Method, intermediate device and computer program code for maintaining persistency

Information

  • Patent Grant
  • 9967331
  • Patent Number
    9,967,331
  • Date Filed
    Thursday, July 2, 2015
    9 years ago
  • Date Issued
    Tuesday, May 8, 2018
    6 years ago
Abstract
A method for maintaining server persistency, including: (a) receiving, by an intermediate entity, a first session request from client to receive a service from a server out of a plurality of servers that are connected to the intermediate entity; (b) selecting a server out of the plurality of servers and directing to the selected server information indicative of the first session request; (c) receiving a response of the selected server to the information indicative of the first session request; (d) analyzing the response of the selected server, to provide an analysis result indicative whether the response includes code to be executed by the client and includes at least one instruction that facilitates sending, by the client, another request, to receive a service from a server out of the plurality of servers; (e) modifying, based on the analysis result, the code by adding information that will cause the client to send a selected server identifier in association to the sending of the other request; and (f) sending a modified response to the client, wherein the modified response includes the modified code.
Description
FIELD OF THE INVENTION

This application relates to dynamically changing browser code by an intermediate unit and especially relates to a method, an intermediate device and a computer program code for maintaining server persistency.


BACKGROUND OF THE INVENTION

Maintaining server persistency in web-based environment is a well known requirement for every web-based property that would like to maintain clients' sessions' context for environments with multiple identical web-servers, as the underline HTTP protocol is stateless by its nature. This mechanism is usually implemented by Application Delivery Controller (ADC) internal or external to the servers. One of the main duties of ADC is to balance the load between multiple, function-identical servers. With ADC, these servers look like a single high-powered computing resource that allows many clients to access it simultaneously, and then balances the load between these function-identical web-servers. Few existing load-balancing mechanisms are known in the art and will not be described by this paper. When an ADC is configured to work with persistency, it guarantees that client's consecutive requests which belong to the same session will follow the same destination server as the first session request. The following main techniques are available today for achieving this functionality: (i) maintaining session persistency by source IP address, (ii) maintaining session persistency by HTTP session cookie, (iii) Maintaining session persistency by adding session identifier to URI part of the URL; and (IV) maintaining session persistency using a URL identifier.


Maintaining session persistency by source IP address—in this case the ADC looks for the source IP address of the client (the source IP address appears in every TCP/IP packet that carries HTTP traffic) and forwards all the requests which are coming from the same IP address to the same destination web-server. This method is poorly working when many users are accessing the same web-based application through Mega-Proxy server(s) (e.g. AOL service provider users). Mega-Proxy/proxy server replaces the client source IP addresses with its own addresses pool, thus forcing the ADC to forward all the clients to the same web-server, thus creating unbalanced environment.


Maintaining session persistency by HTTP session cookie—cookie is a well-know mechanism for maintaining session states by the web-server. When a web-server sets a session cookie in a response to a client request, the client is forced (by his/her browser software) to send this cookie header for every consecutive request to the same domain/site during that session. An ADC which sits between the server and the client can trace/modify/add a dedicated cookie header on the server response, in-order to signal itself to which server to forward the next requests from that particular client on the way back. Although this method is commonly used, it doesn't solve the issue of persistency when cookie mechanism is disabled by the client. A description of this method can be found in U.S. Pat. No. 6,473,802 which is incorporated herein by reference.


Maintaining session persistency by adding a session identifier to URI part of URL—when cookie isn't supported by the client, the web-server (by adjusting its code) can add session identifier to the URI part of the URL in every HTML response it sends. The ADC then traces the session identifier on the server response and saves this information in its internal memory together with the identifier of the server from which the response has come. Upon receiving the next request from the client, the ADC matches the URL identifier with those which are stored in its memory and forwards the request to the designated server which appears in its memory. This method will only work when the server code is adjusted to add URL identifier for every URL in the HTML response, and it significantly increases the processing overhead of the web-server. The method of maintaining session persistency without client supported cookie is described by U.S. Pat. No. 7,296,076 of Portolani which is incorporated herein by reference.


Maintaining session persistency using a URL identifier—this method is a combination of methods 2 and 3 above, whether or not the client supports cookie, the persistency is achieved by adding server identifier to every URL in the HTML server response. On the first client's request the ADC selects one server out of plurality of servers according to its load-balancing algorithm, and then later adds this server identifier to all the URLs which appear on the server's HTML response. The next coming requests from this particular client will include the server identifier, as part of the URL, to which the request should be forwarded to; the ADC then deletes this identifier, to prevent unexpected server behavior, and forwards the request according to the deleted server identifier value. An example of how to maintain persistency using URL identifier can be found in US patent application publication serial number 2003/0163586 of Schnetzler.


Method 4 above, does not address the issue of persistency in modern web-based environments where server's responses include browser code program, such as Java Script, Flash, Silvertight, AJAX, etc. These browser codes hide the URLs that will be sent by the client's browser program in a non-standard way, e.g. every browser code programmer can select his/her own way of writing the code, making the response URL modification task impossible.


SUMMARY THE INNOVATION

The present invention provides methods and intermediate devices as described in the accompanying claims. Specific embodiments of the invention are set forth in the dependent claims. These and other aspects of the invention will be apparent from and elucidated with reference to the embodiments described hereinafter.


The present invention provides methods and intermediate devices as described in the accompanying claims. Specific embodiments of the invention are set forth in the dependent claims. These and other aspects of the invention will be apparent from and elucidated with reference to the embodiments described hereinafter.


A method for maintaining server persistency, the method includes: receiving, by an intermediate entity, a first session request from client to receive a service from a server out of a plurality of servers that are coupled to the intermediate entity; selecting a server out of the plurality of servers and directing to the selected server information indicative of the first session request; receiving a response of the selected server to the information indicative of the first session request; analyzing the response of the selected server, to provide an analysis result indicative whether the response comprises code to be executed by the client and comprises at least one instruction that facilitates sending, by the client, another request to receive a service from a server out of the plurality of servers of the same site (plurality of servers that reside on the same site); modifying, in response to the analysis result, the code by adding information that will cause the client to send a selected server identifier in association to the sending of the other request; and sending a modified response to the client, wherein the modified response comprises the modified code.


The method can include analyzing the response of the selected server to locate browser code to be executed by a browser of the client.


The method can include analyzing the response of the selected server to locate at least one instruction that is executed by a browser of the client and includes a call to an entity to enable sending the other request, wherein the entity is selected from a group consisting of an operating system of the client and an API layer between the browser code and the operating system of the client.


The method can include adding an HTTP header for each call instruction of the code, wherein each HTTP header includes the selected server identifier, if the other request and the modified response are associated with a same site.


The method can include receiving, by the intermediate node, the other request from the client; removing the selected server identifier to provide a modified other request; and sending to the selected server information indicative of the modified other request.


The method can include receiving a selected server response that includes compressed code; de-compressing the compressed code to provide de-compressed code; wherein the analyzing includes analyzing the de-compressed code; wherein the modifying includes modifying, in response to the analysis result, the de-compressed code by adding information that will cause the client to send a selected server identifier in association to the sending of the other request; compressing the modified de-compressed code to provide a compressed modified code; and sending a modified response to the client, wherein the modified response includes the compressed modified code.


The method can include receiving a selected server response that includes encrypted code; decrypting the encrypted code to decrypted code; wherein the analyzing includes analyzing the decrypted code; wherein the modifying includes modifying, in response to the analysis result, the decrypted code by adding information that will cause the client to send a selected server identifier in association to the sending of the other request; encrypting the modified decrypted code to provide an encrypted modified code; and sending a modified response to the client, wherein the modified response includes the encrypted modified code.


The method can include modifying, in response to the analysis result, the code by adding information that will cause the client to send a selected server identifier in association to the sending of the other request if the other request and the modified response are associated with a same site.


An intermediate device, including: a client interface configured to receive a first session request from client to receive a service from a server out of a plurality of servers; a server selector configured to select a server out of the plurality of servers; a server interface, coupled to the plurality of servers and configured to direct to the selected server information indicative of the first session request and to receive a response of the selected server to the information indicative of the first session request; an analyzer configured to analyze the response of the selected server, to provide an analysis result indicative whether the response includes code to be executed by the client and includes at least one instruction that facilitates sending, by the client, another request to receive a service from a server out of the plurality of servers; a modifier configured to modify, in response to the analysis result, the code by adding information that will cause the client to send a selected server identifier in association to the sending of the other request and wherein the client interface is further adapted to send a modified response to the client, wherein the modified response includes the modified code.


The analyzer is configured to analyze the response of the selected server to locate browser code to be executed by a browser of the client.


The analyzer is configured to analyze the response of the selected server to locate at least one instruction that is executed by a browser of the client and includes a call to an entity to enable sending the other request, wherein the entity is selected from a group consisting of an operating system of the client and an API layer between the browser code and the operating system of the client.


The modifier is configured to add an HTTP header for each call instruction of the code, if the other request and the modified response are associated with a same site, wherein each added HTTP header includes the selected server identifier.


The client interface is configured to receive, by the intermediate node, the other request from the client; wherein the modifier is configured to remove the selected server identifier to provide a modified other request; and the client interface is configured to send to the selected server information indicative of the modified other request.


The intermediate device can include a de-compressor and a compressor; wherein the server interface is configured to receive a selected server response that includes compressed code; wherein the de-compressor is configured to de-compress the compressed code to provide decompressed code; wherein the compressor is configured to compress decompressed modified code received from the modifier to provide a compressed modified code; and wherein the client interface is configured to send a modified response to the client, wherein the modified response includes the compressed modified code.


The intermediate device can include a decryptor and a encryptor; wherein the server interface is configured to receive a selected server response that includes encrypted code; wherein the decryptor is configured to decrypt the encrypted code to provide decrypted code; wherein the encryptor is configured to decrypt decrypted modified code received from the modifier to provide an encrypted modified code; and wherein the client interface is configured to send a modified response to the client, wherein the modified response includes the encrypted modified code.


The intermediate device can include a modifier that is configured to modify, in response to the analysis result, the code by adding information that will cause the client to send a selected server identifier in association to the sending of the other request if the other request and the modified response are associated with a same site.


A computer program product that includes a computer readable non-transitory medium that stores instructions for: receiving, by an intermediate entity, a first session request from client to receive a service from a server out of a plurality of servers that are coupled to the intermediate entity; selecting a server out of the plurality of servers and directing to the selected server information indicative of the first session request; receiving a response of the selected server to the information indicative of the first session request; analyzing the response of the selected server, to provide an analysis result indicative whether the response includes code to be executed by the client and includes at least one instruction that facilitates sending, by the client, another request to receive a service from a server out of the plurality of servers of the same site; modifying, in response to the analysis result, the code by adding information that will cause the client to send a selected server identifier in association to the sending of the other request and sending a modified response to the client, wherein the modified response includes the modified code.


The computer program product can include a computer readable medium that stores instructions for analyzing the response of the selected server to locate browser code to be executed by a browser of the client.


The computer program product can include a computer readable medium that stores instructions for analyzing the response of the selected server to locate at least one instruction that is executed by a browser of the client and includes a call to an operating system of the client to enable sending the other request.


The computer program product can include a computer readable medium that stores instructions for adding an HTTP header for each call instruction of the code, if the other request and the modified response are associated with a same site, wherein each HTTP header includes the selected server identifier.


The computer program product can include a computer readable medium that stores instructions for: receiving, by the intermediate node, the other request from the client; removing the selected server identifier to provide a modified other request; and sending to the selected server information indicative of the modified other request.


The computer program product can include a computer readable medium that stores instructions for: receiving a selected server response that includes compressed code; de-compressing the compressed code to provide de-compressed code; analyzing the de-compressed code; modifying, in response to the analysis result, the de-compressed code by adding information that will cause the client to send a selected server identifier in association to the sending of the other request; compressing the modified de-compressed code to provide a compressed modified code: and sending a modified response to the client, wherein the modified response includes the compressed modified code.


The computer program product can include a computer readable medium that stores instructions for: receiving a selected server response that includes encrypted code; decrypting the encrypted code to decrypted code; analyzing the decrypted code; modifying, in response to the analysis result, the decrypted code by adding information that will cause the client to send a selected server identifier in association to the sending of the other request; encrypting the modified decrypted code to provide an encrypted modified code; and sending a modified response to the client, wherein the modified response includes the encrypted modified code.


The computer program product can include a computer readable medium that stores instructions for modifying, in response to the analysis result, the code by adding information that will cause the client to send a selected server identifier in association to the sending of the other request if the other request and the modified response are associated with a same site.





BRIEF DESCRIPTION OF THE DRAWINGS

Further details, aspects, and embodiments of the invention will be described, by way of example only, with reference to the drawings.



FIG. 1 illustrates an intermediate entity such as application delivery controller, clients, network and multiple servers according to an embodiment of the invention;



FIG. 2 illustrates a method for maintaining server persistency, according to an embodiment of the invention.



FIG. 3 illustrates a method according to an embodiment of the invention; and



FIG. 4 illustrates a method according to an embodiment of the invention.





DETAILED DESCRIPTION OF THE DRAWINGS

Because the apparatus implementing the present invention is, for the most part, composed of electronic components and circuits known to those skilled in the art, circuit details will not be explained in any greater extent than that considered necessary as illustrated above, for the understanding and appreciation of the underlying concepts of the present invention and in order not to obfuscate or distract from the teachings of the present invention.


In the following specification, the invention will be described with reference to specific examples of embodiments of the invention. It will, however, be evident that various modifications and changes may be made therein without departing from the broader spirit and scope of the invention as set forth in the appended claims.


It has been shown that persistency can be maintained when a server response includes client code. By modifying the code the client, when executing the code, sends in association with a request to obtain a service from a server, a server identifier that identifies the server that was selected to provide a response.


Conveniently, the method can be executed without using dedicated HTTP cookies.


According to an embodiment of the invention, on the first client request (to receive a service from a server) an intermediate entity (such as but not limited to an application delivery controller—ADC) selects a selected server (for example—by applying a load balancing algorithm) to which the request should be forwarded to. When the response of the selected server (selected server response) is received by the intermediate entity it analyzes the response to determine whether a certain code is included in the server response (The certain code includes one or more instructions that facilitate sending, by the client, another request to receive a service from a server out of the plurality of servers of the same site). If the answer is negative the response is sent (conveniently without being modified) to the client. If the analysis indicates that the selected server response includes the certain code then the intermediate entity modifies that certain code by adding information that will cause the client to send a selected server identifier in association to the sending of the other request. A modified response that includes the modified code is sent to the client.



FIG. 1 illustrates an intermediate device such as application delivery controller (ADC) 100, clients 10(1)-10(n), network 20, and multiple servers 30(1)-30(k), according to an embodiment of the invention.


ADC 100 is connected to multiple servers 30(1)-30(k) via server interface 120 and is connected via client interface 110 and network 20 to clients 10(1)-10(n).


ADC 100 includes, in addition to server interface 120 and client interface 110, server selector 130, analyzer 140, modifier 150, decryptor 160, encryptor 170, de-compressor 180 and compressor 190. It is noted that each of these modules can include hardware, software or a combination thereof. It is further noted that some modules (such as decryptor 160, encryptor 170, de-compressor 180 and compressor 190) are optional.


Client interface 110 receives a request from a client to receive a service from a server out of servers 30(1)-30(k). After a connection was established with a client, that client can send a first session request (which conveniently refers to the first session request of a client session) or additional session requests. A first session request after the establishment of the session requires an allocation of a server out of servers 30(1)-30(k) while other requests follow the allocation. The other requests include a unique server identifier that is indicative of a server (out of servers 30(1)-30(k) that was previously selected by ADC 100. The client sends the unique server identifier inside the following requests based on the modified response code that was sent to it by ADC 100.


The service requested by the client can involve sending information to the client from the server, executing a program by the server, sending to the client web pages, and the like.


In order to determine whether a received request is the first session request, client interface 110 sends it to analyzer 140.


Analyzer 140 that can determine whether a server was already assigned to respond to the client by searching the unique server identifier. If such unique server identifier exists, ADC 100 sends the request to the selected server associated with the unique server identifier; otherwise, the request is sent to server selector 130.


Server selector 130 is configured to select a server out of plurality of servers 30(1)-30(k). It can apply a load balancing algorithm, but this is not necessarily so.


Once the selection of the selected server is made, server selector 130 sends an indication to server interface 120 that directs information indicative of the first session request to the selected server. The information can be the first session request itself but this is not necessarily so.


The selected server (out of servers 30(1)-30(k)) then sends to ADC 100 a selected server response (responsive to the information sent from ADC 100) that is received by server interface 120.


The selected server response is sent to analyzer 140 that is configured to analyze the response of the selected server and to provide an analysis result. The analysis result indicates the selected server response includes code to be executed by the client and includes at least one instruction that facilitates sending, by the client, another request to receive a service from a server out of the plurality of servers. If such a code is included in the selected server response than the code is sent to modifier 150.


Analyzer 140 can include an application parser engine that parses the code as well as determines whether the code should de-compressed (by de-compressor 180) or decrypted (by decryptor 160) before being modified by modifier 150.


Modifier 150 is configured to modify the code, in response to the analysis result, by adding information that will cause the client to send a selected server identifier in association to the sending of the other request. According to an embodiment of the invention, modifier 150 is configured to modify, in response to the analysis result, the code by adding information that will cause the client to send the selected server identifier in association to the sending of the other request if it is destined to the same site from which the modified response has been received. Modifier 150 can include a browser code engine that can amend the code to include information that will cause the client to send a selected server identifier in association to the sending of the other request. The information can include one or more instructions, one of more data fields (such as a HTTP header) and the like. Modifier can include a browser code engine that can add a HTTP ServerID header to the browser code, whenever the browser code sends request to a web site that can be serviced by the selected browser.


Modifier 150 can, for example, parse the browser code and mark all the locations where the browser should call the client's operating system (or an API layer between the browser code and the operating system of the client) for sending HTTP requests. In these locations modifier 150 adds a unique HTTP header for each of these calls that will be sent to the client with the next requests and includes a selected server identifier that will signal to ADC 100 which is the selected server. According to an embodiment of the invention, the modifier adds the HTTP header if the request is destined to the same site from which the modified response has been received.


It is noted that, conveniently, the modification of the code is only applied to the cases where the browser code sends request to the site where the ADC is installed. When the code sends requests to other sites the code modification is conveniently not applied.


Modifier 150 outputs a modified response that is sent by client interface 110 to the client.


Modifier 150 can be configured to modify the code, in response to the analysis result, by adding information that will cause the client to send a selected server identifier in association to the sending of the other request if the other request and the modified response are associated with the same site (or group of associated addresses). For example—if the other request is destined to the site from which the modified response has been received.


According to various embodiments of the invention ADC 100 also includes decryptor 160, encryptor 170, de-compressor 180 and compressor 190.


Decryptor 160 can decrypt an encrypted selected server response or at least an encrypted code within the selected server response to provide a decrypted code. The decrypted code can then be sent to analyzer 140 and/or to modifier 150. Encryptor 170 can encrypt a modified response or at least a modified code. The encrypted modified code can then be sent (within a modified response) to the client.


Decryptor 160 and encryptor 170 can be included within an SSL Engine, but this is not necessarily so.


De-compressor 180 can de-compress a compressed selected server response or at least a compressed code within the selected server response to provide a de-compressed code. The de-compressed code can then be sent to analyzer 140 and/or to modifier 150. Compressor 190 can compress a modified response or at least a modified code. The compressed modified code can then be sent (within a modified response) to the client.


It is noted that ADC 100 can apply both compression and encryption of code. For example, it can decrypt and de-compress code and send it to modifier 150 (or analyzer 140) and then compress and encrypt the modified code.


ADC 100 can include additional modules such as communication modules (including but not limited to a L2 switching module, an L3 routing module, a TCP termination engine) responsive to managing the communication between clients and servers.


According to various embodiments of the invention ADC 100 can also apply at least one prior art method for managing requested server requests that do not include code. It can, for example, maintain session persistency by using a URL identifier.



FIG. 2 illustrates method 200 for maintaining server persistency, according to an embodiment of the invention.


Method 200 starts by stage 210 of receiving, by an intermediate entity, from a client a request to receive a service from a server out of a plurality of servers. The intermediate entity is connected between one or more clients and one or more servers.


Stage 210 is followed by stage 240 of determining whether to select a server out of the multiple servers or not. Stage 240 includes determining whether the request includes a server identifier that identifies one of the multiple servers. If such an identifier exists then information representing the request is sent to that server. This can occur if the request is not the first session request from the client after a session with the client was established—where a selection of a selected server has already occurred.


If the answer is positive—a server identifier exists—then stage 240 is followed by stage 260 of sending information representative of the request to the selected server. Stage 260 can also include removing the server identifier before sending the information to the selected server.


If the answer is negative—a server identifier does not exist—then stage 240 is followed by stage 250 of selecting a server out of the plurality of servers. Stage 250 is followed by stage 260 of sending to the selected server information indicative of the request.


Stage 260 is followed by stage 270 of receiving, by the intermediate entity, a selected server response—a response of the selected server to the information indicative of the request.


Stage 270 is followed by stage 280 of analyzing the response of the selected server, to provide an analysis result indicative whether the response includes code to be executed by the client and whether the code includes at least one instruction that facilitates sending, by the client, another request to receive a service from a server out of the plurality of servers. If the answer to both questions is positive then stage 280 is followed by stage 290. Else, stage 280 is followed by stage 300 of sending a response to the client.


Stage 280 of analyzing can include locating browser code to be executed by a browser of the client and especially (but not solely) locating at least one instruction that is executed by a browser of the client and includes a call to an operating system of the client to enable sending the other request. The call can be in the form of a send instruction. According to an embodiment of the invention, the call is a call to an entity to enable sending the other request, wherein the entity is selected from a group consisting of an operating system of the client and an API layer between the browser code and the operating system of the client.


Stage 290 includes modifying the code by adding information that will cause the client to send a selected server identifier in association to the sending of the other request. It is noted that according to an embodiment of the invention, the modifying is carried out if the other request is destined to the site from which the modified response has been received.


Stage 290 can include adding an HTTP header for each call instruction of the code, wherein each HTTP header comprises the selected server identifier. According to an embodiment of the invention, the adding of the HTTP header is carried out if the other request is destined to the same site from which the modified response has been received.


It should be noted that conveniently, the modification of the code is only applied to the cases where the browser code sends request to the site where the ADC is installed. When the code sends requests to other sites, the code modification is conveniently not applied.


Stage 290 is followed by stage 310 of sending a modified response to the client, wherein the modified response includes the modified code.


If the request sent by the client is the first session request to receive a service then it is processed by the following stages: (i) receiving, by an intermediate entity, a first session request from client to receive a service from a server out of a plurality of servers that are coupled to the intermediate entity; (ii) selecting a server out of the plurality of servers and directing to the selected server information indicative of the first session request; (iii) receiving a response of the selected server to the information indicative of the first session request; (iv) analyzing the response of the selected server, to provide an analysis result indicative whether the response comprises code to be executed by the client and comprises at least one instruction that facilitates sending, by the client, another request to receive a service from a server out of the plurality of servers; (v) modifying, based on the analysis result (if such a code exists), the code by adding information that will cause the client to send a selected server identifier in association to the sending of the other request; and (vi) sending a modified response to the client, wherein the modified response comprises the modified code.


According to an embodiment of the invention stage 300 can be preceded by stage 292 of modifying URLs included in the selected server response in order to identify the selected server. The modification can include, for example, adding a unique server identifier to the URI of the URL of an HTML response sent to the client. It is noted that in this case the response can include a session identifier (instead of the unique server identifier) that can be mapped, by the intermediate entity to a selected server. In this case the session identifier can be modified.


It should be noted that, according to an embodiment of the invention, in relation to responses which are not a browser code, a wrapper takes every response which isn't a browser code and add to it a wrapper that implement the above, i.e. for every consecutive request that is sent to the server the browser code wrapper adds an HTTP header with ServerID.



FIG. 3 illustrates method 400 according to an embodiment of the invention.


Method 400 differs from method 200 by including stages 410, 420 and 430.


Stage 410 is preceded by stage 210 and is followed by stage 240. Stage 410 includes decoding an encrypted request of the client. Stage 410 can also include decrypting the entire request or a portion thereof.


Stage 420 is preceded by stage 270 and is followed by stage 280. It includes decrypting an encrypted code to provide a decrypted code. The encrypted code is included in a selected server response and stage 420 can include decrypting the selected server response or a portion thereof.


Stage 430 is preceded by stage 290 and is followed by stage 310. It includes encrypting a decrypted code to provide an encrypted code. Stage 430 can also include encrypting the selected server response or a portion thereof. Stage 430 may also be preceded by stage 292 and followed by stage 300.


Applying method 400 can involve: (i) receiving a selected server response that includes encrypted code; (ii) decrypting the encrypted code to provide a decrypted code. In this caste the stage of analyzing includes analyzing the decrypted code and the stage of modifying includes modifying, in response to the analysis result, the decrypted code by adding information that will cause the client to send a selected server identifier in association to the sending of the other request; (iii) encrypting the modified decrypted code to provide an encrypted modified code: and (iv) sending a modified response to the client, wherein the modified response comprises the encrypted modified code.



FIG. 4 illustrates method 500 according to an embodiment of the invention.


Method 500 differs from method 200 by including stages 510, 520 and 530.


Stage 510 is preceded by stage 210 and is followed by stage 240. Stage 510 includes de-compressing a compressed request of the client. Stage 510 can also include de-compressing the entire request or a portion thereof


Stage 520 is preceded by stage 270 and is followed by stage 280. It includes de-compressing a compressed code to provide a de-compressed code. Stage 520 can also include de-compressing the selected server response or a portion thereof.


Stage 530 is preceded by stage 290 and is followed by stage 310. It includes compressing a de-compressed code to provide a compressed code. Stage 530 can also include compressing the selected server response/modified response or a portion thereof. Stage 530 may also be preceded by stage 292 and followed by stage 300.


Method 500 can include: receiving a selected server response that comprises compressed code; de-compressing the compressed code to provide de-compressed code; wherein the analyzing comprises analyzing the de-compressed code; wherein the modifying comprises modifying, based on the analysis result, the de-compressed code by adding information that will cause the client to send a selected server identifier in association to the sending of the other request; compressing the modified de-compressed code to provide a compressed modified code; and sending a modified response to the client, wherein the modified response comprises the compressed modified code.


According to an embodiment of the invention, an example for modifying java-script based browser code is provided:

    • a. Before:
      • objHTTP=new ActiveXObject(‘Microsoft.XMLHTTP’);
      • objHTTP.open(‘POST’,“OtherPage.asp”,false);
      • objHTTP.setRequestHeader(‘Accept-Encoding’,‘gzip, deflate’);
      • objHTTP.send
    • b. After:
      • objHTTP=new ActiveXObject(‘Microsoft.XMLHTTP’);
      • objHTTP.open(‘POST’,“OtherPage.asp”,false);
      • objHTTP.setRequestHeader(‘Accept-Encoding’,‘gzip, deflate’);
      • objHTTP.setRequestHeader(‘X-Cres-Session-ID’,‘persist-server-3004’);
      • objHTTP.send


According to another embodiment of the invention any of the mentioned above methods, intermediate devices and computer program products can be aimed by a purpose that differs from maintaining a server's persistency. For example they can be applied for improving a user experience.


Conveniently, a combination of either one of the mentioned above methods can be provided. For example, decryption can be applied on client requests or on selected server responses, de-compression operations can be applied on selected server responses and code.


Because the apparatus implementing the present invention is, for the most part, composed of electronic components and circuits known to those skilled in the art, circuit details will not be explained in any greater extent than that considered necessary as illustrated above, for the understanding and appreciation of the underlying concepts of the present invention and in order not to obfuscate or distract from the teachings of the present invention.

Claims
  • 1. A method for maintaining server persistency, comprising: receiving, by an intermediate entity, a first session request from client to receive a service from a server out of a plurality of servers that are coupled to the intermediate entity;selecting a server out of the plurality of servers and directing to the selected server information indicative of the first session request;receiving a response of the selected server to the information indicative of the first session request;analyzing the response of the selected server, to provide an analysis result indicative whether the response comprises code to be executed by the client and comprises at least one instruction that facilitates sending, by the client, another request to receive a service from a server out of the plurality of servers;modifying the code by adding information that causes the client to send a selected server identifier in association to the sending of the other request, wherein the code is parsed and marked at each location where each call is made to the client, and wherein the information added at each marked location for each call includes a unique HTTP header that includes the selected server identifier independent of a dedicated HTTP cookie; andsending a modified response to the client, wherein the modified response comprises the modified code.
  • 2. The method according to claim 1 wherein the method is executed without using dedicated HTTP cookies.
  • 3. The method according to claim 1 comprising analyzing the response of the selected server to locate at least one instruction that is executed by a browser of the client and comprises a call to an entity to enable sending the other request, wherein the entity is selected from a group consisting of an operating system of the client and an API layer between the code and the operating system of the client.
  • 4. The method according to claim 1, comprising adding the HTTP header for each call instruction of the code, wherein each HTTP header comprises the selected server identifier, if the other request and the modified response are associated with a same site.
  • 5. The method according to claim 1 comprising: receiving, by the intermediate node, the other request from the client;removing the selected server identifier to provide a modified other request; andsending to the selected server information indicative of the modified other request.
  • 6. The method according to claim 1 comprising: receiving a selected server response that comprises compressed code;de-compressing the compressed code to provide de-compressed code;wherein the analyzing comprises analyzing the de-compressed code;wherein the modifying comprises modifying, in response to the analysis result, the decompressed code by adding information that will cause the client to send the selected server identifier in association to the sending of the other request;compressing the modified de-compressed code to provide a compressed modified code; andsending a modified response to the client, wherein the modified response comprises the compressed modified code.
  • 7. The method according to claim 1 comprising: receiving a selected server response that comprises encrypted code;decrypting the encrypted code to decrypted code;wherein the analyzing comprises analyzing the decrypted code;wherein the modifying comprises modifying, in response to the analysis result, the decrypted code by adding information that causes the client to send the selected server identifier in association to the sending of the other request;encrypting the modified decrypted code to provide an encrypted modified code; andsending a modified response to the client, wherein the modified response comprises the encrypted modified code.
  • 8. The method according to claim 1, comprising modifying, in response to the analysis result, the code by adding information that will cause the client to send the selected server identifier in association to the sending of the other request if the other request and the modified response are associated with a same site.
  • 9. An intermediate device, comprising: a memory that stores instructions;a circuit that executes the stored instructions to provide: a client interface that receives a first session request from a client to receive a service from a server out of a plurality of servers;a server selector that selects a server out of the plurality of servers;a server interface, coupled to the plurality of servers, and directs to the selected server information indicative of the first session request and receives a response of the selected server to the information indicative of the first session request;an analyzer that analyzes the response of the selected server, to provide an analysis result indicative whether the response comprises code to be executed by the client and comprises at least one instruction that facilitates sending, by the client, another request to receive a service from a server out of the plurality of servers;a modifier that modifies the code by adding information that causes the client to send a selected server identifier in association to the sending of the other request, wherein the code is parsed and marked at each location where each call is made to the client, and wherein the information added at each marked location for each call includes a unique HTTP header that includes the selected server identifier independent of a dedicated HTTP cookie; andwherein the client interface sends a modified response to the client that includes the modified code.
  • 10. The intermediate device according to claim 9, wherein the intermediate device is unable to utilize dedicated HTTP cookies.
  • 11. The intermediate device according to claim 9 wherein the analyzer analyzes the response of the selected server to locate at least one instruction that is executed by a browser of the client and comprises a call to an entity to enable sending the other request, wherein the entity is selected from a group consisting of an operating system of the client and an API layer between the code and the operating system of the client.
  • 12. The intermediate device according to claim 9 wherein the modifier adds the HTTP header for each call instruction of the code, if the other request and the modified response are associated with a same site, wherein each added HTTP header comprises the selected server identifier.
  • 13. The intermediate device according to claim 9 wherein the client interface receives, by the intermediate node, the other request from the client; wherein the modifier is configured to remove the selected server identifier to provide a modified other request; and the client interface is configured to send to the selected server information indicative of the modified other request.
  • 14. The intermediate device according to claim 9 comprising a decompressor and a compressor; wherein the server interface is receives a selected server response that comprises compressed code; wherein the de-compressor de-compresses the compressed code to provide decompressed code; wherein the compressor compresses decompressed modified code received from the modifier to provide a compressed modified code; and wherein the client interface sends a modified response to the client, wherein the modified response comprises the compressed modified code.
  • 15. The intermediate device according to claim 9 comprising a decryptor and an encryptor; wherein the server interface receives a selected server response that comprises encrypted code; wherein the decryptor decrypts the encrypted code to provide decrypted code; wherein the encryptor encrypts decrypted modified code received from the modifier to provide an encrypted modified code; and wherein the client interface sends a modified response to the client, wherein the modified response comprises the encrypted modified code.
  • 16. The intermediate device according to claim 9 wherein the modifier modifies, in response to the analysis result, the code by adding information that causes the client to send the selected server identifier in association to the sending of the other request when the other request and the modified response are associated with a same site.
  • 17. A non-transitory computer readable storage medium that stores instructions for execution by a circuit, wherein execution of the instructions performs actions, including: selecting a server out of the plurality of servers and directing to the selected server information indicative of the first session request;receiving a response of the selected server to the information indicative of the first session request;analyzing the response of the selected server, to provide an analysis result indicative whether the response comprises code to be executed by the client and comprises at least one instruction that facilitates sending, by the client, another request to receive a service from a server out of the plurality of servers;modifying the code by adding information that causes the client to send a selected server identifier in association to the sending of the other request, wherein the code is parsed and marked at each location where each call is made to the client, and wherein the information added at each marked location for each call includes a unique HTTP header that includes the selected server identifier independent of a dedicated HTTP cookie; andsending a modified response to the client, wherein the modified response comprises the modified code.
  • 18. The medium of claim 17, further comprising analyzing the response of the selected server to locate at least one instruction that is executed by a browser of the client and comprises a call to an operating system of the client to enable sending the other request.
  • 19. The medium of claim 17, further comprising adding the HTTP header for each call instruction of the code, when the other request and the modified response are associated with a same site, wherein each HTTP header comprises the selected server identifier.
  • 20. The medium of claim 17, further comprising modifying, in response to the analysis result, the code by adding information that causes the client to send the selected server identifier in association to the sending of the other request when the other request and the modified response are associated with a same site.
RELATED APPLICATIONS

The present application is a Continuation Patent Application of U.S. patent application Ser. No. 12/271,903, filed on Nov. 16, 2008, entitled “METHOD, INTERMEDIATE DEVICE AND COMPUTER PROGRAM CODE FOR MAINTAINING PERSISTENCY,” which is a Continuation Patent Application of U.S. patent application Ser. No. 11/692,942, filed on Mar. 29, 2007, entitled “METHOD, INTERMEDIATE DEVICE AND COMPUTER PROGRAM CODE FOR MAINTAINING PERSISTENCY,” which is a Non-Provisional Patent Application of U.S. Patent Provisional Application Ser. No. 60/888,195, filed on Feb. 5, 2007, entitled “METHOD, INTERMEDIATE DEVICE AND COMPUTER PROGRAM CODE FOR MAINTAINING PERSISTENCY,” all of which are further incorporated herein by reference in their entirety.

US Referenced Citations (333)
Number Name Date Kind
3689872 Sieracki Sep 1972 A
3768726 Hale et al. Oct 1973 A
4021782 Hoerning May 1977 A
4054951 Jackson et al. Oct 1977 A
4316222 Subramaniam Feb 1982 A
4386416 Giltner et al. May 1983 A
4593324 Ohkubo et al. Jun 1986 A
4626829 Hauck Dec 1986 A
4701745 Waterworth Oct 1987 A
4862167 Copeland, III Aug 1989 A
4876541 Storer Oct 1989 A
4890282 Lambert et al. Dec 1989 A
4897717 Hamilton et al. Jan 1990 A
4906991 Fiala et al. Mar 1990 A
4971407 Hoffman Nov 1990 A
4988998 O'Brien Jan 1991 A
5003307 Whiting et al. Mar 1991 A
5016009 Whiting et al. May 1991 A
5063523 Vrenjak Nov 1991 A
5109433 Notenboom Apr 1992 A
5126739 Whiting et al. Jun 1992 A
5146221 Whiting et al. Sep 1992 A
5150430 Chu Sep 1992 A
5155484 Chambers, IV Oct 1992 A
5167034 MacLean, Jr. et al. Nov 1992 A
5212742 Normile et al. May 1993 A
5249053 Jain Sep 1993 A
5280600 Van Maren et al. Jan 1994 A
5287552 Sasuta et al. Feb 1994 A
5293388 Monroe et al. Mar 1994 A
5319638 Lin Jun 1994 A
5341440 Earl et al. Aug 1994 A
5367629 Chu et al. Nov 1994 A
5379036 Storer Jan 1995 A
5410671 Elgamal et al. Apr 1995 A
5414425 Whiting et al. May 1995 A
5463390 Whiting et al. Oct 1995 A
5479587 Campbell et al. Dec 1995 A
5488364 Cole Jan 1996 A
5504842 Gentile Apr 1996 A
5506944 Gentile Apr 1996 A
5539865 Gentile Jul 1996 A
5542031 Douglass et al. Jul 1996 A
5544290 Gentile Aug 1996 A
5546395 Sharma et al. Aug 1996 A
5546475 Bolle et al. Aug 1996 A
5553160 Dawson Sep 1996 A
5553242 Russell et al. Sep 1996 A
5610905 Murthy et al. Mar 1997 A
5615287 Fu et al. Mar 1997 A
5638498 Tyler et al. Jun 1997 A
5768445 Troeller et al. Jun 1998 A
5768525 Kralowetz Jun 1998 A
5774715 Madany et al. Jun 1998 A
5805932 Kawashima et al. Sep 1998 A
5825890 Elgamal et al. Oct 1998 A
5850565 Wightman Dec 1998 A
5874907 Craft Feb 1999 A
5884269 Cellier et al. Mar 1999 A
5892847 Johnson Apr 1999 A
5898837 Guttman et al. Apr 1999 A
5923873 Massey et al. Jul 1999 A
5941988 Bhagwat et al. Aug 1999 A
5951623 Reynar et al. Sep 1999 A
5991515 Fall et al. Nov 1999 A
6023722 Colyer Feb 2000 A
6052785 Lin et al. Apr 2000 A
6061454 Malik et al. May 2000 A
6070179 Craft May 2000 A
6182139 Brendel Jan 2001 B1
6185221 Aybay Feb 2001 B1
6223287 Douglas et al. Apr 2001 B1
6226687 Harriman et al. May 2001 B1
6253226 Chidambaran et al. Jun 2001 B1
6253260 Beardsley et al. Jun 2001 B1
6298380 Coile et al. Oct 2001 B1
6356951 Gentry, Jr. Mar 2002 B1
6363411 Dugan et al. Mar 2002 B1
6367009 Davis et al. Apr 2002 B1
6370584 Bestavros et al. Apr 2002 B1
6389468 Muller et al. May 2002 B1
6411986 Susai et al. Jun 2002 B1
6418483 Nilsson Jul 2002 B2
6425005 Dugan et al. Jul 2002 B1
6434618 Cohen et al. Aug 2002 B1
6438705 Chao et al. Aug 2002 B1
6452915 Jorgensen Sep 2002 B1
6460120 Bass et al. Oct 2002 B1
6473802 Masters Oct 2002 B2
6542950 Bodnar Apr 2003 B1
6584567 Bellwood et al. Jun 2003 B1
6590588 Lincke et al. Jul 2003 B2
6590885 Jorgensen Jul 2003 B1
6594246 Jorgensen Jul 2003 B1
6625150 Yu Sep 2003 B1
6628629 Jorgensen Sep 2003 B1
6629163 Baiassanian Sep 2003 B1
6633835 Moran et al. Oct 2003 B1
6643259 Borella et al. Nov 2003 B1
6643701 Aziz et al. Nov 2003 B1
6650640 Muller et al. Nov 2003 B1
6654701 Hatley Nov 2003 B2
6665725 Dietz et al. Dec 2003 B1
6668327 Prabandham et al. Dec 2003 B1
6674717 Duong-van et al. Jan 2004 B1
6681232 Sistanizadeh et al. Jan 2004 B1
6681327 Jardin Jan 2004 B1
6697363 Carr Feb 2004 B1
6697378 Patel Feb 2004 B1
6718388 Yarborough et al. Apr 2004 B1
6754662 Li Jun 2004 B1
6754831 Brownell Jun 2004 B2
6760782 Swales Jul 2004 B1
6763384 Gupta et al. Jul 2004 B1
6766373 Beadle et al. Jul 2004 B1
6768716 Abel et al. Jul 2004 B1
6768726 Dorenbosch et al. Jul 2004 B2
6772107 La Cascia, Jr. et al. Aug 2004 B1
6789203 Belissent Sep 2004 B1
6792461 Hericourt Sep 2004 B1
6799276 Belissent Sep 2004 B1
6829238 Tokuyo et al. Dec 2004 B2
6831923 Laor et al. Dec 2004 B1
6842462 Ramjee et al. Jan 2005 B1
6854117 Roberts Feb 2005 B1
6865185 Patel et al. Mar 2005 B1
6895443 Aiken May 2005 B2
6928082 Liu et al. Aug 2005 B2
6934260 Kanuri Aug 2005 B1
6934848 King et al. Aug 2005 B1
6950434 Viswanath et al. Sep 2005 B1
6954462 Chu et al. Oct 2005 B1
6954780 Susai et al. Oct 2005 B2
6957272 Tallegas et al. Oct 2005 B2
6963972 Chang et al. Nov 2005 B1
6990592 Richmond et al. Jan 2006 B2
7013338 Nag et al. Mar 2006 B1
7013342 Riddle Mar 2006 B2
7023804 Younes et al. Apr 2006 B1
7032048 Appleby et al. Apr 2006 B2
7047315 Srivastava May 2006 B1
7051330 Kaler et al. May 2006 B1
7058699 Chiou et al. Jun 2006 B1
7065526 Wissner et al. Jun 2006 B2
7069325 Lu et al. Jun 2006 B1
7069438 Balabine et al. Jun 2006 B2
7085236 Oldak et al. Aug 2006 B2
7099926 Ims et al. Aug 2006 B1
7103045 Lavigne et al. Sep 2006 B2
7113993 Cappiello et al. Sep 2006 B1
7130964 Ims et al. Oct 2006 B2
7139792 Mishra et al. Nov 2006 B1
7139811 Lev Ran et al. Nov 2006 B2
7177311 Hussain et al. Feb 2007 B1
7181493 English et al. Feb 2007 B2
7181731 Pace et al. Feb 2007 B2
7215637 Ferguson et al. May 2007 B1
7225249 Barry et al. May 2007 B1
7231445 Aweya et al. Jun 2007 B1
7231657 Honarvar et al. Jun 2007 B2
7251218 Jorgensen Jul 2007 B2
7254639 Siegel et al. Aug 2007 B1
7266613 Brown et al. Sep 2007 B1
7280471 Rajagopal et al. Oct 2007 B2
7287077 Haugh et al. Oct 2007 B2
7296076 Portolani Nov 2007 B1
7313627 Noble Dec 2007 B1
7315513 McCann et al. Jan 2008 B2
7321926 Zhang et al. Jan 2008 B1
7324447 Morford Jan 2008 B1
7340521 Karandikar et al. Mar 2008 B1
7350229 Lander Mar 2008 B1
7359974 Quinn et al. Apr 2008 B1
7362762 Williams, Jr. et al. Apr 2008 B2
7379882 Adams et al. May 2008 B2
7409450 Jorgensen Aug 2008 B2
7421515 Marovich Sep 2008 B2
7454500 Hsu et al. Nov 2008 B1
7463637 Bou-Diab et al. Dec 2008 B2
7478162 Roadknight et al. Jan 2009 B2
7484011 Agasaveeran et al. Jan 2009 B1
7496750 Kumar et al. Feb 2009 B2
7500158 Smith et al. Mar 2009 B1
7529867 McCrory et al. May 2009 B2
7571313 Messerges et al. Aug 2009 B2
7586851 Panigrahy et al. Sep 2009 B2
7596137 Bennett Sep 2009 B2
7599283 Varier et al. Oct 2009 B1
7602785 Dharmapurikar et al. Oct 2009 B2
7619983 Panigrahy Nov 2009 B2
7624436 Balakrishnan et al. Nov 2009 B2
7660793 Indeck et al. Feb 2010 B2
7664833 Shoolman et al. Feb 2010 B2
7681203 Mandato et al. Mar 2010 B2
7698398 Lai Apr 2010 B1
7711857 Balassanian May 2010 B2
7721084 Salrninen et al. May 2010 B2
8009566 Zuk et al. Aug 2011 B2
8270413 Weill et al. Sep 2012 B2
8380855 Bryce et al. Feb 2013 B2
8584131 Wong et al. Nov 2013 B2
8623468 Lin et al. Jan 2014 B2
20010032254 Hawkins Oct 2001 A1
20010049741 Skene et al. Dec 2001 A1
20020025036 Sato Feb 2002 A1
20020054567 Fan May 2002 A1
20020055980 Goddard May 2002 A1
20020059428 Susai et al. May 2002 A1
20020062389 Vertes May 2002 A1
20020073223 Darnell et al. Jun 2002 A1
20020083132 Holland et al. Jun 2002 A1
20020083166 Dugan et al. Jun 2002 A1
20020085587 Mascolo Jul 2002 A1
20020099696 Prince Jul 2002 A1
20020099737 Porter et al. Jul 2002 A1
20020101822 Ayyagari et al. Aug 2002 A1
20020103663 Bankier et al. Aug 2002 A1
20020107903 Richter et al. Aug 2002 A1
20020126671 Ellis et al. Sep 2002 A1
20020133586 Shanklin et al. Sep 2002 A1
20020141393 Eriksson et al. Oct 2002 A1
20020147916 Strongin et al. Oct 2002 A1
20020152305 Jackson et al. Oct 2002 A1
20020169980 Brownell Nov 2002 A1
20020194345 Lu et al. Dec 2002 A1
20030014538 Roadknight et al. Jan 2003 A1
20030018827 Guthrie et al. Jan 2003 A1
20030028642 Agarwal et al. Feb 2003 A1
20030033351 Ricciardi Feb 2003 A1
20030043755 Mitchell Mar 2003 A1
20030050974 Mani-Meitav et al. Mar 2003 A1
20030061256 Mathews et al. Mar 2003 A1
20030061367 Shah Mar 2003 A1
20030069973 Ganesan et al. Apr 2003 A1
20030097460 Higashiyama et al. May 2003 A1
20030097484 Bahl May 2003 A1
20030110230 Holdsworth et al. Jun 2003 A1
20030112755 McDysan Jun 2003 A1
20030120593 Bansal et al. Jun 2003 A1
20030123447 Smith Jul 2003 A1
20030126029 Dastidar et al. Jul 2003 A1
20030139183 Rantalainen Jul 2003 A1
20030139975 Perkowski Jul 2003 A1
20030140366 Conkling et al. Jul 2003 A1
20030154406 Honarvar et al. Aug 2003 A1
20030169859 Strathmeyer et al. Sep 2003 A1
20030172164 Coughlin Sep 2003 A1
20030177267 Orava et al. Sep 2003 A1
20030179738 Diachina et al. Sep 2003 A1
20030214948 Jin et al. Nov 2003 A1
20030217171 Von Stuermer et al. Nov 2003 A1
20030223413 Guerrero Dec 2003 A1
20030225859 Radia et al. Dec 2003 A1
20030235204 Azevedo et al. Dec 2003 A1
20040004975 Shin et al. Jan 2004 A1
20040006638 Oberlander et al. Jan 2004 A1
20040008629 Rajagopal et al. Jan 2004 A1
20040008664 Takahashi et al. Jan 2004 A1
20040008728 Lee Jan 2004 A1
20040010473 Hsu et al. Jan 2004 A1
20040010544 Slater et al. Jan 2004 A1
20040015686 Connor et al. Jan 2004 A1
20040037322 Sukonik et al. Feb 2004 A1
20040052257 Abdo et al. Mar 2004 A1
20040078491 Gormish et al. Apr 2004 A1
20040088585 Kaler et al. May 2004 A1
20040095934 Cheng et al. May 2004 A1
20040148425 Haumont et al. Jul 2004 A1
20040148602 Ottati Jul 2004 A1
20040193513 Pruss et al. Sep 2004 A1
20040218603 Lee et al. Nov 2004 A1
20040225810 Hiratsuka Nov 2004 A1
20040230747 Ims et al. Nov 2004 A1
20040240446 Compton Dec 2004 A1
20050021713 Dugan et al. Jan 2005 A1
20050060295 Gould et al. Mar 2005 A1
20050063303 Samuels et al. Mar 2005 A1
20050063307 Samuels et al. Mar 2005 A1
20050074007 Samuels et al. Apr 2005 A1
20050088976 Chafle et al. Apr 2005 A1
20050108420 Brown et al. May 2005 A1
20050114700 Barrie et al. May 2005 A1
20050132060 Mo et al. Jun 2005 A1
20050135436 Nigam et al. Jun 2005 A1
20050144278 Atamaniouk Jun 2005 A1
20050171930 Arning et al. Aug 2005 A1
20050187979 Christensen et al. Aug 2005 A1
20050203988 Nollet et al. Sep 2005 A1
20050216555 English et al. Sep 2005 A1
20050238010 Panigrahy et al. Oct 2005 A1
20050238011 Panigrahy Oct 2005 A1
20050238012 Panigrahy et al. Oct 2005 A1
20050238022 Panigrahy Oct 2005 A1
20050240745 Iyer et al. Oct 2005 A1
20050265235 Accapadi et al. Dec 2005 A1
20050271048 Casey Dec 2005 A1
20060005008 Kao Jan 2006 A1
20060020598 Shoolman et al. Jan 2006 A1
20060026290 Pulito et al. Feb 2006 A1
20060029062 Rao et al. Feb 2006 A1
20060029063 Rao et al. Feb 2006 A1
20060029064 Rao et al. Feb 2006 A1
20060031442 Ashley et al. Feb 2006 A1
20060036747 Galvin et al. Feb 2006 A1
20060037071 Rao et al. Feb 2006 A1
20060056443 Tao et al. Mar 2006 A1
20060104294 Yoo May 2006 A1
20060123226 Kumar et al. Jun 2006 A1
20060153228 Stahl et al. Jul 2006 A1
20060159077 Vanecek Jul 2006 A1
20060165223 Dugan et al. Jul 2006 A1
20060233166 Bou-Diab et al. Oct 2006 A1
20060235973 McBride et al. Oct 2006 A1
20060242300 Yumoto et al. Oct 2006 A1
20060265689 Kuznetsov et al. Nov 2006 A1
20060294366 Nadalin et al. Dec 2006 A1
20070094336 Pearson Apr 2007 A1
20070121615 Weill et al. May 2007 A1
20070153798 Krstulich Jul 2007 A1
20070156919 Potti et al. Jul 2007 A1
20070162494 Schneider Jul 2007 A1
20070208946 Baby et al. Sep 2007 A1
20080034127 Nishio Feb 2008 A1
20080104591 McCrory et al. May 2008 A1
20080114710 Pucher May 2008 A1
20080114724 Indeck et al. May 2008 A1
20080253366 Zuk et al. Oct 2008 A1
20080291910 Tadimeti et al. Nov 2008 A1
20090063852 Messerges et al. Mar 2009 A1
20090077618 Pearce et al. Mar 2009 A1
20090295905 Civanlar et al. Dec 2009 A1
20090327113 Lee et al. Dec 2009 A1
20120036227 Kleinfelter et al. Feb 2012 A1
Non-Patent Literature Citations (146)
Entry
Shun-Yun Hu, Jui-Fa Chen and Tsu-Han Chen, “VON: a scalable peer-to-peer network for virtual environments,” in IEEE Network, vol. 20, No. 4, pp. 22-31, Jul.-Aug. 2006.
G. Pujolle, A. Serhrouchni and I. Ayadi, “Secure session management with cookies,” 2009 7th International Conference on Information, Communications and Signal Processing (ICICS), Macau, 2009, pp. 1-6.
K. Gutzmann, “Access control and session management in the HTTP environment,” in IEEE Internet Computing, vol. 5, No. 1, pp. 26-35, Jan./Feb. 2001.
Official Communication for U.S. Appl. No. 12/108,525 dated Nov. 21, 2013.
Official Communication for U.S. Appl. No. 12/199,768 dated Dec. 16, 2013.
“BIG-IP Controller With Exclusive OneConnect Content Switching Feature Provides a Breakthrough System for Maximizing Server and Network Performance,” F5 Networks, Inc., Press Release, May 8, 2001, accessed Jun. 4, 2002, 3 pages.
“Consistent Flashing,” Wikipedia—the free encyclopedia, http://en.wikipedia.org/w/index.php?title=Consistent_hashing&print . . . , accessed Jul. 25, 2008, 1 page.
“Control Plane,” Wikipedia—the free encyclopedia, http://en.wikipedia.org/w/index.php?title=Control_plane&printable=yes, accessed Jul. 31, 2008, 4 pages.
“Data Compression Applications and Innovations Workshop,” Proceedings of a Workshop held in conjuction with the IEEE Data Compression Conference, Mar. 31, 1995, 123 pages.
“Direct Access Storage Device Compression and Decompression Data Flow,” IBM Technical Disclosure Bulletin, vol. 38, No. 11, Nov. 1995, pp. 291-295.
“Drive Image Professional for DOS, OS/2 and Windows,” WSDC Download Guide, http://wsdcds01.watson.ibm.com/WSDC.nsf/Guides/Download/Applications-DriveImage.htm, accessed Nov. 22, 1999, 4 pages.
“Drive Image Professional,” WSDC Download Guide, http://wsdcds01.watson.ibm.com/wsdc.nsf/Guides/Download/Applications-DriveImage.htm, accessed May 3, 2001, 5 pages.
“editcap—Edit and/or translate the format of capture files,” ethereal.com, www.ethereal.com/docs/man-pages/editcap.1.html, accessed Apr. 15, 2004, 3 pages.
“Ethereal—Interactively browse network traffic,” ethereal.com, www.ethereal.com/docs/man-pages/ethereal.1.html, accessed Apr. 15, 2004, 29 pages.
“FAQ: Network Intrusion Detection Systems,” robertgraham.com, Mar. 21, 2000, www.robertgraham.com/pubs/network-intrusion-detection.html, accessed Apr. 15, 2004.
“Forwarding Plane.” Wikipedia—the free encyclopedia. http://en.wikipedia.org/w/index.php?title=Forwarding_plane&printa . . . , accessed Jul. 31, 2008.
“IBM Announces New Feature for 3480 Subsystem,” Tucson Today, vol. 12, No. 337, Jul. 25, 1989, 1 page.
“IBM Technology Products Introduces New Family of High-Performance Data Compression Products,” IBM Corporation, Somers, NY, Aug. 16, 1993, 6 pages.
“Magstar and IBM 3590 High Performance Tape Subsystem Technical Guide,” IBM, Nov. 1996, 287 pages.
“Network Management,” Wikipedia—the free encyclopedia, http://en.wikipedia.org/w/index.php?title=Network_management&pr . . . , accessed Jul. 31, 2008, 3 pages.
“Network Sniffer,” linuxmigration.com, www.linuxmigration.com/quickref/admin/ethereal.html, accessed Apr. 15, 2004, 4 pages.
“Telecommunications Network,” Wikipedia—the free encyclopedia, http://en.wikipedia.org/w/index.php?title=Telecommunications_net . . . , accessed Jul. 31, 2008, 2 pages.
“Tethereal—Dump and analyze network traffic,” ethereal.com, www.ethereal.com/docs/man-pages/tethereal.1.html, accessed Apr. 15, 2004,11 pages.
About Computing & Technology, “Wireless/Networking, Nagle algorithm,” visited Dec. 6, 2005, 2 pages, http://compnetworking.about.com/od/tcpip/l/bldef_nagle,htm.
Acharya et al., “Scalable Web Request Routing with MPLS,” IBM Research Report, IBM Research Division, Dec. 5, 2001.
Adaptive Lossless Data Compression—ALDC, IBM, Jun. 15, 1994, 2 pages.
ALDC-MACRO—Adaptive Lossless Data Compression, IBM Microelectronics, May 1994, 2 pages.
ALDC1-20S—Adaptive Lossless Data Compression, IBM Microelectronics, May 1994, 2 pages.
ALDC1-40S—Adaptive Lossless Data Compression, IBM Microelectronics, May 1994, 2 pages.
ALDC1-5S—Adaptive Lossless Data Compression, IBM Microelectronics, May 1994, 2 pages.
Australia's Academic and Research Network, “Programs and large MTU, Nagle algorithm,” visited Dec. 9, 2005, 3 pages, http://www.aarnet.edu.au/engineering/networkdesign/mtu/programming.html.
Berners-Lee, T. et al., “Uniform Resource Identifiers (URI): Generic Syntax,” IETF RFC 2396, Aug. 1998.
Berners-Lee, T. et al., RFC 1945, “Hypertext Transfer Protocol—HTTP/1.0,” May 1996, 60 pages.
Braden, R., “Requirements for Internet Hosts,” RFC 1122, Oct. 1989, 101 pages.
Bryhni et al., “A Comparison of Load Balancing Techniques for Scalable Web Servers,” IEEE Network, Jul./Aug. 2000, pp. 58-64.
Castineyra, I. et al., “The Nimrod Routing Architecture,” RFC 1992, Aug. 1996, 27 pages.
Cheng, J.M. et al., “A Fast, Highly Reliable Data Compression Chip and Algorithm for Storage Systems,” IBM, vol. 40, No. 6, Nov. 1996, 11 pages.
Costlow, T., “Sony Designs Faster, Denser Tape Drive,” Electronic Engineering Times, May 20, 1996, 2 pages.
Craft, D. J., “A Fast Hardware Data Compression Algorithm and Some Algorithmic Extensions,” IBM Journal of Research and Development, vol. 42, No. 6, Nov. 1998, 14 pages.
Craft, D. J., “Data Compression Choice No Easy Call,” Computer Technology Review, Jan. 1994, 2 pages.
Degermark, M. et al., “Low-Loss TCP/IP Header Compression for Wireless Networks,” J.C. Baftzar AG, Science Publishers, Oct. 1997, pp. 375-387.
Dierks, T. et al., RFC 2246, “The TLS Protocol, Version 1.0,” Jan. 1999, 80 pages.
Electronic Engineering Times, Issue 759, Aug. 16, 1993, 37 pages.
Electronic Engineering Times, Issue 767, Oct. 11, 1993, 34 pages.
Enger, R., et al., “FYI on a Network Management Tool Catalog: Tools for Monitoring and Debugging TCP/IP Internets and Interconnected Devices,” RFC 1470, Jun. 1993, 52 pages.
F5 Networks Delivers Blistering Application Traffic Management Performance and Unmatched Intelligence via New Packet Velocity ASIC, and BIG-IP Platforms, F5 Networks, Inc. Press Release dated Oct. 21, 2002, 3 pages.
Fielding, R. et al., RFC 2616, “Hypertext Transfer Protocol—HTTP/1.1,” Jun. 1999, 114 pages.
Fielding. R. et aL, “Hypertext Transfer Protocol—HTTP/1.1,” Network Working Group, RFC 2068, Jan. 1997, 152 pages.
fifi.org, “Manpage of TCP,” visited Dec. 9, 2005, 6 pages, http://www.fiff.org/cgi-bin/man2html/usr/share/man/man7/tcp.7.gz.
Freier, A. et al., “The SSL Protocol Version 3.0,” IETF, Internet Draft, Nov. 18, 1996, 60 pages.
Freier, A. et al., Netscape Communications Corporation, “The SSL Protocol, Version 3.0,” Mar. 1996, 60 pages.
Hewtt. J. R. et al., “Securities Practice and Electronic Technology,” Corporate Securities Series, (New York: Law Journal Seminars-Press) 1998, title page, bibliography page, pp. 4.29-4.30.
Hinden, R. et al., “Format for Literal IPv6 Addresses in URL's,” IETF RFC 2732, Dec. 1999.
Office Communication for U.S. Appl. No. 12/271,903 dated Jul. 8, 2010.
Office Communication for U.S. Appl. No. 12/271,903 dated Jan. 25, 2011.
Office Communication for U.S. Appl. No. 12/271,903 dated Oct. 26, 2011.
Office Communication for U.S. Appl. No. 12/271,903 dated Oct. 16, 2013.
Office Communication for U.S. Appl. No. 12/271,903 dated Jul. 3, 2012.
Office Communication for U.S. Appl. No. 12/271,903 dated Jul. 10, 2014.
Office Communication for U.S. Appl. No. 12/271,903 dated Oct. 23, 2014.
Office Communication for U.S. Appl. No. 12/271,903 dated Mar. 30, 2015.
Office Communication for U.S. Appl. No. 12/108,525 dated May 8, 2015.
Office Communication for U.S. Appl. No. 11/692,942 dated May 20, 2015.
Abhari, A. et al., “HTTP Modification to Reduce Client Latency,” Electrical and Computer Engineering, 2008. CCECE 2008, pp. 001491-001496, May 4-7, 2008.
Liu, H. et al., “Modeling Response Time of SOAP Over Http,” Web Services, 2005. ICWS 2005. Proceedings. 2005 IEEE International Conference on Web Services, Jul. 11-15, 2005 (7 pages).
Gutzmann, “Access control and session management in the HTTP environment,” Internet Computing, IEEE, vol. 5, No. 1, pp. 26,35. Jan./Feb. 2001.
Lin et al. “Direct Web switch routing with state migration, TCP masquerade and cookie name rewriting,” Global Telecommunications Conference, 2003. GLOBECOM '03. IEEE, vol. 7, pp. 3663,3667, Dec. 1-5, 2003.
Hochmuth, P., “F5, CacheFlow Pump Up Content-Delivery Lines,” NetworkWorld, May 4, 2001, http://www.network.com/news/2001/0507cachingonline.html, accessed Jun. 1, 2005, 3 pages.
Housley, R., et al., “Internet X.509 Public Key Infrastructure Certificate and CRL Profile,” RFC 2459, Jan. 1999, 115 pages.
IBM Microelectronics Comdex Fall 1993 Booth Location, 1 page.
IP Multimedia Subsystem, http://en.wikipedia.org/w/index.php?title=IP_Multimedia_Subsyst . . . , accessed May 15. 2008, 8 pages.
Jacobson, V. et al., “TCP Extensions for High Performance,” May 1992, http://www.faqs.org/rfcs/rfc1323.html, pp. 1-37.
Kessler, G. et al., RFC 1739, “A Primer on Internet and TCP/IP Tools,” Dec. 1994, 46 pages.
Mapp, G., “Transport Protocols—What's wrong with TCP,” Jan. 28, 2004, LCE Lecture at: http://www-Ice.eng.cam.ac.uk/-gem11, 4F5-Lecture4.pdf, pp. 1-60.
Nagle, J., RFC 896, “Congestion control in IP/TCP internetworks,” Jan. 6, 1984, 13 pages.
Nielsen. H. F. et al., “Network Performance Effects of HTTP/1.1, CSS1, and PNG,” Jun. 24, 1997, W3 Consortium, http://www.w3.org/TR/nOTE-pipelining-970624$Id:Pipeline.html, v 1.48 199/10/18 19:38:45 root Exp $, pp. 1-19.
OpenSSL, visited Apr. 12, 2006, 1 page, www.openssl.org.
Oracle Communication and Mobility Server, Aug. 2007, http://www.oracle.com/technology/products/ocms/otn_front.html, accessed May 15, 2008, 108 pages.
Paxson, V., RFC 2525, “Known TCP Implementation Problems,” Mar. 1999, 61 pages.
POSTEL, J., “Transmission Control Protocol,” Sep. 1981, Information Sciences Institute, University of Southern California, Marina del Rey, California, http://www.faqs.org/rfcs/rfc793.html, pp. 1-21.
Readme, Powerquest Corporation, 1994-2002, 6 pages.
Reardon, M., “A Smarter Session Switch: Arrowpoint's CS Session Switches Boast the Brains Needed for E-Commerce,” Data Communications, Jan. 1999, title page, pp. 3, 5, 18.
Rescorla, E. “SSL and TLS, Designing and Building Secure Systems”, 2001, Addison-Vesley, 46 pages.
RSA Laboratories, “PKCS #1 v2.0: RSA Cryoptography Standard,” Oct. 1, 1998, 35 pages.
Schneider, K. et al. “PPP for Data Compression in Data Circuit-Terminating Equipment (DCE),” RFC 1976, Aug. 1996m 10 pages.
Schroeder et al., “Scalable Web ServerClustering Technologies,” IEEE Network May/Jun. 2000, pp. 38-45.
SearchNetworking.com, “Nagle's algorithm,” visited Dec. 6, 2005, 3 pages, http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci754347,00.html.
Secure and Optimize Oracle 11i E-Business Suite with F5 Solutions, F5 Application Ready Network Guide, Oracle E-Business Suite 11i, Aug. 2007, 2 pages.
Session initiation Protocol, http://en.wikipedia.org/w/index.php?title=Session_Initiation_Protoc . . . , accessed May 14, 2008, 5 pages.
Simpson, W. “The Point-To-Point Protocol (PPP),” RFC 1661, Jul. 1994, 54 pages.
Stevens, W. R., “TCP/IP Illustrated,” vol. 1: The Protocols, Addison-Wesley Professional, Dec. 31, 1993, pp. 1-17.
Stevens, W., “TCP Slow Start, Congestion Avoidance, Fast Retransmit, and Fast Recovery Algorithms,” Jan. 1997, Sunsite.dk, http://rfc.sunsite.dk/rfc/rfc2001.html, pp. 1-6.
Tormasov, A. et al., “TCP/IP options for high-performance data transmission,” visited Dec. 9, 2005, 4 pages, http://builder.com.com/5100-6732-1050878.html.
Using the Universal Inspection Engine, Manual Chapter: BIG-IP Solutions Guide v4.6.2: Using the Universal Inspection Engine, 2002, 8 pages.
Valloppillil, V. et al., “Cache Array Routing Protocol v1.0,” Feb. 1998, http://icp.ircache.net/carp.txt, accessed Jul. 25, 2008, 7 pages.
W3C, “HTTP/1.1 and Nagle's Algorithm,” visited Dec. 6, 2005, 3 pages, http://www.w3.org/Protocols/HTTP/Performance/Nagle/.
Zebrose, K. L., “Integrating Hardware Accelerators into Internetworking Switches,” Telco Systems, Nov. 1993, 10 pages.
Fielding, R. et al “Hypertext Transfer Protocol—HTTP/1.1,” W3 Consortium, Jun. 1999, pp. 1-176 (165 pages), http://www.w3.org/Protocols/rfc2616/rfc2616.html.
Official Communication for U.S. Appl. No. 13/615,007 dated Jan. 7, 2014.
Official Communication for U.S. Appl. No. 12/199,768 dated Jun. 18. 2010.
Official Communication for U.S. Appl. No. 12/199,768 dated Nov. 22, 2010.
Official Communication for U.S. Appl. No. 11/692,942 dated Oct. 10, 2014.
Elnikety et al., “A Method for Transparent Admission Control and Request Scheduling in E-Commerce Websites,” WWW2004, May 17-22, 2004, pp. 276-286.8.
Heiss et al., “Adaptive Load Control in Transaction Processing Systems,” Proceedings of the 17th International Conference on Very Large Data Bases, Barcelona, Sep. 1991, pp. 47-54.
Zilberstein et al., “Discovering Pair Motif Phrases: An Efficient Branch and Bound Approacfh.” BIONFORMATICS, vol. 00, No. 00, 2006, pp. 1-10.
Office Communication for U.S. Appl. No. 12/108,525 dated May 14, 2014.
Office Communication for U.S. Appl. No. 12/108,525 dated Jul. 24, 2014.
Office Communication for U.S. Appl. No. 11/692,942 dated Dec. 19, 2013.
Office Communication for U.S. Appl. No. 11/692,942 dated Apr. 8, 2014.
“An Overview of the Acceleration and Optimization of Web-based Applications,” White Paper, Crescendo Networks, Apr. 2005, pp. 1-8.
“AppBeat™ Suite: Multi-Tier Application Delivery,” White Paper, Crescendo Networks, 2008, pp. 1-11.
“BEA Tuxedo: Installing the BEA Tuxedo System, Version 10.0,” BEA, Sep. 28, 2007, pp. 1-200.
“Crescendo Networks: Products: Features,” Crescendo Networks, Feb. 22, 2007, pp. 1-4 http://web.archive.org/web/20070305005434/www.crescendonetworks.com/engsite/content/T1.asp?Sid=4&pid=58.
“Maestro AFE CN-5000E/CN-5500E User Guide, Software Version 4.2,” Crescendo Networks, Apr. 1, 2007, pp. 1-233.
“Oracle Application Server, Performance Guide, 10g Release 3 (10.1.3),” Oracle, Jun. 2006, pp. 1-158.
Baker, Z., “Efficient Algorithms and Architectures for High-speed Text Processing and Data Correlation,” Ph.D. Dissertation Proposal, University of Southern California, Dec. 6, 2004, pp. 1-22.
Chao, G., “An entropy-based stability QoS routing with priority scheduler in MANET using fuzzy controllers,” Journal of Communication and Computer, vol. 4, No. 3, Mar. 2007, pp. 52-54.
Derbal, Y., “Entropic Grid Scheduling,” Journal of Grid Computing, vol. 4, 2006, pp. 373-394.
Duffy, K. et al., “Using estimated entropy in a queueing system with dynamic routing,” Markov Process and Related Fields, vol. 13, No. 1, Nov. 2005, pp. 57-84.
Feldman, D., “A Brief Introduction to: information Theory, Excess Entropy and Computational Mechanics,” Apr. 1998, revised Oct. 2002, pp. 1-49.
Heikinheimo, H. et al., “Finding Low-Entropy Sets and Trees from Binary Data,” KDD'07, Aug. 2007, pp. 1-10.
Hyun, J. et al., “Content Sniffer Based Load Distribution in a Web Server Cluster,” IEICE Transactions on Information and Systems, vol. E86-D, No. 7, Jul. 2003, pp. 1258-1269.
Internet Archive Wayback Machine, “www.crescendonetworks.com,” Jul. 8, 2010 http://web.archive.org/web/*/http://www.crescendonetworks.com/.
Keane, T., “A General-Purpose Heterogeneous Distributed Computing System,” Masters Thesis, National University of Ireland Maynooth, Jul. 2004, pp. 1-124.
Meng, X. et al., “An Adaptive Data Prefetching Scheme for Biosequence Database Search on Reconfigurable Platforms,” SAC'07, ACM, Mar. 11-15, 2007, pp. 140-141.
Park, S.-M. et al., “Chameleon: A Resource Scheduler in a Data Grid Environment,” Proceedings of the IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID.03), 2003, pp. 1-8.
Phillis, Y.A. et al., “An Entropy Approach to Queueing Control,” Proceedings of the 34th Conference on Decision & Control, Dec. 1995, pp. 3644-3647.
Shuo, D. et al., “Request Dispatching Algorithms for Web Server Clusters Based on Load Balancing,” Tsinghua Science and Technology, vol. 4, No. 4, Dec. 1999, pp. 1620-1623.
Sun, B. et al., “An Entropy-Based Stability QoS Routing with Priority Scheduler in MANET Using Fuzzy Controllers,” FSKD 2006, LNAI 4223, 2006, pp. 735-738.
Szajda, D. et al., “Toward a Practical Data Privacy Scheme for a Distributed Implementation of the Smith-Waterman Genome Sequence Comparison Algorithm,” Proceedings of the 2006 ISOC Network and Distributed System Security Symposium (NDSS 2006), 2006, pp. 253-265.
Tsiantos, V. D. et al., “Information Theoretic Decomposition of GE-Type Closed Queueing Networks with Finite Capacity and Multiple Servers,” UKPEW, 1999, pp. 1-12.
Official Communication for U.S. Appl. No. 11/692,942 dated Sep. 10, 2010.
Official Communication for U.S. Appl. No. 11/692,942 dated Jul. 26, 2011.
Official Communication for U.S. Appl. No. 11/692,942 dated Aug. 26, 2013.
Official Communication for U.S. Appl. No. 12/108,525 dated Aug. 25, 2010.
Official Communicatiion for U.S. Appl. No. 12/108,525 dated Mar. 28, 2011.
Official Communication for U.S. Appl. No. 12/108,525 dated May 8, 2015, 21 pages.
Official Communication for U.S. Appl. No. 11/692,942 dated May 20, 2015, 8 pages.
Official Communication for U.S. Appl. No. 11/692,942 dated Feb. 2, 2016, 10 pages.
Official Communication for U.S. Appl. No. 12/108,525 dated Nov. 23, 2015, 22 pages.
Official Communication for U.S. Appl. No. 12/108,525 dated Feb. 18, 2016, 3 pages.
Official Communication for U.S. Appl. No. 12/108,525 dated Sep. 9, 2016, 23 pages.
Official Communication for U.S. Appl. No. 11/692,942 dated Oct. 20, 2016, 9 pages.
Official Communication for U.S. Appl. No. 11/692,942 dated Jun. 28, 2017, 11 pages.
Official Communication for U.S. Appl. No. 12/108,525 dated Mar. 22, 2017, 24 pages.
Official Communication for U.S. Appl. No. 11/692,942 dated Jan. 6, 2017, 3 pages.
Provisional Applications (1)
Number Date Country
60888195 Feb 2007 US
Continuations (2)
Number Date Country
Parent 12271903 Nov 2008 US
Child 14791016 US
Parent 11692942 Mar 2007 US
Child 12271903 US