Packet transfer mechanism over a peer to peer network

ABSTRACT

An apparatus, method and system to improve data transfer across a communications network by employing an acknowledgment independent equalized data packet transfer mechanism on a peer-to-peer basis. The present disclosure teaches how many computers can send data to many other computers, with particularity on a peer-to-peer basis when desired, without requiring acknowledgements of safe receipt by the receiving computer. By aggregating several computers to send data in a collection to a requesting computer, transfer rates may be increased. Further, by not requiring acknowledgment of receipt from the receiving computer, and by treating all data packets with equal utility, the present disclosure teaches a mechanism that reduces file transfer administration bandwidth, increases file transfer scalability on demand, and increases overall network transfer efficiency.

This application claims the benefit of U.S. Provisional Patent Application Ser. No. 60/258,981, filed Dec. 29, 2000.

FIELD

The present invention relates generally to computer systems and network transfer protocols, and more particularly to apparatuses, methods, and systems for highly scalable peer-to-peer transfer mechanisms.

BACKGROUND

Information Technology Systems

Typically, users, which may be people or other systems, engage computers to facilitate information processing. A computer operating system enables and facilitates users to access and operate computer information technology. Information technology systems provide interfaces that allow users to access and operate the various systems.

User Interface

The function of computer interfaces such as cursors, menus, and window components are, in many respects, similar to automobile operation interfaces. Automobile operation interfaces such as steering wheels, gearshifts, and speedometers facilitate the access, operation, and display of automobile resources, functionality, and status. Computer interaction interfaces such as cursors, menus, and windows similarly facilitate the access, operation, and display of computer hardware and operating system resources, functionality, and status. Operation interfaces are commonly called user interfaces. Graphical user interfaces (GUIs) such as the Apple Macintosh Operating System or Microsoft's Windows provide a baseline and means of accessing and displaying information.

World Wide Web

The proliferation and expansion of computer systems, databases, the Internet, and particularly the World Wide Web (the web), have resulted in a vast and diverse collection of information. Various user interfaces that facilitate the interaction of users with information technology systems (i.e., people using computers) are currently in use. An information navigation interface called WorldWideWeb.app (the web) was developed in late 1990. Subsequently, information navigation interfaces such as web browsers have become widely available on almost every computer operating system platform.

Generally, the web is the manifestation and result of a synergetic interoperation between user interfaces (e.g., web browsers), servers, distributed information, protocols, and specifications. Web browsers were designed to facilitate navigation and access to information, while information servers were designed to facilitate provision of information. Typically, web browsers and information servers are disposed in communication with one another through a communications network. As such, information servers typically provide information to users employing web browsers for navigating and accessing information about the web. Microsoft's Internet Explorer and Netscape Navigator are examples of web browsers. In addition, navigation user interface devices such as WebTV have also been implemented to facilitate web navigation. Microsoft's Information Server and Apache are examples of information servers, i.e., their function is to serve information to users that typically access the information by way of web browsers.

Network Transfer Mechanisms

The proliferation and expansion of computer information systems coincides with an increase in network use. Often, transfers of data over a communications network requires the transmission of data packets. A piece of data on a computer system, for example a file, is broken up into pieces of data called packets, and sent to a destination computer system that assembles the received packets. One basic and underlying protocol for such packet transmissions is Transmission Control Protocol Internet Protocol (TCP/IP). The increased use of various communication networks has resulted in increased network traffic. Often, transfers of data over a communication network results in lost or missing data packets.

One model enabling file transfer is the peer-to-peer model. Peer-to-peer is a communications model in which each party has the same capabilities and either party can initiate a communication session. Peers are often referred to as nodes on a network.

Various transfer mechanisms and protocols exist enabling for the transfer of data from one computer system to another. There are at least two basic types of transfer mechanisms: Automatic Retransmission reQuest (ARQ) based implementations and non-ARQ implementations. ARQ based transfer mechanisms request retransmissions for packets of data that are lost in transmission. The receiving computer system triggers retransmissions by explicit or implicit (based on timeouts) ACK/NACKs. The ACK/NACKs are basically acknowledgements that a data packet was or was not successfully received. One old example of an ARQ based mechanism is File Transfer Protocol (FTP). Non-ARQ based mechanisms may sometimes use Forward Error Correction to add a level of reliability. Multicast is another transport mechanism that attempts to deliver a great amount of data to a great number of computers. (See A Reliable Multicast data Distribution Protocol based on software FEC techniques (RMDP), (with Lorenzo Vicisano, UCL), Proc. of the Fourth IEEE HAIEM'97 Workshop, Chalkidiki, Grece, June 1997<http://www.iet.unipi.it/˜luigi/hAIEM97.ps.gz>; and Gemmell, Jim, Schooler, Eve, and Gray, Jim, Fcast Scalable Multicast File Distribution: Caching and Parameters Optimizations, Microsoft Research Technical Report, MSR-TR-99-14, June 1999<http://www.research.microsoft.com/˜JGemmell/pubs/FcastTR-99-14.doc>).

Increased network traffic has strained current communication networks, leading to higher rates of data loss during transmission, and in turn, further worsening network transfers rates. Furthermore, new network applications increasingly involve larger sized transfers of data, which has resulted in increased bandwidth problems. The growing use of communication networks has resulted in an overall problem with regard to network transmission delivery speeds. Such network speed problems in many instances frustrate users.

SUMMARY

The invention provides a mechanism that allows peer-to-peer networks to scale to provide vast amounts of bandwidth, with low latency, and low overhead in a manner that allows for instant and great scalability. Many peer-to-peer network transfer mechanisms suffer from high overhead in sending and receiving feedback regarding data transfers. For example, if a peer on a network employing a mechanism such as Gnutella is disposed in communication with only one other node, then the overhead of acknowledging the safe receipt of a data packet may not be too large. However, as more and more nodes are disposed in communication with one another, the feedback can overwhelm the data transfer. The present invention cures this feedback problem by employing encoding schemes that require little to no feedback or acknowledgment regarding the transfer of data. Furthermore, peer-to-peer transfers have been notoriously “fragile” with mechanisms such as Gnutella because each data packet does not have equal utility. If you are sending a file with a million packets, and the 999,999^(th) packet is lost, the entire file will be rendered corrupt. Thus, the more time someone has invested in a data transfer, the more valuable the packets the user receives become. The present invention overcomes this problem by employing encoding schemes that allow for the reconstruction of the complete data, even when all data packets are not received, thereby further reducing feedback overhead; this has the effect of equalizing value while maximizing the utility for any randomly received data packet. These novel innovations and others through the disclosure allow peers on a network to highly leverage their data, bandwidth, and network resources in ways never before possible.

In one non-limiting example embodiment of the present invention is a method of using a computer, which involves the following: sending a request for data to a targeted computer system, determining if the data is in a look-up list that references other computers having the requested data, sending the request to the other computers having the requested data, encoding the data using an acknowledgement independent equalized data packet encoding scheme, sending the encoded data to a requesting user, receiving the encoded data from sending computers, and decoding the received encoded data.

The above advantages and features are of representative embodiments only, and are not exhaustive and/or exclusive. They are presented only to assist in understanding the invention. It should be understood that they are not representative of all the inventions defined by the claims, to be considered limitations on the invention as defined by the claims, or limitations on equivalents to the claims. For instance, some of these advantages may be mutually contradictory, in that they cannot be simultaneously present in a single embodiment. Similarly, some advantages are applicable to one aspect of the invention, and inapplicable to others. Furthermore, certain aspects of the claimed invention have not been discussed herein. However, no inference should be drawn regarding those discussed herein relative to those not discussed herein other than for purposes of space and reducing repetition. Thus, this summary of features and advantages should not be considered dispositive in determining equivalence. Additional features and advantages of the invention will become apparent in the following description, from the drawings, and from the claims.

BRIEF DESCRIPTION OF THE DRAWINGS

The accompanying drawings illustrate certain embodiments of the disclosure.

FIG. 1 illustrates an acknowledgment independent equalized data packet transfer mechanism (AIEM) node controller according to one embodiment;

FIG. 2 illustrates an example of nodes excerpted from a network topology transferring a file from peer-to-peer;

FIGS. 3A-3C are a flowchart illustrating a non-limiting example embodiment an acknowledgment independent equalized data packet transfer mechanism (AIEM).

DETAILED DESCRIPTION

AIEM Node Controller

FIG. 1 illustrates one embodiment incorporated into an AIEM node controller.

In this embodiment, the AIEM node controller 1101 may be connected to and/or communicate with entities such as, but not limited to: one or more users from user input devices 1111; peripheral devices 1112; and/or a communications network 1113. The AIEM node controller may even be connected to and/or communicate with a cryptographic processor device 1128.

A typical AIEM node controller 1101 may be based on common computer systems that may comprise, but are not limited to, components such as: a conventional computer systemization 1102 connected to a storage device 1114. Storage devices may be a fixed hard disk drive, and/or other devices of the like.

A conventional computer systemization 1102 may comprise a clock 1130, central processing unit (CPU) 1103, a read only memory (ROM), a random access memory (RAM), and/or an interface bus 1107, and conventionally, although not necessarily, are all interconnected and/or communicating through a system bus 1104. The system clock typically has a crystal oscillator and provides a base signal. The clock is typically coupled to the system bus and various means known to those skilled in the art will increase or decrease the base operating frequency for other components interconnected in the conventional computer systemization. The clock and various components in a conventional computer systemization drive signals embodying information throughout the system. Optionally, a cryptographic processor 1126 may similarly be connected to the system bus. Of course, any of the above components may be connected directly to one another, connected to the CPU, and/or organized in numerous variations employed as exemplified by conventional computer systems.

A conventional computer systemization may employ various forms of memory 1129. In a typical configuration, memory will include ROM, RAM, and a storage device. Non-conventional software modules such as an AIEM Module 1125, may be loaded into memory.

The CPU comprises at least one high-speed data processor adequate to execute program modules for executing user and/or system-generated requests. The CPU is a conventional microprocessor such as the Intel Pentium Processor and/or the like. The CPU interacts memory to execute stored program code according to conventional data processing techniques.

Interface bus(ses) 1107 may accept, connect, and/or communicate to a number of interface adapters, conventionally although not necessarily in the form of adapter cards, such as but not limited to: input output interfaces (I/O) 1108, storage interfaces 1109, network interfaces 1110, and/or the like. Optionally, cryptographic processor interfaces 1127 similarly may be connected to the interface bus. The interface bus provides for the communications of interface adapters with one another as well as with other components of the conventional computer systemization. Interface adapters are adapted for a compatible interface bus. Interface adapters conventionally connect to the interface bus via a slot architecture. Conventional slot architectures may be employed, such as, but not limited to: Accelerated Graphics Port (AGP), Card Bus, (Extended) Industry Standard Architecture ((E)ISA), Micro Channel Architecture (MCA), NuBus, Peripheral Component Interconnect (PCI), Personal Computer Memory Card International Association (PCMCIA), and/or the like.

Storage interfaces 1109 may accept, communicate, and/or connect to a number of storage devices such as, but not limited to: storage devices 1114, removable disc devices, and/or the like. Storage interfaces may employ connection protocols such as, but not limited to: (Enhanced) Integrated Drive Electronics ((E)IDE), Institute of Electrical and Electronics Engineers (IEEE) 1394, fiber channel, Small Computer Systems Interface (SCSI), Universal Serial Bus (USB), and/or the like.

Network interfaces 1110 may accept, communicate, and/or connect to a communications network 1113. Network interfaces may employ connection protocols such as, but not limited to: Bluetooth, direct connect, Ethernet (thick, thin, twisted pair 10/100/1000 Base T, and/or the like), IEEE 802.11b, Token Ring, wireless connection, and/or the like. A communications network may be: a direct connection; the Internet; a Local Area Network (LAN); a secured custom connection; a Wide Area Network (WAN); a wireless network (e.g., employing protocols such as, but not limited to a Wireless Application Protocol (WAP), I-mode, etc.); and/or the like. A network interface may be regarded as a specialized form of an input output interface.

Input Output interfaces (I/O) 1108 may accept, communicate, and/or connect to user input devices 1111, peripheral devices 1112, cryptographic processor devices 1128, and/or the like. I/O may employ connection protocols such as, but not limited to: Apple Desktop Bus (ADB); Apple Desktop Connector (ADC); audio: analog, digital, monaural, RCA, stereo, and/or the like IEEE 1394; infrared; joystick; keyboard; midi; optical; PC AT; PS/2; parallel; radio; serial; USB; video: BNC, composite, digital, RCA, S-Video, VGA, and/or the like; wireless; and/or the like. A common output device is a video display, which typically comprises a CRT with an interface (e.g., VGA circuitry and cable) that accepts signals from a video interface. The video interface composites information generated by a conventional computer systemization and generates video signals based on the composited information. Typically, the video interface provides the composited video information through a video connection interface that accepts a video display interface (e.g., a VGA connector accepting a VGA display cable).

User input devices 1111 may be card readers, dongles, finger print readers, gloves, graphics pads, joysticks, keyboards, mouse (mice), trackballs, trackpads, retina readers, and/or the like.

Peripheral devices 1112 may be connected and/or communicate with or to I/O and/or with or to other facilities of the like such as network interfaces, storage interfaces, and/or the like). Peripheral devices may be cameras, dongles (for copy protection, ensuring secure transactions as a digital signature, and/or the like), external processors (for added functionality), goggles, microphones, monitors, network interfaces, printers, scanners, storage devices, visors, and/or the like.

Cryptographic units such as, but not limited to, microcontrollers, processors 1126, interfaces 1127, and/or devices 1128 may be attached, and/or communicate with the AIEM node controller. A MC68HC16 microcontroller, commonly manufactured by Motorola Inc., may be used for and/or within cryptographic units. Equivalent microcontrollers and/or processors may also be used. The MC68HC16 microcontroller utilizes a 16-bit multiply-and-accumulate instruction in the 16 MHz configuration and requires less than one second to perform a 512-bit RSA private key operation. Cryptographic units support the authentication of communications from interacting agents, as well as allowing for anonymous transactions. Cryptographic units may also be configured as part of CPU. Other commercially available specialized cryptographic processors include VLSI Technology's 33 MHz 6868 or Semaphore Communications' 40 MHz Roadrunner284.

A storage device 1114 may be any conventional computer system storage. Commonly a storage device is a fixed hard disk. However, it is to be understood that a conventional computer systemization may be configured to employ many types of memory 1129. For example, a conventional computer systemization may be configured wherein the functionality of on-chip CPU memory (e.g., registers), RAM, ROM, and any other storage devices are provided by a paper punch tape or paper punch card mechanism; of course such an embodiment is not preferred and would result in an extremely slow rate of operation. Generally, any mechanization and/or embodiment allowing a processor to affect the storage and/or retrieval of information is memory 1129. Thus, a conventional computer systemization generally requires and makes use of memory. However, memory is a fungible technology and resource, thus, any number of memory embodiments may be employed in lieu of or in concert with one another.

The storage devices 1114 may contain a collection of program and/or database modules and/or data such as, but not limited to: an operating system module 1115 (operating system); an information server module 1116 (information server); a user interface module 1117 (user interface); a web browser module 1118 (web browser); a database 1119 providing a the ability to look up data/files and identify respective computer systems housing said data/files, and or the like; a cryptographic server module 1120 (cryptographic server); Acknowledgment Independent Equalized Data Packet Transfer Mechanism (AIEM) module 1125; Forward Error Correction (FEC) Cache 1133 a for decoding acknowledgement independent equalized data packets, an area housing data that may be shared with other nodes 1133 b, and/or the like; and/or the like (collectively a module collection). These modules may be stored and accessed from the storage devices and/or from storage devices accessible through an interface bus. Although these modules typically and preferably are stored in a local storage device, they may also be stored in peripheral devices, RAM, remote storage facilities through a communications network, ROM, and/or the like.

The operating system 1115 is executable program code facilitating the operation of an AIEM node controller. Typically, the operating system facilitates access of I/O, network interfaces, peripheral devices, storage devices, and/or the like. The operating system is a conventional product such as a Microsoft Windows, Microsoft Windows NT, Macintosh OS, Linux, Unix, and or others of the like. Preferably, the operating system is highly fault tolerant, scalable, and secure. An operating system may communicate to and/or with other modules in a module collection, including itself, and/or facilities of the like. Conventionally, the operating system communicates with other program modules, user interfaces, and/or the like. For example, the operating system may contain, communicate, generate, obtain, and/or provide program module, system, user, and/or data communications, requests, and/or responses. The operating system, once executed by the CPU, communications networks, data, I/O, peripheral devices, program modules, memory, user input devices, and/or the like. Preferably, the operating system provides communications protocols that allow the AIEM node controller to communicate with other entities through a communications network 1113. Various communication protocols may be used by the AIEM controller as subcarrier transport mechanism, such as, but not limited to: multicast, TCP/IP, User Datagram Protocol (UDP), unicast, and or the like.

An information server module 1116 is stored program code that is executed by the CPU. The information server may be a conventional Internet information server such as, but not limited to, Microsoft's Internet Information Server and/or the Apache Software Foundation's Apache. Preferably, the information server allows for the execution of program modules through facilities such as C++, Java, JavaScript, ActiveX, Common Gateway Interface (CGI) scripts, Active Server Page (ASP), and/or the like. Preferably the information server supports secure communications protocols such as, but not limited to, Secure Hypertext Transfer Protocol (HTTPS), Secure Socket Layer (SSL), and/or the like. Conventionally, an information server provides results in the form of web pages to web browsers, and allows for the manipulated generation of the web pages through interaction with other program modules. An information server may communicate to and/or with other modules in a module collection, including itself, and/or facilities of the like. Most frequently, the information server communicates with operating systems, other program modules, user interfaces, web browsers, and/or the like. An information server may contain, communicate, generate, obtain, and/or provide program module, system, user, and/or data communications, requests, and/or responses.

A user interface module 1117 is stored program code that is executed by the CPU. Preferably, the user interface is a conventional user interface as provided by, with, and/or atop operating systems and/or operating environments such as Apple Macintosh OS, e.g., Aqua, Microsoft Windows (NT), Unix X Windows (KDE, Gnome, and/or the like), and/or the like. The user interface may allow for the display, execution, interaction, manipulation, and/or operation of program modules and/or system facilities through graphical facilities. The user interface provides a facility through which users may affect, interact, and/or operate a computer system. A user interface may communicate to and/or with other modules in a module collection, including itself, and/or facilities of the like. Most frequently, the user interface communicates with operating systems, other program modules, and/or the like. The user interface may contain, communicate, generate, obtain, and/or provide program module, system, user, and/or data communications, requests, and/or responses.

A web browser module 1118 is stored program code that is executed by the CPU. Preferably, the web browser is a conventional hypertext viewing application such as Microsoft Internet Explorer or Netscape Navigator (preferably with 128 bit encryption by way of HTTPS, SSL, and/or the like). Some web browsers allow for the execution of program modules through facilities such as Java, JavaScript, ActiveX, and/or the like. Web browsers and like information access tools may be integrated into PDAs, cellular telephones, and/or other mobile devices. A web browser may communicate to and/or with other modules in a module collection, including itself, and/or facilities of the like. Most frequently, the web browser communicates with information servers, operating systems, integrated program modules (e.g., plug-ins), and/or the like; e.g., it may contain, communicate, generate, obtain, and/or provide program module, system, user, and/or data communications, requests, and/or responses. Of course, in place of a web browser and information server, a “clerver” may be developed to perform similar functions of both. A clerver would similarly affect the obtaining and the provision of information to users, user agents, and or the like from AIEM enabled nodes. The clever may be nugatory on systems employing standard web browsers. For added security, such a clerver module could be configured to communicate directly with the AIEM without an intermediary information server to further enhance security.

A Mesh Table module 1119 may be embodied in a database that is stored program code that is executed by the CPU and it is stored data; the stored program code portion configuring the CPU to process the stored data. Alternatively, the Mesh Table may be implemented using various standard data structures, such as a list, array, struct, and or the like. If the Mesh Table is implemented as a data structure, the use of the Mesh Table may be integrated into another module such as the AIEM module. A Mesh Table may communicate to and/or with other modules in a module collection, including itself, and/or facilities of the like. Most frequently, the Mesh Table communicates with an AIEM module, other program modules, and/or the like. The database may contain, retain, and provide information regarding other nodes and data.

A cryptographic server module 1120 is stored program code that is executed by the CPU 1103, cryptographic processor 1126, cryptographic processor interface 1127, cryptographic processor device 1128, and/or the like. Preferably, cryptographic processor interfaces will allow for expedition of encryption and/or decryption requests by the cryptographic module; however, the cryptographic module, alternatively, may run on a conventional CPU. Preferably, the cryptographic module allows for the encryption and/or decryption of provided data. Preferably, the cryptographic module allows for both symmetric and asymmetric (e.g., Pretty Good Protection (PGP)) encryption and/or decryption. Preferably, the cryptographic module allows conventional cryptographic techniques such as, but not limited to: digital certificates (e.g., X.509 authentication framework), digital signatures, dual signatures, enveloping, public key management, and/or the like. Preferably, the cryptographic module will facilitate numerous encryption and/or decryption protocols such as, but not limited to: Data Encryption Standard (DES), Elliptical Curve Encryption (ECC), International Data Encryption Algorithm (IDEA), Message Digest 5 (MD5, which is a one way hash function), RC5 (Rivest Cipher), Rijndael, RSA (which is an Internet encryption and authentication system that uses an algorithm developed in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman), Secure Hash Algorithm (SHA), Secure Socket Layer (SSL), Secure Hypertext Transfer Protocol (HTTPS), and/or the like. A cryptographic module may communicate to and/or with other modules in a module collection, including itself, and/or facilities of the like. Preferably, the cryptographic module supports encryption schemes allowing for the secure transmission of information across a communications network to enable an AIEM module to engage in secure transactions if so desired by users. Most frequently, the cryptographic module communicates with information servers, operating systems, other program modules, and/or the like. The cryptographic module may contain, communicate, generate, obtain, and/or provide program module, system, user, and/or data communications, requests, and/or responses.

An AIEM module 1125 is stored program code that is executed by the CPU. Generally, the AIEM affects obtaining and the provision of communication, information, transactions, and/or the like between nodes. The AIEM adds the ability to receive and send files to nodes in a distributed manner that is acknowlegement independent and where data packet utility has been equalized. Generally, the AIEM acts as an data transfer mechanism for sending and receiving data. The AIEM coordinates with the Mesh Table to identify nodes that may be useful in improving data transfer for requested data. A AIEM enabling transfers between nodes maybe be developed by employing standard development tools such as, but not limited to: C++, shell scripts, Java, Javascript, SQL commands, web application server extensions, Apache modules, Perl scripts, binary executables, and/or other mapping tools, and/or the like. In one non-limiting example embodiment, the AIEM server employs a cryptographic server to encrypt and decrypt communications. The AIEM may service requests, store requested data, cease servicing requests, and much more. An AIEM module may communicate to and/or with other modules in a module collection, including itself, and/or facilities of the like. Most frequently, the AIEM module communicates with a Mesh Table, information servers, operating systems, other program modules, and/or the like. The AIEM server may contain, communicate, generate, obtain, and/or provide program module, system, user, and/or data communications, requests, and/or responses.

The functionality of any of the AIEM node controller components may be combined, consolidated, and/or distributed in any number of ways to facilitate development and/or deployment. Similarly, the module collection may be combined in any number of ways to facilitate deployment and/or development. To accomplish this, one must simply integrate the components into a common code base or in a facility that can dynamically load the components on demand in an integrated fashion.

The module collection may be consolidated and/or distributed in countless variations through standard data processing and/or development techniques. Multiple instances of any one of the program modules in the program module collection may be instantiated on a single node, and/or across numerous nodes to improve performance through load balancing data processing techniques. Furthermore, single instances may also be distributed across multiple controllers and/or storage devices; e.g., databases.

All program module instances and controllers working in concert may do so through standard data processing communication techniques.

The preferred node controller configuration will depend on the context of system deployment. Factors such as, but not limited to, the capacity and/or location of the underlying hardware resources may affect deployment requirements and configuration. Regardless of if the configuration results in more consolidated and/or integrated program modules, results in a more distributed series of program modules, and/or results in some combination between a consolidated and/or distributed configuration, communication of data may be communicated, obtained, and/or provided. Instances of modules (from the module collection) consolidated into a common code base from the program module collection may communicate, obtain, and/or provide data. This may be accomplished through standard data processing techniques such as, but not limited to: data referencing (e.g., pointers), internal messaging, object instance variable communication, shared memory space, variable passing, and/or the like (intra-application communication).

If module collection components are discrete, separate, and/or external to one another, then communicating, obtaining, and/or providing data with and/or to other module components may be accomplished through standard data processing techniques such as, but not limited to: Application Program Interfaces (API) information passage; (distributed) Component Object Model ((D)COM), (Distributed) Object Linking And Embedding ((D)OLE), and/or the like), Common Object Request Provider Architecture (CORBA), process pipes, shared files, and/or the like (inter-application communication). Again, the preferable embodiment will depend upon the context of system deployment.

AIEM Node Controllers

FIG. 2 illustrates an example of nodes excerpted from a network topology transferring a file from peer-to-peer. In this embodiment, various nodes, configured similarly to the AIEM node controller 1101 embodiment of FIG. 1, are disposed in communication with one another through a communications network 2113. Each node maintains its own Mesh Table 2208 as pictured in the starting node 2201. The Mesh Table may be implemented as a database 1119 of FIG. 1 by creating a two-column table with data identifiers 2207 that relate to at least one or more associated nodes 2206. In an alternative embodiment, the Mesh Table may employ a third field tracking available packets 2205 associated with the data identifier 2207. An available packet field is useful as it allows nodes to start servicing and providing parts of a file, even when the entire file itself has not yet been downloaded from elsewhere. Nodes 2202 d, 2202 e, and 2203 all have incomplete files demarcated by hollow boxes representing packets that have yet to be decoded. Thus packets D, F, O, P, N, and M are all encoded versions of original un-encoded packets A, and B. Un-encoded packets are represented by shaded boxes, e.g., packets A and B. Packets that have been received at a node are demarked by boxes with solid lines; e.g., packets A and B at nodes 2202 a, 2202 b, 2202 c, and 2201; un-encoded packet D at node 2202 d; and un-encoded packet F at node 2202 e.

In one example, the starting node 2201 references that file X has successfully been received an decoded packet into original packets A and B, which is reflected in the available packets column 2205 for file X. In one embodiment, the available packet data stored in an available packet field in a Mesh Table, may simply be a number representing a packet segment in a sequence, and or the like.

All the nodes that relate to a particular file are members of an associated mesh. Thus, for example, the starting node may have a file identified as “X” that references associated mesh nodes “2201,” “2202 a,” “2202 b,” “2202 c,” 2202 d,” “2202 e,” and “2203” 2206. The actual values stored in an associated mesh node field may be network addresses that reference nodes known to contain the associated file. For example, nodes “2201,” “2202 a,” “2202 b,” “2202 c,” 2202 d,” and 2202 e,” and “2203” are all known to hold at least a part of file “X” while none of those nodes holds files Y or Z. The network address may be a simple IP address, and or the like. In an alternative embodiment, the Mesh Table may be implemented in various data structures, such as, but not limited to, a list, an array, and or the like. The data identifier may be a simple file name referencing files in a node's local memory. In an alternative embodiment a Secure Hash Algorithm (SHA-1) is employed to generate a unique identifier based on data (file) content, which is also used to reference a file in a node's local memory. Various other naming and identification techniques may also be used.

In one non-limiting embodiment of an example AIEM network transaction, initially, a requesting node 2203 may provide an initial request for a file, e.g., “X,” to a starting node 2201. It is important to note that there need not be any substantial, or any, difference in configuration and operation between the starting nodes and any other nodes on the network. In a very real sense, all the nodes on the network are peers, and vary substantially only in the data they house and reference. Thus, a starting node may be any node on a LAN referencing little and narrowly tailored data sets, or it may be a mega ISP/Internet Portal referencing vast data sets. Of course each node may also vary in capacity with greater or lower memory and/or processing abilities, but interactions may proceed in similar fashion for all nodes. In an alternative embodiment, one may tailor nodes for certain data sets and performance optimizations that may change some of the internal workings of the each node, but basic interaction between nodes will be maintained. In one embodiment, a user running AIEM enabled software will have a default starting node supplied for an initial request to kick start and populate the new node's Mesh Table.

The requesting node's 2203 request may be generated by a software module capable of forming an HTTP request, and or like protocol, and sending it to a desired target node. In one non-limiting example, a web browser may be employed. The starting node 2201 receives the request for data from the requesting node 2203 and processes it. Each node has the equivalent of an information server running on it that is capable of receiving requests and provides facilities to process the request and respond to it. In one alternative embodiment, the message generation and message receipt are handled by a single software module called a “clerver,” which represents both client and server functionalities in one unit. This clever ability allows for the simultaneous sending and receiving of data packets.

Returning to the example, upon having received the request for data, for example a request by the requesting node 2203 of the starting node 2201 for file “X,” the starting node 2203 may distribute the task of sending file “X” to nodes associated with file “X” in its Mesh Table 2208. Next, the starting node determines a set of nodes to aid in transferring file “X” to the requesting node. How these nodes are selected from the Mesh Table will be discussed in greater detail with regard to FIGS. 3A-3C. The selected mesh nodes may be sent as a list of nodes in HTML, plain text, data structures, and or the like.

In one embodiment, not pictured in FIG. 2 for purposes of figure clarity, the starting node will send selected mesh nodes to the requesting node 2203 in a list. The requesting node will then receive a Mesh List sent from the starting node 2201. The requesting node will then integrate the received Mesh List into its own Mesh Table. A sent Mesh List may be incorporated into a node's Mesh Table by parsing the list, and selecting a data identifier and associated mesh nodes. Thereafter, based on the data identifier, the associated mesh nodes from the Mesh List may be added into the Mesh Table so that they maintain an association with the data identifier. If the Mesh Table does not have a data identifier matching one sent in the Mesh List, a new data identifier entry is created in the Mesh Table and the associated nodes from the Mesh List are parsed from the Mesh List and are entered into associated mesh node 2207 fields.

Next, the requesting node will then itself directly request file “X” across a communications network 2113 b from the selected nodes as returned in the Mesh List. In an alternative embodiment, i.e., the “push” model, the starting node 2201 directly messages the selected mesh nodes across a communications network 2213 a to start transferring file “X” to the requesting node (as depicted by dashed arrows to nodes 2202 a, 2202 b from node 2201). In our example, the starting node selected nodes 2202 a and 2202 b to form a mesh with the requesting node 2203 forming a mesh 2230 around file “X” denoted by a dashed line surrounding nodes “2202 a,” “2202 b,” and “2203.” Nodes 2202 a, 2202 b have file “X” 2204 stored in memory in an un-encoded stat, and upon receiving a request for the file, the nodes 2202 a, 2202 b encode the file using a an acknowledgement independent equalized data packet encoding scheme.

In one non-limiting example, FEC encoding is employed. FEC employs a (k, n) block erasure code where k is less than or equal to n. Basically, using FEC, one takes k un-encoded source packets of data, and produces n encoded packets. The n packets are encoded in such a way that receiving computer need only receive k number of the n encoded packets to decode and recreate the original data. In an alternative embodiment, optimized FEC require slightly greater than k number of received encoded packets to decode and recreate the original data, e.g., tornado codes.

In this example, the file is encoded into four packets, N, M, O and P. Let's assume for purposes of example k is equal to 2 and n is much larger than k. This means that as long as a node receives any two different encoded packets, the entire file may be decoded and recreated back into the original state of file “X” (A+B) and stored in memory.

Upon having encoded file “X,” each of the nodes 2202 a, 2202 b begins sending encoded data packets to the requesting node 2203 across a communications network 2213 b. In this example, node 2202 a has sent encoded packets of “X” M and N. Node 2202 a seems to be a low latency and high bandwidth node as the packets will be arriving faster and with greater density than encoded packets sent from node 2202 b. The likely result is that the requesting node will first receive packet M from node 2202 a and then packet P from node 2202 b. Upon obtaining the required k=2 packets, the requesting node may begin decoding the received packets M+P and recreating the original file “X” even before additional packets N 2202 a and O 2202 b arrive. As each encoded packet arrives, both sending and receiving nodes may update their respective Mesh Tables to reflect that the receiving node is now in possession of the received packets and or file. Updating Mesh Tables on a per packet basis has the advantage that a receiving node may now service other nodes requesting the data, which in turn decreases network latency while improving network throughput. The available packets field may track available packets and identify if the available packets are in an encode or decoded state. Decoded packets may again be re-encoded and sent on to requesting nodes on demand.

In another non-limiting example of a file request transaction, a mesh 2231 is formed around nodes 2202 d, 2202 e and 2201, wherein nodes 2202 d, and 2202 e have both requested file X from node 2201. Node 2202 d has already received encoded packet D from node 2201, while node 2202 e has already received encoded packet F. However, because node 2201 has informed both nodes 2202 d, and 2202 e of each other's existence via a Mesh List, the two requesting nodes 2202 d, 2202 e “JOIN” one another and start exchanging data packets they have received. Thus, without further interaction from starting node 2201, node 2202 e sends encoded packet F to 2202 d, while node 2202 d sends encoded packet D to node 2202 e. Upon each of these requesting nodes obtaining packets D and F from one another, they will both have the requisite k=2 encoded data packets to recreate file X by decoding the FEC encoded packets D+F. Furthermore, in the course of interaction with starting node 2201, nodes 2202 d, and 2202 e may become aware of node 2203 and have node 2203 added to their Mesh Tables.

AIEM Interaction System

FIGS. 3A-3C show a flowchart illustrating a non-limiting example embodiment of an an acknowledgment independent equalized data packet transfer mechanism (AIEM) and various interactions. Logical flow is represented by arrows with solid arrow heads 3379, while data flow is represented by hollow arrow heads 3389.

Requesting Node

Initially a user sends a request for a file 3301. This may be achieved by engaging a user interface module 1117 of FIG. 1, web browser module 11118 of FIG. 1, a clerver, and/or the like facility that has been adapted to interact with or employ AIEM. In one non-limiting example embodiment, a web page may be constructed with a hyperlink that contains a data identifier, and mesh nodes known to house the data referenced by the data identifier, i.e., embedding a Web List into a hyperlink. If a user engages the hyperlink, the data identifier would be sent to members of the node mesh who would in turn affect the accelerated and distributed transfer of the requested file to the user. This distributed transfer of data from various nodes is swarm-like in its appearance and effect. The web browser is enabled to receive the incoming encoded packets via a plug that provides the requisite decoding functionality for any incoming packets resulting from the hyperlink executed request. In an alternative embodiment, the user selects or provides the address of a starting node. The user may then send the initial request to the starting node for desired data 3301.

Upon sending an initial request for data 3301 (for example, a user may request an a musical composition in MP3 format by the artist Elvis), the starting node receives the request for the data 3302.

Starting Node

Upon receiving the request 3302, a relevant Mesh List will be sent to relevant nodes 3333. To send a Mesh List to relevant nodes 3333, first the starting node will parse the request, extracting the desired data. In one embodiment, XML tags are employed to demark requests for files, requests to LEAVE a node, requests to JOIN a node, and or the like. Providing such commands in an XML tagged fashion eases parsing. In alternative embodiments, standard parsing, request, and distributed network messaging techniques may be employed to form and interpret requests. Upon parsing the request, the requested data is compared to entries in the starting node's Mesh Table. If the requested data does not match a data identifier in the Mesh Table 3304, an error message is sent to the requesting node 3320, for example, informing the user that no such file was found. In an alternative embodiment, fuzzy logic techniques may be employed to return potentially desired data, e.g., close spellings, etc. If the requested data does match a data identifier in the Mesh Table 3304, then the starting node determines what nodes are may service the request based on the requested data 3305. This determination may be achieved using database selects, or standard string compare data processing techniques 3305. Upon having serviceable nodes 3305, the starting node then may determine which of those serviceable nodes to include into a Mesh List for sending back to the requesting node, and/or other relevant nodes 3306. Mesh List determination 3306 will be described further below. Upon having determined and created a Mesh List 3306, the starting node may then send the Mesh List 3366 to a requesting node 3367. Upon receiving the Mesh list 3367, the requesting node may then send a request 3368 for data to all nodes determined 3306 and referenced in the received Mesh List 3308 (swarm nodes). In an alternative “push” embodiment 3307, the starting node may itself send/forward the request for data made by the user on behalf of the requesting node to swarm nodes 3308. Upon having sent the Mesh List to the relevant node 3307, 3366, 3333 (either the requesting node or swarm nodes directly, depending upon if a push variant is employed or not), the starting node determines if a terminate event has occurred 3385. For example, terminate even may be created by a user at a starting node terminating the AIEM software module. If no terminate even occurred, iteration will proceed 3302. If a termination event was logged 3385, then execution will cease 3386.

Mesh List Determination

Mesh List determination 3306 may be achieved by employing numerous selection criteria. The preferred determination scheme varies depending upon factors such as, but not limited to, underlying deployment resources, node data specialization, communication connection quality, and or the like. In one non-limiting embodiment, a node building a Mesh List will populate the Mesh List with a specified number of random nodes selected from its Mesh Table associated with the requested data 3304. The specified number may be set in a preferences panel, hardwired, based on available system resources, and or like factors. In an alternative embodiment, the Mesh List building node will populate a Mesh List with all nodes selected from its Mesh Table associated with the requested data.

In an alternative embodiment, the Mesh List building node will populate a Mesh List with nodes selected from its Mesh Table associated with the requested data (earmarked nodes), wherein the selected nodes are deemed to have the best data transfer rates. Determination of transfer rates may be achieved by employing a hill-climbing analysis of earmarked nodes. In one example embodiment, the Mesh List building node will test all earmarked nodes. In another example embodiment, the Mesh List building node will select a subset of earmarked nodes at random and test their transfer rates. Testing of transfer rates may be achieved by simple pinging, logging and analyzing any return trip times. Alternatively, testing of transfer rates may be achieved by requesting a specified number of packets from the earmarked nodes. Earmarked nodes may be disqualified if their response time is too slow, if they send too many duplicate packets, and or the like undesirable transfer factors. When the transfer rates of the earmarked nodes are identified, the Mesh List building node may populate the Mesh List with a specified number of the highest performing nodes based on the hill climbing results.

In one non-limiting example embodiment of the hill-climbing test, the Mesh List building node will send out a request to earmarked (or specified subset thereof) nodes simultaneously and identify a further specified number of top performing nodes. For example, the Mesh List building node may query 20 earmarked nodes, and then further identify the top 5 performing nodes. Thereafter, the Mesh List building node may send a request to those top (5) performing nodes for another top 20 nodes each. Based on those results, the Mesh List building node may then again test the performance of a specified number of the returned (100) nodes and identify a new set of top performing (5) nodes. This hill stepping iteration may go on for a specified number of iterations, until the top nodes remain high static and or other hill step terminating indicia of the like. In an alternative embodiment, the worst performing nodes and average performing nodes are also identified and used to populate the final resulting Mesh List that is to be sent 3366, 3307 by the Mesh Building node. By injecting average and poorly performing nodes, i.e., by providing a Mesh List with a mix of node level performance, there is an increased chance that the “gene pool” of results will stay varied and thus return a greater diversity of results.

Swarm Nodes

Each individual swarm node, upon having received a request for data from a requesting (or even starting) node 3308, will first determine if it is overloaded 3314. A node may be overloaded in that its send, receive, and/or computational resources are saturated, or it has been made otherwise unavailable. If that is the case, the swarm node may re/send the received request 3308 to other 3308 relevant swarm members 3333 b, similarly the discussion of so doing for the starting node 3333 a. In an alternative embodiment, if the swarm node is overloaded 3314, servicing of the latest received request for data 3308 may simply be terminated 3386 c.

If the swarm node is not overloaded 3314, then swarm node will determining if the LEAVE request has been sent to stop sending packets 3309. The swarm node may parse the request similar to the discussion of request parsing at the starting node 3333 a to determine the request message content. If a LEAVE request has been made 3309, then servicing of request for data 3308 to the node supplying the LEAVE request may be terminated 3386 c. If the request is not to stop sending packets 3309, the swarm node determines if the request for data 3310. If the request is not for data 3310, then the swarm node may re/send the received request 3308 to other 3308 relevant swarm members 3333 b, similarly the discussion of so doing for the starting node 3333 a. If the request is for data 3310, then the swarm node will determine if the requested data is still in memory at the node 3311. It is important to note that a request for data may be a new request for an entire file, a request to send an un-received file packet, and or block. Although by employing acknowledgement independent encoding the present invention does not require feedback, negotiations, and or synchronization, in alternative embodiment such file transfer acknowledgements may be employed for purposes of optimization, for example, if non-acknowledgement transfers fail to result in a successful transfer.

If the requested data is not still in memory at the node 3311, then the swarm node will determine if the requested data is referenced in the mesh table 3312, and if not send an error to the requesting node 3320. If the requested data is referenced in the mesh table 3312, then the swarm node may re/send the received request 3308 to other 3308 relevant swarm members 3333 b, similarly the discussion of so doing for the starting node 3333 a. if the requested data is still in memory at the node 3311, then the swarm node will begin to send Acknowledgment Independent Equalized (AIE) encoded data packets 3344. In one non-limiting example embodiment the AIE encoded data packets are encoded using FEC encoding 3344. For sake of clarity, henceforth FEC encoding will be used to provide a concrete example of AIE encoding, but it should be noted that other AIE encoding schemes may be used in place of FEC encoding.

Sending FEC encoded data 3344 begins with encoding the requested data with a FEC encoder 3315. The swarm node may then check 3316 to see if a LEAVE request has been made 3308 in the interim and if so, the swarm node may stop sending packets 3386 c. If no message to stop sending encoded packets has been received 33116, then the swarm node sends another encoded packet 3318 to the requesting node 3326. Although the swarm node may encode the entire data file all at once 3315 into a FEC cache 1133 a of FIG. 1, in an alternative embodiment, the swarm node only generates the next encoded packet on demand right before a send is required 3315. In an alternative embodiment, upon sending the encoded packet 3318, the swarm node's Mesh Table is updated to reflect the availability of the sent packet 3318 at the requesting node 3326. Upon sending the needed packet 3318 (or alternatively after logging packet availability 3382 in the swarm node's Mesh Table), iteration continues until a request to stop sending packets 3316 is received 3386 c.

In an alternative embodiment of encoding the requested data 3315, the data may first be segmented before being sent. Segmentation may be accomplished employing standard file splitting and catenation tools and techniques (e.g., Unix tools such as sed, head, tail, cat). Upon segmenting the file into segmented blocks, each segmented block may be encoded as already discussed above 3315. The segmentation and subsequent encoding may lead to performance and latency gains somewhat similar to performance gains offered by RAID (Redundant Array of Independent Disks) striping techniques.

Requesting Node Receive

Upon receiving encoded packets 3326 from swarm nodes 3318, the requesting node determines if the received encoded packets are useful or nugatory 3325. For example, if a single swarm node sends the same encoded data packet multiple times, the packets will be useless and thrown out and the requesting node will need to obtain additional required packets 3330. When requesting additional required packets 3330, the requesting node may make a request of other swarm nodes identified in a Mesh List, or Mesh Table that the requesting node is currently not receiving data from, and send such non utilized swarm nodes a “JOIN” request for data. Also, in making the request for additional units 3330, the requesting node may also send a “LEAVE” message to the swarm nodes sending un-needed packets so that they stop sending un-needed packets 3309.

If the received encoded packet is useful for recreating the requested data 3325, then the requesting node may determine if received encoded packet was sent too slowly 3324. If data is being sent to slow from a swarm node 3324, the requesting node may try to find faster swarm nodes that it has not been utilizing in its Mesh Table and or Mesh List 3323. Also, the requesting node may send a “LEAVE” message to the slow swarm nodes 3308 requesting that the slow swarm nodes stop sending packets 3321.

If the useful 3325 encoded packet is being sent at an acceptable rate 3324, then received encoded packet will be decoded 3327 once enough packets have been accumulated to do so (via FEC and or other like encoding schemes). If enough packets have been received to decode data, that data is decoded 3327 and then that decoded data is logged as being available 3322 b in the requesting node's Mesh Table. If not enough packets have been received to decode data 3327, then the encoded packet is logged as being available 3322 b in the requesting node's Mesh Table. Next, the requesting node determines if it is still receiving packets 3328. If the requesting node is still receiving packets, receive decoding 3355, 3326 iteration continues. If the requesting node is not still receiving packets, the receiving node determines if there is enough received data to build the entire file 3329. This step is useful for when recombining, e.g., catenation, decoded segments in an alternative segmented embodiment as discussed above regarding segmented encoding 3315. It is also useful to determine if all the required segments have been decoded. If not enough data exists to reconstruct the complete data 3329, then a request for additional data may be made as already discussed above 3330. If there is enough data to attempt to reconstruct the data 3329, then the requesting node will determine if the file has been successfully reconstructed 3331. If the file was not successfully reconstructed 3331, then additional requests for data will be made 3330. Conversely, if the file was successfully encoded and reconstructed 3331, then the requesting node may check to see the user wishes to request another file 3332. It's important to note that the requesting node may execute many portions of the above flow chart concurrently and that a user may send several request for data 3301 without having to wait for decoding success 3331. If the user does not wish to request more data, execution may terminate 3386 b.

It should be understood that the above description is only representative of illustrative embodiments. For the convenience of the reader, the above descriptions have focused on a representative sample of all possible embodiments, a sample that teaches the principles of the invention. The description has not attempted to exhaustively enumerate all possible variations. That alternate embodiments may not have been presented for a specific portion of the invention or that further undescribed alternate embodiments may be available for a portion is not to be considered a disclaimer of those alternate embodiments. It will be appreciated that many of those undescribed embodiments incorporate the same principles of the invention and others are equivalent. Thus, it is to be understood that the embodiments and variations shown and described herein are merely illustrative of the principles of this invention and that various modifications may be implemented without departing from the scope and spirit of the invention. 

1. A network method for distributing data to a plurality of computers, comprising: sending a first portion of the data to a first computer; sending a second portion of the data to a second computer, where the second portion includes at least some of the data not sent to the first computer; after sending to the first computer and the second computer has commenced, sending a request for the data from a requesting computer to a targeted computer system; accessing a look-up list to identify at least the first and second computers that have previously requested the data; prior to receiving all of the data at the first and second computers, sending requests to the identified first and second computers; sending the first portion of the data from the first computer to the requesting computer; sending at least some of the second portion of the data from the second computer to the requesting computer; receiving, with the requesting computer, the first portion of the data from the first computer; receiving, with the requesting computer, at least some of the second portion of the data from the second computer, the data received from the second computer including at least some of the data not sent to the first computer; and saving the data in memory of the requesting computer to recreate the requested data.
 2. The method of claim 1, wherein data transmission is accomplished from the computers over a peer-to-peer network, wherein the computers that previously requested and downloaded at least a portion of the requested data are peers with the requesting computer.
 3. The method of claim 1, wherein encoded packets are relayed.
 4. The method of claim 1, wherein the look-up list is populated with nodes based on data transfer rates.
 5. The method of claim 1, wherein the look-up list is populated with nodes based on data types stored within the nodes.
 6. The method of claim 1, wherein the look-up list is a mesh list that records which partial portions of the data each of the other computers has received, and wherein accessing the look-up list to identify the other computers includes selecting the identified computers based on the record of which partial portions of the data each of the other computers has received.
 7. The method of claim 1, further comprising: re-encoding each of the first and second portions at the identified first and second client computers using an acknowledgement independent equalized data packet encoding scheme that is a FEC encoding, and decoding the FEC encoded portions from the identified first and second client computers to recreate the requested data.
 8. The method of claim 7, wherein the data that is to be encoded is segmented before encoding.
 9. The method of claim 1, wherein the received encoded packets are decoded, and then re-encoded for further transmission upon request.
 10. A method of using a computer for transferring data, comprising: receiving a request for data from a requesting computer; accessing a look-up list to identify peer computers that have previously downloaded at least a portion of the requested data; sending requests to the identified other peer computers, wherein at least two of the identified peer computers have downloaded different partial portions of the requested data upon receiving the requests, and wherein the at least two identified peer computers includes a first peer computer that has downloaded at least a first partial portion and a second peer computer that has downloaded at least a second partial portion without downloading all of the first partial portion; encoding the different partial portions of the requested data at the identified computers for network transmission, and sending the encoded different partial portions of the data from at least two different ones of the peer computers to the requesting computer and completing the download of the data at the identified peer computers.
 11. The method of claim 10, wherein data transmission is accomplished over a peer-to-peer network.
 12. The method of claim 10, wherein encoded packets are relayed.
 13. The method of claim 10, wherein the look-up list is populated with nodes based on data transfer rates.
 14. The method of claim 10, wherein the look-up list is populated with nodes based on data types stored within the nodes.
 15. The method of claim 10, wherein the look-up list is a mesh list.
 16. The method of claim 10, wherein the acknowledgement independent equalized data packet encoding scheme is a FEC encoding.
 17. The method of claim 10, wherein the data that is to be encoded is segmented before encoding.
 18. A method of using a computer for transferring data from a set of peer computers to a requesting computer, comprising: receiving a request for data at a source computer; maintaining a list of peer computers that have previously downloaded at least a portion of the data, wherein the list records which partial portions of the data each of the other computers has received; selecting a set of the peer computers based on the record of which partial portions of the requested data each of the peer computers has downloaded, wherein the set of peers includes a first peer computer that has downloaded at least a first partial portion downloaded and a second peer computer that has downloaded at least a second partial portion without downloading the first partial portion; independently encoding the different portions of the data at the peer computers prior to receiving all of the data at the peer computers; and sending the encoded different portions of the data from at least two different ones of the peer computers to the requesting computer and completing the download of the remaining portions of the data with the peer computers.
 19. The method of claim 18, wherein data transmission is accomplished over a peer-to-peer network.
 20. The method of claim 18, wherein encoded packets are relayed.
 21. The method of claim 18, wherein the list is populated with nodes based on data transfer rates, and wherein each node represents a different one of the peer computers.
 22. The method of claim 18, wherein the list is populated with nodes based on data types stored within the nodes, and wherein each node represents a different one of the peer computers.
 23. The method of claim 18, wherein the list is a mesh list.
 24. The method of claim 18, wherein encoding comprises encoding with FEC encoding.
 25. The method of claim 18, wherein the data that is to be encoded is segmented before encoding.
 26. A method of using a computer for dynamically transferring data, comprising: sending a request for data to a targeted computer capable of servicing the request; receiving encoded data packets from at least two different sending computers that have previously downloaded different portions of the data from the targeted computer, wherein the sending computers include a first sending computer that has downloaded at least a first partial portion and a second sending computer that has downloaded at least a second partial portion without downloading all of the first partial portion, wherein the sending computers send the downloaded different portions of the data and complete downloading of the remaining portions of the data; decoding the received encoded data; and saving the decoded data in memory.
 27. The method of claim 26, wherein data transmission is accomplished over a peer-to-peer network.
 28. The method of claim 26, wherein the encoded packets are relayed.
 29. The method of claim 26, further comprising maintaining at the targeted computer a list of the computers that have previously downloaded at least a portion of the requested data, wherein the list is populated with nodes based on data transfer rates.
 30. The method of claim 29, wherein the list is populated with nodes based on data types stored within the nodes, and wherein each of the nodes represents a different one of the computers.
 31. The method of claim 29, wherein the list is a mesh list.
 32. The method of claim 26, wherein the encoded packets are encoded with an acknowledgement independent equalized data packet encoding scheme.
 33. The method of claim 26, wherein the data that is to be encoded is segmented before encoding.
 34. The method of claim 26, wherein the received encoded packets are decoded, and then re-encoded for further transmission upon request.
 35. A system for using a computer for transferring data, comprising: means to send a request for data from a requesting computer to a targeted computer; means to access a look-up list to identify other computers that have previously downloaded at least a portion of the requested data from the targeted computer, wherein the other computers includes a first peer computer that has downloaded at least a first partial portion and a second peer computer that has downloaded at least a second partial portion having at least some data different from the first partial portion; means to send requests to the identified computers; means to send the first partial portion of the data from the first peer computer and at least some of the second partial portion from the second peer computer to the requesting computer and complete downloading of the remaining portions of the data within the identified computers; means to receive the different partial portions of the data from identified computers; means to save the data in memory.
 36. The system of claim 35, wherein data transmission is accomplished over a peer-to-peer network.
 37. The system of claim 35, wherein the data is relayed.
 38. The system of claim 35, wherein the look-up list is populated with nodes based on data transfer rates, and wherein each of the nodes represents a different one of the computers that have previously downloaded the data, and wherein the data transfer rates represents data transfer rates at which the data was previously downloaded to the computers.
 39. The system of claim 35, wherein the look-up list is populated with nodes based on data types stored within the nodes.
 40. The system of claim 35, wherein the look-up list is a mesh list.
 41. The system of claim 35, further comprising means to encode the data at the identified computers using an acknowledgement independent equalized data packet encoding scheme prior to sending.
 42. The system of claim 41, wherein the acknowledgement independent equalized data packet encoding scheme is a FEC encoding.
 43. The system of claim 41, wherein the received encoded packets are decoded at the requesting computer, and then re-encoded for further transmission upon request.
 44. A system for using a computer for transferring data, comprising: means to receive a request for data from a computer; means to access a look-up list to identify a set of peer computers that have previously requested and downloaded at least a portion of the data, wherein the set of peer computers includes a first peer computer that has downloaded at least a first partial portion downloaded and a second peer computer that has downloaded at least a second partial portion without downloading all of the first partial portion; means to initiate transfer of the previously downloaded portions of data from identified computers to the requesting computer, wherein the identified computers have only downloaded different partial portions of the requested data; and means to send the portions of the data from the identified computers to the requesting computer and complete downloading of the remaining portions of the data.
 45. The system of claim 44, wherein data transmission is accomplished over a peer-to-peer network, and wherein the computers that have previously downloaded the data are peers with the requesting computer.
 46. The system of claim 44, wherein the sending means includes means for encoding and relaying packets.
 47. The system of claim 44, wherein the look-up list is populated with nodes based on data transfer rates.
 48. The system of claim 44, wherein the look-up list is populated with nodes based on data types stored within the nodes.
 49. The system of claim 44, wherein the look-up list is a mesh list.
 50. The system of claim 44, further comprising: means to independently encode the different partial portions of the data at the identified computers using an acknowledgement independent equalized data packet encoding scheme, wherein the acknowledgement independent equalized data packet encoding scheme is a FEC encoding.
 51. The system of claim 44, wherein the data that is to be encoded is segmented before encoding.
 52. A system for transferring data from a set of peer computers to a requesting computer, comprising: means to receive at a source computer a request to download data, wherein the source computer maintains a list of peer computer that have previously downloaded at least a portion of the data, wherein the list of peer computers specifies a first peer computer and a second peer computer, wherein, at the time of the request, the first peer computer has downloaded a first portion and the second peer computer has downloaded a second portion without downloading all of the first portion; means to encode the data at the peer computers for network data transmission; means to send the encoded data from the peer computers to a requesting computer and complete the download of the remaining portions of the data.
 53. The system of claim 52, wherein data transmission is accomplished over a peer-to-peer network.
 54. The system of claim 52, wherein encoded packets are relayed.
 55. The system of claim 52, wherein the list is populated with nodes based on data transfer rates.
 56. The system of claim 52, wherein the list is populated with nodes based on data types stored within the nodes.
 57. The system of claim 52, wherein the list is a mesh list.
 58. The system of claim 52, wherein the acknowledgement independent equalized data packet encoding scheme is a FEC encoding.
 59. The system of claim 52, wherein the data that is to be encoded is segmented before encoding.
 60. A system for dynamically transferring data from a set of peer computers to a requesting computer, comprising: means to send a request for data to a targeted computer capable of servicing the request; means to receive data packets from sending computers that have previously downloaded different portions of the data from the targeted computer, wherein the sending computers include a first peer computer that has downloaded a first portion and a second peer computer that has downloaded a second partial portion without downloading all of the first portion, wherein the sending computers send the data packets of the downloaded different portions and complete the download of the remaining portions of the data; means to decode the received data; and means to save the decoded data memory.
 61. The system of claim 60, wherein data transmission is accomplished over a peer-to-peer network.
 62. The system of claim 60, wherein encoded packets are relayed.
 63. The system of claim 60, further comprising means for maintaining at the targeted computer a list of the computers that have previously downloaded at least a portion of the requested data, wherein the list is populated with nodes based on data transfer rates.
 64. The system of claim 63, wherein the list is populated with nodes based on data types stored within the nodes.
 65. The system of claim 63, wherein the list is a mesh list.
 66. The system of claim 60, wherein the data packets are encoded using an acknowledgement independent equalized data packet encoding scheme.
 67. The system of claim 60, wherein the data that is to be encoded is segmented before encoding.
 68. The system of claim 60, wherein the received encoded packets are decoded, and then re-encoded for further transmission upon request.
 69. A program stored on a medium readable by a processor, the program comprising: a module to send a request for data to a targeted computer system; a look-up list that references other peer computers that previously downloaded different partial portions of the requested data and initiates transfer from the identified peer computers to the requesting computer while the identified peer computers complete the download of the remaining portions of the data, the peer computers including a first peer computer that has downloaded a first portion of the data and a second peer computer that has downloaded a second portion of the data without downloading all of the first portion; a module to receive the encoded data from identified peer computers; a module to decode the received encoded data; and a module to save the decoded data in memory.
 70. The medium of claim 69, wherein data transmission is accomplished over a peer-to-peer network.
 71. The medium of claim 69, wherein encoded packets are relayed.
 72. The medium of claim 69, wherein the look-up list is populated with nodes based on data transfer rates.
 73. The medium of claim 69, wherein the look-up list is populated with nodes based on data types stored within the nodes.
 74. The medium of claim 69, wherein the look-up list is a mesh list.
 75. The medium of claim 69, wherein the peer computers use an acknowledgement independent equalized data packet encoding scheme.
 76. The medium of claim 75, wherein the data that is to be encoded is segmented before encoding.
 77. The medium of claim 75, wherein the received encoded packets are decoded, and then re-encoded for further transmission upon request.
 78. A program stored on a medium readable by a processor, the program comprising: a module to receive a request for data from a requesting computer having one or more peer computers; a module to identify which of the peer computers have previously requested and downloaded the data; and a module to send requests to the identified peer computers to direct the peer computers to encode the data using an acknowledgement independent equalized data packet encoding scheme and send the encoded data to the requesting computer, wherein the identified computers have received different partial portions of the requested data, wherein the identified computers include a first peer computer has downloaded at least a first portion and a second peer computer that has downloaded a second portion without downloading all of the first portion, and wherein the identified computers send the encoded data to the requesting computer and complete the download of the remaining portions of the requested data.
 79. The medium of claim 78, wherein data transmission is accomplished over a peer-to-peer network.
 80. The medium of claim 78, wherein encoded packets are relayed.
 81. The medium of claim 78, further comprising a module that maintains a look-up list that identifies the peer computers that previously downloaded the data, wherein the look-up list is populated with nodes based on data transfer rates.
 82. The medium of claim 81, wherein the look-up list is populated with nodes based on data types stored within the nodes.
 83. The medium of claim 81, wherein the look-up list is a mesh list.
 84. The medium of claim 78, wherein the acknowledgement independent equalized data packet encoding scheme is a FEC encoding.
 85. The medium of claim 78, wherein the data that is to be encoded is segmented before encoding.
 86. A program stored on a medium readable by a processor of a first peer computer of a peer to peer network, the program comprising: a module to download data from a source computer; a module to receive a request to transfer at least some of the data to a second peer computer, wherein the module receives the request after downloading a first portion of the data and before completing the download of the data, wherein, at the time of the request, the first peer computer has downloaded the first portion and the second peer computer has downloaded a second portion without downloading all of the first portion; a module to encode the previously downloaded first portion of the data; and a module to send the encoded data to the second peer computer and complete the download of any remaining portion of data.
 87. The medium of claim 86, wherein data transmission is accomplished over a peer-to-peer network.
 88. The medium of claim 86, wherein encoded packets are relayed.
 89. The medium of claim 86, wherein the source computer maintains a look-up list that lists the peer computers having previously downloaded the data, and wherein the look-up list is populated with nodes based on data transfer rates.
 90. The medium of claim 89, wherein the look-up list is populated with nodes based on data types stored within the nodes.
 91. The medium of claim 89, wherein the look-up list is a mesh list.
 92. The medium of claim 86, wherein the encoding scheme is a FEC encoding.
 93. The medium of claim 86, wherein the data that is to be encoded is segmented before encoding.
 94. A program stored on a medium readable by a processor of a computer having a plurality of peer computers, the program comprising: a module to send a request for data to a targeted computer capable of servicing the request; a module to receive encoded data packets from the peer computers that previously downloaded different partial portions of the data from the targeted computer and have not completed the download, the module configured to receive data packets from at least a first peer computer that has downloaded a first portion and a second peer computer that has downloaded a second portion without downloading all of the first portion, wherein the sending computers send the data packets of the downloaded different portions and complete the download of the remaining portions of the data; a module to decode the received encoded data; and a module to save the decoded data in memory.
 95. The medium of claim 94, wherein data transmission is accomplished over a peer-to-peer network.
 96. The medium of claim 94, wherein encoded packets are relayed.
 97. The medium of claim 94, wherein the targeted computer maintains a look-up list is populated with nodes based on data transfer rates.
 98. The medium of claim 94, wherein the targeted computer maintains a look-up list is populated with nodes based on data types stored within the nodes.
 99. The medium of claim 94, wherein the targeted computer maintains a look-up list is a mesh list.
 100. The medium of claim 94, wherein the encoding is a FEC encoding.
 101. The medium of claim 94, wherein the data that is to be encoded is segmented before encoding.
 102. The medium of claim 94, wherein the received encoded packets are decoded, and then re-encoded for further transmission upon request.
 103. A network, transmission apparatus comprising: a processor; a memory communicatively connected to the processor; a program, stored in the memory, including, a module to send a request for data to a targeted computer system; a look-up list that references other peer computers that previously downloaded portion of the requested data, wherein the list of peer computers specifies that a first peer computer and a second peer computer, the first peer computing having downloaded at least a first portion and the second peer computer having downloaded at least a second portion without downloading all of the first portion; a module that initiates transfer from the identified peer computers to the requesting computer using an encoding scheme; a module to receive the encoded data from identified peer computers, wherein the identified computers have received different partial portions of the requested data from the targeted computer system, and wherein the identified peer computers send encoded partial portions of the data and complete downloading the remaining portions of the data from the targeted computer system; a module to decode the received encoded data; and a module to save the decoded data in memory.
 104. The apparatus of claim 103, wherein data transmission is accomplished over a peer-to-peer network.
 105. The apparatus of claim 103, wherein encoded packets are relayed.
 106. The apparatus of claim 103, wherein the look-up list is populated with nodes based on data transfer rates.
 107. The apparatus of claim 103, wherein the look-up list is populated with nodes based on data types stored within the nodes.
 108. The apparatus of claim 103, wherein the look-up list is a mesh list.
 109. The apparatus of claim 103, wherein the encoding scheme is an acknowledgement independent equalized data packet encoding scheme.
 110. The apparatus of claim 103, wherein the data that is to be encoded is segmented before encoding.
 111. The apparatus of claim 103, wherein the received encoded packets are decoded, and then re-encoded for further transmission upon request.
 112. A network transmission apparatus, comprising: a processor; a memory, communicatively connected to the processor; a program, stored in the memory, including; a module to receive a request for data from a requesting computer having one or more peer computers; a module to identify which of the peer computers have previously requested and downloaded the data; and a module to send requests to the identified peer computers to direct the peer computers to send the data to the requesting computer, wherein the identified peer computers have downloaded different partial portions of the requested data, and the identified peer computers include a first peer computer that has downloaded a first portion and a second peer computer has downloaded a second partial portion without downloading all of the first portion, and wherein the identified computers send the data to the requesting computer and complete downloading the remaining portions of the requested data.
 113. The apparatus of claim 112, wherein data transmission is accomplished over a peer-to-peer network.
 114. The apparatus of claim 112, wherein the data is relayed.
 115. The apparatus of claim 112, wherein the program further comprises a module that maintains a lookup list, wherein the look-up list is populated with nodes based on data transfer rates.
 116. The apparatus of claim 112, wherein the program further comprises a module that maintains a lookup list, wherein the look-up list is populated with nodes based on data types stored within the nodes.
 117. The apparatus of claim 112, wherein the program further comprises a module that maintains a lookup list, wherein the look-up list is a mesh list.
 118. The apparatus of claim 112, wherein the module that sends the requests to the identified peer computers further directs the peer computers to encode the data using an acknowledgement independent equalized data packet encoding scheme.
 119. The apparatus of claim 118, wherein the data that is to be encoded is segmented before encoding.
 120. A network transmission apparatus, comprising: a processor; a memory, communicatively connected to the processor; a program, stored in the memory, including, a module to download data from a source computer; a module to receive a request from the source computer to transfer the data to a peer computer that has already downloaded one or more portions of the data, wherein the module receives the request after downloading a portion of the data that includes at least some data different from the data downloaded by the peer computer; a module to encode the previously downloaded partial portion of the data; and a module to send the encoded partial portion of the data to the peer computer and complete the download of the remaining portion of the data.
 121. The apparatus of claim 120, wherein data transmission is accomplished over a peer-to-peer network.
 122. The apparatus of claim 120, wherein encoded packets are relayed.
 123. The apparatus of claim 120, wherein the source computer maintains a look-up list that is populated with nodes based on data transfer rates.
 124. The apparatus of claim 120, wherein the source computer maintains a look-up list that is populated with nodes based on data types stored within the nodes.
 125. The apparatus of claim 120, wherein the source computer maintains a look-up list that is a mesh list.
 126. The apparatus of claim 120, wherein the acknowledgement independent equalized data packet encoding scheme is a FEC encoding.
 127. The apparatus of claim 120, wherein the data that is to be encoded is segmented before encoding.
 128. A network transmission apparatus, comprising: a processor; a memory, communicatively connected to the processor; a program, stored in the memory, including, a module to send a request for data to a targeted computer capable of servicing the request; a module to receive data packets from at least a first peer computer that has downloaded a first portion and a second peer computer that has downloaded a second portion without downloading all of the first portion, a module to decode the received data; and a module to save the data in memory.
 129. The apparatus of claim 128, wherein data transmission is accomplished over a peer-to-peer network.
 130. The apparatus of claim 128, wherein packets are relayed.
 131. The apparatus of claim 128, wherein the targeted computer maintains a look-up list that is populated with nodes based on data transfer rates.
 132. The apparatus of claim 128, wherein the targeted computer maintains a look-up list that is populated with nodes based on data transfer rates.
 133. The apparatus of claim 128, wherein the targeted computer maintains a look-up list that is a mesh list.
 134. The apparatus of claim 128, wherein the data packets are encoded using an acknowledgement independent equalized encoding scheme.
 135. The apparatus of claim 128, wherein the data that is to be encoded is segmented before encoding.
 136. The apparatus of claim 128, wherein the received encoded packets are decoded, and then re-encoded for further transmission upon request.
 137. A method for distributing a data within a computer network, the method comprising: storing, at a starting computer, original data; maintaining a table to store at least an address of computers that can transmit portions of the stored data; receiving requests for the data from a first requesting computer and a second requesting computer; delivering a first portion of data from the starting computer to the first requesting computer; delivering a second portion of the data to the second requesting computer; and prior to delivering all of the data to either the first requesting computer or the second requesting computer, exchanging the first portion and the second portion of the data between the first requesting computer and the second requesting computer.
 138. A download method for a file in a computer network comprising: storing, at a starting computer, a file; receiving a first file download request from a first computer; downloading, from the starting computer, a first portion of the file to the first computer; upon downloading the first portion of the file at the first computer, updating a table to record that the first portion of the file was received; receiving a second download request from a second computer; downloading a second portion of the file to the second computer, the first portion containing at least some data of the original file not contained within the second portion; upon downloading the second portion of the file at the second computer, updating a table to record that the second portion of the file was received; issuing a request from the second computer to the first computer for the data of the file not contained within the second portion; and prior to downloading the entire file at the first computer, communicating, from the first computer to the second computer, at least some of the data of the original file not contained within the second portion.
 139. The method of claim 138, further comprising completing the download of the file at the first computer and the second computer by downloading one or more remaining portions of the file. 