Request modification for transparent capacity management in a carrier network
First Claim
1. For a first data network that provides users with access to data from a second external data network, a computer-implemented method comprising:
- receiving a request that originates from a user operating within the first data network, the request identifying requested content and a source for the requested content, wherein the source is accessible from the second external data network;
determining utilization of the first data network;
modifying said request when utilization of the first data network exceeds a specified level; and
passing said request to the second external data network for delivery to the source, wherein the source provides a first encoding of the requested content in response to an unmodified request and a second encoding of the requested content in response to a modified request, wherein the first encoding utilizes more resources of the first data network than the second encoding for delivering said content to the user.
3 Assignments
0 Petitions
Accused Products
Abstract
Some embodiments provide a capacity management agent that modifies content requests to adjust bandwidth consumption when streaming requested content from a content provider to a requesting user. The modifications include modifying a URL or header information of the request. The agent performs a process that receives a request for content of a content provider. The process identifies a parameter of the carrier network and modifies the request when the parameter satisfies a threshold. The process passes the request to the content provider and the content provider provides content that consumes a first set of resources in response to an unmodified request and a second set of resources in response to a modified request. When the parameter identifies congestion, the first set of resources is greater than the second set of resources. When the condition parameter identifies underutilization, the first set of resources is less than the second set of resources.
-
Citations
22 Claims
-
1. For a first data network that provides users with access to data from a second external data network, a computer-implemented method comprising:
-
receiving a request that originates from a user operating within the first data network, the request identifying requested content and a source for the requested content, wherein the source is accessible from the second external data network; determining utilization of the first data network; modifying said request when utilization of the first data network exceeds a specified level; and passing said request to the second external data network for delivery to the source, wherein the source provides a first encoding of the requested content in response to an unmodified request and a second encoding of the requested content in response to a modified request, wherein the first encoding utilizes more resources of the first data network than the second encoding for delivering said content to the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer-implemented method for providing users of a first data network with access to data from a second external data network, the computer-implemented method comprising:
-
receiving a content request that originates from a user operating within the first data network, the content request for requesting a first encoding for particular content that is hosted by a source in the second external data network; obtaining parameters for the user; modifying the content request to produce an optimized content request for selection of a second encoding of the particular content instead of the first encoding based on the user parameters prior to forwarding the content request from the first data network to the source in the second external data network; and passing the optimized content request to the second external data network for delivery to the source, wherein the source provides the second encoding for the particular content in response to receiving the optimized content request, wherein the second encoding is optimized for the user and is delivered using fewer resources of the first data network than the first encoding. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A non-transitory computer-readable storage medium with an executable program stored thereon, the program for transparently managing capacity of a first data network that provides user access to data from a second external data network, wherein the program instructs a microprocessor of an apparatus located within the first data network to perform sets of instructions for:
-
configuring a list of a plurality of content that supports a plurality of different encodings; intercepting a request identifying a first encoding of particular content from the plurality of content, said request originating from a user operating in the first data network and addressed to a source in the second external data network; selecting a second encoding from a plurality of encodings supported for the particular content based on at least one of (i) a first set of parameters identifying utilization of the first data network and (ii) a second set of parameters identifying a device of the user originating the request; modifying the request to identify the second encoding of the particular content instead of the first encoding; and passing said modified request to the second external data network for delivery to the source, wherein the source provides the second encoding for the particular content in response to receiving the modified content request. - View Dependent Claims (17, 18)
-
-
19. A non-transitory computer-readable storage medium with an executable program stored thereon, the program for transparently managing capacity of a first data network that provides user access to data from a second external data network, wherein the program instructs a microprocessor of an apparatus located within the first data network to perform sets of instructions for:
-
configuring a list of restricted content; intercepting a content request that originates from a user operating within the first data network and that is addressed to a source in the second external data network, the content request for requesting particular restricted content that is in the configured list of restricted content; and restricting access to the particular restricted content when utilization of the first data network satisfies a utilization threshold, wherein restricting access comprises passing substitute content in place of the particular restricted content. - View Dependent Claims (20, 21, 22)
-
Specification