Patents Assigned to Level 3 Communication, LLC
-
Publication number: 20220030059Abstract: Examples described herein relate to apparatuses and methods for a node of a network to facilitate communication among two or more clients, including but not limited to determining, by the node, that the two or more clients are connected to the node for accessing data originating from an origin server, receiving, by the node, a message from a first client of the two or more clients, the message is to be routed to at least one second client of the two or more clients, and sending, by the node, the message to the at least one second client without routing the message to the origin server.Type: ApplicationFiled: October 5, 2021Publication date: January 27, 2022Applicant: Level 3 Communications, LLCInventor: Christopher Newton
-
Publication number: 20220030336Abstract: Implementations described and claimed herein provide systems and methods for a configurable optical peering fabric to dynamically create a connection between participant sites without any physical site limitations or necessity of specialized client and network provider equipment being located within such a facility. Client sites to a network may connect to a configurable switching element to be interconnected to other client sites in response to a request to connect the first client site with a second site, also connected to network, via the switching element. A request may trigger verification of the requested and, upon validation, transmission of an instruction to the switching element to enable the cross connect within the switching element. The first site and the second site may thus be interconnected via the switching element in response to the request, without the need to co-locate equipment or to manually install a jumper between client equipment.Type: ApplicationFiled: October 8, 2021Publication date: January 27, 2022Applicant: Level 3 Communications, LLCInventors: Laurel Clark, Clyde David Cooper, III, Andrew Dugan
-
Publication number: 20220029953Abstract: A computer-implemented method in a content delivery network (CDN), wherein the CDN delivers content on behalf of at least one content provider. The CDN includes a rendezvous system that selects CDN servers for clients. In response to a request by a rendezvous mechanism in the rendezvous system, a first given function is evaluated. Based on the outcome of the evaluating, the rendezvous mechanism uses either a first table or a second table. The first table was generated by a first table generation mechanism for use by said rendezvous mechanism to select CDN servers for clients, and the second table was generated by a second table generation mechanism for use by the rendezvous mechanism to select CDN servers for clients.Type: ApplicationFiled: October 5, 2021Publication date: January 27, 2022Applicant: Level 3 Communications, LLCInventors: Christopher Newton, Hong Zhu
-
Publication number: 20220030297Abstract: Examples described herein relate to apparatuses and methods for managing caching for a content delivery system, which may include receiving a content request indicating that the caching agent is requesting content data for a client, filling the content data in a first cache storage of the business logic agent, providing the cached content data to the caching agent, and while a second cache storage of the caching agent is being filled with the content data, maintaining the cached content data in response to receiving additional content requests from the caching agent. The additional content requests may indicate that the caching agent is requesting the same content data for additional clients.Type: ApplicationFiled: October 5, 2021Publication date: January 27, 2022Applicant: Level 3 Communications, LLCInventor: William Crowder
-
Publication number: 20220030034Abstract: A secure network device management system and method include monitoring and validating commands to network devices before such commands are executed. The security system accumulates inputs from a network device intended for display on a terminal and provided by the network device in response to inputs from the terminal and received by the network device. When a control input to execute the command is received from the terminal, the security system reproduces the command from the accumulated inputs and compares the reproduced command to a command list to determine whether the command is authorized. If so, the security system provides the control input to the network device such that the network device executes the command. Otherwise, the security system may delete the command and transmit an alert to the terminal.Type: ApplicationFiled: October 8, 2021Publication date: January 27, 2022Applicant: Level 3 Communications, LLCInventors: Thomas D. Hutchinson, Scott Galvin
-
Patent number: 11233728Abstract: Aspects of the present disclosure involve systems, methods, computer program products, and the like, for utilizing a CIC value field in signaling information of a communication to provide an identification of the ingress network to an egress or receiving network of a long distance telecommunications network. The system and method provides for the provisioning of a signaling CIC for an ingress trunkgroup or network to a telecommunications network for downstream signaling purposes by overriding a received CIC value with a provisioned CIC value specific to the ingress network. This provisioned CIC value identifies the ingress network to the long distance network to the egress network for use by the egress network.Type: GrantFiled: December 20, 2016Date of Patent: January 25, 2022Assignee: Level 3 Communications, LLCInventor: David A. Tschirhart
-
Patent number: 11233740Abstract: Aspects of the present disclosure involve systems, methods, computer program products, and the like, for controlling a congestion window (CWND) value of a communication session of a CDN. In particular, a content server may analyze a request to determine or receive an indication of the type of content being requested. The content server may then set the initial CWND based on the type of content being requested. For example, the content server may set a relatively high CWND value for requested content that is not particularly large, such as image files or text, so that the data of the content is received at the client device quickly. For larger files or files that a have a determined smaller urgency, the initial CWND may be set at a lower value to ensure that providing the data of the content does not congest the link between the devices.Type: GrantFiled: March 10, 2021Date of Patent: January 25, 2022Assignee: Level 3 Communications, LLCInventor: Joelle T. Maslak
-
Patent number: 11228404Abstract: Systems, methods, and storage media for detecting a security intrusion of a network device are disclosed. Exemplary implementations may include a method involving, in the network device including a processor, monitor a light signal associated with a security enabled port of the network device; and in response to detecting a change in the light signal, initiate a security alert.Type: GrantFiled: September 25, 2019Date of Patent: January 18, 2022Assignee: Level 3 Communications, LLCInventors: Steven E. Drake, Morgan M. Pofahl
-
Publication number: 20220014437Abstract: Systems and methods for managing network devices include performing clustering operations for network devices based on attributes of the network devices. By comparing the results of subsequent clustering operations, changes in network device attributes can be readily identified and any network devices for which attributes have changed may be subject to further investigation or remedial action (e.g., blocking traffic to/from the network device). Clustering may also be used to conduct an inventory of network devices by identifying groups of network devices that have similar attributes.Type: ApplicationFiled: September 27, 2021Publication date: January 13, 2022Applicant: Level 3 Communications, LLCInventor: Michael Benjamin
-
Publication number: 20220014629Abstract: Aspects of the present disclosure involve systems and methods for a collaboration conferencing system to track a total number of concurrently utilized ports across any number of conferencing bridges of the network for a particular customer and one or more billing actions may occur based on this tracking. This may result in an alternate billing option for the customer's use of the system. Further, a telecommunications network administrator may provide access to the collaboration conferencing system based on a total number of concurrently utilized ports rather than on a per conference or per minute basis. With the information of the number of purchased ports by the customer, the administrator may more accurately predict an available capacity for the collaboration conferencing system needed to support all of the users of the system and the potential collaboration conferences.Type: ApplicationFiled: September 27, 2021Publication date: January 13, 2022Applicant: Level 3 Communications, LLCInventors: Andrew J. Broadworth, Robert F. Nance, Gregory T. Ellison
-
Publication number: 20220006861Abstract: Disclosed herein are system, method, and computer program product embodiments for providing an API description of an external network service and using the API to integrate the external service into a network. An embodiment operates by receiving, from a service provider, a description of an application programming interface (API), transmitting a call to the service provider using the API for creating a new instance of a service and transmitting to the service provider a traffic flow upon which the service will be applied.Type: ApplicationFiled: September 21, 2021Publication date: January 6, 2022Applicant: Level 3 Communications, LLCInventor: William Sella
-
Publication number: 20220006759Abstract: A computer-implemented method on a device. The device has hardware including storage. The method includes obtaining log event data from at least one component or service on the device that is to be delivered to a component or service on a distinct device. Each log event data item has a priority. If a connection to an external location is lost, at least some of the log event data items are selectively stored in the storage, wherein the storing is based on priority of the log event data items. Otherwise, if the connection is not lost, at least some of the log event data items are sent to the at least one external location.Type: ApplicationFiled: September 21, 2021Publication date: January 6, 2022Applicant: Level 3 Communications, LLCInventor: Christopher Newton
-
Patent number: 11218566Abstract: A content delivery network (CDN) includes a plurality of CDN components including at least one CDN rendezvous mechanism and at least one control core. The CDN components are controlled by control core data from the at least one control core. Some CDN components obtain CDN resources including control core data from at least some other CDN components. The CDN components use the CDN rendezvous mechanism to select one or more CDN components from which to obtain CDN resources.Type: GrantFiled: November 11, 2020Date of Patent: January 4, 2022Assignee: Level 3 Communications, LLCInventors: Laurence R. Lipstone, William Crowder, Jeffrey G. Koller, David Fullagar, Maksim Yevmenkin, Christopher Newton
-
Publication number: 20210409273Abstract: Systems, methods, and non-transitory computer-readable storage media which have instructions stored for execution on a processor, for automating the commissioning of a transport network element within a network. A system configured according to this disclosure can be an Automated Commissioning Tool which can initiate communications with a network element on the network. The Automated Commissioning Tool can then retrieve updated firmware corresponding to the network element and configure the network element to have the updated firmware. Finally, the Automated Commissioning Tool can determine, from a network plan, a first port on the network element which is to be connected via a cross-connect to a second port on the network element and establish the cross-connect on the network element. At this point the network element may be commissioned to operate as a transport network element within the network.Type: ApplicationFiled: September 13, 2021Publication date: December 30, 2021Applicant: Level 3 Communications, LLCInventors: Bernie C. Lehman, Erik W. McLeod
-
Patent number: 11206289Abstract: Novel tools and techniques are provided for implementing monitoring and detection of fraudulent or unauthorized use in telephone conferencing systems or voice networks. In various embodiments, a computing system might monitor call activity through telephone conferencing system or voice network. In response to detecting use of the telephone conferencing system or voice network by at least one party based on the monitored call activity, the computing system might identify incoming and/or outgoing associated with a call initiated by the at least one party. The computing system might analyze the identified incoming and/or outgoing call data to determine whether the call initiated by the at least one party constitutes at least one of fraudulent use or unauthorized use of the telephone conferencing system or voice network. If so, the computing system might initiate one or more first actions.Type: GrantFiled: October 14, 2019Date of Patent: December 21, 2021Assignee: Level 3 Communications, LLCInventors: Adam Uzelac, Andrew J. Broadworth, Robert P. Slaughter
-
Patent number: 11206203Abstract: Embodiments generally disclosed herein include a computer-implemented method for monitoring and correlating network traffic data associated with a primary network that is in communication with a plurality of secondary networks. The method generates a network traffic data set by monitoring network traffic between the primary network and the plurality of secondary networks. The method also determines a mapping of network connectivity by monitoring inter-network routing information between the primary network and the plurality of secondary networks. In addition, the method generates a traffic measurement data set by monitoring network utilization statistics between the primary network and the plurality of secondary networks. With the collected data sets, the method then calculates a relational network mapping between the primary network and the plurality of secondary networks by correlating the network traffic data set, the mapping of network connectivity, and the traffic measurement data set.Type: GrantFiled: March 1, 2021Date of Patent: December 21, 2021Assignee: Level 3 Communications, LLCInventors: John Kane, Joseph Lawrence, Maria Farnon, Rick Nooner, Raoul Alcala, Mark Taylor
-
Patent number: 11206211Abstract: Systems and methods for routing traffic through a network along Label-Switched Paths (LSPs) that may extend across multiple autonomous systems include performing Internet Protocol (IP) routing lookups as a packet is transmitted along the LSP. In one implementation, a packet having a predetermined value (which may be inserted by an upstream network device) is received at a network device after travelling along a first segment of an LSP. In response to identifying the predetermined label value of the packet, the network device may perform an IP routing lookup using IP routing information included in the packet to identify a next hop for the packet. The network device may then update a label of the packet such that the packet is routed along a second segment of the LSP and transmit the communication packet to the next hop.Type: GrantFiled: April 29, 2020Date of Patent: December 21, 2021Assignee: Level 3 Communications, LLCInventor: Eric Osborne
-
Publication number: 20210392202Abstract: Examples of the present disclosure relate to artificial intelligence log processing and CDN optimization. In examples, log data is processed at a node of the CDN rather than transmitting all of the log data for remote processing. The log data may be processed by a model processing engine according to a model, thereby generating model processing results. Model processing results are communicated to a parent node, thereby providing insight into the state of the node without requiring transmission of the full set of log data. Model processing results and associated information may be used to alter the configuration of the CDN. For example, a model processing engine may be added or removed from a node based on a forecasted amount of log data. As another example, edge servers of a node may be added or removed based on expected computing demand.Type: ApplicationFiled: June 8, 2021Publication date: December 16, 2021Applicant: Level 3 Communications, LLCInventors: William R. Henning, Steven M. Casey, Todd A. Borchert
-
Publication number: 20210382537Abstract: Methods and systems for reducing energy consumption. A method may include aggregating, for a prior time period, prior usage data from a plurality of computing nodes. Based on the aggregated prior usage data from the plurality of computing nodes, a usage threshold for decreasing cooling system output for the plurality of computing nodes and a local-time threshold for decreasing the cooling system output for the plurality of computing nodes are determined. Current usage data for the plurality of computing nodes is then received. When the current usage data reaches the usage threshold and the local time is after the local-time threshold, output of the cooling systems of the plurality of computing nodes is decreased.Type: ApplicationFiled: May 28, 2021Publication date: December 9, 2021Applicant: Level 3 Communications, LLCInventors: Matthew Flynn, Jason Huselton, Paul Brannigan
-
Publication number: 20210385240Abstract: In an embodiment, a computer implemented method receives flow data for a network flows. The method extracts a tuple from the flow data and calculates long-term and short-term trends based at least in part on the tuple. The long-term and short-term trends are compared to determine whether a potential network anomaly exists. If a potential network anomaly does exist, the method initiates a heavy hitter detection algorithm. The method forms a low-complexity intermediate stage of processing that enables a high-complexity heavy hitter detection algorithm to execute when heavy hitters are likely to be detected.Type: ApplicationFiled: August 23, 2021Publication date: December 9, 2021Applicant: Level 3 Communications, LLCInventor: Sergey Yermakov