Systems and methods for communicating a lossy protocol via a lossless protocol using false acknowledgements
First Claim
1. A method for communicating a lossy protocol via a transport control protocol, the method comprising:
- (a) intercepting, by an agent executing on a device, a transport control protocol (TCP) packet to be transmitted by the device;
(b) detecting, by the agent, that the transport control protocol (TCP) packet has a payload comprising a lossy protocol;
(c) communicating to a network stack of the device, by the agent responsive to the detection of the lossy protocol of the payload, an acknowledgement of receipt of the TCP packet prior to communicating the TCP packet from the device, wherein the acknowledgement of receipt of the TCP packet prevents the network stack from retransmitting the TCP packet; and
(d) transmitting, by the agent, the TCP packet from the device.
8 Assignments
0 Petitions
Accused Products
Abstract
The present invention is generally directed towards a remote access architecture for providing peer-to-peer communications and remote access connectivity. In one embodiment, the remote access architecture of the present provides a method for establishing a direct connection between peer computing devices via a third computing device, such as a gateway. Additionally, the present invention provides the following techniques to optimize peer-to-peer communications: 1) false acknowledgement of receipt of network packets allowing communications via a lossless protocol of packets constructed for transmission via a lossy protocol, 2) payload shifting of network packets allowing communications via a lossless protocol of packets constructed for transmission via a lossy protocol, 3) reduction of packet fragmentation by adjusting the maximum transmission unit (MTU) parameter, accounting for overhead due to encryption, 4) application-aware prioritization of client-side network communications, and 5) network disruption shielding for reliable and persistent network connectivity and access.
-
Citations
19 Claims
-
1. A method for communicating a lossy protocol via a transport control protocol, the method comprising:
-
(a) intercepting, by an agent executing on a device, a transport control protocol (TCP) packet to be transmitted by the device; (b) detecting, by the agent, that the transport control protocol (TCP) packet has a payload comprising a lossy protocol; (c) communicating to a network stack of the device, by the agent responsive to the detection of the lossy protocol of the payload, an acknowledgement of receipt of the TCP packet prior to communicating the TCP packet from the device, wherein the acknowledgement of receipt of the TCP packet prevents the network stack from retransmitting the TCP packet; and (d) transmitting, by the agent, the TCP packet from the device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for communicating a lossy protocol via a transport control protocol, the method comprising:
-
(a) detecting, by an agent executing on a device, that a transport control protocol (TCP) packet, to be transmitted from the device, has a payload comprising a lossy protocol; (b) communicating, by the agent responsive to the detection of the lossy protocol of the payload, to a network stack of the device, a false acknowledgement of receipt of the TCP packet; and (c) transmitting, by the agent, the TCP packet from the device, the network stack of the device not performing a TCP reliability algorithm responsive to receiving the false acknowledgement. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15)
-
-
16. A system for communicating a lossy protocol via a transport control protocol connection, the system comprising:
-
a device intermediary to a client and one or more servers, the device establishing a transport control protocol connection with the client; an application of the client transmitting lossy protocol data via the transport control protocol connection; an agent of the client detecting a transport control protocol packet is carrying the lossy protocol data and responsive to the detection issuing a false acknowledgement to a network stack of the client to prevent the network stack from executing a reliability algorithm for the transport control packet. - View Dependent Claims (17, 18, 19)
-
Specification