System and process for scalable and secure content delivery

ABSTRACT

Aspects of the subject disclosure may include, for example, segmenting a file to obtain a set of segments, wherein the file can be regenerated according to a recombination of the set of segments. At least some segments are transported to a targeted group of users including a first group of users and a second group of users, via unlicensed frequency spectrum and according to a peer-to-peer file sharing process. A segmentation record identifying the set of segments is provided to the targeted group of users. A progress of a delivery of the set of segments is monitored according to the segmentation record. The progress of the delivery is analyzed to identify a deficiency in delivery of a particular segment of the set of segments. Responsive to the deficiency, the particular segment is provided to the first group of users via a licensed frequency spectrum. Other embodiments are disclosed.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. application Ser. No.16/123,018, filed Sep. 6, 2018. The contents of each of the foregoingare hereby incorporated by reference into this application as if setforth herein in full.

FIELD OF THE DISCLOSURE

The subject disclosure relates to a system and process for scalable andsecure content delivery.

BACKGROUND

Some wireless communication networks utilize licensed portions of afrequency spectrum, while others utilize unlicensed portions orcombinations of licensed and unlicensed frequency spectra. Examplesinclude mobile cellular service, which often uses licensed frequencyspectrum to provide wireless service over a relatively large area, e.g.,a macro cell or smaller areas through e.g. a small cell or femto cellserving 4G or 5G wireless service. In at least some instances, mobilecellular service can include wireless service in unlicensed frequencyspectra, e.g., through wireless access points. Wireless access pointscan operate according to wireless protocols, such as IEEE 802.11,including WiFi, Bluetooth and the like. Wireless service is typicallyavailable within a geographic region limited in extent with respect to awireless base station and/or access point providing the service.

Wireless service may be provided to stationary equipment, e.g., aconnected home or business, and/or mobile equipment. Wireless servicescan include, without limitation, voice and/or data services to equipmentof mobile users, e.g., smart phones, tablet devices, laptop computers,and the like. Data services can include short message service (SMS),multimedia messaging service (MMS), email, web browsing, file transfer,and the like. Recent trends have also seen a growth inmachine-to-machine (M2M) communications, e.g., with the advent of theInternet of Things (IoT), resulting in a rapid expansion in the numberof wireless service subscribers. At the same time, applications that usewireless services, such as streaming media, can pose significantbandwidth demands on provider networks.

In order to satisfy increasing demand for connectivity from multiplebusiness verticals, wireless service providers can either expandcoverage areas as well as available bandwidth or densify the networkthrough service offerings in various frequency spectra at the samelocation. For example, a mobile service provider can procure additionallicensed spectrum, install and/or upgrade mobile cellular infrastructureincluding new and/or upgraded macro cell sites, microcell sites and/orfemto cell sites, and/or install wireless access points operating inunlicensed spectrum, e.g., WiFi hotspots. While some mobile users canmove to favorable locations, e.g., WiFi hotspots when using applicationsrequiring heavy data usage, others may not be able to do so.

Demand for high data rates is increasing to accommodate advances inother technologies, such as connected cars. Autonomous vehicles create alot of data (in the order of KBs, MBs and even GBs) and exchange part ofthis data between a vehicle and a (edge) cloud service via a cellularnetwork. Examples of demand for wireless data include firmware updates,passenger entertainment, map updates, positioning correctioninformation, just-in-time services, e.g., to order a parking spoton-demand, and so on. A fourth-generation broadband cellular networktechnology (4G) is adapted to deliver mobile broadband but was notdesigned to compensate all new expected new challenges, such as thosefor connected cars or autonomous vehicles. Although future, e.g., fifthgeneration broadband cellular network technology (5G) may address someor all of current data demand, its implementation is still far out. Evenwhen deployment begins, it will likely occur incrementally and willlikely take years to reach a large coverage of urban spaces.

BRIEF DESCRIPTION OF THE DRAWINGS

Reference will now be made to the accompanying drawings, which are notnecessarily drawn to scale, and wherein:

FIG. 1 is a block diagram illustrating an example, non-limitingembodiment of a communications network in accordance with variousaspects described herein.

FIG. 2A is a block diagram illustrating an example, non-limitingembodiment of a system functioning within the communication network ofFIG. 1 in accordance with various aspects described herein.

FIGS. 2B through 2F depicts an illustrative embodiment of a systemfunctioning within the communication networks of FIGS. 1 and 2.

FIG. 2G depicts an illustrative embodiment of a process in accordancewith various aspects described herein.

FIG. 2H depicts an illustrative embodiment of another process inaccordance with various aspects described herein.

FIG. 3 is a block diagram illustrating an example, non-limitingembodiment of a virtualized communication network in accordance withvarious aspects described herein.

FIG. 4 is a block diagram of an example, non-limiting embodiment of acomputing environment in accordance with various aspects describedherein.

FIG. 5 is a block diagram of an example, non-limiting embodiment of amobile network platform in accordance with various aspects describedherein.

FIG. 6 is a block diagram of an example, non-limiting embodiment of acommunication device in accordance with various aspects describedherein.

DETAILED DESCRIPTION

The subject disclosure describes, among other things, illustrativeembodiments that combine mobile cellular licensed and unlicensedspectrum with a peer-to-peer (P2P) file sharing to facilitate transportof massive amounts of data to diverse endpoints. The techniquesdisclosed herein offload at least some data transport from licensedfrequency services to avoid commercial network overload and customerdisappointment consuming other services, while also promoting a fast andscalable delivery mechanism for content in the network. Examplesdisclosed herein include content provided by a producer for widedistribution to machines and/or mobile assets, such as connected cars(CC), drones, smart devices, and the like. For example, transported datacontent can include, without limitation, layered high definition mapupdates for CC, no-fly database updates for drones, drone obstacleidentification and object/model sharing. More generally, transporteddata can include high definition multimedia content, e.g., 1080p, 4k,8k, data sharing, software over-the-air (SOTA), firmware over-the-air(FOTA) updates connected devices, e.g., including CC, drones, smartappliances, map updates, device monitoring and profiling, and the like.The content distribution can include 3^(rd) generation P2P file sharingprocess, such as bit torrents. Other embodiments are described in thesubject disclosure.

One or more aspects of the subject disclosure include a system,including a processing system having a processor and a memory thatstores executable instructions that. The instructions, when executed bythe processing system, facilitate performance of operations. Theoperations include disaggregating a file to obtain a set of filesegments, wherein the file can be regenerated according to arecombination of the set of file segments. At least some file segmentsof the set of file segments are transported to equipment of a targetedgroup of users via an unlicensed frequency spectrum and according to aP2P file sharing process. A secured and signed segmentation record isforwarded to the equipment of the targeted group of users comprising afirst group of users and a second group of users, wherein thesegmentation record identifies the set of file segments. Progress of adelivery of the set of file segments to the equipment of the targetedgroup of users is monitored according to the segmentation record. Theprogress of the delivery of the set of file segments is analyzed toidentify a deficiency in delivery of a particular file segment of theset of file segments to the equipment of the targeted group of users.Responsive to the deficiency, the particular file segment is provided toequipment of the first group of users wirelessly via a licensedfrequency spectrum.

One or more aspects of the subject disclosure include a process thatincludes segmenting, by a processing system including a processor, afile to obtain a set of file segments, wherein the file can beregenerated according to a recombination of the set of file segments,and wherein at least some file segments of the set of file segments aretransported to equipment of a targeted group of users via an unlicensedfrequency spectrum and according to a P2P file sharing process. Asegmentation record is provided, by the processing system, to theequipment of the targeted group of users including a first group ofusers and a second group of users. The segmentation record identifiesthe set of file segments. A deficiency in delivery of a particular filesegment of the set of file segments to the equipment of the targetedgroup of users is identified, by the processing system, according to thesegmentation record. Responsive to the deficiency, the particular filesegment is provided, by the processing system, to equipment of the firstgroup of users wirelessly via a licensed frequency spectrum.

One or more aspects of the subject disclosure include a non-transitory,machine-readable medium, including executable instructions that, whenexecuted by a processing system including a processor, facilitateperformance of operations. The operations include segmenting a data itemto obtain a set of data item segments, wherein the data item can beregenerated according to a recombination of the set of data itemsegments, and wherein at least some data item segments of the set ofdata item segments are transported to equipment of a targeted group ofusers via an unlicensed frequency spectrum and according to a P2P filesharing process. A segmentation record is provided to the equipment ofthe targeted group of users including a first group of users and asecond group of users, wherein the segmentation record identifies theset of data item segments. A deficiency in delivery of a particular dataitem segment of the set of data item segments to the equipment of thetargeted group of users is identified according to the segmentationrecord. Responsive to the deficiency, the particular data item segmentis provided to equipment of the first group of users wirelessly via alicensed frequency spectrum.

Referring now to FIG. 1, a block diagram is shown illustrating anexample, non-limiting embodiment of a communications network 100 inaccordance with various aspects described herein. In particular, acommunications network 125 is presented for providing broadband access110 to a plurality of data terminals 114 via access terminal 112,wireless access 120 to a plurality of wireless devices, e.g., mobiledevices 124 a, 124 b, generally 124, and vehicles 126 a, 126 b, 126 c,generally 126, via a base station or wireless access point 122.Alternatively or in addition, the communications network 125 can providevoice access 130 to a number of telephony devices 134, via switchingdevice 132 and/or media access 140 to a plurality of audio/video displaydevices 144 via media terminal 142. In at least some embodiments, thecommunication network 125 is coupled to one or more content sources 175of audio, video, graphics, text, data files, e.g., software updatesand/or firmware updates, and/or other media. While broadband access 110,wireless access 120, voice access 130 and media access 140 are shownseparately, one or more of these forms of access can be combined toprovide multiple access services to a single client device (e.g., mobiledevices 124 can receive media content via media terminal 142, dataterminal 114 can be provided voice access via switching device 132, andso on).

The communications network 125 includes a number of network elements(NE) 150, 152, 154, 156, etc., for facilitating one or more of thebroadband access 110, the wireless access 120, the voice access 130, themedia access 140 and/or the distribution of content from content sources175. The communications network 125 can include one or more of a circuitswitched, a packet switched network, a voice over Internet protocol(VoIP) network, Internet protocol (IP) network, a cable network, apassive or active optical network, a 4G, 5G, or higher generationwireless access network, WIMAX network, UltraWideband network, personalarea network or other wireless access network, a broadcast satellitenetwork and/or other communications network.

In various embodiments, the access terminal 112 can include a digitalsubscriber line access multiplexer (DSLAM), cable modem terminationsystem (CMTS), optical line terminal (OLT) and/or other access terminal.The data terminals 114 can include personal computers, laptop computers,netbook computers, tablets or other computing devices along with digitalsubscriber line (DSL) modems, data over coax service interfacespecification (DOCSIS) modems or other cable modems, a wireless modemsuch as a 4G, 5G, or higher generation modem, an optical modem and/orother access devices.

In various embodiments, the base station or access point 122 can includeone or more of a 4G, 5G, or higher generation base station, a wirelessaccess point that operates via an 802.11 standard such as 802.11n,802.11ac or other wireless access terminal. The mobile devices 124 caninclude mobile phones, e-readers, tablets, phablets, wireless modems,and/or other mobile computing devices. The vehicles 126 can includeconnected cars, self-driving cars or trucks, remote operated vehicles,such as drones, including pilotless and/or remote operated aerialvehicles.

Although the example illustrates mobile devices 124, 126 incommunication with the base station or access point 122, it isunderstood that the base station or access point 122 can be incommunication with other wireless devices that might not necessarily bemobile. Examples of other wireless devices include, without limitation,smart home appliances, e.g., internet accessible thermostats, videosurveillance systems, alarm systems, smart meters, and the like.Wireless communication services can include communications to virtuallyany Internet accessible device according to IoT, including M2Mcommunications.

In various embodiments, the switching device 132 can include a privatebranch exchange or central office switch, a media services gateway, VoIPgateway or other gateway device and/or other switching device. Thetelephony devices 134 can include traditional telephones (with orwithout a terminal adapter), VoIP telephones and/or other telephonydevices.

In various embodiments, the media terminal 142 can include a cablehead-end or other TV head-end, a satellite receiver, gateway or othermedia terminal 142. The display devices 144 can include televisions withor without a set top box, personal computers and/or other displaydevices.

In various embodiments, the content sources 175 include broadcasttelevision and radio sources, video on demand platforms and streamingvideo and audio services platforms, one or more content data networks,data servers, web servers and other content servers, and/or othersources of media.

In various embodiments, the communications network 125 can includewired, optical and/or wireless links and the network elements 150, 152,154, 156, etc. can include service switching points, signal transferpoints, service control points, network gateways, media distributionhubs, servers, firewalls, routers, edge devices, switches and othernetwork nodes for routing and controlling communications traffic overwired, optical and wireless links as part of the Internet and otherpublic networks as well as one or more private networks, for managingsubscriber access, for billing and network management and for supportingother network functions.

In at least some embodiments, the communication network 100 canfacilitate in whole or in part monitoring P2P file sharing, analyzingprogress and/or efficiencies of P2P file sharing applications, and/orcoordinating activities to increase progress and/or efficiencies. In atleast some embodiments, file sharing progress is facilitated byselectively injecting segments into a group of P2P participants. Theillustrative example includes a file ingestor 180 and a filedistribution facilitator 181. The file ingestor 180 receives a datacontent item for distribution to a group of targeted wireless devices,e.g., the mobile phones 124 and/or vehicles 126. The file ingestor 180is in communication with the file distribution facilitator 181. In someembodiments, one or more of the file ingestor 180 or the filedistribution facilitator 181 determines whether P2P file sharing shouldbe applied to the received data item. Such decisions can be based on oneor more of a number of targeted wireless devices exceeding somethreshold, a data size of the data content item exceeding somethreshold, a network state, such as available capacity, congestion,error status, and so on.

To the extent that P2P file sharing is employed, the file ingestor 180disaggregates the data item into a set of smaller data item segments.One of the file ingestor 180, the file distribution facilitator 181 orboth generates a segmentation record. In at least some embodiments, thesegmentation record provides a complete listing of segments, wherein theoriginal data item can be regenerated, e.g., by a file sharing clientapplication, according to a recombination of the set of data itemsegments. In some embodiments, one or more of the mobile devices 124and/or vehicles 126 receives at least some segments of the set ofsegments from the base station or access point 122 via licensedfrequency spectrum. For example, licensed frequency distribution by thebase station or access point 122 can be used to provision one or moremobile devices and/or vehicles 126 with some or all of the data itemsegments. One or more of these receiving mobile devices 124 and/orvehicles 126 is then available to share one or more of the receivedsegments with other mobile devices 124 and/or vehicles according to theP2P process.

In at least some embodiments, a progress of the receiving of data itemsegments for one or more of the mobile devices and/or vehicles 126 ofthe group of targeted wireless devices is determined according to thesegmentation record. For example, the file distribution facilitator 181generates a file segmentation record and facilitates distribution of thesegmentation record to the targeted wireless devices 124, 126. In someembodiments, the segmentation record can be distributed to each of thetargeted wireless devices 124, 126 via the base station or access point122 using licensed frequency spectrum. According to the illustrativeexample, each of the targeted wireless devices 124, 126 can maintain aprogress report 184 a . . . 184 e, generally 184. The progress report184 identifies a progress of receipt of the data item segments of theset of data item segments. In at least some embodiments, the progressreport 184 identifies one or more of those data item segments receivedby the respective targeted wireless device 124, 126, or those data itemsegments not yet received by the respective targeted wireless device124, 126, or a combination of segments received and not yet received.

In some embodiments, the targeted wireless devices 124, 136 provide anindication of the progress report 184 to the file distributionfacilitator 181. The file distribution facilitator 181, in turn, cananalyze the progress reports 184 to determine whether any of thetargeted wireless devices 124, 126 require data item segments, whichdata item segments are required, whether there are any time constraintson a transfer of the complete file, and so on. Responsive to theanalysis, the file distribution facilitator 181 can facilitate a furtherdistribution of segments to one or more of the targeted wireless devices124, 126 via the base station or access point 122 using licensedfrequency spectrum. For example, the file distribution facilitator 181can provide one or more of the missing segments to one or more of thetargeted wireless devices 124, 126 in need of the missing segments.Alternatively or in addition, the file distribution facilitator 181 canprovide one or more of the missing segments to other wireless devices124, 126, relying on the P2P process to propagate the missing segmentsto the one or more of the targeted wireless devices 124, 126 in need ofthe missing segments.

This can include sending or seeding a missing segment to anotherwireless device of the targeted wireless devices 124, 126. Consideringthe user of selective distribution or seeding in combination with a P2Pprocess, there is a likelihood that the other wireless device may havealready received the missing segment. Accordingly, in at least someembodiments, the sending or seeding of the missing segment occurs afterfirst determining that the intended recipient device has not alreadyreceived the missing segment. It is understood that in at least someapplications the initial sending or seeding of segments and/or thesending or seeding of missing segments can include sending or seedingsegments to other wireless devices 124, 126 that may not be included inthe targeted group of wireless devices 124, 126. This approach allowsfor a larger group of wireless devices 124, 126 to participate in theP2P process as facilitators. It is further understood that in at leastsome embodiments, participation of non-targeted wireless devices 124,126 can be incentivized. By way of non-limiting example, incentives caninclude providing points, e.g., points that can be accumulated and usedin a service provider's ecosystem or elsewhere, additional data that canbe added to a subscribed data limit, and the like.

In at least some embodiments, at least some of the targeted wirelessdevices 124, 126 can analyze which data item segments it has anddetermines which data item segments it can upload to other peersaccording to the P2P process. In at least some embodiments, participantsin the P2P process can include a client application. For example, theclient application can seek out readily available data item segments,e.g., from peers, and download them immediately, rather than halting thedownload and waiting for the next (and possibly unavailable) piece inline, which typically reduces the overall time of the download. Someexample client applications include, without limitation, μTorrent,Xunlei, Transmission, qBittorrent, Vuze, Deluge, BitComet and Tixati.

FIG. 2A is a block diagram illustrating a more detailed example of anon-limiting embodiment of a file distribution system 200 functioningwithin the communication network of FIG. 1 in accordance with variousaspects described herein. The data content items generally originate ata data content source 202. For example, the data content source 202 canbe a producer of content, e.g., a media producer, such as DISNEY® orNETFLIX®, a network service provider, a source of equipment that can beserviced by the content, e.g., an auto manufacturer that may distributesoftware and/or firmware updates over the air (SOTA/FOTA) to vehicles, aservice provider providing a network accessible service to clientapplications hosted on wireless devices, government agencies, e.g.,local police, National Weather Service, the Emergency Broadcast System,and the like.

The data content source 202 provides a data content item to a fileingestor 204. The file ingestor 204 disaggregates, divides or otherwisepartitions the data content item into a set of data item segments. It isunderstood that the data item segments have a size that is less than asize of the original data content item. In some embodiments, the dataitem segments are substantially equal in size, e.g., ten 1 Mb segmentsfor a 10 Mb data content item. Alternatively or in addition, the dataitem segments of a disaggregated data content item can vary in size.Disaggregation can include any process that allows a data content itemto be divided into segments or chunks that can be recombined to obtainthe original data content item.

In some embodiments, a size of a data item segment can be fixed. Datacontent item segment, or chunk sizes can include, without limitation, afixed number of bytes per segment, e.g., 1 Mb and/or a fixed number ofsegments per data content item, e.g., a number of “N,” say 10 segmentsper data content item or file, with a segment size being determined by adivision of the data content item by the number of segments. It isunderstood that segment sizes can be selected based on one or morefactors. Factors can include, without limitation, a type of data contentitem, e.g., streaming video versus text. Other factors can includenetwork traffic conditions, type and/or capabilities of recipientdevices, and the like. For example, a segment size may depend on abuffer size of a streaming media player. Alternatively or in addition,segment size may depend upon a quality of service requirement and/or apriority of the data item, e.g., with higher priority segments beingassigned a greater or lesser size, such that a transfer requirescoordination of fewer or more segments than a lower priority data item.Network traffic conditions can include, without limitation, networkcongestion, transport delay, signal-to-noise ration and/or bit errorrate, error correction performance and so on. As network conditions maychange, different segmentations may be selected based on the networkconditions to facilitate efficient transfers of data content items.

It is further envisioned that in at least some embodiments, a size of asegment or chunk can vary. For example, multiple segment sizes for adifferent data content items can be fixed according to a particularsegmentation and/or transfer strategy. A first segmentation of one datacontent item can be accomplished according to a first fixed segmentsize, whereas, a second segmentation of another data content item can beaccomplished according to a second fixed segment size, which differsfrom the first. In at least some applications, segment size can vary forthe same data content item. For example, a data content item can bedivided into a number of segments, with at least some segments havingdifferent sizes than other segments. Segments can be transportedaccording to a P2P process based on segment size. Some P2P participantsmay be selected based on segment size. Alternatively or in addition,segment size(s) may be selected based on the P2P participants.Selections of segment size and/or P2P participants can be based on oneor more of the foregoing criteria, e.g., network conditions, data type,etc., and/or according to the P2P participants. For example, stationaryor slow moving P2P participants may be selected for sharing a firstsegment size, e.g., a relatively large segment size, whereas, fastmoving P2P participants may be selected for sharing a second segmentsize, e.g., a relatively small segment size. Accordingly, a data contentitem can be segmented according to multiple sizes to allow forimplementation of a flexible P2P strategy.

In at least some embodiments, segment size can change during a P2Pdistribution process. For example, a data content item can be segmentedaccording to a first segment size. The first segments can be distributedaccording a P2P process as disclosed herein. A file distributionfacilitator can monitor progress of the file transfer and evaluatewhether the process would be expedited according to a segmentation of adifferent size. To the extent that a different segment size would bebeneficial, the distribution facilitator could initiate a differentsegmentation. It is envisioned that in at least some embodiments, thatdifferent segment sizes can be selected to be compatible.

In at least some embodiments, the ingestor 204 generates a segmentationrecord 207. The segmentation record 207, without limitation, canidentify the data item segments of a disaggregated file. For example,the segmentation record 207 includes an identifier of the data contentitem as well as a segment reference number, e.g., a sequential orordinal number, and the set of sequential or ordinal numbers identifyingall data item segments of the associated data content item. Thesegmentation record can be used by one or more elements of the system200 to track progress of a particular file distribution. The sequencenumber or ordinal reference can be used to arrange data item segmentsthat may be received by a targeted wireless device out of order. Thesegmentation record and its entries are secured and signed in order toprevent tampering of data by other malicious entities.

In at least some embodiments, a security measure can be added to theprocess, e.g., to provide some assurance that data item segmentsreceived from peers are legitimate and authentic. According to theillustrative example, the file ingestor 204 applies a security mechanismto one of the data content item and/or the data item segments. Securitymechanisms can include, without limitation, one or more of hashalgorithms, checksums, encryption, blockchain, authentication and thelike. In some embodiments, a data content item may be secured, e.g., bya security key to prevent unauthorized access. For example, distributionof copyright protected material may include some measure of scramblingthat requires application of a key to obtain an unscrambled version.Such scrambling would allow peers of a P2P process to participate in afile distribution, without necessarily requiring access to thetransferred data content item.

A blockchain-type, certification-type orDigital-Rights-Management-(DRM)-type of security measure can be appliedto each of the data item segments. For example, the file ingestor 204encodes each data item segment into a block of digital data that isuniquely signed and/or identified. According to a blockchain algorithm,each data item segment, or block, is connected to another block, such asthe one before and/or after it. When applied in this manner, theblockchain algorithm can create an irreversible, immutable chain.Accordingly, data item segments, or blocks, are chained together,preventing any individual data item segment, or block, from beingaltered or an unauthorized block from being inserted between twoexisting blocks.

The system 200 also includes a file distribution facilitator 206. Thefile distribution facilitator 206 is in communication with the fileingestor 204 and one or more mobile cellular sites 208. In at least someembodiments, the file distribution facilitator 206 is in communicationwith the producer 202. Information obtained from the producer 202 caninclude identification of the data content item and identification oftargeted recipients and/or targeted equipment of targeted recipients. Inat least some embodiments, information obtained from the producer 202can include identification of a priority, e.g., ranging from critical totrivial, uncritical or unimportant, e.g., “nice to have” but notnecessary. In some embodiments, timing requirements for a filedistribution can be imposed by the producer 202. For example, a safetyrelated firmware upgrade to a vehicle may require full compliance withina time period, such as within 24 hours, within one week, etc.

In operation, the file distribution facilitator 206 identifies targetedwireless devices that should receive the data content item. The filedistribution facilitator 206 also identifies the data content item to bedistributed to the targeted wireless devices, the segmentation record,and any timing and/or priority requirements as may be related to thedistribution. In some embodiments, the file distribution facilitator 206determines a strategy for initiating, priming or seeding a P2P process.The strategy can be based on one or more of identification of thetargeted wireless devices, a size of the data content item, a priorityor criticality of the distribution and so on. In some embodiments, thefile distribution facilitator 206 sends a complete set of all segmentsto a particular wireless device or group of wireless devices of thetargeted wireless devices. Selection of the initial recipients can bebased on one or more of a geographic location of the recipient wirelessdevice, an available link quality associated with a wireless link to therecipient device, an identity of the particular wireless device, e.g.,according to a type of device, a related user account. Otherconsiderations can include, without limitation, whether a recipientdevice is a fast moving device, a slow moving device or a stationarydevice. For example, slow moving devices may be preferred overstationary devices to increase a likelihood of propagating segments topeers outside of a range of the participating cell.

In at least some embodiments, the recipient wireless device, e.g., afirst auto 220, receives a copy of the segmentation record and updates aprogress report 211 a that identifies received segments, missingsegments, or both received and missing segments. In some embodiments,the progress report 211 a can be transmitted from the auto 220 back tothe file distribution facilitator 206. Other participating wirelessdevices, such as a second car 222 can also maintain progress reports 211b, also providing an indication of transfer progress to the filedistribution facilitator 206. The file distribution facilitator 206 canmonitor file and/or segment distribution process based on the progressreports 211 a, 211 b, generally 221. Progress reports 211 can identifyone or more of the wireless device, e.g., according to an IP address, aMAC address, a user account, a device type, and the like. The progressreport can identify when a targeted wireless device has received acomplete set of segments of a data item. The file distributionfacilitator 206 can track completions, and terminate a P2P process whenall or at least some predetermined portion of the targeted wirelessdevices have received the complete set of segments.

Once one or more participating wireless devices have received some orall of the data item segments of a particular data content item, a P2Pprocess can be applied. The P2P generally allows for participatingwireless devices to share one or more already received segments. Thesharing can be accomplished according to a push algorithm, in which aparticipant having received one or more segments, i.e., a source,identifies participants within range and facilitates a transfer of oneor more of the received segments. In some embodiments, a push algorithmincludes sending messages from the source to other participants thatidentifies available segments. Recipient wireless devices can evaluateavailable segments against an associated progress report to identifymissing segments. The recipient wireless devices can send a message tothe source identifying missing segments.

By way of non-limiting example, the message can include a specificrequest for one or more of the missing segments. The source, inresponse, can supply the requested segments over a direct wireless linkbetween the wireless devices 229 offloading the licensed cellularnetwork. The wireless link 229 can include, without limitation, awireless link operating in an unlicensed frequency band, such as formsof WiFi, millimeter wave, laser, or short-range communicationtechnologies providing a radio interface for user equipment (UE) to UEcommunications. Without limitation, examples of short-rangecommunication can include PC5 and/or alternative direct short rangecommunication (DSRC), e.g., based on IEEE 802.11p. An example protocolis disclosed in 3GPP LTE-V2X PC5, also known as LTE side-link.Alternatively or in addition, the wireless link can include operation inlicensed frequency spectra, e.g., according to Uu-air interface 226between a UE 220 and an eNB 208. The eNB 208 can include functionalityto identify and facilitate a wireless link to the requesting device. Forexample, the link can include traditional cellular communications,unlicensed frequency communications at network edge devices, such aswireless access points 210 or hotspots that can communicate to therequesting wireless device 222 in a wireless link 228 operating inunlicensed frequency bands. Alternatively or in addition, the eNB 208can relay the communication to the file distribution facilitator 206,which identifies and/or facilitate a wireless link to the requestingdevice through one or more of the available wireless links 226, 229,228. Furthermore, Road-Side-Units (RSU) type wireless endpoints such as210 can be considered part of the supporting communicationinfrastructure. For example, RSUs 210 can include cachingfunctionalities.

Alternatively or in addition, the sharing can be accomplished accordingto a pull algorithm, in which a participant having determined that oneor more segments are required, i.e., a destination, identifiesparticipants within range and facilitates a transfer of one or more ofthe received segments. In some embodiments, a pull algorithm includessending messages from the destination to other participants thatidentifies missing segment(s). Hereby, data is exchanged in interestgroups namely swarms for only one item represented by the segment listsor progress reports bilateral. In the example of FIG. 2A, the twovehicles 220 and 222 first exchange progress reports and lateroptionally segments. Missing elements in the progress report in onevehicle (220) that are available in the other vehicles (e.g., 222) canbe request and delivered via a segment push algorithm. The selection ofthe segments is out of scope for this document and could be therarest-piece-first-strategy of P2P Torrent technology. Therarest-piece-first-strategy improves the overall availability of thedata by increasing the availability of the rarest segment in the swarm.Destination wireless devices can evaluate missing segments against anassociated progress report to identify missing segments. The recipientwireless devices can evaluate missing segments required from thedestination wireless device against a progress report of the recipientwireless device. For example, the evaluation can identify whether arecipient device has already received one or more of the segmentsrequired by the destination. To the extent that missing segments areavailable, the recipient wireless device sends a message according tothe P2P protocol to provide one or more of the missing segments to thedestination wireless device. Transport of the segments can include oneor more of the foregoing wireless links, e.g., Uu-air interface and/or ashort-range communication interface, or other suitable wirelessinterface, including the various examples disclosed herein.

In at least some embodiments, one or more progress reports 211 arecommunicated to the file distribution facilitator 206. The filedistribution facilitator 206, in turn, can evaluate missing segments forone or more destination devices of the targeted devices 220, 222 basedon the progress reports 211. One or more of received information, e.g.,progress reports and results of analyses can be stored in a P2P progressreport 209. Having identified missing segment(s) and associated wirelessdevices, the file distribution facilitator 206 can further analyzeprogress reports 211, e.g., according to the P2P progress report 209, toidentify potential source devices for serving the missing segment(s) tothe destination devices. Any wireless device having already received aparticular segment can serve as a source of that segment to other targetdevices missing the particular segment. In at least some embodiments,the file distribution facilitator 206 selects one or more sources forproviding the missing segment(s) to the destination devices according tothe P2P process. Selection of one or more sources can be based onposition, location information, the proximity and/or channel qualitybetween communicating instances determined individually and/orcontrolled by the eNB or swarm.

Position information can include, without limitation, a location of asource device, a location of a destination device, a relative locationbetween the source and the destination device, or any combinationthereof. Location information can be reported by one or more of thesource and destination devices, e.g., according to a locationapplication and/or GPS receiver of the device(s). Alternatively or inaddition, location information can be determined by a wireless serviceprovider. For example, locations can be determined according to distanceor range estimates based on one or more of power level, time delay, timedifference of arrival, phase difference, triangulations, and the like.

It is understood that in at least some embodiments, a network serviceprovider can cache one or more segments, e.g., including complete setsof segments, at network edge locations. Edge locations can include,without limitation, wireless access points 210 mounted on RSUs 210 ordeployed at alternative locations. At least some wireless access pointsprovide wireless service to wireless devices 220, 222 via unlicensedfrequency spectra, including any of the examples disclosed herein orequivalents. Caching can be used to supplement P2P distribution byproviding wireless access to segments for destination devices of thetargeted wireless devices is within wireless service range of thenetwork edge device 210.

According to the illustrative example, the network edge device 210 is incommunication with one or more of the file ingestor, 204 and filedistribution facilitator 206. The network edge device 210 canparticipate as an injection point, e.g., similar to the cellular basestation 208. Alternatively or in addition, the network edge device 210can participate as a member of the P2P application, e.g., receivingand/or transmitting segments to other wireless devices of the group oftargeted wireless devices. In at least some scenarios, the network edgedevice 210 is equivalent to a P2P device having a complete set ofsegments.

It is envisioned that distribution of at least some data content may betime critical. Accordingly, the illustrative systems discussed hereincan include provisions that may decide whether to participate in the P2Pprocess based on a timing aspect indicating a timing criticality havinga relatively short time period. Alternatively or in addition, progressof an implemented P2P process can adapt according to a timing aspect.For example, if a timing aspect includes a maximum period fordistribution to a group of targeted wireless devices, the system 200 mayinitiate distribution of the data content item according to a relativelylimited seeding so as to reduce a burden to licensed frequency spectra.As time progresses, additional seedings may be necessary based on aremaining time of the maximum distribution period. It is conceivablethat in at least some circumstances, Licensed frequency spectra can beused to distribute some or all segments missing as determined by the P2Pprocess.

FIGS. 2B through 2F depicts an illustrative embodiment of a systemfunctioning within the communication networks of FIGS. 1 and 2 inaccordance with various aspects described herein. FIG. 2B illustrates afirst system configuration 230 a including a mobile cellular servicehaving multiple cell sites 232 a, 232 b, 232 c, generally 232. Each ofthe cell sites 232 provides a wireless cellular service within apredetermined geographic region and according to a correspondinglicensed portion of a frequency spectrum. The illustrative exampleincludes circular regions 234 a, 234 b, 234 c, generally 234representing regions of cellular service coverage. It is understood thatactual coverage may be determined according to sectors, e.g., portionsof a circle. It is further understood that the extent of servicecoverage and/or available bandwidth may vary based on a particularmobile cellular deployment.

A first vehicle 236 includes at least one wireless device capable ofcommunicating within an associated first wireless range 240. Thewireless device can include a wireless transceiver of the car itself.Alternatively or in addition, the wireless device can include a wirelesstransceiver of an occupant or cargo, e.g., machine, of the vehicle 236.When the first vehicle 236 is within one of the regions of cellularcoverage 234, it can communicate with equipment of the respective cellsite 232 using licensed frequency spectrum. This communication allowsthe first vehicle to access cloud services, such as a P2P filedistribution server, e.g., the file distribution facilitator 181 (FIG.1), 206 (FIG. 2A).

The first vehicle 236 moves according to a path 238 that may take thevehicle within and without one or more of the regions of cellularcoverage 234. At some regions along the path 238, the first vehicle 236may be in more than one regions of cellular coverage, e.g., beingcapable of communicating with both a first cell site 232 a and a secondcell site 232 b. At other regions along the path 238, the vehicle fallsoutside of any of the regions of cellular coverage 234. It is understoodthat the illustrated regions of cellular coverage 234 may includein-network coverage, e.g., of a subscribed cellular service plan, and/orout-of-network coverage, e.g., of a competitor's cellular service plan.

According to the illustrative example, the first vehicle 236 is atargeted device of a group of targeted devices that are identified toreceive a data content item. The data content item can be disaggregatedinto a set of data item segments as disclosed herein, and individualsegments and/or groups of segments can be transported to the vehicle 236according to the disclosed P2P process. For illustrative purposes, asegmentation record includes a set of boxes 242 representing a set ofsegments necessary for the first vehicle 236 to obtain the data contentitem plus one segment file indicating the amount of all segments andtheir certificates marked as ‘c’ in the first position of the boxes.Each segment represents one of the free boxes. The set of boxes 242 isnot shaded indicating that all segments are required. However, assegments are received, the boxes of the set of boxes 242 are filled in.An arrow drawn from the first box of the set of boxes 242 to the celltower 232 a indicates that the first data item segment is received bythe vehicle 236 when the vehicle 236 is within the first region ofcellular coverage 234 a. For the time being, the remaining boxes of theset of boxes 242 remain empty signifying that the vehicle 236 requiressegments associated with the remaining unshaded boxes of the set ofboxes 244.

FIG. 2C illustrates a second system configuration 230 b in which thefirst vehicle 236 has travelled a first distance to a second locationalong the path 238. The second location is outside of the first cellularrange 234 a of the first cell site 232 a, but within the second cellularrange 234 b of the second cell site 232 b. The first vehicle 236 hasalready received a first segment of the set of segments according to thepreceding system configuration 230 a (FIG. 2B) represented by a shadingof the first box of the set of boxes 242.

The second system configuration 230 b includes a second vehicle 246located within the first cellular range 234 a of the first cell site 232a and the second cellular range 234 b of the second cell site 234 b. Thesecond vehicle has also received a segmentation record including a setof boxes 252 representing the set of segments necessary for the secondvehicle 246 to obtain the data content item. The first and second setsof boxes 242, 252 can include the same boxes associated with the samesegments and the same ordering necessary to regenerate the original datacontent item. However, the tracking of progress of received segmentswill vary according to the progress of the P2P process.

Being located within range of the first and second cell sites 232 a, 232b, it would be possible for the second vehicle 246 to receive one ormore segments from either or both of the cell sites 232 a, 232 b.However, a distribution of segments in this manner would utilize scarcelicensed frequency spectrum of a Uu LTE link. Advantageously, proximityof the second vehicle 246 to the first vehicle 236 results in anoverlapping coverage of the first wireless range 240 of the firstvehicle 236 and a second wireless range 250 of the second vehicle 246.According to the illustrative example, both vehicles 236, 246 areparticipants in a P2P file sharing process. Accordingly, the firstvehicle can share one or more segments that it has received. Accordingto the illustrative example, the only segment that the first vehicle 236can share is a first segment.

An arrow shown between the vehicles 236, 246 indicates a transfer of thefirst segment from the first vehicle 236 to the second vehicle 246.Beneficially, this vehicle-to-vehicle, i.e., P2P, transfer can occur inunlicensed spectrum based on the overlapping ranges 240, 250. Thus, aportion of the data content item corresponding to the first segment canbe provided to the second vehicle without using the licensed frequencyspectrum. Upon successful receipt of the first segment, the second setof boxes 252 can be updated to shade in the first box corresponding toreceipt of the first segment. There is no change to the first set ofboxes 242 being a donor in this instance. It is understood that in atleast some instances a progress report, e.g., identifying receivedsegments or shaded boxes, for each of the vehicles can be shared withother P2P participants and/or with the file distribution facilitator 181(FIG. 1), 206 (FIG. 2A).

FIG. 2D illustrates a third, alternative system configuration 230 c inwhich the first and second vehicles 242, 252 are in the same respectivelocations, but in this example, the second vehicle 246 has alreadyreceived a second segment represented by a shading in of a second box ofthe second set of boxes 252. This scenario allows for a double exchangebetween the first and second vehicles 236, 246 as P2P participants.Namely, the first vehicle 236 provides a copy of the first segment tothe second vehicle, while the second vehicle provides a copy of thesecond segment to the first vehicle. The separate exchanges can occursimultaneously, e.g., in a full-duplex manner, or sequentially wherefull-duplex communications and/or bandwidth may not be available. Afterthe exchange, the first set of blocks 242 of the first vehicle 236 willhave the first and second blocks shaded representing reception of thefirst and second segments by the first vehicle 236. Likewise, the secondset of blocks 252 of the second vehicle 246 will also have the first andsecond blocks shaded representing reception of the first and secondsegments by the second vehicle 246.

FIG. 2E illustrates a fourth system configuration 230 d in which thefirst vehicle 236 has travelled a second distance to a third locationalong the path 238. The third location is outside of the first cellularrange 234 a of the first cell site 232 a and outside of the secondcellular range 234 b of the second cell site 232 b. According to theillustrative example, the first vehicle 236 has already received firstand second segments of the set of segments according to the precedingsystem configurations 230 a (FIG. 2B) and 230 c (FIG. 2C) represented bya shading of the first two boxes of the set of boxes 242.

The fourth system configuration 230 d includes a third vehicle 247 alsolocated outside of the first and second cellular ranges 234 a, 234 b.The third vehicle 247 has also received a segmentation recordrepresented by a third set of boxes 253 corresponding to the set ofsegments necessary for the third vehicle 247 to obtain the data contentitem. The first and third sets of boxes 242, 253 can include the sameboxes associated with the same segments and the same order to supportregeneration of the original data content item. However, the tracking ofprogress of received segments of the first and third sets of boxes 242,253 will vary based on their respective progress according to the P2Pprocess.

Advantageously, proximity of the third vehicle 247 to the first vehicle236 results in an overlapping coverage of the first wireless range 240of the first vehicle 236 and a third wireless range 255 of the thirdvehicle 247. According to the illustrative example, both vehicles 236,247 are participants in the P2P file sharing process. Accordingly, thefirst vehicle 236 can share up to the first two segments that it hasreceived, while the third vehicle 247 can share a third segment that ithas received.

A pair of arrows shown between the two vehicles 236, 247 indicates atransfer of the first and second segments from the first vehicle 236 tothe third vehicle 247 and a transfer of the third segment from the thirdvehicle 247 to the first vehicle 236. After the mutual P2P transfer,both vehicles 236, 247 will have received the first three segments ofthe set of segments. Once again, the vehicle-to-vehicle, i.e., P2P,transfer can occur in unlicensed spectrum based on the overlappingranges 240, 255 of the respective vehicles. Thus, a portion of the datacontent item corresponding to the first and second segments can beprovided to the third vehicle 247 without using licensed frequencyspectrum. Upon successful receipt of the first and second segments, thethird set of boxes 253 can be updated to shade in the first three boxescorresponding to receipt of the first three segments. Likewise, thefirst set of boxes 242 can be updated to shade in the first three boxescorresponding to receipt of the first three segments.

Updated progress reports 242, 253, e.g., identifying received segmentsor shaded boxes, for each of the vehicles 236, 247 can be shared withother P2P participants and/or with the file distribution facilitator 181(FIG. 1), 206 (FIG. 2A). In some embodiments, the progress reports 242,253 of the P2P participants are shared according to a predeterminedschedule, e.g., according to a predetermined number of seconds, minutes,hours, days. Alternatively or in addition, the progress reports can beshared according to events. Events can include, without limitation, achange in a number of received segments. The received segments can beobtained by one or more of a P2P exchange, an exchange with cachedsegments of a network edge device 210 (FIG. 2A) and/or an injectionand/or seeding via one or more of the cell sites 232.

The fourth system configuration 230 d also illustrates a fourth vehicle256. By this point in the illustrative example, the first vehicle 236has already received first, second and third segments of the set ofsegments. A single segment remains to be received by the first vehicle236 in order to complete the set of segments 242 allowing for aregeneration of the original data item at the first vehicle 236.

Advantageously, proximity of the fourth vehicle 256 to the first vehicle236 also results in an overlapping coverage of the first wireless range240 of the first vehicle 236 and a second wireless range 260 of thefourth vehicle 247. According to the illustrative example, both vehicles236, 247 are also participants in the P2P file sharing process.Accordingly, the fourth vehicle 247 can share its fourth segment withthe first vehicle.

An arrow shown between the vehicles 236, 247 indicates a transfer of thethird segment from the fourth vehicle 247 to the second vehicle 246. Itis understood that in at least some scenarios, a security measure isapplied to one or more of the data content item segments. As disclosedabove, the security item can be applied during a pre-processing of thedata content item, e.g., coincident with disaggregation and/or afterdisaggregation but prior to initial injections or seeding by the mobileservice provider. In such instances, security information can begenerated to facilitate subsequent secure transfer and/or receipt of thedata content item segments. The security information can include one ormore of a checksum, a hash value, a key and/or other certificate.

In at least some embodiments, the security information is distributed toP2P participants. For example, the security information can be includeswithin a segmentation report, or provided separately. In at least someembodiments, the security information is distributed separately from theP2P process. Separate distribution can include, without limitation,distribution via licensed frequency spectra, e.g., via SMS, email, filetransfer, and the like. In some embodiments, a P2P client applicationreceives the security information from a P2P server application.

An arrow drawn from the fourth vehicle 256 to the first vehicle 236indicates that the fourth data segment is transferred to the firstvehicle to complete the set of segments. The first vehicle 236 uponreceipt of the fourth segment, applies the security information to thereceived segment. However, according to the illustrative example, thefourth segment of a fourth group of blocks 232 of the fourth vehicle 256has been compromised. Accordingly, application of the securityinformation does not satisfy a security requirement of the securitymeasure. For example, application of a hash algorithm produces a resultthat differs from a hash value. Accordingly, the first vehicle is unableto use the received segment to complete the set of segments.

In some embodiments, a recipient of a segment that does not satisfy asecurity requirement notifies a provider of the segment. Thenotification can request that the segment be resent. It is conceivablethat the segment was corrupted during a wireless transfer from thefourth vehicle 256, e.g., due to noise, interference and/or a weaksignal level. To the extent the segment is resent, the securityinformation is applied once again. If the security measure fails, theprocess of resending and re-verifying can be repeated or terminated.

In some embodiments, a security report is generated to indicate that anattempted transfer or number of transfers of a data content item segmentfailed due to an inability to satisfy the security requirement. Forexample, a security report can be generated by the recipient, i.e., thefirst vehicle 236, by the provider, i.e., the fourth vehicle 256, or byboth P2P participants 236, 256. The security report(s) can be sharedwith one or more P2P participants, with a with a mobile networkoperator, with a file distribution facilitator 181 (FIG. 1), 206 (FIG.2), with a file ingestor 180 (FIG. 1), 204 (FIG. 2), with a producer orprovider of the data content item, or with any combination thereof.

It is understood that in at least some applications the security reportscan be monitored, e.g., by any of the recipients or a dedicated securityserver, and analyzed to determine whether there will be any consequencesthe P2P distribution. For example, a report of the fourth segmentfailing a security requirement after transfer to the first vehicle 236may result in the file distribution facilitator 181 taking action withrespect to the provider, i.e., the fourth vehicle. Action might includeresending the fourth segment to the fourth vehicle by any of the meansdisclosed herein including direct injection, e.g., by the second cellsite 232 b as the fourth vehicle 256 is within the range of cellularcoverage 234 b, or by P2P sharing from other participants, or anycombination thereof. In some embodiments, the file distributionfacilitator 181 and/or security server makes note of the security issue,but takes no immediate action. To the extent other security reportsindicate security issues with one or more of the same segment or thesame provider, e.g., the fourth vehicle 356, subsequent action may betaken. In extreme examples, the source of suspect data segments, e.g.,the fourth vehicle 256, can be removed as a participant of the P2P filesharing. Removal can be for a current file transfer and/or from futurefile transfers.

FIG. 2F illustrates a fifth system configuration 230 e in which thefirst vehicle 236 has travelled a third distance to a fourth locationalong the path 238. The fourth location is outside of the first andsecond cellular ranges 234 a, 264 b, but within a third cellular range234 c of a third cell site 232 c. According to the illustrative example,the first vehicle 236 only requires a fourth segment of the set ofsegments to complete the set of segments of the example file transfer.Advantageously, proximity of the second vehicle 246 to the first vehicle236 also results in an overlapping coverage of the second wireless range250 of the second vehicle 246 and the first wireless range 240 of thefirst vehicle 236. Accordingly, the second vehicle 246 can share itsfourth segment with the first vehicle 236.

An arrow drawn from the second vehicle 246 to the first vehicle 236indicates that the fourth data segment is transferred to the firstvehicle 236 to complete the set of segments. The first vehicle 236applies the security information to the received segment and responsiveto satisfaction of a security requirement, the P2P file transfer to thefirst vehicle is nearly completed. The first vehicle, having determinedthat it has received all of the segments according to the segmentationreport, initiates a regeneration process. The regeneration processregenerates the original data content item from the complete set ofreceived segments. Regeneration can include an aggregation of thesegments of the complete set of segments. In at least some embodiments,regeneration instructions can be provided to P2P participants, such asthe first vehicle 236 to facilitate application of the regenerationprocess by the first vehicle 236. For example, regeneration instructionscan be provided by one or more of the file distribution facilitator 181(FIG. 1), 206 (FIG. 2), the file ingestor 180 (FIG. 1), 204 (FIG. 2), orboth.

It is understood that regeneration of the original file may depend on aparticular disaggregation process applied to the original data contentitem at a time of ingestion. It is conceivable that in some embodiments,more than one different types of disaggregation processes may beapplied, e.g., according to a file size, a file type, a priority,network conditions, and the like. Alternatively, a common disaggregationprocess may be used, such that recipient devices do not require separateregeneration instructions. For example, file regeneration instructionsor functionality can be built into a P2P client application allowing thefile to be regenerated responsive to receipt of the complete set ofsegments. It is further conceivable that file regeneration may beperformed having received less than a complete set, e.g., for streamingmedia wherein a sufficient set, being less than a complete set ofsegments, can be combined to regeneration of a portion of a streamingmedia file to allow for a presentation of that portion.

FIG. 2G depicts an illustrative embodiment of a process 260 inaccordance with various aspects described herein. The process 260monitors progress of a wireless delivery of a set of file segments toequipment of a targeted group of users and/or analyzes the progress toidentify a deficiency in delivery of one or more file segments of theset of file segments to the wireless equipment of the targeted group ofusers. Responsive to the deficiency, the process 260 facilitates awireless provisioning of the particular file segment to the wirelessequipment a first group of users via a licensed frequency spectrum.

According to the process 260, a data item is identified for distributionat 261. Identification of the data item can include a request from aproducer or provider of the data item. In at least some embodiments, therequest is accompanied with or followed by receipt of the data item. Thedata item is segmented into a set of data item segments that aredistributed individual or in groups to the equipment of the targetedgroup of users via a P2P file sharing process. The P2P process utilizespeer transfers of some data item segments in unlicensed frequencyspectra blended with injection of other data item segments unlicensedfrequency spectra. The blended distribution provides for a timelydistribution of the data item that limits use of licensed frequencyspectra in an efficient manner.

A progress of P2P file distribution is monitored at 262. For example,progress can be determined according to individual progress reports fromP2P participants. Progress reports can provide a measure of completionfor each of the P2P participants, e.g., identifying received segments,missing segments, or some other measure, such as a percentage, or simplebinary complete/incomplete. Progress can be tracked, e.g., by a filedistribution facilitator 181 (FIG. 1).

An efficiency of the P2P file distribution can be determined at 263. Anefficiency can be based on any suitable measure, such as progress,segment availability, reachability, connectivity and signal quality,energy level, amount of transmitted/received files (to enforcefairness), elapsed time, remaining time, e.g., when a time limit hasbeen established, ratio of licensed versus unlicensed spectrum, apercentage of licensed and/or unlicensed spectrum, and the like.

To the extent it is determined at 264 that the process 260 isprogressing in an efficient manner, the process 260 continues monitoringthe progress at 262 and analyzing and/or updating efficiency at 263. Insome embodiments, trends and/or changes to progress and/or efficienciescan be determined and used as metrics to further evaluate a P2P filedistribution process. For example, a trend in increasing or decreasingefficiency over time can trigger a response from a file distributionfacilitator 181. If an efficiency is trending downward, i.e., becomingless efficient, than the file distribution facilitator 181 can reviseand/or modify a segment injection policy. Such modifications mightinclude injections of more file segments to offset a downward trend.Modifications can be reversed and/or further modified in a like manner.For example, if increased segment injection results in an increasedefficiency, the file injections can be reduced to conserve licensedfrequency spectra. It is understood that such a process can beautomated, e.g., according to a feedback process to implement apredetermined policy responsive to P2P file transfer performance.

To the extent it is determined at 264 that the process is progressing inan inefficient manner, a segment is identified for injection at 265.Segment injection can include the use of licensed frequency spectra toinject one or more segments in a targeted manner, e.g., to specificusers and/or within specific regions. For example, a location of theinjection is identified at 266. The location might be a defaultlocation, e.g., every cell and/or cell sector, or a subset of cellsand/or cell sectors. In at least some embodiments, targeted injection isbased on a location of a P2P file distribution that requires one or moreparticular segments. In some embodiments, P2P progress can be arrangedaccording to a geographical map to identify missing segments versuslocation. For example, a heat map can be prepared for an overall P2Pprogress/availability and/or progress of a group of segments. Such amapping can be based on locations of equipment of the targeted group ofusers.

The segment is injected at the identified location at 267. The injectioncan be accomplished to one or more wireless devices within a coverageregion of the identified location. For example, one P2P participant, oreven a non-participant, can be identified as a destination for theinjection. In at least some embodiments, the recipient can furtherdistribute the injected segment according to the P2P process. Theprocess again continues monitoring progress of the P2P distribution at262.

FIG. 2H depicts an illustrative embodiment of a process 280 inaccordance with various aspects described herein. A data item isdisaggregated into data item segments at 272. Disaggregation can beaccomplished by a file ingestor 180 (FIG. 1), 204 (FIG. 2).

A security measure is applied to the data item segments at 273. Thesecurity measure can include one or more of the example securitymeasures disclosed herein or otherwise generally know. In at least someexamples, the security measure can be applied by the file ingestor 180,204. It is understood that more than one security measure can beapplied. For example, an original data content item may be encrypted orotherwise scrambled before disaggregation. The individual segmentsresulting from disaggregation can be further secured, e.g., according toa hash, a checksum and/or a blockchain process. The security processincludes provisions for receiving devices to apply security informationto facilitate recovery of the original data item segments and/or fileupon regeneration.

A first targeted wireless device is identified at 274. This can be anywireless device that happens to be within range of one or more celltowers of a mobile communication network. In some embodiments, thetargeted wireless device is selected from among multiple devicesaccording to a selection process. The selection process can includeconsideration as to whether the targeted wireless device is anin-network device, or roaming. Alternatively or in addition, the processcan include consideration as to past performance of the particulardevice, e.g., if the device has been a reliable participant in other P2Pfile distributions. Still other considerations include types ofequipment, signal strength, link quality, mobility, and so on.

In at least some embodiments a P2P push and/or pull process or algorithmmonitors parameters that can be used in a selection process. Suchparameters can include, without limitation, signal quality and/orchannel quality between communicating instances (cell sites, RSUs, enduser devices, vehicles, drones, and the like). Selection of a sourceand/or destination of a segment or group of segments can be based atleast in part on the monitored parameters. In some embodiments,monitored parameters can include one or more of mobility, speed,direction, proximity, signal strength, channel quality and the like. Forexample, a peer group can be established according to proximity, e.g.,selecting peers within a geographical region, and/or within a radiosignal range. Alternatively or in addition, peers of a group can beselected based on mobility versus stationary. Alternatively or inaddition, peer groups can be selected based on a combination ofparameters, such as mobility and direction. For example, a peer groupcan be selected to include vehicles moving in a similar direction. Thismight include vehicles traveling in the same/similar direction on thesame roadway or different roadways in a same general direction. Thiswould favor vehicles that are likely to remain within proximity for sometime, versus vehicles moving in opposite or different directions.

A first secured data item segment is transported to the first wirelessdevice at 275 via licensed frequency spectrum, e.g., according to a Uuprotocol of a UE to eNB link of a 3GPP LTE (4G) network. The firstsecured data item segment distributed by the first wireless device toanother wireless device via unlicensed frequency spectrum at 276.Transfer via unlicensed spectrum can include any of the examplesdisclosed herein, including short-range communication, Wifi, Bluetooth,and the like.

Progress of the P2P distribution progress is analyzed at 276 and asubsequent injection of a file segment is initiated at 278 responsive tothe distribution progress.

While for purposes of simplicity of explanation, the respectiveprocesses are shown and described as a series of blocks in FIG. 2G, itis to be understood and appreciated that the claimed subject matter isnot limited by the order of the blocks, as some blocks may occur indifferent orders and/or concurrently with other blocks from what isdepicted and described herein. Moreover, not all illustrated blocks maybe required to implement the methods described herein.

It is understood that in some instances, connectivity may be interruptedwhile transmitting one or more segments. This can include transmissionby one or more of a mobile cellular site 208 232, an RSU 210, and/orequipment including mobile equipment of P2P participants and/orrecipient devices 220, 222, 236, 246, 247, 256. Contributors tointerruptions can include, without limitation, fading signals, distinctdirections and/or loss of line-of-sight. A caching process can beemployed by one or more of the P2P participants and/or recipients, suchthat portions of incomplete segments can be stored locally. Accordingly,an interrupted download of one or more segments can resume whenconditions allow, completing transmission of segment(s) withoutnecessarily re-transmitting any cached portions.

Referring now to FIG. 3, a block diagram 300 is shown illustrating anexample, non-limiting embodiment of an optionally virtualizedcommunication network in accordance with various aspects describedherein. In particular a virtualized communication network is presentedthat can be used to implement some or all of the subsystems andfunctions of communication network 100, the subsystems and functions ofsystem 200, and method 230 presented in FIGS. 1, 2A, 2B, 2C, and 3. Forexample, the virtualized communication network 300 can facilitate inwhole or in part disaggregation of a data content item or file to obtaina set of file segments, wherein the file can be regenerated according toa recombination of the set of file segments. The virtualizedcommunication network 300 can facilitate in whole or in part transportof some file segments of the set of file segments to equipment of atargeted group of users via an unlicensed frequency spectrum andaccording to a P2P file sharing process. The virtualized communicationnetwork 300 can facilitate generation and/or distribution of asegmentation record to the equipment of the targeted group of users,wherein the segmentation record identifies the set of file segments. Thevirtualized communication network 300 can facilitate in whole or in partmonitoring of progress of a delivery of the set of file segments to theequipment of the targeted group of users and/or analysis of the progressto identify a deficiency in delivery of a particular file segment of theset of file segments to the equipment of the targeted group of users.Responsive to the deficiency, the virtualized communication network 300can facilitate a wireless provisioning of the particular file segment toequipment of the first group of users via a licensed frequency spectrum.

In particular, a cloud networking architecture is shown that leveragescloud technologies and supports rapid innovation and scalability via atransport layer 350, a virtualized network function cloud 325 and/or oneor more cloud computing environments 375. In various embodiments, thiscloud networking architecture is an open architecture that leveragesapplication programming interfaces (APIs); reduces complexity fromservices and operations; supports more nimble business models; andrapidly and seamlessly scales to meet evolving customer requirementsincluding traffic growth, diversity of traffic types, and diversity ofperformance and reliability expectations.

In contrast to traditional network elements—which are typicallyintegrated to perform a single function, the virtualized communicationnetwork employs virtual network elements (VNEs) 330, 332, 334, etc. thatperform some or all of the functions of network elements 150, 152, 154,156, etc. (FIG. 1). For example, the network architecture can provide asubstrate of networking capability, often called Network FunctionVirtualization Infrastructure (NFVI) or simply infrastructure that iscapable of being directed with software and Software Defined Networking(SDN) protocols to perform a broad variety of network functions andservices. This infrastructure can include several types of substrates.The most typical type of substrate being servers that support NetworkFunction Virtualization (NFV), followed by packet forwardingcapabilities based on generic computing resources, with specializednetwork technologies brought to bear when general purpose processors orgeneral purpose integrated circuit devices offered by merchants(referred to herein as merchant silicon) are not appropriate. In thiscase, communication services can be implemented as cloud-centricworkloads.

As an example, a traditional network element 150 (shown in FIG. 1), suchas an edge router can be implemented via a VNE 330 composed of NFVsoftware modules, merchant silicon, and associated controllers. Thesoftware can be written so that increasing workload consumes incrementalresources from a common resource pool, and moreover so that it'selastic: so the resources are only consumed when needed. In a similarfashion, other network elements such as other routers, switches, edgecaches, and middle-boxes are instantiated from the common resource pool.Such sharing of infrastructure across a broad set of uses makes planningand growing infrastructure easier to manage. In at least someembodiments, one or more of the file ingestor 180 (FIG. 1), 204 (FIG. 2)or the file distribution facilitator 181 (FIG. 1), 206 (FIG. 2) can beimplemented in one or more VNEs 330, 332, 334 to implement functionalityof the P2P process.

In an embodiment, the transport layer 350 includes one or more of fiber,cable, free-space optical, e.g., laser, wired and/or wireless transportelements, e.g., Bluetooth and/or millimeter-wave for licensed and/orunlicensed spectrum, network elements and interfaces to one or more ofthe foregoing. The transport layer 350 can provide one or more ofbroadband access 110, wireless access 120, voice access 130, wirelessP2P access 380, media access 140 and/or access to content sources 175for distribution of content to any or all of the access technologies. Inparticular, in some cases a network element needs to be positioned at aspecific place, and this allows for less sharing of commoninfrastructure. Other times, the network elements have specific physicallayer adapters that cannot be abstracted or virtualized, and mightrequire special DSP code and analog front-ends (AFEs) that do not lendthemselves to implementation as VNEs 330, 332 or 334. These networkelements can be included in transport layer 350.

The virtualized network function cloud 325 interfaces with the transportlayer 350 to provide the VNEs 330, 332, 334, etc. to provide specificNFVs. In particular, the virtualized network function cloud 325leverages cloud operations, applications, and architectures to supportnetworking workloads. The virtualized network elements 330, 332 and 334can employ network function software that provides either a one-for-onemapping of traditional network element function or alternately somecombination of network functions designed for cloud computing. Forexample, VNEs 330, 332 and 334 can include route reflectors, domain namesystem (DNS) servers, and dynamic host configuration protocol (DHCP)servers, system architecture evolution (SAE) or its components such asmobility management entity (MME) or Packet/Serving-gateways, broadbandnetwork gateways, IP edge routers for IP-VPN, Ethernet and otherservices, load balancers, distributers and other network elements. In atleast some embodiments, workloads of at least some elements can bedistributed across a number of servers—each of which adds a portion ofthe capability, and overall which creates an elastic function withhigher availability than its former monolithic version. These virtualnetwork elements 330, 332, 334, etc. can be instantiated and managedusing an orchestration approach similar to those used in cloud computeservices.

The cloud computing environments 375 can interface with the virtualizednetwork function cloud 325 via APIs that expose functional capabilitiesof the VNEs 330, 332, 334, etc. to provide the flexible and expandedcapabilities to the virtualized network function cloud 325. Inparticular, network workloads may have applications distributed acrossthe virtualized network function cloud 325 and cloud computingenvironment 375 and in the commercial cloud, or might simply orchestrateworkloads supported entirely in NFV infrastructure from these thirdparty locations.

Turning now to FIG. 4, there is illustrated a block diagram of acomputing environment in accordance with various aspects describedherein. In order to provide additional context for various embodimentsof the embodiments described herein, FIG. 4 and the following discussionare intended to provide a brief, general description of a suitablecomputing environment 400 in which the various embodiments of thesubject disclosure can be implemented. In particular, computingenvironment 400 can be used in the implementation of network elements150, 152, 154, 156, access terminal 112, base station or access point122, switching device 132, media terminal 142, and/or VNEs 330, 332,334, etc. Each of these devices can be implemented viacomputer-executable instructions that can run on one or more computers,and/or in combination with other program modules and/or as a combinationof hardware and software. For example, computing environment 400 canfacilitate in whole or in part file ingestion, file disaggregation, P2Pprocess initiation and/or monitoring and analysis, selected injection ofsegments based on analysis of monitored progress of the P2P filedistribution, and the like.

Generally, program modules comprise routines, programs, components, datastructures, etc., that perform particular tasks or implement particularabstract data types. Moreover, those skilled in the art will appreciatethat the inventive methods can be practiced with other computer systemconfigurations, comprising single-processor or multiprocessor computersystems, minicomputers, mainframe computers, as well as personalcomputers, user equipment mounted in the car, on-board-units installedin the car, hand-held computing devices, microprocessor-based orprogrammable consumer electronics, and the like, each of which can beoperatively coupled to one or more associated devices.

As used herein, a processing circuit includes one or more processors aswell as other application specific circuits such as an applicationspecific integrated circuit, digital logic circuit, state machine,programmable gate array or other circuit that processes input signals ordata and that produces output signals or data in response thereto. Itshould be noted that while any functions and features described hereinin association with the operation of a processor could likewise beperformed by a processing circuit.

The illustrated embodiments of the embodiments herein can be alsopracticed in distributed computing environments where certain tasks areperformed by remote processing devices that are linked through acommunications network. In a distributed computing environment, programmodules can be located in both local and remote memory storage devices.

Computing devices typically comprise a variety of media, which cancomprise computer-readable storage media and/or communications media,which two terms are used herein differently from one another as follows.Computer-readable storage media can be any available storage media thatcan be accessed by the computer and comprises both volatile andnonvolatile media, removable and non-removable media. By way of example,and not limitation, computer-readable storage media can be implementedin connection with any method or technology for storage of informationsuch as computer-readable instructions, program modules, structured dataor unstructured data.

Computer-readable storage media can comprise, but are not limited to,random access memory (RAM), read only memory (ROM), electricallyerasable programmable read only memory (EEPROM), flash memory or othermemory technology, compact disk read only memory (CD-ROM), digitalversatile disk (DVD) or other optical disk storage, magnetic cassettes,magnetic tape, magnetic disk storage or other magnetic storage devicesor other tangible and/or non-transitory media which can be used to storedesired information. In this regard, the terms “tangible” or“non-transitory” herein as applied to storage, memory orcomputer-readable media, are to be understood to exclude onlypropagating transitory signals per se as modifiers and do not relinquishrights to all standard storage, memory or computer-readable media thatare not only propagating transitory signals per se.

Computer-readable storage media can be accessed by one or more local orremote computing devices, e.g., via access requests, queries or otherdata retrieval protocols, for a variety of operations with respect tothe information stored by the medium.

Communications media typically embody computer-readable instructions,data structures, program modules or other structured or unstructureddata in a data signal such as a modulated data signal, e.g., a carrierwave or other transport mechanism, and comprises any informationdelivery or transport media. The term “modulated data signal” or signalsrefers to a signal that has one or more of its characteristics set orchanged in such a manner as to encode information in one or moresignals. By way of example, and not limitation, communication mediacomprise wired media, such as a wired network or direct-wiredconnection, and wireless media such as acoustic, RF, infrared and otherwireless media.

With reference again to FIG. 4, the example environment can comprise acomputer 402, the computer 402 comprising a processing unit 404, asystem memory 406 and a system bus 408. The system bus 408 couplessystem components including, but not limited to, the system memory 406to the processing unit 404. The processing unit 404 can be any ofvarious commercially available processors. Dual microprocessors andother multiprocessor architectures can also be employed as theprocessing unit 404.

The system bus 408 can be any of several types of bus structure that canfurther interconnect to a memory bus (with or without a memorycontroller), a peripheral bus, and a local bus using any of a variety ofcommercially available bus architectures. The system memory 406comprises ROM 410 and RAM 412. A basic input/output system (BIOS) can bestored in a non-volatile memory such as ROM, erasable programmable readonly memory (EPROM), EEPROM, which BIOS contains the basic routines thathelp to transfer information between elements within the computer 402,such as during startup. The RAM 412 can also comprise a high-speed RAMsuch as static RAM for caching data.

The computer 402 further comprises an internal hard disk drive (HDD) 414(e.g., EIDE, SATA), which internal HDD 414 can also be configured forexternal use in a suitable chassis (not shown), a magnetic floppy diskdrive (FDD) 416, (e.g., to read from or write to a removable diskette418) and an optical disk drive 420, (e.g., reading a CD-ROM disk 422 or,to read from or write to other high capacity optical media such as theDVD). The HDD 414, magnetic FDD 416 and optical disk drive 420 can beconnected to the system bus 408 by a hard disk drive interface 424, amagnetic disk drive interface 426 and an optical drive interface 428,respectively. The hard disk drive interface 424 for external driveimplementations comprises at least one or both of Universal Serial Bus(USB) and Institute of Electrical and Electronics Engineers (IEEE) 1394interface technologies. Other external drive connection technologies arewithin contemplation of the embodiments described herein.

The drives and their associated computer-readable storage media providenonvolatile storage of data, data structures, computer-executableinstructions, and so forth. For the computer 402, the drives and storagemedia accommodate the storage of any data in a suitable digital format.Although the description of computer-readable storage media above refersto a hard disk drive (HDD), a removable magnetic diskette, and aremovable optical media such as a CD or DVD, it should be appreciated bythose skilled in the art that other types of storage media which arereadable by a computer, such as zip drives, magnetic cassettes, flashmemory cards, cartridges, and the like, can also be used in the exampleoperating environment, and further, that any such storage media cancontain computer-executable instructions for performing the methodsdescribed herein.

A number of program modules can be stored in the drives and RAM 412,comprising an operating system 430, one or more application programs432, other program modules 434 and program data 436. All or portions ofthe operating system, applications, modules, and/or data can also becached in the RAM 412. The systems and methods described herein can beimplemented utilizing various commercially available operating systemsor combinations of operating systems.

A user can enter commands and information into the computer 402 throughone or more wired/wireless input devices, e.g., a keyboard 438 and apointing device, such as a mouse 440. Other input devices (not shown)can comprise a microphone, an infrared (IR) remote control, a joystick,a game pad, a stylus pen, touch screen or the like. These and otherinput devices are often connected to the processing unit 404 through aninput device interface 442 that can be coupled to the system bus 408,but can be connected by other interfaces, such as a parallel port, anIEEE 1394 serial port, a game port, a universal serial bus (USB) port,an IR interface, etc.

A monitor 444 or other type of display device can be also connected tothe system bus 408 via an interface, such as a video adapter 446. Itwill also be appreciated that in alternative embodiments, a monitor 444can also be any display device (e.g., another computer having a display,a smart phone, a tablet computer, etc.) for receiving displayinformation associated with computer 402 via any communication means,including via the Internet and cloud-based networks. In addition to themonitor 444, a computer typically comprises other peripheral outputdevices (not shown), such as speakers, printers, etc.

The computer 402 can operate in a networked environment using logicalconnections via wired and/or wireless communications to one or moreremote computers, such as a remote computer(s) 448. The remotecomputer(s) 448 can be a workstation, a server computer, a router, apersonal computer, portable computer, microprocessor-based entertainmentappliance, a peer device or other common network node, and typicallycomprises many or all of the elements described relative to the computer402, although, for purposes of brevity, only a remote memory/storagedevice 450 is illustrated. The logical connections depicted comprisewired/wireless connectivity to a local area network (LAN) 452 and/orlarger networks, e.g., a wide area network (WAN) 454. Such LAN and WANnetworking environments are commonplace in offices and companies, andfacilitate enterprise-wide computer networks, such as intranets, all ofwhich can connect to a global communications network, e.g., theInternet.

When used in a LAN networking environment, the computer 402 can beconnected to the LAN 452 through a wired and/or wireless communicationnetwork interface or adapter 456. The adapter 456 can facilitate wiredor wireless communication to the LAN 452, which can also comprise awireless AP disposed thereon for communicating with the adapter 456.

When used in a WAN networking environment, the computer 402 can comprisea modem 458 or can be connected to a communications server on the WAN454 or has other means for establishing communications over the WAN 454,such as by way of the Internet. The modem 458, which can be internal orexternal and a wired or wireless device, can be connected to the systembus 408 via the input device interface 442. In a networked environment,program modules depicted relative to the computer 402 or portionsthereof, can be stored in the remote memory/storage device 450. It willbe appreciated that the network connections shown are example and othermeans of establishing a communications link between the computers can beused.

The computer 402 can be operable to communicate with any wirelessdevices or entities operatively disposed in wireless communication,e.g., a printer, scanner, desktop and/or portable computer, portabledata assistant, communications satellite, any piece of equipment orlocation associated with a wirelessly detectable tag (e.g., a kiosk,news stand, restroom), and telephone. This can comprise WirelessFidelity (Wi-Fi) and BLUETOOTH® wireless technologies. Thus, thecommunication can be a predefined structure as with a conventionalnetwork or simply an ad hoc communication between at least two devices.

Wi-Fi can allow connection to the Internet from a couch at home, a bedin a hotel room or a conference room at work, without wires. Wi-Fi is awireless technology similar to that used in a cell phone that enablessuch devices, e.g., computers, to send and receive data indoors and out;anywhere within the range of a base station. Wi-Fi networks use radiotechnologies called IEEE 802.11 (a, b, g, n, ac, ag, etc.) to providesecure, reliable, fast wireless connectivity. A Wi-Fi network can beused to connect computers to each other, to the Internet, and to wirednetworks (which can use IEEE 802.3 or Ethernet). Wi-Fi networks operatein the unlicensed 2.4 and 5 GHz radio bands for example or with productsthat contain both bands (dual band), so the networks can providereal-world performance similar to the basic 10BaseT wired Ethernetnetworks used in many offices.

Turning now to FIG. 5, an embodiment 500 of a mobile network platform510 is shown that is an example of network elements 150, 152, 154, 156,and/or VNEs 330, 332, 334, etc. For example, platform 510 can facilitatein whole or in part file ingestion, file disaggregation, P2P processinitiation and/or monitoring and analysis, selected injection ofsegments based on analysis of monitored progress of the P2P filedistribution, and the like. Alternatively or in addition, the platform510 can implement a P2P client application that receives file segmentsand regenerates an original file or at least a portion of an originalfile using received file segments. In some embodiments, the platform 510applies security information according to a security measure.Alternatively or in addition, the platform 510 monitors progress of afile transfer and provides a status of progress to one or more of otherP2P participants and/or a file distribution facilitator 181 (FIG. 1),206 (FIG. 2). In one or more embodiments, the mobile network platform510 can generate and receive signals transmitted and received by basestations or access points such as base station or access point 122.Generally, mobile network platform 510 can comprise components, e.g.,nodes, gateways, interfaces, servers, or disparate platforms, thatfacilitate both packet-switched (PS) (e.g., internet protocol (IP),frame relay, asynchronous transfer mode (ATM)) and circuit-switched (CS)traffic (e.g., voice and data), as well as control generation fornetworked wireless telecommunication. As a non-limiting example, mobilenetwork platform 510 can be included in telecommunications carriernetworks, and can be considered carrier-side components as discussedelsewhere herein. Mobile network platform 510 comprises CS gatewaynode(s) 512 which can interface CS traffic received from legacy networkslike telephony network(s) 540 (e.g., public switched telephone network(PSTN), or public land mobile network (PLMN)) or a signaling system #7(SS7) network 560. CS gateway node(s) 512 can authorize and authenticatetraffic (e.g., voice) arising from such networks. Additionally, CSgateway node(s) 512 can access mobility, or roaming, data generatedthrough SS7 network 560; for instance, mobility data stored in a visitedlocation register (VLR), which can reside in memory 530. Moreover, CSgateway node(s) 512 interfaces CS-based traffic and signaling and PSgateway node(s) 518. As an example, in a 3^(rd) Generation PartnershipProject (3GPP) UMTS network, CS gateway node(s) 512 can be realized atleast in part in gateway GPRS support node(s) (GGSN). It should beappreciated that functionality and specific operation of CS gatewaynode(s) 512, PS gateway node(s) 518, and serving node(s) 516, isprovided and dictated by radio technology(ies) utilized by mobilenetwork platform 510 for telecommunication over a radio access network520 with other devices, such as a radiotelephone 575.

In addition to receiving and processing CS-switched traffic andsignaling, PS gateway node(s) 518 can authorize and authenticatePS-based data sessions with served mobile devices. Data sessions cancomprise traffic, or content(s), exchanged with networks external to themobile network platform 510, like wide area network(s) (WANs) 550,enterprise network(s) 570, and service network(s) 580, which can beembodied in local area network(s) (LANs), can also be interfaced withmobile network platform 510 through PS gateway node(s) 518. It is to benoted that WANs 550 and enterprise network(s) 570 can embody, at leastin part, a service network(s) like IP multimedia subsystem (IMS). Basedon radio technology layer(s) available in technology resource(s) orradio access network 520, PS gateway node(s) 518 can generate packetdata protocol contexts when a data session is established; other datastructures that facilitate routing of packetized data also can begenerated. To that end, in an aspect, PS gateway node(s) 518 cancomprise a tunnel interface (e.g., tunnel termination gateway (TTG) in3GPP UMTS network(s) (not shown)) which can facilitate packetizedcommunication with disparate wireless network(s), such as Wi-Finetworks.

In embodiment 500, mobile network platform 510 also comprises servingnode(s) 516 that, based upon available radio technology layer(s) withintechnology resource(s) in the radio access network 520, convey thevarious packetized flows of data streams received through PS gatewaynode(s) 518. It is to be noted that for technology resource(s) that relyprimarily on CS communication, server node(s) can deliver trafficwithout reliance on PS gateway node(s) 518; for example, server node(s)can embody at least in part a mobile switching center. As an example, ina 3GPP UMTS network, serving node(s) 516 can be embodied in serving GPRSsupport node(s) (SGSN).

For radio technologies that exploit packetized communication, server(s)514 in mobile network platform 510 can execute numerous applicationsthat can generate multiple disparate packetized data streams or flows,and manage (e.g., schedule, queue, format . . . ) such flows. Suchapplication(s) can comprise add-on features to standard services (forexample, provisioning, billing, customer support . . . ) provided bymobile network platform 510. Data streams (e.g., content(s) that arepart of a voice call or data session) can be conveyed to PS gatewaynode(s) 518 for authorization/authentication and initiation of a datasession, and to serving node(s) 516 for communication thereafter. Inaddition to application server, server(s) 514 can comprise utilityserver(s), a utility server can comprise a provisioning server, anoperations and maintenance server, a security server that can implementat least in part a certificate authority and firewalls as well as othersecurity mechanisms, and the like. In an aspect, security server(s)secure communication served through mobile network platform 510 toensure network's operation and data integrity in addition toauthorization and authentication procedures that CS gateway node(s) 512and PS gateway node(s) 518 can enact. Moreover, provisioning server(s)can provision services from external network(s) like networks operatedby a disparate service provider; for instance, WAN 550 or GlobalPositioning System (GPS) network(s) (not shown). Provisioning server(s)can also provision coverage through networks associated to mobilenetwork platform 510 (e.g., deployed and operated by the same serviceprovider), such as the distributed antennas networks shown in FIG. 1(s)that enhance wireless service coverage by providing more networkcoverage.

It is to be noted that server(s) 514 can comprise one or more processorsconfigured to confer at least in part the functionality of mobilenetwork platform 510. To that end, the one or more processor can executecode instructions stored in memory 530, for example. It is should beappreciated that server(s) 514 can comprise a content manager, whichoperates in substantially the same manner as described hereinbefore.

In example embodiment 500, memory 530 can store information related tooperation of mobile network platform 510. Other operational informationcan comprise provisioning information of mobile devices served throughmobile network platform 510, subscriber databases; applicationintelligence, pricing schemes, e.g., promotional rates, flat-rateprograms, couponing campaigns; technical specification(s) consistentwith telecommunication protocols for operation of disparate radio, orwireless, technology layers; and so forth. Memory 530 can also storeinformation from at least one of telephony network(s) 540, WAN 550, SS7network 560, or enterprise network(s) 570. In an aspect, memory 530 canbe, for example, accessed as part of a data store component or as aremotely connected memory store.

In order to provide a context for the various aspects of the disclosedsubject matter, FIG. 5, and the following discussion, are intended toprovide a brief, general description of a suitable environment in whichthe various aspects of the disclosed subject matter can be implemented.While the subject matter has been described above in the general contextof computer-executable instructions of a computer program that runs on acomputer and/or computers, those skilled in the art will recognize thatthe disclosed subject matter also can be implemented in combination withother program modules. Generally, program modules comprise routines,programs, components, data structures, etc. that perform particulartasks and/or implement particular abstract data types.

Turning now to FIG. 6, an illustrative embodiment of a communicationdevice 600 is shown. The communication device 600 can serve as anillustrative embodiment of devices such as data terminals 114, mobiledevices 124, vehicle 126, display devices 144 or other client devicesfor communication via either communications network 125. For example,computing device 600 can facilitate in whole or in part file ingestion,file disaggregation, P2P process initiation and/or monitoring andanalysis, selected injection of segments based on analysis of monitoredprogress of the P2P file distribution, file regeneration and the like.Alternatively or in addition, the computing device 600 can implement aP2P client application that receives file segments and regenerates anoriginal file or at least a portion of an original file using receivedfile segments. In some embodiments, the platform 510 generates,distributes and/or applies security information according to a securitymeasure. Alternatively or in addition, the computing device 600 monitorsprogress of a file transfer and provides a status of progress to one ormore of other P2P participants and/or a file distribution facilitator181 (FIG. 1), 206 (FIG. 2).

The communication device 600 can comprise a wireline and/or wirelesstransceiver 602 (herein transceiver 602), a user interface (UI) 604, apower supply 614, a location receiver 616, a motion sensor 618, anorientation sensor 620, and a controller 606 for managing operationsthereof. The transceiver 602 can support short-range or long-rangewireless access technologies such as Bluetooth®, ZigBee®, WiFi, DECT, orcellular communication technologies, just to mention a few (Bluetooth®and ZigBee® are trademarks registered by the Bluetooth® Special InterestGroup and the ZigBee® Alliance, respectively). Cellular technologies caninclude, for example, CDMA-1X, UMTS/HSDPA, GSM/GPRS, TDMA/EDGE, EV/DO,WiMAX, SDR, LTE, as well as other next generation wireless communicationtechnologies as they arise. The transceiver 602 can also be adapted tosupport circuit-switched wireline access technologies (such as PSTN),packet-switched wireline access technologies (such as TCP/IP, VoIP,etc.), and combinations thereof.

The UI 604 can include a depressible or touch-sensitive keypad 608 witha navigation mechanism such as a roller ball, a joystick, a mouse, or anavigation disk for manipulating operations of the communication device600. The keypad 608 can be an integral part of a housing assembly of thecommunication device 600 or an independent device operably coupledthereto by a tethered wireline interface (such as a USB cable) or awireless interface supporting for example Bluetooth®. The keypad 608 canrepresent a numeric keypad commonly used by phones, and/or a QWERTYkeypad with alphanumeric keys. The UI 604 can further include a display610 such as monochrome or color LCD (Liquid Crystal Display), OLED(Organic Light Emitting Diode) or other suitable display technology forconveying images to an end user of the communication device 600. In anembodiment where the display 610 is touch-sensitive, a portion or all ofthe keypad 608 can be presented by way of the display 610 withnavigation features.

The display 610 can use touch screen technology to also serve as a userinterface for detecting user input. As a touch screen display, thecommunication device 600 can be adapted to present a user interfacehaving graphical user interface (GUI) elements that can be selected by auser with a touch of a finger. The display 610 can be equipped withcapacitive, resistive or other forms of sensing technology to detect howmuch surface area of a user's finger has been placed on a portion of thetouch screen display. This sensing information can be used to controlthe manipulation of the GUI elements or other functions of the userinterface. The display 610 can be an integral part of the housingassembly of the communication device 600 or an independent devicecommunicatively coupled thereto by a tethered wireline interface (suchas a cable) or a wireless interface.

The UI 604 can also include an audio system 612 that utilizes audiotechnology for conveying low volume audio (such as audio heard inproximity of a human ear) and high volume audio (such as speakerphonefor hands free operation). The audio system 612 can further include amicrophone for receiving audible signals of an end user. The audiosystem 612 can also be used for voice recognition applications. The UI604 can further include an image sensor 613 such as a charged coupleddevice (CCD) camera for capturing still or moving images.

The power supply 614 can utilize common power management technologiessuch as replaceable and rechargeable batteries, supply regulationtechnologies, and/or charging system technologies for supplying energyto the components of the communication device 600 to facilitatelong-range or short-range portable communications. Alternatively, or incombination, the charging system can utilize external power sources suchas DC power supplied over a physical interface such as a USB port orother suitable tethering technologies.

The location receiver 616 can utilize location technology such as aglobal positioning system (GPS) receiver capable of assisted GPS foridentifying a location of the communication device 600 based on signalsgenerated by a constellation of GPS satellites, which can be used forfacilitating location services such as navigation. The motion sensor 618can utilize motion sensing technology such as an accelerometer, agyroscope, or other suitable motion sensing technology to detect motionof the communication device 600 in three-dimensional space. Theorientation sensor 620 can utilize orientation sensing technology suchas a magnetometer to detect the orientation of the communication device600 (north, south, west, and east, as well as combined orientations indegrees, minutes, or other suitable orientation metrics).

The communication device 600 can use the transceiver 602 to alsodetermine a proximity to a cellular, WiFi, Bluetooth®, or other wirelessaccess points by sensing techniques such as utilizing a received signalstrength indicator (RSSI) and/or signal time of arrival (TOA) or time offlight (TOF) measurements. The controller 606 can utilize computingtechnologies such as a microprocessor, a digital signal processor (DSP),programmable gate arrays, application specific integrated circuits,and/or a video processor with associated storage memory such as Flash,ROM, RAM, SRAM, DRAM or other storage technologies for executingcomputer instructions, controlling, and processing data supplied by theaforementioned components of the communication device 600.

Other components not shown in FIG. 6 can be used in one or moreembodiments of the subject disclosure. For instance, the communicationdevice 600 can include a slot for adding or removing an identity modulesuch as a Subscriber Identity Module (SIM) card or Universal IntegratedCircuit Card (UICC). SIM or UICC cards can be used for identifyingsubscriber services, executing programs, storing subscriber data, and soon.

The terms “first,” “second,” “third,” and so forth, as used in theclaims, unless otherwise clear by context, is for clarity only anddoesn't otherwise indicate or imply any order in time. For instance, “afirst determination,” “a second determination,” and “a thirddetermination,” does not indicate or imply that the first determinationis to be made before the second determination, or vice versa, etc.

In the subject specification, terms such as “store,” “storage,” “datastore,” data storage,” “database,” and substantially any otherinformation storage component relevant to operation and functionality ofa component, refer to “memory components,” or entities embodied in a“memory” or components comprising the memory. It will be appreciatedthat the memory components described herein can be either volatilememory or nonvolatile memory, or can comprise both volatile andnonvolatile memory, by way of illustration, and not limitation, volatilememory, non-volatile memory, disk storage, and memory storage. Further,nonvolatile memory can be included in read only memory (ROM),programmable ROM (PROM), electrically programmable ROM (EPROM),electrically erasable ROM (EEPROM), or flash memory. Volatile memory cancomprise random access memory (RAM), which acts as external cachememory. By way of illustration and not limitation, RAM is available inmany forms such as synchronous RAM (SRAM), dynamic RAM (DRAM),synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhancedSDRAM (ESDRAM), Synchlink DRAM (SLDRAM), and direct Rambus RAM (DRRAM).Additionally, the disclosed memory components of systems or methodsherein are intended to comprise, without being limited to comprising,these and any other suitable types of memory.

Moreover, it will be noted that the disclosed subject matter can bepracticed with other computer system configurations, comprisingsingle-processor or multiprocessor computer systems, mini-computingdevices, mainframe computers, as well as personal computers, hand-heldcomputing devices (e.g., PDA, phone, smartphone, watch, tabletcomputers, netbook computers, etc.), microprocessor-based orprogrammable consumer or industrial electronics, and the like. Theillustrated aspects can also be practiced in distributed computingenvironments where tasks are performed by remote processing devices thatare linked through a communications network; however, some if not allaspects of the subject disclosure can be practiced on stand-alonecomputers. In a distributed computing environment, program modules canbe located in both local and remote memory storage devices.

In at least some embodiments, a file sharing process, such as theexample processes disclosed herein, can include a revoking of contentdistributed according to the P2P file sharing. A revocation process canbe accomplished in a manner similar to the provisioning processesdisclosed herein, such that provisioned content can be revoked,terminated and/or otherwise purged from P2P participants. For example,revocation can be initiated according to a planned distribution periodand/or lifecycle of data/content. It is understood that a revocationprocess can be applied to all segments of a data item and/or in aselective manner to a subset of segments of the data item. For example,an updating process can be applied to replace and/or add a scene of amovie, a chapter of a book, and/or a subset or module of provisionedsoftware and/or firmware. Outdated portions may be excised from the P2Pprocess, as necessary, and replaced with updated content, while leavingother portions subject to an earlier P2P process unmodified. Whether anupdating process or a replacement process is applied can be determined,e.g., according to estimates of bandwidth usage, time to complete,network conditions, and so on. For example, to the extent it isdetermined that it would be easier to insert a new item instead ofupdating existing ones, the process would proceed to revoke the old itemin favor of the new one.

In one or more embodiments, information regarding use of services can begenerated including services being accessed, media consumption history,user preferences, and so forth. This information can be obtained byvarious methods including user input, detecting types of communications(e.g., video content vs. audio content), analysis of content streams,sampling, and so forth. The generating, obtaining and/or monitoring ofthis information can be responsive to an authorization provided by theuser. In one or more embodiments, an analysis of data can be subject toauthorization from user(s) associated with the data, such as an opt-in,an opt-out, acknowledgement requirements, notifications, selectiveauthorization based on types of data, and so forth.

Some of the embodiments described herein can also employ artificialintelligence (AI) to facilitate automating one or more featuresdescribed herein. The embodiments (e.g., in connection withautomatically identifying acquired cell sites that provide a maximumvalue/benefit after addition to an existing communication network) canemploy various AI-based schemes for carrying out various embodimentsthereof. Moreover, the classifier can be employed to determine a rankingor priority of each cell site of the acquired network. A classifier is afunction that maps an input attribute vector, x=(x1, x2, x3, x4, . . . ,xn), to a confidence that the input belongs to a class, that is,f(x)=confidence (class). Such classification can employ a probabilisticand/or statistical-based analysis (e.g., factoring into the analysisutilities and costs) to determine or infer an action that a user desiresto be automatically performed. A support vector machine (SVM) is anexample of a classifier that can be employed. The SVM operates byfinding a hypersurface in the space of possible inputs, which thehypersurface attempts to split the triggering criteria from thenon-triggering events. Intuitively, this makes the classificationcorrect for testing data that is near, but not identical to trainingdata. Other directed and undirected model classification approachescomprise, e.g., naïve Bayes, Bayesian networks, decision trees, neuralnetworks, fuzzy logic models, and probabilistic classification modelsproviding different patterns of independence can be employed.Classification as used herein also is inclusive of statisticalregression that is utilized to develop models of priority.

As will be readily appreciated, one or more of the embodiments canemploy classifiers that are explicitly trained (e.g., via a generictraining data) as well as implicitly trained (e.g., via observing UEbehavior, operator preferences, historical information, receivingextrinsic information). For example, SVMs can be configured via alearning or training phase within a classifier constructor and featureselection module. Thus, the classifier(s) can be used to automaticallylearn and perform a number of functions, including but not limited todetermining according to predetermined criteria which of the acquiredcell sites will benefit a maximum number of subscribers and/or which ofthe acquired cell sites will add minimum value to the existingcommunication network coverage, etc.

As used in some contexts in this application, in some embodiments, theterms “component,” “system” and the like are intended to refer to, orcomprise, a computer-related entity or an entity related to anoperational apparatus with one or more specific functionalities, whereinthe entity can be either hardware, a combination of hardware andsoftware, software, or software in execution. As an example, a componentmay be, but is not limited to being, a process running on a processor, aprocessor, an object, an executable, a thread of execution,computer-executable instructions, a program, and/or a computer. By wayof illustration and not limitation, both an application running on aserver and the server can be a component. One or more components mayreside within a process and/or thread of execution and a component maybe localized on one computer and/or distributed between two or morecomputers. In addition, these components can execute from variouscomputer readable media having various data structures stored thereon.The components may communicate via local and/or remote processes such asin accordance with a signal having one or more data packets (e.g., datafrom one component interacting with another component in a local system,distributed system, and/or across a network such as the Internet withother systems via the signal). As another example, a component can be anapparatus with specific functionality provided by mechanical partsoperated by electric or electronic circuitry, which is operated by asoftware or firmware application executed by a processor, wherein theprocessor can be internal or external to the apparatus and executes atleast a part of the software or firmware application. As yet anotherexample, a component can be an apparatus that provides specificfunctionality through electronic components without mechanical parts,the electronic components can comprise a processor therein to executesoftware or firmware that confers at least in part the functionality ofthe electronic components. While various components have beenillustrated as separate components, it will be appreciated that multiplecomponents can be implemented as a single component, or a singlecomponent can be implemented as multiple components, without departingfrom example embodiments.

Further, the various embodiments can be implemented as a method,apparatus or article of manufacture using standard programming and/orengineering techniques to produce software, firmware, hardware or anycombination thereof to control a computer to implement the disclosedsubject matter. The term “article of manufacture” as used herein isintended to encompass a computer program accessible from anycomputer-readable device or computer-readable storage/communicationsmedia. For example, computer readable storage media can include, but arenot limited to, magnetic storage devices (e.g., hard disk, floppy disk,magnetic strips), optical disks (e.g., compact disk (CD), digitalversatile disk (DVD)), smart cards, and flash memory devices (e.g.,card, stick, key drive). Of course, those skilled in the art willrecognize many modifications can be made to this configuration withoutdeparting from the scope or spirit of the various embodiments.

In addition, the words “example” and “exemplary” are used herein to meanserving as an instance or illustration. Any embodiment or designdescribed herein as “example” or “exemplary” is not necessarily to beconstrued as preferred or advantageous over other embodiments ordesigns. Rather, use of the word example or exemplary is intended topresent concepts in a concrete fashion. As used in this application, theterm “or” is intended to mean an inclusive “or” rather than an exclusive“or”. That is, unless specified otherwise or clear from context, “Xemploys A or B” is intended to mean any of the natural inclusivepermutations. That is, if X employs A; X employs B; or X employs both Aand B, then “X employs A or B” is satisfied under any of the foregoinginstances. In addition, the articles “a” and “an” as used in thisapplication and the appended claims should generally be construed tomean “one or more” unless specified otherwise or clear from context tobe directed to a singular form.

Moreover, terms such as “user equipment,” “mobile station,” “mobile,”subscriber station,” “access terminal,” “terminal,” “handset,” “mobiledevice” (and/or terms representing similar terminology) can refer to awireless device utilized by a subscriber or user of a wirelesscommunication service to receive or convey data, control, voice, video,sound, gaming or substantially any data-stream or signaling-stream. Theforegoing terms are utilized interchangeably herein and with referenceto the related drawings.

Furthermore, the terms “user,” “subscriber,” “customer,” “consumer” andthe like are employed interchangeably throughout, unless contextwarrants particular distinctions among the terms. It should beappreciated that such terms can refer to human entities or automatedcomponents supported through artificial intelligence (e.g., a capacityto make inference based, at least, on complex mathematical formalisms),which can provide simulated vision, sound recognition and so forth.

As employed herein, the term “processor” can refer to substantially anycomputing processing unit or device comprising, but not limited tocomprising, single-core processors; single-processors with softwaremultithread execution capability; multi-core processors; multi-coreprocessors with software multithread execution capability; multi-coreprocessors with hardware multithread technology; parallel platforms; andparallel platforms with distributed shared memory. Additionally, aprocessor can refer to an integrated circuit, an application specificintegrated circuit (ASIC), a digital signal processor (DSP), a fieldprogrammable gate array (FPGA), a programmable logic controller (PLC), acomplex programmable logic device (CPLD), a discrete gate or transistorlogic, discrete hardware components or any combination thereof designedto perform the functions described herein. Processors can exploitnano-scale architectures such as, but not limited to, molecular andquantum-dot based transistors, switches and gates, in order to optimizespace usage or enhance performance of user equipment. A processor canalso be implemented as a combination of computing processing units.

As used herein, terms such as “data storage,” data storage,” “database,”and substantially any other information storage component relevant tooperation and functionality of a component, refer to “memorycomponents,” or entities embodied in a “memory” or components comprisingthe memory. It will be appreciated that the memory components orcomputer-readable storage media, described herein can be either volatilememory or nonvolatile memory or can include both volatile andnonvolatile memory.

What has been described above includes mere examples of variousembodiments. It is, of course, not possible to describe everyconceivable combination of components or methodologies for purposes ofdescribing these examples, but one of ordinary skill in the art canrecognize that many further combinations and permutations of the presentembodiments are possible. Accordingly, the embodiments disclosed and/orclaimed herein are intended to embrace all such alterations,modifications and variations that fall within the spirit and scope ofthe appended claims. Furthermore, to the extent that the term “includes”is used in either the detailed description or the claims, such term isintended to be inclusive in a manner similar to the term “comprising” as“comprising” is interpreted when employed as a transitional word in aclaim.

In addition, a flow diagram may include a “start” and/or “continue”indication. The “start” and “continue” indications reflect that thesteps presented can optionally be incorporated in or otherwise used inconjunction with other routines. In this context, “start” indicates thebeginning of the first step presented and may be preceded by otheractivities not specifically shown. Further, the “continue” indicationreflects that the steps presented may be performed multiple times and/ormay be succeeded by other activities not specifically shown. Further,while a flow diagram indicates a particular ordering of steps, otherorderings are likewise possible provided that the principles ofcausality are maintained.

As may also be used herein, the term(s) “operably coupled to,” “coupledto,” and/or “coupling” includes direct coupling between items and/orindirect coupling between items via one or more intervening items. Suchitems and intervening items include, but are not limited to, junctions,communication paths, components, circuit elements, circuits, functionalblocks, and/or devices. As an example of indirect coupling, a signalconveyed from a first item to a second item may be modified by one ormore intervening items by modifying the form, nature or format ofinformation in a signal, while one or more elements of the informationin the signal are nevertheless conveyed in a manner than can berecognized by the second item. In a further example of indirectcoupling, an action in a first item can cause a reaction on the seconditem, as a result of actions and/or reactions in one or more interveningitems.

Although specific embodiments have been illustrated and describedherein, it should be appreciated that any arrangement which achieves thesame or similar purpose may be substituted for the embodiments describedor shown by the subject disclosure. The subject disclosure is intendedto cover any and all adaptations or variations of various embodiments.Combinations of the above embodiments, and other embodiments notspecifically described herein, can be used in the subject disclosure.For instance, one or more features from one or more embodiments can becombined with one or more features of one or more other embodiments. Inone or more embodiments, features that are positively recited can alsobe negatively recited and excluded from the embodiment with or withoutreplacement by another structural and/or functional feature. The stepsor functions described with respect to the embodiments of the subjectdisclosure can be performed in any order. The steps or functionsdescribed with respect to the embodiments of the subject disclosure canbe performed alone or in combination with other steps or functions ofthe subject disclosure, as well as from other embodiments or from othersteps that have not been described in the subject disclosure. Further,more than or less than all of the features described with respect to anembodiment can also be utilized.

What is claimed is:
 1. A system, comprising: a processing systemincluding a processor; and a memory that stores executable instructionsthat, when executed by the processing system, facilitate performance ofoperations, the operations comprising: forwarding a segment list to aplurality of equipment of a targeted group of users comprising a firstgroup of users and a second group of users, wherein the segment listidentifies a set of file segments associated with a file; identifying adeficiency in delivery of a particular file segment of the set of filesegments to the plurality of equipment of the targeted group of usersaccording to the segment list; and providing, responsive to theidentifying of the deficiency, the particular file segment to firstequipment of the equipment of the first group of users wirelessly via alicensed frequency spectrum, wherein the first equipment and a secondequipment of the equipment of the second group of users are selected toengage in an exchange of the particular file segment from the firstequipment to the second equipment, via an unlicensed frequency spectrumand according to a peer-to-peer (P2P) file sharing process, based onanticipated proximity of the first equipment and the second equipmentduring the exchange, wherein the providing of the particular filesegment to the first equipment is based on identifying the firstequipment for receiving the particular file segment in accordance with:an identification of a type of the first equipment, a size of the file,an indication of a first geographic location of the first equipment, aquality associated with a wireless link to the first equipment, and anindication that the first equipment is not stationary.
 2. The system ofclaim 1, further wherein the operations further comprise: disaggregatingthe file to obtain the set of file segments.
 3. The system of claim 1,wherein the file is regenerated according to a recombination of the setof file segments.
 4. The system of claim 1, wherein at least some filesegments of the set of file segments are transported to the plurality ofequipment of the targeted group of users via the unlicensed frequencyspectrum and according to the P2P file sharing process.
 5. The system ofclaim 1, wherein the operations further comprise: facilitating a secureexchange of the file segments to the plurality of equipment of thetargeted group of users.
 6. The system of claim 5, wherein thefacilitating of the secure exchange of the file segments to theplurality of equipment of the targeted group of users further comprisesapplying a hash function, a blockchain, encryption, or a combinationthereof.
 7. The system of claim 5, wherein the facilitating of thesecure exchange of the file segments further comprises providingsecurity material to the plurality of equipment of the targeted group ofusers, and wherein a confirmation of the secure exchange is based on thesecurity material.
 8. The system of claim 7, wherein the securitymaterial comprises a checksum, a hash value, an encryption key, or acombination thereof.
 9. The system of claim 1, wherein the operationsfurther comprise: analyzing manifest records for the plurality ofequipment of the targeted group of users, wherein the manifest recordsidentify, for equipment of each targeted user of the targeted group ofusers, those file segments delivered to the equipment of each targeteduser of the targeted group of users.
 10. The system of claim 1, whereinthe first equipment is configured to receive a first report from thesecond equipment that indicates that the second equipment is missing theparticular file segment, and wherein the first equipment is configuredto engage in the exchange of the particular file segment based on thefirst equipment determining that the second equipment is missing theparticular file segment in accordance with the first report.
 11. Thesystem of claim 10, wherein the particular file segment corresponds to afirst file segment of the set of file segments, wherein the firstequipment is configured to transmit a second report that indicates thatthe first equipment is missing a second file segment of the set of filesegments, and wherein the first equipment is configured to receive thesecond file segment in accordance with the second report.
 12. The systemof claim 1, wherein the first equipment is configured to engage in theexchange of the particular file segment from the first equipment to thesecond equipment based on an identification of a channel quality betweenthe first equipment and the second equipment.
 13. The system of claim 1,wherein the providing of the particular file segment to the firstequipment is based on identifying the first equipment for receiving theparticular file segment further in accordance with: an identification ofa timing requirement associated with a priority for distributing thefile.
 14. A method, comprising: identifying, by a processing systemincluding a processor, according to a segment list, a deficiency indelivery of a particular file segment of a set of file segmentsassociated with a file to a plurality of equipment of a targeted groupof users; and providing, by the processing system, responsive to thedeficiency, the particular file segment to first equipment of theequipment of a first group of users of the targeted group of users,wherein the first equipment and a second equipment of the equipment of asecond group of users of the targeted group of users are selected toengage in an exchange of the particular file segment from the firstequipment to the second equipment, via an unlicensed frequency spectrumand according to a peer-to-peer (P2P) file sharing process, based onanticipated proximity of the first equipment and the second equipmentduring the exchange, wherein the providing of the particular filesegment to the first equipment is based on identifying the firstequipment for receiving the particular file segment in accordance with:an identification of a type of the first equipment, a size of the file,an indication of a first geographic location of the first equipment, aquality associated with a wireless link to the first equipment, and anindication that the first equipment is mobile.
 15. The method of claim14, further comprising; facilitating, by the processing system, a secureexchange of the file segments to the plurality of equipment of thetargeted group of users.
 16. The method of claim 15, wherein thefacilitating of the secure exchange of the file segments comprisesproviding, by the processing system, security material to the pluralityof equipment of the targeted group of users, wherein a confirmation ofthe secure exchange is based on the security material.
 17. The method ofclaim 16, wherein the facilitating of the secure exchange of the filesegments to the plurality of equipment of the targeted group of usersfurther comprises applying one of a hash function, a blockchain,encryption, or a combination thereof.
 18. The method of claim 14,further comprising: facilitating, by the processing system, a secureexchange of the file segments to the plurality of equipment of thetargeted group of users by applying a hash function, a blockchain,encryption, or a combination thereof.
 19. A non-transitorymachine-readable medium, comprising executable instructions that, whenexecuted by a processing system including a processor, facilitateperformance of operations at first equipment, the operations comprising:receiving a segment list identifying a set of file segments associatedwith a file; receiving, wirelessly via a licensed frequency spectrum, aparticular file segment of the set of file segments associated with thefile; and transmitting the particular file segment to second equipment,via an unlicensed frequency spectrum and according to a peer-to-peer(P2P) file sharing process, based on anticipated proximity with thesecond equipment during the transmitting, wherein the first equipment isselected for receiving the particular file segment in accordance with:an identification of a type of the first equipment, a size of the file,and an indication that the first equipment is moving faster than a thirdequipment participating in the P2P file sharing process.
 20. Thenon-transitory machine-readable medium of claim 19, wherein the file isregenerated according to a recombination of the set of file segments.