11.12.2012 Views

continued from part 1 - Controller General of Patents, Designs, and ...

continued from part 1 - Controller General of Patents, Designs, and ...

continued from part 1 - Controller General of Patents, Designs, and ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

(12) PATENT APPLICATION PUBLICATION (21) Application No.6320/DELNP/2008 A<br />

(19) INDIA<br />

(22) Date <strong>of</strong> filing <strong>of</strong> Application :18/07/2008 (43) Publication Date : 24/10/2008<br />

(54) Title <strong>of</strong> the invention : METHOD FOR TRANSMITTING A MESSAGE , NETWORK NODE AND NETWORK<br />

(51) International classification :H04L 29/06 (71)Name <strong>of</strong> Applicant :<br />

(31) Priority Document No :10 2006 004 025.2 1)SIEMENS AKTIENGESELLSCHAFT<br />

(32) Priority Date :27/01/2006<br />

Address <strong>of</strong> Applicant :WITTELSBACHERPLATZ 2, 80333<br />

(33) Name <strong>of</strong> priority country :Germany<br />

MUNCHEN,GERMANY. Germany<br />

(86) International Application No :PCT/EP2007/050666 (72)Name <strong>of</strong> Inventor :<br />

Filing Date<br />

:23/01/2007<br />

1)DIPPL; SEBASTIAN<br />

(87) International Publication No :WO 2007/085601 2)RUSITSCHKA;STEFFEN<br />

(61) Patent <strong>of</strong> Addition to Application<br />

Number<br />

Filing Date<br />

:NA<br />

:NA<br />

3)SOUTHALL,ALAN<br />

(62) Divisional to Application Number :NA<br />

Filing Date<br />

:NA<br />

(57) Abstract :<br />

The invention deals with the problem <strong>of</strong> allowing a peer-to-peer network using chord topology, in which some <strong>of</strong> the nodes have<br />

access protection which allows reception <strong>of</strong> messages only <strong>from</strong> those network addresses to which a message has previously been sent<br />

A network such as this is dependent on each node maintaining a list with further nodes, referred to in general as a finger list. In order<br />

to allow communication despite access protection, each node sends a request at fixed time intervals to the nodes in its list, to send it a<br />

message. This makes it possible for each node to send messages to the nodes in its list. A search request for a file is passed on via<br />

intermediate nodes in the network such that the searching node is provided with access to a destination node which can <strong>of</strong>fer the file,<br />

<strong>and</strong> the access protection <strong>of</strong> the destination node is cancelled.FIG 2<br />

No. <strong>of</strong> Pages : 25 No. <strong>of</strong> Claims : 15<br />

The Patent Office Journal 24/10/2008 25773

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!