Abstract: Access to WebDAV (Distributed Authoring and Versioning) servers is provided in a manner that is essentially transparent to applications. A WebDAV redirector and related components support file system I/O requests and network requests directed to WebDAV servers identified by URI (Universal Resource Identifier) names, or by a drive may be mapped to a WebDAV share. An application's create or open I/O requests directed to a WebDAV server are detected, and result in a local copy of the file being downloaded and cached for local access. When closed, the local file is uploaded to the WebDAV server. Network-related requests such as for browsing that are directed to a WebDAV server are also handled transparently. WebDAV files may be locally encrypted and decrypted at the file system level, transparent to applications and the WebDAV server, via an encrypting file system that performs local encryption and decryption at the local file system level.
Abstract: A virtual overlay backup network is established to provide Fast Reroute capability with guaranteed bandwidth protection to a network that employs end-to-end circuits such as label switched paths (LSPs). In some implementations, backup bandwidth is allocated from an available backup bandwidth pool, as defined herein, available on each link. Complete bandwidth protection may be provided rapidly upon detection of a failure while available backup bandwidth is shared between independent failures. In one embodiment, this is accomplished by provisioning backup tunnels to protect all links and nodes, wherein total available backup bandwidth on any link is not exceeded by the requirements of backup tunnels protecting any single node but backup tunnels protecting different nodes may share bandwidth.
Type:
Grant
Filed:
January 2, 2002
Date of Patent:
October 7, 2008
Assignee:
Cisco Technology, Inc.
Inventors:
Anna Charny, Robert James Goguen, Carol Iturralde
Abstract: Methods and apparatus for implementing storage virtualization on a network device of a storage area network are disclosed. A frame or packet is received at a port of the network device. It is then determined that the frame or packet pertains to access of a virtual storage location of a virtual storage unit representing one or more physical storage locations on one or more physical storage units of the storage area network. A virtual-physical mapping between the one or more physical storage locations and the virtual storage location is then obtained. A new or modified frame or packet is then sent to an initiator or a target specified by the virtual-physical mapping.
Abstract: Dynamic management proxies provide type-safe, intuitive, and flexible interfaces to management entities. In an embodiment, a strongly-typed user interface is defined for each management entity. The dynamic proxy receives user requests via this user interface. The dynamic proxies converts user requests into generic requests in compliance with the management entities generic interface. The generic requests are communicated to the management entity via the generic interface. Dynamic management proxies are created at runtime. This allows the management interface to be seamlessly extended.
Abstract: A method and system for managing a distributed computing system relying on the discovery and analysis of dependency data. The implemented system and method utilizes an agent that can detect dependency configuration data stored on network management elements to determine the relationship of elements within the distributed system. Further included is a particular embodiment that displays a root managed device a root distance from a border and displays a non-root managed device having a dependency relationship with the root managed device a predetermined distance from the border that is greater than the root distance.
Abstract: Transmission data is generated depending on the status change of a device according to a message indicating the status information about the device and the destination information about the message and is transmitted by electronic mail, and the user who manages the device can be notified of the status of the device at an appropriate timing by a data transfer process apparatus, a device, a network system, a data transfer method, and a storage medium.
Abstract: A source communication device comprises a cluster manager to group destination device connections into a plurality of performance clusters. The cluster manager then causes a synchronization mechanism to be generated for each performance cluster. Each synchronization cluster can then allow data to be optimally shared between the source device and destination devices within a given cluster.
Abstract: In one embodiment, in a peer-to-peer network, data intended to be transferred directly from a first peer node to a second peer node are first redirected to an interception node. In the interception node, the data may be processed prior to being forwarded to the second peer node. The data may be scanned for virus detection and removal, for example.
Abstract: A router has at least one outbound interface configured for establishing multiple IP-based secure connections (i.e., tunnels) with respective destinations based on transmission of encrypted data packets via the IP-based secure connections. The encrypted data packets are generated by a cryptographic module, where each encrypted packet successively output from the cryptographic module includes a corresponding successively-unique sequence number. The supply of data packets to the cryptographic module is controlled by a queue controller: the queue controller assigns, for each secure connection, a corresponding queuing module configured for outputting a group of data packets associated with the corresponding secure connection according to a corresponding assigned maximum output bandwidth. Each queuing module also is configured for reordering the corresponding group of data packets according to a determined quality of service policy and the corresponding assigned maximum output bandwidth.
Type:
Grant
Filed:
January 20, 2004
Date of Patent:
June 17, 2008
Assignee:
Cisco Technology, Inc.
Inventors:
John Brawner Duffie, III, Theodore Michael Hannock, Steven Robert Ochmanski
Abstract: A terminal apparatus is configured to receive image data from a scanner. A controller receives, from the scanner, a control file including a file name, receives, from the scanner, a document file, the document file including image data scanned by the scanner, analyzes the file name included in the received control file to obtain the file type of the received document file, and determines whether the application program associated with the obtained file type is stored in a memory. The controller also searches the memory to determine the application program associated with the obtained file type from application programs stored in the memory, starts the application program associated with the obtained file type, when it is determined that the application program associated with the obtained file type is stored in the memory, and opens the received document file without user input, based upon the application program determined in the search.