WO2020176038A1 - System and method for managing network traffic - Google Patents
System and method for managing network traffic Download PDFInfo
- Publication number
- WO2020176038A1 WO2020176038A1 PCT/SG2020/050086 SG2020050086W WO2020176038A1 WO 2020176038 A1 WO2020176038 A1 WO 2020176038A1 SG 2020050086 W SG2020050086 W SG 2020050086W WO 2020176038 A1 WO2020176038 A1 WO 2020176038A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- network
- connection
- data
- connections
- scheduling
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/24—Multipath
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2854—Wide area networks, e.g. public data networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
- H04W28/08—Load balancing or load distribution
- H04W28/086—Load balancing or load distribution among access entities
- H04W28/0861—Load balancing or load distribution among access entities between base stations
- H04W28/0865—Load balancing or load distribution among access entities between base stations of different Radio Access Technologies [RATs], e.g. LTE or WiFi
Definitions
- the present invention relates to computer networks, and in particular but not exclusively, to systems and methods for managing network traffic for data delivery across multiple networks wirelessly.
- Wireless networks are deployed for devices to stay connected and communications over geologically wide areas. Due to the proliferation of mobile devices such as laptops, mobile phones and tablets, as well as video and audio streaming services and other cloud services, there is an increasing demand for secure and high-performance communication over various types of wireless networks, which introduces high latency, especially for delivering internet-based services over large areas.
- multipath delivery for data flows ensures reliable data delivery.
- Existing systems have adopted the use of multipath data delivery protocols, for instance, the Multipath Transport Control Protocol (MPTCP) and are capable of dividing the traffic over multiple paths.
- MPTCP Multipath Transport Control Protocol
- These multipath systems take advantage of alternative paths that exist between source and destination to provide end-to-end reliability and robustness.
- common limitations of such transmission system such as congestion, interference and network coverage in the wireless network often lead to poor network performance.
- potential security issues could arise from cross path traffic fragmentation, resulting in connections that are susceptible to attacks along the way towards the target system.
- the present invention seeks to provide a system and method to overcome at least in part some of the aforementioned disadvantages.
- a system and a method for managing network traffic for secure data delivery across a network wirelessly so as to optimize or improve the performance and reliability of network communication by the configurable multi-number of packet scheduling algorithms to distribute the network traffic across available network paths.
- the system for managing network traffic over multiple network paths can integrate multiple network interface devices for delivering network traffic for improving the network interface and maximizes available bandwidth.
- the system provides seamless processing of ongoing user requests to minimize or eliminate network disruption. This enables smooth and continuous network communication when a primary network experiences slowdown or failure. This is advantageous for deployment in critical systems, particularly for use in remote locations with limited human intervention.
- the system provides secure transmission of network traffic across multiple network paths by retaining the established connection information to enable secure transmission of authorized data packets when switching network paths.
- the method for managing network traffic over multiple network paths between a source node and a target node comprising: establishing a connection record for managing multipath transport layer connections between the source node and the target node, the connection record responsive to establishment of a plurality of network connections for transmitting data between the source node and the target node; intercepting data based on the connection record; identifying the plurality of network connections associated with the intercepted data; receiving external information relating to the plurality of network connections; scheduling the intercepted data based on the connection record, wherein the scheduling comprises selecting network connection or network connections out of the plurality of network connections to schedule the data, wherein the selecting is based on the external information; wherein scheduling the data through the selected network connection or network connections enable managing the multipath transport connections between the source node and the target node.
- scheduling redirects the intercepted data to at least a second network connection based on the received external information.
- scheduling comprises switching network paths based on the received external information.
- scheduling is performed when maintaining the connection record.
- scheduling comprises accelerating the intercepted data via the selected network connection or network connections.
- scheduling comprises delivering accelerated traffic over multiple networks and multiple paths.
- the scheduling of the packets may comprise breaking received byte stream into segments to be transmitted on one of the available sub-flows.
- the scheduling may comprise arranging the data streams in multiple queues for transmission via the selected tunnel paths.
- selecting of network connection or network connections comprises one or more of: (i) response time from various network paths; (ii) network signals; (iii) congestion level; (iv) estimated available bandwidth; (v) priority setting for packet delivery; (vi) transport layer session information.
- receiving external information comprises determining a measure relating to the plurality of network connections based on estimated bandwidth and/or average round trip time measured from the plurality of network connections.
- receiving external information comprises receiving information that one of the plurality of network connections is terminated.
- multipath transport layer connections identifiers are generated for encoding intercepted data for transmission.
- a plurality of additional connection records is established in relation to a plurality of additional source nodes.
- the apparatus comprises: a data processor; a connection manager configured to: establish a connection record for managing multipath transport layer connections between a source node and a target node, the connection record responsive to establishment of a plurality of network connections for transmitting data between the source node and the target node; intercept data based on the connection record; identify the plurality of network connections associated with the intercepted data; a path manager configured to: receive external information relating to the plurality of network connections; schedule the intercepted data based on the connection record, wherein the scheduling comprises selecting network connection or network connections out of the plurality of network connections to schedule the data, wherein the selecting is based on the external information; wherein scheduling the data through the selected network connection or network connections enable managing the multipath transport connections between the source node and the target node.
- the path manager performs the scheduling of the intercepted data by redirecting to at least a second network connection based on the received external information.
- the path manager performs the scheduling of the intercepted data by switching network paths based on the received external information.
- the path manager performs the scheduling when maintaining the connection record.
- the path manager performs the scheduling by accelerating the intercepted data via the selected network connection or network connections.
- the path manager selects at least one network connection comprising one or more of: (i) response time from various network paths; (ii) network signals; (iii) congestion level; (iv) estimated available bandwidth; (v) priority setting for packet delivery; (vi) transport layer session information.
- the path manager receives the external information by determining a measure relating to the plurality of network connections based on estimated bandwidth and/or average round trip time measured from the plurality of network connections.
- the path manager receives the external information comprising receiving information that one of the plurality of network connections is terminated.
- connection manager generates multipath transport layer connections identifiers for encoding intercepted data for transmission.
- the connection manager may provide a public key exchange between the source node and the target node in the establishment of the connection record for secure data transmission.
- connection manager establishes a plurality of additional connection records in relation to a plurality of additional source nodes.
- a computer program product comprising a plurality of data processor executable instructions that when executed by a data processor in a system causes the system to perform the method as detailed in the first aspect above.
- the system comprises an intermediary device, a user unit, and a service unit.
- Figure 1 is a schematic diagram of a system for managing network traffic over multiple network paths in accordance with an embodiment of the present invention.
- Figure 2 is a schematic diagram of the system of Figure 1 deploying network switching in accordance with an embodiment of the present invention.
- Figure 3 is a schematic diagram of the software architecture of the system of Figure 1 in accordance with an embodiment of the present invention.
- Figure 4 is a schematic diagram of the software architecture of the system of Figure 2 illustrating an aspect of the intermediary device in accordance with an embodiment of the present invention.
- Figure 5 is a schematic diagram of the system providing scheduling decision in accordance with an embodiment of the present invention.
- Figure 6 is a schematic diagram of the system of Figure 3 illustrating an implementation of the failover in accordance with an embodiment of the present invention.
- Figure 7 is a schematic diagram of the software architecture of a system in Figure 1 or 2 deploying network switching in multipath transmission in accordance with an embodiment of the present invention.
- Figure 8 is a schematic diagram of an implementation of UDP stitching in accordance with an embodiment of the present invention.
- network includes point to point network, broadcast network, local area network, telecommunications network, data communication network, computer network and any other wireless network.
- the system comprises one or more source devices in communication with one or more target devices via one or more networks. Communication between devices may include combinations of wired/fixed network and a wireless network. In some embodiments, the network may be public and/or private.
- the system comprises a user device (or source device), a service device (target device) and an intermediary device.
- the intermediary device integrates multiple network interface devices for delivering network traffic.
- the intermediary device establishes connection information responsive to a multipath transport layer session for transmitting encrypted packets between the source device and the target device.
- the intermediary device may receive data from a source device and provide that data to a target device.
- the source device is any device that provides data that is received by the intermediary device.
- the service device is any digital device that receives the data that was provided by the source device via the intermediary device.
- the user device communicates directly with one or more service devices. In another embodiment, the service device receives requests from the user device.
- Figure 1 depicts an embodiment of a network environment deploying multiple interface devices.
- the user device 102 is in communication with multiple service devices (via STA-BU in Figure 1) via network communication means, and the intermediary device 104.
- the user device 102 connects to the intermediary device 104 via the network communication means.
- the user device 102 connects to the service device via the network communication means.
- the network communication means may include cellular or satellite network.
- the user device 102 via the communication network and intermediary device 104 may establish at least one connection to request content from the service device over the communication network.
- the intermediary 104 device may forward a request from the user device 102 to the service device.
- the intermediary device 104 (or a gateway or proxy) is shown between satellite and cellular networks network communication means in Figure 1. It would be appreciated that the intermediary device 104 may be deployed on one or more networks on any point between a user device 102 and a service device. In some embodiments, one or more intermediary devices 104 may be located at any point in the network or network communications path between a user device 102 and a service device.
- a first intermediary 104 device may be deployed on a first network and a second intermediary device 104 may be deployed on a second network.
- the intermediary device 104 accelerates network traffic by multiplexing and encrypting user traffic payload, and decrypting and multiplexing at the receiver side.
- the intermediary device 104 on a network may communicate data packets between established streams.
- the intermediary 104 accelerates transport layer traffic between a user 102 and a service device.
- the intermediary 104 may deliver the accelerated network traffic via a path manager 105.
- the intermediary 104 may act as a proxy to provide access to one or more service devices.
- the intermediary 104 includes a device for accelerating network traffic.
- the intermediary device 104 integrates multiple network interface devices for delivering network traffic (via one or more STA-Bus or virtual machines).
- the intermediary device 104 determines suitable network communication paths for transmitting encrypted packets, which may be validated by performing authentication.
- the intermediary device 104 may receive or intercept encrypted packets from the same source or different sources, and directed to the same destination.
- the intermediary device 104 receives the encrypted packets, and determine authentication to the user's connection to a network.
- the intermediary device 104 directs the packets to a path manager 105 for transmission to the destination.
- FIGS 2 and 3 illustrate a network environment for delivering and/or operating a computing environment for multipath delivery.
- the intermediary device 104 includes an accelerator proxy 104-A and a peer proxy 104-B.
- the accelerator proxy 104-A may include a computer device with installed accelerator proxy software and configurations.
- the peer proxy 104-B may include a virtual network function with installed peer proxy software and configurations.
- the intermediary device 104 communicates with the user device 102 to establish a plurality of tunnel paths in relation to the number of network paths. This enables the intermediary device 104 to transfer data over multi-number of network paths simultaneously.
- the intermediary device 104 manages and tracks one or more connection information between the user device 102 and the service device.
- connection in this case, is in the context in which the protocol tunnels communicate between nodes of the intermediary 104.
- the path manager 105 maps each connection request in response to receipt of a communication from a source, having source IP, to one or more data tunnels.
- the path manager 105 maps the connection request from a user 102 to a data tunnel.
- the mapped connection may be provided an assigned connection information between the mapped entities. This connection information is preserved by the path manager 105 for TCP and UDP packet authentication for encryption and decryption of communications.
- the path manager 105 may request establishment of a connection from a source IP to a destination IP.
- the transport layer packets (TCP or UDP) may be communicated between established streams for multipath delivery communication from the source IP to the destination IP.
- the intermediary 104 comprises a DNAT for intercepting and redirecting transport layer connection to a predetermined IP address and port.
- the intermediary 104 executes transparently to any applications and user device 102.
- the path manager 105 manages a plurality of connection in a plurality of network paths.
- the path manager 105 controls and manages the delivery of the network traffic to the user or the service device.
- the intermediary 104 establishes data queues for queuing and transmitting one or more network traffic for transmission by the intermediary 104.
- the intermediary 104 manages a number of connections in queues. In an embodiment, the intermediary 104 manages multiple queues between the nodes of the proxies, and sends network traffic for a certain network path to a dedicated queue.
- the intermediary 104 on a network may communicate data packets between the established streams between nodes of the intermediary 104.
- the intermediary 104 may be a hardware unit or a software component.
- the intermediary 104 comprises a connection manager 106 for mapping user traffic from each source IP into the connection, mapping user traffic from each source IP into the connection, handling incoming user traffic and multiplexing payload data into each connection, sending outgoing user traffic from connection.
- the intermediary device 104 establishes data tunnels on receiving a connection request by a user device 102 to connect to the service.
- the intermediary device 104 may be configured to establish a maximum number of data tunnels over a number of network paths for user device 102.
- the intermediary 104 device may allow configuration of this predetermined maximum.
- Incoming packets may be associated with existing data tunnels or newly created data tunnels.
- the path manager 105 maps an incoming user traffic connection request to one or more data tunnels. Each connection possesses a set of connection identifiers that identify the connection.
- Each user IP is considered a mapping key during its lifetime, each user IP is mapped with a data tunnel connection at the accelerator proxy 104-A.
- the path manager 105 maps the user connection request to a data tunnel having an assigned connection information (e.g. Connection ID).
- the mapped connection is provided a connection information, which is unique to the mapped connection between source-target entities. Connection IDs allow connections to migrate to a new network path, by directing to another endpoint or forced by a change in a middlebox.
- the connection information is preserved by the path manager for TCP and UDP packet authentication for encryption and decryption of communications.
- the connection information may be an identification number that uniquely indicates specific communication channel for TCP/UDP connections. There is mapping between the identification number and the unique user connection information of the TCP/UDP connections (source IP address, source IP port number, destination IP address, destination port number).
- the intermediary 104 identifies a user by its unique user connection information (or source IP address) when a user requests for establishing a connection.
- the intermediary 104 may identify one or more connections (e.g. TCP or UDP connections) under a connection request.
- connections e.g. TCP or UDP connections
- a user device 102 may request establishment of a connection from a source IP address to a destination IP address.
- the intermediary 104 may request establishment of a connection from source IP address to a destination IP address.
- connection is issued a unique identification number and new shared key for encryption and decryption of packets for specific communications.
- the connection is maintained until it expires by the designated time, which is managed by the user.
- the designated time which is managed by the user.
- no packet transmission occurs between nodes of the intermediary (or between intermediaries), without physical network connectivity after the handshake process.
- the intermediary device 104 via the connection manager 106, establishes a connection record for multipath delivery for a connection request received from the user device 102.
- the connection manager 106 may be configured to create or establish the connection record, keep track of statuses, and/or update the connection record.
- the connection manager 106 may associate the established connection record with the user connection request.
- the intermediary 104 checks the IP header to identify the user device 102.
- the intermediary establishes a plurality of tunnel paths based on the number of network interface configured to deliver outgoing traffic via gateways.
- the connection request from the same user device 102 will be mapped to the tunnel paths of the user IP based on a scheduling determined by the path manager 105.
- the mapping of the user connection request to the tunnel paths of the user IP is created and maintained as the connection record.
- the intermediary 104 receives communication (e.g. data or information), encrypts or decrypts the communication and sends between the user device 102 and the service device, via the path manager 105.
- the accelerator proxy 104-A intercepts the user traffic, encrypts the user traffic, and sends via a known stream and the established connection.
- the peer proxy 104-B receives, decrypts and forwards the stream data to the service or destination based on the connection record.
- the authenticated packets may be transmitted across different networks and multiple network paths, data channel change across different networks and multi-channel UDP packet delivery (referred to as "UDP stitching").
- Authentication is achieved with the issued identification number and cryptographic mechanism to minimize packet round trip time for connection establishment.
- the cryptographic handshake provides an authenticated key exchange using Public Key Infrastructure, or standard format of public key certificates, e.g. X.509. Authentication of the identity of the form using X.509 may be carried out for intermediary proxies 104 having a key pair.
- Conventional packet authentication in IP based protocols, such as TCP and UDP involves exchanging ports and IP addresses (source port number, destination port number, source IP address, destination IP address) of the source and destination. As such, this conventional packet authentication method is not able to support mobility/roaming of the user device 102 across different networks, multipath packet delivery using multi-number of networks.
- the intermediary 104 manages or handles data via a network address translation (NAT) module.
- the system may be provided a network address translation module for updating the UDP mapping and connection in real-time.
- the connection information is updated while the user connection remains unchanged.
- NAT connection record may be used to store, track and maintain information regarding a socket or socket information (or user connection information).
- the NAT component modifies the port information, updates the UDP port connection information (4-number-tube; IP address, port number of user device 102, IP address and port number of the receiving proxy of the intermediary 104).
- the intermediary 104 may update the port information to enable (1) selective sending of TCP connection or UDP stream from an identified source to a certain path in accordance to load balancing or packet scheduling algorithms, their settings and path manager; and (2) switch TCP connections and UDP stream over to the other available network path due to the connection failure between the accelerator proxy 104- A and the peer proxy 104-B. For example, by network service interruption, or deviation of the measured latency or signal strength of wireless network signal, (e.g. above or below the threshold that may be set by a user, or selected by path manager 105.
- the network observation service of the intermediary 104 may determine the service device for which to distribute a user connection request. If the intermediary 104 determines that the service device is not available or has latency over the predetermined threshold, the intermediary 104 can direct or distribute the user connection requests to another service device.
- connection information may be in the form of a connection ID (or identifier).
- the connection ID is maintained over the lifetime of the communication or connection between the nodes of the intermediary. This connection ID may be retrieved when re-establishing the mapped connection.
- the update of connection ID may update the packet information tuples, such as 4-number-tuple comprising at least two IP addresses and two ports.
- the NAT function in the intermediary 104 interfaces with the user device 102, and switches the tunnel backhaul from network path 1 (physical interface ETH_2 configured to be the WAN gateway GW1) to network path 2 (physical interface ETH_3 configured to be the WAN gateway GW2).
- a first connection ID (STAP_ID01) is established and mapped with the user device 102 in the LAN.
- the migration process triggered by a network observation decision at a first intermediary device 104, is transparent to the user application (TCPOl).
- the endpoint of the tunnel path is modified, but retains the stream mapping, user payload frame status and session context connection ID which contains authentication information including shared key that is issued in the handshake process, and related control information.
- the path manager 105 monitors, measure, collects, analyses and reports data on the frequency that is determined by the user, or by default.
- the path manager 105 may invoke network observation service by monitoring the condition of the network paths and selecting suitable network path for general packet delivery, or prioritized packet delivery, or maximum utilization of the available networks capacities.
- the path manager 105 may decide on a suitable network path by measuring the response time from different network paths, wireless signal strength (e.g, WiFi signal strength, 3G/4G/LTE mobile network signal strength), congestion level, estimated available bandwidth, priority setting and many other factors when transmitting over multiple network pathways or choosing a specific network path for the packet delivery.
- wireless signal strength e.g, WiFi signal strength, 3G/4G/LTE mobile network signal strength
- the path manager 105 may also detect when a tunnel path is down or disconnected.
- ongoing requests may be switched seamlessly to remaining tunnel paths with available bandwidth. Switching from one tunnel path to another may be carried out when deploying multiple network pathways for transmission.
- the retention of the connection information for a mapped user-server side intermediate device connection enables the connection information to be retrieved when this same mapped connection is re-established.
- the path manager 105 may provide real-time update on existing network bandwidth as well as estimating the estimated bandwidth of the network.
- this enables monitoring the performance for optimizing the bandwidth on multiple network paths in the system.
- the system provides load balancing by distributing network traffic according to a scheduling mechanism.
- the scheduling mechanism comprises a scheduling algorithm which may be selected from at least one of round robin, hash code by destination IP and port, least connection, weighted round robin, weight least connection, dynamic weighted round robin.
- the scheduling mechanism may be configured via the web interface and command line interface.
- Weighted round robin the algorithms map user connection to available tunnel paths based on the round robin method with a weighted factor calculated for each path. The weighted factor is calculated based on the estimated bandwidth from the paths.
- Weighted least connection the algorithms map user connection to available tunnel paths based on the least connection method with a weighted factor calculated for each path. The weighted factor is calculated based on the estimated bandwidth from the paths.
- Dynamic weighted round robin the algorithms map user connection to available tunnel paths based on the weighted round robin method. The weighted factor is calculated based on the estimated bandwidth, also the average measured RTT from the paths.
- the system deploys an adaptive network switching functionality when there are multi number of networks in the distributed system.
- the distributed system may utilize a single network path.
- the intermediary provides connection roaming when there are multi-number of networks and multi-number of networks paths to be used simultaneously, for throughput and resilience improvements.
- the intermediary 104 enables network switching or“Connection migration” from a primary network to one or more backup networks to provide smooth transition from one network communication.
- the intermediary 104 may switch network when deploying multiple network pathways. From Figure 6, according to an embodiment, the intermediary 104 may switch from the primary communication via satellite network to the LTE communication as failover if the network monitoring of the intermediary 104 determines that there are network issues, such as satellite malfunction, or when the primary communication network performs below a desired threshold.
- the intermediary 104 may be configured to provide seamless switching of the networks. By monitoring the present network conditions, the intermediary 104 may determine if network switching is required. If the intermediary 104 determines any changes to the endpoint and the user connection information (e.g. IP address, port numbers), such as changes migrating to a new network, the intermediary 104 may perform migration from the current established connection. The intermediary 104 may migrate to a previously- mapped connection by retrieving the connection information (or Connection ID) and allow re-establishing that mapped connection. In an embodiment, the intermediary 104 may establish a new mapped connection if a connection ID is not available for an endpoint, prior to connection migration.
- ongoing user requests can be continually processed, thereby eliminating interruption to network services and disruption to user experience.
- the intermediary 104 may be deployed to enable multi number of networks and multi-number of network paths concurrently.
- Figure 7 illustrates the deployment of a system for network switching for multipath delivery.
- the system may comprise two network paths, and two network devices, user 1 (IP1) and user 2 (IP2).
- IP1 user 1
- IP2 IP2
- TCP connections originating from IP1 may accelerate via tunnel path 1 - STAP_P1 (TCP1, TCP2) and tunnel path 2 - STAP_P2 (TCP3) simultaneously.
- TCP connections from IP2 may connect and accelerate via two tunnel paths.
- the established connection has an assigned connection ID that is used in packet encryption and decryption.
- This method of packet authentication is used in multipath delivery, data channel change among different networks, multi-channel UDP packet delivery (or UDP stitching).
- the intermediary may be configured to accelerate the UDP user service via multiple data tunnels.
- the intermediary may establish more streams in terms of their source and destination. These established streams may be mapped to a single UDP connection for delivering data via the data tunnels.
- the intermediary may provide its scheduling algorithm to select the streams on which the endpoint transmits data.
- the intermediary may be configured various settings of Class of Service (CoS) to vary between reliability and latency.
- CoS settings manages the received packets in the receiving queue in the server side of the intermediary, which result in differing reliability and delay in final delivery of the packets.
- the intermediary may be configured for different types of services. The configuration may be performed via the Web UI or management console, or by the users.
- the intermediary may be configured a higher CoS to reduce delay in the final delivery of data to the end point.
- a higher CoS would be advantageous for real time service, such as real-time video or audio streaming. This advantageously eliminates the temporary obstruction to traffic delivery (or head of blocking) until the server stream recovers to consume data and provide feedback on data window size due mainly in part to the memory limit when accelerating UDP service via a single stream.
- the delivery capacity may be maximized by supporting multiple delivery streams in the data tunnel if the traffic acceleration node is a single-tunnel acceleration, for instance VPN-like application, IPSec- Over-UDP application.
- delivery capacity of a single UDP connection may extend which is intercepted by its identity tube (source IP address, source port number, Destination IP address, Destination port number), e.g. video UDP streaming applications.
- a user IPl configures n number of streams for each UDP connection to deliver data and is assigned a designated data tunnel (STAP_IP1).
- UDP connection UDP1 which is identified by a tube (src_ipl, src_portl, dst_ipl, dst_portl).
- the UDP1 is intercepted at the accelerator proxy 104-A and mapped from streaml_l to streaml_n. Payloads are delivered via these streams at the accelerator proxy 104-A by round robin scheduling method, and in same manner at peer proxy 104-B as the reversed direction.
- UDP1 UDP connection
- STAP_IP1 data tunnel
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| SG11202109241SA SG11202109241SA (en) | 2019-02-25 | 2020-02-25 | System and method for managing network traffic |
| AU2020229738A AU2020229738A1 (en) | 2019-02-25 | 2020-02-25 | System and method for managing network traffic |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| SG10201901664Y | 2019-02-25 | ||
| SG10201901664Y | 2019-02-25 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2020176038A1 true WO2020176038A1 (en) | 2020-09-03 |
Family
ID=72240219
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/SG2020/050086 Ceased WO2020176038A1 (en) | 2019-02-25 | 2020-02-25 | System and method for managing network traffic |
Country Status (3)
| Country | Link |
|---|---|
| AU (1) | AU2020229738A1 (en) |
| SG (1) | SG11202109241SA (en) |
| WO (1) | WO2020176038A1 (en) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20230171620A1 (en) * | 2021-11-26 | 2023-06-01 | Dish Network, L.L.C. | Enhanced network reliability and/or boosted network speed |
| EP4287591A4 (en) * | 2021-07-21 | 2024-07-31 | Tencent Technology (Shenzhen) Company Limited | DATA TRANSMISSION METHOD AND DEVICE AS WELL AS SERVER, STORAGE MEDIUM AND PROGRAM PRODUCT |
Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20140064199A1 (en) * | 2012-08-30 | 2014-03-06 | Lite-On Technology Corp. | Method and channel selector for selecting an operation channel, and wireless network connecting apparatus including the channel selector |
| US20160105366A1 (en) * | 2004-02-18 | 2016-04-14 | Fortinet, Inc. | Selecting among multiple concurrently active paths through a network |
| CN105721307A (en) * | 2016-02-19 | 2016-06-29 | 华为技术有限公司 | Multipath message forwarding method and device |
| CN106102093A (en) * | 2016-06-02 | 2016-11-09 | 重庆邮电大学 | A kind of multi-path data bag allocation schedule method in wireless self-organization network |
| US20170324628A1 (en) * | 2016-05-03 | 2017-11-09 | Citrix Systems, Inc. | Systems and methods to choose an optimal path from multiple high latency links |
| CN108696449A (en) * | 2018-05-09 | 2018-10-23 | 清华大学 | A kind of data dispatching method and device |
-
2020
- 2020-02-25 WO PCT/SG2020/050086 patent/WO2020176038A1/en not_active Ceased
- 2020-02-25 SG SG11202109241SA patent/SG11202109241SA/en unknown
- 2020-02-25 AU AU2020229738A patent/AU2020229738A1/en not_active Abandoned
Patent Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20160105366A1 (en) * | 2004-02-18 | 2016-04-14 | Fortinet, Inc. | Selecting among multiple concurrently active paths through a network |
| US20140064199A1 (en) * | 2012-08-30 | 2014-03-06 | Lite-On Technology Corp. | Method and channel selector for selecting an operation channel, and wireless network connecting apparatus including the channel selector |
| CN105721307A (en) * | 2016-02-19 | 2016-06-29 | 华为技术有限公司 | Multipath message forwarding method and device |
| US20170324628A1 (en) * | 2016-05-03 | 2017-11-09 | Citrix Systems, Inc. | Systems and methods to choose an optimal path from multiple high latency links |
| CN106102093A (en) * | 2016-06-02 | 2016-11-09 | 重庆邮电大学 | A kind of multi-path data bag allocation schedule method in wireless self-organization network |
| CN108696449A (en) * | 2018-05-09 | 2018-10-23 | 清华大学 | A kind of data dispatching method and device |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP4287591A4 (en) * | 2021-07-21 | 2024-07-31 | Tencent Technology (Shenzhen) Company Limited | DATA TRANSMISSION METHOD AND DEVICE AS WELL AS SERVER, STORAGE MEDIUM AND PROGRAM PRODUCT |
| US20230171620A1 (en) * | 2021-11-26 | 2023-06-01 | Dish Network, L.L.C. | Enhanced network reliability and/or boosted network speed |
Also Published As
| Publication number | Publication date |
|---|---|
| AU2020229738A1 (en) | 2021-10-14 |
| SG11202109241SA (en) | 2021-09-29 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US7028183B2 (en) | Enabling secure communication in a clustered or distributed architecture | |
| US10484335B2 (en) | Secure remote computer network | |
| US7676838B2 (en) | Secure communication methods and systems | |
| US6651105B1 (en) | Method for seamless networking support for mobile devices using serial communications | |
| US7318100B2 (en) | Cooperative proxy auto-discovery and connection interception | |
| US9319439B2 (en) | Secured wireless session initiate framework | |
| US8473620B2 (en) | Interception of a cloud-based communication connection | |
| US20080320154A1 (en) | Cooperative proxy auto-discovery and connection interception | |
| US20160119165A1 (en) | Methods and systems to manage network connections | |
| US11647069B2 (en) | Secure remote computer network | |
| AU2019261208B2 (en) | System and method for accelerating data delivery | |
| WO2023185804A1 (en) | Multi-stream load balancing method and apparatus for vpn, and system and storage medium | |
| WO2020176038A1 (en) | System and method for managing network traffic | |
| CN110830461B (en) | Cross-region RPC service calling method and system based on TLS long connection | |
| Trossen et al. | Service-based Routing at the Edge | |
| EP4633114A1 (en) | Computer-implemented method for network-assisted data transport | |
| WO2025112798A1 (en) | Data transmission methods and related apparatus | |
| KR20080051576A (en) | WAN acceleration optimization device supporting multiple tunnels and method | |
| Islam et al. | Using SCTP to implement multihomed web servers |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20762122 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| ENP | Entry into the national phase |
Ref document number: 2020229738 Country of ref document: AU Date of ref document: 20200225 Kind code of ref document: A |
|
| 32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 14/12/2021) |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 20762122 Country of ref document: EP Kind code of ref document: A1 |