The subject matter described herein relates to mitigating traffic storms. More particularly, the subject matter described herein relates to mitigating traffic storms via software defined network (SDN) commands communicated to controllable network entities.
A traffic storm is a flurry or burst of message traffic in a network, which may overwhelm network resources and/or cause the network to fail. One example of a traffic storm is when a large number of internet protocol (IP) phones attempt to simultaneously register with the network after a power outage. Another example of a traffic storm is when a software bug at a network registrar results in deregistration and simultaneous re-registration of mobile devices.
One strategy for mitigating the effects of a traffic storm is to statically provision firewalls to limit or throttle access to the overwhelmed and/or protected network resource. Another strategy is to statically provision or throttle traffic to the overwhelmed network resource. Using statically provisioned resources to handle traffic storms is undesirable because the protection devices themselves may be overwhelmed or inadequate to handle the traffic storm.
Accordingly, there exists a need for methods, systems, and computer readable media for dynamically mitigating traffic storms, using, for example, using software defined networks (SDNs) to provide flexible, scalable alternate resources when traffic storms are detected.
The subject matter described herein includes methods, systems, and computer readable media for mitigating traffic storms. In some embodiments, a system for mitigating traffic storms includes a traffic storm detector configured to detect an indication of a traffic storm. The system may also include a software defined network (SDN) controller configured to generate and send SDN commands to a controllable network entity for mitigating the traffic storm.
In some embodiments, a method for mitigating traffic storms includes detecting an indication of a traffic storm, wherein the traffic storm includes a burst of message traffic in a network. The method further includes sending one or more SDN commands to a controllable and/or controlled network entity to mitigate the traffic storm.
In some embodiments, SDN commands communicated from an SDN controller can partition traffic based upon a class of traffic, an emergency indicator (e.g., an emergency attribute value pair (AVP) encoded within a payload of a message), a destination, an address, an IP prefix, an IP address, one or more QoS rules, or one or more policy rules.
The subject matter described herein may be implemented in software in combination with hardware and/or firmware. For example, the subject matter described herein may be implemented in software executed by one or more hardware processors. In one exemplary implementation, the subject matter described herein may be implemented using a non-transitory computer readable medium having stored thereon computer executable instructions that when executed by the processor of a computer control the computer to perform steps. Exemplary computer readable media suitable for implementing the subject matter described herein include disk memory devices, chip memory devices, programmable logic devices, and application specific integrated circuits. In addition, a computer readable medium that implements the subject matter described herein may be located on a single device or computing platform or may be distributed across multiple devices or computing platforms.
As used herein, the term “node” refers to an addressable entity in a network. A node may be all or a portion of a physical computing platform, such as a server with one or more hardware processor blades or a single processor blade that implements a function, such as a router, a switch, a home subscriber server (HSS), a mobility management entity (MME), a policy and charging rules function (PCRF), an application function (AF), a subscription profile repository (SPR), etc. A node may include one or more hardware processors and memory for executing and storing instructions for implementing the node's particular function. A node may also be a virtual entity implemented by one or more processor blades.
As used herein the term “controller” refers to all or a portion of a physical computing platform adapted to control one or more nodes and/or establish routing paths using one or more nodes via rules provided and/or stored therein. A controller may include one or more hardware processors and memory for executing and storing instructions and/or rules for implementing at a node using a communication protocol communicated via a port or logical interface. The controller may communicate with a client to instruct the client how and where to route packets. A controller may also control and/or establish one or more virtual entities implemented by one or more processor blades.
As used herein, the term “user device” describes subscriber or user equipment, such as a mobile handset, for communicating with one or more portions of a network. User devices may also include a computer, a pager, a smartphone, a phone, a wireless modem, a computing platform, a mobile handset, other subscriber devices and/or combinations thereof.
As used herein, the term “network”, when referring to a home, visited, and/or an alternate network, includes any one of a 3G network, a 3G+ network, a GSM network, a 4G network, an LTE network, an evolved packet core (EPC) network, a 3rd Generation Partnership Project (3GPP) network, a GPRS core network, an IMS core, or other suitable type of network.
As used herein, the term “software defined network” or SDN refers to the physically decoupling of network control plane hardware from the data forwarding plane hardware such that an addressable node (e.g., a switch) can forward packets and a separate server (e.g., a SDN controller) can run the network control plane.
As used herein, the term “OpenFlow” describes a communication protocol defined according to OpenFlow version 1.2, available at https://www.opennetworking.org/images/stories/downloads/sdn-resources/onf-specifications/openflow/openflow-spec-v1.2.pdf, which gives access to the forwarding plane of a node (e.g., a network switch or router) over the network. As used herein an “OpenFlow controller” refers to a control device, including a hardware processor and memory, configured to communicate with one or more network components via the OpenFlow protocol.
Preferred embodiments of the subject matter described herein will now be explained with reference to the accompanying drawings, of which:
In accordance with the subject matter disclosed herein, systems, methods, and computer readable media for mitigating traffic storms are provided. Notably, some embodiments of the present subject matter described herein may include establishing or creating alternate networks, such as software defined networks (SDNs), for managing traffic and preventing one or more network components from being flooded and/or overloaded with traffic. In some embodiments, traffic may be offloaded to one or more alternate resources until the overwhelmed network can recover and/or sustain the amount of traffic initially requested. In other embodiments, the traffic offloaded to alternate resources may be permanent.
In some embodiments, a stand-alone control device or SDN controller and/or a control device integrated with one or more existing network components may be configured to detect or receive an indication of a traffic storm, and instruct one or more controllable network entities to mitigate the storm by allocating additional resources and/or creating alternate resources for routing traffic thereto. Notably, methods systems, and computer readable media described herein may include mitigating traffic storms prior to the traffic reaching an ingress node, or edge device of a network. Thus, traffic may be dynamically re-routed to alternate resources before entering and/or overwhelming a destination network.
In some embodiments, subject matter described herein includes provision of a locally managed or operated control device or controller, configured to move network control out of proprietary network switches and/or routers. For example, the locally managed controller may include a SDN controller having computer readable medium stored thereon for executing instructions for pushing one or more SDN commands to one or more network components (e.g., switches or routers) via an interface, such as a SDN interface or an OpenFlow interface. The one or more network components may then route traffic to one or more alternate resources and/or create alternate resources as instructed by the controller.
Reference will now be made in detail to exemplary embodiments of the subject matter described herein, examples of which are illustrated in the accompanying drawings. Wherever possible, the same reference numbers will be used throughout the drawings to refer to the same or like parts.
In
Notably and in some embodiments, SDN controller 110 and switch 108 may be configured to dynamically create or establish alternative routing paths or SDNs for offloading some or all of the incoming traffic signaled via user devices 102. In other embodiments, SDN controller 110 may instruct switch 108 to offload traffic to one or more alternate entities, such as a server, to delay, quiet, and/or stall some or all of the traffic before it can reach the intended registration node 104. Traffic may be offloaded using the one or more alternate routing paths and/or SDNs to mitigate a storm. Notably, switch 108 may be instructed by SDN controller 110 to implement, create, and/or establish switching paths to alternate resources for mitigating the traffic storm prior to the storm overwhelming registration node 104.
In some embodiments, SDN controller 110 may include a traffic storm detector configured to detect a traffic storm and send SDN commands to a controlled network entity, such as switch 108, in response to detecting a storm. Although a switch is illustrated in
Notably, SDN controller 110 and switch 108 may collectively be configured to dynamically create or establish alternate networks 112. For illustration purposes only two alternate networks 112 are shown, however, only one or more than two alternate networks 112 may also be provided and are contemplated herein. Alternate networks 112 may include SDNs that are “virtual networks” until dynamically established and implemented to receive packets. Alternate networks 112 may be dynamically established as needed for dynamically re-routing traffic about the congested network node (e.g., registration node 104) according to SDN commands communicated from SDN controller 110 at the onset of a traffic storm. Establishing SDNs is advantageous as it obviates a need to manually configure hardware, and allows network administrators to provision and/or program SDN controller 110 with instructions or routing rules for dealing with traffic, without requiring physical access to network-specific hardware devices.
In some embodiments, alternate networks 112 include dynamically created networks. In other aspects, alternate networks 112 include one or more pre-existing networks offered by an alternate carrier.
In some embodiments, SDN controller 110 may push one or more routing rules and/or SDN commands to switch 108 via a controller to switch interface. In some embodiments, the controller to switch interface includes an OpenFlow interface configured to communicate via OpenFlow protocol. In some embodiments, SDN controller 110 implements OpenFlow protocol for controlling one or more OpenFlow switches, routers, or nodes.
In some embodiments, SDN commands communicated via SDN controller 110 may be configured to partition traffic based upon a class of traffic, an emergency indicator (e.g., an emergency AVP encoded within a payload of a message), a destination, an address, an IP prefix, an IP address, one or more QoS rules, or one or more policy rules.
SDN controller 110 may include a standalone node, or it may be integrated within one or other nodes, such as PCRF 202 (e.g.,
In block 304, in response to detecting the indication of the traffic storm, one or more SDN commands can be communicated to a controllable network entity for mitigating the traffic storm. The controllable network entity may include a controlled switch, gateway, or addressable data plane entity configured to reroute traffic according to the SDN commands.
While the methods, systems, and computer readable media have been described herein in reference to specific embodiments, features, and illustrative embodiments, it will be appreciated that the utility of the subject matter is not thus limited, but rather extends to and encompasses numerous other variations, modifications and alternative embodiments, as will suggest themselves to those of ordinary skill in the field of the present subject matter, based on the disclosure herein.
Various combinations and sub-combinations of the structures and features described herein are contemplated and will be apparent to a skilled person having knowledge of this disclosure. Any of the various features and elements as disclosed herein may be combined with one or more other disclosed features and elements unless indicated to the contrary herein. Correspondingly, the subject matter as hereinafter claimed is intended to be broadly construed and interpreted, as including all such variations, modifications and alternative embodiments, within its scope and including equivalents of the claims. It is understood that various details of the presently disclosed subject matter may be changed without departing from the scope of the presently disclosed subject matter. Furthermore, the foregoing description is for the purpose of illustration only, and not for the purpose of limitation.
Number | Name | Date | Kind |
---|---|---|---|
7522517 | Johnson | Apr 2009 | B1 |
8468267 | Yigang et al. | Jun 2013 | B2 |
8601073 | Craig et al. | Dec 2013 | B2 |
8665717 | Kotecha et al. | Mar 2014 | B2 |
8879431 | Ridel et al. | Nov 2014 | B2 |
9106769 | Kanode et al. | Aug 2015 | B2 |
9240949 | McMurry et al. | Jan 2016 | B2 |
20030200277 | Kim | Oct 2003 | A1 |
20050105464 | Acharya et al. | May 2005 | A1 |
20060069776 | Shim et al. | Mar 2006 | A1 |
20060090004 | Nikolayev et al. | Apr 2006 | A1 |
20060268835 | Hyotylainen et al. | Nov 2006 | A1 |
20070083927 | Swaroop | Apr 2007 | A1 |
20070121596 | Kurapati et al. | May 2007 | A1 |
20070153995 | Fang et al. | Jul 2007 | A1 |
20080031258 | Acharya et al. | Feb 2008 | A1 |
20080170497 | Jeong et al. | Jul 2008 | A1 |
20080198747 | Young et al. | Aug 2008 | A1 |
20080250156 | Agarwal et al. | Oct 2008 | A1 |
20080253387 | Liang et al. | Oct 2008 | A1 |
20090092131 | Hu et al. | Apr 2009 | A1 |
20090185494 | Li et al. | Jul 2009 | A1 |
20090232011 | Li et al. | Sep 2009 | A1 |
20100030914 | Sparks et al. | Feb 2010 | A1 |
20100071035 | Budko et al. | Mar 2010 | A1 |
20100103861 | Ulupinar et al. | Apr 2010 | A1 |
20100125477 | Mousseau et al. | May 2010 | A1 |
20100211956 | Gopisetty et al. | Aug 2010 | A1 |
20100217850 | Ferris | Aug 2010 | A1 |
20100299451 | Yigang et al. | Nov 2010 | A1 |
20110016467 | Kane | Jan 2011 | A1 |
20110040845 | Cai et al. | Feb 2011 | A1 |
20110061061 | Chen et al. | Mar 2011 | A1 |
20110090900 | Jackson et al. | Apr 2011 | A1 |
20110116382 | McCann et al. | May 2011 | A1 |
20110171958 | Hua et al. | Jul 2011 | A1 |
20110200053 | Kanode et al. | Aug 2011 | A1 |
20110202676 | Craig et al. | Aug 2011 | A1 |
20110299395 | Mariblanca Nieves | Dec 2011 | A1 |
20120044867 | Faccin et al. | Feb 2012 | A1 |
20120087368 | Kunarathnam et al. | Apr 2012 | A1 |
20120123870 | Denman et al. | May 2012 | A1 |
20120131165 | Baniel et al. | May 2012 | A1 |
20120140665 | Li et al. | Jun 2012 | A1 |
20120155389 | McNamee et al. | Jun 2012 | A1 |
20120203781 | Wakefield | Aug 2012 | A1 |
20120221445 | Sharma | Aug 2012 | A1 |
20120221693 | Cutler et al. | Aug 2012 | A1 |
20120300615 | Kempf et al. | Nov 2012 | A1 |
20120303796 | Mo et al. | Nov 2012 | A1 |
20120303835 | Kempf et al. | Nov 2012 | A1 |
20120307631 | Yang et al. | Dec 2012 | A1 |
20130019277 | Chang et al. | Jan 2013 | A1 |
20130039176 | Kanode et al. | Feb 2013 | A1 |
20130044645 | Castro Castro et al. | Feb 2013 | A1 |
20130086279 | Archer et al. | Apr 2013 | A1 |
20130124712 | Parker | May 2013 | A1 |
20130163429 | Dunstan et al. | Jun 2013 | A1 |
20130188489 | Sato | Jul 2013 | A1 |
20130223219 | Mir | Aug 2013 | A1 |
20130250770 | Zou et al. | Sep 2013 | A1 |
20130263208 | Challa | Oct 2013 | A1 |
20130275583 | Roach et al. | Oct 2013 | A1 |
20140026231 | Barak et al. | Jan 2014 | A1 |
20140059678 | Parker | Feb 2014 | A1 |
20140189137 | Castro Castro et al. | Jul 2014 | A1 |
20140192646 | Mir et al. | Jul 2014 | A1 |
20140204796 | Bantukul | Jul 2014 | A1 |
20140310388 | Djukic et al. | Oct 2014 | A1 |
20140376380 | Campbell et al. | Dec 2014 | A1 |
20150036486 | McMurry et al. | Feb 2015 | A1 |
20150036504 | McMurry et al. | Feb 2015 | A1 |
20150085663 | McMurry et al. | Mar 2015 | A1 |
20150142940 | McMurry et al. | May 2015 | A1 |
20150149656 | McMurry et al. | May 2015 | A1 |
20150215228 | McMurry | Jul 2015 | A1 |
Number | Date | Country |
---|---|---|
2006-100873 | Apr 2006 | JP |
10-2009-0029348 | Mar 2009 | KR |
WO 2009070179 | Jun 2009 | WO |
WO 2009129487 | Oct 2009 | WO |
WO 2011161575 | Dec 2011 | WO |
WO 2012063106 | May 2012 | WO |
WO 2012100092 | Jul 2012 | WO |
WO 2012119147 | Sep 2012 | WO |
WO 2012130264 | Oct 2012 | WO |
WO 2012149954 | Nov 2012 | WO |
WO 2013155535 | Oct 2013 | WO |
WO 2015041750 | Mar 2015 | WO |
WO 2015077377 | May 2015 | WO |
WO 2015080906 | Jun 2015 | WO |
WO 2015116449 | Aug 2015 | WO |
Entry |
---|
Communication of European publication number and information on the application of Article 67(3) EPC for European Application No. 13776083.1 (Jan. 21, 2015). |
Commonly-assigned, co-pending International Application No. PCT/US15/12250 for “Methods, Systems, and Computer Readable Media for a Cloud-Based Virtualization Orchestrator,” (Unpublished, filed Jan. 21, 2015). |
Commonly-assigned, co-pending International Application No. PCT/US14/66469 for “Methods, Systems, and Computer Readable Media for a Network Function Virtualization Information Concentrator,” (Unpublished, filed Nov. 19, 2014). |
Commonly-assigned, co-pending International Application No. PCT/US14/66240 for “Methods, Systems, and Computer Readable Media for Diameter Routing Using Software Devine Network (SDN) Functionality,” (Unpublished, filed Nov. 18, 2014). |
Notification of Transmittal of the International Search Report and the Written Opinion for of the International Searching Authority, or the Declaration for International Application No. PCT/US2014/048651 (Nov. 17, 2014). |
Notification of Transmittal of the International Search Report and the Written Opinion of the International Searching Authority, or the Declaration for International Application No. PCT/US2014/048644 (Oct. 17, 2014). |
Non-Final Office Action for U.S. Appl. No. 13/749,655 (Sep. 3, 2014). |
Commonly-assigned, co-pending International Application No. PCT/US14/48651 for “Methods, Systems, and Computer Readable Media for Diameter Load and Overload Information and Virtualization,” (Unpublished, filed Jul. 29, 2014). |
Notification of Transmittal of the International Search Report and the Written Opinion of the International Searching Authority, or the Declaration for International Application No. PCT/US2014/011551 (Apr. 28, 2014). |
Commonly-assigned, co-pending U.S. Appl. No. 14/166,790 for “Methods, Systems, and Computer Readable Media for a Cloud-Based Virtualization Orchestrator,” (Unpublished, filed Jan. 28, 2014). |
Commonly-assigned, co-pending International Application No. PCT/US14/11551 for “Methods, Systems, and Computer Readable Media for Using Policy Knowledge of or Obtained by a Policy and Charging Rules Function (PCRF) for Needs Based Forwarding of Bearer Session Traffic to Network Nodes,” (Unpublished, filed January. |
Commonly-assigned, co-pending U.S. Appl. No. 14/086,950 for “Methods, Systems, and Computer Readable Media for a Network Function Virtualization Information Concentrator,” (Unpublished, filed Nov. 21, 2013). |
Commonly-assigned, co-pending U.S. Appl. No. 14/034,478 for “Methods, Systems, and Computer Readable Media for Diameter Load and Overload Information and Virtualization,” (Unpublished, filed Sep. 23, 2013). |
Tschofenig, “Diameter Overload Architecture and Information Model,” draft-tschofenig-dime-overload-arch-00.txt, DIME, pp. 1-9 (Jul. 16, 2013). |
Notification of Transmittal of the International Search Report and the Written Opinion of the International Searching Authority, or the Declaration for International Application No. PCT/US2013/036664 (Jul. 2, 2013). |
Campbell, “Diameter Overload Control Solution Issues,” draft-campbell-dime-overload-issues-00, pp. 1-16 (Jun. 2013). |
“3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Study on Diameter overload control mechanisms (Release 12),” 3GPP TR 29.809 V0.3.0, pp. 1-51 (Jun. 2013). |
Roach et al., “A Mechanism for Diameter Overload Control,” draft-roach-dime-overload-ctrl-03, DIME, pp. 1-49 (May 17, 2013). |
Korhonen et al., “The Diameter Overload Control Application (DOCA),” draft-korhonen-dime-ovl-01.txt, Diameter Maintenance and Extensions (DIME), pp. 1-18 (Feb. 25, 2013). |
Fajardo et al., “Diameter Base Protocol,” RFC 6733, pp. 1-152 (Oct. 2012). |
McMurry et al., “Diameter Overload Control Requirements,” draft-ietf-dime-overload-reqs-00, pp. 1-25 (Sep. 21, 2012). |
“OpenFlow Switch Specification,” https://www.opennetworking.org/images/stories/downloads/sdn-resources/onf-specifications/openflow/openflow-spec-v1.2.pdf, Version 1.2 (Wire Protocol 0x03), Open Networking Foundation, pp. 1-85 (Dec. 5, 2011). |
Interview Summary for U.S. Appl. No. 12/425,998 (Sep. 14, 2011). |
Final Office Action for U.S. Appl. No. 12/425,998 (Jun. 8, 2011). |
Interview Summary for U.S. Appl. No. 12/425,998 (Mar. 1, 2011). |
“OpenFlow Switch Specification,” Version 1.1.0 Implemented (Wire Protocol 0×02), www.openflow.org, pp. 1-56 (Feb. 28, 2011). |
Non-Final Office Action for U.S. Appl. No. 12/425,998 (Nov. 29, 2010). |
Notification of Transmittal of the International Search Report and the Written Opinion of the International Searching Authority, or the Declaration for International Application No. PCT/US2009/041006 (Dec. 4, 2009). |
“Introduction to Evolved Packet Core,” White Paper, Alcatel-Lucent, 11 pgs. (2009). |
Hilt, et al., “Session Initiation Protocol (SIP) Overload Control,” IETF, draft-hilt-sipping-overload-02, p. 1-28 (Jul. 8, 2007). |
Zhang, et al., “Denial of Service Attack Prevention on SIP VoIP Infrastructures Using DNS Flooding,” in Principles, Systems, and Applications of IP Telecummunications (IPTCOMM) (Jul. 2007). |
Nahum, et al., “Evaluating SIP Server Performance,”IBM T.J. Watson Research Center, RC24183 (Feb. 2007). |
Rosenberg, J., “Requirements for Management of OVerload in the Session Initiation Protocol,” IETF, draft-rosenbergy-sipping-overload-reqs-02, p. 1-22 (Oct. 2006). |
Kuthan, et al., “Denial of Service Attacks Targeting a SIP VoIP Infrastructure: Attack Scenarios and Prevention mechanims,” IEEE Networks Magazine, vol. 20, No. 5 (Sep. 2006). |
Ohta, M., “Overload Protection in a SIP Signaling Network,” in International conference on Internet Surveillance and Protection (ICISP), p. 1-6 (2006). |
Donovan, et al., “Session Timers in the Session Initiation Protocol (SIP),” Network Working Group, RFC 4028 (Apr. 2005). |
Ohta, M., “Simulation Study of SIP Signaling in an Overload Condition,” International Conference for Communications, Internet, and Information Technology, IASTED/ACTA Press, pp. 321-326 (Nov. 22-24, 2004). |
Calhoun et al., “Diameter Base Protocol,” RFC 3588, pp. 1-147 (Sep. 2003). |
Rosenberg, et al., “SIP: Session Initiation Protocol,” Network Working Group, RFC 3261, http://www.ietf.org/rfc/rfc3261.txt, p. 1-252 (Jun. 2002). |
Schulzrinne, et al., “SIPstone—Benchmarking SIP Server Performance,” (Apr. 2002). |
“Signaling Flows for the IP Multimedia Call control Based on Session Initiation Protocol (SIP) and Session Description Protocol (SDP),” 3GPP TS 24.228 V1.1.0, p. 1-653 (Jul. 3-6, 2001). |
Grossglauser, et al., “On the Relevance of Long-Range Dependence in Network Traffic,” IEEE/ACM Transactions on Networking, vol. 7, No. 5, p. 629-640 (Oct. 1999). |
Notification of Transmittal of the International Search Report and the Written Opinion of the International Searching Authority, or the Declaration for the International Application No. PCT/US2014/066240 (May 13, 2015). |
Non-Final Office Action for U.S. Appl. No. 13/956,307 (Apr. 23, 2015). |
Notice of Allowance and Fee(s) Due and Examiner-Initiated Interview Summary for U.S. Appl. No. 13/572,156 (Apr. 6, 2015). |
Non-Final Office Action for U.S. Appl. No. 13/956,300 (Apr. 8, 2015). |
Final Office Action for U.S. Appl. No. 13/749,655 (Apr. 3, 2015). |
Notification of Transmittal of the International Search Report and the Written Opinion of the International Searching Authority, or the Declaration for PCT International Application No. PCT/US2015/012250 (Mar. 31, 2015). |
Non-Final Office Action for U.S. Appl. No. 13/863,351 (Mar. 27, 2015). |
Non-Final Office Action for U.S. Appl. No. 14/034,478 (Mar. 23, 2015). |
Notification of Transmittal of the International Search Report and the Written Opinion of the International Searching Authority, or the Declaration for International Application No. PCT/US2014/066469 (Feb. 20, 2015). |
Final Office Action for U.S. Appl. No. 13/572,156 (Dec. 29, 2014). |
Non-Final Office Action for U.S. Appl. No. 13/572,156 (May 23, 2014). |
“Network Function Virtualization (NFV) Management and Orchestration,” ETSI, Group Specification, GS NFV-MAN 001 V0.0.11, pp. 1-74 (Oct. 18, 2013). |
“Split Architecture for Large Scale Wide Area Networks,” SPARC ICT-258457 Deliverable D3.3, pp. 1-129 (Dec. 1, 2011). |
3GPP, “Digital Cellular Telecommunications System (Phase 2+); Universal Mobile Telecommunications System (UMTS); Universal Subscriber Identity Module (USIM) Application Toolkit (USAT) (3GPP TS 31.111 version 8.3.0. Release 8),” ETSI TS 131 111 V8.3.0, pp. Jan. 1-102 (Oct. 2008). |
Extended European Search Report for European Application No. 13804779.0 (Jan. 19, 2016). |
Advisory Action Before the Filing of an Appeal Brief and AFCP 2.0 Decision for U.S. Appl. No. 13/917,200 (Jan. 14, 2016). |
Applicant-Initiated Interview Summary for U.S. Appl. No. 14/092,898 (Jan. 14, 2016). |
Non-Final Office Action for U.S. Appl. No. 14/313,610 (Jan. 11, 2016). |
Non-Final Office Action for U.S. Appl. No. 13/749,655 (Dec. 31, 2015). |
Applicant-Initiated Interview Summary for U.S. Appl. No. 14/182,864 (Dec. 16, 2015). |
Extended European Search Report for European Application No. 13776083.1 (Dec. 14, 2015). |
Non-Final Office Action for U.S. Appl. No. 14/086,950 (Dec. 4, 2015). |
Supplemental Notice of Allowability for U.S. Appl. No. 13/956,300 (Dec. 1, 2015). |
Advisory Action for U.S. Appl. No. 13/863,351 (Nov. 25, 2015). |
Advisory Action for U.S. Appl. No. 14/034,478 (Nov. 17, 2015). |
Final Office Action for U.S. Appl. No. 13/956,307 (Nov. 5, 2015). |
Communication of European Publication Number and Information on the Application of Article 67(3) EPC for European Patent Application No. 14703974.7 (Nov. 4, 2015). |
Notice of Allowance and Fee(s) Due & Examiner-Initiated Interview Summary for U.S. Appl. No. 13/956,300 (Oct. 23, 2015). |
Non-Final Office Action for U.S. Appl. No. 14/092,898 (Oct. 8, 2015). |
Final Office Action for U.S. Appl. No. 13/863,351 (Sep. 11, 2015). |
Final Office Action for U.S. Appl. No. 14/034,478 (Sep. 8, 2015). |
Advisory Action Before the Filing of an Appeal Brief, Examiner-Initiated Interview Summary and AFCP 2.0 Decision for U.S. Appl. No. 13/749,655 (Jul. 24, 2015). |
Applicant-Initiated Interview Summary for U.S. Appl. No. 13/956,300 (Jun. 29, 2015). |
Commonly-assigned, co-pending U.S. Appl. No. 14/720,412 for “Methods, Systems, and Computer Readable Media for Short and Long Term Policy and Charging Rules Function (PCRF) Load Balancing,” (Unpublished, filed May 22, 2015). |
Commonly-assigned, co-pending U.S. Appl. No. 14/692,710 for “Methods, Systems, and Computer Readable Media for Multi-Layer Orchestration in Software Defined Networks (SDNs),” (Unpublished, filed Apr. 21, 2015). |
“Multi-Protocol Routing Agent User Guide,” Policy Management, 910-6648-001 Revision A, pp. 1-70 (Mar. 2013). |
Kempf et al., “Moving the Mobile Evolved Packet Core to the Cloud,” 2012 Fifth International Workshop on Selected Topics in Mobile and Wireless Computing, pp. 1-8 (Oct. 8, 2012). |
“Multi-Protocol Routing Agent User Guide,” Policy Management, 910-6404-001 Revision A, pp. 1-70 (Jun. 2012). |
Li Erran et al., “CellSDN: Software-Defined Cellular Networks,” ftp://ftp.cs.princeton.edu/techeports/2012/922.pdf, pp. 1-6 (Apr. 20, 2012). |
Number | Date | Country | |
---|---|---|---|
20150036505 A1 | Feb 2015 | US |