Patent application number | Description | Published |
20090003216 | Multipath Forwarding Algorithms Using Network Coding - A method of transmitting data across a wireless mesh network is described which uses network coding at each of the intermediate nodes between the source node and the destination node. Each intermediate node also controls the rate at which it broadcasts packets based on link congestion and the backlog of packets at each of the possible next-hop nodes for the data flow. | 01-01-2009 |
20110261692 | METHOD FOR BALANCING LOADS IN MOBILE WIRELESS AD-HOC NETWORKS - The invention relates to a method for balancing the traffic load without affecting the performance or efficiency or efficiency in Pocket Switched Networks, comprised within the so-called Delay-Tolerant Networks. The method introduces the concepts of strength and affinity to make decisions for routing messages in the Pocket Switched Network. | 10-27-2011 |
20130097046 | System and Method of Providing Transactional Privacy - A user is prevented from being identified at each of a plurality of sites. An indication to sell access to the user at one of the plurality of sites is received. A personal information marketplace is provided to run an auction to sell the access to the user at the one of the plurality of sites. In response to a sale of the access to the user at the one of the plurality of sites to an aggregator, access to track the user at the one of the plurality of sites while maintaining anonymity of the user is provided to the aggregator. | 04-18-2013 |
20130132549 | METHOD AND A DEVICE FOR BULK DATA TRANSFER IN DELAY-TOLERANT NETWORKS - The method comprises modelling a delay-tolerant dynamic network comprising time-varying links transforming it into a static time-expanded network graph, and managing bulk data transfer on the basis of said static time-expanded network graph. | 05-23-2013 |
Patent application number | Description | Published |
20080294779 | Connection Management in Peer-to-Peer Content Distribution Clouds - A topology management process is implemented which involves removing or “tearing down” connections between nodes in certain situations in order to try to replace those connections with more optimal ones. Idle connections are torn down unless those are in a “notify” state; a notify state being one in which a request for content has been made to a neighbour but that neighbour has no available content as yet. Idle connections in a notify state are torn down only if they remain idle for a longer time than that required before an idle connection is torn down. To avoid problems caused by clusters of node forming and of loners being unable to join the cloud, network churn algorithms are taught. These involve requiring nodes to drop connections when specified conditions are met. Relative content distribution between connections is monitored and this information used to influence selection of those connections to drop. | 11-27-2008 |
20080301246 | Peer-To-Peer Message Format Data Structure - A wire protocol is described which implements connection management and other methods to give enhanced peer-to-peer content distribution. Connections between nodes can be placed in a “notify” state when they are idle but may soon yield useful content. This notify state is also used together with a content request/response cycle to allow a peer to evaluate content available at a neighbour. If no suitable content is available a notify state is entered. When new content is later received at the neighbour it is able to inform the requesting node to allow it to restart the content request/response cycle. | 12-04-2008 |
20080320300 | Authorisation and Authentication - The invention relates to content distribution over a network and provides methods of controlling the distribution, of receiving the content and of publishing content. The method of controlling distribution of content over a network includes receiving a content description and location information for a source of the content from a publisher, where the content description comprises authorisation details associated with the publisher. The validity of the authorisation details is checked and if found to be valid, the content description is provided to a node in the network | 12-25-2008 |
20090138486 | Secure Content Descriptions - The invention describes a control node for a content distribution network and a method of automatically verifying content distributed over a network at a node in the network. In the method, a content description is received which comprises a content identifier, a publisher identifier, publisher authorisation information and content checking information. The integrity and validity of this information are checked and if both the checks are passed, the content description is stored. | 05-28-2009 |
20090198825 | Content Management in Peer-to-Peer Content Distribution Clouds - Managing content by influencing its distribution in the form of blocks or other units is crucial to the performance of a peer-to-peer content distribution system. We provide a content management module at each peer node to achieve this. The content management module implements a content request/response cycle in order to negotiate about blocks of content with other peer nodes. This cycle comprises an offer request, offer reply and a block request. These steps are preferably followed by data exchange and verification. The negotiation protocol used by our content management module provides a generic method that is advantageously used in conjunction with different encoding schemes such as full network coding and group network coding. In one embodiment we use group network coding and add information to the offer request and offer reply to facilitate efficient content distribution. Block request messages are selected to promote the use of on-the-fly decoding where possible. | 08-06-2009 |
20090265473 | Topology Management in Peer-to-Peer Content Distribution Clouds - A topology management process is implemented in peer-to-peer content distribution clouds using tracker nodes. Tracker nodes have information about available peers and assist peers in finding other peers to connect to. Various algorithms for use at the tracker nodes are described for selecting which peers to return as potentials for forming connections to. In addition, architectures and algorithms to allow efficient scaling of tracker nodes in peer-to-peer clouds are described. | 10-22-2009 |
20120008494 | Offering Incentives under a Flat Rate Charging System - The invention describes a method of providing incentives to users via supporting mechanisms and algorithms for facilitating the move of DT traffic to off-peak hours. It proposes an efficient utilization of the network resources during peak hour under a flat-rate pricing scheme with the cooperation and blessing of the users and without adding complexity to billing. | 01-12-2012 |