摘要:
A protocol for extending session endpoints in an ad-hoc network environment first performs device discovery to determine local devices within its coverage area and the capability of those devices. These local devices then exchange session descriptions with the endpoint device. If the current session may be supported by one of the local devices, the endpoint device, responsive to a command from an user, transfers the session endpoint to the local device and the endpoint device acts as a proxy for the local device in the session. Optionally, if the local device has a path to the correspondent node that is independent of the path through the endpoint device, it establishes the session along this path and then signal the endpoint node to terminate its session.
摘要:
A method for use in a mobile device to expedite hand-off of mobile devices between access points first detects movement of the mobile device among the coverage ranges of the access points. A mobile device that moves from one access point to another periodically transmits information on the data link level connection of its new access point on the channel used to access its prior access point. A first mobile device that is coupled to access points in a particular area maintains network level access information for access points with which it has communicated. When a new mobile device enters the area, the first device detects the new device and transmits the list to the new mobile device, enabling the new device to connect to an access point without transmitting a router solicitation message or receiving a router advertisement message.
摘要:
The emergency alert service responds to receipt of emergency alert messages by filtering, formatting and routing emergency alert information to a variety of different networked appliances and also to remote devices. In this way, a consistent warning message is disseminated simultaneously over many different warning systems, thus increasing warning effectiveness while simplifying the warning task. The system thus provides a common alerting protocol that is simple but quite robust and capable of exchanging all-hazard emergency alerts and public warnings over all kinds of networks.
摘要:
The emergency alert service responds to receipt of emergency alert messages by filtering, formatting and routing emergency alert information to a variety of different networked appliances and also to remote devices. In this way, a consistent warning message is disseminated simultaneously over many different warning systems, thus increasing warning effectiveness while simplifying the warning task. The system thus provides a common alerting protocol that is simple but quite robust and capable of exchanging all-hazard emergency alerts and public warnings over all kinds of networks.
摘要:
Disclosed is a method for monitoring and control of local or remote premises using a peer-to-peer communication infrastructure. The method uses messages transmitted over the peer-to-peer communication infrastructure to relate various data and control signals.
摘要:
A method is provided for retrieving metadata for content residing in a peer-to-peer network. The method includes: determining a content reference identifier for the content; generating a hash value for the content reference identifier; determining location of a metadata service based on the hash value; and retrieving metadata for the content by accessing the metadata service using the content reference identifier
摘要:
A method for monitoring and control of local or remote premises using a popular Skype™ peer-to-peer communication service is defined. The invented methodology provides for mobile surveillance and control using information infrastructure provided by Skype™ communicator. A combination of hardware and software methodologies utilizes voice, video and text message Skype™ communication channels to relate various sensory data and controls signals. This application is derived from the patent application 60/808,050 filed on May 25, 2006.
摘要:
The file system framework extends availability of current object carousel data, delivered via broadcast stream, to devices and services associated with a networked computer system. The networked computer system, which can be a home network that includes diverse networked home appliances, is made capable of hosting object carousel data in a seamless fashion. Devices and appliances mount and unmount the networked broadcast file system, just as they would any other data store on the network. Mechanisms are provided to refresh copies of the object carousel data. The data can include data files, streams and events. These data can be communicated to devices and appliances, upon request or as unicast, multicast or broadcast data streams. Events can be communicated across the network to cause selected actions to be initiated automatically.
摘要:
A system and method for supplying media content from disparate sources includes tagging media content with an identifier tag useful in synchronization with additional media content, and useful in delivery of the media content. In other aspects, the media content is transmitted to a distribution mechanism adapted to distribute the media content to media delivery devices. In yet another aspect, the media delivery device is adapted to obtain additional media content from a disparate source, adapted to synchronize the media content with the additional media content according to the identifier tag, and adapted to deliver the media content to a consumer according to the identifier tag.
摘要:
A technique for efficiently scanning various datasets in a storage system to generate metadata for shared data blocks is provided. In one embodiment, data containers in an active file system of a storage object are first scanned. Remaining images (e.g., snapshots of the file system) are arranged in a chronological order based on the age of such images in the storage object. In some instances, to perform a metadata scan of a given image, the storage server compares each data container in the given image to a corresponding data container in a prior image (from the chronological order) to identify any non-identical data blocks (i.e., blocks that are not common between the data containers of the two images) in each data container. The metadata scanner then generates metadata only for the non-identical data blocks in each data container and skips metadata generation for any remaining data blocks.