So users can assign concise, meaningful names UIA interprets personal names relative to personal groups, To ensure constant availability on each deviceĪnd can propagate updates via mobile devices Present the user with a shared personal namespace, Secure remote access to any device in the group from any other. To connect their mobile personal devices via convenient personal namesĪ user can merge multiple UIA devices to form a personal group,Īfter which the devices work together to offer That gives nontechnical users a simple and intuitive way Is a peer-to-peer connectivity architecture User interface refinements alone cannot overcome this deployment roadblock,ĭepend on centralized resources-global domain names and static, public “home” IP addresses-that are not part of most consumer-oriented Internet service packages. With dedicated network administration staff. Makes them deployable only by organizations Users must register with central naming authorities to obtain global names,Īnd mobile personal devices usually have dynamic IP addressesīehind firewalls or network address translators .īut the configuration effort and technical expertise they require To have both a global name and a static, public IP address. To be easily reachable by his friends wherever he and they are located,īut not to be reachable by telemarketers.Ĭonvenient global communication over the Internet, Without the risk of a third party intercepting the connection.Ī Voice-over-IP user would like his WiMax phone Over the Internet after returning to their homes, Two users who meet in a park or other off-Internet locationĪnd later re-establish a connection between the same devices
#TRIBLER CURRENT PORT PC#
To his PC at home for storage and backup.
May wish to copy photos from his WiFi-enabled camera Makes secure global peer-to-peer connectivity between them To share resources with trusted acquaintances.ĭevices with naming relationships automatically arrange connectivity whenĪnd using global infrastructure when available.Ī UIA prototype demonstrates these capabilitiesĪnd a routing algorithm exploiting the user's social networkĪre becoming ubiquitous in the lives of ordinary people. Names bind securely to the global identities of their target devices Users assign personal names through an ad hoc device introduction process Provides zero-configuration connectivity among mobile devices