to apply congestion mitigation actions.
In some embodiments, Diameter traffic profiling may be applied to ingress Diameter message traffic, egress Diameter traffic, or all Diameter traffic. Traffic profiling statistics may be generated for a predetermined period of time, a predetermined number of Diameter messages, or based on another factor (e.g., until another threshold is exceeded).
After a Diameter traffic profile is generated, CMM 104 or another module may analyze the Diameter traffic profile. In some embodiments, the analysis seeks to identify attributes (e.g., attribute value pairs (AVPs)) that are common to some or all of the Diameter messages associated with the traffic profile. If common attributes are identified, CMM 104 may perform one or more congestion mitigation actions for zero or more (e.g., 50%) of all related Diameter messages (e.g., messages having the identified common attributes).
In some embodiments, a screening module 102 and a CMM 104 may be integrated at a single node or may each be located at distinct nodes. For example, a screening module 102 and a CMM 104 may be located at DSR 100. In another example, a screening module 102 may be located at DSR 100 and a CMM 104 may be located at a distinct computing platform. In yet example, a screening module 102 may be located at a link probe and a CMM 104 may be located at a distinct computing platform and/or node. In some embodiments, a screening module 102 and CMM 104 may be integrated into a single module or function. For example, CMM 104 may screen Diameter messages and manage congestion of a Diameter signaling network and may be located at numerous message processors of DSR 100.
In the embodiment illustrated in
In some embodiments, each interface may be associated with a unique screening module 102. For example, at a DSR, a Dx interface may be associated with a Dx screening module 102. In other embodiments, interfaces may share or use one or more screening modules 102. For example, at a DSR, a message processor may include a screening module 102 for screening messages received from a plurality of interfaces.
In some embodiments, DSR 100 may receive Diameter messages via other Diameter interfaces. For example, DSR 100 may receive Diameter message via an LTE interface, an IMS interface, an IETF specification interface, a 3GPP specification interface, a Third Generation Partnership Project 2 (3GPP2) specification interface, a European Telecommunications Standards Institute (ETSI) specification interface, an International Telecommunications Union (ITU) specification interface, a PacketCable specification interface, a MultiService Forum (MSF) specification interface, an Sh interface, a Dx interface, a Ro interface, a Rf interface, an Sp interface, a Gx interface, a Rx interface, a Gz interface, a Gy interface, a Gq interface, a Zh interface, a Dz interface, a Zn interface, a Ty interface, a Tx interface, a Dw interface, a Wa interface, a Wd interface, a Wx interface, a Wm interface, a Wg interface, a Pr interface, a Gr interface, a Gr+ interface, a Gi interface, a Wo interface, a Wf interface, a Re interface, an S6 interface, an S2 interface, an SW interface, an Sta interface, an S7 interface, an H2 interface, an E2 interface, an E4 interface, an E5 interface, a A3 interface, a A4 interface, a Rr interface, a Gq′ interface, a TC-6 interface, a TC-7 interface, a TC-8 interface, a TC-9 interface, a TC-10 interface, a TC-11 interface, a DB-0 interface, a DB-2 interface, a BI-1 interface, a LOC-1 interface, an Rw interface, a Pkt-mm-2 interface, a P-CSCF-PAM interface, a Pkt-laes-2 interface, an MM10 interface, an MZ interface, a Gmb interface, or a Zn′ interface.
While
Each MP 202 may include functionality for receiving, copying, and/or processing Diameter messages. For example, as illustrated in
Screening modules 102 may include functionality for processing and/or copying signaling messages. In some embodiments, screening modules 102 may be adapted to screen Diameter messages based on one or more screening rules. Exemplary screening rules may be used to copy, correlate, and/or monitor Diameter messages, or portions thereof, based on various factors. For example, screening modules 102, using one or more screening rules, may copy messages, or portions thereof, that include a particular Visited-PLMN-ID value or a particular User-Name value. In another example, screening modules 102, using screening rules, may copy messages, or portions thereof, associated with a particular Diameter interface.
In some embodiments, screening rule criteria may include a message type (e.g., a ULR message command code and Location Information Request (LIR) message command code, Credit Control Request (CCR) message command code, Re-Authorization Request message command code, etc.), time of day, a network condition, a network operator, a subscriber tier, a subscriber, an associated interface, an origination node, an origination network, a destination node, a destination network, a particular AVP code, and/or AVP information (e.g., a Visited-PLMN-ID, SGSN-Number, and User-Name).
In some embodiments, screening rules may include thresholds and congestion mitigation actions. For example, screening modules 102 may include rules that indicate when certain Diameter messages (e.g., based on AVPs or other metrics) should be affected by congestion management rules and/or actions. For example, screening modules 102 may enforce a rule that if Diameter request messages are received at a rate greater than 500 MPS, all new Diameter request messages are given a lower routing priority than Diameter answer messages. As such, in-process Diameter transactions may be given preference (i.e., higher routing priority) during a congested time period.
Screening rules storage 208 may include any entity (e.g., a database or memory cache) for maintaining or storing screening rules. DSR 100, including components (e.g., MPs 202) and modules therein, may access screening rules storage 208 for obtaining screening rules and/or related information. In some embodiments, screening rules storage 208 may be integrated with one or more MPs 202. In some embodiments, screening rules storage 208 may be distinct from and/or external to MPs 202.
In some embodiments, screened messages (e.g., Diameter messages, or portions thereof, that traverse MPs 202 and/or copies of such Diameter messages or portions) may be sent from DSR 100 to an external application or node for reporting and/or further processing. For example, copies of screened messages may be provided (e.g., as raw message copy output) to a node that is external to DSR 100.
In some embodiments, screened messages may be sent to one or more modules located at or integrated with DSR 100. For example, screened messages may be sent to CMM 104. CMM 104 may include functionality for performing congestion management. In addition, CMM 104 may include functionality for correlating, storing, and/or generating information (e.g., records, statistics and/or reports) associated with various signaling messages (e.g., Diameter messages). CMM 104 may include various modules for performing one or more functions, such as a traffic profile and/or correlation module (TPCM) 206 and a mitigation action module (MAM) 214.
TPCM 206 may include functionality for performing traffic profiling and/or correlation. TPCM 206 may use TPCM rules to generate Diameter message processing statistics, e.g., Diameter messages that are throttled, Diameter messages that are marked for throttling, and Diameter messages that are marked so as to bypass throttling.
In some embodiments, a TPCM rule may be used to associate messages that are related to a subscriber or set of subscribers. In another example, a TPCM rule may be used to associate messages that relate to a particular node, application, interface, protocol, network operator, or service provider. TPCM 206 may store statistics and/or other traffic profiling information in message storage 212 or send the information to additional nodes or modules for further analysis.
Correlation rules storage 210 may include any entity (e.g., a database, cache, or other memory device) for maintaining or storing TPCM rules. DSR 100, including components and modules therein, may access correlation rules storage 210 for obtaining TPCM rules and/or related information. In some embodiments, correlation rules storage 210 may be integrated with DSR 100. In some embodiments, correlation rules storage 210 may be distinct from and/or external to DSR 100.
Message storage 212 may include any entity for maintaining or storing messages, or portions thereof, and/or traffic profiling information. DSR 100, including components and modules therein, may access message storage 212 for obtaining screened messages and/or related information. In some embodiments, message storage 212 may be integrated with DSR 100. In some embodiments, message storage 212 may be distinct from and/or external to DSR 100.
In some embodiments, after correlation is performed, TPCM information may be provided to additional modules and/or external nodes. For example, correlated message output may be sent to an external node for generating monitoring records, such as call detail records (CDRs) or transaction detail records (TDRs). In another example, messages may be sent to a MAM 214.
MAM 214 may include functionality for performing one or more congestion mitigation actions. In some embodiments, MAM 214 may receive an indication from TPCM 206 or screening module 102 regarding which messages are associated with congestion mitigation actions. For example, MAM 214 may receive an internal trigger message from TPCM 206 or may respond to a modified flag or AVP in a Diameter message. In response to determining that Diameter messages are associated with an exceeded threshold, congestion mitigation actions may be performed.
In some embodiments, MAM 214 may use MAM or peer route table (PRT) rules that indicate congestion mitigation actions to perform. For example, a MAM rule may indicate, if a threshold is exceeded for Diameter messages of certain types or that contain certain attributes, the Diameter messages should be discarded without sending corresponding Diameter answer messages to the messages' originators. In another example, a MAM rule may indicate that, if a threshold is exceeded for Diameter registration request messages, the Diameter registration request messages should be discarded and corresponding Diameter answer messages should be generated and sent to the messages' originators. In this example, the MAM rule may also indicate user configurable text, status, or error code for including in the generated Diameter answer messages.
MAM rules storage 216 may include any entity (e.g., a database, cache, or other memory device) for maintaining or storing MAM rules. DSR 100, including components and modules therein, may access MAM rules storage 216 for obtaining MAM rules and/or related information. In some embodiments, MAM rules storage 216 may be integrated with DSR 100. In some embodiments, MAM rules storage 216 may be distinct from and/or external to DSR 100.
MAM storage 218 may include any entity for maintaining or storing MAM records, or portions thereof. DSR 100, including components and modules therein, may access MAM storage 218 for determining congestion mitigation actions performed. In some embodiments, message storage 218 may be integrated with DSR 100. In some embodiments, message storage 218 may be distinct from and/or external to DSR 100.
In some embodiments, MAM 214 may provide a message or related congestion management information to another module or node. For example, MAM 214 may provide a non-throttled Diameter message to a routing module at an egress MP 202 or may provide congestion management information to reporting application 220.
Reporting application 220 may be any application or other entity for providing or generating information. For example, reporting application 220 may receive CDRs, messages, correlated message information or traffic profile information and may process this information. In some embodiments, reporting application 220 may include, but is not limited to, a billing application, a billing verification application, a quality of service (QoS) application, a trouble-ticket generating application, a network diagnostic application, a business intelligence application, a service level agreement compliance verification application, a pre-paid services application, a fraud detection application, a lawful surveillance application, or other application.
While
In the architecture described above with respect to
In some embodiments, once the correlation is successfully completed, the answer message may be propagated back to the downstream peer that sent the message. Because Diameter routing implemented by message processors 202 may be required to perform message correlation, screening modules 102 may correlate messages and consolidate the correlated messages into a single message. The single message may be sent to additional modules. Because message correlation may be performed by the message processors, correlation on CMM 104 may be omitted.
In some embodiments, CMM 104 or another module may include functionality for allowing user configurable and/or dynamic congestion management rules (e.g., thresholds and associated congestion management actions). For example, one or more thresholds (e.g., a throttle trigger rate and a cease throttle trigger rate) may be associated with a PRT, a route list, a route group, a MP 202, or DSR 100. Each threshold may be associated with one or more congestion mitigation actions. For example, a threshold may be associated with discarding a Diameter message, discarding a Diameter Request message, generating a Diameter Answer message associated with a discarded Diameter Request message, perform preferentially routing or processing a Diameter Answer message in relation to other Diameter Answer messages, and/or routing a received Diameter message to a destination via an alternate route (e.g., a backup or less congested path).
In some embodiments, CMM 104 or another module may include functionality for marking Diameter messages for congestion management rules and/or actions and/or for marking Diameter messages for bypassing congestion management rules and/or actions. For example, as depicted in
In some embodiments, CMM 104 or another module may include functionality for preventing a threshold from being exceeded by performing one or more congestion mitigation actions. For example, a throttle trigger rate may be associated with a route list identified by a PRT rule. In this example, CMM 104 or another module may enforce the throttle trigger rate (e.g., for messages sent to peers in the route list). The rate may be maintained by discarding all or some (e.g., based on a dynamic or predetermined ratio) messages arriving above this rate. Exponentially-smoothed system wide moving-average system key performance indicator (KPI) may be used to keep messages flowing at or below an associated threshold rate.
In some embodiments, CMM 104 or another module may include functionality for determining whether a Diameter message is to be affected by congestion management rules and/or actions. For example, CMM 104 may use a white list and a black list. A white list may be used to identify Diameter messages, subscribers, tiers, or other groups that may bypass congestion management rules and/or actions. A black list may be used to identify Diameter messages, subscribers, tiers, or other groups that may be affected by congestion management rules and/or actions.
Table 400 may represent a data structure containing routing information and associated MPS thresholds. Table 400 may include information stored in multiple fields or columns, such as an origination host field, an origination realm field, a destination host field, a destination realm field, an application identifier field, a direction (e.g., ingress or egress) field, an MPS threshold field, and a congestion mitigation action field. Using the exemplary data of table 400, DSR 100 or a module therein may determine whether to apply a congestion mitigation action based on one or more characteristics of a Diameter message. For example, if a Diameter message has characteristics matching the first six fields of row 1 in Table 400 and if a threshold of 500 MPS has been exceeded, then a post-threshold action identified as “Apply Mediation Rule X” may occur.
Table 402 may represent a data structure containing congestion mitigation rules. Table 402 may include information stored in multiple fields or columns, such as a post-threshold mediation rule identifier field, a rule description field, a parameter or AVP identifier field, a parameter or AVP value field, and a congestion mitigation action field. Using the exemplary data of table 402, DSR 100 or a module therein may determine which congestion mitigation action is to be performed. For example, “Mediation Rule X” is a parameter specific discrimination rule for discarding a Diameter request message and sending a Diameter answer message to the Diameter request message originator.
As depicted, table 500 may represent a data structure containing peer connection information and associated MPS thresholds. Table 500 may include information stored in multiple fields or columns, such as a transport connection identifier field, an MPS threshold field, and a post-threshold action field. Using the exemplary data of table 500, DSR 100 or a module therein may determine whether to apply a congestion mitigation action based on the transport connection identifier. For example, if a Diameter message is part of a session associated with transport identifier “3333333” and if a threshold of 800 MPS has been exceeded, then a post-threshold action identified as “Apply Mediation Rule Y” may occur.
Table 502 may represent a data structure containing congestion mitigation rules. Table 502 may include information stored in multiple fields or columns, such as a post-threshold mediation rule identifier field, a rule description field, a parameter or AVP identifier field, a parameter or AVP value field, and a congestion mitigation action field. Using the exemplary data of table 502, DSR 100 or a module therein may determine which congestion mitigation action is to be performed. For example, “Mediation Rule Y” is an apply traffic profiling rule for building and reporting a thirty second traffic profile.
As depicted, table 600 may represent a data structure containing message attribute information and associated MPS thresholds. Table 600 may include information stored in multiple fields or columns, such as a transport connection identifier field, an MPS threshold field, and a post-threshold action field. Using the exemplary data of table 600, DSR 100 or a module therein may determine whether to apply a congestion mitigation action based on a command code and flags associated with a Diameter message. For example, if a Diameter message includes command code “316” and a request (R) flag is “0” and if a threshold of 800 MPS has been exceeded, then a post-threshold action identified as “Apply Mediation Rule Y” may occur.
Table 602 may represent a data structure containing congestion mitigation rules. Table 602 may include information stored in multiple fields or columns, such as a post-threshold mediation rule identifier field, a rule description field, a parameter or AVP identifier field, a parameter or AVP value field, and a congestion mitigation action field. Using the exemplary data of table 602, DSR 100 or a module therein may determine which congestion mitigation action is to be performed. For example, “Mediation Rule Y” may be a parameter specific discrimination rule for changing a Visited-PLMN-ID AVP and discarding the Diameter message.
Referring to the embodiment illustrated in
At step 702, a congestion mitigation action may be performed in response to determining that the first Diameter message processing metric threshold has been exceeded. Continuing the example stated above, in response to the ingress rate of new registration request messages to HSS 108 being 1,200 MPS, DSR 100 or a module therein may throttle new registration request messages sent to HSS 108, such as by discarding 30% of new registration requests and, optionally, sending an answer message (e.g., a user configurable or application specific Diameter Answer message) to originators of the discarded request messages. In this example, the other 70% of registration request messages may be routed to HSS 108 without modification, detour, or other congestion mitigation effects.
In some embodiments, DSR 100 or a module therein may determine, using the metric associated with Diameter message processing, that a second Diameter message processing metric threshold has been exceeded. In response to determining that the second Diameter message processing metric threshold has been exceeded, DSR 100 or a module therein may cease a congestion mitigation action. Continuing with the example stated above, a second metric threshold of 500 MPS may be associated with the ingress rate of new registration request messages to HSS. If the second metric threshold is exceeded (e.g., if the current ingress rate of new registration request messages to HSS goes below 500 MPS), DSR 100 or a module therein may stop throttling new registration request messages to HSS 108.
In some embodiments, performing a congestion mitigation action may include analyzing subsequent Diameter messages to determine one or more common attributes of the subsequent Diameter messages and in response to determining the one or more common attributes of the subsequent Diameter messages, perform a second congestion mitigation action for one or more Diameter messages having the one or more common attributes.
In some embodiments, the metric associated with Diameter message processing includes an ingress rate of Diameter signaling messages to the Diameter routing node, an egress rate of Diameter signaling messages from the Diameter routing node, a message processing queue depth associated with the Diameter routing node, a processor utilization metric associated with the Diameter routing node, a failed transaction volume metric associated with the Diameter routing node, or a rate of communication of Diameter messages.
In some embodiments, performing a congestion mitigation action includes discarding a Diameter message, discarding a Diameter Request message, generating a Diameter Answer message associated with a discarded Diameter Request message, preferentially routing or processing a Diameter Answer message in relation to other Diameter Answer messages, or routing a received Diameter message to a destination via an alternate route.
In some embodiments, the Diameter message is discarded based on predefined Diameter message criteria, such as an AVP value.
In some embodiments, performing a congestion mitigation action includes performing the congestion mitigation action using a white list or black list, wherein a Diameter message associated with the white list is not throttled and wherein a Diameter message associated with the black list is throttled.
It will be appreciated that the above examples are illustrative and that the functionality described herein may be implemented for use with or applicable for various signaling messages, various signaling interfaces and various signaling nodes, including messages, interfaces, and nodes not explicitly described above, without departing from the scope of the subject matter described herein.
It will be understood that various details of the subject matter described herein may be changed without departing from the scope of the subject matter described herein. Furthermore, the foregoing description is for the purpose of illustration only, and not for the purpose of limitation.
This application claims the benefit of U.S. Provisional Patent Application Ser. No. 61/522,224, filed Aug. 10, 2011, the disclosure of which is incorporated herein by reference in its entirety.
Number | Name | Date | Kind |
---|---|---|---|
6144636 | Aimoto et al. | Nov 2000 | A |
7072651 | Jiang et al. | Jul 2006 | B2 |
8305922 | Cuervo | Nov 2012 | B2 |
8326263 | Zhou et al. | Dec 2012 | B2 |
8331229 | Hu et al. | Dec 2012 | B1 |
8335220 | Hu et al. | Dec 2012 | B2 |
8353000 | He et al. | Jan 2013 | B2 |
8400916 | Cutler et al. | Mar 2013 | B2 |
8406137 | Siddam et al. | Mar 2013 | B2 |
8438290 | Rui et al. | May 2013 | B2 |
8543118 | Mangal et al. | Sep 2013 | B1 |
8577329 | Momtahan et al. | Nov 2013 | B2 |
8601073 | Craig et al. | Dec 2013 | B2 |
8605583 | Cutler et al. | Dec 2013 | B2 |
8626156 | Marsico | Jan 2014 | B2 |
8630925 | Bystrom et al. | Jan 2014 | B2 |
8675487 | Siddam et al. | Mar 2014 | B2 |
8681622 | Chatterjee et al. | Mar 2014 | B2 |
8683544 | Foottit et al. | Mar 2014 | B2 |
8787174 | Riley et al. | Jul 2014 | B2 |
8812020 | Marsico | Aug 2014 | B2 |
8818327 | Shaikh | Aug 2014 | B2 |
20030003928 | Marjelund et al. | Jan 2003 | A1 |
20030200277 | Kim | Oct 2003 | A1 |
20040116117 | Ahvonen et al. | Jun 2004 | A1 |
20050105464 | Acharya et al. | May 2005 | A1 |
20050107091 | Vannithamby et al. | May 2005 | A1 |
20050176438 | Li | Aug 2005 | A1 |
20050195743 | Rochberger et al. | Sep 2005 | A1 |
20060069776 | Shim et al. | Mar 2006 | A1 |
20060090004 | Nikolayev et al. | Apr 2006 | A1 |
20060268835 | Hyotylainen et al. | Nov 2006 | A1 |
20070054665 | Elkarat et al. | Mar 2007 | A1 |
20070083927 | Swaroop | Apr 2007 | A1 |
20070121596 | Kurapati et al. | May 2007 | A1 |
20070153995 | Fang et al. | Jul 2007 | A1 |
20070195788 | Vasamsetti et al. | Aug 2007 | A1 |
20070232301 | Kueh | Oct 2007 | A1 |
20080031258 | Acharya et al. | Feb 2008 | A1 |
20080043689 | Walter | Feb 2008 | A1 |
20080142599 | Benillouche et al. | Jun 2008 | A1 |
20080170497 | Jeong et al. | Jul 2008 | A1 |
20080198748 | Gilfix et al. | Aug 2008 | A1 |
20080250156 | Agarwal et al. | Oct 2008 | A1 |
20080253387 | Liang et al. | Oct 2008 | A1 |
20090061855 | Sethi et al. | Mar 2009 | A1 |
20090092131 | Hu et al. | Apr 2009 | A1 |
20090109845 | Andreasen et al. | Apr 2009 | A1 |
20090185494 | Li et al. | Jul 2009 | A1 |
20090207730 | Stamoulis et al. | Aug 2009 | A1 |
20090219946 | Liu et al. | Sep 2009 | A1 |
20090225762 | Davidson et al. | Sep 2009 | A1 |
20090228956 | He et al. | Sep 2009 | A1 |
20090270099 | Gallagher et al. | Oct 2009 | A1 |
20090325574 | Izawa et al. | Dec 2009 | A1 |
20100048161 | He et al. | Feb 2010 | A1 |
20100080171 | Rune et al. | Apr 2010 | A1 |
20100121960 | Baniel et al. | May 2010 | A1 |
20100190497 | Pudney et al. | Jul 2010 | A1 |
20100192170 | Raleigh | Jul 2010 | A1 |
20100211956 | Gopisetty et al. | Aug 2010 | A1 |
20100241496 | Gupta et al. | Sep 2010 | A1 |
20100246500 | Rydnell et al. | Sep 2010 | A1 |
20100287121 | Li et al. | Nov 2010 | A1 |
20100291924 | Antrim et al. | Nov 2010 | A1 |
20100297985 | Van Erlach | Nov 2010 | A1 |
20100299451 | Yigang et al. | Nov 2010 | A1 |
20110035495 | Ekström et al. | Feb 2011 | A1 |
20110040845 | Cai et al. | Feb 2011 | A1 |
20110061061 | Chen et al. | Mar 2011 | A1 |
20110067085 | Brouard et al. | Mar 2011 | A1 |
20110076985 | Chami et al. | Mar 2011 | A1 |
20110103261 | Duan | May 2011 | A1 |
20110116382 | McCann et al. | May 2011 | A1 |
20110122886 | Willars et al. | May 2011 | A1 |
20110138066 | Kopplin et al. | Jun 2011 | A1 |
20110165901 | Baniel et al. | Jul 2011 | A1 |
20110171958 | Hua et al. | Jul 2011 | A1 |
20110188457 | Shu et al. | Aug 2011 | A1 |
20110199903 | Cuervo | Aug 2011 | A1 |
20110217979 | Nas | Sep 2011 | A1 |
20110225306 | Delsesto et al. | Sep 2011 | A1 |
20110299395 | Mariblanca Nieves | Dec 2011 | A1 |
20110307790 | Pandya et al. | Dec 2011 | A1 |
20110317557 | Siddam et al. | Dec 2011 | A1 |
20120014332 | Smith et al. | Jan 2012 | A1 |
20120028626 | Marocchi et al. | Feb 2012 | A1 |
20120039175 | Sridhar et al. | Feb 2012 | A1 |
20120044867 | Faccin et al. | Feb 2012 | A1 |
20120052866 | Froehlich et al. | Mar 2012 | A1 |
20120087368 | Kunarathnam et al. | Apr 2012 | A1 |
20120099529 | Williams | Apr 2012 | A1 |
20120099715 | Ravishankar et al. | Apr 2012 | A1 |
20120115478 | Gunaratnam et al. | May 2012 | A1 |
20120131165 | Baniel et al. | May 2012 | A1 |
20120140632 | Norp et al. | Jun 2012 | A1 |
20120155389 | McNamee et al. | Jun 2012 | A1 |
20120176894 | Cai et al. | Jul 2012 | A1 |
20120203781 | Wakefield | Aug 2012 | A1 |
20120213072 | Kotecha et al. | Aug 2012 | A1 |
20120221445 | Sharma | Aug 2012 | A1 |
20120221693 | Cutler et al. | Aug 2012 | A1 |
20120250573 | Kulasingam et al. | Oct 2012 | A1 |
20120250613 | Robinson et al. | Oct 2012 | A1 |
20120303796 | Mo et al. | Nov 2012 | A1 |
20130041994 | Terrien et al. | Feb 2013 | A1 |
20130079006 | Cho et al. | Mar 2013 | A1 |
20130114404 | Yang | May 2013 | A1 |
20130160058 | Albal et al. | Jun 2013 | A1 |
20130163429 | Dunstan et al. | Jun 2013 | A1 |
20130177146 | Schneider et al. | Jul 2013 | A1 |
20130265911 | Kulaingam et al. | Oct 2013 | A1 |
20130275583 | Roach et al. | Oct 2013 | A1 |
20140018067 | Rajagopalan et al. | Jan 2014 | A1 |
20140022897 | Rajagopalan et al. | Jan 2014 | A1 |
20140031029 | Rajagopalan et al. | Jan 2014 | A1 |
20140040975 | Raleigh et al. | Feb 2014 | A1 |
20140376380 | Campbell et al. | Dec 2014 | A1 |
20150011182 | Goldner et al. | Jan 2015 | A1 |
20150036486 | McMurry et al. | Feb 2015 | A1 |
20150036504 | McMurry et al. | Feb 2015 | A1 |
20150036505 | Sparks et al. | Feb 2015 | A1 |
Number | Date | Country |
---|---|---|
0 857 399 | May 2004 | EP |
1 988 680 | Nov 2008 | EP |
2 093 931 | Aug 2009 | EP |
2006-100873 | Apr 2006 | JP |
10-2009-0029348 | Mar 2009 | KR |
WO 2009058067 | May 2009 | WO |
WO 2009070179 | Jun 2009 | WO |
WO 2009129487 | Oct 2009 | WO |
WO 2009149341 | Dec 2009 | WO |
WO 2011082035 | Jul 2011 | WO |
WO 2011161575 | Dec 2011 | WO |
WO 2012130264 | Oct 2012 | WO |
WO 2013155535 | Oct 2013 | WO |
WO 2014014829 | Jan 2014 | WO |
WO 2014015331 | Jan 2014 | WO |
WO 2015017422 | Feb 2015 | WO |
Entry |
---|
Commonly-assigned, co-pending U.S. Appl. No. 13/572,132 for “Methods, Systems, and Computer Readable Media for Policy Event Record Generation,” (Unpublished, filed Aug. 10, 2012). |
Calhoun et al., “Diameter Base Protocol,” RFC 3588, pp. 1-147 (Sep. 2003). |
Non-Final Office Action for U.S. Appl. No. 13/572,132 (Aug. 11, 2014). |
Final Office Action for U.S. Appl. No. 13/040,020 (Sep. 19, 2014). |
First Office Action for Chinese Application No. 201080064945.X (Sep. 17, 2014). |
Communication of extended European Search Report for European Patent Application No. 10841576.1 (May 9, 2014). |
Non-Final Office Action for U.S. Appl. No. 13/040,020 (Apr. 21, 2014). |
Applicant-Initiated Interview Summary for U.S. Appl. No. 13/040,020 (Mar. 20, 2014). |
Notice of Allowance and Fee(s) Due for U.S. Appl. No. 12/973,228 (Mar. 20, 2014). |
Notice of Allowance and Fee(s) Due for U.S. Appl. No. 13/251,784 (Feb. 12, 2014). |
Final Office Action for U.S. Appl. No. 13/040,020 (Dec. 13, 2013). |
Notification of Transmittal of the International Search Report and the Written Opinion of the International Searching Authority, or the Declaration for International Application No. PCT/US2013/050512 (Dec. 2, 2013). |
Notice of Allowance and Fee(s) Due for U.S. Appl. No. 13/330,086 (Nov. 6, 2013). |
Notification of Transmittal of the International Search Report and the Written Opinion of the International Searching Authority, or the Declaration for International Application No. PCT/US2013/051447 (Oct. 28, 2013). |
Non-Final Office Action for U.S. Appl. No. 12/973,228 (Oct. 25, 2013). |
Non-Final Office Action for U.S. Appl. No. 13/251,784 (Oct. 10, 2013). |
Advisory Action for U.S. Appl. No. 13/251,784 (Sep. 6, 2013). |
Notice of Allowance and Fee(s) Due for U.S. Appl. No. 13/276,916 (Sep. 3, 2013). |
Non-Final Office Action for U.S. Appl. No. 13/040,020 (Jul. 18, 2013). |
Final Office Action for U.S. Appl. No. 13/251,784 (Jun. 26, 2013). |
Final Office Action for U.S. Appl. No. 12/973,228 (Jun. 21, 2013). |
“3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Access to the 3GPP Evolved Packet Core (EPC) via non-3GPP access networks; Stage 3 (Release 12),” 3GPP TS 24.302, V12.1.0, pp. 1-68 (Jun. 2013). |
Non-Final Office Action for U.S. Appl. No. 13/276,916 (Apr. 11, 2013). |
Non-Final Office Action for U.S. Appl. No. 12/973,228 (Feb. 1, 2013). |
Non-Final Office Action for U.S. Appl. No. 13/251,784 (Dec. 19, 2012). |
Communication of European Publication Number and Information on the Application of Article 67(3) EPC for European Patent Application No. 10841576.1 (Oct. 10, 2012). |
“Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); LTE; Policy and charging control architecture (3GPP TS 23.203 version 8.14.0 Release 8),” ETSI TS 123 203, pp. 1-118 (Jul. 2012). |
Notification of Transmittal of the International Search Report and the Written Opinion of the International Searching Authority, or the Declaration for International Patent Application No. PCT/US2010/061586 (Sep. 26, 2011). |
3GPP, “3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Universal Geographical Area Description (GAD) (Release 10),” 3GPP TS 23.032 V10.0.0, pp. 1-29 (Mar. 2011). |
“Smart Cards; Card Application Toolkit (CAT) (Release 9),” ETSI TS 102 223 V9.2.0, pp. 1-209 (Oct. 2010). |
3GPP, “3rd Generation Partnership Project; Technical Specification Group GSM/EDGE Radio Access Network; Mobile Radio Interface Layer 3 Specification; Radio Resource Control (RRC) Protocol (Release 10),” 3GPP TS 44.018 V10.0.0, pp. 1-429 (Sep. 2010). |
3GPP, “3rd Generation Partnership Project; Technical Specification Group Radio Access Network; Evolved Universal Terrestrial Radio Access (E-UTRA); Radio Resource Control (RRC); Protocol Specification (Release 9),” 3GPP TS 36.331 V94.0, pp. 1-252 (Sep. 2010). |
3GPP, “3rd Generation Partnership Project; Technical Specification Group Radio Access Network; Radio Resource Control (RRC); Protocol Specification (Release 9),” 3GPP TS 25.331, V9.4.0, pp. 1-1789 (Sep. 2010). |
3GPP, “3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; UICC-terminal Interface; Physical and Logical Characteristics (Release 9),” 3GPP TS 31.101, V9.1.0, pp. 1-35 (Jun. 2010). |
3GPP, “3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Non-Access-Stratum (NAS) Functions Related to Mobile Station (MS) in Idle Mode (Release 10),” 3GPP TS 23.122 v10.0.0, pp. 1-41 (Jun. 2010). |
3GPP, “Universal Mobile Telecommunications System (UMTS); LTE; 3GPP Evolved Packet System (EPS); Evolved General Packet Radio Service (GPRS) Tunnelling Protocol for Control Plane (GTPv2-C); Stage 3 (3GPP TS 29.274 version 9.3.0 Release 9),” ETSI TS 129 274 V9.3.0, pp. 1-162 (Jun. 2010). |
3GPP, “3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Telecommunication management; Charging management; Diameter charging applications (Release 9),” 3GPP TS 32.299 V9.4.0, pp. 1-149 (Jun. 2010). |
Znaty, “Diameter, GPRS, (LTE+ePC=EPS), IMS, PCC and SDM,” Effort, pp. 1-229 (Part 1 of 2) (May 2010). |
Znaty, “Diameter, GPRS, (LTE+ePC=EPS), IMS, PCC and SDM,” EFORT pp. 230-461 (Part 2 of 2) (May 2010). |
“Universal Mobile Telecommunications System (UMTS); LTE; Policy and Charging Control over Gx Reference Point (3GPP TS 29.212 version 9.2.0 Release 9),” ETSI TS 129 212 V9.2.0, pp. 1-115 (Apr. 2010). |
3GPP, “3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Policy and Charging Control over Gx Reference Point (Release 9),” 3GPP TS 29.212 V9.2.0, pp. 1-111 (Mar. 2010). |
3GPP, “3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Network Identity and Timezone (NITZ); Service Description, Stage 1 (Release 9),” 3GPP TS 22.042, V9.0.0, pp. 1-8 (Dec. 2009). |
3GPP, “Digital Cellular Telecommunications System (Phase 2+); Universal Mobile Telecommunications System (UMTS); Universal Subscriber Identity Module (USIM) Application Toolkit (USAT) (3GPP TS 31.111 version 8.3.0 Release 8),” ETSI TS 131 111 V8.3.0, pp. 1-102 (Oct. 2008). |
International Standard, “Maritime Navigation and Radiocommunication Equipment and Systems—Digital Interfaces—Part 1: Single Talker and Multiple Listeners,” IEC 61162-1, Second edition, pp. 1-86 (Jul. 2000). |
Communication of European publication number and information on the application of Article 67(3) EPC for European Application No. 13776083.1 (Jan. 21, 2015). |
Commonly-assigned, co-pending International Application No. PCT/US14/66240 for “Methods, Systems, and Computer Readable Media for Diameter Routing Using Software Defined Network (SDN) Functionality,” (Unpublished, filed Nov. 18, 2014). |
Notification of Transmittal of the International Search Report and the Written Opinion for of the International Searching Authority, or the Declaration for International Application No. PCT/US2014/048651 (Nov. 17, 2014). |
Notification of Transmittal of the International Search Report and the Written Opinion of the International Searching Authority, or the Declaration for International Application No. PCT/US2014/048644 (Oct. 17, 2014). |
Commonly-assigned, co-pending International Application No. PCT/US14/48651 for “Methods, Systems, and Computer Readable Media for Diameter Load and Overload Information and Virtualization,” (Unpublished, filed Jul. 29, 2014). |
Commonly-assigned, co-pending U.S. Appl. No. 14/034,478 for “Methods, Systems, and Computer Readable Media for Diameter Load and Overload Information and Virtualization,” (Unpublished, filed Sep. 23, 2013). |
Tschofenig, “Diameter Overload Architecture and Information Model,” draft-tschofenig-dime-overload-arch-00.txt, DIME, pp. 1-9 (Jul. 16, 2013). |
Notification of Transmittal of the International Search Report and the Written Opinion of the International Searching Authority, or the Declaration for International Application No. PCT/US2013/036664 (Jul. 2, 2013). |
Campbell, “Diameter Overload Control Solution Issues,” draft-campbell-dime-overload-issues-00, pp. 1-16 (Jun. 2013). |
“3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Study on Diameter overload control mechanisms (Release 12),” 3GPP TR 29.809 V0.3.0, pp. 1-51 (Jun. 2013). |
Roach et al., “A Mechanism for Diameter Overload Control,” draft-roach-dime-overload-ctrl-03, DIME, pp. 1-49 (May 17, 2013). |
Korhonen et al., “The Diameter Overload Control Application (DOCA),” draft-korhonen-dime-ovl-01.txt, Diameter Maintenance and Extensions (DIME), pp. 1-18 (Feb. 25, 2013). |
Fajardo et al., “Diameter Base Protocol,” RFC 6733, pp. 1-152 (Oct. 2012). |
McMurry et al., “Diameter Overload Control Requirements,” draft-ietf-dime-overload-reqs-00, pp. 1-25 (Sep. 21, 2012). |
“OpenFlow Switch Specification,” https://www.opennetworking.org/images/stories/downloads/sdn-resources/onf-specifications/openflow/openflow-spec-v1.2.pdf, Version 1.2 (Wire Protocol 0x03), Open Networking Foundation, pp. 1-85 (Dec. 5, 2011). |
Interview Summary for U.S. Appl. No. 12/425,998 (Sep. 14, 2011). |
Final Office Action for U.S. Appl. No. 12/425,998 (Jun. 8, 2011). |
Interview Summary for U.S. Appl. No. 12/425,998 (Mar. 1, 2011). |
Non-Final Office Action for U.S. Appl. No. 12/425,998 (Nov. 29, 2010). |
Notification of Transmittal of the International Search Report and the Written Opinion of the International Searching Authority, or the Declaration for International Application No. PCT/US2009/041006 (Dec. 4, 2009). |
Hilt et al., “Session Initiation Protocol (SIP) Overload Control,” IETF, draft-hilt-sipping-overload-02, p. 1-28 (Jul. 8, 2007). |
Zhang et al., “Denial of Service Attack and Prevention on SIP VoIP Infrastructures Using DNS Flooding,” in Principles, Systems, and Applications of IP Telecummunications (IPTCOMM) (Jul. 2007). |
Nahum et al., “Evaluating SIP Server Performance,” IBM T.J. Watson Research Center, RC24183 (Feb. 2007). |
Rosenberg, “Requirements for Management of Overload in the Session Initiation Protocol,” IETF, draft-rosenbergy-sipping-overload-reqs-02, p. 1-22 (Oct. 2006). |
Kuthan et al., “Denial of Service Attacks Targeting a SIP VoIP Infrastructure: Attack Scenarios and Prevention mechanisms,” IEEE Networks Magazine, vol. 20, No. 5 (Sep. 2006). |
Ohta, “Overload Protection in a SIP Signaling Network,” in International conference on Internet Surveillance and Protection (ICISP), p. 1-6 (2006). |
Donovan et al., “Session Timers in the Session Initiation Protocol (SIP),” Network Working Group, RFC 4028 (Apr. 2005). |
Ohta, “Simulation Study of SIP Signaling in an Overload Condition,” International Conference for Communications, Internet, and Information Technology, IASTED/ACTA Press, pp. 321-326 (Nov. 22-24, 2004). |
Rosenberg et al., “SIP: Session Initiation Protocol,” Network Working Group, RFC 3261, http://www.ietf.org/rfc/rfc3261.txt, p. 1-252 (Jun. 2002). |
Schulzrinne et al., “SIPstone—Benchmarking SIP Server Performance,” (Apr. 2002). |
“Signaling Flows for the IP Multimedia Call control Based on Session Initiation Protocol (SIP) and Session Description Protocol (SDP),” 3GPP TS 24.228 V1.1.0, p. 1-653 (Jul. 3-6, 2001). |
Grossglauser et al., “On the Relevance of Long-Range Dependence in Network Traffic,” IEEE/ACM Transactions on Networking, vol. 7, No. 5, p. 629-640 (Oct. 1999). |
Final Office Action for U.S. Appl. No. 13/572,132 (Mar. 11, 2015). |
Non-Final Office Action for U.S. Appl. No. 13/942,323 (Feb. 25, 2015). |
Non-Final Office Action for U.S. Appl. No. 13/040,020 (Jan. 29, 2015). |
Non-Final Office Action for U.S. Appl. No. 13/947,314 (Jan. 16, 2015). |
Advisory Action and Examiner-Initiated Interview Summary for U.S. Appl. No. 13/040,020 (Dec. 5, 2014). |
Number | Date | Country | |
---|---|---|---|
20130039176 A1 | Feb 2013 | US |
Number | Date | Country | |
---|---|---|---|
61522224 | Aug 2011 | US |