摘要:
Mobile protocol packets, with a header field and a payload field, are communicated from a user mobile equipment to an application-aware serving gateway. The application-aware mobile protocol serving gateway detects header information in the header field and application information in the payload field to manage the mobile protocol packets based on a policy.
摘要:
Mobile protocol packets, with a header field and a payload field, are communicated from a user mobile equipment to an application-aware serving gateway. The application-aware mobile protocol serving gateway detects header information in the header field and application information in the payload field to manage the mobile protocol packets based on a policy.
摘要:
Various exemplary embodiments are a method and related device and computer-readable medium including one or more of the following: receiving a packet sent from the source node to the destination node; associating the packet with an active flow by accessing information in the packet; performing deep packet inspection (DPI) to identify an application associated with the active flow; associating application-identifying information with the packet; forwarding the packet including the application-identifying information towards the destination node; and performing application-specific processing at a downstream device on at least one packet belonging to the active flow, the downstream device identifying the application associated with the active flow by extracting the application-identifying information from the packet.
摘要:
Various exemplary embodiments relate to a method and related network element including one or more of the following: receiving, by the network node, a packet belonging to an IP flow; when the IP flow is a flow for which content information is to be sent to the content identification device, performing the steps of: determining, using deep packet inspection, that the packet contains a value for at least one field of interest, determining whether all fields of interest needed by the content identification have been seen by the network node among a plurality of packets belonging to the IP flow, and communicating the value of the at least one field of interest to the content identification device.
摘要:
A method of using deep packet inspection (DPI) to verify a service configuration. The method may include one or more of the following: building an application specific service ping packet having an application identification field that identifies an application to which the application specific service ping packet corresponds; forwarding the application specific service ping packet towards a destination in a network; determining static configuration information regarding the application to which the application specific service ping packet corresponds at a network interface of a network element; inserting the static configuration information into the application specific service ping packet; determining at least one policy that applies to a flow including the application specific service ping packet; inserting the at least one policy into the application specific service ping packet; and extracting the service ping packet from the network.
摘要:
A method of using deep packet inspection (DPI) to monitor Quality of Experience (QoE) The method may include one or more of the following: building an application specific service ping packet having an application identification field that identifies an application to which the application specific service ping packet corresponds; forwarding the application specific service ping packet towards a destination in a network; determining requested application-specific performance and resource metrics; collecting the requested application-specific performance and resource metrics; inserting the requested application-specific performance and resource metrics into the application specific service ping packet; and extracting the service ping packet from the network.
摘要:
A method of non-service affecting APS protection for MLPPP bundles on routing systems, and associated mechanism, including one or more of the following: specifying a working MLPPP bundle and a protection MLPPP bundle; specifying MLPPP parameters; associating the working MLPPP bundle and the protection MLPPP bundle with an APS circuit; bringing up an MLPPP session; changing an operational status of the working MLPPP bundle; synchronizing MLPPP state information between the working MLPPP bundle and the protection MLPPP bundle; and driving an operational status of the protection MLPPP bundle based on said changing the operational status of the working MLPPP bundle.
摘要:
Various exemplary embodiments disclose an apparatus and method for generating a database that maps metadata to peer-to-peer (P2P) content and, more particularly, to a database that an Internet Service Provider (ISP) can build to correlate metadata with P2P traffic. The database may collect metadata having a key that uniquely corresponds to particular P2P content. An ISP may use the database to identify malware in P2P files and tag P2P traffic that seeks to exchange material in violation of applicable copyright laws.
摘要:
A method of collecting consistent flow statistics through multiple congestion points within a multi-service switch/router is enabled by computing a payload length of each traffic unit received from a fabric of the switch/router. A PHY-level header containing the payload length, a class of service and a service ID is appended to the switch-internal encapsulated payload. Information associated with the PHY-level header is used at physical level congestion points to collect consistent flow statistics.
摘要:
Various exemplary embodiments are a method and related device and computer-readable medium including one or more of the following: receiving a packet sent from the source node to the destination node; associating the packet with an active flow by accessing information in the packet; performing deep packet inspection (DPI) to identify an application associated with the active flow; determining a classification for the packet based on characteristics of the identified application; associating, with the packet, information identifying the classification; forwarding the packet including the information identifying the classification towards the destination node; and performing processing on the packet at a downstream device by extracting the classification from the packet.