Patents Issued in October 12, 2017
-
Publication number: 20170295058Abstract: A communication circuit for providing communication to an actuator. The communication circuit includes a device interface and a network interface. The device interface is configured to provide a serial communication link between the communication circuit and a processing circuit of the actuator. The network interface is in electronic communication with the device interface, and configured to communicate with an external network. The device interface is configured to receive data values from the actuator via the serial communication link. The device interface is further configured to populate one or more attributes of an equipment object stored in the device interface with the received data values. The network interface is further configured to map the attributes of the equipment object with individual networking objects, and write the attributes to the mapped individual networking objects. The network interface further configured to communicate the individual networking objects to the external network.Type: ApplicationFiled: July 11, 2016Publication date: October 12, 2017Applicant: Johnson Controls Technology CompanyInventors: Donald A. Gottschalk, Michael R. Brownie, Gary A. Romanowich, Robert K. Alexander, Nathan J. Vandermause
-
Publication number: 20170295059Abstract: A remote execution request is received from a client, specifying first and second remote execution tools and execution data pertaining to the tools and comprising a query to select host machines. First and second host machines are selected in view of a result of the query and the first and second tools. A script is generated in view of the execution data and first metadata describing components of the host machines. A plurality of execution proxy machines are selected in view of the first and second hosts. A first template associated with the first tool and a second template associated with the second tool are generated in view of the script. The first template and the second template are transmitted to first and second execution proxy machines, respectively. Outputs from remote execution of the templates are received from the first and second hosts and transmitted to the client.Type: ApplicationFiled: September 23, 2016Publication date: October 12, 2017Inventors: Ivan Necas, Marek Hulán, Justin Sherrill, Stephen Benjamin, Adam Růžička
-
Publication number: 20170295060Abstract: Techniques are described for managing communications between multiple computing nodes, such as for computing nodes that are part of managed virtual computer networks provided on behalf of users or other entities. In some situations, one or more of the computing nodes of a managed virtual computer network is configured to perform actions to extend capabilities of the managed virtual computer network to other computing nodes that are not part of the managed virtual computer network, such as by forwarding communications between computing nodes of the managed virtual computer network and the other external computing nodes so as to enable the other external computing nodes to participate in the managed virtual computer network. In some situations, the computing nodes may include virtual machine nodes hosted on one or more physical computing machines or systems, such as by or on behalf of one or more users.Type: ApplicationFiled: June 19, 2017Publication date: October 12, 2017Inventors: Daniel T. Cohn, Eric Jason Brandwine, Andrew J. Doane
-
Publication number: 20170295061Abstract: A hybrid routing—application network fabric apparatus is presented where a fabric apparatus has multiple apparatus components or resources that can be dedicated to one or more application topologies. The apparatus can receive a topology image definition file describing an application topology and the apparatus can dedicate its local components for use with the application topology. The apparatus can dedicate general purpose processing cores, dedicated routing cores, data channels, networking ports, memory or other local resources to the application topology. Contemplated application topologies include routing topologies, computation topologies, database topologies, storage topologies, or other types of application topologies. Furthermore, application topologies can be optimized by modeling or simulating the topologies on a network fabric.Type: ApplicationFiled: June 16, 2017Publication date: October 12, 2017Applicant: Nant Holdings IP, LLCInventor: Thomas Wittenschlaeger
-
Publication number: 20170295062Abstract: A method, device and system for configuring runtime environment are provided, wherein the method includes: a server acquires configuration information about runtime environments of clients, wherein the configuration information is used for configuring the runtime environment (S102); and the server sends the configuration information to the clients (S104). The technical problem existing in the related art that configuration efficiency of a runtime environment is relatively low is solved, and by virtue of the implement of configuration of the runtime environment of the client by the server, the configuration efficiency of the runtime environment is improved.Type: ApplicationFiled: May 29, 2015Publication date: October 12, 2017Inventor: Hailong TANG
-
Publication number: 20170295063Abstract: In one embodiment, a device receives control logic programmed within at least one controller included within an industrial network. The device also determines a network topology of the industrial network, and derives a network policy for the industrial network based upon, at least in part, the control logic and the network topology.Type: ApplicationFiled: April 8, 2016Publication date: October 12, 2017Inventors: Xuechen Yang, Rudolph B. Klecka, III
-
Publication number: 20170295064Abstract: Novel tools and techniques for Internet service providers to enable enhanced user control over content delivery. In an aspect of certain embodiments, these tools can allow the customer to select, on a variety of different bases, whether content should be obtained from the Internet or from a lower-cost source, such as a metropolitan content delivery network (“CDN”) operated by the ISP or a private peering connection with a content source. Both of these options can, for example, avoid accessing content over the Internet and thus can reduce ISP delivery costs. In some embodiments, these cost reductions can be passed to the consumer in the way the ISP accounts for the content delivery.Type: ApplicationFiled: June 27, 2017Publication date: October 12, 2017Inventor: Michael K. Bugenhagen
-
Publication number: 20170295065Abstract: Manual discovery of devices in a device management environment can be performed from a management server. The manual discovery process can enable the discovery process to be initiated at the management server and can be performed without requiring an administrator or other user to manually configure each device to initiate and perform the discovery process. To discover devices to be managed, the management server, which can be a cloud based server or Software as a Service based server, can send a registration request to an on-premise server. The on-premise server can then relay this registration request to all devices on the same network infrastructure. The agent on each device can be configured to listen for such registration requests, and in response to receiving a registration request, can automatically register with the management server using information contained in the registration request. In this way, the management server can manually discover devices.Type: ApplicationFiled: April 6, 2016Publication date: October 12, 2017Inventors: Shailesh Jain, Prashanth Devendrappa
-
Publication number: 20170295066Abstract: The present disclosure generally discloses a network infrastructure virtualization mechanism configured to support virtualization of the network infrastructure (NI) of a communication network to provide thereby a virtualized infrastructure (VI) for the communication network. The network infrastructure virtualization mechanism may be configured to support virtualization of infrastructure resources (IRs) of the network infrastructure to provide virtualized infrastructure resources (VIRs) of the network infrastructure. The IRs of the communication network may include network resources (NRs) which may be virtualized to provide virtualized network resources (VNRs) and service resources (SRs) which may be virtualized to provide virtualized service resources (VSRs).Type: ApplicationFiled: April 6, 2016Publication date: October 12, 2017Applicant: Alcatel-Lucent Canada Inc.Inventors: Don R. Ellis, Sylvain Chenard, Martin M. Charbonneau
-
Publication number: 20170295067Abstract: A site asymmetric topology reconciliation module (SATRM) provides a stable topology for nodes located at different sites of the cluster during loss and reconnection of communication links between the sites. The SATRM monitors the cluster topology for changes in communication links between nodes. When there is an unstable cluster topology due to a loss in the communication links, the SATRM severs links to one or more sites to create a stable topology. When a communication links recovers, the SATRM merges sites to create a stable topology with the sites connected with the recovered communication links.Type: ApplicationFiled: April 12, 2016Publication date: October 12, 2017Inventors: Myung M. Bae, Esdras E. Cruz-Aguilar, Perinkulam I. Ganesh, Savitri Hunasheekatti, Dimpu K. Nath
-
Publication number: 20170295068Abstract: Techniques are disclosed for building a logical network topology in a computer network. According to one embodiment of the present disclosure, traffic activity in the computer network is monitored. One or more attributes of the computer network (e.g., patterns of connectivity, intensity, and frequency between network components) is identified based on the monitored traffic activity. The logical network topology is generated from the one or more network traffic attributes.Type: ApplicationFiled: April 21, 2016Publication date: October 12, 2017Inventors: Tao YANG, Ming-Jung SEOW, Gang XU
-
Publication number: 20170295069Abstract: Embodiments include devices and methods for managing network communication of an unmanned autonomous vehicle (UAV). A processor of the UAV may determine an altitude of the UAV. The processor may optionally also determine a speed or vector of the UAV. Based on the determined altitude and/or speed/vector of the UAV, the processor may adjust the communication parameter of the communication link between the UAV and a communication network. The processor may transmit signals based on the adjusted communication parameter, which may reduce radio frequency interference caused by the transmissions of the UAV with the communication network.Type: ApplicationFiled: July 15, 2016Publication date: October 12, 2017Inventors: Charles Wheeler Sweet, III, Edward Harrison Teague, Michael Franco Taveira
-
Publication number: 20170295070Abstract: Techniques are disclosed for processing data collected from network components for analysis by a machine learning engine of a Cognitive AI System. A network data processing driver receives a stream of data from a data collector which obtains data from one or more network data sources. The driver normalizes the stream of data to one or more feature values each corresponding to the network data sources and generates a sample vector from the feature values. The sample vector is formatted to be analyzed by the machine learning engine.Type: ApplicationFiled: April 6, 2017Publication date: October 12, 2017Inventors: Tao YANG, Ming-Jung SEOW
-
Publication number: 20170295071Abstract: In one embodiment, a device receives a network policy based upon, at least in part, a physical network, and configures a design of an industrial network overlay on the physical network based upon, at least in part, the network policy. The configuring, according to the techniques herein, may generally include: determining a number of virtual local area networks (VLANs) within the industrial network overlay; determining which devices of the physical network are on which VLAN; determining placement of at least one virtual firewall within the industrial network overlay; and determining at least one communication path for the industrial network overlay between at least two devices.Type: ApplicationFiled: April 8, 2016Publication date: October 12, 2017Inventors: Xuechen Yang, Rudolph B. Klecka, III, Pascal Thubert, Patrick Wetterwald, Eric Levy-Abegnoli
-
Publication number: 20170295072Abstract: Systems and methods for automated content selection and/or distribution are disclosed herein. The system can include a packet selection system including a recommendation engine. The recommendation engine can select a next data packet that can include content for delivery to a user device. The system can include a presentation system including a presenter module. The presenter module can receive an indication of the selected next data packet and send the content for delivery to the user device via an electrical communication. The system can include a response system including a response processor. The response processor can receive a response from the user device, and the response processor can determine whether the received response is a desired response. The system can include a summary model system including model engine, and a messaging bus.Type: ApplicationFiled: August 12, 2016Publication date: October 12, 2017Inventor: Greg McFall
-
Publication number: 20170295073Abstract: A service deployment method and apparatus is disclosed. A controller determines a policy according to user equipment UE track information sent by a data analysis platform, and deploys a service policy, so as to ensure that a service function is deployed in a mobile network as needed, thereby avoiding network resource waste that may be caused by a static service configuration.Type: ApplicationFiled: June 23, 2017Publication date: October 12, 2017Inventor: Wenfu Wu
-
Publication number: 20170295074Abstract: Examples disclosed herein relate to controlling an unknown flow inflow to an SDN controller in a software defined network (SDN). In an example, an optimizer may be provided, between a switch and an SDN controller, to intercept an unknown flow from the switch to the SDN controller, in a software defined network. A portion of a data packet from each data packet in a plurality of data packets from the unknown flow may be aggregated at the optimizer. Only the aggregated portion of the data packet from each data packet may be sent, from the optimizer to the SDN controller, in a single package.Type: ApplicationFiled: April 16, 2015Publication date: October 12, 2017Applicant: HEWELETT PACKARD ENTERPRISE DEVELOPMENT LPInventors: Sugesh CHANDRAN, Subin Cyriac MATHEW, Celestian KANIAMPADY SEBASTIAN
-
Publication number: 20170295075Abstract: Client communication is dependent on a client device and client attributes. A computerized method includes the following steps: acquiring a set of behavioral information; acquiring a set of client device information; determining a set of recommended attributes for a communication strategy based upon the sets of client and device information; implementing the communication strategy by sending a first client inquiry to the client via the client device, wherein the first client inquiry is based at least in part on the set of recommended attributes of the communication strategy; analyzing a client response to the first client inquiry; refining, based upon the client response to the client inquiry, the set of recommended attributes to form a set of revised attributes; and sending a second client inquiry to the client via the client device, wherein the second client inquiry is based upon the set of revised attributes.Type: ApplicationFiled: April 11, 2016Publication date: October 12, 2017Inventor: Eric R. Roebuck
-
Publication number: 20170295076Abstract: The invention relates to a method for accessing data related to at least one operation implemented by at least one node device (N1) of a network (R) from a plurality of node devices (N1, N2, N3) of said network, which are capable of communicating via a first communication link (L1). According to the invention, the access method is suitable for receiving a message through which a node device signals, to an observation device, an operation implemented by said node device; for recording at least one piece of information on said operation; and, upon receiving a request from a terminal via a second communication link, for transmitting a response developed from at least part of the recorded information. The invention also relates to a data-transmission method. The invention further relates to an observation device (DT) and to a node device (N1) of a network which implement the access method and the transmission method, respectively.Type: ApplicationFiled: September 30, 2015Publication date: October 12, 2017Inventors: Quentin Lampin, Dominique Barthel
-
Publication number: 20170295077Abstract: A network routing server can be configured to receive client requests from multiple client devices and route the client requests to optimal service providers to service the request. To determine which service provider is optimal to service the client request, the network routing service can analyze multiple factors, such as geographic location of the client, geographic location of the service providers, and health metrics describing service quality of the various service providers. Health metrics can include Central Processing Unit (CPU) usage, bandwidth, memory usage, connectivity, service providers network status, network latency, user capacity saturation, etc. Based on an analysis of this data, the network routing service can determine the service provider that is best suited to service the client request and route the client request accordingly.Type: ApplicationFiled: July 22, 2016Publication date: October 12, 2017Inventors: Karl Dyszynski, Steven C. Work
-
Publication number: 20170295078Abstract: A system used for identifying issues within a telecom network. Data is obtained from sources including probes and network elements. KPIs are identified for real-time streaming aggregation. Streaming data related to the KPIs is aggregated and an approximation of count-distinct subscribers and volume count is calculated, as well as count-distinct subscribers aggregating by each identified KPI. Drill objects found in the aggregated data are identified based on the calculations and real-time trending records are generated and stored for each drill object using an exponential moving average. Baseline averages are generated based on the real-time trending records. An increase in errors can then be detected based on the baseline averages and additionally aggregated real-time streaming data. Deviations in each drill object contributing to the detected increase in errors are then analyzed and a full case report is generated based on details of the deviations.Type: ApplicationFiled: March 27, 2017Publication date: October 12, 2017Inventors: Carlo Medas, Davide Motta
-
Publication number: 20170295079Abstract: Methods and systems are provided for detecting dead tunnels associated with a VPN. An indicator of a tunnel capability, for example, a DPD vendor ID, is received from a peer through a VPN connection. The tunnel capability is associated with one or more phase II tunnels associated with the VPN. Traffic generated by the peer is detected, and if traffic is detected at a tunnel, the tunnel is presumed to be alive. When no traffic is detected in a tunnel, a DPD packet exchange with the tunnel is initiated. A determination is made, based on the packet exchange, whether the tunnel is alive.Type: ApplicationFiled: June 26, 2017Publication date: October 12, 2017Inventors: Zhong Chen, Aravind Thangavelu, Dong Xiang, Yanjun Yang
-
Publication number: 20170295080Abstract: A method for monitoring connections for communicating data is provided. The method includes monitoring communication of data from a device over a connection. A current connection performance parameter for the connection is determined based on the monitoring. The current connection performance parameter is compared with a predetermined threshold. If the current connection performance parameter is less than or equal to the predetermined threshold, the connection is determined to be degraded. An alert may be provided to a user if the connection is determined to be degraded and an alert condition is met.Type: ApplicationFiled: April 7, 2016Publication date: October 12, 2017Inventors: MICHAEL D. BROOKS, ALAN HOLLINGSHEAD, JULIAN C. HORN, PHILIP I. WAKELIN
-
Publication number: 20170295081Abstract: In one embodiment, network information associated with a plurality of nodes in a network is received at a device in a network. From the plurality of nodes, a node is selected based on a determination that the selected node is an outlier among the plurality of nodes according to the received network information. Then, a probe is sent to the selected node, and in response to the probe, a performance metric is received from the selected node at the device.Type: ApplicationFiled: June 22, 2017Publication date: October 12, 2017Inventors: Grégory Mermoud, Jean-Philippe Vasseur, Diane Bouchacourt
-
Publication number: 20170295082Abstract: Concepts and technologies disclosed herein are directed to an auto-scaling software-defined monitoring (“SDM”) platform for software-defined networking (“SDN”) service assurance. According to one aspect of the concepts and technologies disclosed herein, an SDM controller can monitor event data associated with a network even that occurred within a virtualized IP SDN network that is monitored by a virtualized SDM resources platform. The SDM controller can measure, based upon the event data, a quality of service (“QoS”) performance metric associated with the virtualized SDM resource platform. The SDN controller can determine, based upon the QoS performance metric, whether an auto-scaling operation is to be performed. The auto-scaling operation can include reconfiguring the virtualized SDM resources platform by adding virtual machine capacity for supporting event management tasks either by instantiating a new virtual machine or by migrating an existing virtual machine to a new hardware host.Type: ApplicationFiled: April 7, 2016Publication date: October 12, 2017Applicant: AT&T Intellectual Property I, L.P.Inventors: Tsong-Ho Wu, Wen-Jui Li, Hasan Erkan
-
Publication number: 20170295083Abstract: A method for monitoring connections for communicating data is provided. The method includes monitoring communication of data from a device over a connection. A current connection performance parameter for the connection is determined based on the monitoring. The current connection performance parameter is compared with a predetermined threshold. If the current connection performance parameter is less than or equal to the predetermined threshold, the connection is determined to be degraded. An alert may be provided to a user if the connection is determined to be degraded and an alert condition is met.Type: ApplicationFiled: October 17, 2016Publication date: October 12, 2017Inventors: MICHAEL D. BROOKS, ALAN HOLLINGSHEAD, JULIAN C. HORN, PHILIP I. WAKELIN
-
Publication number: 20170295084Abstract: Methods, systems, and computer readable media for emulating network traffic patterns on a virtual machine are disclosed. In one example, the method includes generating a user specification based on a plurality of network traffic patterns and computer processing usage patterns and receiving, at a virtual machine hosted by a DUT, the user specification containing the plurality of network traffic patterns and computer processing usage patterns. The method further includes generating a plurality of network traffic sequences based on the plurality of network traffic patterns and a plurality of computer processing usage pattern instruction sequences based on the plurality of computer processing usage patterns.Type: ApplicationFiled: April 6, 2016Publication date: October 12, 2017Inventors: Avinash Ramanath, Sergey Lvov, Gheorghe Mihai Puchiu
-
Publication number: 20170295085Abstract: A method for testing a composite service is provided. The method may include installing a first debug probe on a first service. The method may include installing a second debug probe on a second service. The method may include executing the composite service, whereby the composite service comprises the first service and the second service. The method may include receiving a first service interaction log and a second service interaction log, whereby the first interaction log records a first plurality of I/O, and whereby the second interaction log records a second plurality of I/O. The method may include generating a global scheduling script based on the first service interaction log and the second interaction log. The method may include sending the first plurality of I/O to the first debug probe and the second plurality of I/O to the second debug probe based on the global scheduling script.Type: ApplicationFiled: April 12, 2016Publication date: October 12, 2017Inventors: Hong Liang Han, Xin Peng Liu, Bing Dong Ma, Jeremiah S. Swan
-
Publication number: 20170295086Abstract: A single global traffic optimizer can be configured to perform the functionality of a global and local traffic manager. For example, the global traffic optimizer can receive a client request from a client device and route the client request to an appropriate service provider from a set of geographically dispersed service providers to service the client request. In addition to the geographic location data of the client device and service providers, the global traffic optimizer can also analyze health metrics describing service quality of the various service providers, such as Central Processing Unit (CPU) usage, bandwidth, memory usage, connectivity, service provider's network status, network latency, user capacity saturation, etc. Based on an analysis of this data, the global traffic optimizer can determine the service provider that is best suited to service the client request and route the client request accordingly without need for a local traffic manager.Type: ApplicationFiled: July 22, 2016Publication date: October 12, 2017Inventors: Karl Dyszynski, Steven C. Work
-
Publication number: 20170295087Abstract: A link cost determining method including computing, by a station, a new composite data rate using a set of data rates including an average data rate, a geometric mean data rate, and a minimum data rate for data samples, computing, by the station, a pair of hysteresis thresholds for a previous composite data rate, determining, by the station, whether the new composite data rate exceeds one of the pair of hysteresis thresholds, and advertising, by the station, the new composite data rate when the new composite data rate exceeds one of the pair of hysteresis thresholds.Type: ApplicationFiled: June 26, 2017Publication date: October 12, 2017Applicant: Futurewei Technologies, Inc.Inventor: Donald E. Eastlake, III
-
Publication number: 20170295088Abstract: A path discovery process is provided for discovering a lowest cost combination of a plurality of paths from the source node to the destination node via links between pairs of nodes along the paths. A path discovery messages from a source node is forwarded through the network. Prior to forwarding the path discovery message a node tests one or more conditions for disabling the forwarding. Upon receiving an instance of the path discovery message, this may include testing whether no other instance of the path discovery message has both smaller cost and a previous path that contains only nodes that occur also in the path of the received instance. Furthermore, this may include testing whether a destination of the path discovery message was also a node to which a preceding node along the path has a further link, and a cost of the path from the preceding node to the next node via said further link is not larger than the cost of the path from the preceding node to the next node.Type: ApplicationFiled: September 7, 2015Publication date: October 12, 2017Applicant: Nederlandse Organisatie voor Toegepast-natuurwetenschappelijk onderzoek TNOInventors: Borgert Jan van der Kluit, Adrianus Cornelis Gerardus Holtzer, Bart Michel Magdalena Gijsen, Hendrik Bernard Meeuwissen
-
Publication number: 20170295089Abstract: A process is implemented by a network device for enabling the provisioning of explicit trees in a network by reporting link aggregation group (LAG) configuration information to a path computation element (PCE). The network device implements a LAG module and an intermediate system-intermediate system (IS-IS) module that includes an IS-IS path control and reservation module (ISIS-PCR). The process includes reporting LAG configuration by the LAG module to the IS-IS module within the network device, sending a link state protocol data unit (PDU) (LSP) with the LAG configuration in a LAG sub type length value (TLV) by the ISIS-PCR, receiving, by the IS-IS module, an explicit tree that specifies at least one virtual local area network (VLAN) identifier (VID) to an aggregation link of the LAG assignment, and translating, by the ISIS-PCR module, the explicit tree into a LAG configuration, the LAG configuration specifying a conversation to aggregation link assignment.Type: ApplicationFiled: September 3, 2015Publication date: October 12, 2017Inventors: Panagiotis SALTSIDIS, János FARKAS
-
Publication number: 20170295090Abstract: Memory devices, methods and systems are described in which a non-transitory memory device stores instructions that, when executed by a processor, cause the processor to: receive, via an input component, at least one message from a network element in a multi-layer network comprising information indicative of at least one failure of a working path; determine based at least in part on information indicative of a data transport path coincident with the working path in a second layer in the network different from the first layer, an alternate path in the first layer for transmission of the data through the multi-layer network; and transmit, via an output component, at least one signal comprising configuration instructions to at least one line module, the configuration instructions directing the line module to switch and transmit the data using the alternate path.Type: ApplicationFiled: April 7, 2017Publication date: October 12, 2017Inventors: Abishek Gopalan, Rajan Rao, Biao Lu
-
Publication number: 20170295091Abstract: One embodiment provides a system that facilitates routable prefix queries in a CCN. During operation, the system generates, by a client computing device, a query for one or more indices based on a name for an interest, wherein a name is a hierarchically structured variable length identifier that includes contiguous name components ordered from a most general level to a most specific level. An index indicates a number of the contiguous name components beginning from the most general level that represent a routable prefix needed to route the interest to a content producing device that can satisfy the interest. In response to the query, the system receives the one or more indices, which allows the client computing device to determine a remaining number of name components of the interest name which can be encrypted, thereby facilitating protection of private communication in a content centric network.Type: ApplicationFiled: April 11, 2016Publication date: October 12, 2017Applicant: CISCO TECHNOLOGY, INC.Inventors: Christopher A. Wood, Glenn C. Scott
-
Publication number: 20170295092Abstract: Aspects of the present disclosure involve systems, methods, computer program products, and the like, for collaboration conferencing with multiple participants over a communications network, and more specifically for a conferencing routing service for managing and routing collaboration participants. A collaboration conferencing routing server may provide configurability in routing a collaboration conference to a conference bridge based on any number of criteria and information about the requester and the communications network on which the conference occurs.Type: ApplicationFiled: June 26, 2017Publication date: October 12, 2017Inventors: Andrew James Broadworth, Darren James Behmlander, Adam C. Uzelac
-
Publication number: 20170295093Abstract: Presented herein are hybrid approaches to multi-destination traffic forwarding in overlay networks that can be used to facilitate interoperability between head-end-replication-support network devices (i.e., those that only use head-end-replication) and multicast-support network devices (i.e., those that only use native multicast). By generally using existing tunnel end-points (TEPs) supported functionality for sending multi-destination traffic and enhancing the TEPs to receive multi-destination traffic with the encapsulation scheme they do not natively support, the presented methods and systems minimize the required enhancements to achieve interoperability and circumvents any hard limitations that the end-point hardware may have. The present methods and systems may be used with legacy hardware that are commissioned or deployed as well as new hardware that are configured with legacy protocols.Type: ApplicationFiled: May 23, 2016Publication date: October 12, 2017Inventors: Victor Moreno, Shyam Kapadia, Murali Venkateshaiah, John Lo, Liqin Dong
-
Publication number: 20170295094Abstract: Techniques for providing access control in environments that may become disconnected, as a whole, from other networks (e.g., on-board a vehicle) may include locally storing access control information within the dis-connectable environment, and locally providing discovery and authentication/authorization services. Local services and/or applications may be registered and authenticated and client applications may be authenticated and/or authorized to one or more locally provided services and/or applications even when the environment is in a disconnected state. Local access control information may be synchronized with source access control information stored externally to the environment (e.g., on the ground).Type: ApplicationFiled: April 7, 2016Publication date: October 12, 2017Inventors: Mark Jackson, Christopher M. Rippe, Michael Metz
-
Publication number: 20170295095Abstract: Methods, systems, and computer readable media can be operable to facilitate the mapping of packet identifiers to a constant value. A multimedia device may receive one or more pieces of multimedia content and may select a constant PID value for each of one or more component streams associated with the content. The multimedia device may map PIDs of each respective one of the one or more component streams to a constant PID value designated for the component type of the respective component stream. The multimedia device may replace the PIDs of each component stream with constant PID values such that each component stream type includes the same PID value for the entirety of the stream. The modified component streams, each having continuity with respect to PID values, may be stored as a recording or output to a device for viewing.Type: ApplicationFiled: April 6, 2016Publication date: October 12, 2017Inventors: Lakshmi Arunkumar, Manu Shrot, Murali S. Sahasranaman, Krishna Prasad Panje, Virendra Singh
-
Publication number: 20170295096Abstract: Routing messages between virtual networks using a mapping of virtual addresses from one virtual network to a virtual address of the other virtual network. Each virtual network has a valid set of virtual addresses, some of which being assigned to virtual nodes within the corresponding network. When a virtual network identifies a message to be sent, it identifies a destination for the message. Some destinations may be within the same virtual network and thus may be routed to virtual nodes within the virtual network. Other destinations may instead be mapped to a virtual address of another virtual network. In that case, routing information may also be obtained and the message may be dispatched to the virtual address of the other virtual network. This may be performed without the need for a gateway, which publishes a public address that is globally unique.Type: ApplicationFiled: June 27, 2017Publication date: October 12, 2017Inventor: Parveen Patel
-
Publication number: 20170295097Abstract: A system for creating a session entry and forwarding an IP packet includes memories that store session and session template tables, and first and second processors in communication with the memories. When the first processor receives the IP packet, it determines whether the session table includes a session entry corresponding to the IP packet. If the session table does not include the session entry, the first processor determines whether the session template table includes a session template entry corresponding to the IP packet. The first processor generates the session entry using the session template entry and the IP packet. If the session template table does not include the session template entry, the first processor forwards the IP packet to the second processor, which generates the session template entry and the session entry.Type: ApplicationFiled: April 7, 2016Publication date: October 12, 2017Inventors: KUMARA SWAMY GANJI, PATEL RAVIKANTH REDDY
-
Publication number: 20170295098Abstract: A firmware controller of a node of a distributed system determines a self-regulation threshold for at least one metric associated with traffic transmitted via an interconnect. The threshold is set to a value lower than the maximum permitted by the interconnect protocol. The controller transmits a request to an application-layer traffic endpoint to limit traffic based on the threshold. A hardware congestion management unit collects measurements on traffic metrics, including at least one metric other than the one for which the threshold is defined. Based on measurements obtained from the hardware congestion management unit, the controller modifies the self-regulation threshold and notifies the application-layer endpoint.Type: ApplicationFiled: April 7, 2016Publication date: October 12, 2017Inventors: John Watkins, Joseph Wright
-
Publication number: 20170295099Abstract: A method and apparatus of a device that queues an out-of-order packet received on a multi-link group is described. In an exemplary embodiment, the device receives a packet on a link of the multi-link group of a network element, where the packet is part of a data flow. The device further examines the packet, if the packet is associated with a re-orderable route. In addition, the device examines the packet by retrieving a packet sequence number from the packet and comparing the packet sequence number with the last received sequence number for this data flow. The device transmits the packet if the packet is a next packet in the data flow. If the packet is out-of-order, the device queues the packet.Type: ApplicationFiled: April 11, 2016Publication date: October 12, 2017Inventor: James Murphy
-
Publication number: 20170295100Abstract: Example methods are provided for a source virtual tunnel endpoint (VTEP) to perform congestion-aware load balancing in a data center network. The method may comprise the source VTEP learning congestion state information associated with multiple paths provided by respective multiple intermediate switches connecting the source VTEP with a destination VTEP. The method may also comprise the source VTEP receiving second packets that are sent by a source endpoint and destined for a destination endpoint; and selecting a particular path from multiple paths based on the congestion state information. The method may further comprise the source VTEP generating encapsulated second packets by encapsulating each of the second packets with header information that includes a set of tuples associated with the particular path; and sending the encapsulated second packets to the destination endpoint.Type: ApplicationFiled: April 11, 2017Publication date: October 12, 2017Applicant: Nicira, Inc.Inventors: Mukesh HIRA, Naga KATTA, Isaac KESLASSY, Aditi GHAG
-
Publication number: 20170295101Abstract: Example methods are provided for a first switch to perform congestion-aware load balancing in a data center network. The method may comprise: receiving probe packets from multiple next-hop second switches that connect the first switch with a third switch via multiple paths. The method may also comprise: processing congestion state information in each probe packet to select a selected next-hop second switch from the multiple next-hop second switches, the selected next-hop second switch being associated with a least congested path from the first switch to the third switch. The method may further comprise: in response to receiving data packets from a fourth switch that are destined for a destination connected with the third switch, sending the data packets to the selected next-hop second switch such that the data packets travel to the third switch along the least congested path.Type: ApplicationFiled: April 11, 2017Publication date: October 12, 2017Applicant: Nicira, Inc.Inventors: Mukesh HIRA, Naga KATTA
-
Publication number: 20170295102Abstract: Load balancing in a multimedia conference is disclosed, involving one or more internal terminals (Terminal 3) and one or more internal nodes (Node B) separated from one or more external terminals (Terminal 1, Terminal 2) and one or more external nodes (Node A) by a firewall. Media data from at least one of said terminals received at at least a first one of said nodes are forwarded through the firewall to at least a second one of the nodes, and received media data at the at least a second one of said nodes are processed by the second one of the nodes. At a first event, reconfiguration is performed of said first one of said nodes to process received media data and of said second one of said nodes to forward received media data to said first one of said nodes. At a second event, loading is done of at least a part of said received media data being processed at the first one or second one of said nodes to at least a third one of said nodes.Type: ApplicationFiled: April 12, 2017Publication date: October 12, 2017Inventors: Gregory ADAMS, John Robert BASSETT, Nicolas CORMIER, Håvard GRAFF, Eoin Stuart MCLEOD
-
Publication number: 20170295103Abstract: Systems, methods, and apparatus embodiments are described herein for controlling policy in integrated small cell and Wi-Fi networks (ISWNs). It is recognized herein that multiple actors within an ISWN may have needs or preferences that conflict with each other, and that the best way of reconciling those conflicting needs is not always to simply give one actor preference over another. As described herein, optimum management decisions may be dynamically based on current network conditions and preferences of multiple actors.Type: ApplicationFiled: September 30, 2015Publication date: October 12, 2017Inventors: Michael F. STARSINIC, John L. TOMICI, Qing LI, Ahmed MOHAMED, Chonggang WANG
-
Publication number: 20170295104Abstract: Methods, systems, and devices for wireless communication are described. A user equipment (UE) may act as a relay device and receive a message from a source device. The message may include a latency indicator. The UE may identify a delay-tolerance metric associated with the message based on the latency indicator. The UE may identify, for each air interface of a set of air interfaces, a cost metric associated with transmitting the message. The UE may select an air interface from the set of air interfaces based on the delay-tolerance metric and the cost metric. The UE may transmit the message to a destination device on the selected air interface.Type: ApplicationFiled: April 7, 2016Publication date: October 12, 2017Inventors: Karl Georg Hampel, Vincent Douglas Park, Junyi Li
-
Publication number: 20170295105Abstract: A method, apparatus and computer program product are provided for sub-service flow based mapping in a cellular communication system. A sub-service flow User-plane interface between an Enforcement Point and a network control system (NCS) is defined. Relation and coordination of the sub-service flow User-plane interface associated with sub-service flow management actions on a Control-plane interface is defined. In-band packet marking is created to dynamically assist the identification of sub-service flow identities and receive corresponding quality of service (QoS)/quality of experience (QoE) treatments.Type: ApplicationFiled: April 5, 2017Publication date: October 12, 2017Inventors: Ling YU, Matti Einari LAITILA, Amit Kumar SHARMA, Peter SZILAGYI, Csaba VULKAN
-
Publication number: 20170295106Abstract: A plurality of network nodes, under the control of a network controller, are configured to perform a method to direct packets in a packet flow from a source to a destination. In one embodiment, the network controller transmits an instruction to a first node in a network instructing the first node to transmit a first packet in the packet flow along a first route from the source to the destination, the first route having a first delay. The network controller also transmits an instruction to a node in the network to transmit a second packet in the packet flow along a second route different from the first route, the second route having a second delay, the second delay having a duration less than a duration of the first delay. The network controller further transmits an instruction to a node in the second route to delay the second packet in order to delay arrival of the second packet at the destination.Type: ApplicationFiled: June 23, 2017Publication date: October 12, 2017Inventor: Peter Ashwood-Smith
-
Publication number: 20170295107Abstract: Server resources in a data center are disaggregated into shared server resource pools. Servers are constructed dynamically, on-demand and based on workload requirements, by allocating from these resource pools. A disaggregated compute system of this type keeps track of resources that are available in the shared server resource pools, and it manages those resources based on that information. Each server entity built is assigned with a unique server ID, and each resource that comprises a component thereof is tagged with the identifier. As a workload is processed by the server entity, its composition may change, e.g. by allocating more resources to the server entity, or by de-allocating resources from the server entity. Workload requests are associated with the unique server ID for the server entity. When a workload request is received at a resource, it matches its unique server ID to that of the request before servicing the request.Type: ApplicationFiled: April 7, 2016Publication date: October 12, 2017Inventors: Valentina Salapura, John Alan Bivens, Koushik K. Das, Min Li, Ruchi Mahindru, Harigovind V. Ramasamy, Yaoping Ruan, Eugen Schenfeld