Claims
- 1. A method allowing for dynamic detection of network devices located along a communications path that include compatible transformation tunnel capabilities, at least one of the network devices operative to recognize probe requests and transmit a probe response including transformation tunnel capabilities in response to the probe request, the method comprising the steps of:
detecting a first data flow to a destination host; probing the path to the destination host to identify network devices having compatible transformation tunnel capabilities; and, if a network device is identified in the probing step, transforming subsequent data flows, and/or subsequent packets in the first data flow, to the destination host from a first state to a second state and tunneling the data flows to the identified network device.
- 2. The method of claim 1 wherein the probing step comprises the steps of
transmitting a probe request to the destination host; and receiving a probe response from a network device in the path to the destination host.
- 3. The method of claim 1 further comprising the step of
transforming, at the identified network device, the data flows from the second state to a third state; and transmitting the data flows to the destination host.
- 4. The method of claim 3 wherein the third state is substantially the same as the first state.
- 5. The method of claim 1 wherein the probing step is conditioned on detection of a threshold level of activity associated with the destination host.
- 6. The method of claim 5 wherein the threshold level of activity comprises a minimum number of data flows to the destination host over an analysis interval.
- 7. The method of claim 5 wherein the threshold level of activity comprises a minimum number of bytes transmitted to the destination host over an analysis interval.
- 8. The method of claim 5 wherein the threshold level of activity comprises a minimum average data flow rate associated with the destination host over an analysis interval.
- 9. The method of claim 1 further comprising the step of selecting the network device furthest along the path to the destination host, if a plurality of network devices are identified in the probing step.
- 10. The method of claim 2 further comprising the step of selecting the network device furthest along the path to the destination host, if a plurality of network devices are identified in the probing step.
- 11. The method of claim 10 wherein the responding network devices transmit probe responses in response to probe requests, wherein the probe responses are TCP/IP packets including a predefined Time-To-Live value; and the selecting step is determined on the basis of the Time-To-Live values of the probe responses transmitted by the plurality of network devices.
- 12. The method of claim 1 wherein the transforming step comprises compressing data associated with the data flows in a format the identified network device can decompress.
- 13. The method of claim 1 wherein the transforming step comprises caching data associated with the data flows.
- 14. The method of claim 1 wherein the transforming step comprises encrypting data associated with the data flows in a format the identified network device can decrypt.
- 15. A method allowing for optimization of communications paths associated with a computer network by dynamic detection of network devices located along a communications path that include compatible transformation tunnel capabilities, at least one of the network devices operative to recognize probe requests and transmit a probe response including transformation tunnel capabilities in response to the probe request, the method comprising the steps of:
detecting a data flow to a destination host; if the path to the destination host has not been probed, then:
probing the path to the destination host to identify network devices having compatible transformation tunnel capabilities; and, −associating a network device identified in the probing step with the destination host; and, if a network device is associated with a destination host, transforming data flows to the destination host from a first state to a second state and tunneling the data flows to the associated network device.
- 16. The method of claim 15 wherein the probing step comprises the steps of
transmitting a probe request to the destination host; and receiving a probe response from a network device in the path to the destination host.
- 17. The method of claim 15 further comprising the step of
transforming, at the identified network device, the data flows from the second state to a third state; and transmitting the data flows to the destination host.
- 18. The method of claim 17 wherein the third state is substantially the same as the first state.
- 19. The method of claim 15 wherein the probing step is conditioned on detection of a threshold level of activity associated with the destination host.
- 20. The method of claim 15 further comprising the step of
selecting the network device furthest along the path to the destination host, if a plurality of network devices are identified in the probing step.
- 21. The method of claim 20 wherein the responding network devices transmit probe responses in response to probe requests, wherein the probe responses are TCP/IP packets including a predefined Time-To-Live value; and the selecting step is determined on the basis of the Time-To-Live values of the probe responses transmitted by the plurality of network devices.
- 22. An apparatus allowing for automatic detection of network devices located in a 20 communications path that include compatible transformation tunnel capabilities, comprising:
a packet processor operably connected to a computer network to monitor data flows traversing communication paths associated with the computer network to respective destination hosts; a transformation tunnel mechanism including transformation tunnel capabilities operative to transform data flows from a first state to a second state;
wherein the transformation tunnel mechanism is further operative to establish a tunnel with a network device having compatible transformation tunnel capabilities located in a communications path associated with the computer network; a probe module operative to probe for network devices along communications paths to destination hosts that include compatible transformation tunnel capabilities in response to data flows detected by the packet processor;
wherein the probe module is operative to associate destination hosts with respective network devices along communication paths thereto having compatible transformation tunnel capabilities; wherein the packet processor is further operative to channel data flows to the transformation tunnel mechanism, wherein the channeled data flows are bound for destination hosts associated with network devices identified by the probe module.
- 23. The apparatus of claim 22 wherein the probe module is operative to transmit probe requests along communication paths to destination hosts in response to new data flows, and
wherein the probe request causes compatible network devices along the path to communicate transformation tunnel capabilities to the apparatus.
- 24. The apparatus of claim 22 wherein the packet processor is operative to identify new destination hosts associated with data flows and store the computer network address of the destination host in a database.
- 25. The apparatus of claim 24 wherein the probe module stores network devices having compatible transformation tunnel capabilities in the database in association with corresponding destination hosts.
- 26. The apparatus of claim 22 further comprising a traffic class engine operative to classify data flows traversing the packet processor into one of a plurality of traffic types;
wherein traffic types associated with data flows are operative to condition the operation of the probe module with respect to the destination hosts associated with such data flows.
- 27. The apparatus of claim 22 further comprising a traffic class engine operative to classify data flows traversing the packet processor into one of a plurality of traffic types;
wherein the traffic types associated with the data flows are operative to condition the channeling of such data flows to the transformation tunnel mechanism.
- 28. The apparatus of claim 27 wherein traffic types associated with data flows are further operative to condition the operation of the probe module with respect to the destination hosts associated with such data flows.
- 29. A system allowing for dynamic detection of network devices that include compatible transformation tunnel capabilities, the network devices located along a communications path between a first host node and a second host node, comprising
a tunnel probing device operably connected to a computer network; wherein the tunnel probing device comprises: a packet processor operative to monitor data flows traversing communication paths associated with the computer network to respective destination hosts; a transformation tunnel mechanism including transformation tunnel capabilities operative to transform data flows from a first state to a second state;
wherein the transformation tunnel mechanism is further operative to establish a tunnel with a network device having compatible transformation tunnel capabilities located in a communications path associated with the computer network; a probe module operative to probe for network devices along communications paths to destination hosts that include compatible transformation tunnel capabilities in response to data flows detected by the packet processor;
wherein the probe module is operative to associate destination hosts with respective network devices along communication paths thereto having compatible transformation tunnel capabilities; wherein the packet processor is further operative to channel data flows to the transformation tunnel mechanism, wherein the channeled data flows are bound for destination hosts associated with network devices identified by the probe module; and, at least one network device operably connected to the computer network, wherein the network device comprises a transformation tunnel mechanism including at least one transformation tunnel capability; wherein the network device is operative to communicate transformation tunnel capabilities to the tunnel probing device in response to probe requests.
CROSS-REFERENCE TO RELATED APPLICATIONS
[0001] This application makes reference to the following commonly owned U.S. patent applications and patents, which are incorporated herein by reference in their entirety for all purposes:
[0002] U.S. patent application Ser. No. 08/762,828, now U.S. Pat. No. 5,802,106 in the name of Robert L. Packer, entitled “Method for Rapid Data Rate Detection in a Packet Communication Environment Without Data Rate Supervision;”
[0003] U.S. patent application Ser. No. 08/742,994 now U.S. Pat. No. 6,038,216, in the name of Robert L. Packer, entitled “Method for Explicit Data Rate Control in a Packet Communication Environment Without a Data Rate Supervision;”
[0004] U.S. patent application Ser. No. 09/977,642 now U.S. Pat. No. 6,046,980, in the name of Robert L. Packer, entitled “System for Managing Flow Bandwidth Utilization at Network, Transport and Application Layers in Store and Forward Network;” and
[0005] U.S. patent application Ser. No. 09/198,090 now U.S. Pat. No. ______, in the name of Guy Riddle and Robert L. Packer, entitled “Method for Automatically Classifying Traffic in a Packet Communications Network.”