Patents by Inventor Dan Pei

Dan Pei has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20130042009
    Abstract: A network includes a cache server and a network aware server that operates to determine an optimization between a cost of retrieving content from a communication network and a cost of caching content at the cache server. The optimization is determined as a minimum of a sum of a transit cost, a backbone cost, and a caching cost. The transit cost includes a money cost per data unit. The backbone cost includes a money cost per data unit and time unit. The caching cost includes a money cost per server unit. In response to determining the optimization, the network aware server sends a content identifier to the cache server, and the cache server receives the content identifier, determines a source of a content item, and if the source is the same as the content identifier, then cache the content item.
    Type: Application
    Filed: October 12, 2012
    Publication date: February 14, 2013
    Applicant: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventors: Alexandre Gerber, Oliver Spatscheck, Dan Pei, Mohammad Taghi Hajiaghayi, Jeffrey Erman
  • Patent number: 8353034
    Abstract: Method, system and computer-readable medium to locate a prefix hijacker of a destination prefix within a one-hop neighborhood on a network. The method includes generating one-hop neighborhoods from autonomous system (AS)-level paths of plural monitors to a destination prefix. The method also includes determining a suspect set of AS identifiers resulting from a union of the one-hop neighborhoods. The method further includes calculating a count and a distance associated with each AS identifier of the suspect set. The count indicates how often the AS identifier appeared in the one-hop neighborhoods. The distance indicates a total distance from the AS identifier to AS identifiers associated with the plural monitors. Yet further, the method includes generating a one-hop suspect set of AS identifiers from the suspect set that have highest counts and highest distances.
    Type: Grant
    Filed: November 25, 2008
    Date of Patent: January 8, 2013
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Lusheng Ji, Dan Pei, Tongqing Qiu, Jia Wang
  • Patent number: 8312141
    Abstract: A network includes a cache server and a network aware server that operates to determine an optimization between a cost of retrieving content from a communication network and a cost of caching content at the cache server. The optimization is determined as a minimum of a sum of a transit cost, a backbone cost, and a caching cost. The transit cost includes a money cost per data unit. The backbone cost includes a money cost per data unit and time unit. The caching cost includes a money cost per server unit. In response to determining the optimization, the network aware server sends a content identifier to the cache server, and the cache server receives the content identifier, determines a source of a content item, and if the source is the same as the content identifier, then cache the content item.
    Type: Grant
    Filed: December 21, 2011
    Date of Patent: November 13, 2012
    Assignee: AT&T Intellectual Property I, LP
    Inventors: Alexandre Gerber, Oliver Spatscheck, Dan Pei, Mohammad Taghi Hajiaghayi, Jeffrey Erman
  • Patent number: 8296838
    Abstract: A communication network is operated by identifying at least one potential hijack autonomous system (AS) that can be used to generate a corrupt routing path from a source AS to a destination AS. For each of the at least one potential hijack AS the following operations are performed: identifying at least one regional AS that is configured to adopt the corrupt routing path from the source AS to the destination AS and determining a reflector AS set such that, for each reflector AS in the set, a source AS to reflector AS routing path and a reflector AS to destination AS routing path do not comprise any of the at least one regional AS. A reflector AS is then identified that is common among the at least one reflector AS set responsive to performing the identifying and determining operations for each of the at least one potential hijack AS.
    Type: Grant
    Filed: December 7, 2009
    Date of Patent: October 23, 2012
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Lusheng Ji, Dan Pei, Jia Wang
  • Patent number: 8166195
    Abstract: A route control architecture allows a network operator to flexibly control routing between the traffic ingresses and egresses in a computer network, without modifying existing routers. An intelligent route service control point (IRSCP) replaces distributed BGP decision processes of conventional network routers with a route computation that is flexible and logically centralized but physically distributed. One embodiment supplements the traditional BGP decision process with a ranking decision process that allows route-control applications to explicitly rank traffic egresses on a per-destination, per-router basis. A straightforward set of correctness requirements prevents routing anomalies in implementations that are scalable and fault-tolerant.
    Type: Grant
    Filed: January 31, 2011
    Date of Patent: April 24, 2012
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Jacobus Van Der Merwe, Dan Pei, Thomas B. Scholl, Aman Shaikh, Alex Snoeren, Patrick Verkaik
  • Publication number: 20120096140
    Abstract: A network includes a cache server and a network aware server that operates to determine an optimization between a cost of retrieving content from a communication network and a cost of caching content at the cache server. The optimization is determined as a minimum of a sum of a transit cost, a backbone cost, and a caching cost. The transit cost includes a money cost per data unit. The backbone cost includes a money cost per data unit and time unit. The caching cost includes a money cost per server unit. In response to determining the optimization, the network aware server sends a content identifier to the cache server, and the cache server receives the content identifier, determines a source of a content item, and if the source is the same as the content identifier, then cache the content item.
    Type: Application
    Filed: December 21, 2011
    Publication date: April 19, 2012
    Applicant: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventors: Alexandre Gerber, Oliver Spatscheck, Dan Pei, Mohammad Taghi Hajiaghayi, Jeffrey Erman
  • Patent number: 8136160
    Abstract: Method, system and computer-readable medium to select monitors that increase the likelihood of detecting prefix hijacking events of a destination prefix are disclosed. The method includes assigning each of the candidate prefix hijack monitors to a respective cluster of a plurality of clusters. Each of the candidate prefix hijack monitors is associated with an autonomous system (AS) that indicates an AS path of autonomous systems (ASes) from the AS to a destination prefix associated with a destination AS. The method further includes iteratively merging a pair of clusters with a highest similarity score amongst cluster pairs of the plurality of clusters into a single cluster until a processed number of clusters is less than or equal to a predetermined number of clusters.
    Type: Grant
    Filed: November 25, 2008
    Date of Patent: March 13, 2012
    Assignee: AT&T Intellectual Property I, LP
    Inventors: Lusheng Ji, Dan Pei, Tongqing Qiu, Jia Wang
  • Patent number: 8103768
    Abstract: An Internet service provider includes a cache server and a network aware server. The network aware server is operable to determine an optimization between a cost of retrieving content from a network and a cost of caching content from the network at the first cache server and then send a content identifier to the cache server. The cache server is operable to receive the content identifier, and determine the source of a content item. If the source is the same as the content identifier, then the cache server caches the content item.
    Type: Grant
    Filed: April 14, 2009
    Date of Patent: January 24, 2012
    Assignee: AT&T Intellectual Property I, LP
    Inventors: Alexandre Gerber, Oliver Spatscheck, Dan Pei, Mohammad Taghi Hajiaghayi, Jeffrey Erman
  • Patent number: 8042183
    Abstract: Disclosed is a method and apparatus for detecting prefix hijacking attacks. A source node is separated from a destination network at a first time via an original path. The destination network is associated with a prefix. At a second time, a packet is transmitted from the source node to the destination network to determine a current path between the source node and the destination network. A packet is also transmitted from the source node to a reference node to determine a reference node path. The reference node is located along the original path and is associated with a prefix different than the prefix associated with the destination network. The current path and the reference node path are then compared, and a prefix hijacking attack is detected when the reference node path is not a sub-path of the current path.
    Type: Grant
    Filed: July 18, 2007
    Date of Patent: October 18, 2011
    Assignee: AT&T Intellectual Property II, L.P.
    Inventors: Lusheng Ji, Dan Pei, Jia Wang
  • Publication number: 20110231704
    Abstract: Example methods, apparatus and articles of manufacture to perform root cause analysis for network events are disclosed. An example method includes retrieving a symptom event instance from a normalized set of data sources based on a symptom event definition; generating a set of diagnostic events from the normalized set of data sources which potentially cause the symptom event instance, the diagnostic events being determined based on dependency rules; and analyzing the set of diagnostic events to select a root cause event based on root cause rules.
    Type: Application
    Filed: March 19, 2010
    Publication date: September 22, 2011
    Inventors: Zihui Ge, Dan Pei, Jennifer Yates, He Yan
  • Publication number: 20110153801
    Abstract: A method of placing prefix hijacking detection modules in a communications network includes selecting a set of candidate locations. For each candidate location, a detection coverage ratio with respect to a target Autonomous System is calculated. Based on the relative size of the coverage ratios, proposed locations for the prefix hijacking detection modules are determined.
    Type: Application
    Filed: December 17, 2009
    Publication date: June 23, 2011
    Applicant: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventors: Lusheng Ji, Dan Pei, Tonqing Qiu, Jia Wang
  • Publication number: 20110138466
    Abstract: A communication network is operated by identifying at least one potential hijack autonomous system (AS) that can be used to generate a corrupt routing path from a source AS to a destination AS. For each of the at least one potential hijack AS the following operations are performed: identifying at least one regional AS that is configured to adopt the corrupt routing path from the source AS to the destination AS and determining a reflector AS set such that, for each reflector AS in the set, a source AS to reflector AS routing path and a reflector AS to destination AS routing path do not comprise any of the at least one regional AS. A reflector AS is then identified that is common among the at least one reflector AS set responsive to performing the identifying and determining operations for each of the at least one potential hijack AS.
    Type: Application
    Filed: December 7, 2009
    Publication date: June 9, 2011
    Inventors: Lusheng Ji, Dan Pei, Jia Wang
  • Publication number: 20110125920
    Abstract: A route control architecture allows a network operator to flexibly control routing between the traffic ingresses and egresses in a computer network, without modifying existing routers. An intelligent route service control point (IRSCP) replaces distributed BGP decision processes of conventional network routers with a route computation that is flexible and logically centralized but physically distributed. One embodiment supplements the traditional BGP decision process with a ranking decision process that allows route-control applications to explicitly rank traffic egresses on a per-destination, per-router basis. A straightforward set of correctness requirements prevents routing anomalies in implementations that are scalable and fault-tolerant.
    Type: Application
    Filed: January 31, 2011
    Publication date: May 26, 2011
    Inventors: Jacobus Van Der Merwe, Dan Pei, Thomas B. Scholl, Aman Shaikh, Alex Snoeren, Patrick Verkaik
  • Patent number: 7904589
    Abstract: A route control architecture allows a network operator to flexibly control routing between the traffic ingresses and egresses in a computer network, without modifying existing routers. An intelligent route service control point (IRSCP) replaces distributed BGP decision processes of conventional network routers with a route computation that is flexible and logically centralized but physically distributed. One embodiment supplements the traditional BGP decision process with a ranking decision process that allows route-control applications to explicitly rank traffic egresses on a per-destination, per-router basis. A straightforward set of correctness requirements prevents routing anomalies in implementations that are scalable and fault-tolerant.
    Type: Grant
    Filed: May 19, 2007
    Date of Patent: March 8, 2011
    Assignee: AT&T Intellectual Property I, LP
    Inventors: Jacobus Van Der Merwe, Dan Pei, Thomas B. Scholl, Aman Shaikh, Alex Snoeren, Patrick Verkaik
  • Patent number: 7894461
    Abstract: Methods and apparatus to infer the status of BGP sessions are disclosed. A disclosed example method comprises querying a configuration file of a router of a first AS to identify a BGP session to a second AS, querying the file to determine whether the BGP session is a single hop, when the BGP session is a single hop, setting a status flag to a first value, querying the file to determine whether there is a valid IP configuration for the BGP session, when there is a valid IP configuration, setting the status flag to a second value, querying a router syslog file for the router to identify a syslog message associated with the BGP session, determining whether the session is stale, and when the session is not stale and the status flag is set to the second value, adding the second AS to a list of actual AS neighbors.
    Type: Grant
    Filed: November 20, 2008
    Date of Patent: February 22, 2011
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Dan Pei, Ricardo Oliveira, Walter Willinger
  • Patent number: 7889666
    Abstract: A system and method is disclosed for a scalable and robust network troubleshooting framework for VPN backbones addressing scalability and data imperfection. The framework takes advantage of lattice data structures to identify multi-dimensional hierarchical events that occur frequently across multiple data sources. Correlation schemes and inference rules are created for diagnosing network events and generating actionable reports for important events.
    Type: Grant
    Filed: December 26, 2007
    Date of Patent: February 15, 2011
    Assignee: AT&T Intellectual Property II, L.P.
    Inventors: Dan Pei, Zhuoqing Morley Mao, Jia Wang, Ying Zhang
  • Publication number: 20100262683
    Abstract: An Internet service provider includes a cache server and a network aware server. The network aware server is operable to determine an optimization between a cost of retrieving content from a network and a cost of caching content from the network at the first cache server and then send a content identifier to the cache server. The cache server is operable to receive the content identifier, and determine the source of a content item. If the source is the same as the content identifier, then the cache server caches the content item.
    Type: Application
    Filed: April 14, 2009
    Publication date: October 14, 2010
    Applicant: AT&T CORP.
    Inventors: Alexandre Gerber, Oliver Spatscheck, Dan Pei, Mohammad Taghi Hajiaghayi, Jeffery Erman
  • Patent number: 7796607
    Abstract: Example scalable multi-protocol label switching (MPLS) based virtual private networks (VPNs) and methods to implement the same are disclosed. A disclosed example spoke provider edge (PE) router for an MPLS-based VPN includes a truncated virtual routing and forwarding (VRF) table containing a first value referencing a hub PE router and a second value referencing a first customer edge (CE) router coupled to the VPN via the PE router, and a forwarding module to forward a packet received from the first CE router to the hub PE router when the packet contains an address referencing a second CE router coupled to the VPN via a second spoke PE router.
    Type: Grant
    Filed: May 30, 2008
    Date of Patent: September 14, 2010
    Assignees: AT&T Intellectual Property I, L.P., Trustees of Princeton University
    Inventors: Alexandre Gerber, Subhabrata Sen, Carsten Lund, Dan Pei, MohammadTaghi Hajiaghayi, Changhoon Kim
  • Publication number: 20100153537
    Abstract: A method and apparatus for detecting an address hijacking in a network are disclosed. For example, the method sends one or more traceroute packets to a target prefix, wherein the target prefix comprises one or more destination Internet Protocol (IP) addresses, and records traceroute data received for the one or more traceroute packets sent to the target prefix. The method then determines one or more hop count distance measurements for the target prefix, and determines if there are one or more changes in the one or more hop count distance measurements for the target prefix.
    Type: Application
    Filed: December 11, 2008
    Publication date: June 17, 2010
    Inventors: JIA WANG, Lusheng Ji, Dan Pei
  • Publication number: 20100132037
    Abstract: Method, system and computer-readable medium to locate a prefix hijacker of a destination prefix within a one-hop neighborhood on a network. The method includes generating one-hop neighborhoods from autonomous system (AS)-level paths of plural monitors to a destination prefix. The method also includes determining a suspect set of AS identifiers resulting from a union of the one-hop neighborhoods. The method further includes calculating a count and a distance associated with each AS identifier of the suspect set. The count indicates how often the AS identifier appeared in the one-hop neighborhoods. The distance indicates a total distance from the AS identifier to AS identifiers associated with the plural monitors. Yet further, the method includes generating a one-hop suspect set of AS identifiers from the suspect set that have highest counts and highest distances.
    Type: Application
    Filed: November 25, 2008
    Publication date: May 27, 2010
    Applicant: AT&T Intellectual Property I, L.P.
    Inventors: Lusheng Ji, Dan Pei, Tongqing Qiu, Jia Wang