CA2470420A1 - Network load balancing with connection manipulation - Google Patents
Network load balancing with connection manipulation Download PDFInfo
- Publication number
- CA2470420A1 CA2470420A1 CA002470420A CA2470420A CA2470420A1 CA 2470420 A1 CA2470420 A1 CA 2470420A1 CA 002470420 A CA002470420 A CA 002470420A CA 2470420 A CA2470420 A CA 2470420A CA 2470420 A1 CA2470420 A1 CA 2470420A1
- Authority
- CA
- Canada
- Prior art keywords
- connection
- recited
- processor
- action
- protocol
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/16—Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/09—Mapping addresses
- H04L61/25—Mapping addresses of the same type
- H04L61/2503—Translation of Internet protocol [IP] addresses
- H04L61/2557—Translation policies or rules
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1001—Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1001—Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
- H04L67/1004—Server selection for load balancing
- H04L67/1008—Server selection for load balancing based on parameters of servers, e.g. available memory or workload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1001—Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
- H04L67/1004—Server selection for load balancing
- H04L67/101—Server selection for load balancing based on network conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1001—Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
- H04L67/1004—Server selection for load balancing
- H04L67/1014—Server selection for load balancing based on the content of a request
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1001—Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
- H04L67/1004—Server selection for load balancing
- H04L67/1017—Server selection for load balancing based on a round robin mechanism
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1001—Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
- H04L67/1004—Server selection for load balancing
- H04L67/1023—Server selection for load balancing based on a hash applied to IP addresses or costs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1001—Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
- H04L67/1027—Persistence of sessions during load balancing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1001—Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
- H04L67/1029—Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers using data related to the state of servers by a load balancer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1001—Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
- H04L67/1034—Reaction to server failures by a load balancer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
- H04L67/142—Managing session states for stateless protocols; Signalling session states; State transitions; Keeping-state mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/564—Enhancement of application control based on intercepted application data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/60—Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
- H04L67/63—Routing a service request depending on the request content or context
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/30—Definitions, standards or architectural aspects of layered protocol stacks
- H04L69/32—Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
- H04L69/322—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
- H04L69/329—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]
Abstract
In an exemplary device implementation, a device includes: a connection migrator that is configured to migrate connections away from the device; the connection migrator capable of precipitating a compilation of protocol state for a connection across a protocol stack; the connection migrator adapted to aggregate the compiled protocol state with data for the connection into an aggregated connection state; the connection migrator further capable of causing the aggregated connection state to be sent toward a target device. In an exemplary media implementation, processor-executable instructions direct a device to perform actions including: obtaining at least a portion of a source/destination pair from a packet; accessing an encapsulation mapping table using the at least a portion of the source/destination pair to locate an encapsulation mapping entry; extracting a flow identifier from the encapsulation mapping entry; and replacing part of the packet with the flow identifier to produce an encapsulated packet.
Claims (86)
1. One or more processor-accessible media comprising processor-executable instructions that, when executed, direct ai device to perform actions comprising:
accepting a connection;
aggregating a connection state for the connection from a protocol stack; and sending the connection state.
accepting a connection;
aggregating a connection state for the connection from a protocol stack; and sending the connection state.
2. The one or more processor-accessible media as recited in claim 1, wherein the action of accepting comprises an action of:
sending an acknowledgment packet in response to a connection-requesting packet.
sending an acknowledgment packet in response to a connection-requesting packet.
3. The one or more processor-accessible media as recited in claim 1, comprising the processor-executable instructions than, when executed, direct the device to perform a further action comprising:
receiving data for the connection;
wherein the action of aggregating comprises an action of:
aggregating the connection state from a protocol state of the protocol stack and the data.
receiving data for the connection;
wherein the action of aggregating comprises an action of:
aggregating the connection state from a protocol state of the protocol stack and the data.
4. The one or more processor-accessible media as recited in claim 1, wherein the action of aggregating comprises an action of:
compiling a protocol state from the protocol stack.
compiling a protocol state from the protocol stack.
5. The one or more processor-accessible media as recited in claim 4, wherein the action of compiling comprises an action of:
compiling the protocol state from the protocol stack starting at a highest level of the protocol stack.
compiling the protocol state from the protocol stack starting at a highest level of the protocol stack.
6. The one or more processor-accessible media as recited in claim 4, wherein the action of compiling comprises an action of:
compiling the protocol state from the protocol stack at a transmission control protocol (TCP) stack portion and an Internet protocol (IP) stack portion.
compiling the protocol state from the protocol stack at a transmission control protocol (TCP) stack portion and an Internet protocol (IP) stack portion.
7. The one or more processor-accessible media as recited in claim 1, wherein the action of sending comprises actions of:
bundling the connection state with a flow identifier that corresponds to the connection to produce a binary blob; and.
transmitting the binary blob from an originating device to a target device.
bundling the connection state with a flow identifier that corresponds to the connection to produce a binary blob; and.
transmitting the binary blob from an originating device to a target device.
8. The one or more processor-accessible media as recited in claim 1, wherein the action of sending comprises actions of:
bundling the connection state with a flow identifier that corresponds to the connection to produce a binary blob; and transmitting the binary blob from an originating device to a target device in a reliable manner such that the binary blob may be received intact at the target device even if one or more packets that comprise the binary blob are lost or corrupted.
bundling the connection state with a flow identifier that corresponds to the connection to produce a binary blob; and transmitting the binary blob from an originating device to a target device in a reliable manner such that the binary blob may be received intact at the target device even if one or more packets that comprise the binary blob are lost or corrupted.
9. The one or more processor-accessible media as recited in claim 1, comprising the processor-executable instructions that, when executed, direct the device to perform further actions comprising:
selecting a flow identifier for the connection responsive to a connection counter; and sending the flow identifier to identify packets corresponding to the connection.
selecting a flow identifier for the connection responsive to a connection counter; and sending the flow identifier to identify packets corresponding to the connection.
10. The one or more processor-accessible media as recited in claim 1, wherein the action of sending comprises an action of:
sending the connection state to a targeted device;
wherein the processor-executable instructions, when executed, direct the device to perform a further action comprising:
forwarding subsequent packets for the connection to the targeted device using a flow identifier to encapsulate the subsequent packets.
sending the connection state to a targeted device;
wherein the processor-executable instructions, when executed, direct the device to perform a further action comprising:
forwarding subsequent packets for the connection to the targeted device using a flow identifier to encapsulate the subsequent packets.
11. One or more processor-accessible media comprising processor-executable instructions that, when executed, direct a device to perform actions comprising:
receiving a connection state for a connection;
injecting the connection state for the connection into a network stack; and continuing the connection using the injected connection state.
receiving a connection state for a connection;
injecting the connection state for the connection into a network stack; and continuing the connection using the injected connection state.
12. The one or more processor-accessible media as recited in claim 11, wherein the action of continuing comprises an action of:
continuing the connection by indicating received packets up to an application in accordance with the injected connection state.
continuing the connection by indicating received packets up to an application in accordance with the injected connection state.
13. The one or more processor-accessible media as recited in claim 11, wherein:
the action of receiving comprises an action of:
receiving the connection state, the connection state having a protocol state and data for the connection; and the action of injecting comprises an action of:
injecting the protocol state into a protocol stack portion of the network stack.
the action of receiving comprises an action of:
receiving the connection state, the connection state having a protocol state and data for the connection; and the action of injecting comprises an action of:
injecting the protocol state into a protocol stack portion of the network stack.
14. The one or more processor-accessible media as recited in claim 13, wherein the action of injecting the connection state further comprises an action of:
indicating the data for the connection up the network stack toward an application.
indicating the data for the connection up the network stack toward an application.
15. The one or more processor-accessible media as recited in claim 11, wherein the action of injecting comprises an action of:
infusing a protocol state from the connection state into a protocol stack portion of the network stack.
infusing a protocol state from the connection state into a protocol stack portion of the network stack.
16. The one or more processor-accessible media as recited in claim 15, wherein the action of infusing comprises an action of:
infusing the protocol state into the protocol stack starting at a highest level of the protocol stack.
infusing the protocol state into the protocol stack starting at a highest level of the protocol stack.
17. The one or more processor-accessible media as recited in claim 15, wherein the action of infusing comprises an action of, infusing the protocol state into the protocol stack at a transmission control protocol (TCP) stack portion and an Internet protocol (IP) stack portion.
18. The one or more processor-accessible media as recited in claim 11, wherein the action of receiving comprises actions of:
receiving a binary blob from an originating device at a target device, the binary blob including the connection state and a flow identifier that corresponds to the connection; and unbundling the connection state and the flow identifier at a level of the network stack that is below a protocol stack portion of the network stack.
receiving a binary blob from an originating device at a target device, the binary blob including the connection state and a flow identifier that corresponds to the connection; and unbundling the connection state and the flow identifier at a level of the network stack that is below a protocol stack portion of the network stack.
19. The one or more processor-accessible media as recited in claim 11, comprising the processor-executable instructions that, when executed, direct the device to perform further actions comprising:
receiving an encapsulation mapping; and storing the received encapsulation mapping in an encapsulation mapping table that may be accessed according to flow identifier.
receiving an encapsulation mapping; and storing the received encapsulation mapping in an encapsulation mapping table that may be accessed according to flow identifier.
20. The one or more processor-accessible media as recited in claim 11, wherein the action of receiving comprises an action of:
receiving the connection state from an originating device;
wherein the processor-executable', instructions, when executed, direct the device to perform a further action comprising:
receiving from the originating device encapsulated packets that have a flow identifier; and de-encapsulating the encapsulated packets usin;~ an encapsulation mapping entry that links the flow identifier to a source/destination pair.
receiving the connection state from an originating device;
wherein the processor-executable', instructions, when executed, direct the device to perform a further action comprising:
receiving from the originating device encapsulated packets that have a flow identifier; and de-encapsulating the encapsulated packets usin;~ an encapsulation mapping entry that links the flow identifier to a source/destination pair.
21. One or more processor-accessible media comprising processor-executable instructions that comprise at least part of an application, wherein the processor-executable instructions, when executed, enable the application to initiate a connection migration by issuing a migrate connection function call to a socket layer such that the socket layer propagates the migrate; connection function call to a protocol stack, the migrate connection function call precipitating at the protocol stack a compilation of protocol state from the protocol stack.
22. The one or more processor-accessible media as recited in claim 21, wherein the application comprises at least one of a general application, a hosted application, and a load balancing application.
23. A device comprising:
a connection migrator that is configured to migrate connections away from the device; the connection migrator capable of precipitating a compilation of protocol state for a connection across a protocol stack; the connection migrator adapted to aggregate the compiled protocol state with data for the connection into an aggregated connection state of the connection; the connection migrator further capable of causing the aggregated connection state to be sent toward a target device.
a connection migrator that is configured to migrate connections away from the device; the connection migrator capable of precipitating a compilation of protocol state for a connection across a protocol stack; the connection migrator adapted to aggregate the compiled protocol state with data for the connection into an aggregated connection state of the connection; the connection migrator further capable of causing the aggregated connection state to be sent toward a target device.
24. The device as recited in claim 23, wherein the connection migrator is realized at least partially in software.
25. The device as recited in claim 23, wherein the device further comprises:
a classifier that is capable of accepting the connection, the classifier adapted to issue a migrate connection command to the connection migrator.
a classifier that is capable of accepting the connection, the classifier adapted to issue a migrate connection command to the connection migrator.
26. The device as recited in claim 25, wherein the data, which is aggregated with the compiled protocol state into the aggregated connection state, comprises data that has been acknowledged by the classifier.
27. The device as recited in claim 23, wherein the connection migrator comprises:
a migrator shim that is located above the protocol stack in a network stack of the device; and a migrator intermediate driver that is located below the protocol stack in the network stack of the device.
a migrator shim that is located above the protocol stack in a network stack of the device; and a migrator intermediate driver that is located below the protocol stack in the network stack of the device.
28. The device as recited in claim 27, wherein:
the migrator shim is located between the protocol stack and a socket layer of the network stack of the device; and the migrator intermediate driver is located between the protocol stack and at least one miniport of the network stack of the device.
the migrator shim is located between the protocol stack and a socket layer of the network stack of the device; and the migrator intermediate driver is located between the protocol stack and at least one miniport of the network stack of the device.
29. The device as recited in claim 28, wherein the migrator intermediate driver is located at a protocol-hardware interface layer of the network stack of the device.
30. The device as recited in claim 27, wherein:
the migrator shim is adapted to receive a migrate connection command and to propagate the migrate connection command to the protocol stack; and the migrator intermediate driver is adapted to divert a copy of the data for the connection for subsequent aggregation with the compiled protocol state.
the migrator shim is adapted to receive a migrate connection command and to propagate the migrate connection command to the protocol stack; and the migrator intermediate driver is adapted to divert a copy of the data for the connection for subsequent aggregation with the compiled protocol state.
31. The device as recited in claim 27, wherein the migrator intermediate driver is adapted to bundle the aggregated connection state and a flow identifier for the connection into a binary blob.
32. The device as recited in claim 23, wherein the connection comprises a transmission control protocol/internet protocol (TCP/IP) connection, and the compiled protocol state includes information related to a TCP/IP connection.
33. The device as recited in claim 23, wherein the device further comprises:
the protocol stack, the protocol stack adapted to compile the protocol state for the connection into the compiled protocol state responsive to a migrate connection command.
the protocol stack, the protocol stack adapted to compile the protocol state for the connection into the compiled protocol state responsive to a migrate connection command.
34. A device comprising:
a connection migrator that is configured to migrate connections onto the device; the connection migrator adapted to intercept a connection state for a connection that is sent from an originating device, the connection state including a protocol state and data; the connection migrator further adapted to inject the connection state into a network stack of the device; the connection migrator capable of precipitating an infusion of the protocol state for the connection across a protocol stack of the network stack.
a connection migrator that is configured to migrate connections onto the device; the connection migrator adapted to intercept a connection state for a connection that is sent from an originating device, the connection state including a protocol state and data; the connection migrator further adapted to inject the connection state into a network stack of the device; the connection migrator capable of precipitating an infusion of the protocol state for the connection across a protocol stack of the network stack.
35. The device as recited in claim 34, wherein the connection migrator comprises at least part of load balancing infrastructure that is resident at and executing on the device.
36. The device as recited in claim 34, wherein the device further comprises:
an application that is hosted on the device;
wherein the connection migrator is further configured to migrate connections onto the device in a manner that is transparent to the application.
an application that is hosted on the device;
wherein the connection migrator is further configured to migrate connections onto the device in a manner that is transparent to the application.
37. The device as recited in claim 34, wherein the data included in the connection state comprises data that was acknowledged at the originating device.
38. The device as recited in claim 34, wherein the connection migrator comprises:
a migrator shim that is located above the protocol stack in the network stack of the device; and a migrator intermediate driver that is located below the protocol stack in the network stack of the device.
a migrator shim that is located above the protocol stack in the network stack of the device; and a migrator intermediate driver that is located below the protocol stack in the network stack of the device.
39. The device as recited in claim 38, wherein:
the migrator shim is located between the; protocol stack and a socket layer of the network stack of the device; and the migrator intermediate driver is located between the protocol stack and at least one miniport of the network stack of the device.
the migrator shim is located between the; protocol stack and a socket layer of the network stack of the device; and the migrator intermediate driver is located between the protocol stack and at least one miniport of the network stack of the device.
40. The device as recited in claim 38, wherein:
the migrator shim is adapted to be notified by the migrator intermediate driver of a migration uploading procedure and is adapted to initiate a protocol state infusion routine with the protocol stack; and the migrator intermediate driver is adapted to detect arrival of the connection state for the connection, to divert the connection state away from a lower portion of the protocol stack, and to notify the migrator shim of the migration uploading procedure.
the migrator shim is adapted to be notified by the migrator intermediate driver of a migration uploading procedure and is adapted to initiate a protocol state infusion routine with the protocol stack; and the migrator intermediate driver is adapted to detect arrival of the connection state for the connection, to divert the connection state away from a lower portion of the protocol stack, and to notify the migrator shim of the migration uploading procedure.
41. The device as recited in claim 38, wherein the migrator intermediate driver is adapted to un-bundle a received binary blob that includes the connection state for the connection and a flow identifier corresponding to the connection.
42. The device as recited in claim 34, wherein the device further comprises:
the protocol stack, the protocol stack including a transmission control protocol (TCP) layer and an Internet protocol (IP) layer.
the protocol stack, the protocol stack including a transmission control protocol (TCP) layer and an Internet protocol (IP) layer.
43. The device as recited in claim 34, wherein the device further comprises:
the protocol stack, the protocol stack adapted to infuse the protocol state for the connection across the protocol stack responsive: to initiation of an infuse protocol state routine.
the protocol stack, the protocol stack adapted to infuse the protocol state for the connection across the protocol stack responsive: to initiation of an infuse protocol state routine.
44. An arrangement for connection manipulation, comprising:
migration means for migrating connections from an originating device to a target device by transferring a connection state for a connection being migrated from the originating device to the target device; and tunneling means for tunneling packets for migrated connections in an encapsulated format from the originating device to the; target device.
migration means for migrating connections from an originating device to a target device by transferring a connection state for a connection being migrated from the originating device to the target device; and tunneling means for tunneling packets for migrated connections in an encapsulated format from the originating device to the; target device.
45. The arrangement as recited in claim 44, wherein the migration means comprises:
aggregation means for aggregating the connection state from a protocol state and from data acknowledged for the connection being migrated.
aggregation means for aggregating the connection state from a protocol state and from data acknowledged for the connection being migrated.
46. The arrangement as recited in claim 45, wherein the aggregation means comprises:
compilation means for compiling the protocol state from a protocol stack.
compilation means for compiling the protocol state from a protocol stack.
47. The arrangement as recited in claim 44, wherein the tunneling means comprises:
encapsulation means for encapsulating the packets for the migrated connections using flow identifiers that replace at least a part of source/destination address information pairs of the packets.
encapsulation means for encapsulating the packets for the migrated connections using flow identifiers that replace at least a part of source/destination address information pairs of the packets.
48. The arrangement as recited in claim 44, wherein the tunneling means comprises:
mapping means for mapping individual source/destination address information pairs to individual flow identifiers, respective source/destination address information pairs identifying respective migrated connections.
mapping means for mapping individual source/destination address information pairs to individual flow identifiers, respective source/destination address information pairs identifying respective migrated connections.
49. The arrangement as recited in claim 44, wherein the migration means comprises:
driver means for bundling the connection state with a flow identifier that is usable for encapsulating packets of the connection being migrated.
driver means for bundling the connection state with a flow identifier that is usable for encapsulating packets of the connection being migrated.
50. The arrangement as recited in claim 44, wherein the migration means comprises:
injection means for injecting a protocol state portion of the connection state for the connection being migrated into a protocol stack portion of a network stack.
injection means for injecting a protocol state portion of the connection state for the connection being migrated into a protocol stack portion of a network stack.
51. The arrangement as recited in claim 44, wherein the tunneling means comprises:
de-encapsulation means for de-encapsulating the tunneled packets for the migrated connections using flow identifiers that link to at least a part of source/destination address information pairs of the packets.
de-encapsulation means for de-encapsulating the tunneled packets for the migrated connections using flow identifiers that link to at least a part of source/destination address information pairs of the packets.
52. The arrangement as recited in claim 44, wherein the tunneling means comprises:
mapping means for mapping individual flow identifiers to individual source/destination address information pairs, respective source/destination address information pairs identifying respective migrated connections.
mapping means for mapping individual flow identifiers to individual source/destination address information pairs, respective source/destination address information pairs identifying respective migrated connections.
53. The arrangement as recited in claim 44, wherein the migration means comprises:
driver means for diverting the tunneled packets for the migrated connections in the encapsulated format and directing them to the tunneling means.
driver means for diverting the tunneled packets for the migrated connections in the encapsulated format and directing them to the tunneling means.
54. The arrangement as recited in claim 44, wherein the arrangement comprises at least one device.
55. The arrangement as recited in claim 44, wherein the arrangement comprises one or more processor-accessible media.
56. A device comprising:
a tunneler that is configured to tunnel packets away from the device; the tunneler having access to an encapsulation mapping table, the encapsulation mapping table including a plurality of encapsulation mapping entries, each encapsulation mapping entry linking at least a portion of a source/destination pair to a flow identifier; the tunneler adapted to accept a packet having a particular source/destination pair; the tunneler capable of looking up a particular flow identifier at a particular encapsulation mapping entry using at least a portion of the particular source/destination pair; wherein the tunneler is further adapted to encapsulate the packet by replacing part of the packet with the particular flow identifier.
a tunneler that is configured to tunnel packets away from the device; the tunneler having access to an encapsulation mapping table, the encapsulation mapping table including a plurality of encapsulation mapping entries, each encapsulation mapping entry linking at least a portion of a source/destination pair to a flow identifier; the tunneler adapted to accept a packet having a particular source/destination pair; the tunneler capable of looking up a particular flow identifier at a particular encapsulation mapping entry using at least a portion of the particular source/destination pair; wherein the tunneler is further adapted to encapsulate the packet by replacing part of the packet with the particular flow identifier.
57. The device as recited in claim 56, wherein the tunneler is realized at least partially in software.
58. The device as recited in claim 56, wherein the device further comprises:
a forwarder that is capable of receiving the packet from a client, the forwarder adapted to provide the packet to the tunneler.
a forwarder that is capable of receiving the packet from a client, the forwarder adapted to provide the packet to the tunneler.
59. The device as recited in claim 56, wherein the tunneler is further adapted to encapsulate the packet by replacing at least part of the particular source/destination pair of the packet with the particular flow identifier.
60. The device as recited in claim 56, wherein the flow identifier comprises 32 bits.
61. The device as recited in claim 56, wherein the particular source/destination pair comprises a particular source/destination address information pair.
62. A device comprising:
a tunneler that is configured to tunnel packets into the device; the tunneler having access to an encapsulation mapping table, the encapsulation mapping table including a plurality of encapsulation mapping entries, each encapsulation mapping entry linking a flow identifier to at least a portion of a source/destination pair; the tunneler adapted to accept an encapsulated packet having a particular flow identifier; the tunneler capable of looking up a particular source/destination pair at a particular encapsulation mapping entry using the particular flow identifier; wherein the tunneler is further adapted to de-encapsulate the encapsulated packet by replacing the particular flow identifier with at least part of the particular source/destination pair.
a tunneler that is configured to tunnel packets into the device; the tunneler having access to an encapsulation mapping table, the encapsulation mapping table including a plurality of encapsulation mapping entries, each encapsulation mapping entry linking a flow identifier to at least a portion of a source/destination pair; the tunneler adapted to accept an encapsulated packet having a particular flow identifier; the tunneler capable of looking up a particular source/destination pair at a particular encapsulation mapping entry using the particular flow identifier; wherein the tunneler is further adapted to de-encapsulate the encapsulated packet by replacing the particular flow identifier with at least part of the particular source/destination pair.
63. The device as recited in claim 62, wherein the tunneler comprises a migrator intermediate driver that is adapted to intercept the encapsulated packet to prevent the encapsulated packet from being provided to a protocol stack of the device.
64. The device as recited in claim 62, wherein the device further comprises:
a protocol stack;
wherein the tunneler is further adapted to de-encapsulate the encapsulated packet by replacing the particular flow identifier with at least part of the particular source/destination pair to produce a de-encapsulated. packet; the tunneler capable of indicating up the de-encapsulated packet to the protocol stack.
a protocol stack;
wherein the tunneler is further adapted to de-encapsulate the encapsulated packet by replacing the particular flow identifier with at least part of the particular source/destination pair to produce a de-encapsulated. packet; the tunneler capable of indicating up the de-encapsulated packet to the protocol stack.
65. The device as recited in claim 64, wherein the tunneler comprises a virtual network adapter that is bound to a destination address of the de-encapsulated packet.
66. The device as recited in claim 62, wherein the device comprises a host of a cluster of hosts.
67. The device as recited in claim 62, wherein the particular source/destination pair corresponds to a transmission control protocol/internet protocol (TCP/IP) 4-tuple; and wherein the tunneler is further adapted to de-encapsulate the encapsulated packet by replacing the particular flow identifier with a source TCP part and a destination TCP port from the TCP/IP-4-tuple.
68. One or more processor-accessible media comprising processor-executable instructions that, when executed, direct a device to perform actions comprising:
obtaining at least a portion of a source/destination pair from an incoming packet;
accessing an encapsulation mapping table using the obtained at least a portion of the source/destination pair to locate an encapsulation mapping entry;
extracting a flow identifier from the located encapsulation mapping entry;
and replacing part of the incoming packet with the extracted flow identifier to produce an encapsulated packet.
obtaining at least a portion of a source/destination pair from an incoming packet;
accessing an encapsulation mapping table using the obtained at least a portion of the source/destination pair to locate an encapsulation mapping entry;
extracting a flow identifier from the located encapsulation mapping entry;
and replacing part of the incoming packet with the extracted flow identifier to produce an encapsulated packet.
69. The one or more processor-accessible media as recited in claim 68, comprising the processor-executable instructions that, when executed, direct the device to perform a further action comprising:
receiving the incoming packet from a client.
receiving the incoming packet from a client.
70. The one or more processor-accessible media as recited in claim 68, comprising the processor-executable instructions that, when executed, direct the device to perform a further action comprising:
routing the encapsulated packet to a host.
routing the encapsulated packet to a host.
71. The one or more processor-accessible media as recited in claim 68, wherein the source/destination pair of the incoming packet comprises a source/destination address information pair of the incoming packet.
72. The one or more processor-accessible media as recited in claim 68, wherein at least a portion of the processor-executable instructions comprise at least part of load balancing infrastructure.
73. The one or more processor-accessible media as recited in claim 68, wherein the action of replacing comprises an action of:
replacing at least part of the source/destination pair with the extracted flow identifier to produce the encapsulated packet.
replacing at least part of the source/destination pair with the extracted flow identifier to produce the encapsulated packet.
74. The one or more processor-accessible media as recited in claim 68, wherein:
the action of obtaining comprises an action of:
obtaining at least a portion of a transmission control protocol/internet protocol (TCP/IP) 4-tuple from the incoming packet; and the action of replacing comprises an action of:
replacing a source TCP port and a destination TCP port from the incoming packet with the extracted flow identifier.
the action of obtaining comprises an action of:
obtaining at least a portion of a transmission control protocol/internet protocol (TCP/IP) 4-tuple from the incoming packet; and the action of replacing comprises an action of:
replacing a source TCP port and a destination TCP port from the incoming packet with the extracted flow identifier.
75. The one or more processor-accessible media as recited in claim 74, comprising the processor-executable instructions that, when executed, direct the device to perform a further action comprising:
replacing a source IP address end a destination IP address from the incoming packet with an IP address of an originating device and an IP address of a target device, respectively.
replacing a source IP address end a destination IP address from the incoming packet with an IP address of an originating device and an IP address of a target device, respectively.
76. One or more processor-accessible media comprising processor-executable instructions that, when executed, direct a device to perform actions comprising:
obtaining a flow identifier from an encapsulated packet;
accessing an encapsulation mapping table using the obtained flow identifier to locate an encapsulation mapping entry;
extracting at least a portion of a source/destination pair from the located encapsulation mapping entry, the source/destination pair identifying a flow of packets for a connection; and replacing the flow identifier of the encapsulated packet with the extracted at least a portion of the source/destination pair to produce a de-encapsulated packet for the connection.
obtaining a flow identifier from an encapsulated packet;
accessing an encapsulation mapping table using the obtained flow identifier to locate an encapsulation mapping entry;
extracting at least a portion of a source/destination pair from the located encapsulation mapping entry, the source/destination pair identifying a flow of packets for a connection; and replacing the flow identifier of the encapsulated packet with the extracted at least a portion of the source/destination pair to produce a de-encapsulated packet for the connection.
77. The one or more processor-accessible media as recited in claim 76, comprising the processor-executable instructions that, when executed, direct the device to perform a further action comprising:
receiving the encapsulated packet from load balancing infrastructure.
receiving the encapsulated packet from load balancing infrastructure.
78. The one or more processor-accessible media as recited in claim 76, comprising the processor-executable instructions that, when executed, direct the device to perform a further action comprising:
indicating the de-encapsulated packet up to a protocol stack.
indicating the de-encapsulated packet up to a protocol stack.
79. The one or more processor-accessible media as recited in claim 78, wherein the action of indicating comprises an action of:
indicating the de-encapsulated packet up on a virtual network adapter that is bound to a destination address of the de-encapsulated packet.
indicating the de-encapsulated packet up on a virtual network adapter that is bound to a destination address of the de-encapsulated packet.
80. The one or more processor-accessible media as recited in claim 76, comprising the processor-executable instructions that, when executed, direct the device to perform further-actions comprising:
receiving an encapsulation mapping; and storing the encapsulation mapping as the encapsulation mapping entry in the encapsulation mapping table.
receiving an encapsulation mapping; and storing the encapsulation mapping as the encapsulation mapping entry in the encapsulation mapping table.
81. The one or more processor-accessible media as recited in claim 76, wherein at least a portion of the processor-executable instructions comprise at least part of a migratory intermediate driver that is positioned below a protocol stack portion of a network stack.
82. The one or more processor-accessible media as recited in claim 76, wherein the source/destination pair of the located encapsulation mapping entry comprises a source/destination address information pair of the located encapsulation mapping entry.
83. The one or more processor-accessible media as recited in claim 76, wherein the flow of packets for the connection comprises a connection that has been migrated.
84. The one or more processor-accessible media as recited in claim 76, wherein the action of extracting comprises an action of:
extracting a source Internet protocol (IP) address, a destination IP
address, a source transmission control protocol (TCP) port, and a destination TCP port from the located encapsulation mapping entry.
extracting a source Internet protocol (IP) address, a destination IP
address, a source transmission control protocol (TCP) port, and a destination TCP port from the located encapsulation mapping entry.
85. The one or more processor-accessible media as recited in claim 76, wherein the action of replacing comprises an action of:
replacing the flow identifier of the encapsulated packet with a source transmission control protocol (TCP) port and a destination TCP port from the located encapsulation mapping entry to produce the de-encapsulated packet for the connection.
replacing the flow identifier of the encapsulated packet with a source transmission control protocol (TCP) port and a destination TCP port from the located encapsulation mapping entry to produce the de-encapsulated packet for the connection.
86. The one or more processor-accessible media as recited in claim 76, wherein the action of replacing comprises an action of:
replacing an originating internet protocol (IP) address and a destination IP address of the encapsulated packet with a source IP address and a destination IP address, respectively, from the located encapsulation mapping entry to produce the de-encapsulated packet for the connection.
replacing an originating internet protocol (IP) address and a destination IP address of the encapsulated packet with a source IP address and a destination IP address, respectively, from the located encapsulation mapping entry to produce the de-encapsulated packet for the connection.
Applications Claiming Priority (8)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/610,321 US7613822B2 (en) | 2003-06-30 | 2003-06-30 | Network load balancing with session information |
US10/610,519 US7636917B2 (en) | 2003-06-30 | 2003-06-30 | Network load balancing with host status information |
US10/610,506 | 2003-06-30 | ||
US10/610,321 | 2003-06-30 | ||
US10/610,519 | 2003-06-30 | ||
US10/610,506 US7590736B2 (en) | 2003-06-30 | 2003-06-30 | Flexible network load balancing |
US10/657,568 US7606929B2 (en) | 2003-06-30 | 2003-09-08 | Network load balancing with connection manipulation |
US10/657,568 | 2003-09-08 |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2470420A1 true CA2470420A1 (en) | 2004-12-30 |
CA2470420C CA2470420C (en) | 2012-01-24 |
Family
ID=33437192
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA2470420A Expired - Fee Related CA2470420C (en) | 2003-06-30 | 2004-06-09 | Network load balancing with connection manipulation |
Country Status (14)
Country | Link |
---|---|
US (1) | US7606929B2 (en) |
EP (1) | EP1494422B1 (en) |
JP (1) | JP4583091B2 (en) |
KR (1) | KR101169073B1 (en) |
CN (1) | CN1607781B (en) |
AT (1) | ATE416551T1 (en) |
AU (1) | AU2004202403B2 (en) |
BR (1) | BRPI0402571A (en) |
CA (1) | CA2470420C (en) |
DE (1) | DE602004018065D1 (en) |
HK (1) | HK1069940A1 (en) |
MX (1) | MXPA04006408A (en) |
MY (1) | MY140059A (en) |
TW (1) | TWI366131B (en) |
Families Citing this family (211)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7343413B2 (en) | 2000-03-21 | 2008-03-11 | F5 Networks, Inc. | Method and system for optimizing a network by independently scaling control segments and data flow |
US8380854B2 (en) | 2000-03-21 | 2013-02-19 | F5 Networks, Inc. | Simplified method for processing multiple connections from the same client |
US6907395B1 (en) * | 2000-10-24 | 2005-06-14 | Microsoft Corporation | System and method for designing a logical model of a distributed computer system and deploying physical resources according to the logical model |
US7606898B1 (en) * | 2000-10-24 | 2009-10-20 | Microsoft Corporation | System and method for distributed management of shared computers |
US7072807B2 (en) * | 2003-03-06 | 2006-07-04 | Microsoft Corporation | Architecture for distributed computing system and automated design, deployment, and management of distributed applications |
US7890543B2 (en) | 2003-03-06 | 2011-02-15 | Microsoft Corporation | Architecture for distributed computing system and automated design, deployment, and management of distributed applications |
US7689676B2 (en) * | 2003-03-06 | 2010-03-30 | Microsoft Corporation | Model-based policy application |
US8122106B2 (en) | 2003-03-06 | 2012-02-21 | Microsoft Corporation | Integrating design, deployment, and management phases for systems |
US7590736B2 (en) * | 2003-06-30 | 2009-09-15 | Microsoft Corporation | Flexible network load balancing |
US7636917B2 (en) * | 2003-06-30 | 2009-12-22 | Microsoft Corporation | Network load balancing with host status information |
US7562145B2 (en) * | 2003-08-28 | 2009-07-14 | International Business Machines Corporation | Application instance level workload distribution affinities |
US8285881B2 (en) * | 2003-09-10 | 2012-10-09 | Broadcom Corporation | System and method for load balancing and fail over |
US8655755B2 (en) * | 2003-10-22 | 2014-02-18 | Scottrade, Inc. | System and method for the automated brokerage of financial instruments |
US7389510B2 (en) * | 2003-11-06 | 2008-06-17 | International Business Machines Corporation | Load balancing of servers in a cluster |
US7778422B2 (en) | 2004-02-27 | 2010-08-17 | Microsoft Corporation | Security associations for devices |
JP4147198B2 (en) * | 2004-03-23 | 2008-09-10 | 株式会社日立製作所 | Storage system |
US20050246529A1 (en) | 2004-04-30 | 2005-11-03 | Microsoft Corporation | Isolated persistent identity storage for authentication of computing devies |
US20060064478A1 (en) * | 2004-05-03 | 2006-03-23 | Level 3 Communications, Inc. | Geo-locating load balancing |
US8089972B2 (en) | 2004-05-03 | 2012-01-03 | Level 3 Communications, Llc | Registration redirect server |
US20060112170A1 (en) * | 2004-05-03 | 2006-05-25 | Craig Sirkin | Geo-locating load balancing |
US7400585B2 (en) * | 2004-09-23 | 2008-07-15 | International Business Machines Corporation | Optimal interconnect utilization in a data processing network |
US9843557B2 (en) | 2004-12-09 | 2017-12-12 | Level 3 Communications, Llc | Systems and methods for dynamically registering endpoints in a network |
US7734019B1 (en) * | 2004-12-09 | 2010-06-08 | Level 3 Communications, Llc | Systems and methods for third party emergency call termination |
US8768350B2 (en) | 2004-12-09 | 2014-07-01 | Level 3 Communications, Llc | Systems and methods for locating endpoints in a communication network |
US7640346B2 (en) * | 2005-02-01 | 2009-12-29 | Microsoft Corporation | Dispatching network connections in user-mode |
JP4621044B2 (en) * | 2005-03-15 | 2011-01-26 | 富士通株式会社 | Load distribution apparatus and load distribution method |
US20060248194A1 (en) * | 2005-03-18 | 2006-11-02 | Riverbed Technology, Inc. | Connection forwarding |
US8543999B2 (en) * | 2005-03-30 | 2013-09-24 | Welch Allyn, Inc. | Communication of information between a plurality of network elements |
US8489728B2 (en) | 2005-04-15 | 2013-07-16 | Microsoft Corporation | Model-based system monitoring |
US7797147B2 (en) | 2005-04-15 | 2010-09-14 | Microsoft Corporation | Model-based system monitoring |
US20070002822A1 (en) * | 2005-06-29 | 2007-01-04 | Nokia Corporation | Multi homing transport protocol on a multi-processor arrangement |
US20070016393A1 (en) * | 2005-06-29 | 2007-01-18 | Microsoft Corporation | Model-based propagation of attributes |
US8549513B2 (en) | 2005-06-29 | 2013-10-01 | Microsoft Corporation | Model-based virtual system provisioning |
CN1901537A (en) * | 2005-07-22 | 2007-01-24 | 国际商业机器公司 | Self adaptive conversation compression managing method and compression managing device and conversation managing system |
US7941309B2 (en) * | 2005-11-02 | 2011-05-10 | Microsoft Corporation | Modeling IT operations/policies |
US9686183B2 (en) * | 2005-12-06 | 2017-06-20 | Zarbaña Digital Fund Llc | Digital object routing based on a service request |
JP4652981B2 (en) * | 2006-01-13 | 2011-03-16 | 日本電信電話株式会社 | DNS server selection device, DNS server selection method, DNS server selection program, and name resolution system |
JP4961146B2 (en) * | 2006-02-20 | 2012-06-27 | 株式会社日立製作所 | Load balancing method and system |
US7937435B2 (en) * | 2006-02-21 | 2011-05-03 | Strangeloop Networks, Inc. | Identifying, storing, and retrieving context data for a network message |
US8369212B2 (en) * | 2006-08-29 | 2013-02-05 | Hewlett-Packard Development Company, L.P. | Network path validation based on user-specified criteria |
US7840683B2 (en) * | 2006-08-31 | 2010-11-23 | Sap Ag | Systems and methods of migrating sessions between computer systems |
US20080062996A1 (en) * | 2006-09-13 | 2008-03-13 | Futurewei Technologies, Inc. | Consumer Edge Initiated Pseudo-Wire Multi-Homing in Access Networks |
AU2007307196B2 (en) | 2006-10-04 | 2012-02-09 | Welch Allyn, Inc. | Dynamic medical object information base |
US9473316B2 (en) * | 2006-10-17 | 2016-10-18 | International Business Machines Corporation | Resource consumption reduction via meeting affinity |
US8145560B2 (en) * | 2006-11-14 | 2012-03-27 | Fmr Llc | Detecting fraudulent activity on a network |
US20080115213A1 (en) * | 2006-11-14 | 2008-05-15 | Fmr Corp. | Detecting Fraudulent Activity on a Network Using Stored Information |
US8180873B2 (en) * | 2006-11-14 | 2012-05-15 | Fmr Llc | Detecting fraudulent activity |
US20080114858A1 (en) * | 2006-11-14 | 2008-05-15 | Fmr Corp. | Reconstructing Data on a Network |
US7856494B2 (en) | 2006-11-14 | 2010-12-21 | Fmr Llc | Detecting and interdicting fraudulent activity on a network |
US20080168161A1 (en) * | 2007-01-10 | 2008-07-10 | International Business Machines Corporation | Systems and methods for managing faults within a high speed network employing wide ports |
US20080168302A1 (en) * | 2007-01-10 | 2008-07-10 | International Business Machines Corporation | Systems and methods for diagnosing faults in a multiple domain storage system |
US7860934B1 (en) * | 2007-01-30 | 2010-12-28 | Intuit Inc. | Method and apparatus for tracking financial transactions for a user |
US20080209053A1 (en) * | 2007-02-28 | 2008-08-28 | Microsoft Corporation | HTTP-Based Peer-to-Peer Framework |
US20080270638A1 (en) * | 2007-04-30 | 2008-10-30 | International Business Machines Corporation | Systems and methods for monitoring high speed network traffic via simultaneously multiplexed data streams |
US7936767B2 (en) * | 2007-04-30 | 2011-05-03 | International Business Machines Corporation | Systems and methods for monitoring high speed network traffic via sequentially multiplexed data streams |
US9032079B2 (en) * | 2007-06-26 | 2015-05-12 | Microsoft Technology Licensing, Llc | Management and diagnosis of telephonic devices |
GB2450748B (en) * | 2007-07-06 | 2010-12-29 | Displaylink | Connection between a client device and multiple host devices |
GB2453315A (en) | 2007-08-15 | 2009-04-08 | Nec Corp | Connection Identifier in a telecommunications network |
US8037519B2 (en) * | 2007-08-31 | 2011-10-11 | Nokia Corporation | Apparatus and method for managing access to one or more network resources |
US7849275B2 (en) * | 2007-11-19 | 2010-12-07 | Sandforce, Inc. | System, method and a computer program product for writing data to different storage devices based on write frequency |
KR100930037B1 (en) * | 2007-12-17 | 2009-12-07 | 한국전자통신연구원 | Network address translation simulation method and system |
US9432213B2 (en) | 2007-12-31 | 2016-08-30 | Rpx Clearinghouse Llc | IP forwarding across a link state protocol controlled ethernet network |
US8291086B2 (en) * | 2008-01-18 | 2012-10-16 | General Electric Company | Method and system for accessing data in an enterprise information system |
US11323510B2 (en) | 2008-02-28 | 2022-05-03 | Level 3 Communications, Llc | Load-balancing cluster |
US8489750B2 (en) | 2008-02-28 | 2013-07-16 | Level 3 Communications, Llc | Load-balancing cluster |
US8539565B2 (en) | 2008-03-21 | 2013-09-17 | Microsoft Corporation | Load balancing in server computer systems |
US8806053B1 (en) | 2008-04-29 | 2014-08-12 | F5 Networks, Inc. | Methods and systems for optimizing network traffic using preemptive acknowledgment signals |
US8566444B1 (en) | 2008-10-30 | 2013-10-22 | F5 Networks, Inc. | Methods and system for simultaneous multiple rules checking |
US8005950B1 (en) | 2008-12-09 | 2011-08-23 | Google Inc. | Application server scalability through runtime restrictions enforcement in a distributed application execution system |
US7921215B2 (en) * | 2009-01-12 | 2011-04-05 | Cisco Technology, Inc. | Method and apparatus for optimizing and prioritizing the creation of a large number of VPN tunnels |
JP5458688B2 (en) * | 2009-03-19 | 2014-04-02 | 富士通株式会社 | Uniqueness guarantee support program, service providing system, and uniqueness guarantee realization method |
US20100251259A1 (en) * | 2009-03-31 | 2010-09-30 | Howard Kevin D | System And Method For Recruitment And Management Of Processors For High Performance Parallel Processing Using Multiple Distributed Networked Heterogeneous Computing Elements |
US7957319B2 (en) * | 2009-05-08 | 2011-06-07 | Blue Coat Systems, Inc. | Classification techniques for encrypted network traffic |
US8416692B2 (en) * | 2009-05-28 | 2013-04-09 | Microsoft Corporation | Load balancing across layer-2 domains |
US9497039B2 (en) | 2009-05-28 | 2016-11-15 | Microsoft Technology Licensing, Llc | Agile data center network architecture |
US10157280B2 (en) | 2009-09-23 | 2018-12-18 | F5 Networks, Inc. | System and method for identifying security breach attempts of a website |
US8868961B1 (en) | 2009-11-06 | 2014-10-21 | F5 Networks, Inc. | Methods for acquiring hyper transport timing and devices thereof |
US10721269B1 (en) | 2009-11-06 | 2020-07-21 | F5 Networks, Inc. | Methods and system for returning requests with javascript for clients before passing a request to a server |
US8755393B2 (en) * | 2010-04-02 | 2014-06-17 | Cisco Technology, Inc. | Facilitating communication of routing information |
US9391716B2 (en) | 2010-04-05 | 2016-07-12 | Microsoft Technology Licensing, Llc | Data center using wireless communication |
US8468135B2 (en) * | 2010-04-14 | 2013-06-18 | International Business Machines Corporation | Optimizing data transmission bandwidth consumption over a wide area network |
US8243598B2 (en) * | 2010-04-26 | 2012-08-14 | International Business Machines Corporation | Load-balancing via modulus distribution and TCP flow redirection due to server overload |
US8478813B2 (en) * | 2010-04-28 | 2013-07-02 | Microsoft Corporation | Transparent migration of endpoint |
US9667569B1 (en) | 2010-04-29 | 2017-05-30 | Amazon Technologies, Inc. | System and method for adaptive server shielding |
US20110280247A1 (en) * | 2010-05-17 | 2011-11-17 | Google Inc. | System and method for reducing latency via multiple network connections |
WO2011152816A1 (en) * | 2010-05-30 | 2011-12-08 | Hewlett-Packard Development Company, L.P. | Virtual machine code injection |
US9141625B1 (en) | 2010-06-22 | 2015-09-22 | F5 Networks, Inc. | Methods for preserving flow state during virtual machine migration and devices thereof |
US10015286B1 (en) | 2010-06-23 | 2018-07-03 | F5 Networks, Inc. | System and method for proxying HTTP single sign on across network domains |
US8908545B1 (en) | 2010-07-08 | 2014-12-09 | F5 Networks, Inc. | System and method for handling TCP performance in network access with driver initiated application tunnel |
US8347100B1 (en) | 2010-07-14 | 2013-01-01 | F5 Networks, Inc. | Methods for DNSSEC proxying and deployment amelioration and systems thereof |
US9083760B1 (en) | 2010-08-09 | 2015-07-14 | F5 Networks, Inc. | Dynamic cloning and reservation of detached idle connections |
US9037712B2 (en) * | 2010-09-08 | 2015-05-19 | Citrix Systems, Inc. | Systems and methods for self-loading balancing access gateways |
US8630174B1 (en) | 2010-09-14 | 2014-01-14 | F5 Networks, Inc. | System and method for post shaping TCP packetization |
US8886981B1 (en) | 2010-09-15 | 2014-11-11 | F5 Networks, Inc. | Systems and methods for idle driven scheduling |
US8804504B1 (en) | 2010-09-16 | 2014-08-12 | F5 Networks, Inc. | System and method for reducing CPU load in processing PPP packets on a SSL-VPN tunneling device |
US20120102220A1 (en) * | 2010-10-20 | 2012-04-26 | Microsoft Corporation | Routing traffic in an online service with high availability |
US20120102474A1 (en) * | 2010-10-26 | 2012-04-26 | International Business Machines Corporation | Static analysis of client-server applications using framework independent specifications |
EP2633667B1 (en) | 2010-10-29 | 2017-09-06 | F5 Networks, Inc | System and method for on the fly protocol conversion in obtaining policy enforcement information |
US8959571B2 (en) | 2010-10-29 | 2015-02-17 | F5 Networks, Inc. | Automated policy builder |
US8755283B2 (en) | 2010-12-17 | 2014-06-17 | Microsoft Corporation | Synchronizing state among load balancer components |
US8627467B2 (en) | 2011-01-14 | 2014-01-07 | F5 Networks, Inc. | System and method for selectively storing web objects in a cache memory based on policy decisions |
US10135831B2 (en) | 2011-01-28 | 2018-11-20 | F5 Networks, Inc. | System and method for combining an access control system with a traffic management system |
US8612550B2 (en) | 2011-02-07 | 2013-12-17 | Microsoft Corporation | Proxy-based cache content distribution and affinity |
JP5741150B2 (en) | 2011-04-04 | 2015-07-01 | 富士通株式会社 | Relay device, relay program, and relay method |
JP5960690B2 (en) * | 2011-04-19 | 2016-08-02 | 株式会社Murakumo | Network access system |
US9578126B1 (en) | 2011-04-30 | 2017-02-21 | F5 Networks, Inc. | System and method for automatically discovering wide area network optimized routes and devices |
US9137104B2 (en) * | 2011-05-26 | 2015-09-15 | Kaseya Limited | Method and apparatus of performing remote management of a managed machine |
US8417669B2 (en) * | 2011-06-01 | 2013-04-09 | Sybase Inc. | Auto-correction in database replication |
US9246819B1 (en) * | 2011-06-20 | 2016-01-26 | F5 Networks, Inc. | System and method for performing message-based load balancing |
US9055076B1 (en) * | 2011-06-23 | 2015-06-09 | Amazon Technologies, Inc. | System and method for distributed load balancing with load balancer clients for hosts |
US8812727B1 (en) | 2011-06-23 | 2014-08-19 | Amazon Technologies, Inc. | System and method for distributed load balancing with distributed direct server return |
US20130060907A1 (en) | 2011-09-07 | 2013-03-07 | International Business Machines Corporation | Handling http-based service requests via ip ports |
US20130159487A1 (en) * | 2011-12-14 | 2013-06-20 | Microsoft Corporation | Migration of Virtual IP Addresses in a Failover Cluster |
US9270766B2 (en) | 2011-12-30 | 2016-02-23 | F5 Networks, Inc. | Methods for identifying network traffic characteristics to correlate and manage one or more subsequent flows and devices thereof |
US9444884B2 (en) * | 2011-12-31 | 2016-09-13 | Level 3 Communications, Llc | Load-aware load-balancing cluster without a central load balancer |
US10230566B1 (en) | 2012-02-17 | 2019-03-12 | F5 Networks, Inc. | Methods for dynamically constructing a service principal name and devices thereof |
US9231879B1 (en) | 2012-02-20 | 2016-01-05 | F5 Networks, Inc. | Methods for policy-based network traffic queue management and devices thereof |
US9172753B1 (en) | 2012-02-20 | 2015-10-27 | F5 Networks, Inc. | Methods for optimizing HTTP header based authentication and devices thereof |
US8908521B2 (en) * | 2012-04-04 | 2014-12-09 | Telefonaktiebolaget L M Ericsson (Publ) | Load balancing for stateful scale-out network services |
CN103379185B (en) * | 2012-04-26 | 2016-08-03 | 华为技术有限公司 | A kind of method, apparatus and system of network address translation |
EP2853074B1 (en) | 2012-04-27 | 2021-03-24 | F5 Networks, Inc | Methods for optimizing service of content requests and devices thereof |
US9705729B2 (en) * | 2012-06-01 | 2017-07-11 | Dell Products L.P. | General client engine with load balancing for client-server communication |
US8805990B2 (en) | 2012-07-12 | 2014-08-12 | Microsoft Corporation | Load balancing for single-address tenants |
US9329912B2 (en) * | 2012-07-13 | 2016-05-03 | Freescale Semiconductor, Inc. | Core-affine processing on symmetric multiprocessing systems |
US9705800B2 (en) * | 2012-09-25 | 2017-07-11 | A10 Networks, Inc. | Load distribution in data networks |
US9246998B2 (en) | 2012-10-16 | 2016-01-26 | Microsoft Technology Licensing, Llc | Load balancer bypass |
TWI511513B (en) * | 2012-11-14 | 2015-12-01 | Wistron Corp | Detection method in network system and related apparatus |
KR101424508B1 (en) | 2012-11-15 | 2014-08-01 | 주식회사 시큐아이 | Encrypting/decrypting appratus for load balancing and method thereof |
JP6048149B2 (en) * | 2013-01-04 | 2016-12-21 | 富士通株式会社 | COMMUNICATION CONTROL METHOD, INFORMATION PROCESSING SYSTEM, COMMUNICATION CONTROL DEVICE, AND COMMUNICATION CONTROL PROGRAM |
US10375155B1 (en) | 2013-02-19 | 2019-08-06 | F5 Networks, Inc. | System and method for achieving hardware acceleration for asymmetric flow connections |
US10397292B2 (en) | 2013-03-15 | 2019-08-27 | Divx, Llc | Systems, methods, and media for delivery of content |
US10135914B2 (en) * | 2013-04-16 | 2018-11-20 | Amazon Technologies, Inc. | Connection publishing in a distributed load balancer |
US10038626B2 (en) | 2013-04-16 | 2018-07-31 | Amazon Technologies, Inc. | Multipath routing in a distributed load balancer |
US10069903B2 (en) * | 2013-04-16 | 2018-09-04 | Amazon Technologies, Inc. | Distributed load balancer |
US9553809B2 (en) * | 2013-04-16 | 2017-01-24 | Amazon Technologies, Inc. | Asymmetric packet flow in a distributed load balancer |
CN104243337B (en) * | 2013-06-09 | 2017-09-01 | 新华三技术有限公司 | A kind of method and device across cluster load balance |
US9300669B2 (en) | 2013-06-14 | 2016-03-29 | Dell Products L.P. | Runtime API framework for client-server communication |
US9407725B2 (en) | 2013-06-14 | 2016-08-02 | Dell Products L.P. | Generic transcoding service for client-server communication |
US9716740B2 (en) | 2013-06-14 | 2017-07-25 | Dell Products L.P. | Web-based transcoding to clients for client-server communication |
CN103281251B (en) * | 2013-06-18 | 2017-03-15 | 北京百度网讯科技有限公司 | Data transmission method, system and its subsystem between data center |
CA2819539C (en) * | 2013-06-21 | 2021-01-12 | Ibm Canada Limited - Ibm Canada Limitee | Dynamic management of integration protocols |
US8976666B2 (en) * | 2013-07-25 | 2015-03-10 | Iboss, Inc. | Load balancing network adapter |
US10187317B1 (en) | 2013-11-15 | 2019-01-22 | F5 Networks, Inc. | Methods for traffic rate control and devices thereof |
IL230345A0 (en) * | 2014-01-06 | 2014-08-31 | Simgo Ltd | Parking identity method for a mobile device |
US10587509B2 (en) * | 2014-02-04 | 2020-03-10 | Architecture Technology Corporation | Low-overhead routing |
CN104980361B (en) * | 2014-04-01 | 2018-09-21 | 华为技术有限公司 | A kind of load-balancing method, apparatus and system |
US10742559B2 (en) * | 2014-04-24 | 2020-08-11 | A10 Networks, Inc. | Eliminating data traffic redirection in scalable clusters |
US9917727B2 (en) | 2014-06-03 | 2018-03-13 | Nicira, Inc. | Consistent hashing for network traffic dispatching |
US10015143B1 (en) | 2014-06-05 | 2018-07-03 | F5 Networks, Inc. | Methods for securing one or more license entitlement grants and devices thereof |
US9577927B2 (en) * | 2014-06-30 | 2017-02-21 | Nicira, Inc. | Encoding control plane information in transport protocol source port field and applications thereof in network virtualization |
US11838851B1 (en) | 2014-07-15 | 2023-12-05 | F5, Inc. | Methods for managing L7 traffic classification and devices thereof |
US10122630B1 (en) | 2014-08-15 | 2018-11-06 | F5 Networks, Inc. | Methods for network traffic presteering and devices thereof |
US9356912B2 (en) * | 2014-08-20 | 2016-05-31 | Alcatel Lucent | Method for load-balancing IPsec traffic |
US10182013B1 (en) | 2014-12-01 | 2019-01-15 | F5 Networks, Inc. | Methods for managing progressive image delivery and devices thereof |
US9876724B2 (en) * | 2014-12-23 | 2018-01-23 | Jordan University Of Science And Technology | Method for seamless multi-link network connectivity |
US11895138B1 (en) | 2015-02-02 | 2024-02-06 | F5, Inc. | Methods for improving web scanner accuracy and devices thereof |
US10484297B1 (en) * | 2015-03-16 | 2019-11-19 | Amazon Technologies, Inc. | Automated migration of compute instances to isolated virtual networks |
US10834065B1 (en) | 2015-03-31 | 2020-11-10 | F5 Networks, Inc. | Methods for SSL protected NTLM re-authentication and devices thereof |
US11350254B1 (en) | 2015-05-05 | 2022-05-31 | F5, Inc. | Methods for enforcing compliance policies and devices thereof |
US10505818B1 (en) | 2015-05-05 | 2019-12-10 | F5 Networks. Inc. | Methods for analyzing and load balancing based on server health and devices thereof |
US9954751B2 (en) | 2015-05-29 | 2018-04-24 | Microsoft Technology Licensing, Llc | Measuring performance of a network using mirrored probe packets |
WO2017036535A1 (en) * | 2015-09-03 | 2017-03-09 | Huawei Technologies Co., Ltd. | Distributed connection tracking |
IL242353B (en) * | 2015-10-29 | 2021-01-31 | Verint Systems Ltd | System and method for soft failovers for proxy servers |
US11757946B1 (en) | 2015-12-22 | 2023-09-12 | F5, Inc. | Methods for analyzing network traffic and enforcing network policies and devices thereof |
US10404698B1 (en) | 2016-01-15 | 2019-09-03 | F5 Networks, Inc. | Methods for adaptive organization of web application access points in webtops and devices thereof |
US11178150B1 (en) | 2016-01-20 | 2021-11-16 | F5 Networks, Inc. | Methods for enforcing access control list based on managed application and devices thereof |
US10797888B1 (en) | 2016-01-20 | 2020-10-06 | F5 Networks, Inc. | Methods for secured SCEP enrollment for client devices and devices thereof |
US10313271B2 (en) | 2016-03-16 | 2019-06-04 | At&T Intellectual Property I, L.P. | Providing and using a distributed forwarding service |
JP6511013B2 (en) * | 2016-05-19 | 2019-05-08 | 日本電信電話株式会社 | SFC system and SFC control method |
TWI616080B (en) * | 2016-05-30 | 2018-02-21 | Chunghwa Telecom Co Ltd | Network instant control method |
US10791088B1 (en) | 2016-06-17 | 2020-09-29 | F5 Networks, Inc. | Methods for disaggregating subscribers via DHCP address translation and devices thereof |
CN106412969B (en) * | 2016-07-01 | 2019-06-04 | 广东省电信规划设计院有限公司 | The method and apparatus of integrated service gateway disaster tolerance switching |
US10542071B1 (en) * | 2016-09-27 | 2020-01-21 | Amazon Technologies, Inc. | Event driven health checks for non-HTTP applications |
US11063758B1 (en) | 2016-11-01 | 2021-07-13 | F5 Networks, Inc. | Methods for facilitating cipher selection and devices thereof |
US10505792B1 (en) | 2016-11-02 | 2019-12-10 | F5 Networks, Inc. | Methods for facilitating network traffic analytics and devices thereof |
CN108024290B (en) * | 2016-11-03 | 2022-07-08 | 中兴通讯股份有限公司 | Tunnel adjusting method and device |
US10700960B2 (en) * | 2016-11-17 | 2020-06-30 | Nicira, Inc. | Enablement of multi-path routing in virtual edge systems |
US10425472B2 (en) * | 2017-01-17 | 2019-09-24 | Microsoft Technology Licensing, Llc | Hardware implemented load balancing |
US10084855B2 (en) * | 2017-01-23 | 2018-09-25 | Akamai Technologies, Inc. | Pixel-based load balancing |
US11496438B1 (en) | 2017-02-07 | 2022-11-08 | F5, Inc. | Methods for improved network security using asymmetric traffic delivery and devices thereof |
US10498795B2 (en) | 2017-02-17 | 2019-12-03 | Divx, Llc | Systems and methods for adaptive switching between multiple content delivery networks during adaptive bitrate streaming |
US10764360B2 (en) * | 2017-03-01 | 2020-09-01 | Huawei Technologies Co., Ltd. | Managing persistent TCP connections in an IPVS environment |
US10791119B1 (en) | 2017-03-14 | 2020-09-29 | F5 Networks, Inc. | Methods for temporal password injection and devices thereof |
US10812266B1 (en) | 2017-03-17 | 2020-10-20 | F5 Networks, Inc. | Methods for managing security tokens based on security violations and devices thereof |
US10931662B1 (en) | 2017-04-10 | 2021-02-23 | F5 Networks, Inc. | Methods for ephemeral authentication screening and devices thereof |
US10972453B1 (en) | 2017-05-03 | 2021-04-06 | F5 Networks, Inc. | Methods for token refreshment based on single sign-on (SSO) for federated identity environments and devices thereof |
US11343237B1 (en) | 2017-05-12 | 2022-05-24 | F5, Inc. | Methods for managing a federated identity environment using security and access control data and devices thereof |
US11122042B1 (en) | 2017-05-12 | 2021-09-14 | F5 Networks, Inc. | Methods for dynamically managing user access control and devices thereof |
US10713223B2 (en) * | 2017-06-01 | 2020-07-14 | Salesforce.Com, Inc. | Opportunistic gossip-type dissemination of node metrics in server clusters |
US10693951B2 (en) | 2017-06-01 | 2020-06-23 | Salesforce.Com, Inc. | Decentralized, resource aware load distribution in a distributed system |
US10536548B2 (en) * | 2017-06-20 | 2020-01-14 | Western Digital Technologies, Inc. | Redundant network routing with proxy servers |
TWI650979B (en) * | 2017-07-25 | 2019-02-11 | 中華電信股份有限公司 | Load balance adjustment system and method thereof |
US10798159B2 (en) * | 2017-07-26 | 2020-10-06 | Netapp, Inc. | Methods for managing workload throughput in a storage system and devices thereof |
US11122083B1 (en) | 2017-09-08 | 2021-09-14 | F5 Networks, Inc. | Methods for managing network connections based on DNS data and network policies and devices thereof |
CN109714302B (en) | 2017-10-25 | 2022-06-14 | 阿里巴巴集团控股有限公司 | Method, device and system for unloading algorithm |
US11658995B1 (en) | 2018-03-20 | 2023-05-23 | F5, Inc. | Methods for dynamically mitigating network attacks and devices thereof |
US11409569B2 (en) * | 2018-03-29 | 2022-08-09 | Xilinx, Inc. | Data processing system |
US10938778B2 (en) * | 2018-05-02 | 2021-03-02 | Forcepoint Llc | Route reply back interface for cloud internal communication |
US11044200B1 (en) | 2018-07-06 | 2021-06-22 | F5 Networks, Inc. | Methods for service stitching using a packet header and devices thereof |
US10904342B2 (en) * | 2018-07-30 | 2021-01-26 | Cisco Technology, Inc. | Container networking using communication tunnels |
CN110858229B (en) | 2018-08-23 | 2023-04-07 | 阿里巴巴集团控股有限公司 | Data processing method, device, access control system and storage medium |
US10521328B1 (en) * | 2018-10-22 | 2019-12-31 | Sap Se | Application data flow mapping |
JP2020136743A (en) * | 2019-02-13 | 2020-08-31 | 日本電信電話株式会社 | Communication controller, communication control program, communication control system, and communication control method |
US11570100B2 (en) * | 2019-04-25 | 2023-01-31 | Advanced New Technologies Co., Ltd. | Data processing method, apparatus, medium and device |
CN110365759B (en) * | 2019-07-08 | 2021-12-28 | 深圳市多尼卡航空电子有限公司 | Data forwarding method, device, system, gateway equipment and storage medium |
US11405668B2 (en) * | 2020-10-30 | 2022-08-02 | Rovi Guides, Inc. | Systems and methods for viewing-session continuity |
US11799761B2 (en) | 2022-01-07 | 2023-10-24 | Vmware, Inc. | Scaling edge services with minimal disruption |
US11888747B2 (en) | 2022-01-12 | 2024-01-30 | VMware LLC | Probabilistic filters for use in network forwarding and services |
US11522948B1 (en) * | 2022-02-04 | 2022-12-06 | International Business Machines Corporation | Dynamic handling of service mesh loads using sliced replicas and cloud functions |
US11553058B1 (en) * | 2022-02-09 | 2023-01-10 | coretech It, UAB | Sticky sessions in a proxy infrastructure |
CN115309406B (en) * | 2022-09-30 | 2022-12-20 | 北京大禹智芯科技有限公司 | Performance optimization method and device of P4 control branch statement |
Family Cites Families (178)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4200770A (en) * | 1977-09-06 | 1980-04-29 | Stanford University | Cryptographic apparatus and method |
US4218582A (en) | 1977-10-06 | 1980-08-19 | The Board Of Trustees Of The Leland Stanford Junior University | Public key cryptographic apparatus and method |
US4405829A (en) | 1977-12-14 | 1983-09-20 | Massachusetts Institute Of Technology | Cryptographic communications system and method |
US4424414A (en) * | 1978-05-01 | 1984-01-03 | Board Of Trustees Of The Leland Stanford Junior University | Exponentiation cryptographic apparatus and method |
DE3789215T2 (en) | 1986-12-22 | 1994-06-01 | American Telephone & Telegraph | Controlled dynamic load balancing for a multiprocessor system. |
US5031089A (en) | 1988-12-30 | 1991-07-09 | United States Of America As Represented By The Administrator, National Aeronautics And Space Administration | Dynamic resource allocation scheme for distributed heterogeneous computer systems |
JPH0488489A (en) | 1990-08-01 | 1992-03-23 | Internatl Business Mach Corp <Ibm> | Character recognizing device and method using generalized half conversion |
WO1992005485A2 (en) * | 1990-09-17 | 1992-04-02 | Cabletron Systems, Inc. | Network management system using model-based intelligence |
JPH04287290A (en) | 1990-11-20 | 1992-10-12 | Imra America Inc | Hough transformation picture processor |
EP0576574B1 (en) * | 1991-03-18 | 2001-10-31 | Echelon Corporation | Programming language structures for use in a network for communicating, sensing and controlling information |
WO1992016904A1 (en) | 1991-03-18 | 1992-10-01 | Echelon Corporation | Binder interface structure |
US6115393A (en) | 1991-04-12 | 2000-09-05 | Concord Communications, Inc. | Network monitoring |
IL99923A0 (en) | 1991-10-31 | 1992-08-18 | Ibm Israel | Method of operating a computer in a network |
US5371852A (en) | 1992-10-14 | 1994-12-06 | International Business Machines Corporation | Method and apparatus for making a cluster of computers appear as a single host on a network |
US5557774A (en) | 1993-03-22 | 1996-09-17 | Hitachi, Ltd. | Method for making test environmental programs |
BR9402027A (en) * | 1993-05-28 | 1994-12-13 | Xerox Corp | Process for managing a configuration and ensuring compatibility between components in a computer system, and process for eliminating incompatibilities between resident software and migration software in an automated computer system |
US5686940A (en) | 1993-12-24 | 1997-11-11 | Rohm Co., Ltd. | Display apparatus |
US5668995A (en) | 1994-04-22 | 1997-09-16 | Ncr Corporation | Method and apparatus for capacity planning for multiprocessor computer systems in client/server environments |
WO1996016497A1 (en) * | 1994-11-21 | 1996-05-30 | Oracle Corporation | Transferring binary large objects (blobs) in a network environment |
US5758351A (en) | 1995-03-01 | 1998-05-26 | Sterling Software, Inc. | System and method for the creation and use of surrogate information system objects |
US5724508A (en) * | 1995-03-09 | 1998-03-03 | Insoft, Inc. | Apparatus for collaborative computing |
US5774668A (en) | 1995-06-07 | 1998-06-30 | Microsoft Corporation | System for on-line service in which gateway computer uses service map which includes loading condition of servers broadcasted by application servers for load balancing |
US5895499A (en) * | 1995-07-03 | 1999-04-20 | Sun Microsystems, Inc. | Cross-domain data transfer using deferred page remapping |
US5917730A (en) | 1995-08-17 | 1999-06-29 | Gse Process Solutions, Inc. | Computer implemented object oriented visualization system and method |
US5774689A (en) | 1995-09-22 | 1998-06-30 | Bell Atlantic Network Services, Inc. | Network configuration management system for digital communication networks |
US6047323A (en) * | 1995-10-19 | 2000-04-04 | Hewlett-Packard Company | Creation and migration of distributed streams in clusters of networked computers |
US5793763A (en) * | 1995-11-03 | 1998-08-11 | Cisco Technology, Inc. | Security system for network address translation systems |
US5684800A (en) | 1995-11-15 | 1997-11-04 | Cabletron Systems, Inc. | Method for establishing restricted broadcast groups in a switched network |
US5801970A (en) | 1995-12-06 | 1998-09-01 | Martin Marietta Corporation | Model-based feature tracking system |
GB2309558A (en) * | 1996-01-26 | 1997-07-30 | Ibm | Load balancing across the processors of a server computer |
JPH09244940A (en) | 1996-03-12 | 1997-09-19 | Hitachi Ltd | Method for managing distributed computer resource |
US5768271A (en) | 1996-04-12 | 1998-06-16 | Alcatel Data Networks Inc. | Virtual private network |
US6085238A (en) | 1996-04-23 | 2000-07-04 | Matsushita Electric Works, Ltd. | Virtual LAN system |
US5748958A (en) | 1996-04-30 | 1998-05-05 | International Business Machines Corporation | System for utilizing batch requests to present membership changes to process groups |
US5845124A (en) | 1996-05-01 | 1998-12-01 | Ncr Corporation | Systems and methods for generating and displaying a symbolic representation of a network model |
EP0812086B1 (en) | 1996-06-07 | 2007-09-05 | Nippon Telegraph And Telephone Corporation | Vlan control system and method |
KR100204029B1 (en) * | 1996-06-19 | 1999-06-15 | 이계철 | Allocation method of virtual link at atm switching system |
US5822531A (en) | 1996-07-22 | 1998-10-13 | International Business Machines Corporation | Method and system for dynamically reconfiguring a cluster of computer systems |
US5796830A (en) * | 1996-07-29 | 1998-08-18 | International Business Machines Corporation | Interoperable cryptographic key recovery system |
US5774660A (en) * | 1996-08-05 | 1998-06-30 | Resonate, Inc. | World-wide-web server with delayed resource-binding for resource-based load balancing on a distributed resource multi-node network |
US5818937A (en) | 1996-08-12 | 1998-10-06 | Ncr Corporation | Telephone tone security device |
US5930798A (en) | 1996-08-15 | 1999-07-27 | Predicate Logic, Inc. | Universal data measurement, analysis and control system |
US5918017A (en) | 1996-08-23 | 1999-06-29 | Internatioinal Business Machines Corp. | System and method for providing dynamically alterable computer clusters for message routing |
US6236365B1 (en) | 1996-09-09 | 2001-05-22 | Tracbeam, Llc | Location of a mobile station using a plurality of commercial wireless infrastructures |
US5832529A (en) * | 1996-10-11 | 1998-11-03 | Sun Microsystems, Inc. | Methods, apparatus, and product for distributed garbage collection |
US5790895A (en) | 1996-10-18 | 1998-08-04 | Compaq Computer Corporation | Modem sharing |
US5905872A (en) * | 1996-11-05 | 1999-05-18 | At&T Corp. | Method of transferring connection management information in world wideweb requests and responses |
US5784463A (en) | 1996-12-04 | 1998-07-21 | V-One Corporation | Token distribution, registration, and dynamic configuration of user entitlement for an application level security system and method |
US5938732A (en) | 1996-12-09 | 1999-08-17 | Sun Microsystems, Inc. | Load balancing and failover of network services |
EP1015966A2 (en) | 1996-12-13 | 2000-07-05 | Maves International Software, Inc. | Method, system and data structures for computer software application development and execution |
GB9626241D0 (en) * | 1996-12-18 | 1997-02-05 | Ncr Int Inc | Secure data processing method and system |
US5845277A (en) | 1996-12-19 | 1998-12-01 | Mci Communications Corporation | Production of statistically-based network maps |
US6272523B1 (en) | 1996-12-20 | 2001-08-07 | International Business Machines Corporation | Distributed networking using logical processes |
US6112243A (en) | 1996-12-30 | 2000-08-29 | Intel Corporation | Method and apparatus for allocating tasks to remote networked processors |
US5826015A (en) | 1997-02-20 | 1998-10-20 | Digital Equipment Corporation | Method and apparatus for secure remote programming of firmware and configurations of a computer over a network |
US6151688A (en) | 1997-02-21 | 2000-11-21 | Novell, Inc. | Resource management in a clustered computer system |
US5958009A (en) | 1997-02-27 | 1999-09-28 | Hewlett-Packard Company | System and method for efficiently monitoring quality of service in a distributed processing environment |
US6067580A (en) | 1997-03-11 | 2000-05-23 | International Business Machines Corporation | Integrating distributed computing environment remote procedure calls with an advisory work load manager |
US6104716A (en) * | 1997-03-28 | 2000-08-15 | International Business Machines Corporation | Method and apparatus for lightweight secure communication tunneling over the internet |
US5968126A (en) | 1997-04-02 | 1999-10-19 | Switchsoft Systems, Inc. | User-based binding of network stations to broadcast domains |
JP2001519121A (en) | 1997-04-04 | 2001-10-16 | アセンド コミュニケーションズ インコーポレイテッド | High-speed packet scheduling method and apparatus |
CA2202572C (en) | 1997-04-14 | 2004-02-10 | Ka Lun Eddie Law | A scaleable web server and method of efficiently managing multiple servers |
US6065058A (en) | 1997-05-09 | 2000-05-16 | International Business Machines Corp. | Dynamic push filtering based on information exchanged among nodes in a proxy hierarchy |
US6049528A (en) * | 1997-06-30 | 2000-04-11 | Sun Microsystems, Inc. | Trunking ethernet-compatible networks |
FR2765702B1 (en) | 1997-07-02 | 2001-07-06 | Bull Sa | INFORMATION PROCESSING SYSTEM ARCHITECTURE |
US6185308B1 (en) * | 1997-07-07 | 2001-02-06 | Fujitsu Limited | Key recovery system |
US6233610B1 (en) | 1997-08-27 | 2001-05-15 | Northern Telecom Limited | Communications network having management system architecture supporting reuse |
US5960371A (en) | 1997-09-04 | 1999-09-28 | Schlumberger Technology Corporation | Method of determining dips and azimuths of fractures from borehole images |
US6041054A (en) * | 1997-09-24 | 2000-03-21 | Telefonaktiebolaget Lm Ericsson | Efficient transport of internet protocol packets using asynchronous transfer mode adaptation layer two |
JP3649367B2 (en) * | 1997-09-26 | 2005-05-18 | ソニー株式会社 | Packet transmission control method and apparatus |
EP0907145A3 (en) | 1997-10-03 | 2003-03-26 | Nippon Telegraph and Telephone Corporation | Method and equipment for extracting image features from image sequence |
US6427171B1 (en) * | 1997-10-14 | 2002-07-30 | Alacritech, Inc. | Protocol processing stack for use with intelligent network interface device |
US6192401B1 (en) * | 1997-10-21 | 2001-02-20 | Sun Microsystems, Inc. | System and method for determining cluster membership in a heterogeneous distributed system |
US6047325A (en) * | 1997-10-24 | 2000-04-04 | Jain; Lalit | Network device for supporting construction of virtual local area networks on arbitrary local and wide area computer networks |
US6178529B1 (en) * | 1997-11-03 | 2001-01-23 | Microsoft Corporation | Method and system for resource monitoring of disparate resources in a server cluster |
US6088734A (en) | 1997-11-12 | 2000-07-11 | International Business Machines Corporation | Systems methods and computer program products for controlling earliest deadline first scheduling at ATM nodes |
US6125447A (en) | 1997-12-11 | 2000-09-26 | Sun Microsystems, Inc. | Protection domains to provide security in a computer system |
US6035405A (en) * | 1997-12-22 | 2000-03-07 | Nortel Networks Corporation | Secure virtual LANs |
US6182275B1 (en) * | 1998-01-26 | 2001-01-30 | Dell Usa, L.P. | Generation of a compatible order for a computer system |
US6086618A (en) | 1998-01-26 | 2000-07-11 | Microsoft Corporation | Method and computer program product for estimating total resource usage requirements of a server application in a hypothetical user configuration |
US6076108A (en) | 1998-03-06 | 2000-06-13 | I2 Technologies, Inc. | System and method for maintaining a state for a user session using a web system having a global session server |
US6208649B1 (en) * | 1998-03-11 | 2001-03-27 | Cisco Technology, Inc. | Derived VLAN mapping technique |
US6691148B1 (en) * | 1998-03-13 | 2004-02-10 | Verizon Corporate Services Group Inc. | Framework for providing quality of service requirements in a distributed object-oriented computer system |
TW374965B (en) | 1998-03-17 | 1999-11-21 | Winbond Electronics Corp | Method of processing of transmission of confidential data and the network system |
US6098093A (en) | 1998-03-19 | 2000-08-01 | International Business Machines Corp. | Maintaining sessions in a clustered server environment |
US6393386B1 (en) * | 1998-03-26 | 2002-05-21 | Visual Networks Technologies, Inc. | Dynamic modeling of complex networks and prediction of impacts of faults therein |
US6236901B1 (en) | 1998-03-31 | 2001-05-22 | Dell Usa, L.P. | Manufacturing system and method for assembly of computer systems in a build-to-order environment |
WO1999052237A1 (en) * | 1998-04-03 | 1999-10-14 | Vertical Networks Inc. | System and method for transmitting voice and data using intelligent bridged tdm and packet buses |
US6118785A (en) * | 1998-04-07 | 2000-09-12 | 3Com Corporation | Point-to-point protocol with a signaling channel |
US6317438B1 (en) | 1998-04-14 | 2001-11-13 | Harold Herman Trebes, Jr. | System and method for providing peer-oriented control of telecommunications services |
US6059842A (en) | 1998-04-14 | 2000-05-09 | International Business Machines Corp. | System and method for optimizing computer software and hardware |
US6208345B1 (en) * | 1998-04-15 | 2001-03-27 | Adc Telecommunications, Inc. | Visual data integration system and method |
US6167052A (en) | 1998-04-27 | 2000-12-26 | Vpnx.Com, Inc. | Establishing connectivity in networks |
US20020049573A1 (en) * | 1998-05-13 | 2002-04-25 | El Ata Nabil A. Abu | Automated system and method for designing model based architectures of information systems |
US6311144B1 (en) | 1998-05-13 | 2001-10-30 | Nabil A. Abu El Ata | Method and apparatus for designing and analyzing information systems using multi-layer mathematical models |
FR2779018B1 (en) * | 1998-05-22 | 2000-08-18 | Activcard | TERMINAL AND SYSTEM FOR IMPLEMENTING SECURE ELECTRONIC TRANSACTIONS |
US6269076B1 (en) | 1998-05-28 | 2001-07-31 | 3Com Corporation | Method of resolving split virtual LANs utilizing a network management system |
US6259448B1 (en) | 1998-06-03 | 2001-07-10 | International Business Machines Corporation | Resource model configuration and deployment in a distributed computer network |
US6360265B1 (en) * | 1998-07-08 | 2002-03-19 | Lucent Technologies Inc. | Arrangement of delivering internet protocol datagrams for multimedia services to the same server |
US6226788B1 (en) | 1998-07-22 | 2001-05-01 | Cisco Technology, Inc. | Extensible network management system |
US6266707B1 (en) | 1998-08-17 | 2001-07-24 | International Business Machines Corporation | System and method for IP network address translation and IP filtering with dynamic address resolution |
US6336138B1 (en) * | 1998-08-25 | 2002-01-01 | Hewlett-Packard Company | Template-driven approach for generating models on network services |
US6327622B1 (en) | 1998-09-03 | 2001-12-04 | Sun Microsystems, Inc. | Load balancing in a network environment |
US6311270B1 (en) | 1998-09-14 | 2001-10-30 | International Business Machines Corporation | Method and apparatus for securing communication utilizing a security processor |
US6253230B1 (en) | 1998-09-22 | 2001-06-26 | International Business Machines Corporation | Distributed scalable device for selecting a server from a server cluster and a switched path to the selected server |
US6167383A (en) | 1998-09-22 | 2000-12-26 | Dell Usa, Lp | Method and apparatus for providing customer configured machines at an internet site |
US6230312B1 (en) | 1998-10-02 | 2001-05-08 | Microsoft Corporation | Automatic detection of per-unit location constraints |
US6212559B1 (en) * | 1998-10-28 | 2001-04-03 | Trw Inc. | Automated configuration of internet-like computer networks |
JP3820777B2 (en) * | 1998-11-12 | 2006-09-13 | 富士ゼロックス株式会社 | Private key deposit system and method |
US6272522B1 (en) | 1998-11-17 | 2001-08-07 | Sun Microsystems, Incorporated | Computer data packet switching and load balancing system using a general-purpose multiprocessor architecture |
US6330605B1 (en) | 1998-11-19 | 2001-12-11 | Volera, Inc. | Proxy cache cluster |
US6108702A (en) | 1998-12-02 | 2000-08-22 | Micromuse, Inc. | Method and apparatus for determining accurate topology features of a network |
US6336171B1 (en) * | 1998-12-23 | 2002-01-01 | Ncr Corporation | Resource protection in a cluster environment |
US6691168B1 (en) * | 1998-12-31 | 2004-02-10 | Pmc-Sierra | Method and apparatus for high-speed network rule processing |
US6628671B1 (en) * | 1999-01-19 | 2003-09-30 | Vtstarcom, Inc. | Instant activation of point-to point protocol (PPP) connection using existing PPP state |
US6377996B1 (en) * | 1999-02-18 | 2002-04-23 | International Business Machines Corporation | System for seamless streaming of data stored on a network of distributed primary and target servers using segmentation information exchanged among all servers during streaming |
JP2000322288A (en) * | 1999-05-06 | 2000-11-24 | Fujitsu Ltd | Distributed object development system and computer readable recording medium for recording program for execution of distributed object development by computer |
US6542504B1 (en) * | 1999-05-28 | 2003-04-01 | 3Com Corporation | Profile based method for packet header compression in a point to point link |
CN100384191C (en) * | 1999-06-10 | 2008-04-23 | 阿尔卡塔尔互联网运行公司 | Strategy based network architecture |
US6539494B1 (en) * | 1999-06-17 | 2003-03-25 | Art Technology Group, Inc. | Internet server session backup apparatus |
US6505244B1 (en) * | 1999-06-29 | 2003-01-07 | Cisco Technology Inc. | Policy engine which supports application specific plug-ins for enforcing policies in a feedback-based, adaptive data network |
US6684335B1 (en) * | 1999-08-19 | 2004-01-27 | Epstein, Iii Edwin A. | Resistance cell architecture |
US7162427B1 (en) * | 1999-08-20 | 2007-01-09 | Electronic Data Systems Corporation | Structure and method of modeling integrated business and information technology frameworks and architecture in support of a business |
US6256773B1 (en) | 1999-08-31 | 2001-07-03 | Accenture Llp | System, method and article of manufacture for configuration management in a development architecture framework |
US6772333B1 (en) * | 1999-09-01 | 2004-08-03 | Dickens Coal Llc | Atomic session-start operation combining clear-text and encrypted sessions to provide id visibility to middleware such as load-balancers |
US6598077B2 (en) * | 1999-12-06 | 2003-07-22 | Warp Solutions, Inc. | System and method for dynamic content routing |
US6529953B1 (en) * | 1999-12-17 | 2003-03-04 | Reliable Network Solutions | Scalable computer network resource monitoring and location system |
US6862613B1 (en) * | 2000-01-10 | 2005-03-01 | Sun Microsystems, Inc. | Method and apparatus for managing operations of clustered computer systems |
US7315801B1 (en) * | 2000-01-14 | 2008-01-01 | Secure Computing Corporation | Network security modeling system and method |
US6701363B1 (en) * | 2000-02-29 | 2004-03-02 | International Business Machines Corporation | Method, computer program product, and system for deriving web transaction performance metrics |
US6678821B1 (en) * | 2000-03-23 | 2004-01-13 | E-Witness Inc. | Method and system for restricting access to the private key of a user in a public key infrastructure |
US6868062B1 (en) * | 2000-03-28 | 2005-03-15 | Intel Corporation | Managing data traffic on multiple ports |
US6574195B2 (en) * | 2000-04-19 | 2003-06-03 | Caspian Networks, Inc. | Micro-flow management |
WO2001084313A2 (en) * | 2000-05-02 | 2001-11-08 | Sun Microsystems, Inc. | Method and system for achieving high availability in a networked computer system |
US6675308B1 (en) * | 2000-05-09 | 2004-01-06 | 3Com Corporation | Methods of determining whether a network interface card entry within the system registry pertains to physical hardware or to a virtual device |
US7032031B2 (en) * | 2000-06-23 | 2006-04-18 | Cloudshield Technologies, Inc. | Edge adapter apparatus and method |
WO2002019097A1 (en) * | 2000-09-01 | 2002-03-07 | International Interactive Commerce, Ltd. | System and method for collaboration using web browsers |
JP2002108910A (en) * | 2000-09-27 | 2002-04-12 | Nec Soft Ltd | Enciphered filing system, enciphered file retrieving method and computer readable recording medium |
US7272653B2 (en) * | 2000-09-28 | 2007-09-18 | International Business Machines Corporation | System and method for implementing a clustered load balancer |
US6886038B1 (en) * | 2000-10-24 | 2005-04-26 | Microsoft Corporation | System and method for restricting data transfers and managing software components of distributed computers |
US7003574B1 (en) * | 2000-11-01 | 2006-02-21 | Microsoft Corporation | Session load balancing and use of VIP as source address for inter-cluster traffic through the use of a session identifier |
US6985956B2 (en) * | 2000-11-02 | 2006-01-10 | Sun Microsystems, Inc. | Switching system |
US6856591B1 (en) * | 2000-12-15 | 2005-02-15 | Cisco Technology, Inc. | Method and system for high reliability cluster management |
US20030046615A1 (en) * | 2000-12-22 | 2003-03-06 | Alan Stone | System and method for adaptive reliability balancing in distributed programming networks |
US7003562B2 (en) * | 2001-03-27 | 2006-02-21 | Redseal Systems, Inc. | Method and apparatus for network wide policy-based analysis of configurations of devices |
US7162634B2 (en) * | 2001-04-18 | 2007-01-09 | Thomson Licensing | Method for providing security on a powerline-modem network |
US7194439B2 (en) * | 2001-04-30 | 2007-03-20 | International Business Machines Corporation | Method and system for correlating job accounting information with software license information |
US20030014644A1 (en) * | 2001-05-02 | 2003-01-16 | Burns James E. | Method and system for security policy management |
US7013462B2 (en) * | 2001-05-10 | 2006-03-14 | Hewlett-Packard Development Company, L.P. | Method to map an inventory management system to a configuration management system |
WO2002098526A1 (en) * | 2001-06-04 | 2002-12-12 | Playnet, Inc. | System and method for distributing a multi-client game/application over a communications network |
US6944678B2 (en) * | 2001-06-18 | 2005-09-13 | Transtech Networks Usa, Inc. | Content-aware application switch and methods thereof |
US20030009559A1 (en) * | 2001-07-09 | 2003-01-09 | Naoya Ikeda | Network system and method of distributing accesses to a plurality of server apparatus in the network system |
US7174379B2 (en) * | 2001-08-03 | 2007-02-06 | International Business Machines Corporation | Managing server resources for hosted applications |
US7765283B2 (en) * | 2001-08-15 | 2010-07-27 | Cisco Technology, Inc. | Network provisioning in a distributed network management architecture |
US7043393B2 (en) * | 2001-08-15 | 2006-05-09 | National Instruments Corporation | System and method for online specification of measurement hardware |
US20030041142A1 (en) * | 2001-08-27 | 2003-02-27 | Nec Usa, Inc. | Generic network monitoring tool |
US6980978B2 (en) * | 2001-09-07 | 2005-12-27 | International Business Machines Corporation | Site integration management system for operational support service in an internet data center |
US7500069B2 (en) * | 2001-09-17 | 2009-03-03 | Hewlett-Packard Development Company, L.P. | System and method for providing secure access to network logical storage partitions |
US7194616B2 (en) * | 2001-10-27 | 2007-03-20 | International Business Machines Corporation | Flexible temporary capacity upgrade/downgrade in a computer system without involvement of the operating system |
US7024451B2 (en) * | 2001-11-05 | 2006-04-04 | Hewlett-Packard Development Company, L.P. | System and method for maintaining consistent independent server-side state among collaborating servers |
US6990666B2 (en) * | 2002-03-18 | 2006-01-24 | Surgient Inc. | Near on-line server |
US6681262B1 (en) * | 2002-05-06 | 2004-01-20 | Infinicon Systems | Network data flow optimization |
US6888807B2 (en) * | 2002-06-10 | 2005-05-03 | Ipr Licensing, Inc. | Applying session services based on packet flows |
US20040002878A1 (en) * | 2002-06-28 | 2004-01-01 | International Business Machines Corporation | Method and system for user-determined authentication in a federated environment |
US7191344B2 (en) * | 2002-08-08 | 2007-03-13 | Authenex, Inc. | Method and system for controlling access to data stored on a data storage device |
US20040054791A1 (en) * | 2002-09-17 | 2004-03-18 | Krishnendu Chakraborty | System and method for enforcing user policies on a web server |
WO2004075006A2 (en) * | 2003-02-14 | 2004-09-02 | Preventsys, Inc. | Network audit policy assurance system |
US7689676B2 (en) * | 2003-03-06 | 2010-03-30 | Microsoft Corporation | Model-based policy application |
US7072807B2 (en) * | 2003-03-06 | 2006-07-04 | Microsoft Corporation | Architecture for distributed computing system and automated design, deployment, and management of distributed applications |
US8122106B2 (en) * | 2003-03-06 | 2012-02-21 | Microsoft Corporation | Integrating design, deployment, and management phases for systems |
US7890543B2 (en) * | 2003-03-06 | 2011-02-15 | Microsoft Corporation | Architecture for distributed computing system and automated design, deployment, and management of distributed applications |
US7350186B2 (en) * | 2003-03-10 | 2008-03-25 | International Business Machines Corporation | Methods and apparatus for managing computing deployment in presence of variable workload |
CA2520933A1 (en) * | 2003-03-31 | 2004-10-21 | System Management Arts, Inc. | Method and apparatus for multi-realm system modeling |
US20060025984A1 (en) * | 2004-08-02 | 2006-02-02 | Microsoft Corporation | Automatic validation and calibration of transaction-based performance models |
US8627149B2 (en) * | 2004-08-30 | 2014-01-07 | International Business Machines Corporation | Techniques for health monitoring and control of application servers |
US7333000B2 (en) * | 2004-11-12 | 2008-02-19 | Afco Systems Development, Inc. | Tracking system and method for electrically powered equipment |
US7350068B2 (en) * | 2005-04-22 | 2008-03-25 | International Business Machines Corporation | Server blade network boot method that minimizes required network bandwidth |
US7805496B2 (en) * | 2005-05-10 | 2010-09-28 | International Business Machines Corporation | Automatic generation of hybrid performance models |
-
2003
- 2003-09-08 US US10/657,568 patent/US7606929B2/en active Active
-
2004
- 2004-05-26 TW TW093114978A patent/TWI366131B/en not_active IP Right Cessation
- 2004-05-28 AU AU2004202403A patent/AU2004202403B2/en not_active Ceased
- 2004-05-31 MY MYPI20042096A patent/MY140059A/en unknown
- 2004-06-09 CA CA2470420A patent/CA2470420C/en not_active Expired - Fee Related
- 2004-06-29 JP JP2004192283A patent/JP4583091B2/en not_active Expired - Fee Related
- 2004-06-29 KR KR1020040049374A patent/KR101169073B1/en active IP Right Grant
- 2004-06-29 MX MXPA04006408A patent/MXPA04006408A/en active IP Right Grant
- 2004-06-30 EP EP04015381A patent/EP1494422B1/en active Active
- 2004-06-30 AT AT04015381T patent/ATE416551T1/en not_active IP Right Cessation
- 2004-06-30 BR BR0402571-7A patent/BRPI0402571A/en not_active Application Discontinuation
- 2004-06-30 DE DE602004018065T patent/DE602004018065D1/en active Active
- 2004-06-30 CN CN200410063249.3A patent/CN1607781B/en active Active
-
2005
- 2005-03-15 HK HK05102235.6A patent/HK1069940A1/en not_active IP Right Cessation
Also Published As
Publication number | Publication date |
---|---|
HK1069940A1 (en) | 2005-06-03 |
KR101169073B1 (en) | 2012-07-27 |
TWI366131B (en) | 2012-06-11 |
EP1494422B1 (en) | 2008-12-03 |
MY140059A (en) | 2009-11-30 |
JP4583091B2 (en) | 2010-11-17 |
AU2004202403B2 (en) | 2009-12-17 |
MXPA04006408A (en) | 2006-07-24 |
JP2005027304A (en) | 2005-01-27 |
CA2470420C (en) | 2012-01-24 |
DE602004018065D1 (en) | 2009-01-15 |
EP1494422A2 (en) | 2005-01-05 |
BRPI0402571A (en) | 2005-05-24 |
AU2004202403A1 (en) | 2005-01-20 |
US7606929B2 (en) | 2009-10-20 |
CN1607781B (en) | 2014-06-04 |
EP1494422A3 (en) | 2006-05-24 |
CN1607781A (en) | 2005-04-20 |
TW200508963A (en) | 2005-03-01 |
ATE416551T1 (en) | 2008-12-15 |
KR20050002608A (en) | 2005-01-07 |
US20050055435A1 (en) | 2005-03-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2470420A1 (en) | Network load balancing with connection manipulation | |
US9414136B2 (en) | Methods and apparatus to route fibre channel frames using reduced forwarding state on an FCoE-to-FC gateway | |
US9306761B2 (en) | Video streaming system and method | |
US20150081863A1 (en) | Enhanced Network Virtualization using Metadata in Encapsulation Header | |
US20120054316A1 (en) | Tcp multiplexing over a proxy | |
CA2503963A1 (en) | Multi-bridge lan aggregation | |
CN107005532A (en) | Network extension TCP splicings | |
CN105531973B (en) | The IP address of client is sent to the relay system and method for server using tunneling | |
US11700313B1 (en) | Seamless remote network redirection | |
CN113326228A (en) | Message forwarding method, device and equipment based on remote direct data storage | |
US10931552B1 (en) | Connectivity check with service insertion | |
CN103905510A (en) | Processing method and background server for data package | |
CN110830434A (en) | Universal transparent proxy method | |
US9203895B1 (en) | System and method for lateral connection between interface devices with bypass of external network | |
CN102761483A (en) | Tunnel implementation method, system and device implemented without occupying IP addresses | |
CN102025787A (en) | Method and device for accessing network by network interface of data card equipment | |
CN101605093A (en) | Utilize IP Option to realize the method for information transparent transmission | |
CN102655476B (en) | Internet protocol flow transmitting method and device | |
CN109361590A (en) | It is a kind of to solve the obstructed method and apparatus of business access | |
CN112839355B (en) | IPSEC testing system and method in network of 5G network | |
CN105827588B (en) | A kind of stream medium data dissemination system based on network driver layer | |
WO2020220977A1 (en) | Data flow guiding apparatus and data flow guiding method in virtual network | |
CN106254396A (en) | Proprietary protocol information transmission system and method | |
CN101247259A (en) | Method for managing low-end switchboard | |
Dai et al. | Design of remote upgrade of equipment monitoring system software |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request | ||
MKLA | Lapsed |
Effective date: 20140610 |