TW200304298A - Software, systems and methods for managing a distributed network - Google Patents

Software, systems and methods for managing a distributed network Download PDF

Info

Publication number
TW200304298A
TW200304298A TW092103268A TW92103268A TW200304298A TW 200304298 A TW200304298 A TW 200304298A TW 092103268 A TW092103268 A TW 092103268A TW 92103268 A TW92103268 A TW 92103268A TW 200304298 A TW200304298 A TW 200304298A
Authority
TW
Taiwan
Prior art keywords
envelope
bandwidth
agent
application
network
Prior art date
Application number
TW092103268A
Other languages
Chinese (zh)
Inventor
Suketu J Pandya
Varad V Joshi
Original Assignee
Centrisoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Centrisoft Corp filed Critical Centrisoft Corp
Publication of TW200304298A publication Critical patent/TW200304298A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/04Network management architectures or arrangements
    • H04L41/046Network management architectures or arrangements comprising network management agents or mobile agents therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0894Policy-based network configuration management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0896Bandwidth or capacity management, i.e. automatically increasing or decreasing capacities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/22Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/50Network service management, e.g. ensuring proper service fulfilment according to agreements
    • H04L41/5003Managing SLA; Interaction between SLA and QoS
    • H04L41/5019Ensuring fulfilment of SLA
    • H04L41/5025Ensuring fulfilment of SLA by proactively reacting to service quality change, e.g. by reconfiguration after service quality degradation or upgrade
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/11Identifying congestion
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/20Traffic policing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/24Traffic characterised by specific attributes, e.g. priority or QoS
    • H04L47/2441Traffic characterised by specific attributes, e.g. priority or QoS relying on flow classification, e.g. using integrated services [IntServ]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/70Admission control; Resource allocation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/70Admission control; Resource allocation
    • H04L47/74Admission control; Resource allocation measures in reaction to resource unavailability
    • H04L47/745Reaction in network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/70Admission control; Resource allocation
    • H04L47/78Architectures of resource allocation
    • H04L47/782Hierarchical allocation of resources, e.g. involving a hierarchy of local and centralised entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/70Admission control; Resource allocation
    • H04L47/80Actions related to the user profile or the type of traffic
    • H04L47/803Application aware
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/70Admission control; Resource allocation
    • H04L47/80Actions related to the user profile or the type of traffic
    • H04L47/805QOS or priority aware
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/70Admission control; Resource allocation
    • H04L47/82Miscellaneous aspects
    • H04L47/822Collecting or measuring resource availability data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/50Network service management, e.g. ensuring proper service fulfilment according to agreements
    • H04L41/5077Network service management, e.g. ensuring proper service fulfilment according to agreements wherein the managed service relates to simple transport services, i.e. providing only network infrastructure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/50Network service management, e.g. ensuring proper service fulfilment according to agreements
    • H04L41/508Network service management, e.g. ensuring proper service fulfilment according to agreements based on type of value added network service under agreement
    • H04L41/509Network service management, e.g. ensuring proper service fulfilment according to agreements based on type of value added network service under agreement wherein the managed service relates to media content delivery, e.g. audio, video or TV

Abstract

A system and method for managing network bandwidth consumption. The system may include an agent module loadable on a networked computer and configured to aid in managing bandwidth consumption within a network, The agent module is configured to obtain an allocation of network bandwidth usable by the networked computer, and is further configured to sub-allocate such allocation among multiple bandwidth-consuming components associated with the networked computer. The system may further include multiple such agent modules loadable on plural networked computers, and a control module configured to interact with each of the agent modules to dynamically manage bandwidth usage by the networked computers.

Description

200304298 玖、發明說明: 相關申請案交互參照 本發明係主張申請於2 〇 〇 2年2月i 8曰之美國臨 日寸申吻案第6 0 / 3 5 7,7 3 1號之優先權,該案於此 係併入作為參考。 發明所屬之技術領域 本毛明大致上係關於分散式網路系統,且尤其係關於 用於管理_個分散式網路之資源的軟體、系、統及方法。 先前技術 A,、及私有網路係已經轉向一個優越的分 型’且已經持續地於尺寸、能力及複雜性上成二= 長係已經伴隨對應之置於資訊技術上的需要之增加,以增 加止業層級之生產力,操作及顧問/使用者之支援為了達 =增加複雜性之網路系統中之互相運作,傳輪控制協定 網際網路協定及其他標準化通訊協定係已經被廣泛性地 I置:雖然這些協定之許多個係已經於有效於達成互相運 &lt;、、'、而’對於使㈣些協定之網路而言,該 泛的配置係已_伴隨管理解決方案之對應的^發展廣 資源=二網路係提供極少之用於管理網路 案之方式’且典型地係提供已知Α ‘‘最大的 努力之服務至所有網路交通。最大的努力 制協y網際網路協定網路之該預設之行為:、其;= 對過ΐ之網路擁塞時,網路節點僅係無區分地 : 由於最大的努力之服務,係不設置機構以避免導=封 200304298 包之擁基’且網路流iS資、j*、 、貝枓係不被分類以確保更重要資料 之可靠傳輸。此外,使用者係不具有關於網路情況或者未 完全表現之資源。此種缺乏管理常常造成重複、不成功之 網路請求、使用者失敗及減少之生產力。 與管理網路資源相關$ M ^ m 貝料目關之問題係因這些資源之需求的急 速增加而變成更嚴重。用於八 、刀政式網路連結之新的應用係 以快速之腳步發展。這些應用係已經大幅改變之效能條件 。多媒體之應用,舉例而言係對於抖動、損耗及延遲具有 非予间之敏感性,而其他應用係具有相當適當之頻率條件 二:Γ步之問題係為許多頻率密集之應用係使用於娛 条或者其他較低優先之工作。 於缺乏有效的管理工呈之 及變化之競爭之結果係為擁ί雍用於網路資源之該增加 j及知失生產力。當網路係無法區分不重要的工作或者 務ΐ工㈣之請求時,網路資源通常係以與商 先:相付之方式貫施。頻寬可能被浪費或者被較佳優 t:作所消耗。消費者可能於内部使用者置放一個高:: 負載於该網路上而經歷不滿意之網路效能。 、 了同的解決方案已經被採用,但對於解決這些網路总 1二喊僅具有有限度之成功。舉例而言為了減少擁塞,: 路官理器通常增加更多的頻寬至擁塞之 土 、、、 荦得尸主、 土 鍵路。此項解決方 η糸叩貝的,且係為暫時的,網路 ,使得該提供之鏈純快地Μ ㈣/動且成長 於該插耸+ π 成再度擁基。此通常係發生 塞之主要的原因未被解決之情況下。通常,係期望 200304298 曰慧地官理現存之資源,而不是“過度提供,,,亦即,僅 提供更多之資源以減少犧牲。 個官理之解決方案之廣的及觀念之分類可以被想成 f圖於了個分散式網路環境中增力σ ‘‘知道,,。該觀念係為 他罔路係更知道執行於以網路連接之裝置上之應用或者其 工作,且反之亦然,則係能夠採取更有效使用網路資源 =ν驟。舉例而言,假如網路管理軟體係變成知道-個特 定之使用者係執行一個較低優先之應用,則該網路能夠阻 斷或者限制_ ^吏用者接取網路之資源。假如管理軟體係變 成知道於一給定性質下,該網路個體群係包含高比率之外 部的顧客,則頻寬喜好及優先係能夠被修改,以確保該些 顧客係具有該網路之一個正面的經驗。於該觀念下,增加 應用及網路知道性係為—個期望之目#,然而,應用之販 賣者大部分係忽略這些考量且傾向於不注意網路之内部結 構’而係注意於加強應用之功能。 服務之品質(Quality of Service,Q〇s)及以政策為 基礎之管理技術係代表於網路、應用及使用者之間的間隙 建立橋樑,以更有效率地管理網路資源之使用。服務之品 質係為一個指允許網路知道的應用根據諸如頻寬、抖動、 延遲及損失之效能規格而請求及接收一個可預測之服務水 準之技術的名詞。已知之服務的品質之方法係包含不允許 某些形式之封包,減慢傳輸速率,對於某些形式之封包建 立可區分之服務等級,以一個優先值標記封包及不同的佇 列方法。於一個具有稀少資源之分散式環境中,服務之品 200304298 、、技衔係必須藉由對於某些網路通訊資料給予較好之待 遇而將不平等導入該系統中。 ’ 以政策為基礎之網路管理係使用政策或者規則,以定 義網路資源如何被使用。廣義來說,一個政策係包含一個 條件及-個行動。一個政策之範例可以為,假如該資料之 該網際網路協定來源位址係包含於不允許之位址上之列表 、(條件),則阻斷或者不接取或者不允許封包(行動)。 以為基礎之_管理技術之—個料料決定由服務 之口口貝的方法所導入之該不平等應該何時及如何應用。 以政策為基礎之管理解決方案典型地係需要於並 =前,該網路之通訊資料被分類。該分類之程序係能夠於 資料取出之不同層級中產生,且可以根據網路裝置使用以 透過-網路鏈路而通訊之分層之通訊協定。有兩種協定分 層模型係於該領域中占主要的地位。該第一種係為該開放 系、、先互連(0SI)參考模型,如示於第丄圖。該開放系統互 連模型之層係為:應用層(第7圖),表現層(第6層) ’會儀層(第5層),運輸層(第4層),網路層(第3 層),資料鏈路層(第2層)及實體層(第丄層)。該第 一個主要之模型係形成用於傳輸控制協定/網際網路協定 、之基礎其之層係為應用層,運輸層,網路層,資料鏈 路層及貝體層’如亦示於第工圖。該傳輸控制協定/網際 網路協定之層係、於功能上對應於該開纟系統互連之層層, 然而不具有表現層及會議層。於該兩種模型中,當資料係 循序於該些層之間通過時,資料係被處理且改變形式。 200304298 已知之以政桌為基礎之管理解決方案及服務之品質的 方法典型地係藉由監視於該運輸層及運輸層以下之資料流 而分類資料。舉例而言,一個共同的多重參數分類器係為 ’ 眾所周知之‘‘ 5元組(five—tuple),,,其係包含網際網 路協定來源位址,網際網路協定目的地位址,網際網路協 定,傳輸控制協定/使用者資料簡協定來源埠及傳輸控制 協定/目的地埠。這些參數係全部於該些模型之該運輸及 網路層中獲得。絕大部分之現存以政策為基礎及服務之品 質的解決方案係藉由於這些協定之層處監視及分類網路活 動而實施。然而,協定層越高,則該可使用之資料及分類 器係越月確且特疋。因為傳統之以政策為基礎及服務之品 f之方法係不於比該運輸層為高之層採用分類器,其係不 能夠於較高層處使用更詳細之可使用資料而採用以政策為 基本之技術或者服務之品質之方法。因此,該些傳統之系 統係使該網路成為更加應用知道的,及反之亦然係受限於 其之能力。 此外,用於管理網路資源之該已知系統係非有效地冑 _ 決頻寬管理之問題。頻寬通常係由較低優先之工作所消耗 二,代價係為商業重要的應用。於不提供以優先順序 ’、…之頻寬分配之系統中,該頻寬分配係為靜態的,且 對於回應改變網路條件係不動態地調整。 發明内容 網路頻寬消耗之系統及 載於^一個連接網路之電 因此,本發明係提供用於管理 方法,其係可以包含使用一個可負 10 200304298 腦上之代理器模組。該代理器模組係被建構成可以由該連 接網路之電腦所使用之網路頻寬之分配,且係進—步建構 成於與該連接網路之電腦相關之複數個頻寬消耗元㈣次 分配如此之分配。該系統可以進—步包含負載於 上之複數個代理器模組,及一個控制模組, 扳ϋ坫从 嗶個又互作用,以動態地管 理由该連接網路之電腦所使用之頻寬。 實施方式 本發明係提供一種用於管理於諸如示於第 散式網路1 〇之分岑彳、έ拉 圖之》亥刀 統及方法。該軟體,系Μ β + I . '糸 茨孕人體,糸統及方法係增加生 用者之滿意度,最小化你田w i刀及顧客/使 -^化使用该網路所具有之失敗,乃f祛 確保網路資源係以-個與主要⑫及最後 方式使用。 Μ業或者其他目的相符之 5亥糸統及方法你 代理器及一個控制模组,:/個主要的軟體元件,-個 ^ Μ % ^ 、、、、,亦%為一個控制點。該代理哭及 ”點可以配置於整個分散式網 二:二 互作用,以管理網路資源 了以彼此父 地in 6 , ,、 Α數個代理器可以配置成智慧 地連接客戶,飼服 1成曰慧 配置之代理器係監視、分:及=置至該主要的網路。該 之裝置的網路事件採取行動。h關於其相關之連接網路 調的及/或由一或多個㈣°Λ代理益典型地係為中央協 係可以交互作用以控制及 工制°§亥代理器及控制點 操作及擁塞狀態,選擇網路事件,追縱網路資源之 ^擇用於網路請求之最佳化目標,動態 200304298 &amp;里頻寬使用,及與顧客、使用者及電腦技術人員分享 關於網路之狀況。 圖所不’ δ亥分散式網路丄0可以包含一個區域網路 12及複數個由諸如網際網路之公共網路16所連結之遠 罔路1 4 °邊區域網路及遠距網路可以以諸如路由器工 網路基礎結構裝置而連接至該公共網路。 =網路i 2典型地係包含伺服器2 〇及諸如由網路 鍵路2 4所互連之客戶雷腦9 〇令办 網路12可以勺人客戶襄置。此外’區域 器 =3任何數量及種類之裝置,包含檔案伺服 客戶電r Ί月_^ ’郵件词服器,全球網伺服器,資料庫, 哭、^^距接取裝置1存裝置,列表機及諸如路由 ,士構#署土㈣、集線器及中繼器之網路基礎 、、口構裝置。遠距網路]4 之連接網路之裝置。 '類似地包含任何數量及種類 事貫上’真實的任何形式瞀 示於第2圖之該網 冲置係可以被連接至 手持電Μ 匕3 一般目的電腦,膝上型電腦, 卞^ ^月回,無線計算梦 固 算裝置万m 置仃動電話,傳呼器,普及的計 、 同的其他特殊裝置。並 係為-般目的電腦,士 4地❹連接之裝置 ,一個電腦车銻/1 '、,、八有至少某些示於第3圖之元件 们玉知糸統4 〇之方挣岡主—_ -個處理數位資料^ 不。電腦系統40係包含 欲伹貝#之處理器4 2。 雜指令集計算微處理器,一個以為一個複 一個非常長指令安η声 πs s 7集叶异微處理器, 器或者任何理器,-個實施指令、-個微控制 7其他處理器ν控制器裝置之組合之處理器。 12 200304298 再度參照第3圖,應注意的是,處理器以係 -個於該處理H及該電腦♦統内之其他元件之間傳 之;流排“。熟習本項技術者將可以瞭解,該匯流二 以為一個單一匯流排或者複數個匯流排。一個記憶體 係連接至匯流排44,且包含—個隨機存取記憶體元件4 7 (稱為主記憶體),該隨機存取記憶體元件4 7係於 行期間藉由處理器4 2而儲存資訊或者其他中間資料。、記 憶體4 6亦包含一個唯讀記憶體及&quot;其他靜態:存媒體己 4 8 ’其係連接至儲存用於處理器4 2之資訊及指令之匯 流排。-個包含有助於在諸如於起始期間電腦系統之元件 之間轉移資訊之該基本程序之基本輸人/輸以統(應 )4 9係儲存於唯讀記憶體4 8中。—個資料儲存裝置5 0亦係連接至匯流排4 4且儲存資訊及指令。該資料儲存 裝置可以為一個硬碟機’一個軟碟機一個唯讀光碟機裝置 ’一個快閃記憶體元件或者任何其他儲存裝置。於該圖示 之電腦系統中’-個網路介面5 2係亦連接至匯流排4 4 。該網路介面係操作成連接該電腦系統至一個網路(未干 出 電腦系統4 0亦可以包含一個連接至匯流排4 4之顯 示裝置控5 4 ° 1¾顯示|置控帝j器係允許一個顯示裝 置連接至該電腦系統,且操作成將該顯示裝置介面連接至 該電腦系統。該顯示裝置控制器5 4可以,舉例而言,為 一個單色顯示轉換卡’ 一個彩色圖形轉換卡’或者其他顯 示裝置控制器。該顯示裝置(未示出)可以為一個電視機 13 200304298 個電腦監視器,一個平面顯示器或者其他顯示裝置。 該顯示裝置係透過顯示裝置控制器5 4而接收由處理器4 2而來之資訊及資/料,且_示該資訊及資料至該電腦系統 4 0之使用者。 y…200304298 发明 Description of the invention: Cross-reference to related applications The present invention claims the priority of the United States Proposal No. 60/3 5 7, 7 3 1 filed on February 8th, 2002. The case is hereby incorporated by reference. TECHNICAL FIELD This invention relates generally to distributed network systems, and more particularly to software, systems, systems, and methods for managing resources of a distributed network. The previous technology A, and the private network system have shifted to a superior type, and have continued to be two in size, capacity and complexity = the long system has been accompanied by the corresponding increase in the need for information technology. Increase productivity at the end-of-business level, operation and consultant / user support In order to achieve increased interoperability in network systems with increased complexity, round-trip control protocols, Internet protocols, and other standardized communication protocols have been widely adopted. Placement: Although many of these agreements have been effective in achieving mutual operations, <,,, and 'for networks that use these agreements, the general configuration has been accompanied by the corresponding management solution. Development of wide resources = The two networks provide very few ways to manage network cases' and typically provide known A's best efforts to all network traffic. The best-effort system of the Internet Protocol network: This default behavior :, its; = in the case of excessive network congestion, the network nodes are only indiscriminate: due to the best-effort service, do not Set up a mechanism to avoid the introduction of the envelope of the 200304298 packet, and the network flow iS data, j *,, and 枓 are not classified to ensure the reliable transmission of more important data. In addition, users do not have resources about network conditions or incomplete performance. This lack of management often results in duplicate, unsuccessful network requests, user failures, and reduced productivity. The problems related to the management of network resources are more serious because of the rapid increase in demand for these resources. New applications for the Internet connection of Dao and Dao are developed at a rapid pace. These applications have dramatically changed performance conditions. Multimedia applications, for example, have unpredictable sensitivity to jitter, loss, and delay, while other applications have fairly appropriate frequency conditions. Two: The problem of the Γ step is that many frequency-intensive applications are used in entertainment bars. Or other lower priority work. The result of the lack of effective management and the competition for change is the increase in the use of network resources and the loss of productivity. When the network department cannot distinguish between unimportant jobs or requests for work, the network resources are usually implemented in a way that deals with business: pay. Bandwidth may be wasted or consumed by better performance. Consumers may place a high :: load on the network and experience unsatisfactory network performance. The same solution has been adopted, but there is only a limited degree of success in solving these network problems. For example, in order to reduce congestion, road controllers usually add more bandwidth to the congested soil. The solution of this solution is temporary, and the network makes the provided chain pure and fast and grows from the plug-in + π to form a new base. This is usually the case where the main cause of the congestion has not been resolved. Generally, it is expected that the existing resources of Huidi Government Management will be 200304298, rather than "over-provisioning," that is, only providing more resources to reduce sacrifice. The broad and conceptual classification of individual government solutions can be classified I want to make a graph of f in a decentralized network environment. I know that the concept is that his system knows more about the application or work performed on a network-connected device, and vice versa. However, it can take more effective use of network resources = ν. For example, if the network management software system becomes aware that a particular user is executing a lower priority application, the network can be blocked Or restrict users to access network resources. If the management software system becomes aware that, under a given nature, the network's individual group contains a high percentage of external customers, bandwidth preferences and priorities can be Modify to ensure that the customers have a positive experience with the network. Under this concept, increasing application and network awareness is a desired goal #, however, most of the vendors of applications ignore this Considering and tending to pay no attention to the internal structure of the network, but to pay attention to enhancing the function of the application. Quality of Service (Q0s) and policy-based management technology represent the network, applications, and use To bridge the gap between the two, to more efficiently manage the use of network resources. The quality of service is a request that allows applications that the network knows to request and receive according to performance specifications such as bandwidth, jitter, delay, and loss. A term for a technology of predictable service level. Known methods of service quality include not allowing certain forms of packets, slowing down transmission rates, establishing distinguishable service levels for certain forms of packets, with a priority value Marking packets and different enqueuing methods. In a decentralized environment with scarce resources, the service product 200304298 and technical titles must introduce inequality into the network by giving better treatment to certain network communications. System. 'Policy-based network management uses policies or rules to define how network resources are used. For example, a policy consists of a condition and an action. An example of a policy could be, if the source of the Internet Protocol source address of the data is a list, (conditions) contained in a disallowed address, then Block or not access or allow packets (actions). Based on the _ management technology-a material determines when and how the inequality introduced by the service mouth and mouth method should be applied. Based on policy The management solution typically requires that the communication data of the network be classified before and before. The classification process can be generated at different levels of data extraction, and can be used to pass through the network link according to the network device. Hierarchical communication protocols for road communications. There are two types of protocol hierarchies that dominate the field. The first is the open system, first interconnect (0SI) reference model, as shown in Figure 丄. The layers of this open system interconnection model are: application layer (Figure 7), presentation layer (Layer 6) 'meeting instrument layer (Layer 5), transport layer (Layer 4), and network layer (Layer 3 Layer), data link layer (layer 2), and physical layer (layer 2). The first major model is the basis for the transmission control protocol / Internet protocol. The layers are the application layer, the transport layer, the network layer, the data link layer, and the corpuscle layer. Drawing. The transmission control protocol / Internet protocol layer corresponds in function to the layers of the open system interconnection, but does not have a presentation layer and a conference layer. In both models, data is processed and changes its form as it passes through the layers sequentially. 200304298 Known methods for the quality of political table-based management solutions and services typically categorize data by monitoring data flows at and below the transport layer. For example, a common multi-parameter classifier is a 'well known' five-tuple, which contains the Internet Protocol source address, Internet protocol destination address, and Internet Protocol, transmission control protocol / user data protocol source port and transmission control protocol / destination port. These parameters are all obtained in the transport and network layers of the models. The vast majority of existing policy-based and service-quality solutions are implemented by monitoring and classifying network activities at the layers of these agreements. However, the higher the protocol level, the more accurate and specific the available data and classifiers. Because the traditional policy-based and service quality method of f is not to use a classifier at a level higher than the transport layer, it cannot use more detailed usable data at a higher level and adopt a policy-based approach. Technology or quality of service. Therefore, these traditional systems make the network more application-aware, and vice versa limited by its capabilities. In addition, the known system for managing network resources is an inefficient solution to the problem of bandwidth management. Bandwidth is usually consumed by lower-priority tasks. The cost is a commercially important application. In a system that does not provide bandwidth allocation in the order of priority ', ..., the bandwidth allocation is static and does not adjust dynamically in response to changing network conditions. SUMMARY OF THE INVENTION A system for network bandwidth consumption and a network-contained power system Therefore, the present invention provides a method for management, which can include the use of an agent module that can be used on the brain. The agent module is constructed to allocate the network bandwidth that can be used by the computer connected to the network, and is further constructed into a plurality of bandwidth consumption elements related to the computer connected to the network. This time the allocation is made. The system can further include a plurality of agent modules and a control module loaded on it to interact with each other to dynamically manage the bandwidth used by the computer connected to the network . Embodiments The present invention provides a system and method for managing a server and a server, such as those shown in a distributed network 100. This software is Μ β + I. 糸 糸 Pregnancy, the system and methods are to increase the satisfaction of the user, to minimize the failure of your field knife and customers / make use of the network, This is to ensure that network resources are used in one way and the other and the last way. For the industry or other purposes, the system and method are as follows: your agent and a control module: / a major software component, a ^ Μ% ^ ,,,,, and also a control point. This agent can be configured in the entire decentralized network. Two: two interactions to manage network resources. In order to manage each other's parent in 6, several agents can be configured to connect customers intelligently. Feed 1 The agent configured by Cheng Yuehui is to monitor, divide: and set to the main network. Take action on the network events of the device. H Regarding its related connected network and / or by one or more The proxy agent is typically a central agency that can interact to control and control the system. § Agents and control points operate and congestion status, select network events, and track network resource choices for the network. The optimization goal of the request, dynamic 200304298 &amp; bandwidth usage, and share the status of the network with customers, users and computer technicians. Figures' δ Decentralized Network 丄 0 can include a regional network Road 12 and a plurality of remote roads connected by a public network 16 such as the Internet. The side LAN and remote networks can be connected to the public network with a network infrastructure device such as a router. = Network i 2 is typically bundled Server 2 0 and customers such as Lei Nao 9 which are interconnected by the network key 2 4 can make the network 12 available to customers. In addition, 'Area = 3 any number and type of devices, including file server Customer electricity 电 月 _ ^ 'mail server, global web server, database, cry, ^^ distance access device 1 storage device, list machine and such as routing, 士 ## 局 土 ㈣, hub and relay Network foundation, port configuration device. Long-distance network] 4 network-connected devices. 'Similarly includes any number and kind of things consistently' Any form of real is shown in Figure 2 of the network The device can be connected to a handheld computer, a general purpose computer, a laptop, a computer, a wireless computing device, and a wireless computing device. It can be used for mobile phones, pagers, popular computers, and other special devices. The device is a general purpose computer, a device connected to the 4th floor, a computer cart antimony / 1 ′ ,,, and at least some of the components shown in Figure 3 Owner—_-a piece of digital data processing ^ No. The computer system 40 includes a processor 4 for 伹 伹 贝 # 2. Miscellaneous instruction set computing microprocessor, one thinks that one complex one, and one very long instruction Ann π s s 7 set leaves different microprocessors, processors or any processor, one implementation instruction, one micro-control 7 other processors ν The combined processor of the controller device. 12 200304298 Referring again to Figure 3, it should be noted that the processor is passed between the processing unit H and other components in the computer system; . Those skilled in the art will understand that the bus 2 is considered to be a single bus or a plurality of buses. A memory system is connected to the bus 44 and includes a random access memory element 4 7 (referred to as a main memory), which is stored by the processor 4 2 during the line Information or other intermediate information. The memory 4 6 also contains a read-only memory and "other static: storage media 4 8 'which is connected to a bus that stores information and instructions for the processor 4 2. A basic input / output system containing a basic input / output system that helps to transfer information between components such as the computer system during the initial period is stored in the read-only memory 48. A data storage device 50 is also connected to the bus 44 and stores information and instructions. The data storage device may be a hard disk drive, a floppy disk drive, a read-only optical drive device, a flash memory element, or any other storage device. In the computer system shown in the figure, a network interface 5 2 is also connected to the bus 4 4. The network interface is operated to connect the computer system to a network (the computer system 40 has not been dried out, and may also include a display device connected to the bus 4 4 to control 5 4 ° 1¾ display | A display device is connected to the computer system and is operative to connect the display device interface to the computer system. The display device controller 54 can, for example, be a monochrome display conversion card 'a color graphics conversion card' Or other display device controller. The display device (not shown) may be a television set 13 200304298 computer monitor, a flat display or other display device. The display device is received and processed by the display device controller 54. The information and materials / materials from the computer 4 2 and _ show the information and data to the user of the computer system 40. y ...

-個包含數字及其他鍵之輸人裝置56典型地係連接 至匯流排4 4 ’以用於與處理器4 2流通資訊及命令。或 者,輸入裝置5 6係不直接連接至匯流排4 4,而㈣過 紅外線編碼訊號與該電腦系統作介面連接,由該輸入裝置 傳达至該電腦系統之一個紅外線接收器(未示出)。^輸An input device 56 containing numbers and other keys is typically connected to the bus 4 4 'for communicating information and commands with the processor 4 2. Alternatively, the input device 5 6 is not directly connected to the bus bar 4 4, but is connected to the computer system through an infrared coding signal, and is transmitted from the input device to an infrared receiver (not shown) of the computer system. . ^ Lose

入裝置亦可以為一個具有於該顯示裝置上選擇字元或者2 令選擇之鍵的遠距控制單元。 PThe input device may also be a remote control unit with a key for selecting characters or two selections on the display device. P

連接至第2圖之該些網路之不同的計算裝置典型地係 透過使用採用不同通訊協定之通訊軟體之網路鏈結而彼此 :訊。用於每一個連接網路之裝置之通訊軟體典型地係包 含許多協定層,透過該些協定層’當資料係於裝置間透過 ^固網路鏈結而交換時,資料係被循序轉移。帛丄圖係顯 =開放系統互連之具有層之協定及一個根據該傳輸控制協 定/網際網路協定之具有層的模型。這兩個模型係主控網 ,通訊軟體之領域。如可於圖中所見,該開放系統互連模 型係具有7層’其係包含應用層(第7圖),表現層(第 6 ’會4層(第5層)’運輸層(第4層),網路層 (第3層),資料鏈路層(第2層)及實體層(第丄層)0 °亥傳輸控制協定/網際網路協定組模型係包含應用層, 運輸層,網路層,資料鏈路層及實體層。 曰 14 200304298 角色於之每一個層係扮演於網路通”不同的 路徑上,:二:有:些協定之層係位於—個資料傳輸 7、,' 執仃於該特定連接網路之裝置上之 -個應用程式及該網路鏈路之間,而該 : 應用程式。者眘輕及山,, Θ係取接近該 05貝科係由一個執行於—個電腦上之應用浐4 透過該網路而轉移至於執 α用%式 式時,丄 個電腦上之-個應用程 &quot;貝枓係透過該第-電腦之該些協定層轉移向 二過該網路鍵路,且然後透過於該:二 層而轉移向上。 工些協定 於該顯示之兩種模型中,該應 路之裝置之一個作孝丰絲你人 貝貝與该連接網 於執行於”置1:Γ 連接’且用於提供-個用 運輸層係負責提供於一個以接取該網路。該 亀器之間。路伺服!及—個區域名稱系 用連接導向或者無連接之:::協疋,運輸功能可以使 型地係與端點至端點之被實現。該網路層典 、、 寻廷無關,而係盥在媸补—阳 _ 达及路由*料至f點及= 運輸層及網路層之下之 自貝科有關。於該 解決透過-個網路鍵社=4 U功月b ’且該最低層係 題。 鍵、,·。而傳送原始位元之實體及電性之問 於此所述之該〇h上系蛴 於…之任-個係:應:於採用附接於示 杲1的通A協疋之廣泛種類之網 15 200304298 路壤境,或者可應用至任何1 此他具有層之模型。此外,該 ^ 方法係可應用於任何形式t ;fe Μ B -r m 式之、,,罔路拓樸,且可應用 焉體及無線連結之網路。 本發明係提供用於管理續 ― 踗之二欠、K e里省如不於第2圖之一個企業網 路之貝/原的軟體、系餅刀古 之軟俨_ ” / 。此可以使用兩個互相作用 I孕人體7L件,一個代哭 Έ AM m U 一個控制點而完成,該兩個交 之軟體元件係可以適人於/ 一 外瞀奘罢 、σ於在诸如示於第3圖中之該 汁# 4置之計算裝置上執 兮外瞀继m 丁次者、纟口合堵如示於第3圖中之 忒计开凌置之計算裝置。如 η ^ ^ 丨%弟4圖,複數個代理器7 υ及或多個控制點7 2 #可Lv μ丄,々 軟體模袓## 糸了以糟由將該代理器及控制點 孕人篮镇組裝载於諸如客戶 叶曾F w μ 2及伺服器2 〇之連接網路的 蟑細你、+、 放式、,、罔路7 4上。如將予以 评細敘述,該代理器及控 系統之政H 係可以改變成及建構成實施 '、 束’血視及分析網路事件,;?轵捗、丄L古 谪合的耔^ 1 爭件及根據廷些事件採取 田々仃動’提供有價值的資 、^主。茨網路之接用:^ ·芬具 終確保網路之資源係以與主要 使用者,及最Different computing devices connected to the networks of Figure 2 typically communicate with each other through network links using communication software using different communication protocols. The communication software for each device connected to the network typically includes a number of protocol layers through which data is transferred sequentially as the data is exchanged between the devices via a fixed network link. The figure shows: a layered protocol for open systems interconnection and a layered model based on the transport control agreement / Internet protocol. These two models are the field of main control network and communication software. As can be seen in the figure, the open system interconnection model system has 7 layers, which includes an application layer (Figure 7), a presentation layer (6th, 4th (5th), and 4th) a transport layer (4th layer). ), Network layer (Layer 3), data link layer (Layer 2) and physical layer (Layer 2) 0 ° H Transmission Control Protocol / Internet Protocol Group model includes application layer, transport layer, network Road layer, data link layer, and physical layer. 14 200304298 Each layer plays a different role on the network communication path: Two: Yes: Some protocol layers are located in a data transmission. 'Between an application on the specific connected network device and the network link, and the: application. Caution light and mountain, Θ is taken close to the 05 Beco system by a Application running on a computer 4 When transferring through the network to the implementation of the% formula, an application on a computer &quot; Beijing is transferred through the protocol layers of the first computer Cross the network key to the second, and then move up through the: second layer. These two protocols are shown in the two In the model, one of the devices in the application should act as a filial piety. Your bebe and the connection network are executed at the "set 1: Γ connection 'and used to provide-a transport layer is responsible for providing one to access the The network. Between the routers. The road servo! And the area name is connection-oriented or no-connection: ::: Coordination. The transportation function can make the land system and the end-to-end point realized. The network The road layer code is not related to Xunting, but it is related to Beike under the Bubu-yang_Da and routing * materials to point f and = transport layer and network layer. The solution through this network Key Society = 4 U work month b 'and the lowest level is the problem. The key, ..., and the physical and electrical properties of the original bit transmission are described in any of the 0h above. Department: Should: Use the wide variety of nets attached to the Tong A Association of Exhibit 1 15 200304298 road soil, or can be applied to any other model with 1 layer. In addition, this method can be applied to Any form of t; fe Μ B -rm, in the form of, Kushiro topology, and can be applied to the body and wireless connection network. The present invention is intended for Management continuation ― 踗 之 二 欠, if the province is not in the same way as in Figure 2 of an enterprise network, the original software, and the soft knife of the ancient knife _ ”/. This can use two interactions. A human body is made of 7L pieces, one is crying AM m U and one control point is completed. The two intersecting software components can be adapted to one or the other, such as the juice shown in FIG. 3 # The computing device installed on the 4th computing device is connected to the external device following m Dingci, and the mouth is blocked. As shown in Figure 3, the computing device is set to open. For example, η ^ ^ 4%, multiple agents器 7 υ and or more control points 7 2 # 可 Lv μ 丄 , 々 软件 模 袓 ## It is unreasonable to load the agent and control point into a basket such as customer Ye Zeng F w μ 2 And the server connected to the Internet, you can use the +, +, free-standing, and Kushiro 7 4. If it will be described in detail, the system of the agent and control system can be changed and constructed to implement ', bundle' blood vision and analysis of network events;轵 捗, 丄 L 古 谪 合 耔 1 1 contending documents and adopting Tian Yidong according to these events to provide valuable resources. Internet connection: ^ · Finance finally ensure that the network resources are connected with the main users, and most

方式作有效地使用。 饤I 上述之軟體,系統及方 #而予以诸姐 女係τ以使用一個第三軟體元 仟向于以建構,該第二於辦 6圖予… 弟-軟體兀件係於下文參照第1 3至1 b圖予以砰細說明。典型妯, 、 忒、、、σ構設備係為一個平臺益 關的應用,其係提供一個 …、 口々1史用者介面,以申,士总 用於該些控制點及該些代理 、s 設備係可以適合於與其他管理^^心此外,該結構 由其他販賣者所提供之管理平臺。 ’面連接,包含 16 200304298 如示於第4圖,在 / L 個控制點7 2係典型地結合複數 個代理器7 〇,且該姓人 後数 …&amp;之代理器7 0係被稱為於該特定 的徑制點之一個域7 &lt;内。該控制點係協調及控制該此 分散式代理器於其域内 一 ^ &lt;仃動。此外,該些控制點可以監 視網路貧源之狀態,且 與该些代理器分享該管理及支援季 統之該資訊。 久文拔糸For effective use.饤 I use the above software, system, and method to construct the sisters and daughters τ to use a third software element to construct, the second to do 6 pictures to ... Brother-software components are referred to below with reference to 1 Figures 3 to 1b are illustrated in detail. A typical 、, 忒, 、, σ structure device is a platform benefit application, which provides a…, user interface for the application history, in order to apply, the taxi is always used for these control points and these agents, The device system can be adapted to other managements. In addition, the structure is a management platform provided by other vendors. 'Surface connection, including 16 200304298 As shown in Figure 4, the / L control points 7 2 are typically combined with a plurality of agents 7 0, and the surname of the surname ... & Is within a field 7 &lt; of the specific path point. The control point coordinates and controls the distributed agent to move within its domain. In addition, the control points can monitor the status of the network poor source, and share the information of the management and support season with the agents. Jiu Wenba

該些控制點7 2及代η哭π A 戈里σσ 7 〇可以彈性地配置於不同 的結構中。舉例而古,叙 牛1』向=母—個代理器可以結合一個主要的 控制點以及有需要時確保 呆主要的控制之一或多個備用控制 點。如此之一個結槿孫 構係不於第4圖,其中,於該虛線内之 控制點7 2係作為主要的遠6士 n y /啄内之 / 連結,且與伺服器裝置2 0相結 口之δ亥控制點係作為用於 〇 ,漓不之代理态之一個備用連 、、Ό。此外,该敛述之示範性 乾f生糸統可以被建構成使得一 制點係協定及控制一個單一十 工 、 早域或者複數個域之行動。或者 ,一個域可以被複數個控制點之合# ^ 〈口忭的仃動所控制及協調 〇此外,代理器可以被建槿忐 構成具有内建之控制點功能,且 因而可以不需要一個相關之控制點實體而作操作。 典型地,該4b代理、θ ,. 一 裔係诚視網路之資源及與該些控制 點結合且傳送該資訊$ $此^ &amp; 、成貝^至该些控制點之裝置之行動。為了回 應監視之網路狀態及由代理器 I视口·^貝枓,遠些控制 係可以改變特定代理器之行為,以提供該期望之網路服務 。該些控制點及代理器可以被載入至許多種類之褒置上, 包含-般目的電腦,伺服器,路由器’集線器,掌上 腦&quot;乎叫器’行動電腦及實體上任何具有一個處理器及記 17 200304298 憶體之其他連接網路之裝置。代理器及控制點可以駐留於 個別的裝置上,或者同時駐留於相同之裝置上。These control points 72 and G π A Gori σσ 7 〇 can be flexibly arranged in different structures. By way of example, the "Siu Niu 1" direction = mother-an agent can combine a main control point and if necessary, ensure that one or more backup control points are maintained. Such a structure is not as shown in FIG. 4. Among them, the control point 7 2 in the dotted line is the main far 6 ± ny / pecker // and is connected to the server device 20. The δH control point is used as a backup link for the proxy state. In addition, the exemplary system of convergence can be constructed so that a system of points and agreements control and control the actions of a single, early, or multiple domains. Alternatively, a domain can be controlled and coordinated by a combination of multiple control points. In addition, an agent can be constructed with built-in control point functions, and thus may not require a correlation Control point entities. Typically, the 4b agent, θ, .. is a device that respects the resources of the network and the devices that combine with the control points and transmit the information. This ^ &amp; In order to respond to the monitored network status and the viewport of the agent I, the remote control can change the behavior of a specific agent to provide the desired network service. These control points and agents can be loaded on many types of devices, including-general purpose computers, servers, routers 'hub, palm brain' mobile computers and any computer with a processor on the entity. 17 200304298 Memory other devices connected to the network. Agents and control points can reside on separate devices, or on the same device at the same time.

第5圖係顯示該敘述之軟體、系統及方法之不同元件 可以實際上與一個網路鏈結9 〇互連之方式之範例。該此 兀件係全部精由分層之通訊協定軟體9 2而連接至網路鏈 路9 0。該些元件係透過該通訊軟體及網路鍵路而彼此通 讯。如同熟習本項技術者將可以瞭解,網路鍵路9 〇可以 為一個實體的或者無線連結,或者包含實體的及無線的片 段之-系列的鏈路。更明確言之,該顯示之系統係包含一 個與-個客戶計算裝置2 2結合之代理器7〇,其係包含 一個應用程式9 8。另-個代理器係結合伺服器計算裝置 2 0。6亥些代理器係監視其所結合之計算裝置之行動,且 與控制點7 2通訊。結構設備! Q 6係與所有其他元件及 其他管理糸統通訊,以達爐兮 一 以運構3不冋的几件之操作且監視該 網路之狀態。Figure 5 shows an example of how the different components of the described software, system, and method can actually be interconnected with a network link. The components are all connected to the network link 90 by the layered communication protocol software 92. The components communicate with each other through the communication software and network keys. As those skilled in the art will understand, the network key 90 can be a physical or wireless link, or a series of links containing physical and wireless segments. More specifically, the system shown includes an agent 70 integrated with a client computing device 22, which includes an application 98. The other agent is a server computing device 20.6. These agents monitor the actions of the computing device to which they are connected and communicate with the control point 72. Structural equipment! Q 6 is to communicate with all other components and other management systems to achieve the operation of a few components and monitor the status of the network.

定義網路資源如何被使用之該些系統政策可以被中央 地定義,且被修剪成最有效率,以達成主要的目標。被定 義之政策係被該控制點所接取,其係接著傳送與該些政策 相關之不同元件及參數至其之域内之代理器、於—個非常 基本的層-人之下’-個政策係包含關於網路資源係如何被 使用之規則,且該些規則係包含當條件係滿足之下被採取 之條件及行動。該些代理器及控制點係監視該網路及連接 i該網路之裝置’以決定何時施加不同的規則及是否伴隨 該些規則之該些條件係滿足。一旦該代理器及/或控制點 18 200304298 係决疋u亥行動係需要的,則其、^ ^ 該系統之政策。 轉乂叙仃動,以實施 浐而5 ’成功的企業通常盡力於提供優良的顧客服 二 要的企業目標係能夠被轉換成許多定義網路資源 的政朿。如此之政策之-個範例係為, …' I的應用之效能係下降至一個臨限點 止或者限制接取非企業之重 、防 /、重要應用。另—個範例將為使用 服務之品質之技術,以提供一 電子商務應用。又另一個範㈣者…之服務至 電腦係由-個客戶二二:=:每當一個連接網路之 了動悲地增加分配至該連接網 的網路頻寬。此外,用於不同應用之頻寬可以於 备顧客頻繁使用網路資源時被限制。 控制點7 2將接取該些政策且提供政策資料至代理器 7 〇。代理器7 0及控制點7 2係彼此通訊,且監視該、; 路以决疋多少個顧客係正在接取該網&amp;,該 取何電腦,及該些顧客正在接取何種應用。一:該: 之條件被谓測出時,該代理器及控制點係將交互作用,= 再分配頻寬’而提供特定之服務水準,阻斷或者限 的顧客行動等等。 另-個以政策為基礎之範例將為定義用於網路工作之 特定形式的網路資源或者服務水準之最佳的規格^些特 定之政策將導引該些管理實體,以決定是否該特定之工作 係被允許,且假如被允許,則言亥管理實體係交互作用,以 崔保遠些貝源之該期望之水準係被提供以完成該卫作。假 19 200304298 如該最佳的資源係不可取得,則該可應用之政策係能夠進 一步指明該請求之工作被阻斷,且該請求之使用者係被提 供一個詳細敘述該請求被拒絕之原因之資訊的訊息。或者 ’该些政策係能夠指明該使用者係被提供不同的選擇,諸 如進行該請求之工作,且具有次最佳之資源,或者等待以 實施該工作直到一個較晚之時間為止。 舉例而言,諸如網際網路協定電話之連續的媒體應用 係具有用於最佳之效能的某些頻寬條件,且係對於網路抖 動及延遲特別敏感。政策係能夠被寫出以指明一期望之服 務水準’包含頻寬條件及用於抖動及延遲之臨限水準,用 於客戶電腦企圖執行網際網路協定電話技術應用。該些政 策將進一步導引該些代理器及控制模組企圖提供該指定之 服務水準。保密之檢查係亦能夠被包含,以確保該特定之 使用者或者客戶電腦係被允許執行該應用。於該指定之服 務水準係不能夠被提供時,該請求之使用者係能夠被提供 -個指示用於該請求之該些資源係不可取得之訊息。該使 用者亦能夠被提供不同的選擇,包含以一個次最佳之服務 水準進行,置放-個傳統之電話呼叫,等待以實施該工作 直到一個較晚之時間為止等等。 本發明之該軟體,系統及方法係可以被使用以實施_ 個廣泛之系統政策。該些政策規則及條件可以根據任何數 量之參數’包含網際網路協^來源位址,網際網路協定目 的地位址’來源埠’目的地琿,協定,應用身份,使用者 身份’裝置身份,使用者路由表(User Route List,虮 20 200304298 )’可取得之襄置頻寬’應用輪廟’伺服器輪 身份,路由器身份,-天中之時間,、網路擁塞,網路 /網路用戶數,可取得之域頻寬及資源狀態,上述僅為一 邛刀之列述。當該些政策條件係滿足時所採取之行動係 夠包含阻斷網路接取,調整服務水準及/或用於連接網: 之裝置之頻寬分配,對於特定之使用者路由表之阻斷情长 ’避開由過載或者表現m源而來之網路請求,^ 引網路請求至替代之資源及收集網路之統計資訊。 上述所列之某些參數係可以被認為“客戶之來數,, 因為其係正常由一個監視一個單一連接網路之客戶装置之 代理器所計算。這些係包含網際網路協定來源位址,網際 網路協定目的地位址’來源埠,目的地埠,協$,應用: 份,使用者身份,裝置身份,使用者路由表。其他參數, 諸如應用輪廓,伺服器輪廓,閘道器身份,路由器^份| 一天中之時間,網路擁塞,網路負載,網路用戶數,二取 得之域頻寬及資源狀態,可以被認為“系統參數”,因為 其係關於共享之資源,總計之網路情況或者需要由複數個 代理器模組而來之資料的計算。雖然如此,於客戶參數及 糸統茶數之間係不具有準確之區分。某些參數,諸士 中之時間,可以被認為一個客戶參數或者一個系統參數之 一或者兩者。 以政策為基礎之網路管理,服務之品質,及該些代理 裔及控制點之其他功能係根據獲得關於該網路之即時資1 而定。如將予以討論,某些敘述之實施例及實施方式係提 21 200304298 供已知以政策為基礎之服務之品質管理解決方案之改進, 因為》亥加強之能力係能夠獲得關於連接網路之裝置的網路 條件及活動之詳細資訊。因為該些代理器模組實施例係可 以以該特定之方式連接至其相關之農置之該通訊軟體,呼 多亡述之該些政策參數及條件係可接取的。此外,如同上 述範例所建議’對於核心應用之管理頻寬及確保复之可取 得性係:管理網路上為一個越來越重要之考量。於此所述 之某些實施例係提供改進之f源消耗之控制及頻寬之動態 分配’以回應改變之網路條件。 於此所述之彈性地根據關於網路條件之詳細資訊而配 置以政策為基礎、服務之品質管理解決方案之該些系統之 能力係具有許多重要的優點。這些優點係包含:減少關於 使用該網路之失敗,減少對於網際網路技術人員之請求幫 忙的呼叫’增加生產力,降低與管理及維護企業網路相關 之商業成本,及增加顧客/使用者忠誠度及滿意度。最後These system policies that define how network resources are used can be centrally defined and trimmed to the most efficient way to achieve the main goal. The defined policy is picked up by the control point, which then transmits the different components and parameters related to the policies to the agents in its domain, under a very basic layer-under the people '-a policy Contains rules about how network resources are used, and the rules contain conditions and actions that are taken when conditions are met. The agents and control points monitor the network and the devices connected to the network 'to decide when to apply different rules and whether the conditions that accompany the rules are met. Once the agent and / or control point 18 200304298 is required by the U.S.A. Operation System, its, ^ ^ policy of the system. Turning it around to implement it, 5 ’successful companies usually try their best to provide good customer service. The second key corporate goal is to be able to translate into many policies that define network resources. An example of such a policy is that the effectiveness of the application of… 'I has dropped to a threshold or restricted access to non-enterprise important, preventive, and important applications. Another example would be a technology that uses the quality of the service to provide an e-commerce application. Yet another fan… the service to the computer is from one client to two: =: whenever a connected network is added, the network bandwidth allocated to that connected network is increased sadly. In addition, the bandwidth used for different applications can be limited when customers frequently use network resources. The control point 72 will receive these policies and provide policy information to the agent 70. The agent 70 and the control point 72 communicate with each other and monitor the network to determine how many customers are accessing the network & which computers should be accessed and what applications those customers are accessing. 1: When the condition is measured, the agent and control point will interact with each other, = reallocate bandwidth 'to provide a specific service level, block or limit customer actions, and so on. Another policy-based example would be the best specification for defining a specific form of network resource or service level for network work ^ Some specific policies will guide the management entities to decide whether the specific The work is allowed, and if it is allowed, the management system of Yanhai interacts, and Cui Baoyuan's expectation level of Beiyuan is provided to complete the work. False 19 200304298 If the best resource is unavailable, the applicable policy is able to further indicate that the work of the request was blocked, and the user of the request was provided with a detailed description of why the request was rejected Information message. Or, ‘these policies can indicate that the user is offered different options, such as performing the requested work with the next best resources, or waiting to implement the work until a later time. For example, continuous media applications such as Internet Protocol phones have certain bandwidth conditions for best performance and are particularly sensitive to network jitter and delays. A policy can be written to indicate a desired service level 'including bandwidth conditions and threshold levels for jitter and delay for client computers attempting to implement Internet Protocol telephony applications. These policies will further guide the agents and control modules to attempt to provide the specified service level. Confidentiality checks can also be included to ensure that the particular user or client computer is allowed to execute the application. When the specified service level cannot be provided, the user of the request can be provided-a message indicating that the resources used for the request are unavailable. The user can also be offered different options, including performing at a sub-optimal service level, placing a traditional telephone call, waiting to perform the job until a later time, and so on. The software, systems, and methods of the present invention can be used to implement a wide range of system policies. These policy rules and conditions can be based on any number of parameters' including Internet Protocol ^ source address, Internet protocol destination address' source port 'destination', protocol, application identity, user identity 'device identity, User Route List (虮 20 200304298) 'Accessible Bandwidth' Application Round Temple 'Server Round Identity, Router Identity, -Time in the Day, Network Congestion, Network / Network The number of users, available domain bandwidth, and resource status are listed above. The actions taken when these policy conditions are met are sufficient to block network access, adjust service levels and / or the bandwidth allocation of devices used to connect to the network, and block specific user routing tables. Qingchang 'avoids network requests from overload or performance sources, ^ directs network requests to alternative resources and collects network statistics. Some of the parameters listed above can be considered "customer numbers, because they are normally calculated by an agent that monitors client devices on a single connected network. These include Internet Protocol source addresses, Internet Protocol destination address' source port, destination port, protocol, application: copies, user identity, device identity, user routing table. Other parameters, such as application profile, server profile, gateway identity, Router ^ Share | Time of day, network congestion, network load, number of network users, domain bandwidth and resource status obtained by 2 can be considered "system parameters", because it is about shared resources, total Network conditions or the calculation of data that requires multiple agent modules. However, there is no accurate distinction between customer parameters and system tea numbers. Some parameters, the time in the scholars, can be Considered one or both of a customer parameter or a system parameter. Policy-based network management, service quality, and the agents and control points Other functions are based on the availability of real-time funding on the network1. As will be discussed, some of the described examples and implementations are referred to 21 200304298 Improvements to known quality management solutions for policy-based services Because the enhanced capabilities of "Hai" are able to obtain detailed information about the network conditions and activities of the devices connected to the network. Because these agent module embodiments can be connected to their related agricultural homes in a specific way. The communication software, the policy parameters and conditions described by Huduoming are acceptable. In addition, as suggested in the above example, 'the management bandwidth for core applications and ensuring the availability of the system are: Increasingly important considerations. Certain embodiments described herein provide improved control of f-source consumption and dynamic allocation of bandwidth in response to changing network conditions. The flexibility described herein is based on The ability to configure policy-based, service-based quality management solutions with detailed information about road conditions has many important advantages. These advantages are Including: reducing failures on using the network, reducing calls for help from Internet technicians, 'increasing productivity, reducing business costs associated with managing and maintaining corporate networks, and increasing customer / user loyalty and satisfaction Degrees. Finally

,忒些系統及方法係確保網路資源係以與主要的目標及目 的相符之方式使用。 於應用層及運輸層之間之以政策為基礎的服務之品質 之實施係具有另一個優點。此係允許提供使用虛擬專用連 網(Virtual Private Networking,VPN)或者網際網路協 定保密(IPSec)協定所實施之加密及其他保密實施。 現請參照第6至9圖,該圖示之代理器模組之實施例 係將予以更詳細地敘述。該些代理器模組可以監視其相關 之客戶、伺服器、廣泛使用之計算裝置或者其他計算裝置 22 200304298 之狀態,活動,傳送此資訊至一或多個控制點,於該些控 制&quot;私示下貫施系統政策;及提供訊息至該網路使用者 :關於網路狀況之管理器。帛6至8圖係為連接網路之計 异名置之觀念圖示’且顯示該代理器軟體如何可以結合關 於由用於網路通訊之該些裝置所使用之分層體: 接網路之裝置。 干版心逆 ::第6圖中可見,代理器7 〇係設置於應用程式1 堆最^個用於提供端點至端點資料傳輸之諸如通訊協定 且之運輸層124之通訊協定層之間。典型地,於 此所述之該代理器模組可以血採用w/ 、 或者傳輸控制協定/ 逆 層的通訊軟體之網路=一=: 型之分 被顯示為“置於1FV置广吏用。s此,代理器70係 岸用 ”、間,亦即於—個資料路徑中,於-個 :::及一個運輪協定層之間。然而,熟習該項技術者 將可以瞭解的旱 τ ^ ^ 附接於該開器模組之實施例係可以與不 為基礎之協定^ 、輸控制協定/網際網路協定 ,1 果之分層的通訊軟體之網路裝置一起使用 / —個提供運輸功能,亦即提供端點至端點之* 料傳輸之協定層。 丨扠仏鈿點至知點之貪 因為於該資料路徑之内之該位置 監視網路流通資料, 〇係此夠 或者於該運輪層二二“不能藉由附接至運輸層… 該可取得之資料# /而取w纽。於該較高層處, 疊係允許該網路變成且較詳細。附接至較高層之該堆 成比虽監視產生於該運輸及較低層時更 23 200304298 可能“知道應用的”。 該代理器模組可以設置於應用程式丄2 2及運輸層工 2 4之間之不同的點上。明確言之,如示於第7及8圖, 代理器7 〇可以結合一個客戶電腦,使得其係鄰接於一個 適合於提供應用程式1 2 2之標準化介面之應用程式介面 (Application Programming Interface,API),以接取一 個區域的作業系統及通訊堆疊9 2。於第7圖中,代理器 7 〇係鄰接於一個視窗封套(winsock)應用程式介面工2 8且設置於應用程式丄2 2及該視窗封套介面之間。第8 圖係顯示一個替代的結構,其中,代理器7 〇係再度附接 至一個封套目標,諸如應用程式介面i 2 8,然而係為該 封套介面之下游。具有上述兩種之一之結構下,該代理器 係設置於該應用程式及該通訊堆疊9 2之該運輸層丄2 4 之間,且係適合於直接監視由該視窗封套介面所接收或者 由其所傳送之資料。 如示於第8圖,該代理器7 〇可以被建構成附接至通 訊堆疊9 2之較低之通訊層。此係允許該代理器藉由提供 :個校正機制以計算產生於運輸層i 2 4之下之協定層^ 資料壓縮及加密,而準確地監視網路流通資料量。舉^而 吕,假如資料壓縮或者加密係發生於運輸層丄2 4内,則 於一個在該運輸層之下之點處監視將產生關於該計算裴置 之該網路流通資料之不準確的測量。以代理器7 〇附接至 較低層係允料壓縮、加密或者定性地或者定量地影继網 路流通資料之其他處理產生於較低協定層之情況下,網路 24 200304298 流通資料被準確地測量。 :代:器模組之一個實施例係顯示於第9圖。如圖所 不戈理5 7 〇可以包含一個再導引器模組丄3 〇,一個 /凡通貝料控制模組3 2,一個管理器模組 =域名稱系統飼服器模組136 ’一個彈出應用模組13 8芬-個訊息中間模組140 個系統服務模組142 行=彈出應用144。再導引模組13〇係截收由執 ::诸如示於第2及3圖之該些客戶電腦之連接網路之裝 置上之應用所實施之視窗封套應用程式介面 組1 3 〇。然後將這些吟叫交給其他代理元件〆之一 或夕個,以用於處理。如參照第6至8圖所予以 =模:130係定位成允許該代理器於一個執行於該 、置上之應用程式及該通訊堆疊之該 根據該代理器及控制— 傳遞由封套呼叫可以被拒絕’改變或者由代理器70所 ^資料控制模組132係實施服務之品質及系統政 葬由批… 路之狀况。-通資料控制模組1 3 2係 =1=該代理裝置上之應用及該網路鏈路之間之 料:::貝料流,而實施服務之品質的方法。該流通資 钭 &gt;瓜係被控制,以值译 、 包含频寶…網路服務水準’其可以 料產出量、抖動、延遲及資料損失之規格。 供该特定之網路服務水準,該流通資料控制模 糸可以維瘦一個仔列或者複數個符列。當資料係 25 200304298 由肩客戶傳送至該網路時,或者由該網路傳送至該客戶時 ,該再導引模組i 3 〇係截接資料,且該流通資料控制: 組1 3 2係將資料之該個別單元置放於該適當之仔列中 該些控制點可以被建構成週期地提供流通資料控制命令, ’、係可以包含上述之服務之品質的參數及服務規格。為 回應,該流通資料控制模組1 3 2係控制至該些仔列: =彳或者由該些㈣而來之傳遞,以提供該特定之 更明確吕之,該出站之流通資料速率可以藉 數個諸如傳輸佇列! 9 Q 使用複 而受到控制。當一❹用:ΐ先權為基礎之傳輪仔列 μ用或者程序係由一個代理琴7 ===置所啟始時,一個優先權準位係根據中 _、用::::控:=供之優先權資料而被指定 =使用者輪廊,應用輪廟及網路資源輪麼。⑼= 係匕含提供至該些代理器之優先權資肖。 导 /亥傳輸彳Τ列1 3 2 a係可以被建構成釋放f料,以 口疋之期間傳輸至該網路。使用指定於由一個控制點所 :出=資料控制命令之該些參數,流通資料模組“ 係:异多少資料能夠由該些傳輸佇列於一特定期 。牛例而言’假如該被指定之平均流通 οοκ位元/秒,且該㈣釋放期間係為1毫秒 仔列能夠於—Μ期間釋放之資料的總量係為i 〇0:Γ 匕a將被傳輸之資料的該些件列之優先權係決定每一個 26 200304298 ϋ?歹“夠釋放之分配量之多募。舉例而言,假設僅 具有兩個具有用於值於★μ σ 攸成1里 时先… 資料的仔列⑴及2,則假如 之k先推係為Q2之優弈 $棼#妯八柘之兩么,則將被允許傳輸 =:=之期間釋放之6&quot;6%。…僅被允 =:Γ分配之期間釋放之3 3.3 3 %。假如“ 被二配之射1=2之優先權,則Q1將被允許傳輸該整體 被刀配之^間釋放之5 &quot;,以用於轉送至該網路鍵路。 假如等待貧料係被封裝成為比一個 …’元,則該細累積不釋== 間之4用。當累積足夠之信用時,該等待訊 息係被釋放用於轉送至該網路。 類似地,為了控制網路流通資料被接收之速率,流通 貝料&amp;制模組1 3 2可以被建構成維護複數個個別的接收 仔列,諸如接收仔列&quot;2b。除了上述之方法之外,不 同的其他方法係可以被採用於控制網路流通資料由該些佇 列所傳輸及接收之速率。此外,該些傳送及接收符列之行 為可以透過不同之方法而被控制以控制抖動、延遲、損失 及網路連結之反應時間。 、 該些傳送及#收件列亦彳以被建構成偵消^諸如擁塞及 慢速反應應用或者伺服器之網路狀況。舉例而言,對於每 一個應用而言,被傳送之封包或者其他資料單元係當由一 個傳送佇列傳輸出時可以被被戳記上時間。當對應之封包 係因一特定之應用而被接收時,該接收及傳送時間可以被 比較,以偵測對於不同的目標來源之網路擁塞及/或慢速 27 200304298 反應之時間。此資訊可以被報告至該些控制點,且與該域 内之其他代理器所共享。該反應時間及藉由比較傳送及接 收時間所獲得之其他效能資訊亦可以被使用,以編輯及維 護關於不同的網路資源之統計資料。 使用該偵測及報告機制,一個控制點可以被建構成藉 由指示流通資料控制模組i 3 2關閉低的優先權之對話且 每田5亥些代理器之一報告網路擁塞嚴重時阻斷額外的對話 而減夕網路負載。於結合上,如同下文中予以敘述,彈 出應用模組1 3 8可以提供-個訊息至該使料,解釋為 何對話係被關閉。&amp;了關閉現存之對話之外,該控制點可 以被建構成指示該些代理器阻斷任何進一步之對話。此行 動亦可以由-個使用者訊息所完成,w回應發出網路程序 之個新的應用之企圖。當該網路之負載被減少時,該控 制2將傳送一個矾息至該些允許對話之代理器。 ^辨識擁塞及慢速反應時間之外,流通資料控制模 、' 3 2可以更-般化地建構成幫助辨識向下或者表現不 2之,路㈣。當—個至目標制之連結 :料控制模組132係通知接著發出-個可執行二: :―;固根本原因分析之該彈出應用模組…該 該資話,代理器70係提供該控制點-個辨識 Z貝/原及其狀態之訊息。 达匕夕卜 可、、 吉失敗時,該彈出應用模組i ° W被建構成提供-個訊息至該使'、 標為該不可使用之資调# ώ1 匕3 —個起始目 貝源之自動路由之選擇。致能自動連結 28 200304298 係導致該代理器週期地重試該不可使用之資源。假如有需 要的話,此項特色係可以被禁能,以允許該控制點擔任決 定該資源何時再度變成可使用之任務。如同將於下文中予 以敘述’本發明之系統可以被建構成使得該些控制模也擔 任用於監視不可使用之資源之任務,以最小化不需要之網 路流通資料。 女下文所述不同的代理态元件亦監視網路狀態及資 源使用,α用於編輯統計資料。流通資料控制模組^ 3 2 之一個額外的功能料藉由提供f訊至其他代判元件關 :接取之資源’包含接取之資源效能及頻率,而幫助實施 這些功能。 如同於流通資料控制模組132之上述討論所建議, _應用模組1 3 8係儲存及負責用於發出諸如稱為彈 出應用之應用1 4 4的不同的小的應用模植,以實施不同 的操作及加強該敘述之系統之功能。#出應用係偵測及診 斷諸如向下的資源之網路狀態’提供特定之訊息至使用者 及關於錯言吳及網路片大態之__技術Α員,&amp;盘直他資 訊管理、報告或者操作之支援系統作介面連結,諸:政策 官理器,服務水準管理器及網路及系統管理平臺。彈出應 用可以被顧客訂做,以增加特色至現存之產品,以因特定 ㈣之f求W以藉由其他販f者所提供之 技術而整合該軟體、系統及方法。 管理器模組1 3 4係與不同的其他代理器模組交互作 用’維護及提供網路統計資料,及提供__個用於中央地建 29 200304298 構該系統之代理器及其他元 兮其掷抑π 4 , 〇 千之,丨面。關於代理器結構, 口亥吕理裔扠、、且1 3 4係與結構 再又備1 作介面連接(示 於第5及1 3至1 6圖),^ ^ ^ 〇 建構不同的代理器參數。該 吕理态杈組1 3 4亦作為一個用 ^ . ,β ^ n 调用於將被傳送至該些控制點 之本地報告及統計資訊之貯存 所獲得之資訊,該管理哭模:;?據由其他代理器模組 ^ e理裔桓組1 3 4係維護本地資訊,里 係關於接取之伺服器,區域 、 /、 一 %糸、,先伺服器,閘道器,路 由益,開關,應用及其他資源。哕These systems and methods ensure that network resources are used in a manner consistent with the primary goals and objectives. The implementation of the quality of policy-based services between the application layer and the transport layer has another advantage. This allows the provision of encryption and other confidential implementations using Virtual Private Networking (VPN) or Internet Protocol Privacy (IPSec) protocols. Please refer to Figs. 6 to 9, the embodiment of the illustrated agent module will be described in more detail. These agent modules can monitor the status, activities, and related information of customers, servers, widely used computing devices, or other computing devices 22 200304298, and send this information to one or more control points. Demonstrate the implementation of system policies; and provide information to the network user: a manager about network conditions. Figures 6 to 8 are conceptual diagrams of the notion of connecting to the Internet 'and show how the agent software can be combined with the layers used by the devices used for network communication: Internet connection Of the device. Stem version :: As can be seen in Figure 6, the agent 70 is set in the application program stack and is used to provide endpoint-to-endpoint data transmission such as the communication protocol and the transport protocol layer 124 of the communication protocol layer. between. Typically, the agent module described herein can use w /, or transmission control protocol / reverse layer communication software for the network = one =: The type points are displayed as "placed in 1FV for wide use." Therefore, the agent 70 is used for shore ", that is, in a data path, between a ::: and a ship agreement layer. However, those skilled in the art will be able to understand the τ ^ ^ The embodiment attached to the opener module can be based on a non-based agreement ^, a control protocol / Internet protocol, and a layering of results. The network device of the communication software is used together with a protocol layer that provides transportation functions, that is, provides end-to-end * data transmission.丨 The greed from the point of knowledge to the point of knowledge is because the position monitors the network circulation data at the location within the data path, which is enough or at the level of the ship. "Cannot be attached to the transport layer ... Obtained information # and take W. At the higher level, the stack allows the network to become more detailed. The stacking attached to the higher level is more accurate than when monitoring occurs at the transport and lower levels 23 200304298 may "know the application". The agent module can be set at a different point between the application program 22 and the transport layer worker 2. 4. Specifically, as shown in Figures 7 and 8, the agent 7 〇 Can be combined with a client computer so that it is adjacent to an Application Programming Interface (API) suitable for providing a standardized interface for application programs 1 2 2 to access a regional operating system and communication stack 9 2 In Figure 7, the agent 70 is adjacent to a winsock application interface worker 28 and is located between the application 丄 22 and the window socket interface. Figure 8 shows an alternative Structure where The processor 70 is attached to an envelope target again, such as the application interface i 2 8, but it is downstream of the envelope interface. With one of the above two structures, the agent is set in the application and The communication stack 9 2 is between the transport layers 丄 2 4 and is suitable for directly monitoring the data received or transmitted by the window envelope interface. As shown in FIG. 8, the agent 7 〇 can be Constructs a lower communication layer attached to the communication stack 92. This allows the agent to calculate the protocol layer generated under the transport layer i 2 4 by providing: a correction mechanism ^ data compression and encryption, and Accurately monitor the amount of data circulated on the network. For example, if data compression or encryption occurs within the transport layer 丄 24, monitoring at a point below the transport layer will generate information about the calculation. Inaccurate measurement of the network circulation data. Attachment to the lower layer by the agent 70 allows material compression, encryption, or qualitative or quantitative effects of other processing of the network circulation data to be generated from the lower protocol layer. Case, Lu 24 200304298 The circulation data is accurately measured.: Generation: An example of the device module is shown in Figure 9. As shown in the figure, it can include a redirector module 丄 3 〇, a / Fantong shell material control module 3 2, a manager module = domain name system feeder module 136 'a pop-up application module 13 8 fen-a message intermediate module 140 system service module 142 rows = The pop-up application 144. The redirection module 13 is to intercept the window cover application program interface group 1 implemented by the application such as the application shown on the network-connected devices of the client computers shown in Figures 2 and 3 3 〇. Then these chants are handed over to one or other of the other agent elements for processing. As given with reference to Figures 6 to 8 = modulo: 130 is positioned to allow the agent to execute on the application on the top and the stack of the communication according to the agent and control—passed by the envelope call can be called Refusal 'to change or be approved by the agent 70 ^ the data control module 132 is to implement the quality of the service and the system administration ... -Communication data control module 1 3 2 series = 1 = The method between the application on the agent device and the network link :: Shellfish flow, and the quality of service is implemented. The circulation of assets is controlled, and the value translation, including frequency treasure ... Internet service standards', can be used for specifications such as output volume, jitter, delay, and data loss. For the specific network service level, the circulation data control module can maintain a single row or multiple rows. When the data system 25 200304298 is transmitted from the shoulder customer to the network, or from the network to the customer, the redirection module i 3 〇 intercepts the data, and the circulation data controls: Group 1 3 2 It means that the individual units of data are placed in the appropriate queue. These control points can be constructed to provide periodic circulation data control commands. ', It can include the quality parameters and service specifications of the above services. In response, the circulation data control module 1 3 2 controls to the queues: = 彳 or the transmission from these to provide the specific and more specific information. The outbound circulation data rate can be Borrow a few such as the transmission queue! 9 Q Use complex and controlled. When one is used: the predecessor-based pass is used or the program is initiated by a proxy 7 ===, a priority level is based on the use of :::: 控: = For priority information for designation = Users roundabout, application round temple and network resource round? ⑼ = is the priority information provided to these agents. The pilot transmission line 1 3 2 a can be constructed to release the data and be transmitted to the network during the period. Using the parameters specified by a control point: out = data control command, the circulation data module "denotes: how much data can be listed by these transmissions in a specific period. In the case of cattle, 'if it is specified The average circulation is οοκbits / second, and the release period is 1 millisecond. The total amount of data that can be released during -M period is i 〇0: Γ The number of pieces of data to be transmitted. The priority is determined by each 26 200304298 "?" For example, suppose that there are only two columns with the data for the value of ★ μ σ Yau Cheng 1… first and 2, then if k is first pushed to be Q2's superior game $ 棼 # 妯 八 柘Two of them will be allowed to transmit 6 &quot; 6% released during the period of =: =. … Only allowed =: 3 3.3 3% released during the distribution period. If "1 = 2 priority of being shot by the second match, Q1 will be allowed to transmit the total 5 of the ^ released by the knife for transfer to the network link. If waiting for the poor material system If it is encapsulated to be more than one yuan, then the detailed accumulation is inexorable == between 4 times. When enough credit is accumulated, the waiting message is released for forwarding to the network. Similarly, in order to control the network The rate at which the circulation data is received, the circulation material &amp; manufacturing module 1 3 2 can be constructed to maintain a plurality of individual reception queues, such as the reception queue &quot; 2b. In addition to the above methods, different other methods It can be used to control the rate at which the network circulates data transmitted and received by the queues. In addition, the behavior of the transmission and reception symbols can be controlled in different ways to control jitter, delay, loss, and network Road link response time. The transmission and #receiving columns are also constructed to detect network conditions such as congestion and slow response applications or servers. For example, for each application, Transmitted packets or Other data units can be time stamped when transmitted from a transmission queue. When the corresponding packet is received for a specific application, the reception and transmission time can be compared to detect different targets Source's network congestion and / or slow 27 200304298 response time. This information can be reported to these control points and shared with other agents in the domain. The response time is compared by comparing the transmit and receive times. Other obtained performance information can also be used to edit and maintain statistical data about different network resources. Using this detection and reporting mechanism, a control point can be constructed to control the module i 3 by instructing the circulation of data. Close the low-priority conversations and one of the agents in each field reports severe network congestion to block additional conversations and reduce the network load. In combination, as described below, the application module 1 pops up 3 8 can provide a message to the messenger explaining why the dialogue was closed. &Amp; In addition to closing existing dialogues, the control point can be constructed Instruct the agents to block any further conversations. This action can also be done by a user message, in response to an attempt to send a new application to the network process. When the load on the network is reduced, the Control 2 will send a message to the agents that allow dialogue. ^ In addition to identifying congestion and slow response time, the flow data control module, '3 2 can be more generalized to help identify downward or performance failures. 2 , Road. When—a link to the target system: the material control module 132 is notified and then issued—an executable 2 :: ;; the pop-up application module for solid root cause analysis ... The device 70 provides the control point with a message identifying the Z shell / prime and its status. When Dakki Baku, Kiki fails, the pop-up application module i ° W is constructed to provide a message to the operator ' , Marked as the unusable information tone # ώ1 Dagger 3 — An automatic routing option for the starting source. Enabling automatic link 28 200304298 caused the agent to retry the unusable resource periodically. If desired, this feature can be disabled to allow the control point to perform tasks that determine when the resource becomes available again. As will be described later, the system of the present invention can be constructed so that the control modules also perform the task of monitoring unusable resources to minimize unnecessary network circulation data. The different proxy components described below also monitor the network status and resource usage, α is used to edit statistics. An additional function of the circulation data control module ^ 3 2 is expected to help implement these functions by providing f-messages to other surrogates: access to resources ’, including access to resource performance and frequency. As suggested in the above discussion of the circulation data control module 132, the _application module 1 3 8 stores and is responsible for launching different small application models such as applications 1 4 4 to implement different Operation and strengthen the function of the narrative system. # 出 应用 系 Detecting and diagnosing the network status of resources such as downwards' Provide specific information to users and about the wrong state of Wu and the status of the network film , Report or operation support system as interface link, various: policy manager, service level manager and network and system management platform. Pop-up applications can be customized by customers to add features to existing products, in order to meet specific requirements, and integrate the software, systems, and methods with technologies provided by other vendors. The manager module 1 3 4 interacts with different other agent modules to 'maintain and provide network statistics, and provide __ agents for building the system 29 200304298 Throw π 4, 〇 Thousands of faces. Regarding the structure of the agent, the mouth of the philosophical fork, and the 134 series and the structure are prepared as an interface connection (shown in Figures 5 and 13 to 16), ^ ^ ^ 〇 construct different agent parameters. The Lu Li state branch group 1 3 4 also uses ^., Β ^ n to call the information obtained from the storage of local reports and statistical information that will be transmitted to the control points. The management mode:? According to other agent modules, the management group 1 3 4 series maintains local information, which is about the access server, area, / %%, first server, gateway, routing benefits, Switches, applications and other resources. Hiccup

^ ^ ^ ^»i li H -r 以貝汛係依蜎求而被傳輸 :且可以被使用於網路計劃或者動態地改變代 理态之行為。此外,該營理 卜〜里…且1 3 4儲存系統之政策 及/或政策之元件,且告堂I香 田而要實鈿及貫行該些政策時,提 供政策資料至不同之代理器元件。該管理器模組!34亦 ,含支㈣於該所述之軟體及系統及標準化之網路管理協 定及平臺之介面連結。^ ^ ^ ^ »I li H -r is transmitted on request based on the Bei Xun system: and can be used for network planning or to dynamically change the behavior of agents. In addition, the battalion of the battalion ~ li ... and 1 3 4 storage system policies and / or policy elements, and to inform I Katian to implement and implement these policies, provide policy information to different agent components . The manager module! 34. Also includes interface links supporting the described software and systems and standardized network management protocols and platforms.

—該區域名稱系統伺服器模組136係提供該代理器決 疋服矛力之可建構位址。言亥區域名稱系統伺服器模組1 3 6 可以包含區域名稱系統伺服器資訊之一個本地快取器,且 可以被建構成首先使用該本地快取器而決定位址請求。假 如該請求係不能夠於本㈣決定,㈣請求係被提出至一 =控制點,該控制點係以其自己之快取器決定該位址,假 定該位址係於該控制點快取器中且該使用者係被允許接取 /位址假如该請求係不能夠以該控制點快取器決定,則 j連接之控制點係將該請求提交至一個區域名稱系統伺服 器以用於決定。假如該位址係仍然不能夠於該點被決定, 30 200304298 則該控制點傳送-個訊息至該代理器,且然後, 將該請求直接提交至其自己之區域名㈣統伺服 二 決定。 m打、— The area name system server module 136 provides a constructable address for the agent to determine the effectiveness of the service. Yanhai area name system server module 1 3 6 can contain a local cache of the area name system server information, and can be constructed to first use the local cache to determine an address request. If the request cannot be decided in this case, the request is made to a = control point, the control point determines the address with its own cache, assuming that the address is in the control point cache The user is allowed access / address. If the request cannot be determined by the control point cache, the control point connected by j will submit the request to a regional name system server for decision . If the address still cannot be determined at that point, 30 200304298, the control point sends a message to the agent, and then submits the request directly to its own area name system server. m dozen,

該區域名稱系統伺服器模組i 3 6亦係監視位 且與管理模組134分享該些請求之内容。該些請求係= 本地^騎’且最終被提供至該控雜,其係動態地維護 該最流行之區域名稱系統伺服器之更新的列表。此外,今 區域名稱系統伺服器模組&quot;6係適合於與控制點7 J :::至:T有需要之下’再導引位址決定請求及其他網 路靖求至替代之目標。 該訊息中間模組1 4 0係產生及維護至與該代理器交 互作用之-或多個控制點之連結。該不同的代理器元件係 使用訊息中間模組以彼此通訊,且與一個連結之控制點通 ::該訊息中間模40係包含訊息產生器及訊息發送 =私序’以產生及傳送訊息至該些控制點。該訊息產生器 私序係包含成貝功能,其係藉由接收訊息内容作為參數且 以一個標準網路格式編碼該些内容而產生控制點訊息。該 訊息產生器程序亦包含一個成員功能,以解碼由該控制點 ,收而來之遠些訊息,且將該些内容以__個無法由該代理 器之不同元件所使用之格式送回。 於被該產生程序所編碼之後,控制點訊息係被加入至 :個傳輸佇列’且由該訊息發送器功能所取出,以用於傳 运至該控制點。由該仔列所取出之訊息係被傳送至該代理 器之主動控制點。此外’該料^可讀建構成使用一個 31 200304298 序列編號機制或者其他錯誤偵測及恢復方法,而確保該訊 息之傳送。 由一個代理器至一個控制點之訊息及通訊係藉由使用 一個單一發送之定址機制而實施。由該控制點至一個代理 器或者複數個代理器之通訊可以藉由使用單一發送或者一 個夕重發达定址機制而被實施。當建構用於多重發送操作 時二,該控制點及代理器可以被設定成轉變成單一發送^以 允不支援網際網路協定多重發送之裝置通訊。 〜、、口丨小狐文儿,則琢訊息中間 -沮4 0係監視在摘測出一個連結失敗時該連結及轉換 :個備用控制點之開關的狀態。假如該主動 連 係皆非為主動,則網路流通資料係以透明方式傳送。 5亥系統服務模組1 4 2 #描相· τ k i 係楗不同的支援功能至其, 益兀件。首先,該系統服務模 者輪廓’祠服器輪廓,區域名稱…42係、准桃 連結及其他資料之… 系統飼服器輪廓,控制〗The area name system server module i 3 6 is also a monitoring bit and shares the content of these requests with the management module 134. The requests are = local ^ ride 'and are ultimately provided to the control, which dynamically maintains an updated list of the most popular regional name system servers. In addition, today's regional name system server module "6 is suitable for the control point 7 J ::: to: T if necessary 'to guide the address decision request and other network routes to the goal of replacement. The message intermediate module 140 generates and maintains links to interact with the agent-or control points. The different agent components use message intermediate modules to communicate with each other and communicate with a connected control point :: The message intermediate module 40 includes a message generator and message sending = private sequence 'to generate and send messages to the Some control points. The message generator private sequence contains the function of generating shells, which generates control point messages by receiving the message contents as parameters and encoding the contents in a standard network format. The message generator program also includes a member function to decode the remote messages received from the control point and return the contents in a format that cannot be used by different components of the agent. After being encoded by the generating program, the control point message is added to: a transmission queue 'and retrieved by the message sender function for transmission to the control point. The message retrieved from the queue is transmitted to the active control point of the agent. In addition, the material can be read and constructed using a 31 200304298 sequence numbering mechanism or other error detection and recovery methods to ensure the transmission of the message. Messages and communications from an agent to a control point are implemented by using a single-send addressing mechanism. Communication from the control point to one agent or multiple agents can be implemented by using a single send or a developed addressing mechanism. When constructed for multiple transmission operations, the control point and agent can be configured to transform into a single transmission ^ to allow communication with devices that do not support Internet Protocol multiple transmission. ~ ,, mouth 丨 Little Fox Wener, then the middle of the message-Ju 40 is to monitor the state of the switch and the connection when a connection fails: a backup control point. If the active connection is not active, the network circulation data is transmitted in a transparent manner. 5HAI System Service Module 1 4 2 #Description · τ k i is a different support function to it. First, the system service model outlines the outline of the temple server, the name of the area ... 42 series, the quasi peach link and other information ... The outline of the system feeder, control〗

^ /i£ m ^ ^ ^ Μ糸、、先服務模組1 4 2 I^ / i £ m ^ ^ ^ Μ 糸, first service module 1 4 2 I

挺ί、用於除錯之追蹤能力 計時器服務。該代理Μ件所使用: 應用程式介面之廑 冰 丄4 2亦可以被建構成一 4 八&quot;曲之庫,以使該 器所結合之兮F w + # &quot;°及5亥作業系統及該代王」 之3亥裝置之其他元件作介面連結。 現請參照第i 〇至丄2圖, 予以特別敘ift山一 工制點7 2及其之功能并 吁〜敘述。如不於第i 〇圖, 通資料模組1 β n,一 7 工制點可以包含一個分 域名稱丰絲/ 司服器輪廓模組1 6 2,一個eVery, traceability timer service for debugging. Used by the agent: The application program interface Bing Bing 4 2 can also be constructed to form a library of "Qu", so that the device combined with F w + # &quot; ° and 5 Hai operating system And the other components of the "King of Generation" 3 Hai device as an interface link. Now, please refer to Figures 〇 to 丄 2, and give a special description of ift mountain one work system 7 2 and its functions and call for ~ description. If it is not in the figure i 〇, the communication data module 1 β n, a 7 working point can contain a sub-domain name Fengsi / server profile module 1 62, an e

成名稱糸統伺服器輪廓模組個E υ 4 ’ —個閘道器輪廓模岛 32 1 6 6,一個管理器模組 0,一#Ψ _ 、、 1 6 8,一個訊息中間模組工7 _ 1 7 2及一個彈出應用丄7 4。 έ亥控制點流通資艇μ 之Μ1 、、、、且1 6 〇係藉由協調該些代理器 皙$姑/+ 實施以政朿為基礎及服務之品 貝之技術。作為此功能 縣刀此之一部分,該流通資料模組1 6 0 係精由疋期地獲得由該4 資斜— —代理裔而來之分配資料,根據該 八 °。之頻寬分配,及傳送該計算過之 为配至該代理哭以闲你香# °°用於貫施,而動態地分配於其之域中之 该些代理器之間之頻寬。 見舉例而$,控制點γ 2可以被建 構成母5秒重新計算頻寬分配。於每-個週期期間,於再 ^酉己之間,該些代理器係限制其所結合之裝置所使用之頻 被分配之量之内’且監視“所使用之頻寬之量。 於该週期結束時,每一個获 不了母1U代理斋係報告該頻寬使用情況及 ”他的分配資料至被使用於再分㈣寬中之該控制點。 於再分配期間,該流通資料控制模組丄6 0係根據由 該些代理器所報告之該優先權資料,而於該域内之該些代 理器中分割後續之週期之全部可使用之頻寬。該結果係為 -個特別對於每一個個別的代理器之建構的頻$ cB,其係 對應於該可使用頻寬之該代理器之公平的占有率。該些優 先權及被建構之頻寬係為系統政策之一個函數,且可以根 據廣泛之參數,包含應用身份,使用者身份,裝置身份, 來源位址,目的地位址,來源埠,目的地埠,協定,使用 者路由表,一天中之時間,網路負载,網路用戶數,及其 他關方;冑b夠被傳送至該控制點或者由該控制點所獲得之網 33 路資源之參數。可 .^ 被^供至該控制點之客戶端之來數的 、’田卽及特性係藉由相對於 夕、 導引器模組i 3 〇… …協疋堆豐之代理器再 的位f孫&amp;^ 置而大幅加強。於該堆疊内之該高 〇 吊特疋之觸發條件而實現頻寬分配, 且明確言之,政笛每# · 只&amp;。此可以大幅加強本發明之軟體, 糸統及方法之彈性及效力。 由❹代理n所報告之該優先權:㈣可以包含與執行 “It單—連接網路之裝置上之複數個應用程式相關之優 料。‘於如此情況下’該相關之代理器可以被建構成 @有效的應用優先權”,其係為該個別應用優先 2 一個函數。舉例而言’假如裝置A係正在執行兩個應 耘式且裝置B係正在執行一個單一應用程式,則裝置A 之有效的應用優先權將為裝χ B之有效的應用優先權之兩 倍,假設所有三個應用程式之個別優先權係相同。用於一 個執行複數個應用程式之裝置之該被報告的優先權資料可 :進:步根據每一個應用程式之活動的相對程度而藉由加 權4被報告之優先權而被細分。因此,於先前之範例中, 假如執行於裝置A上之該些應用之一係為靜止的或者閒置 的,則該應用對於裝置A之有效的優先權之貢獻將不被計 入,使得於最後,裝置A及裝置B係具有幾乎相同之有效 的優先權。為了使用此加權方法而決定有效之應用優先權 ’ 一個應用之相活動的相對程度可以根據頻寬使用,傳送 之封包,或者任何其他指示活動之條件而被測量出。 除了優先權資料之外,每一個代理器可以被建構成於 34 200304298 先前週期期間,報告由其相關之裝置所使用之頻寬υβ之量 ,如上文所述。資料對於該先前之週期亦係能夠使用於每 個装置之被分配的頻寬AB。該流通資料控制模組1 6 〇 可以比較每一個裝置之被建構之頻寬CB,被分配之頻寬AB 或者被使用之頻寬UB,或者這三個參數之任何組合,以決 定用於下一個週期之該分配。為了總計該三個參數,UB係 為使用於該先前週期中之該連接網路之裝置的數量,ab係 為其被允許使用之最大量,CB係指明該下_個週期期間該 裝置之可使用頻寬的“公平的占有率,,。 被使用之頻寬UB及被分配之頻寬Αβ兩者係可以大於 、等於或者小於該建構之頻寬…此可轉例而言,發生 於有許多連接網路之裝置使用其之建構的占有帛CB。為了 有= 也使用該可使用之頻寬,這些未使用之數量係被分配 :长1外頻見之裝置,其結果係為某些裝置係分配到超 籌之公平的占有率CB之量AB。雖然ΑΒ&quot;可以 超:CB,被使用之頻寬UB 一般係不能超過被分配之頻寬 因為該代理器流通資料控制模組係實施該分配。 理哭處理演算法係可以被使用於對於每一個代 之St 頻寬CB,被分配之頻寬AB或者被使用 被採用之5十异一個新的分配’然而,係具有一些通常 ,立通常传:!原則。舉例而言,當頻寬係由裝置取出時 …係期望首先減少最不受該向下調 之分配。因此,誃泣、s次企丨 〜日之表置 首先+ % 、貝4控制模組1 6 Q可以被建構成 百无減 &gt; 该相關之代5 ^ 益係報告頻寬使用UB係於該被分配 35 200304298 之數ΐ AB之下之客戶或者其他裝置之分配。可假設的是, 假如該些裝置之分配係被減少,則這些裝置係不被影響。 · 一般而言,該流通資料控制模組1 6 0不應該減少任何其 、 他之分配直到所有未使用之分配或者分配之部分係已經被 減少。然後,該流通資料控制模組丄6 〇可以被建構成根 據某些其他條件而貫施調整’或者減少特別高之分配。 該流通資料控制模組1 6 0亦可以被建構成使得當頻 寬變成可使用時,該最近之可使用頻寬係根據一般化之喜 好而被提供。舉例而言,該流通資料控制模組i 6 〇可以 麵 被建構成首先提供剩餘的頻寬至具有低的分配量且係正在 請求額外的頻寬之代理器。於這些請求被滿足之後,剩餘 的頻寬可以根據優先權或者其他條件而被分配。 第1 1 A,1 1 B,1 1 c,1 1 D圖係顯示可以由該流 通資料控制模組1 6 0所實施以動態地分配頻寬之不同方 法之範例。第1 1 A圖係顯示該流通資料控制模組i 6 〇 決定是否對於頻寬分配AB之任何調整係必須的之一種程序 。被對於某些代理器之被刀配之頻寬Αβ係於至少下列環境 _ 下被調整。首先’如示於步驟S4及S1 〇,假如所有被分 配之頻寬ABtotal之總和係超過該被建構之頻寬cBt〇tal 之…和,則某些被分配之頻寬係被修改。此情況係可以 於因某一原因於一先前週期中,該可使用之總計頻寬之某 口P刀係k成不旎夠使用時產生,或者因為其已經被保留 用於其他目的。於如此之環境下,於該下一個週期期間, 減/某些分配AB以防止該全部之分配超過該可使用之總計 36 200304298 的頻寬係重要的。 其次,假如具有AB&lt;CB且驅AB之任何代理器,則 用於這些代理n之分配係被修改,如示於步驟%及51 〇 。對於任何如此之代理器之分配典型地係增加。於此情況 下,-個代理器係具有小於其之建構的頻寬cb之一個分配 AB,亦即’其之現存分配係小於將於下一個週期中被可使 用之該頻寬之公平的占有率。此外1用於該前一個週期 之被報告之使用UB係於該實施之分配ΑβInto the name of the server profile module E υ 4 '— a gateway profile die island 32 1 6 6, a manager module 0, a # Ψ _, 1 6 8, a message intermediate module 7 _ 1 7 2 and a pop-up application 丄 7 4. The M1 of the control point circulation asset boat μ1, 1,6, and 16 is a technology that implements government-based products and services by coordinating these agents. As part of this function, the county's circulation data module 160 has obtained the distribution data from the 4 capital oblique --- agents according to the eighth degree. The bandwidth is allocated, and the calculated bandwidth is allocated to the agent, and the idle bandwidth is used to implement, and the bandwidth between the agents in its domain is dynamically allocated. See the example and $. The control point γ 2 can be constructed to recalculate the bandwidth allocation for 5 seconds. During each cycle, between re-entrants, these agents limit the amount of frequency used by the devices to which they are combined, and monitor "the amount of bandwidth used. At the end of the period, each unavailable parent 1U agent reported the bandwidth usage and "his allocation data to the control point used in the re-bandwidth." During the redistribution period, the circulation data control module 丄 60 is based on the priority data reported by the agents, and divides all the available bandwidth of subsequent cycles in the agents in the domain. . The result is a frequency $ cB, which is constructed specifically for each individual agent, which corresponds to the fair occupancy of the agent with the available bandwidth. The priorities and constructed bandwidth are a function of system policy, and can include application identity, user identity, device identity, source address, destination address, source port, destination port according to a wide range of parameters. , Agreement, user routing table, time of day, network load, number of network users, and other related parties; 胄 b enough parameters to be transmitted to the control point or the 33 network resources obtained by the control point . It can be counted by the client provided to the control point, the field and characteristics are compared with the Xi, the guide module i 3 〇…… fSun &amp; ^ greatly strengthened. Bandwidth allocation is achieved under the triggering conditions of the high-level crane in the stack, and it is clear that the political flute is only &amp; This can greatly enhance the flexibility and effectiveness of the software, systems and methods of the present invention. The priority reported by ❹agent n: ㈣may contain superior information related to the execution of the "It order-a plurality of applications on the device connected to the network.'In this case 'the relevant agent may be built Constitute @effective application priority ", which is a function for the individual application priority 2. For example, 'If device A is running two applications and device B is running a single application, the effective application priority of device A will be twice the effective application priority of χ B. It is assumed that the individual priorities of all three applications are the same. The reported priority data for a device running multiple applications can be further subdivided by weighting the reported priority according to the relative degree of activity of each application. Therefore, in the previous example, if one of the applications executed on device A is stationary or idle, the application's contribution to the effective priority of device A will not be counted, so that Device A and Device B have almost the same effective priority. To determine the effective application priority in order to use this weighting method ’The relative extent of an application ’s relative activity can be measured based on bandwidth usage, transmitted packets, or any other condition that indicates activity. In addition to priority data, each agent can be constructed to report the amount of bandwidth υβ used by its associated device during the previous cycle of 34 200304298, as described above. The data for the previous period can also be used for the allocated bandwidth AB of each device. The circulation data control module 16 can compare the constructed bandwidth CB, allocated bandwidth AB or used bandwidth UB, or any combination of these three parameters for each device to determine the following: The allocation of one cycle. In order to total the three parameters, UB is the number of devices connected to the network in the previous cycle, ab is the maximum number of devices allowed to be used, and CB is the number of devices that can be used during the next cycle. "Fair occupancy using bandwidth." Both the used bandwidth UB and the allocated bandwidth Αβ can be greater than, equal to, or less than the constructed bandwidth ... This transferable example occurs when there is Many network-connected devices use their constructed possession 帛 CB. In order to use the available bandwidth also, these unused quantities are allocated: devices with a frequency of 1 external frequency, the results are some The device is allocated to the excess share of the fair share CB AB. Although AB can be exceeded: CB, the used bandwidth UB generally cannot exceed the allocated bandwidth because the agent circulation data control module is implemented The allocation algorithm can be used for each generation of the St bandwidth CB, the allocated bandwidth AB, or the new 50 allocation that is used. However, the system has some general, Standing pass :! Then, for example, when the bandwidth is taken out by the device ... it is expected that the allocation that is least affected by the downward adjustment is reduced first. Therefore, weeping, s times, and day setting are first +%, and 4 control mode Group 1 6 Q can be constructed without any reduction> The relevant generation 5 ^ The reporting bandwidth of the benefit uses UB to allocate to customers or other devices under the allocated number 35 200304298 ΐ AB. It can be assumed Yes, if the allocation of these devices is reduced, these devices will not be affected. · In general, the circulation data control module 160 should not reduce any other allocations until all unused allocations or The distribution portion has been reduced. Then, the circulation information control module 丄 60 can be constructed to adjust continuously according to certain other conditions, or reduce the distribution of particularly high. The circulation information control module 1 6 0 also It can be constructed so that when the bandwidth becomes available, the most recent available bandwidth is provided according to the generalized preference. For example, the circulation data control module i 6 〇 can be constructed to provide first The remaining bandwidth is an agent with a low allocation amount and is requesting additional bandwidth. After these requests are satisfied, the remaining bandwidth can be allocated according to priority or other conditions. Section 1 A, 1 1 B, 1 1 c, 1 1 D shows examples of different methods that can be implemented by the circulation data control module 160 to dynamically allocate bandwidth. Figure 1 1 A shows the circulation data control module Group i 6 〇 is a procedure necessary to decide whether any adjustment of the bandwidth allocation AB is necessary. The bandwidth Aβ to be adjusted for certain agents is adjusted under at least the following circumstances. First, 'as shown in In steps S4 and S10, if the sum of all allocated bandwidths ABtotal exceeds the sum of the constructed bandwidths cBt0tal ..., some of the allocated bandwidths are modified. This situation can occur when, for some reason, in a previous cycle, a certain P-knife of the available total bandwidth is insufficient for use, or because it has been reserved for other purposes. In such an environment, it is important that during the next cycle, it reduces / some allocation AB to prevent the total allocation from exceeding the available total of 36 200304298. Secondly, if there are AB &lt; CB and any agent driving AB, then the allocation for these agents n is modified as shown in steps% and 51. The allocation to any such agent is typically increased. In this case, an agent has an allocation AB that is smaller than its constructed bandwidth cb, that is, its existing allocation is less than the fair share of the bandwidth that will be used in the next cycle rate. In addition 1 the reported use for the previous cycle UB is assigned to the implementation Aβ

實施之分配ΑΒ處,且其因而能夠被確保假如其之分:: 係增加,則更多的頻寬將被該相關之裝置所消耗。 再者’假如具有任何代理器報告頻寬使用UB係小於其 之分配AB,如同於步驟38處所決定,則對於如此之—個 代理器之該分配AB係被減少以用於下一個週期,以釋放 使用之頻寬。步驟S4 46及S8可以以任何適合 實施。總結來說,假如下列三個條件之一或多個係為=The implementation is allocated at AB, and thus it can be ensured that if its :: increases, more bandwidth will be consumed by the relevant device. Furthermore, if there is any agent reporting bandwidth using UB which is less than its assigned AB, as determined at step 38, then for this-the assigned AB of an agent is reduced for the next cycle to Free up the bandwidth used. Steps S4 46 and S8 can be implemented in any suitable manner. In summary, if one or more of the following three conditions are =

(1 ) ABt〇tal&gt;CBt〇ta卜(2 )對於任何代理器而^ AB&lt;CB且UB4AB,或者(3 )對於任何代理器而+,〇, AB,則這三個步驟係確保某些頻寬分配係被修改,亦== 加或減少。假如該三個條件皆非為直,則 /、即增 ,、則用该前一個週期 而來之該些分配AB係不被調整。於步驟s ^ 、 丄υ處,假如右 需要’該流通資料控制模組1 6 〇係修改分配有 刀奶ΑΒ。於所古 必須之修改被實施之後,該控制點係傳送誃此 μ ‘新的分配 該些代理器,以於下一個週期期間實施。 主 第1 1圖係顯示頻寬之再分配,以確 下一個週期 37 200304298 期間,總計之分配AB係不超過總計可使用之頻寬。於步驟 S1 8處,該流通資料控制模組1 6 〇係已經確認由=前 . 一個週期而來之分配AB之總和係超過下一個週期之該可使 * 用之頻寬,亦即ABtotal &gt; CBtotal。於此情況下,某些分 配AB係必須被減少。如示於步驟s 2 〇及s 2 2中,該流 通資料控制模組1 6 0可以被建構成首先減少報告對於一 個特定之代理器而言頻寬使用水準係低於其之分配量亦即 UB&lt;AB之代理器之分配。這些代理器係不使用其之分配之 邛为’且因而當該分配之該未使用部分被移除時係不受 # 影響=者僅受最少之影響。於步冑S2 Q處,該流通資料 I工制模、,且1 6 〇係決疋疋否具有任何如此之代理器。於步 驟S 2 2處,用於某些或者所有這些代理器之該些分配係 被減少。這些減少可以為漸近的,或者該分配之該整個未 被使用之部分可以一次移除。 於任何及所有未使用之分配部分已經被移除之後,進 一 V之減少係可能被要求,以適當地減少該整體分配。如 於V驟S 2 4,進-步之減少係對於具有現存分配AB &amp;馨 該建構之頻寬CB為大,亦即AB&gt;CB,之代理器實施。對 =於步驟S22,在步驟S22中,分配係由於未使用之頻 :而減少,於步驟S2 4中,頻寬係由具有於下一個週期 J間現存分配係超過該計算出之“公平的占有率,,之裝置 中移除。如示於步驟S26,於步驟S22中及S24中所 抓取之減少係可以被貫施,直到該總計之分配係 J、於或者等於下一個週期之總計的可使用頻寬為 38 200304298 止。 乐丄 圖係卜員示一種用於增加某些代理器之分配之 方法。如參照第1 1 A圖之敘述,其中對於任何代理器而 言’ ABCCBa UB与AB,對於如此之代理器之該分配係應該 被增加。此情況之存在係已經於步冑s 4 〇處被決定。為 了提供這些代理器額外之頻寬,對於某些其他代理器之分 配典型地係需要被減少。類似於第丄i B圖之步驟$ 2 〇及 S22 ’未使用之頻寬首先被辨識且被移除(步驟及 S44)。再次地,該控制點可以被建構成改變未被使用 之分配部分被移除之速率。假如被報告之資料係不反庫未 :㈣之頻寬’則該流通資料控制模組16〇可以被建構 成&quot;享CB,如不於步驟S46。於步驟S44及S46中所 恢復之頻寬係然後被提供至請求額外頻寬之代理器。 數量之方法可以被使用於提供該恢復之頻寬。舉例而古, 喜Γ以給予報告t之分配AB及其之建構的部分間 之=大差異之代理為。或者,喜好可以根據應用身份 用者身份,優先權資料,其他客戶或者任 何其他適合的標準。 飞K壬 第1 1D圖係顯示一個用於再分配未使用 般方法。於步驟S 6 0中,甘及β , 、 b U中,其係已經決定某些分配 元全被該個別之代理器所使用,亦即對於理 而驟S62中’心這些代理 分配AB係被減少。由於參昭第 °σ ^二 之該些減少及修改,該調整之速率可以11βΗκ所述 了以透過對於控制點之 39 200304298 結構改變而赫# _ _ 破改交。舉例而言,係可以期望於該再分配週 期期間僅一部分之未使用頻寬被移除。或者,於該再分配 週^ ’月間’未使用頻寬整個被移除且再分配。 於第 1 1 民! 圖之步驟S 6 4中,該被恢復之數量係隨著 而要而被提供。該被恢復之頻寬可以被使用,卩消除如示 ;第1 1B圖之该整體分配ABtotal及該可使用之頻寬之 :之差異’或者如示於第丄丄c目,增加正請求額外之頻 見且具有相對低之分配之代理器之分配。it匕外,假如具有(1) ABt〇tal> CBt〇ta (2) AB <CB and UB4AB for any agent, or (3) +, 0, AB for any agent, these three steps ensure some The bandwidth allocation is modified, and == is increased or decreased. If none of the three conditions are straight, then, i.e. increase, then the allocations AB from the previous cycle are not adjusted. At steps s ^ and 丄 υ, if the right requires ‘the circulation data control module 16’ is modified to allocate knife milk ΑB. After the necessary modifications have been implemented, the control point transmits this μ ‘new allocation of the agents for implementation during the next cycle. Main Figure 11 shows the redistribution of bandwidth to ensure the next period 37 200304298. The total allocation AB does not exceed the total available bandwidth. At step S18, the circulation data control module 16 has confirmed that ==. The sum of the allocated AB from one cycle is more than the available bandwidth of the next cycle, that is, ABtotal & gt CBtotal. In this case, certain allocations of the AB system must be reduced. As shown in steps s 2 0 and s 2 2, the circulation data control module 16 0 can be constructed to first reduce the report that the bandwidth usage level for a particular agent is lower than its allocated amount, that is, Assignment of UB &AB; These agents do not use 其 of their allocation and are therefore unaffected when the unused portion of the allocation is removed. At step S2 Q, the circulation information I is modeled, and 160 has no such agent. At step S22, the allocations for some or all of these agents are reduced. These reductions can be asymptotic, or the entire unused portion of the allocation can be removed at once. After any and all unused allocations have been removed, further reductions may be required to properly reduce the overall allocation. As in step V 2 S4, the further reduction is implemented for agents with an existing allocation AB &amp; Xin that the bandwidth CB of the construction is large, that is, AB & CB. Yes = In step S22, in step S22, the allocation is reduced due to unused frequencies: In step S24, the bandwidth is exceeded by the existing allocation that has occurred in the next period J over the calculated "fair" The occupancy rate is removed from the device. As shown in step S26, the reductions captured in steps S22 and S24 can be applied until the allocation of the total is J or equal to the total of the next cycle The available bandwidth is up to 38 200304298. The music charter shows a method for increasing the allocation of certain agents. As described with reference to Figure 1 A, where for any agent 'ABCCBa UB With AB, the allocation of such agents should be increased. The existence of this situation has been determined at step s 40. In order to provide additional bandwidth for these agents, the allocation to some other agents Typically, it needs to be reduced. Steps $ 2 0 and S22 'similar to Figure 丄 B and S22' unused bandwidth are first identified and removed (steps and S44). Again, this control point can be constructed Change unused points Partially removed rate. If the reported data is not against the library's bandwidth: the bandwidth of the circulation data control module 16 can be constructed to enjoy the CB, if not in step S46. In step S44 The bandwidth restored in S46 and S46 is then provided to the agent requesting additional bandwidth. The quantity method can be used to provide the restored bandwidth. For example, in order to give the report t the allocation AB and its The difference between the constructed parts = the agent with a large difference. Or, preferences can be based on the identity of the application, user identity, priority information, other customers, or any other suitable criteria. Fei Kung No. 1 1D picture shows a for re- The allocation method is not used. In step S 60, Gan and β,, b U, it has been determined that some allocation elements are used by the individual agent, that is, for the reason in step S62 These agent allocations AB are reduced. Due to the reduction and modification of the reference ° σ ^^ 2, the rate of the adjustment can be described by 11β 以 κ through 39 200304298 structural changes to the control points. ... for example, It may be expected that only a part of the unused bandwidth is removed during the redistribution cycle. Or, the unused bandwidth during the redistribution cycle ^ 'month' is entirely removed and reassigned. At 11th! In step S 64, the quantity to be restored is provided as necessary. The restored bandwidth can be used, please eliminate as shown; the overall allocation of ABtotal and the available frequency in Figure 11B Forgiveness: the difference 'or as shown in item 丄 丄 c, increase the allocation of agents that are requesting additional frequency and have a relatively low allocation.

足夠之被移除之頻寬’則分配可以增加給請求額外頻寬之 代理器,亦即UR £=: ^ ^ w • Αβ ’甚至虽目刖用於如此之一個代理器Sufficient removed bandwidth ’is allocated to the agent requesting additional bandwidth, that is, UR £ =: ^ ^ w • Αβ’ is even used for such an agent

之分配AB係相當高’例如AB&gt;CB時。由於敘述於第uB 及1 1 C B1所敘述之方法’該被恢復之頻寬可以使用許多 方法及根據任何適合的條件而被分配。 、如上文所指出,該流通資料控制模組丄6 〇能夠被建 構成上述分配調整所實施的速率。舉例而言,假設一個特 定之裝置係被分配“κ位元,秒(AB)且報告於前一個The distribution AB is quite high ', for example, when AB &gt; CB. Because of the methods described in sections uB and 1 1 C B1, the recovered bandwidth can be allocated using many methods and according to any suitable conditions. As indicated above, the circulation data control module 丄 60 can be constructed to constitute the rate at which the above-mentioned distribution adjustment is implemented. For example, suppose a particular device is assigned "κ bits, seconds (AB) and reported in the previous

週期 6 2 K 位元 / 5H、# M W . ^ /移之使用情形。則該流通資料控制模組 1 6 0係不能夠決定該梦署^(客# # 疋”茨忒置將使用多少額外的頻寬。因此 ’假如該分配係大幢辦ΑΓ7,A丨i . 丁 A〒田;t曰加,例如兩倍,則該項增加之相當 大部分將變成未被使用的你可/ 少 1史用的係可此產生。然而,因為該裝置 係使用一個大約等於球姑奋始八❿A n 窃 寻於口亥被只%分配AB之量,其係能夠被假 设假如該分配係增加,則該梦罟 幻邊扃置將使用更多。因此,通常 係較喜歡提供小的增量之辦加。、士 &amp; μ曰&gt; 土 曰里加。咬些增量調整之數量及其 所實施之速率可以以结槿兮借诸播 ,η μ ▲ 、 稱又備建構,如同將芩照第1 6圖 40 200304298 予以敘述。假如該裝置消耗該額外之數量,則假如額外之 頻寬係可使用時,連續之增加係能夠被提供。 此外,該頻寬分配及計算可以對於該連接網路之裝置 之該傳送及接收速率分開實施。換句話說,參照第丄1 A _ 1 1 D圖之該些方法係可以被使用於計算一個特定裝置 之一個傳送分配以及一個個別的接收分配。或者,該些計 算可以被結合,以產生一個整體的頻寬分配。Cycle 6 2 K bits / 5H, # M W. ^ / Shift use case. Then the circulation data control module 160 can not determine how much additional bandwidth the dream department ^ (客 # # 疋 ”茨 忒 置 will use. Therefore, 'if the distribution system is a large office AΓ7, A 丨 i.丁 A〒 田; If you add t, for example, twice, a substantial portion of the increase will become unused. You can use this system for less / less time. However, because the device uses an approximately equal The ball-necked prince A n steals the amount of AB allocated by Kou Hai, and it can be assumed that if the distribution system increases, the nightmare magic edge setting will be used more. Therefore, it is usually preferred Provide small increments to do plus., Taxis & soil said Riga. The amount of some incremental adjustments and the rate of implementation can be broadcasted in the form of η μ ▲, also known as The construction is as described with reference to Fig. 40 200304298 in Fig. 16. If the device consumes this additional amount, then if additional bandwidth is available, a continuous increase can be provided. In addition, the bandwidth allocation and Calculate the transmission and reception rates that are available for the connected device Separately implemented. In other words, the methods referring to Figure 丄 1 A _ 1 1 D can be used to calculate a transmission allocation and an individual reception allocation for a specific device. Alternatively, the calculations can be combined, To produce an overall bandwidth allocation.

該祠服器輪廊模組1 6 2,該區域名㈣統伺服器輪 廓模組1 6 4,該閘道器輪廓模組丄6 6及該管理器模: 1 6 8皆:該些代理器交互作用,以監視網路資源之狀態 更明確。之’第1 2圖係提供該些控制點及代理器如何 可以被建構成1視於該網路上 J峪上之貝源之狀態之示範性之範 例。該被監視之資源可以為一 ^ 1 J服态,一個區域名稱车 統伺服器,一個路由器,一彳 ” 個閘道态,一個開關,應用等 等。於步驟S 1 0 〇中, _ 寻 U υ中,一個貧源狀態改變係已經 舉例而言,一個伺服器係 ^The temple server corridor module 1 62, the area name is the server profile module 1 6 4, the gateway profile module 丄 6 6 and the manager module: 1 6 8 are: these agents Interact with each other to monitor the status of network resources more clearly. Figure 1 of Figure 2 provides an exemplary example of how the control points and agents can be constructed to look at the state of the shell source on the network. The monitored resource can be a ^ 1 J service state, an area name car system server, a router, a "gateway state, a switch, an application, etc. In step S 100, _ find In U υ, a poor state change system has been exemplified by a server system ^

通資料已經大幅增加,一個胜——從 田裔之机 個特疋之應用係不能被使用,或 者一個特疋之閘道器之 、。。之效恥已經下降至指明於一 策中之預定臨限值。 ’、、、之政 一调運接網路之裝置禆+ 該資源或者結合牽涉到$ ]5亥特定資源之該網路上之活動&lt; 如該接取或者請求裝置係為一 動 用搵細1 q ft %太止 代里态,則一個由彈{j 用接、、且1 3 8所產生之執耔 ,且…… 執仃方式(第9圖)係分析該, 且報告该貝源之該身份 狀悲至連接於該代理器之言; 41 200304298 出應用之發送 件政請定之條 源… 糸統政策可以包含用於不同網路資 :亥建::t::票記’且可以進&quot;&quot;步指定當資源效能係偏移 ::此ΐ 某一量時彈出應用分析係被實施。此外 網路^制點可以類似地被建構成發出彈出應用,以分析 訊至:=;::=:’該控制點係報告該資 :…貝源之進一步客戶請求,如示於步驟s 乂驟S 1 ;[ 〇。於該目標資源 或者…用,給予該些 替代之眘、、/S # 相7係將根據疋否一個 代的資源:列:使二。“系動態地儲存更新過之替 供至該代理哭4 Λ固曰代資源係可以被使用,則提 : °σ之δ亥些指令可以包含透明地再導引該嘖长 :::::源之指令,如示於步驟 服哭二二料點係知道一個伺服器映射另-個已經離開之飼 再i引至至該離開之飼服器之客戶請求係能夠僅被 使一代之資源可㈣ 個使用者訊自,Γ 在接取之企圖下,提供一 理器彈出庫二二:步驟S110。該發訊功能係由代 以被該控Γ理。此外’彈出應用功能可 其他販賣者所提供之管=狀:=:控制點及* 吕埋干$ 0此外,關於資源狀態或者 42 200304298 網路狀態之訊息可以透過電子郵件或者傳呼至網際網路技 術人員而被提供。 …再么參照第! 2圖,該控制點可以被建構成負責追縱 該資源之該狀態之任務’以決定何時其係再度變成可使用 的:如示於步冑Sll2。—個慢速之輪詢技術係被使用 :取j化於4網路上之不需要的流通資料。於該資源係不 用之,間,該些代理器根據由該控制點所提供之該些 才&quot;不疋再導引請求至該些資源即是提供錯誤訊息,如 不於步驟S1 1 6。一旦該控制點確認該資源係再度可以 被使用,則該控制點係分享該資訊及該些代理器,且禁能 於人驟S1 0 8及si 1 〇中所提供之指令,如示於步驟s 118。 邊追縱及監視資源狀態之方法係具有重要的優點。首 先其係、減少對於不能使用之資源的不需要且挫折之接取 、代重複地企圖實施—個卫作,—個使用者之請求係被 再=引’使得該請求能夠被成功地服務,或者該使用者係 被提供關於為何該企圖係不成功之資訊。由於獲得此資訊 使用者係較不可能產生於一短期間内具有重複接取企 圖之浪費的網路流通資料。此外,網路流通資料亦係藉由 僅具有通吊為一個控制點之一個入口而被減少,而負責監 視不能被使用之資源之任務。 、 除了幫助這些資源監視功能之外,伺服器輪廓模組1 &amp;系、隹濩由代理器於其之域之内所接取之該些伺服器之 動悲的更新列表。該祠服器統計可以使用該結構設備而被 43 200304298 取出,或者以不同的1仙丨曰士 Μ ^ 勺α他現存管理平臺。該伺服器統計可 以被使用於網路規劃,或者可以被使用於成為不同的系統 政策’以用於該代理器及控制點之動態實施。舉例而言, -亥二&amp;制點及代理器係能夠被建構成由負載重之飼服器或 者其他為源轉向流通資料。 該區域名稱系統伺服器輪靡模組1 6 4除了如第工2 圖:斤示幫助該資源監視及追縱之外,亦實施某些特定化之 功『明確吕之,該區域名稱系統飼服器輪廊模組1 係維護用於有效率^α 羊之本地位址決定之一個本地區域名稱系 統决取。如參照代理器區域名稱系統模組工3 6所敛述, 該些代理器及控制點係交互入用,以決定位址請求,且可 成藉由首先參照由該些代理器及,或控制點所維 叙本地區域名稱系統資料而決定位址。類 廓模組1 6 2,哕ρ^服时輪 4 £域名稱糸統伺服器輪廓模組i 6 4亦 維護用於使用於網路規誠動態系統政策之統計資料。 結構^上=功能::該管理器模組168係維護控制點 兮伺服-二配此貧訊至該域内之該些代理器。類似於 = ::、區域名稱系統及閉道器模組,該管理器模組工 亦#助收集及維護關於網路資源之統 ==組…係由中央化之政策貯存器取出政;資 二::存該政策資料,以由該些控制點及代理器 於貧轭系統政策時使用。 制牛7 2亦包含m在該相同域内之複數個控 制』之間同步資訊之同步化介面(未示出)。 44 200304298 訊息中間模組1 7 〇 #眚μ χ n Λ υ係貫細不同的功能,以致 制點與該些代理器傳通。自 σ工The communication information has been greatly increased. One win-from Tian Yi's machine, a special application system cannot be used, or a special gateway device. . The effect has been reduced to the predetermined threshold specified in a policy. ',,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, (,,,,,,,,,, (,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,)), (&) On the network, related to a specific resource &lt; If q ft% is too far off, there is an execution produced by the bomb {j 接 接, and 1 3 8 and ... The execution method (Figure 9) is to analyze the situation and report the source of the shell. The status of this identity is so sad that it is connected to the agent; 41 200304298 The source of the request for delivery of the application ... The system policy can include the use of different network resources: Haijian :: t :: ticket 'and can Further &quot; &quot; specifies that when the resource efficiency system is shifted: :: this 弹出 a certain amount of pop-up application analysis system is implemented. In addition, the network control point can be similarly configured to issue a pop-up application to analyze the information to: =; :: =: 'The control point reports the asset: ... Baiyuan's further customer request, as shown in step s Step S 1; [〇. For the target resource or ..., give these alternatives with caution, / S # Phase 7 will be based on whether the resources of one generation: column: make two. "The system dynamically stores updated alternatives for the agent to cry. The 4th generation resource system can be used. Then, the instructions: ° σδδ may include transparent redirection of the command line ::::: The source command, as shown in the step of the server, the second point is to know that a server maps another server that has already left, and the client request that leads to the left server can only be made available to one generation of resources.使用者 The user said that under the attempt of receiving, Γ provides a processor to pop up the library 22: step S110. The signaling function is replaced by the controller. In addition, the 'pop-up application function can be used by other vendors Provided pipe = status: =: control point and * Lu Buqian $ 0 In addition, information about the status of the resource or 42 200304298 network status can be provided by e-mail or paged to an Internet technician ... Referring to Figure 2, the control point can be constructed as a task responsible for tracking the state of the resource to determine when it becomes available again: as shown in step S112. A slow polling technique Is used: take unneeded streams on 4 networks The information is not used. In the meantime, the agents provide error messages based on the resources provided by the control point and "redirect the request to these resources. If not in step S1, 1 6. Once the control point confirms that the resource can be used again, the control point shares the information and the agents, and disables the instructions provided in steps S108 and si10, such as Shown in step s 118. The method of tracking and monitoring the status of resources has important advantages. First of all, it is to reduce the unnecessary and frustrated access to unusable resources, and repeatedly attempt to implement—a health work, -A user's request was re-quoted to enable the request to be successfully served, or the user was provided with information about why the attempt was unsuccessful. Because obtaining this information, users are less likely to generate There is a waste of network circulation data with repeated access attempts within a short period of time. In addition, the network circulation data is also reduced by having only one entrance through which communication is a control point, and the responsibility for monitoring cannot be compromised. Tasks of the resources used. In addition to helping these resource monitoring functions, the server profile module 1 &amp; is a tragic update of the servers received by the agent within its domain. List. The server statistics can be taken out by using 2003 200304298 using the structure equipment, or with different 1 cents, and the existing management platform. This server statistics can be used for network planning, or can Used to become a different system policy 'for the dynamic implementation of this agent and control point. For example, -Haiji &amp; manufacturing points and agents can be constructed to be loaded feeders or other For the source, turn to the circulation information. In addition to the second name of the area, the server of the local name system module 1 6 4 helps to monitor and track the resource, and also implements certain specific functions. This area name system, feeder, and corridor module 1 is to maintain a local area name system for efficient ^ α sheep's home address determination. As summarized by referring to the agent area name system module worker 36, the agents and control points are used interactively to determine the address request, and can be referred to by the agents and or control Click on the local area name system information to determine the address. The profile module 162, 哕 ρ ^ service time wheel 4 £ Domain name, system server profile module i 6 4 also maintains statistical data for use in network compliance dynamic system policies. Structure ^ Up = Function: The manager module 168 is a maintenance control point. Xi Servo-II is equipped with the poor information to the agents in the domain. Similar to = :, area name system, and closed circuit module, the manager module worker also helps to collect and maintain the uniformity of network resources == group ... is taken out from the centralized policy storage; 2: Save the policy information for use by these control points and agents in the poor yoke system policy. Niu 72 2 also includes a synchronization interface (not shown) for synchronizing information between multiple controls in the same domain. 44 200304298 Message middle module 1 7 〇 # 〇μ χ n Λ υ implements different functions, so that the control point communicates with these agents. Since σ worker

頰似於代理裔訊息中間模組! 4 0,該訊息中間模組丄7 Q 吳和产、女 ^係包3 Λ息產生态及訊息發送 益私《序,以產生及值译&gt;»·χ7 6 玍及得迗矾息至該些控制點。該訊自 程序係包含成員功能,发 心生态 ,、係藉由接收汛息内容作為束數且 以一個標準網路袼式编踩兮&amp;〜〜 数五 ^碼_些内容而產生控制點訊息。續 被編碼之訊息係被傳送 °玄 王η埋杰及其他網路實體 碼該接收到之訊息的功能介^ A 1體用於解 中。兮亦係包含於該訊息產生器程序之 中《亥IS运益私序係傳送訊自 ..y. r L 且透過一個重試機制及铒 祆偵測及恢復方法而確保可靠之傳輸。 〃曰 現請參照第1 3至1 β国 ^^^ 16圖,该些代理器及控制點皆可The cheek is similar to the agent's message intermediate module! 4 0, the message intermediate module 丄 7 Q Wu Hesan, female ^ system package 3 Λ interest generation state and message sending private "order, to generate and translate"> Χ7 6 玍 and get alum to these control points. The news self-program contains member functions, is devoted to ecology, and generates control points by receiving flood information content as a bundle number and editing it in a standard network format. message. Continued The coded message is transmitted ° Xuan Wang η Bujie and other network entities code the function of the received message ^ A 1 body is used for solution. Xi is also included in the message generator program, "Hai IS Yunyi private sequence is transmitted from ..y. R L and ensures a reliable transmission through a retry mechanism and 铒 祆 detection and recovery methods. 〃 现 Refer to Figures 13 to 1 β ^^^ 16 Figures, these agents and control points are available

以使用結構設備1 〇 6而#捿接 ^ J β μ / * 構。典型地,結構設備1 0 6係為^一個平堂益關之虛田 4 而 m 應用’其係提供一個圖形使用者介 面,以用於中央地管理用 ^ # n ; μ二控制點及該此代理哭$处 構貧訊。為了建構該肽控 -代里益之結 代理哭7及代理器’該結構設備係與 代理為70之该管理器模組工 設備與控制點γ 2之該f ~結構 去,沾姐j ^理為槟組1 6 8作介面連接。或 -構设備1 〇 6可以與該/ 接,且接著,該控制點係與代_=、,'且168作介面連 34作介面連接。 ”代理〇0之該管理器模μ 第1 3圖係顯示結構設備 1〇6之一個主要結構螢幕 8。如圖所示,該主要纟士 _丢τ A 構螢幕1 8 8能夠被使用於 硯看不同的被管理之物件 文用於 代理器及其他網路實體及資源 I應用匕制點, 舉例而言,於該主要結構 45 200304298 勞幕1 8 8之該左側處之螢幕框1 9 0係可以被使用於呈 現被,構用於該網路之該些控制點之可擴展的表示。To use the structure device 106 and # 捿 β J β μ / * 结构. Typically, the structural device 106 is a virtual field 4 of the Pingtang Yiguan Pass, and the m application 'provides a graphical user interface for centrally managed applications. This agent was crying for $. In order to construct the peptide control-Deliyi knot agent Cry 7 and the agent 'the structure device is the agent module 70 and the manager module device and control point γ 2 the f ~ structure to go, Zhan sister ^ It is used for interface connection of Bin group 1 6 8. Or-the configuration device 106 can be connected to the /, and then, the control point is connected to the interface _ = ,, and 168 as the interface. The manager module 0 of the agent 0 0 Figure 13 shows a main structure screen 8 of the structure device 10. As shown in the figure, the main warrior _ τ A structure screen 1 8 8 can be used in砚 Look at different managed object texts for agents and other network entities and resources. I use daggers. For example, in the main structure 45 200304298 labor screen 1 8 8 the screen frame on the left side 19 0 is a scalable representation of the control points that can be used to render the network.

當一個特定的控制點係於該主要結構螢1 8 8中被選 :出則用於忒控制點之不同的設定可以被建構。舉例而 技制點之名稱可以被編輯,代理器及其他實體可以 被加入至该控制點之域,且該控制點可以被指定為一個用 於特=代理器或者代理器群組之一個第二連結。此外,該 系、.先g理&amp;可以指定於該控制點之域内給使用者用於傳送 及接收之總共可使用之頻寬,如示於第1 4圖。此頻寬規 格將影響參照示於第1 1圖之控制點流通資料模組i 6 〇 方法中所纣刪之该建構之頻寬⑶及該分配頻寬Μ。 結構設備1 0 6亦提供與一個特定控制點相關之關於 使用者、應用及資源之不同設定之結構。舉例而言,使用 者可以被群組化,以用於共同集合之處理,禁止之使用者 由表之Μ表可以指定用於特定之使用者或者使用者群組 ’如不於第1 5圖。優先權亦可以被指定至使用者或者使When a specific control point is selected in the main structure Fluorescent 188: different settings for the control points can be constructed. For example, the name of the crafting point can be edited, agents and other entities can be added to the control point's domain, and the control point can be designated as a second agent or a second agent group. link. In addition, the system can be specified in the control point's domain for the user's total available bandwidth for transmission and reception, as shown in Figure 14. This bandwidth specification will affect the constructed bandwidth ⑶ and the allocated bandwidth M which are deleted in the method of controlling point circulation data module i 6 〇 shown in FIG. 11. The structure device 106 also provides structures related to different settings of users, applications and resources related to a specific control point. For example, users can be grouped for common collection processing. Forbidden users can be specified for specific users or user groups. . Priority can also be assigned to users or

、群、士上文所述’该優先權資料係扮演決定用於該 些代理器及其相關之裝置之頻寬分配。 此外,最佳的及最小的效能水準可以被建立,以使用 網路貧源而用於應用或者其他工作。再次參照上述之該網 際網路電話範例,續纟士播彳此 ▲ #古㈣U冓设備可以被使用於指定用於執行 该網際網路協定電話應用之一個連接網路之裝置的最小臨 限效能水準。該效能水準可以根據諸如頻寬、產量、抖動 、延遲及損失之服務之品質的效能參數而被指定。與該連 46 200304298 、、 之裳置相關之該代理器模組然後將監視與該網際網 路協定雷每;* ra α · ^ Α應用相關之該綱路流通資料,以確保效能係於 最】、5°°限之上。假如該最小水準係不符合,則該些控制 ,及代理器係與可分配之資源交互作用,且提供該指定之 取小服務水準。類似地,一個最佳服務水準可以對於不同 的、、罔路應用及工作指定。更一般而言,結構設備1 〇 6可 以被建構成藉由提供用於提供下列功能而管理系統政策: ^權’維護及儲存系統政策,於一個分散式網路上管理由 ,他位置而來之系統政策之取出,諸如一個專用政策伺服 _ 、 明 &gt; 照第1 6圖,其係將討論不同之其他控制點As mentioned above, the priority data plays a role in determining the bandwidth allocation for these agents and their related devices. In addition, the best and smallest levels of performance can be established for use in applications or other tasks using network poor sources. Referring to the Internet phone example above again, continued this broadcast: ▲ # 古 ㈣U 冓 The minimum threshold that a device can be used to specify a network-connected device that is used to run the Internet Protocol phone application Efficiency level. The performance level can be specified based on performance parameters such as bandwidth, yield, jitter, delay, and loss of service quality. The agent module associated with the company 46 200304298, and then will monitor the Internet Protocol Thunder; * ra α · ^ Α application related to the road circulation data to ensure that the performance is the most efficient ], Above 5 °° limit. If the minimum level is not met, the controls and agents interact with the allocatable resources and provide the specified minimum service level. Similarly, an optimal service level can be specified for different, Kushiro applications and jobs. More generally, the structural equipment 106 can be constructed to manage system policies by providing for providing the following functions: Maintenance and storage system policies are managed on a decentralized network from other locations. The removal of system policies, such as a dedicated policy servo_, Ming &gt; According to Figure 16 it will discuss different other control points

代理器參數之結構。如示於圖中,結構設備工〇 6可以 使用於建構資源分配被實施之期間。舉例而言,用於再 算頻寬分配之預設期間係為5◦Q◦毫秒,亦即5秒。 外’如上文所述,資源分配產生之速率可以被指定,以 止對於分配之過度補償及不必要之調整,以及無效率之 新組構。明確言之,由-個客戶褒置處移除且重新分配 過度使用之頻寬的百分比係可以被該結構設備所指定, 不於第1 6圖。此外’代理器提供反饋至該些控制 於網路狀態或者其相關之裝置之活動的速率係可以被建: W上又所述之訐 之結構:方式實施。該第-層可以包含-或多個二 =: 渚如7 2。因為該些控制點係控制及協調代理器 47 200304298 在上方,,之操作,該些控制點可以被稱為“上游,,或者“ 古 之元件’其係相對於其控制之該些代理器模組而 :之下’形成該系統之該第二層之該些代理器可以 饭%為 下Μ,,4·、i “上 或者在下方,,之元件,其係相對於控制 八之该些控制點而言。 ;I解的是,於此所述之該些系統及方法係相當具有 的且可比例化的,且可以被應用於廣泛變化大小之網 路夕於某些設定中,比例化係藉由擴展階層之實施至三或Structure of agent parameters. As shown in the figure, structural equipment workers 06 can be used during the period when construction resource allocation is implemented. For example, the default period for recalculating bandwidth allocation is 5◦Q◦msec, which is 5 seconds. Outside 'As mentioned above, the rate of resource allocation can be specified to prevent over-compensation and unnecessary adjustments to the allocation, as well as inefficient new structures. To be clear, the percentage of bandwidth that was removed and reallocated from a customer facility and over-allocated can be specified by the structural equipment, as shown in Figure 16. In addition, the agent provides feedback to the control of the network status or the rate of activity of its related devices. The rate can be built: The structure described in W: The method is implemented. The first layer can contain-or more two =: 渚 如 7 2. Because the control points are the control and coordination agents 47 200304298 above, the control points can be referred to as "upstream," or "elements of the ancient," which are relative to the agent models they control. The following: the agents that form the second layer of the system can be lower than M ,, 4 ,, i, above or below, the elements that are relative to the eight that control As far as control points are concerned, the solution is that the systems and methods described here are quite capable and proportional, and can be applied to networks of widely varying sizes. In some settings, the ratio Transformation is through the implementation of the expansion hierarchy to three or

更夕層而達成。事實上,一個非常大的結構化模型可以藉 由擴展。上述之該兩層範例於該上游及/或下游側而被建 立〇 如此之一個模型係可以被使用於在一個非常大且複雜 之、”罔路結構中傳送相符之應用效能。一個上游元件可以控 制或多個下游元件。一個上游元件亦能被建構成為某些 拴制上游貫體之下游元件。類似地,一個下游元件可以被 建構成為一個控制其之下游實體之上游元件。 第1 7圖係顯示一個多層實施方式之範例。於此範例 中’該層1元件係為相對於在層2中之3個元件之上游。 因為該層2之元件係位於下方且係由該層1之元件所控制 ’所以該層2之元件係為相對該層1元件之下游元件。如 圖所示,於層2、3及4之該些元件可以被建構成同時作 為上游及下游之元件。 於此所述之該代理器模組及控制點可以於一個諸如示 於第1 7圖中之多層環境内之任何階層處實施。舉例而言 48 ,該層4之元件可以包含一 其係建構成控制可以於該τ個如圖所示之控制模&quot;2, 模組γ 〇。 方之層5兀件上執行之代理器 以Ρ自層結構而言,第 -對多之結構中實施移動2圖:該結構典型地係於-個 可以控制於緊接其下方之心數句’ -個上游元钭 游元件可以控制於再下一二=下游元件’且該” ,-個給定之下游元件血:下游層中之複數個元件。然而 a . ^ 〇〇 _ ^'地係向一個單一上游元件報告Even more reached. In fact, a very large structured model can be extended. The two-layer example described above is built on the upstream and / or downstream side. Such a model can be used to deliver consistent application performance in a very large and complex "broadway" structure. An upstream component can Control or multiple downstream elements. An upstream element can also be constructed as some downstream element that binds the upstream body. Similarly, a downstream element can be constructed as an upstream element that controls its downstream entities. Figure 17 Shows an example of a multi-layer implementation. In this example, 'the layer 1 component is upstream relative to the 3 components in layer 2. Because the component of layer 2 is below and is connected by the component of layer 1 'Controlled' so the element of layer 2 is the downstream element relative to the element of layer 1. As shown in the figure, the elements in layers 2, 3 and 4 can be constructed to serve as both upstream and downstream elements. Here The agent modules and control points described may be implemented at any level within a multi-layered environment such as shown in Figure 17. For example, 48, the elements of layer 4 may include The control can be constructed in the τ control modules shown in the figure, "2, module γ." The agent executed on the layer 5 element of the square is based on the layer structure, the first-to-many structure. Implementation of Move 2 diagram: This structure is typically tied to a heart sentence that can be controlled immediately below it-an upstream element migratory element can be controlled at the next two = downstream element 'and "" Fixed downstream element blood: multiple elements in the downstream layer. However, a. ^ 〇〇 _ ^ 'is reported to a single upstream element

W早上游元件所控制。庫目# Μ θ . .. 應瞭解的疋,許多不同的^ 構係可能的,該此結構r T夕小丨』的、结 兮此η 有任何數量之層&amp;元件或者妒 该些層内之元件的群組。 、 於諸如上述之多声瑗柃山 Μ 夕層兄中,通常係期望提供用於中少 地疋義及分配關於頻寬及1 、 / 見夂其他貝源之管理的政策之機制。 第1 8圖係顯示採用如士她 用々此機制之一個示範性連接網路之 境。於此範例中,;^\ ^ 同之刀支辦公室係透過網路2 〇 2而 連接f —個中央化之資料中心2 Q 〇。該系統可以被建構W control by morning swim element. Library # Μ θ.... It should be understood that many different ^ structures are possible. The structure r T eve is small. There are any number of layers &amp; elements or envy of these layers A group of components within. Among the multi-sounding Sheshan M Xixi brothers such as those mentioned above, it is usually expected to provide a mechanism for the definition of policies and allocation of bandwidth and the management of other sources in China and China. Figure 18 shows an example of a network connection using this mechanism. In this example, ^ \ ^ The same knife office is connected to f-a centralized data center 2 Q 〇 through the network 002. The system can be constructed

成致能—個管理器^義諸如-個企業政策飼服器2 0 4之 中央伺服态上之企業廣泛的政策。於如此之環境中,於此 所述之4些控制點可以結合—個受控制之位置政策祠服器 2 〇 6而被實施’如示於第1 8圖之底部處之示範性分支 辦公室2 0 8。 典型地,一個給定之位置政策伺服器2 〇 6係由其之 企業政策伺服器2 〇 4取出關於其之分支辦公室之政策。 可以包含一個控制模組7 2之該位置政策伺服器2 〇 6然 49 200304298 後分配相關之政策至其域内之相關之代理器模組7 〇。然 後’該$出之&amp;策係被分配至受該控制點模組所控制之不 同的代理器。該政策定義及分配機制可以輕易地被改變及 比例化成管理廣泛變化之企業結構。特別重要的是,該分 配之政策可以被使用於便利於此所述之頻寬管理技術。 除了先前所述之頻寬管理特色之外,頻寬管理可以使 用諸如上述之分層之實施方式而受影響。帛工9圖係顯示 用於在網路鏈路3 〇 2上管理頻寬之示範性系統3 〇 〇。 如圖所示,系統3 0 0係可以包含稱為頻寬管理器之 不同的元件,其係可以於敘述於此之該些控制模組(例如 ,控制點7 2 )及代理器模組(例如,代理器模組7 〇 ) 之内實施。舉例而言,該顯示之系統係包含一個受控制之 位置頻寬管理器3 〇 4,該受控制之位置頻寬管理器3 〇 4可以於先前敛述之控制,點7 2 或於一個受控制之 位置政策伺服器206内實施,如示於第18圖。於任何 情況下,該受控制之位置頻寬管理器3 〇 4典型地係被實 施為一個執行於一個計算裝置上之軟體程式,該計算裝置 係堵如連接至網路鏈路3 〇 2之一個伺服器(未示出)。 、該受控制之位置頻寬管理器3 〇 4典型地係與執行於 連接至網路鏈路3 Q 2之計算裝置上執行之代理器軟體( 例如’代理器模組7 〇 )傳通,卩管理由該些裝置所使用 之頻寬。舉例而言’如圖所示’亦稱為代理器電腦之複數 個计异裝置2 2係可以透過網路鏈路3 ◦ 2而互連。每一 個代理②電腦可以執行於:—個代理器頻寬管理器3 〇 6 50 200304298 上 頻 見 件 〃或多個應用頻寬管理器308上,及—或多個封套 ,寬管理器3 1 〇上。負載於代理器電腦以上之該些頻 管理器典型地係為如上文所述之代理器模组7 〇之子元 於一個給定之連接至網路鏈路Cheng Zhineng—a manager means a wide range of corporate policies in the central servo state of a corporate policy feeder. In such an environment, the four control points described herein can be implemented in combination with a controlled location policy server 206, as shown in the exemplary branch office 2 at the bottom of Figure 18. 0 8. Typically, a given location policy server 2006 is retrieved by its corporate policy server 2004 for its branch office policies. It may contain a control module 7 2 of the location policy server 2 06 2003 49298 and then assign the relevant policy to the relevant agent module 7 in its domain. Then the 'out of &amp; policy is assigned to different agents controlled by the control point module. The policy definition and distribution mechanism can be easily changed and scaled to manage a widely changing corporate structure. It is particularly important that this allocation policy can be used to facilitate the bandwidth management techniques described herein. In addition to the bandwidth management features previously described, bandwidth management can be affected using layered implementations such as those described above. Figure 9 shows an exemplary system 300 for managing bandwidth on a network link 300. As shown in the figure, the system 300 can include different components called a bandwidth manager, which can be described in the control modules (for example, the control point 7 2) and the agent module ( For example, implemented within agent module 7 0). For example, the system shown includes a controlled position bandwidth manager 3 04. The controlled position bandwidth manager 3 04 can be controlled as previously described, point 7 2 or in a controlled The controlled location policy server 206 is implemented as shown in FIG. In any case, the controlled location bandwidth manager 3 04 is typically implemented as a software program running on a computing device that is blocked such as being connected to a network link 3 02 A server (not shown). The controlled location bandwidth manager 3 04 is typically communicated with agent software (eg, 'Agent module 7 0') running on a computing device connected to a network link 3 Q 2,卩 Manage the bandwidth used by these devices. For example, as shown in the figure, the plurality of unique devices 2 and 2 which are also referred to as agent computers can be interconnected through a network link 3 ◦ 2. Each agent ② The computer can be executed on:-an agent bandwidth manager 3 〇 0 50 200304298 on the frequency band or multiple application bandwidth manager 308, and-or multiple envelopes, bandwidth manager 3 1 〇 上. The frequency managers that are loaded on the agent computer are typically children of the agent module 70 as described above. At a given connection to the network link.

内,典型地係具有一個代理器頻寬管理器3 〇 6,一個 3量之應用頻寬管理器3 0 8 ’及-個可變數量:封 =官理器3U,其係根據被使用之應用及封套而定 :例而言’當該些頻寬管理器係於一個代理器模組7〇 該代理11模組典型地係改變成對於每—個執行; 電月向22上之應用32 ◦發出—個應用頻寬管理器Inside, it typically has an agent bandwidth manager 3 06, a three-volume application bandwidth manager 3 0 8 ′, and a variable number: seal = official manager 3U, which is based on the used Depending on the application and envelope: For example, 'when the bandwidth managers are attached to an agent module 70, the agent 11 module is typically changed to execute for each one; application 32 on the electricity monthly 22 ◦ Issue-an application bandwidth manager

個於每一個由每一個應用3 2〇所開啟之封套發出· :封套頻寬管理器310。如圖所指出,一個給定之計】 、置可以正在執行複數個應用3 2 Q,且—個給定之⑻ ^ 2 〇可以具有複數個開啟之封套3 2 2。計算裝置2 : 係透過傳送及接收控制部分3 2 4及3 2 6 *傳送及接: 於網路鏈路3 〇 2上之資料。傳送及接收控制部分^ 2 ^ 及3 2 6可以分別地包含傳送及接收符列3 2 8及3 3 ( ’其係將於下文予以詳述。 於该顯示之範例中,該受控制之位置頻寬管 4枝故 口占ο u “里於網路鏈路3 〇 2上之整體頻寬,一個代理器頻 ^ ^里裔3 0 6係管理由其相關之代理器電腦2 2所使用 之肩寬,一個給定之應用頻寬管理器3 〇 8係管理由其相 關之應用3 2 0所使用H且-個封套頻寬管理器3 51 200304298 1 0係管理由其相關之封套3 2 2所使用之頻寬。 如由互連該不同之頻寬管理器之箭頭所示,該 管理器可以以一個階層之控制結構而被配置,i 、 一 y Ν J ' y(固Issued by each envelope opened by each application 3 2: The envelope bandwidth manager 310. As indicated in the figure, a given device can be executing multiple applications 3 2 Q, and a given ⑻ ^ 2 〇 can have multiple open envelopes 3 2 2. Computing device 2: It is through the transmitting and receiving control part 3 2 4 and 3 2 6 * Transmitting and receiving: the data on the network link 3 02. The transmission and reception control parts ^ 2 ^ and 3 2 6 may respectively include transmission and reception symbols 3 2 8 and 3 3 ('which will be described in detail below. In the example shown, the controlled position Bandwidth control 4 branches account for ο u "The overall bandwidth on the network link 3 〇2, an agent frequency ^ ^ 3 3 0 6 is managed by its related agent computer 22 2 Shoulder width, a given application bandwidth manager 3 08 manages the bandwidth used by its related applications 3 2 0 and an envelope bandwidth manager 3 51 200304298 1 0 system manages the envelopes related by it 3 2 2 The bandwidth used. As shown by the arrows interconnecting the different bandwidth managers, the managers can be configured with a hierarchical control structure, i, a y Ν J 'y (solid

上游元件係與一或多個在下方之下游元件交互作用及/〆 控制-或多個在下方之下游元件。於該顯示之範例中,: 受控制之位置頻寬管理器3 0 4係藉由與在下方之該代= 裔頻寬官理器3 〇 6交互作用而管理於網路鏈路3 〇 2上 使用之頻寬,以管理由位於該受控制之位置頻寬管理器^ 0 4下方之該特定之下游計算裝置2 2、應用3 2 封 套3 2 2所使用之頻寬。應瞭解的是,該受控制之位置頻 寬官理器3 〇 4係可以管理使用於電腦之間之任何形式之 互連上。舉例而言,於第2圖中,一個給定之遠距網路; 4能夠包含一個伺服器電腦,該伺服器電腦係執行一個透 過一個區域網路部分而與複數個客戶電腦互連之該受栌制 之位置頻寬管理器3 〇 4,其中,每一個客戶電腦係負載 -個代理器模組7 0。於如此之情況下,該控制電腦能夠 控制該客戶之頻寬使用之該區域網路部分(例如,一個以 乙太網路為基礎之區域網路)及透過路由器1 8而至八共 網路1 6之連結。 再次參照第1 9圖,一個給定之代理器頻寬管理器3 〇 6係藉由與下方之應用頻寬管理器3 〇 8交互作用而管 理由其相關之計算裝置2 2所使用之頻寬,以管理由位於 代理器頻寬管理器3 0 6下方之該特定下游應用3 2 〇及 封套3 2 2所使用之頻寬。類似地,一個給定之應用頻寬 52 200304298 管理器3 0 8係藉 作用而管理由其相 由位於應用頻寬管 2所使用之頻寬。 報告諸如頻寬消耗 利於控制。 由與下方之封套頻寬管理器3 1 〇交互 關之應用3 2 0所使用之頻寬,以管理 理裔3 〇 8下方之該特定下游封套3 2 如下文所解釋,下游元件典型地係藉由 之某些資料至位於上方之上游元件而有 於該顯示之筋你丨φ,&amp; + » 中頻寬可以猎由採用存在於一特定An upstream element interacts with and / or controls one or more downstream elements below-or multiple downstream elements below. In the example shown ,: The controlled position bandwidth manager 3 0 4 is managed and used on the network link 3 02 by interacting with the next generation = the bandwidth bandwidth manager 3 0 6 Bandwidth to manage the bandwidth used by the particular downstream computing device 2 2 under the controlled location bandwidth manager ^ 0 4, application 3 2 envelope 3 2 2. It should be understood that the controlled location bandwidth controller 300 can manage any form of interconnection used between computers. For example, in Figure 2, a given long-distance network; 4 can include a server computer that executes a server computer that is interconnected with a number of client computers through a LAN section. Controlled position bandwidth manager 3 04, where each client computer is loaded with an agent module 70. In this case, the control computer can control the portion of the LAN used by the customer's bandwidth (for example, an Ethernet-based LAN) and through the router 18 to the Yagong network 1 of 6 links. Referring again to FIG. 19, a given agent bandwidth manager 3 06 manages the bandwidth used by its associated computing device 22 by interacting with the application bandwidth manager 3 08 below. To manage the bandwidth used by the particular downstream application 3 2 0 and the envelope 3 2 2 located below the agent bandwidth manager 3 06. Similarly, a given application bandwidth 52 200304298 manager 308 manages the bandwidth used by the application bandwidth manager 2 by its role. Reports such as bandwidth consumption are good for control. The bandwidth used by the application 3 2 0 that interacts with the lower envelope bandwidth manager 3 1 0 to manage the specific downstream envelope 3 2 below the physical 3 08. As explained below, the downstream components are typically With some data to the upstream components located above, there is a link in the display, φ, &amp; + »The medium bandwidth can be adopted by existing in a specific

階層中之一個頻宽分西 A 、刀配且-人为配該分配以用於下游元件間 之分配而被管理。於i 士、— 、/、有複數個下游元件之情況下,次分 麵 配典型地係牵涉到蔣八 — 、以刀配分割成為用於該些下游元件之 每一個的部分。 牛例而5 ’該文控制之位置頻寬管理器3 4可以呈 有一個對應於網路鍵路3 〇 2上之該可使用之頻寬之一個 分配:該可使用之頻寬可以根據指定網路鏈路3 〇 2之參 數之系統政策而建構’或者透過其他方法而被決定或者建 構。於該鏈路3 0 2上之該可使用之頻寬可以被該受控制 之位置頻寬管理器3 〇 4次分配成為一或多個代理器分西己春 ’其係根據位於該受控制之位置頻寬管理器3 〇 4之下方 之代理益電月a 2 2之數量而定。每一個代理器分配係代表 分配給個別代理器電腦之頻寬之數量。舉例而纟,假如丄 0 0個代理益電腦2 2係受到該受控制之位置頻寬管理器 3 0 4控制,則§亥又控制之位置頻寬管理器3 〇 4典型地 係將次分配可使用之鏈路頻寬成為用於個別之位於下方之 代理益電腦之1 0 〇個個別化之分配。該個別化之分配將 53 200304298 被提供至於每一個代理器電腦2 2處之個別代理器頻寬管 理器3 〇 6,以用於實施及進一步之次分配。One of the bands in the hierarchy is divided into A, A and B, and the allocation is artificially managed for allocation between downstream components. In the case where there are a plurality of downstream components, the sub-surface allocation typically involves Jiang Ba-, which is divided into parts for each of these downstream components with a knife. The position bandwidth manager 3 4 controlled by the article 5 can present an allocation corresponding to the available bandwidth on the network key 3 002: the available bandwidth can be specified according to the designation The system policy of the parameters of the network link 302 is constructed or determined or constructed by other methods. The available bandwidth on the link 302 can be allocated by the controlled location bandwidth manager 304 times to become one or more agents. Depending on the number of agents Yidianyue a 2 2 below the location bandwidth manager 3 04. Each agent allocation represents the amount of bandwidth allocated to individual agent computers. For example, if 0 0 agent computers 2 2 are controlled by the controlled position bandwidth manager 3 0 4, then the position bandwidth manager 3 0 4 controlled by § 20 is typically assigned twice. The available link bandwidth becomes 100 individualized allocations for the individual agent computers located below. The individualized allocation will be provided to the individual agent bandwidth manager 3 06 at each agent computer 22 for implementation and further sub-allocation.

類似地,於每一個代理器電腦處,該結合之代理器頻 見官理器3 0 6可以次分配其之代理器分配成為執行於該 代理器電腦上之每一個應用3 2 〇之個別化應用分配。一 個給定之應用分配係代表分配至該對應之應用之頻寬之數 1這些應用分配典型地係被提供至該個別之應用頻寬管 理叩3 0 8,以用於實施及進一步之次分配。最後,於每 一個應用3 2 0處,該結合之應用頻寬管理器3 〇 8係可 以夂刀配其之應用分配成為用於開放給該應用之該些封套 3 2 2之個別封套分配。該個別封套分配典型地係被提供 至該個別的封套頻寬管理器3 1 〇。Similarly, at each agent computer, the combined agent frequently sees that the agent 3 06 can assign its agent to become an individual 3 2 0 of each application running on the agent computer. Apply assignments. A given application allocation represents the number of bandwidth allocated to the corresponding application. 1 These application allocations are typically provided to the individual application bandwidth management unit 308 for implementation and further sub-allocations. Finally, at each application 320, the combined application bandwidth manager 308 series can be stabbed with its application allocation to become an individual envelope allocation for the envelopes 3 2 2 that are open to the application. The individual envelope allocation is typically provided to the individual envelope bandwidth manager 3 1 0.

典型地,至少某些頻寬管理器係被建構成傳通至上满 ,以便利上述之不同的次分配。事實上,資料可以由該封 套頻寬管理器3!0之每-群組向上游提供至其上方之库 用頻寬管理器3 0 8,而由該應用頻寬管理器3 &quot;之每 一個群組提供至其上方之該代理器頻寬管理器3 〇 6,且 由該代理器頻寬管理器3 〇 6之每一個群組提供至盆之上 方之該受控制之位置頻寬管理器3Q4。向上游提供之該 資料可以被使用於計算次分配,然後其係被送回至下游以 用於實施,及/或進一步之次分阶 ^ 人刀配。通常,係期望被傳送 回上游之資料係關於封套之活動,以有效率地調m 之分配,以由較不需要處取出頻寬,且提供至更需要處。 事實上,於不同之頻寬管理器之間之交互作用典型地 54 200304298 係被實施成有效率地於該些不同之頻寬消耗元件之間分配 網路頻寬。如上文所述,消耗元件可以包含代理器電腦2 2 ’執行於該些電腦上之應用3 2 〇,及開啟用於該些應 ’ 用之封套3 2 2。於此敘述之該些系統之一個可以有效率 地分配頻寬之方法係為藉由移動頻寬分配至高的優先權使 用’且將頻寬分配移離相對較低之優先權之使用。另一個 分配標準係可以被採用於牵涉到根據過去分配之消耗而提 供進一步之分配。舉例而言,假如過去之分配係僅部分被 消耗,或者有減少使用之趨勢,則至一個特定頻寬管理器 馨 之分配(例如由一個代理器頻寬管理器3 0 6至一個應用 頻寬官理器3 〇 8所提供之應用分配)可以被減少。 上述之父互作用係不需要於任何特定之次序下產生, 且可以週期性地或者非週期性地產生,及/或對於不同層 具有不同之速率。舉例而言,該受控制之位置頻寬管理器 3 0 4 了以於固疋期間,或者僅當於該網路内之一個改變 之條件被偵測出時’交出用於電腦2 2之代理器分配。應 用分配及封套分配可以週期性地向下游傳播,然而係於$ · 同之速率之下。於任何情況下,重複地及動態地更新該些 刀配及次分配通常係有利的,其將於下文作更詳細的敘述 〇 現在,用於一個代表性之封套的頻寬管理將參照第2 0囷而予以敘述,该第2 〇圖係顯示一個透過網路鏈路3 0 2而連接至其他電腦(未示出)之代理器計算裝置2 2 。計算裝置2 2係執行一個應用程式3 2 〇,該應用程式 55 200304298 :=H =路鏈路3 〇 2經由一個分層之協定堆疊( :、、 通’如同參照上文之範例的敘 叙組70可以被設置於應用代理益 ::間:r“於流控制可以被達成之= 吕之,如參照第6 ,7及 月確 地係設置於該協定堆疊㈣理㈣組7 0典型 一個封套物件作介面逯牡 且與 或者於該應用程式32:及:二:網路流通資料被截收, 之-個點處鉤住==Γ92之運輸層…之間 七入4 不於弟2 0圖之該代理器模組7 0可以 包含參照第9圖而予以舲、+、+甘υ 了 μ ’一個再導引器1 3 〇 f笛〇闽、 特別疋 理器模組截收或者釣二圖)可以被採用,以允許代 m收成者鉤住應用3 2 〇及網 之封套資料流。 J U Z之間 對於該顯示之代表性之封套而言,於應 及網路鏈路30?夕門^ ^ 0 2 4及接收控制部分? w |刀3 收控制部分3 2 6 ^ 6 ’該傳送控制部分3 2 4及接 .,〇 糸可以分別包含傳送佇列3 2 8及接妆 佇列3 3 0。流經兮楂、、,^ 0及接收 〇 〇 R ^ μ适控制部分3 2 4及接收控制部分 3 2 6之資料可以紐%、。 刀 _ 破監視且透過代理器模組7 0之該封套 頻寬管理器3 1 0而、〇 u , 了奮 s 5, . 1 文彳控制。如上所述,該封套頻寬管 里口 口 d 1 〇可以盘會Α 甯其理哭_/、 於代理器模組7 0内實施之上游頻 :A 不於第20圖中)交互作用。明確言之,封 套分配可以被提供至 封 寬管理器3 1 0師二’員寬管理器3 1 0,該封套頻 糸检制该傳送控制部分3 2 4及接收控制 56 200304298 部分3 2 6 ’以確保 ,該封套頻寬管理器 之活動)至不同的上 於便利進一步之分配 這些分配係被實施。此外’如圖所示 =1 〇可以提供反饋(例如關於封套 游頻寬官理器。此項反饋可以被使用 封套分配可以堳细以 寬管理器31〇。二地Γ定間隔被提供至該封㈣ 個期間(可以為個別的專”下,該分配典型地係於- ⑴的傳达及接收分配)為可以 複數個位元組之形式,B / 4、 饭得运之 及/或可以被接收之複收個位元紐Typically, at least some of the bandwidth managers are constructed to pass through to full, to facilitate the different sub-distributions described above. In fact, data can be provided upstream from each of the envelope bandwidth managers 3! 0 to the library bandwidth manager 3 0 8 above it, and by the application bandwidth manager 3 &quot; each A group is provided to the agent bandwidth manager 3 06 above it, and each group of the agent bandwidth manager 3 06 is provided to the controlled position bandwidth management above the basin器 3Q4. This information provided upstream can be used to calculate sub-distributions, which are then sent back downstream for implementation, and / or further sub-grading ^ man-to-know allocation. Generally, the data that is expected to be transmitted upstream is about the activity of the envelope to efficiently adjust the allocation of m to take out the bandwidth from where it is not needed and provide it to where it is needed more. In fact, the interaction between different bandwidth managers is typically implemented in 2003 2003298 to efficiently distribute network bandwidth among the different bandwidth consuming components. As mentioned above, the consumable component may include an agent computer 2 2 ′, an application 3 2 0 executed on the computers, and opening a cover 3 2 2 for the applications. One of the systems described here that can efficiently allocate bandwidth is the use of mobile bandwidth allocation to high priority use 'and the shift of bandwidth allocation away from relatively low priority use. Another allocation criterion can be adopted which involves providing further allocation based on the consumption of past allocations. For example, if the past allocation was only partially consumed, or there is a tendency to reduce usage, the allocation to a specific bandwidth manager (for example, from an agent bandwidth manager 306 to an application bandwidth The application allocation provided by the official server 308 can be reduced. The above-mentioned parent interactions need not be generated in any particular order, and can be generated periodically or aperiodically, and / or have different rates for different layers. For example, the controlled location bandwidth manager 3 0 4 was handed over to the computer 2 2 during the fixed period, or only when a changed condition in the network was detected. Agent assignment. Application allocation and envelope allocation can be propagated to downstream periodically, but under the same rate. In any case, it is often advantageous to update these allocations and sub-allocations repeatedly and dynamically, which will be described in more detail below. Now, bandwidth management for a representative envelope will be referred to in Section 2 In the description, the figure 20 shows an agent computing device 2 2 connected to another computer (not shown) via a network link 3 02. The computing device 2 2 executes an application program 3 2 0, the application program 55 200304298: = H = road link 3 〇2 is stacked via a layered protocol (: ,, and '' as described with reference to the example above) Group 70 can be set in the application agent. Benefit :: Interval: r "The flow control can be achieved = Lv Zhi, such as referring to the 6th, the 7th and the month is definitely set in the protocol stack management group 7 0 typical one The envelope object is used as an interface and is connected to or in the application 32: and: Second: the network circulation data is intercepted, which is hooked at one point == Γ92 in the transportation layer ... between 7 and 4 not less than 2 The agent module 7 of FIG. 0 may include 舲, +, and + gan with reference to FIG. 9 μ 'a re-guider 1 3 〇f COM, special processor module interception or Fishing two pictures) can be used to allow the generation of harvesters to hook the envelope data stream of application 3 2 0 and the net. For the representative envelope displayed between JUZ, the network link 30? Ximen ^ ^ 0 2 4 and receiving control section? W | knife 3 receiving control section 3 2 6 ^ 6 'The transmission control section 3 2 4 and connecting., 〇 It can include the transmission queue 3 2 8 and the makeup queue 3 3 0. The data flowing through Xiha,, ^ 0, and receiving 〇〇R ^ μ appropriate control section 3 2 4 and receiving control section 3 2 6 can New% .. knife _ broken monitoring and through the envelope bandwidth manager 3 1 0 of the agent module 70 and 0 u, fen s 5,. 1 text control. As mentioned above, the envelope bandwidth Guanlikou d 1 〇 can Panhui A Ning Qili crying _ /, the upstream frequency implemented in the agent module 70 (A is not in Figure 20) interaction. To be clear, envelope allocation can be provided to Envelope Manager 3 1 0 Division 2 'Member Width Manager 3 1 0, the envelope frequency controls the transmission control part 3 2 4 and the reception control 56 200304298 part 3 2 6' to ensure that the envelope bandwidth manager Activities) to further facilitate the further allocation of these allocations are implemented. In addition, 'as shown in the figure = 1 〇 can provide feedback (such as the envelope bandwidth controller. This feedback can be used envelope allocation can be detailed This interval is provided at a fixed interval of 31. Under the concept of "individual individual", the allocation is typically related to-the transmission and reception allocation of ⑴) is in the form of multiple bytes, B / 4, the success of the meal and / or can be received Bit New

形式。於此,月間,資料係傳送通過該傳送 4及接收控制部分326,且該封套頻寬管理器3form. Here, during the month, the data is transmitted through the transmission 4 and the reception control section 326, and the envelope bandwidth manager 3

:視=網路鏈路3〇2或者由網路鏈路3〇2接收而 /之貝料s °假設對於—給定期間之該分配係不超過,則 該封套頻寬管理器31〇可以僅被動地監視該流通資料: 然而、:—旦用於—特定期間之分配係被使用完,則進一步 之傳达及接收係被防止’直到獲得一個新的分配為止(例 如,於—個後續之期間)。如同所顯示,仵列328及3 3 〇可以被提供以保留溢流,直到該封套係以—個新的分 配填滿為丨’於該時點,該被彳宁列之資料可以被傳送及/ 或接收。t一個分配係不超過時,佇列3 2 8及3 3 〇典 !也係不被使用,使得傳送或者接收之資料係通過傳送控 P刀3 2 4及接收控制部分3 2 6,而不需要對資料仵 j於這些貫施方式下,佇列僅係當用於一給定期間之該 封套係超過時被觸發。 關衣於此所述之該代理器裝置,封套一詞應被廣泛地 57 200304298 認為意謂由該運輪協定層以上之應用(例如於第6,7, 、f 〇圖巾之層1 2 4 )所實施之網路對話或者連結。 4二之情況下,這些對話或者連結係特徵化為至少一 、二藉由°亥犯力以實施流控制。因此,應瞭解的是,該 、 打、、且係不文限於於該協定堆疊之該些較上層之内所 何-個特定之標準。事實上,於此所述之該些代 埋斋;[果、纟且可以έ士人 …百由不使用該廣泛流行之Winsock標準之 應用所實施之網路對話。: Depending on = network link 302 or received by network link 302. Assuming that for-given allocation in a given period does not exceed, the envelope bandwidth manager 31〇 can Only passively monitor the circulation information: However ,:-once used-the distribution for a certain period is used up, then further transmission and reception are prevented 'until a new distribution is obtained (for example, in a subsequent Period). As shown, queues 328 and 330 can be provided to retain the overflow until the envelope is filled with a new distribution as the point in time at which point the queued data can be transmitted and / Or receive. When an allocation is not exceeded, the queues 3 2 8 and 3 3 0 are not used, so that the data transmitted or received is transmitted through the transmission control P knife 3 2 4 and the reception control part 3 2 6 without In these implementations, the queue needs to be triggered only when the envelope is used for a given period. Regarding the agent device described herein, the term envelope should be widely regarded as 57 200304298, which means that it is intended to be used above the ship agreement layer (for example, in layers 6, 7, and f 〇 layer 1 2 4) Internet conversations or links implemented. In the case of the second, these dialogues or connections are characterized by at least one or two, and the flow control is implemented by the force of °°. Therefore, it should be understood that the,, and are not limited to any particular standard within the upper layers of the agreement stack. In fact, the generations described here are fast-food; [fruitful, savvy, and savvy ... one hundred Internet conversations implemented by applications that do not use the widely popular Winsock standard.

’另1乡照第2丄圖’示範之代理器電腦2 2係被顯; 二:丁應:3 2 〇a’ 3 2 0 b及 3 2 0。。應用 3 2 0 “ 木用°亥視1^封套(Wi_ck)標準且因而透過視窗封套應戶 1 ? 8及協定堆疊之較低層(例如,示為3 * 〇及3 4 , 之該些層)而與網路鏈路3 Q 2傳通。因此 ;〇…如圖所示相對於該應用128設置,以釣;; 、·同路通Λ,且實施於此所述之該監視及管理功能。 對比之下’應用3 2 0 b及3 2 0 c係不與該視窗•“‘Another Township Photo 2 丄 Picture’ The agent computer 2 2 is shown; 2: Ding Ying: 3 2 0a ’3 2 0 b and 3 2 0. . Apply the 3 2 0 "wooden 1 ° envelope (Wi_ck) standard and consequently apply the lower layers (eg, 3 * 〇 and 3 4), which are stacked through the window envelope to the user 1 to 8 ) And communicate with the network link 3 Q 2. Therefore; 〇 ... as shown in the figure relative to the application 128 settings to catch; Features. In contrast, 'Applications 3 2 0 b and 3 2 0 c are not related to this window •'

標準一起#用。 / 々# 用一個如此之應用之範例係為一個採用該尚Standard together # Use. / 々 # An example of using such an application is to adopt a

土本輸入輸出系統(NetBiQS)標準。對於這些非視窗I 心 ° 個替代之代理器模組7 〇 b係可以被去 供:類::模組7 〇a及先前敘述之代理器模組之實施令 上代理裔杈組7 0 b係能夠鉤住於該運輪層之上之網路f 活A,組係不需要視窗封套,雖然其於流控制可以被相 ^不同之參數可以被接取以加強監視及以政策為;| 之&amp;理之較面協定層係仍然為主動的。 58 200304298 返回頻寬管理之討論,許多不同之方法係可以被採用 ’以提供下游之頻寬次分配。這些方法中之許多方法係採 用一個優先權機制,其中,優先權係可以透過網路政策而 被指定。優先權係可以根據不同之參數而予以指定,包含 網際網路協定來源位址,網際網路協定目的地位址,來源 埠,目的地埠,協定,應用身份,使用者身份,裝置身份 ’使用者路由表(User Route List,URL),可取得之裝 置頻I 應用輪庵,祠服裔輪廊,閘道器身份,路由器身Native Input Output System (NetBiQS) standard. For these non-windows I alternative agent modules 7 0b can be provided for: category :: module 7 0a and the previously described implementation of the agent module 7 0 b The system can hook the network f and A above the transport layer. The system does not require a window envelope, although its flow control can be different. Different parameters can be accessed to strengthen monitoring and policy; The &amp; Management's comparative agreement layer is still active. 58 200304298 Returning to the discussion of bandwidth management, many different methods can be used to provide downstream bandwidth allocation. Many of these methods use a priority mechanism, where priority can be specified through network policies. Priority can be specified according to different parameters, including Internet Protocol source address, Internet protocol destination address, source port, destination port, protocol, application identity, user identity, device identity 'user Route list (User Route List, URL), available device frequency I application queue, temple server corridor, gateway identity, router body

伤 天中之時間,網路擁塞,網路負載,網路用戶數, 可取得之域頻寬及資源狀態。其他參數係可能的。如上文 所述,該所述之相對於該協定堆疊之代理器模組之位置係 允許接取卉多不同之參數。於如此變化中之條件下敘述頻 寬管理之能力係允許對於頻寬分配之增加的控制,且藉由 增加效率。 、於典型的實施中,上述之指定的優先權係可以被轉^ 成一個優先權水準或者根據該優先權水準而表示,該優^Injury time, network congestion, network load, number of network users, available domain bandwidth and resource status. Other parameters are possible. As mentioned above, the position of the agent module relative to the stack of the protocol allows access to many different parameters. The ability to describe bandwidth management under such changing conditions allows for increased control over bandwidth allocation, and by increasing efficiency. In a typical implementation, the above-specified priority can be converted to a priority level or expressed according to the priority level, the priority

權水準係特別用於—個給定之網4 “對話,,$者連結,言 如-個封套資料流。事實上,下文所述之許多次分配機, 系根據用於個別封套之封套優先權。於此所述之該以政負 為基楚之系統中,該封套優先權典型地係被建構成由諸女 上述=列之不同的參數所推導出之值。舉例而言,用於一 個給=之封套之該建構之優先權係可以由使用者身份、卫 、T之應用的形式及該被請求之資料之該來源位址等考 之組合所決定。 τ’ 59 200304298 再次參照第1 9圖,現在將敘述用於次分配頻寬之不 同之示範性方法。首先係為一個應用之次分配成為一或乡 · 個封套分配,如同可以由應用頻寬管理器3 〇 8所實施, “ 假設對於一個給定之應用3 2 〇具有k個封套3 2 2開啟 。對於一個給定之封套3而言(其中,3=1至1〇 ,一個 有效之封套優先權ESP ( s )係可以被計算如下: m 其中’ SP (S)係為用於該封套之該建構之優先權(例 ^ ^ ; cons.lasU(s) ^ ^ t 後之N個分配週期期間,由該封套所消耗之該頻寬; aHoOastJCs)係為在該最後之N個分配週期分配至該 封套之頻寬。&amp;外,該結果可以與一個方便之因子相乘, 以避免處理分數之數量。 J、後,用於一個給定封套之該封套分配sall〇c ( s ) 係可以被計算成·· SALLOC(s) = APALLOC ~^L· (2 ) lLESP{s) ▲其巾,apappocm系為正被該應用頻寬管理器3 〇 8於 。亥不同之封套中所分配之應用分配;1 Esp ( S)係為該封 套之該有效的優先權。因此,應瞭解的是,該分配係透過 該有效的封套優先權《一個加權平均所推導出。 60 200304298 因此,於上述範例中,封套分配將傾向於對於具有較 高優先權之封套係為較高,而對於消耗先前分配較大百分 比之封套為較高。於上述之範例中,計算將根據由複數個 過去之分配週期(N個週期) 一個單一週期之計算可以被使 週期之計算可以平滑轉變且穩 配的調整。典型地,上述之該 而來之消耗資料而定,雖然 用。於某些情況下,複數個 疋化於不同之封套之間之分 些叶异係根據由在下方之該 封套頻寬管理器3 1 〇所接收而來之頻寬消耗資料而 由位 於上方之δ亥應用頻寬管理器3 0 8所實施。 現在敘述代理器之該次分配成為一或多個應用分配, 如可以由該應用頻寬管理器3 0 8所實施’假設係具有]· 個應用3 2 〇係執行於一個給定之電腦2 2上。首先,一 個有效之應用優先權係可以對於每一個應用作計算。使用 上述之應用作為一個範例,該有效之應用優先權EApp係可 以被計算如下: EAPP = yS£^Jast ^N(s)x SP(s) r L 77-:~—-— x factor f o \ alloc last N(s) ^ 〇 ) 再次地,一個因子可以被採用以避免處理分數,或者 便利於處理。一個類似之計算係對於所有位於該代理器頻 寬管理器之下方的其他應用3 2 0實施。然後,類似於上 述之封套次分配,該個別的應用分配可以以一個加權平均 產生明確舌之’對於一個給定之應用ap (其中,ap = 1 至]·)而言’一個應用分配APALLOC ( ap)係可以被計算成 61 200304298 APALLOC(ap) = AGALLOC x ίΕΑΡΡ(αρ) ( 4 ) ap=] 其中,AGALLOC係為正被該代理器頻寬管理器3 〇 6 於該不同之應用中所分配之代理器分配;且EApp(ap)係 為該分配正被計算之該應用的該有效的優先權。典型地,' 上午之該些計算係根據由位於下方之應用頻寬管理器3 〇 8所接收之頻寬消耗資料而由該位於上方之代理器頻寬管 養 理器所實施。於上述之範例中,應用之分配將傾向於對於 具有較多個封套開啟之應用係為較高,而對於消耗先前封 套分配較大百分比之封套為較高。 現在敘述鏈路頻寬(例如,於網路鏈路3 〇 2上整體 可使用之頻寬)之该次分配成為一或多個代理器分配,如 可以由該受控制的位置頻寬管理器3 〇 4所實施,假設係 具有i個代理器電腦2 2係與網路鍵路3 〇 2互連。如同 上述之次分配,一個有效的優先權可以被計算,且然後,魯 頻二可以根據該有效優先權之一個加權平均而被分配。明 確口之使用上述之代理器作為一個範例,該有效的代理 器優先權EAGP可以藉由加她仞於丁 + 精由加t位於下方之有效的應用優先權 而被計算如下: ΕΑ〇Ρ^ ΣΕΑΡΡ(αρ) (The level of power is used in particular for a given web 4 "conversation, linking, or wording-an envelope data stream. In fact, many of the dispensers described below are based on envelope priority for individual envelopes In this system based on political load, the envelope priority is typically constructed to constitute a value derived from the different parameters of the above-mentioned women. For example, it is used for a The priority of the construction given to the envelope of = can be determined by the combination of user identity, health, application form of T, and the source address of the requested data. Τ '59 200304298 Again refer to the first Figure 9 will now describe an exemplary method for sub-allocation of bandwidth. First, sub-allocation for an application becomes one or all envelope allocations, as can be implemented by the application bandwidth manager 308. "Suppose for a given application 3 2 0 there are k envelopes 3 2 2 open. For a given envelope 3 (where 3 = 1 to 10), a valid envelope priority ESP (s) can be calculated as: m where 'SP (S) is the construct used for the envelope Priority (eg ^ ^; cons.lasU (s) ^ ^ t during the N allocation cycles, the bandwidth consumed by the envelope; aHoOastJCs) is allocated to the last N allocation cycles The bandwidth of the envelope. &Amp; The result can be multiplied by a convenient factor to avoid processing the number of fractions. J. Later, the envelope allocation for a given envelope, salloc (s) can be Calculated as ··· SALLOC (s) = APALLOC ~ ^ L · (2) lLESP {s) ▲ The towel, apappocm is currently being used by the application's bandwidth manager 308. Application assignments assigned in different envelopes; 1 Esp (S) is the effective priority of the envelope. Therefore, it should be understood that the allocation is derived from the effective envelope priority, a weighted average. 60 200304298 Therefore, in the above example, the envelope allocation will tend to be higher for envelope systems with higher priority and higher for envelopes that consume a larger percentage of the previous allocation. In the above example, the calculation will be based on a plurality of past allocation cycles (N cycles). A single cycle calculation can be used to make the calculation of the cycle smoothly and stably adjusted. Typically, the above-mentioned consumption data depends on, although it is used. In some cases, a plurality of leaves different between different envelopes are based on the bandwidth consumption data received by the envelope bandwidth manager 3 1 0 below. Delta Hai implemented by the bandwidth manager 308. Now it is described that the allocation of the agent becomes one or more application allocations, if it can be implemented by the application's bandwidth manager 3 0 'assuming it has] · applications 3 2 0 are executed on a given computer 2 2 on. First, a valid application priority can be calculated for each application. Using the above application as an example, the effective application priority EApp can be calculated as follows: EAPP = yS £ ^ Jast ^ N (s) x SP (s) r L 77-: ~ —-— x factor fo \ alloc last N (s) ^ 〇) Again, a factor can be used to avoid processing scores, or to facilitate processing. A similar calculation is performed for all other applications 3 2 0 located below the agent's bandwidth manager. Then, similar to the envelope sub-assignment described above, the individual application allocation can produce a clear tongue with a weighted average of 'for a given application ap (where ap = 1 to] ·)' an application allocation APALLOC (ap ) Can be calculated as 61 200304298 APALLOC (ap) = AGALLOC x ίΕΑΡΡ (αρ) (4) ap =] where AGALLOC is being allocated by the agent's bandwidth manager 3 〇6 in this different application And the EApp (ap) is the effective priority of the application for which the allocation is being calculated. Typically, these calculations in the morning are performed by the agent bandwidth management manager located above based on the bandwidth consumption data received by the application bandwidth manager 308 located below. In the above example, the allocation of applications will tend to be higher for applications with more envelopes open, and higher for envelopes that consume a larger percentage of previous envelope allocations. Now the description of the link bandwidth (for example, the overall bandwidth available on the network link 302) becomes one or more agent allocations, such as the controlled location bandwidth manager The implementation of 3 04 is assumed to have i agent computers 2 2 interconnected with the network key 3 02. As with the above secondary allocation, a valid priority can be calculated, and then, Lupin II can be allocated based on a weighted average of the valid priorities. The explicit agent uses the above-mentioned agent as an example. The effective agent priority EAGP can be calculated as follows by adding her effective application priority to Ding + Jingyou plus t below: ΕΑ〇Ρ ^ ΣΕΑΡΡ (αρ) (

ap^\ \ U J 62 200304298 一個類似之計算可以對於所有位於該受控制的位置頻 寬官理器3 0 4之下方之其他代理器電腦實施,以獲得所 :該有效之代理器優先權。於某些情況下,係期望以該&amp; · 刚之值君榷該最近之被計算之值,以獲得該有效之優先權 ’以平滑化於所有該些代理器電腦之間之調整及頻寬再分 配。於某些貫施方式中,舉例而言,已經證明藉由混合該 新:值(由上述方程式推導出)及於一個6 〇 — 4 〇比率 之最近之值以計算該有效之代理器優先權係為有利的。任 何其他期望之加權係可以被採用,及/或其他方法係可以 # 被使用於平滑化分配之轉變。於任何情況下,對於該代理 器電腦之任何次分配係可以以一個加權平均而實施: AGALLOC(ag) = BWCLx ^^GP(ag) Y,EAGP{ag) ( 6 ) %=ιap ^ \ \ U J 62 200304298 A similar calculation can be implemented for all other agent computers located below the controlled location bandwidth manager 3 0 4 to obtain the priority of the valid agent. In some cases, it is expected that the &amp; · Gang value will be used to judge the most recently calculated value to obtain the valid priority 'to smooth the adjustment and frequency between all the agent computers. Wide redistribution. In some implementations, for example, it has been proven to calculate the effective agent priority by mixing the new: value (derived from the above equation) and the most recent value at a 60-4.0 ratio System is advantageous. Any other desired weighting system can be used, and / or other methods can be used to smooth the transition of allocations. In any case, any allocation to the agent computer can be implemented with a weighted average: AGALLOC (ag) = BWCLx ^^ GP (ag) Y, EAGP {ag) (6)% = ι

其中,AGALLOC ( ag )係為對於一個給定之代理器電 吨Ug= 1至i)之該代理器分配;嶋係為於所有該 代理益電腦之間之將被分配之可使用頻寬;且E脱(叫 係為對於該給定之代理m腦之财效的代理器優先權 於上述之範例中’個別之封套之活動典型地係傳送 上游(例如,由—個封套頻寬管理器至-個位於上方之 用頻寬管理器,而至_個位於上方之代理器頻寬管理器 且至一個位於上方之受控制的位置頻寬管理器),且係 整個系統中具有一個於進-步分配及次分配之效應。於 個特定的封套處之消耗可以影響對於該封套及在該相同 63 200304298 用上之其他封套之進一步的分配。此外,因為該消耗資料 係傳通至上游且被使用於其他分配及次分配,所以該相同 之封套係有可能影響於該系統内之所有封套、應用及代理 器電腦之進一步的分配。於某些實施方式+,該反饋之效 應係能夠大幅增加頻寬管理之效率。Among them, AGALLOC (ag) is the agent allocation for a given agent electricity ton Ug = 1 to i); it is the available bandwidth to be allocated among all the agent computers; and E (referred to as the agent for the financial benefit of the given agent m brain priority in the above example 'separate envelope activity is typically transmitted upstream (for example, from an envelope bandwidth manager to- Used bandwidth manager at the top, to _ agent bandwidth manager at the top and to a controlled position bandwidth manager at the top), and there is one in-step in the entire system Distribution and sub-distribution effects. Consumption at a particular envelope can affect the further distribution of the envelope and other envelopes used in the same 63 200304298. In addition, because the consumption data is passed upstream and used In other distributions and sub-distributions, the same envelope may affect the further allocation of all envelopes, applications and agent computers in the system. In some embodiments +, the effect of the feedback System can significantly increase the efficiency of bandwidth management.

熟習本項技術者將可以瞭解,分配及次分配係可以分 別對於傳送之資料及接收之資料實施。此外,該向上游之 反饋及向下游之反饋可以於任何期望之頻率下或者於不固 定之間隔產生。於代理器電腦2 2之内,次分配典型地 係於固定之間隔下被實施,㈣係期望於_個比該些應用 分配為大之頻率下再計算封套分配。作為一個範例,代理 為分配可以每2秒更新-次,應用分係為每半秒更新一 次,且封套分配係為每1 〇 〇毫秒更新一次。 田所有牵涉到之封套係為開啟、具有非零分配及係至 少有些主動(例如,消耗某些頻寬)時,上述之示範性方 程式主要係於穩定狀態之操作下使用。典型地,某些提供Those familiar with this technology will understand that distribution and sub-distribution can be implemented for transmitted data and received data, respectively. In addition, the upstream and downstream feedback can be generated at any desired frequency or at irregular intervals. Within the agent computer 22, the sub-allocation is typically implemented at a fixed interval, that is, it is expected that the envelope allocation will be calculated at a frequency greater than the application allocation. As an example, the agent can be updated every 2 seconds for allocation, the application system is updated every half a second, and the envelope allocation system is updated every 1000 milliseconds. When all the envelopes involved in Tian are open, have a non-zero allocation, and are at least somewhat active (for example, consume certain bandwidth), the above exemplary equations are mainly used under steady state operation. Typically, some provide

及修改係於起始條件下被實施,及用於封套係為閒置及/ 或具有為可忽略或者零之封套分配之條件下被實施。舉例 而έ,於一個代理器電腦可能已經開始不正與該網路通訊 之應用之情況下。於此情況下,該有效之應用優先權將為 全部為零,因為係完全無封套活動,導致方程式(4 )之 一個未定義之結果。一個直接之平均可以被使用於解決此 十月況,於該情況下,可使用之頻寬係於該些應用之中平均 地分配。平均地分配亦可以被使用於方程式(2 )及(6 64 304298 )中之未定義之結果之情況下。 他頻寬二理Γ方私式(1) ’該應用頻寬管理器及/或其 ,以ίΓΓ以被建構成過度提供頻寬。此可以被實施 先權,:因Γ置之封套係維護一個為零之有效的封套優 d 不獲得正面之分配(例如,透過應用方程式 〔2 )之加權平泊、 ^ 分配至正變成主動之閒亦可以被使用於提供内部 —個非零有效的封Jr 以允許該些㈣封套達成 , , D ,叙先權,且藉此獲得正被該上方之應 ,員寬官理器3 〇 8所次分 心 刀配之邊應用分配之一個百分比。 不論採用之特定的方法兔 準下奸播一加—法為何,頻寬可以於一個特定水 給疋元件或者位於該元件 狀態而於實體或去分放 下方之兀件之封套 ^ / 牛之間被分配。封套狀態可以包含於 個給定控制模組、一個給定 3 用之域之内開啟之封套數量Ύ置或者用於-給定應 )上述之方程式(3)及(4 )係k供部分根據於每一 之間八阶相皆 個應用中開啟之封套數量於應用 此方采4 '之一個乾例。所有其他事項係為相同,於這 些方程式中,一個且右 。々日1 J爪、 高之右m &amp; 〃乂于套開啟之應用將具有一個較 呵之有效的優先權,且將接 接收4刀配頻寬之較大百分比。 文,應瞭解的是,封套狀能__ 指定之佴^ 釕套狀怨亦可以包含封套之被 疋之4先杻。如上文所4从 個斤寸順被指定之優先權可以由一 成乎…限制之參數陣列推導出, 被讯金,χ 且可以透過網路政策而 被叹疋。上述之該些方程 被每^ u义 ,、χ據封套之優先權而提供正 被貝施之數個分配及次分配之 ,_ .g, e , y ^ ^ J所有其他事項係相同 個/、有—個較咼封套 &amp;无*之封套或者一個具有較高 65 200304298 優先權封套之應用或者電腦將於數個上述範例中接收較大 之分配。 封套狀態亦可以包含過去分配之消耗,如同應由上述 之示範性方程式所瞭解。該些上述範例係提供數個範例, 其係由消耗過去較少的分配之部分的封套、應用及電腦移 動颈寬刀配,此係相對於消耗過去較多的分配之部分的封 套、應用及電腦而言。And modifications are implemented under initial conditions, and are implemented under conditions where the envelopes are idle and / or have envelope assignments that are negligible or zero. For example, in the case where an agent computer may have started to communicate with the network application. In this case, the valid application priority will be all zeros, because there is no envelope activity at all, resulting in an undefined result of equation (4). A direct average can be used to resolve this October situation, in which case the available bandwidth is evenly distributed among the applications. Even distribution can also be used in the case of undefined results in equations (2) and (6 64 304298). The other bandwidth is Γ square private type (1) ′ The application bandwidth manager and / or it is constructed with ΓΓ to provide excessive bandwidth. This can be implemented in advance: because the envelope set by Γ maintains a valid envelope of zero, d does not get a positive allocation (for example, by applying the weighted berber of equation [2), ^ allocation to the becoming active Leisure can also be used to provide an internal non-zero valid envelope Jr to allow these enveloping envelopes to achieve,, D, and the right to claim, and thereby obtain the response that is being addressed by the above. A percentage of the allocation is applied to the edge of the distraction blade. Regardless of the specific method used, the rabbits can broadcast one plus-the method, the bandwidth can be between a specific water supply element or the envelope of the element that is located in the state of the element or under the physical distribution ^ / 牛Be assigned. The envelope state can be included in a given control module, a given number of opened envelopes within a given range, or used for-given response) The above equations (3) and (4) are partly based on k The number of envelopes opened in each of the eighth-order applications is a dry case of 4 '. All other matters are the same, in these equations, one and right. On the next day, 1 J-claw, high right m &amp; open application will have a more effective priority, and will receive a larger percentage of the 4-band configuration bandwidth. In the text, it should be understood that the envelope-like energy __ specified by ^ ruthenium-like resentment can also include the envelope's quilt 杻 4 first. As mentioned above, the priority assigned from the Jinshunshun can be deduced from an array of parameters that are almost ... restricted, and can be sighed by the Internet policy. Each of the above equations is defined according to the priority of the envelope, and χ provides the number of distributions and sub-distributions that are being applied, according to the priority of the envelope. All other matters are the same. Yes, an application with a higher envelope &amp; no * or an application or computer with a higher priority of 65 200304298 will receive a larger allocation in several of the above examples. The envelope state can also include the consumption of past allocations, as should be understood from the exemplary equations described above. The above examples provide several examples, which are configured by the envelope, the application and the computer mobile neck wide knife that consume the less allocated portion in the past, which are relative to the envelope, the application and In terms of computers.

上述之不範性系統及方法之實施係致能頻寬資源被&amp; :至較冋之優先權或者重要之工作。頻寬可以由較低優$ 雈之使用及/或消耗與相對物相較之相對閒置之實體處禾 出。上述之不同實施例係可以被實施,以提供—個更粗味 或者更精細之於該糸缔肉_ 4主—-π 瓦及糸統内特疋7G件之頻寬使用之控制# 1特別是,上述之頻寬管理11機射以被建構成㈣ 至:由-個應用所實施之複數個對話之封套及/或交“ 準/刀配。舉例而言,一個給 ^ ^ ^ 、疋之應用可以貫施複數個具有 改變之優先權水準之功能。上The implementation of the above-mentioned anomalous system and method is to enable the bandwidth resources to be &amp; to a higher priority or important work. The bandwidth can be used by a relatively low cost entity and / or consumed by a relatively idle entity compared to its counterpart. The different embodiments described above can be implemented to provide a coarser or finer meat to the 糸 associated meat _ 4 main-π watts and the control of the bandwidth of the 7G pieces in the system # 1 special Yes, the above-mentioned bandwidth management 11 machine shots are constructed to constitute: to: the envelopes and / or cross-protocols of multiple dialogs implemented by an application. For example, one gives ^ ^ ^, 疋The application can implement multiple functions with changing priority levels.

^^^, 把上述之增加的度量係允許系統 之#作者指定相對之頻寬優 之…I 頻覓优先權至由-個給定應用所實施 I不同工作。 對於頻寬使用之精細控制可間由於封套優先權已^^^, The above-mentioned increased metric allows the authors of the system to specify the relative bandwidth preferences ... I prioritize the work to be performed by a given application. Fine-grained control over bandwidth usage is possible due to envelope priority

被指定之後提供封套優先權’ 、!·、 $, ^ 〜&amp;叹而獲得。如上文J ^,、套優先權(例如於方程式( N 1 ^及C 3 )中之封; 叙先榷)典型地係當封套係 ^ 定,日… 茨相關之電腦上開啟時被才 出。雖铁± 仃不网之政策參數推笔 封套㈣啟時該㈣套優先權以維持靜態 66 200304298 的’些重要任務之網路工作係正被該封套實施時,肖 . 、DD模、、且可以替代地被建構成動態地改變該封套優先權 二延些重要任務之工作可以使用任何期望之政策參數之组 . ^而透過上述之該些政策機制予以定義。於谓測一個預先 疋義之工作時’用於該封套之該被指定之優先權係被修改 ^如’藉由以-個較高優先權否決該被指定之值)。該 ^改”型地係被採用,以確保—個期望之服務或者資源( 例如-個期望之分配頻寬)之水準對於該預定之工作而言 係可取仔。或者,該預先定義之工作可以為一個較低優% φ 榣之工作,使得該封套優先權▼以被動態地降級,以確保 該頻寬可以被更重要之工作使用。任何上述之實施例或者 方法實施可以被改變,以提供優先權之如此之動態修改。 方;忒父易水準下之該度量控制(例如於此所述之該代 理器模組之實施例)係致能該系統偵測重要的交易之開始 · 。於偵測出如此之-個交易時’該系統係能夠透過一個上 游疋件之鏈結而與傳通,以確保保留足夠量之頻寬,以於 一可接受之時間内完成該交易。舉例而言,一個封套優先 _ 權之動態增加典型地將導致不僅該封套而且與該封套相關 之應用以及該應用係正於其上執行(例如,透過上述之示 範丨生方知式之應用)之該計算裳置之增加的分配。或者對 於低優先權之交易而言,頻寬可以動態地減少,其亦可以 傳通向上游以影響於不同層處之分配。 舉例而言,上述之示範性系統可以被建構成使得重要 任務之頻寬優先權係僅被指定至由一個給定網路伺服器應 67 200304298 用請求而來之資料 策係能夠指定心之—特定部分。於此範例中,該網路政 接取-個特定/於—個客戶電腦上之-個劉覽器係企圖 的資料係於—個:頁,封套優先權係被㈣,以確保重要 ,不重要的圖形Π服務水準下被提供。其他資料(例如 ^ . 9 貝Λ)係能夠被指定較低之優先權。更特 疋的疋,於通當始 入何 ,.吊知用之協定中,將一個單一網頁載入可能 晕涉到數個由—柄分^ 4 ^ 客劉覽器所發出之“取得,,命令,以 ^ 、、之所有貧料。於此所述之該代理器模組係可以 以個敘,該代理器模組係監視其之相關的電腦之政策而 ,構’以,找搜尋該網頁上之資料的預先定義之高優先權 Ρ刀之取得命令。於偵側出如此之一個取得命令時, 4封套水準優先權將對於該網頁資料之該部分作動態調整。 另一個顯示增加之量度之優點的範例係為使用多媒體 應用以傳送聲音、影訊及其他資料於一個廣域網路上。於 網路擁塞係高之情況下,其典型地係期望指定一個較高之 優先權至該聲音資料流。該被敘述之系統之該增加的量度 係允許該優先權通過一個適當網路政策之應用,且破保該 視訊流係非以一實質方式不利地影響該聲音資料之傳送。 於此所述之該些系統係可以進一步設有一個分層之通 訊架構,以便利元件之間之通訊。典型的實施方式係牽涉 到使用一個通訊貯儲器,以表現一個通訊分離層至不同的 通訊元件。對於一個給定之通訊元件而言,該分離層係結 構上建構成隱藏該些通訊機構之細節及/或其他通訊元件 之位置。此係允許該些元件對於所使用之在下方的運輸機 68 200304298 構而言係透明的。該運輸機構能夠為傳輪控制協定,使用 者貪料間協定或者任何其他運輸協定。 巧運輸協定係能夠 以一個新的協定取代,而不影響該些元件及其之操作。 該些元件係藉由在該元件介面“傳送物件,,而彼 訊。該通訊層可以轉變這些物件成為二 •欠 疋饥貝科,使該些After being designated, provide envelope priority ’,! ·, $, ^ ~ && sigh. As in the above J ^, sleeve priority (such as the envelopes in the equations (N1 ^ and C3); narrative presumption) is typically issued only when the envelope is determined, and the date is opened on the relevant computer. . Although the policy parameters of the iron ± 仃 not network push pen cover are activated when the cover is opened to maintain static 66 200304298, some important tasks of the network work are being implemented by the cover, Xiao., DD mode, and Instead, it can be constructed to dynamically change the priority of the envelope. The task of extending some important tasks can use any desired set of policy parameters. ^ And it is defined through the above-mentioned policy mechanisms. In testing a pre-defined work, the designated priority used for the envelope is modified ^ such as by vetoing the designated value with a higher priority). The “modified” land is adopted to ensure that the level of a desired service or resource (for example, a desired allocated bandwidth) is desirable for the scheduled work. Alternatively, the predefined work may be Work for a lower priority% φ 榣, so that the envelope priority ▼ is dynamically downgraded to ensure that the bandwidth can be used by more important work. Any of the above embodiments or method implementations can be changed to provide Such a dynamic modification of priority. The measurement control (such as the embodiment of the agent module described herein) under the uncle's easy level is to enable the system to detect the beginning of important transactions. When such a transaction is detected, 'the system is able to communicate with the link of an upstream file to ensure that a sufficient amount of bandwidth is retained to complete the transaction within an acceptable time. For example, In other words, a dynamic increase in envelop priority will typically result in not only the envelop but also applications related to the envelop and the applications being executed thereon (for example, through the demonstration above). The application of the well-known formula) is used to calculate the increased allocation. Or, for low-priority transactions, the bandwidth can be dynamically reduced, and it can also be passed upstream to affect the allocation at different levels. For example In other words, the above-mentioned exemplary system can be constructed so that the bandwidth priority of important tasks is only assigned to a data system that is requested by a given web server in response to a request. In this example, the network policy access to a specific / on a customer's computer-a device that Liu Lan attempted to belong to-a: page, the envelope priority is blocked, to ensure that it is important, Unimportant graphics are provided at a service level. Other materials (such as ^. 9 贝 Λ) can be assigned a lower priority. More specific information, where to enter in Tongdang, a protocol for public awareness. In loading a single web page, it may involve several "acquisition," orders issued by the guest browser ^ 4 ^, and all the information that ^ ,, and so on. The agent module described herein can be described as follows. The agent module is based on the policy of monitoring its related computers, and is configured to find the predefined high priority of searching the information on the webpage. Order of obtaining P knife. When such an acquisition order is issued by the detective side, the 4-pack level priority will be dynamically adjusted for that part of the webpage data. Another example showing the benefits of increased metrics is the use of multimedia applications to send sound, video, and other data over a wide area network. In the case of high network congestion, it is typically expected to assign a higher priority to the audio data stream. The increased measure of the narrated system allows the priority to be applied through an appropriate network policy and guarantees that the video stream does not adversely affect the transmission of the audio data in a substantial manner. The systems described herein may further be provided with a layered communication architecture to facilitate communication between components. A typical implementation involves the use of a communication reservoir to represent a communication separation layer to different communication elements. For a given communication element, the separation layer is structured to hide the details of the communication mechanisms and / or the location of other communication elements. This system allows these components to be transparent to the transport structure used below. The transport agency can be a transfer control agreement, a user agreement, or any other transport agreement. The transport agreement can be replaced by a new agreement without affecting the components and their operation. The components are "transmitted objects, and other information" in the component interface. The communication layer can transform these objects into two

竭列化至皿格式,提供I缩及/或編密將透過任; 媒體而傳送之該資訊。這些操作典型地係被實施,使得其 對於該些通訊元件係透明的。t可應科,該些通訊層: 透過多X數個通訊流成為—個單—連結而增加網路效率\ 雖然本發明之實施例及方法之實施方式係已經予以特 別顯不及敘述’然而’ m項技術者將可以瞭解,於不 偏離定義於後附申請專利範圍中之該精神及範疇之下,呼 夕k化係可以被完成。該些敘述應該被瞭解為包含於此所 述之所有新穎及非顯而易知之元件組合。且於本案中之申 明專利範圍係呈現為任何新穎的及非顯而易知的元件之組 合。於申請專利範圍敘述“ 一個,,或者“一個第一,,元件 或者其均等物之情況下,如此之申請專利範圍係應被瞭解 為包含一或多個如此之元件之結合,而非請求或者排除兩 個或者更多個如此之元件。 圖式簡單說明 第1圖係為該開放系統互連及傳輸控制協定/ 路協定模型之概念圖示; 第2圖係為於此敘述之軟體、系統及方法可以被採用 於其中之分散式網路系統之圖; 69 200304298 第3圖係為可以採用於第2圖之該分散式網路中之一 個計算裝置之示意圖; 一 第4圖係為一個顯示可以被使用於在一個諸如示於第 2圖中之分散式網路中之資源之示範性代理器模組 模組之方塊圖; 、 制 ^笫5圖係為一個顯示可以採用於結合所敘述之軟體 二、及方去之不同的示範性元件之方塊圖,包含兩個代 器模組,一個控制模組及一個結構設備;The list is exhausted to a format that provides information that will be transmitted and / or edited through any media. These operations are typically performed so that they are transparent to the communication elements. You can respond to these communication layers: increase the network efficiency through multiple × several communication streams to become a single link. Although the implementation of the embodiments and methods of the present invention has been particularly indescribable, 'However' Those skilled in the art of m will understand that, without departing from the spirit and scope defined in the scope of the appended patent application, Huxi Chemical Technology can be completed. These narratives should be understood to include all novel and non-obvious combinations of elements described herein. And the scope of the claimed patent in this case is presented as any combination of novel and non-obvious components. Where the scope of a patent application states "a ,, or" a first, element, or equivalent thereof, such a patent scope should be understood to include a combination of one or more such elements, rather than a request or Exclude two or more such elements. Brief Description of the Drawings Figure 1 is a conceptual diagram of the open system interconnection and transmission control protocol / route protocol model; Figure 2 is a distributed network in which software, systems, and methods described herein can be used Diagram of the road system; 69 200304298 Figure 3 is a schematic diagram of a computing device that can be used in the decentralized network of Figure 2; Figure 4 is a display that can be used in a Figure 2 is a block diagram of an exemplary agent module module of a decentralized network resource; Figure 5 is a display showing the different software that can be used in conjunction with the described software, Block diagram of exemplary components, including two generation modules, a control module and a structural device;

第6圖係為一個顯示關於一個計算裝置之分層協定 疊之=個代理器模組之一個示範性配置之方塊圖;曰疋 .第7圖係、為一個顯示關於一個計算裝置之分層協定 豐之:個代理器模組之另-個示範性配置之方塊圖; .第8圖係為—個顯示關於一個計算裝置之分層協定 豐之二個代理器模組之又—個示範性配置之方塊圖; 弟9圖係為—個顯示—個代理器模組實施例之示範, 疋件部分之方塊圖; 個控制模組之實施例之 一種用於在複數個電腦 示範 中分Figure 6 is a block diagram showing an exemplary configuration of a layered protocol stack of a computing device = an agent module; 疋. Figure 7 is a layered display of a computing device Agreement: a block diagram of another exemplary configuration of an agent module; Figure 8 is a demonstration of two of the agent modules of a layered agreement about a computing device A block diagram of the configuration; Figure 9 is a demonstration of an embodiment of the agent module, a block diagram of the file part; an embodiment of the control module is used to divide among multiple computer demonstrations.

第1 0圖係為一個顯示一 性元件部分的方塊圖; 第1 1 A圖係為一個顯示 配頻寬之方法之流程圖; 一種用於在複數個電腦中 第1 1 B圖係為一個顯示另 分配頻寬之方法之流程圖; 於在複數個電腦中 第1 1C圖係為一個顯示又一種用 分配頻寬之方法之流程圖; 70 200304298 第1 ID圖係為一個顯示又另一種用於在複數個電腦 中分配頻寬之方法之流程圖; 第1 2圖係為一個顯不一種用於監視網路資源之狀態 的方法之流程圖; ~ 第1 3圖係為一個可以採用與於此所敘述之軟體、系 統及方法相連結之結構設備之主結構隔間的圖; 第1 4圖係為示於第1 3圖之該結構設備之另一個結 構隔間之圖; ° 第1 5圖係為示於第1 3圖之該結構設備之又另一個 結構隔間之圖; 第1 6圖係為示於第1 3圖之該結構設備之又另一個 結構隔間之圖; 第17圖係示意地顯示可以被採用與於此所述之該管 理軟體、系統及方法連結之—個多層控制結構; 第1 8圖係顯示一個示範性之網路結構,其係允許網 路政策之中央化的定義,且傳送該些政策至適當的分散位 置; 第1 9圖係顯示一個用於透過個別頻寬消耗元件之頻 寬使用而提供粗略㈣之示範性的多層系統及方法; 第2 0圖係顯示載有建構成管理一個個別應用封套或 者交易之頻寬消耗的代理軟體模組之一個實施例的示範性 計算裝置;及 第2 1圖係顯示一個载有一個代理器模組之替化實施 例之不範/·生计异裝置’該代理器模組係建構成監視及管理 71 200304298 執行於該計算裝置上之應用及由該些執行於該計算裝置上 之應用而來之網路通訊資料。 〔元件符號說明〕 10 分散式網路 12 區域網路 14 遠距網路 16 公共網路 1 8 路由器Fig. 10 is a block diagram showing a part of a sexual component; Fig. 1 A is a flowchart showing a method of displaying a bandwidth; A picture used in a plurality of computers is a 1 B Flow chart showing the method of assigning another bandwidth; Figure 11C in multiple computers is a flow chart showing another method of using bandwidth allocation; 70 200304298 The first ID picture is one display and another A flowchart of a method for allocating bandwidth among multiple computers; Figure 12 is a flowchart showing a method for monitoring the status of network resources; ~ Figure 13 is a flowchart that can be used Diagram of the main structural compartment of the structural equipment linked to the software, systems and methods described here; Figure 14 is a diagram of another structural compartment of the structural equipment shown in Figure 13; ° Fig. 15 is a diagram of another structural compartment of the structural equipment shown in Fig. 13; Fig. 16 is a diagram of another structural compartment of the structural equipment shown in Fig. 13 Figure 17 is a schematic illustration of the tube that can be used with the tube described herein. Management software, systems, and methods—a multi-layered control structure; Figure 18 shows an exemplary network structure that allows a centralized definition of network policies and transmits those policies to the appropriate decentralized locations. Figure 19 shows an exemplary multi-layer system and method for providing a rough idea through the use of bandwidth by individual bandwidth consuming components. Figure 20 shows a package that contains the components to manage an individual application envelope or transaction. An exemplary computing device of an embodiment of an agent software module that consumes bandwidth; and FIG. 21 shows an example of an alternative / livelihood device carrying an alternative embodiment of the agent module. The agent The device module is constructed to monitor and manage 71 200304298 applications executed on the computing device and network communication data from the applications executed on the computing device. 〔Description of component symbols〕 10 Distributed network 12 Local network 14 Long-distance network 16 Public network 1 8 Router

2 0 伺服器 2 2 客戶電腦 2 4 網路鏈路 4 0 電腦系統 4 2 處理器 4 4 匯流排 4 6 記憶體 4 7 隨機存取記憶體元件2 0 server 2 2 client computer 2 4 network link 4 0 computer system 4 2 processor 4 4 bus 4 6 memory 4 7 random access memory components

4 8 唯讀記憶體及/或其他靜態儲存媒體 4 9 基本輸入/輸出系統 5 0 資料儲存裝置 5 2 網路介面 5 4 顯示裝置控制器 5 6 輸入裝置 7 0 代理器 7 2 控制點 72 200304298 7 4 分散式網路 7 6 域 9 0 網路鍵結 9 2 通訊協定堆豐 9 8 應用程式 106 結構設備 12 2 應用程式 124 運輸層4 8 Read-only memory and / or other static storage media 4 9 Basic input / output system 5 0 Data storage device 5 2 Network interface 5 4 Display device controller 5 6 Input device 7 0 Agent 7 2 Control point 72 200304298 7 4 Decentralized Network 7 6 Domain 9 0 Network Bonding 9 2 Protocol Stack 9 8 Application 106 Structural Device 12 2 Application 124 Transport Layer

128 應用程式介面 13 0 再導引器模組 132 流通資料控制模組 13 2b 接收佇列 13 4 管理器模組 13 6 區域名稱系統伺服器模組 13 8 彈出應用模組 14 0 訊息中間模組128 Application program interface 13 0 Redirector module 132 Circulation data control module 13 2b Receive queue 13 4 Manager module 13 6 Area name system server module 13 8 Pop-up application module 14 0 Message middle module

14 2 系統服務模組 14 4 彈出應用 16 0 流通貢料模組 16 2 伺服器輪廓模組 16 4 區域名稱系統伺服器輪廓模組 16 6 閘道器輪廓模組 16 8 管理器模組 17 0 訊息中間模組 73 200304298 1 7 2 彈出應用介 面 1 7 4 彈出應用 1 8 8 主要結構螢 幕 1 9 0 螢幕框 2 0 0 中央化之資 料 中 心 2 0 2 網路 2 0 4 企業政策伺 服 器 2 0 6 受控制之位 置 政 策伺服器 2 0 8 分支辦公室 3 0 0 系統 3 0 2 網路鏈路 3 0 4 受控制之位 置 頻 寬管理器 3 0 6 代理器頻寬 管 理 器 3 0 8 應用頻寬管 理 器 3 1 0 封套頻寬管 理 器 3 2 0 應用 3 2 2 封套 3 2 4 傳送控制部 分 3 2 6 接收控制部 分 3 2 8 傳送佇列 3 3 0 接收彳宁列 3 4 0 運輸層 3 4 2 層14 2 System service module 14 4 Pop-up application 16 0 Circulation material module 16 2 Server profile module 16 4 Area name system server profile module 16 6 Gateway profile module 16 8 Manager module 17 0 Message middle module 73 200304298 1 7 2 Pop-up application interface 1 7 4 Pop-up application 1 8 8 Main structure screen 1 9 0 Screen frame 2 0 0 Centralized data center 2 0 2 Network 2 0 4 Enterprise policy server 2 0 6 Controlled Location Policy Server 2 0 8 Branch Office 3 0 0 System 3 0 2 Network Link 3 0 4 Controlled Location Bandwidth Manager 3 0 6 Agent Bandwidth Manager 3 0 8 Application Bandwidth Manager 3 1 0 Envelope Bandwidth Manager 3 2 0 Application 3 2 2 Envelope 3 2 4 Transmission Control Section 3 2 6 Reception Control Section 3 2 8 Transmission Queue 3 3 0 Reception Queue 3 4 0 Transport Layer 3 4 2 layer

7474

Claims (1)

^UUJU4298 拾、申請專利範圍: ·―種用於在-個網路鏈路上動態地分配頻寬之系 X該網路鏈路係與複數個電腦互連,其係包含一個控制 =及複數個代理器電腦,#中’每—個代理器電腦係能 •°打採用一或多個封套之-或多個應用,該系統係包含 個控制杈組,遠控制模組係適合於在該控制電腦上 執行;及 硬數個代理器模組,該些代理器模組之每一個係適合 籲 於執行於該些代理器電腦之一之上, 其中,每一個代理器模組係適合於監視於其相關之代 理器電腦上之封套狀態,且根據如此之封套狀態而重複地 與5亥控制模組通訊, /、中亥&amp;制模組係適合於根據由該些代理器模組接 來之通汛,而對於代理器電腦決定於該網路鏈路上之 、'寬之個代理器分配,使得對於一個代理器電腦之該 代理器分配係根據如此之代理器電腦之該封套狀態相對力 _ 其他代理器電腦之該封套狀態而定,且 其中,每一個代理器模組係包含頻寬管理元件之複數 個層,該複數個層係適合於次分配該相關之代理器電腦之 該代理器分配。 2 ·如申請專利範圍第1項之用於在一個網路鏈路上 動態地分配頻寬之系統,其中,該控制模組係適合於根據 该些代理器電腦之封套狀態之間之相對情況,而動態地及 75 200304298 重複地更新該些代理器分配。 3 ·如申請專利範圍第2項之用於在一個網路鏈路上 動悲地分配頻寬之系統,其中,該控制模組係適合於更新 代理器分配,使得對於過去代理器分配消耗較低百分比之 代理器電腦而δ,代理器分配係減少。 4.如申請專利範圍第1項之用於在一個網路鏈路上 動態地分配頻寬之系統’其中’每—個代理器模組係適合 於在其對應之代理器電腦係正執行複數個應用之情況下,^ UUJU4298 Patent application scope: · ―A system for dynamically allocating bandwidth on a network link X The network link is interconnected with a plurality of computers, which includes one control = and a plurality of Agent computers, # 中 'each—each agent computer can be used with one or more envelopes or multiple applications. The system includes a control group, and the remote control module is suitable for the control. Running on a computer; and a plurality of agent modules, each of which is adapted to execute on one of the agent computers, wherein each agent module is suitable for monitoring The envelope status on its related agent computer, and repeatedly communicates with the 5H control module according to such a cover state. /, ZhongHai &amp; manufacturing module is suitable for connecting according to these agent modules. Coming from the flood, and for the agent computer, the wide agent allocation on the network link is determined, so that the agent allocation for an agent computer is relatively based on the envelope state of such an agent computer. Force _ other generations The state of the envelope of the processor computer is determined, and each of the agent modules includes a plurality of layers of the bandwidth management element, and the plurality of layers are suitable for the agent allocation of the associated agent computer. . 2 · If the system for dynamically allocating bandwidth on a network link in item 1 of the patent application scope, wherein the control module is suitable for the relative situation between the envelope states of the agent computers, The agent assignments are updated dynamically and repeatedly with 75 200304298. 3. As in the system of patent application No. 2 for the system for sadly allocating bandwidth on a network link, the control module is suitable for updating agent allocation, so that the consumption of agent allocation in the past is low Percentage of agent computers and δ, agent allocation is reduced. 4. For the system for dynamically allocating bandwidth on a network link in item 1 of the scope of the patent application, where 'each' of each agent module is suitable for executing a plurality of corresponding agent computer systems In the case of application, 次分配其之代王里器分酉己成為該些應用u 一個之一個應用 分配。 5 士申明專利範圍第4項之用於在一個網路鏈路上 動態地分配頻寬之系統,其中,該代理器模組係適合於根 據該些應用之封套狀態之間之㈣情況,而㈣地及重複 地更新該些應用分配。 6 ·如申請專利範圍第4項之用於在一個網路鏈路上 動態地分配頻寬之系统,直φ,益 rte ^,丨上 尔、九兵〒,母一個應用分配係根據用The next time it has been assigned by the next generation, it becomes one of these applications. 5. The system for dynamically allocating bandwidth on a network link is stated in the patent scope item 4, wherein the agent module is suitable for the situation between the envelope states of the applications, and Update the application allocations repeatedly and repeatedly. 6 · If the system of patent application No. 4 is used to dynamically allocate the bandwidth on a network link, the direct φ, benefit rte ^, shanger, nine soldiers, the application allocation of a parent is based on the use of 於該對應之應用相對於用於垃% m 丁〜用於接收该代理器分配之一部分的 其他應用之封套開啟之數量而定。 7如申明專利範圍第4項之用於在一個網路鏈路上 動態地分配頻寬之系统,盆Φ,— y 夕 于、兄具中’母一個應用分配係根據該 對應之應用相對於接收該获j审哭八 牧叹為代理裔分配之一部分的其他應用 之封套之被指定的優先權而定。 8 ·如中請專利範圍第4項之用於在一個網路鏈路上 每一個應用分配係根據該 動態地分配頻寬之系統,其中 76 200304298 對應之應用相對於接收該代理器分配之一部分的其他應用 之先前分配之消耗而定。 ‘ 9 ·如申印專利範圍第4項之用於在一個網路鏈路上 動恶地分頻寬之系統’其中’ I _個應用分配係根據用 於忒對應之應用相對於用於接收該代理器分配之一部分的 其他應用之封套開啟之數量、封套之被指定的優先權及該 些封套之先前分配之消耗而定。 1 0 ·如申凊專利範圍第4項之用於在一個網路鏈路 上動怨地分配頻寬之系統,其中,每一個代理器模組係適 鲁 合於在一個應用電腦係具有複數個封套之情況下,次分配 如此應用之該應用分配成為該些封套之每一個之一個封套 分配。 1 1 ·如申請專利範圍第i 0項之用於在一個網路鏈 路上動態地分配頻寬之系統,其中,該代理器模組係適合 於根據該些封套之消耗活動之間之相對情況,而動態地及 重複地更新該些封套分配。 1 2 ·如申請專利範圍第i 0項之用於在一個網路鏈 _ 路上動態地分配頻寬之系統,其中,每一個封套分配係根 據用於該對應之封套相對於用於接收該應用分配之一部分 的其他封套之被指定的優先權而定。 1 3 ·如申請專利範圍第i 〇項之用於在一個網路鏈 路上動態地分配頻寬之系統,其中,每一個封套分配係根 據用於該對應之封套相對於用於接收該應用分配之一部分 的其他封套所消耗之先前分配而定。 77 200304298 1 4 ·如申請專利範圍第丄〇 路上動態地分配頻寬之系統,其中二:於在-個網路鏈 據該對應之封套相於接㈣應用分個^套分配係根 套之被指定之優先權及由如此之封套=部:的其他封 定。 斤沩耗之先前分配而 1 5 ·如申請專利範圍第i項 、用於在一個網路赫怒 上動態地分配頻寬之系統,豆中 _路鏈鲜 -Ύ 母一個代理器模组係p 含一個頻寬管理器,且係適合於 '' 』σ用於母一個執杆於与The corresponding application depends on the number of envelopes opened for other applications used to receive a portion of the agent allocation. 7 As stated in item 4 of the patent scope for a system for dynamically allocating bandwidth on a network link, basin Φ, — y Xi Yu, Xiu Zhong, 'an application allocation is based on the corresponding application relative to receiving This review is based on the assigned priority of the envelopes of other applications that are part of the proxy distribution. 8 · Please refer to item 4 of the patent scope for each application allocation on a network link based on the dynamically allocated bandwidth system, of which 76 200304298 corresponds to the application receiving a part of the agent allocation Depending on the previously allocated consumption of other applications. '9 · The system used to divide the bandwidth on a network link as claimed in item 4 of the scope of the printed patent' where 'I _ application allocation is based on The number of envelopes opened for other applications that are part of the agent allocation, the assigned priority of the envelopes, and the previously allocated consumption of those envelopes depend. 10 · As claimed in item 4 of the patent scope, a system for allocating bandwidth on a network link, wherein each agent module is suitable for a plurality of applications in a computer system. In the case of envelopes, the application allocation for which the allocation is so applied becomes an envelope allocation for each of the envelopes. 1 1 · The system for dynamically allocating bandwidth on a network link, as in item i 0 of the scope of patent application, wherein the agent module is suitable for the relative situation between the consumption activities of the envelopes And dynamically and repeatedly update the envelope assignments. 1 2 · The system for dynamically allocating bandwidth on a network link _ road as described in item i 0 of the scope of patent application, wherein each envelope assignment is based on the envelope used for the corresponding one relative to the one used to receive the application Assignment of part of the other envelopes depends on the assigned priority. 1 3 · A system for dynamically allocating bandwidth on a network link as claimed in item i 0 of the scope of patent application, wherein each envelope allocation is based on the corresponding envelope for the corresponding application allocation for receiving the application. Part of the other envelopes are consumed by previous allocations. 77 200304298 1 4 · If the system for dynamically allocating bandwidth on the 丄 th road of the scope of the patent application, two of them: the corresponding envelope in a network link is divided into ^ sets of allocation system based on the corresponding application Assigned priority and other seals from such envelope = part :. The previous allocation of the weight loss is 1 5 · If the system of patent application scope item i is used to dynamically allocate bandwidth on a network, the zhongzhong _ 路 链 鲜 -Ύ an agent module system p contains a bandwidth manager, and is suitable for '' '' σ 代理器電腦上之複數個應用之—個應用頻寬管理哭二: 始用於與該些應用相關之複數個封套之每一個套 頻寬管理器。 Τ # .如申請專利範圍第1 5項之用於在-個網… 路上動錢分配頻寬之系統,其中,該代理器頻寬管理】 係適合於接收其之相關代理器電腦之該代理器分配,且: 分配該代理器分配’使得位於該代理器頻寬管理器下方々One of the multiple applications on the agent computer-one application bandwidth management cry 2: Originally used for each of the multiple envelopes related to those applications Bandwidth Manager. Τ # .If the system of patent application scope No. 15 is used to allocate bandwidth on a network ... The agent bandwidth management] is the agent suitable for receiving its related agent computer Server allocation, and: assign this agent allocation 'to be below the agent's bandwidth manager' 每一個應用頻寬管理器係接收用於其之相關的應用之—低 應用分配,且 其中^每-個應用頻寬管理器係適合於次分配其相闕 之,用之4應用分g&amp;,使得位於該應用頻寬管理器之下方 之母個圭ί套頻寬官王里器係接收用於其對應之封套之一個 封套分配。 1 7 ·如申請專利範圍第工6項之用於在一個網路鏈 路上動心地分配頻寬之系統,其中,每一個封套頻寬管理 叩係被建構成向上游報告消耗資料而至位於該封套頻寬管 78 200304298 理器之上方的該應用頻寬管理器。 1 8 .如申請專利範圍第丄7項之用於在一個網路鏈 =上動態地分配頻寬之系統,其中,纟_個應用頻寬管理 器係被建構成根據位於該應用頻寬管理器下方之該些封套 之有效的封套優先權而次分配其之應用分配,其中,對於 一個特定之封套之該有效的封套優先權係根據該封套之二 個被指^之優先權及根據該封套所使用之先前的封套分配 而定。 19.如申請專利範圍第16項之用於在一個網路鏈 路上動態地分配頻寬之系統’其中,冑_個應用頻寬管理 Μ被建構成向上游報告消耗資料而至位於該應用頻寬管 理器之上方的該代理器頻寬管理器。 2 0 .如中請專利範圍第丄9項之用於在—個網路鍵 路亡動態地分配頻寬之系統,其中,#一個代理器頻寬管 理器係被建構成根據位於該代理器頻寬管理 封套之有效的封套優_而次分配其之代理器分配之^ 太對於-個特定之封套之該有效的封套優先權係根據該封 之一個被指定之優先權及根據該封套所使用之先前的封 套分配而定。 2 1 ·如申凊專利範圍第1 6項之用於在-個網路鏈 路亡動態地分配頻寬之系統,其中,#一個代理器頻寬管 理益係被建構餘據該代理器頻寬f理器及位於該代理器 =!理器下方之該應用頻寬管理器之間以及該應用頻寬 &quot;里益及位於該應用頻寬管理器下方之該封套頻寬管理器 79 200304298 之間之交互作用,而動態地及週期性地更新應用分配及封 套分配。 2 2 ·如申請專利範圍第2 1項之用於在_個網路鏈 路上動態地分配頻寬之系統,其中,更新該封套分配係比 更新該些應用分配更頻繁。 2 3 ·如申請專利範圍第1項之用於在一個網路鏈路 上動態地分配頻寬之系統,其中,每一個代理器模組係適 合於: 指定一個封套優先權至一個在與如此之代理器模組相 關之該代理器電腦上開啟之封套; 根據該封套之優先權而提供一個頻寬之封套分配至該 封套;及 偵測是否該封套係正被使用於實施一個預先定義之網 父易且於如此之偵測之後,修改如此之封套之該封套 優先權,且更新該封套分配以計算如此之修改。 2 4 種建構成負載於一個電腦上之代理器模組, -係用於7理由如此之電腦所使用之網路頻寬,該代理器 模組係包含: 一個代理器頻寬管理器;及 個應用頻寬管理器,該代理器模組係建構成對於複 數個執行於該電腦上之應用之每一個,開始一個如此之應 用頻寬管理器, 建才^中,该代理器頻寬管理器及該些應用頻寬管理器係 冓成動恶地交互作用,以次分配該電腦可使用之網路頻 80 200304298 成為用方'忒些應用之每一個之個別化應用分配。 5 .、如申請專利範圍第2 4項之建構成負載於一個 肉之代理器模組,其中,每一個應用分配係根據該對 -之相對於接收該電腦可使用之網路頻寬之 其他應用之封套狀態而定。 刀的Each application bandwidth manager receives a low application allocation for its related application, and ^ per-application bandwidth manager is suitable for sub-allocation of the other, using 4 application points g &amp; , So that the female bandwidth manager under the bandwidth manager of the application receives a sleeve allocation for its corresponding sleeve. 1 7 · If the system of Patent Application No. 6 is used to allocate bandwidth on a network link, each envelope bandwidth management system is constructed to report the consumption data to the upstream. Envelope Bandwidth Manager 78 200304298 The application bandwidth manager above the application. 1 8. As a system for dynamically allocating bandwidth on a network chain according to item 7 of the scope of patent application, where __ application bandwidth managers are built to manage bandwidth based on the application The effective envelope priority of the envelopes below the device is assigned next, and the application allocation is assigned, wherein the effective envelope priority for a particular envelope is based on the two assigned priorities of the envelope and according to the The envelope uses the previous envelope assignment. 19. A system for dynamically allocating bandwidth on a network link according to item 16 of the scope of the patent application, where 应用 application bandwidth management M is constructed to report consumption data upstream to the application frequency. The agent bandwidth manager above the bandwidth manager. 2 0. Please refer to item 9 of the patent scope for a system for dynamically allocating bandwidth across a network key, where #a proxy bandwidth manager is constructed based on the location of the proxy. Bandwidth Management Envelope Valid Envelope Priority _ Secondly Assigned by the Agent ^ Too Effective Envelope Priority for a Specific Envelope is based on a specified priority of the envelope and according Depending on the previous envelope assignment. 2 1 · As claimed in item 16 of the patent scope, a system for dynamically allocating bandwidth across a network link, where #a proxy bandwidth management benefit is constructed based on the proxy frequency Wide bandwidth manager and the application bandwidth manager located below the agent =! Manager and the application bandwidth &quot; Liyi and the envelope bandwidth manager located below the application bandwidth manager 79 200304298 Interaction between them, dynamically and periodically updating application allocation and envelope allocation. 2 2 · For the system for dynamically allocating bandwidth on one network link according to item 21 of the scope of patent application, the envelope allocation is updated more frequently than the application allocation. 2 3 · If the system for dynamically allocating bandwidth on a network link is described in item 1 of the scope of the patent application, each agent module is suitable for: assigning an envelope priority to an An envelope opened on the agent computer related to the agent module; a bandwidth-provided envelope is allocated to the envelope according to the priority of the envelope; and whether the envelope is being used to implement a predefined network After such detection, the parent changes the envelope priority of such an envelope, and updates the envelope assignment to calculate such an amendment. 2 4 types of agent modules built on a computer,-for network bandwidth used by a computer for 7 reasons, the agent module includes: an agent bandwidth manager; and An application bandwidth manager, the agent module is constructed to start an application bandwidth manager for each of a plurality of applications running on the computer, and the agent bandwidth management is established. The controller and the application bandwidth managers are interacting with each other to allocate the available network frequency of the computer 80 200304298 to become the user's individual application allocation for each of these applications. 5. If the construction of item 24 in the scope of patent application constitutes an agent module that is carried on a meat, each application allocation is based on the pair- relative to the other receiving the network bandwidth available to the computer. The condition of the envelope applied. Knife ^ •如申請專利範圍第2 5項之建構成負載於一個 電細上之代理器模組,#中,每一個應用分配係根據用於 。亥對應之應用相對於用於接收該電腦可使用之網路頻寬之 一部分的其他應用之開啟之封套的數量而定。 ^ 2 7 ·如申請專利範圍第2 5項之建構成負載於一個 電細上之代理器模組,其中,每一個應用分配係根據該對 應之應用相對於接收該電腦可使用之網路頻寬之一部分的 其他應用之封套的被指定優先權而定。^ • If the construction of item 25 in the scope of patent application constitutes an agent module loaded on an electronic device, in #, each application allocation is based on. The corresponding application depends on the number of open envelopes used by other applications that receive a portion of the network bandwidth available to the computer. ^ 2 7 · If the item No. 25 in the scope of the patent application constitutes an agent module loaded on an electronic device, each application allocation is based on the corresponding application relative to the network frequency available to the computer A wide portion of the envelope of other applications is assigned priority. 2 8 ·如申請專利範圍第2 5項之建構成負載於一個 電恥上之代理器模組,其中,每一個應用分配係根據該對 應之應用相對於接收該電腦可使用之網路頻寬之一部分的 其他應用之先前分配之消耗而定。 z y ·如申請專利範圍第2 5項之建構成負載於一個 電腦上之代理器模組,其中,每一個應用分配係根據該對 應之應用相對於接收該電腦可使用之網路頻寬之一部分的 其他應用之封套開啟之數量、該些封套被指定之優先權及 由該些封套之先前分配之消耗而定。 3 〇 ·如申請專利範圍第2 4項之建構成負載於一個 電腦上之代理器模組,其係進包含一個封套頻寬管理器, 81 200304298 5亥代理器模組係建構成對於複數個開啟於該電腦上之封套 之母一個’開始一個如此之封套頻寬管理器。 似3 1 ·如申請專利範圍第3 〇項之建構成負載於一個 · 電腦上之代理裔模組,其中,該代理器模組係被建構成使 得,當執行於該電腦上之該些應用之一係具有複數個相關 之封套時,與如此應用相關之該應用頻寬管理器係動態地 與該些封套之該些封套頻寬管理器交互作用,以對於該些 封套之每一個次分配該應用分配成為一個封套分配。 3 2 ·如申請專利範圍第3 i項之建構成負載於一個 _ 電腦上之代理器模組,其中,該應用頻寬管理器及該些封 套頻覓官理器係被建構成動態地及重複地更新該些封套分 配’以回應於改變於該些封套處之狀態。 似3 3 ·如申請專利範圍第2 4項之建構成負載於一個 電腦上之代理器模組,其中,該代理器頻寬管理器及該應 用湧寬f理器係被建構成動態地及重複地更新該些個別化 之應用分配,以回應於改變於該些應用之狀態。 3 4 ·如申請專利範圍第2 4項之建構成負載於一 _ · 電腦上之代理器模組,其中,該代理器模組係適合於: 指定一個封套優先權至一個該代理器模組係被負載於 其上之電腦上開啟之封套; 根據該封套之優先權而提供一個頻寬之封套分配至該 封套;及 债測是否該封套係正被使用於實施一個預先定義之網 路父易,且於如此之偵測之後,修改如此之封套之該封套 82 200304298 優先權’且更新該封套分配以計算如此之修改。 3 5種建構成負載於一個電腦上之代理器模組, 其係用於管理由如此之電腦所使用之網路頻 模組係包含: °° 一個代理器頻寬管理器;及 -個封套頻寬管理器,該代理器模組係建構成對於複 數個開啟於該電腦上之複數個封套之每-個,開始一個如 此之封套㈣管理器’纟中,該代理器頻寬㈣器及該些 封套ν頁寬S理益係建構成交互作用,以分配該電腦可使用 之網路頻寬成為用於該些封套之每一個之個別化封套分配 ”中4代理盗頻寬管理器及該些封套頻寬管理器係被 建構成根據該些封套彼此之⑸目對的消耗活動,而㈣地 及重衩地更新該些封套分配。 一種建構成負載於—個電腦上之代理器模組, 其係用於管理由如此之電腦所制之網路頻寬,該代理器 模組係包含: 一個代理器頻寬管理器; 一個應用頻寬管理器,該代理器模組係建構成對於複 數個執行於該電腦上之應用之每一個,開始一個如此之應 用頻寬管理器,其中,該代理器頻寬管理器及該些應用頻 寬管理器係建構成交互作用,以分配該電腦可使用之網路 頻寬成為用於該些應用之每一個之個別化應用分配;及 一個封套頻寬管理器,該代理器模組係建構成對於複 數個開啟於該電腦上之複數個封套之每一個,開始一個如 83 200304298 此之封套頻寬管理器,其中,對於一個具有複數個封套之 應用而言,該對應之應用頻寬管理器及該些封套頻寬管理 · 裔係建構成交互作用,以次分配該應用分配成為用於該些 _ 封套之每一個之封套分配。 3 7 · —種用於由一電腦動態地管理於一網路鏈路上 之頻寬消耗之系統,其係包含·· 、一個以軟體為基礎之代理器模組,該以軟體為基礎之 代理器模組係建構成於該電腦上執行,該代理器模組係進 一步建構成: _ 當於該電腦上之複數個封套係開啟時,指定一個封套 優先權至該複數個封套之每一個; 次分配可以被該電腦所使用之整體頻寬成為該複數個 封套之每一個之封套分配,其中,該複數個封套之每一個 之忒封套分配係根據該封套之優先權相對於其他封套之優 先權而決定;及 摘測何時該些封套之一係正被使用於實施一個預先定 義之網路交易,且於如此之偵測之後,修改如此之封套《 · &quot;玄封套優先權,且更新該封套分配以計算如此之修改。 3 8 ·如申請專利範圍第3 7項之用於由一電腦動態 地管理於一網路鏈路上之頻寬消耗之系統,其中,該預先 疋義之網路交易係僅相關於由該電腦所請求而由一個網路 貝源而來之資料的一部分,使得當該封套係被使用於獲得 此之資料的部分,該封套之優先權係被修改,且當該封 套係使用於獲得由該網路資源而來之資料的其他部分時, 84 200304298 該封套之優先權係不被修改。 3 9 · —種用於由一電腦動態地管理於一網路鏈路上 之頻寬消耗之系統,其係包含: 一個以軟體為基礎之代理器模組,該以軟體 代理器模組係建構成於該電腦上執行,該代理器模Z係進 一步建構成: 指疋一個封套優先權至一個於該電腦上開啟之封套; 根據該封套之優先權而提供一個網路頻寬之封套分配 至該封套;及 /測是㈣封套係正被使用於實施—個預先定義之網 路交易,且於如此之伯測之後,修改如此之封套之該封套 優先權,且更新該封套分配以計算如此之修改。 J 〇 .如申請專利範圍第3 9項之用於由一電腦動態 地管理於-網路鏈路上之頻寬消耗之系統,其中,於完成 δ亥預先疋義之網路夺总你 又易之後’该封套優先權係被恢復成一 個未被改變之值。 〆41.一種用於在一個網路鏈路上動態地分配頻寬之 系 '、先4網路鏈路係與複數個電腦互連,其係包含-個控 Μ複數個代理器電腦’其中’每一個代理器電腦係 能夠執行採用-或多個封套之一或多個應用,該系統係包 複數個代理器模έ 误、、且该些代理器模組之每一個係適合 於執行於該4b伐裡毋+ 之上,且監視及重複地報告 —代理為電腦之 其相關之代理11電腦之—個封套狀態; 85 200304298 :個控制模組’其係適合於執行於該控制電腦上,苴 ^’ ^制模㈣適合於減由該些代判模組所: ==電腦之相對的封套狀態,而動態地於該些代理 组俜進I刀配於该網路鏈路上之頻寬,每-個代理器模 組係進一步適合於: 供 當該些封套於與如 腦上係開啟時,指定一 一個; 此之代理器模組相關之該代理器電 個封套優先權至該複數個封套之每2 8 · If the construction of item 25 in the scope of patent application constitutes an agent module loaded on an electric shame, wherein each application allocation is based on the corresponding application with respect to the network bandwidth available to the computer Part of the other app depends on the previously allocated consumption. zy · If the construction of item 25 of the patent application scope constitutes an agent module loaded on a computer, each application allocation is based on the corresponding application relative to the portion of the network bandwidth available to the computer The number of envelopes opened for other applications, the priority assigned to those envelopes, and the previously allocated consumption of those envelopes. 3 〇 · If the application of the scope of the patent application No. 24 constitutes an agent module loaded on a computer, it includes an envelope bandwidth manager, 81 200304298 5 Hai agent module system constitutes a plurality of Open the mother of the sleeve on this computer to start a sleeve bandwidth manager like this. Like 3 1 · If the construction of the scope of patent application No. 30 constitutes a proxy module loaded on a computer, wherein the proxy module is constructed so that, when executed on the computer, the applications When one has a plurality of related envelopes, the application bandwidth manager associated with such an application dynamically interacts with the envelope bandwidth managers of the envelopes to allocate each of the envelopes. The app assignment becomes an envelope assignment. 3 2 · If the construction of item 3 i in the scope of patent application constitutes an agent module loaded on a computer, wherein the application bandwidth manager and the envelope frequency finders are constructed dynamically and The envelope assignments' are updated repeatedly in response to changing the state at the envelopes. It looks like 3 3 · If the construction of the scope of the patent application No. 24 constitutes an agent module loaded on a computer, wherein the agent bandwidth manager and the application bandwidth controller are constructed dynamically and The individualized application allocations are updated repeatedly in response to changing the status of the applications. 3 4 · If the construction of item 24 of the patent application scope constitutes an agent module on the computer, where the agent module is suitable for: assigning an envelope priority to one of the agent modules Is an envelope opened on the computer loaded on it; an envelope that provides a bandwidth based on the priority of the envelope is assigned to the envelope; and whether the envelope is being used to implement a predefined network parent Easy, and after such detection, modify the envelope 82 200304298 priority of such envelope 'and update the envelope assignment to calculate such a modification. 3 5 types of agent modules built on a computer, which are used to manage the network frequency modules used by such computers include: ° an agent bandwidth manager; and an envelope Bandwidth manager, the agent module is constructed to start each of a plurality of envelopes that are opened on the computer, such an envelope "manager", the agent bandwidth adapter and The envelopes ν page width S benefit system is constructed to interact to allocate the network bandwidth available to the computer to the individualized envelope allocation for each of the envelopes. 4 Agent Bandwidth Manager and The envelope bandwidth managers are constructed to update the envelope allocations based on the consumption activities of the envelopes with each other, and to renew the envelope allocations. A structure is constructed to load an agent module on a computer. Group, which is used to manage the network bandwidth made by such a computer, the agent module includes: an agent bandwidth manager; an application bandwidth manager, the agent module is constituted For multiple executions On each of the applications on the computer, an application bandwidth manager is started, wherein the agent bandwidth manager and the application bandwidth managers are constructed to interact with each other to allocate the available computer bandwidth. Network bandwidth becomes an individualized application allocation for each of these applications; and an envelope bandwidth manager, the agent module is constructed to constitute each of a plurality of envelopes opened on the computer Start an envelope bandwidth manager such as 83 200304298, where, for an application with multiple envelopes, the corresponding application bandwidth manager and the envelope bandwidth management and ancestry constitute an interaction, The application allocation is divided into envelope allocations for each of the _ envelopes. 3 7 · —A system for dynamically managing bandwidth consumption on a network link by a computer, which includes · · A software-based agent module, the software-based agent module is constructed and executed on the computer, and the agent module is further built Success: _ When multiple envelopes on the computer are open, assign an envelope priority to each of the multiple envelopes; sub-allocations can be used by the overall bandwidth of the computer to become each of the multiple envelopes Envelope allocation, wherein the allocation of the envelopes of each of the plurality of envelopes is determined according to the priority of the envelopes over the other envelopes; and when one of the envelopes is being used to implement a Pre-defined online transactions, and after such detection, modify such an envelope "&quot; Xuan Envelope Priority, and update the envelope assignment to calculate such an amendment. 3 8 · If the scope of patent application is 37 A system for dynamically managing bandwidth consumption on a network link by a computer, wherein the pre-defined network transaction is only related to a network source requested by the computer Part of the data, so that when the envelope is used to obtain the part of the information, the priority of the envelope is modified, and when the envelope is used to obtain For other parts of the information from the road source, the priority of the envelope is not modified. 3 9 · — A system for dynamically managing bandwidth consumption on a network link by a computer, which includes: a software-based agent module, which is built using a software agent module It is constructed and executed on the computer, and the agent module Z is further constructed: It refers to a envelope priority to an envelope opened on the computer; an envelope that provides a network bandwidth according to the priority of the envelope is assigned to The envelope; and / or test is that the envelope system is being used to implement a pre-defined online transaction, and after such a primary test, modify the envelope priority of such an envelope, and update the envelope assignment to calculate this Its modification. J 〇. The system for dynamically managing bandwidth consumption on a network link by a computer as described in item 39 of the scope of patent application, where it is easy to complete the network after you have completed the pre-defined network 'The envelope priority is restored to an unchanged value. 〆41. A system for dynamically allocating bandwidth on a network link ', the first 4 network links are interconnected with a plurality of computers, and the system includes a plurality of agent computers' wherein' Each agent computer is capable of executing one or more applications using one or more envelopes, the system includes a plurality of agent errors, and each of the agent modules is adapted to execute on the agent. 4b Fari ++, and monitoring and repeated reporting-the agent is a computer and its related agent 11 computers-a jacket status; 85 200304298: a control module 'which is suitable for execution on the control computer,苴 ^ '^ Molding mode is suitable for reducing the relative envelope status of these substitute modules: == Computer relative envelope state, and dynamically enter the bandwidth of the network configuration on the network link of these proxy groups Each agent module is further suitable for: for assigning one when the envelopes are opened with the brain system; the agent related to the agent module has an envelope priority to the Each of a plurality of envelopes 偵測何時該些封套之—# 了各之係正被使用於實施一個預先定 義之網路交易,且於眚 、貫細^亥預先疋義之網路交易期間,對 於如此之封套修改該封套優先權。 4 2: 一種動態地管理於一分散式網路系統中之頻寬 之方法’❹散式網路系統係具有與複數個電腦互連之網 路鏈路,其係包含: 指定:個封套優先權至一個封套,其中,該封套係結 合一個執行於該複數個電腦之一之上之應用;Detecting when these envelopes are in use— # The various systems are being used to implement a pre-defined online transaction, and during the pre-defined online transaction, the modification of the envelope for such an envelope takes precedence right. 4 2: A method of dynamically managing bandwidth in a decentralized network system. A decentralized network system has a network link interconnected with multiple computers, which includes: Designation: Envelope priority Weight to an envelope, wherein the envelope is combined with an application running on one of the plurality of computers; 提供一個封套分配至該封套;其中,該封套分配係定 義可由δ亥封套所使用之網路頻寬; 使用該封套以監視所實施之網路交易,以辨識是否該 封套係正被使用於實施一個預先定義之網路交易丨及 於侦測該圭f套係正被使用☆實施該預t定義之網路交 易之後’冑態地修改該封套優先權,且更新該封套分配以 計算如此之修改。 如申請專利範圍第4 2項之動態地管理於一分 86 200304298 政式、”:路系統中之頻寬之方法,其係進一步包含: 提供-個應用分配至該應用’其中,該應用分配係定 .被錢用所使用之網路頻寬,且係相關於該封套 ,及 _ 。動態地修改該應用分配,以計算該封套優先權之修改 ^ 44.如申請專利範圍第42項之動態地管理於一分 畋式網路系統中之頻寬之方法,其係進一步包含: ,提供一個電腦分配至該應用係正於其上執行之該電腦 、中’ S亥電腦分配係定義可被如此之電腦所使用之網路 頻t ^ 見’且係相關於該封套分配;及 動態地修改該電腦分配,以計算該封套優先權之修改 拾臺、圖式: 如次頁 87Provide an envelope allocation to the envelope; where the envelope allocation defines the network bandwidth that can be used by the delta envelope; use the envelope to monitor the implemented network transactions to identify whether the envelope is being used for implementation A pre-defined network transaction and after detecting that the system is being used ☆ After the pre-defined network transaction is implemented, the envelope priority is modified, and the envelope allocation is updated to calculate this. modify. For example, if the 42nd item of the scope of patent application is dynamically managed in one minute 86 200304298, the method of ": bandwidth in the road system" further includes: providing an application to be allocated to the application, where the application is allocated Set. The network bandwidth used by the money is related to the envelope, and _. Dynamically modify the application allocation to calculate the modification of the priority of the envelope ^ 44. As in the 42nd scope of the patent application A method for dynamically managing bandwidth in a distributed network system, which further includes: providing a computer to allocate to the computer on which the application is running, and the computer's distribution system can be defined. The network frequency t ^ used by such a computer is related to the envelope allocation; and the computer allocation is dynamically modified to calculate the envelope priority. Modifications and diagrams: as shown on page 87
TW092103268A 2002-02-18 2003-02-18 Software, systems and methods for managing a distributed network TW200304298A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US35773102P 2002-02-18 2002-02-18

Publications (1)

Publication Number Publication Date
TW200304298A true TW200304298A (en) 2003-09-16

Family

ID=27757660

Family Applications (1)

Application Number Title Priority Date Filing Date
TW092103268A TW200304298A (en) 2002-02-18 2003-02-18 Software, systems and methods for managing a distributed network

Country Status (3)

Country Link
AU (1) AU2003217532A1 (en)
TW (1) TW200304298A (en)
WO (1) WO2003071743A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8363598B2 (en) 2004-03-31 2013-01-29 Qualcomm Incorporated Method and apparatus for obtaining server information in a wireless network

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
SG2013057476A (en) * 2013-07-29 2015-02-27 Chikka Pte Ltd Data bandwidth management system and method

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6317438B1 (en) * 1998-04-14 2001-11-13 Harold Herman Trebes, Jr. System and method for providing peer-oriented control of telecommunications services
US7028264B2 (en) * 1999-10-29 2006-04-11 Surfcast, Inc. System and method for simultaneous display of multiple information sources
US7660902B2 (en) * 2000-11-20 2010-02-09 Rsa Security, Inc. Dynamic file access control and management
US20020156900A1 (en) * 2001-03-30 2002-10-24 Brian Marquette Protocol independent control module

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8363598B2 (en) 2004-03-31 2013-01-29 Qualcomm Incorporated Method and apparatus for obtaining server information in a wireless network

Also Published As

Publication number Publication date
AU2003217532A1 (en) 2003-09-09
WO2003071743A1 (en) 2003-08-28

Similar Documents

Publication Publication Date Title
US10834004B2 (en) Path determination method and system for delay-optimized service function chaining
TW480859B (en) Software, systems and methods for managing a distributed network
CN101228737B (en) Hierarchical qos behavioral model
US7260635B2 (en) Software, systems and methods for managing a distributed network
JP4822713B2 (en) Method and apparatus for operating an open API network including a proxy
CN110476453A (en) For providing the service granting that network is sliced to client
CN109600768A (en) Management method, equipment and the system of network slice
JP2004048662A (en) Business method and apparatus for network path configuration
Duan Modeling and performance analysis on network virtualization for composite network-cloud service provisioning
US7561521B2 (en) Network centric quality of service using active network technology
CN107637034A (en) System and method for the Virtual base facilities management between carrier network
US20030135638A1 (en) Dynamic modification of application behavior in response to changing environmental conditions
CN107533538A (en) Tenant is handled in the system using acceleration components to require
CN110505101A (en) A kind of network slice method of combination and device
CN105519043A (en) System and method for mapping a service-level topology to a service-specific data plane logical topology
US8468228B2 (en) System architecture method and computer program product for managing telecommunication networks
CN103297347B (en) A kind of load balance process method and device
JP2003188877A (en) System for managing distributed network infrastructure services
WO2019174000A1 (en) Method and apparatus for service management
CN107919982A (en) A kind of DCI management platforms and its management method
CN107533481A (en) Service is provided in the system with hardware-accelerated plane and software plane
CN108600101A (en) A kind of network for the optimization of end-to-end time delay performance services cross-domain method of combination
CN110011863A (en) A kind of network bandwidth resources equalization scheduling method and device
Jahromi et al. An NFV and microservice based architecture for on-the-fly component provisioning in content delivery networks
WO2018121178A1 (en) Resource adjustment method, device and system