US20190327140A1 - Subscriber configuration ingestion in a content delivery network - Google Patents

Subscriber configuration ingestion in a content delivery network Download PDF

Info

Publication number
US20190327140A1
US20190327140A1 US15/961,686 US201815961686A US2019327140A1 US 20190327140 A1 US20190327140 A1 US 20190327140A1 US 201815961686 A US201815961686 A US 201815961686A US 2019327140 A1 US2019327140 A1 US 2019327140A1
Authority
US
United States
Prior art keywords
configuration information
subscriber
services
platform configuration
particular subscriber
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US15/961,686
Inventor
Laurence Lipstone
Christopher Newton
William Crowder
Vikas Dogra
Kevin Johns
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Level 3 Communications LLC
Original Assignee
Level 3 Communications LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Level 3 Communications LLC filed Critical Level 3 Communications LLC
Priority to US15/961,686 priority Critical patent/US20190327140A1/en
Priority to EP18743897.3A priority patent/EP3785401B1/en
Priority to PCT/US2018/038991 priority patent/WO2019209355A1/en
Publication of US20190327140A1 publication Critical patent/US20190327140A1/en
Assigned to LEVEL 3 COMMUNICATIONS, LLC reassignment LEVEL 3 COMMUNICATIONS, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: LIPSTONE, LAURENCE, Johns, Kevin, CROWDER, WILLIAM, DOGRA, VIKAS, NEWTON, CHRISTOPHER
Priority to US18/117,164 priority patent/US11968084B2/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles
    • H04L67/306User profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0813Configuration setting characterised by the conditions triggering a change of settings
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0866Checking the configuration
    • H04L41/0869Validating the configuration within one network element
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/562Brokering proxy services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Definitions

  • This invention relates to content delivery and content delivery networks. More specifically, to subscriber configuration in content delivery networks and systems, frameworks, devices and methods supporting subscriber configuration in content delivery and content delivery networks.
  • FIG. 1 depicts aspects of a content delivery network (CDN) according to exemplary embodiments hereof;
  • CDN content delivery network
  • FIGS. 2 and 3 depict aspects of exemplary embodiments of real-time subscriber configuration ingestion according to exemplary embodiments hereof;
  • FIGS. 4A-4B depict aspects of platform configuration storage according to exemplary embodiments hereof.
  • FIG. 5 depicts aspects of computing according to exemplary embodiments hereof.
  • API means application program interface
  • CCS Customer Configuration Script
  • CD means content delivery
  • CDN means content delivery network
  • DNS means domain name system
  • GCO Global Configuration Object
  • REST (or RESTful) means Representational State Transfer.
  • a “mechanism” refers to any device(s), process(es), routine(s), service(s), module(s), or combination thereof.
  • a mechanism may be implemented in hardware, software, firmware, using a special-purpose device, or any combination thereof.
  • a mechanism may be integrated into a single device or it may be distributed over multiple devices. The various components of a mechanism may be co-located or distributed. The mechanism may be formed from other mechanisms.
  • the term “mechanism” may thus be considered shorthand for the term device(s) and/or process(es) and/or service(s).
  • a content delivery network distributes content (e.g., resources) efficiently to clients on behalf of one or more content providers (or subscribers), preferably via a public Internet.
  • Content providers provide their content (e.g., resources) via origin sources (origin servers or origins).
  • a CDN can also provide an over-the-top transport mechanism for efficiently sending content in the reverse direction—from a client to an origin server.
  • Both end-users (clients) and content providers benefit from using a CDN.
  • a content provider is able to take pressure off (and thereby reduce the load on) its own servers (e.g., its origin servers). Clients benefit by being able to obtain content with fewer delays.
  • FIG. 1 shows aspects of an exemplary CDN in which one or more content providers (or subscribers) 102 provide content via one or more origin sources 104 and delivery services (servers) 106 to clients 108 via one or more networks 110 .
  • the delivery services (servers) 106 may form a delivery network from which clients 108 may obtain content.
  • the delivery services 106 may be logically and/or physically organized hierarchically and may include edge caches.
  • the delivery services 106 may be logically and/or physically organized into clusters.
  • components of a CDN may use the CDN to deliver content to other CDN components.
  • a CDN component may itself be a client of the CDN.
  • the CDN may use its own infrastructure to deliver CDN content (e.g., CDN control and configuration information) to CDN components.
  • Client requests may be associated with delivery server(s) 106 by a rendezvous system 112 comprising rendezvous mechanism(s) 114 , possibly in the form of one or more rendezvous networks.
  • the rendezvous mechanism(s) 114 may be implemented, at least in part, using or as part of a DNS system, and the association of a particular client request (e.g., for content) with one or more delivery servers may be done as part of DNS processing associated with that particular client request (e.g., of a domain name associated with the particular client request).
  • multiple delivery servers 106 in the CDN can process or handle any particular client request for content (e.g., for one or more resources).
  • the rendezvous system 112 associates a particular client request with one or more “best” or “optimal” (or “least worst”) delivery servers 106 to deal with that particular request.
  • the “best” or “optimal” delivery server(s) 106 may be one(s) that is (are) close to the client (by some measure of network cost) and that is (are) not overloaded.
  • the chosen delivery server(s) 106 i.e., the delivery server(s) chosen by the rendezvous system 112 for a client request
  • a chosen delivery server 106 need not have the requested content at the time the request is made, even if that chosen delivery server 106 eventually serves the requested content to the requesting client.
  • the client When a client 108 makes a request for content, the client may be referred to as the requesting client, and the delivery server 106 that the rendezvous system 112 associates with that client request (and that the client first contacts to make the request) may be referred to as the “contact” server or just the contact.
  • CDNs are described in U.S. Pat. Nos. 8,060,613 and 8,925,930.
  • the CDN may include a control system 118 (formed from the various control services 120 ).
  • the control system 118 may be referred to as the control core or control mechanism.
  • the control mechanism 118 may include two sides, namely a side dedicated to accepting and managing the configurations provided by CDN users (or subscribers), and a side dedicated to controlling endpoint services (such as caches) based on established configurations.
  • the CDN may have or provide default policies and procedures for delivery and/or handling of subscriber content. These system defaults may be specified and/or contained in one or more system configuration files or objects. In addition, content providers (or subscribers) 102 may customize aspects of delivery and/or handling of their content by the CDN. The subscriber customizations may be specified and/or contained in one or more subscriber configuration files or objects. The system default configuration may be augmented, supplemented, and/or replaced, at least in part, by subscriber configurations.
  • the control system 118 may connect to/with delivery server(s) 106 and the rendezvous system 112 . This is represented in the drawing in FIG. 1 by the arrow to/from the control system 118 to the combined set of 106 and 112 .
  • This arrow may represent, e.g., sending config information to the delivery service (e.g., CCS/GCO files) and/or to rendezvous system 112 (e.g., alias updates).
  • Configuration may be maintained, controlled, and administered, at least in part, by configuration mechanism 122 .
  • Subscribers may access the configuration mechanism 122 via an appropriate interface, e.g., via configuration API 124 .
  • the configuration information may define, for a particular subscriber, for the subscriber's entire set of properties, how the CDN should handle those properties (e.g., how the CDN should service requests for that customer's properties). This may include, alias hostnames, origin servers from which to fill, and all policies associated with content associated with that subscriber.
  • the system preferably maintains one subscriber configuration per subscriber (or per property per subscriber).
  • FIGS. 2 and 3 depict aspects of exemplary embodiments of real-time subscriber configuration ingestion according to exemplary embodiments hereof.
  • subscriber configuration is modifiable directly by a subscriber or a subscriber's REST agent by invoking or calling the config API 124 .
  • the configuration modification is ingested into the network through a distributed set of applications and data stores.
  • a subscriber invokes or calls the configuration API (or Config API) 124 (at 1 in FIG. 3 ) to create or modify the subscriber's configuration.
  • the subscriber's configuration defines how the CDN deals with aspects of delivery and/or handling of that subscriber's content.
  • the subscriber's configuration may augment or modify or replace aspects of the system default configuration.
  • the Config API 124 may be a RESTful API server for creating and modifying a subscriber's configuration.
  • a REST client 200 that is authorized to access a subscriber configuration may read/modify/rollback the subscriber configuration.
  • the Config API 124 stores the subscriber's configuration in a distributed database cluster 202 (at 2 in FIG. 3 ).
  • Cassandra is used for the distributed database 202 .
  • Cassandra provides a distributed database management system designed to handle large amounts of data across many commodity servers, providing high availability with no single point of failure.
  • Cassandra may offer robust support for clusters spanning multiple datacenters, with asynchronous masterless replication allowing low latency operations for all clients.
  • the Cassandra cluster may be a multi-node, multi-datacenter Cassandra cluster for storing subscriber configuration information.
  • writes and reads offer a tunable level of consistency.
  • writes to the Cassandra cluster 202 are preferably done with a consistency level of LOCAL_QUORUM so that when a read is done with a LOCAL_QUORUM, data is always consistent.
  • a response from the Config API 124 will indicate (at 3 in FIG. 3 ) whether or not the write to the cluster 202 was successful (e.g., providing “success” indication).
  • the config API 124 publishes a message (at 4 in FIG. 3 ) to a messaging system 204 (e.g., Kafka® cluster) for (or to cause) generation of platform configuration.
  • a messaging system 204 e.g., Kafka® cluster
  • the messaging system 204 may be a multi-node Kafka® broker cluster that works as a high-throughput distributed messaging system.
  • Kafka® refers to Apache's distributed streaming platform, preferably with the following capabilities: Publish and subscribe to streams of records, similar to a message queue; Store streams of records in a fault-tolerant durable way; and process streams of records as they occur.
  • control core 118 consumes (or obtains) a message from the messaging system 204 .
  • the Config API 124 for platform config generation is lost (or missed) by control core 118 , so that the platform configuration is always in sync with the config data configured by the subscriber.
  • Config API 124 publishes messages to the cluster 204 which are consumed by the Control Core 118 .
  • the control core 118 preferably monitors the messaging system 204 and consumes messages for the control core 118 .
  • the control core 118 consumes messages (at 5 in FIG. 3 ) from a cluster of messaging system 204 for generating platform configurations for a subscriber.
  • LOCAL_QUORUM While reading subscriber configuration information from the Cassandra cluster 202 (at 6 in FIG. 3 ), a consistency level of LOCAL_QUORUM should ensure that there is no data loss and that the control core 118 gets the latest copy of the subscriber's data.
  • the control core 118 After consuming a message (at 5 in FIG. 3 ), the control core 118 reads subscriber configuration data/information (e.g., subscriber metadata) (at 6 in FIG. 3 ) from the Cassandra cluster 202 and then generates and stores platform configurations (at 7 in FIG. 3 ).
  • subscriber configuration data/information e.g., subscriber metadata
  • the generated platform configurations are based, at least in part, on the subscriber configuration information read from the Cassandra cluster 202 .
  • the generated platform configurations are preferably also based on default and/or system-wide configurations and on CDN policies. As should be appreciated, while subscribers may be able to create and/or modify configurations, such configurations should comply with CDN policies.
  • the generated platform configuration contains the newly modified changes in platform aware language.
  • the control core 118 stores configuration data (e.g., platform configuration data) in a data store 206 and invalidates the prior configuration data (at 7 and 8 in FIG. 3 ). In order to invalidate prior configuration(s), the control core 118 may issue invalidation instructions to the network for configurations to be replaced by the newly generated platform configuration(s). While invalidation of control objects is the presently preferred approach, those of ordinary skill in the art will appreciate and understand, upon reading this description, that different and/or other approaches may be used. For example, the CDN may poll for changes to such objects.
  • configuration data e.g., platform configuration data
  • the control core 118 may issue invalidation instructions to the network for configurations to be replaced by the newly generated platform configuration(s). While invalidation of control objects is the presently preferred approach, those of ordinary skill in the art will appreciate and understand, upon reading this description, that different and/or other approaches may be used. For example, the CDN may poll for changes to such objects.
  • the system preferably maintains one subscriber configuration per subscriber (or per property per subscriber).
  • the platform configuration store 206 maintains the subscriber configurations for the CDN's subscribers.
  • the control core 118 may provide an interface (e.g., a REST API) for delivering the platform configurations to the CDN nodes.
  • an interface e.g., a REST API
  • CDN components 208 monitor the control core 118 for changes in the master journal (indicating potentially invalid content). Accordingly, in response to the control core 118 invalidating the platform config in the master journal (at 8 in FIG. 3 ), each CDN component (e.g., CDN delivery servers 106 , etc.) gets the updated master journal from the control core 118 (at 9 and 10 in FIG. 3 ). The CDN component(s) then request the new/modified platform configuration from the control core 118 (at 11 in FIG. 3 ).
  • CDN components 208 monitor the control core 118 for changes in the master journal (indicating potentially invalid content). Accordingly, in response to the control core 118 invalidating the platform config in the master journal (at 8 in FIG. 3 ), each CDN component (e.g., CDN delivery servers 106 , etc.) gets the updated master journal from the control core 118 (at 9 and 10 in FIG. 3 ). The CDN component(s) then request the new/modified platform configuration from the control core 118 (at 11 in FIG. 3
  • the control core 118 reads the platform configuration from the platform configuration storage (data store 206 ) (at 12 in FIG. 3 ), and then returns the platform configuration to the requesting CDN component (at 13 in FIG. 3 ).
  • a CDN component receiving configuration information may use that information as is or it may process the configuration information into local configuration information based, e.g., on the capabilities of the CDN component.
  • a CDN component e.g., a CDN delivery server 106
  • subscriber-specific handling e.g., subscriber-specific request/response processing
  • the configuration information in a subscriber's configuration may define, for the subscriber's entire set of properties, how the CDN should handle those properties (e.g., how the CDN should service requests for that customer's properties). This may include, alias hostnames, origin servers from which to fill, and all policies associated with content associated with that subscriber.
  • the system maintains one subscriber configuration per subscriber (or per property per subscriber).
  • Each subscriber has its own configuration information (which may be default). That is, the system maintains a single subscriber configuration for each subscriber, and that subscriber configuration defines all configuration details for all of that subscriber's content.
  • the current approach allows a subscriber to handle most or all content the same way, with differences expressed incrementally for that content to be handled differently.
  • An alternate approach is to have a CCS per resource or for smaller groups of resources of a subscriber, but this alternate approach misses the commonality that most subscribers use for most of their resources.
  • the subscriber-specific configuration information may be specified in so-called Customer Configuration Scripts (CCSs).
  • Customer-specific scripts may be used to process a customer's requests (i.e., requests for or associated with a subscriber's content), and may be associated with the customers/subscribers, e.g., via customer/subscriber identifiers.
  • FIG. 4A depicts aspects of platform configuration storage 206 according to exemplary embodiments hereof.
  • the platform configuration storage 206 may include subscriber configurations 400 , indexed by subscriber identifier.
  • subscriber j has subscriber configuration CCS#j, and so on.
  • the system may include a default subscriber configuration for each subscriber, to be used unless/until the configuration is modified.
  • a subscriber may be allocated a different subscriber id for each property, or the data structure 402 shown in FIG. 4B may be used.
  • a data structure (e.g., a Global Configuration Object or GCO) may be used to determine whether a request is associated with a CDN subscriber (and therefore, e.g., whether a requested resource can be served).
  • a GCO may include information that will allow a CDN component (e.g., a cache server) to determine whether a requested resource corresponds to a resource of a subscriber (or customer) of the CDN (or to a CDN resource). Essentially the CDN component may use the GCO to determine whether a resource belongs to a property configured to use the CDN. Since the GCO is a global control resource, common to all agents, (whereas other control resources (e.g., CCSs) are generally downloaded on demand), the GCO should be succinct.
  • An exemplary implementation of the customer (subscriber) configuration model uses a so-called “match rules” approach.
  • the match rules effectively act as mappings or lookup tables.
  • An exemplary implementation of the match rules is described here. As should be appreciated, configurations may use approaches other than match rules, and match rules may be implemented differently.
  • the exemplary match-rule model is table-driven. This has the advantage of readability, e.g., when setting a set of options slightly differently across a large number of aliases.
  • a basic Match Rule has the following format:
  • Each Match Rule may have a Match Rule ID that can be used to order rules and to provide jump targets.
  • Each Match Rule may be part of a Match Rule Group.
  • a Match Rule Group is a collection of Match Rules, with first-match-wins semantics.
  • the subscriber configuration has at least one collection of Match Rule Groups. In some cases two such collections may be used, one for processing on receipt of the request and the second for processing on the receipt of the response.
  • the two-collection configuration may only be needed at nodes, generally referred to as parent nodes, that contact the origin server.
  • Each Match Rule Group may be processed in a specified order (e.g., driven off of the numeric Match Rule Group ID in ascending order)—when a match is found, the processing associated with that match is performed, and by default processing then jumps to the start of the next Match Rule Group. Processing can jump to a distinct Match Rule, or processing can be halted (break) using the Followed-by element. If no Followed-by is specified, processing moves to the first element of the next Match Rule Group (if present).
  • a specified order e.g., driven off of the numeric Match Rule Group ID in ascending order
  • An exemplary Match Rule Group may look like:
  • Each Match Rule may specify one or more actions (e.g., setting cache expiration, cache key manipulation, content/header processing modes, etc.) directly.
  • An action may involve setting one or more flags.
  • the flag setting can be encapsulated within a Match Set. This is essentially the same as a Match Rule Group, but one that is not processed within the normal flow of processing; rather it is ‘called by reference’ when named within an executed Match Rule. If both a Match Set and explicitflagNames are provided within a single Match Rule, the Match Set is run first and then the explicitflagNames. This order can be altered via the optional MatchSetOrder which can specify that the MatchSet is either run first (the default), or last (i.e., after the explicitflagNames).
  • Matching means that the specified flag settings (explicit as well as via any MatchSet) are made, and processing for this Match Rule Group completes. Processing by default moves to the start of the next Match Rule Group, unless a Followed-by is specified in which case processing either completes completely (on break) or jumps to the Match Rule with a given ID (on jump-to ⁇ ID>).
  • $var. ⁇ name> A variable set on the request by an earlier rule. $cfgvar. ⁇ name> Local configuration variable. $map[ ⁇ N>]. ⁇ name> Result of Nth (starting from 0) map, counting from left to right in expression. “$map” is the same as “$map0”. ⁇ name> selects the value from the map. See ‘Maps' below.
  • transforms include:
  • lowercase( ⁇ arg>) convert any text in the presented string to lower case uppercase( ⁇ arg>) convert any text in the presented string to upper case pselect( ⁇ p>, ⁇ s> [, ⁇ ns>])
  • the pselect transform takes two or three arguments: a percentage value ⁇ p> (a floating point number), a string ⁇ s>, and an optional string ⁇ ns>. It evaluates to the string ⁇ s> ⁇ p> percent of the time, else, ⁇ ns> or an empty string if ⁇ ns> is not provided.
  • the ⁇ s> and ⁇ ns> strings are themselves subject to interpolation.
  • the pselect transform (with arguments ( ⁇ p>, ⁇ s>[, ⁇ ns>])) may be used, e.g., to distribute requests differently (e.g., to locations specified by string “s” or by string “ns”) based on the value of p. This may be used, e.g., to move a specified percentage of a library to a different server, in a consistent fashion, in the cases where the server normally responsible for the content is reporting that it is overloaded.
  • the expression syntax may also allow for a reference to a Map of data. These can be considered function calls; they return a Boolean value which is true when a match is found within the map and are able to set additional values that can then be referenced by name from the calling layer—the names of these ‘returned’ values are part of the definition of the map.
  • the map( ) call takes a list of one or more map names, and a string value to be passed into each as the key to be looked up.
  • This string (key) argument may be a simple value (e.g., $host) or the result of an expression—in particular, it may be the result of another map lookup.
  • the map( ) call returns a Boolean.
  • An alternate valuemap( ) call returns the actual value list from the matched entry.
  • a glob map or regexp map needs to be searched entry by entry until a match is found. As usual, a first-match-wins approach is taken. Since ranges could overlap (either with other ranges or with discrete values), the smallest range (or lowest value of ⁇ lo>) wins.
  • the list of names specified in the ValueNames attribute are the names that can then be used in the $map[$N]. ⁇ name> variable in the calling context. Such names are only available in the direct caller.
  • any ‘missing’ values are set to null/undef in the calling context, and are assumed to be the relevant number of trailing elements of any ValueNames list. null/undef can be placed within the values list to ‘skip’ unneeded entries.
  • the ‘DefaultValue’ provides an option to return a set of values on any call that does not match a keySpec. Note that this means that this MatchMap will always match.
  • the map operator matches the given value in the given map. If the map has a default value, or if there's a match in the map, the result is true and the rule is executed. As a side effect, it also makes available the pseudo-variable $map, from which values from the map can be selected using “. ⁇ ValueName>”.
  • This concept may be further extended to allow matching of multiple maps in a single “map” call. For example, to add a host ID to the above, we have:
  • a Query String Handling mode may be used to extend the MatchMap syntax and semantics.
  • the rules (not in matchrule/matchmap syntax) are as follows (where the default is “off”):
  • MatchMap may be extended as follows:
  • real time means near real time or sufficiently real time. It should be appreciated that there are inherent delays built in to the CDN (e.g., based on network traffic and distances), and these delays may cause delays in data reaching various components. Inherent delays in the system do not change the real-time nature of the data. In some cases, the term “real-time data” may refer to data obtained in sufficient time to make the data useful in providing feedback.
  • real time computation may refer to an online computation, i.e., a computation that produces its answer(s) as data arrive, and generally keeps up with continuously arriving data.
  • online computation is compared to an “offline” or “batch” computation.
  • Programs that implement such methods may be stored and transmitted using a variety of media (e.g., computer readable media) in a number of manners.
  • Hard-wired circuitry or custom hardware may be used in place of, or in combination with, some or all of the software instructions that can implement the processes of various embodiments.
  • various combinations of hardware and software may be used instead of software only.
  • FIG. 5 is a schematic diagram of a computer system 500 upon which embodiments of the present disclosure may be implemented and carried out.
  • the computer system 500 may include a bus 502 (i.e., interconnect), one or more processors 504 , a main memory 506 , read-only memory 508 , removable storage media 510 , mass storage 512 , and one or more communications ports 514 .
  • bus 502 i.e., interconnect
  • processors 504 i.e., central processing unit (CPU)
  • main memory 506 main memory
  • read-only memory 508 read-only memory 508
  • removable storage media 510 i.e., removable storage media
  • mass storage 512 i.e., magnetic tape, magnetic tape, and the like
  • communications ports 514 may be connected to one or more networks by way of which the computer system 500 may receive and/or transmit data.
  • a “processor” means one or more microprocessors, central processing units (CPUs), computing devices, microcontrollers, digital signal processors, or like devices or any combination thereof, regardless of their architecture.
  • An apparatus that performs a process can include, e.g., a processor and those devices such as input devices and output devices that are appropriate to perform the process.
  • Processor(s) 504 can be any known processor, such as, but not limited to, an Intel® Itanium® or Itanium 2® processor(s), AMD® Opteron® or Athlon MP® processor(s), or Motorola® lines of processors, and the like.
  • Communications port(s) 514 can be any of an RS-232 port for use with a modem based dial-up connection, a 10/100 Ethernet port, a Gigabit port using copper or fiber, or a USB port, and the like. Communications port(s) 514 may be chosen depending on a network such as a Local Area Network (LAN), a Wide Area Network (WAN), a CDN, or any network to which the computer system 500 connects.
  • the computer system 500 may be in communication with peripheral devices (e.g., display screen 516 , input device(s) 518 ) via Input/Output (I/O) port 520 .
  • peripheral devices e.g., display screen 516 , input device(s) 518
  • Main memory 506 can be Random Access Memory (RAM), or any other dynamic storage device(s) commonly known in the art.
  • Read-only memory 508 can be any static storage device(s) such as Programmable Read-Only Memory (PROM) chips for storing static information such as instructions for processor 504 .
  • Mass storage 512 can be used to store information and instructions. For example, hard disks such as the Adaptec® family of Small Computer Serial Interface (SCSI) drives, an optical disc, an array of disks such as Redundant Array of Independent Disks (RAID), such as the Adaptec® family of RAID drives, or any other mass storage devices may be used.
  • SCSI Small Computer Serial Interface
  • RAID Redundant Array of Independent Disks
  • Bus 502 communicatively couples processor(s) 504 with the other memory, storage, and communications blocks.
  • Bus 502 can be a PCI/PCI-X, SCSI, a Universal Serial Bus (USB) based system bus (or other) depending on the storage devices used, and the like.
  • Removable storage media 510 can be any kind of external hard-drives, floppy drives, IOMEGA® Zip Drives, Compact Disc-Read Only Memory (CD-ROM), Compact Disc-Re-Writable (CD-RW), Digital Versatile Disk-Read Only Memory (DVD-ROM), etc.
  • Embodiments herein may be provided as one or more computer program products, which may include a machine-readable medium having stored thereon instructions, which may be used to program a computer (or other electronic devices) to perform a process.
  • machine-readable medium refers to any medium, a plurality of the same, or a combination of different media, which participate in providing data (e.g., instructions, data structures) which may be read by a computer, a processor or a like device.
  • Such a medium may take many forms, including but not limited to, non-volatile media, volatile media, and transmission media.
  • Non-volatile media include, for example, optical or magnetic disks and other persistent memory.
  • Volatile media include dynamic random access memory, which typically constitutes the main memory of the computer.
  • Transmission media include coaxial cables, copper wire and fiber optics, including the wires that comprise a system bus coupled to the processor. Transmission media may include or convey acoustic waves, light waves and electromagnetic emissions, such as those generated during radio frequency (RF) and infrared (IR) data communications.
  • RF radio frequency
  • IR infrared
  • the machine-readable medium may include, but is not limited to, floppy diskettes, optical discs, CD-ROMs, magneto-optical disks, ROMs, RAMs, erasable programmable read-only memories (EPROMs), electrically erasable programmable read-only memories (EEPROMs), magnetic or optical cards, flash memory, or other type of media/machine-readable medium suitable for storing electronic instructions.
  • embodiments herein may also be downloaded as a computer program product, wherein the program may be transferred from a remote computer to a requesting computer by way of data signals embodied in a carrier wave or other propagation medium via a communication link (e.g., modem or network connection).
  • data may be (i) delivered from RAM to a processor; (ii) carried over a wireless transmission medium; (iii) formatted and/or transmitted according to numerous formats, standards or protocols; and/or (iv) encrypted in any of a variety of ways well known in the art.
  • a computer-readable medium can store (in any appropriate format) those program elements that are appropriate to perform the methods.
  • main memory 506 is encoded with application(s) 522 that supports the functionality discussed herein (the application 522 may be an application that provides some or all of the functionality of the CD services described herein, including the client application).
  • Application(s) 522 (and/or other resources as described herein) can be embodied as software code such as data and/or logic instructions (e.g., code stored in the memory or on another computer readable medium such as a disk) that supports processing functionality according to different embodiments described herein.
  • processor(s) 504 accesses main memory 506 via the use of bus 502 in order to launch, run, execute, interpret or otherwise perform the logic instructions of the application(s) 522 .
  • Execution of application(s) 522 produces processing functionality of the service related to the application(s).
  • the process(es) 524 represent one or more portions of the application(s) 522 performing within or upon the processor(s) 504 in the computer system 500 .
  • the application 522 itself (i.e., the un-executed or non-performing logic instructions and/or data).
  • the application 522 may be stored on a computer readable medium (e.g., a repository) such as a disk or in an optical medium.
  • the application 522 can also be stored in a memory type system such as in firmware, read only memory (ROM), or, as in this example, as executable code within the main memory 506 (e.g., within Random Access Memory or RAM).
  • ROM read only memory
  • executable code within the main memory 506 e.g., within Random Access Memory or RAM
  • application 522 may also be stored in removable storage media 510 , read-only memory 508 and/or mass storage device 512 .
  • the computer system 500 can include other processes and/or software and hardware components, such as an operating system that controls allocation and use of hardware resources.
  • embodiments of the present invention include various steps or operations. A variety of these steps may be performed by hardware components or may be embodied in machine-executable instructions, which may be used to cause a general-purpose or special-purpose processor programmed with the instructions to perform the operations. Alternatively, the steps may be performed by a combination of hardware, software, and/or firmware.
  • the term “module” refers to a self-contained functional component, which can include hardware, software, firmware or any combination thereof.
  • an apparatus may include a computer/computing device operable to perform some (but not necessarily all) of the described process.
  • Embodiments of a computer-readable medium storing a program or data structure include a computer-readable medium storing a program that, when executed, can cause a processor to perform some (but not necessarily all) of the described process.
  • process may operate without any user intervention.
  • process includes some human intervention (e.g., a step is performed by or with the assistance of a human).
  • the phrase “at least some” means “one or more,” and includes the case of only one.
  • the phrase “at least some services” means “one or more services”, and includes the case of one service.
  • the phrase “based on” means “based in part on” or “based, at least in part, on,” and is not exclusive.
  • the phrase “based on factor X” means “based in part on factor X” or “based, at least in part, on factor X.” Unless specifically stated by use of the word “only”, the phrase “based on X” does not mean “based only on X.”
  • the phrase “using” means “using at least,” and is not exclusive. Thus, e.g., the phrase “using X” means “using at least X.” Unless specifically stated by use of the word “only”, the phrase “using X” does not mean “using only X.”
  • the phrase “distinct” means “at least partially distinct.” Unless specifically stated, distinct does not mean fully distinct. Thus, e.g., the phrase, “X is distinct from Y” means that “X is at least partially distinct from Y,” and does not mean that “X is fully distinct from Y.” Thus, as used herein, including in the claims, the phrase “X is distinct from Y” means that X differs from Y in at least some way.
  • a list may include only one item, and, unless otherwise stated, a list of multiple items need not be ordered in any particular manner.
  • a list may include duplicate items.
  • the phrase “a list of CDN services” may include one or more CDN services.
  • portion means some or all. So, for example, “A portion of X” may include some of “X” or all of “X”. In the context of a conversation, the term “portion” means some or all of the conversation.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Information Transfer Between Computers (AREA)
  • Computer And Data Communications (AREA)

Abstract

A method on a device in a content delivery (CD) network (CDN) that distributes content on behalf of one or more subscribers. In response to receiving configuration information from a subscriber, the configuration information relating to at least one property of the subscriber, generating subscriber-specific platform configuration information for the at least one property. Storing the subscriber-specific platform configuration information in platform configuration storage. Invalidating prior platform configuration information associated with the particular subscriber. Responsive to a request from a CDN component for platform configuration information associated with the particular subscriber: obtaining the subscriber-specific platform configuration information from the platform configuration storage; and providing the subscriber-specific platform configuration information to the CDN component.

Description

    BACKGROUND OF THE INVENTION Copyright Statement
  • This patent document contains material subject to copyright protection. The copyright owner has no objection to the reproduction of this patent document or any related materials in the files of the United States Patent and Trademark Office, but otherwise reserves all copyrights whatsoever.
  • FIELD OF THE INVENTION
  • This invention relates to content delivery and content delivery networks. More specifically, to subscriber configuration in content delivery networks and systems, frameworks, devices and methods supporting subscriber configuration in content delivery and content delivery networks.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • Other objects, features, and characteristics of the present invention as well as the methods of operation and functions of the related elements of structure, and the combination of parts and economies of manufacture, will become more apparent upon consideration of the following description and the appended claims with reference to the accompanying drawings, all of which form a part of this specification.
  • FIG. 1 depicts aspects of a content delivery network (CDN) according to exemplary embodiments hereof;
  • FIGS. 2 and 3 depict aspects of exemplary embodiments of real-time subscriber configuration ingestion according to exemplary embodiments hereof;
  • FIGS. 4A-4B depict aspects of platform configuration storage according to exemplary embodiments hereof; and
  • FIG. 5 depicts aspects of computing according to exemplary embodiments hereof.
  • DETAILED DESCRIPTION OF THE PRESENTLY PREFERRED EXEMPLARY EMBODIMENTS Glossary
  • As used herein, unless used otherwise, the following terms or abbreviations have the following meanings:
  • API means application program interface;
  • CCS means Customer Configuration Script;
  • CD means content delivery;
  • CDN means content delivery network;
  • DNS means domain name system;
  • GCO means Global Configuration Object; and
  • REST (or RESTful) means Representational State Transfer.
  • A “mechanism” refers to any device(s), process(es), routine(s), service(s), module(s), or combination thereof. A mechanism may be implemented in hardware, software, firmware, using a special-purpose device, or any combination thereof. A mechanism may be integrated into a single device or it may be distributed over multiple devices. The various components of a mechanism may be co-located or distributed. The mechanism may be formed from other mechanisms. In general, as used herein, the term “mechanism” may thus be considered shorthand for the term device(s) and/or process(es) and/or service(s).
  • DESCRIPTION
  • A content delivery network (CDN or CD network) distributes content (e.g., resources) efficiently to clients on behalf of one or more content providers (or subscribers), preferably via a public Internet. Content providers provide their content (e.g., resources) via origin sources (origin servers or origins). A CDN can also provide an over-the-top transport mechanism for efficiently sending content in the reverse direction—from a client to an origin server. Both end-users (clients) and content providers benefit from using a CDN. Using a CDN, a content provider is able to take pressure off (and thereby reduce the load on) its own servers (e.g., its origin servers). Clients benefit by being able to obtain content with fewer delays.
  • FIG. 1 shows aspects of an exemplary CDN in which one or more content providers (or subscribers) 102 provide content via one or more origin sources 104 and delivery services (servers) 106 to clients 108 via one or more networks 110. The delivery services (servers) 106 may form a delivery network from which clients 108 may obtain content. The delivery services 106 may be logically and/or physically organized hierarchically and may include edge caches. The delivery services 106 may be logically and/or physically organized into clusters.
  • As should be appreciated, components of a CDN (e.g., delivery servers or the like) may use the CDN to deliver content to other CDN components. Thus a CDN component may itself be a client of the CDN. For example, the CDN may use its own infrastructure to deliver CDN content (e.g., CDN control and configuration information) to CDN components.
  • Client requests (e.g., for content) may be associated with delivery server(s) 106 by a rendezvous system 112 comprising rendezvous mechanism(s) 114, possibly in the form of one or more rendezvous networks. The rendezvous mechanism(s) 114 may be implemented, at least in part, using or as part of a DNS system, and the association of a particular client request (e.g., for content) with one or more delivery servers may be done as part of DNS processing associated with that particular client request (e.g., of a domain name associated with the particular client request).
  • Typically, multiple delivery servers 106 in the CDN can process or handle any particular client request for content (e.g., for one or more resources). Preferably the rendezvous system 112 associates a particular client request with one or more “best” or “optimal” (or “least worst”) delivery servers 106 to deal with that particular request. The “best” or “optimal” delivery server(s) 106 may be one(s) that is (are) close to the client (by some measure of network cost) and that is (are) not overloaded. Preferably the chosen delivery server(s) 106 (i.e., the delivery server(s) chosen by the rendezvous system 112 for a client request) can deliver the requested content to the client or can direct the client, somehow and in some manner, to somewhere where the client can try to obtain the requested content. A chosen delivery server 106 need not have the requested content at the time the request is made, even if that chosen delivery server 106 eventually serves the requested content to the requesting client.
  • When a client 108 makes a request for content, the client may be referred to as the requesting client, and the delivery server 106 that the rendezvous system 112 associates with that client request (and that the client first contacts to make the request) may be referred to as the “contact” server or just the contact.
  • Exemplary CDNs are described in U.S. Pat. Nos. 8,060,613 and 8,925,930.
  • The CDN may include a control system 118 (formed from the various control services 120). The control system 118 may be referred to as the control core or control mechanism. The control mechanism 118 may include two sides, namely a side dedicated to accepting and managing the configurations provided by CDN users (or subscribers), and a side dedicated to controlling endpoint services (such as caches) based on established configurations.
  • The CDN may have or provide default policies and procedures for delivery and/or handling of subscriber content. These system defaults may be specified and/or contained in one or more system configuration files or objects. In addition, content providers (or subscribers) 102 may customize aspects of delivery and/or handling of their content by the CDN. The subscriber customizations may be specified and/or contained in one or more subscriber configuration files or objects. The system default configuration may be augmented, supplemented, and/or replaced, at least in part, by subscriber configurations.
  • The control system 118 (e.g., control service(s) 120) may connect to/with delivery server(s) 106 and the rendezvous system 112. This is represented in the drawing in FIG. 1 by the arrow to/from the control system 118 to the combined set of 106 and 112. This arrow may represent, e.g., sending config information to the delivery service (e.g., CCS/GCO files) and/or to rendezvous system 112 (e.g., alias updates).
  • Configuration may be maintained, controlled, and administered, at least in part, by configuration mechanism 122. Subscribers may access the configuration mechanism 122 via an appropriate interface, e.g., via configuration API 124.
  • The configuration information may define, for a particular subscriber, for the subscriber's entire set of properties, how the CDN should handle those properties (e.g., how the CDN should service requests for that customer's properties). This may include, alias hostnames, origin servers from which to fill, and all policies associated with content associated with that subscriber. The system preferably maintains one subscriber configuration per subscriber (or per property per subscriber).
  • FIGS. 2 and 3 depict aspects of exemplary embodiments of real-time subscriber configuration ingestion according to exemplary embodiments hereof. As described here, subscriber configuration is modifiable directly by a subscriber or a subscriber's REST agent by invoking or calling the config API 124. The configuration modification is ingested into the network through a distributed set of applications and data stores.
  • With reference still to FIGS. 2 and 3, a subscriber invokes or calls the configuration API (or Config API) 124 (at 1 in FIG. 3) to create or modify the subscriber's configuration. Recall that the subscriber's configuration defines how the CDN deals with aspects of delivery and/or handling of that subscriber's content. The subscriber's configuration may augment or modify or replace aspects of the system default configuration.
  • The Config API 124 may be a RESTful API server for creating and modifying a subscriber's configuration. A REST client 200 that is authorized to access a subscriber configuration may read/modify/rollback the subscriber configuration.
  • The Config API 124 stores the subscriber's configuration in a distributed database cluster 202 (at 2 in FIG. 3). In a presently preferred embodiment, Cassandra is used for the distributed database 202. Cassandra provides a distributed database management system designed to handle large amounts of data across many commodity servers, providing high availability with no single point of failure. Cassandra may offer robust support for clusters spanning multiple datacenters, with asynchronous masterless replication allowing low latency operations for all clients. The Cassandra cluster may be a multi-node, multi-datacenter Cassandra cluster for storing subscriber configuration information. Those of ordinary skill in the art will appreciate and understand, upon reading this description, that different and/or other mechanisms may be used in place of the Cassandra cluster to implement aspects of embodiments hereof.
  • In Cassandra, writes and reads offer a tunable level of consistency. In preferred embodiments, writes to the Cassandra cluster 202 are preferably done with a consistency level of LOCAL_QUORUM so that when a read is done with a LOCAL_QUORUM, data is always consistent.
  • A response from the Config API 124 will indicate (at 3 in FIG. 3) whether or not the write to the cluster 202 was successful (e.g., providing “success” indication).
  • If the request was to create or update the subscriber's configuration, the config API 124 publishes a message (at 4 in FIG. 3) to a messaging system 204 (e.g., Kafka® cluster) for (or to cause) generation of platform configuration.
  • The messaging system 204 may be a multi-node Kafka® broker cluster that works as a high-throughput distributed messaging system.
  • Kafka® refers to Apache's distributed streaming platform, preferably with the following capabilities: Publish and subscribe to streams of records, similar to a message queue; Store streams of records in a fault-tolerant durable way; and process streams of records as they occur.
  • Those of ordinary skill in the art will appreciate and understand, upon reading this description, that different and/or other mechanisms may be used in place of the Kafka® to implement aspects of embodiments hereof.
  • Preferably the control core 118 consumes (or obtains) a message from the messaging system 204. As should be appreciated, it is important that no request made by the Config API 124 for platform config generation is lost (or missed) by control core 118, so that the platform configuration is always in sync with the config data configured by the subscriber.
  • Config API 124 publishes messages to the cluster 204 which are consumed by the Control Core 118.
  • The control core 118 preferably monitors the messaging system 204 and consumes messages for the control core 118. In particular, the control core 118 consumes messages (at 5 in FIG. 3) from a cluster of messaging system 204 for generating platform configurations for a subscriber.
  • While reading subscriber configuration information from the Cassandra cluster 202 (at 6 in FIG. 3), a consistency level of LOCAL_QUORUM should ensure that there is no data loss and that the control core 118 gets the latest copy of the subscriber's data.
  • After consuming a message (at 5 in FIG. 3), the control core 118 reads subscriber configuration data/information (e.g., subscriber metadata) (at 6 in FIG. 3) from the Cassandra cluster 202 and then generates and stores platform configurations (at 7 in FIG. 3).
  • The generated platform configurations are based, at least in part, on the subscriber configuration information read from the Cassandra cluster 202. The generated platform configurations are preferably also based on default and/or system-wide configurations and on CDN policies. As should be appreciated, while subscribers may be able to create and/or modify configurations, such configurations should comply with CDN policies. The generated platform configuration contains the newly modified changes in platform aware language.
  • The control core 118 stores configuration data (e.g., platform configuration data) in a data store 206 and invalidates the prior configuration data (at 7 and 8 in FIG. 3). In order to invalidate prior configuration(s), the control core 118 may issue invalidation instructions to the network for configurations to be replaced by the newly generated platform configuration(s). While invalidation of control objects is the presently preferred approach, those of ordinary skill in the art will appreciate and understand, upon reading this description, that different and/or other approaches may be used. For example, the CDN may poll for changes to such objects.
  • As noted above, the system preferably maintains one subscriber configuration per subscriber (or per property per subscriber). The platform configuration store 206 maintains the subscriber configurations for the CDN's subscribers.
  • The control core 118 may provide an interface (e.g., a REST API) for delivering the platform configurations to the CDN nodes.
  • CDN components 208 (e.g., CDN delivery servers 106, etc.) monitor the control core 118 for changes in the master journal (indicating potentially invalid content). Accordingly, in response to the control core 118 invalidating the platform config in the master journal (at 8 in FIG. 3), each CDN component (e.g., CDN delivery servers 106, etc.) gets the updated master journal from the control core 118 (at 9 and 10 in FIG. 3). The CDN component(s) then request the new/modified platform configuration from the control core 118 (at 11 in FIG. 3).
  • The control core 118 reads the platform configuration from the platform configuration storage (data store 206) (at 12 in FIG. 3), and then returns the platform configuration to the requesting CDN component (at 13 in FIG. 3).
  • A CDN component receiving configuration information may use that information as is or it may process the configuration information into local configuration information based, e.g., on the capabilities of the CDN component.
  • As should be appreciated, a CDN component (e.g., a CDN delivery server 106) may use the subscriber-provided configuration information to perform subscriber-specific handling (e.g., subscriber-specific request/response processing).
  • The configuration information in a subscriber's configuration may define, for the subscriber's entire set of properties, how the CDN should handle those properties (e.g., how the CDN should service requests for that customer's properties). This may include, alias hostnames, origin servers from which to fill, and all policies associated with content associated with that subscriber. The system maintains one subscriber configuration per subscriber (or per property per subscriber).
  • Each subscriber has its own configuration information (which may be default). That is, the system maintains a single subscriber configuration for each subscriber, and that subscriber configuration defines all configuration details for all of that subscriber's content. As should be appreciated, the current approach (with a single configuration per subscriber) allows a subscriber to handle most or all content the same way, with differences expressed incrementally for that content to be handled differently. An alternate approach is to have a CCS per resource or for smaller groups of resources of a subscriber, but this alternate approach misses the commonality that most subscribers use for most of their resources.
  • In some exemplary implementations, the subscriber-specific configuration information may be specified in so-called Customer Configuration Scripts (CCSs). Customer-specific scripts may be used to process a customer's requests (i.e., requests for or associated with a subscriber's content), and may be associated with the customers/subscribers, e.g., via customer/subscriber identifiers.
  • FIG. 4A depicts aspects of platform configuration storage 206 according to exemplary embodiments hereof. As shown, the platform configuration storage 206 may include subscriber configurations 400, indexed by subscriber identifier. Thus, e.g., subscriber j has subscriber configuration CCS#j, and so on. In some cases, the system may include a default subscriber configuration for each subscriber, to be used unless/until the configuration is modified.
  • If a subscriber has multiple properties with different configurations for different properties, then that subscriber may be allocated a different subscriber id for each property, or the data structure 402 shown in FIG. 4B may be used.
  • A data structure (e.g., a Global Configuration Object or GCO) may be used to determine whether a request is associated with a CDN subscriber (and therefore, e.g., whether a requested resource can be served). A GCO may include information that will allow a CDN component (e.g., a cache server) to determine whether a requested resource corresponds to a resource of a subscriber (or customer) of the CDN (or to a CDN resource). Essentially the CDN component may use the GCO to determine whether a resource belongs to a property configured to use the CDN. Since the GCO is a global control resource, common to all agents, (whereas other control resources (e.g., CCSs) are generally downloaded on demand), the GCO should be succinct.
  • Configuration Model Implementation
  • Match Rules
  • An exemplary implementation of the customer (subscriber) configuration model uses a so-called “match rules” approach. Within a configuration there is the option of having rules or mappings. The match rules effectively act as mappings or lookup tables. An exemplary implementation of the match rules is described here. As should be appreciated, configurations may use approaches other than match rules, and match rules may be implemented differently.
  • The exemplary match-rule model is table-driven. This has the advantage of readability, e.g., when setting a set of options slightly differently across a large number of aliases.
  • A basic Match Rule has the following format:
  • ‘“ID” : ’ <numeric label>
    [‘“Followed-by” : ’ (“break” | “jump-to” <ID>)]
    [ ‘“Expr” : ’ <expression>]
    [‘“MatchSet” : ‘ <MatchSet>]
    [‘“MatchSetOrder” : ’ ( “first”|“last”) ]
    <flagName> ‘:’ <flagValue> {‘,’ <flagName> ‘:’
    <flagValue>}*
  • Each Match Rule may have a Match Rule ID that can be used to order rules and to provide jump targets.
  • Each Match Rule may be part of a Match Rule Group. A Match Rule Group is a collection of Match Rules, with first-match-wins semantics. The subscriber configuration has at least one collection of Match Rule Groups. In some cases two such collections may be used, one for processing on receipt of the request and the second for processing on the receipt of the response. The two-collection configuration may only be needed at nodes, generally referred to as parent nodes, that contact the origin server.
  • Each Match Rule Group may be processed in a specified order (e.g., driven off of the numeric Match Rule Group ID in ascending order)—when a match is found, the processing associated with that match is performed, and by default processing then jumps to the start of the next Match Rule Group. Processing can jump to a distinct Match Rule, or processing can be halted (break) using the Followed-by element. If no Followed-by is specified, processing moves to the first element of the next Match Rule Group (if present).
  • An exemplary Match Rule Group may look like:
  • “Match Rule Group ID” : <numeric label>
    “Match Rules” :
    {
    <Match Rule>
    },
    {
    <Match Rule>
    },
    ...

    and the total collection may look like:
  • “Match Rule Collection” : (“request”|“response”)
    “Match Rule Groups” :
    {
    “Match Rule Group ID” : <numeric label>
    “Match Rules” :
    {
    <Match Rule>
    },
    {
    <Match Rule>
    },
    ...
    }
  • Each Match Rule may specify one or more actions (e.g., setting cache expiration, cache key manipulation, content/header processing modes, etc.) directly. An action may involve setting one or more flags.
  • If a collection of Match Rules wants to set the same set of flags to the same set of values, then rather than repeating them within a series of Match Rules, the flag setting can be encapsulated within a Match Set. This is essentially the same as a Match Rule Group, but one that is not processed within the normal flow of processing; rather it is ‘called by reference’ when named within an executed Match Rule. If both a Match Set and explicitflagNames are provided within a single Match Rule, the Match Set is run first and then the explicitflagNames. This order can be altered via the optional MatchSetOrder which can specify that the MatchSet is either run first (the default), or last (i.e., after the explicitflagNames).
  • In order for a Match Rule to be matched, the expression has to evaluate to true in the Expr: element. If no ‘Expr’ is specified, it implicitly evaluates to true, and hence such a Match Rule is always said to match when reached. Matching means that the specified flag settings (explicit as well as via any MatchSet) are made, and processing for this Match Rule Group completes. Processing by default moves to the start of the next Match Rule Group, unless a Followed-by is specified in which case processing either completes completely (on break) or jumps to the Match Rule with a given ID (on jump-to <ID>).
  • Operators within the expression (all operators may be inverted by prepending “!”; for convenience, “!=” is a synonym for “!==”) are:
  • == Equality test
    %= Equality test (case insensitive)
    *= Glob test
    %*= Glob test (case insensitive)
    #= Set match (match against list of strings or expressions)
    %#= Set match (case insensitive)
    && Logical AND
    | | Logical OR
    () Grouping
  • The following variables are available in a present implementation:
  • Request-Related Variables:
  • $req.<name> Request header <name>.
    $uri URI of request (as received).
    $full_uri Full URI of request (derived).
    $scheme Scheme.
    $authority Authority.
    $user User portion of authority.
    $password Password portion of authority.
    $host Host (usually the same as $req.host).
    $port Port of request
    $path Request path (no query string).
    $pathquery Request path (with query string, equivalent
    to $path$queryq).
    $query Query string.
    $queryq Query string with leading “?”.
    $fragment Fragment.
    $client_ip Effective client IP address.
    $hop_ip IP address of previous hop.
  • Response-Related Variables:
  • $resp.<name> Response header <name>.
    $status Response HTTP status.
  • Other Variables
  • $var.<name> A variable set on the request by an earlier rule.
    $cfgvar.<name> Local configuration variable.
    $map[<N>].<name> Result of Nth (starting from 0) map, counting
    from left to right in expression.
    “$map” is the same as “$map0”. <name> selects
    the value from the map. See ‘Maps' below.
  • Transforms:
  • An extended syntax for variables allows named transforms to be applied. For example:
  • ${<name>[:<xfrm>[(<args>)] [...]]}
    or
    ${“<string>”[:<xfrm>[(<args>)][...]]}
    ${‘<string>’[:<xfrm>[(<args>)][...]]}
  • Some transforms include:
  • base64encode Base 64 encode
    base64decode Base 64 decode
    urlencode(<arg>) URL encode (arg decides “+” handling)
    urldecode(<arg>) and decode
    hash(<args>) Cryptographic hash, as defined
    by the arguments, which might
    include the type of hash, the
    secret or a reference to a
    secret, etc.
    rex(<args>) Search/replace using rex.
    lowercase(<arg>) convert any text in the presented
    string to lower case
    uppercase(<arg>) convert any text in the presented
    string to upper case
    pselect(<p>, <s> [,<ns>]) The pselect transform takes two
    or three arguments: a percentage
    value <p> (a floating point
    number), a string <s>, and an
    optional string <ns>. It
    evaluates to the string <s> <p>
    percent of the time, else, <ns>
    or an empty string if <ns> is
    not provided. The <s> and <ns>
    strings are themselves subject
    to interpolation.
  • Transforms are applied in the order given.
  • In some embodiments it may be possible to set fields in rules to the value of an interpolated string.
  • The pselect transform (with arguments (<p>, <s>[,<ns>])) may be used, e.g., to distribute requests differently (e.g., to locations specified by string “s” or by string “ns”) based on the value of p. This may be used, e.g., to move a specified percentage of a library to a different server, in a consistent fashion, in the cases where the server normally responsible for the content is reporting that it is overloaded.
  • Maps
  • The expression syntax may also allow for a reference to a Map of data. These can be considered function calls; they return a Boolean value which is true when a match is found within the map and are able to set additional values that can then be referenced by name from the calling layer—the names of these ‘returned’ values are part of the definition of the map.
  • The map( ) call takes a list of one or more map names, and a string value to be passed into each as the key to be looked up. This string (key) argument may be a simple value (e.g., $host) or the result of an expression—in particular, it may be the result of another map lookup. The map( ) call returns a Boolean. An alternate valuemap( ) call returns the actual value list from the matched entry.
  • There are several types of maps:
      • regular maps which perform exact lookups of the presented key and as such can be implemented as a direct key lookup, e.g., hashtable (discrete);
      • glob maps where the keys listed are shell glob patterns;
      • regexp maps (same as glob maps, except a regular expression is used instead of a glob);
      • int-range maps where the key is interpreted as an integer on entry into the map, and where the key can be a single integer or integer range (<lo>-<hi>)—if the provided key string is not interpretable as an integer, the key looked up will be a NaN value; and
      • ip-range maps which are similar to integer (int-range) maps, except that the key string is interpreted as an IP address (range)—this preferably supports both IPv4 and IPv6 (using any of the standard formats) and ranges can be specified as <lo>-<hi> or <addr>/<maskbits>.
  • A glob map or regexp map needs to be searched entry by entry until a match is found. As usual, a first-match-wins approach is taken. Since ranges could overlap (either with other ranges or with discrete values), the smallest range (or lowest value of <lo>) wins.
  • This gives:
  • ‘“MatchMap” :’
    ‘“Name” : ’ <match map name>
    [‘“ValueNames” : ’ <name>[, <name>]*]
    [‘“MatchType” : ’ (“discrete”|“glob”|“ip-
    range”|“int-range”)]
    [‘“DefaultValue” : ’ (“error(“<errText>”)” |
    <valueSpec>)]
    ‘“Data” :’
    ‘{’ <keySpec> ‘,’ <valueSpec> ‘}’
    ...
    keySpec :== ‘“Key” : ’ <key> | ‘“Keys” : { ’
    <key> {‘,’ <key>}+ ‘}’
    valueSpec :== ‘“Value” : ’ <value> |
    ‘“Values” : {’ <value> {‘,’ <value>}* ‘}’ |
    ‘“valuemap”(’ <mapNameList> ‘,’ <arg> ‘ )’
  • The list of names specified in the ValueNames attribute are the names that can then be used in the $map[$N].<name> variable in the calling context. Such names are only available in the direct caller.
  • The list of values need not be the same length in each row of a given table; any ‘missing’ values are set to null/undef in the calling context, and are assumed to be the relevant number of trailing elements of any ValueNames list. null/undef can be placed within the values list to ‘skip’ unneeded entries.
  • Finally, the ‘DefaultValue’ provides an option to return a set of values on any call that does not match a keySpec. Note that this means that this MatchMap will always match.
  • Examples
  • As a first example, consider a desire to set some authentication modes for particular paths on a couple of properties. In match rules, this ends up being (assuming the alias for ID X is id<X>.com):
  • 1. “expr” : “$host” == “id12.com” && “$path” *= “/image/*”
     “token” : {
    “id” = <appropriate id>,
    “action” = “error”,
     }
    2. “expr” : “$host” == “id12.com” && “$path” *= “/doc/*”
     “geo” : {
    “idlist” = “US”,
    “type” = “whitelist”,
    “action” = “error”,
     }
    3. “expr” : “$host” == “id22.com”
     “token” : {
    “id” = <appropriate_id>,
    “action” = “redirect”,
    “url” = “/sorry”,
     }
    4. “expr” : true
    “token” : {
    “id” = <appropriate_id>,
    “action” = “error”,
    }
  • This example has only four simple rules and there is only one redundant test (the second test of host against “id12.com”). However, those of ordinary skill in the art will realize and appreciate, upon reading this description, that this approach would be useful in an extended case (e.g., with 100 aliases, 90 of which shared the same authentication requirements as “id123.com” and the other 10 of which need what “id12.com” has). One way to implement the extended example would be to utilize MatchSets:
  • “MatchSet” : {
    “Name”: “auth1”
    “MatchRule”: {
    “Expr”: “$path” *= “/image/*”
    “Token”: {
    “id” = <tokenID>
    “Action” = “error”
    }
    }
    “MatchRule” : {
    “Expr” : “$path” *= “/doc/*”
    “Geo” : {
    “id” = <geoID>
    “Type” = “whitelist”
    “Action” = “error”
    }
    }
    }
    “MatchSet” : {
    “Name” : “auth2”
    “MatchRule” :
    “Expr”: “true”
    “Token” : {
    “id” = <tokenID>
    “Action” = “redirect”
    “URL” = “/sorry”
    }
    }
    }
    “MatchSet” : {
    “Name” : “auth3”
    “MatchRule” : {
    “Expr” : “$path” *= “/secure/*”
    “Token” : {
    “id” = <tokenID>
    “Action” = “error”
    }
    }
    }
  • We may then have a map like:
  • “MatchMap” :
    “Name” : “MatchSetsByAlias”
    “ValueNames” : “MatchSetNames”
    “DefaultValue” : “auth3”
    “Data” :
    {
    “Key” : “starwars.com”
    “Values” : { “auth1, auth3” }
    },
    {
    “Key” : “alien.com”
    “Values” : { “auth1, auth3” }
    },
    {
    “Key” : “bladerunner.com”
    “Values” : { “authl, auth3” }
    },
    ...
    {
    “Key” : “marypoppins.com”
    “Values” : { “auth2, auth3” }
    },
    {
    “Key” : “musicman.com”
    “Values” : { “auth2, auth3” }
    },
    {
    “Key” : “myfairlady.com”
    “Values” : { “auth2, auth3” }
    }
  • And finally a rule:
  • “MatchRule” :
    “ID” : 1
    “Expr” : “map”(“MatchSetsByAlias”, “$host”)
    “MatchSet” : “$map.MatchSetNames”
  • Here, the map operator matches the given value in the given map. If the map has a default value, or if there's a match in the map, the result is true and the rule is executed. As a side effect, it also makes available the pseudo-variable $map, from which values from the map can be selected using “.<ValueName>”.
  • This concept of named match sets (i.e., reusable sets of rules which can be referenced by name) can be efficiently extended to apply to a large number of aliases.
  • An issue with the above is constant repetition of “auth1, auth3” or “auth2, auth3” in the map, which leads to:
  • “MatchMap” :
    “Name” : “MatchSetsByAlias”
    “ValueNames” : “MatchSetNames”
    “DefaultValue” : “auth3”
    “Data” :
    {
    “Keys” : { “starwars.com”, “alien.com”,
    “bladerunner.com”, <...> },
    “Values” : { “auth1, auth3” }
    },
    {
    “Keys” : { “marypoppins.com”,
    “musicman.com”,
    “myfairlady.com”, <...> },
    “Values” : { “auth2, auth3” }
    }
  • This concept may be further extended to allow matching of multiple maps in a single “map” call. For example, to add a host ID to the above, we have:
  • “MatchMap” :
    “Name” : “IDsByAlias”
    “ValueNames” : “ID”
    “DefaultValue” : error(“Missing alias!”)
    “Data” :
    { “Key” : “starwars.com”, “Value” : “11”
    }
    { “Key” : “alien.com”, “Value” : “10”
    }
    { “Key” : “bladerunner.com”, “Value” : “9”
    }
    { “Key” : “marypoppins.com”, “Value” : “12”
    }
    { “Key” : “musicman.com”, “Value” : “13”
    }
    { “Key” : “myfairlady.com”, “Value” : “14”
    }
    ...
    “MatchRule” :
    “ID: 1
    “Expr” : “map”(“IDSByAlias”,
    “MatchSetsByAlias”, “$host”)
    “HostID” : “$map1.ID”
    “MatchSet” : “$map2.MatchSetNames”
  • A Query String Handling mode (QSHMode) may be used to extend the MatchMap syntax and semantics. In this example, the rules (not in matchrule/matchmap syntax) are as follows (where the default is “off”):
  • starwars.com
    * on
    alien.com
    /nostromo/* on
    bladerunner.com
    /pkdick-bio/* on
    /images/* on
    musicman.com
    /mwilson-bio/* on
    /images/* on
    myfairlady.com
    /cockney-primer/* on
  • Note that “marypoppins.com,” is left out of the rules because, in this example, none of the paths associated with that property require QSHMode.
  • MatchMap may be extended as follows:
  • “MatchMap” :
    “Name” : “StarWarsQSH”
    “ValueNames” : “enabled”
    “DefaultValue” : “true”
    “MatchMap” :
    “Name”: “AlienQSH”
    “DefaultValue” : “false”
    “ValueNames” : “enabled”
    “MapType” : “glob”
    “Data” :
    {
    “Key” : “/nostromo/*”,
    “Value” : “true”
    }
    “MatchMap” :
    “Name” : “BladeRunnerQSH”
    “DefaultValue” : “false”
    “ValueNames” : “enabled”
    “MapType” : “glob”
    “Data” :
    {
    “Key” : “/pkdick-bio/*”,
    “Value” : “true”
    },
    {
    “Key” : “/images/*”,
    “Value” : “true”
    }
    “MatchMap” :
    “Name” : “MusicManQSH”
    “DefaultValue” : “false”
    “ValueNames” : “enabled”
    “MapType” : “glob”
    “Data” :
    {
    “Key” : “/mwilson-bio/*”,
    “Value” : “true”
    },
    {
    “Key” : “/images/*”,
    “Value” : “true”
    }
    “MatchMap” :
    “Name” : “MyFairLadyQSH”
    “DefaultValue” : “false”
    “ValueNames” : “enabled”
    “MapType” : “glob”
    “Data” :
    {
    “Key” : “/cockney-primer/*”,
    “Value” : “true”
    }
  • This provides the overall QSHMode map for this property:
  • “MatchMap” :
    “Name” : “QSHModeByAlias”
    “DefaultValue” : “false”
    “Data” :
    { “Key” : “starwars.com”,
     “ValueMap” : { “StarWarsQSH”, “$path” }
    },
    { “Key” : “alien.com”,
     “ValueMap” : { “AlienQSH”, “$path” }
    },
    { “Key” : “bladerunner.com”,
     “ValueMap” : { “BladeRunnerQSH”, “$path” }
    },
    { “Key” : “musicman.com”,
     “ValueMap” : { “MusicManQSH”, “$path” } },
    { “Key” : “myfairlady.com”,
     “ValueMap” : { “MyFairLadyQSH”, “$path” }
    }
  • So the rule for this property is now:
  • “MatchRule” :
    “ID” : 1
    “Expr” : “map”(“IDSByAlias”,
    “MatchSetsByAlias”,
    “QSHModeByAlias”, “$host”)
    “HostID” : “$map1.ID”
    “MatchSet” : “$map2.MatchSetNames”
    “QSHMOde” : “$map3.enabled”
  • This can be equivalently written:
  • “MatchRule” :
    “ID” : 1
    “HostID” : “map”(“IDSByAlias”, “$host”)”.ID”
    “MatchSet” : “map”(“MatchSetsByAlias”,
    “$host”)“.MatchSetNames”
    “QSHMOde” : “map”( “QSHModeByAlias”,
    “$host”)“.enabled”
  • Real Time
  • Those of ordinary skill in the art will realize and understand, upon reading this description, that, as used herein, the term “real time” means near real time or sufficiently real time. It should be appreciated that there are inherent delays built in to the CDN (e.g., based on network traffic and distances), and these delays may cause delays in data reaching various components. Inherent delays in the system do not change the real-time nature of the data. In some cases, the term “real-time data” may refer to data obtained in sufficient time to make the data useful in providing feedback.
  • Although the term “real time” has been used here, it should be appreciated that the system is not limited by this term or by how much time is actually taken for data to have an effect on control information. In some cases, real time computation may refer to an online computation, i.e., a computation that produces its answer(s) as data arrive, and generally keeps up with continuously arriving data. The term “online” computation is compared to an “offline” or “batch” computation.
  • Computing
  • The services, mechanisms, operations and acts shown and described above are implemented, at least in part, by software running on one or more computers of a CDN.
  • Programs that implement such methods (as well as other types of data) may be stored and transmitted using a variety of media (e.g., computer readable media) in a number of manners. Hard-wired circuitry or custom hardware may be used in place of, or in combination with, some or all of the software instructions that can implement the processes of various embodiments. Thus, various combinations of hardware and software may be used instead of software only.
  • One of ordinary skill in the art will readily appreciate and understand, upon reading this description, that the various processes described herein may be implemented by, e.g., appropriately programmed general purpose computers, special purpose computers and computing devices. One or more such computers or computing devices may be referred to as a computer system.
  • FIG. 5 is a schematic diagram of a computer system 500 upon which embodiments of the present disclosure may be implemented and carried out.
  • According to the present example, the computer system 500 may include a bus 502 (i.e., interconnect), one or more processors 504, a main memory 506, read-only memory 508, removable storage media 510, mass storage 512, and one or more communications ports 514. As should be appreciated, components such as removable storage media are optional and are not necessary in all systems. Communication port 514 may be connected to one or more networks by way of which the computer system 500 may receive and/or transmit data.
  • As used herein, a “processor” means one or more microprocessors, central processing units (CPUs), computing devices, microcontrollers, digital signal processors, or like devices or any combination thereof, regardless of their architecture. An apparatus that performs a process can include, e.g., a processor and those devices such as input devices and output devices that are appropriate to perform the process.
  • Processor(s) 504 can be any known processor, such as, but not limited to, an Intel® Itanium® or Itanium 2® processor(s), AMD® Opteron® or Athlon MP® processor(s), or Motorola® lines of processors, and the like. Communications port(s) 514 can be any of an RS-232 port for use with a modem based dial-up connection, a 10/100 Ethernet port, a Gigabit port using copper or fiber, or a USB port, and the like. Communications port(s) 514 may be chosen depending on a network such as a Local Area Network (LAN), a Wide Area Network (WAN), a CDN, or any network to which the computer system 500 connects. The computer system 500 may be in communication with peripheral devices (e.g., display screen 516, input device(s) 518) via Input/Output (I/O) port 520.
  • Main memory 506 can be Random Access Memory (RAM), or any other dynamic storage device(s) commonly known in the art. Read-only memory 508 can be any static storage device(s) such as Programmable Read-Only Memory (PROM) chips for storing static information such as instructions for processor 504. Mass storage 512 can be used to store information and instructions. For example, hard disks such as the Adaptec® family of Small Computer Serial Interface (SCSI) drives, an optical disc, an array of disks such as Redundant Array of Independent Disks (RAID), such as the Adaptec® family of RAID drives, or any other mass storage devices may be used.
  • Bus 502 communicatively couples processor(s) 504 with the other memory, storage, and communications blocks. Bus 502 can be a PCI/PCI-X, SCSI, a Universal Serial Bus (USB) based system bus (or other) depending on the storage devices used, and the like. Removable storage media 510 can be any kind of external hard-drives, floppy drives, IOMEGA® Zip Drives, Compact Disc-Read Only Memory (CD-ROM), Compact Disc-Re-Writable (CD-RW), Digital Versatile Disk-Read Only Memory (DVD-ROM), etc.
  • Embodiments herein may be provided as one or more computer program products, which may include a machine-readable medium having stored thereon instructions, which may be used to program a computer (or other electronic devices) to perform a process. As used herein, the term “machine-readable medium” refers to any medium, a plurality of the same, or a combination of different media, which participate in providing data (e.g., instructions, data structures) which may be read by a computer, a processor or a like device. Such a medium may take many forms, including but not limited to, non-volatile media, volatile media, and transmission media. Non-volatile media include, for example, optical or magnetic disks and other persistent memory. Volatile media include dynamic random access memory, which typically constitutes the main memory of the computer. Transmission media include coaxial cables, copper wire and fiber optics, including the wires that comprise a system bus coupled to the processor. Transmission media may include or convey acoustic waves, light waves and electromagnetic emissions, such as those generated during radio frequency (RF) and infrared (IR) data communications.
  • The machine-readable medium may include, but is not limited to, floppy diskettes, optical discs, CD-ROMs, magneto-optical disks, ROMs, RAMs, erasable programmable read-only memories (EPROMs), electrically erasable programmable read-only memories (EEPROMs), magnetic or optical cards, flash memory, or other type of media/machine-readable medium suitable for storing electronic instructions. Moreover, embodiments herein may also be downloaded as a computer program product, wherein the program may be transferred from a remote computer to a requesting computer by way of data signals embodied in a carrier wave or other propagation medium via a communication link (e.g., modem or network connection).
  • Various forms of computer readable media may be involved in carrying data (e.g. sequences of instructions) to a processor. For example, data may be (i) delivered from RAM to a processor; (ii) carried over a wireless transmission medium; (iii) formatted and/or transmitted according to numerous formats, standards or protocols; and/or (iv) encrypted in any of a variety of ways well known in the art.
  • A computer-readable medium can store (in any appropriate format) those program elements that are appropriate to perform the methods.
  • As shown, main memory 506 is encoded with application(s) 522 that supports the functionality discussed herein (the application 522 may be an application that provides some or all of the functionality of the CD services described herein, including the client application). Application(s) 522 (and/or other resources as described herein) can be embodied as software code such as data and/or logic instructions (e.g., code stored in the memory or on another computer readable medium such as a disk) that supports processing functionality according to different embodiments described herein.
  • During operation of one embodiment, processor(s) 504 accesses main memory 506 via the use of bus 502 in order to launch, run, execute, interpret or otherwise perform the logic instructions of the application(s) 522. Execution of application(s) 522 produces processing functionality of the service related to the application(s). In other words, the process(es) 524 represent one or more portions of the application(s) 522 performing within or upon the processor(s) 504 in the computer system 500.
  • It should be noted that, in addition to the process(es) 524 that carries (carry) out operations as discussed herein, other embodiments herein include the application 522 itself (i.e., the un-executed or non-performing logic instructions and/or data). The application 522 may be stored on a computer readable medium (e.g., a repository) such as a disk or in an optical medium. According to other embodiments, the application 522 can also be stored in a memory type system such as in firmware, read only memory (ROM), or, as in this example, as executable code within the main memory 506 (e.g., within Random Access Memory or RAM). For example, application 522 may also be stored in removable storage media 510, read-only memory 508 and/or mass storage device 512.
  • Those skilled in the art will understand that the computer system 500 can include other processes and/or software and hardware components, such as an operating system that controls allocation and use of hardware resources.
  • As discussed herein, embodiments of the present invention include various steps or operations. A variety of these steps may be performed by hardware components or may be embodied in machine-executable instructions, which may be used to cause a general-purpose or special-purpose processor programmed with the instructions to perform the operations. Alternatively, the steps may be performed by a combination of hardware, software, and/or firmware. The term “module” refers to a self-contained functional component, which can include hardware, software, firmware or any combination thereof.
  • One of ordinary skill in the art will readily appreciate and understand, upon reading this description, that embodiments of an apparatus may include a computer/computing device operable to perform some (but not necessarily all) of the described process.
  • Embodiments of a computer-readable medium storing a program or data structure include a computer-readable medium storing a program that, when executed, can cause a processor to perform some (but not necessarily all) of the described process.
  • Where a process is described herein, those of ordinary skill in the art will appreciate that the process may operate without any user intervention. In another embodiment, the process includes some human intervention (e.g., a step is performed by or with the assistance of a human).
  • Discussion
  • Thus are described systems, methods, and devices supporting subscriber configuration ingestion in a content delivery network.
  • As described, when a subscriber makes a change to their configuration, that change will be ingested into the CDN in real time.
  • Those of ordinary skill in the art will appreciate and understand, upon reading this description, that embodiments hereof distribute risk, and that the distributed and highly scalable design guarantees high-availability, no data lose and “near real-time” distribution and consumption of changes into the CDN network.
  • CONCLUSION
  • As used herein, including in the claims, the phrase “at least some” means “one or more,” and includes the case of only one. Thus, e.g., the phrase “at least some services” means “one or more services”, and includes the case of one service.
  • As used herein, including in the claims, the phrase “based on” means “based in part on” or “based, at least in part, on,” and is not exclusive. Thus, e.g., the phrase “based on factor X” means “based in part on factor X” or “based, at least in part, on factor X.” Unless specifically stated by use of the word “only”, the phrase “based on X” does not mean “based only on X.”
  • As used herein, including in the claims, the phrase “using” means “using at least,” and is not exclusive. Thus, e.g., the phrase “using X” means “using at least X.” Unless specifically stated by use of the word “only”, the phrase “using X” does not mean “using only X.”
  • In general, as used herein, including in the claims, unless the word “only” is specifically used in a phrase, it should not be read into that phrase.
  • As used herein, including in the claims, the phrase “distinct” means “at least partially distinct.” Unless specifically stated, distinct does not mean fully distinct. Thus, e.g., the phrase, “X is distinct from Y” means that “X is at least partially distinct from Y,” and does not mean that “X is fully distinct from Y.” Thus, as used herein, including in the claims, the phrase “X is distinct from Y” means that X differs from Y in at least some way.
  • As used herein, including in the claims, a list may include only one item, and, unless otherwise stated, a list of multiple items need not be ordered in any particular manner. A list may include duplicate items. For example, as used herein, the phrase “a list of CDN services” may include one or more CDN services.
  • It should be appreciated that the words “first” and “second” in the description and claims are used to distinguish or identify, and not to show a serial or numerical limitation. Similarly, the use of letter or numerical labels (such as “(a)”, “(b)”, or (i), (ii), . . . , and the like) are used to help distinguish and/or identify, and not to show any serial or numerical limitation or ordering.
  • While various embodiments have been described herein, other manners are contemplated.
  • As used in this description, the term “portion” means some or all. So, for example, “A portion of X” may include some of “X” or all of “X”. In the context of a conversation, the term “portion” means some or all of the conversation.
  • Throughout the description and claims, the terms “comprise”, “including”, “having”, and “contain” and their variations should be understood as meaning “including but not limited to”, and are not intended to exclude other components unless specifically so stated.
  • It will be appreciated that variations to the embodiments of the invention can be made while still falling within the scope of the invention. Alternative features serving the same, equivalent or similar purpose can replace features disclosed in the specification, unless stated otherwise. Thus, unless stated otherwise, each feature disclosed represents one example of a generic series of equivalent or similar features.
  • Use of exemplary language, such as “for instance”, “such as”, “for example” (“e.g.,”) and the like, is merely intended to better illustrate the invention and does not indicate a limitation on the scope of the invention unless specifically so claimed.
  • No ordering is implied by any of the labeled boxes in any of the flow diagrams unless specifically shown and stated. When disconnected boxes are shown in a diagram, the activities associated with those boxes may be performed in any order, including fully or partially in parallel.
  • While the invention has been described in connection with what is presently considered to be the most practical and preferred embodiments, it is to be understood that the invention is not to be limited to the disclosed embodiment, but on the contrary, is intended to cover various modifications and equivalent arrangements included within the spirit and scope of the appended claims.

Claims (29)

We claim:
1. A computer-implemented method operable on a device in a content delivery (CD) network, wherein said CD network (CDN) distributes content on behalf of one or more subscribers, the method comprising:
(A) receiving configuration information from a particular subscriber of said one or more subscribers, said configuration information relating to at least one property of said particular subscriber;
(B) in response to said receiving, generating subscriber-specific platform configuration information for said at least one property of said particular subscriber;
(C) storing said subscriber-specific platform configuration information in platform configuration storage;
(D) invalidating prior platform configuration information associated with said particular subscriber; and
(E) in response to a request from at least one CDN component for platform configuration information associated with said particular subscriber,
(E)(1) obtaining said subscriber-specific platform configuration information from said platform configuration storage; and
(E)(2) providing said subscriber-specific platform configuration information to said at least one CDN component.
2. The method of claim 1, wherein said receiving in (A) was based on a message obtained from a messaging broker, said message indicating a need to create new subscriber-specific platform configuration information for said particular subscriber.
3. The method of claim 2, wherein said configuration information is received in (A) from distributed database distinct from said messaging broker.
4. The method of claim 2, wherein said messaging broker obtained said message from a configuration interface based on an action by said particular subscriber.
5. The method of claim 4, wherein said action by said particular subscriber comprises: creating said configuration information.
6. The method of claim 5, wherein said creating comprises modifying existing configuration information.
7. The method of claim 1, wherein said request from said CDN component in (E) was based on said CDN component determining that said prior platform configuration information associated with said particular subscriber had been invalidated.
8. The method of claim 1, wherein said providing in (E)(2) is performed for multiple distinct CDN components.
9. The method of claim 1, wherein said at least one CDN component provides CD services selected from the group comprising: delivery services, caching services, streaming services, rendezvous services, collector services, object services, compute services, fill services, origin services, storage services, control services, reduction services, distribution services, monitoring services, and reporting services.
10. The method of claim 9, wherein said at least one CDN component comprises a delivery server.
11. The method of claim 10, wherein, after said providing in (E)(2), said delivery server customizes said subscriber-specific platform configuration information to form server-specific platform configuration information for said particular subscriber.
12. The method of claim 11, wherein, after said providing in (E)(2), said delivery server serves content on behalf of said particular subscriber based on said server-specific platform configuration information for said particular subscriber.
13. The method of claim 12, wherein said server-specific platform configuration information for said particular subscriber is formed using said subscriber-specific platform configuration information, and based on capabilities of said server.
14. The method of claim 1, wherein said configuration information comprises at least one match rule.
15. The method of claim 14, wherein the at least one match rule is table driven.
16. The method of claim 1, wherein said configuration information comprises at least one match rule group, each said group comprising a collection of one or more match rules.
17. The method of claim 16, wherein a match rule group comprises a collection of one or more match rules with first-match-wins semantics.
18. The method of claim 16, wherein said at least one match rule group comprises: a first collection of one or more match rules for processing on receipt of a request and a second collection of one or more match rules for processing on receipt of a response.
19. The method of claim 16, wherein the at least one match rule group comprise multiple match rule groups, and wherein said multiple match rule groups are processed in a specified order.
20. The method of claim 19, wherein match rules may have corresponding match rule IDs that can be used to order rules and to provide jump targets.
21. The method of claim 14, wherein said at least one match rule comprises at least one transform.
22. An article of manufacture comprising a computer-readable medium having program instructions stored thereon, the program instructions, operable on a device in a content delivery (CD) network, wherein said CD network (CDN) distributes content on behalf of one or more subscribers, said instructions, when executed by a processor in said CDN, cause said processor to:
(a) receive configuration information from a particular subscriber of said one or more subscribers, said configuration information relating to at least one property of said particular subscriber;
(b) in response to said receiving, generate subscriber-specific platform configuration information for said at least one property of said particular subscriber;
(c) store said subscriber-specific platform configuration information in platform configuration storage;
(d) invalidate prior platform configuration information associated with said particular subscriber; and
(e) in response to a request from at least one CDN component for platform configuration information associated with said particular subscriber,
(e)(1) obtain said subscriber-specific platform configuration information from said platform configuration storage; and
(e)(2) provide said subscriber-specific platform configuration information to said at least one CDN component.
23. The article of manufacture of claim 22, wherein said receiving in (A) was based on a message obtained from a messaging broker, said message indicating a need to create new subscriber-specific platform configuration information for said particular subscriber.
24. The article of manufacture of claim 23, wherein said configuration information is received in (a) from distributed database distinct from said messaging broker.
25. The article of manufacture of claim 23, wherein said messaging broker obtained said message from a configuration interface based on an action by said particular subscriber.
26. The article of manufacture of claim 22, wherein said at least one CDN component provides CD services selected from the group comprising: delivery services, caching services, streaming services, rendezvous services, collector services, object services, compute services, fill services, origin services, storage services, control services, reduction services, distribution services, monitoring services, and reporting services.
27. The method of claim 22, wherein said configuration information comprises at least one match rule.
28. The method of claim 27, wherein the at least one match rule is table driven.
29. An device in a content delivery (CD) network, wherein said CD network (CDN) distributes content on behalf of one or more subscribers, said device constructed and adapted to:
(a) receive configuration information from a particular subscriber of said one or more subscribers, said configuration information relating to at least one property of said particular subscriber;
(b) in response to said receiving, generate subscriber-specific platform configuration information for said at least one property of said particular subscriber;
(c) store said subscriber-specific platform configuration information in platform configuration storage;
(d) invalidate prior platform configuration information associated with said particular subscriber; and
(e) in response to a request from at least one CDN component for platform configuration information associated with said particular subscriber,
(e)(1) obtain said subscriber-specific platform configuration information from said platform configuration storage; and
(e)(2) provide said subscriber-specific platform configuration information to said at least one CDN component.
US15/961,686 2018-04-24 2018-04-24 Subscriber configuration ingestion in a content delivery network Abandoned US20190327140A1 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
US15/961,686 US20190327140A1 (en) 2018-04-24 2018-04-24 Subscriber configuration ingestion in a content delivery network
EP18743897.3A EP3785401B1 (en) 2018-04-24 2018-06-22 Subscriber configuration ingestion in a content delivery network
PCT/US2018/038991 WO2019209355A1 (en) 2018-04-24 2018-06-22 Subscriber configuration ingestion in a content delivery network
US18/117,164 US11968084B2 (en) 2018-04-24 2023-03-03 Subscriber configuration ingestion in a content delivery network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US15/961,686 US20190327140A1 (en) 2018-04-24 2018-04-24 Subscriber configuration ingestion in a content delivery network

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US18/117,164 Continuation US11968084B2 (en) 2018-04-24 2023-03-03 Subscriber configuration ingestion in a content delivery network

Publications (1)

Publication Number Publication Date
US20190327140A1 true US20190327140A1 (en) 2019-10-24

Family

ID=62986175

Family Applications (2)

Application Number Title Priority Date Filing Date
US15/961,686 Abandoned US20190327140A1 (en) 2018-04-24 2018-04-24 Subscriber configuration ingestion in a content delivery network
US18/117,164 Active US11968084B2 (en) 2018-04-24 2023-03-03 Subscriber configuration ingestion in a content delivery network

Family Applications After (1)

Application Number Title Priority Date Filing Date
US18/117,164 Active US11968084B2 (en) 2018-04-24 2023-03-03 Subscriber configuration ingestion in a content delivery network

Country Status (3)

Country Link
US (2) US20190327140A1 (en)
EP (1) EP3785401B1 (en)
WO (1) WO2019209355A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113037888A (en) * 2021-03-12 2021-06-25 北京金山云网络技术有限公司 Method and device for accelerating configuration of domain name, storage medium and electronic equipment
US20220294692A1 (en) * 2021-03-09 2022-09-15 Ciena Corporation Limiting the scope of a declarative configuration editing operation
WO2023192763A1 (en) 2022-03-28 2023-10-05 Level 3 Communications, Llc Method and apparatus for auto array detection
US11968084B2 (en) 2018-04-24 2024-04-23 Level 3 Communications, Llc Subscriber configuration ingestion in a content delivery network
WO2024118916A1 (en) 2022-11-30 2024-06-06 Level 3 Communications, Llc Systems and methods for storing and transporting configuration data to edge servers

Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020188508A1 (en) * 2000-11-08 2002-12-12 Jonas Lee Online system and method for dynamic segmentation and content presentation
US20070156845A1 (en) * 2005-12-30 2007-07-05 Akamai Technologies, Inc. Site acceleration with content prefetching enabled through customer-specific configurations
US20070250560A1 (en) * 2000-04-14 2007-10-25 Akamai Technologies, Inc. Content delivery network (CDN) content server request handling mechanism with metadata framework support
US20080046596A1 (en) * 2002-07-11 2008-02-21 Afergan Michael M Method for caching and delivery of compressed content in a content delivery network
US20130159473A1 (en) * 2011-12-14 2013-06-20 Level 3 Communications, Llc Content delivery network
US20130166423A1 (en) * 2008-09-11 2013-06-27 Adobe Systems Incorporated Providing content on connected devices
US20140325590A1 (en) * 2011-02-07 2014-10-30 Tufin Software Technologies Ltd. Method of analyzing security ruleset and system thereof
US20150163097A1 (en) * 2012-12-13 2015-06-11 Level 3 Communications, Llc Automatic network formation and role determination in a content delivery framework
US20150289203A1 (en) * 2012-11-13 2015-10-08 Telefonaktiebolaget L M Ericsson (Publ) Service Node Selection in a Communications Network based on Application Server Information
US20150326640A1 (en) * 2012-11-26 2015-11-12 Go Daddy Operating Company, LLC Configuring an origin server content delivery using a pulled data list
US20170026441A1 (en) * 2015-07-23 2017-01-26 Christopher Moudy Real-Time Partitioned Processing Streaming
US20170244804A1 (en) * 2014-12-15 2017-08-24 Level 3 Communications, Llc Caching in a content delivery framework
US20170264711A1 (en) * 2016-03-11 2017-09-14 Wipro Limited Method and system for achieving improved quality of service (qos) for content delivery in a sdn controller based communication network
US20180192219A1 (en) * 2016-12-30 2018-07-05 Akamai Technologies, Inc. Representation of contextual information by projecting different participants' audio from different positions in a 3D soundscape
US10177909B1 (en) * 2017-09-26 2019-01-08 Cloudflare, Inc. Managing private key access in multiple nodes
US10198400B1 (en) * 2016-07-09 2019-02-05 Jay D. Farner Data set selection using multi-source constraints

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7949779B2 (en) 1998-02-10 2011-05-24 Level 3 Communications, Llc Controlling subscriber information rates in a content delivery network
JP5444579B2 (en) 2009-05-20 2014-03-19 ビッグアルファ株式会社 Chuck device
US9953052B1 (en) 2012-06-19 2018-04-24 Amazon Technologies, Inc. Caching of updated network content portions
US9503333B2 (en) 2013-08-08 2016-11-22 Level 3 Communications, Llc Content delivery methods and systems
US9083726B2 (en) * 2013-09-11 2015-07-14 Verizon Patent And Licensing Inc. Automatic content publication and distribution
US9477774B2 (en) 2013-09-25 2016-10-25 Akamai Technologies, Inc. Key resource prefetching using front-end optimization (FEO) configuration
US9641640B2 (en) * 2013-10-04 2017-05-02 Akamai Technologies, Inc. Systems and methods for controlling cacheability and privacy of objects
US11716400B2 (en) 2015-08-11 2023-08-01 Ironsource Ltd. Methods circuits devices systems and functionally associated machine executable code for recommendation and distribution of digital content
US10326854B2 (en) 2015-12-14 2019-06-18 Huawei Technologies Co., Ltd. Method and apparatus for data caching in a communications network
US20190327140A1 (en) 2018-04-24 2019-10-24 Level 3 Communications, Llc Subscriber configuration ingestion in a content delivery network

Patent Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070250560A1 (en) * 2000-04-14 2007-10-25 Akamai Technologies, Inc. Content delivery network (CDN) content server request handling mechanism with metadata framework support
US20020188508A1 (en) * 2000-11-08 2002-12-12 Jonas Lee Online system and method for dynamic segmentation and content presentation
US20080046596A1 (en) * 2002-07-11 2008-02-21 Afergan Michael M Method for caching and delivery of compressed content in a content delivery network
US20070156845A1 (en) * 2005-12-30 2007-07-05 Akamai Technologies, Inc. Site acceleration with content prefetching enabled through customer-specific configurations
US8447837B2 (en) * 2005-12-30 2013-05-21 Akamai Technologies, Inc. Site acceleration with content prefetching enabled through customer-specific configurations
US20130166423A1 (en) * 2008-09-11 2013-06-27 Adobe Systems Incorporated Providing content on connected devices
US20140325590A1 (en) * 2011-02-07 2014-10-30 Tufin Software Technologies Ltd. Method of analyzing security ruleset and system thereof
US20130159473A1 (en) * 2011-12-14 2013-06-20 Level 3 Communications, Llc Content delivery network
US20150289203A1 (en) * 2012-11-13 2015-10-08 Telefonaktiebolaget L M Ericsson (Publ) Service Node Selection in a Communications Network based on Application Server Information
US20150326640A1 (en) * 2012-11-26 2015-11-12 Go Daddy Operating Company, LLC Configuring an origin server content delivery using a pulled data list
US20150163097A1 (en) * 2012-12-13 2015-06-11 Level 3 Communications, Llc Automatic network formation and role determination in a content delivery framework
US20170244804A1 (en) * 2014-12-15 2017-08-24 Level 3 Communications, Llc Caching in a content delivery framework
US20170026441A1 (en) * 2015-07-23 2017-01-26 Christopher Moudy Real-Time Partitioned Processing Streaming
US20170264711A1 (en) * 2016-03-11 2017-09-14 Wipro Limited Method and system for achieving improved quality of service (qos) for content delivery in a sdn controller based communication network
US10198400B1 (en) * 2016-07-09 2019-02-05 Jay D. Farner Data set selection using multi-source constraints
US20180192219A1 (en) * 2016-12-30 2018-07-05 Akamai Technologies, Inc. Representation of contextual information by projecting different participants' audio from different positions in a 3D soundscape
US10177909B1 (en) * 2017-09-26 2019-01-08 Cloudflare, Inc. Managing private key access in multiple nodes

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11968084B2 (en) 2018-04-24 2024-04-23 Level 3 Communications, Llc Subscriber configuration ingestion in a content delivery network
US20220294692A1 (en) * 2021-03-09 2022-09-15 Ciena Corporation Limiting the scope of a declarative configuration editing operation
CN113037888A (en) * 2021-03-12 2021-06-25 北京金山云网络技术有限公司 Method and device for accelerating configuration of domain name, storage medium and electronic equipment
WO2023192763A1 (en) 2022-03-28 2023-10-05 Level 3 Communications, Llc Method and apparatus for auto array detection
WO2024118916A1 (en) 2022-11-30 2024-06-06 Level 3 Communications, Llc Systems and methods for storing and transporting configuration data to edge servers

Also Published As

Publication number Publication date
WO2019209355A1 (en) 2019-10-31
EP3785401A1 (en) 2021-03-03
US20230208711A1 (en) 2023-06-29
EP3785401B1 (en) 2023-11-08
US11968084B2 (en) 2024-04-23

Similar Documents

Publication Publication Date Title
US11968084B2 (en) Subscriber configuration ingestion in a content delivery network
US10715485B2 (en) Managing dynamic IP address assignments
US10235384B2 (en) Servicing database operations using a messaging server
US7970856B2 (en) System and method for managing and distributing assets over a network
US7949712B2 (en) High availability presence engine for instant messaging
US7231463B2 (en) Multi-level ring peer-to-peer network structure for peer and object discovery
US20150215405A1 (en) Methods of managing and storing distributed files based on information-centric network
EP3249546A1 (en) Content delivery network
US8301595B2 (en) Using AMQP for replication
Baker et al. Distributed cooperative Web servers
US20060123121A1 (en) System and method for service session management
CN101009567A (en) A method and system utilizing peer-to-peer network entity to provide the network service
US9736082B2 (en) Intelligent high-volume cloud application programming interface request caching
US20050005027A1 (en) Method and system for obtaining data through an IP transmission network by using an optimized domain name server
US20170359440A1 (en) Resource management system
US20240015135A1 (en) Domain management and synchronization system
CN114402577A (en) Caching capabilities for single-page applications
CN112272228A (en) Distributed registry architecture
Wang et al. NCDN: A Node‐Failure Resilient CDN Solution with Reinforcement Learning Optimization
Liu et al. Multi-stage replica consistency algorithm based on activity
US20230222068A1 (en) System and method for optimizing cached memory comprising varying degrees of sla and crg
WO2022057935A1 (en) Method and apparatus for obtaining data based on content delivery network
Cai et al. Video management in peer-to-peer systems
Carl et al. Persistent Streams: The Internet With Ephemeral Storage
KR20240041207A (en) Message queue system using decentralized addressing P2P storage as a file system

Legal Events

Date Code Title Description
STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

AS Assignment

Owner name: LEVEL 3 COMMUNICATIONS, LLC, COLORADO

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LIPSTONE, LAURENCE;NEWTON, CHRISTOPHER;CROWDER, WILLIAM;AND OTHERS;SIGNING DATES FROM 20180612 TO 20181012;REEL/FRAME:051608/0555

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: ADVISORY ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STCV Information on status: appeal procedure

Free format text: NOTICE OF APPEAL FILED

STCV Information on status: appeal procedure

Free format text: APPEAL BRIEF (OR SUPPLEMENTAL BRIEF) ENTERED AND FORWARDED TO EXAMINER

STCV Information on status: appeal procedure

Free format text: EXAMINER'S ANSWER TO APPEAL BRIEF MAILED

STCV Information on status: appeal procedure

Free format text: ON APPEAL -- AWAITING DECISION BY THE BOARD OF APPEALS

STCB Information on status: application discontinuation

Free format text: ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION