摘要:
An approach for adaptively providing network performance enhancing functions in a secure environment, such as a virtual private network, is disclosed. Traffic, for example, Internet Protocol (IP) packets, is received for transport over an access network (e.g., satellite network). Next, characteristics (e.g., latency) of the access network are determined. A connection (which supports the performance enhancing functions) is selectively established based on the determined characteristics for transport the received packets over the access network. An encrypted tunnel is provided over the established connection to transmit the received packets.
摘要:
An approach for supporting security in a communications network is disclosed. A network device includes a security peer that establishes a secure tunnel over a data network (e.g., satellite network) for transport of encrypted traffic. The device also includes a performance peer for establishing a connection supported by the secure tunnel. The performance peer includes a plurality of modules for providing respective performance enhancing functions to minimize performance impact of latency of the network.
摘要:
An approach for adaptively providing network performance enhancing functions in a secure environment, such as a virtual private network, is disclosed. Traffic, for example, Internet Protocol (IP) packets, is received for transport over an access network (e.g., satellite network). Next, characteristics (e.g., latency) of the access network are determined. A connection (which supports the performance enhancing functions) is selectively established based on the determined characteristics for transport the received packets over the access network. An encrypted tunnel is provided over the established connection to transmit the received packets.
摘要:
An approach for providing secure communication services is disclosed. A secure (e.g., a Virtual Private Network (VPN)) tunnel from a source node over an access network, such as a satellite network, to a destination node, wherein the nodes are external to the network. A connection that supports a mechanism for enhancing performance of the network is established for a portion of the secure tunnel that traverses the network.
摘要:
A communication system having a proxy architecture is disclosed. The system includes a platform that provides performance enhancing functions. The platform includes a spoofing apparatus that routes the information within the communication system. The spoofing apparatus receives spoofing selection and spoofing parameters from the platform and maintains the current parameters in one or more spoofing profiles. The spoofing apparatus routes packets of information throughout the communication system based on the spoofing selection and/or spoofing profile. The spoofing apparatus may also compensate for maximum segment size mismatches during the routing of information. This compensation may include dynamically resizing data segments or disabling three-way handshake spoofing. The above arrangement has particular applicability to a bandwidth constrained communication system, such as a satellite network.
摘要:
A communication system for retrieving content stored in a content server (e.g., web server) is disclosed. The system includes a client that is configured to transmit a message requesting content specifying an object from a content server. The system also includes a plurality of proxy servers that include a downstream proxy server and an upstream proxy server. The downstream proxy server is configured to communicate with the client. The upstream proxy server is configured to retrieve the content from the content server and to forward information associated with the object over a data network to the downstream proxy server prior to the client transmitting another message requesting the object. The above arrangement has particular application to a wide area network, such as a satellite network.
摘要:
An approach is provided for supporting retrieval of a web page over a data network from a web site is disclosed. A downstream proxy communicating with a host executing a browser receives a request message from a browser to retrieve the web page. An upstream proxy parses the web page to determine an object embedded in the web page, wherein a promise list is generated specifying the embedded object that is to be pre-fetched according to a criterion. The promise list is transmitted to the downstream proxy, wherein the upstream proxy pre-fetches the embedded object from the web site. The upstream proxy determines whether to forward one of the pre-fetched embedded object to the downstream proxy based on a comparison of cookies associated with one of the pre-fetched objects supplied, respectively, by the browser and the web site. This approach as particular applicability in relatively high latency networks, such as a satellite communications system.
摘要:
A communication system for retrieving web content is disclosed. A downstream proxy server receives a URL request message from a web browser, in which the URL request message specifies a URL content that has an embedded object. An upstream proxy server receives the URL request message from the downstream proxy server. The upstream proxy server selectively forwards the URL request message to a web server and receives the URL content from the web server, wherein the upstream proxy server forwards the URL content to the downstream proxy server and parses the URL content to obtain the embedded object prior to receiving a corresponding embedded object request message initiated by the web browser.
摘要:
A laser array and method of making same has precision fiducial marks that aid in the alignment of the laser array. The invention requires forming additional optical features adjacent to the laser array that is used to write fiducial marks on an opposite surface in the medium containing the laser array. Fiducial marks are formed when high intensity collimated beams of light are directed through the optical features onto a treated portion of the transparent medium. Fiducial accuracies of 1 micron are possible by using this approach.
摘要:
An optical nanocomposite material has a nanoparticulate filler dispersed in a polymeric host photoresist material. According to the method of making the nanocomposite material, a predetermined temperature sensitive optical vector, such as refractive index, of the plastic host material and nanoparticulate filler are directionally opposed resulting in a nanocomposite material having significantly improved stability of the refractive index with respect to temperature.