This disclosure relates in general to the field of communications and, more particularly, to inspecting domain name system flows in a network environment.
Networking architectures have grown increasingly complex in communication environments. As the subscriber base of end users increases and/or becomes mobile, proper routing and efficient management of communication sessions and data flows becomes critical. Typically, subscribers seek to access content from various locations in the network. Subscribers may be provided connectivity or services based on some type of policy or agreement that involves a service provider. The service provider relationship commonly dictates the terms under which subscribers operate in the network. The ability to properly manage policies and to effectively route traffic for the subscriber presents a significant challenge to system designers, component manufacturers, network operators, and system administrators.
To provide a more complete understanding of the present disclosure and features and advantages thereof, reference is made to the following description, taken in conjunction with the accompanying figures, wherein like reference numerals represent like parts, in which:
Overview
A method is provided in one example and includes receiving a first packet associated with a domain name system (DNS) exchange between a subscriber and a DNS server. A correlation is maintained between a domain name and an Internet protocol (IP) address included in a DNS response. A subsequent packet associated with a subsequent flow is received and the IP address is identified within the subsequent packet. The method further includes executing a policy decision for the subsequent flow based on the correlation between the IP address and the domain name. In more specific embodiments, the correlation is stored in a table that includes a time to live (TTL) parameter associated with the IP address. The IP address within the subsequent packet is mapped to the domain name in order to apply the policy decision for the subsequent flow. The policy decision can include executing a routing decision associated with the subsequent flow. In still other embodiments, the policy decision is based on an identity of the subscriber and/or the IP address associated with a particular server. The policy decision can also include executing billing associated with the subscriber, rate limiting, and other policy, charging, and/or control functions.
Turning to
Communication system 10 may include a configuration capable of transmission control protocol/internet protocol (TCP/IP) communications for the transmission and/or reception of packets in a network. Communication system 10 may also operate in conjunction with a user datagram protocol/IP (UDP/IP) or any other suitable protocol where appropriate and based on particular needs. Communication system 10 may be generally configured or arranged to represent a 2G, a 2.5G, or a 3 G communication architecture applicable to a Global System for Mobile (GSM) environment in accordance with a particular embodiment of the present disclosure. Communication system 10 may also be configured to operate with any version of any suitable GPRS tunneling protocol.
For purposes of illustrating certain example techniques of communication system 10, it is important to understand the communications that may be traversing the network at a given time interval. The following foundational information may be viewed as a basis from which the present disclosure may be properly explained. Service providers maintain substantial networking infrastructure through which mobile data traverses. Examples of such infrastructure can include image compression, content optimization, wireless application protocol (WAP) gateways, content filtering, etc. Architectures typically route traffic inefficiently to all available service nodes. Certain network appliances perform DNS inspection for billing, or for data mining purposes, but these techniques fail to offer an intelligent awareness for particular flows propagating through a given network element.
Communication system 10 can resolve these issues (and others) by employing a network element (e.g., service gateway 14) that includes awareness intelligence. In one example implementation, service gateway 14 can leverage its awareness of the content of DNS flows to utilize mappings that correlate IP addresses to matching hostnames (e.g., on a global basis, on a group basis, on a per-subscriber basis, etc.). This knowledge can be used to perform policy routing (e.g., at L7) on subsequent flows. This can be executed globally, or per-subscriber, as the network element receives the first packet of the subsequent flow (in contrast to executing a policy decision after packets of the subsequent flow have already passed through the network element). Additionally, the intelligence within service gateway 14 can independently allow for billing of such flows based on the collected information. This could occur regardless of whether policy-based routing occurred for the particular flows.
In operation of an example flow, service gateway 14 is configured to monitor DNS exchanges (where a DNS exchange can include a DNS query and a corresponding DNS response). While monitoring the DNS exchanges, service gateway 14 is configured to extract hostname information to be compared against the policies and the records for the IP addresses in the responses. In one instance, service gateway 14 is configured to record the routing domain in which the DNS query took place. Using the extracted data, service gateway 14 is configured to construct records of IP addresses and the policies that were matched. Using these records, service gateway 14 surveys and examines flows that have a recorded IP address as an endpoint. When a session starts that includes such an endpoint, service gateway 14 can use the maintained records (i.e., the correlations) to make a routing decision (e.g., a “next-hop” routing decision) for the session being initiated. This decision can be the result of matches for all (or any subset of) the subscriber specific policies, the global policies, etc. These policies may be associated with a hostname policy that was recorded, the L4 coordinates of the new session, the identity of the subscriber, the state of the subscriber record, etc. In one general sense, a DNS flow is effectively established by the time service gateway 14 evaluates a packet to identify the IP address for mapping activities. The packet can be associated with one of many possible additional flows, which the client initiates in order to obtain content (i.e., not simply an IP address mapping). In one instance, there can be one DNS flow followed by one or more flows to the address that was the subject of the DNS query. For each such subsequent flow, service gateway 14 can perform the receiving, identifying, and executing sequence, as detailed herein.
As a result of some of these activities, a new session for a given subscriber's traffic (which is passing through service gateway 14) can be routed and/or billed based on layer 7 information, which would not normally be available in the routed flow, or not available until after it was too late to make an L7 routing decision. Normally, routes for a session can be chosen at any time during the session. For the types of network deployments where service gateway 14 would operate, this becomes impractical because one route might encounter a full L4 proxy for TCP streams, while another route might access the origin server directly. Other cases where it would be unacceptable to reroute a flow midstream could involve service nodes, where flow-specific states are maintained even without proxying the TCP session.
Note that billing decisions based on the destination domain normally depend on the ability of a billing network element to be able to parse the protocol being billed to a level in which the data in the protocol (e.g., a host header in HTTP) becomes visible. For many protocols, this data is not visible because the addressed endpoint intuitively understands its own domain, or alternatively because the billing element cannot parse the protocol. Other L7 routing solutions experience challenges because the flow to be routed does not contain useful information at L7. This information can be used by the network element (e.g., service gateway 14) to make a routing decision. Other challenges lie in the deployment environment in which it becomes difficult to change the routing for a session once sufficient L7 information has been accumulated. It can be impractical because upstream nodes often manipulate the flows in unrecoverable ways (e.g., via proxy operations). These same upstream nodes are also typically configured to maintain state information about the flows in such a way that rerouting the flow can disrupt a service for subscriber 12.
Communication system 10 can be provided in the context of a billing solution: allowing flows that could not be parsed to be billed based on the destination domain. In many cases, this cannot be achieved simply with access control lists (ACLs) because origin hosts are often deployed across a constantly changing (dynamic) set of IP addresses. This constant change is a result of resources becoming available, or expiring, which can be part of a form of crude regional load balancing accomplished via DNS. In one general sense, rather than using a literal ACL to make a policy decision, service gateway 14 can use a data element, which matches traffic based on an IP address associated with a domain name via DNS parsing. This saves an operator from having to update ACLs for web sites, where the set of IP addresses being used changes over time, or is unknown a priori.
Typically, content providers constantly add servers and occasionally decommission servers as they upgrade their services. In many of these environments, DNS load balancing is employed, which further complicates the issue. Thus, static provisioning of IP addresses for these sites is operationally expensive, and difficult to execute in practice. Communication system 10 can overcome these difficulties in providing an inexpensive and efficient (e.g., operationally and computationally) mechanism to differentiate between traffic flows to one domain versus flows intended for another domain. Communication system 10 can also allow service gateway 14 to bill multiple flows without incurring the overhead of excessive parsing activities because the data segment to be used for billing purposes could be as simple as the destination domain name. Such an optimization could increase network performance by reducing the parsing load. Before turning to some of these potential operations, a brief discussion is provided about the infrastructure of
Subscriber 12 can be associated with clients, customers, or end users wishing to initiate a communication in communication system 10 via some network. The term ‘subscriber’ is inclusive of devices used to initiate a communication, such as a computer, a personal digital assistant (PDA), a laptop or electronic notebook, a cellular telephone, an iPhone, an IP phone, or any other device, component, element, or object capable of initiating voice, audio, video, media, or data exchanges within communication system 10. Subscriber 12 may also be inclusive of a suitable interface to the human user, such as a microphone, a display, or a keyboard or other terminal equipment. Subscriber 12 may also be any device that seeks to initiate a communication on behalf of another entity or element, such as a program, a database, or any other component, device, element, or object capable of initiating an exchange within communication system 10. Data, as used herein in this document, refers to any type of numeric, voice, video, media, or script data, or any type of source or object code, or any other suitable information in any appropriate format that may be communicated from one point to another.
Service gateway 14 and PCRF element 40 are network elements that facilitate service flows between endpoints and a given network (e.g., for networks such as those illustrated in
In one implementation, service gateway 14 includes software to achieve (or to foster) the inspection and mapping operations, as outlined herein in this document. Note that in one example, these network elements can have an internal structure (e.g., with a processor, a memory element, etc.) to facilitate some of the operations described herein. In other embodiments, all of these inspection and mapping features may be provided externally to these elements or included in some other network device to achieve this intended functionality. Alternatively, service gateway 14 includes this software (or reciprocating software) that can coordinate with other elements in order to achieve the operations, as outlined herein. In still other embodiments, one or both of these devices may include any suitable algorithms, hardware, software, components, modules, interfaces, or objects that facilitate the operations thereof.
In one example implementation, service gateway 14 can interface with multiple serving general packet radio service (GPRS) support nodes (SGSNs) and multiple gateway GPRS support nodes (GGSNs) to serve a plurality of subscribers 12. In certain networks, service gateway 14 can act as a PCEF, either as part of an enhanced GGSN (eGGSN) node, where service gateway 14 and a GGSN are provided as separate cards in a given network element. Alternatively, service gateway 14 can be configured to operate as a standalone node, with interoperability from external GGSNs. Service gateway 14 and a given GGSN can communicate with each other using a remote authentication dial in user service (RADIUS) protocol, or any other suitable protocol where appropriate. Other protocols to be used in such communications can include Diameter, service gateway interface (SGI), terminal access controller access-control system (TACACS), TACACS+, etc.
Service gateway 14 can support a GPRS tunneling protocol (GTP), any packet data protocol (PDP) authentication, authorization, and accounting (AAA) operations, QoS, RAN signaling, etc. GPRS may support multiple internet communication protocols and may enable existing IP, point-to-point protocol (PPP), or any other suitable applications or platforms to operate over a given network. Service gateway 14 can offer billing, charging, profile management, QoS management, etc. with per-user L7 rules and per-user service policies. The user profile can define the actions that service gateway 14 can take for one or more subscribers 12. In addition, the user profile can define the mobile policy control and charging (MPCC) profile to be used by service gateway 14 when sending per-user credit control requests (CCRs) to PCRF element 40.
RAN 16 is a communication interface between subscriber 12 and IP network 20. RAN 16 may comprise a base transceiver station and a base station controller in one embodiment. The communication interface provided by RAN 16 may allow data to be exchanged between subscriber 12 and any number of selected elements within communication system 10. RAN 16 may facilitate the delivery of a request packet generated by subscriber 12 and the reception of information sought by subscriber 12. RAN 16 is only one example of a communication interface between subscriber 12 and service gateway 14. Other suitable types of communication interfaces may be used for any appropriate network design and these may be based on specific communication architectures.
IP network 20 represents a series of points or nodes of interconnected communication paths for receiving and transmitting packets of information that propagate through communication system 10. IP network 20 offers a communicative interface between subscriber 12 and service gateway 14, and may be any local area network (LAN), Intranet, extranet, wireless local area network (WLAN), metropolitan area network (MAN), wide area network (WAN), virtual private network (VPN), or any other appropriate architecture or system that facilitates communications in a network environment. IP network 20 may implement a UDP/IP connection and use a TCP/IP communication protocol in particular embodiments of the present disclosure. However, IP network 20 may alternatively implement any other suitable communication protocol for transmitting and receiving data packets within communication system 10. Internet 22 offers a communicative interface between servers 60 and ISNs 50. Internet 22 may foster any communications involving services, content, video, voice, or data more generally, as it is exchanged between subscriber 12 and various network elements.
PCRF element 40 can be configured to act as a Diameter server and perform the following functions: 1) provision mobile policy control and charging (MPCC) rules to (and remove MPCC rules from) PCEF module 56; 2) manage policy control decisions; 3) provide network control regarding the service data flow detection, QoS, and flow-based charging towards PCEF module 56; 4) receive session and media-related information from application functions (AFs); and 5) inform the AFs of traffic plane events.
PCEF module 56 can act as a Diameter client and perform the following functions: 1) use a suitable interface to send traffic plane events to PCRF element 40; 2) enforce policy, handle flow-based charging, control QoS and the handling of user plane traffic; 3) provide service data flow detection, accounting for online and offline charging interactions; and 4) report changes in the status of service data flows. The PCC rules can be used to: 1) detect a packet that belongs to a service data flow; 2) identify the service to which the service data flow contributes; and 3) provide applicable charging parameters and policy control for a service data flow. PCC rules can be dynamically provisioned by PCRF element 40 to PCEF module 56 over a suitable interface. Dynamic PCC rules can be dynamically generated in PCRF element 40. Dynamic PCC rules can be activated, modified, and deactivated at any time.
Loggen element 24 is a storage element operable to build billing records and communicate the billing records to a billing system based on information provided by KUT 26. Loggen element 24 may also operate to store data for later use and execute all formatting for billing records to be communicated to a billing system. Loggen element 24 may be implemented using hardware, software, or any other suitable element or object operable to store information and to generate a billing record to be communicated to a billing system. Loggen element 24 may generate logging records or billing records and additionally send messages to a billing system element associated with a change in SGSN.
KUT 26 is a data storage element that manages one or more correlations between the ID of subscriber 12 and a corresponding IP address. KUT 26 could be simply part of any memory element within service gateway 14. KUT 26 may also store information relating to billing, previously designated for subscriber 12, and the billing system may be invoked when additional information associated with subscriber 12 is communicated to service gateway 14. KUT 26 may be consulted as additional billing records are created in order to determine that a billing system should receive selected billing records. KUT 26 may also include an application program interface (API) that may be implemented in order to obtain user ID information for an IP address from a data flow.
KUT 26 is provided with the capability of mapping the source IP address (or any other subscriber 12 parameter) to a user ID. The user ID may be obtained from an external database, where appropriate, or any other suitable location. Alternatively, the user ID may be extracted from a RADIUS flow, a TACACS communication flow, a Diameter communication flow, or any other suitable communication protocol flow, communication session, or data exchange. The database may be populated at any suitable time and updated using any suitable mechanism, such as via the sniffing of RADIUS or TACACS flows.
In one example implementation, each traffic processor 36 keeps a copy of the DNS elements that have passed through it. In one instance, within the same particular network blade, different traffic processors can maintain different DNS entry correlations. For example, one traffic processor may include various DNS entries for Google.com, whereas another traffic processor may include various DNS entries for Yahoo.com. The particular rules for making policy decisions for particular subscribers, IP addresses, etc. may be somewhat distributed. In one example implementation, there is a local cache of rules on one or more of traffic processors 36. Any of this information can be stored in one or more tables that can be included in memory element 34, or stored along with traffic processors 36, control processor 38, KUT 26, etc. This stored information can include mappings between subscriber identities, IP addresses, policies, etc., where this information can be correlated and cross-referenced for purposes of applying particular rules within a policy. Note that the mapping information can be dynamic, which can offer valuable savings for an Internet service provider (ISP). In addition, such dynamic information can be used for load balancing purposes, or it can minimize significant overhead typically experienced in many of these subscriber scenarios.
Inline service nodes (ISNs) 50 represent different types of network devices (e.g., routers, switches, gateways, etc.) that can offer various services and capabilities for subscriber 12. Thus, particular ISNs can offer different services for incoming flows. For example, one ISN may be associated with video compression such that any flow associated with this particular technology or protocol would be routed to that ISN. Another ISN may be tasked with content filtering operations, while still another ISN may be associated with voice data associated with a VPN connection. Thus, in changing the path for a particular communication flow, the packets can be processed or implicated differently depending on which ISN is processing the particular flow. In one example, there is a default route associated with particular web servers, and this particular default could be the shortest path between two network points. In another example, DNS awareness module 48 can inform particular routing decisions such that particular flows are directed to specific paths that can accommodate specific subscriber needs. In one example, ISNs 50 may not be simple routers in a more traditional sense. ISNs 50 could be more complex service nodes operating on network flows at much higher levels, rather than providing simple routing and forwarding operations. For example, these nodes may implement specialized inline services such as image and video optimization, wireless TCP optimizations, protocol transformations (WAP/HTTP), content filtering controls, etc.
Servers 60 can be a web server offering content or services to any subscriber or any group of subscribers. For example, servers 60 could be any network element associated with www.ESPN.com or www.yahoo.com: both of which could offer content for their end users. Alternatively, servers 60 can be any destination, location, or node that is sought to be accessed or used by subscriber 12. Servers 60 may provide the requested service/content, or provide a portal, pathway, or gateway to another location that includes the desired data. In other embodiments, servers 60 could simply be a data storage location or a processor that can store or deliver content or services to one or more subscribers 12.
In operation of an example flow, a service provider may seek to make decisions about traffic flows without having to inspect the contents of each individual traffic flow at layer 7. Those decisions may depend on the direction of the traffic flows (e.g., the destination domain, a particular web server, etc.). The challenge in executing this decision is that a numeric address (i.e., the IP address) is universally used to make routing decisions. The IP addresses that are used in this example are constantly changing. In certain cases, these changes may occur daily, where different and new IP addresses are systematically assigned. This creates a difficult dilemma for network operators that seek to route flows in a certain way for particular servers. In essence, the identification of those servers (i.e., their IP addresses) is arbitrary and unpredictable.
These issues may be resolved by service gateway 14 monitoring DNS requests and maintaining a cache record of the acceptable IP addresses that were assigned to a domain name. This monitoring and maintaining activity initially occurred as the user's particular flow propagated through a given network element (e.g., service gateway 14). The cache of acceptable IP addresses can be looked up in an appropriate table to map the numerical representation to a given entity. For example, by evaluating an acceptable IP address in a cache record, the service provider can identify an appropriate IP address associated with www.google.com.
In one example implementation, the extracted data includes any one of the following items: 1) domain name; 2) a set of IP addresses; and 3) a time to live value for those IP addresses from the DNS flow. Service gateway 14 may be configured to retain all of this information in the form of a lookup table (e.g., keyed by IP address). Note that as used herein in this Specification, the term “correlation” is meant to connote any relationship or association between two or more data segments. This could involve a subscriber's identity, a domain name, an IP address, a policy associated with a subscriber, a QoS metric, etc. In addition, the term “maintain” is meant to connote any type of acknowledgment, caching, examination, evaluation, survey, recording, storage, accumulation, cataloging, or identification by service gateway 14 of a particular data segment propagating in the network. This maintaining activity can be temporary, provided over a limited time (e.g., some fixed time interval, cached, etc.), or more permanent, where suitable updating activities could systematically occur.
In one example operation, an operator provisions sets of domain names into domain groups. Policies can specify rules for routing, charging, and control based on the domain group, which can match to a new flow. This matching can also be affected by an intelligent association relating to user attributes such as a type of the endpoint, subscriber account characteristics, etc. Note that service gateway 14 has the intelligence to also use endpoint information as an input to policy selection, for example, along with domain group information. In one example, service gateway 14 can learn and/or use endpoint characteristics and other information yielded from various policy engines, from RADIUS flows, etc. to make intelligent policy decisions.
The service provider can make any number of decisions based on this identification of acceptable IP addresses for a particular web server. For example, the service provider may provide some benefit to the particular subscriber associated with this flow based on a partnership between service provider and the destination web server entity. In another example, a service provider could limit the amount of traffic to a particular web server due to congestion concerns in the network. In still other examples, the service provider could manage charging for this particular subscriber based on some preexisting policy that implicates the particular web server (or hostname) being accessed. In still other examples, quality of service management functions could be provided based on an identified IP address.
Note that such decisions could theoretically be made by opening individual flows and, further, making some type of logical connection between the contents of the flow and its particular destination. However, this intensive parsing creates additional processing overhead, as each individual flow is inspected thoroughly before rendering certain policy decisions. Moreover, such inspection activities can disrupt the flows, or cause flows to become disconnected based on the intrusion. In contrast to these operations, embodiments of communication system 10 can simply identify an appropriate entity (e.g., a web server) based on a cache record of correlated IP addresses. In particular embodiments, a DNS sniffing activity can be performed as a flow is initiated by subscriber 12. The initial IP address included in the subscriber flow can be used to glean information associated with a particular web server sought to be accessed. Thus, initial packets can be used to make a subsequent determination about an acceptable IP address associated with a particular entity.
Consider an example involving subscriber 12, who is operating a laptop computer that has been turned off for the last two days. IP addresses stored in the laptop's browser commonly include a time to live (TTL) parameter such that, based on this particular timeframe of two days, the laptop would not rely on these IP addresses as being viable. In this particular example, the TTLs have expired and subscriber 12 types in the following URL: http://www yahoo.com. The browser within the laptop can access a piece of software (e.g., a resolver) within the laptop to resolve URLs to particular IP addresses. The resolver can construct a DNS query, where the query would be sent to a configured location (e.g., a DNS server) that is often predetermined by the service provider. In a general sense, the query is asking the DNS server for an appropriate IP address associated with this particular URL. The DNS server can respond to this query by providing several different IP addresses for accessing this particular website. Included within these IP addresses would be a TTL parameter that outlines the length of time for which the particular IP address is valid (i.e., an appropriate expiration time.). The resolver within the operating system of the laptop can communicate the acceptable IP addresses to the browser.
In one particular example, this initial flow being established by subscriber 12 is acknowledged (or otherwise noticed) by service gateway 14. More particularly, this particular flow can be noticed by DNS awareness module 48. In more specific embodiments, the flow is noticed via port 53, which is the DNS port capable of facilitating flows involving UDP, TCP, etc. Service gateway 14 is configured to parse both the request and the response for this particular flow in order to store/maintain the correlation between the IP address and the domain name. Thus, service gateway 14 can remember the domain name being implicated and, furthermore, it can remember, record, or otherwise maintain this information in a useful manner.
The domain name data segment may be grouped in any appropriate manner, or simply placed in some type of cache for subsequent reference. Note that placing this domain name data segment in a group has value because often times a particular URL address has various canonical and generic forms. Thus, there could be various textual forms for particular URLs. Hence, for the grouping mechanism, the logical grouping could include any permutations associated with the particular website. For example, certain websites provide slightly different URLs for mobile users, for subscribers, for visitors, etc. Thus, the particular URL could vary by several letters (from a more generic URL) based on a given business entity, which has configured ancillary servers to accommodate particular communication flows. Note also that the organization of these particular IP addresses may be stored along with their associated TTLs, which offer a time period for which the IP addresses are valid.
At this point in the flow, the browser understands that it can use these valid IP addresses to initiate a request to be directed at a particular server. For example, a browser can take this information and construct an HTTP request (e.g., on port 80) to initiate a TCP connection toward the target destination. As the SYN packet flows through service gateway 14, it is noticed and, further, this particular packet is mapped to some type of DNS awareness activity for this particular subscriber. Having made this connection to a particular subscriber, a rule set can be evaluated to analyze what type of DNS awareness activity should be applied to this particular flow. In addition, the actual IP address for the HTTP flow and a reverse lookup can be conducted. For example, a particular IP address can be used in order to identify that this particular IP address is associated with a group of domains associated with www.yahoo.com. At this point, the architecture has identified subscriber 12 and the particular domain to which he is attempting to connect. The architecture has a set of rules that can be applied for this particular instance.
The response mechanism at this junction could include any number of activities such as: redirecting the flow to an alternative destination (e.g., for authorizing additional billing, for granting permissions to access particular content, for certifying their age, etc.), interrupting the flow, disconnecting the flow, changing the route amongst ISNs 50 for this particular flow, applying rate limiting operations for the flow, disconnecting the flow, filtering the flow, billing for the flow, denying the flow access to the particular web server (e.g., in an adult content scenario), applying a quality of service level, charging a different rate for this particular flow, etc. Many of these responses may be executed by service gateway 14 and/or by PCEF module 56, which can be configured to perform some or all of the responses identified above.
Thus, once a particular piece of data is identified through DNS sniffing, any number of suitable responses can occur. For example, based on an identification of the domain name, service gateway 14 may choose to stop services for this particular subscriber. In other instances, service gateway 14 could block particular traffic for this subscriber. Other responses could include a continual monitoring or policing for this particular subscriber. Another response could include adjusting, terminating, or otherwise managing a quality of service level for the subscriber's flow(s). Yet another response could include indicating to a corresponding GGSN to terminate/drop this subscriber connection.
In response to a DNS request at step 2a, a DNS response is sent back through the network. In this particular example, a group of valid IP addresses is sent back toward subscriber 74. Note that the group of returned IP addresses can include a TTL associated with each IP address. At step 2b, the DNS response is parsed by service gateway 76 (e.g., via DNS awareness module 48) and the domain name is recorded. In addition, particular IP addresses can be mapped to specific policies at step 2b.
At step 3, subscriber 74 can make a request to the IP address just obtained. This could involve, for example, retrieving a video from this particular website. A SYN packet flows initially (e.g., over port 80) as shown, and this request can be received by service gateway 76. At step 4a, service gateway 76 can access knowledge that it has maintained for particular IP addresses in order to manipulate this flow in some manner. More specifically, service gateway 76 can use IP address 216.239.34.10 to map to the domain youtube.com for the purpose of accessing a routing policy for this particular domain. Service gateway 76 has the intelligence to recognize this particular IP address as being associated with previous DNS sniffing activity. For this particular example, service gateway 76 makes the logical connection between YouTube.com, a particular IP address propagating through service gateway 76, and one or more policy rules that dictate how this flow is to be processed. The processing for this particular IP address can include billing, QoS policies, routing policies, etc. and all of this can be applied at this particular instance.
At this juncture, the session is established for subscriber 74, where the SYN packet is forwarded to the correct next-hop destination in the network. Note that step 4a represents a routing decision, but various other decisions can be implemented at this stage. For example, an accounting or policy decision may be implemented at this juncture, which can include QoS activities, online/offline charging, filtering, etc. Note that this policy decision can include routing a particular flow through an intermediate device, which can provide enhanced services. For example, this intermediate device may apply more stringent, or granular filtering for particular flows. Alternatively, this intermediate device may provide a certification of a subscriber's identity, or offer enhanced video processing, etc.
ISN 78 can receive packets from service gateway 76 and subsequently make a routing decision based on their innate (e.g., ordinary) routing policies. In one sense, the particular ISN 78 of the group can be selected based on the policy configured in service gateway 76. ISNs 78 can be configured to route to a given destination IP address (e.g., “dst”) according to their customary routing policies. In step 4, the dst is Internet 80 for step 4b, while in step 6, the dst is service gateway 76.
At step 5, a SYN/ACK packet is sent by the origin server, and this propagates through Internet 80 to ISN 78. As shown in step 6, ISN 78 directs packets to service gateway 76. At step 7, service gateway 76 provides a return routing path based on the subscriber's IP address and adjacency, where future packets match sessions on service gateway 76 and, therefore, could follow the same route. Note that these particular metrics of this specific example (i.e., the subscriber's IP address and adjacency) represent one of many possible characteristics that can be used in making an intelligent routing decision. One example implementation involves subscriber-aware routing and domain-aware routing being executed for particular flows.
Note that in certain example implementations, the inspection and mapping functions outlined herein may be implemented by logic encoded in one or more tangible media (e.g., embedded logic provided in an application specific integrated circuit [ASIC], digital signal processor [DSP] instructions, software [potentially inclusive of object code and source code] to be executed by a processor, or other similar machine, etc.). In some of these instances, a memory element [as shown in
In one example implementation, service gateway 14 includes software in order to achieve the inspection and mapping functions outlined herein. These activities can be facilitated by DNS awareness module 48. Service gateway 14 can include memory elements for storing information to be used in achieving the intelligent inspection and mapping operations, as outlined herein. Additionally, each of these devices may include a processor that can execute software or an algorithm to perform the inspection and mapping activities, as discussed in this Specification. These devices may further keep information in any suitable memory element [random access memory (RAM), ROM, EPROM, EEPROM, ASIC, etc.], software, hardware, or in any other suitable component, device, element, or object where appropriate and based on particular needs. Any of the memory items discussed herein (e.g., database, table, cache, key, etc.) should be construed as being encompassed within the broad term ‘memory element.’ Similarly, any of the potential processing elements, modules, and machines described in this Specification should be construed as being encompassed within the broad term ‘processor.’ Each of the network elements can also include suitable interfaces for receiving, transmitting, and/or otherwise communicating data or information in a network environment.
Note that with the example provided above, as well as numerous other examples provided herein, interaction may be described in terms of two, three, or four network elements. However, this has been done for purposes of clarity and example only. In certain cases, it may be easier to describe one or more of the functionalities of a given set of flows by only referencing a limited number of network elements. It should be appreciated that communication system 10 (and its teachings) are readily scalable and can accommodate a large number of components, as well as more complicated/sophisticated arrangements and configurations. Accordingly, the examples provided should not limit the scope or inhibit the broad teachings of communication system 10 as potentially applied to a myriad of other architectures.
It is also important to note that the steps in the preceding flow diagrams illustrate only some of the possible signaling scenarios and patterns that may be executed by, or within, communication system 10. Some of these steps may be deleted or removed where appropriate, or these steps may be modified or changed considerably without departing from the scope of the present disclosure. In addition, a number of these operations have been described as being executed concurrently with, or in parallel to, one or more additional operations. However, the timing of these operations may be altered considerably. The preceding operational flows have been offered for purposes of example and discussion. Substantial flexibility is provided by communication system 10 in that any suitable arrangements, chronologies, configurations, and timing mechanisms may be provided without departing from the teachings of the present disclosure.
Although the present disclosure has been described in detail with reference to particular arrangements and configurations, these example configurations and arrangements may be changed significantly without departing from the scope of the present disclosure. For example, although the present disclosure has been described with reference to particular communication exchanges involving certain GGSN components, communication system 10 may be applicable to other protocols and arrangements such as any type of network access server (NAS), GPRS entry point, etc. Moreover, the present disclosure is equally applicable to various cellular and/or wireless technologies including CDMA, Wi-Fi, WiMax, etc. In addition, other example environments that could use the features defined herein include Pico and femto architectures, where intelligent inspection and mapping operations would occur for one or more users. Moreover, although communication system 10 has been illustrated with reference to particular elements and operations that facilitate the communication process, these elements and operations may be replaced by any suitable architecture or process that achieves the intended functionality of communication system 10.
Number | Name | Date | Kind |
---|---|---|---|
5151899 | Thomas et al. | Sep 1992 | A |
5371731 | Pratt et al. | Dec 1994 | A |
5898713 | Melzer et al. | Apr 1999 | A |
6496516 | Dabecki et al. | Dec 2002 | B1 |
6522880 | Verma et al. | Feb 2003 | B1 |
6643621 | Dodrill et al. | Nov 2003 | B1 |
6654792 | Verma et al. | Nov 2003 | B1 |
6684256 | Warrier et al. | Jan 2004 | B1 |
6728266 | Sabry et al. | Apr 2004 | B1 |
6829242 | Davison et al. | Dec 2004 | B2 |
6839767 | Davies et al. | Jan 2005 | B1 |
6862624 | Colby et al. | Mar 2005 | B2 |
6917592 | Ramankutty et al. | Jul 2005 | B1 |
6922411 | Taylor | Jul 2005 | B1 |
6968389 | Menditto et al. | Nov 2005 | B1 |
7317693 | Roesch et al. | Jan 2008 | B1 |
7366189 | Davison et al. | Apr 2008 | B2 |
7426202 | Warrier et al. | Sep 2008 | B2 |
7447765 | Aerrabotu et al. | Nov 2008 | B2 |
7496662 | Roesch et al. | Feb 2009 | B1 |
7502836 | Menditto et al. | Mar 2009 | B1 |
7522521 | Bettink et al. | Apr 2009 | B2 |
7610330 | Quinn et al. | Oct 2009 | B1 |
7673072 | Boucher et al. | Mar 2010 | B2 |
7742399 | Pun | Jun 2010 | B2 |
7768983 | Nylander et al. | Aug 2010 | B2 |
7792113 | Foschiano et al. | Sep 2010 | B1 |
7808919 | Nadeau et al. | Oct 2010 | B2 |
7827256 | Phillips et al. | Nov 2010 | B2 |
7856512 | Hilla et al. | Dec 2010 | B2 |
7885248 | Harper et al. | Feb 2011 | B2 |
7885260 | Paul et al. | Feb 2011 | B2 |
7890636 | Grayson et al. | Feb 2011 | B2 |
7925709 | Ben-Yoseph et al. | Apr 2011 | B1 |
7926071 | Stephens et al. | Apr 2011 | B2 |
7929442 | Connor et al. | Apr 2011 | B2 |
7990993 | Ghosh et al. | Aug 2011 | B1 |
8018866 | Kasturi et al. | Sep 2011 | B1 |
8086253 | Kalmkar et al. | Dec 2011 | B1 |
8279776 | Everson et al. | Oct 2012 | B1 |
8339959 | Moisand et al. | Dec 2012 | B1 |
20020046264 | Dillon et al. | Apr 2002 | A1 |
20020053029 | Nakamura et al. | May 2002 | A1 |
20030028433 | Merriman et al. | Feb 2003 | A1 |
20030028644 | Maguire et al. | Feb 2003 | A1 |
20030039237 | Forslow | Feb 2003 | A1 |
20030058872 | Berggreen et al. | Mar 2003 | A1 |
20030097481 | Richter | May 2003 | A1 |
20040054925 | Etheridge et al. | Mar 2004 | A1 |
20040088385 | Blanchet et al. | May 2004 | A1 |
20040224678 | Dahod et al. | Nov 2004 | A1 |
20040236855 | Peles | Nov 2004 | A1 |
20050013253 | Lindskog et al. | Jan 2005 | A1 |
20050025152 | Georgiou et al. | Feb 2005 | A1 |
20050058153 | Santhoff et al. | Mar 2005 | A1 |
20050074005 | Okuno | Apr 2005 | A1 |
20050088974 | Savoor et al. | Apr 2005 | A1 |
20050091371 | Delegue et al. | Apr 2005 | A1 |
20050096016 | Tervo et al. | May 2005 | A1 |
20050120091 | Casais et al. | Jun 2005 | A1 |
20050147069 | Rink et al. | Jul 2005 | A1 |
20050239473 | Pan et al. | Oct 2005 | A1 |
20050246346 | Gerdes et al. | Nov 2005 | A1 |
20050286504 | Kwon | Dec 2005 | A1 |
20060018328 | Mody et al. | Jan 2006 | A1 |
20060029084 | Grayson | Feb 2006 | A1 |
20060058021 | Fox et al. | Mar 2006 | A1 |
20060098573 | Beer et al. | May 2006 | A1 |
20060164992 | Brown et al. | Jul 2006 | A1 |
20060222086 | Frye | Oct 2006 | A1 |
20060224750 | Davies et al. | Oct 2006 | A1 |
20060234678 | Juitt et al. | Oct 2006 | A1 |
20060256722 | Taha et al. | Nov 2006 | A1 |
20060268901 | Choyi et al. | Nov 2006 | A1 |
20060291388 | Amdahl et al. | Dec 2006 | A1 |
20070014245 | Aloni et al. | Jan 2007 | A1 |
20070027992 | Judge et al. | Feb 2007 | A1 |
20070067839 | Hamada et al. | Mar 2007 | A1 |
20070078955 | Siliquini et al. | Apr 2007 | A1 |
20070097983 | Nylander et al. | May 2007 | A1 |
20070101421 | Wesinger et al. | May 2007 | A1 |
20070105568 | Nylander et al. | May 2007 | A1 |
20070116019 | Cheever et al. | May 2007 | A1 |
20070116020 | Cheever et al. | May 2007 | A1 |
20070201383 | Ong et al. | Aug 2007 | A1 |
20070208820 | Makhervaks et al. | Sep 2007 | A1 |
20070243872 | Gallagher et al. | Oct 2007 | A1 |
20070253328 | Harper et al. | Nov 2007 | A1 |
20070271453 | Pohja et al. | Nov 2007 | A1 |
20070298848 | Babin | Dec 2007 | A1 |
20080010354 | Sasaki et al. | Jan 2008 | A1 |
20080026740 | Netanel | Jan 2008 | A1 |
20080045267 | Hind et al. | Feb 2008 | A1 |
20080114862 | Moghaddam et al. | May 2008 | A1 |
20080133518 | Kapoor et al. | Jun 2008 | A1 |
20080137541 | Agarwal et al. | Jun 2008 | A1 |
20080147837 | Klein et al. | Jun 2008 | A1 |
20080162637 | Adamczyk et al. | Jul 2008 | A1 |
20080176582 | Ghai et al. | Jul 2008 | A1 |
20080177880 | Ginis | Jul 2008 | A1 |
20080188223 | Vesterinen et al. | Aug 2008 | A1 |
20080298309 | Dahod et al. | Dec 2008 | A1 |
20080301254 | Bestler | Dec 2008 | A1 |
20080310404 | Valme et al. | Dec 2008 | A1 |
20080316980 | Ahlen et al. | Dec 2008 | A1 |
20090017864 | Keevill et al. | Jan 2009 | A1 |
20090061821 | Chen et al. | Mar 2009 | A1 |
20090061873 | Bao et al. | Mar 2009 | A1 |
20090067417 | Kalavade et al. | Mar 2009 | A1 |
20090086742 | Ghai et al. | Apr 2009 | A1 |
20090089447 | Balachandran et al. | Apr 2009 | A1 |
20090092136 | Nazareth et al. | Apr 2009 | A1 |
20090098872 | Deshpande et al. | Apr 2009 | A1 |
20090109849 | Wood et al. | Apr 2009 | A1 |
20090109982 | Batz et al. | Apr 2009 | A1 |
20090129271 | Ramankutty et al. | May 2009 | A1 |
20090156213 | Spinelli et al. | Jun 2009 | A1 |
20090161680 | Ishikawa et al. | Jun 2009 | A1 |
20090164597 | Shuster | Jun 2009 | A1 |
20090207759 | Andreasen et al. | Aug 2009 | A1 |
20090215438 | Mittal et al. | Aug 2009 | A1 |
20090254658 | Kamikura et al. | Oct 2009 | A1 |
20090262682 | Khetawat et al. | Oct 2009 | A1 |
20090279522 | Leroy et al. | Nov 2009 | A1 |
20090286510 | Huber et al. | Nov 2009 | A1 |
20090307746 | Di et al. | Dec 2009 | A1 |
20100010991 | Joshi | Jan 2010 | A1 |
20100067462 | Beser et al. | Mar 2010 | A1 |
20100077102 | Lim et al. | Mar 2010 | A1 |
20100082787 | Kommula et al. | Apr 2010 | A1 |
20100091653 | Koodli et al. | Apr 2010 | A1 |
20100091775 | Yamamoto | Apr 2010 | A1 |
20100103871 | Mooney et al. | Apr 2010 | A1 |
20100124933 | Chowdhury et al. | May 2010 | A1 |
20100131646 | Drako | May 2010 | A1 |
20100174829 | Drako | Jul 2010 | A1 |
20100186064 | Huang et al. | Jul 2010 | A1 |
20100195640 | Park et al. | Aug 2010 | A1 |
20100278070 | Melia et al. | Nov 2010 | A1 |
20100291897 | Ghai et al. | Nov 2010 | A1 |
20110021192 | Grayson et al. | Jan 2011 | A1 |
20110021196 | Grayson et al. | Jan 2011 | A1 |
20110058479 | Chowdhury et al. | Mar 2011 | A1 |
20110069663 | Shu et al. | Mar 2011 | A1 |
20110075557 | Chowdhury et al. | Mar 2011 | A1 |
20110075675 | Koodli et al. | Mar 2011 | A1 |
20110076985 | Chami et al. | Mar 2011 | A1 |
20110145103 | Ljunggren et al. | Jun 2011 | A1 |
20110145111 | Ljunggren et al. | Jun 2011 | A1 |
20110182249 | Yang et al. | Jul 2011 | A1 |
20110185049 | Atreya et al. | Jul 2011 | A1 |
20110225284 | Savolainen | Sep 2011 | A1 |
20110235546 | Horn et al. | Sep 2011 | A1 |
20110235595 | Mehta et al. | Sep 2011 | A1 |
20110295942 | Raghunath et al. | Dec 2011 | A1 |
20120002543 | Dighe et al. | Jan 2012 | A1 |
20120076120 | Kovvali et al. | Mar 2012 | A1 |
20120082073 | Andreasen et al. | Apr 2012 | A1 |
20120082093 | Andreasen et al. | Apr 2012 | A1 |
20120082094 | Andreasen et al. | Apr 2012 | A1 |
20120082132 | Andreasen et al. | Apr 2012 | A1 |
20120082146 | Andreasen et al. | Apr 2012 | A1 |
20120082161 | Leung et al. | Apr 2012 | A1 |
20120184258 | Kovvali et al. | Jul 2012 | A1 |
20120224536 | Hahn et al. | Sep 2012 | A1 |
20130003741 | Singh et al. | Jan 2013 | A1 |
20130041934 | Annamalaisami et al. | Feb 2013 | A1 |
20130058274 | Scherzer et al. | Mar 2013 | A1 |
20130258963 | Mihaly et al. | Oct 2013 | A1 |
Number | Date | Country |
---|---|---|
1250022 | Oct 2002 | EP |
1619917 | Jan 2006 | EP |
1978685 | Oct 2008 | EP |
WO 9207438 | Apr 1992 | WO |
WO 9214327 | Aug 1992 | WO |
WO2005015825 | Feb 2005 | WO |
WO 2009089455 | Jul 2009 | WO |
WO2009132700 | Nov 2009 | WO |
WO2011062745 | May 2011 | WO |
WO2011062746 | May 2011 | WO |
Entry |
---|
U.S. Appl. No. 12/624,020, filed Nov. 23, 2009, entitled “System and Method for Providing a Sequence Numbering Mechanism in a Network Environment,” Inventor(s): Walter Dixon et al. |
U.S. Appl. No. 12/642,790, filed Dec. 19, 2009, entitled “System and Method for Managing Out of Order Packets in a Network Environment,” Inventor(s): Walter Dixon et al. |
U.S. Appl. No. 12/642,791, filed Dec. 19, 2009, entitled “System and Method for Providing Subscriber Aware Routing in a Network Environment,” Inventor(s): Shmuel Shaffer. |
PCT Notification of Transmittal (1 page) of the Interntional Search Report (4 pages) and the Written Opinion of the International Searching Authority, or the Declaration (6 pages) mailed Mar. 1, 2011 for PCT/US2010/054834. |
Cisco Systems, Inc., “Cisco NAC Appliance—Clean Access Server Installation and Configuration Guide, Rel. 4.6 (1),” Jul. 2009, 3 pages http://www.cisco.com/en/US/docs/security/nac/appliance/configuration—guide/461/cas/cas461ug.pdf. |
Cisco Systems, Inc., “Cisco NAC Appliance—Clean Access Manager Installation and Configuration Guide,” Jul. 2009, 5 pages http://www.cisco.com/en/US/docs/security/nac/appliance/configuration—guide/461/cam/cam461ug.pdf. |
“3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Policy and Charging Control over Gx referecne point (Release 9),” 3GPP Standard; 3GPP TS 29.212, 3rd Generational Partnership Project (3GPP), Mobile Competence Centre; 650, Route Des Lucioles; F-06921 Sophia-Antipolis Cedex; France, No. V9.0.0, Sep. 1, 2009; 92 pages. |
PCT Notification of Transmittal (1 page) of the Internatioanl Search Report (4 pages) and the Written Opinion of the International Searching Authority, or the Declaration (7 pages) mailed Feb. 8, 2011 for PCT/US2010/054838. |
“3GPP TS 23.203 V9.2.0 (Sep. 2009) Technical Specification 3rd Generation Partnership project; Technical Specification Group Services and System Aspects; Policy and Charging Control Architecture (Release 9),” 3GPP TS 23.203 V9.2.0, vol. 23, 203, No. V9.2.0; Sep. 1, 2009, 120 pages; URL:ftp://ftp.3.gpp.org/specs/archive/23—series/23.203/. |
U.S. Appl. No. 12/621,066, filed Nov. 18, 2009, entitled “System and Method for Reporting Packet Characteristics in a Network Environment,” Inventor(s): Robert Batz et al. |
Cisco Systems, Inc., Configuring URL Routing (L5 Routing) on the CSS 11000 and 11500, © 1992-2006; Document ID: 25999; 5 pages http://www.cisco.com/en/US/products/hw/contnetw/ps792/products—configuration—example09186a00801cOdbc.shtml. |
Cisco Systems, Inc., “Cisco Application-Oriented Networking,” © 1992-2006; 10 pages http://www.cisco.com/en/US/prod/collateral/modules/ps6438/product—data—sheet0900aecd802c1f9c.html. |
U.S. Appl. No. 12/984,034, filed Jan. 4, 2011, entitled “System and Method for Exchanging Information in a Mobile Wireless Network Environment,” Inventors: Gary B. Mahaffey, et al. |
U.S. Appl. No. 13/159,906, filed Jun. 14, 2011, entitled “Selective Packet Sequence Acceleration in a Network Environment,” Inventor(s): Bhagatram Janarthanan et al. |
U.S. Appl. No. 13/160,189, filed Jun. 14, 2011, entitled “Preserving Sequencing During Selective Packet Acceleration in a Network Environment,” Inventor(s): Bhagatram Janarthanan et al. |
U.S. Appl. No. 13/160,344, filed Jun. 14, 2011, entitled “Accelerated Processing of Aggregate Data Flows in a Network Environment,” Inventor(s): Imnaz Meher Jilani et al. |
U.S. Appl. No. 13/160,426, filed Jun. 14, 2011, entitled “Selective Packet Sequence Acceleration in a Network Environment,” Inventor(s): Bhagatram Janarthanan. |
PCT May 31, 2012 International Preliminary Report on Patentability and Written Opinion of the International Searching Authority (8 pages) for PCT/US2010/054834. |
PCT May 30, 2012 International Preliminary Report on Patentability and Written Opinion of the International Searching Authority (8 pages) for PCT/US2010/054838. |
3GPP TS.23.203 v.11.3.0 Technical Specification—“3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Policy and Charging control architecture (Release 11),” Sep. 2011; 167 pages. |
3GPP TS.23.401 v.10.5.0 Technical Specification—“3rd General Partnership Project; Technical Specification Group Services and System Aspects: General Packet Radio Service (GPRS) enhancements for Evolved Universal Terrestrial Radio Access Network (E-UTRAN) access (Release 10),” Sep. 2011, 284 pages. |
3GPP TS 23.236 v.10.0.0 Technical Specification—“3rd General Partnership Project; Technical Specification Group Services and Systems Aspects; Intra-Domain Connection of Radio Access Network (RAN) Nodes to Multiple Cor Network (CN) Nodes (Release 10),” Mar. 2010, 39 pages. |
Chowdhury, K. “Fast Handoff Support for HRPD,” 3rd Generation Partnership Project 2, 3GPP2, Apr. 24, 2006. |
Chowdhury, K. “Network-Based Layer 3 Connectivity and Mobility Management for IPv6,” draft-chowdbury-netmip6-01.txt, Network Working Group Internet Draft, Sep. 8, 2006, 20 pages http://tools.ietf.org/html/draft-chowdbury-netmip6-01. |
Chowdhury, K., “Network Based L3 Connectivity and Mobility Management for IPv4,” draft-chowdbury-netmip4-001.tt, Feb. 25, 2006; 16 pages http://tools.ietf.org/html/draft-chowdbury-netmip4-00. |
Devarapalli, V., et al., ““Proxy Mobile IPv6 and Mobil IPv6 Interworking,”” draft-devarapalli-netlmm-pmipv6-mipv6-00.txt, NETLMM Working Group Internet Draft, Apr. 10, 2007; 9 pages; http://tools,ietf.org/html/draft-devarapalli-netlmm-pmipv6-mipv6-00. |
Lior, A., et al., “Mobile IP Key Derivation using EAP,” draft-lior-mipkeys-eap-00, Network Working Group, Feb. 25, 2006; 17 pages http://tools.ietf.org/html/draft-lior-mipkeys-eap-00. |
Navali, J., et al., “IPv6 over Network based Mobile IPv4,” draft-navali-ip6-over-netmip4-00.txt, Network Working Group, Feb. 25, 2006; 20 pages http://tools.ietf.org/html/draft-navali-ip6-over-netmip4-00. |
Ericsson, Tdoc S2-000888; “SGSN decomposition,” Document for discussion; R000 Architecture; 3GPP TSG SA2 Meeting #13; Berlin, May 22-26, 2000, 13 pages; http://www.3gpp.org/ftp/tsg—sa/WG2—Arch/TSGS2—13/tdocs/S2-000888.zip. |
3GPP TS 23.261 v.10.1.0 Technical Specification—3GPP Organizational Partners, 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; IP flow mobility and seamless Wireless Local Area Network (WLAN) offload; Stage 2 (Release 10); © 2010, 22 pages; http://www.3gpp.org. |
3GPP TR 23.829 v.10.0—3GPP Organizational Partners, 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Local IP Access and Selected IP Traffic Offload (LIPA-SIPTO) (Release 10); 3GPP TR 23.829 V10.0.0 (Mar. 2011) © 2011, 43 pages; http://www.3gpp.org. |
User Agent Profile (UAProf) Specification, Wireless Application Group, Wireless Application Protocol Forum, Version 10, Nov. 1999, 76 pages. |
EPO Aug. 22, 2012 Response to Communication re Rules 161(1) and 162 EPC from European Application No. 10779130; 8 pages. |
3GPP TR 25.820 v8.0.0 (Mar. 2008), 3rd Generation Partnership Project; Technical Specification Group Radio Access Networks; 3G Home NodeB Study Item Technical Report (Release 8); http://www.3gpp.org, 2008. 37 pages. |
3GPP TR 29.814 v7.1.0 (Jun. 2007), 3rd Generation Partnership Project; Technical Specification Group Core Networks and Terminals Feasibility Study on Bandwidth Savings at Nb Interface with IP transport (Release 7), Global System for Mobile Communications, http://www.3gpp.org, 2007. 19 pages. |
3GPP TS 22.011 v8.4.1 (Jun. 2008), 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Service accessibility (Release 8), Global System for Mobile Communications, http://www/3gpp.org, 2008. 25 pages. |
3GPP TS 23.060 v8.1.0 (Jun. 2008), 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; General Packet Radio Service (GPRS); Service description; Stage 2 (Release 8), Global System for Mobile Communications, http://www.3gpp.org, 2008. 259 pages. |
3GPP TS 23.107 v7.1.0 (Sep. 2007), 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Quality of Service (QoS) concept and architecture (Release 7), http://www.3gpp.org, 2007. 40 pages. |
3GPP TS 23.228 v8.5.0 (Jun. 2008), 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; IP Multimedia Subsystem (IMS); Stage 2 (Release 8), http://www.3gpp.org, 2008. 240 pages. |
3GPP TS 23.234 v7.7.0 (Jun. 2008), 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; 3GPP system to Wireless Local Area Network (WLAN) interworking; System description (Release 7), http://www.3gpp.org, 2008. 85 pages. |
3GPP TS 23.236 v7.0.0 (Dec. 2006), 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Intra-domain connection of Radio Access Network (RAN) nodes to multiple Core Network (CN) nodes (Release 7); Global System for Mobile Communications, http://www.3gpp.org, 2006. 37 pages. |
3GPP TS 25.411 v7.1.0 (Sep. 2007); 3rd Generation Partnership Project; Technical Specification Group Radio Access Network; UTRAN lu interface layer 1 (Release 7), http://www.3gpp.org, 2007. 9 pages. |
3GPP TS 25.413 V7.8.0 (Dec. 2007), 3rd Generation Partnership Project; Technical Specification Group Radio Access Network; UTRAN lu interface RANAP signaling (Release 7), http://www.3gpp.org, 2007. 359 pages. |
3GPP TS 25.415 v7.3.0 (Dec. 2006), 3rd Generation Partnership Project; Technical Specification Group Radio Access Network; UTRAN lu interface user plane protocols (Release 7), http://www.3gpp.org, 2006. 64 pages. |
3GPP TS 29.163 v8.3.0 (May 2008), 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Interworking between the IP Multimedia (IM) Core Network (CN) subsystem and Circuit Switched (CS) networks (Release 8), Global System for Mobile Communications, http://www.3gpp.org, 2008. 237 pages. |
3GPP TS 29.234 v7.9.0 (Jun. 2008), 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; 3GPP system to Wireless Local Area Network (WLAN) interworking; Stage 3 (Release 7); http://www.3gpp.org, 2008. 92 pages. |
3GPP TS 29.332 v8.2.0 (Jun. 2008), 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Media Gateway Control Function (MGCF)—IM Media Gateway; Mn Interface (Release 8), http://www.3gpp.org, 2008. 73 pages. |
3GPP TS 29.414 v8.1.0 (May 2008), 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Core network Nb data transport and transport signalling (Release 8), Global System for Mobile Communications, http://www.3gpp.org, 2008. 29 pages. |
3GPP TS 29.415 v8.0.0 (May 2008), 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Core Network Nb Interface User Plane Protocols (Release 8), Global System for Mobile Communications, http://www.3gpp.org, 2008. 14 pages. |
PRC Apr. 3, 2014 SIPO First Office Action from Chinese Application No. 201080051408.1. |
U.S. Appl. No. 14/260,387, filed Apr. 24, 2014, entitled “System and Method for Managing Out of Order Packets in a Network Environment,” Inventor(s): Walter Dixon et al. |
U.S. Appl. No. 14/257,098, filed Apr. 21, 2014, entitled “Accelerated Processing of Aggregate Data Flows in a Network Environment,” Inventor(s): Imnaz Meher Jilani et al. |
U.S. Appl. No. 14/257,131, filed Apr. 21, 2014, entitled “Selective Packet Sequence Acceleration in a Network Environment,” Inventor(s): Bhagatram Janarthanan. |
PRC Dec. 12, 2014 SIPO Second Office Action from Chinese Application No. 201080051408.1. |