Abstract:
A user device, in trying to communicate with an internet resource knowing an associated domain name, transmits a Domain Name System (DNS) request packet to a DNS server, which responds with a DNS response packet identifying multiple Internet Protocol (IP) addresses corresponding to multiple servers associated with the identified domain name. The user device then selects one of these servers and communicates with that selected server. The user device may select the server by probing properties of the servers and of the connections between the user device and each of the servers, and by then picking the server whose own properties and whose connection properties are better. The user device probes these properties by sending at least one set of probe packets to each server and receiving at least one set of probe return packets and calculating round trip time, hop distance, bandwidth, latency, packet loss rate, and other properties.
Abstract:
The present invention is generally related to a network computing device including a first processor communicating with a second processor as a proxy for a client device when authenticating access privileges of the client device. The present invention may include more than two processors where at least one of the multiple processors may be optimized for performing one or more control functions and one or more other processors may be optimized for transferring data or administrating the transfer of data through a gateway or firewall.
Abstract:
Disclosed in the authentication and authorization of a client device to access a plurality of resources, requiring a user of a client device to enter only one set of login information. Authentication and authorization of a client device to access a plurality of resources after an initial set of login information is received by a networked computing environment. After the initial set of login information is received, a series of steps are performed that may be entirely transparent to the user of the client device.
Abstract:
Disclosed in the authentication and authorization of a client device to access a plurality of resources, requiring a user of a client device to enter only one set of login information. Authentication and authorization of a client device to access a plurality of resources after an initial set of login information is received by a networked computing environment. After the initial set of login information is received, a series of steps are performed that may be entirely transparent to the user of the client device.