Mobile core dynamic tunnel end-point processing

ABSTRACT

The present technology is directed to a system and method for using cloud based processing to co-locate one or more tunnel end points, associated with mobile user generated traffic traversing a Core network, with the serving machine located on application provider network. The describe system/method involves early stage identification of traffic flow (i.e., at the Packet Data network Gateway device using Application Detection and Control function) and dynamically instantiating an end point for the aforementioned traffic flow at the server where the application request is being served. The traffic is then directly tunneled to the endpoint thus avoiding decapsulated mobile traffic from traversing across provider network.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a Continuation of U.S. application Ser. No.16/121,509, filed on Sep. 4, 2018, the content of which is incorporatedherein by reference in its entirety.

TECHNICAL FIELD

The present technology pertains to managing tunneling over an IPnetwork. More specifically it is directed to next generation mobile usertraffic tunneling management across an IP network.

BACKGROUND

Today's Mobile Internet traffic traverses many Tunnels and Hops to reachthe applications. This results in latency and internet congestion.

BRIEF DESCRIPTION OF THE DRAWINGS

In order to describe the manner in which the above-recited and otheradvantages and features of the disclosure can be obtained, a moreparticular description of the principles briefly described above will berendered by reference to specific embodiments thereof which areillustrated in the appended drawings. Understanding that these drawingsdepict only exemplary embodiments of the disclosure and are nottherefore to be considered to be limiting of its scope, the principlesherein are described and explained with additional specificity anddetail through the use of the accompanying drawings in which:

FIG. 1 illustrates an example general Radio Access and Core network formobile traffic transport, in accordance with some embodiments of thepresent technology.

FIG. 2 illustrates an example set up for tunnel based processing ofmobile traffic on an evolved packet core system, in accordance with someembodiments of the present technology.

FIG. 3 illustrates an example flowchart describing tunnel basedprocessing of mobile traffic on an evolved packet core system, inaccordance with some embodiments of the present technology.

FIG. 4 illustrates an example set up for Segment Routing (SRv6) basedprocessing of mobile traffic on an evolved packet core system, inaccordance with some embodiments of the present technology.

FIG. 5 illustrates an example flowchart describing Segment Routing(SRv6) based processing of mobile traffic on an evolved packet coresystem, in accordance with some embodiments of the present technology.

DESCRIPTION OF EXAMPLE EMBODIMENTS

Additional features and advantages of the disclosure will be set forthin the description which follows, and in part will be obvious from thedescription, or can be learned by practice of the herein disclosedprinciples. The features and advantages of the disclosure can berealized and obtained by means of the instruments and combinationsparticularly pointed out in the appended claims. These and otherfeatures of the disclosure will become more fully apparent from thefollowing description and appended claims, or can be learned by thepractice of the principles set forth herein.

Overview

Systems, methods, and devices are disclosed for streamlining processingof mobile user traffic across a Core IP network. The describedembodiments comprise a service to detect and identify a sourceapplication associated with a data traffic flow and locating a servingdevice associated with the source application. Once source applicationassociated with the data traffic flow is identified a request forinstantiation of a tunnel end point processor is dynamically generatedand sent to the serving device. The described embodiments furthercomprise transferring information associated with the source applicationtraffic to the tunnel end point processor that has been dynamicallyinstantiated at the serving device, and forwarding data trafficassociated with the source application directly to the tunnel end pointprocessor on the serving device. The source applications may beinstalled on one or more mobile devices with the correspondingapplication end-point located on a third party service provider network.Furthermore, detection and identification of application flow may takeplace on an Packet Data Network Gateway device. The packet data networkgateway device may also be responsible for generation of one or morerequests to instantiate one or more tunnel end point processors on theapplication endpoint device. In some embodiments the technology involvessegment routing (SRv6) tunnels established between a Packet Data NetworkGateway device, such as a tunneling exchange Segment Router, and thirdparty application host device. The segment routing (SRv6) tunnels may beterminated on one or more SRv6 endpoints dynamically instantiated on thethird party application host device in response to request from thetunneling exchange Segment Router.

EXAMPLE EMBODIMENTS

For clarity of explanation, in some instances the present technology maybe presented as including individual functional blocks includingfunctional blocks comprising devices, device components, steps orroutines in a method embodied in software, or combinations of hardwareand software.

Mobile phone traffic traverses the internet before reaching a serversCPU/memory. This results in latency and internet congestion. Diversityand amount of traffic generated from mobile applications hassignificantly increased over the past few years and the trend indicatesthat it will continue to increase, at least in the near future. Thismobile traffic is generally transported via tunnels. Tunneling operationinvolves encapsulation and decapsulation operations across the Core IPNetwork. This may increase the delay experienced on the IP network whileat the same time negatively impacting packet congestion experienced onthe network.

The forgoing challenge with respect to upward scaling of mobile traffictransported over an IP network is addressed through embodiments of thepresent technology. Some embodiments are directed at cloud-basedprocessing to co-locate an end-point of a tunnel carrying mobileapplication traffic with the corresponding application server or networkdevice serving as the application endpoint. Co-locating the tunnel endpoint with the corresponding network resource may be accomplished, inaccordance with some embodiments, by dynamically installing a Tunnel EndPoint Processor (DTEPP) on the application server designated as theend-point for the particular mobile application associated with thetunneled traffic flow. Consequently, the corresponding mobile traffic isdirectly tunneled to the application server and terminated at theDynamic Tunnel End Point Processor (DTEPP) installed thereon. Thuscircumventing decapsulated mobile traffic from traversing the IP networkand exacerbating the congestion and delay performance of the network.

Some embodiments of the present technology describe a method involvinginstantiation of an application-specific tunnelencapsulation/decapsulation processor at the location of the applicationendpoint where the requested application service is being accessed. Onceapplication flow is detected and source application identified (forexample, by a service running on an edge node), a network servicelocates the corresponding application endpoint. At this point a networkedge device such as the Serving Gateway and/or the PDN Gatewayfacilitates the installation of a tunnel endpoint processor for themobile application traffic. Subsequently, the mobile application trafficis then directly tunneled to the specified application endpoint, whichis often the server device hosting the mobile application, and directlyterminated at the dynamically instantiated tunnel end-point processorinstalled thereon.

The Core Network (CN), also referred to as the Evolved Packet Core(EPC), is responsible for the data routing, accounting, and policymanagement of traffic generated by mobile user equipment (UE). The CoreNetwork connects the radio network to the public Internet. FIG. 1depicts a general Long Term Evolution (LTE) Core Network architecture100.

With reference to the Core Network Architecture 100 in FIG. 1, UserEquipment (UE), such as a mobile phone device used to access the LTEnetwork, is connected to the EPC over the LTE base stations (eNodeB) inthe radio access network. The EPC is composed of the following elements:the Mobility Management Entity (MME), the Serving Gateway (SGW), thePacket data network Packet Gateway (PDN Gateway or PGW), and the Policyand Charging Rules Function (PCRF). The MME and PCRF are pure controlfunction entities, which manage the UE's mobility, authentication,traffic treatment policies and charging. The Serving Gateway is theanchor point of the intra-LTE (devices within the radio network)mobility and between LTE and other external access points. It logicallyinterconnects the eNodeBs with the PDN Gateway.

The PDN Gateway serves as the demarcation point between external IPnetworks and the mobile operator's network (i.e., the public gatewaythat connects the mobile carrier to the public internet). The PDNGateway is the termination point for all external connections,regardless of the protocol. When a mobile device is connected to thecarrier network, the IP address of the device is allocated andmaintained by the PDN Gateway. Because it is the PDN Gateway thatterminates all connections, the device radio state is not tied toapplication layer connectivity: tearing down the radio context withinthe radio network terminates the physical radio link between the deviceand the radio tower, but this does not affect the state of any TCP orUDP sessions. The device radio can be idle, with no link to the localradio tower, while the established connections are maintained by the PDNGateway. Moreover, PDN Gateway enforces Quality of Service (QoS)policies, performs lawful interception, traffic monitoring and billing,etc. The Policy and Charging Rules Function (PCRF) component isresponsible for maintaining and evaluating these rules for the packetdata network gateway (PDN Gateway). PCRF is a logical component, meaningit can be part of the PDN Gateway, or it can stand on its own.

When PDN Gateway receives incoming packets from the public Internet forone of the mobile devices on its network it may have no knowledge of theactual location of the user, nor the different tracking areas(collection of radio base stations) within the radio access network.This next step is the responsibility of the Serving Gateway (SGW) andthe Mobility Management Entity (MME). Accordingly, the PDN Gatewayroutes all inbound packets to the Serving Gateway. If the ServingGateway is not aware of the exact location of the user either, itqueries the Mobility Management Entity (MME) for the requiredinformation. This function is, in fact, one of the core responsibilitiesof the MME. The Mobility Management Entity (MME) component iseffectively a user database, which manages all the states for every useron the network: user location on the network, type of account, billingstatus, enabled services, in addition to all other user metadata.Whenever a user enters a different tracking area, its location isupdated in the MME, but handoffs between radio base stations within thesame tracking area do not trigger an update to the MME. Therefore MMEmay not know the exact base station (eNodeB) currently servicing theuser. When the user turns on their phone, the authentication isperformed by the MME.

Accordingly, if the device (UE) is idle, the MME sends a paging messageto all the radio base stations in the tracking area, which in turn allbroadcast a notification on a shared radio channel, indicating that thedevice (UE) should reestablish its radio context to receive the inbounddata. The device periodically wakes to listen to the paging messages,and if it finds itself on the paging list, then it initiates thenegotiation with the radio tower to reestablish the radio context.

Once the radio context is established, the base station that performedthe negotiation sends a message back to the MME indicating where theuser is. The MME then returns the answer to the Serving Gateway, and theServing Gateway finally routes the message to the tower, which thendelivers the message to the device. Once the device is in a connectedstate, a direct tunnel is established between the radio base station andthe Serving Gateway (SGW), which means that further incoming packets arerouted directly to the base station without the signaling overhead.

The General Packet Radio Service (GPRS) Tunneling Protocol (GTP) is usedas the communication protocol to support traffic tunneling in Log TermEvolution (LTE) networks. For instance, in-between the SGW and PDNGateway, the designated protocols are used to carry the controlsignaling messages and user data packets, respectively. The user datapackets are carried over flows, which are bound to bearers. A bearerprovides a logical transmission channel between a UE and a Packet DataNetwork (PDN). To ensure the transmission Quality of Service (QoS), aset of QoS parameters is associated with a bearer, indicating theproperties of the transmission channel. A traffic flow passing throughthe network can be identified by the five-tuple of IP source anddestination addresses, the port numbers of source and destination, andthe Protocol Identifier (PI). Each bearer is associated with a tunnel,the endpoint of which is identified by a Tunnel Endpoint Identifier.

Once through the Service provider's ingress edge router, the traffic isencapsulated and forwarded across the IP-based infrastructure of theCore Network. Alternatively the traffic may be tunneled across the CoreIP Network of the service provider and decapsulated on the interface ofthe provider's Edge Router that carrier the outgoing traffic to thecustomer site.

FIG. 2 illustrate example mobile core system 200 according to someembodiments. The example system 200 in FIG. 2 comprises a User Equipment202 connected to base station/eNodeB 204. eNodeB 204 established aconnection with the Core Network/Evolved Packet core system 206 in orderto transport user traffic to and from target destinations. The CoreNetwork 206 comprises a Service Gateway 208 connected to a PDN Gateway210. Serving Gate way 208 is also in communication with MobilityManagement Entity 212 which it queries for required user-relatedinformation. Similarly PDN Gateway 210 is in communication with PolicyCharging Rules Function 214 and comprise an inline/embedded ApplicationDetection and Control (ADC) element 216.

Referring back to FIG. 2, as the user starts to send traffic, theApplication Detection and Control (ADC) element 216 of the PDN Gateway210 may be augmented to send CCR-U (Credit Control Request Updaterequest) to the Policy Charging Rules Function (PCRF) 214 requesting anapplication specific dedicated bearer (logical channel associated with aspecific level of packet forwarding treatment which applies to all typesof traffic mapped to particular bearer). In the implementation of theaforementioned embodiment, normal User Equipment session establishmentand data flow would be unchanged. ADC element 216 works in conjunctionwith PDN Gateway 210 to communicates with PCRF 214 and identifysubscriber-application traffic. In this way ADC service enablepolicy-based QoS and charging/control actions to be enforced on thetraffic flows in real time.

In some embodiments of the present technology, the aforementionedpolicy-based QoS charging/control action also initiates a Dynamic TunnelEnd Point Processing/Processor (DTEPP) request 218 that is sent, throughthe internet 219, to the Elastic Service Controller (ESC) 220 of theapplication end-point server 222. The ESC 220 then instantiates one ormore Dynamic Tunnel End Point Processor 224 on the application end-pointserver 222 of the target application and inform the PDN Gateway 210 ofthe relevant information with regards to the newly created DynamicTunnel End Point Processor 224. Once the Dynamic Tunnel End PointProcessor 224 is ready, PDN Gateway will inform the Serving Gateway 208to transfer the Tunnel Endpoint Identifiers and application specificTraffic Flow Template (TFT) to the Dynamic Tunnel End Point Processor224. Application traffic is then tunneled directly to the applicationend-point server via logical connection 226 established between boundarydevice of the Core Network and the particular application server.

Traffic Flow Template (TFT) is a set of information records that is usedto map a Service Data Flows to a specific Radio Bearer or that allow theGeneral Packet Radio Service (GPRS) Core Network to classify packetsreceived from an external network into the correct Packet Data Protocolcontext. The new Dynamic Tunnel End Point Processor 224 may alsoestablish a connection to the PCRF 214 to inform of billing data.

In way of an example, consider user generated request for an iTunesservice. The request is detected by the PDN Gateway. The PDN Gatewayinitiates a request for a Dynamic Tunnel End Point Processor dispatchedto ESC element of the iTunes server located in the iTunes data center.The ESC element of the iTunes server would then initiate a DynamicTunnel End Point Processor. Once established, the new dynamicallyinitiated Tunnel End Point Processor on the iTunes server informs thePDN Gateway that the Tunnel End Point Processor is ready. At this pointthe PDN Gateway informs the Serving Gateway to transfer the user iTunestraffic over to the new Dynamic Tunnel End point Processor.

FIG. 3 illustrates an example flow chart 300 for basic operationimplemented in accordance to some embodiments of the present technology.Referencing flow chart 300 at step 302 User Equipment (i.e., smartphone) established a session to the Evolved Packet Core (EPC) through acorresponding eNodeB base station. Once a connection is established, anapplication program is launched by the User Equipment (204). At step306, the application traffic is detected by Application Detection andControl (ADC) function provided by the EPC boundary device (PDN Gateway). At step 308, the PDN gateway device locates the endpoint server ofthe requested application and send a request to the associated ElasticService Controller for a Dynamic End Point Processor to be initiated onthe application endpoint server. At step 310 The application endpointserver initiates the Tunnel End Point Processor and informs the PDNGateway of the new tunnel endpoint processor. Accordingly, at step 312,the PDN Gateway device informs the Serving Gateway of the new tunnelendpoint processor on the application endpoint server and requestrelevant information such as tunnel endpoint identifier and Traffic FlowTemplate to be transferred to the new tunnel endpoint processor. Once adirect tunnel between EPC boundary device (i.e., Serving Gateway, PacketGateway) is established, application specific traffic is directlytunneled to the new Tunnel endpoint processor dynamically initiated onapplication endpoint server located on the application provider network.

The described embodiment results in colocation of mobile tunnel endpointand the serving device/resources (i.e. CPU, memory). Mobile traffic willthen go directly to the Dynamic Tunnel End point Processor (DTEPP), andnot result in decapsulated internet traffic. Therefore, embodiments ofthe present technology, are directed at dynamic instantiation ofapplication specific tunnel encapsulation/decapsulation processor at theapplication endpoint server, amounting to on-demand per-application userplane function.

Other embodiments may involve the use of Segment Routing with IPv6forwarding plane (SRv6) technology for dynamically instantiating a SRv6tunnel endpoint at the servers location. Thereby, streamlining usermobile traffic directly to the location of the server processing theapplication data. This embodiment is described by the exampleillustrated in FIG. 4.

FIG. 4 illustrate example implementation according to some embodiments.The example system 400 in FIG. 4 comprises a User Equipment 402connected to base station/eNodeB 404, eNodeB 404 established aconnection with the Core Network/Evolved Packet core system 406 in orderto transport user traffic to and from target destinations. The CoreNetwork 406 comprises a Service Gateway 408 connected to a PDN Gateway410. Serving Gate way 408 is also in communication with MobilityManagement Entity 412 which it queries for required user-relatedinformation. Similarly PDN Gateway 410 is in communication with PolicyCharging Rules Function 414 and comprise an inline/embedded ApplicationDetection and Control (ADC) element 416.

As the user starts to send traffic, the Application Detection andControl (ADC) element 416 of the PDN Gateway 410 may be augmented tosend CCR-U (Credit Control Request Update request) to the PolicyCharging Rules Function (PCRF) 414 requesting an application specificdedicated bearer (logical channel associated with a specific level ofpacket forwarding treatment which applies to all types of traffic mappedto particular bearer). In the implementation of the aforementionedembodiment, normal User Equipment session establishment and data flowwould be unchanged. ADC element 416 works in conjunction with PDNGateway 410 to communicates with PCRF 414 and identifysubscriber-application traffic. In this way ADC service enablepolicy-based QoS and charging/control actions to be enforced on thetraffic flows in real time.

In some embodiments of the present technology, the PDN Gateway 410 alsoinitiate a Dynamic SRv6 tunnel endpoint instance (i.e., SRv6 end.DX2instance) request 418 that is sent, through the internet 419, to theElastic Service Controller (ESC) 420 of the application end-point server422. The ESC 420 then instantiates one or more SRv6 Dynamic Tunnel EndPoint Processor 424 on the application end-point server 422 of thetarget application and inform the PDN Gateway 410 of the SegmentIdentifier (SID) of the newly created Dynamic SRv6 Tunnel endpoints.Once the Dynamic Tunnel End Point Processor 424 is ready, PDN Gatewaywould inform the Tunnel exchange Segment Router 425 about the newendpoint. The Tunnel exchange Segment Router 425 then updates the SRv6extension header with the new endpoint. Application traffic is thentunneled directly to the application end-point server via logicalconnection 426 established between tunnel exchange Segment Router 425and the target application server and decrypted/decapsulated by the newdynamic SRv6 endpoint 424 located on the application providers networkserver 422.

FIG. 5 illustrates an example flow chart 500 for basic operationimplemented in accordance to aforementioned embodiment of the presenttechnology. Referencing flow chart 500 at step 502 User Equipment (i.e.,smart phone) established a session to the Evolved Packet Core (EPC)through a corresponding eNodeB base station. Once a connection isestablished, an application program is launched by the User Equipment(504). At step 506, the application traffic is detected by ApplicationDetection and Control (ADC) function provided by the EPC boundary device(PDN Gate way). At step 508, the PDN gateway device locates the endpointserver of the requested application and send a request to the associatedElastic Service Controller for a Dynamic SRv6 End Point Processor (SRv6end.DX2) to be initiated on the application endpoint server. At step510, the application endpoint server initiates the SRv6 End PointProcessor and informs the PDN Gateway of the new SID of the endpointprocessor. Accordingly, at step 512, the PDN gateway device informs thetunnel exchange Segment Router about the new tunnel endpoint processoron the application endpoint server and request relevant information suchas tunnel endpoint identifier and Traffic Flow Template to betransferred to the new tunnel endpoint processor. The tunnel exchangeSegment Router accordingly updates the SRv6 extension header with thenew endpoint(s). Once a direct tunnel between EPC boundary device (i.e.,Serving Gateway, Packet Gateway, tunnel exchange Segment Router) isestablished, application specific traffic is directly tunneled to thenew SRv6 endpoint processor dynamically initiated on the applicationserver located on the application provider network.

Other embodiment of the present technology may include a networkinitiated switchover that causes the eNodeB to start forwarding theapplication specific traffic directly to the Dynamic Tunnel End pointProcessor (DTEPP).

In some embodiments the computer-readable storage devices, mediums, andmemories can include a cable or wireless signal containing a bit streamand the like. However, when mentioned, non-transitory computer-readablestorage media expressly exclude media such as energy, carrier signals,electromagnetic waves, and signals per se.

Methods according to the above-described examples can be implementedusing computer-executable instructions that are stored or otherwiseavailable from computer readable media. Such instructions can comprise,for example, instructions and data which cause or otherwise configure ageneral purpose computer, special purpose computer, or special purposeprocessing device to perform a certain function or group of functions.Portions of computer resources used can be accessible over a network.The computer executable instructions may be, for example, binaries,intermediate format instructions such as assembly language, firmware, orsource code. Examples of computer-readable media that may be used tostore instructions, information used, and/or information created duringmethods according to described examples include magnetic or opticaldisks, flash memory, USB devices provided with non-volatile memory,networked storage devices, and so on.

Devices implementing methods according to these disclosures can comprisehardware, firmware and/or software, and can take any of a variety ofform factors. Typical examples of such form factors include laptops,smart phones, small form factor personal computers, personal digitalassistants, and so on. Functionality described herein also can beembodied in peripherals or add-in cards. Such functionality can also beimplemented on a circuit board among different chips or differentprocesses executing in a single device, by way of further example.

The instructions, media for conveying such instructions, computingresources for executing them, and other structures for supporting suchcomputing resources are means for providing the functions described inthese disclosures.

Although a variety of examples and other information was used to explainaspects within the scope of the appended claims, no limitation of theclaims should be implied based on particular features or arrangements insuch examples, as one of ordinary skill would be able to use theseexamples to derive a wide variety of implementations. Further andalthough some subject matter may have been described in languagespecific to examples of structural features and/or method steps, it isto be understood that the subject matter defined in the appended claimsis not necessarily limited to these described features or acts. Forexample, such functionality can be distributed differently or performedin components other than those identified herein. Rather, the describedfeatures and steps are disclosed as examples of components of systemsand methods within the scope of the appended claims.

What is claimed is:
 1. A computer-implemented method comprising:detecting a source application associated with a data traffic flow;locating a serving device associated with the source application;requesting a tunnel end point processor to be instantiated at theserving device; transferring information associated with the datatraffic flow to the tunnel end point processor instantiated at theserving device; and forwarding data traffic associated with the sourceapplication to the tunnel end point processor on the serving device. 2.The computer-implemented method of claim 1, wherein the serving deviceassociated with the source application is located on an applicationprovider network.
 3. The computer-implemented method of claim 1, whereinthe information associated with the data traffic flow to the tunnel endpoint processor comprises one or more traffic flow templates.
 4. Thecomputer-implemented method of claim 1, wherein information associatedwith the data traffic flow to the tunnel end point processor comprisesone or more tunnel endpoint identifiers.
 5. The computer-implementedmethod of claim 1, wherein detecting the source application associatedwith the data traffic flow is performed via a packet data networkgateway device.
 6. The computer-implemented method of claim 1, whereinthe tunnel end point processor comprises a segment routing end pointprocessor.
 7. The computer-implemented method of claim 6, whereinrequesting the tunnel end point processor to be instantiated at theserving device comprises providing the segment routing end pointprocessor at the serving device.
 8. A system comprising: one or moreprocessors; and at least one non-transitory computer-readable mediumhaving stored therein instructions that, when executed by the one ormore processors, cause the one or more processors to: detect a sourceapplication associated with a data traffic flow; locate a serving deviceassociated with the source application; request a tunnel end pointprocessor to be instantiated at the serving device; transfer informationassociated with the data traffic flow to the tunnel end point processorinstantiated at the serving device; and forward data traffic associatedwith the source application to the tunnel end point processor on theserving device.
 9. The system of claim 8, wherein the serving deviceassociated with the source application is located on an applicationprovider network.
 10. The system of claim 8, wherein the informationassociated with the data traffic flow to the tunnel end point processorcomprises one or more traffic flow templates.
 11. The system of claim 8,wherein information associated with the data traffic flow to the tunnelend point processor comprises one or more tunnel endpoint identifiers.12. The system of claim 8, wherein detecting the source applicationassociated with the data traffic flow is performed via a packet datanetwork gateway device.
 13. The system of claim 8, wherein the tunnelend point processor comprises a segment routing end point processor. 14.The system of claim 13, wherein requesting the tunnel end pointprocessor to be instantiated at the serving device comprises providingthe segment routing end point processor at the serving device.
 15. Anon-transitory computer-readable storage medium comprising instructionsstored therein which, when executed by one or more processors, cause theone or more processors to: detect a source application associated with adata traffic flow; locate a serving device associated with the sourceapplication; request a tunnel end point processor to be instantiated atthe serving device; transfer information associated with the datatraffic flow to the tunnel end point processor instantiated at theserving device; and forward data traffic associated with the sourceapplication to the tunnel end point processor on the serving device. 16.The non-transitory computer-readable storage medium of claim 15, whereinthe information associated with the data traffic flow to the tunnel endpoint processor comprises one or more traffic flow templates.
 17. Thenon-transitory computer-readable storage medium of claim 15, whereininformation associated with the data traffic flow to the tunnel endpoint processor comprises one or more tunnel endpoint identifiers. 18.The non-transitory computer-readable storage medium of claim 15, whereindetecting the source application associated with the data traffic flowis performed via a packet data network gateway device.
 19. Thenon-transitory computer-readable storage medium of claim 15, wherein thetunnel end point processor comprises a segment routing end pointprocessor.
 20. The non-transitory computer-readable storage medium ofclaim 19, wherein requesting the tunnel end point processor to beinstantiated at the serving device comprises providing the segmentrouting end point processor at the serving device.