Apparatus and methods for providing translucent proxies in a communications network
First Claim
1. A method for transmitting data over a network from a source to a destination through a plurality of intermediary devices, wherein said plurality of intermediary devices comprises at least one proxying device and at least one non-proxying device, the method comprising:
- receiving a request for data, said request having an identifier, wherein the identifier designates the request as a proxy-enabled request;
recognizing the identifier in the request by said at least one proxying device;
intercepting the request after recognizing the identifier and subsequently intercepting all of the remaining associated data packets so that requested data associated with the request will be forwarded by said at least one proxying device; and
transmitting the requested data from the source to the destination through by said at least one proxying device.
0 Assignments
0 Petitions
Accused Products
Abstract
The Translucent Proxying of TCP (TPOT) device and methods use TCP-OPTIONS and IP tunneling to guarantee that all IP packets belonging to a specific TCP connection will traverse the proxy which intercepts the first packet of data. This guarantee allows the ad-hoc deployment of TPOT devices anywhere within the communication network, and does not restrict the placement of proxy devices at the edge of the network. Furthermore, no extra signaling support is required for the TPOT device to properly function while the addition of TPOT devices to communication networks significantly improves the throughput of intercepted TCP packets of data.
-
Citations
28 Claims
-
1. A method for transmitting data over a network from a source to a destination through a plurality of intermediary devices, wherein said plurality of intermediary devices comprises at least one proxying device and at least one non-proxying device, the method comprising:
-
receiving a request for data, said request having an identifier, wherein the identifier designates the request as a proxy-enabled request; recognizing the identifier in the request by said at least one proxying device; intercepting the request after recognizing the identifier and subsequently intercepting all of the remaining associated data packets so that requested data associated with the request will be forwarded by said at least one proxying device; and transmitting the requested data from the source to the destination through by said at least one proxying device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A device that transmits data over a network from a source to a destination through a plurality of intermediary devices, wherein said plurality of intermediary devices comprises at least one proxying device and at least one non-proxying device, comprising:
-
a receiving part that receives a request for data, which includes an identifier that designates the request as a proxy-enabled request; a recognition part in said at least one proxying device that recognizes the identifier in the request; an intercepting part that intercepts the request after the recognition and subsequently intercepting all of the remaining associated data packets so that requested data associated with said request will be forwarded by said at least one proxying device; and a transmitting part that transmits the requested data to the destination through said at least one proxying device. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
Specification