摘要:
A method for creating an initial list of peers in a peer-to-peer (P2P) network comprising initiating a connection from a spy node to a suspect node in the network. A peer list is updated if a transaction between said spy node and said suspect node is successful. If the transaction is not successful; the method is started from the beginning if it is necessary to continue initialization process. On the other hand, if the transaction is not successful and if it is not necessary to continue the initialization process the execution is terminated.
摘要:
A method for creating an initial list of peers in a peer-to-peer (P2P) network comprising initiating a connection from a spy node to a suspect node in the network. A peer list is updated if a transaction between said spy node and said suspect node is successful. If the transaction is not successful; the method is started from the beginning if it is necessary to continue initialization process. On the other hand, if the transaction is not successful and if it is not necessary to continue the initialization process the execution is terminated.
摘要:
A method obtains a first data item signature for a first data item, the first data item signature comprising an association between a plurality of synch points in the first data item and a corresponding plurality of block signatures. The process attempts to find one of the synch points in a second data item; and, if such a synch point is found, then a block signature of a corresponding block of bits in the second data item is determined. The process ascertains whether the synch point and corresponding block signature from the second data item correspond to a synch point and block signature in the first data item. If a predetermined number of synch points and corresponding block signatures match, the first and second data items are considered to match. In response to said determining, one or more actions associated with the first data item are performed.
摘要:
A method includes measuring behavioral characteristics of a plurality of communication sessions in a communication network. A subset of the sessions is identified using the behavioral characteristics, such that the sessions in the subset are suspected of using a target communication protocol. A candidate session is selected from the subset. A trial communication session is initiated with a node of the communication network, which participates in the candidate session, using the target communication protocol. Responsively to receiving a positive response from the node to initiation of the trial communication session, it is determined that one or more further sessions in the plurality are using the target communication protocol. The one or more further sessions are controlled responsively to a predetermined control criterion that is applicable to the target communication protocol.
摘要:
A method for allocating a resource in a computer network includes accepting from a peer a request to download a data item using a P2P protocol via the computer network from one or more other peers that store the data item, and determining whether the P2P protocol used by the request is a preferred P2P protocol. When the P2P protocol is determined to be the preferred P2P protocol, up to a maximum data quota derived from a size of the data item is allowed to be downloaded using a first allocation level of the resource. When the P2P protocol is determined not to be the preferred P2P protocol, only a second allocation level, smaller than the first allocation level, is allowed to be used for downloading the data item.
摘要:
A method includes measuring behavioral characteristics of a plurality of communication sessions in a communication network. A subset of the sessions is identified using the behavioral characteristics, such that the sessions in the subset are suspected of using a target communication protocol. A candidate session is selected from the subset. A trial communication session is initiated with a node of the communication network, which participates in the candidate session, using the target communication protocol. Responsively to receiving a positive response from the node to initiation of the trial communication session, it is determined that one or more further sessions in the plurality are using the target communication protocol. The one or more further sessions are controlled responsively to a predetermined control criterion that is applicable to the target communication protocol.
摘要:
A method for identifying conference media traffic includes receiving a plurality of dummy packets and matching a series of the plurality of dummy packets to a signature key. The method also includes extracting a first identification from one or more of the plurality of dummy packets in response to matching a series of the plurality of dummy packets to a signature key and determining that a second identification associated with one or more encrypted media packets matches the first identification. The method also includes associating one or more encrypted media packets with a conference in response to determining that the first identification matches the second identification.
摘要:
A communication system includes multiple routers interconnected by a packet-based communication network. Each of the routers includes a monitoring application that monitors quality of one or more packet flows during each of multiple successive monitoring periods. For each of the packet flows, the monitoring application determines quality metrics based on information obtained from transport headers of packets.
摘要:
Multiple networked devices behind a NAT device are identified by sampling a proportion of data packets traversing the network and comparing the packet IP Identification fields. Depending on proximity of the values in different packets, each sampled packet is associated with one of currently known devices using the NAT, or identified with a newly recognized device.
摘要:
An apparatus for charging a network subscriber's prepaid network usage account in real time. The apparatus has a service engine, a service manager and a quota manager. The service engine is operable to analyze network traffic flow through the apparatus and to identify a network transaction corresponding to the account. The service engine is further operable to determine a usage quota for the subscriber. The service manager is operable to maintain information related to the subscriber and the account. The quota manager is operable to communicate with an external prepaid server.