ROCKSTAR CONSORTIUM US LP Patent applications |
Patent application number | Title | Published |
20150063119 | Method and Apparatus for Content Processing Application Acceleration - A network architecture enables the data flow of packets to be dynamically modified depending upon the operational needs of the packet being processed. This allows for separate processing of control and data path operations, as well as providing a mechanism for functions that require high computational support, such as encryption functions for example, to be offloaded onto processing devices that can support such functions. Other, less computationally intensive or lower priority functions can be forwarded to PEs having lower operation capacity. With such an arrangement, a dynamic mechanism is provided for customizing the data path of a network device to accommodate the computation needs of any application. | 03-05-2015 |
20150012652 | Method and Apparatus for Open Management of Multi-Media Services - An architecture which permits externalized management of services includes a number of management service capability (MSC) definitions. Each operator may associate a management service capability with a Service/Service Capability for managing various aspects of the Service/Service Capability. An interface enables a variety of different management systems to utilize a common MSC structure, independent of the information models, transport mechanisms and management interface of the system using the MSC. With such an arrangement, management related integration costs associated with integrating and bundling complex multi-media services is significantly reduced. | 01-08-2015 |
20140379784 | METHOD AND APPARATUS FOR USING A COMMAND DESIGN PATTERN TO ACCESS AND CONFIGURE NETWORK ELEMENTS - An XML accessible network device is capable of performing functions in response to an XML encoded request transmitted over a network. It includes a network data transfer service, coupled to a network, that is capable of receiving XML encoded requests from a client also connected to the network. A service engine is capable of understanding and parsing the XML encoded requests according to a corresponding DTD. The service engine further instantiates a service using parameters provided in the XML encoded request and launches the service for execution on the network device in accordance with a command design parameter. A set of device APIs interacts with hardware and software on the network device for executing the requested service on the network device. If necessary, a response is further collected from the device and provided to the client in a response message. | 12-25-2014 |
20140344460 | BROKERING NETWORK RESOURCES - A method of brokering a network resource | 11-20-2014 |
20140323159 | METHOD AND SYSTEM FOR PROVIDING RELEVANT INFORMATION TO A MOBILE DEVICE - A method and system for providing relevant information to a mobile device. An entity structure is provided that includes entity records, each entity record corresponding to an entity that provides a service. Each entity record is associated with a proper subset of regions of a plurality of regions and is categorized into at least one category of a plurality of categories based on the service provided by the entity. A first region category index that is based on the entity structure is provided to a mobile device that is determined to be in a first region of the plurality of regions. The first region category index identifies only those categories in which at least one entity record associated with the first region has been categorized. | 10-30-2014 |
20140307584 | System, Device and Method for Distributing Link State Information in a Communication Network - A system, device, and method for distributing link state information in a communication network combines a link state routing protocol with a sliding window mechanism in order to efficiently distribute link state information. The sliding window mechanism permits a predetermined number of unacknowledged link state advertisement protocol messages to be outstanding at any given time. Unacknowledged link state advertisement protocol messages are retransmitted after a predetermined timeout period. | 10-16-2014 |
20140307559 | TIE-BREAKING IN SHORTEST PATH DETERMINATION - A consistent tie-breaking decision between equal-cost shortest (lowest cost) paths is achieved by comparing an ordered set of node identifiers for each of a plurality of end-to-end paths. Alternatively, the same results can be achieved, on-the-fly, as a shortest path tree is constructed, by making a selection of an equal-cost path using the node identifiers of the diverging branches of the tree. Both variants allow a consistent selection to be made of equal-cost paths, regardless of where in the network the shortest paths are calculated. This ensures that traffic flow between any two nodes, in both the forward and reverse directions, will always follow the same path through the network. | 10-16-2014 |
20140280855 | GENERIC SNMP INFORMATION COLLECTION - The present invention provides a technique to define objects and object instances in a dynamically modifiable table within the confines of a management information base definition. With the invention, new objects and object instances may be added to the table without changing the management information base definition at a managed device or network management system. The managed device can change the table, yet allow the network management system to access the table using an associated object identifier. The network management system can systematically step through the various objects or object instances, which may correspond to rows and columns of the table, to detect additions or modifications to the table. The various objects and object instances in the table may be individually accessed, once identified, using a unique object identifier. | 09-18-2014 |
20140270767 | CROSS-CONNECT USING ETHERNET MULTIPLEXORS FOR A SIMPLE METRO ETHERNET NETWORK - A metro area network is provided that includes edge and core multiplexors each having a plurality of line ports and one or more uplink ports, a transport network carrying multiplexed traffic between the edge and core multiplexors. In a hard cross connect implementation utilizing source port tagging, a cross-connect device coupled to the core multiplexors provisions or maps communications path between the core multiplexors thereby providing preselected connectivity/mapping of two or more line ports of any of the edge multiplexors. In a soft cross connect implementation utilizing destination port tagging, a cross-connect device includes additional cross-connect multiplexors and functionality to control the destination port tagging performed in the edge, core and cross connect multiplexors thereby provisioning or mapping the desired communications path(s) between various endpoints. | 09-18-2014 |
20140270751 | Passive Optical Loopback - An optical communication device comprises an input/output configured to be coupled to an optical communications line, and a passive optical loopback module coupled to the input and configured to receive optical signals from the input/output, the loopback module being further configured to reflect incoming signals of a test wavelength to the input/output. | 09-18-2014 |
20140269434 | PROTOCOL FOR CLOCK DISTRIBUTION AND LOOP RESOLUTION - In response to a network topology change, a clock root node calculates a new clock path for each affected node by building a clock source topology tree, and identifying from that tree a path to the network node from a clock source of higher or equal stratum relative to that network node. The root node then sends a network message to each node indicating the new path that the node should use. Each node receives the message and compares the new path with the existing path. If the paths are different then the node acquires the new path just received in the message. If the paths are the same then the node does nothing and discards the message. | 09-18-2014 |
20140269433 | Failure Notification in a Network having Serially Connected Nodes - Multicast capabilities of a link state protocol controlled network are used to accelerate the flooding advertisement of topology change notifications within portions of the network. This flooding mechanism may be particularly efficient in a network with a large number of two-connected nodes such as a ring network architecture. A control plane specific multicast group address is used when flooding topology change notifications, and a process such as reverse path forwarding check is used as an additional control on forwarding of the notification to prevent looping of control plane packets. Two-connected nodes insert a forwarding entry into their FIB to enable frames containing the control message to be forwarded via the data plane on to the downstream node so that propagation of the control message along a chain of two-connected nodes may occur at data plane speeds. | 09-18-2014 |
20140269316 | METHOD FOR MAINTAINING DIFFERENTIATED SERVICES DATA FLOW AT A NETWORK DEVICE IMPLEMENTING REDUNDANT PACKET DISCARD SECURITY TECHNIQUES - An improved method is described for providing Differentiated Services (Diffserv) traffic to a node in a network that implements a security method that discards duplicate packets received at the node. The method includes the step of identifying at least two service levels to be provided to received traffic and assigning different size look-back window counts to each of the service levels. The look-back window count indicates a number of packets that have been previously received at the node that should be compared against a received packet to determine whether a duplicate packet has been received. In one embodiment, a service level that has higher priority is assigned a lower look-back window count and thus examines fewer previously received packets than a service level having a lower priority. Such an arrangement reduces the possibility that traffic having higher priority is dropped as a security measure. | 09-18-2014 |
20140258389 | INTEGRATED WEB PORTAL FOR FACILITATING COMMUNICATIONS WITH AN INTENDED PARTY - Described are a system and method for presenting, to a first user, information about a second user to enable the first user to select an appropriate communication means for communicating with the second user. A service node receives from a web browser executing at a communication device used by the first user a request for a web page associated with the second user. The service node collects information related to a current status of activity of the second user, determines one or more options for establishing communications with the second user, and transmits to the first user the web page having the current activity of the second user and the one or more communications options. | 09-11-2014 |
20140254366 | OPTIMIZED SCHEDULING METHOD FOR DELAY-SENSITIVE TRAFFIC ON HIGH SPEED SHARED PACKET DATA CHANNELS - The present invention supports a scheduling protocol on a wireless communication network to transmit data packets stored in a queue from a user. Two performance metrics are generated and summed to provide a priority. The performance metrics are based on the delay for the data packets stored in the queue and the rate that the data packets can be transmitted on the network. The user with the higher calculated priority for the current time slot has its data packets transmitted. | 09-11-2014 |
20140241342 | EMERGENCY SERVICES FOR PACKET NETWORKS - The present invention provides a technique for facilitating emergency services via packet networks. Emergency service providers will implement emergency proxies to ensure that proper call setup requests for emergency services are forwarded to the appropriate entities, even if those entities are in overload conditions. The emergency proxies may authenticate and filter call setup requests to ensure that only proper call setup requests are forwarded to help prevent such overload conditions. The emergency proxies may operate solely in a packet network, as well as at the interface between a packet network and a circuit-switched network to assist in call setup requests originating from either the packet network or the circuit-switched network. | 08-28-2014 |
20140241165 | METHOD AND APPARATUS FOR INCREASING THE SCALABILITY OF THE ETHERNET OAM - After statically provisioned paths are created through an Ethernet network, trunks may be created to extend along those paths. The trunks extend between pairs of NNI interfaces on either end of the path, and Ethernet OAM may be run over the trunks to detect connectivity along the paths. Service instances and service groups may be provisioned over particular paths through the network. Each service instance/service group is associated with a trunk and the Ethernet OAM service on the trunk may be used to provide Ethernet connectivity OAM for the service instance/service group. Upon detection of a failure on the trunk, the service instances/service groups associated with the trunk may be caused to failover to an alternate path through the network. Thus, a single Ethernet OAM service instance may be used to provide connectivity verification so that connectivity detection does not need to be performed on each individual service instances/service group. | 08-28-2014 |
20140222923 | BIFURCATED CONFERENCING FUNCTIONS - A source conference function is provided for each source device, and a destination conference function is provided for each destination device. Any given user terminal may act as both a destination device when receiving media content and a source device when sending media content to facilitate bidirectional conferencing. The source device generates media content, which is sent to the associated source conference function. In general, the source conference function identifies destination conference functions to which the media content should be delivered, and delivers the media content to the identified destination conference functions. Any given destination conference function receives the media content from this and other source conference functions. The media content received from all or select of the source conference functions may be processed by the destination conference function as desired, and then mixed together to form destination media content, which is delivered to the destination device. | 08-07-2014 |
20140219649 | MANAGING ALTERNATE SITE SWITCHING IN AN OPTICAL COMMUNICATION SYSTEM - A primary optical path in an optical network is established between first and second edge nodes of the optical network for communication between the first edge node and a primary customer network site coupled to the second edge node. A backup optical path through the optical network from the first edge node to a third edge node of the optical network other than the second edge node is determined for communication between the first edge node and a backup customer network site coupled to the third edge node of the optical network. The backup customer network site is designated to back up the primary customer network site. Communications are forwarded on the primary optical path from the first edge node toward the primary customer network site via the second edge node. Upon detection of a degradation or failure of the primary customer network site, communications are forwarded on the backup optical path from the first edge node toward the backup customer network site via the third edge node. | 08-07-2014 |
20140219282 | Method and Apparatus for Simulating IP Multinetting - IP Multinetting on a local area network is simulated by performing VLAN translation at a port connecting to the local area network. This allows IP addresses from multiple subnets to be associated with a single VLAN on the Local Area Network (LAN), while allowing the core switch to process the packets with a one-to-one correspondence between IP Subnet and VLAN. When a packet is received from the local area network at an IP multinetting port, the VLAN ID will be read to determine if the packet contains the IP Multinetting VLAN ID. The IP Subnet address will also be checked to see if the packet is associated with an IP Subnet that is part of the Multinetting. If so, the multinetting VLAN ID will be changed to an IP Subnet specific VLAN ID before the packet is processed by the core switch. | 08-07-2014 |
20140219096 | ETHERNET LAN SERVICE ENHANCEMENTS - Numerous enhancements to metro Ethernet network (MEN) E-LAN services and IETF Virtual Private LAN Service (VPLS) include an enhancement of the overall Quality of Service (QoS) architecture, an enhancement to classification at the provider edge, the use of Ethernet QoS classes, enhancements to policing and marking at ingress provider edge equipment, the provision of traffic management functions at egress provider edge equipment, the use of multiple Ethernet virtual connections (EVCs) and Aggregate EVCs, an enhancement to QoS across an external network-network interface and an enhancement to treatment of Ethernet service frames in a core network. | 08-07-2014 |
20140215221 | HITLESS MANUAL CRYPTOGRAPHIC KEY REFRESH IN SECURE PACKET NETWORKS - In a hitless manual cryptographic key refresh scheme, a state machine is independently maintained at each network node. The state machine includes a first state, a second state, and a third state. In the first state, which is the steady state, a current cryptographic key is used both for generating signatures for outgoing packets and for authenticating signatures of incoming packets. In the second state, which is entered when a new cryptographic key is provisioned, the old (i.e. formerly current) key is still used for generating signatures for outgoing packets, however one or, if necessary, both of the old key and the newly provisioned key is used for authenticating signatures of incoming packets. In the third state, the new key is used for generating signatures for outgoing packets and either one or both of the old key and new key are used for authenticating signatures of incoming packets. | 07-31-2014 |
20140211790 | MULTI-MODE ENDPOINT IN A COMMUNICATION NETWORK SYSTEM AND METHODS THEREOF - A method, apparatus, and communication network system that allows an endpoint to be simultaneously registered with more than one communications server is described. In one embodiment, the communication network system includes a network, a plurality of communications servers that are coupled to the network, and a plurality of endpoints coupled to the network. Each endpoint is capable of being simultaneously registered with more than one communications server. A communication method for an endpoint involves registering a first logical line of the endpoint with a first communications server, and registering a second logical line of the endpoint with a second communications server. Consequently, flexibility is obtained by allowing an endpoint to choose the registering communications server for each logical line of the endpoint. | 07-31-2014 |
20140211604 | Method and Apparatus for the Fast Detection of Connectivity Loss Between Devices in a Network - A method and apparatus for quickly determining the status of a network device in a network communicates status inquiry messages over the forwarding plane of one network device to at least one neighboring network device. The status inquiry messages indicate the connectivity status with at least one neighboring network device. | 07-31-2014 |
20140205290 | OPTICAL SWITCH AND PROTOCOLS FOR USE THEREWITH - A method of establishing a data connection between terminal switching nodes in a network and switching nodes for implementing the method. The method involves switching nodes participating in a network layer wavelength routing (WR) protocol to determine the next hop switching node for every possible combination of terminal nodes based on the network topology. The method also involves the switching nodes participating in a network layer wavelength distribution (WD) once the data connection is to be established. The WR protocol determines the path used through the network, while the WD protocol assigns wavelengths on each link between switching nodes. The wavelengths may be different on different optical links. The switching nodes include wavelength converters with an optical switch or optoelectronic converters with a digital electronic switch. A digital electronic switch can also provide signal reformatting. Advantages of using potentially different wavelengths along various segments of a single end-to-end connection yields increased wavelength efficiency. | 07-24-2014 |
20140205287 | OPTICAL SWITCH AND PROTOCOLS FOR USE THEREWITH - A method of establishing a data connection between terminal switching nodes in a network and switching nodes for implementing the method. The method involves switching nodes participating in a network layer wavelength routing (WR) protocol to determine the next hop switching node for every possible combination of terminal nodes based on the network topology. The method also involves the switching nodes participating in a network layer wavelength distribution (ND) once the data connection is to be established. The WR protocol determines the path used through the network, while the WD protocol assigns wavelengths on each link between switching nodes. The wavelengths may be different on different optical links. The switching nodes include wavelength converters with an optical switch or optoelectronic converters with a digital electronic switch. A digital electronic switch can also provide signal reformatting. Advantages of using potentially different wavelengths along various segments of a single end-to-end connection yields increased wavelength efficiency. | 07-24-2014 |
20140204951 | METHODS OF ESTABLISHING VIRTUAL CIRCUITS AND OF PROVIDING A VIRTUAL PRIVATE NETWORK SERVICE THROUGH A SHARED NETWORK, AND PROVIDER EDGE DEVICE FOR SUCH NETWORK - A virtual private network (VPN) service is provided through a shared network infrastructure comprising interconnected provider edge (PE) devices having customer edge (CE) interfaces. Some of the CE interfaces are allocated to a VPN supporting virtual LANs. A correspondence between a CE interface and a virtual LAN is learnt on the basis of tagged frames received at this CE interface and including an identifier of this virtual LAN. The learning process permits the detection of pairs of CE interfaces which correspond to a common virtual LAN. Upon such detection, a virtual circuit is established in the shared network infrastructure between the PE devices having these CE interfaces, and subsequently used for forwarding frames including the identifier of the common virtual VLAN. | 07-24-2014 |
20140204942 | METHODS OF ESTABLISHING VIRTUAL CIRCUITS AND OF PROVIDING A VIRTUAL PRIVATE NETWORK SERVICE THROUGH A SHARED NETWORK, AND PROVIDER EDGE DEVICE FOR SUCH NETWORK - A virtual private network (VPN) service is provided through a shared network infrastructure comprising interconnected provider edge (PE) devices having customer edge (CE) interfaces. Some of the CE interfaces are allocated to a VPN supporting virtual LANs. A correspondence between a CE interface and a virtual LAN is learnt on the basis of tagged frames received at this CE interface and including an identifier of this virtual LAN. The learning process permits the detection of pairs of CE interfaces which correspond to a common virtual LAN. Upon such detection, a virtual circuit is established in the shared network infrastructure between the PE devices having these CE interfaces, and subsequently used for forwarding frames including the identifier of the common virtual VLAN. | 07-24-2014 |
20140198811 | TECHNIQUES FOR TIME TRANSFER VIA SIGNAL ENCODING - Techniques for time transfer via signal encoding are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for time transfer via signal encoding comprising generating a time service ordered-set for inclusion in a physical coding sublayer frame of a physical layer device, generating time service data for inclusion in the physical coding sublayer frame of the physical layer device, and transmitting the physical coding sublayer frame. | 07-17-2014 |
20140198787 | FORCED HOLD CALL HANDLING IN A VOP ENVIRONMENT - The present invention provides a technique for providing a forced hold service such as is used for an emergency services call, which is supported at least in part over a packet network. The forced hold service acts to effectively hold a connection for the call with a called party, even when the caller takes an action that would normally end a call, such as going on hook, pressing end, or the like. When the caller takes an action that would normally end the call, the forced hold service allows the caller to automatically reconnect to the emergency services provider over the held connection upon going offhook, pressing send, or the like. Alternatively, the emergency services provider can effectively re-engage the call wherein the caller is reconnected over the held connection upon going offhook, pressing send, or the like. | 07-17-2014 |
20140198632 | SELECTIVE PROCESSING OF DAMAGED PACKETS - When a damaged packet has been forwarded to or towards a destination terminal, a forwarding device or a destination terminal will determine if the packet is damaged, and if it is damaged, determine whether the content of the packet is time-sensitive. If the content is time-sensitive, the damage to the packet is assessed, and if possible, an attempt to repair the damage is made. Repair may include correcting the damaged data or packet, deciding to use the damaged data because the damage is minimal, or replacing all or a part of the damaged data with a normalized set of data. If repair is not possible and replacement of the damaged portion is not available or desirable, the packet is discarded. | 07-17-2014 |
20140192979 | Method and Apparatus for Generating Large Numbers of Encryption Keys - Entropy obtained from a series of key generation exchanges may be combined with entropy from a strong entropy source to allow the strong entropy to be stretched to generate a larger number of keys for use on a communication network, without requiring additional information from the group members and without requiring the entropy source to be increased in size or in number. In one embodiment, nonces exchanged during an initial key exchange are used to generate additional key material that is then fed, together with a fresh random secret, to another pseudo-random function to generate an additional key stream. The methods are particularly useful for group key management where a large number of keys are required to be generated in a short time frame. | 07-10-2014 |
20140192802 | TWO-DIMENSIONAL CIRCULATING SWITCH - A one-dimensional circulating switch may be defined by connections between several switch modules and one or more temporal cyclic rotators. Where a switch module that is part of a first one-dimensional circulating switch is also connected one or more temporal cyclic rotators that define a second one-dimensional circulating switch, a two-dimensional circulating switch is formed. A two-dimensional circulating switch is flexible and may scale to capacities ranging from a few gigabits per second to multiple Petabits per second. | 07-10-2014 |
20140186036 | OPTICAL SWITCH AND PROTOCOLS FOR USE THEREWITH - A method of establishing a data connection between terminal switching nodes in a network and switching nodes for implementing the method. The method involves switching nodes participating in a network layer wavelength routing (WR) protocol to determine the next hop switching node for every possible combination of terminal nodes based on the network topology. The method also involves the switching nodes participating in a network layer wavelength distribution (WD) once the data connection is to be established. The WR protocol determines the path used through the network, while the WD protocol assigns wavelengths on each link between switching nodes. The wavelengths may be different on different optical links. The switching nodes include wavelength converters with an optical switch or optoelectronic converters with a digital electronic switch. A digital electronic switch can also provide signal reformatting. Advantages of using potentially different wavelengths along various segments of a single end-to-end connection yields increased wavelength efficiency. | 07-03-2014 |
20140181967 | PROVIDING-REPLAY PROTECTION IN SYSTEMS USING GROUP SECURITY ASSOCIATIONS - A method and apparatus is disclosed which enables detection of undesired packets received at a device in a network, where the device is a member of a group of devices in the network. A registration table stores transform identifiers for each member of a group and controls the forwarding of the transform identifiers to the members of the group as members are added and deleted. A transform identifier indicates a format or transformation of a packet transmitted by an associated member. The transform identifier can therefore be used at a receiving device to distinguish between transmissions by different members of the group, thereby enabling the receiving device to extract sequence information associated with the member from the packet. The sequence information can be compared against an expected sequence number for the member to determine whether the packet is an undesirable or rogue packet. | 06-26-2014 |
20140177433 | RESILIENT ATTACHMENT TO PROVIDER LINK STATE BRIDGING (PLSB) NETWORKS - A system for interfacing a client system in a first network domain with a Provider Link State Bridging (PLSB) domain includes at least two Backbone Edge Bridges (BEBs) of the PLSB domain. Each BEB is an end-point of a connection in the first network domain to the client system and an end-point of at least a unicast path in the PLSB domain. An inter-node trunk is provided in the PLSB domain for interconnecting the BEBs. A phantom node is defined in the PLSB domain and is notionally located on the inter-node trunk. Each of the BEBs is configured such that: an ingress packet received from the client system via the connection in the first network domain is forwarded through a path notionally rooted at the phantom node; and an egress packet destined for the client system is forwarded to the client system through the connection in the first network domain. | 06-26-2014 |
20140172913 | Method and Apparatus for Document Matching - Documents written using a markup language such as XML may be decomposed into Path and Parent Associated Node (PPAN) elements, each of which is a linear data structure that includes the content of a node, the parent-child relationship of the node, and the path level of the node. A number of PPAN elements may be grouped together to form A PPAN chain. A PPAN matching process uses the PPAN elements/PPAN chain to search for structured documents that match the PPAN chain. The PPAN matching process is able to perform query and match at the same time to accelerate the PPAN matching process, and also enables complex services to be represented by generic structured documents. Optionally, the PPAN matching process may support wildcard requests so that services may be discovered without prior knowledge of the services. | 06-19-2014 |
20140172289 | METHOD AND APPARATUS FOR ENABLING COMMUTER GROUPS - A commuter groups service (CGS) allows commuters to join commuter groups so that they are able to socialize while commuting. Through the commuter groups, the users may share commuting routes, traffic updates, road conditions, and other information. Group members may arrange car pools, short term riding arrangements, and may anonymously or directly contact each other. The CGS may collect group member position information, e.g. GPS information, to enable the CGS to calculate traffic conditions and to select location specific information for group members. The system may include an on-line service accessible through a computer or wireless networking device. The user may log into the CGS, create or modify a user profile, and join groups of their choosing. Groups may be associated with specific events or with getting to/from work. Commuter groups may be formed for commuters that use private vehicles and/or public transportation. | 06-19-2014 |
20140169309 | CONTROLLING ALLOCATION OF A PORTION OF A SHARED CHANNEL TO USE FOR CONTROL INFORMATION - To control allocation of a portion of a shared channel to use for control information, a base station determines an amount of resource elements of the shared channel to use for the control information in place of traffic data. The base station sends, to a mobile station, an indication relating to an offset parameter, where the indication is provided to allow the mobile station to compute a value for the offset parameter such that the mobile station can determine the amount of the resource elements of the shared channel to allocate for the control information. | 06-19-2014 |
20140161130 | NON-BROADCAST MULTIPLE ACCESS INVERSE NEXT HOP RESOLUTION PROTOCOL (INHRP) - The present invention is a method and apparatus for obtaining information transmitted between a source station and a destination station in a non broadcast multiple access network. A connection between the source station and a server for the destination station is established. The server has a cache containing the information. The source station transmits a request packet having parameters relating to the information to the server. The source station receives a reply packet containing the information from the server. The reply packet matches the parameters of the request packet. | 06-12-2014 |
20140161038 | MOBILE FAST ALERTING - Systems and methods of operating a communication session control server. A first communication session initiation message is received from a first communication terminal, the first communication session initiation message indicating a second communication terminal with which the first communication terminal is requesting a communication session. A second communication session initiation message is sent to the second communication terminal, the second communication session initiation message indicating a delay to be used by the second communication terminal to determine when to initiate an alerting process. | 06-12-2014 |
20140153579 | Distributed Storage of Routing Information in a Link State Protocol Controlled Network - A distributed hash table is implemented to store routing information on a network. Node IDs exchanged in connection with implementation of a link state routing protocol are used as keys in the distributed hash table, and routes are stored at one or more nodes on the network. When a route is learned, the route is processed against the set of keys to determine which nodes should store the route. When a route is needed, the route is processed against the set of keys to determine which nodes should have the route information. The manner in which the route is processed against the set of keys is the same in both instances, so that the DHT may be used to store and retrieve route information on the network. The DHT may be implemented to store MAC addresses, IP addresses, MPLS labels, or other information. | 06-05-2014 |
20140153578 | Border Gateway Protocol Extended Community Attribute for Layer-2 and Layer-3 Virtual Private Networks - Described are a network, computer program product, and method of distributing routing information for a virtual private network (VPN) application through a packet-switched network (PSN) having fully meshed provider edge (PE) routers through Provider Backbone Bridge (PBB) tunnels. A PE router is configured to participate in a VPN and to run a BGP (Border Gateway Protocol) as an auto-discovery process for finding one or more other PE routers participating in the VPN. The VPN is associated with a PBB tunnel. A service instance identifier (I-SID) is assigned to the VPN. The PE router advertises membership in the VPN by including the I-SID assigned to the VPN in a BGP message issued during the auto-discovery process. | 06-05-2014 |
20140153382 | METHOD AND APPARATUS FOR IMPLEMENTING CONTROL OF MULTIPLE PHYSICALLY DUAL HOMED DEVICES - A ring control protocol is used to establish a separate control plane for a plurality of physically dual homed devices to enable collections of dual homed devices to be represented by a single pair of addresses into the attached routed Ethernet network. The gateway devices analyze the passing ring control packets to create direct mappings for data packets to the routed Ethernet network. Thus, although the dual homed devices are treated as a ring from a control perspective, the data path is implemented to be direct so that data packets continue to flow directly from the dual homed devices to each of the attached gateway devices. In one embodiment, each of the gateway devices implements a virtual switch and advertises the MAC address of the virtual switch into the routed Ethernet network rather than the MAC addresses of each of the attached Ethernet Switch Units. | 06-05-2014 |
20140146820 | METHOD AND SYSTEM FOR QUALITY OF SERVICE SUPPORT FOR ETHERNET MULTISERVICE INTERWORKING OVER MULTIPROTOCOL LABEL SWITCHING - A method and system for maintaining quality of service parameters for transmissions as a native Ethernet service between a first network having a first communication protocol and a second network having a second communication protocol. The interworking device includes a first network interface operable to communicate with the first communication network using the first communication protocol, a second network interface operable to communicate with the second communication network using second communication protocol and a processing unit in communication with the first network interface and the second network interface. The processing unit receives a frame from the first network in the first communication protocol, maps parameters corresponding to quality of service parameters in the first communication protocol to quality of service parameters in the second communication protocol and assembles a data packet in the second communication protocol. The assembled data packet includes mapped quality of service parameters. | 05-29-2014 |
20140146701 | EVOLUTION OF ETHERNET NETWORKS - An Ethernet network comprises nodes which support a plurality of different forwarding modes. A range of VLAN Identifiers (VIDs) are allocated to each of the forwarding modes. Connections are configured between a source node and a destination node of the network using different forwarding modes. Packets carrying data traffic are sent to the destination node by selectively setting a VID in a packet to a first value, to transfer a packet via a first connection and a first forwarding mode, and a second value to transfer a packet via the second connection and the second forwarding mode. Packets received from both of the connections and sent on to an end user. VLAN Identifiers can be allocated to different releases of functionality at nodes (e.g. software releases) such that packets are forwarded via a set of nodes supporting a first release, or via a set of nodes supporting a second release. | 05-29-2014 |
20140146670 | AUTO-COMPRESSION FOR MEDIA OVER IP - The present invention allows communicating devices to control the amount of compression used in packet sessions for transmitting streaming media to and from each other. When a communicating device detects a decrease in performance or quality of service indicative of a limited bandwidth condition, the amount of compression for the current or subsequent sessions is temporarily increased to allow the currently available bandwidth to support the session or subsequent sessions. After a set period of time, or when the limited bandwidth condition is removed, communications associated with the sessions can revert back to transporting uncompressed data or reducing the amount of compression for the sessions, thus using more of the available bandwidth. | 05-29-2014 |
20140143343 | BIFURCATED CONFERENCING FUNCTIONS - A source conference function is provided for each source device, and a destination conference function is provided for each destination device. Any given user terminal may act as both a destination device when receiving media content and a source device when sending media content to facilitate bidirectional conferencing. The source device generates media content, which is sent to the associated source conference function. In general, the source conference function identifies destination conference functions to which the media content should be delivered, and delivers the media content to the identified destination conference functions. Any given destination conference function receives the media content from this and other source conference functions. The media content received from all or select of the source conference functions may be processed by the destination conference function as desired, and then mixed together to form destination media content, which is delivered to the destination device. | 05-22-2014 |
20140140493 | SOURCE SELECTION FOR CONFERENCE BRIDGES - The present invention provides an audio source selection process for a conference bridge. The conference bridge receives multiple audio sources and selects at least one of the audio sources based on the relative signal levels associated with the audio signal at each of the audio sources. The audio signals associated with the selected source are delivered to conference participants via one or more audio outputs. The conference bridge will repeatedly employ a selection process to select an audio source based on signal level measurements for the audio signals of the audio sources. During the selection process, the influence of a selected audio source relative to the other unselected audio sources is reduced, after the selected audio source has remained selected for more than a first time period. | 05-22-2014 |
20140140347 | TIE-BREAKING IN SHORTEST PATH DETERMINATION - A consistent tie-breaking decision between equal-cost shortest (lowest cost) paths is achieved by comparing an ordered set of node identifiers for each of a plurality of end-to-end paths. Alternatively, the same results can be achieved, on-the-fly, as a shortest path tree is constructed, by making a selection of an equal-cost path using the node identifiers of the diverging branches of the tree. Both variants allow a consistent selection to be made of equal-cost paths, regardless of where in the network the shortest paths are calculated. This ensures that traffic flow between any two nodes, in both the forward and reverse directions, will always follow the same path through the network. | 05-22-2014 |
20140140243 | METHOD AND APPARATUS FOR LAYER 2 FAST RE-CONFIGURATION IN A ROUTING BRIDGE NETWORK - A method and apparatus in provided which enables fast layer 2 reconfiguration in a network that includes Routing Bridges. Each Routing Bridge stores, for each forwarding target, identifiers of a primary next Rbridge and an alternate next Rbridge. The forwarding target may be a network end node, or an Egress Rbridge associated with the network end node. In response to a trigger condition, layer 2 communications are selectively switched from a path that includes the primary next Rbridge device to a path that includes the alternate next Rbridge device. | 05-22-2014 |
20140133368 | TELECOMMUNICATIONS NETWORK - The present invention relates generally to a cellular telecommunications network. Each cell has at least one base station for sending messages on a downlink of a Frequency Division Duplex (FDD) to end user equipments within the cell. Other end user equipment located within the cell which have no or only poor communication directly with the base station over the FDD communicate with the base station indirectly via an intermediate end user equipment, such as a mobile telephone. The intermediate end user equipment includes an FDD transceiver and a Time Division Duplex (TDD) transceiver and an FDD/TDD interface. The intermediate end user equipment receives and sends signals to/from the base station over the FDD using the FDD transceiver and relays them via the FDD/TDD interface and the TDD transceiver towards a relevant one of the other end user equipments over a TDD. | 05-15-2014 |
20140132344 | Broadband Doherty Amplifier Using Broadband Transformer - A radio frequency amplification unit is provided. The radio frequency amplification unit comprises a main amplifier, wherein the main amplifier is operable to amplify a first portion of an input signal, an auxiliary amplifier, wherein the auxiliary amplifier is operable to turn on and to amplify a second portion of the input signal when the amplitude of the second portion of the input signal fourth signal exceeds a threshold amplitude, and a broadband impedance transformer that is coupled between an output of the main amplifier and an output of the auxiliary amplifier. The broadband impedance transformer produces an transformed output of the main amplifier based on an output of the main amplifier. The broadband impedance transformer comprises a quarter wavelength matching line coupled to a directional coupler, wherein the directional coupler has the same electrical length as the quarter wavelength matching line. | 05-15-2014 |
20140129722 | PSUEDO WIRE MERGE FOR IPTV - A pseudo-wire merge is disclosed. Communicating with a first communication server enables registration of a first endpoint with the first communication server thereby enabling the first endpoint to establish a communication session under control of the first communication server with a second endpoint coupled to the communication network. Communicating with a second communication server enables registration of the first endpoint with the second communication server while the first endpoint is registered with the first communication server thereby enabling the first endpoint to establish a communication session over the communication network selectively either under the control of the second communication server or under the control of the first communication server. | 05-08-2014 |
20140126420 | BREAK BEFORE MAKE FORWARDING INFORMATION BASE (FIB) POPULATION FOR MULTICAST - A method of installing forwarding state in a link state protocol controlled network node having a topology database representing a known topology of the network, and at least two ports for communication with corresponding peers of the network node. A unicast path is computed from the node to a second node in the network, using the topology database, and unicast forwarding state associated with the computed unicast path installed in a filtering database (FDB) of the node. Multicast forwarding state is removed for multicast trees originating at the second node if an unsafe condition is detected. Subsequently, a “safe” indication signal is advertised to each of the peers of the network node. The “safe” indication signal comprises a digest of the topology database. A multicast path is then computed from the network node to at least one destination node of a multicast tree originating at the second node. Finally, multicast forwarding state associated with the computed multicast path is installed in the filtering database (FDB) of the network node, when predetermined safe condition is satisfied. | 05-08-2014 |
20140125416 | Amplifier Linearization Using Non-Standard Feedback - An amplification unit is provided. The amplification unit, comprises a first amplifier, a second amplifier, a first sensor, a first predistortion component, and a signal combiner. The first amplifier amplifies a first signal to produce a second signal. The first sensor produces a third signal based on the second signal. The second amplifier turns on and to amplifies a fourth signal to produce a fifth signal when the amplitude of the fourth signal exceeds a threshold amplitude and turns off when the amplitude of the fourth signal is less than the threshold amplitude. The first predistortion component produces the first signal based on a first input signal, based on the third signal, and based on an on-off state of the second amplifier. The signal combiner produces an output of the amplification unit based on the second signal and the fifth signal. | 05-08-2014 |
20140112336 | TELEPHONY USAGE DERIVED PRESENCE INFORMATION - The present invention relates to a mechanism for providing state information, which bears on the presence of a telephone user, to a presence system. The state information is derived by monitoring events relating to telephony use. Once derived, the state information is directly or indirectly sent to a presence service, which provides presence information to applications requiring such information about the telephone user. The state information preferably bears on the presence, absence, or availability of the telephone user based on their interaction with a telephony device or function. In one embodiment, a telephony switching system is configured to monitor events associated with a telephony device or function and send messages to a presence service over a packet-switched network when the state of the telephony device or function changes. In another embodiment, an IP telephone system is configured to provide state information to the presence service. | 04-24-2014 |
20140108651 | IDENTIFYING AND CONTROLLING NETWORK SESSIONS VIA AN ACCESS CONCENTRATION POINT - The present invention facilitates identification and control of peer-to-peer sessions via an access concentration point (ACP). The ACP will monitor packets routed therethrough and detect access messages intended for known peer-to-peer access services. The access messages sent from a communication client to the peer-to-peer access service, which will respond by sending an access reply message back to the communication client. The ACP will monitor the packets being routed to identify the access reply message, which will include routing addresses that may be associated with potential remote communication clients. With these addresses, the ACP can monitor packets to identify when an attempt to initiate a peer-to-peer communication session is being made to or through an entity associated with one or more of these addresses. Upon detecting a session initiation message to or through an identified address, the ACP may take any number of actions, depending on how the ACP is configured. | 04-17-2014 |
20140108554 | RECURSIVE IDENTIFICATION OF INDIVIDUALS FOR CASUAL COLLABORATIVE CONFERENCING - A method for real-time communication among two or more individuals separated in space. The method includes the steps of determining that a first individual is likely to be interested in communicating with a second individual via a first communications link; retrieving information via the first communications link about one or more additional individuals from electronic memory means associated with the second individual; and establishing communication with at least one of the additional individuals based on the retrieved information. | 04-17-2014 |
20140105071 | PROVIDER LINK STATE BRIDGING (PLSB) COMPUTATION METHOD - A method of multicast route computation in a link state protocol controlled network. A spanning tree is computed from a first node to every other node in the network using a known spanning tree protocol. The network is then divided into two or more partitions, each partition encompassing an immediate neighbour node of the first node and any nodes of the network subtending the neighbour node on the spanning tree. Two or more of the partitions are merged when a predetermined criterion is satisfied. Nodes within all of the partitions except a largest one of the partitions are then identified, and each identified node examined to identify node pairs for which a respective shortest path traverses the first node. | 04-17-2014 |
20140105025 | Dynamic Assignment of Traffic Classes to a Priority Queue in a Packet Forwarding Device - Responsive to detecting a predetermined time of day, packet forwarding treatment is changed in accordance with at least one class of packet flow from a first packet forwarding treatment to a second packet forwarding treatment. | 04-17-2014 |
20140105012 | Dynamic Assignment of Traffic Classes to a Priority Queue in a Packet Forwarding Device - Responsive to detecting that bandwidth consumption of a packet flow has exceeded a threshold, packet forwarding treatment is changed in accordance with at least one class of packet flow from a first packet forwarding treatment to a second packet forwarding treatment. | 04-17-2014 |
20140105001 | Distributed Failure Recovery in a Routed Ethernet Network - Link identifiers such as VIDs, selected from a defined range of values, are locally assigned by each node on a link state protocol controlled Ethernet network to each of its links or adjacencies. The link identifiers are assigned by the nodes such that each link or adjacency at the node is uniquely identified by a different link identifier. A link state protocol adjacency notification mechanism or other flooding mechanism is used to disseminate the locally assigned link identifiers to other nodes on the link state protocol controlled Ethernet network. The link identifiers are added by the nodes to their topology databases to enable detour routes to be locally calculated by the nodes on the network in a distributed manner. Upon occurrence of a failure, the link identifiers are used to source route traffic around the failure so that traffic may continue to traverse the link state protocol controlled Ethernet network. | 04-17-2014 |
20140103980 | Method and Apparatus for Reducing the Contribution of Noise to Digitally Sampled Signals - The contribution of noise to digitally sampled signals is reduced using a statistical processor and a slope limiter. The statistical processor determines an average value (mean and/or standard deviation) of the filtered signal which is used to determine a slope limit corresponding to an expected maximum first derivative value of a target signal frequency. This slope limit is applied to constrain the output of an analog to digital converter, to prevent the output of the analog to digital converter from exceeding this maximum rate of rise or fall. By constraining the output of the analog to digital converter, it is possible to digitally sample analog signals without first utilizing an anti-aliasing filter, since the post processing of the digitally sampled signals limits the contribution of the higher frequency components of the signal to thereby enable a fully digital sampling and filtering circuit to be provided for receiving signals. | 04-17-2014 |
20140101749 | METHOD FOR PROVIDING MEDIA COMMUNICATION ACROSS FIREWALLS - The present invention supports a method for transmitting information packets across network firewalls. A trusted entity is provisioned with an address designation for a pinhole through the firewall during setup of a communication session between two communication devices. This pinhole address is used throughout the communication session between the two communication devices to transmit information packets onto and out of the communication network. Information packets addressed to the communication device inside the firewall are received by the trusted entity, which replaces address header information in the information packet with the address for the pinhole. The information packet is routed to the pinhole where it passes onto the network for routing to the communication device inside the firewall. Information packets transmitted from the network are also routed to the trusted entity for routing toward the communication device outside the firewall. | 04-10-2014 |
20140095678 | Verification of Configuration Information in BGP VPNs - Described are mechanisms for verifying configuration information in 2547 BGP VPNs. An originating PE generates a first knowledge digest encoding first configuration information associated with a current set of information advertised for a VRF. The originating PE also generates a second knowledge digest encoding second configuration information associated with cumulative information advertised for the VRF. The originating PE is capable of receiving a message from a user PE, the message including a third knowledge digest encoding third configuration information related to the user VRF. The originating PE is capable of comparing the first knowledge digest to the third knowledge digest and producing a first indication if the third configuration information encoded in the third knowledge digest is not a subset of the first configuration information encoded in the first knowledge digest. | 04-03-2014 |
20140094163 | Method and Apparatus for Pre-Loading Information Over a Communication Network - Data is downloaded to a wireless device before needed by the user. The data may be downloaded before needed, for example while connected to a high-bandwidth network, slowly over a bandwidth constrained network, during a time when the network is not busy, or when the network operator has reduced tariff for data usage. The data may be downloaded contiguously or may updated over a period of time. At a later point in time, the previously downloaded data is used to provide information to the user without requiring contemporaneous information transmission on the wireless network. | 04-03-2014 |
20140092748 | RESILIENT PROVIDER LINK STATE BRIDGING (PLSB) VIRTUAL PRIVATE LAN SERVICE (VPLS) INTERWORKING - A method of peer interfacing a Link-State controlled network domain with an Ethernet Bridging controlled network domain. A pair of peer attachment points are provided between the Link-State controlled network domain and the Ethernet Bridging domain. The peer attachment points are respective endpoints of a set of one or more LAN segments defined within the Ethernet Bridging domain. The set of LAN segments are represented as a virtual node in the Link-State controlled network domain. The virtual node is represented in the Link-State controlled network domain as connected to each of the peer attachment points via a respective virtual link. The virtual links are configured such that frames to or from an address in the Link-State controlled network domain are forwarded over a tree passing through only one of the peer attachments points. | 04-03-2014 |
20140086259 | METHOD AND SYSTEM FOR WEIGHTED FAIR QUEUING - A system for scheduling data for transmission in a communication network includes a credit distributor and a transmit selector. The communication network includes a plurality of children. The transmit selector is communicatively coupled to the credit distributor. The credit distributor operates to grant credits to at least one of eligible children and children having a negative credit count. Each credit is redeemable for data transmission. The credit distributor further operates to affect fairness between children with ratios of granted credits, maintain a credit balance representing a total amount of undistributed credits available, and deduct the granted credits from the credit balance. The transmit selector operates to select at least one eligible and enabled child for dequeuing, bias selection of the eligible and enabled child to an eligible and enabled child with positive credits, and add credits to the credit balance corresponding to an amount of data selected for dequeuing. | 03-27-2014 |
20140086251 | ETHERNET DIFFERENTIATED SERVICES ARCHITECTURE - An edge node of a communication network and method to classify incoming Ethernet traffic based on predetermined criteria. An ingress switch is configured to receive an incoming Ethernet frame. A frame classifier is configured to identify flows and to correlate a flow to a corresponding bandwidth profile and corresponding forwarding treatments defined for the flow. | 03-27-2014 |
20140086064 | ETHERNET OAM PERFORMANCE MANAGEMENT - Maintenance entities may be defined between customer and provider flow points to allow performance management to take place on an Ethernet network. The maintenance entities may be defined for access link, intra-domain, and inter-domain, and may be defined on a link or service basis. The maintenance entities may be used to monitor performance within a network or across networks, and may be used to monitor various performance parameters, such as frame loss, frame delay, frame delay variation, availability, errored frame seconds, service status, frame throughput, the number of frames transmitted, received or dropped, the status of a loopback interface, the amount of time a service has been unavailable, and many other parameters. Several management mechanisms may be used, and the measurements may be collected using a solicited collection method, in which a response is required and collected, or an unsolicited collection method in which a response is not required. | 03-27-2014 |
20140086056 | SELECTIVE INTERNET PRIORITY SERVICE - An Internet Priority Service (IPS) provides to authorized users priority access to communication over the Internet during emergencies. Transmission of data packets from an authorized user that accesses the IPS are given priority for transmission over the Internet. The level of priority given to a data packet depends on the type of application associated with the data packet. Each user or group of users may also be given a respective IPS level of priority. Furthermore, for a particular authorized user, access to the IPS may be limited to a specific number of application types, which for example do not have high bandwidth requirements. Assigning different priority levels as a function of application type and user or group of users, and limiting IPS access to specific application types allows efficient methods of emergency communication to be implemented over the Internet during emergencies. | 03-27-2014 |
20140079069 | LAYER-2 TO MPLS SERVICE MEDIATION ARCHITECTURE - An architecture for providing service mediation in a network having a Layer-2 domain and an MPLS domain includes at least one Layer-2 provider edge device in communication with a first customer site; at least one Layer-2 edge device in communication with the Layer-2 provider edge device; at least one MPLS mediation edge device in communication with the Layer-2 edge device; and at least one MPLS provider edge device in communication with both the MPLS mediation edge device and a second customer site. An end-to-end connection is established using native Layer-2 signaling, if any, in the Layer-2 domain and PWE3 signaling protocols in the MPLS domain. The MPLS mediation edge device resolves associations between Layer-2 edge devices and MPLS provider edge devices. The service is “mediated” in the sense that native Layer-2 signaling is terminated at the MME, and a new domain, i.e., pseudowire, is established across the MPLS domain. | 03-20-2014 |
20140078901 | Link Bundle Co-Routed VCAT Via RSVP Message Bundling - Multiple RSVP messages are used to separately signal components of co-routed VCAT to enable the separate components to be implemented on different physical fibers of a link bundle. To enable the PATH messages to be handled as a group, the multiple PATH messages are grouped together and sent out in a RSVP bundle message. When a RSVP bundle message containing multiple PATH messages is received at a network element, such as an ENNI, where the route for the PATH messages needs to be expanded, the route is expanded collectively and the expanded route is inserted into each individual PATH message. The modified PATH messages are then passed through the RSVP finite state machine one at a time to enable resources to be reserved for the connections of the VCAT. Thus, a single LSP may be created for each channel, and channels may be co-routed even where route expansion is required. | 03-20-2014 |
20140064273 | Utilizing Betweenness to Determine Forwarding State in a Routed Network - A set of critical nodes or links is identified on the network through which most of the shortest paths on the network occur. Each node compares their distance to end points on the network with a distance between the end points and each of the distinct critical nodes. Where the distance between the end points and the critical nodes is shorter than the distance between the end points and the node, the node is not on the shortest path and does not install forwarding state. Where the distance between the end points and the critical node is larger than or equal to the distance between the end points and the node, the node may be on the shortest path between the pair of end nodes and installs forwarding state. Installation of forwarding state may cause packet duplication, but determining forwarding state is dramatically simplified. | 03-06-2014 |
20140064137 | NON-INTRUSIVE MONITORING OF QUALITY LEVELS FOR VOICE COMMUNICATIONS OVER A PACKET-BASED NETWORK - Provided is a method and apparatus for objectively and non-intrusively measuring voice quality on live calls without disrupting the call session or the network. A communication system includes plural communities each including a switch that controls access to a packet-based data network for call sessions. Each of the communities is coupled to the data network by respective packet-based trunks. Quality of service (QoS) monitoring devices are coupled to the respective packet-based trunks to monitor quality levels of routes between any two given communities. Each QoS monitoring device receives packets containing streaming data (which may be actual packets or test packets). From the received packets, the QoS monitoring device can derive QoS parameters, particularly for audio and speech signals on live calls without disrupting the call session. | 03-06-2014 |
20140064130 | GEOGRAPHIC REDUNDANCY FOR CALL SERVERS IN A CELLULAR SYSTEM BASED ON A BEARER-INDEPENDENT CORE NETWORK - In a bearer-independent core network, the switching and transport of the bearer streams is separated from the processing of call sessions that control the bearer streams. The switching and transport of the bearer streams is executed by media gateways and packet switches in the switching and transport layer of the network. The processing of calls sessions that control the bearer streams is executed by call servers in the call control layer of the network. The switching and transport layer of the network may be implemented using ATM or IP technology. In order to redirect the signaling links to a backup call server, a signaling gateway is used. Each media gateway includes a signaling gateway function. The signaling gateways redirect the signaling links by encapsulating each signaling message in a new packet in one embodiment. | 03-06-2014 |
20140040481 | METHOD AND APPARATUS FOR ASSIGNING AND ALLOCATING NETWORK RESOURCES TO LAYER 1 VIRTUAL PRIVATE NETWORKS - Network resources are assigned as dedicated, shared, or public network resources. The resources are then allocated to L1-VPN subscribers on demand. Splitting assignment of the resources from allocation of the resources enables resources to be assigned to more than one subscriber on the network. Temporary physical dedication of the resources to one of the subscribers may be accomplished by allocating the assigned resources on demand, so that particular subscribers are provided with dedicated resources on an as-needed basis. Dedication of the network resources allows the network resources to be configured, managed, and controlled by the customers. The network resources may be optical resources and the links may be time slots on particular fibers. Optionally, by enabling prioritization to cause displacement of link allocations, additional flexibility may be obtained in allocating links to L1-VPNs such as by allowing the use of private and shared resources by other subscribers. | 02-06-2014 |
20140029604 | COMMUNICATING TIME INFORMATION IN A NETWORK TO ENABLE SYNCHRONIZATION - A first node in a network receives a timing packet containing time information, where the timing packet is originated by a time server. The first node then updates the time information in the timing packet to reflect a delay associated with communicating the timing packet over a network link. The first node then updates the time information in the timing packet to reflect the delay associated transfer of the timing packet through the node. The first node sends the timing packet with the updated time information to a second node to enable the second node to use the updated time information for synchronization of the second node. The process repeats across an arbitrary number of nodes to enable time alignment between the first node and final destination node. | 01-30-2014 |
20140025786 | METHOD AND SYSTEM FOR CLIENT CONTEXT DISSEMINATION FOR WEB-BASED APPLICATIONS - A method advertises the existence of a subscriber profile service on a communication network. A first data request sent from a client device to an application server is intercepted. The first data request is modified by inserting an advertisement of contextual information relating to the existence of the subscriber profile service into the first data request prior to transmission to the application server. The modified data request is transmitted to the application server. | 01-23-2014 |
20140023081 | Method and Apparatus for Transporting Ethernet Services - Frames of customer traffic may be encapsulated by adding Mac-in-Mac (MiM) encapsulation fields for transportation of the frames over a portion of provider network. The MiM encapsulated traffic may be further encapsulated using VPLS by adding VPLS encapsulation fields for transportation of the frames over another portion of the provider network. The MiM encapsulations use provider network_MAC addresses which enables VPLS MAC learning to occur using provider network MAC address space. MiM tunnels are mapped to VPLS service instances which are assigned pseudowire tags for transportation over the VPLS portion of provider network. The MiM header is retained when the MiM encapsulated frames are transported over the VPLS portion of the provider network. As VPLS frames exit the core network, the VPLS encapsulation fields are removed to extract the original MiM encapsulated frames for further transportation over the MiM portion of the provider network. | 01-23-2014 |
20140023078 | Method and Apparatus for Transporting Ethernet Services - Frames of customer traffic may be encapsulated by adding Mac-in-Mac (MiM) encapsulation fields for transportation of the frames over a portion of provider network. The MiM encapsulated traffic may be further encapsulated using VPLS by adding VPLS encapsulation fields for transportation of the frames over another portion of the provider network. The MiM encapsulations use provider network_MAC addresses which enables VPLS MAC learning to occur using provider network MAC address space. MiM tunnels are mapped to VPLS service instances which are assigned pseudowire tags for transportation over the VPLS portion of provider network. The MiM header is retained when the MiM encapsulated frames are transported over the VPLS portion of the provider network. As VPLS frames exit the core network, the VPLS encapsulation fields are removed to extract the original MiM encapsulated frames for further transportation over the MiM portion of the provider network. | 01-23-2014 |
20140022911 | Method and Apparatus for the Fast Detection of Connectivity Loss Between Devices in a Network - A method and apparatus for quickly determining the status of a network device in a network communicates status inquiry messages over the forwarding plane of one network device to at least one neighboring network device The status inquiry messages indicate the connectivity status with at least one neighboring network device. | 01-23-2014 |
20140019640 | SYSTEM AND METHOD FOR DYNAMICALLY RE-CONFIGURING COMMUNICATIONS SESSION ROUTING BASED ON LOCATION INFORMATION - System and method for dynamically re-directing communications sessions destined for a particular entity in a communications system, each communications session being associated with at least one predefined route. Location information indicative of a current location of the particular entity is obtained and applied to a predefined set of conditional routing rules associated with the particular entity. This rules-based processing generates a routing result, on the basis of which the at least one predefined route associated with each communications session destined for the particular entity is dynamically updated. | 01-16-2014 |
20140019629 | DISTRIBUTED CALL SERVER SUPPORTING COMMUNICATION SESSIONS IN A COMMUNICATION SYSTEM AND METHOD - An apparatus, method, and computer program manage communication sessions that include a plurality of portions. Different processors handle each portion of a communication session. The apparatus, method, and computer program transfer the communication session from one of the processors to another of the processors during the different portions of the communication session. | 01-16-2014 |
20140019627 | Method and Apparatus for the Fast Detection of Connectivity Loss Between Devices in a Network - A method and apparatus for quickly determining the status of a network device in a network communicates status inquiry messages over the forwarding plane of one network device to at least one neighboring network device. The status inquiry messages indicate the connectivity status with at least one neighboring network device. | 01-16-2014 |
20140019147 | DISTRIBUTED CALL SERVER SUPPORTING COMMUNICATION SESSIONS IN A COMMUNICATION SYSTEM AND METHOD - An apparatus, method, and computer program manage communication sessions that include a plurality of portions. Different processors handle each portion of a communication session. The apparatus, method, and computer program transfer the communication session from one of the processors to another of the processors during the different portions of the communication session. | 01-16-2014 |
20140016769 | METHOD AND SYSTEM FOR CONTROLLING ESTABLISHMENT OF COMMUNICATION CHANNELS IN A CONTACT CENTER - A method for controlling establishment of a communication channel between a service provider terminal of a contact center and a service request terminal. Receipt of a request to establish the communication channel is responded to by determining whether a license for a media type associated with the communication channel is allocated to the service provider terminal. If a license is determined to be allocated to the service provider terminal, establishment of the communication channel is allowed. If a license is determined not to be allocated to the service provider terminal, availability of a license from a pool of licenses is determined. If a license is determined not to be available, establishment of the communication channel is refused. If a license is determined to be available, the license is allocated to the service provider terminal and establishment of the communication channel is allowed. | 01-16-2014 |
20140012984 | Method and Apparatus for the Fast Detection of Connectivity Loss Between Devices in a Network - A method and apparatus for quickly determining the status of a network device in a network communicates status inquiry messages over the forwarding plane of one network device to at least one neighboring network device. The status inquiry messages indicate the connectivity status with at least one neighboring network device. | 01-09-2014 |
20140010093 | Method and Apparatus for the Fast Detection of Connectivity Loss Between Devices in a Network - A method and apparatus for quickly determining the status of a network device in a network communicates status inquiry messages over the forwarding plane of one network device to at least one neighboring network device. The status inquiry messages indicate the connectivity status with at least one neighboring network device. | 01-09-2014 |
20140006514 | DISTRIBUTION OF XML DOCUMENTS/MESSAGES TO XML APPLIANCES/ROUTERS | 01-02-2014 |
20130343752 | OPTICAL SWITCH WITH POWER EQUALIZATION - An optical intensity control system for use with an optical switch providing individual signal paths between input and output ports. The system has optical splitters connectable to output multiplexers of the switch and has variable optical intensity controllers (VOICs) for insertion into the individual signal paths to individually control the intensity of optical signals present in the signal paths via intensity control signals. An equalizer connected to the splitters and the VOICs produces an estimate of the optical power of each individual switched optical signal and generates the intensity control signals. The equalizer is adapted to controllably isolate individual switched optical signals. In this way, individual and independent control of the power on each optical channel is provided. | 12-26-2013 |
20130336146 | METHOD AND APPARATUS FOR PROVIDING AVAILABILITY METRICS FOR MEASUREMENT AND MANAGEMENT OF ETHERNET SERVICES - Maintenance entities may be defined between customer and provider flow points to allow performance management to take place on an Ethernet network. The maintenance entities may be defined for access link, intra-domain, and inter-domain, and may be defined on a link or service basis. Performance parameters, including availability metrics, may be collected for the maintenance entities. The provision of such availability metrics in an Ethernet based solution to facilitate consistency of service management and operations for carriers transitioning to the Ethernet solution. | 12-19-2013 |
20130315244 | VLAN SUPPORT OF DIFFERENTIATED SERVICES - The two types of virtual local area networks (VLANs) may be defined: p-bits-Inferred-scheduling class VLAN (p-VLAN); and VLAN- | 11-28-2013 |
20130311549 | FRAMEWORK FOR SERVICE PERSONALIZATION - A framework for service personalization based upon a user's personal profile is provided. The framework includes a method of providing service personalization (SP) in which a user agent identities itself as being service personalization enabled to begin a SP session. A SP engine assigns a unique identifier to the user agent for tagging all subsequent traffic from that subscriber. The SP engine establishes direct communications between the user agent and an appropriate entity for obtaining information on the location of the subscriber profile and derives personalization rules to form a personalization rule module that encodes criteria for performing personalization functions on user traffic. When a specific subscriber request for content is received, the SP engine invokes the personalization rules of the personalization rule module for application to content requested. | 11-21-2013 |
20130308766 | METHOD AND APPARATUS FOR CONTROLLING CALLING-PARTY IDENTIFICATION - The present invention provides a system, method, and apparatus for managing the calling-party identification information offered to called parties. Accordingly, a caller can designate the Caller ID information to the called party based on the context of the call (e.g. the role of the caller) rather than the terminal used. Typically the calling party does this by selecting which of multiple values they wish to have sent with the call request. It is beneficial to implement such a mechanism in a secure manner—the ability to employ a different calling-number or calling-name ID should be restricted to properly-authorized and authenticated persons—in order to ensure the quality of this information. Accordingly, preferred embodiments include an authentication mechanism for verifying the calling party information is authentic. | 11-21-2013 |
20130301818 | METHOD AND APPARATUS FOR CONTROLLING CALLING-PARTY IDENTIFICATION - The present invention provides a system, method, and apparatus for managing the calling-party identification information offered to called parties. Accordingly, a caller can designate the Caller ID information to the called party based on the context of the call (e.g. the role of the caller) rather than the terminal used. Typically the calling party does this by selecting which of multiple values they wish to have sent with the call request. It is beneficial to implement such a mechanism in a secure manner—the ability to employ a different calling-number or calling-name ID should be restricted to properly-authorized and authenticated persons—in order to ensure the quality of this information. Accordingly, preferred embodiments include an authentication mechanism for verifying the calling party information is authentic. | 11-14-2013 |
20130301817 | METHOD AND APPARATUS FOR CONTROLLING CALLING-PARTY IDENTIFICATION - The present invention provides a system, method, and apparatus for managing the calling-party identification information offered to called parties. Accordingly, a caller can designate the Caller ID information to the called party based on the context of the call (e.g. the role of the caller) rather than the terminal used. Typically the calling party does this by selecting which of multiple values they wish to have sent with the call request. It is beneficial to implement such a mechanism in a secure manner—the ability to employ a different calling-number or calling-name ID should be restricted to properly-authorized and authenticated persons—in order to ensure the quality of this information. Accordingly, preferred embodiments include an authentication mechanism for verifying the calling party information is authentic. | 11-14-2013 |
20130297733 | Middlebox Control - In order to carry out actions such as setting up a call from an entity in the address realm of one middlebox to an entity in the address realm of another middlebox, then a middlebox control node such as a call server is used. Previously, the middlebox control node has needed to have pre-configured information about all the middleboxes and which address realms they are associated with. The present invention provides one or more middlebox-identity-providing nodes which are separate from the middlebox control node, and which are more directly connected to the end users of the service than the middlebox control node. This provides greater flexibility in network design and removes the need for middlebox information to be pre-configured at the middlebox control node. Instead, this information is sent to the middlebox control node, as part of signaling messages, from middlebox-identity-providing nodes. | 11-07-2013 |
20130266317 | OPTICAL SWITCH AND PROTOCOLS FOR USE THEREWITH - A method of establishing a data connection between terminal switching nodes in a network involves switching nodes participating in a network layer wavelength routing (WR) protocol to determine the next hop switching node for every possible combination of terminal nodes based on the network topology. Switching nodes participate in a network layer wavelength distribution (WD) once the data connection is to be established. The WR protocol determines the path used through the network, while the WD protocol assigns wavelengths on each link between switching nodes. The wavelengths may be different on different optical links. The switching nodes include wavelength converters with an optical switch or optoelectronic converters with a digital electronic switch. Advantages of using potentially different wavelengths along various segments of a single end-to-end connection yields increased wavelength efficiency. | 10-10-2013 |
20130254790 | RESOURCE CONSERVATION FOR PACKET TELEVISION SERVICES - The present invention controls delivery of television content to conserve network resources based on whether the television content is being viewed on a television monitor. A television gateway may monitor a viewer's interactions with the television gateway to determine whether the television content is being viewed at the associated television monitor, or detect whether the television monitor is on or off. Upon determining that the viewer is not viewing the television content, various actions can be taken to conserve network resources. | 09-26-2013 |
20130254410 | SYSTEM FOR MANAGING SESSIONS AND CONNECTIONS IN A NETWORK - A modular architecture for use in a network device such as a Remote Authentication Server (RAS) includes a number of interconnected objects associated with processes, services, access protocols and other functionality provided on the device. Objects may also be associated with users, sessions or other data structures that may be accessed by any of the functional objects in the device. Additional services and updates may easily be implemented into this architecture without disrupting user connections. Redundant copies of the objects may be maintained in memory to facilitate the provision of carrier grade performance by swapping out failed components m the event of a fault. | 09-26-2013 |
20130254391 | METHOD AND APPARATUS FOR DETECTING UNSOLICITED MULTIMEDIA COMMUNICATIONS - A service for searching for unsolicited communications is provided. For example, the service may inspect e-mail messages, instant messaging messages, facsimile transmissions, voice communications, and video telephony, and analyze these communications to determine whether an intended communication is unsolicited. In connection with voice and video telephony, a voice sample may be obtained from the caller and voice recognition may be performed on the sample to determine an identity of the person or the voice. The voice sample may also be used to determine the type of voice—i.e., if the voice is live, machine generated, or prerecorded. Where the call is a video telephony call, image recognition may be used to inspect an image of the person. The information obtained from voice recognition, voice type recognition, and image recognition may be used to detect whether the messages if from a known source of unsolicited communications. | 09-26-2013 |
20130251148 | BANDWIDTH EFFICIENT METHOD AND SYSTEM FOR OBSCURING THE EXISTENCE OF ENCRYPTION IN A COMMUNICATIONS CHANNEL - A system, method, and network interface obscures the existence of data encryption in a communication network is provided. A set of characters is generated by using a set of encryption keys as an input to a pseudo-random function. Each character corresponds to an index value. The encrypted data is divided into a plurality of parts. Each part is sectioned into a plurality of groups. Each group of the plurality of groups is encoded by mapping the group to a character in the set of characters according to its corresponding index value. The mapped characters are transmitted through the communication network. | 09-26-2013 |
20130246636 | PROVIDING ADDITIONAL INFORMATION WITH SESSION REQUESTS - The present invention allows a communication client to send a session request to initiate a session with a receiving communication client, wherein the session request includes additional information configured to allow the receiving communication client to take an action in association with the communication session. The additional information may include context indicia, which may identify an association related to the subject matter of the session, or a specific instruction to take the action in association with the communication session. | 09-19-2013 |
20130235889 | DIFFERENTIAL TIMING TRANSFER OVER SYNCHRONOUS ETHERNET USING DIGITAL FREQUENCY GENERATORS AND CONTROL WORD SIGNALING - Transfer of differential timing over a packet network is provided. A transmitting service interface receives a service clock and is coupled to a receiving service interface through a network backplane. A primary reference clock is provided to time the network backplane. The primary reference clock and the service clock are used to synthesize a copy of the service clock connected to the transmitting service interface. A first control word containing an error differential between the service clock and the synthesized copy of the service clock is generated and transmitted through the network backplane via a packet. The first control word, together with the primary reference clock, is used to recreate the service clock for timing the receiving service interface. | 09-12-2013 |
20130235875 | METHOD AND APPARATUS FOR INTERNETWORKING ETHERNET AND MPLS NETWORKS - MPLS networks offering PW or VPLS services may be interconnected with Ethernet networks implemented according to 802.1ah or 802.1Qay. The MPLS network may be a core and offer services to the Ethernet access networks, or vise-versa. Additionally, a mixture of different types of access networks may be interconnected by an MPLS core or an Ethernet core. Both network interworking and service interworking are provided. OAM fault detection may be implemented via maintenance entities extending across the network or end to end depending on the combination of networks and services offered by the networks. | 09-12-2013 |
20130230050 | METHOD AND APPARATUS FOR INTERNETWORKING ETHERNET AND MPLS NETWORKS - MPLS networks offering PW or VPLS services may be interconnected with Ethernet networks implemented according to 802.1ah or 802.1Qay. The MPLS network may be a core and offer services to the Ethernet access networks, or vise-versa. Additionally, a mixture of different types of access networks may be interconnected by an MPLS core or an Ethernet core. Both network interworking and service interworking are provided. OAM fault detection may be implemented via maintenance entities extending across the network or end to end depending on the combination of networks and services offered by the networks. | 09-05-2013 |
20130229921 | METHOD AND APPARATUS FOR INTERNETWORKING ETHERNET AND MPLS NETWORKS - MPLS networks offering PW or VPLS services may be interconnected with Ethernet networks implemented according to 802.1ah or 802.1Qay. The MPLS network may be a core and offer services to the Ethernet access networks, or vise-versa. Additionally, a mixture of different types of access networks may be interconnected by an MPLS core or an Ethernet core. Both network interworking and service interworking are provided. OAM fault detection may be implemented via maintenance entities extending across the network or end to end depending on the combination of networks and services offered by the networks. | 09-05-2013 |
20130226809 | METHOD AND APPARATUS ENABLING IMPROVED PROTECTION OF CONSUMER INFORMATION IN ELECTRONIC TRANSACTIONS - According to a commercial method of the present invention, a merchant forwards transaction data to a consumer. If the consumer accepts the transaction, a payment command is forwarded to a service provider. The service provider selectively applies authentication before approving payment. Once payment is approved, the service provider forwards a payment instruction, including consumer account information, to a payment service. The payment service forwards payment to the merchant and a payment confirmation is returned to the service provider and, through the service provider, to the consumer. The service provider stores information about each transaction performed by each subscriber. Consumer identity is protected because it is only exchanged between the service provider and the payment service, and is not made available to the merchant. In addition, the storage of the transaction information by various devices facilitates the return process and adds marketing capability to the service provider. | 08-29-2013 |
20130226721 | METHOD AND APPARATUS ENABLING IMPROVED PROTECTION OF CONSUMER INFORMATION IN ELECTRONIC TRANSACTIONS - According to a commercial method of the present invention, a merchant forwards transaction data to a consumer. If the consumer accepts the transaction, a payment command is forwarded to a service provider. The service provider selectively applies authentication before approving payment. Once payment is approved, the service provider forwards a payment instruction, including consumer account information, to a payment service. The payment service forwards payment to the merchant and a payment confirmation is returned to the service provider and, through the service provider, to the consumer. The service provider stores information about each transaction performed by each subscriber. Consumer identity is protected because it is only exchanged between the service provider and the payment service, and is not made available to the merchant. In addition, the storage of the transaction information by various devices facilitates the return process and adds marketing capability to the service provider. | 08-29-2013 |
20130218958 | CONTENT REQUEST ROUTING METHOD - A method of redirecting content requests among content distribution network peers. In operation, a client sends a request for content to a content distribution network (CDN). When this CDN does not currently have the capacity to deliver the content, the CDN refers to one or more content distribution tables to see if the neighbour peers are able to provide this content. The content distribution table is populated at the time of distribution of the content. When the neighbour peer has this content, the request is redirected to the neighbour peer. In redirecting request, an address of the neighbour peer is appending to the previous address such that each peer receiving the request knows where the request came from and where it has been previously. | 08-22-2013 |
20130218863 | ASSOCIATIVE SEARCH ENGINE - This invention relates to an advertisement machine which provides advertisements to a user searching for desired information within a data network. The machine receives, from a user, a search request including a search argument corresponding to the desired information and searches, based upon the received search argument, a first database having data network related information to generate search results. It also correlates the received search argument to a particular advertisement in a second database having advertisement related information. The search results together with the particular advertisement are provided by the machine to the user. | 08-22-2013 |
20130202298 | OPTICAL SWITCH AND PROTOCOLS FOR USE THEREWITH - A method of establishing a data connection between terminal switching nodes in a network and switching nodes for implementing the method. The method involves switching nodes participating in a network layer wavelength routing (WR) protocol to determine the next hop switching node for every possible combination of terminal nodes based on the network topology. The method also involves the switching nodes participating in a network layer wavelength distribution (WD) once the data connection is to be established. The WR protocol determines the path used through the network, while the WD protocol assigns wavelengths on each link between switching nodes. The wavelengths may be different on different optical links. The switching nodes include wavelength converters with an optical switch or optoelectronic converters with a digital electronic switch. A digital electronic switch can also provide signal reformatting. Advantages of using potentially different wavelengths along various segments of a single end-to-end connection yields increased wavelength efficiency. | 08-08-2013 |
20130198395 | SOCKS TUNNELING FOR FIREWALL TRAVERSAL - The present invention provides a unique way of implementing the SOCKS protocol for establishing connections through a firewall. In general, instead of having a SOCKS server implemented entirely in the firewall, SOCKS servers are implemented on both a server and a client, which are configured to communicate with each other through the firewall. The SOCKS servers on the server and client allow multiple objects on both the server and the client to communicate with each other through a single port through the firewall, wherein the SOCKS servers on the server and the client cooperate with each other and their respective objects to allow the objects to establish the connections. | 08-01-2013 |
20130188652 | RATE CONTROLLED OPITCAL BURST SWITCHING - The invention provides a method and network communication equipment for low latency loss-free burst switching. Burst-transfer schedules are determined by controllers of bufferless core nodes according to specified bitrate allocations and distributed to respective edge nodes. In a composite-star network, burst schedules are initiated by any core node. Burst formation takes place at source edge nodes and a permissible burst size is determined according to an allocated bitrate of a burst stream to which the burst belongs. The permissible burst size is subject to constraints such as permissible burst-formation delay, a minimum guard-time requirement, and permissible delay jitter. A method of control-burst exchange between each edge node and each bufferless core node enables burst scheduling, time coordination, and loss-free burst switching. Both the payload bursts and control bursts are carried by optical channels connecting the edge nodes and the core notes. | 07-25-2013 |
20130188528 | FREQUENCY AGILE FILTER USING A DIGITAL FILTER AND BANDSTOP FILTERING - A method of providing frequency dependent signal attenuation. An RF input signal is split into a first signal portion and a second signal portion. The first signal portion is discrete time filtered and bandstop filtered to provide a filtered signal portion. The second signal portion is applied to a component and a component output signal portion is received from the component. The component output signal portion is combined with the filtered signal portion to provide an RF output signal having frequency dependent attenuation. | 07-25-2013 |
20130182993 | MONITORING eDC POLARIZATION INVERSE FILTER COEFFICIENTSW TO IDENTIFY REAL-TIME PHYSICAL INTRUSION INTO A CORE OR METRO OPTICAL NETWORK - A fiber network is monitored in order to detect physical intrusion. The state of polarization of an optical fiber is monitored. A fiber tap is determined to have occurred if the state of polarization of the fiber changes beyond a predetermined amount found to be associated with all types of fiber taps. Alternately, it may be determined that a fiber tap has occurred if the state of polarization changes beyond a second predetermined amount and in a predetermined direction. Monitoring of the state of polarization occurs before and after a time period chosen to be less than a time during which the state of polarization of the optical fiber is expected to drift. This step eliminates false positives due to natural fiber PMD drift. | 07-18-2013 |
20130179065 | METHOD AND APPARATUS FOR ENABLING COMMUTER GROUPS - A commuter groups service (CGS) allows commuters to join commuter groups so that they are able to socialize while commuting. Through the commuter groups, the users may share commuting routes, traffic updates, road conditions, and other information. Group members may arrange car pools, short term riding arrangements, and may anonymously or directly contact each other. The CGS may collect group member position information, e.g. GPS information, to enable the CGS to calculate traffic conditions and to select location specific information for group members. The system may include an on-line service accessible through a computer or wireless networking device. The user may log into the CGS, create or modify a user profile, and join groups of their choosing. Groups may be associated with specific events or with getting to/from work. Commuter groups may be formed for commuters that use private vehicles and/or public transportation, | 07-11-2013 |
20130170400 | Dynamic Hierarchical Address Resource Management Architecture, Method and Apparatus - A Dynamic Hierarchical Address Resource Management Architecture (DHARMA) coordinates a logical hierarchy of address spaces with a virtual topology of network elements using a manageable database environment. Address spaces are apportioned into hierarchical levels in accordance with a network policy. Network elements may be represented as objects, coupled via the logical address space. Both address space hierarchy definition and virtual topology modelling may occur independent from actual network deployment. As a result, multiple address space hierarchy definitions and virtual topologies can be pre-generated and stored for selective use during network deployment. With such an arrangement, a flexible addressing architecture is provided which may advantageously be used in any network that desires dynamic network configuration. The connection between the logical address hierarchy and the virtual network topology may advantageously be implemented through the use of a logical tag that links a virtual network element to a logical address hierarchy level. | 07-04-2013 |
20130149982 | FREQUENCY AGILE FILTER USING A DIGITAL FILTER AND BANDSTOP FILTERING - A method of providing frequency dependent signal attenuation. An RF input signal is split into a first signal portion and a second signal portion. Discrete time filtering, a negative group delay and bandstop filtering are applied to the first signal portion to provide a filtered signal portion. The second signal portion is applied to a component, and a component output signal portion is received from the component. The component output signal portion is combined with the filtered signal portion to provide an RF output signal having frequency dependent attenuation. | 06-13-2013 |
20130148660 | MULTICAST IMPLEMENTATION IN A LINK STATE PROTOCOL CONTROLLED ETHERNET NETWORK - Forwarding state is installed for sparse multicast trees in a link state protocol controlled Ethernet network by enabling intermediate nodes to install state for one or more physical multicast trees, each of which may have multiple logical multicast trees mapped to it. By mapping multiple logical multicasts to a particular physical multicast, and installing state for the physical multicast, fewer FIB entries are required to implement the multiple multicasts. Mapping may be performed by destination nodes before advertising membership in the physical multicast, or may be performed by the intermediate nodes before installing state when a destination node advertises membership in a logical multicast. Intermediate nodes will install state for the physical multicast tree if they are on a shortest path between a source and at least one destination of one of the logical multicasts that has been mapped to the physical multicast. | 06-13-2013 |
20130144998 | METHODS FOR AUTO-CONFIGURING A ROUTER ON AN IP SUBNET - An autoconfiguring data router is connected to a communications network subnet having a second network data router. The autoconfiguring data router includes a configuration determination module that determines configuration attributes for operably connecting the autoconfiguring data router to the subnet, and an autoconfiguration module that configures the autoconfiguring data router according to the configuration attributes so that the autoconfiguring data router is operably connected to the subnet. | 06-06-2013 |
20130144996 | INTERFACING BETWEEN A COMMAND LINE INTERFACE-BASED APPLICATION PROGRAM AND A REMOTE NETWORK DEVICE - A method for interfacing between a command-line-interface (CLI)-based application program (CLI-AP) residing in a client network device, and remote network devices. The method includes predefining at least one CLI-based program routine (CLI-PR) comprising at least one CLI-based command wherein the CLI-PR is defined externally to the CLI-AP, determining by CLI-AP a set of data to be obtained from the remote network device; selecting by CLI-AP a predefined CLI-PR from the predefined CLI-PRs, the selected predefined CLI-PR corresponding to the remote network device and determined set of data to be obtained; instructing the client network device by CLI-AP to execute the selected predefined CLI-PR, wherein executing selected predefined PR will cause the selected predefined CLI-PR to obtain the determined set of data from remote network device and to configure the obtained data in a predetermined format; and querying configured data by CLI-AP to retrieve the determined set of data. | 06-06-2013 |
20130142087 | Method and Apparatus for Overlaying Whispered Audio onto a Telephone Call - Information may be provided to a telephony customer from an overlay service by causing a second stream of audio information to be overlayed on a primary stream of audio information. The overlayed information may be whispered to the user by causing the overlayed information to be compressed into a limited frequency spectrum which is inserted into a manufactured gap in the primary audio stream. This allows the user to continue to hear the main audio stream while also hearing the overlayed information. The overlay service may provide administrative information, advertisements, music, and/or Internet search results via the overlayed audio. Users may issue commands to the overlay service, to have particular information transmitted via overlayed audio. Where the user is also associated with a telephony application running on a computer platform, the overlayed information may be incorporated onto the information being shown to the user on a computer display. | 06-06-2013 |
20130136003 | Method and Apparatus for Ethernet Data Compression - A method and apparatus for Ethernet data compression enables the size of Ethernet frames to be reduced. Compression and decompression of Ethernet frames occur by the Ethernet network elements, rather than by user computers or end devices that transmit data on the Ethernet network. A new EtherType value may be used to identify the type of compressed Ethernet frames and optionally the type of mechanism used to compress the payload of Ethernet frames. The new EtherType may be inserted into a newly assembled frame ahead of the original EtherType. Alternatively, the new EtherType may replace the original EtherType and a short subheader may be used to identify the original EtherType. Out-of-band network signaling by the Ethernet control plane may also be used to determine whether frames are to be compressed and decompressed over controlled Ethernet links and tunnels, with or without use of the new EtherType. | 05-30-2013 |
20130133058 | SECURITY BRIDGING - A network media gateway is used to bridge trust between a Service Provider network and subscriber devices. The gateway is authenticated by the Service Provider by using knowledge of network topology. Subscriber devices are authenticated in response to subscriber input to the gateway via an interface. Trusted subscriber devices can be tightly coupled with the Service Provider network, thereby facilitating delivery of QoE. Mobile and remote subscriber devices may also be authenticated. The gateway may also facilitate establishment of VPNs for peer-to-peer communications, and dynamically adjustable traffic, policy and queue weightings based on usage patterns. | 05-23-2013 |
20130132563 | BROKERING NETWORK RESOURCES - A method of brokering a network resource | 05-23-2013 |
20130128878 | METHOD TO PROCESS A CALL REQUEST - Establishing a communication session in a packet-based network. A communication session request is received from an originating device. The communication session request includes a destination address. A communication session is established with the originating device. The communication session includes a communication session identifier. Based on the destination address, a first media path is set up between the originating device and a first destination device, the first media path not including a communication session controller. The first media path between the originating device and the first destination device is taken down while maintaining the communication session with the originating device. After taking down the first media path, a second media path in the communication session is set up using the communication session identifier. The second media path extends between the originating device and a second destination device, the second media path not including the communication session controller. | 05-23-2013 |
20130127983 | WEB BASED ACCESS TO VIDEO CONTENT ASSOCIATED WITH VOICEMAIL - A method for providing access to a video portion of a voice and video (VAV) call includes receiving a VAV call that originated from a device of a first user. The VAV call includes a voice portion and a video portion. The voice portion of the call is transmitted to a voicemail associated with a voice terminal of a second user while the video portion of the VAV call stored. The second user is subsequently provided with access to the video portion of the VAV call. | 05-23-2013 |
20130117776 | SYSTEM, DEVICE, AND METHOD FOR RECEIVER ACCESS CONTROL IN AN INTERNET TELEVISION SYSTEM - A system, device, and method for receiver access control in an internet television system uses a push mechanism to distribute access control information froth a distribution device to an access device. The access device uses the access control information to make receiver access control decisions for a subsequently received request from a host to join a television channel multicast group. | 05-09-2013 |
20130117553 | Method and Apparatus for Increasing the Output of a Cryptographic System - The rate at which packets are provided to a cryptographic engine of a cryptographic system is adjusted using a feedback mechanism to increase the output of the cryptographic system. Data is classified and queued on a per class/flow basis and stored in input queues prior to being processed. A class based queue scheduler is implemented to select data from the input queues to be transmitted to the cryptographic engine. The cryptographic engine operates in processing cycles. At each cycle, an amount of data is transferred from the input queues to a cryptographic engine input queue. A cryptographic accelerator in the cryptographic engine processes the data on the cryptographic engine input queue during the cycle. The output rate of the cryptographic accelerator is measured during the cycle and this value is used as feedback to determine how much data should be passed to the cryptographic engine for a subsequent cycle. | 05-09-2013 |
20130117304 | ASSOCIATIVE SEARCH ENGINE - This invention relates to an advertisement machine which provides advertisements to a user searching for desired information within a data network. The machine receives, from a user, a search request including a search argument corresponding to the desired information and searches, based upon the received search argument, a first database having data network related information to generate search results. It also correlates the received search argument to a particular advertisement in a second database having advertisement related information. The search results together with the particular advertisement are provided by the machine to the user. | 05-09-2013 |
20130117250 | ASSOCIATIVE SEARCH ENGINE - This invention relates to an advertisement machine which provides advertisements to a user searching for desired information within a data network. The machine receives, from a user, a search request including a search argument corresponding to the desired information and searches, based upon the received search argument, a first database having data network related information to generate search results. It also correlates the received search argument to a particular advertisement in a second database having advertisement related information. The search results together with the particular advertisement are provided by the machine to the user. | 05-09-2013 |
20130117119 | ASSOCIATIVE SEARCH ENGINE - This invention relates to an advertisement machine which provides advertisements to a user searching for desired information within a data network. The machine receives, from a user, a search request including a search argument corresponding to the desired information and searches, based upon the received search argument, a first database having data network related information to generate search results. It also correlates the received search argument to a particular advertisement in a second database having advertisement related information. The search results together with the particular advertisement are provided by the machine to the user. | 05-09-2013 |
20130117118 | ASSOCIATIVE SEARCH ENGINE - This invention relates to an advertisement machine which provides advertisements to a user searching for desired information within a data network. The machine receives, from a user, a search request including a search argument corresponding to the desired information and searches, based upon the received search argument, a first database having data network related information to generate search results. It also correlates the received search argument to a particular advertisement in a second database having advertisement related information. The search results together with the particular advertisement are provided by the machine to the user. | 05-09-2013 |
20130117117 | ASSOCIATIVE SEARCH ENGINE - This invention relates to an advertisement machine which provides advertisements to a user searching for desired information within a data network. The machine receives, from a user, a search request including a search argument corresponding to the desired information and searches, based upon the received search argument, a first database having data network related information to generate search results. It also correlates the received search argument to a particular advertisement in a second database having advertisement related information. The search results together with the particular advertisement are provided by the machine to the user. | 05-09-2013 |
20130117116 | ASSOCIATIVE SEARCH ENGINE - This invention relates to an advertisement machine which provides advertisements to a user searching for desired information within a data network. The machine receives, from a user, a search request including a search argument corresponding to the desired information and searches, based upon the received search argument, a first database having data network related information to generate search results. It also correlates the received search argument to a particular advertisement in a second database having advertisement related information. The search results together with the particular advertisement are provided by the machine to the user. | 05-09-2013 |
20130117115 | ASSOCIATIVE SEARCH ENGINE - This invention relates to an advertisement machine which provides advertisements to a user searching for desired information within a data network. The machine receives, from a user, a search request including a search argument corresponding to the desired information and searches, based upon the received search argument, a first database having data network related information to generate search results. It also correlates the received search argument to a particular advertisement in a second database having advertisement related information. The search results together with the particular advertisement are provided by the machine to the user. | 05-09-2013 |
20130117114 | ASSOCIATIVE SEARCH ENGINE - This invention relates to an advertisement machine which provides advertisements to a user searching for desired information within a data network. The machine receives, from a user, a search request including a search argument corresponding to the desired information and searches, based upon the received search argument, a first database having data network related information to generate search results. It also correlates the received search argument to a particular advertisement in a second database having advertisement related information. The search results together with the particular advertisement are provided by the machine to the user. | 05-09-2013 |
20130117113 | ASSOCIATIVE SEARCH ENGINE - This invention relates to an advertisement machine which provides advertisements to a user searching for desired information within a data network. The machine receives, from a user, a search request including a search argument corresponding to the desired information and searches, based upon the received search argument, a first database having data network related information to generate search results. It also correlates the received search argument to a particular advertisement in a second database having advertisement related information. The search results together with the particular advertisement are provided by the machine to the user. | 05-09-2013 |
20130114467 | Providing Calling Party Information in a Request to Establish a Call Session - A method and apparatus are provided for providing calling party information in a request to establish a call session. The method comprises receiving a call request from an entity to establish an interactive call session. The method comprises receiving information associated with the entity. The method further comprises providing the information in the call request. | 05-09-2013 |
20130114411 | METHOD AND SYSTEM FOR PACKET DISCARD PRECEDENCE FOR VIDEO TRANSPORT - Discard precedence priority of packets carrying an encoded video stream in a packet network is determined based on priority information included in the encoded video stream. A video streamer segments an encoded video stream and encapsulates the segment in an Internet Protocol (IP) packet. Priority information associated with the IP packet is determined based on at least one priority indicator associated with the segment that was included in the encoded video stream. Alternately, priority information associated with an Ethernet frame is determined based on at least one priority indicator associated with the segment that was included in the encoded video stream. | 05-09-2013 |
20130110917 | TECHNIQUE FOR ENABLING A PLURALITY OF SOFTWARE COMPONENTS TO COMMUNICATE IN A SOFTWARE COMPONENT MATRIX ENVIRONMENT | 05-02-2013 |
20130100801 | PROVIDER BACKBONE BRIDGING - PROVIDER BACKBONE TRANSPORT INTERNETWORKING - An Ethernet virtual switched sub-network (VSS) is implemented as a virtual hub and spoke architecture overlaid on hub and spoke connectivity built of a combination of Provider Backbone Transport (spokes) and a provider backbone bridged sub-network (hub). Multiple VSS instances are multiplexed over top of the PBT/PBB infrastructure. A loop free resilient Ethernet carrier network is provided by interconnecting Provider Edge nodes through access sub-networks to Provider Tandems to form Provider Backbone Transports spokes with a distributed switch architecture of the Provider Backbone Bridged hub sub-network. Provider Backbone transport protection groups may be formed from the Provider Edge to diversely homed Provider Tandems by defining working and protection trunks through the access sub-network. The Provider Backbone Transport trunks are Media Access Control (MAC) addressable by the associated Provider Edge address or by a unique address associated with the protection group in the Provider Backbone Bridged network domain. | 04-25-2013 |
20130100229 | WEB BASED ACCESS TO VIDEO ASSOCIATED WITH CALLS - In a communication environment where a voice bearer is established between a multimedia terminal of a first user and a voice terminal of a second user to allow voice communications between the first and second users, the present invention allows the second user to gain access to video content of the first user through a web session. | 04-25-2013 |
20130083655 | AUTO-COMPRESSION FOR MEDIA OVER IP - The present invention allows communicating devices to control the amount of compression used in packet sessions for transmitting streaming media to and from each other. When a communicating device detects a decrease in performance or quality of service indicative of a limited bandwidth condition, the amount of compression for the current or subsequent sessions is temporarily increased to allow the currently available bandwidth to support the session or subsequent sessions. After a set period of time, or when the limited bandwidth condition is removed, communications associated with the sessions can revert back to transporting uncompressed data or reducing the amount of compression for the sessions, thus using more of the available bandwidth. | 04-04-2013 |
20130081126 | SYSTEM AND METHOD FOR TRANSPARENT SINGLE SIGN-ON - A method for transparent single sign-on authentication on computers in a networked environment. An embodiment includes receiving an authentication request from an operating system of a first computer, requesting credentials of an application making the authentication request, authenticating the credentials, storing the credentials if the authentication is successful, and transmitting the credentials to a second computer. On subsequent access requests made by the user on the second computer, the credentials can be retrieved from the secure store, eliminating the need to prompt the user to re-enter authentication information. | 03-28-2013 |
20130080648 | SESSION INITIATION FROM APPLICATION SERVERS IN AN IP MULTIMEDIA SUBSYSTEM - The present invention provides a technique where application servers can initiate sessions within the IMS network by initially sending session initiation messages to the I-CSCF. By routing the session initiation messages to the I-CSCF, the application servers need not directly access the HSSs in order to initiate sessions. Upon receiving a session initiation message from an application server, the I-CSCF may access the HSS to identify an S-CSCF to use for session control and then route the session initiation message to that S-CSCF. The S-CSCF may then access the same or different HSS to determine how to further route the session initiation message to establish the session. The session initiation message may be routed toward other S-CSCFs en route to the appropriate user elements. The session may be a session established between user elements or between the application server and a user element. | 03-28-2013 |
20130080637 | METHOD FOR OPERATING MULTI-DOMAIN PROVIDER ETHERNET NETWORKS - A method of enabling extension of a network service of a first domain to a remote customer site hosted by an Access Gateway (AG) in a Provider Ethernet domain. In the first domain, the remote customer site is represented as being hosted by a border gateway (BG) connected to the Provider Ethernet domain, such that subscriber packets associated with the network service are forwarded to or from the remote customer site via the BG. In the Provider Ethernet domain, a trunk connection is instantiated through the Provider Ethernet domain between the host AG and the BG. A trunk cross-connection function is installed in the host AG, for transferring subscriber packets associated with the network service between a respective attachment virtual circuit (AVC) through which the remote customer site is connected to the host AG and an extended AVC tunnelled through the trunk connection. A common service instance identifier (I-SID) is used to identify both the AVC between the host AG and the remote customer site and the extended AVC between the host AG and the BG. | 03-28-2013 |
20130077960 | UTILIZING OPTICAL BYPASS LINKS IN A COMMUNICATION NETWORK - Optical By-Pass (OBP) links may be created by adding wavelengths between nodes on the network. The OBP may extend between any pair of nodes on the network. Intermediate nodes on the OBP are transient nodes and simply forward traffic optically. An OBP extends between a pair of nodes and, unlike express links, is created in such a manner that it does not affect the previous allocation of resources on the network. This enables capacity to be added between pairs of nodes on the network to alleviate congestion at a portion of the network, without changing other traffic patterns on the network. This enables inclusion of an OBP to be deterministic and of linear impact on the network. The OBP links may be statically provisioned or created on demand. Optionally, the OBP links may be crated to coincide with PBB-TE tunnels on the network. | 03-28-2013 |
20130077488 | TECHNIQUE FOR END-TO-END ADMISSION CONTROL OF REAL-TIME PACKET FLOWS - A technique for end-to-end admission control of real-time packet flows is disclosed. In one embodiment, the technique may be realized as a method for end-to-end admission control of real-time packet flows in a network having a plurality of network elements. The method may include transmitting at least one probe packet from a first network element to a second network element via a network path, determining, at at least one intermediate network element on the network path, at least one flow rate associated with a plurality of packets, marking at least one predetermined bit in the at least one probe packet if the at least one flow rate is greater than a predetermined rate, and controlling an admission of additional packets into the network based at least in part on the marking of the at least one predetermined bit in the at least one probe packet. | 03-28-2013 |
20130073616 | DISTRIBUTION OF XML DOCUMENTS/MESSAGES TO XML APPLIANCES/ROUTERS - XML appliances/routers may be organized to implement one or more XML distribution rings to enable XML documents/messages to be distributed efficiently. The rings may be logical or physical. The XML distribution rings enable the XML documents/messages to be exchanged without requiring the XML appliances/routers to run a routing protocol to determine how XML documents/messages should be distributed through the network. Documents may be transmitted in one way on the ring or may be transmitted in both directions around the ring to enable the ring to tolerate failure of an XML appliance/router. Each XML appliance/router will receive all XML documents/messages and will make routing decisions for those clients that have provided the XML appliance/router with XML subscriptions. The subscriptions may be formed according to the XPath standard or in another manner. | 03-21-2013 |
20130070730 | HANDOFF OF A MOBILE STATION BETWEEN PACKET-SWITCHED AND CIRCUIT-SWITCHED WIRELESS DOMAINS - A first mobility management entity (MME) is configured to cooperate with a first access network controller to provide a circuit switched service to a mobile station while the mobile station is attached to a packet switched wireless access network in a first coverage area. A second MME is configured to cooperate with the first access network controller to provide a circuit switched service to the mobile station when the mobile station has moved from the first coverage area to the second coverage area. A home subscriber system is configured to provide, to the second MME, information identifying the first access network controller as serving the mobile station to enable the second MME to initiate handoff of the mobile station from the packet switched wireless access network to the circuit switched wireless access network. | 03-21-2013 |
20130070729 | HANDOFF OF A MOBILE STATION BETWEEN PACKET-SWITCHED AND CIRCUIT-SWITCHED WIRELESS DOMAINS - A first mobility management entity (MME) is configured to cooperate with a first access network controller to provide a circuit switched service to a mobile station while the mobile station is attached to a packet switched wireless access network in a first coverage area. A second MME is configured to cooperate with the first access network controller to provide a circuit switched service to the mobile station when the mobile station has moved from the first coverage area to the second coverage area. A home subscriber system is operated to provide, to the second MME, information identifying the first access network controller as serving the mobile station to enable the second MME to initiate handoff of the mobile station from the packet switched wireless access network to the circuit switched wireless access network. | 03-21-2013 |
20130070586 | Scaling OAM for Point-to-Point Trunking - A shared (proxy) OAM session is performed in a packet-based network on behalf of a plurality of connections. First and second connections are each routed between respective nodes of the network for carrying data traffic. The second connection shares a portion of the routing of the first connection. The shared OAM session is performed along a path which is co-routed with at least part of the shared portion of the routing of the first connection and the second connection. Failure notification signalling is propagated to an endpoint node of each of the first and second connections when the shared OAM session indicates a failure has occurred. The use of a shared OAM session reduces processing at nodes and reduces OAM traffic. Each connection can be a trunk, such as a PBT/PBB-TE trunk, or a service carried within a trunk. | 03-21-2013 |
20130067099 | MULTI-MODE ENDPOINT IN A COMMUNICATION NETWORK SYSTEM AND METHODS THEREOF - A method, apparatus, and communication network system that allows an endpoint to be simultaneously registered with more than one communications server is described. In one embodiment, the communication network system includes a network, a plurality of communications servers that are coupled to the network, and a plurality of endpoints coupled to the network. Each endpoint is capable of being simultaneously registered with more than one communications server. A communication method for an endpoint involves registering a first logical line of the endpoint with a first communications server, and registering a second logical line of the endpoint with a second communications server. Consequently, flexibility is obtained by allowing an endpoint to choose the registering communications server for each logical line of the endpoint. | 03-14-2013 |
20130064074 | BREAK BEFORE MAKE FORWARDING INFORMATION BASE (FIB) POPULATION FOR MULTICAST - A method of installing forwarding state in a link state protocol controlled network node having a topology database representing a known topology of the network, and at least two ports for communication with corresponding peers of the network node. A unicast path is computed from the node to a second node in the network, using the topology database, and unicast forwarding state associated with the computed unicast path installed in a filtering database (FDB) of the node. Multicast forwarding state is removed for multicast trees originating at the second node if an unsafe condition is detected. Subsequently, a “safe” indication signal is advertised to each of the peers of the network node. The “safe” indication signal comprises a digest of the topology database. A multicast path is then computed from the network node to at least one destination node of a multicast tree originating at the second node. Finally, multicast forwarding state associated with the computed multicast path is installed in the filtering database (FDB) of the network node, when predetermined safe condition is satisfied. | 03-14-2013 |
20130054643 | Method and Apparatus for Document Matching - Documents written using a markup language such as XML may be decomposed into Path and Parent Associated Node (PPAN) elements, each of which is a linear data structure that includes the content of a node, the parent-child relationship of the node, and the path level of the node. A number of PPAN elements may be grouped together to form A PPAN chain. A PPAN matching process uses the PPAN elements/PPAN chain to search for structured documents that match the PPAN chain. The PPAN matching process is able to perform query and match at the same time to accelerate the PPAN matching process, and also enables complex services to be represented by generic structured documents. Optionally, the PPAN matching process may support wildcard requests so that services may be discovered without prior knowledge of the services. | 02-28-2013 |
20130051229 | TRAFFIC ENGINEERING AND BANDWIDTH MANAGEMENT OF BUNDLED LINKS - Traffic engineering and bandwidth management of bundled links may, at times, require the selection of one of a plurality of component links in a bundled link to use in admitting a connection requiring admission. While performing the selection it may be determined that more than one of the component links has the resources required to admit the connection. An admission policy may then be selected from among a plurality of admission policies. Based on the selected admission policy, a particular component link may then be selected. Such bandwidth management, based on admission policies, may be seen to be well suited to balancing and component link recovery in traffic engineered, connection-oriented MPLS networks. | 02-28-2013 |