Method for Embedding Meta-Commands in Normal Network Packets
First Claim
1. A method of embedding meta data in a request sent from a first component to a second component of a computer network system, comprising the steps of:
- encoding the meta data in one or more fields in the request, the one or more fields available according to a protocol and specifying a control information and a data information;
sending the request from the first component to the second component using the protocol;
decoding the meta data from the one or more fields in the request; and
taking an action on the second component according to the meta data, the action being independent of the data information contained in the request.
8 Assignments
0 Petitions
Accused Products
Abstract
A method for synchronizing different components of a computer network system using meta-commands embedded in normal network packets. The data communication channel between different components of a computer network system can be used to transport meta-commands piggybacked in normal network packets, without modifying or compromising the validity of the protocol message. Embodiments of the method can be used for embedding test synchronization and control commands into the network packets sent through a device or system under test. The device or system under test can be an edge device, with the data communication channel carrying normal packets containing meta-commands embedded in the packets to synchronize the test control of the test clients and the test servers connected to the edge device.
31 Citations
27 Claims
-
1. A method of embedding meta data in a request sent from a first component to a second component of a computer network system, comprising the steps of:
-
encoding the meta data in one or more fields in the request, the one or more fields available according to a protocol and specifying a control information and a data information; sending the request from the first component to the second component using the protocol; decoding the meta data from the one or more fields in the request; and taking an action on the second component according to the meta data, the action being independent of the data information contained in the request. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method of embedding meta data in a request sent from a first component to a second component of a computer network system, comprising the steps of:
-
encoding the meta data in one or more fields in the request, the one or more fields available according to a protocol and specifying a control information and a data information; and sending the request from the first component to the second component using the protocol. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method of decoding meta data embedded in a request received by a component of computer network system, comprising the steps of:
-
decoding the meta data from one or more fields in the request, the one or more fields available according to a protocol and specifying a control information and a data information enabling the request to be received by the component; and allowing the component to take an action according to the meta data, the action being independent of the data information contained in the request. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27)
-
Specification