摘要:
Architecture for exposing a virtual private network of peer devices into the public domain via an overlay network. Computing devices, peripheral devices, as well as mobile devices can be physically distributed, but appear to belong to the same virtual private (or home) network, and be accessible from anywhere. Benefits include access to user media/documents from anywhere, searching of all connected devices from one location, multicast and broadcast connectivity, management of the private network and the associated policies, and device discovery on the private network from across public networks. P2P networks and ad-hoc networks can be exposed as a virtual interface, as well as the utilization of client operating systems to create the virtual network, grouping, graphing, the integration with relay services and other NAT/firewall traversal schemes, and the creation of a P2P overlay manager on a physical NIC (network interface card) address rather than a virtual address.
摘要:
Methods and apparatus for device virtualization and for communication between network devices are described. In one example, all devices on a first Local Area Network (LAN1) which are to communicate with devices on a second Local Area Network (LAN2) have a virtual presence on LAN2, and all the devices on LAN2 which are to communicate with devices on LAN1 have a virtual presence on LAN1, enabling these devices to communicate as if they were located in the same LAN. In another example, a device which uses different networking protocols to other devices on a network is virtualized on its own network, along with all the devices with which it communicates. In either example, the proposed virtualization technique may ensure that virtualized devices appear like physical devices to the other devices such that no modifications of the networking protocol is necessary to interact with a virtualized device.
摘要:
Flexible attributes are attached to network requests that may be executed asynchronously. Any number of criteria may be attached to network requests. The requests are queued until the associated criteria are satisfied. Once the criteria are satisfied, the request is executed. Applications that make the requests are provided with simple success and failure notifications that they can respond to with various logic. Any type of criteria may be attached to a request. The criteria may be associated with the requests at design time of the application using a graphical user interface.
摘要:
Embodiments related to automatically adjusting wireless network settings based upon utilization of a wireless network link by applications are disclosed. For example, one disclosed embodiment provides a method of adjusting a wireless networking setting for a wireless network link. The method includes monitoring data flow through a network interface controller to collect, for each of one or more applications running on the computing device and communicating over the wireless network link, flow performance data comprising information regarding an amount of data flow arising from the application. The method also includes monitoring link data comprising information regarding data being sent and received over the wireless network link, and based upon the flow performance data and the link data, controlling a network interface controller to adjust the wireless networking parameter to change a configuration of the network link.
摘要:
The disclosure describes a system for active channel management in a wireless network. The system may include spectrum monitoring in order to determine channel usage within a wireless network and/or to provide a projected transmission quality for each available channel. Another aspect of the system concerns allowing nodes in a wireless network to exchange spectrum usage data. The system may include renegotiation and handover of data transmission between channels and/or different wireless technologies.
摘要:
Cognitive radio adaptation is employed in WSNs to reduce effects of RF interference. Communication channel quality is assessed locally at each node. Using beacons to propagate channel quality and node related information among the nodes of the network, channel adaptation decision is made either centrally by identifying a channel that is optimum for a majority of nodes through a tree-structure dissemination (Majority Voting Scheme) or in a distributed manner by identifying a channel where maximum interference for any node is less than maximum interference on the other channels (Veto Voting Scheme). If two channels have the same level of maximal interference, the channel with a lesser number is chosen. Channel quality assessment may be optimized based on expected interference type and/or statistical methods.
摘要:
The disclosure describes a method for programming applications for embedded systems such as sensor nodes. In an embodiment, this comprises writing embedded system applications in a high-level language such as C# or Java using a software development framework which includes a set of tools and class libraries. The class libraries contain pre-written code to carry out tasks which may be required of an embedded system. The class libraries may be extended following identification of a need for a particular function in an embedded system. Developed applications may be subsequently stored on the embedded system but executed on a gateway computing device which interacts with the embedded system. This means that the application(s) can be executed without requiring the presence of a virtual execution system located on the embedded system while allowing a high-level programming model for application programmers.
摘要:
The disclosure describes a system for active channel management in a wireless network. The system may include spectrum monitoring in order to determine channel usage within a wireless network and/or to provide a projected transmission quality for each available channel. Another aspect of the system concerns allowing nodes in a wireless network to exchange spectrum usage data. The system may include renegotiation and handover of data transmission between channels and/or different wireless technologies.
摘要:
Embodiments related to automatically adjusting wireless network settings based upon utilization of a wireless network link by applications are disclosed. For example, one disclosed embodiment provides a method of adjusting a wireless networking setting for a wireless network link. The method includes monitoring data flow through a network interface controller to collect, for each of one or more applications running on the computing device and communicating over the wireless network link, flow performance data comprising information regarding an amount of data flow arising from the application. The method also includes monitoring link data comprising information regarding data being sent and received over the wireless network link, and based upon the flow performance data and the link data, controlling a network interface controller to adjust the wireless networking parameter to change a configuration of the network link.
摘要:
Provided is ad-hoc creation of groups based on contextual information comprising. Two mechanisms are used to restrict valid members of a group. First, to make sure that devices are somehow related, devices provide contextual information that is compared to the contextual information provided by other devices willing to join the group. Only devices providing “similar” contextual information are accepted as possible candidates in the group. Second, to scope the group, a time window is used to limit the duration of the group creation. In other words, access to the group is reserved to the devices that can provide similar context information to existing member of the group in a defined time window. Security properties are ensured by enabling a visual check of the list of group participants. For instance, a member can verify that the displayed pictures indeed represent the attendees of an ongoing meeting.