H04L45/7453

Prime re-shuffled assisted carp

Improving distribution of traffic from clients to servers is provided. A device intermediary to a plurality of clients and a plurality of servers can receive a request from a client of the plurality of clients to access one of the plurality of servers. The device can determine a hash value based on at least a portion of the request received from the client. The device can identify an index of a plurality of indices listing the plurality of servers repeated a plurality of times in a deterministic shuffled order. The device can apply a cache array routing protocol (CARP) algorithm to a second plurality of servers listed in a subset of the plurality of indices around the index. The device can select a server from the second plurality of servers with a highest hash value based on the application of the CARP algorithm.

TRAFFIC TRANSFERRING DEVICE, SWITCH, TRAFFIC TRANSFERRING METHOD, AND TRAFFIC TRANSFERRING PROGRAM
20220345395 · 2022-10-27 ·

A traffic transfer system includes a switch (10) and a switch (20) and distributes and transfers traffic of communication on a network to a plurality of devices. The switch (10) determines a device of a transfer destination of input traffic among a plurality of devices by a hash function. The switch (10) transfers traffic to a first device when the first device determined to be a transfer destination is available and transfers traffic to the switch (20) when the first device is not available. The switch (20) determines a device to which the traffic transferred by the switch (10) is transferred, from available devices by a hash function. The switch (20) transfers the traffic to a second device determined to be a transfer destination.

TRAFFIC TRANSFERRING DEVICE, SWITCH, TRAFFIC TRANSFERRING METHOD, AND TRAFFIC TRANSFERRING PROGRAM
20220345395 · 2022-10-27 ·

A traffic transfer system includes a switch (10) and a switch (20) and distributes and transfers traffic of communication on a network to a plurality of devices. The switch (10) determines a device of a transfer destination of input traffic among a plurality of devices by a hash function. The switch (10) transfers traffic to a first device when the first device determined to be a transfer destination is available and transfers traffic to the switch (20) when the first device is not available. The switch (20) determines a device to which the traffic transferred by the switch (10) is transferred, from available devices by a hash function. The switch (20) transfers the traffic to a second device determined to be a transfer destination.

Enhanced privacy-preserving access to a VPN service
11611536 · 2023-03-21 · ·

Systems and methods for effectively managing security and privacy measures during a user's connectivity session with a VPN service are provided. The systems and methods use a computer program that introduces a double-NAT feature at the network layer and a temporary hash table containing the minimally necessary temporary data to link two NAT sessions together in a secure manner. The systems and methods avoid including the dynamic management of IP addresses or requiring each client to have an IP address assigned beforehand to avoid compromising the user's identity by hard linking the session traces with the client.

Enhanced privacy-preserving access to a VPN service
11611536 · 2023-03-21 · ·

Systems and methods for effectively managing security and privacy measures during a user's connectivity session with a VPN service are provided. The systems and methods use a computer program that introduces a double-NAT feature at the network layer and a temporary hash table containing the minimally necessary temporary data to link two NAT sessions together in a secure manner. The systems and methods avoid including the dynamic management of IP addresses or requiring each client to have an IP address assigned beforehand to avoid compromising the user's identity by hard linking the session traces with the client.

AUTOMATED ROUTE PROPAGATION AMONG NETWORKS ATTACHED TO SCALABLE VIRTUAL TRAFFIC HUBS

Metadata indicating that a virtual traffic hub enabling connectivity between a plurality of isolated networks has been established is stored. A determination is made that a first entry of a first isolated network attached to the hub is to be represented in a second routing table of a second isolated network attached to the hub, e.g., to enable network packets originating at resources of the second isolated network to be transmitted via the hub to the first isolated network. A new entry corresponding to the first entry is included in the second routing table.

Methods for Shunting Clustered Gateways

The present disclosure provides methods for shunting clustered gateways, which relate to the field of computer technologies, and in particular, relate to the technical field of data transmission. A specific implementation solution is: in response to receiving a first packet sent by a target internal network machine, a first hash value is acquired, wherein the first hash value is generated by a shunt of a public network gateway cluster, and the shunt is configured to perform a hash calculation on the first packet based on a pre-configured port dictionary; a target gateway machine is selected from the public network gateway cluster according to the first hash value; and the first packet is sent to the target gateway machine.

Methods for Shunting Clustered Gateways

The present disclosure provides methods for shunting clustered gateways, which relate to the field of computer technologies, and in particular, relate to the technical field of data transmission. A specific implementation solution is: in response to receiving a first packet sent by a target internal network machine, a first hash value is acquired, wherein the first hash value is generated by a shunt of a public network gateway cluster, and the shunt is configured to perform a hash calculation on the first packet based on a pre-configured port dictionary; a target gateway machine is selected from the public network gateway cluster according to the first hash value; and the first packet is sent to the target gateway machine.

Large network simulation

Systems, methods, and apparatuses are described for simulating a network. Interrogations directed to hosts in the simulated network may be received. For some interrogations, data objects may be instantiated to simulate the interrogated hosts by, e.g., providing responses to low-level network commands. One or more characteristics of a simulated host may be determined randomly or pseudo-randomly.

Large network simulation

Systems, methods, and apparatuses are described for simulating a network. Interrogations directed to hosts in the simulated network may be received. For some interrogations, data objects may be instantiated to simulate the interrogated hosts by, e.g., providing responses to low-level network commands. One or more characteristics of a simulated host may be determined randomly or pseudo-randomly.