Patent classifications
H04L67/563
SYSTEM AND METHOD FOR PERFORMING LOSSLESS SWITCHING IN A REDUNDANT MULTICAST NETWORK
A system and method is provided for performing lossless switching in a redundant multicast network. An exemplary method includes receiving a primary media stream and a redundant media stream over different forwarding network paths by network ports of a receiver communicatively coupled to an A/V device. Furthermore, the receiver outputs media data of the media streams to the A/V device to be presented thereon. In response to a control signal to switch the receiver to a new primary media stream, the method disconnected either the primary ort the redundant media streams from the respective network port of the receiver receiving that stream. Furthermore, the method includes controlling the disconnected network port to receive the new primary media stream and then outputting media data of the new primary media stream to the A/V device to be presented thereon.
SYSTEM AND METHOD FOR PERFORMING LOSSLESS SWITCHING IN A REDUNDANT MULTICAST NETWORK
A system and method is provided for performing lossless switching in a redundant multicast network. An exemplary method includes receiving a primary media stream and a redundant media stream over different forwarding network paths by network ports of a receiver communicatively coupled to an A/V device. Furthermore, the receiver outputs media data of the media streams to the A/V device to be presented thereon. In response to a control signal to switch the receiver to a new primary media stream, the method disconnected either the primary ort the redundant media streams from the respective network port of the receiver receiving that stream. Furthermore, the method includes controlling the disconnected network port to receive the new primary media stream and then outputting media data of the new primary media stream to the A/V device to be presented thereon.
Game server switching method, apparatus, and system
A game server switching method, applied to a game server switching system, is provided, the game server switching system including a load balancer, a network-layer access subsystem, a network-layer proxy subsystem, a game logic subsystem, and a role login management server. A communication connection is established between the network-layer access subsystem and the second game server based on the route switching request message. A write-back request is sent by the first game server to the role login management server. User role data are sent by the role login management server to the second game server based on the write-back request. In response to obtaining the user role data from the role login management server, the game data are sent by the second game server to the game client by using the network-layer proxy subsystem, the network-layer access subsystem, and the load balancer.
Game server switching method, apparatus, and system
A game server switching method, applied to a game server switching system, is provided, the game server switching system including a load balancer, a network-layer access subsystem, a network-layer proxy subsystem, a game logic subsystem, and a role login management server. A communication connection is established between the network-layer access subsystem and the second game server based on the route switching request message. A write-back request is sent by the first game server to the role login management server. User role data are sent by the role login management server to the second game server based on the write-back request. In response to obtaining the user role data from the role login management server, the game data are sent by the second game server to the game client by using the network-layer proxy subsystem, the network-layer access subsystem, and the load balancer.
STATE-SHARING PLUG-IN IN A COMPUTING WORKSPACE ENVIRONMENT
Systems and methods of controlling a state of electronic messaging applications are provided. A system detects a launch of a network application via an embedded browser. The network application is associated with a session identifier of a user. The system identifies one or more electronic messaging applications on a client device of the user. The system transmits, responsive to the launch of the network application associated with the session identifier, an instruction to one or more servers managing the one or more electronic messaging applications to control a state of the one or more electronic messaging applications.
System and method of secured interface to a blockchain based network
Systems and methods of securing interface to a blockchain based network, including generating, by a server, a proxy communication layer for communication between the server and a computerized device, wherein the proxy communication layer replaces an IP address of the computerized device with another IP address, intercepting, by the server, data communicated through the proxy communication layer, and blocking, by the server, unauthorized communication data intercepted by the server, wherein communication requests associated with unauthorized IP addresses are blocked, where the server is in communication with the blockchain based network, and wherein the server provides a web interface to decentralized applications of the blockchain based network.
System and method of secured interface to a blockchain based network
Systems and methods of securing interface to a blockchain based network, including generating, by a server, a proxy communication layer for communication between the server and a computerized device, wherein the proxy communication layer replaces an IP address of the computerized device with another IP address, intercepting, by the server, data communicated through the proxy communication layer, and blocking, by the server, unauthorized communication data intercepted by the server, wherein communication requests associated with unauthorized IP addresses are blocked, where the server is in communication with the blockchain based network, and wherein the server provides a web interface to decentralized applications of the blockchain based network.
Network controlled content recording using network and local storage
A storage controller of a network controlled content recording system that uses a combination of network and local storage determines to record content for a user. The storage controller performs an evaluation to determine whether to store the content in network or local storage. The evaluation may include evaluating a set of rules and/or characteristics of the user, characteristics of the content, characteristics of a request to record the content, and so on. The storage controller then arranges for the content to be recorded accordingly. Subsequently, the storage controller may reevaluate storage locations and direct transfer accordingly. This reevaluation may include determining that various characteristics related to the user, the content, and so on have changed and that transfer is appropriate due to that change.
Network controlled content recording using network and local storage
A storage controller of a network controlled content recording system that uses a combination of network and local storage determines to record content for a user. The storage controller performs an evaluation to determine whether to store the content in network or local storage. The evaluation may include evaluating a set of rules and/or characteristics of the user, characteristics of the content, characteristics of a request to record the content, and so on. The storage controller then arranges for the content to be recorded accordingly. Subsequently, the storage controller may reevaluate storage locations and direct transfer accordingly. This reevaluation may include determining that various characteristics related to the user, the content, and so on have changed and that transfer is appropriate due to that change.
Intelligently pre-positioning and migrating compute capacity in an overlay network, with compute handoff and data consistency
Edge server compute capacity demand in an overlay network is predicted and used to pre-position compute capacity in advance of application-specific demands. Preferably, machine learning is used to proactively predict anticipated compute capacity needs for an edge server region (e.g., a set of co-located edge servers). In advance, compute capacity (application instances) are made available in-region, and data associated with an application instance is migrated to be close to the instance. The approach facilitates compute-at-the-edge services, which require data (state) to be close to a pre-positioned latency-sensitive application instance. Overlay network mapping (globally) may be used for more long-term positioning, with short-duration scheduling then being done in-region as needed. Compute instances and associated state are migrated intelligently based on predicted (e.g., machine-learned) demand, and with full data consistency enforced.