US20160094653A1 - Optimizing resource downloads or streams using a collection of trusted network connected endpoints - Google Patents

Optimizing resource downloads or streams using a collection of trusted network connected endpoints Download PDF

Info

Publication number
US20160094653A1
US20160094653A1 US14/501,999 US201414501999A US2016094653A1 US 20160094653 A1 US20160094653 A1 US 20160094653A1 US 201414501999 A US201414501999 A US 201414501999A US 2016094653 A1 US2016094653 A1 US 2016094653A1
Authority
US
United States
Prior art keywords
user
requested resource
download
network connected
trusted network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/501,999
Inventor
Swaminathan Balasubramanian
Radha M. De
Ashley D. Delport
Saswati Maji
Indrajit Poddar
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Priority to US14/501,999 priority Critical patent/US20160094653A1/en
Assigned to INTERNATIONAL BUSINESS MACHINES CORPORATION reassignment INTERNATIONAL BUSINESS MACHINES CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BALASUBRAMANIAN, SWAMINATHAN, DE, RADHA M., MAJI, SASWATI, DELPORT, ASHLEY D., PODDAR, INDRAJIT
Priority to US15/012,605 priority patent/US9420041B2/en
Publication of US20160094653A1 publication Critical patent/US20160094653A1/en
Priority to US15/178,266 priority patent/US9531804B2/en
Priority to US15/287,813 priority patent/US9628559B2/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1074Peer-to-peer [P2P] networks for supporting data block transmission mechanisms
    • H04L67/1078Resource delivery mechanisms
    • H04L67/1085Resource delivery mechanisms involving dynamic management of active down- or uploading connections
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations
    • H04L12/18Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/16Threshold monitoring
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/12Avoiding congestion; Recovering from congestion
    • H04L47/125Avoiding congestion; Recovering from congestion by balancing the load, e.g. traffic engineering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1044Group management mechanisms 
    • H04L67/1053Group management mechanisms  with pre-configuration of logical or physical connections with a determined number of other peers
    • H04L67/1057Group management mechanisms  with pre-configuration of logical or physical connections with a determined number of other peers involving pre-assessment of levels of reputation of peers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/34Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters 

Definitions

  • the present invention relates generally to the field of data processing, and more particularly to downloading digital resources.
  • Computer networks for example, the Internet, provide information and contents which can be accessed via the network.
  • Various types of files such as program files, music files (e.g., MP3-files), or video files, can be downloaded via the Internet and then executed, for example, on a computing device to which the respective file was downloaded.
  • Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers.
  • Peers are equally privileged, equipotent participants in the application, forming a peer-to-peer network of nodes.
  • Peers make a portion of their resources, such as processing power, disk storage or network bandwidth, directly available to other network participants, without the need for central coordination by servers or stable hosts.
  • Peers are both suppliers and consumers of resources, in contrast to the traditional client-server model in which the consumption and supply of resources is divided.
  • Emerging collaborative P2P systems are going beyond the era of peers doing similar things while sharing resources, and are looking for diverse peers that can bring in unique resources and capabilities to a virtual community thereby empowering it to engage in greater tasks beyond those that can be accomplished by individual peers, yet that are beneficial to all the peers.
  • Embodiments of the present invention disclose a method, a computer program product, and a system for improving resource downloads.
  • the method for improving resource downloads can include one or more computer processors detecting a request to download a resource from an original source to a user's computing device.
  • the one or more computer processors determine a cost of the download of the requested resource from the original source.
  • the one or more computer processors determine whether the cost of the download of the requested resource from the original source exceeds a predefined threshold.
  • the one or more computer processors determine a group of trusted network connected endpoints.
  • the one or more computer processors determine whether the requested resource exists in the group of trusted network connected endpoints. Responsive to determining the requested resource exists in the group of trusted network connected endpoints, the one or more computer processors download the requested resource from at least one of the trusted network connected endpoints.
  • FIG. 1 is a functional block diagram illustrating a distributed data processing environment, in accordance with an embodiment of the present invention
  • FIG. 2 is a flowchart depicting operational steps of a download program, on a client computing device within the distributed data processing environment of FIG. 1 , for improving resource downloads, in accordance with an embodiment of the present invention
  • FIG. 3 depicts a block diagram of components of the client computing device executing the download program, in accordance with an embodiment of the present invention.
  • the downloaded resource can also exist on devices within a collection of trusted network connected endpoints, for example, devices belonging to friends in a social network that are in close proximity and can provide a better network path for downloading. Users tend to download resources directly from the source server because of the difficulty of searching for the same resource elsewhere, which can result in high bandwidth utilization at the server and additional time spent downloading.
  • Embodiments of the present invention recognize that efficiency can be gained by implementing a method to determine the best path to download a resource. Efficiency can also be gained by converting a client/server request for downloading a resource to an ad hoc immediate or scheduled peer-to-peer request by using a collection of trusted network connected endpoints, such as corporate or social networks. Implementation of embodiments of the invention can take a variety of forms, and exemplary implementation details are discussed subsequently with reference to the Figures.
  • FIG. 1 is a functional block diagram illustrating a distributed data processing environment, generally designated 100 , in accordance with one embodiment of the present invention.
  • FIG. 1 provides only an illustration of one implementation and does not imply any limitations with regard to the environments in which different embodiments can be implemented. Many modifications to the depicted environment can be made by those skilled in the art without departing from the scope of the invention as recited by the claims.
  • Distributed data processing environment 100 includes server computer 104 and client computing devices 106 , 108 , and 110 , all interconnected over network 102 .
  • Network 102 can be, for example, a telecommunications network, a local area network (LAN), a wide area network (WAN), such as the Internet, or a combination of the three, and can include wired, wireless, or fiber optic connections.
  • Network 102 can include one or more wired and/or wireless networks that are capable of receiving and transmitting data, voice, and/or video signals, including multimedia signals that include voice, data, and video information.
  • Server computer 104 can be a management server, a web server, or any other electronic device or computing system capable of receiving and sending data.
  • server computer 104 can represent a server computing system utilizing multiple computers as a server system, such as in a cloud computing environment.
  • server computer 104 can be a laptop computer, a tablet computer, a netbook computer, a personal computer (PC), a desktop computer, a personal digital assistant (PDA), a smart phone, or any programmable electronic device capable of communicating with client computing devices 106 , 108 , and 110 via network 102 .
  • server computer 104 represents a computing system utilizing clustered computers and components to act as a single pool of seamless resources.
  • server computer 104 includes one or more social networks.
  • one or more social networks can exist as separate components of distributed data processing environment 100 (not shown).
  • Each of client computing devices 106 , 108 , and 110 can be a desktop computer, a laptop computer, a tablet computer, a specialized computer server, a personal digital assistant (PDA), a smart phone, or any programmable electronic device capable of communicating with server computer 104 , as well as with each other, via network 102 and with various components and devices within distributed data processing environment 100 .
  • client computing devices 106 , 108 , and 110 represent any programmable electronic device or combination of programmable electronic devices capable of executing machine readable program instructions and communicating with other computing devices via a network, such as network 102 .
  • Client computing device 110 includes download program 112 and database 120 .
  • Download program 112 intercepts and converts a client/server request for resource download to an adhoc immediate or scheduled peer-to-peer request by using a collection of trusted network connected endpoints, such as devices belonging to friends in a social network. Download program 112 assumes that contacts made through a user's organization or social networks can be trusted. Download program 112 intercepts a user request from the user of client computing device 110 for a resource download from server computer 104 . After download program 112 determines that the version of the resource has not been previously downloaded and that the cost of the download exceeds a threshold, download program 112 uses one or more social networks to find contacts available to source the resource.
  • Download program 112 selects one or more optimum neighbors and converts the request into an immediate or scheduled peer-to-peer resource transfer.
  • Download program 112 includes user download request interceptor 114 , download history manager 116 , and alternative download source presenter 118 .
  • Download program 112 is depicted and described in further detail with respect to FIG. 2 .
  • Download request interceptor 114 intercepts a user's download request as soon as the user selects a resource for download. Download request interceptor 114 prompts the user to provide information such as email address, cell phone number, social network identification, and organization details, including the user's email address in the organization domain. Download request interceptor 114 also collects the IP address of the user's client computing device, such as client computing device 110 . If client computing device 110 is a PDA, download request interceptor 114 automatically captures the PDA ID. Download request interceptor 114 can also capture an International Mobile Station Equipment Identity (IMEI) number if client computing device 110 is a mobile phone. Download request interceptor 114 stores the collected information in a database table, such as in database 120 , for future reference. Download request interceptor 114 passes the collected information to download history manager 116 .
  • IMEI International Mobile Station Equipment Identity
  • Download history manager 116 retrieves historic information of previous resource downloads from the same source as the request and compares the information with the current user's identification information. Download history manager 116 approaches the historic information in a bottoms up manner. Download history manager 116 first tries to match the user's IP address with an entry in a list of historic IP addresses. If download history manager 116 finds a match, download history manager 116 recommends that the user check the user's system for the resource, as the user may have already downloaded the requested resource at an earlier time. If download history manager 116 does not find a match, download history manager 116 next tries to find a match in the user's organization domain and in the user's social network community and tries to find at least one contact that has downloaded the requested resource in the past. If download history manager 116 finds a list of suitable candidates, download history manager 116 passes the list to alternative download source presenter 118 .
  • Alternative download source presenter 118 receives the list of downloads from download history manager 116 , and prioritizes the list by feasibility of downloading the target resource with minimal bandwidth and time.
  • the first priority is the user with same IP address, i.e., the requesting user has downloaded the same resource in the past.
  • the next priority is a peer user that belongs to the same organization domain.
  • the last priority typically, is a user in the requesting user's social network.
  • Alternative download source presenter 118 presents the list to the user.
  • Alternative download source presenter 118 can also add flags to the list to indicate users that are currently online so that the requesting user can contact a peer immediately to obtain the resource.
  • Database 120 resides on client computing device 110 .
  • database 120 can reside on client computing device 106 or 108 , or elsewhere in the environment.
  • a database is an organized collection of data.
  • Database 120 can be implemented with any type of storage device capable of storing data that can be accessed and utilized by client computing device 110 , such as a database server, a hard disk drive, or a flash memory. In other embodiments, database 120 can represent multiple storage devices within client computing device 110 .
  • Database 120 stores downloaded resources. Database 120 also stores identification information collected by download request interceptor 114 .
  • FIG. 2 is a flowchart depicting operational steps of download program 112 , on client computing device 110 within distributed data processing environment 100 of FIG. 1 , for improving resource downloads, in accordance with an embodiment of the present invention.
  • Download program 112 detects a request for a resource download (step 202 ). Using download request interceptor 114 , download program 112 detects the user's selection of a resource download and intercepts the request prior to the execution of the download by client computing device 110 from server computer 104 .
  • Download program 112 determines whether the selected resource has been downloaded before (decision block 204 ). Using download history manager 116 , download program 112 retrieves historic information of previous downloads, for example, the device download history, to determine whether the current version of the selected resource was downloaded to client computing device 110 in the past. If download program 112 determines that the requested resource was downloaded prior to the current request (“yes” branch, decision block 204 ), then download program 112 notifies the user of the resource location (step 210 ). Download program 112 notifies the user that the requested resource already resides on client computing device 110 and provides the user with the location address of the resource. Download program 112 also aborts the current download request.
  • download program 112 determines whether social information is available (decision block 206 ).
  • Social information associated with the user can include social network IDs for networks such as Facebook®, LinkedIn®, Twitter®, etc. Social information associated with the user can also include contact information, organization email address, corporate chat ID, etc. Social information can be stored in database 120 . If download program 112 determines that social information is not available (“no” branch, decision block 206 ), then download program 112 requests social information from the user (step 208 ). Download program 112 can prompt the user to input social information through a series of interactive questions. Download program 112 can also prompt the user to input social information by providing a form for the user to complete.
  • download program 112 determines the cost of downloading the requested resource from a server, such as server computer 104 (step 212 ).
  • the cost of the download can be measured by the amount of time or bandwidth required to download the resource from a particular source.
  • the cost can also be measured by the size of the file. In addition, bandwidth and cost can be translated into a financial measurement.
  • download program 112 determines whether the cost of the download exceeds a predefined threshold (decision block 214 ).
  • the download cost threshold can be predefined based on the measurement method. For example, if the measurement method is bandwidth, then the download cost threshold can be set to five Mbits/second. If, for example, the measurement method is time required to download the resource, then the download cost threshold can be set to five seconds. In one embodiment, the user sets the predefined threshold. In another embodiment, the organization can set the predefined threshold. If the cost of the download does not exceed the threshold (“no” branch, decision block 214 ), then download program 112 downloads the requested resource from server computer 104 (step 232 ), per the original request.
  • download program 112 determines a group of trusted network connected endpoints (step 216 ).
  • the group of trusted network connected endpoints can include contacts from a plurality of sources.
  • the group of trusted network connected endpoints can be a friend list in a social network, such as Facebook® or LinkedIn®, or a set of Twitter® handles that the user has followed or interacted with at some predetermined frequency in the past.
  • the group of trusted network connected endpoints can be obtained from a list of email and phone book contacts with a history of message exchanges in the past.
  • the group of trusted network connected endpoints can be obtained from a wireless device discovery protocol, such as Bluetooth®, for finding devices in physical proximity which allow themselves to be discovered and connected to.
  • Users in the group of trusted network connected endpoints can include users of client computing devices 106 and 108 .
  • download program 112 can prioritize the search for the group of trusted network connected endpoints by looking first in the user's organization domain for any user whose organization email ID matches that of the user.
  • the prioritization of the search groups is based on a program default. In another embodiment, the prioritization of the search groups can be based on user preference.
  • Download program 112 queries the group (step 218 ). In one embodiment, using download history manager 116 , download program 112 sends a query message to the devices associated with the group of trusted network connected endpoints to determine whether any member of the group already has the requested resource, for example, client computing device 106 and client computing device 108 .
  • Download program 112 determines whether the requested resource exists in the group (decision block 220 ). If download program 112 determines the requested resource does not exist in the group (“no” branch, decision block 220 ), then download program 112 downloads the requested resource from server computer 104 (step 232 ), per the original request. In one embodiment, if download program 112 determines the requested resource does not exist in the group, download program 112 , using download history manager 116 , can continue to search for another group of trusted network connected endpoints to which download program 112 can forward the query. The query can be propagated to a pre-configured depth across a social network of trusted network connected endpoints.
  • download history manager 116 determines whether the requested resource exists on client computing device 106 . If download history manager 116 determines the resource is not on client computing device 106 , then download history manager 116 can propagate the query to the social network of the user of client computing device 106 . If the user of client computing device 106 is connected, via a social network, to a user of client computing device 108 , then download history manager 116 determines whether the requested resource is on client computing device 108 . This sequence continues through the pre-configured depth across the social network.
  • download program 112 determines the requested resource does exist in the group (“yes” branch, decision block 220 ), then download program 112 receives a response to the query (step 222 ). If the requested resource exists in any of the trusted network connected endpoint devices, such as client computing device 106 or client computing device 108 , download program 112 receives a response message from the one or more devices that have the requested resource.
  • the message can be received through a plurality of possible network paths. For example, the message can be received through a special TCP/IP encapsulated packet, and SMS encapsulated message, a Bluetooth® response, or a local wifi connection.
  • the received message can include metadata regarding the size of the resource, possible network paths, and protocol through which the resource can be transferred, for example, FTP, HTTP, SMS/MMS, email attachment, or Bluetooth® file transfer.
  • Download program 112 determines the endpoint with the lowest cost (step 224 ). Using alternative download source presenter 118 , download program 112 lists the available sources from which the resource can be downloaded by lowest cost, i.e., lowest required bandwidth or time. In one embodiment, alternative download source presenter 118 can prioritize the list by users in the same domain, or peer users, followed by contacts in the requesting user's social network. In another embodiment, alternative download source presenter 118 can prioritize the list by users that are currently online, such that download program 112 can obtain the resource immediately.
  • download program 112 determines the cost of downloading the resource from each contact on the list by inspecting the information in the response packet and attempting a test connection to the source trusted endpoint to determine the current network bandwidth and path to the responding endpoint over the supported protocols specified in the response. In another embodiment, download program 112 can determine the cost of downloading the resource from each contact on the list by receiving an offer to initiate a connection by the trusted endpoint device for a specified cost. Download program 112 can evaluate the cost of receiving the resource via a push versus a pull model, and determine which method is faster. In one embodiment, more than one contact on the list can have the equivalent lowest cost of downloading.
  • Download program 112 determines whether peer-to-peer communication can be established (decision block 226 ). Download program 112 determines whether the peer-to-peer communication between client computing device 110 and the client computing device of the trusted network connected endpoint with the lowest cost of downloading the resource can be established. If download program 112 determines that peer-to-peer communication can be established (“yes” branch, decision block 226 ), then download program 112 converts the intercepted client/server download request to a peer-to-peer download request and downloads the resource from the peer client computing device (step 230 ). In one embodiment, if download program 112 finds multiple sources from which to download at the lowest cost, download program 112 can split the download across the multiple sources.
  • download program 112 determines that peer-to-peer communication cannot be established (“no” branch, decision block 226 ). If communication cannot be established immediately but can be established in the future, then download program 112 can schedule the peer-to-peer download for a later time. For example, if the trusted network endpoint connection is on client computing device 106 through an instant messaging program, but the user of client computing device 106 is not currently online, then download program 112 can schedule the peer-to-peer download for a time when the user of client computing device 106 is online. Once download program 112 makes the connection, download program 112 downloads the requested resource from the peer client computing device (step 230 ).
  • download program 112 can receive a stream of real time information such as a video stream or a Voice-over-Internet Protocol (VoIP) signal from a second client computing device.
  • VoIP Voice-over-Internet Protocol
  • client computing device 106 For example, a user of client computing device 106 is in a coffee shop, watching a live stream of a sports game on client computing device 106 .
  • the user of client computing device 110 interested in watching the same sports game, can use download program 112 to download the video stream of the sports game from client computing device 106 to client computing device 110 via peer-to-peer communication.
  • FIG. 3 depicts a block diagram of components of client computing device 110 executing download program 112 , in accordance with an embodiment of the present invention. It should be appreciated that FIG. 3 provides only an illustration of one implementation and does not imply any limitations with regard to the environments in which different embodiments can be implemented. Many modifications to the depicted environment can be made.
  • Client computing device 110 includes communications fabric 302 , which provides communications between computer processor(s) 304 , memory 306 , persistent storage 308 , communications unit 310 , and input/output (I/O) interface(s) 312 .
  • Communications fabric 302 can be implemented with any architecture designed for passing data and/or control information between processors (such as microprocessors, communications and network processors, etc.), system memory, peripheral devices, and any other hardware components within a system.
  • processors such as microprocessors, communications and network processors, etc.
  • Communications fabric 302 can be implemented with one or more buses.
  • Memory 306 and persistent storage 308 are computer readable storage media.
  • memory 306 includes random access memory (RAM) 314 and cache memory 316 .
  • RAM random access memory
  • cache memory 316 In general, memory 306 can include any suitable volatile or non-volatile computer readable storage media.
  • persistent storage 308 includes a magnetic hard disk drive.
  • persistent storage 308 can include a solid-state hard drive, a semiconductor storage device, a read-only memory (ROM), an erasable programmable read-only memory (EPROM), a flash memory, or any other computer readable storage media that is capable of storing program instructions or digital information.
  • the media used by persistent storage 308 can also be removable.
  • a removable hard drive can be used for persistent storage 308 .
  • Other examples include optical and magnetic disks, thumb drives, and smart cards that are inserted into a drive for transfer onto another computer readable storage medium that is also part of persistent storage 308 .
  • Communications unit 310 in these examples, provides for communications with other data processing systems or devices, including resources of server computer 104 and client computing devices 106 and 108 .
  • communications unit 310 includes one or more network interface cards.
  • Communications unit 310 can provide communications through the use of either or both physical and wireless communications links.
  • Download program 112 and database 120 can be downloaded to persistent storage 308 through communications unit 310 .
  • I/O interface(s) 312 allows for input and output of data with other devices that can be connected to client computing device 110 .
  • I/O interface(s) 312 can provide a connection to external device(s) 318 such as a keyboard, a keypad, a touch screen, a microphone, a digital camera, and/or some other suitable input device.
  • External device(s) 318 can also include portable computer readable storage media such as, for example, thumb drives, portable optical or magnetic disks, and memory cards.
  • Software and data used to practice embodiments of the present invention, e.g., download program 112 and database 120 can be stored on such portable computer readable storage media and can be loaded onto persistent storage 308 via I/O interface(s) 312 .
  • I/O interface(s) 312 also connect to a display 320 .
  • Display 320 provides a mechanism to display data to a user and can be, for example, a computer monitor.
  • the present invention can be a system, a method, and/or a computer program product.
  • the computer program product can include a computer readable storage medium (or media) having computer readable program instructions thereon for causing a processor to carry out aspects of the present invention.
  • the computer readable storage medium can be any tangible device that can retain and store instructions for use by an instruction execution device.
  • the computer readable storage medium can be, for example, but is not limited to, an electronic storage device, a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or any suitable combination of the foregoing.
  • a non-exhaustive list of more specific examples of the computer readable storage medium includes the following: a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), a static random access memory (SRAM), a portable compact disc read-only memory (CD-ROM), a digital versatile disk (DVD), a memory stick, a floppy disk, a mechanically encoded device such as punch-cards or raised structures in a groove having instructions recorded thereon, and any suitable combination of the foregoing.
  • RAM random access memory
  • ROM read-only memory
  • EPROM or Flash memory erasable programmable read-only memory
  • SRAM static random access memory
  • CD-ROM compact disc read-only memory
  • DVD digital versatile disk
  • memory stick a floppy disk
  • a mechanically encoded device such as punch-cards or raised structures in a groove having instructions recorded thereon
  • a computer readable storage medium is not to be construed as being transitory signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through a waveguide or other transmission media (e.g., light pulses passing through a fiber-optic cable), or electrical signals transmitted through a wire.
  • Computer readable program instructions described herein can be downloaded to respective computing/processing devices from a computer readable storage medium or to an external computer or external storage device via a network, for example, the Internet, a local area network, a wide area network and/or a wireless network.
  • the network can comprise copper transmission cables, optical transmission fibers, wireless transmission, routers, firewalls, switches, gateway computers and/or edge servers.
  • a network adapter card or network interface in each computing/processing device receives computer readable program instructions from the network and forwards the computer readable program instructions for storage in a computer readable storage medium within the respective computing/processing device.
  • Computer readable program instructions for carrying out operations of the present invention can be assembler instructions, instruction-set-architecture (ISA) instructions, machine instructions, machine dependent instructions, microcode, firmware instructions, state-setting data, or either source code or object code written in any combination of one or more programming languages, including an object oriented programming language such as Smalltalk, C++ or the like, and conventional procedural programming languages, such as the “C” programming language or similar programming languages.
  • the computer readable program instructions can execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server.
  • the remote computer can be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection can be made to an external computer (for example, through the Internet using an Internet Service Provider).
  • electronic circuitry including, for example, programmable logic circuitry, field-programmable gate arrays (FPGA), or programmable logic arrays (PLA) can execute the computer readable program instructions by utilizing state information of the computer readable program instructions to personalize the electronic circuitry, in order to perform aspects of the present invention.
  • These computer readable program instructions can be provided to a processor of a general purpose computer, a special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
  • These computer readable program instructions can also be stored in a computer readable storage medium that can direct a computer, a programmable data processing apparatus, and/or other devices to function in a particular manner, such that the computer readable storage medium having instructions stored therein comprises an article of manufacture including instructions which implement aspects of the function/act specified in the flowchart and/or block diagram block or blocks.
  • the computer readable program instructions can also be loaded onto a computer, other programmable data processing apparatus, or other device to cause a series of operational steps to be performed on the computer, other programmable apparatus or other device to produce a computer implemented process, such that the instructions which execute on the computer, other programmable apparatus, or other device implement the functions/acts specified in the flowchart and/or block diagram block or blocks.
  • each block in the flowchart or block diagrams can represent a module, a segment, or a portion of instructions, which comprises one or more executable instructions for implementing the specified logical function(s).
  • the functions noted in the blocks can occur out of the order noted in the Figures.
  • two blocks shown in succession can, in fact, be executed substantially concurrently, or the blocks can sometimes be executed in the reverse order, depending upon the functionality involved.

Abstract

In an approach to improving resource downloads, one or more computer processors detect a request to download a resource from an original source to a user's computing device. The one or more computer processors determine a cost of the download of the requested resource from the original source. The one or more computer processors determine whether the cost of the download of the requested resource from the original source exceeds a predefined threshold. The one or more computer processors determine a group of trusted network connected endpoints. The one or more computer processors determine whether the requested resource exists in the group of trusted network connected endpoints. Responsive to determining the requested resource exists in the group of trusted network connected endpoints, the one or more computer processors download the requested resource from at least one of the trusted network connected endpoints.

Description

    BACKGROUND OF THE INVENTION
  • The present invention relates generally to the field of data processing, and more particularly to downloading digital resources.
  • Computer networks, for example, the Internet, provide information and contents which can be accessed via the network. Various types of files, such as program files, music files (e.g., MP3-files), or video files, can be downloaded via the Internet and then executed, for example, on a computing device to which the respective file was downloaded.
  • Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the application, forming a peer-to-peer network of nodes. Peers make a portion of their resources, such as processing power, disk storage or network bandwidth, directly available to other network participants, without the need for central coordination by servers or stable hosts. Peers are both suppliers and consumers of resources, in contrast to the traditional client-server model in which the consumption and supply of resources is divided. Emerging collaborative P2P systems are going beyond the era of peers doing similar things while sharing resources, and are looking for diverse peers that can bring in unique resources and capabilities to a virtual community thereby empowering it to engage in greater tasks beyond those that can be accomplished by individual peers, yet that are beneficial to all the peers.
  • SUMMARY
  • Embodiments of the present invention disclose a method, a computer program product, and a system for improving resource downloads. The method for improving resource downloads can include one or more computer processors detecting a request to download a resource from an original source to a user's computing device. The one or more computer processors determine a cost of the download of the requested resource from the original source. The one or more computer processors determine whether the cost of the download of the requested resource from the original source exceeds a predefined threshold. The one or more computer processors determine a group of trusted network connected endpoints. The one or more computer processors determine whether the requested resource exists in the group of trusted network connected endpoints. Responsive to determining the requested resource exists in the group of trusted network connected endpoints, the one or more computer processors download the requested resource from at least one of the trusted network connected endpoints.
  • BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS
  • FIG. 1 is a functional block diagram illustrating a distributed data processing environment, in accordance with an embodiment of the present invention;
  • FIG. 2 is a flowchart depicting operational steps of a download program, on a client computing device within the distributed data processing environment of FIG. 1, for improving resource downloads, in accordance with an embodiment of the present invention;
  • FIG. 3 depicts a block diagram of components of the client computing device executing the download program, in accordance with an embodiment of the present invention.
  • DETAILED DESCRIPTION
  • Computer users often download resources from remote servers without considering that the downloaded resource, such as a file, may already exist on the user's device. The downloaded resource can also exist on devices within a collection of trusted network connected endpoints, for example, devices belonging to friends in a social network that are in close proximity and can provide a better network path for downloading. Users tend to download resources directly from the source server because of the difficulty of searching for the same resource elsewhere, which can result in high bandwidth utilization at the server and additional time spent downloading.
  • Embodiments of the present invention recognize that efficiency can be gained by implementing a method to determine the best path to download a resource. Efficiency can also be gained by converting a client/server request for downloading a resource to an ad hoc immediate or scheduled peer-to-peer request by using a collection of trusted network connected endpoints, such as corporate or social networks. Implementation of embodiments of the invention can take a variety of forms, and exemplary implementation details are discussed subsequently with reference to the Figures.
  • FIG. 1 is a functional block diagram illustrating a distributed data processing environment, generally designated 100, in accordance with one embodiment of the present invention. FIG. 1 provides only an illustration of one implementation and does not imply any limitations with regard to the environments in which different embodiments can be implemented. Many modifications to the depicted environment can be made by those skilled in the art without departing from the scope of the invention as recited by the claims.
  • Distributed data processing environment 100 includes server computer 104 and client computing devices 106, 108, and 110, all interconnected over network 102. Network 102 can be, for example, a telecommunications network, a local area network (LAN), a wide area network (WAN), such as the Internet, or a combination of the three, and can include wired, wireless, or fiber optic connections. Network 102 can include one or more wired and/or wireless networks that are capable of receiving and transmitting data, voice, and/or video signals, including multimedia signals that include voice, data, and video information.
  • Server computer 104 can be a management server, a web server, or any other electronic device or computing system capable of receiving and sending data. In other embodiments, server computer 104 can represent a server computing system utilizing multiple computers as a server system, such as in a cloud computing environment. In another embodiment, server computer 104 can be a laptop computer, a tablet computer, a netbook computer, a personal computer (PC), a desktop computer, a personal digital assistant (PDA), a smart phone, or any programmable electronic device capable of communicating with client computing devices 106, 108, and 110 via network 102. In another embodiment, server computer 104 represents a computing system utilizing clustered computers and components to act as a single pool of seamless resources. In one embodiment, server computer 104 includes one or more social networks. In another embodiment, one or more social networks can exist as separate components of distributed data processing environment 100 (not shown).
  • Each of client computing devices 106, 108, and 110 can be a desktop computer, a laptop computer, a tablet computer, a specialized computer server, a personal digital assistant (PDA), a smart phone, or any programmable electronic device capable of communicating with server computer 104, as well as with each other, via network 102 and with various components and devices within distributed data processing environment 100. In general, client computing devices 106, 108, and 110 represent any programmable electronic device or combination of programmable electronic devices capable of executing machine readable program instructions and communicating with other computing devices via a network, such as network 102. Client computing device 110 includes download program 112 and database 120.
  • Download program 112 intercepts and converts a client/server request for resource download to an adhoc immediate or scheduled peer-to-peer request by using a collection of trusted network connected endpoints, such as devices belonging to friends in a social network. Download program 112 assumes that contacts made through a user's organization or social networks can be trusted. Download program 112 intercepts a user request from the user of client computing device 110 for a resource download from server computer 104. After download program 112 determines that the version of the resource has not been previously downloaded and that the cost of the download exceeds a threshold, download program 112 uses one or more social networks to find contacts available to source the resource. Download program 112 selects one or more optimum neighbors and converts the request into an immediate or scheduled peer-to-peer resource transfer. Download program 112 includes user download request interceptor 114, download history manager 116, and alternative download source presenter 118. Download program 112 is depicted and described in further detail with respect to FIG. 2.
  • Download request interceptor 114 intercepts a user's download request as soon as the user selects a resource for download. Download request interceptor 114 prompts the user to provide information such as email address, cell phone number, social network identification, and organization details, including the user's email address in the organization domain. Download request interceptor 114 also collects the IP address of the user's client computing device, such as client computing device 110. If client computing device 110 is a PDA, download request interceptor 114 automatically captures the PDA ID. Download request interceptor 114 can also capture an International Mobile Station Equipment Identity (IMEI) number if client computing device 110 is a mobile phone. Download request interceptor 114 stores the collected information in a database table, such as in database 120, for future reference. Download request interceptor 114 passes the collected information to download history manager 116.
  • Download history manager 116 retrieves historic information of previous resource downloads from the same source as the request and compares the information with the current user's identification information. Download history manager 116 approaches the historic information in a bottoms up manner. Download history manager 116 first tries to match the user's IP address with an entry in a list of historic IP addresses. If download history manager 116 finds a match, download history manager 116 recommends that the user check the user's system for the resource, as the user may have already downloaded the requested resource at an earlier time. If download history manager 116 does not find a match, download history manager 116 next tries to find a match in the user's organization domain and in the user's social network community and tries to find at least one contact that has downloaded the requested resource in the past. If download history manager 116 finds a list of suitable candidates, download history manager 116 passes the list to alternative download source presenter 118.
  • Alternative download source presenter 118 receives the list of downloads from download history manager 116, and prioritizes the list by feasibility of downloading the target resource with minimal bandwidth and time. The first priority is the user with same IP address, i.e., the requesting user has downloaded the same resource in the past. The next priority is a peer user that belongs to the same organization domain. The last priority, typically, is a user in the requesting user's social network. Alternative download source presenter 118 presents the list to the user. Alternative download source presenter 118 can also add flags to the list to indicate users that are currently online so that the requesting user can contact a peer immediately to obtain the resource.
  • Database 120 resides on client computing device 110. In another embodiment, database 120 can reside on client computing device 106 or 108, or elsewhere in the environment. A database is an organized collection of data. Database 120 can be implemented with any type of storage device capable of storing data that can be accessed and utilized by client computing device 110, such as a database server, a hard disk drive, or a flash memory. In other embodiments, database 120 can represent multiple storage devices within client computing device 110. Database 120 stores downloaded resources. Database 120 also stores identification information collected by download request interceptor 114.
  • FIG. 2 is a flowchart depicting operational steps of download program 112, on client computing device 110 within distributed data processing environment 100 of FIG. 1, for improving resource downloads, in accordance with an embodiment of the present invention.
  • Download program 112 detects a request for a resource download (step 202). Using download request interceptor 114, download program 112 detects the user's selection of a resource download and intercepts the request prior to the execution of the download by client computing device 110 from server computer 104.
  • Download program 112 determines whether the selected resource has been downloaded before (decision block 204). Using download history manager 116, download program 112 retrieves historic information of previous downloads, for example, the device download history, to determine whether the current version of the selected resource was downloaded to client computing device 110 in the past. If download program 112 determines that the requested resource was downloaded prior to the current request (“yes” branch, decision block 204), then download program 112 notifies the user of the resource location (step 210). Download program 112 notifies the user that the requested resource already resides on client computing device 110 and provides the user with the location address of the resource. Download program 112 also aborts the current download request.
  • If download program 112 determines that the requested resource has not been downloaded in the past (“no” branch, decision block 204), then download program 112 determines whether social information is available (decision block 206). Social information associated with the user can include social network IDs for networks such as Facebook®, LinkedIn®, Twitter®, etc. Social information associated with the user can also include contact information, organization email address, corporate chat ID, etc. Social information can be stored in database 120. If download program 112 determines that social information is not available (“no” branch, decision block 206), then download program 112 requests social information from the user (step 208). Download program 112 can prompt the user to input social information through a series of interactive questions. Download program 112 can also prompt the user to input social information by providing a form for the user to complete.
  • If the social information is available (“yes” branch, decision block 206) or if the user has provided the social information in step 208, download program 112 determines the cost of downloading the requested resource from a server, such as server computer 104 (step 212). The cost of the download can be measured by the amount of time or bandwidth required to download the resource from a particular source. The cost can also be measured by the size of the file. In addition, bandwidth and cost can be translated into a financial measurement.
  • Responsive to determining the cost of downloading the resource from server computer 104, download program 112 determines whether the cost of the download exceeds a predefined threshold (decision block 214). The download cost threshold can be predefined based on the measurement method. For example, if the measurement method is bandwidth, then the download cost threshold can be set to five Mbits/second. If, for example, the measurement method is time required to download the resource, then the download cost threshold can be set to five seconds. In one embodiment, the user sets the predefined threshold. In another embodiment, the organization can set the predefined threshold. If the cost of the download does not exceed the threshold (“no” branch, decision block 214), then download program 112 downloads the requested resource from server computer 104 (step 232), per the original request.
  • If download program 112 determines that the cost of the download does exceed the threshold (“yes” branch, decision block 214), then download program 112 determines a group of trusted network connected endpoints (step 216). The group of trusted network connected endpoints can include contacts from a plurality of sources. For example, the group of trusted network connected endpoints can be a friend list in a social network, such as Facebook® or LinkedIn®, or a set of Twitter® handles that the user has followed or interacted with at some predetermined frequency in the past. In another example, the group of trusted network connected endpoints can be obtained from a list of email and phone book contacts with a history of message exchanges in the past. In a further example, the group of trusted network connected endpoints can be obtained from a wireless device discovery protocol, such as Bluetooth®, for finding devices in physical proximity which allow themselves to be discovered and connected to. Users in the group of trusted network connected endpoints can include users of client computing devices 106 and 108. In one embodiment, download program 112 can prioritize the search for the group of trusted network connected endpoints by looking first in the user's organization domain for any user whose organization email ID matches that of the user. In one embodiment, the prioritization of the search groups is based on a program default. In another embodiment, the prioritization of the search groups can be based on user preference.
  • Download program 112 queries the group (step 218). In one embodiment, using download history manager 116, download program 112 sends a query message to the devices associated with the group of trusted network connected endpoints to determine whether any member of the group already has the requested resource, for example, client computing device 106 and client computing device 108.
  • Download program 112 determines whether the requested resource exists in the group (decision block 220). If download program 112 determines the requested resource does not exist in the group (“no” branch, decision block 220), then download program 112 downloads the requested resource from server computer 104 (step 232), per the original request. In one embodiment, if download program 112 determines the requested resource does not exist in the group, download program 112, using download history manager 116, can continue to search for another group of trusted network connected endpoints to which download program 112 can forward the query. The query can be propagated to a pre-configured depth across a social network of trusted network connected endpoints. For example, if the user of client computing device 110 is connected, via a social network, to a user of client computing device 106, then download history manager 116 determines whether the requested resource exists on client computing device 106. If download history manager 116 determines the resource is not on client computing device 106, then download history manager 116 can propagate the query to the social network of the user of client computing device 106. If the user of client computing device 106 is connected, via a social network, to a user of client computing device 108, then download history manager 116 determines whether the requested resource is on client computing device 108. This sequence continues through the pre-configured depth across the social network.
  • If download program 112 determines the requested resource does exist in the group (“yes” branch, decision block 220), then download program 112 receives a response to the query (step 222). If the requested resource exists in any of the trusted network connected endpoint devices, such as client computing device 106 or client computing device 108, download program 112 receives a response message from the one or more devices that have the requested resource. The message can be received through a plurality of possible network paths. For example, the message can be received through a special TCP/IP encapsulated packet, and SMS encapsulated message, a Bluetooth® response, or a local wifi connection. The received message can include metadata regarding the size of the resource, possible network paths, and protocol through which the resource can be transferred, for example, FTP, HTTP, SMS/MMS, email attachment, or Bluetooth® file transfer.
  • Download program 112 determines the endpoint with the lowest cost (step 224). Using alternative download source presenter 118, download program 112 lists the available sources from which the resource can be downloaded by lowest cost, i.e., lowest required bandwidth or time. In one embodiment, alternative download source presenter 118 can prioritize the list by users in the same domain, or peer users, followed by contacts in the requesting user's social network. In another embodiment, alternative download source presenter 118 can prioritize the list by users that are currently online, such that download program 112 can obtain the resource immediately. In one embodiment, download program 112 determines the cost of downloading the resource from each contact on the list by inspecting the information in the response packet and attempting a test connection to the source trusted endpoint to determine the current network bandwidth and path to the responding endpoint over the supported protocols specified in the response. In another embodiment, download program 112 can determine the cost of downloading the resource from each contact on the list by receiving an offer to initiate a connection by the trusted endpoint device for a specified cost. Download program 112 can evaluate the cost of receiving the resource via a push versus a pull model, and determine which method is faster. In one embodiment, more than one contact on the list can have the equivalent lowest cost of downloading.
  • Download program 112 determines whether peer-to-peer communication can be established (decision block 226). Download program 112 determines whether the peer-to-peer communication between client computing device 110 and the client computing device of the trusted network connected endpoint with the lowest cost of downloading the resource can be established. If download program 112 determines that peer-to-peer communication can be established (“yes” branch, decision block 226), then download program 112 converts the intercepted client/server download request to a peer-to-peer download request and downloads the resource from the peer client computing device (step 230). In one embodiment, if download program 112 finds multiple sources from which to download at the lowest cost, download program 112 can split the download across the multiple sources.
  • If download program 112 determines that peer-to-peer communication cannot be established (“no” branch, decision block 226), then download program 112 schedules the resource download for a future time (step 228). If communication cannot be established immediately but can be established in the future, then download program 112 can schedule the peer-to-peer download for a later time. For example, if the trusted network endpoint connection is on client computing device 106 through an instant messaging program, but the user of client computing device 106 is not currently online, then download program 112 can schedule the peer-to-peer download for a time when the user of client computing device 106 is online. Once download program 112 makes the connection, download program 112 downloads the requested resource from the peer client computing device (step 230).
  • In an embodiment, download program 112 can receive a stream of real time information such as a video stream or a Voice-over-Internet Protocol (VoIP) signal from a second client computing device. For example, a user of client computing device 106 is in a coffee shop, watching a live stream of a sports game on client computing device 106. The user of client computing device 110, interested in watching the same sports game, can use download program 112 to download the video stream of the sports game from client computing device 106 to client computing device 110 via peer-to-peer communication.
  • FIG. 3 depicts a block diagram of components of client computing device 110 executing download program 112, in accordance with an embodiment of the present invention. It should be appreciated that FIG. 3 provides only an illustration of one implementation and does not imply any limitations with regard to the environments in which different embodiments can be implemented. Many modifications to the depicted environment can be made.
  • Client computing device 110 includes communications fabric 302, which provides communications between computer processor(s) 304, memory 306, persistent storage 308, communications unit 310, and input/output (I/O) interface(s) 312. Communications fabric 302 can be implemented with any architecture designed for passing data and/or control information between processors (such as microprocessors, communications and network processors, etc.), system memory, peripheral devices, and any other hardware components within a system. For example, communications fabric 302 can be implemented with one or more buses.
  • Memory 306 and persistent storage 308 are computer readable storage media. In this embodiment, memory 306 includes random access memory (RAM) 314 and cache memory 316. In general, memory 306 can include any suitable volatile or non-volatile computer readable storage media.
  • Download program 112 and database 120 are stored in persistent storage 308 for execution and/or access by one or more of the respective computer processor(s) 304 via one or more memories of memory 306. In this embodiment, persistent storage 308 includes a magnetic hard disk drive. Alternatively, or in addition to a magnetic hard disk drive, persistent storage 308 can include a solid-state hard drive, a semiconductor storage device, a read-only memory (ROM), an erasable programmable read-only memory (EPROM), a flash memory, or any other computer readable storage media that is capable of storing program instructions or digital information.
  • The media used by persistent storage 308 can also be removable. For example, a removable hard drive can be used for persistent storage 308. Other examples include optical and magnetic disks, thumb drives, and smart cards that are inserted into a drive for transfer onto another computer readable storage medium that is also part of persistent storage 308.
  • Communications unit 310, in these examples, provides for communications with other data processing systems or devices, including resources of server computer 104 and client computing devices 106 and 108. In these examples, communications unit 310 includes one or more network interface cards. Communications unit 310 can provide communications through the use of either or both physical and wireless communications links. Download program 112 and database 120 can be downloaded to persistent storage 308 through communications unit 310.
  • I/O interface(s) 312 allows for input and output of data with other devices that can be connected to client computing device 110. For example, I/O interface(s) 312 can provide a connection to external device(s) 318 such as a keyboard, a keypad, a touch screen, a microphone, a digital camera, and/or some other suitable input device. External device(s) 318 can also include portable computer readable storage media such as, for example, thumb drives, portable optical or magnetic disks, and memory cards. Software and data used to practice embodiments of the present invention, e.g., download program 112 and database 120, can be stored on such portable computer readable storage media and can be loaded onto persistent storage 308 via I/O interface(s) 312. I/O interface(s) 312 also connect to a display 320.
  • Display 320 provides a mechanism to display data to a user and can be, for example, a computer monitor.
  • The programs described herein are identified based upon the application for which they are implemented in a specific embodiment of the invention. However, it should be appreciated that any particular program nomenclature herein is used merely for convenience, and thus the invention should not be limited to use solely in any specific application identified and/or implied by such nomenclature.
  • The present invention can be a system, a method, and/or a computer program product. The computer program product can include a computer readable storage medium (or media) having computer readable program instructions thereon for causing a processor to carry out aspects of the present invention.
  • The computer readable storage medium can be any tangible device that can retain and store instructions for use by an instruction execution device. The computer readable storage medium can be, for example, but is not limited to, an electronic storage device, a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or any suitable combination of the foregoing. A non-exhaustive list of more specific examples of the computer readable storage medium includes the following: a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), a static random access memory (SRAM), a portable compact disc read-only memory (CD-ROM), a digital versatile disk (DVD), a memory stick, a floppy disk, a mechanically encoded device such as punch-cards or raised structures in a groove having instructions recorded thereon, and any suitable combination of the foregoing. A computer readable storage medium, as used herein, is not to be construed as being transitory signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through a waveguide or other transmission media (e.g., light pulses passing through a fiber-optic cable), or electrical signals transmitted through a wire.
  • Computer readable program instructions described herein can be downloaded to respective computing/processing devices from a computer readable storage medium or to an external computer or external storage device via a network, for example, the Internet, a local area network, a wide area network and/or a wireless network. The network can comprise copper transmission cables, optical transmission fibers, wireless transmission, routers, firewalls, switches, gateway computers and/or edge servers. A network adapter card or network interface in each computing/processing device receives computer readable program instructions from the network and forwards the computer readable program instructions for storage in a computer readable storage medium within the respective computing/processing device.
  • Computer readable program instructions for carrying out operations of the present invention can be assembler instructions, instruction-set-architecture (ISA) instructions, machine instructions, machine dependent instructions, microcode, firmware instructions, state-setting data, or either source code or object code written in any combination of one or more programming languages, including an object oriented programming language such as Smalltalk, C++ or the like, and conventional procedural programming languages, such as the “C” programming language or similar programming languages. The computer readable program instructions can execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer can be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection can be made to an external computer (for example, through the Internet using an Internet Service Provider). In some embodiments, electronic circuitry including, for example, programmable logic circuitry, field-programmable gate arrays (FPGA), or programmable logic arrays (PLA) can execute the computer readable program instructions by utilizing state information of the computer readable program instructions to personalize the electronic circuitry, in order to perform aspects of the present invention.
  • Aspects of the present invention are described herein with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer readable program instructions.
  • These computer readable program instructions can be provided to a processor of a general purpose computer, a special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks. These computer readable program instructions can also be stored in a computer readable storage medium that can direct a computer, a programmable data processing apparatus, and/or other devices to function in a particular manner, such that the computer readable storage medium having instructions stored therein comprises an article of manufacture including instructions which implement aspects of the function/act specified in the flowchart and/or block diagram block or blocks.
  • The computer readable program instructions can also be loaded onto a computer, other programmable data processing apparatus, or other device to cause a series of operational steps to be performed on the computer, other programmable apparatus or other device to produce a computer implemented process, such that the instructions which execute on the computer, other programmable apparatus, or other device implement the functions/acts specified in the flowchart and/or block diagram block or blocks.
  • The flowchart and block diagrams in the Figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods, and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams can represent a module, a segment, or a portion of instructions, which comprises one or more executable instructions for implementing the specified logical function(s). In some alternative implementations, the functions noted in the blocks can occur out of the order noted in the Figures. For example, two blocks shown in succession can, in fact, be executed substantially concurrently, or the blocks can sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts or carry out combinations of special purpose hardware and computer instructions.
  • The descriptions of the various embodiments of the present invention have been presented for purposes of illustration, but are not intended to be exhaustive or limited to the embodiments disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the invention. The terminology used herein was chosen to best explain the principles of the embodiment, the practical application or technical improvement over technologies found in the marketplace, or to enable others of ordinary skill in the art to understand the embodiments disclosed herein.

Claims (20)

What is claimed is:
1. A method for improving resource downloads, the method comprising:
detecting a request to download a resource from an original source to a user's computing device;
determining a cost of the download of the requested resource from the original source;
determining whether the cost of the download of the requested resource from the original source exceeds a predefined threshold;
responsive to determining the cost of the download of the requested resource from the original source exceeds a predefined threshold, determining a group of trusted network connected endpoints;
determining whether the requested resource exists in the group of trusted network connected endpoints; and
responsive to determining the requested resource exists in the group of trusted network connected endpoints, downloading the requested resource from at least one of the trusted network connected endpoints,
wherein the steps are carried out by one or more computer processors.
2. The method of claim 1, further comprising:
responsive to detecting a request to download a resource from an original source to a user's computing device, determining whether the requested resource has been downloaded to the user's computing device in the past; and
responsive to determining the requested resource has been downloaded to the user's computing device in the past, notifying the user of a location of the requested resource on the user's computing device.
3. The method of claim 1, further comprising:
responsive to detecting a request to download a resource from an original source to a user's computing device, determining whether social information associated with the user is available on the user's computing device; and
responsive to determining the social information associated with the user is not available on the user's computing device, requesting social information from the user, wherein social information includes at least: a social network identification, a contact information, an organization email address, and a corporate chat identification.
4. The method of claim 1, further comprising, responsive to determining the requested resource exists in the group of trusted network connected endpoints, determining one or more endpoints from which the requested resource can be downloaded for a lowest cost.
5. The method of claim 1, wherein the cost of the download of the requested resource includes at least one of: a measurement of bandwidth and a measurement of time.
6. The method of claim 1, further comprising:
responsive to determining the requested resource exists in the group of trusted network connected endpoints, determining whether a peer-to-peer communication path can be established with at least one of the trusted network connected endpoints; and
responsive to determining a peer-to-peer communication path can be established with at least one of the trusted network connected endpoints, downloading the requested resource from the at least one of the trusted network connected endpoints.
7. The method of claim 6, further comprising:
responsive to determining a peer-to-peer communication path cannot be established with at least one of the trusted network connected endpoints, scheduling a download of the requested resource from the at least one of the trusted network connected endpoints for a future time; and
downloading the requested resource from the at least one of the trusted network connected endpoints.
8. The method of claim 1, further comprising, responsive to determining the cost of the download of the requested resource from the original source does not exceed a predefined threshold, downloading the requested resource from the original source.
9. The method of claim 1, further comprising, responsive to determining the requested resource does not exist in the group of trusted network connected endpoints, downloading the requested resource from the original source.
10. The method of claim 1, wherein determining whether the requested resource exists in the group of trusted network connected endpoints further comprises propagating a query to a pre-configured depth across a social network of trusted network connected endpoints.
11. A computer program product for improving resource downloads, the computer program product comprising:
one or more computer readable storage media and program instructions stored on the one or more computer readable storage media, the program instructions comprising:
program instructions to detect a request to download a resource from an original source to a user's computing device;
program instructions to determine a cost of the download of the requested resource from the original source;
program instructions to determine whether the cost of the download of the requested resource from the original source exceeds a predefined threshold;
responsive to determining the cost of the download of the requested resource from the original source exceeds a predefined threshold, program instructions to determine a group of trusted network connected endpoints;
program instructions to determine whether the requested resource exists in the group of trusted network connected endpoints; and
responsive to determining the requested resource exists in the group of trusted network connected endpoints, program instructions to download the requested resource from at least one of the trusted network connected endpoints.
12. The computer program product of claim 11, further comprising:
responsive to detecting a request to download a resource from an original source to a user's computing device, program instructions to determine whether the requested resource has been downloaded to the user's computing device in the past; and
responsive to determining the requested resource has been downloaded to the user's computing device in the past, program instructions to notify the user of a location of the requested resource on the user's computing device.
13. The computer program product of claim 11, further comprising:
responsive to detecting a request to download a resource from an original source to a user's computing device, program instructions to determine whether social information associated with the user is available on the user's computing device; and
responsive to determining the social information associated with the user is not available on the user's computing device, program instructions to request social information from the user, wherein social information includes at least: a social network identification, a contact information, an organization email address, and a corporate chat identification.
14. The computer program product of claim 11, further comprising, responsive to determining the requested resource exists in the group of trusted network connected endpoints, program instructions to determine one or more endpoints from which the requested resource can be downloaded for a lowest cost.
15. The computer program product of claim 11, further comprising:
responsive to determining the requested resource exists in the group of trusted network connected endpoints, program instructions to determine whether a peer-to-peer communication path can be established with at least one of the trusted network connected endpoints; and
responsive to determining a peer-to-peer communication path can be established with at least one of the trusted network connected endpoints, program instructions to download the requested resource from the at least one of the trusted network connected endpoints.
16. A computer system for improving resource downloads, the computer system comprising:
one or more computer processors;
one or more computer readable storage media;
program instructions stored on the one or more computer readable storage media for execution by at least one of the one or more computer processors, the program instructions comprising:
program instructions to detect a request to download a resource from an original source to a user's computing device;
program instructions to determine a cost of the download of the requested resource from the original source;
program instructions to determine whether the cost of the download of the requested resource from the original source exceeds a predefined threshold;
responsive to determining the cost of the download of the requested resource from the original source exceeds a predefined threshold, program instructions to determine a group of trusted network connected endpoints;
program instructions to determine whether the requested resource exists in the group of trusted network connected endpoints; and
responsive to determining the requested resource exists in the group of trusted network connected endpoints, program instructions to download the requested resource from at least one of the trusted network connected endpoints.
17. The computer system of claim 16, further comprising:
responsive to detecting a request to download a resource from an original source to a user's computing device, program instructions to determine whether the requested resource has been downloaded to the user's computing device in the past; and
responsive to determining the requested resource has been downloaded to the user's computing device in the past, program instructions to notify the user of a location of the requested resource on the user's computing device.
18. The computer system of claim 16, further comprising:
responsive to detecting a request to download a resource from an original source to a user's computing device, program instructions to determine whether social information associated with the user is available on the user's computing device; and
responsive to determining the social information associated with the user is not available on the user's computing device, program instructions to request social information from the user, wherein social information includes at least: a social network identification, a contact information, an organization email address, and a corporate chat identification.
19. The computer system of claim 16, further comprising, responsive to determining the requested resource exists in the group of trusted network connected endpoints, program instructions to determine one or more endpoints from which the requested resource can be downloaded for a lowest cost.
20. The computer system of claim 16, further comprising:
responsive to determining the requested resource exists in the group of trusted network connected endpoints, program instructions to determine whether a peer-to-peer communication path can be established with at least one of the trusted network connected endpoints; and
responsive to determining a peer-to-peer communication path can be established with at least one of the trusted network connected endpoints, program instructions to download the requested resource from the at least one of the trusted network connected endpoints.
US14/501,999 2014-09-30 2014-09-30 Optimizing resource downloads or streams using a collection of trusted network connected endpoints Abandoned US20160094653A1 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
US14/501,999 US20160094653A1 (en) 2014-09-30 2014-09-30 Optimizing resource downloads or streams using a collection of trusted network connected endpoints
US15/012,605 US9420041B2 (en) 2014-09-30 2016-02-01 Optimizing resource downloads or streams using a collection of trusted network connected endpoints
US15/178,266 US9531804B2 (en) 2014-09-30 2016-06-09 Optimizing resource downloads or streams using a collection of trusted network connected endpoints
US15/287,813 US9628559B2 (en) 2014-09-30 2016-10-07 Optimizing resource downloads or streams using a collection of trusted network connected endpoints

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US14/501,999 US20160094653A1 (en) 2014-09-30 2014-09-30 Optimizing resource downloads or streams using a collection of trusted network connected endpoints

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US15/012,605 Continuation US9420041B2 (en) 2014-09-30 2016-02-01 Optimizing resource downloads or streams using a collection of trusted network connected endpoints

Publications (1)

Publication Number Publication Date
US20160094653A1 true US20160094653A1 (en) 2016-03-31

Family

ID=55585786

Family Applications (4)

Application Number Title Priority Date Filing Date
US14/501,999 Abandoned US20160094653A1 (en) 2014-09-30 2014-09-30 Optimizing resource downloads or streams using a collection of trusted network connected endpoints
US15/012,605 Expired - Fee Related US9420041B2 (en) 2014-09-30 2016-02-01 Optimizing resource downloads or streams using a collection of trusted network connected endpoints
US15/178,266 Expired - Fee Related US9531804B2 (en) 2014-09-30 2016-06-09 Optimizing resource downloads or streams using a collection of trusted network connected endpoints
US15/287,813 Expired - Fee Related US9628559B2 (en) 2014-09-30 2016-10-07 Optimizing resource downloads or streams using a collection of trusted network connected endpoints

Family Applications After (3)

Application Number Title Priority Date Filing Date
US15/012,605 Expired - Fee Related US9420041B2 (en) 2014-09-30 2016-02-01 Optimizing resource downloads or streams using a collection of trusted network connected endpoints
US15/178,266 Expired - Fee Related US9531804B2 (en) 2014-09-30 2016-06-09 Optimizing resource downloads or streams using a collection of trusted network connected endpoints
US15/287,813 Expired - Fee Related US9628559B2 (en) 2014-09-30 2016-10-07 Optimizing resource downloads or streams using a collection of trusted network connected endpoints

Country Status (1)

Country Link
US (4) US20160094653A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111343217A (en) * 2018-12-18 2020-06-26 阿里巴巴集团控股有限公司 Resource data downloading method and device, terminal equipment and computer storage medium
US10785334B2 (en) * 2015-06-03 2020-09-22 Telefonaktiebolaget Lm Ericsson (Publ) Implanted agent within a first service container for enabling a reverse proxy on a second container
US20210176276A1 (en) * 2019-12-06 2021-06-10 Bank Of America Corporation Machine learning-based event analysis for customized contract generation and negotiation in enhanced security peer-to-peer interaction applications
US11171900B1 (en) * 2018-03-14 2021-11-09 Whatsapp Llc Techniques for media endpoint configuration

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108419252B (en) * 2017-02-09 2021-09-14 成都鼎桥通信技术有限公司 Method and device for group resource complementary establishment and user equipment
US10264054B2 (en) 2017-02-10 2019-04-16 International Business Machines Corporation Predictive device to device file transfer system for local cloud storage files
US10922118B2 (en) * 2018-05-11 2021-02-16 International Business Machines Corporation Distributed container image repository service
US11178537B2 (en) 2019-01-24 2021-11-16 International Business Machines Corporation Data item transfer between mobile devices

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020198963A1 (en) * 2001-06-21 2002-12-26 Wu Alex C. Method of timer based download and playback scheme for internet browser
US6661797B1 (en) * 2000-02-28 2003-12-09 Lucent Technologies Inc. Quality of service based path selection for connection-oriented networks
US20060117378A1 (en) * 2004-11-04 2006-06-01 Tam Chung M System and method for creating a secure trusted social network
US20070183342A1 (en) * 2006-02-06 2007-08-09 Mediazone.Com, Inc. Peer-to-peer broadcast management system
US20120058774A1 (en) * 2010-09-02 2012-03-08 Pantech Co., Ltd. Apparatus and method for displaying augmented reality information
US20120150960A1 (en) * 2010-12-13 2012-06-14 Gargi Nalawade Social Networking
US20120317293A1 (en) * 2010-04-14 2012-12-13 Huawei Technologies Co., Ltd. Peer selection method, network device, and system
US20130073727A1 (en) * 2010-05-20 2013-03-21 Telefonaktiebolaget L M Ericsson (Publ) System and method for managing data delivery in a peer-to-peer network
US20130239133A1 (en) * 2007-03-12 2013-09-12 Crackle, Inc. System and method for making a content item, resident or accessible on one resource, available through another
US20140156687A1 (en) * 2011-05-31 2014-06-05 Qiliang Chen Identifying duplicate files
US20140349571A1 (en) * 2013-05-24 2014-11-27 International Business Machines Corporation Method, Apparatus and Computer Program Product Providing Performance and Energy Optimization for Mobile Computing
US20150099483A1 (en) * 2013-10-04 2015-04-09 Samsung Electronics Co., Ltd. System and method for data usage management in an electronic device

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6842770B1 (en) 2000-08-18 2005-01-11 Apple Computer, Inc. Method and system for seamlessly accessing remotely stored files
US8370420B1 (en) 2002-07-11 2013-02-05 Citrix Systems, Inc. Web-integrated display of locally stored content objects
US8520535B2 (en) 2007-05-31 2013-08-27 International Business Machines Corporation Optimization process and system for a heterogeneous ad hoc Network
US8340717B2 (en) 2008-12-04 2012-12-25 Sony Ericsson Mobile Communications Ab Method and device for downloading a file via a network
US8402497B2 (en) 2009-02-05 2013-03-19 Purplecomm Inc. Meta channel network-based content download technology
US8280958B2 (en) 2009-07-13 2012-10-02 International Business Machines Corporation List passing in a background file sharing network
EP2372576A1 (en) 2010-03-30 2011-10-05 British Telecommunications public limited company Federated file distribution
US8639781B1 (en) 2012-10-19 2014-01-28 Dropbox, Inc. Systems and methods for downloading files
US20150127715A1 (en) * 2013-11-04 2015-05-07 Viasat Inc. Decoupled dictionary and transmission services over communications networks

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6661797B1 (en) * 2000-02-28 2003-12-09 Lucent Technologies Inc. Quality of service based path selection for connection-oriented networks
US20020198963A1 (en) * 2001-06-21 2002-12-26 Wu Alex C. Method of timer based download and playback scheme for internet browser
US20060117378A1 (en) * 2004-11-04 2006-06-01 Tam Chung M System and method for creating a secure trusted social network
US20070183342A1 (en) * 2006-02-06 2007-08-09 Mediazone.Com, Inc. Peer-to-peer broadcast management system
US20130239133A1 (en) * 2007-03-12 2013-09-12 Crackle, Inc. System and method for making a content item, resident or accessible on one resource, available through another
US20120317293A1 (en) * 2010-04-14 2012-12-13 Huawei Technologies Co., Ltd. Peer selection method, network device, and system
US20130073727A1 (en) * 2010-05-20 2013-03-21 Telefonaktiebolaget L M Ericsson (Publ) System and method for managing data delivery in a peer-to-peer network
US20120058774A1 (en) * 2010-09-02 2012-03-08 Pantech Co., Ltd. Apparatus and method for displaying augmented reality information
US20120150960A1 (en) * 2010-12-13 2012-06-14 Gargi Nalawade Social Networking
US20140156687A1 (en) * 2011-05-31 2014-06-05 Qiliang Chen Identifying duplicate files
US20140349571A1 (en) * 2013-05-24 2014-11-27 International Business Machines Corporation Method, Apparatus and Computer Program Product Providing Performance and Energy Optimization for Mobile Computing
US20150099483A1 (en) * 2013-10-04 2015-04-09 Samsung Electronics Co., Ltd. System and method for data usage management in an electronic device

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10785334B2 (en) * 2015-06-03 2020-09-22 Telefonaktiebolaget Lm Ericsson (Publ) Implanted agent within a first service container for enabling a reverse proxy on a second container
US11171900B1 (en) * 2018-03-14 2021-11-09 Whatsapp Llc Techniques for media endpoint configuration
CN111343217A (en) * 2018-12-18 2020-06-26 阿里巴巴集团控股有限公司 Resource data downloading method and device, terminal equipment and computer storage medium
US20210176276A1 (en) * 2019-12-06 2021-06-10 Bank Of America Corporation Machine learning-based event analysis for customized contract generation and negotiation in enhanced security peer-to-peer interaction applications
US11777990B2 (en) * 2019-12-06 2023-10-03 Bank Of America Corporation Machine learning-based event analysis for customized contract generation and negotiation in enhanced security peer-to-peer interaction applications

Also Published As

Publication number Publication date
US20160150007A1 (en) 2016-05-26
US20170019470A1 (en) 2017-01-19
US9628559B2 (en) 2017-04-18
US9531804B2 (en) 2016-12-27
US9420041B2 (en) 2016-08-16
US20160277493A1 (en) 2016-09-22

Similar Documents

Publication Publication Date Title
US9628559B2 (en) Optimizing resource downloads or streams using a collection of trusted network connected endpoints
US10069899B2 (en) System and method of secure file sharing using P2P
US10673988B2 (en) Creation, publication and display of content on a social media network
US20170324658A1 (en) Techniques for smart data routing
US8764567B2 (en) System and method for implementing turn-based online games
US20190087707A1 (en) Artificial conversational entity methods and systems
US20120311036A1 (en) Friend recommendation system and method
US20150154304A1 (en) System and method for providing knowledge sharing service based on user relationship information of social network service
US9792311B2 (en) System and method for managing a partitioned database of user relationship data
EP3138260A1 (en) Authentication mechanism
JP2018514025A (en) Technology for sharing and remixing media via a messaging system
US20120197976A1 (en) System and method for obtaining contacts from social networks and email systems
US10719890B1 (en) Machine learning system and method for clustering
US10877941B2 (en) Methods and systems for migrating public folders to online mailboxes
US20120310956A1 (en) System and method for processing graphs of user relationships in an online service
US20150163262A1 (en) Auto-launch of audio/video conference
WO2018133824A1 (en) Content sharing method and device
US20140279044A1 (en) System and method for omni-channel identity matching
US20160323214A1 (en) Condition-based online communication collaboration
US9172729B2 (en) Managing message distribution in a networked environment
US20140201233A1 (en) Method, device, and system for uploading data
US10218799B2 (en) Optimizing client distance to network nodes
US11606829B2 (en) Facilitation of data transmission in low connectivity areas
Villari A federated system for mapreduce-based video transcoding to face the future massive video-selfie sharing trend
US20190132420A1 (en) Temporal pinning of an entity to a data center

Legal Events

Date Code Title Description
AS Assignment

Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BALASUBRAMANIAN, SWAMINATHAN;DE, RADHA M.;DELPORT, ASHLEY D.;AND OTHERS;SIGNING DATES FROM 20140925 TO 20140929;REEL/FRAME:033852/0827

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION