Method for reducing unnecessary traffic over a computer network
First Claim
1. A method of reducing unnecessary traffic over a wireless network, said wireless network including a plurality of wireless devices, said wireless network further comprising at least one base station which allows said wireless devices to communicate with nodes of a non-wireless wide area network (WAN), said method comprising the steps of:
- (a) providing an optimization layer on at least one node of said WAN, said optimization layer provided transparently between a standard protocol stack and a media-specific layer of said node, said standard protocol stack configured to communicate with said media-specific layer without the use of said optimization layer;
(b) intercepting a packet from said standard protocol stack with said optimization layer;
(c) passing said packet to said media-specific layer without modification thereto when said packet is not addressed to said wireless network; and
(d) discarding said packet to inhibit the transmission of said packet over said wireless network when said packet is both (i) addressed to a wireless device of said wireless network and (ii) of a predetermined type.
1 Assignment
0 Petitions
Accused Products
Abstract
Standard protocols, such as those commonly used on LAN networks, are used to connect nodes to an enterprise network via a wide area wireless network. Within the appropriate protocol stacks, the standard protocols are optimized by filtering some packets, eliminating and reducing the size of other fields and substituting still other fields to reduce the size of the data packets. The optimized data packets can be transmitted over the wireless WAN increasing WAN efficiency. The optimization is accomplished by inserting an additional optimization layer into the protocol stack between the existing layers. The optimization layer accepts the normal protocol signals generated by the surrounding layers and generates outputs which mimic protocol layers which the surrounding layers expect. Consequently, the optimization layer operates transparently with respect to the existing protocol stack layers.
-
Citations
20 Claims
-
1. A method of reducing unnecessary traffic over a wireless network, said wireless network including a plurality of wireless devices, said wireless network further comprising at least one base station which allows said wireless devices to communicate with nodes of a non-wireless wide area network (WAN), said method comprising the steps of:
-
(a) providing an optimization layer on at least one node of said WAN, said optimization layer provided transparently between a standard protocol stack and a media-specific layer of said node, said standard protocol stack configured to communicate with said media-specific layer without the use of said optimization layer; (b) intercepting a packet from said standard protocol stack with said optimization layer; (c) passing said packet to said media-specific layer without modification thereto when said packet is not addressed to said wireless network; and (d) discarding said packet to inhibit the transmission of said packet over said wireless network when said packet is both (i) addressed to a wireless device of said wireless network and (ii) of a predetermined type. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of reducing unnecessary traffic over a computer network, said method comprising the steps of:
-
(a) providing an optimization layer on at least one node of said computer network, said optimization layer provided transparently between a standard protocol stack and a media-specific layer of said node, said standard protocol stack configured to communicate with said media-specific layer without the use of said optimization layer; (b) intercepting a packet from said standard protocol stack with said optimization layer; (c) determining, in said optimization layer, whether said packet is of a type which can be discarded to reduce unnecessary traffic; (d) passing said packet from said optimization layer to said media-specific layer without modification to said packet when it is determined in step (c) that said packet cannot be discarded; and (e) discarding said packet to thereby inhibit the transmission of said packet over said computer network when it is determined in step (c) that said packet can be discarded, said step of discarding comprising generating a synthesized response to said packet and returning said synthesized response to said standard protocol stack. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A method of suppressing the transmission of a packet across a computer network, said packet generated at least in-pan by a media-independent protocol stack of a source node of said computer network, said method comprising the steps of:
-
(a) intercepting said packet within said source node as said packet is passed by said media-independent protocol stack to a media-specific protocol layer of said source node; (b) determining whether said packet is of a type which can be discarded to reduce unnecessary traffic; (c) passing said packet to said media-specific protocol layer for transmission to a destination node when it is determined in step (b) that said packet cannot be discarded;
mid(d) discarding said packet to thereby inhibit the transmission of said packet to said destination node when it is determined in step (b) that said packet can be discarded, said step of discarding comprising generating a synthesized response to said packet and returning said synthesized response to said media-independent protocol stack, said synthesized response simulating an actual response from said destination node. - View Dependent Claims (15, 16, 17, 18)
-
-
19. A method of inhibiting acknowledgement traffic between a source node and a destination node of a computer network, said source node and said destination node each comprising a respective standard protocol stack which communicates with a respective media-specific layer, said standard protocol stacks implementing an acknowledgement protocol which uses acknowledgement packets to verify successful transmissions of data packets, said method comprising the steps of:
-
(a) providing a first optimization layer on said source node, said first optimization layer provided transparently between said standard protocol stack and said media-specific layer of said source node; (b) providing a second optimization layer on said destination node, said second optimization layer provided transparently between said standard protocol stack and said media-specific layer of said destination node; and (c) when said standard protocol stack of said source node transmits a data packet to said standard protocol stack of said destination node; (i) intercepting and discarding, with said second optimization layer, an acknowledgement packet generated by said standard protocol stack of said destination node, to thereby suppress the transmission of said acknowledgement packet to said source node, and (ii) generating a synthesized acknowledgement with said first optimization layer and passing said synthesized acknowledgement to said standard protocol stack of said source node, said synthesized acknowledgement simulating said acknowledgement packet discarded in step (i). - View Dependent Claims (20)
-
Specification