Patent application number | Description | Published |
20080225888 | Optimizing return traffic paths using network address translation - In one embodiment, an apparatus comprises logic for optimizing return traffic paths using network address translation (NAT). The logic is operable to receive outbound data from a source node in a source network, and to replace a source address in a source address field in the outbound data with a first address from a first address pool associated with a first connection. The logic is operable to determine that return traffic on the first connection needs to be switched over to a second connection, where a second address pool is associated with the second connection. The logic is operable to generate a mapping that associates the first address with a second address from the second address pool and, based on the mapping, to replace the first address in the source address field in the outbound data with the second address. The logic is also operable to send the outbound data to the destination node over the second connection. | 09-18-2008 |
20090248708 | Method and Apparatus for Mobility Agent Recovery - Techniques for recovering Mobile Internet Protocol (IP) session(s) of a mobility agent in a Mobile IP network are described herein. In one embodiment of the invention, for each mobility session associated with a mobility agent, the mobility agent distributively backs up mobility agent specific information to the mobility agent peer associated with that mobility session. The mobility agent specific information is not used by the mobility agent peer. Upon the mobility agent inadvertently losing at least one mobility session, the mobility agent recovers the stored mobility agent specific information associated with those sessions from the mobility agent peers respectively associated with those sessions. Other methods and apparatuses are also described. | 10-01-2009 |
20100188976 | Dynamic Management of Network Flows - A plurality of flow network elements monitors network flows at the subscriber level for a plurality of subscribers. The flow network elements export flow records to a collector, which organizes the flow records. A policy client correlates the flow records and determines whether any network flows are violating a flow policy definition. If a flow policy definition is violated, the policy client transmits a policy action to a policy server which indicates what action to take for a given violating flow. The policy server assigns a flow policy for the subscriber corresponding with the violating flow. The assigned flow policy is then transmitted to the flow network element having that violating flow, and that flow network element installs the flow policy. | 07-29-2010 |
20110110294 | VIRTUAL CARE-OF ADDRESS FOR MOBILE IP (Internet Protocol) - An IP (Internet Protocol) session for a mobile node is carried out through the use of a virtual care-of address. A foreign agent sends an agent advertisement to the mobile node to allow the mobile node to choose from a list of IP addresses of the foreign agent. To perform virtual care-of address services, the foreign agent ties the virtual care-of address to a mobile node so that an intelligent and dynamic selection of tunnels to be used for the IP session can occur. Therefore, traffic for an IP session is not limited to transmission over the single particular tunnel that corresponds to an IP address initially selected by the mobile node. Rather, the virtual care-of address shifts the tunneling decision from the mobile node to the foreign agent. Supporting multiple tunnels between home agent and foreign agent allows resilience, redundancy, and service-level differentiation to mobile node traffic without involving the mobile node in the process. | 05-12-2011 |
20110110328 | Method and Apparatus for Providing WiMAX (Worldwide Interoperability for Microwave Access) Anchor Mode Service on a System with Distributed Forwarding Planes - Transferring a mobile node from one ASN-GW (anchor access service network gateway) to another ASN-GW is referred to as a hand-over. To facilitate transfer of data for the hand-over, a GRE (generic routing encapsulation) tunnel is established between the two ASN-GWs. Traffic through the GRE tunnel arriving at a line card of an ASN-GW is redirected from the arrival line card to the one line card that contains information for the mobile node. The redirection is based on traversal of one or more tables on the line cards. These tables are indexed according to GRE keys corresponding to the mobile nodes. Therefore, the appropriate line card for the traffic can be identified quickly and efficiently using a distributed forwarding plane with minimal provisioning overhead, resulting in lower latency during the hand-over. | 05-12-2011 |
20110202663 | Method and Apparatus for Mobility Agent Recovery - Techniques for recovering Mobile Internet Protocol (IP) session(s) of a mobility agent in a Mobile IP network are described herein. In one embodiment of the invention, for each mobility session associated with a mobility agent, the mobility agent distributively backs up mobility agent specific information to the mobility agent peer associated with that mobility session. The mobility agent specific information is not used by the mobility agent peer. Upon the mobility agent inadvertently losing at least one mobility session, the mobility agent recovers the stored mobility agent specific information associated with those sessions from the mobility agent peers respectively associated with those sessions. Other methods and apparatuses are also described. | 08-18-2011 |
20110202664 | Method and Apparatus for Mobility Agent Recovery - Techniques for recovering Mobile Internet Protocol (IP) session(s) of a mobility agent in a Mobile IP network are described herein. In one embodiment of the invention, for each mobility session associated with a mobility agent, the mobility agent distributively backs up mobility agent specific information to the mobility agent peer associated with that mobility session. The mobility agent specific information is not used by the mobility agent peer. Upon the mobility agent inadvertently losing at least one mobility session, the mobility agent recovers the stored mobility agent specific information associated with those sessions from the mobility agent peers respectively associated with those sessions. Other methods and apparatuses are also described. | 08-18-2011 |
20110202671 | Method and Apparatus for Mobility Agent Recovery - Techniques for recovering Mobile Internet Protocol (IP) session(s) of a mobility agent in a Mobile IP network are described herein. In one embodiment of the invention, for each mobility session associated with a mobility agent, the mobility agent distributively backs up mobility agent specific information to the mobility agent peer associated with that mobility session. The mobility agent specific information is not used by the mobility agent peer. Upon the mobility agent inadvertently losing at least one mobility session, the mobility agent recovers the stored mobility agent specific information associated with those sessions from the mobility agent peers respectively associated with those sessions. Other methods and apparatuses are also described. | 08-18-2011 |
20110242994 | FLOW SAMPLING WITH TOP TALKERS - An improved network flow sampling apparatus and corresponding method more intelligently selects flows to be reported beyond random flow or packet sampling intervals. Evaluation of flows selects top talkers or heavy hitters as important flows that most impact traffic and therefore should be reported. Top talkers are flows defined based on a customized definition according to, for example, number of packets in a flow, number of bytes in a flow, or bandwidth consumed by a flow. An external collector can thus proceed with traffic profiling or other flow monitoring purposes with a more intelligently determined network flow sample. | 10-06-2011 |
20120294264 | Virtual Care-of Address for Mobile IP (Internet Protocol) - An IP (Internet Protocol) session for a mobile node is carried out through the use of a virtual care-of address. A foreign agent sends an agent advertisement to the mobile node to allow the mobile node to choose from a list of IP addresses of the foreign agent. The foreign agent ties a virtual care-of address to a mobile node so that an intelligent and dynamic selection of tunnels to be used for the IP session can occur. Therefore, traffic for an IP session is not limited to transmission over the single particular tunnel that corresponds to an IP address initially selected by the mobile node. Rather, the virtual care-of address shifts the tunneling decision from the mobile node to the foreign agent. Supporting multiple tunnels between home agent and foreign agent allows resilience, redundancy, and service-level differentiation to mobile node traffic without involving the mobile node in the process. | 11-22-2012 |
20130021906 | Dynamic Management of Network Flows - A plurality of flow network elements monitors network flows at the subscriber level for a plurality of subscribers. The flow network elements export flow records to a collector, which organizes the flow records. A policy client correlates the flow records and determines whether any network flows are violating a flow policy definition. If a flow policy definition is violated, the policy client transmits a policy action to a policy server which indicates what action to take for a given violating flow. The policy server assigns a flow policy for the subscriber corresponding with the violating flow. The assigned flow policy is then transmitted to the flow network element having that violating flow, and that flow network element installs the flow policy. | 01-24-2013 |
20130258852 | METHOD AND APPARATUS FOR ROUTE OPTIMIZATION ENFORCEMENT AND VERIFICATION - In one embodiment, a best exit from an autonomous system (AS) for a controlled prefix is determined. A network device of the AS influences a route for the controlled prefix to be over the best exit. Traffic statistics for the controlled prefix are selected. The network device verifies, based on the traffic statistics, whether the influence has caused at least a configured amount of traffic for the controlled prefix to be over the best exit. When at least the configured amount of the traffic is not directed over the best exit, the network device further influences the route for the controlled prefix to be over the best exit. | 10-03-2013 |