US20030084159A1 - Pseudo proxy server providing instant overflow capacity to computer networks - Google Patents
Pseudo proxy server providing instant overflow capacity to computer networks Download PDFInfo
- Publication number
- US20030084159A1 US20030084159A1 US10/306,610 US30661002A US2003084159A1 US 20030084159 A1 US20030084159 A1 US 20030084159A1 US 30661002 A US30661002 A US 30661002A US 2003084159 A1 US2003084159 A1 US 2003084159A1
- Authority
- US
- United States
- Prior art keywords
- proxy server
- pseudo proxy
- data
- pseudo
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1001—Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1001—Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
- H04L67/1004—Server selection for load balancing
- H04L67/1012—Server selection for load balancing based on compliance of requirements or conditions with available server resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1001—Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
- H04L67/1004—Server selection for load balancing
- H04L67/1017—Server selection for load balancing based on a round robin mechanism
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1001—Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
- H04L67/1038—Load balancing arrangements to avoid a single path through a load balancer
Definitions
- the present invention provides a resource management scheme for a content provider in a computer network.
- Predicting web server capacity can be a problem with serious financial repercussions.
- a hosting provider maintains a computer network and leases capacity to a content provider.
- the hosting provider may be contractually obligated to guarantee that it will provide server capacity sufficient to meet demand to the content provider's site.
- a failure to meet demand may mean lost revenue for the content provider.
- a failure to meet capacity guarantees may mean lost revenue to the hosting provider.
- providing static capacity for a content provider may be financially disadvantageous to the hosting provider. If a server is dedicated for the use of a first content provider but is under used, the excess capacity could be used to service a second content provider and generate additional revenues.
- a hosting provider would provide server resources to a content provider in a manner that ebbs and flows with the demand for service from the provider's site.
- New servers would be added to the provider's site as the demand for the site increases.
- the new server may be included in a round robin DNS pool of machines and aliased to a particular host name.
- the act of booting up a server and loading it with information content from the content provider takes time. It may not be possible to load the server in enough time to meet a sharp, unexpected rise in customer demand. Accordingly, there is a need in the art for a resource management scheme for host networks that dedicates new servers to host sites in real-time with escalating demand.
- a pseudo proxy server is provided for a host network when the host network experiences periods of congestion.
- the host network determines whether an arrival rate of data requests exceeds a predetermined threshold. If so, the host network adds an address of a pseudo proxy server to a list of servers aliased to the host network. Thereafter, data requests are routed to the pseudo proxy server on a round robin basis.
- the pseudo proxy server may be engaged without first loading information content from the host network on the pseudo proxy server.
- FIG. 1 is a block diagram of a computer network constructed in accordance with an embodiment of the present invention.
- FIG. 2 is a flow diagram of a method of the host network conducted in accordance with an embodiment of the present invention.
- FIG. 3 is a flow diagram of a method of the pseudo proxy server conducted in accordance with an embodiment of the present invention.
- FIG. 4 is a block diagram of a computer network constructed in accordance with an embodiment of the present invention.
- the present invention provides a pseudo proxy server system in which unregistered servers may be made to act as if they are part of a host network on a rolling basis.
- the pseudo proxy server may be added to a pool of servers and provide service to customer requests immediately. According to the present invention, there is no need to copy content from the content provider to the new server prior to use. Instead, the pseudo proxy server accepts customer requests immediately and copies content only as it is requested.
- FIG. 1 illustrates a block diagram of a pseudo proxy server implemented according to an embodiment of the present invention.
- FIG. 1 illustrates an Internet 100 , a host network 110 , a pseudo proxy server 120 and a client terminal 130 .
- the host network 110 may be populated by a DNS server 111 and a plurality of content servers 112 - 118 .
- the host network may be connected to the Internet via a interface line 119 such as a Ti telephone line or the like.
- the content servers 112 - 118 store information content that has been preloaded by content providers or the like.
- the content servers 112 - 118 respond to connection requests from client terminal 130 and the like according to convention techniques in the art.
- the content servers 112 - 118 also engage in a coordinated network management process to monitor the performance of the host network 110 .
- a “monitoring process” of the host network 110 monitors, for example, bandwidth availability on line 119 , disk or CPU availability of the various content servers 112 - 118 and other operating conditions of the host network 110 that relate to its ability to handle other connection requests.
- the known http log monitoring process is an example of such a monitoring process.
- the DNS server 110 stores a “DNS pool” (not shown), a table that associates a machine name of the host network 110 with the IP addresses of the content servers 112 - 118 .
- An example of a machine name is “www.att.com.”
- the DNS retrieves an IP address of one of the content servers 112 - 118 on a round robin basis.
- a client terminal 130 once it has received the IP address of a content server 112 would direct a connection request to the IP address.
- a DNS server 111 may be provided within the host network 110 as shown in FIG. 1 but also may be provided elsewhere on Internet 100 .
- the pseudo proxy server 120 is a traditional computer server. Typically, it is provided in communication with Internet 100 from a location that is spatially separated from the host network 1 10 .
- each of the content servers 112 - 118 and the pseudo proxy server 120 possess connect queues (not shown) in which they are able to receive and buffer a predetermined number of connection requests.
- the incoming requests are queued in an operating system kernel.
- the number of connection requests that can be buffered by a single server is finite and predetermined.
- a content server say, server 112
- server 112 buffers its maximum number of connection requests, any additional connection requests to that content server 112 fail. As noted, failed connection requests are undesirable.
- FIG. 2 illustrates a method of operation that may be conducted by the monitoring process in accordance with an embodiment of the present invention.
- the method may be invoked periodically, such as once per minute, or upon the receipt of a new connection request to the host network 110 .
- the monitoring process measures an arrival rate of new connection requests (Step 1010 ).
- the monitoring process also determines whether the arrival rate of customer requests exceeds a predetermined threshold (Step 1020 ). If so, the monitoring process causes the pseudo proxy server 120 to be signaled with a “recruitment” message to indicate that the pseudo proxy server 120 should thereafter provide service on behalf of the host network 110 (Step 1030 ).
- the monitoring process adds an address of the pseudo proxy server 120 to the DNS pool (Step 1040 ).
- the monitoring process removes the IP address of any pseudo proxy server from the DNS pool (Step 1050 ).
- the predetermined threshold is established according to capacity limitations of the host network 110 . For example, it may be set to 95% of the total capacity of content servers 112 - 118 or, if the capacity of line 119 could be bandwidth-limiting to the host network 110 , to 95% of the bandwidth limit of line 119 .
- a first call to the method 1000 will cause the address of the pseudo proxy server to be added to the DNS pool.
- name server requests to the DNS server 111 will cause the IP address of the pseudo proxy server 120 to be returned to the client terminal 130 .
- the client terminal 130 will direct its connection request tot he pseudo proxy server 120 rather than a content server of the host network 110 .
- requests to the congested content servers 112 - 118 will decrease instantly by a factor of 1/(n+1), where n is the number of content servers provided in the host network 110 . This decrease in customer requests that are processed within the host network 110 permits the congested content servers 112 - 118 to reduce the number of buffered requests and work their way out of a congested state.
- the present invention cooperates with traditional Internet routing.
- the Internet 100 also is populated by a number of DNS servers 140 - 170 organized into a predetermined hierarchy of levels.
- a client terminal 130 attempts to connect to a host network 110 , it communicates with a closest DNS server 140 to resolve the host's machine address (www.att.com) to an IP address.
- the DNS server 140 may or may not have stored a copy of the DNS pool stored by DNS 111 . If it does not, the DNS server 140 communicates with other DNS servers of the Internet 100 to resolve the machine address into an IP address.
- DNS server 140 obtains a copy of the DNS pool, it selects one of the IP addresses and provides it to the client terminal 130 .
- the client terminal directs a connection request to the selected content server (say, server 112 ).
- the DNS server 140 After the machine address is resolved, the DNS server 140 also stores the DNS pool locally. If it receives the same machine address from the same client terminal (or another terminal), it may resolve the machine address without having to communicate with other servers. Typically, each DNS server 140 - 180 of the Internet 100 stores a DNS pool only for a predetermined time; they expire when the predetermined time period concludes.
- the method 1000 may continue to operate even after a first pseudo proxy server 120 is engaged. If the rate of connection requests to the host network 110 continues to rise and the host network again reaches a congestion condition, the method 1000 may engage additional pseudo proxy servers (not shown).
- FIG. 3 illustrates a method of operation of the pseudo-proxy server 120 conducted in accordance with an embodiment of the present invention.
- the method 2000 may begin when the pseudo proxy server 120 receives a request that has been routed to it (Step 2010 ). Upon receipt, the pseudo proxy server 120 determines whether it possesses valid data that can satisfy the data request (Step 2020 ). If so, the pseudo proxy server 120 furnishes the requested data in response to the data request (Step 2030 ).
- the pseudo proxy server 120 If the pseudo proxy server 120 cannot satisfy the data request, it requests data from the host network 110 (Step 2040 ). Upon receipt of the requested data, the pseudo proxy server 120 stores the data (Step 2050 ) and furnishes it in response to the data request at Step 2030 .
- the pseudo proxy server 120 would be used to provide overflow service in such an event, operation of the method 2000 of FIG. 3 will cause the pseudo proxy server 120 to receive a number of data requests, each directed to the same article or set of articles. Upon receipt of the first such request, the pseudo proxy server 120 would not have a copy of the article stored locally. It would progress through Steps 2040 and 2050 to obtain one from the host network 110 . Thereafter, however, when it continues to receive requests to the same article describing breaking news, the pseudo proxy server 120 would have a copy of the article stored locally and would furnish it in a response without having to contact the host network 110 according to steps 2040 - 2050 . Again, the pseudo proxy service permits a server to be placed in service without having to store a priori all information content from the host network 110 locally at the pseudo proxy server 120 .
- the pseudo proxy server 120 may receive several requests for the same information simultaneously. That is, it may receive two requests for the same information sequentially. In response to the first received request, the pseudo proxy server 120 obtains the requested data from the host network 110 .
- the pseudo proxy server 120 may process transactions in such a way that it begins processing of a second transaction before processing of a first transaction has completed. In such an embodiment, the pseudo proxy server 120 may begin processing of the second data request before data associated with the first transaction has been received from the host network 110 according to Step 2050 .
- the pseudo proxy server 120 preferably contains software control that, for a second data request, “looks ahead” and determines whether the server 120 will receive the requested data pursuant to an earlier-received (first) data request. In such a case, the pseudo proxy server 120 may stall processing of a second data request to the same information content to avoid communicating twice with the congested host network 110 .
- the pseudo proxy server 120 may perform any number of checks to determine whether it stores a valid copy of requested data locally. In a first simplest embodiment, it may determine that data is valid if it possesses a copy of the requested data. In other embodiments, a host network may define that information content from the network is valid only for a predetermined time. For example, according to the known Hypertext Transfer Protocol (“HTTP”), data may be assigned an expiration time; data is considered valid until the expiration time is reached. Even if the pseudo proxy server 120 stores a copy of the requested data, it may determine that the copy is invalid because its age exceeds the predetermined time defined by the host network 110 . If the copy of data is invalid because it is too old, the pseudo proxy server 120 obtains another newer copy of the data according to Steps 2040 - 2050 .
- HTTP Hypertext Transfer Protocol
- the host network 110 may be configured to broadcast messages to invalidate data stored by its own content servers 112 - 118 and any pseudo proxy servers 120 that may be acting on its behalf. These “kill” messages may be broadcast by the host network 110 when information content of a data item changes. Typically, a data item is amended by a user. When the data item is amended, a server in the host network 110 addresses a kill message to all servers listed in the DNS pool of router 111 . The kill message identifies the old data item. In response, the servers 112 - 118 , 120 mark the old data items (if any are stored) as invalid.
- a pseudo proxy service may be provided as a network service to content providers.
- FIG. 4 illustrates a computer network constructed in accordance with such an embodiment.
- an Internet 200 is provided in communication with a host network 210 and a client terminal 220 .
- the Internet 200 also is provided in communication with a recruitment server 230 and a proxy network 240 .
- the proxy network 240 may be populated servers 241 - 246 according to any number of known network topologies.
- the recruitment server 230 performs administrative processes related to the pseudo proxy service. It maintains a table of all servers that may provide the pseudo proxy service to host networks. In the example of FIG. 4, the recruitment server 230 would maintain addresses of servers 242 - 246 .
- the recruitment server 230 may possess other functionality that would be conventional to a commercial service. For example, it may perform validation and billing functions that are typical to many commercial computer implemented services.
- the monitoring process of the host network 210 may operate in accordance with the method 1000 of FIG. 2. If the monitoring process reaches step 1030 , the monitoring process directs the recruitment messages to the recruitment server 230 .
- the recruitment server 230 recalls an address of an available server in the pseudo proxy network 240 (say, server 242 ) and returns the address to the host network 210 monitoring process. Thereafter, the method 1000 proceeds normally.
- the recruitment server 230 Before providing the IP address of the selected server 242 to the host network 110 , the recruitment server 230 communicates with the selected server 242 and provides it with information indicating that it should provide overflow support for host network 210 .
- the method 2000 of FIG. 3 may be performed by the server 242 selected by the recruitment server.
- the principles of the present invention also are applicable to extend server operations that require execution of server processing to fulfill data requests.
- a common example is the known Common Gateway Interface (“CGI”), a tool commonly used for creating web pages dynamically, among others.
- CGI Common Gateway Interface
- a pseudo proxy server 120 (FIG. 1) encounters a data request that requires execution of a CGI process, (and the pseudo proxy server 120 ) does not store the process, the pseudo proxy server requests the process from the host network 110 . (FIG. 3, Step 2040 ) along another that may be required to complete the data request (e.g. web page content).
- the request made by the pseudo proxy server 120 at step 2040 identifies the pseudo proxy server's status and distinguishes it from client terminals such as terminal 130 .
- the host network 110 transfers the processes (and data, if requested) to the pseudo proxy server 120 .
- the pseudo proxy server executes the process and completes the data request.
- the pseudo proxy 120 may be employed without having to modify any communication protocols that may be defined for the client terminal 130 .
- the addition or removal of a pseudo proxy server 120 is transparent to the client terminal 130 .
- the pseudo proxy server 120 operates differently than known proxies which typically have their own predefined protocol.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer And Data Communications (AREA)
- Information Transfer Between Computers (AREA)
Abstract
A pseudo proxy server is provided for a host network when the host network experiences periods of congestion. The host network determines whether an arrival rate of data requests exceeds a predetermined threshold. If so, the host network adds an address of a pseudo proxy server to a list of servers aliased to the host network. Thereafter, data requests are routed to the pseudo proxy server on a round robin basis. The pseudo proxy server may be engaged without first loading information content from the host network on the pseudo proxy server.
Description
- The present invention provides a resource management scheme for a content provider in a computer network.
- Predicting web server capacity can be a problem with serious financial repercussions. Often a hosting provider maintains a computer network and leases capacity to a content provider. The hosting provider may be contractually obligated to guarantee that it will provide server capacity sufficient to meet demand to the content provider's site. A failure to meet demand may mean lost revenue for the content provider. A failure to meet capacity guarantees may mean lost revenue to the hosting provider. On the other hand, providing static capacity for a content provider may be financially disadvantageous to the hosting provider. If a server is dedicated for the use of a first content provider but is under used, the excess capacity could be used to service a second content provider and generate additional revenues.
- Ideally, a hosting provider would provide server resources to a content provider in a manner that ebbs and flows with the demand for service from the provider's site. New servers would be added to the provider's site as the demand for the site increases. The new server may be included in a round robin DNS pool of machines and aliased to a particular host name. However, the act of booting up a server and loading it with information content from the content provider takes time. It may not be possible to load the server in enough time to meet a sharp, unexpected rise in customer demand. Accordingly, there is a need in the art for a resource management scheme for host networks that dedicates new servers to host sites in real-time with escalating demand.
- According to an embodiment of the present invention, a pseudo proxy server is provided for a host network when the host network experiences periods of congestion. When a data request is received at the host network, the host network determines whether an arrival rate of data requests exceeds a predetermined threshold. If so, the host network adds an address of a pseudo proxy server to a list of servers aliased to the host network. Thereafter, data requests are routed to the pseudo proxy server on a round robin basis. The pseudo proxy server may be engaged without first loading information content from the host network on the pseudo proxy server.
- FIG. 1 is a block diagram of a computer network constructed in accordance with an embodiment of the present invention.
- FIG. 2 is a flow diagram of a method of the host network conducted in accordance with an embodiment of the present invention.
- FIG. 3 is a flow diagram of a method of the pseudo proxy server conducted in accordance with an embodiment of the present invention.
- FIG. 4 is a block diagram of a computer network constructed in accordance with an embodiment of the present invention.
- The present invention provides a pseudo proxy server system in which unregistered servers may be made to act as if they are part of a host network on a rolling basis. The pseudo proxy server may be added to a pool of servers and provide service to customer requests immediately. According to the present invention, there is no need to copy content from the content provider to the new server prior to use. Instead, the pseudo proxy server accepts customer requests immediately and copies content only as it is requested.
- FIG. 1 illustrates a block diagram of a pseudo proxy server implemented according to an embodiment of the present invention. FIG. 1 illustrates an Internet100, a
host network 110, apseudo proxy server 120 and aclient terminal 130. Thehost network 110 may be populated by aDNS server 111 and a plurality of content servers 112-118. The host network may be connected to the Internet via ainterface line 119 such as a Ti telephone line or the like. - The content servers112-118 store information content that has been preloaded by content providers or the like. The content servers 112-118 respond to connection requests from
client terminal 130 and the like according to convention techniques in the art. The content servers 112-118 also engage in a coordinated network management process to monitor the performance of thehost network 110. As is known, a “monitoring process” of thehost network 110 monitors, for example, bandwidth availability online 119, disk or CPU availability of the various content servers 112-118 and other operating conditions of thehost network 110 that relate to its ability to handle other connection requests. The known http log monitoring process is an example of such a monitoring process. - The
DNS server 110 stores a “DNS pool” (not shown), a table that associates a machine name of thehost network 110 with the IP addresses of the content servers 112-118. An example of a machine name is “www.att.com.” Typically, when the DNS is presented with the machine name of thehost network 110, it retrieves an IP address of one of the content servers 112-118 on a round robin basis. Aclient terminal 130, once it has received the IP address of acontent server 112 would direct a connection request to the IP address. As is known, aDNS server 111 may be provided within thehost network 110 as shown in FIG. 1 but also may be provided elsewhere on Internet 100. - The pseudo
proxy server 120 is a traditional computer server. Typically, it is provided in communication with Internet 100 from a location that is spatially separated from the host network 1 10. - As is typical in the art, each of the content servers112-118 and the
pseudo proxy server 120 possess connect queues (not shown) in which they are able to receive and buffer a predetermined number of connection requests. As is known, the incoming requests are queued in an operating system kernel. The number of connection requests that can be buffered by a single server is finite and predetermined. When a content server (say, server 112) buffers its maximum number of connection requests, any additional connection requests to thatcontent server 112 fail. As noted, failed connection requests are undesirable. - FIG. 2 illustrates a method of operation that may be conducted by the monitoring process in accordance with an embodiment of the present invention. The method may be invoked periodically, such as once per minute, or upon the receipt of a new connection request to the
host network 110. According to the method, the monitoring process measures an arrival rate of new connection requests (Step 1010). The monitoring process also determines whether the arrival rate of customer requests exceeds a predetermined threshold (Step 1020). If so, the monitoring process causes thepseudo proxy server 120 to be signaled with a “recruitment” message to indicate that thepseudo proxy server 120 should thereafter provide service on behalf of the host network 110 (Step 1030). The monitoring process adds an address of thepseudo proxy server 120 to the DNS pool (Step 1040). - If, at
step 1020, the host network is not operating in a congested state, the monitoring process removes the IP address of any pseudo proxy server from the DNS pool (Step 1050). - Typically, the predetermined threshold is established according to capacity limitations of the
host network 110. For example, it may be set to 95% of the total capacity of content servers 112-118 or, if the capacity ofline 119 could be bandwidth-limiting to thehost network 110, to 95% of the bandwidth limit ofline 119. - During peak loading periods, when the arrival rate exceeds the predetermined capacity threshold, a first call to the
method 1000 will cause the address of the pseudo proxy server to be added to the DNS pool. Thereafter, name server requests to theDNS server 111 will cause the IP address of thepseudo proxy server 120 to be returned to theclient terminal 130. Theclient terminal 130 will direct its connection request tot hepseudo proxy server 120 rather than a content server of thehost network 110. Thus, requests to the congested content servers 112-118 will decrease instantly by a factor of 1/(n+1), where n is the number of content servers provided in thehost network 110. This decrease in customer requests that are processed within thehost network 110 permits the congested content servers 112-118 to reduce the number of buffered requests and work their way out of a congested state. - The present invention cooperates with traditional Internet routing. As is known, the
Internet 100 also is populated by a number of DNS servers 140-170 organized into a predetermined hierarchy of levels. When aclient terminal 130 attempts to connect to ahost network 110, it communicates with aclosest DNS server 140 to resolve the host's machine address (www.att.com) to an IP address. TheDNS server 140 may or may not have stored a copy of the DNS pool stored byDNS 111. If it does not, theDNS server 140 communicates with other DNS servers of theInternet 100 to resolve the machine address into an IP address. OnceDNS server 140 obtains a copy of the DNS pool, it selects one of the IP addresses and provides it to theclient terminal 130. The client terminal directs a connection request to the selected content server (say, server 112). - After the machine address is resolved, the
DNS server 140 also stores the DNS pool locally. If it receives the same machine address from the same client terminal (or another terminal), it may resolve the machine address without having to communicate with other servers. Typically, each DNS server 140-180 of theInternet 100 stores a DNS pool only for a predetermined time; they expire when the predetermined time period concludes. - After the congestion events subside, the DNS servers' association between the pseudo proxy server and the host network's Internet address will expire according to known techniques.
- The
method 1000 may continue to operate even after a firstpseudo proxy server 120 is engaged. If the rate of connection requests to thehost network 110 continues to rise and the host network again reaches a congestion condition, themethod 1000 may engage additional pseudo proxy servers (not shown). - Returning to FIG. 1, it will be appreciated that a percentage of customer requests are routed to the
pseudo proxy server 120 located elsewhere inInternet 100. As noted above, thepseudo proxy server 120 is not pre-loaded with information content from thehost network 110. FIG. 3 illustrates a method of operation of thepseudo-proxy server 120 conducted in accordance with an embodiment of the present invention. - The
method 2000 may begin when thepseudo proxy server 120 receives a request that has been routed to it (Step 2010). Upon receipt, thepseudo proxy server 120 determines whether it possesses valid data that can satisfy the data request (Step 2020). If so, thepseudo proxy server 120 furnishes the requested data in response to the data request (Step 2030). - If the
pseudo proxy server 120 cannot satisfy the data request, it requests data from the host network 110 (Step 2040). Upon receipt of the requested data, thepseudo proxy server 120 stores the data (Step 2050) and furnishes it in response to the data request atStep 2030. - In many applications, when a host network experiences an unexpectedly high number of data requests, the requests typically request the identical information. Consider, as an example, an application where a
host network 110 stores news. Exemplary Internet news services, at the time of this writing, may be found at www.cnn.com and www.washingtonpost.com. There may be others. These networks may store a variety of information content related to news items as diverse as national news, international news, sports and the arts. Within each topical category of news, there may be hundreds of articles relating to various newsworthy events. However, in a typical application, when a news organization experiences a unexpectedly high demand for information content, the demand will be related to a breaking news event—one that is covered in a single or very few number of news articles. - If the
pseudo proxy server 120 were used to provide overflow service in such an event, operation of themethod 2000 of FIG. 3 will cause thepseudo proxy server 120 to receive a number of data requests, each directed to the same article or set of articles. Upon receipt of the first such request, thepseudo proxy server 120 would not have a copy of the article stored locally. It would progress throughSteps host network 110. Thereafter, however, when it continues to receive requests to the same article describing breaking news, thepseudo proxy server 120 would have a copy of the article stored locally and would furnish it in a response without having to contact thehost network 110 according to steps 2040-2050. Again, the pseudo proxy service permits a server to be placed in service without having to store a priori all information content from thehost network 110 locally at thepseudo proxy server 120. - During use, the
pseudo proxy server 120 may receive several requests for the same information simultaneously. That is, it may receive two requests for the same information sequentially. In response to the first received request, thepseudo proxy server 120 obtains the requested data from thehost network 110. Thepseudo proxy server 120 may process transactions in such a way that it begins processing of a second transaction before processing of a first transaction has completed. In such an embodiment, thepseudo proxy server 120 may begin processing of the second data request before data associated with the first transaction has been received from thehost network 110 according toStep 2050. Thepseudo proxy server 120 preferably contains software control that, for a second data request, “looks ahead” and determines whether theserver 120 will receive the requested data pursuant to an earlier-received (first) data request. In such a case, thepseudo proxy server 120 may stall processing of a second data request to the same information content to avoid communicating twice with thecongested host network 110. - The
pseudo proxy server 120 may perform any number of checks to determine whether it stores a valid copy of requested data locally. In a first simplest embodiment, it may determine that data is valid if it possesses a copy of the requested data. In other embodiments, a host network may define that information content from the network is valid only for a predetermined time. For example, according to the known Hypertext Transfer Protocol (“HTTP”), data may be assigned an expiration time; data is considered valid until the expiration time is reached. Even if thepseudo proxy server 120 stores a copy of the requested data, it may determine that the copy is invalid because its age exceeds the predetermined time defined by thehost network 110. If the copy of data is invalid because it is too old, thepseudo proxy server 120 obtains another newer copy of the data according to Steps 2040-2050. - In other embodiments, the
host network 110 may be configured to broadcast messages to invalidate data stored by its own content servers 112-118 and anypseudo proxy servers 120 that may be acting on its behalf. These “kill” messages may be broadcast by thehost network 110 when information content of a data item changes. Typically, a data item is amended by a user. When the data item is amended, a server in thehost network 110 addresses a kill message to all servers listed in the DNS pool ofrouter 111. The kill message identifies the old data item. In response, the servers 112-118, 120 mark the old data items (if any are stored) as invalid. - According to an embodiment of the present invention, a pseudo proxy service may be provided as a network service to content providers. FIG. 4 illustrates a computer network constructed in accordance with such an embodiment. There, an
Internet 200 is provided in communication with ahost network 210 and aclient terminal 220. TheInternet 200 also is provided in communication with arecruitment server 230 and aproxy network 240. Theproxy network 240 may be populated servers 241-246 according to any number of known network topologies. - The
recruitment server 230 performs administrative processes related to the pseudo proxy service. It maintains a table of all servers that may provide the pseudo proxy service to host networks. In the example of FIG. 4, therecruitment server 230 would maintain addresses of servers 242-246. Therecruitment server 230 may possess other functionality that would be conventional to a commercial service. For example, it may perform validation and billing functions that are typical to many commercial computer implemented services. - In the embodiment of FIG. 4, the monitoring process of the
host network 210 may operate in accordance with themethod 1000 of FIG. 2. If the monitoring process reachesstep 1030, the monitoring process directs the recruitment messages to therecruitment server 230. Therecruitment server 230 recalls an address of an available server in the pseudo proxy network 240 (say, server 242) and returns the address to thehost network 210 monitoring process. Thereafter, themethod 1000 proceeds normally. - Before providing the IP address of the selected
server 242 to thehost network 110, therecruitment server 230 communicates with the selectedserver 242 and provides it with information indicating that it should provide overflow support forhost network 210. In the embodiment of FIG. 4, themethod 2000 of FIG. 3 may be performed by theserver 242 selected by the recruitment server. - The principles of the present invention also are applicable to extend server operations that require execution of server processing to fulfill data requests. A common example is the known Common Gateway Interface (“CGI”), a tool commonly used for creating web pages dynamically, among others. According to an embodiment of the present invention, when a pseudo proxy server120 (FIG. 1) encounters a data request that requires execution of a CGI process, (and the pseudo proxy server 120) does not store the process, the pseudo proxy server requests the process from the
host network 110. (FIG. 3, Step 2040) along another that may be required to complete the data request (e.g. web page content). In this embodiment, the request made by thepseudo proxy server 120, atstep 2040 identifies the pseudo proxy server's status and distinguishes it from client terminals such asterminal 130. In response, thehost network 110 transfers the processes (and data, if requested) to thepseudo proxy server 120. Once received, the pseudo proxy server executes the process and completes the data request. - One of the benefits of the present invention is that the
pseudo proxy 120 may be employed without having to modify any communication protocols that may be defined for theclient terminal 130. The addition or removal of apseudo proxy server 120 is transparent to theclient terminal 130. In this manner, thepseudo proxy server 120 operates differently than known proxies which typically have their own predefined protocol. - Several embodiments of the present invention are specifically illustrated and described herein. However, it will be appreciated that modifications and variations of the present invention are covered by the above teachings and within the purview of the appended claims without departing from the spirit and intended scope of the invention.
Claims (15)
1. A method for managing overflow capacity in a computer network, comprising:
when a data request is received at the computer network, determining whether an arrival rate of data requests exceeds a predetermined threshold,
if the predetermined threshold is exceeded, adding an address of a pseudo proxy server to a list of servers aliased to the computer network and sending a recruitment message to the pseudo proxy server.
2. The method of claim 1 , further comprising, thereafter routing data requests to the pseudo proxy server on a round robin basis with other servers of the computer network.
3. The method of claim 1 , wherein the predetermined threshold is a predetermined capacity of servers in the computer network.
4. The method of claim 1 , wherein the predetermined threshold is a predetermined bandwidth limit of a communications input to the computer network.
5. The method of claim 1 , wherein the pseudo proxy server is added to the list of servers without first loading information content from the computer network on the pseudo proxy server.
6. A method for fulfilling data requests at a pseudo proxy server, comprising:
receiving a data request at the pseudo proxy server,
determining whether the pseudo proxy server possesses a valid data item responsive to the data request and whether the copy is valid.
if not,
requesting the data item from a host network and
furnishing the data item in a response when it is received from the host network.
7. The method of claim 6 , wherein the determining step includes a step of determining whether the pseudo proxy server has a copy of the requested data stored locally.
8. The method of claim 6 , wherein the determining step includes a step of determining whether the pseudo proxy server has a copy of the requested data stored locally and, even if so, whether an age of the copy is less than a predetermine age limit for data items.
9. The method of claim 6 , further comprising, if the pseudo proxy server possesses a valid data item responsive to the request, furnishing the data item in a response.
10. The method of claim 6 , further comprising, storing the data item when it is received from the host network.
11. The method of claim 6 , further comprising, thereafter, when subsequent requests for the data item are received, furnishing a copy of the stored data item in response to the data request.
12. A method for filling data requests at a pseudo proxy server, comprising.
receiving a data request at the pseudo proxy server,
if the data request involves a process to be performed by the pseudo proxy server, requesting the process from a host network,
receiving the process,
performing the process, and
fulfilling the data request.
13. A pseudo proxy service system, comprising
a pseudo proxy server network populated by a plurality of pseudo proxy servers, and
a recruitment server storing network addresses of the pseudo proxy servers, selecting one of the addresses in response to a recruitment request and furnishing the selected address in a response message.
14. The pseudo proxy service system of claim 13 , wherein the recruitment server sends a message to the selected pseudo proxy server.
15. The pseudo proxy service system of claim 13 , wherein the pseudo proxy servers operate according to the method of:
receiving an external request for data, determining whether the pseudo proxy server possesses a valid data item responsive to the data request and whether the copy is valid.
if not,
requesting the data item from a host network and
furnishing the data item in a response when it is received from the host network.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/306,610 US20030084159A1 (en) | 1998-12-22 | 2002-11-27 | Pseudo proxy server providing instant overflow capacity to computer networks |
US11/239,888 US8312099B1 (en) | 1998-12-22 | 2005-09-30 | Pseudo proxy server |
US13/669,768 US8583823B2 (en) | 1998-12-22 | 2012-11-06 | Pseudo proxy server |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/217,610 US6526448B1 (en) | 1998-12-22 | 1998-12-22 | Pseudo proxy server providing instant overflow capacity to computer networks |
US10/306,610 US20030084159A1 (en) | 1998-12-22 | 2002-11-27 | Pseudo proxy server providing instant overflow capacity to computer networks |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/217,610 Division US6526448B1 (en) | 1998-12-22 | 1998-12-22 | Pseudo proxy server providing instant overflow capacity to computer networks |
Related Child Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/239,888 Continuation US8312099B1 (en) | 1998-12-22 | 2005-09-30 | Pseudo proxy server |
US13/669,768 Continuation US8583823B2 (en) | 1998-12-22 | 2012-11-06 | Pseudo proxy server |
Publications (1)
Publication Number | Publication Date |
---|---|
US20030084159A1 true US20030084159A1 (en) | 2003-05-01 |
Family
ID=22811774
Family Applications (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/217,610 Expired - Fee Related US6526448B1 (en) | 1998-12-22 | 1998-12-22 | Pseudo proxy server providing instant overflow capacity to computer networks |
US10/306,610 Abandoned US20030084159A1 (en) | 1998-12-22 | 2002-11-27 | Pseudo proxy server providing instant overflow capacity to computer networks |
US11/239,888 Expired - Fee Related US8312099B1 (en) | 1998-12-22 | 2005-09-30 | Pseudo proxy server |
US13/669,768 Expired - Fee Related US8583823B2 (en) | 1998-12-22 | 2012-11-06 | Pseudo proxy server |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/217,610 Expired - Fee Related US6526448B1 (en) | 1998-12-22 | 1998-12-22 | Pseudo proxy server providing instant overflow capacity to computer networks |
Family Applications After (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/239,888 Expired - Fee Related US8312099B1 (en) | 1998-12-22 | 2005-09-30 | Pseudo proxy server |
US13/669,768 Expired - Fee Related US8583823B2 (en) | 1998-12-22 | 2012-11-06 | Pseudo proxy server |
Country Status (1)
Country | Link |
---|---|
US (4) | US6526448B1 (en) |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2004023757A1 (en) * | 2002-09-07 | 2004-03-18 | International Business Machines Corporation | Remote dynamic configuration of a web server to provide capacity on demand |
US20060136490A1 (en) * | 2004-12-17 | 2006-06-22 | International Business Machines Corporation | Autonomic creation of shared workflow components in a provisioning management system using multi-level resource pools |
US20060178953A1 (en) * | 2004-12-17 | 2006-08-10 | International Business Machines Corporation | System and method for identification of discrepancies in actual and expected inventories in computing environment having multiple provisioning orchestration server pool boundaries |
US20060190775A1 (en) * | 2005-02-17 | 2006-08-24 | International Business Machines Corporation | Creation of highly available pseudo-clone standby servers for rapid failover provisioning |
US20070282652A1 (en) * | 2006-06-05 | 2007-12-06 | International Business Machines Corporation | System, Method and Program Product for Providing Policy Hierarchy in an Enterprise Data Processing System |
US20080201331A1 (en) * | 2007-02-15 | 2008-08-21 | Bjorn Marius Aamodt Eriksen | Systems and Methods for Cache Optimization |
US20080287142A1 (en) * | 2004-07-22 | 2008-11-20 | Keighran Benjamin W | Location Dependent Content Provision |
US20090037393A1 (en) * | 2004-06-30 | 2009-02-05 | Eric Russell Fredricksen | System and Method of Accessing a Document Efficiently Through Multi-Tier Web Caching |
US20090119359A1 (en) * | 2004-03-29 | 2009-05-07 | Cyber-Ark Software Ltd. | Server, computerized network including same, and method for increasing level of efficiency of a network |
US20100017638A1 (en) * | 2002-12-03 | 2010-01-21 | The Research Foundation Of State University Of New York | System and Method for Reducing Power Requirements of Microprocessors Through Dynamic Allocation of Datapath Resources |
US20100061233A1 (en) * | 2008-09-11 | 2010-03-11 | International Business Machines Corporation | Flow control in a distributed environment |
US8224942B1 (en) * | 2007-10-02 | 2012-07-17 | Google Inc. | Network failure detection |
US8224964B1 (en) | 2004-06-30 | 2012-07-17 | Google Inc. | System and method of accessing a document efficiently through multi-tier web caching |
US20130246628A1 (en) * | 2008-02-14 | 2013-09-19 | Mykhaylo Melnyk | System, method, and computer program product for managing at least one aspect of a connection based on application behavior |
US8676922B1 (en) | 2004-06-30 | 2014-03-18 | Google Inc. | Automatic proxy setting modification |
US8812651B1 (en) | 2007-02-15 | 2014-08-19 | Google Inc. | Systems and methods for client cache awareness |
US20140250539A1 (en) * | 2012-09-14 | 2014-09-04 | Sheng-Yuan SHIH | Real-Time Management System for Mobile Electronic Devices |
US9485007B2 (en) | 2011-06-03 | 2016-11-01 | Samsung Electronics Co., Ltd. | Repeater, broadcast transmitting system and method for relaying broadcast signal |
US20210181992A1 (en) * | 2018-08-27 | 2021-06-17 | Huawei Technologies Co., Ltd. | Data storage method and apparatus, and storage system |
WO2022150055A1 (en) * | 2021-01-07 | 2022-07-14 | Home Depot International, Inc. | Systems and methods for interactive voice response auto-scaling |
US11886914B1 (en) | 2009-07-21 | 2024-01-30 | The Research Foundation For The State University Of New York | Energy efficient scheduling for computing systems and method therefor |
Families Citing this family (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6526448B1 (en) * | 1998-12-22 | 2003-02-25 | At&T Corp. | Pseudo proxy server providing instant overflow capacity to computer networks |
US7185114B1 (en) * | 1999-08-07 | 2007-02-27 | Shrikumar Hariharasubrahmanian | Virtual memory systems and methods |
US7197491B1 (en) * | 1999-09-21 | 2007-03-27 | International Business Machines Corporation | Architecture and implementation of a dynamic RMI server configuration hierarchy to support federated search and update across heterogeneous datastores |
US6820133B1 (en) * | 2000-02-07 | 2004-11-16 | Netli, Inc. | System and method for high-performance delivery of web content using high-performance communications protocol between the first and second specialized intermediate nodes to optimize a measure of communications performance between the source and the destination |
US6751668B1 (en) * | 2000-03-14 | 2004-06-15 | Watchguard Technologies, Inc. | Denial-of-service attack blocking with selective passing and flexible monitoring |
US6823380B1 (en) * | 2000-08-07 | 2004-11-23 | Microsoft Corporation | System and method providing continual rate requests |
US7463626B2 (en) * | 2000-11-21 | 2008-12-09 | Roy Subhash C | Phase and frequency drift and jitter compensation in a distributed telecommunications switch |
US7587500B2 (en) * | 2001-01-10 | 2009-09-08 | Xcelera | Distributed selection of a content server |
US7032048B2 (en) * | 2001-07-30 | 2006-04-18 | International Business Machines Corporation | Method, system, and program products for distributed content throttling in a computing environment |
US8819252B1 (en) | 2002-05-03 | 2014-08-26 | Foundry Networks, Llc | Transaction rate limiting |
US7707295B1 (en) * | 2002-05-03 | 2010-04-27 | Foundry Networks, Inc. | Connection rate limiting |
US8554929B1 (en) | 2002-05-03 | 2013-10-08 | Foundry Networks, Llc | Connection rate limiting for server load balancing and transparent cache switching |
US7844717B2 (en) * | 2003-07-18 | 2010-11-30 | Herz Frederick S M | Use of proxy servers and pseudonymous transactions to maintain individual's privacy in the competitive business of maintaining personal history databases |
US7325060B2 (en) * | 2004-03-15 | 2008-01-29 | Micrel, Inc. | Management system for hardware network devices |
JP4512192B2 (en) * | 2005-02-09 | 2010-07-28 | 株式会社日立製作所 | Congestion control device and network congestion control method |
US7895646B2 (en) | 2006-05-25 | 2011-02-22 | International Business Machines Corporation | IKE daemon self-adjusting negotiation throttle |
US9603191B2 (en) * | 2008-04-03 | 2017-03-21 | Telefonaktiebolaget Lm Ericsson (Publ) | Apparatus and method for providing access to internet resources in a wireless communications network |
US8365259B2 (en) * | 2008-05-28 | 2013-01-29 | Zscaler, Inc. | Security message processing |
US8793313B2 (en) | 2011-09-08 | 2014-07-29 | Red 5 Studios, Inc. | Systems, methods and media for distributing peer-to-peer communications |
US8834268B2 (en) | 2012-07-13 | 2014-09-16 | Red 5 Studios, Inc. | Peripheral device control and usage in a broadcaster mode for gaming environments |
US8795086B2 (en) | 2012-07-20 | 2014-08-05 | Red 5 Studios, Inc. | Referee mode within gaming environments |
CN102869003A (en) * | 2012-08-28 | 2013-01-09 | 中兴通讯股份有限公司 | Method for distributing service contents in heterogeneous network and service management platform |
US9621600B2 (en) * | 2013-02-26 | 2017-04-11 | PortAura Group | Method and system for providing recommendations using location information |
KR101773275B1 (en) | 2013-03-14 | 2017-08-31 | 애플 인크. | Media delivery service protocol to support large numbers of client with error failover processes |
JP6299260B2 (en) * | 2014-02-14 | 2018-03-28 | 富士通株式会社 | Information processing apparatus and information processing apparatus control method |
EP3348038B1 (en) | 2015-09-10 | 2021-09-08 | Vimmi Communications Ltd. | Content delivery network |
GB2546800B (en) * | 2016-01-29 | 2020-08-05 | Tectonic Interactive Ltd | System and method for managing communication sessions between clients and a server |
Citations (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5136708A (en) * | 1987-06-09 | 1992-08-04 | Oce-Nederland B.V. | Distributed office automation system with specific task assignment among workstations |
US5444848A (en) * | 1992-04-30 | 1995-08-22 | Bull Hn Information Systems Inc. | Distribution of communications connections over multiple service access points by choosing remote and local access points having lowest number of connections |
US5636216A (en) * | 1994-04-08 | 1997-06-03 | Metricom, Inc. | Method for translating internet protocol addresses to other distributed network addressing schemes |
US5678041A (en) * | 1995-06-06 | 1997-10-14 | At&T | System and method for restricting user access rights on the internet based on rating information stored in a relational database |
US5708780A (en) * | 1995-06-07 | 1998-01-13 | Open Market, Inc. | Internet server access control and monitoring systems |
US5748901A (en) * | 1996-05-21 | 1998-05-05 | Ramot University Authority Ltd. | Flow control algorithm for high speed networks |
US5835718A (en) * | 1996-04-10 | 1998-11-10 | At&T Corp | URL rewriting pseudo proxy server |
US5852717A (en) * | 1996-11-20 | 1998-12-22 | Shiva Corporation | Performance optimizations for computer networks utilizing HTTP |
US5918013A (en) * | 1996-06-03 | 1999-06-29 | Webtv Networks, Inc. | Method of transcoding documents in a network environment using a proxy server |
US6047322A (en) * | 1997-05-27 | 2000-04-04 | Ukiah Software, Inc. | Method and apparatus for quality of service management |
US6119235A (en) * | 1997-05-27 | 2000-09-12 | Ukiah Software, Inc. | Method and apparatus for quality of service management |
US6122514A (en) * | 1997-01-03 | 2000-09-19 | Cellport Systems, Inc. | Communications channel selection |
US6185598B1 (en) * | 1998-02-10 | 2001-02-06 | Digital Island, Inc. | Optimized network resource location |
US6286031B1 (en) * | 1999-01-21 | 2001-09-04 | Jerry Richard Waese | Scalable multimedia distribution method using client pull to retrieve objects in a client-specific multimedia list |
US6304892B1 (en) * | 1998-11-02 | 2001-10-16 | Hewlett-Packard Company | Management system for selective data exchanges across federated environments |
US6308216B1 (en) * | 1997-11-14 | 2001-10-23 | International Business Machines Corporation | Service request routing using quality-of-service data and network resource information |
US6343313B1 (en) * | 1996-03-26 | 2002-01-29 | Pixion, Inc. | Computer conferencing system with real-time multipoint, multi-speed, multi-stream scalability |
US6360270B1 (en) * | 1998-11-16 | 2002-03-19 | Hewlett-Packard Company | Hybrid and predictive admission control strategies for a server |
US6473401B1 (en) * | 1998-04-06 | 2002-10-29 | Iscale, Inc. | Self-scaling method for exploiting cached resources across organizational boundaries to enhance user response time and to reduce server and network load |
US6480508B1 (en) * | 1999-05-12 | 2002-11-12 | Westell, Inc. | Router-based domain name system proxy agent using address translation |
US6529597B1 (en) * | 1999-12-14 | 2003-03-04 | Daniel T. Barrett | System and method for automated contact management |
US6640239B1 (en) * | 1999-11-10 | 2003-10-28 | Garuda Network Corporation | Apparatus and method for intelligent scalable switching network |
US6685478B2 (en) * | 1998-07-06 | 2004-02-03 | Chi Fai Ho | Inexpensive computer-aided learning methods and apparatus for learners |
Family Cites Families (42)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5291550A (en) | 1990-12-26 | 1994-03-01 | At&T Bell Laboratories | Dynamic network call distributor |
US5583994A (en) * | 1994-02-07 | 1996-12-10 | Regents Of The University Of California | System for efficient delivery of multimedia information using hierarchical network of servers selectively caching program for a selected time period |
US5530744A (en) | 1994-09-20 | 1996-06-25 | At&T Corp. | Method and system for dynamic customized call routing |
CA2162200A1 (en) * | 1994-11-23 | 1996-05-24 | Gagan Lal Choudhury | Efficiently providing multiple grades of service with protection against overloads in shared resources |
US5860071A (en) | 1997-02-07 | 1999-01-12 | At&T Corp | Querying and navigating changes in web repositories |
US5745697A (en) | 1996-03-27 | 1998-04-28 | Digital Equipment Corporation | Network flow control having intermediate node scalability to a large numbers of virtual circuits |
US5802062A (en) | 1996-06-19 | 1998-09-01 | At&T Corp | Preventing conflicts in distributed systems |
US5870557A (en) | 1996-07-15 | 1999-02-09 | At&T Corp | Method for determining and reporting a level of network activity on a communications network using a routing analyzer and advisor |
US5805820A (en) | 1996-07-15 | 1998-09-08 | At&T Corp. | Method and apparatus for restricting access to private information in domain name systems by redirecting query requests |
US5897632A (en) | 1996-08-27 | 1999-04-27 | At&T Corp | Method and system for using materialized views to evaluate queries involving aggregation |
US5931904A (en) | 1996-10-11 | 1999-08-03 | At&T Corp. | Method for reducing the delay between the time a data page is requested and the time the data page is displayed |
US5787470A (en) | 1996-10-18 | 1998-07-28 | At&T Corp | Inter-cache protocol for improved WEB performance |
US5805599A (en) | 1996-12-04 | 1998-09-08 | At&T Corp. | Adaptive channel allocation system for communication network |
US5974028A (en) | 1997-02-24 | 1999-10-26 | At&T Corp. | System and method for improving transport protocol performance in communication networks having lossy links |
US6470389B1 (en) | 1997-03-14 | 2002-10-22 | Lucent Technologies Inc. | Hosting a network service on a cluster of servers using a single-address image |
US6075796A (en) | 1997-03-17 | 2000-06-13 | At&T | Methods and apparatus for providing improved quality of packet transmission in applications such as internet telephony |
US5878218A (en) * | 1997-03-17 | 1999-03-02 | International Business Machines Corporation | Method and system for creating and utilizing common caches for internetworks |
US5946324A (en) | 1997-04-04 | 1999-08-31 | At&T Corp. | Method for fair allocation of bandwidth |
US6269078B1 (en) | 1997-04-04 | 2001-07-31 | T. V. Lakshman | Method and apparatus for supporting compressed video with explicit rate congestion control |
US5933849A (en) | 1997-04-10 | 1999-08-03 | At&T Corp | Scalable distributed caching system and method |
US6578113B2 (en) | 1997-06-02 | 2003-06-10 | At&T Corp. | Method for cache validation for proxy caches |
US6310857B1 (en) | 1997-06-16 | 2001-10-30 | At&T Corp. | Method and apparatus for smoothing and multiplexing video data flows |
US6047332A (en) * | 1997-06-30 | 2000-04-04 | Sun Microsystems, Inc. | Global file system-based system and method for rendering devices on a cluster globally visible |
US6021426A (en) | 1997-07-31 | 2000-02-01 | At&T Corp | Method and apparatus for dynamic data transfer on a web page |
US6078956A (en) * | 1997-09-08 | 2000-06-20 | International Business Machines Corporation | World wide web end user response time monitor |
JPH11110311A (en) * | 1997-09-30 | 1999-04-23 | Canon Inc | Information processing system, device, method and storage medium |
US6070191A (en) * | 1997-10-17 | 2000-05-30 | Lucent Technologies Inc. | Data distribution techniques for load-balanced fault-tolerant web access |
US6253234B1 (en) * | 1997-10-17 | 2001-06-26 | International Business Machines Corporation | Shared web page caching at browsers for an intranet |
US6438101B1 (en) | 1997-12-23 | 2002-08-20 | At&T Corp. | Method and apparatus for managing congestion within an internetwork using window adaptation |
US6119171A (en) * | 1998-01-29 | 2000-09-12 | Ip Dynamics, Inc. | Domain name routing |
US6170013B1 (en) * | 1998-03-27 | 2001-01-02 | Nortel Networks Limited | Method and apparatus for controlling access to network information sources |
US6330561B1 (en) | 1998-06-26 | 2001-12-11 | At&T Corp. | Method and apparatus for improving end to end performance of a data network |
US6526448B1 (en) * | 1998-12-22 | 2003-02-25 | At&T Corp. | Pseudo proxy server providing instant overflow capacity to computer networks |
US6615166B1 (en) * | 1999-05-27 | 2003-09-02 | Accenture Llp | Prioritizing components of a network framework required for implementation of technology |
US6721713B1 (en) * | 1999-05-27 | 2004-04-13 | Andersen Consulting Llp | Business alliance identification in a web architecture framework |
US6536037B1 (en) * | 1999-05-27 | 2003-03-18 | Accenture Llp | Identification of redundancies and omissions among components of a web based architecture |
US7315826B1 (en) * | 1999-05-27 | 2008-01-01 | Accenture, Llp | Comparatively analyzing vendors of components required for a web-based architecture |
US7861174B2 (en) * | 2000-09-08 | 2010-12-28 | Oracle International Corporation | Method and system for assembling concurrently-generated content |
US20030041097A1 (en) * | 2001-07-11 | 2003-02-27 | Alexander Tormasov | Distributed transactional network storage system |
US7805382B2 (en) * | 2005-04-11 | 2010-09-28 | Mkt10, Inc. | Match-based employment system and method |
EP1920393A2 (en) * | 2005-07-22 | 2008-05-14 | Yogesh Chunilal Rathod | Universal knowledge management and desktop search system |
US7769834B2 (en) * | 2006-05-30 | 2010-08-03 | Riverbed Technology, Inc. | System for selecting a proxy pair based on configurations of autodiscovered proxies on a network |
-
1998
- 1998-12-22 US US09/217,610 patent/US6526448B1/en not_active Expired - Fee Related
-
2002
- 2002-11-27 US US10/306,610 patent/US20030084159A1/en not_active Abandoned
-
2005
- 2005-09-30 US US11/239,888 patent/US8312099B1/en not_active Expired - Fee Related
-
2012
- 2012-11-06 US US13/669,768 patent/US8583823B2/en not_active Expired - Fee Related
Patent Citations (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5136708A (en) * | 1987-06-09 | 1992-08-04 | Oce-Nederland B.V. | Distributed office automation system with specific task assignment among workstations |
US5444848A (en) * | 1992-04-30 | 1995-08-22 | Bull Hn Information Systems Inc. | Distribution of communications connections over multiple service access points by choosing remote and local access points having lowest number of connections |
US5636216A (en) * | 1994-04-08 | 1997-06-03 | Metricom, Inc. | Method for translating internet protocol addresses to other distributed network addressing schemes |
US5678041A (en) * | 1995-06-06 | 1997-10-14 | At&T | System and method for restricting user access rights on the internet based on rating information stored in a relational database |
US5708780A (en) * | 1995-06-07 | 1998-01-13 | Open Market, Inc. | Internet server access control and monitoring systems |
US6343313B1 (en) * | 1996-03-26 | 2002-01-29 | Pixion, Inc. | Computer conferencing system with real-time multipoint, multi-speed, multi-stream scalability |
US5835718A (en) * | 1996-04-10 | 1998-11-10 | At&T Corp | URL rewriting pseudo proxy server |
US5748901A (en) * | 1996-05-21 | 1998-05-05 | Ramot University Authority Ltd. | Flow control algorithm for high speed networks |
US5918013A (en) * | 1996-06-03 | 1999-06-29 | Webtv Networks, Inc. | Method of transcoding documents in a network environment using a proxy server |
US5852717A (en) * | 1996-11-20 | 1998-12-22 | Shiva Corporation | Performance optimizations for computer networks utilizing HTTP |
US6122514A (en) * | 1997-01-03 | 2000-09-19 | Cellport Systems, Inc. | Communications channel selection |
US6119235A (en) * | 1997-05-27 | 2000-09-12 | Ukiah Software, Inc. | Method and apparatus for quality of service management |
US6047322A (en) * | 1997-05-27 | 2000-04-04 | Ukiah Software, Inc. | Method and apparatus for quality of service management |
US6308216B1 (en) * | 1997-11-14 | 2001-10-23 | International Business Machines Corporation | Service request routing using quality-of-service data and network resource information |
US6185598B1 (en) * | 1998-02-10 | 2001-02-06 | Digital Island, Inc. | Optimized network resource location |
US6473401B1 (en) * | 1998-04-06 | 2002-10-29 | Iscale, Inc. | Self-scaling method for exploiting cached resources across organizational boundaries to enhance user response time and to reduce server and network load |
US6685478B2 (en) * | 1998-07-06 | 2004-02-03 | Chi Fai Ho | Inexpensive computer-aided learning methods and apparatus for learners |
US6304892B1 (en) * | 1998-11-02 | 2001-10-16 | Hewlett-Packard Company | Management system for selective data exchanges across federated environments |
US6360270B1 (en) * | 1998-11-16 | 2002-03-19 | Hewlett-Packard Company | Hybrid and predictive admission control strategies for a server |
US6286031B1 (en) * | 1999-01-21 | 2001-09-04 | Jerry Richard Waese | Scalable multimedia distribution method using client pull to retrieve objects in a client-specific multimedia list |
US6480508B1 (en) * | 1999-05-12 | 2002-11-12 | Westell, Inc. | Router-based domain name system proxy agent using address translation |
US6640239B1 (en) * | 1999-11-10 | 2003-10-28 | Garuda Network Corporation | Apparatus and method for intelligent scalable switching network |
US6529597B1 (en) * | 1999-12-14 | 2003-03-04 | Daniel T. Barrett | System and method for automated contact management |
Cited By (45)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060168224A1 (en) * | 2002-09-07 | 2006-07-27 | Midgley Nicholas J | Remote dynamic configuration of a web server to facilitate capacity on demand |
WO2004023757A1 (en) * | 2002-09-07 | 2004-03-18 | International Business Machines Corporation | Remote dynamic configuration of a web server to provide capacity on demand |
US7930397B2 (en) | 2002-09-07 | 2011-04-19 | International Business Machines Corporation | Remote dynamic configuration of a web server to facilitate capacity on demand |
US8321712B2 (en) * | 2002-12-03 | 2012-11-27 | The Research Foundation Of State University Of New York | System and method for reducing power requirements of microprocessors through dynamic allocation of datapath resources |
US8700938B2 (en) | 2002-12-03 | 2014-04-15 | The Research Foundation Of State University Of New York | System and method for reducing power requirements of microprocessors through dynamic allocation of datapath resources |
US20100017638A1 (en) * | 2002-12-03 | 2010-01-21 | The Research Foundation Of State University Of New York | System and Method for Reducing Power Requirements of Microprocessors Through Dynamic Allocation of Datapath Resources |
US20090119359A1 (en) * | 2004-03-29 | 2009-05-07 | Cyber-Ark Software Ltd. | Server, computerized network including same, and method for increasing level of efficiency of a network |
US8825754B2 (en) | 2004-06-30 | 2014-09-02 | Google Inc. | Prioritized preloading of documents to client |
US8788475B2 (en) | 2004-06-30 | 2014-07-22 | Google Inc. | System and method of accessing a document efficiently through multi-tier web caching |
US20090037393A1 (en) * | 2004-06-30 | 2009-02-05 | Eric Russell Fredricksen | System and Method of Accessing a Document Efficiently Through Multi-Tier Web Caching |
US8275790B2 (en) * | 2004-06-30 | 2012-09-25 | Google Inc. | System and method of accessing a document efficiently through multi-tier web caching |
US8224964B1 (en) | 2004-06-30 | 2012-07-17 | Google Inc. | System and method of accessing a document efficiently through multi-tier web caching |
US8676922B1 (en) | 2004-06-30 | 2014-03-18 | Google Inc. | Automatic proxy setting modification |
US8639742B2 (en) | 2004-06-30 | 2014-01-28 | Google Inc. | Refreshing cached documents and storing differential document content |
US9485140B2 (en) | 2004-06-30 | 2016-11-01 | Google Inc. | Automatic proxy setting modification |
US20080287142A1 (en) * | 2004-07-22 | 2008-11-20 | Keighran Benjamin W | Location Dependent Content Provision |
US8606659B2 (en) | 2004-12-17 | 2013-12-10 | International Business Machines Corporation | Identification of discrepancies in actual and expected inventories in computing environment having multiple provisioning orchestration server pool boundaries |
US20060136490A1 (en) * | 2004-12-17 | 2006-06-22 | International Business Machines Corporation | Autonomic creation of shared workflow components in a provisioning management system using multi-level resource pools |
US20060178953A1 (en) * | 2004-12-17 | 2006-08-10 | International Business Machines Corporation | System and method for identification of discrepancies in actual and expected inventories in computing environment having multiple provisioning orchestration server pool boundaries |
US20090099942A1 (en) * | 2004-12-17 | 2009-04-16 | Vijay Kumar Aggarwal | Identification of Discrepancies in Actual and Expected Inventories in Computing Environment having Multiple Provisioning Orchestration Server Pool Boundaries |
US7499865B2 (en) | 2004-12-17 | 2009-03-03 | International Business Machines Corporation | Identification of discrepancies in actual and expected inventories in computing environment having multiple provisioning orchestration server pool boundaries |
US7953703B2 (en) * | 2005-02-17 | 2011-05-31 | International Business Machines Corporation | Creation of highly available pseudo-clone standby servers for rapid failover provisioning |
US20060190775A1 (en) * | 2005-02-17 | 2006-08-24 | International Business Machines Corporation | Creation of highly available pseudo-clone standby servers for rapid failover provisioning |
CN100392609C (en) * | 2005-02-17 | 2008-06-04 | 国际商业机器公司 | Method and system for creation of highly available pseudo-clone standby servers |
US20070282652A1 (en) * | 2006-06-05 | 2007-12-06 | International Business Machines Corporation | System, Method and Program Product for Providing Policy Hierarchy in an Enterprise Data Processing System |
US9785477B2 (en) | 2006-06-05 | 2017-10-10 | International Business Machines Corporation | Providing a policy hierarchy in an enterprise data processing system |
US8996653B1 (en) | 2007-02-15 | 2015-03-31 | Google Inc. | Systems and methods for client authentication |
US8065275B2 (en) | 2007-02-15 | 2011-11-22 | Google Inc. | Systems and methods for cache optimization |
US20080201331A1 (en) * | 2007-02-15 | 2008-08-21 | Bjorn Marius Aamodt Eriksen | Systems and Methods for Cache Optimization |
US8812651B1 (en) | 2007-02-15 | 2014-08-19 | Google Inc. | Systems and methods for client cache awareness |
US9106518B1 (en) | 2007-10-02 | 2015-08-11 | Google Inc. | Network failure detection |
US8224942B1 (en) * | 2007-10-02 | 2012-07-17 | Google Inc. | Network failure detection |
US8745195B1 (en) | 2007-10-02 | 2014-06-03 | Google Inc. | Network failure detection |
US20130246628A1 (en) * | 2008-02-14 | 2013-09-19 | Mykhaylo Melnyk | System, method, and computer program product for managing at least one aspect of a connection based on application behavior |
US8850029B2 (en) * | 2008-02-14 | 2014-09-30 | Mcafee, Inc. | System, method, and computer program product for managing at least one aspect of a connection based on application behavior |
US9282151B2 (en) | 2008-09-11 | 2016-03-08 | International Business Machines Corporation | Flow control in a distributed environment |
US20100061233A1 (en) * | 2008-09-11 | 2010-03-11 | International Business Machines Corporation | Flow control in a distributed environment |
US11886914B1 (en) | 2009-07-21 | 2024-01-30 | The Research Foundation For The State University Of New York | Energy efficient scheduling for computing systems and method therefor |
US9485007B2 (en) | 2011-06-03 | 2016-11-01 | Samsung Electronics Co., Ltd. | Repeater, broadcast transmitting system and method for relaying broadcast signal |
US9020486B2 (en) * | 2012-09-14 | 2015-04-28 | Sheng-Yuan SHIH | Real-time management system for mobile electronic devices |
US20140250539A1 (en) * | 2012-09-14 | 2014-09-04 | Sheng-Yuan SHIH | Real-Time Management System for Mobile Electronic Devices |
US20210181992A1 (en) * | 2018-08-27 | 2021-06-17 | Huawei Technologies Co., Ltd. | Data storage method and apparatus, and storage system |
US12008263B2 (en) * | 2018-08-27 | 2024-06-11 | Huawei Technologies Co., Ltd. | Garbage collection and data storage method and apparatus, and storage system |
WO2022150055A1 (en) * | 2021-01-07 | 2022-07-14 | Home Depot International, Inc. | Systems and methods for interactive voice response auto-scaling |
US11895268B2 (en) | 2021-01-07 | 2024-02-06 | Home Depot Product Authority, Llc | Systems and methods for interactive voice response auto-scaling |
Also Published As
Publication number | Publication date |
---|---|
US20130060903A1 (en) | 2013-03-07 |
US6526448B1 (en) | 2003-02-25 |
US8583823B2 (en) | 2013-11-12 |
US8312099B1 (en) | 2012-11-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6526448B1 (en) | Pseudo proxy server providing instant overflow capacity to computer networks | |
US10374955B2 (en) | Managing network computing components utilizing request routing | |
US6983318B2 (en) | Cache management method and system for storing dynamic contents | |
US7143195B2 (en) | HTTP redirector | |
US6189033B1 (en) | Method and system for providing performance guarantees for a data service system of a data access network system | |
US7761542B2 (en) | Network access control method, network system using the method and apparatuses configuring the system | |
US20200296185A1 (en) | Service request management | |
EP1552413B1 (en) | Method and system for providing on-demand content delivery for an origin server | |
US7822839B1 (en) | Method and system for accessing network services | |
US6941370B2 (en) | Dynamic proxy reconfiguration system and method to support sharing of extra capacity | |
US8423662B1 (en) | Forward request queuing in a distributed edge processing environment | |
US7403476B2 (en) | Adaptive bandwidth throttling for network services | |
US6308214B1 (en) | Self-tuning dataflow I/O core | |
US20070038729A1 (en) | Systems and methods for direction of communication traffic | |
US20060291388A1 (en) | Method and system for scaling network traffic managers | |
JPH10126445A (en) | Decomposition of name dependent on context | |
JP2001337872A (en) | Service provision system | |
Borkar et al. | Implementation of round robin policy in DNS for thresholding of distributed web server system | |
JP2002024191A (en) | Www system, traffic relief method for www server and www server | |
KR20000024543A (en) | Distributed delivery method of information | |
KR20030046911A (en) | A web application sever and method for providing dynamic contents thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |