The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.
The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.
Patent No.:
Date of Patent:
Jul. 15, 2008
Filed:
May. 20, 2004
James Aviani, Santa Barbara, CA (US);
David Eric Swanson, Santa Barbara, CA (US);
Frederick Baker, Santa Barbara, CA (US);
Kenneth E. Mueller, Ii, Santa Barbara, CA (US);
Matthew Richard Gnagy, Sacramento, CA (US);
James Aviani, Santa Barbara, CA (US);
David Eric Swanson, Santa Barbara, CA (US);
Frederick Baker, Santa Barbara, CA (US);
Kenneth E. Mueller, II, Santa Barbara, CA (US);
Matthew Richard Gnagy, Sacramento, CA (US);
Cisco Technology, Inc., San Jose, CA (US);
Abstract
The technique of the present invention provides a solution to the problem of routing or redirecting a given client to a replica or proxy server which has a relatively shortest propagation delay to the client. According to the technique of the present invention, a network device referred to as an intercept server sits in front of a host server, and intercepts packets routed to the host server. When desired, packets which are intercepted by the intercept server are replicated, encapsulated and tunneled to selected client servers in the overlay network. The tunneled packets are received and processed by each of the selected client servers, whereupon each of the selected client servers generates a respective spoofed response to the source device identified in the header of the originally intercepted packet. Further, according to the technique of the present invention, each of the selected client servers transmits its respective spoofed response to the identified source device at substantially the same time. The client server associated with the spoofed response which is first received at the identified source device is considered to have the relatively shortest propagation delay to the identified source device, and is identified as the successful client server. Thereafter, the source device will be directed or redirected to communicate directly with the successful client server when subsequently attempting to access information from the host server.