Amit Gupta - Mountain View CA Paul W. Jardetzky - Stanford CA
Assignee:
Sun Microsystems, Inc. - Santa Clara CA
International Classification:
H04L 900
US Classification:
713163
Abstract:
Multicast communications are expanded to include the concept of private multicasts. An address space dedicated to multicast is partitioned into a subspace for public multicasts and a subspace for private multicasts. A public key/private key encryption pair is used for private multicasts and installed on domain name servers or on certification authorities. Portions of a multicast join request are sent together with a corresponding encrypted version. Private multicast equipped routers receive the multicast join request, retrieve the public key from a domain name server or from a certification authority and decrypt the encrypted portion of the join request to determine if the requester is authorized. Group specific multicast joins are also permitted by sending a bit-mask identifying a group of senders which are authorized or prohibited from sending to a user joining a multicast.
System And Method For Bandwidth Optimization In A Network Storage Environment
Paul Jardetzky - San Francisco CA, US Steven R. Kleiman - Los Altos CA, US Roger Stager - Sunnyvale CA, US Don Trimmer - Sunnyvale CA, US Ling Zheng - Sunnyvale CA, US Yuval Frandzel - Foster City CA, US
Assignee:
NetApp, Inc. - Sunnyvale CA
International Classification:
G06F 15/16
US Classification:
709200
Abstract:
According to one or more embodiments of the present invention, a network cache intercepts data requested by a client from a remote server interconnected with the cache through one or more wide area network (WAN) links (e. g. , for Wide Area File Services, or “WAFS”). The network cache stores the data and sends the data to the client. The cache may then intercept a first write request for the data from the client to the remote server, and determine one or more portions of the data in the write request that changed from the data stored at the cache (e. g. , according to one or more hashes created based on the data). The network cache then sends a second write request for only the changed portions of the data to the remote server.
System And Method For Bandwidth Optimization In A Network Storage Environment
Paul Jardetzky - San Francisco CA, US Steven R. Kleiman - Los Altos CA, US Roger Stager - Sunnyvale CA, US Don Trimmer - Sunnyvale CA, US Ling Zheng - Sunnyvale CA, US Yuval Frandzel - Foster City CA, US
International Classification:
G06F 15/16
US Classification:
709203
Abstract:
According to one or more embodiments of the present invention, a network cache intercepts data requested by a client from a remote server interconnected with the cache through one or more wide area network (WAN) links (e.g., for Wide Area File Services, or “WAFS”). The network cache stores the data and sends the data to the client. The cache may then intercept a first write request for the data from the client to the remote server, and determine one or more portions of the data in the write request that changed from the data stored at the cache (e.g., according to one or more hashes created based on the data). The network cache then sends a second write request for only the changed portions of the data to the remote server.
High Speed Protection Switching In Label Switched Networks Through Pre-Computation Of Alternate Routes
Paul Wenceslas Jardetzky - Stanford CA Jaroslaw Joseph Sydir - San Jose CA Balaji Srinivasan - Santa Clara CA
Assignee:
CPlane Inc. - Sunnyvale CA
International Classification:
G01R 3108
US Classification:
370216, 370217, 714 4
Abstract:
Method of providing a recovery plan for a connection in a communications network when the connection is disrupted by a failure of a switch, switch or link in the network. In a provisioning phase, a primary plan and recovery plan for a connection to be protected in a communications network are developed. Forwarding information in the form of mapping or forwarding tables is derived from the plans and is distributed to each of the switches in the network. In the event of a failure each switch receives notice of the failure and switches to the recovery plan related to the failure. If and when the failure is repaired or cleared, each switch then switches back to its primary plan. Determining a recovery plan during the provisioning phase is based on the rule that a unit of failure is a switch or group of switches in the network rather than a link, regardless of the actual cause of the failure. This simplifies the mapping tables at each switch and reduces the time for each switch to switch to a recovery plan based on the failure as reported by the other switches in the network. Recovery plan routes are based on a quality of service metric such as the metric of not exceeding a predetermined fraction of the capacity of the links involved in the recovery plan routes.
Employing the X Window System protocol, Quentin Stafford-Fraser wrote the client software, and Paul Jardetzky wrote the server. When web browsers gained the ability to display images ...
Youtube
Where was the first webcam invented?
Created in 1991 by Quentin Stafford-Fraser and Paul Jardetzky, it was ...
Duration:
40s
Marcos Deker & Ernest Margi - North To South ...
Fortunately Quentin Stafford-Fraser and Paul Jardetzky invented the we...
Duration:
3m 46s
Brain Floss: Paul Kobriger | Pro Skater and M...
This one's amazing and special to us. Paul worked as our Marketing Dir...
Duration:
5m 40s
Paul Bakaus from Google: The Illusion of spee...
Paul Bakaus Developer Advocate at Google and Open Source AMP project s...
Duration:
23m 33s
Going Bold, Unpacking Innovation | Paul Mikla...
Paul knows a thing or two about innovation. With 15 years of experienc...
Duration:
9m 38s
100 Scientist's And Their Discoveries
... Brown Webcam - Quentin straford Fraser and Paul Jardetzky Email - ...