H04L67/1076

METHOD AND DEVICE FOR DISTRIBUTED DATA STORAGE

A method of distributedly storing data in a system comprising a plurality of edge nodes communicatively coupled to an end device and a central cloud. The method includes: receiving, by a first edge node, data transmitted by the end device; assigning, by the first edge node, a data tag to received data according to attributes of the received data and duplicating the received data to generate a tagged data copy; and transmitting, by the first edge node, the tagged data copy to at least one second edge node determined by a data distribution policy determined by the central cloud directly or through the central cloud, so that the at least one second edge node store the tagged data copy in a storage.

Method and device for acquiring bit torrent resource information

A method and a device for acquiring bit torrent (BT) resource information are provided. When interacting with a peered terminal for exchanging the data of a BT resource, in the case that a local terminal does not have the metadata of the BT resource, the local terminal, after performing the BT protocol handshake, determines the number of data slices of the BT resource based on the bitmap A of the BT resource sent by the peered terminal, and then a NOT operation of the bitmap A is performed, and the bitmap B obtained through the NOT operation is fed back to the peered terminal to trigger the peered terminal to send an acquisition request to the local terminal for the data blocks of the BT resource.

System and method of minimizing network bandwidth retrieved from an external network

A system and method are provided of minimizing network bandwidth used from an external network by client peers in a local network. The method can include the operation of organizing a plurality of clients each having media streamlets and a client parent in a structure within the local network. Mapping information propagates through the structure. The mapping information represents local streamlet locations as stored by the plurality of clients. Another operation is retrieving a local streamlet from a client identified in the mapping information as having the local streamlet for the requesting client.

REQUEST RESPONSE METHOD, DEVICE, AND SYSTEM APPLIED TO BIT TORRENT SYSTEM
20210368006 · 2021-11-25 ·

Device and system applied to a bit torrent (BT) system are provided. By directly acquiring the data traffic from a network export device, and responding to the target peer acquisition requests, the target peer acquisition requests are ensured to receive quick response. Also, preferred peer nodes, such as other BT client terminals or cache servers that have physical locations close to and/or share a same network operator with the target BT client terminal, or cache servers that cache all requested resources are selected according to a preset policy to respond the target peer acquisition requests.

EMS assisted fault handling in virtual network function components
11231981 · 2022-01-25 · ·

An example operation may include a method comprising one or more of receiving a heartbeat failure notification message when a VNFCI is in standby state, building, at a VNFCI, a next state request message with standby and heartbeat failure parameters, sending the next state request message to an EMS, retrieving, at the EMS, a peer VNFCI state when the next state request message is received, sending a next state response message to the VNFCI with active state when one or more of: a peer VNFCI admin state is not online, and when a peer VNFCI is not reachable when the peer VNFCI admin state is online, sending a next state response message with standby state when the peer operational state is active, and sending the next state response message with standby to the VNFCI when the request of current issues on resources associated with the VNFCI from the VNFM is received and there are critical issues at the EMS.

Systems and methods for seamless host migration

Systems and methods of the present invention for maintaining network data distribution are provided. Network data may be distributed in such as manner as to allow a network session to weather interrupted communications between host and clients without significant loss of data. Embodiments of the present invention provide for one or more clients to serve as backup host(s) for the network session. When the other clients transmit data to the host, they may also transmit the data to one or more backup hosts if there are any indications of interrupted communication.

Decentralized content fabric
11218409 · 2022-01-04 · ·

Disclosed are examples of systems, apparatus, devices, computer program products, and methods implementing aspects of a decentralized content fabric. In some implementations, one or more processors are configured to execute a software stack to define a fabric node of a plurality of fabric nodes of an overlay network situated in an application layer differentiated from an internet protocol layer. The defined fabric node is configured to: obtain a request for digital content from a client device; obtain, from one or more of the plurality of fabric nodes, a plurality of content object parts of a content object representing, in the overlay network, at least a portion of the digital content; generate consumable media using: raw data stored in the content object parts, metadata stored in the content object parts, and build instructions stored in the content object parts; and provide the consumable media to the client device. In some instances, the consumable media is further generated using a digital contract stored in a blockchain.

Decentralized ledger system and method for enterprises

A method for improving data flow and data security in an existing wireless communications network comprising a central node and a plurality of remote nodes, during band-width-limiting conditions, the method including generating, by a processor at the central node, a hybrid network overlay to the existing wireless communications network, the hybrid network overlay including a remote overlay node for each remote node and a central overly node for the central node. The method further includes maintaining a distributed ledger having a blockchain architecture, the distributed ledger storing data transmitted among the central node and the remote nodes, including designating remote nodes as super nodes comprising using a link sensing mechanism and remote node processing characteristics to identify remote nodes having links with sufficient bandwidth and sufficient processing capacity to aggregate transactions and validate blocks, each super node participating in a block validation process using the hybrid network overlay.

ACCESS CONTROL AND OWNERSHIP TRANSFER OF DIGITAL CONTENT USING A DECENTRALIZED CONTENT FABRIC AND LEDGER
20230318972 · 2023-10-05 · ·

Disclosed are examples of systems, apparatus, devices, computer program products, and methods implementing aspects of a decentralized content fabric. In some implementations, one or more processors are configured to provide fabric nodes of an overlay network, including one or more fabric nodes that receive a client’s request to access digital content on the overlay network. The request includes an authorization token digitally signed by or on behalf of a user of the client. The fabric node(s) extract a user identifier (ID) from the authorization token, then determine that one or more rules maintained on the overlay network are satisfied. The one or more rules condition access to the digital content upon the extracted user ID matching an ID associated with an owner of a digital instrument. The digital instrument, which can be a non-fungible token, is stored in a blockchain ledger as a unique representation of the digital content.

Policy constraint framework for an SDDC

Some embodiments of the invention provide a method for processing requests for performing operations on resources in a software defined datacenter (SDDC). The resources are software-defined (SD) resources in some embodiments. The method initially receives a request to perform an operation with respect to a first resource in the SDDC. The method identifies a policy that matches (i.e., is applicable to) the received request for the first resource by comparing a set of attributes of the request with sets of attributes of a set of policies that place constraints on operations specified for resources. In some embodiments, several sets of attributes for several policies can be expressed for resources at different hierarchal resource levels of the SDDC. The method rejects the received request when the identified policy specifies that the requested operation violates a constraint on operations specified for the first resource.