On-demand overlay routing for computer-based communication networks

Abstract
Methods and apparatus are disclosed for dynamically discovering and utilizing an optimized network path through overlay routing for the transmission of data. A determination whether to use a default network path or to instead use an alternate data forwarding path through one or more overlay nodes is based on real-time measurement of costs associated with the alternative paths, in response to a user request for transmission of message data to a destination on the network. Cost metrics include delay, throughput, jitter, loss, and security. The system chooses the best path among the default forwarding path and the multiple alternate forwarding paths, and implements appropriate control actions to force data transmission along the chosen path. No modification of established network communication protocols is required.
Description
CROSS-REFERENCE TO RELATED APPLICATIONS

The present application claims priority from U.S. patent application Ser. No. 09/916,628 for ON-DEMAND OVERLAY ROUTING FOR COMPUTER-BASED COMMUNICATION NETWORKS filed Jul. 27, 2001, now U.S. Pat. No. 6,778,502, issued Aug. 17, 2004; which claims priority from U.S. patent application Ser. No. 09/886,966 for ON-DEMAND OVERLAY ROUTING FOR COMPUTER-BASED COMMUNICATION NETWORKS filed Jun. 25, 2001, now U.S. Pat. No. 6,473,405 issued Oct. 29, 2002 which claims priority from U.S. patent application Ser. No. 09/336,487 for ON-DEMAND OVERLAY ROUTING FOR COMPUTER-BASED COMMUNICATION NETWORKS filed Jun. 18, 1999, now U.S. Pat. No. 6,275,470 issued Aug. 24, 2001, the entirety of each of these applications'is incorporated herein by reference for all purposes.


FIELD OF THE INVENTION

This invention relates to computer networks, and more specifically to a mechanism for finding improved communication paths through a heterogeneous computer network by means of an overlay network.


BACKGROUND AND PRIOR ART

The Internet today consists of a collection of interconnected administrative domains. Each domain is under the control of one or more administrators who decide what hardware equipment to employ and what control software to run. This localized control of the administrative domains requires the coexistence of a number of disparate, heterogeneous systems. The basic communication protocol through which different domains communicate is IP (Internet Protocol). Each Internet data communication is translated into the delivery of a sequence of varying sized IP protocol packets that travel across one or more administrative domains until they reach the final destination.


In IP, the sender of the data only specifies the destination address, whereas the network (the collection of hardware and software systems distributed through several administrative domains) chooses a forwarding path through which to route the IP packets. Routing protocols cooperate across different administrative domains, and through a variety of different software and hardware techniques, to monitor the presence and/or the state of connections in the Internet. Because of the great size and heterogeneous nature of the Internet, and the complexity of the routing task, these routing protocols are typically minimalistic and tend to focus on guarantee of connection and minimizing routing hops rather than optimizing performance. The result, among other problems, is the familiar, frustrating user experience of protracted delay when attempting to access information through the World Wide Web, particularly during periods of heavy usage.


Many proposals to improve the utilization of the Internet exist and feature a wide variety of sophistication and/or response time in changing forwarding paths and thus providing the best routing performance. In practice, these proposals are hardly being used because it is very hard to coordinate their deployment into the Internet. Inter-operation among different administrative domains is crucial and any change to the protocols affecting the forwarding paths may greatly affect the availability of connections. As a result, in practice the forwarding paths between endpoints are determined using very simplistic cost functions and/or heuristics and/or manual intervention. This scheme tends to greatly under-utilize the networks. Depending on local configurations, when faults occur, previously chosen forwarding paths that experience a breakage will be followed for several minutes or hours until the fault is remedied or some manual forwarding path reconfiguration occurs. Several companies, such as Inktomi (Traffic Server product, http://www.inktomi.com) and Akamai (FreeFlow product, http://www.akamai.com) are currently offering and/or developing technology for improving Internet communications speeds by mechanisms which essentially replicate or cache copies of frequently-referenced Internet content, and strategically distribute such copies “closer” to the end-user clients who need the information. Such approaches are valuable, but are often limited or ineffective with respect to dynamically generated content (such as cgi-scripted web pages). Moreover, these approaches generally entail significant costs for using large-capacity computer servers to physically store extra copies of massive volumes of data, and for maintaining synchronization among the various repositories of frequently updated content.


What is needed is a mechanism enabling the selection of optimized network paths for the transmission of data, including dynamically generated data, without requiring any change whatsoever to firmly entrenched communication protocols like IP. Furthermore, preferably the mechanism should be essentially transparent to users of the network.


SUMMARY OF THE INVENTION

The present invention provides an on-demand method and system for discovering optimized paths for the transmission of data between source and destination points on a heterogeneous, computer-based communications network. The invention further provides methods and apparatus for transmitting data along such optimized paths, in a transparent manner that does not require modification of existing communication protocols. The data to be transmitted can (but need not) include pages that are dynamically generated in response to an initial request received by the source from the destination, such as an http request to get a cgi-scripted web page.


Briefly, the present invention discloses steps and means, responsive to requests for transmission of data, for measuring a cost of communicating data from the source point to the destination point along a default path, the default path being derived by means of one or more existing routing mechanisms of the communications network. The invention further provides steps and means for measuring the costs of transmitting the message from the source to the destination along one or more non-default, alternative paths passing through a special group of intermediate nodes. In a preferred embodiment, those intermediate nodes are referred to as an “overlay network”. An optimized path for sending the requested transmission is ultimately selected by comparing the default cost against the alternative costs.


Further, the present invention discloses steps and means for transmitting messages along an optimized non-default path passing through overlay nodes, including forwarding of the message from the source to a first one of the intermediate overlay nodes, and from a last one of the intermediate nodes to the destination, in a manner that does not require modification of existing network communication protocols. In a further embodiment, the invention includes steps and means for returning a reply to the transmitted message back along the optimized non-default path from the destination to the source.


Note that whenever referring to “optimized” or “optimal” paths throughout this patent, we simply mean paths that are deemed preferable with respect to selected cost/performance criteria and with respect to a set of identified alternative paths. We are not speaking of global optimality.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 provides an architectural overview of an overlay network, in a preferred embodiment of the present invention, integrated with a heterogeneous client-server network such as the Internet.



FIG. 2 diagrams the basic series of steps performed in a preferred embodiment of the present invention in order to discover an improved forwarding path for data transmission through one or more overlay nodes, and to transmit the data to its intended destination through the improved path.



FIG. 3
a graphically represents an example of overlay network topology, with full mesh connectivity.



FIG. 3
b graphical represents an example of overlay network topology, after pruning in accordance with a preferred embodiment of the present invention.



FIG. 4
a graphically represents the discovery of an optimized path through overlay nodes for transmitting network data from a source to a destination.



FIG. 4
b graphically represents the association of a cost with an optimized path through overlay nodes for transmitting network data from a source to a destination.



FIG. 5 diagrams the steps performed in a preferred embodiment of the invention in order to transmit data along an optimized forwarding path through one or more overlay network nodes, without modification of existing network routing protocols.





DETAILED DESCRIPTION OF THE INVENTION

A. Overview


A preferred embodiment of the present invention provides a mechanism for finding and using optimized paths for the transmission of data between source and destination points on a computer network such as the Internet, for example, without requiring any modifications to existing communication protocols. The mechanism preferably combines an overlay routing mechanism with an on-demand routing mechanism, which may be very briefly summarized as follows:

  • 1) An overlay network of alternate routing mechanisms is constructed on top of the existing Internet routing mechanisms to find and exploit available resources. The overlay routing mechanism is completely transparent and separate from the Internet routing protocols and is preferably deployed throughout some small, but widely distributed, portion of the Internet as a distributed user application. FIG. 1 exemplifies the concept. Nodes 100 and 160 are, respectively, source and destination nodes for an intended communication on a network such as the Internet. These nodes are connected to the underlying network via transmission links 110 and 160, respectively. Nodes 140a-n (connected to the underlying network via links 145a-n) represent other network nodes, and might potentially be nodes that are utilized in a default communication path between node 100 and node 170, depending on the routing mechanisms of the network. Overlay network nodes 130a-n utilize existing network transmission lines and infrastructure, via network links 135a-n, to create a virtual topology. The overlay network preferably includes a number of computing devices such as nodes 130a-n that cooperate to provide forwarding paths overlaid over an underlying network. Overlay network nodes preferably communicate using existing, established Internet protocols and thus do not require any modifications to current standards. Each overlay node 130 preferably includes overlay path module 150, and either the source or destination node similarly includes overlay path module 120; these components are programmed and operable to combine available IP protocols in order to provide additional functionality for exploiting overlay routing when it is advantageous to do so, as described below in detail. In our preferred embodiment, the overlay network includes a set of ordinary computer systems (e.g., Pentium-based PC's) co-located at Internet sites such as major ISP locations. These PC's each include overlay path modules 150 in the form of additional custom software modules, for purposes of the present invention, operable to measure and record connection cost information and optimal forwarding path information, as described in greater detail herein. The overlay network is a virtual network; in other words, although it uses new additional hardware (co-located boxes), it preferably uses the existing network and cabling infrastructure for all communications. Effectively, this overlay network provides a large set of alternate paths with measurable communication costs around the Internet. Clients can use these alternate paths if they are found to provide better service to their desired destinations than would a default path.
  • 2) Alternate, improved forwarding paths through the overlay network nodes are discovered on demand. The process is outlined in the flow diagram of FIG. 2. In step 200, the pertinent process is initiated when a user who is connected to source “A” (i.e., node 100 of FIG. 1) (either directly or indirectly as by way of a network gateway) requests communication of a message to destination B. In response, at step 210, if the threshold cost is exceeded by the default path for the requested communication, then at steps 220-225 (as described in more detail below) overlay path module 120 broadcasts queries which are received and processed by one or more of overlay nodes 130a-n; overlay path modules 150 cooperate to discover alternative paths through overlay nodes 130 and to measure the costs of such alternate paths. Measuring the cost of data transmission along a given path (per steps 210, 220) is generally performed using conventional techniques, depending on the cost metric to be measured. For example, connection delay time can easily be measured by “pinging” the destination of interest from the source node of interest. At steps 230-235 these alternative paths are compared to the existing Internet route or previously chosen overlay routes.
  • 3) If a new path is found through the overlay network nodes that has better performance than the default path, at steps 230 and 235, then at step 240 information describing this improved path is preferably sent to each of the overlay network nodes 130 that will be involved in the new path. At step 250, a preferred embodiment of our invention employs a mechanism to route packets through the new path in a transparent manner and without modification of any of the default Internet communication mechanisms. Preferably, a form of IP encapsulation is used, as described below in more detail. The default path is preferably used in step 260, in those cases where no new path is found through the overlay network nodes that has better performance than the default path.


The various processes and structures in a preferred embodiment of the present invention will now be discussed individually in greater detail.


B. On-Demand Discovery of Improved Overlay Forwarding Paths


1. Monitoring


Our invention preferably provides on-demand routing, discovering and adding useful forwarding paths through the overlay network only when needed. This avoids having to pre-compute and record all possible forwarding paths in advance, and advantageously uses the default Internet routing mechanism for bootstrapping and default operations. More particularly, the preferred embodiment of our invention creates a new forwarding path from endpoint A to endpoint B only when: (1) an end-to-end communication is requested between A and B (per step 200 of FIG. 2), and (2) a path is discovered through the overlay routing network that provides better performance than the default Internet route (per steps 210-215 of FIG. 2).


Therefore, the discovery of an overlay forwarding path preferably starts with monitoring one or more cost/performance metrics of interest for the data communications that are carried out on the default Internet routing path. Such monitoring would most typically be performed at a gateway router or the source endpoint, node 100. Module 120 employs a predetermined cost function that combines the monitored metrics and detects end-to-end communications that do not meet specific predetermined requirements. For such communications, the detection process would extract from the monitoring operations (1) the source address A, (2) the destination address B and (3) the cost of the data communication from A to B. Computation of cost information is discussed further below. This information is then used in the process of on-demand forwarding path discovery, as discussed below.


2. Finding an Improved Path


Source node 100 (as well as any of the routers on the default Internet forwarding path) can potentially discover end-to-end communications that do not meet specific requirements. In that event, in order to initiate steps 220-225, module 120 sends a query to the overlay network nodes 130 to determine if the overlay network is capable of offering a better forwarding path. The query is preferably sent to a specified number (“q”) of the overlay network routers 130, depending on the configuration. In a relatively simple embodiment, each of the q forwarding path query messages preferably includes: (1) a destination address B, (2) a source address A, and (3) an identifier for a predefined cost function F. In the example illustrated in FIG. 1, source A is node 100, and destination B is node 160. Cost function F is preferably drawn from a set of network communication performance metrics such as delay, throughput, jitter or loss, in accordance with the practitioner's priorities and needs.


When each of the q overlay network nodes 130receives a forwarding path query, it performs step 220 and measures the assigned cost function F with respect to communications transmitted to destination address B from overlay node, yielding the value F(B,i). F(B,i) is measured for a default network path from the ith overlay node to destination B. In this simple embodiment, the querying node's module 120 receives a single reply from each of the q overlay network routers queried. The querying node at any time during the reception of the replies may decide to pick a particular forwarding path and ignore any additional query replies. In order to pick an optimized forwarding path, the querying node's module 120 preferably combines the F(B) value in each reply with the cost function F(i,A) which measures the cost of communication to overlay node 130i from the querying node, once again along a default network path. As those of skill in the art will appreciate, the combining of cost functions may entail adding values (as where the cost metric is delay) or calculating the minimum value (as for bandwidth), or in general may involve a complex parameterized combination of the cost functions. In any case, at steps 230-235 module 120 preferably uses the computed total costs for the alternative overlay paths and for the default path to select an optimized path for communication between source node 100 (A) and destination node 160 (B).


3. Finding Improved Paths Through Multiple Overlay Nodes


In general, for an overlay network with multiple overlay nodes 130a-n, it may be useful to consider alternative overlay paths that pass through more than one overlay node (“multi-hop paths”). This section describes an alternative, preferred embodiment that includes discovery of multi-hop paths.


In principle, an overlay network is capable of logical complete connectivity (in other words, any overlay node can communicate with any other node) through the underlying default Internet routing mechanisms. However, for purposes of multi-hop path discovery, it is generally not computationally worthwhile attempting to exhaustively evaluate the set of all possible multi-hop paths. Therefore, in our preferred embodiment, a topological representation of overlay network connectivity is pruned so as to reduce the number of possible forwarding paths to other overlay nodes from any given overlay node to a fixed, relatively small number (“N”). For example, FIG. 3a illustrates the initial topological representation for an overlay network consisting of 8 nodes with complete connectivity, while FIG. 3b illustrates a pruned topology for the same overlay network, but this time with N=2.


In this alternative preferred embodiment, each overlay node module 150 measures the cost of communication (via the underlying network's default communication paths) to all other overlay router nodes. For each of a given node 130i's neighbors, the cost functions L(j,i) measuring the cost of default communication from overlay node 130i to neighbor overlay node 130j are used for pruning and subsequently for route discovery. In the pruning process, each overlay network node 130i starts with the full connectivity mesh to all other overlay network nodes, and a set of costs L(j,i) associated with the links to each other overlay node 130j. The pruning operation preferably consists of two phases. In the first phase, direct links that are more expensive than indirect links are deleted. In the second phase, if there are still more than N direct links from any given overlay node, additional direct links with worst cost functions are pruned. At the end of these two phases each overlay network router has <=N direct link connections, thus satisfying the preferred constraint, and the resulting overall topology of the overlay network may or may not be fully connected. The resulting topology is then used in the subsequent process of alternate path discovery.


The forming of the initial topology and the determination of the final logical topology and associate link costs are preferably performed using the default Internet communication mechanisms. If the overlay nodes are connected to each other by means of specialized or enhanced communication mechanisms—which is by no means required—overlay link costs L(j,i) would be computed on that basis.


Step 225 in conjunction with step 220 of FIG. 2 correspond to the path discovery process in the multi-hop embodiment. In this embodiment, path queries are sent to the overlay network as previously described in the simplified embodiment, but such queries preferably further include a “time-to-live” field (“TTL’) that is decremented each time a forwarding path query is received by a node. Just as in the simplified embodiment, at step 220 each overlay node receiving a path query computes a value F(B,i). In addition, however, if the TTL field is non-zero, each overlay node receiving such a query decrements the TTL field and forwards the query to all of its neighbors in the pruned representation of the overlay network logical topology (preferably at most N neighbors, as discussed above). Each such overlay node then replies to the querying node with its own measured F(B,i), and the set of costs L(i,j) for links to each of its topological neighbors.


In this multi-hop preferred embodiment, in order to compute and compare the relevant total costs for each of the possible overlay forwarding paths at steps 230-235, module 110 of the querying node combines all of the appropriate cost functions. Thus, in the example of FIG. 4a, the ultimate communication path of interest is between gateway node G (through which source node A accesses the network) and destination node B. The cost of the default network path from G to B is represented abstractly by node R, and shown to have total cost C(A,B). FIG. 4a also depicts a pruned topology representation for overlay network 400, as in FIG. 3b, with eight overlay nodes and a connectivity of N=2. As indicated in FIG. 4a, in this example gateway node G sends a single path-discovery query to overlay node O1, and receives a total of three alternate overlay path replies. In FIG. 4b, one such alternate overlay path is the multi-hop forwarding path shown passing from gateway G to overlay node O1 to overlay node O2 and finally to destination B. In that example, the relevant total cost for the alternate overlay path is derived by combining F(O1, G), L(O2, O1), and F(B, O2).


C. Construction and Use of Overlay Forwarding Paths


In the event that an overlay forwarding path is selected at steps 230-235 as the optimized path for sending the user's requested communication, a preferred embodiment of our invention combines existing Internet protocols in an manner that dynamically constructs forwarding paths through the overlay network.


Referring again to FIG. 2, following the detection of an improved overlay forwarding path at steps 230 and 235, information describing the improved forwarding path is stored at step 240 by the originator of the path query (e.g., typically module 110 of source node 100) and by each of the overlay nodes involved in the improved path. The path information is preferably stored at each overlay node 130 in a table or the like, so that when given a specified destination endpoint, an overlay node on the forwarding path can retrieve the address of the next node on the non-default path to whom the message should be forwarded. In a preferred embodiment of our invention, this information may be deleted by the overlay nodes if no end-to-end communication happens between A and B for more than a predefined amount of time, or if the overlay forwarding path's performance is believed to become worse that the default Internet path—or simply after some specified amount of time passes, so that subsequent communication requests will result in discovery and measurement of overlay paths based on the new, current state of the network.



FIG. 5 provides a more detailed view of the method performed to transmit message data through a non-default overlay path (step 250 of FIG. 2), in a preferred embodiment of the present invention. By way of background, message packets in accordance with protocols like the IP protocol generally include “source” and “destination” fields. The “destination” field is used by routing mechanisms in the nodes of the underlying communications network (e.g., the Internet) to forward packets toward their intended destination. In a preferred embodiment of the present invention, a technique called “encapsulation” is a primary mechanism by which our system effectively bypasses default Internet routing paths and utilizes optimized, alternative forwarding paths through overlay nodes. Encapsulation substitutes an original destination IP address with a different destination IP address, and records the original destination address in an encoded capsule.


For illustration, we will begin with a simple example, in which the message is one-way (no reply), and the alternative overlay path is a one-hop path (i.e., it goes through a single overlay node). In this example, the client at node 100 (or a client connected through gateway node 100 to the network) wishes to send a message on a network such as the Internet to destination node 160. In accordance with a preferred embodiment of the present invention, steps 210-240 are first performed, to discover an optimized overlay path for communicating with 160. Suppose this process determines that, at the present moment, an optimized path for sending a message to 160 (better than the default network path, at any rate) is to send packets from 100 to overlay node 130a, and then to forward them from 130a to 160. In other words, the desired path strategy is to send packets from 100 to 130a using the default network path for 100130a, and then forward those packets from 130a to 160 using the default network path for 130a160. At step 250, this transmission is actually carried out, as detailed in FIG. 5. At step 500, overlay software 120 at node 100 addresses the packets to 130a, instead of 160, but also “encapsulates” or encodes the address of 160 in a predetermined format incorporated in the message. The message is then sent to overlay node 130a, at step 510, preferably by means of default network routing mechanisms. When 130a receives the packets, overlay software 150a decodes or de-encapsulates the encapsulated data, and finds the encoded “160” address. At step 520, module 150a of node 130a checks the overlay path information stored earlier at step 240 to identify the next node on the overlay forwarding path. Because, in this example, there are no more overlay nodes on the forwarding path, software 150a proceeds to step 530, and restores the original message with its destination address reset to node 160. Again, because this example involves no reply message, software 150a proceeds to step 580 and simply forwards the packets on to their final destination at node 160. In this way, the original message gets from client (or gateway) 100 to destination node 160, along an optimized non-default path passing through overlay node 130a. This is accomplished without any need to modify the established communications protocols of the underlying network (e.g., IP), and without any modification (or even awareness) of destination node 160.


We next present a further example, involving a multi-hop overlay path; once again, the example treats a one-way communication. In this example, we assume that the process of steps 210-240 discovers an optimized path for transmitting messages from 100 to 160, passing through overlay nodes 130a and 130b. In other words, this time the desired path strategy is to send packets from 100 to 130a using the default network path for 100130a, then forward those packets from 130a to 130b using the default network path for 130a130b, and finally to forward those packets from 130b to 160 using the default network path for 130b 160. Once again, at step 500, overlay software 120 at node 100 addresses the packets to 130a, and encapsulates the address of 160. The message is then sent to overlay node 130a, at step 510. When 130a receives the packets, overlay software 150a finds the encoded “160” address, and at step 520, software 150a of node 130a checks the overlay path information stored earlier at step 240 and identifies overlay node 130b as the next node on the overlay forwarding path. Following the flow of FIG. 5, module 150a loops back to step 510 and forwards the message to overlay node 130b, where module 150b performs similar functionality. This time, at step 520, module 150b determines that there are no more overlay nodes on the forwarding path, and thereupon (at step 530) restores the original message with its destination address reset to node 160. Because this example again involves no reply message, software 150b proceeds to step 580 and forwards the packets on to their final destination at node 160. In this way, the original message gets from client (or gateway) 100 to destination node 160, along an optimized non-default path passing through overlay nodes 130a and 130b; and once again, this is accomplished without any need to modify the established communications protocols of the underlying network.


As a third example, we will now consider the case of a message that requests a return reply (such as an http request to get a file), once again in the context of the multi-hop forwarding path through overlay nodes 130a and 130b as in the previous example. In this scenario, our preferred embodiment operates in the same manner as in the previous example, until module 150b reaches step 535 and determines that the message does indeed request a return reply from the destination node 160. Following the flow in FIG. 5, at step 540 module 150b “masquerades” source information for the packets. In our preferred embodiment, the last overlay node on a forwarding path performs the task of masquerading, in order to allow bi-directional use of the overlay forwarding path. In the absence of masquerading, the reply sent by node 160 to node 100 would normally follow a return path using default network routing. In general, masquerading replaces the source address of IP packets with the address of the node executing the masquerade, and records enough information locally so as to be able restore the original source address if and when a replay IP packet is returned. In a preferred embodiment and in the context of a network like the Internet, module 150 of a masquerading node locally stores the original source address and the port from which it sent the packet (a port uniquely identifies which connections a node has with any other network node). At step 550, overlay node 130b sends the masqueraded message to destination node 160. If and when reply packets are sent from node 160, they will be addressed to overlay node 130b, because of the masqueraded source information. When the reply comes back on the appropriate port of node 130b, at step 570 module 150b retrieves the original source address for node 100 that was previously stored at step 540—which is the true intended destination of the reply message being handled—and constructs a reply message encapsulating the intended destination address of node 100. Returning to step 510, module 150b forwards the encapsulated message to the next overlay node on an optimized path to node 100, by accessing path information previously stored at step 240 (in this case, the path information is of course just the inverse of the optimized overlay path for communications being sent from source 100 to destination 160).


In this manner, control and data packets exchanged between source and destination endpoints on a network are advantageously re-routed through an overlay network without any modification of the source or destination nodes (except for the addition of module 110 at the source), and without any modification of the established communication protocols for the underlying network. This transparency is a valuable benefit created by preferred embodiments of the present invention, because it increases the applicability of this approach as a practical solution for legacy network-based applications.


D. Cost Metrics, Applications


There are many potential applications of this invention to practical problems of interest to companies, individuals, and other entities. Cost/performance metrics may be freely chosen as beneficial for desired applications. For example, preferable metrics include delay, throughput, jitter, and loss. Some sample applications will now be discussed.


1. Reliability


Online trading is an Internet application that is assuming a very important role in today's global economy. Real-time trading requires uninterrupted access to the points of sale. A delay of a few minutes in carrying out an order can cost an online trader large amounts of money. In fact it can be argued that the trader with the best and most reliable Internet service will have a definite advantage over others. In this application of our invention we illustrate how dynamic on-demand overlay routing can allow routing around a failure that would otherwise cause the inability to sell or buy shares.


At present, all Internet routing protocols have a built-in mechanism to rebuild routing paths, and therefore ultimately allow detection and reaction to a network fault in appropriate ways. In the default case, a stock trader's ability to carry out orders in the presence of a link failure is dependent on the rerouting capability of its ISP and may greatly vary. Current routing practices typically require anywhere from a minimum of 45 seconds for a localized ad-hoc solution, to a maximum of several hours depending on the particular ISP. The fast, light-weight, on-demand routing capability made possible in accordance with the present invention can potentially reduce the time required for suitable re-routing to less than a few seconds. In a preferred embodiment, when a stock trader pushes a button to enter a trade, the TCP connection delay is passively measured by a rerouting daemon running on the trader's internal network. This measurement is performed with a timeout of 1 second. In case of a link failure the TCP connection measurement would timeout. Immediately after this measurement, our rerouting daemon sends a query to the overlay network specifying its measured connection time (1 second in case of a link failure). If the overlay network is able to find an alternate route to the destination it will return the new route to the rerouting daemon within a few milliseconds. The new route is immediately installed on the stock trader's local network and any subsequent TCP connection requests are forwarded through the newly discovered route rather than the faulty route. This rerouting mechanism has two major advantages for the stock trader: (1) The reaction to finding a new route is reduced from minutes to less than two seconds and (2) the rerouting mechanism is entirely decoupled from his/her ISP configuration and can be independently managed.


2. Bandwidth


The diffusion of multimedia data through the Internet is likely to become much more prominent with the increase of bandwidth to the home. Current bandwidth availability is enough for audio transmission and some low quality video but in the near future, the increase in bandwidth will allow the transmission of full motion video. In addition to the increase of raw bandwidth Quality of Service Routing and other resource allocation protocols (such as RSVP) will allow user applications to acquire a predictable amount of bandwidth in order to guarantee an adequate level of service. The transition of the Internet to using these new protocols is likely to be problematic and diffused over several years.


In this domain, the present invention enables the addition of an additional layer of control on top of the QOS service provided by Internet standards. In this application the overlay network's function is to oversee the resulting performance of the system and its protocols. In this case one can think of an overlay system in accordance with the present invention as a fall-back when the default Internet mechanism does not deliver the necessary quality of service. An overlay routing system in accordance with the present invention can be used to find paths that offer better bandwidth than those provided by the default Internet protocols (either current or future). In this application the end system which is receiving the video can passively monitor the quality of the video being received. A rerouting daemon running on the local network of the user detects that the video quality is poor by measuring the average bit rate consumed by the reception of the video. When the bit rate falls below a certain threshold the routing daemon can query the overlay network for a better path. The overlay network measures the available bit rates that are available through alternate paths and returns the appropriate overlay-forwarding path to the user (if any). The overlay nodes measure the available bit rate of the alternate paths by requesting a video from the video source and measuring the quality of the link. Such requests will be performed using the default Internet protocols and thus do not need to be described here. The overlay nodes requesting the video should be configured to possess the same credentials of the user on whose behalf the rerouting is attempted. In addition to measuring the effective throughput from the video source, the overlay nodes also measure, through the transmission of test packets, the quality of the overlay links to the user. If an overlay forwarding path with better total bandwidth is found, the routing daemon is notified and the video reception is rerouted through the overlay network. In this transition loss of synchronization may occur and the user may experience discontinuity in the viewing; this drawback needs to be considered in allowing the rerouting only when the discomfort of the signal degradation due to loss of bandwidth can be considered greater than the resynchronization discontinuity.


3. Delay


Hyperspace is bringing people together in ways that were unimaginable a few years ago. The many-to-many communication paradigm made possible by the Internet is creating a revolution in how people communicate, do business and spend their leisure time. In many of these revolutionary applications one gets the illusion of interacting with a community of other users in near real-time. As an example of how our system can be used in this context, we describe a video game application in which a user participates in a video game over the Internet. In this application lowering the transmission delay can enhance the quality of the game. In addition, if the game is played by several individuals located at different locations on the Internet, lower delay may also provide an advantage in playing the game because of a faster response time.


A preferred embodiment of the present invention can find overlay forwarding paths that reduce the total transmission delay. In this type of application the measurement of the quality of the end-to-end default-forwarding path is actively carried out. This type of application would most likely run over UDP, which lacks control-signaling messages that can be used to passively measure round trip delays. Furthermore, unlike the video streaming application, no predefined quality of service can be used in assessing the quality of the link.


In this application the routing daemon (located on the user private network) sends test packets to the destination which provoke a reply (for example an ICMP echo packet). The round-trip delay is therefore iteratively measured by the routing daemon in order to assess the delay to the destination. If the delay is measured to be too high (above a predefined threshold) the routing daemon queries the overlay network to see if a lower delay route can be found. If a lower delay route is found the routing daemon seamlessly switches the route to the overlay thus improving the quality of the transmission. In this case the user may or may not experience any discontinuity in the game depending on how the game is implemented.


E. Conclusion, Scope of the Invention


Thus the reader will see that preferred embodiments of on-demand overlay routing in accordance with the present invention can provide a practical, lightweight, economical mechanism for improving network performance. The mechanism is highly transparent, as well, and does not necessitate changes in underlying network protocols such as IP, or in client application programs that rely upon network communications.


While the above description includes many specifics and examples, these should not be construed as limitations on the scope of the invention, but rather as exemplification of a preferred embodiment thereof. Many other variations are possible. For example, while the previous examples were presented in terms of an IP network like the Internet, the present invention is applicable to networking protocols other than IP, and to other network layers and communication protocols including but by no means limited to http, ftp, TCP, and SSL. The invention is applicable as well to packet-switched networks other than the Internet, and to other static-topology networks (whether packet switched or connection-oriented). Also, the same mechanisms can be used where other network properties are optimized (e.g., security), and can be realized with software-only implementations such as by using active networks infrastructure, or other available computational resources).


Accordingly, the scope of the invention should be determined not by the embodiment illustrated, but by the appended claims and their legal equivalents.

Claims
  • 1. A method for transmitting content in a communications network, the method comprising: (A) configuring a table to cause content to be routed over a first path in said communications network;(B) comparing an elapsed time relative to the transmission of content via the first path against a threshold amount of time;(C) based at least in part on the comparing step (B), when said elapsed time relative to the transmission of content via the first path exceeds the threshold amount of time, querying at least one overlay software module for one or more costs associated with one or more alternate paths;(D) comparing the one or more costs associated with the one or more alternate paths and a cost associated with the first path;(E) based at least in part on the comparing step (D), selecting the first path or an alternate path as an optimal path based at least in part on which path is associated with a lower cost; and(F) modifying the table to cause content to be routed over the optimal path in said communications network; andwherein the communications network comprises the Internet and wherein communication among nodes of the first path uses at least an Internet protocol, and communication among nodes of the one or more alternate paths uses at least the Internet protocol.
  • 2. A method as recited in claim 1, wherein the first path is an overlay forwarding path.
  • 3. A method as recited in claim 1, wherein the modifying step (F) comprises: designating a neighboring node in the optimal path as a next hop.
  • 4. A method as recited in claim 1, wherein a first network comprises the first path and a second network comprises the one or more alternate paths.
  • 5. A node in a communications network, the node comprising: a first port operable to receive content destined for a destination node in the communications network;one or more output ports operable to transmit content to at least a first path in said communications network and a second path in said communications network;an overlay software module operable to determine a first cost associated with the first path and a second cost associated with the second path; anda table configurable to cause content received at the first port to be selectively transmitted from the one or more output ports to either the first path or the second path in response to instructions derived from: (A) an analysis of an amount of elapsed time during which the table has been configured such that content has been transmitted from the one or more output ports to a current path and (B) a comparison of the first cost and the second cost; andwherein the current path comprises the first path and, wherein the table is modifiable to cause content to be routed from the one or more output ports to the second path if the amount of elapsed time exceeds the threshold amount of time and the first cost is greater than the second cost; andwherein the communications network comprises the Internet and wherein communication among nodes of the first path uses at least an Internet protocol, and communication among nodes of the second path uses at least the Internet protocol.
  • 6. A node as recited in claim 5, wherein the first path is an overlay forwarding path.
  • 7. A node as recited in claim 5, wherein the current path comprises the first path and, wherein the table is operable to be modified to designate a neighboring node in the second path as a next hop.
  • 8. A node as recited in claim 5, wherein a first network comprises the first path and a second network comprises the second path.
  • 9. A method for transmitting content in a communications network, wherein a table entry is configured to cause content to be transmitted via a first path in said communications network, the method comprising: (A) comparing an elapsed time associated with transmitting content via the first path with a threshold amount of time;(B) modifying the table to cause content to be transmitted via a second path in said communications network as a result of the comparing step when: (i) the elapsed time associated with transmitting content via the first path exceeds the threshold amount of time; and (ii) a first cost associated with the first path is greater than a second cost associated with the second path, wherein at least the second cost is determined by querying an overlay software module; and wherein the communications network comprises the Internet and wherein communication among nodes of the first path uses at least an Internet protocol, and communication among nodes of the second path uses at least the Internet protocol.
  • 10. A method as recited in claim 9, wherein a first network comprises the first path and a second network comprises the second path.
  • 11. A method for transmitting content in a communications network, the method comprising: (A) configuring a table to cause content be routed to a first path in said communications network;(B) comparing an elapsed time associated with transmitting content via the first path against a threshold amount of time;(C) modifying the table to cause content to be routed to a second path in said communications network when the elapsed time exceeds the threshold amount of time;(D) subsequent to the modifying step (C), comparing a first cost associated with transmitting content via the second path against a threshold cost;(E) if the first cost exceeds the threshold cost, querying at least one overlay software module for one or more costs associated with one or more alternate paths;(F) comparing the first cost and the one or more costs associated with one or more alternate paths;(G) based at least in part on the comparing step (F), selecting the second path or an alternate path as an optimal path based at least in part on which path is associated with a lower cost, and(H) modifying the table to cause content to be routed to the optimal path; andwherein the communications network comprises the Internet and wherein communication among nodes of the second path uses at least an Internet protocol, and communication among nodes of the one or more alternate paths uses at least the Internet protocol.
  • 12. A method as recited in claim 11, wherein the threshold cost is based at least in part on a maximum elapsed time.
  • 13. A method as recited in claim 11, wherein the threshold cost is based at least in part on a delay metric.
  • 14. A method as recited in claim 11, wherein the threshold cost is based at least in part on a performance metric.
  • 15. A method as recited in claim 11, wherein a first network comprises the first path and a second network comprises the second path.
  • 16. A method for transmitting content in a communications network, the method comprising: (A) configuring a table to cause content to be routed via a first path in said communications network, said first path having been determined based at least in part on a first cost associated with transmitting content via the first path; and(B) in response to an elapsed time relative to said configuring in step (A) exceeding a threshold time, querying at least one overlay software module for one or more costs associated with one or more alternate paths;(C) comparing the one or more costs associated with the one or more alternate paths and a second cost associated with the first path;(D) based at least in part on the comparing step (C), selecting the first path or an alternate path as an optimal path based at least in part on which path is associated with a lower cost; and(E) modifying the table to cause content to be routed via the optimal path in said communications network; andwherein the communications network comprises the Internet and wherein communication among nodes of the first path uses at least an Internet protocol, and communication among nodes of the one or more alternate paths uses at least the Internet protocol.
  • 17. A method as recited in claim 16, wherein the second cost and the one or more costs associated with the one or more alternate paths are based at least in part on the then-current state of the network.
  • 18. A method as recited in claim 16, wherein the first path comprises at least one overlay node.
  • 19. A method as recited in claim 16, wherein the one or more alternate paths comprises at least one overlay node.
  • 20. A method for transmitting content in a communications network, the method comprising: (A) configuring a table to cause content to be routed to a first node, a first network comprising said first node; and then, in response to an elapsed amount of time relative to the configuring step (A) exceeding a threshold time,(B) querying at least one overlay software module for one or more costs associated with one or more alternate nodes;(C) comparing the one or more costs associated with the one or more alternate nodes and a cost associated with the first node;(D) based at least in part on the comparing step (C), selecting the first node or an alternate node as a next hop based at least in part on which node is associated with a lower cost; and(E) modifying the table to cause content to be routed to the next hop,wherein the communications network comprises the Internet and wherein communication among nodes on the first network uses at least an Internet protocol, and communication among the one or more alternate nodes uses at least the Internet protocol; andwherein a first overlay path comprises the first node and wherein a second overlay path comprises the one or more alternate nodes.
US Referenced Citations (439)
Number Name Date Kind
4112488 Smith, III Sep 1978 A
4345116 Ash et al. Aug 1982 A
4495570 Kitajima et al. Jan 1985 A
4591983 Bennett et al. May 1986 A
4594704 Ollivier Jun 1986 A
4669113 Ash et al. May 1987 A
4679189 Olson et al. Jul 1987 A
4726017 Krum et al. Feb 1988 A
4788721 Krishnan et al. Nov 1988 A
4803641 Hardy et al. Feb 1989 A
4839798 Eguchi et al. Jun 1989 A
4839892 Sasaki Jun 1989 A
4847784 Clancey Jul 1989 A
4905233 Cain et al. Feb 1990 A
4920432 Eggers Apr 1990 A
4922417 Churm et al. May 1990 A
4943932 Lark et al. Jul 1990 A
4949187 Cohen Aug 1990 A
4949248 Caro Aug 1990 A
4985830 Atac et al. Jan 1991 A
4987536 Humblet Jan 1991 A
5029232 Nall Jul 1991 A
5048011 Melen Sep 1991 A
5058105 Mansour et al. Oct 1991 A
5088032 Bosack Feb 1992 A
5115495 Tsuchiya et al. May 1992 A
5128926 Perlman et al. Jul 1992 A
5130792 Tindell et al. Jul 1992 A
5132992 Yurt et al. Jul 1992 A
5136716 Harvey Aug 1992 A
5172413 Bradley Dec 1992 A
5191573 Hair Mar 1993 A
5218676 Ben-Ayed et al. Jun 1993 A
5233604 Ahmadi et al. Aug 1993 A
5253248 Dravida et al. Oct 1993 A
5253275 Yurt et al. Oct 1993 A
5253341 Rozmanith Oct 1993 A
5287499 Nemes Feb 1994 A
5287537 Newmark et al. Feb 1994 A
5291554 Morales Mar 1994 A
5321815 Bartolanzo, Jr. et al. Jun 1994 A
5341477 Pitkin et al. Aug 1994 A
5371532 Gelman Dec 1994 A
5377262 Bales et al. Dec 1994 A
5410343 Coddington Apr 1995 A
5414455 Hooper May 1995 A
5430729 Rahnema Jul 1995 A
5442389 Blahut Aug 1995 A
5442390 Hooper Aug 1995 A
5442749 Northcutt Aug 1995 A
5452294 Natarajan Sep 1995 A
5457680 Kamm et al. Oct 1995 A
5471467 Johann Nov 1995 A
5471622 Eadline Nov 1995 A
5475615 Lin Dec 1995 A
5491690 Alfonsi et al. Feb 1996 A
5508732 Bottomley Apr 1996 A
5515511 Nguyen May 1996 A
5519435 Anderson May 1996 A
5519836 Gawlick et al. May 1996 A
5526414 Bédard et al. Jun 1996 A
5528281 Grady Jun 1996 A
5532939 Psinakis et al. Jul 1996 A
5539621 Kikinis Jul 1996 A
5542087 Neimat et al. Jul 1996 A
5544313 Shachnai Aug 1996 A
5544327 Dan Aug 1996 A
5550577 Verbiest Aug 1996 A
5550863 Yurt Aug 1996 A
5550982 Long Aug 1996 A
5557317 Nishio Sep 1996 A
5559877 Ash et al. Sep 1996 A
5572643 Judson Nov 1996 A
5590288 Castor Dec 1996 A
5592611 Midgely Jan 1997 A
5594910 Filepp et al. Jan 1997 A
5596722 Rahnema Jan 1997 A
5603026 Demers et al. Feb 1997 A
5608721 Natarajan et al. Mar 1997 A
5619648 Canale Apr 1997 A
5623656 Lyons Apr 1997 A
5625781 Cline Apr 1997 A
5627829 Gleeson et al. May 1997 A
5630067 Kindell May 1997 A
5633999 Clowes May 1997 A
5634006 Baugher et al. May 1997 A
5638443 Stefik et al. Jun 1997 A
5644714 Kikinis Jul 1997 A
5646676 Dewkett et al. Jul 1997 A
5649108 Spiegel et al. Jul 1997 A
5649186 Ferguson Jul 1997 A
5659729 Nielsen Aug 1997 A
5666362 Chen Sep 1997 A
5671279 Elgamai Sep 1997 A
5675734 Hair Oct 1997 A
5682512 Tetrick Oct 1997 A
5699347 Callon Dec 1997 A
5699513 Feigen et al. Dec 1997 A
5712979 Graber et al. Jan 1998 A
5715453 Stewart Feb 1998 A
5721914 DeVries Feb 1998 A
5721916 Pardikar Feb 1998 A
5734831 Sanders Mar 1998 A
5740423 Logan et al. Apr 1998 A
5742762 Scholl Apr 1998 A
5751961 Smyk May 1998 A
5754790 France et al. May 1998 A
5761507 Govett Jun 1998 A
5761663 Lagarde et al. Jun 1998 A
5764906 Edelstein et al. Jun 1998 A
5774526 Propp et al. Jun 1998 A
5774660 Brendel et al. Jun 1998 A
5774668 Choquier et al. Jun 1998 A
5777989 McGarvey Jul 1998 A
5784058 LaStrange et al. Jul 1998 A
5787271 Box et al. Jul 1998 A
5787470 DeSimone et al. Jul 1998 A
5790541 Patrick et al. Aug 1998 A
5796952 Davis Aug 1998 A
5799141 Galipeau et al. Aug 1998 A
5802106 Packer Sep 1998 A
5802291 Balick et al. Sep 1998 A
5802503 Sansone Sep 1998 A
5812769 Graber et al. Sep 1998 A
5815664 Asano Sep 1998 A
5819092 Ferguson Oct 1998 A
5826031 Nielsen Oct 1998 A
5828847 Gehr Oct 1998 A
5832506 Kuzma Nov 1998 A
5832514 Norin et al. Nov 1998 A
5835718 Blewett Nov 1998 A
5838906 Doyle et al. Nov 1998 A
5845303 Templeman Dec 1998 A
5854899 Callon et al. Dec 1998 A
5856974 Gervais et al. Jan 1999 A
5862339 Bonnaure Jan 1999 A
5867706 Martin et al. Feb 1999 A
5867799 Lang et al. Feb 1999 A
5870546 Kirsch Feb 1999 A
5870559 Leshem et al. Feb 1999 A
5878212 Civanlar et al. Mar 1999 A
5884038 Kapoor Mar 1999 A
5890171 Blumer et al. Mar 1999 A
5893116 Simmonds et al. Apr 1999 A
5894554 Lowery et al. Apr 1999 A
5896533 Ramos et al. Apr 1999 A
5898668 Shaffer Apr 1999 A
5903723 Beck et al. May 1999 A
5907704 Gudmundson et al. May 1999 A
5913028 Wang et al. Jun 1999 A
5913033 Grout Jun 1999 A
5918010 Appleman et al. Jun 1999 A
5918021 Aditya Jun 1999 A
5919247 Van Hoff et al. Jul 1999 A
5920701 Miller et al. Jul 1999 A
5922049 Radia et al. Jul 1999 A
5931904 Banga Aug 1999 A
5933832 Suzuoka et al. Aug 1999 A
5935207 Logue et al. Aug 1999 A
5944780 Chase Aug 1999 A
5945989 Freishtat et al. Aug 1999 A
5956489 San Andres et al. Sep 1999 A
5956716 Kenner Sep 1999 A
5958008 Pogrebisky et al. Sep 1999 A
5961596 Takubo et al. Oct 1999 A
5966440 Hair Oct 1999 A
5968121 Logan et al. Oct 1999 A
5978791 Farber et al. Nov 1999 A
5983214 Lang et al. Nov 1999 A
5983227 Nazem et al. Nov 1999 A
5987606 Cirasole et al. Nov 1999 A
5991809 Kriegsman Nov 1999 A
5996025 Day Nov 1999 A
6002720 Yurt et al. Dec 1999 A
6003030 Kenner et al. Dec 1999 A
6006264 Colby et al. Dec 1999 A
6012090 Chung et al. Jan 2000 A
6014686 Elnozahy et al. Jan 2000 A
6014698 Griffiths Jan 2000 A
6016307 Kaplan et al. Jan 2000 A
6018516 Packer Jan 2000 A
6021426 Douglis Feb 2000 A
6026440 Sharder et al. Feb 2000 A
6029175 Chow et al. Feb 2000 A
6029176 Cannon Feb 2000 A
6035332 Ingrassia, Jr. et al. Mar 2000 A
6038216 Packer Mar 2000 A
6038310 Hollywood et al. Mar 2000 A
6038610 Belfiore et al. Mar 2000 A
6041324 Earl et al. Mar 2000 A
6044405 Driscoll, III et al. Mar 2000 A
6046980 Packer Apr 2000 A
6049831 Gardell et al. Apr 2000 A
6052718 Gifford Apr 2000 A
6052730 Feliciano et al. Apr 2000 A
6065051 Steele et al. May 2000 A
6065062 Periasamy et al. May 2000 A
6070191 Narendran et al. May 2000 A
6078943 Yu Jun 2000 A
6081829 Sidana Jun 2000 A
6081835 Antcliff Jun 2000 A
6084858 Matthews et al. Jul 2000 A
6092112 Fukushige Jul 2000 A
6092204 Baker Jul 2000 A
6098078 Gehani Aug 2000 A
6105028 Sullivan et al. Aug 2000 A
6108673 Brandt et al. Aug 2000 A
6108703 Leighton et al. Aug 2000 A
6112231 DeSimone et al. Aug 2000 A
6112239 Kenner et al. Aug 2000 A
6112240 Pogue et al. Aug 2000 A
6115357 Packer et al. Sep 2000 A
6115752 Chauhan Sep 2000 A
6119143 Dias et al. Sep 2000 A
6125388 Reisman Sep 2000 A
6125394 Rabinovich Sep 2000 A
6128279 O'Neil et al. Oct 2000 A
6128601 Van Horne et al. Oct 2000 A
6128660 Grimm et al. Oct 2000 A
6130890 Leinwand et al. Oct 2000 A
6134583 Herriot Oct 2000 A
6137792 Jonas et al. Oct 2000 A
6144375 Jain et al. Nov 2000 A
6144702 Yurt et al. Nov 2000 A
6144996 Starnes et al. Nov 2000 A
6151624 Teare et al. Nov 2000 A
6154738 Call Nov 2000 A
6154744 Kenner et al. Nov 2000 A
6154753 McFarland Nov 2000 A
6154777 Ebrahim Nov 2000 A
6163779 Mantha et al. Dec 2000 A
6167427 Rabinovich et al. Dec 2000 A
6173311 Hassett et al. Jan 2001 B1
6173322 Hu Jan 2001 B1
6178160 Bolton et al. Jan 2001 B1
6181867 Kenner et al. Jan 2001 B1
6185598 Farber et al. Feb 2001 B1
6185619 Joffe et al. Feb 2001 B1
6189030 Kirsch et al. Feb 2001 B1
6189039 Harvey Feb 2001 B1
6195680 Goldszmidt Feb 2001 B1
6205120 Packer et al. Mar 2001 B1
6226618 Downs May 2001 B1
6226642 Beranek et al. May 2001 B1
6230196 Guenthner et al. May 2001 B1
6236642 Shaffer et al. May 2001 B1
6243752 Butt Jun 2001 B1
6243760 Armbruster et al. Jun 2001 B1
6249810 Kiraly Jun 2001 B1
6256675 Rabinovich Jul 2001 B1
6263313 Milsted Jul 2001 B1
6266699 Sevcik Jul 2001 B1
6269394 Kenner et al. Jul 2001 B1
6272566 Craft Aug 2001 B1
6275470 Ricciulli Aug 2001 B1
6282569 Wallis et al. Aug 2001 B1
6282574 Voit Aug 2001 B1
6286045 Griffiths et al. Sep 2001 B1
6298041 Packer Oct 2001 B1
6310858 Kano et al. Oct 2001 B1
6311214 Rhoads Oct 2001 B1
6314565 Kenner et al. Nov 2001 B1
6330602 Law et al. Dec 2001 B1
6332195 Green et al. Dec 2001 B1
6338044 Cook et al. Jan 2002 B1
6347085 Kelly Feb 2002 B2
6360256 Lim Mar 2002 B1
6363053 Schuster et al. Mar 2002 B1
6370571 Medin, Jr. Apr 2002 B1
6370580 Kriegsman Apr 2002 B2
6398245 Gruse Jun 2002 B1
6400681 Bertin et al. Jun 2002 B1
6405252 Gupta et al. Jun 2002 B1
6405257 Gersht et al. Jun 2002 B1
6412000 Riddle et al. Jun 2002 B1
6415280 Farber et al. Jul 2002 B1
6418421 Hurtado Jul 2002 B1
6421726 Kenner et al. Jul 2002 B1
6430618 Karger et al. Aug 2002 B1
6442549 Schneider Aug 2002 B1
6449259 Allain et al. Sep 2002 B1
6452922 Ho Sep 2002 B1
6456630 Packer et al. Sep 2002 B1
6460082 Lumelsky Oct 2002 B1
6460085 Toporek et al. Oct 2002 B1
6463454 Lumelsky Oct 2002 B1
6463508 Wolf Oct 2002 B1
6470389 Chung et al. Oct 2002 B1
6473405 Ricciulli Oct 2002 B2
6480893 Kriegsman Nov 2002 B2
6484143 Swildens et al. Nov 2002 B1
6484204 Rabinovich Nov 2002 B1
6490580 Dey et al. Dec 2002 B1
6493707 Dey et al. Dec 2002 B1
6496477 Perkins et al. Dec 2002 B1
6496856 Kenner et al. Dec 2002 B1
6502125 Kenner et al. Dec 2002 B1
6502135 Munger et al. Dec 2002 B1
6502215 Raad et al. Dec 2002 B2
6505248 Casper et al. Jan 2003 B1
6507577 Mauger et al. Jan 2003 B1
6512761 Schuster et al. Jan 2003 B1
6529477 Toporek et al. Mar 2003 B1
6529499 Doshi et al. Mar 2003 B1
6542469 Kelley et al. Apr 2003 B1
6553413 Leighton et al. Apr 2003 B1
6553420 Karger et al. Apr 2003 B1
6557054 Reisman Apr 2003 B2
6564251 Katariya et al. May 2003 B2
6577595 Counterman Jun 2003 B1
6577600 Bare Jun 2003 B1
6581090 Lindbo et al. Jun 2003 B1
6584083 Toporek et al. Jun 2003 B1
6587837 Spagna Jul 2003 B1
6591299 Riddle et al. Jul 2003 B2
6611812 Hurtado et al. Aug 2003 B2
6611862 Reisman Aug 2003 B2
6611872 McCanne Aug 2003 B1
6614781 Elliott et al. Sep 2003 B1
6625643 Colby et al. Sep 2003 B1
6654344 Toporek et al. Nov 2003 B1
6654807 Farber et al. Nov 2003 B2
6658464 Reisman Dec 2003 B2
6658479 Zaumen et al. Dec 2003 B1
6665706 Kenner et al. Dec 2003 B2
6665726 Leighton et al. Dec 2003 B1
6690651 Lamarque, III et al. Feb 2004 B1
6691148 Zinky et al. Feb 2004 B1
6694358 Swildens et al. Feb 2004 B1
6697333 Bawa et al. Feb 2004 B1
6699418 Okada et al. Mar 2004 B2
6708137 Carley Mar 2004 B2
6718328 Norris Apr 2004 B1
6741563 Packer May 2004 B2
6744767 Chiu et al. Jun 2004 B1
6751673 Shaw Jun 2004 B2
6754219 Cain et al. Jun 2004 B1
6754699 Swildens et al. Jun 2004 B2
6754706 Swildens et al. Jun 2004 B1
6763377 Belknap et al. Jul 2004 B1
6763388 Tsimelzon Jul 2004 B1
6778494 Mauger Aug 2004 B1
6778502 Ricciulli Aug 2004 B2
6799221 Kenner et al. Sep 2004 B1
6801576 Haldeman et al. Oct 2004 B1
6831895 Ji et al. Dec 2004 B1
6834306 Tsimelzon Dec 2004 B1
6842604 Cook et al. Jan 2005 B1
6859791 Spagna Feb 2005 B1
6870851 Leinwand et al. Mar 2005 B1
6874032 Gersht et al. Mar 2005 B2
6888797 Cao et al. May 2005 B1
6901604 Kiraly May 2005 B1
6904017 Meempat et al. Jun 2005 B1
6915329 Kriegsman Jul 2005 B2
6928442 Farber et al. Aug 2005 B2
6934255 Toporek et al. Aug 2005 B1
6950623 Brown et al. Sep 2005 B2
6954784 Aiken, Jr. et al. Oct 2005 B2
6963910 Belknap Nov 2005 B1
6963980 Mattsson Nov 2005 B1
6963981 Bailey et al. Nov 2005 B1
6965890 Dey et al. Nov 2005 B1
6970432 Hankins et al. Nov 2005 B1
6973485 Ebata et al. Dec 2005 B2
6973490 Robertson et al. Dec 2005 B1
6981050 Tobias et al. Dec 2005 B1
6981180 Bailey et al. Dec 2005 B1
6996616 Leighton et al. Feb 2006 B1
7003572 Lownsbrough et al. Feb 2006 B1
7007089 Freedman Feb 2006 B2
7010578 Lewin et al. Mar 2006 B1
7012900 Riddle Mar 2006 B1
7039633 Dey et al. May 2006 B1
7047300 Oehrke et al. May 2006 B1
7054935 Farber et al. May 2006 B2
7058706 Iyer et al. Jun 2006 B1
7069177 Carley Jun 2006 B2
7096266 Lewin et al. Aug 2006 B2
7103564 Ehnebuske Sep 2006 B1
7103645 Leighton et al. Sep 2006 B2
7110984 Spagna Sep 2006 B1
7117259 Rohwer Oct 2006 B1
7127513 Karger et al. Oct 2006 B2
7159035 Garcia-Luna-Aceves et al. Jan 2007 B2
7187658 Koyanagi et al. Mar 2007 B2
7188085 Pelletier Mar 2007 B2
7206748 Gruse Apr 2007 B1
7240100 Wein et al. Jul 2007 B1
7260060 Abaye et al. Aug 2007 B1
7457233 Gan et al. Nov 2008 B1
20010029525 Lahr Oct 2001 A1
20010056500 Farber et al. Dec 2001 A1
20020018449 Ricciulli Feb 2002 A1
20020023164 Lahr Feb 2002 A1
20020023165 Lahr Feb 2002 A1
20020032029 Angin Mar 2002 A1
20020040404 Lahr Apr 2002 A1
20020042817 Lahr Apr 2002 A1
20020046273 Lahr et al. Apr 2002 A1
20020046405 Lahr Apr 2002 A1
20020049857 Farber et al. Apr 2002 A1
20020059592 Kiraly May 2002 A1
20020062388 Ogier et al. May 2002 A1
20020066038 Mattsson May 2002 A1
20020073199 Levine et al. Jun 2002 A1
20020082999 Lee et al. Jun 2002 A1
20020083124 Knox et al. Jun 2002 A1
20020099850 Farber et al. Jul 2002 A1
20020124080 Leighton et al. Sep 2002 A1
20020129134 Leighton et al. Sep 2002 A1
20020131645 Hamilton Sep 2002 A1
20020143798 Lisiecki et al. Oct 2002 A1
20020143888 Lisiecki et al. Oct 2002 A1
20020147774 Lisiecki et al. Oct 2002 A1
20020147842 Breitbart et al. Oct 2002 A1
20020163882 Bornstein et al. Nov 2002 A1
20020163889 Yemini et al. Nov 2002 A1
20020199016 Freedman Dec 2002 A1
20030009444 Eidler et al. Jan 2003 A1
20030018966 Cook et al. Jan 2003 A1
20030028623 Hennessey et al. Feb 2003 A1
20030028626 Hennessey et al. Feb 2003 A1
20030028777 Hennessey et al. Feb 2003 A1
20030055972 Fuller et al. Mar 2003 A1
20030061263 Riddle Mar 2003 A1
20030061280 Bulson et al. Mar 2003 A1
20030078888 Lee et al. Apr 2003 A1
20030078889 Lee et al. Apr 2003 A1
20030105604 Ash et al. Jun 2003 A1
20040022194 Ricciulli Feb 2004 A1
20040139097 Farber et al. Jul 2004 A1
20040177148 Tsimelzon Sep 2004 A1
20050033858 Swildens et al. Feb 2005 A1
20050038851 Kriegsman Feb 2005 A1
20050100027 Leinwand et al. May 2005 A1
20050114296 Farber et al. May 2005 A1
20050262104 Robertson et al. Nov 2005 A1
20060143293 Freedman Jun 2006 A1
Foreign Referenced Citations (24)
Number Date Country
763380 Nov 2003 AU
2202572 Oct 1998 CA
2335661 Sep 2001 CA
2335662 Sep 2001 CA
2467998 Apr 2006 CA
ZL99810853.7 Aug 2004 CN
0637153 Jul 1993 EP
0637153 Jul 1993 EP
0660569 Dec 1993 EP
0343611 Aug 1994 EP
0865180 Sep 1998 EP
0660569 Dec 1998 EP
1104555 Jun 2001 EP
2353877 Mar 2004 GB
140935 Mar 2006 IL
5-130144 May 1993 JP
10-70571 Mar 1998 JP
2002522995 Jul 2002 JP
3566626 Jun 2004 JP
2005124165 May 2005 JP
3762649 Jan 2006 JP
176482 Aug 2003 NI
WO 9857465 Dec 1998 WO
WO 0033511 Aug 2000 WO
Related Publications (1)
Number Date Country
20040022194 A1 Feb 2004 US
Continuations (3)
Number Date Country
Parent 09916628 Jul 2001 US
Child 10630559 US
Parent 09888966 Jun 2001 US
Child 09916628 US
Parent 09336487 Jun 1999 US
Child 09888966 US