Information Technology Reference
In-Depth Information
Distributor 1
(Original information)
User 1
Router
Distributor 3
(Second use)
Original
contents 1
Original
contents 1
Secondary
contents
Distributor 2
(Original information)
Router
Original
contents 2
Original
contents 2
Secondary
contents
Router
Initial and Upload Routing
User 2
Downlink Routing
Fig. 12.4 Secondary use and anonymous communication
Downlink message is data or message transmitted from Agent to Distributor .
This message is used for checking the content certification when Agent cannot
independently certify it.
12.5.3 Basic Concept
We introduce the trace matrix. It is the n dimensions matrix M 1 for each port of I .
Each dimension A i has 2 m elements. The content occupies several points ( l points) in
the matrix. The content has unique identification number that consists of l
n
bits. An example of the trace matrix with three dimensions is shown in Fig. 12.5 .
These traces will be checked when the connection between Distributor and
Agent is established. Next, if Router finds the trace of contents, the next hop is
selected from the ports which have the trace.
m
12.5.3.1
Initial Routing
This stage is used for the distribution and the transfer of the contents.
1. A Distributor or a User sends Capsule to another User .
2. A Router marks up the trace which represented as points on matrix M 1 . These
points are called as Trace set .
3. The Capsule is forwarded based on the conventional method with IP address or
some ID numbers.
Search WWH ::




Custom Search