At the present time, most data network devices located in residences include some type of personal computer. Typically, these personal computers are used to connect to Internet Service Providers over dial-up connections to execute application programs such as email clients and Web browsers that utilize the global Internet to access text and graphic content. Increasingly, the demand is for multimedia content, including audio and video, to be delivered over such networks. However, the backbone architectures of purely data networks, especially those designed for use with the telephone network, were not originally designed to handle such high data rates.
The trend is towards a more ubiquitous model where the network devices in the home will be embedded systems designed for a particular function or purpose. This has already occurred to some degree. Today, for example, cable television (CATV) network set-top boxes typically have limited data communication capabilities. The main function of the data devices is to handle channel access between residential users and a head end or server on the cable TV network.
However, it is estimated that the worldwide market for Internet appliances such as digital set-top boxes and Web-connected terminals will reach $17.8 billion in 2004, and millions of such digital set-top boxes have already been deployed. Increasingly, advertisers and content providers view the cable set-top as the first platform of choice for widespread delivery of a suite of intelligent content management and distribution services.
In the future, the functionality offered by these set-top boxes or other embedded platforms, such as a game system, will be expanded. For example, they may offer Internet browsing capabilities and e-commerce serving capabilities. Moreover, it is anticipated that common-household appliances will also have network functionality, in which they will be attached to the network to automate various tasks.
Because of their extremely large number of network devices in such networks, efficient distribution and delivery of management services, promotions and digital content remains a challenge. The data networks must evolve with deployment of these embedded systems. Where the personal computer can be updated with new network drivers as the network evolves, embedded client systems remain relatively static. Such networks may have hundreds of thousands, if not millions, of network devices to manage. It is evident that standard data Open Systems Inerconnection (OSI) layered network protocols, which were optimized for peer-to-peer communication, are not an entirely acceptable arrangement.
Consider that the digital set top box provides certain interesting functionalities, such as the ability to collect data, such as a log of the channels watched over time, and other events. The set top box can be designed and program to them report this information to a central location. At the central location, this data can be aggregated for many hundreds of thousands of users. This information, when coupled with other information such as demographics, can then be used by advertisers and service providers to blanket defined market segments with promotions, advertisements, and content. The digital delivery of promotions can then allow for impulse responses yielding immediate increases in revenues.
However, such a network may have hundreds of thousands, if not millions of set top boxes, attempting to deliver event log information. If such a data network were built using standard data protocols such as TCP/IP, the sheer number of connection request messages alone could cause the performance of a central data server to degrade to the point where it is unable to carry out reliable message delivery.
The present invention implements a scalable messaging system for data transmission between the network devices, such as set top boxes, and a central system server, such as a server which maintains a database of event logs for the network.
Specifically, the individual routers at the data center broadcast an announcement packet indicating that they are available to accept messages from the network devices. The announcement message contains at least an identification of the router and the manner in which messages may be sent to it, e.g., one or more connection socket numbers and/or network addresses.
The frequency at which these availability messages are sent by the routers is preferably dependent upon the relative loading of the individual router. Thus, the more heavily loaded a particular router becomes, the less often it will broadcast an availability message; the more lightly loaded it becomes, the more often such messages are broadcast.
The network devices then transmit messages to the data center only in response to having received such a router availability announcement. The information in a router availability message can be used in various ways to construct a payload message back to the data center, such as by using ports numbers, persistent identification numbers, or Media Access Control (MAC) layer addresses.
This protocol thus permits control over the generation of messages, such as connection request messages, which originate at the network devices. It avoids a situation whereby such messages might otherwise tend to flood a network that consists of an extremely large number of end nodes that need to communicate to a central location.
The implementation of a device management protocol in this manner assists network operators to cost effectively support the advanced features of the set-top box, such as to provide targeted promotion and digital content distribution services. This enables network operators to generate new revenues and provide a richer interactive environment for consumers.
The foregoing and other objects, features and advantages of the invention will be apparent from the following more particular description of preferred embodiments of the invention, as illustrated in the accompanying drawings in which like reference characters refer to the same parts throughout the different views. The drawings are not necessarily to scale, emphasis instead being placed upon illustrating the principles of the invention.
1. A Targeted Promotion Delivery System
Turning attention now to the drawings,
As shown in
The promotion server subsystem 200 periodically collects viewer usage data from the promotion agent subsystem 300 of each of the multimedia content viewing devices to generate viewership profiles. In television networks, the data collected by the promotion server subsystem 200 may include tuner data (i.e., a history of channels watched) and responses to past promotions. This history is kept on a relatively fine time scale, such as five seconds. In this way, it can be determined how long a particular promotion was deployed, or even which portions of a promotion or video program were viewed.
In more detail regarding promotion delivery, the promotion server subsystem 200 includes a database server 210, a promotion manager server 220, a bulk data server 230, a promotion manager client 240, a life-cycle manager server 240, and a bank of routers 250-1, 250-2, . . . , 250-n, and a queue manager 260. These components are typically located at a central location in the multimedia network at a data center, at a head end, or divided between the two depending on the density and population of devices. It should be understood that these components may share physical platforms or de distributed across multiple machines located at different places in the network. For scalability reasons, a promotion packaging process in the promotion manager server 220 may be separated from a function which is responsible for delivering promotion packages to the network devices 10. The delivery function may be instantiated on multiple machines, for example, to provide better scalability, such as having one machine per head end in the network. The life cycle manager 240 may also be instantiated separately for each router 250.
The routers 250 communicate with the network devices 10 through a data network 75 which may itself include a further hierarchy of routers and bulk servers (not shown in
The queue manager 260 is provided for facilitating the transfer of messages between the message routers 250 and the other system components. The queue manager 2600 is an application-level process that communicates with the message routers 250 on behalf of other processes, such as the promotion manager 220, or the promotion agent in the network device 300, in order to send and receive messages among them. In one embodiment, the queue manager 260 is implemented as a C++ object. The queue manager 260 also manages incoming and outgoing messages queues on behalf of the processes in the system process running at the data center 200.
The queue manager 260 handles two types of queues, persistent queues and volatile queues. Messages, whose message type indicates persistent storage, are stored such that the message will not be lost during power outages and lost network connections. A persistent queue is stored in persistent flash memory or in a location on the hard disk of the network device. Other messages, not intended for persistent storage, are stored to volatile queues and might be lost during power outage and lost network connections.
To determine how to deliver targeted promotions to the network devices, the life-cycle manager server 240 of the promotion server subsystem 200 first generates viewership profiles for each of the multimedia content viewing devices from the collected data using a variety of statistical models. The viewership profiles are then used to associate groups of network devices with a given target promotion.
Promotion groups are collections of multimedia content viewing devices whose individual viewership profiles match membership criterion describing a particular demographic or viewership history. For example, a promotion group may be demographically based, i.e., “married women in their 30's with more than one school age child and a household income of at least $100,0000,” or based on viewership history, i.e., “tends to watch the Golf Channel on Sunday afternoon.” Therefore, the promotion delivery system is adaptable to changes in viewer usage or viewership patterns by making adjustments to promotion groups. Promotion groups are described in more detail in U.S. Provisional Patent Application Ser. No. 60/253,488 filed Nov. 28, 2000, entitled “Using Viewership Profiles for Targeted Promotion Deployment” which is hereby incorporated by reference in its entirety.
Promotions are then scheduled for delivery to specific promotion groups. A promotion is scheduled for delivery to a promotion group by an advertiser or service provider entering a scheduling request for a promotion such as via a promotion manager interface client 225. The promotion manager server 220 packages the promotion for delivery and stores it in the database 210. Later, the package information is read from the database 210 and used to create customized transmission schedules that specify when and how each of the network devices 10 is to receive it. A preferred technique for packaging promotions into messages to be sent to the network devices is described in U.S. Provision Patent Application Ser. No. 60/253,489 filed Nov. 28, 2000, entitled “Promotion Packaging for Transmission Groups” which is hereby incorporated by reference in its entirety.
The promotion agent subsystem 300 embedded in each of the network devices 10 includes a promotion agent 310 and a bulk data agent 320. Upon receipt of the transmission schedule messages, the promotion agent 310 processes each schedule entry and waits for the bulk data agent 320 to deliver each promotion identified in the transmission schedule. The bulk data agent 320 then handles the reception of the promotions from the scheduled data transmission as specified in the promotion download requests. For example, in one embodiment, the bulk data agent 320 tunes into a multicast data transmission stream at a specified time and channel or network address specified in the transmission schedule.
The promotion manager server 220 extracts the promotion package from the database 210 and converts it into a transmission request that is sent to the bulk data server 230. The bulk data server 230 fetches the promotions from the database 210 that are identified in the transmission request message, and transmits them via multicast or broadcast transmission depending on transmission control data specified in the transmission request.
Once the promotions have been successfully delivered, the promotions are activated at the network viewing devices as specified in promotion control data of the transmission schedules. Promotion activation may be event, time, or channel driven.
After the promotion agent 310 has logged viewer activities for a period time, such as twenty four hours, the logged activities are transmitted through messages, in a state 404, to the life cycle manager server 250. The messages are transmitted through a messaging protocol for unicast transmission, such as TCP/IP.
It is important to note here, however, that the uploading of these messages does not occur simply at the whimsy of the promotion agent 310 in the network device. Rather, a specific protocol is used by the system whereby the routers 250 advertise their ability to accept messages from the network devices 10, and the end nodes only attempt to communicate with the data center in response to receiving such messages.
In a state 406, the life cycle manager receives the event log from the promotion agent 310. Also, in the state 406 a program schedule 260 is periodically transmitted to the life cycle manager server 250. Such program schedule data for broadcast network is typically available from commercial services.
After receiving the logged viewership activities and the program schedule 260, the life cycle manager server 250 correlates the data in the state 406. Here, the life cycle manager determines the viewer behavior associated with the network devices. The life cycle manager may for example, determine what programs were watched and the percentage of time each program was watched during its scheduled time slot.
The viewer behavior data generated by the life cycle manager server is matched with group profiles 270 provided by third parties, such as advertisers, to the life cycle manager server 250. These group profiles 270 may include age, gender, residence and other demographic data.
Subsequently, in a state 408, the matched viewership behavior data and group profiles 270 are used to select and then download a targeted promotion to the determined class of the viewer. In a state 410, this promotion is delivered to the network devices 10.
2.0 An Overview of Router Functionality
Before continuing with a discussion of the protocol used to effect the delivery of event log information from the network devices 10 to the life cycle manager in step 404, it is illustrative to consider the routers 250 in more detail.
As mentioned previously, messages are delivered to and from the data center and the network devices through the routers 250. Messages come in two flavors: application and control. The application messages deliver data content; control messages are used to co-ordinate delivery. Application messages can have one of two delivery methods: Datagram and Standard. Standard messages guarantee persistence via a receipt control message. A message receiver sends a receipt to the sender for one of these messages as soon as the receiver has guaranteed that the message persists somewhere upstream of the sending device. Receipting or persistence functions are not performed for datagrams.
Each router 250 generally implements a protocol as follows:
In a first step 1101, a router 250 receives a message either from a device 10, from the database 210 or from another router 250 using a router-router protocol.
In step 1102, if a delivery method message parameter indicates that the message is to be sent as a datagram, i.e., indicates that the message should not be persisted if currently undeliverable.
In step 1103, the router sends a receipt control message to the sending entity (if the message is from a network device). The receipt object is sent back to the originating sender if using the router-router protocol.
In step 1104, the destination identifier in the message is examined. This will typically contain a network device identifier. However, one special case exists where the destination device ID=HG13 HYPERGATE is used. This indicates a message to be sent to the components of router's internal machine itself, such as its message queue. The router chooses a recipient from its list of registered services and constructs the queue name and destination ID needed to route the message to that service.
In step 1105, a filter function is performed that removes improperly addressed router messages. The only acceptable value is “Router”.
In step 1106, the message is handled as if sent to the router's queue via the internal router queue manager.
Step 1107 is reached if the message had an improper queue name, at which point the message is discarded.
Step 1108 is reached if the message did not have the internal router identifier. In this step, it is determined whether the router ID portion of the device specified in the destination ID matches the router's router ID.
Step 1109 checks to see if the device indicated by the device ID portion has a TCP connection to this router.
In step 1110, the message is sent to the device if connected.
Step 1111 checks to see if the router should discard a datagram sent to a device presumed to be offline.
Step 1112 persists standard messages to devices presumed to be offline. If the specified device is online with another router, that router will get the message via the database.
Step 1113 discards datagrams to offline devices.
Step 1201 is reached if the message is not intended for the router itself. First, the router checks to see if it is connected to the router indicated in the router ID portion of the device indicated in the message's destination ID.
In step 1202, if the device is connected, the router sends message to one of the other routers 250 presumed to be the path to the specified device (a device could switch routers during the period between message creation and message delivery).
At step 1203, if not connected, the router asks the database for the port and IP address on which to make a router-router connection to the destination device's router.
In step 1204, check the database's query for a path to the destination device's router.
In step 1205, if no such path exists, then persist message to database. If the device is online, its router will get the message from the database and deliver it.
In step 1206, a TCP connection is made to the destination device's router.
Step 1207 checks for a connection success or failure (due to timeout, network error, etc.).
In step 1208, the router persist the message to the database if the connection could not be established.
In step 1209, if the connection succeeded, the message is sent to the destination device's router via the router-router protocol.
2.1 Router to Router Extensions
Router to router protocol extensions are implemented to permit the routers 250 to communicate with each other. This protocol follows the same basic principle as router/device communication. A receipt by a router indicates that the message has persisted somewhere upstream. In general, all routers try to forward messages outside of the database, but some database method of persistence has to be available in case the end device is offline.
Router to router communication is different from device to router communication. In general, routers should always be online. Also, routers are a trusted entity within the system and have a less restricted network path to other routers. Router communication is tailored to these considerations. Routers are able to establish a privileged connection with other routers in order to forward messages.
This router-to-router protocol permits the routers to cooperate in order to coordinate the following tasks:
Routers 250 in a multiple router system need to be able to associate a particular network device 10 with the routers that can connect or are connected to the device. This information is localized in a Global Unique Identifier (GUID) assigned to each network device 10. The use of a GUID permits the application level processes to identify destination devices without the need to maintain information as to the specific types of transport in use, or a device's network address. The device GUID hold two pieces of routing information, the network ID and the router ID. The network ID represents the set of routers that can connect to a given device. The router ID represents the particular router in a network that is currently connected to a device. Each router has a unique combination of network and router ID information.
Devices have a device ID that uniquely identifies them. Each device also has a network ID that identifies the sub-network head to which the device is connected. The network ID is not necessarily permanent, since head end configurations may change, but the network ID should persist with the same value for a long period of time. The network ID could also be a head end ID, but using network IDs accommodates a situation where multiple head ends are located in the same sub-network. Each connected device also has a router ID that identifies the router that is attached to it. Together, the device ID, network ID and router ID make up the device GUID, as shown in
A service sending an unsolicited message to a device must get the device ID from some location; typically the database. A function is provided in the database that generates a device's device GUID given the device's device ID. Typically, stored procedures will use the device ID to join tables to the device table, but will write out the device GUID when assembling the final output. A device might not be online when the device GUID function is called. The device GUID function will specify a router ID if none is currently specified and will mark the device as eligible to go online if it is not currently online. The system anticipates that a request for a device GUID indicates that a message will soon be sent to it and tries to prepare the device appropriately. The device GUID function will contain load balancing logic. A device should be associated with the last router to service it, for consistency. A device should be associated with the router that has the least load. The device GUID will weigh these two considerations, reassigning a device if its former router is offline or is experiencing a load that degrades its performance significantly in comparison to other routers on the head end.
3.0 Router Database Tables and Procedures Detail
This section documents database tables and stored procedures used by the routers 250.
3.1 Router Database Tables
Table 1 is a database table T_NETWORK that describes a network. Examples of networks are the data center, the network that the Multiple System Operator (MSO) exposes for control of devices, and the Internet at large.
1 SECURE needs enumerated values in database. Values are defined in inc/Utilities/UTSecurity.hpp.
Table 2, T_ROUTER, represents a router servicing devices or a service that makes connections to the router via the router-router connection.
Note in particular from the above that each router periodically determines a relative load metric and stores this information in the LOAD_METRIC entry in the table. In the preferred embodiment, a lower number indicates a better performing router. As will be understood shortly, the LOAD_METRIC entry is used by the router to determine how often to send an availability message to the network devices 10.
T—ROUTER_NIC, Table 3, represents a network card in a router. Typically, a router will have a network card with an IP address in the data center's firewalled network and one or more cards with IP addresses in an MSO's network.
Table 5, T_ROUTER_TUNING, contains one row that maintains the router tuning parameters used in the database. These parameters are used in the stored procedures.
Table 6, T_SERVICE_TYPE, identifies a particular type of service supported through the router-router connection.
Table 7, T_DEVICE, represents a device hosting a queue manager. T_DEVICE contains information used by several different entities. The columns listed here are the only ones used by the router and its stored procedures.
2 The MAC address is a unique six byte address assigned to every Ethernet protocol network interface device. It uniquely identifies the device.
Table 8, T_CONNECT_REQUEST_IN is used by the router to transmit a set of connect requests to the database via PKG_HGS_CONNECT.SP_HGS_CONNECT_REQUEST.
Table 9, T_HGS_CONNECT_ACTIVITY_IN, is used by the router to inform the database of the set of devices whose connect states have changed. The router populates this table and calls PKG_HGS_CONNECTION.SP_HGS_CONNECT_ACTIVITY to process the inserted rows.
Table 10, T_MESSAGE, contains the routing and delivery information for a message.
Table 11, T_PAYLOAD, is a database entry which contains a portion of a message. The router breaks a message into 256 byte chunks in order to optimize use of space when uploading messages. A given message has one T_MESSAGE row and usually 1-3, but sometimes up to 20 rows in the T_PAYLOAD table.
Table 12, T_MESSAGE_ACTIVITY_IN, is used by the router to inform the database of messages sent and not sent. The router creates a transaction GUID and puts it in each row of T_MESSAGE_ACTIVITY—dIN, then calls PKG_HGS_MESSAGE.SP_HGS_RECORD_MESSAGE_ACTIVITY to process the results.
3.2 Router Stored Procedures
The router's stored procedures are contained in three packages,
PKG_HGS_ROUTER contains the stored procedures that bring a router online, that take the router offline, that reset the watchdog timer, and that find other routers. A generalized router state diagram for these procedures is illustrated in
The following are the parameters for calls to SPS_HGS_NIT:
The stored procedure has the following parameters:
Note in particular from the above that each router periodically determines a relative load metric and stores this information in the LOAD_METRIC. In the preferred embodiment, a lower number indicates a better performing router. As will be understood shortly, the LOAD_METRIC entry is used by the router to determine how often to send an availability message to the network devices 10.
SP_HGS_EXIT has the following parameters:
SP_HGS_FIND_PATH—this stored procedure finds the possible paths between two routers. It has the following parameters:
3.2.2 Router Handling of Connection Requests
The routers also of course handle connection requests from the network devices 10. A state diagram for this process is shown in
The procedures called to implement these states are now discussed. PKG_HGS_CONNECTION contains the stored procedures to record connection requests from devices, to inform routers of devices requiring connection and to record the connection state of these devices. PKG_HGS_CONNECTION has the following stored procedures that are called from the C++ router:
PKG_HGS_CONNECTION also contains a stored procedure,
SP_HGS_ONE_CONNECT_REQUEST, that may be called externally by other stored procedures to bring a device online. This may be done to prepare the device to receive messages from a service.
SP_HGS_CONNECT_REQUEST—This stored procedure records connection requests from devices. Devices send their IP address and listener port when they have messages to send to a router. The stored procedure records these in the database. The router creates rows in the T_CONNECT_REQUEST_IN table, then calls SP_HGS_CONNECT_REQUEST to process the requests.
SP_HGS_CONNECT_REQUEST has the following functions:
SP_HGS_CONNECT_REQUEST has the following parameters:
SP_HGS_CONNECT. The router calls this stored procedure to get the set of devices requiring connection because of connection requests. This includes connection requests from SP_HGS_CONNECT_REQUEST and those due to messages being sent to offline devices. These are cases requiring relatively immediate response. SP_HGS_CONNECT returns a cursor containing the information needed to connect. The procedure has the following parameters:
SP_HGS_MSG_CONNECT—this stored procedure returns the set of connections to be made to devices with messages pending. This call should be made less frequently than SP_HGS_CONNECT (and, if possible, with lower priority) because it is relatively expensive compared to SP_HGS_CONNECT and because the connections do not need to be made in a timely fashion. SP_HGS_MSG_CONNECT has the same parameter signature as SP_HGS_CONNECT.
SP_HGS_DISCONNECT—this stored procedure returns the set of stale device connections. The router should attempt to disconnect from these devices. SP_HGS_DISCONNECT has the same parameter signature as SP_HGS_CONNECT.
SP_HGS_CONNECT_ACTIVITY—the router updates the connection state in T_DEVICE using this stored procedure. The router inserts rows into T_HGS_CONNECT_ACTIVITY_IN. Each row contains a transaction GUID which correlates the row with the particular invocation of SP_HGS_CONNECT_ACTIVITY. SP_HGS_CONNECT_ACTIVITY updates T_DEVICE.CONNECT_STATE for each row processed, deletes the row and sends a result code in CURS_ACTIVITY_PARAM which is returned from the stored procedure.
SP_HGS_ONE_CONNECT_REQUEST—this stored procedure makes a connect request on behalf of some other stored procedure. It operates similarly to SP_HGS_CONNECT_REQUEST (in fact it provides the implementation for SP_HGS_CONNECT_REQUEST in the current, but not subsequent, code base). It has the following parameters:
3.3.3 Router Messaging States
Once connections are made, the routers 250 of course also handle the processing of messages. This process is shown generally in
The stored procedure PKG_HGS_MESSAGE contains the program code that verify incoming messages, that pick messages eligible for transmission, that update message state, and that delete messages. The following messages are intended for external access:
Both SP_HGS_GET_MESSAGES and SP_HGS_RECORD_MESSAGE_ACTIVITY update T_MESSAGE.SEND_STATE. Each of them updates T_MESSAGE.OID whenever it updates T_MESSAGE.SEND_STATE. This allows each stored procedure to exclude rows modified between selection via cursor and update.
SP_HGS_PUT_MESSAGES—the router creates a row in the T_MESSAGE and multiple rows in the T_PAYLOAD table for each message persisted to the database. It uses a unique OID to mark all of these messages and unique IDs to mark each individual message and its payloads. SP_HGS_PUT_MESSAGES validates the destination device IDs—these are created by C++ applications and may be invalid. It deletes any invalid messages and commits the rest.
SP_HGS_GET_MESSAGES—the router retrieves the set of messages to process via this stored procedure. The stored procedure returns a cursor of payloads; these payloads are ordered by message ID and then by payload item index. SP_HGS_GET_MESSAGES changes the message state to STATUS_SEND_IN_PROGRESS for outgoing messages to prevent a resend. SP_HGS_GET_MESSAGES has the following parameters:
SP_HGS_RECORD_MESSAGE_ACTIVITY—this stored procedure records the result of an attempt to send a message retrieved via SP_HGS_GET_MESSAGES. The router inserts rows into T_MESSAGE_ACTIVITY_IN indicating the results of a transfer attempt. It marks each row in this table with a transaction GUID which it passes into SP_HGS_RECORD_MESSAGE_ACTIVITY.
SP_HGS_RECORD_MESSAGE_ACTIVITY deletes any messages marked as sent and sets the send state of any unsent messages to STATUS_SEND_FAILED.
SP_HGS_RECORD_MESSAGE_ACTIVITY has the following parameters:
4.0 Device Connection Protocol
Having now some basic appreciation for the various information maintained to effect message routing, the following mechanisms are used to allow network devices to send connection request messages in an attempt to communicate with the data center through the routers 250 in accordance with the invention.
Basically, there are three possible scenarios for a network device attempting to connect to a router, including broadcast requests, DNS (static IP) requests, and multicast type requests.
In addition, a time field 510 indicating the time of the announcement, and a port number 520 for establishing a connection to the router, are also included. The time field 510 supports synchronization of events within the entire system as well as security functions. The port number provides the port used to address the packet to the router process. A separate network address for the router need not be specified in the payload portion of the packet, since this information can be gleaned from the UDP header information (not shown in
The system allows provisioning for more than one router as equally preferred. For instance, if two routers are at a particular location, then they can each send availability messages. Devices would be as likely to receive one packet as the other. The preferred port number of the router announcer is 18505. The preferred port for connection requests on the router is 18503.
In response to receiving an announcer message, the network devices can then request that they be permitted to connect to the announcing router. This takes the form of a device connection UDP packet. The packet itself contains enough information to discern at least the requesting device's IP address.
There are three cases for the device connect messages shown respectively in
Regardless of the addressing format, the payload portion of the packet data provides the port number and device ID or MAC address for the device, as used by the router in establishing the connection to the requesting network device.
Finally, in response to receipt of one of these messages, a given one of the routers will respond by connecting to the network device 10. The router preferably sends a clock message as the first message to the device. The clock message contains the network device's assigned GUID in the message header field,. The device can then use this GUID as its sender identification for subsequent messages. The clock message can contain a device ID different from the one sent in the case where the MAC address is unknown. The device will persist the new device ID and use it in subsequent device connections.
The particular router 250 chosen for response can be coordinated by the queue manager 260 or in other ways, by taking into account the loading factors of the respective routers 250. For example, a relatively lightly loaded router will be selected for handling the new connection, as opposed to a presently busier one. Round robin, least loaded, or any number of other known load balancing schemes can be employed to select among the available routers 250.
While this invention has been particularly shown and described with references to preferred embodiments thereof, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the scope of the invention encompassed by the appended claims.
This application is a continuation of U.S. application Ser. No. 10/003,805, filed Nov. 2, 2001, which claims the benefit of U.S. Provisional Application No.: 60/253,442, filed on Nov. 28, 2000, the entire teachings of which are incorporated herein by reference.
Number | Date | Country | |
---|---|---|---|
60253442 | Nov 2000 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 10003805 | Nov 2001 | US |
Child | 11091325 | Mar 2005 | US |