1. Field of the Invention
This invention relates generally to the field of data processing systems. More particularly, the invention relates to a system and method for prioritizing data transports on a data processing device.
2. Description of the Related Art
A typical layered network architecture is illustrated in
The descriptions below assume that the reader has at least a basic understanding of the functions of each of the network layers. For those interested, a detailed description of the network layers defined by the ISO Open Systems Interconnection model can be found in D
The well known TCP/IP protocol (“Transmission Control Protocol/Internet Protocol”) operates at the transport and network layers, respectively. The TCP transport layer is responsible for ensuring that all data associated with a particular data transmission arrives reliably and in the correct order at its destination. Specifically, in order to ensure reliable data transmission, a virtual connection 187 (also referred to herein as a “socket connection”) is established between a TCP socket 182 opened at the destination transport layer 185 and a TCP socket 181 opened at the source transport layer 180.
The TCP sockets 181, 182 perform flow control to ensure that the data transmitted form the source node is provided to the receiving node at an acceptable data rate. Specifically, a “window” is established defining the amount of outstanding data a source node 195 can send before it receives an acknowledgment back from the receiving node 196 (i.e., indicating that it has successfully received all or a portion of the data).
For example if a pair of nodes 195, 196 are initially communicating over TCP connection that has a TCP window size of 64 KB (kilobytes), the transmitting socket 181 can only send 64 KB of data and then it must stop and wait for an acknowledgment from the receiving socket 182 that some or all of the data has been received. If the receiving socket 182 acknowledges that all of the data has been received then the transmitting socket 181 is free to transmit another 64 KB. If, however, the transmitting socket 181 receives an acknowledgment from the receiver that it only received the first 32 KB (which could happen, for example, if the second 32 KB was still in transit or was lost), then the transmitting socket 181 will only send another 32 KB, since it cannot have more than 64 KB of unacknowledged data outstanding (i.e., the second 32 KB of data plus the third).
Thus, the TCP window throttles the transmission speed based on how quickly the receiving application can process it. The TCP window is typically defined by a 16-bit TCP header field. As such, the largest window that can be used for a standard TCP connection is 216 KB (64 KB).
A client may concurrently have several different socket connections open with a server or client, or with several different servers/clients. Each socket connection may not be utilized in the same manner, however. For example, the user may be interactively browsing web pages via one socket connection while receiving an automated software upgrade or e-mail message over another socket connection. This may result in a degradation of the interactive user experience, particularly on networks which allocate a relatively small amount of bandwidth per device (e.g., wireless networks such as Cellular Digital Packet Data and ARDIS networks). Under these circumstances, it would be useful to have the ability to prioritize the socket connections such that the interactive connections are provided with a relatively larger amount of bandwidth than the non-interactive connections.
A system is described for allocating bandwidth comprising: a transport layer to support a first socket connection for a first application and a second socket connection for a second application; and a socket prioritization module to allocate relatively more bandwidth to the first socket connection relative to the second socket connection, wherein allocation of bandwidth is based on one or more characteristics of the first application and/or the second application.
A better understanding of the present invention can be obtained from the following detailed description in conjunction with the following drawings, in which:
a illustrates one embodiment of a method for allocating bandwidth for new background sockets.
b illustrates one embodiment of a method for allocating bandwidth for new foreground sockets.
c illustrates one embodiment of a method for allocating bandwidth based on relative socket priority.
Described below is a system and method for processing code words. Throughout the description, for the purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced without some of these specific details. In other instances, well-known structures and devices are shown in block diagram form to avoid obscuring the underlying principles of the present invention.
One embodiment of the invention is employed on a wireless data processing device which operates in conjunction with a data processing service such as that described in co-pending application entitled N
For example, the conversion module 120 may include a hypertext markup language (“HTML”) rendering module (not shown) for interpreting HTML code and downloading any embedded content in the HTML code (e.g., graphics, video, sound, . . . . etc) to the service 100. The conversion module 120 may then combine the HTML code and embedded content and generate a set of bytecodes for accurately reproducing the requested content on the data processing device 110. As described above, in one embodiment, the bytecodes may be Java bytecodes/applets. However, the conversion module 120 may generate various other types of interpreted and/or non-interpreted code, depending on the particular type of data processing device 110 being used (e.g., one with an interpreter module or one without).
Because one embodiment of the service 100 maintains an intimate knowledge of the capabilities/configuration of each data processing device 110 (e.g., screen size, graphics/audio capabilities, available memory, processing power, user preferences, . . . etc) it can reconstruct the requested Internet content accurately, while at the same time minimizing the bandwidth required to transmit the content to the device 110. For example, the conversion module 120 may perform pre-scaling and color depth adjustments to the requested content so that it will be rendered properly within the data processing device's 110's display. In making these calculations, the conversion may factor in the memory and processing power available on the data processing device 110. In addition, the conversion module 120 may compress the requested content using a variety of compression techniques, and thereby preserve network bandwidth.
In one embodiment, the conversion module 120 will simply discard Internet content which either cannot be reproduced on the data processing device 110, or which the user has indicated that he/she does not want to be reproduced on the wireless device. For example, a user may indicate that he/she does not want sounds to be generated on the data processing device 110 or that he/she does not want advertisements transmitted to the data processing device 110. The conversion module 120 will then remove any sounds or advertisements embedded in the requested Web page (or other requested Internet content). Because HTML rendering and other advanced processing of Internet content/data is offloaded to the service 100 as described above, the data processing device 110 can be manufactured using a relatively low power microprocessor or microcontroller, thereby lowering the cost of manufacture and/or the energy consumed by the device 110.
In one embodiment, when a particular Web page or other Internet object has been converted into a format suitable for rendering/execution on the data processing device 110 the formatted page/object may be stored locally on a cache 125 maintained at the service 100. The next time the content is requested, the conversion module 120 may simply read the previously-generated code from the local cache 125 (i.e., it will no longer need to retrieve the content from remote locations to reconstruct the code).
One embodiment of a system for prioritizing data transports (e.g., socket connections) is illustrated generally in
In one embodiment, the transport layers 305 and 306 provide all, or a subset of, the standard TCP transport functions. In addition, the embodiment illustrated in
Three embodiments of methods for prioritizing data transports are illustrated in
Referring to
At 410, the socket prioritization logic 330, 331 on the device 110 and/or the service 100, respectively, determines whether any foreground sockets are currently supporting interactive applications (e.g., application 390). If not, then at 430, a background socket is generated for the non-interactive application with a specified maximum window size (‘m’). In one embodiment, the maximum window size may be set to the maximum size supported by the transport layer 305, 306 (e.g., 64 KB for standard TCP). In another embodiment, however, the maximum window size may be limited to a smaller value (e.g., 8 KB) so that, if/when the user begins performing interactive functions on the data processing device 110, the device can respond without an unreasonable delay (i.e., which might result if the device were required to wait for a maximum-sized window to be received before initiating the foreground socket).
At 410, if the socket prioritization logic 330, 331 determines that foreground sockets exist, then at 420, the background socket may be generated with a relatively smaller maximum window size (‘n’). In one embodiment, the maximum window size n is set to zero. However, in another embodiment, the maximum window size may be set to a relatively small value (e.g., 2 KB).
Moreover, in one embodiment, in order to allocate a specific percentage of the overall bandwidth to the background socket, the maximum window size for that socket may be reset to zero periodically. For example, if the total bandwidth available to the data processing device is 32 KB/sec, to allocate ¼ of the total bandwidth to a background socket, the socket prioritization logic 330, 331 may set the maximum window size to 8K once each second. When the 8K has been transmitted successfully (presumably in less than 1 second), the socket prioritization logic 330, 331 resets the maximum window size to zero until the beginning of the next second. This technique of precisely allocating a percentage of the overall bandwidth to a socket is illustrated graphically in
The socket prioritization logic 330, 331 may monitor the foreground socket connections to determine whether the user is still working interactively on the device 110. For example, in one embodiment, a foreground inactivity timer is reset to a threshold value (e.g., 30 seconds) each time the foreground socket is utilized (e.g., each time the user clicks on a new URL to a Web page). If the foreground socket is not utilized for the threshold period of time, determined at 425, then the maximum window size of the background socket may be increased (e.g., and reset to zero periodically based on the percentage of bandwidth to be allocated, as described above).
In the embodiment illustrated in
b illustrates a similar method for initiating a new foreground socket. At 440, the new foreground socket is initiated. If no background sockets exist, determined at 445, then at 447 the foreground socket is generated using a specified window size (e.g., 32 KB, 64 KB, . . . etc). If, however, background sockets exist, then the socket prioritization logic 330, 331 may reduce the bandwidth allocated to those sockets to free up bandwidth for the new foreground socket. Thus, at 450, the maximum window size for the background socket is set to ‘n’ and periodically reset to zero (as described above) to free up bandwidth. Once again, if the foreground socket becomes inactive, determined at 455, then the background socket window size may be reset to a larger value at 460 so that the background application can consume the additional, unused bandwidth.
In one embodiment of the invention, sockets are not strictly classified as “background” or “foreground” sockets as described above. Rather, sockets may be assigned a relative priority value (e.g., between 1 and 4) based on the level of interactivity of the applications which they support (or based on other specified variables).
One embodiment of a method for prioritizing socket connections in this manner is illustrated in
If, however, active socket connections exist between the device 110 and the service 100 (or a different client/server) then, at 480, the priorities of all of the socket connections are evaluated and, at 485, the maximum window sizes are reallocated based on the relative priorities of the active sockets. For example, if three sockets exist having relative priorities of 1, 2 and 3 (with 1 being the highest priority and 3 being the lowest) then the socket with a priority of 1 may be allocated a larger window size than the socket with a priority of 2, and the socket with a priority of 2 may be allocated a larger window size than the socket with a priority of 4. If the maximum available bandwidth is 64 KB/sec, then the highest priority (1) socket may be allocated, for example, a 40 KB window, the lowest priority (3) socket may be allocated an 8 KB window and the socket with an intermediate priority (2) may be allocated a 16 KB window. If each socket is reset to zero each second as described above, then the 64 KB/sec bandwidth will be accurately divided among the sockets based on relative priority. In one embodiment, however, the highest priority socket may not be periodically reset to zero as described, so that it will be provided with the maximum available bandwidth.
Once again, if a particular socket becomes inactive for a predetermined period of time (e.g., because a user stops interactively working on an application), determined at 490, then, at 495, the window sizes for the remaining active sockets may be reallocated based on their relative priorities (as described above).
Embodiments of the invention may include various steps as set forth above. The steps may be embodied in machine-executable instructions which cause a general-purpose or special-purpose processor to perform certain steps. Alternatively, these steps may be performed by specific hardware components that contain hardwired logic for performing the steps, or by any combination of programmed computer components and custom hardware components.
Elements of the present invention may also be provided as a machine-readable medium for storing the machine-executable instructions. The machine-readable medium may include, but is not limited to, floppy diskettes, optical disks, CD-ROMs, and magneto-optical disks, ROMs, RAMs, EPROMs, EEPROMs, magnetic or optical cards, propagation media or other type of media suitable for storing or transmitting electronic instructions. For example, the present invention may be downloaded as a computer program which may be transferred from a remote computer (e.g., a server) to a requesting computer (e.g., a client) by way of data signals embodied in a carrier wave or other propagation medium via a communication link (e.g., a modem or network connection).
Throughout the foregoing description, for the purposes of explanation, numerous specific details were set forth in order to provide a thorough understanding of the invention. It will be apparent, however, to one skilled in the art that the invention may be practiced without some of these specific details. For example, while embodiments of the invention described above operate at the TCP transport layer, the underlying principles of the invention are not limited to any particular data transport or any particular network layer. Moreover, while described above in the context of a data processing device 110 communicating with a data service 100, the underlying principles of the invention may be employed between virtually any two nodes communicating over a data network. Accordingly, the scope and spirit of the invention should be judged in terms of the claims which follow.
Number | Name | Date | Kind |
---|---|---|---|
4237540 | Sato | Dec 1980 | A |
5159592 | Perkins | Oct 1992 | A |
5224060 | Ma | Jun 1993 | A |
5268817 | Miyagawa | Dec 1993 | A |
5546447 | Skarbo et al. | Aug 1996 | A |
5548477 | Kumar | Aug 1996 | A |
5548478 | Kumar | Aug 1996 | A |
5559800 | Mousseau et al. | Sep 1996 | A |
5579472 | Keyworth et al. | Nov 1996 | A |
5594910 | Filepp et al. | Jan 1997 | A |
5608446 | Carr et al. | Mar 1997 | A |
5638257 | Kumar | Jun 1997 | A |
5715387 | Barnstijin et al. | Feb 1998 | A |
5727159 | Kikinis | Mar 1998 | A |
5727202 | Kucala | Mar 1998 | A |
5748084 | Isikoff | May 1998 | A |
5778176 | Geihs et al. | Jul 1998 | A |
5790974 | Tognazzini | Aug 1998 | A |
5802312 | Lazaridis et al. | Sep 1998 | A |
5816620 | Buell | Oct 1998 | A |
5900848 | Haneda | May 1999 | A |
5915095 | Miskowiec | Jun 1999 | A |
5949408 | Kang | Sep 1999 | A |
5961590 | Mendez et al. | Oct 1999 | A |
5964830 | Durrett | Oct 1999 | A |
5969678 | Stewart | Oct 1999 | A |
5983261 | Riddle | Nov 1999 | A |
5987609 | Hasebe | Nov 1999 | A |
6023708 | Mendez et al. | Feb 2000 | A |
6035339 | Agraharam et al. | Mar 2000 | A |
6038601 | Lambert et al. | Mar 2000 | A |
6076093 | Pickering | Jun 2000 | A |
6076109 | Kikinis | Jun 2000 | A |
6081708 | Vasnier | Jun 2000 | A |
6087937 | McCarthy | Jul 2000 | A |
6151677 | Walter et al. | Nov 2000 | A |
6157935 | Tran et al. | Dec 2000 | A |
6166734 | Nahi et al. | Dec 2000 | A |
6167441 | Himmel | Dec 2000 | A |
6199099 | Gershman et al. | Mar 2001 | B1 |
6249530 | Blanco et al. | Jun 2001 | B1 |
6266400 | Castagna | Jul 2001 | B1 |
6282435 | Wagner | Aug 2001 | B1 |
6286063 | Bolleman et al. | Sep 2001 | B1 |
6317789 | Rakavy et al. | Nov 2001 | B1 |
6330618 | Hawkins et al. | Dec 2001 | B1 |
6336137 | Lee | Jan 2002 | B1 |
6370687 | Shimura | Apr 2002 | B1 |
6396482 | Griffin et al. | May 2002 | B1 |
6418310 | Dent | Jul 2002 | B1 |
6518533 | Angelo et al. | Jul 2002 | B1 |
6433777 | Sawyer | Aug 2002 | B1 |
6438101 | Kalampoukas et al. | Aug 2002 | B1 |
6438601 | Hardy | Aug 2002 | B1 |
6446004 | Cao | Sep 2002 | B1 |
6449255 | Waclawsky | Sep 2002 | B1 |
6490251 | Yin et al. | Dec 2002 | B1 |
6493316 | Chapman et al. | Dec 2002 | B1 |
6526274 | Fickes et al. | Feb 2003 | B1 |
6542730 | Hosain | Apr 2003 | B1 |
6590865 | Ibaraki et al. | Jul 2003 | B1 |
6622175 | Piller | Sep 2003 | B1 |
6643781 | Merriam | Nov 2003 | B1 |
6662023 | Helle | Dec 2003 | B1 |
6687497 | Parvulescu et al. | Feb 2004 | B1 |
6742027 | Cromer et al. | May 2004 | B1 |
6968379 | Nielsen | Nov 2005 | B1 |
20010023445 | Sundqvist | Sep 2001 | A1 |
20020002618 | Vange | Jan 2002 | A1 |
20020007545 | Tarpenning et al. | Jan 2002 | A1 |
20020010757 | Granik et al. | Jan 2002 | A1 |
20020075305 | Beaton et al. | Jun 2002 | A1 |
20020150048 | Ha et al. | Oct 2002 | A1 |
20040010585 | Jones et al. | Jan 2004 | A1 |
Number | Date | Country |
---|---|---|
1 071 024 | Jan 2001 | EP |
WO 9836344 | Aug 1998 | WO |
WO 0030003 | May 2000 | WO |