Abstract:
Transparent network devices intercept messages from non-transparent network devices that establish a connection. Transparent network devices modify these messages to establish an inner connection with each other. The transparent network devices mimic at least some of the outer connection messages to establish their inner connection. The mimicked messages and any optional reset messages are intercepted by the transparent network devices to prevent them from reaching the outer connections. Transparent network devices modify network traffic, using error detection data, fragmentation data, or timestamps, so that inner connection network traffic inadvertently received by outer connection devices is rejected or ignored by the outer connection network devices. Transparent network devices may use different sequence windows for inner and outer connection network traffic. To prevent overlapping sequence windows, transparent network devices monitor the locations of the inner and outer connection sequence windows and may rapidly advance the inner connection sequence window as needed.
Abstract:
Network devices include proxies and where multiple proxies are present on a network, they can probe to determine the existence of other proxies. Where more than two proxies are present and thus different proxy pairings are possible, the proxies are programmed to determine which proxies should form a proxy pair. Marked probe packets are used by proxies to discover each other and probing is done such a connection can be eventually formed even if some probe packets fail due to the marking Asymmetric routing can be detected and proxies configured for connection forwarding as necessary.
Abstract:
Network devices include proxies and where multiple proxies are present on a network, they can probe to determine the existence of other proxies. Where more than two proxies are present and thus different proxy pairings are possible, the proxies are programmed to determine which proxies should form a proxy pair. Marked probe packets are used by proxies to discover each other and probing is done such a connection can be eventually formed even if some probe packets fail due to the marking. Asymmetric routing can be detected and proxies configured for connection forwarding as necessary.
Abstract:
Presently disclosed is a method and apparatus for monitoring and diagnosing a content delivery network (CDN) by examining received content elements that have been marked with one or more identifiers. Diagnosing is accomplished by using all or part of one or more of the identifiers associated with errored or corrupted content elements to determine which network elements or connection paths are faulty. The identifiers may contain content-, server-, or receiver-specific data that denotes, respectively, the source of the content, the links associated with one or more of the servers utilized in the network, and/or data associated with the receiving computer system. Both marking and diagnosing may be performed at any location within the CDN or at any host computer connected to the CDN or receiver. The marking may also be dynamically reconfigured in order to facilitate diagnosis.
Abstract:
A control signal is provided to a video data acquisition system that generates video data. In response to receiving the control signal, the video data acquisition system modifies at least a portion of the video data to produce an output signal. Authenticity of the output signal from the video data acquisition system is verified by checking that the video data includes modifications according to the control signal. If the video data does not include such modifications, it is known that the video data acquisition system needs to be checked for tampering or system failures.
Abstract:
The invention relates to an apparatus and method for identifying teleconference participants. More particularly, the invention relates to a conference system that includes an initialization means for initializing a call between participants located in at least two remote stations and an identification means for identifying one of the participants in one remote station responsive to a request from another of the participants in another remote station. The initialization means comprises table means for creating a table associating each of the participants to a position in a particular remote station and including a recorded voice segment of each of the participants. The identification means uses the table to identify the participant last to speak by looking up the position of the last speaker on the table and playing back the recorded voice segment of the participant associated with that position.
Abstract:
A system transmits a plurality of media programs in a network. In one embodiment of the invention, a media program distribution system determines a first resource attribute of a first media program and a second resource attribute of a second media program. The distribution system compares the first resource attribute with the second resource attribute to determine a relative value. In turn, the media server assigns a first distribution resource to the first media program and a second distribution resource to the second media program in response to the relative value and applies one of a plurality of transmission modes to each media program in response to the resource attribute and distribution resource type. Examples of distribution resources include unicast, multicast and broadcast channels. Examples of transmission modes include various protocols such as error checking protocols and encoding mechanisms such as codecs.
Abstract:
A system controller selects a transmission mode for content distribution based upon the relative popularity of the content within the content distribution system. The system controller receives a content distribution request from a content source and detects a content distribution characteristic for content to be distributed by the content source, in response to receiving the content distribution request. When the content distribution characteristic indicates the content as being relatively popular, or frequently requested by receivers in the content distribution system, the system controller selects a one-to-many transmission mode for the content. When the content distribution characteristic indicates the content as being relatively unpopular, or infrequently requested by receivers in the content distribution system), the system controller selects a one-to-one transmission mode for the content. By selecting a transmission mode based upon the relative popularity of the content, the system controller maximizes network resources, thereby causing the network to operate economically.