This application is related to the following applications, all of which are incorporated herein by reference in their entireties: application Ser. No. 11/755,808, published as U.S. Pub. No. 2008/0299988; application Ser. No. 11/755,780, published as U.S. Pub. No. 2008/0298327; application Ser. No. 11/755,775, published as U.S. Pub. No. 2008/0301017; and application Ser. No. 11/755,782, published as U.S. Pub. No. 2008/0300890.
The invention generally relates to methods and systems to establish and execute market-driven variable price offerings among the lenders and borrowers in a bandwidth-sharing ad hoc network for shared bandwidth usage.
Mobile computing is becoming increasingly pervasive, and will approach ubiquity in wireless devices (e.g., notebook computers, smart phones, personal digital assistants (PDAs), etc.) over the next decade. One consistent trend in this mobile computing space is the fact that such platforms increasingly communicate over a variety of wireless protocols. Common protocols in use today for wireless data transfer include EV-DO, IEEE 802.11a/b/g, ZigBee® (registered trademark of ZIGBEE ALLIANCE of California), Bluetooth® (registered trademark of BLUETOOTH SIG, INC. of Delaware), and many other related protocols. By their very nature, differentials do exist, and will continue to exist, between the speed, or bandwidth, with which mobile devices can communicate with each other, vis-à-vis communications speeds with the broader network where a device's target data may reside.
It is often the case that a wireless device will have a relatively fast wireless connection to other local devices and a relatively slow wireless connection to the broader network (e.g., the Internet). For example, local wireless connections, provided by protocols such as IEEE 802.11a, 802.11b, 802.11g, 802.15.1 (e.g., Bluetooth®), and 802.15.4 (e.g., Zigbee®) provide fast data transfer rates of about 3 to 54 megabits per second (Mbps). However, such transfer protocols often have a limited maximum transmission range of about 30 to 300 ft. On the other hand, wireless telephony protocols (e.g., EV-DO, CDMA, EDGE, GPRS, etc.) have relatively large maximum transmission ranges on the order of miles, but only provide data transfer rates of about 10 kilobits per second (kbps) to 1 Mbps. Thus, while a user of a mobile device may enjoy relatively fast data transfer amongst local devices, the user is often limited to a slow wireless connection to the outside world (e.g., the Internet).
However, unless mechanisms exist to motivate network nodes (and their owners) to lend their excess bandwidth at any given moment, it may be difficult for borrowers to obtain the bandwidth needed for any given download.
Accordingly, there exists a need in the art to overcome the deficiencies and limitations described hereinabove.
In a first aspect of the invention, a method comprises establishing and executing market-driven variable price offerings among lenders and borrowers. A bandwidth-sharing ad hoc network for shared bandwidth usage is formed based on the established and executed market-driven variable price offering.
In another aspect of the invention, a method comprises requesting to borrow bandwidth from a lender and receiving acknowledgment as to whether there is a conflict. If there is a conflict, the conflict is resolved. The method further comprises establishing the ad hoc network when there is no conflict with the lender.
In another aspect of the invention, a method comprises providing a computer infrastructure being operable to establish and execute market-driven variable price offerings among lenders and borrowers. The method further comprises providing a computer infrastructure being operable to form a bandwidth-sharing ad hoc network for shared bandwidth usage.
In another aspect of the invention, a computer program product comprises a computer usable medium having readable program code embodied in the medium. The computer program product includes at least one component to establish and execute market-driven variable price offerings among lenders and borrowers to form a bandwidth-sharing ad hoc network for shared bandwidth usage.
The invention generally relates to methods and systems to establish and execute market-driven variable price offerings among lenders and borrowers in a bandwidth-sharing ad hoc network for shared bandwidth usage. The present invention can be implemented in either a peer-to-peer environment or a multiplexed environment. In a multiplexed environment, the multiplexer may be either within the ad hoc network or outside of the ad hoc network.
By implementing the methods and systems of the invention, e.g., methods and systems to establish and execute market-driven variable price offerings among the lenders and borrowers in a bandwidth-sharing ad hoc network for shared bandwidth usage, multiple disparate wireless connections in conjunction with multiple devices using a variety of service providers, for example, can be used to create a single virtual fat pipe for transmission of data over a network. The individuals sharing their current connections, i.e., bandwidth, acting as gateway devices, are “lenders” of bandwidth; whereas, the individuals requiring additional bandwidth are “borrowers.” By implementing the systems and methods of the invention, lenders are able to quickly establish, execute, and modify price offerings for bandwidth-sharing ad hoc networks.
In general, the processor 20 executes computer program code, which is stored in memory 22A and/or storage system 22B. While executing computer program code, the processor 20 can read and/or write data to/from memory 22A, storage system 22B, and/or I/O interface 24. The bus 26 provides a communications link between each of the components in the computing device 14. The I/O device 28 can comprise any device that enables an individual to interact with the computing device 14 or any device that enables the computing device 14 to communicate with one or more other computing devices using any type of communications link.
The computing device 14 can comprise any general purpose computing article of manufacture capable of executing computer program code installed thereon (e.g., a personal computer, server, handheld device, etc.). However, it is understood that the computing device 14 is only representative of various possible equivalent computing devices that may perform the processes described herein. To this extent, in embodiments, the functionality provided by computing device 14 can be implemented by a computing article of manufacture that includes any combination of general and/or specific purpose hardware and/or computer program code. In each embodiment, the program code and hardware can be created using standard programming and engineering techniques, respectively.
Similarly, the computer infrastructure 12 is only illustrative of various types of computer infrastructures for implementing the invention. For example, in embodiments, the computer infrastructure 12 comprises two or more computing devices (e.g., a server cluster) that communicate over any type of communications link, such as a network, a shared memory, or the like, to perform the processes described herein. Further, while performing the processes described herein, one or more computing devices in the computer infrastructure 12 can communicate with one or more other computing devices external to computer infrastructure 12 using any type of communications link. The communications link can comprise any combination of wired and/or wireless links; any combination of one or more types of networks (e.g., the Internet, a wide area network, a local area network, a virtual private network, etc.); and/or utilize any combination of transmission techniques and protocols.
In embodiments, the invention provides a business method that performs the steps of the invention on a subscription, advertising, and/or fee basis. That is, a service provider, such as a Solution Integrator, could offer to perform the processes described herein. In this case, the service provider can create, maintain, deploy, support, etc., a computer infrastructure that performs the process steps of the invention for one or more customers. In return, the service provider can receive payment from the customer(s) under a subscription and/or fee agreement and/or the service provider can receive payment from the sale of advertising content to one or more third parties.
By way of example, the service provider may provide market-driven variable price offering information according to the embodiments of the invention, and provide a table or other schema to a potential lender with the calculated price offering information in accordance with different market-driven variable pricing schemes. The table or other schema, for example, can be downloaded on a predetermined basis such as on a daily basis in order for the potential lender to set a market-driven variable price offering in accordance with the preset schemes in response to a borrower's request for bandwidth. For example, in embodiments, the service provider may provide average self-identified priorities of other nodes to a particular node. As explained further below, a node may utilize this information to determine a market price for shared bandwidth.
“Ad hoc” relationships are becoming increasingly important in the communal sharing of immediately available resources, and most particularly, the sharing of bandwidth. With the creation of peer-to-peer networks and bit torrent type services a file may be stored in a large number of locations to allow very fast download of the file in sections simultaneously from multiple locations. Groups of devices may congregate, or coexist, in one place and each may have limited bandwidth to the outside world. However, the groups of devices may have high bandwidth to other devices within close proximity. An example is a 802.11g local area connection that creates a high-speed wireless connection between two cellular phone devices within close range (high bandwidth), and wherein the cellular phones' cellular connection to the outside world may provide bandwidth at less than one percent of the 802.11g connection.
In embodiments of the invention, market-driven variable price offerings for a lender to charge a borrower or borrowers for shared bandwidth usage in a bandwidth-sharing ad hoc network are determined. In embodiments, a potential lender may determine the price offerings for lending bandwidth to a borrower by offering a price and waiting for borrowers to accept the offered price. Additionally, in embodiments, a potential lender may determine the price offerings for lending bandwidth to a borrower by conducting an auction. Furthermore, in embodiments, a potential lender may determine the price offerings for lending bandwidth to a borrower by receiving each potential borrower's required criteria for their requested bandwidth and determining whose required criteria will command the highest price. Additionally, in embodiments, a potential lender may determine the price offerings for lending bandwidth to a borrower by sharing their bandwidth amongst all the potential borrowers and setting a price for each borrower proportional to their respective borrowed bandwidth. Further, in embodiments, a potential lender may determine the price offerings for lending bandwidth to a borrower by accounting for node affinities amongst the members of the bandwidth-sharing ad hoc network.
In order to utilize the market-driven price offerings for bandwidth-sharing ad hoc networks, an ad hoc network may be created between one or more borrower nodes and one or more lender nodes. This process may include both an initial discovery mechanism of the proposed role each node may play, and a negotiation and acceptance of the agreed price a lender may charge a borrower for lending bandwidth to the borrower.
In this implementation, a borrower B may request information, e.g., transfer of files, from a central location, CL (or distributed locations). To increase its bandwidth capacity, the borrower B may request bandwidth from any of the lenders, L1 or L2 via any known wireless protocol. By way of example, upon a broadcast request from the borrower B, any of the lenders, L1 or L2 may allow the borrower B to use their excess bandwidth for file transfers with the central location, CL (or distributed locations). Upon authorization, the lenders, via a wireless protocol, for example, will download information from the central locations, CL (or distributed locations), and send this information to the borrower, B, thus effectively increasing the borrower's bandwidth. It should be understood that data could be transferred from distributed locations, rather than the central location, CL.
In order to form a new ad hoc network, a borrower may scan all available potential lenders and prioritize the potential lenders for a data transfer. The formation of the ad hoc network, in embodiments, may use a “borrower/lender” table as shown in
In the borrower/lender table of
The “Price” column may be a price set by the lender to use the lender's bandwidth. The price may be stated in a price/data volume, a price/time, a price/data volume and a price/time, a price/time with a data cap, or a one-time price. Additionally, the price may be stated as a number of minutes to be used in a wireless service plan or any other charging mechanism.
In aspects of the invention, a borrower and a lender may not see all of the “borrower/lender” table on their respective devices, and some of the table information may be generated automatically. The user interface may require less display space and may require less user input. For example, the location of a lender's device or borrower's device may be known by the device itself. Thus, the user may not need to complete this portion of the table. Rather, the information for that portion of the table would be automatically completed by the device. Furthermore, the automatic generation of the information in the table may also apply to the Node Type, Node Name, Service Level Objective, Price and Current Quality of Service columns. For example, a borrower may have preset levels of service level objectives that they require whenever they borrow bandwidth, so that generation of the Service Level Objective column may be performed automatically by the borrower's device. Additionally, a potential lender may have a set price for lending bandwidth already input into their device, such that the Price column information is automatically generated.
In one illustrative example, a borrower may initially generate the table by clicking on an icon, and when prompted, input the File Requested for Download information. The borrower's device could generate the remaining portions of the information in the table. When a potential lender receives the borrower's request, their device may simply prompt for a decision to be a lender. If the potential lender answers “yes”, then their device may prompt the potential lender for a price. As set forth above, the rest of the information in the table may be generated automatically. An illustrative formation and rearrangement of a bandwidth-sharing ad hoc network architecture is set forth in application Ser. No. 11/755,775.
In embodiments, a borrower completes one line of a new table to describe their node. At this stage, the node name, type, location and file requested columns may be completed. For example, as shown in TABLE 1, Borrower 1 would complete the table showing current location on a Wi-Fi Network called ‘Airport’, with IP address 192.168.2.3, to download a file from http://location.com/myfile. At this stage, the other columns may remain blank.
The borrower broadcasts the table to request potential lenders to form an ad hoc network. This broadcast, in embodiments, includes the table for completion by any available nodes within range that could be used to form the ad hoc network. The table may be broadcast over the wireless network using a plurality of different protocols such as Bluetooth®, Wi-Fi or Cellular. The table can be represented in binary, xml, text or other data format optimized for the type of data transport.
A node receives the broadcast, including the table, and a potential lender completes necessary information in the table, including the price information. For example, as shown in TABLE 2, below, Lender 1 is a node on the same Wi-Fi network ‘Airport’ and is able to perform lender functions for $5/MB at a rate of 1 kb/second. The “File Requested for Transfer” column may remain blank, because the borrower has not yet decided which of the potential lenders will be part of the bandwidth-sharing ad hoc network. Additionally, the “Current Quality of Service” column may remain blank, because no bandwidth sharing has occurred yet.
Lender 1 may send back this information, including the pricing information, to Borrower 1. The filling and retransmitting of the table, may be repeated for other potential lenders of bandwidth in the ad hoc network. In this manner, the table may gradually be built up such that borrower can select lenders to use.
For example, as shown below in TABLE 3, additional nodes, Lender 2 and Lender 3, provided the information for each lender, and this information has been tabulated by the borrower, upon receipt. In this example, Lender 2 is on a Bluetooth® Network and can download the file requested for transfer at a price of $10/MB and a rate of 2 kb/second. Additionally, Lender 3, is on some other protocol, and can download the file requested for transfer at a price of $10/MB and a rate of 5 kb/second.
To initiate the download, the borrower may determine, from the information in the table, including the price information, which lenders to use and for which portions of the data. The borrower may borrow bandwidth from the lenders to complete the download.
As in all of the embodiments, the descriptions of pricing methodologies described herein pertain to both multiplexed and non-multiplexed networks. With market-driven variable price offerings, consideration is given to the number of potential lenders or borrowers in a given ad hoc network area. In other words, the borrower may “play” competing lenders against each other, and the lenders may be working to ensure the highest prices for their offerings based on the number of borrowers.
In each case, the pricing policy may go into effect once a given mobile device, or node, has “decided” to become a lender, in response to the broadcasted table. The value of each price offering may be included in the wireless negotiations between devices, however, different implementations may be possible.
With the below disclosed embodiments, the node may be considered the node device or the user of the node, i.e., node user. The node device is the device being used to connect to others in the ad hoc network and lend or borrow bandwidth. The node user is the person using the node device. Additionally, while the invention is described in terms of downloading, in embodiments, a node may desire to upload data. The same analysis would apply for uploading data as it does to downloading data, as a node may still need to borrow bandwidth to accomplish the upload.
Offer and Wait
In embodiments, a lender node may determine a market-driven price to share bandwidth by making an offer and waiting for borrowers. In embodiments, this decision to offer and wait may be made in a transparent fashion, such that the node device “makes” the decision and executes the offer to share bandwidth without the node user's explicit action or knowledge.
In embodiments, an “offer and wait” action may be either unilateral or multilateral in nature. With a unilateral offer, a prospective lender node may offer bandwidth and await responses regardless of the quantitative offers being put forth by other prospective lenders in the bandwidth sharing ad hoc network. Conversely, with a multilateral offer, a potential lender node may take into account the quantitative pricing for shared bandwidth offers put forth by other prospective lenders in the ad hoc network. If, for example, other lender nodes are offering to share bandwidth for relatively higher prices, then a potential lender node may likewise put forth a higher price for lending bandwidth, but possibly marginally below other available offers. On the other hand, if the outstanding offers from other lender nodes are relatively low in price, then a potential lender node may put forth a correspondingly low price, or may decide to not make an offer to share bandwidth.
Auction
In embodiments, a potential lender node may use an auction method to determine a market-driven price to share bandwidth. In this respect, a potential lender node may announce an auction, then offer to share bandwidth for a specified price determined by the auction. The understanding for this methodology, vis-a-vis the “offer and wait,” is that a price may be offered, and a short wait period may ensue. During this wait period, depending on implementation options, a bidding node may or may not be able to withdraw their offer without penalty. If a higher offer is received by the potential lender node during the wait period, another wait period may ensue, during which higher offers may be entertained. Depending on implementation options, the number of subsequent wait periods may be capped or uncapped. Once no higher offer follows, the highest offer may be accepted by the lender, and a bandwidth-sharing ad hoc network may be established.
While the auction has been described as potential borrowers bidding for shared bandwidth causing a price for shared bandwidth to rise, it should be understood that, in embodiments, the auction may be a reverse auction. In a situation where an ad hoc network has an oversupply of bandwidth lenders, the market may be considered a bandwidth borrower's market. In this situation, the lenders may bid to sell bandwidth. In this situation, the prices for shared bandwidth may decline as potential lenders under bid each other.
Additionally, while the auction was described as being publicized so that other lenders and borrowers could see incoming bids for shared bandwidth, in embodiments, the auction may be sealed. With a sealed auction, a potential borrower of bandwidth may not see the other potential borrowers' offers.
Other General Principles
In embodiments, the pricing of offers for shared bandwidth that occur under the auspices of these architectural principles may be in a variety of measurements and/or units. Either “offer and wait” or auction offerings may be executed for a variety of specified metrics, including but not limited to:
From a bandwidth borrower's perspective, in embodiments, a borrower node may elect to either take part in auctions or to only participate in “offer and wait” negotiations. With either of these options, in embodiments, a borrower node user may be actively engaged in the process. Alternatively, in embodiments, a borrower node device may take actions to accomplish the borrower node user's bandwidth goals in a transparent fashion. In embodiments, this may be accomplished through predefined definition of the node user's priorities, both in terms of download importance and cost sensitivity, as discussed in more detail below.
In embodiments, a conflict may arise when a borrower node requests to borrow bandwidth from a lender already engaged with another borrower node, when multiple borrower nodes simultaneously request to borrow bandwidth from the same available lender node, or when multiple borrower nodes simultaneously request to borrow bandwidth from the same lender already engaged with another borrower node. In embodiments, the processes described herein for handling simultaneous bandwidth sharing may be based firstly, on providing options for the borrowers to avoid the conflict, and secondly, on providing options for a multiplexer or a lender to handle the conflict if it occurs.
In embodiments, when a conflict scenario arises, the advantage may go to the lender node as the lender node has more bargaining power over each borrower node. In this situation, the lender may naturally seek to maximize the price for shared bandwidth. In contrast, borrowers may seek to minimize the costs and/or time required for using the shared bandwidth.
It is noted that “simultaneous” may be defined for the sake of this disclosure as an interval during which decision logic will base such offers as indistinguishable in time. Of course, in a finely granular race condition, any such offer will occur at some marginal instant before or after another. Even with this statement, given that such negotiations would occur in a high speed, short time-line fashion, it is recognized that intervals will exist during which offers are collected for “side by side” comparison. Offers coming in during such intervals may, for the sake of discussion, be considered simultaneous.
In embodiments, both multiplexed and peer-to-peer environments are considered. Within the multiplexed gateway environment, in embodiments, each borrower and lender may be registered with a multiplexing service provider prior to lending or borrowing bandwidth in a bandwidth-sharing ad hoc network. In embodiments, this may be a multiplexer within the ad hoc network or this may be a multiplexing service not within the ad hoc network.
In embodiments, in order for a borrower to obtain borrowed bandwidth from other nodes, the borrower node may scan the available lender nodes in the ad hoc network. The borrower node may submit a request to a multiplexer with a given lender node to which the borrower node would like to connect, or may submit a request directly to a lender node. In embodiments, the multiplexer or lender node may connect the borrower node and the lender node after the borrower agrees to the pricing terms and conditions set by the multiplexer on behalf of the requested lender node, or set by the lender node. However, a conflict may arise if the requested lender is already engaged, e.g., currently sharing bandwidth with another borrower. Additionally, a conflict may arise if more than one borrower simultaneously requests to borrow bandwidth from the same available lender node. Further, a conflict may arise if more than one borrower simultaneously requests to borrow bandwidth from the same currently unavailable lender node.
Conflict Scenario: Lender Node Engaged
In embodiments, with a first conflict scenario, a potential borrower requests to borrow bandwidth from a lender while the lender is currently unavailable, already sharing his bandwidth with another borrower. In this scenario, the lender may not be able to allow the potential borrower to join their bandwidth-sharing ad hoc network, because this may violate the terms and conditions that are agreed between the lender and the current borrower.
In embodiments, in a multiplexed environment, the multiplexer may act on behalf of the lender to ask if the potential borrower can wait until the current borrower is finished with the shared bandwidth. In embodiments, if the potential borrower's reply is “yes”, then the potential borrower would wait, and the multiplexer may notify the potential borrower when the lender's bandwidth is available. If a potential borrower's reply is “no”, then the potential borrower may attempt to borrow bandwidth from another lender in the ad hoc network. In embodiments, within a multiplexed environment, the lender node may not need to make any decision for either situation. Rather, the decisions may be performed by the multiplexer.
Alternatively, in embodiments in a peer-to-peer environment, the lender may ask if the potential borrower can wait until the current borrower is finished with the shared bandwidth. In embodiments, if the potential borrower's reply is “yes”, then the potential borrower would wait, and the lender may notify the potential borrower when their bandwidth is available. If a potential borrower's reply is “no”, then that potential borrower may try to borrow bandwidth from another lender in the ad hoc network.
Conflict Scenario: Simultaneous Bandwidth-Sharing Requests
In embodiments, with a second conflict scenario, multiple potential borrowers may request to borrow bandwidth from an available lender simultaneously. In embodiments, when each potential borrower submits a request to the multiplexer or lender to borrow bandwidth from the lender, the multiplexer or lender may acknowledge each borrower's request and determine a percentage of bandwidth that the lender is willing to lend and the amount of that bandwidth.
In the multiplexed environment, in embodiments, the lender may have determined pricing policies with the multiplexing service provider ahead of time. The predetermined pricing policies may give the multiplexer the authority to act on behalf of the lender for decision making and may help to automate the negotiation process.
In embodiments, multiple potential borrowers may submit simultaneous requests to the multiplexer or lender for borrowing bandwidth from the same lender. In embodiments, the multiplexer (in a multiplexed environment) or lender (in a peer-to-peer environment) may realize there is a conflict and may suggest each potential borrower attempt to borrow bandwidth from another lender in the ad hoc network. If any of the potential borrowers would like to try another lender, then those potential borrowers may withdraw their requests. In embodiments, in a peer-to-peer environment, no further lender action may be needed for those potential borrowers who have withdrawn their requests. Further, in embodiments, in a multiplexed environment, no further multiplexer action may be needed for those potential borrowers who have withdrawn their requests with regards to an agreement with the initially requested lender.
In embodiments, for the remaining potential borrowers who prefer to borrow from the requested lender notwithstanding the fact that there are multiple potential borrowers who are requesting to borrow bandwidth from the same lender, the multiplexer or lender may prompt each potential borrower to determine criteria for the bandwidth that is required. In embodiments, this criteria may be a determination of how much bandwidth is required. Alternatively, in embodiments, the criteria may be, e.g., Quality of Service stipulations.
In embodiments, the determination of how much bandwidth that is required may be a determination of a time of bandwidth-sharing each potential borrower needs from the lender. To determine a time of bandwidth sharing each potential borrower needs, in embodiments, each potential borrower may use the following equation:
Time required=file size/Lender's bandwidth. (1)
The time required is the time required for each borrower, the file size is the size of the file the borrower would like to download, and the Lender's bandwidth is the bandwidth the Lender has available to share.
In embodiments, if each potential borrower knows their respective criteria for the bandwidth required (e.g., how much time is needed for a download), then the multiplexer or lender may arrange a bandwidth-sharing ad hoc network between the lender and the borrower with the criteria that will command the highest price. In embodiments, the criteria that may command the highest price may be the longest bandwidth usage need. Further, in embodiments, the criteria that may command the highest price may be the highest quality of service. Additionally, the criteria that may command the highest price may be a combination of criteria, e.g., a longest bandwidth usage need at the highest quality of service level. In embodiments, this is based on the principle of maximizing the lender's profit. For example, the longer the time a borrower uses the shared bandwidth, the more the borrower will pay the lender. Additionally, it is noted that the multiplexer or lender may make a determination as to which criteria may command the highest price by comparing potential borrowers' corresponding criteria (i.e., potential borrower A's bandwidth required with potential borrower B's bandwidth required).
If any of the potential borrowers does not know their criteria (e.g., how much time is needed to accomplish a download), the multiplexer or lender may not be able to predict the amount of compensation that the lender would make from each of the potential borrowers based on their respective required criteria, or which potential borrower's criteria may command the highest price. In this situation, in embodiments, the multiplexer or lender may give each of the potential borrowers the following options:
a) Start an auction;
b) Share bandwidth with all the other requesters; and/or
c) Withdraw the request.
With the first option, in embodiments, the potential borrower with the highest bid may win the opportunity to borrow bandwidth from the lender. With the second option, in embodiments, the lender's bandwidth may be divided amongst the number of potential borrowers. This may reduce the speed of bandwidth each borrower is lent, as compared to the situation of only one borrower using the lender's full available bandwidth. However, in embodiments, with the second option, the lender's price charged to each borrower may be reduced due to the reduced bandwidth each borrower is lent. With the third option, in embodiments, a potential borrower may withdraw their request and attempt to borrow bandwidth from another lender.
After the multiplexer or lender has received a choice of action for each potential borrower (i.e., auction, share or withdraw), the multiplexer or lender may allow those potential borrowers who would like to withdraw their requests to do so. Further, the multiplexer or lender may decide to carry out an auction as long as at least one of the potential borrowers has requested an auction. Alternatively, if none of the potential borrowers has requested an auction or withdrawn their request, then the lender's available bandwidth may be shared among all the remaining potential borrowers. In embodiments, with the sharing option, the lender's available bandwidth may be shared equally or unequally amongst the remaining borrowers.
For example, assume a lender has 1.5 Mbps of bandwidth, and is willing to share 60% (0.9 Mbps) of the bandwidth and reserve 40% of the bandwidth for its own use. Further, with this example, assume there are three potential borrowers. If each of the potential borrowers is willing to share the bandwidth at the same time, and none of the potential borrowers would like to withdraw their request or conduct an auction, each potential borrower may be given one third of the lender's shared bandwidth. With the above example, each borrower may borrow 0.3 Mbps of bandwidth from the lender. The price per minute of bandwidth usage may be less since each borrower is using only a portion of the lender's total available bandwidth.
Alternatively, if there is at least one potential borrower who has requested an auction, the multiplexer or lender may initiate an auction. In embodiments, the multiplexer or lender may set a starting bid, an incremental amount and a duration of the auction, which may be a relatively short period as compared to a traditional auction, e.g., a few seconds. Each potential borrower may place one or multiple bids until the auction ends. The multiplexer or lender may award the borrower with the highest bid the lender's available bandwidth.
Conflict Scenario: Hybrid
In embodiments, with a hybrid conflict scenario, multiple potential borrowers may simultaneously request to borrow bandwidth from a currently unavailable lender already engaged with a current borrower (or borrowers). This hybrid conflict scenario is a hybrid of the two above-described conflict scenarios. In embodiments, with this hybrid scenario, the multiple potential borrowers may wait until the lender's bandwidth is available, in a similar manner to the Lender Node Engaged conflict scenario. However, once the bandwidth is available to share, rather than initiating the bandwidth sharing with one borrower, according to the Lender Node Engaged conflict scenario, the multiplexer or lender may resolve the conflict according to Simultaneous Bandwidth-Sharing Requests conflict scenario, set forth above.
The steps of the flow diagrams described herein may be implemented in the environment of
Furthermore, the invention can take the form of a computer program product accessible from a computer-usable or computer-readable medium providing program code for use by or in connection with a computer or any instruction execution system. The software and/or computer program product can be implemented in the environment of
If the potential borrower is not willing to wait, at step 520, the potential borrower may try another lender. If, at step 515, the potential borrower is willing to wait, the potential borrower may wait a predetermined period of time. After passage of the period of time, at step 525, a determination may be made as to whether the lender is still engaged with the current borrower. If the lender is still engaged, at step 515, the multiplexer or the lender may again ask if the potential borrower is willing to wait until the lender is finished sharing bandwidth with the current borrower.
If, at step 525, the lender is no longer engaged with the current borrower, at step 530, the multiplexer or lender may notify the potential borrower that the lender's bandwidth is available to share. At step 535, bandwidth sharing may be initiated.
At step 615, the multiplexer or lender may ask each of the potential borrowers if they are willing to try to borrow bandwidth from another lender. If a potential borrower is willing to try another lender, at step 620, that borrower may try another lender. If a potential borrower is not willing to try another lender, at step 625, the multiplexer or lender may ask each of the remaining potential borrowers to determine their bandwidth-sharing criteria needed.
At step 630, a determination is made as to whether all of the remaining potential borrowers know the criteria for their bandwidth needs. If all of the remaining potential borrowers know the criteria for their bandwidth needs, at step 635, each remaining potential borrower may transmit their bandwidth criteria needs to the multiplexer or lender. At step 640, the multiplexer or lender may select a borrower based on the determined criteria. At step 670, bandwidth sharing may be initiated through the bandwidth-sharing ad hoc network.
If, at step 630, not all of the remaining potential borrowers know the criteria for their bandwidth needs, at step 645, the multiplexer or lender may ask each remaining potential borrower if they would like to withdraw their request for bandwidth. If a remaining potential borrower would like to withdraw their request, at step 620, that borrower may try to borrow bandwidth from another lender.
At step 650, for the remaining potential borrowers which would not like to withdraw, the multiplexer or lender may ask whether any potential borrower would like to request an auction. If any of the remaining potential borrowers requests an auction, at step 660, the multiplexer or lender may conduct an auction. At step 665, the multiplexer or lender may award the highest bidding potential borrower with the lender's lent bandwidth. At step 670, bandwidth sharing may be initiated through the bandwidth-sharing ad hoc network.
If at step 650, none of the remaining potential borrowers requests an auction, at step 655, the multiplexer or lender may split the lender's available bandwidth amongst the remaining potential borrowers. In embodiments, the splitting of the lender's available bandwidth may be an equal splitting. At step 670, bandwidth sharing may be initiated through the bandwidth-sharing ad hoc network.
At step 720, a determination is made as to whether the auction duration has expired. Additionally, in embodiments, the multiplexer or lender may determine whether the number of wait periods has been exceeded. If the auction duration has not expired (or number of wait periods not been exceeded), at step 710, the potential borrowers may submit a bid to the multiplexer or lender. If the auction duration has expired (or number of wait periods been exceeded), at step 725, the multiplexer or lender may award the highest bidding potential borrower with the lender's available bandwidth.
In embodiments, with the hybrid conflict scenario, the multiple potential borrowers may wait until the lender's bandwidth is available, in a process similar that for the Lender Node Engaged conflict, shown in
In certain threshold conditions, in embodiments, node users and/or the node devices may decide to reverse their role from lender to borrower, or vice versa, based on, e.g., the dynamic market-driven price for borrowed bandwidth. These threshold conditions may arise because the highly fungible commodity of bandwidth is one which at any given instant can be either bought or sold by most or all nodes in the ad hoc network. For example, a node user who is performing frequent web page downloads may be saturating their native bandwidth functionality during 60% of any chosen time window. Under many circumstances, this node user may decide to acquire additional bandwidth, so as to speed their native downloads. However, under other circumstances, this same node user may decide that reversing their role, i.e., becoming a lender, is the appropriate course of action.
In embodiments, the spectrum of roles available makes certain presumptions about the relationship of a given node user to their own native (or lendable) bandwidth, as well as their relationship to other external (or borrowable) bandwidth. Relationships to native (or lendable) bandwidth include the following:
With the above context, it should be understood that as the market-driven price goes down, a given node may be more likely to become a borrower, and vice versa. Secondly, it is further understood that as a given node user's bandwidth need priority goes up, they may be more likely to become a borrower, and vice versa. Extrapolating this idea into a broader sphere, for any given ad hoc network, as the collective bandwidth priority increases, the number of borrowers increases. For example, a Monday morning commute with business people armed with mobile devices, or any crowd forming as breaking news is explored on these devices, may result in a scenario where the collective priority for data is high. Under such conditions, more borrowers may naturally be expected, so market-driven prices may rise. Conversely, under more placid conditions, the trend may reverse, more lenders may appear in the network, and the market-driven prices may decline.
From the above description, it is understood that a valuable piece of the bandwidth-sharing architecture is to allow each node user to select/adjust both their cost-sensitivity and bandwidth priority on their mobile device. In embodiments, this may be accomplished via a single sliding scale (“give me my data now” versus “I want to save/make money”). Alternatively, in embodiments, this may be accomplished via two separate sliding scales. Given this metric for each user, the associated mobile device may self-adapt according to the broader group dynamics. If the cost/price of bandwidth increases, and if a node user's self-identified bandwidth need priority is less than an average self-identified priority, the node may decide to change their role from a borrower to a lender. In embodiments, definition of such priorities may be made in advance, so that the decision processes reached by the node devices may be automated, and either transparent or near-transparent (e.g., a subtle notification provided only that a change had occurred) to the node user. Additionally, in embodiments, a multiplexing service provider or central server may serve as a central register or a clearing house of information, e.g., maintaining and providing, e.g., average self-identified priorities of other nodes. Additionally, in embodiments, these settings may also include options to “remain a borrower no matter what external factors are at play,” or “remain a lender no matter what external factors are at play.”
Furthermore, in embodiments, sensitivities to bandwidth sharing may be prioritized by functionality. If, for example, a particular node user deemed email of high priority and web surfing of low priority, then these preset scales may be adjusted to ensure that either bandwidth sharing or borrowing followed these priorities in periods of active time for each activity. In this capacity, the requesting program, e.g., an email program, web browser, or media player, could help determine the prioritization of bandwidth borrowing or lending.
Further, in embodiments, a node user may define web domains that occupy high priorities. For example, a node user who frequently streams audio from a given website, may decide that this is a high-priority domain and that bandwidth sharing or borrowing should reflect this priority. Conversely, a web page download from a news site, may constitute a low priority, such that bandwidth sharing or borrowing when engaging with this domain should likewise be prioritized accordingly.
In embodiments, multiple tiers of service or prices may be offered depending on whether the borrower and lender nodes have some affinity, e.g., use the same service provider. In embodiments, the term service provider refers to a wireless service provider and/or a multiplexing service provider. In embodiments, several affinity-sensitive options may exist.
With a first option, in embodiments, a lender node may charge a lower price, or nothing, for lending bandwidth to borrowers of same service provider. With this option, a borrower node may experience reduced or absent prices when they borrow bandwidth from a lender node of either a common wireless service provider or a common multiplexing service provider.
With a second option, in embodiments, a lender node may only share bandwidth with other nodes of a same service provider if a conflict arises, as discussed above. With this option, regardless of market-driven pricing, node users of either a common service provider or a common multiplexer service may only share bandwidth with each other in the event a conflict between potential borrowers.
With a third “affinity insensitive” option, in embodiments, a lender node may charge a same price to all borrowers. With this option, all borrower nodes may experience the same market-driven prices and the same competitive constraints and opportunities in the bandwidth-sharing market, regardless of their respective affinities, e.g., service providers.
With a fourth option, in embodiments, a lender node may charge a lower price, or nothing, to borrower nodes of self-defined affinities. Though this option may be most applicable to the peer-to-peer (P2P) sharing architectures, it may also be applied to multiplexing architectures. With this option, nodes of a common background or organizational membership, e.g., AAA, IEEE, a political affiliation, or a simple grassroots “bandwidth co-op” may offer and receive reduced bandwidth-sharing rates to and from each other.
With a fifth option, in embodiments, a lender node may charge a lower price, or nothing, based on corporate or organizational underwriting. With this option, in embodiments, websites may provide compensation to ensure downloads of their content. For example, a news network may underwrite its content, so that node users of a particular service provider may download associated content through bandwidth-sharing ad hoc networks at reduced prices. A purpose of this subsidization may be to increase readership, vis-a-vis competitors, which may then allow the website (e.g., the news network) to command greater advertising rates.
With a sixth option, in embodiments, a lender node may charge a lower price, or nothing, based on affinities of access points, or retail points which offer wireless connections. For example, in a crowded urban environment, numerous 802.11 access points may exist in close proximity, e.g., a coffee house, a bookstore, and a brew pub. With this option, customers at the coffeehouse, using the coffeehouse access point, may be able to share bandwidth amongst themselves. Further, these customers may be able to share bandwidth amongst themselves at lower prices. However, the coffeehouse may prevent the coffeehouse customers from sharing bandwidth with customers of a neighboring business (e.g., the bookstore and brew pub) by not allowing those customers of a neighboring business to tap through the coffeehouse access point. Likewise, the bookstore and the brew pub may limit the sharing of bandwidth using their respective access points to those customers in their respective establishments. Additionally, in embodiments, the access points (e.g., the coffeehouse, the bookstore and brew pub) may allow bandwidth sharing between nodes utilizing different access points, but at non-reduced prices.
With a seventh option, in embodiments, a node user may construct hybrid plans, based upon combinations of the market-insensitive price options disclosed in application Ser. No. 11/755,782, as well as the above disclosed options. In embodiments, a borrower may experience free or reduced prices for shared bandwidth if considered “in network” with a same service provider as the borrower, but subject to data volume charges if using a different service provider. In another example, users of the same multiplexer service may not be subject to time-of-day pricing variations; whereas those with a different multiplexer service may pay such varying rates.
While the invention has been described in terms of embodiments, those skilled in the art will recognize that the invention can be practiced with modifications and in the spirit and scope of the appended claims.
Number | Name | Date | Kind |
---|---|---|---|
537780 | Klatte | Apr 1895 | A |
5390113 | Sampson | Feb 1995 | A |
5437054 | Rappaport et al. | Jul 1995 | A |
5490201 | Moberg et al. | Feb 1996 | A |
5953338 | Ma et al. | Sep 1999 | A |
5959975 | Sofman et al. | Sep 1999 | A |
6006084 | Miller et al. | Dec 1999 | A |
6035281 | Crosskey et al. | Mar 2000 | A |
6047268 | Bartoli et al. | Apr 2000 | A |
6253247 | Bhaskar et al. | Jun 2001 | B1 |
6366907 | Fanning et al. | Apr 2002 | B1 |
6397061 | Jordan et al. | May 2002 | B1 |
6396805 | Romrell | Jul 2002 | B2 |
6415271 | Turk et al. | Jul 2002 | B1 |
6477522 | Young | Nov 2002 | B1 |
6522735 | Fortman et al. | Feb 2003 | B1 |
6550881 | Phillips | Apr 2003 | B1 |
6653933 | Raschke et al. | Nov 2003 | B2 |
6678700 | Moore et al. | Jan 2004 | B1 |
6732140 | McCue | May 2004 | B1 |
6751196 | Hulyalkar et al. | Jun 2004 | B1 |
6754739 | Kessler et al. | Jun 2004 | B1 |
6763248 | Odamura | Jul 2004 | B1 |
6810428 | Larsen et al. | Oct 2004 | B1 |
6842899 | Moody et al. | Jan 2005 | B2 |
6850764 | Patel | Feb 2005 | B1 |
6859927 | Moody et al. | Feb 2005 | B2 |
6879574 | Naghian et al. | Apr 2005 | B2 |
6882851 | Sugar | Apr 2005 | B2 |
6925493 | Barkan et al. | Aug 2005 | B1 |
6941378 | Apostolopoulos et al. | Sep 2005 | B2 |
6947987 | Boland | Sep 2005 | B2 |
6954616 | Liang et al. | Oct 2005 | B2 |
6954790 | Forslow | Oct 2005 | B2 |
6961575 | Stanforth | Nov 2005 | B2 |
6975613 | Johansson | Dec 2005 | B1 |
6980511 | Li et al. | Dec 2005 | B1 |
6990113 | Wang et al. | Jan 2006 | B1 |
7016375 | Rosenberg et al. | Mar 2006 | B1 |
7028096 | Lee | Apr 2006 | B1 |
7043225 | Patel et al. | May 2006 | B1 |
7058014 | Sim | Jun 2006 | B2 |
7058387 | Kumar et al. | Jun 2006 | B2 |
7062559 | Yoshimura et al. | Jun 2006 | B2 |
7065367 | Michaelis et al. | Jun 2006 | B2 |
7075890 | Ozer et al. | Jul 2006 | B2 |
7085281 | Thomas et al. | Aug 2006 | B2 |
7089301 | Labio et al. | Aug 2006 | B1 |
7099681 | O'Neill | Aug 2006 | B2 |
7103580 | Batachia et al. | Sep 2006 | B1 |
7103847 | Alford, Jr. et al. | Sep 2006 | B2 |
7106699 | Barri | Sep 2006 | B2 |
7130283 | Vogel et al. | Oct 2006 | B2 |
7174385 | Li | Feb 2007 | B2 |
7224964 | Souissi et al. | May 2007 | B2 |
7240015 | Karmouch et al. | Jul 2007 | B1 |
7257632 | Zhang et al. | Aug 2007 | B2 |
7274658 | Bornstein et al. | Sep 2007 | B2 |
7277950 | Chapweske | Oct 2007 | B1 |
7310641 | Moore et al. | Dec 2007 | B2 |
7340759 | Rodriguez | Mar 2008 | B1 |
7346354 | Patel | Mar 2008 | B2 |
7376747 | Hartop | May 2008 | B2 |
7401153 | Traversat et al. | Jul 2008 | B2 |
7440573 | Lor et al. | Oct 2008 | B2 |
7447656 | Parthasarathy | Nov 2008 | B2 |
7450517 | Cho | Nov 2008 | B2 |
7450949 | Choksi | Nov 2008 | B2 |
7460549 | Cardei et al. | Dec 2008 | B1 |
7463890 | Herz et al. | Dec 2008 | B2 |
7489656 | Guo et al. | Feb 2009 | B2 |
7530102 | Moskowitz | May 2009 | B2 |
7546342 | Li et al. | Jun 2009 | B2 |
7593333 | Li et al. | Sep 2009 | B2 |
7609748 | Karlsson | Oct 2009 | B2 |
7623524 | Muthukrishnan et al. | Nov 2009 | B2 |
7633908 | Kwong et al. | Dec 2009 | B1 |
7788133 | Delenda | Aug 2010 | B2 |
7817623 | Dawson et al. | Oct 2010 | B2 |
7830834 | Das et al. | Nov 2010 | B2 |
7949593 | Norris | May 2011 | B2 |
8249984 | Dawson et al. | Aug 2012 | B2 |
8360784 | Cardemon | Jan 2013 | B2 |
8416689 | Davari et al. | Apr 2013 | B2 |
8446831 | Kwan et al. | May 2013 | B2 |
8509788 | Natarajan et al. | Aug 2013 | B2 |
9037508 | Dawson et al. | May 2015 | B2 |
9407716 | Desai | Aug 2016 | B1 |
9407726 | He | Aug 2016 | B1 |
9585518 | Phillips | Mar 2017 | B1 |
10419360 | Dawson et al. | Sep 2019 | B2 |
10531436 | Douglas | Jan 2020 | B1 |
20010000777 | McGregor et al. | May 2001 | A1 |
20010027484 | Nishi | Oct 2001 | A1 |
20010029182 | McCann et al. | Oct 2001 | A1 |
20010042032 | Crawshaw et al. | Nov 2001 | A1 |
20010052133 | Pack et al. | Dec 2001 | A1 |
20010053152 | Sala et al. | Dec 2001 | A1 |
20020007328 | Hisamatsu et al. | Jan 2002 | A1 |
20020013767 | Katz | Jan 2002 | A1 |
20020029274 | Allen | Mar 2002 | A1 |
20020053033 | Cooper et al. | May 2002 | A1 |
20020053082 | Weaver, III et al. | May 2002 | A1 |
20020058499 | Ortiz | May 2002 | A1 |
20020061009 | Sorensen | May 2002 | A1 |
20020069278 | Forslow | Jun 2002 | A1 |
20020071477 | Orava | Jun 2002 | A1 |
20020075940 | Haartsen | Jun 2002 | A1 |
20020091624 | Glodjo et al. | Jul 2002 | A1 |
20020102987 | Souisse et al. | Aug 2002 | A1 |
20020110110 | Tiihonen et al. | Aug 2002 | A1 |
20020120873 | Salmivalli | Aug 2002 | A1 |
20020122410 | Kulikov et al. | Sep 2002 | A1 |
20020138414 | Baker, IV | Sep 2002 | A1 |
20020141358 | Requena | Oct 2002 | A1 |
20020144266 | Goldman et al. | Oct 2002 | A1 |
20020145978 | Batsell et al. | Oct 2002 | A1 |
20020161891 | Higuchi et al. | Oct 2002 | A1 |
20020161898 | Hartop et al. | Oct 2002 | A1 |
20020173272 | Liang et al. | Nov 2002 | A1 |
20020174052 | Guler et al. | Nov 2002 | A1 |
20020178261 | Chang et al. | Nov 2002 | A1 |
20030018562 | Guler et al. | Jan 2003 | A1 |
20030032433 | Daniel et al. | Feb 2003 | A1 |
20030037033 | Nyman et al. | Feb 2003 | A1 |
20030041007 | Grey et al. | Feb 2003 | A1 |
20030041011 | Grey et al. | Feb 2003 | A1 |
20030041014 | Grey et al. | Feb 2003 | A1 |
20030053493 | Graham Mobley et al. | Apr 2003 | A1 |
20030068975 | Qiao et al. | Apr 2003 | A1 |
20030071861 | Phillips | Apr 2003 | A1 |
20030088529 | Klinker et al. | May 2003 | A1 |
20030101267 | Thompson et al. | May 2003 | A1 |
20030117978 | Haddad | Jun 2003 | A1 |
20030120594 | Shaginaw et al. | Jun 2003 | A1 |
20030137976 | Zhu et al. | Jul 2003 | A1 |
20030139180 | Mcintosh et al. | Jul 2003 | A1 |
20030139990 | Greco | Jul 2003 | A1 |
20030153338 | Herz | Aug 2003 | A1 |
20030167329 | Kurakake et al. | Sep 2003 | A1 |
20030195845 | Anton, Jr. | Oct 2003 | A1 |
20030216971 | Sick et al. | Nov 2003 | A1 |
20030235174 | Pichna et al. | Dec 2003 | A1 |
20030235175 | Naghian et al. | Dec 2003 | A1 |
20040006621 | Bellinson et al. | Jan 2004 | A1 |
20040022224 | Billhartz | Feb 2004 | A1 |
20040024687 | Delenda | Feb 2004 | A1 |
20040029553 | Cain | Feb 2004 | A1 |
20040030649 | Nelson et al. | Feb 2004 | A1 |
20040064351 | Mikurak | Apr 2004 | A1 |
20040078323 | Johnston et al. | Apr 2004 | A1 |
20040098329 | Tilton | May 2004 | A1 |
20040100929 | Garcia-Luna-Aceves | May 2004 | A1 |
20040128231 | Morita | Jul 2004 | A1 |
20040128262 | Nafousi | Jul 2004 | A1 |
20040133506 | Glodjo et al. | Jul 2004 | A1 |
20040133609 | Moore et al. | Jul 2004 | A1 |
20040156312 | Salonidis et al. | Aug 2004 | A1 |
20040162871 | Pabla et al. | Aug 2004 | A1 |
20040165548 | Backes | Aug 2004 | A1 |
20040185777 | Bryson | Sep 2004 | A1 |
20040192204 | Periyalwar et al. | Sep 2004 | A1 |
20040203820 | Billhartz | Oct 2004 | A1 |
20040203832 | An | Oct 2004 | A1 |
20040221319 | Zenoni | Nov 2004 | A1 |
20040230317 | Kumar et al. | Nov 2004 | A1 |
20040260808 | Strutt | Dec 2004 | A1 |
20040264466 | Huang | Dec 2004 | A1 |
20050025172 | Frankel | Feb 2005 | A1 |
20050036475 | Nishiyama et al. | Feb 2005 | A1 |
20050042999 | Rappaport | Feb 2005 | A1 |
20050063419 | Schrader et al. | Mar 2005 | A1 |
20050071182 | Aikens et al. | Mar 2005 | A1 |
20050080872 | Davis et al. | Apr 2005 | A1 |
20050111418 | Yang et al. | May 2005 | A1 |
20050141554 | Hammarlund et al. | Jun 2005 | A1 |
20050153697 | Pate | Jul 2005 | A1 |
20050153725 | Naghian et al. | Jul 2005 | A1 |
20050157661 | Cho | Jul 2005 | A1 |
20050169209 | Miu et al. | Aug 2005 | A1 |
20050169257 | Lahetkangas et al. | Aug 2005 | A1 |
20050193221 | Yoneyama | Sep 2005 | A1 |
20050203834 | Prieston | Sep 2005 | A1 |
20050207340 | O'Neill | Sep 2005 | A1 |
20050213503 | Guo et al. | Sep 2005 | A1 |
20050256946 | Childress et al. | Nov 2005 | A1 |
20050278240 | Delenda | Dec 2005 | A1 |
20060002326 | Vesuna | Jan 2006 | A1 |
20060010031 | Higuchi et al. | Jan 2006 | A1 |
20060034330 | Iwamura | Feb 2006 | A1 |
20060036475 | Gilfix et al. | Feb 2006 | A1 |
20060036518 | O'Neill | Feb 2006 | A1 |
20060059261 | Finkenzeller et al. | Mar 2006 | A1 |
20060080438 | Storrie | Apr 2006 | A1 |
20060085543 | Hrastar et al. | Apr 2006 | A1 |
20060095582 | Nitya et al. | May 2006 | A1 |
20060109787 | Strutt et al. | May 2006 | A1 |
20060114853 | Hasty, Jr. et al. | Jun 2006 | A1 |
20060126504 | Meier et al. | Jun 2006 | A1 |
20060167703 | Yakov | Jul 2006 | A1 |
20060167784 | Hoffberg | Jul 2006 | A1 |
20060176829 | Mclaughlin et al. | Aug 2006 | A1 |
20060179143 | Walker et al. | Aug 2006 | A1 |
20060187858 | Kenichi et al. | Aug 2006 | A1 |
20060193295 | White et al. | Aug 2006 | A1 |
20060195386 | Giodjo et al. | Aug 2006 | A1 |
20060205408 | Nakagawa et al. | Sep 2006 | A1 |
20060224502 | McGowan | Oct 2006 | A1 |
20060233377 | Chang et al. | Oct 2006 | A1 |
20060265508 | Angel et al. | Nov 2006 | A1 |
20060274214 | Carro | Dec 2006 | A1 |
20060294258 | Powers-Boyle et al. | Dec 2006 | A1 |
20070005797 | Fontijn et al. | Jan 2007 | A1 |
20070019771 | Ambuehl et al. | Jan 2007 | A1 |
20070117537 | Hui et al. | May 2007 | A1 |
20070121539 | Kikuchi | May 2007 | A1 |
20070124204 | de Boer et al. | May 2007 | A1 |
20070140272 | Gulliksson | Jun 2007 | A1 |
20070206528 | Walton et al. | Sep 2007 | A1 |
20070258359 | Ogasawara et al. | Nov 2007 | A1 |
20070291915 | Tseitlin et al. | Dec 2007 | A1 |
20070297436 | Sala et al. | Dec 2007 | A1 |
20070298764 | Clayton | Dec 2007 | A1 |
20080008140 | Forssell | Jan 2008 | A1 |
20080040481 | Joshi et al. | Feb 2008 | A1 |
20080104202 | Barrett et al. | May 2008 | A1 |
20080167982 | Leo et al. | Jul 2008 | A1 |
20080204448 | Dawson et al. | Aug 2008 | A1 |
20080232334 | Das et al. | Sep 2008 | A1 |
20080281529 | Tenenbaum et al. | Nov 2008 | A1 |
20080298238 | Dawson | Dec 2008 | A1 |
20080298283 | Dawson et al. | Dec 2008 | A1 |
20080298314 | Dawson et al. | Dec 2008 | A1 |
20080301017 | Dawson et al. | Dec 2008 | A1 |
20090323587 | Trachewsky et al. | Dec 2009 | A1 |
20100008221 | Hong et al. | Jan 2010 | A1 |
20100114743 | Misraje et al. | May 2010 | A1 |
20100205116 | Erlanger | Aug 2010 | A1 |
20100316033 | Atwal | Dec 2010 | A1 |
20120117252 | Vasseur et al. | May 2012 | A1 |
20120124178 | Sparks | May 2012 | A1 |
20140129385 | Anderson | May 2014 | A1 |
20140279136 | Pacella | Sep 2014 | A1 |
Number | Date | Country |
---|---|---|
0999662 | May 2005 | EP |
09915960 | Apr 1999 | WO |
03037009 | May 2003 | WO |
2004001585 | Dec 2003 | WO |
2006004628 | Jan 2006 | WO |
WO-2014169289 | Oct 2014 | WO |
Entry |
---|
Kaushik et al., “Providing service assurance in mobile opportunistic networks”, Computer Networks 74. PB: 114-140. Elsevier, Dec. 9 (Year: 2014). |
Filho et al., “Regulation misunderstanding: Convergence complexity providing failures in telecommunication services costs”, Journal of Information Systems and Technology Management: JISTEM 14.1: 111-127. TECSI Information Systems and Technology Management, University of Sao Paulo (Jan./Apr.) (Year: 2017). |
Notice of Allowance dated Dec. 5, 2019 in related U.S. Appl. No. 11/755,782, 17 pages. |
Notice of Allowance dated Nov. 4, 2019 in related U.S. Appl. No. 15/008,910, 7 pages. |
IEEE 802.22, Wireless RANs, 220 pages, Mar. 2006. |
Michelini et al., Spectral Sharing Across 2G-3G systems, IEEE, 5 pages, 2003. |
Das et al, A Structured Channel Bowrrowing Scheme for Dynamic Load Balancing in Cellular Networks, IEEE, 8 pages, 1997. |
Luo, Haiyun, Ramachandran Ramjee, Prasun Sinha, Li (Erran) Li, and Songwu Lu. “UCAN: A Unified Cellular and Ad-Hoc Network Architecture.” MobiCom '03, Proceedings of the 9th Annual International Conference on Mobile Computing and Networking. New York, NY, USA: ACM Press, 2003, pp. 353-367. |
Qui et al. “Bandwidth in Ad Hoc Networks: A Price-Based Approach,” 2003, IEEE, pp. 1-10. |
D. Zhu et al., “QoS Aware Wireless Bandwidth Aggregation (QAWBA) by Integrating Cellular and Ad-hoc Networks”, Nov. 2004, IEEE Xplore, 8 pages. |
D. Zhu et al., “Using Cooperative Multiple Paths to Reduce File Download Latency in Cellular Data Networks”, 2005, IEEE, 7 pages. |
“ad hoc”, http://www.thefreedictionary.com/Ad-hoc, Jul. 3, 2012, pp. 1-2. |
Ziane, Saida; A Swarm Intelligent Scheme for Routing in Mobile Ad hoc Networks; Proceedings of the 2005 Systems Communications (ICW'05) (Year: 2005). |
Frodigh et al., “Wireless ad hoc networking—The art of networking without a network”, Ericsson Review, No. 4, 2000, 16 pages, https://pdfs.semanticscholar.org/0e97/adc7bef883ab8a7f20ad997ebf007110c144.pdf accessed Jan. 28, 2019. |
http://academic.safaribooksonline.com/0735614954, Microsoft Computer Directory, 3 pages, cited in U.S. Appl. No. 14/674,653 on Dec. 17, 2015. |
http://www.webopedia.com, Search Results: “adhoc network”, 2 pages, cited in U.S. Appl. No. 14/674,653 on Dec. 17, 2015. |
http://www.webopedia.com, Search Results: “asynchronous network”, 2 pages, cited in U.S. Appl. No. 14/674,653 on Dec. 17, 2015. |
Number | Date | Country | |
---|---|---|---|
20200036650 A1 | Jan 2020 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 15008910 | Jan 2016 | US |
Child | 16596021 | US | |
Parent | 11755800 | May 2007 | US |
Child | 15008910 | US |