A method and system for demultiplexing packets of a message is provided. The demultiplexing system receives packets of a message, identifies a sequence of message handlers for processing the message, identifies state information associated with the message for each message handler, and invokes the m
A method and system for demultiplexing packets of a message is provided. The demultiplexing system receives packets of a message, identifies a sequence of message handlers for processing the message, identifies state information associated with the message for each message handler, and invokes the message handlers passing the message and the associated state information. The system identifies the message handlers based on the initial data type of the message and a target data type. The identified message handlers effect the conversion of the data to the target data type through various intermediate data types.
대표청구항▼
1. A method, comprising: receiving, at a computing device having a processing circuit, a packet of a message;determining, by the computing device, a key value for the packet, wherein the key value is determined based on one or more headers in the packet;using, by the computing device, the key value
1. A method, comprising: receiving, at a computing device having a processing circuit, a packet of a message;determining, by the computing device, a key value for the packet, wherein the key value is determined based on one or more headers in the packet;using, by the computing device, the key value to determine whether the computing device is currently storing a previously created path for the key value;in response to determining that no path is currently stored for the key value, the computing device: identifying, using the key value, one or more routines for processing the packet, including a routine that is used to execute a Transmission Control Protocol (TCP) to convert packets having a TCP format into a different format;creating a path using the identified one or more routines; andprocessing the packet using the created path. 2. The method of claim 1, wherein the created path stores state information for at least one of the identified one or more routines. 3. The method of claim 1, wherein the created path stores state information for each of the identified one or more routines. 4. The method of claim 1, wherein the created path specifies an ordering in which the identified one or more routines are to be performed to process the packet. 5. The method of claim 4, wherein the ordering specifies that an application layer protocol is to be performed subsequent to the TCP. 6. The method of claim 5, wherein the application layer protocol is HTTP, and wherein the different format is HTTP. 7. The method of claim 4, wherein the ordering specifies that a first execution of the TCP is to be followed by execution of an application layer protocol, which is to be followed by a second execution of the TCP. 8. The method of claim 7, wherein the first execution of the TCP receives information from a network and the second execution of the TCP sends information via the network. 9. The method of claim 4, wherein the ordering specifies that the TCP is an initial one of the one or more routines. 10. The method of claim 4, wherein the ordering specifies that the TCP is to be performed after performing an Ethernet protocol. 11. The method of claim 1, further comprising: receiving, at the computing device, a subsequent packet of the message;determining, by the computing device based on the subsequent packet, the key value;using, by the computing device, the key value to identify the created path for the message; andprocessing, by the computing device, the subsequent packet using the path. 12. The method of claim 11, wherein processing the subsequent packet includes: queuing the subsequent packet for one or more routines specified in the path; andperforming the one or more routines according to an ordering specified by the path, wherein performing at least one of the routines includes accessing state information stored in the path. 13. The method of claim 11, wherein packets of the message are all associated with a single TCP session. 14. The method of claim 1, wherein the key value includes an IP address and one or more port addresses. 15. A method, comprising: receiving, at a computing device having a processing circuit, a packet of a message;determining, by the computing device, a key value for the packet, wherein the key value is determined based on one or more headers in the packet;using, by the computing device, the key value to determine whether the computing device is currently storing a previously created path for the key value;in response to determining that no path is currently stored for the key value, the computing device: identifying, using the key value, one or more routines for processing the packet, including a routine that is used to execute a User Datagram Protocol (UDP) to convert packets having a UDP format into a different format;creating a path using the identified one or more routines; andprocessing the packet using the created path. 16. An apparatus, comprising: a network interface;a processor circuit;a memory storing program instructions executable by the processor circuit to: receiving, via the network interface, a packet of a message;determine a key value for the packet, wherein the key value is determined based on one or more headers in the packet;use the key value to determine whether the apparatus is currently storing a path for the key value, wherein one or more routines are specified in the path for processing packets of the message;in response to determining that no path is currently stored for the key value: identify, using the key value, one or more routines for processing the packet, including a particular routine that is used to execute a Transmission Control Protocol (TCP) to convert packets having a TCP format into a different format;create a path using the identified one or more routines;process the packet using the created path; andstore the path for use in processing subsequent packets in the message; andin response to determining that a path is currently stored for the key value; process the packet using the stored path. 17. The apparatus of claim 16, wherein the apparatus is configured to process the packet by queuing the packet for the one or more routines identified in the path. 18. The apparatus of claim 16, wherein the different format is an application layer format. 19. The apparatus of claim 16, wherein the particular routine is executable to utilize state information stored within the path. 20. The apparatus of claim 16, wherein the path stores state information for at least some of the one or more routines.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (96)
Heimendinger Larry M. ; McConnell Richard J., Apparatus and method for reception and transmission of information using different protocols.
Barry A. Spinney ; Krishna Narayanaswamy, Application-level data communication switching system and process for automatic detection of and quality of service adjustment for bulk data transfers.
Papierniak Karen A. ; Thaisz James E. ; Chiang Luo-Jen, Collection and integration of internet and electronic commerce data in a database during web browsing.
Hartmann Alfred C. ; Wakeland Carl K., Communication traffic circle system and method for performing packet conversion and routing between different packet formats including an instruction field.
Saito,Takeshi; Takabatake,Yoshiaki; Hashimoto,Mikio, Data transfer control device, relay device and control device suitable for home network environment.
Feiken Albertus,NLX ; De Lange Martin Klaas,NLX ; Roelofsen Gerrit,NLX ; Feijen Maurice Matthias,NLX ; Boly Jean Paul,NLX, Device for processing data packets.
Engel, Robert; Barzilai, Tsipora P.; Kandlur, Dilip Dinkar; Mehra, Ashish, Efficient classification, manipulation, and control of network transmissions by associating network flows with rule based functions.
Hluchyj Michael G. (Wellesley MA) Cook Steven R. (Franklin MA) Ahmed Hassan (Westwood MA), Fast packet adaptation method for ensuring packet portability across diversified switching type networks.
Alek Movshovich ; Robert H. Hoem ; Niranjan A. Puttaswamy ; Brian Lai, MPEG-2 transport demultiplexor architecture with non-time-critical post-processing of packet information.
Radia Sanjay R. ; Lim Swee Boon ; Tsirigotis Panagiotis ; Wong Thomas K. ; Goedman Robert J. ; Patrick Michael W., Method and apparatus for dynamic packet filter assignment.
Callon Ross W. ; Salkewicz William M. ; Smith Andrew H. ; Waldfogel Asher, Method and apparatus for managing virtual circuits and routing packets in a network/subnetwork environment.
Dietz, Russell S.; Maixner, Joseph R.; Koppenhaver, Andrew A.; Bares, William H.; Sarkissian, Haig A.; Torgerson, James F., Method and apparatus for monitoring traffic in a network.
Kihl Gye Tae,KRX ; Song Ik Chin,KRX ; Kim Choon Gil,KRX ; Lee Chul Ho,KRX ; Lim Young Soo,KRX, Method and apparatus for providing a number of subscribers with on-line banking service employing a plurality of bank systems.
Pearson Malcolm E. (Bellevue WA) Bray Brian D. (Vancouver CAX), Method and system for converting computer mail messages using an extensible set of conversion routines.
Balassanian, Edward, Method and system for demultiplexing a first sequence of packet components to identify specific components wherein subsequent components are processed without re-identifying components.
Segur Shawn Thomas, Method and system in a client-server for automatically converting messages from a first format to a second format compatible with a message retrieving device.
Beurket John Benjamin ; Malkin Peter Kenneth ; Rubin William Gregg ; Yu Philip Shi-Lung ; Ziedins Gunars, Method for collaborative transformation and caching of web objects in a proxy network.
Jorgensen, Jacob W., Method for the recognition and operation of virtual private networks (VPNs) over a wireless point to multi-point (PtMP) transmission system.
Cheriton David R. ; Bechtolsheim Andreas V., Method for traffic management, traffic prioritization, access control, and packet forwarding in a datagram computer network.
Mighdoll Lee S. ; Leak Bruce A. ; Perlman Stephen G. ; Goldman Phillip Y., Method of transcoding documents in a network environment using a proxy server.
Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
Agraharam Sanjay ; Bruno Richard Frank ; Cash Glenn Lawrence ; Markowitz Robert Edward ; Nurenberg Steven Howard ; O'Neil Joseph Thomas ; Ramamurthy Ram S. ; Rosen Kenneth H., Network information delivery system for delivering information based on end user terminal requirements.
Hershey Paul C. (Manassas VA) Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Matyas Stephen M. (Manassas VA) Waclawsky John G. (Frederick MD) Wilkins John D. (Somerville VA), Network security system and method using a parallel finite state machine adaptive active monitor and responder.
Moberg, Kenneth A.; Cartee, Claude A.; Stovall, Gregory D.; Hampton, David R.; Lougheed, Kirk Stewart; Marques, Pedro; Kolar, Timothy D.; Valencia, Andrew J.; May, Jr., William B., Packet processing using encapsulation and decapsulation chains.
Hughes James P. ; Olson Steve A., Policy caching method and apparatus for use in a communication device based on contents of one data unit in a subset of.
Sirer, Emin Gun; Bershad, Brian N., Process for rewriting executable content on a network server or desktop machine in order to enforce site specific properties.
Volftsun Lev ; Neighbors Clay H. ; Rednor Fred R. ; West Andrew Hardie,GBX ; Auerbach David ; Kingston Adrian Richard, Protocol conversion using channel associated signaling.
Peter K. Craft ; Olive M. Philbrick ; Laurence B. Boucher ; David A. Higgen, Protocol processing stack for use with intelligent network interface device.
Cremin, Con; O'Callaghan, Sorcha; Nolan, David; Beechinor, Raymond; Gahan, Richard A, System and method for dynamically mapping a high speed link to a multiplicity of low speed trunked links.
McManis Charles E. ; Yellin Frank, System and method for generating trusted, architecture specific, compiled versions of architecture neutral programs.
Spinney Barry A. ; Poole Nigel T. ; Narayanaswamy Krishna ; Ross Theodore L. ; Szmauz Richard, System and process for application-level flow connection of data processing networks.
van Loo ; Jr. Gerrit J. (Heerlen NLX) Noll Joachim (Aachen DEX) Schwope Andreas (Wurselen DEX), System for processing data structures in a node of a communication network.
Shwed Gil,ILX ; Kramer Shlomo,ILX ; Zuk Nir,ILX ; Dogon Gil,ILX ; Ben-Reuven Ehud,ILX, System for securing the flow of and selectively modifying packets in a computer network.
Clayton, Michele Catherine Ann Mazza; Alexander, Elaine Harriett; Tunny, John Francis; Stinson, Michael Keith, Trusted elements within a distributed bandwidth system.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.