US20090013083A9 - System and method for using a mapping between client addresses and addresses of caches to support content delivery - Google Patents
System and method for using a mapping between client addresses and addresses of caches to support content delivery Download PDFInfo
- Publication number
- US20090013083A9 US20090013083A9 US09/843,789 US84378901A US2009013083A9 US 20090013083 A9 US20090013083 A9 US 20090013083A9 US 84378901 A US84378901 A US 84378901A US 2009013083 A9 US2009013083 A9 US 2009013083A9
- Authority
- US
- United States
- Prior art keywords
- web
- selection process
- client
- cache
- information object
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1458—Protection against unauthorised use of memory or access to memory by checking the subject access rights
- G06F12/1483—Protection against unauthorised use of memory or access to memory by checking the subject access rights using an access-table, e.g. matrix or list
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/957—Browsing optimisation, e.g. caching or content distillation
- G06F16/9574—Browsing optimisation, e.g. caching or content distillation of access to content, e.g. by caching
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/16—Arrangements for providing special services to substations
- H04L12/18—Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/30—Managing network names, e.g. use of aliases or nicknames
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/45—Network directories; Name-to-address mapping
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/45—Network directories; Name-to-address mapping
- H04L61/4505—Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols
- H04L61/4511—Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols using domain name system [DNS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/58—Caching of addresses or names
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1001—Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1001—Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
- H04L67/1004—Server selection for load balancing
- H04L67/1008—Server selection for load balancing based on parameters of servers, e.g. available memory or workload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1001—Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
- H04L67/1004—Server selection for load balancing
- H04L67/101—Server selection for load balancing based on network conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1001—Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
- H04L67/10015—Access to distributed or replicated servers, e.g. using brokers
Definitions
- the present invention relates to a system and method for the discovery of information objects and servers storing information objects distributed over computer networks. More particularly, the present invention provides a system and method for using a mapping between client addresses and addresses of caches to support content delivery.
- An internetwork is a collection of computer networks interconnected by nodes, each such node may be a general-purpose computer or a specialized device, such as a router. As such, an internetwork is often called a network of networks.
- the purpose of building an internetwork is to provide information services to end nodes; each end node may be a general-purpose computer or a specialized device, such as a camera or a display.
- the Internet is an internetwork in which information is organized into packets to be distributed on a store-and forward manner from source to destination end nodes, and in which routers and end nodes use the Internet Protocol (IP) to communicate such packets.
- IP Internet Protocol
- the World Wide Web (also known as WWW or Web) has become an essential information service in the Internet.
- the Web constitutes a system for accessing linked information objects stored in end nodes (host computers) all over the Internet. Berners-Lee wrote the original proposal for a Web of linked information objects (T. Berners-Lee, “Information Management: A Proposal,” CERN Document, March 1989).
- the Web consists of a vast collection of information objects organized as pages, and each page may contain links to other pages or, more generally, information objects with which content is rendered as audio, video, images, text or data. Pages are viewed by an end user with a program called a browser (e.g., Netscape Navigator).
- the Web browser runs in an end system at the user premises.
- the client obtains the required information objects from a server (Web server) using a request-response dialogue as part of the Hypertext Transfer Protocol (HTTP).
- Information objects are identified by means of names that are unique throughout the Internet; these names are called Uniform Resource Locators or URLs.
- a URL consists of three components: the protocol or scheme to be used for accessing the object (e.g., http), the name (a DNS name) of the host on which the object is located, and a local identifier that is unique in the specified host.
- the Web requires the use of mechanisms for scaling and reliability. More specifically, as the number of information objects that can be obtained through the Web increases, people find it more difficult to locate the specific information objects they need. Furthermore, as the number of Web users and servers increase, the sites or servers that store the requested information objects may be very far from the users requesting the objects, which leads to long latencies in the access and delivery of information, or the servers storing the information objects may be overwhelmed with the number of requests for popular information objects.
- Web caching schemes In a Web caching scheme, one or multiple Web caches or proxy Web servers (information object repositories, which term can also encompass origin content servers) are used in computer networks and the Internet to permit multiple host computers (clients) to access a set of information objects from sites other than the sites from which the content (information objects or just objects) are provided originally. Web caching schemes support discovering the sites where information objects are stored, distributing information objects among the Web caches, and retrieving information objects from a given Web cache. The many proposals and implementations to date differ on the specific mechanisms used to support each of these services.
- server-directed Web caching In contrast, the assumptions that can be made by these new Web caching services, called server-directed Web caching here, are significantly less restrictive, such as the following:
- Web caching proxies intercept Web requests destined for Web servers in the Internet (thus the name “proxy”), and attempt to service these requests from a cache of objects retrieved for previous requests (thus the name “caching”). In the event of a cache miss the origin server is contacted, the content loaded to the cache, and the client's request is then satisfied.
- routers advertise the existence or absence of replicated servers as part of their normal routing exchanges involving network topological information. Routers examine a distance metric for the advertised servers in a way that each router retains knowledge of at least the nearest servers. In this way, each router in an intemetwork has enough knowledge to direct client requests to the nearest servers, without necessarily having to maintain knowledge of all the servers in the intemetwork.
- servers poll routers for the content of their routing tables. Guyton and Schwartz also describe a method for gathering location data using routing probes without router support by means of measurement servers. According to this method, measurement servers explore the routes to the replicated servers providing services and content to clients. When a client asks a measurement server for a list of nearby servers from which to request a service, the measurement server takes into account the route back to the client in deciding the list of servers that appear closer to the client.
- One approach to object discovery consists in organizing Web caches hierarchically.
- a parent-child relationship is established among caches; each cache in the hierarchy is shared by a group of clients or a set of children caches.
- a request for an information object from a client is processed at a lowest-level cache, which either has a copy of the requested object, or asks each of its siblings in the hierarchy for the object and forwards the request to its parent cache if no sibling has a copy of the object.
- the process continues up the hierarchy, until a copy of the object is located at a cache or the root of the hierarchy is reached, which consists of the servers with the original copy of the object.
- WebWave In the WebWave protocol (A. Heddaya and S. Mirdad, “WebWave: Globally Load Balanced Fully Distributed Caching of Hot Published Documents,” Technical Report BU-CS-96024, Boston University, Computer Science Department, October 1996; A. Heddaya and S. Mirdad, “WebWave: Globally Load Balanced Fully Distributed Caching of Hot Published Documents,” Proc. IEEE 17 th International Conference on Distributed Computing Systems, Baltimore, Md., May 1997) Web caches are organized as a tree rooted at the server that provides the original copy of one object or a family of information objects; the leaves of the tree are the clients requesting the information objects, and the rest of the nodes in the tree are Web caches.
- the objective of the protocol is to achieve load balancing among Web caches; each Web cache in such a tree maintains a measurement of the load at its parent and children in the tree, and services or forwards the request to its parent automatically based on the load information.
- This approach reduces the possibility of overloading Web caches as in the Harvest approach to hierarchical Web caching; however, delays are still incurred in the propagation of Requests from heavily loaded Web caches to their ancestors in the Web hierarchy.
- Hash routing protocols (K. W. Ross, “Hash Routing for Collections of Shared Web Caches,” IEEE Network, Vol. 11, No. 6, November 1997, pp 37-44) constitute another approach to support object discovery in shared caches. Hash routing protocols are based on a deterministic hashing approach for mapping an information object to a unique cache (D. G. Thaler and C. V. Ravishankar, “Using Name-Based Mappings To Increase Hit,” IEEEACM Trans. Networking, 1998; V. Valloppillil and J.
- the value of the hash function for o, h(o) is calculated at the client or at a cache site (in the latter case the cache would be configured at the client, for example).
- the value of h(o) is the address of the cache site to contact in order to access the information object o.
- the Cache Resolver is another recent approach to hierarchical Web caching (D. Karger, E. Lehman, T. Leighton, M. Levine, D. Lewin, and R. Panigrahy, “Consistent Hashing and Random Trees: Distributed Caching Protocols for Relieving Hot Spots on the World Wide Web,” Proc. 29 th ACM Symposium on Theory of Computing (STOC 97), El Paso, Tex., 1997; D. Karger, Sherman, A. Berkheimer, B. Bogstad, R. Dhanidina, K. Iwamoto, B. Kim, L. Matkins, and Y. Yerushalmi, “Web Caching with Consistent Hashing,” Proc.
- a tree of Web caches is defined for each information object.
- a browser When a browser (client) requires an information object, it picks a leaf of the tree and submits a request containing its identifier, the identifier of the object, the sequence of caches through which the request is to be routed if needed.
- a Web cache receiving a request it determines if it has a local copy of the page and responds to the request if it does; otherwise, it forwards the request to the next Web cache in the path included in the request.
- a Web cache starts maintaining a local copy of an information object when the number of requests it receives for the object reaches a predefined number.
- a client selects a Web cache by means of consistent hashing, which disseminates requests to leaves of the Web caching hierarchy evenly but, unlike traditional hashing techniques, need not redistribute an updated hash table every time a change occurs in the caching hierarchy (e.g., a new Web cache joins or a Web cache fails).
- the Cache Resolver approach implements the hashing in DNS (Internet Domain Name Service) servers modified to fit this purpose.
- DNS Internet Domain Name Service
- the remaining limitations with this approach stem from the continuing use of a hierarchy of Web caches and the need to implement a hashing function in either Web clients or DNS servers. Routing a request through multiple Web Caches can incur substantial delays for clients to retrieve information objects that are not popular among other clients assigned to the same Web cache by the hashing function. Additional delays, even if small, are incurred at the DNS server that has to provide the address of the Web cache that the client should access. Furthermore, the DNS servers supporting the consistent hashing function must receive information about the loading of all the Web caches in the entire system, or at least a region of the system, in order to make accurate load-balancing decisions.
- the regional DNS server uses a hashing function to resolve the domain name in the special URL into the address of a Web cache (hosting server) in its region, which is referred to as the target Web cache in the present application, in a way that the load among Web caches in the region is balanced.
- the local DNS passes the address of that Web cache to the client, which in turn sends its request for the information object to that Web cache. If the object resides in the target Web cache, the cache sends the object to the client; otherwise, the object is retrieved from the original content site.
- the global hosting system advocated by Akamai was intended to address problems associated with traditional load-balanced mirroring solutions in which a load balancer or a hierarchy of load balancers redirect requests to one of a few hosting sites to balance the load among such sites.
- Companies such as Cisco Systems of Santa Clara, Calif., F5 Networks, Inc. of Seattle, Wash., Resonate, Inc. of Sunnyvale, Calif., Nortel Networks of Brampton, Ontario, and Foundry Networks, Inc. of San Jose, Calif. currently provide examples of load-balanced solutions.
- the limitations of the global hosting system are inherent to the fact that the approach is, in essence, a DNS-based load-balanced mirroring solution.
- the global hosting system selects a target Web cache based entirely on the region that appears to favor the local DNS, which need not favor the client itself, and balances the load among Web caches without taking into account the latency between the Web caches and the clients.
- a cache miss the information object has to be retrieved from the original content site, which means that latencies in the delivery of content can vary widely, unless the content is mirrored in all the caches of all regions.
- Hierarchies increase the average number cache hops needed to reach an object, while hashing is insensitive to the distance between a client and the cache site it selects, which also increases the average number of hops needed to reach an object.
- Another alternative approach to hierarchical web caching and hash routing protocols consists of forwarding client requests for URLs using routing tables that are very similar to the routing tables used today for the routing of IP packets in the Internet (L. Zhang, S. Michel, S. Floyd, and V. Jacobson, “Adaptive Web Caching: Towards a New Global Caching Architecture,” Proc. Third International WWW Caching Workshop, Manchester, England, June 1998, B. S. Michel, K. Nikoloudakis, P. Erasmusr, and L. Zhang, “URL Forwarding and Compression in Adaptive Web Caching,” Proc. EEE Infocom 2000, Tel Aviv, Israel, April 2000 ).
- Web caches maintain a “URL request routing table” and use it to decide how to forward URL requests to another Web caches when requested information objects are not found locally.
- the keys of the URL request routing tables are URL prefixes, which are associated with one ore more identifiers to the next-hop Web caches or cache groups, and a metric reflecting the average delay to retrieve a request from a matching URL.
- an entry in the URL request routing table specifies a URL prefix and the next-hop Web cache towards an area or neighborhood of Web caches where the object resides.
- a Web cache needs to know where a copy of a given object resides; however, because of the large number of objects (identified by URLs) that can be requested in a system, the URL request forwarding approach requires Web caches to be organized into areas or neighborhoods. All Web caches within the same area know the objects available in every other Web cache in the same area. In addition, for those objects that are not found in the area of a Web cache, the Web cache also maintains the next-hop Web cache towards the area in which a Web cache with the content resides.
- a Web cache maintains or has access to a local hint cache that maintains a mapping of an object to the identifier of another Web cache that has a copy of the object and is closest to the local hint cache.
- Web caches at the first level of the hierarchy maintain copies of information objects, while Web caches at higher levels only maintain hints to the objects. Hints are propagated along the hierarchy topology from the Web caches lower in the hierarchy to Web caches higher in the hierarchy. Furthermore, a Web cache with a copy of an object does not propagate a hint for the object.
- the limitation with this approach is that a Web caching hierarchy must still be established, which needs to be done manually in the absence of an automated method to establish the hierarchy, and the Web caching hierarchy must match the locality of reference by clients to reduce control overhead.
- This directory is then used by a cache on a miss to determine the closest cache site holding the desired content.
- the limitations of this directory-based approach is that the directory site(s) must receive information about all caches in the system.
- Kenner and Karush (B. Kenner and A. Karush, “System and Method for Optimized Storage and Retrieval of Data on a Distributed Computer Network,” U.S. Pat. No. 6,003,030, Dec. 14, 1999) propose a method for expediting the delivery of information objects to end users.
- the end user site is equipped with special software in addition to the Web browser.
- This software consists of a configuration utility and a client program.
- the configuration utility is used to download a delivery site file specifying a list of the delivery sites (Web caches or originating Web servers) from which the information objects can be retrieved and a suite of tests that can be run to determine which delivery site to contact.
- the limitations with this approach stem from the fact that it is not transparent to end user sites.
- the end user site needs to run additional software; performance tests must be conducted from the end-user site to one or more delivery sites to decide which site to use; and when changes occur to the delivery sites, a new version of the delivery site file must be retrieved by the end-user site, or new performance tests must be conducted.
- Another approach to helping select servers in a computer network (Z. Fei, S. Bhattacharjee, E. W. Zegura, and M. H. Ammar, “A Novel Server Selection Technique for Improving The Response Time of a Replicated Service,” Proc. IEEE Infocom 98, March 1998, pp. 783-791) consists of broadcasting server loading information after a certain load threshold or time period is exceeded.
- the limitation of this approach is that, just as with topology-broadcast protocols used for routing in computer networks, the scheme incurs substantial overhead as the number of servers increases.
- replica routing approach Another recent approach to directing clients to hosting sites with requested information objects or services is the replica routing approach proposed by Sightpath, Inc. (D. K. Gifford, “Replica Routing,” U.S. Pat. No. 6,052,718, Apr. 18, 2000).
- Sightpath, Inc. D. K. Gifford, “Replica Routing,” U.S. Pat. No. 6,052,718, Apr. 18, 2000.
- the replica routing system redirects a client requesting the information object or service to a “nearby” replica of the object or service.
- all replica routers know the replica advertisements from each of the replica servers in the system, which summarize information about their location and observations about the local internetwork topology and performance. Using this flooding of advertisements, a replica router discerns which replica server appears nearby any one client. However, requiring each replica router to receive the advertisements from every other replica server becomes impractical as the number of replica servers and replica routers increases.
- replica routers are organized into a hierarchy, and replica advertisements are propagated only part way up such router hierarchy.
- a client request is routed to the root of the hierarchy and from there is forwarded down the hierarchy, until it reaches a replica router with enough knowledge about the replica's internetwork location to make an informed redirection decision.
- This approach has similar performance and scaling limitations as the prior approaches summarized above based on hierarchies of Web caches, flooding of information among caches or servers, and forwarding of requests over multiple hops.
- Another recent approach to directing clients to hosting sites with requested information objects or services is the enhanced network services method by Phillips, Li, and Katz (S. G. Phillips, A. J. Li, and D. M. Katz, “Enhanced Network Services Using a Subnetwork of Communicating Processors,” U.S. Pat. No. 6,182,224, Jan. 30, 2001.).
- the enhanced network services method is very similar to the gathering of location data with router support advocated by Guyton and Schwartz described previously.
- routers using the enhanced network services approach gather network topological data and also include as part of their normal routing exchanges information about the hosts that can provide content and services to clients; routers can then rank the hosts according to their relative distance in the network.
- routers in the enhanced network services approach can include in their normal routing exchanges host information regarding logged-in users and willingness to pay for performing a designated service.
- the enhanced network services approach does not attempt to limit the amount of network topological information that routers need to exchange in order to direct clients to best qualified servers. This approach has, therefore, similar performance and scaling limitations as the prior approaches summarized above based on flooding of information among caches or servers, and forwarding of requests over multiple hops.
- a request for an information object is received from a client; and it is subsequently determined, according to an information object repository selection procedure, which of a number of information object repositories should service the request for the information object. Such determination is made without regard as to whether the information object is actually stored at the information object repository selected according to the selection procedure.
- the information object repository selection procedure involves mapping an address of the client to an address of the selected information object repository. The mapping is made according to specified performance metrics, which may be one or more of: average delay from the information object repository to the client, average processing delays at the information object repository, reliability of a path from the information object repository to the client, available bandwidth in said path, and loads on the information object repository.
- the address of the information object repository is selected from a number of addresses of information object repositories. Because the selection of the information object repository is made without regards as to whether or not that information object repository actually contains a copy of the requested information object, sometimes the selected information object repository will need to be instructed to obtain a copy of the information object.
- Determining which of the number of information object repositories should service the request for the information object may involve using one or more of the following: a direct cache selection process, a redirect cache selection process, a remote DNS cache selection process, or a local DNS cache selection process.
- a Web server which received the request from the client, contacts a Web router to obtain an address of a topologically close information object repository to the requesting client.
- the Web server receives from the Web router, an address for the topologically close information object repository.
- the Web server then returns a URL which contains the address of the topologically close information object repository to the client.
- the Web server that received the request from the client contacts a Web router to obtain an address of a redirecting Web router that will service the request. After obtaining this address, the Web server returns a URL which contains the address of the redirecting Web router to the client. The client subsequently contacts the redirecting Web router at the address contained in the URL with the request for the information object. The redirecting Web router then redirects the client (e.g., via an http redirect) to a topologically close information object repository which will service the request for the information object.
- the Web server which received the request form the client returns a statically configured domain name of a redirector DNS server.
- the redirector DNS server resolves this domain name to produce a resolved domain name, which is provided to a Web router.
- the Web router returns an address of a topologically close information object repository for the client, and the redirector DNS server then provides the address of the topologically close information object repository to the client
- the Web server which received the request from the client provides a URL containing a statically configured domain name, and a local DNS server then gives the statically configured domain name to a Web router.
- the Web router provides an address of a topologically close information object repository, which the DNS server, then provides to the client.
- the direct cache selection process may be used for information objects that will be immediately loaded without user action, while any of the redirect cache selection process, the remote DNS cache selection process and/or the local DNS cache selection process may be used for information objects that will be loaded only after some user action.
- FIG. 1 illustrates a conventional internetwork, such as the Internet
- FIG. 2 illustrates a network having a virtual topology of Web routers configured in accordance with an embodiment of the present invention
- FIG. 3A is a flow diagram of the direct cache selection mechanism according to one embodiment of the present invention.
- FIG. 3B is a flowchart of the direct cache selection mechanism as performed by a Web server according to one embodiment of the present invention.
- FIG. 3C is a flowchart of the direct cache selection mechanism as performed by a Web router according to one embodiment of the present invention.
- FIG. 4A is a flow diagram of the redirect cache selection mechanism according to one embodiment of the present invention.
- FIG. 4B is a flowchart of the redirect cache selection mechanism as performed by a Web server according to one embodiment of the present invention.
- FIG. 4C is a flowchart of the redirect cache selection mechanism as performed by a web router according to one embodiment of the present invention.
- FIG. 4D is a flowchart of the redirect cache selection mechanism as performed by a redirector Web router according to one embodiment of the present invention.
- FIG. 5A is a flow diagram of the remote DNS cache selection mechanism according to one embodiment of the present invention.
- FIG. 5B is a flowchart of the remote DNS cache selection mechanism as performed by a redirector DNS server according to one embodiment of the present invention
- FIG. 5C is a flowchart of the remote DNS cache selection mechanism as performed by a Web router according to one embodiment of the present invention.
- FIG. 6A is a flow diagram of the local DNS cache selection mechanism according to one embodiment of the present invention.
- FIG. 6B is a flowchart of the local DNS cache selection mechanism as performed by a proxy DNS server according to one embodiment of the present invention.
- FIG. 6C is a flowchart of the local DNS cache selection mechanism as performed by a Web router according to one embodiment of the present invention.
- FIG. 7 illustrates one example of the interconnection of Web routers and cache servers with each other and a farm of redirectors using conventional IP routers in accordance with one embodiment of the present invention.
- mappings between addresses of clients seeking information objects i.e., content
- addresses of information object repositories i.e., caches, proxies, origin content servers and the like
- the information objects and/or information object repositories storing the information objects may be distributed over one or more computer networks or networks of networks.
- a collection of one or multiple “Web routers” is used to refer a request for an object to a Web cache or content server (or other information object repository) that is able to transfer the requested object to the target client while satisfying a given set of performance metrics. Note, this referral may be made without regard as to whether the designated information object repository actually includes the requested information object(s).
- the term Web router is used to refer to an embodiment (which may be implemented in hardware and/or software to be executed by a computer system) of a computer system configured in accordance with the methods (described below) needed to map the address of a client with the address of a Web cache that can deliver requested information objects optimally to the client.
- the performance metrics used by Web routers to choose the sites (Web cache or content server) that should provide the requested objects to the clients can include network delays, available bandwidth, reliability of paths from the chosen sites to the target clients, and loads on the Web caches and content servers.
- the method used to select the best site from which information objects should be retrieved is transparent to the clients, and the computer network or internetwork over which the system operates need not support multicast delivery to end-user sites.
- a Web router may be co-located with a Web server, a Web cache, a hosting server, a DNS server or an original content server.
- a topology of Web routers is defined such that a given Web router has as its neighbor Web routers a subset of all the Web routers in the system.
- a Web router communicates directly with its neighbor Web routers, and, preferably, not with other Web routers.
- a Web router is contacted according to a scheme for enabling the discovery of the caches and servers storing information objects distributed over computer networks, which can be implemented in hardware and/or software, by a client, a Web server, a Web cache, or another type of server with a request for the address of one or more Web caches that a client should contact to obtain an information object. Further descriptions of these various schemes are presented below.
- a complete description of a Web router is included in co-pending U.S. patent application 09/______, entitled “System and Method for Discovering Information Objects and Information Object Repositories in Computer Networks”, filed Mar. 15, 2001, the complete disclosure of which is incorporated by reference herein.
- the present invention approaches the challenge of providing an efficient, scalable, server-directed Web content delivery system from a network layer perspective. Further, the present invention provides efficiency and scalability at least as good as that of the underlying infrastructure technologies.
- the present invention includes routing technologies that may be used to leverage the underlying network routing to provide optimal selection of cache sites and content distribution paths, for example through the use of transport-layer protocols which may be used to make the most efficient use of network resources for content delivery. These protocols may also include signaling and congestion avoidance mechanisms which may be used to further optimize the use of network resources to levels of effectiveness and efficiency beyond that typically provided by underlying infrastructure services.
- FIG. 1 illustrates an internetwork 100 .
- the methods and systems described herein, which can be implemented in software and/or hardware, enable the discovery of either information objects or the caches and servers storing information objects distributed over computer networks such as the internetwork 100 shown in this illustration.
- One example of an internetwork 100 is the Internet.
- Other examples include enterprise networks, local area networks, wide area networks, metropolitan area networks and networks of such networks.
- clients 105 will generally access content located at remote servers 150 through a series of networks operated by different providers.
- clients 105 may have accounts with local Internet service providers (ISPs) 110 that enable the clients to connect to the Internet using conventional dial-up or one of a variety of high-speed connections (e.g., DSL connections, cable connections, hybrids involving satellite and dial-up connections, etc.).
- ISPs 110 may provide direct connections to the Internet or, as shown, may rely on other service providers 120 , 130 , 140 , to provide connections through to a set of high-speed connections between computer resources known as a backbone 150 .
- Connecting to a host e.g., server 150
- one component of the present invention involves minimizing the latency of cache hits. Concretely this translates into minimizing the topological distance between the Web client and the cache server.
- two mechanisms are defined in the architecture of the present invention for this purpose:
- the present invention attempts to allow the Web client to begin downloading content from a cache server offering the lowest latency.
- FIG. 2 illustrates a virtual network 200 of Web routers 202 - 216 defined on top of the physical topology of an internetwork, such as the Internet, consisting of routers interconnected via point-to-point links or networks.
- the virtual network 200 of Web routers includes point-topoint links configured between the Web routers 202 - 216 , and the links configured between a Web router (e.g., Web router 202 ) and one or more Web caches (e.g., Web cache 218 ) and content servers (e.g., content server 220 ).
- Such links can be implemented using tunnels between Web routers and between Web routers and Web caches.
- the term content server is meant to indicate a server that serves as the origination point for a piece of content (e.g., text, video, audio, etc.). Such content may subsequently be replicated at one or more Web caches. As shown in the figure, a client 105 is not necessarily part of the virtual network of Web routers.
- a Web router is one embodiment of the methods described herein for discovering information objects and object repositories in computer networks.
- the functionality of a Web router can be implemented as part of a Web cache, as part of a router, or as a separate entity. To simplify its description, the Web router is described and treated herein as a separate entity from a Web cache or a router.
- a Web router may be co-located with a Web server, a Web cache, or an original content server.
- a Web router may be implemented in software to be executed by a general-purpose (or special purpose) computer processor, or it may be implemented as part of the software of a router or Web cache. In another embodiment of the present invention, some or all of the Web router functionality may be implemented in hardware.
- a collection of one or multiple Web routers is used to refer the request for an object to a Web cache or the content server that is able to transfer the requested object to the target client while satisfying a given set of performance metrics.
- the performance metrics used by Web routers to pick the sites (Web cache or content server) that should provide the requested objects to the clients are called type-of-service (TOS) parameters and include, but are not limited to, network delays, bandwidth available, reliability of paths from the chosen sites to the target clients, and loads on the Web caches and content servers.
- the value of the TOS parameters of the path from a server or Web cache to a client is called the TOS distance of such a server or Web cache to the client.
- the technique used to select the best site from which information objects should be retrieved by user sites (clients) is transparent to the user sites, and the computer network or internetwork over which the system operates need not support multicast delivery to end-user sites.
- a topology of Web routers is defined, such that a given Web router has as its neighbor Web routers a subset of all the Web routers in the system (where the term system refers to all or a portion of the virtual network for Web routers discussed above).
- a Web router may thus be configured with its set of neighbor Web routers. Such a configuration may be a table of neighbor Web routers which is defined by a network service provider and/or is dynamically updated.
- a Web router dynamically selects the set of neighbor Web routers with which it should communicate out of all of the Web routers in the system.
- a Web router preferably communicates with its neighbor Web routers only and uses the Web Information Locator by Distance (WILD) protocol for this purpose.
- WILD Web Information Locator by Distance
- WILD runs on top of the Transmission Control Protocol (TCP) in much the same way as the Border Gateway Protocol (BGP) does.
- TCP Transmission Control Protocol
- BGP Border Gateway Protocol
- a TCP connection exists between a Web router and each of its neighbor Web routers.
- WILD can run on top of the TCP Santa Cruz protocol [C. Parsa and J. J. Garcia-Luna-Aceves, “TCP-Santa Cruz: Improving TCP Performance over Networks with Heterogeneous Transmission Media”, Proc. IEEE ICNP 99], which is disclosed in commonly-owned U.S. Provisional Application No. 60/190,332, filed on Mar. 16, 2000, now U.S. Patent Application No. 09/______, filed Mar. 15, 2001.
- Other embodiments of the present invention may be based on alternative protocols for the provision of reliable transmissions between Web routers.
- a client first contacts a Web server requesting a Web page in which a set of information objects are referenced by their URLs.
- the Web server may contact a Web router to determine the sites (e.g., one or more Web cache(s) or an original content server, any of which may be referred to generically as an information object repository) from which each of such information objects should be retrieved.
- sites e.g., one or more Web cache(s) or an original content server, any of which may be referred to generically as an information object repository
- a Web router can be contacted by a client, a Web cache, a content server, or another type of server (e.g., Web server 222 or 224 ), asking for the address of a Web cache, set of Web caches, or content server that a client should contact for the purposes of retrieving information objects.
- the Web server provides the Web router with the address of the client requesting the set of object, a URL for each information object requested by the client, and a set of TOS parameter values with which the request should be serviced to the client.
- the absence of TOS parameters can be assumed to imply a minimum-delay service request.
- Those Web routers that are used to redirect clients to appropriate Web caches or content servers are implemented in a very fault-tolerant manner and are well known throughput the system. Accordingly, in one embodiment, not all Web routers in a system are used for client redirection in order to reduce the cost of Web routers and the communication overhead associated with knowing about the existence of Web routers that are capable of redirecting clients to Web caches and content servers.
- a network may include a set of redirecting Web routers.
- the set of redirecting Web routers should be known by all the Web routers of the system, while a Web router that does not serve as a redirecting Web router need not be known by all other Web routers of the system.
- Web routers may execute WILD (or another protocol) to map the address of a client into: (a) one or more addresses of Web caches or the content server that has the best TOS distance to the client address, and (b) one or more addresses of redirecting Web routers that have the best TOS distance to the client address.
- this mapping is done independently or regardless of whether the Web cache or content server maintains a local copy of any of the information objects required by the client (the idea being that the content can be brought to the cache after the client has been advised of the “best” or “preferred” cache to connect to).
- Web routers may use WILD or a non-WILD protocol to accomplish the above mappings.
- Web routers may use a static, fixed mapping of the address of a client into: (a) one or more addresses of Web caches or the content server that has the best TOS distance to the client address, and (b) one or more addresses of redirecting Web routers that have the best TOS distance to the client address.
- static, fixed mappings may be input by a user or a network service provider and may or may not be updated periodically.
- the static, fixed mappings may be generated by WILD or by an algorithm other than WILD. In either case, the static, fixed mappings may be generated independently of whether the Web cache or content server maintains a local copy of any of the information objects required by the client.
- the Internet routers of the system provide Web routers with distances to known destination addresses measured according to a number of network performance parameters.
- a Web router collocated with a Web cache or content server uses the information obtained from adjacent routers and the performance measurements of the Web cache or content server to derive the TOS distance from the collocated Web cache or content server to each known destination, which corresponds to potential client addresses.
- Web routers use routing information provided by the Border Gateway Protocol (BGP) and any of the intra-domain routing protocols (e.g., OSPF, EIGRP) running in the routers attached to the same local area networks where the Web routers reside to derive distances to client address ranges (e.g., using a shortest-path first calculation).
- Border Gateway Protocol BGP
- any of the intra-domain routing protocols e.g., OSPF, EIGRP
- a Web router maps the address of the client requiring the location of information objects to addresses of Web caches or other information object repositories that do not currently store such objects, the Web router can request the corresponding Web caches to obtain a copy of the required objects immediately after it provides the requesting Web server the address of such a Web cache or proxy.
- a Web cache or proxy attempts to retrieve a requested object from another Web cache or a content server only after it is contacted by a client and determines that a copy of the requested information object is not available locally.
- the Web router provides the Web cache servicing a client request with the address of the “nearest” Web cache that stores the information object requested by the client; therefore, the Web cache needing the information object communicates directly with the Web cache storing the requested information object, without having to go through any intermediate Web caches and without having to know the content stored in all other Web caches as is customary in the prior art.
- the Web router is responsible for determining which of a number of available information object repositories should service a client (i.e., a client or a Web server request for an information object or service).
- the Web router also determines the information object repository which actually maintains the information object or service so requested, and initiates the process of bringing the information object or service to the information object repository that should service the client.
- Bringing the information object or service requested by the client to the information object repository which it has been determined should service the client request is accomplished, in one embodiment, by instructing that information object repository which will service the request to retrieve the information object or service requested by the client from the information object repository which actually maintains the information object or service.
- the information object repository which it has been determined should service the client request contacts the information object repository that actually maintains the information object or service requested by the client directly to request the information object or service.
- one of the following four mechanisms is or may be used to communicate the best Web cache or content server, or the set of Web caches (more generally the information object repository(ies)), which should serve a client's request:
- FIG. 3A is a flow diagram of the direct cache selection mechanism according to one embodiment of the present invention. Numbers in brackets adjacent to the flow lines indicate the series of requests and responses communicated between network nodes.
- a Web server 302 contacts a nearby Web router 304 to obtain the address of the closest cache server to the requesting client. The Web server 302 then returns a URL to the client 300 , where the returned URL contains the IP address of the selected cache server 306 .
- the cache server 306 may be associated with the same Web router 302 or with another Web router 308 . As shown, the various network nodes may be distributed across multiple different networks maintained by various services providers.
- the direct cache selection mechanism has the following advantages:
- FIG. 3B is a flowchart of the direct cache selection mechanism as performed by the web server according to one embodiment of the present invention.
- Process 310 begins with step 312 , where the Web server 302 receives a request from the client 300 for content. In response to this request, in step 314 , the Web server 302 sends the IP address of the client 300 to a Web router 304 . Optionally, in step 316 , a timer is reset. In decision operation 318 , it is determined whether the Web server 302 has received the IP address of the best cache server from the Web router 304 .
- the Web server 302 If the Web server 302 has received the IP address of the best cache server from the Web router 304 , then in step 320 , the Web server 302 sends a URL with the IP address of the best cache server (cache server 306 in this example) to the client 300 , and the process resets, waiting for the next request. If the Web server 302 has not received the IP address of the best cache server from the Web router 304 , in decision operation 322 , it is determined whether the timer has expired. This loop repeats until either the timer expires or the address is returned from Web Router 304 .
- the Web server would redirect the client to a default cache server ( s tep 324 ), and the process would reset, waiting for the next request.
- the default cache server may be hard configured by a network provider and/or may be dynamically updated from time to time.
- FIG. 3C is a flowchart of the direct cache selection mechanism as performed by the Web router 304 according to one embodiment of the present invention.
- Process 330 begins at step 332 , where the Web router 304 receives the IP address of the client 300 .
- the Web router 304 consults its WILD table for the eP address of the best cache server.
- the Web r outer 304 send s the IP address of the best cache server (cache server 306 in this example) to the Web server 302 .
- the method illustrated by process 330 is straightforward and can be implemented in hardware using approaches similar to those that have been reported in the prior art for hardware-based lookup of routing tables for IP packets. Alternatively, it can be implemented in software to be executed by a generalpurpose (or special purpose) processor.
- FIG. 4A is a flow diagram of the redirect cache selection mechanism according to one embodiment of the present invention.
- the Web server 402 returns a URL with the IP address of a special kind of Web router called a redirector.
- the redirector 410 redirects the client 400 to one of the current best cache servers (cache server 406 in this example) via an HTTP redirection. Redirectors differ from other Web routers in their scalability and fault tolerance. As shown in the illustration, the redirector selection can also be informed by a Web router. In order to allow for the selection of the best redirector, Web routers should use the WILD protocol for a second routing computation for redirectors.
- the redirect cache selection mechanism has the following advantages:
- FIG. 4B is a flowchart of the redirect cache selection mechanism as performed by the Web server 402 according to one embodiment of the present invention.
- Process 420 begins with step 422 , where the Web server 402 receives a request from the client 400 for content. In response to this request, in step 424 , the Web server 402 sends the EP address of the client 400 to a Web router 404 . In optional step 426 , a timer is reset. In decision operation 428 , it is determined whether the Web server 402 has received the IP address of a redirector Web router from the Web router 404 .
- the Web server 402 If the Web server 402 has received the IP address of a redirector Web router, in step 428 , the Web server 402 sends a redirect with the IP address of the redirector Web router ( 410 in this example) to the client 400 , and the process resets to await a new request. If the Web server 402 has not received the IP address of the redirector Web router, then in decision operation 432 , it is determined whether the timer has expired (if used). This loop is executed until the timer expires or the IP address of the redirector is returned. If the timer has expired, in step 434 , the Web server 402 sends a redirect with the IP address of a default redirector Web router to the client 400 , and the process resets to await a new request. Alternatively, if the timer has expired, in step 436 , the Web server 402 redirects the client 400 to a default cache server, and the process resets.
- FIG. 4C is a flowchart of the redirect cache selection mechanism as performed by a web router according to one embodiment of the present invention.
- Process 440 begins with step 442 , where the Web router 404 receives the IP address of the client 400 .
- the Web router 404 consults its WILD table for the IP address of a redirector Web router.
- the Web router 404 sends the IP address of the redirector web router ( 410 in this example) to the Web server 402 .
- FIG. 4D is a flowchart of the redirect cache selection mechanism as performed by a redirector Web router according to one embodiment of the present invention.
- Process 450 begins at step 452 , where the redirector Web router 410 receives a request for content from the client 400 .
- the redirector 410 consults its WILD table for the IP address of the best cache server (cache 406 in this example).
- the redirector 410 sends an HTTP redirection to the client 400 with the original URL modified to have the IP address of the selected cache server in the host portion of the URL.
- FIG. 5A is a flow diagram of the remote DNS cache selection mechanism according to one embodiment of the present invention.
- the Web server 502 returns a URL containing a statically configured domain name, such as a proprietary domain of a network service provider.
- a redirector DNS server 510 queries a collocated Web router 512 to determine the closest cache servers (cache server 506 in this example) for the source of the DNS query.
- the redirector DNS server 510 then returns the IP address of theses cache servers to the DNS client 500 .
- the remote DNS cache selection mechanism has the following advantages:
- FIG. 5B is a flowchart of the remote DNS cache selection mechanism as performed by the redirector DNS server 510 according to one embodiment of the present invention.
- Process 520 begins with step 522 , where the redirector DNS server 510 receives a request from a local DNS server associated with client 500 .
- the redirector DNS server 510 sends the IP address of the local DNS server to a Web router 512 .
- a timer is reset.
- decision operation 528 it is determined whether the redirector DNS server 510 has received the IP addresses of the best cache servers from the Web router 512 .
- the redirector DNS server 510 If the redirector DNS server 510 has received the IP addresses of the best cache servers, then in step 530 , the redirector DNS server 510 sends the IP addresses of the best cache servers to the local DNS server, and the process resets. If the redirector DNS server 510 has not received IP addresses of the best cache servers, then in decision operation 532 , it is determined whether the timer has expired. This loop repeats until either the timer expires or the IP addresses of the best cache servers are returned. If the timer has expired, then in step 534 , the redirector DNS server 510 redirects the client 500 to a set of default cache servers, and the process resets.
- FIG. 5C is a flowchart of the remote DNS cache selection mechanism as performed by the Web router 512 according to one embodiment of the present invention.
- Process 540 begins with step 542 , where the Web router 512 receives the IP address of a local DNS server associated with client 500 .
- the Web router 512 consults its WILD table for the IP addresses of the best cache servers.
- the Web router 512 sends the IP addresses of the best cache servers to the redirector DNS server 510 .
- FIG. 6A is a flow diagram of the local DNS cache selection mechanism according to one embodiment of the present invention.
- the Web server 602 returns a URL containing a statically configured domain name within a service provider network.
- a DNS server 610 local to the client 600 , queries a collocated Web router 612 to determine the closest cache servers for the source of the DNS query.
- the local DNS server 610 then returns the IP addresses of these cache servers (cache server 606 in this example) to the Web client 600 .
- the local DNS server 610 and the collocated Web router 612 form a proxy DNS server.
- the local DNS cache selection mechanism has the following advantages:
- FIG. 6B is a flowchart of the local DNS cache selection mechanism as performed by the proxy DNS server 610 according to one embodiment of the present invention.
- Process 620 begins with step 622 , where the proxy DNS server 610 receives a request from a client 600 .
- decision operation 624 it is determined whether the domain name within the DNS request from the client 600 is to be served through a Web router. If the domain name within the DNS request from the client 600 is not to be served through a Web router, in step 626 , the proxy DNS server 610 forwards the DNS request to a local DNS server, and the process resets.
- the proxy DNS server 610 sends the IP address of the client 600 to a Web router 612 .
- a timer is reset.
- decision operation 632 it is determined whether the proxy DNS server 610 has received the IP addresses of the best cache servers from the Web router 612 . If the proxy DNS server 610 has received the IP addresses of the best cache servers, the in step 634 , the proxy DNS server 610 sends the IP addresses of the best cache servers to the client 600 , and the process resets. If the proxy DNS server 610 has not received the IP addresses of the best cache servers, then in decision operation 636 , it is determined whether the timer has expired. This loop repeats until the timer expires or the IP addresses are received. If the timer has expired, then in step 638 , the proxy DNS server 610 redirects the client 600 to a set of default cache servers, and the process resents.
- FIG. 6C is a flowchart of the local DNS cache selection mechanism as performed by the Web router according to one embodiment of the present invention.
- Process 640 begins with step 642 , where the Web router 612 receives the IP address of a client 600 .
- the Web router 612 consults a WILD table for the IP addresses of the best cache servers.
- the Web router 612 sends the IP addresses of the best cache servers (cache server 606 in this example) to the proxy DNS server 610 .
- the four aforementioned communication mechanisms are used in conjunction with each other, in various combinations.
- these four communication mechanisms are:
- the direct cache selection mechanism and (2) the redirect cache selection mechanism are both used in a communication setting.
- the direct cache selection mechanism (1) may be used for content that will be immediately loaded without user action (e.g., for graphics used as part of the decoration of a web page), and the redirect cache selection mechanism (2) may be used for content only loaded in response to user action (e.g., HTIM HREF tags which the user must click on to cause content to be loaded).
- the direct cache selection mechanism and (3) the remote DNS cache selection mechanism are both used in a communication setting.
- the direct cache selection mechanism (1) may be used for content that will be immediately loaded without user action (e.g., for graphics used as part of the decoration of a web page), and the remote DNS cache selection mechanism (3) may be used for content only loaded in response to user action (e.g., HTML REF tags which the user must click on to cause content to be loaded).
- the direct cache selection mechanism and (4) the client DNS cache selection mechanism are both used in a communication setting.
- the direct cache selection mechanism (1) may be used for content that will be immediately loaded without user action (e.g., for graphics used as part of the decoration of a web page), and the client DNS cache selection mechanism (4) may be used for content only loaded in response to user action (e.g., HTML HREF tags which the user must click on to cause content to be loaded).
- (1) the direct cache selection mechanism, (3) the remote DNS cache selection mechanism, and (4) the client DNS cache selection are all used in a communication setting.
- (2) the redirect cache selection mechanism and (3) the remote DNS cache selection mechanism are both used in a communication setting.
- (2) the redirect cache selection mechanism, (3) the remote DNS cache selection mechanism, and (4) the client DNS cache selection mechanism are all used in a commnunication setting.
- the cache servers constantly (or periodically) monitor and adjust existing connections. In the event performance on an existing connection appreciably degrades, the cache servers may begin a process of searching for other cache servers with significantly better paths to the client. If such a server is found the download is transferred to the new cache, and the process is repeated.
- Another embodiment may include a dynamic redirector selection at the Web server.
- another component of the present invention includes a set of technologies that minimize the latency of cache misses.
- the selected cache server locates the closest cache server with a copy of the desired content and downloads the content from that server as fast and efficiently as possible. As explained above, this may be performed in parallel with the requesting client being informed of the IP address of the cache server which is obtaining the content.
- the present invention includes pairs of Web routers 702 and cache servers 704 interconnected with each other and a farm of redirectors 700 by conventional IP routers 706 .
- this component of the present invention exploits the IP routing infrastructure to provide, in effect, routing of URLs.
- network-layer URL (NURL) routing involves mapping requested URLs to unicast addresses which are then used as an anycast IP address (i.e. a unicast address advertised by multiple, physically distinct points in an internet) [Craig Partridge, Trevor Mendez, and Walter Milliken. Host anycasting service. RFC 1546, November 1993].
- URLs uniform resource locators
- URLs having the following format:
- the present invention resolves the anycast address to the server's real unicast address (which, by definition, uniquely identifies that server in the internet) before starting the download. In an exemplary embodiment, this is done by using an anycast address resolution protocol (AARP), which is disclosed in co-pending and commonlyowned U.S. Provisional Application No. 60/200,403, filed Apr. 28, 2000, which is incorporated herein by reference.
- AARP anycast address resolution protocol
- the present invention provides a system and method for using a mapping between client addresses and addresses of caches to support content delivery.
- the present invention is part of a method and system for the discovery of information objects and servers storing information objects distributed over computer networks.
Abstract
Description
- The present application is related to and herby claims the priority benefit of the following co-pending applications, each of which is incorporated by reference herein:
-
- (a) U.S. Provisional Patent Application No. 60/200,404, entitled “System and Method for Using a Mapping Between Client Addresses and Addresses of Caches to Support Content Delivery”, filed Apr. 28, 2000.
- (b) U.S. Provisional Patent Application No. 60/200,401, entitled “System and Method for Discovering Optimum Information Object Repositories in Computer Networks (WILD Protocol)”, filed Apr. 28, 2000.
- (c) U.S. Provisional Patent Application No. 60/200,511, entitled “System and Method for Using URLs to Map Application Layer Content Names to Network Layer Anycast Addresses”, filed Apr. 28, 2000.
- (d) U.S. Provisional Patent Application No. 60/200,402, entitled “System and Method for Using Network Layer URL Routing to Locate the Closest Server Carrying Specific Content (NURL Routing)”, filed Apr. 28, 2000.
- (e) U.S. Provisional Application No. 60/200,403, entitled “System and Method for Resolving Network Layer Anycast Addresses to Network Layer Unicast Addresses (AARP)”, filed Apr. 28, 2000.
- This application is also a Continuation-in-Part of U.S. Patent Application 09/______, entitled “System and Method for Discovering Information Objects and Information Object Repositories in Computer Networks”, filed Mar. 15, 2001.
- The present invention relates to a system and method for the discovery of information objects and servers storing information objects distributed over computer networks. More particularly, the present invention provides a system and method for using a mapping between client addresses and addresses of caches to support content delivery.
- An internetwork is a collection of computer networks interconnected by nodes, each such node may be a general-purpose computer or a specialized device, such as a router. As such, an internetwork is often called a network of networks. The purpose of building an internetwork is to provide information services to end nodes; each end node may be a general-purpose computer or a specialized device, such as a camera or a display. The Internet is an internetwork in which information is organized into packets to be distributed on a store-and forward manner from source to destination end nodes, and in which routers and end nodes use the Internet Protocol (IP) to communicate such packets.
- The World Wide Web (also known as WWW or Web) has become an essential information service in the Internet. The Web constitutes a system for accessing linked information objects stored in end nodes (host computers) all over the Internet. Berners-Lee wrote the original proposal for a Web of linked information objects (T. Berners-Lee, “Information Management: A Proposal,” CERN Document, March 1989). The Web consists of a vast collection of information objects organized as pages, and each page may contain links to other pages or, more generally, information objects with which content is rendered as audio, video, images, text or data. Pages are viewed by an end user with a program called a browser (e.g., Netscape Navigator). The Web browser runs in an end system at the user premises. The client (Web browser) obtains the required information objects from a server (Web server) using a request-response dialogue as part of the Hypertext Transfer Protocol (HTTP). Information objects are identified by means of names that are unique throughout the Internet; these names are called Uniform Resource Locators or URLs. A URL consists of three components: the protocol or scheme to be used for accessing the object (e.g., http), the name (a DNS name) of the host on which the object is located, and a local identifier that is unique in the specified host.
- Like any large-scale system, the Web requires the use of mechanisms for scaling and reliability. More specifically, as the number of information objects that can be obtained through the Web increases, people find it more difficult to locate the specific information objects they need. Furthermore, as the number of Web users and servers increase, the sites or servers that store the requested information objects may be very far from the users requesting the objects, which leads to long latencies in the access and delivery of information, or the servers storing the information objects may be overwhelmed with the number of requests for popular information objects.
- It was clear soon after the birth of the Web that the simple client-server architecture underlying the Web protocols would not scale to the number of clients and servers and volume of traffic the popularity of the Web would be demanding very soon. To address this impending crisis research efforts were started, that continue today, to develop solutions to this scaling problem based on the cache model used in other areas of computer science. In general, the results of these efforts have taken the form of caching proxy servers that intercept Web requests destined for Web servers in the Internet, and attempt to service these requests from a cache of objects retrieved for previous requests. In the event of a cache miss the origin server is contacted, the content loaded to the cache, and the client's request is then satisfied. As with all cache-based systems the goal of these solutions is to replace many expensive, slow data fetches with one expensive, slow fetch and many fast, cheap ones. As will be reviewed below, this effort, while regularly facing new challenges and dilemmas, has generally made steady progress towards providing a solution to the problem of the access and delivery of Web content that can scale to the global reach now envisioned for the Web.
- To enable the Web to scale to support large and rapidly increasing numbers of users and a vast and growing collection of information objects, the information objects in the Web must be stored distributedly at multiple servers, in a way that users can retrieve the information objects they need quickly and without overwhelming any one of the servers storing the objects. Accordingly, distributing information objects among multiple sites is necessary for the Web to scale and be reliable. The schemes used to accomplish this are called Web caching schemes. In a Web caching scheme, one or multiple Web caches or proxy Web servers (information object repositories, which term can also encompass origin content servers) are used in computer networks and the Internet to permit multiple host computers (clients) to access a set of information objects from sites other than the sites from which the content (information objects or just objects) are provided originally. Web caching schemes support discovering the sites where information objects are stored, distributing information objects among the Web caches, and retrieving information objects from a given Web cache. The many proposals and implementations to date differ on the specific mechanisms used to support each of these services.
- Reflecting the growing importance of the Web as an infrastructure technology, a Web caching industry has appeared and prospered in recent years. Initially the products of this industry were caching proxy servers for use by organizations connected to the Internet that wanted to both reduce the utilization of their expensive ISP services, and to improve the Web browsing experiences of their users. More recently, however, a new segment of this industry has evolved that serves the needs of the Web server providers. These services, typically called Web content delivery services, involve the hosting of Web content for a fee. These services allow Web server providers to deploy content whose popularity attracts larger audiences than can be supported by their existing Web server infrastructure without having to perform the expensive upgrades to their server and network infrastructure that would otherwise be required. This has proven to be a lucrative segment of the Web caching industry and has changed a number of fundamental assumptions made by previous research in developing Web caching solutions.
- The traditional approach to Web caching, called client-directed Web caching here, has made the fundamental assumption that Web caching was done by, and for the benefit of Web users. As a result, the designs of Web caching solutions developed to date have been based on a number of concrete assumptions, such as the following:
-
- (1) the cache server used by a client is configured statically or quasi-statically;
- (2) the caching infrastructure is owned and deployed by many organizations and therefore must inter-operate over the open Internet; and
- (3) the number of URLs served is unknown.
- In contrast, the assumptions that can be made by these new Web caching services, called server-directed Web caching here, are significantly less restrictive, such as the following:
-
- (1) the cache used by a client is determined dynamically;
- (2) the caching infrastructure is owned and deployed by one entity, and can have non-standard components; and
- (3) the number of URLs served is known.
- It seems clear that these new assumptions provide significant new latitude in the design of a Web caching service that may allow for significantly more efficient solutions than those developed based on the more restrictive assumptions underlying the previous client-directed solutions.
- Web caching proxies intercept Web requests destined for Web servers in the Internet (thus the name “proxy”), and attempt to service these requests from a cache of objects retrieved for previous requests (thus the name “caching”). In the event of a cache miss the origin server is contacted, the content loaded to the cache, and the client's request is then satisfied. These early efforts involved stand-alone caches (Ari Luotonen, Henrik Frystyk Nielsen, and Tim Berbers-Lee. Cern httpd. http://www/w3/org/Daemon, July 1996), whose only source of content on a cache miss was the original content server. While somewhat effective at lightening the load on Web servers and the network infrastructure, it quickly became clear that standalone caches presented a new dilemma: while the hit rate experienced by a cache improves as the number of clients using the cache grows, so does the cache server's load. The effectiveness of web caches at reducing server and network load was limited by the compute and I/O power of the cache servers. While the power of these servers was growing, it was not growing as fast as the volume of Web traffic. Therefore it was clear that, while standalone Web caches might delay the day of reckoning, they would not be able to eliminate it.
- On realizing this in the 1995-96 time-frame, researchers began working on solutions to allow multiple Web caches to cooperate in servicing a larger set of clients. It was hoped that the ability to support a large and scalable set of clients would provide a long-term solution to Web server and network overload.
- Many methods exist in the prior art for determining the server, cache, mirror server, or proxy from which information objects should be retrieved. The prior art dates to the development of the ARPANET in the 1970s and the study and implementation of methods to solve the file allocation problem (FAP) for databases distributed over the ARPANET and computer networks in general.
- File allocation methods for distributed databases (e.g., W. W. Chu, “Optimal File Allocation in a Multiple Computer System,” IEEE Transactions on Computers, October 1969; S. Mahmoud and J. S. Riordon, “Optimal Allocation of Resources in Distributed Information Networks,” ACM Transactions on Data Base Systems, Vol. 1, No. 1, March 1976; H. L. Morgan and K. D. Levin, “Optimal Program and Data Locations in Computer Networks,” Communications of the ACM, Vol. 20, No. 5, May 1977) and directory systems (e.g., W. W. Chu, “Performance of File Directory Systems for Data Bases in Star and Distributed Networks,” Proc. National Computer Conference, 1976, pp. 577-587; D. Small and W. W. Chu, “A Distributed Data Base Architecture for Data Processing in a Dynamic Environment,” Proc. COMPCON 79 Spring) constitute some of the earliest embodiments of methods used to select a delivery site for accessing a file or information object that can be replicated at a number of sites.
- Another example of this prior art is the method described by Chiu, Raghavendra and Ng (G. Chiu, C. S. Rahgavendra, and S. M. Ng, “Resource Allocation with Load Balancing Consideration in Distributed Computing Systems,” Proc. IEEE INFOCOM 89, Ottawa, Ontario, Canada, April 1989, pp. 758-765). According to this method, several identical copies of the same resource (e.g., a file, an information object) are allocated over a number of processing sites (e.g., a mirror server, a cache) of a distributed computing system. The method attempts to minimize the cost incurred in replicating the resource at the processing sites and retrieving the resource by users of the system from the processing sites.
- Several different approaches exist in the prior art for discovering information objects in Web caching schemes. Recent work has addressed the same resource allocation and discovery problems within the context of Internet services. Guyton and Schwartz (J. D. Guyton and M. F. Schwartz, “Locating Nearby Copies of Replicated Internet Servers,” Technical Report CU-CS-76295, Department of Computer Science, University of Colorado-Boulder, February 1995; Proc. ACM SIGCOMM 95 Conference, Cambridge, Mass., August 1995, pp. 288-298) describe and analyze server location techniques for replicated Internet services, such as Network Time Protocol (NTP) servers and Web caches. Guyton and Schwartz propose gathering location data with router support in two ways. In one method, routers advertise the existence or absence of replicated servers as part of their normal routing exchanges involving network topological information. Routers examine a distance metric for the advertised servers in a way that each router retains knowledge of at least the nearest servers. In this way, each router in an intemetwork has enough knowledge to direct client requests to the nearest servers, without necessarily having to maintain knowledge of all the servers in the intemetwork. In another method, servers poll routers for the content of their routing tables. Guyton and Schwartz also describe a method for gathering location data using routing probes without router support by means of measurement servers. According to this method, measurement servers explore the routes to the replicated servers providing services and content to clients. When a client asks a measurement server for a list of nearby servers from which to request a service, the measurement server takes into account the route back to the client in deciding the list of servers that appear closer to the client.
- One approach to object discovery consists in organizing Web caches hierarchically. In a hierarchical Web cache architecture, a parent-child relationship is established among caches; each cache in the hierarchy is shared by a group of clients or a set of children caches. A request for an information object from a client is processed at a lowest-level cache, which either has a copy of the requested object, or asks each of its siblings in the hierarchy for the object and forwards the request to its parent cache if no sibling has a copy of the object. The process continues up the hierarchy, until a copy of the object is located at a cache or the root of the hierarchy is reached, which consists of the servers with the original copy of the object.
- One of the earliest examples of hierarchical Web caching was the Discover system (A. Duda and M. A. Sheldon, “Content Routing in Networks of WAIS Servers, Proc. IEEE 14 th International Conference on Distributed Computing Systems,” June 1994; M. A. Sheldon, A. Duda, R. Weiss, J. W. O'Toole, Jr., and D. K. Gifford, “A Content Routing System for Distributed Information Servers,” Proc. Fourth International Conference on Extending Database Technology, March 1994), which provides associative access to servers; the user guides the refinement of requests.
- Harvest (A. Chankhunthod, P. Danzing, C. Neerdaels, M. Schwartz, and K. Worrell, “A Hierarchical Internet Object Cache,” Proc. USENIX Technical Conference 96, San Diego, Calif., January 1996) and Squid (D. Wessels, “Squid Internet Object Cache,” http:// www.squid.org, August 1998) are two of the best known hierarchical Web cache architectures. Harvest and Squid configure Web caches into a static hierarchical structure in which a Web cache has a static set of siblings and a parent. The Internet Caching Protocol or ICP (D. Wessels and K. Claffy, “Internet Cache Protocol (ICP),
Version 2,” RFC 2186, September 1997) is used among Web caches to request information objects. - In the Harvest hierarchies, siblings and parents are configured manually in Web caches or proxies; this is very limiting and error prone, because reconfiguration must occur when a cache enters or leaves the system. A more general limitation of hierarchical Web caching based on static hierarchies is that the delays incurred in routing requests for information objects can become excessive in a large-scale system, and the latency of retrieving the information object from the cache with a copy of the object can be long, because there is no correlation between the routing of the request to a given cache in the hierarchy and the network delay from that cache to the requesting client. Furthermore, some Web caches may be overloaded with requests while others may be underutilized, even if they store the same objects.
- In the WebWave protocol (A. Heddaya and S. Mirdad, “WebWave: Globally Load Balanced Fully Distributed Caching of Hot Published Documents,” Technical Report BU-CS-96024, Boston University, Computer Science Department, October 1996; A. Heddaya and S. Mirdad, “WebWave: Globally Load Balanced Fully Distributed Caching of Hot Published Documents,” Proc. IEEE 17 th International Conference on Distributed Computing Systems, Baltimore, Md., May 1997) Web caches are organized as a tree rooted at the server that provides the original copy of one object or a family of information objects; the leaves of the tree are the clients requesting the information objects, and the rest of the nodes in the tree are Web caches. The objective of the protocol is to achieve load balancing among Web caches; each Web cache in such a tree maintains a measurement of the load at its parent and children in the tree, and services or forwards the request to its parent automatically based on the load information. This approach reduces the possibility of overloading Web caches as in the Harvest approach to hierarchical Web caching; however, delays are still incurred in the propagation of Requests from heavily loaded Web caches to their ancestors in the Web hierarchy.
- Hash routing protocols (K. W. Ross, “Hash Routing for Collections of Shared Web Caches,” IEEE Network, Vol. 11, No. 6, November 1997, pp 37-44) constitute another approach to support object discovery in shared caches. Hash routing protocols are based on a deterministic hashing approach for mapping an information object to a unique cache (D. G. Thaler and C. V. Ravishankar, “Using Name-Based Mappings To Increase Hit,” IEEEACM Trans. Networking, 1998; V. Valloppillil and J. Cohen,“Hierarchical HTTP Routing Protocol,” Internet Draft, http//:www.nlanr.net/Cache/ICP/draft-vinod-icp-traffic-dist-00.txt) to distribute the information objects (universal resource locator or URL in the case of the Web) among a number of caches; the end result is the creation of a single logical cache distributed over many physical caches. An important characteristics of this scheme is that information objects are not replicated among the cache sites. The hash function can be stored at the clients or the cache sites. The hash space is partitioned among the N cache sites. when a client requires access to an information object o, the value of the hash function for o, h(o), is calculated at the client or at a cache site (in the latter case the cache would be configured at the client, for example). The value of h(o) is the address of the cache site to contact in order to access the information object o.
- The Cache Resolver is another recent approach to hierarchical Web caching (D. Karger, E. Lehman, T. Leighton, M. Levine, D. Lewin, and R. Panigrahy, “Consistent Hashing and Random Trees: Distributed Caching Protocols for Relieving Hot Spots on the World Wide Web,” Proc. 29 th ACM Symposium on Theory of Computing (STOC 97), El Paso, Tex., 1997; D. Karger, Sherman, A. Berkheimer, B. Bogstad, R. Dhanidina, K. Iwamoto, B. Kim, L. Matkins, and Y. Yerushalmi, “Web Caching with Consistent Hashing,” Proc. 8 th International World Wide Web Conference, Toronto, Canada, May 1999). This approach combines hierarchical Web caching with hashing and consists of two main tools, random cache trees and consistent hashing. A tree of Web caches is defined for each information object. When a browser (client) requires an information object, it picks a leaf of the tree and submits a request containing its identifier, the identifier of the object, the sequence of caches through which the request is to be routed if needed. A Web cache receiving a request it determines if it has a local copy of the page and responds to the request if it does; otherwise, it forwards the request to the next Web cache in the path included in the request. A Web cache starts maintaining a local copy of an information object when the number of requests it receives for the object reaches a predefined number. A client selects a Web cache by means of consistent hashing, which disseminates requests to leaves of the Web caching hierarchy evenly but, unlike traditional hashing techniques, need not redistribute an updated hash table every time a change occurs in the caching hierarchy (e.g., a new Web cache joins or a Web cache fails). Because caching is difficult to implement or add to existing Web browsers, the Cache Resolver approach implements the hashing in DNS (Internet Domain Name Service) servers modified to fit this purpose. The remaining limitations with this approach stem from the continuing use of a hierarchy of Web caches and the need to implement a hashing function in either Web clients or DNS servers. Routing a request through multiple Web Caches can incur substantial delays for clients to retrieve information objects that are not popular among other clients assigned to the same Web cache by the hashing function. Additional delays, even if small, are incurred at the DNS server that has to provide the address of the Web cache that the client should access. Furthermore, the DNS servers supporting the consistent hashing function must receive information about the loading of all the Web caches in the entire system, or at least a region of the system, in order to make accurate load-balancing decisions.
- This DNS-based approach, without the use of hierarchies of Web caches, is advocated in the Akamai CDN solution (F. T. Leighton and D. M. Lewin, “Global Hosting System,” U.S. Pat. No. 6,108,703, Aug. 22, 2000). The “global hosting system”advocated by Akamai assumes that a content provider services an HTML document in which special URLs specifying a domain name specific to Akamai. When the client needs to obtain the IP address of the Web cache hosting the content specified in the special URL, the client first contacts its local DNS. The local DNS is pointed to a “top-level” DNS server that points the local DNS to a regional DNS server that appears close to the local DNS. The regional DNS server uses a hashing function to resolve the domain name in the special URL into the address of a Web cache (hosting server) in its region, which is referred to as the target Web cache in the present application, in a way that the load among Web caches in the region is balanced. The local DNS passes the address of that Web cache to the client, which in turn sends its request for the information object to that Web cache. If the object resides in the target Web cache, the cache sends the object to the client; otherwise, the object is retrieved from the original content site.
- The global hosting system advocated by Akamai was intended to address problems associated with traditional load-balanced mirroring solutions in which a load balancer or a hierarchy of load balancers redirect requests to one of a few hosting sites to balance the load among such sites. Companies such as Cisco Systems of Santa Clara, Calif., F5 Networks, Inc. of Seattle, Wash., Resonate, Inc. of Sunnyvale, Calif., Nortel Networks of Brampton, Ontario, and Foundry Networks, Inc. of San Jose, Calif. currently provide examples of load-balanced solutions. The limitations of the global hosting system are inherent to the fact that the approach is, in essence, a DNS-based load-balanced mirroring solution. The global hosting system selects a target Web cache based entirely on the region that appears to favor the local DNS, which need not favor the client itself, and balances the load among Web caches without taking into account the latency between the Web caches and the clients. In the case of a cache miss, the information object has to be retrieved from the original content site, which means that latencies in the delivery of content can vary widely, unless the content is mirrored in all the caches of all regions.
- In summary, while these hierarchies and hash-based solutions provide a significant improvement in effectiveness over their stand-alone predecessors, they give rise to the following new dilemma: while increasing cache hit rates, and, thereby increasing the server and network load, these solutions tend to increase the request latency seen by a Web client. Hierarchies increase the average number cache hops needed to reach an object, while hashing is insensitive to the distance between a client and the cache site it selects, which also increases the average number of hops needed to reach an object.
- Another alternative approach to hierarchical web caching and hash routing protocols consists of forwarding client requests for URLs using routing tables that are very similar to the routing tables used today for the routing of IP packets in the Internet (L. Zhang, S. Michel, S. Floyd, and V. Jacobson, “Adaptive Web Caching: Towards a New Global Caching Architecture,” Proc. Third International WWW Caching Workshop, Manchester, England, June 1998, B. S. Michel, K. Nikoloudakis, P. Reiher, and L. Zhang, “URL Forwarding and Compression in Adaptive Web Caching,” Proc. EEE Infocom 2000, Tel Aviv, Israel, April 2000). According to this approach, which is referred to as “URL request forwarding” herein, Web caches maintain a “URL request routing table” and use it to decide how to forward URL requests to another Web caches when requested information objects are not found locally. The keys of the URL request routing tables are URL prefixes, which are associated with one ore more identifiers to the next-hop Web caches or cache groups, and a metric reflecting the average delay to retrieve a request from a matching URL.
- In this approach, an entry in the URL request routing table specifies a URL prefix and the next-hop Web cache towards an area or neighborhood of Web caches where the object resides. Ideally, a Web cache needs to know where a copy of a given object resides; however, because of the large number of objects (identified by URLs) that can be requested in a system, the URL request forwarding approach requires Web caches to be organized into areas or neighborhoods. All Web caches within the same area know the objects available in every other Web cache in the same area. In addition, for those objects that are not found in the area of a Web cache, the Web cache also maintains the next-hop Web cache towards the area in which a Web cache with the content resides.
- Unfortunately, this approach has several scaling and performance limitations. First, requiring each Web cache to know all the Web caches where each object in the area resides incurs a large overhead, which is akin to the overhead of a traditional topology-broadcast protocol for IP routing, with the added disadvantage that the number of objects that can reside in an area can be much larger than the number of IP address ranges maintained in backbone routers of the Internet. Second, because Web caches only know about the next hop towards a URL that does not reside in a region, a request for an object that lies outside the area of a Web cache may traverse multiple Web-cache hops before reaching a Web cache in the area where an object is stored. This introduces additional latencies akin to those incurred in the caching hierarchies proposed in other schemes discussed above. Third, it is difficult to modify Web caches in practice to implement the mechanisms needed for the forwarding of URL requests.
- To reduce the delays incurred in hierarchical Web caches, Tewari, Dahlin, Vin and Kay (R. Tewari, “Architectures and Algorithms for Scalable Wide-area Information Systems,” Ph. D. Dissertation,
Chapter 5, Computer Science Department, University of Texas at Austin, August 1998; R. Tewari, M. Dahlin, H. M. Vin, and J. S. Kay, “Design Considerations for Distributed Caching on the Internet,” Proc. IEEE 19 th International Conference on Distributed Computing Systems, May 1999) introduce hint caches within the context of a hierarchical Web caching architecture. According to this scheme, a Web cache maintains or has access to a local hint cache that maintains a mapping of an object to the identifier of another Web cache that has a copy of the object and is closest to the local hint cache. Web caches at the first level of the hierarchy maintain copies of information objects, while Web caches at higher levels only maintain hints to the objects. Hints are propagated along the hierarchy topology from the Web caches lower in the hierarchy to Web caches higher in the hierarchy. Furthermore, a Web cache with a copy of an object does not propagate a hint for the object. The limitation with this approach is that a Web caching hierarchy must still be established, which needs to be done manually in the absence of an automated method to establish the hierarchy, and the Web caching hierarchy must match the locality of reference by clients to reduce control overhead. - Another approach to reducing the latencies incurred with cache hierarchies consists of replacing the cache hierarchy with a directory (centralized or hierarchical) containing information about the objects kept at every cache. (Li Fan, Pei Cao, Jussara Almeida, and Andrei Z. Broder, “Summary cache: A scalable wide-area web cache sharing protocol,” in Proceedings Sigcomm ′98. ACM, October 1998. http://www.cs.wisc.edu/cao/papers summarycache.html; Syam Gadde, Michael Rabinovich, and Jeff Chase, “Reduce, reuse, recycle: An approach to building large internet caches,” in
Proceedings 6 th Workshop on Hot Topics in Operating Systems, May 1997, Alex Rousskov and Duane Wessels, “Cache digests,” inProceedings 3 rd International WWW Caching Workshop, June 1998, http://flwwwcacheja.net/events/workshop/papers.html., Renu Tewari, Michael Dahlin, Harrick M. Vin, and Jonathan S. Kay, “Design considerations for distributed caching on the internet,” Technical report, Department of Computer Sciences, University of Texas Austin, October 1998, http://www.cs.utexas.edu/users/UTCS/techreports/.) This directory is then used by a cache on a miss to determine the closest cache site holding the desired content. The limitations of this directory-based approach is that the directory site(s) must receive information about all caches in the system. - A number of proposals exist to expedite the dissemination of information objects using what is called “push distribution” and exemplified by Backweb, Marimba and Pointcast (“BackWeb: http://www.backweb.com/”; “Marimba: http://www.marimba.com/”; “Pointcast: http://www.pointcast.com/”). According to this approach, a Web server pushes the most recent version of a document or information object to a group of subscribers. The popular Internet browsers, Netscape and Internet Explorer, use a unicast approach in which the client receives the requested object directly from the originating source or a cache. As the number of subscribers of a document or information object increases, the unicast approach becomes inefficient because of processing overhead at servers and proxies and traffic overhead in the network. The obvious approach to make push distribution scale with the number of subscribers consists of using multicast technology. According to this approach (P. Rodriguez and E. W. Briesack, “ Continuous Multicast Push of Web Documents over The Internet,” IEEE Network Magazine, Vol. 12, No. 2, pp. 18-31, 1998), a document is multicasted continuously and reliably within a multicast group. A multicast group is defined for a given Web document and subscribers join the multicast group of the Web document they need to start receiving the updates to the document. A multicast group consist of the set of group members that should receive information sent to the group by one or multiple sources of the multicast group. The main shortcoming of this particular approach to push distribution are the following:
-
- (1) the portion of the Internet where subscribers are must support multicast routing distribution; and
- (2) a multicast address and group must be used for each Web document that is to be pushed to subscribers, which becomes difficult to manage as the number of documents to be pushed increases.
- Furthermore, Rodriguez, Biersack, and Ross (P. Rodriguez, E. W. Biersack, and K. W. Ross, “Improving The Latency in The Web: Caching or Multicast?,” Proc. Third WWW Caching workshop, Manchester, UK, June 1998.) have shown that multicasting Web documents is an attractive alternative to hierarchical Web caching only when the documents to be pushed are very popular, caching distribution incurs less latency.
- Kenner and Karush (B. Kenner and A. Karush, “System and Method for Optimized Storage and Retrieval of Data on a Distributed Computer Network,” U.S. Pat. No. 6,003,030, Dec. 14, 1999) propose a method for expediting the delivery of information objects to end users. In this method, the end user site is equipped with special software in addition to the Web browser. This software consists of a configuration utility and a client program. The configuration utility is used to download a delivery site file specifying a list of the delivery sites (Web caches or originating Web servers) from which the information objects can be retrieved and a suite of tests that can be run to determine which delivery site to contact. The limitations with this approach stem from the fact that it is not transparent to end user sites. In particular, the end user site needs to run additional software; performance tests must be conducted from the end-user site to one or more delivery sites to decide which site to use; and when changes occur to the delivery sites, a new version of the delivery site file must be retrieved by the end-user site, or new performance tests must be conducted.
- Another approach to helping select servers in a computer network (Z. Fei, S. Bhattacharjee, E. W. Zegura, and M. H. Ammar, “A Novel Server Selection Technique for Improving The Response Time of a Replicated Service,” Proc. IEEE Infocom 98, March 1998, pp. 783-791) consists of broadcasting server loading information after a certain load threshold or time period is exceeded. The limitation of this approach is that, just as with topology-broadcast protocols used for routing in computer networks, the scheme incurs substantial overhead as the number of servers increases.
- Another recent approach to directing clients to hosting sites with requested information objects or services is the replica routing approach proposed by Sightpath, Inc. (D. K. Gifford, “Replica Routing,” U.S. Pat. No. 6,052,718, Apr. 18, 2000). According to the Replica Routing approach, an information object or service is replicated in a number of replica servers. The replica routing system redirects a client requesting the information object or service to a “nearby” replica of the object or service. In one approach, all replica routers know the replica advertisements from each of the replica servers in the system, which summarize information about their location and observations about the local internetwork topology and performance. Using this flooding of advertisements, a replica router discerns which replica server appears nearby any one client. However, requiring each replica router to receive the advertisements from every other replica server becomes impractical as the number of replica servers and replica routers increases.
- To remedy this problem, replica routers are organized into a hierarchy, and replica advertisements are propagated only part way up such router hierarchy. A client request is routed to the root of the hierarchy and from there is forwarded down the hierarchy, until it reaches a replica router with enough knowledge about the replica's internetwork location to make an informed redirection decision. This approach has similar performance and scaling limitations as the prior approaches summarized above based on hierarchies of Web caches, flooding of information among caches or servers, and forwarding of requests over multiple hops.
- Another recent approach to directing clients to hosting sites with requested information objects or services is the enhanced network services method by Phillips, Li, and Katz (S. G. Phillips, A. J. Li, and D. M. Katz, “Enhanced Network Services Using a Subnetwork of Communicating Processors,” U.S. Pat. No. 6,182,224, Jan. 30, 2001.). Insofar as directing clients to servers, the enhanced network services method is very similar to the gathering of location data with router support advocated by Guyton and Schwartz described previously. As in the Guyton and Schwartz's approach, routers using the enhanced network services approach gather network topological data and also include as part of their normal routing exchanges information about the hosts that can provide content and services to clients; routers can then rank the hosts according to their relative distance in the network. In addition to data regarding hosts that can provide services, routers in the enhanced network services approach can include in their normal routing exchanges host information regarding logged-in users and willingness to pay for performing a designated service. In contrast to the proposal by Guyton and Schwartz, the enhanced network services approach does not attempt to limit the amount of network topological information that routers need to exchange in order to direct clients to best qualified servers. This approach has, therefore, similar performance and scaling limitations as the prior approaches summarized above based on flooding of information among caches or servers, and forwarding of requests over multiple hops.
- In one embodiment, a request for an information object is received from a client; and it is subsequently determined, according to an information object repository selection procedure, which of a number of information object repositories should service the request for the information object. Such determination is made without regard as to whether the information object is actually stored at the information object repository selected according to the selection procedure. The information object repository selection procedure involves mapping an address of the client to an address of the selected information object repository. The mapping is made according to specified performance metrics, which may be one or more of: average delay from the information object repository to the client, average processing delays at the information object repository, reliability of a path from the information object repository to the client, available bandwidth in said path, and loads on the information object repository.
- In most cases, the address of the information object repository is selected from a number of addresses of information object repositories. Because the selection of the information object repository is made without regards as to whether or not that information object repository actually contains a copy of the requested information object, sometimes the selected information object repository will need to be instructed to obtain a copy of the information object.
- Determining which of the number of information object repositories should service the request for the information object may involve using one or more of the following: a direct cache selection process, a redirect cache selection process, a remote DNS cache selection process, or a local DNS cache selection process.
- In the direct cache selection procedure, a Web server which received the request from the client, contacts a Web router to obtain an address of a topologically close information object repository to the requesting client. In response, the Web server receives from the Web router, an address for the topologically close information object repository. The Web server then returns a URL which contains the address of the topologically close information object repository to the client.
- In the redirect cache selection process, the Web server that received the request from the client contacts a Web router to obtain an address of a redirecting Web router that will service the request. After obtaining this address, the Web server returns a URL which contains the address of the redirecting Web router to the client. The client subsequently contacts the redirecting Web router at the address contained in the URL with the request for the information object. The redirecting Web router then redirects the client (e.g., via an http redirect) to a topologically close information object repository which will service the request for the information object.
- In the remote DNS cache selection process the Web server which received the request form the client returns a statically configured domain name of a redirector DNS server. The redirector DNS server resolves this domain name to produce a resolved domain name, which is provided to a Web router. In response, the Web router returns an address of a topologically close information object repository for the client, and the redirector DNS server then provides the address of the topologically close information object repository to the client
- In the local DNS cache selection process the Web server which received the request from the client provides a URL containing a statically configured domain name, and a local DNS server then gives the statically configured domain name to a Web router. In turn, the Web router provides an address of a topologically close information object repository, which the DNS server, then provides to the client.
- Of course, various combinations of these procedures may be made. For example different combination may be used depending on the type of content being requested. The direct cache selection process may be used for information objects that will be immediately loaded without user action, while any of the redirect cache selection process, the remote DNS cache selection process and/or the local DNS cache selection process may be used for information objects that will be loaded only after some user action.
- The present invention is illustrated by way of example, and not limitation, in the figures of the accompanying drawings in which:
-
FIG. 1 illustrates a conventional internetwork, such as the Internet; -
FIG. 2 illustrates a network having a virtual topology of Web routers configured in accordance with an embodiment of the present invention; -
FIG. 3A is a flow diagram of the direct cache selection mechanism according to one embodiment of the present invention; -
FIG. 3B is a flowchart of the direct cache selection mechanism as performed by a Web server according to one embodiment of the present invention; -
FIG. 3C is a flowchart of the direct cache selection mechanism as performed by a Web router according to one embodiment of the present invention; -
FIG. 4A is a flow diagram of the redirect cache selection mechanism according to one embodiment of the present invention; -
FIG. 4B is a flowchart of the redirect cache selection mechanism as performed by a Web server according to one embodiment of the present invention; -
FIG. 4C is a flowchart of the redirect cache selection mechanism as performed by a web router according to one embodiment of the present invention; -
FIG. 4D is a flowchart of the redirect cache selection mechanism as performed by a redirector Web router according to one embodiment of the present invention; -
FIG. 5A is a flow diagram of the remote DNS cache selection mechanism according to one embodiment of the present invention; -
FIG. 5B is a flowchart of the remote DNS cache selection mechanism as performed by a redirector DNS server according to one embodiment of the present invention; -
FIG. 5C is a flowchart of the remote DNS cache selection mechanism as performed by a Web router according to one embodiment of the present invention; -
FIG. 6A is a flow diagram of the local DNS cache selection mechanism according to one embodiment of the present invention; -
FIG. 6B is a flowchart of the local DNS cache selection mechanism as performed by a proxy DNS server according to one embodiment of the present invention; -
FIG. 6C is a flowchart of the local DNS cache selection mechanism as performed by a Web router according to one embodiment of the present invention; and -
FIG. 7 illustrates one example of the interconnection of Web routers and cache servers with each other and a farm of redirectors using conventional IP routers in accordance with one embodiment of the present invention. - Various methods and systems for using mappings between addresses of clients seeking information objects (i.e., content) and addresses of information object repositories (i.e., caches, proxies, origin content servers and the like) to support delivery of such information objects are disclosed herein. The information objects and/or information object repositories storing the information objects may be distributed over one or more computer networks or networks of networks. In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. However, it will be evident to those of ordinary skill in the art that some of these specific details need not be used to practice the present invention and/or that equivalents thereof may be used. In other cases, well-known structures and components have not been shown in detail to avoid unnecessarily obscuring the present invention. Thus, although discussed with reference to certain illustrated embodiments, upon review of this specification, those of ordinary skill in the art will recognize that the present system and methods may find application in a variety of systems and the illustrated embodiments should be regarded as exemplary only and should not be deemed to be limiting in scope.
- Some portions of the description that follow are presented in terms of algorithms and symbolic representations of operations on data within a computer memory (e.g., in flow chart format). These algorithmic descriptions and representations are the means used by those skilled in the computer science arts to most effectively convey the substance of their work to others skilled in the art. An algorithm is here, and generally, conceived to be a self-consistent sequence of steps leading to a desired result. The steps are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared and otherwise manipulated. It has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers or the like. It should be borne in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. Unless specifically stated otherwise, it will be appreciated that throughout the description of the present invention, use of terms such as “processing”, “computing”, “calculating”, “determining”, “displaying” or the like, refer to the action and processes of a computer system, or similar electronic computing device, that manipulates and transforms data represented as physical (electronic) quantities within the computer system's registers and memories into other data similarly represented as physical quantities within the computer system memories or registers or other such information storage, transmission or display devices.
- In accordance with one embodiment of the present invention, a collection of one or multiple “Web routers” is used to refer a request for an object to a Web cache or content server (or other information object repository) that is able to transfer the requested object to the target client while satisfying a given set of performance metrics. Note, this referral may be made without regard as to whether the designated information object repository actually includes the requested information object(s). As used herein, the term Web router is used to refer to an embodiment (which may be implemented in hardware and/or software to be executed by a computer system) of a computer system configured in accordance with the methods (described below) needed to map the address of a client with the address of a Web cache that can deliver requested information objects optimally to the client. The performance metrics used by Web routers to choose the sites (Web cache or content server) that should provide the requested objects to the clients can include network delays, available bandwidth, reliability of paths from the chosen sites to the target clients, and loads on the Web caches and content servers. The method used to select the best site from which information objects should be retrieved is transparent to the clients, and the computer network or internetwork over which the system operates need not support multicast delivery to end-user sites.
- A Web router may be co-located with a Web server, a Web cache, a hosting server, a DNS server or an original content server. A topology of Web routers is defined such that a given Web router has as its neighbor Web routers a subset of all the Web routers in the system. A Web router communicates directly with its neighbor Web routers, and, preferably, not with other Web routers.
- In one embodiment of the present invention, a Web router is contacted according to a scheme for enabling the discovery of the caches and servers storing information objects distributed over computer networks, which can be implemented in hardware and/or software, by a client, a Web server, a Web cache, or another type of server with a request for the address of one or more Web caches that a client should contact to obtain an information object. Further descriptions of these various schemes are presented below. A complete description of a Web router is included in co-pending U.S. patent application 09/______, entitled “System and Method for Discovering Information Objects and Information Object Repositories in Computer Networks”, filed Mar. 15, 2001, the complete disclosure of which is incorporated by reference herein.
- By utilizing the Web router concept, the present invention approaches the challenge of providing an efficient, scalable, server-directed Web content delivery system from a network layer perspective. Further, the present invention provides efficiency and scalability at least as good as that of the underlying infrastructure technologies. In one embodiment, the present invention includes routing technologies that may be used to leverage the underlying network routing to provide optimal selection of cache sites and content distribution paths, for example through the use of transport-layer protocols which may be used to make the most efficient use of network resources for content delivery. These protocols may also include signaling and congestion avoidance mechanisms which may be used to further optimize the use of network resources to levels of effectiveness and efficiency beyond that typically provided by underlying infrastructure services.
-
FIG. 1 illustrates aninternetwork 100. The methods and systems described herein, which can be implemented in software and/or hardware, enable the discovery of either information objects or the caches and servers storing information objects distributed over computer networks such as theinternetwork 100 shown in this illustration. One example of aninternetwork 100 is the Internet. Other examples include enterprise networks, local area networks, wide area networks, metropolitan area networks and networks of such networks. In the case whereinternetwork 100 is the Internet,clients 105 will generally access content located atremote servers 150 through a series of networks operated by different providers. For example,clients 105 may have accounts with local Internet service providers (ISPs) 110 that enable the clients to connect to the Internet using conventional dial-up or one of a variety of high-speed connections (e.g., DSL connections, cable connections, hybrids involving satellite and dial-up connections, etc.).ISPs 110, in turn, may provide direct connections to the Internet or, as shown, may rely onother service providers backbone 150. Connecting to a host (e.g., server 150) may thus involve connecting through networks operated by a variety of service providers. - Overview of Minimizing Latency on Cache Hits
- In one embodiment, one component of the present invention involves minimizing the latency of cache hits. Concretely this translates into minimizing the topological distance between the Web client and the cache server. In an exemplary embodiment, two mechanisms are defined in the architecture of the present invention for this purpose:
-
- (1) one mechanism for use in initially establishing the Web client to cache server connection; and
- (2) the other mechanism for use in providing continuous adjustment of this connection in response to changing network conditions.
- As explained above, optimal cache selection is achieved through the use of Web routers. In an exemplary embodiment, the present invention attempts to allow the Web client to begin downloading content from a cache server offering the lowest latency.
-
FIG. 2 illustrates avirtual network 200 of Web routers 202-216 defined on top of the physical topology of an internetwork, such as the Internet, consisting of routers interconnected via point-to-point links or networks. Thevirtual network 200 of Web routers includes point-topoint links configured between the Web routers 202-216, and the links configured between a Web router (e.g., Web router 202) and one or more Web caches (e.g., Web cache 218) and content servers (e.g., content server 220). Such links can be implemented using tunnels between Web routers and between Web routers and Web caches. As used herein, the term content server is meant to indicate a server that serves as the origination point for a piece of content (e.g., text, video, audio, etc.). Such content may subsequently be replicated at one or more Web caches. As shown in the figure, aclient 105 is not necessarily part of the virtual network of Web routers. - As indicated above, a Web router is one embodiment of the methods described herein for discovering information objects and object repositories in computer networks. The functionality of a Web router can be implemented as part of a Web cache, as part of a router, or as a separate entity. To simplify its description, the Web router is described and treated herein as a separate entity from a Web cache or a router.
- A Web router may be co-located with a Web server, a Web cache, or an original content server. In one embodiment of the present invention, a Web router may be implemented in software to be executed by a general-purpose (or special purpose) computer processor, or it may be implemented as part of the software of a router or Web cache. In another embodiment of the present invention, some or all of the Web router functionality may be implemented in hardware.
- In a preferred embodiment of the present invention, a collection of one or multiple Web routers is used to refer the request for an object to a Web cache or the content server that is able to transfer the requested object to the target client while satisfying a given set of performance metrics. The performance metrics used by Web routers to pick the sites (Web cache or content server) that should provide the requested objects to the clients are called type-of-service (TOS) parameters and include, but are not limited to, network delays, bandwidth available, reliability of paths from the chosen sites to the target clients, and loads on the Web caches and content servers. The value of the TOS parameters of the path from a server or Web cache to a client is called the TOS distance of such a server or Web cache to the client. The technique used to select the best site from which information objects should be retrieved by user sites (clients) is transparent to the user sites, and the computer network or internetwork over which the system operates need not support multicast delivery to end-user sites.
- To reduce communication and processing overhead in Web routers, a topology of Web routers is defined, such that a given Web router has as its neighbor Web routers a subset of all the Web routers in the system (where the term system refers to all or a portion of the virtual network for Web routers discussed above). A Web router may thus be configured with its set of neighbor Web routers. Such a configuration may be a table of neighbor Web routers which is defined by a network service provider and/or is dynamically updated. In another embodiment of the present invention, a Web router dynamically selects the set of neighbor Web routers with which it should communicate out of all of the Web routers in the system. A Web router preferably communicates with its neighbor Web routers only and uses the Web Information Locator by Distance (WILD) protocol for this purpose. The WILD protocol is disclosed in co-pending and commonly-owned U.S. Provisional Application No. 60/200,401, filed Apr. 28, 2000, now U.S. Patent Application 09/______, filed Mar. 16, 2001.
- In one embodiment of the present invention, WILD runs on top of the Transmission Control Protocol (TCP) in much the same way as the Border Gateway Protocol (BGP) does. In this embodiment, a TCP connection exists between a Web router and each of its neighbor Web routers. In another embodiment of the present invention, WILD can run on top of the TCP Santa Cruz protocol [C. Parsa and J. J. Garcia-Luna-Aceves, “TCP-Santa Cruz: Improving TCP Performance over Networks with Heterogeneous Transmission Media”, Proc. IEEE ICNP 99], which is disclosed in commonly-owned U.S. Provisional Application No. 60/190,332, filed on Mar. 16, 2000, now U.S. Patent Application No. 09/______, filed Mar. 15, 2001. Other embodiments of the present invention may be based on alternative protocols for the provision of reliable transmissions between Web routers.
- In one example of the operation of a system which employs an embodiment of the present invention, a client first contacts a Web server requesting a Web page in which a set of information objects are referenced by their URLs. In turn, the Web server may contact a Web router to determine the sites (e.g., one or more Web cache(s) or an original content server, any of which may be referred to generically as an information object repository) from which each of such information objects should be retrieved. Depending on the implementation, a Web router can be contacted by a client, a Web cache, a content server, or another type of server (e.g.,
Web server 222 or 224), asking for the address of a Web cache, set of Web caches, or content server that a client should contact for the purposes of retrieving information objects. In the present example, the Web server provides the Web router with the address of the client requesting the set of object, a URL for each information object requested by the client, and a set of TOS parameter values with which the request should be serviced to the client. The absence of TOS parameters can be assumed to imply a minimum-delay service request. - Those Web routers that are used to redirect clients to appropriate Web caches or content servers are implemented in a very fault-tolerant manner and are well known throughput the system. Accordingly, in one embodiment, not all Web routers in a system are used for client redirection in order to reduce the cost of Web routers and the communication overhead associated with knowing about the existence of Web routers that are capable of redirecting clients to Web caches and content servers. Thus, a network may include a set of redirecting Web routers.
- The set of redirecting Web routers should be known by all the Web routers of the system, while a Web router that does not serve as a redirecting Web router need not be known by all other Web routers of the system. Web routers may execute WILD (or another protocol) to map the address of a client into: (a) one or more addresses of Web caches or the content server that has the best TOS distance to the client address, and (b) one or more addresses of redirecting Web routers that have the best TOS distance to the client address. In some cases, this mapping is done independently or regardless of whether the Web cache or content server maintains a local copy of any of the information objects required by the client (the idea being that the content can be brought to the cache after the client has been advised of the “best” or “preferred” cache to connect to).
- As indicated, Web routers may use WILD or a non-WILD protocol to accomplish the above mappings. For example, in one embodiment, Web routers may use a static, fixed mapping of the address of a client into: (a) one or more addresses of Web caches or the content server that has the best TOS distance to the client address, and (b) one or more addresses of redirecting Web routers that have the best TOS distance to the client address. Such static, fixed mappings may be input by a user or a network service provider and may or may not be updated periodically. The static, fixed mappings may be generated by WILD or by an algorithm other than WILD. In either case, the static, fixed mappings may be generated independently of whether the Web cache or content server maintains a local copy of any of the information objects required by the client.
- In one embodiment of the present invention, the Internet routers of the system provide Web routers with distances to known destination addresses measured according to a number of network performance parameters. A Web router collocated with a Web cache or content server uses the information obtained from adjacent routers and the performance measurements of the Web cache or content server to derive the TOS distance from the collocated Web cache or content server to each known destination, which corresponds to potential client addresses. In one embodiment, Web routers use routing information provided by the Border Gateway Protocol (BGP) and any of the intra-domain routing protocols (e.g., OSPF, EIGRP) running in the routers attached to the same local area networks where the Web routers reside to derive distances to client address ranges (e.g., using a shortest-path first calculation).
- Regardless of how the actual mapping is done (e.g., whether using WILD or another algorithm), if a Web router maps the address of the client requiring the location of information objects to addresses of Web caches or other information object repositories that do not currently store such objects, the Web router can request the corresponding Web caches to obtain a copy of the required objects immediately after it provides the requesting Web server the address of such a Web cache or proxy. In another embodiment, a Web cache or proxy attempts to retrieve a requested object from another Web cache or a content server only after it is contacted by a client and determines that a copy of the requested information object is not available locally. In both instances, the Web router provides the Web cache servicing a client request with the address of the “nearest” Web cache that stores the information object requested by the client; therefore, the Web cache needing the information object communicates directly with the Web cache storing the requested information object, without having to go through any intermediate Web caches and without having to know the content stored in all other Web caches as is customary in the prior art.
- Building on the above then, the Web router is responsible for determining which of a number of available information object repositories should service a client (i.e., a client or a Web server request for an information object or service). The Web router also determines the information object repository which actually maintains the information object or service so requested, and initiates the process of bringing the information object or service to the information object repository that should service the client. Bringing the information object or service requested by the client to the information object repository which it has been determined should service the client request is accomplished, in one embodiment, by instructing that information object repository which will service the request to retrieve the information object or service requested by the client from the information object repository which actually maintains the information object or service. Thereafter, upon receiving an instruction to do so, the information object repository which it has been determined should service the client request contacts the information object repository that actually maintains the information object or service requested by the client directly to request the information object or service.
- In a further embodiment, one of the following four mechanisms, or, a combination of some of the following four mechanisms, is or may be used to communicate the best Web cache or content server, or the set of Web caches (more generally the information object repository(ies)), which should serve a client's request:
-
- (1) direct cache selection;
- (2) redirect cache selection;
- (3) remote DNS cache selection; and
- (4) client DNS cache selection.
Direct Cache Selection
-
FIG. 3A is a flow diagram of the direct cache selection mechanism according to one embodiment of the present invention. Numbers in brackets adjacent to the flow lines indicate the series of requests and responses communicated between network nodes. In direct cache selection, upon receiving a request from aclient 300, aWeb server 302 contacts anearby Web router 304 to obtain the address of the closest cache server to the requesting client. TheWeb server 302 then returns a URL to theclient 300, where the returned URL contains the IP address of the selectedcache server 306. Thecache server 306 may be associated with thesame Web router 302 or with anotherWeb router 308. As shown, the various network nodes may be distributed across multiple different networks maintained by various services providers. The direct cache selection mechanism has the following advantages: -
- (1) it requires the fewest possible messages; and
- (2) it avoids the complexities of DNS.
-
FIG. 3B is a flowchart of the direct cache selection mechanism as performed by the web server according to one embodiment of the present invention.Process 310 begins withstep 312, where theWeb server 302 receives a request from theclient 300 for content. In response to this request, in step 314, theWeb server 302 sends the IP address of theclient 300 to aWeb router 304. Optionally, instep 316, a timer is reset. Indecision operation 318, it is determined whether theWeb server 302 has received the IP address of the best cache server from theWeb router 304. If theWeb server 302 has received the IP address of the best cache server from theWeb router 304, then instep 320, theWeb server 302 sends a URL with the IP address of the best cache server (cache server 306 in this example) to theclient 300, and the process resets, waiting for the next request. If theWeb server 302 has not received the IP address of the best cache server from theWeb router 304, indecision operation 322, it is determined whether the timer has expired. This loop repeats until either the timer expires or the address is returned fromWeb Router 304. If the timer had expired, instep 322, then the Web server would redirect the client to a default cache server ( s tep 324), and the process would reset, waiting for the next request. The default cache server may be hard configured by a network provider and/or may be dynamically updated from time to time. -
FIG. 3C is a flowchart of the direct cache selection mechanism as performed by theWeb router 304 according to one embodiment of the present invention.Process 330 begins atstep 332, where theWeb router 304 receives the IP address of theclient 300. In response to receiving the IP address of theclient 300, instep 334, theWeb router 304 consults its WILD table for the eP address of the best cache server. Instep 336, the Web r outer 304 send s the IP address of the best cache server (cache server 306 in this example) to theWeb server 302. The method illustrated byprocess 330 is straightforward and can be implemented in hardware using approaches similar to those that have been reported in the prior art for hardware-based lookup of routing tables for IP packets. Alternatively, it can be implemented in software to be executed by a generalpurpose (or special purpose) processor. - Redirect Cache Selection
-
FIG. 4A is a flow diagram of the redirect cache selection mechanism according to one embodiment of the present invention. In redirect cache selection, theWeb server 402 returns a URL with the IP address of a special kind of Web router called a redirector. Theredirector 410 redirects theclient 400 to one of the current best cache servers (cache server 406 in this example) via an HTTP redirection. Redirectors differ from other Web routers in their scalability and fault tolerance. As shown in the illustration, the redirector selection can also be informed by a Web router. In order to allow for the selection of the best redirector, Web routers should use the WILD protocol for a second routing computation for redirectors. The redirect cache selection mechanism has the following advantages: -
- (1) redirect cache selection produces late URL to cache server IP binding; and
- (2) redirect cache selection avoids the complexities of DNS.
-
FIG. 4B is a flowchart of the redirect cache selection mechanism as performed by theWeb server 402 according to one embodiment of the present invention.Process 420 begins withstep 422, where theWeb server 402 receives a request from theclient 400 for content. In response to this request, in step 424, theWeb server 402 sends the EP address of theclient 400 to aWeb router 404. Inoptional step 426, a timer is reset. In decision operation 428, it is determined whether theWeb server 402 has received the IP address of a redirector Web router from theWeb router 404. If theWeb server 402 has received the IP address of a redirector Web router, in step 428, theWeb server 402 sends a redirect with the IP address of the redirector Web router (410 in this example) to theclient 400, and the process resets to await a new request. If theWeb server 402 has not received the IP address of the redirector Web router, then in decision operation 432, it is determined whether the timer has expired (if used). This loop is executed until the timer expires or the IP address of the redirector is returned. If the timer has expired, instep 434, theWeb server 402 sends a redirect with the IP address of a default redirector Web router to theclient 400, and the process resets to await a new request. Alternatively, if the timer has expired, instep 436, theWeb server 402 redirects theclient 400 to a default cache server, and the process resets. -
FIG. 4C is a flowchart of the redirect cache selection mechanism as performed by a web router according to one embodiment of the present invention.Process 440 begins withstep 442, where theWeb router 404 receives the IP address of theclient 400. In response to receiving the IP address of the client, instep 444, theWeb router 404 consults its WILD table for the IP address of a redirector Web router. Instep 446, theWeb router 404 sends the IP address of the redirector web router (410 in this example) to theWeb server 402. -
FIG. 4D is a flowchart of the redirect cache selection mechanism as performed by a redirector Web router according to one embodiment of the present invention.Process 450 begins at step 452, where theredirector Web router 410 receives a request for content from theclient 400. In response to receiving the request for content from theclient 400, in step 454, theredirector 410 consults its WILD table for the IP address of the best cache server (cache 406 in this example). In step 456, theredirector 410 sends an HTTP redirection to theclient 400 with the original URL modified to have the IP address of the selected cache server in the host portion of the URL. - Remote DNS Cache Selection
-
FIG. 5A is a flow diagram of the remote DNS cache selection mechanism according to one embodiment of the present invention. In remote DNS cache selection, theWeb server 502 returns a URL containing a statically configured domain name, such as a proprietary domain of a network service provider. On resolving such a domain name, aredirector DNS server 510 queries a collocatedWeb router 512 to determine the closest cache servers (cache server 506 in this example) for the source of the DNS query. Theredirector DNS server 510 then returns the IP address of theses cache servers to theDNS client 500. The remote DNS cache selection mechanism has the following advantages: -
- (1) remote DNS cache selection can return multiple IP addresses as part of the DNS protocol; and
- (2) remote DNS cache selection provides late URL to cache server IP address binding.
-
FIG. 5B is a flowchart of the remote DNS cache selection mechanism as performed by theredirector DNS server 510 according to one embodiment of the present invention.Process 520 begins withstep 522, where theredirector DNS server 510 receives a request from a local DNS server associated withclient 500. In response to this request, instep 524, theredirector DNS server 510 sends the IP address of the local DNS server to aWeb router 512. Inoptional step 526, a timer is reset. Indecision operation 528, it is determined whether theredirector DNS server 510 has received the IP addresses of the best cache servers from theWeb router 512. If theredirector DNS server 510 has received the IP addresses of the best cache servers, then instep 530, theredirector DNS server 510 sends the IP addresses of the best cache servers to the local DNS server, and the process resets. If theredirector DNS server 510 has not received IP addresses of the best cache servers, then indecision operation 532, it is determined whether the timer has expired. This loop repeats until either the timer expires or the IP addresses of the best cache servers are returned. If the timer has expired, then instep 534, theredirector DNS server 510 redirects theclient 500 to a set of default cache servers, and the process resets. -
FIG. 5C is a flowchart of the remote DNS cache selection mechanism as performed by theWeb router 512 according to one embodiment of the present invention.Process 540 begins withstep 542, where theWeb router 512 receives the IP address of a local DNS server associated withclient 500. In response to receiving the IP address of the local DNS server, in step 544, theWeb router 512 consults its WILD table for the IP addresses of the best cache servers. In step 546, theWeb router 512 sends the IP addresses of the best cache servers to theredirector DNS server 510. - Local DNS Cache Selection
-
FIG. 6A is a flow diagram of the local DNS cache selection mechanism according to one embodiment of the present invention. In local DNS cache selection, theWeb server 602 returns a URL containing a statically configured domain name within a service provider network. On receiving a query for such a domain name, aDNS server 610 local to theclient 600, queries a collocatedWeb router 612 to determine the closest cache servers for the source of the DNS query. Thelocal DNS server 610 then returns the IP addresses of these cache servers (cache server 606 in this example) to theWeb client 600. In some cases, thelocal DNS server 610 and the collocatedWeb router 612 form a proxy DNS server. The local DNS cache selection mechanism has the following advantages: -
- (1) local DNS cache selection can return multiple IP addresses as part of the DNS protocol;
- (2) local DNS cache selection provides late URL to cache server IP address binding.
-
FIG. 6B is a flowchart of the local DNS cache selection mechanism as performed by theproxy DNS server 610 according to one embodiment of the present invention.Process 620 begins withstep 622, where theproxy DNS server 610 receives a request from aclient 600. In response to this request, indecision operation 624, it is determined whether the domain name within the DNS request from theclient 600 is to be served through a Web router. If the domain name within the DNS request from theclient 600 is not to be served through a Web router, in step 626, theproxy DNS server 610 forwards the DNS request to a local DNS server, and the process resets. If the domain name within the DNS request from theclient 600 is to be served through a Web router, instep 628, theproxy DNS server 610 sends the IP address of theclient 600 to aWeb router 612. Inoptional step 630, a timer is reset. Indecision operation 632, it is determined whether theproxy DNS server 610 has received the IP addresses of the best cache servers from theWeb router 612. If theproxy DNS server 610 has received the IP addresses of the best cache servers, the in step 634, theproxy DNS server 610 sends the IP addresses of the best cache servers to theclient 600, and the process resets. If theproxy DNS server 610 has not received the IP addresses of the best cache servers, then indecision operation 636, it is determined whether the timer has expired. This loop repeats until the timer expires or the IP addresses are received. If the timer has expired, then in step 638, theproxy DNS server 610 redirects theclient 600 to a set of default cache servers, and the process resents. -
FIG. 6C is a flowchart of the local DNS cache selection mechanism as performed by the Web router according to one embodiment of the present invention.Process 640 begins withstep 642, where theWeb router 612 receives the IP address of aclient 600. In response to receiving the IP address of theclient 600, instep 644, theWeb router 612 consults a WILD table for the IP addresses of the best cache servers. Instep 646, theWeb router 612 sends the IP addresses of the best cache servers (cache server 606 in this example) to theproxy DNS server 610. - Combinations
- In some embodiments of the present invention, the four aforementioned communication mechanisms are used in conjunction with each other, in various combinations. In summary, these four communication mechanisms are:
-
- (1) direct cache selection;
- (2) redirect cache selection;
- (3) remote DNS cache selection; and
- (4) local (or client) DNS cache selection.
Combination of Direct Cache Selection and Redirect Cache Selection
- In one embodiment, (1) the direct cache selection mechanism and (2) the redirect cache selection mechanism are both used in a communication setting. In this combination, the direct cache selection mechanism (1) may be used for content that will be immediately loaded without user action (e.g., for graphics used as part of the decoration of a web page), and the redirect cache selection mechanism (2) may be used for content only loaded in response to user action (e.g., HTIM HREF tags which the user must click on to cause content to be loaded).
- Combination of Direct Cache Selection and Remote DNS Cache Selection
- In one embodiment, (1) the direct cache selection mechanism and (3) the remote DNS cache selection mechanism are both used in a communication setting. In this combination, the direct cache selection mechanism (1) may be used for content that will be immediately loaded without user action (e.g., for graphics used as part of the decoration of a web page), and the remote DNS cache selection mechanism (3) may be used for content only loaded in response to user action (e.g., HTML REF tags which the user must click on to cause content to be loaded).
- Combination of Direct Cache Selection and Client DNS Cache Selection
- In one embodiment, (1) the direct cache selection mechanism and (4) the client DNS cache selection mechanism are both used in a communication setting. In this combination, the direct cache selection mechanism (1) may be used for content that will be immediately loaded without user action (e.g., for graphics used as part of the decoration of a web page), and the client DNS cache selection mechanism (4) may be used for content only loaded in response to user action (e.g., HTML HREF tags which the user must click on to cause content to be loaded).
- Combination of Direct Cache Selection, Remote DNS Cache Selection, and Client DNS Cache Selection
- In one embodiment, (1) the direct cache selection mechanism, (3) the remote DNS cache selection mechanism, and (4) the client DNS cache selection are all used in a communication setting.
- Combination of Redirect Cache Selection and Remote DNS Cache Selection
- In one embodiment, (2) the redirect cache selection mechanism and (3) the remote DNS cache selection mechanism are both used in a communication setting.
- Combination of Redirect Cache Selection, Remote DNS Cache Selection, and Client DNS Cache Selection
- In one embodiment, (2) the redirect cache selection mechanism, (3) the remote DNS cache selection mechanism, and (4) the client DNS cache selection mechanism are all used in a commnunication setting.
- Dynamic Congestion Adaptation During Content Download
- In some cases, after the initial client-server connection is established, and a download is in progress, continuous monitoring and adjustment of the connection is performed to adjust to changing network conditions. This may be especially important for larger content (i.e., large files), such as streaming media, which may require an extended period to download. During such long downloads, network conditions may change sufficiently such that the path from the initial cache server to the client degrades to an unacceptable state. To avoid this situation, in one embodiment, the cache servers constantly (or periodically) monitor and adjust existing connections. In the event performance on an existing connection appreciably degrades, the cache servers may begin a process of searching for other cache servers with significantly better paths to the client. If such a server is found the download is transferred to the new cache, and the process is repeated. Another embodiment may include a dynamic redirector selection at the Web server.
- Overview of Minimizing Latency on Cache Misses
- In one embodiment, another component of the present invention includes a set of technologies that minimize the latency of cache misses. Thus, on a cache miss the selected cache server locates the closest cache server with a copy of the desired content and downloads the content from that server as fast and efficiently as possible. As explained above, this may be performed in parallel with the requesting client being informed of the IP address of the cache server which is obtaining the content.
- Network-Layer URL Routing
- In one embodiment, as illustrated in
FIG. 7 , the present invention includes pairs ofWeb routers 702 andcache servers 704 interconnected with each other and a farm ofredirectors 700 byconventional IP routers 706. In such cases, this component of the present invention exploits the IP routing infrastructure to provide, in effect, routing of URLs. - In one embodiment, network-layer URL (NURL) routing involves mapping requested URLs to unicast addresses which are then used as an anycast IP address (i.e. a unicast address advertised by multiple, physically distinct points in an internet) [Craig Partridge, Trevor Mendez, and Walter Milliken. Host anycasting service. RFC 1546, November 1993]. A system and method for using uniform resource locators (URLs) to map application layer content names to network layer anycast addresses, the aforementioned mapping, is disclosed in co-pending and commonly-owned U.S. Provisional Application No. 60/200,511, filed Apr. 28, 2000, which is incorporated herein by reference.
- In one example, in order to facilitate this mapping, content served by the present invention are assigned URLs having the following format:
- http://<Redirector IP>/<URL Anycast IP>/<URL Multicast IP>.
- A system and method for using network layer URL routing to locate the closest server carrying specific content (network-level routing of URLs) is disclosed in co-pending and commonly-owned U.S. Provisional Application No. 60/200,402, filed Apr. 28, 2000, which is incorporated herein by reference.
- With the route to the anycast cache server existing in the network infrastructure, a cache server processing a cache miss would like to transfer the content from the URL IP address. In an exemplary embodiment, in such a situation, the present invention resolves the anycast address to the server's real unicast address (which, by definition, uniquely identifies that server in the internet) before starting the download. In an exemplary embodiment, this is done by using an anycast address resolution protocol (AARP), which is disclosed in co-pending and commonlyowned U.S. Provisional Application No. 60/200,403, filed Apr. 28, 2000, which is incorporated herein by reference.
- Conclusion
- The present invention provides a system and method for using a mapping between client addresses and addresses of caches to support content delivery. In one embodiment, the present invention is part of a method and system for the discovery of information objects and servers storing information objects distributed over computer networks. Having fully described various preferred embodiments of the invention and various alternatives thereto, it should be recognized that numerous alternatives and equivalents exist which do not depart from the invention. Accordingly, the invention should only be measured in terms of the claims, which follow.
Claims (34)
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/843,789 US7565450B2 (en) | 2000-03-16 | 2001-04-26 | System and method for using a mapping between client addresses and addresses of caches to support content delivery |
PCT/US2001/040628 WO2001084356A2 (en) | 2000-04-28 | 2001-04-27 | Method for server selection |
AU2001255871A AU2001255871A1 (en) | 2000-04-28 | 2001-04-27 | System and method for using a mapping between client addresses and addresses of caches to support content delivery |
Applications Claiming Priority (8)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US19033100P | 2000-03-16 | 2000-03-16 | |
US20040400P | 2000-04-28 | 2000-04-28 | |
US20040300P | 2000-04-28 | 2000-04-28 | |
US20040200P | 2000-04-28 | 2000-04-28 | |
US20051100P | 2000-04-28 | 2000-04-28 | |
US20040100P | 2000-04-28 | 2000-04-28 | |
US09/810,148 US7162539B2 (en) | 2000-03-16 | 2001-03-15 | System and method for discovering information objects and information object repositories in computer networks |
US09/843,789 US7565450B2 (en) | 2000-03-16 | 2001-04-26 | System and method for using a mapping between client addresses and addresses of caches to support content delivery |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/810,148 Continuation-In-Part US7162539B2 (en) | 2000-03-16 | 2001-03-15 | System and method for discovering information objects and information object repositories in computer networks |
Publications (3)
Publication Number | Publication Date |
---|---|
US20020007413A1 US20020007413A1 (en) | 2002-01-17 |
US20090013083A9 true US20090013083A9 (en) | 2009-01-08 |
US7565450B2 US7565450B2 (en) | 2009-07-21 |
Family
ID=27569285
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/843,789 Expired - Fee Related US7565450B2 (en) | 2000-03-16 | 2001-04-26 | System and method for using a mapping between client addresses and addresses of caches to support content delivery |
Country Status (3)
Country | Link |
---|---|
US (1) | US7565450B2 (en) |
AU (1) | AU2001255871A1 (en) |
WO (1) | WO2001084356A2 (en) |
Cited By (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060218623A1 (en) * | 2005-03-25 | 2006-09-28 | Microsoft Corporation | Method and apparatus for distributed information management |
US20070124446A1 (en) * | 2005-11-25 | 2007-05-31 | International Business Machines Corporation | Method and system for controlling the processing of requests for web resources |
US20070143458A1 (en) * | 2005-12-16 | 2007-06-21 | Thomas Milligan | Systems and methods for providing a selective multicast proxy on a computer network |
US20080005163A1 (en) * | 2006-06-30 | 2008-01-03 | International Business Machines Corporation | Method and Apparatus For Caching Broadcasting Information |
US20080228920A1 (en) * | 2007-03-16 | 2008-09-18 | Souders Steven K | System and method for resource aggregation and distribution |
US20090287770A1 (en) * | 2006-12-18 | 2009-11-19 | Sony Corporation | Distribution device, distribution method, and computer program |
US20100121945A1 (en) * | 2008-11-11 | 2010-05-13 | At&T Corp. | Hybrid Unicast/Anycast Content Distribution Network System |
US20100228875A1 (en) * | 2009-03-09 | 2010-09-09 | Robert Linwood Myers | Progressive download gateway |
US20100228862A1 (en) * | 2009-03-09 | 2010-09-09 | Robert Linwood Myers | Multi-tiered scalable media streaming systems and methods |
US20110082945A1 (en) * | 2009-08-10 | 2011-04-07 | Seawell Networks Inc. | Methods and systems for scalable video chunking |
US8028091B1 (en) * | 2002-06-28 | 2011-09-27 | At&T Intellectual Property I. L.P. | System and method for reducing DNS lookup traffic in a computer data network |
WO2011139723A3 (en) * | 2010-04-28 | 2012-01-19 | Microsoft Corporation | Using dns reflection to measure network performance |
US8171139B2 (en) * | 2001-06-28 | 2012-05-01 | International Business Machines Corporation | Hierarchical load balancing |
US8190677B2 (en) | 2010-07-23 | 2012-05-29 | Seawell Networks Inc. | Methods and systems for scalable video delivery |
WO2012091694A1 (en) * | 2010-12-27 | 2012-07-05 | Limelight Networks, Inc. | Anycast redirect to unicast content download |
US20130132498A1 (en) * | 2011-11-22 | 2013-05-23 | Cisco Technology, Inc. | Content Distribution Through Blind-Cache Instantiation |
US20130144983A1 (en) * | 2011-12-01 | 2013-06-06 | Digitial Keystone, Inc. | Methods and apparatuses for cdn shaping |
US8621042B2 (en) | 2010-12-27 | 2013-12-31 | Limelight Networks, Inc. | Anycast redirect to unicast content download |
US20140204950A1 (en) * | 2011-09-09 | 2014-07-24 | Telefonaktiebolaget L M Ericsson (Publ) | Differentiated handling of data traffic with user-class dependent adaptation of network address lookup |
US9391825B1 (en) * | 2009-03-24 | 2016-07-12 | Amazon Technologies, Inc. | System and method for tracking service results |
USRE46355E1 (en) | 2006-02-27 | 2017-03-28 | Good Technology Holdings Limited | Method and system for distributing and updating software in wireless devices |
US9712887B2 (en) | 2012-04-12 | 2017-07-18 | Arris Canada, Inc. | Methods and systems for real-time transmuxing of streaming media content |
US9813514B2 (en) | 2002-06-12 | 2017-11-07 | Good Technology Holdings Limited | Information repository system including a wireless device and related method |
US10554701B1 (en) | 2018-04-09 | 2020-02-04 | Amazon Technologies, Inc. | Real-time call tracing in a service-oriented system |
Families Citing this family (207)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8266266B2 (en) | 1998-12-08 | 2012-09-11 | Nomadix, Inc. | Systems and methods for providing dynamic network authorization, authentication and accounting |
US7346695B1 (en) | 2002-10-28 | 2008-03-18 | F5 Networks, Inc. | System and method for performing application level persistence |
US6970933B1 (en) | 1999-07-15 | 2005-11-29 | F5 Networks, Inc. | Enabling application level persistence between a server and another resource over a network |
US6694358B1 (en) * | 1999-11-22 | 2004-02-17 | Speedera Networks, Inc. | Performance computer network method |
US7162539B2 (en) * | 2000-03-16 | 2007-01-09 | Adara Networks, Inc. | System and method for discovering information objects and information object repositories in computer networks |
US7552233B2 (en) * | 2000-03-16 | 2009-06-23 | Adara Networks, Inc. | System and method for information object routing in computer networks |
US7343422B2 (en) * | 2000-04-28 | 2008-03-11 | Adara Networks, Inc. | System and method for using uniform resource locators to map application layer content names to network layer anycast addresses |
US7725596B2 (en) * | 2000-04-28 | 2010-05-25 | Adara Networks, Inc. | System and method for resolving network layer anycast addresses to network layer unicast addresses |
US7577754B2 (en) * | 2000-04-28 | 2009-08-18 | Adara Networks, Inc. | System and method for controlling access to content carried in a caching architecture |
US7908337B2 (en) * | 2000-04-28 | 2011-03-15 | Adara Networks, Inc. | System and method for using network layer uniform resource locator routing to locate the closest server carrying specific content |
US7003555B1 (en) * | 2000-06-23 | 2006-02-21 | Cloudshield Technologies, Inc. | Apparatus and method for domain name resolution |
US9444785B2 (en) | 2000-06-23 | 2016-09-13 | Cloudshield Technologies, Inc. | Transparent provisioning of network access to an application |
US7146429B2 (en) * | 2001-03-16 | 2006-12-05 | The Aerospace Corporation | Cooperative adaptive web caching routing and forwarding web content data requesting method |
US6839758B2 (en) * | 2001-09-28 | 2005-01-04 | Intel Corporation | Network processor for cache array routing |
JP4359019B2 (en) * | 2002-03-13 | 2009-11-04 | 富士フイルム株式会社 | How to send a video stream |
US7430755B1 (en) | 2002-09-03 | 2008-09-30 | Fs Networks, Inc. | Method and system for providing persistence in a secure network access |
US7730155B1 (en) * | 2002-10-01 | 2010-06-01 | Apple Inc. | Method and apparatus for dynamically locating resources |
US7734745B2 (en) | 2002-10-24 | 2010-06-08 | International Business Machines Corporation | Method and apparatus for maintaining internet domain name data |
US20040098463A1 (en) * | 2002-11-19 | 2004-05-20 | Bo Shen | Transcoding-enabled caching proxy and method thereof |
US20050198493A1 (en) * | 2003-09-17 | 2005-09-08 | Bartas John A. | Distribution methods and apparatus for promoting distributed digital content on a local network |
US8676922B1 (en) | 2004-06-30 | 2014-03-18 | Google Inc. | Automatic proxy setting modification |
US8224964B1 (en) | 2004-06-30 | 2012-07-17 | Google Inc. | System and method of accessing a document efficiently through multi-tier web caching |
US7437364B1 (en) * | 2004-06-30 | 2008-10-14 | Google Inc. | System and method of accessing a document efficiently through multi-tier web caching |
US7984163B2 (en) * | 2005-01-13 | 2011-07-19 | Flash Networks, Inc. | Method and system for optimizing DNS queries |
US9692725B2 (en) | 2005-05-26 | 2017-06-27 | Citrix Systems, Inc. | Systems and methods for using an HTTP-aware client agent |
US9621666B2 (en) | 2005-05-26 | 2017-04-11 | Citrix Systems, Inc. | Systems and methods for enhanced delta compression |
US9407608B2 (en) | 2005-05-26 | 2016-08-02 | Citrix Systems, Inc. | Systems and methods for enhanced client side policy |
US8943304B2 (en) * | 2006-08-03 | 2015-01-27 | Citrix Systems, Inc. | Systems and methods for using an HTTP-aware client agent |
US8171238B1 (en) | 2007-07-05 | 2012-05-01 | Silver Peak Systems, Inc. | Identification of data stored in memory |
US8370583B2 (en) * | 2005-08-12 | 2013-02-05 | Silver Peak Systems, Inc. | Network memory architecture for providing data based on local accessibility |
US8392684B2 (en) * | 2005-08-12 | 2013-03-05 | Silver Peak Systems, Inc. | Data encryption in a network memory architecture for providing data based on local accessibility |
US8095774B1 (en) | 2007-07-05 | 2012-01-10 | Silver Peak Systems, Inc. | Pre-fetching data into a memory |
US8811431B2 (en) * | 2008-11-20 | 2014-08-19 | Silver Peak Systems, Inc. | Systems and methods for compressing packet data |
US8489562B1 (en) | 2007-11-30 | 2013-07-16 | Silver Peak Systems, Inc. | Deferred data storage |
US8929402B1 (en) | 2005-09-29 | 2015-01-06 | Silver Peak Systems, Inc. | Systems and methods for compressing packet data by predicting subsequent data |
US9390019B2 (en) * | 2006-02-28 | 2016-07-12 | Violin Memory Inc. | Method and apparatus for providing high-performance and highly-scalable storage acceleration |
US8755381B2 (en) * | 2006-08-02 | 2014-06-17 | Silver Peak Systems, Inc. | Data matching using flow based packet data storage |
US8885632B2 (en) | 2006-08-02 | 2014-11-11 | Silver Peak Systems, Inc. | Communications scheduler |
US8392977B2 (en) * | 2006-08-03 | 2013-03-05 | Citrix Systems, Inc. | Systems and methods for using a client agent to manage HTTP authentication cookies |
US8566452B1 (en) | 2006-08-03 | 2013-10-22 | F5 Networks, Inc. | Intelligent HTTP based load-balancing, persistence, and application traffic management of SSL VPN tunnels |
US8561155B2 (en) * | 2006-08-03 | 2013-10-15 | Citrix Systems, Inc. | Systems and methods for using a client agent to manage HTTP authentication cookies |
US8615778B1 (en) | 2006-09-28 | 2013-12-24 | Qurio Holdings, Inc. | Personalized broadcast system |
US7991269B1 (en) | 2006-12-15 | 2011-08-02 | Qurio Holdings, Inc. | Locality-based video playback to enable locally relevant product placement advertising |
US8812651B1 (en) | 2007-02-15 | 2014-08-19 | Google Inc. | Systems and methods for client cache awareness |
US7720936B2 (en) | 2007-03-12 | 2010-05-18 | Citrix Systems, Inc. | Systems and methods of freshening and prefreshening a DNS cache |
US8504775B2 (en) | 2007-03-12 | 2013-08-06 | Citrix Systems, Inc | Systems and methods of prefreshening cached objects based on user's current web page |
US8701010B2 (en) | 2007-03-12 | 2014-04-15 | Citrix Systems, Inc. | Systems and methods of using the refresh button to determine freshness policy |
US8103783B2 (en) * | 2007-03-12 | 2012-01-24 | Citrix Systems, Inc. | Systems and methods of providing security and reliability to proxy caches |
US7584294B2 (en) | 2007-03-12 | 2009-09-01 | Citrix Systems, Inc. | Systems and methods for prefetching objects for caching using QOS |
US7783757B2 (en) | 2007-03-12 | 2010-08-24 | Citrix Systems, Inc. | Systems and methods of revalidating cached objects in parallel with request for object |
US9098868B1 (en) | 2007-03-20 | 2015-08-04 | Qurio Holdings, Inc. | Coordinating advertisements at multiple playback devices |
US8055536B1 (en) | 2007-03-21 | 2011-11-08 | Qurio Holdings, Inc. | Automated real-time secure user data sourcing |
US20080306818A1 (en) * | 2007-06-08 | 2008-12-11 | Qurio Holdings, Inc. | Multi-client streamer with late binding of ad content |
US20080313029A1 (en) * | 2007-06-13 | 2008-12-18 | Qurio Holdings, Inc. | Push-caching scheme for a late-binding advertisement architecture |
US7991910B2 (en) | 2008-11-17 | 2011-08-02 | Amazon Technologies, Inc. | Updating routing information based on client location |
US8028090B2 (en) | 2008-11-17 | 2011-09-27 | Amazon Technologies, Inc. | Request routing utilizing client location information |
US8745164B2 (en) * | 2007-07-19 | 2014-06-03 | Ebay Inc. | Method and system to detect a cached web page |
US7996482B1 (en) | 2007-07-31 | 2011-08-09 | Qurio Holdings, Inc. | RDMA based real-time video client playback architecture |
US7958246B2 (en) * | 2007-08-09 | 2011-06-07 | Kount Inc. | Establishing unique sessions for DNS subscribers |
US8904002B2 (en) * | 2007-09-28 | 2014-12-02 | International Business Machines Corporation | Reducing overhead in component interactions |
US8949423B2 (en) * | 2007-09-28 | 2015-02-03 | International Business Machines Corporation | Autonomically co-locating first and second components on a select server |
US8307115B1 (en) * | 2007-11-30 | 2012-11-06 | Silver Peak Systems, Inc. | Network memory mirroring |
US8762476B1 (en) | 2007-12-20 | 2014-06-24 | Qurio Holdings, Inc. | RDMA to streaming protocol driver |
US8805949B2 (en) * | 2008-01-16 | 2014-08-12 | Netapp, Inc. | System and method for populating a cache using behavioral adaptive policies |
US8090877B2 (en) | 2008-01-26 | 2012-01-03 | Citrix Systems, Inc. | Systems and methods for fine grain policy driven cookie proxying |
US8442052B1 (en) | 2008-02-20 | 2013-05-14 | Silver Peak Systems, Inc. | Forward packet recovery |
US8060904B1 (en) | 2008-02-25 | 2011-11-15 | Qurio Holdings, Inc. | Dynamic load based ad insertion |
US8606996B2 (en) | 2008-03-31 | 2013-12-10 | Amazon Technologies, Inc. | Cache optimization |
US7970820B1 (en) | 2008-03-31 | 2011-06-28 | Amazon Technologies, Inc. | Locality based content distribution |
US8156243B2 (en) | 2008-03-31 | 2012-04-10 | Amazon Technologies, Inc. | Request routing |
US8533293B1 (en) | 2008-03-31 | 2013-09-10 | Amazon Technologies, Inc. | Client side cache management |
US8447831B1 (en) | 2008-03-31 | 2013-05-21 | Amazon Technologies, Inc. | Incentive driven content delivery |
US7962597B2 (en) | 2008-03-31 | 2011-06-14 | Amazon Technologies, Inc. | Request routing based on class |
US8321568B2 (en) * | 2008-03-31 | 2012-11-27 | Amazon Technologies, Inc. | Content management |
US8601090B1 (en) * | 2008-03-31 | 2013-12-03 | Amazon Technologies, Inc. | Network resource identification |
US9407681B1 (en) | 2010-09-28 | 2016-08-02 | Amazon Technologies, Inc. | Latency measurement in resource requests |
US7925782B2 (en) | 2008-06-30 | 2011-04-12 | Amazon Technologies, Inc. | Request routing using network computing components |
US9912740B2 (en) | 2008-06-30 | 2018-03-06 | Amazon Technologies, Inc. | Latency measurement in resource requests |
US10805840B2 (en) | 2008-07-03 | 2020-10-13 | Silver Peak Systems, Inc. | Data transmission via a virtual wide area network overlay |
US8743683B1 (en) | 2008-07-03 | 2014-06-03 | Silver Peak Systems, Inc. | Quality of service using multiple flows |
US10164861B2 (en) | 2015-12-28 | 2018-12-25 | Silver Peak Systems, Inc. | Dynamic monitoring and visualization for network health characteristics |
US9717021B2 (en) | 2008-07-03 | 2017-07-25 | Silver Peak Systems, Inc. | Virtual network overlay |
US8954548B2 (en) * | 2008-08-27 | 2015-02-10 | At&T Intellectual Property Ii, L.P. | Targeted caching to reduce bandwidth consumption |
TW201015912A (en) * | 2008-10-01 | 2010-04-16 | Avermedia Tech Inc | Network communication method, dispatch server and server |
KR100944156B1 (en) | 2008-10-21 | 2010-02-24 | 삼성에스디에스 주식회사 | Web server load balancing system and method |
US8065417B1 (en) | 2008-11-17 | 2011-11-22 | Amazon Technologies, Inc. | Service provider registration by a content broker |
US8060616B1 (en) | 2008-11-17 | 2011-11-15 | Amazon Technologies, Inc. | Managing CDN registration by a storage provider |
US8521880B1 (en) | 2008-11-17 | 2013-08-27 | Amazon Technologies, Inc. | Managing content delivery network service providers |
US8122098B1 (en) | 2008-11-17 | 2012-02-21 | Amazon Technologies, Inc. | Managing content delivery network service providers by a content broker |
US8073940B1 (en) | 2008-11-17 | 2011-12-06 | Amazon Technologies, Inc. | Managing content delivery network service providers |
US8732309B1 (en) | 2008-11-17 | 2014-05-20 | Amazon Technologies, Inc. | Request routing utilizing cost information |
US20100153802A1 (en) * | 2008-12-15 | 2010-06-17 | At&T Corp. | System and Method for Anycast Transport Optimization |
US8521851B1 (en) | 2009-03-27 | 2013-08-27 | Amazon Technologies, Inc. | DNS query processing using resource identifiers specifying an application broker |
US8688837B1 (en) | 2009-03-27 | 2014-04-01 | Amazon Technologies, Inc. | Dynamically translating resource identifiers for request routing using popularity information |
US8412823B1 (en) | 2009-03-27 | 2013-04-02 | Amazon Technologies, Inc. | Managing tracking information entries in resource cache components |
US8756341B1 (en) | 2009-03-27 | 2014-06-17 | Amazon Technologies, Inc. | Request routing utilizing popularity information |
US8135912B2 (en) | 2009-05-18 | 2012-03-13 | Hola Networks, Ltd. | System and method of increasing cache size |
US8782236B1 (en) | 2009-06-16 | 2014-07-15 | Amazon Technologies, Inc. | Managing resources using resource expiration data |
US8078757B2 (en) * | 2009-06-30 | 2011-12-13 | The Go Daddy Group, Inc. | Rewritten URL static and dynamic content delivery |
US8073970B2 (en) * | 2009-06-30 | 2011-12-06 | The Go Daddy Group, Inc. | In-line static and dynamic content delivery |
US8069266B2 (en) * | 2009-06-30 | 2011-11-29 | The Go Daddy Group, Inc. | Integrated static and dynamic content delivery |
US9450804B2 (en) | 2009-09-03 | 2016-09-20 | At&T Intellectual Property I, L.P. | Anycast aware transport for content distribution networks |
US8397073B1 (en) | 2009-09-04 | 2013-03-12 | Amazon Technologies, Inc. | Managing secure content in a content delivery network |
US8392403B2 (en) * | 2009-09-18 | 2013-03-05 | Microsoft Corporation | Management of data and computation in data centers |
US8433771B1 (en) | 2009-10-02 | 2013-04-30 | Amazon Technologies, Inc. | Distribution network with forward resource propagation |
US8560604B2 (en) | 2009-10-08 | 2013-10-15 | Hola Networks Ltd. | System and method for providing faster and more efficient data communication |
US20110137980A1 (en) * | 2009-12-08 | 2011-06-09 | Samsung Electronics Co., Ltd. | Method and apparatus for using service of plurality of internet service providers |
EP2514171A1 (en) | 2009-12-14 | 2012-10-24 | Telefonaktiebolaget L M Ericsson (PUBL) | Dynamic cache selection method and system |
US9495338B1 (en) | 2010-01-28 | 2016-11-15 | Amazon Technologies, Inc. | Content distribution network |
US8819283B2 (en) | 2010-09-28 | 2014-08-26 | Amazon Technologies, Inc. | Request routing in a networked environment |
US8930513B1 (en) | 2010-09-28 | 2015-01-06 | Amazon Technologies, Inc. | Latency measurement in resource requests |
US8468247B1 (en) | 2010-09-28 | 2013-06-18 | Amazon Technologies, Inc. | Point of presence management in request routing |
US10958501B1 (en) | 2010-09-28 | 2021-03-23 | Amazon Technologies, Inc. | Request routing information based on client IP groupings |
US8924528B1 (en) | 2010-09-28 | 2014-12-30 | Amazon Technologies, Inc. | Latency measurement in resource requests |
US9712484B1 (en) | 2010-09-28 | 2017-07-18 | Amazon Technologies, Inc. | Managing request routing information utilizing client identifiers |
US8577992B1 (en) | 2010-09-28 | 2013-11-05 | Amazon Technologies, Inc. | Request routing management based on network components |
US8938526B1 (en) | 2010-09-28 | 2015-01-20 | Amazon Technologies, Inc. | Request routing management based on network components |
US9003035B1 (en) | 2010-09-28 | 2015-04-07 | Amazon Technologies, Inc. | Point of presence management in request routing |
US10097398B1 (en) | 2010-09-28 | 2018-10-09 | Amazon Technologies, Inc. | Point of presence management in request routing |
US8452874B2 (en) | 2010-11-22 | 2013-05-28 | Amazon Technologies, Inc. | Request routing processing |
US9391949B1 (en) | 2010-12-03 | 2016-07-12 | Amazon Technologies, Inc. | Request routing processing |
US8626950B1 (en) | 2010-12-03 | 2014-01-07 | Amazon Technologies, Inc. | Request routing processing |
IL210169A0 (en) | 2010-12-22 | 2011-03-31 | Yehuda Binder | System and method for routing-based internet security |
CN103392320B (en) | 2010-12-29 | 2016-08-31 | 思杰系统有限公司 | Encrypted item is carried out the system and method that multilamellar labelling determines to provide extra safely effectively encrypted item |
RU2454711C1 (en) * | 2011-04-04 | 2012-06-27 | Общество с ограниченной ответственностью "СДН-видео" | Method of distributing load between content delivery network (cdn) servers |
US10467042B1 (en) | 2011-04-27 | 2019-11-05 | Amazon Technologies, Inc. | Optimized deployment based upon customer locality |
CN102222086B (en) * | 2011-05-18 | 2014-11-26 | 广州市动景计算机科技有限公司 | Webpage viewing method and webpage viewing device based on mobile terminal as well as mobile terminal |
US9747592B2 (en) * | 2011-08-16 | 2017-08-29 | Verizon Digital Media Services Inc. | End-to-end content delivery network incorporating independently operated transparent caches and proxy caches |
US9130991B2 (en) | 2011-10-14 | 2015-09-08 | Silver Peak Systems, Inc. | Processing data packets in performance enhancing proxy (PEP) environment |
US9626224B2 (en) | 2011-11-03 | 2017-04-18 | Silver Peak Systems, Inc. | Optimizing available computing resources within a virtual environment |
US20140059071A1 (en) * | 2012-01-11 | 2014-02-27 | Saguna Networks Ltd. | Methods, circuits, devices, systems and associated computer executable code for providing domain name resolution |
US9642169B2 (en) * | 2012-01-11 | 2017-05-02 | Saguna Networks Ltd. | Methods, circuits, devices, systems and associated computer executable code for facilitating access to a content source through a wireless mobile network |
US8904009B1 (en) | 2012-02-10 | 2014-12-02 | Amazon Technologies, Inc. | Dynamic content delivery |
US10021179B1 (en) | 2012-02-21 | 2018-07-10 | Amazon Technologies, Inc. | Local resource delivery network |
US9083743B1 (en) | 2012-03-21 | 2015-07-14 | Amazon Technologies, Inc. | Managing request routing information utilizing performance information |
US10623408B1 (en) | 2012-04-02 | 2020-04-14 | Amazon Technologies, Inc. | Context sensitive object management |
US9154551B1 (en) | 2012-06-11 | 2015-10-06 | Amazon Technologies, Inc. | Processing DNS queries to identify pre-processing information |
US9525659B1 (en) | 2012-09-04 | 2016-12-20 | Amazon Technologies, Inc. | Request routing utilizing point of presence load information |
US9323577B2 (en) | 2012-09-20 | 2016-04-26 | Amazon Technologies, Inc. | Automated profiling of resource usage |
US9135048B2 (en) | 2012-09-20 | 2015-09-15 | Amazon Technologies, Inc. | Automated profiling of resource usage |
CN103780482B (en) | 2012-10-22 | 2017-06-27 | 华为技术有限公司 | One kind obtains content and method and user equipment, cache node |
US9325711B2 (en) | 2012-12-11 | 2016-04-26 | Servmax, Inc. | Apparatus and data processing systems for accessing an object |
US10205698B1 (en) | 2012-12-19 | 2019-02-12 | Amazon Technologies, Inc. | Source-dependent address resolution |
US9542172B2 (en) | 2013-02-05 | 2017-01-10 | Apple Inc. | Automatic updating of applications |
US10951688B2 (en) * | 2013-02-27 | 2021-03-16 | Pavlov Media, Inc. | Delegated services platform system and method |
US9781070B2 (en) | 2013-02-27 | 2017-10-03 | Pavlov Media, Inc. | Resolver-based data storage and retrieval system and method |
US10581996B2 (en) | 2013-02-27 | 2020-03-03 | Pavlov Media, Inc. | Derivation of ontological relevancies among digital content |
US9294391B1 (en) | 2013-06-04 | 2016-03-22 | Amazon Technologies, Inc. | Managing network computing components utilizing request routing |
US9241044B2 (en) | 2013-08-28 | 2016-01-19 | Hola Networks, Ltd. | System and method for improving internet communication by using intermediate nodes |
US9998354B2 (en) * | 2013-09-24 | 2018-06-12 | Netflix, Inc. | Server selection for content distribution |
US9633128B2 (en) | 2014-03-13 | 2017-04-25 | Go Daddy Operating Company, LLC | Lightweight web page generation |
US20150271072A1 (en) * | 2014-03-24 | 2015-09-24 | Cisco Technology, Inc. | Method and apparatus for rate controlled content streaming from cache |
WO2015167372A1 (en) * | 2014-04-29 | 2015-11-05 | Telefonaktiebolaget L M Ericsson (Publ) | Identification of suitable network service points |
US9948496B1 (en) | 2014-07-30 | 2018-04-17 | Silver Peak Systems, Inc. | Determining a transit appliance for data traffic to a software service |
US9875344B1 (en) | 2014-09-05 | 2018-01-23 | Silver Peak Systems, Inc. | Dynamic monitoring and authorization of an optimization device |
US10033627B1 (en) | 2014-12-18 | 2018-07-24 | Amazon Technologies, Inc. | Routing mode and point-of-presence selection service |
US10097448B1 (en) | 2014-12-18 | 2018-10-09 | Amazon Technologies, Inc. | Routing mode and point-of-presence selection service |
US10091096B1 (en) | 2014-12-18 | 2018-10-02 | Amazon Technologies, Inc. | Routing mode and point-of-presence selection service |
US10659423B2 (en) | 2014-12-19 | 2020-05-19 | Go Daddy Operating Company, LLC | System and method for modifying a domain name system template |
US10164933B2 (en) | 2014-12-19 | 2018-12-25 | Go Daddy Operating Company, LLC | System and method for domain name system restore points |
US10225326B1 (en) | 2015-03-23 | 2019-03-05 | Amazon Technologies, Inc. | Point of presence based data uploading |
US9887932B1 (en) | 2015-03-30 | 2018-02-06 | Amazon Technologies, Inc. | Traffic surge management for points of presence |
US9887931B1 (en) | 2015-03-30 | 2018-02-06 | Amazon Technologies, Inc. | Traffic surge management for points of presence |
US9819567B1 (en) | 2015-03-30 | 2017-11-14 | Amazon Technologies, Inc. | Traffic surge management for points of presence |
US9832141B1 (en) | 2015-05-13 | 2017-11-28 | Amazon Technologies, Inc. | Routing based request correlation |
US11057446B2 (en) | 2015-05-14 | 2021-07-06 | Bright Data Ltd. | System and method for streaming content from multiple servers |
US10616179B1 (en) | 2015-06-25 | 2020-04-07 | Amazon Technologies, Inc. | Selective routing of domain name system (DNS) requests |
US10097566B1 (en) | 2015-07-31 | 2018-10-09 | Amazon Technologies, Inc. | Identifying targets of network attacks |
US10015239B1 (en) * | 2015-08-12 | 2018-07-03 | Evengx, Llc | Self-organizing distributed computation grid |
US9774619B1 (en) | 2015-09-24 | 2017-09-26 | Amazon Technologies, Inc. | Mitigating network attacks |
US9742795B1 (en) | 2015-09-24 | 2017-08-22 | Amazon Technologies, Inc. | Mitigating network attacks |
US9794281B1 (en) | 2015-09-24 | 2017-10-17 | Amazon Technologies, Inc. | Identifying sources of network attacks |
US10270878B1 (en) | 2015-11-10 | 2019-04-23 | Amazon Technologies, Inc. | Routing for origin-facing points of presence |
US10257307B1 (en) | 2015-12-11 | 2019-04-09 | Amazon Technologies, Inc. | Reserved cache space in content delivery networks |
US10049051B1 (en) | 2015-12-11 | 2018-08-14 | Amazon Technologies, Inc. | Reserved cache space in content delivery networks |
US10348639B2 (en) | 2015-12-18 | 2019-07-09 | Amazon Technologies, Inc. | Use of virtual endpoints to improve data transmission rates |
US10075551B1 (en) | 2016-06-06 | 2018-09-11 | Amazon Technologies, Inc. | Request management for hierarchical cache |
US10432484B2 (en) | 2016-06-13 | 2019-10-01 | Silver Peak Systems, Inc. | Aggregating select network traffic statistics |
US10110694B1 (en) | 2016-06-29 | 2018-10-23 | Amazon Technologies, Inc. | Adaptive transfer rate for retrieving content from a server |
US9967056B1 (en) | 2016-08-19 | 2018-05-08 | Silver Peak Systems, Inc. | Forward packet recovery with constrained overhead |
US9992086B1 (en) | 2016-08-23 | 2018-06-05 | Amazon Technologies, Inc. | External health checking of virtual private cloud network environments |
US10033691B1 (en) | 2016-08-24 | 2018-07-24 | Amazon Technologies, Inc. | Adaptive resolution of domain name requests in virtual private cloud network environments |
US10616250B2 (en) | 2016-10-05 | 2020-04-07 | Amazon Technologies, Inc. | Network addresses with encoded DNS-level information |
US10831549B1 (en) | 2016-12-27 | 2020-11-10 | Amazon Technologies, Inc. | Multi-region request-driven code execution system |
US10372499B1 (en) | 2016-12-27 | 2019-08-06 | Amazon Technologies, Inc. | Efficient region selection system for executing request-driven code |
US10938884B1 (en) | 2017-01-30 | 2021-03-02 | Amazon Technologies, Inc. | Origin server cloaking using virtual private cloud network environments |
US10771394B2 (en) | 2017-02-06 | 2020-09-08 | Silver Peak Systems, Inc. | Multi-level learning for classifying traffic flows on a first packet from DNS data |
US10257082B2 (en) | 2017-02-06 | 2019-04-09 | Silver Peak Systems, Inc. | Multi-level learning for classifying traffic flows |
US11044202B2 (en) | 2017-02-06 | 2021-06-22 | Silver Peak Systems, Inc. | Multi-level learning for predicting and classifying traffic flows from first packet data |
US10892978B2 (en) | 2017-02-06 | 2021-01-12 | Silver Peak Systems, Inc. | Multi-level learning for classifying traffic flows from first packet data |
US10503613B1 (en) | 2017-04-21 | 2019-12-10 | Amazon Technologies, Inc. | Efficient serving of resources during server unavailability |
US11075987B1 (en) | 2017-06-12 | 2021-07-27 | Amazon Technologies, Inc. | Load estimating content delivery network |
US10447648B2 (en) | 2017-06-19 | 2019-10-15 | Amazon Technologies, Inc. | Assignment of a POP to a DNS resolver based on volume of communications over a link between client devices and the POP |
LT3472717T (en) | 2017-08-28 | 2021-01-11 | Luminati Networks Ltd. | Method for improving content fetching by selecting tunnel devices |
US11190374B2 (en) | 2017-08-28 | 2021-11-30 | Bright Data Ltd. | System and method for improving content fetching by selecting tunnel devices |
US11212210B2 (en) | 2017-09-21 | 2021-12-28 | Silver Peak Systems, Inc. | Selective route exporting using source type |
US10742593B1 (en) | 2017-09-25 | 2020-08-11 | Amazon Technologies, Inc. | Hybrid content request routing system |
US10498696B2 (en) * | 2018-01-31 | 2019-12-03 | EMC IP Holding Company LLC | Applying a consistent hash to a distributed domain name server cache |
US10592578B1 (en) | 2018-03-07 | 2020-03-17 | Amazon Technologies, Inc. | Predictive content push-enabled content delivery network |
US10637721B2 (en) | 2018-03-12 | 2020-04-28 | Silver Peak Systems, Inc. | Detecting path break conditions while minimizing network overhead |
US10862852B1 (en) | 2018-11-16 | 2020-12-08 | Amazon Technologies, Inc. | Resolution of domain name requests in heterogeneous network environments |
US11025747B1 (en) | 2018-12-12 | 2021-06-01 | Amazon Technologies, Inc. | Content request pattern-based routing system |
EP3780557B1 (en) | 2019-02-25 | 2023-02-15 | Bright Data Ltd. | System and method for url fetching retry mechanism |
EP4030318A1 (en) | 2019-04-02 | 2022-07-20 | Bright Data Ltd. | System and method for managing non-direct url fetching service |
US11659019B2 (en) * | 2019-12-01 | 2023-05-23 | Microsoft Technology Licensing, Llc | Resource mapping during universal resource locator changes in distributed computing systems |
EP4002793B1 (en) * | 2020-11-13 | 2024-01-03 | Broadpeak | Method and controller for audio and/or video content delivery |
US11323540B1 (en) * | 2021-10-06 | 2022-05-03 | Hopin Ltd | Mitigating network resource contention |
Citations (48)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5088032A (en) * | 1988-01-29 | 1992-02-11 | Cisco Systems, Inc. | Method and apparatus for routing communications among computer networks |
US5115495A (en) * | 1988-10-18 | 1992-05-19 | The Mitre Corporation | Communications network system using full-juncture and partial-juncture station status information for alternate-path distance-vector routing |
US5774668A (en) * | 1995-06-07 | 1998-06-30 | Microsoft Corporation | System for on-line service in which gateway computer uses service map which includes loading condition of servers broadcasted by application servers for load balancing |
US5774660A (en) * | 1996-08-05 | 1998-06-30 | Resonate, Inc. | World-wide-web server with delayed resource-binding for resource-based load balancing on a distributed resource multi-node network |
US5822820A (en) * | 1997-08-20 | 1998-10-20 | Heisler; Glenna | Apparatus for cleaning a computer mouseball |
US5859966A (en) * | 1995-10-10 | 1999-01-12 | Data General Corporation | Security system for computer systems |
US6012067A (en) * | 1998-03-02 | 2000-01-04 | Sarkar; Shyam Sundar | Method and apparatus for storing and manipulating objects in a plurality of relational data managers on the web |
US6012068A (en) * | 1997-06-30 | 2000-01-04 | International Business Machines Corporation | Media manager for access to multiple media types |
US6097718A (en) * | 1996-01-02 | 2000-08-01 | Cisco Technology, Inc. | Snapshot routing with route aging |
US6115752A (en) * | 1998-05-21 | 2000-09-05 | Sun Microsystems, Inc. | System and method for server selection for mirrored sites |
US6130881A (en) * | 1998-04-20 | 2000-10-10 | Sarnoff Corporation | Traffic routing in small wireless data networks |
US6138162A (en) * | 1997-02-11 | 2000-10-24 | Pointcast, Inc. | Method and apparatus for configuring a client to redirect requests to a caching proxy server based on a category ID with the request |
US6175869B1 (en) * | 1998-04-08 | 2001-01-16 | Lucent Technologies Inc. | Client-side techniques for web server allocation |
US6201794B1 (en) * | 1997-03-07 | 2001-03-13 | Advanced Micro Devices, Inc. | Network with efficient message routing |
US6205481B1 (en) * | 1998-03-17 | 2001-03-20 | Infolibria, Inc. | Protocol for distributing fresh content among networked cache servers |
US6205477B1 (en) * | 1998-10-20 | 2001-03-20 | Cisco Technology, Inc. | Apparatus and method for performing traffic redirection in a distributed system using a portion metric |
US6236652B1 (en) * | 1998-11-02 | 2001-05-22 | Airbiquity Inc. | Geo-spacial Internet protocol addressing |
US6249801B1 (en) * | 1998-07-15 | 2001-06-19 | Radware Ltd. | Load balancing |
US6256675B1 (en) * | 1997-05-06 | 2001-07-03 | At&T Corp. | System and method for allocating requests for objects and managing replicas of objects on a network |
US6266706B1 (en) * | 1997-09-15 | 2001-07-24 | Effnet Group Ab | Fast routing lookup system using complete prefix tree, bit vector, and pointers in a routing table for determining where to route IP datagrams |
US6298381B1 (en) * | 1998-10-20 | 2001-10-02 | Cisco Technology, Inc. | System and method for information retrieval regarding services |
US6314465B1 (en) * | 1999-03-11 | 2001-11-06 | Lucent Technologies Inc. | Method and apparatus for load sharing on a wide area network |
US6314088B1 (en) * | 1996-09-20 | 2001-11-06 | Nec Corporation | Node configuration setup system with servers hunting through connection-oriented network for client's data |
US6317778B1 (en) * | 1998-11-23 | 2001-11-13 | International Business Machines Corporation | System and method for replacement and duplication of objects in a cache |
US6327252B1 (en) * | 1997-10-03 | 2001-12-04 | Alcatel Canada Inc. | Automatic link establishment between distributed servers through an NBMA network |
US20010056416A1 (en) * | 2000-03-16 | 2001-12-27 | J.J. Garcia-Luna-Aceves | System and method for discovering information objects and information object repositories in computer networks |
US6377551B1 (en) * | 1998-08-17 | 2002-04-23 | Nortel Networks Limited | QoS based route determination method for communications networks |
US6400681B1 (en) * | 1996-06-20 | 2002-06-04 | Cisco Technology, Inc. | Method and system for minimizing the connection set up time in high speed packet switching networks |
US6405252B1 (en) * | 1999-11-22 | 2002-06-11 | Speedera Networks, Inc. | Integrated point of presence server network |
US6415323B1 (en) * | 1999-09-03 | 2002-07-02 | Fastforward Networks | Proximity-based redirection system for robust and scalable service-node location in an internetwork |
US6438652B1 (en) * | 1998-10-09 | 2002-08-20 | International Business Machines Corporation | Load balancing cooperating cache servers by shifting forwarded request |
US6553376B1 (en) * | 1998-11-18 | 2003-04-22 | Infolibria, Inc. | Efficient content server using request redirection |
US6574663B1 (en) * | 1999-08-31 | 2003-06-03 | Intel Corporation | Active topology discovery in active networks |
US6574609B1 (en) * | 1998-08-13 | 2003-06-03 | International Business Machines Corporation | Secure electronic content management system |
US6577609B2 (en) * | 2000-09-29 | 2003-06-10 | Symbol Technologies, Inc. | Local addressing of mobile units in a WLAN with multicast packet addressing |
US6601098B1 (en) * | 1999-06-07 | 2003-07-29 | International Business Machines Corporation | Technique for measuring round-trip latency to computing devices requiring no client-side proxy presence |
US6611872B1 (en) * | 1999-01-11 | 2003-08-26 | Fastforward Networks, Inc. | Performing multicast communication in computer networks by using overlay routing |
US6687731B1 (en) * | 1997-06-12 | 2004-02-03 | Telia Ab | Arrangement for load sharing in computer networks |
US6708187B1 (en) * | 1999-06-10 | 2004-03-16 | Alcatel | Method for selective LDAP database synchronization |
US6721291B1 (en) * | 1999-10-19 | 2004-04-13 | Nokia Ip | Anycast binding mobile communication method and system |
US6735633B1 (en) * | 1999-06-01 | 2004-05-11 | Fast Forward Networks | System for bandwidth allocation in a computer network |
US6741585B1 (en) * | 2000-05-05 | 2004-05-25 | Lucent Technologies Inc. | Interworking of addressing in an internetwork |
US6785704B1 (en) * | 1999-12-20 | 2004-08-31 | Fastforward Networks | Content distribution system for operation over an internetwork including content peering arrangements |
US6820132B1 (en) * | 1998-02-02 | 2004-11-16 | Loral Cyberstar, Inc. | Internet communication system and method with asymmetric terrestrial and satellite links |
US6820133B1 (en) * | 2000-02-07 | 2004-11-16 | Netli, Inc. | System and method for high-performance delivery of web content using high-performance communications protocol between the first and second specialized intermediate nodes to optimize a measure of communications performance between the source and the destination |
US6917985B2 (en) * | 2000-03-10 | 2005-07-12 | The Regents Of The University Of California | Core assisted mesh protocol for multicast routing in ad-hoc Networks |
US7020083B2 (en) * | 2000-08-31 | 2006-03-28 | The Regents Of The University Of California | Method for improving TCP performance over wireless links |
US7343422B2 (en) * | 2000-04-28 | 2008-03-11 | Adara Networks, Inc. | System and method for using uniform resource locators to map application layer content names to network layer anycast addresses |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6185619B1 (en) * | 1996-12-09 | 2001-02-06 | Genuity Inc. | Method and apparatus for balancing the process load on network servers according to network and serve based policies |
US6003030A (en) | 1995-06-07 | 1999-12-14 | Intervu, Inc. | System and method for optimized storage and retrieval of data on a distributed computer network |
US6182224B1 (en) | 1995-09-29 | 2001-01-30 | Cisco Systems, Inc. | Enhanced network services using a subnetwork of communicating processors |
JP2728064B2 (en) | 1995-11-20 | 1998-03-18 | 日本電気株式会社 | Address resolution method |
US6154777A (en) | 1996-07-01 | 2000-11-28 | Sun Microsystems, Inc. | System for context-dependent name resolution |
US6052718A (en) | 1997-01-07 | 2000-04-18 | Sightpath, Inc | Replica routing |
US6006264A (en) * | 1997-08-01 | 1999-12-21 | Arrowpoint Communications, Inc. | Method and system for directing a flow between a client and a server |
US6185598B1 (en) | 1998-02-10 | 2001-02-06 | Digital Island, Inc. | Optimized network resource location |
US6108703A (en) | 1998-07-14 | 2000-08-22 | Massachusetts Institute Of Technology | Global hosting system |
US6092178A (en) * | 1998-09-03 | 2000-07-18 | Sun Microsystems, Inc. | System for responding to a resource request |
US6578066B1 (en) * | 1999-09-17 | 2003-06-10 | Alteon Websystems | Distributed load-balancing internet servers |
US6304913B1 (en) * | 1998-11-09 | 2001-10-16 | Telefonaktiebolaget L M Ericsson (Publ) | Internet system and method for selecting a closest server from a plurality of alternative servers |
US6397246B1 (en) * | 1998-11-13 | 2002-05-28 | International Business Machines Corporation | Method and system for processing document requests in a network system |
-
2001
- 2001-04-26 US US09/843,789 patent/US7565450B2/en not_active Expired - Fee Related
- 2001-04-27 WO PCT/US2001/040628 patent/WO2001084356A2/en active Search and Examination
- 2001-04-27 AU AU2001255871A patent/AU2001255871A1/en not_active Abandoned
Patent Citations (51)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5088032A (en) * | 1988-01-29 | 1992-02-11 | Cisco Systems, Inc. | Method and apparatus for routing communications among computer networks |
US5115495A (en) * | 1988-10-18 | 1992-05-19 | The Mitre Corporation | Communications network system using full-juncture and partial-juncture station status information for alternate-path distance-vector routing |
US5774668A (en) * | 1995-06-07 | 1998-06-30 | Microsoft Corporation | System for on-line service in which gateway computer uses service map which includes loading condition of servers broadcasted by application servers for load balancing |
US5859966A (en) * | 1995-10-10 | 1999-01-12 | Data General Corporation | Security system for computer systems |
US6097718A (en) * | 1996-01-02 | 2000-08-01 | Cisco Technology, Inc. | Snapshot routing with route aging |
US6400681B1 (en) * | 1996-06-20 | 2002-06-04 | Cisco Technology, Inc. | Method and system for minimizing the connection set up time in high speed packet switching networks |
US5774660A (en) * | 1996-08-05 | 1998-06-30 | Resonate, Inc. | World-wide-web server with delayed resource-binding for resource-based load balancing on a distributed resource multi-node network |
US6314088B1 (en) * | 1996-09-20 | 2001-11-06 | Nec Corporation | Node configuration setup system with servers hunting through connection-oriented network for client's data |
US6138162A (en) * | 1997-02-11 | 2000-10-24 | Pointcast, Inc. | Method and apparatus for configuring a client to redirect requests to a caching proxy server based on a category ID with the request |
US6201794B1 (en) * | 1997-03-07 | 2001-03-13 | Advanced Micro Devices, Inc. | Network with efficient message routing |
US6256675B1 (en) * | 1997-05-06 | 2001-07-03 | At&T Corp. | System and method for allocating requests for objects and managing replicas of objects on a network |
US6687731B1 (en) * | 1997-06-12 | 2004-02-03 | Telia Ab | Arrangement for load sharing in computer networks |
US6012068A (en) * | 1997-06-30 | 2000-01-04 | International Business Machines Corporation | Media manager for access to multiple media types |
US5822820A (en) * | 1997-08-20 | 1998-10-20 | Heisler; Glenna | Apparatus for cleaning a computer mouseball |
US6266706B1 (en) * | 1997-09-15 | 2001-07-24 | Effnet Group Ab | Fast routing lookup system using complete prefix tree, bit vector, and pointers in a routing table for determining where to route IP datagrams |
US6327252B1 (en) * | 1997-10-03 | 2001-12-04 | Alcatel Canada Inc. | Automatic link establishment between distributed servers through an NBMA network |
US6820132B1 (en) * | 1998-02-02 | 2004-11-16 | Loral Cyberstar, Inc. | Internet communication system and method with asymmetric terrestrial and satellite links |
US6012067A (en) * | 1998-03-02 | 2000-01-04 | Sarkar; Shyam Sundar | Method and apparatus for storing and manipulating objects in a plurality of relational data managers on the web |
US6205481B1 (en) * | 1998-03-17 | 2001-03-20 | Infolibria, Inc. | Protocol for distributing fresh content among networked cache servers |
US6175869B1 (en) * | 1998-04-08 | 2001-01-16 | Lucent Technologies Inc. | Client-side techniques for web server allocation |
US6130881A (en) * | 1998-04-20 | 2000-10-10 | Sarnoff Corporation | Traffic routing in small wireless data networks |
US6115752A (en) * | 1998-05-21 | 2000-09-05 | Sun Microsystems, Inc. | System and method for server selection for mirrored sites |
US6249801B1 (en) * | 1998-07-15 | 2001-06-19 | Radware Ltd. | Load balancing |
US6574609B1 (en) * | 1998-08-13 | 2003-06-03 | International Business Machines Corporation | Secure electronic content management system |
US6377551B1 (en) * | 1998-08-17 | 2002-04-23 | Nortel Networks Limited | QoS based route determination method for communications networks |
US6438652B1 (en) * | 1998-10-09 | 2002-08-20 | International Business Machines Corporation | Load balancing cooperating cache servers by shifting forwarded request |
US6298381B1 (en) * | 1998-10-20 | 2001-10-02 | Cisco Technology, Inc. | System and method for information retrieval regarding services |
US6205477B1 (en) * | 1998-10-20 | 2001-03-20 | Cisco Technology, Inc. | Apparatus and method for performing traffic redirection in a distributed system using a portion metric |
US6236652B1 (en) * | 1998-11-02 | 2001-05-22 | Airbiquity Inc. | Geo-spacial Internet protocol addressing |
US6553376B1 (en) * | 1998-11-18 | 2003-04-22 | Infolibria, Inc. | Efficient content server using request redirection |
US6317778B1 (en) * | 1998-11-23 | 2001-11-13 | International Business Machines Corporation | System and method for replacement and duplication of objects in a cache |
US6611872B1 (en) * | 1999-01-11 | 2003-08-26 | Fastforward Networks, Inc. | Performing multicast communication in computer networks by using overlay routing |
US6314465B1 (en) * | 1999-03-11 | 2001-11-06 | Lucent Technologies Inc. | Method and apparatus for load sharing on a wide area network |
US6735633B1 (en) * | 1999-06-01 | 2004-05-11 | Fast Forward Networks | System for bandwidth allocation in a computer network |
US6601098B1 (en) * | 1999-06-07 | 2003-07-29 | International Business Machines Corporation | Technique for measuring round-trip latency to computing devices requiring no client-side proxy presence |
US6708187B1 (en) * | 1999-06-10 | 2004-03-16 | Alcatel | Method for selective LDAP database synchronization |
US6574663B1 (en) * | 1999-08-31 | 2003-06-03 | Intel Corporation | Active topology discovery in active networks |
US6415323B1 (en) * | 1999-09-03 | 2002-07-02 | Fastforward Networks | Proximity-based redirection system for robust and scalable service-node location in an internetwork |
US6721291B1 (en) * | 1999-10-19 | 2004-04-13 | Nokia Ip | Anycast binding mobile communication method and system |
US6405252B1 (en) * | 1999-11-22 | 2002-06-11 | Speedera Networks, Inc. | Integrated point of presence server network |
US6785704B1 (en) * | 1999-12-20 | 2004-08-31 | Fastforward Networks | Content distribution system for operation over an internetwork including content peering arrangements |
US6820133B1 (en) * | 2000-02-07 | 2004-11-16 | Netli, Inc. | System and method for high-performance delivery of web content using high-performance communications protocol between the first and second specialized intermediate nodes to optimize a measure of communications performance between the source and the destination |
US6917985B2 (en) * | 2000-03-10 | 2005-07-12 | The Regents Of The University Of California | Core assisted mesh protocol for multicast routing in ad-hoc Networks |
US20010056416A1 (en) * | 2000-03-16 | 2001-12-27 | J.J. Garcia-Luna-Aceves | System and method for discovering information objects and information object repositories in computer networks |
US20030101278A1 (en) * | 2000-03-16 | 2003-05-29 | J.J. Garcia-Luna-Aceves | System and method for directing clients to optimal servers in computer networks |
US7162539B2 (en) * | 2000-03-16 | 2007-01-09 | Adara Networks, Inc. | System and method for discovering information objects and information object repositories in computer networks |
US7343422B2 (en) * | 2000-04-28 | 2008-03-11 | Adara Networks, Inc. | System and method for using uniform resource locators to map application layer content names to network layer anycast addresses |
US6741585B1 (en) * | 2000-05-05 | 2004-05-25 | Lucent Technologies Inc. | Interworking of addressing in an internetwork |
US7020083B2 (en) * | 2000-08-31 | 2006-03-28 | The Regents Of The University Of California | Method for improving TCP performance over wireless links |
US7200111B2 (en) * | 2000-08-31 | 2007-04-03 | The Regents Of The University Of California | Method for improving TCP performance over wireless links |
US6577609B2 (en) * | 2000-09-29 | 2003-06-10 | Symbol Technologies, Inc. | Local addressing of mobile units in a WLAN with multicast packet addressing |
Cited By (46)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8171139B2 (en) * | 2001-06-28 | 2012-05-01 | International Business Machines Corporation | Hierarchical load balancing |
US9813514B2 (en) | 2002-06-12 | 2017-11-07 | Good Technology Holdings Limited | Information repository system including a wireless device and related method |
US8595329B2 (en) | 2002-06-28 | 2013-11-26 | At&T Intellectual Property I, L.P. | Reducing DNS lookups |
US8028091B1 (en) * | 2002-06-28 | 2011-09-27 | At&T Intellectual Property I. L.P. | System and method for reducing DNS lookup traffic in a computer data network |
US7937753B2 (en) * | 2005-03-25 | 2011-05-03 | Microsoft Corporation | Method and apparatus for distributed information management |
US20060218623A1 (en) * | 2005-03-25 | 2006-09-28 | Microsoft Corporation | Method and apparatus for distributed information management |
US9424095B2 (en) * | 2005-11-25 | 2016-08-23 | International Business Machines Corporation | Method and system for controlling the processing of requests for web resources |
US20070124446A1 (en) * | 2005-11-25 | 2007-05-31 | International Business Machines Corporation | Method and system for controlling the processing of requests for web resources |
US8626925B2 (en) * | 2005-12-16 | 2014-01-07 | Panasonic Corporation | Systems and methods for providing a selective multicast proxy on a computer network |
US20070143458A1 (en) * | 2005-12-16 | 2007-06-21 | Thomas Milligan | Systems and methods for providing a selective multicast proxy on a computer network |
USRE46355E1 (en) | 2006-02-27 | 2017-03-28 | Good Technology Holdings Limited | Method and system for distributing and updating software in wireless devices |
US8407260B2 (en) * | 2006-06-30 | 2013-03-26 | International Business Machines Corporation | Method and apparatus for caching broadcasting information |
US20080005163A1 (en) * | 2006-06-30 | 2008-01-03 | International Business Machines Corporation | Method and Apparatus For Caching Broadcasting Information |
US20090287770A1 (en) * | 2006-12-18 | 2009-11-19 | Sony Corporation | Distribution device, distribution method, and computer program |
US8533756B2 (en) * | 2006-12-18 | 2013-09-10 | Sony Corporation | Distribution device, distribution method, and computer program |
US20080228920A1 (en) * | 2007-03-16 | 2008-09-18 | Souders Steven K | System and method for resource aggregation and distribution |
US9426213B2 (en) * | 2008-11-11 | 2016-08-23 | At&T Intellectual Property Ii, L.P. | Hybrid unicast/anycast content distribution network system |
US10666610B2 (en) | 2008-11-11 | 2020-05-26 | At&T Intellectual Property Ii, L.P. | Hybrid unicast/anycast content distribution network system |
US10979386B2 (en) | 2008-11-11 | 2021-04-13 | At&T Intellectual Property Ii, L.P. | Hybrid unicast/anycast content distribution network |
US20100121945A1 (en) * | 2008-11-11 | 2010-05-13 | At&T Corp. | Hybrid Unicast/Anycast Content Distribution Network System |
US10187350B2 (en) | 2008-11-11 | 2019-01-22 | At&T Intellectual Property Ii, L.P. | Hybrid unicast/anycast content distribution network system |
US20100228862A1 (en) * | 2009-03-09 | 2010-09-09 | Robert Linwood Myers | Multi-tiered scalable media streaming systems and methods |
US20100228875A1 (en) * | 2009-03-09 | 2010-09-09 | Robert Linwood Myers | Progressive download gateway |
US9485299B2 (en) | 2009-03-09 | 2016-11-01 | Arris Canada, Inc. | Progressive download gateway |
US9197677B2 (en) * | 2009-03-09 | 2015-11-24 | Arris Canada, Inc. | Multi-tiered scalable media streaming systems and methods |
US10728112B2 (en) | 2009-03-24 | 2020-07-28 | Amazon Technologies, Inc. | System and method for tracking service results |
US9391825B1 (en) * | 2009-03-24 | 2016-07-12 | Amazon Technologies, Inc. | System and method for tracking service results |
US11356337B2 (en) | 2009-03-24 | 2022-06-07 | Amazon Technologies, Inc. | System and method for tracking service requests |
US8898228B2 (en) | 2009-08-10 | 2014-11-25 | Seawell Networks Inc. | Methods and systems for scalable video chunking |
US8566393B2 (en) | 2009-08-10 | 2013-10-22 | Seawell Networks Inc. | Methods and systems for scalable video chunking |
US20110082945A1 (en) * | 2009-08-10 | 2011-04-07 | Seawell Networks Inc. | Methods and systems for scalable video chunking |
WO2011139723A3 (en) * | 2010-04-28 | 2012-01-19 | Microsoft Corporation | Using dns reflection to measure network performance |
US8326980B2 (en) | 2010-04-28 | 2012-12-04 | Microsoft Corporation | Using DNS reflection to measure network performance |
US8190677B2 (en) | 2010-07-23 | 2012-05-29 | Seawell Networks Inc. | Methods and systems for scalable video delivery |
US8301696B2 (en) | 2010-07-23 | 2012-10-30 | Seawell Networks Inc. | Methods and systems for scalable video delivery |
US8621042B2 (en) | 2010-12-27 | 2013-12-31 | Limelight Networks, Inc. | Anycast redirect to unicast content download |
WO2012091694A1 (en) * | 2010-12-27 | 2012-07-05 | Limelight Networks, Inc. | Anycast redirect to unicast content download |
US9419896B2 (en) * | 2011-09-09 | 2016-08-16 | Telefonaktiebolaget Lm Ericsson (Publ) | Differentiated handling of data traffic with user-class dependent adaptation of network address lookup |
US20140204950A1 (en) * | 2011-09-09 | 2014-07-24 | Telefonaktiebolaget L M Ericsson (Publ) | Differentiated handling of data traffic with user-class dependent adaptation of network address lookup |
US9762694B2 (en) * | 2011-11-22 | 2017-09-12 | Cisco Technology, Inc. | Content distributed through blind-cache instantiation |
US20150381758A1 (en) * | 2011-11-22 | 2015-12-31 | Cisco Technology, Inc. | Content Distribution Through Blind-Cache Instantiation |
US9148486B2 (en) * | 2011-11-22 | 2015-09-29 | Cisco Technology, Inc. | Content distribution through blind-cache instantiation |
US20130132498A1 (en) * | 2011-11-22 | 2013-05-23 | Cisco Technology, Inc. | Content Distribution Through Blind-Cache Instantiation |
US20130144983A1 (en) * | 2011-12-01 | 2013-06-06 | Digitial Keystone, Inc. | Methods and apparatuses for cdn shaping |
US9712887B2 (en) | 2012-04-12 | 2017-07-18 | Arris Canada, Inc. | Methods and systems for real-time transmuxing of streaming media content |
US10554701B1 (en) | 2018-04-09 | 2020-02-04 | Amazon Technologies, Inc. | Real-time call tracing in a service-oriented system |
Also Published As
Publication number | Publication date |
---|---|
WO2001084356A3 (en) | 2002-04-25 |
US7565450B2 (en) | 2009-07-21 |
WO2001084356A2 (en) | 2001-11-08 |
US20020007413A1 (en) | 2002-01-17 |
AU2001255871A1 (en) | 2001-11-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7565450B2 (en) | System and method for using a mapping between client addresses and addresses of caches to support content delivery | |
US7908337B2 (en) | System and method for using network layer uniform resource locator routing to locate the closest server carrying specific content | |
US7725596B2 (en) | System and method for resolving network layer anycast addresses to network layer unicast addresses | |
US7343422B2 (en) | System and method for using uniform resource locators to map application layer content names to network layer anycast addresses | |
US7577754B2 (en) | System and method for controlling access to content carried in a caching architecture | |
EP1391096B1 (en) | System and method for discovering information objects and information object repositories in computer networks | |
US7552233B2 (en) | System and method for information object routing in computer networks | |
US7376716B2 (en) | Method and system for tiered distribution in a content delivery network | |
EP1277327B1 (en) | System and method for using network layer uniform resource locator routing to locate the closest server carrying specific content | |
EP1433051B1 (en) | System and method for information object routing in computer networks | |
WO2001084802A2 (en) | System and method for using uniform resource locators to map application layer content names to network layer anycast addresses | |
WO2001084803A2 (en) | System and method for resolving network layer anycast addresses to network layer unicast addresses | |
Garcia-Luna-Aceves | System and Method for DiscoveringInformation Objects and Information Object Repositories in Computer Networks | |
Garcia-Luna-Aceves | System and Method for Discovering Information Objects and Information Object Repositories in Computer Networks | |
Garcia-Luna-Aceves | System and Method forInformation Object Routing in Computer Networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: CENUS TECHNOLOGIES, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:GARCIA-LUNA-ACEVES, J.J.;SMITH, BRADLEY R.;REEL/FRAME:012067/0307 Effective date: 20010720 |
|
AS | Assignment |
Owner name: ONLINE VIDEO NETWORK, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:CENUS TECHNOLOGIES, INC.;REEL/FRAME:020012/0428 Effective date: 20071010 Owner name: ADARA NETWORKS INC, CALIFORNIA Free format text: CHANGE OF NAME;ASSIGNOR:ONLINE VIDEO NETWORK INC;REEL/FRAME:020012/0390 Effective date: 20040223 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
FPAY | Fee payment |
Year of fee payment: 8 |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20210721 |