Systems and methods for network disruption shielding techniques
First Claim
1. A method for shielding from a network disruption a session established via a first protocol, the method comprising:
- (a) establishing, via an agent of a client, for an application executing on the client a session via a first protocol over a transport layer network connection between the client and a device, the transport layer network connection associated with a network stack operating on the client, a first portion of the network stack comprises one or more layers of the network stack below a layer of the first protocol, and a second portion of the network stack comprises a layer for the first protocol and one or more layers of the network stack above the first protocol;
(b) detecting a disruption in the transport layer network connection causing the first portion of the network stack to be disestablished;
(c) maintaining, by the agent transparently to the application, the session of the application and the second portion of the network stack during the disruption; and
(d) re-establishing, by the client transparently to the application, the first portion of the network stack and the transport layer network connection while the agent maintains the session of the application and the second portion of the network stack.
8 Assignments
0 Petitions
Accused Products
Abstract
The present invention is generally directed towards a remote access architecture for providing peer-to-peer communications and remote access connectivity. In one embodiment, the remote access architecture of the present provides a method for establishing a direct connection between peer computing devices via a third computing device, such as a gateway. Additionally, the present invention provides the following techniques to optimize peer-to-peer communications: 1) false acknowledgement of receipt of network packets allowing communications via a lossless protocol of packets constructed for transmission via a lossy protocol, 2) payload shifting of network packets allowing communications via a lossless protocol of packets constructed for transmission via a lossy protocol, 3) reduction of packet fragmentation by adjusting the maximum transmission unit (MTU) parameter, accounting for overhead due to encryption, 4) application-aware prioritization of client-side network communications, and 5) network disruption shielding for reliable and persistent network connectivity and access.
-
Citations
34 Claims
-
1. A method for shielding from a network disruption a session established via a first protocol, the method comprising:
-
(a) establishing, via an agent of a client, for an application executing on the client a session via a first protocol over a transport layer network connection between the client and a device, the transport layer network connection associated with a network stack operating on the client, a first portion of the network stack comprises one or more layers of the network stack below a layer of the first protocol, and a second portion of the network stack comprises a layer for the first protocol and one or more layers of the network stack above the first protocol; (b) detecting a disruption in the transport layer network connection causing the first portion of the network stack to be disestablished; (c) maintaining, by the agent transparently to the application, the session of the application and the second portion of the network stack during the disruption; and (d) re-establishing, by the client transparently to the application, the first portion of the network stack and the transport layer network connection while the agent maintains the session of the application and the second portion of the network stack. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A system for shielding from a network disruption a session established via a first protocol, the system comprising
an agent of a client establishing for an application executing on the client a session between the client and a device over a transport layer network connection via a first protocol; -
a network stack operating on the client, the network stack having a first portion and a second portion, the first portion of the network stack comprising one or more layers of the network stack below the layer of the first protocol, and the second portion of the network stack comprising a layer for the first protocol and one or more layers of the network stack above the first protocol; and a detector for detecting a disruption in the transport layer network connection causing the second portion of the network stack to be disestablished; wherein; upon detection of the disruption by the detector, the agent transparently to the application maintains the session of the application and the second portion of the network stack during the disruption; and the client re-establishes transparently to the application the first portion of the network stack and the transport layer network connection while the agent maintains the session of the application and the second portion of the network stack. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33)
-
-
34. A method for shielding from a network disruption a session established via a first protocol, the method comprising the steps of:
-
(a) establishing, via an agent of a client, for an application executing on the client a session via a first protocol over a transport layer network connection between the client and a device, the transport layer network connection associated with a network stack operating on the client, a first portion of the network stack comprises one or more layers of the network stack below a layer of the first protocol, and a second portion of the network stack comprises a layer for the first protocol and one or more layers of the network stack above the first protocol; b) initiating, by the application, a transaction of the first protocol layer with the device via the session; (c) detecting a disruption in the transport layer network connection causing the first portion of the network stack to be disestablished; (d) maintaining, by the agent transparently to a user of the application, the session of the application and a driver operating in the second portion of the network stack intact during the disruption; and (e) re-establishing, by the client transparently to the user of the application, the first portion of the network stack and the transport layer network connection while the agent maintains the session and the second portion of the network stack; and (f) continuing, by the application of the client, to execute the transaction of the first protocol layer, without interruption, via the session to the device.
-
Specification