Methods, systems, and devices for bandwidth conservation

ABSTRACT

Methods, systems, and devices are disclosed for conserving bandwidth. If a presence of a multimedia device is detected, then a stream of data is delivered to the multimedia device. If the presence of the multimedia device is not detected, then the stream of data is degraded to conserve bandwidth.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims benefit of U.S. Provisional Patent Application 60/667,018, filed Mar. 31, 2005 and entitled “Methods and Systems For Providing Video/Television Services Over A Digital Subscriber Line.” This application is also concurrently filed, and incorporates by reference, Ser. No. 11/304,264 entitled “METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR PROVIDING TRAFFIC CONTROL SERVICES” and Ser. No. 11/300,125 entitled “PRESENCE DETECTION IN A BANDWIDTH MANAGEMENT SYSTEM.”

NOTICE OF COPYRIGHT PROTECTION

A portion of the disclosure of this patent document and its figures contain material subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure, but otherwise reserves all copyrights whatsoever.

BACKGROUND

This application generally relates to interactive multimedia distribution systems and, more particularly, to presence detection and degradation in such systems.

Bandwidth is becoming a problem in the communications industry. As subscribers demand more and more content, higher definition services, interactive services, and data services, the existing network infrastructure has trouble supplying adequate bandwidth. The industry is hard at work identifying new ways of increasing bandwidth. The industry is also striving to reduce wasted bandwidth.

An “always on” set-top box is one example of wasted bandwidth. An “always on” set-top box continually receives content, even while no one is watching television. When the set-top box remains powered “on” and tuned to a channel, the set-top box consumes bandwidth. Often times, however, that channel is not watched and bandwidth is wasted. Many cable subscribers, for example, forget to, or are unable to, turn “off” their set-top box. Many subscribers power “off” the television, yet the set-top box remains powered “on” and receiving content. It's not uncommon for a set-top box to continually receive a video stream while the subscriber sleeps for hours and/or vacations for days. No one is watching the content, yet the set-top box is consuming three megabits or more per second of network bandwidth. This consumption may not be a significant problem in a broadcast network (such as a cable network). In a more focused delivery of content (such as in a multicast or unicast network), however, this consumption reduces the efficiency of the network. This consumption is not only a concern in shared networks (such as a broadband communications networks), but this consumption is also a concern for the subscriber's residential network. As digital content becomes more prevalent, the subscriber will maintain a residential network in their home, and bandwidth usage is important for efficient utilization of this residential network. Because both broadband communications networks and subscribers' residential networks need to efficiently utilize bandwidth, there is a need in the art for reducing bandwidth consumption while still preserving session connections.

SUMMARY

The aforementioned problems, and other problems, are reduced, according to exemplary embodiments, by methods, systems, and devices that conserve bandwidth in communications networks. These exemplary embodiments describe how a multimedia service provider can reduce the occurrences of wasted bandwidth while still maintaining a session connection. These exemplary embodiments minimize bandwidth consumption of an established session by detecting the presence of a multimedia device. If the multimedia device is present, then the exemplary embodiments deliver a stream of data to that multimedia device, and a bit rate of the stream of data is appropriate to the needs of the multimedia device. If, however, the multimedia device is not present, then there is little or no need for a full-resolution feed to the multimedia device. The exemplary embodiments, instead, degrade the stream of data to conserve bandwidth in the network. The degraded stream of data still preserves an established data session, yet the degraded stream of data has a reduced bit rate to reduce bandwidth consumption. When the multimedia device is again detected and present, then the exemplary embodiments restore the stream of data to its full-resolution data rate. The bit rate of the data stream, therefore, can be appropriate to the needs of the consuming device.

The exemplary embodiments conserve bandwidth. If the presence of a multimedia device is detected, then a stream of data may be delivered to that multimedia device. If, however, the presence of the multimedia device is not detected, then the stream of data may be degraded to conserve bandwidth.

The exemplary embodiments also include a device that conserves bandwidth. The device comprises a processor communicating with means for detecting presence of a multimedia device. The processor commands delivery of a stream of data to the multimedia device. If the presence of the multimedia device is not detected, then the processor degrades the stream of data to conserve bandwidth.

The exemplary embodiments also include a computer program product for conserving bandwidth. The computer program product comprises a computer-readable medium and a presence detection application stored on the computer-readable medium. The presence detection application comprises computer code for performing the steps: i) if a presence of a multimedia device is detected, then delivering a stream of data to the multimedia device; and ii) if the presence of the multimedia device is not detected, then degrading the stream of data to conserve bandwidth.

Other systems, methods, and/or devices according to the exemplary embodiments will be or become apparent to one with skill in the art upon review of the following drawings and detailed description. It is intended that all such additional systems, methods, and/or devices be included within this description, be within the scope of the exemplary embodiments, and be protected by the accompanying claims.

BRIEF DESCRIPTION OF THE DRAWINGS

These and other features, aspects, and advantages of the exemplary embodiments are better understood when the following Detailed Description is read with reference to the accompanying drawings, wherein:

FIG. 1 is a simplified schematic illustrating an operating environment according to exemplary embodiments;

FIGS. 2-6 are schematics illustrating presence detection, degradation, and restoration according to exemplary embodiments;

FIG. 7 is a schematic illustrating a degradation profile, according to exemplary embodiments;

FIG. 8 is a schematic illustrating the presence detection application operating in a local area network (LAN), according to more exemplary embodiments;

FIG. 9 is a schematic illustrating the presence detection application operating in a wide area network (WAN), according to more exemplary embodiments;

FIGS. 10 and 11 are schematics illustrating the presence detection application operating in a broadband remote access server (BRAS), according to more exemplary embodiments;

FIG. 12 is a block diagram of exemplary details of the electrical device shown in FIGS. 1-11;

FIG. 13 is a schematic illustrating various types of electronic devices, according to exemplary embodiments;

FIG. 14 is a schematic illustrating various types of multimedia devices, according to exemplary embodiments;

FIGS. 15-17 are schematics further illustrating the electronic device storing the presence detection application, according to exemplary embodiments;

FIG. 18 is a schematic further illustrating the electronic device, according to exemplary embodiments; and

FIG. 19 is a flowchart illustrating a method of conserving bandwidth, according to exemplary embodiments.

DETAILED DESCRIPTION

The exemplary embodiments now will be described more fully hereinafter with reference to the accompanying drawings. The reader should recognize, however, that the exemplary embodiments may be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. These embodiments are provided so that this disclosure will be thorough and complete and will fully convey the scope of the exemplary embodiments. Moreover, all statements herein reciting exemplary embodiments, as well as specific examples thereof, are intended to encompass both structural and functional equivalents thereof. Additionally, it is intended that such equivalents include both currently known equivalents as well as equivalents developed in the future (i.e., any elements developed that perform the same function, regardless of structure).

Thus, for example, it will be appreciated by those of ordinary skill in the art that the diagrams, schematics, illustrations, and the like represent conceptual views or processes illustrating systems and methods of the exemplary embodiments. The functions of the various elements shown in the figures may be provided through the use of dedicated hardware as well as hardware capable of executing associated software. Similarly, any switches shown in the figures are conceptual only. Their function may be carried out through the operation of program logic, through dedicated logic, through the interaction of program control and dedicated logic, or even manually, the particular technique being selectable by the entity implementing the exemplary embodiments. Those of ordinary skill in the art further understand that the exemplary hardware, software, processes, methods, and/or operating systems described herein are for illustrative purposes and, thus, are not intended to be limited to any particular named manufacturer.

The exemplary embodiments describe methods, systems, and devices that conserve bandwidth in a communications network. The exemplary embodiments may also be applied to conserving bandwidth in a local-area network (LAN) and in a wide-area network (WAN). These exemplary embodiments describe how a multimedia service provider can reduce the occurrences of wasted bandwidth. The exemplary embodiments detect the presence of a multimedia device receiving a stream of data. If the multimedia device is present, then the exemplary embodiments deliver a full-resolution version of the stream of data to that multimedia device. If, however, the multimedia device is not present, then there is little or no need for a full-resolution feed to the multimedia device. The exemplary embodiments, instead, degrade the stream of data to conserve bandwidth in the network. When the multimedia device is again detected and present, then the exemplary embodiments restore the stream of data to its full-resolution data rate.

FIG. 1 is a simplified schematic illustrating an operating environment according to exemplary embodiments. FIG. 1 shows an electronic device 10 receiving a stream 12 of data via a communications network 14. The electronic device 10 can be any device, such as a set-top box, a television, or an integrated television and set-top box. The electronic device 10 may also be an analog/digital recorder, CD/DVD player/recorder, audio equipment, receiver, tuner, and/or any other consumer electronic device. The electronic device 10 may also include any computer, peripheral device, camera, modem, storage device, telephone, personal digital assistant, and/or mobile phone. The stream 12 of data may be any RF and/or digital content, such as television/cable programming, mpg streams, or any other content. The communications network 14 may be a cable network operating in the radio-frequency domain and/or the Internet Protocol (IP) domain. The communications network 14, however, may also include a distributed computing network, such as the Internet (sometimes alternatively known as the “World Wide Web”), an intranet, a local-area network (LAN), and/or a wide-area network (WAN). The communications network 14 may include coaxial cables, copper wires, fiber optic lines, and/or hybrid-coaxial lines. The communications network 14 may even include wireless portions utilizing any portion of the electromagnetic spectrum and any signaling standard (such as the IEEE 802 family of standards).

As FIG. 1 shows, the electronic device 10 also detects or monitors the presence of a multimedia device 16. A presence detection application 18 is a computer program that monitors the presence of the multimedia device 16. The presence detection application 18 stores in memory 20 of the electronic device 10 and monitors or detects when the multimedia device 16 is present, or communicating with, the electronic device 10. If the multimedia device 16 receives electrical power 22 from the electronic device 10, then the presence detection application 18 may monitor a state of the multimedia device 16, such as an electrically-powered “on” or “off” state. The presence detection application 18, for example, may measure electrical power consumption of the multimedia device 16. If the electronic device 10 delivers a video output signal 24 to the multimedia device 16, then the presence detection application 18 may measure an impedance change in the video output signal 24. The presence detection application 18 may alternatively or additionally monitor a communication link 26 between the electronic device 10 and the multimedia device 16. If the presence detection application 18 detects a successful communication between the electronic device 10 and the multimedia device 16, then the multimedia device 16 may be present. The presence detection application 18 may additionally or alternatively measure any current, voltage, resistance, electromagnetic field, or frequency to determine the presence of the multimedia device 16. Because presence detection is known to those of ordinary skill in the art, presence detection will not be further described. If the reader desires a more detailed explanation of presence detection, the reader is directed to the following sources: U.S. Pat. No. 4,903,130 to Kitagawa et al. (Feb. 20, 1990); U.S. Pat. No. 5,255,180 to Shinoda et al. (Oct. 19, 1993); U.S. Pat. No. 5,313,282 to Hayashi (May 17, 1994); U.S. Pat. No. 5,331,354 to Koyama et al. (Jul. 19, 1994); U.S. Pat. No. 5,731,764 to Tanaka (Mar. 24, 1998); U.S. Pat. No. 6,078,589 to Kuechler (Jun. 20, 2000); U.S. Pat. No. 6,591,423 to Campbell (Jun. 8, 2003); U.S. Pat. No. 6,870,463 to Dresti et al. (Mar. 22, 2005); and published U.S. Patent Application 2004/0268407 to Sparrell et al. (Dec. 30, 2004), with each incorporated herein by reference in their entirety.

The multimedia device 16 may itself be any electronic device. The electronic device 10 and the multimedia device 16 may have a master-slave relationship, a peripheral relationship, or a component relationship. The multimedia device 16 may itself be a set-top box, a television, or an integrated television and set-top box. The multimedia device 16 may also be an analog/digital recorder, CD/DVD player/recorder, audio equipment, receiver, tuner, and/or any other consumer electronic device. The multimedia device 16 may also include any computer, peripheral device, camera, modem, storage device, telephone, personal digital assistant, and/or mobile phone.

The presence detection application 18 helps conserve bandwidth. The presence detection application 18 determines when high bandwidth need not be allocated to the electronic device 10 and/or to the multimedia device 16. If the presence detection application 18 cannot detect the presence of the multimedia device 16, then there is no need to communicate a high-bandwidth stream 12 of data from the communications network 14. As the following paragraphs will explain, when the presence of the multimedia device 16 cannot be detected, the presence detection application 18 causes degradation in the stream 12 of data. The presence detection application 18 sends a degradation message 26 to a server 28. The stream 12 of data is sent by the server 28, and the degradation message 26 instructs a corresponding component of the presence detection application 18 to degrade the stream 12 of data. Because the stream 12 of data is degraded, bandwidth is conserved. When the presence of the multimedia device 16 is subsequently detected, then the presence detection application 18 causes a restoration in the data rate (e.g., bytes per second) of stream 12 of data. The presence detection application 18 sends a restoration message 30 to the server 28, and the restoration message 30 instructs the server 28 to restore the data rate of the stream 12 of data.

FIGS. 2-6 provide an example. FIGS. 2-6 are schematics illustrating presence detection, degradation, and restoration according to exemplary embodiments. FIG. 2 shows the electronic device 10 receiving the stream 12 of data via the communications network 14. Although the electronic device 10 may be any device, here the electronic device 10 is shown as a set-top box 30. FIG. 2 also shows the set-top box 30 interfacing with the multimedia device 16. Although the multimedia device 16 may also be any device, the multimedia device 16 is shown as a television 32. The presence detection application 18, in this example, measures the electrical power consumed by the television 32, as illustrated by the power cord 22. Because the measured electrical power indicates the television 32 is present, the presence detection application 18 makes no change in the data rate of the stream 12 of data. The presence detection application 18, operating in the server 28, delivers the stream 12 of data at its full resolution, whatever that full resolution may be.

FIG. 3, however, illustrates transmission of the degradation message 26. When the monitored electrical power of the television 32 falls below some threshold value, this reduced power consumption indicates the television 32 is not present. Suppose, for example, the television 32 is not powered “on” or, as FIG. 3 illustrates, the power cord 22 is unplugged from an auxiliary outlet on the set-top box 30. The presence detection application 18 (operating in the set-top box 30) notices that the consumed electrical power has dropped below the threshold value, indicating the television 32 is no longer present. Because the television is not present, there is no need to send a full-resolution version of the stream 12 of data.

The presence detection application 18, operating in the set-top box 30, sends the degradation message 26 to the server 28. The presence detection application 18 sends the degradation message 26 to the server 28 via the communications network 14. The degradation message 26 instructs the corresponding server-based component of the presence detection application 18 to degrade the stream 12 of data.

FIG. 4 is a schematic illustrating transmission of a degraded stream 40 of data, according to exemplary embodiments. The presence detection application 18, operating in the server 28, receives the degradation message 26. The degradation message 26 instructs the corresponding server-based presence detection application 18 to degrade the stream of data (shown as reference numeral 12 in FIGS. 1-3). As FIG. 4 illustrates, a degraded stream 40 of data is then processed and sent from the server 28 and to the set-top box 30. The degraded stream 40 of data has a reduced data rate measured in bytes per second. Because the degraded stream 40 of data has a reduced data rate, the bandwidth allocated to the set-top box 30 may be reduced and reallocated to other uses within the communications network 14.

FIG. 5 shows a table illustrating the degraded stream 40 of data, according to exemplary embodiments. The degraded stream 40 of data includes the original audio and video components of the full-resolution stream of data (shown as reference numeral 12 in FIGS. 1-3), but the presence detection application 18 commands or produces degradation of either or both portions to conserve bandwidth. As FIG. 5 illustrates, a first degradation option 42 degrades a video portion 44, but an audio portion 46 is not degraded. The first degradation option may result in a smaller picture and/or a black-and-white picture, but with full-resolution sound quality. A second degradation option 48 degrades both the video portion 44 and the audio portion 46. The second degradation option 48 may result in a similar picture quality to the first degradation option 42, but the sound quality may be degraded to monophonic or less. A third degradation option 50 degrades the video portion 44 and discards the audio portion 46, producing a silent version of a degraded picture. A fourth degradation option 52 discards the video portion 44 and delivers only the audio portion 46. The fourth degradation option 52 may conserve the most bandwidth, producing an audio-only version of the original stream of data (shown as reference numeral 12 in FIGS. 1-3). A fifth degradation option (not shown) could discard or degrade the audio portion and deliver only the full-resolution video portion. Although this fifth option is possible, it conserves the least bandwidth. Because the audio portion 46 is relatively small when compared to the video portion 44, delivering only the full-resolution video portion would not appreciably conserve bandwidth. These various modes may be appropriate when one device serves multiple devices, e.g., a television and a sound system. Some of these multiple devices maintain the session but do not require a full-bandwidth session.

Because the fourth degradation option 52 may conserve the most bandwidth, the fourth degradation option 52 is a default. That is, unless the presence detection application 18 is otherwise configured, the presence detection application 18 automatically discards the video portion 44 and delivers only the audio portion 46. When the presence detection application 18 no longer detects presence of the television 32, the presence detection application 18 degrades data rates to conserve bandwidth. The set-top box 30 thus receives an audio-only version of the original stream of data (shown as reference numeral 12 in FIGS. 1-3). The audio portion 46 may be full resolution, or the audio portion 46 may be degraded to further conserve bandwidth. So, even though the television 32 is powered “off,” but the set-top box 30 remains powered “on,” a low-bandwidth audio-only signal is communicated to the “always on” set-top box 30.

FIG. 6 is a schematic illustrating a restored stream 60 of data, according to exemplary embodiments. The presence detection application 18 may continually monitor for the presence of the television 32. When the presence of the multimedia device 16 is redetected, then the presence detection application 18 causes a restoration in the data rate (e.g., bytes per second) of stream 12 of data. The presence detection application 18 sends the restoration message 30 to the server 28, and the restoration message 30 instructs the server-based presence detection application 18 to restore the full-resolution data rate of the stream 12 of data.

FIGS. 2-6 illustrate an example where the electronic device 10 is the set-top box 30 and the multimedia device 16 is the television 32. Either the electronic device 10 or the multimedia device 16, however, as mentioned above, may be any device, such as an analog/digital recorder, CD/DVD player/recorder, audio equipment, receiver, tuner, and/or any other consumer electronic device. Either the electronic device 10 or the multimedia device 16 may also be any computer, peripheral device, camera, modem, storage device, telephone, personal digital assistant, and/or mobile phone. The presence detection application 18, for example, may operate in a computer or server, and the presence detection application 18 degrades the stream 12 of data when the presence of a digital recorder is not detected. If the presence detection application 18 cannot detect presence of video phone capabilities, then the stream 12 of data can be degraded to voice-only portions to reduce bandwidth. If the presence detection application 18 notes a personal digital assistant or a mobile phone does not have the capabilities to support the full-resolution stream 12 of data, then the presence detection application 18 degrades the stream 12 of data to support display, processor, or software constraints. The presence detection application 18, then, may detect the presence of software and hardware capabilities and tailor, degrade, or discard portions of the stream 12 of data to suit those capabilities.

FIG. 7 is a schematic illustrating a degradation profile 62, according to exemplary embodiments. Before the presence detection application 18 commands degradation of, or itself degrades, the stream 12 of data to conserve bandwidth, the presence detection application 18 may consult the degradation profile 62. The degradation profile 62 stores preferences when degrading the stream 12 of data. The degradation profile 62 is stored in a database 64 of profiles, and the database 64 is locally or remotely accessible to the electronic device 10 (or to the server 28) via the communications network 14. The degradation profile 62, for example, may store which configuration option (shown as reference numerals 42, 48, 50, and 52 in FIG. 5) is desired by a user. The degradation profile 62 may even store authorization or access parameters, thus restricting what users have privileges to access and change the configuration options.

FIG. 8 is a schematic illustrating the presence detection application 18 operating in a local area network (LAN) 51, such as a residential network, according to more exemplary embodiments. The presence detection application 18 entirely or partially stores within memory of a residential gateway 53. The residential gateway 53 provides an interface to the broadband communications network 14. When the electronic device 10 (such as the set-top box 20) detects that the multi-media device 16 (such as the television 32) is powered “off” or otherwise not present, the presence detection application 18 enters a low bandwidth state. The electronic device 10 informs the residential gateway 53 that the full-resolution stream 12 of data is not required. The presence detection application 18 operating in the electronic device 10 sends the degradation message 26 to the residential gateway 53. The residential gateway 53 manages sessions for the electronic device 10. The degradation message 26 informs the residential gateway 53 of the low-bandwidth state.

Here the residential gateway 53 “squeezes down” bandwidth. The presence detection application 18 operating in the residential gateway 53 receives the degradation message 26 and “throttles down” the stream 12 of data. That is, the residential gateway 53 receives the full-resolution version of the stream 12 of data, and the presence detection application 18 operating in the residential gateway 53 discards bits to reduce resolution. This solution, then, reduces bandwidth in the residential network 51, but this solution provides little, if any, bandwidth reduction in the broadband communications network 14. That is, the broadband communications network 14 carries and delivers the full-resolution version of the stream 12 of data, and the presence detection application 18 operating in the residential gateway 53 discards bits to reduce resolution. So, if the subscriber's residential network 51 needs to conserve bandwidth, FIG. 8 illustrates an effective solution for local area networks (e.g., the subscriber's residential network).

FIG. 9 is a schematic illustrating the presence detection application 18 operating in a wide area network (WAN) 55 (such as the broadband communications network 14), according to more exemplary embodiments. Here, again, the presence detection application 18 entirely or partially stores within memory of the residential gateway 53. A complimentary presence detection application 18 also operates within a content supplier's network 57 (such as within a content server 59). When the electronic device 10 (such as the set-top box 20) detects that the multi-media device 16 (such as the television 32) is powered “off” or otherwise not present, the presence detection application 18 enters the low bandwidth state. The degradation message 26 is sent from the residential network 51 to the content supplier's network 57. The degradation message 26 may originate from the presence detection application 18 operating in the electronic device 10, and/or the degradation message 26 may originate from the presence detection application 18 operating in the residential gateway 53. Regardless, the degradation message 26 routes through the wide area network 55 and informs the content supplier's network 57 of the low-bandwidth state.

Here the content supplier's network 57 reduces bandwidth. The presence detection application 18 operating in the content supplier's network 57 (such as the content server 59) receives the degradation message 26 and reduces the bit rate of the stream 12 of data. That is, the presence detection application 18 operating in the content supplier's network 57 discards bits to reduce resolution. The content supplier's network 57, therefore, begins transmitting the degraded stream 40 of data having a reduced resolution. The degraded stream 40 of data routes through the wide area network 55 to the residential gateway 53. This solution, then, reduces bandwidth in both the wide area network 55 and in the residential network 51. This solution may also reduce bandwidth in the content supplier's network 57.

FIG. 10 is a schematic illustrating the presence detection application 18 operating in a broadband remote access server (BRAS) 61, according to more exemplary embodiments. The broadband remote access server 61 sets policies for individual users and each user's allowance of bandwidth consumption. The broadband remote access server 61 also sets policies for individual sessions, regardless of the user. Here, when the low-bandwidth state is detected, a transaction is established with the broadband remote access server 61. When the electronic device 10 (such as the set-top box 20) detects that the multi-media device 16 (such as the television 32) is powered “off” or otherwise not present, the presence detection application 18 enters the low bandwidth state. The degradation message 26 is sent from the residential network 51 to the broadband remote access server 61. The degradation message 26 may originate from the presence detection application 18 operating in the electronic device 10, and/or the degradation message 26 may originate from the presence detection application 18 operating in the residential gateway 53. Regardless, the degradation message 26 routes through the wide area network 55 and informs the broadband remote access server 61 of the low-bandwidth state.

The broadband remote access server 61 may itself reduce bandwidth. A complimentary presence detection application 18 also operates within broadband remote access server 61. When the presence detection application 18 operating in the broadband remote access server 61 receives the degradation message 26, the broadband remote access server 61 itself reduces the bit rate of the stream 12 of data. That is, the presence detection application 18 operating in the broadband remote access server 61 receives the full resolution stream 12 of data and discards bits to reduce the resolution of the session. The broadband remote access server 61, therefore, begins transmitting the degraded stream 40 of data having a reduced resolution. The degraded stream 40 of data routes through the wide area network 55 to the residential gateway 53. This solution, again, reduces bandwidth in both the wide area network 55 and in the residential network 51. This solution, however, fails to reduce bandwidth in the content supplier's network 57.

FIG. 11 is a schematic further illustrating the presence detection application 18 operating in a broadband remote access server (BRAS) 61, according to still more exemplary embodiments. FIG. 11 is similar to FIG. 10, although here the content supplier's network 57 is instructed to reduce the resolution of the stream 12 of data. When the electronic device 10 (such as the set-top box 20) detects that the multi-media device 16 (such as the television 32) is powered “off” or otherwise not present, the presence detection application 18 enters the low bandwidth state. The degradation message 26, as before, routes from the residential network 51, through the wide area network 55, and to the broadband remote access server 61. The degradation message 26 informs the broadband remote access server 61 of the low-bandwidth state.

The broadband remote access server 61 then instructs the content supplier's network 57 to reduce the bit rate of the session. The broadband remote access server 61 sends a message to the content supplier's network 57. The message is received by some controller (such as the content server 59). The complimentary presence detection application 18 operating in the content server 59 then discards bits from the stream of data (shown as reference numeral 12 in FIG. 10). The message from the broadband remote access server 61 may be simply a forwarded version of the degradation message 26, as FIG. 11 illustrates. The message from the broadband remote access server 61, however, may take any form and have any protocol. Whatever the form, the message instructs or informs the content server 59 of the low-bandwidth need. The degraded stream 40 of data routes through the wide area network 55 to the residential gateway 53. This solution, then, reduces bandwidth in both the wide area network 55 and in the residential network 51. This solution may also reduce bandwidth in the content supplier's network 57.

FIG. 12 is a block diagram of exemplary details of the electrical device 10 shown in FIGS. 1-11. The electrical device 10 can be any device, such as an analog/digital recorder, television, CD/DVD player/recorder, audio equipment, receiver, tuner, and/or any other consumer electronic device. The electrical device 10 may also include any computer, peripheral device, camera, modem, storage device, telephone, personal digital assistant, and/or mobile phone. The electrical device 10 may also be configured as a set-top box (“STB”) receiver that receives and decodes digital signals. The electrical device 10, in fact, can be any electronic/electrical device that has an input 70 for receiving the stream of data (shown as reference numeral 12 in FIGS. 1-11). The input 70 may include a coaxial cable interface 72 for receiving signals via a coaxial cable (not shown). The input 70 may additionally or alternatively include an interface to a fiber optic line, to a telephone line (such as an RJ-48/56), to other wiring, and to any male/female coupling. The electrical device 10 includes one or more processors 74 executing instructions 76 stored in a system memory device. The instructions 76, for example, are shown residing in a memory subsystem 78. The instructions 76, however, could also reside in flash memory 80 or a peripheral storage device 82. When the processor 74 executes the instructions 76, the processor 74 may also consult the presence detection application 18 stored in the system memory device. The processor 74, however, may additionally or alternatively consult the presence detection application 18 by communicating with the server, operating within the communications network, when conserving bandwidth (the server and the communications network are shown, respectively, as reference numerals 28 and 14 in FIGS. 1-7). The one or more processors 74 may also execute an operating system that controls the internal functions of the electrical device 10. A bus 84 may communicate signals, such as data signals, control signals, and address signals, between the processor 74 and a controller 86. The controller 86 provides a bridging function between the one or more processors 74, any graphics subsystem 88 (if desired), the memory subsystem 78, and, if needed, a peripheral bus 90. The peripheral bus 90 may be controlled by the controller 86, or the peripheral bus 90 may have a separate peripheral bus controller 92. The peripheral bus controller 92 serves as an input/output hub for various ports. These ports include the input terminal 70 and perhaps at least one output terminal. The ports may also include a serial and/or parallel port 94, a keyboard port 96, and a mouse port 98. The ports may also include one or more external device ports 100, networking ports 102 (such as SCSI or Ethernet), and a USB port 104. The electrical device 10 may also include an audio subsystem 106. The electrical device 10 may also include a display device (such as LED, LCD, plasma, or any other) to present instructions, messages, tutorials, and other information to a user. The apparatus 10 may further include one or more encoders, one or more decoders, input/output control, logic, one or more receivers/transmitters/transceivers, one or more clock generators, one or more Ethernet/LAN interfaces, one or more analog-to-digital converters, one or more digital-to-analog converters, one or more “Firewire” interfaces, one or more modem interfaces, and/or one or more PCMCIA interfaces. Those of ordinary skill in the art understand that the program, processes, methods, and systems described herein are not limited to any particular architecture or hardware.

The processors 74 may be implemented with a digital signal processor (DSP) and/or a microprocessor. Advanced Micro Devices, Inc., for example, manufactures a full line of microprocessors (Advanced Micro Devices, Inc., One AMD Place, P.O. Box 3453, Sunnyvale, Calif. 94088-3453, 408.732.2400, 800.538.8450, www.amd.com). The Intel Corporation also manufactures a family of microprocessors (Intel Corporation, 2200 Mission College Blvd., Santa Clara, Calif. 95052-8119, 408.765.8080, www.intel.com). Other manufacturers also offer microprocessors. Such other manufacturers include Motorola, Inc. (1303 East Algonquin Road, P.O. Box A3309 Schaumburg, Ill. 60196, www.Motorola.com), International Business Machines Corp. (New Orchard Road, Armonk, N.Y. 10504, (914) 499-1900, www.ibm.com), and Transmeta Corp. (3940 Freedom Circle, Santa Clara, Calif. 95054, www.transmeta.com). Texas Instruments offers a wide variety of digital signal processors (Texas Instruments, Incorporated, P.O. Box 660199, Dallas, Tex. 75266-0199, Phone: 972-995-2011, www.ti.com) as well as Motorola (Motorola, Incorporated, 1303 E. Algonquin Road, Schaumburg, Ill. 60196, Phone 847-576-5000, www.motorola.com). There are, in fact, many manufacturers and designers of digital signal processors, microprocessors, controllers, and other componentry that are described in this patent. Those of ordinary skill in the art understand that this componentry may be implemented using any suitable design, architecture, and manufacture. Those of ordinary skill in the art, then understand that the exemplary embodiments are not limited to any particular manufacturer's component, or architecture, or manufacture.

The memory (shown as memory subsystem 78, flash memory 80, or peripheral storage device 82) may also contain an application program. The application program cooperates with the operating system and with a video display device to provide a Graphical User Interface (GUI). The graphical user interface provides a convenient visual and/or audible interface with a user of the electrical device 10.

FIG. 13 is a schematic illustrating still more exemplary embodiments. FIG. 13 illustrates that the electronic device 10 may include various types of devices. The presence detection application 18 operates within any of these various types of devices. FIG. 13, for example, illustrates that the presence detection application 18 may entirely or partially operate within a personal digital assistant (PDA) 112, a Global Positioning System (GPS) device 114, an interactive television 116, an Internet Protocol (IP) phone 118, a pager 120, a cellular/satellite phone 122, or any computer system and/or communications device utilizing a digital signal processor (DSP) 124. The electronic device 10 may also include watches, radios, vehicle electronics, clocks, printers, gateways, and other apparatuses and systems.

FIG. 14 is a schematic illustrating still more exemplary embodiments. FIG. 14 illustrates that the multimedia device 16 may also include various types of devices. FIG. 14 also illustrates that some portions of the presence detection application 18 may operate within any of these various types of devices. The presence detection application 18 may entirely or partially operate within a personal digital assistant (PDA) 130, a Global Positioning System (GPS) device 132, an interactive television 134, an Internet Protocol (IP) phone 136, a pager 138, a cellular/satellite phone 140, or any computer system and/or communications device utilizing a digital signal processor (DSP) 142. The multimedia device 16 may also include watches, radios, vehicle electronics, clocks, printers, gateways, and other apparatuses and systems.

FIGS. 15-17 are schematics further illustrating the electronic device 10 storing the presence detection application 18, according to exemplary embodiments. FIG. 15 is a block diagram of a Subscriber Identity Module 150, while FIGS. 16 and 17 illustrate, respectively, the Subscriber Identity Module 150 embodied in a plug 152 and the Subscriber Identity Module 150 embodied in a card 154. As those of ordinary skill in the art recognize, the Subscriber Identity Module 150 may be used in conjunction with many electronic devices (such as the electronic devices shown in FIG. 13). The Subscriber Identity Module 150 stores user information (such as the user's International Mobile Subscriber Identity, the user's K_(i) number, and other user information) and any portion of the presence detection application 18. As those of ordinary skill in the art also recognize, the plug 152 and the card 154 each interface with the communications device according to GSM Standards 2.17 and 11.11 and ISO Standard 7816, with each incorporated herein by reference. The GSM Standard 2.17 is formally known as “European digital cellular telecommunications system (Phase 1); Subscriber Identity Modules, Functional Characteristics (GSM 02.17 V3.2.0 (1995-01)).” The GSM Standard 11.11 is formally known as “Digital cellular telecommunications system (Phase 2+) (GSM); Specification of the Subscriber Identity Module—Mobile Equipment (Subscriber Identity Module—ME) interface (GSM 11.11 V5.3.0 (1996-07)).” Both GSM standards are available from the European Telecommunication Standards Institute (650 route des Lucioles, 06921 Sophia-Antipolis Cedex, FRANCE, Tel.: +33 (0)4 92 94 42 00, Fax: +33 (0)4 93 65 47 16, www.etsi.org). The ISO Standard 7816 is formally known as “Information technology—Identification cards—Integrated circuit(s) cards with contacts,” and the standard is available from the International Organization for Standardization (ISO) (1, rue de Varembé, Case, postale 56CH-1211 Geneva 20, Switzerland, Telephone +41 22 749 01 11, Telefax +41 22 733 34 30, www.iso.org).

FIG. 15 is a block diagram of the Subscriber Identity Module 150, whether embodied as the plug 152 of FIG. 16 or as the card 154 of FIG. 17. Here the Subscriber Identity Module 150 comprises a microprocessor 156 (μP) communicating with memory modules 158 via a data bus 160. The memory modules may include Read Only Memory (ROM) 162, Random Access Memory (RAM) and or flash memory 164, and Electrically Erasable-Programmable Read Only Memory (EEPROM) 166. The Subscriber Identity Module 150 stores some or all of the presence detection application 18 in one or more of the memory modules 158. FIG. 11 shows the presence detection application 18 residing in the Erasable-Programmable Read Only Memory 166, yet the presence detection application 18 could alternatively or additionally reside in the Read Only Memory 162 and/or the Random Access/Flash Memory 164. An Input/Output module 168 handles communication between the Subscriber Identity Module 150 and the electronic device. As those skilled in the art will appreciate, there are many suitable ways for implementing the operation and physical/memory structure of the Subscriber Identity Module. If, however, the reader desires more information on the Subscriber Identity Module, the reader is directed to the following sources: LAWRENCE HARTE et al., GSM SUPERPHONES 99-100, 113-14 (1999); SIEGMUND REDL et al., GSM AND PERSONAL COMMUNICATIONS HANDBOOK 303-69 (1998); and JOACHIM TISAL, GSM CELLULAR RADIO TELEPHONY 99-130 (1997), with each incorporated herein by reference.

FIG. 18 is a schematic further illustrating the electronic device 10, according to exemplary embodiments. FIG. 18 is an alternative block diagram of the electronic device 10 storing the presence detection application 18. Here the electronic device 10 comprises a radio transceiver unit 172, an antenna 174, a digital baseband chipset 176, and a man/machine interface (MMI) 178. The transceiver unit 172 includes transmitter circuitry 180 and receiver circuitry 182 for receiving and transmitting signals. The transceiver unit 172 couples to the antenna 174 for converting electrical current to and from electromagnetic waves. The digital baseband chipset 176 contains a digital signal processor (DSP) 184 and performs signal processing functions for audio (voice) signals and RF signals. As FIG. 14 shows, the digital baseband chipset 176 may also include an on-board microprocessor 186 that interacts with the man/machine interface (MMI) 178. The man/machine interface (MMI) 178 may comprise a display device 188, a keypad 190, and the Subscriber Identity Module 150. The on-board microprocessor 186 performs GSM protocol functions and control functions for the radio circuitry 180 and 182, for the display device 188, and for the keypad 190. The on-board microprocessor 186 may also interface with the Subscriber Identity Module 150 and with the presence detection application 18 residing in the memory module 158 of the Subscriber Identity Module 150. Those skilled in the art will appreciate that there may be many suitable architectural configurations for the elements of the electronic device 10. If the reader desires a more detailed explanation, the reader is invited to consult the following sources: LAWRENCE HARTE et al., GSM SUPERPHONES 105-120 (1999); SIEGMUND REDL et al., GSM AND PERSONAL COMMUNICATIONS HANDBOOK 389-474 (1998); and JOACHIM TISAL, GSM CELLULAR RADIO TELEPHONY 99-130 (1997), with each incorporated herein by reference.

The presence detection application 18 may be utilized regardless of signaling standard. As those of ordinary skill in the art recognize, FIGS. 15-18 illustrate the electronic device 10 utilizing a Global System for Mobile (GSM) standard. That is, the electronic device 10 utilizes the Global System for Mobile (GSM) communications signaling standard. Those of ordinary skill in the art, however, also recognize that the presence detection application 18 may be utilized with the Time Division Multiple Access signaling standard, the Code Division Multiple Access signaling standard, the “dual-mode” GSM-ANSI Interoperability Team (GAIT) signaling standard, or any variant of the GSM/CDMA/TDMA signaling standard.

FIG. 19 is a flowchart illustrating a method of conserving bandwidth, according to exemplary embodiments. A presence of a multimedia device is monitored or detected (Block 200). Presence may be detected by measuring power consumption of the multimedia device (Block 202) and/or by measuring impedance in a video output signal delivered to the multimedia device (Block 204). If the presence of a multimedia device is detected (Block 206), then a full-resolution stream of data is delivered to the multimedia device (Block 208). If, however, the presence of the multimedia device is not detected (Block 206), then a profile is accessed for a desired degradation mode (Block 210). A video portion of the stream of data may be degraded, and an audio portion of the stream of data is not degraded (Block 212). A video portion and an audio portion of the stream of data may be degraded (Block 214). A video portion of the stream of data may be degraded, and an audio portion of the stream of data may be discarded (Block 216). A video portion may be discarded, thus delivering only an audio portion of the stream of data (Block 218). The method then checks to ensure a session is still in progress (Block 220). If the session remains in progress, then the method resumes monitoring the presence of the multimedia device (Block 200). If, however, the session is no longer in progress (Block 220), then the method ends.

The presence detection application 18 may be physically embodied on or in a computer-readable medium. This computer-readable medium may include CD-ROM, DVD, tape, cassette, floppy disk, memory card, and large-capacity disk (such as IOMEGA®, ZIP®, JAZZ®, and other large-capacity memory products (IOMEGA®, ZIP®, and JAZZ® are registered trademarks of Iomega Corporation, 1821 W. Iomega Way, Roy, Utah 84067, 801.332.1000, www.iomega.com). This computer-readable medium, or media, could be distributed to end-users, licensees, and assignees. These types of computer-readable media, and other types not mention here but considered within the scope of the embodiments, allow the presence detection application 18 to be easily disseminated. A computer program product for conserving bandwidth comprises the computer-readable medium, and the presence detection application stores on the computer-readable medium. The presence detection application comprises computer code for detecting the presence of a multimedia device. If a presence of a multimedia device is detected, then a stream of data is delivered to the multimedia device. If the presence of the multimedia device is not detected, then the stream of data is degraded to conserve bandwidth.

The presence detection application 18 may also be physically embodied on or in any addressable (e.g., HTTP, IEEE 802.11, Wireless Application Protocol (WAP)) wire line or wireless device capable of presenting an IP address. Examples could include a computer, a wireless personal digital assistant (PDA), an Internet Protocol mobile phone, or a wireless pager.

While the exemplary embodiments have been described with respect to various features, aspects, and embodiments, those skilled and unskilled in the art will recognize the exemplary embodiments are not so limited. Other variations, modifications, and alternative embodiments may be made without departing from the spirit and scope of the exemplary embodiments. 

1. A method to conserve bandwidth, comprising: if a presence of a multimedia device is detected, delivering a stream of data to the multimedia device; if the presence of the multimedia device is not detected, degrading the stream of data to conserve bandwidth; storing a user degradation profile in which the user degradation profile instructs how a user desires to degrade the stream of data delivered to the multimedia device from a server in response to the presence of the multimedia device not being detected; and consulting the user degradation profile based on the presence of the multimedia device not being detected; wherein the user degradation profile is configured to cause the server delivering the stream of data to degrade the stream of data before the stream of data reaches the multimedia device.
 2. A method according to claim 1, wherein a video portion of the stream of data is degraded, and an audio portion of the stream of data is not degraded.
 3. A method according to claim 1, wherein a video portion and an audio portion of the stream of data are degraded.
 4. A method according to claim 1, wherein a video portion of the stream of data is degraded, and an audio portion of the stream of data is discarded.
 5. A method according to claim 1, wherein a video portion of the stream of data is discarded, and only an audio portion of the stream of data is transmitted.
 6. A method according to claim 1, wherein the multimedia device is a cellular telephone phone; and wherein a presence detection application stored in a subscriber identity module card of the cellular telephone detects the presence of the multimedia device.
 7. A method according to claim 1, further comprising before degrading the stream of data to the multimedia device, causing a presence detection application to consult the user degradation profile in response to the presence of the multimedia device not being detected, instructions in the user degradation profile instructing the presence detection application how the user desires to degrade the stream of data to the multimedia device based on the presence of the multimedia device not being detected.
 8. A user electronic device, comprising: means for detecting presence of a multimedia device; and a processor communicating with the means for detecting the presence of the multimedia device; the processor commanding delivery of a stream of data to the multimedia device; and if the presence of the multimedia device is not detected, the processor degrades the stream of data to conserve bandwidth; wherein the processor stores a user degradation profile that instructs how a user desires to degrade the stream of data delivered to the multimedia device from a server in response to the presence of the multimedia device not being detected; wherein the processor is configured to consult the user degradation profile based on the presence of the multimedia device not being detected; and wherein the user degradation profile is configured to cause the server delivering the stream of data to degrade the stream of data before the stream of data reaches the multimedia device.
 9. A device according to claim 8, wherein the processor degrades a video portion of the stream of data, and an audio portion of the stream of data is not degraded.
 10. A device according to claim 8, wherein the processor degrades a video portion and an audio portion of the stream of data.
 11. A device according to claim 8, wherein the processor degrades a video portion of the stream of data, and an audio portion of the stream of data is discarded.
 12. A device according to claim 8, wherein the processor degrades the stream of data by discarding a video portion, and only an audio portion of the stream of data is transmitted.
 13. A device according to claim 8, wherein the means for detecting presence of the multimedia device measures frequency of the multimedia device.
 14. A device according to claim 8, wherein the means for detecting presence of the multimedia device is capable of detecting the presence of the multimedia device using an impedance measurement of a video output signal delivered to the multimedia device; and wherein the impedance measurement detects an impedance change in the video output signal delivered to the multimedia device.
 15. A computer program product, tangibly embodied on a non-transitory computer readable medium, the computer program product including instructions for causing a computer to execute a method for presence detection of a multimedia device comprising: if a presence of the multimedia device is detected, delivering a stream of data to the multimedia device; if the presence of the multimedia device is not detected, degrading the stream of data to conserve bandwidth; storing a user degradation profile in which the user degradation profile instructs how a user desires to degrade the stream of data delivered to the multimedia device from a server in response to the presence of the multimedia device not being detected; and consulting the user degradation profile based on the presence of the multimedia device not being detected; wherein the user degradation profile is configured to cause the server delivering the stream of data to degrade the stream of data before the stream of data reaches the multimedia device.
 16. A computer program product according to claim 15, wherein a video portion of the stream of data is degraded, and an audio portion of the stream of data is not degraded.
 17. A computer program product according to claim 15, wherein a video portion and an audio portion of the stream of data are degraded.
 18. A computer program product according to claim 15, wherein a video portion of the stream of data is degraded, and an audio portion of the stream of data is discarded.
 19. A computer program product according to claim 15, wherein a video portion of the stream of data is discarded, and only an audio portion of the stream of data is communicated.
 20. A computer program product according to claim 15, wherein the authorization parameters restrict privilege to access and change user preferences in the user degradation profile. 