Supercharge Your Innovation With Domain-Expert AI Agents!

Proxy interception

A technology of proxy nodes and codes, applied in the field of intercepted protocols, which can solve problems such as lack of migration paths

Active Publication Date: 2016-11-09
TELEFON AB LM ERICSSON (PUBL)
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

A key weakness of the PSIRP / PURSUIT approach is that it lacks a viable migration path, as it requires a completely new network forwarding infrastructure based on what is known as a Bloom filter

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Proxy interception
  • Proxy interception
  • Proxy interception

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0120] In the following detailed description, different embodiments of the present disclosure will be described in more detail with reference to the accompanying drawings. Specific details, such as specific examples and techniques, are described for purposes of illustration and not limitation, to provide a thorough understanding.

[0121] Embodiments of the present disclosure address at least some of the above-described problems of existing proxy network connections through an inventive non-transparent proxy that intercepts connectionless protocols such as CoAP over UDP / IP or NetInf.

[0122] Embodiments enable communication between a client node, a proxy node, and a server node on an end-to-end path between a client node and a server node without necessarily being in any of the client node or neighboring proxy nodes Configure the address of the proxy node, or do not have to configure a new routing protocol to reach the proxy node. Furthermore, the solution allows expansion b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a client node(12, 70, 710, 720), a proxy node (14, 16, 200, 500, 10, 520),and methods therein, as well as a protocol and a computer program for enabling interception of request messages in connection-less protocols.A primary request addressed to a server node is intercepted (302, 402) by a proxy node creating(304, 404) a secondary request based on said request and forwards(304, 406) this secondary request towards the server node. The proxy node receives (306, 408) a secondary response, being a response to the secondary request, creates (308, 310, 410, 412, 414) a primary response based on the secondary response and forwards (312, 416) this primary response to the node from which the primary request was received.A response can thus be sent along the same path as a corresponding request was sent.

Description

technical field [0001] The present disclosure relates to proxy interception of request information. More specifically, the present disclosure relates to client network nodes, proxy network nodes and server network nodes and methods therein, and protocols for enabling interception of request messages in connectionless protocols. Background technique [0002] Point-to-multipoint distribution of real-time data across multiple operator domains in a highly scalable manner is a challenging problem. Use cases include the distribution of live video streams from a single smartphone to millions of viewers, and the distribution of machine-to-machine real-time data from a single data source to millions of clients. [0003] Point-to-multipoint distribution of real-time data can be implemented in a local network by using a multicast mechanism in a link layer technology such as Ethernet (Ethernet). Also, Internet Protocol (IP) layer multicasting can be in this local network. However, th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/12H04L29/08
CPCH04L45/306H04L61/59H04L67/63H04L67/568H04L67/562H04L67/01
Inventor A·E·埃里克森M·伊拉A·M·马里克B·奥尔曼K-A·珀森L·桑德
Owner TELEFON AB LM ERICSSON (PUBL)
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More