Abstract:
A fast policy classification method and system. A policy differentiator can be provided which can include a policy repository configured to store hierarchical policy classification trees. The policy differentiator further can include a hashing module configured to produce integer values for string based selector attributes. In one aspect of the invention, the hashing module can include a longest string hashing function. A policy matching engine can be provided which is configured to locate policy rules in the hierarchical policy classification trees according to the integer values produced for the string based selector attributes. Finally, a policy matching engine interface can be provided through which policy queries and resulting policy decisions of the policy matching engine can be communicated between the policy matching engine and the policy enforcement entity.
Abstract:
Methods, systems and computer program products provide for distributing workload between data processing systems executing an application which communicates over a network, by receiving a request for a connection to the application over the network, obtaining workload information for the data processing systems, obtaining network quality of service (QoS) information associated with communications over the network for the data processing systems and utilizing the workload information and the corresponding network quality of service information for the data processing systems so as to provide workload metrics. The requested connection to the application is distributed based on the generated workload metrics.
Abstract:
A method, apparatus, and computer implemented instructions for processing a request in a data processing system. The request is received. In response to a first hash value being present within the request, the first hash value is compared to a second hash value that was computed locally, wherein the second hash value represents a current policy configuration for assigning a quality of service. In response to a match between the first hash value and the second hash value, other information in the request is used to establish a quality of service for packets associated with the request.
Abstract:
A method, apparatus, and computer implemented instructions for processing a request in a data processing system. The request is received. In response to a first hash value being present within the request, the first hash value is compared to a second hash value that was computed locally, wherein the second hash value represents a current policy configuration for assigning a quality of service. In response to a match between the first hash value and the second hash value, other information in the request is used to establish a quality of service for packets associated with the request.
Abstract:
Techniques are disclosed that enable an application to prioritize its traffic in an application-specific manner, such that traffic which is most important to this application can be prioritized over traffic that is less important to this application, where this prioritization information is reflected in differential treatment of the traffic within the network. An application conveys relative priority information for its traffic to a Web proxy or edge server, and this device then consults stored policy information to determine how the traffic should be prioritized in the network. The Web proxy also ensures that usage of network resources is balanced among multiple applications. Cookies are used for transmitting priority information between the edge server and application in an efficient manner.
Abstract:
A method, apparatus, and computer implemented instructions for processing a request in a data processing system. The request is received. In response to a first hash value being present within the request, the first hash value is compared to a second hash value that was computed locally, wherein the second hash value represents a current policy configuration for assigning a quality of service. In response to a match between the first hash value and the second hash value, other information in the request is used to establish a quality of service for packets associated with the request.