摘要:
A method, system and computer program product for transmitting content across a link in a communications network. In an embodiment, the method comprises examining traffic in the network at a sender end of the link to determine if the traffic is carrying compressed content; when the traffic is carrying compressed content, decompressing at least one portion of the compressed content; and checking a cache to determine if the cache has content matching the at least one decompressed portion of the content. In an embodiment, the method further comprises when the cache has content matching the at least one decompressed portion of the content, determining an identifier associated with the at least one decompressed portion of the content; and using the identifier to reconstruct, at a receiving end of the link, the at least one decompressed portion of the content. In one embodiment, the at least one decompressed portion of the content from the traffic is replaced with an index, the index is compressed to form the associated identifier, and the associated identifier is sent to the receiving end of the link.
摘要:
Methods for performing retransmission of data packets over a network. A node receives a data packet with a source and a destination address. The data packet is sent along a network path to the destination address, and information associated with the data packet is sent to a controller node that is independent of the network path. A controller receives information associated with a data packet from any forwarder node within a plurality of forwarder nodes each monitoring communications along separate communications paths. An indication of a receipt acknowledgement for the data packet is received from a second forwarder node that is separate from the first forwarder node and the controller node. The receipt acknowledgement is correlated with the data packet and based on the correlating, data associated with retransmission processing of the data packet is deleted.
摘要:
A method includes positioning a proxy between a client and a server; the proxy receiving the client's Transmission Control Protocol (TCP) communications intended for establishing a communication connection to the server; the proxy initiating a TCP communication with the server after receiving the client's TCP; and the proxy determining a TCP congestion control algorithm based upon identifying information of the received client's TCP and on properties of the sever to provide optimum communications as a communication proxy between the client and the server.
摘要:
A system and method for instantiation of a virtual machine (VM) in a datacenter includes providing a network appliance in a location for listening to management information traffic. Indices are created for data center images in the network appliance. VM instantiation requests are intercepted in the network appliance. Locations from which blocks for the VM should be fetched based upon network cost are determined. VM image blocks are populated from the locations.
摘要:
The present disclosure relates generally to the field of migration (e.g., seamless migration) of a network connection under mobility (e.g., host mobility). In various examples, migration (e.g., seamless migration) of a network connection under mobility (e.g., host mobility) may be implemented in the form of systems and/or algorithms.
摘要:
A method for aliasing of named data objects (in named data networks) and entities for named data networks (e.g., named graphs for named data networks). In various examples, aliasing of named data objects may be implemented in one or more named data networks in the form of systems, methods and/or algorithms. In other examples, named graphs may be implemented in one or more named data networks in the form of systems, methods and/or algorithms.
摘要:
Methods and apparatus are provided for recovering from packet loss in an end-to-end network connection having at least one wireless segment. A packet on a wireless segment of an end-to-end network connection is processed by determining whether the packet comprises one or more of a lost packet and a malformed packet; and generating a modified packet for an application associated with the packet to replace one or more of the lost packet and the malformed packet if the application is substantially tolerant to one or more of lost and malformed data. The modified packet comprises, for example, a non-original packet and/or a corrected packet. Link layer information or information from a deep packet inspection can be used to determine whether the packet comprises a lost packet or a malformed packet.
摘要:
A technique for transmitting an object to a mobile device is provided. In response to the mobile device moving from a first area serviced by a first cache to a second area serviced by a second cache, the first cache transmits the object stored in the first cache to the second cache. The first cache transmits instructions to the second cache that cause the second cache to forward the object to the mobile device in the second area.
摘要:
A method and system are provided for controlling a volume of incoming traffic into a network having a plurality of ingress routers. The method includes monitoring respective loads of the plurality of ingress routers. The method further includes selecting a particular one of the plurality of ingress routers to receive future incoming traffic based on at least the respective loads of the plurality of ingress routers. The method also includes creating a mapping between an internal source IP address and a client IP address. The internal source IP address relates to the particular one of the plurality of routers. The client IP address is for a client device accessing the Internet through the network. The method additionally includes rewriting a destination IP address of the incoming traffic based on the mapping. At least the monitoring, selecting, and creating steps are performed by a controller.
摘要:
The present disclosure relates generally to the field of proactive data object replication in named data networks. In various examples, proactive data object replication may be implemented in one or more named data networks in the form of systems, methods and/or algorithms.