Claims
- 1. A device for communicating with a network, the device storing content accessible by other devices communicating with the network, the device including:
a counter associated with the content; a threshold value; means for incrementing the counter associated with the content in response to a request for the content; and means for re-directing requests to the content in response to a value of the counter exceeding the threshold.
- 2. The device of claim 1, wherein the means for re-directing includes means for discarding the request.
- 3. The device of claim 1, wherein the means for re-directing includes means for forwarding the request to a load-sharing device in the network.
- 4. The device of claim 1, wherein the content comprises legitimate content and threatening content, wherein the device includes a first threshold associated with the legitimate content and a second threshold associated with the legitimate content.
- 5. The device of claim 4, wherein the first threshold and second threshold are different.
- 6. The device of claim 1, further comprising a threshold indicator flag, for indicating when the count has exceeded the threshold.
- 7. The device of claim 1, wherein the device is a wireless device.
- 8. The device of claim 1, wherein the device is an IP device.
- 9. The device of claim 1, wherein the content is e-business content.
- 10. A method for preventing traffic congestions at a device communicating with a network, the method comprising the steps of:
monitoring requests for content at the device; for each request for content at the device, incrementing a counter associated with the content; re-directing requests for the content when the counter associated with the content exceeds a pre-determined value.
- 11. The method of claim 10, wherein the step of re-directing includes discarding the request.
- 12. The method of claim 10, wherein the step of re-directing includes forwarding the request to another, load-sharing device in the network.
- 13. The method of claim 10, further comprising the step of distinguishing requests for threatening content from requests for legitimate content.
- 14. A network comprising:
At least two devices, communicating with each other via the network, the devices storing content accessible by the other device, at least one of the devices including: a counter associated with the content; a threshold value; means for incrementing the counter associated with the content in response to a request for the content; and means for re-directing requests to the content in response to a value of the counter exceeding the threshold.
- 15. The network of claim 14, wherein the network is an integrated optical and wireless network.
- 16. The network of claim 14, wherein the means for re-directing includes means for forwarding the request to another one of the at least two devices in the network, and wherein the at least two devices are load-sharing devices.
Parent Case Info
[0001] This application claims priority to a previously filed provisional application, Ser. No. 60/288,099, filed May 3, 2001.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60288099 |
May 2001 |
US |