scispace - formally typeset
Patent

Agile network protocol for secure communications with assured system availability

Reads0
Chats0
TLDR
In this article, a load balancer that distributes packets across different transmission paths according to transmission path quality is introduced, along with a DNS proxy server that transparently creates a virtual private network in response to a domain name inquiry.
Abstract
A plurality of computer nodes communicate using seemingly random Internet Protocol source and destination addresses. Data packets matching criteria defined by a moving window of valid addresses are accepted for further processing, while those that do not meet the criteria are quickly rejected. Improvements to the basic design include (1) a load balancer that distributes packets across different transmission paths according to transmission path quality; (2) a DNS proxy server that transparently creates a virtual private network in response to a domain name inquiry; (3) a large-to-small link bandwidth management feature that prevents denial-of-service attacks at system chokepoints; (4) a traffic limiter that regulates incoming packets by limiting the rate at which a transmitter can be synchronized with a receiver; and (5) a signaling synchronizer that allows a large number of nodes to communicate with a central node by partitioning the communication function between two separate entities.

read more

Citations
More filters
Patent

Network printing system, web server, printing apparatus and program

TL;DR: In this article, the facsimile machine extracts the periodical subscription setting data from the data packet and the setting of periodical subscriptions is performed based on the data set data.
Patent

Managing cyber attacks through change of network address

TL;DR: In this article, a system for responding to a cyber-attack on a server is proposed, in which a notification is sent to a server administrator that a cyber attack is occurring and the number of cyber-attacks on the server has exceeded a predetermined threshold.
Patent

Datagram identifier management

TL;DR: In this article, the authors present a method to ensure that datagrams retain integrity in light of the problems associated with the internetworking protocol's use of datagram identifiers drawn from a first pool of dataagram identifiers.
Patent

Method and apparatus for controlling an unmanned aircraft

TL;DR: In this paper, a flight of a UAV is adjusted according to the second control signals received from a network device where the second controller signals are not sourced by the remote control device.
Patent

Method and system of network communication privacy between network devices

TL;DR: In this paper, a method for network communication privacy between network devices is proposed, which includes communicating first and second network enabled devices with a network, the first and the second network devices in communication via a main communication channel.
References
More filters
Journal ArticleDOI

A method for obtaining digital signatures and public-key cryptosystems

TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Journal ArticleDOI

The Bargaining Problem

John F. Nash
- 01 Apr 1950 - 
TL;DR: In this paper, a new treatment is presented of a classical economic problem, one which occurs in many forms, as bargaining, bilateral monopoly, etc It may also be regarded as a nonzero-sum two-person game in which a few general assumptions are made concerning the behavior of a single individual and of a group of two individuals in certain economic environments.

An Architecture for Differentiated Service

TL;DR: An architecture for implementing scalable service differentiation in the Internet achieves scalability by aggregating traffic classification state which is conveyed by means of IP-layer packet marking using the DS field [DSFIELD].
Proceedings Article

Hypertext Transfer Protocol -- HTTP/1.1

TL;DR: The Hypertext Transfer Protocol is an application-level protocol for distributed, collaborative, hypermedia information systems, which can be used for many tasks beyond its use for hypertext through extension of its request methods, error codes and headers.
Book

Cryptography and Network Security: Principles and Practice

TL;DR: The new edition of William Stallings' Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students.