WO2015038044A1 - Mandataire transparent dans un réseau de communication - Google Patents
Mandataire transparent dans un réseau de communication Download PDFInfo
- Publication number
- WO2015038044A1 WO2015038044A1 PCT/SE2013/051073 SE2013051073W WO2015038044A1 WO 2015038044 A1 WO2015038044 A1 WO 2015038044A1 SE 2013051073 W SE2013051073 W SE 2013051073W WO 2015038044 A1 WO2015038044 A1 WO 2015038044A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- proxy
- client
- server
- overloaded
- resource
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1001—Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
- H04L67/1004—Server selection for load balancing
- H04L67/1008—Server selection for load balancing based on parameters of servers, e.g. available memory or workload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0805—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
- H04L43/0817—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/563—Data redirection of data network streams
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/568—Storing data temporarily at an intermediate stage, e.g. caching
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/16—Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
Definitions
- the invention relates to a transparent proxy for a communications network, a method of a transparent proxy in a communications network, and
- a current approach for overload protection of a provider of a resource typically includes detecting that an overload situation exists and answering new requests to the provider of the resource with an appropriate Hypertext Transfer Protocol (HTTP) response status code. For instance, if a user requests access to a web page of a newspaper, and a server on which the webpage is located currently is overloaded, the server will reply with status code 503: "Service Unavailable, please try again later". This is helpful for the user for informational purposes, and may also have the auspicious effect that the user will not continue (at least not immediately) sending requests for the web page and thus will not further increase the load of the server with additional requests. The server will hence eventually recover from the overload condition.
- HTTP Hypertext Transfer Protocol
- a transparent proxy server such as, e.g., an HTTP cache
- HTTP cache is commonly arranged in a communication path between a client/user and an HTTP server with which the client wishes to communicate.
- the purpose of the cache is to enhance user experience through the faster and better responses it can provide.
- the cache is transparent to the user who is unaware of the fact that he/she is
- the HTTP proxy communicating with an intermediary node, the HTTP proxy, and not the server actually providing the resource.
- the HTTP cache in any way breaks the client's access to the server's response, such as for instance sending the 503 status code to the user due to HTTP cache overload, it negatively affects user experience, which is undesirable.
- the transparent proxy ends up overloaded and starts to return 503 responses, or worse starts to reject new connections altogether, the user's quality of experience (QoE) will be severely impacted as he/she not only is deprived of the enhanced QoE that the transparent proxy was expected to deliver, but ultimately is not serviced at all.
- QoE quality of experience
- An object of the present invention is to solve, or at least mitigate, this problem in the art and to provide an improved way of providing a resource in a communications network.
- This object is attained in a first aspect of the present invention by a method of a transparent proxy in a communications network.
- the method comprises receiving from a client a request for a resource provided by a server, and determining whether the proxy is overloaded. If so, the request is forwarded to a server; if not, the requested resource is provided to the client.
- the object is attained in a second aspect of the present invention by a transparent proxy.
- the proxy comprises a processor and a memory
- the proxy is thereby operative to receive from a client a request for a resource provided by a server, and determine whether the proxy is overloaded. If so, the proxy is operative to forward the request to the server. If not, the proxy is operative to provide the requested resource to the client.
- an intermediary network node receives from a client a request for a resource provided by a server, for instance a request to retrieve a particular web page.
- the proxy determines that an overload situation is present, the proxy will forward the request for the resource to the server, which will provide the requested resource to the client. If it is determined that no overload situation is present at the proxy, the proxy will provide the requested resource on behalf of the server.
- the proxy either fetches the web page from its cache, or turns to the server for the web page, and provides the requested web page to the client.
- the proxy will either fetch the resource from its cache or turn to the server for the requested resource and
- the proxy will advantageously act as a router, and forward the request to the server, which in its turn will provide the requested resource to the client via the routing proxy.
- the proxy will advantageously be completely transparent to the client in that no error messages are sent from the proxy to the client and delivery of a requested resource is not discontinued at the proxy in an overload situation.
- the proxy determines whether an overload situation is present by evaluating any one, or a combination, of at least one of a number of measures reflecting a load of the proxy, such as a number received requests for a resource at the proxy, a number of pending requests for a resource at the proxy, a current processing load of the proxy, a frequency of received requests for a resource at the proxy, and an average response time of the proxy. For instance, the proxy may determine whether an overloaded situation is present by means of comparing the number of received requests with a predetermined threshold request value. If the number of incoming requests to the proxy exceeds the predetermined threshold value, the proxy determines that an overload situation has occurred (or will occur, should another specified number of requests be received).
- a number of measures reflecting a load of the proxy such as a number received requests for a resource at the proxy, a number of pending requests for a resource at the proxy, a current processing load of the proxy, a frequency of received requests for a resource at the proxy, and an average response time of the proxy.
- the proxy determines that an immediate overload situation has arisen, or that an overload situation is soon to occur, should the requests continue to arrive. It maybe advantageous to provide some overload margin at the proxy such that requests can be forwarded to the server to which the request relates. This avoids a situation where the proxy is so overloaded that it cannot forward the requests to the server. Further embodiments of the present invention will be illustrated and discussed in the detailed description herein below.
- Figure l illustrates a communications network in which the present invention may be implemented
- Figure 2a illustrates a transparent proxy according to an embodiment of the present invention
- Figure 2b illustrates a flowchart of a method of a transparent proxy according to an embodiment of the present invention
- Figure 3 illustrates a proxy according to an embodiment of the present invention
- FIG. 4a illustrates an embodiment of the present invention
- Figure 4b illustrates a further embodiment of the present invention.
- Figure 4c illustrates yet a further embodiment of the present invention.
- FIG l illustrates a communications network in which the present invention may be implemented.
- the communications network comprises a client io, a server n providing resources, and a transparent proxy 12.
- the client 10 is a network node typically embodied in the form of user equipment (UE) such as a mobile phone, a personal digital assistant (PDA), a smart phone, a tablet, a laptop, a media player, etc.
- UE user equipment
- PDA personal digital assistant
- smart phone a tablet, a laptop, a media player, etc.
- a user at the client 10 browses a web site of a newspaper and requests a particular web page provided by the server 11.
- the client 10 is directed to the proxy 12 which provides the requested resource in the form of the particular web page is provided.
- the proxy 12 may provide the resource either by fetching the web page from a local cache or by turning to the server 11 for the requested resource, receiving the resource, and providing the resource to the client 10.
- the purpose of the proxy is to enhance user experience through the faster and better responses it can provide.
- the proxy is transparent to the user in that the user does not know (or cares) that he/ she is communicating with the proxy 12 rather than with the server 11.
- An example of a proxy is a caching proxy which speeds up service requests of clients by retrieving requested resources from a local cache, i.e., resources which were saved from a previous request made by the same client or even other clients.
- caching proxies advantageously store copies of frequently requested resources, allowing reduction of client bandwidth usage (typically a great number of clients are routed via the caching proxy, such as, e.g., all users in a larger enterprise), while increasing performance.
- FIGS. 2a and 2b respectively illustrate a transparent proxy 12 according to an embodiment of the present invention, and a flowchart of a method of a transparent proxy in a communications network according to an embodiment of the present invention.
- the method at the proxy 12 is performed by a processor 15 embodied in the form of one or more microprocessors arranged to execute a computer program 17 downloaded to a suitable storage medium 16 associated with the microprocessor, such as a Random Access Memory (RAM), a Flash memory or a hard disk drive.
- the processor 15 is arranged to at least partly carry out the method according to embodiments of the present invention when the appropriate computer program 17 comprising computer- executable instructions is downloaded to the storage medium 16 and executed by the processor 15.
- the storage medium 16 may also be a computer program product comprising the computer program 17.
- the computer program 17 may be transferred to the storage medium 16 by means of a suitable computer program product, such as a floppy disk or a memory stick.
- the computer program 17 may be downloaded to the storage medium 16 over a network.
- the processor 15 may alternatively be embodied in the form of an application specific integrated circuit (ASIC), a field-programmable gate array (FPGA), a complex programmable logic device (CPLD), a digital signal processor (DSP), etc.
- ASIC application specific integrated circuit
- FPGA field-programmable gate array
- CPLD complex programmable logic device
- DSP digital signal processor
- the proxy 12 will advantageously be completely transparent to the client 10 in that no error messages are sent from the proxy to the client and delivery of a requested resource is not discontinued at the proxy 12. If the proxy 12 is overloaded, it will forward the requests to the server 11 which will service the client 10 as requested. Once the overload situation is resolved, the proxy 12 can again provide the requested resources to the client 10. This will be described in the following in more detail.
- the currently pending request for a resource from the client 10 in step S101 is serviced by the proxy 12 in step S104, regardless of whether the proxy 12 in step 102 determines whether an overload situation is present, while any further requests received at the proxy 12 are forwarded S103 to the server 11 such that the server 11 can provide said further requested resources to the client 10. Once the overload situation is resolved, the proxy 12 can again provide requested resources to the client 10.
- FIG. 3 shows a transparent proxy 12 according to an embodiment of the present invention.
- the proxy 12 comprises receiving means 21 adapted to receive, from a client, a request for a resource provided by a server, and determining means 22 adapted to determine whether the proxy 12 is overloaded.
- the receiving means 21 may comprise a communications interface for receiving and transmitting messages to the client, and/or for receiving and transmitting messages to other devices, such as the server 11.
- the proxy 12 comprises forwarding means 23 adapted to forward the request to the server 11 in case the proxy 12 is overloaded.
- the forwarding means 23 may comprise a communications interface for receiving and transmitting messages to the server 11, and/or for receiving and transmitting messages to other devices, such as the server 11.
- the proxy 12 comprises providing means 24 adapted to provide the requested resource to the client 10.
- the providing means 24 may comprise a communications interface, or share communications interface with the receiving means 21.
- the providing means 24 may further comprise a local storage for caching data.
- the receiving means 21, determining means 22, forwarding means 23 and providing means 24, may (in analogy with the description given in connection to Figures 2a and b) be implemented by a processor embodied in the form of one or more microprocessors arranged to execute a computer program downloaded to a suitable storage medium associated with the microprocessor, such as a RAM, a Flash memory or a hard disk drive.
- the receiving means 21, forwarding means 23 and providing means 24 may comprise one or more transmitters and/ or receivers and/ or transceivers, comprising analogue and digital components and a suitable antenna for radio communication
- the processor 15 of the proxy 12 is arranged to carry out the method according to embodiments of the present invention when the appropriate computer program comprising computer-executable instructions is
- the storage medium may also be a computer program product comprising the computer program.
- the computer program may be transferred to the storage medium by means of a suitable computer program product, such as a floppy disk or a memory stick.
- the computer program may be downloaded to the storage medium over a network, e.g., the communications network in which the proxy 12 is deployed.
- the processor may alternatively be embodied in the form of an ASIC, an FPGA, a CPLD, a DSP, etc.
- the processor 15 executing an appropriate computer program 17 is configured to receive a request for a resource and either 1) forward received data packets to their intended remote destination, i.e., the server 11, i.e., act as a router, or 2) intercept these packets, establish a Transmission Control Protocol (TCP) connection, and place the received data packets in an accept queue which a proxy application subsequently fetches requests from.
- TCP Transmission Control Protocol
- the proxy 12 is configured to be set in one of two modes depending on whether an overload situation is present at the proxy or not.
- the processor 15 is configured to operate in a first mode, referred to as non-overload mode, if there is no overload.
- the processor 15 enters a second mode, also referred to as overload mode, and forwards received packets in a manner similar to a router, as discussed hereinbefore.
- overload mode also referred to as overload mode
- FIG 4a illustrates an embodiment of the present invention, when the proxy 12 is in overload mode.
- a TCP connection is established by the client 10 sending a SYN ("SYNchronize") packet to the proxy in step 300. Since it is determined that the proxy is overloaded, the proxy will act as a router. Thus, the proxy will send each data packet onwards (by looking at its destination header), illustrated by the SYN packet being forwarded to the server from the proxy.
- SYNchronize SYN
- the server In response to receiving the SYN packet, the server sends in step 301 a SYN ACK ("SYNchronize ACKnowledgement") packet to the client via the proxy, again acting as a router, wherein the client in step 302 sends an ACK (“ACKnowledgement”) packet to the server via the proxy.
- SYN ACK SYNchronize ACKnowledgement
- payload data in an appropriate form defining the request for the resource is sent by the client in step 303 and received by the overloaded proxy 12, which in overload mode forwards the request to the server 11.
- the request of the client may be to access a particular web page.
- the server 11 responds by providing the requested resource to the client 10 in step 304 via the proxy 12 acting as a router.
- the client sends a FIN ("FINal") packet to the server in step 305 via the proxy
- the server replies with sending a FIN ACK ("FINal ACKnowledgement") packet to the client via the proxy in step 306, wherein the client in step 307 responds with an ACK (“ACKnowledgement”) packet terminating the TCP connection.
- FIN FIN
- ACKnowledgement ACKnowledgement
- a TCP connection is established by the client 10 sending a SYN packet to the proxy in step 400. Since it is determined that the proxy not is overloaded, the proxy no longer acts as a router and will reply to the SYN packet with a SYN ACK packet in step 401, wherein the client in step 402 sends an ACK packet to the server via the proxy.
- the TCP connection between the client and the proxy is thus established.
- the proxy 12 will no longer act as a router, but further provide a requested resource to the client 10 via the connection established in steps 400-402. Consequently, in step 403, the proxy will interpret the payload data of the request to determine if it immediately can service the client.
- the particular web page requested by the client is not in the cache of the proxy, implying that the proxy must turn to the server 11 for the requested resource and thus establish a TCP connection between itself and the server.
- the proxy sends a SYN packet to the server in step 404, the server replies with a SYN ACK packet in step 405, and the proxy sends in step 406 an ACK packet to the server, wherein the TCP connection between the proxy and the server is established, and the proxy acquires the resource from the server in step 407.
- the server 11 will reply to the proxy in step 408 by providing the requested resource (i.e., the previously mentioned web page) to the proxy, which in its turn will provide the web page to the client in step 409.
- the requested resource i.e., the previously mentioned web page
- the TCP connections can be terminated.
- the client will hence send a FIN packet to the proxy in step 410 via the proxy, the proxy replies with sending a FIN ACK packet to the client in step 411, wherein the client in step 412 responds with an ACK packet terminating the TCP connection between the client and the proxy.
- the client will terminate the TCP connection to the server by sending a FIN packet to the server in step 413, the server replies with a FIN ACK packet in step 414, wherein the proxy in step 415 responds with an ACK packet terminating the TCP connection between the proxy and the server.
- TCP connection setup steps 404-406 is omitted since a TCP connection between the proxy and the server already is established.
- FIG 4c illustrates an embodiment of the present invention, when the proxy is in non-overload mode, but the requested resource has been cached at the proxy. This may, for instance, be the case if a further client would request the same particular web page.
- a TCP connection is established by the client 10 sending a SYN packet to the proxy 12 in step 500. Since it is determined that the proxy is not overloaded, the proxy no longer acts as a router and will reply to the SYN packet with a SYN ACK packet in step 501, wherein the client in step 502 sends an ACK packet to the server via the proxy. The TCP connection between the client and the proxy is thus established.
- the proxy interprets the payload data of the request to determine which action to take.
- the particular web page requested by the client 10 is located in the cache of the proxy 12, implying that the proxy need not turn to the server 11 for the requested resource.
- no TCP connection is established between the proxy and the server.
- the proxy 12 will subsequently reply to the client request by providing the requested web page in step 504. After the requested resource has been provided to the client by the proxy, the TCP connections can be terminated.
- the client will hence send a FIN packet to the proxy in step 505 via the proxy, the proxy replies with sending a FIN ACK packet to the client in step 506, wherein the client in step 507 responds with an ACK packet terminating the TCP connection between the client and the proxy.
- the receiving of the current SYN packet may be the event which triggers the proxy to immediately enter the overload mode, forwarding the currently pending request to the server 11 by the proxy acting as a router as illustrated in Figure 4a.
- the SYN packet is received and the process continues as in either Figure 4b and 4c, wherein the proxy provides the requested resource to the client 10 and subsequently enters the overload mode, in which scenario subsequently received requests will be forwarded to the server by the proxy acting as a router as illustrated in Figure 4a.
- a corresponding reasoning can be made for a scenario when the proxy 12 is in overload mode and receives a SYN packet.
- the processor 15 at the proxy 12 determines whether it is, or is to be, overloaded by means of comparing the number of received requests for a resource with a predetermined threshold request value. If the number of incoming requests to the proxy 12 exceeds the predetermined threshold value, the processor 15 determines that an overload situation has occurred, or is likely to occur. To avoid rapid switching between the overload mode and the non-overload mode, hysteresis may be used. That is, a first threshold value may be used to determine whether proxy is overloaded, while a second, lower threshold value may be used to determine whether the proxy should exit the overload mode and thus enter the non-overload mode.
- the processor 15 determines its current processing load, and if the load exceeds a processing load threshold value, say 90 %, it will forward the requests from the proxy 12 to the remote server 11 such that the client 10 can be serviced as requested by the server 11. It can be envisaged that a combination of number of received requests and processor load is considered when determining overload. It should further be noted that the degree of overload corresponding to a determined overload situation at the proxy 12 may vary depending on the particular
- processing load of the processor 15 is used as a measure of overload, one implementation may determine that an overload situation is present at a processing load of e.g. 70 %, while another implementation may determine that an overload situation is present at a processing load of for instance 90 %, If it is determined by the processor 15 that the proxy 12 is capable of providing the requested resource, a local application is performed at the proxy 12 for executing the requested resource, as previously discussed, such as providing to the client 10 a requested web page which previously has been fetched at the destination server 11 and stored as a local copy at the proxy 12 such that the request for a resource can be accelerated.
- a local application is performed at the proxy 12 for executing the requested resource, as previously discussed, such as providing to the client 10 a requested web page which previously has been fetched at the destination server 11 and stored as a local copy at the proxy 12 such that the request for a resource can be accelerated.
- the processor 15 determines that an overload situation no longer is present at the proxy 12, it stops forwarding of requests to the server 11 in step S103 and resumes the servicing of the client 10 as illustrated by step S104.
- the processor in response to determining that the proxy 12 is overloaded, sets an overload status indicator indicating that the proxy is overloaded.
- the processor sets the overload status indicator indicating that the proxy is not overloaded, in order for the proxy 12 to advantageously keep track of the current mode.
Abstract
La présente invention concerne un procédé d'un mandataire transparent (12) dans un réseau de communication. Le procédé consiste à recevoir une requête d'une ressource à partir d'un client (10), et à déterminer si le mandataire est ou non surchargé. Si tel est le cas, la requête est transférée à un serveur (11); si tel n'est pas le cas, la ressource demandée est fournie. La présente invention concerne en outre un mandataire (12) destiné à réaliser le procédé.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/SE2013/051073 WO2015038044A1 (fr) | 2013-09-16 | 2013-09-16 | Mandataire transparent dans un réseau de communication |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/SE2013/051073 WO2015038044A1 (fr) | 2013-09-16 | 2013-09-16 | Mandataire transparent dans un réseau de communication |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2015038044A1 true WO2015038044A1 (fr) | 2015-03-19 |
Family
ID=49354877
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/SE2013/051073 WO2015038044A1 (fr) | 2013-09-16 | 2013-09-16 | Mandataire transparent dans un réseau de communication |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2015038044A1 (fr) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020005566A1 (fr) * | 2018-06-27 | 2020-01-02 | T-Mobile Usa, Inc. | Système de basculement de nœud de réseau à des microniveaux |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020071422A1 (en) * | 1998-09-28 | 2002-06-13 | Anthony D. Amicangioli | Tagging for demultiplexing in a network traffic server |
-
2013
- 2013-09-16 WO PCT/SE2013/051073 patent/WO2015038044A1/fr active Application Filing
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020071422A1 (en) * | 1998-09-28 | 2002-06-13 | Anthony D. Amicangioli | Tagging for demultiplexing in a network traffic server |
Non-Patent Citations (4)
Title |
---|
GREG BARISH ET AL: "World Wide Web Caching: Trends and Techniques", IEEE COMMUNICATIONS MAGAZINE, IEEE SERVICE CENTER, PISCATAWAY, US, vol. 38, no. 5, 1 May 2000 (2000-05-01), pages 178 - 185, XP011091295, ISSN: 0163-6804, DOI: 10.1109/35.841844 * |
LADIWALA S ET AL: "Transparent TCP acceleration", COMPUTER COMMUNICATIONS, ELSEVIER SCIENCE PUBLISHERS BV, AMSTERDAM, NL, vol. 32, no. 4, 4 March 2009 (2009-03-04), pages 691 - 702, XP025937583, ISSN: 0140-3664, [retrieved on 20081207], DOI: 10.1016/J.COMCOM.2008.11.036 * |
QIE X ET AL: "Scheduling computations on a software-based router", ACM SIGMETRICS PERFORMANCE EVALUATION REVIEW, ASSOCIATION FOR COMPUTING MACHINERY, NEW YORK, NY, US, vol. 29, no. 1, 16 June 2001 (2001-06-16), pages 13 - 24, XP002299759, ISSN: 0163-5999, DOI: 10.1145/384268.378425 * |
YANG WANG ET AL: "A load balancing model for web cache proxy based on ant colony behavior", MACHINE LEARNING AND CYBERNETICS, 2008 INTERNATIONAL CONFERENCE ON, IEEE, PISCATAWAY, NJ, USA, 12 July 2008 (2008-07-12), pages 2192 - 2197, XP031318418, ISBN: 978-1-4244-2095-7 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020005566A1 (fr) * | 2018-06-27 | 2020-01-02 | T-Mobile Usa, Inc. | Système de basculement de nœud de réseau à des microniveaux |
US10972588B2 (en) | 2018-06-27 | 2021-04-06 | T-Mobile Usa, Inc. | Micro-level network node failover system |
US11588927B2 (en) | 2018-06-27 | 2023-02-21 | T-Mobile Usa, Inc. | Micro-level network node failover system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9641650B2 (en) | TCP proxy server | |
US9094464B1 (en) | Connection digest for accelerating web traffic | |
US20180095818A1 (en) | Dynamic and adaptive approach for failure detection of node in a cluster | |
US9979653B2 (en) | System and method of providing improved throughput control under delay-based congestion situation in a network | |
US8189532B2 (en) | Mobile node, a method or handover and a computer program | |
US8995258B2 (en) | Radio communication apparatus and radio communication method for determining relay processing based upon policy information | |
EP3075110B1 (fr) | Contrôle de dimension de fenêtre de protocole de contrôle de transmission | |
CN106612284B (zh) | 一种流数据的传输方法和装置 | |
EP3232638B1 (fr) | Procédé, appareil et système de transmission de données | |
US20130311614A1 (en) | Method for retrieving content and wireless communication device for performing same | |
US10630530B2 (en) | Cache method, cache edge server, cache core server, and cache system | |
US11290487B2 (en) | Method and apparatus for reducing latency of network protocols | |
US20200296629A1 (en) | Back-pressure control in a telecommunications network | |
WO2017114231A1 (fr) | Procédé d'envoi de paquet, mandataire tcp et client tcp | |
EP3544332B1 (fr) | Techniques de programmation de trafic de données à trajets multiples | |
CN106471847B (zh) | 用于在无线电接入网络之间传送数据通信会话的方法和设备 | |
US20130250849A1 (en) | Method and Apparatus for Efficient Content Delivery in Radio Access Networks | |
US20170346738A1 (en) | Preventing TCP from becoming too conservative too quickly | |
US10405233B2 (en) | Enhanced overload protection in a telecommunications network | |
US10645003B2 (en) | Data packet transmission method, network side device, and user equipment | |
WO2015038044A1 (fr) | Mandataire transparent dans un réseau de communication | |
KR20170109979A (ko) | 다중 경로 통신 방법 및 이를 수행하는 단말 | |
US10015288B2 (en) | Communication apparatus and control method of communication apparatus | |
EP3314970B1 (fr) | Procédé et appareil pour gérer le trafic en liaison montante depuis un dispositif client dans un réseau de communication | |
US11956328B1 (en) | Avoiding stuck subscriber sessions on a disaggregated broadband network gateway |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 13776591 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 13776591 Country of ref document: EP Kind code of ref document: A1 |