CONTENT DELIVERY FOR CLIENT SERVER PROTOCOLS WITH USER AFFINITIES USING CONNECTION END-POINT PROXIES
First Claim
1. In a network supporting transactions between clients and servers,wherein a client is a host that requests a transaction and a server is a host that issues responses responsive to client requests and wherein packets between a client and a server travel over a network path comprising one or more hops and having one or more operating characteristic to overcome, a method of transporting data to overcome the one or more operating characteristic comprising:
- identifying user affinity for a data object, wherein user affinity of the data object indicates which user or users might be associated with the data object such that a user having user affinity to the data object is more likely to request the data object than a user not having user affinity to the data object;
dynamically identifying user locations, wherein a user location represents an association between a user and preload node, wherein a preload node is a network location wherein preloaded data can be stored to overcome at least one of the one or more operating characteristics;
transporting particular data having a specified user affinity, in advance of a client request on behalf of a particular user having a user affinity for the particular data, from a server to a preload node identified as a user location for the particular user,wherein identifying the user affinity is performed at or near the server using the data object, wherein the data object is not received from the client or the particular user.
19 Assignments
0 Petitions
Accused Products
Abstract
In a network supporting transactions between clients and servers over a network path having operating characteristics to overcome, data is transported to overcome the operating characteristics using user affinities and dynamic user location information to selectively preload data, or representations, signatures, segments, etc. of data, in order to overcome the one or more operating characteristic. Examples of operating characteristics to overcome include bandwidth limitations, errors and latency. The dynamic location information can be stored in data structures accessible by agents of a data server and the data structures are populated based on user activities with respect to proxies associated with user locations, or the dynamic location information can be obtained implicitly as proxies maintain connections after termination by clients and the use of those maintained connections for preloading of data for the users associated with those clients. The data being preloaded can be protocol-specific data or protocol-independent data.
-
Citations
17 Claims
-
1. In a network supporting transactions between clients and servers,
wherein a client is a host that requests a transaction and a server is a host that issues responses responsive to client requests and wherein packets between a client and a server travel over a network path comprising one or more hops and having one or more operating characteristic to overcome, a method of transporting data to overcome the one or more operating characteristic comprising: -
identifying user affinity for a data object, wherein user affinity of the data object indicates which user or users might be associated with the data object such that a user having user affinity to the data object is more likely to request the data object than a user not having user affinity to the data object; dynamically identifying user locations, wherein a user location represents an association between a user and preload node, wherein a preload node is a network location wherein preloaded data can be stored to overcome at least one of the one or more operating characteristics; transporting particular data having a specified user affinity, in advance of a client request on behalf of a particular user having a user affinity for the particular data, from a server to a preload node identified as a user location for the particular user, wherein identifying the user affinity is performed at or near the server using the data object, wherein the data object is not received from the client or the particular user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. In a network supporting clients, servers and proxies, wherein a client is a host that transmits requests to a server, a server is a host that issues responses responsive to client requests, and a proxy is a host that acts as a protocol intermediary between one or more clients and one or more servers, and wherein packets between a client and a server travel over a network path comprising one or more hops and having one or more operating characteristic to overcome, a method of transporting data to overcome the one or more operating characteristic, the method comprising:
-
determining a preferred proxy for one or more users by detecting a proxy used by the one or more users; storing an association between the one or more users and the preferred proxy, wherein the association is stored at least when the one or more users are not currently using the preferred proxy; detecting either a newly available data object stored on a server or a modification to an existing data object stored on a server; identifying user affinity for the detected data object, wherein user affinity of the data object indicates which user or users might be associated with the data object such that a user having user affinity to the data object is more likely to requested data object then a user and not having user affinity to the data object; identifying a preferred proxy for the user or users with user affinity associated with the detected data object, wherein the preferred proxy is determined from the stored association; and transporting the detected data object, in advance of a client request on behalf of a particular user having a user affinity for the detected data object, from a server to the preferred proxy. - View Dependent Claims (15, 16, 17)
-
Specification