Direct access electronic mail (email) distribution and synchronization system with out-of-coverage notification

ABSTRACT

A communications system includes a network engine that communicates with a plurality of user subscribed mobile wireless communications devices and operative for determining when a mobile wireless communications device is out-of-coverage or turned off and unable to communicate with the network engine. A direct access server is operative with the network engine and polls electronic mailboxes of the users and retrieves electronic messages from the electronic mailboxes and pushes any electronic messages through the network engine to selected user subscribed mobile wireless communications devices. The direct access server suspends polling of those electronic mailboxes of a user when a mobile wireless communications device associated with a user has been determined to be out-of-coverage or turned off and unable to communicate so as to preserve polling resources within the direct access server.

RELATED APPLICATION

This application is based upon prior filed provisional application Ser.No. 60/911,611 filed Apr. 13, 2007.

FIELD OF THE INVENTION

The present invention relates to the field of communications systems,and, more particularly, to electronic mail (email) communicationssystems and related methods.

BACKGROUND OF THE INVENTION

Electronic mail (email) has become an integral part of business andpersonal communications. As such, many users have multiple emailaccounts for work and home use. Moreover, with the increasedavailability of mobile cellular and wireless local area network (LAN)devices that can send and receive emails, many users wirelessly accessemails from mailboxes stored on different email storage servers (e.g.,corporate email storage server, Yahoo, Hotmail, AOL, etc.).

Yet, email distribution and synchronization across multiple mailboxesand over wireless networks can be quite challenging, particularly whenthis is done on a large scale for numerous users. For example, differentemail accounts may be configured differently and with non-uniform accesscriteria. Moreover, as emails are received at the wirelesscommunications device, copies of the emails may still be present in theoriginal mailboxes, which can make it difficult for users to keep theiremail organized.

One particularly advantageous “push” type email distribution andsynchronization system is disclosed in U.S. Pat. No. 6,779,019 toMousseau et al., which is assigned to the present Assignee and is herebyincorporated herein by reference. This system pushes user-selected dataitems from a host system to a user's mobile wireless communicationsdevice upon detecting the occurrence of one or more user-defined eventtriggers. The user may then move (or file) the data items to aparticular folder within a folder hierarchy stored in the mobilewireless communications device, or may execute some other systemoperation on a data item. Software operating at the device and the hostsystem then synchronizes the folder hierarchy of the device with afolder hierarchy of the host system, and any actions executed on thedata items at the device are then automatically replicated on the samedata items stored at the host system, thus eliminating the need for theuser to manually replicate actions at the host system that have beenexecuted at the mobile wireless communications device.

The foregoing system advantageously provides great convenience to usersof wireless email communication devices for organizing and managingtheir email messages. Yet, further convenience and efficiency featuresmay be desired in email distribution and synchronization systems asemail usage continues to grow in popularity.

BRIEF DESCRIPTION OF THE DRAWINGS

Other objects, features and advantages will become apparent from thedetailed description which follows when considered in light of theaccompanying drawings in which:

FIG. 1 is a schematic block diagram of a direct access electronic mail(email) distribution and synchronization system in accordance withnon-limiting examples.

FIG. 2 is a network architecture diagram for message to handheld (MTH)messages.

FIG. 3 is a network architecture diagram for message from handheld (MFH)messages.

FIG. 4 is a block diagram showing a directory structure and othercomponents used in the direct access email system shown in FIG. 1.

FIG. 5 is a block diagram showing basic components of a SourceAssignment Manager as used in the direct access email system shown inFIG. 1.

FIG. 6 is a block diagram showing basic components that operate with theSOAP module shown in the direct access email system of FIG. 1.

FIG. 7 is a block diagram showing basic components that operate with theEvent Server as shown in the direct access system of FIG. 1.

FIG. 8 is a block diagram showing components that interoperate with theDirect Access Proxy shown in the direct access email system of FIG. 1.

FIG. 9 is a block diagram showing basic components that operate with theDirect Access Proxy for SMTP support.

FIG. 10 is a block diagram showing basic components of the Direct AccessProxy with the IMAP Mail Provider.

FIG. 11 is a flowchart showing functional steps for the IMAP idleconnection.

FIG. 12 is a block diagram showing basic components of the SourceScheduler and interoperation among components.

FIG. 13 is a flowchart showing basic steps for the IMAP idle support.

FIG. 14 is a block diagram showing basic components of a SourceScheduler for the Direct Access Proxy.

FIG. 15 is a sequence diagram showing transactions between the MobileOffice Platform and the worker for the out of coverage notification.

FIG. 16 is a schematic block diagram illustrating an exemplary mobilewireless communications device that can be used with the Direct Accessemail system shown in FIG. 1.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

Different embodiments will now be described more fully hereinafter withreference to the accompanying drawings, in which preferred embodimentsare shown. Many different forms can be set forth and describedembodiments should not be construed as limited to the embodiments setforth herein. Rather, these embodiments are provided so that thisdisclosure will be thorough and complete, and will fully convey thescope to those skilled in the art. Like numbers refer to like elementsthroughout.

A communications system includes a network engine that communicates witha plurality of user subscribed mobile wireless communications devicesand operative for determining when a mobile wireless communicationsdevice is out-of-coverage or turned off and unable to communicate withthe network engine. A direct access server is operative with the networkengine and polls electronic mailboxes of the users and retrieveselectronic messages from the electronic mailboxes and pushes anyelectronic messages through the network engine to selected usersubscribed mobile wireless communications devices. The direct accessserver suspends polling of those electronic mailboxes of a user when amobile wireless communications device associated with a user has beendetermined to be out-of-coverage or turned off and unable to communicateso as to preserve polling resources within the direct access server.

Basic components of the Direct Access email system 20 are shown inFIG. 1. The web client or network engine 22 has various components. Theworker 24 is a processing agent that is responsible for most processingin the engine 22 and includes SMTP and HTTP server support. Itdetermines out-of-coverage information (O.C.) as explained later. Itaccepts email from the DA proxy and external mail routers, formats emailin CMIME, and sends it to the port agent 26 and other components. Theport agent 26 acts as a transport layer between the email systeminfrastructure and the rest of the engine 22. The mail router 28 is anMTA (Mail Transfer Agent) and is responsible for relaying messages intothe mail store 30, which are destined for hosted subscribers. It is alsoresponsible for accepting/relaying email notifications.

The mail store 30 is a MIME message store that resides on a centralstorage system to provide support for more/forward/reply and attachmentviewing features. The attachment server 32 provides service fordocuments/attachment conversion requests from workers.

The symbol “dir” that is attached to a line illustrates that a directorylookup has been made to determine the service instance to call, forexample, which the DA proxy can retrieve an email for a particularpin/servicebook. The symbol “r” attached to a component illustrates thatit registers itself with a directory of PDS. The triangular attachmenton the WAP and HTML components illustrates that it is a client of aResource Deployment Service.

The Relay 34 with the Wireless Communications Network 36, such as acellular network or WLAN and cooperates with a Port Agent 26 using GUID.The Network 36 communicates with one or more wireless communicationsdevices 38, such as portable wireless communications devices.

The mobile office platform 40 has different components. The DA proxy(DA) 42 includes service through which integrated source messages aredelivered to or retrieved from by the worker 24. It is responsible forpolling sources such as mailboxes, processing source notifications andretrieval and update of source messages via the universal proxy 44. Theuniversal proxy (UP) 44 abstracts access to disparate mail stores into acommon protocol. The event server 46 is a lightweight process on aserver that receives notifications from external sources (ISPs and SMC)and different user mailboxes and processes them asynchronously withoutblocking the sender of notifications. The integrated mail sources 48 asemail service providers include non-limiting examples such as Yahoo!,Gmail, IMAP, POP, Lotus Notes, and Exchange. SMTP servers 49 areassociated with the email service providers as explained in greaterdetail below. The engine servlet 50 is a high performance service on theserver capable of validating a large number of integrated sourcesconcurrently. This engine 50 is used in a source integration process tovalidate the access settings to a mailbox. The SOAP 52 is a primaryinterface to query, update and modify data in the central and partitiondatabases 54, 58. It also implements business logic that triggers otherworkflows in the system (e.g., send, delete service books). The centraldatabase 54 stores system wide data related to sites/carriers, mailboxproviders (AOL, Yahoo), service books, devices and user accounts. Thepartition database 58 is a primary data store for users. It stores datafor a fixed set of users. The directory 56 is a system responsible forassigning, locating and distributing users and their associatedworkloads across service instances. The source assignment manager (SAM)60 assigns sources to the DA proxy 42 for the purposes of mail detection(polling, subscribing, etc.). The PDS (PWP directory service) 62 is aregistry of PWP servers and is responsible for load balancing mailconnector (MC) clients across PWP server instances.

Any PWP server and mail connector components are used together to accessmailboxes when the system is unable to directly access an external mailsource (e.g., source is behind corporate firewall). The ResourceDeployment System (RDS) 64 allows the dynamic deployment of new brandand language specific resources.

There are also various UI/web components. The HTML proxy 70 provides anHTML user interface for users to manage their account. The WAP proxy 72provides a WML and XHTML user interface for users to manage theiraccount. The WEB ADMIN and ADMIN 74 proxy provides an HTML userinterface for carriers to perform administrative functions on theircustomer accounts. A desktop client is deployed via a device CD, andallows the user to integrate sources with a native Win32 UI. A deviceclient allows the user to integrate sources using a java based UI on thedevice. Provisioning (PRV) 76 can also occur. Also illustrated is theinternal SMTP server 77 operative with a database table 78 andassociated with the MOP. A source scheduler 104 and IMAP-Idle connectionmodule (manager) 120 are shown and explained in greater detail later.

As shown in FIG. 2, there are two possible message paths for message tohandheld (MTH) messages. The first path is via an external mail routervia SMTP. This path is used for all BUM and hosted sources. All messageswill arrive to the network engine 22 via mail router 28, which will makea directory lookup then forward the message to the appropriate worker24. The worker 24 will process the message and send the message to theleast loaded port agent 26. Finally, the port agent 26 will deliver themessage to the relay 34, which will in turn send the message to thedevice 38.

The second path is via the Universal and DA proxies 42, 44. This path isused for all integrated sources. When the DA Proxy 42 detects a new mailfrom an integrated source the DA proxy 42 will fetch the message via theUniversal Proxy 44, make a directory lookup for the appropriate workerand push the message to the worker. The worker will then perform thesame operation it did for hosted mail.

As shown in FIG. 3, there are two possible routing paths for a messagefrom handheld (MFH). The first is sent through a mail router 28. Thispath is used for hosted sources. This path will also be used for asubset of integrated sources that do not require any functionalitygreater than sendmail. The Relay 34 will receive the message from thedevice 38 and then forward the message to the port agent 26. The portagent 26 will make a directory lookup and send the message to theappropriate worker 24. The worker 24 will then decode the message andsend it to the mail router 28 which will in turn deliver the message tothe destination mailbox.

The second path is through the DA proxy 42. This path is required forintegrated sources that require more functionality than sendmailprovides. For example, google sources require messages to be sent viagmail SMTP servers to provide support for a sent folder. Following thesame path to the worker as hosted mail, the worker will make a directorylookup and send the message to the appropriate DA proxy 42. The DA proxy42 will then compose an HTTP Mail request for sending a message whichwill be passed to the universal proxy 44, which will translate theHTTPMail request into an appropriate format for sending the mail eitherthru an external mail router or thru a protocol dependant on the sourcetype (e.g., HTTPMail for exchange). Any routers could be external.

The worker 24 is a main component of the network engine 22. The worker24 is responsible for converting messages between MIME and CMIME,encrypting and decrypting messages, compressing and decompressingmessages, and attachment viewing.

The worker 24 will support user affinity. The advantages of this arethat the system has a global pool of workers, rather than partitioningusers by cell. This will allow the workers to scale horizontally in anN+1 manner. It will also make better usage of a pending job limit perservice book. It will also reduce the user cache size within the worker.

The workers 24 will register with the Directory 56. For all MTH, themail router will contact the Directory 56 to determine which worker 24to route messages. For all MFH, the port agents 26 will contact theDirectory 56 to determine which worker to route the messages. TheDirectory 56 will load balance users across workers 24. The system issimplified by having only one component handling user affinity and loadbalancing. The workers will implement mail filters.

The worker 24 will store a cache in a memory of all known user records.This cache will reduce the number of “Get ServiceBook” requests to theDA proxy 42. The worker 24 will support an HTTP notification to remove arecord from its cache (sent when a record is updated). There will be ahard timeout for each cached record. This hard timeout will force arecord to be removed from the cache after a preset amount of time(approximately one day, but this is configurable). The purpose of thistime out is to remove unused records from the cache when a user is loadbalanced to another worker. The hard timeout will also safe guardagainst lost notifications (stale records).

The worker 24 will accept messages through two protocols, SMTP and HTTP,as illustrated at 24 a and 24 b. All messages for a device messenger andhosted sources will arrive via SMTP. The messages will arrive at anymail routers 28. The mail router 28 will lookup the appropriate worker24 in the Directory 56 and route the message to the corresponding workervia SMTP. All messages for integrated sources will be sent to the workervia HTTP. The message will be delivered as a new mail notification. Thenotification will include the MIME message as well, rather than just amessage identifier. Both protocols will implement a delayedAcknowledgment (ACK). The worker 24 will not ACK the incoming sourceuntil either the message has been delivered to the device 38, or themessage has been paged to disk on a timer. The worker typically will notblock any threads while waiting for the ACK to be sent. The DA proxy 42typically will not block its client thread while waiting to receive theACK.

The job stores will be stored on a central storage. Each worker willmaintain its own sandbox for storing CMIME messages. The worker 24 willimplement the delayed ACK paradigm that was implemented in a devicemessenger. Under this paradigm, the worker 24 will not store the CMIMEmessages immediately, but rather it will schedule a timer to write thejob to disk. If the job is completed before the timer fires, then thetimer is cancelled and the job is not written to disk. If the job doesnot complete before the timer fires, then the job is written to disk.The worker 24 will not ACK the message source (SMTP or HTTP) untileither the job is completed, or the job is paged to disk. If the worker24 crashes before the job is ACK'd (completed or paged), then theoriginal message source is responsible for retrying the job. If theworker crashes after the job is ACK'd then the worker is responsible forretrying the job, by recovering the CMIME job from disk. The recoverymethod will be used for messenger users, hosted mail, and integratedmail sources.

All recovery in the worker 24 will be done via the CMIME jobstore. Whena worker 24 is started it will scan its jobstore for any jobs that werein progress when the worker previously shutdown. The worker 24 will thenproceed to resume the processing of these jobs. Under this strategy itis possible for more than one worker to access the same mailbox. All newmessages for the mailbox will be delivered to the current active worker(via the Directory component). However, any in progress jobs will beprocessed by the original worker. This can lead to users exceeding theirpending job limit, since each worker manages its own limit. However,this will only occur while the jobs are being recovered, and will notaffect new jobs.

The port agent 26 is responsible for GME encoding/decoding of CMIMEmessages, sending messages to and receiving messages from relay. Theport agent 24 can optionally compress and encrypt MTH messages.

A Message to Handheld (MTA) is responsible for accepting messages intothe system for hosted mail accounts and relaying them to an appropriateworker. The MTA will allow directory queries through a standard LDAPinterface which will utilize the MTA's built in lookup mechanisms forenvelope re-writing. The need for external software in order tointerface with the directory will be eliminated, which will decreaseoverall complexity. The MTA will have the ability to cap/limitconnections from either the incoming or delivery channel, which can betuned to adhere to the connection profile of the MIME Mail Store.

The MIME Mail Store 30 will be a central storage solution that is sharedby all workers. A MIME message store can be added to the worker. Thiswill support MORE/FORWARD/REPLY and attachment viewing. The mail storewill reside on central storage via a NetApp or other SAN to allow anyworker to access any message from any user and support dynamic loadbalancing of users between workers. There could be one mailbox perservice book. Some messages may not need to be stored in the mail store.Messages that are smaller than the MORE truncation point that do notcontain attachments do not need to be stored in the mail store 30.Messages that are not stored in the mail store can be delivered to thedevice 38 with a flag that tells the device to forward messages withtheir original content, rather than by reference ID. This optimizationwill reduce the load on any central storage.

NetApp or another application can be used to achieve a central storagesolution. It is possible that a single NetApp will not be able to handlethe load of the entire user space. When this occurs another NetApp canbe added to the infrastructure. To accommodate this, a new column can beadded to the user database, which will describe which mount point themailbox resides on. A load balancing scheme can be used to determinewhich NetApp to use when adding a new mailbox. Before the engine 22 canaccess the mail store for a given mailbox it will first lookup the mountpoint in the database, and then proceed to access the mailbox. This willallow the system to scale the NetApps out horizontally using an N+1scaling methodology.

The mail store 30 can store messages using a reference ID as its uniqueidentifier. Reference IDs are not guaranteed to be unique across servicebooks. Therefore, each service book should have its own box. Thereference ID is used because all MORE/FORWARD/REPLY and attachmentrequests include the original reference ID.

Messages are typically compressed before being saved to disk in the MIMEMail Store 30. Performance tests have demonstrated that one viablecompression library is LZO compression. Using LZO compression willreduce the load on the network, the load on the central storage, and thetotal storage space required. This will allow the system to support thesame number of users while using less hardware in the central storage.The LZO compression can be configured on/off. Some messages may notbenefit from compression (for example messages with JPEG attachments).The Mail Store 30 can implement optimizations to determine whichmessages should be compressed and which should not be compressed basedon the nature of the content of the message. This optimization canreduce the load on the host CPU.

Each mailbox can have an auto-aging index that will track quota usageand dictate the order in which messages should be removed from storagewhen the quota is exceeded. The mail store 30 will store both hosted andintegrated mail. The quota for the integrated mailboxes will be small(enough to store one day worth of mail on average).

When a message is added to the mail store the quota is analyzed, and ifthe limit is reached then one or more messages are removed from themailbox to free enough space for the new message.

The Data store is divided into a central database 54 and multiplePartition databases 58. Logically the central database 54 contains-allsystem wide data and a directory of all user accounts. Physically, thecentral database 54 can be divided among different databases. The useraccount data contains enough information to lookup the account, byvarious external ids (e.g., SUBID, PIN, Mailbox), to determine whichpartition database 58 contains the detailed user data.

The system wide data stored in a central database could includeinformation about:

a) Sites/carriers e.g., tmobile, cingular;

b) Mailbox providers (aol, yahoo);

c) Service books;

d) Device information; and

e) Hosted Mailbox mappings.

The central database 54 is accessed by the SOAP component 52 and by theDirectory 56. The central database should be scaled up to handle anever-increasing number of users. A minimum amount of data is stored inthe central database and request loads are limited by the caching of itsdata in the Directory component 56.

A partition database 58 contains data related to a user account andintegrated sources such as: integrated sources, alert rules, signatureand similar items. The partition database also contains some global datareplicated from the central database 54 to keep the central database 54load to a minimum, e.g., service books. The bulk of the data in thepartition database 58 is in the tracking of message UIDs for eachintegrated source. This table is potentially updated each time a sourceis polled. The partition database is accessed via SOAP 52 and the DAproxy 42. The partition database is the main scaling mechanism of thedata store. It handles a fixed number of users. As the number of usersincreases more partitions can be added allowing the system to scale out.

The Directory 56 is a system responsible for assigning and resolving auser to service instance for services that require some level of useraffinity. The assignments are evenly distributed across all serviceinstances of a particular type. Whenever a request is to be sent to aservice the service instance should be resolved via the Directory. TheDirectory 56 distributes the affinities evenly across all serviceinstances of a particular type. The Directory supports DA Proxy andWorker lookups. A DA Proxy instance can be assigned users of thepartition it is servicing. The Worker can be assigned any user.

The Directory 56 is actually a system of Directory Nodes. Each nodeshares the burden of storing user to service instance mappings and thenetwork request load associated with lookups. The strategy is to assigna hash value to each node. As each directory lookup is made, the lookupkey is hashed to one of the hash values and the directory instanceassigned that hash value is forwarded the lookup to resolve the mapping.If a mapping does not exist for the lookup then the resolving willinvolve an assignment to a service instance.

In FIG. 4, the Directory 56 is depicted with three logical components:the Router 80 for hashing the lookup key and forwarding to theappropriate directory instance; the Cache 82 which stores the mappings;and the Registry 84 which load balances across the registered serviceinstances.

The Router 80 has a list of directory nodes and the hash value they mapto. The hash value is simply an enumeration from 0 to N−1, where the Nis the number of nodes. Each node will have the exact same table. Thefunction of the Router 80 is to hash the incoming lookup key to a hashvalue and forwards the request to the node assigned that hash value. Ifthe hash value is assigned to this node then the lookup is made in anode's Cache 82.

The Cache 82 contains a list of mappings between lookup keys and serviceinstances. For the DA proxy, the lookup key is PIN. For a Worker, it iseither the PIN or Email Address. For the worker, there are two keysidentifying a user that can be used as the lookup key. These two keyswill likely hash to different values and cause two mappings to becreated for the same user. Because of this, one key must be designatedas the primary key and all lookups via a secondary keys will result in aprimary key which can then be used in a lookup to resolve the serviceinstance.

All service instances create and maintain a connection with the Registry84 to register their service. This connection is also used to detectservice instance failures. The Registry 84 is also responsible fordistributing assignments across service instances.

The Directory 56 supports two interfaces LDAP and an Extended LBACinterface. The LDAP interface is provided for the mail router to performWorker lookups by email address. The mail router supports LDAP lookupsand will drive how much of the LDAP interface is required forimplementation.

When the DA proxy 42 discovers and downloads a new message from anintegrated source it queries the Directory 56 for the worker 24 thatwill handle messages for the associated user. The query contains the PINwhich the Directory router 80 hashes. If the hash result is its assignedhash id then it will process the request, if not it will forward therequest to the Directory instance that is responsible for that hashresult. The Directory handling that hash result will now check its mapto see if a mapping exists for that PIN. If no mapping exists then aworker with the least number of mappings is selected and assigned to thePIN. The worker is then returned to the client. A similar processhappens for PIN to DA Proxy 42.

When the Mail Router 28 receives a message it queries the Directory forthe worker that will handle messages for the associated user. The querycontains the Email address which the Directory hashes. If the hashresult is its hash id then it will process the request. If not it willforward the request to the Directory instance that is responsible forthat hash result. The Directory handling that hash result will now checkits map to see if a mapping exists for that email address, if not adatabase query will be executed to retrieve the associated PIN. A lookupwill now be executed for PIN to Worker. Once the lookup is complete thevalue may be cached and returned.

The Source Assignment Manager 60 as shown in FIG. S is responsible forensuring that the sources of a partition are being serviced by a DAProxy 42 instance. The Source Assignment Manager 60 actively ensuresthat each source is assigned by the directory to a DA proxy 42 and thatthe DA proxy is notified of each source it is to service.

The Directory component 56 is responsible for assigning sources, viapin, to DA proxies 42. DA proxy assignments must be made pro-activelyin-order for the polling process to begin, and should handle conditionsarising from the loss of an assignment when a Directory instance goesdown. It should ensure that all sources are being polled, should ensurethat deleted sources stop being polled in a timely fashion. TheDirectory component 56 also ensures only one DA proxy is servicing anyone particular source. Subscribeable sources that are eligible forsubscription (e.g., not suspended) are subscribed. Operations must beable to track the state of polling queues and other measures of“health.”

The partition database 58 places a timestamp on each source thatspecifies the last time the source was changed. Two queries areprovided. The first query returns the entire list of sources with fieldsrelated to the servicing of the source (e.g., polling flags) and atimestamp that can be used in the second query. The second query, givena timestamp from the last query, returns all sources changed since thelast query and another timestamp to use in the next query.

A polling manager as part of the DA proxy and source scheduler maintainsa list of all sources belonging to its configured partition. For eachsource in the list it tracks data related to the servicing of thesource, for the purposes of detecting updates, inserts and deletes.Furthermore, the DA proxy assignment is tracked to enable notificationsof reassignment and/or lessen re-assignment (due to directory failure).A timestamp is also tracked. The timestamp is a value returned by thedatabase that can be used to retrieve sources that have changed sincethe last query.

At startup a Polling Manager registers with the Directory 56 and makes aquery to the configure partition database to retrieve all sources andthe relevant data that drives the servicing logic of each source. ThePIN of the sources is passed in one or more request batches to theDirectory service to locate the DA proxy that will be servicing eachsource. This information is stored. Next a notification is sent to eachDA proxy that has been assigned one or more sources, containing thesources the DA proxy should service.

In order to ensure that sources are being serviced, the Polling Managerat configured intervals queries the partition database 58 to retrieveall sources which may be new or changed based on a timestamp returned bythe last query. The new timestamp can be used in the next query. Thesource list is compared with the query results to determine whichsources have either been change, deleted or inserted. For insertedsources the Directory is called to retrieve the DA proxy assignment. Amessage is sent to all the DA proxies that have changes or additions toone or more sources they are servicing.

SOAP notifications are used to ensure that when a source is updated,deleted or inserted that it will be serviced in real time in accordancewith the sources new state. The SOAP module 52 sends notifications tothe Polling Manager by doing a lookup in the directory for the PollingManager of the partition the source belongs to. The Polling Manager thensends a notification to the DA proxy servicing the source. SOAPNotifications are done via an HTTP Interface which the Polling Managerwill implement.

When a Directory failure is detected, the Polling Manager is notified bythe directory. The Polling Manager assumes that all of it sources mayhave been re-mapped. All sources are then looked up in the directory inone or more batches. If the Polling Manager is tracking the DA proxyassignment, then it can suggest to the Directory which direct accessproxy it should map the source to in order to reduce the amount ofreassignment.

When a DA proxy fails or a DA proxy is recovered, sources may bereassigned. The recovery reassignment is caused by the need to rebalancethe load. When one of these events occur the Source Assignment Manager60, of the failed/recovered DA partition, is notified by the Directory.The Polling Manger makes sure all sources are assigned to a DA proxy andthat the DA proxy knows about it. This is done by iterating through allsources and making a directory lookup and notifying the DA proxies whichsources have been reassigned and/or unassigned.

The SOAP component 52 provides a SOAP interface to query, update, modifyand delete information from both central and partition databases. TheSOAP component 52 exists in order to minimize the number of connectionsto the databases, provide abstraction to physical location (central vs.partition) and schema of data, and implement business logic fornotifying components of data changes which can trigger other workflowssuch as:

a) PIN changes (tell DA proxy, Worker, and Directory);

b) Account creation welcome message via the DA proxy;

c) Integrated source add sends service book via DA; and

d) Subscription requests.

It also provides APIs to enable integration with external systems andimplement simple provisioning guessing logic via database rules andengine servlet.

The interfaces are grouped by function and also by the requirements ofthe external subsystems. Providing specific interfaces for eachsubsystems minimizes the affect on other systems when one systemrequires a change. Interfaces are defined as Web Services and aredistributed as WSDL so that external subsystems so that there is notplatform or language requirement imposed on the external subsystem.

The engine servlet 50 hosts the aggregation engine 90 as shown in FIG.6. The aggregation engine 90 is a component capable of validating,polling and downloading against a large number of external mail sourcesconcurrently. It receives instructions to do so in batches. Toaccomplish this it uses Java and a thread to handle all requests in abatch. The Engine Servlet 50 is used for its ability to validatesources. As for polling and downloading those duties are left to the DAProxy 42.

Referring to FIG. 6, validation is a process that occurs during simpleprovisioning. When the user enters the email address and password for anaccount to be integrated, a request is sent to the SOAP component 52 tocreate the source mailbox. As part of the creation process the SOAPcomponent applies the credentials to a set of rules learned and storedin the database 52 to produce a set of guesses. These guesses arecomposed of server address, password (as supplied), protocol, and login,similar to the process set forth in commonly assigned U.S. Pat. No.6,959,325, the disclosure which is hereby incorporated by reference inits entirety. The central database 54 is queried to select an engine 90.The guesses are then batched and sent to the engine servlet 50 forvalidation. The engine servlet 50 feeds the “guesses” to the aggregationengine 90, which connects and initiates the login process against allthe servers according to the guessed protocol. It then waits for theresponses. The results of the login are collected and a result isformulated and returned to the SOAP component 52. If the validationresult is unsuccessful the user may be directed to a more advancedprovisioning screen. Otherwise the source mailbox is created.

The Event Server 46 is a process that acts as a message queue for HTTPnotifications from external sources (ISPs and SMC). The messages areprocessed asynchronously so as not to block the source. The processingof the message involves dispatching to the appropriate service. Theevent server is also used internally to send out subscription requestvia SOAP.

FIG. 7 illustrates a new mail request from an external source 96 beingdelivered to the DA Proxy 42 and a subscription request from the DAProxy 42 being delivered to SOAP and onto the external source 96.

The Event Server 46 is accessible from the internet and is accessed viaa BigIP pool. To add capacity additional Event Server instances can beadded to the BigIP pool. The number of instances required depends on thenumber of user that have subscribable sources.

When the system is unable to directly access an external mail source(e.g., corporate firewall) the Mail Connector 100 and PWP Server 102 areused together to access the mailbox. The mail connector 100 is a Win32based application/service that a user installs, as part of the sourceintegration process, within a network where the source can be accessed.It is capable of accessing an exchange mailbox via MAPI and a LotusNotes mailbox via “Notes API”. The PWP Server 102 acts as a rendezvouspoint between the Universal Proxy (UP) 44 and the Mail Connector 100.The Mail Connector 100 is typically connected to a PWP Server 102waiting to process requests from UP 44. The PWP Server ensures that themail connector and UP, for a given source, are talking to the same PWPServer. It is also responsible for distributing sources across PWPServer 102 instances. For sources that require and use the MailConnector 100 the Universal Proxy 44 sends all HTTP mail requests to thePWP Server 102 along with the PWP GUID identifying the client.

The universal proxy 44 provides access to external mail sources 48 viaan enhanced HTTP Mail interface. The UP 44 supports the following mailsources in a non-limiting example:

a) IMAP with special implementations for AOL/Compuserve, Yahoo;

b) POP with special implementations for MSN, RPA, Gmail;

c) Mail Connector for access to Domino and Exchange;

d) Hotmail; and

e) Outlook web access.

Access to a mail source is demarcated with an HTTP Session. Allinformation required to access the mail source is provided from theinitial request of the Session. In order to translate the HTTP Mailrequest to the appropriate protocol there exist a set of objects calledconnectors. There is one connector for each type of mail source.

The DA proxy 42 is the conduit for sending and receiving emails betweenthe engine 22 and the integrated mail sources 48. Additionally, the DAproxy is responsible for detecting new mail from external mail sourcesand pushing to the engine 22. Three mechanisms of detection are used forpolling, subscription to mailbox for notifications, and permanentconnections to sources.

It also provides the engine with access to User data. It processes MPHmessages for integrated sources (new mail, reply, forward, delete). Italso pushes service books to the engine.

The DA Proxy 42 provides an asynchronous HTTP interface. All clientrequests are immediately queued and responded to with an HTTP Responseof 200. When applicable the request specifies an HTTP address where the“response” is to be sent in another HTTP request. When duplicate requestare sent by the same component they are dropped. Different requests canbe handled asynchronously by the DA proxy 42. These include:

a) User information retrieval (Engine 22);

b) Message retrieval from an integrated source (Engine 22);

c) New mail notification from subscribed source (Event Server 46);

d) Send service books, PIN Messages and PIN Change (SOAP); and

e) Source Assignment (SAM) 60.

The DA proxy 42 is responsible for actively detecting changes to thesources assigned to it by the Source Assignment Manager 60. The DA proxymaintains a set of sources 102 that it schedules for servicing. Everysource has some level of polling. Less polling is done for those sourcesthat support subscribing or a connection based notification. FIG. 8illustrates at a high level the components of mail detection, includinga source scheduler 104 for scheduling different sources 102, and also anevent manager 106 as part of the DA proxy 42 and the IMAP-Idle sources.

Polling of sources is scheduled at even intervals (usually 15 minutes).Sometimes a source poll is expedited if heuristics determines that it islikely to find new mail. There are three types of polls. TheIgnoreOldPoll works as a poll that retrieves all messages IDs from thesource and writes them to the Partition database 58. The purpose of thisis to prevent the detection of new mail at certain logical points, suchas newly integrated source or the user has been unsuspended.

The full poll retrieves all message ids from a source mailbox to do afull reconciliation against all message ids (UIDs) that previous pollshave found. For each new UID found, the message is retrieved and sent tothe Engine 22 for delivery to the device 38. For UIDs not found(deleted) the UID is removed from the database. New UIDs are alsowritten to the database. The DA proxy 42 executes a full poll on asource when its been more than the value stored in database since thelast full poll, or when a quick poll has been disabled for this source.

The Quick poll retrieves only a “page” of source message IDs at a time.It stops once it finds a UID it has already seen. At this point itassumes it has found all new messages. The new messages are thenretrieved and sent to the Engine 22 for delivery to the device. New UIDsare now written to the database.

For source types that support a notification mechanism via asubscription (e.g., Yahoo, Google), the proxy 42 periodically checksthat those sources are subscribed accordingly. If a source is in a statethat it should be subscribed, a subscription request is sent, otherwisenothing is done.

Some source types (IMAP IDLE) support a notification mechanism via apermanent connection to the source. The proxy is responsible for makingsure that these connections are created, managed and destroyed asappropriate.

The DA proxy 42 communicates with the worker 24 over an HTTP interface.The worker responds to the request with a delayed ACK as to the successof the request (e.g. successfully accepted). When new mail is detected,the DA proxy pushes one mail at a time and waits for the ACK. Since theACK may take some time, the polling thread is not blocked waiting forthe ACK. If a message is NACK'd the DA proxy will stop pushing the newmail that was found and only write the successfully pushed mail UIDs tothe database. For retry purposes the DA proxy will ensure that a pollfor the source is scheduled in a reasonable amount of time (e.g., within15 minutes).

The DA proxy 42 does not require access to the internet, although itaccesses the Partition database 58, SOAP 52, Event Server 46, Directory56, Worker 24, and its configured UP 44 (usually localhost). The DAproxy handles a fixed number of users for a particular partition. Thenumber of users a DA proxy can handle is calculated by measuring itsperformance. The more users assigned to a partition the more DA proxies,the system will deploy. The load is distributed evenly betweens DAproxies via the Directory components.

A Resource Deployment Server 64 (RDS) allows brand and language specificresources to be dynamically deployed. The resources are typicallycomposed of, but not limited to, Java Resource Bundles, XSLT files, andImages. Any file can be deployed via the RDS as long as the locationspecified on the target system is well known e.g. (template directory,web-inf/classes etc.).

A resource deployment package is a jar containing one or more resourcejars and a descriptor file that describes each resource jar and how itis to be deployed. In essence, it describes what well know directory aresource jar should be expanded to and what version of the resources thejar represents.

A Desktop Manager is an application that provides a user interface foremail account configuration. The Desktop client provided by the system“plugs” into the Desktop Manager and provides specific UI forconfiguration of integrated sources. A Management API provides a SOAPinterface for the creation of accounts and for integration of emailsources. A Desktop manager provides a user interface for integrating andmanaging email accounts. Both simple and advanced provisioning will beprovided.

Any Java handheld apps can use TCP (HTTP) as their transport. Thisallows use of existing device APIs that provide and manage all aspectsof TCP(HTTP) traffic to and from the device. Inside the HTTP wrapperwill be an XML data component.

There are also aspects of SMTP used with the system. Mail providersdesire outbound mail for their users to go through their SMTP servers49. The system as described wants to use the ISP's mail servers to avoidproblems such as “marked-as-spam.” The system can use part uses its owninternal SMTP server 77 for outbound mail currently. The end users maynot always know or remember their SMTP servers when they are configuringtheir integrated mailbox. The system configuration allows for thespecification of a SMTP server 49 given a mail-access-server, protocolcombination. Once a mailbox is integrated, if the integration matches agiven (server, protocol) combination, it is possible to use the SMTPserver 49 specified in the configuration. The system can potentially useother parameters in the future. For mail providers that can specify anSMTP server, the system can automatically use their SMTP servers 49 fortheir users. The users do not have to go through additional steps toconfigure their SMTP servers. This implementation will automaticallywork for hosted domain mailboxes as they use typically a specific mailaccess server of the mail provider. It is possible to implement anautomatic guessing of SMTP servers where the system will attempt to sendan email to a known server address through a “guessed” SMTP server usingthe mail access credentials.

The system would have automatically configured the SMTP server 49 evenwhen the system does not have a pre-existing configuration. Guessinglogic may include the user of users' mail access server or mix-server oftheir email ID's mail domain (DNS). It is possible to extend thesolution to allow users to specify their SMTP servers 49. If theserver-domain of the SMTP server matches the server-domain of the mailaccess server, the system will “learn” this information and attempt touse this for other users who also use the mail access server.

For mail providers that can specify an SMTP server 49, the system willautomatically use their SMTP server for their users. The users do nothave to go through additional steps to configure their SMTP servers.This implementation will automatically work for hosted domain mailboxesas they too use a specific mail access server of the mail provider. Thesystem can also implement automatic guessing of SMTP servers when thesystem attempts to send an email to a known address through a “guessed”SMTP server using the mail access credentials. If it works, the systemautomatically configures the SMTP server even when the system does nothave a pre-existing configuration. Guessing logic may include the use ofusers' mail access server or max server of their email ID's mail domain(DNS).

There are differences with the prior art using the system as described.A version of Outlook Express (windows live mail desktop), automaticallyconfigures a POP/SMTP server for a given email address for popularISP's. WLMD (Windows Live Mail Desktop) automatically configures basedon a user's email address. A KnowledgeBase for popular ISP's isdownloaded from servers and used when the user's email address matchesone found in the KnowledgeBase.

The system gives integrated source server protocol and an external SMTPprotocol sends email. The system configures the SMTP server 49. The usersends mail and looks up the SMTP server user's external send mail. Thesystem uses its own internal SMTP servers for sending email, allowingthe system to pre-configure an external SMTP server 49 for sendingemail. The configuration is done beforehand with a mail server provider,and once any system is configured into send mail, a device user sendsmail to external server and the device looks to an external SMTP serverfor necessary information. Unlike Outlook Express, given that this ismail access protocol, it tries to figure out which server to use.Windows desktop mail, e.g., for Comcast, has a list of popular SMTPserver (popular ISP's are in list). The system can implement guestservers and use automatic guessing logic.

ISP SMTP Support can be added for a configurable set of ISPs. ISP SMTPSupport can support authorization based on srcmbox.login andsrcmbox.password. ISP SMTP Support can support connections over SSL whenconfigured.

FIG. 9 illustrates basic aspects of the components as described. The DAProxy 42 is illustrated and operable with the UP Proxy 44 as a servletand SOAP component 52 as a Soapservlet, including a cache. The mailservice provider 48 is illustrated and operable with the UP proxy 44. Adatabase table 112 as part of the server and mobile office platform 40is entitled SmtpProviders with data sent to the cache of the SOAP 52.The sourcemailbox 114 is operable with the SOAP 52 to communicateregarding the server and protocol.

There can be a new database table and stored procedure in Centraldatabase, Soap Servlet, DA Proxy, UPServlet. The table 112 is added toallow the configuration/specification of ISP STMP servers, known asSmtpProvider. The SmtpProvider table 112 will be used to store SMTPserver information for a srcMbox's 114 server/protocolName. If aserver/protocolName for a srcMbox is not specified in this table,internal SMTP servers will be used to send mail.

As shown in FIG. 9, the database will include a SmtpProvider table 112and data relating to the server such as the srcMbox mail servicehostname or IP address; the protocolName such as the srcMbox protocolused by the specified server settings, including as a non-limitingexample:

bit 0: useSSL

-   -   0=do not use SSL;    -   1=use SLL

bits 1-15: unused.

Other information in the table is related to the smtpServer as SMPTserver hostname and smtpPort as for example, SMTP port (default=25).Other data will be related to settings, description, and created andmodified data items. There will be stored procedures, such assSmtpProviderMapping that is used by the SOAP Servlet to select all rowsfrom the smtpProvider table.

The system will modify the SendMessageHandler to include the smtpServer,smtpPort, and useSSL boolean in sendmail requests that are sent to theUP Servlet 52. The system will modify the SOAP Servlet 52 to includesmtpserver, smtpPort, and useSSL boolean in a UserInfo response.

The SoapServlet 52 will cache the SMTP Provider data into a singleobject. A servletManager command can be added (“clearSMTPProvCache”) toallow dynamic refreshing of this cache without requiring a Soap Servletrestart. The data can be stored in a Map and typically there should beno more than several hundreds of entries in this table.

The system supports auto-configuration of integrated mailbox given auser's email address. This is done using the mail domain of the emailaddress and matching it against the system knowledge-base. The systembuilds this knowledgebase based on guessing (on mail domain) andlearning from prior integrations. For mail providers that support hosteddomains, there are several hosted domains, each used by a small set ofusers. Further, the mail domain of the user may not match the maildomain of the mail access server. For example, email ID could bemurthy@gortyfamily.net and th email access server could beserver.register.com).

The system will not work for the majority of the hosted domain users asthe audience set is a larger number of domains each with small number ofusers as opposed to large number of users for a smaller number ofdomains. Adding a configuration entry into the knowledge base will alsobe cumbersome as the number of entries would explode.

The system simplifies integration of hosted mail domains. The systemmaintains a knowledge-base of MX records from the DNS and matchesagainst the knowledge-base to retrieve the mail access configuration forthat mailbox.

This enables the system to automatically configure an integrated mailboxfor all hosted domains of an ISP regardless of whether another user froma specified hosted domain has integrated his mailbox. This also enablesthe knowledge base to only contain one entry for all hosted domains of amail provider, vastly simplifying the knowledge-base. The system canpotentially use a similar solution for retrieval of SMTP servers as well(outbound SMTP vs. inbound mail access configuration), thus, extendingthe solution to configure other services, not just mail access. In thefuture, the system can implement guessing based on MX record patterns ifthere are no matches in the knowledge-base. The system can also autolearn into the knowledge-base, thus, expanding the knowledge-base. Inthe future, the syste can also expand the lookups to other aspects ofthe DNS (or some other service), and retrieves the IP address from DNS,PTR lookup to see if it goes to a different domain and use a serverwithin that domain.

A mail exchange (MX) record can be an entry in a domain name databasethat identifies a mail server that is responsible for handlingelectronic mail for the domain name. Different MX records can be enteredfor any single domain name that is using more than one mail server.Priority can be obtained by a preference number, indicating the order inwhich the mail servers could be used. This would allow primary andback-up mail servers. Thus, an MX record maps a domain name to a list ofmail exchange servers for that domain.

Another type of mapping from a name to an IP address is an address (A)record, for example, the host name to an IP address mapping. Typically,in the priority of MX records, the smallest preference number has thehighest priority.

It should be understood that although the DNS system supports differenttypes of record systems, the A record is typically a straight mappingbetween a name and one or more IP addresses. The Mx record is usuallyused for routing email traffic, for example, routing emails of aparticular domain name to a particular server that can be different fromwhat is in the A records. Typically, the MX record is a good indicatorfor where the email domain name server is routing mail and can be usednot only to check a user domain name against the MX record to see if amatch occurs, but also to improve the guessing logic as will beexplained below. If the MX record does not match, there could be afailure and the system may not try to authenticate, but would ask a userto re-enter the particular email address parameters. The system andmethod could take a portion after the “@” and do a DNS query on theinternet for MX and A records. A number of MX records can be pulled andthe best one is picked to accomplish the provisioning and determinewhich server to pull mail from, especially when a company has severalservers with different MX records acting as back-ups. This is importantfor vanity domain names. If there is an A record, there may or may notbe additional insight on provisioning, yet in some instances, the Arecord can be used for determining a valid address. It is also possibleto make several educated guesses as explained below. Otherwise, the useris told it is not a valid address.

IMAP-Idle improvements occur. IMAP-Idle is described in REC 2177, whichis incorporated by reference in its entirety. There are advantages forthe IMAP-Idle connection limits on a per user basis and per server basisand advantages for same. There are two problems this improvement inIMAP-Idle solution addresses.

First, a single host such as AOL may have X amount of users and allow Yamount of simultaneous TCP connection (where X>Y). If all X AOL userssupport IMAP-Idle, connection attempts will be made for all X users eventhough only Y connections are supported. If unaddressed, other hostswould be unable to make other TCP connections to the host.

Second, a single user's IMAP email account may only support onesimultaneous TCP connection. If a second connection is used to retrieveuser data from the same account, the first connection or secondconnection may be disconnected with or without warning. Assuming thiswent unaccounted for, mail integration would fail indefinitely.

An IMAP-Idle Java connection manager is implemented in the system.Because there are so many varying TCP connection limits from domain todomain, it is not desirable to set a hard coded outbound TCP connectionlimit to these domains. Instead, an IMAP-Idle connection manager isintroduced to manage IMAP-Idle connection failures. If an IMAP-Idleconnection fails a failure streak, management by the IMAP-Idle manageris increased by one until it reaches a limit. If the limit is reached orexceeded the source is marked IMAP-Idle “disabled” and the source willnot be connected in order to establish an IMAP-Idle connection.Therefore, if domain A has a set limit D and the system successfullyconnects D time, all subsequent IMAP-Idle and poll connection attemptswill fail. By marking sources invalid for this type of connection, itensures all sources have access to this domain. If the IMAP-Idleconnection was dropped, the system determines if it dropped while anemail poll (secondary connection) was in progress. If so, the account ismarked IMAP-Idle “disabled” and the account will not be subscribed to inthe future, thus, preserving resources and improving the user's emaildelivery experience.

The IMAP-Idle definition states that the IMAP server displays the termIDLE when the server is asked what capabilities it supports. If theserver claims to support IMAP-Idle, but fails to enter the IDLE state,the system continuously attempts to establish IMAP-Idle connections whenone is not possible. An IMAP-Idle manager is implemented which checksthe result of attempting to establish an IMAP-Idle connection. If theconnection fails X times in a row, the IMAP-Idle feature will bedisabled so the system can stop attempting to connect to an unsupportedor incorrectly configured service.

These are instances when the email server reports IMAP IDLE capabilitiesbut fails to actually enter the IDLE state. In this case the IMAP IDLEmanager will track the number of attempts to establish an IMAP IDLEconnection to that server and if the failure exceeds a pre-specifiedthreshold, then the system can stop attempting to connect to anunsupported service.

The system polling environment can attempt to poll the account at anintelligent interval hoping to find new mail messages. If new mail isavailable, it is downloaded and sent to the user via their device. Ifthis account is subscribable (IMAP-Idle supported) the system can reducethe amount of connections and connection attempts to the host, which donot accept high connection rates. The system can minimize the amount ofdata sent over the internet and produces a fast email delivery system.

The IMAP-Idle connection can monitor the account for changes that occurand immediately download new information when an event occurs. Thisallows the system to skip (unneeded) empty polls for a source that hasnot received any new mail. Skipping the polls saves data transfer, anyunnecessary TCP connection, connection attempts and also real time emaildelivery. This implementation is centralized and is represented as asubscription as opposed to PALM and MS systems, which are device andapplication based.

IMAP IDLE is an optional expansion of the IMAP email accessing protocolthat allows the server to send new message updates to the client in realtime. Instead of having the system email program check for new mailevery few minutes, the IMAP IDLE allows the server to notify the emailprogram when new messages have arrived. The system can see incoming mailimmediately The use of IMAP IDLE is known. However, the difference fromPALM is that the system implements this on the system as with the DAproxy 42 not on the device.

The IMAP servers are set up to allow 30-minute TCP connection beforethey may disconnect them according to the IMAP RFC. If the system is tomaintain an IMAP-Idle connection indefinitely, it should find a methodto avoid this without missing new mail events produced by the IMAP-Idleconnection in the meantime. Because several internet domains are knownto disconnect TCP connections earlier than 30 minutes, the systemresubscribes every x minutes, where X is configurable. To resubscribethe system quickly, it issues an IMAP “fetch” to check if new mail wasreceived before re-entering the IDLE (subscribed state). This ensuresthe connection is kept alive and new email events are not lost.

In accordance with non-limiting examples, IMAP protocol is updated witha new command IDLE, using which clients go into an ‘idle’ mode. In thismode, an IMAP server sends mailbox changes as untagged responses to the‘idle’ client, such as when new messages are added or when they aredeleted. Clients come out of this ‘idle’ mode by issuing a DONE.

The MOP 40 as a Direct Access server currently supports asubscription/notification model or real-time mail delivery. In thismodel, a mailbox-provider notifies the MOP when new mail arrives at amailbox. There is no persistent connection between the MOP 40 andmail-provider.

By supporting IMAP IDLE, the MOP 40 can make it easy for themail-providers to support real-time mail delivery. To support IMAP IDLE,the MOP would need to maintain a persistent connection to themail-provider. The connections used in this IMAP-Idle implementationwill be used solely to detect new mail and notify that the relatedsource is ready to be polled. All previous MTH and MFH jobs remain aswork completed by the DA proxy work queue and its UP servlet. The systemsupports real-time notifications for all IMAP sources that support IDLEcapability.

External subscriptions are persistent subscriptions made with externalmail providers such as Yahoo and Gmail. Idle login failures occur whenafter an invalid login attempt is received trying to initialize anIMAP-Idle connection. Receiving this failure will increment the existinglogin failure streak to one.

An idle subscription failure streak will include all connection andcommand related errors while attempting to establish an idling state fora particular IMAP source. Typically, login failures are not included inthe count.

To support IMAP IDLE, the system will maintain a separateImapIdleConnection 120 for each user in the DA Proxy 42 as shown in FIG.10.

The ImapIdleConnection 120 discovers the presence of new mail and thistriggers the normal polling mechanism that goes through UPServlet, whichwill continue to be used for polling and all MFH operations. CreatingImapIdleConnections 120 in the DA Proxy helps the polling system in theDA Proxy keep track of these connections for each source. An IOPump 122serves as the connection manager for all ImapIdleConnections 120.

Unlike external subscriptions that are persisted in the databaseIMAP-Idle subscriptions are considered transient and are only in thememory of DA Proxy.

The Source Scheduler 104 and DA Proxy keep track of IMAP IDLEsubscriptions. Unlike external subscriptions which are persisted in theSrcMbox table with a subscriptionId, these subscriptions are in memory.Once a poll is successful, the Source Scheduler 104 determines if asource capable of IMAP-IDLE is not yet subscribed. The Source Scheduler104 creates an ImapIdleConnection for this source mailbox 114 andinitiates the subscription process. Sources that are marked with‘disableSubscribe’ 115 will not be subscribed.

After each poll, the Source Scheduler 104 updates the subscription in anImapIdleConnection. Updates to a highWaterMark as shown in the flowchartof FIG. 11 allows the ImapIdleConnection to appropriately discover newmessages when an ‘idle’ connection closes. Additionally, this will allowan ImapIdleConnection to pick up any changes to the source-mailbox suchas updates to the source mailbox data such as the server/user/password.

FIG. 11 illustrates a login, determination, and IDLE to show theIMAP-Idle connection in discovering new emails.

An optimization can be made for IMAP-IDLE sources to immediately changethe nextPoll to after 6 hours. For external subscriptions, the systemcan change the nextPoll only after the next poll to catch any new mailsbetween last poll and a successful subscribe request. TheImapIdleConnection can discover any new mail since the last poll. As aresult, this optimization can be made.

If the Source Scheduler 104 discovers that a source should not be polledany longer, it notifies any existing ImapIdleConnection 120 to stopfurther notifications and cleans up the ImapIdleConnection.

The Source Scheduler 104 is notified when the ImapIdleConnection 120discovers new mail in the mailbox. The Source Scheduler schedules a pollupon such notification. If the ImapIdleConnection 120 cannot go intoidle mode, it notifies the Source Scheduler that the subscription hadfailed. Some of the failures are Idle login failures and the remainingare Idle subscriptions failures.

As shown in the flowchart of FIG. 11, to utilize the IMAP-Idleconnection 120 the Source Scheduler 104 must first determine if the TMAPsource is subscribable. To determine this, the DA Proxy makes a callbackto the Source Scheduler once a poll for this source completes. Thecallback lists new properties such as the high water mark andsubscribability.

If the source happens to be subscribable the source scheduler willcreate a new subscription job and add it to the DA Proxy processingqueue. These jobs are handled by the subscribe and unsubscribe handlers.

The handlers' first task is determining which resource to use tocomplete its job. For ImapIdleConnection the Source Scheduler is thatresource. The handler makes a call into Source Scheduler to subscribe tothis specific source and is provided a response code for the success orfailure of that process as shown in FIG. 11.

A callback is made on completion of the subscription job. If thesubscription was successful the subscribable flag will be cleared andthe source will be marked as a subscribed.

FIG. 12 is a diagram showing the source scheduler 110 and polling queue140 when a source has already been marked subscribable by the previouscallback from the poll into the Source Scheduler. The polling queue 140,DA proxy work queue 142 and name server 144 are illustrated and worktogether as shown.

If an ImapIdleConnection 120 encounters a connection error or an errorin issuing commands, it notifies the Source Scheduler 104 that thesubscription had failed by returning an idle subscription failure. TheSource Scheduler keeps track of the error and pulls in the next poll forthat source to within 15 minutes from the last poll. If thefailureStreak for this error exceeds a configurable limit, this sourcewill be marked with ‘disableSubscribe’ settings bit.

If the ImapIdleConnection discovers a login failure, it returns an idlelogin failure to the Source Scheduler. The Source Scheduler bumps up theexisting login failure streak on the source. Any source with afailureStreak>0, will not be subscribable. Login failures will notresult in persistent ‘disableSubscribe’ bit.

Some implementations of IMAP protocol exhibit a race condition. If amailbox receives a new mail after the client goes into select state andbefore an idle command is issued, the system will return an untagged‘exists’ response indicating the presence of new mail. FIG. 13illustrates a flowchart of the method.

The system mitigates this by immediately issuing an ‘idle’ command afterthe system receives a response for a ‘fetch’ command. The system parsesthe ‘fetch’ response asynchronously after the ‘idle’ command is issued.The race condition is not avoided completely, but is reduced to a veryshort interval, hopefully less than a second.

This problem is further mitigated by the mechanism originally designedto reset IMAP timeout timers. To reset the timeout timer theImapIdleConnection object will issue a ‘DONE’, to leave the IMAP-idlingstate, followed by a ‘FETCH’ to reset the timer and check for new mailreceived. If mail was missed during the previous race condition or dueto a faulty idle implementation it will be caught here. This will beexecuted every 5 minutes but will be configurable.

The Source Scheduler keeps track of new mail discovered on re-connects.If it successively discovers new mail only on re-connect and reaches aconfigurable limit (default is 0—infinity), it calls back on SourceScheduler (itself), disabling the subscription, additionally marking thesource ‘disableSubscription’. On new mail notifications,ImapIdleConnection informs Source Scheduler whether the discovery isfrom a re-connect (poll) or idle notification.

By setting the default to infinity the existing connection provides alighter polling alternative and is therefore still acceptable.

If the Source Scheduler discovers new mail during fall-back polls, itkeeps track of streaks of ‘newMailOnFallback’. If this reaches aconfigurable maximum, this IMAP-Idle source will be marked with‘disableSubscribe’ which is persisted in the database. For externalsubscriptions, they will be unsubscribed and re-subscribed on a nextpoll. The default value for this limit is 3.

Additionally, to improve user experience, the Source Scheduler willchange the next-poll to the default 15 minutes when new mail isdiscovered on a fall back poll. For external subscriptions, they will beunsubscribed and re-subscribed on next poll. The system can thus addresswhen the subscriptions become out of sync.

If a mail-provider restricts the number of connections allowed, thesystem will discover these limitations as normal connection-failuresresulting in marking the mailbox as a ‘disableSubscribe.’ This is alsotrue for AOL.

Similar to POP, IMAP servers can also return ‘mailbox locked’ errors. IfImapIdleConnection returns a ‘mailbox locked’ error, the source isimmediately unsubscribed and marked with ‘disableSubscribe’. On theother hand, if ‘mailbox locked’ is returned as error during normalpolls, the Source Scheduler recognizes this and if there is an existingImapIdleConnection for the source, unsubscribes it and marks the sourcewith ‘disableSubscribe.’

If an IMAP-Idle connection is disconnected while the source scheduler isprocessing a new mail notification the scheduler will increment the IMAPsubscribe failure streak and continue with the next source. Assuming thepoll succeeded the source will be marked as subscribe-able orun-subscribe-able by the polling mechanism. If the poll was unsuccessfulthe source scheduler will continue to poll this source every 15 minutes.

If a poll connection fails while an IMAP-Idle connection exists thescheduler will unsubscribe the source, increase the fail-streak andexpedite the poll. By providing a mechanism to reset the failure streaksthe system will not run into a long-term problem and find all sources‘disableSubscribe.’

The system can avoid IMAP-Idle race-condition by using anotherconnection to check for new mails after the IMAP-Idle connections goesinto an idle mode. This can also be by triggering additional poll everytime we enter idle mode. Some servers may close the servers far moreoften and the system does not necessarily want to poll on everyconnection closure. The system enters an idle mode on every connectionclosure. The system can issue ‘fetch’ and ‘idle’ commandssimultaneously, reducing the race-condition even further.

IMAP-Idle monitoring is used to monitor the health of the feature. Thefollowing fields will allow a manager to determine if a particularsource scheduler is able to subscribe to IMAP sources and how the amountof subscriptions fluctuate (errors received) during polling intervals.Different fields can be monitored such as:

number of idle connections (cumulative);

time to subscribe (cumulative);

number of subscription requests (cumulative);

new mail notification—idle (cumulative);

new mail notification—re-connect (cumulative);

login failures (cumulative);

mailbox locked (cumulative);

connections lost (cumulative);

IMAP commands failed (cumulative);

idle state lost (cumulative);

poll failed (cumulative); and

how many disableSubscribe bit were set (cumulative).

There now follows greater details concerning polling and detailsregarding out-of-coverage notifications to preserve polling resources inthe DA Proxy.

The MOP 40 and workers 24, as shown in FIG. 15 and explained in greaterdetail below, interact to suspend polling of email sources based uponuser devices being out of a coverage are or turned off. This allowsunnecessary polling to be avoided when a user cannot otherwise receivehis or her email. However, problems arise in designating a subscriber asout of coverage in that in/out of coverage notifications to the workers24 may not arrive in order. Moreover, there is a possibility that suchnotifications can be lost, such as when there is a worker failure event.A special “fail-safe” polling operation for out-of-coverage sourcesallows the workers to correct the MOP status if a “race condition” orerror condition occurs that was not otherwise detected.

It should be understood that there are constantly sources that areattributed to an account whose handheld device is out-of-coverage (orturned off). Currently, these sources are still polled for new mail evenwhen they are out of coverage. This polling is not useful since mailcannot be delivered to the device when it is out-of-range. Hence thepolling unnecessarily consumes bandwidth and uses system resources.

In accordance with non-limiting examples, the source scheduler 104receives a relay pushback request via the DA Proxy 42 for each device 38that is out-of-coverage. The purpose of handling relay pushback requestsin the MOP is to:

1) save bandwidth and not poll sources that are out of coverage;

2) resume polling sources when a user comes back into coverage; and

3) reduce the number of messages that have to be cached on disk in theworkers.

A device 38 going in and out of coverage (this might happen if someoneis near a weak signal) results in the relay making pushback requestsrelatively frequently to the worker. There is no assurance that theserequests will never become out-of-order along the way to the worker 24.Furthermore, the asynchronous nature of the web client engine 22, MOP 40and relay protocols within the relay 34 make for an endless number ofsequences and magnifies the possibility of a race condition betweenout-of-coverage notifications and in-coverage notifications. The worker24 needs to either keep notifications in sync or detect and disregardany out-of-sync notifications.

There is also the issue of a worker failure event, with a chance thatthe in-coverage notification from the relay 34 is “lost” and MOP 40 doesnot receive the notification. If there are no messages in its job queuewhen the worker comes back online, it will not mark the queue asin-coverage and therefore will not send MOP an in-coverage notification.In this case the source will remain marked out-of-coverage in MOP andpotentially never be polled for an incoming source mail. Essentially,the problem is that the worker 24 only knows about users that havemessages being processed. If for some reason all jobs in the worker havebeen completed, but the MOP has the user flagged as out-of-coverage,there is no way for the worker 24 to know whom to poll the status for(the user does not exist as far as the worker is concerned). The workeronly requests user information when new jobs come into the system. Inthis “race condition case” no new mail will arrive because the MOP hasstopped polling and the user would remain marked out-of-coverage.

To avoid the situation described above, the MOP 40 periodically conductsa “fail safe poll” for all pollable and out-of-coverage sources (apollable source is not suspended or otherwise disabled). In other words,the worker 24 will correct the MOP if a race condition or errorcondition occurred that was not otherwise detected.

One way of doing this is for the MOP DA Proxy 42 to poll the worker forout-of-coverage status. This polling is triggered by the pollinginterval for the source mailbox by the source scheduler 104. If theworker knows this user is still out of coverage, it will report it as sootherwise, i.e., it is sending messages to an in-coverage user, or doesnot know about the user at all, and it will report an in-coveragestatus. This approach has the following advantages: a) in most cases,mail flow/polling will resume immediately as soon as the user comes backin coverage, b) if the system misses notifications or come out of order,the system will have a fail safe poll that can discover/report statusand sync up relatively quickly if necessary, and c) in the case of aworker crash, the DA Proxy will poll the worker 24 who gets reassignedthe out-of-coverage user and the worker will report inc-overage since itdoes not know anything about this user.

The partition database 58 places a timestamp on each source thatspecifies the last time the source was changed. Two queries areprovided. The first query simply returns the entire list of sources inthe partition and a timestamp that can be used in the second query. Thesecond query, given a timestamp from the last query, returns all sourceschanged since the last query and another timestamp to use in the nextquery.

There now follows details of the MOP 40 related to polling to betterunderstand the out-of-coverage notification process.

The Source Assignment Manager 60 is a partition-level service, which isresponsible for ensuring that all sources of a partition are beingserviced.

The SAM 60 maintains a list of all sources belonging to its configuredpartition. For each source in the list it tracks data related touniquely identifying each source. Furthermore, the DA Proxy 42assignment and directory node assignment are tracked to enablenotifications of re-assignment and/or lessen reassignment due to DAProxy and directory failure.

A timestamp is also tracked. The timestamp is a value returned by thedatabase that can be used to retrieve sources that have changed sincethe last query. The SAM maintains the SrcMboxId, MboxAcctId in additionto the PIN and ServiceBookId since the SrcMboxId and MboxAcctId areproperties of a source as opposed to the PIN and ServicebookId and helpthe SAM verify the identity of a source after pin changes.

When the system is started, it is the responsibility of the SourceAssignment Manager (SAM) to begin assignment of all sources to DAproxies. The following is the sequence of steps for assigning allsources:

1) Register with Directory for event notifications. The SAM willregister for DA and Directory failure events.

2) Call the Partition DB to acquire a list of all existing sources. Thedatabase will also return a tag or timestamp which can be used to queryfor any new or changed sources.

3) For each source, call the Directory in one or more batches to get DAProxy assignments and cache this information.

4) Group sources by the DA Proxy they were assigned.

5) Make a batch call to each DA Proxy containing assigned sources.

6) Each DA Proxy upon receiving the assignments adds the sources to itssource queue.

Periodically, the SAM 60 will query the database for all sources thatare new or changed using the timestamp that was returned in response tothe query made at startup. It will then send out notifications to the DAProxy for each of these sources. This step is necessary to “ensure” thatall sources are being polled. By default, a sweep will be run every 15minutes since the previous sweep. This interval will be configurable.

The SAM will cache DA Proxy assignment information. The advantages tocaching this information are as follows:

1) In the case of DA Proxy failure, it allows the SAM to do a directorylookup only for those sources assigned to the failed DA Proxy.Otherwise, the SAM will have to do a database lookup to find sourcesthat have changed since the last query by using the timestamp returnedby the last query.

2) In the case of Directory failure, it allows the SAM to suggest to theDirectory which DA Proxy it should map each source to in order to reducethe amount of reassignment.

3) In both types of failures (DA Proxy and Directory 56), a database hitis avoided to find all the changed sources, since the last timestamp, inthe partition since the information is cached. The DA Proxy 42 isresponsible for servicing and managing the sources that are assigned toit by the SAM 60. The Source Scheduler 104 manages and services thesources and can initiate subscriptions. The Source Scheduler 104maintains all sources to be polled in a priority queue based on apriority heap. The queue is always sorted in the order in which sourcesare to be polled. The head of the queue is the least element withrespect to the specified ordering which is nextPollTime.

The scheduler will pick each source from the head of a queue that is duefor polling, set its lastPickedTime as “Now” and submit it to the DAprocessing queue. It will then calculate the nextPollTime and insert itback into the queue. The source will also be marked as being “inprogress”. Once the polling job is completed by DA, it will callback tothe scheduler to report the completion of processing using thepollResult( ) interface method. The callback will be used to clear the“in progress” state of the source. If a source which is still “inprogress” becomes due for polling, it would mean that the DA Proxy isrunning behind and hasn't gotten around to the last polling job yet andit will be punted back in the queue with a new nextPollTime.

A source will be submitted to the DA Proxy processing queue for pollingif it has a nextPollTime<=Now. Otherwise, the scheduler will stay idle.Such a situation would indicate that the system is running ahead on itspolling schedule. Instead of staying idle, the scheduler could allowpolling to continue even if it is running ahead. However, in order toavoid too frequent polling attempts to remote servers a property couldbe defined that specifies how far ahead the system can run. For example,if it is set to 5 minutes, it will guarantee that there are at least 10minutes between two successive polls assuming the regular pollinginterval is set to 15 minutes, i.e. sources with(nextPollTime−runAheadTime)<=Now will be scheduled for polling.

The process of “expediting” a poll on a source would mean moving thesource towards the head of the queue in order to be polled before itsnext scheduled poll. For “invalid” accounts that change state to “valid⇄due to external actions, this would mean moving the nextPollTime to“now” whereas for sources that saw new mail in the current poll, itwould mean moving the nextPollTime to “now+x” where x is say 3 minutes.

The DA proxy receives notifications from the Source Assignment Managerwhich specifies a list of sources to add, remove or update from thesource scheduler. The notification can also specify that this is a“refresh” notification in that it will list all the sources to beserviced by the DA Proxy, which means the current list of sources beingserviced should be removed. The “refresh” notification will be used by abackup SAM when it takes over for the primary SAM due to failure. Theinterface method notificationFromSAM( ) will be used to update thescheduler in this case.

NewMail notifications from the EventServer 46 for subscribed sourceswill cause the source to be expedited to “Now” in the scheduler. If aNewMail notification is received for a subscribed source which has the“in progress” flag set, either due to two or more successive NewMailnotifications from the Event Server or due to its nextPollTime<=Nowbecause of inactivity, then the source will be marked as“ExpeditePollPending” and expedited when the current polling jobcompletes.

Once a polling job is complete, when the polling handler calls back intothe scheduler to report completion of the job, a new Subscription jobwill be created for those sources that are not currently subscribed butmeet the criteria of being “subscribable” and added to the DA processingqueue only if the system could successfully login to the source mailbox.

There now follows details of the out-of-service notification process.

The Source Scheduler 104 receives a relay pushback request for eachsource or device that is out-of-coverage. The purpose of handling relaypushback requests in the MOP is to:

1) Save bandwidth and not poll sources that are out of coverage.

2) Resume polling sources when a user comes back into coverage.

3) Reduce the number of messages that have to be cached on disk in theWorkers 24.

In the Engine 22, messages are stored/queued and submitted to the Relay34 based off of a PIN/SB. Furthermore, Relay implements pushback on aper message basis. Thus, every message submitted to the Relay 34 can be“pushed back” if the user is out of coverage. Each message queue in theworker (i.e., PIN/SB combo) keeps track of these push-backed messagesand determines if the user is in or out of coverage. Hence, each queuewill send an “out-of-coverage” or “in-coverage” flag to the MOP 40.

The pushback flag is on the source level rather than the user levelbecause it does not involve de-multiplexing the multiple source levelsinto one user level, and makes the race condition of the update easierto be controlled. The MOP 40 receives one notification per source thathas at least one pending message in the worker. The worker can allow atleast one job for each service book (max 11 service books) to be sent todevice. There can be 11 updates to a DA proxy in this non-limitingexample each time the device is in and out of coverage.

If the Worker 24 accepts MTH's from the DA Proxy 42 while a device isout of coverage, those messages are NOT lost. When the device comes backinto coverage, the messages are retried and sent to the device. TheWorker will keep them until the device is back in coverage or until somepreviously sent jobs expired, for example, after 7 days from a PortAgent 26 to make room for next pending job(s) to be sent out.

The following describes the nature of the relay-pushback in the Engine22:

1) The Worker 24 has x messages (where x>0) that it has converted andsubmitted to Relay.

2) Relay pushes back y messages (where y>0). In theory, x=y, but it doesnot have to be, given the unreliable nature of this protocol from theRelay side.

3) Of the y messages, 1 is marked as a KEEP job. A KEEP job is retriedperiodically (every 4 hours) as a safety measure. Therefore y−1 messagesare put back into the queue and the queue is marked as“out-of-coverage”. The y−1 messages are not resubmitted while in thisstate, and any new incoming messages are not submitted for delivery.Messages are queued in the Worker.

4) Two events can signal an “in-coverage” status:

a) Relay notifies that user has come back in coverage, or

b) The periodically resubmitted KEEP job comes back as DELIVERED. Queueis marked as “in-coverage” and messages in the queue are resubmitted(following the “max number of assigned jobs per PIN/SB rule”, as perusual).

A device going in and out of coverage (this might happen if a device isnear a weak signal) results in the Relay 34 making pushback requestsrelatively frequently to the Worker. There is no assurance that theserequests will never become out-of-order along the way to the Worker.Furthermore, because of the asynchronous nature of the Engine 22, theMOP and Relay protocols make for an endless number of sequences andmagnifies the possibility of a race condition between out-of-coveragenotifications and in-coverage notifications. The Worker needs to eitherkeep notifications in sync, or detect and disregard out-of-syncnotifications.

There is also the issue of a Worker failure event, with a chance thatthe in-coverage notification from the Relay 34 is “lost” and MOP 40 doesnot receive the notification. If there are no messages in its job queuewhen the Worker comes back online, it will not mark the queue asin-coverage and therefore not send MOP an in-coverage notification. Inthis case, the source will remain marked out-of-coverage in the MOP and,potentially never be polled for incoming source mail Essentially, theproblem is that the Worker only knows about users that have messagesbeing processed. If, for some reason, all jobs in the Worker have beencompleted but the MOP has the user flagged as out-of-coverage, there isno way for the Worker to know whom to poll the status for because theuser does not exist as far as the Worker is concerned. The Worker 24only requests user information when new jobs come into the system, butin this “race-condition case” no new mail will come in since the MOP hasstopped polling and the user would remain marked out-of-coverage.

To avoid the situation described above, MOP periodically accomplishes a“fail-safe poll” for all pollable and out-of-coverage sources where apollable source is not suspended or otherwise disabled. The Worker 24will correct the MOP if a race condition or error condition occurredthat was not otherwise detected.

One way of doing this is for the MOP DA Proxy 42 to poll the Worker 24for out-of-coverage status. This polling is triggered by the pollinginterval for the source mailbox by the Source Scheduler 104. If theWorker knows this user is still out of coverage it will report it as so,otherwise, i.e., it is sending messages to an in-coverage user, ordoesn't know about the user at all, and it will report an in-coveragestatus. This approach has the following advantages: a) In most cases,mail flow/polling will resume immediately as soon as the user comes backin coverage, b) if notifications are missed or come out of order, thesystem will have a fail-safe poll that can discover/report status andsync up relatively quickly if necessary, and c) in the case of a Workercrash, the DAProxy will poll the Worker who gets reassigned theout-of-coverage user, and the worker will report in-coverage since itdoes not know anything about this user.

The Source Scheduler 104 periodically triggers the DA Proxy 42 to send afire-and-forget notification to the Worker 24. In response, if theWorker determines the source is in-coverage, updates the out-of-coveragenotification status to ‘false’ thereby indicating that the source isback in-coverage status. In the event the fire-and-forget notificationis lost or the Worker is down, then the Worker will not send anin-coverage notification update to MOP and the source state will remainout of coverage.

FIG. 15 is a sequence diagram of the notification communicationtransactions.

All sources in an account should be considered out-of-coverage if onesource in the account receives a pushback notification from the relay.Part of this optimization could be implemented in the MOP to mark allsources out-of-coverage. However, the most benefit would probably begained if the engine 22 were optimized to consider relay pushbacks atthe account level and tie the queues together at the account level.Otherwise any messages already in the queue will continue to be retried.

The worker need not respond with an “out-of-coverage ACK” when the MOPpolls it for out-of-coverage sources. It only needs to respond to haveMOP mark in-coverage. This would save some of the overhead of processingout-of-coverage requests and responses.

Exemplary components of a hand-held mobile wireless communicationsdevice 1000 that may be used in accordance with such a system arefurther described in the example below with reference to FIG. 1. Thedevice 1000 illustratively includes a housing 1200, a keypad 1400 and anoutput device 1600. The output device shown is a display 1600, which ispreferably a full graphic LCD. Other types of output devices mayalternatively be utilized. A processing device 1800 is contained withinthe housing 1200 and is coupled between the keypad 1400 and the display1600. The processing device 1800 controls the operation of the display1600, as well as the overall operation of the mobile device 1000, inresponse to actuation of keys on the keypad 1400 by the user.

The housing 1200 may be elongated vertically, or may take on other sizesand shapes (including clamshell housing structures). The keypad mayinclude a mode selection key, or other hardware or software forswitching between text entry and telephony entry.

In addition to the processing device 1800, other parts of the mobiledevice 1000 are shown schematically in FIG. 1. These include acommunications subsystem 1001; a short-range communications subsystem1020; the keypad 1400 and the display 1600, along with otherinput/output devices 1060, 1080, 1100 and 1120; as well as memorydevices 1160, 1180 and various other device subsystems 1201. The mobiledevice 1000 is preferably a two-way RF communications device havingvoice and data communications capabilities. In addition, the mobiledevice 1000 preferably has the capability to communicate with othercomputer systems via the Internet.

Operating system software executed by the processing device 1800 ispreferably stored in a persistent store, such as the flash memory 1160,but may be stored in other types of memory devices, such as a read onlymemory (ROM) or similar storage element. In addition, system software,specific device applications, or parts thereof, may be temporarilyloaded into a volatile store, such as the random access memory (RAM)1180. Communications signals received by the mobile device may also bestored in the RAM 1180.

The processing device 1800, in addition to its operating systemfunctions, enables execution of software applications 1300A-1300N on thedevice 1000. A predetermined set of applications that control basicdevice operations, such as data and voice communications 1300A and1300B, may be installed on the device 1000 during manufacture. Inaddition, a personal information manager (PIM) application may beinstalled during manufacture. The PIM is preferably capable oforganizing and managing data items, such as e-mail, calendar events,voice mails, appointments, and task items. The PIM application is alsopreferably capable of sending and receiving data items via a wirelessnetwork 1401. Preferably, the PIM data items are seamlessly integrated,synchronized and updated via the wireless network 1401 with the deviceuser's corresponding data items stored or associated with a hostcomputer system.

Communication functions, including data and voice communications, areperformed through the communications subsystem 1001, and possiblythrough the short-range communications subsystem. The communicationssubsystem 1001 includes a receiver 1500, a transmitter 1520, and one ormore antennas 1540 and 1560. In addition, the communications subsystem1001 also includes a processing module, such as a digital signalprocessor (DSP) 1580, and local oscillators (LOs) 1601. The specificdesign and implementation of the communications subsystem 1001 isdependent upon the communications network in which the mobile device1000 is intended to operate. For example, a mobile device 1000 mayinclude a communications subsystem 1001 designed to operate with theMobitex™, Data TAC™ or General Packet Radio Service (GPRS) mobile datacommunications networks, and also designed to operate with any of avariety of voice communications networks, such as AMPS, TDMA, CDMA,WCDMA, PCS, GSM, EDGE, etc. Other types of data and voice networks, bothseparate and integrated, may also be utilized with the mobile device1000. The mobile device 1000 may also be compliant with othercommunications standards such as 3GSM, 3GPP, UMTS, etc.

Network access requirements vary depending upon the type ofcommunication system. For example, in the Mobitex and DataTAC networks,mobile devices are registered on the network using a unique personalidentification number or PIN associated with each device. In GPRSnetworks, however, network access is associated with a subscriber oruser of a device. A GPRS device therefore requires a subscriber identitymodule, commonly referred to as a SIM card, in order to operate on aGPRS network.

When required network registration or activation procedures have beencompleted, the mobile device 1000 may send and receive communicationssignals over the communication network 1401. Signals received from thecommunications network 1401 by the antenna 1540 are routed to thereceiver 1500, which provides for signal amplification, frequency downconversion, filtering, channel selection, etc., and may also provideanalog to digital conversion. Analog-to-digital conversion of thereceived signal allows the DSP 1580 to perform more complexcommunications functions, such as demodulation and decoding. In asimilar manner, signals to be transmitted to the network 1401 areprocessed (e.g. modulated and encoded) by the DSP 1580 and are thenprovided to the transmitter 1520 for digital to analog conversion,frequency up conversion, filtering, amplification and transmission tothe communication network 1401 (or networks) via the antenna 1560.

In addition to processing communications signals, the DSP 1580 providesfor control of the receiver 1500 and the transmitter 1520. For example,gains applied to communications signals in the receiver 1500 andtransmitter 1520 may be adaptively controlled through automatic gaincontrol algorithms implemented in the DSP 1580.

In a data communications mode, a received signal, such as a text messageor web page download, is processed by the communications subsystem 1001and is input to the processing device 1800. The received signal is thenfurther processed by the processing device 1800 for an output to thedisplay 1600, or alternatively to some other auxiliary I/O device 1060.A device user may also compose data items, such as email messages, usingthe keypad 1400 and/or some other auxiliary I/O device 1060, such as atouchpad, a rocker switch, a thumb-wheel, or some other type of inputdevice. The composed data items may then be transmitted over thecommunications network 1401 via the communications subsystem 1001.

In a voice communications mode, overall operation of the device issubstantially similar to the data communications mode, except thatreceived signals are output to a speaker 1100, and signals fortransmission are generated by a microphone 1120. Alternative voice oraudio I/O subsystems, such as a voice message recording subsystem, mayalso be implemented on the device 1000. In addition, the display 1600may also be utilized in voice communications mode, for example todisplay the identity of a calling party, the duration of a voice call,or other voice call related information.

The short-range communications subsystem enables communication betweenthe mobile device 1000 and other proximate systems or devices, whichneed not necessarily be similar devices. For example, the short-rangecommunications subsystem may include an infrared device and associatedcircuits and components, or a Bluetooth™ communications module toprovide for communication with similarly-enabled systems and devices.

This application is related to copending patent applications entitled,“DIRECT ACCESS ELECTRONIC MAIL (EMAIL) DISTRIBUTION AND SYNCHRONIZATIONSYSTEM WITH IMAP-IDLE IMPLEMENTATION,” and “DIRECT ACCESS ELECTRONICMAIL (EMAIL) DISTRIBUTION AND SYNCHRONIZATION SYSTEM WITH EXTERNAL SMTPSERVER SUPPORT,” which are filed on the same date and by the sameassignee, the disclosures which are hereby incorporated by reference.

Many modifications and other embodiments of the invention will come tothe mind of one skilled in the art having the benefit of the teachingspresented in the foregoing descriptions and the associated drawings.Therefore, it is understood that the invention is not to be limited tothe specific embodiments disclosed, and that modifications andembodiments are intended to be included within the scope of the appendedclaims.

1. A communications system, comprising: a network engine thatcommunicates with a plurality of user subscribed mobile wirelesscommunications devices and operative for determining when a mobilewireless communications device is out-of-coverage or turned off andunable to communicate with the network engine; and a direct accessserver operative with the network engine for polling electronicmailboxes of users and retrieving electronic messages from theelectronic mailboxes and pushing any electronic messages through thenetwork engine to selected user subscribed mobile wirelesscommunications devices, wherein said direct access server is operativefor suspending polling of those electronic mailboxes of a user when amobile wireless communications device associated with the user has beendetermined to be out-of-coverage or turned off and unable to communicateso as to preserve polling resources within the direct access server. 2.The communications system according to claim 1, wherein said networkengine further comprises a worker module that accepts email from thedirect access server and any mail routers and formats email forcommunication across a communications network and a relay module thatreceives messages from the worker module and pushes the messages tomobile wireless communications devices through the communicationsnetwork.
 3. The communications system according to claim 2, wherein saidrelay module is operative for pushing back messages to the worker modulewhen a mobile wireless communications device is out-of-coverage orturned-off and messages cannot be pushed to such device.
 4. Thecommunications system according to claim 3, wherein said relay modulepushes back messages to a worker module on a per message basis such thatevery message the worker submits to the relay module can be pushed backto the worker module.
 5. The communications system according to claim 3,wherein said worker module is operative for maintaining a record of thenumber of messages pushed back from the relay module and determiningfrom the number of pushed back messages whether the mobile wirelesscommunications device in which intended messages have been pushed backis out-of-coverage.
 6. The communications system according to claim 1,wherein said network engine is operative for sending an out-of-coverageor in-coverage flag to the direct access server indicating that themobile wireless communications device to which emails are intended isout-of-coverage or turned-off.
 7. The communications system according toclaim 1, wherein said direct access server is operative to resumepolling of those electronic mailboxes to which polling has beensuspended when the associated mobile wireless communications device ofthe user is in-coverage or turned on and able to resume communications.8. A communications system, comprising: a network engine thatcommunicates with a plurality of user subscribed mobile wirelesscommunications devices and operative for determining when a mobilewireless communications device is out-of-coverage or turned off andunable to communicate with the network engine and generate out-ofcoverage and in-coverage notification; and a direct access serveroperative with the network engine for polling electronic mailboxes ofusers and retrieving electronic messages from the electronic mailboxesand pushing any electronic messages through the network engine toselected user subscribed mobile wireless communications devices, whereinsaid direct access server is operative for receiving the out-of coverageand in-coverage notifications from the network engine and suspendingpolling of those electronic mailboxes of a user after receiving anout-of-coverage notification so as to preserve polling resources withinthe direct access server, wherein said direct access server is operativefor fail-safe polling said network engine for the status of mobilewireless communications devices that are deemed to be out-of-coverage orturned off and in-coverage.
 9. The communications system according toclaim 8, wherein said direct access server comprises a source schedulermodule that schedules a polling interval for electronic mailboxes,wherein said fail-safe polling is triggered by said polling interval.10. The communications system according to claim 9, wherein said networkengine further comprises a worker module that accepts email from thedirect access server and any mail routers and formats email forcommunication across a communications network, wherein said sourcescheduler module communicates with said worker module to sendnotifications to send worker module as a fail safe poll.
 11. Thecommunications system according to claim 8, wherein said network enginefurther comprises a worker module that accepts email from the directaccess server and any mail routers and formats email for communicationacross a communications network and a relay module that receivesmessages from the worker module and pushes the messages to mobilewireless communications devices through the communications network. 12.The communications system according to claim 11, wherein said relaymodule is operative for pushing back messages to the worker module whena mobile wireless communications device is out-of-coverage or turned-offand messages cannot be pushed to such device.
 13. The communicationssystem according to claim 12, wherein said relay module pushes backmessages to a worker module on a per message basis such that everymessage the worker submits to the relay module can be pushed back to theworker module.
 14. The communications system according to claim 12,wherein said worker module is operative for maintaining a record of thenumber of messages pushed back from the relay module and determiningfrom the number of pushed back messages whether the mobile wirelesscommunications device in which intended messages have been pushed backis out-of-coverage or turned off.
 15. The communications systemaccording to claim 8, wherein said network engine is operative forsending an out-of-coverage or in-coverage flag to the direct accessserver indicating that the mobile wireless communications device towhich emails are intended is out-of-coverage or turned-off.
 16. Thecommunications system according to claim 8, wherein said direct accessserver is operative to resume polling of those electronic mailboxes towhich polling has been suspended when the associated mobile wirelesscommunications device of the user is in-coverage or turned on and ableto resume communications.
 17. A communications method, comprising:determining when a user subscribed mobile wireless communications deviceis out-of-coverage or turned off and unable to communicate with anetwork engine as a module that pushes emails received from a directaccess server to the mobile wireless communications device; pollingelectronic mailboxes of the user from the direct access server;retrieving electronic messages from the electronic mailboxes; pushingany electronic messages through the network engine to a user subscribedmobile wireless communications device; determining when the mobilewireless communications device is out-of-coverage or turned off andunable to communicate; and suspending polling of those electronicmailboxes belonging to the user.
 18. The method according to claim 17,which further comprises formatting email for communication within aworker module that accepts email from the direct access server andreceiving email messages within a relay module from the worker moduleand pushing the messages from the relay module to the mobile wirelesscommunications device through a communications network.
 19. The methodaccording to claim 18, which further comprises pushing back messages tothe worker module from the relay module within a when a mobile wirelesscommunications device is out-of-coverage or turned-off and messagescannot be pushed to such device.
 20. The method according to claim 19,which further comprises pushing back messages on a per message basis.21. The method according to claim 19, which further comprisesmaintaining a record of the number of messages pushed back from therelay module and determining from the number of pushed back messageswhether the mobile wireless communications device in which intendedmessages have been pushed back is out-of-coverage or turned off.
 22. Themethod according to claim 17, which further comprises sending anout-of-coverage or in-coverage flag to the direct access serverindicating that the mobile wireless communications device to whichemails are intended is out-of-coverage or turned-off.