Solicitations for allocations of access across a shared communications medium

ABSTRACT

A method of providing network access across a shared communications medium between competing users pursuant to SLAs of the users includes the steps of: (a) monitoring network access usage by each user during a time interval; (b) comparing the monitored network access usage by each user with a predetermined threshold value; and (c) soliciting a user to modify the user&#39;s SLA if the user&#39;s monitored network access usage varies from the predetermined value by a predetermined tolerance. The solicitation is conducted via email, instant messaging, redirection of a web browser of the user to a solicitation web page, generation and mailing of literature, telephonic communication, or other communication avenue.

CROSS-REFERENCE TO RELATED APPLICATION

[0001] This U.S. patent application claims priority under 35 U.S.C. 119to the benefit of the filing date of U.S. provisional patent applicationserial No. 60/205,963, which was filed on May 19, 2000, and which isincorporated herein by reference. This application also incorporatesherein by reference each of seven other U.S. patent applications toMcKinnon et al. filed concurrently herewith in the U.S. Patent &Trademark Office and respectively bearing Ser. Nos. ______; ______;______; ______; ______; ______; and ______. each of which relates toallocating access across a shared communications medium and is similarlytitled.

FIELD OF THE PRESENT INVENTION

[0002] The present invention generally relates to allocating accessacross a shared communications medium and, in particular, to allocatingbandwidth used to convey data of competing users across a sharedcommunications medium of a Carrier Network.

BACKGROUND OF THE PRESENT INVENTION

[0003] As used herein, a “Carrier Network” generally refers to acomputer network through which users (such as homes and businesses)communicate with various service providers. The Carrier Network extendsfrom the location of each user to an intermediate switched/routednetwork (hereinafter “Intermediate Network”). The service providers, inturn, are connected to the Intermediate Network, either directly orindirectly via the Internet, for communications with the users. TheCarrier Network is maintained by a “Carrier,” which also may serve as aservice provider for certain services. For example, a Carrier or arelated entity may serve as an Internet service provider (ISP).

[0004] Two prevalent types of Carrier Networks include a “Shared AccessCarrier Network,” in which data of multiple users are conveyed togetherover a shared communications medium between the users and theIntermediate Network, and a “Dedicated Connection Carrier Network,” inwhich data of each user are conveyed alone between the user and theIntermediate Network and are not combined with data of other users. Oneof the most prevalent Shared Access Carrier Networks today is found inthe Data-Over-Cable (DOC) Network, which includes the traditionalnetwork constructed from coaxial cable and the hybrid fiber coaxial(HFC) network constructed with both fiber optical cabling and coaxialcable. Other Shared Access Carrier Networks include wireless and digitalsubscriber line (xDSL) networks (the xDSL lines typically beingaggregated onto an oversubscribed backhaul trunk into the IntermediateNetwork, with the trunk defining the shared communications medium).

[0005] For example, with regard to DOC Networks, and with reference toFIG. 1 wherein a conventional DOC Network 40 is illustrated, datapackets are transmitted in a downstream direction from a cable modemtermination system (CMTS) 30, which is located in a headend 36 (ordistribution hub) of a Carrier, over a coaxial cable 32 to respectivecable modems (CMs) 34 of users. All of the CMs 34 are attached by thecoaxial cable 32 to the CMTS 30 in an inverted tree configuration, andeach CM 34 connected to the coaxial cable 32 listens to all broadcastsfrom the CMTS 30 transmitted through the coaxial cable 32 for datapackets addressed to it, and ignores all other data packets addressed toother CMs 34. Theoretically, a CM 34 is capable of receiving data in thedownstream direction over a 6 MHz channel with a maximum connectionspeed of 30-40 Mbps. Data packets also are transmitted in the upstreamdirection over a 2 MHz channel by the CMs 34 to the CMTS 30 typicallyusing time division multiplexing (TDM) and at a maximum connection speedof 1.5-10 Mbps.

[0006] The headend 36 in the DOC Network 40 includes a plurality ofCMTSs, with each CMTS supporting multiple groups of CMs each connectedtogether by a respective coaxial cable. Each such group of CMs connectedto a CMTS defines a Shared Access Carrier Network, with the coaxialcable in each representing the shared communications medium. Thisarrangement of a group of CMs connected to a CMTS by a coaxial cable isreferred to herein as a “Cable Network.” Accordingly, the DOC Network 40includes a plurality of Cable Networks 38 originating from CMTSs at theheadend 36 of the Carrier, with a particular Cable Network 38 beingillustrated in an expanded view in FIG. 1. The DOC Network 40 alsoincludes multiple headends 36,64,66.

[0007] In contrast to the Shared Access Carrier Network, a user in theDedicated Connection Carrier Network establishes a dedicated connectiondirectly with the Intermediate Network for the transfer of data directlytherebetween, and no data of other users travel over the dedicatedconnection. Examples of a dedicated connection are shown for comparisonin FIG. 1 and include a connection established by a telephony modem 74and a connection established by an ISDN modem 76. Both downstream andupstream connection speeds in a Dedicated Connection Carrier Networkrange from a maximum of 53 kbps in a telephony modem connection to amaximum of 128 kbps in a basic rate interface ISDN connection.

[0008] Connection speeds and, more importantly, throughput rate-theamount of data actually transmitted successfully in a given timeinterval-are important in minimizing downtime that users spend waitingfor HTML documents to download from the Web. A Shared Access CarrierNetwork is considered superior to a comparable Dedicated ConnectionCarrier Network because the maximum instantaneous connection speedoffered by the Shared Access Carrier Network is greater. A Shared AccessCarrier Network is considered “comparable” to a Dedicated ConnectionCarrier Network where the entire bandwidth over a shared communicationsmedium of the Shared Access Carrier Network equals an aggregatebandwidth that is divided between and dedicated to users in a DedicatedConnection Carrier Network. Accordingly, Shared Access Carrier Networksare able to offer significantly faster downloads of web documents,emails, and file transfers that are not considered available inDedicated Connection Carrier Networks.

[0009] Furthermore, new multimedia applications and Internet services,such as voice and video communications via the Internet, now are offeredwhich require even greater throughput rates for acceptable levels ofservice than that of the traditional Internet services, i.e., throughputrates greater than that required for acceptable text-based Web browsing,file transferring, and email communication. It is believed that thesenew multimedia applications and Internet services cannot adequately beprovided for over Dedicated Connection Carrier Networks and that,consequently, Shared Access Carrier Networks ultimately will prevail asthe predominant type of Carrier Network for Internet access by users.

[0010] Of course, the actual throughput rates experienced by aparticular user rarely, if ever, will equate to the maximum connectionspeeds of which the Shared Access Carrier Network is capable because ofthe shared nature of the communications medium. For example, in a CableNetwork the total bandwidths available over the shared cable in thedownstream and upstream directions, which determine the respectivemaximum connection speeds, must be shared among all of the userscommunicating at a given time. Thus, rarely will a single user haveavailable for use a large portion of the entire bandwidth in aparticular direction. Further, as a Carrier adds users to the CableNetwork, the actual downstream and upstream bandwidths available to theuser-and thus throughput rates of the user-generally will decrease. ACarrier therefore must be careful to draw a balance between the numberof users connected to a Cable Network and the performance usersexperience communicating over the network.

[0011] Unfortunately, Shared Access Carrier Networks that have beenestablished were designed to provide the traditional Internet services,and not the new multimedia applications and Internet services thatrequire higher throughput rates for acceptable levels of service.Consequently, each balance previously struck by Carriers in establishingShared Access Carrier Networks was based on considerations of thethroughput rates required for the traditional Internet services, anduser throughput rates currently experienced by users in such networksare believed to fall short of acceptable quality of service (QoS)standards believed required in a Carrier Network for the new multimediaapplications and Internet services.

[0012] Additionally, with regard to new Shared Access Carrier Networksthat are being established, considerations of the new multimediaapplications and Internet services tend to reduce the number of usersthat a Carrier now can reasonably expect to connect to the sharedcommunications medium before degrading the performance levels of the newmultimedia applications and Internet services. The balance is beingshifted towards less users per shared access medium in exchange forhigher throughput rates and, thus, higher QoS standards.

[0013] In an attempt to avoid reducing the number of users, it has beenproposed, at least in DOC Networks, to discriminate between thetraditional Internet services and the new multimedia applications andInternet services with regard to priority of data packet transmissions.In particular, the generally accepted standard in the United Statesgoverning communication protocols over cable is DOCSIS version 1.0,which was ratified by the International Telecommunication Union in Marchof 1998. DOCSIS stands for “Data Over Cable Service InterfaceSpecifications.” When DOCSIS 1.0 was developed, it was generallybelieved that, in view of the “fast” connection speeds of CableNetworks, the provision of bandwidth on a best effort basis would besufficient to meet all user requirements.

[0014] Accordingly, each user subscribed to receive network accesspursuant to a service level agreement (SLA) which provided for networkaccess (or bandwidth in Cable Networks) only on a best effort basis.Now, in an effort to address the foreseen ever-increasing demand forhigher throughput rates, DOCISIS version 1.1 has been proposed, inaccordance with which each data packet transmitted over a DOC Networknow must include a classification designation for prioritizationpurposes by network equipment. Subsequently, data packets representingvoice or video, for example, now can be identified and given prioritytransmission over data packets representing email, file transfers, andtext-based Web documents. A benefit of such flow classification is that,while overall bandwidth generally available to a user may otherwiseremain unchanged, throughput rates of data for voice and video now maybe provided at a higher rate than throughput rates of data for thetraditional Internet services, thereby increasing the performance ofvoice and video applications and services while at least maintaining thetraditional number of users connected to a Cable Network.

[0015] A disadvantage of the revisions to DOCSIS 1.1 is that therevisions do not enhance established Cable Networks constructed withonly DOCSIS 1.0 compliant equipment, as such equipment does not supportthe added functionality of DOCSIS 1.1 so as to distinguish between datapackets.

[0016] More broadly, another disadvantage of the classification of datapackets into Internet Protocol (IP) flows based on the servicesrepresented by the data packets is that such classificationdiscriminates against users who do not utilize multimedia applicationsand services receiving the prioritized transmissions. At least for someextensive users of the traditional Internet services, some degradationin performance may be noticed by lower classification of their datapackets, particularly if the user engages in, for example, web hosting.While the transmissions of data packets for documents, files, and emailsare not as time-sensitive as data packets for voice and video, increaseddata packet latency for documents, files, and emails, even ifincrementally small, nevertheless will result in service degradation forlarge or numerous documents, files, and emails.

[0017] Accordingly, a need exists for a method and apparatus that willaccommodate differing demands for network access by users competing forsuch access across a shared communications medium of a Shared AccessCarrier Network, whether new or established, and irrespective of datapacket classifications.

SUMMARY OF THE PRESENT INVENTION

[0018] Briefly summarized, the present invention relates to a method ofproviding network access across a shared communications medium betweencompeting users pursuant to SLAs of the users. The method broadlyincludes the steps of: (a) monitoring network access usage by each userduring a time interval; (b) comparing the monitored network access usageby each user with a predetermined threshold value; and (c) soliciting auser to modify the user's SLA if the user's monitored network accessusage varies from the predetermined value by a predetermined tolerance.

[0019] Features of the present invention include the additional steps ofallocating network access to each user for a future time interval, andforecasting network access usage by users in the future time interval.Another additional feature of the present invention includes the step ofprioritizing the users for allocating network access to the users.

[0020] The network access usage includes the user throughput rate,bandwidth consumption, and/or bandwidth requested for a predeterminedperiod of time. The threshold value preferably represents a respectivemaximum level of network access (whether maximum allowed or maximumguaranteed) for each user or a respective maximum burstable level ofnetwork access with target probability for each user. The solicitationis conducted via email, instant messaging, redirection of a web browserof the user to a solicitation web page, generation and mailing ofliterature, telephonic communication, or other communication means. Thesolicited modification of the user's SLA includes guaranteeing a levelof network access to the user on a permanent or on a temporary basis. Acharge preferably is applied to the user for the modification.

[0021] A preferred method of the present invention includes theidentification of a recurrent period of high network access usage by auser based on the monitoring, and in response thereto, the solicitationof the user to modify the user's SLA in order to guarantee a minimumlevel of network access during an anticipated future recurrent period ofhigh network access usage.

BRIEF DESCRIPTION OF THE DRAWINGS

[0022] Further features and benefits of the present invention will beapparent from a detailed description of preferred embodiments thereoftaken in conjunction with the following drawings, wherein like elementsare referred to with like reference numbers, and wherein:

[0023]FIG. 1 illustrates a conventional DOC Network;

[0024]FIG. 2 illustrates a first DOC Network of the present invention;

[0025]FIG. 3 illustrates a second DOC Network of the present invention;

[0026]FIG. 4 illustrates a third DOC Network of the present invention;

[0027]FIG. 5 illustrates a fourth DOC Network of the present invention;

[0028]FIG. 6 illustrates a system architecture of software componentsthat perform preferred methods of the present invention in the DOCNetworks of FIGS. 2-5;

[0029]FIG. 7 illustrates a flowchart of the steps of a preferred routinefor forecasting bandwidth of each user for a future time interval;

[0030]FIG. 8 illustrates a flowchart of the steps of generating aforecasted bandwidth for a user in accordance with the ARRSES Functionof the preferred routine of FIG. 7;

[0031]FIG. 9 illustrates a flowchart of the steps of generating aforecasted bandwidth for a user in accordance with the HW Function ofthe preferred routine of FIG. 7;

[0032]FIG. 10 illustrates a graph of user throughput rates versus userdata loss rates for two users relative to a target minimum QoS standard;

[0033]FIG. 11 illustrates a flowchart of a first preferred method ofprioritizing users and allocating bandwidth;

[0034]FIG. 12 illustrates a flowchart of a second preferred method ofprioritizing users and allocating bandwidth;

[0035]FIG. 13 illustrates a flowchart of a third preferred method ofprioritizing users and allocating bandwidth;

[0036]FIG. 14 illustrates a flowchart of a fourth preferred method ofprioritizing users and allocating bandwidth;

[0037]FIGS. 15a and 15 b illustrate a flowchart of a fifth preferredmethod of prioritizing users and allocating bandwidth;

[0038]FIGS. 16a and 16 b illustrate a flowchart of a sixth preferredmethod of prioritizing users and allocating bandwidth;

[0039]FIG. 17 illustrates a flowchart of a preferred method of updatinga DOC Network for a DOCSIS 1.0 compliant Cable Network;

[0040]FIG. 18 illustrates the allocation of bandwidth to users during afirst time interval;

[0041]FIG. 19 illustrates the allocation of bandwidth to users during asecond time interval; and

[0042]FIG. 20 illustrates a flowchart of a preferred method ofsoliciting a user to modify the user's SLA based on monitored networkaccess usage of the user.

DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS

[0043] In the following detailed description, numerous specific detailsare set forth with regard to preferred embodiments of the presentinvention in order to provide a thorough understanding of the presentinvention; however, it will be apparent to ordinary artisans that thepresent invention may be practiced without all of these specificdetails. Well-known structures and devices also are shown in blockdiagram form, the specific details of which are not considered anecessary part of the present invention. Furthermore, as will becomeapparent to ordinary artisans, the present invention may be embodied inor performed by hardware, firmware, or software, or various combinationsthereof.

[0044] As described above, a conventional DOC Network 40 is shown inFIG. 1 and includes a plurality of Cable Networks 38, with a particularCable Network 38 being illustrated in an expanded view and comprising agroup of CMs 34, each connected to a computer 44 representing a user.Additionally, as used herein, “user” includes not only a person whointeracts with a computer 44, but any additional persons who alsointeract with the same computer 44, as well as any group of persons allof whom interact with computers attached either to the same CM 34 or tothe same computer 44 which, itself, is attached to a CM 34. While notshown, such additional arrangements are well known in the art.

[0045] The CMs 34 are connected by a coaxial cable 32 with a CMTS 30and, specifically, to a card 31 mounted within the CMTS 30. Each of theCMTSs of the DOC Network 40 preferably includes a plurality of cards,with each card supporting a group of CMs connected thereto in aninverted tree configuration to define a Cable Network 38. Furthermore,each CMTS conventionally supports up to 1,500 users, although recentCMTSs have been introduced that support up to 15,000 users.

[0046] Each Cable Network 38 defines a Shared Access Carrier Network,wherein data of respective users in each are conveyed together through ashared coaxial cable. For instance, data packets (or frames) addressedto at least one of the computers 44 are transmitted by the CMTS 30downstream over the coaxial cable 32 to all of the CMs 34 within a 6 MHzdata channel. Conversely, data packets intended for delivery to the CMTS30 and beyond are transmitted by a CM 34 upstream to the CMTS 30 overthe coaxial cable 32 within a 2 MHz channel.

[0047] The Cable Network 38 shown in expanded view in FIG. 1 is atraditional all coaxial cable network. The other Cable Networks 38collectively include both traditional all coaxial cable networks as wellas HFC networks.

[0048] The CMTS 30 transmits and receives data packets between the CableNetworks 38 and an Intermediate Network 46, which begins with a router48 in the headend 36, and includes switched and routed network equipmentat a Regional Data Center 50 that provides connectivity to serviceproviders 52,54,56,58, either directly or through the Internet 60. Inthis regard, during user communications the router 48 conveys datapackets from the CMTS 30 to the Regional Data Center 50 of the DOCNetwork 40 and, conversely, routes data packets received from theRegional Data Center 50 to the appropriate CMTS for delivery to aparticular user. Data packets that are conveyed to the Regional DataCenter 50, in turn, are directed on to an appropriate service provider52,54 directly connected to the Regional Data Center 50, or to anappropriate service provider 56,58 indirectly connected to the RegionalData Center 50 via the Internet 60. Alternatively, data packets fromusers are conveyed to a server of an application server group 62 of theRegional Data Center 50, which includes, for example, servers supportingWeb hosting, news, chat, SMTP, POP3, Proxy, cache and contentreplication, and streaming media.

[0049] The Cable Networks 38 stemming from headend 36 are maintained bya Carrier which also may maintain the Regional Data Center 50 as well asserve as a service provider. Moreover, the Carrier may maintain theCable Networks of additional headends 64,66, or of only one or more ofthe headends 64,66. In any event, the Cable Networks that are maintainedby the Carrier are administered on a daily basis through an elementmanagement system (EMS) 68. The EMS 68 comprises an operations systemdesigned specifically to configure and manage CMTSs and associated CMs,and includes a CM database 70. Operational tasks performed by the EMS 68include provisioning, day-to-day administration, and testing of variouscomponents of each CMTS. The EMS 68 typically is located at a centralnetwork operations center of the Carrier, but may be collocated at theheadend 36 of the Carrier as shown in FIG. 1.

[0050] The DOC Network 40 is managed through a control plane servergroup 72 typically located at the Regional Data Center 50. The controlplane server group 72 includes the usual servers necessary to run theDOC Network 40, such as user authorization and accounting servers, logcontrol servers (Syslog), IP address assignment and administrationservers (DHCP, TFTP), domain name servers (DNS), and DOCSIS controlservers.

[0051] For purposes of comparison, two dedicated connections also areshown in FIG. 1, wherein a telephony modem 74 and an ISDN modem 76 areconnected directly to the Intermediate Network 46 at the Regional DataCenter 50. As will be immediately apparent, data conveyed over eachdedicated connection is between a single user and the IntermediateNetwork 46, and is not combined with data of other users over a sharedcommunications medium as in each Cable Network 38.

[0052] As is common in conventional Cable Networks 38 such as thoseshown in the DOC Network 40 of FIG. 1, when a CM comes online the CM isassigned a configuration file which, inter alia, sets a constant limiton the bandwidth that can be utilized in the downstream direction by theCM during any particular interval of time, and sets a constant limit onthe bandwidth that can be utilized in the upstream direction by the CMduring any particular interval of time. The configuration file alsoincludes other parameters, such as the IP address for the CM.

[0053] The configuration file for each CM conventionally is obtained bythe CM when first brought online, or when the CM is reset. The upstreamand downstream bandwidth limits are predetermined by the Carrier orother appropriate entity, the determination of which is based on theexpected number of users to be serviced by the particular Cable Network38 to which the CM belongs.

[0054] With particular regard to data transmissions in the downstreamdirection, when the bandwidth limit is reached in receiving data withina particular time interval, the CM transmits a signal to the router 48to cease further data forwarding for the remainder of the time interval.Thereafter, whereas any data received by a CMTS is relayed on to the CMas the data is received, any additional data received by the router 48during the remainder of this time interval is stored for latertransmission in a buffer up to a threshold limit and, thereafter, anyfurther data received within the time interval is dropped.

[0055] With regard to data transmissions in the upstream direction, whenthe CM registers with the CMTS following receipt by the CM of itsconfiguration file, the CM informs the CMTS of the constant bandwidthlimit to be applied to upstream transmissions from the CM. Then, actualrequests for bandwidth (i.e., requests for timeslots) for transmissionof data in the upstream direction are submitted regularly by each CM tothe CMTS. In response to the submissions, the CMTS schedules timeslotsin a particular time interval to the CMs for exclusive transmission ofdata within each timeslot by a respective CM. However, the CMTS does notgrant an amount of bandwidth (by assigning too many timeslots) to aparticular CM that would exceed the constant bandwidth limit for theparticular CM.

[0056] The timeslots are assigned to requesting CMs based on anestablished assignment policy. For example, timeslots may be assigned bythe CMTS on a first-in-first-out basis, or timeslots may be assignedequally to the CMs that request bandwidth within a particular window oftime. The requesting CMs also may be prioritized by the CMTS forassignment of the timeslots.

[0057] Preferred embodiments 78,80,82,84 of a DOC Network in accordancewith the present invention are shown, respectively, in FIGS. 2-5,wherein each includes a “network access manager” 86 in accordance withthe present invention. In FIG. 2 the network access manager 86 islocated in the headend 36 of the DOC Network 78, in FIG. 3 the networkaccess manager 86 is located at the Regional Data Center 50 of the DOCNetwork 80, and in FIGS. 4-5 the network access manager 86 is remotelylocated, but is disposed for communication with the respective DOCNetwork 82,84, either directly as shown in the DOC Network 82 of FIG. 4,or indirectly via the Internet 60 as shown in the DOC Network 84 of FIG.5.

[0058] The network access manager 86 preferably comprises a hardwarecomponent having software modules for performing methods in accordancewith the present invention. For commercial purposes, especially inenhancing existing DOC Networks, preferably the network access manager86 is self-contained and need only be connected in communication withthe DOC Network to operate correctly. In a DOC Network that is beingupgraded or established, preferably the software modules are distributedwithin the DOC Network itself and may or may not include any additionalhardware components such as the network access manager 86. For example,the software modules may be incorporated into the EMS, CMTS, and controlplane server group of a DOC Network, thereby avoiding the expense ofadditional computer hardware components.

[0059] In order to accommodate deployment and implementation of thepresent invention, the software modules preferably are designed as peerswithin a messaging infrastructure and, in particular, within a CORBAinfrastructure 87, the system architecture of which is shown in FIG. 6.Due to the interoperability of the peers to the CORBA infrastructure 87,the separate modules readily call upon each other as described in detailbelow without regard to differences in location between the modules.Nevertheless, for ease of deployment, the network access manager 86 isbest suited for deployment and implementation of the present inventionin established DOC Networks, whether situated within the IntermediateNetwork as in FIGS. 2-3, or remotely situated as in FIGS. 4-5.

[0060] The software modules include a Data Collector 88, a DatabaseManager 90, Bandwidth Allocator 92, and GUI & Report Generating Engine94. The Data Collector 88 and Bandwidth Allocator 92 each includes anexternal system interface layer 96,98, respectively, that enables it tocommunicate with network equipment of a DOC Network. In the systemarchitecture of preferred embodiments, the Data Collector 88communicates with each CMTS and CMs of each Cable Network for whichnetwork access is managed by the network access manager 86, and theBandwidth Allocator 92 communicates with the control plane server group72 of the DOC Network as well as with the CMTS and CMs.

[0061] If a DOC Network is DOCSIS 1.0 compliant, then each externalsystem interface layer 96,98 is a DOCSIS external system interfacelayer. If a DOC Network uses proprietary interface specifications, theneach external system interface layer 96,98 is designed based on theproprietary interface specifications. In either case, however, the DataCollector 88 and Bandwidth Allocator 92 generally need not be modified;only the external systems interface layers 96,98 thereof need be changedbased on the particularities of the DOC Network. Each of the DataCollector 88 and Bandwidth Allocator 92 also includes a schedulingelement 100,102, respectively, that schedules the timing of actions andcommunications thereof with the network equipment of a DOC Network.

[0062] The GUI & Report Generating Engine 94 communicates with anAdministrator 106 of the network access manager 86, preferably through aweb server, whereby the Administrator 106 sets up and configures thenetwork access manager 86 and accesses reports generated by the networkaccess manager 86, such as graphs of bandwidth consumption and bandwidthrequested per time interval for a user. The Administrator 106 may be theCarrier, a service provider, or some other entity, such as the entitymanaging the Regional Data Center 50 or a third-party responsible formaintenance of the network access manager 86.

[0063] The Database Manager 90 stores configuration and setupinformation received from the GUI & Report Generating Engine 94, as wellas information processed by the Data Collector 88. The Database Manager90 also provides information to the Bandwidth Allocator 92 and GUI &Report Generating Engine 94 as requested via the CORBA infrastructure87.

[0064] Having now described in detail the structure of preferred DOCNetworks 78,80,82,84, preferred methods of the present invention will bedescribed with reference thereto.

[0065] In accordance with preferred methods of the present invention,network access usages of each user in the upstream and downstreamdirections are monitored through the Data Collector 88. Specifically,the Data Collector 88 issues queries to the CMTS and CMs to whichcounter values of logical data units (LDUs) are returned for the users.Preferably, counter values are returned for each user for the number ofbytes and the number of data packets that are transmitted in both theupstream and downstream direction, the number of bytes and the number ofdata packets that are dropped in both the upstream and downstreamdirection, the number of bytes and the number of packets that arerequested to be transmitted in the upstream direction, and the time forwhich the counter values are returned. Accordingly, as used herein thephrase “monitoring network access usage” is intended to refer to thecollection of data representative of at least one of: (i) the number ofLDUs that are transmitted in a particular direction across a sharedcommunications medium; (ii) the number of LDUs that are dropped intransmitting in a particular direction across a shared communicationsmedium; and (iii) the number of LDUs that are requested to betransmitted in a particular direction across a shared communicationsmedium.

[0066] In a DOCSIS compliant DOC Network, the information is collectedfrom the CMTS and CMs of a Cable Network via the simple networkmanagement protocol (SNMP). The counter values for bytes and datapackets that are transmitted and that are dropped in the upstreamdirection from each CM, and the number of bytes and data packets thatare requested to be transmitted in the upstream direction from each CM,are recorded by the CMTS in accordance with a management informationbase (MIB) of a DOCSIS compliant CMTS. Likewise, the counter values forbytes and data packets that are transmitted and that are dropped in thedownstream direction from the CMTS to a CM are recorded by the CM inaccordance with a MIB of a DOCSIS compliant CM. Both bytes and datapackets are monitored since each data packet may vary in the number ofbytes it contains.

[0067] The scheduling element 100 of the Data Collector 88 initiates thedata collection from each CMTS and from the CMs connected thereto,preferably at different predetermined time intervals. For example, thedata collection from a CMTS preferably occurs at five minute intervalsand data collection from the CMs connected thereto preferably occurs atthirty minute intervals. The data collection from the CMs preferably isless often than the data collection from the CMTS in order to minimizeconsumption of bandwidth across the Cable Network that otherwise wouldbe allocated to users.

[0068] When the counter values and time thereof are returned to the DataCollector 88, the Data Collector 88 calculates the change over time foreach counter value to arrive at the average rates of bytes and datapackets that are successfully transmitted, the average rates of bytesand data packets that are requested to be transmitted, and the averagerates of bytes and data packets that are dropped. The respective ratesand time intervals for the rates (as well as the counter values and timestamp data) are then communicated to the Database Manager 90, whichstores the information in a user statistics table (“stats”) for lateruse by the Bandwidth Allocator 92 and GUI & Report Generating Engine 94.

[0069] The Bandwidth Allocator 92, in turn, continually determines oversucceeding time intervals an allowance of network access—or bandwidth ina Cable Network—that may be consumed by each user. As used herein,“network access allowance” refers to a respective maximum level ofnetwork access that may be made available to the user for utilizationduring a particular time interval and, accordingly, it may or may notrepresent the level of network access actually utilized by the userduring such time interval.

[0070] The user bandwidth allowances are determined by equating the userbandwidth allowances to user allocations of bandwidth determined byallocating to the users the bandwidth that is available during aparticular time interval in accordance with a selected allocationpolicy. For example, with reference to FIG. 18, a selected allocationpolicy has resulted in the allocation of bandwidth to the users of theshared communications medium 1850 for a time interval extending fromt_(o) to (t_(o)+dt) wherein User 2 and User K each is allocated a singlebandwidth unit (b/w unit 3 and b/w unit X, respectively), while User 1and User 3 each is allocated two bandwidth units (b/w unit 1 and b/wunit 2 to User 1, and b/w unit 4 and b/w unit 5 to User 3). As shown inFIG. 19, in the next time interval extending from (t_(o)+dt) to(t_(o)+2dt), User 1, User 3, and User K each is allocated a singlebandwidth unit (b/w unit 1, b/w unit 5, and b/w unit X, respectively),while User 2 is allocated three bandwidth units (b/w unit 2, b/w unit 3,and b/w unit 4). The bandwidth units broadly represent network access tothe communication member 1800 that is shared between the users acrossthe shared communications medium 1850.

[0071] In accordance with the present invention, respective userbandwidth allowances for each time interval are equated with these userallocations, and no user receives more bandwidth in a time interval thanthat user's respective bandwidth allowance for that time interval. Thus,bandwidth allocations under the present invention represent limits onbandwidth that can be utilized (or consumed) by users during a timeinterval, and do not represent per se the amount of bandwidth thatactually will be utilized or consumed during the time interval.

[0072] In determining user bandwidth allowances in the preferredembodiments set forth herein, the Bandwidth Allocator 92 preferablyperforms three routines, including: the prediction of bandwidth of eachuser in a predetermined future interval of time (“First Routine”); theprioritization of users for allocation of bandwidth (“Second Routine”);and the determination of a respective bandwidth allocation as eachuser's bandwidth allowance for the future time interval (“ThirdRoutine”).

[0073] The First Routine preferably is performed utilizing statisticalanalysis of past bandwidth consumption of each user or, alternatively,past bandwidth requested for each user, and the forecasted bandwidthincludes the bandwidth expected to be consumed by each user or,alternatively, the bandwidth expected to be requested by each user. Anyfunction, method, or algorithm that generates an estimate of a futuresample based on previously encountered samples may be used and many arewell known in the art of statistical analysis as is evident from SPYROSMAKRIDAKIS ET AL., FORECASTING METHODS AND APPLICATIONS (3d. Ed. JohnWiley & Sons 1998), which is hereby incorporated by reference.

[0074] The preferred algorithm includes the combined use of anadaptive-response-rate single exponential smoothing function (ARRSESFunction) and a Holt-Winters' seasonal exponential smoothing function(HW Function). These two functions are utilized according to theforecast generation flowchart of FIG. 7. The input includes a list ofactive users and applicable time intervals for bandwidth allocation.

[0075] The First Routine 700 begins by identification (Step 702) of theusers of the Cable Network to which bandwidth is to be allocated in theThird Routine. Then, for each user, a bandwidth allowance for asucceeding time interval is predicted according to either the ARRSESFunction or HW Function by first determining (Step 704) whether the userpreviously has been assigned a forecast function. If not, then in Step706 the ARRSES Function is assigned to the user and the ARRSES Functionis used to generate and record the forecasted bandwidth for thesucceeding time interval.

[0076] On the other hand, if it is determined in Step 704 that aforecast function is assigned, but it is determined in Step 707 that theforecast function is not the HW Function, then a determination is made(Step 708) whether to check for a seasonal cycle of the user. Thisdetermination in Step 708 is made by checking the elapsed time since thelast seasonal check was made, with a seasonal check being made after apredetermined period of time elapses. If the determination in Step 708is affirmative, then a seasonal identifier algorithm is executed (Step710), in which an autocorrelation function and a seasonal identifierfunction are performed. The autocorrelation function is well known inthe art of statistical analysis, and is used to identify elements in atime series which are influential on a current observation of that sameseries. Based on the output of the autocorrelation function, theseasonal identifier function identifies possible seasonal cycles of thetime series by identifying local maxima of the results of theautocorrelation function.

[0077] Based on the results of the seasonal identifier function, adetermination is made (Step 712) whether an actual seasonal patternexists. If a seasonal pattern is not found, or if it is not yet time tocheck for a seasonal cycle, then a forecast is generated and recorded(Step 714) using the ARRSES Function. If a seasonal pattern is found,then the HW Function is assigned (Step 716) to the user, the HW Functionis initialized (Step 718), and the first forecast is generated andrecorded (Step 720) using the HW Function.

[0078] If it is determined in Step 707 that the current functionassigned to the user already is the HW Function, then the determinationis made (Step 722) whether the last forecasted bandwidth was acceptable.This determination is made by comparing whether the forecasted bandwidthwas within 10% of the actual bandwidth consumed or requested. If thisdetermination in Step 722 is negative, then the ARRSES Function isassigned to the user and the new forecast is generated and recorded inaccordance with the ARRSES Function (Step 706). If the last forecast isdetermined (Step 722) to have been acceptable, then a determination ismade (Step 724) whether the seasonal cycle has ended. If the seasonalcycle has ended, then the HW Function is reinitialized (Step 726), andthe first forecast of the next seasonal cycle is generated and recorded(Step 728) via the HW Function. If the seasonal cycle has not expired,then the next forecast is generated and recorded (Step 730) inaccordance with the HW Function.

[0079] Following each of Step 706, Step 714, Step 728, and Step 730, theBandwidth Allocator 92 determines (Step 732) whether the forecasting hasbeen completed for all users and, if not, then repeats (Step 738) aforecast loop for a remaining user. If it is determined in Step 732 thatall users have been evaluated, then the forecasts are communicated (Step736) to the Database Manager 90 and the forecasting routine ends.

[0080] A forecast of bandwidth for a user in a future time interval isgenerated in accordance with the ARRSES Function via the followingformulas:

F _(N+1) =F _(N)+α_(N)(B _(N) −F _(N))

α_(N+1) =|SE _(N) /SAE _(N)|

SE _(N+1) =SE _(N)+β(B _(N+1) −F _(N+1) −SE _(N))

SAE _(N)=β|(B _(N) −F _(N))|+(1−β)SAE _(N−1)

[0081] wherein,

[0082] F is the bandwidth that is expected to be consumed by a user fora time interval (or the bandwidth that is expected to be requested by auser);

[0083] B is the bandwidth that is actually consumed by a user for thetime interval (or the bandwidth that is actually requested by a user);

[0084] N is the present time interval;

[0085] N−1 is the previous (immediate past) time interval;

[0086] N+1 is the next (immediate future) time interval; and

[0087] β is a selected parameter affecting the responsiveness to changeof the ARRSES Function when the bandwidth of a user changes between timeintervals.

[0088] Bandwidth is predicted both for the 6 MHz channel in thedownstream direction as well as the 2 MHz channel in the upstreamdirection. Preferably each time interval is thirty minutes in length,but preferably may range from fifteen minutes to sixty minutes in lengthwhen bandwidth is forecast in the downstream direction. Preferably eachtime interval is five minutes in length, but preferably may range fromone minute to fifteen minutes in length when bandwidth is forecast inthe upstream direction.

[0089] The steps in generating a forecast in accordance with the ARRSESFunction are set forth in FIG. 8, and include the calculation (Step 802)of a forecast error, the calculation (Step 804) of a smoothed error, thecalculation (Step 806) of a smoothed absolute error, the calculation(Step 808) of alpha, and the calculation (Step 810) of the new forecast.

[0090] A forecast of bandwidth of a user for a future time interval isgenerated in accordance the HW Function via the following formulas:

L _(s)=1/s(Y ₁ +Y ₂ + . . . +Y)

b _(s)=1/s[(Y _(s+1) −Y ₁)/s+(Y _(s+2) −Y ₂)/s+ . . . +(Y_(2s) −Y_(s))/s]

S ₁ =Y ₁ /L _(s) , S ₂ =Y ₂ /L _(s) , . . . S _(s) =Y _(s) /L _(s)

L _(t)=α(Y _(t) /S _(t−s))+(1−α)(L _(t−1) +b _(t−1))

b _(t)=β(L _(t) −L _(t−1))+(1−β)b _(t−1)

S _(t) =γY _(t) /L _(t)+(1−γ)S_(t−s)

F _(t+m)=(L _(t) +b _(t) m)S _(t−s+m)

[0091] wherein,

[0092] L₁=an average level of bandwidth after time interval i,

[0093] b₁=the trend after time interval i,

[0094] s₁=the seasonal influence at time interval i,

[0095] s=length of seasonal cycle (in number of time intervals),

[0096] Y₁=monitored bandwidth consumed or requested in time interval i,

[0097] t=time of initialization,

[0098] m=the number of time intervals into the future for which aforecast is made, and

[0099] α, β, and γ are parameters of the forecast method whose valuesare determined by doing a grid search over the domain of possible valuesof these parameters in an attempt to minimize the mean-squared-error ofthe forecast method, each of α, β, and γ falling between 0 and 1.

[0100] The steps in generating a forecast in accordance with the HWFunction are set forth in FIG. 9, and include the initialization of theHW Function by determining L_(s), b_(s), and S₁, S₂, . . . , S_(s) inStep 902, if appropriate; the determination of the intermediate valuesof L_(t), b_(t), and S_(t) in Step 904; and the determination of theforecast in Step 906, all in accordance with the above formulas.

[0101] The Second Routine performed by the Bandwidth Allocator 92comprises the prioritizing of users for resolving competition betweenusers during the determination of bandwidth allocations in the ThirdRoutine. Prioritization is performed in accordance with one or more ofvarious possible prioritization policies. The prioritization policiesmay depend upon, for example, (i) each user's SLA, (ii) each user'sforecasted bandwidth, (iii) fairness considerations, or (iv) anycombination thereof.

[0102] SLAs that at least partially affect prioritization policiesinclude those that specify, for example: (i) a guaranteed minimum levelof bandwidth; (ii) a time-of-day (TOD) minimum level of bandwidth; or(iii) a guaranteed minimum level of bandwidth up to a maximum burstablelevel of bandwidth with target probability.

[0103] Under a SLA providing for a guaranteed minimum level ofbandwidth, a user will have a guaranteed minimum level of bandwidth foruse at all times. Accordingly, if the available bandwidth to such a userotherwise would fall below the minimum guaranteed level, then such auser is given priority over all other users whose guaranteed minimumlevels of bandwidth (if applicable) have been satisfied.

[0104] Similarly, under a SLA providing for a TOD minimum level ofbandwidth, a user will have a guaranteed minimum level of bandwidth fora particular TOD. If the available bandwidth to such a user otherwisewould fall below the minimum guaranteed level during the particular TOD,then such user is given priority over all other users whose guaranteedminimum levels of bandwidth (if applicable) have been satisfied.

[0105] Finally, under a SLA providing for a guaranteed minimum level ofbandwidth up to a maximum burstable level of bandwidth with targetprobability, a user will have a guaranteed minimum level of bandwidth atall times and, in addition thereto, probably will have additionalbandwidth up to a maximum level at any given time in accordance with thetarget probability. Accordingly, if the bandwidth available to such userotherwise would fall below the minimum guaranteed level, then the useris given priority over all other users whose guaranteed minimum levelsof bandwidth (if applicable) have been satisfied. The user also is givenpriority over such other users in allocating additional bandwidth asneeded up to the maximum level in accordance with the targetprobability.

[0106] Other SLA provisions not relating to guaranteed levels ofbandwidth also may affect a prioritization policy. Thus, for example,each user's SLA may specify a fee (in dollars per unit time per unitbandwidth) that is paid by the user based upon bandwidth consumption bythe user for a particular amount of time, and the fee may be differentas between users or different groups of users. Under thesecircumstances, prioritization may be determined so as to maximize feerevenues that are paid by the users.

[0107] Similarly, each user's SLA may specify a credit (in dollars perunit time per unit bandwidth) that is applied by the Carrier to theuser's account based upon a bandwidth shortfall to the user for aparticular amount of time when a guaranteed level of bandwidth availableto the user is not met. Moreover, the credit may be different as betweenusers or different groups of users. Under these circumstances,prioritization may be determined so as to minimize the collective creditpayments that a Carrier applies to user accounts.

[0108] An example of prioritization based upon the forecasted bandwidthof each user includes giving priority to a first user over all otherusers, each of whom have a forecasted bandwidth that is greater thanthat of the first user.

[0109] Prioritization may also be performed based on unilateral fairnessconsiderations, especially when user SLAs do not guarantee minimumlevels of bandwidth for individual users or when users otherwise wouldshare equally in priority. Thus, users may be prioritized based on, forexample: (i) the throughput of each of the users for a given timeinterval, with priority going to the user with the lesser throughput;(ii) data packets dropped over a given time interval, with prioritygoing to the user with the greater data loss; and (iii) throughputexperienced during a particular time of day or day of the week, withpriority going to the user with the lesser throughput for the particulartime of day or day of the week.

[0110] An example of fairness considerations that may be utilized indetermining priority is illustrated in FIG. 10, wherein user throughputfor a time interval is graphed against user data packets dropped in thetime interval for Users A and B. A target QoS standard for minimumthroughput and maximum packet loss rates are established by the Carrier,whereby in the illustrated example each user is prioritized based on theuser's absolute distance from the target QoS standard. Thus, under thispolicy, User A experiencing higher throughput rate and a lower packetloss rate, and thus having a shorter distance from the standard, isprioritized lower than User B having a lower throughput rate and higherdata loss rate.

[0111] The Third Routine performed by the Bandwidth Allocator 92 is thedetermination of bandwidth allocations to the users for the future timeinterval in accordance with one or more of various allocation policies.Examples of such allocation policies include: (i) the equal distributionof all available bandwidth to all users; (ii) the distribution of allavailable bandwidth to all users proportional to each user's respectiveforecasted bandwidth; (iii) the distribution of bandwidth to each userequal to the user's respective forecasted bandwidth, with any surplusbandwidth being distributed to the users either equally orproportionally based upon the user's respective forecasted bandwidth;and (iv) the initial distribution of bandwidth to each user based uponthe minimum of the user's guaranteed bandwidth or the forecastedbandwidth and, thereafter, incremental allocations of remainingbandwidth to all of the users.

[0112] Examples of alternate preferred methods of prioritizing users andallocating bandwidth by the Bandwidth Allocator 92 will now bedescribed, each of which utilizes one or more of the aforementionedprioritization and allocation policies. Such methods preferably areinitiated pursuant to the scheduling module 102 of the BandwidthAllocator 92, which may operate independently of the scheduling module100 of the Data Collector 88.

[0113] Accordingly, a first method 1100 of prioritizing users andallocating bandwidth (whether upstream or downstream) by the BandwidthAllocator 92 is illustrated in FIG. 11 and begins with the retrieval(Step 1102) of the forecasted bandwidth from the Database Manager 90 forall active users. Whether a user is active is determined by pastbandwidth consumption of the user (or, alternatively, requestedbandwidth for the user), as revealed by the user stats maintained by theDatabase Manager 90. All users are then prioritized (Step 1104) based oneach user's forecast in increasing order, whereby users having lesserforecasted bandwidths will be prioritized over users having largerforecasted bandwidths. The “surplus” is then set (Step 1106) to thetotal bandwidth available in the particular direction of communication,and the total bandwidth is then allocated (Step 1108) to each user in anamount equaling the forecasted bandwidth subject to a respective maximumbandwidth value. Preferably the respective maximum bandwidth value isdetermined either in the user's SLA or by the Carrier, Administrator106, or other entity. Allocation of bandwidth to a user additionally issubject to the actual availability of bandwidth following previousallocations thereof to users with equal or higher priority.

[0114] Following allocations to all users, any bandwidth determined(Step 1110) to be remaining is then allocated equally (Step 1112) to theusers subject to each user's respective maximum bandwidth value. Theresulting user allocations are then incorporated (Step 1114) into theDOC Network as the user bandwidth allowances, which incorporation isdescribed in detail below.

[0115] The method 1200 illustrated in FIG. 12 is the same as that ofFIG. 11, except that surplus bandwidth, if any, is allocated (Step 1202)proportional to the forecasted bandwidths of the users, again subject toeach user's respective maximum bandwidth value.

[0116] The preferred method 1300 illustrated in FIG. 13 does notprioritize the users for purposes of allocation but, instead, treats allusers equally. The method 1300 begins with the retrieval (Step 1302) ofthe forecasted bandwidth from the Database Manager 90 for all of theusers. The surplus is then set to the total bandwidth available in theparticular direction of communication, and the sum of all user'sforecasts is calculated (Step 1304). The available bandwidth then isallocated (Step 1306) to all users proportional to the user's forecastedbandwidth, again subject to each user's maximum bandwidth value. Theresulting user allocations then are incorporated into the DOC Network(Step 1308) as the user bandwidth allowances.

[0117] The preferred method 1400 illustrated in FIG. 14 seeks tomaximize revenues from fees (F) that are paid by users for bandwidthconsumption. The method 1400 begins with the retrieval (Step 1402) ofthe forecast for each user as well as a fee which each user pays forbandwidth. The users are then sorted (Step 1404) based on user fees indecreasing order, with the user paying the most for bandwidth receivingthe highest priority. Next, the surplus is set (Step 1406) to the totalbandwidth available in the particular direction of communication.Available bandwidth then is allocated (Step 1408) to the users fromhighest to lowest priority in an amount equal to the user's forecastedbandwidth, subject to the respective maximum bandwidth value for theuser.

[0118] Both preferred method 1500 of FIGS. 15a and 15 b, and preferredmethod 1600 of FIGS. 16a and 16 b differ from the other methods1100,1200,1300,1400 in that these two methods allocate bandwidth to theusers in multiple allocation rounds. Method 1500 begins in FIG. 15a withthe retrieval (Step 1502) of the forecasted bandwidths of the users aswell as a credit (C) that applies if a respective user does not receiveup to a guaranteed maximum level of bandwidth. The users are thenprioritized (Step 1504) based on each user's respective credit indecreasing order, with those users having higher credits being givenpriority over users with lesser credits. Next, the surplus is set (Step1506) to the total bandwidth available in the particular direction ofcommunication. Available bandwidth then is allocated (Step 1508) asavailable in a first round to the users from highest to lowest priority.The allocation in the first round is equal to the minimum of theforecasted bandwidth or the maximum bandwidth that is guaranteed,subject to the respective maximum bandwidth value for each user.

[0119] If any additional bandwidth is determined (Step 1510) to remainafter the first allocation round, then the surplus is set to theadditional bandwidth (Step 1514). Bandwidth then is allocated (Step1516) as available to each user in the same user order. Assumingsufficient bandwidth remains available, the allocation in the secondround brings the user's allocation up to the user's forecasted bandwidthsubject to the user's respective maximum bandwidth value. Following thesecond allocation round, a determination is made (Step 1518) whether anyremaining bandwidth exists and, if so, then the remaining bandwidth isallocated (Step 1522) equally to the users, subject to each user'srespective maximum bandwidth value. The resulting user allocations arethen incorporated (Step 1524) into the DOC Network as the user bandwidthallowances. If it is determined that no bandwidth remains available ineither of Step 1510 or Step 1518, then the user allocations arecompleted and are incorporated into DOC Network as the user bandwidthallowances in Steps 1512,1524, respectively.

[0120] Method 1600 of FIGS. 16a and 16 b differs from that of FIGS. 15aand 15 b only in that the sum of the forecasted bandwidths for all usersis calculated (Step 1602) and a determination is made (Step 1604)whether the sum exceeds the total bandwidth available to the users. Ifthe sum exceeds the total bandwidth that is available to the users, thenthe bandwidth is allocated (Step 1606) to each user in an amount equalto the forecasted bandwidth, subject to the user's maximum guaranteedbandwidth, and less an amount thereof proportional to the totalbandwidth shortfall. Thus, for example, if the sum of all forecastedbandwidths exceeds the total available bandwidth in an amount equal to20% of the sum of all forecasted bandwidths, then each user is allocatedbandwidth in an amount equal to the user's forecasted bandwidth (subjectto the user's maximum guaranteed bandwidth), then less 20% thereof.

[0121] The information including fees, credits, guaranteed bandwidths,and respective maximum bandwidth values in the aforementioned preferredmethods, is obtained from each user's SLA and/or is predetermined by theAdministrator 106, Carrier, or other entity. Moreover, this informationis retrieved by the Bandwidth Allocator 92 from the Database Manager 90,which includes and maintains a user SLA table as well as a user billingtable, as updated from time-to-time by the Administrator 106.Specifically, the information is configured and maintained through GUIsprovided as part of the GUI & Report Generating Engine 94, and ispreferably accessed by the Administrator 106 either directly orindirectly through the Internet 60. Alternatively, information isretrieved by the Bandwidth Allocator 92 from an external databasemaintained by the Administrator, Carrier, or other entity through anapplication program interface (API) incorporated into the externalsystem interface layer 98 of the Bandwidth Allocator 92. The use of anexternal database is preferred for the SLA and user billing tables, asit eliminates any duplicative maintenance of information otherwisemaintained by the Database Manager 90 which must be synchronized withthe external database, including periodic updating of user records in atimely fashion.

[0122] Regardless of the particular method or policies utilized by theBandwidth Allocator 92, once user allocations have been determined, therespective DOC Network is updated with the user allocations as userbandwidth allowances for a particular time interval. Each user thenutilizes bandwidth during the particular time interval in an amount thatis less than, or equal to, that user's bandwidth allowance. Preferably,the DOC Network is updated at periodic intervals of between one tofifteen minutes and, preferably every five minutes. Furthermore, theperiodic interval preferably corresponds to the scheduling of theBandwidth Allocator 92 with regard to upstream transmissions.

[0123] With particular reference to FIG. 17, a preferred method 1700 ofupdating a DOC Network for a DOCSIS 1.0 compliant Cable Network isillustrated. The DOC Network is updated by incorporating (Step 1702) theuser allocations as bandwidth allowances (i.e., bandwidth limits) intoCM configuration files (MD-5 files) for the CMs of the respective users.As set forth above, each CM configuration file contains instructions fora respective CM that limits the actual bandwidth consumed by the CM inthe upstream direction and in the downstream direction. The CMconfiguration files are then sent (Step 1704) by the Bandwidth Allocator92 to a Trivial File Transfer Protocol (TFTP) Server of the DOC Network,which maintains CM configuration files for the CMs of the Cable Network.A command is also sent (Step 1706) to either of the CMs or the CMTS ofthe respective Cable Network causing the CMs to acquire and implementthe CM configuration files maintained on the TFTP Server.

[0124] In addition to maintaining information regarding SLAs and userbilling data in the Database Manager 90, the GUI & Report GeneratingEngine 94 further enables the Administrator 106 to analyze the userstats updated by the Data Collector 88, including the generation ofreports and graphs regarding, for example, network access usage of theusers over time as well as user throughput rates vs. data loss ratessimilar to that shown in FIG. 10.

[0125] As now will readily be seen, the preferred methods and networksof the present invention described in detail above enable a Carrier toaccommodate differing demands for instantaneous throughput by userscompeting for access across a shared communications medium. Indeed,Carriers now are able to continuously vary bandwidth consumption limitsfor each user between time intervals, either in accordance with fairnessconsiderations, forecasted network access usage of the users, or underprovisions governing network access agreed upon between users and theCarriers.

[0126] Additionally, it will now be evident that the present inventiongives rise to new business models that may be implemented by Carriersfor providing network access to users and, in particular, to new ways ofconstructing SLAs, which is also considered part of the presentinvention.

[0127] For example, Carriers now can offer a guaranteed minimum level ofnetwork access to a user that is constant throughout the day or week, ora guaranteed minimum level of network access that varies depending uponconsiderations such as the time of day or the day of week. Carriers alsonow can offer a guaranteed minimum level of network access with aguaranteed maximum level of network access provided as needed inaccordance with a target probability. Furthermore, not only do thesecustomizable SLAs provide users with greater options for improvingperformance levels of applications and services that utilize the SharedAccess Carrier Networks, but they further enable Carriers todifferentiate between users in charging for network access, therebyallowing Carriers to differentiate revenue streams for maximization ofrevenues.

[0128] The present invention also enables Carriers to offer “dynamicSLAs” to users. The term “dynamic SLA” refers to a SLA that can bemodified by a user as the user's demand for network access significantlychanges, whether such modification is permanent or temporary. In thisregard, and in accordance with a preferred method 2000 of the presentinvention as illustrated in FIG. 20, a Carrier monitors (Step 2002)network access usage by users of a Shared Access Carrier Network anddetermines (Step 2004), for each user based on network access usage,whether a SLA provision other than those found in the user's current SLAwould better meet the user's needs. This determination is made bycomparing the user's throughput, bandwidth consumption, and/or bandwidthrequested for a predetermined period of time against a set of thresholdvalues, including any guaranteed level of network access provided for inthe user's SLA as well as any minimum QoS standard that are deemednecessary for user satisfaction by the Administrator 106, Carrier, orother entity. Thus, if the user's level of throughput, bandwidthconsumption, and/or bandwidth requested for the predetermined timeinterval differs by a predetermined tolerance from a respective minimumthreshold value, then the user is identified (Step 2006) as a“candidate” for modifying the SLA. A similar process alternatively isused, wherein the user's forecasted bandwidth is compared to thethreshold values and, if the difference exceeds a predeterminedtolerance, then the user is deemed a candidate for modifying the user'sSLA.

[0129] Once users have been identified as candidates, the candidates arefiltered by screening (Step 2008) the candidates against a list of usersfor which solicitations are not to be made. Those candidates passing thescreening are then invited (Step 2010) to modify their respective SLAs.The solicitation of the user preferably is performed via email, instantmessaging, redirection of the user's web browser to a solicitation webpage, generation and mailing of solicitation literature via U.S. mail,telemarketing, or other means of communication. The solicitationincludes an invitation for the user to modify the user's SLA byincreasing for a fee the minimum level of network access guaranteed tothe user. The solicitation preferably also includes an invitation tomake the modification permanent, or to make the modification onlytemporary and for a specific period of time.

[0130] Thus, for example, if a user is identified as having a high usagepattern at recurrent periods of time (such as every Saturday night whena particular webcast is viewed, or when an Internet game is played),then the user automatically is solicited with an invitation via instantmessaging on the following Saturday night to increase the user'sguaranteed network access for that night, for a predetermined number offollowing Saturday nights, and/or for every Saturday night.

[0131] Acceptance of the invitation by each user results in themodification (Step 2012) of the user's SLA for the appropriate period oftime by increasing the level of network access the user is guaranteed(and/or the user's respective maximum bandwidth value, depending uponthe policies used). The solicited modification to the user's SLA isupdated in the SLA database, which is then used during userprioritization and allocation of bandwidth by the Bandwidth Allocator92. The resulting higher bandwidth allowance should enhance the user'sexperience and overall satisfaction with the Carrier Network. Inparticular, the higher bandwidth (greater network access) should enhancethe viewing of the webcast or the playing of the Internet game.

[0132] On the other hand, SLAs for which users decline solicitations arenot modified. Furthermore, if deemed appropriate, users declining asolicitation are recorded in the list against which candidates arescreened.

[0133] Preferably, the Bandwidth Allocator 92 analyzes the user statsmaintained by the Database Manager 90, identifies those users that arecandidates for SLA modification, and initiates the solicitation of suchcandidates. Information for each user's SLA for comparison with theuser's stats automatically is obtained either from the Database Manager90, or from an external database maintained by the Administrator 106,Carrier, or other entity. Furthermore, the Bandwidth Allocator 92preferably performs this analysis for solicitation on a regularlyscheduled basis.

[0134] In addition to such solicitations, a user of course may request achange in the level of network access guaranteed without having to firstreceive a solicitation. Furthermore, the user may request that thechange be for a temporary period of time such that, for example, thechange is reversed after only a few hours, which would cover a viewingof a particular webcast or the playing of a particular Internet gamebeginning at the time of the request.

[0135] In view of the foregoing detailed description of the preferredembodiments and methods of the present invention, it readily will beunderstood by those persons skilled in the art that the presentinvention is susceptible of broad utility and application. Manyembodiments and adaptations of the present invention other than thoseherein described, as well as many variations, modifications, andequivalent arrangements, will be apparent from or reasonably suggestedby the present invention and the foregoing description thereof, withoutdeparting from the substance or scope of the present invention.Accordingly, while the present invention has been described herein indetail in relation to preferred embodiments, it is to be understood thatthis disclosure only is illustrative and exemplary of the presentinvention and is made merely for purposes of providing a full andenabling disclosure of the invention. The foregoing disclosure is notintended nor is to be construed to limit the present invention orotherwise to exclude any such other embodiments, adaptations,variations, modifications and equivalent arrangements, the presentinvention being limited only by the claims appended hereto and theequivalents thereof.

[0136] Thus, for example, it will be apparent that, while preferredembodiments of the present invention have been described in the contextof DOC Networks (including either a network of all coaxial cable, or aHFC network), the present invention nevertheless relates to any othernetwork (whether wireline or wireless) wherein competing users shareaccess across a shared communications medium including, for example,home networks and small networks in mass transit vehicles.

What is claimed is:
 1. A method of providing network access across ashared communications medium between competing users pursuant to servicelevel agreements (SLAs) of the users, comprising the steps of: (a)monitoring network access usage by each user during a time interval; (b)comparing said monitored network access usage by each user with apredetermined threshold value; and (c) soliciting a user to modify theuser's SLA if the user's monitored network access usage varies from thepredetermined value by a predetermined tolerance.
 2. The method of claim1, wherein the threshold value represents a respective maximum level ofnetwork access for each user.
 3. The method of claim 1, wherein thethreshold value represents a respective maximum burstable level ofnetwork access with target probability for each user.
 4. The method ofclaim 1, wherein said step of soliciting a user comprises contacting theuser via email.
 5. The method of claim 1, wherein said step ofsoliciting a user comprises contacting the user via instant messaging.6. The method of claim 1, wherein said step of soliciting a usercomprises contacting the user via redirection of a web browser of theuser to a solicitation web page.
 7. The method of claim 1, wherein saidstep of soliciting a user comprises contacting the user via generationand mailing of literature.
 8. The method of claim 1, wherein said stepof soliciting a user comprises contacting the user via a telephoniccommunication.
 9. The method of claim 1, wherein the modification of theuser's SLA includes guaranteeing a level of network access to the useron a permanent basis.
 10. The method of claim 1, wherein themodification of the user's SLA includes guaranteeing a level of networkaccess to the user with a maximum burstable level of network access withtarget probability.
 11. The method of claim 1, further comprisingcharging the user a fee for the modification of the SLA.
 12. The methodof claim 1, wherein the modification of the user's SLA includesguaranteeing a level of network access to the user on a temporary basis.13. The method of claim 1, wherein network access comprises bandwidthacross the shared communications medium for consumption by each user inconveying data of the user.
 14. The method of claim 1, wherein said stepof monitoring comprises monitoring the bandwidth that is consumed byeach user in an upstream direction of communication across the sharedcommunications medium at time intervals of one minute to fifteenminutes.
 15. The method of claim 1, wherein said step of monitoringcomprises monitoring the bandwidth that is consumed by each user in adownstream direction of communication across the shared communicationsmedium at time intervals of fifteen minutes to sixty minutes.
 16. Themethod of claim 1, wherein said step of monitoring network accessincludes collecting data representative of the number of logical dataunits transmitted from and to each user during a time interval.
 17. Themethod of claim 1, wherein said step of monitoring network access usageincludes collecting data representative of the number of bytes and datapackets transmitted from and to each user during a time interval. 18.The method of claim 1, wherein said step of monitoring network accessusage includes collecting data representative of the number of logicaldata units of the user that are dropped during a time interval.
 19. Themethod of claim 1, wherein said step of monitoring network access usageincludes collecting data representative of the number of bytes and datapackets of the user that are dropped during a time interval.
 20. Themethod of claim 1, wherein said step of monitoring network access usageincludes collecting data representative of the number of logical dataunits of the user that are requested to be transmitted in the upstreamdirection during a time interval.
 21. The method of claim 1, wherein theshared communications medium is part of a Shared Access Carrier Network.22. The method of claim 21, wherein the Shared Access Carrier Networkcomprises a Cable Network and the shared communications medium comprisesa coaxial cable.
 23. The method of claim 21, wherein the Shared AccessCarrier Network comprises a wireless network.
 24. The method of claim 1,further comprising, based on said monitored network access usage,allocating network access to each user for a future time interval. 25.The method of claim 24, wherein said step of allocating network accesscomprises allocating network access equally to the users.
 26. The methodof claim 24, further comprising prioritizing the users for allocatingnetwork access.
 27. The method of claim 26, wherein said step ofprioritizing is based on the SLAs of the users, wherein the SLAs specifyrespective minimum levels of network access for the users, and said stepof prioritizing includes comparing said monitored network access usagesfor the users with the specified respective minimum levels of networkaccess, and awarding priority to a user when said respective monitorednetwork access usage for such user falls below the user's specifiedrespective minimum level of network access.
 28. The method of claim 26,wherein said step of prioritizing is based on the SLAs of the users,wherein the SLAs specify respective time-of-day (TOD) minimum levels ofnetwork access for users, and said step of prioritizing includescomparing said monitored network access usages for such users during thespecified respective TOD with the specified respective TOD minimumlevels of network access, and awarding priority to a user when saidmonitored network access usage during the specified respective TOD forsuch user falls below the user's specified respective TOD minimum levelof network access.
 29. The method of claim 26, wherein said step ofprioritizing is based on the SLAs of the users, wherein the SLAs specifyrespective minimum levels of network access up to a maximum burstablelevels with target probability for users, and said step of prioritizingincludes comparing said monitored network access usage both with therespective minimum levels of network access for such users and with therespective maximum burstable levels of network access for such users,and comparing the instances the respective maximum levels of networkaccess were obtained for such users out of all instances the respectivemaximum levels of network access were requested for such users.
 30. Themethod of claim 26, wherein said step of prioritizing is based on theSLAs of the users, wherein the SLAs provide a respective fee for networkaccess usage by users, and said step of prioritizing comprises sortingsuch users based on each user's respective fee in decreasing order, witha user with a higher fee receiving priority over a user with a lesserfee.
 31. The method of claim 26, wherein said step of prioritizing isbased on the SLAs of the users, wherein the SLAs provide respectivecredits for levels of network access below respective guaranteed levelsfor users, and said step of prioritizing comprises sorting such usersbased on each user's respective credit in decreasing order, with a userwith a higher credit receiving priority over a user with a lower credit.32. The method of claim 26, wherein said step of prioritizing is basedon the SLAs of the users, wherein the SLAs specify respective minimumlevels of network access for users, and said step of allocating networkaccess comprises allocating network access to such users equal to eachuser's specified respective minimum level of network access.
 33. Themethod of claim 26, wherein said prioritizing is based on fairnessconsiderations.
 34. The method of claim 33, wherein the users areprioritized based on user throughput during a time interval, with a userwith lesser throughput rate receiving priority over a user with greaterthroughput rate.
 35. The method of claim 33, wherein the users areprioritized based on data loss for each user during a time interval,with a user with greater data loss rate having priority over a user withlesser data loss rate.
 36. The method of claim 33, wherein the users areprioritized based on network access usage for a particular time of day,with a user with lesser network access usage for the particular time ofday receiving priority over a user with greater network access usage forthe particular time of day.
 37. The method of claim 33, wherein theusers are prioritized based on both user throughput and data loss duringa time interval.
 38. The method of claim 33, wherein users areprioritized based on an established minimum quality of service (QoS)standard.
 39. The method of claim 24, further comprising the step offorecasting network access usage by each user during the future timeinterval based on said step of monitoring network access usage by eachuser.
 40. The method of claim 39, wherein said step of forecastingcomprises predicting future network access usage of each user based uponmonitored past network access usage patterns of each user.
 41. Themethod of claim 39, wherein said step of forecasting comprises applyingan adaptive-response-rate signal exponential smoothing function and aHolt-Winters' seasonal exponential smoothing function to said monitorednetwork access usages of the users.
 42. The method of claim 39, whereinsaid step of allocating comprises allocating network access to the usersproportionally based on each user's forecasted network access usage. 43.The method of claim 39, further comprising the step of prioritizing theusers for allocating network access.
 44. The method of claim 43, whereinsaid prioritizing is based on each user's forecasted network accessusage.
 45. The method of claim 43, wherein said users are prioritized inincreasing order of each user's forecasted network access usage, with auser with a lesser forecasted network access usage receiving priorityover a user with a greater forecasted network access usage.
 46. Themethod of claim 43, wherein said step of allocating comprises allocatingnetwork access to the users equal to each user's forecasted networkaccess usage, and then allocating any remaining network access equallyto the users.
 47. The method of claim 43, wherein said step ofallocating network access comprises allocating network access to theusers equal to each user's forecasted network access usage, and thenallocating any remaining network access to the users proportionallybased on each user's forecasted network access usage.
 48. A method ofproviding network access across a shared communications medium betweencompeting users pursuant to service level agreements (SLAs) of theusers, comprising the steps of: (a) monitoring network access usage byeach user for respective predetermined past time intervals; (b)identifying a recurrent period of high network access usage of a userbased on said monitoring; and (c) soliciting a user to modify the user'sSLA to guarantee a minimum level of network access during an anticipatedfuture recurrent period of high network access usage.
 49. The method ofclaim 48, wherein said step of soliciting a user comprises contactingthe user via email.
 50. The method of claim 48, wherein said step ofsoliciting a user comprises contacting the user via instant messaging.51. The method of claim 48, wherein said step of soliciting a usercomprises contacting the user via redirection of a web browser of theuser to a solicitation web page.
 52. The method of claim 48, whereinsaid step of soliciting a user comprises contacting the user viageneration and mailing of literature.
 53. The method of claim 48,wherein said step of soliciting a user comprises contacting the user viaa telephonic communication.
 54. The method of claim 48, wherein themodification of the user's SLA includes guaranteeing a minimum level ofnetwork access to the user for all future recurrent periods of highnetwork access usage.
 55. The method of claim 55, wherein themodification of the user's SLA includes guaranteeing a minimum level ofnetwork access to the user for a predetermined number of futurerecurrent periods of high network access usage.
 56. The method of claim48, wherein the modification of the user's SLA includes guaranteeing aminimum level of network access to the user with a maximum burstablelevel of network access with target probability for the future period ofhigh network access usage.
 57. The method of claim 48, wherein therecurrent time period of high network access usage comprises aparticular time of day.
 58. The method of claim 48, further comprisingcharging the user a fee for modification of the user's SLA.