Abstract:
A system for optimizing network traffic is described. The system includes a primary appliance having a first handoff engine in an active state. The primary appliance is configured to receive from a first switch one of first data or a copy of first data to be provided to a second switch. The system also includes a secondary appliance having a second handoff engine in a passive state, where the secondary appliance is configured to receive from the first switch the other of the first data or the copy of the first data. The second handoff engine is configured to monitor state data provided by the first handoff engine, determine a condition of the first handoff engine using the state data and the other of the first data or the copy of first data, and based on the determination, provide instructions for the secondary appliance to provide the other of the first data or the copy of the first data to the second switch.
Abstract:
A system for optimizing network traffic is described. The system includes a packet engine configured to acquire data regarding a flow of a plurality of data packets over a link and to determine transport communication protocol (TCP) characteristics for the flow, and a TCP flavor selector configured to dynamically select a TCP flavor based on the TCP characteristics, where the TCP flavor can be used to modify the flow of data packets over the link. The TCP characteristics dynamically change with time. The TCP flavor selector is further configured to modify the flow using the TCP flavor.
Abstract:
A system for optimizing network traffic is described. The system includes a quality of service (QoS) engine configured to acquire information regarding a plurality of data packets comprising a plurality of data packet flows operating over a plurality of links. The QoS engine can be further configured to determine a flow priority to the plurality of data packets flows, and to determine TCP characteristics for the plurality of data packet flows. The system further includes a TCP controller configured to acquire the flow priority to the plurality of data packets from the QoS engine. The TCP controller can be configured to obtain queue information associated with the plurality of data packets, and adjust a receive window size based on the flow priority and the queue information.
Abstract:
An appliance for optimizing network traffic is described. The appliance includes a transport layer controller configured to acquire link characteristics of a link, determine a congestion window for a flow of a plurality of data packets over the link, and determine transport layer characteristics for the flow. The appliance also includes a traffic priority controller configured to acquire a flow priority of the flow, determine whether congestion is or going to occur using the transport layer characteristics and the link characteristics, and increase the congestion window for the flow based on the congestion determination and on the flow priority having been indicated as being higher priority. The appliance further includes a quality of service engine configured to output the flow according to the congestion window.
Abstract:
A system for optimizing network traffic is described. The system includes a primary appliance having a first handoff engine in an active state. The primary appliance is configured to receive from a first switch one of first data or a copy of first data to be provided to a second switch. The system also includes a secondary appliance having a second handoff engine in a passive state, where the secondary appliance is configured to receive from the first switch the other of the first data or the copy of the first data. The second handoff engine is configured to monitor state data provided by the first handoff engine, determine a condition of the first handoff engine using the state data and the other of the first data or the copy of first data, and based on the determination, provide instructions for the secondary appliance to provide the other of the first data or the copy of the first data to the second switch.
Abstract:
A system for optimizing network traffic is described. The system includes a transport communication protocol (TCP) controller configured to acquire data regarding a flow of a plurality of data packets over a link and to determine TCP characteristics for the flow, and a congestion window controller configured to determine an initial congestion window based on the TCP characteristics. The TCP controller is further configured to establish a second flow using the initial congestion window.
Abstract:
A system for optimizing network traffic is described. The system includes a primary appliance having a first handoff engine in an active state. The primary appliance is configured to receive from a first switch one of first data or a copy of first data to be provided to a second switch. The system also includes a secondary appliance having a second handoff engine in a passive state, where the secondary appliance is configured to receive from the first switch the other of the first data or the copy of the first data. The second handoff engine is configured to monitor state data provided by the first handoff engine, determine a condition of the first handoff engine using the state data and the other of the first data or the copy of first data, and based on the determination, provide instructions for the secondary appliance to provide the other of the first data or the copy of the first data to the second switch.
Abstract:
Embodiments described include systems and methods for management and pre-establishment of network application and secure communication sessions. Session logs may be analyzed to identify an application or secure communication sessions likely to be accessed, and prior to receiving a request to establish the session, an intermediary (e.g. another device such as an intermediary appliance or other device, or an intermediary agent on a client such as a client application) may pre-establish the session, performing any necessary handshaking or credential or key exchange processes. When the session is subsequently requested (e.g. in response to a user request), the system may immediately begin using the pre-established session. This pre-establishment may be coordinated within the enterprise providing load balancing and scheduling of session establishment to prevent large processing loads at any one point in time.
Abstract:
Described embodiments provide systems and apparatuses for enhanced quality of service, steering and policy enforcement for https traffic via intelligent in-line path discovery of a TLS terminating node. The system may include a first network device having a secure connection traversing through the first network device, and in communication with a second network device. The first network device and the second network device may be intermediary to a client device and a server. The first network device may determine that the second network device terminates the secure connection. The first network device may receive key generation information of the secure connection from the second network device following determining the second network device terminates the secure connection. The first network device may decipher packet(s) of the secure connection destined for the device or the server using the received key generation information, to regulate network traffic of the secure connection at the first network device.
Abstract:
Described embodiments provide systems and methods of forming overlay tunnels for delivery of data between networked devices. A first intermediary device may transmit, responsive to a connection request from a client, a request having a source IP address corresponding to a first virtual IP address of the first device and a first payload including first security hash information to be processed by a second intermediary device. The first device may receive, from the second intermediary device, a response. The response may have a source IP address corresponding to the IP address of the server and a second payload including a virtual IP address of the second device, responsive to second security hash information corresponding to the first security hash information. The first device may establish an overlay tunnel using the first virtual IP address and the second virtual IP address for communicating data between the client and the server.