Abstract:
Systems and methods are described for using a client agent operating in a virtual private network environment to intercept HTTP communications. Methods include: intercepting at the network layer, by a client agent executing on a client, an HTTP request from an application executing on the client; modifying the HTTP request; and transmitting, via a transport layer connection, the modified HTTP request to a server. Additional methods may comprise adding, removing, or modifying at least one cookie in the HTTP request. Still other methods may comprise modifying at least one name-value pair contained in the HTTP request. Corresponding systems are also described.
Abstract:
A system including a client device communicatively coupled to a first wireless network, wherein the client device has the ability to request a web page from a content server, and an optimization server is configured to receive network data associated with the characteristics of the first wireless network, to provide tuning settings based on the network data, to receive response data from the content server, and to transmit optimized response data to the client device, wherein the response data corresponds to a request for a web page from a client device and the optimized response data corresponds to the response data being altered based on the provided tuning settings.
Abstract:
Described embodiments provide systems and methods for inferring a network type and network conditions. The system includes a packet capturing engine configured to capture a plurality of network packets from a plurality of TCP network connections. The system includes a packet analyzer configured to analyze the plurality of network packets to generate a plurality of metrics. The system includes a network classifier configured to infer network types of the plurality of TCP connections based on the plurality of metrics and at least one classification model. The system also includes a conditions ranking engine configured to estimate a level of network congestion for each TCP connection based on the plurality of metrics and the network types.
Abstract:
A computer network appliance may include a memory and a processor cooperating with the memory to run a classification kernel module performing traffic shaping on data packets based upon a first set of queuing disciplines (qdiscs). The processor may further run at least one virtual device also performing traffic shaping on the data packets based upon a second set of qdiscs different than the first set of qdiscs, and provide the data packets to a network interface.
Abstract:
Described herein are approaches for shaping traffic within a data network. In particular, methods and systems herein describe devices configured to classify packets based on particular criteria. Based on a classification associated with a packet, a packet can be queued at a subscriber mux device, one of a plurality of subscriber devices, and an application device. In addition, the subscriber devices and the application device include qdiscs to shape traffic. Once the traffic is shaped, it is queued based on properties associated with packets.
Abstract:
Systems and methods are described for using a client agent operating in a virtual private network environment to intercept HTTP communications. Methods include: intercepting at the network layer, by a client agent executing on a client, an HTTP request from an application executing on the client; modifying the HTTP request; and transmitting, via a transport layer connection, the modified HTTP request to a server. Additional methods may comprise adding, removing, or modifying at least one cookie in the HTTP request. Still other methods may comprise modifying at least one name-value pair contained in the HTTP request. Corresponding systems are also described.
Abstract:
An appliance and method for authorizing a level of access of a client to a virtual private network connection, based on a client-side attribute includes the step of establishing, by an appliance, a control connection with a client upon receiving a client request to establish a virtual private network connection with a network. The appliance transmits, via the control connection, a request to the client to evaluate at least one clause of a security string, the at least one clause including an expression associated with a client-side attribute. The client transmits, via the control connection, a response to the appliance comprising a result of evaluating the at least one clause by the client. The appliance assigns the client to an authorization group based on the result of evaluation of the at least one clause.
Abstract:
Systems and methods for reducing file sizes for files delivered over a network are disclosed. A method comprises receiving a first file comprising sequences of data; creating a hash table having entries corresponding to overlapping sequences of data; receiving a second file comprising sequences of data; comparing each of the sequences of data in the second file to the sequences of data in the hash table to determine sequences of data present in both the first and second files; and creating a third file comprising sequences of data from the second file and representations of locations and lengths of said sequences of data present in both the first and second files.