Abstract:
Embodiments communicate messages between mobile devices and destination devices. An exemplary embodiment includes a first border server operable to establish a first communication connection to the mobile device over a first network operating under a first protocol, a second border server operable to establish a second communication connection to the mobile device over a second network operating under a second protocol, and a transport management server communicatively coupled to the first border server and the second border server, and operable to establish a third communication connection to the destination device over a third network operating under a third protocol. The first protocol is configured to communicate a first encapsulated portion of the message. The second protocol is configured to communicate a second encapsulated portion of the message. The third protocol is configured to communicate the first encapsulated portion of the message and the second encapsulated portion of the message.
Abstract:
A protocol circuit layer is described. The protocol circuit layer may employ a routing layer to determine optimal routes when establishing a circuit. The circuit layer may employ a link layer to send data packets over links to other network nodes. A naming layer may employ circuits to establish a distributed database of associations between network node addresses and their network locations.
Abstract:
Embodiments communicate messages between mobile devices and destination devices. An exemplary embodiment includes a first border server operable to establish a first communication connection to the mobile device over a first network operating under a first protocol, a second border server operable to establish a second communication connection to the mobile device over a second network operating under a second protocol, and a transport management server communicatively coupled to the first border server and the second border server, and operable to establish a third communication connection to the destination device over a third network operating under a third protocol. The first protocol is configured to communicate a first encapsulated portion of the message. The second protocol is configured to communicate a second encapsulated portion of the message. The third protocol is configured to communicate the first encapsulated portion of the message and the second encapsulated portion of the message.
Abstract:
Techniques for distributing content to mobile computing devices, such as in the context of a vehicle-based wireless network, are described. In some examples, a collection of vehicle-mounted devices forms a cooperative wireless network to distribute content items throughout the network. The devices in the network automatically and independently vary the transmission rates in order to optimize or at least improve throughput, network connectivity, and/or range. Each device may determine a utilization level of a wireless communication channel. If the utilization level is below a threshold level, the device increases the transmission data rate of its transceiver, thereby decreasing range. If the utilization level is above a threshold level, the device decreases the transmission data rate of its transceiver, thereby increasing range.
Abstract:
A protocol circuit layer is described. The protocol circuit layer may employ a routing layer to determine optimal routes when establishing a circuit. The circuit layer may employ a link layer to send data packets over links to other network nodes. A naming layer may employ circuits to establish a distributed database of associations between network node addresses and their network locations.
Abstract:
A unifying network model with a structure and architecture configured to address security, interoperability, mobility, and resource management, including priority and quality of services is provided. The network of the network model is structured as a hierarchical mesh network, with dynamically generated routing tables. The configuration of the network model optimizes routing and distributes communication load. Every device on the network is capable of being both an endpoint and a forwarder of communications. The network model may include underlying networks that are represented with one of two models, the link model or the star model. The nodes are organized in a hierarchical relationship structure to optimize throughput. The model may include a cryptographic method of dynamically assigning local network addresses.
Abstract:
Techniques for sharing network information, such as routing table information, are described. In some examples, network nodes share information about the topology of their network. For example, nodes may share routing tables with their neighbors from time to time. To improve the performance of the network, by reducing the overhead of transmitting routing tables, the nodes share their routing tables with neighbor nodes only when those tables are updated or upon request. In other circumstances, such as when a routing table has not changed since it was last shared, each network node instead transmits an indicator, such as a routing table checksum, hash, or the like, that can be used by a neighbor node to determine the routing table is unchanged.
Abstract:
Push to talk (PTT) devices that communicate packet-based voice communications are disclosed. An example PTT device receives voice packets via a packet-based communication network from another PTT device. Voice information in the received voice packets are used to reconstruct the voice communication. The receiving PTT device is able to identify an occurrence of at least one delayed, corrupted or lost voice packet, and then communicate a packet re-transmit request to the other PTT device requesting a replacement voice packet that has a portion of the voice communication that is identical to the voice communication portion of the delayed, corrupted or lost voice packet. The voice communication may then be repaired based on the received replacement voice packet. While the voice communication is being repaired, a comfort tone may be generated so that the listener of the PTT device understands that the voice communication is being repaired.
Abstract:
Push to talk (PTT) devices that communicate packet-based voice communications are disclosed. An example PTT device receives voice packets via a packet-based communication network from another PTT device. Voice information in the received voice packets are used to reconstruct the voice communication. The receiving PTT device is able to identify an occurrence of at least one delayed, corrupted or lost voice packet, and then communicate a packet re-transmit request to the other PTT device requesting a replacement voice packet that has a portion of the voice communication that is identical to the voice communication portion of the delayed, corrupted or lost voice packet. The voice communication may then be repaired based on the received replacement voice packet. While the voice communication is being repaired, a comfort tone may be generated so that the listener of the PTT device understands that the voice communication is being repaired.
Abstract:
A protocol circuit layer is described. The protocol circuit layer may employ a routing layer to determine optimal routes when establishing a circuit. The circuit layer may employ a link layer to send data packets over links to other network nodes. A naming layer may employ circuits to establish a distributed database of associations between network node addresses and their network locations.