摘要:
A method for load balancing requests on a network, the method including receiving a request from a requester having a requestor network address at a first load balancer having a first load balancer network address, the request having a source address indicating the requestor network address and a destination address indicating the first load balancer network address, forwarding the request from the first load balancer to a second load balancer at a triangulation network address, the request source address indicating the requester network address and the destination address indicating the triangulation network address, the triangulation network address being associated with the first load balancer network address, and sending a response from the second load balancer to the requestor at the requester network address, the response having a source address indicating the first load balancer network address associated with the triangulation network address and a destination address indicating the first requester network address.
摘要:
The present invention relates to mobile data communications in general, and more specifically, the present invention describes a route optimization technique requiring no awareness of the Mobile IP protocol by a Correspondent Node when forwarding traffic using the shortest path between a Mobile Node and the Correspondent Node in a visiting domain. The invention describes the management of route entries, network address translations and firewall filters in order to provide a secure, yet, flexible deployment of Mobile IP route optimization. Specific considerations are described for the case of separate Foreign Agent and co-located care-of address respectively.
摘要:
The present invention is directed to a network switch that determines when specific content is hot and directs flow to one or more cache servers. The architecture of the present invention includes a decryption processor for authenticating clients and decrypting and encrypting transaction requests before the transaction requests are routed by the switch.
摘要:
A scalable system and method for locating a closest server in response to a client request via an interactive distribution network, such as the Internet, are provided. A closest content server is defined as having the least round trip time for responding to a client request. The system including a plurality of content servers; and a local server in communication with a plurality of clients, the local server acting as a proxy for communicating client requests from clients to a redirection server. Client network distance and load information is periodically collected at each content server in the network from clients communicating with each of the respective content servers. The redirection server periodically aggregates the network distance and load information from each content server to create client clusters from both current and previously aggregated network distance and load information. Each client cluster represents a division or partition of the total IP address space. Each client cluster is then mapped (paired) to one or more content servers in the network. The mapping or pairing is then utilized to respond to client DN requests received from any client in the network. Another aspect of the invention involves considering the respective capacities of the content servers in the network. A selection probability is assigned to each content server/domain index pair to prevent the repeated selection of the content server having lowest round trip time thereby overloading that server's service capacity. The selection probabilities assigned to each content server effect a load balancing to prevent overloading. Another aspect of the invention involves collecting the distance and load information without incurring any overhead cost by passively collecting TCP information as it is transmitted from clients in communication with content servers in the course of normal communications.
摘要:
The present invention teaches a variety of computer interface methods and systems for providing content to a user through an indirection. One interface system has an encoded physical medium, a sensor, a network device, a routing server, and a content server. The encoded physical medium has at least one indirection hotspot with a content ID encoded therein. The sensor decodes the content ID and then transmits the decoded content ID to a network device. In turn, the network device transmits the decoded content ID over a network to the routing server. The routing server responds to the receipt of the content ID (which is essentially a request for content) by redirecting the request to a given content address corresponding to the given content ID. Additionally, the routing server may log information regarding the content request on a service access log maintained on a computer readable medium. Another aspect of the present invention teaches a method for providing a user content over a computer network such as the Internet. The method requires the steps of receiving at a routing web server a uniform resource locator (URL) identification number (ID) transmitted over the computer network by a web device, determining at the routing web server the URL that corresponds to the URL ID, redirecting the request for content to a content web server identified by the URL, and then providing the web device with the requested content.
摘要:
In accordance with the present invention, a method is disclosed for making a cluster of processor nodes appear as a single processor node to client applications that operate in conjunction with that cluster. More particularly, the cluster is provided with a skinny stack application for selecting a processor node, to which a connection will be established, after consideration has been given to the TCP port numbers that the processor node is listening for. Further, the cluster is provided with a method for tunneling data packets between processor nodes of the cluster such that the data packets do not have to be re-transmitted across a network. Further still, the cluster is provided with a virtual subnet to which the cluster alias address is associated. The route to that subnet is advertised to the network routers by the processor nodes that are associated with the virtual subnet. Lastly, the cluster is provided with a method for substituting a processor node of the cluster in place of a processor node that has failed, for the duration of the routing failover delay. Using such a method, data packets directed to the failed processor node are prevented from being dropped during that routing failover delay.
摘要:
A distributed computing system using a data communications network may have a number of service providers for a given service or remote procedure call. A client on the network makes reference to a name service to obtain the network address of one of these service providers. The name service maintains for each client or group of clients a configuration profile of the service providers in order to resolve the issue of selecting one of the several service providers when a request is made. A single configuration profile is a priority-ordered search list that maps from a service identifier (e.g., remote procedure call interface specification) into service provider (e.g., remote procedure call server) names. A configuration profile may include names for individual service providers, and/or named groups of service providers, and/or other configuration profiles. Configuration profiles are stored in a manner that makes them accessible throughout the distributed system, e.g., in the name service. Configuration profiles may be chained together by referencing other configuration profiles to provide a hierarchy of configuration profiles.
摘要:
A server set may provide a document service to various clients in view of considerations such as availability, fault tolerance, flexibility, and performance. Presented herein are document service architectures that involve partitioning the document set into at least two document ranges, and assigning the respective document ranges to an agent that is deployed to at least one assigned server. A request to apply an operation to a selected document may be fulfilled by identifying the document range of the document; identifying a selected server of the server set that hosts the agent to which the range is assigned; and forwarding the request to the selected server. In some variations, servers may retain detailed information about neighboring servers (e.g., according to logical and/or physical proximity) and scant information about distant servers, thereby avoiding both the extensive information exchange of highly informed network architectures and the inefficiency of uninformed routing algorithms.
摘要:
A distributed storage system including a plurality of proxy server and a method for managing objects. The distributed storage system may include a plurality of data nodes, a plurality of proxy server, and a global load balancer. Each one of the plurality of data nodes may be configured to perform at least one management operation and output an operation result. Each one of the plurality of proxy servers may be configured to perform operations for controlling the plurality of data nodes to perform the at least one management operation in response to an operation request from a respective client. The global load balancer may be configured to select one proxy server from the plurality of proxy servers and allocate the selected proxy server to the respective client as the responsible proxy server. The respective client may perform the management operation through the allocated responsible proxy server.
摘要:
An improved scalable object storage system allows multiple clusters to work together. In one embodiment, a trust and federation relationship is established between a first cluster and a second cluster. This is done by designating a first cluster as a trust root. The trust root receives contact from another cluster. and the two clusters exchange cryptographic credentials. The two clusters mutually authenticate each other based upon the credentials, and optionally relative to a third information service, and establish a service connection. Services from the remote cluster are registered as being available to the cluster designated as the trust root. Multi-cluster gateways can also be designated as the trust root, and joined clusters can be mutually untrusting. Two one-way trust and federation relationships can be set up to form a trusted bidirectional channel.