Individuals are increasingly using client machines to access content, such as video files and live streaming/video-on-demand content, via the Internet or other networks. Players for such content are typically built using standard commercially available platforms such as Adobe Flash or Microsoft Silverlight. In some cases, such as where the client machine is included in an enterprise environment, or due to parental or other controls, users are restricted in some of the actions that they can take with respect to the client machines. As one example, users may be prohibited from installing software applications for security or other policy reasons. Unfortunately, if the platform does not natively provide certain player functionality, it can be difficult to provide that functionality without requiring the installation of a plugin or modifying the source of the content.
Various embodiments of the invention are disclosed in the following detailed description and the accompanying drawings.
The invention can be implemented in numerous ways, including as a process; an apparatus; a system; a composition of matter; a computer program product embodied on a computer readable storage medium; and/or a processor, such as a processor configured to execute instructions stored on and/or provided by a memory coupled to the processor. In this specification, these implementations, or any other form that the invention may take, may be referred to as techniques. In general, the order of the steps of disclosed processes may be altered within the scope of the invention. Unless stated otherwise, a component such as a processor or a memory described as being configured to perform a task may be implemented as a general component that is temporarily configured to perform the task at a given time or a specific component that is manufactured to perform the task. As used herein, the term ‘processor’ refers to one or more devices, circuits, and/or processing cores configured to process data, such as computer program instructions.
A detailed description of one or more embodiments of the invention is provided below along with accompanying figures that illustrate the principles of the invention. The invention is described in connection with such embodiments, but the invention is not limited to any embodiment. The scope of the invention is limited only by the claims and the invention encompasses numerous alternatives, modifications and equivalents. Numerous specific details are set forth in the following description in order to provide a thorough understanding of the invention. These details are provided for the purpose of example and the invention may be practiced according to the claims without some or all of these specific details. For the purpose of clarity, technical material that is known in the technical fields related to the invention has not been described in detail so that the invention is not unnecessarily obscured.
Examples of clients include personal computers (170), laptops (182), cellular phones/personal digital assistants (178), and other types of information appliances (not shown) such as set-top boxes, game consoles, broadband routers, file servers, video servers, and digital video recorders, as applicable. The clients shown are used by subscribers to various Internet service providers (ISPs). For example, clients 170, 172, and 174 are subscribed to SP1 (122), while clients 176, 178, and 180 are subscribed to SP2 (124), and clients 182 and 184 are subscribed to SP3 (126).
In the example shown, a movie studio (“Studio”) has contracted with content distributor 142 to provide downloadable copies of its films in exchange for a fee. Similarly, a television network (“XYZ”) has contracted with content distributors 142-148 to provide viewers with access to live streams of its broadcasts as well as streams of television show episodes and sporting events. In some cases, the content distributor is owned/operated by the content owner.
Content distributor 142 has a data center that is provided with network access by backbone ISP 132. Though represented here by a single node (also referred to herein as a “CDN node”), content distributor 142 may typically have multiple data centers (not shown) and may make use of multiple backbone or other ISPs. Content distributor 144 has a data center that is provided with network access by backbone ISP 134.
Suppose a user of client 172 (hereinafter “Alice”) would like to watch a live soccer game owned by XYZ. Client 172 includes a web browser application. Alice uses the web browser application to navigate to a portal owned by XYZ, such as “http://xyztvnetwork.com/livegames.” Her request for the game is directed to a CDN node that is closest to her. In this case, CDN 146 is the fewest hops away from her client. Her client then begins streaming the content from CDN 146, which is in turn rendered in her browser (e.g., via a Flash or Silverlight player).
In addition to CDN 146, Alice's client is also in communication with content distribution coordinator 102. Content distribution coordinator 102 periodically exchanges information with clients using messages referred to herein as heartbeat messages. Content distribution coordinator 102 provides instructions to clients that indicate the node(s) from which they should obtain the appropriate stream data (and/or as applicable the node(s) to which they should send stream data). Clients send content distribution coordinator 102 information such as current CPU load, available storage, and geographic location of the client. Clients can also send status information that describes the quality of the user experience, such as the length of time it takes for the soccer game video to start playing, the number of buffering events (if any), the length of buffering events, and the number of frames per second rendered by the video player. Content distribution center 102 uses the received information to maintain a global and up-to-date view of various portions of the environment shown in
As other users of clients 170-184 request content, their respective players similarly obtain content from content sources such as CDN 144 and also communicate with content distribution coordinator 102. Such players may be browser-based as with Alice's, or they may be standalone applications, as applicable. Content distribution coordinator 102 collects and processes the information received from Alice's client along with other clients. The collected information can be used to detect and remedy problems in the content distribution. Examples of such problems include excessive buffering, freezing, and frame skipping.
In the example shown in
Switching Content
Alice's client (172) is initially assigned CDN 146 as a source of the soccer game. However, as the game progresses, content distribution coordinator 102 may instruct client 172 to change the source from CDN 146 to a different source. One reason that client 172 could be so instructed is if the content distribution monitor determines that excessive congestion is occurring with respect to CDN 146, while CDN 148 has spare bandwidth. In that case, content distribution coordinator 102 would instruct client 172 to obtain the game from CDN 148. As another example, client 172 can be instructed to switch for cost reasons. For example, client 172 can be instructed to switch from CDN 146 (which delivers content via RTMP) to CDN 148 (which delivers content via HTTP). Client 172 can also be instructed to switch from CDN 146 to client 184 as a source of content if client 184 is configured to act as a peer and uses a peer-to-peer protocol to transfer content.
Instead of or in addition to assigning new content sources, content distribution coordinator 102 can also instruct clients to switch between different content streams provided by the same source. As one example, suppose a user of client 180 (hereinafter “Bob”) initially fetches a movie from CDN 142, in high quality, at a bitrate of 1 Mbps. As Bob watches the movie, the quality of his viewing experience degrades (e.g., due to other users of his DSL connection also watching movies or due to his CPU being overloaded). Content distribution coordinator 102 is configured to instruct client 180 to switch from the higher quality video to a lower quality video (e.g., at a bitrate of 300 kbps). As another example, Alice may initially receive a low quality video feed of the game and then be instructed to switch to a higher quality feed (either on the same CDN or a different CDN) once it is determined that client 172 is able to maintain the higher quality feed.
In various embodiments, rather than instructing clients to switch sources, content distribution coordinator 102 is configured to provide clients with recommendations and the clients include logic to make an ultimate decision of whether to switch.
As will be explained in more detail below, using the techniques described herein, when a client switches from one video feed to another, the ability of a user of the client to perceive the switch is minimized and in some cases not present.
Player Architecture
Client 172 is a typical commodity desktop computer running the Windows 7 operating system and, as explained above, has a web browser application installed. Also installed on client 172 is the Adobe Flash platform, which includes a video player. Other platforms can also be installed on clients (such as Microsoft Silverlight) and the techniques described herein adapted to work with them, as applicable.
The video player supports a scripting language (e.g., ActionScript for Flash, and C# for Silverlight) which allows developers to write programs that control the behavior of instances of the video player, such as instructing the video player to play a particular stream (e.g., provided by CDN 146), to pause or resume playing a stream, and to control the audio level of the stream.
When Alice directs her browser to the video portal provided by XYZ, a script (to control the video player) is dynamically, transparently downloaded, meaning that Alice is not prompted to approve or install the script. The script is a meta-player that controls the underlying Flash (or Silverlight) player.
Switching Between Two Video Streams
As mentioned above, when Alice first indicates interest in watching the soccer game (e.g., by selecting a “watch now” button provided by the portal), client 172 is directed to stream the content from CDN 146. Content is delivered to Alice as a series of 30 second video chunks. Content sources store the video chunks (which have associated chunk identifiers), and in some cases store multiple copies of the content (e.g., encoded with various bitrates and/or as chunks of different sizes). The meta-player instructs an instance of the video player to play the chunks one by one.
If a problem is detected in the playback (e.g., due to a change in a network condition or CPU overuse), the meta-player is configured to retrieve the content (e.g., based on chunk identifiers) from another source, or to choose a different quality stream from the same source, as applicable. In some embodiments the meta-player switches content sources based on an instruction provided by content distribution coordinator 102. In other embodiments, the meta-player includes logic that allows it to participate in the switching decision.
Starting to play a video chunk from a new source in the video player will likely involve a non-trivial overhead, such as player initialization, establishing a connection to the source, and filling a player buffer. Accordingly, if the content meta-player is configured to display the soccer game using a single instance of the Flash video player, it is possible that Alice will see a potentially lengthy glitch during the time it takes the player to switch video chunk sources. In some embodiments, such glitches are prevented from being perceived by Alice through the use of two (or more) instances of the video player—one of which is shown to Alice, and one of which is hidden from Alice's view at any given time.
At 204, a second video stream from a second video streaming source is processed on the display device, but not displayed. As one example of the processing performed at 204, suppose that after rendering several chunks of the soccer game for Alice, content distribution coordinator 102 determines that it would be less expensive to deliver the game to Alice via CDN 148 than to continue delivering it via CDN 146. At 204, the meta-player script begins fetching chunks of the soccer game in a second instance of the video player. Both players are configured to display the video game in the same region of Alice's screen. However, at any given time, only one player will display video in that region. Initially, the first instance of the player continues to display the soccer game, while the second player establishes a connection to CDN 148 and begins fetching video chunks of its own.
At 206, the first video stream ceases being displayed and the second video stream is instead displayed. For example, at 206, at an appropriate time, the meta-player script instructs the first instance of the player to hide (and mute its audio) and instructs the second instance of the player to become visible (and unmute its audio). In this scenario, the first instance of the player is streaming content using one protocol (RTMP) and the second instance of the player is streaming content using a second protocol (HTTP). As another example of the two streams using two different protocols, suppose CDN 142 is configured to provide content via two protocols, RTMP and RTMPE. The RTMPE protocol supports encryption but does not scale as well as the RTMP protocol. Studio is concerned that viewers of its content such as Bob might make unauthorized copies of its movies. While it could exclusively stream its movies using RTMPE, Studio could also provide instructions (e.g., via its own meta-player script) to Bob's client that one out of every ten video chunks should be obtained via RTMPE while the other nine should be obtained via RTMP. In this scenario, the first video player instance would be configured to play nine such chunks in a row, and then hide, while the second video player plays the tenth chunk and then hides. Once the second player instance is finished, the first player instance is made visible and plays an additional nine video chunks, and so on.
Synchronizing Two Video Streams
As mentioned above, starting to play a video chunk can incur a non-trivial overhead which may lead to glitches that visible to the user. When two player instances are used, such glitches are minimized when compared to a single player instance. In some embodiments, glitches are further minimized and in some cases eliminated through the use of synchronization techniques.
In the example shown in
In some embodiments, to improve the accuracy of the pht readings, a fitting algorithm such as linear regression is used to estimate the actual pht value.
Similar to the pseudo code provided in
In the example shown in
Typically, the size of a compressed frame is highly dependent on the video content. One way to implement fingerprinting is to use a moving window over a sequence of N frames. The fingerprint is defined by the sequence of the frame sizes in a given window. Since this method only looks at the frame sizes, it requires little CPU overhead.
One way to compute the offset between two streams based on their fingerprint is to use mean absolute error or cross-correlation. While the first stream is playing (e.g. streamed from CDN 144 in the first player instance), the second stream (e.g. streamed from CDN 146) is started. Once the new stream has played for two seconds, data (e.g., bytes per compressed frame) is collected every 30 ms, for both streams, for 8 seconds. After the data collection, the mean absolute error is computed between the two streams starting with an offset of zero and then shifted for each sample. The shift is done with both the first stream and the second stream. Shifting the second stream forward handles the case where the second stream is ahead of the first stream. Shifting the first stream forward handles the case where the first stream is ahead of the second stream. A minimum overlap of 4 seconds is required between the two streams to compute the mean absolute error reliably. In the case where the switch is between two different bit rates, cross-correlation is used instead of mean absolute error since the scale of the values is different. If the average of the mean absolute errors for all offsets normalized by bit rate is too large, then the measurement is repeated up to three times. The threshold of “too large” can be set by offline experiments or using an online learning algorithm. For example, anomaly detection can be performed over a stored history of values across video sessions and across clients. The offset between the two streams is the value with the minimum mean absolute error. Once computed the offset is used to compensate for the delay in starting the re-buffering for actual playback. One way this can be done is by estimating the round-trip time to the server and adding this to the offset. If the stream buffers in the middle of this measurement, the measurement is repeated from the start up to three times.
In some embodiments, if the video being fingerprinted is generated by the same encoder, one can use the hash on each compressed frame as a signature. In this case the offset is identified by locating the same frame in the two streams by comparing the hashes.
Decompressed frame bit maps can also be used to fingerprint video. A hash (e.g., MD5) of the decompressed video can also be used as signature. In yet another embodiment, the histogram of luminance components (or both luminance and chrominance component) are used for fingerprinting. Other statistics of luminance/chrominance components, such as the first order (mean), the second order (variance), and higher order statistics as the signature of each frame can also be used.
Additional Synchronization Techniques
For Live Content
In the case of live video (e.g., the soccer game), it may not be possible to use “pause” to synchronize a stream that is ahead with another stream. In some embodiments, this situation is remedied by modifying the buffer length to improve the switch.
When a new live stream is played from a Flash RTMP server, a buffer time value (in seconds) is set at the player that instructs the player to begin playing the video only after it has accumulated buffer time amount of video. Live streams start buffering at the current live point. Suppose the current live point is 100 seconds and the buffer time is set to 10 seconds. When a player is started, it will buffer video from time 100 seconds to time 110 seconds and then start playing. Live video is downloaded at stream rate and will thus start playing roughly 10 seconds behind the source (i.e., source will be at 110 seconds when the player starts playing video at 100 seconds). If a buffer time of 5 seconds is used instead, the player is will play roughly 5 seconds behind the source. With this property, a large buffer time can be used first to force a stream into “paused” state. At the time it should be resumed, a smaller buffer time is used to immediately activate the stream into playing state, and synchronization accuracy is improved.
For Video-On-Demand
In some embodiments, once the offset is found, the stream is re-buffered (e.g., using pause and resume) with a buffer time of 30 seconds. A timer is set for the offset value. When the timer elapses, the buffer time is set to a value less than the current buffer length. This triggers the video to start playing immediately. This is more accurate than setting the buffer time to the offset value since bursty traffic may cause the playback to start before or after the offset time.
For Audio
In some embodiments, to make a switch as imperceptible to a human as possible, the volume of the old stream is gradually reduced while the audio of the new stream is gradually increased. This eliminates popping noises that may happen then the switch is made abruptly.
Multi-Resolution Chunks
As mentioned above, content sources can be configured to store copies of the same content using different size chunks. As one example, CDN 142 might store a complete copy of the movie, Robin Hood, in both 30 second and 5 second chunks. In selecting which length chunk should be used, to conflicting requirements are at play. On one hand, long chunks minimize the number of switches and are generally preferred by content server software. On the other hand, shorter chunks allow operations such as “seek” to be performed more quickly. For example, suppose a user wishes to seek to time point 0:26 (twenty six seconds into the video). If the chunk size is 30 seconds, the user will have to wait until all (or virtually all) of the chunk is downloaded before being able to seek to that point. In contrast, if the chunk size is 5 seconds, the client can fetch the chunk that spans time 0:25-0:30 and seek to point 0:26 much more quickly. As another example, smaller chunk sizes allow low end-to-end delay in the context of live streaming and also allow for faster join operations.
In various embodiments, when actions such as seeking within a video-on-demand stream or starting to watch a live stream are taken, the meta-player is configured to request small chunks (e.g., 5 second chunks) and then switch to a longer chunk (e.g., 30 seconds long) once the streaming session is successfully underway. In doing so, both fast seeks and low numbers of switches can be achieved.
The process begins at 702 when at least one video chunk is received at a coarse granularity. For example, at 702, client 180 requests from CDN 142 the Robin Hood movie, in chunks of length 30 seconds.
At 704, a determination is made that an operation is to be performed at a finer granularity and at 706 the video chunk having a finer granularity is requested. One example of such an operation is a seek operation, described above. Other example operations include adjusting a bitrate and switching to a new source. While these options can be performed at the boundary of the 30 second chunk boundaries, by switching to a 5 second chunk, the actions can be taken more quickly.
Typically, once the processing shown in
Although the foregoing embodiments have been described in some detail for purposes of clarity of understanding, the invention is not limited to the details provided. There are many alternative ways of implementing the invention. The disclosed embodiments are illustrative and not restrictive.
This application is a continuation of co-pending U.S. patent application Ser. No. 13/767,220 entitled SWITCHING CONTENT filed Feb. 14, 2013, which is a continuation of U.S. patent application Ser. No. 12/730,056 entitled SWITCHING CONTENT filed Mar. 23, 2010, now U.S. Pat. No. 8,402,494, which claims priority to U.S. Provisional Patent Application No. 61/210,928 entitled SEAMLESS SWITCHING FOR STREAMING CONTENT filed Mar. 23, 2009, which are incorporated herein by reference for all purposes.
Number | Name | Date | Kind |
---|---|---|---|
5926204 | Mayer | Jul 1999 | A |
5930473 | Teng et al. | Jul 1999 | A |
5987621 | Duso | Nov 1999 | A |
6026077 | Iwata | Feb 2000 | A |
6208977 | Hernandez | Mar 2001 | B1 |
6279039 | Bhat | Aug 2001 | B1 |
6377996 | Lumelsky | Apr 2002 | B1 |
6405251 | Bullard | Jun 2002 | B1 |
6438592 | Killian | Aug 2002 | B1 |
6470389 | Chung | Oct 2002 | B1 |
6711622 | Fuller | Mar 2004 | B1 |
6735630 | Gelvin | May 2004 | B1 |
6754833 | Black | Jun 2004 | B1 |
6836691 | Stirton | Dec 2004 | B1 |
6892236 | Conrad | May 2005 | B1 |
6892307 | Wood | May 2005 | B1 |
6906743 | Maurer | Jun 2005 | B1 |
6950855 | Sampathkumar | Sep 2005 | B2 |
7006666 | Montgomery | Feb 2006 | B2 |
7010598 | Sitaraman | Mar 2006 | B2 |
7020082 | Bhagavath | Mar 2006 | B2 |
7024452 | O'Connell, Jr. | Apr 2006 | B1 |
7024468 | Meyer | Apr 2006 | B1 |
7039694 | Kampe | May 2006 | B2 |
7092696 | Hosain | Aug 2006 | B1 |
7139834 | Albanese | Nov 2006 | B1 |
7159234 | Murphy | Jan 2007 | B1 |
7222190 | Klinker | May 2007 | B2 |
7277896 | Matsubara | Oct 2007 | B2 |
7356341 | Nanda | Apr 2008 | B2 |
7367044 | Fowler | Apr 2008 | B2 |
7373415 | Deshan | May 2008 | B1 |
7490136 | Suzuki | Feb 2009 | B2 |
7574488 | Matsubara | Aug 2009 | B2 |
7599698 | Cheng | Oct 2009 | B2 |
7617525 | Moeck | Nov 2009 | B1 |
7627872 | Hebeler et al. | Dec 2009 | B2 |
7668914 | Parker et al. | Feb 2010 | B2 |
7689485 | Kanekar | Mar 2010 | B2 |
7813326 | Kelm | Oct 2010 | B1 |
7904580 | Mandera et al. | Mar 2011 | B2 |
7941823 | Hasek | May 2011 | B2 |
8028159 | Li | Sep 2011 | B2 |
8038535 | Jensen | Oct 2011 | B2 |
8135855 | Sitaraman | Mar 2012 | B2 |
8230105 | Melnyk et al. | Jul 2012 | B2 |
8234350 | Gu | Jul 2012 | B1 |
8370887 | Virdi | Feb 2013 | B2 |
8387094 | Ho | Feb 2013 | B1 |
8484319 | Wein | Jul 2013 | B2 |
8489923 | Lakshminarayanan | Jul 2013 | B1 |
8589473 | Bruss | Nov 2013 | B2 |
8683066 | Hurst | Mar 2014 | B2 |
8751605 | Zhang | Jun 2014 | B1 |
8751679 | McHugh | Jun 2014 | B2 |
8874964 | Lakshminarayanan | Oct 2014 | B1 |
8898338 | McGowan | Nov 2014 | B1 |
8924996 | Shafiee | Dec 2014 | B2 |
8930991 | Philpott | Jan 2015 | B2 |
8943170 | Li | Jan 2015 | B2 |
8954491 | Medved | Feb 2015 | B1 |
9100288 | Ganjam | Aug 2015 | B1 |
9456015 | Chen | Sep 2016 | B2 |
9549043 | Stoica | Jan 2017 | B1 |
9613042 | Joseph | Apr 2017 | B1 |
9819566 | Ganjam | Nov 2017 | B1 |
20020002708 | Arye | Jan 2002 | A1 |
20020016831 | Peled | Feb 2002 | A1 |
20020082730 | Capps et al. | Jun 2002 | A1 |
20020095400 | Johnson | Jul 2002 | A1 |
20020126135 | Ball | Sep 2002 | A1 |
20020141343 | Bays | Oct 2002 | A1 |
20020143798 | Lisiecki | Oct 2002 | A1 |
20020175934 | Hand | Nov 2002 | A1 |
20020183972 | Enck | Dec 2002 | A1 |
20020198984 | Goldstein et al. | Dec 2002 | A1 |
20030046396 | Richter | Mar 2003 | A1 |
20030046704 | Laksono et al. | Mar 2003 | A1 |
20030050966 | Dutta | Mar 2003 | A1 |
20030061305 | Copley et al. | Mar 2003 | A1 |
20030061356 | Jason, Jr. | Mar 2003 | A1 |
20030065739 | Shnier | Apr 2003 | A1 |
20030084003 | Pinkas | May 2003 | A1 |
20030105850 | Lean | Jun 2003 | A1 |
20030140108 | Sampathkumar | Jul 2003 | A1 |
20030140180 | Brown | Jul 2003 | A1 |
20030145066 | Okada | Jul 2003 | A1 |
20030169863 | Hernandez | Sep 2003 | A1 |
20030204613 | Hudson | Oct 2003 | A1 |
20040010544 | Slater | Jan 2004 | A1 |
20040019675 | Hebeler et al. | Jan 2004 | A1 |
20040047354 | Slater | Mar 2004 | A1 |
20040057420 | Curcio | Mar 2004 | A1 |
20040064556 | Zhang | Apr 2004 | A1 |
20040133471 | Henderson et al. | Apr 2004 | A1 |
20040093155 | Simonds | May 2004 | A1 |
20040107387 | Larsson et al. | Jun 2004 | A1 |
20040128682 | Liga | Jul 2004 | A1 |
20040158643 | Suzuki | Aug 2004 | A1 |
20040162901 | Mangipudi | Aug 2004 | A1 |
20040187159 | Gaydos | Sep 2004 | A1 |
20040193716 | McConnell | Sep 2004 | A1 |
20040233918 | Larsson | Nov 2004 | A1 |
20040236846 | Alvarez et al. | Nov 2004 | A1 |
20040267691 | Vasudeva | Dec 2004 | A1 |
20050010915 | Chen | Jan 2005 | A1 |
20050021715 | Dugatkin | Jan 2005 | A1 |
20050060158 | Endo et al. | Mar 2005 | A1 |
20050086300 | Yeager | Apr 2005 | A1 |
20050086469 | Dunagan | Apr 2005 | A1 |
20050120131 | Allen | Jun 2005 | A1 |
20050169179 | Antal | Aug 2005 | A1 |
20050183120 | Jain | Aug 2005 | A1 |
20050243735 | Kashima | Nov 2005 | A1 |
20050251835 | Scott et al. | Nov 2005 | A1 |
20050278259 | Gunaseelan | Dec 2005 | A1 |
20060059248 | Ikeda | Mar 2006 | A1 |
20060135172 | Dronne | Jun 2006 | A1 |
20060136597 | Shabtai | Jun 2006 | A1 |
20060143350 | Miloushev | Jun 2006 | A1 |
20060168304 | Bauer | Jul 2006 | A1 |
20060206539 | Thompson | Sep 2006 | A1 |
20060236017 | Rooholamini | Oct 2006 | A1 |
20060285489 | Francisco | Dec 2006 | A1 |
20070005809 | Kobayashi | Jan 2007 | A1 |
20070025381 | Feng | Feb 2007 | A1 |
20070041584 | O'Connor | Feb 2007 | A1 |
20070101202 | Garbow | May 2007 | A1 |
20070136311 | Kasten | Jun 2007 | A1 |
20070140113 | Gemelos | Jun 2007 | A1 |
20070198413 | Nagao | Aug 2007 | A1 |
20070204011 | Shaver | Aug 2007 | A1 |
20070250560 | Wein | Oct 2007 | A1 |
20070286351 | Ethier et al. | Dec 2007 | A1 |
20070288638 | Vuong | Dec 2007 | A1 |
20080016205 | Svendsen | Jan 2008 | A1 |
20080037438 | Twiss | Feb 2008 | A1 |
20080046499 | Cabrera | Feb 2008 | A1 |
20080046974 | Minodier | Feb 2008 | A1 |
20080049616 | Kamath et al. | Feb 2008 | A1 |
20080049786 | Ram et al. | Feb 2008 | A1 |
20080063195 | Li | Mar 2008 | A1 |
20080096562 | Wu | Apr 2008 | A1 |
20080104454 | White | May 2008 | A1 |
20080112315 | Hu et al. | May 2008 | A1 |
20080151821 | Cho | Jun 2008 | A1 |
20080155586 | Yang et al. | Jun 2008 | A1 |
20080195461 | Li | Aug 2008 | A1 |
20080209499 | Ramesh | Aug 2008 | A1 |
20080215718 | Stolorz | Sep 2008 | A1 |
20080247326 | Cormier et al. | Oct 2008 | A1 |
20080263180 | Hurst | Oct 2008 | A1 |
20090010155 | Liu | Jan 2009 | A1 |
20090019503 | Vorbau | Jan 2009 | A1 |
20090059812 | Chinnaswamy | Mar 2009 | A1 |
20090106392 | Zuckerman | Apr 2009 | A1 |
20090164656 | Guan | Jun 2009 | A1 |
20090172200 | Morrison et al. | Jul 2009 | A1 |
20090187956 | Sommer | Jul 2009 | A1 |
20090248872 | Luzzatti | Oct 2009 | A1 |
20090271101 | Relyea | Oct 2009 | A1 |
20090327489 | Swildens | Dec 2009 | A1 |
20090328124 | Khouzam | Dec 2009 | A1 |
20100043014 | Hebeler et al. | Feb 2010 | A1 |
20100080290 | Mehrotra | Apr 2010 | A1 |
20100114562 | Hutchinson | May 2010 | A1 |
20100125675 | Richardson | May 2010 | A1 |
20100169195 | Trest | Jul 2010 | A1 |
20100241701 | Lester | Sep 2010 | A1 |
20100302002 | Guo | Dec 2010 | A1 |
20100306368 | Gagliardi | Dec 2010 | A1 |
20110047413 | McGill | Feb 2011 | A1 |
20110082946 | Gopalakrishnan | Apr 2011 | A1 |
20110196943 | Bornstein | Aug 2011 | A1 |
20110202593 | Vaderna | Aug 2011 | A1 |
20110296048 | Knox | Dec 2011 | A1 |
20120110167 | Joch | May 2012 | A1 |
20120173753 | Moorthy | Jul 2012 | A1 |
20120178426 | Filipov | Jul 2012 | A1 |
20120204068 | Ye et al. | Aug 2012 | A1 |
20120226734 | Poese | Sep 2012 | A1 |
20120240176 | Ma | Sep 2012 | A1 |
20130094445 | De Foy | Apr 2013 | A1 |
20130132605 | Kocks | May 2013 | A1 |
20130142129 | Rinne | Jun 2013 | A1 |
20130198328 | Green et al. | Aug 2013 | A1 |
20130305299 | Bergstrom | Nov 2013 | A1 |
20140108671 | Watson | Apr 2014 | A1 |
20140198641 | Perkuhn | Jul 2014 | A1 |
20140330980 | Richardson | Nov 2014 | A1 |
20150026239 | Hofmann | Jan 2015 | A1 |
20160234293 | Berger | Aug 2016 | A1 |
Entry |
---|
“Relay Nodes in Wireless Sensor Networks: A Survey”—Ataul Bad, University of Windsor, Nov. 2005, http://richard.myweb.cs.uwindsor.ca/cs510/survey_bari.pdf. |
“Simple Opportunistic Routing Protocol for Wireless Mesh Networks”—Rozner et al, University of Texas at Austin, Aug. 2011 http://ericrozner.com/papers/wimesh06.pdf. |
http://www.cs.berkeley.eduf˜kubitron/articles/techreview.pdf “The Internet Reborn”—Wade Roush, Technology Review, Oct. 2003. |
“Firefly-Inspired Heartbeat Synchronization in Overlay Networks”—Binci et al., University of Bologna, Italy, Feb. 2007 http://www.cs.unibo.it/babaoglu/courses/cas06-07/papers/pdf/fireflies.pdf. |
Elo et al., “Virtual URLs for Browsing & Searching Large Information Spaces”, WebNet Journal, pp. 38-43, p. 66, Jan.-Mar. 1999. |
Number | Date | Country | |
---|---|---|---|
61210928 | Mar 2009 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 13767220 | Feb 2013 | US |
Child | 14883532 | US | |
Parent | 12730056 | Mar 2010 | US |
Child | 13767220 | US |