Abstract:
The present disclosure describes an apparatus and method for recognizing the mobile device type by information monitored from multiple means, such as by transparently monitoring Control Plane protocols, and monitoring user plane protocols (for example user agent header in HTTP protocols), and using such information for controlling data-caching operations, selectively delivering content, and selecting alternative interfaces/networks when available. Additionally, the invention discloses methods to propagate the learned information through header enrichment to external devices, such as content servers or CDN devices. The apparatus and methods are applicable to an application/content-aware caching device in a wireless mobile network that operates as an inline transparent device intercepting control plane and user plane protocols.
Abstract:
A method of learning and identifying two unidirectional GTP-U tunnels corresponding to a user equipment (UE) in a device placed in a LTE network, where the device acts as a transparent proxy intercepting user plane and control plane protocols on the S1 interface, is disclosed. Methods of pairing the two unidirectional tunnels that belong to same UE, when there is no control plane information or when there is Control Plane information, but the NAS portions of the S1 Control that contain bearer IP addresses are encrypted, are disclosed. Control plane and user plane methods for associating GTP-U tunnels and the corresponding bearer plane IP addresses are identified. Additionally, methods for detecting mobility of a UE, as it moves from the coverage area of one E-NodeB to another, are disclosed. Methods for constructing an eNodeB topology map are also disclosed.
Abstract:
The current invention defines a device and a method of logically inserting the device between two other network devices, for example, in a 3GPP Radio Access Network. The device transparently monitors and interacts with one or more control protocol layers in the two neighboring devices. The invention defines methods by which the intercepting node selectively passes through or proxies (selectively modifying portions of the protocols content) in such as way that the neighbor nodes are un-aware of the intercepting device. The proxy operation implies that the intercepting node is capable of terminating some protocol elements, injecting some protocol elements, or modifying protocol elements before forwarding them in such a way that the operation is transparent to neighboring nodes. These selective insertion/modifications facilitate identifying signaling connections for specific mobile clients, and enhancing and modifying service features for dataplane accesses for those client devices, while transparently passing other protocol messages.
Abstract:
Techniques for communication group configuration in a network are described. Location information describing a location of a first access point and neighborhood information related to the location of the first access point and to locations of neighboring access points are used to assign the first access point to a group of access points, where the group of access points includes one or more of the neighboring access points.