Abstract:
A method for detecting misbehaviour of a peer node within a P2P network is proposed. The method comprises the step to choose a peer node from that network to act as a tester peer. Such a fester peer sends then a testing request message, that testing request message having as target the fester peer itself. The tester peer analyses the behaviour of the P2P network by collecting any possible response message rebted to the testing request message. The tester peer identifies any possible discrepancy with properties governed according to the predefined rules of the P2P network, in case a misbehaviour is found while being unable to identify the misbehaving peer node then a different peer node from the P2P network is chosen to act as a new tester peer till a misbehaving peer couid be identified, or all the peer nodes were tested. Sn the case a misbehaving peer node is identified then latter is isolated from the P2P network.
Abstract:
A method to navigate through content (3, 31 , 32, 33) displayable in a window (1 , 11 , 12, 13) and the like displayed on a screen by using at least one scroll bar (4, 41 , 42r 43, 44, 45, 46) that is movable arranged in a scroll track (5, 51 , 52, 53, 54, 55, 56) at a side (6, 61 , 62, 63) of said window (1 , 11 , 12, 13), is described, wherein by moving said scroll bar (4, 41 , 42, 43, 44, 45, 46) along said scroll track (5, 51 , 52, 53, 54, 55, 56) said content (3, 31 , 32, 33) displayed in said window (1 , 11 , 12, 13) changes, wherein the scroll track (5, 51 , 52, 53, 54, 55, 56) is divided into distinguishable sections (9, 91 , 92, 93, 93’, 93", 93'", 94, 95, 96, 97). Furthermore a computer program product for causing a computer to perform said method, plus a terminal and a server to be used to execute said method are described.
Abstract:
The invention concerns a method of providing a successor list (L) for routing in a peer-to-peer overlay network (N), and a network node and a computer program product to execute this method. The peer-to-peer overlay network (N) comprises a plurality of nodes (0, 20, 60, 87, 112, 140, 179, 200, 211, 223, 240), The successor list (L) specifies identifiers of at least two successor nodes (211, 223) subsequently succeeding a first node (200) of the pfurality of nodes (0, 20, 50, 87, 112, 140, 179, 200, 211, 223, 240) with regard to a topoiogy structure of the peer-to-peer overlay network, it is determined whether the at least two successor nodes (211, 223) listed in the successor list (L) run on the same physical hardware, if the at least two successor nodes (211, 223) run on the same physical hardware, an identifier of at least one additional node (240) of the plurality of nodes (0, 20, 50, 87, 112, 140, 179, 200, 211, 223, 240) which succeeds the at least two successor nodes (211, 223) with regard to the topoiαgy structure of the peer-to-peer overlay network (N) and runs on a different physical hardware than the at least two successor nodes (211, 223) is added to the successor list (L).
Abstract:
Embodiments of the invention concern a method of redundant data storage in a peer-to-peer overlay network (N), and a network node (211) and a computer program product to execute said method. The peer-to-peer overlay network (N) comprises a plurality of nodes (0, 20, 50, 87, 112, 140, 179, 200, 211, 223, 240). A physical hardware on which a first node (211) of said plurality of nodes (0, 20, 50, 87, 112, 140, 179, 200, 211, 223, 240) runs is identified. At least one second node (240) of said plurality of nodes (0, 20, 50, 87, 112, 140, 179, 200, 211, 223, 240) which runs on a different physical hardware than the first node (211) is determined. A replica (203) of data for which the first node (211) is responsible is stored on the at least one second node (240) in addition to or instead of storing a replica (203) of the data on a next logical node (223) of the first node, whereby said next logical node (223) is a node of the plurality of nodes (0, 20, 50, 87, 112, 140, 179, 200, 211, 223, 240) neighbouring the first node (211) with regard to a topology structure of the peer-to-peer overlay network (N).
Abstract:
The application concerns a method for invoking a communication service that is realized by means of a peer of a peer-to-peer system, the method comprising the step of identifying a peer hosting the communication service and invoking the communication service by means of a distributed directory, where the distributed directory carrying entries that enable a client to invoke the communication service, the method further comprising the step of identifying an alternative peer hosting an alternative communication service in case the identified peer or the communication service is unavailable, where the distributed directory carrying entries that enable a client to invoke the alternative communication service. And the application concerns a computer software product and a telecommunication system for providing communication services corresponding to the method.
Abstract:
The present invention concerns a method for automatic integration of content from third-party providers in client-server arrangements comprising at least one client and at least one server. The method comprises downloading by a server data from one or more data sources (3) external to both of the client and the server, filtering the data downloaded from the one or more external data sources (3) and providing a first (1) and a second set (2) of data for a client application (4), the first set of data (1) comprising a copy of the initial data from the external data source (3) and the second set of data (2) comprising a clone of the external data source (3). The present invention concerns further a data management system (100) adapted to implement steps of the method for automatic integration of content from third-party providers in client-server arrangements.
Abstract:
The present invention relates to a method for granting access from a cloud server (2) to a client device (3, 4), comprising the steps of authorizing a user of a first client device (3), receiving an authorization voucher request from the first client device (3), generating an authorization voucher for accessing the cloud server (2), providing the authorization voucher to the first client device (3), receiving the authorization voucher from a second client device (4), granting access to the second client device (4) based on the authorization voucher. The present invention also relates to a cloud server (2) adapted to perform the above method. The present invention further relates to a method for requesting access to a cloud server (2), comprising the steps of authorizing a user using a first client device (3) to the cloud server (2), sending an authorization voucher request from the first client device (3) to the cloud server (2), receiving an authorization voucher for accessing the cloud server (2) at the first client device (3), transmitting the authorization voucher from the first client device (3) to a second client device (4), transmitting the authorization voucher from the second client device (4) to the cloud server (3), and accessing the cloud server (2) from the second client device (4).
Abstract:
Method of managing a network of clients, the method comprising the steps of maintaining a plurality of commands on a server and, in response to receiving a request from a client, composing, based on a property of the client, a command file from the plurality of commands and submitting the command file to the client.
Abstract:
The invention concerns a method of determining a routing path in a peer-to- peer overlay network (H), and a network node (20) and a computer program product to execute said method. The peer-to-peer overlay network (N) comprises a plurality of nodes (O, 20, 50, 87, 112, 140, 179, 200, 211, 223, 240), A physical hardware on which a first node (20) of said plurality of nodes (0, 20, 50, 87, 112, 140, 179, 200, 211, 223, 240) runs is identified. At least one second node (112, 211) of said plurality of nodes (0, 2O, 50, 87, 112, 140, 179, 200, 211, 223, 240) which runs on the same physical hardware as the first node (20) is identified. A data set specifying an identifier of said at least one second node (112, 211 ) is generated. Said data set is stored as a zero-path table associated with the first node (20). When determining said routing path, said data set is accessed and a link (ZL1, ZL2) between said first node (20) and said at least one second node (112, 211) based on said zero-path table is selected.
Abstract:
The invention concerns a method for retrieving content of a distributed directory of a telecommunication system comprising a plurality of nodes (900,..., 2200) arranged in a directed ring topology, the method comprising the steps of identifying a storage location of said content by means of a distributed hashing function, where the hashing function maps an element onto a node, where the node (1300) is responsible carrying elements with a hash value between the node and its successor node. The invention further concerns a corresponding computer software product, telecommunication device, and a telecommunication system.