Patents by Inventor Dan Pei
Dan Pei has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20130042009Abstract: A network includes a cache server and a network aware server that operates to determine an optimization between a cost of retrieving content from a communication network and a cost of caching content at the cache server. The optimization is determined as a minimum of a sum of a transit cost, a backbone cost, and a caching cost. The transit cost includes a money cost per data unit. The backbone cost includes a money cost per data unit and time unit. The caching cost includes a money cost per server unit. In response to determining the optimization, the network aware server sends a content identifier to the cache server, and the cache server receives the content identifier, determines a source of a content item, and if the source is the same as the content identifier, then cache the content item.Type: ApplicationFiled: October 12, 2012Publication date: February 14, 2013Applicant: AT&T INTELLECTUAL PROPERTY I, L.P.Inventors: Alexandre Gerber, Oliver Spatscheck, Dan Pei, Mohammad Taghi Hajiaghayi, Jeffrey Erman
-
Patent number: 8353034Abstract: Method, system and computer-readable medium to locate a prefix hijacker of a destination prefix within a one-hop neighborhood on a network. The method includes generating one-hop neighborhoods from autonomous system (AS)-level paths of plural monitors to a destination prefix. The method also includes determining a suspect set of AS identifiers resulting from a union of the one-hop neighborhoods. The method further includes calculating a count and a distance associated with each AS identifier of the suspect set. The count indicates how often the AS identifier appeared in the one-hop neighborhoods. The distance indicates a total distance from the AS identifier to AS identifiers associated with the plural monitors. Yet further, the method includes generating a one-hop suspect set of AS identifiers from the suspect set that have highest counts and highest distances.Type: GrantFiled: November 25, 2008Date of Patent: January 8, 2013Assignee: AT&T Intellectual Property I, L.P.Inventors: Lusheng Ji, Dan Pei, Tongqing Qiu, Jia Wang
-
Patent number: 8312141Abstract: A network includes a cache server and a network aware server that operates to determine an optimization between a cost of retrieving content from a communication network and a cost of caching content at the cache server. The optimization is determined as a minimum of a sum of a transit cost, a backbone cost, and a caching cost. The transit cost includes a money cost per data unit. The backbone cost includes a money cost per data unit and time unit. The caching cost includes a money cost per server unit. In response to determining the optimization, the network aware server sends a content identifier to the cache server, and the cache server receives the content identifier, determines a source of a content item, and if the source is the same as the content identifier, then cache the content item.Type: GrantFiled: December 21, 2011Date of Patent: November 13, 2012Assignee: AT&T Intellectual Property I, LPInventors: Alexandre Gerber, Oliver Spatscheck, Dan Pei, Mohammad Taghi Hajiaghayi, Jeffrey Erman
-
Patent number: 8296838Abstract: A communication network is operated by identifying at least one potential hijack autonomous system (AS) that can be used to generate a corrupt routing path from a source AS to a destination AS. For each of the at least one potential hijack AS the following operations are performed: identifying at least one regional AS that is configured to adopt the corrupt routing path from the source AS to the destination AS and determining a reflector AS set such that, for each reflector AS in the set, a source AS to reflector AS routing path and a reflector AS to destination AS routing path do not comprise any of the at least one regional AS. A reflector AS is then identified that is common among the at least one reflector AS set responsive to performing the identifying and determining operations for each of the at least one potential hijack AS.Type: GrantFiled: December 7, 2009Date of Patent: October 23, 2012Assignee: AT&T Intellectual Property I, L.P.Inventors: Lusheng Ji, Dan Pei, Jia Wang
-
Patent number: 8166195Abstract: A route control architecture allows a network operator to flexibly control routing between the traffic ingresses and egresses in a computer network, without modifying existing routers. An intelligent route service control point (IRSCP) replaces distributed BGP decision processes of conventional network routers with a route computation that is flexible and logically centralized but physically distributed. One embodiment supplements the traditional BGP decision process with a ranking decision process that allows route-control applications to explicitly rank traffic egresses on a per-destination, per-router basis. A straightforward set of correctness requirements prevents routing anomalies in implementations that are scalable and fault-tolerant.Type: GrantFiled: January 31, 2011Date of Patent: April 24, 2012Assignee: AT&T Intellectual Property I, L.P.Inventors: Jacobus Van Der Merwe, Dan Pei, Thomas B. Scholl, Aman Shaikh, Alex Snoeren, Patrick Verkaik
-
Publication number: 20120096140Abstract: A network includes a cache server and a network aware server that operates to determine an optimization between a cost of retrieving content from a communication network and a cost of caching content at the cache server. The optimization is determined as a minimum of a sum of a transit cost, a backbone cost, and a caching cost. The transit cost includes a money cost per data unit. The backbone cost includes a money cost per data unit and time unit. The caching cost includes a money cost per server unit. In response to determining the optimization, the network aware server sends a content identifier to the cache server, and the cache server receives the content identifier, determines a source of a content item, and if the source is the same as the content identifier, then cache the content item.Type: ApplicationFiled: December 21, 2011Publication date: April 19, 2012Applicant: AT&T INTELLECTUAL PROPERTY I, L.P.Inventors: Alexandre Gerber, Oliver Spatscheck, Dan Pei, Mohammad Taghi Hajiaghayi, Jeffrey Erman
-
Patent number: 8136160Abstract: Method, system and computer-readable medium to select monitors that increase the likelihood of detecting prefix hijacking events of a destination prefix are disclosed. The method includes assigning each of the candidate prefix hijack monitors to a respective cluster of a plurality of clusters. Each of the candidate prefix hijack monitors is associated with an autonomous system (AS) that indicates an AS path of autonomous systems (ASes) from the AS to a destination prefix associated with a destination AS. The method further includes iteratively merging a pair of clusters with a highest similarity score amongst cluster pairs of the plurality of clusters into a single cluster until a processed number of clusters is less than or equal to a predetermined number of clusters.Type: GrantFiled: November 25, 2008Date of Patent: March 13, 2012Assignee: AT&T Intellectual Property I, LPInventors: Lusheng Ji, Dan Pei, Tongqing Qiu, Jia Wang
-
Patent number: 8103768Abstract: An Internet service provider includes a cache server and a network aware server. The network aware server is operable to determine an optimization between a cost of retrieving content from a network and a cost of caching content from the network at the first cache server and then send a content identifier to the cache server. The cache server is operable to receive the content identifier, and determine the source of a content item. If the source is the same as the content identifier, then the cache server caches the content item.Type: GrantFiled: April 14, 2009Date of Patent: January 24, 2012Assignee: AT&T Intellectual Property I, LPInventors: Alexandre Gerber, Oliver Spatscheck, Dan Pei, Mohammad Taghi Hajiaghayi, Jeffrey Erman
-
Patent number: 8042183Abstract: Disclosed is a method and apparatus for detecting prefix hijacking attacks. A source node is separated from a destination network at a first time via an original path. The destination network is associated with a prefix. At a second time, a packet is transmitted from the source node to the destination network to determine a current path between the source node and the destination network. A packet is also transmitted from the source node to a reference node to determine a reference node path. The reference node is located along the original path and is associated with a prefix different than the prefix associated with the destination network. The current path and the reference node path are then compared, and a prefix hijacking attack is detected when the reference node path is not a sub-path of the current path.Type: GrantFiled: July 18, 2007Date of Patent: October 18, 2011Assignee: AT&T Intellectual Property II, L.P.Inventors: Lusheng Ji, Dan Pei, Jia Wang
-
Publication number: 20110231704Abstract: Example methods, apparatus and articles of manufacture to perform root cause analysis for network events are disclosed. An example method includes retrieving a symptom event instance from a normalized set of data sources based on a symptom event definition; generating a set of diagnostic events from the normalized set of data sources which potentially cause the symptom event instance, the diagnostic events being determined based on dependency rules; and analyzing the set of diagnostic events to select a root cause event based on root cause rules.Type: ApplicationFiled: March 19, 2010Publication date: September 22, 2011Inventors: Zihui Ge, Dan Pei, Jennifer Yates, He Yan
-
Publication number: 20110153801Abstract: A method of placing prefix hijacking detection modules in a communications network includes selecting a set of candidate locations. For each candidate location, a detection coverage ratio with respect to a target Autonomous System is calculated. Based on the relative size of the coverage ratios, proposed locations for the prefix hijacking detection modules are determined.Type: ApplicationFiled: December 17, 2009Publication date: June 23, 2011Applicant: AT&T INTELLECTUAL PROPERTY I, L.P.Inventors: Lusheng Ji, Dan Pei, Tonqing Qiu, Jia Wang
-
Publication number: 20110138466Abstract: A communication network is operated by identifying at least one potential hijack autonomous system (AS) that can be used to generate a corrupt routing path from a source AS to a destination AS. For each of the at least one potential hijack AS the following operations are performed: identifying at least one regional AS that is configured to adopt the corrupt routing path from the source AS to the destination AS and determining a reflector AS set such that, for each reflector AS in the set, a source AS to reflector AS routing path and a reflector AS to destination AS routing path do not comprise any of the at least one regional AS. A reflector AS is then identified that is common among the at least one reflector AS set responsive to performing the identifying and determining operations for each of the at least one potential hijack AS.Type: ApplicationFiled: December 7, 2009Publication date: June 9, 2011Inventors: Lusheng Ji, Dan Pei, Jia Wang
-
Publication number: 20110125920Abstract: A route control architecture allows a network operator to flexibly control routing between the traffic ingresses and egresses in a computer network, without modifying existing routers. An intelligent route service control point (IRSCP) replaces distributed BGP decision processes of conventional network routers with a route computation that is flexible and logically centralized but physically distributed. One embodiment supplements the traditional BGP decision process with a ranking decision process that allows route-control applications to explicitly rank traffic egresses on a per-destination, per-router basis. A straightforward set of correctness requirements prevents routing anomalies in implementations that are scalable and fault-tolerant.Type: ApplicationFiled: January 31, 2011Publication date: May 26, 2011Inventors: Jacobus Van Der Merwe, Dan Pei, Thomas B. Scholl, Aman Shaikh, Alex Snoeren, Patrick Verkaik
-
Patent number: 7904589Abstract: A route control architecture allows a network operator to flexibly control routing between the traffic ingresses and egresses in a computer network, without modifying existing routers. An intelligent route service control point (IRSCP) replaces distributed BGP decision processes of conventional network routers with a route computation that is flexible and logically centralized but physically distributed. One embodiment supplements the traditional BGP decision process with a ranking decision process that allows route-control applications to explicitly rank traffic egresses on a per-destination, per-router basis. A straightforward set of correctness requirements prevents routing anomalies in implementations that are scalable and fault-tolerant.Type: GrantFiled: May 19, 2007Date of Patent: March 8, 2011Assignee: AT&T Intellectual Property I, LPInventors: Jacobus Van Der Merwe, Dan Pei, Thomas B. Scholl, Aman Shaikh, Alex Snoeren, Patrick Verkaik
-
Patent number: 7894461Abstract: Methods and apparatus to infer the status of BGP sessions are disclosed. A disclosed example method comprises querying a configuration file of a router of a first AS to identify a BGP session to a second AS, querying the file to determine whether the BGP session is a single hop, when the BGP session is a single hop, setting a status flag to a first value, querying the file to determine whether there is a valid IP configuration for the BGP session, when there is a valid IP configuration, setting the status flag to a second value, querying a router syslog file for the router to identify a syslog message associated with the BGP session, determining whether the session is stale, and when the session is not stale and the status flag is set to the second value, adding the second AS to a list of actual AS neighbors.Type: GrantFiled: November 20, 2008Date of Patent: February 22, 2011Assignee: AT&T Intellectual Property I, L.P.Inventors: Dan Pei, Ricardo Oliveira, Walter Willinger
-
Patent number: 7889666Abstract: A system and method is disclosed for a scalable and robust network troubleshooting framework for VPN backbones addressing scalability and data imperfection. The framework takes advantage of lattice data structures to identify multi-dimensional hierarchical events that occur frequently across multiple data sources. Correlation schemes and inference rules are created for diagnosing network events and generating actionable reports for important events.Type: GrantFiled: December 26, 2007Date of Patent: February 15, 2011Assignee: AT&T Intellectual Property II, L.P.Inventors: Dan Pei, Zhuoqing Morley Mao, Jia Wang, Ying Zhang
-
Publication number: 20100262683Abstract: An Internet service provider includes a cache server and a network aware server. The network aware server is operable to determine an optimization between a cost of retrieving content from a network and a cost of caching content from the network at the first cache server and then send a content identifier to the cache server. The cache server is operable to receive the content identifier, and determine the source of a content item. If the source is the same as the content identifier, then the cache server caches the content item.Type: ApplicationFiled: April 14, 2009Publication date: October 14, 2010Applicant: AT&T CORP.Inventors: Alexandre Gerber, Oliver Spatscheck, Dan Pei, Mohammad Taghi Hajiaghayi, Jeffery Erman
-
Patent number: 7796607Abstract: Example scalable multi-protocol label switching (MPLS) based virtual private networks (VPNs) and methods to implement the same are disclosed. A disclosed example spoke provider edge (PE) router for an MPLS-based VPN includes a truncated virtual routing and forwarding (VRF) table containing a first value referencing a hub PE router and a second value referencing a first customer edge (CE) router coupled to the VPN via the PE router, and a forwarding module to forward a packet received from the first CE router to the hub PE router when the packet contains an address referencing a second CE router coupled to the VPN via a second spoke PE router.Type: GrantFiled: May 30, 2008Date of Patent: September 14, 2010Assignees: AT&T Intellectual Property I, L.P., Trustees of Princeton UniversityInventors: Alexandre Gerber, Subhabrata Sen, Carsten Lund, Dan Pei, MohammadTaghi Hajiaghayi, Changhoon Kim
-
Publication number: 20100153537Abstract: A method and apparatus for detecting an address hijacking in a network are disclosed. For example, the method sends one or more traceroute packets to a target prefix, wherein the target prefix comprises one or more destination Internet Protocol (IP) addresses, and records traceroute data received for the one or more traceroute packets sent to the target prefix. The method then determines one or more hop count distance measurements for the target prefix, and determines if there are one or more changes in the one or more hop count distance measurements for the target prefix.Type: ApplicationFiled: December 11, 2008Publication date: June 17, 2010Inventors: JIA WANG, Lusheng Ji, Dan Pei
-
Publication number: 20100132037Abstract: Method, system and computer-readable medium to locate a prefix hijacker of a destination prefix within a one-hop neighborhood on a network. The method includes generating one-hop neighborhoods from autonomous system (AS)-level paths of plural monitors to a destination prefix. The method also includes determining a suspect set of AS identifiers resulting from a union of the one-hop neighborhoods. The method further includes calculating a count and a distance associated with each AS identifier of the suspect set. The count indicates how often the AS identifier appeared in the one-hop neighborhoods. The distance indicates a total distance from the AS identifier to AS identifiers associated with the plural monitors. Yet further, the method includes generating a one-hop suspect set of AS identifiers from the suspect set that have highest counts and highest distances.Type: ApplicationFiled: November 25, 2008Publication date: May 27, 2010Applicant: AT&T Intellectual Property I, L.P.Inventors: Lusheng Ji, Dan Pei, Tongqing Qiu, Jia Wang