Systems and methods for network disruption shielding techniques
First Claim
1. A method for shielding from a network disruption a session established via a first protocol, the method comprising the steps of:
- (a) establishing, via an agent of a client, a session via a first protocol over a network connection between the client and a device, the network connection associated with a network stack, a first portion of the network stack comprises one or more layers of the network stack below the layer of the first protocol, and a second portion of the network stack comprises a layer for the first protocol and one or more layers of the network stack above the first protocol;
(b) detecting a disruption in the network connection causing the first portion of the network stack to be disestablished;
(c) maintaining, by the agent, the session and the second portion of the network stack during the disruption; and
(d) re-establishing the second portion of the network stack and the network connection while maintaining the session and the second portion of the network stack.
7 Assignments
0 Petitions
Accused Products
Abstract
The present invention is generally directed towards a remote access architecture for providing peer-to-peer communications and remote access connectivity. In one embodiment, the remote access architecture of the present provides a method for establishing a direct connection between peer computing devices via a third computing device, such as a gateway. Additionally, the present invention provides the following techniques to optimize peer-to-peer communications: 1) false acknowledgement of receipt of network packets allowing communications via a lossless protocol of packets constructed for transmission via a lossy protocol, 2) payload shifting of network packets allowing communications via a lossless protocol of packets constructed for transmission via a lossy protocol, 3) reduction of packet fragmentation by adjusting the maximum transmission unit (MTU) parameter, accounting for overhead due to encryption, 4) application-aware prioritization of client-side network communications, and 5) network disruption shielding for reliable and persistent network connectivity and access.
363 Citations
33 Claims
-
1. A method for shielding from a network disruption a session established via a first protocol, the method comprising the steps of:
-
(a) establishing, via an agent of a client, a session via a first protocol over a network connection between the client and a device, the network connection associated with a network stack, a first portion of the network stack comprises one or more layers of the network stack below the layer of the first protocol, and a second portion of the network stack comprises a layer for the first protocol and one or more layers of the network stack above the first protocol;
(b) detecting a disruption in the network connection causing the first portion of the network stack to be disestablished;
(c) maintaining, by the agent, the session and the second portion of the network stack during the disruption; and
(d) re-establishing the second portion of the network stack and the network connection while maintaining the session and the second portion of the network stack. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A system for shielding from a network disruption a session established via a first protocol, the system comprising
an agent of a client establishing a session between the client and a device over a network connection via a first protocol; -
a network stack having a first portion and a second portion, the first portion of the network stack comprising one or more layers of the network stack below the layer of the first protocol, and the second portion of the network stack comprising a layer for the first protocol and one or more layers of the network stack above the first protocol; and
a detector for detecting a disruption in the network connection causing the second portion of the network stack to be disestablished;
wherein;
upon detection of the disruption by the detector, the agent maintains the session and the second portion of the network stack during the disruption; and
the client re-establishes the first portion of the network stack and the network connection while the agent maintains the session and the second portion of the network stack. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33)
-
Specification