WO2004006486A2 - Packet routing via payload inspection for alert services, for digital content delivery and for quality of service management and caching with selective multicasting in a publish-subscribe network - Google Patents

Packet routing via payload inspection for alert services, for digital content delivery and for quality of service management and caching with selective multicasting in a publish-subscribe network Download PDF

Info

Publication number
WO2004006486A2
WO2004006486A2 PCT/US2003/021338 US0321338W WO2004006486A2 WO 2004006486 A2 WO2004006486 A2 WO 2004006486A2 US 0321338 W US0321338 W US 0321338W WO 2004006486 A2 WO2004006486 A2 WO 2004006486A2
Authority
WO
Grant status
Application
Patent type
Prior art keywords
network
routing
packet
inspecting
module
Prior art date
Application number
PCT/US2003/021338
Other languages
French (fr)
Other versions
WO2004006486A3 (en )
Inventor
Yennun Huang
Alex W. P. Fung
David S. Rosenblum
Shalini Yajnik
Radu Teodorescu
Tsu-Wei Chen
Chih-Mei Lin
Chung-Yih Wang
Ping-Fai Yang
Roger C. Leng
Original Assignee
Precache, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L29/00Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/00 - H04L27/00 contains provisionally no documents
    • H04L29/02Communication control; Communication processing contains provisionally no documents
    • H04L29/06Communication control; Communication processing contains provisionally no documents characterised by a protocol
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/16Multipoint routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic regulation in packet switching networks
    • H04L47/10Flow control or congestion control
    • H04L47/24Flow control or congestion control depending on the type of traffic, e.g. priority or quality of service [QoS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/28Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network
    • H04L67/2842Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network for storing data temporarily at an intermediate stage, e.g. caching
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/32Network-specific arrangements or communication protocols supporting networked applications for scheduling or organising the servicing of application requests, e.g. requests for application data transmissions involving the analysis and optimisation of the required network resources
    • H04L67/322Network-specific arrangements or communication protocols supporting networked applications for scheduling or organising the servicing of application requests, e.g. requests for application data transmissions involving the analysis and optimisation of the required network resources whereby quality of service [QoS] or priority requirements are taken into account
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/32Network-specific arrangements or communication protocols supporting networked applications for scheduling or organising the servicing of application requests, e.g. requests for application data transmissions involving the analysis and optimisation of the required network resources
    • H04L67/327Network-specific arrangements or communication protocols supporting networked applications for scheduling or organising the servicing of application requests, e.g. requests for application data transmissions involving the analysis and optimisation of the required network resources whereby the routing of a service request to a node providing the service depends on the content or context of the request, e.g. profile, connectivity status, payload or application type
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations contains provisionally no documents
    • H04L12/18Arrangements for providing special services to substations contains provisionally no documents for broadcast or conference, e.g. multicast
    • H04L12/185Arrangements for providing special services to substations contains provisionally no documents for broadcast or conference, e.g. multicast with management of multicast group membership
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations contains provisionally no documents
    • H04L12/18Arrangements for providing special services to substations contains provisionally no documents for broadcast or conference, e.g. multicast
    • H04L12/1895Arrangements for providing special services to substations contains provisionally no documents for broadcast or conference, e.g. multicast for short real-time information, e.g. alarms, notifications, alerts, updates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/28Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network
    • H04L67/2823Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network for conversion or adaptation of application content or format
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Application independent communication protocol aspects or techniques in packet data networks
    • H04L69/30Definitions, standards or architectural aspects of layered protocol stacks
    • H04L69/32High level architectural aspects of 7-layer open systems interconnection [OSI] type protocol stacks
    • H04L69/322Aspects of intra-layer communication protocols among peer entities or protocol data unit [PDU] definitions
    • H04L69/329Aspects of intra-layer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer, i.e. layer seven

Abstract

Packet routing via payload inspection at routers (12) in a core of a distributed network (10) for use in providing alert services, in distributing digital content such as video, music, and software and according to quality of service guarantees. Packets include subjects and attributes in addition to routing information. The subjects correspond with particular types of content for subscriptions, and the attributes encapsulate the data or content. The subscriptions may be associated with particular quality of service guarantees or levels of service. The routers (12) store filters corresponding with subscriptions to content. Upon receiving a packet, a router (12) inspects the payload section of the packet containing the attributes in order to retrieve the attributes and apply them to the filters for the subscriptions to content from the cameras. If an attribute satisfies a filter, the packet is routed to the next link. If the attributes do not satisfy the filters, the router discards the packet. These routing decisions are distributed among routers (12) in the network core (10). The router (12) locally caches the data in the network core (12).

Description

PACKET ROUTING VIA PAYLOAD INSPECTION FOR ALERT SERVICES,

FOR DIGITAL CONTENT DELIVERY AND FOR QUALITY OF SERVICE MANAGEMENT AND CACHING WITH SELECTIVE MULTICASTING IN A

PUBLISH-SUBSCRIBE NETWORK REFERENCE TO RELATED APPLICATIONS

The present application incorporates by reference and claims the priority of U.S. Provisional Application No. 60/394,631, entitled "Packet Routing Via Payload Inspection for Quality of Service Management," filed July 8, 2002. The present application is also a

Continuation-in-Part (CIP) of U.S. Patent Application No. 10/199,356, entitled "Packet Routing Via Payload Inspection," U.S. Patent Application No. 10/199,368, entitled "Method And Apparatus For Content-Based Routing And Filtering At Routers Using Channels," U.S. Patent Application No. 10/199,439, entitled "Method For Sending And Receiving A Boolean Function Over A Network", U.S. Patent Application No. 10/199,369, entitled "Method For Storing Boolean Functions To Enable Evaluation, Modification, Reuse, And Delivery Over A Network," and U.S. Patent Application No. 10/199,388, entitled "Efficient Implementation of Wildcard Matching On Variable-Sized Fields In Connect-Based Routing," all filed July 19, 2002 and all hereby incoφorated by reference.

The present application also incorporates by reference the following U.S. Patent Applications, also CIPs of the above-referenced applications, filed March 28, 2003: Application No. 10/400,671, entitled "Method and Apparatus for Reliable Publishing and Subscribing in an Unreliable Network," Application No. 10/400,465, entitled "Method and Apparatus for Content-Based Packet Routing Using Compact Filter Storage and Off-Line Pre-computation," Application No. 10/400,453, entitled "Method and Apparatus for Implementing Query-Response Interactions in a Publish-Subscribe Network," Application No. 10/400,462, entitled "Method and Apparatus for Implementing Persistent and Reliable Message Delivery," and, Application No. 10/400,444, entitled "Method and Apparatus for Propagating Content Filters for a Publish-Subscribe Network."

FIELD OF THE INVENTION The present invention relates to a method and apparatus for routing packets in a network core based upon inspection of a payload in the packet for use in providing alert services. BACKGROUND OF THE INVENTION

Network bandwidth is increasing exponentially. However, the network infrastructure (including routers, servers, daemons, protocols, etc.) is still using relatively old technologies. As a result, Internet applications and network routers cannot keep up with the speed of the bandwidth increase. At the same time, more and more devices and applications are becoming network enabled. The load that these devices and applications put on the network nodes have increased tremendously. The increase of network load and number of applications also makes the complexity of implementing and maintaining network applications much higher. As a result, the increase of network bandwidth and the ubiquitous use of network devices and applications can cause problems for routing and transmission of data in the old network infrastructure, particular when publishing content to subscribers.

A model for having networks push information from servers to clients is the publish-subscribe style, h this model, the server becomes a simplified publisher of its information, without regard to which clients may be interested in that information or where they are located in the network. The clients become subscribers for information, with information delivered as it becomes available, potentially without regard to details about where in the network it was published. The network is then responsible for efficiently routing published information to subscribers, for matching information to active subscriptions, and for doing all of this in a way that is transparent to the publishers and subscribers.

Because the complexity of the server is greatly reduced in the publish-subscribe model, the distinction between a heavyweight server and a lightweight client can begin to disappear, or rather to merge into the notion of a peer that can be either publisher, or subscriber, or both. Numerous kinds of applications have a natural affinity for publish- subscribe-style interaction between peers. A common theme underlying many of these applications is that the information being published and subscribed for is in the form of events. For example, an investor buys or sells a stock, causing the price of the stock to change. A traffic incident occurs on a freeway, causing traffic on the freeway to back up. A security hole in a software system is discovered, causing a patch to be developed for the users of the software. A player fires a weapon in an Internet game, causing another player's avatar to die. All of these exemplary phenomena are events that are potentially of interest to large numbers of subscribers and can be propagated over a network to notify those subscribers that the events happened. An event is thus simply a self-contained, succinct piece of information about something potentially interesting that happened at some point in time at some place on the network.

Typically the server or publisher performs the routing decisions for the network in order to instruct the network on where to send published content in the publish-subscribe model. The publisher stores the subscriptions for content that it publishes. Upon receiving or generating new content, the publisher compares the content with each of the subscriptions to identify any matches. If the content (event) satisfies any subscriptions, the publisher pushes the content to the corresponding subscriber via the network. This conventional publish-subscribe model places a tremendous burden on the publishers, particular as more devices become network-enabled and as the number of subscriptions increases. With greater convergence of untold numbers of applications across the Internet, the possibilities for exploiting event notification become endless. However, those possibilities require a more efficient way to make routing decisions and determine when events satisfy subscriptions, alleviating the burden on the publishers. Thus, a pervasive, persistent event notification service could provide tremendous value-added benefit for Internet applications, as well as other applications and implementations.

SUMMARY OF THE INVENTION

A method and apparatus provide for routing packets in a network for use in providing alert services. The method and apparatus overcome the disadvantages of the prior art. An advantage of the method and apparatus includes significantly reducing network burden in processing and routing video clips. Another advantage includes reducing bandwidth requirements for routing video clips. Still another advantage includes reducing local traffic on a digital video recorder local area network.

In an embodiment for achieving these and other advantages, a packet is received having a header section and a payload section, which includes information relating to a video clip from a particular camera. The payload section is inspected in a network core for use in determining how to route the packet to subscribers to information from the particular camera, and the packet is selectively routed based upon the inspecting. These and other advantages may also be achieved, for example, by an apparatus that includes modules for performing these steps.

These and other advantages may also be achieved, for example, by a method for routing messages in a network providing alert services. The method includes receiving a message having a header section, at least one subject, and at least one attribute, the attribute relating to a video clip from a particular camera, retrieving the subject and the attribute from the message, retrieving a subscription based upon the subject, and applying the attribute to the subscription in a network core in order to determine how to route the message to a subscriber to information from the particular camera. These and other advantages may also be achieved, for example, by an apparatus that includes modules for performing these steps.

Likewise, these and other advantages may be achieved, for example, by a method for routing packets in a network for use in providing alert services. The method includes receiving a packet having a header section and a payload section, the payload section including information relating to an event for a particular alert service, inspecting the payload section of the packet in a network core for use in determining how to route the packet to subscribers to information for the alert service, and selectively routing the packet based upon the inspecting. These and other advantages may also be achieved, for example, by an apparatus that includes modules for performing these steps. BRIEF DESCRIPTION OF THE DRAWINGS

The accompanying drawings are incorporated in and constitute a part of this specification and, together with the description, explain the advantages and principles of the invention.

FIG. 1 is a diagram illustrating intelligent routing in a network core. FIG. 2 is a network diagram illustrating intelligent routers for publishers and subscribers.

FIG. 3 is a diagram illustrating a network infrastructure for intelligent routers and backbone routers.

FIG. 4 is a diagram of hardware components of an intelligent router. FIG. 5 is a diagram of publisher and user machines. FIG. 6 is a diagram of channel managers for intelligent routers.

FIG. 7 is a diagram of software components in a user machine for interfacing the machine with intelligent routers

FIG. 8 is a diagram of software components for an intelligent router. FIG. 9 is a diagram of a packet structure for a message.

FIG. 10 is a flow chart of a publisher method.

FIG. 11 is a flow chart of a subscriber method.

FIG. 12 is a diagram of channel and subscriber screens.

FIG. 13 is a flow chart of a content-based routing method. FIG. 14 is a flow chart of a caching method.

FIG. 15 is a diagram illustrating a cache index.

FIG. 16 is a flow chart of an agent method for an outgoing message.

FIG. 17 is a flow chart of an agent method for an incoming message.

FIG. 18 is a diagram illustrating an example of encoding of a message. FIG. 19 is a diagram of a database structure for storing subscriptions.

FIG. 20 is a flow chart of a wildcard method.

FIG. 21 is a diagram of a digital video surveillance system.

FIG. 22 is a diagram illustrating a proxy for a digital video surveillance system in a two-stage approach. FIG. 23 is a diagram of architecture for digital content delivery.

FIG. 24 is a diagram illustrating phase 1 architecture for digital content delivery.

FIG. 25 is a diagram illustrating phase 2 architecture for digital content delivery.

FIG. 26 is a diagram illustrating multiple out-links for quality of service management. FIG. 27 is a diagram illustrating a single out-link for quality of service management.

FIG. 28 is a diagram illustrating filtering and dynamic caching outside an ISP. FIG. 29 is a diagram of a cache in a network.

FIG. 30 is a diagram of a backup persistent cache in an upstream router.

FIG. 31 is a diagram illustrating interaction of a cache with a proxy and router.

FIG. 32 is a diagram illustrating cache creation on subscription. FIG. 33 is a diagram of an indexing tree.

FIG. 34 is a diagram illustrating retrieval from multiple caches.

FIG. 35 is a diagram illustrating interaction of a cache manager with other modules in the system.

FIG. 36 a diagram of a file directory structure for a cache DETAILED DESCRIPTION

Overview

An Internet-scale, or other distributed network-scale, event notification system provides applications with a powerful and flexible realization of publish-subscribe networking, h this system, an application program uses event notification application program interfaces (APIs) to publish notifications and/or to subscribe for and receive notifications about events occurring inside the network.

A notification in the system is given a subject, which is a string or other structure that classifies the kind of information the notification encapsulates. Also, a notification is completed with a set of attributes containing information specific to the notification. For example, an application might publish notifications about transactions on the New York Stock Exchange using the subject quotes.nyse and attributes symbol and price. The application might publish an individual notification having specific attribute values, for example with symbol equal to SNE (the stock ticker symbol for Sony Corporation) and price equal to 85.25. Most if not all of the attributes in a notification are predefined, in the sense that they are found in all notifications for the same family of subjects. However, publishers can add discretionary attributes on a per-notification or other basis in order to provide additional event-specific information. Therefore, not all or even any attributes need be predefined.

In this system, subscribers are not restricted to subscribing only for subjects or whole channels. Channels are further explained and defined below. They can include an hierarchical structure specifying, for example, a subject field and one or more levels of related sub-fields (sub-subjects). Thus, subscribers can provide much more finely-tuned expressions of interest by specifying content-based filters over the attributes of notifications. For example, a subscriber might subscribe for all notifications for the subject quotes.nyse having symbol equal to SNE and price greater than 90.00 (indicating perhaps a sell opportunity for a block of shares owned by the subscriber). All notifications matching the subscription can be delivered to the subscriber via a callback or other type of function that the subscriber provides at the time it registers its subscription or at other times. One subscription can be broken down into many filters. The callback can perform many computations, including something as simple as writing a message to a terminal or sending an e-mail, to something more complex such as initiating the sale of a block of shares, and to something even more complex that initiates new publish-subscribe activity (for example, replacing the existing subscription with a new subscription for a buy opportunity at a price of 75.00, or publishing a new notification that the subscriber's portfolio has been modified).

Applications are aided in their publishing and subscribing activities by agents, for example. The agents can possibly make use of or be implemented with proxies. The agents, when used, provide network connectivity for outgoing notifications and subscriptions and delivery of incoming matching notifications to subscribers. Once a notification enters the network, the system's network of routers propagate the notifications to all subscribers whose subscriptions match the notification. One way of accomplishing this would be to broadcast the notification to all points of the network and then let the application agents decide whether the notification is relevant to their subscribers. However, this is not necessarily a scalable approach — the network would usually be quickly overwhelmed by the load of message traffic, especially in the presence of large numbers of active and verbose publishers. And even if sufficient bandwidth were not a problem, the subscribers would be overwhelmed by having to process so many notifications.

The system's exemplary network is much more efficient in the way it routes notifications. First, it can use multicast routing to ensure that a notification is propagated, for example, at most once over any link in the network. Second, it can employ a large number of sophisticated optimizations on filters to reduce as much as possible the propagation of notifications.

FIG. 1 is a diagram conceptually illustrating this intelligent routing in a network core. A publisher 14 transmits content in messages via an edge router 16 to a network core 10, used in a publish-subscribe network. A publish-subscribe network includes any type of network for routing data or content from publishers to subscribers. The content is transmitted via one or more channels 18 representing logical connections between routers or other devices. An intelligent router 12 in network core 10 determines whether to route or forward the message, hi particular, intelligent router 12 can determine if the message includes content as subscribed to by a subscriber 24.

Each subscription encapsulates a subject filter and an attribute filter. Routers can possibly expand a subject filter to the set of matching subjects and merge attribute filters on a per-subject basis. An intelligent router evaluates the subject filter against the subject of notifications, and evaluates the attribute filter against the attribute values in notifications. The syntax for subject filters can possibly use wildcards, and the syntax for attribute filters can use Boolean expressions, both of which are further explained below. The term "filter" is used to describe a set of events that a subscriber is interested in receiving from publishers. Routing rules are generated from the filters and are used by intelligent routers to make routing decisions. Therefore, if the entire filter set is not satisfied by a message 26, for example, intelligent router 12 drops (discards) message 26, meaning that the message is not forwarded. If any filter of the entire set is satisfied by a message 20 according to the evaluations of subject and attribute filters, for example, intelligent router 12 routes (forwards) message 20 via edge router 22 and possibly other devices to a subscriber 24, or performs other functions internal to router 12 with message 20, according to all the routing and/or action rules prescribed for the matching filter. The search will continue until either the entire set of filters has been exhausted, or decisions about all the rules have been obtained, whichever comes first.

This type of intelligent content-based routing in a network core provides for real- time data delivery of, for example, alerts and updates. Examples of real-time data delivery for alerts include, but are not limited to, the following: stock quotes, traffic, news, travel, weather, fraud detection, security, telematics, factory automation, supply chain management, and network management. Examples of real-time data delivery for updates include, but are not limited to, the following: software updates, anti-virus updates, movie and music delivery, workflow, storage management, and cache consistency. Many other applications are possible for delivery of information for subscriptions.

Table 1 illustrates storing of subscriptions with subjects and predicates for the filtering. They can be stored in any type of data structure, as desired or necessary, anywhere in the network. As explained below, the predicates are components of subscriptions. The subscriptions can be expressed in any way, examples of which are provided below.

Figure imgf000010_0001

Table 2 provides an example of a publication and subscription for a quote server. This example is provided for illustrative purposes only, and subscriptions can include any number and types of parameters for any type of data or content.

Table 2

Quote Server Example

Subject Tree Publication

Quotes.NYSE subject = Quotes.NYSE

Quotes.AMEX Attributes

Quotes.NASDAQ Symbol = SNE Price = 51 Volume = 1000000

Attributes Subscription

Symbol Subject = Quotes.NYSE

Price Filter

Volume (Symbol = SNE) & (Price > 55)

The predicates provide the Boolean expressions for the subscription and the subjects provide an indication of a channel for the subscription. Subscriptions can be expressed in many different ways. Use of Boolean expressions is one such example and provides an ability to easily convert the subscription into a subject filter and an attribute filter for content-based routing. Subscriptions can alternatively be expressed without reference to a subject; however, use of a subject or channel (further explained below) provides a context for interpreting and applying filters to attributes.

The routing decisions can be accomplished in the network core and distributed throughout the network, alleviating processing burdens on publisher and subscriber machines, and significantly enhancing the efficiency of the network. FIG. 1 illustrates one publisher, one subscriber, and one intelligent router for illustrative purposes only; implementations can include many publishers, subscribers, and intelligent routers. The term intelligent router refers to a router or other entity having the ability to make routing decisions by inspecting the payload of a packet or message in a network core or other locations.

Network Infrastructure

FIG. 2 is a network diagram illustrating intelligent routers for publishers and subscribers. A routing entity 30 providing channel services is, for example, effectively layered on a network infrastructure, as explained below, for routing messages among intelligent routers. A publisher 32 conceptually includes, for example, an application 34 to receive an indication of published content, such as a pointer for retrieving the content, and an agent 36 to encode the content for network transmission via channel services 30. A collection of logically interconnected intelligent routers 38, 40, 42, 44, 46, and 48 route the content from the publisher using routing rules generated from subject filters and attribute filters for subscriptions. A plurality of links 39, 41, 43, and 45 provide the logical connections between intelligent routers 38, 40, 42, 44, 46, and 48. Other links 37 and 47 provide, respectively, logical connections between publisher 32 and intelligent router 38, and between a subscriber 54 and intelligent router 46. Subscriber 54 includes an agent 50 to detect and receive the subscribed content, and an application 52 to present the content.

A channel can include, for example, a related set of logical multicast connections implemented in a distributed manner. A channel in this exemplary embodiment is a logically related collection of network resources used to serve a community of publishers and subscribers exchanging content. The content is classified according to the channel subject namespace, and the resources are managed, controlled, and provisioned via channel services provided by channel managers. Multiple channels may share the same resources. Channels can provide a highly scalable directory service such as, but not limited to, the following examples: publisher and subscriber information, authentication and authorization information, message types, management information, and accounting and billing information. Channels can also provide, for example, persistence through caching, a fast data delivery mechanism, security, and user and network management. Channels can be used for any other purpose as well.

The filtering by the intelligent routers can occur in a network core to distribute routing decisions. In addition, intelligent routers can also function as edge routers connecting a user device, such as a publisher or subscriber, with the network core. Also, the same device connected to the network can function as both a publisher to push content to subscribers via routing decisions in the network and as a subscriber to received pushed content. The intelligent routers and channels can be connected in any configuration, as necessary or desired for particular implementations, and the configuration shown in FIG. 2 is provided for illustrative purposes only. FIG. 3 is a diagram of an exemplary network infrastructure for intelligent routers and conventional backbone routers, also illustrating logical connections for channels. The intelligent routers in this example use existing backbone routers in the network, such as the Internet or other distributed network, and the intelligent routers are thus effectively layered on the backbone routers. In this example, Internet Service Provider (ISP) networks 58, 59, and 60 each include several backbone routers for conventional routing of messages or packets. A plurality of intelligent routers 61-70 are connected with one or more backbone routers in ISP networks 58, 59, and 60. Intelligent routers 61-70 are also interconnected by a plurality of links 73-85, representing examples of links, and can be connected to end user devices by the links as well. Intelligent routers 61-70 can be controlled by one or more administrator machines such as an entity 71, and one or more virtual private network (VPN) controllers such as an entity 72. The ISP networks 58, 59, and 60 would also be connected to publisher and subscriber machines (not shown in FIG. 3). The backbone routers in and among ISPs 58, 59, and 60 are interconnected in any conventional way within the existing network infrastructure. The intelligent routers 61-70 and links 73-85, as illustrated, can be implemented using existing network infrastructure, and they provide for content-based routing in the network core. The links 73-85 represent logical connections between intelligent routers 61-70 and can be implemented using, for example, existing network infrastructure or other devices. A link, for example, can be implemented using a logical connection called the tunnel. A tunnel includes the hardware, and possibly software, network infrastructure for implementing a link, and one tunnel can be a component of multiple channels. The channels facilitate content-based routing in the intelligent routers by providing logical configurations for particular types of content and thus providing a context for attributes transmitted over the channels. Although intelligent routers can perform routing decisions without channels, the channels enhance the efficiency of content-based routing by the intelligent routers in the network core. This exemplary embodiment includes use of channels and links. A link is a connection between two routers-albeit intelligent routers. A channel is a network entity encompassing a (typically large) collection of routers, configured statically or dynamically by the interconnecting links to achieve one-to-many or many-to-many logical connections. In particular, a channel is a top-level logical entity describing the essential characteristics of the channel. Under one channel, there could be many subjects. Each subject will form a sub-network (such as a multicast tree) involving a collection of interconnected routers. These subject-based sub-networks can be allocated, oriented, and configured in different manners. The channel, being a collection of all the sub-networks formed for the subjects under it, may resemble a mesh of networks, for example. FIG. 4 is a diagram of exemplary hardware components of an intelligent router 92, which can correspond with any of the other referenced intelligent routers. A network node 90 can include intelligent router 92 connected with a conventional backbone router 95. Intelligent router 92 includes a processor 93 connected to a memory 94 and a secondary storage 97 (possibly implemented with a detached machine, for example), either of which can store data, as well as cache data, and store applications for execution by processor 93. Secondary storage 97 provides non-volatile storage of data. Under software control as explained below, processor 93 provides instructions to backbone router 95 for it to route (forward) or not route (discard) messages or packets based upon routing rules generated from subject filters and attribute filters for subscriptions. Although shown as implemented in a separate processor-controlled device, intelligent router 92 can alternatively be implemented in an application specific integrated circuit (ASIC) within backbone router 95 to provide the intelligent routing functions in hardware possibly with embedded software. The intelligent routing functions can also be alternatively implemented in a combination of software and hardware in one or multiple routing devices.

FIG. 5 is a diagram of exemplary publisher and subscriber machines. A publisher machine 100 or 118 can include the following components: a memory 102 storing one or more publisher applications 104 and an agent application 105; a secondary storage device 112 providing non- volatile storage of data; an input device 108 for entering information or commands; a processor 114 for executing applications stored in memory 102 or received from other storage devices; an output device 110 for outputting information; and a display device 116 for providing a visual display of information. A subscriber machine 122 or 140 can include the following components: a memory 124 storing one or more applications 126 and an agent application 128; a secondary storage device 130 providing non- volatile storage of data; an input device 132 for entering information or commands; a processor 134 for executing applications stored in memory 124 or received from other storage devices; an output device 136 for outputting information; and a display device 138 for providing a visual display of information. Publisher and subscriber machines can alternatively include more or fewer components, or different components, in any configuration.

Publisher machines 100 and 118 are connected with subscriber machines 122 and 140 via a network 120 such as the network described above. Network 120 includes intelligent routers for providing distributed routing of data or content in the network core via packets or messages. Although only two publisher and subscriber machines are shown, network 120 can be scaled to include more publisher and subscriber machines. The publisher and subscriber machines can be implemented with any processor-controlled device such as, but not limited to, the following examples: a server; a personal computer; a notebook computer; a personal digital assistant; a telephone; a cellular telephone; a pager; or other devices. Network 120 with intelligent routers can include any wireline or wireless distributed network, connecting wired devices, wireless devices, or both. Network 120 can also potentially use existing or conventional network infrastructure.

FIG. 6 is a diagram illustrating channel managers 150 for intelligent routers. In this example, channel managers 150 are implemented with multiple servers 152, 154, and

156. Each server includes its own local storage 158, 160, and 162. Intelligent routers 164,

166, and 168 contact channel managers for information about particular channels. The channel managers can also provide for data persistence, fail over functions, or other functions. The channel managers thus provide the channel services, which include a database or set of databases anywhere in the network specifying, for example, channel- related information, properties for data persistence, user information for publishers and subscribers, and infrastructure information. The infrastructure information can include, for example, an identification of intelligent routers and corresponding tunnels connecting them, subjects for the channels, and attributes for the channels (a name and type for each attribute). Packets or messages can also carry channel-related information including identification of fixed attributes and variable attributes. A user when on-line can download channel information. For example, a user can register by using a user name and password. Upon authenticating the user's log-on, the user can open (invoke) a channel and retrieve infoπnation about the channel from the channel managers. Publishers can use that information in publishing content, and subscribers can use that information for entering and registering subscriptions. Channel Managers 152, 154 and 156 preferably form a group to perform the persistent, reliable channel directory service. One of the channel manger will be the primary and the others are backup channel managers. If the primary fails, the neighbor of the primary takes over to be the new primary channel manager to keep the service reliable. Each intelligent router keeps the addresses of these channel managers. If there is one channel managers can not be reached by the intelligent router, it will look for another one to retrieve the information. Devices in the network can use commands, for example, to retrieve channel information, examples of which are provided in Table 3. Intelligent routers can alternatively only have a primary channel manager or more than two channel managers. FIG. 7 is a diagram of exemplary software components in a stack 180 in a user machine or device for connecting it with a network having intelligent routers. The user machine can be used as a publisher, subscriber, or both, and it can include the exemplary devices identified above. Stack 180 can include one or more user applications 182, which can provide for receiving subscriptions from a user, receiving channel infoπnation from a publisher, or receiving content or data to be published. User application 182 can also include any other type of application for execution by a user machine or device. The stack 180 can also include, for example, an agent 184, an event library 186, a cache library 188, a channel library 190, a messaging library 192, and a dispatcher library 194. Agent 184 provides for establishing network connections or other functions, and Table 3 provides examples of commands implemented by agent 184, which can use proxy commands or other types of commands. Event library 186 logs events concerning a user machine or other events or information. Cache library 188 provides for local caching of data. Channel library 190 stores identifications of channels and information for them. Dispatcher library 194 provides connections with a control path 196, a channel manager 198, and one or more intelligent routers 200, and it can include the exemplary functions identified in Table 4. Messaging library 192 provides a connection with a data path 204.

Tables 5-9 provide examples of messaging APIs in the C programming language. Tables 5 and 6 provide examples of APIs to send and retrieve messages. Tables 7 and 8 provide examples of APIs to send and retrieve notifications. Table 9 provides examples of APIs to send and retrieve control messages. These APIs and other APIs, programs, and data structures in this description are provided only as examples for implementing particular functions or features, and implementations can include any type of APIs or other software entities in any programming language.

Figure imgf000016_0001

Table 4

Dispatcher Functions

Server-Side Listens for connections (sits on accept). Creates a thread to handle each connection. The thread is responsible for receiving and processing all requests coming on that connection.

Client-Side Creates a thread that initiates a connection and is responsible for receiving and processing all data coming into the connection. Table 5

Example of API to Send a Message

PCJStatus PC_msg_init(ChannelHandle ch, PC JINT chid, PC JINT userid,

PC Typelnfo* MsgType, PC_UTNT msgTypeSize,

PC_msg_SessionHandle *sess); PC_Status PC_msg_cleanup(PC_msg_SessionHandle sess); PCJStatus PC_msg_closeTransport(PC_msg_SessionHandle sess); PC_Status PC_msg_create(PC_msg_SessionHandle s, PC_msg_DataType dType,

PC_msg_MsgHandle *msg); PC_Status PC_msg_delete(PC_msg_MsgHandle msg);

PC_Status PC_msg_clone(PC_msg_MsgHandle org, PC_msg_MsgHandle *new); PCJStatus PC_msg_setSubject(PC_msg_MsgHandle msg, PC_CHAR ^subject); PCJStatus PC_msg_setSubjectint(PC_msg_MsgHandle msg,

PC_USHORT *subjectArray, PC_UINT arraySize); PCJStatus PC_msg_setAttrByNameInt(PC_msg_MSGHandle msg, const PC_CHAR *name, PC_INT value); // for each type PC_Status PC_msg_setAttrByPosInt(PC_msg_MsgHandle msg,

PCJJINT attributePos, PC NT Value); // for each type PCJStatus PCjnsg_addAttrInt(PC nsgJVIsgHandle msg, const PC CHAR *name,

PCJNT value); // for each type PC_Status PC_msg_send(PC_msg_MsgHandle msg);

Table 6

Example of API to Retrieve a Message

typedef struct_attribute {

PC_CHAR *name;

PC_T peCode type; void *value;

PC_UINT arraySize;

} PC_msg_Attribute; typedef struct_attributeArray {

PCJJINT size;

PC_msg_Attribute **attrs;

} PC_msg_AttributeArray;

PCJStatus PC_msg_init(ChannelHandle ch, PC_UINT chid, PC_UINT userid, PCjTypelnfo*

MsgType, PC_INT msgTypeSize, PC_msg_SessionHandle *sess); PCJStatus PC_msg_cleanup(PC_msg_SessionHandle sess); PCjStatus PC_msg_recv(PC_msg_SessionHandle sh, PC_msg_MsgHandle *msg); PCjStatus PC_msg_ctrlRecv(PC_msg_SessionHandle sh, PC_msg_MsgHandle

*msg); PCjStatus PC_msg_getSequenceNum(PC_msg_MsgHandle msg, PCJUINT *seqNo); PC_ Status PC_msg_getPublisherInfo(PC_msg V[sgHandle msg, PC_msgJ?ublicInfo *pub);

PC Status PC_msg_getSubject(PC_msg_MsgHandle msg, PC_CHAR **subject); PC_ _Status PC_msg_getSubjectInt(PC_msgJVlsgHandle msg,

PCJJSHORT **subjectArray, PC_INT *size);

PC _Status PC_msg_getDataType(PC_msgJVlsgHandle hMsg,

PC_msg_DataType *dataType);

PC _Status PC_msg_getAttrByPosInt(PC_msgJVlsgHandle msg, PCJJINT pos, PCJNT *val); // for each type

PC. Status PC_msg_getAttrValueByNameInt(PC_msgJVlsgHandle msg, const PC_CHAR *name, PC_INT *val);

PC_ _Status PC_msg_getAttrTypes(PC_msgjVlsgHandle msg, PCJTypeCode* Types,

PCJNT *arraySize);

PC Status PC_msg_getAttributeByPos(PC_msgJVIsgHandle msg,

PCJJINT attributePos, PC_msg_Attribute **attr);

PC. Status PC_msg_getAttributeByName(PC_msgJVIsgHandle msg, const PCJJHAR *name, PC_msg_Attribute **attr);

PC. Status PC_msg_getPredefinedAttributes(PC_msgJVIsgHandle msg,

PC_msg_AttributeArray **attrs );

PC. Status PC_msg_getDiscretionaryAttributes(PC_msg_MsgHandle msg,

PC_msg_AttributeArray **attrs);

Void PC_msgJιeeAttribute(PC_msgAttribute *attr); Void PCjmsg iree AttributeArray(PC_msg_AttributeArray* attr Array) ;

Table 7

Example of API to Send a Notification

ChannelHandle ch;

PC nsgJVIsgHandle msg; PC sgjSessionHandle sh; PC_msgJTypeInfo Types[2]; Types [0].type = PCJSTRING_TYPE; Types [OJ.name = "company" Types [lj.type = PC_INT_TYPE; Types [lj.name = "stockvalue"

PCjmsg nit(ch, chid, userid, Types, 2, &sh)

PC nsg_create(sh, PC_MSG_DATA, &msg); PC_msg__setAttrValueByNameInt(msg, "stockvalue", 100); PC_msg_setAttrValueByPosString(msg, 1, "PreCache"); PC nsg_addAttrString(msg, "comment", "mycomments");

PC _msg_send(msg) ; PC_msg_delete(msg); PC_msg_closeTransport(sh); PC_msg_cleanup(sh); Table 8

Example of API to Retrieve a Notification

ChannelHandle ch;

PC_msgJMsgHandle msg: PC nsgJSessionHandle sh; PC_msg_TypeInfo Types[2]; PC_msg_AttributeArray *attrArray; PC_CHAR *company; PC_INT value;

Types [Oj.type = PCJSTRTNG_TYPE; Types [0].name = "company" Types [lj.type = PC_INTJTYPE; Types [l].name = "stockvalue"

PC_msgJnit(ch, chid, userid, Types, 2, &sh); While (1) {

PC_msg_recv(sh, &msg);

PC_msg_getAttrValueByPosString(msg, 0, &company); PCjtnsg_getAttrValueByNamehιt(msg, "stockvalue", &value); PC_msg_getDynamicAttributes(msg, &attrArray) ; PCjmsg _freeAttributeArray(attrArray) ; PC_msg_delete(msg);

} PC_msg_closeTransport(sh);

PC_msg_cleanup(sh);

Figure imgf000019_0001
PC_msg_addAttrString(mh, PC_msg_closeTransport(sh);

"Subject", "Quote.cboe"); PC_msg_cleanup(sh); PC_msg_send(mh); PC_msg_delete(mh);

FIG. 8 is a diagram of exemplary software components 210 for an intelligent router such as those identified above and intelligent router 92 shown in FIG. 4. Software components 210 can be stored in, for example, memory 94 for execution by processor 93 in intelligent router 92. Components 210 include, for example, a filtering daemon 212, a dispatcher 214, a routing daemon 216, and a cache manager 218. Filtering daemon 212 provides filtering for content-based routing to process content for subscriptions according to routing rules, as explained below. Dispatcher 214 provides for communication of control messages such as those required for propagating filters via path 220, and the dispatcher can also provide for a single point of entry for users and one secure socket with channel managers, enhancing security of the network. In other words, users do not directly contact channel managers in this example, although they may in alternative implementations. Dispatcher 214 uses control messages to obtain attributes (name-value pairs) from a channel manager. Routing daemon 216 provides for communication with a data path 222, which can occur via a conventional backbone router as illustrated in FIG. 4 or other routing device. Cache manager 218 provides for local caching of data at the network node including the corresponding intelligent router. The operation of cache manager 218 is further explained below, and it provides for distributed caching of data throughout the network core. Content-based routing can be implemented at the kernel level, as an alternative to the application level. Memory accessible by the kernel is separate from that in the application layer. To have content-based routing running in the application requires, for example, that message data be copied from the kernel memory area to the application area, and switching the context of the application from that of the kernel to that of the routing application. Both can induce substantial overhead. If instead the kernel is modified to support content-based routing, the routing could take place much faster being rid of the overhead described above.

With this feature of content-based routing in the kernel, the routing daemon 216 may or may not directly send or receive data via the data path 222, depending on the implementation. The daemon is a process running in the application layer, pre-computing the content-based routing table to be injected into the kernel. Once injected, however, the routing table can be used by the kernel to make routing decisions. Similarly, the filtering daemon pre-computes the filtering table and injects it into the kernel, hi this kernel implementation, neither the routing daemon nor the filtering daemon would directly interact with the data path.

FIG. 9 is a diagram of an example of a packet structure 230 for a message possibly including content for subscriptions. A packet or message for use in content-based routing includes, for example, a header section and a payload section. The header section specifies routing or other information. The payload section specifies data or content, or an indication of the data or content. Packet structure 230 includes an IP header 232, a User Datagram Protocol (UDP) Transmission Control Protocol (TCP) header 234, a length value 238, one or more subject fields 240, and one or more attributes 242. Packet structure 230 illustrates a basic structure for a length value and the subjects and attributes. A packet used in content-based routing can also include other or different elements, such as those illustrated in the example of FIG. 18 explained below, and packets for content- based routing can be configured in any manner. Also, the attributes can include discretionary attributes appended to the end of a message, for example. These discretionary attributes are ad-hoc information, for example, added by the publisher (or even routers) that cannot necessarily be conveyed using the message format prescribed for the channel.

Publisher and Subscriber Methodologies

FIG. 10 is a flow chart of an exemplary publisher method 250 for use by a publisher to set-up a channel and publish content. Method 250 can be implemented, for example, in software modules including agent 106 for execution by processor 114 in publisher machine 100. In method 150, agent 106 in the publisher machine receives a publisher creation of a proxy for a channel (step 252). The proxy provides for communication with the network. Agent 106 determines a message format for the channel through an interface (step 253), and the format information can be obtained from, for example, the channel managers or other entities in the network. Agent 106 sets up the proxy for the channel using the received channel information (step 254), which includes receiving attributes for the channel (step 256) and creating a notification on the channel (step 258). The notification provides content for devices "listening" for content on the channel. The attributes define parameters and characteristics for the notification.

Agent 106 transmits an identifier (ID) of the channel and content information to intelligent routers in the network core or elsewhere for use in processing subscriptions (step 260). The publisher populates the notification attributes with appropriate values (step 261), and the publisher can then publish content on notification in accordance with the channel attributes (step 262). Steps 260-262 in this example accomplish publishing the notification, which can alternatively involve different or additional steps depending upon a particular implementation. Therefore, the information associated with a notification in this example is partitioned into an ordered sequence of attributes, each of which has a name, a position within the notification (starting at 1), a type, and a value. Alternatively, attributes can have different characteristics depending upon a particular implementation. Attributes can include, for example, predefined attributes, discretionary attributes, or both. The intelligent routers can use the channel ID in a packet to obtain the attributes for the corresponding channel, which determines the structure or format for packets transmitted via the channel, h particular, each packet can contain, for example, a tag associated with a channel ID and other header information such as a publisher ID and subjects. The tags can be used to map subjects to numbers in the message format, an example of which is shown in FIG. 18. Small integer values, for example sixteen bit values, can be used for the numbers. Alternatively, any other type of numbers or information can be used to map the subjects. Mapping subjects to numbers can provide particular advantages; for example, it can save space in the message format and provide a uniform or standard way to specify indications of the subjects in the message so that they can be quickly located and identified. Intelligent routers can locally store the mapping or, alternatively, use the numbers to remotely obtain the corresponding subject through a command.

Table 10 illustrates a structure for mapping numbers to subjects, in this example using integer values. The subject tree parameter in the table indicates that a subject can include one or more subject fields in an hierarchical relationship; for example, a subject tree can include a string of subject fields demarcated by particular symbols. Examples of subject trees are provided in Table 2. As an example, a subject tree quotes.nyse includes a subject "quotes" and a sub-field "nyse" with those two terms demarcates by a "." as found in URLs or other network addresses. Aside from using periods and specifying URL-type strings, subject trees can be specified in any way using any characters and symbols for demarcation.

Figure imgf000023_0001

Thus, knowing the packet format or structure for a particular channel, the intelligent routers can quickly locate subjects and attributes, or other information, in the packet for content-based routing. For example, a channel can specify byte positions of subjects and attributes transmitted over the channel, making them easy to locate by counting bytes in the packet. Alternatively, intelligent routers can parse packets to locate subjects and attributes, or other information.

Table 11 provides an example of a publisher program in the C++ programming language. Table 12 provides an example of an API to create a channel. Table 13 provides an example of a channel configuration file maintained by a channel manager (see FIG. 6) and providing channel-related information, as illustrated. The system can alternatively have a global channel manager providing IP addresses of geographically dispersed servers functioning as local channel managers in order to distribute the processing load.

Table 11

Example of Publisher Program

#include "PC_evnJ otification.h" #include "PC_evn_Proxy.h" using namespace ρrecache::event; int main(int argc, char argv[])

{

PCJJINT QuotesRUs = myChanneloflnterest; // channel ID

PCJJINT mylD = myPublisherlD; // publisher ID

Figure imgf000024_0001

Table 12

Example of API to Create a Channel

PCJStatus re; re = PC_cl n_create(Provider_info, authinfo, ConfigurationFile, &hChannel);

/* the first one primary channel manager */ re = PC_chn_addChannelManager (hChannel, "10.0.1.1");

/* secondary channel manager */ re = PC_chn_addChannelManager (hChannel, "10.0.2.2");

*/ re = PC_clrn_setProperties (hChannel, ConfigurationFile);

/*

Set the message type (only in fixed part of the message) by using re = PC_chn_setAttributeType(hChannel, name, position, attributeType).

The type information is propagated to all edge routers. */ re = PC_chn_setAttributeType(hChannel,"Priority",l, PCJJINT 16JTYPE); re = PC_chn_setAttributeType(hChannel,"Alaπn_Name",2, PCjSTRTNGjTYPE); re = PC_chn setAttributeType(hChannel,"Alarm Time",3, PC INT32 TYPE); rc = PC_chn_updateAttribute(hChannel); re = PC_chn_close(hChannel); /* finish channel creation */

Table 13

Example of a Channel Configuration File

# Channel Setup - Read by Channel API, event and messaging

# Each channel entry information is tagged with the

# type of information e.g.

# [ChannelComm 5] for Channel 5 Communication related information

# [ChannelSubjects 5] for subject related information in channel 5

# [ChannelAttributes 5] for attribute information in channel 5 #

# The Channel id is appended to the tag to indicate

# the channel that the information belongs to

# e.g. [ChannelComm 5] indicates routing information

# for channel 5. #

# All the fields need not be set. For example if

# running with the central server, the MulticastIP is

# not needed.

[ChannelComm 5]

MulticastlP=225.0.0.1

RouterIP=test3

RouterPort=12345

ProxyPort=9015

ProxyCtrlPort=9016

[ChannelSubjects 5] NumberOfSubj ects=2 subjects #.SUBSCRIPTION mapping 1=0.100 subject2=Quotes.Nyse mapρing2=102.101

[ChannelAttributes 5]

NumberOfAttributes=4 namel=StockId typel=PC_UINT_TYPE name2=Company type2=PC_CHARARRAYjTYPE name3=Price type3=PC_FLOAT TYPE name4=Volume type4=PC_UINT_TYPE FIG. 11 is a flow chart of a subscriber method 264 for use in receiving and processing subscriptions. Method 266 can be implemented, for example, in software modules including agent 128 for execution by processor 134 in subscriber machine 122. In method 264, a graphical user interface (GUI), for example, presents an indication of available channels to a user (step 266), which can be accomplished by application 126. The information identifying the channels can be received from, for example, the channel managers providing channel-related information. Any type of application 126 can be used for presenting identifications of channels in any particular way or format. The application receives a user's selection of a channel (step 268) and calls an API or other program for the selected channel (step 270). The API presents subscription options to the user for the channel corresponding with the selected option (step 272). The API receives values for the subscription from the user (step 274) and sends the subscription to agent 128 for processing, as explained below (step 276).

The parameters for the subscription can include, for example, the predicates as illustrated in Table 1. Each chaimel can use its own API, for example, in order to process subscriptions according to the particular requirements or parameters for the corresponding channel. These APIs can include, for example, web-based or Java-based APIs for receiving subscriptions and can use any type of user interface and processing to receive information for a subscription and pass it along to the agent application. FIG. 12 is a diagram conceptually illustrating channel and subscriber screens or

GUIs 278 and 284, which can be used in conjunction with method 264 for receiving a subscription. Screen 278 includes a plurality of sections 282 identifying available channels for selection by a user. Upon selection of a particular channel, screen 284 can be displayed for receiving a user's values for the subscription in a section 286. A user can select a section 288 to submit the subscription or select a section 290 to cancel the subscription. Screens 278 and 284 can be formatted as, for example, HyperText Markup Language (HTML) web pages or in any other format. Also, the screens can include any configuration of sections and content, possibly including, for example, text, graphics, pictures, various colors, or multi-media information in order to provide, as desired, a user- friendly and visually appealing interface for subscribers. The screens can also include a toolbar 280 providing, for example, conventional browser functions. Table 14 provides an example of a subscriber program in the C++ programming language.

Figure imgf000027_0001
catch (InvalidChannelException ifex) { cerr « "bad filter"« endl;

} catch (InvalidSubscriptionHandleException ishex) { cerr « "bas subscription handle" « endl;

} catch (Exception ex) { cerr « "unknown error" « endl;

} } void Notify(Notification* n, void* c) // this is the callback method

{ if (*(PCJNT*)c = 0){ // check the closure object PCJSTRING symbol; PC_FLOAT price; n->GetPredefinedAttr("symbol", symbol); n->GetPredefinedAttr("price", price); cout « "The price of" « symbol « " is " « price « endl; notificationCount++;

}; int main(int argc, char argv[])

{

SubscriberApp a; a.run();

Content-Based Routing Via Payload Inspection and Channels

FIG. 13 is a flow chart of a content-based routing via payload inspection method 300. Method 300 can be implemented, for example, in software modules for execution by processor 93 in intelligent router 92, as represented by filtering daemon 212. Alternatively, it can be implemented in an ASIC or a combination of hardware and software. The content-based routing as illustrated in method 300 can be performed in intelligent routers anywhere in the network, such as in the network core or in edge routers. h a general sense, the content-based routing involves inspecting a payload section of a packet in order to determine how to process the packet. This content-based routing methodology can include, for example, processing a list of subscriptions (using filters, for example) in any order, comparing a message subject-by-subject and attribute-by- attribute with routing rules to determine a routing for the message, and performing the processing in a network core. The rules can include rules governing in-router processing or any rules associated with a filter. These routing decisions can thus be distributed throughout a network core. The use of subjects as represented by channels determines a message format, thus providing an intelligent router with a way of quickly locating attributes within the message, for example by knowing their byte positions in the message or packet for a particular channel.

In method 300, intelligent router 92 receives a packet for a message (step 302). It determines from the packet a channel ID for the corresponding message (step 304) and retrieves attributes for the channel using the channel ID (step 306). In this example, the type of channel (determined from the channel ID) determines locations and data types of attributes in the packet. The attributes for the channel can be locally stored or retrieved remotely such as via a channel manager. Intelligent router 92 retrieves a filter, which corresponds with a subscription (step 308). The filter includes one or more attribute tests, usually a group of attribute tests for subscriptions. Intelligent router 92 applies attributes in the packet to the corresponding attribute test(s) in the filter description (step 310).

If all the attribute test(s) in the filter description produce a positive result (step 312), meaning the attributes satisfy all the attribute test(s), the intelligent router executes a set of functions prescribed by the rules associated with the filter (step 314). These functions can include, for example, routing the packet to the next link, and/or performing some action or computation with the content of the packet at the local router as prescribed by the rule(s). The action or next link can be identified, for example, in a data structure specifying the corresponding subscription. When the rule is a link, it typically identifies the next network node to receive the packet, which can include an intelligent router, backbone router, a network-connected device, or other entity. Alternatively, the next links can be specified or associated with the subscriptions in other ways.

If all the attribute test(s) in the filter description did not produce a positive result

(step 312), meaning the attributes do not satisfy all the attribute test(s), the filter is declared a mismatch (step 315). The intelligent router recursively follows the above procedure until all the attribute tests in the filter description are exhausted or a first negative result is encountered, whichever comes first. Once all the attribute tests have been processed for this filter, the intelligent router determines if more filters exist (step 316) and, if so, it returns to step 308 to retrieve the attribute test(s) for the next filter to process the attributes for it. The matching procedure (steps 308, 310, 312, 314, 315, and 316) continues until either the complete set of filters is exhausted, or results for all the action or routing rules can be determined, whichever comes first. If the packet does not satisfy any filter, it will be dropped (discarded) and not forwarded.

Intelligent router 92 can sequence through the filters in any particular order. For example, as illustrated in Table 15, intelligent router can store the filters for subscriptions in a file or routing table and linearly sequence through them to apply the attributes to filters (attribute tests). Alternatively, the routing table can include links or pointers to the filters.

The content-based routing can optionally use more than one method at the same time, depending on the applications and performance-enhancing heuristics such as the switching of algorithms based on traffic conditions, for example. The filters for the processing can optionally be encrypted, decrypted, transformed, and merged at a router in the network for use in performing inspecting of a payload section for the content-based routing. For example, a subscription such as price > $3.54122 may be truncated to price > $3.54 because the publications in the application are known not to contain currency attributes beyond the second decimal points. Also, foreign currency may be translated into U.S. currencies as well when a publication sent from overseas reaches the first router located in the U.S., for example.

As an alternative to a linear approach, intelligent router 92 can select filters for processing in other orders or according to various algorithms that can possibly enhance the speed and efficiency of processing. Table 16 provides examples of subscriptions and corresponding links for them; in these examples, the subjects relate to a particular chaimel and the subscriptions for the subjects can be represented by routing rules for the filters. The subjects can include, for example, network addresses such as Uniform Resource Locators (URLs) identifying a source of content.

Table 15

Channel 1

Subscriptions Links

Figure imgf000031_0001

Figure imgf000031_0002

Caching at Network Nodes

FIG. 14 is a flow chart of a caching method 320. Method 320 can be implemented, for example, in software modules for execution by processor 93 in intelligent router 92, as represented by cache manager 218. Alternatively, it can be implemented in an ASIC or a combination of hardware and software, either in the same or different physical device as the corresponding intelligent router, hi method 320, intelligent router 92 receives a message having data or content, a channel ID, and subjects (step 322). Intelligent router 92 time marks the data (step 324) and locally caches it such as in memory 94 or secondary storage 97 (step 326). It indexes the cached data by, for example, channel ID, subjects, and time stamps (step 328).

If intelligent router 92 receives a request for data (step 330), it retrieves cached data, using the index, according to the request (step 332). Intelligent router 92 transfers the cached data to backbone router 95 or other routing entity for eventual transmission to the requestor or others. Method 320 can be repeatedly executed in order to continually cache data and retrieve cache data in response to requests.

FIG. 15 is a diagram illustrating a cache index (336) for use with method 320. Cache index (336) receives data (338) and stores it with time stamps (340). As data is gathered, it is marked upon every duration of delta t, where delta t represents the time between marks, for example t - 1\. Other types of indexes for time marking in any way can alternatively be used.

Table 17 conceptually illustrates indexing of cached data. Table 18 conceptually illustrates a data structure for storing a connection history for caching. Table 19 provides examples of data structures for use in locally caching data in network nodes having intelligent routers.

The time marking can occur at any fixed or variable interval. For example, data can be cached and indexed every five minutes. Upon receiving a command to retrieve cached data (such as #.getCache) specifying a time and subject, channel manager 218 uses the cache index to determine if it can retrieve cached data corresponding with the request for step 332.

Each subject or channel can include, for example, its own IP address in a multicast tree and a set of intelligent routers. Therefore, Table 18 represents a connection history among such routers that can be locally stored a user machine; if an edge router fails, the machine can access the connection history to determine how to reconnect with upstream routers for the channel when the edge router comes back on-line. It can also execute a get cache command for the duration of the time that it was disconnected in order to obtain any pending content for subscriptions, for example.

Figure imgf000032_0002

Figure imgf000032_0001
Figure imgf000033_0001

Table 19

Examples of Cache Data Structures for Intelligent Router

Channel Node

Struct ChannelNode {

PC UINT unChanld;

PC Attributehifo *pAttrinfo;

PC BOOL bPersistent; /* Persistent or RT*/

PC UINT unTimeout;

PC UΓNT unTimeGranularity;/* in minutes */

PC INT iiDirFd;

HashTable *pFirstLevelSubj s; }

Subject Node

Struct SubjectNode {

PC USHORT unSubjectld;

PC UTNT unSubj Level;

Void pParent; /* Channel or Subject */

PC INT nDirFd;

HashTable *pNextLevelSubj s;

DataNode *pData; }

Data Node

Struct DataNode {

PC INT nDirFd;

SubjectNode *pParent;

LastTimeGrainNode *ρLastTGrainData;

DLIST *pStoredData;/*list StoredTimeGrainNode */

PC Mutex mStoredDataLock; }

Stored Time Grain Node

Struct StoredTimeGrainNode { PCJJINT unStartTime; /* in minutes */Chanld; |

PCJJINT unEndTime; /* in minutes */

PC INT nFd;

Last Time Grain Node

Struct LastTimeGrainNode { PC CHAR pLastTGrainData; /* could be a list */ PCJJTNT unLastTGrainStartTime; PC_BOOL bReadyToStore; PC Mutex mCachedDataLock;

}

These exemplary data structures include the following information. A subject node contains a subject identifier, subject level, pointer to parent channel or subject node, file descriptor for its own directory, pointer to hash table containing its next level subject nodes, and pointer to a data node. A data node contains a pointer to its subject parent node, file descriptor for the data directory, circular buffer containing the data structures for the data stored on each storage device, head and tail of the buffer, and lock for locking the data node during retrieval and storage. The stored time grain node is the node representing the actual data file, and the last time grain node represents the last buffer that has not yet been stored to the storage device but is maintained in memory. The caching and data storage threads in this example use the mutex of the last time grain node for preventing concurrent access to the last time grain node.

Agent Processing

FIG. 16 is a flow chart of an agent method 350 for an outgoing subscription message. Method 350 can be implemented, for example, in software modules as represented by agent 128 for execution by processor 134 in user (subscriber) machine 122. In method 350, agent 128 receives a subscription such as via the method described above in FIGS. 11 and 12 (step 352). Agent 128 creates a string specifying a Boolean expression for the subscription (step 354) and parses the string to detect any errors in the subscription (step 356). If an error exists, agent 128 can present an error message to the user (step 360) in order for the user to correct the error and re-enter the subscription. If the subscription contains no errors (step 358), agent 128 stores the expression in a data structure, an example of which is provided below (step 362). Agent 128 translates constituent not- equal expressions in the data structure to positive form (step 364) and translates the data structure to a corresponding disjunctive normal form (DNF) structure (step 366). Agent 128 also simplifies AND expressions of the DNF structure to contain only range filters and membership tests (step 368).

The DNF is a well-known canonical form in which a Boolean expression is represented as an OR of one or more sub-expressions called disjuncts, each sub-expression being an AND of one or more attribute tests. For example, the Boolean expression (price

>= 10 AND (symbol == "LU" OR symbol = "T")) has an equivalent DNF representation of ((price >= 10 AND symbol = "LU") OR (price >= 10 AND symbol = "T")).

The transformation in step 364 involves translating expressions having the "not- equal" operator (represented in an exemplary syntax as !=) into an equivalent "positive" form that specifies all allowed values rather than the one disallowed value. This transformation is performed prior to creation of the DNF, and it is needed because the routers in this example require formulae to be in positive form. For example, the expression (price != 80) can be transformed to the equivalent positive expression (price <= 79 OR price >= 81).

The transformation in step 368 is performed after the DNF is created and involves an extra simplification of the resulting AND expressions, and it is also performed to simplify the work of the routers in this example. In particular, an AND of multiple attribute tests for the same attribute can be simplified into a canonical "range filter" having either one lower bound, one upper bound, both a lower and upper bound, or a single value in the case of an equality test. The particular kind of range filter is then encoded according to Table 22. For example, the expression (price >= 10 AND price <= 80 AND price >=20 AND price <= 100) can be simplified to the expression (price >= 20 AND price <= 80), which is an example of a range filter with both a lower and an upper bound. Examples of the other kinds after simplification are the following: (price >= 20) (lower bound only); (price <= 80) (upper bound only); and (price == 50) (single value), hi creating these range filters, it is possible that some sub-expression will simplify to true or to false, in which case the subexpression can be eliminated according to the laws of Boolean algebra, thereby further optimizing the encoding of the expression in a message. For example, the expression (price >= 50 AND price <= 20) simplifies to false, since no value for "price" can satisfy the expression, hi the special case in which a whole filter expression simplifies to false, the agent need not create a message at all, thereby relieving the router of unnecessary work. If the subject filter contains wildcards, agent 128 can optionally convert them as explained below (step 370). Otherwise, any wildcards can be converted in the network, rather than on the user machine or other device. In this exemplary embodiment, the syntax for subject filters is the only syntax that uses wildcards, and the syntax for attribute filters is the only syntax that uses Boolean expressions. Alternatively, implementations can use different or varying types of syntax for subject filters and attribute filters.

Agent 128 encodes the resulting DNF expression into a message (step 372) and transfers the message to an intelligent router (step 374). The encoding can involve converting the subscription to a flat message format, meaning that it constitutes a string of data. This transferring can involve propagating routing rules generated from subject filters and attribute filters for the subscription to one or more intelligent routers or other routing entities in the network. For the propagation, the subscription expression can be mapped into a conventional packet structure, for example.

The encoding for step 372 involves marshalling subscriptions for a channel into a messaging format of the messaging API for propagation throughout a channel. A subscription is internally messaged, for example, as a notification with subject #.SUBSCR_PTION. Because there are both a variable number of subject filter fields and a variable number of attribute tests, one pair of bytes is used to store the number of subject filter fields, and another pair of bytes is used to store the number of attribute tests in this example. The individual fields of the subject filter are marshaled sequentially, for example, in the order in which they were specified in the original subscription and are each marshaled into a two-byte portion of the message. Wildcard fields can be marshaled as described below.

In marshaling the attribute tests, the operands of the tests are marshaled at the end of the message in a manner similar to the marshaling of attribute values of notifications. Prior to marshaling the attribute tests and operands, they are sorted by attribute order within each disjunct of the DNF with tests on predefined attributes in position order, followed by tests on discretionary attributes in name order. Furthermore, the set of relational tests on scalar valued attributes within each disjunct are simplified to a canonical form as range filters having either one limit (for left- or right-open ranges or equality tests) or two limits (for closed ranges between distinct limits). The remaining information about the tests is encoded into, for example, two-byte pairs in the same order as the operands; this sequence of two-byte pairs is placed in the message immediately following the sequence of two-byte encoding of subject filter fields. The two-byte pairs can constitute one form of a sequence of bit-string encodings of attribute tests, which can also be used to represent other types of encodings aside from two-byte pairs. Examples of attribute tests are provided below.

The schema for the encoding of the attribute tests is depicted in Table 20. Table 21 illustrates encoding for the two-byte pairs, and Table 22 illustrates encoding of the Operator ID in the two-byte pairs.

Figure imgf000037_0001

Table 21

First Byte

1

D Notification Attribute Position

Second Byte

0 1

Operand Type ID Operator ID

Figure imgf000038_0001

Because the two-byte pair for a test already indicates both the type of the operand of the test and whether or not the test applies to a predefined or discretionary attribute, there is no need to separately marshal the number of tests performed on discretionary attributes or their types. This scheme assumes there are no more than 127 predefined attributes in a notification. Alternatively, this design may use more bits to encode attribute tests.

While this marshaling convention orders and groups attribute tests according to the DNF of the attribute filter, an infrastructure element (such as a router) may choose to evaluate the tests in some other order (perhaps according to dynamically derived local data about the probability of success or failure of the different tests) in order to make the overall evaluation of the attribute filter more efficient. The Subscription ID field of the message is a value generated by the agent for uniquely identifying the subscription to the agent's edge router in subsequent requests to modify or unsubscribe the subscription. In particular, a dynamic modification to the attribute filter of a subscription is propagated using the message format shown in the example of FIG. 18, except that the subject is #.RESUBSCRIPTION and the Subscription ID is that of the previously registered subscription being modified. And an unsubscription is propagated using, for example, the message format of FIG. 18 up through the Subscription ID field, with the subject being #.UNSUBSCRIPTION and the Subscription ID being that of the previously registered subscription being unsubscribed.

The following provides an example to illustrate the conversion and encoding by the agent as described above. Consider the following example attribute filter expression: price >= 10 and (symbol = "LU" or (volume >= 1000 and volume <= 10000)). FIG. 19 presents a Unified Modeling Language (UML) diagram 390 depicting the objects used by the agent in step 362 to store the expression. This diagram illustrates an hierarchical relationship for specifying the subscription, which can include variables, constant values, or both. The objects in the diagram can be instances of filter classes depending upon a particular implementation. Each SimpleFilter object depicts the values of attributes used to store information about a corresponding attribute test of the filter expression, ha the expression of FIG. 19, an OR filter 396 connects two AND filters 392 and 400. The AND filter 392 contains a simple filter 394 with attributes for the subscription. Likewise, the OR filter 396 contains a simple filter 398, and the AND filter 400 contains simple filters 402 and 404.

For the purposes of this example, attributes price, symbol, and volume are assumed to be predefined attributes of the associated channel and are assumed to be defined in positions 0, 1 and 2, respectively. Furthermore, the types of the attributes are assumed to be unsigned integer (typecode 6), character array (typecode 12), and unsigned integer (typecode 6), respectively.

Consider next a subscription containing the above example attribute filter expression as its attribute filter. FIG. 18 presents the marshaling of the subscription into a message. The schematic 386 on the left side of FIG. 18 shows the actual message contents, while the schematic 388 on the right provides a legend for the different parts of the message. The width of each schematic in this example is four bytes. Prior to marshaling, the filter has been converted to its equivalent DNF: (price >= 10 and symbol = "LU") or (price >= 10 and volume >= 1000 and volume <= 10000).

The sixteen-bit attribute test encodings are shown as bit sequences, with gaps showing the separation into the different parts. Note that the two tests on price in this example cannot be combined since they are in separate disjuncts, and thus they are marshaled separately as ranges that have no right bound ("right-open ranges"). On the other hand, the two tests on volume can be combined since they are in the same disjunct, and thus they are marshaled together as a single "closed-range" test.

Finally, note also that certain fields are characterized as being "assumed"; this means that values for these fields were chosen arbitrarily for this example and are in general independent of the subscription that was marshaled. In addition, the subject filter for the subscription was arbitrarily chosen to be ">," which matches any subject defined by the associated channel. The example described above and shown in FIGS. 18 and 19 is provided for illustrative purposes only, and the marshalling can be used with any other type of subscription. Also, method 350 provides only one example of marshaling subscriptions, and they can be marshaled in any other way. FIG. 17 is a flow chart of an agent method 376 for an incoming message. Method

376 can be implemented, for example, by agent 128 and application 126 in user machine 122. h method 376, agent 128 receives a message from an intelligent router corresponding with a subscription (step 378). Agent 128 determines a channel corresponding with the subscription (step 380), for example by the chaimel ID in the message, and calls an API for the channel (step 382). The API present the data for the subscription in a GUI or other format at the user machine (step 384). The processing of incoming messages can use a process of decoding the data in the reverse of the encoding process described above, and this decoding (reverse encoding) can be performed in a router or in other network entities. Wildcard Processing

FIG. 20 is a flow chart of a wildcard method 410. This method illustrates an example of using a set of routing rules for a filter to convert wildcards in expressions for subscriptions. Method 410 can be implemented, for example, in software modules as represented by agent 128 for execution by processor 134 in user machine 122. Alternatively, wildcards can be processed in the network by processor 93 under software control in intelligent router 92 or in the corresponding functions contained in ASIC 91. Wildcards include open fields or variable length fields, examples of which are provided in Table 21. hi method 410, agent 128 or other entity receives a subscription having a wildcard (step 412). The subject length for subscriptions can be specified by a publisher when publishing content, and the subject can be pre-processed on the publisher machine, for example, to count the fields of the subject and thus obtain a field count (length) for it. Agent 128 counts the number of fields in the filter operand (step 414) and initializes a new rule (filter) of field length = N (step 416). Agent 128 retrieves a sub-field for the subscription (step 418) and determines if the filter operand sub-field O[i] is a wildcard (step 420). If the filter operand sub-field is not a wildcard, agent 128 adds a conjunctive clause to the rale, field [i] = O[i] (step 422). If the filter operand has more sub-fields (step 424), agent 128 returns to step 418 to process additional sub-fields. The parameter "i" represents a field where i is an integer representing the field number in this example.

After processing the sub-fields, agent 128 determines if the last filter operand sub- field is a ">" (step 426) and, if so, it changes the length constraint to field length > N-l (step 428). Wildcard processing can use any type of symbol, and a ">" is only one such example. In this example, a "a.>" can mean a.b, a.c, a.d, etc. and all their sub-subjects at all levels (for example, a.b.x, a.c.x, a.b.x.y, etc.). Other symbols can be used for other implementations of wildcards.

If necessary, agent 128 propagates the transformed rule to intelligent routers or other entities in the network (step 430). Accordingly, the method iterates through the sub- fields in order to process them for conversion of the wildcards to non-wildcard rules, meaning rules that do not contain wildcards. The conversion of wildcards can occur anywhere in the network, for example on the subscriber machine or in an intelligent router. The conversion can thus occur in one entity with the transformed rule propagated to other entities or it can occur dynamically.

Table 23 provides a summary, along with examples, of these exemplary routing rules for processing wildcards. These routing rules can be generated in the intelligent routers, for example, or generated in other network entities and propagated to the intelligent routers, h addition, the routing rules in Table 23 are provided for illustrative purposes only and other routing rules are possible for converting wildcards.

Figure imgf000041_0001

Alert Services

The intelligent content-based routing described above can be used in many implementations, one of which involves a digital video surveillance system (DVSS). For example, users such as law enforcement or security agencies can enter subscriptions to video clips from cameras in particular locations. The cameras can capture digital video clips and transmit those clips via a network, such as the Internet, having content-based routing, which in the network core processes the video clips according to the subscriptions. Therefore, the users receive video clips of interest, and the filtering of them is distributed throughout the network, hi addition to video clips, any other type of content can be distributed to provide for any type of alerts, examples of which include security breaches, fire, and fraud detections.

As another example, particular cameras can include associated motion sensors. Upon detecting motion, the motion sensor triggers the camera to transmit a video clip taken at the same time to the network, which uses content-based routing to route the video clip to subscribers.

Therefore, the content-based routing described above can significantly reduce network burden in processing and routing video clips. For example, a video signal produced by every charge coupled device (CCD) requires writing to four different destinations by a Digital Video Recorder (DVR), local storage managed by DVR, global storage attached to the network, a DVSS system, and an iDSS management server. Considering the network bandwidth necessary to carry such a huge data volume, the total amount of CCDs or DVRs managed by an iDSS may not satisfy a customer's capacity requirements. Hence, the bandwidth necessary limits, for example, using the technology for medium or large customers. FIG. 21 presents an overall architecture view of one surveillance system for which each DVR may manage four or sixteen CCDs.

Architecture overview: FIG. 22 illustrates two enhancements, which are mainly based on the technologies described above, to improve the capacity of the surveillance system shown in FIG. 21. As illustrated in FIG. 22, the first enhancement focuses on how to reduce the DVR backbone traffic, while the second enhancement uses a device, referred to as a z-box, providing content-based routing functions such as those functions described above to increase the data delivery efficiency.

Reducing local traffic on the DVR backbone: Inefficiency in a data distributing scheme can cause serious scalability problems. Namely, as image files generated by the

DVR is delivered to other boxes using TCP-based protocol, the bandwidth consumption increases linearly with the number of devices attached to a local area network (LAN). In one view of an iDSS, the same streaming video data needs to be sent to a networked storage (SAN or NAS), the iDSS monitor, and each DVSS which is remote monitoring software.

One approach to solve this problem is for each DVR to publish only one data stream out on the LAN, and let other network- attached devices receive the same data stream as a result of subscriptions. Therefore, if the output rate of a DVR is 10 megabits/second (Mbps), for example, having 3 subscribing devices on the same network should only require 10 Mbps from the network, rather than 30 Mbps.

To achieve this objective, publish-subscribe, event notification APIs described above can be used on the DVR boxes and on any devices utilizing the DVR data (e.g., the iDSS, global storage). The API can be simple but effective, and it can use an IP multicasting and recovery protocol. The API can also follow the above publish-subscribe model so that other implementations need not change the code but can simply re-link with a full- version of the library providing the APIs. Proxy for DVSS: Each DVSS can make one connection (TCP-based) to the DVR box to receive streaming video data. Scalability presents the same issue as described above.

With reference to FIG. 22, this approach can be described as 2 stages, for example. In a first stage, stage 1, at the LAN side, a proxy server (e.g., z-box 1) can be provided to handle all the DVSS outgoing data (i.e., data going from the DVRs out to the DVSS). This proxy server subscribes to all DVRs data on the LAN and publishes that data on an external network (e.g., the Internet). The DVSSs subscribe to this data. Therefore, the proxy server, z-box 1, provides a subscriber agent (e.g., agent 128) that collects the data from the DVRs and a publisher agent (e.g., agent 36) that publishes this data through a publish-subscribe network, such as the publish-subscribe networks described above.

Even though with stage 1 the traffic can be greatly reduced at the LAN side, the traffic may still jam the outgoing link, especially in certain countries, when a typical asymmetric digital subscriber line (ADSL) has only 64 kilobits/second (kbps) uplink speed. With continued reference to FIG. 22, stage 2 preferably involves leasing, or otherwise obtaining, a connection in the service provider's machine room and locating a second z-box device there, e.g., z-box 2. For example, a z-box device can be put on a Hi- Net backbone. From that device a single connection (tunnel) to the z-box 2 can be set up at the customer premises.

In this case, the z-box 2 at the customer premises serves as a subscriber agent (e.g., agent 128). Z-box 2 may also serve as a routing daemon (e.g., routing daemon 216). As the subscriber agent, the z-box 2 (e.g., in the Hi-Net machine room) preferably subscribes to what the DVRs publish through z-box 1. Between z-box 1 and z-box 2 is a publish- subscribe network as described above. Accordingly, z-box 1 publishes the video from the DVRs and z-box 2 subscribes to video as required by the DVSSs. hi this manner, the data delivery efficiency of the alert services is increased using the event notification system described herein. The z-boxes (e.g., z-box 1 and z-box 2) preferably include modules for publishing and subscribing over this publish-subscribe network, as described above.

Digital Content Delivery

The intelligent content-based routing described above can be used in many implementations, including routing video, music, and software updates via subscriptions. For example, users can subscribe to software updates, such as anti- virus software, and have the updates automatically routed to them. As other examples, users can subscribe to particular video and music content and also have that subscribed content automatically routed to them. The video and music can be received as streaming digital content, for example. In addition, the distributed processing in the network core substantially alleviates processing burden on servers providing the software, video, and music content. Therefore, network bandwidth can effectively be increased using the same network infrastructure to provide the content, among other advantages.

One particular architecture for implementing this routing is shown in FIG. 23. Note that the architecture assumes two levels of cache servers, CI and C2, preferably residing in co-location offices of a network service provider. However, the benefits can also be achieved when only CI cache servers are available. The terms CI and C2 cache servers refer to a server providing distributed network caching as described above (see FIGS. 14-15 and associated description). The architecture can be developed in two phases, for example. The first phase, assuming the C2 cache servers do not exist, is to use a fast file transfer mechanism between the central distributor 450 and the CI cache servers to reduce the server load and the time needed to send large media files. This fast file transfer mechanism is preferably achieved by adding a routing box (470 in FIG. 23) between the central distributor 450 and the CI cache servers. The second phase is to add routing boxes at C2 cache servers, and the above-described subscription mechanism between user (e.g., user machines 460) and C2 cache servers.

Benefits of using routing boxes: Routing boxes 470 preferably include modules for implementing the content-based routing described above (e.g., intelligent router 92 described above). There are two main benefits of using routing boxes 470 implementing the content-based routing described above. A fast routing and file transfer solution using these routing boxes 470 may speed up a file transfer 5 times over a conventional file transfer protocol such as FTP or RCP. Efficient multicast over a wide area network (WAN) can also be achieved. When data is sent from a central location to a group of receivers, this routing solution will speed up the content delivery by exploiting the network multicast topology and constructing multicasting tunnels over WAN to reduce server load and network bandwidth requirement.

Architecture: Media contents are delivered from the central distributor to CI cache servers. CI cache servers store all the content files. Each CI cache server requires, for example, terra bytes of disk space to store all the contents. Users (e.g., using user machines 460 such as subscriber machine 122) request contents from the C2 cache servers, which store only part of the contents. C2 cache servers require, for example, hundreds of giga bytes of disk space. File transfer between users and C2 caches: When a user 460 requests a media file by issuing a subscription, the request is processed by one of the C2 cache servers. If the requested media file is already cached in the C2 server, the file is delivered right away. If not, the subscription is sent to a CI cache server and the requested file is transferred from the CI cache server to the C2 cache server. Pre-caching media data from CI caches to C2 caches: Based on the user subscriptions or the pattern of subscriptions, a media file may be pre-cached from a CI cache server into C2 cache servers. For example, if users 460 who connect to C2 cache servers are mostly interested in pop songs, a CI cache server can push a new pop song to a C2 cache server even before any user 460 on the C2 cache server requests the song. Implementation Phases: The first phase involves, for example, installing the fast file transfer mechanism with content routing between the distributor 450 to all CI cache servers. No C2 cache server is needed. In this case, all users 460 connect to CI caches directly. CI cache servers receive new media files from the distributor 450 regularly. The phase- 1 architecture is shown in FIG. 24.

Note that in FIG. 24 the distributor 450 sends a new media file only once to the routing box 470, powered by the intelligent content-based routing technology described above. Therefore, the load of the distributor 450 is reduced. The routing box 470 sends out the file using the fast file transfer mechanism to each CI cache server. In this case, no additional routing boxes are needed at the receiver 460 end. Alternatively, other types of servers can be used for CI cache servers.

With reference now to FIG. 25, architecture of an embodiment implementing phase 2 is shown. Phase 2 in this example preferably uses a kernel-implemented routing box 470 to route and send data. The kernel layer solution further reduces the overhead in sending files since it needs less buffer copy and less context-switching time. In addition, the phase 2 solution adds C2 cache servers into the architecture, as shown in FIG. 25. Likewise, as shown, routing boxes 470 are preferably added at C2 sites using co-location in a service provider network. This further reduces the bandwidth requirements significantly with potentially hundreds of times of bandwidth reduction.

As shown in FIG. 25, files transferred between CI cache servers and C2 cache servers are transferred via the routing boxes associated with the routing box 470 associated with the CI cache servers and the routing box 470 associated with the C2 cache servers. hi this manner, the fast routing and file transfer solution between the CI and C2 cache servers is achieved using these routing boxes 470.

Quality of Service Management

The intelligent content-based routing described above can be used, for example, to route content with particular delivery guarantees. For example, based on a service level agreement (SLA), an ISP or content provider can reserve bandwidth to guarantee quality of services (QoS). This can be accomplished efficiently by the content-based intelligent routing described above.

Architecture: There are at least two possible configurations for guaranteeing QoS in content delivery. The first one connects a number of links into one or more telephone company (TELCO) networks.The second one uses only one network link to a TELCO network. As an example shown in FIG. 26, there are two layers of routing boxes (R-

Boxes). An R-Box 1 routes packets to an R-box 2 and an R-box 3 based on the content of data packets. The R-Box 2 and R-box 3 route data packets into different network links (e.g., L1-L4), each of the links being connected to a TELCO network. To reserve bandwidth for premium customers, the data packets generated for the highest SLA customers are routed to the link with the highest bandwidth (highest priority) to guarantee a particular QoS for those customers.

As an example shown in FIG. 27, the R-box 1 routes data packets to the R-box 2 and R-box 3. The R-Box 2 and R-Box 3 route data packets further into different communication links, which then all connect to an R-Box 4. The R-Box 4 picks up data packets from the four links based on the QoS level of each link. Then, the R-box 4 sends data packets through a network link (e.g. L5) to an Internet ISP. By implementing various algorithms for picking up data in each link, the system can dynamically allocate bandwidth for each link for an even better QoS management than the multiple-link configuration.

Technologies: The QoS guarantees can leverage the intelligent and distributed content-based routing technology described above. Each packet to be routed is tagged for content-based routing. The solution makes the deployment of QoS for ASP/Content providers economically feasible, among other possible advantages.

Benefits: The solution can be provided to Internet service providers (e.g., IDCs) or content providers (e.g., media on demand (MOD) service providers) to reserve bandwidth for different customers based on their SLAs.

Real-time alerts: Alerts can have different priorities. For example, security and fire alerts can be given the highest priority while news alerts may be given a lower priority. Without a QoS routing, the highest priority alerts may not be able to reach their subscribers in real-time because the network bandwidth of an ASP could be occupied by lower priority alerts and communications. This solution prevents this problem from happening. Also, alerts can be sent to each customers based on their SLAs. Premium customers can pay more and have more bandwidth allocated for them.

Real-Time Data Delivery: For some applications such as voice on demand (VOD),

MOD, or voice over IP (VoIP), the bandwidth availability affects the quality of the applications. This solution can route data packets based on the message types by inspecting the contents of packets, as described above. For applications that are bandwidth sensitive, their data packets can be routed to higher priority links. In addition to the message types, data packets can be routed to various subscribers based on their SLA levels. Packets for higher SLA customers can be routed to the higher priority links using this solution.

Software or anti-virus updates can also take advantage of this solution. For example, anti- virus files may be routed to the highest priority link to ensure a real-time anti- virus update while audio driver files may be routed to a lower priority link.

Content-Based Filtering: Using the co-location service and putting an R-box inside a TELCO network, the system can perform filtering and dynamic caching outside an ISP, as shown in FIG. 28. The R-box inside the TELCO network can be used to filter data based on the content filtering technology described above to reduce the traffic going into the IDC/ISP network. This can be used to block hacker attacks, for example, such as DOS attacks or unauthorized data access. By being able to inspect the content of requests, the R-Box can also be a cache box for static and dynamic web data. The benefits of this solution include, for example, the security, the saving of network bandwidth between a TELCO and an ISP, and the saving of the load of the ISP servers.

Caching with Selective Multicasting

Message persistence is the ability to store messages and retrieve them at a later time. A large number of specific applications, e.g., email, generally require lengthy message persistence for messages flowing through the network, hi ideal conditions, with no failures in the network an always-connected subscriber should not need any persistence beyond that required for these specific applications. However, in reality, messages can get "lost" while traversing through the network due to various reasons - e.g., (1) failures or buffer overflows occurring either inside the network or at the user end or (2) users doing an explicit discomiect from the network and connecting back again after a time period. The persistence model of the event notification system described herein is divided into two levels: short-term persistence and long-term persistence. Short-term persistence is designed for recovering from packet lost due to network congestion or short-term link failure. Long-term persistence is designed for recovering from other failures including, e.g., the loss of user connections or ISP network failure, failure of user machines, longer- term network failure, and/or other failures. Embodiments of these two schemes are described below.

Short-term persistence: Data Retransmission and Flow control In a data network, a cause of data loss can be simply classified as link failure and buffer overflow. To provide reliable channels for the event notification system, these issues need to be addressed. For link failures, it is possible to enforce a forward error correction (FEC) scheme to correct some errors caused by link failures. However, it is still necessary to provide a scheme to recover packets when the error is so serious that no FEC scheme can correct it. As for buffer overflow, it is necessary to prevent the buffer flow from happening. Flow control schemes are typically used in data network to avoid such problems.

In the short-term persistence scheme, Transmission Control Protocol (TCP) tunnels are preferably used to connect event routers (e.g., intelligent routers 12) hop-by-hop.

Reasons for relying on a reliable layer-2 tunnel instead of using a reliable transport protocol (e.g., RMTP) are multi-fold. In a short-term persistence scheme in the event notification system, messages are preferably filtered out by routers if the messages do not satisfy the filter rules. Consequently, a receiving router generally can not detect the loss of packets by using schemes like source sequence number. Likewise, it is also not desirable for all receiving routers to acknowledge on each packet they receive because such this would cause an overload of acknowledgements (i.e., an ACK-explosion). Besides, to avoid the buffer overflow, to the short-term persistence model implements a flow control scheme so that before a router runs out of buffer space, the router can request a neighboring router forwarding messages to it to slow down. These schemes are covered by TCP.

TCP transmission policy: TCP used for the short-term persistence scheme, a transmission window is preferably used locally for the data sender to help keep track of data that has been retransmitted. The purpose of using transmission window is two-fold: first of all, the transmission window ensures that the sender will know explicitly that the data has received by the receiver correctly; secondly, the transmission window allows better usage of the channel capacity. In TCP, each byte sender sent is required to be acknowledged, implicitly or explicitly. The transmission window helps the sender to keep track of data that has been sent and acknowledged. The transmission window also improves the channel utilization as a sender is allowed to send data within the transmission window rather than having to stop and wait for the previous packets to get acknowledged. Once previous data is acknowledged, the window will be automatically advanced. A receiver window is also maintained in TCP. The receiver window is preferably used to indicate the available buffer space at the data receiver end. it's the available buffer space value is sent to the sender so that the sender knows how to avoid overflow the buffer at the receiver side. TCP congestion control: Since TCP is designed as an end-to-end transport protocol, the TCP utilized in the short-term persistence scheme also addresses buffer overflow inside the publish-subscribe network. To address this, TCP used for the short- term persistence model preferably uses a third window: the congestion window. The congestion window is used for the sender to guess the maximum buffer space on the routers along the path, hi short, the congestion window size is reduced if the sender detects a loss in packets, or is increased vice versa.

Long-term Persistence: Caching for Persistent Channels

A channel (e.g., as described above) can either be persistent or real-time. A realtime channel transmits data that is generally only useful in real-time and does not have any application-specific persistence requirements. A persistent channel stores data traversing through network for a persistence time frame T. In other words, persistence for a persistent channel is guaranteed for a time frame T. This persistence of data is achieved through the following, for example: caching data at each edge node for the persistent duration of a channel; retrieving data from the cache transparent to the users under failure conditions; allowing the user to explicitly retrieve data from the cache; making the flow of data through the network persistent by guarding against router failures and setting up reliable tunnels between routers; and, protecting the channel components against failure through replication.

Therefore, as described below, the long-tenn persistence scheme preferably enables a subscriber registered with a persistent channel to retrieve the old data cached in the network for the last "X" timeframe (X < T), when the subscriber crashes and comes back up again within the time frame T for the persistent channel.

In the long-term persistence scheme, subscriber applications (e.g., application 126) preferably can explicitly pull data (e.g., messages) from an associated subscriber agent (e.g., agent 128). As described above, agents can make use of or be implemented with proxies. After the agent, or proxy, has recovered from a network failure, the agent preferably transparently retrieves data from the cache for the duration that it was disconnected from the edge router. Also, a subscriber is preferably allowed to access only data up to last T time frame in the long-term persistence scheme. To this end, time is preferably determined with respect to the edge router to which the agent (or proxy) is connected. Retrieved cached data is preferably delivered out of band and with no real- time guarantees. The embodiment of the long-term persistence scheme is targeted towards an already existing subscriber who crashes and comes back up again or loses connection with an edge router (e.g., edge router 16). A new subscriber may not be able to get cached information.

Definition of Persistence: Timed Persistence (with time frame T) to a subscriber is defined as the ability to retrieve the last time frame T of data from the publish-subscribe network. If the subscriber leaves the network, any data on a persistent channel that is received during the subscriber's absence is held in the network for a time frame T (from the data's receipt). If the subscriber returns within the timeframe T, the subscriber does not lose any data. However, if the subscriber returns between T and 2T timeframe, the subscriber may loose data. If the subscriber returns after the timeframe 2T, the subscriber is preferably not guaranteed access to any previous data.

The above definition requires that the publish-subscribe network tree leafed at the subscriber should be retained for time frame T after the subscriber disappears and then can be pruned, so that new data is received for the time frame T after the subscriber goes away is retained until the time frame T reaches its expiry time.

Architecture: FIG. 29 is a block diagram illustrating certain components of a publish-subscribe network that provide persistence through caching. As shown, the network includes core routing nodes 548 and an edge routing node 545. Each routing node preferably includes an intelligent router 92 (shown with the edge routing node) and a conventional backbone router (not shown), as described above in FIG. 4. Each intelligent router 92 that needs to perform caching for persistent channels preferably has a cache manager 218 co-located with it, as illustrated by FIG. 29. The cache manager 218 is described above with references to FIG. 8. The intelligent router 92 is preferably responsible for short-term persistence for retrieving lost data or recovering from router failures. The cache manager 218 is responsible for caching data to provide long-term persistence for a channel. The cache manager 218 preferably caches this data in the cache 540. The cache 540 preferably includes a memory and a disk (not shown). There are several advantages to having the cache manager 218, as opposed to the intelligent router 92, responsible for caching data for long-term persistence, including: the compute-intensive operation of indexing the cached data can be performed on a separate processor, so the performance of the routing and filtering processor is not affected and disk 170 operations for periodically moving cached data to disk can also be done on another processor thus preventing cycles from being stolen from routing and filtering and sparing the edge router from having to do regular I/O.

Also shown in FIG. 29 is an agent 128, which is preferably resident in subscriber machine 122 (not shown in FIG. 29), as described above in FIG. 5. The agent 128 is responsible for communicating with the cache manager 218 to retrieve data from the cache

540, receiving the retrieved data and for organizing the retrieved data. As noted above, the agent 128 can make use of or be implemented with a proxy.

Under no failure conditions, only edge router nodes 545 need to have a cache manager 218 associated with them. However, although not shown in FIG. 29, since the long-term persistence scheme anticipates failures, each of the first level of core routing nodes 548 upstream from the edge routing node 545 preferably includes a cache manager 218 that stores data. Upstream is the direction moving away from the agent 128 (i.e., away from the subscriber machine 122). The first level of upstream core routing nodes refers to the routing nodes immediately upstream from the edge routing node 545. Although publish-subscribe networks often include a plurality of first level upstream core routing nodes, FIG. 29 only depicts one first level upstream core routing node, core routing node 548. As described above, a cache manager 218 provides for local caching of data at a network node at which it is located. Therefore, the operation of cache managers 218 located at various core routing nodes, including, e.g., core routing node 548, provides for distributed caching of data throughout the network core. This distributed caching provides a backup for the caching at edge routing node 545.

FIG. 30 is a diagram illustrating backup caching in an upstream router (e.g., core routing node 548). hi the long-term persistence scheme, each cache is preferably backed up by the next upstream router's cache. An upstream cache stores all incoming data and acts as a backup for all next level downstream edge router caches. The data in upstream caches is preferably stored using the same mechanism as the edge router cache. With reference now to FIG. 31, the architecture for caching for persistent channels preferably provides functionality spanning across four different modules: the cache manager 218 - preferably a server process responsible for storing data going through the intelligent router 92; router cache API 552 - preferably a library responsible for all control plane accesses to the cache manager 218 from the intelligent router 92, e.g., creating and destroying the cache; agent (or proxy) cache API 554 - preferably a library responsible for all control plane accesses to the cache manager 218 from the agent 128 (or agent 128 proxy), e.g., retrieving data; and, the agent 128 (or proxy) - preferably responsible for collecting retrieved data from the cache 546 and organizing the data. FIG. 31 illustrates the interaction of these four modules. Both the agent 128 and the intelligent router 92 preferably access the cache through the cache API libraries 552 and 554. The cache API libraries 552 and 554 provide API for initializing into the cache 546, creating and destroying caches for subject, retrieving cache addresses and, most importantly, retrieving the data from the cache 546. The routing daemon 216 preferably sends data to the cache manager 218 through the data path without going through the cache API 552. The cache APIs 552 and 554 preferably use the control path for all control messages including data retrieval.

Cache Manager - Cache Management: With reference now to FIG. 32, when the cache manager 218 encounters a new channel, the cache manager 218 preferably invokes an information server (e.g., servers 152, 154 and/or 156 described above) to get the channel manager 150 for the channel. Once the cache manager 218 has the chaimel manager's 150 address, the cache manager 218 preferably retrieves the channel properties from the chaimel manager 150. The channel properties preferably include, for example: channel subject tree and attributes, persistent properties of the channel, persistent time frame (T) for the channel, granularity of caching. Before the cache manager 218 can start caching the data flowing through a channel for a given subject, that subject's cache needs to be created in the cache manager 218. The cache manager 218 expects a create cache message and in response to the message creates the subject cache. This subject cache can then be destroyed, suspended or resumed on request. FIG. 32 illustrates cache creation on subscription.

Cache Manager - Cache Data Input: The cache manager 218 preferably has access to the data coming into the intelligent router 92 in a number of ways, for example: an IP like solution in which case all the data on the intelligent router's 92 incoming link is also forwarded to the cache manager 218; using a sniffing mechanism (in which the cache manager 218 listens to all packets traveling on the network of the intelligent router 92); after filtering, the intelligent router 92 forwards each message, that needs to be propagated on one or more links, to the cache 546; and, the cache manager 218 acts as a subscriber for all data coming into the intelligent router 92.

Cache Manager - Cache Data Storage: With reference now to FIG. 33, the cache manager 218 preferably indexes the data in the cache 546 in a number of ways, e.g., channel id, subjects, publisher id, timestamp, time grains (G), primary caching attribute, link (in the special case when caching is done for failures) or other ways. The data may be indexed and stored in a hierarchical directory structure in the file system or in memory. The data preferably is cached in memory and periodically moved to disk. The caching in memory is only for the duration of the "G" time grains. After the time G is expired all the data related to a particular branch in the tree is preferably moved to the file under that branch overwriting the earliest file for that branch. (Note that the G preferably is not implemented as a sliding window, but as an absolute window, because it is expensive to write each message to disk individually, and more efficient to write all of the G interval to the disk in one operation). FIG. 33 is a diagram of an exemplary indexing tree. When caching data for persistence the first indexing tree in FIG. 33 is preferably used. With continued reference to FIG. 33, the subjects preferably are stored in a hierarchy, where "a" is the parent of subjects like "a.b", "a.c" "a.d", etc. The cache manager 218 preferably keeps a hash table for the cache 546 mapping all subjects to their corresponding file locations, hi some cases, the cache 546 may need to store data under failure conditions when an upstream router (e.g., core routing node 548) detects the failure of a downstream router (e.g., edge routing node 545) on one of its links. The first approach for recovery is to restart the downstream router (which could take minutes). While the downstream router is being restarted, the upstream router will need to cache the data that is being forwarded down that link. This cache (e.g., called the FM Cache in FIG. 33) is preferably indexed on outgoing links. Cache Manager - Garbage Collection: If a channel is not persistent, the cache 546 does not store the data, but drops it immediately. If the channel is persistent, the cache 546 stores the data. A persistent time frame "T" for a particular channel is divided into N time grains each of size G. The caching in memory is only for the duration of G. After the cache manager determines that time interval G has passed, the data is moved to the disk. The cache manager 218 stores the data on the disk for the duration of persistent time frame interval T. The data corresponding to a time interval G is deleted from the disk once the time becomes greater than the Persistent timeout (T) for the channel + the upper limit of the interval. To better understand this, suppose a channel has a T of 2 hours. As an example, the cache manager 218 uses a time granularity G of 15 minutes. For deleting the data from the disk, the policy preferably used is that when the last data cached during a time interval G (15 minutes) has been stored for T (2 hours), the entire data cached during that 15-minute interval will be discarded. Therefore, the data cached in the beginning of that 15-minute interval will have been stored for longer than 2 hours before it is deleted. In this example, the data cached during each 15-minute interval is a block of data. If the persistent time frame T is divided into N intervals, any point in time there will be N+l blocks of data (N on disk and 1 in memory) in the cache 546 for each subject.

Cache Manager - Cache Data Retrieval: With reference now to FIG. 34, the agent 128 (or proxy) preferably invokes a GetCache operation to get the data going back time "T" from the current time. The cache manager 218 to which the agent 128 connects to invoke the GetCache operation is labeled the Portal Cache in FIG. 34. Due to failure/disconnects of routers or the agent 128, the portal cache may not have all the data requested by the agent 128. In this case, it is the job of the portal cache to retrieve data from all the other caches (e.g., upstream caches), collate the data and return it to the agent 128. FIG. 34 illustrates retrieval from multiple caches (A, B and C) for different time stamps (TS1, TS2 and TS3). The cache manager 218 preferably can only retrieve data in blocks of time grain G.

So the agent 128 may get more data than it expects or requests. In addition, during retrieval from multiple caches, there maybe some overlapping intervals between the caches, so the agent 128 will also see duplicates of data and the agent 128 should do duplicate suppression on the data stream provided by the cache. Interaction of Cache Manager with other modules: The cache manager 218 preferably interacts with several modules in the event notification system infrastructure, as shown in FIG. 35. When the cache manager 218 encounters a new channel (at create cache time), it preferably invokes the Information Server 550 to get the channel manager 150 for the channel. Once the cache manager 218 has the channel manager's 150 address, it preferably gets the channel properties from the channel manager 150. An administrator module 552 is preferably allowed to set/modify some properties, like the granularity of caching. The administrator module 552 is preferably also allowed to manually create or delete channel cache.

Agent Cache API - Application - Agent Interaction: The application (e.g., application 126) preferably invokes the agent cache API 554 to get the cache 546 with a given subject and filter. Preferably, an application can only retrieve data from the cache 546 if it has already subscribed to that data. The agent cache API 554 preferably actually provides two APIs.

The first API allows an un-subscribed application to subscribe and retrieve a cache 546 at the same time. If a "fifo" flag is set, the subscription is created and sent to the edge router node 545. However, the subscription preferably is immediately put in a "pause" mode. After the agent 128 has received all cached data, the agent 128 first delivers all the cached data, keeps track of the last sequence not seen for all publishers in the data and then delivers the paused data from the last sequence not seen for each publishers.

For the second API, it is assumed that the application has already subscribed to some data and is asking for cached data, hi this case, the application has already been delivered some data which cannot be sequenced with respect to the cache data. Hence the

"fifo" flag in this case just indicates that the data retrieved from the cache 546 should be sequenced within itself, but need not be sequenced across the regular data stream.

The agent 128 preferably retrieves all the events in one big block of data. After retrieving the data from the Cache API 554, the agent 128 preferably needs to do the following operations on the data before invoking a callback operation (see above): construct notifications from the list of notifications; keep track of the last sequence number for each publisher; and, filtering. When the agent 128 is done pushing all the events to the callback, it preferably sends a DoneCache event to the callback, to indicate that all cached data has been delivered. At this point, if the subscription is FIFO and the regular data is paused, the agent 128 preferably forwards all the paused notifications. The agent 128 delivers only those notifications whose sequence numbers are greater than the last sequence number in the cached data. Agent Cache API to Cache Interaction: When the subscriber asks for the cached data, the cache API at the agent 128 end 554 preferably first looks up the history of edge routers that the agent 128 was connected to and filters the list using the time interval provided in the GetCache request. The API 554 then sends a GetCache(channel, subject, filters, localjpubs, time period, fifo, array of routers) message to the last edge cache it was connected to. The cache manager 218 preferably pulls out the data based on the channel id, subject and timestamp and pushes out the data back to the agent 128. When the cache manager 218 is done pushing out the data it sends a DoneCache event to the Cache- API to indicate that the data transfer has completed. If the cache manager 218 does not find the data locally, it uses the "list of routers" provided by the agent 128 to locate the data needed. Once the cache manager 218 has collected all the necessary data, the cache manager 218 collates the necessary data and does duplicate suppression on it before forwarding it to the agent 128.

Cache Connection History: In order to be able to retrieve data from the caches 546, the cache connection history, for both edge as well as upstream caches, is preferably maintained at the agent 128. Since this information is needed across agent 128 shutdowns and crashes, the information should be maintained persistently in a file. Cache connection history on the disk is preferably stored in the following files and format:

Edge cache locations: The location of the edge cache (e.g., the cache 546 at the edge routing node 546) is preferably obtained from the channel manager/channel library. This occurs at boot-up time and any subsequent time that the edge cache changes, e.g., lost/regained connection, moved connection. The dispatcher notifies the agent 128 of any changes in the edge cache connection and these changes are then communicated to the agent 128 cache library. Each time a change occurs, it is made persistent. Persistent Storage: CACHE_ROOT/channel_id/Channel - an exemplary path for the cached data.

The data is preferably stored in the following format:

Number of Edge Caches;

Edge Cachel: Number of time intervals, StartTimel:EndTimel, StartTime2:EndTime2, ...; and Edge Cache2: Number of time intervals, StartTimel:EndTimel, StartTime2:EndTime2,...

...with the latest timestamp being the first in the list. Note that the two different edge caches will never have an overlapping interval (because the agent 128 is connected to only one edge cache at a time). Each time a new entry is added, the old entries are checked to see if they are still valid; if they are invalid, the entry is thrown out. A time interval becomes invalid if

Interval EndTime + channel's persistent timeout < current time.

An edge cache entry becomes invalid if all the intervals in the entry are invalid. Note that an "EndTime" of 0 means that the interval is currently active.

Upstream Cache locations: The location of the upstream caches (e.g., the cache 546 at the core routing node 548) is dependent on the subject. Each subject has its own multicast tree and hence the set of first level upstream caches is a function of the subject. Any time that the user subscribes to a subject, the intelligent router 92 preferably returns the list of upstream caches associated with the subject. Similarly, any changes in the upstream cache locations due to failures or reorganizations in the multicast tree are preferably also communicated to the agent 128 through the control channel. These changes are documented locally in a persistent store (file).

Persistent Storage: CACHE_ROOT/channel_identifier/subject (not in a hierarchy, but a full subject). - an exemplary path for the cached data.

The data is preferably stored in the following format:

Number of Upstream Caches;

Upstream Cachel: Number of time intervals, StartTimel:EndTimel, StartTime2 :EndTime2, ... ; Upstream Cache2: Number of time intervals, StartTimel:EndTimel,

StartTime2:EndTime2,...

...again, with the latest timestamp being the first in the list. Unlike the edge cache intervals, two upstream caches can have overlapping intervals, because an agent 128 can have several upstream caches for a given subject. The contents of the upstream cache files are also garbage collected using the same algorithm as the edge caches. Cache validity during data retrieval: During the lifetime of the agent 128, it goes through connections to different edge routers and the upstream routers. The agent cache API 554 preferably stores this connection history in the local store. When the agent 128 needs to retrieve last T intervals of data from the cache 546, the agent cache API 554 preferably looks through the connection history to determine the caches to access the data from. The algorithm preferably used for this is as follows: 1) the cache library explores all the edge cache intervals and checks for intervals that fall within the T timeframe. If an interval falls within that time frame, it is added to the list Le of valid edge caches; 2) the list Le is sorted using the interval start times; 3) for each interval that is not covered by the edge caches in Le, explore the upstream caches to get all upstream cache intervals that can cover this interval and add valid intervals to List Lu.; append Lu to Le and sort Le using interval start times, to create L.

This algorithm gives the list of caches L and for each cache the time interval for which to retrieve the data. This list of caches L is then 4) marshaled into a get cache message and sent to the cache manager 218. At the cache manager 218 end, the cache manager 218 preferably 5) un-marshals the cache intervals from the get cache message and recreates the list L sorted in the increasing order of start times. For each interval in the list L: the cache manager 218 preferably 6) checks to see if there is a gap between the previous interval and the current intervals and if there is a gap, asks the local cache for the data. If there is no gap, the cache manager 218 preferably 7) talks to the relevant cache to get the data. The cache manager 218 preferably 8) collates data from all the caches and sends it to the agent 128.

Router Cache API: The router cache API 552 at the intelligent router 92 is responsible for invoking the cache manager 218 to create, destroy, suspend and resume caching for a particular subject. The router cache API 552 also deals with initial configuration - uploading the cache address from the intelligent router 92 to the channel manager 150, so that the agent 128 side (the agent cache API 554) can obtain this information when needed - and retrieving the location of caches 546 for other routers (this is used when the intelligent router 92 wants to notify the agent 128 of the upstream caches for a given subject, e.g., in subscription reply and after subject tree changes).

Use of Cache for Pull: The discussion above focuses on the use of cache for implementing persistent channels and allowing returning subscribers to pull data from the network. An alternative embodiment allows any subscriber (new or returning) to pull any kind of data from the caches 546 (e.g., including data that the subscriber may not have already subscribed to, but is in the caches 546 because of someone else's subscription). The difference between this embodiment and the preceding embodiment is that for a returning subscriber the data is guaranteed to the present and the location of the data is well known, while for a new subscriber the location of the stored data is not known. A simple way of implementing this alternative embodiment is to publish a "FindCache" request on the channel. A "FindCache" request contains a channel id, a subject, filters, time interval, and the location of the agent 128 looking for the cache 546 with the requested cached data. All caches 546 listen for the "FindCache" Request. When each cache 546 receives the request, the cache 546 looks to see if the corresponding data is in its datastore and if so, sends back its own location in a unicast message. The agent 128 chooses one of the caches 546 and invokes a GetCache operation on it to get the data.

Last Data Pull: Other embodiments include a feature, the last data pull, that allows a subscriber application (e.g., application 126) to get last message for a given subject. This is useful for data such as stock quote alerts, for example, where the user just wants to know the last stock price and not the history.

Implementation of the Cache Manager: There are preferably three types of threads, for example, in the cache manager 218 implementation: a Data Caching thread — the data caching thread preferably picks up data from the connection to the intelligent router 92 and indexes and stores the data in memory; a Data Storage thread - once the end of a time interval is reached, the data storage thread preferably moves the data stored in memory to disk and in the process also performs garbage collection on expired data; and, a Data Retrieval thread - the data retrieval thread preferably is responsible for picking up requests for cached data and retrieving data from the cache 546. These three types of threads may be implemented as a single thread or a pool of threads. Preferably, the Data Caching thread and the Data storage thread are synchronized during the time that data is being moved to disk. This synchronization between the data storage thread and the data retrieval thread prevents data from being removed while the data is being retrieved. Data Structures: Examples of data structures for caching are provided above in

Table 19 and the accompanying description. Data Storage: FIG. 36 is a diagram illustrating a preferred directory structure used for storing data files in a cache 546 named "Aquila Cache." Note that each subject level directory preferably has a set of child subject directories as well as a data directory that stores data published on that subject. For example, data published on Fox.Movies on the Entertainment channel will go into a file in the directory AquilaCache/Entertainment/Fox/ Movies/Data and data published on subject Fox will go into a file in the directory AquilaCache/Entertainment/Fox/Data. ha order to speed up data storage, the directory hierarchy for a particular subject is preferably created at the time when the intelligent router 92 asks the cache 546 to start caching for a given channel and subject. Data Retrieval: Data retrieval from the cache 546 should be efficient, so as not to block data storage and hold up the cache 546. The data retrieval retrieves data from both the disk and memory. The steps taken for data retrieval preferably are as follows: 1) locate the data node; 2) lock the data node; 3) locate the time stamps of the data that needs to be retrieved; 3) retrieve and store the data into memory; 4) unlock the data node; 5) filter and sequence the retrieved data stored in memory before pushing it out to the agent 128 client.

While the present invention has been described in connection with an exemplary embodiment, it will be understood that many modifications will be readily apparent to those skilled in the art, and this application is intended to cover any adaptations or variations thereof. For example, various types of publisher machines, user or subscriber machines, channels and configurations of them, and hardware and software implementations of the content-based routing and other functions may be used without departing from the scope of the invention. This invention should be limited only by the claims and equivalents thereof.

Claims

1. A method for routing packets in a network for use in providing alert services, comprising: receiving a packet having a header section and a payload section, the payload section including information relating to a video clip from a particular camera; inspecting the payload section of the packet in a network core for use in determining how to route the packet to subscribers to information from the particular camera; and selectively routing the packet based upon the inspecting.
2. The method of claim 1 wherein the inspecting step includes determining whether information in the payload section matches content predicate information in a structure associating the content predicate information with corresponding network destinations.
3. The method of claim 1, further including performing the inspecting step at a router in the network core.
4. The method of claim 1 wherein the inspecting step includes applying a filter to information in the payload section.
5. The method of claim 4, further including propagating the filter to a router in the network for use in performing the inspecting.
6. The method of claim 1, further including programming a router in the network for performing the receiving, inspecting, and routing steps.
7. The method of claim 1 wherein the inspecting step includes inspecting attributes for use in determining how to route the packet.
8. The method of claim 1 wherein the selectively routing step comprises selectively routing the packet to a digital video surveillance system.
9. The method of claim 1, further including performing the inspecting step in a local- area network.
10. The method of claim 1, further including performing the inspecting step at an internet service provider location.
11. The method of claim 1 wherein the particular camera comprises a digital video recorder and a charge coupled device.
12. The method of claim 11 further comprising the digital video recorder generating the packet having the header section and the payload section, the payload section including infoπnation relating to the video clip from the particular camera.
13. A method for routing messages in a network providing alert services, comprising: receiving a message having a header section, at least one subject, and at least one attribute, the attribute relating to a video clip from a particular camera; retrieving the subject and the attribute from the message; retrieving a subscription based upon the subject; and applying the attribute to the subscription in a network core in order to determine how to route the message to a subscriber to information from the particular camera.
14. The method of claim 13 wherein the retrieving the subscription step includes retrieving a filter corresponding with the subscription.
15. The method of claim 13, further including routing the message if the attribute satisfies the subscription.
16. The method of claim 13, further including discarding the message if the attribute does not satisfy the subscription.
17. The method of claim 13, further including: retrieving a plurality of filters corresponding with a plurality of subscriptions; retrieving a plurality of attributes from the message; applying each of the attributes to each of the filters to determine if any of the corresponding subscriptions are satisfied; and selectively routing the message based upon whether any of the subscriptions are satisfied.
18. The method of claim 13, further including performing the applying step at a router in the network core.
19. The method of claim 13 wherein the particular camera comprises a digital video recorder and a charge coupled device.
20. The method of claim 19 further comprising the digital video recorder generating the message having the header section, the at least one subject, and the at least one attribute, the attribute relating to a video clip from the particular camera.
21. A method for routing packets in a network for use in providing alert services, comprising: receiving a packet having a header section and a payload section, the payload section including information relating to an event for a particular alert service; inspecting the payload section of the packet in a network core for use in determining how to route the packet to subscribers to information for the alert service; and selectively routing the packet based upon the inspecting.
22. An apparatus for routing packets in a network for use in providing alert services, comprising: a receive module for receiving a packet having a header section and a payload section, the payload section including information relating to a video clip from a particular camera; an inspect module for inspecting the payload section of the packet in a network core for use in determining how to route the packet to subscribers to information from the particular camera; and a rout module for selectively routing the packet based upon the inspecting.
23. The apparatus of claim 22 wherein the inspect module includes a module for determining whether information in the payload section matches content predicate information in a structure associating the content predicate information with corresponding network destinations or corresponding rales governing in-router processing.
24. The apparatus of claim 22, further including a module for performing the inspecting step at a router in the network core.
25. The apparatus of claim 22 wherein the inspect module includes a module for applying a filter to information in the payload section.
26. The apparatus of claim 25, further including a module for propagating the filter to a router in the network for use in performing the inspecting.
27. The apparatus of claim 22, further including a module for programming a router in the network for performing the receiving, inspecting, and processing.
28. The apparatus of claim 22 wherein the inspect module includes a module for inspecting attributes for use in determining how to route the packet.
29. The apparatus of claim 22, wherein the apparatus is located in a network comprising digital video recorders.
30. The apparatus of claim 22, wherein the particular camera comprises a digital video recorder and a charge coupled device.
31. An apparatus for routing messages in a network providing alert services, comprising: a receive module for receiving a message having a header section, at least one subject, and at least one attribute, the attribute relating to a video clip from a particular camera; a module for retrieving the subject and the attribute from the message; a module for retrieving a subscription based upon the subject; an apply module for applying the attribute to the subscription in a network core in order to determine how to route the message to a subscriber to information from the particular camera.
32. The apparatus of claim 31 wherein the module for retrieving the subscription includes a module for retrieving a filter corresponding with the subscription.
33. The apparatus of claim 31, further including a module for selective routing the message if the attribute satisfies the subscription and based on the quality of service guarantee.
34. The apparatus of claim 31, further including a module for discarding the message if the attribute does not satisfy all subscriptions.
35. The apparatus of claim 31 , further including: a module for retrieving a plurality of filters corresponding with a plurality of subscriptions; a module for retrieving a plurality of attributes from the message; a module for applying each of the attributes to each of the filters to determine if any of the corresponding subscriptions are satisfied; and a module for selectively routing the message based upon whether any of the subscriptions are satisfied.
36. The apparatus of claim 31, further including one or more modules for performing the applying at a router in the network core.
37. The apparatus of claim 31, wherein the apparatus is located in a network comprising digital video recorders.
38. The apparatus of claim 31, wherein the particular camera comprises a digital video recorder and a charge coupled device.
39. A system for routing packets in a network for use in providing alert services, comprising: a plurality of digital video cameras, wherein the digital video cameras produce a digital video output; a local area network (LAN) connecting the digital video cameras; a publisher agent, connected to the LAN, that publishes the digital video output; a publish-subscribe network, connected to the publisher agent; and, a digital video surveillance system (DVSS) that receive the published digital video output via the publish-subscribe network.
40. The system of claim 39, further comprising a subscriber agent, connected to the publish-subscribe network, that subscribes to the digital video output and pushes the subscribed digital video output to the DVSS.
41. The system of claim 39, wherein the publish-subscribe network comprises a plurality of intelligent routers.
42. The system of claim 41 , wherein the intelligent router includes: a receive module for receiving a packet having a header section and a payload section, the payload section including information relating to digital video content from one of the plurality of digital video cameras; an inspect module for inspecting the payload section of the packet in a network core for use in determining how to route the packet to subscribers to information from the digital video camera; and a rout module for selectively routing the packet based upon the inspecting.
43. A network for distributing digital content to subscribers, comprising: a plurality of user machines; a central distributor that regularly distributes digital content; a plurality of cache servers that receive and cache the distributed digital content, wherein the cache servers periodically receive user requests from user machines for certain of the cached digital content and forward the requested digital content to the user machines; and, a routing box that receives the distributed digital content as files from the central distributor and transfers the digital content files to the plurality of cache servers using a publish-subscribe content-based routing, wherein the digital content files are publications and the user requests are subscriptions.
44. The network of claim 43, wherein the routing box is a first routing box, the network further comprising a second routing box co-located with the plurality of cache servers, wherein the first routing box routs the digital content files to the second routing box co-located with at least one of the plurality of cache servers.
45. The network of claim 43, wherein the plurality of cache servers are located at a network service provider.
46. The network of claim 43, wherein the plurality of cache servers are a first level of cache servers that store all the digital content distributed by the central distributor.
47. The network of claim 46, further comprising a second level of cache servers that store a portion of the digital content distributed by the central distributor.
48. The network of claim 47, wherein the routing box is a first routing box, the network further comprising a second routing box co-located with the second level of cache servers, wherein the first routing box and the second routing box transfer digital content files from the first level of cache servers to the second level of cache servers using a publish-subscribe content-based routing.
49. The network of claim 48, wherein each of the routing boxes include: a receive module for receiving a packet having a header section and a payload section, the payload section including infoπnation relating to a digital content file; an inspect module for inspecting the payload section of the packet for use in determining how to route the packet; and a rout module for selectively routing the packet from the first level of cache servers to the second level of cache servers based upon the inspecting.
50. The network of claim 47, wherein the portion of the digital content stored by the second level of cache servers is determined based on a history of received user requests.
51. The network of claim 47, wherein the second level of cache servers directly receive the user requests and forward user requests to the first level of cache servers for digital content not stored by the second level of cache servers.
52. The network of claim 43, wherein the routing box includes: a receive module for receiving a packet having a header section and a payload section, the payload section including information relating to a digital content file; an inspect module for inspecting the payload section of the packet for use in determining how to route the packet; and a rout module for selectively routing the packet from the central distributor to the plurality of cache servers based upon the inspecting.
53. The network of claim 43, wherein the central distributor comprises one or more servers.
54. The network of claim 43, wherein the digital content includes video, music and software.
55. A method for distributing digital content to subscribers in a network, comprising: distributing digital content from a central distributor; content-based routing the distributed digital content to a plurality of cache servers; caching the content-based routed digital content at the plurality of cache servers; receiving user subscriptions for requested cached digital content; and, transferring requested digital content from the plurality of cache servers to users based on the received user subscription.
56. The method of claim 55, the content-based routing step including: receiving a packet having a header section and a payload section, the payload section including information relating to a digital content file; inspecting the payload section of the packet for use in determining how to route the packet; and selectively routing the packet to the plurality of cache servers based upon the inspecting.
57. The method of claim 56 wherein the inspecting step includes detennining whether information in the payload section matches content predicate information in a stracture associating the content predicate information with corresponding destinations.
58. The method of claim 56 wherein the inspecting step includes applying a filter to information in the payload section.
59. The method of claim 58, further including propagating the filter to a routing box in the network for use in performing the inspecting.
60. The method of claim 56, further including programming a routing box in the network for performing the receiving, inspecting, and routing steps.
61. The method of claim 56 wherein the inspecting step includes inspecting attributes for use in determining how to route the packet.
62. The method of claim 56, further including performing the inspecting step a routing box.
63. The method of claim 55, wherein the plurality of cache servers is a first level of cache servers, the method further including transferring cached digital content to a second level of cache servers using content-based routing.
64. The method of claim 63, further comprising determining whether the requested digital content is at the second level of cache servers.
65. The method of claim 64, further comprising transferring received user subscriptions to the first level of cache servers based on the determination.
66. The method of claim 63, wherein the transferring step transfers cached digital content to the second level of cache servers using content-based routing based on a history of received user subscriptions.
67. A method for routing packets in a network in conjunction with a quality of service guarantee, comprising: receiving a packet having a header section and a payload section; inspecting the payload section of the packet in a network core for use in determining how to route the packet; determining a quality of service guarantee for the packet; and selectively routing the packet based upon the inspecting and the quality of service guarantee.
68. The method of claim 67 wherein the inspecting step includes determining whether information in the payload section matches content predicate information in a stracture associating the content predicate information with corresponding network destinations.
69. The method of claim 67, further including performing the inspecting step at a router in the network core.
70. The method of claim 67 wherein the inspecting step includes matching a filter to information in the payload section.
71. The method of claim 70, further including propagating the filter to a router in the network for use in performing the inspecting.
72. The method of claim 67, further including programming a router in the network for performing the receiving, inspecting, and routing steps.
73. The method of claim 67 wherein the inspecting step includes inspecting attributes for use in determining how to route the packet or whether to drop the packet altogether.
74. A method for routing messages in a network, comprising: receiving a message having a header section, at least one subject, and at least one attribute; retrieving the subject and the attribute from the message; retrieving a subscription based upon the subject; determining a quality of service guarantee for the message; applying the attribute to the subscription in a network core in order to determine how to route the message; and selectively routing the message based upon the applying and the quality of service guarantee.
75. The method of claim 74 wherein the retrieving the subscription step includes retrieving a filter corresponding with the subscription.
76. The method of claim 74, further including routing the message if the attribute satisfies the subscription.
77. The method of claim 74, further including discarding the message if the attribute does not satisfy the subscription.
78. The method of claim 74, further including: retrieving a plurality of filters corresponding with a plurality of subscriptions; retrieving a plurality of attributes from the message; matching each of the attributes to each of the filters to determine if any of the corresponding subscriptions are satisfied; and selectively routing the message based upon whether any of the subscriptions are satisfied.
79. The method of claim 74, further including performing the inspecting step at a router in the network core.
80. An apparatus for routing packets in a network in conjunction with a quality of service guarantee, comprising: a module for receiving a packet having a header section and a payload section; at least one module for inspecting the payload section of the packet in a network core for use in determining how to route the packet; a module for determining a quality of service guarantee for the packet; and a module for selectively routing the packet based upon the inspection results obtained from and the quality-of-service guarantees determined by the steps above.
81. The apparatus of claim 80 wherein the inspecting module includes a module for determining whether information in the payload section matches content predicate infoπnation in a structure associating the content predicate information with corresponding network destinations or corresponding rules governing in-router processing.
82. The apparatus of claim 80, further including a module for performing the inspecting step at a router in the network core.
83. The apparatus of claim 80 wherein the inspecting module includes a module for matching a filter to information in the payload section.
84. The apparatus of claim 83, further including a module for propagating the filter to a router in the network for use in perfonning the inspecting.
85. The apparatus of claim 80, further including a module for programming a router in the network for performing the receiving, inspecting, and processing.
86. The apparatus of claim 80, wherein the apparatus is a router.
87. An apparatus for routing messages in a network, comprising: a module for receiving a message having a header section, at least one subject, and at least one attribute; a module for retrieving the subject and the attribute from the message; a module for retrieving a subscription based upon the subject; a module for matching the attribute to the subscription in a network core in order to determine how to route the message; and a module for detennining a quality of service guarantee for the packet.
88. The apparatus of claim 87 wherein the module for retrieving the subscription includes a module for retrieving a filter corresponding with the subscription.
89. The apparatus of claim 87, further including a module for selective routing the message if the attribute satisfies the subscription and based on the quality of service guarantee.
90. The apparatus of claim 87, further including a module for discarding the message if the attribute does not satisfy any of the subscriptions stored at the router.
91. The apparatus of claim 87, further including: a module for retrieving a plurality of filters corresponding with a plurality of subscriptions; a module for retrieving a plurality of attributes from the message; a filtering module for matching each of the attributes to each of the filters to determine if any of the corresponding subscriptions are satisfied; and a module for selectively routing the message based upon whether any of the subscriptions are satisfied.
92. The apparatus of claim 87, further including one or more modules for performing the filtering step at a router in the network core.
93. The apparatus of claim 87, wherein the apparatus is a router.
94. A method for routing and caching packets of data in a multicast network, comprising: receiving a packet having a header section and a payload section; inspecting the payload section of the packet in a network core for use in determining how to route the packet to subscribers; selectively routing the packet based upon the inspecting; and locally caching data from the packet in the network core.
95. The method of claim 94, further including performing the inspecting step at a router.
96. The method of claim 94 wherein the inspecting step includes applying a filter to information in the payload section.
97. The method of claim 96, further including propagating the filter to a router in the network for use in performing the inspecting.
98. The method of claim 94, further including programming a router in the network for performing the receiving, inspecting, and routing steps.
99. The method of claim 94 wherein the inspecting step includes inspecting attributes for use in determining how to route the packet.
100. The method of claim 94, further including time marking the cached data.
101. The method of claim 94, further including indexing the cached data.
102. The method of claim 94, further including: receiving a request for data; and determining whether the cached data satisfies the request.
103. The method of claim 94, further including: locally caching data from the packet at an edge routing node. 104. The method of claim 94, further including: removing the cached data after the expiration of a time frame T.
104. A network for routing and caching packets of data, comprising: an edge routing node that receives and routs packets having a header section and a payload section, the edge routing node including: an intelligent router that routs the received packets, the intelligent router including instractions for: inspecting the payload section of the packets in a network core for use in determining how to route the packets to subscribers; and selectively routing the packets based upon the inspecting; and a cache manager, operatively connected to the intelligent router, the cache manager including instructions for: locally caching data from the packets in a local cache; and one or more core routing nodes that receive and rout the packets.
105. The network of claim 104, further comprising: an agent, operatively connected to the edge routing node, that includes instractions for: determining location of cached data; retrieving cached data from the local cache; and processing retrieved cache data.
106. The network of claim 104, wherein one of the one or more core routing nodes is directly upstream from the edge routing node, the directly upstream core routing node including: an intelligent router that routs the received packets, the intelligent router including instractions for: inspecting the payload section of the packets in a network core for use in determining how to route the packets to subscribers; and selectively routing the packets based upon the inspecting; and a cache manager, operatively connected to the intelligent router, the cache manager including instructions for: locally caching data from the packets in a local cache.
107. The network of claim 104, further comprising: a plurality of channel manager that provide properties for a plurality of channels.
108. The network of claim 104, wherein the cache manager further includes instructions for: time marking the cached data.
109. The network of claim 104, wherein the cache manager further includes instractions for: indexing the cached data.
110. The network of claim 104, wherein the cache manager further includes instructions for: receiving a request for data; and determining whether the cached data satisfies the request.
111. An apparatus for routing and caching packets of data in a multicast network, the apparatus including a plurality of processors and instractions for: receiving a packet having a header section and a payload section; inspecting the payload section of the packet in a network core for use in determining how to route the packet to subscribers; selectively routing the packet based upon the inspecting; and locally caching data from the packet in the network core.
112. The apparatus of claim 111, wherein the plurality of processors include a first processor and a second processor, wherein the first processor executes the inspecting and selectively routing instractions and the second processor executes the locally caching instruction.
PCT/US2003/021338 2002-07-08 2003-07-08 Packet routing via payload inspection for alert services, for digital content delivery and for quality of service management and caching with selective multicasting in a publish-subscribe network WO2004006486A3 (en)

Priority Applications (8)

Application Number Priority Date Filing Date Title
US39471402 true 2002-07-08 2002-07-08
US39463102 true 2002-07-08 2002-07-08
US39464102 true 2002-07-08 2002-07-08
US39456102 true 2002-07-08 2002-07-08
US60/394,714 2002-07-08
US60/394,641 2002-07-08
US60/394,631 2002-07-08
US60/394,561 2002-07-08

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
JP2004520021A JP2005532748A (en) 2002-07-08 2003-07-08 Payload Inspection, alert services, digital content distribution, and packet routing for the service quality control, as well as issue - caching containing selective multicasting in subscription network
CN 03821206 CN1701304B (en) 2002-07-08 2003-07-08 System, method and apparatus for inspecting packet routing via payload in a publish-subscribe network
KR20057000385A KR100985237B1 (en) 2002-07-08 2003-07-08 Packet routing via payload inspection for alert services, for digital content delivery and for quality of service management and caching with selective multicasting in a publish-subscribe network
EP20030763348 EP1535157A4 (en) 2002-07-08 2003-07-08 Packet routing via payload inspection for alert services, for digital content delivery and for quality of service management and caching with selective multicasting in a publish-subscribe network

Publications (2)

Publication Number Publication Date
WO2004006486A2 true true WO2004006486A2 (en) 2004-01-15
WO2004006486A3 true WO2004006486A3 (en) 2004-05-27

Family

ID=30119330

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2003/021338 WO2004006486A3 (en) 2002-07-08 2003-07-08 Packet routing via payload inspection for alert services, for digital content delivery and for quality of service management and caching with selective multicasting in a publish-subscribe network

Country Status (5)

Country Link
EP (1) EP1535157A4 (en)
JP (2) JP2005532748A (en)
KR (1) KR100985237B1 (en)
CN (1) CN1701304B (en)
WO (1) WO2004006486A3 (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1677482A1 (en) 2004-12-10 2006-07-05 NEC Corporation Packet distribution system, PAN registration device, PAN control device, packet transfer device, and packet distribution method
JP2008546107A (en) * 2005-06-30 2008-12-18 スウィフト クリーク システムズ リミテッド ライアビリティ カンパニーSwift Creek Systems,Llc Method and apparatus for browsing network resources using an asynchronous communication protocol
JP4787267B2 (en) * 2004-12-23 2011-10-05 テレフオンアクチーボラゲット エル エム エリクソン(パブル) A method of notifying the emergency situation to a plurality of mobile terminals
CN1925482B (en) 2005-09-01 2013-03-27 中兴通讯股份有限公司 Transforming method and device for human-machine order format
WO2013081511A1 (en) * 2011-11-29 2013-06-06 Telefonaktiebolaget L M Ericsson (Publ) Flow based packet manipulation congestion control
EP2620872A1 (en) * 2010-10-25 2013-07-31 Huawei Technologies Co., Ltd. Method and device for callback processing in telecommunication capacity opening
US9686183B2 (en) 2005-12-06 2017-06-20 Zarbaña Digital Fund Llc Digital object routing based on a service request
US9842481B1 (en) 2016-06-09 2017-12-12 Fujitsu Limited Apparatus and method to collect device information published in past times via a network of gateways

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0629764A (en) * 1991-07-16 1994-02-04 Nec Ic Microcomput Syst Ltd Wind noise reduction microphone amplifier
US8055897B2 (en) 2005-12-06 2011-11-08 Lippershy Celestial Llc Digital object title and transmission information
US7894447B2 (en) * 2005-12-06 2011-02-22 Lippershy Celestial Llc Digital object routing
US8014389B2 (en) 2005-12-06 2011-09-06 Lippershy Celestial Llc Bidding network
US8194701B2 (en) 2005-12-06 2012-06-05 Lippershy Celestial Llc System and/or method for downstream bidding
JP4680068B2 (en) * 2006-01-05 2011-05-11 富士通株式会社 Communication control method, the network and network equipment
US9330190B2 (en) 2006-12-11 2016-05-03 Swift Creek Systems, Llc Method and system for providing data handling information for use by a publish/subscribe client
KR20120002424A (en) 2010-06-30 2012-01-05 한국전자통신연구원 Communication node and communication method
WO2012002726A3 (en) * 2010-06-30 2012-04-12 한국전자통신연구원 Communication node and communication method
CN103166851B (en) * 2011-12-16 2016-06-15 中国电信股份有限公司 Internet information transfer processing method and system
US9026410B2 (en) * 2012-03-16 2015-05-05 The Boeing Company System and method for rapid management of logic formulas
KR101487859B1 (en) 2014-01-15 2015-02-02 주식회사 이디엄 Method for Collecting UDP Packet When Java Program Is Being Executed
CN106455140A (en) * 2014-01-24 2017-02-22 北京奇虎科技有限公司 Attribute information display system and router
CN104811740A (en) * 2015-04-29 2015-07-29 北京奇艺世纪科技有限公司 Video file distribution method, system and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020087881A1 (en) * 2000-12-29 2002-07-04 Shlomi Harif System, method and program for identifying and binding a process in a heterogeneous network
US20020162025A1 (en) * 2001-04-30 2002-10-31 Sutton Lorin R. Identifying unwanted electronic messages
US6523068B1 (en) * 1999-08-27 2003-02-18 3Com Corporation Method for encapsulating and transmitting a message includes private and forwarding network addresses with payload to an end of a tunneling association

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0867088A4 (en) * 1995-12-15 2000-04-05 Telcordia Tech Inc Systems and methods employing video combining for intelligent transportation applications
US5873084A (en) * 1996-01-18 1999-02-16 Sun Microsystems, Inc. Database network connectivity product
GB9912901D0 (en) * 1999-06-04 1999-08-04 Ibm Message broker providing a publish/subscribe service and method of processing messages in a publish/subscribe environment
JP3685651B2 (en) * 1999-06-04 2005-08-24 沖電気工業株式会社 Interconnecting devices and active QoS mapping method
GB9921776D0 (en) * 1999-09-16 1999-11-17 Ibm Event notification data processing with command and command notification combined into a single event
US7283502B1 (en) * 2000-09-21 2007-10-16 Lucent Technologies Inc. Enhancement of framing protocol frame format to support quality of service
US7046680B1 (en) * 2000-11-28 2006-05-16 Mci, Inc. Network access system including a programmable access device having distributed service control

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6523068B1 (en) * 1999-08-27 2003-02-18 3Com Corporation Method for encapsulating and transmitting a message includes private and forwarding network addresses with payload to an end of a tunneling association
US20020087881A1 (en) * 2000-12-29 2002-07-04 Shlomi Harif System, method and program for identifying and binding a process in a heterogeneous network
US20020162025A1 (en) * 2001-04-30 2002-10-31 Sutton Lorin R. Identifying unwanted electronic messages

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP1535157A2 *

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1677482B1 (en) * 2004-12-10 2008-10-22 NEC Corporation Packet distribution system, PAN registration device, PAN control device, packet transfer device, and packet distribution method
US7760693B2 (en) 2004-12-10 2010-07-20 Nec Corporation Packet distribution system, PAN registration device, PAN control device, packet transfer device, and packet distribution method
EP1677482A1 (en) 2004-12-10 2006-07-05 NEC Corporation Packet distribution system, PAN registration device, PAN control device, packet transfer device, and packet distribution method
US8792852B2 (en) 2004-12-23 2014-07-29 Telefonaktiebolaget Lm Ericsson (Publ) Method for informing multiple mobile terminals of an emergency event
JP4787267B2 (en) * 2004-12-23 2011-10-05 テレフオンアクチーボラゲット エル エム エリクソン(パブル) A method of notifying the emergency situation to a plurality of mobile terminals
US9788184B2 (en) 2004-12-23 2017-10-10 Telefonaktiebolaget Lm Ericsson (Publ) Method for informing multiple mobile terminals of an emergency event
JP2008546107A (en) * 2005-06-30 2008-12-18 スウィフト クリーク システムズ リミテッド ライアビリティ カンパニーSwift Creek Systems,Llc Method and apparatus for browsing network resources using an asynchronous communication protocol
CN1925482B (en) 2005-09-01 2013-03-27 中兴通讯股份有限公司 Transforming method and device for human-machine order format
US9686183B2 (en) 2005-12-06 2017-06-20 Zarbaña Digital Fund Llc Digital object routing based on a service request
EP2620872A1 (en) * 2010-10-25 2013-07-31 Huawei Technologies Co., Ltd. Method and device for callback processing in telecommunication capacity opening
US8848893B2 (en) 2010-10-25 2014-09-30 Huawei Technologies Co, Ltd. Method and apparatus for callback processing in telecommunication capability opening
EP2620872A4 (en) * 2010-10-25 2013-11-27 Huawei Tech Co Ltd Method and device for callback processing in telecommunication capacity opening
US9402200B2 (en) 2011-11-29 2016-07-26 Telefonaktiebolaget L M Ericsson (Publ) Flow based packet manipulation congestion control
WO2013081511A1 (en) * 2011-11-29 2013-06-06 Telefonaktiebolaget L M Ericsson (Publ) Flow based packet manipulation congestion control
US9842481B1 (en) 2016-06-09 2017-12-12 Fujitsu Limited Apparatus and method to collect device information published in past times via a network of gateways

Also Published As

Publication number Publication date Type
KR20050017108A (en) 2005-02-21 application
CN1701304B (en) 2010-05-05 grant
KR100985237B1 (en) 2010-10-04 grant
CN1701304A (en) 2005-11-23 application
JP2010148118A (en) 2010-07-01 application
EP1535157A2 (en) 2005-06-01 application
EP1535157A4 (en) 2010-09-08 application
WO2004006486A3 (en) 2004-05-27 application
JP2005532748A (en) 2005-10-27 application

Similar Documents

Publication Publication Date Title
Quinn et al. IP multicast applications: Challenges and solutions
Calvert et al. Directions in active networks
US7827256B2 (en) Applying quality of service to application messages in network elements
US7310684B2 (en) Message processing in a service oriented architecture
US6496477B1 (en) Processes, articles, and packets for network path diversity in media over packet applications
US6930983B2 (en) Integrated circuits, systems, apparatus, packets and processes utilizing path diversity for media over packet applications
US7260651B2 (en) System and method for increasing the effective bandwidth of a communications network
US7733868B2 (en) Layered multicast and fair bandwidth allocation and packet prioritization
US7349980B1 (en) Network publish/subscribe system incorporating Web services network routing architecture
Czajkowski et al. Grid information services for distributed resource sharing
US7013322B2 (en) System and method for rewriting a media resource request and/or response between origin server and client
Jacobson et al. Networking named content
US20020059451A1 (en) System and method for highly scalable high-speed content-based filtering and load balancing in interconnected fabrics
US20080199155A1 (en) System and Method for Video Recording, Management and Access
US7127518B2 (en) System and method for implementing application functionality within a network infrastructure
US20030208621A1 (en) Path optimizer for peer to peer networks
US20060031930A1 (en) Dynamically configurable service oriented architecture
Bartolini et al. A walk through content delivery networks
Hefeeda et al. A hybrid architecture for cost-effective on-demand media streaming
US7978631B1 (en) Method and apparatus for encoding and mapping of virtual addresses for clusters
US20140173018A1 (en) Content Based Traffic Engineering in Software Defined Information Centric Networks
US6625650B2 (en) System for multi-layer broadband provisioning in computer networks
US20050267947A1 (en) Service oriented architecture with message processing pipelines
US20060129650A1 (en) Guaranteed delivery of application layer messages by a network element
US20140195641A1 (en) Contextualized Information Bus

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SC SD SE SG SK SL TJ TM TN TR TT TZ UA UG UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 1020057000385

Country of ref document: KR

WWE Wipo information: entry into national phase

Ref document number: 2003763348

Country of ref document: EP

Ref document number: 2004520021

Country of ref document: JP

WWP Wipo information: published in national office

Ref document number: 1020057000385

Country of ref document: KR

WWE Wipo information: entry into national phase

Ref document number: 20038212064

Country of ref document: CN

WWP Wipo information: published in national office

Ref document number: 2003763348

Country of ref document: EP