会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • RULES-BASED TRANSACTION PREFETCHING USING CONNECTION END-POINT PROXIES
    • 使用连接端点代码的基于规则的交易预购
    • WO2006099542A3
    • 2009-04-16
    • PCT/US2006009544
    • 2006-03-15
    • RIVERBED TECHNOLOGY INCWU DAVID TZE-SIKESWANI VIVASVATLARSEN CASE
    • WU DAVID TZE-SIKESWANI VIVASVATLARSEN CASE
    • G06F15/16
    • H04L67/1095H04L67/10
    • Network proxies reduce server latency in response to series of requests from client applications. Network proxies intercept messages clients and a server. Intercepted client requests are compared with rules. When client requests match a rule, additional request messages are forwarded to the server on behalf of a client application. In response to the additional request messages, the server provides corresponding response messages. A network proxy intercepts and caches the response messages. Subsequent client requests are intercepted by the network application proxy and compared with the cached messages. If a cached response message corresponds with a client request message, the response message is returned to the client application immediately instead of re-requesting the same information from the server. A server-side network proxy can compare client requests with the rules and send additional request messages. The corresponding response messages can be forwarded to a client-side network proxy for caching.
    • 响应于来自客户端应用程序的一系列请求,网络代理减少了服务器延迟。 网络代理拦截消息客户端和服务器。 拦截的客户端请求与规则进行比较。 当客户端请求匹配规则时,代表客户端应用程序将其他请求消息转发到服务器。 响应于附加请求消息,服务器提供相应的响应消息。 网络代理拦截并缓存响应消息。 随后的客户端请求被网络应用程序代理拦截,并与缓存的消息进行比较。 如果缓存的响应消息对应于客户端请求消息,则响应消息立即返回到客户端应用程序,而不是从服务器重新请求相同的信息。 服务器端网络代理可以将客户端请求与规则进行比较,并发送附加的请求消息。 相应的响应消息可以转发到客户端网络代理进行缓存。
    • 2. 发明申请
    • AUTOMATIC FRAMING SELECTION
    • 自动框架选择
    • WO2007016236A3
    • 2007-05-10
    • PCT/US2006029181
    • 2006-07-26
    • RIVERBED TECHNOLOGY INCWU DAVID TZE-SILASSEN SORENSUBBANA KARTIKGUPTA NITINKESWANI VIVASVAT
    • WU DAVID TZE-SILASSEN SORENSUBBANA KARTIKGUPTA NITINKESWANI VIVASVAT
    • H04J3/16
    • H04L47/27H04L12/28H04L43/16H04L47/26H04L69/16H04L69/163
    • Network traffic is monitored and an optimal framing heuristic is automatically determined and applied. Framing heuristics specify different rules for framing network traffic. While a framing heuristic is applied to the network traffic, alternative framing heuristics are speculatively evaluated for the network traffic. The results of these evaluations are used to rank the framing heuristics. The framing heuristic with the best rank is selected for framing subsequent network traffic. Each client/server traffic flow may have a separate framing heuristic. The framing heuristics may be deterministic based on byte count and/or time or based on traffic characteristics that indicate a plausible point for framing to occur. The choice of available framing heuristics may be determined partly by manual configuration, which specifies which framing heuristics are available, and partly by automatic processes, which determine the best framing heuristic to apply to the current network traffic from the set of available framing heuristics.
    • 监控网络流量,并自动确定和应用最佳的框架启发式。 成帧启发式规定了组网网络流量的不同规则。 虽然将框架启发式应用于网络流量,但是针对网络流量推测性地评估了替代成帧启发式算法。 这些评估的结果用于对框架启发式进行排序。 选择具有最佳排名的成帧启发式来构建后续网络流量。 每个客户端/服务器流量流可以具有单独的成帧启发式。 帧启发式可以是基于字节计数和/或时间的确定性的,或者基于指示发生框架的合理点的业务特性。 可选帧启发式可以部分地通过手动配置来确定,该手动配置指定哪些帧启发式是可用的,并且部分地由自动进程确定,自动进程决定了应用于可用成帧启发式组的当前网络业务的最佳成帧启发式。
    • 4. 发明申请
    • VIRTUALIZED DATA STORAGE SYSTEM ARCHITECTURE
    • 虚拟化数据存储系统体系结构
    • WO2010111312A3
    • 2010-12-29
    • PCT/US2010028375
    • 2010-03-23
    • RIVERBED TECHNOLOGY INCWU DAVID TZE-SIMCCANNE STEVENDEMMER MICHAEL JGUPTA NITIN
    • WU DAVID TZE-SIMCCANNE STEVENDEMMER MICHAEL JGUPTA NITIN
    • G06F13/00
    • G06F17/30233G06F3/0643G06F3/0653G06F3/067G06F12/0862G06F17/30132G06F2212/6024
    • Virtual storage arrays consolidate branch data storage at data centers connected via wide area networks. Virtual storage arrays appear to storage clients as local data storage; however, virtual storage arrays actually store data at the data center. The virtual storage arrays overcomes bandwidth and latency limitations of the wide area network by predicting and prefetching storage blocks, which are then cached at the branch location. Virtual storage arrays leverage an understanding of the semantics and structure of high-level data structures associated with storage blocks to predict which storage blocks are likely to be requested by a storage client in the near future. Virtual storage arrays determine the association between requested storage blocks and corresponding high-level data structure entities to predict additional high-level data structure entities that are likely to be accessed. From this, the virtual storage array identifies the additional storage blocks for prefetching.
    • 虚拟存储阵列整合了通过广域网连接的数据中心的分支数据存储。 虚拟存储阵列似乎将存储客户端视为本地数据存储; 但是,虚拟存储阵列实际上将数据存储在数据中心。 虚拟存储阵列通过预测和预取存储块来克服广域网的带宽和延迟限制,然后将这些存储块缓存到分支位置。 虚拟存储阵列充分了解与存储块关联的高级数据结构的语义和结构,以预测存储客户端在不久的将来可能需要哪些存储块。 虚拟存储阵列确定请求的存储块与相应的高级数据结构实体之间的关联,以预测可能被访问的其他高级数据结构实体。 由此,虚拟存储阵列识别用于预取的附加存储块。
    • 5. 发明申请
    • SERIAL CLUSTERING
    • 串行集群
    • WO2007055757B1
    • 2008-02-28
    • PCT/US2006029082
    • 2006-07-26
    • RIVERBED TECHNOLOGY INCWU DAVID TZE-SIGUPTA NITINLY KAND
    • WU DAVID TZE-SIGUPTA NITINLY KAND
    • H04J1/16
    • H04L47/12H04L47/10H04L47/125H04L69/16H04L69/162H04L69/165H04L69/32
    • Serial clustering uses two or more network devices connected in series via a local and/or wide-area network to provide additional capacity when network traffic exceeds the processing capabilities of a single network device. When a first network device reaches its capacity limit, any excess network traffic beyond that limit is passed through the first network device unchanged. A network device connected in series with the first network device intercepts and will process the excess network traffic provided that it has sufficient processing capacity. Additional network devices can process remaining network traffic in a similar manner until all of the excess network traffic has been processed or until there are no more additional network devices. Network devices may use rules to determine how to handle network traffic. Rules may be based on the attributes of received network packets, attributes of the network device, or attributes of the network.
    • 当网络流量超过单个网络设备的处理能力时,串行集群使用通过本地和/或广域网络串联连接的两个或多个网络设备来提供额外的容量。 当第一个网络设备达到其容量限制时,超出该限制的任何超量网络流量不会通过第一个网络设备。 与第一网络设备串联连接的网络设备将拦截并处理多余的网络流量,只要其具有足够的处理能力即可。 额外的网络设备可以以类似的方式处理剩余的网络流量,直到已经处理了所有超量的网络流量,或者直到没有更多的额外的网络设备。 网络设备可能会使用规则来确定如何处理网络流量。 规则可以基于接收的网络分组的属性,网络设备的属性或网络的属性。
    • 6. 发明申请
    • SERIAL CLUSTERING
    • 串行集群
    • WO2007055757A3
    • 2008-01-17
    • PCT/US2006029082
    • 2006-07-26
    • RIVERBED TECHNOLOGY INCWU DAVID TZE-SIGUPTA NITINLY KAND
    • WU DAVID TZE-SIGUPTA NITINLY KAND
    • H04J1/16
    • H04L47/12H04L47/10H04L47/125H04L69/16H04L69/162H04L69/165H04L69/32
    • SERIAL CLUSTERING ABSTRACT OF THE DISCLOSURE Serial clustering uses two or more network devices connected in series via a local and/or wide-area network to provide additional capacity when network traffic exceeds the processing capabilities of a single network device. When a first network device reaches its capacity limit, any excess network traffic beyond that limit is passed through the first network device unchanged. A network device connected in series with the first network device intercepts and will process the excess network traffic provided that it has sufficient processing capacity. Additional network devices can process remaining network traffic in a similar manner until all of the excess network traffic has been processed or until there are no more additional network devices. Network devices may use rules to determine how to handle network traffic. Rules may be based on the attributes of received network packets, attributes of the network device, or attributes of the network.
    • 串行集群摘要串行集群使用两个或多个通过本地和/或广域网串联连接的网络设备,以便在网络流量超过单个网络设备的处理能力时提供额外的容量。 当第一个网络设备达到其容量限制时,超出该限制的任何超量网络流量不变地通过第一个网络设备。 与第一网络设备串联连接的网络设备将拦截并处理多余的网络流量,前提是它具有足够的处理能力。 额外的网络设备可以以类似的方式处理剩余的网络流量,直到已经处理了所有超量的网络流量,或者直到没有更多的额外的网络设备。 网络设备可能会使用规则来确定如何处理网络流量。 规则可以基于接收的网络分组的属性,网络设备的属性或网络的属性。
    • 7. 发明申请
    • CONTENT DELIVERY BASED ON USER AFFINITY USING CONNECTION END-POINT PROXIES
    • 使用连接端点代码的用户自定义内容传送
    • WO2006112845A9
    • 2008-01-03
    • PCT/US2005013285
    • 2005-04-19
    • RIVERBED TECHNOLOGY INCWU DAVID TZE-SIMCCANNE STEVEN
    • WU DAVID TZE-SIMCCANNE STEVEN
    • G06F17/30
    • G06F17/30902
    • In a network supporting transactions between clients and servers over a network path having operating characteristics to overcome, data is transported to overcome the operating characteristics using user affinities and dynamic user location information to selectively preload data, or representations, signatures, segments, etc. of data, in order to overcome the one or more operating characteristic. Examples of operating characteristics to overcome include bandwidth limitations, errors and latency. The dynamic location information can be stored in data structures accessible by agents of a data server and the data structures are populated based on user activities with respect to proxies associated with user locations, or the dynamic location information can be obtained implicitly as proxies maintain connections after termination by clients and the use of those maintained connections for preloading of data for the users associated with those clients. The data being preloaded can be protocol-specific data or protocol-independent data.
    • 在支持通过具有要克服的操作特征的网络路径的客户端和服务器之间的事务的网络中,使用用户亲和度和动态用户位置信息传输数据以克服操作特征,以选择性地预加载数据或表示,签名,段等 数据,以克服一个或多个操作特性。 要克服的操作特性的示例包括带宽限制,错误和延迟。 动态位置信息可以存储在可由数据服务器的代理访问的数据结构中,并且基于与用户位置相关联的代理的用户活动来填充数据结构,或者可以在代理维护连接之后隐含获取动态位置信息 客户端的终止以及使用这些维护的连接来为与这些客户端相关联的用户预加载数据。 预加载的数据可以是协议特定的数据或与协议无关的数据。