A method for enabling recovery of data stored in a computer network, the computer network comprises a plurality of computer nodes, the method comprising the steps of generating a set of redundancy data based on a predetermined relationship between a first set of data and a second set of data, injecting the first set of data, the second set of data and the set of redundancy data into separate looping paths of the computer network, wherein a looping path is a path along a plurality of computer nodes in which data is transported, and the looping paths are defined in separate communication channels between the computer nodes and pass through at least one common node of the computer network, such that the redundancy data and the second set of data can be used to reconstruct the first set of data based on the predetermined relationship between the first and second set of data when the first set of data is lost, thereby enabling the recovery of data stored in the computer network.

 
Web www.patentalert.com

> Methods, systems and computer program products for detecting a spoofed source address in IP datagrams

~ 00356