Network architecture and related methods for surviving...

Electrical computers and digital processing systems: multicomput – Remote data accessing

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C709S227000, C709S229000

Reexamination Certificate

active

07991852

ABSTRACT:
Network architecture and related methods for maintaining traffic flow between clients and an end-server during a Denial of Service (DoS) attack are described herein. The network architecture includes a set of overlay nodes coupled between clients and a server. Each overlay node is able to rank and probe other nodes for purposes of selecting a best path for routing traffic to the end-server to resist a denial of service of attack. Probing is performed to detect overlay nodes having better performance based on one or more performance metrics (i.e., load, jitter, latency, loss rate). For instance, in one implementation probing detects lightly loaded overlay paths for purposes of routing traffic to the end-server, so as to maintain connectivity between the end-server and clients even under DoS attacks.

REFERENCES:
patent: 5539659 (1996-07-01), McKee et al.
patent: 5751963 (1998-05-01), Umetsu
patent: 5802503 (1998-09-01), Sansone
patent: 6192054 (2001-02-01), Chan et al.
patent: 7185077 (2007-02-01), O'Toole et al.
patent: 2002/0002686 (2002-01-01), Vange et al.
patent: 2002/0124106 (2002-09-01), Dolganow et al.
patent: 2002/0163882 (2002-11-01), Bornstein et al.
patent: 2002/0174217 (2002-11-01), Anderson
patent: 2004/0148357 (2004-07-01), Corrigan et al.
patent: 2004/0255323 (2004-12-01), Varadarajan et al.
patent: 2005/0108331 (2005-05-01), Osterman
patent: 1 067 736 (2001-01-01), None
European Search Report for Application No. EP 05 25 0060 dated Apr. 13, 2005.
Article entitled, “On Detecting Service Violations and Bandwidth Theft in QoS Network Domains”, authored by Ahsan Habib, Sonia Fahmy, Srinivas R. Avasarala, Venkatesh Prabhakar and Bharat Bhargava, published in Computer Communications, vol. 26, No. 8—May 5, 2003 Issue—pp. 861-871.
Symposium on Operating Systems Principles Conference Paper entitled, “Resilient Overlay Networks” authored by David Andersen, Hari Balakrishnan, Frans Kaashoek and Robert Morris presented in Oct. 2001 and published in Dec. 2001, ISSN: 0163-5980 and retrieved from the Internet website of http:/
ms.lcs.mit.edu/ron on Apr. 12, 2005.
Article entitled, “Edge-To-Edge Measurement-Based Distributed Network Monitoring” authored by Ahsan Habib, Maleq Khan and Bharat Bhargava and published in vol. 44, No. 2—Feb. 5, 2004 issue of Computer Networks (pp. 211-233) which is published by Elsevier Science Publishers B.V.—ISSN: 1389-1286.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Network architecture and related methods for surviving... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Network architecture and related methods for surviving..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Network architecture and related methods for surviving... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2754097

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.