31.12.2012 Views

official journal of the patent office - Controller General of Patents ...

official journal of the patent office - Controller General of Patents ...

official journal of the patent office - Controller General of Patents ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

(12) PATENT APPLICATION PUBLICATION (21) Application No.49/CHE/2005 A<br />

(19) INDIA<br />

(22) Date <strong>of</strong> filing <strong>of</strong> Application :20/01/2005 (43) Publication Date : 16/03/2007<br />

(54) Title <strong>of</strong> <strong>the</strong> invention : NETWORK ARCHITECTURE AND RELATED METHODS FOR SURVIVING<br />

DENIAL OF SERVICE ATTACKS<br />

(51) International classification :G06F<br />

15/76<br />

(31) Priority Document No :NA<br />

(32) Priority Date :NA<br />

(33) Name <strong>of</strong> priority country :NA<br />

(86) International Application No :NA<br />

Filing Date<br />

:NA<br />

(87) International Publication No : NA<br />

(61) Patent <strong>of</strong> Addition to Application :NA<br />

Number<br />

Filing Date<br />

:NA<br />

(62) Divisional to to Application Number :NA<br />

Filing Date<br />

:NA<br />

(71)Name <strong>of</strong> Applicant :<br />

1)LUCENT TECHNOLOGIES INC.<br />

Address <strong>of</strong> Applicant :600 MOUNTAIN<br />

AVENUE, MURRAY HILL, NEW JERSEY 07974-<br />

0636. U.S.A.<br />

(72)Name <strong>of</strong> Inventor :<br />

1)TIAN BU<br />

2)SAMPHEL NORDEN<br />

3)THOMAS Y WOO<br />

No <strong>of</strong> Pages : 30 No <strong>of</strong> Claims : 10<br />

(57) Abstract :<br />

Network architecture and related methods for maintaining traffic flow between clients and an endserver<br />

during a Denial <strong>of</strong> Service (Dos) attack are described herein. The network architecture<br />

includes a set <strong>of</strong> overlay nodes coupled between clients and a server. Each overlay node is able to<br />

rank and probe o<strong>the</strong>r nodes for purposes <strong>of</strong> selecting a best path for routing traffic to <strong>the</strong> endserver<br />

to resist a denial <strong>of</strong> service <strong>of</strong> attack. Probing is performed to detect overlay nodes having<br />

better performance based on one or more performance metrics (i.e., load, jitter, latency, loss rate).<br />

For instance, in one implementation probing detects lightly loaded overlay paths for purposes <strong>of</strong><br />

routing traffic to <strong>the</strong> end-server, so as to maintain connectivity between <strong>the</strong> end-server and clients<br />

even under DoS attacks.<br />

The Patent Office Journal 16/03/2007 5360

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!