US6493765B1 - Domain name resolution in a network having multiple overlapping address domains - Google Patents
Domain name resolution in a network having multiple overlapping address domains Download PDFInfo
- Publication number
- US6493765B1 US6493765B1 US09/274,944 US27494499A US6493765B1 US 6493765 B1 US6493765 B1 US 6493765B1 US 27494499 A US27494499 A US 27494499A US 6493765 B1 US6493765 B1 US 6493765B1
- Authority
- US
- United States
- Prior art keywords
- address
- domain name
- destination host
- domain
- destination
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
- 238000004891 communication Methods 0.000 claims abstract description 68
- 238000000034 method Methods 0.000 claims abstract description 28
- 238000013519 translation Methods 0.000 claims description 231
- 238000004590 computer program Methods 0.000 claims description 6
- 230000014616 translation Effects 0.000 description 216
- 238000010586 diagram Methods 0.000 description 25
- 238000013507 mapping Methods 0.000 description 16
- 230000003287 optical effect Effects 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000006855 networking Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/09—Mapping addresses
- H04L61/10—Mapping addresses of different types
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/45—Network directories; Name-to-address mapping
- H04L61/4505—Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols
- H04L61/4511—Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols using domain name system [DNS]
Definitions
- the present invention relates generally to communication networks, and, more particularly, to domain name resolution in a network having multiple overlapping address domains.
- a large communication network is typically constructed by segregating the multitude of communication devices into a number of subnetworks, and internetworking the subnetworks over a high-speed backbone network.
- each communication device is typically assigned a network address that is used for routing packets between a source communication device and a destination communication device within the communication network.
- the communication network may be logically divided into multiple address domains. Network addresses are required to be unique within a particular address domain, but are not required to be unique across multiple address domains.
- the source host Before a packet can be transmitted from a source host in a source address domain to a destination host in a destination address domain, the source host must obtain the network address of the destination host.
- One way for the source host to obtain the network address of the destination host is through domain name resolution.
- the source host is provided with a domain name that is associated with the destination host.
- the source host transmits a domain name resolution request message to a domain name system server, which translates the domain name into the network address of the destination host.
- the network address of the destination host may map to multiple communication devices, in which case the network address does not uniquely identify one communication device within the communication network.
- Such an overlapping network address cannot be used as the destination address of a packet because it is ambiguous as to the destination communication device for the packet.
- the destination host domain name is resolved into a unique destination host global address by first resolving the destination host domain name into its corresponding destination host local address, and then translating the destination host local address into the destination host global address.
- a domain name system proxy uses a domain name system server in a destination address domain to obtain a destination host local address corresponding to a destination host domain name, and then uses a network address translator to obtain a destination host global address corresponding to the destination host local address.
- the destination host global address is preferably specific to a source address domain from which the domain name resolution is initiated, specifically by a source host in the source address domain.
- FIG. 1 is a block diagram showing an exemplary communication network having multiple overlapping address domains in accordance with a preferred embodiment of the present invention
- FIG. 2A is a diagram showing an exemplary source address translation table for a first source (inbound) address domain in the communication network in accordance with a preferred embodiment of the present invention
- FIG. 2B is a diagram showing an exemplary source address translation table for a second source (inbound) address domain in the communication network in accordance with a preferred embodiment of the present invention
- FIG. 2C is a diagram showing an exemplary source address translation table for a third source (inbound) address domain in the communication network in accordance with a preferred embodiment of the present invention
- FIG. 2D is a diagram showing an exemplary destination address translation table in accordance with a preferred embodiment of the present invention.
- FIG. 3 is a logic flow diagram showing exemplary network address translator logic for creating a source address translation table entry and a corresponding destination address translation table entry in accordance with a preferred embodiment of the present invention
- FIG. 4 is a message flow diagram showing an exemplary message flow for resolving a domain name into a destination host global address in accordance with a preferred embodiment, of the present invention
- FIG. 5 is a logic flow diagram showing exemplary domain name system proxy logic for resolving a domain name into a destination host global address in accordance with a preferred embodiment of the present invention
- FIG. 6 is a logic flow diagram showing exemplary network address translator logic for translating a destination host local address into a destination host global address as part of a domain name resolution procedure in accordance with a preferred embodiment of the present invention
- FIG. 7 is a message flow diagram showing an exemplary message flow for a first exemplary embodiment of the present invention.
- FIG. 8 is a message flow diagram showing an exemplary message flow for a second exemplary embodiment of the present invention.
- FIG. 9 is a logic flow diagram showing exemplary network address translator logic for performing network address translation on a packet in accordance with a preferred embodiment of the present invention.
- FIG. 10A is a logic flow diagram showing exemplary destination address translation logic for translating a destination address from a destination host global address into a destination host local address in a destination (outbound) address domain in accordance with a preferred embodiment of the present invention
- FIG. 10B is a logic flow diagram showing exemplary source address translation logic for translating a source address from a source host local address into a source host global address for the destination (outbound) address domain in accordance with a preferred embodiment of the present invention.
- FIG. 11 is a block diagram showing an exemplary network address translator in accordance with a preferred embodiment of the present invention.
- a Domain Name System (DNS) Proxy receives a domain name resolution request including a destination host domain name and uses a local DNS Server in the destination address domain to resolve the destination host domain name into a destination host local address that may be ambiguous within the communication network.
- DNS Proxy uses a network address translator (NAT) to translate the overlapping destination host local address into a unique destination host global address. More specifically, the DNS Proxy receives the domain name resolution request message from the source address domain.
- the domain name resolution request message includes the destination host domain name.
- the DNS Proxy sends a domain name resolution request message to the local DNS Server in the destination host domain in order to obtain the corresponding destination host local address, and sends a translation request message to the NAT in order to obtain the destination host global address.
- the NAT maps the destination host local address to a unique destination host global address that is specific to the source address domain, as described in the related U.S. patent application entitled NETWORK ADDRESS TRANSLATION IN A NETWORK HAVING MULTIPLE OVERLAPPING ADDRESS DOMAINS, which was incorporated by reference above.
- the DNS Proxy Upon receiving the destination host global address from the NAT, the DNS Proxy sends a domain name/resolution response message including the destination host global address.
- the destination host domain name is effectively resolved into the destination host global address that is unique with the communication network.
- the DNS Proxy performs domain name resolution in a communication network having multiple overlapping address domains, such as the exemplary communication network 100 as shown in FIG. 1 .
- the exemplary communication network 100 there are three (3) hosts that share a common network address A across three (3) overlapping address domains, namely host X 110 in address domain 1 , host Y 120 in address domain 2 , and host Z 130 in address domain 3 .
- the address A represents the local address for each host that uniquely identifies a particular host within its own address domain.
- the communication network 100 includes a NAT 102 to perform, among other things, the network address translations needed to resolve the ambiguity of the address A within the communication network 100 .
- the NAT 102 maps the overlapping-address A from the address domain p to a global address that is unique to the address domain q and is also unique within the communication network 100 .
- the global address for a host having the local address A in the address domain p when referenced from a host in the address domain q is represented by the symbol Apq.
- Apq is the global address for the address A in address domain p when referenced from address domain q.
- the NAT 102 typically maintains at least the following global address mappings:
- a 12 is the host X global address when referenced from address domain 2 ;
- a 13 is the host X global address when referenced from address domain 3 ;
- a 14 is the host X global address when referenced from address domain 4 ;
- a 21 is the host Y global address when referenced from address domain 1 ;
- a 23 is the host Y global address when referenced from address domain 3 ;
- a 24 is the host Y global address when referenced from address domain 4 ;
- a 31 is the host Z global address when referenced from address domain 1 ;
- a 32 is the host Z global address when referenced from address domain 2 ;
- a 34 is the host Z global address when referenced from address domain 4 .
- the NAT 102 maintains a separate source address translation table for each overlapping address domain, and maintains a single destination address translation table.
- Each source address translation table maps the overlapping network addresses in the source address domain to the corresponding global addresses for each of the potential destination address domains.
- the destination address translation table maps the global addresses to their corresponding local addresses.
- the preferred NAT 102 maintains three (3) source address translation tables and one (1) destination address translation table.
- An exemplary source address translation table for address domain 1 shown in FIG. 2A, maps the host X local address (i.e., A) to the respective host X global addresses for domains 2 , 3 , and 4 (i.e., A 12 , A 13 , and A 14 , respectively).
- An exemplary source address translation table for address domain 2 shown in FIG. 2B, maps the host Y local address (i.e., A) to the respective host Y global addresses for domains 1 , 3 , and 4 (i.e., A 21 , A 23 , and A 24 , respectively).
- An exemplary source address translation table for address domain 3 maps the host Z local address (i.e., A) to the respective host Z global addresses for domains 1 , 2 , and 4 (i.e., A 31 , A 32 , and A 34 , respectively).
- No source address translation table is maintained for address domain 4 , since, in this example, address domain 4 has no overlapping network addresses.
- An exemplary destination address translation table shown in FIG. 2D, maps the global addresses to their corresponding local addresses.
- the source table(s) and the destination table provide redundant information, such that, for example, the source address translation table(s) can be searched in reverse to obtain a local address corresponding to a particular global address, or the destination address translation table can be searched in reverse to obtain a global address corresponding to a particular local address in the source address domain.
- the appropriate entries In order to transfer a packet from the source host in the source address domain to the destination host in the destination address domain using network address translation, the appropriate entries must be created in the source address table(s) and the destination address table. Specifically, for any network address that must be translated, there must be a source address translation table entry mapping the source host local address in the source address domain to a unique source host global address for the destination address domain, and there must be a destination address translation table entry mapping the source host global address for the destination address domain back to the source host local address in the source address domain.
- the address translation table entries are created dynamically by the NAT 102 , although the address translation table entries may alternatively be created manually.
- the NAT 102 is provided with at least a source host local address, a source address domain identifier, and a destination address domain identifier.
- the NAT 102 selects a source host global address from a pool of global network addresses, and creates the address translation table entries.
- the NAT 102 creates a source address translation table entry mapping the source host local address in the source address domain to the selected source host global address for the destination address domain, and creates a destination address translation entry mapping the selected source host global address for the destination address domain to the source host local address in the source address domain.
- FIG. 3 is a logic flow diagram showing exemplary NAT 102 logic for creating a source address translation table entry and its corresponding destination address translation table entry.
- the logic receives a host local address, a first address domain identifier identifying the host address domain, and a second address domain identifier identifying an address domain from which the host is referenced, in step 304 .
- the logic proceeds to select a unique global address for the host, in step 306 , preferably from a pool of global addresses maintained by the NAT 102 .
- the logic Upon selecting the unique global address in step 306 , the logic creates a source address translation table entry in the first address domain's source address translation table, in step 308 , and a corresponding destination address translation table entry, in step 310 .
- the source address translation table entry maps the host local address in the first address domain to the selected global address for the second address domain.
- the destination address translation table entry maps the selected global address to the host local address in the first address domain.
- the logic terminates in step 399 .
- the NAT 102 dynamically creates certain address translation table entries as part of a domain name resolution procedure, and dynamically creates other address translation entries as part of a packet processing procedure (described in more detail below).
- the domain name resolution procedure enables the source host to obtain a destination host global address for the destination host based upon a domain name of the destination host. More particularly, in order for the source host to transmit a packet to the destination host, the source host is provided with a domain name that is associated with the destination host. The domain name uniquely identifies the destination host, although the domain name is not a network address. The source host invokes the domain name resolution procedure in order to resolve the domain name into the destination host global address. Because the destination host local address may overlap with other addresses when the communication network includes multiple overlapping address domains, a preferred domain name resolution procedure utilizes network address translation to translate the overlapping destination host local address into a unique destination host global address.
- the source host sends a domain name resolution request to a local DNS Server in the source address domain.
- the domain name resolution request includes, among other things, a source address equal to the source host local address and the domain name associated with the destination host.
- the local DNS Server in the source address domain maintains a cache of domain name/network address mappings for hosts within the source address domain.
- the local DNS Server in the source address domain determines the destination host domain name corresponds to a host in a different address domain. The local DNS Server therefore sends a domain name resolution request to the DNS Proxy 104 .
- the DNS Proxy 104 performs domain name resolution across multiple address domains. Upon receiving the domain name resolution request from the local DNS Server in the source address domain, the DNS Proxy 104 determines the destination address domain for the destination host domain name, and sends a domain name resolution request to the local DNS Server in the destination address domain. The local DNS Server in the destination address domain maintains a cache of domain name/network address mappings for hosts within the destination address domain. Upon receiving the domain name resolution request from the DNS Proxy 104 , the local DNS Server in the destination address domain resolves the domain name, and returns the destination host local address to the DNS Proxy 104 .
- the DNS Proxy 104 Upon receiving the destination host local address from the local DNS Server in the destination address domain, the DNS Proxy 104 sends a translation request to the NAT 102 to translate the destination host local address into a unique destination host global address.
- the translation request includes, among other things, a source address domain identifier, the destination host local address, and a destination address domain identifier.
- the NAT 102 maintains a pool of global network addresses, and also maintains a number of address translation entries, where each address translation entry maps a local host address from one address domain to a global address that is specific to another address domain.
- the NAT 102 Upon receiving the translation request from the DNS Proxy 104 , the NAT 102 first determines whether there is an existing address translation table entry mapping the destination host local address to a destination host global address that is specific to the source address domain. If there is not an existing address translation table entry mapping the destination host local address to a destination host global address that is specific to the source address domain, then the NAT 102 creates the appropriate address translation table entries.
- the NAT 102 selects a destination host global address from the pool of global network addresses, and creates both a source address translation entry and a corresponding destination address translation entry mapping the destination host local address to the destination host global address specifically for the source address domain.
- the source address translation table entry includes a Source Local Address field equal to the destination host local address, a Source Address Domain field equal to the destination address domain, a Destination Address Domain field equal to the source address domain, and a Source Global Address field equal to the selected destination host global address.
- the corresponding destination address translation table-entry includes a Destination Global Address field equal to the selected destination host global address, a Source Address Domain field equal to the source address domain, a Destination Address Domain-field equal to the a destination address domain, and a Destination Local Address field equal to the destination host local address.
- the NAT 102 sends a translation response to the DNS Proxy 104 including the destination host global address.
- the DNS Proxy 104 Upon receiving the translation response from the NAT 102 , the DNS Proxy 104 sends a domain name resolution response to the local DNS Server in the source address domain including the destination host global address.
- the local DNS Server in the source address domain sends a domain name resolution response to the source host including the destination host global address.
- the domain name associated with the destination host is resolved into a unique destination host global address that the source host can use to transmit a packet to the destination host.
- FIG. 4 is a message flow diagram showing an exemplary message exchange among the source host in the source address domain, the local DNS Server in the source address domain, the DNS Proxy 104 , the local DNS Server in the destination address domain, and the NAT 102 for resolving the destination host domain name into the unique destination host global address.
- the source host sends a domain name resolution request message 402 to the local DNS Server in the source address domain including, among other things, a source address equal to the source host local address and the destination host domain name. Since the local DNS Server in the source address domain is unable to resolve the destination host domain name, the local DNS Server in the source address domain sends a domain name resolution request message 403 to the DNS Proxy 104 .
- the DNS Proxy 104 sends a domain name resolution request message 404 to the local DNS Server in the destination address domain including, among other things, the destination host domain name.
- the local DNS Server in the destination address domain resolves the destination host domain name into its corresponding destination host local address, and sends a domain name resolution response message 406 to the DNS Proxy 104 including, among other things, the destination host local address.
- the DNS Proxy 104 sends a translation request message 408 to the NAT 102 including, among other things, the source address domain identifier, the destination host local address, and the destination address domain identifier.
- the NAT 102 Upon receiving the translation request message 408 , the NAT 102 creates the appropriate address translation entries, if necessary, and sends a translation response message 410 to the DNS Proxy 104 including, among other things, the destination host global address.
- the DNS Proxy 104 sends a domain name resolution response message 412 to the local DNS Server in the source address domain, which, in turn, sends a domain name resolution response message 414 to the source host including, among other things, the destination host global address.
- FIG. 5 is a logic flow diagram showing exemplary DNS Proxy 104 logic for resolving a domain name in a network having multiple overlapping address domains.
- the DNS Proxy 104 receives the domain name resolution request message 403 , in step 504 .
- the domain name resolution request message 403 includes, among other things, the destination host domain name associated with the destination host in the destination address domain.
- the DNS Proxy 104 sends the domain name resolution request message 404 to the local DNS Server in the destination address domain, in step 506 .
- the domain name resolution request message 404 includes, among other things, the destination host domain name.
- the DNS Proxy 104 then monitors for the domain name resolution response message 406 from the local DNS Server in the destination address domain including the destination host local address.
- the DNS Proxy 104 Upon receiving the domain name resolution response message 406 including the destination host local address, in step 508 , the DNS Proxy 104 sends the translation request message 408 to the NAT 102 , in step 510 .
- the translation request message 408 includes, among other things, the source address domain identifier, the destination host local address, and the destination address domain identifier.
- the DNS Proxy 104 then monitors for the translation response message 410 from the NAT 102 including the destination host global address.
- the DNS Proxy 104 Upon receiving the translation response message 410 from the NAT 102 , in step 512 , the DNS Proxy 104 sends the domain name resolution response message 412 , in step 514 .
- the domain name resolution response message 412 includes, among other things, the destination host global address.
- the DNS Proxy 104 logic terminates in step 599 .
- FIG. 6 is a logic flow diagram showing exemplary NAT 102 logic for translating the destination host local address into the unique destination host global address that is specific to the source address domain as part of the domain name resolution procedure.
- the NAT 102 receives the translation request message 408 from the DNS Proxy 104 , in step 604 .
- the translation request message 408 includes, among other things, the source address domain identifier, the destination host local address, and the destination address domain identifier.
- the NAT 102 searches the address translation entries for an address translation entry mapping the destination host local address in the destination address domain to a unique destination host global address for the source address domain, in step 606 .
- the NAT 102 finds such an address translation entry (YES in step 608 ), then the NAT 102 proceeds to step 618 . Otherwise (NO in step 608 ), the NAT 102 creates the source address translation table entry and the corresponding destination address translation entry.
- the NAT 102 In order to create the address translation table entries, the NAT 102 first selects a unique destination host global address, in step 612 , preferably from a pool of global network addresses maintained by the NAT 102 . Upon selecting the destination host global address in step 612 , the NAT 102 creates a source address translation table entry in the destination address domain's source address translation table, in step 614 , and a corresponding destination address translation table entry, in step 616 .
- the source address translation table entry maps the destination host local address in the destination address domain to the destination host global address for the source address domain.
- the destination address translation table entry maps the destination host global address to the destination host local address in the destination address domain.
- step 618 the NAT 102 sends the translation response message 412 including the destination host global address.
- the NAT 102 logic terminates in step 699 .
- the source host transmits a packet including, as the destination address, the destination host global address for the source address domain, and, as the source address, the source host local address.
- the destination address uniquely identifies the destination host within the communication network 100 .
- the source address is an ambiguous address within the communication network 100 .
- the NAT 102 Upon receiving the packet, the NAT 102 uses the destination address to determine, among other things, the destination address domain for the packet. However, the NAT 102 cannot simply route the packet to the destination host over the destination address domain using traditional routing techniques. This is because the destination address in the packet is not equal to the destination host local address in the destination address domain, and, consequently, the packet would not be received by the destination host in the destination address domain.
- the NAT 102 translates the destination address from the destination host global address into the destination host local address.
- the NAT 102 uses the destination address translation table to obtain the destination host local address, specifically by finding the destination address translation table entry corresponding to the destination host global address and obtaining therefrom the destination host local address.
- the NAT 102 may also have to translate the source address in the packet from the source host local address in the source address domain into a unique source host global address for the destination address domain.
- Such an address translation is required when the source host local address is an overlapping address within the communication network.
- the source address translation is done so that the destination host receives a globally unique source address that uniquely identifies the source host within the communication network. The source address can therefore be used by the destination host, for example, to send a response packet to the source host.
- the NAT 102 In order to translate the source address, the NAT 102 first determines both the source domain (either implicitly based upon the interface over which the packet is received or explicitly from the destination address translation table entry) and the destination domain (from the destination address translation table entry) for the packet. The NAT 102 then searches the address translation entries to find an address translation entry mapping the source host local address in the source address domain to a source host global address for the destination address domain. If the NAT 102 finds such an address translation entry, then the NAT 102 translates the source address in the packet by extracting the source host global address from the address translation entry and replacing the source host local address in the packet with the source host global address.
- the NAT 102 dynamically allocates a source host global address for the destination address domain, creates the appropriate address translation entries, and translates the source address in the packet by replacing the source host local address in the packet with the dynamically allocated source host global address.
- the NAT 102 first selects the source host global address from a pool of network addresses. The NAT 102 then creates a source address translation table entry in the source address translation table for the source address domain and a corresponding destination address translation table entry in the destination address translation table.
- the source address translation table entry includes a Source Local Address field equal to the source host local address, a Source Address Domain field equal to the source address domain, a Destination Address Domain field equal to the destination address domain, and a Source Global Address field equal to the selected source host global address.
- the corresponding destination address translation table entry includes a Destination Global Address field equal to the selected source host global address, a Source Address Domain field equal to the destination address domain, a Destination Address Domain field equal to the source address domain, and a Destination Local Address field equal to the source host local address.
- the NAT After translating either the destination address, the source address, or both addresses in the packet, the NAT forwards the translated packet to the destination host over the destination address domain.
- the network address translations described above can be demonstrated by example. Two examples are set forth below. The first example follows the network address translations of a packet sent by the host X 110 to the host Y 120 and a corresponding response packet sent by the host Y 120 back to the host X 110 . The second example follows the network address translations of a packet sent by the host X 110 to the host B 140 and a corresponding response packet sent by the host B 140 back to the host X 110 . In these examples, it is assumed that the host X 110 has obtained the destination address using domain name resolution or some other means. For convenience, the convention (S, D) is used to indicate a packet having source address S and destination address D.
- FIG. 7 is a message flow diagram showing an exemplary packet exchange between the host X 110 in the address domain 1 and the host Y 120 in the address domain 2 .
- the host X 110 transmits the packet 702 including, as the source address, the host X local address (i.e., A), and, as the destination address, the host Y global address for address domain 1 (i.e., A 21 ).
- the host Y global address A 21 uniquely identifies the host Y 120 within the communication network 100 .
- the host X local address A is ambiguous within the communication network 100 , since it does not uniquely identify the host X 110 .
- the NAT 102 Upon receiving the packet 702 , the NAT 102 determines that both the source address and the destination address require address translation. In order to translate the destination address, the NAT 102 uses the destination address translation table shown in FIG. 2D to find the destination address translation table entry 226 corresponding to the destination address A 21 , and obtains therefrom the host Y local address A. In order to translate the source address, the NAT 102 obtains the destination address domain from the destination address translation table entry 226 (i.e., address domain 2 ), and also determines the source address domain (i.e., address domain 1 ) either implicitly based upon the interface over which the packet 702 is received or explicitly from the destination address translation table entry 226 .
- the destination address translation table entry 226 i.e., address domain 2
- the source address domain i.e., address domain 1
- the source address domain indicates the particular source address translation table required for the source address translation, which, in this example, is the source address translation table for address domain 1 shown in FIG. 2 A.
- the NAT 102 finds the source address translation table entry 202 corresponding to the host X local address for destination (outbound) address domain 2 , and obtains therefrom the host X global address for address domain 2 (i.e., A 12 ).
- the NAT 102 then formats the packet 704 including, as the source address, the host X global address for address domain 2 (i.e., A 12 ), and, as the destination address, the host Y local address (i.e., A).
- the NAT 102 forwards the packet 704 to the host Y 120 over the address domain 2 .
- the host Y 120 may transmit a response packet 706 including, as the source address, the host Y local address (i.e., A), and, as the destination address, the host X global address for address domain 2 (i.e., A 12 ), typically copied from the source address of the packet 704 .
- the host X global address A 12 uniquely identifies the host X 110 within the communication network 100 .
- the host Y local address A is ambiguous within the communication network 100 , since it does not uniquely identify the host Y 120 .
- the NAT 102 Upon receiving the packet 706 , the NAT 102 determines that both the source address and the destination address require address translation. In order to translate the destination address, the NAT 102 uses the destination address translation table shown in FIG. 2D to find the destination address translation table entry 220 corresponding to the destination address A 12 , and obtains therefrom the host X local address A. In order to translate the source address, the NAT 102 obtains the destination address domain from the destination address translation table entry 220 (i.e., address domain 1 ), and also determines the source address domain (i.e., address domain 2 ) either implicitly based upon the interface over which the packet 706 is received or explicitly from the destination address translation table entry 220 .
- the destination address translation table entry 220 i.e., address domain 1
- the source address domain i.e., address domain 2
- the source address domain indicates the particular source address translation table required for the source address translation, which, in this example, is the source address translation table for address domain 2 shown in FIG. 2 B.
- the NAT 102 finds the source address translation table entry 208 corresponding to the host Y local address for destination (outbound) address domain 1 , and obtains therefrom the host Y global address for address domain 1 (i.e., A 21 ).
- the NAT 102 then formats the packet 708 including, as the source address, the host Y global address for address domain 1 (i.e., A 21 ), and, as the destination address, the host X local address (i.e., A).
- the NAT 102 forwards the packet 708 to the host X 110 over the address domain 1 .
- FIG. 8 is a message flow diagram showing an exemplary packet exchange between the host X 110 in the address domain 1 and the host B 140 in the address domain 4 .
- the host X 110 transmits the packet 802 including, as the source address, the host X local address (i.e., A), and, as the destination address, the host B network address (i.e., B).
- the host B network address B uniquely identifies the host B 140 within the communication network 100 .
- the host X local address A is ambiguous within the communication network 100 , since it does not uniquely identify the host X 110 .
- the NAT 102 determines that only the source address requires address translation. In order to translate the source address, the NAT 102 determines the destination address domain, for example, by finding the destination address translation table entry 238 in the destination address translation table, and obtaining therefrom the destination (outbound) domain (i.e., address domain 4 ). The NAT 102 also determines the source address domain (i.e., address domain 1 ) implicitly based upon the interface over which the packet 502 is received (there is no explicit source address domain associated with the network address B). The source address domain indicates the particular source address translation table required for the source address translation, which, in this example, is the source address translation table for address domain 1 shown in FIG. 2 A.
- the NAT 102 finds the source address translation table entry 206 corresponding to the host X local address for destination (outbound) address domain 4 , and obtains therefrom the host X global address for address domain 4 (i.e., A 14 ). The NAT 102 then formats the packet 804 including, as the source address, the host X global address for address domain 4 (i.e., A 14 ), and, as the destination address, the host B network address (i.e., B). The NAT 102 forwards the packet 804 to the host B 140 over the address domain 4 .
- the host B 140 may transmit a response packet 806 including, as the source address, the host B network address (i.e., B), and, as the destination address, the host X global address for address domain 4 (i.e., A 14 ), typically copied from the source address of the packet 804 .
- the host X global address A 14 uniquely identifies the host X 110 within the communication network 100 .
- the host B network address B is unambiguous within the communication network 100 .
- the NAT 102 Upon receiving the packet 806 , the NAT 102 determines that only the destination address requires address translation. In order to translate the destination address, the NAT 102 uses the destination address translation table shown in FIG. 2D to find the destination address translation table entry 224 corresponding to the destination address A 14 , and obtains therefrom the host X local address A. The NAT 102 then formats the packet 808 including, as the source address, the host B network address B; and, as the destination address, the host X local address A. The NAT 102 forwards the packet 808 to the host X 110 over the address domain 1 .
- FIG. 9 is a logic flow diagram showing exemplary NAT 102 logic for processing a packet received from the source host.
- the NAT 102 receives from the source host a packet including a source address equal to a source host local address and a destination address equal to a destination host global address, in step 904 .
- the destination host global address is, by definition, a unique address within the communication network 100 , although the destination host global address may or may not need to be translated into a destination host local address in the destination address domain.
- the source host local address may be either a unique address within the communication network 100 or an overlapping address that needs to be translated into a source host global address for the destination address domain.
- the NAT 102 determines whether the destination address requires translation, in step 906 . If the destination address requires translation (YES in step 908 ), then the NAT 102 translates the destination address from the unique destination host global address to the destination host local address in the destination address domain, in step 910 , as described in detail with respect to FIG. 10A below.
- the NAT 102 determines whether the source address requires translation, in step 912 . If the source address requires translation (YES in step 914 ), then the NAT 102 translates the source address from the overlapping source host local address to the unique source host global address for the destination address domain, in step 916 , as described in detail with respect to FIG. 10B below.
- the NAT 102 forwards the translated packet into the destination address domain, in step 918 .
- the NAT 102 logic terminates in step 999 .
- FIG. 10A is a logic flow diagram showing exemplary NAT 102 destination address translation logic 910 in a preferred embodiment of the present invention.
- the NAT 102 searches the destination address translation table for a destination address translation table entry corresponding to the destination host global address, in step 1012 , specifically by searching the destination address translation table for a destination address translation table entry having a Destination Global Address field equal to the destination host global address.
- the NAT 102 obtains the destination host local address from the destination address translation table entry, in step 1014 , specifically by obtaining the destination host local address from the Destination Local Address field of the destination address translation table entry.
- the NAT 102 translates the destination address in the packet from the destination host global address into the destination host local address, in step 1016 .
- the destination address translation logic terminates in step 1018 .
- FIG. 10B is a logic flow diagram showing exemplary NAT 102 source address translation logic 916 in a preferred embodiment of the present invention.
- the NAT 102 determines the source (inbound) domain for the packet, in step 1022 , for example, based upon the Source Address Domain field of the destination address translation table entry or the NAT 102 network interface over which the packet was received.
- the NAT 102 also determines the destination (outbound) domain for the packet based upon the destination address in the packet, in step 1024 , typically as part of the preceding destination address translation.
- the NAT 102 proceeds to select a source address translation table for the source (inbound) domain, in step 1026 , based upon the source (inbound) domain for the packet determined in step 1022 .
- the NAT 102 searches the source address translation table for a source address translation table entry mapping the source host local address in the source (inbound) address domain to the source host global address for the destination (outbound) address domain, in step 1028 , specifically by searching the source address translation table for a source address translation table entry having a Source Local Address field equal to the source host local address and a Destination Address Domain field equal to the destination (outbound) domain determined in step 1024 .
- the NAT 102 proceeds to translate the source address in the packet from the source host local address into the source host global address for the destination (outbound) address domain, in step 1038 .
- the NAT 102 obtains the source host global address from the Source Global Address field of the source address translation table entry, and replaces the source host local address in the packet with the source host global address.
- the source address translation logic then terminates in step 1040 .
- the NAT 102 dynamically allocates a source host global address for the destination address domain, creates the appropriate address translation entries, and translates the source address in the packet by replacing the source host local address in the packet with the dynamically allocated source host global address.
- the NAT 102 first selects a unique source host global address from a pool of network addresses, in step 1032 .
- the NAT 102 then creates a source address translation table entry in the source (inbound) address domain's source address translation table mapping the source host local address in the source (inbound) address domain to the source host global address for the destination (outbound) address domain, in step 1034 , and creates a corresponding destination address translation table entry in the destination address translation table mapping the source host global address to the source host local address in the source (inbound) address domain, in step 1036 .
- the NAT 102 then translates the source address in the. packet from the source host local address into the source host global address for the destination (outbound) address domain, in step 1038 , specifically by replacing the source host local address in the packet with the source host global address.
- the source address translation logic then terminates in step 1040 .
- FIG. 11 is a block diagram showing an exemplary NAT 102 in accordance with a preferred embodiment of the present invention.
- the NAT 102 is operably coupled to at least a source (inbound) address domain of the communication network 100 by way of a Source (Inbound) Network Interface 1110 and to a destination (outbound) address domain of the communication network 100 by way of a Destination (Outbound) Network Interface 1150 .
- Packets received over the Source (Inbound) Network Interface 1110 are processed by a Packet Processor 1130 .
- the Packet Processor 1130 is operably coupled to perform any necessary address translations on the packet.
- the translated packets are forwarded to the destination (outbound) address domain via the Destination (Outbound) Network Interface 1150 .
- the Packet Processor 1130 includes both destination address translation logic ( 1136 , 1137 ) and source address translation logic ( 1132 , 1133 ).
- the destination address translation logic translates a destination host global address into a destination host local address in the destination (outbound) address domain, if such a translation is determined to be required.
- the source address translation logic translates a source host local address in the source (inbound) address domain into a source host global address for the destination (outbound) address domain, if such a translation is determined to be required. It should be noted that the destination address translation logic and the source address translation logic are shown as being operably coupled in parallel for convenience only.
- the source address translation logic operates after completion of the destination address translation logic, and preferably obtains the source (inbound) address domain and the destination (outbound) address domain from the destination address translation table entry that is used by the destination address translation logic for translating the destination address in the packet.
- the destination address translation logic determines whether the destination address requires translation, and translates the destination address from a destination host global address into a destination host local address if destination address translation is required.
- the packet is processed by a Destination Address Filter 1136 , which determines whether or not the destination address in the packet requires translation.
- the Destination Address Filter 1136 may utilize address translation information stored in the Address Translation Table(s) 1134 , and particularly in a destination address translation table, in order to determine whether or not the destination address in the packet requires translation. If the Destination Address Filter 1136 determines that the destination address in the packet does not require address translation, then the Destination Address Filter 1136 forwards the packet unchanged via the path 1138 .
- the Destination Address Translator 1137 translates the destination address from the destination host global address into the destination host local address in the destination (outbound) address domain, specifically by finding a destination address translation table entry in the Address Translation Table(s) 1134 corresponding to the destination host global address, obtaining the destination host local address from the destination address translation table entry, and inserting the destination host local address into the destination address field of the packet.
- the source address translation logic determines whether the source address requires translation, and translates the source address from a source host local address into a source host global address for the destination (outbound) address domain if source address translation is required.
- the packet is processed by a Source Address Filter 1132 , which determines whether or not the source address in the packet requires translation.
- the Source Address Filter 1132 may utilize address translation information stored in the Address Translation Table(s) 1134 to determine whether or not the source address in the packet requires translation. If the Source Address Filter 1132 determines that the source address in the packet does not require address translation, then the Source Address Filter 1132 forwards the packet unchanged via the path 1131 .
- the Source Address Translator 1133 translates the source address from the source host local address into the source host global address for the destination (outbound) address domain, specifically by selecting a source address translation table for the source (inbound) address domain, searching the source address translation table for a source address translation table entry corresponding to the source host local address and the destination (outbound) address domain, obtaining the source host global address from the source address translation table entry, and inserting the source host global address into the source address field of the packet.
- NAT 102 logic and DNS Proxy 104 logic for processing messages and translating network addresses is implemented as a set of computer program instructions that are stored in a computer readable medium and executed by an embedded microprocessor system within the NAT 102 and the DNS Proxy 104 , respectively.
- Preferred embodiments of the invention may be implemented in any conventional computer programming language. For example, preferred embodiments may be implemented in a procedural programming language (e.g., “C”) or an object oriented programming language (e.g., “C++”). Alternative embodiments of the invention may be implemented using discrete components, integrated circuitry, programmable logic used in conjunction with a programmable logic device such as a Field Programmable Gate Array (FPGA) or microprocessor, or any other means including any combination thereof.
- FPGA Field Programmable Gate Array
- Alternative embodiments of the invention may be implemented as a computer program product for use with a computer system.
- Such implementation may include a series of computer instructions fixed either on a tangible medium, such as a computer readable media (e.g., a diskette, CD-ROM, ROM, or fixed disk), or fixed in a computer data signal embodied in a carrier wave that is transmittable to a computer system via a modem or other interface device, such as a communications adapter connected to a network over a medium.
- the medium may be either a tangible medium (e.g., optical or analog communications lines) or a medium implemented with wireless techniques (e.g., microwave, infrared or other transmission techniques).
- the series of computer instructions embodies all or part of the functionality previously described herein with respect to the system.
- Those skilled in the art should appreciate that such computer instructions can be written in a number of programming languages for use with many computer architectures or operating systems.
- such instructions may be stored in any memory device, such as semiconductor, magnetic, optical or other memory devices, and may be transmitted using any communications technology, such as optical, infrared, microwave, or other transmission technologies.
- It is expected that such a computer program product may be distributed as a removable medium with accompanying printed or electronic documentation (e.g., shrink wrapped software), preloaded with a computer system (e.g., on system ROM or fixed disk), or distributed from a server or electronic bulletin board over the network (e.g., the Internet or World Wide Web).
- the present invention may be embodied as a method for domain name resolution in a communication network having multiple overlapping address domains involving the steps of translating a destination host domain name into an overlapping destination host local address and translating the overlapping destination host local address into a unique destination host global address.
- Translating the destination host domain name into the overlapping destination host local address typically involves transmitting to a domain name system server a domain name resolution request message including the destination host domain name and receiving from the domain name system server a domain name resolution response message including the overlapping destination host local address.
- Translating the translating the overlapping destination host local address into a unique destination host global address typically involves transmitting to a network address translator a translation request message including at least the overlapping destination host local address and receiving from the network address translator a translation request message including the unique destination host global address.
- the domain name resolution is performed by a domain name system proxy upon receiving a domain name resolution request message from a source host in a source address domain. The domain name system proxy returns the destination host global address to the source host.
- the present invention may also be embodied as an apparatus for domain name resolution in a communication network having multiple overlapping address domains having first translating logic operably coupled to translate a destination host domain name into an overlapping destination host local address and second translating logic operably coupled to translate the overlapping destination host local address into a unique destination host global address.
- the first translating logic comprises domain name system server interface logic operably coupled to transmit to a domain name system server a domain name resolution request message including the destination host domain name and to receive from the domain name system server a domain name resolution response message including the overlapping destination host local address.
- the second translating logic comprises network address translator interface logic operably coupled to transmit to a network address translator a translation request message including at least the overlapping destination host local address and to receive from the network address translator a translation request message including the unique destination host global address.
- the present invention may also be embodied as a communication system including a source host in a source address domain, a domain name system proxy, a destination host in a destination address domain, a domain name system server in the destination address domain, and a network address translator.
- the domain name system proxy translates a destination host domain name into a unique destination host global address for the source host by first using the domain name system server in the destination address domain to translate the destination host domain name into an overlapping destination host local address and then using the network address translator to translate the overlapping destination host local address into a unique destination host global address for the source address domain.
- domain resolution typically involves transmitting, by the source host to the domain name system proxy, a first domain name resolution request message including a domain name associated with the destination host; receiving said first domain name resolution request message by the domain name system proxy; transmitting, by the domain name system proxy to the domain name system server in the destination address domain, a second domain name resolution request message including the domain name associated with the destination host; receiving said second domain name resolution request message by the domain name system server in the destination address domain; resolving the domain name into a destination host local address by the domain name system server in the destination address domain; transmitting, by the domain name system server in the destination address domain to the domain name system proxy, a first domain name resolution response message including the destination host local address; receiving said first domain name resolution response message by the domain name system proxy; translating the destination host local address into a destination host global address by the domain name system proxy; and transmitting, by the domain name system proxy to the source host, a second domain name resolution response message including the destination host global address.
- the step of translating the destination host local address into a destination host global address by the domain name system proxy involves transmitting, by the domain name system proxy to the network address translator, a translation request message including at least the destination host local address, a source address domain identifier, and a destination address domain identifier; receiving the translation request message by the network address translator; translating the destination host local address into a destination host global address based upon at least the source address domain identifier; and transmitting, by the network address translator to the domain name system proxy, a translation response message including the destination host global address.
- the present invention may also be embodied as a program product comprising a computer readable medium having embodied there a computer program for domain name resolution in a communication network having multiple overlapping address domains including first translating logic programmed to translate a destination host domain name into an overlapping destination host local address and second translating logic programmed to translate the overlapping destination host local address into a unique destination host global address.
- the first translating logic comprises domain name system server interface logic programmed to transmit to a domain name system server a domain name resolution request message including the destination host domain name and to receive from the domain name system server a domain name resolution response message including the overlapping destination host local address.
- the second translating logic comprises network address translator interface logic programmed to transmit to a network address translator a translation request message including at least the overlapping destination host local address and to receive from the network address translator a translation request message including the unique destination host global address.
- packet is used herein as a generic term for a unit of information that is processed by the NAT, and should not be construed to limit application of the present invention to a specific information format or communication protocol.
- a packet may be any unit of information for use with any protocol including, but not limited to, a frame, a packet, a datagram, a user datagram, or a cell.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims (29)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/274,944 US6493765B1 (en) | 1999-03-23 | 1999-03-23 | Domain name resolution in a network having multiple overlapping address domains |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/274,944 US6493765B1 (en) | 1999-03-23 | 1999-03-23 | Domain name resolution in a network having multiple overlapping address domains |
Publications (1)
Publication Number | Publication Date |
---|---|
US6493765B1 true US6493765B1 (en) | 2002-12-10 |
Family
ID=23050241
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/274,944 Expired - Lifetime US6493765B1 (en) | 1999-03-23 | 1999-03-23 | Domain name resolution in a network having multiple overlapping address domains |
Country Status (1)
Country | Link |
---|---|
US (1) | US6493765B1 (en) |
Cited By (130)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020010796A1 (en) * | 2000-06-16 | 2002-01-24 | Werner Lindemann | Method of converting a network address |
US20020010799A1 (en) * | 2000-04-04 | 2002-01-24 | Makoto Kubota | Communication data relay system and method of controlling connectability between domains |
US20020133582A1 (en) * | 2000-12-21 | 2002-09-19 | Atsushi Shibata | Network management system |
US20020161899A1 (en) * | 2001-04-27 | 2002-10-31 | Kohei Yamaguchi | Method and device for connecting networks |
US20020172206A1 (en) * | 2001-05-18 | 2002-11-21 | Vaman Dhadesugoor R. | Method for providing domain name services for heterogeneous transport networks |
US20030009591A1 (en) * | 2001-06-25 | 2003-01-09 | Clive Hayball | Apparatus and method for managing internet resource requests |
US20030055979A1 (en) * | 2001-09-19 | 2003-03-20 | Cooley William Ray | Internet domain name resolver |
US20030118002A1 (en) * | 2001-12-21 | 2003-06-26 | Patrick Bradd | Methods and apparatus for setting up telephony connections between two address domains having overlapping address ranges |
US6629137B1 (en) * | 2000-04-26 | 2003-09-30 | Telefonaktiebolaget L.M. Ericsson | Network interface devices methods system and computer program products for connecting networks using different address domains through address translation |
US6754709B1 (en) * | 2000-03-29 | 2004-06-22 | Microsoft Corporation | Application programming interface and generalized network address translator for intelligent transparent application gateway processes |
US20040153455A1 (en) * | 2003-01-30 | 2004-08-05 | International Business Machines Corporation | Method and apparatus for local IP address translation |
US6779035B1 (en) | 2000-03-06 | 2004-08-17 | Microsoft Corporation | Application programming interface and generalized network address translator for translation of transport-layer sessions |
US20040177274A1 (en) * | 2003-03-05 | 2004-09-09 | Microsoft Corporation | Use of network address translation for implementation of stateful routing |
US20040233916A1 (en) * | 2003-05-19 | 2004-11-25 | Keisuke Takeuchi | Apparatus and method for data communication on packet-switching network |
US20040258005A1 (en) * | 2003-06-06 | 2004-12-23 | Haruyuki Kitawaki | Communication apparatus and method |
US20040260763A1 (en) * | 2003-06-23 | 2004-12-23 | Partha Bhattacharya | Method and system for determining intra-session event correlation across network address translation devices |
US6836805B1 (en) * | 2000-04-24 | 2004-12-28 | Sprint Communications Company L.P. | Scheduled alias resolution |
US20050050211A1 (en) * | 2003-08-29 | 2005-03-03 | Kaul Bharat B. | Method and apparatus to manage network addresses |
US20050086373A1 (en) * | 2003-10-16 | 2005-04-21 | International Business Machines Corporation | Accessing data processing systems behind a NAT enabled network |
US20050105525A1 (en) * | 2003-11-10 | 2005-05-19 | Institute For Information Industry | Method of detecting the type of network address translator |
US20050190754A1 (en) * | 1999-06-30 | 2005-09-01 | Golikeri Sandeep P. | System, device, and method for address management in a distributed communication environment |
US6970475B1 (en) * | 1999-08-17 | 2005-11-29 | At&T Corporation | System and method for handling flows in a network |
US20050271050A1 (en) * | 2004-06-04 | 2005-12-08 | Utstarcom, Inc. | Domain-influenced prefix assignment method and apparatus |
US20060023751A1 (en) * | 2004-07-30 | 2006-02-02 | Wilson Steven L | Multifabric global header |
US7043564B1 (en) * | 1999-08-18 | 2006-05-09 | Cisco Technology, Inc. | Methods and apparatus for managing network traffic using network address translation |
WO2006084957A1 (en) * | 2005-02-14 | 2006-08-17 | Teliasonera Ab | Communication channel between at least two private networks |
US20060221955A1 (en) * | 2005-04-05 | 2006-10-05 | Mark Enright | IP addressing in joined private networks |
US7181535B1 (en) * | 1998-12-24 | 2007-02-20 | France Telecom | Addressing method and name and address server in a digital network |
US7209959B1 (en) * | 2000-04-04 | 2007-04-24 | Wk Networks, Inc. | Apparatus, system, and method for communicating to a network through a virtual domain providing anonymity to a client communicating on the network |
US20070094411A1 (en) * | 2005-08-04 | 2007-04-26 | Mark Mullane | Network communications system and method |
US7260649B1 (en) * | 2002-04-16 | 2007-08-21 | Cisco Technology, Inc. | Apparatus and methods for forwarding data between public networks via a private network |
US20070204038A1 (en) * | 2006-02-28 | 2007-08-30 | Microsoft Corporation | Global names zone |
US7266604B1 (en) * | 2000-03-31 | 2007-09-04 | Microsoft Corporation | Proxy network address translation |
US7362752B1 (en) * | 2001-07-30 | 2008-04-22 | Juniper Networks, Inc. | Aggregated topological routing |
US20080222304A1 (en) * | 1999-11-19 | 2008-09-11 | Sandeep Sibal | Apparatus and methods for providing translucent proxies in a communications network |
US7454525B1 (en) * | 2002-12-05 | 2008-11-18 | Cisco Technology, Inc. | Enabling communication when signaling protocol packets contain embedded addresses subject to translation |
US20090016360A1 (en) * | 2007-07-09 | 2009-01-15 | Fujitsu Limited | Storage media storing a network relay control program, apparatus, and method |
US20090063704A1 (en) * | 2007-09-05 | 2009-03-05 | Echostar Broadband, Llc | Systems & methods for statistical resolution of domain name service (dns) requests |
US20090073992A1 (en) * | 2004-07-30 | 2009-03-19 | Brocade Communications Systems, Inc. | System and method for providing proxy and translation domains in a fibre channel router |
US20090222559A1 (en) * | 2008-02-29 | 2009-09-03 | Microsoft Corporation | Address Management in a Connectivity Platform |
US20090234934A1 (en) * | 2008-03-14 | 2009-09-17 | Novatel Wireless, Inc. | Managing multiple network interfaces by assigning them to individual applications |
WO2009116948A1 (en) * | 2008-03-20 | 2009-09-24 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and apparatus for communication of data packets between local networks |
US20100195570A1 (en) * | 2007-07-27 | 2010-08-05 | Nec Corporation | Communication control system, communication control method and communication controller |
US7940763B1 (en) * | 2005-01-07 | 2011-05-10 | Juniper Networks, Inc. | Aggregated topological routing |
US7957382B1 (en) | 2002-07-24 | 2011-06-07 | Cisco Technology, Inc. | Method and apparatus for handling embedded addresses in data sent through multiple network address translation (NAT) devices |
US20110216778A1 (en) * | 2004-07-30 | 2011-09-08 | Brocade Communications Systems, Inc. | Multifabric zone device import and export |
US8825883B2 (en) | 2008-02-29 | 2014-09-02 | Microsoft Corporation | Connectivity platform |
US20160072764A1 (en) * | 2014-09-10 | 2016-03-10 | T-Mobile Usa, Inc. | Dynamic double network address translator |
US9391949B1 (en) * | 2010-12-03 | 2016-07-12 | Amazon Technologies, Inc. | Request routing processing |
US9444759B2 (en) | 2008-11-17 | 2016-09-13 | Amazon Technologies, Inc. | Service provider registration by a content broker |
US9451046B2 (en) | 2008-11-17 | 2016-09-20 | Amazon Technologies, Inc. | Managing CDN registration by a storage provider |
US9479476B2 (en) | 2008-03-31 | 2016-10-25 | Amazon Technologies, Inc. | Processing of DNS queries |
US9497259B1 (en) | 2010-09-28 | 2016-11-15 | Amazon Technologies, Inc. | Point of presence management in request routing |
US9495338B1 (en) | 2010-01-28 | 2016-11-15 | Amazon Technologies, Inc. | Content distribution network |
US9515949B2 (en) | 2008-11-17 | 2016-12-06 | Amazon Technologies, Inc. | Managing content delivery network service providers |
US9525659B1 (en) | 2012-09-04 | 2016-12-20 | Amazon Technologies, Inc. | Request routing utilizing point of presence load information |
US9544394B2 (en) | 2008-03-31 | 2017-01-10 | Amazon Technologies, Inc. | Network resource identification |
US9571389B2 (en) | 2008-03-31 | 2017-02-14 | Amazon Technologies, Inc. | Request routing based on class |
US9590946B2 (en) | 2008-11-17 | 2017-03-07 | Amazon Technologies, Inc. | Managing content delivery network service providers |
US9608957B2 (en) | 2008-06-30 | 2017-03-28 | Amazon Technologies, Inc. | Request routing using network computing components |
US9621660B2 (en) | 2008-03-31 | 2017-04-11 | Amazon Technologies, Inc. | Locality based content distribution |
US9628554B2 (en) | 2012-02-10 | 2017-04-18 | Amazon Technologies, Inc. | Dynamic content delivery |
US9712484B1 (en) | 2010-09-28 | 2017-07-18 | Amazon Technologies, Inc. | Managing request routing information utilizing client identifiers |
US9712325B2 (en) | 2009-09-04 | 2017-07-18 | Amazon Technologies, Inc. | Managing secure content in a content delivery network |
US9734472B2 (en) | 2008-11-17 | 2017-08-15 | Amazon Technologies, Inc. | Request routing utilizing cost information |
US9742795B1 (en) | 2015-09-24 | 2017-08-22 | Amazon Technologies, Inc. | Mitigating network attacks |
US9774619B1 (en) | 2015-09-24 | 2017-09-26 | Amazon Technologies, Inc. | Mitigating network attacks |
US20170289101A1 (en) * | 2016-03-29 | 2017-10-05 | T-Mobile Usa, Inc. | Nat aware dns |
US9787775B1 (en) | 2010-09-28 | 2017-10-10 | Amazon Technologies, Inc. | Point of presence management in request routing |
US9794216B2 (en) | 2010-09-28 | 2017-10-17 | Amazon Technologies, Inc. | Request routing in a networked environment |
US9794281B1 (en) | 2015-09-24 | 2017-10-17 | Amazon Technologies, Inc. | Identifying sources of network attacks |
US9800539B2 (en) | 2010-09-28 | 2017-10-24 | Amazon Technologies, Inc. | Request routing management based on network components |
US9819567B1 (en) | 2015-03-30 | 2017-11-14 | Amazon Technologies, Inc. | Traffic surge management for points of presence |
US9832141B1 (en) | 2015-05-13 | 2017-11-28 | Amazon Technologies, Inc. | Routing based request correlation |
US9887931B1 (en) | 2015-03-30 | 2018-02-06 | Amazon Technologies, Inc. | Traffic surge management for points of presence |
US9888089B2 (en) | 2008-03-31 | 2018-02-06 | Amazon Technologies, Inc. | Client side cache management |
US9887932B1 (en) | 2015-03-30 | 2018-02-06 | Amazon Technologies, Inc. | Traffic surge management for points of presence |
US9893957B2 (en) | 2009-10-02 | 2018-02-13 | Amazon Technologies, Inc. | Forward-based resource delivery network management techniques |
US9912740B2 (en) | 2008-06-30 | 2018-03-06 | Amazon Technologies, Inc. | Latency measurement in resource requests |
US9929959B2 (en) | 2013-06-04 | 2018-03-27 | Amazon Technologies, Inc. | Managing network computing components utilizing request routing |
US9930131B2 (en) | 2010-11-22 | 2018-03-27 | Amazon Technologies, Inc. | Request routing processing |
US9954934B2 (en) | 2008-03-31 | 2018-04-24 | Amazon Technologies, Inc. | Content delivery reconciliation |
US9985927B2 (en) | 2008-11-17 | 2018-05-29 | Amazon Technologies, Inc. | Managing content delivery network service providers by a content broker |
US9992303B2 (en) | 2007-06-29 | 2018-06-05 | Amazon Technologies, Inc. | Request routing utilizing client location information |
US9992086B1 (en) | 2016-08-23 | 2018-06-05 | Amazon Technologies, Inc. | External health checking of virtual private cloud network environments |
US10015237B2 (en) | 2010-09-28 | 2018-07-03 | Amazon Technologies, Inc. | Point of presence management in request routing |
US10015241B2 (en) | 2012-09-20 | 2018-07-03 | Amazon Technologies, Inc. | Automated profiling of resource usage |
US10021179B1 (en) | 2012-02-21 | 2018-07-10 | Amazon Technologies, Inc. | Local resource delivery network |
US10027582B2 (en) | 2007-06-29 | 2018-07-17 | Amazon Technologies, Inc. | Updating routing information based on client location |
US10033627B1 (en) | 2014-12-18 | 2018-07-24 | Amazon Technologies, Inc. | Routing mode and point-of-presence selection service |
US10033691B1 (en) | 2016-08-24 | 2018-07-24 | Amazon Technologies, Inc. | Adaptive resolution of domain name requests in virtual private cloud network environments |
US10049051B1 (en) | 2015-12-11 | 2018-08-14 | Amazon Technologies, Inc. | Reserved cache space in content delivery networks |
US10075551B1 (en) | 2016-06-06 | 2018-09-11 | Amazon Technologies, Inc. | Request management for hierarchical cache |
US10079742B1 (en) | 2010-09-28 | 2018-09-18 | Amazon Technologies, Inc. | Latency measurement in resource requests |
US10091096B1 (en) | 2014-12-18 | 2018-10-02 | Amazon Technologies, Inc. | Routing mode and point-of-presence selection service |
US10097566B1 (en) | 2015-07-31 | 2018-10-09 | Amazon Technologies, Inc. | Identifying targets of network attacks |
US10097448B1 (en) | 2014-12-18 | 2018-10-09 | Amazon Technologies, Inc. | Routing mode and point-of-presence selection service |
US10110694B1 (en) | 2016-06-29 | 2018-10-23 | Amazon Technologies, Inc. | Adaptive transfer rate for retrieving content from a server |
US10157135B2 (en) | 2008-03-31 | 2018-12-18 | Amazon Technologies, Inc. | Cache optimization |
US10162753B2 (en) | 2009-06-16 | 2018-12-25 | Amazon Technologies, Inc. | Managing resources using resource expiration data |
CN109151089A (en) * | 2018-08-28 | 2019-01-04 | 新华三技术有限公司合肥分公司 | MDNS information transmitting methods and device |
US10205698B1 (en) | 2012-12-19 | 2019-02-12 | Amazon Technologies, Inc. | Source-dependent address resolution |
US10225326B1 (en) | 2015-03-23 | 2019-03-05 | Amazon Technologies, Inc. | Point of presence based data uploading |
US10225362B2 (en) | 2012-06-11 | 2019-03-05 | Amazon Technologies, Inc. | Processing DNS queries to identify pre-processing information |
US10230819B2 (en) | 2009-03-27 | 2019-03-12 | Amazon Technologies, Inc. | Translation of resource identifiers using popularity information upon client request |
US10257307B1 (en) | 2015-12-11 | 2019-04-09 | Amazon Technologies, Inc. | Reserved cache space in content delivery networks |
US10264062B2 (en) | 2009-03-27 | 2019-04-16 | Amazon Technologies, Inc. | Request routing using a popularity identifier to identify a cache component |
US10270878B1 (en) | 2015-11-10 | 2019-04-23 | Amazon Technologies, Inc. | Routing for origin-facing points of presence |
US10348639B2 (en) | 2015-12-18 | 2019-07-09 | Amazon Technologies, Inc. | Use of virtual endpoints to improve data transmission rates |
US10372499B1 (en) | 2016-12-27 | 2019-08-06 | Amazon Technologies, Inc. | Efficient region selection system for executing request-driven code |
US10447648B2 (en) | 2017-06-19 | 2019-10-15 | Amazon Technologies, Inc. | Assignment of a POP to a DNS resolver based on volume of communications over a link between client devices and the POP |
US10469513B2 (en) | 2016-10-05 | 2019-11-05 | Amazon Technologies, Inc. | Encrypted network addresses |
US10491534B2 (en) | 2009-03-27 | 2019-11-26 | Amazon Technologies, Inc. | Managing resources and entries in tracking information in resource cache components |
US10503613B1 (en) | 2017-04-21 | 2019-12-10 | Amazon Technologies, Inc. | Efficient serving of resources during server unavailability |
US10554748B2 (en) | 2008-03-31 | 2020-02-04 | Amazon Technologies, Inc. | Content management |
US10592578B1 (en) | 2018-03-07 | 2020-03-17 | Amazon Technologies, Inc. | Predictive content push-enabled content delivery network |
US10601767B2 (en) | 2009-03-27 | 2020-03-24 | Amazon Technologies, Inc. | DNS query processing based on application information |
US10616179B1 (en) | 2015-06-25 | 2020-04-07 | Amazon Technologies, Inc. | Selective routing of domain name system (DNS) requests |
US10623408B1 (en) | 2012-04-02 | 2020-04-14 | Amazon Technologies, Inc. | Context sensitive object management |
US10831549B1 (en) | 2016-12-27 | 2020-11-10 | Amazon Technologies, Inc. | Multi-region request-driven code execution system |
US10862852B1 (en) | 2018-11-16 | 2020-12-08 | Amazon Technologies, Inc. | Resolution of domain name requests in heterogeneous network environments |
US10938884B1 (en) | 2017-01-30 | 2021-03-02 | Amazon Technologies, Inc. | Origin server cloaking using virtual private cloud network environments |
US10944714B1 (en) | 2019-04-16 | 2021-03-09 | Amazon Technologies, Inc. | Multi-factor domain name resolution |
US10958501B1 (en) | 2010-09-28 | 2021-03-23 | Amazon Technologies, Inc. | Request routing information based on client IP groupings |
US11025747B1 (en) | 2018-12-12 | 2021-06-01 | Amazon Technologies, Inc. | Content request pattern-based routing system |
US11075987B1 (en) | 2017-06-12 | 2021-07-27 | Amazon Technologies, Inc. | Load estimating content delivery network |
US11290418B2 (en) | 2017-09-25 | 2022-03-29 | Amazon Technologies, Inc. | Hybrid content request routing system |
US11604667B2 (en) | 2011-04-27 | 2023-03-14 | Amazon Technologies, Inc. | Optimized deployment based upon customer locality |
US20230269217A1 (en) * | 2022-02-23 | 2023-08-24 | Cisco Technology, Inc. | Binding flows to unique addresses or ports |
US12069103B2 (en) | 2022-02-23 | 2024-08-20 | Cisco Technology, Inc. | Implementing policy based on unique addresses or ports |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6119171A (en) * | 1998-01-29 | 2000-09-12 | Ip Dynamics, Inc. | Domain name routing |
US6262987B1 (en) * | 1998-03-26 | 2001-07-17 | Compaq Computer Corp | System and method for reducing latencies while translating internet host name-address bindings |
US6418476B1 (en) * | 1998-06-29 | 2002-07-09 | Nortel Networks, Limited | Method for synchronizing network address translator (NAT) tables using the open shortest path first opaque link state advertisement option protocol |
-
1999
- 1999-03-23 US US09/274,944 patent/US6493765B1/en not_active Expired - Lifetime
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6119171A (en) * | 1998-01-29 | 2000-09-12 | Ip Dynamics, Inc. | Domain name routing |
US6262987B1 (en) * | 1998-03-26 | 2001-07-17 | Compaq Computer Corp | System and method for reducing latencies while translating internet host name-address bindings |
US6418476B1 (en) * | 1998-06-29 | 2002-07-09 | Nortel Networks, Limited | Method for synchronizing network address translator (NAT) tables using the open shortest path first opaque link state advertisement option protocol |
Cited By (233)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7181535B1 (en) * | 1998-12-24 | 2007-02-20 | France Telecom | Addressing method and name and address server in a digital network |
US20050190754A1 (en) * | 1999-06-30 | 2005-09-01 | Golikeri Sandeep P. | System, device, and method for address management in a distributed communication environment |
US6970475B1 (en) * | 1999-08-17 | 2005-11-29 | At&T Corporation | System and method for handling flows in a network |
US7043564B1 (en) * | 1999-08-18 | 2006-05-09 | Cisco Technology, Inc. | Methods and apparatus for managing network traffic using network address translation |
US20080222304A1 (en) * | 1999-11-19 | 2008-09-11 | Sandeep Sibal | Apparatus and methods for providing translucent proxies in a communications network |
US6779035B1 (en) | 2000-03-06 | 2004-08-17 | Microsoft Corporation | Application programming interface and generalized network address translator for translation of transport-layer sessions |
US20040230688A1 (en) * | 2000-03-06 | 2004-11-18 | Microsoft Corporation | Application programming interface and generalized network address translator for translation of transport-layer sessions |
US7305477B2 (en) | 2000-03-06 | 2007-12-04 | Microsoft Corporation | Application programming interface and generalized network address translator for translation of transport-layer sessions |
US20040210660A1 (en) * | 2000-03-29 | 2004-10-21 | Microsoft Corporation | Network address translator application programming interface |
US7293095B2 (en) | 2000-03-29 | 2007-11-06 | Microsoft Corporation | Method of session payload editing |
US20050021762A1 (en) * | 2000-03-29 | 2005-01-27 | Microsoft Corporation | Method of operation of an intelligent transpartent gateway during an FTP session |
US6754709B1 (en) * | 2000-03-29 | 2004-06-22 | Microsoft Corporation | Application programming interface and generalized network address translator for intelligent transparent application gateway processes |
US7412523B2 (en) | 2000-03-29 | 2008-08-12 | Microsoft Corporation | Method of operation of an intelligent transpartent gateway during an ftp session |
US20040210674A1 (en) * | 2000-03-29 | 2004-10-21 | Microsoft Corporation | Method of session payload editing |
US7424539B2 (en) | 2000-03-29 | 2008-09-09 | Microsoft Corporation | Port reservation application programming interface |
US7266604B1 (en) * | 2000-03-31 | 2007-09-04 | Microsoft Corporation | Proxy network address translation |
US20070162590A1 (en) * | 2000-04-04 | 2007-07-12 | Campbell Douglas A | Apparatus, systems, and method for communicating to a network through a virtual domain |
US8370457B2 (en) | 2000-04-04 | 2013-02-05 | Darmate Glassworks Llc | Network communication through a virtual domain |
US7209959B1 (en) * | 2000-04-04 | 2007-04-24 | Wk Networks, Inc. | Apparatus, system, and method for communicating to a network through a virtual domain providing anonymity to a client communicating on the network |
US8762498B2 (en) | 2000-04-04 | 2014-06-24 | Darmate Glassworks Llc | Apparatus, system, and method for communicating to a network through a virtual domain |
US6934763B2 (en) * | 2000-04-04 | 2005-08-23 | Fujitsu Limited | Communication data relay system and method of controlling connectability between domains |
US20020010799A1 (en) * | 2000-04-04 | 2002-01-24 | Makoto Kubota | Communication data relay system and method of controlling connectability between domains |
US6836805B1 (en) * | 2000-04-24 | 2004-12-28 | Sprint Communications Company L.P. | Scheduled alias resolution |
US6629137B1 (en) * | 2000-04-26 | 2003-09-30 | Telefonaktiebolaget L.M. Ericsson | Network interface devices methods system and computer program products for connecting networks using different address domains through address translation |
US20020010796A1 (en) * | 2000-06-16 | 2002-01-24 | Werner Lindemann | Method of converting a network address |
US6934764B2 (en) * | 2000-06-16 | 2005-08-23 | Siemens Aktiengesellschaft | Method of converting a network address |
US7315888B2 (en) * | 2000-12-21 | 2008-01-01 | Hitachi, Ltd. | Network management system |
US20020133582A1 (en) * | 2000-12-21 | 2002-09-19 | Atsushi Shibata | Network management system |
US7233995B2 (en) * | 2001-04-27 | 2007-06-19 | Oki Electric Industry Co., Ltd. | Method and device for connecting networks |
US20020161899A1 (en) * | 2001-04-27 | 2002-10-31 | Kohei Yamaguchi | Method and device for connecting networks |
US20020172206A1 (en) * | 2001-05-18 | 2002-11-21 | Vaman Dhadesugoor R. | Method for providing domain name services for heterogeneous transport networks |
US7343399B2 (en) * | 2001-06-25 | 2008-03-11 | Nortel Networks Limited | Apparatus and method for managing internet resource requests |
US20030009591A1 (en) * | 2001-06-25 | 2003-01-09 | Clive Hayball | Apparatus and method for managing internet resource requests |
US7362752B1 (en) * | 2001-07-30 | 2008-04-22 | Juniper Networks, Inc. | Aggregated topological routing |
US20030055979A1 (en) * | 2001-09-19 | 2003-03-20 | Cooley William Ray | Internet domain name resolver |
US20030118002A1 (en) * | 2001-12-21 | 2003-06-26 | Patrick Bradd | Methods and apparatus for setting up telephony connections between two address domains having overlapping address ranges |
US7408928B2 (en) * | 2001-12-21 | 2008-08-05 | Nortel Networks Limited | Methods and apparatus for setting up telephony connections between two address domains having overlapping address ranges |
US7734819B1 (en) | 2002-04-16 | 2010-06-08 | Cisco Technology, Inc. | Apparatus and methods for forwarding data between public networks via a private network |
US7260649B1 (en) * | 2002-04-16 | 2007-08-21 | Cisco Technology, Inc. | Apparatus and methods for forwarding data between public networks via a private network |
US7957382B1 (en) | 2002-07-24 | 2011-06-07 | Cisco Technology, Inc. | Method and apparatus for handling embedded addresses in data sent through multiple network address translation (NAT) devices |
US7454525B1 (en) * | 2002-12-05 | 2008-11-18 | Cisco Technology, Inc. | Enabling communication when signaling protocol packets contain embedded addresses subject to translation |
US20040153455A1 (en) * | 2003-01-30 | 2004-08-05 | International Business Machines Corporation | Method and apparatus for local IP address translation |
US20040177274A1 (en) * | 2003-03-05 | 2004-09-09 | Microsoft Corporation | Use of network address translation for implementation of stateful routing |
US7634805B2 (en) * | 2003-03-05 | 2009-12-15 | Microsoft Corporation | Use of network address translation for implementation of stateful routing |
US20040233916A1 (en) * | 2003-05-19 | 2004-11-25 | Keisuke Takeuchi | Apparatus and method for data communication on packet-switching network |
US7315543B2 (en) * | 2003-05-19 | 2008-01-01 | Hitachi Communications Technologies, Ltd. | Apparatus and method for data communication on packet-switching network |
US20040258005A1 (en) * | 2003-06-06 | 2004-12-23 | Haruyuki Kitawaki | Communication apparatus and method |
US7668114B2 (en) * | 2003-06-06 | 2010-02-23 | Canon Kabushiki Kaisha | Communication apparatus and method with enhanced anonymity via modified use of addresses |
US6985920B2 (en) * | 2003-06-23 | 2006-01-10 | Protego Networks Inc. | Method and system for determining intra-session event correlation across network address translation devices |
US20040260763A1 (en) * | 2003-06-23 | 2004-12-23 | Partha Bhattacharya | Method and system for determining intra-session event correlation across network address translation devices |
CN1784671B (en) * | 2003-06-23 | 2010-06-16 | 普罗泰格网络公司 | Method and system for determining intra-session event correlation across network address translation devices |
US20050050211A1 (en) * | 2003-08-29 | 2005-03-03 | Kaul Bharat B. | Method and apparatus to manage network addresses |
US7792995B2 (en) | 2003-10-16 | 2010-09-07 | International Business Machines Corporation | Accessing data processing systems behind a NAT enabled network |
US20050086373A1 (en) * | 2003-10-16 | 2005-04-21 | International Business Machines Corporation | Accessing data processing systems behind a NAT enabled network |
US7478169B2 (en) * | 2003-10-16 | 2009-01-13 | International Business Machines Corporation | Accessing data processing systems behind a NAT enabled network |
US20090016369A1 (en) * | 2003-10-16 | 2009-01-15 | International Business Machines Corporation | Accessing data processing systems behind a nat enabled network |
US20050105525A1 (en) * | 2003-11-10 | 2005-05-19 | Institute For Information Industry | Method of detecting the type of network address translator |
US7359382B2 (en) * | 2003-11-10 | 2008-04-15 | Institute For Information Industry | Method of detecting the type of network address translator |
US20050271050A1 (en) * | 2004-06-04 | 2005-12-08 | Utstarcom, Inc. | Domain-influenced prefix assignment method and apparatus |
US20090073992A1 (en) * | 2004-07-30 | 2009-03-19 | Brocade Communications Systems, Inc. | System and method for providing proxy and translation domains in a fibre channel router |
US8446913B2 (en) | 2004-07-30 | 2013-05-21 | Brocade Communications Systems, Inc. | Multifabric zone device import and export |
US8125992B2 (en) | 2004-07-30 | 2012-02-28 | Brocade Communications Systems, Inc. | System and method for providing proxy and translation domains in a fibre channel router |
US8059664B2 (en) * | 2004-07-30 | 2011-11-15 | Brocade Communications Systems, Inc. | Multifabric global header |
US20110216778A1 (en) * | 2004-07-30 | 2011-09-08 | Brocade Communications Systems, Inc. | Multifabric zone device import and export |
US20060023751A1 (en) * | 2004-07-30 | 2006-02-02 | Wilson Steven L | Multifabric global header |
US7940763B1 (en) * | 2005-01-07 | 2011-05-10 | Juniper Networks, Inc. | Aggregated topological routing |
WO2006084957A1 (en) * | 2005-02-14 | 2006-08-17 | Teliasonera Ab | Communication channel between at least two private networks |
US20060221955A1 (en) * | 2005-04-05 | 2006-10-05 | Mark Enright | IP addressing in joined private networks |
US20070094411A1 (en) * | 2005-08-04 | 2007-04-26 | Mark Mullane | Network communications system and method |
US20070204038A1 (en) * | 2006-02-28 | 2007-08-30 | Microsoft Corporation | Global names zone |
US7467230B2 (en) | 2006-02-28 | 2008-12-16 | Microsoft Corporation | Global names zone |
US9992303B2 (en) | 2007-06-29 | 2018-06-05 | Amazon Technologies, Inc. | Request routing utilizing client location information |
US10027582B2 (en) | 2007-06-29 | 2018-07-17 | Amazon Technologies, Inc. | Updating routing information based on client location |
US20090016360A1 (en) * | 2007-07-09 | 2009-01-15 | Fujitsu Limited | Storage media storing a network relay control program, apparatus, and method |
US20100195570A1 (en) * | 2007-07-27 | 2010-08-05 | Nec Corporation | Communication control system, communication control method and communication controller |
US20090063704A1 (en) * | 2007-09-05 | 2009-03-05 | Echostar Broadband, Llc | Systems & methods for statistical resolution of domain name service (dns) requests |
US8285870B2 (en) * | 2007-09-05 | 2012-10-09 | Echostar Technologies L.L.C. | Systems and methods for statistical resolution of domain name service (DNS) requests |
US20090222559A1 (en) * | 2008-02-29 | 2009-09-03 | Microsoft Corporation | Address Management in a Connectivity Platform |
US9509659B2 (en) | 2008-02-29 | 2016-11-29 | Microsoft Technology Licensing, Llc | Connectivity platform |
US8825883B2 (en) | 2008-02-29 | 2014-09-02 | Microsoft Corporation | Connectivity platform |
US8364847B2 (en) | 2008-02-29 | 2013-01-29 | Microsoft Corporation | Address management in a connectivity platform |
US9705844B2 (en) | 2008-02-29 | 2017-07-11 | Microsoft Technology Licensing, Llc | Address management in a connectivity platform |
US20090234934A1 (en) * | 2008-03-14 | 2009-09-17 | Novatel Wireless, Inc. | Managing multiple network interfaces by assigning them to individual applications |
US8559448B2 (en) | 2008-03-20 | 2013-10-15 | Telefonaktiebolaget Lm Ericsson | Method and apparatus for communication of data packets between local networks |
US20110026537A1 (en) * | 2008-03-20 | 2011-02-03 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and Apparatus for Communication of Data Packets between Local Networks |
WO2009116948A1 (en) * | 2008-03-20 | 2009-09-24 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and apparatus for communication of data packets between local networks |
US10797995B2 (en) | 2008-03-31 | 2020-10-06 | Amazon Technologies, Inc. | Request routing based on class |
US11194719B2 (en) | 2008-03-31 | 2021-12-07 | Amazon Technologies, Inc. | Cache optimization |
US9954934B2 (en) | 2008-03-31 | 2018-04-24 | Amazon Technologies, Inc. | Content delivery reconciliation |
US9479476B2 (en) | 2008-03-31 | 2016-10-25 | Amazon Technologies, Inc. | Processing of DNS queries |
US11909639B2 (en) | 2008-03-31 | 2024-02-20 | Amazon Technologies, Inc. | Request routing based on class |
US11245770B2 (en) | 2008-03-31 | 2022-02-08 | Amazon Technologies, Inc. | Locality based content distribution |
US9544394B2 (en) | 2008-03-31 | 2017-01-10 | Amazon Technologies, Inc. | Network resource identification |
US9571389B2 (en) | 2008-03-31 | 2017-02-14 | Amazon Technologies, Inc. | Request routing based on class |
US9894168B2 (en) | 2008-03-31 | 2018-02-13 | Amazon Technologies, Inc. | Locality based content distribution |
US11451472B2 (en) | 2008-03-31 | 2022-09-20 | Amazon Technologies, Inc. | Request routing based on class |
US9621660B2 (en) | 2008-03-31 | 2017-04-11 | Amazon Technologies, Inc. | Locality based content distribution |
US10554748B2 (en) | 2008-03-31 | 2020-02-04 | Amazon Technologies, Inc. | Content management |
US10158729B2 (en) | 2008-03-31 | 2018-12-18 | Amazon Technologies, Inc. | Locality based content distribution |
US9888089B2 (en) | 2008-03-31 | 2018-02-06 | Amazon Technologies, Inc. | Client side cache management |
US9887915B2 (en) | 2008-03-31 | 2018-02-06 | Amazon Technologies, Inc. | Request routing based on class |
US10157135B2 (en) | 2008-03-31 | 2018-12-18 | Amazon Technologies, Inc. | Cache optimization |
US10771552B2 (en) | 2008-03-31 | 2020-09-08 | Amazon Technologies, Inc. | Content management |
US10305797B2 (en) | 2008-03-31 | 2019-05-28 | Amazon Technologies, Inc. | Request routing based on class |
US10645149B2 (en) | 2008-03-31 | 2020-05-05 | Amazon Technologies, Inc. | Content delivery reconciliation |
US10511567B2 (en) | 2008-03-31 | 2019-12-17 | Amazon Technologies, Inc. | Network resource identification |
US10530874B2 (en) | 2008-03-31 | 2020-01-07 | Amazon Technologies, Inc. | Locality based content distribution |
US9608957B2 (en) | 2008-06-30 | 2017-03-28 | Amazon Technologies, Inc. | Request routing using network computing components |
US9912740B2 (en) | 2008-06-30 | 2018-03-06 | Amazon Technologies, Inc. | Latency measurement in resource requests |
US11115500B2 (en) | 2008-11-17 | 2021-09-07 | Amazon Technologies, Inc. | Request routing utilizing client location information |
US11811657B2 (en) | 2008-11-17 | 2023-11-07 | Amazon Technologies, Inc. | Updating routing information based on client location |
US10742550B2 (en) | 2008-11-17 | 2020-08-11 | Amazon Technologies, Inc. | Updating routing information based on client location |
US9734472B2 (en) | 2008-11-17 | 2017-08-15 | Amazon Technologies, Inc. | Request routing utilizing cost information |
US9444759B2 (en) | 2008-11-17 | 2016-09-13 | Amazon Technologies, Inc. | Service provider registration by a content broker |
US9787599B2 (en) | 2008-11-17 | 2017-10-10 | Amazon Technologies, Inc. | Managing content delivery network service providers |
US9451046B2 (en) | 2008-11-17 | 2016-09-20 | Amazon Technologies, Inc. | Managing CDN registration by a storage provider |
US10116584B2 (en) | 2008-11-17 | 2018-10-30 | Amazon Technologies, Inc. | Managing content delivery network service providers |
US9590946B2 (en) | 2008-11-17 | 2017-03-07 | Amazon Technologies, Inc. | Managing content delivery network service providers |
US10523783B2 (en) | 2008-11-17 | 2019-12-31 | Amazon Technologies, Inc. | Request routing utilizing client location information |
US9515949B2 (en) | 2008-11-17 | 2016-12-06 | Amazon Technologies, Inc. | Managing content delivery network service providers |
US9985927B2 (en) | 2008-11-17 | 2018-05-29 | Amazon Technologies, Inc. | Managing content delivery network service providers by a content broker |
US11283715B2 (en) | 2008-11-17 | 2022-03-22 | Amazon Technologies, Inc. | Updating routing information based on client location |
US10574787B2 (en) | 2009-03-27 | 2020-02-25 | Amazon Technologies, Inc. | Translation of resource identifiers using popularity information upon client request |
US10491534B2 (en) | 2009-03-27 | 2019-11-26 | Amazon Technologies, Inc. | Managing resources and entries in tracking information in resource cache components |
US10230819B2 (en) | 2009-03-27 | 2019-03-12 | Amazon Technologies, Inc. | Translation of resource identifiers using popularity information upon client request |
US10601767B2 (en) | 2009-03-27 | 2020-03-24 | Amazon Technologies, Inc. | DNS query processing based on application information |
US10264062B2 (en) | 2009-03-27 | 2019-04-16 | Amazon Technologies, Inc. | Request routing using a popularity identifier to identify a cache component |
US10162753B2 (en) | 2009-06-16 | 2018-12-25 | Amazon Technologies, Inc. | Managing resources using resource expiration data |
US10783077B2 (en) | 2009-06-16 | 2020-09-22 | Amazon Technologies, Inc. | Managing resources using resource expiration data |
US10521348B2 (en) | 2009-06-16 | 2019-12-31 | Amazon Technologies, Inc. | Managing resources using resource expiration data |
US10785037B2 (en) | 2009-09-04 | 2020-09-22 | Amazon Technologies, Inc. | Managing secure content in a content delivery network |
US9712325B2 (en) | 2009-09-04 | 2017-07-18 | Amazon Technologies, Inc. | Managing secure content in a content delivery network |
US10135620B2 (en) | 2009-09-04 | 2018-11-20 | Amazon Technologis, Inc. | Managing secure content in a content delivery network |
US9893957B2 (en) | 2009-10-02 | 2018-02-13 | Amazon Technologies, Inc. | Forward-based resource delivery network management techniques |
US10218584B2 (en) | 2009-10-02 | 2019-02-26 | Amazon Technologies, Inc. | Forward-based resource delivery network management techniques |
US9495338B1 (en) | 2010-01-28 | 2016-11-15 | Amazon Technologies, Inc. | Content distribution network |
US10506029B2 (en) | 2010-01-28 | 2019-12-10 | Amazon Technologies, Inc. | Content distribution network |
US11205037B2 (en) | 2010-01-28 | 2021-12-21 | Amazon Technologies, Inc. | Content distribution network |
US9787775B1 (en) | 2010-09-28 | 2017-10-10 | Amazon Technologies, Inc. | Point of presence management in request routing |
US10079742B1 (en) | 2010-09-28 | 2018-09-18 | Amazon Technologies, Inc. | Latency measurement in resource requests |
US9800539B2 (en) | 2010-09-28 | 2017-10-24 | Amazon Technologies, Inc. | Request routing management based on network components |
US10958501B1 (en) | 2010-09-28 | 2021-03-23 | Amazon Technologies, Inc. | Request routing information based on client IP groupings |
US10015237B2 (en) | 2010-09-28 | 2018-07-03 | Amazon Technologies, Inc. | Point of presence management in request routing |
US10097398B1 (en) | 2010-09-28 | 2018-10-09 | Amazon Technologies, Inc. | Point of presence management in request routing |
US11632420B2 (en) | 2010-09-28 | 2023-04-18 | Amazon Technologies, Inc. | Point of presence management in request routing |
US10778554B2 (en) | 2010-09-28 | 2020-09-15 | Amazon Technologies, Inc. | Latency measurement in resource requests |
US11108729B2 (en) | 2010-09-28 | 2021-08-31 | Amazon Technologies, Inc. | Managing request routing information utilizing client identifiers |
US9712484B1 (en) | 2010-09-28 | 2017-07-18 | Amazon Technologies, Inc. | Managing request routing information utilizing client identifiers |
US9497259B1 (en) | 2010-09-28 | 2016-11-15 | Amazon Technologies, Inc. | Point of presence management in request routing |
US9794216B2 (en) | 2010-09-28 | 2017-10-17 | Amazon Technologies, Inc. | Request routing in a networked environment |
US10225322B2 (en) | 2010-09-28 | 2019-03-05 | Amazon Technologies, Inc. | Point of presence management in request routing |
US10931738B2 (en) | 2010-09-28 | 2021-02-23 | Amazon Technologies, Inc. | Point of presence management in request routing |
US11336712B2 (en) | 2010-09-28 | 2022-05-17 | Amazon Technologies, Inc. | Point of presence management in request routing |
US9930131B2 (en) | 2010-11-22 | 2018-03-27 | Amazon Technologies, Inc. | Request routing processing |
US10951725B2 (en) | 2010-11-22 | 2021-03-16 | Amazon Technologies, Inc. | Request routing processing |
US9391949B1 (en) * | 2010-12-03 | 2016-07-12 | Amazon Technologies, Inc. | Request routing processing |
US11604667B2 (en) | 2011-04-27 | 2023-03-14 | Amazon Technologies, Inc. | Optimized deployment based upon customer locality |
US9628554B2 (en) | 2012-02-10 | 2017-04-18 | Amazon Technologies, Inc. | Dynamic content delivery |
US10021179B1 (en) | 2012-02-21 | 2018-07-10 | Amazon Technologies, Inc. | Local resource delivery network |
US10623408B1 (en) | 2012-04-02 | 2020-04-14 | Amazon Technologies, Inc. | Context sensitive object management |
US10225362B2 (en) | 2012-06-11 | 2019-03-05 | Amazon Technologies, Inc. | Processing DNS queries to identify pre-processing information |
US11303717B2 (en) | 2012-06-11 | 2022-04-12 | Amazon Technologies, Inc. | Processing DNS queries to identify pre-processing information |
US12273428B2 (en) | 2012-06-11 | 2025-04-08 | Amazon Technologies, Inc. | Processing DNS queries to identify pre-processing information |
US11729294B2 (en) | 2012-06-11 | 2023-08-15 | Amazon Technologies, Inc. | Processing DNS queries to identify pre-processing information |
US9525659B1 (en) | 2012-09-04 | 2016-12-20 | Amazon Technologies, Inc. | Request routing utilizing point of presence load information |
US10542079B2 (en) | 2012-09-20 | 2020-01-21 | Amazon Technologies, Inc. | Automated profiling of resource usage |
US10015241B2 (en) | 2012-09-20 | 2018-07-03 | Amazon Technologies, Inc. | Automated profiling of resource usage |
US10645056B2 (en) | 2012-12-19 | 2020-05-05 | Amazon Technologies, Inc. | Source-dependent address resolution |
US10205698B1 (en) | 2012-12-19 | 2019-02-12 | Amazon Technologies, Inc. | Source-dependent address resolution |
US10374955B2 (en) | 2013-06-04 | 2019-08-06 | Amazon Technologies, Inc. | Managing network computing components utilizing request routing |
US9929959B2 (en) | 2013-06-04 | 2018-03-27 | Amazon Technologies, Inc. | Managing network computing components utilizing request routing |
US20160072764A1 (en) * | 2014-09-10 | 2016-03-10 | T-Mobile Usa, Inc. | Dynamic double network address translator |
US10033627B1 (en) | 2014-12-18 | 2018-07-24 | Amazon Technologies, Inc. | Routing mode and point-of-presence selection service |
US10728133B2 (en) | 2014-12-18 | 2020-07-28 | Amazon Technologies, Inc. | Routing mode and point-of-presence selection service |
US10097448B1 (en) | 2014-12-18 | 2018-10-09 | Amazon Technologies, Inc. | Routing mode and point-of-presence selection service |
US10091096B1 (en) | 2014-12-18 | 2018-10-02 | Amazon Technologies, Inc. | Routing mode and point-of-presence selection service |
US11381487B2 (en) | 2014-12-18 | 2022-07-05 | Amazon Technologies, Inc. | Routing mode and point-of-presence selection service |
US11863417B2 (en) | 2014-12-18 | 2024-01-02 | Amazon Technologies, Inc. | Routing mode and point-of-presence selection service |
US10225326B1 (en) | 2015-03-23 | 2019-03-05 | Amazon Technologies, Inc. | Point of presence based data uploading |
US11297140B2 (en) | 2015-03-23 | 2022-04-05 | Amazon Technologies, Inc. | Point of presence based data uploading |
US9887932B1 (en) | 2015-03-30 | 2018-02-06 | Amazon Technologies, Inc. | Traffic surge management for points of presence |
US9887931B1 (en) | 2015-03-30 | 2018-02-06 | Amazon Technologies, Inc. | Traffic surge management for points of presence |
US10469355B2 (en) | 2015-03-30 | 2019-11-05 | Amazon Technologies, Inc. | Traffic surge management for points of presence |
US9819567B1 (en) | 2015-03-30 | 2017-11-14 | Amazon Technologies, Inc. | Traffic surge management for points of presence |
US10180993B2 (en) | 2015-05-13 | 2019-01-15 | Amazon Technologies, Inc. | Routing based request correlation |
US10691752B2 (en) | 2015-05-13 | 2020-06-23 | Amazon Technologies, Inc. | Routing based request correlation |
US11461402B2 (en) | 2015-05-13 | 2022-10-04 | Amazon Technologies, Inc. | Routing based request correlation |
US9832141B1 (en) | 2015-05-13 | 2017-11-28 | Amazon Technologies, Inc. | Routing based request correlation |
US10616179B1 (en) | 2015-06-25 | 2020-04-07 | Amazon Technologies, Inc. | Selective routing of domain name system (DNS) requests |
US10097566B1 (en) | 2015-07-31 | 2018-10-09 | Amazon Technologies, Inc. | Identifying targets of network attacks |
US9774619B1 (en) | 2015-09-24 | 2017-09-26 | Amazon Technologies, Inc. | Mitigating network attacks |
US9742795B1 (en) | 2015-09-24 | 2017-08-22 | Amazon Technologies, Inc. | Mitigating network attacks |
US9794281B1 (en) | 2015-09-24 | 2017-10-17 | Amazon Technologies, Inc. | Identifying sources of network attacks |
US10200402B2 (en) | 2015-09-24 | 2019-02-05 | Amazon Technologies, Inc. | Mitigating network attacks |
US11134134B2 (en) | 2015-11-10 | 2021-09-28 | Amazon Technologies, Inc. | Routing for origin-facing points of presence |
US10270878B1 (en) | 2015-11-10 | 2019-04-23 | Amazon Technologies, Inc. | Routing for origin-facing points of presence |
US10257307B1 (en) | 2015-12-11 | 2019-04-09 | Amazon Technologies, Inc. | Reserved cache space in content delivery networks |
US10049051B1 (en) | 2015-12-11 | 2018-08-14 | Amazon Technologies, Inc. | Reserved cache space in content delivery networks |
US10348639B2 (en) | 2015-12-18 | 2019-07-09 | Amazon Technologies, Inc. | Use of virtual endpoints to improve data transmission rates |
US20170289101A1 (en) * | 2016-03-29 | 2017-10-05 | T-Mobile Usa, Inc. | Nat aware dns |
US10826868B2 (en) * | 2016-03-29 | 2020-11-03 | T-Mobile Usa, Inc. | NAT aware DNS |
US10075551B1 (en) | 2016-06-06 | 2018-09-11 | Amazon Technologies, Inc. | Request management for hierarchical cache |
US10666756B2 (en) | 2016-06-06 | 2020-05-26 | Amazon Technologies, Inc. | Request management for hierarchical cache |
US11463550B2 (en) | 2016-06-06 | 2022-10-04 | Amazon Technologies, Inc. | Request management for hierarchical cache |
US10110694B1 (en) | 2016-06-29 | 2018-10-23 | Amazon Technologies, Inc. | Adaptive transfer rate for retrieving content from a server |
US11457088B2 (en) | 2016-06-29 | 2022-09-27 | Amazon Technologies, Inc. | Adaptive transfer rate for retrieving content from a server |
US9992086B1 (en) | 2016-08-23 | 2018-06-05 | Amazon Technologies, Inc. | External health checking of virtual private cloud network environments |
US10516590B2 (en) | 2016-08-23 | 2019-12-24 | Amazon Technologies, Inc. | External health checking of virtual private cloud network environments |
US10469442B2 (en) | 2016-08-24 | 2019-11-05 | Amazon Technologies, Inc. | Adaptive resolution of domain name requests in virtual private cloud network environments |
US10033691B1 (en) | 2016-08-24 | 2018-07-24 | Amazon Technologies, Inc. | Adaptive resolution of domain name requests in virtual private cloud network environments |
US11330008B2 (en) | 2016-10-05 | 2022-05-10 | Amazon Technologies, Inc. | Network addresses with encoded DNS-level information |
US10505961B2 (en) | 2016-10-05 | 2019-12-10 | Amazon Technologies, Inc. | Digitally signed network address |
US10469513B2 (en) | 2016-10-05 | 2019-11-05 | Amazon Technologies, Inc. | Encrypted network addresses |
US10616250B2 (en) | 2016-10-05 | 2020-04-07 | Amazon Technologies, Inc. | Network addresses with encoded DNS-level information |
US10372499B1 (en) | 2016-12-27 | 2019-08-06 | Amazon Technologies, Inc. | Efficient region selection system for executing request-driven code |
US11762703B2 (en) | 2016-12-27 | 2023-09-19 | Amazon Technologies, Inc. | Multi-region request-driven code execution system |
US10831549B1 (en) | 2016-12-27 | 2020-11-10 | Amazon Technologies, Inc. | Multi-region request-driven code execution system |
US10938884B1 (en) | 2017-01-30 | 2021-03-02 | Amazon Technologies, Inc. | Origin server cloaking using virtual private cloud network environments |
US12052310B2 (en) | 2017-01-30 | 2024-07-30 | Amazon Technologies, Inc. | Origin server cloaking using virtual private cloud network environments |
US10503613B1 (en) | 2017-04-21 | 2019-12-10 | Amazon Technologies, Inc. | Efficient serving of resources during server unavailability |
US11075987B1 (en) | 2017-06-12 | 2021-07-27 | Amazon Technologies, Inc. | Load estimating content delivery network |
US10447648B2 (en) | 2017-06-19 | 2019-10-15 | Amazon Technologies, Inc. | Assignment of a POP to a DNS resolver based on volume of communications over a link between client devices and the POP |
US11290418B2 (en) | 2017-09-25 | 2022-03-29 | Amazon Technologies, Inc. | Hybrid content request routing system |
US10592578B1 (en) | 2018-03-07 | 2020-03-17 | Amazon Technologies, Inc. | Predictive content push-enabled content delivery network |
CN109151089A (en) * | 2018-08-28 | 2019-01-04 | 新华三技术有限公司合肥分公司 | MDNS information transmitting methods and device |
CN109151089B (en) * | 2018-08-28 | 2021-10-12 | 新华三技术有限公司合肥分公司 | mDNS information transmission method and device |
US10862852B1 (en) | 2018-11-16 | 2020-12-08 | Amazon Technologies, Inc. | Resolution of domain name requests in heterogeneous network environments |
US11362986B2 (en) | 2018-11-16 | 2022-06-14 | Amazon Technologies, Inc. | Resolution of domain name requests in heterogeneous network environments |
US11025747B1 (en) | 2018-12-12 | 2021-06-01 | Amazon Technologies, Inc. | Content request pattern-based routing system |
US10944714B1 (en) | 2019-04-16 | 2021-03-09 | Amazon Technologies, Inc. | Multi-factor domain name resolution |
US20230269217A1 (en) * | 2022-02-23 | 2023-08-24 | Cisco Technology, Inc. | Binding flows to unique addresses or ports |
US12069103B2 (en) | 2022-02-23 | 2024-08-20 | Cisco Technology, Inc. | Implementing policy based on unique addresses or ports |
US12170644B2 (en) * | 2022-02-23 | 2024-12-17 | Cisco Technology, Inc. | Binding flows to unique addresses or ports |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6493765B1 (en) | Domain name resolution in a network having multiple overlapping address domains | |
US6888837B1 (en) | Network address translation in a network having multiple overlapping address domains | |
US7558880B2 (en) | Dynamic DNS registration method, domain name solution method, DNS proxy server, and address translation device | |
US7701952B2 (en) | Packet communication method and apparatus and a recording medium storing a packet communication program | |
US7310351B2 (en) | Method and apparatus for translating protocol | |
US6580717B1 (en) | Packet communication method and apparatus and a recording medium storing a packet communication program | |
JP4505168B2 (en) | Packet network interfacing | |
US5815664A (en) | Address reporting device and method for detecting authorized and unauthorized addresses in a network environment | |
US5425028A (en) | Protocol selection and address resolution for programs running in heterogeneous networks | |
KR100453050B1 (en) | Method for communicating data between IPv4 and IPv6 and apparatus thereof | |
US7404008B2 (en) | Address translator and method for management of address translation rules | |
US7760674B2 (en) | Method of translating protocol at translator, method of providing protocol translation information at translation server, and address translation server | |
US6717944B1 (en) | System, device, and method for allocating virtual circuits in a communication network | |
EP2306689B1 (en) | Devices and method for accessing a web server in a local space | |
US20060098644A1 (en) | Translating native medium access control (MAC) addresses to hierarchical MAC addresses and their use | |
JP5640092B2 (en) | Method and system for realizing mutual communication between IPV4 network and new network | |
JP2003249942A (en) | Apparatus for converting internet protocol address, home network system using the same and communication method thereof | |
US7450585B2 (en) | Method and system in an IP network for using a network address translation (NAT) with any type of application | |
TW200924462A (en) | System and method for connection of hosts behind NATs | |
US8612557B2 (en) | Method for establishing connection between user-network of other technology and domain name system proxy server for controlling the same | |
US20100085984A1 (en) | Method and ip translator for translating protocol to support compatibility between networks each employing different types of protocols | |
US20060104226A1 (en) | IPv4-IPv6 transition system and method using dual stack transition mechanism(DTSM) | |
US6785738B1 (en) | ARP packet to preserve canonical form of addresses | |
CN111711705B (en) | Method and device for realizing network connection based on bidirectional NAT (network Address translation) by proxy node | |
US7788407B1 (en) | Apparatus and methods for providing an application level gateway for use in networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: NORTEL NETWORKS CORPORATION, CANADA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:PATEL, MANISH;REEL/FRAME:011155/0006 Effective date: 20000907 |
|
AS | Assignment |
Owner name: NORTEL NETWORKS CORPORATION, CANADA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:CUNNINGHAM, TIMOTHY;KOESTER, GREG;REEL/FRAME:011445/0949;SIGNING DATES FROM 19990513 TO 19990514 |
|
AS | Assignment |
Owner name: NORTEL NETWORKS LIMITED, CANADA Free format text: CHANGE OF NAME;ASSIGNOR:NORTEL NETWORKS CORPORATION;REEL/FRAME:012211/0581 Effective date: 20000501 Owner name: NORTEL NETWORKS LIMITED,CANADA Free format text: CHANGE OF NAME;ASSIGNOR:NORTEL NETWORKS CORPORATION;REEL/FRAME:012211/0581 Effective date: 20000501 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
FPAY | Fee payment |
Year of fee payment: 8 |
|
AS | Assignment |
Owner name: BAY NETWORKS, INC., CALIFORNIA Free format text: CHANGE OF NAME;ASSIGNOR:WELLFLEET COMMUNICATIONS, INC.;REEL/FRAME:026381/0401 Effective date: 19941020 Owner name: WELLFLEET COMMUNICATIONS, INC., MASSACHUSETTS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MEEHAN, THOMAS;REEL/FRAME:026381/0070 Effective date: 19940926 |
|
AS | Assignment |
Owner name: NORTEL NETWORKS INC., TENNESSEE Free format text: MERGER;ASSIGNOR:NORTEL NETWORKS NA INC.;REEL/FRAME:026389/0667 Effective date: 20001218 Owner name: NORTEL NETWORKS NA INC., CALIFORNIA Free format text: CHANGE OF NAME;ASSIGNOR:BAY NETWORKS, INC.;REEL/FRAME:026389/0651 Effective date: 19990429 |
|
AS | Assignment |
Owner name: ROCKSTAR BIDCO, LP, NEW YORK Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:NORTEL NETWORKS LIMITED;REEL/FRAME:027164/0356 Effective date: 20110729 |
|
AS | Assignment |
Owner name: ROCKSTAR CONSORTIUM US LP, TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ROCKSTAR BIDCO, LP;REEL/FRAME:032425/0867 Effective date: 20120509 |
|
FPAY | Fee payment |
Year of fee payment: 12 |
|
AS | Assignment |
Owner name: RPX CLEARINGHOUSE LLC, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ROCKSTAR CONSORTIUM US LP;ROCKSTAR CONSORTIUM LLC;BOCKSTAR TECHNOLOGIES LLC;AND OTHERS;REEL/FRAME:034924/0779 Effective date: 20150128 |
|
AS | Assignment |
Owner name: JPMORGAN CHASE BANK, N.A., AS COLLATERAL AGENT, IL Free format text: SECURITY AGREEMENT;ASSIGNORS:RPX CORPORATION;RPX CLEARINGHOUSE LLC;REEL/FRAME:038041/0001 Effective date: 20160226 |
|
AS | Assignment |
Owner name: RPX CORPORATION, CALIFORNIA Free format text: RELEASE (REEL 038041 / FRAME 0001);ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:044970/0030 Effective date: 20171222 Owner name: RPX CLEARINGHOUSE LLC, CALIFORNIA Free format text: RELEASE (REEL 038041 / FRAME 0001);ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:044970/0030 Effective date: 20171222 |
|
AS | Assignment |
Owner name: JEFFERIES FINANCE LLC, NEW YORK Free format text: SECURITY INTEREST;ASSIGNOR:RPX CLEARINGHOUSE LLC;REEL/FRAME:046485/0644 Effective date: 20180619 |
|
AS | Assignment |
Owner name: RPX CLEARINGHOUSE LLC, CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:JEFFERIES FINANCE LLC;REEL/FRAME:054305/0505 Effective date: 20201023 |