Intelligent routing
The Red Swoosh back-end maintains incoming connections to all of the Swooshed resources on the network. Essentially, the Red Swoosh directory has a map of the network, at a level of breadth, detail and granularity not seen anywhere else in the networking world.

This real-time map of network resources allows Red Swoosh to allocate the most cost-efficient and high-performance resources to each content/data request. When a user requests a piece of data (e.g. by clicking on a link in a web browser), his machine then pulls the data from dozens of local resources (peers, servers, caching systems) concurrently. Locations are assigned to meet QoS parameters in specific request and to meet cost-effectiveness requirements.


Security
It is absolutely imperative that with any content/data networking solution, that security in delivery is guaranteed. The architecture of a content grid must be such that the administrators of the system must have absolute control over what machines and users are delivered what specific pieces of data. To such an end, Red Swoosh holds two primary tenets of security in its data delivery model.

I. No Good User Gets Bad Content
A user who is authorized on the network should never get data that is different, corrupted, maliciously altered, etc. than the content he requested. In networks where one content request is fulfilled from multiple concurrent network resources, extra care must be taken to verify that the content that the end-node receives is the content that is was intended and authorized to receive. For example you can imagine how critical it is when delivering an executable binary, that the binary is EXACTLY the set of bits that is supposed to be delivered.

Content Authentication
Red Swoosh accomplishes the above objective by requiring every delivery fulfillment to be authenticated with the central Red Swoosh directory. The RS networking client verifies hashes of downloaded/streamed content with the RS backend before bringing the content into the end-node�s operating environment. With no bad content able to get passed into the operating environment without being authenticated by the RS central directory, RS can therefore maintain that No Good User Gets Bad Content.

II. No Bad User Gets Good Content
Just as critical to the security of the RS Data Grid products is our ability to prevent unauthorized users or end-points from retrieving data they are not authorized to receive. Access controls in place before implementing Red Swoosh must remain unaffected and intact after the Customer deploys Red Swoosh systems and software. We achieve this critical security requirement through the features below:

Rigorous machine authentication Red Swoosh employs practical yet rigorous methods for verifying nodes and users on the network. Many conventional authentication processes ensure the identity of the network resources before they are brought into the RS network.

SecureLink
Red Swoosh�s SecureLink technology and feature-set brings substantial security to the RS�s most security conscious customers. Essentially, RS will not deliver any piece of data or content until the Customer has explicitly authorized such delivery. RS accomplishes this by first obfuscating the NameSpaceAPI, and link from the end-node or user.

1) The user clicks on the same link it would have prior to Red Swoosh being deployed.
2) The RS Customer then authenticates the request from the specific user.
3) The Customer does not send the data down to the user. Instead the RS Customer then sends a delivery request to
     RS over an SSL link that authorizes delivery to the specific user, at the prescribed QoS, and other delivery
     parameters.

DRM/encryption support
After fulfillment of delivery to a particular end-user, it may be required to keep the user from accessing or moving the data. The Data provider may also want to associate a whole host of business rules to the use of the content or data. For these business requirements, Red Swoosh has made its system compatible for delivery of objects using any major DRM provider.


QoS
Never before did the Network engineer or Ops team have end-to-end control of data delivery over heterogeneous networks. The Red Swoosh Content and Data Grids bring exactly that to the table.

Customers use Red Swoosh�s QoS controls for network activities ranging from speeding up or slowing down data delivery to controlling costs and utilization of various network resources.

Set the controls in how data is pulled and from which resources under specific conditions. Set ceilings and limits on throughput to requesting machines. Make remarkably better efforts to Guaranteed QoS over heterogeneous networks, deliver better performing applications over public and private networks. Use Red Swoosh�s NameSpace API to control your data and your network.


Firewall Support
Intelligence about firewalls is crucial in any Content Grid. Red Swoosh can coordinate delivery between resources where no users are behind a firewall, all cases where one machine is behind a firewall and the other is not, and many cases where each machine is behind a firewall.


CDI (Click Driven Installation)
Red Swoosh networking software needs to be installed on machines in order to Swoosh-enable your network. Red Swoosh offers Internet and Enterprise customers the ability to dynamically set installations on-demand, through Swoosh's NameSpace link parameters. These installations can be initiated by user actions (i.e. clicking on a link), or initiated by some automated process or other client application.

Customer options vary from whether or not to prompt user with installation request to determining whether installation is required for a specific data request. This flexibility extends the control offered the customer in delivering its data, to automated, transparent, and centralized control of how and when machines are brought into the Content or Data Grid environment.


Reporting
The Red Swoosh Backend logs all Red Swoosh network activity and details every transaction that happens on the Grid. We then archive back-end reporting data in a DBMS, and provide standard W3C standard reporting on a daily basis. We also build customized reporting applications for our customers, and enable enterprise customers to have logging stored directly in their own DBMS.


Extranet
The Red Swoosh Extranet is the command-and-control center for the Red Swoosh Customer. Views of installations, archived reports, high-level perspectives on current and recent delivery, tools to help you swoosh links, technical documents and whitepapers, and contact info for technical and business support staff that provides you with 24x7 support. Change string formats for daily reports, change contact information, set up and manage pre-cache campaigns. The Red Swoosh Extranet is the personalized home-base for the RS Customer administrator.
Implementation
  • HTTP/URL based programmatic API
  • Prepend swoosh text to front of URLs
  • Customize installation
  • Set QoS, and installation parameters through Swooshed links
  • Extranet reporting and http-triggered reporting service
  • Get up and running with massive content/data initiative in less than an hour!!


  • Client
  • HTTP proxy for desktop applications
  • Multi-source delivery—pull data from multiple sources concurrently
  • Download/Streaming algorithms adapt in real-time to network conditions
  • Intelligent routing — real-time performance-based routing
  • Localized data transfer based on real-time map of topology of network
  • Delivers/Downloads/Streams data over HTTP and RSTP (Red Swoosh Transfer Protocol)
  • Windows 98, ME, 2000, XP compatible


  • RS Directory
  • Proprietary distributed in-memory DB
  • Hundreds of thousands of concurrent persistent connections
  • 100�s of millions of entries of cache locations
  • Coordinates Gigabits-per-second of data delivery
  • Fully connected real-time snapshot of network
  • Firewall support
  • what we can do for you
    red swoosh in action
    real customer stories
    try us
    overview
    features & technology
    user experience
    implementation
    applications
    case studies
    return on investment
    sign up
    get involved
    step by step
    what we can do for you
    red swoosh in action
    real customer stories
    try us
    what we can do for you
    red swoosh in action
    real customer stories
    try us
    what we can do for you
    red swoosh in action
    real customer stories
    try us
    what we can do for you
    red swoosh in action
    real customer stories
    try us
    applications
    case studies
    return on investment
    applications
    case studies
    return on investment
    applications
    case studies
    return on investment
    applications
    case studies
    return on investment
    overview
    features & technology
    user experience
    implementation
    overview
    features & technology
    user experience
    implementation
    overview
    features & technology
    user experience
    implementation
    overview
    features & technology
    user experience
    implement
    sign up
    step by step
    get involved
    sign up
    step by step
    get involved
    sign up
    step by step
    get involved
    sign up
    step by step
    get involved