摘要:
The overall management task required to determine data dissemination in multi-user applications is reduced herein. The management task required at any one host in the multi-user application is also limited. In addition, the number of simultaneous connections that any one participating host must support in a large multi-user application is reduced. Each user is assigned to a single management partition.
摘要:
A game lobby allows users to open a game with their name at a central place so that others may see and join that game. The user can set the criteria for starting this game, such as the number of players or start time, whichever comes first. This paradigm enables a platform-independent object model without the burden of multi-user communication management by the game developer. The object model enables the development of game lobby services by multiple vendors and allows games to freely operate with any of these lobby implementations.
摘要:
A Distributed Routing Table (DRT) mesh can comprise two or more nodes, each of which maintains its own routing table that represents some or all of the overall routing knowledge of the DRT mesh. Each node can be comprised of modular components that can perform various defined functions such that the features and abilities of the node can be customized by an application based on which modular components are instantiated. A routing table management module can maintain individual routing tables at each node, and can ensure that only entries that are close to the node, in a network topology sense, are maintained in the routing table. In addition, a security module can verify received messages based on an agreed-upon root certificate.
摘要:
A Distributed Routing Table (DRT) mesh can comprise two or more nodes, each of which maintains its own routing table that represents some or all of the overall routing knowledge of the DRT mesh. Each node can be comprised of modular components that can perform various defined functions such that the features and abilities of the node can be customized by an application based on which modular components are instantiated. A routing table management module can maintain individual routing tables at each node, and can ensure that only entries that are close to the node, in a network topology sense, are maintained in the routing table. In addition, a security module can verify received messages based on an agreed-upon root certificate.
摘要:
A Distributed Routing Table (DRT) mesh can comprise two or more nodes, each of which maintains its own routing table that represents some or all of the overall routing knowledge of the DRT mesh. Each node can be comprised of modular components that can perform various defined functions such that the features and abilities of the node can be customized by an application based on which modular components are instantiated. A routing table management module can maintain individual routing tables at each node, and can ensure that only entries that are close to the node, in a network topology sense, are maintained in the routing table. In addition, a security module can verify received messages based on an agreed-upon root certificate.
摘要:
A method and system for increasing ease-of-use and bandwidth utilization in a wireless device capable of accessing a communication network is disclosed. The present invention receives information about the wireless device's environment, and then uses the environment to determine web sites most likely to be requested. Identifiers of the web sites most likely to be requested are then pushed to the wireless device for selection by the user. In a further aspect of the present invention, the wireless device may also pre-fetch contents from the identified web sites in times when bandwidth is not in use to further speed responsiveness of the device.
摘要:
Methods, systems, and computer program instructions for enabling users of pervasive devices to remotely access and manipulate information in ways that might otherwise be impossible or impractical because of inherent limitations of the device. The disclosed techniques enable a wide variety of data manipulation operations to be performed on behalf of the pervasive device, for a wide variety of content types. In preferred embodiments, no modifications or add-ons are required to the pervasive device.
摘要:
Server capacity is increased on a network computer system. A total number of peers that an individual client will communicate with directly is determined. Then, a total number of clients handled by a server interconnected to the individual client is reduced by the determined total number or peers.
摘要:
Using location-independent names to identify content, a service for mapping endpoint requests to requested content. Content requested by an endpoint of the network is mapped to a dynamic “swarm” of server, peer, or other endpoints capable of supporting the content download. Content names are mapped to a dynamically generated content swarm, presenting a current set of hosts, which can provide the requested content. Optionally, varying degrees of explicit visibility into routing paths and the performance tradeoffs between those routing paths is supported. Based on a set of class of service parameters for a given request for content, a host can initiate route selection based on class of service parameters, predicated on routing metrics maintained by the network by cooperating endpoints and/or network routers.
摘要:
The present invention provides methods, systems, and computer program instructions for providing location-independent packet routing and secure access in a wireless networking environment (such as that encountered within a building), enabling client devices to travel seamlessly within the environment. Each client device uses a constant address. An address translation process that is transparent to the client and server is automatically performed as the device roams through the environment, enabling efficient client migration from one supporting access point to another. The secure access techniques provide user-centric authentication and allow policy-driven packet filtering, while taking advantage of encryption capabilities that are built in to the hardware at each endpoint.