SEAMLESS HANDOFF BETWEEN WIRELESS ACCESS GATEWAYS
A method of data communication includes receiving, by a first wireless access gateway (WAG), at least a first data packet corresponding to a first data flow transmitted from user equipment (UE) and receiving, by a second WAG, at least a second data packet transmitted from the UE. In response to receiving the second data packet, the second WAG determines an identity of the first WAG, and in response to determining the identity of the first WAG, the method includes establishing a tunnel connection between the first WAG and the second WAG. After establishing the tunnel connection, the method includes receiving by the second WAG at least a third data packet corresponding to the first data flow transmitted from the UE, and the second WAG transmits to the first WAG, via the tunnel connection, the third data packet.
This application claims priority to U.S. Provisional Patent Application No. 62/273,625, filed Dec. 31, 2015 and titled “Methods and Systems for Seamless Handoff Between Wireless Access Gateways,” which is hereby incorporated by reference in its entirety.
FIELD OF INVENTIONThe invention generally relates to wireless access gateways and, in particular, to the use of wireless access gateways as part of mobile communications systems.
BACKGROUNDWireless Access Gateways (“WAGs”) are a critical component of the Evolved Packet Core (“EPC”) non-3GPP network access architectures. Wireless Authentication, Authorization and Accounting AAA Proxies (“WAPs”) can be used in conjunction with WAGs to authenticate user equipment (“UE”) prior to granting connectivity.
SUMMARYOne aspect of the invention includes techniques and systems for seamless handoff between wireless access gateways.
Under another aspect of the invention, a method of data communication includes receiving, by a first wireless access gateway (WAG), at least a first data packet corresponding to a first data flow transmitted from user equipment (UE) and receiving, by a second WAG, at least a second data packet transmitted from the UE. In response to receiving the second data packet, the second WAG determines an identity of the first WAG, and in response to determining the identity of the first WAG, the method includes establishing a tunnel connection between the first WAG and the second WAG. After establishing the tunnel connection, the method includes receiving by the second WAG at least a third data packet corresponding to the first data flow transmitted from the UE, and the second WAG transmits to the first WAG, via the tunnel connection, the third data packet.
In one embodiment, the second data packet corresponds to the first data flow.
In another embodiment, the second data packet corresponds to a request by the UE for confirmation that an Internet Protocol (IP) address presently assigned to the UE may still be used to conduct the first data flow.
In a further embodiment, the method also includes the second WAG transmitting a response to the UE request for confirmation, the response comprising confirmation that the UE may continue to use the IP address presently assigned to the UE.
In still another embodiment, the tunnel connection comprises a GPRS Tunneling Protocol (GTP) tunnel.
In another embodiment, the method also includes receiving, at the first WAG, at least a fourth data packet corresponding to the first data flow intended for the UE, the first WAG transmitting the received fourth data packet to the second WAG via the tunnel connection, and the second WAG transmitting the fourth data packet to the UE.
In still another embodiment, the fourth data packet is transmitted by an origin server, and the method further include the first WAG performing a network address translation operation on the fourth data packet before transmitting the fourth data packet to the second WAG.
In a further embodiment, the method further includes transmitting user data associated with the UE via the tunnel connection.
In one embodiment, the method also includes the second WAG inspecting the second data packet to determine whether the second data packet is part of an existing data flow or part of a new data flow.
In another embodiment, the second WAG determining the identity of the first WAG includes the second WAG receiving the identity of the first WAG from a Wireless Authentication, Authorization, and Accounting Proxy (WAP).
In a further embodiment, the second WAG receiving the identity of the first WAG from the WAP is in response to the second WAG requesting the identity of the first WAG in response to the second WAG receiving the second data packet.
In still a further embodiment, the second WAG receiving the identity of the first WAG from the WAP is in response to the UE transmitting a re-authentication request to the WAP.
In an embodiment, the second WAG determining the identity of the first WAG includes inspecting the IP address of the UE and determining the identity of the first WAG based on the IP address of the UE.
In another embodiment, the method also includes receiving by the second WAG at least a fourth data packet corresponding to a second data flow transmitted from the UE, and the second WAG transmitting the fourth data packet to a computer system while bypassing the tunnel connection.
Under another aspect of the invention, a method of data communication includes receiving by a first WAG at least a first data packet corresponding to a first data flow transmitted by a computer system intended for a UE. The method also includes the first WAG transmitting the first data packet to the UE and the first WAG determining an identity of a second WAG. In response to determining the identity of the second WAG, the method includes establishing a tunnel connection between the first WAG and the second WAG. After establishing the tunnel connection, the method includes receiving by the first WAG at least a second data packet corresponding to the first data flow transmitted by the computer system intended for the UE, the first WAG transmitting to the second WAG, via the tunnel connection, the second data packet, and the second WAG transmitting the second data packet to the UE.
In one embodiment, the first WAG determining an identity of the second WAG is in response to determining that the UE is inaccessible via the first WAG.
In another embodiment, the first WAG determining the identity of the second WAG includes the first WAG receiving the identity of the second WAG from a Wireless Authentication, Authorization, and Accounting Proxy (WAP).
In a further embodiment, the first WAG receiving the identity of the second WAG from the WAP is in response to the first WAG requesting the identity of the second WAG.
In yet another embodiment, the first WAG receiving the identity of the second WAG from the WAP is in response to the UE transmitting a re-authentication request to the WAP.
Under a further aspect of the invention, a method of selectively routing data communications includes providing a WAG with network connectivity to a wireless operator network and a packet data network, wherein the packet data network resides outside of the wireless operator network. The method also includes receiving by the WAG a first data packet intended for a first computer system included in the wireless operator network and selectively routing the first data packet to the first computer system via the wireless operator network. The method also includes receiving by the WAG a second data packet intended for a second computer system included in the packet data network and selectively routing the second data packet to the second computer system via the packet data network while bypassing the wireless operator network.
In an embodiment, the selectively routing the first data packet to the first computer system includes basing the selection on at least one of a source Internet Protocol (IP) address, a source User Datagram Protocol/Transmission Control Protocol (UDP/TCP) port, a destination IP address, a destination UDP/TCP port, and a traffic type of the first data packet.
In another embodiment, the selectively routing the second data packet to the second computer system includes basing the selection on at least one of a source Internet Protocol (IP) address, a source User Datagram Protocol/Transmission Control Protocol (UDP/TCP) port, a destination IP address, a destination UDP/TCP port, and a traffic type of the second data packet.
In a further embodiment, the selectively routing the first data packet to the first computer system includes routing the first data packet via a GPRS Tunneling Protocol (GTP) tunnel to the wireless operator network.
Under an aspect of the invention, a system for data communications includes a first WAG and a second WAG, each WAG having a processor and machine readable instructions that cause the processors of the WAGs to perform any of the aspects and embodiments set forth above.
Under a further aspect of the invention, a WAG for selectively routing data communications includes a first network interface to a wireless operator network, a second network interface to a packet data network, wherein the packet data network resides outside of the wireless operator network, and a processor. The WAG also includes machine readable instructions that when executed cause the processor to receive a first data packet intended for a first computer system included in the wireless operator network and selectively route the first data packet to the first computer system via the wireless operator network. The instructions also cause the processor to receive a second data packet intended for a second computer system included in the packet data network and selectively route the second data packet to the second computer system via the packet data network while bypassing the wireless operator network.
Any of the above aspects or embodiments can be combined with any other aspects or embodiments set forth above or otherwise herein.
For a more complete understanding of various embodiments of the disclosed subject matter, reference is now made to the following descriptions taken in connection with the accompanying drawings, in which:
Some embodiments described herein relate to mechanisms to facilitate UE mobility across Attachment Points (“APs”) and Wireless Access Gateways (“WAGs”) of a WiFi network without requiring the release of the IP address allocated to the UE for purposes of IP offload, and without requiring any action by the user equipment (“UE”) to facilitate IP address preservation. This provides a much more seamless user experience compared with previous methods, for example since IP flows remain intact regardless of the AP used to provide access to the core network, and regardless of whether the WAG is forced to change due to the change in AP. As used herein, the term “core network” refers to the central part of a mobile network to which the WAG provides direct connectivity. A core network is typically comprised of a collection of interconnected IP routers, and uses a routing protocol, such as Open Shortest Path First (“OSPF”) or Border Gateway Protocol (“BGP”), to exchange routing information amongst the routers.
A WAG can provide direct connectivity between a UE, connected via a variety of access technologies, and services located over an Internet Protocol (“IP”)-based network. A WAG can also provide UE access to the EPC or 3G Packet Data Services for 3GPP-based services. Examples of UEs include, but are not limited to, 3G and 4G smartphones, tablets, and laptop computers. Along with a Wireless Authentication, Authorization and Accounting AAA Proxy (WAP), UEs can be authenticated and, based upon provisioning and/or subscriber subscription information, are provided IP-based connectivity directly to the Internet (IP offload outside of the core network) or via the EPC (e.g., the Packet Data Network Gateway, “PDNGW”) or Global System for Mobile Communications (“GSM”) Packet Data Services (e.g., the General Packet Radio Service (“GPRS”) Support Node, “GGSN”).
Implementations of the present disclosure include mechanisms in which the first WAG that hosts a UE will allocate an IP address to the UE and become the anchor point (“anchoring WAG”) for one or more data flows, or “traffic,” originating from and/or destined to the UE. If the UE moves, and a new WAG (“hosting WAG”) is selected, a mechanism is described in which the hosting WAG learns about the anchoring WAG and requests that data corresponding to the already-initiated data flows be forwarded to the hosting WAG on its return path. This ensures that all data flows that were established by the UE via the anchoring WAG prior to the UE's movement continue to be routed through the anchoring WAG (via the hosting WAG) once the UE has moved. In this fashion, the IP address used by the UE does not change, resulting in a reduction in, or elimination of, disruption of service to the UE due to loss of IP flows.
In some embodiments, when a UE has moved to a new, hosting WAG from the initial anchoring WAG, and all data flows that involved the anchoring WAG have terminated, the hosting WAG may cease to communicate with the anchoring WAG, and may itself become a new anchoring WAG for that UE going forward.
In some embodiments, a seamless handoff method includes initial UE connection to the core network, mobility events and anchoring WAG identification, forwarding tunnel setup, and UE Data forwarding, as described in more detail below.
Initial UE Connection to a Core NetworkThe initial connection of a UE to a core network (and associated services) is described below, and is generally known to one having ordinary skill in the art. A UE is typically first authenticated and, once successfully authenticated, has data plane resources allocated to it. Two entities work together to accomplish this: the WAP and the WAG.
In some existing communications architectures, a UE decides whether to use the LTE radio or the WiFi radio based on the type of request the UE is making. For example, the UE may use the LTE radio when it is requesting a service that is provided by an operator network (e.g., voice services, visual voicemail, etc.), and the UE may use WiFi when it is requesting a service that is outside of the operator network (e.g., Netflix, and internet browser, etc.). Even in scenarios in which only a WiFi connection through a WAG was available, the WAG routes traffic either entirely through the operator network or entire through a network outside of the operator network (e.g., the internet). Unlike such existing methods, which are based on intervention by a UE, embodiments of the present disclosure include selective IP offload being performed entirely by the WAG.
In some embodiments, WAG-driven selective IP offload, shown in
As shown in the process 300 of
Full host IP addresses are typically static in nature, in that the device providing connectivity to the address (in this case, the WAG) does not change. This is due to the latency and difficulty of updating routing tables throughout the core network as well as the hierarchical nature of routing tables in which core routers do not have routing entries for each and every full user IP address. It is undesirable, impractical, and unworkable, to force core networks of many thousands of devices to know and adjust to host IP addresses that move.
UEs gain access to core network services using a variety of access technologies. The technologies may include, but are not limited to, Wi-Fi hotspots, LTE macro-cells, and FEMTO Cells. For purposes of this description, the generic term Attachment Point (“AP”) is used to describe the point of attachment for a UE to an access network.
One common characteristic of a UE is mobility. As people move about, the geographical location of the AP that serves the UE's access to the WAG may change. As a result, the WAG used to provide IP connectivity to the core network may change as well due to operator preference, geographic constraints, or one or more other factors. Given the characteristic described above that full host IP addresses do not move from one device to another, if the WAG changes, the IP address allocated to and used by the UE changes as well. This is an undesirable characteristic of existing architectures, since releasing an IP address and re-allocating one results in the disconnection of all IP flows using the old IP address. For example, if the user is in the middle of a video chat, the video chat would disconnect or suffer a long delay when the IP address is released and before the new IP address is allocated. This behavior is undesirable, both from a consumer perspective as well as from a provider perspective.
Later, the UE 506 moves and connects (at a second time and at a second location, “B”) to AP 501B, which is in communication with WAG2 502B via the access network 508. WAG2 502B, in turn, communicates with the origin server 534 via the core network 532. At 519, a new IP address, Y.Y.Y.Y, is allocated to the mobile UE 506 by WAG2. Still later, the UE 506 moves again, and connects (at a third time and at a third location, “C”) to AP 501C, which is in communication with WAG3 502C via the access network 508. WAG3 502C, in turn, communicates with the origin server 534 via the core network 532. At 521, yet another IP address, Z.Z.Z.Z, is allocated to the mobile UE 506 by WAG3. Data flows established between the UE 506 and the first access point 501A may be terminated after the UE 506 moves to location B. Similarly, data flows established between the UE 506 and the second access point 501B may be terminated after the UE 506 moves to location C. Thus, in the prior art, this results in a disruption of service as the IP address is forced to change as the anchor point changes.
Mobility Events & Anchoring WAG IdentificationEmbodiments of the invention use techniques known in the art for a UE to detect mobility, select a new AP, and subsequently select a new WAG. Once mobility/movement has taken place, the UE will attempt to re-confirm its connectivity to core network resources. For example, when a UE detects a WAG (which may be an anchoring WAG or a hosting WAG) over WiFi, the UE can request an IP address. Mechanisms for reconfirming connectivity to core network resources can vary from UE to UE. They include, but are not limited to: re-authenticating with the WAP, sending a Dynamic Host Configuration Protocol (“DHCP”) Confirm message to the WAG, or sending a Neighbor Solicitation to the WAG. The UE behavior does not need to change regardless of whether the WAG supports the IP address preservation techniques disclosed herein or not—it is the result of the confirmation request that indicates to the UE whether it can continue to use the existing IP address or whether it should request a new IP address.
In some embodiments, when a hosting WAG determines that a UE is attempting to reconfirm its core network connectivity and it is not the anchoring WAG for the UE, it attempts to determine the identity of the anchoring WAG. This determination can be made, for example, when the WAG inspects an incoming data packet and recognizes that it is receiving the data “mid-stream,” and thus that the subscriber is new. Several approaches for determining the identity of an anchoring WAG are set forth herein. In one approach, the WAP indicates to the hosting WAG the IP address of the anchoring WAG. This information may be pushed to the hosting WAG by the WAP when the UE re-authenticates with the WAP, or it may be requested by the hosting WAG from the WAP when the UE attempts to reconfirm its IP address with the WAG. In another approach, the hosting WAG uses local configuration data and the UE's IP address to determine the IP address of the anchoring WAG, for example by recognizing that the UE's IP address falls within a pre-allocated range (which may be hierarchically ordered) that correlates with an anchoring WAG. In still a further approach, a deep packet inspection is performed on the traffic being attempted by the UE, and it is discovered that the packets are within a series of packets already exchanged.
In some embodiments, as a UE moves from one AP/WAG to another in a manner similar to that described above with reference to
To forward data from an anchoring WAG to a hosting WAG, a tunnel can be created between the anchoring WAG and the hosting WAG that can be used to tunnel the data across the access network. In one implementation of the present disclosure, GTP is used. However, tunneling technologies such as GRE, MPLS, etc. can be used as well and remain within the scope of the invention.
The result of a successful request is a bi-directional tunnel, e.g., a GTP-U tunnel, between the two WAGs that is used to forward UE user data between the two. This UE user data can correspond to one or more already-existing data flows that were established between the UE and the anchoring WAG when the UE was originally connected to the anchoring WAG. If the GTP tunnel setup is successful at 750, the IP address is successfully confirmed at 744. In some implementations, the anchoring WAG will re-confirm the IP address requested by the UE so that there is no disruption of the IP data flow between the UE and core network resources. From the core network's perspective, all UE data is still sourced and sinked from the anchoring WAG. From the UE's perspective, all UE data is sourced/sinked from the hosting WAG. If the GTP tunnel setup is unsuccessful at 750, the WAG provides an indication to the UE that the IP address for which the UE requested confirmation is no longer valid (752). Likewise, if the anchoring WAG for the UE is not known at 746, the WAG provides an indication to the UE that the IP address for which the UE requested confirmation is no longer valid (752).
If the UE 806B is known to the hosting WAG 802B, the IP address is successfully confirmed. However, if the UE 806B is not known to the hosting WAG 802B, then the hosting WAG 802B determines whether or not the anchoring WAG for the UE is known. If the UE's anchoring WAG (802A)'s IP information is known to the hosting WAG 802B, the hosting WAG 802B initiates the setup of a GTP-u tunnel with the anchoring WAG 802A by sending a Create Session Request to the anchoring WAG 802A. As discussed above, the Create Session Request can contain the identity of the UE 806B (i.e., its IP address) as well as other data that may be required by the anchoring WAG 802A to identify and forward data flows to the hosting WAG 802B (e.g., QoS, bearer information, etc.). The anchoring WAG 802A responds with a Create Session Response that indicates the success/failure of the request. In
In some embodiments, if UE 806 initiates a new data flow after UE 806 has moved to location B, that new data flow can be routed directly to the origin server 834 from the hosting WAG 802B, via the core network 832, without tunneling to anchoring WAG 802A. The new data flow would then be routed along bidirectional path P1-P2-P5, as shown in
In some embodiments, after the UE 806 has moved to hosting WAG 802B from the initial anchoring WAG 802A, and all data flows that involved the anchoring WAG 802A have ended, the hosting WAG 802B may cease to communicate with the anchoring WAG 802A, and may itself become a new anchoring WAG for UE 806 going forward.
UE Data Transfer/ForwardingThe techniques and systems disclosed herein may be implemented as a computer program product for use with a network, computer system or computerized electronic device. Such implementations may include a series of computer instructions, or logic, fixed either on a tangible medium, such as a computer readable medium (e.g., a diskette, CD-ROM, ROM, flash memory or other memory or fixed disk) or transmittable to a network, computer system or a device, via a modem or other interface device, such as a communications adapter connected to a network over a medium.
The medium may be either a tangible medium (e.g., optical or analog communications lines) or a medium implemented with wireless techniques (e.g., Wi-Fi, cellular, microwave, infrared or other transmission techniques). The series of computer instructions embodies at least part of the functionality described herein with respect to the system. Those skilled in the art should appreciate that such computer instructions can be written in a number of programming languages for use with many computer architectures or operating systems.
Furthermore, such instructions may be stored in any tangible memory device, such as semiconductor, magnetic, optical or other memory devices, and may be transmitted using any communications technology, such as optical, infrared, microwave, or other transmission technologies.
It is expected that such a computer program product may be distributed as a removable medium with accompanying printed or electronic documentation (e.g., shrink wrapped software), preloaded with a computer system (e.g., on system ROM or fixed disk), or distributed from a server or electronic bulletin board over the network (e.g., the Internet or World Wide Web). Of course, some embodiments of the invention may be implemented as a combination of both software (e.g., a computer program product) and hardware. Still other embodiments of the invention are implemented as entirely hardware, or entirely software (e.g., a computer program product).
In the foregoing description, certain steps or processes can be performed on particular servers or as part of a particular engine. These descriptions are merely illustrative, as the specific steps can be performed on various hardware devices, including, but not limited to, server systems and/or mobile devices. Similarly, the division of where the particular steps are performed can vary, it being understood that no division or a different division is within the scope of the invention. Moreover, the use of “module” and/or other terms used to describe computer system processing is intended to be interchangeable and to represent logic or circuitry in which the functionality can be executed.
Claims
1. A method of data communication, the method comprising:
- receiving by a first wireless access gateway (WAG) at least a first data packet corresponding to a first data flow transmitted from a user equipment (UE);
- receiving by a second WAG at least a second data packet transmitted from the UE;
- in response to receiving the second data packet, the second WAG determining an identity of the first WAG;
- in response to determining the identity of the first WAG, establishing a tunnel connection between the first WAG and the second WAG;
- after establishing the tunnel connection, receiving by the second WAG at least a third data packet corresponding to the first data flow transmitted from the UE; and
- the second WAG transmitting to the first WAG via the tunnel connection the third data packet.
2. The method of claim 1, wherein the second data packet corresponds to the first data flow.
3. The method of claim 1, wherein the second data packet corresponds to a request by the UE for confirmation that an Internet Protocol (IP) address presently assigned to the UE may still be used to conduct the first data flow.
4. The method of claim 3, further comprising the second WAG transmitting a response to the UE request for confirmation, the response comprising confirmation that the UE may continue to use the IP address presently assigned to the UE.
5. The method of claim 1, wherein the tunnel connection comprises a GPRS Tunneling Protocol (GTP) tunnel.
6. The method of claim 1, further comprising:
- receiving, at the first WAG, at least a fourth data packet corresponding to the first data flow intended for the UE;
- the first WAG transmitting the received fourth data packet to the second WAG via the tunnel connection; and
- the second WAG transmitting the fourth data packet to the UE.
7. The method of claim 6, wherein the fourth data packet is transmitted by an origin server, and the method further comprising the first WAG performs a network address translation operation on the fourth data packet before transmitting the fourth data packet to the second WAG.
8. The method of claim 1, further comprising transmitting user data associated with the UE via the tunnel connection.
9. The method of claim 1, further comprising the second WAG inspecting the second data packet to determine whether the second data packet is part of an existing data flow or part of a new data flow.
10. The method of claim 1, the second WAG determining the identity of the first WAG comprising the second WAG receiving the identity of the first WAG from a Wireless Authentication, Authorization, and Accounting Proxy (WAP).
11. The method of claim 10, the second WAG receiving the identity of the first WAG from the WAP being in response to the second WAG requesting the identity of the first WAG in response to the second WAG receiving the second data packet.
12. The method of claim 10, the second WAG receiving the identity of the first WAG from the WAP being in response to the UE transmitting a re-authentication request to the WAP.
13. The method of claim 1, the second WAG determining the identity of the first WAG comprising inspecting the IP address of the UE and determining the identity of the first WAG based on the IP address of the UE.
14. The method of claim 1, further comprising:
- receiving by the second WAG at least a fourth data packet corresponding to a second data flow transmitted from the UE; and
- the second WAG transmitting the fourth data packet to a computer system while bypassing the tunnel connection.
15. A method of data communication, the method comprising:
- receiving by a first wireless access gateway (WAG) at least a first data packet corresponding to a first data flow transmitted by a computer system intended for a user equipment (UE);
- the first WAG transmitting the first data packet to the UE;
- the first WAG determining an identity of a second WAG;
- in response to determining the identity of the second WAG, establishing a tunnel connection between the first WAG and the second WAG;
- after establishing the tunnel connection, receiving by the first WAG at least a second data packet corresponding to the first data flow transmitted by the computer system intended for the UE;
- the first WAG transmitting to the second WAG, via the tunnel connection, the second data packet; and
- the second WAG transmitting the second data packet to the UE.
16. The method of claim 14, the first WAG determining an identity of the second WAG being in response to determining that the UE is inaccessible via the first WAG.
17. The method of claim 14, the first WAG determining the identity of the second WAG comprising the first WAG receiving the identity of the second WAG from a Wireless Authentication, Authorization, and Accounting Proxy (WAP).
18. The method of claim 17, the first WAG receiving the identity of the second WAG from the WAP being in response to the first WAG requesting the identity of the second WAG.
19. The method of claim 17, the first WAG receiving the identity of the second WAG from the WAP being in response to the UE transmitting a re-authentication request to the WAP.
20. A method of selectively routing data communications, comprising:
- providing a wireless access gateway (WAG) with network connectivity to a wireless operator network and a packet data network, wherein the packet data network resides outside of the wireless operator network;
- receiving by the WAG a first data packet intended for a first computer system included in the wireless operator network;
- selectively routing the first data packet to the first computer system via the wireless operator network;
- receiving by the WAG a second data packet intended for a second computer system included in the packet data network; and
- selectively routing the second data packet to the second computer system via the packet data network while bypassing the wireless operator network.
21. The method of claim 20, wherein the selectively routing the first data packet to the first computer system includes basing the selection on at least one of a source Internet Protocol (IP) address, a source User Datagram Protocol/Transmission Control Protocol (UDP/TCP) port, a destination IP address, a destination UDP/TCP port, and a traffic type of the first data packet.
22. The method of claim 20, wherein the selectively routing the second data packet to the second computer system includes basing the selection on at least one of a source Internet Protocol (IP) address, a source User Datagram Protocol/Transmission Control Protocol (UDP/TCP) port, a destination IP address, a destination UDP/TCP port, and a traffic type of the second data packet.
23. The method of claim 20, wherein the selectively routing the first data packet to the first computer system includes routing the first data packet via a GPRS Tunneling Protocol (GTP) tunnel to the wireless operator network.
24. A system for data communication, the system comprising:
- a first wireless access gateway (WAG) configured to receive at least a first data packet corresponding to a first data flow transmitted from a user equipment (UE); and
- a second WAG configured to receive at least a second data packet transmitted from the UE, the second WAG comprising a second WAG processor and second WAG instructions stored in a second WAG machine readable medium that when executed cause the second WAG processor to: in response to receiving the second data packet, determine an identity of the first WAG, in response to determining the identity of the first WAG, cause the system to establish a tunnel connection between the first WAG and the second WAG, and after establishing the tunnel connection and in response to receiving at least a third data packet corresponding to the first data flow transmitted from the UE, transmit to the first WAG via the tunnel connection the third data packet.
25. The system of claim 24, wherein the second data packet corresponds to the first data flow.
26. The system of claim 24, wherein the second data packet corresponds to a request by the UE for confirmation that an Internet Protocol (IP) address presently assigned to the UE may still be used to conduct the first data flow.
27. The system of claim 26, the second WAG instructions stored in the second WAG machine readable medium further comprising instructions that when executed cause the second WAG processor to transmit a response to the UE request for confirmation, the response comprising confirmation that the UE may continue to use the IP address presently assigned to the UE.
28. The system of claim 24, wherein the tunnel connection comprises a GPRS Tunneling Protocol (GTP) tunnel.
29. The system of claim 24, wherein:
- the first WAG comprises a first WAG processor and first WAG instructions stored in a first WAG machine readable medium that when executed cause the first WAG processor to: receive at least a fourth data packet corresponding to the first data flow intended for the UE, and transmit the received fourth data packet to the second WAG via the tunnel connection; and
- the second WAG instructions stored in the second WAG machine readable medium further comprising instructions that when executed cause the second WAG processor to transmit the fourth data packet to the UE.
30. The system of claim 29, wherein the fourth data packet is transmitted by an origin server, and the first WAG instructions stored in the first WAG machine readable medium further comprising instructions that when executed cause the first WAG processor to perform a network address translation operation on the fourth data packet before transmitting the fourth data packet to the second WAG.
31. The system of claim 24, the second WAG instructions stored in the second WAG machine readable medium further comprising instructions that when executed cause the second WAG processor to inspect the second data packet to determine whether the second data packet is part of an existing data flow or part of a new data flow.
32. The system of claim 24, the second WAG instructions stored in the second WAG machine readable medium further comprising instructions that when executed cause the second WAG processor to determine the identity of the first WAG by receiving the identity of the first WAG from a Wireless Authentication, Authorization, and Accounting Proxy (WAP).
33. The system of claim 32, the second WAG instructions stored in the second WAG machine readable medium further comprising instructions that when executed cause the second WAG processor to request the identity of the first WAG in response to receiving the second data packet.
34. The system of claim 24, the second WAG instructions for causing the second WAG processor to determine the identity of the first WAG including instructions for causing the second WAG processor to inspect the IP address of the UE and determine the identity of the first WAG based on the IP address of the UE.
35. The system of claim 24, the second WAG instructions stored in the second WAG machine readable medium further comprising instructions that when executed cause the second WAG processor to:
- receive at least a fourth data packet corresponding to a second data flow transmitted from the UE; and
- transmit the fourth data packet to a computer system while bypassing the tunnel connection.
36. A system for data communication, comprising:
- a first wireless access gateway (WAG), the first WAG comprising a first WAG processor and first WAG instructions stored in a first WAG machine readable medium that when executed cause the first WAG processor to transmit data packets to a user equipment (UE); and
- a second WAG configured to receive at least a first data packet corresponding to a first data flow transmitted by a computer system intended for the UE, the second WAG comprising a second WAG processor and second WAG instructions stored in a second WAG machine readable medium that when executed cause the second WAG processor to: transmit the first data packet to the UE, determine an identity of the first WAG, in response to determining the identity of the first WAG, cause the system to establish a tunnel connection between the first WAG and the second WAG, and after establishing the tunnel connection and in response to receiving at least a second data packet corresponding to the first data flow transmitted by the computer system intended for the UE, transmit to the first WAG, via the tunnel connection, the second data packet.
37. The system of claim 36, the second WAG instructions that cause the second WAG processor to determine the identity of the first WAG including instructions that cause the second WAG processor to determine the identity of the first WAG in response to determining that the UE is inaccessible via the second WAG.
38. The system of claim 36, the second WAG instructions that cause the second WAG processor to determine the identity of the first WAG including instructions that cause the second WAG processor to receive the identity of the first WAG from a Wireless Authentication, Authorization, and Accounting Proxy (WAP).
39. The system of claim 38, the second WAG instructions stored in the second WAG machine readable medium further comprising instructions that when executed cause the second WAG processor to request the identity of the second WAG from the WAP.
40. A wireless access gateway (WAG) for selectively routing data communications, comprising:
- a first network interface to a wireless operator network;
- a second network interface to a packet data network, wherein the packet data network resides outside of the wireless operator network;
- a processor; and
- machine readable instructions that when executed cause the processor to: receive a first data packet intended for a first computer system included in the wireless operator network, selectively route the first data packet to the first computer system via the wireless operator network, receive a second data packet intended for a second computer system included in the packet data network, and selectively route the second data packet to the second computer system via the packet data network while bypassing the wireless operator network.
41. The WAG of claim 40, the instructions that when executed cause the processor to selectively route the first data packet to the first computer system including instructions to cause the processor to base the selection on at least one of a source Internet Protocol (IP) address, a source User Datagram Protocol/Transmission Control Protocol (UDP/TCP) port, a destination IP address, a destination UDP/TCP port, and a traffic type of the first data packet.
42. The WAG of claim 40, the instructions that when executed cause the processor to selectively route the first data packet to the first computer system including instructions to cause the processor to base the selection on at least one of a source Internet Protocol (IP) address, a source User Datagram Protocol/Transmission Control Protocol (UDP/TCP) port, a destination IP address, a destination UDP/TCP port, and a traffic type of the second data packet.
43. The WAG of claim 40, the instructions that when executed cause the processor to selectively route the first data packet to the first computer system including instructions to cause the processor to route the first data packet via a GPRS Tunneling Protocol (GTP) tunnel to the wireless operator network.
Type: Application
Filed: Dec 22, 2016
Publication Date: Jul 6, 2017
Inventors: Mark LIBBY (Groton, MA), Deepak GARG (Nashua, NH), Girish NAIR (Nashua, NH), Narsi VELDANDA (Northboro, MA)
Application Number: 15/388,321