Claims
- 1. A network apparatus, connected to other network entities via a first type of connection and other network entities via a second type of connection, comprising:
a spoofing element, which spoofs some of the multiple connections of the first type based on their associated applications.
- 2. The network apparatus of claim 1, wherein said spoofing element only spoofs connections of the first type associated with high throughput applications.
- 3. The network apparatus of claim 1, wherein said spoofing element assigns spoofing resources, including buffer space and control blocks, to the spoofed connections.
- 4. The network apparatus of claim 1, wherein said spoofing element spoofs connections using at least one spoofing rule based on destination address, source address, destination port number, source port number, options, a differentiated services (DS) field or combinations thereof.
- 5. The network apparatus of claim 4, wherein said spoofing element defines the at least one spoofing rule in a selective spoofing profile.
- 6. The network apparatus of claim 1, wherein said spoofing element assigns at least one spoofing parameter set, including at least one of maximum transmission unit (MTU), maximum segment size (MSS), three-way handshake spoofing, connection priority, maximum advertised window size, response (or retransmission) timeout, number of retransmissions, fast retransmission threshold, keep alive timeout, retry counts, retransmission timeouts, and initial window sizes, or combinations thereof to the spoofed connections based on the type of application.
- 7. The network apparatus of claim 6, wherein said spoofing element selects parameters for a spoofed connection using at least one spoofing rule based on destination address, source address, destination port number, source port number, options, a differentiated services (DS) field or combinations thereof.
- 8. The network apparatus of claim 7, wherein said spoofing element defines the at least one spoofing rule in a selective spoofing profile.
- 9. The network apparatus of claim 6, wherein said spoofing element defines the at least one spoofing parameter set in a spoofing parameter profile.
- 10. The network apparatus of claim 1, wherein said spoofing element spoofs some of the multiple connections of the first type based on at least one operator selectable criterion.
- 11. The network apparatus of claim 1, wherein said spoofing element selects parameters for spoofing some of the multiple connections of the first type based on at least one operator selectable criterion.
- 12. The network apparatus of claim 1, wherein the first connection uses a high layer protocol.
- 13. The network apparatus of claim 12, wherein the first connection uses one of the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP).
- 14. The network apparatus of claim 1, wherein the second connection is a backbone connection.
- 15. The network apparatus of claim 14, wherein the backbone connection is via a wireless link.
- 16. The network apparatus of claim 15, wherein the wireless link has high latency and high error rate.
- 17. The network apparatus of claim 15, wherein the wireless link is a satellite link.
- 18. The network apparatus of claim 1, wherein said network apparatus is a component of a network gateway.
- 19. The network apparatus of claim 1, wherein said network apparatus is a component of a host.
- 20. The network apparatus of claim 1 wherein said network apparatus is a component of a hub.
- 21. The network apparatus of claim 1, wherein said network apparatus is a component of a switch.
- 22. The network apparatus of claim 1, wherein said network apparatus is a component of a VSAT.
- 23. The network apparatus of claim 1, wherein said network apparatus is a component of a router.
- 24. A method, comprising:
establishing multiple connections of a first type associated with different applications; and spoofing some of the multiple connections of the first type based on their associated applications.
- 25. The method of claim 24, wherein said spoofing step only spoofs connections of the first type associated with high throughput applications.
- 26. The method of claim 24, wherein said spoofing step assigns spoofing resources, including buffer space and control blocks, to the spoofed connections.
- 27. The method of claim 24, wherein said spoofing step spoofs connections using at least one spoofing rule based on destination address, source address, destination port number, source port number, options, a differentiated services (DS) field or combinations thereof.
- 28. The method of claim 27, wherein said spoofing step defines the at least one spoofing rule in a selective spoofing profile.
- 29. The method of claim 24, wherein said spoofing step assigns at least one spoofing parameter set, including at least one of maximum transmission unit (MTU), maximum segment size (MSS), three-way handshake spoofing, connection priority, maximum advertised window size, response (or retransmission) timeout, number of retransmissions, fast retransmission threshold, keep alive timeout, retry counts, retransmission timeouts, and initial window sizes, or combinations thereof to the spoofed connections based on the type of application.
- 30. The method of claim 29, wherein said spoofing step selects parameters for a spoofed connection using at least one spoofing rule based on destination address, source address, destination port number, source port number, options, a differentiated services (DS) field or combinations thereof.
- 31. The method of claim 30, wherein said spoofing step defines the at least one spoofing rule in a selective spoofing profile.
- 32. The method of claim 29, wherein said spoofing step defines the at least one spoofing parameter set in a spoofing parameter profile.
- 33. The method of claim 24, wherein said spoofing step spoofs some of the multiple connections of the first type based on at least one operator selectable criterion.
- 34. The method of claim 24, wherein said spoofing step selects parameters for spoofing some of the multiple connections of the first type based on at least one operator selectable criterion.
- 35. The method of claim 24, wherein the first connection uses a high layer protocol.
- 36. The method of claim 35, wherein the first connection uses one of the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP).
- 37. The method of claim 24, wherein said method is performed in a network gateway.
- 38. The method of claim 24, wherein said method is performed in a host.
- 39. The method of claim 24, wherein said method is performed in a hub.
- 40. The method of claim 24, wherein said method is performed in a switch.
- 41. The method of claim 24, wherein said method is performed in a VSAT.
- 42. The method of claim 24, wherein said method is performed in a router.
CROSS-REFERENCE TO RELATED APPLICATIONS
[0001] This application claims the benefit under 35 U.S.C. §120 of U.S. Non-Provisional Application of John Border et al. entitled “Selective Spoofer and Method of Performing Selective Spoofing”, Ser. no. 09/664,165, filed on Sep. 18, 2000, the benefit under 35 U.S.C. §119 (e) of U.S. Provisional Application of John Border et al. entitled “Selective TCP Spoofing”, Ser. no. 60/181,597, filed on Feb. 10, 2000, and a U.S. Provisional Application of John Border et al. entitled “Performance Enhancing Proxy”, Ser. no. 60/220,026, filed on Jul. 21, 2000, the entire contents of all of which are incorporated by reference herein.
[0002] The present application is also related to co-pending application in the name of John Border et al., entitled “Performance Enhancing Proxy and Method for Enhancing Performance”, Ser. no. 09/662,072, filed on Sep. 14, 2000.
Provisional Applications (2)
|
Number |
Date |
Country |
|
60181597 |
Feb 2000 |
US |
|
60220026 |
Jul 2000 |
US |
Continuation in Parts (1)
|
Number |
Date |
Country |
| Parent |
09664165 |
Sep 2000 |
US |
| Child |
09879020 |
Jun 2001 |
US |