WO2015038044A1 - Mandataire transparent dans un réseau de communication - Google Patents

Mandataire transparent dans un réseau de communication Download PDF

Info

Publication number
WO2015038044A1
WO2015038044A1 PCT/SE2013/051073 SE2013051073W WO2015038044A1 WO 2015038044 A1 WO2015038044 A1 WO 2015038044A1 SE 2013051073 W SE2013051073 W SE 2013051073W WO 2015038044 A1 WO2015038044 A1 WO 2015038044A1
Authority
WO
WIPO (PCT)
Prior art keywords
proxy
client
server
overloaded
resource
Prior art date
Application number
PCT/SE2013/051073
Other languages
English (en)
Inventor
Anders THOMSON
Original Assignee
Telefonaktiebolaget L M Ericsson (Publ)
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Telefonaktiebolaget L M Ericsson (Publ) filed Critical Telefonaktiebolaget L M Ericsson (Publ)
Priority to PCT/SE2013/051073 priority Critical patent/WO2015038044A1/fr
Publication of WO2015038044A1 publication Critical patent/WO2015038044A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • H04L67/1004Server selection for load balancing
    • H04L67/1008Server selection for load balancing based on parameters of servers, e.g. available memory or workload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0805Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
    • H04L43/0817Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/563Data redirection of data network streams
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/568Storing data temporarily at an intermediate stage, e.g. caching
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/16Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]

Definitions

  • the invention relates to a transparent proxy for a communications network, a method of a transparent proxy in a communications network, and
  • a current approach for overload protection of a provider of a resource typically includes detecting that an overload situation exists and answering new requests to the provider of the resource with an appropriate Hypertext Transfer Protocol (HTTP) response status code. For instance, if a user requests access to a web page of a newspaper, and a server on which the webpage is located currently is overloaded, the server will reply with status code 503: "Service Unavailable, please try again later". This is helpful for the user for informational purposes, and may also have the auspicious effect that the user will not continue (at least not immediately) sending requests for the web page and thus will not further increase the load of the server with additional requests. The server will hence eventually recover from the overload condition.
  • HTTP Hypertext Transfer Protocol
  • a transparent proxy server such as, e.g., an HTTP cache
  • HTTP cache is commonly arranged in a communication path between a client/user and an HTTP server with which the client wishes to communicate.
  • the purpose of the cache is to enhance user experience through the faster and better responses it can provide.
  • the cache is transparent to the user who is unaware of the fact that he/she is
  • the HTTP proxy communicating with an intermediary node, the HTTP proxy, and not the server actually providing the resource.
  • the HTTP cache in any way breaks the client's access to the server's response, such as for instance sending the 503 status code to the user due to HTTP cache overload, it negatively affects user experience, which is undesirable.
  • the transparent proxy ends up overloaded and starts to return 503 responses, or worse starts to reject new connections altogether, the user's quality of experience (QoE) will be severely impacted as he/she not only is deprived of the enhanced QoE that the transparent proxy was expected to deliver, but ultimately is not serviced at all.
  • QoE quality of experience
  • An object of the present invention is to solve, or at least mitigate, this problem in the art and to provide an improved way of providing a resource in a communications network.
  • This object is attained in a first aspect of the present invention by a method of a transparent proxy in a communications network.
  • the method comprises receiving from a client a request for a resource provided by a server, and determining whether the proxy is overloaded. If so, the request is forwarded to a server; if not, the requested resource is provided to the client.
  • the object is attained in a second aspect of the present invention by a transparent proxy.
  • the proxy comprises a processor and a memory
  • the proxy is thereby operative to receive from a client a request for a resource provided by a server, and determine whether the proxy is overloaded. If so, the proxy is operative to forward the request to the server. If not, the proxy is operative to provide the requested resource to the client.
  • an intermediary network node receives from a client a request for a resource provided by a server, for instance a request to retrieve a particular web page.
  • the proxy determines that an overload situation is present, the proxy will forward the request for the resource to the server, which will provide the requested resource to the client. If it is determined that no overload situation is present at the proxy, the proxy will provide the requested resource on behalf of the server.
  • the proxy either fetches the web page from its cache, or turns to the server for the web page, and provides the requested web page to the client.
  • the proxy will either fetch the resource from its cache or turn to the server for the requested resource and
  • the proxy will advantageously act as a router, and forward the request to the server, which in its turn will provide the requested resource to the client via the routing proxy.
  • the proxy will advantageously be completely transparent to the client in that no error messages are sent from the proxy to the client and delivery of a requested resource is not discontinued at the proxy in an overload situation.
  • the proxy determines whether an overload situation is present by evaluating any one, or a combination, of at least one of a number of measures reflecting a load of the proxy, such as a number received requests for a resource at the proxy, a number of pending requests for a resource at the proxy, a current processing load of the proxy, a frequency of received requests for a resource at the proxy, and an average response time of the proxy. For instance, the proxy may determine whether an overloaded situation is present by means of comparing the number of received requests with a predetermined threshold request value. If the number of incoming requests to the proxy exceeds the predetermined threshold value, the proxy determines that an overload situation has occurred (or will occur, should another specified number of requests be received).
  • a number of measures reflecting a load of the proxy such as a number received requests for a resource at the proxy, a number of pending requests for a resource at the proxy, a current processing load of the proxy, a frequency of received requests for a resource at the proxy, and an average response time of the proxy.
  • the proxy determines that an immediate overload situation has arisen, or that an overload situation is soon to occur, should the requests continue to arrive. It maybe advantageous to provide some overload margin at the proxy such that requests can be forwarded to the server to which the request relates. This avoids a situation where the proxy is so overloaded that it cannot forward the requests to the server. Further embodiments of the present invention will be illustrated and discussed in the detailed description herein below.
  • Figure l illustrates a communications network in which the present invention may be implemented
  • Figure 2a illustrates a transparent proxy according to an embodiment of the present invention
  • Figure 2b illustrates a flowchart of a method of a transparent proxy according to an embodiment of the present invention
  • Figure 3 illustrates a proxy according to an embodiment of the present invention
  • FIG. 4a illustrates an embodiment of the present invention
  • Figure 4b illustrates a further embodiment of the present invention.
  • Figure 4c illustrates yet a further embodiment of the present invention.
  • FIG l illustrates a communications network in which the present invention may be implemented.
  • the communications network comprises a client io, a server n providing resources, and a transparent proxy 12.
  • the client 10 is a network node typically embodied in the form of user equipment (UE) such as a mobile phone, a personal digital assistant (PDA), a smart phone, a tablet, a laptop, a media player, etc.
  • UE user equipment
  • PDA personal digital assistant
  • smart phone a tablet, a laptop, a media player, etc.
  • a user at the client 10 browses a web site of a newspaper and requests a particular web page provided by the server 11.
  • the client 10 is directed to the proxy 12 which provides the requested resource in the form of the particular web page is provided.
  • the proxy 12 may provide the resource either by fetching the web page from a local cache or by turning to the server 11 for the requested resource, receiving the resource, and providing the resource to the client 10.
  • the purpose of the proxy is to enhance user experience through the faster and better responses it can provide.
  • the proxy is transparent to the user in that the user does not know (or cares) that he/ she is communicating with the proxy 12 rather than with the server 11.
  • An example of a proxy is a caching proxy which speeds up service requests of clients by retrieving requested resources from a local cache, i.e., resources which were saved from a previous request made by the same client or even other clients.
  • caching proxies advantageously store copies of frequently requested resources, allowing reduction of client bandwidth usage (typically a great number of clients are routed via the caching proxy, such as, e.g., all users in a larger enterprise), while increasing performance.
  • FIGS. 2a and 2b respectively illustrate a transparent proxy 12 according to an embodiment of the present invention, and a flowchart of a method of a transparent proxy in a communications network according to an embodiment of the present invention.
  • the method at the proxy 12 is performed by a processor 15 embodied in the form of one or more microprocessors arranged to execute a computer program 17 downloaded to a suitable storage medium 16 associated with the microprocessor, such as a Random Access Memory (RAM), a Flash memory or a hard disk drive.
  • the processor 15 is arranged to at least partly carry out the method according to embodiments of the present invention when the appropriate computer program 17 comprising computer- executable instructions is downloaded to the storage medium 16 and executed by the processor 15.
  • the storage medium 16 may also be a computer program product comprising the computer program 17.
  • the computer program 17 may be transferred to the storage medium 16 by means of a suitable computer program product, such as a floppy disk or a memory stick.
  • the computer program 17 may be downloaded to the storage medium 16 over a network.
  • the processor 15 may alternatively be embodied in the form of an application specific integrated circuit (ASIC), a field-programmable gate array (FPGA), a complex programmable logic device (CPLD), a digital signal processor (DSP), etc.
  • ASIC application specific integrated circuit
  • FPGA field-programmable gate array
  • CPLD complex programmable logic device
  • DSP digital signal processor
  • the proxy 12 will advantageously be completely transparent to the client 10 in that no error messages are sent from the proxy to the client and delivery of a requested resource is not discontinued at the proxy 12. If the proxy 12 is overloaded, it will forward the requests to the server 11 which will service the client 10 as requested. Once the overload situation is resolved, the proxy 12 can again provide the requested resources to the client 10. This will be described in the following in more detail.
  • the currently pending request for a resource from the client 10 in step S101 is serviced by the proxy 12 in step S104, regardless of whether the proxy 12 in step 102 determines whether an overload situation is present, while any further requests received at the proxy 12 are forwarded S103 to the server 11 such that the server 11 can provide said further requested resources to the client 10. Once the overload situation is resolved, the proxy 12 can again provide requested resources to the client 10.
  • FIG. 3 shows a transparent proxy 12 according to an embodiment of the present invention.
  • the proxy 12 comprises receiving means 21 adapted to receive, from a client, a request for a resource provided by a server, and determining means 22 adapted to determine whether the proxy 12 is overloaded.
  • the receiving means 21 may comprise a communications interface for receiving and transmitting messages to the client, and/or for receiving and transmitting messages to other devices, such as the server 11.
  • the proxy 12 comprises forwarding means 23 adapted to forward the request to the server 11 in case the proxy 12 is overloaded.
  • the forwarding means 23 may comprise a communications interface for receiving and transmitting messages to the server 11, and/or for receiving and transmitting messages to other devices, such as the server 11.
  • the proxy 12 comprises providing means 24 adapted to provide the requested resource to the client 10.
  • the providing means 24 may comprise a communications interface, or share communications interface with the receiving means 21.
  • the providing means 24 may further comprise a local storage for caching data.
  • the receiving means 21, determining means 22, forwarding means 23 and providing means 24, may (in analogy with the description given in connection to Figures 2a and b) be implemented by a processor embodied in the form of one or more microprocessors arranged to execute a computer program downloaded to a suitable storage medium associated with the microprocessor, such as a RAM, a Flash memory or a hard disk drive.
  • the receiving means 21, forwarding means 23 and providing means 24 may comprise one or more transmitters and/ or receivers and/ or transceivers, comprising analogue and digital components and a suitable antenna for radio communication
  • the processor 15 of the proxy 12 is arranged to carry out the method according to embodiments of the present invention when the appropriate computer program comprising computer-executable instructions is
  • the storage medium may also be a computer program product comprising the computer program.
  • the computer program may be transferred to the storage medium by means of a suitable computer program product, such as a floppy disk or a memory stick.
  • the computer program may be downloaded to the storage medium over a network, e.g., the communications network in which the proxy 12 is deployed.
  • the processor may alternatively be embodied in the form of an ASIC, an FPGA, a CPLD, a DSP, etc.
  • the processor 15 executing an appropriate computer program 17 is configured to receive a request for a resource and either 1) forward received data packets to their intended remote destination, i.e., the server 11, i.e., act as a router, or 2) intercept these packets, establish a Transmission Control Protocol (TCP) connection, and place the received data packets in an accept queue which a proxy application subsequently fetches requests from.
  • TCP Transmission Control Protocol
  • the proxy 12 is configured to be set in one of two modes depending on whether an overload situation is present at the proxy or not.
  • the processor 15 is configured to operate in a first mode, referred to as non-overload mode, if there is no overload.
  • the processor 15 enters a second mode, also referred to as overload mode, and forwards received packets in a manner similar to a router, as discussed hereinbefore.
  • overload mode also referred to as overload mode
  • FIG 4a illustrates an embodiment of the present invention, when the proxy 12 is in overload mode.
  • a TCP connection is established by the client 10 sending a SYN ("SYNchronize") packet to the proxy in step 300. Since it is determined that the proxy is overloaded, the proxy will act as a router. Thus, the proxy will send each data packet onwards (by looking at its destination header), illustrated by the SYN packet being forwarded to the server from the proxy.
  • SYNchronize SYN
  • the server In response to receiving the SYN packet, the server sends in step 301 a SYN ACK ("SYNchronize ACKnowledgement") packet to the client via the proxy, again acting as a router, wherein the client in step 302 sends an ACK (“ACKnowledgement”) packet to the server via the proxy.
  • SYN ACK SYNchronize ACKnowledgement
  • payload data in an appropriate form defining the request for the resource is sent by the client in step 303 and received by the overloaded proxy 12, which in overload mode forwards the request to the server 11.
  • the request of the client may be to access a particular web page.
  • the server 11 responds by providing the requested resource to the client 10 in step 304 via the proxy 12 acting as a router.
  • the client sends a FIN ("FINal") packet to the server in step 305 via the proxy
  • the server replies with sending a FIN ACK ("FINal ACKnowledgement") packet to the client via the proxy in step 306, wherein the client in step 307 responds with an ACK (“ACKnowledgement”) packet terminating the TCP connection.
  • FIN FIN
  • ACKnowledgement ACKnowledgement
  • a TCP connection is established by the client 10 sending a SYN packet to the proxy in step 400. Since it is determined that the proxy not is overloaded, the proxy no longer acts as a router and will reply to the SYN packet with a SYN ACK packet in step 401, wherein the client in step 402 sends an ACK packet to the server via the proxy.
  • the TCP connection between the client and the proxy is thus established.
  • the proxy 12 will no longer act as a router, but further provide a requested resource to the client 10 via the connection established in steps 400-402. Consequently, in step 403, the proxy will interpret the payload data of the request to determine if it immediately can service the client.
  • the particular web page requested by the client is not in the cache of the proxy, implying that the proxy must turn to the server 11 for the requested resource and thus establish a TCP connection between itself and the server.
  • the proxy sends a SYN packet to the server in step 404, the server replies with a SYN ACK packet in step 405, and the proxy sends in step 406 an ACK packet to the server, wherein the TCP connection between the proxy and the server is established, and the proxy acquires the resource from the server in step 407.
  • the server 11 will reply to the proxy in step 408 by providing the requested resource (i.e., the previously mentioned web page) to the proxy, which in its turn will provide the web page to the client in step 409.
  • the requested resource i.e., the previously mentioned web page
  • the TCP connections can be terminated.
  • the client will hence send a FIN packet to the proxy in step 410 via the proxy, the proxy replies with sending a FIN ACK packet to the client in step 411, wherein the client in step 412 responds with an ACK packet terminating the TCP connection between the client and the proxy.
  • the client will terminate the TCP connection to the server by sending a FIN packet to the server in step 413, the server replies with a FIN ACK packet in step 414, wherein the proxy in step 415 responds with an ACK packet terminating the TCP connection between the proxy and the server.
  • TCP connection setup steps 404-406 is omitted since a TCP connection between the proxy and the server already is established.
  • FIG 4c illustrates an embodiment of the present invention, when the proxy is in non-overload mode, but the requested resource has been cached at the proxy. This may, for instance, be the case if a further client would request the same particular web page.
  • a TCP connection is established by the client 10 sending a SYN packet to the proxy 12 in step 500. Since it is determined that the proxy is not overloaded, the proxy no longer acts as a router and will reply to the SYN packet with a SYN ACK packet in step 501, wherein the client in step 502 sends an ACK packet to the server via the proxy. The TCP connection between the client and the proxy is thus established.
  • the proxy interprets the payload data of the request to determine which action to take.
  • the particular web page requested by the client 10 is located in the cache of the proxy 12, implying that the proxy need not turn to the server 11 for the requested resource.
  • no TCP connection is established between the proxy and the server.
  • the proxy 12 will subsequently reply to the client request by providing the requested web page in step 504. After the requested resource has been provided to the client by the proxy, the TCP connections can be terminated.
  • the client will hence send a FIN packet to the proxy in step 505 via the proxy, the proxy replies with sending a FIN ACK packet to the client in step 506, wherein the client in step 507 responds with an ACK packet terminating the TCP connection between the client and the proxy.
  • the receiving of the current SYN packet may be the event which triggers the proxy to immediately enter the overload mode, forwarding the currently pending request to the server 11 by the proxy acting as a router as illustrated in Figure 4a.
  • the SYN packet is received and the process continues as in either Figure 4b and 4c, wherein the proxy provides the requested resource to the client 10 and subsequently enters the overload mode, in which scenario subsequently received requests will be forwarded to the server by the proxy acting as a router as illustrated in Figure 4a.
  • a corresponding reasoning can be made for a scenario when the proxy 12 is in overload mode and receives a SYN packet.
  • the processor 15 at the proxy 12 determines whether it is, or is to be, overloaded by means of comparing the number of received requests for a resource with a predetermined threshold request value. If the number of incoming requests to the proxy 12 exceeds the predetermined threshold value, the processor 15 determines that an overload situation has occurred, or is likely to occur. To avoid rapid switching between the overload mode and the non-overload mode, hysteresis may be used. That is, a first threshold value may be used to determine whether proxy is overloaded, while a second, lower threshold value may be used to determine whether the proxy should exit the overload mode and thus enter the non-overload mode.
  • the processor 15 determines its current processing load, and if the load exceeds a processing load threshold value, say 90 %, it will forward the requests from the proxy 12 to the remote server 11 such that the client 10 can be serviced as requested by the server 11. It can be envisaged that a combination of number of received requests and processor load is considered when determining overload. It should further be noted that the degree of overload corresponding to a determined overload situation at the proxy 12 may vary depending on the particular
  • processing load of the processor 15 is used as a measure of overload, one implementation may determine that an overload situation is present at a processing load of e.g. 70 %, while another implementation may determine that an overload situation is present at a processing load of for instance 90 %, If it is determined by the processor 15 that the proxy 12 is capable of providing the requested resource, a local application is performed at the proxy 12 for executing the requested resource, as previously discussed, such as providing to the client 10 a requested web page which previously has been fetched at the destination server 11 and stored as a local copy at the proxy 12 such that the request for a resource can be accelerated.
  • a local application is performed at the proxy 12 for executing the requested resource, as previously discussed, such as providing to the client 10 a requested web page which previously has been fetched at the destination server 11 and stored as a local copy at the proxy 12 such that the request for a resource can be accelerated.
  • the processor 15 determines that an overload situation no longer is present at the proxy 12, it stops forwarding of requests to the server 11 in step S103 and resumes the servicing of the client 10 as illustrated by step S104.
  • the processor in response to determining that the proxy 12 is overloaded, sets an overload status indicator indicating that the proxy is overloaded.
  • the processor sets the overload status indicator indicating that the proxy is not overloaded, in order for the proxy 12 to advantageously keep track of the current mode.

Abstract

La présente invention concerne un procédé d'un mandataire transparent (12) dans un réseau de communication. Le procédé consiste à recevoir une requête d'une ressource à partir d'un client (10), et à déterminer si le mandataire est ou non surchargé. Si tel est le cas, la requête est transférée à un serveur (11); si tel n'est pas le cas, la ressource demandée est fournie. La présente invention concerne en outre un mandataire (12) destiné à réaliser le procédé.
PCT/SE2013/051073 2013-09-16 2013-09-16 Mandataire transparent dans un réseau de communication WO2015038044A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/SE2013/051073 WO2015038044A1 (fr) 2013-09-16 2013-09-16 Mandataire transparent dans un réseau de communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/SE2013/051073 WO2015038044A1 (fr) 2013-09-16 2013-09-16 Mandataire transparent dans un réseau de communication

Publications (1)

Publication Number Publication Date
WO2015038044A1 true WO2015038044A1 (fr) 2015-03-19

Family

ID=49354877

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/SE2013/051073 WO2015038044A1 (fr) 2013-09-16 2013-09-16 Mandataire transparent dans un réseau de communication

Country Status (1)

Country Link
WO (1) WO2015038044A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020005566A1 (fr) * 2018-06-27 2020-01-02 T-Mobile Usa, Inc. Système de basculement de nœud de réseau à des microniveaux

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020071422A1 (en) * 1998-09-28 2002-06-13 Anthony D. Amicangioli Tagging for demultiplexing in a network traffic server

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020071422A1 (en) * 1998-09-28 2002-06-13 Anthony D. Amicangioli Tagging for demultiplexing in a network traffic server

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
GREG BARISH ET AL: "World Wide Web Caching: Trends and Techniques", IEEE COMMUNICATIONS MAGAZINE, IEEE SERVICE CENTER, PISCATAWAY, US, vol. 38, no. 5, 1 May 2000 (2000-05-01), pages 178 - 185, XP011091295, ISSN: 0163-6804, DOI: 10.1109/35.841844 *
LADIWALA S ET AL: "Transparent TCP acceleration", COMPUTER COMMUNICATIONS, ELSEVIER SCIENCE PUBLISHERS BV, AMSTERDAM, NL, vol. 32, no. 4, 4 March 2009 (2009-03-04), pages 691 - 702, XP025937583, ISSN: 0140-3664, [retrieved on 20081207], DOI: 10.1016/J.COMCOM.2008.11.036 *
QIE X ET AL: "Scheduling computations on a software-based router", ACM SIGMETRICS PERFORMANCE EVALUATION REVIEW, ASSOCIATION FOR COMPUTING MACHINERY, NEW YORK, NY, US, vol. 29, no. 1, 16 June 2001 (2001-06-16), pages 13 - 24, XP002299759, ISSN: 0163-5999, DOI: 10.1145/384268.378425 *
YANG WANG ET AL: "A load balancing model for web cache proxy based on ant colony behavior", MACHINE LEARNING AND CYBERNETICS, 2008 INTERNATIONAL CONFERENCE ON, IEEE, PISCATAWAY, NJ, USA, 12 July 2008 (2008-07-12), pages 2192 - 2197, XP031318418, ISBN: 978-1-4244-2095-7 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020005566A1 (fr) * 2018-06-27 2020-01-02 T-Mobile Usa, Inc. Système de basculement de nœud de réseau à des microniveaux
US10972588B2 (en) 2018-06-27 2021-04-06 T-Mobile Usa, Inc. Micro-level network node failover system
US11588927B2 (en) 2018-06-27 2023-02-21 T-Mobile Usa, Inc. Micro-level network node failover system

Similar Documents

Publication Publication Date Title
US9641650B2 (en) TCP proxy server
US9094464B1 (en) Connection digest for accelerating web traffic
US20180095818A1 (en) Dynamic and adaptive approach for failure detection of node in a cluster
US9979653B2 (en) System and method of providing improved throughput control under delay-based congestion situation in a network
US8189532B2 (en) Mobile node, a method or handover and a computer program
US8995258B2 (en) Radio communication apparatus and radio communication method for determining relay processing based upon policy information
EP3075110B1 (fr) Contrôle de dimension de fenêtre de protocole de contrôle de transmission
CN106612284B (zh) 一种流数据的传输方法和装置
EP3232638B1 (fr) Procédé, appareil et système de transmission de données
US20130311614A1 (en) Method for retrieving content and wireless communication device for performing same
US10630530B2 (en) Cache method, cache edge server, cache core server, and cache system
US11290487B2 (en) Method and apparatus for reducing latency of network protocols
US20200296629A1 (en) Back-pressure control in a telecommunications network
WO2017114231A1 (fr) Procédé d'envoi de paquet, mandataire tcp et client tcp
EP3544332B1 (fr) Techniques de programmation de trafic de données à trajets multiples
CN106471847B (zh) 用于在无线电接入网络之间传送数据通信会话的方法和设备
US20130250849A1 (en) Method and Apparatus for Efficient Content Delivery in Radio Access Networks
US20170346738A1 (en) Preventing TCP from becoming too conservative too quickly
US10405233B2 (en) Enhanced overload protection in a telecommunications network
US10645003B2 (en) Data packet transmission method, network side device, and user equipment
WO2015038044A1 (fr) Mandataire transparent dans un réseau de communication
KR20170109979A (ko) 다중 경로 통신 방법 및 이를 수행하는 단말
US10015288B2 (en) Communication apparatus and control method of communication apparatus
EP3314970B1 (fr) Procédé et appareil pour gérer le trafic en liaison montante depuis un dispositif client dans un réseau de communication
US11956328B1 (en) Avoiding stuck subscriber sessions on a disaggregated broadband network gateway

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13776591

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 13776591

Country of ref document: EP

Kind code of ref document: A1