WO2002032072A2 - Method and system for managing remote clients in a network constituted by a central server which is linked to remote clients - Google Patents

Method and system for managing remote clients in a network constituted by a central server which is linked to remote clients Download PDF

Info

Publication number
WO2002032072A2
WO2002032072A2 PCT/US2001/031161 US0131161W WO0232072A2 WO 2002032072 A2 WO2002032072 A2 WO 2002032072A2 US 0131161 W US0131161 W US 0131161W WO 0232072 A2 WO0232072 A2 WO 0232072A2
Authority
WO
WIPO (PCT)
Prior art keywords
message
client
server
identifier
processor
Prior art date
Application number
PCT/US2001/031161
Other languages
French (fr)
Other versions
WO2002032072A3 (en
Inventor
Jeffrey Huskins
Original Assignee
Intel Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to DE10196775A priority Critical patent/DE10196775B3/en
Priority to CN018203655A priority patent/CN1528070B/en
Priority to AU2001296620A priority patent/AU2001296620A1/en
Priority to GB0306498A priority patent/GB2383731B/en
Priority to JP2002535345A priority patent/JP2004511960A/en
Priority to CA002423582A priority patent/CA2423582C/en
Application filed by Intel Corporation filed Critical Intel Corporation
Priority to KR1020037005045A priority patent/KR100545488B1/en
Priority to EP01977505A priority patent/EP1325587A2/en
Publication of WO2002032072A2 publication Critical patent/WO2002032072A2/en
Publication of WO2002032072A3 publication Critical patent/WO2002032072A3/en
Priority to NO20031621A priority patent/NO20031621L/en
Priority to FI20030536A priority patent/FI20030536A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations
    • H04L12/18Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations
    • H04L12/18Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
    • H04L12/1881Arrangements for providing special services to substations for broadcast or conference, e.g. multicast with schedule organisation, e.g. priority, sequence management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/04Network management architectures or arrangements
    • H04L41/046Network management architectures or arrangements comprising network management agents or mobile agents therefor

Definitions

  • a multicast network may enable messages to be sent to a target group of clients that constitute a subset of all of the networked clients .
  • multicasting is accomplished by including, within a header for example, the addresses of all the subject clients that are addressed.
  • a broadcast network operator may use a server or head end of a multicast network to control groups or individual broadcast receiver client platforms for the purposes of initiating network management sessions. These sessions may be for purposes of uploading network management information to the server of head end. This allows the network operator to manage the exchange of network management information in a very scalable fashion.
  • Figure 1 is a schematic depiction of one embodiment of the present invention
  • FIG 2 is a flow chart for software resident on the client shown in Figure 1 in accordance with one embodiment of the present' invention
  • Figure 3 is a flow chart for software resident on the server or head-end in accordance with one embodiment of the present invention
  • Figure 4 is a flow chart for software resident on the client shown in Figure 1 in accordance with another embodiment of the present invention
  • Figure 5 is a flow chart for software resident on the server or head end in accordance with another embodiment of the present invention
  • Figure 6 is a flow chart for software resident on the client shown in Figure 1 in accordance with another embodiment of the present invention.
  • Figure 7 is a flow chart for software resident on the server or head end in accordance with another embodiment of the present invention.
  • a network may include at least one server, head-end or network operator 10 and a plurality of clients 12 (only one of which is shown) .
  • the server 10 may be coupled to a plurality of clients (including the client 12) through a distribution system that may be based on a wired system or a wireless or broadcast system. Examples of such networks include television distribution networks such as digital video broadcasting systems.
  • the server 10 may communicate with the clients 12 over a transport 14.
  • the transport 14 may be in accordance with an analog or digital broadcasting system.
  • the transport 14 may be compliant with the Digital Video Broadcast (DVB) ; Network-independent Protocol, ETS 300802, dated November 1997 and available from the European Telecommunications
  • DVD Digital Video Broadcast
  • the transport 14 may be a satellite, cable or airwave broadcasting system as examples .
  • the client 12 recognizes messages directed individually to that client 12 from the server 10 or in some embodiments, from other clients 12. Bandwidth may be conserved by addressing messages to a group of clients without the need to insert, within header, the individual identifiers of each of a large number of addressed clients.
  • the client 12 may include one or more addressable agents 44, 45, 46 and 48 that may be independently addressed by remote units such as the server 10.
  • addressable agents 44, 45, 46 and 48 may be addressed to particular agents resident on the client 12 for appropriate handling.
  • the server 10 may include a network management command and control server 16.
  • the server 16 is responsible for managing the collection of data from clients 12.
  • SMS short message service
  • a client disk management server 20 may be provided as well.
  • a variety of messages may be issued by the client disk management server 20 in order to initiate desired functions on a client's storage device or disk drive 43.
  • client disk management server 20 may be responsible for handling the uploading of a data set that is uniquely identifiable on a client over an available return channel connection 47. This is a valuable capability that allows the network operator to manage the mining of data and the scalability of the associated servers.
  • a unidirectional message service type and message identifier may be used for a data management session control (DMSC) to manage data management sessions for groups of clients or individual clients .
  • DMSC data management session control
  • the server 21 creates a DMSC message data structure and passes information and data to the unidirectional messaging server 22 such as application-private data and data size, unique client identifier, a group flag which is a Boolean variable specifying if the client identifier is a group mask or individual client identifier, a service identifier value for the DMSC service and application-private message identifier.
  • the server 10 may implement a unidirectional messaging system.
  • a unidirectional messaging system the server 10 may transmit messages to a plurality of clients that are unable to respond in any way.
  • a network is a direct-to-home (DTH) broadcast network that may be compliant with the DVB protocol.
  • the network may use a connection oriented communication protocol or a real time connectionless communication protocol as two examples.
  • There are many applications of unidirectional messaging from server to client such as instant messaging, command and control and notification and signaling, as examples.
  • the network may be a bidirectional network, for example with an Internet Protocol (IP) multicast backbone.
  • IP Internet Protocol
  • the server 10 may include a unidirectional messaging server (UMS) 22 that is coupled to the servers 16, 18, 20 and 21 to generate messages in an appropriate format.
  • the messages transmitted by the UMS server 22 may include messages originally generated by one of the servers 16, 18, 20 or 21.
  • the UMS server 22 may then be coupled to an Internet Protocol multicast module 24 that places the messages in an appropriate multicast protocol format.
  • a DVB Multiprotocol Encapsulation (MPE) 26 is coupled to the
  • the MPE is described in DVB Specification for Data Broadcasts (EN 301 192) and Specification for Service Information (SI) in DVB Systems (EN 300 468 VI .3.1 1998-02) both available from the ETS.
  • the output of the DVB MPE 26 and a DVB-Service Information (SI) generator 28 are coupled to the transport 14.
  • Service Information is digital data describing the delivery system, content and scheduling/timing of broadcast data streams.
  • the stream from the DVB-SI generator 28 is coupled to a DVB-SI receiver 40 and service acquisition module 38.
  • the service acquisition module 38 extracts a program identifier (PID) and provides it to a DVB demultiplexer 32.
  • a tuner 30 may tune the client 12 to the appropriate channel corresponding to the extracted program identifier.
  • the message from the DVB MPE 26 is provided to a DVB MPE receiver 42.
  • the receiver 42 communicates with an IP multicast module 40 and a unidirectional messaging server 38.
  • the server 38 breaks down the message to determine whether a service identifier was included in the data stream. If so, the message is forwarded to an appropriate agent designated to receive messages with particular service identifiers .
  • a disk management agent 44 may be coupled to a disk drive controller 47 in turn coupled to a storage device 43 that may, for example, be a hard disk drive.
  • the disk management agent 44 may be addressed as a message recipient by the client disk management server 20.
  • the disk management agent 44 may cause processes to be undertaken through the controller 47 that in turn control the use of the storage device 43. This control may include determining what information is stored on the storage device 43 and how that information is stored on the storage device 43.
  • the network management command and control server 16 may provide a specific message identifier that causes its message to be received by a network management session management agent 48 tuned to a particular service identifier.
  • messages from the instant messaging server 18 may include a service identifier that cause those messages to be forwarded to the agent 48 in the client 12.
  • messages from the data management session control server 21 may have appropriate identifiers that cause them to be shunted to the data management session control agent 45 on the client 12.
  • the server 10 may include a storage 25 that stores software 134, 70 and 102 for controlling the operation of the server 22.
  • the server 38 on the client 12 may be coupled to a storage 43 that stores software 50, 82 and 114 that controls the operation of the server 38.
  • the servers 22 and 38 may also be processor-based systems.
  • the software 50 on the client 12 initially receives the unidirectional messaging server address and port from the server 10.
  • the client 12 may also be assigned a client identifier as indicated in block 52.
  • an Internet Protocol multicast system may be established wherein each client has a UMS address and port as well as a unique client identifier, assigned by the server 10.
  • the server 10 may dynamically adjust addresses and ports as well as client identifiers to enable communication of particular messages, message groups or types of messages to particular clients in a dynamic and reconfigurable fashion.
  • the client 12 receiver Having received its address, port and client identifier, the client 12 receiver joins a multicast group and listens for messages addressed specifically to it or to any groups that the client 12 belongs to, as indicated in block 54.
  • a disk management agent 44 registers its service identifier with the UMS server 38 as indicated in block 56.
  • the UMS server 38 receives a packet with a UMS message, as indicated in block 58, a check determines whether the particular client 12 is the intended recipient as indicated in diamond 60. If not, the message is discarded as . indicated in block 62.
  • the server 38 checks the message's service identifier and passes the message to the correct agent 44,
  • the message is then delivered to the appropriate agent 44 as indicated in block 66.
  • the agent 44 the information is parsed and passed to an appropriate process for handling as indicated in block
  • the disk management agent when addressed, the disk management agent
  • the agent 44 sends appropriate commands to the controller 47 for relay to the storage device 43.
  • the agent 44 may provide appropriately translated commands to the controller
  • the disk management agent 44 may translate a message with a service identifier value into an appropriate format for the controller 47 based on the message received from the client disk management server 20. For example, with a message that includes a service identifier value 0x03, the agent 44 may issue a command to the controller 47 to partition the storage 43.
  • the network software 70 begins by assigning multicast addresses and ports for unidirectional messaging service to a plurality of clients 12 as indicated in block 72.
  • the server 10 may also assign client identifiers in a dynamic and reconfigurable fashion. The address, port and client identifiers are then transmitted to the clients as indicated in block 74.
  • the disk management server 20 may create a data structure and pass this data structure to the server 22 as indicated in block 76.
  • the server 22 creates a unidirectional message and assigns a client value, sets a group flag, and copies private data in the private bytes of the message as indicated in block 78. More particularly, a unique client identifier may be assigned.
  • the client identifier may either be a particular preassigned client identifier or, as one example, may be zero when multiple clients are targeted.
  • a group flag may be a Boolean value specifying whether the client identifier is a group mask or a particular identifier.
  • a group mask is an identifier that identifies a subset of the clients 12 on the network. This subset may include a plurality of clients but less than the total number of addressable clients.
  • the message may include a number of variables including a group_mask, a service_id, a version_id, a message_id, and a private_data_byte .
  • the group_mask may, in one embodiment of the present invention, include 64 bits
  • the service_id may include eight bits
  • the version_id may include sixteen bits
  • the message_id may include eight bits
  • the private_data_byte may include eight bits.
  • the version_id is the version of the unidirectional messaging protocol and may initially be set to zero.
  • the service_id may be a service identifier that may be as one example 0x02 for an instant messaging service.
  • the message size does not exceed 1,024 bytes in order to eliminate potential datagram fragmentation.
  • the group_filter may be used in conjunction with the client_id field to limit the size of the private data bytes required for an application.
  • Each of header items may include an unsigned integer most significant bit first (uimsbf) identifier in accordance with the DVB specification except for the private_data_byte which may include a bit string, left bit first (bslbf) identifier.
  • the message is then sent to all the clients 12 on the network.
  • Each client determines whether the message is intended for that client.
  • the client 12 determines whether it is the specific intended recipient by determining whether the message is addressed to the client identifier of the client 12. For example, using an AND logic operator between the message's identifier and the client's identifier, the client 12 may determine if the client 12 is within a group of clients jointly addressed by the server 10.
  • distinct groups of users may receive common client identifier elements.
  • a plurality of clients whose owners have signed up for enhanced service may include a common 'code portion in their client identifier.
  • each of those clients accepts the message.
  • clients in particular geographic areas, having particular interests or otherwise identifiable clients may be given unique prefixes/suffixes or identifier code portions.
  • the code portion may be logically ANDed with a group_mask to determine whether a particular client is a member of the targeted group.
  • the management message header may also include fields to address the disk management agent 44, such as a volume_name_len field that provides the volume, ' name, length and bytes for the pertinent volume of a storage device 45 in the form of a hard disk drive.
  • a volume_name_len field may be eight bits long and may be have a bslbf identifier.
  • a volume_name_byte field may give the volume name bytes that make up the name of the volume to mount on which to create a partition. In one embodiment of the present invention, this field may be eight bits long and may include a bslbf identifier.
  • a partition_size field may give the size of the partition to create in bytes.
  • This field may be thirty-two bits in size and may use the uimsbf identifier.
  • additional fields and additional service identifiers may be utilized to implement still additional commands to the client storage device 45.
  • the client disk management server 20 under the direction from the server or head-end 10, may control how the storage 43 is set up and utilized on a targeted client 12 or a targeted group of clients 12.
  • Each of the clients 12 may be individually addressed, the entire set of clients may be addressed or any subgroup of clients may be collectively addressed such that their storage devices 45 may be individually or collectively modified.
  • the storage devices 43 of one or more clients may be selectively controlled from the server 10.
  • the software 82 on the client 12 for implementing a network management session initially receives the unidirectional messaging server address and port from the server 10.
  • the client 12 may also be assigned a client identifier as indicated in block 84.
  • an Internet Protocol multicast system may be established wherein each client has a UMS address and port as well as a unique client identifier, assigned by the server 10. Having receives its address, port and client identifier, the client 12 receiver joins a multicast group and listens for messages addressed specifically to it or to any groups that the client 12 belongs to, as indicated in block 86.
  • a data management session control agent 45 registered its service identifier with the UMS server 38 as indicated in block 88.
  • the UMS server 38 receives a packet with a UMS message, as indicated in block 90, a check determines whether the particular client 12 is the intended recipient as indicated in diamond 92. If not, the message is discarded as indicated in block 94.
  • the server 38 checks the message's server identifier and passes the message to the correct agent 45, as indicated in block 64. The message is then delivered to the appropriate agent 45, as indicated in block 98. In the agent 45, the information is parsed and passed to an appropriate process for handling as indicated in block 100.
  • the data management session control agent 45 receives a targeted message from the data management session control server 21 and in response thereto provides the data requested by the server 21, for example over a back channel 47.
  • the agent 45 may receive messages having a particular syntax including a ManagementMessage ( ) which includes a group_mask, a service_id, a version_id, a message_id, a message_byte_count, and a DMSessionControlMessage ( ) that in turn includes a session_id, a session_host_name, a session_start_time, a session_duration and a data_id.
  • a ManagementMessage ( ) which includes a group_mask, a service_id, a version_id, a message_id, a message_byte_count, and a DMSessionControlMessage ( ) that in turn includes a session_id, a session_host_name, a session_start_time, a session_duration and a data_id.
  • the session_id is a unique session identifier.
  • the server_host_name is a string host name of the data management server to establish a connection.
  • the session_start_time is a date and time for the client 12 to establish the session.
  • the session__duration is the duration after start time that the server 21 will accept the session and provides a time window if necessary.
  • the data_id is a unique identifier of information or data set to exchange during the session. The method for managing and assigning information and/or data of the identifier is application private .
  • the server 21 can initiate a message to the client 12 which causes the client 12 to initiate an uploading of specified data at a specified time. That is, the server 21 may specify a header including a session_id, a server_host__name, a session_start_time, a session_duration, and a data_id, and in response thereto the data management session control agent 45 gathers the requested information and provides it in the requested form at the requested time.
  • the server 21 may provide messages with different message identifiers including a session create message, a session delete message and session update message, as examples.
  • the session delete message simply deletes a previously created session and the session update message causes additional information to be provided for a scheduled session.
  • the group_mask may include 64 bits with the uimsbf identifier.
  • the session_id may include eight bits with a uimsbf identifier.
  • the version_id may include sixteen bits with a uimsbf identifier.
  • the message_id may include eight bits and have an identifier of 0x01.
  • the message_byte_count may include sixteen bits within a uimsbf identifier.
  • the DataManagementSessionControlMessage may include the syntax session_id with eight bits, session_start_time with sixty- four bits, session_duration with thirty-two bits, and data_id with thirty-two bits in one embodiment, all in the uimsbf identifier format.
  • the DataManagementSessionControlMessage may also include a server_host_name with one hundred twenty- eight bits with a bslbf identifier.
  • the network software 102 begins by assigning multicast addresses and ports for unidirectional messaging service to a plurality of clients 12 as indicated in block 104.
  • the server 10 may also assign client identifiers in a dynamic and reconfigurable fashion. The address, port and client identifiers are then transmitted to the clients as indicated in block 106.
  • the data management session control server 21 may create a data structure and pass this data structure to the server 22 as indicated in block 108.
  • the server 22 creates a unidirectional message and assigns a client value, sets a group flag, and copies private data in the private bytes of the message as indicated in block 110. More particularly, a unique client identifier may be assigned.
  • the client identifier may either be a particular preassigned client identifier, or as one example, may be zero when multiple clients are targeted.
  • a group flag may be a Boolean value specifying whether the client identifier is a group mask or a particular identifier.
  • a group mask is an identifier that identifies a subset of the clients 12 on the network.
  • This subset may include a plurality of clients but less than the total number of addressable clients.
  • the message is then sent to all the clients 12 on the network.
  • Each client determines whether the message is intended for that client.
  • the client 12 determines whether it is the specific intended recipient by determining whether the message is addressed to the client identifier for the client 12. For example, using an AND logic operator between the message's identifier and the client's identifier, the client 12 may determine if the client 12 is within a group of clients jointly addressed by the server 10.
  • the network management command and control server 16 works with the network session management agent 48. When a message generated at the instance of the server 16 is directed to the agent 48, the agent 48 calls the session manager 49.
  • the session manager may provide the desired management information in a predetermined format over a back channel 43 in one embodiment of the present invention.
  • the network management sessions are generally for the purposes of uploading network management information to the server 16.
  • a management information base MIB
  • SNMP simple network management protocol
  • the operation of the agent 48 shown in Figure 6, generally corresponds to that described previously with respect to the agents 44 and 45. That is, the UMS addresses, port and client identifiers are received, as indicated in block 116, the receiver joins the multicast group and listens for messages as indicated in block 118 and the network session management agent 48 registers its service identifier with the UMS receiver as indicated in block 120. The UMS receiver then receives the package with the message as indicated in block 122.
  • a check at diamond 124 determines whether the particular agent 48 is the intended recipient. If not, the message is discarded as indicated in block 126. Otherwise, the receiver checks the service identifier and passes the message to the agent 48, as indicated in block 130. The information is parsed and passed to the session manager 49. The session manager 49 then schedules the session, using the channel 43, with the server 16.
  • an NMSessionControlMessage includes an info_ID field.
  • info_ID field is a unique identifier of information or a data set to exchange during the session.
  • the method of managing and assigning the information and/or data set identifier is application private. For example, a specific SNMP client MIB may be identified to upload to the server, if the client manages multiple MIBs .
  • MIB is information on an agent that is known as the management information base. This information forms a basis for event reporting.
  • the standards for MIBs are set forth for example in RFC 1229 distributed by the Network Working Group (March 1991) .
  • the operation of the network management server 16, utilizing the software 134 corresponds generally to that described previously.
  • the multicast address and port for UMS is assigned and the client identifiers are assigned as indicated in block 136
  • the UMS address and port and client identifier are sent to the clients as indicated in block 138
  • the network management command and control server 16 creates a data structure and passes the data to the UMS server as indicated in block 140.
  • the UMS server 22 then creates the UM message, assigns a client value, sets a group flag and copies private data into private bytes of the message as indicated in block 142. Thereafter, the message is sent (block 144) .
  • the server 16 receives the scheduling information from the session manager 49.
  • a session may be provided in which the MIBs or other information is uploaded to the server 16 via the actions of the agent 48 and session manager 49.
  • distinct groups of users may receive common client identifier elements.
  • a plurality of clients whose owners have signed up for enhanced service may include a common code portion in their client identifier.
  • each of those clients accepts the message.

Abstract

A messaging system may enable a server to assign unique identifiers to a plurality of clients. These identifiers enable a client to determine whether a message is specifically targeted to that client or, as an alternative, whether the client is a member of a group of targeted clients. A server may send messages containing an identifier to agents on one or more clients. The identifier may specify commands to manage the uploading of information from one or more clients to a server.

Description

MANAGING REMOTE CLIENTS
Background This invention relates generally to exchanging information in networks . A multicast network may enable messages to be sent to a target group of clients that constitute a subset of all of the networked clients . Generally, multicasting is accomplished by including, within a header for example, the addresses of all the subject clients that are addressed. A broadcast network operator may use a server or head end of a multicast network to control groups or individual broadcast receiver client platforms for the purposes of initiating network management sessions. These sessions may be for purposes of uploading network management information to the server of head end. This allows the network operator to manage the exchange of network management information in a very scalable fashion.
Thus, there is a need for ways to enable the exchange of information between clients and a server, head end or broadcast network operator.
Brief Description of the Drawings Figure 1 is a schematic depiction of one embodiment of the present invention;
Figure 2 is a flow chart for software resident on the client shown in Figure 1 in accordance with one embodiment of the present' invention;
Figure 3 is a flow chart for software resident on the server or head-end in accordance with one embodiment of the present invention; Figure 4 is a flow chart for software resident on the client shown in Figure 1 in accordance with another embodiment of the present invention; Figure 5 is a flow chart for software resident on the server or head end in accordance with another embodiment of the present invention;
Figure 6 is a flow chart for software resident on the client shown in Figure 1 in accordance with another embodiment of the present invention; and
Figure 7 is a flow chart for software resident on the server or head end in accordance with another embodiment of the present invention.
Detailed Description
Referring to Figure 1, a network may include at least one server, head-end or network operator 10 and a plurality of clients 12 (only one of which is shown) . The server 10 may be coupled to a plurality of clients (including the client 12) through a distribution system that may be based on a wired system or a wireless or broadcast system. Examples of such networks include television distribution networks such as digital video broadcasting systems.
In one embodiment of the present invention, the server 10 may communicate with the clients 12 over a transport 14. The transport 14 may be in accordance with an analog or digital broadcasting system. As one example, the transport 14 may be compliant with the Digital Video Broadcast (DVB) ; Network-independent Protocol, ETS 300802, dated November 1997 and available from the European Telecommunications
Standards Institute (ETS), Valbonne, France. The transport 14 may be a satellite, cable or airwave broadcasting system as examples .
In accordance with embodiments of the present invention, the client 12 recognizes messages directed individually to that client 12 from the server 10 or in some embodiments, from other clients 12. Bandwidth may be conserved by addressing messages to a group of clients without the need to insert, within header, the individual identifiers of each of a large number of addressed clients. In addition, the client 12 may include one or more addressable agents 44, 45, 46 and 48 that may be independently addressed by remote units such as the server 10. Moreover, by providing addressable agents 44, 45, 46 and 48 within a given client 12, messages that are specialized or which need specialized handling may be addressed to particular agents resident on the client 12 for appropriate handling.
The server 10 may include a network management command and control server 16. The server 16 is responsible for managing the collection of data from clients 12. The server 16 transmits messages which include a distinct service identifier (e.g., service_id=0x02) . The server 10 may also include an instant messaging or short message service (SMS) server 18 that also transmits messages having a distinct service identifier (e.g., service_id=0x04) . In addition, a client disk management server 20 may be provided as well. The client disk management server 20 may transmit messages that include one or more distinct service identifiers (e.g., service_id=0x01) . In some cases, a variety of messages may be issued by the client disk management server 20 in order to initiate desired functions on a client's storage device or disk drive 43. For example, separate service identifiers may be utilized for the commands to create partitions, delete partitions, or modify partitions, as examples. A data management session control server 21 may be responsible for handling the uploading of a data set that is uniquely identifiable on a client over an available return channel connection 47. This is a valuable capability that allows the network operator to manage the mining of data and the scalability of the associated servers. A unidirectional message service type and message identifier may be used for a data management session control (DMSC) to manage data management sessions for groups of clients or individual clients . This group management is inherently supported by a unidirectional messaging service by the strategic assignment of client identifiers for all broadcast receiver clients in the network that are managed by the server 10. The data management session control server 21 transmits messages that include one or more distinct service identifiers (e.g., service__id=0x03) . The server 21 creates a DMSC message data structure and passes information and data to the unidirectional messaging server 22 such as application-private data and data size, unique client identifier, a group flag which is a Boolean variable specifying if the client identifier is a group mask or individual client identifier, a service identifier value for the DMSC service and application-private message identifier. In accordance with one embodiment of the present invention, the server 10 may implement a unidirectional messaging system. In a unidirectional messaging system, the server 10 may transmit messages to a plurality of clients that are unable to respond in any way. One example of such a network is a direct-to-home (DTH) broadcast network that may be compliant with the DVB protocol. The network may use a connection oriented communication protocol or a real time connectionless communication protocol as two examples. There are many applications of unidirectional messaging from server to client such as instant messaging, command and control and notification and signaling, as examples. In other cases, the network may be a bidirectional network, for example with an Internet Protocol (IP) multicast backbone. In one embodiment of the invention, the server 10 may include a unidirectional messaging server (UMS) 22 that is coupled to the servers 16, 18, 20 and 21 to generate messages in an appropriate format. The messages transmitted by the UMS server 22 may include messages originally generated by one of the servers 16, 18, 20 or 21. The UMS server 22 may then be coupled to an Internet Protocol multicast module 24 that places the messages in an appropriate multicast protocol format. Finally, a DVB Multiprotocol Encapsulation (MPE) 26 is coupled to the
Internet protocol multicast module 24. The MPE is described in DVB Specification for Data Broadcasts (EN 301 192) and Specification for Service Information (SI) in DVB Systems (EN 300 468 VI .3.1 1998-02) both available from the ETS. The output of the DVB MPE 26 and a DVB-Service Information (SI) generator 28 are coupled to the transport 14. Service Information is digital data describing the delivery system, content and scheduling/timing of broadcast data streams.
In the client 12, the stream from the DVB-SI generator 28 is coupled to a DVB-SI receiver 40 and service acquisition module 38. The service acquisition module 38 extracts a program identifier (PID) and provides it to a DVB demultiplexer 32. A tuner 30 may tune the client 12 to the appropriate channel corresponding to the extracted program identifier.
The message from the DVB MPE 26 is provided to a DVB MPE receiver 42. The receiver 42 communicates with an IP multicast module 40 and a unidirectional messaging server 38. The server 38 breaks down the message to determine whether a service identifier was included in the data stream. If so, the message is forwarded to an appropriate agent designated to receive messages with particular service identifiers . A disk management agent 44 may be coupled to a disk drive controller 47 in turn coupled to a storage device 43 that may, for example, be a hard disk drive. The disk management agent 44 may be addressed as a message recipient by the client disk management server 20. The disk management agent 44 may cause processes to be undertaken through the controller 47 that in turn control the use of the storage device 43. This control may include determining what information is stored on the storage device 43 and how that information is stored on the storage device 43.
In one embodiment of the present invention, the network management command and control server 16 may provide a specific message identifier that causes its message to be received by a network management session management agent 48 tuned to a particular service identifier. Similarly, messages from the instant messaging server 18 may include a service identifier that cause those messages to be forwarded to the agent 48 in the client 12. Likewise, messages from the data management session control server 21 may have appropriate identifiers that cause them to be shunted to the data management session control agent 45 on the client 12.
The server 10 may include a storage 25 that stores software 134, 70 and 102 for controlling the operation of the server 22. Likewise, the server 38 on the client 12 may be coupled to a storage 43 that stores software 50, 82 and 114 that controls the operation of the server 38. The servers 22 and 38 may also be processor-based systems.
Turning next to Figure 2, the software 50 on the client 12 initially receives the unidirectional messaging server address and port from the server 10. The client 12 may also be assigned a client identifier as indicated in block 52. Thus, an Internet Protocol multicast system may be established wherein each client has a UMS address and port as well as a unique client identifier, assigned by the server 10. In some embodiments, the server 10 may dynamically adjust addresses and ports as well as client identifiers to enable communication of particular messages, message groups or types of messages to particular clients in a dynamic and reconfigurable fashion.
Having received its address, port and client identifier, the client 12 receiver joins a multicast group and listens for messages addressed specifically to it or to any groups that the client 12 belongs to, as indicated in block 54.
A disk management agent 44 registers its service identifier with the UMS server 38 as indicated in block 56. When the UMS server 38 receives a packet with a UMS message, as indicated in block 58, a check determines whether the particular client 12 is the intended recipient as indicated in diamond 60. If not, the message is discarded as . indicated in block 62.
However, if the particular client 12 is the intended recipient, the server 38 checks the message's service identifier and passes the message to the correct agent 44,
46 or 48, as indicated in block 64. The message is then delivered to the appropriate agent 44 as indicated in block 66. In the agent 44, the information is parsed and passed to an appropriate process for handling as indicated in block
68.
For example, when addressed, the disk management agent
44 sends appropriate commands to the controller 47 for relay to the storage device 43. Dependent on the service identifier accompanying the message, the agent 44 may provide appropriately translated commands to the controller
47 such as the commands to create a partition, delete a partition or modify a partition. Each of these commands may be given separate service identifier values such as 0x03, 0x04 and 0x05. The disk management agent 44 may translate a message with a service identifier value into an appropriate format for the controller 47 based on the message received from the client disk management server 20. For example, with a message that includes a service identifier value 0x03, the agent 44 may issue a command to the controller 47 to partition the storage 43.
On the server side, shown in Figure 3, the network software 70 begins by assigning multicast addresses and ports for unidirectional messaging service to a plurality of clients 12 as indicated in block 72. The server 10 may also assign client identifiers in a dynamic and reconfigurable fashion. The address, port and client identifiers are then transmitted to the clients as indicated in block 74.
Thereafter, the disk management server 20 may create a data structure and pass this data structure to the server 22 as indicated in block 76. The server 22 creates a unidirectional message and assigns a client value, sets a group flag, and copies private data in the private bytes of the message as indicated in block 78. More particularly, a unique client identifier may be assigned. The client identifier may either be a particular preassigned client identifier or, as one example, may be zero when multiple clients are targeted. A group flag may be a Boolean value specifying whether the client identifier is a group mask or a particular identifier. A group mask is an identifier that identifies a subset of the clients 12 on the network. This subset may include a plurality of clients but less than the total number of addressable clients.
As one example of a undirectional message header, the message may include a number of variables including a group_mask, a service_id, a version_id, a message_id, and a private_data_byte . The group_mask may, in one embodiment of the present invention, include 64 bits, the service_id may include eight bits, the version_id may include sixteen bits, the message_id may include eight bits and the private_data_byte may include eight bits. The version_id is the version of the unidirectional messaging protocol and may initially be set to zero. The service_id may be a service identifier that may be as one example 0x02 for an instant messaging service. Advantageously, the message size does not exceed 1,024 bytes in order to eliminate potential datagram fragmentation. The group_filter may be used in conjunction with the client_id field to limit the size of the private data bytes required for an application. Each of header items may include an unsigned integer most significant bit first (uimsbf) identifier in accordance with the DVB specification except for the private_data_byte which may include a bit string, left bit first (bslbf) identifier.
As indicated in block 80, the message is then sent to all the clients 12 on the network. Each client then determines whether the message is intended for that client. The client 12 determines whether it is the specific intended recipient by determining whether the message is addressed to the client identifier of the client 12. For example, using an AND logic operator between the message's identifier and the client's identifier, the client 12 may determine if the client 12 is within a group of clients jointly addressed by the server 10.
In one embodiment of the present invention, distinct groups of users may receive common client identifier elements. Thus, a plurality of clients whose owners have signed up for enhanced service may include a common 'code portion in their client identifier. When a message including that common code portion in the client identifier is received, each of those clients accepts the message. Likewise, clients in particular geographic areas, having particular interests or otherwise identifiable clients may be given unique prefixes/suffixes or identifier code portions. The code portion may be logically ANDed with a group_mask to determine whether a particular client is a member of the targeted group.
The management message header may also include fields to address the disk management agent 44, such as a volume_name_len field that provides the volume,' name, length and bytes for the pertinent volume of a storage device 45 in the form of a hard disk drive. In one embodiment of the present invention, that field may be eight bits long and may be have a bslbf identifier. In addition, a volume_name_byte field may give the volume name bytes that make up the name of the volume to mount on which to create a partition. In one embodiment of the present invention, this field may be eight bits long and may include a bslbf identifier. Finally, a partition_size field may give the size of the partition to create in bytes. This field may be thirty-two bits in size and may use the uimsbf identifier. Of course, additional fields and additional service identifiers may be utilized to implement still additional commands to the client storage device 45. In this way, the client disk management server 20, under the direction from the server or head-end 10, may control how the storage 43 is set up and utilized on a targeted client 12 or a targeted group of clients 12. Each of the clients 12 may be individually addressed, the entire set of clients may be addressed or any subgroup of clients may be collectively addressed such that their storage devices 45 may be individually or collectively modified. Thus, the storage devices 43 of one or more clients may be selectively controlled from the server 10.
Referring to Figure 4, the software 82 on the client 12 for implementing a network management session, initially receives the unidirectional messaging server address and port from the server 10. The client 12 may also be assigned a client identifier as indicated in block 84. Thus, an Internet Protocol multicast system may be established wherein each client has a UMS address and port as well as a unique client identifier, assigned by the server 10. Having receives its address, port and client identifier, the client 12 receiver joins a multicast group and listens for messages addressed specifically to it or to any groups that the client 12 belongs to, as indicated in block 86.
A data management session control agent 45 registered its service identifier with the UMS server 38 as indicated in block 88. When the UMS server 38 receives a packet with a UMS message, as indicated in block 90, a check determines whether the particular client 12 is the intended recipient as indicated in diamond 92. If not, the message is discarded as indicated in block 94.
However, if the particular client 12 is the intended recipient, the server 38 checks the message's server identifier and passes the message to the correct agent 45, as indicated in block 64. The message is then delivered to the appropriate agent 45, as indicated in block 98. In the agent 45, the information is parsed and passed to an appropriate process for handling as indicated in block 100. The data management session control agent 45 receives a targeted message from the data management session control server 21 and in response thereto provides the data requested by the server 21, for example over a back channel 47. Thus, in one embodiment, the agent 45 may receive messages having a particular syntax including a ManagementMessage ( ) which includes a group_mask, a service_id, a version_id, a message_id, a message_byte_count, and a DMSessionControlMessage ( ) that in turn includes a session_id, a session_host_name, a session_start_time, a session_duration and a data_id.
The session_id is a unique session identifier. The server_host_name is a string host name of the data management server to establish a connection. The session_start_time is a date and time for the client 12 to establish the session. The session__duration is the duration after start time that the server 21 will accept the session and provides a time window if necessary. The data_id is a unique identifier of information or data set to exchange during the session. The method for managing and assigning information and/or data of the identifier is application private .
Thus, the server 21 can initiate a message to the client 12 which causes the client 12 to initiate an uploading of specified data at a specified time. That is, the server 21 may specify a header including a session_id, a server_host__name, a session_start_time, a session_duration, and a data_id, and in response thereto the data management session control agent 45 gathers the requested information and provides it in the requested form at the requested time.
The server 21 may provide messages with different message identifiers including a session create message, a session delete message and session update message, as examples. The session delete message simply deletes a previously created session and the session update message causes additional information to be provided for a scheduled session. In one embodiment of the present invention, the group_mask may include 64 bits with the uimsbf identifier. The session_id may include eight bits with a uimsbf identifier. The version_id may include sixteen bits with a uimsbf identifier. The message_id may include eight bits and have an identifier of 0x01. The message_byte_count may include sixteen bits within a uimsbf identifier. The DataManagementSessionControlMessage () may include the syntax session_id with eight bits, session_start_time with sixty- four bits, session_duration with thirty-two bits, and data_id with thirty-two bits in one embodiment, all in the uimsbf identifier format. The DataManagementSessionControlMessage ( ) may also include a server_host_name with one hundred twenty- eight bits with a bslbf identifier. On the server side, shown in Figure 5, the network software 102 begins by assigning multicast addresses and ports for unidirectional messaging service to a plurality of clients 12 as indicated in block 104. The server 10 may also assign client identifiers in a dynamic and reconfigurable fashion. The address, port and client identifiers are then transmitted to the clients as indicated in block 106.
Thereafter, the data management session control server 21 may create a data structure and pass this data structure to the server 22 as indicated in block 108. The server 22 creates a unidirectional message and assigns a client value, sets a group flag, and copies private data in the private bytes of the message as indicated in block 110. More particularly, a unique client identifier may be assigned. The client identifier may either be a particular preassigned client identifier, or as one example, may be zero when multiple clients are targeted. A group flag may be a Boolean value specifying whether the client identifier is a group mask or a particular identifier. A group mask is an identifier that identifies a subset of the clients 12 on the network. This subset may include a plurality of clients but less than the total number of addressable clients. As indicated in block 112, the message is then sent to all the clients 12 on the network. Each client then determines whether the message is intended for that client. The client 12 determines whether it is the specific intended recipient by determining whether the message is addressed to the client identifier for the client 12. For example, using an AND logic operator between the message's identifier and the client's identifier, the client 12 may determine if the client 12 is within a group of clients jointly addressed by the server 10. The network management command and control server 16 works with the network session management agent 48. When a message generated at the instance of the server 16 is directed to the agent 48, the agent 48 calls the session manager 49. The session manager may provide the desired management information in a predetermined format over a back channel 43 in one embodiment of the present invention.
The network management sessions are generally for the purposes of uploading network management information to the server 16. As one example, a management information base (MIB) may be uploaded over a simple network management protocol (SNMP) over the return channel 43. The operation of the agent 48, shown in Figure 6, generally corresponds to that described previously with respect to the agents 44 and 45. That is, the UMS addresses, port and client identifiers are received, as indicated in block 116, the receiver joins the multicast group and listens for messages as indicated in block 118 and the network session management agent 48 registers its service identifier with the UMS receiver as indicated in block 120. The UMS receiver then receives the package with the message as indicated in block 122.
A check at diamond 124 determines whether the particular agent 48 is the intended recipient. If not, the message is discarded as indicated in block 126. Otherwise, the receiver checks the service identifier and passes the message to the agent 48, as indicated in block 130. The information is parsed and passed to the session manager 49. The session manager 49 then schedules the session, using the channel 43, with the server 16.
The message format is basically the same as the format used by the DMSC. However, instead of having DMSessionControlMessage () , an NMSessionControlMessage () includes an info_ID field. The info_ID field is a unique identifier of information or a data set to exchange during the session. The method of managing and assigning the information and/or data set identifier is application private. For example, a specific SNMP client MIB may be identified to upload to the server, if the client manages multiple MIBs .
An MIB is information on an agent that is known as the management information base. This information forms a basis for event reporting. The standards for MIBs are set forth for example in RFC 1229 distributed by the Network Working Group (May 1991) .
Turning next to Figure 7, the operation of the network management server 16, utilizing the software 134, corresponds generally to that described previously. Again, the multicast address and port for UMS is assigned and the client identifiers are assigned as indicated in block 136, the UMS address and port and client identifier are sent to the clients as indicated in block 138, and the network management command and control server 16 creates a data structure and passes the data to the UMS server as indicated in block 140. The UMS server 22 then creates the UM message, assigns a client value, sets a group flag and copies private data into private bytes of the message as indicated in block 142. Thereafter, the message is sent (block 144) .
Then at the predetermined time, the server 16 receives the scheduling information from the session manager 49. At the appropriate time, a session may be provided in which the MIBs or other information is uploaded to the server 16 via the actions of the agent 48 and session manager 49.
In one embodiment of the present invention, distinct groups of users may receive common client identifier elements. Thus, a plurality of clients whose owners have signed up for enhanced service may include a common code portion in their client identifier. When a message including that common code portion in the client identifier is received, each of those clients accepts the message.
While the present invention has been described with respect to a limited number of embodiments, those skilled in the art will appreciate numerous modifications and variations therefrom. It is intended that the appended claims cover all such modifications and variations as fall within the true spirit and scope of this present invention.

Claims

What is claimed is:
1. A method comprising: receiving on a client a message from a server addressed to said client; and scheduling a data upload session based on said message .
2. The method of claim 1 further comprising: assigning an individual identifier to the clients comprising a set of clients including said client; assigning a group identifier to a subset of the clients within the set of clients; and enabling said client in said set to determine whether a message is sent to said client or to the subset.
3. The method of claim 2 including sending a message to a client in a unidirectional messaging system.
4. The method of claim 1 including receiving a message including an identifier which specifies a task to perform on a storage device.
5. The method of claim 4 including receiving a message including an identifier indicating a change to a partition on said storage device.
6. The method of claim 1 including locating an identifier within said message that specifies an agent on said client to handle said message, and forwarding said message to said agent.
7. The method of claim 6 including enabling said agent to upload said data to said server over a back channel .
8. The method of claim 6 further including extracting a specified time from said message and uploading said data at the specified time.
9. The method of claim 1 including extracting from said message an identifier which specifies the information to upload to said server and uploading the specified information to said server.
10. The method of claim 9 wherein said message includes a server identifier, and uploading said data to the identified server.
11. An article comprising a medium storing instructions that enable a processor-based system to: receive a message from a server addressed to said system; and schedule the uploading of information from said system to said server based on said message.
12. The article of claim 11 further storing instructions that enable a processor-based system to: assign an individual identifier to each of the clients comprising a set of clients including said system; assign a group identifier to a subset of the clients within the set of clients; and enable the system to determine whether a message is sent to the system or to the subset.
13. The article of claim 12 further storing instructions that enable the processor-based system to send a message to a client in a unidirectional messaging system.
14. The article of claim 11 further storing instructions that enable the processor-based system to decode a command within said message to modify the storage of information on a storage device.
15. The article of claim 11 further storing instructions that enable the processor-based system to locate an identifier within said message that specifies an agent on said system to handle said message, and forward said message to said agent.
16. The article of claim 15 further storing instructions that enable said processor-based system to upload said data to said server over a back channel.
17. The article of claim 15 further storing instructions that enable the processor-based system to extract a specified time from said message and upload said data at the specified time.
18. The article of claim 11 further storing instructions that enable the processor-based system to extract from said message an identifier which specifies the information to upload to said server and upload the specified information to said server.
19. The article of claim 18 further storing instructions that enable the processor-based system to upload said data to a server identified in said message.
20. A system comprising: a processor-based device; and a storage storing instructions that enable said processor-based device to receive a message from a server addressed to said processor-based device and schedule the uploading of information to said server based on said message.
21. The system of claim 20 wherein said storage stores instructions that enable the device to compare a group identifier in a message to determine whether the device is within a group addressed by said server.
22. The system of claim 20 wherein said storage stores instructions that enable said processor-based device to locate an identifier within said message that specifies an agent on said device to handle said message and forward said message to said agent.
23. A method comprising: transmitting a message to a client; and scheduling the uploading of information on said client based on said message.
24 . The method of claim 23 further storing instructions that enable the processor-based system to receive an upload of data over a back channel from a client.
25. The method of claim 24 including transmitting a time specification in the message and receiving an upload of data from a client at said specified time.
26. An article comprising a medium storing instructions that enable a processor-based system to: transmit a message to a client; and schedule the uploading of information to said system based on said message.
27. The article of claim 26 further storing instructions that enable the processor-based system to transmit information in said message that specifies a time
' for an information upload from said client.
28. The article of claim 26 further storing instructions that enable the processor-based system to transmit a message that specifies the information that the client should upload.
29. A system comprising: a processor-based device; and a storage storing instructions that enable said processor-based device to transmit a message to a client and schedule the uploading of information on said client to said system based on said message.
30. The system of claim 29 wherein said storage stores instructions that enable the processor-based device to specify how information is provided from the client to said system.
PCT/US2001/031161 2000-10-10 2001-10-03 Method and system for managing remote clients in a network constituted by a central server which is linked to remote clients WO2002032072A2 (en)

Priority Applications (10)

Application Number Priority Date Filing Date Title
CN018203655A CN1528070B (en) 2000-10-10 2001-10-03 Method and system for managing remote clients in a network constituted by a central server
AU2001296620A AU2001296620A1 (en) 2000-10-10 2001-10-03 Method and system for managing remote clients in a network constituted by a central server which is linked to remote clients
GB0306498A GB2383731B (en) 2000-10-10 2001-10-03 Managing remote clients
JP2002535345A JP2004511960A (en) 2000-10-10 2001-10-03 Method and system for managing remote clients in a network
CA002423582A CA2423582C (en) 2000-10-10 2001-10-03 Method and system for managing remote clients in a network constituted by a central server which is linked to remote clients
DE10196775A DE10196775B3 (en) 2000-10-10 2001-10-03 Manage remote clients
KR1020037005045A KR100545488B1 (en) 2000-10-10 2001-10-03 Method And System For Managing Remote Clients In A Network Constituted By A Central Server Which Is Linked To Remote Clients
EP01977505A EP1325587A2 (en) 2000-10-10 2001-10-03 Method and system for managing remote clients in a network constituted by a central server which is linked to remote clients
NO20031621A NO20031621L (en) 2000-10-10 2003-04-09 Remote client management
FI20030536A FI20030536A (en) 2000-10-10 2003-04-09 Control of distance customers

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US09/686,754 US7765316B1 (en) 2000-10-10 2000-10-10 Scheduling the uploading of information from a client to a server
US09/686,754 2000-10-10

Publications (2)

Publication Number Publication Date
WO2002032072A2 true WO2002032072A2 (en) 2002-04-18
WO2002032072A3 WO2002032072A3 (en) 2003-02-06

Family

ID=24757607

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2001/031161 WO2002032072A2 (en) 2000-10-10 2001-10-03 Method and system for managing remote clients in a network constituted by a central server which is linked to remote clients

Country Status (13)

Country Link
US (1) US7765316B1 (en)
EP (1) EP1325587A2 (en)
JP (3) JP2004511960A (en)
KR (1) KR100545488B1 (en)
CN (1) CN1528070B (en)
AU (1) AU2001296620A1 (en)
CA (1) CA2423582C (en)
DE (1) DE10196775B3 (en)
FI (1) FI20030536A (en)
GB (1) GB2383731B (en)
NO (1) NO20031621L (en)
TW (1) TW530238B (en)
WO (1) WO2002032072A2 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005091597A1 (en) * 2004-03-18 2005-09-29 Nokia Corporation System and associated terminal, method and computer program product for uploading content
WO2008052476A1 (en) * 2006-11-01 2008-05-08 Huawei Technologies Co., Ltd. Method for managing conversation, universal message client and server
CN104081718A (en) * 2012-08-21 2014-10-01 英特尔公司 A network controller for remote system management

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI390898B (en) 2003-07-16 2013-03-21 Interdigital Tech Corp Method and system for transferring information between network management entities of a wireless communication system
WO2005064851A1 (en) * 2003-12-30 2005-07-14 Bce Inc. Remotely managed subscriber station
JP4730004B2 (en) * 2004-07-21 2011-07-20 ソニー株式会社 Content sharing system and content sharing method
CN101316221B (en) * 2007-05-30 2012-04-04 华为终端有限公司 Notification message processing method and equipment
CN101355524B (en) * 2007-07-24 2013-10-09 华为技术有限公司 Method, system, server and terminal for processing information
CN101374267B (en) * 2007-08-23 2011-04-20 华为技术有限公司 Method and apparatus for processing session initialization protocol propelling information
CN102577426B (en) * 2009-09-22 2016-08-03 瑞典爱立信有限公司 Subscriber equipment presents the method for IPTV notice
US8984168B2 (en) * 2011-03-31 2015-03-17 Microsoft Technology Licensing, Llc Relative timestamp when real time clock is unavailable
US9015224B2 (en) 2011-10-09 2015-04-21 LabTech, LLC Interactive response of a remote monitoring and management system
US9055091B2 (en) 2011-11-16 2015-06-09 LabTech, LLC Adaptive timing of distributed device response to maximize channel capacity utilization
CN109117336A (en) * 2018-08-20 2019-01-01 郑州云海信息技术有限公司 A kind of management method and device of server
US11683299B2 (en) * 2021-03-08 2023-06-20 Oracle International Corporation Semi-interactive one-way transfer of data to an isolated network

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5978845A (en) * 1997-03-25 1999-11-02 Sun Microsystems, Inc. Network management relay mechanism

Family Cites Families (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100334689B1 (en) * 1994-02-28 2002-10-04 브리티쉬 텔리커뮤니케이션즈 파블릭 리미티드 캄퍼니 Data storage
US6658465B1 (en) * 1997-08-25 2003-12-02 Intel Corporation Method and apparatus for monitoring and controlling programs in a network
US5558339A (en) * 1994-05-05 1996-09-24 Perlman; Stephen G. Network architecture to support recording and playback of real-time video games
JPH09130421A (en) 1995-11-02 1997-05-16 Furukawa Electric Co Ltd:The Virtual network controlling method
US5727156A (en) * 1996-04-10 1998-03-10 Hotoffice Technologies, Inc. Internet-based automatic publishing system
JP2950262B2 (en) * 1996-11-29 1999-09-20 日本電気株式会社 How to set up a multi-integrated agent system
US6085243A (en) * 1996-12-13 2000-07-04 3Com Corporation Distributed remote management (dRMON) for networks
JPH10242962A (en) 1997-02-25 1998-09-11 Nippon Telegr & Teleph Corp <Ntt> Multi-cast gateway communication method and system on internet
US6058399A (en) 1997-08-28 2000-05-02 Colordesk, Ltd. File upload synchronization
US6021439A (en) * 1997-11-14 2000-02-01 International Business Machines Corporation Internet quality-of-service method and system
IL123819A (en) * 1998-03-24 2001-09-13 Geo Interactive Media Group Lt Network media streaming
US6078954A (en) * 1998-05-26 2000-06-20 Williams Communications, Inc. Server directed multicast communication method and system
JP2000049889A (en) * 1998-07-30 2000-02-18 Hitachi Ltd Remote management system
JP3425871B2 (en) 1998-10-28 2003-07-14 エヌイーシーアクセステクニカ株式会社 Network management system and management method thereof
US6489980B1 (en) * 1998-12-29 2002-12-03 Ncr Corporation Software apparatus for immediately posting sharing and maintaining objects on a web page
US6625813B1 (en) * 1999-01-12 2003-09-23 Sony Corporation Digital television broadcast architecture for massively multi-user application
US6564380B1 (en) * 1999-01-26 2003-05-13 Pixelworld Networks, Inc. System and method for sending live video on the internet
US6614804B1 (en) * 1999-03-22 2003-09-02 Webtv Networks, Inc. Method and apparatus for remote update of clients by a server via broadcast satellite
US6539540B1 (en) * 1999-05-24 2003-03-25 3Com Corporation Methods and apparatus for optimizing simple network management protocol (SNMP) requests
US6424993B1 (en) * 1999-05-26 2002-07-23 Respondtv, Inc. Method, apparatus, and computer program product for server bandwidth utilization management
US6330719B1 (en) * 1999-06-30 2001-12-11 Webtv Networks, Inc. Interactive television receiver unit browser that waits to send requests
US6560604B1 (en) * 2000-03-10 2003-05-06 Aether Systems, Inc. System, method, and apparatus for automatically and dynamically updating options, features, and/or services available to a client device

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5978845A (en) * 1997-03-25 1999-11-02 Sun Microsystems, Inc. Network management relay mechanism

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
LOUIS S ET AL: "MANAGEMENT ISSUES FOR HIGH-PERFORMANCE STORAGE SYSTEMS" PROCEEDINGS OF THE 14TH. IEEE SYMPOSIUM ON MASS STORAGE SYSTEMS. STORAGE - AT THE FOREFRONT OF INFORMATION INFRASTRUCTURES. MONTEREY, SEPT. 11 - 14, 1995, PROCEEDINGS OF THE IEEE SYMPOSIUM ON MASS STORAGE SYSTEMS, LOS ALAMITOS, IEEE COMP. SOC. PRESS,, vol. SYMP. 14, 11 September 1995 (1995-09-11), pages 336-348, XP000597741 ISBN: 0-7803-3098-6 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005091597A1 (en) * 2004-03-18 2005-09-29 Nokia Corporation System and associated terminal, method and computer program product for uploading content
US8359349B2 (en) 2004-03-18 2013-01-22 Nokia Corporation System and associated terminal, method and computer program product for uploading content
WO2008052476A1 (en) * 2006-11-01 2008-05-08 Huawei Technologies Co., Ltd. Method for managing conversation, universal message client and server
CN104081718A (en) * 2012-08-21 2014-10-01 英特尔公司 A network controller for remote system management
CN104081718B (en) * 2012-08-21 2018-07-10 英特尔公司 For the network controller of remote system administration

Also Published As

Publication number Publication date
DE10196775B3 (en) 2009-01-29
US7765316B1 (en) 2010-07-27
CA2423582C (en) 2008-07-15
GB2383731B (en) 2004-04-28
CA2423582A1 (en) 2002-04-18
FI20030536A (en) 2003-04-09
GB0306498D0 (en) 2003-04-23
WO2002032072A3 (en) 2003-02-06
CN1528070B (en) 2010-05-26
NO20031621D0 (en) 2003-04-09
NO20031621L (en) 2003-06-06
JP2004511960A (en) 2004-04-15
KR20030036910A (en) 2003-05-09
JP2007116682A (en) 2007-05-10
AU2001296620A1 (en) 2002-04-22
KR100545488B1 (en) 2006-01-24
EP1325587A2 (en) 2003-07-09
GB2383731A (en) 2003-07-02
TW530238B (en) 2003-05-01
CN1528070A (en) 2004-09-08
JP2010252360A (en) 2010-11-04

Similar Documents

Publication Publication Date Title
JP2007116682A (en) Method and system for managing remote client in network
US8073896B2 (en) Client messaging in multicast networks
US6594758B1 (en) System, method, and medium for broadcasting service contents
CN101207501B (en) IP broadcasting system and a multicast group management apparatus for the same
KR101115147B1 (en) Methods for multicasting content
US20050265398A1 (en) Tunneling scheme for transporting information over a cable network
US20050111474A1 (en) IP multicast communication system
CN104009853B (en) Request of data, the method, apparatus and system architecture that send in CDN system
CN101207449A (en) IP broadcast receiving method and receiving terminal
US7072955B1 (en) Controlling remote storage devices
US20050185917A1 (en) System of transmission and reception of radio or television data, receiver of radio or television programs, system for control of access rights and method of transmission of radio or television data
KR102482207B1 (en) A method and apparatus for supporting service change for digital broadcast systems
CN102710745A (en) Live alternate switching method and device
CN111225252B (en) PON gateway UPNP video live broadcast method based on openwrt system
KR100643705B1 (en) A method for multicast playout service in Internet broadcasting system, and an apparatus therefor
KR20090057873A (en) Method and apparatus for management of multimedia inaugurated metadata
KR20060061959A (en) Home gateway for home network system

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PH PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

ENP Entry into the national phase

Ref document number: 0306498

Country of ref document: GB

Kind code of ref document: A

Free format text: PCT FILING DATE = 20011003

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 2001977505

Country of ref document: EP

Ref document number: 2423582

Country of ref document: CA

Ref document number: 351/KOLNP/2003

Country of ref document: IN

WWE Wipo information: entry into national phase

Ref document number: 20030536

Country of ref document: FI

WWE Wipo information: entry into national phase

Ref document number: 2002535345

Country of ref document: JP

Ref document number: 1020037005045

Country of ref document: KR

WWP Wipo information: published in national office

Ref document number: 1020037005045

Country of ref document: KR

WWE Wipo information: entry into national phase

Ref document number: 018203655

Country of ref document: CN

WWP Wipo information: published in national office

Ref document number: 2001977505

Country of ref document: EP

WWG Wipo information: grant in national office

Ref document number: 1020037005045

Country of ref document: KR