Selective spoofer and method of performing selective spoofing
First Claim
1. A network apparatus, connected to other network entities via a first type of connection and other network entities via a second type of connection, comprising:
- a spoofing element, which spoofs some of the multiple connections of the first type based on their associated applications.
13 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus for enhancing the performance of a network by performing selective spoofing. Selective spoofing provides the ability to discriminate among different connections, only allocating TCP spoofing resources to those connections for which spoofing will actually improve performance and assigning spoofing parameters based on the specific applications using the connections. The selective spoofing functions described are applicable to a wide variety of communication links, including both slow and fast links, high latency links, and links with low and high error rates. The selective spoofing functions may be implemented either alone or in combination with other performance enhancing features, such as, spoofing the conventional TCP three-way handshake, local data acknowledgement, multiplexing multiple connections across a single connection, data compression/encryption, prioritization, and path selection. The selective spoofing features described are particularly useful for links with high latency and/or high bit error rates.
-
Citations
42 Claims
-
1. A network apparatus, connected to other network entities via a first type of connection and other network entities via a second type of connection, comprising:
a spoofing element, which spoofs some of the multiple connections of the first type based on their associated applications. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42)
-
24. A method, comprising:
-
establishing multiple connections of a first type associated with different applications; and
spoofing some of the multiple connections of the first type based on their associated applications.
-
Specification