WO2008005078A1 - Inter-proximity communication within a rendezvous federation - Google Patents

Inter-proximity communication within a rendezvous federation Download PDF

Info

Publication number
WO2008005078A1
WO2008005078A1 PCT/US2007/007238 US2007007238W WO2008005078A1 WO 2008005078 A1 WO2008005078 A1 WO 2008005078A1 US 2007007238 W US2007007238 W US 2007007238W WO 2008005078 A1 WO2008005078 A1 WO 2008005078A1
Authority
WO
WIPO (PCT)
Prior art keywords
node
nodes
ring
collateral
ring set
Prior art date
Application number
PCT/US2007/007238
Other languages
French (fr)
Inventor
Richard L. Hasha
Lu Xun
Gopala Krishna R. Kakivaya
Original Assignee
Microsoft Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Corporation filed Critical Microsoft Corporation
Priority to EP07753834A priority Critical patent/EP2036255A4/en
Priority to JP2009518098A priority patent/JP2009543447A/en
Priority to CA002652917A priority patent/CA2652917A1/en
Priority to MX2008015966A priority patent/MX2008015966A/en
Priority to BRPI0713790-7A priority patent/BRPI0713790A2/en
Priority to AU2007270060A priority patent/AU2007270060B2/en
Publication of WO2008005078A1 publication Critical patent/WO2008005078A1/en
Priority to IL195188A priority patent/IL195188A0/en
Priority to NO20085027A priority patent/NO20085027L/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/42Loop networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/51Discovery or management thereof, e.g. service location protocol [SLP] or web services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • G06F15/16Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/02Topology update or discovery
    • H04L45/04Interdomain routing, e.g. hierarchical routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/12Shortest path evaluation
    • H04L45/122Shortest path evaluation by minimising distances, e.g. by selecting a route with minimum of number of hops
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/48Routing tree calculation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/54Organization of routing tables
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
    • H04L67/63Routing a service request depending on the request content or context

Definitions

  • Computer systems and related technology affect many aspects of society. Indeed, the computer system's ability to process information has transformed the way we live and work. Computer systems now commonly perform a host of tasks (e.g., word processing, scheduling, and database management) that prior to the advent of the computer system were performed manually. More recently, computer systems have been coupled to one another and to other electronic devices to form both wired and wireless computer networks over which the computer systems and other electronic devices can transfer electronic data. As a result, many tasks performed at a computer system (e.g., voice communication, accessing electronic mail, controlling home electronics, Web browsing, and printing documents) include the exchange of electronic messages between a number of computer systems and and/or other electronic devices via wired and/or wireless computer networks.
  • tasks performed at a computer system e.g., voice communication, accessing electronic mail, controlling home electronics, Web browsing, and printing documents
  • resources are typically assigned unique identifiers, for example, network addresses, that uniquely identify resources and can be used to distinguish one resource from other resources.
  • a computer system that desires to utilize a resource can connect to the resource using the network address that corresponds to the resource.
  • accessing a network resource can be difficult if a computer system has no prior knowledge of a network address for a network resource. For example, a computer system can not print a document at a network printer unless the computer system (or another networked computer system) knows the network address of the network printer.
  • DNS Domain Name System
  • AD Active Directory
  • DFS Distributed File Systems
  • DNS has a distributed administration architecture (i.e., centralized management is not required)
  • DNS is not sufficiently dynamic, not self- organizing, supports a weak data and query model, and has a fixed set of roots.
  • AD is sufficiently dynamic but requires centralized administration.
  • aspects of different mechanisms may not be compatible with one another.
  • a resource identified using DNS may not be compatible with DFS routing protocols.
  • a developer may be forced to choose the most suitable mechanism and forgo the advantages of other mechanisms.
  • Mechanisms for identifying resources can be particularly problematic in peer- to-peer networks.
  • DNS provides a lookup service, with host names as keys and IP addresses as values, that relies on a set of special root servers to implement lookup requests.
  • DNS requires management of information (NS records) for allowing clients to navigate the name server hierarchy.
  • a resource must be entered into DNS before the resource can be identified on a network.
  • DNS is specialized to the task of find hosts or services and is not generally applicable to other types of resources.
  • a number of mechanisms include distributed lookup protocols that are more scalable than DNS. These mechanisms use various node arrangements and routing algorithms to route requests to corresponding resources and to store information for lookup.
  • the routing efficiency of these types of mechanisms is O(log N) routing hops and require nodes to maintain a routing table of O(log N) size.
  • At least one other of these mechanisms assigns nodes a unique ED that is taken from a linear ring of numbers.
  • Nodes maintain routing tables that contain pointers to their immediate successor node (according to ID value) and to those nodes whose ID values are the closest successor of the value ID + 2 L .
  • the routing efficiency of these types of mechanisms is also O(log N) routing hops and require nodes to maintain a routing table of O(log N) size.
  • At least one further mechanisms requires O(log N 1 d ) routing hops and requires nodes to maintain a routing table of O(D) size.
  • the routing efficiency of all of these mechanisms depends, at least in part, on the number of nodes in the system.
  • EDs for at least some of the mechanisms
  • routing hops can cross vast geographic distances, cross more expensive links, or pass through insecure domains, etc.
  • message routing involves multiple hops, there is some chance that such events will occur multiple times.
  • these mechanisms do not take into account the proximity of nodes (physical or otherwise) with respect one another. For example, depending on node distribution on a ring, routing a message from New York to Boston could involve routing the message from New York, to London, to Atlanta, to Tokyo, and then to Boston.
  • At least one other more recent mechanism takes proximity into account by defining proximity as a single scalar proximity metric (e.g., IP routing hops or geographic distance).
  • proximity e.g., IP routing hops or geographic distance.
  • These mechanisms use the notion of proximity-based choice of routing table entries. Since there are many "correct" node candidates for each routing table entry, these mechanisms attempt to select a proximally close node from among the candidate nodes. For these mechanisms can provide a function that allows each node to determine the "distance" of a node with a given IP address to itself. Messages are routed between nodes in closer proximity to make progress towards a destination before routing to a node that is further away. Thus, some resources can be conserved and routing is more efficient.
  • a collateral ring set entry table for a node is maintained.
  • a node accesses a collateral ring set entry table configured to store collateral ring set entries for the node.
  • Each collateral ring set entry is configured to indicate a collateral ring of the node and at least one corresponding entry node into the collateral ring of the node.
  • Collateral ring set entry table information from available resources that maintain information related to the configuration of the tree of rings is discovered.
  • the collateral ring set entry table is updated with appropriate collateral ring set entry state based on the discovered collateral ring set entry table information.
  • inter-proximity communication is sent in a tree of rings.
  • the node accesses a collateral ring set entry table configured to store collateral ring set entries for the node.
  • Each collateral ring set entry is configured to indicate a collateral ring of the node and a corresponding at least one entry node into the collateral ring of the node.
  • At least one collateral ring set entry for the specified collateral ring is identified from the node's collateral ring set entry table.
  • Each of the at least one collateral ring set entries indicates at least one an entry node of the specified collateral ring.
  • the message is sent to at least one indicated entry node.
  • an originating node intends to route a message to a destination node that is closest to a given node ID in a target proximity ring within the tree of rings.
  • One or more entry nodes known to be member nodes of at least one of the target proximity ring and an ancestor ring of the target proximity ring are identified.
  • the message is sent to an identified entry node.
  • the message indicates that the identified entry node is to resolve the message to the node which has a node ID closest to an indicated destination node in the target proximity ring.
  • Figure 1 illustrates an example of a federation infrastructure.
  • Figure 2 illustrates an example of a computer architecture that facilitates routing request indirectly to partners.
  • Figure 3 illustrates an example binary relationship between nodes in a federation infrastructure in the form of a sorted list and corresponding ring.
  • Figure 4 illustrates an example ring of rings that facilitates proximal routing.
  • Figure 5 illustrates an example proximity induced partition tree of rings that facilitates proximal routing.
  • Figure 5 A illustrates the example proximity induced partition tree of rings of
  • Figure 6 illustrates a suitable operating environment for the principles of the present invention.
  • Figure 7 illustrates an example flow chart of a method for populating a node routing table that takes proximity criteria into account
  • Figure 8 illustrates an example flow chart of a method for partitioning the nodes of a federation infrastructure.
  • Figure 9 illustrates an example flow chart of a method for populating a node routing table.
  • Figure 10 illustrates an example flow chart of a method for numerically routing a message towards a destination node.
  • Figure 11 illustrates an example flow chart of a method for proximally routing a message towards a destination node.
  • Figure 12A illustrates an example of a node establishing membership within an existing federation.
  • Figure 12B illustrates an example of nodes in a federation infrastructure exchanging messages.
  • Figure 13 illustrates an example flow chart of a method for establishing membership within a federation infrastructure.
  • Figure 14 illustrates an example flow chart of a method for maintaining membership within a federation infrastructure.
  • Figure 15 illustrates an example flow chart of a method for discovering liveness information for another node.
  • Figure 16 illustrates an example of a message model and related processing model.
  • Figure 17 illustrates an example of a number of liveness interactions that can occur between a function layer and an application layer.
  • Figure 18 illustrates an example of messages forming part of a request- response message exchange pattern are routed across nodes on a ring.
  • Figure 19A illustrates an example proximity induced partition tree of rings that facilitates inter-proximity communication.
  • Figure 19B illustrates another view of the example proximity induced partition tree of rings from Figure 19 A.
  • Figure 19C illustrates a partitioned view of a portion of the example proximity induced partition tree of rings from Figure 19A.
  • Figure 19D illustrates an expanded view of an intermediate ring from the example proximity induced partition tree of rings from Figure 19 A.
  • Figure 19E illustrates yet another view of the example proximity induced partition tree of rings from Figure 19A.
  • Figure 19F illustrates a further view of the example proximity induced partition tree of rings from Figure 19A.
  • Figure 19G illustrates an expanded view of a portion of Figure 19F.
  • Figure 20 illustrates an example flow chart of a method for maintaining a collateral ring set for a node in tree of rings.
  • Figure 21 illustrates an example flow chart for a method for sending inter- proximity communication in a tree of rings.
  • Figure 22 illustrates an example flow chart for another method for sending inter-proximity communication in a tree of rings.
  • a collateral ring set entry table for a node is maintained.
  • a node accesses a collateral ring set entry table configured to store collateral ring set entries for the node.
  • Each collateral ring set entry is configured to indicate a collateral ring of the node and at least one corresponding entry node into the collateral ring of the node.
  • Collateral ring set entry table information from available resources that maintain information related to the configuration of the tree of rings is discovered.
  • the collateral ring set entry table is updated with appropriate collateral ring set entry state based on the discovered collateral ring set entry table information.
  • inter-proximity communication is sent in a tree of rings.
  • the node accesses a collateral ring set entry table configured to store collateral ring set entries for the node.
  • Each collateral ring set entry is configured to indicate a collateral ring of the node and a corresponding at least one entry node into the collateral ring of the node.
  • At least one collateral ring set entry for the specified collateral ring is identified from the node's collateral ring set entry table.
  • Each of the at least one collateral ring set entries indicates at least one an entry node of the specified collateral ring.
  • the message is sent to at least one indicated entry node.
  • an originating node intends to route a message to a destination node that is closest to a given node ID in a target proximity ring within the tree of rings.
  • One or more entry nodes known to be member nodes of at least one of the target proximity ring and an ancestor ring of the target proximity ring are identified.
  • the message is sent to an identified entry node.
  • the message indicates that the identified entry node is to resolve the message to the node which has a node ID closest to an indicated destination node in the target proximity ring.
  • Embodiments of the present invention may comprise a special purpose or general-purpose computer including computer hardware, as discussed in greater detail below.
  • Embodiments within the scope of the present invention also include computer- readable media for carrying or having computer-executable instructions or data structures stored thereon.
  • Such computer-readable media can be any available media that can be accessed by a general purpose or special purpose computer.
  • computer-readable media can comprise computer-readable storage media, such as, RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store desired program code means in the form of computer-executable instructions or data structures and which can be accessed by a general purpose or special purpose computer.
  • a "network” is defined as one or more data links that enable the transport of electronic data between computer systems and/or modules.
  • a network or another communications connection either hardwired, wireless, or a combination of hardwired or wireless
  • computer-readable media can comprise a network or data links which can be used to carry or store desired program code means in the form of computer-executable instructions or data structures and which can be accessed by a general purpose or special purpose computer.
  • Computer-executable instructions comprise, for example, instructions and data which cause a general purpose computer, special purpose computer, or special purpose processing device to perform a certain function or group of functions.
  • the computer executable instructions may be, for example, binaries, intermediate format instructions such as assembly language, or even source code.
  • a "node” is defined as one or more software modules, one or more hardware modules, or combinations thereof, that work together to perform operations on electronic data.
  • the definition of a node includes the hardware components of a personal computer, as well as software modules, such as the operating system of the personal computer. The physical layout of the modules is not important.
  • a node can include one or more computers coupled via a network.
  • a node can include a single physical device (such as a mobile phone or Personal Digital Assistant "PDA") where internal modules (such as a memory and processor) work together to perform operations on electronic data.
  • PDA Personal Digital Assistant
  • a node can include special purpose hardware, such as, for example, a router that includes special purpose integrated circuits.
  • the invention may be practiced in network computing environments with many types of node configurations, including, personal computers, laptop computers, hand-held devices, multi-processor systems, microprocessor-based or programmable consumer electronics, network PCs, minicomputers, mainframe computers, mobile telephones, PDAs, pagers, routers, gateways, brokers, proxies, firewalls, redirectors, network address translators, and the like.
  • the invention may also be practiced in distributed system environments where local and remote nodes, which are linked (either by hardwired data links, wireless data links, or by a combination of hardwired and wireless data links) through a network, both perform tasks.
  • FIG. 1 illustrates an example of a federation infrastructure 100.
  • the federation infrastructure 100 includes nodes 101, 102, 103, that can form different types of federating partnerships.
  • nodes 101, 102, 103 can be federated among one another as peers without a root node.
  • Each of nodes 101, 102, and 103 has a corresponding ID 171, 182, and 193 respectively.
  • the nodes 101, 102, 103 can utilize federation protocols to form partnerships and exchange information (e.g., state information related to interactions with other nodes).
  • intermediary nodes can exist between nodes 101, 102, and 103 (e.g., nodes having IDs between 171 and 193).
  • a message routed, for example, between node 101 and node 103 can be pass through one or more of the other intermediary nodes.
  • Nodes in federation infrastructure 100 can include corresponding rendezvous protocol stacks.
  • nodes 101, 102, and 103 include corresponding rendezvous protocol stacks 141, 142, and 143 respectively.
  • Each of the protocols stacks 141, 142, and 143 includes an application layer (e.g., application layers 121, 122, and 123) and other lower layers (e.g., corresponding other lower layers 131, 132, and 133).
  • Each layer in a rendezvous protocol stack is responsible for different functionality related to rendezvousing a resource request with a corresponding resource.
  • other lower layers can include a channel layer, a routing layer, and a function layer.
  • a channel layer is responsible for reliably transporting a message (e.g., using WS-ReliableMessaging and Simple Object Access Protocol ("SOAP")) from one endpoint to another (e.g., from node 101 to node 103).
  • SOAP Simple Object Access Protocol
  • the channel layer is also responsible for processing incoming and outgoing reliable messaging headers and maintaining state related to reliable messaging sessions.
  • a routing layer is responsible for computing the next hop towards a destination.
  • the routing layer is also responsible for processing incoming and outgoing addressing and routing message headers and maintaining routing state.
  • a function layer is responsible for issuing and processing rendezvous protocol messages such as join and depart requests, pings, updates, and other messages, as well as generation of responses to these messages.
  • the function layer processes request messages from the routing layer and sends back corresponding response messages, if any, to the originating node using the routing layer.
  • the function layer also initiates request messages and utilizes the routing layer to have the requests messages delivered.
  • an application layer processes non-rendezvous protocol specific data delivered from the function layer (i.e., application messages).
  • the function layer can access application data from the application layer and get and put application data in rendezvous protocol messages (e.g., pings and updates). That is, the function layer can cause application data to be piggybacked on rendezvous protocol messages and can cause the application data to be passed back to the application layer in receiving rendezvous protocol nodes.
  • application data is used to identify resources and resource interests.
  • an application layer can include application specific logic and state that processes data received from and sent to the other lower layers for purposes of identifying resources and resource interests.
  • Nodes can federate using a variety of different mechanisms.
  • a first federating mechanism includes peer nodes forwarding information to all other peer nodes.
  • the node utilizes a broadcast/multicast discovery protocol, such as, for example, WS-Discovery to announce its presence and issues a broadcast/multicast find to detect other nodes.
  • the node then establishes a simple forwarding partnership with other nodes already present on the network and accepts new partnerships with newly joining nodes. Thereafter, the node simply forwards all application specific messages to all of its partner nodes.
  • a second federating mechanism includes peer nodes that most efficiently transmit application specific messages to their destination(s).
  • the new node utilizes a broadcast/multicast discovery protocol, such as, for example, WS-Discovery to announce its presence and issues a broadcast/multicast find to detect other nodes that are part of the federation infrastructure.
  • a broadcast/multicast discovery protocol such as, for example, WS-Discovery to announce its presence and issues a broadcast/multicast find to detect other nodes that are part of the federation infrastructure.
  • the new node Upon detecting another node, the new node establishes a partnership with the other node. From the established partnership, the new node learns about the presence of other nodes already participating in federation infrastructure. It then establishes partnerships with these newly-learned nodes and accepts any new incoming partnership requests.
  • a third federating mechanism includes peer nodes indirectly forwarding all application specific messages to their destination/s.
  • nodes are assigned identifiers (ID's), such as, for example, a 128-bit or 160-bit ID.
  • the node responsible for a maintaining registration of interest in a given application specific message can be determined to be the one whose ID is closest to the one obtained by mapping (e.g., hashing) the destination identity (e.g. URI) of the application specific message to this 128-bit or 160-bit ID-space.
  • mapping e.g., hashing
  • URI destination identity
  • node arrivals and departures are flooded over the entire fabric.
  • registrations of interest in certain application specific messages are forwarded to the nodes determined to be responsible for maintaining such registration information.
  • the node receiving registration of interest in certain application specific messages can reliably flood that registration information within its neighborhood set.
  • the neighborhood set for a specified node can be determined to be the set of nodes having IDs within a predefined range on either side of the ED of specified node.
  • a newly-joining node utilizes a broadcast/multicast discovery protocol, such as, for example, WS-Discovery to announce its presence and issues a local broadcast/multi-cast find to detect a node that is already part of the federation infrastructure.
  • the new node establishes a partnership with the discovered node and uses that partnership to learn about the presence of other new nodes participating in the federation infrastructure.
  • the new node then establishes further partnerships with the newly discovered nodes and accepts any new incoming partnership requests.
  • the new node accepts incoming registrations of interest in certain application layer specific resources from its partners for which it is responsible and may flood them over its neighborhood set.
  • messages can generally be forwarded to their final destination via intermediary routing nodes (e.g., that a newly joining node has partnered with or that a partner node is aware of).
  • the new node In response to receiving an incoming application specific message, the new node forwards the message to the partner node that may be responsible for maintaining the registration information for the destination specified in the message.
  • the partner node that may be responsible for maintaining the registration information for the destination specified in the message.
  • every node in the federation infrastructure has global knowledge of all other nodes but the registration information is efficiently partitioned among the nodes.
  • Application specific messages are transmitted to their final destination via only the partner's nodes that may have the responsibility for maintaining registration information of interest in those application specific messages.
  • indirection is accomplished by forwarding only to the partner node that has global knowledge of the registration information of interest for the message being processed. This is in contrast to the first mechanism where the indirection is accomplished by forwarding to all the partner nodes.
  • a fourth federating mechanism includes peer nodes that route messages to other peer nodes. This fourth mechanism differs from the third mechanism at least in that both node arrivals/departures and registrations of interest in certain application specific messages are all routed instead being flooded. Routing protocols are designed to guarantee rendezvous between application specific messages and the registration messages that express interest in those application specific messages.
  • Figure 2 illustrates an example of a computer architecture 200 that facilitates routing requests indirectly to partners. Computer architecture 200 depicts different types of computer systems and devices potentially spread across multiple local discovery scopes participating in a federation infrastructure.
  • Workstation 233 can include a registered PnP provider instance.
  • workstation 233 routes registration request 201 over the federation infrastructure.
  • Registration request 201 is initially forwarded to laptop 231, which in turn forwards registration request 201 to message broker 237, which in turn forwards registration request 201 to message gateway 241.
  • Message gateway 241 saves the registration information registration request 201 in its database and returns success message 204 to workstation 233.
  • another registered provider instance this time that of running services, comes alive within the workstation 233. This time the node is aware that message gateway 241 is responsible for registrations and forwards registration request 205 to message gateway 241 directly.
  • Message gateway 241 saves the registration information registration request 205 in its database and returns success message 206 to workstation 233.
  • the printer 236 (e.g., a UPnP printer) is powered on and sends announcement 207.
  • Server 234 detects announcement 207 and routes registration request 208 to message broker 237.
  • Message broker 237 forwards registration request 208 to message gateway 241.
  • message gateway 241 saves the registration information registration request 208 in its database and returns success message 210 to server 234.
  • personal computer 242 issues lookup request 211 to discover all devices. Since personal computer 242 doesn't know where to forward lookup request 211, it routes lookup request 211 through workstation 243. As registration and lookup requests are routed to the same destination, the routing protocol essentially guarantees rendezvous between the two requests resulting in workstation 243 forwards find request 211 to message gateway 241. Message gateway 241 looks up the registration information maintained by it and forwards find request 211 to both the workstation 233 and server 234. Workstation 233 and server 234 send response messages 214 and 216 respectively to personal computer 242.
  • This fourth mechanism works by routing (instead of flooding) a request to the node (message gateway 241) that has global knowledge of the registrations specified in a request.
  • This fourth mechanism essentially guarantees that routing can be accomplished in O(log N) hops, where N is the number of nodes participating in the federation infrastructure. Since this fourth mechanism efficiently partitions both node partnership and registration information, it scales to very large networks, even the Internet.
  • a federation consists of a set of nodes that cooperate among themselves to form a dynamic and scalable network in which information can be systematically and efficiently disseminated and located. Nodes are organized to participate in a federation as a sorted list using a binary relation that is reflexive, anti-symmetric, transitive, total, and defined over the domain of node identities. Both ends of the sorted list are joined, thereby forming a ring.
  • each node in the list can view itself as being at the middle of the sorted list (as a result of using modulo arithmetic). Further, the list is doubly linked so that any node can traverse the list in either direction.
  • Each fe ' derating node can be assigned an ID (e.g., by a random number generator with duplicate detection) from a fixed set of IDs between 0 and some fixed upper bound. Thus, adding 1 to an ID of the fixed upper bound results in an ID of zero (i.e., moving from the end of the linked list back to the beginning of the linked listed .
  • a 1:1 mapping function from the value domain of the node identities to the nodes themselves is defined.
  • Figure 3 depicts an example linked list 304 and corresponding ring 306. Given such a ring, the following functions can be defined: RouteNumerically(V, Msg): Given a value V from the value domain of node identities and a message "Msg,” deliver the message to node X whose identity can be mapped to V using the mapping function. Neighborhood(X, S): Neighborhood is the set of nodes on the either side of node X with cardinality equal to S.
  • RouteNumerically(V, Msg) is implemented by directly sending Msg to the node X, whose identity is obtained by applying the mapping function to V.
  • RouteNumerically(V, Msg) is implemented by forwarding the message to consecutive nodes along the ring until it reaches the destination node X.
  • nodes can store enough knowledge about the ring to perform a distributed binary search (without having to have global knowledge or implement routing between immediately adjacent nodes).
  • IDs can be assigned using the " ⁇ " (less than) relation defined over a sufficiently large, bounded set of natural numbers, meaning its range is over a finite set of numbers between 0 and some fixed value, inclusive.
  • every node participating in the federation is assigned a natural number that lies between 0 and some appropriately-chosen upper bound, inclusive.
  • the range does not have to be tight and there can be gaps between numbers assigned to nodes.
  • the number assigned to a node serves as its identity in the ring.
  • mapping function accounts for gaps in the number space by mapping a number falling in between two node identities to the node whose identity is numerically closest to the number.
  • This approach has a number of advantages. By assigning each node a uniformly-distributed number, there is an increased likelihood that all segments of the ring are uniformly populated. Further, successor, predecessor, and neighborhood computations can be done efficiently using modulo arithmetic. [0090] In some embodiments, federating nodes are assigned an ID from within an ID space so large that the chances of two nodes being assigned the same DD are highly unlikely (e.g., when random number generation is used).
  • a node can be assigned an ID in the range of 0 to b n - 1, where b equals, for example, 8 or 16 and n equals, for example, 128-bit or 160-bit equivalent digits. Accordingly, a node can be assigned an ID, for example, from a range of 0 to 16 40 - 1 (or approximately 1.461502E48). The range of 0 to 16 40 — 1 would provide, for example, a sufficient number of IDs to assign every node on the Internet a unique ED. [0091] Thus, each node in a federation can have:
  • An ID which is a numerical value uniformly distributed in the range ofO to b n -l;
  • a routing table consisting of (all arithmetic is done modulo b n ):
  • b is the number base
  • n is the field size in number of digits
  • u is the neighborhood range
  • v is the neighborhood size
  • the arithmetic is performed modulo b”.
  • Figure 3 illustrates an example of a binary relation between nodes in a federation infrastructure in the form of sorted list 304 and corresponding ring 306.
  • nodes depicted in Figure 3 are assigned IDs in a range from 0 to 255.
  • Sorted list 304 utilizes a binary relation that is reflexive, anti-symmetric, transitive, total, and defined over the domain of node identities. Both ends of sorted list 304 are joined, thereby forming ring 306. This makes it possible for each node in Figure 3 to view itself as being at the middle of sorted list 304.
  • the routing table indicates that the successor to ID 64 is ID 76 (the ID immediately clockwise from ID 64).
  • the successor can change, for example, when a new node (e.g., with an ID of 71) joins or an existing node (e.g., ID 76) leaves the federation infrastructure.
  • the routing table indicates that the predecessor to ID 64 is ID 50 (the ID immediately counters clockwise from ED 64).
  • the predecessor can change, for example, when a new node (e.g., with an ID of 59) joins or an existing node (e.g., ID 50) leaves the federation infrastructure.
  • the routing table further indicates that a set of neighborhood nodes to ID 64 have IDs 83, 76, 50 and 46.
  • a set of neighbor nodes can be a specified number of nodes (i.e., neighborhood size v) that are within a specified range (i.e., neighbor range u) of ID 64.
  • a neighborhood set can change, for example, when nodes join or leave the federation infrastructure or when the specified number of nodes or specified range is changed.
  • the routing table further indicates that ED 64 can route to nodes having EDs 200, 2, 30, 46, 50, 64, 64, 64, 64, 76, 83, 98, 135, and 200.
  • the node having ED 76 can be identified from calculating the closest node to 64 + 2 3 , or 72.
  • a node can route messages (e.g., requests for access to resources) directly to a predecessor node, a successor node, any node in a set of neighborhood nodes, or any routing node.
  • nodes implement a numeric routing function to route messages.
  • RouteNumerically(V, Msg) can be implemented at node X to deliver Msg to the node Y in the federation whose ED is numerically closest to V, and return node Y's ED to node X.
  • the node having ED 64 can implement RouteNumerically(243, Msg) to cause a message to be routed to the node having ED 250.
  • ED 250 is not a routing node for ED 64
  • ED 64 can route the message to ED 2 (the closest routing node to 243).
  • the node having ED 2 can in turn implement RouteNumerically(243, Msg) to cause the message to be routed (directly or through further intermediary nodes) to the node having ED 250.
  • RouteNumerically 243, Msg
  • Msg RouteNumerically
  • a ring facilitate partitioning a ring into a ring of rings or tree of rings based on a plurality of proximity criteria of one or more proximity categories (e.g., geographical boundaries, routing characteristics (e.g., IP routing hops), administrative domains, organizational boundaries, etc.).
  • proximity categories e.g., geographical boundaries, routing characteristics (e.g., IP routing hops), administrative domains, organizational boundaries, etc.
  • a ring can be partitioned more than once using the same type of proximity criteria.
  • a ring can be partition based on a continent proximity criteria and a country proximity criteria (both of a geographical boundaries proximity category).
  • IDs can be uniformly distributed across an ID space (a result of random number generation) there is a high probability that any given segment of a circular ID space contains nodes that belong to different proximity classes provided those classes have approximately the same cardinality. The probability increases further when there are a sufficient number of nodes to obtain meaningful statistical behavior.
  • FIG. 4 illustrates a ring of rings 400 that facilitates proximal routing.
  • Ring 401 can be viewed as a master or root ring, and contains all the nodes in each of the rings 402, 403, and 404.
  • Each of the rings 402, 403, and 404 contain a subset of nodes from ring 401 that are partitioned based on a specified proximity criterion.
  • ring 401 may be partitioned based on geographic location, where ring 402 contains nodes in North America, ring 403 contains nodes in Europe, and ring 404 contains nodes in Asia.
  • routing a message from a North American node having an ID 5,345 to an Asian node having an ID 23,345 can include routing the message within ring 402 until a neighbor node of the Asian node is identified. The neighbor node can then route the message to the Asian node.
  • a single hop (as opposed to multiple hops) is made between a North American node and an Asian node. Accordingly, routing is performed in a resource efficient manner.
  • FIG. 5 illustrates an example proximity induced partition tree of rings 500 that facilitates proximal routing.
  • partition tree of rings 500 includes a number of rings.
  • Each of the rings represents a partition of a sorted linked list.
  • Each ring including a plurality a nodes having IDs in the sorted linked list.
  • root ring 501 is partitioned into a plurality of sub- rings, including sub-rings 511, 512, 513, and 514, based on criterion 571 (a first administrative domain boundary criterion).
  • criterion 571 a first administrative domain boundary criterion
  • each component of a DNS name can be considered a proximity criterion with the partial order among them induced per their order of appearance in the DNS name read right to left.
  • sub-ring 511 can be further partitioned into a plurality of sub-rings, including sub-rings 521, 522, and 523, based on criterion 581 (a second administrative domain boundary criterion).
  • Sub-ring 522 can be further partitioned into a plurality of sub-rings, including sub-rings 531, 532, and 533, based on criterion 572 (a geographic boundary criterion). Location based'proximity criterion can be partially ordered along the lines of continents, countries, postal zip codes, and so on. Postal zip codes are themselves hierarchically organized meaning that they can be seen as further inducing a partially ordered sub-list of proximity criteria. [00106] Sub-ring 531 can be further partitioned into a plurality of sub-rings, including sub-rings 541, 542, 543, and 544, based on criterion 573 (a first organizational boundary criterion).
  • a partially ordered list of proximity criterion can be induced along the lines of how a given company is organizationally structured such as divisions, departments, and product groups. Accordingly, sub-ring 543 can be further partitioned into a plurality of sub-rings, including sub-rings 551 and 552, based on criterion 583 (a second organizational boundary criterion).
  • each node has a single ID and participates in rings along a corresponding partition path starting from the root to a leaf. For example, each node participating in sub-ring 552 would also participate in sub-rings 543, 531, 522, 511 and in root 501. Routing to a destination node (ID) can be accomplished by implementing a RouteProximally function, as follows:
  • routing can be accomplished by progressively moving closer to the destination node within a given ring until no further progress can be made by routing within that ring as determined from the condition that the destination node lies between the current node and its successor or predecessor node. At this point, the current node starts routing via its partner nodes in the next larger ring in which it participates. This process of progressively moving towards the destination node by climbing along the partitioning path towards the root ring terminates when the closest node to the destination node is reached within the requested proximal context, as originally specified in the RouteProximally invocation.
  • Routing hops can remain in the proximal neighborhood of the node that originated the request until no further progress can be made within that neighborhood because the destination node exists outside it.
  • the proximity criterion is relaxed to increase the size of the proximal neighborhood to make further progress. This process is repeated until the proximal neighborhood is sufficiently expanded to include the destination node (ID).
  • the routing hop made after each successive relaxation of proximal neighborhood criterion can be a potentially larger jump in proximal space while making a correspondingly smaller jump in the numerical space compared to the previous hop. Thus, only the absolutely required number of such (inter-ring) hops is made before the destination is reached.
  • each federation node maintains references to its successor and predecessor nodes in all the rings it participates as a member (similar to successor and predecessor for a single ring) — the proximal predecessor, proximal successor, and proximal neighborhood.
  • the nodes can also maintain reference to other nodes closest to an exponentially increasing distance on its either half of the ring as routing partners (similar to routing nodes for a single ring).
  • routing partner nodes that lie between a pair of consecutive successor or predecessor nodes participate in the same lowest ring shared by the current node and the node numerically closest to it among the successor or predecessor node pairs respectively.
  • nodes implement a proximal routing function to route messages based on equivalence criteria relations.
  • a node can implement RouteProximally(V, Msg, P) to deliver the message to the node Y whose identify can be mapped to V among the nodes considered equivalent by proximity criterion P.
  • the proximity criterion P identifies the lowest ring in the partition tree that is the common ancestor to all the nodes considered proximally equivalent by it. It can be represented as a string obtained by concatenating the proximity criterion found along the path from the root ring to the ring identified by it separated by the path separator character 7'.
  • the proximity criterion identifying sub-ring 542 can be represented as "Proximity:/.COM/Corp2/LocationA/Div2".
  • Each ring in the partition tree 500 can be assigned a unique number, for example, by hashing its representational string with a SHA based algorithm.
  • RouteNumericaUy(V, Msg) RouteProximaliy(V, Msg, 0).
  • a node in sub-ring 544 can implement RouteProximally to identify a closer node in sub-ring 531 (e.g., to a node in sub-ring 513).
  • sub-ring 531 can implement RouteProximally to identify a closer node in sub-ring 522.
  • sub-ring 522 can implement RouteProximally to identify a closer node in sub-ring 511.
  • sub-ring 511 can implement RouteProximally to identify a closer node in ring 501.
  • a RouteProximally function is recursively invoked with each invocation routing a message closer to the destination.
  • routing hops on a path to a final destination can remain within the proximity of a node that originates a request, while making significant progress between the originating node and the destination node in a numerical space, until either the destination node is reached or no further progress can be made under the chosen proximity criterion at which point it is relaxed just enough to make further progress towards the destination. For example, proximity criterion can be relaxed enough for a message to be routed from ring 531 up to ring 522, etc.
  • an entity publishes references to seed nodes in the root ring.
  • Seed nodes can be published at the unique number (such as the one obtained by hashing its representational string) associated with the ring (as a target ID).
  • Seed node information can further be on-demand cached by the nodes in various rings that are on the path to the corresponding target IDs in the root ring. Such on-demand caching provides for improved performance and reduction in hotspots that might occur when semi-static information is looked up quite frequently. Seed node information can also be obtained via other means such as DNS
  • each node can maintain a set of neighborhood nodes in all of the rings it participates in. Given the above, the state maintained by a node can be summarized as follows:
  • a routing table consisting of (all arithmetic is done modulo b n ): o For each ring, say ring d, in which the node participates ⁇ Successor node (Sd)
  • a specified node when a ring is partitioned into a plurality of corresponding sibling sub-rings, it is permitted for a specified node to simultaneously participate in more than one of the plurality of corresponding sibling sub-rings, for example, through aliasing.
  • Aliasing can be implemented to associate different state, for example, from different sub-rings, with the specified node.
  • aliases for a given node have the same ED, each alias can have distinct state associated with them.
  • Aliasing allows the specified node to participate in multiple rings having distinct proximity criteria that are not necessarily common ancestors of more specific proximity criteria. That is, the specified node can participate in multiple branches of the proximity tree.
  • a dual NIC (wired and wireless) laptop can be considered to be proximally equivalent to both other wireless and wired nodes sharing the same LAN segments as the laptop.
  • these two distinct proximity criteria can be modeled as sub- criteria that are applicable only after application of a different higher priority proximity criterion, such as, for example, one based on organizational membership.
  • a different higher priority proximity criterion such as, for example, one based on organizational membership.
  • the aliased nodes in the two sub-rings representing 1) membership in the wired and 2) membership in the wireless LAN segments merge into a single node in the ring representing the organization to which the laptop belongs. It should be understand that the RouteProximally works as expected without any modifications in the presence of aliasing.
  • Each proximal ring can be configured in accordance with (potentially different) ring parameters.
  • Ring parameters can be used to define a neighborhood (e.g., ring parameters can represent a neighborhood range, a neighborhood size, ping message and depart message timing and distribution patterns for ping and depart messages), indicate a particular federating mechanisms (e.g., from among the above-described first through fourth federating mechanisms previously described or from among other federating mechanisms), or define communication specifics between routing partners in the same proximal ring.
  • Some ring parameters may be more general, applying to a plurality of different federating mechanisms, while other ring parameters are more specific and apply to specific type of federating mechanism.
  • Ring parameters used to configure a higher level proximal ring can be inherited in some embodiments by lower level proximal rings. For example, it may be that ring 543 inherits some of the ring parameters of ring 531 (which in turn inherited from ring 522, etc.)- Thus, a neighborhood size and neighborhood range associated with ring 531 is also associated with ring 541.
  • inherited ring parameters can be altered and/or proximal rings can be individually configured in accordance with different ring parameters.
  • ring 511 is for an administrative domain that contains a large number of nodes and thus the above-described fourth federating mechanism is more appropriate for ring 511.
  • ring 521 is for a small business with a relatively smaller number of nodes and thus the above-described second federating mechanism is more appropriate for ring 521.
  • the ring parameters associated with ring 521 can be set to (or inherited parameters changed to) different values than the ring parameters associated with ring 511.
  • a ring parameter indicating a particular type of federating mechanisms can be different between rings 511 and 521.
  • parameters defining a neighborhood can be different between rings 511 and 521.
  • ring 521 can be configured in accordance with specific parameters that are specific to the above-described second federating mechanism, while ring 511 is configured in accordance additional with specific parameters that are specific to the above-described fourth federating mechanism.
  • proximal rings can be flexibly configured based on the characteristics (e.g., number, included resources, etc.) of nodes in the proximal rings. For example, an administrator can select ring parameters for proximal rings using a configuration procedure (e.g., through a user-interface).
  • FIG. 8 illustrates an example flow chart of a method 800 for partitioning the nodes of a federation infrastructure.
  • the method 800 will be described with respect to the rings of partition a tree 500 in Figure 5.
  • Method 800 includes an act of accessing a sorted linked list containing node IDs that have been assigned to nodes in a federation infrastructure (act 801).
  • the sorted linked list represented by ring 501 can be accessed.
  • the node IDs of the sorted linked list (the nodes depicted on ring 501) can represent nodes in a federation infrastructure (e.g., federation infrastrucrelOO).
  • Method 800 includes an act of accessing proximity categories that represent a plurality of different proximity criteria for partitioning the sorted linked list (act 802). For example, proximity criterion representing domain boundaries 561, geographical boundaries 562, and organizational boundaries 563 can be accessed. However, other proximity criteria, such as, trust domain boundaries, can also be represented in accessed proximity criterion. Proximity categories can include previously created partially ordered lists of proximity criteria. A ring can be partitioned based on partially ordered lists of proximity criteria.
  • Method 800 includes an act of partitioning the sorted link list into one or more first sub lists based on a first proximity criterion, each of the one or more first sub lists containing at least a subset of the node IDs from the sorted linked list (act 803).
  • ring 501 can be partitioned into sub-rings 511, 512, 513, and 514 based on criterion 571.
  • Method 800 includes an act of partitioning a first sub list, selected from among the one or more first sub lists, into one or more second sub lists based on a second proximity criterion, each of the one or more second sub lists containing at least a subset of node IDs contained in the first sub list (act 804).
  • sub-ring 511 can be partitioned into sub-rings 521, 522, and 523 based on criterion 581.
  • Each of he sub-rings 521, 522, and 523 can contain a different sub-set of node IDs from sub-ring 511.
  • Figure 9 illustrates an example flow chart of a method 900 for populating a node's routing table.
  • the method 900 will be described with respect to the sorted linked list 304 and ring 306 in Figure 3.
  • Method 900 includes an act of inserting a predecessor node into a routing table, the predecessor node preceding a current node relative to the current node in a first direction of a sorted linked list (act 901).
  • the node having ID 50 can be inserted into the routing table as a predecessor for the node having ID 64 (the current node).
  • the node having ID 50 precedes the node having ID 64.
  • Method 900 includes an act of inserting a successor node into the routing table, the successor node succeeding the current node relative to the current node in the first direction in the sorted linked list (act 902).
  • the node having ID 76 can be inserted into the routing table as a successor for the node having ID 64 (the current node). Moving in a counter-clockwise direction 322, the node having ID 76 succeeds the node having ID 64.
  • Method 900 includes an act of inserting appropriate neighborhood nodes into the routing table, the neighborhood nodes identified from the sorted linked list in both the first direction and in a second opposite direction based on a neighborhood range and neighborhood size (act 903). For example, the nodes having IDs 83, 76, 50, and 46 can be inserted into the routing table as neighborhood nodes for the node having H) 64 (the current node).
  • the nodes having IDs 83 and 76 can be identified in clockwise direction 321 and the nodes having IDs 50 and 46 can be identified in counter-clockwise direction 322 (moving from end B of sorted linked list 304 towards end A of sorted linked list 304). It may be that in some environments no appropriate neighborhood nodes are identified. Inserting a neighborhood node can establish a symmetric partnership between the current node and the neighborhood node such that current node is a partner of the neighborhood node and the neighborhood node is a partner of the current node.
  • Method 900 includes an act of inserting appropriate routing nodes into the routing table, the routing nodes identified from the sorted linked list in both the first and second directions based on the a number base and field size of the DD space for the federation infrastructure, the routing nodes representing a logarithmic index of the sorted link list in both the first and second directions (act 904).
  • the nodes having IDs 200, 2, 30, 46, 50, 64, 64, 64, 64, 64, 76, 83, 98, 135 and 200 can be inserted into the routing table as routing nodes for the node having ID 64.
  • the nodes having IDs 64, 64, 76, 83, 98, 135 and 200 can be identified in direction 321 and the nodes having IDs 64, 64, 50, 46, 30, 2, and 200 can be identified in direction 322.
  • the routing nodes represent a logarithmic index of the sorted link list 304 in both clockwise direction 321 and counter-clockwise direction 322. Inserting a routing node can establish a symmetric partnership between the current node and the routing node such that current node is a partner of the routing node and the routing node is a partner of the current node.
  • Figure 7 illustrates an example flow chart of a method 700 for populating a node routing table that takes proximity criteria into account.
  • the method 700 will be described with respect to the rings in Figure 5.
  • Method 700 includes an act of inserting a predecessor node for each hierarchically partitioned routing ring the current node participates in into a routing table (act 701).
  • Each predecessor node precedes the current node in a first direction (e.g., clockwise) within each hierarchically partitioned routing ring the current node participates in.
  • the hierarchically partitioned routing rings are partitioned in accordance with corresponding proximity criteria and contain at least subsets of a bi-directionally linked list (and possibly the whole bi-directionally linked list).
  • Method 700 includes an act of inserting a successor node for each hierarchically partitioned routing ring the current node participates in into the routing table (act 702). Each successor node succeeding the current node in the first direction within each hierarchically partitioned routing ring the current node participates in. For example, a successor node is selected for the specified node from within each of the rings 501 and sub-rings 511, 522, 523, 531, and 542.
  • Method 700 includes an act of inserting appropriate neighborhood nodes for each hierarchically partitioned routing ring the current node participates in into the routing table (act 703).
  • the neighborhood nodes can be identified in both the first direction (e.g., clockwise) and in a second opposite direction (e.g., counter clockwise) based on a neighborhood range and neighborhood size from the hierarchically partitioned routing rings the current node participates in.
  • neighborhood nodes can be identified for the specified node from within each of the rings 501 and sub-rings 511, 522, 523, 531, and 542.
  • Method 700 includes an act of inserting appropriate routing nodes for each hierarchically partitioned routing ring the current node participates in into the routing table (act 704).
  • routing nodes can be identified for the specified node from within each of the rings 501 and sub-rings 511, 522, 523, 531, and 542.
  • appropriate routing nodes are inserted for each proximity ring d except the leaf ring (or leaf rings in embodiments that utilize aliasing), in which the node Y participates.
  • Appropriate routing nodes can be inserted based on the following expression(s): if Y.S d -id ⁇ Y.id + b 1 ⁇ Y.s ⁇ j+i .id is true, then use ring d; or if Y.p c j.id ⁇ Y.id - b l ⁇ Y.pa+i.id is true, then use ring d. [0139] If a ring has not been identified in the previous step, use the lead (e.g., ring
  • ring d is the proximity ring in which node Y should look for the routing partner closest to z.
  • Figure 10 illustrates an example flow chart of a 1000 method for routing a message towards a destination node.
  • the method 1000 will be described with respect to the sorted linked list 304 and ring 306 in Figure 3.
  • Method 1000 includes an act of a receiving node receiving a message along with a number indicating a destination (act
  • the node having ID 64 can receive a message indicating a destination of212.
  • Method 1000 includes an act of determining that the receiving node is at least one of numerically further from the destination than a corresponding predecessor node and numerically further from the destination than a corresponding successor node (act 1002).
  • ID 64 is further from destination 212 than ID 50 and, in direction 321, ID 64 is further from destination 212 than ID 76.
  • Method 1000 includes an act of determining that the destination is not within a neighborhood set of nodes corresponding to the receiving node (act 1003). For example, the node with ID 64 can determine that destination 212 is not within the neighborhood set of 83, 76, 50, and 46.
  • the method 1000 includes an act of identifying an intermediate node from a routing table corresponding to the receiving node, the intermediate node being numerically closer to the destination than other routing nodes in the corresponding routing table (act 1004).
  • the node having ID 64 can identify the routing node having ID 200 as being numerically closer to destination 212 that other routing nodes.
  • the method 1000 includes an act of sending the message to the intermediate node (act 1005).
  • the node having ID 64 can send the message to the node having ID 200.
  • Figure 11 illustrates an example flow chart of a method 1100 for routing a message towards a destination node based on proximity criteria. The method 1100 will be described with respect to the rings in Figure 4 and Figure 5.
  • Method 1100 includes an act of a receiving node receiving a message along with a number indicating a destination and a proximity criterion (act 1101).
  • the proximity criterion defines one or more classes of nodes.
  • the receiving node receives the message as part of a 1 current class of nodes selected form among the one or more classes of nodes based on the proximity criterion.
  • the node having ID 172 can receive a message indicating a destination of 201 and proximity criterion indicating that the destination node be part of classes represented by ring 401.
  • the node having ID 172 can receive the message as part of ring 404.
  • Method 1100 includes an act of determining that the receiving node is at least one of, numerically further from the destination than a corresponding predecessor node and numerically further from the destination than a corresponding successor node, among nodes in a selected class of nodes (act 1102). For example, within ring 404, the node with ID 172 is further from destination 201 than the node having ED 174 in the clockwise direction and is further from destination 201 than the node having ID 153 in the counterclockwise direction.
  • Method 1100 includes an act of determining that the destination is not within the receiving node's neighborhood set of nodes for any of the one or more classes of nodes defined by the proximity criterion (act 1103). For example, the node having ID 172 can determine that destination 201 is not in a corresponding neighborhood set in ring 404 or in ring 401.
  • Method 1100 includes an act of identifying an intermediate node from the receiving node's routing table, the intermediate node being numerically closer to the destination than other routing nodes in the routing table (act 1104). For example, the node having ID 111 can identify the node having ID 194 as being numerically closer to destination 201 than other routing nodes in ring 404.
  • the method 1100 includes an act of sending the message to the intermediate node (act 1105).
  • the node having ID 172 can send the received message to the node having ID 194.
  • the node having ID 172 can send the received message to the node having ID 194 to honor a previously defined partially ordered list of proximity criterion [0147]
  • Node 194 may be as close to destination 201 as is possible within ring 404. Thus, proximity can be relaxed just enough to enable further routing towards the destination to be made in ring 401 in the next leg. That is, routing is transitioned from ring 404 to ring 401 since no further progress towards the destination can be made on ring 404.
  • the node having ID 201 is within the neighborhood of the node having ID 194 in ring 401 resulting in no further routing.
  • relaxing proximity criteria to get to the next higher ring is enough to cause further routing.
  • a node participating in a federation infrastructure can operate in different operational phases. Valid phase values for a node can be defined to be members of an ordered set. For example, ⁇ Nodeld ⁇ . ⁇ lnstancelds ⁇ .
  • Phase Value [Phase-State Values: Inserting, Syncing, Routing, Operating]. [Phase.Unknown Indication: phase known at time of transmission, phase unknown at time of transmission] ⁇ defines one possible ordered set representing a phase-space of a given node within a federation infrastructure.
  • a node instance can transition (or advance) through the node phase-states from Inserting to Syncing to Routing to Operating in order. Further, in some embodiments, a node instance can be configured such that the node instance is prevented from transitioning back to a prior node phase-state. In some embodiments, a node advances its instance ID each time the node comes up.
  • a node instance can prevented from transitioning from Routing back to Syncing (or back to Inserting), etc.
  • a given node instance e.g., identified by (Nodeld, Ihstanceld)
  • a particular node phase-state e.g., Operating
  • the given node instance is not likely to (and in some embodiments will not) revert to a prior node phase- state (e.g., back to Routing, Syncing, or Inserting).
  • a prior node phase- state e.g., back to Routing, Syncing, or Inserting
  • phase information and corresponding instance Ids (which advance as a node comes up) are transferred together.
  • any information about older instances is considered out of date.
  • nodes can reboot or lose communication with one another, such as, for example, when first starting up, through a graceful departure, or as a result of abnormal termination (crash).
  • a crash can cause a node in a Routing phase-state to reboot.
  • a reboot or lose of communication there may be no way to determine what node phase-state a node is in. Accordingly, when a node is rebooting or communication to a node is lost, a [Phase.Unknown Indication] can be set to indicate that the phase-state for the node is currently not known. However, any previously expressed and/or detected phase-state for the node can be maintained and is not lost.
  • the [Phase.Unknown Indication] can be used to indicate whether a phase-state was known at the time a phase-state value was transmitted (e.g phase value with phase.unknown not set) or if a phase-state is a previously expressed phase-state and the phase-state was not known at the time the phase-state was transmitted (e.g., phase value with phase.unknown set).
  • the phase of a node (its phase value) can be represented using both a phase-state value and a phase.unknown indication.
  • Join Protocol From time to time, nodes can join to and depart from existing federations. The nodes can implement appropriate protocols for joining and departing federations.
  • a node can implement a Join() function to become part of an existing federation.
  • a node implementing the JoinQ function can transition through three ordered phase-states: an inserting phase-state, a synchronizing phase-state, and a routing phase-state before reaching the final operating phase-state. In other embodiments these specific order phase- states may not exist while others may be defined.
  • Figure 12 A illustrates an example of a node establishing membership within a federation infrastructure.
  • Figure 12B illustrates an example of nodes in a federation infrastructure exchanging messages.
  • Insertion Phase A node, Y, enters this phase-state by issuing a join message, including at least its node ID and indicating a join action to the federation.
  • a join message can be a routed message sent by a newly joining node (node Y) with its destination property set to the identity of the newly joining node.
  • node Y a newly-joining node is inserted between its predecessor and successor nodes in the federation.
  • the insertion phase-state can be implemented according to the following algorithm (All arithmetic is performed modulo b n ):
  • IPl Y identifies an existing node that is already part of a lowest ring from which the joining node wishes to participate in the federation. This can either be statically configured or dynamically discovered using DHCP and/or DNS and/or WS-Discovery or a (potentially well-known) constant. Let this existing federation node be E. [0159] IP2. Y invokes E.RouteNumerically(Y, joinMsg) to determine the node X whose ID is numerically closest to Y.id in every proximity ring that the node Y participates. This can include routing a join message to multiple nodes.
  • IP3. Determine the numerical successor (s) and predecessor (p) nodes. (Note that the data needed to do the following insertion can be carried in the join message and its response. As such, there are no additional roundtrips needed.)
  • node X (the node that processed the join message) can send a join response back to node Y.
  • the join response can indicate the predecessor node (Y.p) and successor node (Y.s) for node Y.
  • Node Y can receive the join response and process the join response to become aware of its predecessor and successor nodes.
  • Node Y can be a weak routing participant in the federation. For example, Node Y can simply forward message sent to it, either to its successor or predecessor nodes. Thus, Node Y is inserted into the federation infrastructure but routing and neighborhood tables are not populated. Before reaching this point, node Y will request other nodes sending it messages to redirect the messages sent to it through a different node by returning a status message to the sending node indicating that node Y's liveness phase is in an inserting phase-state.
  • nodes can exchange sync request and response messages.
  • Sync request and sync response messages can include liveness information (e.g., headers) for other nodes from the sender's point of view.
  • Neighborhood state can also be included in sync request and response messages such that application layers in a neighborhood are aware of one another's state.
  • sync request and response messages can be exchanged during a synchronizing phase-state of a joining node.
  • sync request and response messages can be exchanged during other operational phase-states as well (e.g. while in the Operating Phase-state).
  • FIG. 16 depicts an example of a message model and related processing model 1600.
  • a node can send and receive sync requests messages.
  • sync request message 1601 can be received at function layer 1651 from a newly inserted node (e.g., the node in Figure 12B having ID 144).
  • Application data 1602 e.g., namespace subscriptions
  • Function layer 1651 can inform application layer 1652 of any application data included in sync requests messages.
  • function layer 1651 can invoke neighborhood state sync event 1603, including application data 1602, to application layer 1652.
  • Sync request 1631, including application data 1607 can also be sent to another node that processes sync request 1631 similar to the processing to sync request 1601 in processing model 1600.
  • function layer 1651 can invoke the neighborhood state request function 1604 in application layer 1652.
  • Neighborhood state request 1604 is a request to the application layer to obtain the state that needs to be propagated in the neighborhood.
  • application layer 1652 can supply neighborhood state 1606, including optional application data 1607, to function layer 1651.
  • application layer 1652 can send neighborhood state 1606, including optional application data 1607 in reaction to some application layer event.
  • function layer 1651 can send sync response message 1608, including optional application data 1607, to propagate application layer neighborhood state.
  • Synchronization Phase After processing a join response message, a node Y transitions from the insertion phase-state to synchronizing (Syncing) phase-state. In the synchronization phase-state, the newly- inserted node Y synchronizes information with nodes in the neighborhood. Generally, Node Y can send sync messages to at least its predecessor and successor nodes identified in the insertion phase-state. These nodes processing the sync messages can return sync responses that indicate corresponding neighborhood and routing partner nodes of these processing nodes.
  • the synchronizing phase-state can be implemented according to the following algorithm (All arithmetic is performed modulo b n ): [0166] SPl. Compute the Neighborhood(Y) from the union of Neighborhood ⁇ , s) and Neighborhood(Y.p) nodes in each proximal ring the node Y participates. The union computation can be done as follows:
  • Any optional application specific neighborhood data (e.g., application data 1607) accessed via SP 2 is included in the sync request 1631.
  • SP3. Y receives sync response messages back from those nodes processing sync messages sent in SP2.
  • node Y can exchange synchronize messages (request/response) with one or more nodes within its computed neighborhood. After synchronize messages are exchanged with at least one and potentially all of a node Y's neighborhood nodes, the computed neighborhood nodes can exchange further messages to propagate synchronized data.
  • a synchronization message (request or response) can be a non-routed message sent by a node to proactively synchronize its data with a target node that is, for example, in the nodes neighborhood.
  • any optional application specific neighborhood data present in these received sync response messages can be offered to Y's application layer 1652 via neighborhood state sync event 1603.
  • the proximal successor (e.g., Y.s) and predecessor (Y -P) nodes exchange their routing tables with the newly-inserted node (e.g., Y). Nodes that receive sync messages can respond by sending sync responses.
  • Sync responses carry data similar to synchronize messages except from the perspective of the responding node.
  • Both sync messages and sync responses can carry (or piggyback) application data.
  • application data can be propagated between nodes during the synchronizing phase-state.
  • the node can process messages destined for it, instead of simply forwarding them either to a successor or predecessor. However, the node may still be viewed as a weak routing participant because its routing table is not populated.
  • Routing Phase After the synchronizing phase-state is completed, a node transitions into the routing phase-state. In the routing phase-state, the newly-synchronized node (e.g., node Y) computes its routing nodes.
  • the routing phase-state can be implemented according to the following algorithm (All arithmetic is performed modulo b ⁇ ):
  • Ring d is the proximity ring in which the node Y participates and satisfying the condition Y.s ⁇ j.id ⁇ Y.id + b 1 ⁇ Y.S d+ i-id or Y.pa.id ⁇ Y.id - b 1 ⁇ Y.pd + i.id. Else make ring d the most specific proximity ring. Ring d is the proximity ring in which node Y should look for the routing partner closest to z.
  • node Y can process not only messages destined for it but can also route messages.
  • RP4 Subscribe to liveness notification events sent from the application layer for the endpoint IDs of the partner routing nodes, if this has not already been done. Also, revoke any liveness event subscriptions previously established with the application layer for the nodes that are no longer partner routing nodes. For example, subscription and/or revoke .requests can be passed up to an application layer (e.g., application layer 121) that implements pub-sub logic for a corresponding application (e.g., a namespace application). When subsequent application specific liveness messages (e.g.
  • FIG 17 depicts an example of a number of liveness interactions that can occur between function layer 1751 and application layer 1752.
  • endpoints are, for example, publish/subscribe topics (e.g., represented by a URL or URI) representing various nodes and can be, for example, federation infrastructure nodes.
  • Subscribe To Liveness Event 1701 can be invoked from function layer 1751 to application layer 1752 to subscribe to a liveness event (e.g., to a publish/subscribe topic).
  • Revoke Liveness Subscription 1702 can be invoked from function layer 1751 to application layer 1752 to revoke a subscription to a liveness event.
  • End Point Down 1703 can be sent from application layer 1752 to function layer 1751 to indicate that an endpoint may be down and provide function layer 1751 with an optional replacement endpoint.
  • End Point Down event 1703 can be sent asynchronously based on a prior subscription (e.g., Subscribe To Liveness Event 17011 [0178]
  • Node Down 1704 can be invoked from function layer 1751 to application layer 1752 to indicate that function layer 1751 (or some other lower layer) has detected a failed node and optionally provide application layer 1752 with a replacement node.
  • Application layer 1752 can subsequently propagate that a potentially failed node was detected to other interested parties.
  • Node down event 1704 can be sent asynchronously anytime function layer 1751 or some other lower layer detects a potentially failed node.
  • Send liveness 1706 can be invoked from application layer 1752 to function layer 1751 when application layer 1752 detects that a node is down (e.g., from node down event 1704 or from some other out-of-band mechanism).
  • Send liveness event 1706 can cause function layer 1751 to send a liveness message.
  • Send liveness event 1706 can also be invoked asynchronously anytime application layer 1752 detects that a node is down and does not depend on any prior established subscriptions (via subscribe to liveness).
  • function layer 1751 is used recursively.
  • function layer 1751 can indicate an interest in a specified node (e.g., is the particular node up or down) to application layer 1752.
  • Application layer 1752 can formulate an application specific subscription for notifications related to the specified node and then reuse function layer 1751 to communicate the formulated subscription to appropriate corresponding application layer 1752 instances in other federation nodes.
  • function layer 1751 can route the subscription to a publish/subscribe manager that manages notifications for the specified node — the pub/sub Manager being implemented as at least part of the application 1752 in the related federation nodes.
  • function layer 1751 is used to route a subscription that function layer 1751 caused to be generated. Similar recursive mechanisms can also be used to unsubscribe or otherwise indicate that there is no longer an interest in the specified node.
  • Operating Phase After the routing phase-state is completed, a node transitions into the operating phase-state. The node can remain in an operating phase-state until it goes down (e.g., rebooting). In the operating phase-state, the node can send update messages to routing partners from time to time. Update messages (both update requests and update responses) can include neighborhood node liveness information for the sending nodes (e.g., for all proximal neighborhoods of interest). This sent liveness information can also include that of the sender's liveness info.
  • Update messages can be routed messages originated by nodes to periodically update its routing partner nodes.
  • Application data can be piggyback on update messages such that application data can be propagated during routing partner updates.
  • the message destination is set to the identity of the perfect routing partner at the desired routing index.
  • the Message ID property of this message is assigned an application sequence number so as to enable the node(s) processing this message to determine the latest message and this message is routed proximally.
  • a node that receives an update message can respond with an update response.
  • An update response carries the same data as the update message except that the data is from the perspective of the responding node.
  • nodes can exchange routing information. From time to time, operational nodes can update routing partners.
  • operational nodes can also send ping messages (e.g., ping messages 1609 and 1611).
  • a ping message is a one-way message sent by a node to periodically announce its presence and disseminate information within its neighborhood about its neighborhood/routing nodes and replicate (e.g., piggybacked) application data,
  • An origin node can send a ping message to one or more of its immediate predecessor and successor neighborhood nodes.
  • information related to the origin node is propagated to other nodes on a ring within the neighborhood of the origin node.
  • the origin node can send a ping message only to its immediate predecessor and successor nodes and the ping message propagates outward from the position (node ID) of the origin node along the ring in both directions to the edge of the origin's neighborhood.
  • the origin node can send a ping message to every n th node in its neighborhood in both its predecessor and successor directions.
  • Each node receiving a ping message checks its interest in the origin node from a neighborhood range perspective. If not interested, it discards the ping message. If interested it processes the ping message and forwards the ping message according to its specified ping pattern if such forwarding is constrained to the neighborhood of the originating node. For example, after processing a ping message a receiving node can forward the ping message to at least its successor node if the sending and origin nodes are in its predecessor node set or at least its predecessor node if the sending and origin node are in its successor set. [0185] Thus, the outward propagation of ping messages stops when the message reaches the edge of the neighborhood node set around the origin node.
  • ping message 1609 can be received at function layer 1651 from a neighborhood node.
  • Application data 1612 e.g., namespace subscriptions
  • Function layer 1651 can inform application layer 1652 of any application data included in ping messages.
  • function layer 1651 can inform application layer 1652 of any application data included in Sync Request messages. Both of these cases of transference can be accomplished via sending a neighborhood state sync event 1603, including application data 1612, to application layer 1652.
  • function layer 1651 can send neighborhood state request 1604 to application layer 1652, Neighborhood state request 1604 is invoked on the application layer 1652 to obtain the state that needs to be optionally propagated in the neighborhood.
  • neighborhood state request 1604 application layer 1652 can return neighborhood state 1606, including optional application data 1607, to function layer 1651.
  • Function layer 1651 can send ping message 1611, including optional application data 1607, to propagate neighborhood and routing partner node liveness information as well as optional application layer neighborhood state.
  • Function layer 1651 can also send sync response 1608, including optional application data 1607, to propagate application state.
  • the node can implement a Depart function to be gracefully removed from the federation.
  • a node departs an existing federation by sending a departure message to one or more of its immediate proximal predecessor and successor nodes, and maybe other nodes in the same proximal neighborhood.
  • the departure distribution pattern i.e., which nodes are sent departure messages
  • information related to the departing node is propagated to other nodes on a ring within the neighborhood of the departing node.
  • a departure message is a one-way message originated by a gracefully departing node to inform one or more other nodes within at least one of its proximal neighborhoods about its impending departure.
  • the departing node propagates the depart message (e.g., within its neighborhood) in a manner similar to the propagation of the ping messages.
  • the node having ID 30 can send depart messages 1219 to the nodes having EDs 17 and 40.
  • the node having ID 30 can then remove itself from the federation infrastructure from the standpoint of a given proximal ring. Note that it is possible that a node remove itself from one proximal neighborhood but not others to which it may belong. [0190] Since the nodes having IDs 17 and 40 (i.e., the predecessor and successor nodes) are likely to be the closest nodes to ID 30 after the node having ID 30 is removed, the nodes having IDs 17 and 40 are made aware of the node having ID 30's departure.
  • future messages that are to be delivered to ID 30 can be appropriately processed at the nodes having IDs 17 and 40.
  • the nodes having IDs 17 and 40 can propagate the departure of the node having ED 30 to the other nodes on ring 1206. In the absence of the node having ED 30, the nodes have EDs 17 and 40 can also recompute predecessor and successor pointers, potentially pointing to each other.
  • the Message ED property of a depart message is assigned the same application sequence ED as that of Ping messages so as to enable the nodes processing the depart message to determine the latest message among a series of ping and depart messages sent by an origin node. Graceful departure from a federation proximal ring is optional but encouraged.
  • Liveness can be included in virtually any message that is exchanged within a federation in the form of Liveness Message Headers.
  • Liveness Message Headers For example, join messages, join responses, sync messages, sync responses, update messages, update response, application specific messages, liveness messages, and ping messages can all include liveness information headers.
  • the node can include Liveness information for processing by other nodes. Linveness information can be included in a liveness information header of liveness message.
  • [0194J Liveness information indicating the liveness state of a node can be represented using the following properties: [Node]: Identifies the node whose liveness state is being represented. A node can be identified based on [Reference Properties] that further include an [Instance ID]. [Reference Properties]: Element information items specified in the WS-addressing specification. WS-addressing defines the [Instance ID] reference property for inclusion in the reference property set. [Instance BD]: A number that identifies a particular instance of a node. An incrementing boot count can be used as the instance ID of a node.
  • Phase- State Value Conveys the highest phase-state (inserting, synchronizing, routing, operating) that the indicated node instance was know to have achieved
  • Phase.Unknown Indication An indicator that conveys if the current phase is known or unknown.
  • [Color] Identifies the proximity equivalence class to which the node belongs. Two nodes with the same color value are always considered to be proximally closest because they both belong to the same equivalence class identified by the color value. The number of proximity equivalence classes can increase over time as more nodes join the federation.
  • Max Weight 0 to Max Weight. It measures the desirable characteristics of a federation node such as large computational power, high network bandwidth, and long uptime. The higher the value, the more capable the node is making it more desirable from a partnership perspective.
  • the [Node] and [Freshness] properties of a node are either implicitly or explicitly conveyed in a larger scope such as the [Origin] and [Sender] message headers and as such inclusion of the above properties again in the liveness headers will be duplicative.
  • the sender of a message need only convey its current phase, color, and weight information as its DD, Instance Id are supplied in the message addressing headers and its Freshness is implied.
  • Liveness state can be at least partially ordered based on a " ⁇ " binary relation defined as follows: ⁇ 5 [0197] "LK L2" is true if
  • a liveness "down" message can be sent to a specified node when it is detected or suspected that the specified node has become unavailable (e.g. gone down).
  • an application layer e.g., application layer 121
  • another application layer e.g., application layer 123
  • the detecting application layer can notify other lower layers (e.g., other lower layers 131) that the node may be down, for example, in accordance with message model and related processing models 1600 and/or 1700.
  • Such a notification can cause
  • liveness down messages are routed and thus delivered to a node closest to those nodes suspected of being down, if a liveness down message for a specified node
  • the liveness down message gets delivered to another node, it indicates the specified node does appear to have gone down. Accordingly, if the node receiving the liveness down message views itself as being in the proximal neighborhood of the specified node, it may source a departure message for the specified node into that proximal neighborhood as described as well as indicating to its the application layer (e.g., using Node Down 1704) that the specified node may be down and that the receiving node is its replacement.
  • a liveness down message for the specified node can be routed proxirnally with its target ID set to that of the node that may be down.
  • Embodiments of the present invention are designed to accommodate large number of nodes joining and departing the federation in a short period of time. Such changes in the network can cause routing delays if the logarithmic search trees maintained at the various nodes become unbalanced. That is, if there are more nodes on one side of a ring than the other.
  • nodes participating in a federation execute the balancing procedure when certain criteria are met.
  • any node can execute the balancing procedure to ensure a balanced routing table for optimal routing efficiency: • A configured number of liveness messages described above were received.
  • Balancing the routing tables is a simple process. For example, nodes with an unbalanced routing table can re-execute the Synchronization and Routing phase-states of the Join protocol. [0204] Acts RP2b, RP2d and RP4 combined with 1) finding the closest routing node to a number, 2) the departure protocol followed by the nodes leaving a federation gracefully, and 3) balancing procedure followed by the nodes receiving liveness messages result in a the faster healing system when federating nodes join and depart the network fairly quickly and in large numbers. [0205] Status Messages
  • a status message is non-routed message sent by a receiver node to a sender node to inform routing success/failure of a correlated message that the sender node previously forwarded to the receiver node.
  • Figure 18 depicts an example of how messages forming part of a request-response message exchange pattern are routed across nodes on a ring.
  • a status message can include headers that identify the original correlated message whose routing status is being reported. As such, status messages can be used between nodes to indicate that message was successfully routed form one node to the next. For example, routing request message 1811 from node 1801 to node 1806 includes sending request 1811 though nodes 1802, 1803, 1804, and 1805.
  • Corresponding cascading success status messages can be sent from node 1806 to node 1805, from node 1805 to node 1804, from node 1804 to node 1803, from mode 1803 to node 1802, and from node 1802 to node 1801 respectively.
  • response 1816 can be sent end-to-end from node 1807 to node 1801.
  • Response 1816 is optional and may not exist in a one-way message exchange pattern.
  • Figure 13 illustrates an example flow chart of a method 1300 for a node to join the federation infrastructure.
  • the method 1300 will be described with respect to ring 1206 in Figures 12A and 12B.
  • Method 1300 includes an act of issuing a join message to a federation infrastructure (act 1301).
  • the node having ID 144 can issue join 1201 to federation infrastructure including ring 1206.
  • Method 1300 includes an act of receiving a join message from a joining node (act 1308).
  • an existing node in the federation infrastructure including ring 1206 can receive join 1201.
  • Method 1300 includes an act of routing a join message to a processing node (act 1309).
  • the processing node can be a node having an BD numerically closer the ID of the joining node than other active nodes in the federation infrastructure at the time the join message is being routed.
  • join 1201 can initially be received at the node having ID 64, routed to the node having ID 135 and routing to the node having ID 151.
  • Method 1300 includes an act of computing one or more predecessor nodes and one or more successor nodes for the joining node (act 1310).
  • the node having ID 151 can compute an immediate predecessor node and an immediate successor node for the node having ID 144.
  • Method 1300 includes an act of computing one or more routing nodes for the joining node (act 1311).
  • the node having ID 151 can compute routing nodes (from the node having ID 151 's perspective) for the node having ID 144.
  • the node having ID 151 can compute, for example, that the nodes having IDs 218 and 40 are routing nodes for the node having ID 144. Similar computations can be made for other proximal rings.
  • Method 1300 includes an act of sending a join response to the joining node (act 1312).
  • a join response can identify all the predecessor and successor neighborhood and routing partner nodes for the joining node as computed by the processing node given its current view of the federation infrastructure.
  • join response 1202 can identify at least the node having ID 135 as the immediate predecessor node to the node have ED 144, can identify the node having ID 151 as the immediate successor node to the node having ED 144, and can identify any routing nodes (for the node having ID 144) computed at the node having ED 151 for node ID 144 (the newly joining node).
  • Method 1300 includes an act of receiving a join response from a federation node that processed the join message (act 1302).
  • the node having ID 144 can receive join response 1202 from the node having ID 151.
  • Method 1300 includes an act of sending a sync request to at least each of the immediate proximal predecessor nodes and immediate proximal successor nodes (act 1303).
  • the node having ID 144 can send sync requests 1203 to the nodes having IDs 135 and 151.
  • Sync request 1203 can include an identification of any neighborhood nodes of the node having ID 144 and/or an identification of any routing partners of the node having ID 144.
  • the nodes having IDs 135 and 151 can receive the sync requests 1203. In response to receiving sync requests 1203, the nodes having IDs 135 and 151 can identify their neighborhood and routing partner nodes from corresponding routing tables. The nodes having IDs 135 and 151 can include their identified neighborhood and routing partner nodes' liveness information in sync response 1204 and send the send sync responses 1204 to the node having ID 144.
  • Method 1300 includes an act of receiving a sync response from each of the proximal predecessor and successor nodes (act 1304).
  • the node having ID 144 can receive sync responses 1204 from the nodes having IDs 135 and 151.
  • Sync response 1204 can include liveness information for one or more nodes on ring 1206 or other rings in a federation infrastructure.
  • Sync response 1204 can also identify any prospective routing partner nodes for the node having ED 144.
  • Method 1300 includes an act of computing neighbor nodes (act 1305).
  • the node having ID 144 can compute corresponding neighborhood nodes based on the union of the neighborhood nodes for the nodes having IDs 135 and 151. Neighborhood nodes can be computed based on a summarized view of the join response message and any sync response messages.
  • Method 1300 includes- an act of computing routing nodes (act 1306).
  • the node having ID 144 can compute routing nodes from among the nodes of ring 1206. Routing partners can be computed base on a summarized view of the join response message and any sync response messages.
  • Method 1300 includes an act of exchanging at least neighborhood node information with computed routing partners (act 1307).
  • the node having ID 144 and the node having ED 218 can exchange state information (e.g., instance ID, phase-state, etc) corresponding to their respective neighborhood nodes.
  • state information e.g., instance ID, phase-state, etc
  • the nodes processing the Update message will send corresponding Update response message in reaction to the receipt of these update messages from the newly joining node.
  • the Update response includes at least the liveness information for itself and its neighborhood nodes.
  • Method 1300 can also include an act of initiating an initial propagation of routing tables to at least one neighborhood node.
  • the node having ID 144 can include computed neighborhood and routing partner nodes in a ping message and send the ping message to the node having ID 174 (e.g., one of the computed neighborhood nodes).
  • the node having ID 174 can receive the ping message and update a corresponding routing table with the liveness information originated at the node having ID 144.
  • the node having ID 174 can also include its corresponding routing table in a second ping message and send the second ping message at some future point to the node having ID 144.
  • the node having ID 144 can receive the second ping message and can update its corresponding routing table with nodes in the liveness information included in second ping message (i.e., nodes in the routing table of the node having ID 174).
  • the node having ID 144 can repeat the sending of ping messages with other neighborhood nodes in ring 1206.
  • method 1300 has been described with respect to a single ring (ring 1206), it should be understood that in some embodiments a node that joins one ring inherently also joins one or more other rings. For example, referring briefly back to Figure 5, a node at joins ring 551 inherently also joins rings 543, 531, 522, 511, and 501. Thus, method 1300 can be implemented to join a plurality of rings. In other embodiments some or all of the acts in method 1300 may be repeated when joining multiple rings. For example, referring again to Figure 5, one or more of the acts of 1300 can be repeated when a node joins both ring 551 and ring 514 (e.g.. aliasing).
  • a joining node ID can be accessed and used to identify a joining node in a sorted linked list as well as corresponding hierarchically partitioned sub-lists the joining node is to participates in.
  • a receiving node is identified from the sorted linked list and each partitioned sub-list.
  • the join message is routed to a processing node (e.g., based on ID) in the sorted linked list and each portioned sub-list.
  • a join response is received from the processing node in the sorted linked list and each partitioned sub-list.
  • FIG 14 illustrates an example flow chart of a method 1400 for a node to maintain membership in a federation infrastructure.
  • the method 1400 will be described with respect to ring 1206.
  • Method 1400 includes an act of sending a first ping message to a neighborhood node (act 1401).
  • the first ping message indicates that a current node sending the first ping message is neighbor of the neighborhood node.
  • the first ping message can also include routing partner and neighborhood nodes' state of the current node.
  • the node having ID 144 can send a ping message to the node having ID 151.
  • the node having ID 151 Upon receiving the first ping message, the node having ID 151 is made aware that the node having H) 144 is a neighbor of the node haying ID 151. Node 151 may also discover newer liveness information (for other nodes on ring 1206) from node 144 as a side effect of this act.
  • Ping messages can be periodically repeated at a specified frequency based on, for example, configuration state associated with a proximal ring into which the ping message is to be sent.
  • the frequency can be varied depending on the configuration state. For example a specified ping frequency for a WAN can be different than the specified frequency for a LAN.
  • Ping messages can also be sent in accordance with a ping distribution pattern.
  • the ping distribution pattern for an originating node can indicate that ping messages are to be sent to be neighborhood nodes in both directions on a ring.
  • the node having ID 144 can send pings both in the direction of the node having ID 135 and in the direction of the node having ID 151.
  • Ping distribution patterns and frequencies can be varied. For example, per proximity ring.
  • Method 1400 includes an act of receiving a second ping message from the neighborhood node (act 1402).
  • the second ping message indicates to the current node at least that the neighborhood node originating the second ping message is a neighbor of the current node.
  • the second ping message can also include routing partner and neighborhood nodes' state of the originating neighborhood node.
  • the node having ID 151 can send a second ping message to the node having ED 144.
  • the node having ID 144 is made aware that the node having ID 151 is a neighbor of the node having ID 144.
  • the second ping message can also include liveness information for other nodes on ring 1206.
  • ping messages can be exchanged within a neighborhood and can be used to maintain neighborhood membership (for each proximal membership) and an approximated common neighborhood view of node presence within the federation.
  • a received ping message can be periodically repeated/forwarded to other nodes within the proximal neighborhood into which the ping was originated (sent by the originating node).
  • Forwarded ping messages can also be sent in accordance with a ping distribution pattern.
  • the ping distribution pattern for a forwarding node can indicate that ping messages are to be sent to be neighborhood nodes in a direction away from an originating node.
  • the node having ID 1151 can forward pings originating at the node having ID 144 in the direction of the node having ID 174.
  • Ping forwarding distribution patterns can be varied, for example, per proximity ring.
  • Nodes can be configured to receive ping messages at corresponding intervals. When expected ping messages are not received, a node may interpret a communications failure and set the phase.unknown indication for another node to true for the node that should have originated the expected, but at least late, ping message.
  • Method 1400 includes an act of proximally routing an update request message to a perfect routing node (act 1403).
  • the update request message indicates to the routing node receiving such a routed update request that the current node is participating as a routing partner of the receiving routing node.
  • the update request message can also include at least the current node's neighborhood nodes' identities (e.g. in the form of liveness information).
  • Method 1400 includes an act of receiving an update response message from the processing (receiving) routing node (act 1404).
  • the update response indicates to the current node that the processing routing node is participating as a routing partner of the current node.
  • the update response message can also include at least the processing routing partner's neighborhood nodes' identifies.
  • the node having ID 210 can send update response 1207 to the node having ID 144.
  • the node having ID 144 is made aware that the node having ID 210 is a routing partner of the node having ID 144 .
  • Method 1400 can also include an act of appropriately updating node information to indicate that the current node and the neighborhood node are participating as neighbors and that the current node and the neighborhood node are participating as routing partners
  • the node having ID 144 can update, node information corresponding to the node having ID 151 to indicate that the nodes having IDs 144 and 141 are participating in a (proximal) neighborhood.
  • the node having ID 144 can update node information corresponding to the node having ID 210 to indicate that the nodes having IDs 144 and 210 are participating as routing partners.
  • application state saved at a specified node X is replicated among its Neighborhood(X) nodes using reliable-flooding protocol.
  • Each item in the application state has an assigned owner, which could be the endpoint that created the item.
  • Each item in the application state also has an associated timestamp (a.k.a. sequence number) given by its owner.
  • the timestamp has at least three components: o Instance ID (e.g., an unsigned-integer) of the owning entity. Must be at least monotonically (>1) increasing.
  • o Sequence ID e.g., a URI
  • Item timestamps are used to detect latest information associated with the corresponding item during replication because item timestamps generate at least a partial- order with ⁇ Instance ID, Sequence ID, and Offset> triples. The timestamp associated with an item being replicated is compared against the local one, if any, to detect the latest one. Item timestamps are also used to support idempotent semantics of create/update/delete operations.
  • Nodes not detecting (after a period of time) an expected Update or Ping from (origin) other partner (routing and/or partner) nodes can consider the phase-state unknown, set a phase.unknown indication to true, and report it as such to other 3 rd party nodes. In other words periodic generation of updates and pings can be required.
  • This requirement and actual timeout values can be an attribute of various proximal rings. For example, a ring can have more restrictive timing requirements for some sub-rings (e.g., in a LAN segment) and node failure detection/reporting is relatively quick. On the other hand, a ring can have less restrictive timing requirements (or even no timing requirements) for other sub-rings (e.g., on the Internet) and proactive node failure detection/reporting is relative long (or doesn't exist).
  • FIG 15 illustrates an example flow chart of a method 1500 for discovering liveness information for another node.
  • the method 1500 will be described with respect to ring 1206 in Figures 12A and 12B.
  • any message such as, for example, sync 1203, sync response, 1204, update 1216, update response 1207, etc.
  • a liveness header includes a ⁇ node ID, instance ID, phase [phase-state value], [phase.unknown indication], freshness value, a color (proximity) value, and a weight value> for a node.
  • a liveness header includes ⁇ a phase [phase-state value].
  • Method 1500 includes an act of receiving a liveness header representing state information for a node participating in a federation infrastructure (act 1501).
  • the liveness header includes at a least a received participating node ID, a received node's instance ID, a received phase value, and a received freshness value.
  • the node having ID 144 can receive a first liveness header in sync response 1204 from the node having ID 151.
  • the first liveness header can include a participating node ID, an instance ID, phase value [phase-state value]. [phase.unknown indication], a freshness value, a color (proximity) value, and a weight value> for the node having ID 174.
  • phase-state value e.g., Inserting, Syncing, Routing, Operating
  • phase value e.g., phase-state: [Inserting, Syncing, Routing, Operating], and phase.unknown
  • phase-state [Inserting, Syncing, Routing, Operating]
  • phase.unknown identifies the expressed and/or detected phase information of the node having DD 174 at the time indicated by the first freshness value.
  • Method 1500 includes an act of accessing at least a current instance ID, current phase value, and current freshness value for the participating node maintained at the current node (act 1502).
  • the node having ID 144 can access a previous received and stored instance ID, phase value [phase-sate value.][phase.unknown indication], and freshness value for the node having ID 174.
  • Method 1500 includes an act of comparing at least the received instance ID, received phase value, and received freshness value to the current instance ED, the current phase value, and the current freshness value respectively at a current node (act 1503).
  • the node having ID 144 can compare the previously received and stored instance ED, phase value [phase-sate value. ][phase.unknown indication], and freshness value for the node having ID 174 to the instance ID 5 phase value [phase-sate value.] [phase, unknown indication], and freshness value received in the liveness header.
  • the node having ID 144 can determine that current state information for the node having ID 174 (e.g., received from the node having ID 151) is stale based on (in order) the first instance ID being greater than the currently stored instance ID for the node having ED 174, based on first phase-state value being more advanced than the currently stored phase-state value for the node having ID 174, or based on the first freshness value being a value greater than the freshness value currently stored for the node having ED 174.
  • the node having BD 144 can also determine that at least one phase.unkown indication (either currently stored or received in the liveness header) indicates that a phase-state was known at the time the phase-state was detected/transmitted.
  • Method 1500 includes an act of determining if state information for the participating node is to be updated at the current node based on the comparison (act 1504). For example, based on the comparison of values for the node having ED 174, the node having ID 144 can determine that state information for the node having ID 174 is to be updated. Updating outdated state information for the node having DD 174 can include replacing current stored values (e.g., for instance BD, phase-state value, phase.unknown indication, or freshness value) with values included in the liveness header. For example, the node having ID 144 can update state information for the node having ID 174 to indicate that the node having ID 174 has transitioned to a more advanced phase-state.
  • current stored values e.g., for instance BD, phase-state value, phase.unknown indication, or freshness value
  • the node having ID 144 can detect that communication with the node having ID 151 has been lost.
  • application layer 1752 in response to a prior subscription for liveness events 1701 (with an endpoint of the node having ID 151), application layer 1752 can send endpoint down event 1703 (with an endpoint of the node having ID 151) to function layer 1751.
  • liveness conditions can be indicated in liveness information with the Phase.Uhknown indicator being set to true along with the last known Phase state value.
  • Method 1500 can further include an act of receiving a message that includes a second liveness header from a second different node in the federation infrastructure
  • the node having ID 144 can receive a status message (from the node having ID 103 or some other node of ring 1206) that includes a second liveness header.
  • the second liveness header can include ⁇ the participating node ID, a second instance ID, a second phase value [phase-state value], [phase. unknown indication], a second freshness value, a second color (proximity) value, and a second weight value> for the node having ID 174.
  • the second phase value (e.g., phase-state: [Inserting, Syncing, Routing, Operating], and phase.unknown indication) identifies the expressed/detected phase of the node having ID 174 at the time of the second freshness value.
  • Method 1500 can also include an act of comparing the second instance ID, the second phase value, and the second freshness value to the current instance ED, the current phase value, and the current freshness value respectively (act 1506). For example, after receiving a status message from the node having ID 103, the node having ID 144 can determine that current state information for the node having ID 151 is stale based on (in order) the second instance ID being greater than the first instance ID, the second phase being more advanced than the first phase value, or the second freshness value being greater than the first phase value. [0244] Method 1500 can also includes an act of determining if state information for the participating node is to be updated based on the comparison.
  • the node having ID 144 can determine that state information for the node having ID 174 is to be updated. Updating outdated state information for the node having ID 174 can include replacing current stored values (e.g., for instance ID, phase-state value, phase.unknown indication, or freshness value) with values included in the second liveness header. For example, the node having ID 144 can update state information for the node having ID 174 to indicate that the node having ID 174 has transitioned to a more advanced phase-state.
  • current stored values e.g., for instance ID, phase-state value, phase.unknown indication, or freshness value
  • phase values are compared within the context of equal color values.
  • a node can participate in multiple proximity rings. Participation in multiple proximity rings can occur as a result of participation in a more specific ring implying participation in a more general ring (along a common spine). For example, referring back to Figure 5, a node's participation in ring 532 also implies that the node is participating in rings 522, 511, and 501. Thus, a color for a more specific ring also represents all parent proximal rings. Also as previously described, participation in multiple proximity rings can occur when a node in one ring is aliased into one or more other rings (potentially along different spines).
  • a node participating in ring 532 can be aliased into ring 531 (or even ring 541 that would imply participation in rings 531, 522, 511, and 501).
  • a color for one ring e.g., ring 531
  • a peer color (or proximity) of another ring e.g., ring 532).
  • phase values e.g., phase-state values and/or phase.unknown indications
  • a node that receives state information for another node identifies the corresponding proximity ring for the state information (color) before determining if current state information is to be updated for that node and color.
  • the node having ID 144 can identify the corresponding proximity ring for received state information corresponding to the node having ED 174 before comparing the received state information to current state information.
  • Identifying an appropriate proximity ring can include comparing a received color value to one or more current color values.
  • other state information such as, for example, a current instance ID 5 a current phase value, and a current freshness value
  • corresponding received state information such as, for example, a received instance ID, a received phase value, and a received freshness value.
  • Equality between color values can result in a variety of ways. For example, equality between color values can result when a current color value and a received color value indicate the same proximity ring (e.g., ring 532).
  • equality between color values can result when a more specific color value is compared to a corresponding parent color value (e.g., another ring along the same spine). For example, comparing the color value for ring 532 to the color value for ring 511 (or ring 522 or 501) can result in equality. Thus, the child proximity is the parent proximity but is more specific.
  • a bootstrapping mechanism can be used as a last resort when other types of communication fail to identify an active member of a leaf ring or security constraints require a newly joining node to initially communicate with at least one of a set of special nodes such as seed nodes. That is when other types of communication fail or because of security requirements, a bootstrapping mechanism can be used to identify an active member node of a leaf ring.
  • seed nodes are used to bootstrap communication with a federation. Seed nodes provide well known points of entry for some types of cross (inter) proximity communication). Seed nodes help heal ring partitions due to infrastructure failure/recovery and general dynamism.
  • Each ring can have at least one operational seed node in order to provide basic bootstrapping properties for a federation.
  • Peer seed nodes can communicate amongst themselves to maintain a ring structure (e.g., a doublv linked lisf) for a Droximitv that consists of at least all active seed nodes for that proximity.
  • a dedicated seed node synchronization protocol can be used to provide each seed node with at least total knowledge of all other seed nodes' presence (active) state.
  • An active seed node is a member node of the proximity leaf ring in which it is homed as well as all other ancestral rings of the leaf ring.
  • a seed node can represent an entire spine of proximity rings, for example, from the seed node's leaf ring to the root ring. Accordingly, seed nodes can function as highly available and well known entry nodes in each of those proximity rings. As a result, presence state about seed nodes can be useful for various forms of communication (e.g., inter-proximal communication) within a federation. Accordingly, seed nodes can provide a number of special properties, such as, for example, acting as well known "j°in points" for joining nodes, acting as a secure ring authority, aiding in healing infrastructure partitions, and acting as a stable "entry node” for each of their proximities.
  • a seed node's arrivals and orderly departures can be registered as a stable entry node at a rendezvous point in each of their proximities.
  • registration messages can be routed to a fixed URI whose destination ID is the SHA-I hash of the string "Proximity:/”.
  • seed nodes acting as stable entry nodes register themselves in this manner there are other embodiments where selected non-seed nodes may also register themselves in the same manner and with the same or similar protocols described here for seed node.
  • the stable entry node can indicate each ring it is a member of.
  • information maintained at the rendezvous point identified by this fixed URI is essentially a list of stable entry nodes and their corresponding ring memberships. Accordingly, any node can refer to the rendezvous point identified by this fixed URI to obtain a list of available stable entry nodes and their ring memberships.
  • the stable entry node directly registers these arrival and departure events. In another embodiment, the stable entry node registers these events directly at a rendezvous point within it's immediate proximity ring and that rendezvous point transparently facilitates (directly or indirectly) updating of all other appropriate rendezvous points in each of the remaining proximities rings to which the registering/unregistering stable entry node belongs.
  • the application state sequencing and propagation properties of a federation can be used to maintain and propagate this stable entry node registration information.
  • a reliable-flooding protocol can be used to replicate saved application state among a node's Neighborhood nodes.
  • the promotion of stable entry node's presence data towards the root ring allows other nodes in a federation to look up at least one entry node in every proximity. Entry Node Lookup can be facilitated by routing a node lookup message towards the above determined rendezvous point in the Lowest Common Ancestor Ring ("LCAR") of the leaf ring of the node performing the lookup and the desired proximity ring.
  • LCAR Lowest Common Ancestor Ring
  • a node in ring 541 may desire to communication with a node in ring 533. However, the node in ring 541 may have no direct knowledge of any node in ring 533. Thus, the node in ring 541 can send a Node Lookup Message to ring 522 (the LCAR of ring of ring 541 and ring 533).
  • a rendezvous point node in ring 522 that processes entry node presence information e.g. caused to exist in the system because of a registration message originated by that entry node
  • stable entry nodes are seed nodes configured specifically as stable entry nodes for maintaining presence data for various proximities.
  • other types of nodes can also function as stable entry nodes maintaining presence data for various proximities and may also be configured to perform other operations.
  • certain other types of nodes may be configured (e.g., by an administrator) as being highly available and thus suitable as a stable entry node (i.e. to be registered as described above).
  • the other types of nodes may not include additional seed node functionality (e.g., may not be trusted as a security ring authority).
  • rendezvous points that maintain entry node presence state for their immediate proximity may register themselves as a stable entry node in the ancestral ring or rings.
  • Embodiments of the present invention can also facilitate inter-proximity communication, such as, for example, between nodes in different proximal branches of a tree of rings. Inter-proximity communication can be used to communicate to and/or between one or more, and potentially all, proximity rings in a proximally partitioned ring infrastructure.
  • Figure 5A illustrates the example proximity induced partition tree 500 with additional levels of detail in portions of partition tree 500. Inter-proximity communication can occur between various nodes in Figure 5A.
  • partition tree of rings 500 addition includes various sub-rings under ring 513. Each of the additional sub-rings represents a partition of a sorted linked list.
  • root ring 501 is partitioned into a plurality of sub-rings, including sub-rings 511, 512, 513, and 514, based on criterion 571 (a first administrative domain boundary criterion).
  • sub-ring 511 can be further partitioned into a plurality of sub-rings, including sub-rings 521, 522, and 523, based on criterion 581 (a second administrative domain boundary criterion).
  • Other sub-rings under sub-ring 522 are further portioned based on other criterion.
  • each node has a single ID and participates in rings along a corresponding partition path (a spine) starting from the root to a leaf.
  • each node participating in sub-ring 552 would also participate in sub-rings 543, 531 , 522, 511 and in root 501.
  • sub-ring 513 can also be further partitioned into a plurality of sub-rings, including sub-rings 561 and 562 based on other criterion, such as, for example, state jurisdiction.
  • Sub-ring 562 can be further portioned into a plurality of sub-rings, including sub-rings 571 and 572 based on other criterion, such as, for example, city jurisdiction. Accordingly, within Figure 5A, inter-proximity communication can be used to send a message from a node of ring 541 to a node of ring 572, without requiring communication up a spine from ring 541 to root ring 501 and then back down from root ring 501 to ring 572. [0263] Inter-proximity communication can be included as part of a communication pattern, such as, for example, broadcasting, multicasting, or any- casting, being implemented in a tree of rings.
  • Broadcasting can include sending a message to all active nodes in a tree of rings.
  • Multicasting can include sending a message to a group of nodes in a tree of rings.
  • Any-casting can include sending a message to at least one node in a tree of rings.
  • Figure 19A illustrates an example proximity induced partition tree of rings 1900 that facilitates inter-proximity communication.
  • root ring 1901 is partitioned into a plurality of sub-rings, including sub-rings 1, 2, 3, and 4, based on selected criterion (e.g., a first administrative domain boundary criterion).
  • Sub- ring 1 is further partitioned into sub-rings 11, 21, 31, and 41.
  • Sub-ring 11 is further partitioned into sub-rings 111, 211, and 311.
  • Sub-ring 21 is further partitioned into sub- rings 121, 221, 321, 421, and 52L
  • other sub-rings such as, for example, sub-rings 2, 3, 4, 31, and 41, can also be further partitioned.
  • the numbering convention of the rings in proximity induced partition tree of rings 1900 is configured such that any digits after the first digit indicate a ring's parent ring. For example, the "11" in ring “311” indicates that ring 11 is the parent ring of ring 311. Similarly, the "1" in ring "41” indicates that ring 1 is the parent ring of ring 41.
  • Global ring 1901 is the parent ring for any rings numbered with, a single digit, such as, for example, rings 1, 2, 3 and 4. Similar to proximity induced partition tree of rings 500 in Figure 5 A, partition tree of rings 1900 can be partitioned based upon various proximity criterion.
  • R[" ⁇ number>"] is used to refer to a ring number.
  • R["l l"] refers to ring 11.
  • N[ ⁇ number>] is used to refer to a node number.
  • N[ 1311 J refers to node 1311.
  • nodes can maintain an entry table that matches rings to corresponding entry nodes in those rings.
  • a parent ring contains all of the nodes from each of its child rings.
  • ring 11 contains all the nodes from R["l 11"], R["211"], and R["311"].
  • sending a message to ring 11 is sufficient to get the message to any node in ring R["l 11"], R["211"], and R["311”].
  • a node's entry table can be reduced to entries for those rings that are relatively different from the perspective of the ring the node resides in.
  • N[I 111] can simply maintain an entry for R["21”] - N[1121] - since maintaining entries for multiple child rings or R["21”] would be redundant.
  • Creation and Maintenance of Collateral Ring Sets [0269]
  • any peer ring of a specified ring is defined as a "collateral ring" of the specified ring.
  • any peer ring of a specified ring's ancestor rings is also defined as a "collateral ring" of the specified ring.
  • Any collateral ring of a specified ring is also collateral ring of all the nodes included in the specified ring.
  • R["211"] is a collateral ring of R["lll”] since R["211"] is a peer of R["l l l"].
  • R["211"] is also a collateral ring of any node included in R["l 11"], such as; for example N[1311].
  • R["21"] is a collateral ring of R["l l l”] since R["21"] is a peer of R["l l"] (i.e., an ancestor of R["l l l”]).
  • R["21”] is also a collateral ring of any node included in R["1 H"], such as, for example N[Il I l].
  • a "collateral ring set” (“CRS") is defined as a set of one or more collateral rings from the perspective of a specified ring or nodes within a specified ring.
  • a collateral ring set for R["221"], as well as any nodes in R["221”], such as, for example, N[8221] includes R["l 1"], R["121"], R["31"], R["4I"], R["2"], R["3"], and R["4"].
  • a node can maintain a CRS entry table that includes one or more collateral rings and one or more corresponding entry nodes into the one or more collateral rings.
  • a CRS entry table can be a data structure including one or more ⁇ collateral ring, 1 to N entry nodes> items, where N is some integer.
  • the data structure can be of the format ⁇ collateral ring_01, entry node_01, entry node_02, ...>, where the ellipsis represents one or more additional entry nodes into collateral ring_01.
  • a node can make use of local knowledge, rendezvous protocol messages (e.g., ping messages, update messages, and update responses) used to propagate state in a tree of rings, application messages, and messages used to facilitate specified communication patterns (e.g., broadcasting, multicasting, and any-casting) in a tree of rings.
  • rendezvous protocol messages e.g., ping messages, update messages, and update responses
  • application messages e.g., application messages, and messages used to facilitate specified communication patterns (e.g., broadcasting, multicasting, and any-casting) in a tree of rings.
  • a node can use local knowledge, such as, for example, routing table information, from all levels of rings a node participates.
  • N[1121] may be a neighbor of N[1311] in R["l"].
  • One collateral ring of N[1311] from the perspective of N[1121] is R["21"].
  • N[1311] can insert the ⁇ air(R["21"], N[1121]) (in this case an item having a single entry node) into N[l311]'s CRS entry table.
  • a node can insert entries into a CRS entry table
  • Nodes can, in addition to specifically intended messages, propagate their CRS entry table information to other nodes in messages that are otherwise used for other purposes, such as, for example, to propagate neighborhood and routing partner state information.
  • nodes can include CRS entry table state in ping messages sent to neighborhood nodes and in update messages and update responses exchanged between routing partner nodes.
  • Nodes that receive a CRS entry table state from another node can use the received CRS entry table state to augment and/or maintain their own CRS entry table.
  • a node when a node exchanges Rendezvous Ping/Update messages with its neighbor/partner nodes (e.g., at a rendezvous protocol layer), the node can also exchange (at least part of and potentially all of) its CRS entry table (and use the CRS entry table state received from its neighbors/partners to update its own table.
  • N[1311] does not have prior knowledge of any node in R["3"] (within the context of or ring 1901) .
  • N[ 1311 ] does has a neighbor N[8221 ] (in R[" 1 "]) and N[8221]'s CRS entry table has an entry (R["3"] 5 N[8223]).
  • N[1311] and N[8221] can, from time to time, send ping messages to one another.
  • N[8221] can include (at least part of and potentially all of) its CRS entry table in ping messages that are sent to N[1311].
  • ping message can include N[8221j's CRS entry table.
  • N[1311] can identify the item ⁇ R["3"], N[8223], ...> and include the item ⁇ R["3"], N[8223], ...>) in its own CRS entry table.
  • N[1311] can also identify other items for other rings in its CRS and include those other items in its own CRS entry table.
  • CRS entry table state can be similarly exchanged in update messages and update responses exchanged between routing partners in a ring. Also, any routing protocol message can use to learn (e.g., liveness information) about CRS entry nodes. Also, specific messages, intended to maintain CRS entry tables, can be used. [0278] CRS entry table state can also be discovered in messages that facilitate specified communication patterns (e.g., broadcasting, multicasting, and any-casting) in a tree of rings. For example, to broadcast a message to every node in a tree of rings, a broadcasting algorithm may use various types of messages that are specific to broadcasting.
  • specified communication patterns e.g., broadcasting, multicasting, and any-casting
  • Nodes that send these broadcast specific messages can include CRS entry table state within the broadcast specific messages.
  • a multicasting algorithm may use various types of messages that are specific to multicasting. Nodes that send these multicast specific messages can include CRS entry table state within the multicast specific messages.
  • an any-casting algorithm may use various types of messages that are specific to any-casting. Nodes that send these any-cast specific messages can include CRS entry table state within the any- cast specific messages.
  • CRS state can also be discovered in application component messages that are exchange between applications.
  • application layers 121, 122, and/or 123 may exchange application component messages that include CRS state.
  • an application layer Upon receiving an application component message including CRS state, an application layer can transfer the CRS state down to corresponding other lower layers, such as, for example, to a rendezvous protocol layer, to augment existing CRS state.
  • CRS state can be application provided and/or hard wired, and is configurable by nodes within a tree of rings *
  • a node may decide to retain two or more of the entry nodes for the ring.
  • the node randomly selects an entry node from among any retained entry nodes.
  • a policy is applied to aid in the selection of a specified entry node from among any retained entry nodes.
  • a policy can indicate that the selected entry node is to be the same entry node each time.
  • a policy can indicate that the selected entry node is to be varied among any retained entry nodes. For example, in some embodiments, entry nodes are selected in a round-robin manner so that the load can be distributed evenly among any retained entry nodes.
  • a node when multiple entry nodes are retained, a node can efficiently transition to a different entry node, for example, if a first selected entry node fails, is busy, or for some other reason is not available. [0283] Alternately, a node may retain a single entry node for the ring.
  • a node may detect additional entry nodes for a ring.
  • the node when a node retains a single entry node or lacks memory to store additional entry nodes, the node can determine if a newly received entry node is to replace an existing entry node.
  • a node can use a function to compute the rank for each candidate entry node with the following parameters: the distance of the entry node, the freshness of the entry node information, and the weight of the entry node (e.g., configuration preference). An entry node with higher rank is retained.
  • a CRS entry table may or may not be complete.
  • a complete CRS entry table includes at least one entry node for each ring in a node's CRS.
  • a complete CRS entry table for node 1311 would include at least one entry node into each of rings 111, 211, 21, 31, 41, 2, 3, and 4.
  • routing table state information alone forms a complete CRS entry table for each node in the tree of rings.
  • routing table related information propagated e.g., in ping messages, update request messages, and update response messages
  • in tree of rings 1900 may form a complete CRS entry table for every node in each of the depicted rings.
  • a node can use information in a CRS entry table to send inter-proximity communication (e.g., without having to route a message to a LCAR of the sending ring and the destination ring).
  • N[1311] e.g., a publisher node
  • N[1311] may be able to send inter-proximity communication directly to one or more of R["l 11"], R["211"], R["21”], R["31”], R["41"j, R["2"], R["3”], and R["4"].
  • a CRS entry table for N[1311] may include the following entries:
  • N[1311] can send communication 52 to R["lll”]
  • N[1311] can send communication 51 to R["211”]
  • N[1311] can send communication 53 to R["21”] (N[1121] is a member of both R["21"] and R["221”])
  • N[1311] can send communication 56 to R["31”]
  • N[1311] can send communication 57 to R["2"]
  • N[1311] can send communication 58 to R["3"].
  • N["1311"] may identify entries (e.g., ⁇ collateral ring, entry node> items) for R["41"] and R["4"]. These entries can be identified from updated local knowledge, from CRS entry tables contained in rendezvous protocol messages (e.g., ping messages, update message, and update responses), through CRS entry table state contained in communication pattern specific messages, and through other mechanisms such as, for example, an application component.
  • rendezvous protocol messages e.g., ping messages, update message, and update responses
  • CRS entry table state contained in communication pattern specific messages
  • a message is to be routed to the node closest to a given node ID within a specified proximity ring that is not an ancestor to (or in) the leaf ring where the message originated (hereinafter referred to as "downward routing").
  • Downward routing One example of this is facilitating inter- proximity communication from a node in an originating ring to a collateral ring when the node in the originating ring is not aware of an entry node for the collateral ring.
  • Figure 19B illustrates another view of the example proximity induced partition tree of rings 1900.
  • N[1311] is to send communication destined to a node in R["4"] or R["41"].
  • RouteDown(M, P, ID) The federation is to deliver message M to the node closest to ID in the proximity P.
  • Proximity P can be any proximity ring in the federation (leaf or intermediate) that is not an ancestor to (or in) the originating node's leaf ring.
  • message M is never routed above nodes within the LCAR of the originating node's leaf ring and the target proximity ring P.
  • the RouteDown(M, P, DD) function can include identifying an entry node known to be a member of the target proximity ring P.
  • a sending node can identify an entry node in a target proximity ring using a variety of different mechanisms.
  • a sending node can be an originating node (the first sending node).
  • a sending node can also be an intermediate node that receives a message from the originating node or another intermediate node and then forwards the message.
  • a sending node can use local knowledge, such as, for example, configuration or locally cached information (e.g., in addition to a CRS entry table), to identify an entry node for a target proximity ring.
  • N[1311] may have access to cache and configuration 1902 that includes configuration or locally cached information about rings in tree of rings 1900.
  • local knowledge about a federation is obtained through communication mechanisms outside of the federation (i.e., out-of-band). Local knowledge can be used to identify any nodes in the exact target proximity ring P. If any nodes in the exact target proximity ring are found, message M can be forwarded to one of them.
  • N[1311] may be able to use cache and configuration 1902 to identify N[8004] and forward message 1903 to R["4"].
  • a sending node can use a CRS entry table to locate any entry nodes in the target proximity ring P. If any entry nodes the target proximity ring are found, message M can be forwarded to an entry node in the target proximity ring P. For example, when N[7521] is a destination for message 1903, N[1311] can identify N[6521] as an entry node for R["521"]. Accordingly, message 1903 can be routed to N[6521] (or into R["521”]), Within R["521"], N[6521] can then attempt to route message 1903 to N[7521] using intra- ring communication.
  • a sending node if a sending node is able to identify an entry node for the target proximity ring, it forwards the message to the exact target proximity ring. For example, if N["6521"] is able to identify an entry node for R["21”] it forwards message 1903 on to R["21"] (dashed line).
  • the sending node can check its CRS entry table to locate entry nodes for any ancestor rings to the target proximity ring. For example, it may be that N[1311] is attempting to send a message to a node in R["121"], however N[1311] may be unable to identify an entry node for R["121"]. Accordingly, N[1311] can refer to CRS entry table 1904 to locate N[6521] (an entry node into R["21"]). N[1311] can forward the message to N[6521], which now becomes the sending node for the message.
  • N[6521] can then attempt to identify an entry node into R[221] (the target proximity).
  • N[6521] can refer to local knowledge, a CRS entry table, and/or can (recursively) apply the RouteDown algorithm. It may be that N[6521] identifies N[3221] as entry node into R[221]. Accordingly, N[6521] can send message 1903 to N[3221].
  • N[3321] can then route message 1903 to an appropriate node in R[221] using intra-ring communication
  • a message can be passed to ancestors that are closer and closer to the target proximity ring until an entry node into the target proximity ring is identified or no further ancestor rings are available.
  • a sending node can also route an Entry Node Lookup Request containing at least the request target proximity to an entry node directory mechanism, such as, for example, used for bootstrapping the federation. Routing of an Entry Node Lookup Request can be constrained to the LCAR of the sending node and the target ring. For example, N[1311] can route Look Up Request 1906 to rendezvous point 7651 to request entry nodes for R["31"].
  • An entry node directory mechanism can return a list of potential entry nodes. For example, rendezvous point 7651 can return a list of potential entry nodes (including N[8431]), and at least the seed nodes registered with that rendezvous point for the target proximity in look up response 1907.
  • the sending node considers any newly discovered nodes identified in a Lookup Response Message (sent from the rendezvous point) and forwards message M to one of those entry nodes.
  • Considering newly discovered nodes can cause the CRS entry table, as well as other locally cached node presence knowledge, to be augmented and otherwise maintained.
  • Lookup Response Messages may also contain other node presence information. For example, specific entry nodes known to be of importance to the sending node for possible inclusion in the CRS entry table of the sending node.
  • the message M is sent (either by the original sending node, an entry node in an ancestor ring of the target proximity, or a looked up entry node) to at least one of those entry nodes in the target ring.
  • the message M can include instructions for the entry node in the proximity target ring to route message M to ID.
  • the RouteDown request can be faulted back toward the original sending node.
  • an originating node attaches an end-to-end RouteDown Message Header to the message, wherein the RouteDown Message Header specifies the target proximity URI.
  • a single node can be selected.
  • nodes that are closer to the target proximity P can be selected, then nodes with the higher weight can be selected, then the nodes that are closer to the destination ID of M can be selected.
  • no mechanisms result in a selection a node can be then randomly selected. If a failed attempt to forward message M occurs when there are multiple candidates, forwarding can be re- attempted as long as there are non-faulted candidate nodes.
  • a reverse Status/Fault message path can be established as the application message passes from originator thru intermediaries to the final destination node. Once a message is delivered to the destination or a fault is detected, a corresponding fault/status message can be sent back toward the originator along this path.
  • Figure 19C illustrates a partitioned view of a portion of the example proximity induced partition tree of rings 1900.
  • Figure 19D illustrates an expanded view of ring 11 from the example proximity induced partition tree of rings 1900.
  • Figure 20 illustrates an example flow chart of a method 2000 for maintaining a collateral ring set for a node in tree of rings. Method 2000 will be described with respect to the rings, nodes, messages, and data in Figures 19C and 19D.
  • Method 2000 includes an act of a node accessing a collateral ring set entry table configured to store collateral ring set entries for the node (act 2001). Each collateral ring set entry configured to indicate a collateral ring of the node and at least one corresponding entry node into the collateral ring of the node.
  • N[1311] can access CRS entry table 1904, which is configured to store collateral ring set entries, in the format ⁇ collateral ring, 1 to N entry nodes>, where N is some integer, for N[1311].
  • CRS entry table 1904 can include zero or more ⁇ collateral ring, . entry node> items, each included item indicating a collateral ring of N[1311] and one or more corresponding entry nodes into that collateral ring.
  • CRS entry table 1904 includes the CRS entry ⁇ R["51"], N[8651], ...> indicative of N[8651] being one of the 1 to N entry nodes into R[51] (a collateral ring of N[ 1311] and R["311"]).
  • Method 2000 includes an act of discovering collateral ring set entry table information from available resources that maintain information related to the configuration of the tree of rings (act 2002).
  • N[1311] can discover collateral ring set entry table information form sources that maintain information related to the configuration of tree of rings 1900.
  • various different sources of CRS entry table information may be available to a node.
  • a node may have access to local knowledge, such as, for example local configuration and cache information, may access to CRS related state included in rendezvous protocol messages, such as, for example, ping messages, update messages, and update responses, used to propagate state in a tree of rings, may access CRS related state included in application messages, and may access CRS related state from messages used to facilitate specified communication patterns, such as, for example, broadcasting, multicasting, and any-casting, in a tree of rings.
  • rendezvous protocol messages such as, for example, ping messages, update messages, and update responses, used to propagate state in a tree of rings
  • CRS related state included in application messages may access CRS related state from messages used to facilitate specified communication patterns, such as, for example, broadcasting, multicasting, and any-casting, in a tree of rings.
  • N[1311] accesses local configuration 1921. From local configuration 1921, N[1311] can discover CRS entry ⁇ R["111"], N[1111], ...> indicative of N[1111] being at least one of the entry nodes into R["l 11"] (a collateral ring of N[1311] and R["311”]). N[1311] may also receive application message 1971. From application message 1971 N[1311] can discover CRS information 1972. CRS information 1972 may or may not contain CRS state for Rings in N[1311]'s CRS. N[1311] may also receive communication pattern specific message 1973 ; From communication pattern specific message 1973 N[1311] can discover CRS state 1974. CRS state 1974 may or may not contain CRS state for Rings in N[131 l]'s CRS.
  • N[1311] can discover and exchange CRS state in rendezvous protocol messages. Since N[IlIl] is a member of R["l 11"], N[1211] is a member of R["211"], and N[1311] is a member of R["311"], each of the nodes N[1111 ], N[1211], N[1311] are also members of R["l l"]. As previously described, nodes that are members of a common ring can exchange ping messages, update messages, and update responses to maintain routing table information. Thus, the nodes of R["ll”] can exchange ping messages, update messages, and update responses to maintain routing table information for R["l l"].
  • CRS state can be included in exchanged ping messages, update messages, and update response, as well as other rendezvous protocol and application message traffic between nodes.
  • N[AIl] a neighbor of N[1311] in R["l l"]
  • N[1311] can send ping message 1931, including CRS state 1932, to N[1311].
  • N[1311] can discover CRS entry ⁇ R["31"], N[1131]> indicative of N[1131] being an entry node into R["31”] (a collateral ring of N[1311] and R["311”]).
  • CRS entries 1932 can be a complete or partial list of the CRS entries in N[Al l]'s CRS entry table.
  • N[1311] can also send ping messages including CRS state to its neighbors. For example, N[1311] can send ping message 1945, including CRS state 1934, to N[EIl] (a neighbor of N[1311] in R["ll"]).
  • CRS entries 1934 can include a complete or partial list of CRS entries from CRS entry table 1904.
  • N[1311] can also send and receive update messages and update responses that include CRS related information.
  • N[1311] can send update message 1933, including CRS entries 1934, to N[DIl] (a routing partner of N[1311] inR["ll”]).
  • N[DIl] can respond by sending update response 1937, including CRS entries 1938, to N[1331].
  • CRS entries 1938 can be a complete or partial list of the CRS entries in N[Dl l]'s CRS entry table.
  • N[1311] can receive update message 1941, including CRS entries 1942, from N[CU] (a routing partner of N[1311] in R["ll”]).
  • CRS entries 1942 can be a complete or partial list of the CRS entries in N[Cl l]'s CRS entry table.
  • N[1331] can respond by sending update response 1943, including CRS entries 1934, to N["C11"].
  • a node can also receive collateral ring set entry table related information from available resources indicating (directly or indirectly) that a CRS entry may no longer be valid, for example, an indication that an entry node can not be contacted. Any resource used to send CRS related state can also be used to send an indication that can be interpreted to mean that a CRS entry may no longer be valid. Thus, it may be that, from time to time, a node receives CRS related state that causes one or more CRS entries to be added to its CRS entry table as well indications that may cause removal of one or more CRS entries that may no longer appropriate.
  • Method 2000 includes an act of updating the collateral ring set entry table with appropriate collateral ring set entry state based on the discovered collateral ring set entry table information (act 2003).
  • Each appropriate collateral ring set entry state including a collateral ring of the node and at least one corresponding entry node into the collateral ring of the node.
  • N[1311] can include any CRS entries received in Figures 19C and 19D into CRS entry table 1904.
  • N[1311] can also remove any CRS entries from CRS entry table 1904 that are indicated (e.g., in configuration, rendezvous protocol messages, applications messages, or communication pattern specific messages) as potentially no longer being appropriate. Accordingly, a node's CRS entry table can be updated to appropriately reflect the changing structure of a rendezvous federation.
  • Figure 19E illustrates yet another view of the example proximity induced partition tree of rings 1900. Depicted in Figure 19E is CRS entry Table 1904, which may have been populated, based on CRS state exchanged in Figures 19C and 19D.
  • Figure 21 illustrates an example flow chart of a method 2100 for sending inter-proximity communication in a tree of rings. The method 2100 will be described with respect to the nodes, rings, messages, and data in Figure 19F.
  • Method 2100 includes an act of determining that a node is to send a message to a collateral ring of the node (act 2101). For example, N[1311] can receive an indication that it is to send a message 1976 to R["2"]. An indication that a message is to be sent to collateral ring can be received from another node, be implied as a function of routing logic, an application at N[1311], a multicasting facility, a broadcasting facility, an any- casting facility, etc. ⁇ 0318] Method 2100 includes an act of the node accessing a collateral ring set entry table configured to store collateral ring set entries for the node (act 2102).
  • Each collateral ring set entry configured to indicate a collateral ring of the node and at least one corresponding entry node into the collateral ring of the node.
  • N[1311] can access CRS entry table 1904.
  • Each CRS entry in CRS entry table 1904 can indicate a collateral ring of N[1311] and at least one corresponding entry node into the collateral ring of N[1311] .
  • the entry ⁇ R["111 "], N[1111], .. > indicates that R["l 11"] is a collateral ring of N[1311] and N[I l I l] is one of the at least one entry nodes into R["l l l"].
  • Method 2100 includes an act of identifying at least one collateral ring set entry for the collateral ring from the node's collateral ring set entry table (act 2103).
  • Each of the at least one collateral ring set entries indicating at least one entry node of the collateral ring.
  • N[1311] can identify the entry ⁇ R["2"], N[1112], .. > for R["2"] from CRS entry table 1094.
  • the entry ⁇ R["2"], N[1112], ...> indicates that N[1112] (and potentially other nodes) is an entry node for R["2"].
  • method 2100 may also include an act of resolving from a plurality of entry nodes for a collateral ring to an appropriate subset of entry nodes and potentially to a single appropriate entry node. For example, a subset of appropriate entry nodes can be resolved based on closeness between originating and target proximity P, based on node weight can be selected, based on closeness to a destination ID, or can be selected randomly.
  • Method 2100 includes an act of sending the message to at least one indicated entry node (act 2104).
  • N[1311] can send message 1976 to N[1112].
  • Sending a message to at least one node can include sending a message to all entry nodes in a plurality of nodes, to each entry node in a resolved appropriate subset of entry nodes, or to a single appropriate entry node.
  • one or more other entry nodes can be tried. It is also possible for a sending node to identify new nodes as a result of a failure.
  • Figure 22 illustrates an example flow chart for a method 2200 for sending inter-proximity communication in a tree of rings. The method 2200 will be described with respect to the nodes, rings, messages, and data in Figures 19F and 19G.
  • the method 2200 includes an act of determining that an originating node intends to route a message to a destination node that is closest to a given node ID in a target proximity ring within a tree of rings (act 2201).
  • the target proximity ring can be a collateral ring of the originating node or a sub-ring of a collateral ring of the originating node.
  • N[1311] can receive an indication that it is to route a message 1998 into R["1221"] (the target proximity ring) towards the ID 30.
  • Method 2200 includes an act of identifying a one or more entry nodes known to be member nodes of at least one of the target proximity ring and an ancestor ring of the target proximity ring (act 2202).
  • N[1311] can identify N[41221], having node ID 56, as an entry node into R["1221"].
  • a variety of different mechanisms can be used to identify N[41221].
  • N[1311] can refer to local knowledge to attempt to identify an entry node into the proximity target ring.
  • N[1311] can refer to cache and configuration 1902 to attempt to identify an entry node into R["1221"].
  • N[1311] can also refer to a CRS entry table to identify entry nodes into ancestor rings of the proximity target ring (e.g., when an entry node into the target proximity ring is not identified). It may be that sub-ring R["321”] contributes node N[4321] as an entry node into R["21”]. Likewise, it may be that R["2221”] contributes node N[12221] as an entry node into R["221”]. When an entry node into R[1221] is not identified, N[1311] can attempt to identify an entry node into R["221”], such as, for example, N[12221].
  • N[1331] may also attempt to identify an entry node into R["21”], such as, for example, N[4321]. [0326] It may be that a node attempts to identify entry nodes in closer ancestor rings before attempting to identify entry nodes in further ancestors from the perspective of a specified target proximity, when an entry node into the target proximity is not identified. For example, when an entry node into R["1221"] is not identified, N[1311] may first attempt to identify an entry node in R["221"]. If an entry node into R["221”] is not identified, N[1311] may then attempt to identify an entry node in R["21”].
  • N[1311] can also utilize bootstrapping mechanisms, such as, for example, seed nodes.
  • N[1311] can route an entry node lookup request to a known rendezvous point, such as, for example, rendezvous point N[7651], requesting known (registered) entry nodes (seed nodes being an example).
  • a rendezvous point can return (send) a lookup response message including any known entry nodes.
  • lookup response 1997 can be returned from rendezvous point N[7651] to N[13 H].
  • Lookup response 1997 can include locations of any entry nodes registered with rendezvous point N[7651].
  • Method 2200 includes an act of sending the message to the identified entry node (act 2203).
  • N[1311] can send message 1998 to N[41221] (an entry node into R["1221"] and having Node ID 56) with an indication that the message is to be resolved to node ID 30.
  • N[41221] can access its routing table and/or neighborhood to determine the closest node ID to node ID 30 that it is aware of is N[61221] having node ID 25.
  • N [61221] can access its routing table and/or neighborhood to determine the closest node ID to node ID 30 that it is aware of is N[71221] having node ID 28.
  • N[71221] can refer to its table and/or neighborhood to determine that its node ED, node ED 28, is the closet known node ED to node ID 30 and deliver the message.
  • Previously described routing algorithms can be also be used to route message 1998 within R["221"].
  • method 2200 can be recursively applied at the identified entry node.
  • the identified entry node into the ancestor ring can in turn attempt to identify an entry node into the target proximity ring. For example, as indicated by the dotted lines, it may be that an application of method 2200 causes message 1998 to be sent to entry node N[12221] (an entry node for R["221"] that is contributed by sub-ring R["2221”]). N[12221] (from the perspective of R["2221”]) can then identify an entry node into R["1221"J. Thus, a recursive application of method 2200 at N[12221] can cause message 1998 to be sent to N[41221].
  • an identified entry node in the ancestor ring is not aware of an entry node into the target proximity ring, the identified entry node can attempt to identify an entry node into another ancestor ring that is closer to the target proximity. The entry node into the ancestor ring can then forward the message to the entry node of the closer ancestor ring of the target proximity ring.
  • an application of method 2200 causes message 1998 to be sent to entry node N[4321] (an entry node for R["21"] that is contributed by sub-ring R["321"J).
  • N[4321] (from the perspective of R["321”]) may be unable to identify an entry node in R["1221”].
  • N[4321] (from the perspective of R["321”]) may identify an entry node in R["221”]. Accordingly, a first recursive application of method 2200 at N[4321] can cause message 1998 to be sent to N[12221]. A second recursive application of method 2200 at N[ 12221] can then cause message 1998 to be sent to N[41221].
  • an entry node into an ancestor ring can forward a message to the target proximity ring or an entry node of a closer ancestor ring of the target proximity ring (which is typically in the CRS of the forwarding entry node) as appropriate.
  • the entry node into the closer ancestor ring can then forward the message to the target proximity ring or yet a closer ancestor ring of the target proximity ring (which is typically in the CRS of the forwarding "yet closer" entry node) as appropriate.
  • This process can repeat (e.g., through recursively application of method 2200) until the target proximity ring entry node is reached.
  • an example system for implementing the invention includes a general-purpose computing device in the form of computer system 620, including a processing unit 621, a system memory 622, and a system bus 623 that couples various system components including the system memory 622 to the processing unit 621.
  • Processing unit 621 can execute computer-executable instructions designed to implement features of computer system 620, including features of the present invention.
  • the system bus 623 may be any of several types of bus structures including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of bus architectures.
  • the system memory includes read only memory (“ROM”) 624 and random access memory (“RAM”) 625.
  • ROM read only memory
  • RAM random access memory
  • BIOS basic routines that help transfer information between elements within computer system 620, such as during start-up, may be stored in ROM 624.
  • the computer system 620 may also include magnetic hard disk drive 627 for reading from and writing to magnetic hard disk 639, magnetic disk drive 628 for reading from or writing to removable magnetic disk 629, and optical disk drive 630 for reading from or writing to removable optical disk 631, such as, or example, a CD-ROM or other optical media.
  • the magnetic hard disk drive 627, magnetic disk drive 628, and optical disk drive 630 are connected to the system bus 623 by hard disk drive interface 632, magnetic disk drive-interface 633, and optical drive interface 634, respectively.
  • the drives and their associated computer-readable media provide nonvolatile storage of computer-executable instructions, data structures, program modules, and other data for the computer system 620.
  • magnetic hard disk 639 removable magnetic disk 629 and removable optical disk 631
  • other types of computer readable media for storing data can be used, including magnetic cassettes, flash memory cards, digital versatile disks, Bernoulli cartridges, RAMs, ROMs, and the like.
  • Program code means comprising one or more program modules may be stored on hard disk 639, magnetic disk 629, optical disk 631, ROM 624 or RAM 625, including an operating system 635, one or more application programs 636, other program modules 637, and program data 638.
  • a user may enter commands and information into computer system 620 through keyboard 640, pointing device 642, or other input devices (not shown), such as, for example, a microphone, joy stick, game pad, scanner, or the like.
  • input devices can be connected to the processing unit 621 through input/output interface 646 coupled to system bus 623.
  • Input/output interface 646 logically represents any of a wide variety of different interfaces, such as, for example, a serial port interface, a PS/2 interface, a parallel port interface, a Universal Serial Bus (“USB”) interface, or an Institute of Electrical and Electronics Engineers (“IEEE”) 1394 interface
  • FireWire interface i.e., a FireWire interface
  • a FireWire interface may even logically represent a combination of different interfaces.
  • a monitor 647 or other display device is also connected to system bus 623 via video interface 648.
  • Speakers 669 or other audio output device is also connected to system bus 623 via audio interface 649.
  • Other peripheral output devices (not shown), such as, for example, printers, can also be connected to computer system 620.
  • Computer system 620 is connectable to networks, such as, for example, an office-wide or enterprise-wide computer network, a home network, an intranet, and/or the Internet. Computer system 620 can exchange data with external sources, such as, for example, remote computer systems, remote applications, and/or remote databases over such networks.
  • Computer system 620 includes network interface 653, through which computer system 620 receives data from external sources and/or transmits data to external sources.
  • network interface 653 facilitates the exchange of data with remote computer system 683 via link 651.
  • Network interface 653 can logically represent one or more software and/or hardware modules, such as, for example, a network interface card and corresponding Network Driver Interface Specification ("NDIS") stack.
  • Link 651 represents a portion of a network (e.g., an Ethernet segment), and remote computer system 683 represents a node of the network.
  • computer system 620 includes input/output interface 646, through which computer system 620 receives data from external sources and/or transmits data to external sources.
  • Input/output interface 646 is coupled to modem 654 (e.g., a standard modem, a cable modem, or digital subscriber line (“DSL”) modem) via link 659, through which computer system 620 receives data from and/or transmits data to external sources.
  • modem 654 e.g., a standard modem, a cable modem, or digital subscriber line (“DSL”) modem
  • link 659 e.g., a standard modem, a cable modem, or digital subscriber line (“DSL”) modem
  • input/output interface 646 and modem 654 facilitate the exchange of data with remote computer system 693 via link 652.
  • Link 652 represents a portion of a network and remote computer system 693 represents a node of the network.
  • Figure 6 represents a suitable operating environment for the present invention
  • the principles of the present invention may be employed in any system that is capable of, with suitable modification if necessary, implementing the principles of the present invention.
  • the environment illustrated in Figure 6 is illustrative only and by no means represents even a small portion of the wide variety of environments in which the principles of the present invention maybe implemented.
  • nodes, application layers, and other lower layers, as well as associated data, including routing tables and node IDs may be stored and accessed from any of the computer-readable media associated with computer system 620.
  • modules and portions of associated program data may be included in operating system 635, application programs 636, program modules 637 and/or program data 638, for storage in system memory 622.
  • a mass storage device such as, for example, magnetic hard disk 639
  • program modules depicted relative to computer system 620, or portions thereof can be stored in remote memory storage devices, such as, system memory and/or mass storage devices associated with remote computer system 683 and/or remote computer system 693. Execution of such modules may be performed in a distributed environment as previously described.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)
  • Small-Scale Networks (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The present invention extends to methods, systems, and computer program products for facilitating inter-proximity communication within a rendezvous federation. Nodes maintain collateral ring set entry tables that include collateral rings and corresponding entry nodes into the collateral rings. Nodes can exchange collateral ring set entry state to update one another on the configuration of rings within a tree of rings. Nodes can refer to collateral ring set entry tables, as well as to other nodes, to identify entry nodes into rings that are collateral rings of the node. Messages can be sent to entry nodes in collateral rings. A message can include an indication that an entry node in a target proximity ring is to resolve the message to the node in the target proximity ring which has a node ID closest to an indicated destination node.

Description

INTER-PROXIMITY COMMUNICATION WITHIN A RENDEZVOUS FEDERATION
BACKGROUND
[0001] 1. Background and Relevant Art /
[0002] Computer systems and related technology affect many aspects of society. Indeed, the computer system's ability to process information has transformed the way we live and work. Computer systems now commonly perform a host of tasks (e.g., word processing, scheduling, and database management) that prior to the advent of the computer system were performed manually. More recently, computer systems have been coupled to one another and to other electronic devices to form both wired and wireless computer networks over which the computer systems and other electronic devices can transfer electronic data. As a result, many tasks performed at a computer system (e.g., voice communication, accessing electronic mail, controlling home electronics, Web browsing, and printing documents) include the exchange of electronic messages between a number of computer systems and and/or other electronic devices via wired and/or wireless computer networks. [0003] However, to utilize a network resource to perform a computerized task, a computer system must have some way to identify and access the network resource. Accordingly, resources are typically assigned unique identifiers, for example, network addresses, that uniquely identify resources and can be used to distinguish one resource from other resources. Thus, a computer system that desires to utilize a resource can connect to the resource using the network address that corresponds to the resource. However, accessing a network resource can be difficult if a computer system has no prior knowledge of a network address for a network resource. For example, a computer system can not print a document at a network printer unless the computer system (or another networked computer system) knows the network address of the network printer. [0004] Accordingly, various mechanisms (e.g., Domain Name System ("DNS"), Active Directory ("AD"), Distributed File Systems ("DFS")) have been developed for computer systems to identify (and access) previous unknown resources. However, due to the quantity and diversity of resources (e.g., devices and services) that are accessible via different computer networks, developers are often required to develop applications that implement a variety of different resource identification and access mechanisms. Each different mechanism may have different coding requirements and may not provide a developer with all the functionality that is needed in an application.
[0005] For example, although DNS has a distributed administration architecture (i.e., centralized management is not required), DNS is not sufficiently dynamic, not self- organizing, supports a weak data and query model, and has a fixed set of roots. On the other hand, AD is sufficiently dynamic but requires centralized administration. Further, aspects of different mechanisms may not be compatible with one another. For example, a resource identified using DNS may not be compatible with DFS routing protocols. Thus, a developer may be forced to choose the most suitable mechanism and forgo the advantages of other mechanisms. [0006] Mechanisms for identifying resources can be particularly problematic in peer- to-peer networks. DNS provides a lookup service, with host names as keys and IP addresses as values, that relies on a set of special root servers to implement lookup requests. Further, DNS requires management of information (NS records) for allowing clients to navigate the name server hierarchy. Thus, a resource must be entered into DNS before the resource can be identified on a network. On larger scale networks where nodes frequently connect and disconnect form the network relying on entry of information is not always practical. Additionally, DNS is specialized to the task of find hosts or services and is not generally applicable to other types of resources.
[0007] Accordingly, other mechanisms for resource identification and access have been developed to attempt to address these shortcomings. A number of mechanisms include distributed lookup protocols that are more scalable than DNS. These mechanisms use various node arrangements and routing algorithms to route requests to corresponding resources and to store information for lookup.
[0008] At least one of these mechanisms utilizes local multi-level neighbor maps at each node in a network to route messages to a destination node. This essentially results in an architecture where each node is a "root node" of a corresponding tree of nodes (the nodes in its neighbor map). Messages are incrementally routed to a destination ID digit by digit (e.g., ***6 => **46 =>, *346 => 2346, where *s represent wildcards). The routing efficiency of these types of mechanisms is O(log N) routing hops and require nodes to maintain a routing table of O(log N) size. [0009] At least one other of these mechanisms assigns nodes a unique ED that is taken from a linear ring of numbers. Nodes maintain routing tables that contain pointers to their immediate successor node (according to ID value) and to those nodes whose ID values are the closest successor of the value ID + 2L. The routing efficiency of these types of mechanisms is also O(log N) routing hops and require nodes to maintain a routing table of O(log N) size.
[0010] At least one further mechanisms requires O(log N1 d) routing hops and requires nodes to maintain a routing table of O(D) size. Thus, the routing efficiency of all of these mechanisms depends, at least in part, on the number of nodes in the system. [0011] Further, since EDs (for at least some of the mechanisms) can be uniformly distributed around a ring, there is always some possibility that routing between nodes on the ring will result in some inefficiency. For example, routing hops can cross vast geographic distances, cross more expensive links, or pass through insecure domains, etc. Additionally, when message routing involves multiple hops, there is some chance that such events will occur multiple times. Unfortunately, these mechanisms do not take into account the proximity of nodes (physical or otherwise) with respect one another. For example, depending on node distribution on a ring, routing a message from New York to Boston could involve routing the message from New York, to London, to Atlanta, to Tokyo, and then to Boston.
[0012] Accordingly, at least one other more recent mechanism takes proximity into account by defining proximity as a single scalar proximity metric (e.g., IP routing hops or geographic distance). These mechanisms use the notion of proximity-based choice of routing table entries. Since there are many "correct" node candidates for each routing table entry, these mechanisms attempt to select a proximally close node from among the candidate nodes. For these mechanisms can provide a function that allows each node to determine the "distance" of a node with a given IP address to itself. Messages are routed between nodes in closer proximity to make progress towards a destination before routing to a node that is further away. Thus, some resources can be conserved and routing is more efficient.
[0013] Unfortunately, these existing mechanisms typically do not provide for, among other things, symmetric relationships between nodes (i.e., if a first node considers a second node to be its partner, the second node considers the first node as a partner as well), routing messages in both directions (clockwise and counterclockwise) on a ring, partitioning linked lists of nodes based on a plurality of proximity metrics, and routing messages based on a plurality of proximity metrics. These deficiencies can limit dynamic, distributed, and efficient transfer of data between nodes of a network, such as, for example, when broadcasting data to all nodes of the network. BRIEF SUMMARY
[0014] The present invention extends to methods, systems, and computer program products for facilitating inter-proximity communication within a rendezvous federation. In some embodiments, a collateral ring set entry table for a node is maintained. A node accesses a collateral ring set entry table configured to store collateral ring set entries for the node. Each collateral ring set entry is configured to indicate a collateral ring of the node and at least one corresponding entry node into the collateral ring of the node. Collateral ring set entry table information from available resources that maintain information related to the configuration of the tree of rings is discovered. The collateral ring set entry table is updated with appropriate collateral ring set entry state based on the discovered collateral ring set entry table information. The appropriate collateral ring set entry state including a collateral ring of the node and at least one corresponding entry node into the collateral ring of the node [0015] In other embodiments, inter-proximity communication is sent in a tree of rings. In one embodiment of inter-proximity communication, it is determined that a node is to send a message to a specified collateral ring of the node. The node accesses a collateral ring set entry table configured to store collateral ring set entries for the node. Each collateral ring set entry is configured to indicate a collateral ring of the node and a corresponding at least one entry node into the collateral ring of the node. At least one collateral ring set entry for the specified collateral ring is identified from the node's collateral ring set entry table. Each of the at least one collateral ring set entries indicates at least one an entry node of the specified collateral ring. The message is sent to at least one indicated entry node. [0016] In another embodiment of inter-proximity communication, it is determined that an originating node intends to route a message to a destination node that is closest to a given node ID in a target proximity ring within the tree of rings. One or more entry nodes known to be member nodes of at least one of the target proximity ring and an ancestor ring of the target proximity ring are identified. The message is sent to an identified entry node. The message indicates that the identified entry node is to resolve the message to the node which has a node ID closest to an indicated destination node in the target proximity ring.
[0017] This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter. [0018] Additional features and advantages will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by the practice of the teachings herein. Features and advantages of the invention may be realized and obtained by means of the instruments and combinations particularly pointed out in the appended claims. Features of the present invention will become more fully apparent from the following description and appended claims, or may be learned by the practice of the invention as set forth hereinafter.
BRIEF DESCRIPTION OF THE DRAWINGS
[0019] In order to describe the manner in which the above-recited and other advantages and features can be obtained, a more particular description of the subject matter briefly described above will be rendered by reference to specific embodiments which are illustrated in the appended drawings. Understanding that these drawings depict only typical embodiments and are not therefore to be considered to be limiting in scope, embodiments will be described and explained with additional specificity and detail through the use of the accompanying drawings in which:
[0020] Figure 1 illustrates an example of a federation infrastructure. [0021] Figure 2 illustrates an example of a computer architecture that facilitates routing request indirectly to partners.
[0022] Figure 3 illustrates an example binary relationship between nodes in a federation infrastructure in the form of a sorted list and corresponding ring.
[0023] Figure 4 illustrates an example ring of rings that facilitates proximal routing. [0024] Figure 5 illustrates an example proximity induced partition tree of rings that facilitates proximal routing.
[0025] Figure 5 A illustrates the example proximity induced partition tree of rings of
Figure 5 with additional detail in portions of the partition tree of rings of Figure 5.
[0026] Figure 6 illustrates a suitable operating environment for the principles of the present invention.
[0027] Figure 7 illustrates an example flow chart of a method for populating a node routing table that takes proximity criteria into account
[0028] Figure 8 illustrates an example flow chart of a method for partitioning the nodes of a federation infrastructure. [0029] Figure 9 illustrates an example flow chart of a method for populating a node routing table. [0030] Figure 10 illustrates an example flow chart of a method for numerically routing a message towards a destination node.
[0031] Figure 11 illustrates an example flow chart of a method for proximally routing a message towards a destination node. [0032] Figure 12A illustrates an example of a node establishing membership within an existing federation.
[0033] Figure 12B illustrates an example of nodes in a federation infrastructure exchanging messages.
[0034] Figure 13 illustrates an example flow chart of a method for establishing membership within a federation infrastructure.
[0035] Figure 14 illustrates an example flow chart of a method for maintaining membership within a federation infrastructure.
[0036] Figure 15 illustrates an example flow chart of a method for discovering liveness information for another node. [0037] Figure 16 illustrates an example of a message model and related processing model.
[0038] Figure 17 illustrates an example of a number of liveness interactions that can occur between a function layer and an application layer.
[0039] Figure 18 illustrates an example of messages forming part of a request- response message exchange pattern are routed across nodes on a ring.
[0040] Figure 19A illustrates an example proximity induced partition tree of rings that facilitates inter-proximity communication.
[0041] Figure 19B illustrates another view of the example proximity induced partition tree of rings from Figure 19 A. [0042] Figure 19C illustrates a partitioned view of a portion of the example proximity induced partition tree of rings from Figure 19A. [0043] Figure 19D illustrates an expanded view of an intermediate ring from the example proximity induced partition tree of rings from Figure 19 A.
[0044] Figure 19E illustrates yet another view of the example proximity induced partition tree of rings from Figure 19A. [0045] Figure 19F illustrates a further view of the example proximity induced partition tree of rings from Figure 19A.
[0046] Figure 19G illustrates an expanded view of a portion of Figure 19F.
[0047] Figure 20 illustrates an example flow chart of a method for maintaining a collateral ring set for a node in tree of rings. [0048] Figure 21 illustrates an example flow chart for a method for sending inter- proximity communication in a tree of rings.
[0049] Figure 22 illustrates an example flow chart for another method for sending inter-proximity communication in a tree of rings.
DETAILED DESCRIPTION
[0050] The present invention extends to methods, systems, and computer program products for facilitating inter-proximity communication within a rendezvous federation. In some embodiments, a collateral ring set entry table for a node is maintained. A node accesses a collateral ring set entry table configured to store collateral ring set entries for the node. Each collateral ring set entry is configured to indicate a collateral ring of the node and at least one corresponding entry node into the collateral ring of the node. Collateral ring set entry table information from available resources that maintain information related to the configuration of the tree of rings is discovered. The collateral ring set entry table is updated with appropriate collateral ring set entry state based on the discovered collateral ring set entry table information. The appropriate collateral ring set entry state including a collateral ring of the node and at least one corresponding entry node into the collateral ring of the node [0051] In other embodiments, inter-proximity communication is sent in a tree of rings. In one embodiment of inter-proximity communication, it is determined that a node is to send a message to a specified collateral ring of the node. The node accesses a collateral ring set entry table configured to store collateral ring set entries for the node. Each collateral ring set entry is configured to indicate a collateral ring of the node and a corresponding at least one entry node into the collateral ring of the node. At least one collateral ring set entry for the specified collateral ring is identified from the node's collateral ring set entry table. Each of the at least one collateral ring set entries indicates at least one an entry node of the specified collateral ring. The message is sent to at least one indicated entry node. [0052] In another embodiment of inter-proximity communication, it is determined that an originating node intends to route a message to a destination node that is closest to a given node ID in a target proximity ring within the tree of rings. One or more entry nodes known to be member nodes of at least one of the target proximity ring and an ancestor ring of the target proximity ring are identified. The message is sent to an identified entry node. The message indicates that the identified entry node is to resolve the message to the node which has a node ID closest to an indicated destination node in the target proximity ring.
[0053] Embodiments of the present invention may comprise a special purpose or general-purpose computer including computer hardware, as discussed in greater detail below. Embodiments within the scope of the present invention also include computer- readable media for carrying or having computer-executable instructions or data structures stored thereon. Such computer-readable media can be any available media that can be accessed by a general purpose or special purpose computer. By way of example, and not limitation, computer-readable media can comprise computer-readable storage media, such as, RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store desired program code means in the form of computer-executable instructions or data structures and which can be accessed by a general purpose or special purpose computer. [0054] Ih this description and in the following claims, a "network" is defined as one or more data links that enable the transport of electronic data between computer systems and/or modules. When information is transferred or provided over a network or another communications connection (either hardwired, wireless, or a combination of hardwired or wireless) to a computer, the computer properly views the connection as a computer- readable medium. Thus, by way of example, and not limitation, computer-readable media can comprise a network or data links which can be used to carry or store desired program code means in the form of computer-executable instructions or data structures and which can be accessed by a general purpose or special purpose computer. [0055] Computer-executable instructions comprise, for example, instructions and data which cause a general purpose computer, special purpose computer, or special purpose processing device to perform a certain function or group of functions. The computer executable instructions may be, for example, binaries, intermediate format instructions such as assembly language, or even source code. Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the described features or acts described above. Rather, the described features and acts are disclosed as example forms of implementing the claims. [0056] In some embodiments, hardware modules, such as, for example, special purpose integrated circuits or Gate-arrays are optimized to implement the principles of the present invention.
[0057] In this description and in the following claims, a "node" is defined as one or more software modules, one or more hardware modules, or combinations thereof, that work together to perform operations on electronic data. For example, the definition of a node includes the hardware components of a personal computer, as well as software modules, such as the operating system of the personal computer. The physical layout of the modules is not important. A node can include one or more computers coupled via a network. Likewise, a node can include a single physical device (such as a mobile phone or Personal Digital Assistant "PDA") where internal modules (such as a memory and processor) work together to perform operations on electronic data. Further, a node can include special purpose hardware, such as, for example, a router that includes special purpose integrated circuits. [0058] Those skilled in the art will appreciate that the invention may be practiced in network computing environments with many types of node configurations, including, personal computers, laptop computers, hand-held devices, multi-processor systems, microprocessor-based or programmable consumer electronics, network PCs, minicomputers, mainframe computers, mobile telephones, PDAs, pagers, routers, gateways, brokers, proxies, firewalls, redirectors, network address translators, and the like. The invention may also be practiced in distributed system environments where local and remote nodes, which are linked (either by hardwired data links, wireless data links, or by a combination of hardwired and wireless data links) through a network, both perform tasks. In a distributed system environment, program modules may be located in both local and remote memory storage devices. [0059J Federation Architecture [0060] Figure 1 illustrates an example of a federation infrastructure 100. The federation infrastructure 100 includes nodes 101, 102, 103, that can form different types of federating partnerships. For example, nodes 101, 102, 103 can be federated among one another as peers without a root node. Each of nodes 101, 102, and 103 has a corresponding ID 171, 182, and 193 respectively. [0061] Generally, the nodes 101, 102, 103, can utilize federation protocols to form partnerships and exchange information (e.g., state information related to interactions with other nodes). The formation of partnerships and exchange of information facilitates more efficient and reliable access to resources. Other intermediary nodes (not shown) can exist between nodes 101, 102, and 103 (e.g., nodes having IDs between 171 and 193). Thus, a message routed, for example, between node 101 and node 103, can be pass through one or more of the other intermediary nodes.
[0062] Nodes in federation infrastructure 100 (including other intermediary nodes) can include corresponding rendezvous protocol stacks. For example, nodes 101, 102, and 103 include corresponding rendezvous protocol stacks 141, 142, and 143 respectively. Each of the protocols stacks 141, 142, and 143 includes an application layer (e.g., application layers 121, 122, and 123) and other lower layers (e.g., corresponding other lower layers 131, 132, and 133). Each layer in a rendezvous protocol stack is responsible for different functionality related to rendezvousing a resource request with a corresponding resource. [0063] For example, other lower layers can include a channel layer, a routing layer, and a function layer. Generally, a channel layer is responsible for reliably transporting a message (e.g., using WS-ReliableMessaging and Simple Object Access Protocol ("SOAP")) from one endpoint to another (e.g., from node 101 to node 103). The channel layer is also responsible for processing incoming and outgoing reliable messaging headers and maintaining state related to reliable messaging sessions. [0064] Generally, a routing layer is responsible for computing the next hop towards a destination. The routing layer is also responsible for processing incoming and outgoing addressing and routing message headers and maintaining routing state. Generally, a function layer is responsible for issuing and processing rendezvous protocol messages such as join and depart requests, pings, updates, and other messages, as well as generation of responses to these messages. The function layer processes request messages from the routing layer and sends back corresponding response messages, if any, to the originating node using the routing layer. The function layer also initiates request messages and utilizes the routing layer to have the requests messages delivered.
[0065] Generally, an application layer processes non-rendezvous protocol specific data delivered from the function layer (i.e., application messages). The function layer can access application data from the application layer and get and put application data in rendezvous protocol messages (e.g., pings and updates). That is, the function layer can cause application data to be piggybacked on rendezvous protocol messages and can cause the application data to be passed back to the application layer in receiving rendezvous protocol nodes. In some embodiments, application data is used to identify resources and resource interests. Thus, an application layer can include application specific logic and state that processes data received from and sent to the other lower layers for purposes of identifying resources and resource interests. {0066] Federating Mechanisms
[0067] Nodes can federate using a variety of different mechanisms. A first federating mechanism includes peer nodes forwarding information to all other peer nodes. When a node is to join a federation infrastructure, the node utilizes a broadcast/multicast discovery protocol, such as, for example, WS-Discovery to announce its presence and issues a broadcast/multicast find to detect other nodes. The node then establishes a simple forwarding partnership with other nodes already present on the network and accepts new partnerships with newly joining nodes. Thereafter, the node simply forwards all application specific messages to all of its partner nodes.
[0068] A second federating mechanism includes peer nodes that most efficiently transmit application specific messages to their destination(s). When a new node is to join a federation infrastructure, the new node utilizes a broadcast/multicast discovery protocol, such as, for example, WS-Discovery to announce its presence and issues a broadcast/multicast find to detect other nodes that are part of the federation infrastructure. Upon detecting another node, the new node establishes a partnership with the other node. From the established partnership, the new node learns about the presence of other nodes already participating in federation infrastructure. It then establishes partnerships with these newly-learned nodes and accepts any new incoming partnership requests.
[0069] Both node arrivals/departures and registrations of interest in certain application specific messages are flooded through the federation infrastructure resulting in every node having global knowledge of other partner nodes and registrations of interest in application specific messages. With such global knowledge, any node can send application specific messages directly to the nodes that have expressed interest in the application specific message. [0070] A third federating mechanism includes peer nodes indirectly forwarding all application specific messages to their destination/s. In this third mechanism, nodes are assigned identifiers (ID's), such as, for example, a 128-bit or 160-bit ID. The node responsible for a maintaining registration of interest in a given application specific message can be determined to be the one whose ID is closest to the one obtained by mapping (e.g., hashing) the destination identity (e.g. URI) of the application specific message to this 128-bit or 160-bit ID-space.
[0071] In this third mechanism, node arrivals and departures are flooded over the entire fabric. On the other hand, registrations of interest in certain application specific messages are forwarded to the nodes determined to be responsible for maintaining such registration information. For scalability, load balancing, and fault-tolerance, the node receiving registration of interest in certain application specific messages can reliably flood that registration information within its neighborhood set. The neighborhood set for a specified node can be determined to be the set of nodes having IDs within a predefined range on either side of the ED of specified node.
[0072] Similar to the second mechanism, a newly-joining node utilizes a broadcast/multicast discovery protocol, such as, for example, WS-Discovery to announce its presence and issues a local broadcast/multi-cast find to detect a node that is already part of the federation infrastructure. The new node establishes a partnership with the discovered node and uses that partnership to learn about the presence of other new nodes participating in the federation infrastructure. The new node then establishes further partnerships with the newly discovered nodes and accepts any new incoming partnership requests. The new node accepts incoming registrations of interest in certain application layer specific resources from its partners for which it is responsible and may flood them over its neighborhood set. Thus, messages can generally be forwarded to their final destination via intermediary routing nodes (e.g., that a newly joining node has partnered with or that a partner node is aware of).
[0073] In response to receiving an incoming application specific message, the new node forwards the message to the partner node that may be responsible for maintaining the registration information for the destination specified in the message. Thus, when using this third mechanism, every node in the federation infrastructure has global knowledge of all other nodes but the registration information is efficiently partitioned among the nodes. Application specific messages are transmitted to their final destination via only the partner's nodes that may have the responsibility for maintaining registration information of interest in those application specific messages. Thus, indirection is accomplished by forwarding only to the partner node that has global knowledge of the registration information of interest for the message being processed. This is in contrast to the first mechanism where the indirection is accomplished by forwarding to all the partner nodes. [0074] A fourth federating mechanism includes peer nodes that route messages to other peer nodes. This fourth mechanism differs from the third mechanism at least in that both node arrivals/departures and registrations of interest in certain application specific messages are all routed instead being flooded. Routing protocols are designed to guarantee rendezvous between application specific messages and the registration messages that express interest in those application specific messages. [0075] Figure 2 illustrates an example of a computer architecture 200 that facilitates routing requests indirectly to partners. Computer architecture 200 depicts different types of computer systems and devices potentially spread across multiple local discovery scopes participating in a federation infrastructure. [0076] Workstation 233 can include a registered PnP provider instance. To inform its partners of the presence of this PnP provider instance, workstation 233 routes registration request 201 over the federation infrastructure. Registration request 201 is initially forwarded to laptop 231, which in turn forwards registration request 201 to message broker 237, which in turn forwards registration request 201 to message gateway 241. Message gateway 241 saves the registration information registration request 201 in its database and returns success message 204 to workstation 233. [0077] Subsequently, another registered provider instance, this time that of running services, comes alive within the workstation 233. This time the node is aware that message gateway 241 is responsible for registrations and forwards registration request 205 to message gateway 241 directly. Message gateway 241 saves the registration information registration request 205 in its database and returns success message 206 to workstation 233.
[0078] Subsequently, the printer 236 (e.g., a UPnP printer) is powered on and sends announcement 207. Server 234 detects announcement 207 and routes registration request 208 to message broker 237. Message broker 237 forwards registration request 208 to message gateway 241. Message gateway 241 saves the registration information registration request 208 in its database and returns success message 210 to server 234.
[0079] Subsequently, personal computer 242 issues lookup request 211 to discover all devices. Since personal computer 242 doesn't know where to forward lookup request 211, it routes lookup request 211 through workstation 243. As registration and lookup requests are routed to the same destination, the routing protocol essentially guarantees rendezvous between the two requests resulting in workstation 243 forwards find request 211 to message gateway 241. Message gateway 241 looks up the registration information maintained by it and forwards find request 211 to both the workstation 233 and server 234. Workstation 233 and server 234 send response messages 214 and 216 respectively to personal computer 242. [0080] This fourth mechanism works by routing (instead of flooding) a request to the node (message gateway 241) that has global knowledge of the registrations specified in a request. This fourth mechanism, as will be described in further detail below, essentially guarantees that routing can be accomplished in O(log N) hops, where N is the number of nodes participating in the federation infrastructure. Since this fourth mechanism efficiently partitions both node partnership and registration information, it scales to very large networks, even the Internet.
[0081] Although a number of federating mechanisms have been described, it would be apparent to one skilled in the art, after having reviewed this description, that other federation mechanisms are possible. [0082] Relationship Between Nodes In A Federation [0083] Accordingly, a federation consists of a set of nodes that cooperate among themselves to form a dynamic and scalable network in which information can be systematically and efficiently disseminated and located. Nodes are organized to participate in a federation as a sorted list using a binary relation that is reflexive, anti-symmetric, transitive, total, and defined over the domain of node identities. Both ends of the sorted list are joined, thereby forming a ring. Thus, each node in the list can view itself as being at the middle of the sorted list (as a result of using modulo arithmetic). Further, the list is doubly linked so that any node can traverse the list in either direction. [0084] Each fe'derating node can be assigned an ID (e.g., by a random number generator with duplicate detection) from a fixed set of IDs between 0 and some fixed upper bound. Thus, adding 1 to an ID of the fixed upper bound results in an ID of zero (i.e., moving from the end of the linked list back to the beginning of the linked listed . In addition, a 1:1 mapping function from the value domain of the node identities to the nodes themselves is defined. [0085] Figure 3 depicts an example linked list 304 and corresponding ring 306. Given such a ring, the following functions can be defined: RouteNumerically(V, Msg): Given a value V from the value domain of node identities and a message "Msg," deliver the message to node X whose identity can be mapped to V using the mapping function. Neighborhood(X, S): Neighborhood is the set of nodes on the either side of node X with cardinality equal to S.
[0086] When every node in the federation has global knowledge of the ring, RouteNumerically(V, Msg) is implemented by directly sending Msg to the node X, whose identity is obtained by applying the mapping function to V. Alternately, when nodes have limited knowledge of other nodes (e.g., only of immediately adjacent nodes), RouteNumerically(V, Msg) is implemented by forwarding the message to consecutive nodes along the ring until it reaches the destination node X. [0087] Alternately (and advantageously), nodes can store enough knowledge about the ring to perform a distributed binary search (without having to have global knowledge or implement routing between immediately adjacent nodes). The amount of ring knowledge is configurable such that maintaining the ring knowledge has a sufficiently small impact on each node but allows increased routing performance from the reduction in the number of routing hops. [0088] As previously described, IDs can be assigned using the "<" (less than) relation defined over a sufficiently large, bounded set of natural numbers, meaning its range is over a finite set of numbers between 0 and some fixed value, inclusive. Thus, every node participating in the federation is assigned a natural number that lies between 0 and some appropriately-chosen upper bound, inclusive. The range does not have to be tight and there can be gaps between numbers assigned to nodes. The number assigned to a node serves as its identity in the ring. The mapping function accounts for gaps in the number space by mapping a number falling in between two node identities to the node whose identity is numerically closest to the number. [0089] This approach has a number of advantages. By assigning each node a uniformly-distributed number, there is an increased likelihood that all segments of the ring are uniformly populated. Further, successor, predecessor, and neighborhood computations can be done efficiently using modulo arithmetic. [0090] In some embodiments, federating nodes are assigned an ID from within an ID space so large that the chances of two nodes being assigned the same DD are highly unlikely (e.g., when random number generation is used). For example, a node can be assigned an ID in the range of 0 to bn - 1, where b equals, for example, 8 or 16 and n equals, for example, 128-bit or 160-bit equivalent digits. Accordingly, a node can be assigned an ID, for example, from a range of 0 to 1640 - 1 (or approximately 1.461502E48). The range of 0 to 1640 — 1 would provide, for example, a sufficient number of IDs to assign every node on the Internet a unique ED. [0091] Thus, each node in a federation can have:
An ID which is a numerical value uniformly distributed in the range ofO to bn-l; and
A routing table consisting of (all arithmetic is done modulo bn):
Successor node (s);
Predecessor node (p);
Neighborhood nodes (pk pi, p, s, si, ..., Sj) such that
Sj.s.id > (id + u/2), j > v/2-1, and pk.p.id < (id - u/2), and k > v/2-1 ; and
Routing nodes (r.(n-i), . ..., r_i, ru -, rn-i) such that r±i = RouteNumerically(id ± b1, Msg). where b is the number base, n is the field size in number of digits, u is the neighborhood range, v is the neighborhood size, and the arithmetic is performed modulo b". For good routing efficiency and fault tolerance, values for u and v can be u=b and v>max(log2(N), 4), where N is the total number of nodes physically participating in the federation. N can be estimated from the number of nodes present on a ring segment whose length is greater than or equal to b, for example, when there is a uniform distribution of IDs. Typical values for b and n are b=8 or 16 and n= 128-bit or 160-bit equivalent digits. [0092] Accordingly, routing nodes can form a logarithmic index spanning a ring. Depending on the locations of nodes on a ring, a precise logarithmic index is possible, for example, when there is an existing node at each number in the set of id ± b1 where i = (1, 2, . . . (n-1)). However, it may be that there are not existing nodes at each number in the set. ESf those cases, a node closest to id ± b1 can be selected as a routing node. The resulting logarithmic index is not precise and may even lack unique routing nodes for some numbers in the set. [0093] Referring again to Figure 3, Figure 3 illustrates an example of a binary relation between nodes in a federation infrastructure in the form of sorted list 304 and corresponding ring 306. The ID space of sorted list 304 is in the range 0 to 28 - 1 (or 255). That is, b=2 and n=8. Thus, nodes depicted in Figure 3 are assigned IDs in a range from 0 to 255. Sorted list 304 utilizes a binary relation that is reflexive, anti-symmetric, transitive, total, and defined over the domain of node identities. Both ends of sorted list 304 are joined, thereby forming ring 306. This makes it possible for each node in Figure 3 to view itself as being at the middle of sorted list 304. The sorted list 304 is doubly linked so that any node can traverse the sorted list 304 in either direction. Arithmetic for traversing sorted list 304 (or ring 306) is performed modulo 28. Thus, 255 (or the end of sorted list 304) + 1 = 0 (or the beginning of sorted list 304).
[0094] The routing table indicates that the successor to ID 64 is ID 76 (the ID immediately clockwise from ID 64). The successor can change, for example, when a new node (e.g., with an ID of 71) joins or an existing node (e.g., ID 76) leaves the federation infrastructure. Likewise, the routing table indicates that the predecessor to ID 64 is ID 50 (the ID immediately counters clockwise from ED 64). The predecessor can change, for example, when a new node (e.g., with an ID of 59) joins or an existing node (e.g., ID 50) leaves the federation infrastructure.
[0095] The routing table further indicates that a set of neighborhood nodes to ID 64 have IDs 83, 76, 50 and 46. A set of neighbor nodes can be a specified number of nodes (i.e., neighborhood size v) that are within a specified range (i.e., neighbor range u) of ID 64. A variety of different neighborhood sizes and neighbor ranges, such as, for example, V=4 and U = 10, can potentially be used to identify the set of neighborhood nodes. A neighborhood set can change, for example, when nodes join or leave the federation infrastructure or when the specified number of nodes or specified range is changed. [0096] The routing table further indicates that ED 64 can route to nodes having EDs 200, 2, 30, 46, 50, 64, 64, 64, 64, 76, 83, 98, 135, and 200. This list is generated by identifying the node closest to each number in the set of id ± 21 where i = (1, 2, 3, 4, 5, 6, 7). That is, b=2 and n=8. For example, the node having ED 76 can be identified from calculating the closest node to 64 + 23, or 72. [0097] A node can route messages (e.g., requests for access to resources) directly to a predecessor node, a successor node, any node in a set of neighborhood nodes, or any routing node. In some embodiments, nodes implement a numeric routing function to route messages. Thus, RouteNumerically(V, Msg) can be implemented at node X to deliver Msg to the node Y in the federation whose ED is numerically closest to V, and return node Y's ED to node X. For example, the node having ED 64 can implement RouteNumerically(243, Msg) to cause a message to be routed to the node having ED 250. However, since ED 250 is not a routing node for ED 64, ED 64 can route the message to ED 2 (the closest routing node to 243). The node having ED 2 can in turn implement RouteNumerically(243, Msg) to cause the message to be routed (directly or through further intermediary nodes) to the node having ED 250. Thus, it may be that a RouteNumerically function is recursively invoked with each invocation routing a message closer to the destination.
[0098] Advantageously, other embodiments of the present invention facilitate partitioning a ring into a ring of rings or tree of rings based on a plurality of proximity criteria of one or more proximity categories (e.g., geographical boundaries, routing characteristics (e.g., IP routing hops), administrative domains, organizational boundaries, etc.). It should be understood a ring can be partitioned more than once using the same type of proximity criteria. For example, a ring can be partition based on a continent proximity criteria and a country proximity criteria (both of a geographical boundaries proximity category).
[0099] Since IDs can be uniformly distributed across an ID space (a result of random number generation) there is a high probability that any given segment of a circular ID space contains nodes that belong to different proximity classes provided those classes have approximately the same cardinality. The probability increases further when there are a sufficient number of nodes to obtain meaningful statistical behavior.
[00100] Thus, neighborhood nodes of any given node are typically well dispersed from the proximality point of view. Since published application state can be replicated among neighborhood nodes, the published information can be well dispersed as well from the proximality point of view. [00101] Figure 4 illustrates a ring of rings 400 that facilitates proximal routing. Ring 401 can be viewed as a master or root ring, and contains all the nodes in each of the rings 402, 403, and 404. Each of the rings 402, 403, and 404 contain a subset of nodes from ring 401 that are partitioned based on a specified proximity criterion. For example, ring 401 may be partitioned based on geographic location, where ring 402 contains nodes in North America, ring 403 contains nodes in Europe, and ring 404 contains nodes in Asia. [00102] In a numerical space containing 65,536 (216) IDs, routing a message from a North American node having an ID 5,345 to an Asian node having an ID 23,345 can include routing the message within ring 402 until a neighbor node of the Asian node is identified. The neighbor node can then route the message to the Asian node. Thus, a single hop (as opposed to multiple hops) is made between a North American node and an Asian node. Accordingly, routing is performed in a resource efficient manner. [00103] Figure 5 illustrates an example proximity induced partition tree of rings 500 that facilitates proximal routing. As depicted, partition tree of rings 500 includes a number of rings. Each of the rings represents a partition of a sorted linked list. Each ring including a plurality a nodes having IDs in the sorted linked list. However for clarity due to the number of potential nodes, the nodes are not expressly depicted on the rings (e.g., the ID space of partition tree 500 may be b= 16 and n= 40).
[00104] Within partition tree 500, root ring 501 is partitioned into a plurality of sub- rings, including sub-rings 511, 512, 513, and 514, based on criterion 571 (a first administrative domain boundary criterion). For example, each component of a DNS name can be considered a proximity criterion with the partial order among them induced per their order of appearance in the DNS name read right to left. Accordingly, sub-ring 511 can be further partitioned into a plurality of sub-rings, including sub-rings 521, 522, and 523, based on criterion 581 (a second administrative domain boundary criterion). [00105] Sub-ring 522 can be further partitioned into a plurality of sub-rings, including sub-rings 531, 532, and 533, based on criterion 572 (a geographic boundary criterion). Location based'proximity criterion can be partially ordered along the lines of continents, countries, postal zip codes, and so on. Postal zip codes are themselves hierarchically organized meaning that they can be seen as further inducing a partially ordered sub-list of proximity criteria. [00106] Sub-ring 531 can be further partitioned into a plurality of sub-rings, including sub-rings 541, 542, 543, and 544, based on criterion 573 (a first organizational boundary criterion). A partially ordered list of proximity criterion can be induced along the lines of how a given company is organizationally structured such as divisions, departments, and product groups. Accordingly, sub-ring 543 can be further partitioned into a plurality of sub-rings, including sub-rings 551 and 552, based on criterion 583 (a second organizational boundary criterion).
[0107] Within partition tree 500, each node has a single ID and participates in rings along a corresponding partition path starting from the root to a leaf. For example, each node participating in sub-ring 552 would also participate in sub-rings 543, 531, 522, 511 and in root 501. Routing to a destination node (ID) can be accomplished by implementing a RouteProximally function, as follows:
RouteProximally(V, Msg, P): Given a value V from the domain of node identities and a message "Msg," deliver the message to the node Y whose identity can be mapped to V among the nodes considered equivalent by the proximity criteria P.
[0108] Thus, routing can be accomplished by progressively moving closer to the destination node within a given ring until no further progress can be made by routing within that ring as determined from the condition that the destination node lies between the current node and its successor or predecessor node. At this point, the current node starts routing via its partner nodes in the next larger ring in which it participates. This process of progressively moving towards the destination node by climbing along the partitioning path towards the root ring terminates when the closest node to the destination node is reached within the requested proximal context, as originally specified in the RouteProximally invocation.
[0109] Routing hops can remain in the proximal neighborhood of the node that originated the request until no further progress can be made within that neighborhood because the destination node exists outside it. At this point, the proximity criterion is relaxed to increase the size of the proximal neighborhood to make further progress. This process is repeated until the proximal neighborhood is sufficiently expanded to include the destination node (ID). The routing hop made after each successive relaxation of proximal neighborhood criterion can be a potentially larger jump in proximal space while making a correspondingly smaller jump in the numerical space compared to the previous hop. Thus, only the absolutely required number of such (inter-ring) hops is made before the destination is reached. [0110] It may be the case that some hops are avoided for lookup messages since published application data gets replicated down the partition tree when it is replicated among the neighborhood nodes of the destination node.
[0111 J To accomplish proximal routing, each federation node maintains references to its successor and predecessor nodes in all the rings it participates as a member (similar to successor and predecessor for a single ring) — the proximal predecessor, proximal successor, and proximal neighborhood. In order to make the routing efficient, the nodes can also maintain reference to other nodes closest to an exponentially increasing distance on its either half of the ring as routing partners (similar to routing nodes for a single ring). In some embodiments, routing partner nodes that lie between a pair of consecutive successor or predecessor nodes participate in the same lowest ring shared by the current node and the node numerically closest to it among the successor or predecessor node pairs respectively. Thus, routing hops towards a destination node transition into using a relaxed proximity criterion (i.e., transitioning to a higher ring) only when absolutely needed to make further progress. Accordingly, messages can be efficiently rendezvoused with a corresponding federation node. [0112] In some embodiments, nodes implement a proximal routing function to route messages based on equivalence criteria relations. Thus, given a number V and a message "Msg", a node can implement RouteProximally(V, Msg, P) to deliver the message to the node Y whose identify can be mapped to V among the nodes considered equivalent by proximity criterion P. The proximity criterion P identifies the lowest ring in the partition tree that is the common ancestor to all the nodes considered proximally equivalent by it. It can be represented as a string obtained by concatenating the proximity criterion found along the path from the root ring to the ring identified by it separated by the path separator character 7'. For example, the proximity criterion identifying sub-ring 542 can be represented as "Proximity:/.COM/Corp2/LocationA/Div2". Each ring in the partition tree 500 can be assigned a unique number, for example, by hashing its representational string with a SHA based algorithm. If the number 0 is reserved for the root ring, it can be inferred that RouteNumericaUy(V, Msg) ≡ RouteProximaliy(V, Msg, 0). [0113] For example, a node in sub-ring 544 can implement RouteProximally to identify a closer node in sub-ring 531 (e.g., to a node in sub-ring 513). In turn, sub-ring 531 can implement RouteProximally to identify a closer node in sub-ring 522. Likewise, sub-ring 522 can implement RouteProximally to identify a closer node in sub-ring 511. Similarly, sub-ring 511 can implement RouteProximally to identify a closer node in ring 501. Thus, it may be that a RouteProximally function is recursively invoked with each invocation routing a message closer to the destination. [0114] Thus, when proximity criterion is taken into account, routing hops on a path to a final destination can remain within the proximity of a node that originates a request, while making significant progress between the originating node and the destination node in a numerical space, until either the destination node is reached or no further progress can be made under the chosen proximity criterion at which point it is relaxed just enough to make further progress towards the destination. For example, proximity criterion can be relaxed enough for a message to be routed from ring 531 up to ring 522, etc. [0115] Utilizing the above approach to proximity, it is possible to confine published information to a given ring. For example, organizations may like to ensure that organization specific information is not available to entities outside of their trust domains either (1) implicitly in the form of neighborhood replication to nodes outside of their domains or (2) explicitly in the form of servicing lookup requests for such information. The first aspect is satisfied by replicating published information only among the nodes neighboring the target ID within the specified ring. Because all messages originated by a node are routed by successively climbing the rings to which it belongs towards the root ring, there is a high likelihood that all lookup requests originated within an organization will be able to locate the published information confined to it thereby implicitly satisfying the second aspect.
(0116] Also, organizations dislike nodes automatically federating with nodes outside of their trust domain. This can happen, for example, when a visiting sales person connects his/her laptop computer to the network in the customer premises. Ideally, the laptop computer belonging to the sales person wishes to locate information published in its home domain and/or federate with the nodes in its home domain starting at its lowest preferred proximity ring. It will typically not be permitted to federate with the nodes in the customer's domain. Supporting this scenario requires ability to locate seed nodes in the home domain. Such seed nodes can be used for locating information published in the home domain, to join the home federation, and selectively import and export published information across domains. Seed nodes are also sometimes referred as message gateways. [0117] In other embodiments, an entity publishes references to seed nodes in the root ring. Seed nodes can be published at the unique number (such as the one obtained by hashing its representational string) associated with the ring (as a target ID). Seed node information can further be on-demand cached by the nodes in various rings that are on the path to the corresponding target IDs in the root ring. Such on-demand caching provides for improved performance and reduction in hotspots that might occur when semi-static information is looked up quite frequently. Seed node information can also be obtained via other means such as DNS
[0118] To provide fault tolerance for confined published information, each node can maintain a set of neighborhood nodes in all of the rings it participates in. Given the above, the state maintained by a node can be summarized as follows:
• An ID which is a numerical value uniformly distributed in the range of 0 to bn- 1.
• A routing table consisting of (all arithmetic is done modulo bn): o For each ring, say ring d, in which the node participates ■ Successor node (Sd)
Predecessor node (pa)
Neighborhood nodes (pκd5 ..., Pϊd, Pd, Sd, Sia, ...» Sjd) such that Sjd-Sd.id > (id + u/2), j > v/2-1, pkd-pd-id < (id - u/2), and k > v/2-1. o Routing nodes (^n-1), ..., r.i, T1, ..., rn-0 such that r±i = RouteProximally(id ± b\ updateMsg, d) such that Sd ≤ id + b1 < Sd+i or
Pd+ 1 ≤ id - b1 < pa as appropriate. where b is the number base, n is the field size in number of digits, u is the neighborhood range, and v is the neighborhood size. [0119] Note that a subset of the neighborhood nodes maintained by a given node in ring "d" can appear again as neighborhood nodes in the child ring "d+1" in which the given node participates as well. As such one can derive the upper bound on the total number of neighborhood nodes maintained by a given node across all the D rings it participates as D*max(u,v)/2. This considers that only one reference to a given node is kept and the worst case upper bound is for a balanced tree.
[0120] It should be noted that when a ring is partitioned into a plurality of corresponding sibling sub-rings, it is permitted for a specified node to simultaneously participate in more than one of the plurality of corresponding sibling sub-rings, for example, through aliasing. Aliasing can be implemented to associate different state, for example, from different sub-rings, with the specified node. Thus, although aliases for a given node have the same ED, each alias can have distinct state associated with them. Aliasing allows the specified node to participate in multiple rings having distinct proximity criteria that are not necessarily common ancestors of more specific proximity criteria. That is, the specified node can participate in multiple branches of the proximity tree. 10121] For example, a dual NIC (wired and wireless) laptop can be considered to be proximally equivalent to both other wireless and wired nodes sharing the same LAN segments as the laptop. But, these two distinct proximity criteria can be modeled as sub- criteria that are applicable only after application of a different higher priority proximity criterion, such as, for example, one based on organizational membership. As the laptop belongs to the same organization, the aliased nodes in the two sub-rings representing 1) membership in the wired and 2) membership in the wireless LAN segments merge into a single node in the ring representing the organization to which the laptop belongs. It should be understand that the RouteProximally works as expected without any modifications in the presence of aliasing. [0122] Each proximal ring can be configured in accordance with (potentially different) ring parameters. Ring parameters can be used to define a neighborhood (e.g., ring parameters can represent a neighborhood range, a neighborhood size, ping message and depart message timing and distribution patterns for ping and depart messages), indicate a particular federating mechanisms (e.g., from among the above-described first through fourth federating mechanisms previously described or from among other federating mechanisms), or define communication specifics between routing partners in the same proximal ring. Some ring parameters may be more general, applying to a plurality of different federating mechanisms, while other ring parameters are more specific and apply to specific type of federating mechanism. [0123] Ring parameters used to configure a higher level proximal ring can be inherited in some embodiments by lower level proximal rings. For example, it may be that ring 543 inherits some of the ring parameters of ring 531 (which in turn inherited from ring 522, etc.)- Thus, a neighborhood size and neighborhood range associated with ring 531 is also associated with ring 541.
[0124] However, inherited ring parameters can be altered and/or proximal rings can be individually configured in accordance with different ring parameters. For example, it may be that ring 511 is for an administrative domain that contains a large number of nodes and thus the above-described fourth federating mechanism is more appropriate for ring 511. On the other hand, it may be that ring 521 is for a small business with a relatively smaller number of nodes and thus the above-described second federating mechanism is more appropriate for ring 521. Thus, the ring parameters associated with ring 521 can be set to (or inherited parameters changed to) different values than the ring parameters associated with ring 511. For example, a ring parameter indicating a particular type of federating mechanisms can be different between rings 511 and 521. Similarly parameters defining a neighborhood can be different between rings 511 and 521. Further, ring 521 can be configured in accordance with specific parameters that are specific to the above-described second federating mechanism, while ring 511 is configured in accordance additional with specific parameters that are specific to the above-described fourth federating mechanism. [0125] Accordingly, proximal rings can be flexibly configured based on the characteristics (e.g., number, included resources, etc.) of nodes in the proximal rings. For example, an administrator can select ring parameters for proximal rings using a configuration procedure (e.g., through a user-interface). A configuration procedure can facilitate the configuration of inheritance relationships between proximal rings as well as the configuration of individual proximal rings, such as, for example, to override otherwise inherited ring parameters. [0126] Figure 8 illustrates an example flow chart of a method 800 for partitioning the nodes of a federation infrastructure. The method 800 will be described with respect to the rings of partition a tree 500 in Figure 5. Method 800 includes an act of accessing a sorted linked list containing node IDs that have been assigned to nodes in a federation infrastructure (act 801). For example, the sorted linked list represented by ring 501 can be accessed. The node IDs of the sorted linked list (the nodes depicted on ring 501) can represent nodes in a federation infrastructure (e.g., federation infrastrucrelOO).
[0127] Method 800 includes an act of accessing proximity categories that represent a plurality of different proximity criteria for partitioning the sorted linked list (act 802). For example, proximity criterion representing domain boundaries 561, geographical boundaries 562, and organizational boundaries 563 can be accessed. However, other proximity criteria, such as, trust domain boundaries, can also be represented in accessed proximity criterion. Proximity categories can include previously created partially ordered lists of proximity criteria. A ring can be partitioned based on partially ordered lists of proximity criteria. [0128] Method 800 includes an act of partitioning the sorted link list into one or more first sub lists based on a first proximity criterion, each of the one or more first sub lists containing at least a subset of the node IDs from the sorted linked list (act 803). For example, ring 501 can be partitioned into sub-rings 511, 512, 513, and 514 based on criterion 571. Each of sub-rings 511, 512, 513, and 514 can contain a different sub-set of
Figure imgf000034_0001
[0129] Method 800 includes an act of partitioning a first sub list, selected from among the one or more first sub lists, into one or more second sub lists based on a second proximity criterion, each of the one or more second sub lists containing at least a subset of node IDs contained in the first sub list (act 804). For example, sub-ring 511 can be partitioned into sub-rings 521, 522, and 523 based on criterion 581. Each of he sub-rings 521, 522, and 523 can contain a different sub-set of node IDs from sub-ring 511. [0130] Figure 9 illustrates an example flow chart of a method 900 for populating a node's routing table. The method 900 will be described with respect to the sorted linked list 304 and ring 306 in Figure 3. Method 900 includes an act of inserting a predecessor node into a routing table, the predecessor node preceding a current node relative to the current node in a first direction of a sorted linked list (act 901). For example, the node having ID 50 can be inserted into the routing table as a predecessor for the node having ID 64 (the current node). Moving in a clockwise direction 321 (from end A of sorted linked list 304 towards end B of sorted linked list 304), the node having ID 50 precedes the node having ID 64. Inserting a predecessor node can establish a symmetric partnership between the current node and the predecessor node such that current node is a partner of predecessor node and the predecessor node is a partner of the current node [0131] Method 900 includes an act of inserting a successor node into the routing table, the successor node succeeding the current node relative to the current node in the first direction in the sorted linked list (act 902). For example, the node having ID 76 can be inserted into the routing table as a successor for the node having ID 64 (the current node). Moving in a counter-clockwise direction 322, the node having ID 76 succeeds the node having ID 64. Inserting a successor node can establish a symmetric partnership between the current node and the successor node such that current node is a partner of the successor node and the successor node is a partner of the current node. [0132] Method 900 includes an act of inserting appropriate neighborhood nodes into the routing table, the neighborhood nodes identified from the sorted linked list in both the first direction and in a second opposite direction based on a neighborhood range and neighborhood size (act 903). For example, the nodes having IDs 83, 76, 50, and 46 can be inserted into the routing table as neighborhood nodes for the node having H) 64 (the current node). Based on a neighborhood range of 20 and a neighborhood size 4, the nodes having IDs 83 and 76 can be identified in clockwise direction 321 and the nodes having IDs 50 and 46 can be identified in counter-clockwise direction 322 (moving from end B of sorted linked list 304 towards end A of sorted linked list 304). It may be that in some environments no appropriate neighborhood nodes are identified. Inserting a neighborhood node can establish a symmetric partnership between the current node and the neighborhood node such that current node is a partner of the neighborhood node and the neighborhood node is a partner of the current node.
[0133] Method 900 includes an act of inserting appropriate routing nodes into the routing table, the routing nodes identified from the sorted linked list in both the first and second directions based on the a number base and field size of the DD space for the federation infrastructure, the routing nodes representing a logarithmic index of the sorted link list in both the first and second directions (act 904). For example, the nodes having IDs 200, 2, 30, 46, 50, 64, 64, 64, 64, 64, 76, 83, 98, 135 and 200 can be inserted into the routing table as routing nodes for the node having ID 64. Based on the number base 2 and field size of 8 the nodes having IDs 64, 64, 76, 83, 98, 135 and 200 can be identified in direction 321 and the nodes having IDs 64, 64, 50, 46, 30, 2, and 200 can be identified in direction 322. As depicted inside ring 306, the routing nodes represent a logarithmic index of the sorted link list 304 in both clockwise direction 321 and counter-clockwise direction 322. Inserting a routing node can establish a symmetric partnership between the current node and the routing node such that current node is a partner of the routing node and the routing node is a partner of the current node.
[0134] Figure 7 illustrates an example flow chart of a method 700 for populating a node routing table that takes proximity criteria into account. The method 700 will be described with respect to the rings in Figure 5. Method 700 includes an act of inserting a predecessor node for each hierarchically partitioned routing ring the current node participates in into a routing table (act 701). Each predecessor node precedes the current node in a first direction (e.g., clockwise) within each hierarchically partitioned routing ring the current node participates in. The hierarchically partitioned routing rings are partitioned in accordance with corresponding proximity criteria and contain at least subsets of a bi-directionally linked list (and possibly the whole bi-directionally linked list). For example, it may be that a specified node participates in root ring 501 and sub-rings 511, 522, 523, 531, and 542. Thus, a predecessor node is selected for the specified node from within each of the rings 501 and sub-rings 511, 522, 523, 531, and 542. [0135] Method 700 includes an act of inserting a successor node for each hierarchically partitioned routing ring the current node participates in into the routing table (act 702). Each successor node succeeding the current node in the first direction within each hierarchically partitioned routing ring the current node participates in. For example, a successor node is selected for the specified node from within each of the rings 501 and sub-rings 511, 522, 523, 531, and 542.
[0136] Method 700 includes an act of inserting appropriate neighborhood nodes for each hierarchically partitioned routing ring the current node participates in into the routing table (act 703). The neighborhood nodes can be identified in both the first direction (e.g., clockwise) and in a second opposite direction (e.g., counter clockwise) based on a neighborhood range and neighborhood size from the hierarchically partitioned routing rings the current node participates in. For example, neighborhood nodes can be identified for the specified node from within each of the rings 501 and sub-rings 511, 522, 523, 531, and 542.
[0137] Method 700 includes an act of inserting appropriate routing nodes for each hierarchically partitioned routing ring the current node participates in into the routing table (act 704). For example, routing nodes can be identified for the specified node from within each of the rings 501 and sub-rings 511, 522, 523, 531, and 542. [0138] In some embodiments, appropriate routing nodes are inserted for each proximity ring d except the leaf ring (or leaf rings in embodiments that utilize aliasing), in which the node Y participates. Appropriate routing nodes can be inserted based on the following expression(s): if Y.Sd-id < Y.id + b1 < Y.s<j+i .id is true, then use ring d; or if Y.pcj.id < Y.id - bl < Y.pa+i.id is true, then use ring d. [0139] If a ring has not been identified in the previous step, use the lead (e.g., ring
501) ring as ring d. Now, ring d is the proximity ring in which node Y should look for the routing partner closest to z.
[0140] Figure 10 illustrates an example flow chart of a 1000 method for routing a message towards a destination node. The method 1000 will be described with respect to the sorted linked list 304 and ring 306 in Figure 3. Method 1000 includes an act of a receiving node receiving a message along with a number indicating a destination (act
1001). For example, the node having ID 64 can receive a message indicating a destination of212.
[0141] Method 1000 includes an act of determining that the receiving node is at least one of numerically further from the destination than a corresponding predecessor node and numerically further from the destination than a corresponding successor node (act 1002).
For example, in direction 322, ID 64 is further from destination 212 than ID 50 and, in direction 321, ID 64 is further from destination 212 than ID 76. Method 1000 includes an act of determining that the destination is not within a neighborhood set of nodes corresponding to the receiving node (act 1003). For example, the node with ID 64 can determine that destination 212 is not within the neighborhood set of 83, 76, 50, and 46.
[0142] The method 1000 includes an act of identifying an intermediate node from a routing table corresponding to the receiving node, the intermediate node being numerically closer to the destination than other routing nodes in the corresponding routing table (act 1004). For example, the node having ID 64 can identify the routing node having ID 200 as being numerically closer to destination 212 that other routing nodes. The method 1000 includes an act of sending the message to the intermediate node (act 1005). For example, the node having ID 64 can send the message to the node having ID 200. [0143] Figure 11 illustrates an example flow chart of a method 1100 for routing a message towards a destination node based on proximity criteria. The method 1100 will be described with respect to the rings in Figure 4 and Figure 5. Method 1100 includes an act of a receiving node receiving a message along with a number indicating a destination and a proximity criterion (act 1101). The proximity criterion defines one or more classes of nodes. The receiving node receives the message as part of a1 current class of nodes selected form among the one or more classes of nodes based on the proximity criterion. For example, the node having ID 172 can receive a message indicating a destination of 201 and proximity criterion indicating that the destination node be part of classes represented by ring 401. The node having ID 172 can receive the message as part of ring 404. [0144] Method 1100 includes an act of determining that the receiving node is at least one of, numerically further from the destination than a corresponding predecessor node and numerically further from the destination than a corresponding successor node, among nodes in a selected class of nodes (act 1102). For example, within ring 404, the node with ID 172 is further from destination 201 than the node having ED 174 in the clockwise direction and is further from destination 201 than the node having ID 153 in the counterclockwise direction.
[0145] Method 1100 includes an act of determining that the destination is not within the receiving node's neighborhood set of nodes for any of the one or more classes of nodes defined by the proximity criterion (act 1103). For example, the node having ID 172 can determine that destination 201 is not in a corresponding neighborhood set in ring 404 or in ring 401. [0146] Method 1100 includes an act of identifying an intermediate node from the receiving node's routing table, the intermediate node being numerically closer to the destination than other routing nodes in the routing table (act 1104). For example, the node having ID 111 can identify the node having ID 194 as being numerically closer to destination 201 than other routing nodes in ring 404. The method 1100 includes an act of sending the message to the intermediate node (act 1105). For example, the node having ID 172 can send the received message to the node having ID 194. The node having ID 172 can send the received message to the node having ID 194 to honor a previously defined partially ordered list of proximity criterion [0147] Node 194 may be as close to destination 201 as is possible within ring 404. Thus, proximity can be relaxed just enough to enable further routing towards the destination to be made in ring 401 in the next leg. That is, routing is transitioned from ring 404 to ring 401 since no further progress towards the destination can be made on ring 404. Alternately, it may be that the node having ID 201 is within the neighborhood of the node having ID 194 in ring 401 resulting in no further routing. Thus, in some embodiments, relaxing proximity criteria to get to the next higher ring is enough to cause further routing.
[0148] However, in other embodiments, incremental relaxation of proximity criteria causing transition to the next higher ring continues until further routing can occur (or until the root ring is encountered). That is, a plurality of transitions to higher rings occurs before further routing progress can be made. For example, referring now to Figure 5, when no further routing progress can be made on ring 531, proximity criteria may be relaxed enough to transition to ring 511 or even to root ring 501. [0149] Node Phases [0150] A node participating in a federation infrastructure can operate in different operational phases. Valid phase values for a node can be defined to be members of an ordered set. For example, {Nodeld}. {lnstancelds}. {Phase Value [Phase-State Values: Inserting, Syncing, Routing, Operating]. [Phase.Unknown Indication: phase known at time of transmission, phase unknown at time of transmission]} defines one possible ordered set representing a phase-space of a given node within a federation infrastructure. A node instance can transition (or advance) through the node phase-states from Inserting to Syncing to Routing to Operating in order. Further, in some embodiments, a node instance can be configured such that the node instance is prevented from transitioning back to a prior node phase-state. In some embodiments, a node advances its instance ID each time the node comes up. [0151] For example, a node instance can prevented from transitioning from Routing back to Syncing (or back to Inserting), etc. Accordingly, in some embodiments, when it is known that a given node instance (e.g., identified by (Nodeld, Ihstanceld)) has advanced to a particular node phase-state (e.g., Operating), it is also known that the given node instance is not likely to (and in some embodiments will not) revert to a prior node phase- state (e.g., back to Routing, Syncing, or Inserting). Thus, there is a significant likelihood that any node instance in a node phase prior to the particular node phase-state is a new (and advanced) instance of the node.
[0152] In some embodiments, phase information and corresponding instance Ids (which advance as a node comes up) are transferred together. Thus, it is possible to determine that a lesser node phase-state for the same instance is older. Further, when a newer node instance is known (at any phase-state values) any information about older instances is considered out of date.
[0153] From time to time, nodes can reboot or lose communication with one another, such as, for example, when first starting up, through a graceful departure, or as a result of abnormal termination (crash). Thus, there is the potential for a node in any node phase- state to reboot or lose communication with other nodes. For example, a crash can cause a node in a Routing phase-state to reboot. During a reboot or lose of communication, there may be no way to determine what node phase-state a node is in. Accordingly, when a node is rebooting or communication to a node is lost, a [Phase.Unknown Indication] can be set to indicate that the phase-state for the node is currently not known. However, any previously expressed and/or detected phase-state for the node can be maintained and is not lost.
[0154] The [Phase.Unknown Indication] can be used to indicate whether a phase-state was known at the time a phase-state value was transmitted (e.g phase value with phase.unknown not set) or if a phase-state is a previously expressed phase-state and the phase-state was not known at the time the phase-state was transmitted (e.g., phase value with phase.unknown set). Thus, the phase of a node (its phase value) can be represented using both a phase-state value and a phase.unknown indication. [0155] Join Protocol [0156] From time to time, nodes can join to and depart from existing federations. The nodes can implement appropriate protocols for joining and departing federations. For example, a node can implement a Join() function to become part of an existing federation. A node implementing the JoinQ function can transition through three ordered phase-states: an inserting phase-state, a synchronizing phase-state, and a routing phase-state before reaching the final operating phase-state. In other embodiments these specific order phase- states may not exist while others may be defined. Figure 12 A illustrates an example of a node establishing membership within a federation infrastructure. Figure 12B illustrates an example of nodes in a federation infrastructure exchanging messages. [0157] Insertion Phase: A node, Y, enters this phase-state by issuing a join message, including at least its node ID and indicating a join action to the federation. A join message can be a routed message sent by a newly joining node (node Y) with its destination property set to the identity of the newly joining node. In this phase-state, a newly-joining node is inserted between its predecessor and successor nodes in the federation. The insertion phase-state can be implemented according to the following algorithm (All arithmetic is performed modulo bn):
[0158] IPl Y identifies an existing node that is already part of a lowest ring from which the joining node wishes to participate in the federation. This can either be statically configured or dynamically discovered using DHCP and/or DNS and/or WS-Discovery or a (potentially well-known) constant. Let this existing federation node be E. [0159] IP2. Y invokes E.RouteNumerically(Y, joinMsg) to determine the node X whose ID is numerically closest to Y.id in every proximity ring that the node Y participates. This can include routing a join message to multiple nodes.
[0160] IP3. Determine the numerical successor (s) and predecessor (p) nodes. (Note that the data needed to do the following insertion can be carried in the join message and its response. As such, there are no additional roundtrips needed.) Case l: X.id > Y.id Y.s = X, Y.p = X.p, X.p.s = Y, and X.p = Y
Case 2: X.id < Y.id
Y.p = X3 Ϋ.s = X.s, X.s.p = Y5 and X.s = Y
[0161] In response to the join message, node X (the node that processed the join message) can send a join response back to node Y. The join response can indicate the predecessor node (Y.p) and successor node (Y.s) for node Y. Node Y can receive the join response and process the join response to become aware of its predecessor and successor nodes. After processing the join response, Node Y can be a weak routing participant in the federation. For example, Node Y can simply forward message sent to it, either to its successor or predecessor nodes. Thus, Node Y is inserted into the federation infrastructure but routing and neighborhood tables are not populated. Before reaching this point, node Y will request other nodes sending it messages to redirect the messages sent to it through a different node by returning a status message to the sending node indicating that node Y's liveness phase is in an inserting phase-state.
[0162] Generally, from time to time, nodes can exchange sync request and response messages. Sync request and sync response messages can include liveness information (e.g., headers) for other nodes from the sender's point of view. Neighborhood state can also be included in sync request and response messages such that application layers in a neighborhood are aware of one another's state. One example of when sync request and response messages are exchanged is during a synchronizing phase-state of a joining node. However, sync request and response messages can be exchanged during other operational phase-states as well (e.g. while in the Operating Phase-state).
[0163] Figure 16 depicts an example of a message model and related processing model 1600. As depicted in Figure 16, a node can send and receive sync requests messages. For example, sync request message 1601 can be received at function layer 1651 from a newly inserted node (e.g., the node in Figure 12B having ID 144). Application data 1602 (e.g., namespace subscriptions) can be piggybacked in sync request message 1601. Function layer 1651 can inform application layer 1652 of any application data included in sync requests messages. For example, function layer 1651 can invoke neighborhood state sync event 1603, including application data 1602, to application layer 1652. Sync request 1631, including application data 1607, can also be sent to another node that processes sync request 1631 similar to the processing to sync request 1601 in processing model 1600.
[0164] In response to some function layer event (e.g., sync request message 1601, sync response message 1641, or ping message 1612) function layer 1651 can invoke the neighborhood state request function 1604 in application layer 1652. Neighborhood state request 1604 is a request to the application layer to obtain the state that needs to be propagated in the neighborhood. In response to neighborhood state request 1604, application layer 1652 can supply neighborhood state 1606, including optional application data 1607, to function layer 1651. Alternately, application layer 1652 can send neighborhood state 1606, including optional application data 1607 in reaction to some application layer event. Using internal mechanisms similar to the above, function layer 1651 can send sync response message 1608, including optional application data 1607, to propagate application layer neighborhood state.
[0165] Synchronization Phase: After processing a join response message, a node Y transitions from the insertion phase-state to synchronizing (Syncing) phase-state. In the synchronization phase-state, the newly- inserted node Y synchronizes information with nodes in the neighborhood. Generally, Node Y can send sync messages to at least its predecessor and successor nodes identified in the insertion phase-state. These nodes processing the sync messages can return sync responses that indicate corresponding neighborhood and routing partner nodes of these processing nodes. In a more specific example, the synchronizing phase-state can be implemented according to the following algorithm (All arithmetic is performed modulo bn): [0166] SPl. Compute the Neighborhood(Y) from the union of Neighborhood^, s) and Neighborhood(Y.p) nodes in each proximal ring the node Y participates. The union computation can be done as follows:
(Sj, ..., Si, s, p, pi, ..., pk) such that Sj.s.id > (Y.id + u/2), j > v/2-1, pk-p.id < (Y.id — u/2), and k ≥ v/2-1 [0167] SP2. Referring briefly to Figure 16, query Y's local application layer (e.g., application layer 1652) via a neighborhood state request (e.g., neighborhood state request) 1604 to obtain optional application specific neighborhood data (e.g., application specific data 1607). [0168] SP3. Send synchronize message to at least the proximal successor and predecessor nodes including at least liveness state information of each proximal neighborhood and routing partner node from Y's perspective. Any optional application specific neighborhood data (e.g., application data 1607) accessed via SP 2 is included in the sync request 1631.
[0169] SP3. Y receives sync response messages back from those nodes processing sync messages sent in SP2. For example, node Y can exchange synchronize messages (request/response) with one or more nodes within its computed neighborhood. After synchronize messages are exchanged with at least one and potentially all of a node Y's neighborhood nodes, the computed neighborhood nodes can exchange further messages to propagate synchronized data. A synchronization message (request or response) can be a non-routed message sent by a node to proactively synchronize its data with a target node that is, for example, in the nodes neighborhood.
[0170] SP4. As sync response message in SP3 are received (e.g., sync response message 1641) , any optional application specific neighborhood data present in these received sync response messages (e.g., application data 1622) can be offered to Y's application layer 1652 via neighborhood state sync event 1603. [0171] As part of the synchronizing phase-state, the proximal successor (e.g., Y.s) and predecessor (Y -P) nodes exchange their routing tables with the newly-inserted node (e.g., Y). Nodes that receive sync messages can respond by sending sync responses. Sync responses carry data similar to synchronize messages except from the perspective of the responding node. Both sync messages and sync responses can carry (or piggyback) application data. Thus, application data can be propagated between nodes during the synchronizing phase-state. When the synchronize phase-state is complete, the node can process messages destined for it, instead of simply forwarding them either to a successor or predecessor. However, the node may still be viewed as a weak routing participant because its routing table is not populated. [0172] Routing Phase: After the synchronizing phase-state is completed, a node transitions into the routing phase-state. In the routing phase-state, the newly-synchronized node (e.g., node Y) computes its routing nodes. The routing phase-state can be implemented according to the following algorithm (All arithmetic is performed modulo bπ):
[0173] RPl If the routing phase-state is being executed as part of the balancing procedure (explained later), ensure that the successor node (Y.s) and the predecessor node (Y.p) are alive in every proximity ring the node Y participates. If either is not alive, determine the replacement node for the failed one(s) by choosing a next best successor or predecessor node among the neighborhood nodes in the ring under consideration. [0174] RP2. For l <i < n-1 RP2a. Compute z=Y.id ± b1
RP2b. If the ring d is not the most specific proximity, find the proximity ring d in which the node Y participates and satisfying the condition Y.s<j.id < Y.id + b1 < Y.Sd+i-id or Y.pa.id < Y.id - b1 < Y.pd+i.id. Else make ring d the most specific proximity ring. Ring d is the proximity ring in which node Y should look for the routing partner closest to z. Let Q be the node numerically closest to z between Y.Sd.r±j and Y.pd-r±i- If |Q.id-z| is within a configurable percentage of b1 (typically 20%), simply make Y.r±;=Q. If Q.id is closer to z than either (Y.sa-id ± b1) or (Y.pd.id ± b1), it means node Y is a better partner routing node to node Q in proximity ring d than either Y.Sd or Y.pd. Therefore, send updateMsg to node Q, if it has not already been sent, supplying i and node Y as parameters so that node Q can establish node Y as its partner routing node at r.j.
RP2c. If this phase-state is being executed as part of the balancing procedure and if
Figure imgf000047_0001
there is only one node in the numerical range between (Y.Sd.id ± b') and (Y.pd.id ± b1). That node is the one pointed to by the routing node r±, of the successor (or predecessor) node. Therefore, simply make
Y.r±i=Y.Sd.r±i.i. RP2d. Else, compute the touting partner Y.r±i by invoking
RouteProxhnally on node Q with the proximity criterion set to that of ring d. This implies Y.r±i=Q.RouteProximally(z, updateMsg, d)..
[0175] RP3. At this point, node Y can process not only messages destined for it but can also route messages.
[0176] RP4. Subscribe to liveness notification events sent from the application layer for the endpoint IDs of the partner routing nodes, if this has not already been done. Also, revoke any liveness event subscriptions previously established with the application layer for the nodes that are no longer partner routing nodes. For example, subscription and/or revoke .requests can be passed up to an application layer (e.g., application layer 121) that implements pub-sub logic for a corresponding application (e.g., a namespace application). When subsequent application specific liveness messages (e.g. those resulting from namespace subscriptions) are received at the application layer, notifications (events) can be pushed down to other lower layers (e.g., other lower layers 131) for processing [0177] Figure 17 depicts an example of a number of liveness interactions that can occur between function layer 1751 and application layer 1752. As depicted in Figure 17, endpoints are, for example, publish/subscribe topics (e.g., represented by a URL or URI) representing various nodes and can be, for example, federation infrastructure nodes. Subscribe To Liveness Event 1701 can be invoked from function layer 1751 to application layer 1752 to subscribe to a liveness event (e.g., to a publish/subscribe topic). Revoke Liveness Subscription 1702 can be invoked from function layer 1751 to application layer 1752 to revoke a subscription to a liveness event. End Point Down 1703 can be sent from application layer 1752 to function layer 1751 to indicate that an endpoint may be down and provide function layer 1751 with an optional replacement endpoint. End Point Down event 1703 can be sent asynchronously based on a prior subscription (e.g., Subscribe To Liveness Event 17011 [0178] Node Down 1704 can be invoked from function layer 1751 to application layer 1752 to indicate that function layer 1751 (or some other lower layer) has detected a failed node and optionally provide application layer 1752 with a replacement node. Application layer 1752 can subsequently propagate that a potentially failed node was detected to other interested parties. Node down event 1704 can be sent asynchronously anytime function layer 1751 or some other lower layer detects a potentially failed node. Send liveness 1706 can be invoked from application layer 1752 to function layer 1751 when application layer 1752 detects that a node is down (e.g., from node down event 1704 or from some other out-of-band mechanism). Send liveness event 1706 can cause function layer 1751 to send a liveness message. Send liveness event 1706 can also be invoked asynchronously anytime application layer 1752 detects that a node is down and does not depend on any prior established subscriptions (via subscribe to liveness).
[0179] Thus, in some embodiments, function layer 1751 is used recursively. For example, function layer 1751 can indicate an interest in a specified node (e.g., is the particular node up or down) to application layer 1752. Application layer 1752 can formulate an application specific subscription for notifications related to the specified node and then reuse function layer 1751 to communicate the formulated subscription to appropriate corresponding application layer 1752 instances in other federation nodes. For example if the application layers 1752 with in federation nodes implemented a namespaces pub/sub behaviors, function layer 1751 can route the subscription to a publish/subscribe manager that manages notifications for the specified node — the pub/sub Manager being implemented as at least part of the application 1752 in the related federation nodes. Accordingly, function layer 1751 is used to route a subscription that function layer 1751 caused to be generated. Similar recursive mechanisms can also be used to unsubscribe or otherwise indicate that there is no longer an interest in the specified node. [0180] Operating Phase: After the routing phase-state is completed, a node transitions into the operating phase-state. The node can remain in an operating phase-state until it goes down (e.g., rebooting). In the operating phase-state, the node can send update messages to routing partners from time to time. Update messages (both update requests and update responses) can include neighborhood node liveness information for the sending nodes (e.g., for all proximal neighborhoods of interest). This sent liveness information can also include that of the sender's liveness info. Update messages can be routed messages originated by nodes to periodically update its routing partner nodes. Application data can be piggyback on update messages such that application data can be propagated during routing partner updates. The message destination is set to the identity of the perfect routing partner at the desired routing index. The Message ID property of this message is assigned an application sequence number so as to enable the node(s) processing this message to determine the latest message and this message is routed proximally. [0181] A node that receives an update message can respond with an update response. An update response carries the same data as the update message except that the data is from the perspective of the responding node. Through the exchange of update messages and update responses nodes can exchange routing information. From time to time, operational nodes can update routing partners. [0182] From time to time, operational nodes can also send ping messages (e.g., ping messages 1609 and 1611). A ping message is a one-way message sent by a node to periodically announce its presence and disseminate information within its neighborhood about its neighborhood/routing nodes and replicate (e.g., piggybacked) application data, [0183] An origin node can send a ping message to one or more of its immediate predecessor and successor neighborhood nodes. Thus, depending on the ping distribution pattern (i.e., which nodes are sent ping messages) information related to the origin node is propagated to other nodes on a ring within the neighborhood of the origin node. For example, the origin node can send a ping message only to its immediate predecessor and successor nodes and the ping message propagates outward from the position (node ID) of the origin node along the ring in both directions to the edge of the origin's neighborhood. Alternately, the origin node can send a ping message to every nth node in its neighborhood in both its predecessor and successor directions.
[0184] Each node receiving a ping message checks its interest in the origin node from a neighborhood range perspective. If not interested, it discards the ping message. If interested it processes the ping message and forwards the ping message according to its specified ping pattern if such forwarding is constrained to the neighborhood of the originating node. For example, after processing a ping message a receiving node can forward the ping message to at least its successor node if the sending and origin nodes are in its predecessor node set or at least its predecessor node if the sending and origin node are in its successor set. [0185] Thus, the outward propagation of ping messages stops when the message reaches the edge of the neighborhood node set around the origin node. The Message ID property of ping message is assigned an application sequence number so as to enable the nodes processing this message to determine the latest message from the origin node and avoid duplicate processing or otherwise unneeded forwarding. [0186] Referring back to Figure 16, ping message 1609 can be received at function layer 1651 from a neighborhood node. Application data 1612 (e.g., namespace subscriptions) can be piggybacked in ping message 1609. Function layer 1651 can inform application layer 1652 of any application data included in ping messages. Similarly, function layer 1651 can inform application layer 1652 of any application data included in Sync Request messages. Both of these cases of transference can be accomplished via sending a neighborhood state sync event 1603, including application data 1612, to application layer 1652. [0187] In response to some function layer event (e.g., received ping message 1609) function layer 1651 can send neighborhood state request 1604 to application layer 1652, Neighborhood state request 1604 is invoked on the application layer 1652 to obtain the state that needs to be optionally propagated in the neighborhood. In response to neighborhood state request 1604, application layer 1652 can return neighborhood state 1606, including optional application data 1607, to function layer 1651. Function layer 1651 can send ping message 1611, including optional application data 1607, to propagate neighborhood and routing partner node liveness information as well as optional application layer neighborhood state. Function layer 1651 can also send sync response 1608, including optional application data 1607, to propagate application state. [0188] Departure Protocol
[0189] When it is appropriate for a node to depart from a federation, the node can implement a Depart function to be gracefully removed from the federation. A node departs an existing federation by sending a departure message to one or more of its immediate proximal predecessor and successor nodes, and maybe other nodes in the same proximal neighborhood. Thus, depending on the departure distribution pattern (i.e., which nodes are sent departure messages) information related to the departing node is propagated to other nodes on a ring within the neighborhood of the departing node. A departure message is a one-way message originated by a gracefully departing node to inform one or more other nodes within at least one of its proximal neighborhoods about its impending departure. The departing node propagates the depart message (e.g., within its neighborhood) in a manner similar to the propagation of the ping messages. For example, the node having ID 30 can send depart messages 1219 to the nodes having EDs 17 and 40. The node having ID 30 can then remove itself from the federation infrastructure from the standpoint of a given proximal ring. Note that it is possible that a node remove itself from one proximal neighborhood but not others to which it may belong. [0190] Since the nodes having IDs 17 and 40 (i.e., the predecessor and successor nodes) are likely to be the closest nodes to ID 30 after the node having ID 30 is removed, the nodes having IDs 17 and 40 are made aware of the node having ID 30's departure. Thus, future messages that are to be delivered to ID 30 can be appropriately processed at the nodes having IDs 17 and 40. The nodes having IDs 17 and 40 can propagate the departure of the node having ED 30 to the other nodes on ring 1206. In the absence of the node having ED 30, the nodes have EDs 17 and 40 can also recompute predecessor and successor pointers, potentially pointing to each other. [0191] The Message ED property of a depart message is assigned the same application sequence ED as that of Ping messages so as to enable the nodes processing the depart message to determine the latest message among a series of ping and depart messages sent by an origin node. Graceful departure from a federation proximal ring is optional but encouraged. However, the federation is designed to self-heal if nodes leave abruptly. [0192] Liveness [0193] During the lifetime of a federation, nodes can exchange liveness information to maintain the federation. Liveness information can be included in virtually any message that is exchanged within a federation in the form of Liveness Message Headers. For example, join messages, join responses, sync messages, sync responses, update messages, update response, application specific messages, liveness messages, and ping messages can all include liveness information headers. When a federation node sends any message or response, the node can include Liveness information for processing by other nodes. Linveness information can be included in a liveness information header of liveness message. [0194J Liveness information indicating the liveness state of a node can be represented using the following properties: [Node]: Identifies the node whose liveness state is being represented. A node can be identified based on [Reference Properties] that further include an [Instance ID]. [Reference Properties]: Element information items specified in the WS-addressing specification. WS-addressing defines the [Instance ID] reference property for inclusion in the reference property set. [Instance BD]: A number that identifies a particular instance of a node. An incrementing boot count can be used as the instance ID of a node.
[Phase] : Conveys the phase of identified node.
[Phase- State Value] Conveys the highest phase-state (inserting, synchronizing, routing, operating) that the indicated node instance was know to have achieved
[Phase.Unknown Indication] An indicator that conveys if the current phase is known or unknown.
[Freshness]: Conveys the freshness of the information and its value ranges from 0 to MaxFreshness. The higher the value, the fresher the information with 0 implying no information and MaxFreshness is a protocol defined constant.
[Color]: Identifies the proximity equivalence class to which the node belongs. Two nodes with the same color value are always considered to be proximally closest because they both belong to the same equivalence class identified by the color value. The number of proximity equivalence classes can increase over time as more nodes join the federation.
[Weight]: Supplies the node capability metric and its value ranges from
0 to Max Weight. It measures the desirable characteristics of a federation node such as large computational power, high network bandwidth, and long uptime. The higher the value, the more capable the node is making it more desirable from a partnership perspective.
[0195] In some environments, the [Node] and [Freshness] properties of a node are either implicitly or explicitly conveyed in a larger scope such as the [Origin] and [Sender] message headers and as such inclusion of the above properties again in the liveness headers will be duplicative. For example the sender of a message need only convey its current phase, color, and weight information as its DD, Instance Id are supplied in the message addressing headers and its Freshness is implied.
[0196] Liveness state can be at least partially ordered based on a "<" binary relation defined as follows: ■ 5 [0197] "LK L2" is true if
1. "Ll. [Node]. [Name] == L2.[Node].[Name]" is true and one of the following is true with the tests performed and short-circuited in the order listed:
• Ll. [Node]. [Reference Properties]. [Instance ID] < L2. [Node]. [Reference Properties]. [Instance ID]
10 • Ll. [Phase.Unknown Indication] != true AND L2.[Phase.Unknown
Indication] != true AND Ll. [Phase-State] < L2. [Phase-State]
• Ll. [Freshness] < L2. [Freshness]
2. Or "Ll .[Color] = L2. [Color]" is true and one of the following is true with the tests performed and short-circuited in the order listed:
15 • Ll.[Phase-State] < L2.[Phase-State]
• Ll .[Weight] < L2.[Weight]
[0198] Further, a liveness "down" message can be sent to a specified node when it is detected or suspected that the specified node has become unavailable (e.g. gone down).
20 As an example, when an application layer (e.g., application layer 121) detects that another application layer (e.g., application layer 123) or a node hosting that another application layer is down, the detecting application layer can notify other lower layers (e.g., other lower layers 131) that the node may be down, for example, in accordance with message model and related processing models 1600 and/or 1700. Such a notification can cause
25 other lower layers, such as, for example, function layer 1651, to send a liveness down message. This is only one example of stimulus for the generation of liveness down messages.
[0199] Since liveness down messages are routed and thus delivered to a node closest to those nodes suspected of being down, if a liveness down message for a specified node
30 gets delivered back to the specified node, then either the specified node never went down or the specified node is a different instance (e.g., with a different instance ID). On the other hand, if the liveness down message gets delivered to another node, it indicates the specified node does appear to have gone down. Accordingly, if the node receiving the liveness down message views itself as being in the proximal neighborhood of the specified node, it may source a departure message for the specified node into that proximal neighborhood as described as well as indicating to its the application layer (e.g., using Node Down 1704) that the specified node may be down and that the receiving node is its replacement. A liveness down message for the specified node can be routed proxirnally with its target ID set to that of the node that may be down. [0200] Balancing Procedure
[0201] Embodiments of the present invention are designed to accommodate large number of nodes joining and departing the federation in a short period of time. Such changes in the network can cause routing delays if the logarithmic search trees maintained at the various nodes become unbalanced. That is, if there are more nodes on one side of a ring than the other. To facilitate optimal routing efficiency, nodes participating in a federation execute the balancing procedure when certain criteria are met. [0202] For example, when any of the following conditions are true, any node can execute the balancing procedure to ensure a balanced routing table for optimal routing efficiency: • A configured number of liveness messages described above were received.
• A configured amount of time has elapsed since the receipt of the last liveness message described above.
• The neighborhood has changed in the sense that some new nodes have arrived or some existing nodes have departed.
[0203] Balancing the routing tables is a simple process. For example, nodes with an unbalanced routing table can re-execute the Synchronization and Routing phase-states of the Join protocol. [0204] Acts RP2b, RP2d and RP4 combined with 1) finding the closest routing node to a number, 2) the departure protocol followed by the nodes leaving a federation gracefully, and 3) balancing procedure followed by the nodes receiving liveness messages result in a the faster healing system when federating nodes join and depart the network fairly quickly and in large numbers. [0205] Status Messages
[0206] A status message is non-routed message sent by a receiver node to a sender node to inform routing success/failure of a correlated message that the sender node previously forwarded to the receiver node. Figure 18 depicts an example of how messages forming part of a request-response message exchange pattern are routed across nodes on a ring. A status message can include headers that identify the original correlated message whose routing status is being reported. As such, status messages can be used between nodes to indicate that message was successfully routed form one node to the next. For example, routing request message 1811 from node 1801 to node 1806 includes sending request 1811 though nodes 1802, 1803, 1804, and 1805. Corresponding cascading success status messages (status 1817, 1818, 1819, 1820 and 1821) can be sent from node 1806 to node 1805, from node 1805 to node 1804, from node 1804 to node 1803, from mode 1803 to node 1802, and from node 1802 to node 1801 respectively. In response to request 1811, response 1816 can be sent end-to-end from node 1807 to node 1801. Response 1816 is optional and may not exist in a one-way message exchange pattern.
[0207] Figure 13 illustrates an example flow chart of a method 1300 for a node to join the federation infrastructure. The method 1300 will be described with respect to ring 1206 in Figures 12A and 12B. Method 1300 includes an act of issuing a join message to a federation infrastructure (act 1301). For example, the node having ID 144 can issue join 1201 to federation infrastructure including ring 1206. Method 1300 includes an act of receiving a join message from a joining node (act 1308). For example, an existing node in the federation infrastructure including ring 1206 can receive join 1201. [0208] Method 1300 includes an act of routing a join message to a processing node (act 1309). The processing node can be a node having an BD numerically closer the ID of the joining node than other active nodes in the federation infrastructure at the time the join message is being routed. For example, join 1201 can initially be received at the node having ID 64, routed to the node having ID 135 and routing to the node having ID 151. [0209] Method 1300 includes an act of computing one or more predecessor nodes and one or more successor nodes for the joining node (act 1310). For example, the node having ID 151 can compute an immediate predecessor node and an immediate successor node for the node having ID 144. Within ring 1206, the node having ID 151 can compute that the node having DD 135 is an immediate predecessor node that the node having ID 151 is an immediate successor node. Similar computations can be made for other proximal rings. [0210] Method 1300 includes an act of computing one or more routing nodes for the joining node (act 1311). For example, the node having ID 151 can compute routing nodes (from the node having ID 151 's perspective) for the node having ID 144. Within ring 1206, the node having ID 151 can compute, for example, that the nodes having IDs 218 and 40 are routing nodes for the node having ID 144. Similar computations can be made for other proximal rings.
[0211] Method 1300 includes an act of sending a join response to the joining node (act 1312). A join response can identify all the predecessor and successor neighborhood and routing partner nodes for the joining node as computed by the processing node given its current view of the federation infrastructure. For example, join response 1202 can identify at least the node having ID 135 as the immediate predecessor node to the node have ED 144, can identify the node having ID 151 as the immediate successor node to the node having ED 144, and can identify any routing nodes (for the node having ID 144) computed at the node having ED 151 for node ID 144 (the newly joining node).
[0212] Method 1300 includes an act of receiving a join response from a federation node that processed the join message (act 1302). For example, the node having ID 144 can receive join response 1202 from the node having ID 151.
[0213] Method 1300 includes an act of sending a sync request to at least each of the immediate proximal predecessor nodes and immediate proximal successor nodes (act 1303). For example, referring now to Figure 12B, the node having ID 144 can send sync requests 1203 to the nodes having IDs 135 and 151. Sync request 1203 can include an identification of any neighborhood nodes of the node having ID 144 and/or an identification of any routing partners of the node having ID 144.
[0214] The nodes having IDs 135 and 151 can receive the sync requests 1203. In response to receiving sync requests 1203, the nodes having IDs 135 and 151 can identify their neighborhood and routing partner nodes from corresponding routing tables. The nodes having IDs 135 and 151 can include their identified neighborhood and routing partner nodes' liveness information in sync response 1204 and send the send sync responses 1204 to the node having ID 144.
[0215] Method 1300 includes an act of receiving a sync response from each of the proximal predecessor and successor nodes (act 1304). For example, the node having ID 144 can receive sync responses 1204 from the nodes having IDs 135 and 151. Sync response 1204 can include liveness information for one or more nodes on ring 1206 or other rings in a federation infrastructure. Sync response 1204 can also identify any prospective routing partner nodes for the node having ED 144. [0216] Method 1300 includes an act of computing neighbor nodes (act 1305). For example, the node having ID 144 can compute corresponding neighborhood nodes based on the union of the neighborhood nodes for the nodes having IDs 135 and 151. Neighborhood nodes can be computed based on a summarized view of the join response message and any sync response messages.
[0217] Method 1300 includes- an act of computing routing nodes (act 1306). For example, the node having ID 144 can compute routing nodes from among the nodes of ring 1206. Routing partners can be computed base on a summarized view of the join response message and any sync response messages.
[0218] Method 1300 includes an act of exchanging at least neighborhood node information with computed routing partners (act 1307). For example, the node having ID 144 and the node having ED 218 (a computed routing partner) can exchange state information (e.g., instance ID, phase-state, etc) corresponding to their respective neighborhood nodes. These exchanges are accomplished by the newly joining node sourcing (routing) an Update message to at least each unique computed routing partner as described in the Routing Phase-state text above. The nodes processing the Update message will send corresponding Update response message in reaction to the receipt of these update messages from the newly joining node. The Update response includes at least the liveness information for itself and its neighborhood nodes.
[0219] Method 1300 can also include an act of initiating an initial propagation of routing tables to at least one neighborhood node. For example, the node having ID 144 can include computed neighborhood and routing partner nodes in a ping message and send the ping message to the node having ID 174 (e.g., one of the computed neighborhood nodes). The node having ID 174 can receive the ping message and update a corresponding routing table with the liveness information originated at the node having ID 144. The node having ID 174 can also include its corresponding routing table in a second ping message and send the second ping message at some future point to the node having ID 144. The node having ID 144 can receive the second ping message and can update its corresponding routing table with nodes in the liveness information included in second ping message (i.e., nodes in the routing table of the node having ID 174). The node having ID 144 can repeat the sending of ping messages with other neighborhood nodes in ring 1206. [0220] It should be understood that when a newly joining node joins a federation, the newly joining node may not find an existing federation member and thus becomes the sole member. Thus, there may be no predecessor, successor, or neighbor nodes assigned for the newly joining node. Accordingly, the newly joining node is mapped as the best routing partner in all cases.
[0221] Further, although the method 1300 has been described with respect to a single ring (ring 1206), it should be understood that in some embodiments a node that joins one ring inherently also joins one or more other rings. For example, referring briefly back to Figure 5, a node at joins ring 551 inherently also joins rings 543, 531, 522, 511, and 501. Thus, method 1300 can be implemented to join a plurality of rings. In other embodiments some or all of the acts in method 1300 may be repeated when joining multiple rings. For example, referring again to Figure 5, one or more of the acts of 1300 can be repeated when a node joins both ring 551 and ring 514 (e.g.. aliasing). In any event, a joining node ID can be accessed and used to identify a joining node in a sorted linked list as well as corresponding hierarchically partitioned sub-lists the joining node is to participates in. A receiving node is identified from the sorted linked list and each partitioned sub-list. The join message is routed to a processing node (e.g., based on ID) in the sorted linked list and each portioned sub-list. A join response is received from the processing node in the sorted linked list and each partitioned sub-list.
[0222] Figure 14 illustrates an example flow chart of a method 1400 for a node to maintain membership in a federation infrastructure. The method 1400 will be described with respect to ring 1206. Method 1400 includes an act of sending a first ping message to a neighborhood node (act 1401). The first ping message indicates that a current node sending the first ping message is neighbor of the neighborhood node. The first ping message can also include routing partner and neighborhood nodes' state of the current node. For example, the node having ID 144 can send a ping message to the node having ID 151. Upon receiving the first ping message, the node having ID 151 is made aware that the node having H) 144 is a neighbor of the node haying ID 151. Node 151 may also discover newer liveness information (for other nodes on ring 1206) from node 144 as a side effect of this act.
[0223] Ping messages can be periodically repeated at a specified frequency based on, for example, configuration state associated with a proximal ring into which the ping message is to be sent. The frequency can be varied depending on the configuration state. For example a specified ping frequency for a WAN can be different than the specified frequency for a LAN. Ping messages can also be sent in accordance with a ping distribution pattern. The ping distribution pattern for an originating node can indicate that ping messages are to be sent to be neighborhood nodes in both directions on a ring. For example, the node having ID 144 can send pings both in the direction of the node having ID 135 and in the direction of the node having ID 151. Ping distribution patterns and frequencies can be varied. For example, per proximity ring.
[0224] Method 1400 includes an act of receiving a second ping message from the neighborhood node (act 1402). The second ping message indicates to the current node at least that the neighborhood node originating the second ping message is a neighbor of the current node. The second ping message can also include routing partner and neighborhood nodes' state of the originating neighborhood node. For example, the node having ID 151 can send a second ping message to the node having ED 144. Upon receiving the second ping message, the node having ID 144 is made aware that the node having ID 151 is a neighbor of the node having ID 144. The second ping message can also include liveness information for other nodes on ring 1206. Thus generally, ping messages can be exchanged within a neighborhood and can be used to maintain neighborhood membership (for each proximal membership) and an approximated common neighborhood view of node presence within the federation.
[0225] A received ping message can be periodically repeated/forwarded to other nodes within the proximal neighborhood into which the ping was originated (sent by the originating node). Forwarded ping messages can also be sent in accordance with a ping distribution pattern. The ping distribution pattern for a forwarding node can indicate that ping messages are to be sent to be neighborhood nodes in a direction away from an originating node. For example, the node having ID 1151 can forward pings originating at the node having ID 144 in the direction of the node having ID 174. Ping forwarding distribution patterns can be varied, for example, per proximity ring.
[0226] Nodes can be configured to receive ping messages at corresponding intervals. When expected ping messages are not received, a node may interpret a communications failure and set the phase.unknown indication for another node to true for the node that should have originated the expected, but at least late, ping message. [0227] Method 1400 includes an act of proximally routing an update request message to a perfect routing node (act 1403). The update request message indicates to the routing node receiving such a routed update request that the current node is participating as a routing partner of the receiving routing node. The update request message can also include at least the current node's neighborhood nodes' identities (e.g. in the form of liveness information). For example, the node having ID 144 can route update message 1216 to the node having ID 208 (the perfect routing partner offset by 64 from 144). Because node 210 (a previously computed routing node) is closest to 208, it will receive and process the routed update request. Upon receiving update message 1216, the node having ID 210 is made aware (or is reinforced) that the node having ID 144 is a routing partner of the node having ED 210. [0228] Method 1400 includes an act of receiving an update response message from the processing (receiving) routing node (act 1404). The update response indicates to the current node that the processing routing node is participating as a routing partner of the current node. The update response message can also include at least the processing routing partner's neighborhood nodes' identifies. For example, the node having ID 210 can send update response 1207 to the node having ID 144. Upon receiving update response 1207, the node having ID 144 is made aware that the node having ID 210 is a routing partner of the node having ID 144 . [0229] Method 1400 can also include an act of appropriately updating node information to indicate that the current node and the neighborhood node are participating as neighbors and that the current node and the neighborhood node are participating as routing partners For example, the node having ID 144 can update, node information corresponding to the node having ID 151 to indicate that the nodes having IDs 144 and 141 are participating in a (proximal) neighborhood. Similarly, the node having ID 144 can update node information corresponding to the node having ID 210 to indicate that the nodes having IDs 144 and 210 are participating as routing partners.
[0230] In some embodiments, application state saved at a specified node X is replicated among its Neighborhood(X) nodes using reliable-flooding protocol. Each item in the application state has an assigned owner, which could be the endpoint that created the item. Each item in the application state also has an associated timestamp (a.k.a. sequence number) given by its owner. The timestamp has at least three components: o Instance ID (e.g., an unsigned-integer) of the owning entity. Must be at least monotonically (>1) increasing. o Sequence ID (e.g., a URI) identifying the particular sequence generated by an owner. This component allows the same owner to generate multiple independent sequences o Ordinal number (e.g., an unsigned-integer) identifying the offset within the identified application sequence ID. [0231] Item timestamps are used to detect latest information associated with the corresponding item during replication because item timestamps generate at least a partial- order with <Instance ID, Sequence ID, and Offset> triples. The timestamp associated with an item being replicated is compared against the local one, if any, to detect the latest one. Item timestamps are also used to support idempotent semantics of create/update/delete operations. For example, when a node receives a request to update an existing item in the application state, the update is accepted only if the timestamp associated with the update request is higher than the one associated with the local item. Conflict resolution techniques based on vector timestamps can be utilized where items cannot be assigned a single owner. Application state replication provides fault-tolerance and facilitates load- balancing requests across neighborhood nodes.
[0232] As an optional behavior, Nodes not detecting (after a period of time) an expected Update or Ping from (origin) other partner (routing and/or partner) nodes can consider the phase-state unknown, set a phase.unknown indication to true, and report it as such to other 3rd party nodes. In other words periodic generation of updates and pings can be required. This requirement and actual timeout values can be an attribute of various proximal rings. For example, a ring can have more restrictive timing requirements for some sub-rings (e.g., in a LAN segment) and node failure detection/reporting is relatively quick. On the other hand, a ring can have less restrictive timing requirements (or even no timing requirements) for other sub-rings (e.g., on the Internet) and proactive node failure detection/reporting is relative long (or doesn't exist).
[0233] Figure 15 illustrates an example flow chart of a method 1500 for discovering liveness information for another node. The method 1500 will be described with respect to ring 1206 in Figures 12A and 12B. Generally, any message, such as, for example, sync 1203, sync response, 1204, update 1216, update response 1207, etc., can include at least one liveness header. In some embodiments, a liveness header includes a <node ID, instance ID, phase [phase-state value], [phase.unknown indication], freshness value, a color (proximity) value, and a weight value> for a node. In other embodiments, a liveness header includes <a phase [phase-state value]. [phase.unknown indication], freshness value, a color (proximity) value, and a weight value>. In these other embodiments, liveness headers can be used to augment addressing headers that already include node ID and instance ID for sender and origin nodes. Since the addressing headers already include node ID and instance ID5 this information can be omitted from the liveness header. [0234] Method 1500 includes an act of receiving a liveness header representing state information for a node participating in a federation infrastructure (act 1501). The liveness header includes at a least a received participating node ID, a received node's instance ID, a received phase value, and a received freshness value. For example, the node having ID 144 can receive a first liveness header in sync response 1204 from the node having ID 151. The first liveness header can include a participating node ID, an instance ID, phase value [phase-state value]. [phase.unknown indication], a freshness value, a color (proximity) value, and a weight value> for the node having ID 174. The phase-state value (e.g., Inserting, Syncing, Routing, Operating) identifies the expressed phase of the node having ID 174 at the time of the first freshness value. The phase value (e.g., phase-state: [Inserting, Syncing, Routing, Operating], and phase.unknown) identifies the expressed and/or detected phase information of the node having DD 174 at the time indicated by the first freshness value.
[0235] However, a freshness value can be discounted due to communication delay. A freshness value can also decay with the passage of time. The decay curves for a freshness value can differ (and may not be linear or symmetric) for the different phase states (including unknown). Thus, across different node phases, the decay of a freshness value can be non-linear and/or asymmetric. [0236] Method 1500 includes an act of accessing at least a current instance ID, current phase value, and current freshness value for the participating node maintained at the current node (act 1502). For example, the node having ID 144 can access a previous received and stored instance ID, phase value [phase-sate value.][phase.unknown indication], and freshness value for the node having ID 174.
[0237] Method 1500 includes an act of comparing at least the received instance ID, received phase value, and received freshness value to the current instance ED, the current phase value, and the current freshness value respectively at a current node (act 1503). For example, the node having ID 144 can compare the previously received and stored instance ED, phase value [phase-sate value. ][phase.unknown indication], and freshness value for the node having ID 174 to the instance ID5 phase value [phase-sate value.] [phase, unknown indication], and freshness value received in the liveness header.
[0238] The node having ID 144 can determine that current state information for the node having ID 174 (e.g., received from the node having ID 151) is stale based on (in order) the first instance ID being greater than the currently stored instance ID for the node having ED 174, based on first phase-state value being more advanced than the currently stored phase-state value for the node having ID 174, or based on the first freshness value being a value greater than the freshness value currently stored for the node having ED 174. The node having BD 144 can also determine that at least one phase.unkown indication (either currently stored or received in the liveness header) indicates that a phase-state was known at the time the phase-state was detected/transmitted.
[0239] Method 1500 includes an act of determining if state information for the participating node is to be updated at the current node based on the comparison (act 1504). For example, based on the comparison of values for the node having ED 174, the node having ID 144 can determine that state information for the node having ID 174 is to be updated. Updating outdated state information for the node having DD 174 can include replacing current stored values (e.g., for instance BD, phase-state value, phase.unknown indication, or freshness value) with values included in the liveness header. For example, the node having ID 144 can update state information for the node having ID 174 to indicate that the node having ID 174 has transitioned to a more advanced phase-state. [0240] In some embodiments, it can be detected that communication with the participating node may have been lost. For example, the node having ID 144 can detect that communication with the node having ID 151 has been lost. Referring briefly to Figure 17, in response to a prior subscription for liveness events 1701 (with an endpoint of the node having ID 151), application layer 1752 can send endpoint down event 1703 (with an endpoint of the node having ID 151) to function layer 1751. In these embodiments such detected liveness conditions can be indicated in liveness information with the Phase.Uhknown indicator being set to true along with the last known Phase state value. [0241] Method 1500 can further include an act of receiving a message that includes a second liveness header from a second different node in the federation infrastructure For example, the node having ID 144 can receive a status message (from the node having ID 103 or some other node of ring 1206) that includes a second liveness header. The second liveness header can include <the participating node ID, a second instance ID, a second phase value [phase-state value], [phase. unknown indication], a second freshness value, a second color (proximity) value, and a second weight value> for the node having ID 174. The second phase value (e.g., phase-state: [Inserting, Syncing, Routing, Operating], and phase.unknown indication) identifies the expressed/detected phase of the node having ID 174 at the time of the second freshness value.
[0242] Alternately, subsequent to receiving the first liveness header, the node having ID 144 can attempt to communicate directly with the node having ID 174. If communication is successful, the node having ID 174 can return a message (e.g., sync response) having the node ED and second instance ID in an addressing header and having a liveness header including <the second phase value, the second freshness value, the second color (proximity) value, and the second weight value>. If a failure is detected, the node having ID 144 generates an internal liveness state change (e.g. freshness = max, and phase.unknown indication = true) and processes the state change as if the state change were received from another node. Such a state change has highest freshness value.
[0243] Method 1500 can also include an act of comparing the second instance ID, the second phase value, and the second freshness value to the current instance ED, the current phase value, and the current freshness value respectively (act 1506). For example, after receiving a status message from the node having ID 103, the node having ID 144 can determine that current state information for the node having ID 151 is stale based on (in order) the second instance ID being greater than the first instance ID, the second phase being more advanced than the first phase value, or the second freshness value being greater than the first phase value. [0244] Method 1500 can also includes an act of determining if state information for the participating node is to be updated based on the comparison. For example, based on the comparison of values for the node having ID 174, the node having ID 144 can determine that state information for the node having ID 174 is to be updated. Updating outdated state information for the node having ID 174 can include replacing current stored values (e.g., for instance ID, phase-state value, phase.unknown indication, or freshness value) with values included in the second liveness header. For example, the node having ID 144 can update state information for the node having ID 174 to indicate that the node having ID 174 has transitioned to a more advanced phase-state.
[0245] In some embodiments, phase values are compared within the context of equal color values. As previously described, a node can participate in multiple proximity rings. Participation in multiple proximity rings can occur as a result of participation in a more specific ring implying participation in a more general ring (along a common spine). For example, referring back to Figure 5, a node's participation in ring 532 also implies that the node is participating in rings 522, 511, and 501. Thus, a color for a more specific ring also represents all parent proximal rings. Also as previously described, participation in multiple proximity rings can occur when a node in one ring is aliased into one or more other rings (potentially along different spines). For example, still referring to Figure 5, a node participating in ring 532 can be aliased into ring 531 (or even ring 541 that would imply participation in rings 531, 522, 511, and 501). Thus, a color for one ring (e.g., ring 531) can be viewed as a peer color (or proximity) of another ring (e.g., ring 532). [0246] When a node participates in a plurality of proximity rings in an aliased fashion, there is some potential that phase values (e.g., phase-state values and/or phase.unknown indications) for the node will differ between different proximity rings. Thus, a node that receives state information for another node, identifies the corresponding proximity ring for the state information (color) before determining if current state information is to be updated for that node and color. For example, the node having ID 144 can identify the corresponding proximity ring for received state information corresponding to the node having ED 174 before comparing the received state information to current state information.
[0247] Identifying an appropriate proximity ring can include comparing a received color value to one or more current color values. When the received color value and a current color value are equal , other state information, such as, for example, a current instance ID5 a current phase value, and a current freshness value, can be compared to corresponding received state information, such as, for example, a received instance ID, a received phase value, and a received freshness value. On the other hand, when the received color value and a current color value differ, further comparisons do not occur. [0248] Equality between color values can result in a variety of ways. For example, equality between color values can result when a current color value and a received color value indicate the same proximity ring (e.g., ring 532). Further, equality between color values can result when a more specific color value is compared to a corresponding parent color value (e.g., another ring along the same spine). For example, comparing the color value for ring 532 to the color value for ring 511 (or ring 522 or 501) can result in equality. Thus, the child proximity is the parent proximity but is more specific.
[0249] Thus generally, currently operational nodes in a federation infrastructure can exchange expressed and detected liveness state information for other nodes even when communication with those other nodes appears to be lost. [0250] Bootstrapping Mechanisms [0251] Generally, in order for a node to become an active member of a federation (e.g., join), the node has to communicate with at least one other node that is already an active member of the leaf ring it intends to join. To help insure this initial form of communication is available, federations can utilize a bootstrapping mechanism. A bootstrapping mechanism can be used as a last resort when other types of communication fail to identify an active member of a leaf ring or security constraints require a newly joining node to initially communicate with at least one of a set of special nodes such as seed nodes. That is when other types of communication fail or because of security requirements, a bootstrapping mechanism can be used to identify an active member node of a leaf ring. [0252] In some embodiments, seed nodes are used to bootstrap communication with a federation. Seed nodes provide well known points of entry for some types of cross (inter) proximity communication). Seed nodes help heal ring partitions due to infrastructure failure/recovery and general dynamism. Each ring can have at least one operational seed node in order to provide basic bootstrapping properties for a federation. [0253] Peer seed nodes can communicate amongst themselves to maintain a ring structure (e.g., a doublv linked lisf) for a Droximitv that consists of at least all active seed nodes for that proximity. A dedicated seed node synchronization protocol can be used to provide each seed node with at least total knowledge of all other seed nodes' presence (active) state. An active seed node is a member node of the proximity leaf ring in which it is homed as well as all other ancestral rings of the leaf ring. Thus, a seed node can represent an entire spine of proximity rings, for example, from the seed node's leaf ring to the root ring. Accordingly, seed nodes can function as highly available and well known entry nodes in each of those proximity rings. As a result, presence state about seed nodes can be useful for various forms of communication (e.g., inter-proximal communication) within a federation. Accordingly, seed nodes can provide a number of special properties, such as, for example, acting as well known "j°in points" for joining nodes, acting as a secure ring authority, aiding in healing infrastructure partitions, and acting as a stable "entry node" for each of their proximities.
[0254] To provide presence data, a seed node's arrivals and orderly departures can be registered as a stable entry node at a rendezvous point in each of their proximities. For example, registration messages can be routed to a fixed URI whose destination ID is the SHA-I hash of the string "Proximity:/". While in one embodiment seed nodes acting as stable entry nodes register themselves in this manner there are other embodiments where selected non-seed nodes may also register themselves in the same manner and with the same or similar protocols described here for seed node. When a stable entry node (such as a seed node) registers, the stable entry node can indicate each ring it is a member of. Thus, information maintained at the rendezvous point identified by this fixed URI is essentially a list of stable entry nodes and their corresponding ring memberships. Accordingly, any node can refer to the rendezvous point identified by this fixed URI to obtain a list of available stable entry nodes and their ring memberships. [0255] In one embodiment the stable entry node directly registers these arrival and departure events. In another embodiment, the stable entry node registers these events directly at a rendezvous point within it's immediate proximity ring and that rendezvous point transparently facilitates (directly or indirectly) updating of all other appropriate rendezvous points in each of the remaining proximities rings to which the registering/unregistering stable entry node belongs. The application state sequencing and propagation properties of a federation can be used to maintain and propagate this stable entry node registration information. For example, a reliable-flooding protocol can be used to replicate saved application state among a node's Neighborhood nodes. [0256] The promotion of stable entry node's presence data towards the root ring allows other nodes in a federation to look up at least one entry node in every proximity. Entry Node Lookup can be facilitated by routing a node lookup message towards the above determined rendezvous point in the Lowest Common Ancestor Ring ("LCAR") of the leaf ring of the node performing the lookup and the desired proximity ring. For example, referring to Figure 5, a node in ring 541 may desire to communication with a node in ring 533. However, the node in ring 541 may have no direct knowledge of any node in ring 533. Thus, the node in ring 541 can send a Node Lookup Message to ring 522 (the LCAR of ring of ring 541 and ring 533). A rendezvous point node in ring 522 that processes entry node presence information (e.g. caused to exist in the system because of a registration message originated by that entry node) can return a Lookup Response Message with contact information for at least a registered stable entry node in ring 533. [0257] In some embodiments, stable entry nodes are seed nodes configured specifically as stable entry nodes for maintaining presence data for various proximities. In other embodiments, other types of nodes can also function as stable entry nodes maintaining presence data for various proximities and may also be configured to perform other operations. For example, certain other types of nodes may be configured (e.g., by an administrator) as being highly available and thus suitable as a stable entry node (i.e. to be registered as described above). However, the other types of nodes may not include additional seed node functionality (e.g., may not be trusted as a security ring authority). In some embodiments, rendezvous points that maintain entry node presence state for their immediate proximity may register themselves as a stable entry node in the ancestral ring or rings. J0258] Inter-Proximity Communication
[0259] Embodiments of the present invention can also facilitate inter-proximity communication, such as, for example, between nodes in different proximal branches of a tree of rings. Inter-proximity communication can be used to communicate to and/or between one or more, and potentially all, proximity rings in a proximally partitioned ring infrastructure. Referring now to Figure 5A, Figure 5A illustrates the example proximity induced partition tree 500 with additional levels of detail in portions of partition tree 500. Inter-proximity communication can occur between various nodes in Figure 5A. [0260] As depicted in Figure 5A, partition tree of rings 500 addition includes various sub-rings under ring 513. Each of the additional sub-rings represents a partition of a sorted linked list. As previously described for Figure 5, within partition tree 500, root ring 501 is partitioned into a plurality of sub-rings, including sub-rings 511, 512, 513, and 514, based on criterion 571 (a first administrative domain boundary criterion). Also as previously described for Figure 5, sub-ring 511 can be further partitioned into a plurality of sub-rings, including sub-rings 521, 522, and 523, based on criterion 581 (a second administrative domain boundary criterion). Other sub-rings under sub-ring 522 are further portioned based on other criterion.
[0261] As previously described, within partition tree 500, each node has a single ID and participates in rings along a corresponding partition path (a spine) starting from the root to a leaf. For example, each node participating in sub-ring 552 would also participate in sub-rings 543, 531 , 522, 511 and in root 501. [0262] In Figure 5A5 sub-ring 513 can also be further partitioned into a plurality of sub-rings, including sub-rings 561 and 562 based on other criterion, such as, for example, state jurisdiction. Sub-ring 562 can be further portioned into a plurality of sub-rings, including sub-rings 571 and 572 based on other criterion, such as, for example, city jurisdiction. Accordingly, within Figure 5A, inter-proximity communication can be used to send a message from a node of ring 541 to a node of ring 572, without requiring communication up a spine from ring 541 to root ring 501 and then back down from root ring 501 to ring 572. [0263] Inter-proximity communication can be included as part of a communication pattern, such as, for example, broadcasting, multicasting, or any- casting, being implemented in a tree of rings. Broadcasting can include sending a message to all active nodes in a tree of rings. Multicasting can include sending a message to a group of nodes in a tree of rings. Any-casting can include sending a message to at least one node in a tree of rings. [0264] Figure 19A illustrates an example proximity induced partition tree of rings 1900 that facilitates inter-proximity communication. Within partition tree of rings 1900, root ring 1901 is partitioned into a plurality of sub-rings, including sub-rings 1, 2, 3, and 4, based on selected criterion (e.g., a first administrative domain boundary criterion). Sub- ring 1 is further partitioned into sub-rings 11, 21, 31, and 41. Sub-ring 11 is further partitioned into sub-rings 111, 211, and 311. Sub-ring 21 is further partitioned into sub- rings 121, 221, 321, 421, and 52L Although not expressly depicted, other sub-rings, such as, for example, sub-rings 2, 3, 4, 31, and 41, can also be further partitioned. [0265] The numbering convention of the rings in proximity induced partition tree of rings 1900 is configured such that any digits after the first digit indicate a ring's parent ring. For example, the "11" in ring "311" indicates that ring 11 is the parent ring of ring 311. Similarly, the "1" in ring "41" indicates that ring 1 is the parent ring of ring 41. Global ring 1901 is the parent ring for any rings numbered with, a single digit, such as, for example, rings 1, 2, 3 and 4. Similar to proximity induced partition tree of rings 500 in Figure 5 A, partition tree of rings 1900 can be partitioned based upon various proximity criterion. [0266] Within the description and following claims the annotation R["<number>"] is used to refer to a ring number. For example, R["l l"] refers to ring 11. Within the description and following claims the annotation N[<number>] is used to refer to a node number. For example, N[ 1311 J refers to node 1311. [0267] To facilitate communication in a tree of rings, nodes can maintain an entry table that matches rings to corresponding entry nodes in those rings. As previously described, based on the configuration of partition tree of rings 1900 a parent ring contains all of the nodes from each of its child rings. For example, ring 11 contains all the nodes from R["l 11"], R["211"], and R["311"]. Thus, sending a message to ring 11 is sufficient to get the message to any node in ring R["l 11"], R["211"], and R["311"]. Accordingly, in some embodiments, a node's entry table can be reduced to entries for those rings that are relatively different from the perspective of the ring the node resides in. For example, N[I 111] can simply maintain an entry for R["21"] - N[1121] - since maintaining entries for multiple child rings or R["21"] would be redundant. [0268] Creation and Maintenance of Collateral Ring Sets [0269] Within this description and in the following claims any peer ring of a specified ring is defined as a "collateral ring" of the specified ring. Within this description and in the following claims any peer ring of a specified ring's ancestor rings is also defined as a "collateral ring" of the specified ring. Any collateral ring of a specified ring is also collateral ring of all the nodes included in the specified ring. [0270] Thus, for example, still referring to Figure 19A, R["211"] is a collateral ring of R["lll"] since R["211"] is a peer of R["l l l"]. R["211"] is also a collateral ring of any node included in R["l 11"], such as; for example N[1311]. Further, R["21"] is a collateral ring of R["l l l"] since R["21"] is a peer of R["l l"] (i.e., an ancestor of R["l l l"]). R["21"] is also a collateral ring of any node included in R["1 H"], such as, for example N[Il I l]. [0271] Within this description and in the following claims a "collateral ring set" ("CRS") is defined as a set of one or more collateral rings from the perspective of a specified ring or nodes within a specified ring. For example, in Figure 19A, a collateral ring set for R["221"], as well as any nodes in R["221"], such as, for example, N[8221], includes R["l 1"], R["121"], R["31"], R["4I"], R["2"], R["3"], and R["4"]. [0272] Thus, to facilitate inter-proximity communication, a node can maintain a CRS entry table that includes one or more collateral rings and one or more corresponding entry nodes into the one or more collateral rings. A CRS entry table can be a data structure including one or more <collateral ring, 1 to N entry nodes> items, where N is some integer. For example, the data structure can be of the format <collateral ring_01, entry node_01, entry node_02, ...>, where the ellipsis represents one or more additional entry nodes into collateral ring_01.
[0273] To create a CRS entry table, a node can make use of local knowledge, rendezvous protocol messages (e.g., ping messages, update messages, and update responses) used to propagate state in a tree of rings, application messages, and messages used to facilitate specified communication patterns (e.g., broadcasting, multicasting, and any-casting) in a tree of rings.
[0274] A node can use local knowledge, such as, for example, routing table information, from all levels of rings a node participates. For example, still referring to Figure 19, N[1121] may be a neighbor of N[1311] in R["l"]. One collateral ring of N[1311] from the perspective of N[1121] is R["21"]. Accordingly, N[1311] can insert the ρair(R["21"], N[1121]) (in this case an item having a single entry node) into N[l311]'s CRS entry table. By making use of this type of local knowledge, a node can insert entries into a CRS entry table
[0275] Nodes can, in addition to specifically intended messages, propagate their CRS entry table information to other nodes in messages that are otherwise used for other purposes, such as, for example, to propagate neighborhood and routing partner state information. For example, nodes can include CRS entry table state in ping messages sent to neighborhood nodes and in update messages and update responses exchanged between routing partner nodes. Nodes that receive a CRS entry table state from another node can use the received CRS entry table state to augment and/or maintain their own CRS entry table.
[0276] For example, when a node exchanges Rendezvous Ping/Update messages with its neighbor/partner nodes (e.g., at a rendezvous protocol layer), the node can also exchange (at least part of and potentially all of) its CRS entry table (and use the CRS entry table state received from its neighbors/partners to update its own table. Suppose, for example, that N[1311] does not have prior knowledge of any node in R["3"] (within the context of or ring 1901) . However, N[ 1311 ] does has a neighbor N[8221 ] (in R[" 1 "]) and N[8221]'s CRS entry table has an entry (R["3"]5 N[8223]). At least because N[1311] and N[8221] are neighbors, N[1311] and N[8221] can, from time to time, send ping messages to one another. N[8221] can include (at least part of and potentially all of) its CRS entry table in ping messages that are sent to N[1311]. Thus, when N[1311] receives a ping message from N[8221], then ping message can include N[8221j's CRS entry table. From N[8221]'s CRS entry table, N[1311] can identify the item <R["3"], N[8223], ...> and include the item <R["3"], N[8223], ...>) in its own CRS entry table. N[1311] can also identify other items for other rings in its CRS and include those other items in its own CRS entry table. [0277] CRS entry table state can be similarly exchanged in update messages and update responses exchanged between routing partners in a ring. Also, any routing protocol message can use to learn (e.g., liveness information) about CRS entry nodes. Also, specific messages, intended to maintain CRS entry tables, can be used. [0278] CRS entry table state can also be discovered in messages that facilitate specified communication patterns (e.g., broadcasting, multicasting, and any-casting) in a tree of rings. For example, to broadcast a message to every node in a tree of rings, a broadcasting algorithm may use various types of messages that are specific to broadcasting. Nodes that send these broadcast specific messages can include CRS entry table state within the broadcast specific messages. Similarly, when multicasting a message to every node in a group of nodes, a multicasting algorithm may use various types of messages that are specific to multicasting. Nodes that send these multicast specific messages can include CRS entry table state within the multicast specific messages. Likewise, when any-casting a message to at least one node, an any-casting algorithm may use various types of messages that are specific to any-casting. Nodes that send these any-cast specific messages can include CRS entry table state within the any- cast specific messages. Nodes that receive communication pattern specific messages can identify appropriate entries (e.g., <collateral ring, entry nodes> items) and include some or all the state from these entries in their own CRS entry table. [0279] CRS state can also be discovered in application component messages that are exchange between applications. Referring briefly to Figure 1, application layers 121, 122, and/or 123 may exchange application component messages that include CRS state. Upon receiving an application component message including CRS state, an application layer can transfer the CRS state down to corresponding other lower layers, such as, for example, to a rendezvous protocol layer, to augment existing CRS state. [02801 CRS state can be application provided and/or hard wired, and is configurable by nodes within a tree of rings*
[0281] Referring back to Figure 19 A, if a node finds that it knows a plurality of entry nodes to the same ring, it may decide to retain two or more of the entry nodes for the ring. In some embodiments, the node randomly selects an entry node from among any retained entry nodes. In other embodiments, a policy is applied to aid in the selection of a specified entry node from among any retained entry nodes. A policy can indicate that the selected entry node is to be the same entry node each time. Alternately, a policy can indicate that the selected entry node is to be varied among any retained entry nodes. For example, in some embodiments, entry nodes are selected in a round-robin manner so that the load can be distributed evenly among any retained entry nodes.
[0282] Further, when multiple entry nodes are retained, a node can efficiently transition to a different entry node, for example, if a first selected entry node fails, is busy, or for some other reason is not available. [0283] Alternately, a node may retain a single entry node for the ring.
[0284] From time to time a node may detect additional entry nodes for a ring. In some embodiments, when a node retains a single entry node or lacks memory to store additional entry nodes, the node can determine if a newly received entry node is to replace an existing entry node. In some embodiments, a node can use a function to compute the rank for each candidate entry node with the following parameters: the distance of the entry node, the freshness of the entry node information, and the weight of the entry node (e.g., configuration preference). An entry node with higher rank is retained. [0285] A CRS entry table may or may not be complete. A complete CRS entry table includes at least one entry node for each ring in a node's CRS. For example, a complete CRS entry table for node 1311 would include at least one entry node into each of rings 111, 211, 21, 31, 41, 2, 3, and 4. [0286] Utilizing the above mechanisms it may possible to construct complete CRS entry tables from the perspective of one or more rings and/or nodes in a proximal ring hierarchy. In some embodiments, it may be that routing table state information alone forms a complete CRS entry table for each node in the tree of rings. For example, routing table related information propagated (e.g., in ping messages, update request messages, and update response messages) in tree of rings 1900 may form a complete CRS entry table for every node in each of the depicted rings.
[0287] However, in other distributed networking environments the dynamic nature of the ring and/or delay in the exchange of entry table related state can hinder construction of a complete entry table. Put another way, in these other environments, there may be one or more rings from a ring's or node's collateral ring set that the node or ring is not aware of at any given time. For example, referring again to Figure 19A, suppose N[8004] just joined, and prior to that there is no node belonging to R["4"], most nodes will not have an entry node for R["4"j until message traffic (e.g. the Ping/Update messages) or other activities cause distribution of that information across the entire ring infrastructure. Thus, maintaining a complete CRS entry table at a node is not always possible due to network dynamism (e.g., node failures, communication failures, communication delays, node additions, etc.). Accordingly, in many environments a node maintains a partial CRS entry table including entry nodes for less than all of the rings in the node's CRS. [0288] Inter-proximity Communication Using CRS Entry Table
[0289] A node can use information in a CRS entry table to send inter-proximity communication (e.g., without having to route a message to a LCAR of the sending ring and the destination ring). Still referring to Figure 19A, based on appropriate entries in a CRS entry table, N[1311] (e.g., a publisher node) may be able to send inter-proximity communication directly to one or more of R["l 11"], R["211"], R["21"], R["31"], R["41"j, R["2"], R["3"], and R["4"]. For example, at some point in time a CRS entry table for N[1311] may include the following entries:
R["2"] : N[1112]
R["3"] : N[8223] R["21"] : N[1121]
R["31"] : N[I 131]
RTlI l"] : N[I 111] R["211"] : N[1211].
[0290J These entries can be used for direct communication to R["l ll"], R["211"], R["21"], R["31], R["2"], and R["3"]. For example, N[1311] can send communication 52 to R["lll"], N[1311] can send communication 51 to R["211"], N[1311] can send communication 53 to R["21"] (N[1121] is a member of both R["21"] and R["221"]), N[1311] can send communication 56 to R["31"], N[1311] can send communication 57 to R["2"], and N[1311] can send communication 58 to R["3"]. Over time N["1311"] may identify entries (e.g., <collateral ring, entry node> items) for R["41"] and R["4"]. These entries can be identified from updated local knowledge, from CRS entry tables contained in rendezvous protocol messages (e.g., ping messages, update message, and update responses), through CRS entry table state contained in communication pattern specific messages, and through other mechanisms such as, for example, an application component. [0291] Downward Routing Algorithm
[0292] In a rendezvous federation (with or without CRS entry tables), it may be that a message is to be routed to the node closest to a given node ID within a specified proximity ring that is not an ancestor to (or in) the leaf ring where the message originated (hereinafter referred to as "downward routing"). One example of this is facilitating inter- proximity communication from a node in an originating ring to a collateral ring when the node in the originating ring is not aware of an entry node for the collateral ring. Figure 19B illustrates another view of the example proximity induced partition tree of rings 1900. For example, referring now to Figure 19B, it may be that N[1311] is to send communication destined to a node in R["4"] or R["41"]. [0293] Given a rendezvous federation, the following function can be defined: RouteDown(M, P, ID): The federation is to deliver message M to the node closest to ID in the proximity P. Proximity P can be any proximity ring in the federation (leaf or intermediate) that is not an ancestor to (or in) the originating node's leaf ring. [0294] In some embodiments, message M is never routed above nodes within the LCAR of the originating node's leaf ring and the target proximity ring P. For example, to implement downward routing from N[1311] to R["41"] there may be no need to route a message above R["l"] (the LCAR of R["311"] and R["41"j). However, in other embodiments, if appropriate a message can be routed above a LCAR. [0295] The RouteDown(M, P, DD) function can include identifying an entry node known to be a member of the target proximity ring P. A sending node can identify an entry node in a target proximity ring using a variety of different mechanisms. A sending node can be an originating node (the first sending node). A sending node can also be an intermediate node that receives a message from the originating node or another intermediate node and then forwards the message.
[0296] A sending node can use local knowledge, such as, for example, configuration or locally cached information (e.g., in addition to a CRS entry table), to identify an entry node for a target proximity ring. For example, N[1311] may have access to cache and configuration 1902 that includes configuration or locally cached information about rings in tree of rings 1900. In some environments, local knowledge about a federation is obtained through communication mechanisms outside of the federation (i.e., out-of-band). Local knowledge can be used to identify any nodes in the exact target proximity ring P. If any nodes in the exact target proximity ring are found, message M can be forwarded to one of them. For example, N[1311] may be able to use cache and configuration 1902 to identify N[8004] and forward message 1903 to R["4"].
[0297] A sending node can use a CRS entry table to locate any entry nodes in the target proximity ring P. If any entry nodes the target proximity ring are found, message M can be forwarded to an entry node in the target proximity ring P. For example, when N[7521] is a destination for message 1903, N[1311] can identify N[6521] as an entry node for R["521"]. Accordingly, message 1903 can be routed to N[6521] (or into R["521"]), Within R["521"], N[6521] can then attempt to route message 1903 to N[7521] using intra- ring communication. Thus, if a sending node is able to identify an entry node for the target proximity ring, it forwards the message to the exact target proximity ring. For example, if N["6521"] is able to identify an entry node for R["21"] it forwards message 1903 on to R["21"] (dashed line).
[0298] On the other hand when sending node is unable to identify any entry nodes of the destination target proximity (e.g., from local knowledge or a CRS entry table), the sending node can check its CRS entry table to locate entry nodes for any ancestor rings to the target proximity ring. For example, it may be that N[1311] is attempting to send a message to a node in R["121"], however N[1311] may be unable to identify an entry node for R["121"]. Accordingly, N[1311] can refer to CRS entry table 1904 to locate N[6521] (an entry node into R["21"]). N[1311] can forward the message to N[6521], which now becomes the sending node for the message.
[0299] Logically, message 1903 can now be viewed as being "at" R["21"], since N[6521] is also a node of R[21]. N[6521] can then attempt to identify an entry node into R[221] (the target proximity). For example, N[6521] can refer to local knowledge, a CRS entry table, and/or can (recursively) apply the RouteDown algorithm. It may be that N[6521] identifies N[3221] as entry node into R[221]. Accordingly, N[6521] can send message 1903 to N[3221]. N[3321] can then route message 1903 to an appropriate node in R[221] using intra-ring communication
[0300] When appropriate (e.g., in trees with more depth than shown in Figure 19B), a message can be passed to ancestors that are closer and closer to the target proximity ring until an entry node into the target proximity ring is identified or no further ancestor rings are available.
[0301] A sending node can also route an Entry Node Lookup Request containing at least the request target proximity to an entry node directory mechanism, such as, for example, used for bootstrapping the federation. Routing of an Entry Node Lookup Request can be constrained to the LCAR of the sending node and the target ring. For example, N[1311] can route Look Up Request 1906 to rendezvous point 7651 to request entry nodes for R["31"]. An entry node directory mechanism can return a list of potential entry nodes. For example, rendezvous point 7651 can return a list of potential entry nodes (including N[8431]), and at least the seed nodes registered with that rendezvous point for the target proximity in look up response 1907.
[0302] The sending node considers any newly discovered nodes identified in a Lookup Response Message (sent from the rendezvous point) and forwards message M to one of those entry nodes. Considering newly discovered nodes can cause the CRS entry table, as well as other locally cached node presence knowledge, to be augmented and otherwise maintained. Lookup Response Messages may also contain other node presence information. For example, specific entry nodes known to be of importance to the sending node for possible inclusion in the CRS entry table of the sending node. [0303] Thus, if one or more available mechanisms yield at least an entry node in the target proximity ring, the message M is sent (either by the original sending node, an entry node in an ancestor ring of the target proximity, or a looked up entry node) to at least one of those entry nodes in the target ring. The message M can include instructions for the entry node in the proximity target ring to route message M to ID. On the other hand, if none of the available mechanisms yield an entry node in the target proximity ring, the RouteDown request can be faulted back toward the original sending node. [0304] In some embodiments, an originating node attaches an end-to-end RouteDown Message Header to the message, wherein the RouteDown Message Header specifies the target proximity URI.
[0305] If any of the above mechanisms identify multiple "next hop" nodes, a single node can be selected. When selecting a single node (e.g., breaking a tie), nodes that are closer to the target proximity P can be selected, then nodes with the higher weight can be selected, then the nodes that are closer to the destination ID of M can be selected. If no mechanisms result in a selection, a node can be then randomly selected. If a failed attempt to forward message M occurs when there are multiple candidates, forwarding can be re- attempted as long as there are non-faulted candidate nodes. [0306] A reverse Status/Fault message path can be established as the application message passes from originator thru intermediaries to the final destination node. Once a message is delivered to the destination or a fault is detected, a corresponding fault/status message can be sent back toward the originator along this path.
[0307] Figure 19C illustrates a partitioned view of a portion of the example proximity induced partition tree of rings 1900. Figure 19D illustrates an expanded view of ring 11 from the example proximity induced partition tree of rings 1900. Figure 20 illustrates an example flow chart of a method 2000 for maintaining a collateral ring set for a node in tree of rings. Method 2000 will be described with respect to the rings, nodes, messages, and data in Figures 19C and 19D. [0308] Method 2000 includes an act of a node accessing a collateral ring set entry table configured to store collateral ring set entries for the node (act 2001). Each collateral ring set entry configured to indicate a collateral ring of the node and at least one corresponding entry node into the collateral ring of the node. For example, N[1311] can access CRS entry table 1904, which is configured to store collateral ring set entries, in the format <collateral ring, 1 to N entry nodes>, where N is some integer, for N[1311]. Thus, CRS entry table 1904 can include zero or more <collateral ring, . entry node> items, each included item indicating a collateral ring of N[1311] and one or more corresponding entry nodes into that collateral ring. For example, as depicted in Figure 19C, CRS entry table 1904 includes the CRS entry <R["51"], N[8651], ...> indicative of N[8651] being one of the 1 to N entry nodes into R[51] (a collateral ring of N[ 1311] and R["311"]). [0309] Method 2000 includes an act of discovering collateral ring set entry table information from available resources that maintain information related to the configuration of the tree of rings (act 2002). For example, N[1311] can discover collateral ring set entry table information form sources that maintain information related to the configuration of tree of rings 1900. As previously described, various different sources of CRS entry table information may be available to a node. For example, a node may have access to local knowledge, such as, for example local configuration and cache information, may access to CRS related state included in rendezvous protocol messages, such as, for example, ping messages, update messages, and update responses, used to propagate state in a tree of rings, may access CRS related state included in application messages, and may access CRS related state from messages used to facilitate specified communication patterns, such as, for example, broadcasting, multicasting, and any-casting, in a tree of rings.
[0310] Thus, in Figure 19C, it may be that N[1311] accesses local configuration 1921. From local configuration 1921, N[1311] can discover CRS entry <R["111"], N[1111], ...> indicative of N[1111] being at least one of the entry nodes into R["l 11"] (a collateral ring of N[1311] and R["311"]). N[1311] may also receive application message 1971. From application message 1971 N[1311] can discover CRS information 1972. CRS information 1972 may or may not contain CRS state for Rings in N[1311]'s CRS. N[1311] may also receive communication pattern specific message 1973; From communication pattern specific message 1973 N[1311] can discover CRS state 1974. CRS state 1974 may or may not contain CRS state for Rings in N[131 l]'s CRS.
[0311] Referring now to Figure 19D, N[1311] can discover and exchange CRS state in rendezvous protocol messages. Since N[IlIl] is a member of R["l 11"], N[1211] is a member of R["211"], and N[1311] is a member of R["311"], each of the nodes N[1111 ], N[1211], N[1311] are also members of R["l l"]. As previously described, nodes that are members of a common ring can exchange ping messages, update messages, and update responses to maintain routing table information. Thus, the nodes of R["ll"] can exchange ping messages, update messages, and update responses to maintain routing table information for R["l l"]. CRS state can be included in exchanged ping messages, update messages, and update response, as well as other rendezvous protocol and application message traffic between nodes. [0312] For example, N[AIl] (a neighbor of N[1311] in R["l l"]) can send ping message 1931, including CRS state 1932, to N[1311]. From CRS state 1932, N[1311] can discover CRS entry <R["31"], N[1131]> indicative of N[1131] being an entry node into R["31"] (a collateral ring of N[1311] and R["311"]). CRS entries 1932 can be a complete or partial list of the CRS entries in N[Al l]'s CRS entry table. N[1311] can also send ping messages including CRS state to its neighbors. For example, N[1311] can send ping message 1945, including CRS state 1934, to N[EIl] (a neighbor of N[1311] in R["ll"]). CRS entries 1934 can include a complete or partial list of CRS entries from CRS entry table 1904.
[0313] N[1311] can also send and receive update messages and update responses that include CRS related information. For example, N[1311] can send update message 1933, including CRS entries 1934, to N[DIl] (a routing partner of N[1311] inR["ll"]). N[DIl] can respond by sending update response 1937, including CRS entries 1938, to N[1331]. CRS entries 1938 can be a complete or partial list of the CRS entries in N[Dl l]'s CRS entry table. Similarly, N[1311] can receive update message 1941, including CRS entries 1942, from N[CU] (a routing partner of N[1311] in R["ll"]). CRS entries 1942 can be a complete or partial list of the CRS entries in N[Cl l]'s CRS entry table. N[1331] can respond by sending update response 1943, including CRS entries 1934, to N["C11"].
10314] A node can also receive collateral ring set entry table related information from available resources indicating (directly or indirectly) that a CRS entry may no longer be valid, for example, an indication that an entry node can not be contacted. Any resource used to send CRS related state can also be used to send an indication that can be interpreted to mean that a CRS entry may no longer be valid. Thus, it may be that, from time to time, a node receives CRS related state that causes one or more CRS entries to be added to its CRS entry table as well indications that may cause removal of one or more CRS entries that may no longer appropriate. [0315] Method 2000 includes an act of updating the collateral ring set entry table with appropriate collateral ring set entry state based on the discovered collateral ring set entry table information (act 2003). Each appropriate collateral ring set entry state including a collateral ring of the node and at least one corresponding entry node into the collateral ring of the node. For example, N[1311] can include any CRS entries received in Figures 19C and 19D into CRS entry table 1904. N[1311] can also remove any CRS entries from CRS entry table 1904 that are indicated (e.g., in configuration, rendezvous protocol messages, applications messages, or communication pattern specific messages) as potentially no longer being appropriate. Accordingly, a node's CRS entry table can be updated to appropriately reflect the changing structure of a rendezvous federation. [0316] Figure 19E illustrates yet another view of the example proximity induced partition tree of rings 1900. Depicted in Figure 19E is CRS entry Table 1904, which may have been populated, based on CRS state exchanged in Figures 19C and 19D. Figure 21 illustrates an example flow chart of a method 2100 for sending inter-proximity communication in a tree of rings. The method 2100 will be described with respect to the nodes, rings, messages, and data in Figure 19F.
[0317] Method 2100 includes an act of determining that a node is to send a message to a collateral ring of the node (act 2101). For example, N[1311] can receive an indication that it is to send a message 1976 to R["2"]. An indication that a message is to be sent to collateral ring can be received from another node, be implied as a function of routing logic, an application at N[1311], a multicasting facility, a broadcasting facility, an any- casting facility, etc. {0318] Method 2100 includes an act of the node accessing a collateral ring set entry table configured to store collateral ring set entries for the node (act 2102). Each collateral ring set entry configured to indicate a collateral ring of the node and at least one corresponding entry node into the collateral ring of the node. For example, N[1311] can access CRS entry table 1904. Each CRS entry in CRS entry table 1904 can indicate a collateral ring of N[1311] and at least one corresponding entry node into the collateral ring of N[1311] . For example, the entry <R["111 "], N[1111], .. > indicates that R["l 11"] is a collateral ring of N[1311] and N[I l I l] is one of the at least one entry nodes into R["l l l"]. [0319] Method 2100 includes an act of identifying at least one collateral ring set entry for the collateral ring from the node's collateral ring set entry table (act 2103). Each of the at least one collateral ring set entries indicating at least one entry node of the collateral ring. For example, N[1311] can identify the entry <R["2"], N[1112], .. > for R["2"] from CRS entry table 1094. The entry <R["2"], N[1112], ...> indicates that N[1112] (and potentially other nodes) is an entry node for R["2"]. [0320] Based on the number of corresponding entry nodes included in an identified collateral ring set entry (e.g., when there are two or more entry nodes), method 2100 may also include an act of resolving from a plurality of entry nodes for a collateral ring to an appropriate subset of entry nodes and potentially to a single appropriate entry node. For example, a subset of appropriate entry nodes can be resolved based on closeness between originating and target proximity P, based on node weight can be selected, based on closeness to a destination ID, or can be selected randomly.
[0321] Method 2100 includes an act of sending the message to at least one indicated entry node (act 2104). For example, N[1311] can send message 1976 to N[1112]. Sending a message to at least one node can include sending a message to all entry nodes in a plurality of nodes, to each entry node in a resolved appropriate subset of entry nodes, or to a single appropriate entry node. In some embodiments, when a message failure occurs to one entry node, one or more other entry nodes can be tried. It is also possible for a sending node to identify new nodes as a result of a failure.
[0322] Figure 22 illustrates an example flow chart for a method 2200 for sending inter-proximity communication in a tree of rings. The method 2200 will be described with respect to the nodes, rings, messages, and data in Figures 19F and 19G.
[0323] The method 2200 includes an act of determining that an originating node intends to route a message to a destination node that is closest to a given node ID in a target proximity ring within a tree of rings (act 2201). The target proximity ring can be a collateral ring of the originating node or a sub-ring of a collateral ring of the originating node. For example, N[1311] can receive an indication that it is to route a message 1998 into R["1221"] (the target proximity ring) towards the ID 30. An indication that a message is to be sent to collateral ring or a sub-ring of a collateral ring can be received from another node, an application related to N[1311], a multicasting facility, a broadcasting facility, an any-casting facility, etc. [0324] Method 2200 includes an act of identifying a one or more entry nodes known to be member nodes of at least one of the target proximity ring and an ancestor ring of the target proximity ring (act 2202). For example, N[1311] can identify N[41221], having node ID 56, as an entry node into R["1221"]. A variety of different mechanisms can be used to identify N[41221]. N[1311] can refer to local knowledge to attempt to identify an entry node into the proximity target ring. For example, N[1311] can refer to cache and configuration 1902 to attempt to identify an entry node into R["1221"].
[0325] N[1311] can also refer to a CRS entry table to identify entry nodes into ancestor rings of the proximity target ring (e.g., when an entry node into the target proximity ring is not identified). It may be that sub-ring R["321"] contributes node N[4321] as an entry node into R["21"]. Likewise, it may be that R["2221"] contributes node N[12221] as an entry node into R["221"]. When an entry node into R[1221] is not identified, N[1311] can attempt to identify an entry node into R["221"], such as, for example, N[12221]. N[1331] may also attempt to identify an entry node into R["21"], such as, for example, N[4321]. [0326] It may be that a node attempts to identify entry nodes in closer ancestor rings before attempting to identify entry nodes in further ancestors from the perspective of a specified target proximity, when an entry node into the target proximity is not identified. For example, when an entry node into R["1221"] is not identified, N[1311] may first attempt to identify an entry node in R["221"]. If an entry node into R["221"] is not identified, N[1311] may then attempt to identify an entry node in R["21"]. [0327] N[1311] can also utilize bootstrapping mechanisms, such as, for example, seed nodes. For example, N[1311] can route an entry node lookup request to a known rendezvous point, such as, for example, rendezvous point N[7651], requesting known (registered) entry nodes (seed nodes being an example). In response to a lookup request, a rendezvous point can return (send) a lookup response message including any known entry nodes. For example, lookup response 1997 can be returned from rendezvous point N[7651] to N[13 H]. Lookup response 1997 can include locations of any entry nodes registered with rendezvous point N[7651].
[0328] One or more of these mechanisms may identify N[4221] as an entry node into R["221"]. [0329] In some embodiments, some entry node identification mechanisms for are utilized before other entry node identification mechanisms. For example, a sending node may refer to local knowledge before attempting to identify entry nodes into ancestor rings of the target ring or routing an entry node lookup request. In these same embodiments, a sending node may also attempt to identify entry nodes into ancestor rings of the target ring before routing entry node lookup request. However, in other embodiments, entry node identification mechanisms can be utilized in a different order or omitted. [0330] Method 2200 includes an act of sending the message to the identified entry node (act 2203). The message indicating that the entry node is to resolve the message to the node which has a node ID closest to the indicated destination node in the target proximity ring. For example, as indicated by the solid line, N[1311] can send message 1998 to N[41221] (an entry node into R["1221"] and having Node ID 56) with an indication that the message is to be resolved to node ID 30. N[41221] can access its routing table and/or neighborhood to determine the closest node ID to node ID 30 that it is aware of is N[61221] having node ID 25. Likewise, N [61221] can access its routing table and/or neighborhood to determine the closest node ID to node ID 30 that it is aware of is N[71221] having node ID 28. N[71221] can refer to its table and/or neighborhood to determine that its node ED, node ED 28, is the closet known node ED to node ID 30 and deliver the message. [0331] Previously described routing algorithms can be also be used to route message 1998 within R["221"]. [0332] "When a message is sent to an identified entry node that is a member of an ancestor ring or the target proximity ring, method 2200 can be recursively applied at the identified entry node. That is, the identified entry node into the ancestor ring can in turn attempt to identify an entry node into the target proximity ring. For example, as indicated by the dotted lines, it may be that an application of method 2200 causes message 1998 to be sent to entry node N[12221] (an entry node for R["221"] that is contributed by sub-ring R["2221"]). N[12221] (from the perspective of R["2221"]) can then identify an entry node into R["1221"J. Thus, a recursive application of method 2200 at N[12221] can cause message 1998 to be sent to N[41221]. [0333] If an identified entry node in the ancestor ring is not aware of an entry node into the target proximity ring, the identified entry node can attempt to identify an entry node into another ancestor ring that is closer to the target proximity. The entry node into the ancestor ring can then forward the message to the entry node of the closer ancestor ring of the target proximity ring. [0334] For example, as indicated by the dashed lines, it may be that an application of method 2200 causes message 1998 to be sent to entry node N[4321] (an entry node for R["21"] that is contributed by sub-ring R["321"J). However, N[4321] (from the perspective of R["321"]) may be unable to identify an entry node in R["1221"]. Thus, N[4321] (from the perspective of R["321"]) may identify an entry node in R["221"]. Accordingly, a first recursive application of method 2200 at N[4321] can cause message 1998 to be sent to N[12221]. A second recursive application of method 2200 at N[ 12221] can then cause message 1998 to be sent to N[41221].
[0335] However, if N[4321] did identify an entry node into R["1221"] it could send message 1998 directly to the entry node. Thus, an entry node into an ancestor ring can forward a message to the target proximity ring or an entry node of a closer ancestor ring of the target proximity ring (which is typically in the CRS of the forwarding entry node) as appropriate. As described, the entry node into the closer ancestor ring can then forward the message to the target proximity ring or yet a closer ancestor ring of the target proximity ring (which is typically in the CRS of the forwarding "yet closer" entry node) as appropriate. This process can repeat (e.g., through recursively application of method 2200) until the target proximity ring entry node is reached.
[0336] When the target proximity ring is reached, previously described routing algorithms can be used to route the message within the target proximity ring. [0337] Figure 6 and the following discussion are intended to provide a brief, general description of a suitable computing environment in which the invention may be implemented. Although not required, the invention will be described in the general context of computer-executable instructions, such as program modules, being executed by computer systems. Generally, program modules include routines, programs, objects, components, data structures, and the like, which perform particular tasks or implement particular abstract data types. Computer-executable instructions, associated data structures, and program modules represent examples of the program code means for executing acts of the methods disclosed herein.
[0338] With reference to Figure 6, an example system for implementing the invention includes a general-purpose computing device in the form of computer system 620, including a processing unit 621, a system memory 622, and a system bus 623 that couples various system components including the system memory 622 to the processing unit 621. Processing unit 621 can execute computer-executable instructions designed to implement features of computer system 620, including features of the present invention. The system bus 623 may be any of several types of bus structures including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of bus architectures. The system memory includes read only memory ("ROM") 624 and random access memory ("RAM") 625. A basic input/output system ("BIOS") 626, containing the basic routines that help transfer information between elements within computer system 620, such as during start-up, may be stored in ROM 624.
[0339] The computer system 620 may also include magnetic hard disk drive 627 for reading from and writing to magnetic hard disk 639, magnetic disk drive 628 for reading from or writing to removable magnetic disk 629, and optical disk drive 630 for reading from or writing to removable optical disk 631, such as, or example, a CD-ROM or other optical media. The magnetic hard disk drive 627, magnetic disk drive 628, and optical disk drive 630 are connected to the system bus 623 by hard disk drive interface 632, magnetic disk drive-interface 633, and optical drive interface 634, respectively. The drives and their associated computer-readable media provide nonvolatile storage of computer-executable instructions, data structures, program modules, and other data for the computer system 620. Although the example environment described herein employs magnetic hard disk 639, removable magnetic disk 629 and removable optical disk 631, other types of computer readable media for storing data can be used, including magnetic cassettes, flash memory cards, digital versatile disks, Bernoulli cartridges, RAMs, ROMs, and the like.
[0340] Program code means comprising one or more program modules may be stored on hard disk 639, magnetic disk 629, optical disk 631, ROM 624 or RAM 625, including an operating system 635, one or more application programs 636, other program modules 637, and program data 638. A user may enter commands and information into computer system 620 through keyboard 640, pointing device 642, or other input devices (not shown), such as, for example, a microphone, joy stick, game pad, scanner, or the like. These and other input devices can be connected to the processing unit 621 through input/output interface 646 coupled to system bus 623. Input/output interface 646 logically represents any of a wide variety of different interfaces, such as, for example, a serial port interface, a PS/2 interface, a parallel port interface, a Universal Serial Bus ("USB") interface, or an Institute of Electrical and Electronics Engineers ("IEEE") 1394 interface
(i.e., a FireWire interface), or may even logically represent a combination of different interfaces.
[0341] A monitor 647 or other display device is also connected to system bus 623 via video interface 648. Speakers 669 or other audio output device is also connected to system bus 623 via audio interface 649. Other peripheral output devices (not shown), such as, for example, printers, can also be connected to computer system 620. [0342] Computer system 620 is connectable to networks, such as, for example, an office-wide or enterprise-wide computer network, a home network, an intranet, and/or the Internet. Computer system 620 can exchange data with external sources, such as, for example, remote computer systems, remote applications, and/or remote databases over such networks.
[0343] Computer system 620 includes network interface 653, through which computer system 620 receives data from external sources and/or transmits data to external sources. As depicted in Figure 6, network interface 653 facilitates the exchange of data with remote computer system 683 via link 651. Network interface 653 can logically represent one or more software and/or hardware modules, such as, for example, a network interface card and corresponding Network Driver Interface Specification ("NDIS") stack. Link 651 represents a portion of a network (e.g., an Ethernet segment), and remote computer system 683 represents a node of the network.
[0344] Likewise, computer system 620 includes input/output interface 646, through which computer system 620 receives data from external sources and/or transmits data to external sources. Input/output interface 646 is coupled to modem 654 (e.g., a standard modem, a cable modem, or digital subscriber line ("DSL") modem) via link 659, through which computer system 620 receives data from and/or transmits data to external sources. As depicted in Figure 6, input/output interface 646 and modem 654 facilitate the exchange of data with remote computer system 693 via link 652. Link 652 represents a portion of a network and remote computer system 693 represents a node of the network. [0345] While Figure 6 represents a suitable operating environment for the present invention, the principles of the present invention may be employed in any system that is capable of, with suitable modification if necessary, implementing the principles of the present invention. The environment illustrated in Figure 6 is illustrative only and by no means represents even a small portion of the wide variety of environments in which the principles of the present invention maybe implemented. [0346] In accordance with the present invention, nodes, application layers, and other lower layers, as well as associated data, including routing tables and node IDs may be stored and accessed from any of the computer-readable media associated with computer system 620. For example, portions of such modules and portions of associated program data may be included in operating system 635, application programs 636, program modules 637 and/or program data 638, for storage in system memory 622. [0347] When a mass storage device, such as, for example, magnetic hard disk 639, is coupled to computer system 620, such modules and associated program data may also be stored in the mass storage device. Ia a networked environment, program modules depicted relative to computer system 620, or portions thereof, can be stored in remote memory storage devices, such as, system memory and/or mass storage devices associated with remote computer system 683 and/or remote computer system 693. Execution of such modules may be performed in a distributed environment as previously described. [0348] The present invention may be embodied in other specific forms without departing from its spirit or essential characteristics. The described embodiments are to be considered in all respects only as illustrative and not restrictive. The scope of the invention is, therefore, indicated by the appended claims rather than by the foregoing description. All changes which come within the meaning and range of equivalency of the claims are to be embraced within their scope.

Claims

CLAIMSWhat is claimed is:
1. At a computer system, a method for maintaining a collateral ring set entry table for a node in a tree of rings, the method comprising: an act of a node accessing a collateral ring set entry table configured to store collateral ring set entries for the node, each collateral ring set entry configured to indicate a collateral ring of the node and at least one corresponding entry node into the collateral ring of the node; an act of discovering collateral ring set entry table information from available resources that maintain information related to the configuration of the tree of rings; and an act of updating the collateral ring set entry table with appropriate collateral ring set entry state based on the discovered collateral ring set entry table information, the appropriate collateral ring set entry state including a collateral ring of the node and at least one corresponding entry node into the collateral ring of the node.
2. The method as recited in claim 1 , wherein the act of a node accessing a collateral ring set entry table comprises an act of accessing a collateral ring set entry table that maintains collateral ring/entry node items.
3. The method as recited in claim 1 , wherein the act of a node accessing a collateral ring set entry table comprises an act of creating a collateral ring set entry table for the node.
4. The method as recited in claim 1, wherein the act of discovering collateral ring set entry table information from available resources comprises an act of discovering collateral ring set entry table information from local information available to the node.
5. The method as recited in claim 1, wherein the act of discovering collateral ring set entry table information from available resources comprises an act of discovering collateral ring set entry table information included in a received message.
6. The method as recited in claim 5, wherein the act of discovering collateral ring set entry table information included in a received message comprises an act of discovering collateral ring set entry table information included in a message received from another federation node.
7. The method as recited in claim 6, wherein the act of discovering collateral ring set entry table information included in message received from another federation node comprises an act of discovering collateral ring set entry table information from a ping message.
8. The method as recited in claim 6, wherein the act of discovering collateral ring set entry table information included in message received from another federation node comprises an act of discovering collateral ring set entry table information from an update message.
9. The method as recited in claim 6, wherein the act of discovering collateral ring set entry table information included in message received from another federation node comprises an act of discovering collateral ring set entry table information from an update response.
10. The method as recited in claim 5, wherein the act of discovering collateral ring set entry table information included in a received message comprises an act of discovering collateral ring set entry table information from an application message.
11. The method as recited in claim 1, wherein the act of discovering collateral ring set entry table information from available resources comprises an act of discovering one or more collateral ring/entry node items from available resources.
12. The method as recited in claim 1, wherein the act of discovering collateral ring set entry table information comprises an act of discovering collateral ring set entry table information that indicates a collateral ring set entry is to be removed from the collateral ring set entry table information.
13. The method as recited in claim 1, wherein the act of discovering collateral ring set entry table information comprises an act of discovering collateral ring set entry table information that indicates a collateral ring set entry is to be added to the collateral ring set entry table information.
14. The method as recited in claim 1, wherein the act of discovering collateral ring set entry table information comprises an act of discovering collateral ring set entry table information that indicates an existing collateral ring set entry within the node's collateral. ring set entry table is to be modified.
15. The method as recited in claim 1, wherein the act of discovering collateral ring set entry table information comprises an act of accessing a message that includes at least a portion of another node's collateral ring set entry table.
16. The method as recited in claim 1, wherein the act of discovering collateral ring set entry table information comprises an act of accessing routing table information for one or more proximity rings the node is a member of.
17. The method as recited in claim 1, wherein the act of updating the collateral ring set entry table with appropriate collateral ring set entry state based on the discovered collateral ring set entry table information comprises an act of adding collateral ring set entry table information to the collateral ring set entry table.
18. The method as recited in claim 17, wherein the act of adding collateral ring set entry table information to the collateral ring set entry table comprises an act of adding a collateral ring/entry node item to the collateral ring set entry table.
19. The method as recited in claim 1, wherein the act of updating the collateral ring set entry table with appropriate collateral ring set entry state based on the discovered collateral ring set entry table information comprises an act of removing collateral ring set entry table information from the collateral ring set entry table.
20. The method as recited in claim 19, wherein the act of removing collateral ring set entry table information form the collateral ring set entry table comprises an act of removing a collateral ring/entry node item from the collateral ring set entry table.
21. The method as recited in claim I, further comprising: an act of the node sending collateral ring set information to one or more other nodes to assist the one or more other nodes in maintaining their corresponding collateral ring set entry tables.
22. The method as recited in claim 21, wherein the act of the node sending collateral ring set entry state comprises an act of the node sending its entire collateral ring set entry table.
23. A system including a plurality of hierarchically partitioned classes of nodes, the system comprising: an upper ring of nodes partitioned into lower level rings of nodes including at least a first lower ring of nodes and a second lower ring of nodes, each node in the upper ring of nodes having a node identifier indicating a position in a sorted linked list of nodes, the first lower ring of nodes and the second lower ring of nodes being collateral rings of one another; each node in the first lower ring of nodes having a node identifier in a first sublist of nodes, the first sublist of nodes partitioned from the sorted linked list in accordance with a proximity criterion indicating how rings of nodes are to be classified, each node in the first lower ring of nodes maintaining a collateral ring entry table that includes entry nodes into known collateral rings of the first lower ring of nodes including the second lower ring of nodes; and each node in the second lower ring of nodes having a node identifier in a second sublist of nodes, the second sublist of nodes partitioned from the sorted linked list in accordance with the proximity criterion indicating how rings of nodes are to be classified, each node in the second lower ring of nodes maintaining a collateral ring entry table that includes entry nodes into known collateral rings of the second lower ring of nodes including the first ring of nodes.
24. The system as recited in claim 23, further comprising: each node in the first lower ring of nodes maintaining a routing table with at least partial knowledge of other nodes present in the first lower ring of nodes; and each node in the upper ring of nodes maintaining a routing table with at least partial knowledge of other nodes present in the upper ring of nodes.
25. The system as recited in claim 24, wherein at least one node is both a member of the first lower ring and a member of the upper ring.
26. The system as recited in claim 24, wherein routing table state maintained by each node collectively in the upper ring defines a collateral ring set for every node in the upper ring such that a complete collateral ring set results relative to the upper ring.
27. The system as recited in claim 23, comprising each node in the lower level rings of nodes being configured to communicate a message from one proximity to another target proximity.
28. The system as recited in claim 27, wherein each node in the upper ring of nodes being configured to communicate a message from one proximity to another target proximity comprises each node in the upper ring of nodes being configured to identify a destination Node Id in the other target proximity such that the message can be routed and delivered to the node within the target proximity that is closest to the identified destination Node Id.
29. The system as recited in claim 23, comprising each node in the upper ring of nodes being configured to detect the presence and non-presence of other nodes within the system.
30. The system as recited in claim 29, wherein each node in the upper ring of nodes being configured to detect the presence and non-presence of other nodes within the system comprises each node in the upper ring of nodes being configured to maintain collateral ring set state to reflect detected changes in presence and non-presence of other nodes.
31. The system as recited in claim 29, wherein each node in the upper ring of nodes being configured to detect the presence and non-presence of other nodes within the system comprises each node in the upper ring of nodes being configured to detect presence and non-presence of other nodes at least partially from information include message that are sent within the system.
32. The system as recited in claim 29, wherein each node in the upper ring of nodes being configured to detect the presence and non-presence of other nodes within the system comprises each node in the upper ring of nodes being configured to detect presence and non-presence of other nodes at least partially from indications received from any application components associated with system.
33. The system as recited in claim 23, further comprising: one or more seed nodes that at least provide a bootstrap facility for the system.
34. The system as recited in claim 33, wherein the seed nodes are configured to detect infrastructure partitions and compensate for detected infrastructure partitions.
35. The system as recited in claim 23, further comprising: an entry node registration directory facility.
36. The system as recited in claim 35, wherein the entry node registration directory facility comprises an entry node registration directory facility maintained by rendezvous points included in the system.
37. The system as recited in claim 36, wherein the entry node registration directory facility maintained by rendezvous points included in the system comprises rendezvous points at each level in the lower rings of nodes.
38. The system as recited in claim 36, wherein the entry node registration directory facility maintained by rendezvous points included in the system comprises rendezvous points in the upper rings of nodes.
39. The system as recited in claim 35, wherein the entry node registration directory facility maintained comprises seed nodes registering themselves as entry nodes.
40. A computer program product for use at a computer system, the computer program product for implementing a method for maintaining a collateral ring set entry table for a node in a tree of rings, the computer program product comprising one or more computer-readable storage media having stored therein computer-executable instruction that, when executed by a processor, causes a node to perform the following: access a collateral ring set entry table configured to store collateral ring set entries for the node, each collateral ring set entry configured to indicate a collateral ring of the node and at least one corresponding entry node into the collateral ring of the node; discover collateral ring set entry table information from available resources that maintain information related to the configuration of the tree of rings; and update the collateral ring set entry table with appropriate collateral ring set entry state based on the discovered collateral ring set entry table information, the appropriate collateral ring set entry state including a collateral ring of the node and at least one corresponding entry node into the collateral ring of the node.
41. The computer program product as recited in claim 40, wherein the computer-readable storage media comprise system memory.
42. The computer program product as recited in claim 40, wherein the computer-readable storage media comprise a magnetic disk.
PCT/US2007/007238 2006-06-30 2007-03-22 Inter-proximity communication within a rendezvous federation WO2008005078A1 (en)

Priority Applications (8)

Application Number Priority Date Filing Date Title
EP07753834A EP2036255A4 (en) 2006-06-30 2007-03-22 Inter-proximity communication within a rendezvous federation
JP2009518098A JP2009543447A (en) 2006-06-30 2007-03-22 Inter-region communication within a rendezvous federation
CA002652917A CA2652917A1 (en) 2006-06-30 2007-03-22 Inter-proximity communication within a rendezvous federation
MX2008015966A MX2008015966A (en) 2006-06-30 2007-03-22 Inter-proximity communication within a rendezvous federation.
BRPI0713790-7A BRPI0713790A2 (en) 2006-06-30 2007-03-22 interproxime communication within a federation of meeting points
AU2007270060A AU2007270060B2 (en) 2006-06-30 2007-03-22 Inter-proximity communication within a rendezvous federation
IL195188A IL195188A0 (en) 2006-06-30 2008-11-10 Inter-proximity communication within a rendezvous federation
NO20085027A NO20085027L (en) 2006-06-30 2008-12-03 Communication between nearby nodes in a connected association

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US11/428,146 2006-06-30
US11/428,146 US8095601B2 (en) 2004-10-22 2006-06-30 Inter-proximity communication within a rendezvous federation

Publications (1)

Publication Number Publication Date
WO2008005078A1 true WO2008005078A1 (en) 2008-01-10

Family

ID=38894882

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2007/007238 WO2008005078A1 (en) 2006-06-30 2007-03-22 Inter-proximity communication within a rendezvous federation

Country Status (15)

Country Link
US (1) US8095601B2 (en)
EP (1) EP2036255A4 (en)
JP (1) JP2009543447A (en)
KR (1) KR20090034829A (en)
CN (1) CN101485149A (en)
AU (1) AU2007270060B2 (en)
BR (1) BRPI0713790A2 (en)
CA (1) CA2652917A1 (en)
CL (1) CL2007001394A1 (en)
IL (1) IL195188A0 (en)
MX (1) MX2008015966A (en)
NO (1) NO20085027L (en)
RU (1) RU2431184C2 (en)
TW (1) TW200818811A (en)
WO (1) WO2008005078A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010122724A (en) * 2008-11-17 2010-06-03 Fujitsu Ltd Data sharing program, data sharing method and data sharing device
CN104255012A (en) * 2012-03-29 2014-12-31 英特尔公司 Device-to-device tapping service layer

Families Citing this family (68)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8782654B2 (en) 2004-03-13 2014-07-15 Adaptive Computing Enterprises, Inc. Co-allocating a reservation spanning different compute resources types
WO2005089241A2 (en) 2004-03-13 2005-09-29 Cluster Resources, Inc. System and method for providing object triggers
US20070266388A1 (en) 2004-06-18 2007-11-15 Cluster Resources, Inc. System and method for providing advanced reservations in a compute environment
US8176490B1 (en) 2004-08-20 2012-05-08 Adaptive Computing Enterprises, Inc. System and method of interfacing a workload manager and scheduler with an identity manager
US8014321B2 (en) * 2004-10-22 2011-09-06 Microsoft Corporation Rendezvousing resource requests with corresponding resources
US20080288659A1 (en) 2006-11-09 2008-11-20 Microsoft Corporation Maintaining consistency within a federation infrastructure
US7730220B2 (en) 2004-10-22 2010-06-01 Microsoft Corporation Broadcasting communication within a rendezvous federation
US20060090003A1 (en) * 2004-10-22 2006-04-27 Microsoft Corporation Rendezvousing resource requests with corresponding resources
US8549180B2 (en) 2004-10-22 2013-10-01 Microsoft Corporation Optimizing access to federation infrastructure-based resources
US7958262B2 (en) * 2004-10-22 2011-06-07 Microsoft Corporation Allocating and reclaiming resources within a rendezvous federation
US8095600B2 (en) 2004-10-22 2012-01-10 Microsoft Corporation Inter-proximity communication within a rendezvous federation
US7694167B2 (en) * 2004-10-22 2010-04-06 Microsoft Corporation Maintaining routing consistency within a rendezvous federation
US8392515B2 (en) 2004-10-22 2013-03-05 Microsoft Corporation Subfederation creation and maintenance in a federation infrastructure
US8271980B2 (en) 2004-11-08 2012-09-18 Adaptive Computing Enterprises, Inc. System and method of providing system jobs within a compute environment
US8863143B2 (en) 2006-03-16 2014-10-14 Adaptive Computing Enterprises, Inc. System and method for managing a hybrid compute environment
US8631130B2 (en) 2005-03-16 2014-01-14 Adaptive Computing Enterprises, Inc. Reserving resources in an on-demand compute environment from a local compute environment
US9231886B2 (en) 2005-03-16 2016-01-05 Adaptive Computing Enterprises, Inc. Simple integration of an on-demand compute environment
CA2603577A1 (en) 2005-04-07 2006-10-12 Cluster Resources, Inc. On-demand access to compute resources
US8028090B2 (en) * 2008-11-17 2011-09-27 Amazon Technologies, Inc. Request routing utilizing client location information
US7991910B2 (en) 2008-11-17 2011-08-02 Amazon Technologies, Inc. Updating routing information based on client location
US8041773B2 (en) 2007-09-24 2011-10-18 The Research Foundation Of State University Of New York Automatic clustering for self-organizing grids
US8214524B2 (en) * 2007-12-21 2012-07-03 Hostway Corporation System and method for selecting an optimal authoritative name server
US8417775B2 (en) * 2008-02-27 2013-04-09 Microsoft Corporation Neighborhood maintenance in the federation
US8606996B2 (en) 2008-03-31 2013-12-10 Amazon Technologies, Inc. Cache optimization
US7970820B1 (en) 2008-03-31 2011-06-28 Amazon Technologies, Inc. Locality based content distribution
US7962597B2 (en) 2008-03-31 2011-06-14 Amazon Technologies, Inc. Request routing based on class
US8275912B2 (en) * 2008-10-24 2012-09-25 Microsoft Corporation Bootstrap rendezvous federation
US10877695B2 (en) 2009-10-30 2020-12-29 Iii Holdings 2, Llc Memcached server functionality in a cluster of data processing nodes
US11720290B2 (en) 2009-10-30 2023-08-08 Iii Holdings 2, Llc Memcached server functionality in a cluster of data processing nodes
US9495338B1 (en) 2010-01-28 2016-11-15 Amazon Technologies, Inc. Content distribution network
US9059978B2 (en) 2010-03-23 2015-06-16 Fujitsu Limited System and methods for remote maintenance in an electronic network with multiple clients
US9286485B2 (en) * 2010-03-23 2016-03-15 Fujitsu Limited Using trust points to provide services
US10051074B2 (en) * 2010-03-29 2018-08-14 Samsung Electronics Co, Ltd. Techniques for managing devices not directly accessible to device management server
US9003035B1 (en) 2010-09-28 2015-04-07 Amazon Technologies, Inc. Point of presence management in request routing
US9712484B1 (en) 2010-09-28 2017-07-18 Amazon Technologies, Inc. Managing request routing information utilizing client identifiers
US10467042B1 (en) 2011-04-27 2019-11-05 Amazon Technologies, Inc. Optimized deployment based upon customer locality
TW201250160A (en) * 2011-06-09 2012-12-16 Yeh Chiang Technology Corp High-power LED lamp
US9021030B2 (en) 2011-06-30 2015-04-28 International Business Machines Corporation Selective delivery of content via electronic mail
US8745157B2 (en) * 2011-09-02 2014-06-03 Trading Technologies International, Inc. Order feed message stream integrity
US8675672B1 (en) 2011-12-30 2014-03-18 Emc Corporation Hierarchical cluster tree overlay network
US8861527B1 (en) * 2011-12-30 2014-10-14 Emc Corporation Network-assisted routing for topology-aware overlay networks
US9032061B1 (en) 2011-12-30 2015-05-12 Emc Corporation Policy based intelligent data placement
US9185070B2 (en) 2012-05-17 2015-11-10 Harris Corporation MANET with DNS database resource management and related methods
US9154551B1 (en) 2012-06-11 2015-10-06 Amazon Technologies, Inc. Processing DNS queries to identify pre-processing information
US9559894B2 (en) * 2012-08-22 2017-01-31 Oracle International Corporation System and method for supporting high available (HA) network communication in a middleware machine environment
US11172470B1 (en) * 2012-12-21 2021-11-09 Tanium Inc. System, security and network management using self-organizing communication orbits in distributed networks
US10097448B1 (en) 2014-12-18 2018-10-09 Amazon Technologies, Inc. Routing mode and point-of-presence selection service
US10225326B1 (en) 2015-03-23 2019-03-05 Amazon Technologies, Inc. Point of presence based data uploading
US11461208B1 (en) 2015-04-24 2022-10-04 Tanium Inc. Reliable map-reduce communications in a decentralized, self-organizing communication orbit of a distributed network
US9832141B1 (en) 2015-05-13 2017-11-28 Amazon Technologies, Inc. Routing based request correlation
CN108028861B (en) 2015-08-12 2021-04-20 飞利浦照明控股有限公司 Method, agent equipment and system for managing agent equipment distribution in dense large network
US10270878B1 (en) 2015-11-10 2019-04-23 Amazon Technologies, Inc. Routing for origin-facing points of presence
RU2618366C1 (en) * 2015-11-11 2017-05-03 Федеральное государственное учреждение "Федеральный исследовательский центр "Информатика и управление" Российской академии наук (ФИЦ ИУ РАН) Method of information transmission
US11609835B1 (en) 2016-03-08 2023-03-21 Tanium Inc. Evaluating machine and process performance in distributed system
US11886229B1 (en) 2016-03-08 2024-01-30 Tanium Inc. System and method for generating a global dictionary and performing similarity search queries in a network
US10075551B1 (en) 2016-06-06 2018-09-11 Amazon Technologies, Inc. Request management for hierarchical cache
US10110694B1 (en) 2016-06-29 2018-10-23 Amazon Technologies, Inc. Adaptive transfer rate for retrieving content from a server
US10469513B2 (en) 2016-10-05 2019-11-05 Amazon Technologies, Inc. Encrypted network addresses
US10831549B1 (en) 2016-12-27 2020-11-10 Amazon Technologies, Inc. Multi-region request-driven code execution system
US10938884B1 (en) 2017-01-30 2021-03-02 Amazon Technologies, Inc. Origin server cloaking using virtual private cloud network environments
US10742593B1 (en) 2017-09-25 2020-08-11 Amazon Technologies, Inc. Hybrid content request routing system
US10862852B1 (en) 2018-11-16 2020-12-08 Amazon Technologies, Inc. Resolution of domain name requests in heterogeneous network environments
CN110837583B (en) * 2019-09-27 2022-10-28 西安空间无线电技术研究所 Quick searching method, system and medium based on data chain message activity
US11831670B1 (en) 2019-11-18 2023-11-28 Tanium Inc. System and method for prioritizing distributed system risk remediations
US11563764B1 (en) 2020-08-24 2023-01-24 Tanium Inc. Risk scoring based on compliance verification test results in a local network
CN113656802B (en) * 2021-07-19 2024-05-14 同盾科技有限公司 Knowledge federation undirected graph-based federation loop detection method, system, equipment and medium
US11706302B1 (en) * 2022-06-03 2023-07-18 Dell Products L.P. Efficient topics in transport protocols
US11863617B1 (en) * 2022-11-18 2024-01-02 Accenture Global Solutions Limited Dynamic decentralized hierarchical Holon network system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020059425A1 (en) * 2000-06-22 2002-05-16 Microsoft Corporation Distributed computing services platform
US20060039371A1 (en) 2004-08-19 2006-02-23 Microsoft Corporation Network routing
EP1650911A2 (en) 2004-10-22 2006-04-26 Microsoft Corporation Rendezvousing resource requests with corresponding resources
US20060087985A1 (en) 2004-10-22 2006-04-27 Microsoft Corporation Discovering liveness information within a federation infrastructure

Family Cites Families (104)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5689701A (en) 1994-12-14 1997-11-18 International Business Machines Corporation System and method for providing compatibility between distributed file system namespaces and operating system pathname syntax
US5745683A (en) 1995-07-05 1998-04-28 Sun Microsystems, Inc. System and method for allowing disparate naming service providers to dynamically join a naming federation
US5996075A (en) 1995-11-02 1999-11-30 Sun Microsystems, Inc. Method and apparatus for reliable disk fencing in a multicomputer system
US5831975A (en) 1996-04-04 1998-11-03 Lucent Technologies Inc. System and method for hierarchical multicast routing in ATM networks
US6574654B1 (en) 1996-06-24 2003-06-03 Oracle Corporation Method and apparatus for lock caching
US6253292B1 (en) 1997-08-22 2001-06-26 Seong Tae Jhang Distributed shared memory multiprocessor system based on a unidirectional ring bus using a snooping scheme
US6178174B1 (en) 1997-08-26 2001-01-23 International Business Machines Corporation Optimistic, eager rendezvous transmission mode and combined rendezvous modes for message processing systems
US5999712A (en) 1997-10-21 1999-12-07 Sun Microsystems, Inc. Determining cluster membership in a distributed computer system
US6269452B1 (en) 1998-04-27 2001-07-31 Cisco Technology, Inc. System and method for fault recovery for a two line bi-directional ring network
US6456597B1 (en) 1998-05-04 2002-09-24 Hewlett Packard Co. Discovery of unknown MAC addresses using load balancing switch protocols
US6279034B1 (en) 1998-06-03 2001-08-21 International Business Machines Corporation Distributed monitor timer service for use in a distributed computing environment
US6304556B1 (en) 1998-08-24 2001-10-16 Cornell Research Foundation, Inc. Routing and mobility management protocols for ad-hoc networks
US7430171B2 (en) 1998-11-19 2008-09-30 Broadcom Corporation Fibre channel arbitrated loop bufferless switch circuitry to increase bandwidth without significant increase in cost
US6480473B1 (en) 1998-12-29 2002-11-12 Koninklijke Philips Electronics N.V. Verification of active nodes in an open network
US6115804A (en) 1999-02-10 2000-09-05 International Business Machines Corporation Non-uniform memory access (NUMA) data processing system that permits multiple caches to concurrently hold data in a recent state from which data can be sourced by shared intervention
US6839348B2 (en) 1999-04-30 2005-01-04 Cisco Technology, Inc. System and method for distributing multicasts in virtual local area networks
US6546415B1 (en) 1999-05-14 2003-04-08 Lucent Technologies Inc. Network management system using a distributed namespace
US6850987B1 (en) 1999-06-01 2005-02-01 Fastforward Networks, Inc. System for multipoint infrastructure transport in a computer network
US6411967B1 (en) 1999-06-18 2002-06-25 Reliable Network Solutions Distributed processing system with replicated management information base
US7463648B1 (en) 1999-08-23 2008-12-09 Sun Microsystems, Inc. Approach for allocating resources to an apparatus based on optional resource requirements
US7117273B1 (en) 2000-01-25 2006-10-03 Cisco Technology, Inc. Methods and apparatus for maintaining a map of node relationships for a network
US6269085B1 (en) 2000-02-03 2001-07-31 Sun Microsystems, Inc. Method and apparatus for hierarchical discovery and pruning of slow members of a multicast group
US6917985B2 (en) 2000-03-10 2005-07-12 The Regents Of The University Of California Core assisted mesh protocol for multicast routing in ad-hoc Networks
US6553377B1 (en) 2000-03-31 2003-04-22 Network Associates, Inc. System and process for maintaining a plurality of remote security applications using a modular framework in a distributed computing environment
EP1139602A1 (en) 2000-03-31 2001-10-04 Lucent Technologies Inc. Method and device for multicasting
US7123620B1 (en) 2000-04-25 2006-10-17 Cisco Technology, Inc. Apparatus and method for scalable and dynamic traffic engineering in a data communication network
US6775703B1 (en) 2000-05-01 2004-08-10 International Business Machines Corporation Lease based safety protocol for distributed system with multiple networks
US6947963B1 (en) 2000-06-28 2005-09-20 Pluris, Inc Methods and apparatus for synchronizing and propagating distributed routing databases
US7139270B1 (en) 2000-08-22 2006-11-21 Lucent Technologies Inc. Systems and method for transporting multiple protocol formats in a lightwave communication network
WO2002019624A2 (en) 2000-08-31 2002-03-07 The Regents Of The University Of California Cluster-based aggregated switching technique (cast) for routing data packets and information objects in computer networks
US7379994B2 (en) 2000-10-26 2008-05-27 Metilinx Aggregate system resource analysis including correlation matrix and metric-based analysis
AU2001295809A1 (en) 2000-10-26 2002-05-06 British Telecommunications Plc Telecommunications routing
US20020150094A1 (en) 2000-10-27 2002-10-17 Matthew Cheng Hierarchical level-based internet protocol multicasting
US6836756B1 (en) 2000-11-13 2004-12-28 Nortel Networks Limited Time simulation techniques to determine network availability
CA2326851A1 (en) 2000-11-24 2002-05-24 Redback Networks Systems Canada Inc. Policy change characterization method and apparatus
WO2002057917A2 (en) 2001-01-22 2002-07-25 Sun Microsystems, Inc. Peer-to-peer network computing platform
US7062563B1 (en) 2001-02-28 2006-06-13 Oracle International Corporation Method and system for implementing current user links
US6625604B2 (en) 2001-03-09 2003-09-23 Hewlett-Packard Development Company, L.P. Namespace service in a distributed file system using a database management system
US7085825B1 (en) 2001-03-26 2006-08-01 Freewebs Corp. Apparatus, method and system for improving application performance across a communications network
US7113536B2 (en) 2001-04-16 2006-09-26 Telefonaktiebolaget L M Ericsson (Publ) Rendezvous point interpiconet scheduling
US6928578B2 (en) 2001-05-10 2005-08-09 International Business Machines Corporation System, method, and computer program for selectable or programmable data consistency checking methodology
EP1410196B1 (en) 2001-06-22 2019-08-07 AVEVA Software, LLC Installing supervisory process control and manufacturing software from a remote location and maintaining configuration data links in a run-time environment
US7181547B1 (en) 2001-06-28 2007-02-20 Fortinet, Inc. Identifying nodes in a ring network
GB2377140B (en) 2001-06-29 2005-01-19 Ibm Method and apparatus for recovery from faults in a loop network
US6922791B2 (en) 2001-08-09 2005-07-26 Dell Products L.P. Failover system and method for cluster environment
US7493363B2 (en) 2001-09-19 2009-02-17 Microsoft Corporation Peer-to-peer group management and method for maintaining peer-to-peer graphs
ITMI20012088A1 (en) 2001-10-10 2003-04-10 Cit Alcatel METHOD FOR PROPAGING FAULT INFORMATION IN A RPR NETWORK AND RELATED TYPE OF RPR PACKAGE
US6983397B2 (en) 2001-11-29 2006-01-03 International Business Machines Corporation Method, system, and program for error handling in a dual adaptor system where one adaptor is a master
US7426573B2 (en) 2001-12-12 2008-09-16 Alcatel Lucent System and method for providing service availability data for a communication network
US7231463B2 (en) 2002-01-04 2007-06-12 Intel Corporation Multi-level ring peer-to-peer network structure for peer and object discovery
US20030145086A1 (en) 2002-01-29 2003-07-31 O'reilly James Scalable network-attached storage system
JP3937855B2 (en) 2002-02-06 2007-06-27 日本電気株式会社 Multi-ring control method, node using the same, and control program
CN1177436C (en) 2002-02-09 2004-11-24 华为技术有限公司 Management method of multicast users in mobile network
US6779093B1 (en) 2002-02-15 2004-08-17 Veritas Operating Corporation Control facility for processing in-band control messages during data replication
US7043550B2 (en) 2002-02-15 2006-05-09 International Business Machines Corporation Method for controlling group membership in a distributed multinode data processing system to assure mutually symmetric liveness status indications
US7039719B2 (en) 2002-03-21 2006-05-02 Hewlett-Packard Development Company, L.P. Distributed system with an efficient atomic broadcast mechanism
US7512649B2 (en) 2002-03-22 2009-03-31 Sun Microsytems, Inc. Distributed identities
US7103884B2 (en) 2002-03-27 2006-09-05 Lucent Technologies Inc. Method for maintaining consistency and performing recovery in a replicated data storage system
US7290262B2 (en) 2002-05-21 2007-10-30 International Business Machine Corporation Method and apparatus for dynamically determining information for deploying a web service
EP1394999A1 (en) 2002-08-07 2004-03-03 Infineon Technologies AG Method for routing of data packets and routing apparatus
US7849140B2 (en) 2002-08-29 2010-12-07 Oracle America, Inc. Peer-to-peer email messaging
US7613796B2 (en) 2002-09-11 2009-11-03 Microsoft Corporation System and method for creating improved overlay network with an efficient distributed data structure
US7239605B2 (en) 2002-09-23 2007-07-03 Sun Microsystems, Inc. Item and method for performing a cluster topology self-healing process in a distributed data system cluster
US7200657B2 (en) 2002-10-01 2007-04-03 International Business Machines Corporation Autonomic provisioning of network-accessible service behaviors within a federated grid infrastructure
US6909721B2 (en) 2002-10-31 2005-06-21 Nokia Corporation Device detection and service discovery system and method for a mobile ad hoc communications network
US7289520B2 (en) * 2002-11-20 2007-10-30 Hewlett-Packard Development Company, L.P. Method, apparatus, and system for expressway routing among peers
US6850487B2 (en) 2002-12-05 2005-02-01 The Regents Of The University Of California Method and apparatus for guaranteeing a failure-recovery time in a wavelength-division multiplexing network
US7652998B2 (en) 2002-12-11 2010-01-26 Nippon Telegraph And Telephone Corporation Multicast communication path calculation method and multicast communication path calculation apparatus
AU2003300900A1 (en) 2002-12-13 2004-07-09 Internap Network Services Corporation Topology aware route control
US7404006B1 (en) 2002-12-20 2008-07-22 Symantec Operating Corporation Publishing a network address in a computer network
US7480708B2 (en) 2002-12-23 2009-01-20 Sap Ag Method and computer program product for managing data consistency
US7137018B2 (en) 2002-12-31 2006-11-14 Intel Corporation Active state link power management
US7747731B2 (en) 2003-03-27 2010-06-29 Nokia Corporation Minimizing message processing latency in a communication network
US7120824B2 (en) 2003-05-09 2006-10-10 International Business Machines Corporation Method, apparatus and program storage device for maintaining data consistency and cache coherency during communications failures between nodes in a remote mirror pair
US6988173B2 (en) 2003-05-12 2006-01-17 International Business Machines Corporation Bus protocol for a switchless distributed shared memory computer system
EP1494394A1 (en) 2003-06-30 2005-01-05 Sony International (Europe) GmbH Distance-aware service mechanism for determining the availability of remote services in wireless personal area networks
US7334062B1 (en) 2003-07-22 2008-02-19 Symantec Operating Corporation Technique to monitor application behavior and tune replication performance
US20050031119A1 (en) 2003-08-04 2005-02-10 Yuying Ding Method and communications device for secure group communication
US7680152B2 (en) 2003-08-07 2010-03-16 Robert Bosch Gmbh Method for establishing a user of a data network as a pilot master
US20050050320A1 (en) 2003-09-02 2005-03-03 Microsoft Corporation Branding framework
US20050091399A1 (en) 2003-09-30 2005-04-28 Candan Kasim S. Resource-aware adaptive multicasting in a shared proxy overlay network
US7289501B2 (en) 2003-11-06 2007-10-30 Teknovus, Inc. Method and apparatus for bandwidth-efficient multicast in ethernet passive optical networks
US20050108481A1 (en) 2003-11-17 2005-05-19 Iyengar Arun K. System and method for achieving strong data consistency
US20050111352A1 (en) 2003-11-21 2005-05-26 Boon Ho Method and system for monitoring a network containing routers using a backup routing protocol
US7243089B2 (en) 2003-11-25 2007-07-10 International Business Machines Corporation System, method, and service for federating and optionally migrating a local file system into a distributed file system while preserving local access to existing data
KR100576935B1 (en) 2003-12-22 2006-05-10 한국전자통신연구원 Ontology-based service discovery system and method for ad hoc networks
US7420954B2 (en) 2004-01-13 2008-09-02 General Motors Corporation Efficient lightweight information dissemination algorithm for mobile wireless ad hoc networks
US7313565B2 (en) 2004-02-19 2007-12-25 Microsoft Corporation Data overlay, self-organized metadata overlay, and associated methods
US7730207B2 (en) 2004-03-31 2010-06-01 Microsoft Corporation Routing in peer-to-peer networks
US20050220106A1 (en) 2004-03-31 2005-10-06 Pierre Guillaume Raverdy Inter-wireless interactions using user discovery for ad-hoc environments
US7478263B1 (en) 2004-06-01 2009-01-13 Network Appliance, Inc. System and method for establishing bi-directional failover in a two node cluster
US7512064B2 (en) 2004-06-15 2009-03-31 Cisco Technology, Inc. Avoiding micro-loop upon failure of fast reroute protected links
GB0416074D0 (en) 2004-07-17 2004-08-18 Ibm Controlling data consistency guarantees in storage apparatus
US7613703B2 (en) 2004-09-30 2009-11-03 Microsoft Corporation Organizing resources into collections to facilitate more efficient and reliable resource access
US8549180B2 (en) 2004-10-22 2013-10-01 Microsoft Corporation Optimizing access to federation infrastructure-based resources
US7730220B2 (en) 2004-10-22 2010-06-01 Microsoft Corporation Broadcasting communication within a rendezvous federation
US8095600B2 (en) 2004-10-22 2012-01-10 Microsoft Corporation Inter-proximity communication within a rendezvous federation
US20060155781A1 (en) 2005-01-10 2006-07-13 Microsoft Corporation Systems and methods for structuring distributed fault-tolerant systems
US7827262B2 (en) 2005-07-14 2010-11-02 Cisco Technology, Inc. Approach for managing state information by a group of servers that services a group of clients
US8589574B1 (en) 2005-12-29 2013-11-19 Amazon Technologies, Inc. Dynamic application instance discovery and state management within a distributed system
US7673069B2 (en) 2006-02-24 2010-03-02 Microsoft Corporation Strong routing consistency protocol in structured peer-to-peer overlays
US20070214194A1 (en) 2006-03-07 2007-09-13 James Reuter Consistency methods and systems
WO2008036777A2 (en) 2006-09-19 2008-03-27 Bea Systems, Inc. System and method for supporting service networks in a service-oriented architecture environment
TWI390869B (en) 2008-04-24 2013-03-21 Univ Nat Taiwan System of network resources distribution and method of the same

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020059425A1 (en) * 2000-06-22 2002-05-16 Microsoft Corporation Distributed computing services platform
US20060039371A1 (en) 2004-08-19 2006-02-23 Microsoft Corporation Network routing
EP1650911A2 (en) 2004-10-22 2006-04-26 Microsoft Corporation Rendezvousing resource requests with corresponding resources
US20060087985A1 (en) 2004-10-22 2006-04-27 Microsoft Corporation Discovering liveness information within a federation infrastructure

Non-Patent Citations (8)

* Cited by examiner, † Cited by third party
Title
COHEN R. AND SEGALL A.: "A new protocol for route discovery in multiple-ring networks. II. Multicast, recovery and high-speed processing", COMMUNICATIONS, IEEE TRANSACTIONS, vol. 42, no. 2-4 PART 2, February 1994 (1994-02-01) - April 1994 (1994-04-01), pages 1112 - 1119, XP000447374 *
CONTI, M. ET AL.: "Towards Scalable P2P Computing for Mobile Ad Hoc Networks", PROCEEDINGS OF THE SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, 14 March 2004 (2004-03-14), pages 109 - 113, XP010689738
GANESAN, P. ET AL.: "Canon in G Major: Designing DHTs with Hierarchical Structure", PROCEEDINGS OF THE 24TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, 24 March 2004 (2004-03-24), pages 263 - 272, XP010692673, DOI: doi:10.1109/ICDCS.2004.1281591
LIU, H.; LAM, S.: "Neighbor Table Construction and Update in a Dynamic Peer-to-Peer Network", PROCEEDINGS OF THE 23RD INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, vol. CONF. 23, 19 May 2003 (2003-05-19), pages 509 - 518, XP010642321, DOI: doi:10.1109/ICDCS.2003.1203501
MIN, C ET AL.: "MAAN: A Multi-Atrribute Addressable Network for Grid Information Services", PROCEEDINGS OF THE FOURTH INTERNATIONAL WORKSHOP ON GRID COMPUTING, 17 November 2003 (2003-11-17), pages 184 - 191
See also references of EP2036255A4
STOICA, I. ET AL.: "Chord: A Scalable Peer-to-Peer Lookup Protocol for Internet Applications", IEEE/ACM TRANSACTIONS ON NETWORKING, vol. 11, no. 1, February 2003 (2003-02-01), pages 17 - 32, XP001144289, DOI: doi:10.1109/TNET.2002.808407
WEPIWE G. AND SIMEONOV P.L.: "A Concentric Multi-ring Overlay for Highly Reliable P2P Networks", NETWORK COMPUTING AND APPLICATIONS, FOURTH IEEE INTERNATIONAL SYMPOSIUM, 27 July 2005 (2005-07-27) - 29 July 2005 (2005-07-29), pages 83 - 90, XP010870642 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010122724A (en) * 2008-11-17 2010-06-03 Fujitsu Ltd Data sharing program, data sharing method and data sharing device
CN104255012A (en) * 2012-03-29 2014-12-31 英特尔公司 Device-to-device tapping service layer

Also Published As

Publication number Publication date
KR20090034829A (en) 2009-04-08
MX2008015966A (en) 2009-01-09
US8095601B2 (en) 2012-01-10
EP2036255A4 (en) 2012-01-04
CL2007001394A1 (en) 2008-01-11
EP2036255A1 (en) 2009-03-18
JP2009543447A (en) 2009-12-03
AU2007270060A1 (en) 2008-01-10
CA2652917A1 (en) 2008-01-10
BRPI0713790A2 (en) 2012-11-06
RU2008152422A (en) 2010-07-10
CN101485149A (en) 2009-07-15
IL195188A0 (en) 2009-08-03
US20060282505A1 (en) 2006-12-14
TW200818811A (en) 2008-04-16
NO20085027L (en) 2009-01-19
AU2007270060B2 (en) 2010-12-16
RU2431184C2 (en) 2011-10-10

Similar Documents

Publication Publication Date Title
US8095600B2 (en) Inter-proximity communication within a rendezvous federation
US8095601B2 (en) Inter-proximity communication within a rendezvous federation
US7730220B2 (en) Broadcasting communication within a rendezvous federation
US8392515B2 (en) Subfederation creation and maintenance in a federation infrastructure
US9647917B2 (en) Maintaining consistency within a federation infrastructure
US7466662B2 (en) Discovering liveness information within a federation infrastructure
US7694167B2 (en) Maintaining routing consistency within a rendezvous federation
US7958262B2 (en) Allocating and reclaiming resources within a rendezvous federation
EP2095248B1 (en) Consistency within a federation infrastructure
JP2009543447A5 (en)

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 200780024410.8

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 07753834

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 2652917

Country of ref document: CA

WWE Wipo information: entry into national phase

Ref document number: 6443/CHENP/2008

Country of ref document: IN

WWE Wipo information: entry into national phase

Ref document number: 2007270060

Country of ref document: AU

WWE Wipo information: entry into national phase

Ref document number: MX/A/2008/015966

Country of ref document: MX

WWE Wipo information: entry into national phase

Ref document number: 2008152422

Country of ref document: RU

Ref document number: 1020087031856

Country of ref document: KR

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2009518098

Country of ref document: JP

ENP Entry into the national phase

Ref document number: 2007270060

Country of ref document: AU

Date of ref document: 20070322

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: 2007753834

Country of ref document: EP

ENP Entry into the national phase

Ref document number: PI0713790

Country of ref document: BR

Kind code of ref document: A2

Effective date: 20081226