Patents Assigned to Level 3 Communication, LLC
-
Publication number: 20200099445Abstract: Systems, methods, and devices are disclosed for monitoring optical communications between a managed location and a remote location. In particular, an optical signal is transmitted over an optical fiber and passed-through a test device. A portion of the optical signal is filtered from the original optical signal and passed to a monitoring unit. The monitoring unit may instruct one or more switches in the test device to loop the optical signal back toward the managed location. Subsequently, testing and monitoring may be performed at the managed location. The device may provide a test output or may transmit the information to the managed location.Type: ApplicationFiled: September 25, 2018Publication date: March 26, 2020Applicant: Level 3 Communications, LLCInventors: Jeffrey K. Storey, John F. Waters, Andrew Dugan, Salvador Paredes, Gary Ratterree
-
Patent number: 10601770Abstract: Aspects of the present disclosure involve systems, methods, computer program products, and the like, for correlating information associated with one networking transmission protocol, such as Internet Protocol version 6 (IPv6), to information associated with a different networking transmission protocol, such as Internet Protocol version 6 (IPv4). More specifically, when resolving an Internet Protocol (IP) address associated with a requesting device to a network, the system may base the resolved destination on one or more attributes of a known address to build a network mapping of the received IP address. In one specific example, an IPv6 address is received and associated with a known IPv4 address to map the network.Type: GrantFiled: March 11, 2019Date of Patent: March 24, 2020Assignee: Level 3 Communications, LLCInventor: Joelle T. Maslak
-
Patent number: 10601849Abstract: In an embodiment, a computer implemented method receives flow data for a network flows. The method extracts a tuple from the flow data and calculates long-term and short-term trends based at least in part on the tuple. The long-term and short-term trends are compared to determine whether a potential network anomaly exists. If a potential network anomaly does exist, the method initiates a heavy hitter detection algorithm. The method forms a low-complexity intermediate stage of processing that enables a high-complexity heavy hitter detection algorithm to execute when heavy hitters are likely to be detected.Type: GrantFiled: August 24, 2017Date of Patent: March 24, 2020Assignee: Level 3 Communications, LLCInventor: Sergey Yermakov
-
Patent number: 10600028Abstract: Aspects of the present disclosure involve systems, methods, computer program products, and the like, that provide automated topology change detection and policy based provisioning and remediation in information technology systems, among other functions and advantages.Type: GrantFiled: March 26, 2018Date of Patent: March 24, 2020Assignee: Level 3 Communications, LLCInventors: Ronald Dean Cotten, Richard David Haase, Kevin Dean Wein, James Edward Borowicz, Madhukar Bandi, Eric Alden Rumer, Craig W. Hotes
-
Patent number: 10601699Abstract: Aspects of the present disclosure involve systems for providing multiple egress routes from a telecommunications network for a client of the network. In general, the system provides for a client of the network to receive intended packets of information through multiple connections to the network such that load balancing and failover services for traffic to the customer are provided. The process and system allows for telecommunications network to utilize a common next-hop value of announced border gateway protocol (BGP) routes to advertise multiple routes to reach a destination customer network or address. By utilizing a common next-hop value in the announced BGP information, the devices of the network may load balance communication packets to the destination customer or address among the multiple egress locations from the network, as well as providing fast failover to alternate routes when a failure at the network or customer occurs.Type: GrantFiled: April 29, 2019Date of Patent: March 24, 2020Assignee: Level 3 Communications, LLCInventors: Francis Ferguson, Eric Osborne, Clyde David Cooper, III, Brent W. Smith
-
Patent number: 10594782Abstract: Examples described herein relate to apparatuses and methods for managing communications within a supercluster or across superclusters, including a first supercluster having a plurality of first machines and a publish-subscribe (Pub-Sub) channel to which each of the plurality of first machines is subscribed. A second supercluster has a plurality of second machines and a bridge between the first supercluster and the second supercluster. A first machine is configured to receive, via the bridge, an availability status and resource allocation information of each second machine and publish, on the Pub-Sub channel of the first supercluster, the availability status and the resource allocation information.Type: GrantFiled: June 7, 2018Date of Patent: March 17, 2020Assignee: Level 3 Communications, LLCInventor: Christopher Newton
-
Patent number: 10594613Abstract: An improved autonegotiation approach includes determining that a negotiated rate between a first network device and a second network device exceeds data transfer capacity over a network path downstream of the second network device. In response, a configuration message is generated and transmitted to the first network device. When received by the first network device, the configuration message causes the first network device to limit data transfer between the first network device and the second network device to no more than the downstream data transfer capacity.Type: GrantFiled: July 16, 2018Date of Patent: March 17, 2020Assignee: Level 3 Communications, LLCInventors: Steven E. Drake, Charles R. Lyman
-
Patent number: 10594605Abstract: The present invention generally relates to methods of routing packets in a network comprising Autonomous Systems (ASs), next hop determiners for routing packets in such a network, systems for routing packets in such a network, and route indicator feeders for providing modified route indicators. A method of routing packets in such a network may comprise: obtaining route indicators each comprising: an indicator of a network prefix; and an indicator of an AS path for delivering packets to an AS having the network prefix; identifying at least one said route indicator having an AS path indicator comprising a predetermined AS identifier; storing the network prefix indicator of each said identified route indicator; receiving at least one packet having an address indicating a destination; and if the destination address of said packet is within an address range defined by a said stored prefix indicator, transmitting the packet on a non-peering connection to the AS having the predetermined AS identifier.Type: GrantFiled: November 13, 2018Date of Patent: March 17, 2020Assignee: Level 3 Communications, LLCInventor: Stewart Bamford
-
Patent number: 10592330Abstract: Systems and methods for automatic repair, replacement, and/or configuration of various network devices within a communications network are disclosed. The system may receive indication of a failed network device and automatically perform diagnostic on the network device to determine any problems associated with the hardware and/or software components within the network device. Subsequently one or more repair, replacement, and/or configuration procedures may be automatically initiated in an attempt to resolve the problems and restore the failed network device.Type: GrantFiled: November 13, 2017Date of Patent: March 17, 2020Assignee: Level 3 Communications, LLCInventors: Lawrence Wayne Gowin, Matthew David Flynn, Mark Michael Warren, Ricky Lynn Nooner
-
Patent number: 10594706Abstract: Aspects of the present disclosure involve systems, methods, computer program products, and the like, for detecting a spoofed source IP address on an incoming communication to any type of network, such as a telecommunications or content delivery network. Each interface to the network may include a classifier that defines or describes source IP addresses that are recognized by the interface as a valid source IP address. If a received communication packet includes a source IP address that is not included or defined by the interface classifier, the packet is considered as a possible spoofed IP address and one or more mitigation techniques may be applied to the incoming packet to prevent an attack on a device or network utilizing the spoofed packet. Such techniques may lessen or prevent an unauthorized access of the device or network or a DDOS attack on the network or device.Type: GrantFiled: March 24, 2017Date of Patent: March 17, 2020Assignee: Level 3 Communications, LLCInventor: Thomas B. Boatwright
-
Publication number: 20200084154Abstract: Aspects of the present disclosure include a content delivery network (CDN) for delivering content associated with a plurality of different types of applications/devices. Using a CDN flow application, a plurality of network flow parameters are generated for content delivery unique to different types of applications or devices. The network flow parameters include customized data transmission rates. The network flow parameters include predetermined settings for transmission control protocol (TCP) connections between the CDN and devices using a TCP flow control mechanism. Upon receiving a content request, the CDN fulfills the content request based upon first network flow parameters. The network flow parameters may be adjusted for each of the plurality of different types of applications/devices. The network flow parameters may be generated based upon requests or based upon the performance of each of the plurality of applications/devices.Type: ApplicationFiled: November 13, 2019Publication date: March 12, 2020Applicant: Level 3 Communications, LLCInventors: Joseph C. Lawrence, William R. Power
-
Publication number: 20200084083Abstract: A computer-implemented method, operable in a content delivery network (CDN) including a plurality of cache servers and domain name servers. At a cache server in the CDN, a first domain name is obtained, the first domain name being associated with a client request for a resource from the cache server. One or more values associated with the client request are determined and a second domain name is generated, including information from the first domain name and information relating to the one or more values associated with the client request. The second domain name is provided to the client. A domain name server in the CDN obtains a request to resolve a first domain name; extracts one or more keys and one or more corresponding values from the first domain name, and generates a second domain name based on the first domain name, the second domain name excluding information from the first domain name relating to the one or more keys and the one or more values.Type: ApplicationFiled: November 13, 2019Publication date: March 12, 2020Applicant: Level 3 Communications, LLCInventors: Gifford Neal Hesketh, Christopher Newton, Mark Brady, David Fullagar
-
Publication number: 20200084178Abstract: Aspects of the present disclosure include systems and methods for automatically scanning a network for network devices, retrieving and storing device information associated with any identified network devices, and updating records of a DNS based on the retrieved device information. The updated records of the DNS may include the IP address of a given network device and a device name that is automatically generated from the retrieved device information using a set of naming rules applied to the device information. Accordingly, subsequent queries including the device names may be submitted to the DNS to retrieve the corresponding IP addresses. The resulting device names generated by applying the naming rules may be based on, among other things, logical or physical properties of the network devices.Type: ApplicationFiled: September 3, 2019Publication date: March 12, 2020Applicant: Level 3 Communications, LLCInventor: Bryan J. Dreyer
-
Publication number: 20200084140Abstract: A differentiated routing system includes an electronic service in communication with an ingress gateway that receives a communication service, such as a call from a terminal, over a trunk. The service receives a request from the ingress gateway for establishing a communication service for the calling party terminal. The service obtains information associated with the calling party terminal, which may be based on the trunk and its relationship to a customer, in which the information is to be used for applying at least one of a routing decision and policy decision to the communication service, and appends a tag to the request based on the information. The service may then transmit the request appended with the information to a routing device, which may then use the information when providing the service.Type: ApplicationFiled: November 13, 2019Publication date: March 12, 2020Applicant: Level 3 Communications, LLCInventors: Richard D. Moore, Matthew C. Hess, Patrick S. Callahan
-
Publication number: 20200076766Abstract: Aspects of the present disclosure involve systems, methods, computer program products, and the like, for utilizing multiple anycast addresses within a domain name system (DNS) architecture of a CDN. one or more DNS servers of the architecture may announce a plurality of anycast addresses for receiving DNS requests from requesting devices. The group of addresses may be dispersed (and/or announced by) the DNS servers of the architecture such that each server announces a subset of the available addresses. The number and identity of the subset of available anycast addresses utilized may vary from server to server of the DNS architecture and may be determined based on groups of servers, configurations of metros or gateways of the DNS architecture, or performance metrics of one or more servers.Type: ApplicationFiled: September 3, 2019Publication date: March 5, 2020Applicant: Level 3 Communications, LLCInventor: Joelle T. Maslak
-
Publication number: 20200074514Abstract: According to one embodiment of the present disclosure, a virtualized communication device dynamic provisioning system includes a computer-based set of instructions that are executed to generate a user interface for receiving selection of one or more virtualized communication devices. The instructions may then receive provisioning information associated with the selected virtualized communication devices from the user interface, and provision the virtualized communication devices in accordance with the received provisioning information to prepare and equip the virtualized communication devices according to the financial transaction.Type: ApplicationFiled: November 11, 2019Publication date: March 5, 2020Applicant: Level 3 Communications, LLCInventor: Michael E. Feldpusch
-
Publication number: 20200073861Abstract: A data system is provided for analyzing and maintaining data obtained from one or more data sources on which the data system depends. The system includes a primary database including current values used by the system and a collection of executable algorithms used to generate the data maintained in the primary database. In response to receiving a notification regarding a change in one of the data sources, a dependency database is used to establish an execution order for algorithms of the algorithm collection that are directly or indirectly dependent on the changed data. The algorithms identified in the execution order are then executed in accordance with the execution order and the corresponding result is stored in the primary database. The system may include data harvesters adapted to recognize changes in the data sources and to generate and transmit corresponding change notifications when such changes occur.Type: ApplicationFiled: November 7, 2019Publication date: March 5, 2020Applicant: Level 3 Communications, LLCInventors: William GRAY, Binchao CHEN, Steven D. MEYER
-
Publication number: 20200073862Abstract: A data system is provided for analyzing and maintaining data obtained from one or more data sources on which the data system depends. The system includes a primary database including current values used by the system and a collection of executable algorithms used to generate the data maintained in the primary database. In response to receiving a notification regarding a change in one of the data sources, a dependency database is used to establish an execution order for algorithms of the algorithm collection that are directly or indirectly dependent on the changed data. The algorithms identified in the execution order are then executed in accordance with the execution order and the corresponding result is stored in the primary database. The system may include data harvesters adapted to recognize changes in the data sources and to generate and transmit corresponding change notifications when such changes occur.Type: ApplicationFiled: November 7, 2019Publication date: March 5, 2020Applicant: Level 3 Communications, LLCInventors: William GRAY, Binchao CHEN, Steven D. MEYER
-
Patent number: 10581942Abstract: A user of a communication network may have specific requirements for its critical data streams. The user may require dedicated channel capacity for its critical application. A dedicated channel may be separate from a common channel carrying non-critical data of the user. The user may create policies for assigning channel capacities to its critical data streams based on various criteria. The user may also create policies on sharing the dedicated channel capacity among its different critical data streams.Type: GrantFiled: April 29, 2019Date of Patent: March 3, 2020Assignee: Level 3 Communications, LLCInventors: William Thomas Sella, James Michael Sella, Pete Joseph Caputo, II
-
Patent number: 10581903Abstract: Aspects of the present disclosure involve systems, methods, computer program products, and the like, for utilizing an access log of a proxy server device of a content delivery network (CDN) to detect and mitigate a denial of service (DOS) on a web or content server hosted by the CDN. Through an analysis of the content requests received at the proxy server listed in the access logs, one or more IP addresses may be identified as involved in a potential DOS attack or other suspicious behavior. Once identified, the suspicious activities of the one or more IP addresses may be tracked and aggregated over a particular period of time, with each detected suspicious request to the content server being counted. The count of suspicious requests to the content server may then be compared to one or more threshold values and a remediation action may occur when the thresholds are met or exceeded.Type: GrantFiled: November 7, 2016Date of Patent: March 3, 2020Assignee: Level 3 Communications, LLCInventors: Thomas P. Donahue, Henry Yu