Cooperative proxy auto-discovery and connection interception

a proxy and cooperative technology, applied in the field of cooperative proxy auto-discovery and connection interception, can solve the problems of administrative burden and administrative burden on a network administrator, and make some operations infeasible, so as to optimize network transactions, transparently intercept network transactions, and reduce bandwidth usage and apparent network latency

Inactive Publication Date: 2008-12-25
RIVERBED TECH INC
View PDF72 Cites 46 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0023]In some variations, more than two proxies along a network path between a client and a server cooperate to transparently intercept and proxy network transactions. Once proxies discover each other, they can transparently intercept network transactions. Various actions might be taken as part of the interception, such as optimize the network transaction. One such optimization is to use the proxy pair to reduce bandwidth usage and apparent network latency. One approach to reducing bandwidth usage is to use segment cloning between pairs of proxies that span a limited bandwidth network portion. One approach to reducing latency is to predict transactions and generate synthetic requests at a proxy such that portions of a transaction occur and might be transported prior to a client making the request.

Problems solved by technology

One problem that must be overcome when deploying proxies is that of directing client requests to the proxy instead of to the destination server.
In addition, this type of deployment requires that all clients must be explicitly configured and that can be an administrative burden on a network administrator.
Where each proxy must be explicitly configured with indications of the pairs to which it belongs and to the identity of the other members of those pairs, the administrative burden on a network administrator might well make some operations infeasible if they require proxy pairs.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cooperative proxy auto-discovery and connection interception
  • Cooperative proxy auto-discovery and connection interception
  • Cooperative proxy auto-discovery and connection interception

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040]The present invention has many applications, as will be apparent after reading this disclosure. In describing an embodiment of proxy discovery or network transaction interception according to the present invention, only a few of the possible variations are described. Other applications and variations will be apparent to one of ordinary skill in the art, so the invention should not be construed as narrowly as the examples, but rather in accordance with the appended claims.

[0041]A general problem when deploying multiple network entities in a cooperative scenario, in which the devices must coordinate and interact with one another, is that of configuration. This problem is especially acute when trying to deploy cooperative transparent proxy functionality that depends on several cooperating network entities, such as where network traffic between a client and a server is to be intercepted by one proxy that in turn communicates with one or more other proxies to process the network tr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

In a network supporting transactions between clients and servers and proxies that are interposable in a network path between at least one client and at least one server, wherein a pair of proxies can modify a packet stream between a client and a server such that packet data from the client to the server is transformed at a client-side proxy of the proxy pair and untransformed at a server-side proxy of proxy pair and such that packet data from the server to the client is transformed at the server-side proxy and untransformed at the client-side proxy, a method and apparatus for a discovering proxy to transparently discover its position in a proxy pair by using proxy signals to indicate to other proxies that could pair with the discovering proxy. A discovering proxy might determine that it is a client-side proxy by receipt of a packet from client without a proxy signal. A discovering proxy might determine that it is a server-side proxy by receipt of a packet from server without a return proxy signal. Once a proxy pair is discovered, that proxy pair might transform traffic from the server to the client or vice versa, transforming the traffic at one proxy of the proxy pair and untransforming the traffic at the other proxy of the pair.

Description

CROSS-REFERENCES TO RELATED APPLICATIONS[0001]This application is a continuation of co-pending Nonprovisional patent application Ser. No. 10 / 640,459 filed Aug. 12, 2003 entitled “Content Delivery for Client-Server Protocols With User Affinities Using Connection End-Point Proxies,” incorporating by reference U.S. patent application Ser. No. 10 / 640,562, also filed Aug. 12, 2003 entitled Cooperative Proxy Auto-Discovery and Connection Interception.[0002]The present disclosure is related to the following commonly assigned U.S. Patent Applications:[0003]U.S. patent application Ser. No. 10 / 285,315 entitled “Transaction Accelerator for Client-Server Communication Systems” (hereinafter “McCanne I”) filed on Oct. 30, 2002, now U.S. Pat. No. 7,120,666 B2 issued Oct. 10, 2006, is incorporated by reference herein for all purposes.[0004]U.S. patent application Ser. No. 10 / 285,330 entitled “Content-Based Segmentation Scheme for Data Compression in Storage and Transmission Including Hierarchical S...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): G06F15/16H04W4/02H04L29/06H04L29/08H04W4/20
CPCH04W4/02H04W4/20H04L67/42H04L67/22H04L67/18H04L43/12H04L43/04H04L67/535H04L67/52H04L67/01
Inventor DEMMER, MICHAEL J.MCCANNE, STEVENLANDRUM, ALFRED
Owner RIVERBED TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products