The present invention relates to a Web information preferential transfer system. More specifically, the present invention relates to a Web information preferential transfer system which can set user and site communication priorities when receiving a Web service via a communication network providing the Web service using TCP/IP and can use the existing Internet network as it is.
In recent years, the number of services and applications using the Web has been higher to increase transmission and reception of Web information. An increase in such Web-related communication traffic makes the network line volume insufficient to slow a service response. Internet communication typically attempts to deliver traffic as equitably as possible irrespective of Web information importance. Both an important traffic and an unimportant traffic are uniformly influenced. Since a response time is secured for a more-important network service, preferential control identifying traffic importance must be done.
There are the following four prior art traffic identification and preferential control methods including the Web.
A first system is that a router identifies the port number of TCP/UDP to deliver it for preferential control. In the system, the router identifies the traffic for preferential control using the port number, the transmitting side IP, and the transmitted side IP included in the header of an IP packet. Typically, a client server type network application uses the specified port number for communication. In the system, the router can identify the type of application, the client, and the server for preferential control.
A second system is that a packet is identified in Precedence field of Type of Service of an IP packet to be preferentially controlled by the router. In the system, the client server type network application adds preferential information to the Type of Service of the packet when a client and a server communicate with each other and the application can specify priority for each data flow.
A third system uses RSVP (Resource Reservation Protocol). In the system, before transmission, a packet needing to secure a communication bandwidth to units configuring a path is transmitted to secure the communication bandwidth of the units on the path for communication. In the system, the application can secure the communication bandwidth for each data flow before transmission so that a response time can be assured for the each data flow.
A fourth system is called packet shaping. The data flow of the client server type network application is identified by the port number, the transmitting side IP and the transmitted side IP on a path between a client and a server. The data flow request interval and network window size are controlled for preferential control for each data flow. In the system, a packet shaper can identify the type of application, the client, and the server for preferential control.
The first and second preferential control systems are described in 2475 of RFC (Request for Comments) in detail. The third system is described in 2205 of the RFC in detail.
The prior art first system identifying a data flow by the port number can identify the data flow only by the type of application.
The Web service typically uses the same port number and cannot identify it for each Web request. Preferential control and bandwidth assurance for each Web cannot be done.
A Web request to a delivery service and a stream service using the Web and a service of a Web business application in which properties such as a traffic volume, a required response time and priority are different are handled to be identical. The traffic of an important Web request is oppressed to slow its response.
The traffic volume of the Web application from the server to the client is larger than that from the client to the server. It is effective to preferentially control the traffic from the server to the client. The Web application uses an unspecified server. It is difficult to realize the preferential control system needing control in the server or on the entire path. For example, in the third system, all units on the path must understand the protocol of the RSVP.
Typically, the communication bandwidth is small on the Internet network where the business network such as LAN accesses the Internet of the provider via a public line. This is a bottleneck in using the Internet. It is effective to perform preferential control of the downward line of the communication path as the bottleneck.
All the prior art first to fourth systems have no idea for preferential control and bandwidth assurance for each Web request. In the provider Internet connection service and the business site connection service, all Web requests of users have the same priority. When a user desires to use a Web service by a quick response and other users fully use the line communication bandwidth, the Web service can be used only by a slow response. A service of the same quality can be only provided at the same charge to a user having a large Web service used amount and a user having a small used amount, which is a kind of inequity.
The present invention has been made to solve the above problems and an object of the present invention is to provide a Web information preferential transfer system in which when the site of a user or a business uses the Internet to receive a Web service, the service can be received with priority according to its quality and charge and the existing Internet network such as a client, a Web server and a path used by the user can be used.
In a Web information preferential transfer system, two priorities, personal priority and site priority can be set on the site of a user. On the site of a user, the site priority which can be set by a LAN-side proxy server is the priority of when a request is made. A WAN-side proxy server installed on the provider side extracts the site priority of the request, converts it to the final priority according to the communication state and settings, converts the final priority to a preferential control parameter of an IP packet of a Web object in response to the Web request, and relays it to the LAN-side proxy server. Preferential control may be made based on the final priority in the WAN-side proxy server.
Charging by the provider is performed based on the communication contents used and the required priority.
Embodiments according to the present invention will be described below using
A first embodiment according to the present invention will be described below using
(I) System Overview
The system overview of a Web information preferential transfer system according to the first embodiment of the present invention will be described using
The present invention controls communication when a user accesses a Web server 130. As shown in
When a user 104 uses a browser from a user computer 103 used by the user to see a certain home page, he/she makes a Web request to a LAN-side proxy server 110 of the site to which the user belongs. The LAN-side proxy server 110 makes the Web request to a WAN-side proxy server 120 of a provider network connected to a public network. The WAN-side proxy server 120 transmits the Web request to the Web server 120. For the downward direction, in reverse, the Web server 130 transmits a Web object to the user computer 103 via the WAN-side proxy server 120 and the LAN-side proxy server 110.
The user 104 can set a priority to his/her Web request. A high priority is set to an important and urgent Web request. This is a personal priority.
A site manager 105 of the site to which the user belongs sets a site policy as a policy of communication control on the site in consideration of his/her site management view and the personal priority. A site priority is set based on the site policy to send the site priority when making a Web request to the WAN-side proxy server 120.
When the WAN-side proxy server 120 preferentially transfers a communication packet and assures a communication bandwidth based on the site priority when transferring data sent from the Web server 130.
This is a basic mechanism of this embodiment.
(II) System Configuration
The system configuration of the Web information preferential transfer system according to the first embodiment of the present invention will be described using
This system has the following three units: the WAN-side proxy server 120 in a provider 102 providing an Internet connection service, the LAN-side proxy server 110 in a site 101, and the user computer 103 used by the user 104.
There are the user computer 103 and the LAN-side proxy server 110 in the site 101. The user 104 is a person actually using the Web by the Internet. A site manager 105 is assumed to be a person managing the site 104.
As data, a personal information managing table 106 managing the personal information of the user is arranged.
The user computer 103 is assumed to be a personal computer starting a browser 150 when the user sees Web information. The LAN-side proxy server 110 is a server connected to the user computer 103 by the Local Area Network to be connected to the external Internet network and adds the site priority to a Web request from the user 104.
In the user computer 103, two applications of the browser 150 and a software proxy 140 are executed.
The browser 150 has a cookie managing table 151 storing a cookie sent from the Web server and has a function notifying the URL (Uniform Resource Locater) of the Web application currently displayed on the software proxy 140. The cookie is information in order for the Web server to identify the user. The Web server manages the user using the cookie.
The software proxy 140 is software executed in the user computer 103 and has a function setting a personal priority by a personal policy as the policy of the priority set by the user to relay the Web request to the LAN-side proxy server 110. The software proxy 140 has personal policy setting means 143, a personal policy managing table 144, personal priority deciding means 141, and relay processing means 142. The personal policy setting means 143 provides an interface in order for the user to set a personal policy and reflects its input onto the personal policy managing table 144 for storing. The relay processing means 142 has a function receiving and relaying a Web object sent back from the Web server 130 via the WAN-side proxy server 120 and the LAN-side proxy server 110.
The personal policy is represented as a pair of the URL of a Web page targeted for preferential control and a personal priority thereto and will be described later in detail.
The LAN-side proxy server 110 is a server installed for relaying a Web request from the user computer 103 to the external Internet network and has a function setting and adding a site priority to the Web request. The LAN-side proxy server 110 has a site policy managing table 114, priority deciding means 111, transferred side switching means 112, relay processing means 113, a use statistic managing table 115, and a communication record managing table 116 storing a communication record.
The site policy managing table 114 stores a site policy decided by the site manager 105. The priority deciding means 111 analyzes the Web request of the user to decide a site priority.
The transferred side switching means 112 has a function transmitting a Web request to the WAN-side proxy server 120 when the priority is decided.
The relay processing means 113 is a part receiving the Web object sent from the Web server 130 via the WAN-side proxy server 120 and relaying it to the next user computer 103.
The use statistic managing table 115 stores the communication used rate of the user. The communication record managing table 116 can store and manage the communication record of the user.
On the site in the provider 102, the WAN-side proxy server 120 for relaying the Web request sent from the user to the Web server 130 is installed.
The site priority is added to the Web request sent from the LAN-side proxy server 110. Based on it, the communication of the Web object sent back as a response to the Web request is controlled. A provider manager is placed on the provider network to manage the WAN-side proxy server 120.
The WAN-side proxy server 120 has relay processing means 121, request analyzing means 122, traffic control means 123, a traffic volume managing table 126, IP priority setting means 124, an IP priority map table 125, and a flow managing table 128.
The relay processing means 121 is a part relaying the Web request from the site 101 to the Web server.
The request analyzing means 122 analyzes whether the Web request from the site 101 includes priority information. The traffic control means 123 is operated to control the traffic of the Web object based on the information of the site priority added to the Web request and the current traffic volume. Specifically, the site priority added to the Web request is defined as a final priority (hereinafter called “final priority”) based on the current traffic volume.
The traffic volume managing table 126 stores data for managing the current traffic of the Web object.
The site of the provider manages the Web request by a flow concept. Each flow is given by a flow number. The flow managing table 128 stores data for controlling the traffic of each flow.
In the mechanism of preferential control of this embodiment, the priority set on the site 101 to be added to the Web request is reflected onto the parameter of the packet of the Web object sent as a response of the request to control the traffic. The personal priority and the site priority set on the site 101 and the final priority decided by the traffic control means 123 based on it are set in an application layer in a communication model. The priority is reflected onto the parameter of the packet of TCP/IP as the IP layer.
The IP priority setting means 124 is a part reflecting the final priority set to the flow of the Web request by the traffic control means 123 based on the above mechanism onto the parameter of the packet of the corresponding Web object (hereinafter called “preferential control parameter”).
The IP priority map table 125 stores data for defining a rule when the IP priority setting means 124 converts the final priority to the preferential control parameter.
(III) Data Structures for Use in the System
Data structures for use in the Web information preferential transfer system according to the first embodiment of the present invention will be described using
The personal policy managing table 144 shown in
As the target Web request conditions, it has items of a requested side URL 620, a target object 621, a specified range attribute 622, and a time 623. As the personal priority results, it has items of a personal priority 624 and an assurance bandwidth 625. The record means that the personal priority results of the Web request satisfying all the requested side URL 620, the target object 621, the specified range attribute 622 and the time 623 are the personal priority 624 and the assurance bandwidth 625 of the record.
The requested side URL is a field specifying the URL of a target request. In this column, the URL can be described directly and a keyword such as “all” and “active browser” can be specified. When describing “all”, all the URLs are targeted. When describing “active browser”, the URL of the browser whose window is active is targeted. The target object type 621 is a field specifying the object type targeted for the Web request. For example, as shown in the drawing, a file type extension or a keyword such as “all” is specified. The specified range attribute 622 is a field setting the specified URL range in more detail. The keywords as shown in the drawing can be specified.
The personal priority 623 can specify three types of “priority”, “normal”, “low priority” in the order of decreasing priorities in the example of the drawing. The personal priority result can be in the field of the assurance bandwidth 624 and by describing the assurance bandwidth according to its communication.
The personal information managing table 106 shown in
The site policy managing table 114 shown in
The target Web request conditions are items of a requested side URL 640, a target object type 641, a specified range attribute 642, a user ID 643, a personal priority 644, a used volume 645, and a time 646. The site priority results are items of a site priority 647 and an assurance bandwidth 648. The site policy managing table 114 means that the site priority results are set to the Web request satisfying all the target Web request conditions. It should be noted that the personal priority 644 is included in the conditions and the personal priority is reflected onto the site priority.
The meanings of the requested side URL 640, the target object type 641 and the specified range attribute 642 are the same as those in the personal policy managing table of
The site priority 647 is the site priority set when satisfying the above target Web request conditions and has four stages in the example of
The use statistic managing table 115 shown in
The traffic managing table 126 shown in
The flow managing table 128 shown in
The flow managing table 128 has items of a flow number 670, a site priority 671, a final priority 672, a traffic volume 673, and an assurance bandwidth 674. The flow number 670 is a number uniquely given to the data flow of the Web request and the Web object sent as its response. The site priority 671 is a site priority added to the Web request in the LAN-side proxy server 110. The final priority 672 is a final priority finally decided with reference to the site priority and other communication states in the WAN-side proxy server 120. The assurance bandwidth 674 is an assurance bandwidth requested by the Web request.
The IP priority map table 125 shown in
The http request header shown in
To transmit the priority between the units, the standard of http Ver1.1 defined by the RFC is defined. In comparison with it, as header extension items, items of a personal priority 690, a site priority 691, and an assurance bandwidth 692 are added. The personal priority set by the personal policy and the site priority set by the site priority are written into this area.
The example of the preferential control parameter used in the IP layer is added to the header part of the IP packet according to this embodiment shown in
The communication record table 116 shown in
(IV) Detail of the Communication Operation of the System
The detail of the communication operation of the Web information preferential transfer system according to the first embodiment of the present invention will be described using
The summary of the communication flow of the Web information preferential transfer system of the present invention is as shown in
(IV-1) User Registration
When the user 104 desires to use a Web service with preferential control, the user ID and the password are registered as the user information into the personal information managing table 106 in the site 101. They are registered into the personal information managing table 106, as shown in
(IV-2) Personal Policy Setting and Registration
The user 104 registers the URL and the priority of the Web service which is desired to be used preferentially as the personal policy into the software proxy 140 using a personal policy setting screen 530 of
As shown in
To specify the priority, a target Web request is specified to click the desired priority button.
The Web request can be actually specified by the following three methods.
In a first method, the all requests button 535 is selected to set the priorities of all the following Web requests.
In a second method, the active browser button 536 is selected to specify the Web service displayed by the browser whose window is active.
The multi-window OS may start a plurality of browsers. The priority is set to the URL displayed by the most front browser whose window is active.
In a third method, the specified URL button 537 is selected to set the priority to the specified URL. The URL to be preferential can be registered by inputting the URL into the URL input box 534 and pressing the URL add button 538. When deleting the registration of the URL, the URL is inputted into the URL input box 534 to press the URL delete button 539.
The URL of the target Web service is specified by the above method to specify the personal priority. The personal priority can be set to priority, normal and low priority by the priority button 531, the normal button 532, and the low priority button 533. The personal priority is higher in order of priority, normal and low priority. When the priority is high, the response is assured not to be slowed as compared with the traffic of the low-priority Web request.
When the above input operation is done, the personal policy setting means 143 of the software proxy 140 is registered into the personal policy managing table 144 based on the flowchart of
The URL and the priority are inputted from the user by the above method (S540).
Whether the priority of the URL displayed by the browser is changed or not is judged (S541). When necessary, the specifying method acquires the URL of the page displayed by the browser (S542) so that the inputted personal policy is registered into the personal policy managing table. It is stored into the personal policy managing table 144 in the format as shown in
(IV-3) Log-In
When the user 104 uses the Web service, he/she must receive user authentication by log-in.
When the user actually requests the Web service, the Web request to the Web server 130 is sent to the LAN-side proxy server 110 via the personal policy deciding means 141. When the cookie authenticating the user is not added to the Web request, the LAN-side proxy server 110 sends back the log-in screen to the user 104 to request a log-in process.
The log-in screen for use in user authentication is the screen as shown in
The user 104 who has completed the above log-in process can use the Web service with the personal priority.
(IV-4) Reception of the Web Request of the Software Proxy 140
The procedure for receiving the Web request of the software proxy 140 will be described while following the flowchart of
The Web request from the browser 150 is sent to the software proxy 140 (SQ503 of
The Web request from the browser 150 is received (S550). Whether there are personal policies to be read or not is judged (S551).
When there are personal policies, one of them is read from the personal policy managing table 144 shown in
Specifically, whether the URL 620 of the personal policy managing table 144 is matched with the URL of the Web request is judged. When the specified range attribute 622 is a low order directory, the directory below the URL 620 is also matched. When “in site” is described, the same site is also matched. The Web object type of the Web request and the target object type 621 are compared.
With judgment in this manner, when the received Web request condition is matched with the personal policy, the personal priority 623 registered into the personal policy is added to the Web request (S554). Specifically, the value of the personal priority 623 of the personal policy managing table 144 is written into the item of the personal priority 690 of the http request header shown in
In this embodiment, the personal policy is represented as one record of the personal policy managing table 144, but may be represented by other methods.
(IV-5) Reception of the Web Request of the Lan-Side Proxy Server 110
The process for receiving the Web request of the LAN-side proxy server 110 will be described while following the flowchart of
The Web request is transmitted from the software proxy 140 to the LAN-side proxy server 110 (SQ505 of
The LAN-side proxy server 110 receives the Web request (S560) to judge whether it is a log-in request (S561).
In the case that it is the log-in request, the personal information managing table 106 is used to compare the user ID and the password transmitted from SQ501 of
When they are effective, a cookie issuing phase 562 issues a cookie (S562, SQ502 of
In the case that it is not the log-in request, whether the http header of the Web request includes the effective cookie is judged (S563).
When not including a cookie, the log-in screen is transmitted to the user (S564) to prompt log-in to the user 104. After issuing a cookie, when there is no request for a fixed time, use is judged to be completed to discard the cookie. For personal authentication, the user ID, the password and the cookie are used together. Other methods, for example, a method for using a specified encryption algorithm and a method with fingerprints may be used.
When the http header of the Web request includes an effective cookie and personal authentication can be done, after checking the personal authentication, the used volume of the authenticated user 104 is obtained from the use statistic managing table 115 shown in
Whether there are site policies to be read or not is judged (S566). When there are site policies, one of them is read from the site policy managing table 114 shown in
Whether the received Web request condition is matched with the read site policy or not is judged (S568). The process is repeated until all the site policies are lost.
Specifically, the URL and the Web object type of the Web request are compared by the same method as S553 of
In this embodiment, the site policy is represented as one record of the site policy managing table 114, but may be represented by other methods.
When the received Web request condition is matched with the site policy, the site priority 647 registered into the site policy managing table 114 is added to the Web request (S647). Specifically, the value of the site priority 647 of the site policy managing table 114 is written into the item of the site priority 691 of the http request header shown in
After deciding the transferred side in the next (IV-6) phase, the Web request is transmitted to the external Internet network (S570, SQ505 of
(IV-6) Decision of the Transferred Side of the Web Request
The procedure for deciding the transferred side of the Web request by the LAN-side proxy server 110 will be described while following the flowchart of
The Web request in which the site priority is decided is sent to the transferred side switching means 112 of the LAN-side proxy server 110 (S580).
The Web request received here is judged to have the site priority or not (S581). When the site priority is added, it is transmitted to the set suitable WAN-side proxy server 120 (S582). For example, when a plurality of WAN-side proxy servers are prepared, the suitable WAN-side proxy server is selected from the URL requested by the Web request.
When the site priority is not added, it is not sent to the WAN-side proxy server 120 so as not to perform preferential control of the present invention.
(IV-7) Reception of the Web Request of the Wan-Side Proxy Server 120
The Web request to which the site priority is added, as described above, is transmitted to the WAN-side proxy server 120.
The procedure for receiving the Web request of the WAN-side proxy server 120 will be described while following the flowchart of
The Web request transmitted to the WAN-side proxy server 120 is transmitted to the request analyzing means 122 via the relay processing means 121.
The Web request is received by the request analyzing means 122 (S590). Whether the site priority is defined to the http header in the Web request or not is judged (S591). When it is added, it is notified to the traffic control means 123 (S592).
The Web request is transmitted to the requested side Web server 130 requested by the Web request (S593, SQ506 of
(IV-8) Traffic Control of the Wan-Side Proxy Server 120
The WAN-side proxy server 120 transmits the Web request to the Web server 130. The Web object is received as its response by the traffic control means 123 of the WAN-side proxy server 120 (SQ507 of
The procedure of traffic control to the Web object in the WAN-side proxy server 120 will be described below while following the flowchart of
The traffic control means 123 receives the Web object from the Web server 130 (S600).
The traffic volume of the received packet is measured to record the current traffic volume passing through the WAN-side proxy server into the traffic volume 661 of the traffic volume managing table 126 shown in
Likewise, to the communication record table 127 shown in
When there is a priority in the (IV-7) phase, the request analyzing means 122 notifies it. Whether the priority is notified or not is judged (S602).
In the case of the traffic to be preferential, the traffic volume by priority passing through the WAN-side proxy server 120 and the allocatable traffic volume are obtained from the traffic volume managing table 126. Whether the traffic volume of the received Web object exceeds the allocatable traffic volume is judged (S603). When it exceeds, the priority is lowered by one (S604) to be the final priority (S605).
When the traffic volume does not exceed the allocatable traffic volume, the specified site priority is the final priority (S605).
The final priority is added to the Web object to be sent to the IP priority setting means 124 (S606). The traffic control means 123 manages the traffic by the flow managing table 128 shown in
(IV-9) Setting of the Preferential Control Parameter
In the previous (IV-8) phase, the final priority is decided. The final priority is decided in the application layer by the traffic control means. This is changed to the preferential control parameter recognized by the IP layer for preferential control at the packet level, which is the idea of the present invention.
The procedure will be described by following the flowchart of
The IP priority setting means 124 receives the Web object from the traffic control means 123 (S610).
Whether the final priority is added to the Web object is judged (S611). When the final priority is added, a Precedence value as the preferential control parameter in the IP layer corresponding to the final priority from the IP priority map table 125 shown in
(IV-10) The Packet Flow Thereafter
As shown in
The Web object transmitted from the WAN-side proxy server 120 is received by the relay processing means 113 of the LAN-side proxy server 110. The relay processing means 113 records the traffic volume of the received Web object into the use statistic managing table 115 and the communication record table 116 to be transmitted to the user computer 103 (508 of
The Web object transmitted from the LAN-side proxy server 110 is sent to the relay processing means 142 of the software proxy 140 of the user computer 103 (509 of
(V) Other Communication Control Methods
In the above examples, the Precedence of Type of service of the IP packet is used and the routers which can understand the preferential control parameter perform preferential control of the packet.
Other than the preferential control, other preferential control methods may be used. There can be considered a method in which the WAN-side proxy server 120 can deliver a packet while performing preferential control. For example, the WAN-side proxy server 120 buffers and delivers the packet for each priority.
(VI) Features of the System of the Present Invention
As described above, in the present invention, the communication priority set by the application is converted to each of the Precedence values of the packet of the IP layer. The present invention has the mappable traffic volume for each priority, as shown in
The present invention can be realized in such a manner that highest Precedence is allocated only for bandwidth assurance to the Web request of the bandwidth assurance request to set the mappable traffic volume, thereby receiving the Web request with a bandwidth assurance request only by the traffic volume by the site policy. At this time, when the Web request with a bandwidth assurance request exceeding the mappable traffic volume exists, the final priority is lowered.
The user may perform communication other than the Web request, which is not described in this embodiment. In the traffic control of applications (e.g., FTP and mail) other than http, the preferential control function of the relay units used is used, for example, a TCP port is used to set a bandwidth for each of the applications.
In the first embodiment, according to the preferential control policy of the user and the site manager, the used volume of each user and information of the application layer of a Web page used are used to perform preferential control and bandwidth assurance in the IP layer for each packet.
Using the WAN-side proxy server 120, to the Web object from the Web server 130 not corresponding to preferential control and bandwidth assurance, the WAN-side proxy server 120 performs traffic control by the policy requested from the user for preferential control and bandwidth assurance to the Web object.
To execute the present invention, the WAN-side proxy server 120 has a mechanism checking the priority to convert it to the preferential control parameter. The Web server 130 providing the Web object is the same as the above Web server without changing its communication interface at all so as to provide the Web service.
(VII) Services Expected by this System
Services expected by the Web information preferential transfer system according to the first embodiment of the present invention will be described using
A bill 720 has columns of a usage statement table 721, a charge itemizing table 722, and a charged amount 723.
The usage statement table 721 has items of a used time 724, a used URL 725, a size 726, a priority 727, and a used bandwidth 728. The charge itemizing table 722 has a priority 729, a used volume 730, a used bandwidth 731, and a subtotal 732.
The usage statement table 721 records the number of services which have been provided to the user. The charge itemizing table 722 shows grounds for calculating a charge based on it.
Services which can be provided by the provider to the site and the user will be shown below with reference to the service contents of
A first service is a Web service used by the user by dynamically selecting the quality and cost. In the service, the user can use, as a service set at low cost, a delivery service whose response time is not important having a small usable bandwidth. When the response time is important, the user may use the Web service at high cost by taking preference over other users.
Specifically, the provider can make an agreement in which the charge is added or discounted for each priority requested by the user, as in the bill 720 of
The service according to the communication priority, that is, communication quality can be provided by the provider. The user can receive a service along the desired service contents at a reasonable cost.
A second service is a service notifying the important traffic volume of the user in the agreed bandwidth to the site manager. In the service, the site manager can grasp the important traffic volume of the user to make a plan for increasing the number of network lines according to the user request.
A third service protects the existing Web service from the abruptly increased traffic volume. In the service, when newly introducing a Web application and the traffic volume of the Web application is increased abruptly, the Web application is identified by the URL and the Web object type to set a bandwidth used. The quality of the existing Web service can be protected. In addition, the Web application needing a specified bandwidth is protected from the traffic of the existing Web service to be introduced.
A fourth service is balance control for each of the types of the Web service. In the service, a stream delivery and a delivery service using the Web are identified by the specified URL and the Web object type. The site manager can control the balance of the used volume for each of the Web service types on the entire site. Stepwise introduction and excessive use limitation can be done.
A fifth service is a uniform Web service based on the used volume to the user in the site. The Web request has been processed equitably without depending on its used volume. When the quality of the Web service is a response time, the user who has made many requests can use a large number of the same service as that of other users to oppress the network line. The quality of the entire service is lowered.
The present invention holds the quality of the Web service from two aspects of the used volume and the Web response time. This allows the Web request of the user having a small used volume to take precedence over that of the user having a large used volume according to the used Web traffic volume. All the users can use a uniform quality Web service based on the used volume. The user is allowed to be conscious of the traffic volume. It is expected that use of the less-necessary Web having can be suppressed.
A sixth service is a service using an available bandwidth of an agreed bandwidth. There is a pre-reading technique to increase the Web response. However, the technique has a traffic volume larger than that of a typical Web service to oppress the network line, slowing the response of the Web service. The same network line is hard to use during the Web service. In the service, the pre-reading technique can be used by lowering the priority during the Web service without slowing the response of the Web service. Web information mirroring and a Web information search service have the same problem. The service can be expected to be adapted.
A second embodiment according to the present invention will be described below using
In the communication model of the Web information preferential transfer system of this embodiment, as shown in
In the configuration, as shown in
According to the configuration of the second embodiment, the user cannot specify the priority. The software proxy 140 need not be installed into the user computer 103. Only the LAN-side proxy server 110 can perform a service. Installation and management troubles can be reduced.
A third embodiment according to the present invention will be described below using
In the communication model of the Web information preferential transfer system of this embodiment, as shown in
In the configuration, as shown in
In the third embodiment, the provider 102 can directly provide preferential control and bandwidth assurance services based on the user priority to the user 104, not to the site 101. In this embodiment, the site concept does not exist. It is a communication model for persons and home using the Internet.
As described above, the Web information preferential transfer system of the present invention can provide a suitable communication system to receive a service according to used load when receiving Web information from the Web server via the provider on the existing Internet network.
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/JP00/04848 | 7/19/2000 | WO | 00 | 11/21/2002 |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO02/07395 | 1/24/2002 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
6314465 | Paul et al. | Nov 2001 | B1 |
6701316 | Li et al. | Mar 2004 | B1 |
6968379 | Nielsen | Nov 2005 | B2 |
Number | Date | Country |
---|---|---|
0971518 | Dec 2000 | EP |