摘要:
A method and apparatus for retrieving embedded objects of a web page across links. The method and apparatus include receiving, at a gateway, a requested top-level web page having at least one embedded uniform resource locator (URL) from at least one content server in response to a request for the web page from an end-user browser. The at least one embedded URL is modified with an IP address of a caching proxy. The caching proxy may be either co-located or separate from the gateway. The top-level web page and modified embedded URLs are sent to the end-user browser, wherein the caching proxy forwards the at least one embedded URL from the at least one content server to the end-user browser.
摘要:
A method is provided for reliable real-time data streaming in a multimedia delivery system. The system is implemented using a real-time protocol that is based on the well-known Real-time Transport Protocol (RTP) suite which provides a framework for implementing near real-time reliable data delivery over non real-time unreliable data link layer technologies (e.g., Ethernet). These protocols provide near real-time reliable or best feasible data streaming while utilizing best effort unreliable network services (e.g., Internet). Under the Reliable protocol, an entire data block, including any missing or lost data packets, is reconstructed from all of the individual data packets through the use of a selective negative acknowledgement (NACK) mechanism. In contrast, the Best Feasible protocol sacrifices some of the data packet's reliability by not retransmitting “late” packets. An additional timing parameter encapsulated in the NACK message will facilitate the determination of whether it is “feasible” to retransmit a missing data packet. A real-time identification technique has been incorporated into the format of each transmitted data packet that allows for the identification of both its sender and intended recipient(s) without having to call an underlying socket specific function.
摘要:
A logical tree structure and method for managing membership in a multicast group provides scalability and security from internal attacks. The structure defines key groups and subgroups, with each subgroup having a subgroup manager. Dual encryption allows the sender of the multicast data to manage distribution of a first set of encryption keys whereas the individual subgroup managers manage the distribution of a second set of encryption keys. The two key sets allow the sender to delegate much of the group management responsibilities without compromising security because a key from each set is required to access the multicast data. Security is further maintained via a method in which subgroup managers can be either member subgroup managers or participant subgroup managers. Access to both keys is provided to member subgroup managers whereas access to only one key is provided to participant subgroup managers. Nodes can be added without the need to generate a new encryption key at the top level which provides improved scalability.
摘要:
The invention includes a method and apparatus for regenerative signaling. Specifically, the method includes receiving at least one base protocol message formatted in accordance with at least one base protocol, obtaining service information associated with at least one network service, and generating, in response to the at least one base protocol message, at least one companion protocol message formatted in accordance with at least one companion protocol. The at least one base protocol message is associated with at least one service endpoint. The service information associated with at least one network service is obtained using the at least one base protocol message. The at least one companion protocol message is generated using at least a portion of the service information. The at least one companion protocol message is operable for controlling the at least one network service in a manner substantially transparent to the at least one service endpoint.
摘要:
The invention comprises a method and apparatus for establishing a persistent connection between a user device and a service gateway. Specifically, the method comprises obtaining state information in response to a connection request, establishing a connection between the user device and the service gateway using the state information, and maintaining the state information associated with the connection such that the connection is persistent through at least one network state change.
摘要:
A capability is provided for providing transparent cloud computing with a virtualized network infrastructure. A method for enabling use of a resource of a data center as an extension of a customer network includes receiving, at a forwarding element (FE), a packet intended for a virtual machine hosted at an edge domain of the data center, determining a VLAN ID of the VLAN for the customer network in the edge domain, updating the packet to include the VLAN ID of the VLAN for the customer network in the edge domain, and propagating the updated packet from the FE toward virtual machine. The edge domain supports a plurality of VLANs for a respective plurality of customer networks. The packet includes an identifier of the customer network and a MAC address of the virtual machine. The VLAN ID of the VLAN for the customer network in the edge domain is determined using the identifier of the customer network and the MAC address of the virtual machine. The FE may be associated with the edge domain at which the virtual machine is hosted, an edge domain of the data center that is different than the edge domain at which the virtual machine is hosted, or the customer network. Depending on the location of the FE at which the packet is received, additional processing may be provided as needed.
摘要:
Embodiments of the present invention are methods for selecting, out of a lineup of IPTV channels, a subset of channels for caching. The methods take into account viewers' tendency to walk through the channels that lie between their current channel and their desired channel if that walking distance is short, and, alternatively, viewers' tendency to jump to a distant channel. Accordingly, embodiments of the present invention include any channel selection method which selects for caching any number of channels less than the entire lineup, and where at least two of those channels form a segment of adjacent channels. Other embodiments include methods which rely upon specific extrinsic data, e.g., IGMP and EPG information, for selecting a subset of channels to be cached.
摘要:
A method and apparatus for providing at least two virtual private network VPN tunnels from a client device in a VPN network having an enterprise gateway and a network VPN gateway. The method and apparatus includes a client device having an Internet Key Exchange (IKE) module for establishing the at least two tunnels using an IKE protocol wherein a first tunnel is an end-to-end VPN tunnel to the enterprise gateway, and a second tunnel is a network-based tunnel to the network VPN gateway. An IPsec Network Driver Interface interfaces with the IKE module, which includes a security authentication database (SADB) that stores downloaded enterprise security policies respectively for each of the at least two tunnels. A routing table stores IP addresses of local presences and hosts respectively associated with the at least two tunnels, whereby packets are routed over the at least two tunnels based on the downloaded policies.
摘要:
An “always-on” network and associated systems enable customers to compare and select products and services offered by one or more providers faster than previously thought possible. In addition, communication connections may be established between customers and providers in real-time.
摘要:
The invention includes a method and apparatus for attempting to synchronize delivery of information at a plurality of receiving systems. The method includes generating, at a sending system, a plurality of current messages adapted for rendering an asset within an application space of a respective plurality of receiving systems, determining an accumulated export error for each of the receiving systems, transmitting the current messages toward the respective receiving systems in a manner adapted to reduce the accumulated export errors. The accumulated export error for a receiving system includes an estimated current message export error for a current message generated by the sending system for the receiving system and an accumulated previous message export error for at least one previous message generated by the sending system for the receiving system.