This application is related to the following patent applications: U.S. application Ser. No. 11/262,549, entitled “Sharing Data in Scalable Software Blade Architecture,” to Torsten Schulz et al.; U.S. application Ser. No. 11/262,340, entitled “Recovering a Blade in a Software Blade Architecture,” to Markus Meyer et al., which are filed concurrently herewith and are hereby incorporated by reference in their entirety.
The present invention relates to the field of providing services to one or more user devices in a communication network. In particular, the present invention relates to a system and method for servicing user accounts in a scalable software blade architecture.
The recent proliferation of electronic devices for communication, information management and recreation has moved routine computing power away from the desk-bound personal computer. Users are using devices such as cell phones, camera phones, personal digital assistants (PDAs) and navigation systems, not only in the office and in the home, but also in the field and on the road. There is a diverse range of possible applications for such devices, including communication, business, navigation, entertainment and even managing basic daily activities. Many users today only use a single device for a single task, for example, using cell phones for making and receiving phone calls. However, these devices are no longer single-function devices. They are capable of creating various types of data, for instance, electronic mail, voice messages, photos, video, etc. Increasing the number of functions of a device increases the level of personalization to the users. It is desirable to provide users a connected-service to connect and access their data wherever they are, with whatever device they are using and whatever service they are connected to.
One of the challenges of scalable software blade architecture is that when a blade fails, the system needs to replace the failing blade or transfer the user accounts from the failing blade to other blades in the system behind the scenes. Thus, there is a need for recovering a failing blade seamlessly or with minimal interruption to the service of the user accounts. Moreover, there is also a need for reducing the cost associated with transferring a large amount of data to or from the central database during the recovery of the failing blade.
Another challenge of scalable software blade architecture is to share data between two or more users on different blades. Communication of user data between blades is difficult because the blades are stateless with respect to the user data, which may be shared by one or more devices belong to the user. Thus, there is a need for sharing data between two or more users hosted by different blades while keeping each blade stateless with respect to the data to be shared. In addition, there is a need for sharing data between two or more users hosted by different blades while keeping devices of both users up-to-date with the data according to the settings and capabilities of the user devices.
In one embodiment, a system for servicing user accounts includes one or more blades for servicing the user accounts, where each blade includes software components and hardware components, and each blade serves a group of user accounts, a blade manager for managing states of the one or more blades, and logic for incrementally adding one or more new blades in response to increase in the number of new user accounts.
In another embodiment, a method for servicing user accounts includes partitioning tasks of servicing the user accounts into one or more blades, where each blade includes software components and hardware components, and each blade serves a group of user accounts, managing states of the one or more blades by a blade manager, and incrementally adding one or more new blades in response to increase in the number of new user accounts.
The aforementioned features and advantages of the invention as well as additional features and advantages thereof will be more clearly understandable after reading detailed descriptions of embodiments of the invention in conjunction with the following drawings.
Like numbers are used throughout the figures.
The present invention enables servicing user accounts in scalable software blade architecture. The following descriptions are presented to enable any person skilled in the art to make and use the invention. Descriptions of specific embodiments and applications are provided only as examples. Various modifications and combinations of the examples described herein will be readily apparent to those skilled in the art, and the general principles defined herein may be applied to other examples and applications without departing from the spirit and scope of the invention. Thus, the present invention is not intended to be limited to the examples described and shown, but is to be accorded the widest scope consistent with the principles and features disclosed herein.
Some portions of the detailed description which follows are presented in terms of flowcharts, logic blocks, and other symbolic representations of operations on information that can be performed on a computer system. A procedure, computer-executed step, logic block, process, etc., is here conceived to be a self-consistent sequence of one or more steps or instructions leading to a desired result. The steps are those utilizing physical manipulations of physical quantities. These quantities can take the form of electrical, magnetic, or radio signals capable of being stored, transferred, combined, compared, and otherwise manipulated in a computer system. These signals may be referred to at times as bits, values, elements, symbols, characters, terms, numbers, or the like. Each step may be performed by hardware, software, firmware, or combinations thereof.
Some examples described herein provide systems and methods for providing an aggregated backend (e.g., comprising one or more server computers) that supports a user account (e.g., such as a Yahoo! email account or the like), where the aggregated backend includes data available on other backends of associated content nodes (e.g., other users accounts, exchanges, devices, etc.). For example, a user may have two or more email accounts, including various applications, such as email, contacts, calendar, and the like associated with each account. A first user account backend may mirror data of a second user account, such that data of the second account is accessible through the first user backend. The aggregated data is principally organized as a connected dataset having separate substructures, e.g., folder or other data file grouping system, provided by different content nodes. In one example, a connected dataset is established with an aggregated backend for each application type, whereby aggregation of two or more substructures, e.g., folder or other data file grouping system, provided by other content nodes also associated with or linked to the connected dataset, is done. In this manner a user may access data stored by two or more backends through one content node associated with the aggregated backend.
A connected-data service enables users to share and access their connected dataset with any device at any time from anywhere. Client devices (also referred to as user devices) may include cellular phones, wireless personal digital assistants, navigation devices, personal computers, game consoles, Internet terminals, and Kiosks. A connected dataset may include emails, contacts, calendar, tasks, notes, pictures, documents, music, videos, bookmarks, and links. A connected-data service is implemented by one or more content router servers (CRS). A CRS may be implemented by one or more computers/servers in different geographical locations. The CRS manages the connected dataset among the different computing devices on which a user may create or store data, including personal computers, mobile devices, servers, and web portals. A scalable software blade architecture includes one or more blades implementing a corresponding CRS for servicing a predefined group of user accounts. Each CRS may have different configurations or versions of hardware and software components. As the number of user accounts increases, the scalable software blade architecture may incrementally add new blades for servicing the new user accounts.
Each blade implements a CRS and includes a user web UI 130, a device manager 132, a content router 133, a DataSource gateway 134, a poller logic 136, and a pusher logic 138. The DataSource gateway 134 includes components for accessing user accounts. For example, it may access IMAP, POP, Exchange, and SyncML accounts through web.de, GMX, or MSN.
The system further includes a blade manager proxy 140 for functioning as a front-end interface between the blade manager 104 and the user devices 110 via the Internet. It is used to shield the blade manager 104 against direct access from the Internet, and thus protects the blade manager from unauthorized accesses. The blade manager proxy 140 includes re-direct logic 142 for directing a user device to a new blade in case the blade hosting the device has failed or in case the old blade has moved.
The device controller 204 further includes a software management unit 216, a service manager 218, a settings change dispatcher 220, and a device state storage 222. The software management unit 216 initiates and controls installations, updates, and de-installations of applications for the user devices. The service manager 218 manages the types of services supported for the user devices. The service manager provides information to the smart content routing unit 214 for transferring the connected-date-set among the user devices and the content router server. The setting change dispatcher 220 provides changes in device settings from the device manager to the user devices. The device state storage 222 stores the information about the operating states of the user devices.
The device description storage 206 stores type descriptions 224, transcodings 226, account templates 228, and service descriptions 230 of the user devices 110 supported by the connected-data service. The device manager associates user devices with different combinations of type descriptions, transcodings, account templates, and service descriptions such that each of the combinations may be tested and verified for a predefined group of user devices. As a result, different service lines containing corresponding device characteristics and services may be provided to different groups of users.
The protocol adapters 208 may include a provisioning unit 232, a record exchange unit 234, a setting exchange unit 236, an application exchange unit 238, a SyncML unit 240, and other adaptor units 242. Note that the functional units of the device manager described above (i.e. logical blocks 202-244) may be implemented in software, hardware, or a combination of software and hardware. The interactions among the functional units are further described in U.S. application Ser. No. 11/182,663, entitled “System and Method for Provisioning a User Device,” to Markus Meyer et al., which is hereby incorporated by reference in its entirety.
The device gateway 264 is shown coupling the protocol adapter 208 to a mobile phone 310-1 running a SyncML protocol 910-1 and a Java™ based client device 310-2 operating with a binary protocol 910-2. The server gateway 266 is shown coupling the protocol adapter 208 to a PIM server 320-1, a photo server 320-2, and an email server 320-3 with protocols 920-1, 920-2, and 920-3, respectively.
A common protocol, such as XML-RPC, allows applications running on disparate operating systems and in different environments to make remote procedure calls using HTTP as a transport layer and XML as an encoding scheme. The XML-RPC protocol allows complex data structures to be transmitted from an application running on the device gateway 264, the server gateway 266, an XML-RPC-enabled device, or an XML-RPC-enabled server to the protocol adapter 208 and the store and forward logic 210. The protocol adapter 208 or the store and forward logic 210 may process the received data structure and return a result to the application.
Content nodes having the capability to communicate using the common protocol may bypass the gateway and may communicate directly with the protocol adapter 208. For example, a Symbian device or a WinCE, Win32 or home personal computer (PC) 310-3 running a client application may communicate directly with the protocol adapter 208, which avoids the device gateway 264, since the PC 310-3 already employs the common protocol. Additionally, a smart phone 310-4 may also communicate using the common protocol avoid the device gateway 264. Similarly, user accounts may use the common protocol thereby bypassing the server gateway 266 to communicate with the protocol adapter 208. As shown, a Yahoo!® server 320-4 uses the common protocol thereby avoiding the server gateway 266. In some embodiments, a content node communicates with commands 400 directly (not shown), and thus may avoid using a protocol adapter 208.
By using a common protocol, the protocol adapter 208 may treat messages 801 from device gateway 264, messages 803 from a server gateway 266, messages 810-3, 810-4 from user devices 310-3, 310-4 and messages 820-4 from user accounts 320-4 similarly, thereby simplifying the design and implementation of the protocol adapter 208. Therefore, incoming messages in the common protocol are treated similarly regardless of input path to the protocol adapter 208. As a result, the store and forward logic 210 may treat commands from each content node similarly.
The content router 133 may also include a notification signal (dotted line) sent from the store and forward logic 210 to a device and/or server gateway 264, 266 as shown in
In some embodiments, after a gateway 264, 266 receives a notification signal and fetches an outgoing command, the gateway prepares an outgoing notification message containing the command. If the outgoing command is relatively small in size, the gateway 264, 266 may include the command within the notification.
According to some embodiments, the store and forward logic 210 determines that a notification may be sent to a content node to inform the content node that the outgoing queue (within the store and forward logic 210) may contain an outgoing command. The store and forward logic 210 generates a notification signal for a gateway 264, 266. The gateway 264, 266 receives a notification signal from the store and forward logic 210. The notification signal may indicate availability of an outgoing command in the outgoing queue for a content node. In response to receiving the notification signal, the gateway 264, 266 may request the outgoing command, for example, by a call to the protocol adapter 208. The protocol adapter 208 retrieves the command from the store and forward logic 210, which provides it to the gateway 264, 266. The gateway 264, 266 receives the response containing the outgoing command. The gateway 264, 266 prepares an outgoing notification containing the outgoing command. The gateway 264, 266 may encode the outgoing command into a compact binary sequence. The gateway 264, 266 then sends the outgoing notification to the content node, which may be either a user device 310 such as a mobile phone or a user account 320 such as an email account. For example, a device gateway 264 may send the outgoing notification to a mobile phone by way of an SMS gateway. The gateway 264, 266 may send an acknowledgement of the outgoing notification to the store and forward logic 210 via the protocol adapter 208. Note that the functional units of the content router 133 described above may be implemented in software, hardware, or a combination of software and hardware. The interactions among the functional units of the content router are further described in U.S. application Ser. No. 11/182,287, entitled “Content Router,” to Torsten Schulz et al., which is hereby incorporated by reference in its entirety.
As described above, each blade implements a CRS. One benefit of this approach is that it eliminates the need for synchronizing or accessing data through a very fast network from other machines as required by the prior art system shown in
Note that configurations information such as the connectivity of devices and accounts (which device is connected to which account and what filters are set), and filters are backed up. The system is able to recover with that configuration data only. Therefore, the amount of backup data and number of backup calls per device are reduced.
Content data are not permanently stored in a blade. The blade is able to recover from a server crash without that data. With this approach, the user does not lose data, because user data is fetched and dispatched from the user devices and user accounts. Global data is hosted by the blade manager. A blade polls the blade manager from time to time for changes to the configuration data, retrieves and stores the changes in a local cache on the blade. Exchanging user content data between blades is done through a store-and-forward mechanism as described above in association with
As shown in
To invite user B to share data, user A creates an invite B message and sends the message to blade A. Blade A passes the invitation to the blade manager. Next, the blade manager determines whether user B exists and has access to the connected-data service. If user B does not exist or has no access to the connected-data service, a notification is sent to user A regarding the status of the invitation. In the alternative, if user B does exist and has access to the connected-data service, the blade manager sends the invitation message to user B (shown as the dotted line). Note that the invitation message may be presented in various formats such as electronic mail, instant messenger, or hyperlink to a webpage. In another approach, the blade manager may delegate the task of sending the invitation message to blade B.
The pipe device receives changes to dataset AB made by user B, and checks for access restrictions given to user B with respect to the dataset AB. If user B is not authorized to modify the dataset AB, no change will be made to the dataset AB. In the alternative, if user B is authorized to modify the dataset AB, then the dataset AB is modified by user B. The changes to dataset AB are propagated by the pipe device from blade B to blade A. Therefore by using the pipe device, user B can access the dataset AB on blade B without accessing blade A, and access restrictions for user B to the dataset AB are enforced without accessing blade A.
It will be appreciated that the above description for clarity has described embodiments of the invention with reference to different functional units and processors. However, it will be apparent that any suitable distribution of functionality between different functional units or processors may be used without detracting from the invention. For example, functionality illustrated to be performed by separate processors or controllers may be performed by the same processor or controller. Hence, references to specific functional units are to be seen as references to suitable means for providing the described functionality rather than indicative of a strict logical or physical structure or organization.
The invention can be implemented in any suitable form including hardware, software, firmware or any combination of these. The invention may be implemented in a computer readable storage medium storing computer programs for execution by one or more computer systems having at least a processing unit, a user interface, and a memory. The invention may optionally be implemented partly as computer software running on one or more data processors and/or digital signal processors. The elements and components of an embodiment of the invention may be physically, functionally and logically implemented in any suitable way. Indeed the functionality may be implemented in a single unit, in a plurality of units or as part of other functional units. As such, the invention may be implemented in a single unit or may be physically and functionally distributed between different units and processors.
One skilled in the relevant art will recognize that many possible modifications and combinations of the disclosed embodiments may be used, while still employing the same basic underlying mechanisms and methodologies. The foregoing description, for purposes of explanation, has been written with references to specific embodiments. However, the illustrative discussions above are not intended to be exhaustive or to limit the invention to the precise forms disclosed. Many modifications and variations are possible in view of the above teachings. The embodiments were chosen and described to explain the principles of the invention and their practical applications, and to enable others skilled in the art to best utilize the invention and various embodiments with various modifications as are suited to the particular use contemplated.
Number | Name | Date | Kind |
---|---|---|---|
5457478 | Frank | Oct 1995 | A |
5475813 | Cieslak et al. | Dec 1995 | A |
5625757 | Kageyama et al. | Apr 1997 | A |
5671354 | Ito et al. | Sep 1997 | A |
5684952 | Stein | Nov 1997 | A |
5742905 | Pepe et al. | Apr 1998 | A |
5764908 | Shoji et al. | Jun 1998 | A |
5814798 | Zancho | Sep 1998 | A |
5852724 | Glenn, II et al. | Dec 1998 | A |
5867665 | Butman et al. | Feb 1999 | A |
5913032 | Schwartz et al. | Jun 1999 | A |
5937388 | Davis et al. | Aug 1999 | A |
5956719 | Kudo et al. | Sep 1999 | A |
6065054 | Dutcher et al. | May 2000 | A |
6069896 | Borgstahl et al. | May 2000 | A |
6108779 | Dean et al. | Aug 2000 | A |
6141690 | Weiman | Oct 2000 | A |
6144959 | Anderson et al. | Nov 2000 | A |
6144999 | Khalidi et al. | Nov 2000 | A |
6157944 | Pedersen | Dec 2000 | A |
6170065 | Kobata et al. | Jan 2001 | B1 |
6233612 | Fruchtman et al. | May 2001 | B1 |
6256676 | Taylor et al. | Jul 2001 | B1 |
6269406 | Dutcher et al. | Jul 2001 | B1 |
6308201 | Pivowar et al. | Oct 2001 | B1 |
6311205 | Dutcher et al. | Oct 2001 | B1 |
6341316 | Kloba et al. | Jan 2002 | B1 |
6489954 | Powlette | Dec 2002 | B1 |
6496858 | Frailong et al. | Dec 2002 | B1 |
6530083 | Liebenow | Mar 2003 | B1 |
6543004 | Cagle et al. | Apr 2003 | B1 |
6571354 | Parks et al. | May 2003 | B1 |
6748570 | Bahrs et al. | Jun 2004 | B1 |
6751661 | Geddes | Jun 2004 | B1 |
6769124 | Schoening et al. | Jul 2004 | B1 |
6813770 | Allavarpu et al. | Nov 2004 | B1 |
6857123 | Nuxoll et al. | Feb 2005 | B1 |
6865157 | Scott et al. | Mar 2005 | B1 |
6868444 | Kim et al. | Mar 2005 | B1 |
6931454 | Deshpande et al. | Aug 2005 | B2 |
6931519 | Keller | Aug 2005 | B1 |
6944662 | Devine et al. | Sep 2005 | B2 |
6965929 | Kumar | Nov 2005 | B2 |
6968345 | Muhlestein | Nov 2005 | B1 |
7000032 | Kloba et al. | Feb 2006 | B2 |
7020662 | Boreham et al. | Mar 2006 | B2 |
7051087 | Bahl et al. | May 2006 | B1 |
7051088 | Sesek | May 2006 | B2 |
7054955 | Chen et al. | May 2006 | B2 |
7085822 | Donatelli et al. | Aug 2006 | B1 |
7085824 | Forth et al. | Aug 2006 | B2 |
7085961 | Chang et al. | Aug 2006 | B2 |
7089259 | Kouznetsov et al. | Aug 2006 | B1 |
7089297 | Salas et al. | Aug 2006 | B1 |
7093006 | Sanjeev et al. | Aug 2006 | B2 |
7165104 | Wang | Jan 2007 | B2 |
7185066 | Noble et al. | Feb 2007 | B2 |
7194655 | Chu et al. | Mar 2007 | B2 |
7200590 | Everett-Church et al. | Apr 2007 | B2 |
7272849 | Brown | Sep 2007 | B2 |
7346616 | Ramanujam et al. | Mar 2008 | B2 |
7349957 | Matthews et al. | Mar 2008 | B1 |
7539862 | Edgett et al. | May 2009 | B2 |
20010049717 | Freeman et al. | Dec 2001 | A1 |
20020124114 | Bottom et al. | Sep 2002 | A1 |
20020194295 | Mercure et al. | Dec 2002 | A1 |
20030028817 | Suzuyama et al. | Feb 2003 | A1 |
20030097487 | Rietze et al. | May 2003 | A1 |
20030101190 | Horvitz et al. | May 2003 | A1 |
20030135555 | Birrel et al. | Jul 2003 | A1 |
20030172138 | McCormack et al. | Sep 2003 | A1 |
20030172139 | Srinivasan et al. | Sep 2003 | A1 |
20030172175 | McCormack et al. | Sep 2003 | A1 |
20030182327 | Ramanujam et al. | Sep 2003 | A1 |
20030212684 | Meyer et al. | Nov 2003 | A1 |
20030233541 | Fowler et al. | Dec 2003 | A1 |
20040003132 | Stanley et al. | Jan 2004 | A1 |
20040024831 | Yang et al. | Feb 2004 | A1 |
20040054780 | Romero | Mar 2004 | A1 |
20040088414 | Flynn et al. | May 2004 | A1 |
20040143836 | McCormack et al. | Jul 2004 | A1 |
20040254829 | Tripp | Dec 2004 | A1 |
20050015430 | Rothman et al. | Jan 2005 | A1 |
20050015531 | Yabuta et al. | Jan 2005 | A1 |
20050060432 | Husain et al. | Mar 2005 | A1 |
20050080891 | Cauthron | Apr 2005 | A1 |
20050097360 | Chu et al. | May 2005 | A1 |
20050182838 | Sheets et al. | Aug 2005 | A1 |
20050182851 | Buckler et al. | Aug 2005 | A1 |
20050273645 | Satran et al. | Dec 2005 | A1 |
20060101064 | Strong et al. | May 2006 | A1 |
20060259511 | Boerries et al. | Nov 2006 | A1 |
20070014243 | Meyer et al. | Jan 2007 | A1 |
20070014244 | Srinivasan et al. | Jan 2007 | A1 |
20070014277 | Ebbesen et al. | Jan 2007 | A1 |
20070014278 | Ebbesen et al. | Jan 2007 | A1 |
20070014300 | Breuer et al. | Jan 2007 | A1 |
20070014303 | Schulz et al. | Jan 2007 | A1 |
20070014307 | Srinivasan et al. | Jan 2007 | A1 |
20070016632 | Schulz et al. | Jan 2007 | A1 |
20070016636 | Boerries et al. | Jan 2007 | A1 |
20070016646 | Tendjoukian et al. | Jan 2007 | A1 |
20070016676 | Breuer et al. | Jan 2007 | A1 |
20070028000 | Ebbesen et al. | Feb 2007 | A1 |
20070028293 | Boerries et al. | Feb 2007 | A1 |
20070038703 | Tendjoukian et al. | Feb 2007 | A1 |
20070100856 | Ebbesen | May 2007 | A1 |
20070101021 | Meyer et al. | May 2007 | A1 |
20070101022 | Schulz et al. | May 2007 | A1 |
20070112880 | Yang et al. | May 2007 | A1 |
Number | Date | Country | |
---|---|---|---|
20070100975 A1 | May 2007 | US |