Methods and apparatus for facilitating data transmission in a network are described. A first data request is received at a first intermediate platform, the first data request indicating a source platform and a destination platform. The first data request is redirected by the first intermediate platform to a first cache platform associated with the intermediate platform. Data received from the first cache platform and corresponding to the first data request are transmitted from the first intermediate platform to the source platform, the transmission indicating origination from the destination platform.
Andrew L. Foss - San Jose CA, US Ricky K. Lowe - Menlo Park CA, US Johnson Wu - Sunnyvale CA, US
Assignee:
Cisco Technology, Inc. - San Jose CA
International Classification:
G06F 12/14
US Classification:
713200
Abstract:
A system and method are disclosed for providing enhanced computer network security by scanning data, specifically electronic mail messages, sent to the network before the data is received and transmitted by the network's mail server. An e-mail message is received by a computer network configured to receive data and is checked as the data is received and before it is transmitted to a node on the computer network. The method includes determining whether an external source is attempting to establish a mail connection with the computer network configured to include a data scanning device that recognizes one or more data transfer protocols. Once the data is received the data scanning device begins evaluating the data by first determining whether the data is formatted according to one of the recognized protocols. The data scanning device begins scanning the data for acceptable content and format according to a rule set established by one of the recognized protocols. This is done at the same time as the data is received by the data scanning device.
Andrew L. Foss - San Jose CA, US Ricky K. Lowe - Menlo Park CA, US Johnson Wu - Sunnyvale CA, US
Assignee:
Cisco Technology, Inc. - San Jose CA
International Classification:
G06Q 99/00
US Classification:
705 64, 726 14, 713200
Abstract:
A system and method are disclosed for providing enhanced computer network security by scanning data, specifically electronic mail messages, sent to the network before the data is received and transmitted by the network's mail server. An e-mail message is received by a computer network configured to receive data and is checked as the data is received and before it is transmitted to a node on the computer network. The method includes determining whether an external source is attempting to establish a mail connection with the computer network configured to include a data scanning device that recognizes one or more data transfer protocols. Once the data is received the data scanning device begins evaluating the data by first determining whether the data is formatted according to one of the recognized protocols. The data scanning device begins scanning the data for acceptable content and format according to a rule set established by one of the recognized protocols. This is done at the same time as the data is received by the data scanning device.
Ratinder Paul Singh Ahuja - Saratoga CA, US Susan Carrie - Mountain View CA, US Chien C. Chou - San Jose CA, US Erik De La Iglesia - Mountain View CA, US Miguel Gomez - Fremont CA, US Liang Liu - San Jose CA, US Ricky K. Lowe - Atherton CA, US Rahoul Puri - Los Altos CA, US Kiet Tran - Saratoga CA, US Mark Aaron Wallace - San Jose CA, US Wei Wang - San Jose CA, US Todd E. Wayne - Santa Cruz CA, US Hui Zhang - Cupertino CA, US
Assignee:
Extreme Networks - Santa Clara CA
International Classification:
G06F 15/16
US Classification:
709227, 709228
Abstract:
Systems and related methods are described for handling one or more resource requests. A protocol engine receives a resource request in accordance with a prescribed protocol, and a classification engine determines a desired class of service for the request. An analysis engine optionally analyzes the request, and, responsive thereto, determines a desired sub-class of service for the request. A policy engine then allocates a resource to the request responsive to one or both of the desired class of service, and the desired sub-class of service.
Method Of And System For Allocating Resources To Resource Requests Based On Application Of Persistence Policies
Wei Wang - San Jose CA, US Hui Zhang - Cupertino CA, US Erik De La Iglesia - Mountain View CA, US Ricky K. Lowe - Atherton CA, US Kiet Tran - Saratoga CA, US Mark Aaron Wallace - San Jose CA, US
Assignee:
Extreme Networks - Santa Clara CA
International Classification:
G06F 15/16
US Classification:
709217, 709218, 709219, 709226, 709229
Abstract:
A system for and method of allocating a resource to a service request based on application of a persistence policy is described. In one embodiment, upon or after allocation of a resource to a resource request, an entry representing the allocation is made in a data structure using a first index derived from information relating to the resource request if such is available. An entry representing the allocation is also made in the data structure using a second index derived from information relating to the resource request. When a resource request is received, the data structure is accessed using the first index if such is available. If an entry corresponding to the first index is available, the resource corresponding to the entry is allocated to the request. If the first index or an entry corresponding to the first index is unavailable, the data structure is accessed using the second index. If an entry corresponding to the second index is available, the resource corresponding to the entry is allocated to the request.
Method Of And System For Analyzing The Content Of Resource Requests
Wei Wang - San Jose CA, US Miguel Gomez - Fremont CA, US Liang Liu - San Jose CA, US Ricky K. Lowe - Atherton CA, US Kiet Tran - Saratoga CA, US
Assignee:
Extreme Networks, Inc. - Santa Clara CA
International Classification:
G06F 15/173 G06F 17/30
US Classification:
709226, 707781, 709227, 709229, 709238
Abstract:
Systems and methods are described for analyzing the content of resource requests. A tokenizer parses the resource request and derives a key therefrom. A database associates values of the key with categories of service. An association engine uses the key to obtain one or more matching entries from the database, and derive therefrom the desired category of service for the resource request. A cookie engine derives cookie information from a cookie located in the resource request. A session engine derives session information from a session identifier located in a handshake message associated with the resource request. The desired category of service, the cookie information, and the session information are each useful for allocating a resource to the resource request.
Method Of And System For Analyzing The Content Of Resource Requests
Wei Wang - San Jose CA, US Miguel Gomez - Fremont CA, US Liang Liu - San Jose CA, US Ricky K. Lowe - Atherton CA, US Kiet Tran - Saratoga CA, US
Assignee:
Extreme Networks - Santa Clara CA
International Classification:
G06F 15/16
US Classification:
709229, 709225, 709227, 713153, 726 5
Abstract:
Systems and methods are described for analyzing the content of resource requests. A tokenizer parses the resource request and derives a key therefrom. A database associates values of the key with categories of service. An association engine uses the key to obtain one or more matching entries from the database, and derive therefrom the desired category of service for the resource request. A cookie engine derives cookie information from a cookie located in the resource request. A session engine derives session information from a session identifier located in a handshake message associated with the resource request. The desired category of service, the cookie information, and the session information are each useful for allocating a resource to the resource request.
Method Of And System For Allocating Resources To Resource Requests Based On Application Of Persistence Policies
Wei Wang - San Jose CA, US Hui Zhang - Cupertino CA, US Erik De La Iglesia - Mountain View CA, US Ricky K. Lowe - Atherton CA, US Kiet Tran - Saratoga CA, US Mark Aaron Wallace - San Jose CA, US
Assignee:
Extreme Networks, Inc. - San Jose CA
International Classification:
G06F 15/16
US Classification:
709226, 709201, 709203, 709218, 709229
Abstract:
A system for and method of allocating a resource to a service request based on application of a persistence policy is described. In one embodiment, upon or after allocation of a resource to a resource request, an entry representing the allocation is made in a data structure using a first index derived from information relating to the resource request if such is available. An entry representing the allocation is also made in the data structure using a second index derived from information relating to the resource request. When a resource request is received, the data structure is accessed using the first index if such is available. If an entry corresponding to the first index is available, the resource corresponding to the entry is allocated to the request. If the first index or an entry corresponding to the first index is unavailable, the data structure is accessed using the second index. If an entry corresponding to the second index is available, the resource corresponding to the entry is allocated to the request.
Googleplus
Ricky Lowe
Education:
University of Georgia - English, University of Georgia - Biology
Central Park Elementary School Birmingham AL 1964-1972, Charles A. Brown Elementary School Birmingham AL 1968-1971, Glenn High School Ensley AL 1971-1975, Glenn High School Birmingham AL 1975-1978
Jatina Crumpton, Big Reef, Amelia Amy, Shanta Bailey, Jessica Keith, James Cook, Donald Tobler, Tim Merchant, Elbert Griffin, Leonard Dewberry, Jay Harris