摘要:
Mechanisms and techniques provide a data communications device for inserting an audio tag into a content page during a communications session between a first computerized device and a second computerized device. A data communications device receives a request for a content page from a first computerized device and transfers the request to a second computerized device. The data communications device receives the content page from the second computerized device in response to the request, inserts an audio tag within the content page, and adjusts a connection characteristic associated with the content page to maintain the communications session between the first computerized device and the second computerized device. The data communications device then transfers the content page having the inserted audio tag and modified connection characteristic to the first computerized device.
摘要:
Internet services are differentiated by including user-reflexive data with a user request. The user-reflexive data may specify a quality of service to be accorded the return data and also billing information to improve detail of bills for billed Internet services. The user-reflexive data is included with the user request and data transmission is adjusted accordingly. Alternatively, the user-reflexive data is sent out-of-band.
摘要:
Internet services are differentiated by including user-reflexive data with a user request. The user-reflexive data may specify a quality of service to be accorded the return data and also billing information to improve detail of bills for billed Internet services. The user-reflexive data is included with the user request and data transmission is adjusted accordingly. Alternatively, the user-reflexive data is sent out-of-band.
摘要:
A URL re-writing system and method in a network examines and modifies HTML data and its embedded URLs. The re-writing system can be implemented in a router and can replace URLs found in the HTML data in order to accomplish more efficient routing for example to a close mirror site or for content routing. The re-writing system can also use URL replacement to insert important or emergency information to data received by users on a Web-based network.
摘要:
A system provides secure communications between a user operated device and a computerized device. The user operated device transfers an enable security message to the computerized device, and in response, the computerized device sends a first communications enablement message to the user operated device and displays a second communications enablement message on a display of the computerized device for viewing by a user operating the user operated device. The user operated device receives the first communications enablement message from the computerized device and receives the second communications enablement message from the user and establishes a secure communications session between the user operated device and the computerized device using the first communications enablement message and the second communications enablement message. The communications enablement messages can contain key material that enable encryption between the user operated device and the computerized device.
摘要:
The invention is directed to techniques for selecting a resource from several resources to process a request from a client. A client sends the request to a data communications device (e.g., network device or switch), which measures usage information from usage meters associated with each resource (e.g., server). The data communications device then makes a usage estimate for each server of the increase in usage required for that server to process the request from the client. Then the data communications device selects one of the servers depending on the usage estimates required to respond to the client's request. The data communications device can consider other factors such as the current level of usage, past usage, and the increased cost of responding to the request. In addition, the data communications device can consider the peak usage level of each resource already established in a current billing period.
摘要:
A control signal is provided to a video data acquisition system that generates video data. In response to receiving the control signal, the video data acquisition system modifies at least a portion of the video data to produce an output signal. Authenticity of the output signal from the video data acquisition system is verified by checking that the video data includes modifications according to the control signal. If the video data does not include such modifications, it is known that the video data acquisition system needs to be checked for tampering or system failures.
摘要:
A system transmits a plurality of media programs in a network. In one embodiment of the invention, a media program distribution system determines a first resource attribute of a first media program and a second resource attribute of a second media program. The distribution system compares the first resource attribute with the second resource attribute to determine a relative value. In turn, the media server assigns a first distribution resource to the first media program and a second distribution resource to the second media program in response to the relative value and applies one of a plurality of transmission modes to each media program in response to the resource attribute and distribution resource type. Examples of distribution resources include unicast, multicast and broadcast channels. Examples of transmission modes include various protocols such as error checking protocols and encoding mechanisms such as codecs.
摘要:
A distributed network-attached storage network provides content distribution using conventional file transfer protocols such as NFS and CIFS. A filer proxy accepts a client request and translates the client request to a file transfer protocol accepted at the file system having the file requested in the client request. The filer proxy generates a file handle for the file containing redundant filer proxy information to be used for failover to a backup filer proxy in the event of a network error or failure of an original filer proxy. The file handle also contains information for network security purposes such as detection of forged file handles.
摘要:
A method manages network traffic using NAT in a data communications device having a NAT data structure (e.g., a NAT table). The method includes the step of creating, in the NAT data structure, a first entry to coordinate a first data flow from a server to a client (e.g., a video channel or an audio channel of an RTSP session), and concurrently creating a second entry to coordinate a second data flow from the client to the server (e.g., a video control channel or an audio control channel of the RTSP session). The method further includes the steps of conveying a data element (e.g., a UDP packet) of the first data flow from the server to the client based on the first entry, and conveying a data element of the second data flow from the client to the server based on the second entry.