NETWORK CLUSTERING TECHNOLOGY
First Claim
1. A method for controlling a network-support device, the method comprising the steps of:
- instantiating a configurable network device control manager on a machine;
loading an initial boot configuration;
determining whether there is an alive network control system manager on said network; and
configuring said machine based on said determination.
0 Assignments
0 Petitions
Accused Products
Abstract
Network Clustering Technology (“NCT”) creates an controlled environment that allows organizations to manage their networks, information resources, users and uses through a common structure. Although that capability is valuable in and of itself, it has the additional advantage of being both highly configurable and extensible. NCT is implemented so that it can function as a multiple-redundant implementation configuration to ensure that the network experiences minimal downtime with optimized throughput through one or more connections. As part of a Global Information Architecture (“GIA”), NCT provides the capability to establish rules for prioritizing and optimizing network traffic for specific users or classes of users, and specific classes of information traffic.
25 Citations
9 Claims
-
1. A method for controlling a network-support device, the method comprising the steps of:
-
instantiating a configurable network device control manager on a machine; loading an initial boot configuration; determining whether there is an alive network control system manager on said network; and configuring said machine based on said determination. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer readable medium storing computer-executable instructions for performing a method comprising:
-
creating a payload comprising a plurality of commands for a network administrative control system, and transmitting said payload to a specific location capable of being accessed by said system using a configurable network device control manager.
-
-
8. A method of managing Quality of Service between two nodes, the method comprising the steps of:
-
identifying a priority or a permission of a data stream; matching said priority or permission of said data stream to said channel; and directing said data stream for transmission through said tunnel. creating a channel by assigning a priority or a permission to a tunnel between said two nodes;
-
-
9. A method of managing Quality of Service for a user, the method comprising the steps of:
-
associating a user with a priority or permission, tagging data associated with said user with said priority or permission, and matching said tagged data to a channel assigned said priority or permission.
-
Specification