US20090077205A1 - Object transfer control in a communications network - Google Patents

Object transfer control in a communications network Download PDF

Info

Publication number
US20090077205A1
US20090077205A1 US12/276,780 US27678008A US2009077205A1 US 20090077205 A1 US20090077205 A1 US 20090077205A1 US 27678008 A US27678008 A US 27678008A US 2009077205 A1 US2009077205 A1 US 2009077205A1
Authority
US
United States
Prior art keywords
priority
objects
client
component
http
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US12/276,780
Inventor
Raphael Quinet
Daniel Schaffrath
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US12/276,780 priority Critical patent/US20090077205A1/en
Publication of US20090077205A1 publication Critical patent/US20090077205A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
    • H04L67/61Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources taking into account QoS or priority requirements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/564Enhancement of application control based on intercepted application data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/568Storing data temporarily at an intermediate stage, e.g. caching
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
    • H04L67/62Establishing a time schedule for servicing the requests
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/30Definitions, standards or architectural aspects of layered protocol stacks
    • H04L69/32Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
    • H04L69/322Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
    • H04L69/329Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/563Data redirection of data network streams

Definitions

  • the invention generally relates to the field of communications networks and more particularly to an object transfer from a first network component via an intermediate component to a second network component, the second network component being remote from the first network component.
  • the transfer of information over modem communications networks like the public Internet or internal networks is based on specific transfer protocols.
  • the World Wide Web for example, which constitutes a major aspect of the Internet, uses the Hyper Text Transfer Protocol (HTTP) for exchanging files comprising text, images, sound, video, and other contents.
  • HTTP Hyper Text Transfer Protocol
  • Any WWW server contains, in addition to the files it can serve, an HTTP component that is designed to wait for HTTP requests and to handle them when they arrive.
  • a WWW browser can be considered as an HTTP client that is configured to send HTTP requests to WWW servers. Whenever a user of the browser enters a file request by either “opening” a WWW file (by typing in a Uniform Resource Locator (URL)) or by clicking on a hyper text link, the browser builds a corresponding HTTP request for the file and sends it to the destination address. The HTTP component in the destination server receives the HTTP request and returns the requested file.
  • URL Uniform Resource Locator
  • the requested file may be constituted by a Hyper Text Mark up Language (HTML) page that includes HTML code.
  • HTML Hyper Text Mark up Language
  • the browser receives the HTML page from the server and detects that the HTML code, which can be considered as an object itself, includes further objects such as (background) images, sounds, scripts or HTML frames, the browser issues further HTTP requests to the server in order to fetch the further objects which are included in the HTML code.
  • the server Upon receipt of the further HTTP requests, the server sends HTTP responses including the requested objects like images to the browser. As becomes apparent from FIG. 1 , the HTTP responses are sent from the server to the browser running on the client in the same order as the browser has issued the HTTP requests.
  • the order in which any additional objects included in the HTML code of the HTML page are requested by the browser usually depends on how the HTML page was written. For example an object that is included at the beginning of the HTML code is not necessarily displayed at the top of the HTML page because features such as tables, layers and frames allow the HTML author to use complex layouts.
  • the order in which a browser issues HTTP requests depends also on internal browser algorithms. For example some browsers use complex heuristics for generating the HTTP requests by starting with requesting the first four objects as they appear in the HTML code of the page. After the first four objects have been requested, every second object starting from the top of the area that is currently visible to the user is requested, then every fourth object and so on. Other browsers use a simpler algorithm that requests the objects one by one as they appear in the HTML code. From the above it becomes apparent that it is usually difficult to predict the order in which HTTP requests for objects referred to in an HTML code are generated.
  • HTTP/1.1 Transfer Control Protocol
  • TCP Transfer Control Protocol
  • this need is satisfied by a method of controlling in a communications network an object transfer from a first component via an intermediate (hardware or software) component to a second component which is remote from the first component, wherein the object transfer is based on a plurality of object requests relating to objects referred to in one or more codes to be processed by the second or another component of the communications network and wherein the intermediate component performs the steps of sending an object request to the first component, receiving the requested object from the first component, at least one of assessing and updating a priority of the requested object, wherein an initial priority has been assigned to the requested object on the basis of an analysis of at least one of the object request and the code that refers to the requested object, and, in dependence of the priority of the requested object, delaying the requested object or forwarding the requested object to the second component.
  • An object may itself comprise code portions referring to one or more further objects.
  • a code may itself form a (e.g. previously requested) object.
  • the overall transfer of objects is improved from a user's point of view (even if the total amount of data to be transferred is not decreased) because important objects are transferred preferentially.
  • the object transfer from the first network component to the second network component becomes more predictable. For example objects being of higher significance to the user may be assigned a higher priority and may thus be preferentially transferred to the second component.
  • objects being of lesser significance may be delayed. In the extreme case an object having a low significance may be delayed to such an extent that it is not transferred to the second component at all. This allows to control the order in which objects are received by the second component.
  • the assignment of absolute or relative priorities to objects may be performed dynamically. Once a priority has initially been assigned, this priority may be assessed with respect to specific absolute values like thresholds or with respect to priorities of other objects. Based on the assessment it can be decided whether or not an object is to be delayed. Prior to the assessment a priority initially assigned to an object may be evaluated anew with the purpose of determining whether the initial priority has to be updated.
  • the intermediate component may be operated to re-order objects received from the first component.
  • the delaying of objects is thus preferably performed such that the order in which the intermediate component receives the objects from the first component differs from the order in which the objects are forwarded to the second component.
  • the reordering may be based on the priorities of the objects to be transferred. During the reordering there might arise the situation that due to the delay of some objects the transfer of other objects is actually accelerated.
  • the object request that is sent to the first component may be generated by the intermediate component.
  • the object request may be generated by the second component and sent to the intermediate component.
  • the object request may be processed by the intermediate component and forwarded to the first component.
  • the received object may either be delayed or directly forwarded to the second component.
  • Delaying of the requested object can for example include at least one of instructing the second component to repeat the object request, suspending a connection to the second network component via which the requested object is to be forwarded, and informing the second component that the requested object will automatically (e.g. without any further object request from the second component) be forwarded to the second component at a later point in time.
  • the intermediate component may perform the steps of assigning a specific attribute to the object to be delayed, informing the second component of the attribute, receiving a reference to the attribute (e.g. the attribute itself or an unambiguous reference derived from the attribute) from the second component, and, upon receipt of the reference to the attribute, sending the delayed object to the second component or further delaying the delayed object.
  • the decision whether a delayed object is to be sent to the second component or delayed may be based on the newly assessed relative priority of the repeatedly requested object.
  • the attribute can be considered as a common denominator which enables the intermediate component and the second component to negotiate about the transfer of the object to which the attribute has been assigned.
  • the form of the attribute will depend on the characteristics of the transfer protocol that is used for the object transfer. In the case of HTTP for example, the attribute may be constituted by a virtual URL created by the intermediate component.
  • the attribute-based delay scheme of instructing the second component to repeat the object request can generally be used to delay objects and does not necessarily require that priorities have been assigned to the objects to be transferred.
  • the object may be send from the intermediate component to the second component in response to an object request received from the second component or in accordance with a pushing scheme, i.e. independently of such an object request from the second component. If the delay scheme is based on an object request received from the second component, the second component may be informed about the attribute in context with an instruction to repeat the object request. In such a case the reference to the attribute may be received by the intermediate component in context with a repeated object request from the second component.
  • the objects to be transferred to the second component may be forwarded to the second component via a single or via a plurality of connections between the intermediate component and the second component.
  • selected ones of the connections to the second component may be suspended dependent upon the (initial or updated) priorities of the requested objects that are to be forwarded via the selected ones of the connections to the second component.
  • the intermediate component may thus suspend one or more connections so that objects having a high priority can make use of the additional bandwidth that is released on the link between the intermediate component and the second component.
  • the intermediate component is preferably configured such that it ensures that a link formed by two or more connections is fully used before suspending one or more connections thereof.
  • the connection may be reopened at a later point in time in the same state in which it was closed.
  • the connection may be completely closed without saving any information about the state of the connection.
  • the second component can be informed that the one or more objects to be transmitted via the closed connection will be sent later, either in response to or independently from a (repeated) object request.
  • the object transfer may also be delayed by a priority based adjustment of the transfer speed.
  • a specific share of processing capabilities may be dynamically allocated to each object or each connection. In the case of multiple connections, all connections or at least some connections get a share of the CPU time, i.e. a share of the network bandwidth.
  • the share of processing capabilities allocated to a specific connection may be changed (e.g. decreased constantly) while one or more objects are transferred via the respective connection.
  • the object transfer is based on a plurality of object requests relating to objects referred to in one or more codes.
  • a code is readily available to at least one of the second and the intermediate component.
  • the code has yet to be loaded by either one of the second and the intermediate component.
  • the intermediate component may send a code request that has been generated by the second component or by the intermediate component to the first component or a third component that is different from the first component.
  • the requested code is received from the first or the third component, it may be analyzed by the intermediate component with respect to references to objects comprised within the code. Any references to objects contained in the code may then be assessed with the purpose of assigning (initial) priorities to the objects referred to in the received code.
  • the code received from the first or the third component may eventually be forwarded by the intermediate component to the second component.
  • the requested object contained in the response may be evaluated with respect to the received objects priority. For example at least one of the object size, the object content and a header of the response may be analyzed to that end. It can then be determined whether or not an initial priority of a received object has to be updated.
  • each object or each class of objects is stored for example by the intermediate component.
  • the stored information may comprise priority information for individual objects or a classes of objects, preferably, in the form of a priority list.
  • This priority list may be repeatedly assessed. Such an assessment can relate to at least one of updating priority information and deleting objects or classes of objects from the priority list.
  • the invention may be implemented as a hardware solution or as a software solution.
  • the invention may be realized in the form of a computer program product comprising program code portions for performing the individual steps of the invention.
  • the computer program product may be stored on a computer readable recording medium.
  • the intermediate component is implemented as a proxy component in the form of a piece of software running on the first or the second component of the communications network.
  • the intermediate component may be constituted by a separate piece of hardware like a proxy server arranged between the first and the second component in the communications network.
  • the intermediate component may include one or more appropriately configured communication interfaces for communicating with at least the first and the second component of the communications network as well as a unit for performing the processing in context with delaying of objects.
  • first link between the intermediate component and the first component and a second link between the intermediate component and the second component.
  • first link and the second link have different transfer rates.
  • a fast link may be provided between the intermediate component and the first component and a comparatively slower link may be provided between the intermediate component and the second component.
  • the first component is a network server
  • the second component is a network client
  • the intermediate component is located in the vicinity of (in terms of network links) or on the network server.
  • the intermediate component could also be located close to (in terms of network links) or on the network client. In such a case the link between the intermediate component and the second component (the network client) has a much higher capacity and lower latency than the link between the intermediate component and the first component (the network server).
  • the invention is not restricted to the case that the first component acts as network server and the second component acts as network client.
  • the intermediate component could also be used to improve the object transfer between two network clients or two network servers.
  • the intermediate component is part of a wireless communications network like a GSM, GPRS, etc. cellular network.
  • the second component may be constituted by a mobile terminal.
  • FIG. 1 is a schematic diagram illustrating a transfer of objects between a network server and a network client in accordance with HTTP;
  • FIG. 2 is a block diagram of a network system comprising an intermediate component in the form of a HTTP proxy server according to the invention
  • FIG. 3 is a block diagram of the HTTP proxy server of FIG. 2 ;
  • FIG. 4 is a schematic diagram depicting a redirection-based object delay in the network system depicted in FIG. 2 ;
  • FIG. 5 is a flow chart reflecting the steps preceding an object delay
  • FIG. 6 is a flow chart depicting the decisions involved in an object transfer according to the invention.
  • FIG. 7 is a block diagram depicting a proxy component according to the invention located on a network client.
  • FIG. 2 a block diagram of a network system 10 according to the invention is depicted.
  • the network system 10 comprises a first component in the form of a server 20 , an intermediate component in the form of a HTTP proxy server 30 and a second component in the form of a client 40 .
  • the proxy server 30 is arranged in the network system 10 such that it has a fast link 12 towards the server 20 and a comparatively slower link 14 towards the client 40 .
  • Each link 12 , 14 is constituted by a plurality of TCP connections 50 .
  • Each TCP connection 50 is configured to allow the transfer of HTTP requests and HTTP responses between the server 20 and the client 40 .
  • the proxy server 30 performs some traditional proxy functions like caching and filtering of objects. Additionally, the proxy server 30 is configured to artificially delay an object that is received from the server 20 and that is to be forwarded to the client 40 . This is done by using a combination of temporary suspension of data transfer on some connections 50 and HTTP redirection messages that force a browser running on the client 40 to repeat an object requested after a certain period of time. By using these mechanisms the proxy server 30 re-orders the HTTP responses received from the server 20 in such a way that objects having a higher priority are delivered to the client 40 first. For that purpose the proxy server 30 dynamically assigns priorities to the objects to be forwarded to the client 40 . In order to ensure that delaying of the less important objects does not cause the link 14 between the proxy server 30 and the client 40 to become idle, the proxy server 30 continuously or at least repeatedly monitors the traffic on this link 14 .
  • the proxy server 30 comprises a communications interface 32 coupled between the first link 12 to the server 20 and the second link 14 to the client 40 .
  • the communications interface 32 is configured such that it enables the sending of object requests to and the receipt of the requested objects from the server 20 .
  • a processing unit 34 of the proxy server 30 communicates with the communications interface 32 .
  • the processing unit 34 allows to assess and/or adapt the priority of any object received via the first link 12 from the server 20 .
  • the processing unit 34 allows to assign an initial priority to a requested object on the basis of an analysis of at least one of the object request and the code that refers to the requested object. Possible assignment schemes will be discussed later in more detail.
  • the processing unit 34 controls the communications interface 32 such that a requested object received from the server 20 is either delayed or forwarded via the second link 14 to the client 40 . If a requested object received from the server 20 is to be delayed, it is temporarily stored in a buffer 36 that can be accessed by both the communications interface 32 and the processing unit 34 .
  • the buffer 36 may be implemented as a software or hardware component of the processing unit 34 .
  • the processing unit 34 is additionally configured such that it allows to assign a specific attribute to an object which is to be delayed (an exemplary format of this attribute will be discussed later in more detail).
  • the processing unit 34 enables to control the communications interface 32 such that the communications interface 32 informs the client 40 about this attribute. If the communications interface 32 receives a reference to the attribute from the client 40 , the processing unit 34 evaluates this reference and controls the communications interface 32 such that the delayed object to which this attribute has previously been assigned and which is currently stored in the buffer 36 is either sent to the client 40 or further delayed. A further delay of the object stored in the buffer 36 may become necessary if objects of a higher priority have to be forwarded to the client 40 first.
  • the browser running on the client 40 issues a HTTP request for the corresponding HTML page including HTML code.
  • the HTTP request issued by the browser is received by the proxy server 30 via the link 14 and forwarded via the link 12 to the destination server 20 .
  • the server 20 replies by sending the HTML code for the requested page to the proxy server 30 , which analyzes the HTML code received from the server 20 to assign an initial priority to any kind of objects like links, frames, scripts, images, etc. referred to in the HTML code (first analysis phase).
  • the proxy server 30 forwards the HTML code via the link 14 to the client 40 .
  • the browser running on the client 40 receives the HTML page including the HTML code it processes the HTML code. If the browser detects that the HTML code includes further objects, it issues further HTTP requests for the objects referred to in the HTML code. These HTTP requests for further objects are received and evaluated by the proxy server 30 . To most of the requested objects an initial priority will have been assigned already during the proxy server's 30 previous analysis of the HTML code that it has forwarded to the server 40 . However, in this second analysis phase the proxy server 30 either assigns initial priorities to those objects to which a priority has not yet been assigned or updates the priority of such objects to which an initial priority has already been assigned. The priority is updated on the basis of additional information available in the HTTP request received from the client 40 .
  • the proxy server 30 forwards any HTTP requests for additional objects received from the client 40 to the server 20 .
  • the server 20 replies by sending the requested objects to the proxy server 30 .
  • the proxy server 30 analyzes the HTTP responses (including the requested objects) from the server 20 in a third analysis phase and updates—if necessary—the priorities of the objects comprised in the HTTP response. Additionally, the proxy server 30 assesses the relative priority of any received object with respect to the priority of previously received objects that are still stored in the buffer 36 (see FIG. 3 ) and the priorities of objects that are expected soon.
  • Information regarding the objects that will be received soon from the server 20 can be derived from the HTML code that has previously been forwarded to the client 40 or from HTTP requests from the client 40 for which the corresponding objects have not yet been received from the server 20 .
  • the proxy server 30 may be configured such that it compares a priority of an object that has just been received from the server 40 with an absolute value like a priority threshold.
  • the proxy server 30 decides if this object is to be delayed, e.g. if this object is to be temporarily stored in the buffer 36 or if the corresponding HTTP request is not yet to be forwarded to the server 20 , or if the object is to be immediately forwarded to the client 40 .
  • the intentional delay of individual objects improves the overall object transfer from a user's point of view. It is for example well known that the relative importance of the various objects included in a web page varies greatly: An image that is used to build a graphical menu may be essential for the navigation of a site, while a background image merely makes the page look nicer.
  • the invention can thus be employed to provide the user with the more important information first. As soon as there is enough information of a web page displayed on the user's screen, the user can decide to click on a link and request another web page without having to wait for the remaining (less important) parts of the previous web page that is still being transferred. As a result, the user is no longer forced to wait until some uninteresting objects are transferred before being able to see the important ones. This is especially useful in conjunction with the mobile Internet, which is usually slower and more expensive than the fixed Internet.
  • the proxy server 30 can assign or adjust the priority of an object to be sent to the client 20 during three different phases, namely when a reference to that object is found in an HTML code (i.e. in a previous object) that is to be forwarded to the client 40 , when a HTTP request relating to that object is issued by the browser running on the client 40 , or when the corresponding HTTP response containing the requested object is received from the server 20 .
  • a priority list that contains priority information for individual objects or classes of objects is either generated or updated.
  • the individual objects or classes of objects are ordered with respect to increasing or decreasing priority.
  • the order of the objects in the priority list can thus be considered as priority information.
  • additional priority information like absolute or relative priority values (numbers) may alternatively or additionally be part of the priority list.
  • the exact priority assigned to specific objects or classes of objects is implementation-dependent and in the exemplary embodiment configurable by the operator of the proxy server 30 or a user of the browser running on the client 40 .
  • the operator of the proxy server 20 could be one or several lists of URLs (using pattern matching) that allow the operator to increase or decrease the priority of the objects appearing on those lists.
  • an operator could decide to increase or decrease priority of all images downloaded from an advertising company.
  • the same possibilities may be made available to the user.
  • the user could send his preferences to the proxy server 30 . This can be done by a specific software running on the client 40 or by using designated web pages provided directly by the proxy server 30 and allowing the user to set his preferences.
  • the proxy server 30 can assign an initial priority to an object by analyzing an HTML code that has been requested by the client 40 from the server 20 .
  • references to objects referred to in the HTML code may be assessed to that end.
  • a priority list may be generated that lists individual objects which are referred to in the HTML code in the following order (objects of highest priority are mentioned first):
  • inlined images if the IMG tag includes width and height information, this information can be used to refine the priority of images depending on the expected dimensions so that smaller images get a higher priority than larger ones
  • background image page background, table background, style sheet, etc.
  • the priority of a specific object can be lowered if the object is not located on the same server 20 or on the same domain as the current HTML page.
  • a further possibility to assign or adjust the priority of an object occurs when a request for that object is issued by the browser and received by the proxy server 30 .
  • the HTTP request can be analyzed by the proxy server 30 in an URL context (second analysis phase). Since initial priorities have already been assigned during analysis of the HTML code that led to that HTTP request, analysis of the HTTP request will usually result in an adjustment of the initial priority. However, in some cases initial priorities may be assigned also (see above).
  • the adjustment or assignment of initial priorities in the second analysis phase can be performed in dependence on additional information available for example in the header of the HTTP request.
  • One or more of the following rules for updating the priorities may be implemented:
  • the adjustment of object priorities is based on an analysis of the HTTP response from the server 20 .
  • the adjustment of the priorities in the third analysis phase (as well as in the second analysis phase mentioned above) can be calculated as a weighted sum of several criteria.
  • the weights may be configurable by the operator of the proxy server 30 or the user of the browser running on the client 40 .
  • all objects will usually have a priority assigned to them. However, this priority can be updated before sending the requested objects to the client 40 .
  • the headers and contents of the HTTP responses received from the server 20 may be assessed. The priorities may then be adjusted in accordance with one or more of the following rules:
  • the proxy server 30 sets and updates the priorities of the objects that are to be transferred to the client 40 .
  • the proxy server 30 thus keeps some information about each object like the object's URL, priority, time of last request and, if required, some further parameters. However, this information can not be kept forever since otherwise the proxy server 30 would run out of memory. Moreover, if an object to which a high priority has been assigned is never requested, action is preferably taken so that it does not prevent other objects from being transferred.
  • the proxy server 30 has to reorder the objects received from the server 20 in such a manner that they are forwarded from the proxy server 30 to the client 40 in an order which reflects the order in the priority list as closely as possible.
  • the proxy server 30 reorders the objects received from the server 20 by intentionally delaying objects having a lower priority and by forwarding objects having a higher priority without any substantial delay to the client 40 .
  • the proxy server 30 uses a combination of different delay mechanisms to reorder the objects received from the server 20 .
  • two of these delay mechanisms namely suspension of TCP connections on the one hand and HTTP redirections on the other hand, will exemplarily be described in more detail
  • the link 14 between the proxy server 30 and the client 40 is constituted by a plurality of TCP connections 50 .
  • Dependent upon the priorities of the requested objects that are to be forwarded via individual ones of the connections 50 one or more of the connections 50 that are intended for the transfer of objects having a low priority are suspended. This suspension of individual connections releases some bandwidth on the link 14 that is now available for preferentially transferring objects having a higher priority. Consequently, objects having a higher priority will be delivered before objects having a lower priority.
  • suspension of an individual connection 50 is performed such that the connection 50 is left open without transferring objects for a certain period of time.
  • suspension of a connection 50 could be effected by closing the connection 50 , either with our without saving the state of the connection 50 prior to its suspension.
  • the state of the suspended connection 50 is saved, it can be opened at a later point in time in the same state as it has been suspended (i.e. closed).
  • connection 50 has the advantage that no extra data has to be sent via the link 14 .
  • a connection 50 is suspended only if the released bandwidth can be fully used by some other connections 50 for the transfer of objects having a high priority.
  • the proxy server 30 is thus configured such that it checks that the link 14 is fully used before suspending a connection 50 in order not to waste available bandwidth.
  • a possible routine for predicting if the link 14 is or will be partially idle includes comparing the average throughput (over the last N seconds) of all connections 50 going to the client 40 with the amount of data that is currently cached or buffered in the buffer 36 of the proxy server 30 (see FIG. 3 ) and is ready to be sent.
  • Other and in particular simpler techniques for estimating the utilization of the link 14 could be implemented as well, especially if the available bandwidth on the link 14 is known by other means.
  • the proxy server 30 may utilize another delay scheme.
  • a possible delay scheme that is applicable in such a case includes instructing the client 40 to repeat an object request at a later point in time.
  • HTTP specifies that any HTTP responses must be sent to the client 40 in the same order as the browser running on the client 40 has issued the HTTP requests, it is possible to instruct the browser to retry a HTTP request later. This can be done by sending a HTTP response with the status code “ 302 ” to the client 40 , together with the header field “Retry-After”. This header field tells the client 40 to retry his HTTP request after a specified amount of time. In response to the receipt of the status code “ 302 ” (possibly including the “Retry-After” header field), current browsers re-schedule the HTTP request after all pending HTTP requests have been processed.
  • the status code “ 302 ” as specified in the HTTP standard 1.1 tells the browser that a given object can be found (temporarily) at a location that is different from the one that was requested.
  • the HTTP response sent to the client 40 includes the new location of the object. This mechanism is used to implement the delay scheme according to the invention.
  • the proxy server 30 generates an attribute in the form of a new (virtual) URL for the object to be delayed.
  • the proxy server 30 then instructs the browser running on the client 40 to try the HTTP request again, using this temporary attribute (i.e. URL) as the new location of the object.
  • the browser is thus instructed to reschedule the HTTP request at a later point in time.
  • the proxy server 30 converts the attribute to the original URL and forwards the HTTP request to the server 20 .
  • the original HTTP request could have been forwarded to the server 20 after receipt thereof by the proxy server 30 .
  • the HTTP response received from the server 20 is temporarily stored by the proxy server 30 until it receives the repeated HTTP request from the client 40 .
  • the inventive delay mechanism discussed above will exemplarily be described in more detail with reference to FIGS. 4 and 5 . It will be assumed that the HTTP request received by the proxy server 30 from the client 40 relates to an object that is considered by the proxy server 30 to be of a low priority.
  • the proxy server 30 receives a HTTP request from the client 40 via the link 14 .
  • this first request from the client could have the following format:
  • the proxy server 30 redirects the client 40 in step 404 to a new (virtual) location and instructs the client 40 to wait for a certain period of time (delay) before retrying the HTTP request.
  • the redirection message from the proxy server 30 on the basis of the status code “ 302 ” as specified in the HTTP standard 1.1 can have the following format:
  • the proxy server 30 can now request the object from the server 20 at any time after receipt of the initial HTTP request from the client 40 (step 402 ) and the time at which it decides to deliver the object to the client 40 (steps 406 and 408 ).
  • the client 40 After receipt of the above redirection message the client 40 waits for a period of time specified in the redirection message, i.e. five seconds (or until all other objects have been transferred). In step 412 the client 40 then repeats his HTTP request indicating the new (virtual) location as follows:
  • the proxy server 30 Upon receipt of the repeated HTTP request from the client 40 , the proxy server 30 decides whether to delay the requested object further (e.g. by suspending a connection 50 or by a further redirection message) or whether to forward the delayed object to the client 40 . If the proxy server 30 decides to forward the delayed object without any further delay, this can be done in the following format:
  • step 502 the proxy server 30 receives the HTTP request from the client 40 .
  • step 504 the proxy server 30 determines whether the URL included in the HTTP request is a modified URL, i.e. the result of a previous redirection. If this is the case, the proxy server 30 decodes the URL and restores the original location in step 506 and moves via node 508 to step 510 . Otherwise the method directly moves from step 504 via node 508 to step 510 .
  • step 510 the proxy server 30 determines if the object requested by means of the HTTP request is already available, i.e. stored in the buffer 36 of the proxy server 30 (see FIG. 3 ). If the object is not already cached, the proxy server 30 requests the object from the server 20 or marks it for later retrieval in step 514 . From step 514 the method moves via node 512 to step 516 . Step 516 can also be reached directly from step 510 via node 512 in the case the object requested by the client 40 is already available.
  • step 516 the HTTP response including the requested object is ready to be sent to the client 40 . This corresponds to the first step in the flow chart of FIG. 6 which will be discussed below.
  • the redirection message (step 404 in FIG. 4 ) can be sent to the client 40 at any time while steps 502 to 516 are performed or after step 516 . It should be noted that the availability of an object (i.e. whether a requested object is already cached, currently in transfer or whether the object is not requested yet) is a further factor that influences the initial priority of a requested object.
  • step 602 the HTTP response is ready to be sent to the client.
  • step 604 the priority of this object is evaluated with respect to the fact whether or not the priority has to be updated. If the priority of the object has to be updated, the priority is adjusted in step 604 .
  • step 606 the current priority of the object is assessed to find out if it has the highest priority of all objects that are being transferred or that are expected soon. If it is determined in step 606 that the requested object actually has the highest priority, the method moves via node 610 to step 612 . In step 612 the requested object is sent to the client 40 .
  • step 606 If the comparison of the priority of the currently requested object with the priority of other objects in step 606 leads to the result that the currently requested object does not have the highest priority, the method continues with step 614 .
  • step 606 it should be noted that instead of comparing the priority of the currently requested object with the priorities of other objects it is also possible to compare the priority of the currently requested object with a fixed threshold or to add an offset in the comparison so that two priorities have to be different by more than a predefined threshold before the difference is considered significant enough.
  • step 614 the proxy server 30 estimates if the link 14 to the client 40 (see FIG. 2 ) is or will be idle. As explained above, there are several ways to do that. One of them comprises calculating a running average of the maximum amount of data that was sent and acknowledged during the last N seconds over all connections 50 going to the same client 40 . This gives an estimate of the maximum throughput available.
  • the result thus obtained is then compared with the amount of data that is ready to be sent on the connections 50 that are not suspended. If the proxy server 30 detects that it does not have enough data to send in order to fill the link during at least one complete round-trip time, then it considers that there is some spare bandwidth on the link 14 towards the client 40 and continues with step 616 .
  • step 616 a comparison similar to that of step 606 is performed. If it is determined in step 616 that the currently requested object has a higher priority than all objects expected soon, the proxy server 30 continues via node 610 with step 612 and sends the currently requested object immediately to the client 40 . Otherwise the method continues with step 618 and a redirection message (status code “ 302 ”) is sent to the client 40 as discussed above in conjunction with FIG. 4 .
  • the decision taken in step 616 can be influenced by the size of the currently requested object (if it is already known). If the object is known to be small (e.g. less than twice the size of a redirection message), then the proxy server will always send the object instead of sending a redirection message, even if the object had been assigned a very low priority until then (this can be considered as one way of updating the priority).
  • step 614 If it is determined in step 614 that there is enough data to be sent in order to fill the link 14 , the method continues with step 620 and suspends the connection 50 to the client 40 via which the currently requested object is to be transferred.
  • step 622 the proxy server 30 re-evaluates all suspended connections 50 to find out whether any one of the suspended connections 50 are to be opened again.
  • the HTTP/1.1 protocol supports the pipelining option, which allows the client 40 to send several requests to the server 20 or proxy server 30 on the same TCP connection without waiting for the previous replies.
  • pipelining is used, more than one object that is ready to be sent could be sent on the same connection 50 towards the client 40 . It is apparent that in such a case an object having a low priority could block a second object having a high priority that is to be sent on the same connection 50 . If there are several objects waiting on the same connection 50 , the maximum or average priority of these objects may be determined and considered in steps 606 and 616 . This ensures that objects of lower priority do not block objects of higher priority.
  • One of these extension relates to constraining the transfer speed on link 14 in dependence of the priority of the objects to be transferred. This could be done for example by allocating a specific share of processing capabilities to each connection 50 depending on the priority of the objects to be transferred. The priority of the individual objects is decreased while the process is running. If the proxy server 30 processes connections 50 in a round-robin fashion, this feature can be implemented by limiting the amount of data transferred per round on each connection 50 by a number that is derived from the priority of that object.
  • the dynamic allocation of processing capabilities can advantageously be combined with the suspension and redirection mechanisms discussed above.
  • the processing capabilities can also include any transformation of the objects or codes being transferred.
  • the priorities are assigned directly by the browser running on the client 40 .
  • the browser can then schedule the HTTP requests for individual objects according to their priority. If the priorities are assigned directly by the browser, there are some additional factors that can be used for refining the priority of each object:
  • the browser knows when a user selects a new HTML page from the bookmarks or by typing in a new URL. The browser can thus clear the list of objects that are no longer required.
  • a further extension of the invention relates to a proxy component that is located on the same computer (client) as the browser or close to this computer in terms of network links. This situation is depicted in FIG. 7 .
  • the client 40 not only comprises a browser component 42 but an additional proxy component 30 (having the structure shown in FIG. 3 ) in communication with the browser component 42 .
  • the link 14 between the proxy component 30 and the browser component 42 has a much higher capacity and lower latency than the link 12 between the proxy component and the server 20 (not depicted in FIG. 7 ).
  • the client-side proxy component 30 influences the request stream because it cannot do much on the response stream. Based on the priority information derived from the current HTTP request and previous HTTP responses (e.g. previous HTML codes referring to further objects) as well as an estimate of the link availability, the client-side proxy component 30 will decide if a HTTP request should be forwarded to the server and/or if it should reply immediately with a redirection message.
  • previous HTTP responses e.g. previous HTML codes referring to further objects
  • the decisions to be taken are simpler than depicted in the flow chart of FIG. 6 . More particularly, the decisions can be reduced to evaluating if the currently requested object has a lower priority than some of the objects being transferred or expected to be transferred soon and if the link is already fully used. If both conditions are given, then a redirection message is sent to the browser component 42 . In all other cases, the HTTP request is immediately forwarded to the server.
  • the client-side proxy component 30 can suspend the HTTP request until it can take the decision. It will have to take a decision at the latest when the previous objects have been fully received.
  • a still further extension of the invention relates to the blocking of downloads for some objects based on their priority. This means that the priority that is assigned to the objects can also be used to block the objects completely. If a threshold on the priority has been set, any object that has a priority that is lower than this threshold will not be sent to the client 40 . In this case the proxy server (or proxy component) 30 would simply return one of the “4xx” or “5xx” status codes defined in the HTTP/1.1 standard to the client 40 when it detects such an object. Possible status codes are “ 403 forbidden”, “ 409 conflict” or “ 503 service unavailable”.
  • a pre-fetching mechanism allows the proxy server 30 to fill its buffer 36 (see FIG. 3 ) with some objects before the client 40 actually requests them.
  • Such a pre-fetching mechanism may for example be based on the analysis of a HTML code that is sent from the proxy server 30 to the client 40 and that includes references to further objects.
  • the proxy component 30 Based on the analysis of the references to the objects the proxy component 30 assigns priorities to the individual objects and on the basis of this assignment it is defined which objects are to be pre-fetched and in what order.
  • the objects are pre-fetched starting with the objects having the highest priority.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Information Transfer Between Computers (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Polymers With Sulfur, Phosphorus Or Metals In The Main Chain (AREA)
  • Communication Control (AREA)
  • Small-Scale Networks (AREA)

Abstract

A method and an intermediate component for controlling in a communications network an object transfer from a first network component via the intermediate component to a second network component which is remote from the first network component are described. The object transfer is based on a plurality of object requests relating to objects referred to in one or more codes to be processed by the second network component or another network component. The intermediate component forms the steps of sending an object request to the first network component, receiving the requested object from the first network component, updating and/or assessing a priority of the requested object, and, in dependence of the priority of the requested object, delaying the requested object or forwarding the requested object to the second network component. An initial priority is assigned to the requested objects on the basis of an analysis of at least one of the object request and the code that refers to the requested object.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application is a continuation of U.S. application Ser. No. 10/509,979, filed Mar. 18,2005, now pending, which was the National Stage of International Application No. PCT/EP02/03802, filed Apr. 5, 2002, the disclosure of which is incorporated herein by reference.
  • BACKGROUND
  • 1. Technical Field
  • The invention generally relates to the field of communications networks and more particularly to an object transfer from a first network component via an intermediate component to a second network component, the second network component being remote from the first network component.
  • 2. Description of the Prior Art
  • The transfer of information over modem communications networks like the public Internet or internal networks is based on specific transfer protocols. The World Wide Web for example, which constitutes a major aspect of the Internet, uses the Hyper Text Transfer Protocol (HTTP) for exchanging files comprising text, images, sound, video, and other contents.
  • Any WWW server contains, in addition to the files it can serve, an HTTP component that is designed to wait for HTTP requests and to handle them when they arrive. A WWW browser can be considered as an HTTP client that is configured to send HTTP requests to WWW servers. Whenever a user of the browser enters a file request by either “opening” a WWW file (by typing in a Uniform Resource Locator (URL)) or by clicking on a hyper text link, the browser builds a corresponding HTTP request for the file and sends it to the destination address. The HTTP component in the destination server receives the HTTP request and returns the requested file.
  • The requested file may be constituted by a Hyper Text Mark up Language (HTML) page that includes HTML code. When the browser receives the HTML page from the server and detects that the HTML code, which can be considered as an object itself, includes further objects such as (background) images, sounds, scripts or HTML frames, the browser issues further HTTP requests to the server in order to fetch the further objects which are included in the HTML code. Upon receipt of the further HTTP requests, the server sends HTTP responses including the requested objects like images to the browser. As becomes apparent from FIG. 1, the HTTP responses are sent from the server to the browser running on the client in the same order as the browser has issued the HTTP requests.
  • The order in which any additional objects included in the HTML code of the HTML page are requested by the browser usually depends on how the HTML page was written. For example an object that is included at the beginning of the HTML code is not necessarily displayed at the top of the HTML page because features such as tables, layers and frames allow the HTML author to use complex layouts. In addition, the order in which a browser issues HTTP requests depends also on internal browser algorithms. For example some browsers use complex heuristics for generating the HTTP requests by starting with requesting the first four objects as they appear in the HTML code of the page. After the first four objects have been requested, every second object starting from the top of the area that is currently visible to the user is requested, then every fourth object and so on. Other browsers use a simpler algorithm that requests the objects one by one as they appear in the HTML code. From the above it becomes apparent that it is usually difficult to predict the order in which HTTP requests for objects referred to in an HTML code are generated.
  • Moreover, it is difficult to predict the order in which requested objects are received by the browser. Although the current HTTP standard (HTTP/1.1) requires that on each Transfer Control Protocol (TCP) connection the HTTP responses are sent from the server to the browser in the same order as the HTTP requests are received by the server, the order in which HTTP responses are received becomes unpredictable as soon as more than one connection is opened to the server. The reason therefore is the fact that due to varying network conditions and different request processing times, some connections may transfer HTTP responses faster than others.
  • There is a need for a method and a device that enable an improved transfer of objects from a first network component to a second network component which is remote from the first network component.
  • SUMMARY OF THE INVENTION
  • According to one aspect of the invention this need is satisfied by a method of controlling in a communications network an object transfer from a first component via an intermediate (hardware or software) component to a second component which is remote from the first component, wherein the object transfer is based on a plurality of object requests relating to objects referred to in one or more codes to be processed by the second or another component of the communications network and wherein the intermediate component performs the steps of sending an object request to the first component, receiving the requested object from the first component, at least one of assessing and updating a priority of the requested object, wherein an initial priority has been assigned to the requested object on the basis of an analysis of at least one of the object request and the code that refers to the requested object, and, in dependence of the priority of the requested object, delaying the requested object or forwarding the requested object to the second component. An object may itself comprise code portions referring to one or more further objects. Furthermore, a code may itself form a (e.g. previously requested) object.
  • By intentionally delaying the object transfer based on an assigned priority, the overall transfer of objects is improved from a user's point of view (even if the total amount of data to be transferred is not decreased) because important objects are transferred preferentially. Furthermore, by implementing appropriate priority assignment schemes the object transfer from the first network component to the second network component becomes more predictable. For example objects being of higher significance to the user may be assigned a higher priority and may thus be preferentially transferred to the second component. On the other hand, objects being of lesser significance may be delayed. In the extreme case an object having a low significance may be delayed to such an extent that it is not transferred to the second component at all. This allows to control the order in which objects are received by the second component.
  • The assignment of absolute or relative priorities to objects (or classes of objects) may be performed dynamically. Once a priority has initially been assigned, this priority may be assessed with respect to specific absolute values like thresholds or with respect to priorities of other objects. Based on the assessment it can be decided whether or not an object is to be delayed. Prior to the assessment a priority initially assigned to an object may be evaluated anew with the purpose of determining whether the initial priority has to be updated.
  • The intermediate component may be operated to re-order objects received from the first component. The delaying of objects is thus preferably performed such that the order in which the intermediate component receives the objects from the first component differs from the order in which the objects are forwarded to the second component. The reordering may be based on the priorities of the objects to be transferred. During the reordering there might arise the situation that due to the delay of some objects the transfer of other objects is actually accelerated.
  • The object request that is sent to the first component may be generated by the intermediate component. When the requested object is received by the intermediate component, it “pushes” it to the second component without having received an explicit object request from the second component. Alternatively, the object request may be generated by the second component and sent to the intermediate component. Upon receipt of the object request from the second component, it may be processed by the intermediate component and forwarded to the first component.
  • When the intermediate component receives the requested object from the first component, the received object may either be delayed or directly forwarded to the second component. There exist various possibilities how the requested object that is received by the intermediate component can be delayed. Delaying of the requested object can for example include at least one of instructing the second component to repeat the object request, suspending a connection to the second network component via which the requested object is to be forwarded, and informing the second component that the requested object will automatically (e.g. without any further object request from the second component) be forwarded to the second component at a later point in time.
  • If delaying of the requested object includes instructing the second component to repeat the object request, the intermediate component may perform the steps of assigning a specific attribute to the object to be delayed, informing the second component of the attribute, receiving a reference to the attribute (e.g. the attribute itself or an unambiguous reference derived from the attribute) from the second component, and, upon receipt of the reference to the attribute, sending the delayed object to the second component or further delaying the delayed object. The decision whether a delayed object is to be sent to the second component or delayed further may be based on the newly assessed relative priority of the repeatedly requested object.
  • The attribute can be considered as a common denominator which enables the intermediate component and the second component to negotiate about the transfer of the object to which the attribute has been assigned. Usually, the form of the attribute will depend on the characteristics of the transfer protocol that is used for the object transfer. In the case of HTTP for example, the attribute may be constituted by a virtual URL created by the intermediate component. It should be noted that the attribute-based delay scheme of instructing the second component to repeat the object request can generally be used to delay objects and does not necessarily require that priorities have been assigned to the objects to be transferred.
  • In the attribute-based delay scheme the object may be send from the intermediate component to the second component in response to an object request received from the second component or in accordance with a pushing scheme, i.e. independently of such an object request from the second component. If the delay scheme is based on an object request received from the second component, the second component may be informed about the attribute in context with an instruction to repeat the object request. In such a case the reference to the attribute may be received by the intermediate component in context with a repeated object request from the second component.
  • The objects to be transferred to the second component may be forwarded to the second component via a single or via a plurality of connections between the intermediate component and the second component. In such a multiple connections scenario selected ones of the connections to the second component may be suspended dependent upon the (initial or updated) priorities of the requested objects that are to be forwarded via the selected ones of the connections to the second component. The intermediate component may thus suspend one or more connections so that objects having a high priority can make use of the additional bandwidth that is released on the link between the intermediate component and the second component. In order not to waste available bandwidth the intermediate component is preferably configured such that it ensures that a link formed by two or more connections is fully used before suspending one or more connections thereof.
  • There exist various techniques for suspending a connection. For example transmission over the connection could be blocked for a specific period of time while leaving the connection as such open (intermediate state=open). Alternatively, the connection could be closed (intermediate state=closed) while saving the state of the connection. In such a case the connection may be reopened at a later point in time in the same state in which it was closed. According to a third possibility, the connection may be completely closed without saving any information about the state of the connection. In any case the second component can be informed that the one or more objects to be transmitted via the closed connection will be sent later, either in response to or independently from a (repeated) object request.
  • Instead of or in addition to suspending individual connections, the object transfer may also be delayed by a priority based adjustment of the transfer speed. To that end, a specific share of processing capabilities may be dynamically allocated to each object or each connection. In the case of multiple connections, all connections or at least some connections get a share of the CPU time, i.e. a share of the network bandwidth. The share of processing capabilities allocated to a specific connection may be changed (e.g. decreased constantly) while one or more objects are transferred via the respective connection.
  • It has been mentioned above that the object transfer is based on a plurality of object requests relating to objects referred to in one or more codes. According to a first variant of the invention a code is readily available to at least one of the second and the intermediate component. According to a second variant of the invention the code has yet to be loaded by either one of the second and the intermediate component. In the latter case the intermediate component may send a code request that has been generated by the second component or by the intermediate component to the first component or a third component that is different from the first component. When the requested code is received from the first or the third component, it may be analyzed by the intermediate component with respect to references to objects comprised within the code. Any references to objects contained in the code may then be assessed with the purpose of assigning (initial) priorities to the objects referred to in the received code. The code received from the first or the third component may eventually be forwarded by the intermediate component to the second component.
  • Upon receipt of a response from the first component the requested object contained in the response may be evaluated with respect to the received objects priority. For example at least one of the object size, the object content and a header of the response may be analyzed to that end. It can then be determined whether or not an initial priority of a received object has to be updated.
  • Preferably, at least some information about each object or each class of objects is stored for example by the intermediate component. The stored information may comprise priority information for individual objects or a classes of objects, preferably, in the form of a priority list. This priority list may be repeatedly assessed. Such an assessment can relate to at least one of updating priority information and deleting objects or classes of objects from the priority list.
  • The invention may be implemented as a hardware solution or as a software solution. In the case of a software solution the invention may be realized in the form of a computer program product comprising program code portions for performing the individual steps of the invention. The computer program product may be stored on a computer readable recording medium.
  • According to a preferred embodiment of the invention the intermediate component is implemented as a proxy component in the form of a piece of software running on the first or the second component of the communications network. If the invention is implemented as a hardware solution, the intermediate component may be constituted by a separate piece of hardware like a proxy server arranged between the first and the second component in the communications network. The intermediate component may include one or more appropriately configured communication interfaces for communicating with at least the first and the second component of the communications network as well as a unit for performing the processing in context with delaying of objects.
  • In the communications network there exists a first link between the intermediate component and the first component and a second link between the intermediate component and the second component. Preferably, the first link and the second link have different transfer rates. For example a fast link may be provided between the intermediate component and the first component and a comparatively slower link may be provided between the intermediate component and the second component. This situation is usually given when the first component is a network server, the second component is a network client and the intermediate component is located in the vicinity of (in terms of network links) or on the network server. However, the intermediate component could also be located close to (in terms of network links) or on the network client. In such a case the link between the intermediate component and the second component (the network client) has a much higher capacity and lower latency than the link between the intermediate component and the first component (the network server).
  • It should be noted that the invention is not restricted to the case that the first component acts as network server and the second component acts as network client. In particular, the intermediate component could also be used to improve the object transfer between two network clients or two network servers.
  • According to an especially preferred embodiment of the invention the intermediate component is part of a wireless communications network like a GSM, GPRS, etc. cellular network. In such a network the second component may be constituted by a mobile terminal.
  • BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS
  • Further aspects and advantages of the invention will become apparent upon reading the following detailed description of preferred embodiments of the invention and upon reference to the drawings, in which:
  • FIG. 1 is a schematic diagram illustrating a transfer of objects between a network server and a network client in accordance with HTTP;
  • FIG. 2 is a block diagram of a network system comprising an intermediate component in the form of a HTTP proxy server according to the invention;
  • FIG. 3 is a block diagram of the HTTP proxy server of FIG. 2;
  • FIG. 4 is a schematic diagram depicting a redirection-based object delay in the network system depicted in FIG. 2;
  • FIG. 5 is a flow chart reflecting the steps preceding an object delay;
  • FIG. 6 is a flow chart depicting the decisions involved in an object transfer according to the invention; and
  • FIG. 7 is a block diagram depicting a proxy component according to the invention located on a network client.
  • DETAILED DESCRIPTION
  • Although the present invention can be practiced in any communications network in which a request-based object transfer via an intermediate component is performed, the following description of preferred embodiments is exemplarily set forth with respect to the transfer of HTML code in accordance with the HTTP protocol over the WWW. In principle, transfer protocols different from HTTP, like the wireless WAP transport protocol or some Remote Procedure Call (RPC) mechanisms, and codes different from HTML, for example the WAP Markup-Language (WML) or any derivatives of the eXtensible Markup-Language (XML), could be utilized as well. Furthermore, although the following description mainly concerns an object transfer from a server to a client, the object transfer could be performed between any two or more network components.
  • In FIG. 2, a block diagram of a network system 10 according to the invention is depicted. As becomes apparent from FIG. 2, the network system 10 comprises a first component in the form of a server 20, an intermediate component in the form of a HTTP proxy server 30 and a second component in the form of a client 40. The proxy server 30 is arranged in the network system 10 such that it has a fast link 12 towards the server 20 and a comparatively slower link 14 towards the client 40. Each link 12, 14 is constituted by a plurality of TCP connections 50. Each TCP connection 50 is configured to allow the transfer of HTTP requests and HTTP responses between the server 20 and the client 40.
  • The proxy server 30 performs some traditional proxy functions like caching and filtering of objects. Additionally, the proxy server 30 is configured to artificially delay an object that is received from the server 20 and that is to be forwarded to the client 40. This is done by using a combination of temporary suspension of data transfer on some connections 50 and HTTP redirection messages that force a browser running on the client 40 to repeat an object requested after a certain period of time. By using these mechanisms the proxy server 30 re-orders the HTTP responses received from the server 20 in such a way that objects having a higher priority are delivered to the client 40 first. For that purpose the proxy server 30 dynamically assigns priorities to the objects to be forwarded to the client 40. In order to ensure that delaying of the less important objects does not cause the link 14 between the proxy server 30 and the client 40 to become idle, the proxy server 30 continuously or at least repeatedly monitors the traffic on this link 14.
  • The construction of the proxy server 30 is depicted in more detail in FIG. 3. As becomes apparent from FIG. 3, the proxy server 30 comprises a communications interface 32 coupled between the first link 12 to the server 20 and the second link 14 to the client 40. The communications interface 32 is configured such that it enables the sending of object requests to and the receipt of the requested objects from the server 20. A processing unit 34 of the proxy server 30 communicates with the communications interface 32. The processing unit 34 allows to assess and/or adapt the priority of any object received via the first link 12 from the server 20. Additionally, the processing unit 34 allows to assign an initial priority to a requested object on the basis of an analysis of at least one of the object request and the code that refers to the requested object. Possible assignment schemes will be discussed later in more detail.
  • In dependence of the initial or updated priority of an requested object the processing unit 34 controls the communications interface 32 such that a requested object received from the server 20 is either delayed or forwarded via the second link 14 to the client 40. If a requested object received from the server 20 is to be delayed, it is temporarily stored in a buffer 36 that can be accessed by both the communications interface 32 and the processing unit 34. Alternatively or in addition, the buffer 36 may be implemented as a software or hardware component of the processing unit 34.
  • Besides the tasks outlined above, the processing unit 34 is additionally configured such that it allows to assign a specific attribute to an object which is to be delayed (an exemplary format of this attribute will be discussed later in more detail). The processing unit 34 enables to control the communications interface 32 such that the communications interface 32 informs the client 40 about this attribute. If the communications interface 32 receives a reference to the attribute from the client 40, the processing unit 34 evaluates this reference and controls the communications interface 32 such that the delayed object to which this attribute has previously been assigned and which is currently stored in the buffer 36 is either sent to the client 40 or further delayed. A further delay of the object stored in the buffer 36 may become necessary if objects of a higher priority have to be forwarded to the client 40 first.
  • In the following, a preferred operational mode of the network system 10 shown in FIG. 2 will exemplarily be described.
  • When a user enters a URL, clicks on a link or follows a bookmark, the browser running on the client 40 issues a HTTP request for the corresponding HTML page including HTML code. The HTTP request issued by the browser is received by the proxy server 30 via the link 14 and forwarded via the link 12 to the destination server 20. The server 20 replies by sending the HTML code for the requested page to the proxy server 30, which analyzes the HTML code received from the server 20 to assign an initial priority to any kind of objects like links, frames, scripts, images, etc. referred to in the HTML code (first analysis phase).
  • Independently from this analysis of the HTML code, the proxy server 30 forwards the HTML code via the link 14 to the client 40. When the browser running on the client 40 receives the HTML page including the HTML code it processes the HTML code. If the browser detects that the HTML code includes further objects, it issues further HTTP requests for the objects referred to in the HTML code. These HTTP requests for further objects are received and evaluated by the proxy server 30. To most of the requested objects an initial priority will have been assigned already during the proxy server's 30 previous analysis of the HTML code that it has forwarded to the server 40. However, in this second analysis phase the proxy server 30 either assigns initial priorities to those objects to which a priority has not yet been assigned or updates the priority of such objects to which an initial priority has already been assigned. The priority is updated on the basis of additional information available in the HTTP request received from the client 40.
  • The proxy server 30 forwards any HTTP requests for additional objects received from the client 40 to the server 20. The server 20 replies by sending the requested objects to the proxy server 30. The proxy server 30 analyzes the HTTP responses (including the requested objects) from the server 20 in a third analysis phase and updates—if necessary—the priorities of the objects comprised in the HTTP response. Additionally, the proxy server 30 assesses the relative priority of any received object with respect to the priority of previously received objects that are still stored in the buffer 36 (see FIG. 3) and the priorities of objects that are expected soon. Information regarding the objects that will be received soon from the server 20 can be derived from the HTML code that has previously been forwarded to the client 40 or from HTTP requests from the client 40 for which the corresponding objects have not yet been received from the server 20. Alternatively or additionally, the proxy server 30 may be configured such that it compares a priority of an object that has just been received from the server 40 with an absolute value like a priority threshold.
  • Based on the evaluation of an object's absolute and/or relative priority and the current and/or predicted traffic on the link 14, the proxy server 30 decides if this object is to be delayed, e.g. if this object is to be temporarily stored in the buffer 36 or if the corresponding HTTP request is not yet to be forwarded to the server 20, or if the object is to be immediately forwarded to the client 40.
  • The intentional delay of individual objects improves the overall object transfer from a user's point of view. It is for example well known that the relative importance of the various objects included in a web page varies greatly: An image that is used to build a graphical menu may be essential for the navigation of a site, while a background image merely makes the page look nicer. The invention can thus be employed to provide the user with the more important information first. As soon as there is enough information of a web page displayed on the user's screen, the user can decide to click on a link and request another web page without having to wait for the remaining (less important) parts of the previous web page that is still being transferred. As a result, the user is no longer forced to wait until some uninteresting objects are transferred before being able to see the important ones. This is especially useful in conjunction with the mobile Internet, which is usually slower and more expensive than the fixed Internet.
  • Assignment and Adjustment of Priorities
  • As has become apparent from the above, the proxy server 30 can assign or adjust the priority of an object to be sent to the client 20 during three different phases, namely when a reference to that object is found in an HTML code (i.e. in a previous object) that is to be forwarded to the client 40, when a HTTP request relating to that object is issued by the browser running on the client 40, or when the corresponding HTTP response containing the requested object is received from the server 20.
  • In the following, various schemes for assigning or updating priorities during each of these three phases are exemplarily described. During any of the three phases a priority list that contains priority information for individual objects or classes of objects is either generated or updated. In the priority list, the individual objects or classes of objects are ordered with respect to increasing or decreasing priority. The order of the objects in the priority list can thus be considered as priority information. However, additional priority information like absolute or relative priority values (numbers) may alternatively or additionally be part of the priority list.
  • The exact priority assigned to specific objects or classes of objects is implementation-dependent and in the exemplary embodiment configurable by the operator of the proxy server 30 or a user of the browser running on the client 40. For example in order to allow the operator of the proxy server 20 to have more control over the priority of some objects, there could be one or several lists of URLs (using pattern matching) that allow the operator to increase or decrease the priority of the objects appearing on those lists. For example an operator could decide to increase or decrease priority of all images downloaded from an advertising company. The same possibilities may be made available to the user. For example the user could send his preferences to the proxy server 30. This can be done by a specific software running on the client 40 or by using designated web pages provided directly by the proxy server 30 and allowing the user to set his preferences.
  • In the first analyzing phase the proxy server 30 can assign an initial priority to an object by analyzing an HTML code that has been requested by the client 40 from the server 20. In particular, references to objects referred to in the HTML code may be assessed to that end. In this way a priority list may be generated that lists individual objects which are referred to in the HTML code in the following order (objects of highest priority are mentioned first):
  • links to other pages
  • frames
  • inlined images (if the IMG tag includes width and height information, this information can be used to refine the priority of images depending on the expected dimensions so that smaller images get a higher priority than larger ones)
  • style sheets
  • scripts (JavaScript, VBScript, etc.), embedded objects and applets
  • background image (page background, table background, style sheet, etc.)
  • any object that was already sent to the client 40 gets the lowest priority
  • In addition the priority of a specific object can be lowered if the object is not located on the same server 20 or on the same domain as the current HTML page.
  • A further possibility to assign or adjust the priority of an object occurs when a request for that object is issued by the browser and received by the proxy server 30. In such a case the HTTP request can be analyzed by the proxy server 30 in an URL context (second analysis phase). Since initial priorities have already been assigned during analysis of the HTML code that led to that HTTP request, analysis of the HTTP request will usually result in an adjustment of the initial priority. However, in some cases initial priorities may be assigned also (see above).
  • The adjustment or assignment of initial priorities in the second analysis phase can be performed in dependence on additional information available for example in the header of the HTTP request. One or more of the following rules for updating the priorities may be implemented:
      • The analysis leads to the result that the browser has already requested the same object once. Such an object is preferably assigned a very high priority in order to avoid infinite loops caused by browsers that are not fully compliant to HTTP/1.1 and ignore the Retry-After header (this header will be discussed below in more detail).
      • The object does not have a priority yet, but the file extension looks like HTML (“.HTML”.“.HTM”) or XML (“.XML”) or looks like a directory index (ends“/”). Such a priority assignment ensures that a HTML page requested from the bookmarks or typed in directly will be requested with a high priority.
      • The browser makes a conditional HTTP request for an object, using if-modified-since or similar conditions. This indicates that the browser has probably cached a copy of the object. The reply is expected to be small if the cached copy is still valid (HTTP reply code “304 not modified”).
      • The URL of the requested object was found while parsing a previous HTML page.
      • Any object that was not inserted in the list while parsing the HTML tags of a previous page was probably requested indirectly by a script and should get a lower priority than most of the other requested objects.
  • In the third analysis phase, the adjustment of object priorities is based on an analysis of the HTTP response from the server 20. The adjustment of the priorities in the third analysis phase (as well as in the second analysis phase mentioned above) can be calculated as a weighted sum of several criteria. The weights may be configurable by the operator of the proxy server 30 or the user of the browser running on the client 40.
  • In the third analysis phase, all objects will usually have a priority assigned to them. However, this priority can be updated before sending the requested objects to the client 40. To adjust the priorities, the headers and contents of the HTTP responses received from the server 20 may be assessed. The priorities may then be adjusted in accordance with one or more of the following rules:
      • Assessment of the reply code: the relative priority of the HTTP responses depends on the first digit of the reply code. Error codes (4xx, 5xx) should have a higher priority than normal replies (2xx).
      • Assessment of the content type: a HTML code should have a higher priority than any image.
      • Assessment of the objects size (derived from the content-length if specified in the headers, or from the total size if the object is already cached): smaller objects should have a slightly higher priority than larger ones.
      • Analysis of the content: for example animated images can be assigned a lower priority than static images. The analysis of the content can also form the basis for estimating the size of the object if this information is not available in the HTTP header and the object has not yet been cached.
      • If the reply code is a permanent or temporary redirection (3xx) specifying a new location for the requested object, then this new location gets the same priority as the original object.
  • In the three analysis phases described above the proxy server 30 sets and updates the priorities of the objects that are to be transferred to the client 40. The proxy server 30 thus keeps some information about each object like the object's URL, priority, time of last request and, if required, some further parameters. However, this information can not be kept forever since otherwise the proxy server 30 would run out of memory. Moreover, if an object to which a high priority has been assigned is never requested, action is preferably taken so that it does not prevent other objects from being transferred.
  • For these reasons a routine is implemented that ensures that information that is no longer up to date or that is no longer required is deleted. To that end one or more of the following mechanisms may be used:
      • Any object that is successfully transferred to the client is marked as having been sent or is moved to a separate list of objects that have been sent to the client 40.
      • A maximum size for one or more lists containing relevant information is set and configured such that older objects or objects with the lowest priority expire first.
      • Whenever the client resets a TCP connection before the object is fully transferred (meaning that the user has stopped the download and may have selected another page), clear the information of objects to be sent.
      • As an alternative to the previous solution, keep cross-references for each object in order to associate each HTML page with the objects that it contains and vice versa. When the client 40 resets a TCP connection, remove only the objects that are included in the same HTML page.
      • The priority of all objects can be decreased after a specified amount of time or after some number of HTTP requests or HTTP responses have been processed.
    Reordering of Objects
  • In the previous chapter the generation of a priority list for the requested objects to be transferred to the client 40 as well as possible updating mechanisms for this priority list have been described. Usually, the requested objects will be received by the proxy server 30 from the server 20 in an order that is different from the order indicated in the priority list. Consequently, the proxy server 30 has to reorder the objects received from the server 20 in such a manner that they are forwarded from the proxy server 30 to the client 40 in an order which reflects the order in the priority list as closely as possible. The proxy server 30 reorders the objects received from the server 20 by intentionally delaying objects having a lower priority and by forwarding objects having a higher priority without any substantial delay to the client 40.
  • The proxy server 30 uses a combination of different delay mechanisms to reorder the objects received from the server 20. In the following, two of these delay mechanisms, namely suspension of TCP connections on the one hand and HTTP redirections on the other hand, will exemplarily be described in more detail
  • Suspension of TCP Connections
  • As becomes apparent from FIG. 2, the link 14 between the proxy server 30 and the client 40 is constituted by a plurality of TCP connections 50. Dependent upon the priorities of the requested objects that are to be forwarded via individual ones of the connections 50, one or more of the connections 50 that are intended for the transfer of objects having a low priority are suspended. This suspension of individual connections releases some bandwidth on the link 14 that is now available for preferentially transferring objects having a higher priority. Consequently, objects having a higher priority will be delivered before objects having a lower priority.
  • The suspension of an individual connection 50 is performed such that the connection 50 is left open without transferring objects for a certain period of time. Alternatively, suspension of a connection 50 could be effected by closing the connection 50, either with our without saving the state of the connection 50 prior to its suspension. When the state of the suspended connection 50 is saved, it can be opened at a later point in time in the same state as it has been suspended (i.e. closed).
  • Suspension of a connection 50 has the advantage that no extra data has to be sent via the link 14. Preferably, a connection 50 is suspended only if the released bandwidth can be fully used by some other connections 50 for the transfer of objects having a high priority.
  • The proxy server 30 is thus configured such that it checks that the link 14 is fully used before suspending a connection 50 in order not to waste available bandwidth. A possible routine for predicting if the link 14 is or will be partially idle includes comparing the average throughput (over the last N seconds) of all connections 50 going to the client 40 with the amount of data that is currently cached or buffered in the buffer 36 of the proxy server 30 (see FIG. 3) and is ready to be sent. Other and in particular simpler techniques for estimating the utilization of the link 14 could be implemented as well, especially if the available bandwidth on the link 14 is known by other means.
  • HTTP Redirections
  • If the proxy server 30 expects that objects having a high priority will soon have to be transferred to the client 14 (e.g. because links to these objects have previously been detected by the proxy server 30 while forwarding the HTML code of a HTML page to the client 40), and suspension of a connection 50 would waste some bandwidth because there is currently nothing else to transfer on the other connections 50, then the proxy server 30 may utilize another delay scheme. A possible delay scheme that is applicable in such a case includes instructing the client 40 to repeat an object request at a later point in time.
  • Although HTTP specifies that any HTTP responses must be sent to the client 40 in the same order as the browser running on the client 40 has issued the HTTP requests, it is possible to instruct the browser to retry a HTTP request later. This can be done by sending a HTTP response with the status code “302” to the client 40, together with the header field “Retry-After”. This header field tells the client 40 to retry his HTTP request after a specified amount of time. In response to the receipt of the status code “302” (possibly including the “Retry-After” header field), current browsers re-schedule the HTTP request after all pending HTTP requests have been processed.
  • The status code “302” as specified in the HTTP standard 1.1 tells the browser that a given object can be found (temporarily) at a location that is different from the one that was requested. The HTTP response sent to the client 40 includes the new location of the object. This mechanism is used to implement the delay scheme according to the invention.
  • According to the invention the proxy server 30 generates an attribute in the form of a new (virtual) URL for the object to be delayed. The proxy server 30 then instructs the browser running on the client 40 to try the HTTP request again, using this temporary attribute (i.e. URL) as the new location of the object. The browser is thus instructed to reschedule the HTTP request at a later point in time. When the browser repeats its HTTP request (including the temporary attribute, i.e. the virtual URL), the proxy server 30 converts the attribute to the original URL and forwards the HTTP request to the server 20. Alternatively, the original HTTP request could have been forwarded to the server 20 after receipt thereof by the proxy server 30. In such a case the HTTP response received from the server 20 is temporarily stored by the proxy server 30 until it receives the repeated HTTP request from the client 40.
  • In the following, the inventive delay mechanism discussed above will exemplarily be described in more detail with reference to FIGS. 4 and 5. It will be assumed that the HTTP request received by the proxy server 30 from the client 40 relates to an object that is considered by the proxy server 30 to be of a low priority.
  • In a first step 402 of FIG. 4, the proxy server 30 receives a HTTP request from the client 40 via the link 14. In the exemplary case of HTTP this first request from the client could have the following format:
  • GET https://example.com/some/image.png HTTP/1.1
  • Host: example.com
  • User-Agent: Mozilla/5.0 (X11; Linux i686; en-US; rv: 0.9.9) Gecko/20020311
  • Connection: close
  • In response to the HTTP request received in step 402 from the client 40, the proxy server 30 redirects the client 40 in step 404 to a new (virtual) location and instructs the client 40 to wait for a certain period of time (delay) before retrying the HTTP request. The redirection message from the proxy server 30 on the basis of the status code “302” as specified in the HTTP standard 1.1 can have the following format:
  • HTTP/1.1 302 Found
  • Date: Thu, 21 Mar. 2002 15:12:47
  • Server: PrioTest/0.9
  • Location: http//example.com/some/( )image(0001).png
  • Retry-After: 5
  • Connection: close
  • Transfer-Encoding: chunked
  • Content-Type: text/html; charset=iso-8859-1
  • (some human-readable text follows)
  • The proxy server 30 can now request the object from the server 20 at any time after receipt of the initial HTTP request from the client 40 (step 402) and the time at which it decides to deliver the object to the client 40 (steps 406 and 408).
  • After receipt of the above redirection message the client 40 waits for a period of time specified in the redirection message, i.e. five seconds (or until all other objects have been transferred). In step 412 the client 40 then repeats his HTTP request indicating the new (virtual) location as follows:
  • GET https://example.com/some/( )image(00001).png HTTP/1.1
  • Host: example.com
  • User-Agent: Mozilla/5.0 (X11; Linux i686; en-US; rv:0.9.9) Gecko/2002031 1
  • Connection: close
  • Upon receipt of the repeated HTTP request from the client 40, the proxy server 30 decides whether to delay the requested object further (e.g. by suspending a connection 50 or by a further redirection message) or whether to forward the delayed object to the client 40. If the proxy server 30 decides to forward the delayed object without any further delay, this can be done in the following format:
  • HTTP/1.1 200 OK
  • Date: Thu, 21 Mar. 2002 15:12:50
  • Server: Apache/1.3.23 (Unix)
  • Content-Type: image/png
  • Content-Length: 1520
  • (the contents of the image follow)
  • Now, the decisions taken by the proxy server 30 in the course of the redirection routine discussed above with reference to FIG. 4 will be explained with reference to FIG. 5.
  • In step 502 the proxy server 30 receives the HTTP request from the client 40. In the following step 504 the proxy server 30 determines whether the URL included in the HTTP request is a modified URL, i.e. the result of a previous redirection. If this is the case, the proxy server 30 decodes the URL and restores the original location in step 506 and moves via node 508 to step 510. Otherwise the method directly moves from step 504 via node 508 to step 510.
  • In step 510 the proxy server 30 determines if the object requested by means of the HTTP request is already available, i.e. stored in the buffer 36 of the proxy server 30 (see FIG. 3). If the object is not already cached, the proxy server 30 requests the object from the server 20 or marks it for later retrieval in step 514. From step 514 the method moves via node 512 to step 516. Step 516 can also be reached directly from step 510 via node 512 in the case the object requested by the client 40 is already available.
  • In step 516 the HTTP response including the requested object is ready to be sent to the client 40. This corresponds to the first step in the flow chart of FIG. 6 which will be discussed below.
  • In principle, the redirection message (step 404 in FIG. 4) can be sent to the client 40 at any time while steps 502 to 516 are performed or after step 516. It should be noted that the availability of an object (i.e. whether a requested object is already cached, currently in transfer or whether the object is not requested yet) is a further factor that influences the initial priority of a requested object.
  • Re-Ordering Decisions
  • Once the HTTP response is ready to be sent to the client 40 (step 516 in FIG. 5), it has to be decided if an object comprised in the HTTP response should actually be delivered to the client 40, if the client 40 should be redirected or if the connection 50 via which this object is to be sent to the client 40 should be suspended. A flow chart depicting an exemplary decision scheme in this regard is depicted in FIG. 6.
  • In step 602 the HTTP response is ready to be sent to the client. In the following step 604 the priority of this object is evaluated with respect to the fact whether or not the priority has to be updated. If the priority of the object has to be updated, the priority is adjusted in step 604.
  • In the next step 606 the current priority of the object is assessed to find out if it has the highest priority of all objects that are being transferred or that are expected soon. If it is determined in step 606 that the requested object actually has the highest priority, the method moves via node 610 to step 612. In step 612 the requested object is sent to the client 40.
  • If the comparison of the priority of the currently requested object with the priority of other objects in step 606 leads to the result that the currently requested object does not have the highest priority, the method continues with step 614. With respect to step 606 it should be noted that instead of comparing the priority of the currently requested object with the priorities of other objects it is also possible to compare the priority of the currently requested object with a fixed threshold or to add an offset in the comparison so that two priorities have to be different by more than a predefined threshold before the difference is considered significant enough.
  • In step 614 the proxy server 30 estimates if the link 14 to the client 40 (see FIG. 2) is or will be idle. As explained above, there are several ways to do that. One of them comprises calculating a running average of the maximum amount of data that was sent and acknowledged during the last N seconds over all connections 50 going to the same client 40. This gives an estimate of the maximum throughput available.
  • The result thus obtained is then compared with the amount of data that is ready to be sent on the connections 50 that are not suspended. If the proxy server 30 detects that it does not have enough data to send in order to fill the link during at least one complete round-trip time, then it considers that there is some spare bandwidth on the link 14 towards the client 40 and continues with step 616.
  • In step 616 a comparison similar to that of step 606 is performed. If it is determined in step 616 that the currently requested object has a higher priority than all objects expected soon, the proxy server 30 continues via node 610 with step 612 and sends the currently requested object immediately to the client 40. Otherwise the method continues with step 618 and a redirection message (status code “302”) is sent to the client 40 as discussed above in conjunction with FIG. 4.
  • The decision taken in step 616 can be influenced by the size of the currently requested object (if it is already known). If the object is known to be small (e.g. less than twice the size of a redirection message), then the proxy server will always send the object instead of sending a redirection message, even if the object had been assigned a very low priority until then (this can be considered as one way of updating the priority).
  • If it is determined in step 614 that there is enough data to be sent in order to fill the link 14, the method continues with step 620 and suspends the connection 50 to the client 40 via which the currently requested object is to be transferred.
  • From either one of step 612, 618 and 620 the method continuous with step 622. In step 622 the proxy server 30 re-evaluates all suspended connections 50 to find out whether any one of the suspended connections 50 are to be opened again.
  • The HTTP/1.1 protocol supports the pipelining option, which allows the client 40 to send several requests to the server 20 or proxy server 30 on the same TCP connection without waiting for the previous replies. In the case pipelining is used, more than one object that is ready to be sent could be sent on the same connection 50 towards the client 40. It is apparent that in such a case an object having a low priority could block a second object having a high priority that is to be sent on the same connection 50. If there are several objects waiting on the same connection 50, the maximum or average priority of these objects may be determined and considered in steps 606 and 616. This ensures that objects of lower priority do not block objects of higher priority.
  • Possible Extensions
  • Several extensions, some of which have already briefly been discussed, to the exemplary embodiment described with reference to FIGS. 1 to 6 could be implemented.
  • One of these extension relates to constraining the transfer speed on link 14 in dependence of the priority of the objects to be transferred. This could be done for example by allocating a specific share of processing capabilities to each connection 50 depending on the priority of the objects to be transferred. The priority of the individual objects is decreased while the process is running. If the proxy server 30 processes connections 50 in a round-robin fashion, this feature can be implemented by limiting the amount of data transferred per round on each connection 50 by a number that is derived from the priority of that object. The dynamic allocation of processing capabilities can advantageously be combined with the suspension and redirection mechanisms discussed above. The processing capabilities can also include any transformation of the objects or codes being transferred.
  • According to a further extension of the invention, the priorities are assigned directly by the browser running on the client 40. The browser can then schedule the HTTP requests for individual objects according to their priority. If the priorities are assigned directly by the browser, there are some additional factors that can be used for refining the priority of each object:
      • position of the object in the page (coordinates)
      • relative position of the visible area (objects that are outside the visible area have a lower priority)
      • if image loading or script execution is disabled, the browser knows immediately that it is not necessary to assign a priority to these objects.
  • Additionally, the browser knows when a user selects a new HTML page from the bookmarks or by typing in a new URL. The browser can thus clear the list of objects that are no longer required.
  • A further extension of the invention relates to a proxy component that is located on the same computer (client) as the browser or close to this computer in terms of network links. This situation is depicted in FIG. 7.
  • As becomes apparent from FIG. 7, the client 40 not only comprises a browser component 42 but an additional proxy component 30 (having the structure shown in FIG. 3) in communication with the browser component 42. In such a case the link 14 between the proxy component 30 and the browser component 42 has a much higher capacity and lower latency than the link 12 between the proxy component and the server 20 (not depicted in FIG. 7).
  • As a result, the client-side proxy component 30 influences the request stream because it cannot do much on the response stream. Based on the priority information derived from the current HTTP request and previous HTTP responses (e.g. previous HTML codes referring to further objects) as well as an estimate of the link availability, the client-side proxy component 30 will decide if a HTTP request should be forwarded to the server and/or if it should reply immediately with a redirection message.
  • The decisions to be taken are simpler than depicted in the flow chart of FIG. 6. More particularly, the decisions can be reduced to evaluating if the currently requested object has a lower priority than some of the objects being transferred or expected to be transferred soon and if the link is already fully used. If both conditions are given, then a redirection message is sent to the browser component 42. In all other cases, the HTTP request is immediately forwarded to the server.
  • If HTTP pipelining is used on a specific connection and if some previous HTTP requests are being processed, then the client-side proxy component 30 can suspend the HTTP request until it can take the decision. It will have to take a decision at the latest when the previous objects have been fully received.
  • A still further extension of the invention relates to the blocking of downloads for some objects based on their priority. This means that the priority that is assigned to the objects can also be used to block the objects completely. If a threshold on the priority has been set, any object that has a priority that is lower than this threshold will not be sent to the client 40. In this case the proxy server (or proxy component) 30 would simply return one of the “4xx” or “5xx” status codes defined in the HTTP/1.1 standard to the client 40 when it detects such an object. Possible status codes are “403 forbidden”, “409 conflict” or “503 service unavailable”.
  • As an additional extension the priorities assigned to the objects could be used for pre-fetching. A pre-fetching mechanism allows the proxy server 30 to fill its buffer 36 (see FIG. 3) with some objects before the client 40 actually requests them. Such a pre-fetching mechanism may for example be based on the analysis of a HTML code that is sent from the proxy server 30 to the client 40 and that includes references to further objects. Based on the analysis of the references to the objects the proxy component 30 assigns priorities to the individual objects and on the basis of this assignment it is defined which objects are to be pre-fetched and in what order. Preferably, the objects are pre-fetched starting with the objects having the highest priority.
  • According to a still further extension that may be combined with the pre-fetching mechanism discussed above, specific pushing schemes are implemented that allow to transfer objects from the proxy server 30 to the client 40 without having received an explicit object request from the client 40.
  • Various modifications of the preferred embodiment are possible without departing from the scope and spirit of the present invention. Although the invention has been described in connection with a preferred embodiment, it is to be understood that this description is not intended to limit the invention thereto. Rather, the invention is intended to cover all modifications and/or additions to the above-mentioned description, without departing from the spirit and the scope of the invention.

Claims (25)

1. A method of operating a proxy server, comprising:
finding a reference to an object in a previous object that is to be forwarded to a client; and
upon finding the reference to the object, assigning or adjusting a priority of the object to be sent to the client.
2. The method according to claim 1, wherein the previous object comprises HTML code.
3. The method according to claim 1, comprising the step of generating a priority list that lists individual objects, which are referred to in the previous object, according to their priority.
4. The method according to claim 1, wherein the priority of the object is determined depending on the following order of decreasing priority of an object type:
a link to another page,
a frame, an inlined image,
a style sheet,
same priority for a script or an embedded object or an applet,
lower priority for a background image,
lowest priority for an object that was already sent to the client.
5. The method according to claim 1, wherein the priority of the object to be sent to a client is assigned or adjusted, when a request, that is issued by a browser running on the client, relating to said object is received.
6. The method according to claim 5, wherein the request is an HTTP request.
7. The method according to claim 6, comprising the step of analyzing the request in an URL context.
8. The method according to claim 6, wherein the priority is adjusted or assigned in dependence of information in the header of the HTTP request.
9. The method according to claim 5, comprising the steps of determining whether the object has already been requested once by the browser, wherein the object gets a high priority assigned if the object has already been requested once by the browser.
10. The method according to claim 5, wherein the object gets a high priority assigned if the object does not have a priority yet and the file extension indicates one of an HTML file, an XML file or a directory index.
11. The method according to claim 5, wherein the priority, which is assigned or adjusted in reaction of the received request, depends on whether the request is a conditional HTTP request.
12. The method according to claim 5, wherein the priority, which is assigned or adjusted in reaction of the received request, is lower than for most of other requested objects, if the object was requested indirectly by a script.
13. The method according to claim 5, wherein the priority of the object to be sent to a client is assigned or adjusted, when a response corresponding to a request of the object is received, wherein said response contains the object.
14. The method according to claim 13, wherein the response is a HTTP response.
15. The method according to claim 14, wherein a header or a content of the HTTP response is assessed to adjust the priority.
16. The method according to claim 14, wherein a reply code is assessed to adjust the priority, and wherein a higher priority is assigned if the assessment of the reply code indicates an error code than if the assessment of the reply code indicates a normal reply.
17. The method according to claim 14, wherein a content type is assessed to adjust the priority, and wherein a higher priority is assigned if the assessment of the content type indicates a HTML code than if the assessment of the reply code indicates an image.
18. The method according to claim 14, wherein a size of the object is assessed, and wherein a smaller object gets a higher priority than a larger object.
19. The method according to claim 14, wherein a content of the object is analyzed to adjust the priority.
20. The method according to claim 19, wherein an animated image gets a lower priority than a static image.
21. The method according to claim 14, wherein if a reply code is a redirection specifying a new location for the requested object, said new location gets the same priority as the original object.
22. The method according to claim 14, wherein the priority of all objects is decreased after a specified amount of time or after several HTTP requests or HTTP responses have been processed.
23. Proxy server, having means adapted to perform the method according to claim 1.
24. A computer program comprising program code portions for performing the steps of claim 1 when the computer program is run on a computer system.
25. A computer readable recording medium, which stores a computer program of claim 24.
US12/276,780 2002-04-05 2008-11-24 Object transfer control in a communications network Abandoned US20090077205A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US12/276,780 US20090077205A1 (en) 2002-04-05 2008-11-24 Object transfer control in a communications network

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
PCT/EP2002/003802 WO2003085924A1 (en) 2002-04-05 2002-04-05 Object transfer control in a communications network
US10/509,979 US7721294B2 (en) 2002-04-05 2002-04-05 Object transfer control in a communications network
US12/276,780 US20090077205A1 (en) 2002-04-05 2008-11-24 Object transfer control in a communications network

Related Parent Applications (2)

Application Number Title Priority Date Filing Date
US10/509,979 Continuation US7721294B2 (en) 2002-04-05 2002-04-05 Object transfer control in a communications network
PCT/EP2002/003802 Continuation WO2003085924A1 (en) 2002-04-05 2002-04-05 Object transfer control in a communications network

Publications (1)

Publication Number Publication Date
US20090077205A1 true US20090077205A1 (en) 2009-03-19

Family

ID=28685820

Family Applications (2)

Application Number Title Priority Date Filing Date
US10/509,979 Expired - Lifetime US7721294B2 (en) 2002-04-05 2002-04-05 Object transfer control in a communications network
US12/276,780 Abandoned US20090077205A1 (en) 2002-04-05 2008-11-24 Object transfer control in a communications network

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US10/509,979 Expired - Lifetime US7721294B2 (en) 2002-04-05 2002-04-05 Object transfer control in a communications network

Country Status (10)

Country Link
US (2) US7721294B2 (en)
EP (2) EP1650931B1 (en)
CN (1) CN100531186C (en)
AT (2) ATE413763T1 (en)
AU (1) AU2002257754A1 (en)
DE (2) DE60208786T2 (en)
ES (2) ES2317348T3 (en)
IL (3) IL163889A0 (en)
PT (2) PT1493257E (en)
WO (1) WO2003085924A1 (en)

Cited By (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060109857A1 (en) * 2004-11-19 2006-05-25 Christian Herrmann System, method and computer program product for dynamically changing message priority or message sequence number in a message queuing system based on processing conditions
US20100082855A1 (en) * 2008-09-29 2010-04-01 Internatinal Business Machines Corporation Associating process priority with i/o queuing
US20120023190A1 (en) * 2010-07-26 2012-01-26 Ari Backholm Mobile network traffic coordination across multiple applications
US20120117253A1 (en) * 2010-11-09 2012-05-10 Usablenet Inc. Methods for reducing latency in network connections and systems thereof
CN102915364A (en) * 2011-10-20 2013-02-06 微软公司 Realization of immersion type search engine homepage
US8750123B1 (en) 2013-03-11 2014-06-10 Seven Networks, Inc. Mobile device equipped with mobile network congestion recognition to make intelligent decisions regarding connecting to an operator network
US8761756B2 (en) 2005-06-21 2014-06-24 Seven Networks International Oy Maintaining an IP connection in a mobile network
US8775631B2 (en) 2012-07-13 2014-07-08 Seven Networks, Inc. Dynamic bandwidth adjustment for browsing or streaming activity in a wireless network based on prediction of user behavior when interacting with mobile applications
US8774844B2 (en) 2007-06-01 2014-07-08 Seven Networks, Inc. Integrated messaging
US8782222B2 (en) 2010-11-01 2014-07-15 Seven Networks Timing of keep-alive messages used in a system for mobile network resource conservation and optimization
US8799410B2 (en) 2008-01-28 2014-08-05 Seven Networks, Inc. System and method of a relay server for managing communications and notification between a mobile device and a web access server
US8812695B2 (en) 2012-04-09 2014-08-19 Seven Networks, Inc. Method and system for management of a virtual network connection without heartbeat messages
US8811952B2 (en) 2002-01-08 2014-08-19 Seven Networks, Inc. Mobile device power management in data synchronization over a mobile network with or without a trigger notification
US8832228B2 (en) 2011-04-27 2014-09-09 Seven Networks, Inc. System and method for making requests on behalf of a mobile device based on atomic processes for mobile network traffic relief
US8839412B1 (en) 2005-04-21 2014-09-16 Seven Networks, Inc. Flexible real-time inbox access
US8838783B2 (en) 2010-07-26 2014-09-16 Seven Networks, Inc. Distributed caching for resource and mobile network traffic management
US8843153B2 (en) 2010-11-01 2014-09-23 Seven Networks, Inc. Mobile traffic categorization and policy for network use optimization while preserving user experience
US8862657B2 (en) 2008-01-25 2014-10-14 Seven Networks, Inc. Policy based content service
US8868638B2 (en) 2010-11-09 2014-10-21 Usablenet Inc. Methods for reducing latency in network connections using automatic redirects and systems thereof
US8868753B2 (en) 2011-12-06 2014-10-21 Seven Networks, Inc. System of redundantly clustered machines to provide failover mechanisms for mobile traffic management and network resource conservation
US8874761B2 (en) 2013-01-25 2014-10-28 Seven Networks, Inc. Signaling optimization in a wireless network for traffic utilizing proprietary and non-proprietary protocols
US8909759B2 (en) 2008-10-10 2014-12-09 Seven Networks, Inc. Bandwidth measurement
US8924395B2 (en) 2010-10-06 2014-12-30 Planet Data Solutions System and method for indexing electronic discovery data
US8934414B2 (en) 2011-12-06 2015-01-13 Seven Networks, Inc. Cellular or WiFi mobile traffic optimization based on public or private network destination
US9002828B2 (en) 2007-12-13 2015-04-07 Seven Networks, Inc. Predictive content delivery
US9009250B2 (en) 2011-12-07 2015-04-14 Seven Networks, Inc. Flexible and dynamic integration schemas of a traffic management system with various network operators for network traffic alleviation
US9065765B2 (en) 2013-07-22 2015-06-23 Seven Networks, Inc. Proxy server associated with a mobile carrier for enhancing mobile traffic management in a mobile network
US9100873B2 (en) 2010-11-22 2015-08-04 Seven Networks, Inc. Mobile network background traffic data management
US9207754B2 (en) 2011-10-20 2015-12-08 Microsoft Technology Licensing, Llc Enabling immersive, interactive desktop image presentation
US9671851B2 (en) 2010-07-26 2017-06-06 Seven Networks, Llc Optimizing mobile network traffic coordination across multiple applications running on a mobile device
US20180063220A1 (en) * 2016-08-30 2018-03-01 Citrix Systems, Inc. Systems and methods to provide hypertext transfer protocol 2.0 optimization through multiple links
US10110646B2 (en) * 2012-03-12 2018-10-23 Network Coding, Inc. Non-intrusive proxy system and method for applications without proxy support
US20180343207A1 (en) * 2015-07-02 2018-11-29 Zte Corporation Streaming Media Data Transmission Method and Apparatus
US10164895B2 (en) * 2011-03-11 2018-12-25 Citrix Systems, Inc. Systems and methods of QoS for and single stream ICA

Families Citing this family (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040158582A1 (en) * 2003-02-11 2004-08-12 Shuichi Takagi Method and apparatus for synchronously transferring data from a local storage medium to a remote storage medium, and method and system for managing transfer of data from a source storage medium to a repository storage medium
US9357033B2 (en) * 2003-06-17 2016-05-31 Citrix Systems, Inc. Method and system for dynamic interleaving
TWI234717B (en) * 2003-12-04 2005-06-21 Inst Information Industry Method and system for dynamically determining web resource to be loaded and saving space
ATE334548T1 (en) * 2004-04-08 2006-08-15 Research In Motion Ltd PRIORITY BASED REORDERING IN A SEND QUEUE OF MESSAGES
US7673018B2 (en) * 2004-04-08 2010-03-02 Research In Motion Limited Message send queue reordering based on priority
US7865511B2 (en) * 2004-06-25 2011-01-04 Apple Inc. News feed browser
US8856279B2 (en) * 2005-05-26 2014-10-07 Citrix Systems Inc. Method and system for object prediction
US9692725B2 (en) * 2005-05-26 2017-06-27 Citrix Systems, Inc. Systems and methods for using an HTTP-aware client agent
US8943304B2 (en) 2006-08-03 2015-01-27 Citrix Systems, Inc. Systems and methods for using an HTTP-aware client agent
US8612844B1 (en) * 2005-09-09 2013-12-17 Apple Inc. Sniffing hypertext content to determine type
US8533350B2 (en) * 2005-11-01 2013-09-10 Ravenwhite Inc. Method and apparatus for storing information in a browser storage area of a client device
EP1796338A1 (en) * 2005-12-07 2007-06-13 Siemens Aktiengesellschaft Method for communication of a client with a server and client and server for performing this method
EP2016508A1 (en) * 2006-05-05 2009-01-21 Thomson Licensing Threshold-based normalized rate earliest delivery first (nredf) for delayed downloading services
EP2084864A1 (en) * 2006-10-24 2009-08-05 Medianet Innovations A/S Method and system for firewall friendly real-time communication
US9489456B1 (en) * 2006-11-17 2016-11-08 Blue Coat Systems, Inc. Previewing file information over a network
US7743160B2 (en) * 2007-03-29 2010-06-22 Blue Coat Systems, Inc. System and method of delaying connection acceptance to support connection request processing at layer-7
US8521891B1 (en) * 2007-06-21 2013-08-27 Mcafee, Inc. Network browser system, method, and computer program product for conditionally loading a portion of data from a network based on a data transfer rate
KR100925644B1 (en) 2007-10-22 2009-11-06 에스케이 텔레콤주식회사 Object Transmission System and Control Method thereof
US8850029B2 (en) * 2008-02-14 2014-09-30 Mcafee, Inc. System, method, and computer program product for managing at least one aspect of a connection based on application behavior
JP5669460B2 (en) * 2010-06-30 2015-02-12 キヤノン株式会社 Information processing apparatus, information processing system, information processing apparatus control method, and program
US8769000B2 (en) * 2011-02-01 2014-07-01 Microsoft Corporation Adaptive network communication techniques
US9009253B2 (en) * 2011-02-16 2015-04-14 Yahoo! Inc. Optimizing server resources using multiple retry for high traffic websites
WO2013078687A1 (en) * 2011-12-02 2013-06-06 华为技术有限公司 Content delivery network routing method, system and user terminal
US9537899B2 (en) 2012-02-29 2017-01-03 Microsoft Technology Licensing, Llc Dynamic selection of security protocol
US8868762B1 (en) 2012-03-23 2014-10-21 Google Inc. Efficient proximity detection
US8923204B2 (en) * 2012-05-29 2014-12-30 Alcatel Lucent Message handling extension using context artifacts
US9037926B2 (en) * 2012-06-07 2015-05-19 International Business Machines Corporation Background buffering of content updates
JP6021487B2 (en) * 2012-07-18 2016-11-09 キヤノン株式会社 Information processing system, control method, server, information processing apparatus, and computer program
US9148383B2 (en) * 2012-07-31 2015-09-29 International Business Machines Corporation Transparent middlebox with graceful connection entry and exit
US9311280B2 (en) * 2012-08-27 2016-04-12 Qualcomm Innovation Center, Inc. Re-ordering of iFrame execution to reduce network activity window
US9471533B1 (en) * 2013-03-06 2016-10-18 Amazon Technologies, Inc. Defenses against use of tainted cache
US9398066B1 (en) 2013-03-06 2016-07-19 Amazon Technologies, Inc. Server defenses against use of tainted cache
BR112016007657A2 (en) * 2013-10-07 2017-08-01 Telefonica Digital Espana Slu ? procedure and system for setting the order of obtaining web resources by a web browser?
US9992263B2 (en) * 2014-10-10 2018-06-05 Pulse Secure, Llc Predictive prioritized server push of resources
EP3772207B1 (en) * 2019-08-01 2024-03-20 ISS IP Holding LLC Method and system for data transmission with significantly reduced latency losses

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5046121A (en) * 1989-01-31 1991-09-03 Konica Corporation Image data compression apparatus
US5825846A (en) * 1995-12-21 1998-10-20 U.S. Philips Corporation Noise reduction in an image
US6085193A (en) * 1997-09-29 2000-07-04 International Business Machines Corporation Method and system for dynamically prefetching information via a server hierarchy
US6266742B1 (en) * 1997-10-27 2001-07-24 International Business Machines Corporation Algorithm for cache replacement
WO2002007395A1 (en) * 2000-07-19 2002-01-24 Hitachi, Ltd. Web information preferential transfer system
US20020073167A1 (en) * 1999-12-08 2002-06-13 Powell Kyle E. Internet content delivery acceleration system employing a hybrid content selection scheme
US20020143896A1 (en) * 1999-12-30 2002-10-03 Uwe Hansmann Efficient downloading of documents from the internet
US6512791B1 (en) * 1991-05-15 2003-01-28 Canon Kabushiki Kaisha Image processing apparatus having means for controlling exposure using an orthogonal transformation coefficient
US6697859B1 (en) * 1998-03-30 2004-02-24 Canon Kabushiki Kaisha Apparatus, method, program, and information processing system for prioritized data transfer to a network terminal
US6789075B1 (en) * 1996-06-10 2004-09-07 Sun Microsystems, Inc. Method and system for prioritized downloading of embedded web objects

Family Cites Families (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5778372A (en) * 1996-04-18 1998-07-07 Microsoft Corporation Remote retrieval and display management of electronic document with incorporated images
US5675721A (en) * 1996-08-08 1997-10-07 Freedman; Aaron S. Computer network data distribution and selective retrieval system
US6421733B1 (en) * 1997-03-25 2002-07-16 Intel Corporation System for dynamically transcoding data transmitted between computers
US6343085B1 (en) * 1997-08-28 2002-01-29 Microsoft Corporation Adaptive bandwidth throttling for individual virtual services supported on a network server
US5987466A (en) * 1997-11-25 1999-11-16 International Business Machines Corporation Presenting web pages with discrete, browser-controlled complexity levels
US6769019B2 (en) * 1997-12-10 2004-07-27 Xavier Ferguson Method of background downloading of information from a computer network
US6154769A (en) * 1998-03-27 2000-11-28 Hewlett-Packard Company Scheduling server requests to decrease response time and increase server throughput
US6144996A (en) * 1998-05-13 2000-11-07 Compaq Computer Corporation Method and apparatus for providing a guaranteed minimum level of performance for content delivery over a network
US6563517B1 (en) * 1998-10-02 2003-05-13 International Business Machines Corp. Automatic data quality adjustment to reduce response time in browsing
US6658485B1 (en) * 1998-10-19 2003-12-02 International Business Machines Corporation Dynamic priority-based scheduling in a message queuing system
US6389462B1 (en) 1998-12-16 2002-05-14 Lucent Technologies Inc. Method and apparatus for transparently directing requests for web objects to proxy caches
US6763371B1 (en) * 1999-05-10 2004-07-13 Telefonaktiebolaget Lm Ericsson (Publ) Method and apparatus for collaborative communication in a communication network
US7340499B1 (en) * 1999-12-03 2008-03-04 Sun Microsystems, Inc. Dynamic embedding of literal object data in supplied instance of information object
US7552233B2 (en) * 2000-03-16 2009-06-23 Adara Networks, Inc. System and method for information object routing in computer networks
CN1172246C (en) * 2000-03-29 2004-10-20 松下电器产业株式会社 Dynamic agent service program device
US6954429B2 (en) * 2000-04-05 2005-10-11 Dyband Corporation Bandwidth control system
AU2001264870A1 (en) * 2000-05-25 2001-12-03 Qmgn, Inc. Enhanced downloading from a computer network and profiling of a user of a computer network
DE10049619A1 (en) * 2000-10-05 2002-04-18 Alcatel Sa Process for the provision of services in a network management system with an open system architecture as well as a service object, requirement object and requirement manager for this

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5046121A (en) * 1989-01-31 1991-09-03 Konica Corporation Image data compression apparatus
US6512791B1 (en) * 1991-05-15 2003-01-28 Canon Kabushiki Kaisha Image processing apparatus having means for controlling exposure using an orthogonal transformation coefficient
US5825846A (en) * 1995-12-21 1998-10-20 U.S. Philips Corporation Noise reduction in an image
US6789075B1 (en) * 1996-06-10 2004-09-07 Sun Microsystems, Inc. Method and system for prioritized downloading of embedded web objects
US6085193A (en) * 1997-09-29 2000-07-04 International Business Machines Corporation Method and system for dynamically prefetching information via a server hierarchy
US6266742B1 (en) * 1997-10-27 2001-07-24 International Business Machines Corporation Algorithm for cache replacement
US6697859B1 (en) * 1998-03-30 2004-02-24 Canon Kabushiki Kaisha Apparatus, method, program, and information processing system for prioritized data transfer to a network terminal
US20020073167A1 (en) * 1999-12-08 2002-06-13 Powell Kyle E. Internet content delivery acceleration system employing a hybrid content selection scheme
US20020143896A1 (en) * 1999-12-30 2002-10-03 Uwe Hansmann Efficient downloading of documents from the internet
WO2002007395A1 (en) * 2000-07-19 2002-01-24 Hitachi, Ltd. Web information preferential transfer system
US7401118B1 (en) * 2000-07-19 2008-07-15 Hitachi, Ltd. Web information preferential transfer system

Cited By (45)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8811952B2 (en) 2002-01-08 2014-08-19 Seven Networks, Inc. Mobile device power management in data synchronization over a mobile network with or without a trigger notification
US8023408B2 (en) * 2004-11-19 2011-09-20 International Business Machines Corporation Dynamically changing message priority or message sequence number
US20060109857A1 (en) * 2004-11-19 2006-05-25 Christian Herrmann System, method and computer program product for dynamically changing message priority or message sequence number in a message queuing system based on processing conditions
US8839412B1 (en) 2005-04-21 2014-09-16 Seven Networks, Inc. Flexible real-time inbox access
US8761756B2 (en) 2005-06-21 2014-06-24 Seven Networks International Oy Maintaining an IP connection in a mobile network
US8805425B2 (en) 2007-06-01 2014-08-12 Seven Networks, Inc. Integrated messaging
US8774844B2 (en) 2007-06-01 2014-07-08 Seven Networks, Inc. Integrated messaging
US9002828B2 (en) 2007-12-13 2015-04-07 Seven Networks, Inc. Predictive content delivery
US8862657B2 (en) 2008-01-25 2014-10-14 Seven Networks, Inc. Policy based content service
US8838744B2 (en) 2008-01-28 2014-09-16 Seven Networks, Inc. Web-based access to data objects
US8799410B2 (en) 2008-01-28 2014-08-05 Seven Networks, Inc. System and method of a relay server for managing communications and notification between a mobile device and a web access server
US9959229B2 (en) 2008-09-29 2018-05-01 International Business Machines Corporation Associating process priority with I/O queuing
US20100082855A1 (en) * 2008-09-29 2010-04-01 Internatinal Business Machines Corporation Associating process priority with i/o queuing
US9262357B2 (en) 2008-09-29 2016-02-16 International Business Machines Corporation Associating process priority with I/O queuing
US8909759B2 (en) 2008-10-10 2014-12-09 Seven Networks, Inc. Bandwidth measurement
US9049179B2 (en) * 2010-07-26 2015-06-02 Seven Networks, Inc. Mobile network traffic coordination across multiple applications
US20120185597A1 (en) * 2010-07-26 2012-07-19 Michael Luna Mobile network traffic coordination across multiple applications
US9043433B2 (en) * 2010-07-26 2015-05-26 Seven Networks, Inc. Mobile network traffic coordination across multiple applications
US9671851B2 (en) 2010-07-26 2017-06-06 Seven Networks, Llc Optimizing mobile network traffic coordination across multiple applications running on a mobile device
US8838783B2 (en) 2010-07-26 2014-09-16 Seven Networks, Inc. Distributed caching for resource and mobile network traffic management
US20120023190A1 (en) * 2010-07-26 2012-01-26 Ari Backholm Mobile network traffic coordination across multiple applications
US8924395B2 (en) 2010-10-06 2014-12-30 Planet Data Solutions System and method for indexing electronic discovery data
US8782222B2 (en) 2010-11-01 2014-07-15 Seven Networks Timing of keep-alive messages used in a system for mobile network resource conservation and optimization
US8843153B2 (en) 2010-11-01 2014-09-23 Seven Networks, Inc. Mobile traffic categorization and policy for network use optimization while preserving user experience
US20120117253A1 (en) * 2010-11-09 2012-05-10 Usablenet Inc. Methods for reducing latency in network connections and systems thereof
US8868638B2 (en) 2010-11-09 2014-10-21 Usablenet Inc. Methods for reducing latency in network connections using automatic redirects and systems thereof
US8984164B2 (en) * 2010-11-09 2015-03-17 Usablenet Inc. Methods for reducing latency in network connections and systems thereof
US9100873B2 (en) 2010-11-22 2015-08-04 Seven Networks, Inc. Mobile network background traffic data management
US10164895B2 (en) * 2011-03-11 2018-12-25 Citrix Systems, Inc. Systems and methods of QoS for and single stream ICA
US8832228B2 (en) 2011-04-27 2014-09-09 Seven Networks, Inc. System and method for making requests on behalf of a mobile device based on atomic processes for mobile network traffic relief
WO2013059756A1 (en) * 2011-10-20 2013-04-25 Microsoft Corporation Enabling immersive search engine home pages
CN102915364A (en) * 2011-10-20 2013-02-06 微软公司 Realization of immersion type search engine homepage
US9207754B2 (en) 2011-10-20 2015-12-08 Microsoft Technology Licensing, Llc Enabling immersive, interactive desktop image presentation
US8868753B2 (en) 2011-12-06 2014-10-21 Seven Networks, Inc. System of redundantly clustered machines to provide failover mechanisms for mobile traffic management and network resource conservation
US8934414B2 (en) 2011-12-06 2015-01-13 Seven Networks, Inc. Cellular or WiFi mobile traffic optimization based on public or private network destination
US9009250B2 (en) 2011-12-07 2015-04-14 Seven Networks, Inc. Flexible and dynamic integration schemas of a traffic management system with various network operators for network traffic alleviation
US10110646B2 (en) * 2012-03-12 2018-10-23 Network Coding, Inc. Non-intrusive proxy system and method for applications without proxy support
US8812695B2 (en) 2012-04-09 2014-08-19 Seven Networks, Inc. Method and system for management of a virtual network connection without heartbeat messages
US8775631B2 (en) 2012-07-13 2014-07-08 Seven Networks, Inc. Dynamic bandwidth adjustment for browsing or streaming activity in a wireless network based on prediction of user behavior when interacting with mobile applications
US8874761B2 (en) 2013-01-25 2014-10-28 Seven Networks, Inc. Signaling optimization in a wireless network for traffic utilizing proprietary and non-proprietary protocols
US8750123B1 (en) 2013-03-11 2014-06-10 Seven Networks, Inc. Mobile device equipped with mobile network congestion recognition to make intelligent decisions regarding connecting to an operator network
US9065765B2 (en) 2013-07-22 2015-06-23 Seven Networks, Inc. Proxy server associated with a mobile carrier for enhancing mobile traffic management in a mobile network
US20180343207A1 (en) * 2015-07-02 2018-11-29 Zte Corporation Streaming Media Data Transmission Method and Apparatus
US10554573B2 (en) * 2015-07-02 2020-02-04 Zte Corporation Streaming media data transmission method and apparatus
US20180063220A1 (en) * 2016-08-30 2018-03-01 Citrix Systems, Inc. Systems and methods to provide hypertext transfer protocol 2.0 optimization through multiple links

Also Published As

Publication number Publication date
DE60208786D1 (en) 2006-04-06
CN1625877A (en) 2005-06-08
PT1493257E (en) 2006-06-30
CN100531186C (en) 2009-08-19
IL163889A0 (en) 2005-12-18
EP1650931A1 (en) 2006-04-26
ES2317348T3 (en) 2009-04-16
EP1493257A1 (en) 2005-01-05
WO2003085924A1 (en) 2003-10-16
PT1650931E (en) 2009-02-13
EP1493257B1 (en) 2006-01-18
IL189779A0 (en) 2008-08-07
IL189779A (en) 2010-05-17
US7721294B2 (en) 2010-05-18
IL163889A (en) 2010-02-17
DE60208786T2 (en) 2006-09-28
ATE413763T1 (en) 2008-11-15
ES2257543T3 (en) 2006-08-01
US20050240940A1 (en) 2005-10-27
ATE316312T1 (en) 2006-02-15
AU2002257754A1 (en) 2003-10-20
DE60229796D1 (en) 2008-12-18
EP1650931B1 (en) 2008-11-05

Similar Documents

Publication Publication Date Title
US7721294B2 (en) Object transfer control in a communications network
US8078759B2 (en) Method for prefetching of structured data between a client device and a server device
US10361959B2 (en) Method and system for dynamic interleaving
US6854018B1 (en) System and method for intelligent web content fetch and delivery of any whole and partial undelivered objects in ascending order of object size
US6959318B1 (en) Method of proxy-assisted predictive pre-fetching with transcoding
Floyd et al. Mobile web access using eNetwork Web Express
EP2507938B1 (en) System and methods for efficient media delivery using cache
JP5795327B2 (en) HTTP optimization, multihoming, mobility, and priority
US7552220B2 (en) System and method to refresh proxy cache server objects
US9158845B1 (en) Reducing latencies in web page rendering
US6848000B1 (en) System and method for improved handling of client state objects
US20100146415A1 (en) Dns prefetch
US20110106908A1 (en) Transfer of information between at least two software
US6324584B1 (en) Method for intelligent internet router and system
MXPA03011152A (en) A system and method for reducing the time to deliver information from a communications network to a user.
US20110191771A1 (en) Feature Manager System for Facilitating Communication and Shared Functionality Among Components
US20030110154A1 (en) Multi-processor, content-based traffic management system and a content-based traffic management system for handling both HTTP and non-HTTP data
US20060155819A1 (en) Methods and system for using caches
US7912089B2 (en) Methods, systems, and products for condensing messages
US5832232A (en) Method and apparatus for providing user-based flow control in a network system
JP2004513405A (en) System, method and program for ordered and pre-caching linked files in a client / server network
KR100647419B1 (en) Predictive data cache method for data retrieval service
JP2003114838A (en) Download surrogate system and download surrogate method
KR20030042658A (en) Recording medium storing a browser therein and a data downloading method therewith

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION