IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
US-0769176
(2010-04-28)
|
등록번호 |
US-8111692
(2012-02-07)
|
발명자
/ 주소 |
|
출원인 / 주소 |
- Embarq Holdings Company LLC
|
대리인 / 주소 |
|
인용정보 |
피인용 횟수 :
61 인용 특허 :
254 |
초록
▼
The disclosed embodiments include a system and method for modifying network traffic. For example, in one embodiment, the method includes receiving a packet at an intermediate network node at a network layer. The method determines at the intermediate network node whether layer injection can be perfor
The disclosed embodiments include a system and method for modifying network traffic. For example, in one embodiment, the method includes receiving a packet at an intermediate network node at a network layer. The method determines at the intermediate network node whether layer injection can be performed at the intermediate network node. If layer injection can be performed at the intermediate network node, the method identifies at least one application or protocol associated with the packet using deep packet inspection. The method determines a routing modification based on the identified application protocol. The method then performs the routing modification on the packet.
대표청구항
▼
1. A method for modifying network traffic, the method comprising: receiving a packet at an intermediate network node at a network layer, the packet associated with a communication flow between a sending device and a receiving device;determining, by the intermediate network node, whether the intermed
1. A method for modifying network traffic, the method comprising: receiving a packet at an intermediate network node at a network layer, the packet associated with a communication flow between a sending device and a receiving device;determining, by the intermediate network node, whether the intermediate network node is capable of performing layer injection, wherein determining, by the intermediate network node, whether the intermediate network node is capable of performing layer injection includes checking each individual layer of the communication protocol layers and sublayers of the layers of the communication protocol layers to identify individual layers and sublayers that are protected from being modified by the intermediate network node;responsive to a determination each individual layer of the communication protocol layers and sublayers of the layers of the communication protocol layers are not protected and that the intermediate network node is capable of performing layer injection:identifying at least one of an application or protocol associated with the packet using deep packet inspection;determining a routing modification based on the identified application or protocol; andmodifying the packet with the determined routing modification. 2. The method of claim 1, further comprising modifying the packet, by the intermediate network node at an upper network layer, based on the identified application or protocol to adjust the communication flow between the sender device and the receiver device, the upper network layer being a protocol layer higher than the network layer. 3. The method of claim 1, further comprising: determining a second intermediate network node capable of performing layer injection in response to a determination that layer injection cannot be performed at the intermediate network node; andsending the packet to the second intermediate network node. 4. The method of claim 3, wherein determining the second intermediate network node capable of performing layer injection comprises querying a database containing a list of network nodes capable of performing layer injection. 5. The method of claim 4, further comprising: identifying, at the second intermediate network node, at least one of an application or protocol associated with the packet using deep packet inspection;determining, by the second intermediate network node, a routing modification based on the identified application protocol; andperforming the routing modification on the packet. 6. The method of claim 5, further comprising: determining, by the second intermediate network node whether the second intermediate network node is capable of performing layer injection;responsive to a determination that the second intermediate network node is capable of performing layer injection;identifying at least one of an application or protocol associated with the packet using deep packet inspection;determining a routing modification based on the identified application protocol; andperforming the routing modification on the packet. 7. The method of claim 2, wherein modifying the packet includes modifying an advertised window size field of a TCP header of the data packet. 8. The method of claim 2, wherein modifying the packet includes modifying a checksum field of a TCP header of the data packet. 9. The method of claim 1, further comprising modifying an acknowledgment time between the sending device and the receiving device before another packet is retransmitted. 10. The method of claim 1, wherein the intermediate network node is at least a level 3 network element. 11. The method of claim 1, wherein the intermediate network node is a network access point. 12. The method of claim 1, wherein the intermediate network node is a network controller. 13. The method of claim 1, wherein identifying at least one of an application or protocol associated with the packet includes performing analysis by port, analysis by string match, and analysis by numerical properties on the packet. 14. The method of claim 1, wherein the routing modification includes limiting the available bandwidth for the identified application or protocol. 15. The method of claim 1, wherein the routing modification includes placing the packet in a low priority queue, wherein data packets with higher priority is routed before packet in the low priority queue. 16. The method of claim 1, wherein the routing modification applies only to a receiving data path, the receiving data path being a data path in which the packet traverses in arriving at the intermediate network node. 17. The method of claim 1, wherein the routing modification applies only to a forwarding data path, the forwarding data path being a data path in which the packet traverses from the intermediate network node to one of the sending device or the receiving device. 18. An apparatus for modifying network traffic, the apparatus located in a network along a communication path between a sending device and the receiving device, the apparatus comprising: a network interface component for receiving a packet transmitted between a sending device and a receiving device;a memory component for storing executable instructions, and at least one processor, the at least one processor configured to execute the executable instructions to perform the steps of:determining whether the apparatus is capable of performing layer injection, wherein determining whether the apparatus is capable of performing layer injection includes checking each individual layer of the communication protocol layers and sublayers of the layers of the communication protocol layers to identify individual layers and sublayers that are protected from being modified by the apparatus;responsive to a determination each individual layer of the communication protocol layers and sublayers of the layers of the communication protocol layers are not protected and that the apparatus is capable of performing layer injection;identifying at least one of an application or protocol associated with the packet using deep packet inspection;determining a routing modification based on the identified application protocol; andmodifying the packet with the determined routing modification. 19. The apparatus of claim 18, wherein the memory component further stores data containing a list of network elements capable of performing layer injection.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.