Patents Issued in September 18, 2008
-
Publication number: 20080225713Abstract: In one embodiment, a method includes obtaining a first packet that has a first payload. The first payload identifies a first path between endpoints traversed by the first packet, and identifying information associated with a first node associated with the first path traversed by the first packet. The identifying information includes an arrival time that identifies approximately when the first packet arrived at the first node and a leaving time that identifies approximately when the first packet left the first node. A first service level agreement (SLA) parameter of the first path is determined by analyzing the arrival time and the leaving time, comparing the first SLA parameter with a second SLA parameter associated with a second path traversed by a second probe packet, and selecting the first path for sending packets if the first SLA parameter indicates a higher SLA level than indicated by the second SLA parameter.Type: ApplicationFiled: March 16, 2007Publication date: September 18, 2008Applicant: CISCO TECHNOLOGY, INC.Inventors: Emmanuel P. Tychon, Benoit Claise
-
Publication number: 20080225714Abstract: A system, method and associated resource balancer function for calculating a resource attribution proposal to be used in a load balancing mechanism supported by a plurality of monitored Service Nodes (SN). At the resource balancer function, receiving an updated remaining capacity value from a first SN of the plurality of SN, storing a remaining capacity value for the first SN from the updated remaining capacity value and calculating the resource attribution proposal between the plurality of SN based on the stored remaining capacity values.Type: ApplicationFiled: March 12, 2007Publication date: September 18, 2008Applicant: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)Inventor: Martin Denis
-
Publication number: 20080225715Abstract: Systems and methods for dynamically controlling bandwidth of connections are described. In some embodiments, a proxy for one or more connections may allocate, distribute, or generate indications of network congestion via one or more connections in order to induce the senders of the connections to reduce their rates of transmission. The proxy may allocate, distribute, or generate these indications in such a way as to provide quality of service to one or more connections, or to ensure that a number of connections transmit within an accepted bandwidth limit. In other embodiments, a sender of a transport layer connection may have a method for determining a response to congestion indications which accounts for a priority of the connection. In these embodiments, a sender may reduce or increase parameters related to transmission rate at different rates according to a priority of the connection.Type: ApplicationFiled: March 12, 2007Publication date: September 18, 2008Inventor: Robert Plamondon
-
Publication number: 20080225716Abstract: A network includes an advanced bandwidth manager (ABM) to manage loading when a network nears or exceeds its capacity due to changes in the network, e.g., component failures or incremental growth. The ABM gathers strategic information from remote listeners about how traffic is being routed over the whole network, and is abstracted into point-to-point tables. The information gathered also helps to provide long term service planning. Autonomous policy enforcement points (PEP's) provide short term controls on their own. Intelligent action can be taken by the ABM through the PEP's by downloading admission tables based in the point-to-point abstractions. The goal is to keep the highest level of service up for the most users and prevent total failures. Requested network connections are either admitted or denied to these ends.Type: ApplicationFiled: March 13, 2007Publication date: September 18, 2008Inventor: Andrew S. Lange
-
Publication number: 20080225717Abstract: Techniques are described for intelligently allocating bandwidth in a wireless mesh network. The wireless mesh network includes a nodes and links interconnecting the nodes. In order to increase capacity and avoid congestion in the network, a network administrator may regulate network traffic by adjusting various parameters that control the operation of network nodes. The network administrator may identify topology information, which indicates a configuration of the nodes and links, and a traffic matrix, which indicates a relative traffic demand weighting for each source node-destination node pair. From this information, the network administrator may calculate a bandwidth assignment for each link. Network administrator may use the bandwidth assignments to calculate a parameter for each node. That parameter may affect the amount of bandwidth used by a node. These parameters may be transmitted to their respective nodes.Type: ApplicationFiled: March 12, 2007Publication date: September 18, 2008Inventors: Wei-Peng Chen, Ching-Fong Su
-
Publication number: 20080225718Abstract: The present invention provides improvements to load balancing by providing a load balancing solution that distributes a load among a plurality of heterogenous devices, such as different types of local load balancers, using metrics collected from the different devices. The load balancing appliance collects metrics from heterogenous devices using a network management protocol and communication model, such as a Simple Network Management Protocol (SNMP). These heterogenous device metrics are available on the load balancing appliance with appliance determined metrics and metrics obtained by the appliance from homogenous devices using a metric exchange protocol. Via a configuration interface of the appliance, a user can select one or more of these different metrics for global load balancing. As such, the load balancing appliance described herein obtains a multitude of metrics from the different devices under management.Type: ApplicationFiled: March 12, 2007Publication date: September 18, 2008Inventors: Murali Raja, Josephine Suganthi, Sandeep Kamath, Sergey Verzunov
-
SYSTEMS AND METHODS FOR USING OBJECT ORIENTED EXPRESSIONS TO CONFIGURE APPLICATION SECURITY POLICIES
Publication number: 20080225719Abstract: Systems and methods for configuring and evaluating policies that direct processing of one or more data streams are described. A configuration interface is described for allowing users to specify object oriented policies. These object oriented policies may allow any data structures to be applied with respect to a payload of a received packet stream, including any portions of HTTP traffic. A configuration interface may also allow the user to control the order in which policies and policy groups are executed, in addition to specifying actions to be taken if one or more policies are undefined. Systems and methods for processing the policies may allow efficient processing of object-oriented policies by applying potentially complex data structures to unstructured data streams. A device may also interpret and process a number of flow control commands and policy group invocation statements to determine an order of execution among a number of policies and policy groups.Type: ApplicationFiled: March 12, 2007Publication date: September 18, 2008Inventors: Vamsi Korrapati, Prakash Khemani, Rajiv Mirani, Abhishek Chauhan -
Publication number: 20080225720Abstract: Systems and methods for configuring and evaluating policies that direct processing of one or more data streams are described. A configuration interface is described for allowing users to specify object oriented policies. These object oriented policies may allow any data structures to be applied with respect to a payload of a received packet stream, including any portions of HTTP traffic. A configuration interface may also allow the user to control the order in which policies and policy groups are executed, in addition to specifying actions to be taken if one or more policies are undefined. Systems and methods for processing the policies may allow efficient processing of object-oriented policies by applying potentially complex data structures to unstructured data streams. A device may also interpret and process a number of flow control commands and policy group invocation statements to determine an order of execution among a number of policies and policy groups.Type: ApplicationFiled: March 12, 2007Publication date: September 18, 2008Inventors: Prakash Khemani, Vishal Bandekar
-
Publication number: 20080225721Abstract: Systems and methods for dynamically controlling bandwidth of connections are described. In some embodiments, a proxy for one or more connections may allocate, distribute, or generate indications of network congestion via one or more connections in order to induce the senders of the connections to reduce their rates of transmission. The proxy may allocate, distribute, or generate these indications in such a way as to provide quality of service to one or more connections, or to ensure that a number of connections transmit within an accepted bandwidth limit. In other embodiments, a sender of a transport layer connection may have a method for determining a response to congestion indications which accounts for a priority of the connection. In these embodiments, a sender may reduce or increase parameters related to transmission rate at different rates according to a priority of the connection.Type: ApplicationFiled: March 12, 2007Publication date: September 18, 2008Inventor: Robert Plamondon
-
Publication number: 20080225722Abstract: Systems and methods for configuring and evaluating policies that direct processing of one or more data streams are described. A configuration interface is described for allowing users to specify object oriented policies. These object oriented policies may allow any data structures to be applied with respect to a payload of a received packet stream, including any portions of HTTP traffic. A configuration interface may also allow the user to control the order in which policies and policy groups are executed, in addition to specifying actions to be taken if one or more policies are undefined. Systems and methods for processing the policies may allow efficient processing of object-oriented policies by applying potentially complex data structures to unstructured data streams. A device may also interpret and process a number of flow control commands and policy group invocation statements to determine an order of execution among a number of policies and policy groups.Type: ApplicationFiled: March 12, 2007Publication date: September 18, 2008Inventors: Prakash Khemani, Vishal Bandekar
-
Publication number: 20080225723Abstract: An apparatus comprising at least one processor configured to implement a method comprising receiving a path computation request comprising at least one path computation constraint, and determining whether there is a path through an optical network that satisfies the path computation constraints. Also disclosed is an apparatus configured to process a data structure comprising a flags field comprising at least one flag having one of an active state or an inactive state, wherein each flag is representative of an optical quality constraint.Type: ApplicationFiled: March 12, 2008Publication date: September 18, 2008Applicant: FUTUREWEI TECHNOLOGIES, INC.Inventors: Young LEE, Linda DUNBAR
-
Publication number: 20080225724Abstract: A computer implemented method, apparatus, and computer usable code for receiving data from a sender across a network connection for the data transfer. An expected size for a congestion window for the sender is identified. An amount of the data received from the sender is tracked. An acknowledgment is sent in response to the amount of data received from the sender meet in the expected size of the congestion window for the sender.Type: ApplicationFiled: May 28, 2008Publication date: September 18, 2008Applicant: International Business Machines CorporationInventors: Herman Dietrich Dierks, Agustin Mena, Dirk Michel, Jean-Phillipe Sugarbroad
-
Publication number: 20080225725Abstract: A method and apparatus for uplink (UL) starvation avoidance includes determining a current buffer status information. The current buffer status information is reported to an evolved Node B (eNB). A grant that includes a determination of a number of tokens a wireless transmit/receive unit (WTRU) may accumulate is received from the eNB.Type: ApplicationFiled: March 12, 2008Publication date: September 18, 2008Applicant: INTERDIGITAL TECHNOLOGY CORPORATIONInventors: Jin Wang, Mohammed Sammour, Peter S. Wang, Shankar Somasundaram, Stephen E. Terry
-
Publication number: 20080225726Abstract: A system and method for selfish child clustering are disclosed. In one embodiment, the system comprises a selfish node; and a plurality of servicing nodes each connected to the selfish node, wherein the selfish node selects a first one of the servicing nodes to service requests therefrom; and wherein the selfish node evaluates a responsiveness of the first one of the servicing nodes and, responsive to a determination that the responsiveness of the first one of the servicing nodes is unacceptable, the selfish node selects a second one of the servicing nodes to service requests therefrom.Type: ApplicationFiled: March 16, 2007Publication date: September 18, 2008Applicant: NOVELL, INC.Inventor: Jeremy Ray Brown
-
Publication number: 20080225727Abstract: A router checks traffic with respect to the SIP server at reception of a request message addressed to an SIP server from an SIP terminal. If the traffic exceeds a band allocated to the SIP server, the router transfers the request message to a congestion server.Type: ApplicationFiled: February 28, 2008Publication date: September 18, 2008Inventors: Hitoshi YOSHIDA, Hirofumi Masukawa, Kazuma Yumoto, Kazuhiro Kusama
-
Publication number: 20080225728Abstract: Systems and methods for dynamically controlling bandwidth of connections are described. In some embodiments, a proxy for one or more connections may allocate, distribute, or generate indications of network congestion via one or more connections in order to induce the senders of the connections to reduce their rates of transmission. The proxy may allocate, distribute, or generate these indications in such a way as to provide quality of service to one or more connections, or to ensure that a number of connections transmit within an accepted bandwidth limit. In other embodiments, a sender of a transport layer connection may have a method for determining a response to congestion indications which accounts for a priority of the connection. In these embodiments, a sender may reduce or increase parameters related to transmission rate at different rates according to a priority of the connection.Type: ApplicationFiled: March 12, 2007Publication date: September 18, 2008Inventor: Robert Plamondon
-
Publication number: 20080225729Abstract: Apparatus, methods and computer program products provide fast instantaneous overload control during scheduling operations involving users in a wireless communications network who are candidates to be scheduled in a next transmission time interval. Apparatus detect congestion conditions in a wireless communications network by determining an instantaneous operating region of a scheduler (e.g., a medium access control-high speed scheduler) based on required activity detection and prioritize users in a scheduling candidate set based on the cost of a user. In a variant, this may be implemented by combining part of the required activity detection algorithm with a per-bearer cost function. In one implementation, this will limit the number of users that suffer during momentary congestion in the wireless communications network.Type: ApplicationFiled: March 14, 2008Publication date: September 18, 2008Inventors: Troels Kolding, Daniela Laselva, Jens Steiner, Klaus Pedersen, Jeroen Wigard
-
Publication number: 20080225730Abstract: The invention includes an apparatus and method for displaying path metrics associate with nodes and links within a network. The method includes determining path metric values associated with the network. The method further includes displaying only the path metric values that fall within a predetermined set. The predetermined set can be adjustable by a network manager. The predetermined set can include an initial default value and be additionally adjusted by a network manager. The predetermined set associated with a particular node can be based upon a redundancy of paths available to the particular node.Type: ApplicationFiled: March 18, 2008Publication date: September 18, 2008Inventor: Devabhaktuni Srikrishna
-
Publication number: 20080225731Abstract: Erroneous detection of a failure in spite of the absence of failure on the route on account of a communication delay is to be prevented. A node device detects a failure on the route to a remote node device is detected by a failure to receive a packet from the remote node device after the elapse of a determined detection time. The node device sets “remote system transmission interval x detection multiplier” to be a first detecting time on the basis of a packet transmission interval determined by negotiation with the remote node device. It also sets the sum of “remote system actual transmission interval x detection multiplier” and “tolerable delay time” to be a second detecting time. The first detecting time and the second detecting time are compared, and what is longer is determined as the detecting time to be applied to actual operation.Type: ApplicationFiled: December 26, 2007Publication date: September 18, 2008Inventors: Takuro Mori, Kazuma Yumoto, Hitoshi Yoshida
-
Publication number: 20080225732Abstract: An electronic device centralized management apparatus manages a device connected through a network remotely. The apparatus stores information received from the device; extracts information based on a designated attribute of the device from the stored information; and compares a tendency held by the extracted information to a tendency held by the stored information to extract a difference therebetween.Type: ApplicationFiled: February 20, 2008Publication date: September 18, 2008Applicant: FUJITSU LIMITEDInventor: Naomi YOSHIZAWA
-
Publication number: 20080225733Abstract: Methods and arrangements to monitor communication components such as a network adapters for activity, and identify components that have lower than normal levels of activity are provided. An identified communication component can become suspect component and a candidate for further testing, including different forms of interrogation. Process for interrogating candidates can include generating and sending test packets having the media access control (MAC) address of the candidate to the candidate and if activity is not detected subsequent to the interrogation, the candidate can be flagged as a failed component. Correspondingly, the component can be deactivated and removed from service. In a further embodiment, a backup component can be activated and assume the role previously held by the failed component.Type: ApplicationFiled: May 30, 2008Publication date: September 18, 2008Inventors: Binh K. Hua, Sivarama K. Kodukula
-
Publication number: 20080225734Abstract: Methods and apparatus are provided for data rate detection using a data eye monitor. The data rate is one of a plurality of data rates comprising a base rate and one or more divide-by-N multiples of the base rate, where N is an integer. The data rate of a received signal is detected by sampling the received signal; comparing the samples for a plurality of full rate data eyes associated with the received signal to determine if there is a mismatch between at least two predefined samples; and detecting the data rate by evaluating the comparison based on predefined criteria. The comparison can be performed by an exclusive or (XOR) logic gate for samples of at least two adjacent data eyes of a given rate.Type: ApplicationFiled: March 14, 2007Publication date: September 18, 2008Inventors: Dwight D. Daugherty, Mohammad S. Mobin, Gregory W. Sheets, Lane A. Smith, Paul H. Tracy
-
Publication number: 20080225735Abstract: An error correction system determines a level of error correction protection to apply to a frame of video data to be transmitted by a sending endpoint to a receiving endpoint based on the predicted impact of packet loss as well as the importance of the frame based on inter-frame dependencies, frame size, packet loss probability, historical packet loss pattern, central processing unit (CPU) load, and available network bandwidth. At the receiving endpoint, when packet loss is detected for a particular frame, the receiving endpoint will attempt to recover the frame using protection packets received along with the video data.Type: ApplicationFiled: March 14, 2007Publication date: September 18, 2008Applicant: Microsoft CorporationInventors: Jingyu Qiu, Timothy M. Moore, Guo-Wei Shieh, Zong Zong Yuan, Regis Crinon, Arvind Jayasundar
-
Publication number: 20080225736Abstract: Adaptive data transmission is accomplished by allotting transmission to data of a data package via a communications connection. In one embodiment, the steps comprise determining the transmission speed available using an open connection; estimating time of transmission of the data package in accordance with the determined transmission speed and size of the data package; comparing the time of transmission to a predetermined maximum time limit, and if the time of transmission is within the predetermined maximum time limit, allotting transmission via the open connection to the data package; else, if the time of transmission exceeds the predetermined maximum time limit, breaking the data package into segments, each of which fits within the predetermined maximum time limit, assigning priorities to each the segment in accordance with information within each the segment, and allotting transmission via the open connection to the one of the segments having the highest priority.Type: ApplicationFiled: March 15, 2007Publication date: September 18, 2008Inventors: MATTHEW CHARLES COMPTON, Louis Daniel Echevarria, Andrew Gary Hourselt
-
Publication number: 20080225737Abstract: A dynamic rate limiting mechanism for wireless mesh networks. In particular implementations, a method comprising monitoring one or more clients associated with a wireless mesh network and the respective hop counts of the clients to a root mesh node of the wireless mesh network; determining, responsive ton one or more events, a client data rate for one or more clients of the wireless mesh network based on the number of current clients and the respective hop counts of the current clients; and applying the client data rate to the wireless mesh network.Type: ApplicationFiled: March 15, 2007Publication date: September 18, 2008Applicant: Cisco Technology, Inc.Inventors: Xiaohong Gong, Bretton Lee Douglas, Robert B. O'Hara, Brian Donald Hart
-
Publication number: 20080225738Abstract: Systems and methods for analyzing time series data are disclosed. A query including a machine variable identifier may be received. The machine variable identifier may include an identifier pertaining to one or more of a state, a condition and a performance measure for a printer. A first time series data entry may be determined based on the query. The first time series data entry may include a data value and a time entry for the machine variable identifier. One or more second time series data entries may be selected based on the data value associated with the first time series data entry. One or more maintenance operations may be performed based on the one or more second time series data entries.Type: ApplicationFiled: March 16, 2007Publication date: September 18, 2008Inventors: Sankar Virdhagriswaran, John C. Handley
-
Publication number: 20080225739Abstract: A method of monitoring events in network traffic is described herein, in accordance with various embodiments. The method may provide for the reduction in the number of network traffic samples that need to be analysed in order to determine performance criteria for the traffic in the network. By selecting specific samples as representative of the requirements of all the traffic, it may be possible to more efficiently and quickly provide an analysis of the activity of the network.Type: ApplicationFiled: December 23, 2004Publication date: September 18, 2008Applicant: CORVIL LIMITEDInventors: Fergal Toomey, Brian McGurk, Ian Edward Dowse, Matthew Charles Davey
-
Publication number: 20080225740Abstract: A device includes a multistage filter and an elephant trap. The multistage filter has hash functions and an array. The multistage filter is operable to receive a packet associated with a candidate heavy network user and send the packet to the hash functions. The hash functions generate hash function output values corresponding to indices in the array. The elephant trap is connected to the multistage filter. The elephant trap includes a buffer and probabilistic sampling logic. The probabilistic sampling logic is operable to attempt to add information associated with the packet to the buffer a particular percentage of the time based in part on the result of the multistage filter lookup. The buffer is operable to hold information associated with the packet, counter information, and timestamp information.Type: ApplicationFiled: March 15, 2007Publication date: September 18, 2008Inventors: Cecilia Martin, John Huber, Mei Wang, Jonathan Chang, Flavio Bonomi, Sumeet Singh
-
Publication number: 20080225741Abstract: In one embodiment, a method includes receiving label data that indicates all interface labels that belong to each path ID of multiple path IDs associated with corresponding multiple paths between provider edge nodes in a Multi-Protocol Label Switching (MPLS) network. Each interface label is associated with a network interface on a node in the MPLS network. Based on the label data, an untested list that holds data that indicates all unique interface labels is generated. A tested interface selected from the untested list is scheduled for testing. After scheduling, the interface label of the tested interface is removed from the untested list. It is determined whether the untested list still includes data for at least one interface label. If not, then a test of the MPLS network is completed without testing every path end to end, thus conserving network resources.Type: ApplicationFiled: May 5, 2007Publication date: September 18, 2008Inventors: Rajesh Tarakkad Venkateswaran, Avinash Jain, Latha Vasudevarao, Amit Goyal
-
Publication number: 20080225742Abstract: Provided are a scheduling method and apparatus for guaranteeing real-time service quality of Wireless Broadband (WiBro) customer premises equipment (CPE). The scheduling apparatus includes: a real-time protocol (RTP) packet monitoring unit for monitoring an RTP packet passing through a local area network (LAN) section and detecting a bandwidth of real-time service; and a queue managing unit for determining a window size corresponding to the bandwidth of real-time service checked by the RTP packet monitoring unit and generating/changing a real-time service queue. The scheduling method and apparatus monitor an RTP packet and adjust a real-time service queue, thereby ensuring real-time service quality of terminals.Type: ApplicationFiled: September 20, 2007Publication date: September 18, 2008Inventors: Kyu-Ho Cho, Deug-Hyeon Ryu, Ki-Young Lim
-
Publication number: 20080225743Abstract: Quality-of-service information provides details related to data packets, including delay information. A data packet header may be analyzed to determine a portion capable of retaining quality-of-service information. Quality-of-service information may be compressed and placed into the identified portion. The header may be transmitted to a base station, where the quality-of-service information is decompressed, read, and modification of operations occurs as a function of the quality-of-service information.Type: ApplicationFiled: March 12, 2008Publication date: September 18, 2008Applicant: QUALCOMM IncorporatedInventor: Aleksandar Damnjanovic
-
Publication number: 20080225744Abstract: A method of high speed downlink packet access (HSDPA) link adaptation, comprises receiving a channel quality measurement metric over a Measured Results on random access channel (RACH) information element (IE). The link is adapted based upon the received channel quality metric.Type: ApplicationFiled: March 14, 2008Publication date: September 18, 2008Applicant: INTERDIGITAL TECHNOLOGY CORPORATIONInventors: Rocco DiGirolamo, Paul Marinier, Christopher R. Cave
-
Publication number: 20080225745Abstract: A network analysis device for a digital communication network includes a digitizer to digitize a waveform representing a signal to produce a plurality of digital samples indicative of the waveform. The signal is communicated on the network. The network analysis device also includes a processor operable to analyze the digital samples to identify signal events, determine analog characteristics of the signal events, and decode the signal events, which are digital communications between network devices, based on the data, to selectively predict a failure mode.Type: ApplicationFiled: March 18, 2008Publication date: September 18, 2008Applicant: ADC TELECOMMUNICATIONS, INC.Inventors: WILLIAM M. RICHARDSON, LESLIE H. SWANSON, ASHWIN KOVUMMAL, SANDEEPAN MUKHERJEE
-
Publication number: 20080225746Abstract: A method and system for generating packet delay variation (PDV) with a uniformly distributed probability density function (PDF) for packet timing recovery stress testing. A delay-step method determines a delay for each packet in a stream of packets generated at a regular interval. In the delay-step method, delay-steps are determined for each packet based on delay target values. In order to generate PDV with a uniform PDF, the delay target values are randomly selected based on a pre-biased PDF which is a uniform distribution that is pre-biased by a pre-bias function. The pre-bias function increase the values of small delay target values so that an increased number of delay target values are at the extremes of the uniform distribution. This causes the delay-step method to result in PDV with a uniform distribution.Type: ApplicationFiled: February 29, 2008Publication date: September 18, 2008Inventor: Paul Stephan BEDROSIAN
-
Publication number: 20080225747Abstract: A method and system for simulating packet delay variation (PDV) is disclosed. The delay-step method for simulating PDV determines a delay for each packet is a stream of packets generated at a regular interval. Delay target values are randomly selected based on a statistical distribution, such as a Gamma distribution, which models a desired PDV. Delay-steps are determined for each packet based on the delay target values. The delay-steps can be fixed or variable sized steps which are used to adjust the delay of sequential packets. Each of the packets is then transmitted with the delay determined for that packet.Type: ApplicationFiled: February 29, 2008Publication date: September 18, 2008Inventor: Paul Stephan Bedrosian
-
Publication number: 20080225748Abstract: Systems and methods for configuring and evaluating policies that direct processing of one or more data streams are described. A configuration interface is described for allowing users to specify object oriented policies. These object oriented policies may allow any data structures to be applied with respect to a payload of a received packet stream, including any portions of HTTP traffic. A configuration interface may also allow the user to control the order in which policies and policy groups are executed, in addition to specifying actions to be taken if one or more policies are undefined. Systems and methods for processing the policies may allow efficient processing of object-oriented policies by applying potentially complex data structures to unstructured data streams. A device may also interpret and process a number of flow control commands and policy group invocation statements to determine an order of execution among a number of policies and policy groups.Type: ApplicationFiled: March 12, 2007Publication date: September 18, 2008Inventors: Prakash Khemani, Vishal Bandekar
-
Publication number: 20080225749Abstract: Exemplary systems and methods for auto-configuring a network device are provided. In exemplary embodiments, the network device receives network data, which is used to determine identification data for a client. A version of the client identification data is then sent to an ISP by the network device. In response, a public IP address is returned from the ISP. The network device then translates the public IP address into an internal IP address for use with the client. In some embodiments, the network device is verified by a central data center. In some embodiments, the network device may be provisioned for PSTN and/or VoIP calls.Type: ApplicationFiled: March 13, 2007Publication date: September 18, 2008Inventors: Dennis Peng, Jeff Peck, Rex Fernando, Avneesh Sachdev, Simon Capper
-
Publication number: 20080225750Abstract: A method of establishing parameters to facilitate a communication event in a communication network comprising: establishing a first communication event; monitoring at least one parameter used to process data associated with the first communication event; storing said at least one monitored parameter; establishing a second communication event; selecting at least one stored monitored parameter in response to establishing the second communication event; and applying said at least one selected parameter to process data associated with said second communication event.Type: ApplicationFiled: December 20, 2007Publication date: September 18, 2008Inventor: Andrei Jefremov
-
Publication number: 20080225751Abstract: A method and apparatus is disclosed herein for information delivery with network coding over time-varying network topologies. In one embodiment, the method comprises decomposing a sequence of topology graphs that model a time-varying network topology into a plurality of virtual graphs, where each virtual graph of the plurality of virtual graphs corresponds to a distinct traffic class, and the virtual topology graph representing a partial topology of a time-varying network.Type: ApplicationFiled: February 29, 2008Publication date: September 18, 2008Inventors: Ulas C. Kozat, Christine Pepin, Haralabos Papadopoulos, Sean A. Ramprashad, Carl-Erik W. Sundberg
-
Publication number: 20080225752Abstract: A communication resource allocation method for solving resource request imbalance content in a cell is provided. Considering a propagation environment, the base station allocates a whispering resource to a whispering area, the whispering resource being one part of the communication resource and the whispering area being a peripheral area of the first base station, and allocates a speaking resource to a speaking area, the speaking resource being other parts of the communication resource and the speaking area being a border area of a cell. When the resource request of the whispering area is increased, the base station further allocates a part of the speaking resource to the whispering area or increases a ratio of the whispering resource. When the resource request of the speaking area is increased, the base station controls a threshold value for identifying the whispering and speaking areas or increases a ratio of the speaking resource.Type: ApplicationFiled: August 23, 2006Publication date: September 18, 2008Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITInventors: Jae-Kyun Kwon, Jae-Young Ahn, Hyo-Jin Lee, Hee-Soo Lee
-
Publication number: 20080225753Abstract: Systems and methods for configuring and evaluating policies that direct processing of one or more data streams are described. A configuration interface is described for allowing users to specify object oriented policies. These object oriented policies may allow any data structures to be applied with respect to a payload of a received packet stream, including any portions of HTTP traffic. A configuration interface may also allow the user to control the order in which policies and policy groups are executed, in addition to specifying actions to be taken if one or more policies are undefined. Systems and methods for processing the policies may allow efficient processing of object-oriented policies by applying potentially complex data structures to unstructured data streams. A device may also interpret and process a number of flow control commands and policy group invocation statements to determine an order of execution among a number of policies and policy groups.Type: ApplicationFiled: March 12, 2007Publication date: September 18, 2008Inventors: Prakash Khemani, Vishal Bandekar
-
Publication number: 20080225754Abstract: Network architectural roles of packet switching devices are automatically determined by retrieving and analyzing configuration information of the packet switching devices. The retrieved configuration information typically includes operational details of the packet switching operations performed by the packet switching device, with these retrieved operational details being analyzed in order to identify one or more network architectural roles being performed by a particular packet switching device. Examples of such identified network architectural role include, but are not limited to, a customer edge device, a provider edge device, and a user-facing provider edge device. Knowing the architectural role performed by a packet switching device is useful for operations, administration, maintenance and provisioning of networks of these packet switching devices.Type: ApplicationFiled: March 14, 2007Publication date: September 18, 2008Applicant: CISCO TECHNOLOGY, INC.Inventors: Shun Jiang, Ping Wang, Alok Verma
-
Publication number: 20080225755Abstract: The present invention provides secure IP protocol capable storage devices using Virtual Local Area Network (VLAN) techniques. Specific embodiments of the present invention provide techniques for securing VLAN aware storage devices, and the like. In specific embodiments, techniques according to the present invention can provide Internet data centers that are responsible for keeping their customer's computers and storages safe and secure with the capability to strictly separate LAN access for different customers using VLAN (virtual LAN) technology.Type: ApplicationFiled: March 31, 2008Publication date: September 18, 2008Applicant: HITACHI, LTD.Inventor: Takeshi Ishizaki
-
Publication number: 20080225756Abstract: A wireless LAN is comprised of a number of wired infrastructure devices, including at least one access point able to support a number of wireless communication devices configured to operate in the U-APSD mode. The wireless communications devices periodically contending for the wireless medium to transmit trigger messages to the access point and the access point responding by transmitting at least one frame of information. The wireless communications devices operate to synchronize the transmission of their trigger messages such that the possibility that the messages collide with one another is minimized.Type: ApplicationFiled: March 13, 2007Publication date: September 18, 2008Inventors: Keith R. Amann, Mark A. Hamilton, Oliver J. Krahn
-
Publication number: 20080225757Abstract: A system and method for interactive web based learning may include providing at least one teaching node accessible by at least one teacher, and providing at least one student node accessible by at least one student. A bidirectional live interface may be provided between the at least one teaching node and the at least one student node. The bidirectional live interface may enable the student node to receive at least one of an audio, a video or a text based communication from the at least one teaching node. The bidirectional live interface may also enable the at least one teaching node to receive at least one of an audio, a video or a text based communication from the at least one student node.Type: ApplicationFiled: July 30, 2007Publication date: September 18, 2008Inventor: Byron Johnson
-
Publication number: 20080225758Abstract: A repeater environment is provided operative to deploy a feedback cancellation loop that is adaptively coupled with an antenna array such that a selected metric can be derived by deploying a selected filter bank having an automatic gain control operative to process the signal on a bin by bin basis and the derived metric can be applied to the antenna array and feedback cancellation loop combination to improve signal integrity and amplification. In an illustrative implementation, an exemplary repeater environment comprises, a transmitter, a receiver, an equalized feedback cancellation loop circuitry comprising a filter bank, the cancellation loop being operatively coupled to an antenna array. In the illustrative implementation, the feedback cancellation loop can receive signals as input from a cooperating antenna array and provide output signals such as a feedback leakage signal to a cooperating antenna array.Type: ApplicationFiled: March 3, 2008Publication date: September 18, 2008Applicant: QUALCOMM INCORPORATEDInventors: James A. Proctor, Kenneth M. Gainey, James C. Otto
-
Publication number: 20080225759Abstract: A radio communication apparatus that transmits and receives a signal via an antenna duplexer, the apparatus that includes a dividing unit that divides part of a transmitting signal to be transmitted via the antenna duplexer. Also included is a conversion unit that converts a receiving signal of a first frequency band received via the antenna duplexer into a second frequency band lower than the first frequency band. In addition, the apparatus includes an extraction unit converting a noise component of the first frequency band included in the transmitting signal divided by the dividing unit into the second frequency band and extracting the noise component. Moreover, the apparatus includes an inversion unit that inverts the phase of the noise component extracted by the extraction unit. Also included is a combining unit that combines the receiving signal converted by the conversion unit and the noise component inverted by the inversion unit.Type: ApplicationFiled: February 27, 2008Publication date: September 18, 2008Inventors: Junya Morita, Shin Watanabe
-
Publication number: 20080225760Abstract: An access gateway comprises a processor. The processor is operable to determine a message type of a received packet. The processor is further operable to apply a paging rule. The paging rule is related at least in part to the message type of the received packet. The processor is further operable to determine whether to send a request to transition the mobile device to an active state based on the paging rule. The processor is further operable to send a request, when appropriate, to transition the mobile device to an active state.Type: ApplicationFiled: March 13, 2007Publication date: September 18, 2008Inventors: Jayaraman R. Iyer, Anand K. Oswal, Michael Lindsay Shannon, Timothy P. Stammers
-
Publication number: 20080225761Abstract: One method of estimating timing and frequency information of a payload transmitted through two or more frequency separated channels combines training fields from preambles from the two or more frequency separated channels to construct combined values that may be used to estimate the frequency and timing information. In one embodiment, the combined values may be determined by combining self-correlated training fields from the frequency separated channels. Another method of estimating the timing and frequency information selects the training fields from the preamble of one of the frequency separated channels based upon a signal quality metric. In another embodiment, the selection of the training fields based upon a signal quality metric may be biased to favor a particular channel.Type: ApplicationFiled: February 14, 2008Publication date: September 18, 2008Inventor: Ning Zhang
-
Publication number: 20080225762Abstract: A communications network for making information available to a one or more government agencies. The network comprises antennas on publicly operated facilities, transceivers for sending messages to and receiving messages from one or more of the antennas, routers responsive to messages received at the antennas for routing the messages on a network path to a desired destination, the routers also responsive to messages from a source on the communications network for routing the messages to antennas and wherein the routers are controlled to route the messages to a desired destination, the desired destination determined by the existence of a situation involving users who can benefit from the information in the message.Type: ApplicationFiled: March 7, 2008Publication date: September 18, 2008Inventor: Mark Patrick Soliman