Abstract: Methods, apparatuses and systems enabling real-time analysis of coverage and other performance attributes of distributed or networked systems, such as wireless computer network environments. In one embodiment, the present invention utilizes information obtained from monitoring wireless communications in a wireless network system from remote client elements to access elements in relation to at least one attribute, such as signal strength and signal-to-noise ratio (SNR). Although the present invention has application to a variety of wireless network architectures, in one embodiment, the present invention is implemented in a wireless Local Area Network (WLAN) system having a hierarchical architecture comprising a central control element associated with at least one access element.
Type:
Grant
Filed:
April 4, 2003
Date of Patent:
November 27, 2007
Assignee:
Airespace, Inc.
Inventors:
Paul F. Dietrich, Robert J. Friday, Robert B. O'Hara, Jr.
Abstract: Methods, apparatuses and systems facilitating deployment, configuration and maintenance of web services networks. The present invention features a distributed web services network architecture that, in one embodiment, leverages the functionality of existing network infrastructure to provide a low cost, efficient and reliable web services solution. The web services network architecture according to the present invention can be implemented across any suitable computer network, including an intranet or the Internet.
Abstract: Methods, apparatuses and systems allowing for bandwidth management schemes responsive to utilization characteristics associated with individual users. In one embodiment, the present invention allows network administrators to penalize users who carry out specific questionable or suspicious activities, such as the use of proxy tunnels to disguise the true nature of the data flows in order to evade classification and control by bandwidth management devices. In one embodiment, each individual user may be accorded an initial suspicion score. Each time the user is associated with a questionable or suspicious activity (for example, detecting the set up of a connection to an outside HTTP tunnel, or peer-to-peer application flow), his or her suspicion score is downgraded. Data flows corresponding to users with sufficiently low suspicion scores, in one embodiment, can be treated in a different manner from data flows associated with other users.
Abstract: A tape drive head cleaner has a brush that is driven to sweep over a write/read head in the direction of longitudinal grooves on the write/read head. Debris that are within the grooves are swept out of the grooves by the movement of the brush in the direction of the grooves. The brush is carried by a tape drive head cleaner mechanism that includes a lead screw driven by a stepper motor that engages the half nut attached to a brush carriage that carries the brush. The brush carriage is guided by fixed guide shafts so that the brush is precisely swept over the write/read head.
Abstract: Methods apparatuses and systems allowing for an examination of the runtime performance and efficiency of traffic classification configuration associated with bandwidth management and other network devices including network traffic classification functionality. Embodiments of the present invention are operative to identify possible changes to the current traffic classification configurations that improve performance efficiency.
Abstract: Methods, apparatuses and systems directed to refreshing signal information in an infrastructure wireless node location mechanism. The wireless node location mechanism selectively terminates connections with wireless clients to refresh signal strength information used to compute an estimated location for the wireless clients. The wireless node location mechanism terminates the connection between a WLAN and a given wireless node, causing in typical WLAN protocol implementations, the mobile station to transmit frames or packets on all available operating channels in a given band. This allows access points and other WLAN elements, operating on different frequency channels, to detect frames transmitted by the mobile station and provide refreshed signal strength information to a wireless node location mechanism.
Abstract: A wireless node location mechanism that employs a differential signal strength metric to reduce the errors caused by variations in wireless node transmit power, errors in signal strength detection, and/or direction-dependent path loss. As opposed to using the absolute signal strength or power of an RF signal transmitted by a wireless node, implementations of the location mechanism compare the differences between signal strength values detected at various pairs of radio receivers to corresponding differences characterized in a model of the RF environment. One implementation searches for the locations in the model between each pair of radio receivers where their signal strength is different by an observed amount.
Abstract: A distributed network is provided with mobile user devices, a virtual “Virtual Private Network” (VPN) server, and a plurality of physical VPN servers, wherein the virtual VPN server allows all mobile user devices to be configured with a single VPN server address, namely that of the virtual VPN server. The plurality of physical VPM servers all recognize and intercept network traffic sent to the virtual VPN server address, so that traffic can be distributed throughout the network. Specifically, each real VPN server responds to network traffic sent by a mobile user device to the address of the virtual VPN server and communicates with the mobile user device using the virtual VPN server address in preference to the individually assigned address of the real VPN server.
Abstract: A method and system for controlling network traffic with different tags within the same connection by applying policies for each tag are disclosed. A method is disclosed in which incoming traffic is received. A traffic class is assigned to the incoming traffic. A policy is assigned to the incoming traffic based on the assigned traffic class. Outgoing traffic is controlled based on the assigned policy for the incoming traffic.
Type:
Grant
Filed:
March 15, 2002
Date of Patent:
October 16, 2007
Assignee:
Packeteer, Inc.
Inventors:
Mark Hill, Brett Galloway, Anne Cesa Klein
Abstract: In a disclosed method that facilitates collaborative file updating, data is accepted from one of a plurality of users and stored. The data represents an initial version of the file and designates one or more recipients of the initial version. Then, for each one of sequentially updated versions of the file, data representing a difference between the updated version of the file and an immediately previous version of the file is accepted from a user. The data also designates one or more recipients of the updated version. Data representative of the updated version of the file is transmitted to the designated recipients of the updated version. The data transmitted to each recipient who is designated as a recipient of the updated version and who accessed the immediately previous version consists substantially of the difference between the updated and previous versions of the file. Other methods and systems are disclosed.
Abstract: A method and apparatus is provided to protect head elements on a head of a head guide assembly, having a magnetic tape, and a leader coupled to the magnetic tape at a first end, such that the height of the leader is less than the height of the magnetic tape.
Type:
Grant
Filed:
March 17, 2005
Date of Patent:
September 25, 2007
Assignee:
Certance LLC
Inventors:
John Anthony Hamming, Robert Ralph Heinze, Umang Mehta
Abstract: Methods, apparatuses, and systems allowing for configuration of message logging policy on a granular basis for web services networks. In certain embodiments, the present invention allows for an efficient data logging scheme where only messages, or message elements, of interest are stored. According to one embodiment of the present invention, the fabric services associated with the web services network architecture supports different instances of a logging service to which message data are logged. For example, the logging service instances can be configured to log only header information (header logging instance), only payload information (payload logging instance), or entire messages (message logging instance). The web services network control points can be configured to flag messages transmitted to a logging node with a logging service type, which determines which logging service instance operates on the message.
Abstract: Methods, apparatuses and systems relating to the control and application of policies for routing data over a computer network, such as the Internet. Some implementations of the invention facilitate the configuration, deployment and/or maintenance of network routing policies. Some implementations of the invention are particularly useful for controlling the routing of data among autonomous systems or organizations. Certain implementations allow for dynamic modification of routing policy based on such factors as current Internet performance, load sharing, user-defined parameters, and time of day. In one embodiment, the present invention provides methods, apparatuses and systems implementing enhanced network path testing methodologies that enhance the efficiency of processes associated with testing of a network path, while reducing the perceived intrusiveness of test packets associated with such metrics tests.
Abstract: A wireless node RF Fingerprinting location mechanism that uses multiple antenna patterns to enhance the accuracy of wireless node location in an RF environment. In one implementation, substantially non-overlapping antenna pattern diversity is used to provide a degree of sectorization in computing the estimated location of a wireless node.
Abstract: Methods, apparatuses and systems directed to securing a wireless network environment from eavesdropping and other unauthorized activities. One implementation prevents or disrupts meaningful access to information contained in WLAN RF signals that escape from a given physical space during operation of the wireless network. One implementation utilizes overlay RF signals transmitted on one or more operating channels of the WLAN to overpower or mask the internal RF signals escaping from a defined security line or perimeter. One implementation monitors the RF energy escaping to dynamically adjust the power of the overlay signal as required. Implementations of the invention can secure the outer perimeter of an office within a building, or even the outer perimeter of an entire building.
Abstract: A magnetic/encoder assembly has a compact design and combines the features of motor, encoder and chuck locating feature within a single motor housing. The motor/encoder includes a DC brushless motor with an inner magnetic rotor. The motor windings and the commutation electronics are mounted towards the bottom side of a printed circuit board. The rotor of the motor is extended above the surface of the printed circuit board. The extended rotor provides a precision seat for the magnetic wheel with multiple poles. The top surface of the printed circuit board mounts the sensor for the encoder. The extension of the rotor provides the precision mounting surface of the cartridge driving chuck.
Abstract: A magnetic/encoder assembly has a compact design and combines the features of motor, encoder and chuck locating feature within a single motor housing. The motor/encoder includes a DC brushless motor with an inner magnetic rotor. The motor windings and the commutation electronics are mounted towards the bottom side of a printed circuit board. The rotor of the motor is extended above the surface of the printed circuit board. The extended rotor provides a precision seat for the magnetic wheel with multiple poles. The top surface of the printed circuit board mounts the sensor for the encoder. The extension of the rotor provides the precision mounting surface of the cartridge driving chuck.
Abstract: Methods, apparatuses, and systems enabling an interactive information retrieval system that includes a user interface allowing users to graphically generate information queries for objects of interest found in various media, such as television, video, and print. The invention can allow users to designate objects of interest within a television or video display and receive information related to the objects of interest. The invention can also allow users to generate queries designating objects of interest within a graphical image using a GUI.
Type:
Grant
Filed:
September 24, 2003
Date of Patent:
July 3, 2007
Assignee:
Exphand, Inc.
Inventors:
Frank Robert Nemirofsky, Larry A. Lincoln
Abstract: A process simulation system that simulates the operation of the manufacturing and measurement systems used to produce and measure the articles being analyzed relative to engineering design targets, engineering design tolerances, producibility and/or quality. In one embodiment, the user is able to assess, without risk or production cost while accelerating speed-to-market, the effect of contemplated changes (i.) to engineering design targets, (ii.) to engineering design tolerances, (iii.) to tooling, (iv.) to part pre-process dimensions and (v.) to the measurement system—on manufactured part dimensions, producibility and quality (i.) without modifying tooling, (ii.) without changing part pre-process dimensions, (iii.) without producing new parts, (iv.) without measuring article characteristics on the new parts and (v.) without changing the measurement system.
Abstract: Packet flow rate control techniques are enhanced by the interactive and early invocation of packet queuing to control short flows of packets and to eliminate undershoot and overshoot of a targeted flow rate. Packet queuing involves the scheduled release of packets in accordance with flow policies (priorities) to achieve a preselected outgoing target flow rate. The combination of controlled packet queuing and packet flow rate control with appropriate mechanisms for favoring one over the other improves the efficiency of data transmission.
Type:
Grant
Filed:
May 6, 2002
Date of Patent:
June 26, 2007
Assignee:
Packeteer, Inc.
Inventors:
Jon Eric Okholm, Saurabh Aggarwal, Michael J. Quinn