US20120099592A1 - Differentiated Handling of Network Traffic using Network Address Translation - Google Patents

Differentiated Handling of Network Traffic using Network Address Translation Download PDF

Info

Publication number
US20120099592A1
US20120099592A1 US13/039,386 US201113039386A US2012099592A1 US 20120099592 A1 US20120099592 A1 US 20120099592A1 US 201113039386 A US201113039386 A US 201113039386A US 2012099592 A1 US2012099592 A1 US 2012099592A1
Authority
US
United States
Prior art keywords
network address
network
data packet
replacement
traffic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US13/039,386
Inventor
Reiner Ludwig
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Telefonaktiebolaget LM Ericsson AB
Original Assignee
Telefonaktiebolaget LM Ericsson AB
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Telefonaktiebolaget LM Ericsson AB filed Critical Telefonaktiebolaget LM Ericsson AB
Assigned to TELEFONAKTIEBOLAGET LM ERICSSON (PUBL) reassignment TELEFONAKTIEBOLAGET LM ERICSSON (PUBL) ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: LUDWIG, REINER
Publication of US20120099592A1 publication Critical patent/US20120099592A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/25Mapping addresses of the same type
    • H04L61/2503Translation of Internet protocol [IP] addresses
    • H04L61/256NAT traversal
    • H04L61/2575NAT traversal using address mapping retrieval, e.g. simple traversal of user datagram protocol through session traversal utilities for NAT [STUN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/14Charging, metering or billing arrangements for data wireline or wireless communications
    • H04L12/1485Tariff-related aspects
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/02Capturing of monitoring data
    • H04L43/026Capturing of monitoring data using flow identification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/24Traffic characterised by specific attributes, e.g. priority or QoS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/25Mapping addresses of the same type
    • H04L61/2503Translation of Internet protocol [IP] addresses
    • H04L61/2514Translation of Internet protocol [IP] addresses between local and global IP addresses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/25Mapping addresses of the same type
    • H04L61/2503Translation of Internet protocol [IP] addresses
    • H04L61/2557Translation policies or rules
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/0252Traffic management, e.g. flow control or congestion control per individual bearer or channel
    • H04W28/0263Traffic management, e.g. flow control or congestion control per individual bearer or channel involving mapping traffic to individual bearers or channels, e.g. traffic flow template [TFT]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/45Network directories; Name-to-address mapping
    • H04L61/4505Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols
    • H04L61/4511Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols using domain name system [DNS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/02Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
    • H04W8/04Registration at HLR or HSS [Home Subscriber Server]

Definitions

  • the present invention relates to methods for differentiated handling of network traffic and to corresponding network devices.
  • differentiated handling of network traffic may be used to distinguish between different classes of network traffic. For example, a forwarding treatment of data packets, i.e., the way of forwarding a data packet on the way towards its destination, may be controlled to provide a certain Quality of Service (QoS) level, which depends on the traffic class.
  • QoS Quality of Service
  • the handling of the network traffic may also be differentiated with respect to charging, i.e., one traffic class could be charged, in a different manner than another.
  • traffic classification rules e.g. packet classification rules, are defined so as to implement the differentiation between different types of network traffic.
  • a bearer is considered to be an information transmission context or path of defined characteristics, e.g. capacity, delay and/or bit error rate.
  • a number of bearers will be established between a gateway of a mobile communication network and a user equipment (UE), e.g. a mobile phone or other type of mobile terminal.
  • UE user equipment
  • a bearer may carry downlink (DL) data traffic in a direction from the network to the user equipment, and may carry data traffic in an uplink (UL) direction from the user equipment to the network.
  • DL downlink
  • UL uplink
  • IP IP: “Internet Protocol”, which may be the IP Version 4, also referred to as IPv4, or the IP Version 6, also referred to as IPv6)
  • IP 5-tuple packet filters IP 5-tuple packet filters
  • IP 5-tuple packet filters IP 5-tuple packet filters
  • a set of packet filters used to direct the data traffic to a certain bearer is also referred to as a Traffic Flow Template (TFT).
  • TFT Traffic Flow Template
  • the TFT can be considered as an example of a packet classification rule.
  • Differentiated handling of network traffic may also be useful in other types of communication network environment, e.g. using fixed access technology such as DSL (Digital Subscriber Line), fibre optical access or coaxial cable access.
  • DSL Digital Subscriber Line
  • fibre optical access or coaxial cable access.
  • the 3GPP TSs limit the maximum number of packet filters which can be installed in a TFT of the UE.
  • a method of processing network traffic is provided.
  • an incoming data packet to be transmitted into a network section is received.
  • the incoming data packet includes a source network address.
  • the received data packet is then subjected to network address translation by replacing the source network address with a replacement network address.
  • the replacement network address is selected according to a traffic class of the data packet.
  • differentiated handling of the data packet on the basis of the replacement network address is provided.
  • a method of processing network traffic is provided.
  • an outgoing data packet transmitted from a network section is received.
  • the outgoing data packet includes a replacement network address in place of a destination network address of the data packet.
  • the replacement network address is selected according to a traffic class of the data packet.
  • the received data packet is subjected to network address translation by replacing the replacement network address with the destination network address.
  • differentiated handling of the data packet on the basis of the replacement network address is provided.
  • a network device is provided.
  • the network device is provided with an interface configured to receive an incoming data packet to be transmitted into a network section.
  • the incoming data packet includes a source network address.
  • the network device includes a network address translator configured to perform network address translation on the received data packet.
  • the process of network address translation includes replacing the source network address with a replacement network address.
  • the replacement network address is selected according to a traffic class of the data packet. In the network section, differentiated handling of the data packet on the basis of the replacement network address is provided.
  • a network device is provided.
  • the network device is provided with an interface configured to receive an outgoing data packet transmitted from a network section.
  • the outgoing data packet includes a replacement network address in place of a destination network address of the data packet.
  • the replacement network address is selected according to a traffic class of the data packet.
  • the network device includes a network address translator configured to perform network address translation on the received data packet.
  • the process of network address translation includes replacing the replacement network address with the destination network address of the data packet.
  • differentiated handling of the data packet on the basis of the replacement network address is provided.
  • FIG. 1 schematically illustrates a communication system in which concepts according to embodiments of the invention are implemented.
  • FIG. 2 schematically illustrates an example of a table for mapping network addresses to replacement network addresses.
  • FIG. 3 schematically illustrates a further example of a table for mapping network addresses to replacement network addresses.
  • FIG. 4 shows a signaling diagram for illustrating an exemplary scenario in which differentiated handling of network traffic according town embodiment of the invention can be applied.
  • FIG. 5 shows a signaling diagram for illustrating a further exemplary scenario in which differentiated handling of network traffic according to an embodiment of the invention can be applied.
  • FIG. 6 schematically illustrates a network device according to an embodiment of the invention.
  • FIG. 7 shows a flowchart for illustrating a method according to an embodiment of the invention.
  • FIG. 8 shows a flowchart for illustrating a further method according to an embodiment of the invention.
  • the illustrated embodiments relate to concepts for differentiated handling of network traffic.
  • the concepts are applied in a mobile communication network according to the 3GPP TSs.
  • the illustrated concepts may be applied in other types of communication network as well, e.g. using fixed access technology such as DSL, fiber optical access, or coaxial cable access.
  • FIG. 1 schematically illustrates a communication network environment in which concepts according to embodiments of the invention the invention can be applied.
  • the communication network environment includes a UE 10 , which may also be referred to as a terminal, and a number of network components 22 , 24 , 26 , 30 .
  • a Radio Access Network (RAN) 22 Among these network components there is a Radio Access Network (RAN) 22 .
  • the RAN 22 is based on a certain type or certain types of radio access technology, e.g. GSM (Global System for Mobile Communications), EDGE (Enhanced Data Rate for GSM Evolution), UMTS (Universal Mobile Telecommunications System) or LTE (Long Term Evolution).
  • GSM Global System for Mobile Communications
  • EDGE Enhanced Data Rate for GSM Evolution
  • UMTS Universal Mobile Telecommunications System
  • LTE Long Term Evolution
  • the RAN 22 is coupled to a transport node 24 , which in turn is coupled to a gateway (GW) 26 .
  • GW gateway
  • the gateway 26 may be a Gateway GPRS Support Node (GGSN) providing a connection of GPRS-based services to one or more external packet data networks.
  • GGSN Gateway GPRS Support Node
  • SAE GW System Architecture Evolution Gateway
  • the mobile communication network includes a policy controller 30 , which is implemented as a Policy and Charging Rules Function (PCRF) according to the 3GPP TSs.
  • the policy controller 30 may be implemented by dedicated hardware and/or comprise software functions executed by a processor.
  • the gateway 26 and the policy controller 30 are typically regarded as components of a core network.
  • the policy controller 30 communicates with the gateway 26 ′ via a signaling path 6 , which may be implemented using the Gx interface according to the 3GPP TSs.
  • the policy controller 30 may be further coupled to a subscription database 32 and to a service policy database 34 via a signaling path 8 , e.g. implemented using a Sp interface according to the 3GPP TSs.
  • the policy controller 30 may thus receive policy data relating to a specific user and/or relating to a specific service available in the mobile communication network, e.g. mobile TV.
  • the policy controller 30 may further communicate with other network functions using a control signaling path 5 , which may be implemented using the Rx interface according to the 3GPP TSs.
  • the policy controller 30 may comprise a filter generator 35 .
  • the filter generator 35 is adapted to specify packet filters to be used in the UE 10 and the gateway 26 , which may be accomplished on the basis of subscription data from the subscription database 32 , service policies from the service policy database 34 , and control data received via the signaling path 5 .
  • the packet filters are an example of packet classification rules, which in the illustrated example are used to provide different QoS service levels depending on the traffic class. In other examples, packet filters or other packet classification rules could be used to differentiate between different ways of charging, to selectively block certain traffic classes, which may also be referred to as gating, or to selectively redirect certain traffic classes.
  • data traffic between the network and the user equipment 10 is carried by a number of bearers 52 , 54 .
  • the data traffic typically pertains to one or more client/peer applications 12 running on the UE 10 .
  • the bearers 52 , 54 are established between the user equipment 10 and the gateway 26 .
  • the bearers 52 , 54 carry data traffic in both the DL and the UL direction, i.e. may also be regarded as being formed of a DL bearer and a UL bearer.
  • the UE 10 is provided with a corresponding interface 15 which allows for receiving incoming data packets from the bearers 52 , 54 and sending outgoing data packets on the bearers 52 , 54 .
  • the gateway 26 is provided is provided with a corresponding interface 25 which allows for receiving incoming data packets from the bearers 52 , 54 and sending outgoing data packets on the bearers 52 , 54 .
  • the bearers 52 , 54 may include a default bearer 52 generally established for offering packet-based services to the user equipment 10 and one or more dedicated bearer 54 which may have different QoS level, e.g. a higher or lower QoS level, than the default bearer.
  • the default bearer 52 is typically established when the UE 10 attaches to the gateway 26 .
  • the dedicated bearer is typically established on demand, e.g. when data packets requiring a certain QoS level need to transmitted.
  • Each bearer 52 , 54 may be associated with a corresponding QoS profile.
  • the QoS profile may be defined through parameters such as a QoS Class Identifier (QCI), an Allocation/Retention Priority (ARP), a Traffic Handling Priority (THP), a Maximum Bit Rate (MBR), an Aggregate Maximum Bit Rate (AMBR), and/or a Guaranteed Bit Rate (GBR).
  • QCI QoS Class Identifier
  • ARP Allocation/Retention Priority
  • TTP Traffic Handling Priority
  • MRR Maximum Bit Rate
  • AMBR Aggregate Maximum Bit Rate
  • GBR Guaranteed Bit Rate
  • the data packets are routed to a desired bearer 52 , 54 using correspondingly configured packet classification rules in the form of UL packet filters 62 , 64 .
  • the data packets are routed to the desired bearers 52 , 54 using correspondingly configured packet classification rules in the form of DL packet filters 72 , 74 .
  • a set of filters 62 , 64 , 72 , 74 which operates to direct the data packets to a corresponding bearer may also be referred to as a TFT.
  • Parameters of the QoS profile may be signaled from the policy controller 30 to the gateway 26 using the signaling path 6 .
  • the DL packet filters 72 , 74 to be used in the gateway 26 may be signaled from the policy controller 30 to the gateway 26 via the signaling path 6 .
  • the UL packet filters 62 , 64 used in the UE 10 these may be signaled from the policy controller 30 via the gateway 26 .
  • these concepts are applied with respect to the differentiation between traffic classes in the UE 10 and in the gateway 26 , where the data packets are directed to the bearers 52 , 54 using the packet filters 62 , 64 , 72 , 74 .
  • These packet filters 62 , 64 , 72 , 74 are generally configured to operate on the basis of network addresses, which are included in a respective protocol header of the data packets.
  • the protocol header when using the Transport Control Protocol (TCP) or the User Datagram Protocol (UDP) for implementing transport of data via the data packets, the protocol header will include IP addresses defining a source network address and a destination network address of the data packet, which can be used separately or in combination as a basis for matching a filter pattern defined in the packet filter 62 , 64 , 72 , 74 .
  • IP addresses defining a source network address and a destination network address of the data packet, which can be used separately or in combination as a basis for matching a filter pattern defined in the packet filter 62 , 64 , 72 , 74 .
  • the above examples of a protocol header will also define a source port number and a destination port number, which can be used separately or in combination as a basis for matching a filter pattern defined in the packet filter 62 , 64 , 72 , 74 .
  • the packet filters 62 , 64 , 72 , 74 may operate on the basis of a pattern for matching an IP 5 tuple (source IP address, destination IP address, source port number, destination port number, protocol. ID of the protocol above IP) of the data packets. Further, the packet filters may operate on a filter pattern in which an IP address is be combined with a prefix mask, and/or port numbers are be specified as port ranges. The filter pattern can also be extended by the Type of Service (TOS) (IPv4)/Traffic class (IPv6) and Mask.
  • TOS Type of Service
  • IPv6 Traffic class
  • Mask Mask
  • the filter pattern can also consist of the destination IP address, protocol ID of the protocol above IP, the Type of Service (TOS) (IP Version 4)/Traffic class (IP Version 6) and Mask and the IPSec Security Parameter Index (SPI).
  • the filter pattern can also consist of the destination IP address, the Type of Service (TOS) (IPv4)/Traffic class (IPv6) and Mask and the Flow Label (IPv6).
  • a value left unspecified in the filter pattern packet filter 62 , 64 , 72 , 74 may match any value of the corresponding information in the data packet, i.e., wildcards may be defined.
  • the information in the protocol headers of data packets will vary considerably due to the fact that the data packets may be communicated with any host, and the network address used by this host may be any network address from the available public address space. Irrespective of significant differences in the information of the protocol headers, data packets may still belong to the same traffic class, e.g., a traffic class for which in the example of FIG. 1 the data packets should be directed to the same bearer 52 , 54 .
  • the network address translation will be based on a mapping of external addresses to corresponding replacement network addresses.
  • the mapping between external network addresses and replacement network addresses may be dynamically generated, e.g., in response to detecting data traffic of a certain class.
  • the mapping may also be preconfigured, e.g. by a network operator.
  • the network address translation is based on the same mapping of the external network address to a corresponding replacement network address.
  • the communication system of FIG. 1 further includes a traffic adaptation device (TAD) 100 .
  • the traffic adaptation device 100 is arranged at an interface to the network section in which differentiated handling is performed, in the illustrated embodiment at the interface to a network section including the UE 10 , the RAN 22 , the transport node 24 , and the gateway 26 .
  • the traffic adaptation device 100 is coupled to receive UL traffic coming from the gateway 26 and to receive DL traffic going to the gateway 26 .
  • the traffic adaptation device 100 may be part of the gateway 26 .
  • the traffic adaptation device 100 could also be implemented within other network devices or as a standalone network device.
  • the traffic adaptation device 100 is provided with a traffic class detector (TCD) 110 and a network address translator (NAT) 120 .
  • the traffic class detector 110 and the network address translator 120 may be implemented by software by having a processor (not illustrated in FIG. 1 ) of the traffic adaptation device 100 execute suitably configured program code.
  • the traffic class detector 110 and/or the network address translator 120 could also at least in part be implemented by dedicated hardware.
  • the traffic class detector 110 is operable to determine a traffic class of data packets in the UL or DL traffic.
  • the traffic class detector 110 may analyze data packets of the UL or DL traffic, e.g., with respect to information in the protocol header of the data packets, such as source and/or destination network addresses or port numbers.
  • the traffic class detector 110 may also analyze certain messages which are typically transmitted when setting up or preparing the transmission of the data packets, e.g., Domain Name System (DNS) messages, in particular DNS queries or responses to DNS queries, or messages of a signaling protocol, e.g., messages of the Session Initiation Protocol (SIP), or the like. These messages may also be referred to as setup messages.
  • DNS Domain Name System
  • SIP Session Initiation Protocol
  • a setup message may initiate the transfer of content by the data packets, e.g., if the setup message is a SIP request.
  • a setup message may also request protocol information to be used for transmitting the data packets, such as source or destination network addresses to be included into the protocol headers of the data packets, e.g., if the setup message is a DNS query.
  • a setup message may also convey such protocol information, e.g., if the setup message is a response to a DNS query.
  • the network address translator 120 is operable to subject data packets incoming data packets, i.e., in the illustrated example the DL data packets to be transmitted from the gateway 26 to the UE 10 , to network address translation by replacing the external source network addresses of the data packets with the corresponding replacement network addresses.
  • the external destination network addresses of the data packets are maintained by the network address translation. Accordingly, the network address translation can be accomplished without modifying the destination network address.
  • the UE 10 can be addressed using its external network address, while the replacement network addresses can be used by the DL packet filters 72 , 74 for efficiently directing the DL data packets to the desired bearer 52 , 54 , without otherwise affecting the routing of the DL data packets from the network address translator 120 to the UE 10 .
  • the network address translation could also replace the destination network addresses of the DL data packets, i.e., the external network address used by the UE 10 , with a corresponding replacement network address.
  • the routing of the DL data packets from the network address translator 120 to the UE 10 could be based on the replacement network address corresponding to the external network address of the UE 10 .
  • the UE 10 can identify itself as sender of the UL data packets by using its external network address, while the replacement network addresses can be used by the UL packet filters 62 , 64 for efficiently directing the UL data packets to the desired bearer 52 , 54 .
  • the network address translation could also replace the source network address of the UL data packets, in FIG. 1 the external network address used by the UE 10 , with a corresponding replacement network address.
  • the operation of the network address translator 120 concerning the outgoing data packets is substantially inverse with respect to the operation of the network address translator 120 concerning the incoming data packets, which is obtained by using the same mapping between external network addresses and replacement network addresses.
  • FIG. 2 schematically illustrates an exemplary replacement table 200 used for defining a mapping between external network addresses and replacement network addresses.
  • both the external network addresses and the replacement network addresses include network addresses from the IPv4 address space an further include port numbers.
  • the external network addresses are public addresses, whereas the replacement network addresses are from a private subnet of the total address space.
  • a one-to-one mapping is defined between the external network addresses and the replacement network addresses.
  • a packet classification rule which identifies data packets on the basis of the IP address range as used for the illustrated replacement network addresses, e.g., the IP address range from “10.1.1.23” to “10.1.1.25”.
  • a packet classification rule could be defined which operates on the basis of a wildcard, e.g., identifies data packets in which the replacement network address matches the pattern “10.1.1.X”, where X is a wildcard placeholder matching any possible value in the replacement network addresses of the data packets.
  • FIG. 3 schematically illustrates a further exemplary replacement table 200 ′ used for defining a mapping between external network addresses and replacement network addresses.
  • both the external network addresses and the replacement network addresses include network addresses from the IPv4 address space an further include port numbers.
  • the external network addresses are public addresses, whereas the replacement network addresses are from a private subnet of the total address space.
  • a one-to-one mapping is defined between the external network addresses and the replacement network addresses. Accordingly, the network address translation on incoming data packets will always replace an external source address with the corresponding replacement network address, and the network address translation on the outgoing data packets can retranslate this replacement network address to the original external network address.
  • FIG. 3 schematically illustrates a further exemplary replacement table 200 ′ used for defining a mapping between external network addresses and replacement network addresses.
  • both the external network addresses and the replacement network addresses include network addresses from the IPv4 address space an further include port numbers.
  • the external network addresses are public addresses, whereas the replacement network addresses are from a private subnet
  • the traffic class detector 110 when it detects data packets of a certain traffic class, it may select an available replacement network address to be used by the network address translator 120 in the process of network address translation.
  • the network address translator 120 For DL data packets, the network address translator 120 replaces the source network address with the replacement network address.
  • the replacement network address will already be in place of the destination network address, and the network address translator replaces the replacement network address with the corresponding external network address, which can then be used outside the network section to route the UL data packet to its destination.
  • the selection of the replacement network address may be stored, thereby dynamically generating the replacement mapping data.
  • the traffic adaptation device 100 may then initiate generation of packet classification rules, e.g., one or more of the packet filters 62 , 64 , 72 , 74 , operating on the basis of the selected replacement network address.
  • the traffic adaptation device 100 could trigger the policy controller 30 to setup the corresponding bearer 52 , 54 , e.g., a dedicated bearer for premium traffic or a dedicated bearer for trash traffic. This could be accomplished using the signaling path 5 , which may be implemented using the Rx interface according to the 3GPP TSs.
  • the traffic adaptation device 100 could also provide the policy controller 30 with the replacement network address, e.g., private IP address and port number, which can then be used by the filter generator 35 of the policy controller 30 to generate the packet classification rules, e.g., one or more of the packet filters 62 , 64 , 72 , 74 . These may then be signaled to the gateway 26 using the signaling path 6 , which may be implemented using the Gx interface according to the 3GP TSs.
  • the replacement network address e.g., private IP address and port number
  • the replacement mapping data could at least in part be preconfigured.
  • external network addresses which are known to be associated with a certain traffic class, e.g., cache servers or edge servers used by certain service or content providers, could be configured into the mapping data by a network operator.
  • the traffic adaptation device 100 could then operate without requiring explicit detection of the traffic class and dynamic selection of the replacement network address on the basis of the detected traffic class. Rather, the preconfigured replacement mapping data would reflect the association of the external network address to the replacement network address and thereby to the corresponding traffic class.
  • connection handshake in the beginning of each TCP session.
  • the TCP sender first sends a connection setup request (also referred to as aSYN packet), and the TCP receiver responds to that with a setup accept (also referred to as a SYN-ACK packet).
  • a connection setup request also referred to as aSYN packet
  • a setup accept also referred to as a SYN-ACK packet
  • the traffic class detector 110 is capable of detecting the traffic class already for the first DL data packet of a connection initiated from the network side.
  • the network address translation performed by the network address translator 120 can then already be applied to the DL data packet including the connection setup request and will be further applied to all subsequent UL or DL data packets of this session. Changes of the source network address from the external network address to the replacement network address during the session, can therefore be avoided.
  • One way to allow the network address translation to be applied already to the first DL data packet of a network initiated session is to use preconfigured external network addresses in the replacement mapping data, or to preconfigure the traffic class detector 110 with the external network addresses associated with a certain traffic class.
  • a further way to allow the network address translation to be applied already to the first DL data packet of a network initiated session is to use self-learning of the external addresses and their associated traffic class.
  • the traffic class detector 110 may learn from traffic inspection which external network addresses are associated with certain traffic classes, e.g., are to be considered as premium or trash traffic, and remembers these external network addresses. This acquired knowledge then be applied to subsequent sessions.
  • a still further way to allow the network address translation to be applied already to the first DL data packet of a network initiated session is to inspect setup messages transmitted in preparation of the session.
  • the traffic class detector 110 may learn from inspecting the setup messages, e.g. messages of a signaling protocol such as SIP, DNS messages, or the like, whether the subsequent associated user plane traffic, e.g., a TCP or UDP session, into which traffic class the data packets of this session should be classified.
  • a network label e.g., a hostname or a domain name may be extracted from the setup message and compared to one or more stored network labels which are indicative of certain traffic classes.
  • FIG. 4 An example of a signal flow in which a setup message in the form of a DNS query is used to detect the traffic class of a subsequent session is depicted in FIG. 4 .
  • the signaling flow involves the UE 10 , the traffic adaptation device 100 , a local DNS server 50 , an external DNS server 60 , and a domain DNS server 70 .
  • the UE 10 sends a DNS query 401 to the local DNS server 50 .
  • the DNS query 401 requests a network address for a network label, e.g., a hostname or a domain name, as specified in the DNS query 401 .
  • the traffic class detector 110 of the traffic adaptation device 100 monitors the DNS query 401 . For example, this monitoring may involve extracting the network label from the message 401 and comparing the extracted network label to one or more stored network labels, e.g., store hostnames or stored domain names, which are indicative of data traffic of a certain traffic class. If there is a match at step 402 , the traffic class detector 110 may conclude that the traffic with respect to the requested network address belongs to the traffic class indicated by the stored network label.
  • the local DNS server 50 When now assuming that the local DNS server 50 does not know the requested network address, it issues a further DNS query 403 to a first external DNS server 60 , which may be a root DNS server.
  • the external DNS server 60 may then return a message 404 including a network address of a still further external DNS server 70 which knows the requested external network address, e.g., a DNS server which is authoritative for the domain of the network label specified in the DNS query 401 .
  • the local DNS server 50 then issues a further DNS query 405 to the external DNS server 70 , which then responds with a message 406 including the requested network address.
  • the local DNS server then sends a message 407 with the requested network address to the UE 10 so as to respond to the original DNS query 401 .
  • the traffic class detector 110 of the traffic adaptation device 100 monitors the message 407 and extracts the requested network address therefrom.
  • the traffic adaptation device 100 may then select a replacement network according to the detected traffic class and add the selected replacement address with the extracted network address to the replacement mapping data so as to be used for performing network address translation on subsequently transmitted DL and UL data packets.
  • the subsequently transmitted first DL packet 409 of the session established with respect to the external network address will then, at step 410 , be subjected to network address translation by the network address translator 120 of the traffic adaptation device 100 .
  • the network address translator 120 will replace the external network address indicating the source of the data packet 409 , with the selected replacement network address.
  • the adapted data packet 411 with the replaced source address is then forwarded to the UE 10 .
  • the first UL data packet including the connection setup request would need to be generated by the UE 10 already using the correct replacement network address in place of the destination network address.
  • One way to have the correct replacement network address already in the first UL data packet of a session initiated from the UE 10 is to inspect setup messages transmitted in preparation of the session.
  • the traffic class detector 110 may learn from inspecting the setup messages, e.g., messages of a signaling protocol such as SIP, DNS messages, or the like, into which traffic class the data packets of the subsequent associated user plane traffic, e.g., a TCP or UDP session, should be classified.
  • a network label e.g., a hostname or a domain name may be extracted from the setup message and compared to one or more stored network labels which are indicative of certain traffic classes.
  • FIG. 5 An example of a signal flow in which a setup message in the form of a DNS query is used to detect the traffic class of a subsequent session is depicted in FIG. 5 . Similar to FIG. 4 , the signaling flow involves the UE 10 , the traffic adaptation device 100 , a local DNS server 50 , an external DNS server 60 , and a domain DNS server 70 .
  • the UE 10 sends a DNS query 501 to the local DNS server 50 .
  • the DNS query 501 requests a network address for a network label, e.g., a hostname or a domain name, as specified in the DNS query 501 .
  • the traffic class detector 110 of the traffic adaptation device 100 monitors the DNS query 501 . For example, this monitoring may involve extracting the network label from the message 501 and comparing the extracted network label to one or more stored network labels, e.g., stored hostnames or stored domain names, which are indicative of data traffic of a certain traffic class. If there is a match at step 502 , the traffic class detector 110 may conclude that the traffic with respect to the requested network address belongs to the traffic class indicated by the stored network label.
  • the local DNS server 50 When now assuming that the local DNS server 50 does not know the requested network address, it issues a further DNS query 503 to a first external DNS server 60 , which may be a root DNS server.
  • the external DNS server 60 may then return a message 504 including a network address of a still further external DNS-server 70 which knows the requested external network address, e.g., a DNS server which is authoritative for the domain of the network label specified in the DNS query 501 .
  • the local DNS server 50 then issues a further DNS query 505 to the external DNS server 70 , which then responds with a message 506 including the requested network address.
  • the local DNS server then sends a message 507 with the requested network address to the UE 10 so as to respond to the original DNS query 501 .
  • the packet class detector 110 of the traffic adaptation device 100 receives the message 507 and extracts the requested network address therefrom.
  • the traffic adaptation device 100 may then select a replacement network according to the detected traffic class and add the selected replacement address with the extracted network address to the replacement mapping data so as to be used for performing network address translation.
  • the traffic adaptation device 100 also modifies the message 507 by replacing the network address returned in the message 507 with the selected replacement network address.
  • the modified message 509 is then forwarded to the UE 10 .
  • the subsequently transmitted first UL data packet 510 of the session established with the external network address will then carry the replacement network address in place of its destination address.
  • the first UL data packet 510 is subjected to network address translation by the network address translator 120 of the traffic adaptation device 100 .
  • the network address translator 120 will replace the replacement network address with the corresponding external network address.
  • the data packet 512 with the replaced destination address is then forwarded to the network.
  • FIG. 6 further illustrates an exemplary implementation of the traffic adaptation device 100 .
  • the traffic adaptation device 100 includes an external interface 130 configured to receive DL traffic to be transmitted to UE 10 and to forward UL traffic coming from the UE 10 .
  • the external interface 130 is a bidirectional interface.
  • the traffic adaptation device may be a unidirectional interface for receiving the DL traffic to be transmitted to the UE 10 .
  • the traffic adaptation device 100 is configured for adaptation of UL traffic only, the external interface 130 may be a unidirectional interface for forwarding the UL traffic from the UE 10 .
  • the traffic adaptation device 100 also includes an internal interface 135 with respect to the network section in which differentiated handling of network traffic is provided.
  • the internal interface is configured to receive the UL traffic coming from the UE 10 and to forward the DL traffic to the UE 10 .
  • the internal interface 135 is a bidirectional interface.
  • the traffic adaptation device is configured for adaptation of DL traffic only
  • the internal interface 135 may be a unidirectional interface for forwarding the DL traffic to the UE 10 .
  • the traffic adaptation device 100 is configured for adaptation of UL traffic only
  • the internal interface 135 may be a unidirectional interface for receiving the UL traffic coming from the UE 10 .
  • the traffic adaptation device 100 may also be provided with a control interface 140 , which can be used to provide indications to other entities, e.g., to initiate generation of packet filters by signaling to the policy controller 30 and/or to the gateway 26 , and/or to initiate control processes with respect to forwarding procedures of data packets, e.g., modification and/or establishment of the bearers 52 , 54 .
  • the control interface 140 may be implemented as the Rx interface according to the 3GPP TSs. Further, the interface 140 may also be used to obtain replacement mapping data, traffic class detection data, and/or or other data from which the replacement mapping data or traffic class detection data may be derived.
  • the traffic adaptation device 100 includes a processor 150 coupled to the interfaces 130 , 135 , 140 and a memory 160 coupled to the processor 150 .
  • the memory 160 may include a read-only memory (ROM), e.g. a flash ROM, a random-access memory (RAM), e.g. a Dynamic RAM (DRAM) or static RAM (SRAM), a mass storage, e.g. a hard disk or solid state disk, or the like.
  • ROM read-only memory
  • RAM random-access memory
  • DRAM Dynamic RAM
  • SRAM static RAM
  • the memory 160 includes suitably configured program code to be executed by the processor 150 so as to implement the above-described functionalities of the traffic adaptation device 100 .
  • the memory 160 may include a traffic class detection module 170 so as to implement the above-described mechanisms of traffic class detection used by the traffic class detector 110 , traffic class detection data 175 to be used in the process of traffic class detection, a network address translation module 180 so as to implement the above functionalities of network address translation as performed by the network address translator 120 , and replacement mapping data 185 to be used in the network address translation process, e.g., stored in the form of a table as illustrated in FIG. 2 or 3 .
  • a traffic class detection module 170 so as to implement the above-described mechanisms of traffic class detection used by the traffic class detector 110
  • traffic class detection data 175 to be used in the process of traffic class detection
  • a network address translation module 180 so as to implement the above functionalities of network address translation as performed by the network address translator 120
  • replacement mapping data 185 to be used in the network address translation process, e.g., stored in the form of a table as illustrated in FIG. 2 or 3 .
  • the structure as illustrated in FIG. 6 is merely schematic and that the traffic adaptation device 100 may actually include further components which, for the sake of clarity, have not been illustrated, e.g. further interfaces.
  • the memory 150 may include further types of program code modules, which have not been illustrated, e.g., program code modules for implementing functionalities obtaining or generating the traffic class detection data, e.g., a learning module.
  • a computer program product may be provided for implementing concepts according to embodiments of the invention, e.g., a computer-readable medium storing the program code to be stored in the memory 160 .
  • FIG. 7 shows a flowchart for schematically illustrating a method 700 of processing network traffic according to an embodiment of the invention.
  • the method may be used to implement processing of incoming data packets: entering a network section, e.g., using the above-described traffic adaptation device 100 .
  • an incoming data packet is received, e.g., using the external interface 130 of the traffic adaptation device 100 as illustrated in FIG. 6 .
  • the incoming data packet is to be transmitted into a network section in which differentiated handling of network traffic is provided, e.g., with respect to QoS, charging, gating, or redirection.
  • the data packet includes a source network address, which typically indicates a source of the data packet outside the network section.
  • an optional step of detecting the traffic class of the data packet is performed, e.g., by the traffic class detector 110 of the traffic adaptation device 100 as illustrated in FIG. 1 .
  • the traffic class may be detected on the basis of stored external network addresses by matching a source network address of the incoming data packet to one of the stored network addresses.
  • the traffic class could also be detected by inspecting a message transmitted in preparation of transmitting the incoming data packet, e.g., a message of a signaling protocol such as SIP or a DNS message.
  • network address translation is performed on the received data packet by replacing the source network address with a replacement network address.
  • the replacement network address is selected according to a traffic class of the data packet, e.g., the traffic class as optionally detected at step 720 .
  • the replacement network address may be selected from a private network address range.
  • differentiated handling of the data packet is performed in the network section. This is accomplished on the basis of the replacement network address.
  • one or more packet classification rules e.g., packet filters, operating on the basis of the replacement network address may be provided in the network section.
  • dynamic generation of the packet classification rules may be initiated in response to detecting the traffic class of the data packet.
  • FIG. 8 shows a flowchart for schematically illustrating a further method 800 of processing network traffic according to an embodiment of the invention.
  • the method may be used to implement processing of outgoing data packets leaving a network section, e.g., using the above-described traffic adaptation device 100 .
  • differentiated handling of the outgoing data packet is performed in the network section. This is accomplished on the basis of a replacement network address included in the outgoing data packet in place of a destination network address of the data packet.
  • the replacement network address is selected according to a traffic class of the data packet. For example, the replacement network address may be selected from a private network address range.
  • the destination network address and the replacement network address may be related to each other by replacement mapping data, e.g., generated in response to detecting the traffic class of the data packet or of other data packets.
  • one or more packet classification rules e.g., packet filters, operating on the basis of the replacement network address may be provided in the network section.
  • dynamic generation of the packet classification rules may be initiated in response to detecting the traffic class of the data packet, e.g., by the traffic class detector 110 . As explained above, this detection may be accomplished on the basis of a setup message preceding transmission of the outgoing data packet. Further, such a setup message may also be modified so as to ensure that the outgoing data packet uses the correct replacement network address in place of its destination network address even if the outgoing data packet is the first data packet of a session.
  • the differentiated handling may be, e.g., with respect to QoS, charging, gating, or redirection.
  • the outgoing data packet is received so as to be adapted for transmission from the network section. This may be accomplished using the internal interface 135 of the traffic adaptation device 100 as illustrated in FIG. 6 .
  • step 830 network address translation is performed on the received data packet by replacing the replacement network address with the destination network address of the data packet.
  • the data packet with the replaced destination address may then be forwarded so as to be routed to its destination on the basis of the destination network address.
  • the methods of FIGS. 7 and 8 may also be combined with each other by applying network address translation in the illustrated manner to both incoming and outgoing data packets. In this way, compatibility to protocols using bidirectional exchange of data packets can be provided. Also it is to be understood that in some embodiments the above-described concepts could be applied to unidirectional traffic by adapting only the incoming data packets or only the outgoing data packets.
  • the concepts could be used in other types of communication network which benefit from differentiated handling of traffic classes, e.g., in IP based networks in general.
  • other mechanisms than bearer assignments may be used for adapting the QoS level.
  • Differentiated Services Code Point Fields of the data packets could be set in order to adapt the QoS level.
  • the concepts may be applied to any number of different traffic classes.
  • differentiated handling may also be accomplished with respect to charging, gating, or redirection of data packets.
  • the above-described concepts could be applied to unidirectional traffic by adapting only the incoming data packets or only the outgoing data packets. Further, it is to be understood that the above concepts may be implemented by using correspondingly designed software in existing network devices, or by using dedicated network device hardware.

Abstract

In order to allow efficient differentiated handling of network traffic in a network section, a network address translator (120) performs network address translation on incoming data packets to be transmitted into the network section and/or on outgoing data packets transmitted from the network section. In the incoming data packets, the network address translation replaces a source network address with a replacement network address. In the outgoing data packets, a replacement network address is included in place of a destination address, and the network address translation replaces the replacement network address with the destination network address. In each case, the replacement network address is selected according to a traffic class of the data packet. In the network section, differentiated handling of the data packets on the basis of the replacement network address is provided.

Description

    TECHNICAL FIELD
  • The present invention relates to methods for differentiated handling of network traffic and to corresponding network devices.
  • BACKGROUND
  • In communication networks, differentiated handling of network traffic may be used to distinguish between different classes of network traffic. For example, a forwarding treatment of data packets, i.e., the way of forwarding a data packet on the way towards its destination, may be controlled to provide a certain Quality of Service (QoS) level, which depends on the traffic class. In other examples, the handling of the network traffic may also be differentiated with respect to charging, i.e., one traffic class could be charged, in a different manner than another. Typically, traffic classification rules, e.g. packet classification rules, are defined so as to implement the differentiation between different types of network traffic.
  • For example, in mobile communication networks network traffic related to a specific service may be directed to a bearer offering a certain QoS level. In this respect, a bearer is considered to be an information transmission context or path of defined characteristics, e.g. capacity, delay and/or bit error rate. Typically, a number of bearers will be established between a gateway of a mobile communication network and a user equipment (UE), e.g. a mobile phone or other type of mobile terminal. A bearer may carry downlink (DL) data traffic in a direction from the network to the user equipment, and may carry data traffic in an uplink (UL) direction from the user equipment to the network. In the gateway and in the user equipment the data traffic, which includes a plurality of IP data packets (IP: “Internet Protocol”, which may be the IP Version 4, also referred to as IPv4, or the IP Version 6, also referred to as IPv6) can be filtered, e.g. using IP 5-tuple packet filters, thereby directing the IP data packets to a desired bearer. According to the 3GPP (Third Generation Partnership Project) Technical Specifications (TSs) 23.060 and 24.301, a set of packet filters used to direct the data traffic to a certain bearer is also referred to as a Traffic Flow Template (TFT). In this context, the TFT can be considered as an example of a packet classification rule.
  • Differentiated handling of network traffic may also be useful in other types of communication network environment, e.g. using fixed access technology such as DSL (Digital Subscriber Line), fibre optical access or coaxial cable access.
  • However, in some scenarios rather complex traffic classification rules need to be defined in order to achieve the desired differentiation. This may specifically be problematic when considering that in some communication network environments there exist limits on the complexity of the traffic classification rules. For example, the 3GPP TSs limit the maximum number of packet filters which can be installed in a TFT of the UE.
  • Accordingly, there is a need for techniques which allow for efficiently differentiating between different traffic classes.
  • SUMMARY
  • According to an embodiment of the invention, a method of processing network traffic is provided. According to the method, an incoming data packet to be transmitted into a network section is received. The incoming data packet includes a source network address. The received data packet is then subjected to network address translation by replacing the source network address with a replacement network address. The replacement network address is selected according to a traffic class of the data packet. In the network section, differentiated handling of the data packet on the basis of the replacement network address is provided.
  • According to a further embodiment of the invention, a method of processing network traffic is provided. According to the method, an outgoing data packet transmitted from a network section is received. The outgoing data packet includes a replacement network address in place of a destination network address of the data packet. The replacement network address is selected according to a traffic class of the data packet. The received data packet is subjected to network address translation by replacing the replacement network address with the destination network address. In the network section, differentiated handling of the data packet on the basis of the replacement network address is provided.
  • According to a further embodiment of the invention, a network device is provided. The network device is provided with an interface configured to receive an incoming data packet to be transmitted into a network section. The incoming data packet includes a source network address. Further, the network device includes a network address translator configured to perform network address translation on the received data packet. The process of network address translation includes replacing the source network address with a replacement network address. The replacement network address is selected according to a traffic class of the data packet. In the network section, differentiated handling of the data packet on the basis of the replacement network address is provided.
  • According to a further embodiment of the invention, a network device is provided. The network device is provided with an interface configured to receive an outgoing data packet transmitted from a network section. The outgoing data packet includes a replacement network address in place of a destination network address of the data packet. The replacement network address is selected according to a traffic class of the data packet. Further, the network device includes a network address translator configured to perform network address translation on the received data packet. The process of network address translation includes replacing the replacement network address with the destination network address of the data packet. In the network section, differentiated handling of the data packet on the basis of the replacement network address is provided.
  • According to further embodiments, other methods; devices, or computer program products for implementing the methods may be provided.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 schematically illustrates a communication system in which concepts according to embodiments of the invention are implemented.
  • FIG. 2 schematically illustrates an example of a table for mapping network addresses to replacement network addresses.
  • FIG. 3 schematically illustrates a further example of a table for mapping network addresses to replacement network addresses.
  • FIG. 4 shows a signaling diagram for illustrating an exemplary scenario in which differentiated handling of network traffic according town embodiment of the invention can be applied.
  • FIG. 5 shows a signaling diagram for illustrating a further exemplary scenario in which differentiated handling of network traffic according to an embodiment of the invention can be applied.
  • FIG. 6 schematically illustrates a network device according to an embodiment of the invention.
  • FIG. 7 shows a flowchart for illustrating a method according to an embodiment of the invention.
  • FIG. 8 shows a flowchart for illustrating a further method according to an embodiment of the invention.
  • DETAILED DESCRIPTION OF EMBODIMENTS
  • In the following, the invention will be explained in more detail by referring to exemplary embodiments and to the accompanying drawings. The illustrated embodiments relate to concepts for differentiated handling of network traffic. As illustrated in FIG. 1, the concepts are applied in a mobile communication network according to the 3GPP TSs. However, it is to be understood that the illustrated concepts may be applied in other types of communication network as well, e.g. using fixed access technology such as DSL, fiber optical access, or coaxial cable access.
  • FIG. 1 schematically illustrates a communication network environment in which concepts according to embodiments of the invention the invention can be applied.
  • The communication network environment includes a UE 10, which may also be referred to as a terminal, and a number of network components 22, 24, 26, 30. Among these network components there is a Radio Access Network (RAN) 22. The RAN 22 is based on a certain type or certain types of radio access technology, e.g. GSM (Global System for Mobile Communications), EDGE (Enhanced Data Rate for GSM Evolution), UMTS (Universal Mobile Telecommunications System) or LTE (Long Term Evolution). Although the RAN 22 is illustrated as a single node, it is to be understood that the RAN 22 may actually be formed of a number of components, which are not further explained herein. The RAN 22 is coupled to a transport node 24, which in turn is coupled to a gateway (GW) 26. Here, it is to be understood that alternatively more than one transport node 24 may be coupled between the RAN 22 and the gateway 26 or that the RAN 22 may be directly coupled to the gateway 26. The gateway 26 may be a Gateway GPRS Support Node (GGSN) providing a connection of GPRS-based services to one or more external packet data networks. The gateway 26 may also be a System Architecture Evolution Gateway (SAE GW) according to the 3GPP TSs.
  • In addition, the mobile communication network includes a policy controller 30, which is implemented as a Policy and Charging Rules Function (PCRF) according to the 3GPP TSs. The policy controller 30 may be implemented by dedicated hardware and/or comprise software functions executed by a processor. The gateway 26 and the policy controller 30 are typically regarded as components of a core network. The policy controller 30 communicates with the gateway 26′ via a signaling path 6, which may be implemented using the Gx interface according to the 3GPP TSs. The policy controller 30 may be further coupled to a subscription database 32 and to a service policy database 34 via a signaling path 8, e.g. implemented using a Sp interface according to the 3GPP TSs. The policy controller 30 may thus receive policy data relating to a specific user and/or relating to a specific service available in the mobile communication network, e.g. mobile TV. The policy controller 30 may further communicate with other network functions using a control signaling path 5, which may be implemented using the Rx interface according to the 3GPP TSs.
  • Among other functions, the policy controller 30 may comprise a filter generator 35. The filter generator 35 is adapted to specify packet filters to be used in the UE 10 and the gateway 26, which may be accomplished on the basis of subscription data from the subscription database 32, service policies from the service policy database 34, and control data received via the signaling path 5. The packet filters are an example of packet classification rules, which in the illustrated example are used to provide different QoS service levels depending on the traffic class. In other examples, packet filters or other packet classification rules could be used to differentiate between different ways of charging, to selectively block certain traffic classes, which may also be referred to as gating, or to selectively redirect certain traffic classes.
  • As further illustrated, data traffic between the network and the user equipment 10 is carried by a number of bearers 52, 54. The data traffic typically pertains to one or more client/peer applications 12 running on the UE 10. The bearers 52, 54 are established between the user equipment 10 and the gateway 26. The bearers 52, 54 carry data traffic in both the DL and the UL direction, i.e. may also be regarded as being formed of a DL bearer and a UL bearer. For supporting bidirectional communication on the bearers 52, 54, the UE 10 is provided with a corresponding interface 15 which allows for receiving incoming data packets from the bearers 52, 54 and sending outgoing data packets on the bearers 52, 54. Similarly, the gateway 26 is provided is provided with a corresponding interface 25 which allows for receiving incoming data packets from the bearers 52, 54 and sending outgoing data packets on the bearers 52, 54. The bearers 52, 54 may include a default bearer 52 generally established for offering packet-based services to the user equipment 10 and one or more dedicated bearer 54 which may have different QoS level, e.g. a higher or lower QoS level, than the default bearer. The default bearer 52 is typically established when the UE 10 attaches to the gateway 26. The dedicated bearer is typically established on demand, e.g. when data packets requiring a certain QoS level need to transmitted. However, in some embodiments dedicated bearers may also established in advance, e.g., when the UE 10 attaches to the gateway 26. Each bearer 52, 54 may be associated with a corresponding QoS profile. The QoS profile may be defined through parameters such as a QoS Class Identifier (QCI), an Allocation/Retention Priority (ARP), a Traffic Handling Priority (THP), a Maximum Bit Rate (MBR), an Aggregate Maximum Bit Rate (AMBR), and/or a Guaranteed Bit Rate (GBR). Accordingly, a certain QoS level may be provided for communicating data packets between the UE 10 and the gateway 26 by assigning the data packets to a corresponding one of the bearers 52, 54.
  • In the UE 10, the data packets are routed to a desired bearer 52, 54 using correspondingly configured packet classification rules in the form of UL packet filters 62, 64. In the gateway 26, the data packets are routed to the desired bearers 52, 54 using correspondingly configured packet classification rules in the form of DL packet filters 72, 74. In accordance with the illustrated 3GPP scenario, a set of filters 62, 64, 72, 74 which operates to direct the data packets to a corresponding bearer may also be referred to as a TFT. Parameters of the QoS profile may be signaled from the policy controller 30 to the gateway 26 using the signaling path 6. Similarly, the DL packet filters 72, 74 to be used in the gateway 26 may be signaled from the policy controller 30 to the gateway 26 via the signaling path 6. As regards the UL packet filters 62, 64 used in the UE 10, these may be signaled from the policy controller 30 via the gateway 26.
  • In the following, concepts according to embodiments of the invention will be explained, which allow for efficiently differentiating between different traffic classes. In the example of FIG. 1, these concepts are applied with respect to the differentiation between traffic classes in the UE 10 and in the gateway 26, where the data packets are directed to the bearers 52, 54 using the packet filters 62, 64, 72, 74. These packet filters 62, 64, 72, 74 are generally configured to operate on the basis of network addresses, which are included in a respective protocol header of the data packets. For example, when using the Transport Control Protocol (TCP) or the User Datagram Protocol (UDP) for implementing transport of data via the data packets, the protocol header will include IP addresses defining a source network address and a destination network address of the data packet, which can be used separately or in combination as a basis for matching a filter pattern defined in the packet filter 62, 64, 72, 74. Moreover, the above examples of a protocol header will also define a source port number and a destination port number, which can be used separately or in combination as a basis for matching a filter pattern defined in the packet filter 62, 64, 72, 74. In some embodiments, the packet filters 62, 64, 72, 74 may operate on the basis of a pattern for matching an IP 5 tuple (source IP address, destination IP address, source port number, destination port number, protocol. ID of the protocol above IP) of the data packets. Further, the packet filters may operate on a filter pattern in which an IP address is be combined with a prefix mask, and/or port numbers are be specified as port ranges. The filter pattern can also be extended by the Type of Service (TOS) (IPv4)/Traffic class (IPv6) and Mask. The filter pattern can also consist of the destination IP address, protocol ID of the protocol above IP, the Type of Service (TOS) (IP Version 4)/Traffic class (IP Version 6) and Mask and the IPSec Security Parameter Index (SPI). The filter pattern can also consist of the destination IP address, the Type of Service (TOS) (IPv4)/Traffic class (IPv6) and Mask and the Flow Label (IPv6). In some embodiments, a value left unspecified in the filter pattern packet filter 62, 64, 72, 74 may match any value of the corresponding information in the data packet, i.e., wildcards may be defined.
  • Typically, the information in the protocol headers of data packets, in particular with respect the source and destination addresses, will vary considerably due to the fact that the data packets may be communicated with any host, and the network address used by this host may be any network address from the available public address space. Irrespective of significant differences in the information of the protocol headers, data packets may still belong to the same traffic class, e.g., a traffic class for which in the example of FIG. 1 the data packets should be directed to the same bearer 52, 54.
  • In order to reduce complexity of: the packet filters 62, 64, 72, 74, concepts according to embodiments of the invention as explained in the following are based on an adaptation of the data traffic upon entering or leaving a network section in which differentiated handling of the data traffic is provided. In this way, the data traffic can be brought into a form which facilitates the differentiated handling. More specifically, incoming data packets to be transmitted into the network section are subjected to network address translation in which source network addresses are replaced with replacement network addresses. Further, outgoing data packets leaving the network section are subjected to network address translation in which replacement network addresses are replaced with corresponding destination network addresses of the data packets. The replaced source or destination addresses are typically suitable for routing the data packets outside the network section and will in the following also be referred to as external network addresses. In some embodiments the external network addresses may be public network addresses from a total address space, e.g., include public IP version 4 (IPv4) addresses or public IP version 6 (Ipv6) addresses. As compared to that, the replacement network addresses, which are typically from the same total address space, do not need to be suitable for routing the data packets outside the network section, but merely locally within the network section. The replacement network addresses may then also be referred to as internal or local network addresses. In some embodiments the replacement network addresses may be private network addresses from the total address space, e.g., as defined in RFC 1918, RFC 4193, or RFC 5735. The replacement network addresses could also, be selected from a reserved special purpose address range of the total address range. Accordingly, the replacement network addresses may in other embodiments also be predefined public addresses, i.e. a first external address is then replaced by a second external address.
  • In the illustrated embodiments, the network address translation will be based on a mapping of external addresses to corresponding replacement network addresses. The mapping between external network addresses and replacement network addresses may be dynamically generated, e.g., in response to detecting data traffic of a certain class. In some embodiments, the mapping may also be preconfigured, e.g. by a network operator. In embodiments which are applicable to both data packets entering the network section and to data packets leaving the network section, the network address translation is based on the same mapping of the external network address to a corresponding replacement network address.
  • In the network section, differentiated handling of the data packets is performed on the basis of the replacement network addresses. In each case, the network address translation is based on a mapping of the external network address to a corresponding replacement network address. This mapping may be based on stored replacement mapping data, which may be dynamically generated, e.g., in response to detection data traffic of a certain class. In some embodiments, the replacement mapping data may also be preconfigured, e.g., by a network operator.
  • In order to implement the above concepts, the communication system of FIG. 1 further includes a traffic adaptation device (TAD) 100. The traffic adaptation device 100 is arranged at an interface to the network section in which differentiated handling is performed, in the illustrated embodiment at the interface to a network section including the UE 10, the RAN 22, the transport node 24, and the gateway 26. As illustrated, the traffic adaptation device 100 is coupled to receive UL traffic coming from the gateway 26 and to receive DL traffic going to the gateway 26. According to an embodiment of the invention, the traffic adaptation device 100 may be part of the gateway 26. However, the traffic adaptation device 100 could also be implemented within other network devices or as a standalone network device.
  • As illustrated, the traffic adaptation device 100 is provided with a traffic class detector (TCD) 110 and a network address translator (NAT) 120. The traffic class detector 110 and the network address translator 120 may be implemented by software by having a processor (not illustrated in FIG. 1) of the traffic adaptation device 100 execute suitably configured program code. As an alternative, the traffic class detector 110 and/or the network address translator 120 could also at least in part be implemented by dedicated hardware.
  • The traffic class detector 110 is operable to determine a traffic class of data packets in the UL or DL traffic. For this purpose, the traffic class detector 110 may analyze data packets of the UL or DL traffic, e.g., with respect to information in the protocol header of the data packets, such as source and/or destination network addresses or port numbers. In some embodiments, the traffic class detector 110 may also analyze certain messages which are typically transmitted when setting up or preparing the transmission of the data packets, e.g., Domain Name System (DNS) messages, in particular DNS queries or responses to DNS queries, or messages of a signaling protocol, e.g., messages of the Session Initiation Protocol (SIP), or the like. These messages may also be referred to as setup messages. As can be seen from the above-mentioned examples, a setup message may initiate the transfer of content by the data packets, e.g., if the setup message is a SIP request. A setup message may also request protocol information to be used for transmitting the data packets, such as source or destination network addresses to be included into the protocol headers of the data packets, e.g., if the setup message is a DNS query. A setup message may also convey such protocol information, e.g., if the setup message is a response to a DNS query. By monitoring the setup messages, a traffic class of the data packets associated with the monitored message, e.g., transmitted subsequently or in response to the monitored message, may be determined without looking at or into the data packets themselves. Rather, such a determination can already be made before the data packets are transmitted or received. Exemplary mechanisms of detecting the traffic class will be discussed below.
  • The network address translator 120 is operable to subject data packets incoming data packets, i.e., in the illustrated example the DL data packets to be transmitted from the gateway 26 to the UE 10, to network address translation by replacing the external source network addresses of the data packets with the corresponding replacement network addresses. In some embodiments, the external destination network addresses of the data packets are maintained by the network address translation. Accordingly, the network address translation can be accomplished without modifying the destination network address. In this way, the UE 10 can be addressed using its external network address, while the replacement network addresses can be used by the DL packet filters 72, 74 for efficiently directing the DL data packets to the desired bearer 52, 54, without otherwise affecting the routing of the DL data packets from the network address translator 120 to the UE 10. In some embodiments, the network address translation could also replace the destination network addresses of the DL data packets, i.e., the external network address used by the UE 10, with a corresponding replacement network address. In this case, the routing of the DL data packets from the network address translator 120 to the UE 10 could be based on the replacement network address corresponding to the external network address of the UE 10.
  • Further, the network address translator 120 is operable to subject outgoing data packets, i.e., in the illustrated example the UL data packets which have been transmitted from the UE 10 to the gateway 26, to network address translation by replacing a replacement network address, which replaces the destination network address of the UL data packets, with the corresponding external network address. In some embodiments, the source addresses of the UL data packets may be external network addresses and be maintained by the network address translation. Accordingly, the network address translation can be accomplished without modifying the source network address. In this way, the UE 10 can identify itself as sender of the UL data packets by using its external network address, while the replacement network addresses can be used by the UL packet filters 62, 64 for efficiently directing the UL data packets to the desired bearer 52, 54. In some embodiments, the network address translation could also replace the source network address of the UL data packets, in FIG. 1 the external network address used by the UE 10, with a corresponding replacement network address. The operation of the network address translator 120 concerning the outgoing data packets is substantially inverse with respect to the operation of the network address translator 120 concerning the incoming data packets, which is obtained by using the same mapping between external network addresses and replacement network addresses.
  • By using the replacement network addresses as the basis for differentiated handling, the differentiation between different traffic classes can be facilitated in a significant manner. In one scenario, already the use of the replacement network address could indicate that the data packet belongs to a certain traffic class. For example, the network address translator could be configured to replace the external network addresses of those data packets which belong to a certain traffic class, e.g., “premium” or “trash”, by corresponding replacement network addresses, while leaving the other data packets unchanged. The packet filters could then operate to simply identify those data packets carrying replacement network addresses in the place of the source or destination network address and direct the identified data packets to the desired bearer. For example, if the replacement network addresses are selected from a specific address range of the total available address range, e.g., from a subnet or from a range of neighboring addresses, distinguishing between replacement network addresses and external network addresses can be implemented in a very efficient manner using wildcards or ranges in the filter pattern for matching the network addresses. In a further scenario, the selection of replacement addresses from a corresponding replacement address range could be used to differentiate between multiple different traffic classes. For example, different traffic classes could be assigned to corresponding subnets or of the replacement address range. In this way, distinguishing between different replacement network address ranges assigned to different traffic classes can be implemented in a very efficient manner using wildcards in the filter pattern for matching the network addresses. In some embodiments, when assuming a given assignment of one or more traffic classes to corresponding replacement address ranges, the packet filters could even be preconfigured in the UE 10 or in the gateway 26, thereby avoiding the need for dynamic generation or signaling of the packet filters.
  • FIG. 2 schematically illustrates an exemplary replacement table 200 used for defining a mapping between external network addresses and replacement network addresses. As illustrated, both the external network addresses and the replacement network addresses include network addresses from the IPv4 address space an further include port numbers. The external network addresses are public addresses, whereas the replacement network addresses are from a private subnet of the total address space. A one-to-one mapping is defined between the external network addresses and the replacement network addresses. Accordingly, the network address translation on incoming data packets will always replace an external source address with the corresponding replacement network address, and the network address translation on the outgoing data packets can retranslate this replacement network address to the original external network address, thereby providing compatibility to protocols using bidirectional exchange of data packets, e.g., when sending acknowledgement data packets in response to successfully receiving a data packet such as in TCP. In the example of FIG. 2, the port numbers of the external network addresses are mapped to the same port numbers of the replacement network addresses. When assuming that all traffic with respect to the external network addresses illustrated in the replacement table 200 of FIG. 2 belongs to the same traffic class, it can be seen that differentiated handling on the basis of the replacement network addresses can be implemented in a very efficient manner by defining a packet classification rule which identifies data packets on the basis of the IP address range as used for the illustrated replacement network addresses, e.g., the IP address range from “10.1.1.23” to “10.1.1.25”. Also, a packet classification rule could be defined which operates on the basis of a wildcard, e.g., identifies data packets in which the replacement network address matches the pattern “10.1.1.X”, where X is a wildcard placeholder matching any possible value in the replacement network addresses of the data packets.
  • FIG. 3 schematically illustrates a further exemplary replacement table 200′ used for defining a mapping between external network addresses and replacement network addresses. Again, both the external network addresses and the replacement network addresses include network addresses from the IPv4 address space an further include port numbers. The external network addresses are public addresses, whereas the replacement network addresses are from a private subnet of the total address space. A one-to-one mapping is defined between the external network addresses and the replacement network addresses. Accordingly, the network address translation on incoming data packets will always replace an external source address with the corresponding replacement network address, and the network address translation on the outgoing data packets can retranslate this replacement network address to the original external network address. In the example of FIG. 3, different external network addresses are mapped to the same IP address of the replacement network addresses, but to different port numbers. In this way, the IP address space which is available for the replacement network addresses can be used in a very efficient manner. When assuming that all traffic with respect to the external network addresses illustrated in the replacement table 200′ of FIG. 2 belongs to the same traffic class, it can be seen that differentiated handling on the basis of the replacement network addresses can be implemented in a very efficient manner by defining a packet classification rule which identifies data packets on the basis of the single IP address as used for the illustrated replacement network addresses, i.e., the IP address “10.1.1.23”, but disregards the port numbers of the replacement network addresses.
  • In the following, operation of the traffic adaptation device 100 according to embodiments of the invention will be explained in more detail.
  • According to an embodiment, when the traffic class detector 110 detects data packets of a certain traffic class, it may select an available replacement network address to be used by the network address translator 120 in the process of network address translation. For DL data packets, the network address translator 120 replaces the source network address with the replacement network address. For UL data packets, the replacement network address will already be in place of the destination network address, and the network address translator replaces the replacement network address with the corresponding external network address, which can then be used outside the network section to route the UL data packet to its destination. The selection of the replacement network address may be stored, thereby dynamically generating the replacement mapping data.
  • The traffic adaptation device 100 may then initiate generation of packet classification rules, e.g., one or more of the packet filters 62, 64, 72, 74, operating on the basis of the selected replacement network address. For example, the traffic adaptation device 100 could trigger the policy controller 30 to setup the corresponding bearer 52, 54, e.g., a dedicated bearer for premium traffic or a dedicated bearer for trash traffic. This could be accomplished using the signaling path 5, which may be implemented using the Rx interface according to the 3GPP TSs. In this way, the traffic adaptation device 100 could also provide the policy controller 30 with the replacement network address, e.g., private IP address and port number, which can then be used by the filter generator 35 of the policy controller 30 to generate the packet classification rules, e.g., one or more of the packet filters 62, 64, 72, 74. These may then be signaled to the gateway 26 using the signaling path 6, which may be implemented using the Gx interface according to the 3GP TSs. In some embodiments, if the replacement address itself or at least the range of replacement addresses corresponding to the traffic class is known a priori, the corresponding packet classification rules or packet filters, which operate on the basis of this known replacement network address or replacement network address range, could also be preconfigured into the policy controller 30, the gateway 26, and/or the UE 10.
  • In some embodiments, also the replacement mapping data could at least in part be preconfigured. For example, external network addresses which are known to be associated with a certain traffic class, e.g., cache servers or edge servers used by certain service or content providers, could be configured into the mapping data by a network operator. For data traffic with respect to such external network addresses, the traffic adaptation device 100 could then operate without requiring explicit detection of the traffic class and dynamic selection of the replacement network address on the basis of the detected traffic class. Rather, the preconfigured replacement mapping data would reflect the association of the external network address to the replacement network address and thereby to the corresponding traffic class.
  • In some embodiments, specific characteristics of certain types of network traffic are taken into account. For example, in some protocols such as TCP or UDP there is a connection handshake in the beginning of each TCP session. For example, when successfully establishing a TCP session, the TCP sender first sends a connection setup request (also referred to as aSYN packet), and the TCP receiver responds to that with a setup accept (also referred to as a SYN-ACK packet).
  • In order to provide good compatibility with such types of protocols, it is advantageous if the traffic class detector 110 is capable of detecting the traffic class already for the first DL data packet of a connection initiated from the network side. The network address translation performed by the network address translator 120 can then already be applied to the DL data packet including the connection setup request and will be further applied to all subsequent UL or DL data packets of this session. Changes of the source network address from the external network address to the replacement network address during the session, can therefore be avoided.
  • One way to allow the network address translation to be applied already to the first DL data packet of a network initiated session is to use preconfigured external network addresses in the replacement mapping data, or to preconfigure the traffic class detector 110 with the external network addresses associated with a certain traffic class.
  • A further way to allow the network address translation to be applied already to the first DL data packet of a network initiated session is to use self-learning of the external addresses and their associated traffic class. In this case, the traffic class detector 110 may learn from traffic inspection which external network addresses are associated with certain traffic classes, e.g., are to be considered as premium or trash traffic, and remembers these external network addresses. This acquired knowledge then be applied to subsequent sessions.
  • A still further way to allow the network address translation to be applied already to the first DL data packet of a network initiated session is to inspect setup messages transmitted in preparation of the session. In this case the traffic class detector 110 may learn from inspecting the setup messages, e.g. messages of a signaling protocol such as SIP, DNS messages, or the like, whether the subsequent associated user plane traffic, e.g., a TCP or UDP session, into which traffic class the data packets of this session should be classified. For example, a network label, e.g., a hostname or a domain name may be extracted from the setup message and compared to one or more stored network labels which are indicative of certain traffic classes.
  • An example of a signal flow in which a setup message in the form of a DNS query is used to detect the traffic class of a subsequent session is depicted in FIG. 4. The signaling flow involves the UE 10, the traffic adaptation device 100, a local DNS server 50, an external DNS server 60, and a domain DNS server 70.
  • In the signaling flow of FIG. 4, the UE 10 sends a DNS query 401 to the local DNS server 50. The DNS query 401 requests a network address for a network label, e.g., a hostname or a domain name, as specified in the DNS query 401. At step 402, the traffic class detector 110 of the traffic adaptation device 100 monitors the DNS query 401. For example, this monitoring may involve extracting the network label from the message 401 and comparing the extracted network label to one or more stored network labels, e.g., store hostnames or stored domain names, which are indicative of data traffic of a certain traffic class. If there is a match at step 402, the traffic class detector 110 may conclude that the traffic with respect to the requested network address belongs to the traffic class indicated by the stored network label.
  • When now assuming that the local DNS server 50 does not know the requested network address, it issues a further DNS query 403 to a first external DNS server 60, which may be a root DNS server. The external DNS server 60 may then return a message 404 including a network address of a still further external DNS server 70 which knows the requested external network address, e.g., a DNS server which is authoritative for the domain of the network label specified in the DNS query 401. The local DNS server 50 then issues a further DNS query 405 to the external DNS server 70, which then responds with a message 406 including the requested network address. The local DNS server then sends a message 407 with the requested network address to the UE 10 so as to respond to the original DNS query 401. At step 408, the traffic class detector 110 of the traffic adaptation device 100 monitors the message 407 and extracts the requested network address therefrom. The traffic adaptation device 100 may then select a replacement network according to the detected traffic class and add the selected replacement address with the extracted network address to the replacement mapping data so as to be used for performing network address translation on subsequently transmitted DL and UL data packets.
  • The subsequently transmitted first DL packet 409 of the session established with respect to the external network address will then, at step 410, be subjected to network address translation by the network address translator 120 of the traffic adaptation device 100. In this process, the network address translator 120 will replace the external network address indicating the source of the data packet 409, with the selected replacement network address. The adapted data packet 411 with the replaced source address is then forwarded to the UE 10.
  • For sessions initiated from the UE 10, similar considerations apply. In this case, the first UL data packet including the connection setup request would need to be generated by the UE 10 already using the correct replacement network address in place of the destination network address.
  • One way to have the correct replacement network address already in the first UL data packet of a session initiated from the UE 10 is to inspect setup messages transmitted in preparation of the session. In this case the traffic class detector 110 may learn from inspecting the setup messages, e.g., messages of a signaling protocol such as SIP, DNS messages, or the like, into which traffic class the data packets of the subsequent associated user plane traffic, e.g., a TCP or UDP session, should be classified. For example, a network label, e.g., a hostname or a domain name may be extracted from the setup message and compared to one or more stored network labels which are indicative of certain traffic classes.
  • An example of a signal flow in which a setup message in the form of a DNS query is used to detect the traffic class of a subsequent session is depicted in FIG. 5. Similar to FIG. 4, the signaling flow involves the UE 10, the traffic adaptation device 100, a local DNS server 50, an external DNS server 60, and a domain DNS server 70.
  • In the signaling flow of FIG. 5, the UE 10 sends a DNS query 501 to the local DNS server 50. The DNS query 501 requests a network address for a network label, e.g., a hostname or a domain name, as specified in the DNS query 501. At step 502, the traffic class detector 110 of the traffic adaptation device 100 monitors the DNS query 501. For example, this monitoring may involve extracting the network label from the message 501 and comparing the extracted network label to one or more stored network labels, e.g., stored hostnames or stored domain names, which are indicative of data traffic of a certain traffic class. If there is a match at step 502, the traffic class detector 110 may conclude that the traffic with respect to the requested network address belongs to the traffic class indicated by the stored network label.
  • When now assuming that the local DNS server 50 does not know the requested network address, it issues a further DNS query 503 to a first external DNS server 60, which may be a root DNS server. The external DNS server 60 may then return a message 504 including a network address of a still further external DNS-server 70 which knows the requested external network address, e.g., a DNS server which is authoritative for the domain of the network label specified in the DNS query 501. The local DNS server 50 then issues a further DNS query 505 to the external DNS server 70, which then responds with a message 506 including the requested network address. The local DNS server then sends a message 507 with the requested network address to the UE 10 so as to respond to the original DNS query 501. At step 508, the packet class detector 110 of the traffic adaptation device 100 receives the message 507 and extracts the requested network address therefrom. The traffic adaptation device 100 may then select a replacement network according to the detected traffic class and add the selected replacement address with the extracted network address to the replacement mapping data so as to be used for performing network address translation. In addition, the traffic adaptation device 100 also modifies the message 507 by replacing the network address returned in the message 507 with the selected replacement network address. The modified message 509 is then forwarded to the UE 10.
  • The subsequently transmitted first UL data packet 510 of the session established with the external network address will then carry the replacement network address in place of its destination address. At step 511, the first UL data packet 510 is subjected to network address translation by the network address translator 120 of the traffic adaptation device 100. In this process, the network address translator 120 will replace the replacement network address with the corresponding external network address. The data packet 512 with the replaced destination address is then forwarded to the network.
  • FIG. 6 further illustrates an exemplary implementation of the traffic adaptation device 100.
  • In the illustrated implementation, the traffic adaptation device 100 includes an external interface 130 configured to receive DL traffic to be transmitted to UE 10 and to forward UL traffic coming from the UE 10. Accordingly, the external interface 130 is a bidirectional interface. However, in some embodiments, if the traffic adaptation device is configured for adaptation of DL traffic only, the external interface 130 may be a unidirectional interface for receiving the DL traffic to be transmitted to the UE 10. Also, in some embodiments, if the traffic adaptation device 100 is configured for adaptation of UL traffic only, the external interface 130 may be a unidirectional interface for forwarding the UL traffic from the UE 10. Further, the traffic adaptation device 100 also includes an internal interface 135 with respect to the network section in which differentiated handling of network traffic is provided. The internal interface is configured to receive the UL traffic coming from the UE 10 and to forward the DL traffic to the UE 10. Accordingly, the internal interface 135 is a bidirectional interface. However, in some embodiments, if the traffic adaptation device is configured for adaptation of DL traffic only, the internal interface 135 may be a unidirectional interface for forwarding the DL traffic to the UE 10. Also, in some embodiments, if the traffic adaptation device 100 is configured for adaptation of UL traffic only, the internal interface 135 may be a unidirectional interface for receiving the UL traffic coming from the UE 10.
  • Moreover, the traffic adaptation device 100 may also be provided with a control interface 140, which can be used to provide indications to other entities, e.g., to initiate generation of packet filters by signaling to the policy controller 30 and/or to the gateway 26, and/or to initiate control processes with respect to forwarding procedures of data packets, e.g., modification and/or establishment of the bearers 52, 54. In the illustrated 3GPP scenario, the control interface 140 may be implemented as the Rx interface according to the 3GPP TSs. Further, the interface 140 may also be used to obtain replacement mapping data, traffic class detection data, and/or or other data from which the replacement mapping data or traffic class detection data may be derived.
  • Further, the traffic adaptation device 100 includes a processor 150 coupled to the interfaces 130, 135, 140 and a memory 160 coupled to the processor 150. The memory 160 may include a read-only memory (ROM), e.g. a flash ROM, a random-access memory (RAM), e.g. a Dynamic RAM (DRAM) or static RAM (SRAM), a mass storage, e.g. a hard disk or solid state disk, or the like. The memory 160 includes suitably configured program code to be executed by the processor 150 so as to implement the above-described functionalities of the traffic adaptation device 100. More specifically, the memory 160 may include a traffic class detection module 170 so as to implement the above-described mechanisms of traffic class detection used by the traffic class detector 110, traffic class detection data 175 to be used in the process of traffic class detection, a network address translation module 180 so as to implement the above functionalities of network address translation as performed by the network address translator 120, and replacement mapping data 185 to be used in the network address translation process, e.g., stored in the form of a table as illustrated in FIG. 2 or 3.
  • It is to be understood that the structure as illustrated in FIG. 6 is merely schematic and that the traffic adaptation device 100 may actually include further components which, for the sake of clarity, have not been illustrated, e.g. further interfaces. Also, it is to be understood that the memory 150 may include further types of program code modules, which have not been illustrated, e.g., program code modules for implementing functionalities obtaining or generating the traffic class detection data, e.g., a learning module. According to some embodiments, also a computer program product may be provided for implementing concepts according to embodiments of the invention, e.g., a computer-readable medium storing the program code to be stored in the memory 160.
  • FIG. 7 shows a flowchart for schematically illustrating a method 700 of processing network traffic according to an embodiment of the invention. The method may be used to implement processing of incoming data packets: entering a network section, e.g., using the above-described traffic adaptation device 100.
  • At step 710, an incoming data packet is received, e.g., using the external interface 130 of the traffic adaptation device 100 as illustrated in FIG. 6. The incoming data packet is to be transmitted into a network section in which differentiated handling of network traffic is provided, e.g., with respect to QoS, charging, gating, or redirection. The data packet includes a source network address, which typically indicates a source of the data packet outside the network section.
  • At step 720, an optional step of detecting the traffic class of the data packet is performed, e.g., by the traffic class detector 110 of the traffic adaptation device 100 as illustrated in FIG. 1. For example, the traffic class may be detected on the basis of stored external network addresses by matching a source network address of the incoming data packet to one of the stored network addresses. Alternatively or in addition, the traffic class could also be detected by inspecting a message transmitted in preparation of transmitting the incoming data packet, e.g., a message of a signaling protocol such as SIP or a DNS message.
  • At step 730, network address translation is performed on the received data packet by replacing the source network address with a replacement network address. The replacement network address is selected according to a traffic class of the data packet, e.g., the traffic class as optionally detected at step 720. For example, the replacement network address may be selected from a private network address range.
  • At step 740, differentiated handling of the data packet is performed in the network section. This is accomplished on the basis of the replacement network address. For example, one or more packet classification rules, e.g., packet filters, operating on the basis of the replacement network address may be provided in the network section. In some embodiments, dynamic generation of the packet classification rules may be initiated in response to detecting the traffic class of the data packet.
  • FIG. 8 shows a flowchart for schematically illustrating a further method 800 of processing network traffic according to an embodiment of the invention. The method may be used to implement processing of outgoing data packets leaving a network section, e.g., using the above-described traffic adaptation device 100.
  • At step 810, differentiated handling of the outgoing data packet is performed in the network section. This is accomplished on the basis of a replacement network address included in the outgoing data packet in place of a destination network address of the data packet. The replacement network address is selected according to a traffic class of the data packet. For example, the replacement network address may be selected from a private network address range. The destination network address and the replacement network address may be related to each other by replacement mapping data, e.g., generated in response to detecting the traffic class of the data packet or of other data packets.
  • For example, one or more packet classification rules, e.g., packet filters, operating on the basis of the replacement network address may be provided in the network section. In some embodiments, dynamic generation of the packet classification rules may be initiated in response to detecting the traffic class of the data packet, e.g., by the traffic class detector 110. As explained above, this detection may be accomplished on the basis of a setup message preceding transmission of the outgoing data packet. Further, such a setup message may also be modified so as to ensure that the outgoing data packet uses the correct replacement network address in place of its destination network address even if the outgoing data packet is the first data packet of a session. The differentiated handling may be, e.g., with respect to QoS, charging, gating, or redirection.
  • At step 820, the outgoing data packet is received so as to be adapted for transmission from the network section. This may be accomplished using the internal interface 135 of the traffic adaptation device 100 as illustrated in FIG. 6.
  • At step 830, network address translation is performed on the received data packet by replacing the replacement network address with the destination network address of the data packet. The data packet with the replaced destination address may then be forwarded so as to be routed to its destination on the basis of the destination network address.
  • In some embodiments of the invention, the methods of FIGS. 7 and 8 may also be combined with each other by applying network address translation in the illustrated manner to both incoming and outgoing data packets. In this way, compatibility to protocols using bidirectional exchange of data packets can be provided. Also it is to be understood that in some embodiments the above-described concepts could be applied to unidirectional traffic by adapting only the incoming data packets or only the outgoing data packets.
  • It is to be understood that the examples and embodiments as explained above are merely illustrative and susceptible to various modifications. For example, the concepts could be used in other types of communication network which benefit from differentiated handling of traffic classes, e.g., in IP based networks in general. In such other types of communication networks, other mechanisms than bearer assignments may be used for adapting the QoS level. For example, in an IP based network Differentiated Services Code Point Fields of the data packets could be set in order to adapt the QoS level. Also, the concepts may be applied to any number of different traffic classes. Also, differentiated handling may also be accomplished with respect to charging, gating, or redirection of data packets. Also, it is to be understood that in some embodiments the above-described concepts could be applied to unidirectional traffic by adapting only the incoming data packets or only the outgoing data packets. Further, it is to be understood that the above concepts may be implemented by using correspondingly designed software in existing network devices, or by using dedicated network device hardware.

Claims (22)

1. A method of processing network traffic, comprising the steps of:
receiving an incoming data packet to be transmitted into a network section, the incoming data packet including a source network address; and
performing network address translation on the received data packet by replacing the source network address with a replacement network address selected according to a traffic class of the data packet,
wherein differentiated handling of the data packet on the basis of the replacement network address is provided in the network section.
2. The method according to claim 1, wherein the incoming data packet further includes a destination network address, and wherein said network address translation maintains the destination network address of the incoming data packet.
3. The method according to claim 1, wherein said differentiated handling comprises handling the data packet according to a packet classification rule operating on the basis of the replacement network address.
4. The method according to claim 3, wherein said packet classification rule is implemented as a packet filter for routing the downlink data packet to a bearer.
5. The method according to claim 3, wherein the packet classification rule is preconfigured.
6. The method according to claim 3, further comprising the steps of:
selecting the replacement network address to be used in said network address translation; and
initiating generation of the packet classification rule operating on the basis the selected replacement network address.
7. The method according to claim 1, further comprising the steps of:
detecting the traffic class of the data packet; and
selecting the replacement network address from a replacement network address range which corresponds to the traffic class of the data packet.
8. The method according to claim 6, further comprising the step of:
detecting the traffic class by comparing the source network address to at least one stored network address.
9. The method according to claim 7, further comprising the step of:
detecting the traffic class by inspecting a message transmitted in preparation of transmitting the data packet.
10. A method of processing data traffic, comprising the steps of:
receiving an outgoing data packet transmitted from a network section, the outgoing data packet including a replacement network address in place of a destination network address of the data packet, the replacement network address being selected according to a traffic class of the data packet; and
performing network address translation on the received data packet by replacing the replacement network address with the destination network address,
wherein differentiated handling of the data packet on the basis of the replacement network address is provided in the network section.
11. The method according to claim 10, wherein the outgoing data packet further includes a source network address, and wherein said network address translation maintains the source network address.
12. The method according to claim 10, wherein said differentiated handling comprises handling the data packet according to a packet classification rule operating on the basis of the replacement network address.
13. The method according to claim 12, wherein said packet classification rule is implemented as a packet filter for routing the data packet to a bearer.
14. The method according to claim 12, wherein the packet classification rule is preconfigured.
15. The method according to claim 12, further comprising the steps of:
selecting the replacement network address to be used in said network address translation; and
initiating generation of the packet classification rule operating on the basis the selected replacement network address.
16. The method according to claim 10, further comprising the steps of:
receiving a message transmitted into the network section in preparation of transmitting the outgoing data packet, said message indicating the destination network address of the data packet; and
modifying the message by replacing the destination network address with the replacement network address.
17. The method according to claim 16, further comprising the step of:
on the basis of the message, selecting the replacement network address to be used in said network address translation.
18. A network device, comprising:
an interface configured to receive an incoming data packet to be transmitted into a network section, the incoming data packet including a source network address; and
a network address translator configured to perform network address translation on the received data packet by replacing the source network address with a replacement network address selected according to a traffic class of the data packet,
wherein differentiated handling of the data packet on the basis of the replacement network address is provided in the network section.
19. The network device according to claim 18, wherein the network device is configured to operate according to a method as defined in claim 1.
20. A network device, comprising:
an interface configured to receive an outgoing data packet transmitted from a network section, the outgoing data packet including a replacement network, address in place of a destination network address of the data packet, the replacement network address being selected according to a traffic class of the data packet; and
a network address translator configured to perform network address translation on the outgoing data packet by replacing the replacement network address with the destination network address,
wherein differentiated handling of the data packet on the basis of the replacement network address is provided in the network section.
21. The network device according to claim 20, wherein the network device is configured to operate according to a method as defined in claim 1.
22. A computer program product comprising program code to be executed by a processor of network device, thereby causing the network device to operate according to a method as defined in claim 1.
US13/039,386 2010-10-22 2011-03-03 Differentiated Handling of Network Traffic using Network Address Translation Abandoned US20120099592A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
EPPCT/EP2010/065987 2010-10-22
PCT/EP2010/065987 WO2012052065A1 (en) 2010-10-22 2010-10-22 Differentiated handling of network traffic using network address translation

Publications (1)

Publication Number Publication Date
US20120099592A1 true US20120099592A1 (en) 2012-04-26

Family

ID=43798268

Family Applications (2)

Application Number Title Priority Date Filing Date
US13/818,033 Expired - Fee Related US9160707B2 (en) 2010-10-22 2010-10-22 Differentiated handling of network traffic using network address translation
US13/039,386 Abandoned US20120099592A1 (en) 2010-10-22 2011-03-03 Differentiated Handling of Network Traffic using Network Address Translation

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US13/818,033 Expired - Fee Related US9160707B2 (en) 2010-10-22 2010-10-22 Differentiated handling of network traffic using network address translation

Country Status (4)

Country Link
US (2) US9160707B2 (en)
EP (1) EP2630774A1 (en)
CN (1) CN103262505B (en)
WO (1) WO2012052065A1 (en)

Cited By (57)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8417823B2 (en) 2010-11-22 2013-04-09 Seven Network, Inc. Aligning data transfer to optimize connections established for transmission over a wireless network
US20130148665A1 (en) * 2010-10-22 2013-06-13 Telefonaktiebolaget L M Ericsson (Publ) Differentiated Handling of Network Traffic using Network Address Translation
US8468126B2 (en) 2005-08-01 2013-06-18 Seven Networks, Inc. Publishing data in an information community
US8484314B2 (en) 2010-11-01 2013-07-09 Seven Networks, Inc. Distributed caching in a wireless network of content delivered for a mobile application over a long-held request
US8494510B2 (en) 2008-06-26 2013-07-23 Seven Networks, Inc. Provisioning applications for a mobile device
US20130322268A1 (en) * 2012-05-31 2013-12-05 At&T Intellectual Property I, L.P. Long Term Evolution Network Billing Management
US8621075B2 (en) 2011-04-27 2013-12-31 Seven Metworks, Inc. Detecting and preserving state for satisfying application requests in a distributed proxy and cache system
US8700728B2 (en) 2010-11-01 2014-04-15 Seven Networks, Inc. Cache defeat detection and caching of content addressed by identifiers intended to defeat cache
US8738050B2 (en) 2007-12-10 2014-05-27 Seven Networks, Inc. Electronic-mail filtering for mobile devices
US8750123B1 (en) 2013-03-11 2014-06-10 Seven Networks, Inc. Mobile device equipped with mobile network congestion recognition to make intelligent decisions regarding connecting to an operator network
US8761756B2 (en) 2005-06-21 2014-06-24 Seven Networks International Oy Maintaining an IP connection in a mobile network
US8775631B2 (en) 2012-07-13 2014-07-08 Seven Networks, Inc. Dynamic bandwidth adjustment for browsing or streaming activity in a wireless network based on prediction of user behavior when interacting with mobile applications
US8774844B2 (en) 2007-06-01 2014-07-08 Seven Networks, Inc. Integrated messaging
US8787947B2 (en) 2008-06-18 2014-07-22 Seven Networks, Inc. Application discovery on mobile devices
US8799410B2 (en) 2008-01-28 2014-08-05 Seven Networks, Inc. System and method of a relay server for managing communications and notification between a mobile device and a web access server
US8812695B2 (en) 2012-04-09 2014-08-19 Seven Networks, Inc. Method and system for management of a virtual network connection without heartbeat messages
US8811952B2 (en) 2002-01-08 2014-08-19 Seven Networks, Inc. Mobile device power management in data synchronization over a mobile network with or without a trigger notification
US8832228B2 (en) 2011-04-27 2014-09-09 Seven Networks, Inc. System and method for making requests on behalf of a mobile device based on atomic processes for mobile network traffic relief
US8838783B2 (en) 2010-07-26 2014-09-16 Seven Networks, Inc. Distributed caching for resource and mobile network traffic management
US8839412B1 (en) 2005-04-21 2014-09-16 Seven Networks, Inc. Flexible real-time inbox access
US8843153B2 (en) 2010-11-01 2014-09-23 Seven Networks, Inc. Mobile traffic categorization and policy for network use optimization while preserving user experience
US8862657B2 (en) 2008-01-25 2014-10-14 Seven Networks, Inc. Policy based content service
CN104104742A (en) * 2013-04-05 2014-10-15 瑞典爱立信有限公司 User plane traffic handling using network address translation and request redirection
US8868753B2 (en) 2011-12-06 2014-10-21 Seven Networks, Inc. System of redundantly clustered machines to provide failover mechanisms for mobile traffic management and network resource conservation
US8874761B2 (en) 2013-01-25 2014-10-28 Seven Networks, Inc. Signaling optimization in a wireless network for traffic utilizing proprietary and non-proprietary protocols
US8903954B2 (en) 2010-11-22 2014-12-02 Seven Networks, Inc. Optimization of resource polling intervals to satisfy mobile device requests
US8909759B2 (en) 2008-10-10 2014-12-09 Seven Networks, Inc. Bandwidth measurement
US8909202B2 (en) 2012-01-05 2014-12-09 Seven Networks, Inc. Detection and management of user interactions with foreground applications on a mobile device in distributed caching
US8934414B2 (en) * 2011-12-06 2015-01-13 Seven Networks, Inc. Cellular or WiFi mobile traffic optimization based on public or private network destination
US8984581B2 (en) 2011-07-27 2015-03-17 Seven Networks, Inc. Monitoring mobile application activities for malicious traffic on a mobile device
US9002828B2 (en) 2007-12-13 2015-04-07 Seven Networks, Inc. Predictive content delivery
US9009250B2 (en) 2011-12-07 2015-04-14 Seven Networks, Inc. Flexible and dynamic integration schemas of a traffic management system with various network operators for network traffic alleviation
US9021021B2 (en) 2011-12-14 2015-04-28 Seven Networks, Inc. Mobile network reporting and usage analytics system and method aggregated using a distributed traffic optimization system
US9043433B2 (en) 2010-07-26 2015-05-26 Seven Networks, Inc. Mobile network traffic coordination across multiple applications
US9055102B2 (en) 2006-02-27 2015-06-09 Seven Networks, Inc. Location-based operations and messaging
US9065765B2 (en) 2013-07-22 2015-06-23 Seven Networks, Inc. Proxy server associated with a mobile carrier for enhancing mobile traffic management in a mobile network
US9084105B2 (en) 2011-04-19 2015-07-14 Seven Networks, Inc. Device resources sharing for network resource conservation
US9161258B2 (en) 2012-10-24 2015-10-13 Seven Networks, Llc Optimized and selective management of policy deployment to mobile clients in a congested network to prevent further aggravation of network congestion
US9173128B2 (en) 2011-12-07 2015-10-27 Seven Networks, Llc Radio-awareness of mobile device for sending server-side control signals using a wireless network optimized transport protocol
US9203864B2 (en) 2012-02-02 2015-12-01 Seven Networks, Llc Dynamic categorization of applications for network access in a mobile network
US9241314B2 (en) 2013-01-23 2016-01-19 Seven Networks, Llc Mobile device with application or context aware fast dormancy
US9251193B2 (en) 2003-01-08 2016-02-02 Seven Networks, Llc Extending user relationships
US9307493B2 (en) 2012-12-20 2016-04-05 Seven Networks, Llc Systems and methods for application management of mobile device radio state promotion and demotion
US9326189B2 (en) 2012-02-03 2016-04-26 Seven Networks, Llc User as an end point for profiling and optimizing the delivery of content and data in a wireless network
US9325662B2 (en) 2011-01-07 2016-04-26 Seven Networks, Llc System and method for reduction of mobile network traffic used for domain name system (DNS) queries
WO2016118498A1 (en) * 2015-01-20 2016-07-28 Tata Communications (America) Inc. Service dependent ip addresses
US20170295196A1 (en) * 2015-04-10 2017-10-12 Hewlett Packard Enterprise Development Lp Network anomaly detection
US10212246B2 (en) * 2013-01-04 2019-02-19 Netflix, Inc. Proxy application with dynamic filter updating
US10263899B2 (en) 2012-04-10 2019-04-16 Seven Networks, Llc Enhanced customer service for mobile carriers using real-time and historical mobile application and traffic or optimization data associated with mobile devices in a mobile network
US10405235B2 (en) 2011-09-26 2019-09-03 Qualcomm Incorporated Systems and methods for traffic detection network control
CN111448780A (en) * 2017-12-15 2020-07-24 瑞典爱立信有限公司 Method for handling traffic in a communication network and traffic processing unit
US20210377169A1 (en) * 2020-06-02 2021-12-02 Apple Inc. Apparatus and methods for embedding security association identifier in ip address
US20220263791A1 (en) * 2021-02-14 2022-08-18 Oracle International Corporation Virtual network routing gateway that supports address translation for dataplane as well as dynamic routing protocols (control plane)
WO2022192833A1 (en) * 2021-03-10 2022-09-15 Cisco Technology, Inc. Adaptive source address rewrite
US11522784B2 (en) * 2017-11-28 2022-12-06 Institute Of Acoustics, Chinese Academy Of Sciences Routing and forwarding method for multi-homed network based on programmable network technology
US20230017009A1 (en) * 2018-11-15 2023-01-19 Interdigital Patent Holdings, Inc. Method and apparatus for indicating that connection enables routing of data between pdn gateway and local gateway
US11665129B2 (en) 2021-03-10 2023-05-30 Cisco Technology, Inc. Adaptive source address rewrite

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9148376B2 (en) * 2010-12-08 2015-09-29 AT&T Intellectual Property I, L.L.P. Method and system for dynamic traffic prioritization
WO2013034195A1 (en) 2011-09-09 2013-03-14 Telefonaktiebolaget L M Ericsson (Publ) Differentiated handling of data traffic with user-class dependent adaptation of network address lookup
US9825854B2 (en) * 2014-03-27 2017-11-21 Nicira, Inc. Host architecture for efficient cloud service access
US9794186B2 (en) * 2014-03-27 2017-10-17 Nicira, Inc. Distributed network address translation for efficient cloud service access
GB2525434A (en) * 2014-04-25 2015-10-28 Ibm Method and device for duplicating a data center
US9948984B2 (en) * 2014-09-15 2018-04-17 Verizon Patent And Licensing Inc. Content publishing for personalized content aggregation platform
KR102610823B1 (en) * 2017-11-27 2023-12-07 삼성전자주식회사 Communication system and method for network address translation
CN110557443A (en) * 2019-08-20 2019-12-10 武汉绿色网络信息服务有限责任公司 cross-network communication method and address translation equipment
CN112367261B (en) * 2020-11-30 2022-10-18 迈普通信技术股份有限公司 Message forwarding method and device and distributed equipment

Citations (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6128298A (en) * 1996-04-24 2000-10-03 Nortel Networks Corporation Internet protocol filter
US20020010799A1 (en) * 2000-04-04 2002-01-24 Makoto Kubota Communication data relay system and method of controlling connectability between domains
US20020112076A1 (en) * 2000-01-31 2002-08-15 Rueda Jose Alejandro Internet protocol-based computer network service
US20020141390A1 (en) * 2001-04-03 2002-10-03 Fangman Richard E. System and method for performing IP telephony
US20020145981A1 (en) * 2001-04-10 2002-10-10 Eric Klinker System and method to assure network service levels with intelligent routing
US20020150083A1 (en) * 2001-04-03 2002-10-17 Fangman Richard E. System and method for performing IP telephony including internal and external call sessions
US6658002B1 (en) * 1998-06-30 2003-12-02 Cisco Technology, Inc. Logical operation unit for packet processing
US6754662B1 (en) * 2000-08-01 2004-06-22 Nortel Networks Limited Method and apparatus for fast and consistent packet classification via efficient hash-caching
US20040240447A1 (en) * 2003-05-28 2004-12-02 Dorbolo Riccardo G. Method and system for identifying bidirectional packet flow
US20040246991A1 (en) * 2003-06-06 2004-12-09 Hitachi Communication Technologies, Ltd. IP address translator and packet transfer apparatus
US20050100032A1 (en) * 1999-12-14 2005-05-12 Microsoft Corporation System and method for simulating network connection characteristics
US20050243789A1 (en) * 2004-04-19 2005-11-03 Brian Dinello Network security system
US20060002386A1 (en) * 2004-06-30 2006-01-05 Zarlink Semiconductor Inc. Combined pipelined classification and address search method and apparatus for switching environments
US6985440B1 (en) * 1999-07-02 2006-01-10 Cisco Technology, Inc. Network address translation using a forwarding agent
US20060203721A1 (en) * 2005-03-11 2006-09-14 Kuen-Rong Hsieh Apparatus and method for packet forwarding with quality of service and rate control
US7215637B1 (en) * 2000-04-17 2007-05-08 Juniper Networks, Inc. Systems and methods for processing packets
US7292531B1 (en) * 2002-12-31 2007-11-06 Packeteer, Inc. Methods, apparatuses and systems facilitating analysis of the performance of network traffic classification configurations
US20080008159A1 (en) * 2006-07-07 2008-01-10 Yair Bourlas Method and system for generic multiprotocol convergence over wireless air interface
US20080062978A1 (en) * 2006-08-17 2008-03-13 Color City Enterprise Co., Ltd. Interactive nat traversal method in session initiation protocol
US7392379B2 (en) * 2002-09-05 2008-06-24 Le Pennec Jean-Francois Firewall system for interconnecting two IP networks managed by two different administrative entities
US20090073987A1 (en) * 2007-09-14 2009-03-19 At&T Knowledge Ventures, Lp Methods and Systems for Network Address Translation Management
US7525969B2 (en) * 2006-08-25 2009-04-28 Cisco Technology, Inc. NAT processing in a VRF environment
US7562393B2 (en) * 2002-10-21 2009-07-14 Alcatel-Lucent Usa Inc. Mobility access gateway
US20090323703A1 (en) * 2005-12-30 2009-12-31 Andrea Bragagnini Method and System for Secure Communication Between a Public Network and a Local Network
US20100031323A1 (en) * 2006-03-03 2010-02-04 Barracuda Networks, Inc. Network Interface Device
US7680478B2 (en) * 2006-05-04 2010-03-16 Telefonaktiebolaget Lm Ericsson (Publ) Inactivity monitoring for different traffic or service classifications
US20100111091A1 (en) * 2001-03-30 2010-05-06 Steve Adams Method and apparatus to perform network routing
US20100135292A1 (en) * 2008-11-28 2010-06-03 Samsung Electronics Co. Ltd. Apparatus and method for supporting nat traversal in voice over internet protocol system
US7742406B1 (en) * 2004-12-20 2010-06-22 Packeteer, Inc. Coordinated environment for classification and control of network traffic
US20110268119A1 (en) * 2010-04-30 2011-11-03 Broadcom Corporation Packet processing architecture
US20110268096A1 (en) * 2000-10-11 2011-11-03 Aircell Llc Differentiated services code point mirroring for wireless communications
US20120078994A1 (en) * 2010-09-29 2012-03-29 Steve Jackowski Systems and methods for providing quality of service via a flow controlled tunnel

Family Cites Families (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6608832B2 (en) * 1997-09-25 2003-08-19 Telefonaktiebolaget Lm Ericsson Common access between a mobile communications network and an external network with selectable packet-switched and circuit-switched and circuit-switched services
WO1999022566A2 (en) * 1997-11-04 1999-05-14 Koninklijke Philips Electronics N.V. Communication network using different transmission properties
US6788701B1 (en) * 1999-05-14 2004-09-07 Dunti Llc Communication network having modular switches that enhance data throughput
JP3619411B2 (en) * 1999-12-03 2005-02-09 富士通株式会社 Packet relay device
JP3963690B2 (en) * 2001-03-27 2007-08-22 富士通株式会社 Packet relay processor
US7457300B2 (en) * 2003-01-21 2008-11-25 Telefonaktiebolaget L M Ericsson (Publ) Ethernet address management system
KR100590758B1 (en) * 2003-10-02 2006-06-15 한국전자통신연구원 Apparatus and method for supporting quality of service in ethernet passive optical network system
KR100652958B1 (en) * 2005-02-28 2006-12-01 삼성전자주식회사 Method of transmitting data by improvement of translating network address in gateway and system thereof
US20070201490A1 (en) * 2005-07-13 2007-08-30 Mahamuni Atul B System and method for implementing ethernet MAC address translation
CN101336532B (en) * 2006-02-05 2012-01-11 艾利森电话股份有限公司 Method and apparatus for mounting packet filter in data transmission
WO2007129199A2 (en) * 2006-05-05 2007-11-15 Telefonaktiebolaget Lm Ericsson (Publ) Method and system for dynamically configuring a traffic flow template
JP4680942B2 (en) * 2007-01-18 2011-05-11 株式会社日立製作所 Packet transfer device
EP2405362B1 (en) * 2010-07-08 2013-01-16 STMicroelectronics (Grenoble 2) SAS A connection arrangement
EP2630774A1 (en) * 2010-10-22 2013-08-28 Telefonaktiebolaget L M Ericsson (PUBL) Differentiated handling of network traffic using network address translation
WO2013117221A1 (en) * 2012-02-08 2013-08-15 Nokia Siemens Networks Oy Methods, apparatuses, a system, and a related computer program product for defining, provisioning and activating packet filters
EP2787693B1 (en) * 2013-04-05 2015-12-09 Telefonaktiebolaget L M Ericsson (publ) User plane traffic handling using network address translation and request redirection

Patent Citations (36)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6128298A (en) * 1996-04-24 2000-10-03 Nortel Networks Corporation Internet protocol filter
US6658002B1 (en) * 1998-06-30 2003-12-02 Cisco Technology, Inc. Logical operation unit for packet processing
US6985440B1 (en) * 1999-07-02 2006-01-10 Cisco Technology, Inc. Network address translation using a forwarding agent
US20050100032A1 (en) * 1999-12-14 2005-05-12 Microsoft Corporation System and method for simulating network connection characteristics
US20020112076A1 (en) * 2000-01-31 2002-08-15 Rueda Jose Alejandro Internet protocol-based computer network service
US20020010799A1 (en) * 2000-04-04 2002-01-24 Makoto Kubota Communication data relay system and method of controlling connectability between domains
US7215637B1 (en) * 2000-04-17 2007-05-08 Juniper Networks, Inc. Systems and methods for processing packets
US6754662B1 (en) * 2000-08-01 2004-06-22 Nortel Networks Limited Method and apparatus for fast and consistent packet classification via efficient hash-caching
US20110268096A1 (en) * 2000-10-11 2011-11-03 Aircell Llc Differentiated services code point mirroring for wireless communications
US20100111091A1 (en) * 2001-03-30 2010-05-06 Steve Adams Method and apparatus to perform network routing
US20020150083A1 (en) * 2001-04-03 2002-10-17 Fangman Richard E. System and method for performing IP telephony including internal and external call sessions
US20020141390A1 (en) * 2001-04-03 2002-10-03 Fangman Richard E. System and method for performing IP telephony
US20020145981A1 (en) * 2001-04-10 2002-10-10 Eric Klinker System and method to assure network service levels with intelligent routing
US7392379B2 (en) * 2002-09-05 2008-06-24 Le Pennec Jean-Francois Firewall system for interconnecting two IP networks managed by two different administrative entities
US7562393B2 (en) * 2002-10-21 2009-07-14 Alcatel-Lucent Usa Inc. Mobility access gateway
US7292531B1 (en) * 2002-12-31 2007-11-06 Packeteer, Inc. Methods, apparatuses and systems facilitating analysis of the performance of network traffic classification configurations
US20040240447A1 (en) * 2003-05-28 2004-12-02 Dorbolo Riccardo G. Method and system for identifying bidirectional packet flow
US20040246991A1 (en) * 2003-06-06 2004-12-09 Hitachi Communication Technologies, Ltd. IP address translator and packet transfer apparatus
US20050243789A1 (en) * 2004-04-19 2005-11-03 Brian Dinello Network security system
US20060002386A1 (en) * 2004-06-30 2006-01-05 Zarlink Semiconductor Inc. Combined pipelined classification and address search method and apparatus for switching environments
US7742406B1 (en) * 2004-12-20 2010-06-22 Packeteer, Inc. Coordinated environment for classification and control of network traffic
US20060203721A1 (en) * 2005-03-11 2006-09-14 Kuen-Rong Hsieh Apparatus and method for packet forwarding with quality of service and rate control
US20090323703A1 (en) * 2005-12-30 2009-12-31 Andrea Bragagnini Method and System for Secure Communication Between a Public Network and a Local Network
US20100088742A1 (en) * 2006-03-03 2010-04-08 Barracuda Networks, Inc Apparatus for defining a set of rules for a packet forwarding device
US20100031323A1 (en) * 2006-03-03 2010-02-04 Barracuda Networks, Inc. Network Interface Device
US20100088741A1 (en) * 2006-03-03 2010-04-08 Barracuda Networks, Inc Method for defining a set of rules for a packet forwarding device
US7970899B2 (en) * 2006-03-03 2011-06-28 Barracuda Networks Inc Integrated data flow packet admission and traffic management apparatus
US7680478B2 (en) * 2006-05-04 2010-03-16 Telefonaktiebolaget Lm Ericsson (Publ) Inactivity monitoring for different traffic or service classifications
US20080008159A1 (en) * 2006-07-07 2008-01-10 Yair Bourlas Method and system for generic multiprotocol convergence over wireless air interface
US20080062978A1 (en) * 2006-08-17 2008-03-13 Color City Enterprise Co., Ltd. Interactive nat traversal method in session initiation protocol
US7525969B2 (en) * 2006-08-25 2009-04-28 Cisco Technology, Inc. NAT processing in a VRF environment
US20090073987A1 (en) * 2007-09-14 2009-03-19 At&T Knowledge Ventures, Lp Methods and Systems for Network Address Translation Management
US8233488B2 (en) * 2007-09-14 2012-07-31 At&T Intellectual Property I, Lp Methods and systems for network address translation management
US20100135292A1 (en) * 2008-11-28 2010-06-03 Samsung Electronics Co. Ltd. Apparatus and method for supporting nat traversal in voice over internet protocol system
US20110268119A1 (en) * 2010-04-30 2011-11-03 Broadcom Corporation Packet processing architecture
US20120078994A1 (en) * 2010-09-29 2012-03-29 Steve Jackowski Systems and methods for providing quality of service via a flow controlled tunnel

Cited By (79)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8811952B2 (en) 2002-01-08 2014-08-19 Seven Networks, Inc. Mobile device power management in data synchronization over a mobile network with or without a trigger notification
US9251193B2 (en) 2003-01-08 2016-02-02 Seven Networks, Llc Extending user relationships
US8839412B1 (en) 2005-04-21 2014-09-16 Seven Networks, Inc. Flexible real-time inbox access
US8761756B2 (en) 2005-06-21 2014-06-24 Seven Networks International Oy Maintaining an IP connection in a mobile network
US8468126B2 (en) 2005-08-01 2013-06-18 Seven Networks, Inc. Publishing data in an information community
US9055102B2 (en) 2006-02-27 2015-06-09 Seven Networks, Inc. Location-based operations and messaging
US8774844B2 (en) 2007-06-01 2014-07-08 Seven Networks, Inc. Integrated messaging
US8805425B2 (en) 2007-06-01 2014-08-12 Seven Networks, Inc. Integrated messaging
US8738050B2 (en) 2007-12-10 2014-05-27 Seven Networks, Inc. Electronic-mail filtering for mobile devices
US9002828B2 (en) 2007-12-13 2015-04-07 Seven Networks, Inc. Predictive content delivery
US8862657B2 (en) 2008-01-25 2014-10-14 Seven Networks, Inc. Policy based content service
US8838744B2 (en) 2008-01-28 2014-09-16 Seven Networks, Inc. Web-based access to data objects
US8799410B2 (en) 2008-01-28 2014-08-05 Seven Networks, Inc. System and method of a relay server for managing communications and notification between a mobile device and a web access server
US8787947B2 (en) 2008-06-18 2014-07-22 Seven Networks, Inc. Application discovery on mobile devices
US8494510B2 (en) 2008-06-26 2013-07-23 Seven Networks, Inc. Provisioning applications for a mobile device
US8909759B2 (en) 2008-10-10 2014-12-09 Seven Networks, Inc. Bandwidth measurement
US9049179B2 (en) 2010-07-26 2015-06-02 Seven Networks, Inc. Mobile network traffic coordination across multiple applications
US9043433B2 (en) 2010-07-26 2015-05-26 Seven Networks, Inc. Mobile network traffic coordination across multiple applications
US8838783B2 (en) 2010-07-26 2014-09-16 Seven Networks, Inc. Distributed caching for resource and mobile network traffic management
US9160707B2 (en) * 2010-10-22 2015-10-13 Telefonaktiebolaget L M Ericsson (Publ) Differentiated handling of network traffic using network address translation
US20130148665A1 (en) * 2010-10-22 2013-06-13 Telefonaktiebolaget L M Ericsson (Publ) Differentiated Handling of Network Traffic using Network Address Translation
US8700728B2 (en) 2010-11-01 2014-04-15 Seven Networks, Inc. Cache defeat detection and caching of content addressed by identifiers intended to defeat cache
US8843153B2 (en) 2010-11-01 2014-09-23 Seven Networks, Inc. Mobile traffic categorization and policy for network use optimization while preserving user experience
US8782222B2 (en) 2010-11-01 2014-07-15 Seven Networks Timing of keep-alive messages used in a system for mobile network resource conservation and optimization
US8484314B2 (en) 2010-11-01 2013-07-09 Seven Networks, Inc. Distributed caching in a wireless network of content delivered for a mobile application over a long-held request
US8417823B2 (en) 2010-11-22 2013-04-09 Seven Network, Inc. Aligning data transfer to optimize connections established for transmission over a wireless network
US9100873B2 (en) 2010-11-22 2015-08-04 Seven Networks, Inc. Mobile network background traffic data management
US8903954B2 (en) 2010-11-22 2014-12-02 Seven Networks, Inc. Optimization of resource polling intervals to satisfy mobile device requests
US8539040B2 (en) 2010-11-22 2013-09-17 Seven Networks, Inc. Mobile network background traffic data management with optimized polling intervals
US9325662B2 (en) 2011-01-07 2016-04-26 Seven Networks, Llc System and method for reduction of mobile network traffic used for domain name system (DNS) queries
US9084105B2 (en) 2011-04-19 2015-07-14 Seven Networks, Inc. Device resources sharing for network resource conservation
US9300719B2 (en) 2011-04-19 2016-03-29 Seven Networks, Inc. System and method for a mobile device to use physical storage of another device for caching
US8832228B2 (en) 2011-04-27 2014-09-09 Seven Networks, Inc. System and method for making requests on behalf of a mobile device based on atomic processes for mobile network traffic relief
US8621075B2 (en) 2011-04-27 2013-12-31 Seven Metworks, Inc. Detecting and preserving state for satisfying application requests in a distributed proxy and cache system
US8984581B2 (en) 2011-07-27 2015-03-17 Seven Networks, Inc. Monitoring mobile application activities for malicious traffic on a mobile device
US10405235B2 (en) 2011-09-26 2019-09-03 Qualcomm Incorporated Systems and methods for traffic detection network control
US10142863B2 (en) 2011-12-06 2018-11-27 Seven Networks, Llc Optimization of mobile traffic directed to private networks and operator configurability thereof
US8934414B2 (en) * 2011-12-06 2015-01-13 Seven Networks, Inc. Cellular or WiFi mobile traffic optimization based on public or private network destination
US8977755B2 (en) 2011-12-06 2015-03-10 Seven Networks, Inc. Mobile device and method to utilize the failover mechanism for fault tolerance provided for mobile traffic management and network/device resource conservation
US9408105B2 (en) 2011-12-06 2016-08-02 Seven Networks, Llc Cellular or WIFI mobile traffic optimization based on public or private network destination
US8868753B2 (en) 2011-12-06 2014-10-21 Seven Networks, Inc. System of redundantly clustered machines to provide failover mechanisms for mobile traffic management and network resource conservation
US9009250B2 (en) 2011-12-07 2015-04-14 Seven Networks, Inc. Flexible and dynamic integration schemas of a traffic management system with various network operators for network traffic alleviation
US9208123B2 (en) 2011-12-07 2015-12-08 Seven Networks, Llc Mobile device having content caching mechanisms integrated with a network operator for traffic alleviation in a wireless network and methods therefor
US9277443B2 (en) 2011-12-07 2016-03-01 Seven Networks, Llc Radio-awareness of mobile device for sending server-side control signals using a wireless network optimized transport protocol
US9173128B2 (en) 2011-12-07 2015-10-27 Seven Networks, Llc Radio-awareness of mobile device for sending server-side control signals using a wireless network optimized transport protocol
US9769702B2 (en) 2011-12-14 2017-09-19 Seven Networks, Llc Mobile device configured for operating in a power save mode and a traffic optimization mode and related method
US10609593B2 (en) 2011-12-14 2020-03-31 Seven Networks, Llc Mobile device configured for operating in a power save mode and a traffic optimization mode and related method
US9021021B2 (en) 2011-12-14 2015-04-28 Seven Networks, Inc. Mobile network reporting and usage analytics system and method aggregated using a distributed traffic optimization system
US9131397B2 (en) 2012-01-05 2015-09-08 Seven Networks, Inc. Managing cache to prevent overloading of a wireless network due to user activity
US8909202B2 (en) 2012-01-05 2014-12-09 Seven Networks, Inc. Detection and management of user interactions with foreground applications on a mobile device in distributed caching
US9203864B2 (en) 2012-02-02 2015-12-01 Seven Networks, Llc Dynamic categorization of applications for network access in a mobile network
US9326189B2 (en) 2012-02-03 2016-04-26 Seven Networks, Llc User as an end point for profiling and optimizing the delivery of content and data in a wireless network
US8812695B2 (en) 2012-04-09 2014-08-19 Seven Networks, Inc. Method and system for management of a virtual network connection without heartbeat messages
US10263899B2 (en) 2012-04-10 2019-04-16 Seven Networks, Llc Enhanced customer service for mobile carriers using real-time and historical mobile application and traffic or optimization data associated with mobile devices in a mobile network
US9516176B2 (en) * 2012-05-31 2016-12-06 At&T Intellectual Property I, L.P. Long term evolution network billing management
US20130322268A1 (en) * 2012-05-31 2013-12-05 At&T Intellectual Property I, L.P. Long Term Evolution Network Billing Management
US8775631B2 (en) 2012-07-13 2014-07-08 Seven Networks, Inc. Dynamic bandwidth adjustment for browsing or streaming activity in a wireless network based on prediction of user behavior when interacting with mobile applications
US9161258B2 (en) 2012-10-24 2015-10-13 Seven Networks, Llc Optimized and selective management of policy deployment to mobile clients in a congested network to prevent further aggravation of network congestion
US9307493B2 (en) 2012-12-20 2016-04-05 Seven Networks, Llc Systems and methods for application management of mobile device radio state promotion and demotion
US10212246B2 (en) * 2013-01-04 2019-02-19 Netflix, Inc. Proxy application with dynamic filter updating
US9271238B2 (en) 2013-01-23 2016-02-23 Seven Networks, Llc Application or context aware fast dormancy
US9241314B2 (en) 2013-01-23 2016-01-19 Seven Networks, Llc Mobile device with application or context aware fast dormancy
US8874761B2 (en) 2013-01-25 2014-10-28 Seven Networks, Inc. Signaling optimization in a wireless network for traffic utilizing proprietary and non-proprietary protocols
US8750123B1 (en) 2013-03-11 2014-06-10 Seven Networks, Inc. Mobile device equipped with mobile network congestion recognition to make intelligent decisions regarding connecting to an operator network
CN104104742A (en) * 2013-04-05 2014-10-15 瑞典爱立信有限公司 User plane traffic handling using network address translation and request redirection
US9065765B2 (en) 2013-07-22 2015-06-23 Seven Networks, Inc. Proxy server associated with a mobile carrier for enhancing mobile traffic management in a mobile network
WO2016118498A1 (en) * 2015-01-20 2016-07-28 Tata Communications (America) Inc. Service dependent ip addresses
US10931624B2 (en) 2015-01-20 2021-02-23 Tata Communications (America) Inc. Service dependent IP addresses
US10686814B2 (en) * 2015-04-10 2020-06-16 Hewlett Packard Enterprise Development Lp Network anomaly detection
US20170295196A1 (en) * 2015-04-10 2017-10-12 Hewlett Packard Enterprise Development Lp Network anomaly detection
US11522784B2 (en) * 2017-11-28 2022-12-06 Institute Of Acoustics, Chinese Academy Of Sciences Routing and forwarding method for multi-homed network based on programmable network technology
CN111448780A (en) * 2017-12-15 2020-07-24 瑞典爱立信有限公司 Method for handling traffic in a communication network and traffic processing unit
US20230017009A1 (en) * 2018-11-15 2023-01-19 Interdigital Patent Holdings, Inc. Method and apparatus for indicating that connection enables routing of data between pdn gateway and local gateway
US20210377169A1 (en) * 2020-06-02 2021-12-02 Apple Inc. Apparatus and methods for embedding security association identifier in ip address
US11627079B2 (en) * 2020-06-02 2023-04-11 Apple Inc. Apparatus and methods for embedding security association identifier in IP address
US20220263791A1 (en) * 2021-02-14 2022-08-18 Oracle International Corporation Virtual network routing gateway that supports address translation for dataplane as well as dynamic routing protocols (control plane)
US11929976B2 (en) * 2021-02-14 2024-03-12 Oracle International Corporation Virtual network routing gateway that supports address translation for dataplane as well as dynamic routing protocols (control plane)
WO2022192833A1 (en) * 2021-03-10 2022-09-15 Cisco Technology, Inc. Adaptive source address rewrite
US11665129B2 (en) 2021-03-10 2023-05-30 Cisco Technology, Inc. Adaptive source address rewrite

Also Published As

Publication number Publication date
US20130148665A1 (en) 2013-06-13
EP2630774A1 (en) 2013-08-28
CN103262505A (en) 2013-08-21
CN103262505B (en) 2016-06-01
WO2012052065A1 (en) 2012-04-26
US9160707B2 (en) 2015-10-13

Similar Documents

Publication Publication Date Title
US9160707B2 (en) Differentiated handling of network traffic using network address translation
US9369394B2 (en) User plane traffic handling using network address translation and request redirection
EP2630821B1 (en) Adaptation of quality of service in handling network traffic
US9419896B2 (en) Differentiated handling of data traffic with user-class dependent adaptation of network address lookup
JP5636113B2 (en) Distinct processing of data traffic using adaptation of network address lookup
US9313797B2 (en) Mobile-access information based adaptation of network address lookup for differentiated handling of data traffic
US9013992B2 (en) Method and apparatus for network address translation
US9106541B2 (en) Token-based correlation of control sessions for policy and charging control of a data session through a NAT
EP2742722B1 (en) Traffic-load based flow admission control
US9992288B2 (en) Method and device for an adaptive handling of data traffic
EP2630776B1 (en) Mobile-access information based adaptation of network address lookup for differentiated handling of data traffic
CN106161534B (en) Method and apparatus for transmitting, transferring and acquiring capabilities

Legal Events

Date Code Title Description
AS Assignment

Owner name: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL), SWEDEN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:LUDWIG, REINER;REEL/FRAME:025987/0493

Effective date: 20110114

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION